Computer Networks. ENGG st Semester, Presented by: Ricky Kwok Department of Electrical and Electronic Engineering
|
|
- Alyson Chase
- 5 years ago
- Views:
Transcription
1 Computer Networks ENGG st Semester, 2011 Presented by: Ricky Kwok Department of Electrical and Electronic Engineering This sets of slides are based on those authored by Dr. Hayden So last year. All errors are mine! 1
2 Where are we in the semester? High Level Applications Systems Image & Video Processing Computer Systems Computer Networks Digital Logic Combinational Logic Boolean Algebra Circuits Basic Circuit Theory Low Level Electrical Signals Voltage, Current Power & Energy 2
3 Introduction Computer Network: A collection of communicating computers Enabled by a set of interconnection devices 3
4 Categorizing Computer Networks LAN Local Area Network Network that covers a small geographical area A company, a university, home, etc WAN Wide Area Network Network that covers a relatively larger geometrical area Usually beyond a building, a city, or even a country Global network? Beyond the Earth? Many other ways to categorize networks 4
5 Direct Connections Computer C Computer D Computer A Direct (Physical) Connection Computer B Lesson: Number of links proportional to number of computers 5
6 Switching Network Computer C Computer D switch Computer A Must share the physical connection to A to support data connection to/from C, D Computer B Analogy: A round-about in a road system 6
7 How to share resources (switch)? Two important ways of network communication: Circuit switching dedicated circuit per connection e.g., public switch telephone network (PSTN) Packet switching Data sent through the network in discrete packets e.g., Internet Basically, in both cases, resource is timeshared Main difference: Granularity of the time of sharing 7
8 Circuit Switching End-to-end resources reserved for exclusive use by each connection Network resources (e.g., bandwidth) divided into pieces Pieces allocated to each connection Guaranteed performance The link is solely occupied Resource piece idle if not used by owning call (no sharing) How to divide resources? frequency division time division 8
9 Packet Switching A 10 Mbs Ethernet statistical multiplexing C B queue of packets waiting for output link D 1.5 Mbs E Each end-end data stream divided into packets Different users share the same resource as needed Excessive queuing might cause packets to be dropped 9
10 Packet Switching vs. Circuit Switching 1 Mbit link each user: 100 kbps when active active 10% of time N users 1 Mbps link circuit-switching: 10 users packet switching: with 35 users, probability that >10 users active are less than.0004 Packet switching allows more users to use network! 10
11 Packet Implementation Header Payload Two main parts of a packet: Header Payload Header: Meta information about the content of the packet e.g., Source and destination address, type of packet, length etc. Payload: The actual content of the packet Length of payload specified in header, or it might be a fixed length In case of fixed length payload: padding is needed 11
12 Packet Routing The header of a packet states should contains enough information for the delivery of a packet Cf. address written on an envelope The processing of determining and delivering packets is called routing Two common ways to route: Source routing Multi-hop routing 12
13 Source Routing Before a packet is sent, the source has already figured out the complete route the destination Store the calculated route in the header of a packet Similar to a direction to a location: Turn left at the 1 st traffic light, then Go straight, then Turn right at the post-office No address is needed 13
14 Multi-hop Routing Only need destination address in the packet Machines along the way determine how to deliver the packet to the destination Each computer-computer transfer is referred as a hop Usually designated machines are used only for routing purposes, we call them routers 14
15 Packet Forwarding Techniques A B Packets must travel from point A to point B via many intermediate points How should each intermediate point handle the packet? Two common switching methods: Store-and-forward Cut-through 15
16 Store-and-Forward A B Packets are forwarded out only after the entire packet has been received Easy to implement Allow error checking at each intermediate steps Need big buffers Transfer latency proportional to the number of hops 16
17 Store-and-Forward Performance L R R R Takes L/R seconds to transmit (push out) packet of L bits on to link of R bps Entire packet must arrive at router before it can be transmitted on next link delay = 3*L/R Example: L = 7.5 Mbits R = 1.5 Mbps delay = 15 sec 17
18 Packet Switching: Message Segmenting Now break up the message into 5000 packets Each packet 1,500 bits 1 msec to transmit packet on one link pipelining: each link works in parallel Delay reduced from 15 sec to sec 18
19 Cut-Through Forwarding Packets are forwarded as soon as its destination address is known Destination address preferred to be at the front of a packet Cannot perform error checking Error can only be detected once the entire packet has arrived at the router No need for large packet buffers Can cause queue-blocking or even deadlock in some networks Lower latency than store-and-forward, but throughput the same 19
20 Is packet switching always better? Great for bursty data resource sharing simpler, no call setup Excessive congestion: packet delay and loss protocols needed for reliable data transfer, congestion control Q: How to provide circuit-like behavior? bandwidth guarantees needed for audio/video apps still an unsolved problem 20
21 21
22 Measuring Network Performance Latency Throughput Measures the time to get the first byte of data across a network Unit: seconds (s) Measures the aggregated amount of data transported over a period of time Unit: byte per second (Bps) or bit per second (bps) 22
23 Example: Mailing DVDs Mailing a DVD takes 1 day = 24 hours = 86400s Each DVD is 4GB Latency is 86,400s Throughput is an average value If we mail 1 DVD everyday, then the throughput is: 4GB / 86400s 46.2 kbps 370 kbps 23
24 Example: Scaling Up What if we mail 100 DVDs at the same time? Latency remains the same: 86400s Bandwidth increases by 100 times 37 Mbps In other words, mailing 100 DVDs at the same has higher throughput than your average broadband internet access at home 24
25 Physical Mail vs. Network When the data transfer is large, traditional postal mail has much higher bandwidth than any Internet connection E.g., Amazon AWS Import/Export allows company to send data to the Internet cloud by physically sending hard drives. When is physical mail faster? Available Internet Connection Theoretical Min. Number of Days to Transfer 1TB at 80% Network Utilization When to Consider AWS Import/Export? T1 (1.544Mbps) 82 days 100GB or more 10 Mbps 13 days 600GB or more T3 (44.736Mbps) 3 days 2TB or more 100 Mbps 1-2 days 5TB or more 1000 Mbps < 1day 60TB or more 25
26 Which one to use? Both are important Latency is more important when small amount of data is needed to be sent back-and-forth very quickly Interactive applications such as: Web surfing, online game, remote log in, etc. Microprocessor network Throughput is more important when streaming data are considered Video streaming Music streaming Large file transfer 26
