Part 17: Networking Technology for Virtual Environments
|
|
- Juliet Clarke
- 6 years ago
- Views:
Transcription
1 Part 17: Networking Technology for Virtual Environments Virtuelle Realität Wintersemester 2006/07 Prof. Bernhard Jung Overview Introduction Data transfer Communication architectures Managing dynamic shared state Consistency-Throughput Tradeoff Centralized/Shared Repository Frequent State Regeneration (Blind Broadcast) Dead Reckoning Further Information S. Singhal & M. Zyda. Networked Virtual Environments Design and Implementation. Addison-Wesley,
2 Networked Virtual Environments... Virtual environments in which several users can interact with each other in real time Participants are represented through avatars Besides the avatars, autonomous agents may be present in VE Other participants' action can be viewed in real time Participants can communicate with each other (speech, gesture, chat, facial expression) Interaction with other participants and virtual objects grasp virtual objects and hand over to other participants draw on virtual whiteboards shoot (e.g. soccer balls)... Networked Virtual Environments Applications Games Military simulations SIMNET, DIS, HLA (High-Level Architecture) Concurrent engineering, design reviews in teams teleconferencing telemedicine... 2
3 Networking Primer: Fundamentals of data transfer Latency Delay of transfer: Amount of time required to transfer a bit of data from one point to another Reasons for network latency speed of light delays (8.25ms of delay per time zone) delays from the computers themselves delays from the network (LAN, telephony network, satellite, ) Bandwitdh: The rate at which the network can deliver data to the destination point Available bandwidth determined by wire and hardware e.g. modem 56 kbits per second, Ethernet 100 Mbps, fiber optical wire 10 Gps Reliability: Measure of how much data is lost by the network during the journey Two categories data loss - discarded by the network data corruption - content of data packets is changed When reliability needed send acknowledgement Networking Primer: Network protocol Network protocol Describes the set of rules that two applications use to communicate to each other Consists of three components: Packet format Describes what each type of packet looks like Tells the sender what to put in the packet Tells recipient how to parse the inbound packet Packet semantics Sender and recipient must agree on what the recipient can assume if it receives a particular packet What actions the recipient should take in response to the packet Error behavior Rules about how each endpoint should respond to various error scenarios Thousands of protocols in practical use: tcp/ip, ftp, http, rtp, simultaneous use of several protocols, e.g. www: http, tcp/ip, "protocol stack" 3
4 Networking Primer Network protocols TCP/IP TCP: transmission control protocol; IP: Internet protocol TCP layered on top of IP, referred to as TCP/IP most common protocol in use today point-to-point connection Main advantage: reliability guaranteed delivery of packets, in original order, check sum Each endpoint can regard a TCP/IP connection as a bi-directional stream of bytes between two endpoints Disadvantages overhead for packaging of data possible delays in delivery due to ordering guaranty Networking Primer Network protocols UDP User Data Protocol is a lightweight communication protocol point-to-point, connection-less transmission best-efforts delivery: not reliable, no ordering guaranty for package delivery little overhead for data packaging, instantaneous delivery UDP Broadcasting data are sent to all hosts in a network even if some of the hosts are not interested can only be used in a LAN environment IP Multicasting (using UDP) data are sent to some hosts in a network many routers are still not capable of handling multicast subscriptions 4
5 Communication Architectures: Client-Server (logical architecture) clients communicate with each other via a central server Server Client 1 Client 2 Client n communication via the server slower than direct communication server is bottleneck performance of complete system depends on server performance server may decide if delivery of certain data to a client makes sense, or may combine several messages to a client into one message Communication Architectures: Client-Server It might really look like this physically! LAN Client 1 Client 2 Client n Server physical architecture on a LAN 5
6 Communication Architectures: Client-Server or this, if we are using phone lines & modems e.g. simple video game architectures... Server phone line phone line phone line Client 1 Client 2 Client n physical architecture with phone lines Communication Architectures Client-Server with multiple Servers Server 3 Server 1 Server 2 Client 1,1 Client 1,2 Client 1,n Client 2,1 Client 2,2 Client 2,n overall system performance less dependent on performance of single server improved scalability over single-server systems typically very fast data networks between servers otherwise very different latencies of communication between clients on same / different server 6
