NCS315/TEL550 Networking of Information Systems & Advanced Networking Standards & Protocols. Ronny L. Bull, MS Lecturer Computer Science Department
|
|
- Edgar Baker
- 5 years ago
- Views:
Transcription
1 NCS315/TEL550 Networking of Information Systems & Advanced Networking Standards & Protocols Ronny L. Bull, MS Lecturer Computer Science Department Spring 2014
2 Wireless Review 2 types of networks Infrastructure Ad-Hoc What are the characteristics of each? Why would you use one over the other?
3 Wireless Review Hidden Terminal Problem C A B
4 Wireless Review Signal Attenuation A B C A s signal strength C s signal strength space
5 Wireless Review Basic Service Set Infrastructure mode: Contains wireless hosts and AP's Ad-Hoc mode: Hosts only
6 Wireless Review b 2.4GHz 2.485GHz Divided into 11 channels Channel set by AP admin Interference with other nearby AP's on same channel Solution: stagger channels!
7 Wireless Review Host must associate with AP Scans channels, listening for beacon frames Contain AP's name (SSID) and MAC Selects AP to associate with Authenticates if necessary Pull DHCP address (if configured)
8 BBS 1 BBS 2 BBS 1 BBS 2 AP AP 2 AP AP 2 H1 passive scanning: (1)beacon frames sent from APs (2)association Request frame sent: H1 to selected AP (3)association Response frame sent from selected AP to H1 H1 active scanning: (1) Probe Request frame broadcast from H1 (2) Probe Response frames sent from APs (3) Association Request frame sent: H1 to selected AP (4) Association Response frame sent from selected AP to H1 Wireless Review
9 Wireless Review CSMA/CA Sender Senses channel to see if idle Transmits entire frame If busy back off Start random timer If idle after timer expires transmit Else set new random timer
10 Wireless Review CSMA/CA Receiver Receives frame Sends ACK to sender Helps with hidden terminal problem
11 Wireless Review RTS (Request To Send) Sender transmits small RTS packet to reserve channel May collide with other RTS packets CTS (Clear To Send) BS broadcasts CTS in response to RTS Heard by all nodes
12 A AP B RTS(A) RTS(A) reservation collision CTS(A) CTS(A) DATA (A) defer time ACK(A) ACK(A) Wireless Review
13 frame control duration address 1 Wireless Review address 2 address 3 seq control address 4 payload CRC Address 1: MAC address of wireless host or AP to receive this frame Address 2: MAC address of wireless host or AP transmitting this frame Address 3: MAC address of router interface to which AP is attached Address 4: used only in ad hoc mode
14 Wireless Review duration of reserved transmission time (RTS/CTS) frame seq # (for RDT) frame control duration address 1 address 2 address 3 seq control address 4 payload CRC Protocol version Type Subtype To AP From AP More frag 1 1 Power Retry mgt More data WEP Rsvd frame type (RTS, CTS, ACK, data)
15 Wireless Review (Bluetooth) Less than 10m diameter Replacement for cables (mouse, keyboard) Ad-hoc Master/slaves GHz Up to 721 kbps
16 Multimedia Review audio signal amplitude quantization error quantized value of analog value analog signal sampling rate (N sample/sec) time
17 Multimedia Review If a sample of audio is taken from a stereo source at 44,100 samples per second for 1 hour what is the amount of disk space required to store the resulting file? Formula Samples per second * bits per sample * number of channels = total bps required for storage Total bps required / 8 = total bytes per second Total Bps required * 60 = total Bpm Total Bpm * 60 = total Bph Bph/1000 = KBph/1000 = MBph
18 Multimedia Review If a sample of audio is taken from a stereo source at 44,100 samples per second for 1 hour what is the amount of disk space required to store the resulting file? Using a resolution of 16 bits per sample 44,100 * 16 * 2 = 1,411,200 bits required per second 1,411,200/8 = bytes required per second * 60 = bytes required per minute
19 Multimedia Review * 60 = bytes required per hour /1000 = Kilobits per hour /1000 = Megabytes per hour To store 1 hour of stereo audio would take up Mb of disk space.
