NCS315/TEL550 Networking of Information Systems & Advanced Networking Standards & Protocols. Ronny L. Bull, MS Lecturer Computer Science Department

Size: px
Start display at page:

Download "NCS315/TEL550 Networking of Information Systems & Advanced Networking Standards & Protocols. Ronny L. Bull, MS Lecturer Computer Science Department"

Transcription

1 NCS315/TEL550 Networking of Information Systems & Advanced Networking Standards & Protocols Ronny L. Bull, MS Lecturer Computer Science Department Spring 2014

2 Wireless Review 2 types of networks Infrastructure Ad-Hoc What are the characteristics of each? Why would you use one over the other?

3 Wireless Review Hidden Terminal Problem C A B

4 Wireless Review Signal Attenuation A B C A s signal strength C s signal strength space

5 Wireless Review Basic Service Set Infrastructure mode: Contains wireless hosts and AP's Ad-Hoc mode: Hosts only

6 Wireless Review b 2.4GHz 2.485GHz Divided into 11 channels Channel set by AP admin Interference with other nearby AP's on same channel Solution: stagger channels!

7 Wireless Review Host must associate with AP Scans channels, listening for beacon frames Contain AP's name (SSID) and MAC Selects AP to associate with Authenticates if necessary Pull DHCP address (if configured)

8 BBS 1 BBS 2 BBS 1 BBS 2 AP AP 2 AP AP 2 H1 passive scanning: (1)beacon frames sent from APs (2)association Request frame sent: H1 to selected AP (3)association Response frame sent from selected AP to H1 H1 active scanning: (1) Probe Request frame broadcast from H1 (2) Probe Response frames sent from APs (3) Association Request frame sent: H1 to selected AP (4) Association Response frame sent from selected AP to H1 Wireless Review

9 Wireless Review CSMA/CA Sender Senses channel to see if idle Transmits entire frame If busy back off Start random timer If idle after timer expires transmit Else set new random timer

10 Wireless Review CSMA/CA Receiver Receives frame Sends ACK to sender Helps with hidden terminal problem

11 Wireless Review RTS (Request To Send) Sender transmits small RTS packet to reserve channel May collide with other RTS packets CTS (Clear To Send) BS broadcasts CTS in response to RTS Heard by all nodes

12 A AP B RTS(A) RTS(A) reservation collision CTS(A) CTS(A) DATA (A) defer time ACK(A) ACK(A) Wireless Review

13 frame control duration address 1 Wireless Review address 2 address 3 seq control address 4 payload CRC Address 1: MAC address of wireless host or AP to receive this frame Address 2: MAC address of wireless host or AP transmitting this frame Address 3: MAC address of router interface to which AP is attached Address 4: used only in ad hoc mode

14 Wireless Review duration of reserved transmission time (RTS/CTS) frame seq # (for RDT) frame control duration address 1 address 2 address 3 seq control address 4 payload CRC Protocol version Type Subtype To AP From AP More frag 1 1 Power Retry mgt More data WEP Rsvd frame type (RTS, CTS, ACK, data)

15 Wireless Review (Bluetooth) Less than 10m diameter Replacement for cables (mouse, keyboard) Ad-hoc Master/slaves GHz Up to 721 kbps

16 Multimedia Review audio signal amplitude quantization error quantized value of analog value analog signal sampling rate (N sample/sec) time

17 Multimedia Review If a sample of audio is taken from a stereo source at 44,100 samples per second for 1 hour what is the amount of disk space required to store the resulting file? Formula Samples per second * bits per sample * number of channels = total bps required for storage Total bps required / 8 = total bytes per second Total Bps required * 60 = total Bpm Total Bpm * 60 = total Bph Bph/1000 = KBph/1000 = MBph

18 Multimedia Review If a sample of audio is taken from a stereo source at 44,100 samples per second for 1 hour what is the amount of disk space required to store the resulting file? Using a resolution of 16 bits per sample 44,100 * 16 * 2 = 1,411,200 bits required per second 1,411,200/8 = bytes required per second * 60 = bytes required per minute

19 Multimedia Review * 60 = bytes required per hour /1000 = Kilobits per hour /1000 = Megabytes per hour To store 1 hour of stereo audio would take up Mb of disk space.

20 Multimedia Review Audio / Video applications Streaming: can begin playout before downloading entire file Stored (at server): Can transmit faster than audio/video will be rendered. Conversational Voice/video over IP Low delay requirement Live streaming

21 Cumulative data 1. video recorded (e.g., 30 frames/sec ) 2. video sent network delay (fixed in this example) 3. video received, played out at client (30 frames/sec) time streaming: at this time, client playing out early part of video, while server still sending later part of video Multimedia Review

22 Multimedia Review Once client playout begins, playback must match original timing Network delays are variable Jitter Latency Need client side buffer to match playout requirements

23 Cumulative data constant bit rate video transmission variable network delay client video reception buffered video constant bit rate video playout at client client playout delay time Multimedia Review

24 Amazon cloud upload copies of multiple versions of video to CDNs Akamai CDN Netflix registration, accounting servers 1 2. Bob browses Netflix video Manifest file returned for requested video Limelight CDN 1. Bob manages Netflix account 4. DASH streaming Level-3 CDN Multimedia Review

25 VoIP Review Terms you should be familiar with: Voice over IP Video over IP Convergence Codecs ATA IP-PBX Hosted PBX

26 VoIP Review More Terms IP Telephone Softphones Hardphones Video conferencing Video bridge Voice conferencing Voice bridge

