Outline. A Professional Company in Software-Defined Networking (SDN) Copyright , EstiNet Technologies Inc. All Rights Reserved..

Size: px
Start display at page:

Download "Outline. A Professional Company in Software-Defined Networking (SDN) Copyright , EstiNet Technologies Inc. All Rights Reserved.."

Transcription

1 Physical Layer

2 Outline Signal Propagation Media The Calculation of Signal Delivery Time The Evaluation of End-to-end Delay Signal Encoding and Modulation Wired Signal s Encoding, Decoding and Decoding Error Wired Signal s Propagation Wireless Signal s Modulation, Demodulation and Demodulation Error Wireless Signal s Propagation Summary Copyright 2-28, EstiNet Technologies Inc. All Rights Reserved.. 2

3 Signal Propagation Media Copyright 2-28, EstiNet Technologies Inc. All Rights Reserved.. 3

4 Media for Delivering Signals Wired Media Copper wire for delivering electrical signal Optical fiber for delivering optical wave etc. Wireless Media Air for delivering electromagnetic wave Air for delivering optical wave etc. Copyright 2-28, EstiNet Technologies Inc. All Rights Reserved.. 4

5 The Calculation of Signal Delivery Time < Simulation Case > trans_time_and_prop_delay.xtpl trans_time_and_prop_delay_comparison.xtpl Copyright 2-28, EstiNet Technologies Inc. All Rights Reserved.. 5

6 Sending Host Transmission Time & Propagation Delay Receiving Host User Network Applications Network Applications User TCP / UDP TCP UDP Segment gram TCP UDP TCP / UDP Kernel v4 / v6 Packet v4 / v6 Kernel ARP Device Driver ARP Device Driver Hardware Network Interface Card (NIC) Network Interface Card (NIC) Hardware Tx Start Tx End T Bit T2 Rx Start Transmission Time = T2 T = T4 T3 Rx End Propagation Delay = T3 T = T4 T2 Delivery Time = Rx End Tx Start = T4 T = Transmission Time + Propagation Delay T3 T4 Copyright 2-28, EstiNet Technologies Inc. All Rights Reserved.. 6

7 Sending Host The Calculation of Transmission Time Receiving Host User Network Applications Network Applications User TCP / UDP TCP UDP Segment gram TCP UDP TCP / UDP Kernel v4 / v6 Packet v4 / v6 Kernel ARP Device Driver ARP Device Driver Hardware Network Interface Card (NIC) Network Interface Card (NIC) Hardware Tx Start Tx End T Bit T2 Sending Host s Interface Rate = X Mbps = (X * ^6) bps Size = Y bytes = (8 * Y) bits Transmission Time = T2 T = (8*Y)/(X * ^6) sec E.g., If X = and Y =, Transmission Time = (8*)/( * ^6) =.8 sec 7 Copyright 2-28, EstiNet Technologies Inc. All Rights Reserved..

8 Sending Host The Calculation of Propagation Delay Receiving Host User Network Applications Network Applications User TCP / UDP TCP UDP Segment gram TCP UDP TCP / UDP Kernel v4 / v6 Packet v4 / v6 Kernel ARP Device Driver ARP Device Driver Hardware Network Interface Card (NIC) Network Interface Card (NIC) Hardware Tx Start T Bit Rx Start T3 Signal Speed over the Medium = S meter/sec Distance between Sending Host and Receiving Host = D meters Propagation Delay = T3 T = D/S sec E.g., If S = (2 * ^8) and D = 2, Propagation Delay = (2)/(2 * ^8) =. sec Copyright 2-28, EstiNet Technologies Inc. All Rights Reserved.. 8

9 Transmission Time > Propagation Delay Sending Host Receiving Host User Network Applications Network Applications User TCP / UDP TCP / UDP Kernel v4 / v6 v4 / v6 Kernel ARP ARP Device Driver Device Driver Network Interface Card (NIC) Network Interface Card (NIC) Hardware Hardware Tx Start Rx Start Tx End T Rx End T3 T2 T4 Copyright 2-28, EstiNet Technologies Inc. All Rights Reserved.. 9

10 Sending Host Transmission Time < Propagation Delay Receiving Host User Network Applications Network Applications User TCP / UDP TCP UDP Segment gram TCP UDP TCP / UDP Kernel v4 / v6 Packet v4 / v6 Kernel ARP Device Driver ARP Device Driver Hardware Network Interface Card (NIC) Network Interface Card (NIC) Hardware Tx Start Tx End T Bit T2 Rx Start Rx End T3 T4 Copyright 2-28, EstiNet Technologies Inc. All Rights Reserved..

11 The Evaluation of End-to-end Delay < Simulation Case > end_to_end_delay.xtpl end_to_end_delay_trans_time_dominates.xtpl Copyright 2-28, EstiNet Technologies Inc. All Rights Reserved..

12 Sending Host End-to-end Delay A B Receiving Host User Network Applications Network Applications User TCP / UDP TCP UDP Segment gram TCP UDP TCP / UDP Kernel v4 / v6 Packet v4 / v6 Kernel ARP Device Driver ARP Device Driver Hardware Network Interface Card (NIC) Network Interface Card (NIC) Hardware Bit End-to-end Delay = Sending Host s Kernel/User Processing Delay (e.g., Protocol, Scheduling, Queuing, etc.) + Transmission Time + Propagation Delay + Receiving Host s Kernel/User Processing Delay (e.g., Protocol, Queuing, etc.) Round Trip Time (RTT) = End-to-end Delay from Host A to Host B + End-to-end Delay from Host B to Host A Copyright 2-28, EstiNet Technologies Inc. All Rights Reserved.. 2 2

13 Sending Host Transmission Time < Propagation Delay Receiving Host User Network Applications Network Applications User TCP / UDP TCP UDP Segment gram TCP UDP TCP / UDP Kernel v4 / v6 Packet v4 / v6 Kernel ARP Device Driver ARP Device Driver Hardware Network Interface Card (NIC) Network Interface Card (NIC) Hardware Tx Start Tx End T If ignoring kernel/user space processing delay and transmission time << propagation delay, propagation delay dominates end-to-end delay. Bit T2 Rx Start Rx End T3 T4 Copyright 2-28, EstiNet Technologies Inc. All Rights Reserved.. 3

14 Transmission Time > Propagation Delay Sending Host Receiving Host User Network Applications Network Applications User TCP / UDP TCP / UDP Kernel v4 / v6 v4 / v6 Kernel ARP ARP Device Driver Device Driver Network Interface Card (NIC) Network Interface Card (NIC) Hardware Hardware Tx Start Rx Start T Tx End If ignoring kernel/user space processing delay and transmission time >> propagation delay, transmission time dominates end-to-end delay. Rx End T3 T2 T4 4 Copyright 2-28, EstiNet Technologies Inc. All Rights Reserved..