7 Communication Architectures Peer-to-Peer Host Host Host Host hosts communicate directly with each other, i.e. no server better scalability than server-based architectures broadcasting or multicasting (better) host decides locally which other hosts to inform about state changes area of interest management, e.g. based on spatial partitioning Managing Dynamic Shared State What is dynamic shared state? The dynamic information that multiple hosts must maintain about the net-ve Accurate dynamic shared state is fundamental to creating realistic virtual environments. It is what makes a VE multi-user. e.g. multi-user soccer game: positions of players and ball consistent on all hosts Management is one of the most difficult challenges facing the net-ve designer. The trade off is between resources and realism. Overview Dynamic Shared State Consistency-Throughput Tradeoff Centralized/Shared Repository Frequent State Regeneration (Blind Broadcast) Dead Reckoning 7
8 Managing Dynamic Shared State Consistency-Throughput Tradeoff information is generated on one host and mirrored on another because of network latency, data can be outdated when it arrives at the receiving host without synchronization, mirrored information can only be trusted to some extent ( Joe is near (10,20) ) Managing Dynamic Shared State The Problem: Latency Player A Sends Update Here Update arrives after 100 ms Player A is here 100 ms later Player B 8
9 Managing Dynamic Shared State Consistency-Throughput Tradeoff consistent states can only be achieved through synchronization but only at the cost of slower update rates (Consistency-Throughput Tradeoff) Consistency-Throughput Tradeoff Reliable (Gets there) Real-time (On time) Scalable (Group size) It is impossible to allow dynamic shared state to change frequently and guarantee that all hosts simultaneously access identical versions of that state. We can have either a dynamic world or a consistent world, but not both. Design Implications For a highly dynamic shared state, hosts must transmit more frequent data updates. To guarantee consistent views of the shared state, hosts must employ reliable data delivery. Available network bandwidth must be split between these two constraints. 9
10 Tradeoff Spectrum System Characteristic Absolute Consistency High Update Rate View consistency Dynamic data support Network infrastructure requirements Number of participants supported Identical at all host Low: Limited by consistency protocol Low latency, high reliability, limited variability Low Determined by data received at each host High: Limited only by available bandwidth Heterogeneous network possible Potentially high Managing Shared States Techniques Shared Repositories Blind Broadcast Dead Reckoning More Consistent More Dynamic 10
11 Centralized / Shared Repositories Maintain shared state data in a centralized location. Protect shared states via a lock manager to ensure ordered writes. Three Techniques Shared File Directory Repository in Server Memory Distributed Repository (Virtual Repository) Centralized / Shared Repositories: Shared File Directory Absolute Consistency! Only one host can write data to the same file at a time. Must have locks. Slow! Does not support many users. User User User Update Read Synchronization Locks state state Centralized Data Store Update Read User User User 11
12 Centralized / Shared Repositories Server Memory Faster than Shared File because each host uses does not have to open and close each file remotely Server crash is catastrophic Maintaining constant connection may strain server resources Virtual Repository Tries to reduce bottleneck at server Hosts communicate directly to each other following a protocol of information sharing can even tailor who you talk to Better fault tolerance (server crash less catastrophic) depending on protocol creating the virtual files Eventual Consistency 12
13 Centralized / Shared Repositories Discussion Advantages Provides an easy programming model Guarantees information consistency No sense of data ownership is imposed; any host can update any piece of the shared state Disadvantages Data access and update operations require an unpredictable amount of time to complete Requires considerable communications overhead due to reliable data delivery Vulnerable to single point failure Push systems may send info where it is not needed. Limited number of users (else you overload the server or the network) One slow user can drag everyone down Frequent State Regeneration / Blind Broadcasts Owner of each state transmits the current value asynchronously and unreliably at regular intervals Clients cache the most recent update for each piece of the shared state Hopefully, frequent state update compensate for lost packets Broadcast is sent blind to everyone No assumptions made on what information the other hosts have Usually the entire entity state is sent No acknowledgements No assurances of delivery No ordering of updates Why use? Can t afford overhead of centralized repository May not have demanding consistency requirements 13
14 Frequent State Regeneration / Blind Broadcasts Explicit Object Ownership With blind broadcasts, multiple hosts must not attempt to update an object at the same time Each host takes explicit ownership of one piece of the shared state (usually the user s avatar) Commonly used in online gaming (DOOM, Diablo) Request Ball Lock Lock Manager Request Ball Lock Grant Ball Lock Reject Ball Lock HOST A Update Ball Position HOST B Explicit Object Ownership: Proxy Update Updating state of objects owned by someone else Request Ball Lock Lock Manager HOST A Grant Ball Lock Update Ball Position Request Update Ball Position Update Ball Position HOST B 14