27 VoIP Review H.323 H.323 terminal H.323 gateway H.323 gatekeeper MCU (multipoint control unit) H.323 zone

28 VoIP Review

29 VoIP Review H.225 and H.245 signaling protocols Operate at Session layer H.225 call or video conferencing signal H.245 ensures correct information type formatting H.323 standard Specifies protocol interoperability

30 VoIP Review SIP (Session Initiation Protocol) Similar to H.323 Modeled on HTTP (Clear text) Components User agent User agent client User agent server Registrar server Proxy server Redirect server

31 VoIP Review

32 VoIP Review RTP Application layer protocol Relies on UDP at transport layer Applies sequence numbers Destination packet assembly order Packet loss during transmission Assigns packet timestamp Receiving node Compensates for delay Signal sync

33 VoIP Review RTCP Provides quality feedback to participants Not mandatory on RTP networks RTP and RTCP Provide information about packet order, loss, delay Cannot correct transmission flaws

34 VoIP Review QoS (Quality of Service) Helps to prevent delays, disorder, and distortion RSVP & Diffserv

35 VoIP Review RSVP (Resource Reservation Protocol) Transport layer protocol Reserves network resources prior to transmission Creates path between sender & receiver Provides sufficient bandwidth Same path followed in reverse Two types of service Guaranteed service Controlled-load service

36 VoIP Review RSVP Emulates circuit-switched path Provides excellent QoS Drawback: high overhead Good for small networks Bad for large networks

37 VoIP Review DiffServ Prioritizes traffic Different streams can get different priorities Modifies actual datagram Accounts for all network traffic

38 VoIP Review EF (Expedited Forwarding) Data stream assigned minimum departure rate Circumvents delays AF (Assured Forwarding) Data streams assigned different router resource levels Prioritizes data handling No guarantee of on time, in sequence arrival

39 Network Security Review Terms you should know Security Assessment Posture assessment Hacker Cracker Vulnerability Exploit 0-day

40 Network Security Review Human Risks Social engineering Error Ignorance Omissions Easiest way to circumvent network security Take advantage of human error

41 Network Security Review What are some other risks associated with the security of a network? How can one find and exploit these? Where do most network security compromises occur from? What is a security policy? Why is it important? What does not belong in a security policy?

42 Network Security Review Physical security Secure network design ACL's IDS/IPS Firewalls DMZ Honeypots NIPS/HIPS Proxy Servers Network Scanners

43 Network Security Review Network Operating System Security What are some things we can do to lock it down? Login restrictions Password rules Group Policy Access restrictions

44 Network Security Review Encryption Symmetric Shared Key Asymmetric Private/Public Key Digital Certificates SSL SSH IPSec

45 Network Security Review Authentication Radius TACACUS+ PAP CHAP / MS-CHAP EAP (802.1x EAPoL) Kerberos

46 Network Security Review Wireless WEP WPA i (802.1x (EAPoL)

47 Integrity & Availability Review Terms Integrity Availability Uptime Malware Virus Trojan Polymorphism

48 Integrity & Availability Review Failures and faults How do we cope with them? Environment Heating and cooling Power Blackout Brownout Surge Noise

49 Integrity & Availability Review Redundancy Power Data RAID NAS/SAN Network Physical topology Service redundancy & load balancing DNS tricks Clustering Mirroring

50 Integrity & Availability Review Data backup Media types Incremental Full Differential Grandfather-Father-Son Disaster recovery planning Cold site Warm site Hot site

51 Network Management Review Documentation Topology Devices Configurations Changes! Baselining Policies, Proceedures & Regulations HIPPA CALEA FERPA

52 Network Management Review Network Monitoring SNMP MIB Alerts & Alarms Nagios & Cacti System and Event Logging Event Viewer Syslog & Journald

53 Network Management Review Traffic shaping Limiting Prioritization Delay less important traffic Base on protocol, IP, groups, etc.. Block traffic Caching DNS Web

54 Network Management Review Asset management Documentation Asset tracking Inventory Software/NOS changes Steps to update or upgrade Reversing changes Backleveling Physical network changes

55 Network Management Review DOCUMENT EVERYTHING!!!!!

56 Network Troubleshooting Review Is it broke? Is it plugged in? Is it turned on? Who touched it last? Point finger Fix it... fix it... fix it... fix it... NOW!!!!

57 Network Troubleshooting Review Troubleshooting steps Identify problem Establish theory of probable cause Test theory to determine cause Establish action plan Implement solution or escalate Verify full functionality Implement preventative measures Document findings, actions, and outcomes

58 Subnetting Review Practice questions from review sheets Look at for more practice questions

59 Other Tidbits Final exam will only cover material from after the midterm Review quizzes 5, 6&7 Final exam date Mon 5/5 12:45p 2:45p in A115 Online students must come to campus at that time or arrange for a proctor.

