Outline. A Professional Company in Software-Defined Networking (SDN) Copyright , EstiNet Technologies Inc. All Rights Reserved..
|
|
- Mitchell Wilcox
- 5 years ago
- Views:
Transcription
1 Physical Layer
2 Outline Signal Propagation Media The Calculation of Signal Delivery Time The Evaluation of End-to-end Delay Signal Encoding and Modulation Wired Signal s Encoding, Decoding and Decoding Error Wired Signal s Propagation Wireless Signal s Modulation, Demodulation and Demodulation Error Wireless Signal s Propagation Summary Copyright 2-28, EstiNet Technologies Inc. All Rights Reserved.. 2
3 Signal Propagation Media Copyright 2-28, EstiNet Technologies Inc. All Rights Reserved.. 3
4 Media for Delivering Signals Wired Media Copper wire for delivering electrical signal Optical fiber for delivering optical wave etc. Wireless Media Air for delivering electromagnetic wave Air for delivering optical wave etc. Copyright 2-28, EstiNet Technologies Inc. All Rights Reserved.. 4
5 The Calculation of Signal Delivery Time < Simulation Case > trans_time_and_prop_delay.xtpl trans_time_and_prop_delay_comparison.xtpl Copyright 2-28, EstiNet Technologies Inc. All Rights Reserved.. 5
6 Sending Host Transmission Time & Propagation Delay Receiving Host User Network Applications Network Applications User TCP / UDP TCP UDP Segment gram TCP UDP TCP / UDP Kernel v4 / v6 Packet v4 / v6 Kernel ARP Device Driver ARP Device Driver Hardware Network Interface Card (NIC) Network Interface Card (NIC) Hardware Tx Start Tx End T Bit T2 Rx Start Transmission Time = T2 T = T4 T3 Rx End Propagation Delay = T3 T = T4 T2 Delivery Time = Rx End Tx Start = T4 T = Transmission Time + Propagation Delay T3 T4 Copyright 2-28, EstiNet Technologies Inc. All Rights Reserved.. 6
7 Sending Host The Calculation of Transmission Time Receiving Host User Network Applications Network Applications User TCP / UDP TCP UDP Segment gram TCP UDP TCP / UDP Kernel v4 / v6 Packet v4 / v6 Kernel ARP Device Driver ARP Device Driver Hardware Network Interface Card (NIC) Network Interface Card (NIC) Hardware Tx Start Tx End T Bit T2 Sending Host s Interface Rate = X Mbps = (X * ^6) bps Size = Y bytes = (8 * Y) bits Transmission Time = T2 T = (8*Y)/(X * ^6) sec E.g., If X = and Y =, Transmission Time = (8*)/( * ^6) =.8 sec 7 Copyright 2-28, EstiNet Technologies Inc. All Rights Reserved..
8 Sending Host The Calculation of Propagation Delay Receiving Host User Network Applications Network Applications User TCP / UDP TCP UDP Segment gram TCP UDP TCP / UDP Kernel v4 / v6 Packet v4 / v6 Kernel ARP Device Driver ARP Device Driver Hardware Network Interface Card (NIC) Network Interface Card (NIC) Hardware Tx Start T Bit Rx Start T3 Signal Speed over the Medium = S meter/sec Distance between Sending Host and Receiving Host = D meters Propagation Delay = T3 T = D/S sec E.g., If S = (2 * ^8) and D = 2, Propagation Delay = (2)/(2 * ^8) =. sec Copyright 2-28, EstiNet Technologies Inc. All Rights Reserved.. 8
9 Transmission Time > Propagation Delay Sending Host Receiving Host User Network Applications Network Applications User TCP / UDP TCP / UDP Kernel v4 / v6 v4 / v6 Kernel ARP ARP Device Driver Device Driver Network Interface Card (NIC) Network Interface Card (NIC) Hardware Hardware Tx Start Rx Start Tx End T Rx End T3 T2 T4 Copyright 2-28, EstiNet Technologies Inc. All Rights Reserved.. 9
10 Sending Host Transmission Time < Propagation Delay Receiving Host User Network Applications Network Applications User TCP / UDP TCP UDP Segment gram TCP UDP TCP / UDP Kernel v4 / v6 Packet v4 / v6 Kernel ARP Device Driver ARP Device Driver Hardware Network Interface Card (NIC) Network Interface Card (NIC) Hardware Tx Start Tx End T Bit T2 Rx Start Rx End T3 T4 Copyright 2-28, EstiNet Technologies Inc. All Rights Reserved..
11 The Evaluation of End-to-end Delay < Simulation Case > end_to_end_delay.xtpl end_to_end_delay_trans_time_dominates.xtpl Copyright 2-28, EstiNet Technologies Inc. All Rights Reserved..
