Efficient Multicast Schemes for Mobile Multiparty Gaming Applications

Size: px
Start display at page:

Download "Efficient Multicast Schemes for Mobile Multiparty Gaming Applications"

Transcription

1 Efficient Multicast Schemes for Mobile Multiparty Gaming Applications P6-6th semester 2006 Group ComNet Aalborg University 5th April 2006

2

3 Institut for elektroniske systemer Fr. Bajers Vej 7 Telefon Titel: Tema: Efficient Multicast Schemes for Mobile Multiparty Gaming Applications Komplekse distribuerede systemer Projektperiode: P6, forårssemestret 2006 Projektgruppe: Gruppe 681 Deltagere: Mads Verwohlt Martin H. Larsen Synopsis: Vejleder: Haibo Wang Hans Peter Schwefel Oplagstal: 5 Sidetal: 29 Bilagsantal og art: 4 Afsluttet den 30. Maj 2006

4

5 Institute for Electronic Systems Fr. Bajers Vej 7 Phone Title: Efficient Multicast Schemes for Mobile Multiparty Gaming Applications Theme: Complex distributed systems Project period: P6, spring semester 2006 Project group: Group 681 Group members: Mads Verwohlt Martin H. Larsen Abstract: Supervisor: Haibo Wang Hans Peter Schwefel Number printed: 5 Pages: 29 Appendix: XX Finished May 30th 2006

6 Preface

7 CONTENTS ComNet, AAU Contents 1 Introduction Motivation Introduction Preliminary analysis Multiplayer games MultiplayerGame Network types Multiplayer gametypes sub-conclusion Wireless Communication Introduction to Wireless Communication Bluetooth Bluetooth Core Protocols Wireless LAN Routing Multicast Introduction Multicast Compromise Overview of Multicast Routing Algorithms Multicast Forwarding Experimental parts

8 Group 681 CONTENTS 2.6 Problem statement Problem Delimitation Introduction Project description Delimitation Scenarios Scenario I Scenario II Scenario III Analysis 28 4

9 ComNet, AAU Chapter 1 Introduction 1.1 Motivation Mobile devices are used for many different applications, each with different requirements. Many of these applications require wireless communication with other devices or the Internet, for example applications used for or file transfer. The demand for faster communication for video-communication and network gaming has raised within the last few years, but while the third-generation mobile communication has provided a solution for the video-communication, the demand for network gaming have not yet been solved.[specify what s not solved!] 1.2 Introduction The overall problem in this project is to investegate different multicast schemes find the the different excisting multicast schemes for the purpose of multiplayer games for mobile devices. 5

10 Group 681 CHAPTER 1. INTRODUCTION Figure 1.1: System overview. This project is including some overall challenges, which includes these: Identify the features of mobile multi-party games. Identify the performence of wireless communications methods. Study which existing multicast schemes will be suitable. Make a test with the purpose of validating the performance of the multicast scheme for mobile gaming. A persistent scenario will be used to solve these challenges. There are many different kinds of multiplayer games, each of these have different features to consider for a mobile device, such as traffic volume, maximum quantity of users, game session length and real-time aspects. These aspects will be used 6

11 1.2. INTRODUCTION ComNet, AAU when choosing the scenario Mobile devices are able to use different wireless communication methods, we will only look at two of them, Bluetooth and WLAN, each with its own avantage and disavantage. The two methods will be examined and tested to determine the level of performance in the chosen scenario. Another challenge is to study which type of existing multicast schemes, regarding multicast group management and multicast stratagies, that will be suitable for a mobile multicast multiplayer gaming environment, and whether it need to be changed to fit the chosen scenario. A test bed will be used as an experimental validation of the performance of the selected multicast scheme for mobile gaming. 7

12 Group 681 CHAPTER 2. PRELIMINARY ANALYSIS Chapter 2 Preliminary analysis 2.1 Multiplayer games This section will be the basis for chosing a game for the scenario used further in this projekt. First The A small selection of different multiplayer game types will be selected and an evaluation will be made from the projekts point of view, which main parts includs multicasting and wireless communication MultiplayerGame Network types A multiplayer games usually have two approaches to the network type. Multiplayer games can either be server-driven or peer-to-peer. Each with its own advantages and disadvantage regarding multicasting and Wireless communication. Server-Driven Games In a server-driven game, each player communicates only with a overall remote server. The server tracks all the players actions and sends each player the information, he or she needs to know the game state. This is clearly a effectiv method for multicasting since all players has some advantages, each players is only sending and receiving the data it needs, so the network trafik is low. There are also an disadvantage, someone has to provide the server and the bandwidth it uses. As an solusion the developers can allow the 8

13 2.1. MULTIPLAYER GAMES ComNet, AAU users to setup its own server on the Internet.(Halflife Counter Strike works this way.) Peer-to-Peer Games In a peer-to-peer game, no single players machine is considered server instead, all players machines talk directly to all other players machines. Each machine keeps track of the overall game state, with checksums passed to ensure that they remain in sync. Peer-to-peer games will disadvntage too, first, in a peer-to-peer game, the amount of data that needs to be exchanged increases exponentially when the number of players increases. This solution uses alot of bandwidth when there are more than 3-4 players. So a peer-topeer game should be limited to 8 or fewer players.[1] TABEL(p2p vs server) Multiplayer gametypes INTRODUCTION MISSING Round robin games In a round-robin game each player takes turn one after another. Each player generally takes some time to act, witch will result in multisecond latency. Simulation games Simultaneous-movement games A simultaneous-movement is a game in which all players decides what to do during the his turn, then all players orders is revealed simultaneously. The server will wait for receiving all the players orders, and then resolves the orders and sends the new game state to all player. 9

14 Group 681 CHAPTER 2. PRELIMINARY ANALYSIS Act whenever??? games Slow update games This is a game where each player having a certain position. The players can give orders to the server to change the position, which is a slowly. This is an server-client type of game, where players can play the game in many short sessions, rather than to play a single long session. Shared solitaire games In a shared solitaire game, each player plays the same single-player game. Each player plays the game with the purpose of getting the highest score within the time limit, after which the game ends. The player who, gets the highest score is considered the winner sub-conclusion 2.2 Wireless Communication Introduction to Wireless Communication Bluetooth introduction This section is based on [2]. Bluetooth operates on 79 channels in the 2.4 GHz band, with 1 MHz of carrier spacing. Each device performs frequency hopping with hops/second. An important feature in the context of Bluetooth is piconet. A piconet is a collection of Bluetooth devices, which are synchronized to the same hopping frequency. One device in the piconet has to act as a master, and the other devices have to act as slaves. The master sets the hopping pattern in the piconet. If a device wants to be active in the piconet, it has to synchronize to this hopping pattern. Beside active, a device can be parked, and in standby. In parked mode the device can be activated within a few milliseconds. Devices in standby mode cannot be activated by the 10

15 2.2. WIRELESS COMMUNICATION ComNet, AAU piconet, but only by the device itself. When a device is assigned to a piconet it is given a 3 bit active member address (AMA), this gives a total of 7 slave devices and one master device in a piconet. All parked devices use an 8 bit parked member address (PMA). The Bluetooth protocol stack can be divided into a core and a profile specification 2.1. The core specifies the protocols from physical layer to the data link control, including management functions. Profile specifications describe the many protocols and functions needed to adapt the Bluetooth technology to the different purposes. In next section the Bluetooth Core protocols will be described. Figure 2.1: Bluetooth protocol stack Bluetooth Core Protocols The Bluetooth Core Protocol concerns following elements: Radio Layer: Specification of the air interface, i.e. frequencies, modulation, and transmit power. Baseband Layer: Description of basic connection establishment, packet formats, timing and basic QoS parameters. 11