15 End-to-end Delay across Other Network Devices Sending Host Router Receiving Host User Network Applications Network Applications User TCP / UDP TCP UDP Segment gram TCP UDP TCP / UDP Kernel v4 / v6 Packet v4 / v6 Kernel ARP Device Driver Plane ARP Device Driver Hardware Network Interface Card (NIC) ASIC ing Fabric & L3+ Function Network Interface Card (NIC) Hardware Bit End-to-end Delay from Sending Host to Receiving Host = Point-to-point Delay from Sending Host to Router + Router s Forwarding Delay + Point-to-point Delay from Router to Receiving Host Copyright 2-28, EstiNet Technologies Inc. All Rights Reserved.. 5

16 Think about different end-to-end delays in the following network VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM (VM) Internal Server (VM) Internal Server 2 (VM) Internal Server 3 (VM) Internal Server 4 (VM) Internal Server 5 (VM) Internal Server 6 (VM) Internal Server 7 (VM) Internal Server 8 Sensor 5G Cellular Network Core Sensor Backbone Router Backbone Router Backbone Router Mobile Communication ISP Backbone ISP Backbone ISP Backbone Camera Display AP Router Router SDN Router Router SDN SDN TOR Router SDN Controller Router ISP Edge Cloud Center SDN Cloud Center Router SDN Controller Router Router Router SDN Controller SDN SDN (VM) NAT (VM) NAT 2 (VM) Firewall Server 4 Server (VM) Firewall 2 Campus / Enterprise Sensor Sensor Sensor IoT SDN TOR Server Router Server 5 Server 6 SDN SDN Server 2 Server 3 Router ISP Gateway ISP Gateway ISP Gateway ISP Gateway AP AP AP AP AP AP AP TV AP TV TV TV AP AP AP AP TV TV TV TV TV TV TV TV Home Office / Shop Copyright 2-28, EstiNet Technologies Inc. All Rights Reserved.. 6

17 Signal Encoding and Modulation Copyright 2-28, EstiNet Technologies Inc. All Rights Reserved.. 7

18 Encoding and Decoding If some data (analog or digital) have to be transmitted in the form of digital signal, the data have to be encoded into digital signals at the sender site. At the receiver site, the received digital signals are decoded to retrieve the original data (analog or digital). Analog Encoding / Decoding Analog Digital Signal Digital Encoder Decoder Digital Copyright 2-28, EstiNet Technologies Inc. All Rights Reserved.. 8

19 Modulation & Demodulation If some data (analog or digital) have to be transmitted in the form of analog signal, the data have to be modulated into analog signals at the sender site. At the receiver site, the received analog signals are demodulated to retrieve the original data (analog or digital). Carrier Signal Modulation / Demodulation Analog Analog Analog Signal Digital Modulator Demodulator Digital Copyright 2-28, EstiNet Technologies Inc. All Rights Reserved.. 9

20 Wired Signal s Encoding, Decoding and Decoding Error Copyright 2-28, EstiNet Technologies Inc. All Rights Reserved.. 2

21 Wired Signal s Encoding and Decoding 2 3 Host Host 2 Encode digital data into digital signals Encode Encode Encode Decode digital signals into digital data Decode Decode Decode Copyright 2-28, EstiNet Technologies Inc. All Rights Reserved.. 2

22 Wired Signal s Decoding Error 2 3 Host Host 2 Encode digital data into digital signals Encode Encode Encode 4 This segment of digital signal is corrupted due to interference Decode digital signals into digital data Decode Decode Decode Copyright 2-28, EstiNet Technologies Inc. All Rights Reserved.. 22

23 How to check if the decoded data are corrupted? A frame is usually composed of header field, data payload field, and frame check sequence (FCS) field. The value filled in the FCS field is calculated by the Cyclic Redundancy Check (CRC) algorithm. The input data for the algorithm are the contents of header field and data payload field. Before a frame is transmitted at the sender site, a CRC value is calculated and filled in the FCS field. When the frame is received at the receiver site, another CRC calculation is done and the new CRC value is used to compare with the value of the FCS field. If the two values are different, the received data are considered corrupted. Sender Site Receiver Site Payload FCS Payload FCS CRC CRC =? Copyright 2-28, EstiNet Technologies Inc. All Rights Reserved.. 23

24 Wired Signal s Propagation < Simulation Case > pass_through_and_store_and_forward.xtpl wired_signal_collision.xtpl Copyright 2-28, EstiNet Technologies Inc. All Rights Reserved.. 24

25 When wired signals enter a network device like hub or repeater, the signals directly pass through the device without experiencing signal decoding. 2 Before signals enter the hub Signals are directly broadcasted to other ports Copyright 2-28, EstiNet Technologies Inc. All Rights Reserved.. 25

26 When wired signals enter a network device like switch or router, the signals have to experience signal decoding and the decoded data have to be stored and processed for determining the outgoing interface/port. Before signals enter the switch 2 Signals are received by the switch for finding out the destination 3 Signals are forwarded only to the port which the destination is connected to 26 Copyright 2-28, EstiNet Technologies Inc. All Rights Reserved..