12 Sending Host End-to-end Delay A B Receiving Host User Network Applications Network Applications User TCP / UDP TCP UDP Segment gram TCP UDP TCP / UDP Kernel v4 / v6 Packet v4 / v6 Kernel ARP Device Driver ARP Device Driver Hardware Network Interface Card (NIC) Network Interface Card (NIC) Hardware Bit End-to-end Delay = Sending Host s Kernel/User Processing Delay (e.g., Protocol, Scheduling, Queuing, etc.) + Transmission Time + Propagation Delay + Receiving Host s Kernel/User Processing Delay (e.g., Protocol, Queuing, etc.) Round Trip Time (RTT) = End-to-end Delay from Host A to Host B + End-to-end Delay from Host B to Host A Copyright 2-28, EstiNet Technologies Inc. All Rights Reserved.. 2 2
13 Sending Host Transmission Time < Propagation Delay Receiving Host User Network Applications Network Applications User TCP / UDP TCP UDP Segment gram TCP UDP TCP / UDP Kernel v4 / v6 Packet v4 / v6 Kernel ARP Device Driver ARP Device Driver Hardware Network Interface Card (NIC) Network Interface Card (NIC) Hardware Tx Start Tx End T If ignoring kernel/user space processing delay and transmission time << propagation delay, propagation delay dominates end-to-end delay. Bit T2 Rx Start Rx End T3 T4 Copyright 2-28, EstiNet Technologies Inc. All Rights Reserved.. 3
14 Transmission Time > Propagation Delay Sending Host Receiving Host User Network Applications Network Applications User TCP / UDP TCP / UDP Kernel v4 / v6 v4 / v6 Kernel ARP ARP Device Driver Device Driver Network Interface Card (NIC) Network Interface Card (NIC) Hardware Hardware Tx Start Rx Start T Tx End If ignoring kernel/user space processing delay and transmission time >> propagation delay, transmission time dominates end-to-end delay. Rx End T3 T2 T4 4 Copyright 2-28, EstiNet Technologies Inc. All Rights Reserved..
15 End-to-end Delay across Other Network Devices Sending Host Router Receiving Host User Network Applications Network Applications User TCP / UDP TCP UDP Segment gram TCP UDP TCP / UDP Kernel v4 / v6 Packet v4 / v6 Kernel ARP Device Driver Plane ARP Device Driver Hardware Network Interface Card (NIC) ASIC ing Fabric & L3+ Function Network Interface Card (NIC) Hardware Bit End-to-end Delay from Sending Host to Receiving Host = Point-to-point Delay from Sending Host to Router + Router s Forwarding Delay + Point-to-point Delay from Router to Receiving Host Copyright 2-28, EstiNet Technologies Inc. All Rights Reserved.. 5
16 Think about different end-to-end delays in the following network VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM (VM) Internal Server (VM) Internal Server 2 (VM) Internal Server 3 (VM) Internal Server 4 (VM) Internal Server 5 (VM) Internal Server 6 (VM) Internal Server 7 (VM) Internal Server 8 Sensor 5G Cellular Network Core Sensor Backbone Router Backbone Router Backbone Router Mobile Communication ISP Backbone ISP Backbone ISP Backbone Camera Display AP Router Router SDN Router Router SDN SDN TOR Router SDN Controller Router ISP Edge Cloud Center SDN Cloud Center Router SDN Controller Router Router Router SDN Controller SDN SDN (VM) NAT (VM) NAT 2 (VM) Firewall Server 4 Server (VM) Firewall 2 Campus / Enterprise Sensor Sensor Sensor IoT SDN TOR Server Router Server 5 Server 6 SDN SDN Server 2 Server 3 Router ISP Gateway ISP Gateway ISP Gateway ISP Gateway AP AP AP AP AP AP AP TV AP TV TV TV AP AP AP AP TV TV TV TV TV TV TV TV Home Office / Shop Copyright 2-28, EstiNet Technologies Inc. All Rights Reserved.. 6
17 Signal Encoding and Modulation Copyright 2-28, EstiNet Technologies Inc. All Rights Reserved.. 7
18 Encoding and Decoding If some data (analog or digital) have to be transmitted in the form of digital signal, the data have to be encoded into digital signals at the sender site. At the receiver site, the received digital signals are decoded to retrieve the original data (analog or digital). Analog Encoding / Decoding Analog Digital Signal Digital Encoder Decoder Digital Copyright 2-28, EstiNet Technologies Inc. All Rights Reserved.. 8
19 Modulation & Demodulation If some data (analog or digital) have to be transmitted in the form of analog signal, the data have to be modulated into analog signals at the sender site. At the receiver site, the received analog signals are demodulated to retrieve the original data (analog or digital). Carrier Signal Modulation / Demodulation Analog Analog Analog Signal Digital Modulator Demodulator Digital Copyright 2-28, EstiNet Technologies Inc. All Rights Reserved.. 9
20 Wired Signal s Encoding, Decoding and Decoding Error Copyright 2-28, EstiNet Technologies Inc. All Rights Reserved.. 2
21 Wired Signal s Encoding and Decoding 2 3 Host Host 2 Encode digital data into digital signals Encode Encode Encode Decode digital signals into digital data Decode Decode Decode Copyright 2-28, EstiNet Technologies Inc. All Rights Reserved.. 2
22 Wired Signal s Decoding Error 2 3 Host Host 2 Encode digital data into digital signals Encode Encode Encode 4 This segment of digital signal is corrupted due to interference Decode digital signals into digital data Decode Decode Decode Copyright 2-28, EstiNet Technologies Inc. All Rights Reserved.. 22
23 How to check if the decoded data are corrupted? A frame is usually composed of header field, data payload field, and frame check sequence (FCS) field. The value filled in the FCS field is calculated by the Cyclic Redundancy Check (CRC) algorithm. The input data for the algorithm are the contents of header field and data payload field. Before a frame is transmitted at the sender site, a CRC value is calculated and filled in the FCS field. When the frame is received at the receiver site, another CRC calculation is done and the new CRC value is used to compare with the value of the FCS field. If the two values are different, the received data are considered corrupted. Sender Site Receiver Site Payload FCS Payload FCS CRC CRC =? Copyright 2-28, EstiNet Technologies Inc. All Rights Reserved.. 23
24 Wired Signal s Propagation < Simulation Case > pass_through_and_store_and_forward.xtpl wired_signal_collision.xtpl Copyright 2-28, EstiNet Technologies Inc. All Rights Reserved.. 24
25 When wired signals enter a network device like hub or repeater, the signals directly pass through the device without experiencing signal decoding. 2 Before signals enter the hub Signals are directly broadcasted to other ports Copyright 2-28, EstiNet Technologies Inc. All Rights Reserved.. 25
26 When wired signals enter a network device like switch or router, the signals have to experience signal decoding and the decoded data have to be stored and processed for determining the outgoing interface/port. Before signals enter the switch 2 Signals are received by the switch for finding out the destination 3 Signals are forwarded only to the port which the destination is connected to 26 Copyright 2-28, EstiNet Technologies Inc. All Rights Reserved..