20 Multimedia Review Audio / Video applications Streaming: can begin playout before downloading entire file Stored (at server): Can transmit faster than audio/video will be rendered. Conversational Voice/video over IP Low delay requirement Live streaming
21 Cumulative data 1. video recorded (e.g., 30 frames/sec ) 2. video sent network delay (fixed in this example) 3. video received, played out at client (30 frames/sec) time streaming: at this time, client playing out early part of video, while server still sending later part of video Multimedia Review
22 Multimedia Review Once client playout begins, playback must match original timing Network delays are variable Jitter Latency Need client side buffer to match playout requirements
23 Cumulative data constant bit rate video transmission variable network delay client video reception buffered video constant bit rate video playout at client client playout delay time Multimedia Review
24 Amazon cloud upload copies of multiple versions of video to CDNs Akamai CDN Netflix registration, accounting servers 1 2. Bob browses Netflix video Manifest file returned for requested video Limelight CDN 1. Bob manages Netflix account 4. DASH streaming Level-3 CDN Multimedia Review
25 VoIP Review Terms you should be familiar with: Voice over IP Video over IP Convergence Codecs ATA IP-PBX Hosted PBX
26 VoIP Review More Terms IP Telephone Softphones Hardphones Video conferencing Video bridge Voice conferencing Voice bridge
27 VoIP Review H.323 H.323 terminal H.323 gateway H.323 gatekeeper MCU (multipoint control unit) H.323 zone
28 VoIP Review
29 VoIP Review H.225 and H.245 signaling protocols Operate at Session layer H.225 call or video conferencing signal H.245 ensures correct information type formatting H.323 standard Specifies protocol interoperability
30 VoIP Review SIP (Session Initiation Protocol) Similar to H.323 Modeled on HTTP (Clear text) Components User agent User agent client User agent server Registrar server Proxy server Redirect server
31 VoIP Review
32 VoIP Review RTP Application layer protocol Relies on UDP at transport layer Applies sequence numbers Destination packet assembly order Packet loss during transmission Assigns packet timestamp Receiving node Compensates for delay Signal sync
33 VoIP Review RTCP Provides quality feedback to participants Not mandatory on RTP networks RTP and RTCP Provide information about packet order, loss, delay Cannot correct transmission flaws
34 VoIP Review QoS (Quality of Service) Helps to prevent delays, disorder, and distortion RSVP & Diffserv
35 VoIP Review RSVP (Resource Reservation Protocol) Transport layer protocol Reserves network resources prior to transmission Creates path between sender & receiver Provides sufficient bandwidth Same path followed in reverse Two types of service Guaranteed service Controlled-load service
36 VoIP Review RSVP Emulates circuit-switched path Provides excellent QoS Drawback: high overhead Good for small networks Bad for large networks
37 VoIP Review DiffServ Prioritizes traffic Different streams can get different priorities Modifies actual datagram Accounts for all network traffic
38 VoIP Review EF (Expedited Forwarding) Data stream assigned minimum departure rate Circumvents delays AF (Assured Forwarding) Data streams assigned different router resource levels Prioritizes data handling No guarantee of on time, in sequence arrival
39 Network Security Review Terms you should know Security Assessment Posture assessment Hacker Cracker Vulnerability Exploit 0-day
40 Network Security Review Human Risks Social engineering Error Ignorance Omissions Easiest way to circumvent network security Take advantage of human error
41 Network Security Review What are some other risks associated with the security of a network? How can one find and exploit these? Where do most network security compromises occur from? What is a security policy? Why is it important? What does not belong in a security policy?
42 Network Security Review Physical security Secure network design ACL's IDS/IPS Firewalls DMZ Honeypots NIPS/HIPS Proxy Servers Network Scanners
43 Network Security Review Network Operating System Security What are some things we can do to lock it down? Login restrictions Password rules Group Policy Access restrictions
44 Network Security Review Encryption Symmetric Shared Key Asymmetric Private/Public Key Digital Certificates SSL SSH IPSec
45 Network Security Review Authentication Radius TACACUS+ PAP CHAP / MS-CHAP EAP (802.1x EAPoL) Kerberos
46 Network Security Review Wireless WEP WPA i (802.1x (EAPoL)
47 Integrity & Availability Review Terms Integrity Availability Uptime Malware Virus Trojan Polymorphism
48 Integrity & Availability Review Failures and faults How do we cope with them? Environment Heating and cooling Power Blackout Brownout Surge Noise
49 Integrity & Availability Review Redundancy Power Data RAID NAS/SAN Network Physical topology Service redundancy & load balancing DNS tricks Clustering Mirroring
50 Integrity & Availability Review Data backup Media types Incremental Full Differential Grandfather-Father-Son Disaster recovery planning Cold site Warm site Hot site
51 Network Management Review Documentation Topology Devices Configurations Changes! Baselining Policies, Proceedures & Regulations HIPPA CALEA FERPA
52 Network Management Review Network Monitoring SNMP MIB Alerts & Alarms Nagios & Cacti System and Event Logging Event Viewer Syslog & Journald
53 Network Management Review Traffic shaping Limiting Prioritization Delay less important traffic Base on protocol, IP, groups, etc.. Block traffic Caching DNS Web
54 Network Management Review Asset management Documentation Asset tracking Inventory Software/NOS changes Steps to update or upgrade Reversing changes Backleveling Physical network changes
55 Network Management Review DOCUMENT EVERYTHING!!!!!
56 Network Troubleshooting Review Is it broke? Is it plugged in? Is it turned on? Who touched it last? Point finger Fix it... fix it... fix it... fix it... NOW!!!!