27 Wired signals could collide with other signals while being transmitted on a wire. If, on a wire, only one direction is allowed to transmit signals simultaneously, it is called half duplex. If signals are transmitted from both directions simultaneously, a signal collision occurs and that results in no successful signal reception. If, on a wire, both directions are allowed to transmit signals simultaneously, it is called full duplex. No collision occurs on a full-duplex wire. Copyright 2-28, EstiNet Technologies Inc. All Rights Reserved.. 27

28 Wireless Signal s Modulation, Demodulation and Demodulation Error Copyright 2-28, EstiNet Technologies Inc. All Rights Reserved.. 28

29 Wireless Signal s Modulation and Demodulation 2 3 Host Host 2 Modulate 4 Modulate digital data into analog signals Modulate Modulate Demodulate analog signals into digital data Demodulate Demodulate Demodulate Copyright 2-28, EstiNet Technologies Inc. All Rights Reserved.. 29

30 Wireless Signal s Demodulation Error Host 4 5 Host 2 2 Modulate digital data into analog signals Modulate Modulate This segment of analog signal is corrupted due to interference 6 Demodulate analog signals into digital data Demodulate 3 Modulate 7 Demodulate Demodulate Copyright 2-28, EstiNet Technologies Inc. All Rights Reserved.. 3

31 How to check if the demodulated data are corrupted? A frame is usually composed of header field, data payload field, and frame check sequence (FCS) field. The value filled in the FCS field is calculated by the Cyclic Redundancy Check (CRC) algorithm. The input data for the algorithm are the contents of header field and data payload field. Before a frame is transmitted at the sender site, a CRC value is calculated and filled in the FCS field. When the frame is received at the receiver site, another CRC calculation is done and the new CRC value is used to compare with the value of the FCS field. If the two values are different, the received data are considered corrupted. Sender Site Receiver Site Payload FCS Payload FCS CRC CRC =? Copyright 2-28, EstiNet Technologies Inc. All Rights Reserved.. 3

32 Wireless Signal s Propagation < Simulation Case > antenna_gain_pattern.xtpl wireless_link_recv_sensitivity.xtpl wireless_signal_collision.xtpl Copyright 2-28, EstiNet Technologies Inc. All Rights Reserved.. 32

33 Isotropic Antenna Factors to determine the transmission range of wireless signals:. Antenna gain patterns of both sender site and receiver site 2. Signal transmission power on sender site 3. Signal receiving sensitivity on receiver site 4. Signal frequency and environmental parameters (e.g., terrain, surface object, weather, interference, etc.) Directional Antenna (horizontal angle 6, point to the right) 6 The point with half the energy (-3dB) The point with half the energy (-3dB) Copyright 2-28, EstiNet Technologies Inc. All Rights Reserved.. 33

34 The transmission power of signal is gradually attenuated along with the signal emission path. When the power is lower than the receiving sensitivity of a receiver, no signal is received. Sender Receiver The receiver is moving within the coverage of transmitted signals, it receives the signals successfully. Once the receiver moves beyond the coverage of the transmitted signal, no signal is received. Sender Receiver Copyright 2-28, EstiNet Technologies Inc. All Rights Reserved.. 34

35 When wireless signals are transmitted on the air, collisions could occur among different signals. Sender Sender Receiver Different signals collide with each other at the receiver Sender Copyright 2-28, EstiNet Technologies Inc. All Rights Reserved.. 35

36 Summary Copyright 2-28, EstiNet Technologies Inc. All Rights Reserved.. 36

37 Review of Points In terms of signal delivery time, what is transmission time? And what is propagation delay? What are the factors to determine the end-to-end delay? What are the procedures of signal encoding/decoding and modulation/demodulation? Why are there errors during the procedures of signal decoding and demodulation? What are the characteristics of wired signal propagation? What are the characteristics of wireless signal propagation? Copyright 2-28, EstiNet Technologies Inc. All Rights Reserved.. 37

Simulator Experiment. Physical Layer

Simulator Experiment. Physical Layer Simulator Experiment Physical Layer List of Experiment Calculation of Signal Delivery Time Observation of End-to-end Delay Error Rate of Wired Signal Transmission Range of Wireless Signal 2 Simulator Experiment

More information

Data Communication. Introduction of Communication. Data Communication. Elements of Data Communication (Communication Model)

Data Communication. Introduction of Communication. Data Communication. Elements of Data Communication (Communication Model) Data Communication Introduction of Communication The need to communicate is part of man s inherent being. Since the beginning of time the human race has communicated using different techniques and methods.

More information

Special expressions, phrases, abbreviations and terms of Computer Networks

Special expressions, phrases, abbreviations and terms of Computer Networks access access point adapter Adderssing Realm ADSL (Asymmetrical Digital Subscriber Line) algorithm amplify amplitude analog antenna application architecture ARP (Address Resolution Protocol) AS (Autonomous

More information

The data transmission mode describes the direction of data flow. It is either simplex, half duplex or full duplex.

The data transmission mode describes the direction of data flow. It is either simplex, half duplex or full duplex. Data transmission Data transmission on a network involves serial transmission. It transfers data by sending one bit at a time through a single line. All data on a network is transferred using a data transmission

More information

2. LAN Topologies Gilbert Ndjatou Page 1

2. LAN Topologies Gilbert Ndjatou Page 1 2. LAN Topologies Two basic categories of network topologies exist, physical topologies and logical topologies. The physical topology of a network is the cabling layout used to link devices. This refers

More information

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame Links Reading: Chapter 2 CS 375: Computer Networks Thomas Bressoud 1 Goals of Todayʼs Lecture Link-layer services Encoding, framing, and error detection Error correction and flow control Sharing a shared

More information

CS 455/555 Intro to Networks and Communications. Link Layer

CS 455/555 Intro to Networks and Communications. Link Layer CS 455/555 Intro to Networks and Communications Link Layer Dr. Michele Weigle Department of Computer Science Old Dominion University mweigle@cs.odu.edu http://www.cs.odu.edu/~mweigle/cs455-s13 1 Link Layer

More information

Chapter 5: Link layer

Chapter 5: Link layer Chapter 5: Link layer our goals: v understand principles behind link layer services: error detection, correction sharing a broadcast channel: multiple access link layer addressing local area networks:

More information

Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5

Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5 Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5 Acknowledgments: Lecture slides are from Computer networks course thought by Jennifer Rexford at Princeton University. When slides are obtained

More information

Overview. Performance metrics - Section 1.5 Direct link networks Hardware building blocks - Section 2.1 Encoding - Section 2.2 Framing - Section 2.