27 Which network is better? time time time Network A has low latency and low throughput Network B has high latency, high bandwidth Network C has moderate latency, moderate throughput, and unpredictable performance 27
28 Which network is better? (A) time time Network A is the best for short, bursty traffic, such as web browsing. Think of the first yellow packet as all you need for 1 web page , IM (MSN messenger, gtalk, etc.) are all examples of short bursty traffic time 28
29 Which network is better? (B) time time time Network B has the longest latency (longest wait time) But once the data arrive, it has the highest bandwidth Network B is best for streaming data E.g., youtube, and any other streaming data 29
30 Which network is better? (C) time time time Network C is difficult to classified Network C is the most realistic model of today s ISP s capability 30
31 How do loss and delay occur? packets queue in router buffers packet arrival rate to link exceeds output link capacity packets queue, wait for turn packet being transmitted (delay) A B packets queueing (delay) free (available) buffers: arriving packets dropped (loss) if no free buffers 31
32 Four sources of packet delay 1. nodal processing: check bit errors determine output link Order of microseconds in high-speed routers A transmission 2. queueing propagation time waiting at output link for transmission depends on congestion level of router Order of microseconds to milliseconds B nodal processing queueing 32
33 Delay in packet-switched networks 3. Transmission delay: Store-and-forward delay R=link bandwidth (bps) L=packet length (bits) time to send bits into link = L/R Order of microseconds to milliseconds A transmission 4. Propagation delay: d = length of physical link s = propagation speed in medium (~2x10 8 m/sec) propagation delay = d/s Note: s and R are very different quantities! propagation B nodal processing queueing 33
34 Caravan analogy 100 km 100 km ten-car caravan toll booth Cars propagate at 100 km/hr Toll booth takes 12 sec to service a car (transmission time) car~bit; caravan ~ packet Q: How long until caravan is lined up before 2nd toll booth? toll booth Time to push entire caravan through toll booth onto highway = 12*10 = 120 sec Time for last car to propagate from 1st to 2nd toll both: 100km/ (100km/hr)= 1 hr A: 62 minutes 34
35 Caravan analogy (more) 100 km 100 km ten-car caravan toll booth Cars now propagate at 1000 km/hr Toll booth now takes 1 min to service a car Q: Will any car(s) arrive to 2nd booth before all cars serviced at 1st booth? toll booth Yes! After 7 min, 1st car at 2nd booth and 3 cars still at 1st booth. 1st bit of packet can arrive at 2nd router before packet is fully transmitted at 1st router! 35
36 Nodal delay d proc = processing delay typically a few microsecs or less d queue = queuing delay depends on congestion Vary from packet to packet d trans = transmission delay = L/R, significant for low-speed links d prop = propagation delay a few microsecs to hundreds of msecs 36
37 Queueing delay: simple analysis R=link bandwidth (bps) L=packet length (bits) a=average packet arrival rate (packets/s) traffic intensity = La/R La/R ~ 0: average queueing delay small La/R -> 1: delays become large La/R > 1: more work arriving than can be serviced, average delay infinite! 37
38 Introduction to the Internet 38
39 39
40 Internet 40
41 Internet Basics The Internet is a network that connects millions of computing devices throughout the world The Internet is formed by connecting many different networks. Inter -Net Distributed management What s so special about the Internet? 41
42 Back in time Before the Internet, each University and military unit has their own network Different standards Some of them work only when the computers are physically close to each other Simple point-to-point connections Networking was a niche Src: DEC s PDP-10 42
43 ARPANET Advanced Research Projects Agency Network Project active during early 70 s Commonly referred as the predecessor of the Internet A large-scale research effort involved multiple Universities on building networks that Connect computers remotely in long distance Scalable First operational packet-switch network 43
44 What s the Internet: nuts and bolts view Now, Internet is a network that interconnects millions of computing devices throughout the world Computer devices can be a PC, a workstation, or a PDA, TV, even a toaster! These devices are called hosts or end systems and are running network applications router local ISP company network server workstation mobile regional ISP 44
45 What s the Internet: nuts and bolts view Hosts are connected by communication links fiber, copper, radio, satellite transmission rate = bandwidth Most of the time, hosts are connected through intermediate switching devices called routers A router forwards packets (chunks of data) router local ISP company network server workstation mobile regional ISP 45
46 What s the Internet: nuts and bolts view Internet Service Providers (ISP) provides network access to hosts protocols control sending, receiving of messages e.g., TCP, IP, HTTP, FTP router server local ISP workstation mobile regional ISP company network 46
47 What s a protocol? human protocols: what s the time? I have a question introductions specific msgs sent specific actions taken when msgs received, or other events network protocols: machines rather than humans all communication activity in Internet governed by protocols protocols define format, order of msgs sent and received among network entities, and actions taken on msg transmission, receipt 47
48 What s a protocol? a human protocol and a computer network protocol: Hi Hi Got the time? 2:00 time TCP connection req TCP connection response Get <file> 48
49 What s the Internet: nuts and bolts view Internet Service Providers (ISP) provides network access to hosts protocols control sending, receiving of messages router server local ISP workstation mobile e.g., TCP, IP, HTTP, FTP The Internet is implemented following Internet standards called RFC (Request for comments) developed by IETF (Internet Engineering Task Force) regional ISP company network 49
50 What s the Internet: a service view communication infrastructure enables distributed applications: Web, , games, e- commerce, database., voting, file (MP3) sharing communication services provided to apps: connectionless connection-oriented However, current Internet does not provide delay (Quality of Service) guarantee! 50
51 A closer look at network structure: network edge: applications and hosts network core: routers network of networks access networks, physical media: communication links 51
52 3 Big Ideas about Internet The end-to-end design principle The core network is dumb Layering Modular design Division of labor Packet switching Data are transmitted as packets Compared to circuit switching networks 52
53 53
54 History of Packet Switching Though it sounds trivial now, the concept of packet switching was first introduced back in the time when ARPANET was still at its infant stage To provide reliable connection in case a network link is down as long as smart protocol (TCP) is used To improve the system capacity To make a scalable system 54
