INTRODUCTION TO CROSS LAYER DESIGN AND CROSS LAYER BASIC SCHEMES

Size: px
Start display at page:

Download "INTRODUCTION TO CROSS LAYER DESIGN AND CROSS LAYER BASIC SCHEMES"

Transcription

1 INTRODUCTION TO CROSS LAYER DESIGN AND CROSS LAYER BASIC SCHEMES

2 Chapter 2: INTRODUCTION TO CROSS LAYER DESIGN AND CROSS LAYER BASIC SCHEMES 2.1-Introduction to Cross Layer Design: Cross layer optimization has been a busy topic for the last few years due to the different proposals which attempt to add certain improvements in the OSI model. As for now some researchers assume that cross layer design holds the key to an optimal performance that could provide faster services by allowing different layers to directly communicate each other, which results in significant changes on how the current OSI can work. Cross layer design is one of the proposed designs in the field of communication which can provide such expectation. This work focuses on Cross layer protocol as a better option with respect to layered-protocol. The layered protocol architecture (OSI) model divides networking tasks into layers and defines a pocket of services for each layer to be provided individually, the design of the protocol makes the services realized for different layers, no direct communication between nonadjacent layers is permitted as the architecture forbids such an action, also communication is limited to procedure calls and responses between adjacent layers. Whereas the cross layer design violates the reference architecture, by allowing direct communication between protocols at nonadjacent layers, and allows sharing variables between layers, which gives it a better performance that would satisfy the wireless mesh network demands. Cross layer design is believed to be a promising future in the sense of the date rate transfer and most effective design that can solve the increase of wavelength data rate, normal architecture can also be used at all-time but if the requirements have become heavier in the near future as a video calling, online games and more applications are now used for communication and entertainment, eventually these applications require faster data transfer rate to achieve the maximum possible throughput. Despite the fact that developing new rules in the existing architecture is not an easy task, but the need for better network capacity requires developing the Cross layer Design. There are wild services assigned to layers in order to create the architecture each service cannot be interrupted during the execution time and Cross layer design aims to keep that existing with faster services to be provided. The core idea behind the work is to make direct access among the layers so each one can individually reach other layers and expect data from different layers level. The need

3 for such development existed few years ago because of the increment of the users who require more internet speed and availability. The use of Cross Layer has not been introduced to programmers or users because it is still under experimental and research study, also the possibility of establishing a new rate of transfer has not been ensured and brought into the light clearly until now. But even thus researchers experimented some cross layer designs and proved higher performance in the simulation process using few of the layers as a cross layer design. Therefore, each layer needs to be separately examined to the possibility of adding a new service or modifying the existing once than we may be able to establish a new utility or a function that could allow a specific layer to communicate directly with the nonadjacent layers in the stack, then depending on the results we receive as outcome of the simulation process, framework, protocol, algorithm a cross layer design would be built. It is proved that cross layer design can significantly improve network performance. But in the process of cross layer design, it is difficult to analyze the complex interactions among the layers. The traditional protocol architectures follow strict rules which became basic principles for the network protocols. The layered protocol architecture follows the same strict rules and principles, its design is an attractive design as it works to support standardization of network architecture using the layered model, but it does not provide an optimal performance for wireless mesh network. Considering some features of wireless mesh network are different from wireless sensor and mobile ad hoc network features, as wireless mesh network is concerned more with scalable end to end throughput and quality of service. Cross layer design can be realized between multiple layers or between just two layers. Given a protocol stack, cross layer design can be based in any combination of two protocol layers [3]. QoS which makes the overall network performance critical and in need of optimization, as the performance of the OSI is facing so many challenges, but in the other hand, building new rules for any layer and violating the structure of an existing protocol would need too much effort and research even thus if it is possible. The complications that can come out of such protocol would need time and researches to be optimized. Cross layer design that enables multiple layers to cooperate with each other has been shown to be more efficient for network congestion control than the

4 aforementioned layer design. A cross layer protocol solves such problem by adapting the changes as it has the ability to be widely optimized, in other words a Cross layer design aims to overcome such limitation found in the layered protocol and could not be optimized. Cross layer main work is to maintain the functionalities associated to the original layer and to allow coordination, interaction and joint optimization protocols which are crossing every layer of the stack. Cross layer Design allows different layer architecture to communicate with each other in order to provide services for all layers at all time. It is important to know that Cross layer optimization is still an ongoing research where researchers try to improve the performance for better quality of services but such improvement drives us to solve other issues which may make the process of optimization complicated but possible. Cross layer design can significantly improve the network performance; cross layer can be performed in two ways Loosely coupled Cross layer design: The loosely couple optimize without crossing layers, it focus on one protocol layer in order to improve that single layer. Tightly coupled cross layer design: The tightly couple works different as it optimizes all layers together as one optimization problem. In the typical way used for wireless networks, furthermore data transfer suffers from performance limitation which vary from 10-3 up to 10-1 for wireless links while for wired channels the transfer rate goes from 10-8 to Various scientific researches addressed and worked with low complexity, results for which have proposed different designs which could be adapted and developed according to the success factor and ability of each design. Cross Layer Design can be a significant change for the future of a computerized world, faster world and full of opportunities, but as for now there are security issues, performance attitude being investigated and simulated in order to find and optimize the optimal results that could be ensured to the users. Despite the rapid strides in technology, there are still some fundamental challenges in need of satisfactory solutions.

