Jaringan Komputer. Network Layer. Network Layer. Network Layer. Network Layer Design Issues. Store-and-Forward Packet Switching

Size: px
Start display at page:

Download "Jaringan Komputer. Network Layer. Network Layer. Network Layer. Network Layer Design Issues. Store-and-Forward Packet Switching"

Transcription

1 Network Layer Jaringan Komputer Network Layer Concerned with getting packets from the source all the way to the destination May require making many hops at intermediate routers along the way Contrasts with that of the data link layer, which has the more modest goal of just moving frames from one end of a wire to the other Is the lowest layer that deals with end-toend transmission. Network Layer Must know about the topology of the communication subnet (i.e., the set of all routers) Choose appropriate paths through subnet Must take care to choose routes to avoid overloading some of the communication lines and routers while leaving others idle Deal with problems when the source and destination are in different networks Network Layer Design Issues Store-and-Forward Packet Switching Services Provided to the Transport Layer Implementation of Connectionless Service Implementation of Connection-Oriented Service Comparison of Virtual-Circuit and Datagram Subnets Store-and-Forward Packet Switching environment of the network layer protocols Store-and-Forward Packet Switching A host with a packet to send transmits it to the nearest router, either on its own LAN or over a point-to-point link to the carrier The packet is stored there until it has fully arrived so the checksum can be verified Then it is forwarded to the next router along the path until it reaches the destination host, where it is delivered This mechanism is store-and-forward packet switching

2 Services Provided to the Transport Layer The network layer services have been designed with the following goals: 1. The services should be independent of the router technology. 2. The transport layer should be shielded from the number, type, and topology of the routers present. 3. The network addresses made available to the transport layer should use a uniform numbering, even across LANs and WANs. Services Provided to the Transport Layer Network layer should provide either connection-oriented service or connectionless service Services Provided to the Transport Layer Internet community: routers' job is moving packets around and nothing else subnet is inherently unreliable network is unreliable (need error control & flow control) network service should be connectionless, with primitives SEND PACKET,RECEIVE PACKET and little else no packet ordering each packet must carry the full destination address, because each packet sent is carried independently The Internet offers connectionless networklayer service Services Provided to the Transport Layer Telephone companies: subnet should provide a reliable, connectionoriented service quality of service is the dominant factor, and without connections in the subnet, quality of service is very difficult to achieve, especially for real-time traffic such as voice and video ATM networks offer connectionoriented network-layer service Implementation of Connectionless Service Routing within a datagram subnet. Implementation of Connectionless Service Packets are injected into the subnet individually and routed independently of each other. No advance setup is needed. The packets are frequently called datagrams (in analogy with telegrams) and the subnet is called a datagram subnet The algorithm that manages the tables and makes the routing decisions is called the routing algorithm

3 Implementation of Connection- Oriented Service Routing within a virtual-circuit subnet. Implementation of Connection- Oriented Service A path from the source router to the destination router must be established before any data packets can be sent This connection is called a VC (virtual circuit), in analogy with the physical circuits set up by the telephone system, and the subnet is called a virtual-circuit subnet VC avoid having to choose a new route for every packet sent. When a connection is established, a route from the source machine to the destination machine is chosen as part of the connection setup and stored in tables inside the routers Implementation of Connection- Oriented Service Comparison of Virtual-Circuit and The route is used for all traffic flowing over the connection, exactly the same way that the telephone system works. When the connection is released, the virtual circuit is also terminated. With connection-oriented service, each packet carries an identifier telling which virtual circuit it belongs to Any conflict should be avoided Routers need the ability to replace connection identifiers in outgoing packets. In some contexts, this is called label switching. Comparison of Virtual-Circuit and Trade-off between router memory space and bandwidth VC allow packets to contain circuit numbers instead of full destination addresses If the packets tend to be fairly short, a full destination address in every packet may represent a significant amount of overhead and hence, wasted bandwidth The price paid for using virtual circuits internally is the table space within the routers. Depending upon the relative cost of communication circuits versus router memory, one or the other may be cheaper. Comparison of Virtual-Circuit and Trade-off between setup time and address parsing time Using VC requires a setup phase, which takes time and consumes resources. However, figuring out what to do with a data packet in a virtual-circuit subnet is easy: the router just uses the circuit number to index into a table to find out where the packet goes. In a datagram subnet, a more complicated lookup procedure is required to locate the entry for the destination.

4 Comparison of Virtual-Circuit and The amount of table space required in router memory A datagram subnet needs to have an entry for every possible destination VC subnet just needs an entry for each virtual circuit Routing Algorithms The main function of the network layer is routing packets from the source to destination In most subnets, packets will require multiple hops to make the journey. The only notable exception is for broadcast networks, but even here routing is an issue if the source and destination are not on the same network. Routing algorithm is part of the network layer software responsible for deciding which output line an incoming packet should be transmitted on Routing Algorithms Datagram Route must be made anew for every arriving data packet since the best route may have changed since last time VC Routing decisions are made only when a new virtual circuit is being set up. Thereafter, data packets just follow the previously-established route. This is sometimes called session routing because a route remains in force for an entire session Routing Algorithms Router have two processes: Forwarding: handles each packet as it arrives, looking up the outgoing line to use for it in the routing tables The other process is responsible for filling in and updating the routing tables. That is where the routing algorithm comes into play Certain properties are desirable in a routing algorithm: correctness, simplicity, robustness, stability, fairness, and optimality Routing Algorithms Conflict between fairness and optimality. Routing Algorithms Two classes of routing algorithms: Non-adaptive Adaptive

5 Non-adaptive Do not base the routing decisions on measurements or estimates of the current traffic and topology The choice of the route is computed in advance, off-line, and downloaded to the routers when the network is booted Sometimes called static routing. Adaptive Change the routing decisions to reflect changes in the topology, and usually the traffic as well Differ in: where they get their information (locally, from adjacent routers, from all routers), when they change the routes (e.g., every T sec, when the load changes or when the topology changes) what metric is used for optimization (e.g., distance, number of hops, or estimated transit time) Routing Algorithms The Optimality Principle Shortest Path Routing Flooding Distance Vector Routing Link State Routing Hierarchical Routing Broadcast Routing Multicast Routing Routing for Mobile Hosts Routing in Ad Hoc Networks The Optimality Principle General statement about optimal routes without regard to network topology or traffic if router J is on the optimal path from router I to router K, then the optimal path from J to K also falls along the same route As a direct consequence of the optimality principle, the set of optimal routes from all sources to a given destination form a tree rooted at the destination Such a tree is called a sink tree, where the distance metric is the number of hops The Optimality Principle (a) A subnet. (b) A sink tree for router B. Shortest Path Routing Find shortest/fastest path from source to destination Metrics: Basic: Hops Physical distance Advance: Bandwidth Average traffic Communication cost Mean queue length Measured delay