16 Group 681 CHAPTER 2. PRELIMINARY ANALYSIS Link Manager Protocol: Link set-up and management between devices including security functions and parameter negation. Logical link control and adaptional protocol (L2CAP): Adaptation of higher layers to the baseband (connectionless and connection-oriented services). Service Discovery Protocol: Device discovery in close proximity plus query of service characteristic. On top of L2CAP is the cable replacement protocol RFCOMM, which emulates a serial connection following the RS-232 standards. Radio Layer Bluetooth operates in 79 channels in the 2.4 GHz band, with 1 MHz carrier spacing. Each Bluetooth device performs its own random frequency hopping with 1600 hops/s. The time between two hops is called a slot, which has an interval of 625 microseconds. Bluetooth receivers and transmitters are available in three powerclasses: Power class 1: Power is between 1mW and 100 mw, and range is 100 metres without obstacles. Power class 2: Power is max. 2.5 mw, and min. is 0.25 mw. Nominal power is 1 mw. Range is 10 meters without obstacles. Power class 3: Maximum power is 1 mw, and range is 10 cm. Baseband layer The baseband layer has a number of important functions, such as defining the frequency hopping, physical links and many packet formats. The baseband layer determines the frequency selection from the master device, and each slave device participating in the piconet hops at the same time, to the same frequency. If a master sends data at f k the slave may answer at f k+1. 12

17 2.2. WIRELESS COMMUNICATION ComNet, AAU Figure 2.2: Frequency selection during data transmission of 1, 3 and 5 slot packets [2]. The upper part of figure 2.2 shows a 1 slot packet, meaning that the data transmission uses one 625 micro second slot. In each of these slots a device in the piconet may transmit data. It is also possible to send packets in lasting 3 and 5 slots for higher data rates. If a packet of three or five slot is sent, the radio transmitter remains in the same frequency, and after receiving the devices returns to the frequency required for its hopping sequence. Slaves which not are participating in the transmission will continue with the hopping sequence so all devices can stay syncronized. The components of the Bluetooth packet at baseband layer is shown in figure 2.3. The packet consists of the following three fields: Figure 2.3: The figure shows the Baseband packet format, which consist of an acces code, packet header and payload.[2] Acces code: This field is used for synchronization of timing, and piconet 13

18 Group 681 CHAPTER 2. PRELIMINARY ANALYSIS identification. The access code consists of a 4 bit preamble, a 64 bit synchronization field and a 4 bit trailer. Packet header This field contains the features: address, packet type, flow and error control, and checksum. First field, Active Member Address (AMA) is the address of the slave, if a master sends data to a slave, is this field interpreted as the address of the slave, and if a slave wants to send data to a master, the field represents the field the address of the sender. The address 0 i, and only ones used for broadcast communication from the master to all slaves. The 4 bit type field determines the type of the packet. The different types of packets a listed in table 2.1. Packets can carry control, asynchronous or synchronous data. One flow mechanism for asynchronous traffic, utilizes the 1-bit flow field. If a packet is received with flow equal to zero, all asynchronous traffic must stop, and as soon a packet with flow equal to 1 is received the transmission can resume. If any acknowledgement of packets is required, Bluetooth sends this in the slot after the data packet has been received. The packet header is also protected by a 1/3 rate error correction, this means that the header is sent three times because it valuable link information and should survive bit errors. The 18 bit header therefore requires 54 bit in the packet. Payload: The payload can be up to 343 bytes dependent of the structure and type of link of the packet. 14

19 2.2. WIRELESS COMMUNICATION ComNet, AAU Type Payload (Byte) User payload FEC CRC Symmetric max rate (kbit/s) Asymmetric forward Max DM /3 Yes DH no Yes DM /3 Yes DH no Yes DM /3 Yes DH no Yes AUX no No HV1 na 10 1/3 No 64.0 na na HV2 na 20 2/3 No 64.0 na na HV3 na 30 no No 64.0 na na DV 1 D 10+ 2/3D No 64.0 na na Table 2.1: Bluetooth baseband data rules. [2] Bluetooth offers two types of links, one synchronous connection-oriented link, and an asynchronous connectionless link. They will both be described here: Synchronous connection-oriented link (SCO): Normal telephone connection requires a symmetrical circuit switched, point-to-point connections, for this type of link, the master reserves two following slots (one for forward, and one for return) in fixed intervals. One master can support up to three simultaneous SCO links the same slave, or to different slaves, a slave supports up to two links from different masters, of up to three links from a single master. When using a SCO link, three different types of single slot packets can be used. HV1, HV2 and HV3, (see table 2.1). Each of these SCO links carries voice at 64 bit. Asynchronous connectionless link (ACL): Data application typically requires symmetrical or asymmetrical packet-switched transfer. The master in the piconet uses a pilling scheme, were the slaves only may answer if it has been addressed in the previous slot. Only one ACL link may exist between a master and a slave. Data using ACL may consist of 1, 3 or 5 slots packets. These data can additionally be protected by using a 2/3 FEC scheme. This may help carrying data in noisy environments, with high error rates. But the overhead produced by FEC might be too 15

20 Group 681 CHAPTER 2. PRELIMINARY ANALYSIS high, therefore Bluetooth offers a fast automatic repeat request, named ARQ, which secures reliable transmission. Figure 2.4 illustrates an example transmission between one master and two slaves. The master uses the even slots, and the odd slots are reserved for the slaves. In this example every sixth slot is used for a SCO (ex. f 0 ) transmission between the master and slave one. The ACL link provided uses a single (ex. (f 4 ) slot or multiple (ex. f 1 4) and provide an asymmetric transmission. Figure 2.4: Example data transmission.[2] Bluetooth offers a high level of robustness. This is based on several technologies. Bluetooth s 1/3 FEC simply sends three copies of each bit and then makes a majority decision. 2/3 FEC, can detect all double errors. Link Manager Protocol The link manager protocol (LMP) manages a number of various aspects of the radio links between a master and slave. LMP manages the baseband functionality, but higher layers can still directly access the baseband. LMP cover the following functions: Authentication, pairing and encryption. Synchronization Capability negotiation Quality of service negotiation Power control 16

21 2.2. WIRELESS COMMUNICATION ComNet, AAU Link supervision State and transmission mode change L2CAP L2CAP (Logical link control and adaption protocol) is a data link control protocol on top of the baseband layer, which offers logical connections between devices. The L2CAP is only available for ACL packets (SCO packets have to use the baseband layer directly) L2CAP provides three types of logical channels: Connectionless: These one-way traffic is usually used for broadcasts. Connection-oriented: Each channel of this type is bi-directional and supports QoS in each direction. Signaling: This is only used for exchanging signalling messages between L2CAP layers. The L2CAP layer also provides segmentation. The layer accepts packets up to 64 Kbytes, but a DH5 packet for example only carries a packet of 339 bytes payload. Therefore the packet has to be chopped. SDP The service device protocol defines the discovery of new services provided in an ad-hoc fashion. If a device wants to offer a form of service has to implement a SDP server. Bluetooth PAN A PAN (Personal Area Network) allows a Bluetooth device to join a piconet and access LAN resources via a BNAP (Bluetooth Network Access Point). PAN profile defines three device roles: 17 Bluetooth Network Access Point: As a BNAP, a Bluetooth device provides access for up to seven active PANUs (Personal Area Network users) to access