5 The Open Systems Interconnection (OSI) layered model of networks (and networking techniques subsequently developed to suit it) was based on small, lowspeed networks, by current optical standards [20]. These standards are to be changed accordingly. The Open systems interconnection stills the base of the cross layer design but with new rules that allow us to use the advantage and strength of the OSI. This research work aims to exist and validate a new framework for the existing Cross layer designs and optimize it in Wireless Mesh Networks. Optimizing the cross layer in wireless mesh network has been recently an active topic due to the need of implementing a new framework which would increase the performance of the architecture resulting in satisfying the need and demands of the wired and wireless communication requirements. In the OSI model there are strict boundaries that allow communication within only a single layer, so to avoid these types of boundaries Cross layer optimization has been developed wherein communication between layers is done by allowing one layer to access data of another layer by exchanging information. Allowing the layers to communicate each other independently shall make them faster in the sense of producing calls and responses and can get advantage of the time wasted when execution process is taking place at any layer, other application can find their way to another layer and use the services of those layers. It is also because of the increased size of the applications that need a very high performance such as online video gaming, conference video calling, and the size of a full HD videos, documents and files. Furthermore the use of Cross Layer Design in wireless mesh network was proposed a while ago but has recently become a mainstream subject of study in optical networking. The design of cross layer can make multiple layer work with each other and communicate to achieve higher performance in different level of the OSI or the TCP/IP so a better output is awaited from such improvement, different schemes were established to serve the same but in different styles and with different parameters which lead to the improvement of the TCP/IP protocol and the current OSI, those schemes would be revised later in order to gain a clear understanding on the ways researcher approach to develop the cross layer design.

6 The different schemes proposed for cross layer can also have some similarities and they may sometime show a function which would work with two different schemes depending on how the layer would act and serve. The main purpose of optimizing the Cross Layer is to create direct access between layers. The goal of creating new rules to the TCP/IP or OSI model is to enable the cross layer design in inheriting the current power they have and use it to develop a powerful architecture that keeps the conventional layered protocol existing and fully functioning with more efficiency and higher performance at the same time. Establishing a new protocol for communication is not required because the TCP/IP is still the best way that communication can have, but we still need and should modify it in order to speed up the transfer rate. The schemes proposed as a solution for cross layer design are fascinating but the assumed performance is not totally proved yet. Most of the hypotheses and research proposals in the cross layer design show a promising future and also show how fast demands are growing for wireless communication. The cross layer design consists of the same layers that are available with the TCP/IP or OSI model and it does not obtain to remove or eliminate any of the seven layers, the only scenario that researchers are digging in is to implement the capability of those layers and make them stronger with respect to the data transfer and communication speed. In the last few years some applications were introduced to the users, those kinds of application uses a high transfer rate capacity in another words they require higher performance and better internet speed. Efficiency, performance and speed are the main objects for developing the cross layer design, there are many schemes that aimed to fulfil the cross layer requirements and provide solutions that were introduced to the research field, and each one of them is just another cross layer design that has probability of success and failure. Eventually most of the researchers focused on two layers in order to make them approachable by each other but not merging them as one layer. Some schemes suggested merging some layers so they can act as one layer which will result in creating faster services because the waiting time for execution will be avoided. Other schemes assumes that allowing direct access in all the stack is not compulsory, instead we can allow the access between three or even two layer depending on the functions and services that we need to optimize. Cross layer optimization is also one of the topics that aims study resource allocation problem in communication network. It is

7 important to know that while optimizing the cross layer design at one layer other layer will not be effected they will function as they were, if we assume one lower layer has been modified so the next higher layer is totally unchanged and that is due to the design of OSI or TCP/IP which does not allow any kind of connection other than the specific services assigned to each layer individually. In order to develop or change any of the content of any layer we have to implement the layer with (hardware, software or framework) entity, but not to eliminate any entity unless it would be replaced with another. The TCP/IP protocol and the OSI theoretical model models have no problems in respect of the services it provides or the way it operates but nowadays they require optimizing to gain more performance, so we can reach the maximum output. The issue with OSI that researchers seek to solve is the performance of overall architecture. Cross layer has potentials that would change the way users think of the communication process, it is a wonderful design that can work in few layers of the stack or may be the entire layer but the main advantage of this design is its ability of not affecting the entire OSI if it is not applicable for optimizing. The seven layers have certain rules that they follow whatever happens even if some data is reporting lost packets, the reason behind that is its roll of resending the lost packet but such roll results in delaying the data transfer. Each layer of the protocol can be optimized by modifying its rules and services but at the same time creating new once, that would fit the need of the other layers. The interaction between layers requires a new interface which would allow such interaction to happen creating direct access among layers. The cross layer approach can be a significant change for the wireless network due to the expected performance coming out of the lack coordinates between layers. Wireless Mesh Network can have a great optimization process but different scenarios must be obtained to evaluate the expected results and apply effective methods. Therefore, Wireless Mesh Networks is one of technique that requires the development and optimization of the TCP/IP and the current OSI model. The routing process is one of the main issues that wireless communication generally suffers from, as the paths increases and the routing process may need more time than the usual time the procedures endure. The routing process is compulsory because each and every place that requires internet will have to use a router where the use of the routers differs from some place to another depending of the location that would to be covered, either

8 wirelessly or wired. So one of the main issues is the routing process and from this issue some schemes were proposed and some are still an open research issues. Cross layer design is a need not a fashion for optimizing the overall architecture of the OSI model and the TCP/IP protocol. Furthermore this work will provide a new framework design to solve IP fragmentation issues by applying the cross layer design in several layers of the stack. 2.2-Review of Literature: In the past there have been different proposals on enhancing transport protocol (usually TCP) performance by means of providing explicit information and notifications from different protocol layers above or below transport. The cross layer notifications can be local notifications from the lower or upper protocol layers of the host device, or it can be explicit communication between the transport peers and the network between them. Cross layer signalling could be used, for example, for delivering hints to a transport sender about the characteristics of the network path, to allow the sender to adjust its sending rate more efficiently than what would be possible using the traditional TCP probing mechanisms [RFC2914, RFC2581]. A Cross layer approach to network design can significantly increase the design complexity. Indeed, protocol layers are extremely useful in allowing designers to optimize a single protocol layer design without the complexity and expertise associated with considering other layers. Thus, cross layer design should not eliminate the design advantages of layering. Keeping some form of separation, while allowing layers to actively interact, appears a good compromise for enabling interaction between layers without eliminating the layering principle [21]. Existing Cross layer optimization solutions often involve only the layers below the application layer, which collectively aim to maximize QoS metrics such as throughput, packet loss rate, average or worst case delay etc., but without considering the specific characteristics and requirements of the applications [22]. The success of layered architecture has been observed in many fields. However, the open system interconnect (OSI) architecture of computer networks may not be able to provide QoS in all parameters, so optimization goals need to pursue in multiple layers. Also, since some applications do not need all layers, and optimizations may conflict with each