6 Flooding Every incoming packet is sent out on every outgoing line except the one it arrived on Hop counter contained in the header of each packet, which is decremented at each hop, with the packet being discarded when the counter reaches zero. The counter can be initialized to the worst case, namely, the full diameter of the subnet To keep track of which packets have been flooded, to avoid sending them out a second time, using sequence number Selective flooding: variation of flooding that is slightly more practical routers do not send every incoming packet out on every line, only on those lines that are going approximately in the right direction Distance Vector Routing Dynamic algorithm Each router maintain a table (i.e, a vector) giving the best known distance to each destination and which line to use to get there. These tables are updated by exchanging information with the neighbors Each router maintains a routing table indexed by, and containing one entry for, each router in the subnet This entry contains two parts: the preferred outgoing line to use for that destination and an estimate of the time or distance to that destination The metric used might be number of hops, time delay in milliseconds, total number of packets queued along the path, or something similar Link State Routing Replacing DVR Each router must do the following: Discover its neighbors, learn their network address. Measure the delay or cost to each of its neighbors. Construct a packet telling all it has just learned. Send this packet to all other routers. Compute the shortest path to every other router. Hierarchical Routing Network may grow to the point where it is no longer feasible for every router to have an entry for every other router, so the routing will have to be done hierarchically, as it is in the telephone network Routers are divided into what we will call regions, with each router knowing all the details about how to route packets to destinations within its own region, but knowing nothing about the internal structure of other regions It may be necessary to group the regions into clusters, the clusters into zones, the zones into groups, and so on, until we run out of names for aggregations Broadcast Routing Hosts need to send messages to many or all other hosts Simplest: the source to simply send a distinct packet to each destination wasteful of bandwidth requires the source to have a complete list of all destinations Flooding Multidestination routing Spanning Tree Reverse path forwarding Multicast Routing Some applications require that widely-separated processes work together in groups, it is frequently necessary for one process to send a message to all the other members of the group If the group is small, it can just send each other member a point-to-point message If the group is large: Broadcasting Spanning Tree Pruning

7 Routing for Mobile Hosts A WAN to which LANs, MANs, and wireless cells are attached. Routing for Mobile Hosts Packet routing for mobile users Routing in Ad Hoc Networks Possibilities when the routers are mobile: Military vehicles on battlefield. No infrastructure. A fleet of ships at sea. All moving all the time Emergency works at earthquake. The infrastructure destroyed. A gathering of people with notebook computers. In an area lacking Routing in Ad Hoc Networks Route Discovery Route Request Route Reply Route Maintenance Active neighbors Reading Computer Networks, Fourth Edition By Andrew S. Tanenbaum Congestion Control Algorithms General Principles of Congestion Control Congestion Prevention Policies Congestion Control in Virtual-Circuit Subnets Congestion Control in Load Shedding Jitter Control

8 Congestion When too much traffic is offered, congestion sets in and performance degrades sharply. Factors: Congestion Long queue Memory (but infinite memory make things worse) Slow processors Low-bandwidth lines Upgrading part, but not all, of the system, often just moves the bottleneck somewhere else. The real problem is frequently a mismatch between parts of the system. This problem will persist until all the components are in balance Congestion Control Flow Control Congestion control has to do with making sure the subnet is able to carry the offered traffic It is a global issue, involving the behavior of all the hosts, all the routers, the store-and-forwarding processing within the routers, and all the other factors that tend to diminish the carrying capacity of the subnet. Flow control, in contrast, relates to the point-to-point traffic between a given sender and a given receiver Its job is to make sure that a fast sender cannot continually transmit data faster than the receiver is able to absorb it Flow control frequently involves some direct feedback from the receiver to the sender to tell the sender how things are doing at the other end General Principles of Congestion Control Solutions in complex problem from a control theory point of view: Open Loop: attempt to solve the problem by good design to make sure problem does not occur in the first place Closed Loop: based on the concept of a feedback loop Closed Loop solution for Congestion: Monitor the system: detect when and where congestion occurs. Pass information to where action can be taken. Adjust system operation to correct the problem Variety of metrics can be used to monitor for congestion percentage of all packets discarded for lack of buffer space the average queue lengths the number of packets that time out and are retransmitted average packet delay Taxonomy of Congestion Control Algorithm Yang and Reddy (1995) have developed a taxonomy for congestion control algorithms open loop act at the source act at the destination closed loop explicit feedback: packets are sent back from the point of congestion to warn the source implicit feedback. the source deduces the existence of congestion by making local observations, such as the time needed for acknowledgements to come back. Congestion means the load is greater than the resources can handle. Two solutions come to mind increase the resources: sometimes it is not possible to increase the capacity, or it has already been increased to the limit decrease the load: several ways exist to reduce the load, including denying service to some users, degrading service to some or all users, and having users schedule their demands in a more predictable way. Congestion Prevention Policies Policies that affect congestion. Open Loop 5-26