Multiple Access in Cellular and Systems

Multiple Access in Cellular and Systems Multiple Access in Cellular and 802.11 Systems 1 GSM The total bandwidth is divided into many narrowband channels. (200 khz in GSM) Users are given time slots in a narrowband channel (8 users) A channel

More information

Wireless and Mobile Networks 7-2

Wireless and Mobile Networks 7-2 Wireless and Mobile Networks EECS3214 2018-03-26 7-1 Ch. 6: Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers (5-to-1)! # wireless Internet-connected

More information

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross Wireless Networks CSE 3461: Introduction to Computer Networking Reading: 6.1 6.3, Kurose and Ross 1 Wireless Networks Background: Number of wireless (mobile) phone subscribers now exceeds number of wired

More information

Topic 2b Wireless MAC. Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach

Topic 2b Wireless MAC. Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach Topic 2b Wireless MAC Chapter 7 Wireless and Mobile Networks Computer Networking: A Top Down Approach 7 th edition Jim Kurose, Keith Ross Pearson/Addison Wesley April 2016 7-1 Ch. 7: Background: # wireless

More information

Data Communication & Networks G Session 5 - Main Theme Wireless Networks. Dr. Jean-Claude Franchitti

Data Communication & Networks G Session 5 - Main Theme Wireless Networks. Dr. Jean-Claude Franchitti Data Communication & Networks G22.2262-001 Session 5 - Main Theme Wireless Networks Dr. Jean-Claude Franchitti New York University Computer Science Department Courant Institute of Mathematical Sciences

More information

Shared Access Networks Wireless. 1/27/14 CS mywireless 1

Shared Access Networks Wireless. 1/27/14 CS mywireless 1 Shared Access Networks Wireless 1 Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers (5-to-1)! # wireless Internet-connected devices equals

More information

Mohammad Hossein Manshaei 1393

Mohammad Hossein Manshaei 1393 Mohammad Hossein Manshaei manshaei@gmail.com 1393 Wireless Links, WiFi, Cellular Internet Access, and Mobility Slides derived from those available on the Web site of the book Computer Networking, by Kurose

More information

Last Lecture: Data Link Layer

Last Lecture: Data Link Layer Last Lecture: Data Link Layer 1. Design goals and issues 2. (More on) Error Control and Detection 3. Multiple Access Control (MAC) 4. Ethernet, LAN Addresses and ARP 5. Hubs, Bridges, Switches 6. Wireless

More information

CSC 4900 Computer Networks: Wireless Networks

CSC 4900 Computer Networks: Wireless Networks CSC 4900 Computer Networks: Wireless Networks Professor Henry Carter Fall 2017 Last Time Mobile applications are taking off! What about current platforms is fueling this? How are an application s permission

More information

Security+ SY0-501 Study Guide Table of Contents

Security+ SY0-501 Study Guide Table of Contents Security+ SY0-501 Study Guide Table of Contents Course Introduction Table of Contents About This Course About CompTIA Certifications Module 1 / Threats, Attacks, and Vulnerabilities Module 1 / Unit 1 Indicators

More information

CPSC 826 Internetworking. Wireless and Mobile Networks. Wireless Networks Wireless Hosts

CPSC 826 Internetworking. Wireless and Mobile Networks. Wireless Networks Wireless Hosts 1 CPSC 826 Intering Wireless and Mobile Networks Michele Weigle Department of Computer Science Clemson University mweigle@cs.clemson.edu November 29, 200 Wireless and Mobile Networks Background Number

More information

VoIP. ALLPPT.com _ Free PowerPoint Templates, Diagrams and Charts

VoIP. ALLPPT.com _ Free PowerPoint Templates, Diagrams and Charts VoIP ALLPPT.com _ Free PowerPoint Templates, Diagrams and Charts VoIP System Gatekeeper: A gatekeeper is useful for handling VoIP call connections includes managing terminals, gateways and MCU's (multipoint

More information

Network+ Guide to Networks 6th Edition. Chapter 12 Voice and Video Over IP

Network+ Guide to Networks 6th Edition. Chapter 12 Voice and Video Over IP Network+ Guide to Networks 6th Edition Chapter 12 Voice and Video Over IP Objectives Use terminology specific to converged networks Explain VoIP (Voice over IP) services, PBXs, and their user interfaces

More information

Wireless and Mobile Networks

Wireless and Mobile Networks Wireless and Mobile Networks Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@wustl.edu Audio/Video recordings of this lecture are available on-line at: http://www.cse.wustl.edu/~jain/cse473-11/

More information

CS 332 Computer Networks Wireless Networks

CS 332 Computer Networks Wireless Networks CS 332 Computer Networks Wireless Networks Professor Szajda Chapter 6: Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers! computer nets:

More information

Chapter 6 Wireless and Mobile Networks

Chapter 6 Wireless and Mobile Networks Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross Addison-Wesley, July 2004. 6: Wireless and Mobile Networks 6

More information

Multimedia: video ... frame i+1

Multimedia: video ... frame i+1 Multimedia: video video: sequence of images displayed at constant rate e.g. 24 images/sec digital image: array of pixels each pixel represented by bits coding: use redundancy within and between images

More information

ETSF10 Internet Protocols Transport Layer Protocols

ETSF10 Internet Protocols Transport Layer Protocols ETSF10 Internet Protocols Transport Layer Protocols 2012, Part 2, Lecture 2.2 Kaan Bür, Jens Andersson Transport Layer Protocols Special Topic: Quality of Service (QoS) [ed.4 ch.24.1+5-6] [ed.5 ch.30.1-2]

More information

CSC 4900 Computer Networks: Multimedia Applications

CSC 4900 Computer Networks: Multimedia Applications CSC 4900 Computer Networks: Multimedia Applications Professor Henry Carter Fall 2017 Last Time What is a VPN? What technology/protocol suite is generally used to implement them? How much protection does