9 Cross layer hierarchical layers in communication networks [23]. A layered architecture, like the seven-layer open systems interconnect (OSI) model divides the overall networking task into layers and defines a hierarchy of services to be provided by the individual layers. The services at the layers are realized by designing protocols for the different layers. The architecture forbids direct communication between nonadjacent layers. Communication between adjacent layers is limited to procedure calls and responses. In the framework of reference layered architecture, the designer has two choices at the time of protocol design. Protocols can be designed by respecting the rules of the reference architecture [24]. The concept of Cross layer design is about sharing of information among different protocol layers for adaptation purposes and to increase the inter-layer interactions. Here, adaptation refers to the ability of network protocols and applications to observe and respond to changes in channel conditions. A common misconception is that the layered approach must be completely eliminated and all layers must be integrated and jointly optimized. A common misconception is that the layered approach must be completely eliminated and all layers must be integrated and jointly optimized that is totally a misunderstanding of the Cross layer design [25]. The methodology of layered protocol design carries several advantages from a protocol transparency perspective. For example, protocols in one layer can be designed, enhanced, or even replaced without any impact on other protocol layers. However, such a methodology does not provide a mechanism for performance optimization between different protocol layers, which can significantly compromise network performance. This is particularly true for WMNs because it demands scalable network performance is exposed to many challenging problems such as heterogeneous QoS constraints, multihop wireless communications, and variable link capacity [3]. A protocol at a given layer is implemented by a (software, firmware, or hardware) entity, which communicates with other entities (on other networked systems) implementing the same protocol by Protocol Data Units (PDUs). A PDU is built by payload (data addressed or generated by an entity at a higher adjacent layer) and header (which contains protocol information). PDU format as well as service definition is specified by the protocol at a given level of the stack. The same concepts

10 are at the basis of the de-facto standard protocol stack on the Internet, namely the TCP/IP protocol stack [26]. Therefore, it is reasonable to believe that Cross layer optimization will continue to be one of the most important tasks in protocol design for WMNs. However, critical issues must be considered for Cross layer design, because it has risks due to loss of protocol-layer abstraction, incompatibility with existing protocols, and unforeseen impact on the future design of the network, and difficulty in maintenance and management. Thus, certain guidelines need to be followed when carrying out Cross layer design. Wireless networks represent technologies with growing interest and expectations in the world of communications [3]. A Cross layer design approach is considered for joint routing and resource allocation for the physical (PHY) and the medium access control (MAC) layers in multi-hop wireless backhaul networks [27]. The objective of adopting a cross layer approach for routing is to provide the routing layer with an overall view of underlying information in order to obtain a perfect path with reasonable delay, throughput and reliability [28]. An availability of large variety of optimization solutions requiring information exchange between two or more layers of the protocol stack raises an important issue concerning implementation of different Cross layer solutions inside TCP/IP protocol reference model, their coexistence and interoperability, requiring the availability of a common Cross layer signalling model [26]. The standardization of TCP/IP protocol suite used nowadays in Internet dates back to early 80s. TCP/IP design was developed on the basis of the characteristics of networks and technological solutions available at the moment: most networks constituting the Internet were formed of computer equipment or other terminals interconnected using a cable or Optical fiber. Basically, such networks were characterized by a strong hierarchical structure, large processing power of network terminals, static routing, stable connectivity, small propagation delays, and low errorrates. Nowadays, the environment where TCP/IP operates greatly differs from the one it was designed for [29]. A Cross layer design approach on the other hand, is one that utilizes function across different layers of the protocol stack. Recently several studies prove that Cross layer designs can yield significant performance gains [30].

11 2.3- Basic Cross Layer Design Proposal: Techniques used for Cross layer Designing: 1- Upward information flow. 2- Downward information flow. 3- Back and forth information flows. 4- Merging of adjacent layers. For a convenient discussion we explain each one individually. 1- Upward information flow: It is a scheme which proposes the idea of having direct access between two layers where the flow of the information comes from the lower layer to the higher layer. This scheme supposes that one higher layer is exposed to the lower layer requests which are forbidden by the architecture. The formation of another interface from the lower layer to the higher layer at runtime is an outcome when higher-layer requires data from the lower-layer(s), as appeared in figure 2.1. Making interfaces from the lower layers to the transport layer to empower unequivocal notices reduces such circumstances. Upward data stream fills the need of informing the higher layers about the hidden network conditions. Figure 2.1: The upward information flow in Cross layer Design. 2- Downward information flow: Some Cross layer design recommendations depend on setting parameters on the lower layer of the stack at runtime utilizing an immediate interface from some

12 higher layer, as delineated in figure 2.2. A decent approach to take a gander at the upward and downward information flow is to regard them as warnings and insights, individually. Downward information flow is intended to give indications to the lower layers about how the application information ought to be handled. This plan additionally proposes the restricted information head out from higher layer to lower layer of two or more layers that are not permitted to impart to each other straightforwardly. The stream of data driven from higher layer to the lower layer makes another interface and administrations among them to maintain a strategic distance from the general method for operating in the stack. Figure 0.2: The downward information flow of the cross layer design 3- Back and forth information flows: Two layers, performing different tasks, can collaborate with each other at runtime. The architecture here is violated by the two complimentary new interfaces. The repeated loop between the two layers with information flowing back and forth is clearly shown in the figure 2.3. Basically, with improvements in the signal processing at the physical layer, it becomes capable of recovering packets from collisions. This scheme is concentrating with more than one layer to optimize at run time. It proposes the idea of having two nonadjacent layers working with each other simultaneously. Such scheme intends to provide corporative relation between multiple layers so if one layer is sending notifications to another layer it could also receive notification from