27 Wired signals could collide with other signals while being transmitted on a wire. If, on a wire, only one direction is allowed to transmit signals simultaneously, it is called half duplex. If signals are transmitted from both directions simultaneously, a signal collision occurs and that results in no successful signal reception. If, on a wire, both directions are allowed to transmit signals simultaneously, it is called full duplex. No collision occurs on a full-duplex wire. Copyright 2-28, EstiNet Technologies Inc. All Rights Reserved.. 27
28 Wireless Signal s Modulation, Demodulation and Demodulation Error Copyright 2-28, EstiNet Technologies Inc. All Rights Reserved.. 28
29 Wireless Signal s Modulation and Demodulation 2 3 Host Host 2 Modulate 4 Modulate digital data into analog signals Modulate Modulate Demodulate analog signals into digital data Demodulate Demodulate Demodulate Copyright 2-28, EstiNet Technologies Inc. All Rights Reserved.. 29
30 Wireless Signal s Demodulation Error Host 4 5 Host 2 2 Modulate digital data into analog signals Modulate Modulate This segment of analog signal is corrupted due to interference 6 Demodulate analog signals into digital data Demodulate 3 Modulate 7 Demodulate Demodulate Copyright 2-28, EstiNet Technologies Inc. All Rights Reserved.. 3
31 How to check if the demodulated data are corrupted? A frame is usually composed of header field, data payload field, and frame check sequence (FCS) field. The value filled in the FCS field is calculated by the Cyclic Redundancy Check (CRC) algorithm. The input data for the algorithm are the contents of header field and data payload field. Before a frame is transmitted at the sender site, a CRC value is calculated and filled in the FCS field. When the frame is received at the receiver site, another CRC calculation is done and the new CRC value is used to compare with the value of the FCS field. If the two values are different, the received data are considered corrupted. Sender Site Receiver Site Payload FCS Payload FCS CRC CRC =? Copyright 2-28, EstiNet Technologies Inc. All Rights Reserved.. 3
32 Wireless Signal s Propagation < Simulation Case > antenna_gain_pattern.xtpl wireless_link_recv_sensitivity.xtpl wireless_signal_collision.xtpl Copyright 2-28, EstiNet Technologies Inc. All Rights Reserved.. 32
33 Isotropic Antenna Factors to determine the transmission range of wireless signals:. Antenna gain patterns of both sender site and receiver site 2. Signal transmission power on sender site 3. Signal receiving sensitivity on receiver site 4. Signal frequency and environmental parameters (e.g., terrain, surface object, weather, interference, etc.) Directional Antenna (horizontal angle 6, point to the right) 6 The point with half the energy (-3dB) The point with half the energy (-3dB) Copyright 2-28, EstiNet Technologies Inc. All Rights Reserved.. 33
34 The transmission power of signal is gradually attenuated along with the signal emission path. When the power is lower than the receiving sensitivity of a receiver, no signal is received. Sender Receiver The receiver is moving within the coverage of transmitted signals, it receives the signals successfully. Once the receiver moves beyond the coverage of the transmitted signal, no signal is received. Sender Receiver Copyright 2-28, EstiNet Technologies Inc. All Rights Reserved.. 34
35 When wireless signals are transmitted on the air, collisions could occur among different signals. Sender Sender Receiver Different signals collide with each other at the receiver Sender Copyright 2-28, EstiNet Technologies Inc. All Rights Reserved.. 35
36 Summary Copyright 2-28, EstiNet Technologies Inc. All Rights Reserved.. 36
37 Review of Points In terms of signal delivery time, what is transmission time? And what is propagation delay? What are the factors to determine the end-to-end delay? What are the procedures of signal encoding/decoding and modulation/demodulation? Why are there errors during the procedures of signal decoding and demodulation? What are the characteristics of wired signal propagation? What are the characteristics of wireless signal propagation? Copyright 2-28, EstiNet Technologies Inc. All Rights Reserved.. 37
Simulator Experiment. Physical Layer
Simulator Experiment Physical Layer List of Experiment Calculation of Signal Delivery Time Observation of End-to-end Delay Error Rate of Wired Signal Transmission Range of Wireless Signal 2 Simulator Experiment
More informationData Communication. Introduction of Communication. Data Communication. Elements of Data Communication (Communication Model)
Data Communication Introduction of Communication The need to communicate is part of man s inherent being. Since the beginning of time the human race has communicated using different techniques and methods.