55 Internet Packet Routing Surprisingly, the Internet routing protocol is relatively simple Each router only knows the general direction on where to route a packet A hierarchal routing idea Example: Send a package from the USA to the address Rm 516, Dept of EEE, HKU, HK 1. Send to HK 2. Postman (router) at HK sends to HKU 3. Router at HKU sends to EEE 4. Router at EEE sends to Rm 516 The simple design of IP routing makes the Internet extremely scalable! 55
56 Internet structure: network of networks a packet passes through many networks! local ISP Tier 3 ISP Tier-2 ISP local ISP local ISP Tier-2 ISP local ISP Tier 1 ISP NAP local ISP Tier 1 ISP Tier-2 ISP local ISP Tier 1 ISP Tier-2 ISP local ISP Tier-2 ISP local ISP 56
57 Visualizing Internet Routes Traceroute A standard tool to look for all the intermediate routers to a remote site Interesting website that provides visualization of routes 57
58 58
59 Layered Architecture (1) Divides the task of data communication into layers of smaller modules Each layer has a well defined subtask Each module has restricted interaction with each other Each layer provides services to the layer(s) above utilizes services from the layer(s) below Uses services of Uses services of Layer 2 Layer 1 Layer 0 Provides services to Provides services to 59
60 Layered Architecture (2) The module in a particular layer only communicates with its counterpart on the other side of the network at the same layer Any module can be replaced with another module at the same layer as long as it provides the exact same interface This is the reason, e.g., your web browser works identically regardless of whether you are using WiFi network or a wired network, or 3G mobile network 60
61 Network Protocol A common language for different networks to communicate Protocol defines the format and order of messages being sent and received among network entities It also specifies actions that should be taken by the entity upon message transmission and receipt Human analogies: say hello when you pick up a phone When you are asked what is the time?, you would answer The time is instead of My shirt is white 61
62 Layers, protocols, and interfaces. 62
63 Protocol Hierarchies The philosopher-translator-secretary architecture 3 I like rabbits Message Philosopher J'aime bien les lapins 2 L: Dutch Ik vind konijnen leuk Information for the remote translator Translator L: Dutch Ik vind konijnen leuk 1 Fax #--- L: Dutch Ik vind konijnen leuk Information for the remote secretary Secretary Fax #--- L: Dutch Ik vind konijnen leuk 63
64 The OSI Network Model Open Systems Interconnection Basic Reference Model OSI 7 layer model A standard layering model Abstract the a network into 7 layers Unfortunately (fortunately) the Internet has its own notion of layering Internet layer slightly different from the OSI model But may be mapped back to 5 layers in the OSI model Application Presentation Session Transport Network Data Link Physical 64
65 Internet protocol stack application: supporting network applications FTP, SMTP, HTTP transport: host-host data transfer TCP, UDP network: routing of datagrams from source to destination IP, routing protocols link: data transfer between neighboring network elements PPP, Ethernet physical: bits on the wire application transport network link physical 65
66 How Layering Works? Each layer hides the layers above from any detail about lower layers Each layer focuses on its core functions, assuming other layers will handle the rest data application transport network link physical data ack network link physical data e.g., A logical connection at transport layer application transport network link physical 66
67 Layering: physical communication data application transport network link physical application transport network link physical application transport network link physical network link physical data application transport network link physical 67
68 Protocol layering and Data Each layer takes data from above adds header information to create new data unit passes new data unit to layer below source destination Ht HnHt Hl HnHt M M M M application transport network link physical application transport network link physical Ht HnHt Hl HnHt M M M M message segment datagram frame 68
69 Summary: layering abstracts details Each computer thinks it is directly connected to another one through a magic cloud 69
70 70
71 End-to-End Design Principle In laymen s term: What happens at the end host is what really matters Slightly more technical: Some information are only known to the end hosts, so there should be a distinction in responsibility on what the end hosts should perform and what the network should perform. Jump to conclusion: The core network should be dumb. 71
72 End-to-End: 2 versions According to van Shewick s interpretation, there are two related version of end-to-end arguments as proposed by the original author: Narrow Version: The function in question can completely and correctly be implemented only with the knowledge and help of the application standing at the endpoints of the communication system; Therefore, providing that questioned function as a feature of the communication system itself is not possible [i.e. it is not possible to provide a complete and correct implementation of the function within the communication system only]. Broad Version: a function or service should be carried out within a network layer only if it is needed by all clients of that layer, and it can be completely implemented in that layer. Barbara van Schewick, Internet Architecture and Innovation, pp
73 Example: Reliable File Transfer While you are uploading your photo to Facebook on your mobile phone, you entered into an elevator and lost your mobile phone connection Q: which of the following makes more sense? 1. The network is smart, so that when the connection comes back (after you exit the elevator), it should retry the upload of the photo 2. The network is dumb, and terminate the connection to Facebook without uploading the picture 73
74 File Upload (cont d) According to E2E principle, the Internet design picks (2) as the answer Reason: the mobile phone network should not retry the upload because it does not, and should not understand the high-level requirement of the user e.g., You may decide to redo the upload if it has failed, and if the photo upload was really that important Or, you may just give up and upload another photo If the network (think your mobile phone carrier) retries the upload, AND you perform another upload at the same time, you will end up with two different versions of photo uploaded 74
75 Quick Summary Internet is a collection of global networks End-to-End architecture allows the core of the network be constantly changing without affecting the end nodes Packet-switch network architecture allows many more nodes to share the same resource than circuit switch Standardized network protocols allow different computers to communicate Protocol stacks provide layer abstractions 75
76 76
77 Introduction The Internet Protocol (IP) layer, as well as TCP, are the two most important protocols of the Internet Roughly corresponds to the Network layer in the OSI 7-layer model Currently IPv4 deployed on most of Internet IPv6 starting to be deployed in some ISPs 77