13 the other layer(s). Similarly it is a parallel system where interaction between two layers is possible at both ways up and down in the stack. Figure 0.3: The back and forth information flow of the cross layer design. 4- Merging of adjacent layers: It is a design of two or more adjacent layers that work as new super layer with a union of service provided by the constituent layer. This does not require any new interfaces to be created in the stack. Architecturally speaking, the super layer can be interfaced with the rest of the stack using the interfaces that already exist in the original architect. The idea presented is about getting two layers working as one layer, in other words having all the services provided by these layers interacted and acting like one super layer. Of course such scheme requires rebuilding of the services in the selected layers but if such merging happened to be achievable than data transfer would become faster, because of the fact that we will not do any changes to either interface or services in all the stack of the OSI as it will be exclusively in the selected two layers. Figure 2.4 illustrates the super layer.

14 Figure 0.4: The basic idea of cross layer to join two layers as one layer. The cross layer design is not just about violating the rules. It is more of sharing information between layers, and the normal architecture does not allow sharing of information between non adjacent layers even if required, where in the other hand the cross layer design approach aims to avail such information sharing process. Therefore, the architecture can keep its privileges and rules on some of the layers which are not required to enhance the cross layer design. The congestion control and delay in queuing are an example of the issues that requires the adaption of the cross layer design in order to achieve higher performance. Fundamental questions that must be answered in cross layer design are: what information should be exchanged among layers, and how should such information be factored into each layer's performance adaptation algorithm. Which means exchanging information is not sufficient unless the entities and functions are well discussed and designed. A layer shall not be integrated with new interfaces in the stack until it is decided for what purpose they would be used. The other point is maintaining the information in such way that will not harm the flow of the data from other layers which are not yet integrated with cross layer techniques. In fact there are certain conditions which must be adapted before we can make any change to the current stack architecture. But in the other hand the need for cross layer design grows each day due to the lack of coordination among layers, which resulted in several issues. Also the structure of the current stack can get more complexity and multiple problems can rise up such as congestion control and queuing delay. Figure 2.5 illustrate complete schemes.

15 Figure 2.5: The complete basic schemes for the cross layer design Cross Layer Adaption: Cross layer design has risen as an intriguing new area of exploration in WMNs and WSNs. The essential thought behind cross-layer design is to make data accessible to numerous levels in the protocol stack. With this mutual data, it is then conceivable to settle on more educated choices and improvements. The extent to which data is shared is an open zone of exploration and fascinating field to ponder. A completely cross layer design offers data among all levels in the protocol; nonetheless, giving up the particularity additionally adversely influences the measure of security that the protocol can give. Thus, additional procurements must be made to guarantee the sheltered and secure delivery of sensitive information. It has been demonstrated that traditional protocols, with disjoint layers, give a measure of security; in any case, they are not reasonable for some system sorts for instance the WMNs and WSN situations, as they don't adequately catch its dynamic nature. By misusing cross layer collaborations, specialists would like to build up another system that will settle a portion of the challenges characteristic in WMNs.

16 Late investigates into cross layer design has hoped to advance diverse parts of the WMNs; these methodologies have been utilizing cross layer design to enhance the information exchange rate execution and to accomplish proficiency on the congestion control issue. Optimizing system throughput in hope of making the problem of scalability of WMNs achievable. Satisfying QoS requirements of WMNs. Improving resource efficiency. Specifically, enhancing the information exchange rate of the system is exceptionally compelling as it has an immediate and substantial effect on the performance of the network. Altering transmission range because of element system topology and QoS are a couple of the numerous parameters that system originators must mull over when attempting to increase the efficiency of the WMNs. This issue is exacerbated by the way that frequently there are characteristic clashes between improvement objectives. Moreover, improvement may require collaboration among numerous layers in the protocol stack, along these lines, empowering cross-layer advancement while keeping the layer division rule in place. The vertical module is in charge of social event and controlling all cross-layer communications. To support cross layering in this manner, the protocols must implement a vertical module however, they are free to design the layers in the protocol stack as per the requirements of the network. The advantages of a cross layer design approach are direct consequences of the nature of the wireless link itself. The wireless link characteristics affect all levels of the network protocol stack, and therefore all layers must be responsive to changing channel conditions. Furthermore, tight coupling between protocols at different layers exists. For example, at the physical layer, receiver filters can be dynamically adjusted to respond to interfaces changes at the link layer, power, rate and coding can be adapted, again affecting the interfaces level at the MAC layer, adaptive scheduling can be implemented based on the current level of interfaces and on the current link quality. Adaptive routing (for Ad-hoc networks) or soft handoff (in cellular systems) can be implemented in response to the current interfaces level and distribution in the network at the application layer, soft QoS can be defined, where the application QoS requirements are dynamically adjusted depending again on the current interfaces

17 levels. All the above adaptation protocols react to, and have an impact on, the interference level and distribution in the network. As a consequence, for efficient design, the adaptation protocols at each layer should not be independently developed, but rather should be designed in an integrated way such that the interdependencies between layers can be exploited. The development of cross-layer protocols enhances the network's ability to adapt; performance information can be exchanged among layers for an optimal response to degrading transmission conditions. The integrated adaptive protocol must still have a hierarchical structure. Since network variations take place on different time scales the rate of adaptation for a protocol is determined by its location in the protocol stack. However, information exchange between layers and joint optimization may greatly improve the system performance. Many cross layer designs require formation of new interfaces between the layers. The new interfaces are utilized for data sharing between the layers at run-time. The architecture violation here is clearly the formation of another interface not accessible in the layered design. The research divided the cross layer into three design, We further divide this category into three subcategories depending on the direction of information flow along the new interfaces: Upward: From lower layer(s) to a higher layer, Downward: From higher layer(s) to a lower layer and Back and forth: Iterative flow between two layers [31]. Conclusion: In this chapter, a brief discussion on the cross layer design was presented and explained for understanding the nature of this design. There are many scenarios which require the adaption of the cross layer design. Therefore, different numbers of proposed designs were discussed to analyze the need of such design which can be effective in several aspects of the network protocols. The cross layer design is a tool that can be used to create new functions and entities which can provide multiple services; these services can be used to increase the network performance because it supports and executes functions that would gain advantages of the lack of coordination among layers.