More information

Module 6: Wireless Mobile Networks

Module 6: Wireless Mobile Networks Module 6: Wireless Mobile Networks SMD123 Computer Communications Kaustubh Phanse Department of Computer Science and Electrical Engineering Luleå University of Technology Lecture Objectives Wireless links

More information

Week-12 (Multimedia Networking)

Week-12 (Multimedia Networking) Computer Networks and Applications COMP 3331/COMP 9331 Week-12 (Multimedia Networking) 1 Multimedia: audio analog audio signal sampled at constant rate telephone: 8,000 samples/sec CD music: 44,100 samples/sec

More information

COMP 3331/9331: Computer Networks and Applications

COMP 3331/9331: Computer Networks and Applications COMP 3331/9331: Computer Networks and Applications Week 10 Wireless Networks Reading Guide: Chapter 6: 6.1 6.3 Wireless Networks + Security 1 Wireless and Mobile Networks Background: # wireless (mobile)

More information

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless CSCD 433 Network Programming Fall 2016 Lecture 7 Ethernet and Wireless 802.11 1 Topics 802 Standard MAC and LLC Sublayers Review of MAC in Ethernet MAC in 802.11 Wireless 2 IEEE Standards In 1985, Computer

More information

Multimedia! 23/03/18. Part 3: Lecture 3! Content and multimedia! Internet traffic!

Multimedia! 23/03/18. Part 3: Lecture 3! Content and multimedia! Internet traffic! Part 3: Lecture 3 Content and multimedia Internet traffic Multimedia How can multimedia be transmitted? Interactive/real-time Streaming 1 Voice over IP Interactive multimedia Voice and multimedia sessions

More information

Part 3: Lecture 3! Content and multimedia!

Part 3: Lecture 3! Content and multimedia! Part 3: Lecture 3! Content and multimedia! Internet traffic! Multimedia! How can multimedia be transmitted?! Interactive/real-time! Streaming! Interactive multimedia! Voice over IP! Voice and multimedia

More information

Mohammad Hossein Manshaei 1393

Mohammad Hossein Manshaei 1393 Mohammad Hossein Manshaei manshaei@gmail.com 1393 Voice and Video over IP Slides derived from those available on the Web site of the book Computer Networking, by Kurose and Ross, PEARSON 2 multimedia applications:

More information

Kommunikationssysteme [KS]

Kommunikationssysteme [KS] Kommunikationssysteme [KS] Dr.-Ing. Falko Dressler Computer Networks and Communication Systems Department of Computer Sciences University of Erlangen-Nürnberg http://www7.informatik.uni-erlangen.de/~dressler/

More information

COMP 3331/9331: Computer Networks and Applications

COMP 3331/9331: Computer Networks and Applications COMP 3331/9331: Computer Networks and Applications Week 10 Reading Guide: Chapter 6: 6.1 6.4 1 Ch. 6: Wireless and Mobile Networks Background: v # wireless (mobile) phone subscribers now exceeds # wired

More information

CSCI-1680 Wireless Chen Avin

CSCI-1680 Wireless Chen Avin CSCI-1680 Wireless Chen Avin Based on slides from Computer Networking: A Top Down Approach - 6th edition Administrivia TCP is due on Friday Final Project is out (fun, two weeks) Wireless and Mobile Networks

More information

Chapter 6 Wireless and Mobile Networks. Chapter 6 outline. Chapter 6: Wireless and Mobile Networks. Elements of a wireless network.

Chapter 6 Wireless and Mobile Networks. Chapter 6 outline. Chapter 6: Wireless and Mobile Networks. Elements of a wireless network. Chapter 6 Wireless and obile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross Addison-Wesley, July 2004. Chapter 6: Wireless and obile Networks

More information

MULTIMEDIA I CSC 249 APRIL 26, Multimedia Classes of Applications Services Evolution of protocols

MULTIMEDIA I CSC 249 APRIL 26, Multimedia Classes of Applications Services Evolution of protocols MULTIMEDIA I CSC 249 APRIL 26, 2018 Multimedia Classes of Applications Services Evolution of protocols Streaming from web server Content distribution networks VoIP Real time streaming protocol 1 video

More information

Security and Lawful Intercept In VoIP Networks. Manohar Mahavadi Centillium Communications Inc. Fremont, California

Security and Lawful Intercept In VoIP Networks. Manohar Mahavadi Centillium Communications Inc. Fremont, California Security and Lawful Intercept In VoIP Networks Manohar Mahavadi Centillium Communications Inc. Fremont, California Agenda VoIP: Packet switched network VoIP devices VoIP protocols Security and issues in

More information

Home Area Networks. Outline

Home Area Networks. Outline Home Area Networks CS 687 University of Kentucky Fall 2015 Acknowledgment: Some slides are adapted from the slides distributed with the book Computer Networking: A Top Down Approach, 5th edition. Jim Kurose,

More information

Multiple Access Links and Protocols

Multiple Access Links and Protocols Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet

More information

This course prepares candidates for the CompTIA Network+ examination (2018 Objectives) N

This course prepares candidates for the CompTIA Network+ examination (2018 Objectives) N CompTIA Network+ (Exam N10-007) Course Description: CompTIA Network+ is the first certification IT professionals specializing in network administration and support should earn. Network+ is aimed at IT

More information

Content distribution networks

Content distribution networks Content distribution networks v challenge: how to stream content (selected from millions of videos) to hundreds of thousands of simultaneous users? v option 2: store/serve multiple copies of videos at