57 Network Troubleshooting Review Troubleshooting steps Identify problem Establish theory of probable cause Test theory to determine cause Establish action plan Implement solution or escalate Verify full functionality Implement preventative measures Document findings, actions, and outcomes
58 Subnetting Review Practice questions from review sheets Look at for more practice questions
59 Other Tidbits Final exam will only cover material from after the midterm Review quizzes 5, 6&7 Final exam date Mon 5/5 12:45p 2:45p in A115 Online students must come to campus at that time or arrange for a proctor.
Multiple Access in Cellular and Systems
Multiple Access in Cellular and 802.11 Systems 1 GSM The total bandwidth is divided into many narrowband channels. (200 khz in GSM) Users are given time slots in a narrowband channel (8 users) A channel
More informationWireless and Mobile Networks 7-2
Wireless and Mobile Networks EECS3214 2018-03-26 7-1 Ch. 6: Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers (5-to-1)! # wireless Internet-connected
More informationWireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross
Wireless Networks CSE 3461: Introduction to Computer Networking Reading: 6.1 6.3, Kurose and Ross 1 Wireless Networks Background: Number of wireless (mobile) phone subscribers now exceeds number of wired
More informationTopic 2b Wireless MAC. Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach
Topic 2b Wireless MAC Chapter 7 Wireless and Mobile Networks Computer Networking: A Top Down Approach 7 th edition Jim Kurose, Keith Ross Pearson/Addison Wesley April 2016 7-1 Ch. 7: Background: # wireless
More informationData Communication & Networks G Session 5 - Main Theme Wireless Networks. Dr. Jean-Claude Franchitti
Data Communication & Networks G22.2262-001 Session 5 - Main Theme Wireless Networks Dr. Jean-Claude Franchitti New York University Computer Science Department Courant Institute of Mathematical Sciences
More informationShared Access Networks Wireless. 1/27/14 CS mywireless 1
Shared Access Networks Wireless 1 Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers (5-to-1)! # wireless Internet-connected devices equals
More informationMohammad Hossein Manshaei 1393
Mohammad Hossein Manshaei manshaei@gmail.com 1393 Wireless Links, WiFi, Cellular Internet Access, and Mobility Slides derived from those available on the Web site of the book Computer Networking, by Kurose
More informationLast Lecture: Data Link Layer
Last Lecture: Data Link Layer 1. Design goals and issues 2. (More on) Error Control and Detection 3. Multiple Access Control (MAC) 4. Ethernet, LAN Addresses and ARP 5. Hubs, Bridges, Switches 6. Wireless
More informationCSC 4900 Computer Networks: Wireless Networks
CSC 4900 Computer Networks: Wireless Networks Professor Henry Carter Fall 2017 Last Time Mobile applications are taking off! What about current platforms is fueling this? How are an application s permission
More informationSecurity+ SY0-501 Study Guide Table of Contents
Security+ SY0-501 Study Guide Table of Contents Course Introduction Table of Contents About This Course About CompTIA Certifications Module 1 / Threats, Attacks, and Vulnerabilities Module 1 / Unit 1 Indicators
More informationCPSC 826 Internetworking. Wireless and Mobile Networks. Wireless Networks Wireless Hosts
1 CPSC 826 Intering Wireless and Mobile Networks Michele Weigle Department of Computer Science Clemson University mweigle@cs.clemson.edu November 29, 200 Wireless and Mobile Networks Background Number
More informationVoIP. ALLPPT.com _ Free PowerPoint Templates, Diagrams and Charts
VoIP ALLPPT.com _ Free PowerPoint Templates, Diagrams and Charts VoIP System Gatekeeper: A gatekeeper is useful for handling VoIP call connections includes managing terminals, gateways and MCU's (multipoint
More informationNetwork+ Guide to Networks 6th Edition. Chapter 12 Voice and Video Over IP
Network+ Guide to Networks 6th Edition Chapter 12 Voice and Video Over IP Objectives Use terminology specific to converged networks Explain VoIP (Voice over IP) services, PBXs, and their user interfaces
More informationWireless and Mobile Networks