22 Group 681 CHAPTER 2. PRELIMINARY ANALYSIS LAN. By default, the device which initiates the connection becomes master of the piconet. Therefore in theory the access point only have to initiate all connections. But that does not work in practice because the access point does not know which devices actually want to connect, therefore it can not initiate connections. Instead the LAN access point allows devices to connect to it, but on that condition that the device will accept a master-slave switch. Therefore the LAN access point can become master and efficiently manage its bandwidth. [3]. Group ad-hoc Network: As a GN, a Bluetooth device interconnects up to seven active PANUs in a piconet. PAN User: As a PANU a device can join a piconet via a BNAP. In a PAN packets are encapsulated using BNEP (Bluetooth Network Encapsulation Protocol). This makes it more bandwidth efficient and faster than LAN Access Profile which requires an establishment of a point-to-point link for each connection between two Bluetooth devices Wireless LAN The primary goal of the IEEE standard is to offer a simple and robust WLAN which offers time-bounded and asynchronous services. The MAC layer should be able to operate with different physical layers, each with different characteristics. An additional feature of the WLAN should include the support of power management to save battery power. The 2.4 GHz was chosen for the first standard, since it is available in most countries. The first standard was 1 Mbit/s and 2 Mbit/s optional. 2.3 Routing 2.4 Multicast Introduction Multicast communication gives an ability to open a UDP (User Datagram Protocol) socket and send a packet of data once and deliver this packet to many receivers. 18

23 2.4. MULTICAST ComNet, AAU Instead of sending N packets to N receivers, one multicast packet can be send and received by all N. A special range of IP addresses is assigned by IANA (The Internet Assigned Numbers Authority) to create a logical group of receivers. The group addresses will fall in the range of to [4]. By using this address the application programmer has the ability to send one or a stream of packets to this destination address and expect the network to deliver a copy of each packet to each receiver in the group. Multicast communication relies on additional functionality in the network to build a multicast forwarding tree between the sender and all the receivers in the group. The source is located at the root of the tree. From the root a packet stream flows up the different branches. At each branch in the tree the network receives an incoming packet, and copies it to each of the outgoing branches. Picture The functionality necessary to build and maintain the multicast trees on the internet is slowly being deployed. This means that the functionality is being hard- and software implemented in switches and routers as well as in operating systems and applications Multicast Compromise Multicast offers a great deal of power. The ability for one host to send one packet and have it received by many receivers is powerful. But also the power in multicast is its scalability. Applications which has to deliver data to a larger number of receivers, unicast fails quickly [5]. Multicast scalability is a great feature, but the benefits are not without any costs. The compromise is complexity. The price comes to those who deploys multicast in the network and the application writers. The complexity with multicast comes from the fact that that it is only a delivery mechanism. At the transport layer, multicast only works with UDP not with TCP. UDP does not offer congestion control and does not have reliable delivery. The problem with relible delivery and congestion control in multicast can be found in its complexity. Creating and managing all the variables and timers becomes rapidly a heavy burden. If there is more than one receiver, example , they could not all have different sending rate if you want to use multicast. Also there is no one to deal with acknowledgement packets, and resend lost packets. 19

24 Group 681 CHAPTER 2. PRELIMINARY ANALYSIS Overview of Multicast Routing Algorithms The data transmitted needs to be transferred from the sender to all the receivers. A spanning tree [6] has been considered one of the most efficient methods to perform data transmissions, since it minimizes duplications of data packets in the network. Messages are duplicated only when the tree branches, this prevents data loops. An efficient multicast routing algorithm will aim to build a Minimal Spanning Tree [7]. The type of tree to be used depends on how the receivers are distributed with high density or low density. Numbers of receivers does not matter. The receivers might too have some set of requirements like costs and delay which can be tolerated. Different types of trees to handle such special cases will be described here. Source Tree Source tree algorithms (also known as shortest path tree) builds a separate tree for each source 2.5. Reverse Shortest Paths (RSP) connects each receiver to the source. This is efficient for high data rate sources. It provides minimal delay for the cost expense. Whenever a source tree is used, a network with a high number of groups and each group having a larger number of sources, can stress the storage capability of the routers. Source trees consume more bandwidth for each individual multicast group. But their load is more evenly distributed than center based trees. [7] Figure 2.5: Host A Shortest Path Tree (Picture will be changed) [4]. 20

25 2.4. MULTICAST ComNet, AAU Shared Tree Shared tree algorithm builds a single tree to be used by all the sources. The data flow in the tree can be one way, or bi-directional. This is efficient for low rate sources and is efficient in the amount of information that needs to be maintained at each router. Shared trees use a single location in the network called core or the Rendezvous Point (RP) to which all packets from the sources are sent and from which packets are sent to all receivers. The path from a certain receiver to the source may be longer which may result in a delay. This can be a disadvantage for applications which relay on a low delay. The core is a potential bottleneck for data transmissions. The selection of the node to act as core is critical to performance of the protocol. The core can be selected from following: [7] Random Router (not necessarily a member of the group). Random Member. Topological Center for the entire network Topological Center of the multicast group (not necessarily member of the group) Topological center of the multicast group (member of the group) Random tree node (Only nodes belonging to the current multicast tree) Tree Center (Only nodes belonging to the center of the current tree) Figure 2.6: Shared Distribution Tree (Picture will be changed) [4]. 21

26 Group 681 CHAPTER 2. PRELIMINARY ANALYSIS Multicast Forwarding In a unicast routing environment, traffic is routed through the network along a single path, from source to destination. The router does not really care about the source address, but only destination and how to forward the data. The router scans through its routing table, and forwards a single copy of the packet out the correct interface. In multicast routing, the source sends traffic to a group of host, represented by the multicast group address. Therefore the router must determine which direction is upstream, (towards the source) and which is downstream. If there are multiple downstream paths the router replicates the packet and forwards the traffic down the appropriate downstream paths. This concept of forwarding multicast traffic away from the source, rather than to the receiver is called reversed path forwarding. [4] Reverse path forwarding Reverse Path Forwarding is utilized to build source-specific forwarding paths (SPT, shortest path tree), amongst which datagram s can flow more efficiently. Source specific multicast makes immediate use of this. Any source multicast usually switches from a centralized tree to the SPT on certain predefined conditions and for each source individually. This functionality is achieved by issuing source-specific joins towards the source, using the source address to look up a unicast routing table entry. This continues router by router until the source is reached. The source and the routers in between now start forwarding the traffic towards the direction the original join came from. The result is that the traffic is forwarded along the reverse path from the source back to the listener. While with symmetric routing, the reverse path is the same as the forward path, this is not necessarily true with asymmetric routing. Because the Internet is routed asymmetrically, the paths show significant differences quite often.[4] 22

27 2.5. EXPERIMENTAL PARTS ComNet, AAU 2.5 Experimental parts 2.6 Problem statement Which multicast-scheme is best suited for MO-FPS games, considering packet error rate, delay and jitter in a wireless multicast environment 23