More information

Wireless Internet Routing. Review of Wireless Networking (with Routing in Mind)

Wireless Internet Routing. Review of Wireless Networking (with Routing in Mind) Wireless Internet Routing Review of Wireless Networking (with Routing in Mind) 1 Review of Wireless Networking Architecture of wireless networks Wireless PHY Wireless MAC o 802.11 PHY: physical layer /

More information

(Wireless) Internet Routing. Review of Wireless Networking (with Routing in Mind)

(Wireless) Internet Routing. Review of Wireless Networking (with Routing in Mind) (Wireless) Internet Routing Review of Wireless Networking (with Routing in Mind) 1 Review of Wireless Networking Architecture of wireless networks Wireless PHY Wireless MAC o 802.11 PHY: physical layer

More information

Multimedia Networking. Network Support for Multimedia Applications

Multimedia Networking. Network Support for Multimedia Applications Multimedia Networking Network Support for Multimedia Applications Protocols for Real Time Interactive Applications Differentiated Services (DiffServ) Per Connection Quality of Services Guarantees (IntServ)

More information

Chapter 9. Multimedia Networking. Computer Networking: A Top Down Approach

Chapter 9. Multimedia Networking. Computer Networking: A Top Down Approach Chapter 9 Multimedia Networking A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations;

More information

Lecture 16: QoS and "

Lecture 16: QoS and Lecture 16: QoS and 802.11" CSE 123: Computer Networks Alex C. Snoeren HW 4 due now! Lecture 16 Overview" Network-wide QoS IntServ DifServ 802.11 Wireless CSMA/CA Hidden Terminals RTS/CTS CSE 123 Lecture

More information

Network+ Guide to Networks, Seventh Edition Chapter 9, Solutions

Network+ Guide to Networks, Seventh Edition Chapter 9, Solutions Network+ Guide to Networks, Seventh Edition Chapter 9, Solutions Review Questions 1. What federal organization sets strict standards to protect the privacy of patient records? A. CALEA B. HIPAA C. PCI

More information

Course overview. CompTIA Security+ Certification (Exam SY0-501) Study Guide (G635eng v107)

Course overview. CompTIA Security+ Certification (Exam SY0-501) Study Guide (G635eng v107) Overview This course is intended for those wishing to qualify with CompTIA Security+. CompTIA's Security+ Certification is a foundation-level certificate designed for IT administrators with 2 years' experience

More information

CompTIA Network+ Study Guide Table of Contents

CompTIA Network+ Study Guide Table of Contents CompTIA Network+ Study Guide Table of Contents Course Introduction Table of Contents Getting Started About This Course About CompTIA Certifications Module 1 / Local Area Networks Module 1 / Unit 1 Topologies

More information

Multimedia Applications. Classification of Applications. Transport and Network Layer

Multimedia Applications. Classification of Applications. Transport and Network Layer Chapter 2: Representation of Multimedia Data Chapter 3: Multimedia Systems Communication Aspects and Services Multimedia Applications and Communication Protocols Quality of Service and Resource Management

More information

Data Communications. Data Link Layer Protocols Wireless LANs

Data Communications. Data Link Layer Protocols Wireless LANs Data Communications Data Link Layer Protocols Wireless LANs Wireless Networks Several different types of communications networks are using unguided media. These networks are generally referred to as wireless

More information

Multimedia Networking

Multimedia Networking Multimedia Networking #2 Multimedia Networking Semester Ganjil 2012 PTIIK Universitas Brawijaya #2 Multimedia Applications 1 Schedule of Class Meeting 1. Introduction 2. Applications of MN 3. Requirements

More information

Allstream NGNSIP Security Recommendations

Allstream NGNSIP Security Recommendations Allstream NGN SIP Trunking Quick Start Guide We are confident that our service will help increase your organization s performance and productivity while keeping a cap on your costs. Summarized below is

More information

Chapter 11: It s a Network. Introduction to Networking

Chapter 11: It s a Network. Introduction to Networking Chapter 11: It s a Network Introduction to Networking Small Network Topologies Typical Small Network Topology IT Essentials v5.0 2 Device Selection for a Small Network Factors to be considered when selecting

More information

IEEE WLANs (WiFi) Part II/III System Overview and MAC Layer

IEEE WLANs (WiFi) Part II/III System Overview and MAC Layer IEEE 802.11 WLANs (WiFi) Part II/III System Overview and MAC Layer Design goals for wireless LANs (WLANs) Global, seamless operation Low power for battery use No special permissions or licenses needed

More information

Data Link Protocols. TCP/IP Suite and OSI Reference Model. The TCP/IP protocol stack does not define the lower layers of a complete protocol stack

Data Link Protocols. TCP/IP Suite and OSI Reference Model. The TCP/IP protocol stack does not define the lower layers of a complete protocol stack Data Link Protocols TCP/IP Suite and OSI Reference Model The TCP/IP protocol stack does not define the lower layers of a complete protocol stack In this lecture, we will address how the TCP/IP protocol

More information

Video Streaming and Media Session Protocols

Video Streaming and Media Session Protocols Video Streaming and Media Session Protocols 1 Streaming Stored Multimedia Stored media streaming File containing digitized audio / video Stored at source Transmitted to client Streaming Client playout

More information

Chapter 11: Networks

Chapter 11: Networks Chapter 11: Networks Devices in a Small Network Small Network A small network can comprise a few users, one router, one switch. A Typical Small Network Topology looks like this: Device Selection Factors