An Industrial Employee Development Application Protocol Using Wireless Sensor Networks

An Industrial Employee Development Application Protocol Using Wireless Sensor Networks RESEARCH ARTICLE An Industrial Employee Development Application Protocol Using Wireless Sensor Networks 1 N.Roja Ramani, 2 A.Stenila 1,2 Asst.professor, Dept.of.Computer Application, Annai Vailankanni

More information

Introduction to Internetworking

Introduction to Internetworking CHAPTER Introduction to Internetworking Introduction This chapter explains basic internetworking concepts. The information presented here helps readers who are new to internetworking comprehend the technical

More information

Organizations have developed standard sets of protocols

Organizations have developed standard sets of protocols Network Models Organizations have developed standard sets of protocols Some of these organizations are: The International Standards Organization (ISO) The Institute of Electrical and Electronic Engineers

More information

Framework of Vertical Multi-homing in IPv6-based NGN

Framework of Vertical Multi-homing in IPv6-based NGN ITU-T Recommendation Y.ipv6-vmh Framework of Vertical Multi-homing in IPv6-based NGN Summary This Recommendation describes a framework of vertical multi-homing in IPv6-based NGN. This Recommendation identifies

More information

Need For Protocol Architecture

Need For Protocol Architecture Chapter 2 CS420/520 Axel Krings Page 1 Need For Protocol Architecture E.g. File transfer Source must activate communications path or inform network of destination Source must check destination is prepared

More information

Need For Protocol Architecture

Need For Protocol Architecture Chapter 2 CS420/520 Axel Krings Page 1 Need For Protocol Architecture E.g. File transfer Source must activate communications path or inform network of destination Source must check destination is prepared

More information

Computer Science 461 Final Exam May 22, :30-3:30pm

Computer Science 461 Final Exam May 22, :30-3:30pm NAME: Login name: Computer Science 461 Final Exam May 22, 2012 1:30-3:30pm This test has seven (7) questions, each worth ten points. Put your name on every page, and write out and sign the Honor Code pledge

More information

CHAPTER 18 INTERNET PROTOCOLS ANSWERS TO QUESTIONS

CHAPTER 18 INTERNET PROTOCOLS ANSWERS TO QUESTIONS CHAPTER 18 INTERNET PROTOCOLS ANSWERS TO QUESTIONS 18.1 (1) The communications network may only accept blocks of data up to a certain size. (2) Error control may be more efficient with a smaller PDU size.

More information

FLAVIA - # FLexible Architecture for Virtualizable future wireless Internet Access. (FP7 call 5, obj1.1)

FLAVIA - # FLexible Architecture for Virtualizable future wireless Internet Access. (FP7 call 5, obj1.1) FLAVIA - #257263 FLexible Architecture for Virtualizable future wireless Internet Access (FP7 call 5, obj1.1) FLAVIA: Project Overview R&D towards the Future Wireless Internet Paradigm shift: From pre-designed

More information

Module 1. Introduction. Version 2, CSE IIT, Kharagpur

Module 1. Introduction. Version 2, CSE IIT, Kharagpur Module 1 Introduction Version 2, CSE IIT, Kharagpur Introduction In this module we shall highlight some of the basic aspects of computer networks in two lessons. In lesson 1.1 we shall start with the historical

More information

The History and the layers of the OSI Model 30 - October

The History and the layers of the OSI Model 30 - October THE OSI MODEL Established in 1947, the International Standards Organization (ISO) is a multinational body dedicated to worldwide agreement on international standards. An ISO standard that covers all aspects

More information

Abstract of the Book

Abstract of the Book Book Keywords IEEE 802.16, IEEE 802.16m, mobile WiMAX, 4G, IMT-Advanced, 3GPP LTE, 3GPP LTE-Advanced, Broadband Wireless, Wireless Communications, Cellular Systems, Network Architecture Abstract of the

More information

Introduction to Mobile Ad hoc Networks (MANETs)

Introduction to Mobile Ad hoc Networks (MANETs) Introduction to Mobile Ad hoc Networks (MANETs) 1 Overview of Ad hoc Network Communication between various devices makes it possible to provide unique and innovative services. Although this inter-device

More information

SIMPLE MODEL FOR TRANSMISSION CONTROL PROTOCOL (TCP) Irma Aslanishvili, Tariel Khvedelidze

SIMPLE MODEL FOR TRANSMISSION CONTROL PROTOCOL (TCP) Irma Aslanishvili, Tariel Khvedelidze 80 SIMPLE MODEL FOR TRANSMISSION CONTROL PROTOCOL (TCP) Irma Aslanishvili, Tariel Khvedelidze Abstract: Ad hoc Networks are complex distributed systems that consist of wireless mobile or static nodes that

More information

Network protocols and. network systems INTRODUCTION CHAPTER

Network protocols and. network systems INTRODUCTION CHAPTER CHAPTER Network protocols and 2 network systems INTRODUCTION The technical area of telecommunications and networking is a mature area of engineering that has experienced significant contributions for more

More information

CHAPTER 4 CROSS LAYER INTERACTION

CHAPTER 4 CROSS LAYER INTERACTION 38 CHAPTER 4 CROSS LAYER INTERACTION The cross layer interaction techniques used in the lower layers of the protocol stack, solve the hidden and exposed terminal problems of wireless and ad hoc networks.