Overview. Performance metrics - Section 1.5 Direct link networks Hardware building blocks - Section 2.1 Encoding - Section 2.2 Framing - Section 2. Overview Performance metrics - Section 1.5 Direct link networks Hardware building blocks - Section 2.1 Encoding - Section 2.2 Framing - Section 2.3 Performance Metrics Bandwidth Amount of data that can

More information

CS/ECE 438: Communication Networks for Computers Spring 2018 Midterm Examination Online

CS/ECE 438: Communication Networks for Computers Spring 2018 Midterm Examination Online 1 CS/ECE 438: Communication Networks for Computers Spring 2018 Midterm Examination Online Solutions 1. General Networking a. In traditional client-server communication using TCP, a new socket is created.

More information

Principles behind data link layer services:

Principles behind data link layer services: Data Link Layer Goals: Principles behind data link layer services: Error detection, correction Sharing a broadcast channel: multiple access Link layer addressing Reliable data transfer, flow control: Done!

More information

CS 43: Computer Networks Switches and LANs. Kevin Webb Swarthmore College December 5, 2017

CS 43: Computer Networks Switches and LANs. Kevin Webb Swarthmore College December 5, 2017 CS 43: Computer Networks Switches and LANs Kevin Webb Swarthmore College December 5, 2017 Ethernet Metcalfe s Ethernet sketch Dominant wired LAN technology: cheap $20 for NIC first widely used LAN technology

More information

Typical Network Uses

Typical Network Uses Computer Networks Introduction The next Great Revolution - Computer Networks- computers connected together for exchanging information Our information-oriented society - applications in education, commerce,

More information

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 16

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 16 CMPE 150/L : Introduction to Computer Networks Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 16 1 Final project demo Please do the demo next week to the TAs. So basically you may need

More information

Principles behind data link layer services

Principles behind data link layer services Data link layer Goals: Principles behind data link layer services Error detection, correction Sharing a broadcast channel: Multiple access Link layer addressing Reliable data transfer, flow control: Done!

More information

Principles behind data link layer services:

Principles behind data link layer services: Data link layer Goals: Principles behind data link layer services: Error detection, correction Sharing a broadcast channel: Multiple access Link layer addressing Reliable data transfer, flow control Example

More information

Principles behind data link layer services:

Principles behind data link layer services: Data link layer Goals: Principles behind data link layer services: Error detection, correction Sharing a broadcast channel: Multiple access Link layer addressing Reliable data transfer, flow control Example

More information

Links. CS125 - mylinks 1 1/22/14

Links. CS125 - mylinks 1 1/22/14 Links 1 Goals of Today s Lecture Link-layer services Encoding, framing, and error detection Error correction and flow control Sharing a shared media Channel partitioning Taking turns Random access Shared

More information

Homework 1. Question 1 - Layering. CSCI 1680 Computer Networks Fonseca

Homework 1. Question 1 - Layering. CSCI 1680 Computer Networks Fonseca CSCI 1680 Computer Networks Fonseca Homework 1 Due: 27 September 2012, 4pm Question 1 - Layering a. Why are networked systems layered? What are the advantages of layering? Are there any disadvantages?

More information

The Link Layer and LANs: Ethernet and Swiches

The Link Layer and LANs: Ethernet and Swiches The Link Layer and LNs: Ethernet and Swiches EECS3214 2018-03-21 Link layer, LNs: outline 6.1 introduction, services 6.2 error detection, correction 6.3 multiple access protocols 6.4 LNs addressing, RP

More information

CPE 548 Exam #1 (50 pts) February 17, 2016

CPE 548 Exam #1 (50 pts) February 17, 2016 Name Class: 548 All answers must have supporting work. Any answer without support will receive no credit 1) (4 pts) Answer the following short answer questions. a) Explain the stop and wait ARQ (automatic

More information

Section 3.1: Network Adapters

Section 3.1: Network Adapters Section 3.1: Network Adapters This section examines using a network adapter (network interface card or NIC) to connect a host to the network medium. Students will become familiar with the function of:

More information

The Network Access Layer. In This Lecture. Network Access Layer. Hour 3

The Network Access Layer. In This Lecture. Network Access Layer. Hour 3 The Network Access Layer Hour 3 In This Lecture Explain what the Network Access layer is Discuss how TCP/IP's Network Access layer relates to the OSI networking model Explain what a network architecture

More information

Data Link Layer: Multi Access Protocols

Data Link Layer: Multi Access Protocols Digital Communication in the Modern World Data Link Layer: Multi Access Protocols http://www.cs.huji.ac.il/~com1 com1@cs.huji.ac.il Some of the slides have been borrowed from: Computer Networking: A Top

More information

Chapter 15 Local Area Network Overview

Chapter 15 Local Area Network Overview Chapter 15 Local Area Network Overview LAN Topologies Bus and Tree Bus: stations attach through tap to bus full duplex allows transmission and reception transmission propagates throughout medium heard

More information

CSC 4900 Computer Networks: The Link Layer

CSC 4900 Computer Networks: The Link Layer CSC 4900 Computer Networks: The Link Layer Professor Henry Carter Fall 2017 Last Time We talked about intra-as routing protocols: Which routing algorithm is used in RIP? OSPF? What techniques allow OSPF

More information

Introduction to computer networking

Introduction to computer networking edge core Introduction to computer networking Comp Sci 3600 Security Outline edge core 1 2 edge 3 core 4 5 6 The edge core Outline edge core 1 2 edge 3 core 4 5 6 edge core Billions of connected computing