15 Explicit Object Ownership: Transferring Ownership Notify Lock Transfer Lock Manager HOST A Acknowledge Lock Transfer Update Ball Position Request Ball Ownership Grant Ball Ownership Update Ball Position HOST B Blind Broadcasts - Discussion Advantages Can support a larger number of users at a higher frame rate and faster response time Disadvantages Requires large amount of bandwidth Network latency impedes timely reception of updates and leads to incorrect decisions by remote hosts Network jitter impedes steady reception of updates leading to jerky visual behavior Assumes everyone broadcasting at the same rate if this is not the case then noticeable to users may be very noticeable between local users and distant destinations 15
16 Dead Reckoning Protocols Transmit state updates less frequently by using past updates to estimate the true shared state. Prediction: how the object s current state is computed based on previously received packets. Convergence: how the object s estimated state is corrected when another update is received. Current Position Updated Position Time (y) Time (x) Time (z) Convergence Time (y) Predicted Position Dead Reckoning Protocols Each host estimates entity locations based on past data No need for central server Sacrifices accuracy of shared state for more participants 16
17 Prediction Using Derivative Polynomials Zero Order (simplest) x(t + Δt) = x(t) really state regeneration-assumes the object doesn t move First Order (velocity) x(t + Δt) = x(t) + v x Δt Second Order (acceleration) x(t + Δt) = x(t) + v x Δt+ a x (Δt) 2 Higher Order Approximations greater bandwidth required greater computational complexity Object Specialized Prediction Object behavior may simplify prediction scheme e.g. a plane s orientation angle is determined solely by its forward velocity and acceleration. Land based objects need only two dimensions specified. Desired level of detail - often do not need to be precise with some aspects e.g. exact flicker of the flames of a burning vehicle not necessary; enough to say it is on fire. e.g. the same with smoke 17
18 Convergence Algorithms Tells us what to do to correct an inexact prediction: Updated Position Current Position Prediction Error Predicted Position Trade-off between computational complexity and perceived smoothness of displayed entities Convergence Algorithms Zero order or snap convergence: Advantage: Simple Disadvantage: Poorly models real world. Jumping entities may distract users. Updated Position Predicted Position 18
19 Convergence Algorithms Linear Convergence Advantage: Avoids jumping Disadvantage: Does not prevent sudden or unrealistic changes in speed or direction. Updated Track Convergence Path Predicted Track Convergence Algorithms Cubic Spline Advantage: Smoothest looking convergence Disadvantage: Computationally expensive Updated Track C+1 C Covergence Path T-1 T Predicted Track 19
20 Dead Reckoning - Discussion Advantages Reduces bandwidth requirements because updates are sent less frequently Potentially larger number of players Each host does independent calculations Disadvantages Not all hosts share the identical state about each entity Protocols are more complex to implement to develop, maintain and evaluate Must customize for object behavior to achieve best results Must have convergence to cover prediction errors Collision detection difficult to implement Poor convergence methods lead to jerky movements and distract from immersion Conclusions Shared state maintenance is governed by the Consistency-Throughput Tradeoff Three broad types of maintenance: Centralized/Shared repository Frequent State Regeneration(Blind Broadcast) Dead Reckoning The correct choice relies on balancing many issues including bandwidth, latency, data consistency, reproducibility, and computational complexity 20
Interactive Graphical Systems HT2006
HT2006 Networked Virtual Environments Informationsteknologi 2006-09-26 #1 This Lecture Background and history on Networked VEs Fundamentals (TCP/IP, etc) Background and history on Learning NVEs Demo of
More information8.3 Networked Application. History and Evolution. U.S. Department of Defense (DoD) SIMNET NSA. i. Object-Event Architecture
8.3 Networked Application Department of Defense (DoD) SIMNET Distributed Interactive Simulation (DIS) High-Level Architecture (HLA) Academic NVEs PARADISE DIVE BrickNet other academic projects Networked
More informationChapter 16 Networking
Chapter 16 Networking Outline 16.1 Introduction 16.2 Network Topology 16.3 Network Types 16.4 TCP/IP Protocol Stack 16.5 Application Layer 16.5.1 Hypertext Transfer Protocol (HTTP) 16.5.2 File Transfer
More informationNetworked Virtual Environments and Distributed Rendering IGS HT Background and history. Background and history. Background and history
Networked Virtual Environments and Distributed Rendering IGS HT 2003-09-24 Multiplayer games 1961 Spacewar, MIT 1979 MUD, Essex University 1993 Doom, Id Software Lars Pettersson 1994 Warcraft, Blizzard
More information8.3 Networked Application. History and Evolution. U.S. Department of Defense (DoD) i. Object-Event. Architecture SIMNET NSA
8.3 Networked Application Department of Defense (DoD) SIMNET Distributed Interactive Simulation (DIS) High-Level Architecture (HLA) Academic NVEs PARADISE DIVE BrickNet other academic projects Networked
More informationNetworking interview questions
Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected
More informationWeek 2 / Paper 1. The Design Philosophy of the DARPA Internet Protocols
Week 2 / Paper 1 The Design Philosophy of the DARPA Internet Protocols David D. Clark ACM CCR, Vol. 18, No. 4, August 1988 Main point Many papers describe how the Internet Protocols work But why do they