28 Group 681 CHAPTER 3. PROBLEM DELIMITATION Chapter 3 Problem Delimitation 3.1 Introduction The following chapter includes tree sections. First, an overall project description, second, the Delimitation of study, so secure the project development will stay within the limits of the problem statement and third the scenarios with will be used in the following chapter. 3.2 Project description The Preliminary analysis includes the information needed to start the main part of the project, witch is the analysis of different multicast schemes, and it ends up with a problem statement in section 2.6 witch is the basis for the rest of the project. The present starting point is the overall scenario on figure 1.1, it shows that the system will be based on a central server system with direct access to the central multicast router. The central multicast router is connected to two subnets. The two subnets each include a switch or a router and a number of access points of either WLAN or Bluetooth, with a number notes connected. 3.3 Delimitation The delimitations are based on of the Preliminary analysis. 24

29 3.4. SCENARIOS ComNet, AAU PCs will be used as mobile devices There are a lot of mobile products available; which can handle communication via Bluetooth, WLAN or both. But PCs with WLAN and Bluetooth will be used to avoid the complexity included in using mobile phones or PDAs. Central server The main system consist of a central game-server, with handles all communication between the notes, directly connected to a central multicast router. The nodes are not able to directly communicate with each other. Other alternatives is either using peer-to-peer where all clients communicate with each other, or using one of the clients as server, where all the users communicate to the same client. The game type used is MO-FPS MO-FPS is chosen on the basis of the analyze of different game types in the section 2.1. It is the most interesting game type regarding its high demand for a low latency, and its relative high data communication rate. The main analysis will be centered on different multicast schemes. 3.4 Scenarios The overall scenario, 1.1, will be split up in tree scenarios. Each of the scenarios designed to test different problem Scenario I The first scenario, figure 3.1, is simple and will just be used to test multicasting on a simple level. The point is to set up a multicast router with a number of notes con- 25

30 Group 681 CHAPTER 3. PROBLEM DELIMITATION nected through both Bluetooth and WLAN. The multicast router will be tested with different multicast schemes. The scenario will also be used to test, the handover performance between two access point, both between two Bluetooth access points and two WLAN access points. Handover between different subnets is also possible. Figure 3.1: This scenario is the most simple with purpose of testing a multicast router with a number of notes Scenario II The second scenario, figure 3.2, is a bit more advanced where the central multicast router will send and receive data form the notes, through two other sub multicast routers, one used for Bluetooth and one used for WLAN. This will make the data sent from the central multicast router lower, since it only needs to sent a message to each of the two sub multicast routers, instead of sending a message to each node. 26

31 3.4. SCENARIOS ComNet, AAU Figure 3.2: System overview Scenario III The third scenario is based on testing the performance of handovers between a Bluetooth access point and a WLAN access point. This will affect the mobile notes with multiple homes. 27

32 Group 681 CHAPTER 4. ANALYSIS Chapter 4 Analysis 28

33 BIBLIOGRAPHY ComNet, AAU Bibliography [1] Overview of multiplayer mobile game design, version 1.1, December play Mobi v1 1 en.pdf. [2] Jochen Schiller. Mobile Communication, Second Edition. Addison Wesley, [3] Jennifer Bray. Masters and slaves: Roles in a bluetooth piconet, May [4] Cisco Systems. Internet protocol multicast, Febuary doc/ipmulti.htm. [5] David Makofske and Kevin Almeroth. Multicast Sockets - A practical Guide for Programmers. Morgan Kaufmann Publishers, [6] Wikipedia. Spanning tree, Marts tree %28networks%29. [7] Pragyansmita Paul and S V Raghaven. Survey of multicast routing algorithms and protocols, August files/pub/pragyan/survey multicasting.pdf. 29

Efficient Multicast Schemes for Mobile Multiparty Gaming Applications

Efficient Multicast Schemes for Mobile Multiparty Gaming Applications Efficient Multicast Schemes for Mobile Multiparty Gaming Applications P6-6th semester 2006 Group 681 - ComNet Aalborg University 9th March 2006 Institut for elektroniske systemer Fr. Bajers Vej 7 Telefon

More information

Efficient Multicast Schemes for Mobile Multiparty Gaming Applications

Efficient Multicast Schemes for Mobile Multiparty Gaming Applications Efficient Multicast Schemes for Mobile Multiparty Gaming Applications P6-6th semester 2006 Group 681 - ComNet Aalborg University 24th May 2006 Institut for elektroniske systemer Fr. Bajers Vej 7 Telefon

More information

Local Area Networks NETW 901

Local Area Networks NETW 901 Local Area Networks NETW 901 Lecture 6 IEEE 802.15.1 - Bluetooth Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 The 802.15 Family Target environment: communication of personal

More information

UNIT 5 P.M.Arun Kumar, Assistant Professor, Department of IT, Sri Krishna College of Engineering and Technology, Coimbatore.

UNIT 5 P.M.Arun Kumar, Assistant Professor, Department of IT, Sri Krishna College of Engineering and Technology, Coimbatore. Communication Switching Techniques UNIT 5 P.M.Arun Kumar, Assistant Professor, Department of IT, Sri Krishna College of Engineering and Technology, Coimbatore. Bluetooth Techniques References 1. Wireless

More information

e-pg Pathshala Quadrant 1 e-text

e-pg Pathshala Quadrant 1 e-text e-pg Pathshala Subject : Computer Science Module: Bluetooth Paper: Computer Networks Module No: CS/CN/37 Quadrant 1 e-text In our journey on networks, we are now exploring wireless networks. We looked

More information

Introduction to Wireless Networking ECE 401WN Spring 2009

Introduction to Wireless Networking ECE 401WN Spring 2009 I. Overview of Bluetooth Introduction to Wireless Networking ECE 401WN Spring 2009 Lecture 6: Bluetooth and IEEE 802.15 Chapter 15 Bluetooth and IEEE 802.15 What is Bluetooth? An always-on, short-range

More information

Bluetooth: Short-range Wireless Communication

Bluetooth: Short-range Wireless Communication Bluetooth: Short-range Wireless Communication Wide variety of handheld devices Smartphone, palmtop, laptop Need compatible data communication interface Complicated cable/config. problem Short range wireless

More information

Bluetooth. Basic idea

Bluetooth. Basic idea Bluetooth Basic idea Universal radio interface for ad-hoc wireless connectivity Interconnecting computer and peripherals, handheld devices, DAs, cell phones replacement of IrDA Embedded in other devices,

More information

Amarjeet Singh. February 7, 2012

Amarjeet Singh. February 7, 2012 Amarjeet Singh February 7, 2012 References Bluetooth Protocol Architecture v.1 www.bluetooth.org http://www.tutorial-reports.com/wireless/bluetooth/ Slides from last class uploaded on the course website

More information

CS263: Wireless Communications and Sensor Networks

CS263: Wireless Communications and Sensor Networks CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 6: Bluetooth and 802.15.4 October 12, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Bluetooth Standard for Personal Area

More information

CS4/MSc Computer Networking. Lecture 13: Personal Area Networks Bluetooth

CS4/MSc Computer Networking. Lecture 13: Personal Area Networks Bluetooth CS4/MSc Computer Networking Lecture 13: Personal Area Networks Bluetooth Computer Networking, Copyright University of Edinburgh 2005 BlueTooth Low cost wireless connectivity for Personal Area Networks

More information

Inside Bluetooth. Host. Bluetooth. Module. Application RFCOMM SDP. Transport Interface. Transport Bus. Host Controller Interface

Inside Bluetooth. Host. Bluetooth. Module. Application RFCOMM SDP. Transport Interface. Transport Bus. Host Controller Interface Inside Bluetooth Application Host Application Host Audio (SCO) RFCOMM SDP Data (ACL) Control API and Legacy Support Modules Bluetooth HCI Driver Transport Interface Physical I/F Transport Bus Bluetooth

More information

Introduction to Bluetooth Wireless Technology

Introduction to Bluetooth Wireless Technology Introduction to Bluetooth Wireless Technology Jon Inouye Staff Software Engineer Mobile Platforms Group Intel Corporation Bluetooth Bluetooth is is a a trademark trademark owned owned by by Bluetooth Bluetooth

More information

Guide to Wireless Communications, 3 rd Edition. Objectives

Guide to Wireless Communications, 3 rd Edition. Objectives Guide to Wireless Communications, 3 rd Edition Chapter 5 Wireless Personal Area Networks Objectives Describe a wireless personal area network (WPAN) List the different WPAN standards and their applications

More information

Bluetooth. Bluetooth Radio

Bluetooth. Bluetooth Radio Bluetooth Bluetooth is an open wireless protocol stack for low-power, short-range wireless data communications between fixed and mobile devices, and can be used to create Personal Area Networks (PANs).