More information

Layer 2 functionality bridging and switching

Layer 2 functionality bridging and switching Layer 2 functionality bridging and switching BSAD 141 Dave Novak Sources: Network+ Guide to Networks, Dean 2013 Overview Layer 2 functionality Error detection Bridges Broadcast and collision domains How

More information

Internet Architecture and Protocol

Internet Architecture and Protocol Internet Architecture and Protocol Set# 03 Local Area Networks Delivered By: Engr Tahir Niazi Layer Reference to Protocol Application Presentation Session Application FTP, Telnet, SMTP, HTTP, SNMP.. Transport

More information

Medium Access Control Sublayer

Medium Access Control Sublayer Wireless (WLAN) Medium Access Control Sublayer Mahalingam Mississippi State University, MS October 20, 2014 Outline Medium Access Protocols Wireless (WLAN) 1 Medium Access Protocols ALOHA Slotted ALOHA

More information

EECS 122: Introduction to Communication Networks Final Exam Solutions

EECS 122: Introduction to Communication Networks Final Exam Solutions EECS 22: Introduction to Communication Networks Final Exam Solutions Problem. (6 points) How long does it take for a 3000-byte IP packet to go from host A to host B in the figure below. Assume the overhead

More information

Chapter 16 Networking

Chapter 16 Networking Chapter 16 Networking Outline 16.1 Introduction 16.2 Network Topology 16.3 Network Types 16.4 TCP/IP Protocol Stack 16.5 Application Layer 16.5.1 Hypertext Transfer Protocol (HTTP) 16.5.2 File Transfer

More information

ECE 4450:427/527 - Computer Networks Spring 2017

ECE 4450:427/527 - Computer Networks Spring 2017 ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 5.1: Link Layer Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527 Computer

More information

Chapter 4: Network Access. Introduction to Networks v5.1

Chapter 4: Network Access. Introduction to Networks v5.1 Chapter 4: Network Access Introduction to Networks v5.1 4.0 Introduction 4.1 Physical Layer Protocols 4.2 Network Media 4.3 Data Link Layer Protocols 4.4 Media Access Control 4.5 Summary 2013 Cisco and/or

More information

Link Layer and Ethernet

Link Layer and Ethernet Link Layer and Ethernet 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross traceroute Data Link Layer Multiple

More information

Goal and Outline. Computer Networking. What Do We Need? Today s Story Lecture 3: Packet Switched Networks Peter Steenkiste

Goal and Outline. Computer Networking. What Do We Need? Today s Story Lecture 3: Packet Switched Networks Peter Steenkiste Goal and Outline 15-441 15-641 Computer Networking Lecture 3: Packet Switched Networks Peter Steenkiste Fall 2016 www.cs.cmu.edu/~prs/15 441 F16 Goal: gain a basic understanding of how you can build a

More information

King Fahd University of Petroleum and Minerals College of Computer Sciences and Engineering Department of Computer Engineering

King Fahd University of Petroleum and Minerals College of Computer Sciences and Engineering Department of Computer Engineering Student Name: Section #: King Fahd University of Petroleum and Minerals College of Computer Sciences and Engineering Department of Computer Engineering COE 344 Computer Networks (T072) Final Exam Date

More information

Layering in Networked computing. OSI Model TCP/IP Model Protocols at each layer

Layering in Networked computing. OSI Model TCP/IP Model Protocols at each layer Layering in Networked computing OSI Model TCP/IP Model Protocols at each layer Learning outcomes Understand the need of layering in Networked computing Understand the OSI model and the tcp/ip model Understand

More information

Link Layer and Ethernet

Link Layer and Ethernet Link Layer and Ethernet 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross traceroute Data Link Layer Multiple

More information

Chapter 4: network layer. Network service model. Two key network-layer functions. Network layer. Input port functions. Router architecture overview

Chapter 4: network layer. Network service model. Two key network-layer functions. Network layer. Input port functions. Router architecture overview Chapter 4: chapter goals: understand principles behind services service models forwarding versus routing how a router works generalized forwarding instantiation, implementation in the Internet 4- Network

More information

Communication Networks

Communication Networks Communication Networks Nicholas Honeth (nicholash@ics.kth.se) Contents of the series Lecture 10 - Recap of the networks we ve seen so far - OSI model - Circuit and packet switching - Physical media Lecture

More information

The MAC Address Format

The MAC Address Format Directing data is what addressing is all about. At the Data Link layer, this is done by pointing PDUs to the destination MAC address for delivery of a frame within a LAN. The MAC address is the number

More information

Study Guide. Module Two

Study Guide. Module Two Module Two Study Guide Study Guide Contents Part One -- Textbook Questions Part Two -- Assignment Questions Part Three -- Vocabulary Chapter 4 Data Link Layer What is the function of the data link layer?

More information

Link layer, LANs: outline. Chapter 5-1 Link Layer. Link layer: introduction. Link layer services

Link layer, LANs: outline. Chapter 5-1 Link Layer. Link layer: introduction. Link layer services Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Link layer, LANs: outline 5.1 introduction, services 5.2 error detection, correction

More information

Data Communication. Introduction

Data Communication. Introduction Data Communication Introduction Course Information Assistant Instructor Reza Hassanpour Faris Serdar Taşel Office: L214 Office: L205 Phone: 2331338 Phone: 2331357 Email: reza@cankaya.edu.tr Email: fst@cankaya.edu.tr

More information

CSC 401 Data and Computer Communications Networks

CSC 401 Data and Computer Communications Networks CSC 401 Data and Computer Communications Networks Link Layer: Intro, Errors, Multiple Access Sec 6.1, 6.2, 6.3 Prof. Lina Battestilli Fall 2017 Chapter 6: Link layer Goals: understand principles behind

More information

Data Link Layer. Our goals: understand principles behind data link layer services: instantiation and implementation of various link layer technologies

Data Link Layer. Our goals: understand principles behind data link layer services: instantiation and implementation of various link layer technologies Data Link Layer Our goals: understand principles behind data link layer services: link layer addressing instantiation and implementation of various link layer technologies 1 Outline Introduction and services