More informationOSI Layer OSI Name Units Implementation Description 7 Application Data PCs Network services such as file, print,
ANNEX B - Communications Protocol Overheads The OSI Model is a conceptual model that standardizes the functions of a telecommunication or computing system without regard of their underlying internal structure
More informationNetwork-Adaptive Video Coding and Transmission
Header for SPIE use Network-Adaptive Video Coding and Transmission Kay Sripanidkulchai and Tsuhan Chen Department of Electrical and Computer Engineering, Carnegie Mellon University, Pittsburgh, PA 15213
More informationCS505: Distributed Systems
Cristina Nita-Rotaru CS505: Distributed Systems Protocols. Slides prepared based on material by Prof. Ken Birman at Cornell University, available at http://www.cs.cornell.edu/ken/book/ Required reading
More informationIntroduction to Real-Time Communications. Real-Time and Embedded Systems (M) Lecture 15
Introduction to Real-Time Communications Real-Time and Embedded Systems (M) Lecture 15 Lecture Outline Modelling real-time communications Traffic and network models Properties of networks Throughput, delay
More informationBrickNet (cont d) Other Academic Projects
BrickNet (cont d) Object-request brokers on the servers Aimed for collaborative design environments each node is responsible for its part of design and for sharing that information Also, networked games,
More information02 - Distributed Systems
02 - Distributed Systems Definition Coulouris 1 (Dis)advantages Coulouris 2 Challenges Saltzer_84.pdf Models Physical Architectural Fundamental 2/58 Definition Distributed Systems Distributed System is
More informationOSI Transport Layer. Network Fundamentals Chapter 4. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1
OSI Transport Layer Network Fundamentals Chapter 4 Version 4.0 1 Transport Layer Role and Services Transport layer is responsible for overall end-to-end transfer of application data 2 Transport Layer Role
More informationECE 650 Systems Programming & Engineering. Spring 2018
ECE 650 Systems Programming & Engineering Spring 2018 Networking Transport Layer Tyler Bletsch Duke University Slides are adapted from Brian Rogers (Duke) TCP/IP Model 2 Transport Layer Problem solved:
More informationIntroduction to Networks
Introduction to Networks Khaled Harras School of Computer Science Carnegie Mellon University 15-349 Computer and Network Security Fall 2012 Some material borrowed from Hui Zhang and Adrian Perrig 1 Early
More informationEnterprise Integration Patterns: Designing, Building, and Deploying Messaging Solutions
Enterprise Integration Patterns: Designing, Building, and Deploying Messaging Solutions Chapter 1: Solving Integration Problems Using Patterns 2 Introduction The Need for Integration Integration Challenges
More informationNetworking and Internetworking 1
Networking and Internetworking 1 Today l Networks and distributed systems l Internet architecture xkcd Networking issues for distributed systems Early networks were designed to meet relatively simple requirements
More informationCS 162 Operating Systems and Systems Programming Professor: Anthony D. Joseph Spring Lecture 21: Network Protocols (and 2 Phase Commit)
CS 162 Operating Systems and Systems Programming Professor: Anthony D. Joseph Spring 2003 Lecture 21: Network Protocols (and 2 Phase Commit) 21.0 Main Point Protocol: agreement between two parties as to
More informationInternet Protocol (IP) TCP versus UDP
Internet Protocol (IP) Low-level protocols used by hosts and routers Guides the packets from source to destination host Hides the transmission path phone lines, LANs, WANs, wireless radios, satellite links,
More informationReference Models. 7.3 A Comparison of the OSI and TCP/IP Reference Models
Reference Models Contains 7.1 The OSI Reference Model 7.1.1 The Physical Layer 7.1.2 The Data Link Layer 7.1.3 The Network Layer 7.1.4 The Transport Layer 7.1.5 The Session Layer 7.1.6 The Presentation
More informationNetwork Architecture
Unit 7 Network Architecture Acknowledgments: These slides were originally developed by Prof. Jean Walrand for EE122. The past and current EE122 instructors including Kevin Fall, Abhay Parekh, Shyam Parekh,
More information02 - Distributed Systems
02 - Distributed Systems Definition Coulouris 1 (Dis)advantages Coulouris 2 Challenges Saltzer_84.pdf Models Physical Architectural Fundamental 2/60 Definition Distributed Systems Distributed System is
More informationNetworks and distributed computing
Networks and distributed computing Abstractions provided for networks network card has fixed MAC address -> deliver message to computer on LAN -> machine-to-machine communication -> unordered messages
More informationNetworked Virtual Environments
Special Course on Networked Virtual Jouni Smed Turku Centre for Computer Science (TUCS) Department of Information Technology, University of Turku 2004 Course Syllabus credits: 2 cu prerequisites: knowledge
More informationConsistency [Delaney et al., 2006] Responsiveness. Distributed Virtual Environments. Outline. Network Architecture. Outline 12/12/2013
Introduction Groupware and Collaborative Interaction Distributed Interactive Systems Technical aspects M2R Interaction -Université Paris-Sud -Année 2013-2014 Cédric Fleury (cedric.fleury@lri.fr) Technical
More informationInterface The exit interface a packet will take when destined for a specific network.