More information

SE 4C03 Winter 2005 Bluetooth Wireless Network Technology

SE 4C03 Winter 2005 Bluetooth Wireless Network Technology SE 4C03 Winter 2005 Bluetooth Wireless Network Technology Researcher: Daren Tan Shen Hau Last Revised: April 4, 2005 Bluetooth As everyone will ask, what is Bluetooth? Bluetooth is a new technology that

More information

MOBILE COMPUTING. Bluetooth 9/20/15. CSE 40814/60814 Fall Basic idea

MOBILE COMPUTING. Bluetooth 9/20/15. CSE 40814/60814 Fall Basic idea OBILE COUTING CE 40814/60814 Fall 2015 Bluetooth Basic idea Universal radio interface for ad-hoc wireless connectivity Interconnecting computer and peripherals, handheld devices, DAs, cell phones replacement

More information

Structure of the Lecture

Structure of the Lecture Structure of the Lecture Chapter 2 Technical Basics: Layer 1 Methods for Medium Access: Layer 2 Chapter 3 Wireless Networks: Bluetooth, WLAN, WirelessMAN, WirelessWAN Mobile Networks: GSM, GPRS, UMTS Satellites

More information

Simulation of Bluetooth Network

Simulation of Bluetooth Network Simulation of Bluetooth Network Lennart Lagerstedt Stockholm, 2003 Master of Science Thesis Project The Department of Microelectronics and Information Technology, Royal Institute of Technology (KTH) Lennart

More information

Multicast Communications

Multicast Communications Multicast Communications Multicast communications refers to one-to-many or many-tomany communications. Unicast Broadcast Multicast Dragkedja IP Multicasting refers to the implementation of multicast communication

More information

Embedded Systems. 8. Communication

Embedded Systems. 8. Communication Embedded Systems 8. Communication Lothar Thiele 8-1 Contents of Course 1. Embedded Systems Introduction 2. Software Introduction 7. System Components 10. Models 3. Real-Time Models 4. Periodic/Aperiodic

More information

SIMULATION BASED ANALYSIS OF BLUETOOTH NETWORKS. M. Subramani and M. Ilyas

SIMULATION BASED ANALYSIS OF BLUETOOTH NETWORKS. M. Subramani and M. Ilyas SIMULATION BASED ANALYSIS OF BLUETOOTH NETWORKS M. Subramani and M. Ilyas College of Engineering Florida Atlantic University Boca Raton, Florida 33431 {msubrama@cse.fau.edu, ilyas@fau.edu} Abstract Many

More information

12/2/09. Mobile and Ubiquitous Computing. Bluetooth Networking" George Roussos! Bluetooth Overview"

12/2/09. Mobile and Ubiquitous Computing. Bluetooth Networking George Roussos! Bluetooth Overview Mobile and Ubiquitous Computing Bluetooth Networking" George Roussos! g.roussos@dcs.bbk.ac.uk! Bluetooth Overview" A cable replacement technology! Operates in the unlicensed ISM band at 2.4 GHz! Frequency

More information

Master. Slave. Master. Slaves. TCP/IP Traffic with Efficient Bluetooth Technology. Shafqat Hameed 1, Umar F.Khan 2, *Muhammad Saleem 3

Master. Slave. Master. Slaves. TCP/IP Traffic with Efficient Bluetooth Technology. Shafqat Hameed 1, Umar F.Khan 2, *Muhammad Saleem 3 / Traffic with Efficient Bluetooth Technology Shafqat Hameed 1, Umar F.Khan 2, *Muhammad Saleem 3 1,3 National University of Sciences and Technology (NUST), Pakistan 2 University of Bradford, Bradford,

More information

Bluetooth Demystified

Bluetooth Demystified Bluetooth Demystified S-72.4210 Postgraduate Course in Radio Communications Er Liu liuer@cc.hut.fi -10 Content Outline Bluetooth History Bluetooth Market and Applications Bluetooth Protocol Stacks Radio

More information

CHAPTER 12 BLUETOOTH AND IEEE

CHAPTER 12 BLUETOOTH AND IEEE CHAPTER 12 BLUETOOTH AND IEEE 802.15 These slides are made available to faculty in PowerPoint form. Slides can be freely added, modified, and deleted to suit student needs. They represent substantial work

More information

Wireless Sensor Networks

Wireless Sensor Networks Wireless Sensor Networks 11th Lecture 29.11.2006 Christian Schindelhauer schindel@informatik.uni-freiburg.de 1 Bluetooth in WSN? There are several commercially available MAC protocol/products Wi-Fi Bluetooth

More information

Internetworking Part 1

Internetworking Part 1 CMPE 344 Computer Networks Spring 2012 Internetworking Part 1 Reading: Peterson and Davie, 3.1 22/03/2012 1 Not all networks are directly connected Limit to how many hosts can be attached Point-to-point:

More information

CMPE150 Midterm Solutions

CMPE150 Midterm Solutions CMPE150 Midterm Solutions Question 1 Packet switching and circuit switching: (a) Is the Internet a packet switching or circuit switching network? Justify your answer. The Internet is a packet switching

More information

IP Multicast Technology Overview

IP Multicast Technology Overview IP multicast is a bandwidth-conserving technology that reduces traffic by delivering a single stream of information simultaneously to potentially thousands of businesses and homes. Applications that take

More information

System Level Analysis of the Bluetooth standard

System Level Analysis of the Bluetooth standard System Level Analysis of the standard Massimo Conti, Daniele Moretti Università Politecnica delle Marche, via Brecce Bianche, I-60131, Ancona, Italy Abstract The SystemC modules of the Link Manager Layer

More information

By FaaDoOEngineers.com

By FaaDoOEngineers.com ABSTRACT The seemingly endless entanglement of data wires connecting today s electronic devices has become slightly less jumbled with the introduction of Bluetooth technology and the creation of a wireless

More information

Bluetooth. Bluetooth Basics Bluetooth and Linux Bluetooth at AG Tech. Dr.-Ing. H. Ritter, 7.1

Bluetooth. Bluetooth Basics Bluetooth and Linux Bluetooth at AG Tech. Dr.-Ing. H. Ritter,   7.1 Bluetooth Bluetooth Basics Bluetooth and Linux Bluetooth at AG Tech Dr.-Ing. H. Ritter, http://www.hartmut-ritter.de/ 7.1 I. Bluetooth Idea Universal radio interface for ad-hoc wireless connectivity Interconnecting

More information

MOBILE COMPUTING. Jan-May,2012. ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala.