More informationSpecial expressions, phrases, abbreviations and terms of Computer Networks
access access point adapter Adderssing Realm ADSL (Asymmetrical Digital Subscriber Line) algorithm amplify amplitude analog antenna application architecture ARP (Address Resolution Protocol) AS (Autonomous
More informationThe data transmission mode describes the direction of data flow. It is either simplex, half duplex or full duplex.
Data transmission Data transmission on a network involves serial transmission. It transfers data by sending one bit at a time through a single line. All data on a network is transferred using a data transmission
More information2. LAN Topologies Gilbert Ndjatou Page 1
2. LAN Topologies Two basic categories of network topologies exist, physical topologies and logical topologies. The physical topology of a network is the cabling layout used to link devices. This refers
More informationLinks Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame
Links Reading: Chapter 2 CS 375: Computer Networks Thomas Bressoud 1 Goals of Todayʼs Lecture Link-layer services Encoding, framing, and error detection Error correction and flow control Sharing a shared
More informationCS 455/555 Intro to Networks and Communications. Link Layer
CS 455/555 Intro to Networks and Communications Link Layer Dr. Michele Weigle Department of Computer Science Old Dominion University mweigle@cs.odu.edu http://www.cs.odu.edu/~mweigle/cs455-s13 1 Link Layer
More informationChapter 5: Link layer
Chapter 5: Link layer our goals: v understand principles behind link layer services: error detection, correction sharing a broadcast channel: multiple access link layer addressing local area networks:
More informationWireless and Mobile Networks Reading: Sections 2.8 and 4.2.5
Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5 Acknowledgments: Lecture slides are from Computer networks course thought by Jennifer Rexford at Princeton University. When slides are obtained
More informationOverview. Performance metrics - Section 1.5 Direct link networks Hardware building blocks - Section 2.1 Encoding - Section 2.2 Framing - Section 2.
Overview Performance metrics - Section 1.5 Direct link networks Hardware building blocks - Section 2.1 Encoding - Section 2.2 Framing - Section 2.3 Performance Metrics Bandwidth Amount of data that can
More informationCS/ECE 438: Communication Networks for Computers Spring 2018 Midterm Examination Online
1 CS/ECE 438: Communication Networks for Computers Spring 2018 Midterm Examination Online Solutions 1. General Networking a. In traditional client-server communication using TCP, a new socket is created.
More informationPrinciples behind data link layer services:
Data Link Layer Goals: Principles behind data link layer services: Error detection, correction Sharing a broadcast channel: multiple access Link layer addressing Reliable data transfer, flow control: Done!
More informationCS 43: Computer Networks Switches and LANs. Kevin Webb Swarthmore College December 5, 2017
CS 43: Computer Networks Switches and LANs Kevin Webb Swarthmore College December 5, 2017 Ethernet Metcalfe s Ethernet sketch Dominant wired LAN technology: cheap $20 for NIC first widely used LAN technology
More informationTypical Network Uses
Computer Networks Introduction The next Great Revolution - Computer Networks- computers connected together for exchanging information Our information-oriented society - applications in education, commerce,
More informationCMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 16
CMPE 150/L : Introduction to Computer Networks Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 16 1 Final project demo Please do the demo next week to the TAs. So basically you may need
More informationPrinciples behind data link layer services
Data link layer Goals: Principles behind data link layer services Error detection, correction Sharing a broadcast channel: Multiple access Link layer addressing Reliable data transfer, flow control: Done!
More informationPrinciples behind data link layer services:
Data link layer Goals: Principles behind data link layer services: Error detection, correction Sharing a broadcast channel: Multiple access Link layer addressing Reliable data transfer, flow control Example
More informationPrinciples behind data link layer services:
Data link layer Goals: Principles behind data link layer services: Error detection, correction Sharing a broadcast channel: Multiple access Link layer addressing Reliable data transfer, flow control Example
More informationLinks. CS125 - mylinks 1 1/22/14
Links 1 Goals of Today s Lecture Link-layer services Encoding, framing, and error detection Error correction and flow control Sharing a shared media Channel partitioning Taking turns Random access Shared
More informationHomework 1. Question 1 - Layering. CSCI 1680 Computer Networks Fonseca
CSCI 1680 Computer Networks Fonseca Homework 1 Due: 27 September 2012, 4pm Question 1 - Layering a. Why are networked systems layered? What are the advantages of layering? Are there any disadvantages?