Wireless and Mobile Networks Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@wustl.edu Audio/Video recordings of this lecture are available on-line at: http://www.cse.wustl.edu/~jain/cse473-11/
More informationCS 332 Computer Networks Wireless Networks
CS 332 Computer Networks Wireless Networks Professor Szajda Chapter 6: Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers! computer nets:
More informationChapter 6 Wireless and Mobile Networks
Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross Addison-Wesley, July 2004. 6: Wireless and Mobile Networks 6
More informationMultimedia: video ... frame i+1
Multimedia: video video: sequence of images displayed at constant rate e.g. 24 images/sec digital image: array of pixels each pixel represented by bits coding: use redundancy within and between images
More informationETSF10 Internet Protocols Transport Layer Protocols
ETSF10 Internet Protocols Transport Layer Protocols 2012, Part 2, Lecture 2.2 Kaan Bür, Jens Andersson Transport Layer Protocols Special Topic: Quality of Service (QoS) [ed.4 ch.24.1+5-6] [ed.5 ch.30.1-2]
More informationCSC 4900 Computer Networks: Multimedia Applications
CSC 4900 Computer Networks: Multimedia Applications Professor Henry Carter Fall 2017 Last Time What is a VPN? What technology/protocol suite is generally used to implement them? How much protection does
More informationModule 6: Wireless Mobile Networks
Module 6: Wireless Mobile Networks SMD123 Computer Communications Kaustubh Phanse Department of Computer Science and Electrical Engineering Luleå University of Technology Lecture Objectives Wireless links
More informationWeek-12 (Multimedia Networking)
Computer Networks and Applications COMP 3331/COMP 9331 Week-12 (Multimedia Networking) 1 Multimedia: audio analog audio signal sampled at constant rate telephone: 8,000 samples/sec CD music: 44,100 samples/sec
More informationCOMP 3331/9331: Computer Networks and Applications
COMP 3331/9331: Computer Networks and Applications Week 10 Wireless Networks Reading Guide: Chapter 6: 6.1 6.3 Wireless Networks + Security 1 Wireless and Mobile Networks Background: # wireless (mobile)
More informationCSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless
CSCD 433 Network Programming Fall 2016 Lecture 7 Ethernet and Wireless 802.11 1 Topics 802 Standard MAC and LLC Sublayers Review of MAC in Ethernet MAC in 802.11 Wireless 2 IEEE Standards In 1985, Computer
More informationMultimedia! 23/03/18. Part 3: Lecture 3! Content and multimedia! Internet traffic!
Part 3: Lecture 3 Content and multimedia Internet traffic Multimedia How can multimedia be transmitted? Interactive/real-time Streaming 1 Voice over IP Interactive multimedia Voice and multimedia sessions
More informationPart 3: Lecture 3! Content and multimedia!
Part 3: Lecture 3! Content and multimedia! Internet traffic! Multimedia! How can multimedia be transmitted?! Interactive/real-time! Streaming! Interactive multimedia! Voice over IP! Voice and multimedia
More informationMohammad Hossein Manshaei 1393
Mohammad Hossein Manshaei manshaei@gmail.com 1393 Voice and Video over IP Slides derived from those available on the Web site of the book Computer Networking, by Kurose and Ross, PEARSON 2 multimedia applications:
More informationKommunikationssysteme [KS]
Kommunikationssysteme [KS] Dr.-Ing. Falko Dressler Computer Networks and Communication Systems Department of Computer Sciences University of Erlangen-Nürnberg http://www7.informatik.uni-erlangen.de/~dressler/
More informationCOMP 3331/9331: Computer Networks and Applications
COMP 3331/9331: Computer Networks and Applications Week 10 Reading Guide: Chapter 6: 6.1 6.4 1 Ch. 6: Wireless and Mobile Networks Background: v # wireless (mobile) phone subscribers now exceeds # wired
More informationCSCI-1680 Wireless Chen Avin
CSCI-1680 Wireless Chen Avin Based on slides from Computer Networking: A Top Down Approach - 6th edition Administrivia TCP is due on Friday Final Project is out (fun, two weeks) Wireless and Mobile Networks
More informationChapter 6 Wireless and Mobile Networks. Chapter 6 outline. Chapter 6: Wireless and Mobile Networks. Elements of a wireless network.