9 Congestion Control in Virtual- Circuit Subnets Admission control: keep congestion that has already started from getting worse Idea: once congestion has been signaled, no more virtual circuits are set up until the problem has gone away Attempts to set up new transport layer connections fail This approach is crude, it is simple and easy to carry out In the telephone system, when a switch gets overloaded, it also practices admission control by not giving dial tones. Congestion Control in Virtual- Circuit Subnets Allow new virtual circuits but carefully route all new virtual circuits around problem areas (a) A congested subnet (b) (b) A redrawn subnet, eliminates congestion and a virtual circuit from A to B. Congestion Control in Virtual- Circuit Subnets Negotiate an agreement between the host and subnet when a virtual circuit is set up Specifies the volume and shape of the traffic, quality of service required, and other parameters Subnet will typically reserve resources along the path when the circuit is set up. These resources can include table and buffer space in the routers and bandwidth on the lines In this way, congestion is unlikely to occur on the new virtual circuits because all the necessary resources are guaranteed to be available. This reservation can be done all the time as standard operating procedure: tends to waste resources only when the subnet is congested Congestion Control in Can also be used in virtual-circuit subnets Idea: each router can easily monitor the utilization of its output lines and other resources it can associate with each line a real variable, u, whose value, between 0.0 and 1.0, reflects the recent utilization of that line Whenever u moves above the threshold, the output line enters a ''warning'' state. Each newly-arriving packet is checked to see if its output line is in warning state. If it is, some action is taken Congestion Control in The Warning Bit Old DECNET architecture signaled the warning state by setting a special bit in the packet's header When the packet arrived at its destination, the transport entity copied the bit into the next acknowledgement sent back to the source. The source then cut back on traffic. As long as the router was in the warning state, it continued to set the warning bit The source monitored the fraction of acknowledgements with the bit set and adjusted its transmission rate accordingly As long as the warning bits continued to flow in, the source continued to decrease its transmission rate When they slowed to a trickle, it increased its transmission rate Note that since every router along the path could set the warning bit, traffic increased only when no router was in trouble Congestion Control in Choke Packets The router sends a choke packet back to the source host, giving it the destination found in the packet. When the source host gets the choke packet, it is required to reduce the traffic sent to the specified destination by X percent The host should ignore choke packets referring to that same destination for a fixed time interval After that period has expired, the host listens for more choke packets for another interval If one arrives, the line is still congested, so the host reduces the flow still more and begins ignoring choke packets again. If no choke packets arrive during the listening period, the host may increase the flow again Hop-by-Hop Choke Packets: An alternative approach is to have the choke packet take effect at every hop it passes through

10 Load Shedding When none of the mentioned methods make the congestion disappear Load shedding is a fancy way of saying that when routers are being inundated by packets that they cannot handle, they just throw them away Which packet to discard may depend on the applications running For file transfer, an old packet is worth more than a new one because dropping packet 6 and keeping packets 7 through 10 will cause a gap at the receiver that may force packets 6 through 10 to be retransmitted (if the receiver routinely discards out-of-order packets). In a 12-packet file, dropping 6 may require 7 through 12 to be retransmitted, whereas dropping 10 may require only 10 through 12 to be retransmitted In contrast, for multimedia, a new packet is more important than an old one The former policy (old is better than new) is often called wine and the latter (new is better than old) is often called milk Jitter Control The variation (i.e., standard deviation) in the packet arrival times is called jitter High jitter, for example, having some packets taking 20 msec and others taking 30 msec to arrive will give an uneven quality to the sound or movie The jitter can be bounded by computing the expected transit time for each hop along the path When a packet arrives at a router, the router checks to see how much the packet is behind or ahead of its schedule This information is stored in the packet and updated at each hop If the packet is ahead of schedule, it is held just long enough to get it back on schedule If it is behind schedule, the router tries to get it out the door quickly Jitter Control Packets that are ahead of schedule get slowed down and packets that are behind schedule get speeded up, in both cases reducing the amount of jitter In some applications, such as video on demand, jitter can be eliminated by buffering at the receiver and then fetching data for display from the buffer instead of from the network in real time However, for other applications, especially those that require real-time interaction between people such as Internet telephony and videoconferencing, the delay inherent in buffering is not acceptable Quality of Service Requirements Techniques for Achieving Good Quality of Service Integrated Services Differentiated Services Label Switching and MPLS Requirements Reduce congestion improve network performance How stringent/strict the quality-of-service requirements are. Flows vs. QoS in ATM ATM networks classify flows in four broad categories with respect to their QoS demands as follows: Constant bit rate (e.g., telephony). Real-time variable bit rate (e.g., compressed videoconferencing). Non-real-time variable bit rate (e.g., watching a movie over the Internet). Available bit rate (e.g., file transfer).

11 Techniques for Achieving Good Quality of Service Overprovisioning Buffering Traffic Shaping The Leaky Bucket Algorithm The Token Bucket Algorithm Resource Reservation Admission Control Proportional Routing Packet Scheduling Overprovisioning An easy solution is to provide so much router capacity, buffer space, and bandwidth that the packets just fly through easily The trouble with this solution is that it is expensive. As time goes on and designers have a better idea of how much is enough, this technique may even become practical To some extent, the telephone system is overprovisioned It is rare to pick up a telephone and not get a dial tone instantly There is simply so much capacity available there that demand can always be met Buffering Traffic Shaping Flows can be buffered on the receiving side before being delivered It smooths out the jitter Smoothing the output stream by buffering packets. Smooths out the traffic on the server side, rather than on the client side Regulating the average rate (and burstiness) of data transmission Contrast: sliding window protocols limit the amount of data in transit at once, not the rate at which it is sent The Leaky Bucket Algorithm = single-server queueing system with constant service time The Token Bucket Algorithm (a) A leaky bucket with water. (b) a leaky bucket with packets. Allow the output to speed up somewhat when large bursts arrive For a packet to be transmitted, it must capture and destroy one token Allow save up permission to send large bursts, up to the maximum size of the bucket Throws away tokens (i.e., transmission capacity) when the bucket fills up but never discards packets

12 Resource Reservation Once we have a specific route for a flow, it becomes possible to reserve resources along that route to make sure the needed capacity is available. Three different kinds of resources can potentially be reserved: Bandwidth. Buffer space. CPU cycles Admission Control Router has to decide, based on its capacity and how many commitments it has already made for other flows, whether to admit or reject the flow. Flows must be described accurately in terms of specific parameters that can be negotiated An example of flow specification Proportional Routing To provide a higher quality of service is to split the traffic for each destination over multiple paths Use locally-available information A simple method is to divide the traffic equally or in proportion to the capacity of the outgoing links Packet Scheduling Fair queueing algorithm: routers have separate queues for each output line, one for each flow. When a line becomes idle, the router scans the queues round robin (a) A router with five packets queued for line O. (b) Finishing times for the five packets.

Chapter 5 (Week 9) The Network Layer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP BLM431 Computer Networks Dr.

Chapter 5 (Week 9) The Network Layer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP BLM431 Computer Networks Dr. Chapter 5 (Week 9) The Network Layer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP. 343-396 1 5.1. NETWORK LAYER DESIGN ISSUES 5.2. ROUTING ALGORITHMS 5.3. CONGESTION CONTROL ALGORITHMS 5.4.