78 Service Model A best effort service model It tries its best to deliver datagrams, but it makes no guarantees Connectionless Two parts of service: Addressing Scheme: Allows node in the Internet to be identified Datagram delivery: Allows data to be transmitted over wide varieties of underlying networks 78
79 Data Delivery Data are delivered in a best effort, connectionless manner Relax the requirements of the underlying network Layering abstracts the difference between underlying networks to higher layer -- TCP Data are transmitted using predefined packet Fragmentation+Reassembly is used to break long packets into smaller pieces if needed Usually as a result of underlying physical network 79
80 IPv4 Packet Header Version: version of protocol. 4 or 6 Length: length including header TTL: Time to live Checksum: checksum of header SourceAddr: Source IP address DestinationAddr: Destination IP Address 80
81 Addressing Scheme A node on the Internet is identified by its IP address In IPv4 standard 32 bits Usually represented as 4 integers connected with dots E.g., A hierarchical addressing scheme Host part + network part The higher order bits (bits on the left) are used to identify network The lower order bits are used to identify hosts within the network 81
82 Sample Addressing Scheme E.g. 3 IP networks x x x The first 24 bits are network part Last 8 bits are host part Q: How many hosts can you have within 1 network? Q: Why 24 bits? LAN
83 Address Classes IP addresses are divided into 3 classes Class A: First bit is 0 7 bits for network id 16M hosts Class B: First 2 bits are bits for network id Max 64k hosts Class C First 3 bits are bits for network id Max 256 hosts 83
84 Subnetting Problems with the 3 classes classification: Many IP address not usable even if the owner of the network id does not need all numbers And IPv4 IP numbers are running out! Subnetting allows fine grain division of an IP address in to network+subnet+host parts Real network identifier = IP & Subnetmask 84
85 Private vs. Public Original IPv4 assumes all hosts on the Internet have their own IP addresses Public IP address Uniquely identify a host on the Internet Three groups of special private addresses for private LAN uses. 10.x.x.x x.x x.x They should not be used publicly Not unique over the entire Internet One group of auto assigned private IPs x.x Should not be used normally E.g., assigned automatically by OS if no reply from DHCP server 85
86 IP Routing Each router on the Internet has a limited information about what the rest of the Internet looks like A router understands what is the next hop of a packet based on its routing table and forwarding table Special inter-router protocol that updates routing tables of routers Cons: It is possible to have loop Pros: Routes are not always optimal Scalable` Destination x.x en0 en1 Output Interface en x.x en en1 86
87 IPv6 The next generation IP standard Designed to address issues in IPv4 IP address running out Security, real-time service support, etc. IPv6 Address: 128 bits Even a toaster can have an IP address! x:x:x:x:x:x:x:x Each x is a 16 bits hexadecimal number E.g., 47CD:1234:4422:AC02:0022:1234:A456:0124 Like in IPv4, IPv6 defines many address spaces depending on the prefix of the address Deployment much slower than expected Mostly because IPv4 has not run out as fast as expected Network Address Translation (NAT) hides many private IPs from the public internet 87
88 Physical Network IP protocol runs on top of many different physical networks Common physical networks Ethernet Wireless LAN 88
89 Ethernet Most common LAN technology Common standards: 10 Mbps Ethernet, 100 Mbps Gigabit Ethernet and 10 Gigabit Ethernet Uses a shared medium Originally shared a physical wire 10Base2, 10Base5 Modern Ethernet networks use switches/hubs to connect multiple segments 89
90 MAC An excellent example of the general Carrier Sense Multiple Access with Collision Detect (CSMA/CD) technology Multiple node on a Ethernet LAN may want to transmit at the same time If more than 1 host transmit at the same time, collision occurs The algorithm to determine when/how to transmit/ retransmit is called is media access control (MAC) An Ethernet node do the following thing: It senses the media to see if it is idle or someone else is transmitting (CS) It transmit opportunistically While it transmits, it detects if collisions occur (CD) If collisions have occurred, it wait for a random time and retransmit again 90
91 Frame Format and Address Data sent on a Ethernet link as frames simple header min 46 bytes Need minimum length for collision detection max 1500 bytes Each Ethernet adaptor has a 48 bits globally unique address. The Ethernet address Sometimes called MAC address Denoted as x:x:x:x:x:x Each x is a 8 bit number written as 2 hex numbers Top bits: manufacturer id; lower bits: serial # Need to be unique to avoid name crash within a shared LAN 91
92 92
93 Elements in Wireless Network Wireless host End-system that runs application, e.g. laptop, PDA, or even desktop computer Wireless link Base station Responsible for sending and receiving data to and from a wireless host E.g. cell tower in cellular network, access point in an wireless LAN Network infrastructure The larger network that the wireless hosts wants to communicate 93
94 Differences between wired and wireless Signal strength Signal in free space decreases as the propagation distance increases Interference Several technologies use the same frequency band Multipath propagation Portions of the electromagnetic wave reflect off objects and the ground, taking paths of different lengths Conclusion: bit errors will be more common in wireless links than in wired links 94
95 IEEE Wireless LAN b GHz unlicensed radio spectrum up to 11 Mbps direct sequence spread spectrum (DSSS) in physical layer all hosts use same chipping code widely deployed, using base stations a 5-6 GHz range up to 54 Mbps g GHz range up to 54 Mbps All use CSMA/CA for multiple access All have base-station and ad-hoc network versions 95
96 Base station approach Wireless host communicates with a base station base station = access point (AP) Basic Service Set (BSS) (a.k.a. cell ) contains: wireless hosts access point (AP): base station BSS s combined to form distribution system (DS) 96
97 Ad Hoc Network approach No AP (i.e., base station) wireless hosts communicate with each other to get packet from wireless host A to B may need to route through wireless hosts X,Y,Z Applications: laptop meeting in conference room, car interconnection of personal devices battlefield IETF MANET (Mobile Ad hoc Networks) working group 97
98 IEEE : multiple access Collision if 2 or more nodes transmit at same time CSMA makes sense: get all the bandwidth if you re the only one transmitting shouldn t cause a collision if you sense another transmission Collision detection doesn t work: hidden terminal problem 98
99 Collision Avoidance Although wireless is a shared medium, carrier sense/collision detection is difficult because not all nodes can see all other nodes Hidden node problem Collision happens due to a hidden node that the sender is not aware of E.g., since A,C don t see each other, they may send to B at the same time and collide Exposed node problem A node fail to send thinking the medium is being used when it is not E.g., B is transmitting to A and C wants to transmit to D. C hears B is transmitting so it wait, but in fact, it is ok for C to send to D 99