More information

MAC in /20/06

MAC in /20/06 MAC in 802.11 2/20/06 MAC Multiple users share common medium. Important issues: Collision detection Delay Fairness Hidden terminals Synchronization Power management Roaming Use 802.11 as an example to

More information

TestOut Network Pro - English 4.1.x COURSE OUTLINE. Modified

TestOut Network Pro - English 4.1.x COURSE OUTLINE. Modified TestOut Network Pro - English 4.1.x COURSE OUTLINE Modified 2017-07-06 TestOut Network Pro Outline - English 4.1.x Videos: 141 (18:42:14) Demonstrations: 81 (10:38:59) Simulations: 92 Fact Sheets: 145

More information

Extending or Interconnecting LANS. Physical LAN segment. Virtual LAN. Forwarding Algorithm 11/9/15. segments. VLAN2, Port3. VLAN1, Port1.

Extending or Interconnecting LANS. Physical LAN segment. Virtual LAN. Forwarding Algorithm 11/9/15. segments. VLAN2, Port3. VLAN1, Port1. Physical LAN segment q Hosts connected on the same physical LAN segment q Same subnet; L2 forwarding q ARP (IPè MAC) L2 frame (S, D), send q Scale? Extending or Interconnecting LANS q q q Why not just

More information

Computer Communication III

Computer Communication III Computer Communication III Wireless Media Access IEEE 802.11 Wireless LAN Advantages of Wireless LANs Using the license free ISM band at 2.4 GHz no complicated or expensive licenses necessary very cost

More information

TSIN02 - Internetworking

TSIN02 - Internetworking Lecture 8: SIP and H323 Litterature: 2004 Image Coding Group, Linköpings Universitet Lecture 8: SIP and H323 Goals: After this lecture you should Understand the basics of SIP and it's architecture Understand

More information

Transporting Voice by Using IP

Transporting Voice by Using IP Transporting Voice by Using IP National Chi Nan University Quincy Wu Email: solomon@ipv6.club.tw 1 Outline Introduction Voice over IP RTP & SIP Conclusion 2 Digital Circuit Technology Developed by telephone

More information

CSC 401 Data and Computer Communications Networks

CSC 401 Data and Computer Communications Networks CSC 401 Data and Computer Communications Networks Application Layer Video Streaming, CDN and Sockets Sec 2.6 2.7 Prof. Lina Battestilli Fall 2017 Outline Application Layer (ch 2) 2.1 principles of network

More information

Monitoring the Cisco Unified IP Phone Remotely

Monitoring the Cisco Unified IP Phone Remotely CHAPTER 8 Each Cisco Unified IP Phone has a web page from which you can view a variety of information about the phone, including: Device information Network configuration information Network statistics

More information

To access the web page for Cisco Desktop Collaboration Experience, perform these steps.

To access the web page for Cisco Desktop Collaboration Experience, perform these steps. Access Web Page for Cisco Desktop Collaboration, page 1 Enable and Disable Web Page Access, page 2 Device Information, page 3 Network Setup, page 4 Network Statistics, page 9 Device Logs, page 12 Streaming

More information

M06:Wireless and Mobile Networks. Corinna Schmitt

M06:Wireless and Mobile Networks. Corinna Schmitt M06:Wireless and Mobile Networks Corinna Schmitt corinna.schmitt@unibas.ch Acknowledgement 2016 M06 2 Background q # wireless (mobile) phone subscribers now exceeds # wired phone subscribers (5-to-1)!

More information

Summary of last time " " "

Summary of last time   Summary of last time " " " Part 1: Lecture 3 Beyond TCP TCP congestion control Slow start Congestion avoidance. TCP options Window scale SACKS Colloquia: Multipath TCP Further improvements on congestion

More information

Multimedia Networking

Multimedia Networking CMPT765/408 08-1 Multimedia Networking 1 Overview Multimedia Networking The note is mainly based on Chapter 7, Computer Networking, A Top-Down Approach Featuring the Internet (4th edition), by J.F. Kurose

More information

AP500 4-Port FXS VoIP Gateway

AP500 4-Port FXS VoIP Gateway AP500 4-Port FXS VoIP Gateway High Performance VoIP Gateway Solution Product Overview www.addpac.com AddPac Technology Sales and Marketing Contents Product Overview Hardware Specification APOS Technology

More information

CIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 8

CIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 8 CIS 551 / TCOM 401 Computer and Network Security Spring 2007 Lecture 8 Announcements Reminder: Project 1 is due on tonight by midnight. Midterm 1 will be held next Thursday, Feb. 8th. Example midterms

More information

Section 3 - Configuration. Enable Auto Channel Scan:

Section 3 - Configuration. Enable Auto Channel Scan: Enable Auto Channel Scan: Wireless Channel: The Auto Channel Scan setting can be selected to allow the DGL-4500 to choose the channel with the least amount of interference. Indicates the channel setting

More information

Configuring the Wireless Parameters (CPE and WBS)

Configuring the Wireless Parameters (CPE and WBS) Configuring the Wireless Parameters (CPE and WBS) CHAPTERS 1. Configure Basic Wireless Parameters 2. Configure Wireless Client Parameters 3. Configure Wireless AP Parameters 4. Configure Multi-SSID 5.