The Network Layer The Network layer (also called layer 3) manages device addressing, tracks the location of devices on the network, and determines the best way to move data, which means that the Network
More informationIntroduction to Distributed Systems
Introduction to Distributed Systems Other matters: review of the Bakery Algorithm: why can t we simply keep track of the last ticket taken and the next ticvket to be called? Ref: [Coulouris&al Ch 1, 2]
More information15-441: Computer Networking. Wireless Networking
15-441: Computer Networking Wireless Networking Outline Wireless Challenges 802.11 Overview Link Layer Ad-hoc Networks 2 Assumptions made in Internet Host are (mostly) stationary Address assignment, routing
More informationprecise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet protocol (bottom level)
Protocols precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet protocol (bottom level) all packets shipped from network to network as IP packets
More informationLecture-4. TCP/IP-Overview:
Lecture-4 TCP/IP-Overview: The history goes back to ARPANET a research network sponsored by DoD US Govt. It eventually connected hundreds of universities and govt installations, using leased telephone
More informationNetwork Connectivity and Mobility
Network Connectivity and Mobility BSAD 141 Dave Novak Topics Covered Lecture is structured based on the five elements of creating a connected world from the text book (with additional content) 1. Network
More informationContinuous Real Time Data Transfer with UDP/IP
Continuous Real Time Data Transfer with UDP/IP 1 Emil Farkas and 2 Iuliu Szekely 1 Wiener Strasse 27 Leopoldsdorf I. M., A-2285, Austria, farkas_emil@yahoo.com 2 Transilvania University of Brasov, Eroilor
More informationLecture 3 Protocol Stacks and Layering
Lecture 3 Protocol Stacks and ing Hui Zhang School of Computer Science Carnegie Mellon University 15-441 Networking, Fall 2007 http://www.cs.cmu.edu/~srini/15-441/f07/ 1 What is a Communication Network?
More informationLecture 10: Protocol Design
Lecture 10: Protocol Design Prof. Shervin Shirmohammadi SITE, University of Ottawa Fall 2005 CEG 4183 10-1 Introduction TCP and UDP are generic protocols: They fulfill the needs of a wide range of applications
More informationComputer Network Fundamentals (IT 221)
Computer Network Fundamentals (IT 221) أساسيات شبكات الحاسب Business Applications: Lecture 1: Computer network: collection of autonomous computers interconnected by a single technology. Goals: sharing
More informationCongestion Manager. Nick Feamster Computer Networks. M.I.T. Laboratory for Computer Science. October 24, 2001
Congestion Manager Nick Feamster M.I.T. Laboratory for Computer Science 6.829 Computer Networks October 24, 2001 Outline Motivation (problem CM solves?) Sharing info on concurrent flows Enable application
More informationITP 140 Mobile Applications Technologies. Networks
ITP 140 Mobile Applications Technologies Networks A First Look Under the Hood 2 3 Communication Channels Mediums for transporting data from one system to another Physical Twisted Pair (CAT-3, CAT-5/6)
More informationThe Frozen Mountain irtc White Paper Series
The Frozen Mountain irtc White Paper Series This white paper is the fourth in a series on Internet Based Real Time Communications (irtc) written by Frozen Mountain Software s CTO Anton Venema. The complete
More informationDistributed Systems Exam 1 Review. Paul Krzyzanowski. Rutgers University. Fall 2016
Distributed Systems 2016 Exam 1 Review Paul Krzyzanowski Rutgers University Fall 2016 Question 1 Why does it not make sense to use TCP (Transmission Control Protocol) for the Network Time Protocol (NTP)?