More information

A Framework for Optimizing IP over Ethernet Naming System

A Framework for Optimizing IP over Ethernet Naming System www.ijcsi.org 72 A Framework for Optimizing IP over Ethernet Naming System Waleed Kh. Alzubaidi 1, Dr. Longzheng Cai 2 and Shaymaa A. Alyawer 3 1 Information Technology Department University of Tun Abdul

More information

Research on Heterogeneous Network Integration in Distribution Communication Network

Research on Heterogeneous Network Integration in Distribution Communication Network Research on Heterogeneous Integration in Distribution Communication Wei Li 1, Haonan Zheng 1, Hui He 1 1 (School of Control and Computer Engineering, North China Electric Power University, China) Abstract:

More information

On the Interdependence of Congestion and Contention in Wireless Sensor Networks

On the Interdependence of Congestion and Contention in Wireless Sensor Networks On the Interdependence of Congestion and Contention in Wireless Sensor Networks Mehmet C. Vuran Vehbi C. Gungor School of Electrical & Computer Engineering Georgia Institute of Technology, Atlanta, GA

More information

Chapter 5 Ad Hoc Wireless Network. Jang Ping Sheu

Chapter 5 Ad Hoc Wireless Network. Jang Ping Sheu Chapter 5 Ad Hoc Wireless Network Jang Ping Sheu Introduction Ad Hoc Network is a multi-hop relaying network ALOHAnet developed in 1970 Ethernet developed in 1980 In 1994, Bluetooth proposed by Ericsson

More information

TCP/IP THE TCP/IP ARCHITECTURE

TCP/IP THE TCP/IP ARCHITECTURE TCP/IP-1 The Internet Protocol (IP) enables communications across a vast and heterogeneous collection of networks that are based on different technologies. Any host computer that is connected to the Internet

More information

Introduction to computer networking

Introduction to computer networking edge core Introduction to computer networking Comp Sci 3600 Security Outline edge core 1 2 edge 3 core 4 5 6 The edge core Outline edge core 1 2 edge 3 core 4 5 6 edge core Billions of connected computing

More information

ECE 650 Systems Programming & Engineering. Spring 2018

ECE 650 Systems Programming & Engineering. Spring 2018 ECE 650 Systems Programming & Engineering Spring 2018 Networking Introduction Tyler Bletsch Duke University Slides are adapted from Brian Rogers (Duke) Computer Networking A background of important areas

More information

Week 2 / Paper 1. The Design Philosophy of the DARPA Internet Protocols

Week 2 / Paper 1. The Design Philosophy of the DARPA Internet Protocols Week 2 / Paper 1 The Design Philosophy of the DARPA Internet Protocols David D. Clark ACM CCR, Vol. 18, No. 4, August 1988 Main point Many papers describe how the Internet Protocols work But why do they

More information

The Open System Interconnect model

The Open System Interconnect model The Open System Interconnect model Telecomunicazioni Undergraduate course in Electrical Engineering University of Rome La Sapienza Rome, Italy 2007-2008 1 Layered network design Data networks are usually

More information

Chapter 09 Network Protocols

Chapter 09 Network Protocols Chapter 09 Network Protocols Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Outline Protocol: Set of defined rules to allow communication between entities Open Systems

More information

Computer Communication Networks

Computer Communication Networks Contents ELL 785 Computer Communication Networks Introduction Lecture 1 Taxonomy of communication works Computer Communication Networks Building a work ed work architecture 1-1 Introduction PC server wireless

More information

Dr Markus Hagenbuchner CSCI319 SIM. Distributed Systems Chapter 4 - Communication

Dr Markus Hagenbuchner CSCI319 SIM. Distributed Systems Chapter 4 - Communication Dr Markus Hagenbuchner markus@uow.edu.au CSCI319 SIM Distributed Systems Chapter 4 - Communication CSCI319 Chapter 4 Page: 1 Communication Lecture notes based on the textbook by Tannenbaum Study objectives:

More information

Active source routing for ad-hoc network: seamless integration of wireless environment

Active source routing for ad-hoc network: seamless integration of wireless environment Active source routing for ad-hoc network: seamless integration of wireless environment 1. Introduction Active networking is the emerging technology that will provide new network environment where lots

More information

OSI Network Layer. Network Fundamentals Chapter 5. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1

OSI Network Layer. Network Fundamentals Chapter 5. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1 OSI Network Layer Network Fundamentals Chapter 5 Version 4.0 1 Objectives Identify the role of the Network Layer, as it describes communication from one end device to another end device. Examine the most

More information

Please view notes for further information on later slides

Please view notes for further information on later slides Please view notes for further information on later slides 1 2 Mobile telecoms planning is driven primarily by coverage of population and secondarily by coverage of geographic area, often with reference

More information

Cross Layer Protocol Design. Radio Communication III

Cross Layer Protocol Design. Radio Communication III Cross Layer Protocol Design Radio Communication III The layered world of protocols The ISO OSI model OSI model Introduction» The open systems interconnection reference model (OSI model) describes a layered

More information

ECE519 Advanced Operating Systems

ECE519 Advanced Operating Systems IT 540 Operating Systems ECE519 Advanced Operating Systems Prof. Dr. Hasan Hüseyin BALIK (10 th Week) (Advanced) Operating Systems 10. Multiprocessor, Multicore and Real-Time Scheduling 10. Outline Multiprocessor

More information

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL 2.1 Topology Control in Wireless Sensor Networks Network topology control is about management of network topology to support network-wide requirement.

More information

2. LITERATURE REVIEW. Performance Evaluation of Ad Hoc Networking Protocol with QoS (Quality of Service)

2. LITERATURE REVIEW. Performance Evaluation of Ad Hoc Networking Protocol with QoS (Quality of Service) 2. LITERATURE REVIEW I have surveyed many of the papers for the current work carried out by most of the researchers. The abstract, methodology, parameters focused for performance evaluation of Ad-hoc routing

More information

CH : 15 LOCAL AREA NETWORK OVERVIEW

CH : 15 LOCAL AREA NETWORK OVERVIEW CH : 15 LOCAL AREA NETWORK OVERVIEW P. 447 LAN (Local Area Network) A LAN consists of a shared transmission medium and a set of hardware and software for interfacing devices to the medium and regulating

More information

Chapter 1 Introduction

Chapter 1 Introduction Emerging multimedia, high-speed data, and imaging applications are generating a demand for public networks to be able to multiplex and switch simultaneously a wide spectrum of data rates. These networks

More information

This tutorial will help you in understanding IPv4 and its associated terminologies along with appropriate references and examples.