More information

PowerStation2 LiteStation2 LiteStation5 User s Guide

PowerStation2 LiteStation2 LiteStation5 User s Guide PowerStation2 LiteStation2 LiteStation5 User s Guide Copyright 2007 Ubiquiti Networks Inc. All rights reserved. Contents INTRODUCTION...2 QUICK SETUP GUIDE...3 CONFIGURATION GUIDE...7 Main Settings...8

More information

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point Chapter 6 outline 6.1 Introduction Wireless 6.2 Wireless links, characteristics CDMA 6.3 IEEE 802.11 wireless LANs ( wi-fi ) 6.4 Cellular Internet Access architecture standards (e.g., GSM) Mobility 6.5

More information

Statistics Available on the Phone, page 1 Statistics Available from the Phone Web Pages, page 8

Statistics Available on the Phone, page 1 Statistics Available from the Phone Web Pages, page 8 Statistics Available on the Phone, page 1 Statistics Available from the Phone Web Pages, page 8 Statistics Available on the Phone You can see statistics and information about the phone from the Settings

More information

Wireless Router at Home

Wireless Router at Home Wireless Router at Home 192.168.1.2 192.168.1.1 Modem 192.168.1.3 120.6.46.15 telephone line to ISP 192.168.1.4 Internet connection with public IP internal LAN with private IPs 192.168.1.5 Wireless All-in-one

More information

Elements of a wireless network. Elements of a wireless network. Some wireless link standards. Elements of a wireless network

Elements of a wireless network. Elements of a wireless network. Some wireless link standards. Elements of a wireless network Elements of a wireless Elements of a wireless wireless hosts laptop, D, I phone run applications may be stationary (non-mobile) or mobile wireless does not always mean mobility base station typically connected

More information

CTS2134 Introduction to Networking. Module 09: Network Management

CTS2134 Introduction to Networking. Module 09: Network Management CTS2134 Introduction to Networking Module 09: Network Management Documentation Facts Good documentation: Ensures that users can find the information they need when making decisions or troubleshooting problems

More information

TestOut Network Pro - English 5.0.x COURSE OUTLINE. Modified

TestOut Network Pro - English 5.0.x COURSE OUTLINE. Modified TestOut Network Pro - English 5.0.x COURSE OUTLINE Modified 2018-03-06 TestOut Network Pro Outline - English 5.0.x Videos: 130 (17:10:31) Demonstrations: 78 (8:46:15) Simulations: 88 Fact Sheets: 136 Exams:

More information

802.11a g Dual Band Wireless Access Point. User s Manual

802.11a g Dual Band Wireless Access Point. User s Manual 802.11a+802.11g Dual Band Wireless Access Point User s Manual 0 Chapter 1 Introduction 1.1 Feature Fully interoperable with IEEE 802.11b compliant products. High-Speed data transfer rate up to 11Mbps.

More information

Elements of a wireless network. Elements of a wireless network. Characteristics of selected wireless link standards. Elements of a wireless network

Elements of a wireless network. Elements of a wireless network. Characteristics of selected wireless link standards. Elements of a wireless network wireless hosts laptop, D, I phone run applications may be stationary (non-mobile) or mobile wireless does not always mean mobility base station typically connected to wired relay - responsible for sending

More information

Chapter 6 Wireless and Mobile Networks. Chapter 6 outline. Chapter 6: Wireless and Mobile Networks. Elements of a wireless network

Chapter 6 Wireless and Mobile Networks. Chapter 6 outline. Chapter 6: Wireless and Mobile Networks. Elements of a wireless network Chapter 6 Wireless and Mobile Networks Computer Networking: Top Down pproach 5 th edition. Jim Kurose, Keith Ross ddison-wesley, pril 009. Chapter 6: Wireless and Mobile Networks ackground: # wireless

More information

Computer Networks. Wenzhong Li. Nanjing University

Computer Networks. Wenzhong Li. Nanjing University Computer Networks Wenzhong Li Nanjing University 1 Chapter 5. End-to-End Protocols Transport Services and Mechanisms User Datagram Protocol (UDP) Transmission Control Protocol (TCP) TCP Congestion Control

More information

Name Student ID Department/Year. Final Examination. Introduction to Computer Networks Class#: Fall :20-11:00 Tuesday January 13, 2004

Name Student ID Department/Year. Final Examination. Introduction to Computer Networks Class#: Fall :20-11:00 Tuesday January 13, 2004 Final Examination Introduction to Computer Networks Class#: 901 31110 Fall 2003 9:20-11:00 Tuesday January 13, 2004 Prohibited 1. You are not allowed to write down the answers using pencils. Use only black-

More information

Voice over IP (VoIP)

Voice over IP (VoIP) Voice over IP (VoIP) David Wang, Ph.D. UT Arlington 1 Purposes of this Lecture To present an overview of Voice over IP To use VoIP as an example To review what we have learned so far To use what we have

More information

Last time?! MPLS! Label distribution protocols! Multi Protocol Label Switching! Layer 2.5 protocol! LDP! RSVP!

Last time?! MPLS! Label distribution protocols! Multi Protocol Label Switching! Layer 2.5 protocol! LDP! RSVP! Part2: SDNs Last time? MPLS Multi Protocol Label Switching Layer 2.5 protocol Label distribution protocols LDP RSVP Per router control plane Individual routing algorithm components in each and every router

More information

CS118 Discussion 1A, Week 9. Zengwen Yuan Dodd Hall 78, Friday 10:00 11:50 a.m.