MOBILE COMPUTING. Jan-May,2012. ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala. WPAN: Bluetooth MOBILE COMPUTING Jan-May,2012 ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala Email-alakroy.nerist@gmail.com EM Spectrum ISM band 902 928 Mhz 2.4 2.4835 Ghz 5.725 5.85 Ghz LF MF

More information

Operating Systems. 16. Networking. Paul Krzyzanowski. Rutgers University. Spring /6/ Paul Krzyzanowski

Operating Systems. 16. Networking. Paul Krzyzanowski. Rutgers University. Spring /6/ Paul Krzyzanowski Operating Systems 16. Networking Paul Krzyzanowski Rutgers University Spring 2015 1 Local Area Network (LAN) LAN = communications network Small area (building, set of buildings) Same, sometimes shared,

More information

IP Multicast. What is multicast?

IP Multicast. What is multicast? IP Multicast 1 What is multicast? IP(v4) allows a host to send packets to a single host (unicast), or to all hosts (broadcast). Multicast allows a host to send packets to a subset of all host called a

More information

Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin,

Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin, Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin, ydlin@cs.nctu.edu.tw Chapter 1: Introduction 1. How does Internet scale to billions of hosts? (Describe what structure

More information

Communication Systems. WPAN: Bluetooth. Page 1

Communication Systems. WPAN: Bluetooth. Page 1 Communication Systems WPAN: Bluetooth Page 1 Outline Historical perspective Piconet Scatternet Lattency modes Applications Page 2 Bluetooth Bluetooth (BT) wireless technology is a short-range communications

More information

Lecture Computer Networks

Lecture Computer Networks Prof. Dr. H. P. Großmann mit M. Rabel sowie H. Hutschenreiter und T. Nau Sommersemester 2012 Institut für Organisation und Management von Informationssystemen Lecture Computer Networks Networks for Multimedia

More information

Ad Hoc Nets - MAC layer. Part II TDMA and Polling

Ad Hoc Nets - MAC layer. Part II TDMA and Polling Ad Hoc Nets - MAC layer Part II TDMA and Polling More MAC Layer protocols Bluetooth Piconet: a polling/tdma scheme Cluster TDMA: based on TDMA (with random access and reserved slots) research protocol

More information

Local Area Networks (LANs): Packets, Frames and Technologies Gail Hopkins. Part 3: Packet Switching and. Network Technologies.

Local Area Networks (LANs): Packets, Frames and Technologies Gail Hopkins. Part 3: Packet Switching and. Network Technologies. Part 3: Packet Switching and Gail Hopkins Local Area Networks (LANs): Packets, Frames and Technologies Gail Hopkins Introduction Circuit Switching vs. Packet Switching LANs and shared media Star, bus and

More information

CSCI-1680 Network Layer:

CSCI-1680 Network Layer: CSCI-1680 Network Layer: Wrapup Rodrigo Fonseca Based partly on lecture notes by Jennifer Rexford, Rob Sherwood, David Mazières, Phil Levis, John JannoA Administrivia Homework 2 is due tomorrow So we can

More information

What is Multicasting? Multicasting Fundamentals. Unicast Transmission. Agenda. L70 - Multicasting Fundamentals. L70 - Multicasting Fundamentals

What is Multicasting? Multicasting Fundamentals. Unicast Transmission. Agenda. L70 - Multicasting Fundamentals. L70 - Multicasting Fundamentals What is Multicasting? Multicasting Fundamentals Unicast transmission transmitting a packet to one receiver point-to-point transmission used by most applications today Multicast transmission transmitting

More information

[A SHORT REPORT ON BLUETOOTH TECHNOLOGY]

[A SHORT REPORT ON BLUETOOTH TECHNOLOGY] 2011 [A SHORT REPORT ON BLUETOOTH TECHNOLOGY] By Ram Kumar Bhandari 1. Introduction Bluetooth Technology A Technical Report Bluetooth is a short-ranged wire-less communication technology implementing the

More information

Bluetooth. Renato Lo Cigno

Bluetooth. Renato Lo Cigno Bluetooth Renato Lo Cigno www.dit.unitn.it/locigno/teaching ...Copyright Quest opera è protetta dalla licenza Creative Commons NoDerivs- NonCommercial. Per vedere una copia di questa licenza, consultare:

More information

Wireless Networked Systems

Wireless Networked Systems Wireless Networked Systems CS 795/895 - Spring 2013 Lec #7: Medium Access Control WPAN, Bluetooth, ZigBee Tamer Nadeem Dept. of Computer Science Bluetooth Page 2 Spring 2013 CS 795/895 - Wireless Networked

More information

Analysis of UDP Performance over Bluetooth

Analysis of UDP Performance over Bluetooth Analysis of UDP Performance over Bluetooth Martin Connolly, Cormac J. Sreenan University College Cork Department of Computer Science Email: cjs@cs.ucc.ie Abstract The Bluetooth protocol is one of the better-known

More information

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet Chapter 2 - Part 1 The TCP/IP Protocol: The Language of the Internet Protocols A protocol is a language or set of rules that two or more computers use to communicate 2 Protocol Analogy: Phone Call Parties

More information

Why multicast? The concept of multicast Multicast groups Multicast addressing Multicast routing protocols MBONE Multicast applications Conclusions

Why multicast? The concept of multicast Multicast groups Multicast addressing Multicast routing protocols MBONE Multicast applications Conclusions Tuomo Karhapää tuomo.karhapaa@otaverkko.fi Otaverkko Oy Why multicast? The concept of multicast Multicast groups Multicast addressing Multicast routing protocols MBONE Multicast applications Conclusions

More information

Da t e: August 2 0 th a t 9: :00 SOLUTIONS

Da t e: August 2 0 th a t 9: :00 SOLUTIONS Interne t working, Examina tion 2G1 3 0 5 Da t e: August 2 0 th 2 0 0 3 a t 9: 0 0 1 3:00 SOLUTIONS 1. General (5p) a) Place each of the following protocols in the correct TCP/IP layer (Application, Transport,

More information

By N.Golmie Presented by: Sushanth Divvela

By N.Golmie Presented by: Sushanth Divvela By N.Golmie Presented by: Sushanth Divvela 1 Agenda Introduction WPAN WLAN Simulation Models Simulation results Concluding remarks 2 Introduc.on Coexistence of WPAN and WLAN Performance evaluation WLAN

More information

Redes Inalámbricas Tema 2.B Wireless PANs: Bluetooth

Redes Inalámbricas Tema 2.B Wireless PANs: Bluetooth Redes Inalámbricas Tema 2.B Wireless PANs: Bluetooth Bluetooh Acknowledgments: Foo Chun Choong, Ericsson Research / Cyberlab Singapore, and Open Source Software Lab, ECE Dept, NUS Máster de Ingeniería

More information

MODULE: NETWORKS MODULE CODE: CAN1102C. Duration: 2 Hours 15 Mins. Instructions to Candidates:

MODULE: NETWORKS MODULE CODE: CAN1102C. Duration: 2 Hours 15 Mins. Instructions to Candidates: BSc.(Hons) Computer Science with Network Security BEng (Hons) Telecommunications Cohort: BCNS/17B/FT Examinations for 2017-2018 / Semester 2 Resit Examinations for BCNS/15A/FT, BTEL/15B/FT & BTEL/16B/FT

More information

Chapter 2 Network Models 2.1

Chapter 2 Network Models 2.1 Chapter 2 Network Models 2.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 2-1 LAYERED TASKS We use the concept of layers in our daily life. As an example,

More information

Goals and topics. Verkkomedian perusteet Fundamentals of Network Media T Circuit switching networks. Topics. Packet-switching networks

Goals and topics. Verkkomedian perusteet Fundamentals of Network Media T Circuit switching networks. Topics. Packet-switching networks Verkkomedian perusteet Fundamentals of Media T-110.250 19.2.2002 Antti Ylä-Jääski 19.2.2002 / AYJ lide 1 Goals and topics protocols Discuss how packet-switching networks differ from circuit switching networks.