More information416 Distributed Systems. Networks review; Day 1 of 2 Jan 5 + 8, 2018
416 Distributed Systems Networks review; Day 1 of 2 Jan 5 + 8, 2018 1 Distributed Systems vs. Networks Low level (c/go) Run forever Support others Adversarial environment Distributed & concurrent Resources
More informationSystem Models. 2.1 Introduction 2.2 Architectural Models 2.3 Fundamental Models. Nicola Dragoni Embedded Systems Engineering DTU Informatics
System Models Nicola Dragoni Embedded Systems Engineering DTU Informatics 2.1 Introduction 2.2 Architectural Models 2.3 Fundamental Models Architectural vs Fundamental Models Systems that are intended
More informationCh. 4 - WAN, Wide Area Networks
1 X.25 - access 2 X.25 - connection 3 X.25 - packet format 4 X.25 - pros and cons 5 Frame Relay 6 Frame Relay - access 7 Frame Relay - frame format 8 Frame Relay - addressing 9 Frame Relay - access rate
More information15-441: Computer Networking. Lecture 24: Ad-Hoc Wireless Networks
15-441: Computer Networking Lecture 24: Ad-Hoc Wireless Networks Scenarios and Roadmap Point to point wireless networks (last lecture) Example: your laptop to CMU wireless Challenges: Poor and variable
More informationCOMS Introduction to Computers. Networking
COMS 1001 Introduction to Computers Networking What's Ahead Networking layers Network Speeds Protocols, sockets, client/server Routing, DNS, Ethernet, LANs, wireless What is a Network? Loose definition:
More informationIntroduction to computer networking
edge core Introduction to computer networking Comp Sci 3600 Security Outline edge core 1 2 edge 3 core 4 5 6 The edge core Outline edge core 1 2 edge 3 core 4 5 6 edge core Billions of connected computing
More informationData and Computer Communications. Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications
Data and Computer Communications Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based s 1 Need For Protocol Architecture data exchange can involve complex procedures better if task broken into subtasks
More informationChapter 3. The Basics of Networking
Chapter 3 The Basics of Networking Learning Objectives Tell whether a communication technology (Internet, radio, LAN, etc.) is synchronous or asynchronous; broadcast or point-to-point Explain the roles
More information6.1 Internet Transport Layer Architecture 6.2 UDP (User Datagram Protocol) 6.3 TCP (Transmission Control Protocol) 6. Transport Layer 6-1
6. Transport Layer 6.1 Internet Transport Layer Architecture 6.2 UDP (User Datagram Protocol) 6.3 TCP (Transmission Control Protocol) 6. Transport Layer 6-1 6.1 Internet Transport Layer Architecture The
More informationSystem Models for Distributed Systems
System Models for Distributed Systems INF5040/9040 Autumn 2015 Lecturer: Amir Taherkordi (ifi/uio) August 31, 2015 Outline 1. Introduction 2. Physical Models 4. Fundamental Models 2 INF5040 1 System Models
More informationChapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet
Chapter 2 - Part 1 The TCP/IP Protocol: The Language of the Internet Protocols A protocol is a language or set of rules that two or more computers use to communicate 2 Protocol Analogy: Phone Call Parties
More informationQuestion. Reliable Transport: The Prequel. Don t parse my words too carefully. Don t be intimidated. Decisions and Their Principles.
Question How many people have not yet participated? Reliable Transport: The Prequel EE122 Fall 2012 Scott Shenker http://inst.eecs.berkeley.edu/~ee122/ Materials with thanks to Jennifer Rexford, Ion Stoica,
More informationUDP, TCP, IP multicast
UDP, TCP, IP multicast Dan Williams In this lecture UDP (user datagram protocol) Unreliable, packet-based TCP (transmission control protocol) Reliable, connection oriented, stream-based IP multicast Process-to-Process
More informationSubject: Adhoc Networks
ISSUES IN AD HOC WIRELESS NETWORKS The major issues that affect the design, deployment, & performance of an ad hoc wireless network system are: Medium Access Scheme. Transport Layer Protocol. Routing.
More informationMODELS OF DISTRIBUTED SYSTEMS
Distributed Systems Fö 2/3-1 Distributed Systems Fö 2/3-2 MODELS OF DISTRIBUTED SYSTEMS Basic Elements 1. Architectural Models 2. Interaction Models Resources in a distributed system are shared between
More informationMultimedia Networking
CMPT765/408 08-1 Multimedia Networking 1 Overview Multimedia Networking The note is mainly based on Chapter 7, Computer Networking, A Top-Down Approach Featuring the Internet (4th edition), by J.F. Kurose
More informationChapter 7 Multimedia Networking
Chapter 7 Multimedia Networking Principles Classify multimedia applications Identify the network services and the requirements the apps need Making the best of best effort service Mechanisms for providing
More information19: Networking. Networking Hardware. Mark Handley
19: Networking Mark Handley Networking Hardware Lots of different hardware: Modem byte at a time, FDDI, SONET packet at a time ATM (including some DSL) 53-byte cell at a time Reality is that most networking
More informationInternetworking Models The OSI Reference Model
Internetworking Models When networks first came into being, computers could typically communicate only with computers from the same manufacturer. In the late 1970s, the Open Systems Interconnection (OSI)
More informationInternet Technology. 06. Exam 1 Review Paul Krzyzanowski. Rutgers University. Spring 2016
Internet Technology 06. Exam 1 Review Paul Krzyzanowski Rutgers University Spring 2016 March 2, 2016 2016 Paul Krzyzanowski 1 Question 1 Defend or contradict this statement: for maximum efficiency, at
More informationComputer Networks. More on Standards & Protocols Quality of Service. Week 10. College of Information Science and Engineering Ritsumeikan University
Computer Networks More on Standards & Protocols Quality of Service Week 10 College of Information Science and Engineering Ritsumeikan University Introduction to Protocols l A protocol is a set of rules
More informationMilitary Messaging. Over Low. Bandwidth. Connections
Military Messaging Over Low Bandwidth Connections White Paper Contents Paper Overview 3 The Technical Challenges 4 Low Bandwidth 4 High Latency 4 High Error Rates 4 Multicast 4 Emission Control (EMCON)
More information2/29/2012. Part 1: Networking overview Part 2: Data transfer methods Part 3: Communication Channels
Jim Williams HONP-112 Week 7 Part 1: Networking overview Part 2: Data transfer methods Part 3: Communication Channels A Network consists of at least two computers, and other peripherals (like a printer)
More informationInternet Technology 3/2/2016
Question 1 Defend or contradict this statement: for maximum efficiency, at the expense of reliability, an application should bypass TCP or UDP and use IP directly for communication. Internet Technology
More informationChapter 2 Application Layer. Lecture 4: principles of network applications. Computer Networking: A Top Down Approach
Chapter 2 Application Layer Lecture 4: principles of network applications Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Application Layer 2-1 Chapter
More informationHomework 1. Question 1 - Layering. CSCI 1680 Computer Networks Fonseca
CSCI 1680 Computer Networks Fonseca Homework 1 Due: 27 September 2012, 4pm Question 1 - Layering a. Why are networked systems layered? What are the advantages of layering? Are there any disadvantages?