More information

Outline EEC-682/782 Computer Networks I. Midterm 1 Statistics. Midterm 1 Statistics. High 99, Low 34, Average 66

Outline EEC-682/782 Computer Networks I. Midterm 1 Statistics. Midterm 1 Statistics. High 99, Low 34, Average 66 Outline EEC-682/782 Computer Networks I Lecture 12 Wenbing Zhao w.zhao1@csuohio.edu http://academic.csuohio.edu/zhao_w/teaching/eec682.htm (Lecture nodes are based on materials supplied by Dr. Louise Moser

More information

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ Lecture 5: Network Layer Reference: Chapter 5 - Computer Networks, Andrew S. Tanenbaum, 4th Edition, Prentice Hall, 2003. Contents The

More information

Chapter 5. The Network Layer. Network Layer Design Isues. Store-and-Forward Packet Switching 10/7/2010. Implementation of Connectionless Service

Chapter 5. The Network Layer. Network Layer Design Isues. Store-and-Forward Packet Switching 10/7/2010. Implementation of Connectionless Service Network Layer Design Isues Chapter 5 The Network Layer Store-and-Forward Packet Switching Services Provided to the Transport Layer Implementation of Connectionless Service Implementation of Connection-Oriented

More information

Chapter 5. The Network Layer

Chapter 5. The Network Layer Chapter 5 The Network Layer 1 Network Layer Design Isues Store-and-Forward Packet Switching Services Provided to the Transport Layer Implementation of Connectionless Service Implementation of Connection-Oriented

More information

CEN445 Network Protocols & Algorithms. Network Layer. Prepared by Dr. Mohammed Amer Arafah Summer 2008

CEN445 Network Protocols & Algorithms. Network Layer. Prepared by Dr. Mohammed Amer Arafah Summer 2008 CEN445 Network Protocols & Algorithms Network Layer Prepared by Dr. Mohammed Amer Arafah Summer 2008 1 Congestion Control Algorithms General Principles of Congestion Control Congestion Prevention Policies

More information

Chapter 5. The Network Layer. CEN Chapter 5 1

Chapter 5. The Network Layer. CEN Chapter 5 1 Chapter 5 The Network Layer CEN 445 - Chapter 5 1 Network Layer Design Isues Store-and-Forward Packet Switching Services Provided to the Transport Layer Implementation of Connectionless Service Implementation

More information

Computer Networks Prof. Ashok K. Agrawala

Computer Networks Prof. Ashok K. Agrawala CMSC417 Computer Networks Prof. Ashok K. Agrawala 2017 Ashok Agrawala September 25, 2018 Fall 2018 CMSC417 1 Message, Segment, Packet, and Frame Fall 2018 CMSC417 2 Hierarchical Routing Hierarchical routing.

More information

Chapter 5. The Network Layer FATİH ŞAHİN Network Layer Design Isues. Store-and-Forward Packet Switching

Chapter 5. The Network Layer FATİH ŞAHİN Network Layer Design Isues. Store-and-Forward Packet Switching Chapter 5 The Network Layer FATİH ŞAHİN 2007513806 Network Layer Design Isues Store-and-Forward Packet Switching Services Provided to the Transport Layer Implementation of Connectionless Service Implementation

More information

II. Principles of Computer Communications Network and Transport Layer

II. Principles of Computer Communications Network and Transport Layer II. Principles of Computer Communications Network and Transport Layer A. Internet Protocol (IP) IPv4 Header An IP datagram consists of a header part and a text part. The header has a 20-byte fixed part

More information

Chapter 24 Congestion Control and Quality of Service 24.1

Chapter 24 Congestion Control and Quality of Service 24.1 Chapter 24 Congestion Control and Quality of Service 24.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 24-1 DATA TRAFFIC The main focus of congestion control

More information

Telecommunication Protocols Laboratory Course. Lecture 3

Telecommunication Protocols Laboratory Course. Lecture 3 Telecommunication Protocols Laboratory Course Lecture 3 Course map Last time: we discussed protocols of the Medium Access Control (MAC) sub-layer Deal with broadcast channels and their (multi-party) protocols

More information

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ 1 Lecture 5: Network Layer (cont ) Reference: Chapter 5 - Computer Networks, Andrew S. Tanenbaum, 4th Edition, Prentice Hall, 2003. 2

More information

EEC-484/584 Computer Networks

EEC-484/584 Computer Networks EEC-484/584 Computer Networks Lecture 13 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review of lecture 12 Routing Congestion

More information

CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS

CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS 28 CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS Introduction Measurement-based scheme, that constantly monitors the network, will incorporate the current network state in the

More information

Quality of Service (QoS)

Quality of Service (QoS) Quality of Service (QoS) The Internet was originally designed for best-effort service without guarantee of predictable performance. Best-effort service is often sufficient for a traffic that is not sensitive

More information

ADVANCED COMPUTER NETWORKS

ADVANCED COMPUTER NETWORKS ADVANCED COMPUTER NETWORKS Congestion Control and Avoidance 1 Lecture-6 Instructor : Mazhar Hussain CONGESTION CONTROL When one part of the subnet (e.g. one or more routers in an area) becomes overloaded,

More information

CHAPTER 9: PACKET SWITCHING N/W & CONGESTION CONTROL

CHAPTER 9: PACKET SWITCHING N/W & CONGESTION CONTROL CHAPTER 9: PACKET SWITCHING N/W & CONGESTION CONTROL Dr. Bhargavi Goswami, Associate Professor head, Department of Computer Science, Garden City College Bangalore. PACKET SWITCHED NETWORKS Transfer blocks

More information

Chapter 6. The Network Layer

Chapter 6. The Network Layer Chapter 6 The Network Layer 1 Network Layer Design Isues Store-and-Forward Packet Switching Services Provided to the Transport Layer Implementation of Connectionless Service Implementation of Connection-Oriented

More information

Routing in packet-switching networks

Routing in packet-switching networks Routing in packet-switching networks Circuit switching vs. Packet switching Most of WANs based on circuit or packet switching Circuit switching designed for voice Resources dedicated to a particular call

More information

Chapter 6. The Network Layer

Chapter 6. The Network Layer Chapter 6 The Network Layer 1 Network Layer Design Isues Store-and-Forward Packet Switching Services Provided to the Transport Layer Implementation of Connectionless Service Implementation of Connection-Oriented