More information

Chapter 6 The Link Layer and LANs

Chapter 6 The Link Layer and LANs Chapter 6 The Link Layer and LANs A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the

More information

Network Model. Why a Layered Model? All People Seem To Need Data Processing

Network Model. Why a Layered Model? All People Seem To Need Data Processing Network Model Why a Layered Model? All People Seem To Need Data Processing Layers with Functions Packet Propagation Each router provides its services to support upper-layer functions. Headers (Encapsulation

More information

Summary of MAC protocols

Summary of MAC protocols Summary of MAC protocols What do you do with a shared media? Channel Partitioning, by time, frequency or code Time Division, Code Division, Frequency Division Random partitioning (dynamic) ALOHA, S-ALOHA,

More information

COMPONENTS OF DATA COMMUNICATION

COMPONENTS OF DATA COMMUNICATION COMPONENTS OF DATA COMMUNICATION ANALOG AND DIGITAL TRANSMISSION An analog signal is one that is continuous with respect to time and may take on any value within a given range of values. Eg Human voice.

More information

Chapter 4: Network Access

Chapter 4: Network Access 4.0.1.1 Chapter 4: Network Access To support our communication, the OSI model divides the functions of a data network into layers. Each layer works with the layers above and below to transmit data. 4.0.1.2

More information

CPE 448/548 Exam #1 (100 pts) February 14, Name Class: 448

CPE 448/548 Exam #1 (100 pts) February 14, Name Class: 448 Name Class: 448 1) (14 pts) A message M = 11001 is transmitted from node A to node B using the CRC code. The CRC generator polynomial is G(x) = x 3 + x 2 + 1 ( bit sequence 1101) a) What is the transmitted

More information

OSI Reference Model. Computer Networks lab ECOM Prepared By : Eng. Motaz Murtaja Eng. Ola Abd Elatief

OSI Reference Model. Computer Networks lab ECOM Prepared By : Eng. Motaz Murtaja Eng. Ola Abd Elatief Islamic University of Gaza Faculty of Engineering Computer Engineering Department Computer Networks lab ECOM 4121 OSI Reference Model Prepared By : Eng. Motaz Murtaja Eng. Ola Abd Elatief May /2010 OSI

More information

ITEC 3210 M - Applied Data Communications and Networks. Professor: Younes Benslimane, Ph.D.

ITEC 3210 M - Applied Data Communications and Networks. Professor: Younes Benslimane, Ph.D. ITEC 3210 M - Applied Data Communications and Networks Professor: Younes Benslimane, Ph.D. Midterm Exam February 11 th 2013 Instructions Duration: 1 hour 20 minutes Answer all questions No documentation

More information

Objectives. Hexadecimal Numbering and Addressing. Ethernet / IEEE LAN Technology. Ethernet

Objectives. Hexadecimal Numbering and Addressing. Ethernet / IEEE LAN Technology. Ethernet 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Objectives Ethernet Network Fundamentals Chapter 9 ITE PC v4.0 Chapter 1 1 Introduce Hexadecimal number system Describe the features of various

More information

Networking interview questions

Networking interview questions Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected

More information

Internet A Brief Tutorial. Jean Walrand EECS U.C. Berkeley

Internet A Brief Tutorial. Jean Walrand EECS U.C. Berkeley Internet A Brief Tutorial Jean Walrand EECS U.C. Berkeley Contents History Key Ideas Protocols Technology Research History 1962 L. Kleinrock proposes Packet Switching 1966 L. Roberts proposes architecture

More information

Islamic University of Gaza Faculty of Engineering Department of Computer Engineering ECOM 4021: Networks Discussion. Chapter 2.

Islamic University of Gaza Faculty of Engineering Department of Computer Engineering ECOM 4021: Networks Discussion. Chapter 2. Islamic University of Gaza Faculty of Engineering Department of Computer Engineering ECOM 4021: Networks Discussion Chapter 2 Getting Connected Eng. Haneen El-Masry March, 2014 2.2 ENCODING Encoding the

More information

The Link Layer and LANs. Chapter 6: Link layer and LANs

The Link Layer and LANs. Chapter 6: Link layer and LANs The Link Layer and LANs EECS3214 2018-03-14 4-1 Chapter 6: Link layer and LANs our goals: understand principles behind link layer services: error detection, correction sharing a broadcast channel: multiple

More information

CCNA Exploration1 Chapter 7: OSI Data Link Layer

CCNA Exploration1 Chapter 7: OSI Data Link Layer CCNA Exploration1 Chapter 7: OSI Data Link Layer LOCAL CISCO ACADEMY ELSYS TU INSTRUCTOR: STELA STEFANOVA 1 Explain the role of Data Link layer protocols in data transmission; Objectives Describe how the

More information

Lecture 20: Link Layer

Lecture 20: Link Layer Lecture 20: Link Layer COMP 332, Spring 2018 Victoria Manfredi Acknowledgements: materials adapted from Computer Networking: A Top Down Approach 7 th edition: 1996-2016, J.F Kurose and K.W. Ross, All Rights

More information

CS 204: Advanced Computer Networks

CS 204: Advanced Computer Networks CS 204: Advanced Computer Networks Jiasi Chen Lectures: MWF 12:10-1pm Humanities and Social Sciences 1403 http://www.cs.ucr.edu/~jiasi/teaching/cs204_spring17/ 1 Why Networks? Supports the applications

More information

Area Covered is small Area covered is large. Data transfer rate is high Data transfer rate is low

Area Covered is small Area covered is large. Data transfer rate is high Data transfer rate is low Chapter 15 Networking Concepts 1. Define networking. It is the interconnection of independent computing devices for sharing of information over shared medium. 2. What is the need for networking? / What

More information

CCNA Exploration Network Fundamentals. Chapter 09 Ethernet

CCNA Exploration Network Fundamentals. Chapter 09 Ethernet CCNA Exploration Network Fundamentals Chapter 09 Ethernet Updated: 07/07/2008 1 9.0.1 Introduction 2 9.0.1 Introduction Internet Engineering Task Force (IETF) maintains the functional protocols and services