More information06/02/ Local & Metropolitan Area Networks 0. INTRODUCTION. 1. History and Future of TCP/IP ACOE322
1 Local & Metropolitan Area Networks ACOE322 Lecture 5 TCP/IP Protocol suite and IP addressing 1 0. INTRODUCTION We shall cover in this topic: 1. The relation of TCP/IP with internet and OSI model 2. Internet
More informationEEC-484/584 Computer Networks
EEC-484/584 Computer Networks Lecture 2 Wenbing Zhao wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Misc. Interested in research? Secure
More informationNetwork Management & Monitoring
Network Management & Monitoring Network Delay These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/) End-to-end
More informationMultimedia Networking
Multimedia Networking 1 Multimedia, Quality of Service (QoS): What is it? Multimedia applications: Network audio and video ( continuous media ) QoS Network provides application with level of performance
More informationSTEVEN R. BAGLEY PACKETS
STEVEN R. BAGLEY PACKETS INTRODUCTION Talked about how data is split into packets Allows it to be multiplexed onto the network with data from other machines But exactly how is it split into packets and
More informationNetworking Applications
Networking Dr. Ayman A. Abdel-Hamid College of Computing and Information Technology Arab Academy for Science & Technology and Maritime Transport Multimedia Multimedia 1 Outline Audio and Video Services
More informationComputer Communication & Networks / Data Communication & Computer Networks Week # 03
Computer Communication & Networks / Data Communication & Computer Networks Week # 03 M.Nadeem Akhtar CS & IT Department The University of Lahore Email: nadeem.akhtar@cs.uol.edu.pk URL-https://sites.google.com/site/nadeemuolcsccn/home
More informationCS61C Machine Structures Lecture 37 Networks. No Machine is an Island!
CS61C Machine Structures Lecture 37 Networks April 24, 2006 John Wawrzynek Page 1 No Machine is an Island! Computer Processor (active) Control ( brain ) Datapath ( brawn ) Memory (passive) (where programs,
More information4.0.1 CHAPTER INTRODUCTION
4.0.1 CHAPTER INTRODUCTION Data networks and the Internet support the human network by supplying seamless, reliable communication between people - both locally and around the globe. On a single device,
More informationUnit A - Connecting to the Network
Unit A - Connecting to the Network 1 What is a network? The ability to connect people and equipment no matter where they are in the world. telephone computers television How does your body work as a network?
More informationDigital Asset Management 5. Streaming multimedia
Digital Asset Management 5. Streaming multimedia 2015-10-29 Keys of Streaming Media Algorithms (**) Standards (*****) Complete End-to-End systems (***) Research Frontiers(*) Streaming... Progressive streaming
More informationECE 650 Systems Programming & Engineering. Spring 2018
ECE 650 Systems Programming & Engineering Spring 2018 Networking Introduction Tyler Bletsch Duke University Slides are adapted from Brian Rogers (Duke) Computer Networking A background of important areas
More informationMODELS OF DISTRIBUTED SYSTEMS
Distributed Systems Fö 2/3-1 Distributed Systems Fö 2/3-2 MODELS OF DISTRIBUTED SYSTEMS Basic Elements 1. Architectural Models 2. Interaction Models Resources in a distributed system are shared between
More informationNetwork Protocols - Revision
Network Protocols - Revision Luke Anderson luke@lukeanderson.com.au 18 th May 2018 University Of Sydney Overview 1. The Layers 1.1 OSI Model 1.2 Layer 1: Physical 1.3 Layer 2: Data Link MAC Addresses 1.4
More informationCS3600 SYSTEMS AND NETWORKS
CS3600 SYSTEMS AND NETWORKS NORTHEASTERN UNIVERSITY Lecture 17: Internet architecture Prof. Alan Mislove (amislove@ccs.neu.edu) Slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion
More informationComputer Networks and Mobile Systems. Shyam Gollakota
Computer Networks and Mobile Systems Shyam Gollakota The Internet of Things The internet's next big frontier 1/7/2013 A look at how the Internet is becoming immersed in the physical world, not just communications
More informationRemote Procedure Call. Tom Anderson
Remote Procedure Call Tom Anderson Why Are Distributed Systems Hard? Asynchrony Different nodes run at different speeds Messages can be unpredictably, arbitrarily delayed Failures (partial and ambiguous)
More informationIntroduction to Protocols
Chapter 6 Introduction to Protocols 1 Chapter 6 Introduction to Protocols What is a Network Protocol? A protocol is a set of rules that governs the communications between computers on a network. These