More information

The Network Layer. Network Layer Design Objectives

The Network Layer. Network Layer Design Objectives 1 next CITS3002 help3002 CITS3002 schedule The Network Layer The Data Link Layer had the responsibility of reliably transmitting frames across along a single wire (or wireless,...) link. The Network Layer's

More information

5.2 Routing Algorithms

5.2 Routing Algorithms CEN445 Network Protocols and Algorithms Chapter 5 Network Layer 5. Routing Algorithms Dr. Mostafa Hassan Dahshan Department of Computer Engineering College of Computer and Information Sciences King Saud

More information

QUALITY of SERVICE. Introduction

QUALITY of SERVICE. Introduction QUALITY of SERVICE Introduction There are applications (and customers) that demand stronger performance guarantees from the network than the best that could be done under the circumstances. Multimedia

More information

Layer 3: Network Layer. 9. Mar INF-3190: Switching and Routing

Layer 3: Network Layer. 9. Mar INF-3190: Switching and Routing Layer 3: Network Layer 9. Mar. 2005 1 INF-3190: Switching and Routing Network Layer Goal Enable data transfer from end system to end system End systems Several hops, (heterogeneous) subnetworks Compensate

More information

Quality of Service in the Internet

Quality of Service in the Internet Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:

More information

Unit 2 Packet Switching Networks - II

Unit 2 Packet Switching Networks - II Unit 2 Packet Switching Networks - II Dijkstra Algorithm: Finding shortest path Algorithm for finding shortest paths N: set of nodes for which shortest path already found Initialization: (Start with source

More information

Quality of Service in the Internet

Quality of Service in the Internet Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:

More information

ECE 435 Network Engineering Lecture 11

ECE 435 Network Engineering Lecture 11 ECE 435 Network Engineering Lecture 11 Vince Weaver http://web.eece.maine.edu/~vweaver vincent.weaver@maine.edu 5 October 2017 Announcements Back from Memsys. Related things: fast memories for network

More information

Resource allocation in networks. Resource Allocation in Networks. Resource allocation

Resource allocation in networks. Resource Allocation in Networks. Resource allocation Resource allocation in networks Resource Allocation in Networks Very much like a resource allocation problem in operating systems How is it different? Resources and jobs are different Resources are buffers

More information

Mohammad Hossein Manshaei 1393

Mohammad Hossein Manshaei 1393 Mohammad Hossein Manshaei manshaei@gmail.com 1393 Voice and Video over IP Slides derived from those available on the Web site of the book Computer Networking, by Kurose and Ross, PEARSON 2 Multimedia networking:

More information

Network Layer Chapter 5

Network Layer Chapter 5 Design Issues Routing Algorithms Congestion Control Quality of Service Internetworking Network Layer Chapter 5 Network Layer of the Internet Revised: August 2011 and February 2018 The Network Layer Responsible

More information

Computer Networks. Routing

Computer Networks. Routing Computer Networks Routing Topics Link State Routing (Continued) Hierarchical Routing Broadcast Routing Sending distinct packets Flooding Multi-destination routing Using spanning tree Reverse path forwarding

More information

Routing. 4. Mar INF-3190: Switching and Routing

Routing. 4. Mar INF-3190: Switching and Routing Routing 4. Mar. 004 1 INF-3190: Switching and Routing Routing: Foundations! Task! To define the route of packets through the network! From the source! To the destination system! Routing algorithm! Defines

More information

Network Layer. For this purpose the network layer should:

Network Layer. For this purpose the network layer should: Network Layer In the preceding tutorials we have studies how the DLL is responsible for moving the frame one end to the other end of the media, the network layer is responsible for the moving the packets

More information

ECE 435 Network Engineering Lecture 11

ECE 435 Network Engineering Lecture 11 ECE 435 Network Engineering Lecture 11 Vince Weaver http://web.eece.maine.edu/~vweaver vincent.weaver@maine.edu 11 October 2018 Midterm on Tues Announcements 1 HW#4 Review maine.edu created? What is a

More information

UNIT-III NETWORK LAYER: NETWORK LAYER DESIGN ISSUES:

UNIT-III NETWORK LAYER: NETWORK LAYER DESIGN ISSUES: NETWORK LAYER: The network layer is concerned with getting packets from the source all the way to the destination. Getting to the destination may require making many hops at intermediate routers along

More information

Quality of Service in the Internet. QoS Parameters. Keeping the QoS. Leaky Bucket Algorithm

Quality of Service in the Internet. QoS Parameters. Keeping the QoS. Leaky Bucket Algorithm Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:

More information

COMPUTER NETWORKS UNIT III Y3/S5

COMPUTER NETWORKS UNIT III Y3/S5 UNIT III Network layer design issues Routing algorithms - The Optimality Principle - Shortest Path Algorithm Flooding - Distance Vector Routing - Link State Routing - Hierarchical Routing - Broadcast Routing

More information

Chapter -6 IMPROVED CONGESTION CONTROL MECHANISM FOR REAL TIME DATA TRANSMISSION

Chapter -6 IMPROVED CONGESTION CONTROL MECHANISM FOR REAL TIME DATA TRANSMISSION Chapter -6 IMPROVED CONGESTION CONTROL MECHANISM FOR REAL TIME DATA TRANSMISSION Chapter 6 IMPROVED CONGESTION CONTROL MECHANISM FOR REAL TIME DATA TRANSMISSION 6.1 Introduction Supporting Quality of Service

More information

What Is Congestion? Effects of Congestion. Interaction of Queues. Chapter 12 Congestion in Data Networks. Effect of Congestion Control

What Is Congestion? Effects of Congestion. Interaction of Queues. Chapter 12 Congestion in Data Networks. Effect of Congestion Control Chapter 12 Congestion in Data Networks Effect of Congestion Control Ideal Performance Practical Performance Congestion Control Mechanisms Backpressure Choke Packet Implicit Congestion Signaling Explicit

More information

Overview Computer Networking What is QoS? Queuing discipline and scheduling. Traffic Enforcement. Integrated services

Overview Computer Networking What is QoS? Queuing discipline and scheduling. Traffic Enforcement. Integrated services Overview 15-441 15-441 Computer Networking 15-641 Lecture 19 Queue Management and Quality of Service Peter Steenkiste Fall 2016 www.cs.cmu.edu/~prs/15-441-f16 What is QoS? Queuing discipline and scheduling