More information

Chapter 5 Link Layer and LANs

Chapter 5 Link Layer and LANs Chapter 5 Link Layer and LANs Computer Networking: A Top Down Approach 4 th edition. Jim Kurose, Keith Ross Addison-Wesley, July 2007. All material copyright 1996-2007 J.F Kurose and K.W. Ross, All Rights

More information

Last Lecture: Data Link Layer

Last Lecture: Data Link Layer Last Lecture: Data Link Layer 1. Design goals and issues 2. (More on) Error Control and Detection 3. Multiple Access Control (MAC) 4. Ethernet, LAN Addresses and ARP 5. Hubs, Bridges, Switches 6. Wireless

More information

CSCI 466 Midterm Networks Fall 2011

CSCI 466 Midterm Networks Fall 2011 CSCI 466 Midterm Networks Fall 2011 Name: This exam consists of 7 problems on the following 9 pages. You may use your single- sided hand- written 8 ½ x 11 note sheet and a calculator during the exam. No

More information

IT220 Network Standards & Protocols. Unit 4: Chapter 4 Transmitting Bits

IT220 Network Standards & Protocols. Unit 4: Chapter 4 Transmitting Bits 1 IT220 Network Standards & Protocols Unit 4: Chapter 4 Transmitting Bits Objectives Differentiate among major types of LAN and WAN technologies and specifications and determine how each is used in a data

More information

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과.

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과. Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과 ahn@venus.uos.ac.kr Data Link Layer Goals: understand principles behind data link layer services: error detection, correction sharing a broadcast channel: multiple

More information

Network Management & Monitoring

Network Management & Monitoring Network Management & Monitoring Network Delay These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/) End-to-end

More information

TCOM 370 NOTES 99-1 NETWORKING AND COMMUNICATIONS

TCOM 370 NOTES 99-1 NETWORKING AND COMMUNICATIONS TCOM 370 NOTES 99-1 NETWORKING AND COMMUNICATIONS Communication Networks Allow Exchange of Information between Users telephone network for voice communication interconnected computers and peripherals,

More information

Ethernet. Lecture 6. Outline. Ethernet - Physical Properties. Ethernet - Physical Properties. Ethernet

Ethernet. Lecture 6. Outline. Ethernet - Physical Properties. Ethernet - Physical Properties. Ethernet Lecture 6 Ethernet Reminder: Homework 2, Programming Project 2 due on 9/20/12. Thick-net Thin-net Twisted Pair Thursday, September 13 CS 475 Networks - Lecture 6 1 Thursday, September 13 CS 475 Networks

More information

Lecture 8 Link Layer: functionality, error detection, media access algorithm

Lecture 8 Link Layer: functionality, error detection, media access algorithm Lecture 8 Link Layer: functionality, error detection, media access algorithm From Kurose & Ross Book slightly modified by Romaric Duvignau duvignau@chalmers.se Thanks and enjoy! JFK/KWR All material copyright

More information

10- and 100-Mbps Ethernet

10- and 100-Mbps Ethernet Ethernet Basics 10-Mbps Ethernet Three 10-Mbps Ethernet standards: 10BASE5 10BASE2 10BASE-T 10BASE2 and 10BASE5 were around more than 20 years and have been replaced by newer alternatives 10BASE-T s use

More information

COMPUTER NETWORKS UNIT I. 1. What are the three criteria necessary for an effective and efficient networks?

COMPUTER NETWORKS UNIT I. 1. What are the three criteria necessary for an effective and efficient networks? Question Bank COMPUTER NETWORKS Short answer type questions. UNIT I 1. What are the three criteria necessary for an effective and efficient networks? The most important criteria are performance, reliability

More information

The Internet software layers

The Internet software layers 1 2 The Internet software layers SMTP, Telnet, FTP, POP3, IMAP TCP, UDP IP: RIP, BGP, OSPF Ethernet, Wireless LAN, Token Ring Twisted pair, coaxial, microwave, optical fiber 3 4 Ethernet 1973 Xerox s researcher

More information

RAJIV GANDHI COLLEGE OF ENGINEERING AND TECHNOLOGY

RAJIV GANDHI COLLEGE OF ENGINEERING AND TECHNOLOGY RAJIV GANDHI COLLEGE OF ENGINEERING AND TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING QUESTION BANK SUBJECT NAME: COMPUTER NETWORKS SUBJECT CODE: CST52 UNIT-I 2 MARKS 1. What is Network? 2.

More information

Lecture 6 Datalink Framing, Switching. From Signals to Packets

Lecture 6 Datalink Framing, Switching. From Signals to Packets Lecture 6 Datalink Framing, Switching David Andersen Department of Computer Science Carnegie Mellon University 15-441 Networking, Spring 2005 http://www.cs.cmu.edu/~srini/15-441/s05/ 1 From Signals to

More information

Frequency: it refers to the number of periods in 1 s. It is formally expressed in Hertz (Hz)

Frequency: it refers to the number of periods in 1 s. It is formally expressed in Hertz (Hz) Chapter2: Peak amplitude: it is the absolute value of the highest intensity. Frequency: it refers to the number of periods in 1 s. It is formally expressed in Hertz (Hz) Phase: it describes the position

More information

CSE 123: Computer Networks

CSE 123: Computer Networks Student Name: PID: UCSD email: CSE 123: Computer Networks Homework 1 Solution (Due 10/12 in class) Total Points: 30 Instructions: Turn in a physical copy at the beginning of the class on 10/10. Problems:

More information

ET4254 Communications and Networking 1

ET4254 Communications and Networking 1 Topic 10:- Local Area Network Overview Aims:- LAN topologies and media LAN protocol architecture bridges, hubs, layer 2 & 3 switches 1 LAN Applications (1) personal computer LANs low cost limited data