Chapter 6 Wireless and obile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross Addison-Wesley, July 2004. Chapter 6: Wireless and obile Networks
More informationMULTIMEDIA I CSC 249 APRIL 26, Multimedia Classes of Applications Services Evolution of protocols
MULTIMEDIA I CSC 249 APRIL 26, 2018 Multimedia Classes of Applications Services Evolution of protocols Streaming from web server Content distribution networks VoIP Real time streaming protocol 1 video
More informationSecurity and Lawful Intercept In VoIP Networks. Manohar Mahavadi Centillium Communications Inc. Fremont, California
Security and Lawful Intercept In VoIP Networks Manohar Mahavadi Centillium Communications Inc. Fremont, California Agenda VoIP: Packet switched network VoIP devices VoIP protocols Security and issues in
More informationHome Area Networks. Outline
Home Area Networks CS 687 University of Kentucky Fall 2015 Acknowledgment: Some slides are adapted from the slides distributed with the book Computer Networking: A Top Down Approach, 5th edition. Jim Kurose,
More informationMultiple Access Links and Protocols
Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet
More informationThis course prepares candidates for the CompTIA Network+ examination (2018 Objectives) N
CompTIA Network+ (Exam N10-007) Course Description: CompTIA Network+ is the first certification IT professionals specializing in network administration and support should earn. Network+ is aimed at IT
More informationContent distribution networks
Content distribution networks v challenge: how to stream content (selected from millions of videos) to hundreds of thousands of simultaneous users? v option 2: store/serve multiple copies of videos at
More informationWireless Internet Routing. Review of Wireless Networking (with Routing in Mind)
Wireless Internet Routing Review of Wireless Networking (with Routing in Mind) 1 Review of Wireless Networking Architecture of wireless networks Wireless PHY Wireless MAC o 802.11 PHY: physical layer /
More information(Wireless) Internet Routing. Review of Wireless Networking (with Routing in Mind)
(Wireless) Internet Routing Review of Wireless Networking (with Routing in Mind) 1 Review of Wireless Networking Architecture of wireless networks Wireless PHY Wireless MAC o 802.11 PHY: physical layer
More informationMultimedia Networking. Network Support for Multimedia Applications
Multimedia Networking Network Support for Multimedia Applications Protocols for Real Time Interactive Applications Differentiated Services (DiffServ) Per Connection Quality of Services Guarantees (IntServ)
More informationChapter 9. Multimedia Networking. Computer Networking: A Top Down Approach
Chapter 9 Multimedia Networking A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations;
More informationLecture 16: QoS and "
Lecture 16: QoS and 802.11" CSE 123: Computer Networks Alex C. Snoeren HW 4 due now! Lecture 16 Overview" Network-wide QoS IntServ DifServ 802.11 Wireless CSMA/CA Hidden Terminals RTS/CTS CSE 123 Lecture
More informationNetwork+ Guide to Networks, Seventh Edition Chapter 9, Solutions
Network+ Guide to Networks, Seventh Edition Chapter 9, Solutions Review Questions 1. What federal organization sets strict standards to protect the privacy of patient records? A. CALEA B. HIPAA C. PCI
More informationCourse overview. CompTIA Security+ Certification (Exam SY0-501) Study Guide (G635eng v107)
Overview This course is intended for those wishing to qualify with CompTIA Security+. CompTIA's Security+ Certification is a foundation-level certificate designed for IT administrators with 2 years' experience
More informationCompTIA Network+ Study Guide Table of Contents
CompTIA Network+ Study Guide Table of Contents Course Introduction Table of Contents Getting Started About This Course About CompTIA Certifications Module 1 / Local Area Networks Module 1 / Unit 1 Topologies
More informationMultimedia Applications. Classification of Applications. Transport and Network Layer
Chapter 2: Representation of Multimedia Data Chapter 3: Multimedia Systems Communication Aspects and Services Multimedia Applications and Communication Protocols Quality of Service and Resource Management
More informationData Communications. Data Link Layer Protocols Wireless LANs
Data Communications Data Link Layer Protocols Wireless LANs Wireless Networks Several different types of communications networks are using unguided media. These networks are generally referred to as wireless
More informationMultimedia Networking
Multimedia Networking #2 Multimedia Networking Semester Ganjil 2012 PTIIK Universitas Brawijaya #2 Multimedia Applications 1 Schedule of Class Meeting 1. Introduction 2. Applications of MN 3. Requirements
More informationAllstream NGNSIP Security Recommendations
Allstream NGN SIP Trunking Quick Start Guide We are confident that our service will help increase your organization s performance and productivity while keeping a cap on your costs. Summarized below is
More informationChapter 11: It s a Network. Introduction to Networking
Chapter 11: It s a Network Introduction to Networking Small Network Topologies Typical Small Network Topology IT Essentials v5.0 2 Device Selection for a Small Network Factors to be considered when selecting
More informationIEEE WLANs (WiFi) Part II/III System Overview and MAC Layer
IEEE 802.11 WLANs (WiFi) Part II/III System Overview and MAC Layer Design goals for wireless LANs (WLANs) Global, seamless operation Low power for battery use No special permissions or licenses needed
More informationData Link Protocols. TCP/IP Suite and OSI Reference Model. The TCP/IP protocol stack does not define the lower layers of a complete protocol stack
Data Link Protocols TCP/IP Suite and OSI Reference Model The TCP/IP protocol stack does not define the lower layers of a complete protocol stack In this lecture, we will address how the TCP/IP protocol
More informationVideo Streaming and Media Session Protocols
Video Streaming and Media Session Protocols 1 Streaming Stored Multimedia Stored media streaming File containing digitized audio / video Stored at source Transmitted to client Streaming Client playout
More informationChapter 11: Networks
Chapter 11: Networks Devices in a Small Network Small Network A small network can comprise a few users, one router, one switch. A Typical Small Network Topology looks like this: Device Selection Factors
More informationMAC in /20/06
MAC in 802.11 2/20/06 MAC Multiple users share common medium. Important issues: Collision detection Delay Fairness Hidden terminals Synchronization Power management Roaming Use 802.11 as an example to
More informationTestOut Network Pro - English 4.1.x COURSE OUTLINE. Modified
TestOut Network Pro - English 4.1.x COURSE OUTLINE Modified 2017-07-06 TestOut Network Pro Outline - English 4.1.x Videos: 141 (18:42:14) Demonstrations: 81 (10:38:59) Simulations: 92 Fact Sheets: 145
More informationExtending or Interconnecting LANS. Physical LAN segment. Virtual LAN. Forwarding Algorithm 11/9/15. segments. VLAN2, Port3. VLAN1, Port1.