More information

ETSF10 Internet Protocols Transport Layer Protocols

ETSF10 Internet Protocols Transport Layer Protocols ETSF10 Internet Protocols Transport Layer Protocols 2012, Part 2, Lecture 2.2 Kaan Bür, Jens Andersson Transport Layer Protocols Special Topic: Quality of Service (QoS) [ed.4 ch.24.1+5-6] [ed.5 ch.30.1-2]

More information

Congestion in Data Networks. Congestion in Data Networks

Congestion in Data Networks. Congestion in Data Networks Congestion in Data Networks CS420/520 Axel Krings 1 Congestion in Data Networks What is Congestion? Congestion occurs when the number of packets being transmitted through the network approaches the packet

More information

Quality of Service (QoS)

Quality of Service (QoS) CEN445 Network Protocols and Algorithms Chapter 5 Network Layer 5.4 Quality of Service Dr. Mostafa Hassan Dahshan Department of Computer Engineering College of Computer and Information Sciences King Saud

More information

Congestion Control in Communication Networks

Congestion Control in Communication Networks Congestion Control in Communication Networks Introduction Congestion occurs when number of packets transmitted approaches network capacity Objective of congestion control: keep number of packets below

More information

QoS Guarantees. Motivation. . link-level level scheduling. Certain applications require minimum level of network performance: Ch 6 in Ross/Kurose

QoS Guarantees. Motivation. . link-level level scheduling. Certain applications require minimum level of network performance: Ch 6 in Ross/Kurose QoS Guarantees. introduction. call admission. traffic specification. link-level level scheduling. call setup protocol. reading: Tannenbaum,, 393-395, 395, 458-471 471 Ch 6 in Ross/Kurose Motivation Certain

More information

Kent State University

Kent State University CS 4/54201 Computer Communication Network Kent State University Dept. of Computer Science www.mcs.kent.edu/~javed/class-net06f/ 1 A Course on Networking and Computer Communication LECT-11, S-2 Congestion

More information

What Is Congestion? Computer Networks. Ideal Network Utilization. Interaction of Queues

What Is Congestion? Computer Networks. Ideal Network Utilization. Interaction of Queues 168 430 Computer Networks Chapter 13 Congestion in Data Networks What Is Congestion? Congestion occurs when the number of packets being transmitted through the network approaches the packet handling capacity

More information

Lecture Outline. Bag of Tricks

Lecture Outline. Bag of Tricks Lecture Outline TELE302 Network Design Lecture 3 - Quality of Service Design 1 Jeremiah Deng Information Science / Telecommunications Programme University of Otago July 15, 2013 2 Jeremiah Deng (Information

More information

CSCD 433/533 Advanced Networks Spring Lecture 22 Quality of Service

CSCD 433/533 Advanced Networks Spring Lecture 22 Quality of Service CSCD 433/533 Advanced Networks Spring 2016 Lecture 22 Quality of Service 1 Topics Quality of Service (QOS) Defined Properties Integrated Service Differentiated Service 2 Introduction Problem Overview Have

More information

Flow Control. Flow control problem. Other considerations. Where?

Flow Control. Flow control problem. Other considerations. Where? Flow control problem Flow Control An Engineering Approach to Computer Networking Consider file transfer Sender sends a stream of packets representing fragments of a file Sender should try to match rate

More information

Distributed Queue Dual Bus

Distributed Queue Dual Bus Distributed Queue Dual Bus IEEE 802.3 to 802.5 protocols are only suited for small LANs. They cannot be used for very large but non-wide area networks. IEEE 802.6 DQDB is designed for MANs It can cover

More information

Fairness Example: high priority for nearby stations Optimality Efficiency overhead

Fairness Example: high priority for nearby stations Optimality Efficiency overhead Routing Requirements: Correctness Simplicity Robustness Under localized failures and overloads Stability React too slow or too fast Fairness Example: high priority for nearby stations Optimality Efficiency

More information

Priority Traffic CSCD 433/533. Advanced Networks Spring Lecture 21 Congestion Control and Queuing Strategies

Priority Traffic CSCD 433/533. Advanced Networks Spring Lecture 21 Congestion Control and Queuing Strategies CSCD 433/533 Priority Traffic Advanced Networks Spring 2016 Lecture 21 Congestion Control and Queuing Strategies 1 Topics Congestion Control and Resource Allocation Flows Types of Mechanisms Evaluation

More information

different problems from other networks ITU-T specified restricted initial set Limited number of overhead bits ATM forum Traffic Management

different problems from other networks ITU-T specified restricted initial set Limited number of overhead bits ATM forum Traffic Management Traffic and Congestion Management in ATM 3BA33 David Lewis 3BA33 D.Lewis 2007 1 Traffic Control Objectives Optimise usage of network resources Network is a shared resource Over-utilisation -> congestion

More information

This Lecture. BUS Computer Facilities Network Management. Switching Network. Simple Switching Network

This Lecture. BUS Computer Facilities Network Management. Switching Network. Simple Switching Network This Lecture BUS0 - Computer Facilities Network Management Switching networks Circuit switching Packet switching gram approach Virtual circuit approach Routing in switching networks Faculty of Information

More information

Chapter 6 Congestion Control and Resource Allocation

Chapter 6 Congestion Control and Resource Allocation Chapter 6 Congestion Control and Resource Allocation Overview of Congestion Control and Resource Allocation Problem: How to effectively and fairly allocate resources among a collection of competing users?

More information

Improving QOS in IP Networks. Principles for QOS Guarantees

Improving QOS in IP Networks. Principles for QOS Guarantees Improving QOS in IP Networks Thus far: making the best of best effort Future: next generation Internet with QoS guarantees RSVP: signaling for resource reservations Differentiated Services: differential

More information

Quality of Service II

Quality of Service II Quality of Service II Patrick J. Stockreisser p.j.stockreisser@cs.cardiff.ac.uk Lecture Outline Common QoS Approaches Best Effort Integrated Services Differentiated Services Integrated Services Integrated

More information

Episode 4. Flow and Congestion Control. Baochun Li Department of Electrical and Computer Engineering University of Toronto

Episode 4. Flow and Congestion Control. Baochun Li Department of Electrical and Computer Engineering University of Toronto Episode 4. Flow and Congestion Control Baochun Li Department of Electrical and Computer Engineering University of Toronto Recall the previous episode Detailed design principles in: The link layer The network

More information

Routing & Congestion Control

Routing & Congestion Control WIDE AREA NETWORK Routing & Congestion Control Introduction Congestion control and routing are major issues to be handled in Wide Area Networks. Congestion is handled at transport layer and routing is

More information

Routing Algorithms. CS158a Chris Pollett Apr 4, 2007.