More information

Internetwork Basic. Possible causes of LAN traffic congestion are

Internetwork Basic. Possible causes of LAN traffic congestion are Internetworking 1 C H A P T E R 2 Internetworking Basics Internetworking Model The OSI Reference Model Ethernet Networking Wireless Networking Data Encapsulation Topic 3 1 Internetwork Basic 4 Possible

More information

Router Router Microprocessor controlled traffic direction home router DSL modem Computer Enterprise routers Core routers

Router Router Microprocessor controlled traffic direction home router DSL modem Computer Enterprise routers Core routers Router Router is a Microprocessor controlled device that forwards data packets across the computer network. It is used to connect two or more data lines from different net works. The function of the router

More information

WiFi Networks: IEEE b Wireless LANs. Carey Williamson Department of Computer Science University of Calgary Winter 2018

WiFi Networks: IEEE b Wireless LANs. Carey Williamson Department of Computer Science University of Calgary Winter 2018 WiFi Networks: IEEE 802.11b Wireless LANs Carey Williamson Department of Computer Science University of Calgary Winter 2018 Background (1 of 2) In many respects, the IEEE 802.11b wireless LAN (WLAN) standard

More information

4.1 Introduction to Media and Devices

4.1 Introduction to Media and Devices Chapter 4 Network Hardware 4.1 Introduction to Media and Devices Many of the issues discussed in this course, such as topology, scalability, and speed, depend on hardware. Unlike many of your computer

More information

Lecture 4. Data Transmission Modes and Switching. Data Transmission & Switching 1-1

Lecture 4. Data Transmission Modes and Switching. Data Transmission & Switching 1-1 Lecture 4 Data Transmission Modes and Switching Data Transmission & Switching 1-1 Agenda Introduction to Data Transmission Modes Parallel and Serial Transmission Transmission Media Guided and unguided

More information

Chapter 5 Link Layer. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

Chapter 5 Link Layer. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Chapter 5 Link Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations; and can

More information

Internet, Education, and Collaboration of USP. Kazunori Sugiura Sept 9 th 2002

Internet, Education, and Collaboration of USP. Kazunori Sugiura Sept 9 th 2002 Internet, Education, and Collaboration of USP Kazunori Sugiura uhyo@sfc.wide.ad.jp Sept 9 th 2002 Last lecture in USP Importance of better internet connectivity What kind of problem do we have Discuss

More information

Computer Networks. Today. Principles of datalink layer services Multiple access links Adresavimas, ARP LANs Wireless LANs VU MIF CS 1/48 2/48

Computer Networks. Today. Principles of datalink layer services Multiple access links Adresavimas, ARP LANs Wireless LANs VU MIF CS 1/48 2/48 Computer Networks VU MIF CS 1/48 Today Principles of datalink layer services Multiple access links Adresavimas, ARP LANs Wireless LANs 2/48 1 Link layer: introduction terminology: hosts and routers: nodes

More information

Medium Access Protocols

Medium Access Protocols Medium Access Protocols Summary of MAC protocols What do you do with a shared media? Channel Partitioning, by time, frequency or code Time Division,Code Division, Frequency Division Random partitioning

More information

Local Area Network Overview

Local Area Network Overview Local Area Network Overview Chapter 15 CS420/520 Axel Krings Page 1 LAN Applications (1) Personal computer LANs Low cost Limited data rate Back end networks Interconnecting large systems (mainframes and

More information

WEEK 9 TCP/IP, PHYSICAL AND DATA LINK LAYERS

WEEK 9 TCP/IP, PHYSICAL AND DATA LINK LAYERS WEEK 9 TCP/IP, PHYSICAL AND DATA LINK LAYERS PHYSICAL LAYER Physical (hardware) layer: lowest level layer of the Internet Model. - Contains the actual network hardware cables, antennas, network interfaces

More information

Computer Networks and the Internet. CMPS 4750/6750: Computer Networks

Computer Networks and the Internet. CMPS 4750/6750: Computer Networks Computer Networks and the Inter CMPS 4750/6750: Computer Networks Outline What Is the Inter? Access Networks Packet Switching and Circuit Switching A closer look at delay, loss, and throughput Interconnection

More information

CS 421: COMPUTER NETWORKS SPRING FINAL May 16, minutes

CS 421: COMPUTER NETWORKS SPRING FINAL May 16, minutes CS 4: COMPUTER NETWORKS SPRING 03 FINAL May 6, 03 50 minutes Name: Student No: Show all your work very clearly. Partial credits will only be given if you carefully state your answer with a reasonable justification.

More information

Chapter 12. Network Organization and Architecture

Chapter 12. Network Organization and Architecture Chapter 12 Network Organization and Architecture Chapter 12 Objectives Learn the basic physical components of networks. Become familiar with routing protocols. 2 Computer networks are often classified

More information

1/29/2008. From Signals to Packets. Lecture 6 Datalink Framing, Switching. Datalink Functions. Datalink Lectures. Character and Bit Stuffing.

1/29/2008. From Signals to Packets. Lecture 6 Datalink Framing, Switching. Datalink Functions. Datalink Lectures. Character and Bit Stuffing. /9/008 From Signals to Packets Lecture Datalink Framing, Switching Peter Steenkiste Departments of Computer Science and Electrical and Computer Engineering Carnegie Mellon University Analog Signal Digital

More information

Lecture 6. Reminder: Homework 2, Programming Project 2 due on Thursday. Questions? Tuesday, September 13 CS 475 Networks - Lecture 6 1

Lecture 6. Reminder: Homework 2, Programming Project 2 due on Thursday. Questions? Tuesday, September 13 CS 475 Networks - Lecture 6 1 Lecture 6 Reminder: Homework 2, Programming Project 2 due on Thursday. Questions? Tuesday, September 13 CS 475 Networks - Lecture 6 1 Outline Chapter 2 - Getting Connected 2.1 Perspectives on Connecting

More information

Chapter 2 Communicating Over the Network

Chapter 2 Communicating Over the Network Chapter 2 Communicating Over the Network Elements of Communication Communicating the Messages Continuous stream of bits 00101010100101010101010101010101010 I have to wait Single communications (e.g. video,

More information