This tutorial will help you in understanding IPv4 and its associated terminologies along with appropriate references and examples. About the Tutorial Internet Protocol version 4 (IPv4) is the fourth version in the development of the Internet Protocol (IP) and the first version of the protocol to be widely deployed. IPv4 is described

More information

Computer Networks with Internet Technology William Stallings. Chapter 2 Protocols and the TCP/IP Protocol Suite

Computer Networks with Internet Technology William Stallings. Chapter 2 Protocols and the TCP/IP Protocol Suite Computer Networks with Internet Technology William Stallings Chapter 2 Protocols and the TCP/IP Protocol Suite Need For Protocol Architecture E.g. File transfer Source must activate comms. Path or inform

More information

McGill University - Faculty of Engineering Department of Electrical and Computer Engineering

McGill University - Faculty of Engineering Department of Electrical and Computer Engineering McGill University - Faculty of Engineering Department of Electrical and Computer Engineering ECSE 494 Telecommunication Networks Lab Prof. M. Coates Winter 2003 Experiment 5: LAN Operation, Multiple Access

More information

Data and Computer Communications. Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications

Data and Computer Communications. Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications Data and Computer Communications Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based s 1 Need For Protocol Architecture data exchange can involve complex procedures better if task broken into subtasks

More information

Spectrum Management in Cognitive Radio Networks

Spectrum Management in Cognitive Radio Networks Spectrum Management in Cognitive Radio Networks Jul 14,2010 Instructor: professor m.j omidi 1/60 BY : MOZHDEH MOLA & ZAHRA ALAVIKIA Contents Overview: Cognitive Radio Spectrum Sensing Spectrum Decision

More information

Peer entities. Protocol Layering. Protocols. Example

Peer entities. Protocol Layering. Protocols. Example Peer entities Protocol Layering An Engineering Approach to Computer Networking Customer A and B are peers Postal worker A and B are peers Protocols A protocol is a set of rules and formats that govern

More information

Request for Comments: 1787 T.J. Watson Research Center, IBM Corp. Category: Informational April 1995

Request for Comments: 1787 T.J. Watson Research Center, IBM Corp. Category: Informational April 1995 Network Working Group Y. Rekhter Request for Comments: 1787 T.J. Watson Research Center, IBM Corp. Category: Informational April 1995 Status of this Memo Routing in a Multi-provider Internet This memo

More information

Chapter 12 Network Protocols

Chapter 12 Network Protocols Chapter 12 Network Protocols 1 Outline Protocol: Set of defined rules to allow communication between entities Open Systems Interconnection (OSI) Transmission Control Protocol/Internetworking Protocol (TCP/IP)

More information

Chapter 7 CONCLUSION

Chapter 7 CONCLUSION 97 Chapter 7 CONCLUSION 7.1. Introduction A Mobile Ad-hoc Network (MANET) could be considered as network of mobile nodes which communicate with each other without any fixed infrastructure. The nodes in

More information

Chapter 5 OSI Network Layer

Chapter 5 OSI Network Layer Chapter 5 OSI Network Layer The protocols of the OSI model Network layer specify addressing and processes that enable Transport layer data to be packaged and transported. The Network layer encapsulation

More information

Lecture 05 Application Layer - I

Lecture 05 Application Layer - I Computer Networks and Internet Protocol Prof. Soumya Kanti Ghosh Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture 05 Application Layer - I Hi. So, we will

More information

Application Oriented Networks: An SOA Perspective

Application Oriented Networks: An SOA Perspective Oriented s: An SOA Perspective www.thbs.com Introduction Service Oriented Architecture is the hot topic of discussion in IT circles today. So much so, in fact, that SOA is being seen by many as the future

More information

SWAP and TCP performance

SWAP and TCP performance SWAP and TCP performance Jean Tourrilhes, HPLB 23 March 98 1 Introduction The SWAP protocol that we have proposed [4] the HRFWG is designed to carry TCP/IP traffic. Of course, we would never had proposed

More information

Subject: Adhoc Networks

Subject: Adhoc Networks ISSUES IN AD HOC WIRELESS NETWORKS The major issues that affect the design, deployment, & performance of an ad hoc wireless network system are: Medium Access Scheme. Transport Layer Protocol. Routing.

More information

Networking for Data Acquisition Systems. Fabrice Le Goff - 14/02/ ISOTDAQ

Networking for Data Acquisition Systems. Fabrice Le Goff - 14/02/ ISOTDAQ Networking for Data Acquisition Systems Fabrice Le Goff - 14/02/2018 - ISOTDAQ Outline Generalities The OSI Model Ethernet and Local Area Networks IP and Routing TCP, UDP and Transport Efficiency Networking

More information

Scribe Notes -- October 31st, 2017

Scribe Notes -- October 31st, 2017 Scribe Notes -- October 31st, 2017 TCP/IP Protocol Suite Most popular protocol but was designed with fault tolerance in mind, not security. Consequences of this: People realized that errors in transmission

More information

ITU-T Y Framework of multi-homing in IPv6-based NGN

ITU-T Y Framework of multi-homing in IPv6-based NGN INTERNATIONAL TELECOMMUNICATION UNION ITU-T Y.2052 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (02/2008) SERIES Y: GLOBAL INFORMATION INFRASTRUCTURE, INTERNET PROTOCOL ASPECTS AND NEXT-GENERATION NETWORKS

More information

3. Evaluation of Selected Tree and Mesh based Routing Protocols

3. Evaluation of Selected Tree and Mesh based Routing Protocols 33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in