100 IEEE MAC Protocol: CSMA/CA CSMA: sender - if sense channel idle for DIFS sec. then transmit entire frame (no collision detection) -if sense channel busy then random backoff CSMA receiver - if received OK return ACK after SIFS (ACK is needed due to hidden terminal problem) 100
101 Collision avoidance mechanisms Problem: two nodes, hidden from each other, transmit complete frames to base station wasted bandwidth for long duration! Solution: small reservation packets nodes track reservation interval with internal network allocation vector (NAV) 101
102 Collision Avoidance: RTS-CTS exchange sender transmits short RTS (request to send) packet: indicates duration of transmission receiver replies with short CTS (clear to send) packet notifying (possibly hidden) nodes hidden nodes will not transmit for specified duration: NAV 102
103 Collision Avoidance: RTS-CTS exchange RTS and CTS short: collisions less likely, of shorter duration end result similar to collision detection IEEE allows: CSMA CSMA/CA: reservations polling from AP 103
104 and Bluetooth Low-power, small radius, wireless networking technology meters Interconnects gadgets GHz unlicensed radio band up to 721 kbps Devices organized into a piconet of up to 8 active devices Interference from wireless LANs, digital cordless phones, microwave ovens: frequency hopping helps MAC protocol supports: error correction ARQ Each node has a 12- bit address 104
Introduction to the Internet. Internet Basics. Back in time ARPANET 11/20/10 ENGG st semester, Hayden Kwok-Hay So
11/20/10 Introduction to the Internet ENGG1015 1st Semester, 2010 Hayden Kwok-Hay So 2 Internet Basics The Internet is a that connects millions of of computing devices throughout the world. The Internet
More informationIntroduction to the Internet
Introduction to the Internet CCST9015 8 th Sep, 2010 Dr. Hayden Kwok-Hay So Department of Electrical and Electronic Engineering 2 Internet in 2003 3 Internet Basics The Internet is a network that connects
More informationComputer Networks. ENGG st Semester, Presented by: Ricky Kwok Department of Electrical and Electronic Engineering
Computer Networks ENGG1015 1 st Semester, 2011 Presented by: Ricky Kwok Department of Electrical and Electronic Engineering This sets of slides are based on those authored by Dr. Hayden So last year. All
More informationComputer Networks. ENGG st Semester, 2010 Hayden Kwok-Hay So
Computer Networks ENGG1015 1 st Semester, 2010 Hayden Kwok-Hay So Where are we in the semester? High Level Applications Systems Digital Logic Image & Video Processing Computer & Embedded Systems Computer
More informationChapter 1. Computer Networks and the Internet
Chapter 1 Computer Networks and the Internet Internet traffic What s the Internet? (hardware) PC server wireless laptop cellular handheld wired links millions of connected computing devices: hosts = end
More informationInternet Architecture & Performance. What s the Internet: nuts and bolts view
Internet Architecture & Performance Internet, Connection, Protocols, Performance measurements What s the Internet: nuts and bolts view millions of connected computing devices: hosts, end systems pc s workstations,
More informationPart 1: Introduction. Goal: Review of how the Internet works Overview
Part 1: Introduction Goal: Review of how the Internet works Overview Get context Get overview, feel of the Internet Application layer protocols and addressing Network layer / Routing Link layer / Example
More informationChapter 1: Introduction
Chapter 1: Introduction Our goal: get context, overview, feel of networking more depth, detail later in course approach: descriptive use Internet as example Overview: what s the Internet what s a protocol?
More informationPart I: Introduction. 1: Introduction 1
Part I: Introduction Chapter goal: get context, overview, feel of networking more depth, detail later in course approach: descriptive use Internet as example Overview: what s the Internet what s a protocol?
More informationCSE3213 Computer Network I
CSE3213 Computer Network I Introduction Course page: http://www.cse.yorku.ca/course/3213 1 Course Contents 3 general areas: data communications, networking, and protocols 1. Data communications: basic
More informationComputer Networks and the Internet. CMPS 4750/6750: Computer Networks
Computer Networks and the Inter CMPS 4750/6750: Computer Networks Outline What Is the Inter? Access Networks Packet Switching and Circuit Switching A closer look at delay, loss, and throughput Interconnection
More informationModule 2 Overview of Computer Networks
Module 2 Overview of Computer Networks Networks and Communication Give me names of all employees Who earn more than $00,000 ISP intranet backbone satellite link desktop computer: server: network link:
More informationModule 2 Overview of. Computer Networks
Module Overview of Networks and Communication Give me names of all employees Who earn more than $00,000 ISP intranet backbone satellite link desktop computer: server: network link: CS454/654 - Issues How
More informationAnnouncements. TAs office hours: Mohamed Grissa: Mohamed Alkalbani:
Announcements TAs office hours: Mohamed Grissa: grissam@oregonstate.edu Tuesday: 4-5 Friday: 11-12 Mohamed Alkalbani: alkalbmo@oregonstate.edu Wednesday: 11-12 Thursday: 11-12 Lecture slides: Will be posted
More informationend systems, access networks, links 1.3 network core
Chapter 1: roadmap 1.1 what is the Inter? 1.2 work edge end systems, works, links 1.3 work core packet switching, circuit switching, work structure 1.4 delay, loss, throughput in works 1.5 protocol layers,
More informationComputer Networks & Security 2016/2017
Computer Networks & Security 2016/2017 Protocol Layering (02) Dr. Tanir Ozcelebi Courtesy: Kurose & Ross TU/e Computer Science Security and Embedded Networked Systems Your typical lunch Slide 2 What is
More informationReview. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD
Review Error Detection: CRC Multiple access protocols Slotted ALOHA CSMA/CD LAN addresses and ARP Ethernet Some slides are in courtesy of J. Kurose and K. Ross Overview Ethernet Hubs, bridges, and switches
More informationNetwork Protocols and Architectures
Network Protocols and Architectures Introduction 1 What s the Internet: nuts and bolts view Millions of connected computing devices: hosts, end-systems PC s workstations, servers PDA s, phones, toasters
More informationLecture 2: Internet Structure
Lecture 2: Internet Structure COMP 332, Spring 2018 Victoria Manfredi Acknowledgements: materials adapted from Computer Networking: A Top Down Approach 7 th edition: 1996-2016, J.F Kurose and K.W. Ross,
More informationThe Internet. Charging for Internet 2/8/12. Conceptual Picture of the Internet. What does 1000M and 200M mean? Dr. Hayden Kwok-Hay So
2/8/12 The Internet CCST9015 Feb 8, 2012 What does 1000M and 200M mean? Dr. Hayden Kwok-Hay So Department of Electrical and Electronic Engineering 2 Charging for Internet One is charging for speed (How
More informationCSEN 503 Introduction to Communication Networks
CSEN 503 Introduction to Communication Networks 1-1 Mervat AbuElkheir Hana Medhat Ayman Dayf ** Slides are attributed to J. F. Kurose People and Resources 1-2 Course Name Introduction to Communication