More informationThe Link Layer and LANs: Ethernet and Swiches
The Link Layer and LNs: Ethernet and Swiches EECS3214 2018-03-21 Link layer, LNs: outline 6.1 introduction, services 6.2 error detection, correction 6.3 multiple access protocols 6.4 LNs addressing, RP
More informationCPE 548 Exam #1 (50 pts) February 17, 2016
Name Class: 548 All answers must have supporting work. Any answer without support will receive no credit 1) (4 pts) Answer the following short answer questions. a) Explain the stop and wait ARQ (automatic
More informationSection 3.1: Network Adapters
Section 3.1: Network Adapters This section examines using a network adapter (network interface card or NIC) to connect a host to the network medium. Students will become familiar with the function of:
More informationThe Network Access Layer. In This Lecture. Network Access Layer. Hour 3
The Network Access Layer Hour 3 In This Lecture Explain what the Network Access layer is Discuss how TCP/IP's Network Access layer relates to the OSI networking model Explain what a network architecture
More informationData Link Layer: Multi Access Protocols
Digital Communication in the Modern World Data Link Layer: Multi Access Protocols http://www.cs.huji.ac.il/~com1 com1@cs.huji.ac.il Some of the slides have been borrowed from: Computer Networking: A Top
More informationChapter 15 Local Area Network Overview
Chapter 15 Local Area Network Overview LAN Topologies Bus and Tree Bus: stations attach through tap to bus full duplex allows transmission and reception transmission propagates throughout medium heard
More informationCSC 4900 Computer Networks: The Link Layer
CSC 4900 Computer Networks: The Link Layer Professor Henry Carter Fall 2017 Last Time We talked about intra-as routing protocols: Which routing algorithm is used in RIP? OSPF? What techniques allow OSPF
More informationIntroduction to computer networking
edge core Introduction to computer networking Comp Sci 3600 Security Outline edge core 1 2 edge 3 core 4 5 6 The edge core Outline edge core 1 2 edge 3 core 4 5 6 edge core Billions of connected computing
More informationLayer 2 functionality bridging and switching
Layer 2 functionality bridging and switching BSAD 141 Dave Novak Sources: Network+ Guide to Networks, Dean 2013 Overview Layer 2 functionality Error detection Bridges Broadcast and collision domains How
More informationInternet Architecture and Protocol
Internet Architecture and Protocol Set# 03 Local Area Networks Delivered By: Engr Tahir Niazi Layer Reference to Protocol Application Presentation Session Application FTP, Telnet, SMTP, HTTP, SNMP.. Transport
More informationMedium Access Control Sublayer
Wireless (WLAN) Medium Access Control Sublayer Mahalingam Mississippi State University, MS October 20, 2014 Outline Medium Access Protocols Wireless (WLAN) 1 Medium Access Protocols ALOHA Slotted ALOHA
More informationEECS 122: Introduction to Communication Networks Final Exam Solutions
EECS 22: Introduction to Communication Networks Final Exam Solutions Problem. (6 points) How long does it take for a 3000-byte IP packet to go from host A to host B in the figure below. Assume the overhead
More informationChapter 16 Networking
Chapter 16 Networking Outline 16.1 Introduction 16.2 Network Topology 16.3 Network Types 16.4 TCP/IP Protocol Stack 16.5 Application Layer 16.5.1 Hypertext Transfer Protocol (HTTP) 16.5.2 File Transfer
More informationECE 4450:427/527 - Computer Networks Spring 2017
ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 5.1: Link Layer Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527 Computer
More informationChapter 4: Network Access. Introduction to Networks v5.1
Chapter 4: Network Access Introduction to Networks v5.1 4.0 Introduction 4.1 Physical Layer Protocols 4.2 Network Media 4.3 Data Link Layer Protocols 4.4 Media Access Control 4.5 Summary 2013 Cisco and/or
More informationLink Layer and Ethernet
Link Layer and Ethernet 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross traceroute Data Link Layer Multiple
More informationGoal and Outline. Computer Networking. What Do We Need? Today s Story Lecture 3: Packet Switched Networks Peter Steenkiste
Goal and Outline 15-441 15-641 Computer Networking Lecture 3: Packet Switched Networks Peter Steenkiste Fall 2016 www.cs.cmu.edu/~prs/15 441 F16 Goal: gain a basic understanding of how you can build a
More informationKing Fahd University of Petroleum and Minerals College of Computer Sciences and Engineering Department of Computer Engineering
Student Name: Section #: King Fahd University of Petroleum and Minerals College of Computer Sciences and Engineering Department of Computer Engineering COE 344 Computer Networks (T072) Final Exam Date
More informationLayering in Networked computing. OSI Model TCP/IP Model Protocols at each layer
Layering in Networked computing OSI Model TCP/IP Model Protocols at each layer Learning outcomes Understand the need of layering in Networked computing Understand the OSI model and the tcp/ip model Understand
More informationLink Layer and Ethernet
Link Layer and Ethernet 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross traceroute Data Link Layer Multiple
More informationChapter 4: network layer. Network service model. Two key network-layer functions. Network layer. Input port functions. Router architecture overview
Chapter 4: chapter goals: understand principles behind services service models forwarding versus routing how a router works generalized forwarding instantiation, implementation in the Internet 4- Network
More informationCommunication Networks
Communication Networks Nicholas Honeth (nicholash@ics.kth.se) Contents of the series Lecture 10 - Recap of the networks we ve seen so far - OSI model - Circuit and packet switching - Physical media Lecture
More informationThe MAC Address Format
Directing data is what addressing is all about. At the Data Link layer, this is done by pointing PDUs to the destination MAC address for delivery of a frame within a LAN. The MAC address is the number
More informationStudy Guide. Module Two
Module Two Study Guide Study Guide Contents Part One -- Textbook Questions Part Two -- Assignment Questions Part Three -- Vocabulary Chapter 4 Data Link Layer What is the function of the data link layer?