Physical LAN segment q Hosts connected on the same physical LAN segment q Same subnet; L2 forwarding q ARP (IPè MAC) L2 frame (S, D), send q Scale? Extending or Interconnecting LANS q q q Why not just
More informationComputer Communication III
Computer Communication III Wireless Media Access IEEE 802.11 Wireless LAN Advantages of Wireless LANs Using the license free ISM band at 2.4 GHz no complicated or expensive licenses necessary very cost
More informationTSIN02 - Internetworking
Lecture 8: SIP and H323 Litterature: 2004 Image Coding Group, Linköpings Universitet Lecture 8: SIP and H323 Goals: After this lecture you should Understand the basics of SIP and it's architecture Understand
More informationTransporting Voice by Using IP
Transporting Voice by Using IP National Chi Nan University Quincy Wu Email: solomon@ipv6.club.tw 1 Outline Introduction Voice over IP RTP & SIP Conclusion 2 Digital Circuit Technology Developed by telephone
More informationCSC 401 Data and Computer Communications Networks
CSC 401 Data and Computer Communications Networks Application Layer Video Streaming, CDN and Sockets Sec 2.6 2.7 Prof. Lina Battestilli Fall 2017 Outline Application Layer (ch 2) 2.1 principles of network
More informationMonitoring the Cisco Unified IP Phone Remotely
CHAPTER 8 Each Cisco Unified IP Phone has a web page from which you can view a variety of information about the phone, including: Device information Network configuration information Network statistics
More informationTo access the web page for Cisco Desktop Collaboration Experience, perform these steps.
Access Web Page for Cisco Desktop Collaboration, page 1 Enable and Disable Web Page Access, page 2 Device Information, page 3 Network Setup, page 4 Network Statistics, page 9 Device Logs, page 12 Streaming
More informationM06:Wireless and Mobile Networks. Corinna Schmitt
M06:Wireless and Mobile Networks Corinna Schmitt corinna.schmitt@unibas.ch Acknowledgement 2016 M06 2 Background q # wireless (mobile) phone subscribers now exceeds # wired phone subscribers (5-to-1)!
More informationSummary of last time " " "
Summary of last time " " " Part 1: Lecture 3 Beyond TCP TCP congestion control Slow start Congestion avoidance. TCP options Window scale SACKS Colloquia: Multipath TCP Further improvements on congestion
More informationMultimedia Networking
CMPT765/408 08-1 Multimedia Networking 1 Overview Multimedia Networking The note is mainly based on Chapter 7, Computer Networking, A Top-Down Approach Featuring the Internet (4th edition), by J.F. Kurose
More informationAP500 4-Port FXS VoIP Gateway
AP500 4-Port FXS VoIP Gateway High Performance VoIP Gateway Solution Product Overview www.addpac.com AddPac Technology Sales and Marketing Contents Product Overview Hardware Specification APOS Technology
More informationCIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 8
CIS 551 / TCOM 401 Computer and Network Security Spring 2007 Lecture 8 Announcements Reminder: Project 1 is due on tonight by midnight. Midterm 1 will be held next Thursday, Feb. 8th. Example midterms
More informationSection 3 - Configuration. Enable Auto Channel Scan:
Enable Auto Channel Scan: Wireless Channel: The Auto Channel Scan setting can be selected to allow the DGL-4500 to choose the channel with the least amount of interference. Indicates the channel setting
More informationConfiguring the Wireless Parameters (CPE and WBS)
Configuring the Wireless Parameters (CPE and WBS) CHAPTERS 1. Configure Basic Wireless Parameters 2. Configure Wireless Client Parameters 3. Configure Wireless AP Parameters 4. Configure Multi-SSID 5.