More informationDistributed Systems. Pre-Exam 1 Review. Paul Krzyzanowski. Rutgers University. Fall 2015
Distributed Systems Pre-Exam 1 Review Paul Krzyzanowski Rutgers University Fall 2015 October 2, 2015 CS 417 - Paul Krzyzanowski 1 Selected Questions From Past Exams October 2, 2015 CS 417 - Paul Krzyzanowski
More informationCS4700/CS5700 Fundaments of Computer Networks
CS4700/CS5700 Fundaments of Computer Networks Lecture 5: Internet architecture Slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica, Hui Zhang Alan Mislove amislove at ccs.neu.edu
More informationLecture 10 Internet. ECE 197SA Systems Appreciation. Internet
Lecture 10 Internet ECE 197SA Systems Appreciation Internet Computer networks Infrastructure for large-scale distributed application Global data exchange between computers Essential for today s society
More informationEEC-484/584 Computer Networks. Lecture 16. Wenbing Zhao
EEC-484/584 Computer Networks Lecture 16 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review Services provided by transport layer
More informationConnectionless and Connection-Oriented Protocols OSI Layer 4 Common feature: Multiplexing Using. The Transmission Control Protocol (TCP)
Lecture (07) OSI layer 4 protocols TCP/UDP protocols By: Dr. Ahmed ElShafee ١ Dr. Ahmed ElShafee, ACU Fall2014, Computer Networks II Introduction Most data-link protocols notice errors then discard frames
More informationMobile Transport Layer
Mobile Transport Layer 1 Transport Layer HTTP (used by web services) typically uses TCP Reliable transport between TCP client and server required - Stream oriented, not transaction oriented - Network friendly:
More informationComputer Networking. Introduction. Quintin jean-noël Grenoble university
Computer Networking Introduction Quintin jean-noël Jean-noel.quintin@imag.fr Grenoble university Based on the presentation of Duda http://duda.imag.fr 1 Course organization Introduction Network and architecture
More informationNetwork Applications Principles of Network Applications
Network Applications Principles of Network Applications A Network application is an application running on one host and provides communication to another application running on a different host. At the
More informationProgrammation système
Programmation système Problems Problem 1 - Message from ATM to Server Message name HELLO {userid} PASSWORD {password} BALANCE WITHDRAWAL {amount} Purpose Let server know that there is a card in the ATM
More informationEEC-682/782 Computer Networks I
EEC-682/782 Computer Networks I Lecture 16 Wenbing Zhao w.zhao1@csuohio.edu http://academic.csuohio.edu/zhao_w/teaching/eec682.htm (Lecture nodes are based on materials supplied by Dr. Louise Moser at
More informationNetworking and Internetworking 1
Networking and Internetworking 1 To do q q Networks and distributed systems Internet architecture xkcd Internet history Early days ~1960 ARPA sponsored research on computer networking to enable remote
More information3.2 COMMUNICATION AND INTERNET TECHNOLOGIES
3.2 COMMUNICATION AND INTERNET TECHNOLOGIES 3.2.1 PROTOCOLS PROTOCOL Protocol a set of rules governing the way that devices communicate with each other. With networks and the Internet, we need to allow
More informationName Student ID Department/Year. Final Examination. Introduction to Computer Networks Class#: Fall :20-11:00 Tuesday January 13, 2004
Final Examination Introduction to Computer Networks Class#: 901 31110 Fall 2003 9:20-11:00 Tuesday January 13, 2004 Prohibited 1. You are not allowed to write down the answers using pencils. Use only black-
More informationData & Computer Communication
Basic Networking Concepts A network is a system of computers and other devices (such as printers and modems) that are connected in such a way that they can exchange data. A bridge is a device that connects
More informationMiddleware and Distributed Systems. System Models. Dr. Martin v. Löwis
Middleware and Distributed Systems System Models Dr. Martin v. Löwis System Models (Coulouris et al.) Architectural models of distributed systems placement of parts and relationships between them e.g.
More informationCS519: Computer Networks. Lecture 1 (part 2): Jan 28, 2004 Intro to Computer Networking
: Computer Networks Lecture 1 (part 2): Jan 28, 2004 Intro to Computer Networking Remember this picture? How did the switch know to forward some packets to B and some to D? From the address in the packet
More information