More informationLink layer, LANs: outline. Chapter 5-1 Link Layer. Link layer: introduction. Link layer services
Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Link layer, LANs: outline 5.1 introduction, services 5.2 error detection, correction
More informationData Communication. Introduction
Data Communication Introduction Course Information Assistant Instructor Reza Hassanpour Faris Serdar Taşel Office: L214 Office: L205 Phone: 2331338 Phone: 2331357 Email: reza@cankaya.edu.tr Email: fst@cankaya.edu.tr
More informationCSC 401 Data and Computer Communications Networks
CSC 401 Data and Computer Communications Networks Link Layer: Intro, Errors, Multiple Access Sec 6.1, 6.2, 6.3 Prof. Lina Battestilli Fall 2017 Chapter 6: Link layer Goals: understand principles behind
More informationData Link Layer. Our goals: understand principles behind data link layer services: instantiation and implementation of various link layer technologies
Data Link Layer Our goals: understand principles behind data link layer services: link layer addressing instantiation and implementation of various link layer technologies 1 Outline Introduction and services
More informationChapter 6 The Link Layer and LANs
Chapter 6 The Link Layer and LANs A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the
More informationNetwork Model. Why a Layered Model? All People Seem To Need Data Processing
Network Model Why a Layered Model? All People Seem To Need Data Processing Layers with Functions Packet Propagation Each router provides its services to support upper-layer functions. Headers (Encapsulation
More informationSummary of MAC protocols
Summary of MAC protocols What do you do with a shared media? Channel Partitioning, by time, frequency or code Time Division, Code Division, Frequency Division Random partitioning (dynamic) ALOHA, S-ALOHA,
More informationCOMPONENTS OF DATA COMMUNICATION
COMPONENTS OF DATA COMMUNICATION ANALOG AND DIGITAL TRANSMISSION An analog signal is one that is continuous with respect to time and may take on any value within a given range of values. Eg Human voice.
More informationChapter 4: Network Access
4.0.1.1 Chapter 4: Network Access To support our communication, the OSI model divides the functions of a data network into layers. Each layer works with the layers above and below to transmit data. 4.0.1.2
More informationCPE 448/548 Exam #1 (100 pts) February 14, Name Class: 448
Name Class: 448 1) (14 pts) A message M = 11001 is transmitted from node A to node B using the CRC code. The CRC generator polynomial is G(x) = x 3 + x 2 + 1 ( bit sequence 1101) a) What is the transmitted
More informationOSI Reference Model. Computer Networks lab ECOM Prepared By : Eng. Motaz Murtaja Eng. Ola Abd Elatief
Islamic University of Gaza Faculty of Engineering Computer Engineering Department Computer Networks lab ECOM 4121 OSI Reference Model Prepared By : Eng. Motaz Murtaja Eng. Ola Abd Elatief May /2010 OSI
More informationITEC 3210 M - Applied Data Communications and Networks. Professor: Younes Benslimane, Ph.D.
ITEC 3210 M - Applied Data Communications and Networks Professor: Younes Benslimane, Ph.D. Midterm Exam February 11 th 2013 Instructions Duration: 1 hour 20 minutes Answer all questions No documentation
More informationObjectives. Hexadecimal Numbering and Addressing. Ethernet / IEEE LAN Technology. Ethernet
2007 Cisco Systems, Inc. All rights reserved. Cisco Public Objectives Ethernet Network Fundamentals Chapter 9 ITE PC v4.0 Chapter 1 1 Introduce Hexadecimal number system Describe the features of various
More informationNetworking interview questions
Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected
More informationInternet A Brief Tutorial. Jean Walrand EECS U.C. Berkeley
Internet A Brief Tutorial Jean Walrand EECS U.C. Berkeley Contents History Key Ideas Protocols Technology Research History 1962 L. Kleinrock proposes Packet Switching 1966 L. Roberts proposes architecture
More informationIslamic University of Gaza Faculty of Engineering Department of Computer Engineering ECOM 4021: Networks Discussion. Chapter 2.