More information

On Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August 1964

On Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August 1964 The requirements for a future all-digital-data distributed network which provides common user service for a wide range of users having different requirements is considered. The use of a standard format

More information

Sensor Application for Museum Guidance

Sensor Application for Museum Guidance Sensor Application for Museum Guidance Radka Dimitrova a a TU,Dresden, Germany, e-mail: dimitrova@ifn.et.tu-dresden.de Abstract - This article examines the conditions for successful communication and power

More information

Wireless Communications

Wireless Communications 4. Medium Access Control Sublayer DIN/CTC/UEM 2018 Why do we need MAC for? Medium Access Control (MAC) Shared medium instead of point-to-point link MAC sublayer controls access to shared medium Examples:

More information

EEC-484/584 Computer Networks

EEC-484/584 Computer Networks EEC-484/584 Computer Networks Lecture 13 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review of lecture 12 Routing Congestion

More information

Lecture 16: QoS and "

Lecture 16: QoS and Lecture 16: QoS and 802.11" CSE 123: Computer Networks Alex C. Snoeren HW 4 due now! Lecture 16 Overview" Network-wide QoS IntServ DifServ 802.11 Wireless CSMA/CA Hidden Terminals RTS/CTS CSE 123 Lecture

More information

The OSI Model. Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO).

The OSI Model. Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Network Models The OSI Model Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Model for understanding and developing computer-to-computer communication

More information

ENRNG3076 : Oral presentation BEng Computer and Communications Engineering

ENRNG3076 : Oral presentation BEng Computer and Communications Engineering Jean Parrend ENRNG3076 : Oral presentation BEng Computer and Communications Engineering 1 Origin 2 Purpose : Create a cable replacement standard for personal area network Handle simultaneously both data

More information

ALL SAINTS COLLEGE OF TECHNOLOGY, BHOPAL

ALL SAINTS COLLEGE OF TECHNOLOGY, BHOPAL BLUETOOTH Amita Tiwari IIIrd Semester amitaasct@gmail.com Sunil Kumar IIIrd Semester sunilasct@gmail.com ALL SAINTS COLLEGE OF TECHNOLOGY, BHOPAL ABSTRACT Blue tooth is a standard developed by a group

More information

The Open System Interconnect model

The Open System Interconnect model The Open System Interconnect model Telecomunicazioni Undergraduate course in Electrical Engineering University of Rome La Sapienza Rome, Italy 2007-2008 1 Layered network design Data networks are usually

More information

Cisco Catalyst 6500 Series Wireless LAN Services Module: Detailed Design and Implementation Guide

Cisco Catalyst 6500 Series Wireless LAN Services Module: Detailed Design and Implementation Guide Cisco Catalyst 6500 Series Wireless LAN Services Module: Detailed Design and Implementation Guide Introduction This is the first of a series of documents on the design and implementation of a wireless

More information

II. Principles of Computer Communications Network and Transport Layer

II. Principles of Computer Communications Network and Transport Layer II. Principles of Computer Communications Network and Transport Layer A. Internet Protocol (IP) IPv4 Header An IP datagram consists of a header part and a text part. The header has a 20-byte fixed part

More information

Bluetooth Wireless Technology meets CAN

Bluetooth Wireless Technology meets CAN Bluetooth Wireless Technology meets CAN Matthias Fuchs esd electronic system design GmbH, Hannover, Germany To access mobile and moving CAN fieldbus systems a wireless approach is often a good solution.

More information

Bluetooth. Acknowledgements. Based on Jochen Schiller slides. Supporting text

Bluetooth. Acknowledgements. Based on Jochen Schiller slides. Supporting text BT 1 Bluetooth FEUP PR BT 2 Acknowledgements Based on Jochen chiller slides upporting text» Jochen chiller, obile Comunications, Addison-Wesley» ection 7.5 Bluetooth BT 3 Bluetooth» Universal radio interface

More information

Distributed Queue Dual Bus

Distributed Queue Dual Bus Distributed Queue Dual Bus IEEE 802.3 to 802.5 protocols are only suited for small LANs. They cannot be used for very large but non-wide area networks. IEEE 802.6 DQDB is designed for MANs It can cover

More information

DATA COMMUNICATOIN NETWORKING

DATA COMMUNICATOIN NETWORKING DATA COMMUNICATOIN NETWORKING Instructor: Ouldooz Baghban Karimi Course Book & Slides: Computer Networking, A Top-Down Approach By: Kurose, Ross Introduction Course Overview Basics of Computer Networks

More information

EITF25 Internet Techniques and Applications L7: Internet. Stefan Höst

EITF25 Internet Techniques and Applications L7: Internet. Stefan Höst EITF25 Internet Techniques and Applications L7: Internet Stefan Höst What is Internet? Internet consists of a number of networks that exchange data according to traffic agreements. All networks in Internet

More information

- Hubs vs. Switches vs. Routers -

- Hubs vs. Switches vs. Routers - 1 Layered Communication - Hubs vs. Switches vs. Routers - Network communication models are generally organized into layers. The OSI model specifically consists of seven layers, with each layer representing

More information

Extending or Interconnecting LANS. Physical LAN segment. Virtual LAN. Forwarding Algorithm 11/9/15. segments. VLAN2, Port3. VLAN1, Port1.

Extending or Interconnecting LANS. Physical LAN segment. Virtual LAN. Forwarding Algorithm 11/9/15. segments. VLAN2, Port3. VLAN1, Port1. Physical LAN segment q Hosts connected on the same physical LAN segment q Same subnet; L2 forwarding q ARP (IPè MAC) L2 frame (S, D), send q Scale? Extending or Interconnecting LANS q q q Why not just

More information

Wireless Local Area Network. Internet Protocol Suite

Wireless Local Area Network. Internet Protocol Suite Wireless Local Area Network Internet Protocol Suite Application layer File transfer protocol Telnet Hypertext transfer protocol Transport layer Network layer Host-tonetwork layer User datagram protocol

More information

Chapter 5.6 Network and Multiplayer

Chapter 5.6 Network and Multiplayer Chapter 5.6 Network and Multiplayer Multiplayer Modes: Event Timing Turn-Based Easy to implement Any connection type Real-Time Difficult to implement Latency sensitive 2 Multiplayer Modes: Shared I/O Input

More information

Module 7 Implementing Multicast

Module 7 Implementing Multicast Module 7 Implementing Multicast Lesson 1 Explaining Multicast Why Multicast? Used when sending same data to multiple receivers Better bandwidth utilization Less host/router processing Used when addresses

More information

Multicast Technology White Paper

Multicast Technology White Paper Multicast Technology White Paper Keywords: Multicast, IGMP, IGMP Snooping, PIM, MBGP, MSDP, and SSM Mapping Abstract: The multicast technology implements high-efficiency point-to-multipoint data transmission

More information

Chapter 5 (Week 9) The Network Layer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP BLM431 Computer Networks Dr.