More informationPowerStation2 LiteStation2 LiteStation5 User s Guide
PowerStation2 LiteStation2 LiteStation5 User s Guide Copyright 2007 Ubiquiti Networks Inc. All rights reserved. Contents INTRODUCTION...2 QUICK SETUP GUIDE...3 CONFIGURATION GUIDE...7 Main Settings...8
More information6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point
Chapter 6 outline 6.1 Introduction Wireless 6.2 Wireless links, characteristics CDMA 6.3 IEEE 802.11 wireless LANs ( wi-fi ) 6.4 Cellular Internet Access architecture standards (e.g., GSM) Mobility 6.5
More informationStatistics Available on the Phone, page 1 Statistics Available from the Phone Web Pages, page 8
Statistics Available on the Phone, page 1 Statistics Available from the Phone Web Pages, page 8 Statistics Available on the Phone You can see statistics and information about the phone from the Settings
More informationWireless Router at Home
Wireless Router at Home 192.168.1.2 192.168.1.1 Modem 192.168.1.3 120.6.46.15 telephone line to ISP 192.168.1.4 Internet connection with public IP internal LAN with private IPs 192.168.1.5 Wireless All-in-one
More informationElements of a wireless network. Elements of a wireless network. Some wireless link standards. Elements of a wireless network
Elements of a wireless Elements of a wireless wireless hosts laptop, D, I phone run applications may be stationary (non-mobile) or mobile wireless does not always mean mobility base station typically connected
More informationCTS2134 Introduction to Networking. Module 09: Network Management
CTS2134 Introduction to Networking Module 09: Network Management Documentation Facts Good documentation: Ensures that users can find the information they need when making decisions or troubleshooting problems
More informationTestOut Network Pro - English 5.0.x COURSE OUTLINE. Modified
TestOut Network Pro - English 5.0.x COURSE OUTLINE Modified 2018-03-06 TestOut Network Pro Outline - English 5.0.x Videos: 130 (17:10:31) Demonstrations: 78 (8:46:15) Simulations: 88 Fact Sheets: 136 Exams:
More information802.11a g Dual Band Wireless Access Point. User s Manual
802.11a+802.11g Dual Band Wireless Access Point User s Manual 0 Chapter 1 Introduction 1.1 Feature Fully interoperable with IEEE 802.11b compliant products. High-Speed data transfer rate up to 11Mbps.
More informationElements of a wireless network. Elements of a wireless network. Characteristics of selected wireless link standards. Elements of a wireless network
wireless hosts laptop, D, I phone run applications may be stationary (non-mobile) or mobile wireless does not always mean mobility base station typically connected to wired relay - responsible for sending
More informationChapter 6 Wireless and Mobile Networks. Chapter 6 outline. Chapter 6: Wireless and Mobile Networks. Elements of a wireless network
Chapter 6 Wireless and Mobile Networks Computer Networking: Top Down pproach 5 th edition. Jim Kurose, Keith Ross ddison-wesley, pril 009. Chapter 6: Wireless and Mobile Networks ackground: # wireless
More informationComputer Networks. Wenzhong Li. Nanjing University
Computer Networks Wenzhong Li Nanjing University 1 Chapter 5. End-to-End Protocols Transport Services and Mechanisms User Datagram Protocol (UDP) Transmission Control Protocol (TCP) TCP Congestion Control
More informationName Student ID Department/Year. Final Examination. Introduction to Computer Networks Class#: Fall :20-11:00 Tuesday January 13, 2004
Final Examination Introduction to Computer Networks Class#: 901 31110 Fall 2003 9:20-11:00 Tuesday January 13, 2004 Prohibited 1. You are not allowed to write down the answers using pencils. Use only black-
More informationVoice over IP (VoIP)
Voice over IP (VoIP) David Wang, Ph.D. UT Arlington 1 Purposes of this Lecture To present an overview of Voice over IP To use VoIP as an example To review what we have learned so far To use what we have
More informationLast time?! MPLS! Label distribution protocols! Multi Protocol Label Switching! Layer 2.5 protocol! LDP! RSVP!
Part2: SDNs Last time? MPLS Multi Protocol Label Switching Layer 2.5 protocol Label distribution protocols LDP RSVP Per router control plane Individual routing algorithm components in each and every router
More informationCS118 Discussion 1A, Week 9. Zengwen Yuan Dodd Hall 78, Friday 10:00 11:50 a.m.