More informationIntroduction to computer networking
edge core Introduction to computer networking Comp Sci 3600 Security Outline edge core 1 2 edge 3 core 4 5 6 The edge core Outline edge core 1 2 edge 3 core 4 5 6 edge core Billions of connected computing
More informationWireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 25: Wireless Networking
Wireless Challenges 15-441: Computer Networking Lecture 25: Wireless Networking Force us to rethink many assumptions Need to share airwaves rather than wire Don t know what hosts are involved Host may
More informationAnnouncements. CS 5565 Network Architecture and Protocols. Outline for today. The Internet: nuts and bolts view. The Internet: nuts and bolts view
Announcements CS 5565 Network Architecture and Protocols Lecture 2 Godmar Back Created Lectures Page Created CS5565 Forum Use this to find a project partner All projects will be done in groups of up to
More informationPacket-switching: store-and-forward
Packet-switching: store-and-forward L R R R Takes L/R seconds to transmit (push out) packet of L bits on to link or R bps Entire packet must arrive at router before it can be transmitted on next link:
More informationGetting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg
Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg Five Problems Encoding/decoding Framing Error Detection Error Correction Media Access Five Problems Encoding/decoding Framing
More information15-441: Computer Networking. Wireless Networking
15-441: Computer Networking Wireless Networking Outline Wireless Challenges 802.11 Overview Link Layer Ad-hoc Networks 2 Assumptions made in Internet Host are (mostly) stationary Address assignment, routing
More informationWeb Protocols and Practice
Web Protocols and Practice Dogan Kesdogan Aachen University of Technology Department of Computer Science IV Communication and Distributed Systems Introduction 1-1 Staff Instructor: Dogan Kesdogan, kesdogan@informatik.rwth-aachen.de
More informationSince enrollment is very small this semester, we have flexibilty. Traditional lecture Assigned reading, and then student(s) present during class time
Syllabus You can go to cs.rpi.edu and then Faculty and my website from my profile Or you can go to www.cs.rpi.edu/~holzbh Or to be very direct, you can go to www.cs.rpi.edu/~holzbh/ccn18/index.php 1 Textbook
More informationCSCE 463/612 Networks and Distributed Processing Spring 2018
CSCE 463/612 Networks and Distributed Processing Spring 2018 Introduction II Dmitri Loguinov Texas A& University January 25, 2018 Original slides copyright 1996-2004 J.F Kurose and K.W. Ross 1 Chapter
More informationComputer Networking Introduction
Computer Networking Introduction Halgurd S. Maghdid Software Engineering Department Koya University-Koya, Kurdistan-Iraq Lecture No.2 Chapter 1: roadmap 1.1 what is the Inter? 1.2 work edge end systems,
More informationCS 204: Advanced Computer Networks
CS 204: Advanced Computer Networks Jiasi Chen Lectures: MWF 12:10-1pm Humanities and Social Sciences 1403 http://www.cs.ucr.edu/~jiasi/teaching/cs204_spring17/ 1 Why Networks? Supports the applications
More informationECE 4450:427/527 - Computer Networks Spring 2017
ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 5.6: Wireless Networks - MAC Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527
More informationComputer Networks Chapter 1: Introduction. Introduction
Computer Networks Chapter 1: Introduction CSC 249 January 25, 2018 Introduction What is the Inter? Define work edge: hosts,, physical media Define the work core & Inter structure First glimpse at the layers
More informationData Communication & Networks G Session 5 - Main Theme Wireless Networks. Dr. Jean-Claude Franchitti
Data Communication & Networks G22.2262-001 Session 5 - Main Theme Wireless Networks Dr. Jean-Claude Franchitti New York University Computer Science Department Courant Institute of Mathematical Sciences
More informationFoundations of Telematics
Foundations of Telematics Chapter 1 Introduction Acknowledgement: These slides have been prepared by J.F. Kurose and K.W. Ross Foundations of Telematics (AMW SS 2010): 01 Introduction 1 Chapter 1: Introduction
More informationWhat s a protocol? What s a protocol? A closer look at network structure: What s the Internet? What s the Internet? What s the Internet?
What s the Internet? PC server laptop cellular handheld access points wired s connected computing devices: hosts = end systems running apps communication s fiber, copper, radio transmission rate = bandwidth
More informationInternet Routing. Review of Networking Principles. What s the Internet: nuts and bolts view. Communication links
Internet Routing Review of Networking Principles 1 What s the Internet: nuts and bolts view Millions of connected computing devices: hosts, end-systems PC s workstations, servers PDA s, phones, toasters
More informationInternet Routing. Review of Networking Principles
Internet Routing Review of Networking Principles 1 What s the Internet: nuts and bolts view Millions of connected computing devices: hosts, end-systems PC s workstations, servers PDA s, phones, toasters
More informationWhat s a protocol? What s a protocol? A closer look at network structure: What s the Internet? Hardware view: What s the Internet?
What s the Internet? Hardware view: What s the Internet? Hardware view: PC server wireless laptop cellular handheld access points wired s connected computing devices: hosts = end systems running apps communication
More informationECPE / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition
ECPE / COMP 177 Fall 2014 Some slides from Kurose and Ross, Computer Networking, 5 th Edition Instructor: Dr. Jeff Shafer Email: jshafer at pacific dot edu Office: Anderson 205 Office hours (posted on
More informationend systems, access networks, links circuit switching, packet switching, network structure
Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge end systems, access networks, links 1.3 Network core circuit switching, packet switching, network structure 1.4 Delay, loss and throughput
More informationLecture 2 Communication services The Trasport Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it
Lecture 2 Communication services The Trasport Layer Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it The structure edge: applications and hosts core: routers of s access s, media:
More informationInternetworking Technology -
Internetworking Technology - Chapter 1 Computer Networks and the Internet (Cont.) Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge 1.3 Network core 1.4 Network access and physical media 1.5
More informationNetworks Overview. Dr. Yingwu Zhu
Networks Overview Dr. Yingwu Zhu 1 Networking is everywhere! Internet, ad-hoc wireless networks, sensor networks Networking devices: Computers, PDAs, i-pods, sensor nodes, others Networking services Web,
More informationChapter 1: introduction
Chapter 1: introduction our goal: v get feel and terminology v more depth, detail later in course v approach: use Internet as example overview: v what s the Internet? v what s a protocol? v edge; hosts,
More informationChapter 6 Wireless and Mobile Networks
Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross Addison-Wesley, July 2004. 6: Wireless and Mobile Networks 6
More informationWireless Network and Mobility
Wireless Network and Mobility Dept. of Computer Science, University of Rochester 2008-11-17 CSC 257/457 - Fall 2008 1 Wireless Networks and Mobility Wireless networking in the data link layer Short range:
More informationLast Lecture: Data Link Layer
Last Lecture: Data Link Layer 1. Design goals and issues 2. (More on) Error Control and Detection 3. Multiple Access Control (MAC) 4. Ethernet, LAN Addresses and ARP 5. Hubs, Bridges, Switches 6. Wireless
More informationend systems, access networks, links circuit switching, packet switching, network structure
Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge end systems, access networks, links 1.3 Network core circuit switching, packet switching, network structure 1.4 Delay, loss and throughput
More informationCSC 4900 Computer Networks: Introduction
CSC 4900 Computer Networks: Introduction Professor Henry Carter Fall 2017 What s this all about? 2 A Modern Day Silk Road We live with nearly constant access to the most extensive system ever built by
More informationWhat is a Distributed System? Module 1: Introduction to Networking & Internetworking
What is a Distributed System? 1 Working Definition A distributed system is several computers doing something together Three primary features of a distributed system Multiple computers Communications Virtual
More informationHubs, Bridges, and Switches (oh my) Hubs
Hubs, Bridges, and Switches (oh my) Used for extending LANs in terms of geographical coverage, number of nodes, administration capabilities, etc. Differ in regards to: collision domain isolation layer
More informationA closer look at network structure:
T1: Introduction 1.1 What is computer network? Examples of computer network The Internet Network structure: edge and core 1.2 Why computer networks 1.3 The way networks work 1.4 Performance metrics: Delay,
More informationWireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1
Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices
More informationNetwork and Mobile Compu4ng in the 20 th Century and Beyond. COMP 1400 Memorial University Winter 2015
Network and Mobile Compu4ng in the 20 th Century and Beyond COMP 1400 Memorial University Winter 2015 What s the Internet: nuts and bolts view PC server wireless laptop smartphone wireless links wired
More informationCS 3516: Computer Networks
Welcome to CS 3516: Computer Networks Prof. Yanhua Li Time: 9:00am 9:50am M, T, R, and F Location: AK219 Fall 2018 A-term 1 Some slides are originally from the course materials of the textbook Computer
More informationShared Access Networks Wireless. 1/27/14 CS mywireless 1
Shared Access Networks Wireless 1 Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers (5-to-1)! # wireless Internet-connected devices equals
More information2. A collection of interconnected networks is called an internetwork. 3. Each machine is connected to a central hub with a point-to-point connection.
نموذج أسئلة اختبار النهائي عام 2017 الفصل الدراسي الثاني لمقرر شبكات الحاسب CHOSE 1. channel spectrum divided into frequency bands "FDMA" 2. A collection of interconnected networks is called an internetwork
More information6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point
Chapter 6 outline 6.1 Introduction Wireless 6.2 Wireless links, characteristics CDMA 6.3 IEEE 802.11 wireless LANs ( wi-fi ) 6.4 Cellular Internet Access architecture standards (e.g., GSM) Mobility 6.5
More informationLecture 6. Data Link Layer (cont d) Data Link Layer 1-1
Lecture 6 Data Link Layer (cont d) Data Link Layer 1-1 Agenda Continue the Data Link Layer Multiple Access Links and Protocols Addressing Data Link Layer 1-2 Multiple Access Links and Protocols Two types
More informationMobile and Sensor Systems
Mobile and Sensor Systems Lecture 2: Mobile Medium Access Control Protocols and Wireless Systems Dr Cecilia Mascolo In this lecture We will describe medium access control protocols and wireless systems
More informationWireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross
Wireless Networks CSE 3461: Introduction to Computer Networking Reading: 6.1 6.3, Kurose and Ross 1 Wireless Networks Background: Number of wireless (mobile) phone subscribers now exceeds number of wired
More informationA Whirlwind Introduction to the Internet. A Whirlwind Introduction to the Internet Overview
CPSC 852 Intering A Whirlwind Introduction to the Internet Michele Weigle Department of Computer Science Clemson University mweigle@cs.clemson.edu http://www.cs.clemson.edu/~mweigle/courses/cpsc852 1 A
More informationWireless and Mobile Networks 7-2
Wireless and Mobile Networks EECS3214 2018-03-26 7-1 Ch. 6: Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers (5-to-1)! # wireless Internet-connected
More informationChapter 1 Computer Networks and the Internet
CSB051 Computer Networks 電腦網路 Chapter 1 Computer Networks and the Internet 吳俊興 國立高雄大學資訊工程學系 Outline 1.1 What is the Internet? 1.2 Network edge 1.3 Network core 1.4 Access networks and physical media 1.5
More informationCS 332: Computer Networks Introduction
CS 332: Computer Networks Introduction Professor Doug Szajda Thanks! I ve taught this course many times, the most recent being Spring 2014. Each time calls for a rethinking of the topics and new material.
More informationCOMP 562: Advanced Topics in Networking
COMP 562: Advanced Topics in Networking Qian Zhang Spring 2009 HKUST Introduction 1-1 Course Info Instructor: Qian Zhang www.cs.ust.hk/~qianzh Course web site http://www.cs.ust.hk/~qianzh/comp562 2009/comp562
More informationWireless Local Area Networks. Networks: Wireless LANs 1
Wireless Local Area Networks Networks: Wireless LANs 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices (PDAs and cell phones) created an obvious application
More informationCS 3516: Advanced Computer Networks
Welcome to CS 3516: Advanced Computer Networks Prof. Yanhua Li Time: 9:00am 9:50am M, T, R, and F Location: Fuller 320 Fall 2017 A-term 1 Some slides are originally from the course materials of the textbook
More informationChapter I: Introduction
Chapter I: Introduction UG3 Computer Communications & Networks (COMN) Myungjin Lee myungjin.lee@ed.ac.uk Slides copyright of Kurose and Ross The work core mesh of interconnected routers packet-switching:
More informationWireless and WiFi. Daniel Zappala. CS 460 Computer Networking Brigham Young University
Wireless and WiFi Daniel Zappala CS 460 Computer Networking Brigham Young University Wireless Networks 2/28 mobile phone subscribers now outnumber wired phone subscribers similar trend likely with Internet
More informationCSC 4900 Computer Networks: Wireless Networks
CSC 4900 Computer Networks: Wireless Networks Professor Henry Carter Fall 2017 Last Time Mobile applications are taking off! What about current platforms is fueling this? How are an application s permission
More informationLast Lecture. Nuts-and-bolts description of the Internet. ! The topology. ! The communication links. ! The core. ! The edge
Last Lecture Nuts-and-bolts description of the Internet! The topology! The core! The edge! The communication links SUNY AT BUFFALO; CSE489/589 MODERN NETWORKING CONCEPTS; Fall 2010; INSTRUCTOR: HUNG Q.