Chapter 5 (Week 9) The Network Layer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP BLM431 Computer Networks Dr. Chapter 5 (Week 9) The Network Layer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP. 343-396 1 5.1. NETWORK LAYER DESIGN ISSUES 5.2. ROUTING ALGORITHMS 5.3. CONGESTION CONTROL ALGORITHMS 5.4.

More information

CS 268: IP Multicast Routing

CS 268: IP Multicast Routing Motivation CS 268: IP Multicast Routing Ion Stoica April 8, 2003 Many applications requires one-to-many communication - E.g., video/audio conferencing, news dissemination, file updates, etc. Using unicast

More information

4.2 Multicast IP supports multicast to support one-to-many (radio, news, IP multicast was originally a many-to-many (any source MC or

4.2 Multicast IP supports multicast to support one-to-many (radio, news, IP multicast was originally a many-to-many (any source MC or CS475 Networks Lecture 14 Chapter 4 Advanced Internetworking Assignments Reading for Lecture 15: Sections 5.1-5.2 Homework 5, Wireshark Project 3 posted, due next Thursday; Programming Project 3 posted,

More information

Presented by: Murad Kaplan

Presented by: Murad Kaplan Presented by: Murad Kaplan Introduction. Design of SCP-MAC. Lower Bound of Energy Performance with Periodic Traffic. Protocol Implementation. Experimental Evaluation. Related Work. 2 Energy is a critical

More information

Chapter 6: Network Communications and Protocols

Chapter 6: Network Communications and Protocols Learning Objectives Chapter 6: Network Communications and Protocols Understand the function and structure of packets in a network, and analyze and understand those packets Understand the function of protocols

More information

Class-based Packet Scheduling Policies for Bluetooth

Class-based Packet Scheduling Policies for Bluetooth Class-based Packet Scheduling Policies for Bluetooth Vishwanath Sinha, D. Raveendra Babu Department of Electrical Engineering Indian Institute of Technology, Kanpur - 08 06, INDIA vsinha@iitk.ernet.in,

More information

ET4254 Communications and Networking 1

ET4254 Communications and Networking 1 Topic 10:- Local Area Network Overview Aims:- LAN topologies and media LAN protocol architecture bridges, hubs, layer 2 & 3 switches 1 LAN Applications (1) personal computer LANs low cost limited data

More information

Introduction to Networking

Introduction to Networking Introduction to Networking Chapters 1 and 2 Outline Computer Network Fundamentals Defining a Network Networks Defined by Geography Networks Defined by Topology Networks Defined by Resource Location OSI

More information

Review. Some slides are in courtesy of J. Kurose and K. Ross

Review. Some slides are in courtesy of J. Kurose and K. Ross Review The Internet (IP) Protocol Datagram format IP fragmentation ICMP: Internet Control Message Protocol NAT: Network Address Translation Routing in the Internet Intra-AS routing: RIP and OSPF Inter-AS

More information

RSVP Support for RTP Header Compression, Phase 1

RSVP Support for RTP Header Compression, Phase 1 RSVP Support for RTP Header Compression, Phase 1 The Resource Reservation Protocol (RSVP) Support for Real-Time Transport Protocol (RTP) Header Compression, Phase 1 feature provides a method for decreasing

More information

Computer Networks. Wireless LANs

Computer Networks. Wireless LANs Computer Networks Wireless LANs Mobile Communication Technology according to IEEE (examples) Local wireless networks WLAN 802.11 Personal wireless nw WPAN 802.15 WiFi 802.11a 802.11b 802.11h 802.11i/e/

More information

DD2490 p IP Multicast routing. Multicast routing. Olof Hagsand KTH CSC

DD2490 p IP Multicast routing. Multicast routing. Olof Hagsand KTH CSC DD2490 p4 2010 IP Multicast routing Multicast routing Olof Hagsand KTH CSC 1 Literature RFC 4601 Section 3 (you may need some definitions from Section 2). See reading instructions on web. 2 Deployment

More information

ECE 333: Introduction to Communication Networks Fall 2001

ECE 333: Introduction to Communication Networks Fall 2001 ECE : Introduction to Communication Networks Fall 00 Lecture : Routing and Addressing I Introduction to Routing/Addressing Lectures 9- described the main components of point-to-point networks, i.e. multiplexed

More information

Data and Computer Communications. Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications

Data and Computer Communications. Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications Data and Computer Communications Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based s 1 Need For Protocol Architecture data exchange can involve complex procedures better if task broken into subtasks

More information

Multimedia Communications

Multimedia Communications Multimedia Communications Directions and Innovations Introduction István Beszteri istvan.beszteri@hut.fi Multimedia Communications: Source Representations, Networks and Applications! Introduction! Networks

More information

Study Guide. Module Two

Study Guide. Module Two Module Two Study Guide Study Guide Contents Part One -- Textbook Questions Part Two -- Assignment Questions Part Three -- Vocabulary Chapter 4 Data Link Layer What is the function of the data link layer?

More information

Performance Evaluation of Bluetooth Links in the Presence of Specific Types of Interference

Performance Evaluation of Bluetooth Links in the Presence of Specific Types of Interference Vol:1, No:3, 27 Performance Evaluation of Bluetooth Links in the Presence of Specific Types of Interference Radosveta Sokullu and Engin Karatepe International Science Index, Electrical and Computer Engineering

More information

Computer Networks II Advanced Features (T )

Computer Networks II Advanced Features (T ) Computer Networks II Advanced Features (T-110.5111) Bluetooth, PhD Assistant Professor DCS Research Group Based on slides previously done by Matti Siekkinen, reused with permission For classroom use only,

More information

Transport Layer. Application / Transport Interface. Transport Layer Services. Transport Layer Connections

Transport Layer. Application / Transport Interface. Transport Layer Services. Transport Layer Connections Application / Transport Interface Application requests service from transport layer Transport Layer Application Layer Prepare Transport service requirements Data for transport Local endpoint node address

More information

Multicast overview. Introduction to multicast. Information transmission techniques. Unicast

Multicast overview. Introduction to multicast. Information transmission techniques. Unicast Contents Multicast overview 1 Introduction to multicast 1 Information transmission techniques 1 Multicast features 3 Common notations in multicast 4 Multicast advantages and applications 4 Multicast models

More information

INTRODUCTORY COMPUTER

INTRODUCTORY COMPUTER INTRODUCTORY COMPUTER NETWORKS TYPES OF NETWORKS Faramarz Hendessi Introductory Computer Networks Lecture 4 Fall 2010 Isfahan University of technology Dr. Faramarz Hendessi 2 Types of Networks Circuit

More information

Feasibility of a Bluetooth Based Structural Health Monitoring Telemetry System

Feasibility of a Bluetooth Based Structural Health Monitoring Telemetry System Feasibility of a Bluetooth Based Structural Health Monitoring Telemetry System Item Type text; Proceedings Authors Uchil, Vilas; Kosbar, Kurt Publisher International Foundation for Telemetering Journal

More information

Department of Information Technology. CS6551 Computer Networks. Anna University - Two Mark Questions

Department of Information Technology. CS6551 Computer Networks. Anna University - Two Mark Questions Department of Information Technology CS6551 Computer Networks Anna University - Two Mark Questions 1. What are the functions of application layer? The application layer is the top-most layer of OSI model.

More information