CS118 Discussion 1A, Week 9 Zengwen Yuan Dodd Hall 78, Friday 10:00 11:50 a.m. 1 Outline Wireless: 802.11 Mobile IP Cellular Networks: LTE Sample final 2 Wireless and Mobile Network Wireless access: WIFI
More informationSecurity SSID Selection: Broadcast SSID:
69 Security SSID Selection: Broadcast SSID: WMM: Encryption: Select the SSID that the security settings will apply to. If Disabled, then the device will not be broadcasting the SSID. Therefore it will
More informationFundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin,
Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin, ydlin@cs.nctu.edu.tw Chapter 1: Introduction 1. How does Internet scale to billions of hosts? (Describe what structure
More informationA common issue that affects the QoS of packetized audio is jitter. Voice data requires a constant packet interarrival rate at receivers to convert
A common issue that affects the QoS of packetized audio is jitter. Voice data requires a constant packet interarrival rate at receivers to convert data into a proper analog signal for playback. The variations
More informationLink Layer. 5.1 Introduction and services 5.2 Error detection and correction 5.3Multiple access protocols 5.4 Link-Layer Addressing 5.
Link Layer 5.1 Introduction and services 5.2 Error detection and correction 5.3Multiple access protocols 5.4 Link-Layer Addressing 5.5 Ethernet 5.6 Link-layer switches 5.7 PPP 5.8 Link Virtualization:
More informationMohammad Hossein Manshaei 1393
Mohammad Hossein Manshaei manshaei@gmail.com 1393 Voice and Video over IP Slides derived from those available on the Web site of the book Computer Networking, by Kurose and Ross, PEARSON 2 Multimedia networking:
More informationStudy Guide. Module Two
Module Two Study Guide Study Guide Contents Part One -- Textbook Questions Part Two -- Assignment Questions Part Three -- Vocabulary Chapter 4 Data Link Layer What is the function of the data link layer?
More information4 rd class Department of Network College of IT- University of Babylon
1. INTRODUCTION We can divide audio and video services into three broad categories: streaming stored audio/video, streaming live audio/video, and interactive audio/video. Streaming means a user can listen
More informationWireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross ( 6th ed.); , Kurose and Ross (7th ed.
Wireless Networks CSE 3461: Introduction to Computer Networking Reading: 6.1 6.3, Kurose and Ross ( 6th ed.); 7.1 7.3, Kurose and Ross (7th ed.) 1 Questions How do you use wireless network technology in
More informationInternetwork Expert s CCNP Bootcamp. Wireless LANs. WLANs replace Physical (layer 1) and Data Link (layer 2) transports with wireless
Internetwork Expert s CCNP Bootcamp Wireless LANs http:// WLANs Overview WLANs replace Physical (layer 1) and Data Link (layer 2) transports with wireless Upper layer protocols like IP/TCP/UDP/etc. are
More informationReal-time Services BUPT/QMUL
Real-time Services BUPT/QMUL 2017-05-27 Agenda Real-time services over Internet Real-time transport protocols RTP (Real-time Transport Protocol) RTCP (RTP Control Protocol) Multimedia signaling protocols
More informationMultimedia networking: outline
Multimedia networking: outline 7.1 multimedia networking applications 7.2 streaming stored video 7.3 voice-over-ip 7.4 protocols for real-time conversational applications: RTP, SIP 7.5 network support
More informationWireless LANs. ITS 413 Internet Technologies and Applications
Wireless LANs ITS 413 Internet Technologies and Applications Aim: Aim and Contents Understand how IEEE 802.11 wireless LANs work Understand what influences the performance of wireless LANs Contents: IEEE
More informationIntroduction to Quality of Service
Introduction to Quality of Service The use of IP as a foundation for converged networks has raised several issues for both enterprise IT departments and ISPs. IP and Ethernet are connectionless technologies
More informationMobile and Sensor Systems
Mobile and Sensor Systems Lecture 2: Mobile Medium Access Control Protocols and Wireless Systems Dr Cecilia Mascolo In this lecture We will describe medium access control protocols and wireless systems
More informationNetworking Applications
Networking Dr. Ayman A. Abdel-Hamid College of Computing and Information Technology Arab Academy for Science & Technology and Maritime Transport Multimedia Multimedia 1 Outline Audio and Video Services
More informationDepartment of Electrical and Computer Systems Engineering
Department of Electrical and Computer Systems Engineering Technical Report MECSE-6-2006 Medium Access Control (MAC) Schemes for Quality of Service (QoS) provision of Voice over Internet Protocol (VoIP)
More information