More informationNetworking and Internetworking 1
Networking and Internetworking 1 Today l Networks and distributed systems l Internet architecture xkcd Networking issues for distributed systems Early networks were designed to meet relatively simple requirements
More informationMultiple Access Links and Protocols
Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet
More informationOverview on the Internet the current and future telecommunication network
Overview on the Internet the current and future telecommunication network Computer Networking: A Top Down Approach, 5 th edition. Jim Kurose, Keith Ross Addison-Wesley, April 2009. Introduction 1-1 Introduction
More informationComputer Networking Introduction
Computer Networking Introduction Halgurd S. Maghdid Software Engineering Department Koya University-Koya, Kurdistan-Iraq Lecture No.1 Chapter 1 Introduction Text Book for this course Computer Networking:
More informationEthernet Switches Bridges on Steroids. Ethernet Switches. IEEE Wireless LAN. Ad Hoc Networks
Ethernet Switches Bridges on Steroids layer 2 (frame) forwarding, filtering using LAN addresses Switching: A-to-B and A - to-b simultaneously, no collisions large number of interfaces often: individual
More informationSwitching Networks (Fall 2010) EE 586 Communication and. August 27, Lecture 2. (modified by Cheung for EE586; based on K&R original) 1-1
EE 586 Communication and Switching Networks (Fall 2010) Lecture 2 August 27, 2010 (modified by Cheung for EE586; based on K&R original) 1-1 Announcements Read Chapter 1 First homework is due 9/3 In Blackboard
More informationCMPE 257: Wireless and Mobile Networking
CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Winter'11 1 Announcements Accessing secure part of the class Web page: User id: cmpe257.
More informationWireless and Mobile Networks Reading: Sections 2.8 and 4.2.5
Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5 Acknowledgments: Lecture slides are from Computer networks course thought by Jennifer Rexford at Princeton University. When slides are obtained
More informationHigh Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols
High Level View EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 Goal: share a communication medium among multiple hosts connected to it Problem: arbitrate between connected hosts Solution goals:
More informationComputer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis
Computer Network Fundamentals Spring 2008 Week 3 MAC Layer Andreas Terzis Outline MAC Protocols MAC Protocol Examples Channel Partitioning TDMA/FDMA Token Ring Random Access Protocols Aloha and Slotted
More informationTopic 2b Wireless MAC. Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach
Topic 2b Wireless MAC Chapter 7 Wireless and Mobile Networks Computer Networking: A Top Down Approach 7 th edition Jim Kurose, Keith Ross Pearson/Addison Wesley April 2016 7-1 Ch. 7: Background: # wireless
More informationWiFi Networks: IEEE b Wireless LANs. Carey Williamson Department of Computer Science University of Calgary Winter 2018
WiFi Networks: IEEE 802.11b Wireless LANs Carey Williamson Department of Computer Science University of Calgary Winter 2018 Background (1 of 2) In many respects, the IEEE 802.11b wireless LAN (WLAN) standard
More informationTopics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:
1 Topics 2 LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS Multiple access: CSMA/CD, CSMA/CA, token passing, channelization LAN: characteristics, i basic principles i Protocol architecture Topologies
More informationCS 4390 Computer Networks
CS 4390 Computer Networks UT D application transport network data link physical Session 04 Packet Switching dapted from Computer Networking a Top-Down pproach 1996-2012 by J.F Kurose and K.W. Ross, ll
More informationCSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless
CSCD 433 Network Programming Fall 2016 Lecture 7 Ethernet and Wireless 802.11 1 Topics 802 Standard MAC and LLC Sublayers Review of MAC in Ethernet MAC in 802.11 Wireless 2 IEEE Standards In 1985, Computer
More informationMULTIPLE ACCESS PROTOCOLS 2. 1
MULTIPLE ACCESS PROTOCOLS AND WIFI 1 MULTIPLE ACCESS PROTOCOLS 2. 1 MULTIPLE ACCESS LINKS, PROTOCOLS Two types of links : point-to-point broadcast (shared wire or medium) POINT-TO-POINT PPP for dial-up
More informationWireless Communication and Networking CMPT 371
Wireless Communication and Networking CMPT 371 Wireless Systems: AM, FM Radio TV Broadcast Satellite Broadcast 2-way Radios Cordless Phones Satellite Links Mobile Telephony Systems Wireless Local Loop
More informationCSC 401 Data and Computer Communications Networks
CSC 401 Data and Computer Communications Networks Computer Networks and The Inter Sec 1.3 Prof. Lina Battestilli Fall 2017 Outline Computer Networks and the Inter (Ch 1) 1.1 What is the Inter? 1.2 work
More informationChapter 16 Networking
Chapter 16 Networking Outline 16.1 Introduction 16.2 Network Topology 16.3 Network Types 16.4 TCP/IP Protocol Stack 16.5 Application Layer 16.5.1 Hypertext Transfer Protocol (HTTP) 16.5.2 File Transfer
More informationECS 15; Lectures 17 and 18. The Internet. What is the internet, and how does it work? TA feedback
ECS 15; Lectures 17 and 18 The Internet What is the internet, and how does it work? TA feedback Python -- Run your code!! Term paper: Start a paragraph with the point of the paragraph, not in modern times
More informationEE 122: Ethernet and
EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose) High Level View Goal: share a communication medium among multiple hosts
More informationNetwork Connectivity and Mobility
Network Connectivity and Mobility BSAD 141 Dave Novak Topics Covered Lecture is structured based on the five elements of creating a connected world from the text book (with additional content) 1. Network
More informationCIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 8
CIS 551 / TCOM 401 Computer and Network Security Spring 2007 Lecture 8 Announcements Reminder: Project 1 is due on tonight by midnight. Midterm 1 will be held next Thursday, Feb. 8th. Example midterms
More informationEthernet Switches (more)
Ethernet Switches layer 2 (frame) forwarding, filtering using LAN addresses Switching: A-to-B and A - to-b simultaneously, no collisions large number of interfaces often: individual hosts, star-connected
More informationIntroduction to Computer Networks. Roadmap
Introduction to Computer Networks Miguel A. Labrador Department of Computer Science & Engineering labrador@csee.usf.edu http://www.csee.usf.edu/~labrador 1 Dr. Miguel A. Labrador Roadmap 1.1 What is the
More informationBasics of datacommunication
Data communication I Lecture 1 Course Introduction About the course Basics of datacommunication How is information transported between digital devices? Essential data communication protocols Insight into
More information