Routing Algorithms. CS158a Chris Pollett Apr 4, 2007. Routing Algorithms CS158a Chris Pollett Apr 4, 2007. Outline Routing Algorithms Adaptive/non-adaptive algorithms The Optimality Principle Shortest Path Routing Flooding Distance Vector Routing Routing

More information

Network Control and Signalling

Network Control and Signalling Network Control and Signalling 1. Introduction 2. Fundamentals and design principles 3. Network architecture and topology 4. Network control and signalling 5. Network components 5.1 links 5.2 switches

More information

Lecture 4 Wide Area Networks - Congestion in Data Networks

Lecture 4 Wide Area Networks - Congestion in Data Networks DATA AND COMPUTER COMMUNICATIONS Lecture 4 Wide Area Networks - Congestion in Data Networks Mei Yang Based on Lecture slides by William Stallings 1 WHAT IS CONGESTION? congestion occurs when the number

More information

Lecture (08, 09) Routing in Switched Networks

Lecture (08, 09) Routing in Switched Networks Agenda Lecture (08, 09) Routing in Switched Networks Dr. Ahmed ElShafee Routing protocols Fixed Flooding Random Adaptive ARPANET Routing Strategies ١ Dr. Ahmed ElShafee, ACU Fall 2011, Networks I ٢ Dr.

More information

CS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP

CS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP CS 5520/ECE 5590NA: Network Architecture I Spring 2008 Lecture 13: UDP and TCP Most recent lectures discussed mechanisms to make better use of the IP address space, Internet control messages, and layering

More information

ECE 333: Introduction to Communication Networks Fall 2001

ECE 333: Introduction to Communication Networks Fall 2001 ECE : Introduction to Communication Networks Fall 00 Lecture : Routing and Addressing I Introduction to Routing/Addressing Lectures 9- described the main components of point-to-point networks, i.e. multiplexed

More information

Institute of Computer Technology - Vienna University of Technology. L73 - IP QoS Integrated Services Model. Integrated Services Model

Institute of Computer Technology - Vienna University of Technology. L73 - IP QoS Integrated Services Model. Integrated Services Model Integrated Services Model IP QoS IntServ Integrated Services Model Resource Reservation Protocol (RSVP) Agenda Integrated Services Principles Resource Reservation Protocol RSVP Message Formats RSVP in

More information

Quality of Service (QoS)

Quality of Service (QoS) Quality of Service (QoS) A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add, modify, and delete

More information

Design Intentions. IP QoS IntServ. Agenda. Design Intentions. L73 - IP QoS Integrated Services Model. L73 - IP QoS Integrated Services Model

Design Intentions. IP QoS IntServ. Agenda. Design Intentions. L73 - IP QoS Integrated Services Model. L73 - IP QoS Integrated Services Model Design Intentions Integrated Services Model IP QoS IntServ Integrated Services Model Resource Reservation Protocol (RSVP) The Internet was based on a best effort packet delivery service, but nowadays the

More information

Internet Services & Protocols. Quality of Service Architecture

Internet Services & Protocols. Quality of Service Architecture Department of Computer Science Institute for System Architecture, Chair for Computer Networks Internet Services & Protocols Quality of Service Architecture Dr.-Ing. Stephan Groß Room: INF 3099 E-Mail:

More information

3. Quality of Service

3. Quality of Service 3. Quality of Service Usage Applications Learning & Teaching Design User Interfaces Services Content Process ing Security... Documents Synchronization Group Communi cations Systems Databases Programming

More information

We will discuss about three different static routing algorithms 1. Shortest Path Routing 2. Flooding 3. Flow Based Routing

We will discuss about three different static routing algorithms 1. Shortest Path Routing 2. Flooding 3. Flow Based Routing In this lecture we will discuss about Routing algorithms Congestion algorithms Lecture 19 The routing algorithm is that part of the network layer software, which is responsible for deciding which output

More information

William Stallings Data and Computer Communications. Chapter 10 Packet Switching

William Stallings Data and Computer Communications. Chapter 10 Packet Switching William Stallings Data and Computer Communications Chapter 10 Packet Switching Principles Circuit switching designed for voice Resources dedicated to a particular call Much of the time a data connection

More information

Network Layer Enhancements

Network Layer Enhancements Network Layer Enhancements EECS 122: Lecture 14 Department of Electrical Engineering and Computer Sciences University of California Berkeley Today We have studied the network layer mechanisms that enable

More information

UNIT IV -- TRANSPORT LAYER

UNIT IV -- TRANSPORT LAYER UNIT IV -- TRANSPORT LAYER TABLE OF CONTENTS 4.1. Transport layer. 02 4.2. Reliable delivery service. 03 4.3. Congestion control. 05 4.4. Connection establishment.. 07 4.5. Flow control 09 4.6. Transmission

More information

Chapter 5. The Network Layer

Chapter 5. The Network Layer Chapter 5 The Network Layer Congestion Control Algorithms General Principles of Congestion Control Congestion Prevention Policies Congestion Control in Virtual-Circuit Subnets Congestion Control in Datagram

More information

TDDD82 Secure Mobile Systems Lecture 6: Quality of Service

TDDD82 Secure Mobile Systems Lecture 6: Quality of Service TDDD82 Secure Mobile Systems Lecture 6: Quality of Service Mikael Asplund Real-time Systems Laboratory Department of Computer and Information Science Linköping University Based on slides by Simin Nadjm-Tehrani

More information

Lecture 14: Performance Architecture

Lecture 14: Performance Architecture Lecture 14: Performance Architecture Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4185 14-1 Background Performance: levels for capacity, delay, and RMA. Performance

More information

Chapter 6: Congestion Control and Resource Allocation

Chapter 6: Congestion Control and Resource Allocation Chapter 6: Congestion Control and Resource Allocation CS/ECPE 5516: Comm. Network Prof. Abrams Spring 2000 1 Section 6.1: Resource Allocation Issues 2 How to prevent traffic jams Traffic lights on freeway

More information

Chapter 22 Network Layer: Delivery, Forwarding, and Routing 22.1

Chapter 22 Network Layer: Delivery, Forwarding, and Routing 22.1 Chapter 22 Network Layer: Delivery, Forwarding, and Routing 22.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 22-3 UNICAST ROUTING PROTOCOLS 22.2 A routing