Islamic University of Gaza Faculty of Engineering Department of Computer Engineering ECOM 4021: Networks Discussion Chapter 2 Getting Connected Eng. Haneen El-Masry March, 2014 2.2 ENCODING Encoding the
More informationThe Link Layer and LANs. Chapter 6: Link layer and LANs
The Link Layer and LANs EECS3214 2018-03-14 4-1 Chapter 6: Link layer and LANs our goals: understand principles behind link layer services: error detection, correction sharing a broadcast channel: multiple
More informationCCNA Exploration1 Chapter 7: OSI Data Link Layer
CCNA Exploration1 Chapter 7: OSI Data Link Layer LOCAL CISCO ACADEMY ELSYS TU INSTRUCTOR: STELA STEFANOVA 1 Explain the role of Data Link layer protocols in data transmission; Objectives Describe how the
More informationLecture 20: Link Layer
Lecture 20: Link Layer COMP 332, Spring 2018 Victoria Manfredi Acknowledgements: materials adapted from Computer Networking: A Top Down Approach 7 th edition: 1996-2016, J.F Kurose and K.W. Ross, All Rights
More informationCS 204: Advanced Computer Networks
CS 204: Advanced Computer Networks Jiasi Chen Lectures: MWF 12:10-1pm Humanities and Social Sciences 1403 http://www.cs.ucr.edu/~jiasi/teaching/cs204_spring17/ 1 Why Networks? Supports the applications
More informationArea Covered is small Area covered is large. Data transfer rate is high Data transfer rate is low
Chapter 15 Networking Concepts 1. Define networking. It is the interconnection of independent computing devices for sharing of information over shared medium. 2. What is the need for networking? / What
More informationCCNA Exploration Network Fundamentals. Chapter 09 Ethernet
CCNA Exploration Network Fundamentals Chapter 09 Ethernet Updated: 07/07/2008 1 9.0.1 Introduction 2 9.0.1 Introduction Internet Engineering Task Force (IETF) maintains the functional protocols and services
More informationChapter 5 Link Layer and LANs
Chapter 5 Link Layer and LANs Computer Networking: A Top Down Approach 4 th edition. Jim Kurose, Keith Ross Addison-Wesley, July 2007. All material copyright 1996-2007 J.F Kurose and K.W. Ross, All Rights
More informationLast Lecture: Data Link Layer
Last Lecture: Data Link Layer 1. Design goals and issues 2. (More on) Error Control and Detection 3. Multiple Access Control (MAC) 4. Ethernet, LAN Addresses and ARP 5. Hubs, Bridges, Switches 6. Wireless
More informationCSCI 466 Midterm Networks Fall 2011
CSCI 466 Midterm Networks Fall 2011 Name: This exam consists of 7 problems on the following 9 pages. You may use your single- sided hand- written 8 ½ x 11 note sheet and a calculator during the exam. No
More informationIT220 Network Standards & Protocols. Unit 4: Chapter 4 Transmitting Bits
1 IT220 Network Standards & Protocols Unit 4: Chapter 4 Transmitting Bits Objectives Differentiate among major types of LAN and WAN technologies and specifications and determine how each is used in a data
More informationLink Layer and LANs 안상현서울시립대학교컴퓨터 통계학과.
Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과 ahn@venus.uos.ac.kr Data Link Layer Goals: understand principles behind data link layer services: error detection, correction sharing a broadcast channel: multiple
More informationNetwork Management & Monitoring
Network Management & Monitoring Network Delay These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/) End-to-end
More informationTCOM 370 NOTES 99-1 NETWORKING AND COMMUNICATIONS
TCOM 370 NOTES 99-1 NETWORKING AND COMMUNICATIONS Communication Networks Allow Exchange of Information between Users telephone network for voice communication interconnected computers and peripherals,
More informationEthernet. Lecture 6. Outline. Ethernet - Physical Properties. Ethernet - Physical Properties. Ethernet
Lecture 6 Ethernet Reminder: Homework 2, Programming Project 2 due on 9/20/12. Thick-net Thin-net Twisted Pair Thursday, September 13 CS 475 Networks - Lecture 6 1 Thursday, September 13 CS 475 Networks
More informationLecture 8 Link Layer: functionality, error detection, media access algorithm
Lecture 8 Link Layer: functionality, error detection, media access algorithm From Kurose & Ross Book slightly modified by Romaric Duvignau duvignau@chalmers.se Thanks and enjoy! JFK/KWR All material copyright
More information10- and 100-Mbps Ethernet
Ethernet Basics 10-Mbps Ethernet Three 10-Mbps Ethernet standards: 10BASE5 10BASE2 10BASE-T 10BASE2 and 10BASE5 were around more than 20 years and have been replaced by newer alternatives 10BASE-T s use
More informationCOMPUTER NETWORKS UNIT I. 1. What are the three criteria necessary for an effective and efficient networks?
Question Bank COMPUTER NETWORKS Short answer type questions. UNIT I 1. What are the three criteria necessary for an effective and efficient networks? The most important criteria are performance, reliability
More informationThe Internet software layers
1 2 The Internet software layers SMTP, Telnet, FTP, POP3, IMAP TCP, UDP IP: RIP, BGP, OSPF Ethernet, Wireless LAN, Token Ring Twisted pair, coaxial, microwave, optical fiber 3 4 Ethernet 1973 Xerox s researcher
More informationRAJIV GANDHI COLLEGE OF ENGINEERING AND TECHNOLOGY
RAJIV GANDHI COLLEGE OF ENGINEERING AND TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING QUESTION BANK SUBJECT NAME: COMPUTER NETWORKS SUBJECT CODE: CST52 UNIT-I 2 MARKS 1. What is Network? 2.