CS118 Discussion 1A, Week 9. Zengwen Yuan Dodd Hall 78, Friday 10:00 11:50 a.m. CS118 Discussion 1A, Week 9 Zengwen Yuan Dodd Hall 78, Friday 10:00 11:50 a.m. 1 Outline Wireless: 802.11 Mobile IP Cellular Networks: LTE Sample final 2 Wireless and Mobile Network Wireless access: WIFI

More information

Security SSID Selection: Broadcast SSID:

Security SSID Selection: Broadcast SSID: 69 Security SSID Selection: Broadcast SSID: WMM: Encryption: Select the SSID that the security settings will apply to. If Disabled, then the device will not be broadcasting the SSID. Therefore it will

More information

Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin,

Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin, Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin, ydlin@cs.nctu.edu.tw Chapter 1: Introduction 1. How does Internet scale to billions of hosts? (Describe what structure

More information

A common issue that affects the QoS of packetized audio is jitter. Voice data requires a constant packet interarrival rate at receivers to convert

A common issue that affects the QoS of packetized audio is jitter. Voice data requires a constant packet interarrival rate at receivers to convert A common issue that affects the QoS of packetized audio is jitter. Voice data requires a constant packet interarrival rate at receivers to convert data into a proper analog signal for playback. The variations

More information

Link Layer. 5.1 Introduction and services 5.2 Error detection and correction 5.3Multiple access protocols 5.4 Link-Layer Addressing 5.

Link Layer. 5.1 Introduction and services 5.2 Error detection and correction 5.3Multiple access protocols 5.4 Link-Layer Addressing 5. Link Layer 5.1 Introduction and services 5.2 Error detection and correction 5.3Multiple access protocols 5.4 Link-Layer Addressing 5.5 Ethernet 5.6 Link-layer switches 5.7 PPP 5.8 Link Virtualization:

More information

Mohammad Hossein Manshaei 1393

Mohammad Hossein Manshaei 1393 Mohammad Hossein Manshaei manshaei@gmail.com 1393 Voice and Video over IP Slides derived from those available on the Web site of the book Computer Networking, by Kurose and Ross, PEARSON 2 Multimedia networking:

More information

Study Guide. Module Two

Study Guide. Module Two Module Two Study Guide Study Guide Contents Part One -- Textbook Questions Part Two -- Assignment Questions Part Three -- Vocabulary Chapter 4 Data Link Layer What is the function of the data link layer?

More information

4 rd class Department of Network College of IT- University of Babylon

4 rd class Department of Network College of IT- University of Babylon 1. INTRODUCTION We can divide audio and video services into three broad categories: streaming stored audio/video, streaming live audio/video, and interactive audio/video. Streaming means a user can listen

More information

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross ( 6th ed.); , Kurose and Ross (7th ed.

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross ( 6th ed.); , Kurose and Ross (7th ed. Wireless Networks CSE 3461: Introduction to Computer Networking Reading: 6.1 6.3, Kurose and Ross ( 6th ed.); 7.1 7.3, Kurose and Ross (7th ed.) 1 Questions How do you use wireless network technology in

More information

Internetwork Expert s CCNP Bootcamp. Wireless LANs. WLANs replace Physical (layer 1) and Data Link (layer 2) transports with wireless

Internetwork Expert s CCNP Bootcamp. Wireless LANs. WLANs replace Physical (layer 1) and Data Link (layer 2) transports with wireless Internetwork Expert s CCNP Bootcamp Wireless LANs http:// WLANs Overview WLANs replace Physical (layer 1) and Data Link (layer 2) transports with wireless Upper layer protocols like IP/TCP/UDP/etc. are

More information

Real-time Services BUPT/QMUL

Real-time Services BUPT/QMUL Real-time Services BUPT/QMUL 2017-05-27 Agenda Real-time services over Internet Real-time transport protocols RTP (Real-time Transport Protocol) RTCP (RTP Control Protocol) Multimedia signaling protocols

More information

Multimedia networking: outline

Multimedia networking: outline Multimedia networking: outline 7.1 multimedia networking applications 7.2 streaming stored video 7.3 voice-over-ip 7.4 protocols for real-time conversational applications: RTP, SIP 7.5 network support

More information

Wireless LANs. ITS 413 Internet Technologies and Applications

Wireless LANs. ITS 413 Internet Technologies and Applications Wireless LANs ITS 413 Internet Technologies and Applications Aim: Aim and Contents Understand how IEEE 802.11 wireless LANs work Understand what influences the performance of wireless LANs Contents: IEEE

More information

Introduction to Quality of Service

Introduction to Quality of Service Introduction to Quality of Service The use of IP as a foundation for converged networks has raised several issues for both enterprise IT departments and ISPs. IP and Ethernet are connectionless technologies

More information

Mobile and Sensor Systems

Mobile and Sensor Systems Mobile and Sensor Systems Lecture 2: Mobile Medium Access Control Protocols and Wireless Systems Dr Cecilia Mascolo In this lecture We will describe medium access control protocols and wireless systems

More information

Networking Applications

Networking Applications Networking Dr. Ayman A. Abdel-Hamid College of Computing and Information Technology Arab Academy for Science & Technology and Maritime Transport Multimedia Multimedia 1 Outline Audio and Video Services

More information

Department of Electrical and Computer Systems Engineering

Department of Electrical and Computer Systems Engineering Department of Electrical and Computer Systems Engineering Technical Report MECSE-6-2006 Medium Access Control (MAC) Schemes for Quality of Service (QoS) provision of Voice over Internet Protocol (VoIP)

More information