More information

Internetworking Part 1

Internetworking Part 1 CMPE 344 Computer Networks Spring 2012 Internetworking Part 1 Reading: Peterson and Davie, 3.1 22/03/2012 1 Not all networks are directly connected Limit to how many hosts can be attached Point-to-point:

More information

Congestion. Can t sustain input rate > output rate Issues: - Avoid congestion - Control congestion - Prioritize who gets limited resources

Congestion. Can t sustain input rate > output rate Issues: - Avoid congestion - Control congestion - Prioritize who gets limited resources Congestion Source 1 Source 2 10-Mbps Ethernet 100-Mbps FDDI Router 1.5-Mbps T1 link Destination Can t sustain input rate > output rate Issues: - Avoid congestion - Control congestion - Prioritize who gets

More information

INTRODUCTORY COMPUTER

INTRODUCTORY COMPUTER INTRODUCTORY COMPUTER NETWORKS TYPES OF NETWORKS Faramarz Hendessi Introductory Computer Networks Lecture 4 Fall 2010 Isfahan University of technology Dr. Faramarz Hendessi 2 Types of Networks Circuit

More information

Course 6. Internetworking Routing 1/33

Course 6. Internetworking Routing 1/33 Course 6 Internetworking Routing 1/33 Routing The main function of the network layer is routing packets from the source machine to the destination machine. Along the way, at least one intermediate node

More information

Advanced Lab in Computer Communications Meeting 6 QoS. Instructor: Tom Mahler

Advanced Lab in Computer Communications Meeting 6 QoS. Instructor: Tom Mahler Advanced Lab in Computer Communications Meeting 6 QoS Instructor: Tom Mahler Motivation Internet provides only single class of best-effort service. Some applications can be elastic. Tolerate delays and

More information

RSVP 1. Resource Control and Reservation

RSVP 1. Resource Control and Reservation RSVP 1 Resource Control and Reservation RSVP 2 Resource Control and Reservation policing: hold sources to committed resources scheduling: isolate flows, guarantees resource reservation: establish flows

More information

Resource Control and Reservation

Resource Control and Reservation 1 Resource Control and Reservation Resource Control and Reservation policing: hold sources to committed resources scheduling: isolate flows, guarantees resource reservation: establish flows 2 Usage parameter

More information

Cisco IOS ISO Connectionless Network Service Commands

Cisco IOS ISO Connectionless Network Service Commands Cisco IOS ISO Connectionless Network Service Commands The International Organization for Standardization (ISO) Connectionless Network Service (CLNS) protocol is a standard for the network layer of the

More information

Supporting Service Differentiation for Real-Time and Best-Effort Traffic in Stateless Wireless Ad-Hoc Networks (SWAN)

Supporting Service Differentiation for Real-Time and Best-Effort Traffic in Stateless Wireless Ad-Hoc Networks (SWAN) Supporting Service Differentiation for Real-Time and Best-Effort Traffic in Stateless Wireless Ad-Hoc Networks (SWAN) G. S. Ahn, A. T. Campbell, A. Veres, and L. H. Sun IEEE Trans. On Mobile Computing

More information

Routing Algorithms McGraw-Hill The McGraw-Hill Companies, Inc., 2001

Routing Algorithms McGraw-Hill The McGraw-Hill Companies, Inc., 2001 Routing Algorithms Main issue is how the routers that constitute the network layer of a network cooperate to find the best routes between all pairs of stations. Routing algorithm at a router decides which

More information

A Preferred Service Architecture for Payload Data Flows. Ray Gilstrap, Thom Stone, Ken Freeman

A Preferred Service Architecture for Payload Data Flows. Ray Gilstrap, Thom Stone, Ken Freeman A Preferred Service Architecture for Payload Data Flows Ray Gilstrap, Thom Stone, Ken Freeman NASA Research and Engineering Network NASA Advanced Supercomputing Division NASA Ames Research Center Outline

More information

Lecture 9. Quality of Service in ad hoc wireless networks

Lecture 9. Quality of Service in ad hoc wireless networks Lecture 9 Quality of Service in ad hoc wireless networks Yevgeni Koucheryavy Department of Communications Engineering Tampere University of Technology yk@cs.tut.fi Lectured by Jakub Jakubiak QoS statement

More information

CEN445 Network Protocols and Algorithms. Chapter 2. Routing Algorithms. Dr. Ridha Ouni

CEN445 Network Protocols and Algorithms. Chapter 2. Routing Algorithms. Dr. Ridha Ouni 3/4/04 EN44 Network Protocols and lgorithms hapter Routing lgorithms Dr. Ridha Ouni Department of omputer Engineering ollege of omputer and Information Sciences King Saud University References Some slides

More information

Chapter 5 (Week 10) The Network Layer (CONTINUATION) ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP

Chapter 5 (Week 10) The Network Layer (CONTINUATION) ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP Chapter 5 (Week 10) The Network Layer (CONTINUATION) ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP. 397-480 1 5.1. NETWORK LAYER DESIGN ISSUES 5.2. ROUTING ALGORITHMS 5.3. CONGESTION CONTROL

More information

UNIT 2 TRANSPORT LAYER

UNIT 2 TRANSPORT LAYER Network, Transport and Application UNIT 2 TRANSPORT LAYER Structure Page No. 2.0 Introduction 34 2.1 Objective 34 2.2 Addressing 35 2.3 Reliable delivery 35 2.4 Flow control 38 2.5 Connection Management

More information

Subject: Adhoc Networks

Subject: Adhoc Networks ISSUES IN AD HOC WIRELESS NETWORKS The major issues that affect the design, deployment, & performance of an ad hoc wireless network system are: Medium Access Scheme. Transport Layer Protocol. Routing.

More information

Jaringan Komputer. The Transport Layer

Jaringan Komputer. The Transport Layer Jaringan Komputer Transport Layer The Transport Layer The heart of the whole protocol hierarchy Task: To provide reliable, cost-effective data transport from the source machine to the destination machine,

More information

Routing, Routing Algorithms & Protocols

Routing, Routing Algorithms & Protocols Routing, Routing Algorithms & Protocols Computer Networks Lecture 6 http://goo.gl/pze5o8 Circuit-Switched and Packet-Switched WANs 2 Circuit-Switched Networks Older (evolved from telephone networks), a

More information