More informationLecture 6 Datalink Framing, Switching. From Signals to Packets
Lecture 6 Datalink Framing, Switching David Andersen Department of Computer Science Carnegie Mellon University 15-441 Networking, Spring 2005 http://www.cs.cmu.edu/~srini/15-441/s05/ 1 From Signals to
More informationFrequency: it refers to the number of periods in 1 s. It is formally expressed in Hertz (Hz)
Chapter2: Peak amplitude: it is the absolute value of the highest intensity. Frequency: it refers to the number of periods in 1 s. It is formally expressed in Hertz (Hz) Phase: it describes the position
More informationCSE 123: Computer Networks
Student Name: PID: UCSD email: CSE 123: Computer Networks Homework 1 Solution (Due 10/12 in class) Total Points: 30 Instructions: Turn in a physical copy at the beginning of the class on 10/10. Problems:
More informationET4254 Communications and Networking 1
Topic 10:- Local Area Network Overview Aims:- LAN topologies and media LAN protocol architecture bridges, hubs, layer 2 & 3 switches 1 LAN Applications (1) personal computer LANs low cost limited data
More informationInternetwork Basic. Possible causes of LAN traffic congestion are
Internetworking 1 C H A P T E R 2 Internetworking Basics Internetworking Model The OSI Reference Model Ethernet Networking Wireless Networking Data Encapsulation Topic 3 1 Internetwork Basic 4 Possible
More informationRouter Router Microprocessor controlled traffic direction home router DSL modem Computer Enterprise routers Core routers
Router Router is a Microprocessor controlled device that forwards data packets across the computer network. It is used to connect two or more data lines from different net works. The function of the router
More informationWiFi Networks: IEEE b Wireless LANs. Carey Williamson Department of Computer Science University of Calgary Winter 2018
WiFi Networks: IEEE 802.11b Wireless LANs Carey Williamson Department of Computer Science University of Calgary Winter 2018 Background (1 of 2) In many respects, the IEEE 802.11b wireless LAN (WLAN) standard
More information4.1 Introduction to Media and Devices
Chapter 4 Network Hardware 4.1 Introduction to Media and Devices Many of the issues discussed in this course, such as topology, scalability, and speed, depend on hardware. Unlike many of your computer
More informationLecture 4. Data Transmission Modes and Switching. Data Transmission & Switching 1-1
Lecture 4 Data Transmission Modes and Switching Data Transmission & Switching 1-1 Agenda Introduction to Data Transmission Modes Parallel and Serial Transmission Transmission Media Guided and unguided
More informationChapter 5 Link Layer. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012
Chapter 5 Link Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations; and can
More informationInternet, Education, and Collaboration of USP. Kazunori Sugiura Sept 9 th 2002
Internet, Education, and Collaboration of USP Kazunori Sugiura uhyo@sfc.wide.ad.jp Sept 9 th 2002 Last lecture in USP Importance of better internet connectivity What kind of problem do we have Discuss
More informationComputer Networks. Today. Principles of datalink layer services Multiple access links Adresavimas, ARP LANs Wireless LANs VU MIF CS 1/48 2/48
Computer Networks VU MIF CS 1/48 Today Principles of datalink layer services Multiple access links Adresavimas, ARP LANs Wireless LANs 2/48 1 Link layer: introduction terminology: hosts and routers: nodes
More informationMedium Access Protocols
Medium Access Protocols Summary of MAC protocols What do you do with a shared media? Channel Partitioning, by time, frequency or code Time Division,Code Division, Frequency Division Random partitioning
More informationLocal Area Network Overview
Local Area Network Overview Chapter 15 CS420/520 Axel Krings Page 1 LAN Applications (1) Personal computer LANs Low cost Limited data rate Back end networks Interconnecting large systems (mainframes and
More informationWEEK 9 TCP/IP, PHYSICAL AND DATA LINK LAYERS
WEEK 9 TCP/IP, PHYSICAL AND DATA LINK LAYERS PHYSICAL LAYER Physical (hardware) layer: lowest level layer of the Internet Model. - Contains the actual network hardware cables, antennas, network interfaces
More informationComputer Networks and the Internet. CMPS 4750/6750: Computer Networks
Computer Networks and the Inter CMPS 4750/6750: Computer Networks Outline What Is the Inter? Access Networks Packet Switching and Circuit Switching A closer look at delay, loss, and throughput Interconnection
More informationCS 421: COMPUTER NETWORKS SPRING FINAL May 16, minutes
CS 4: COMPUTER NETWORKS SPRING 03 FINAL May 6, 03 50 minutes Name: Student No: Show all your work very clearly. Partial credits will only be given if you carefully state your answer with a reasonable justification.
More informationChapter 12. Network Organization and Architecture
Chapter 12 Network Organization and Architecture Chapter 12 Objectives Learn the basic physical components of networks. Become familiar with routing protocols. 2 Computer networks are often classified
More information1/29/2008. From Signals to Packets. Lecture 6 Datalink Framing, Switching. Datalink Functions. Datalink Lectures. Character and Bit Stuffing.
/9/008 From Signals to Packets Lecture Datalink Framing, Switching Peter Steenkiste Departments of Computer Science and Electrical and Computer Engineering Carnegie Mellon University Analog Signal Digital
More informationLecture 6. Reminder: Homework 2, Programming Project 2 due on Thursday. Questions? Tuesday, September 13 CS 475 Networks - Lecture 6 1
Lecture 6 Reminder: Homework 2, Programming Project 2 due on Thursday. Questions? Tuesday, September 13 CS 475 Networks - Lecture 6 1 Outline Chapter 2 - Getting Connected 2.1 Perspectives on Connecting
More informationChapter 2 Communicating Over the Network
Chapter 2 Communicating Over the Network Elements of Communication Communicating the Messages Continuous stream of bits 00101010100101010101010101010101010 I have to wait Single communications (e.g. video,
More information