More information

Video Streaming Over the Internet

Video Streaming Over the Internet Video Streaming Over the Internet 1. Research Team Project Leader: Graduate Students: Prof. Leana Golubchik, Computer Science Department Bassem Abdouni, Adam W.-J. Lee 2. Statement of Project Goals Quality

More information

Chapter - 1 INTRODUCTION

Chapter - 1 INTRODUCTION Chapter - 1 INTRODUCTION Worldwide Interoperability for Microwave Access (WiMAX) is based on IEEE 802.16 standard. This standard specifies the air interface of fixed Broadband Wireless Access (BWA) system

More information

Network Models. Presentation by Dr.S.Radha HOD / ECE SSN College of Engineering

Network Models. Presentation by Dr.S.Radha HOD / ECE SSN College of Engineering Network Models Presentation by Dr.S.Radha HOD / ECE SSN College of Engineering Objective At the end of this section students will be able to Understand the architecture of the OSI model Understand the

More information

Network Architecture

Network Architecture Unit 7 Network Architecture Acknowledgments: These slides were originally developed by Prof. Jean Walrand for EE122. The past and current EE122 instructors including Kevin Fall, Abhay Parekh, Shyam Parekh,

More information

EEC-484/584 Computer Networks

EEC-484/584 Computer Networks EEC-484/584 Computer Networks Lecture 2 Wenbing Zhao wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Misc. Interested in research? Secure

More information

Routing Basics. What is Routing? Routing Components. Path Determination CHAPTER

Routing Basics. What is Routing? Routing Components. Path Determination CHAPTER CHAPTER 5 Routing Basics This chapter introduces the underlying concepts widely used in routing protocols Topics summarized here include routing protocol components and algorithms In addition, the role

More information

Integrated Services. Integrated Services. RSVP Resource reservation Protocol. Expedited Forwarding. Assured Forwarding.

Integrated Services. Integrated Services. RSVP Resource reservation Protocol. Expedited Forwarding. Assured Forwarding. Integrated Services An architecture for streaming multimedia Aimed at both unicast and multicast applications An example of unicast: a single user streaming a video clip from a news site An example of

More information

ECS-087: Mobile Computing

ECS-087: Mobile Computing ECS-087: Mobile Computing TCP over wireless TCP and mobility Most of the Slides borrowed from Prof. Sridhar Iyer s lecture IIT Bombay Diwakar Yagyasen 1 Effect of Mobility on Protocol Stack Application:

More information

TCP PERFORMANCE FOR FUTURE IP-BASED WIRELESS NETWORKS

TCP PERFORMANCE FOR FUTURE IP-BASED WIRELESS NETWORKS TCP PERFORMANCE FOR FUTURE IP-BASED WIRELESS NETWORKS Deddy Chandra and Richard J. Harris School of Electrical and Computer System Engineering Royal Melbourne Institute of Technology Melbourne, Australia

More information

Appendix B. Standards-Track TCP Evaluation

Appendix B. Standards-Track TCP Evaluation 215 Appendix B Standards-Track TCP Evaluation In this appendix, I present the results of a study of standards-track TCP error recovery and queue management mechanisms. I consider standards-track TCP error

More information

IT4405 Computer Networks (Compulsory)

IT4405 Computer Networks (Compulsory) IT4405 Computer Networks (Compulsory) INTRODUCTION This course provides a comprehensive insight into the fundamental concepts in data communications, computer network systems and protocols both fixed and

More information

Chapter 2 Overview of the Design Methodology

Chapter 2 Overview of the Design Methodology Chapter 2 Overview of the Design Methodology This chapter presents an overview of the design methodology which is developed in this thesis, by identifying global abstraction levels at which a distributed

More information

The Affinity Effects of Parallelized Libraries in Concurrent Environments. Abstract

The Affinity Effects of Parallelized Libraries in Concurrent Environments. Abstract The Affinity Effects of Parallelized Libraries in Concurrent Environments FABIO LICHT, BRUNO SCHULZE, LUIS E. BONA, AND ANTONIO R. MURY 1 Federal University of Parana (UFPR) licht@lncc.br Abstract The

More information

15-441: Computer Networking. Wireless Networking

15-441: Computer Networking. Wireless Networking 15-441: Computer Networking Wireless Networking Outline Wireless Challenges 802.11 Overview Link Layer Ad-hoc Networks 2 Assumptions made in Internet Host are (mostly) stationary Address assignment, routing

More information

Delayed ACK Approach for TCP Performance Improvement for Ad Hoc Networks Using Chain Topology

Delayed ACK Approach for TCP Performance Improvement for Ad Hoc Networks Using Chain Topology Delayed ACK Approach for TCP Performance Improvement for Ad Hoc Networks Using Chain Topology Prashant Kumar Gupta M.Tech. Scholar, Computer Networks, Bhilai Institute of Technology, Durg (C.G.), India

More information

AMCP/4-WP/70. b) requirements and recommendations together with their rationale; and

AMCP/4-WP/70. b) requirements and recommendations together with their rationale; and Appendix A to the Report on Agenda Item 3 3A-1 APPENDIX A VHF DIGITAL LINK (VDL) DESIGN GUIDELINES 1. INTRODUCTION 1.1 In the absence of a comprehensive and detailed set of operational requirements, the

More information

3+1+0 (3) IT 201 T. Principles of Information and Technology Systems. Prereq: CS 110T IT 222 T. Communications and Networks Fundamentals (4)

3+1+0 (3) IT 201 T. Principles of Information and Technology Systems. Prereq: CS 110T IT 222 T. Communications and Networks Fundamentals (4) Principles of Information and Technology Systems IT 201 T Prereq: CS 110T This course aims to develop an understanding of the components of computing and their relationships, significant impacts of IT

More information

Vorlesung Kommunikationsnetze Research Topics: QoS in VANETs

Vorlesung Kommunikationsnetze Research Topics: QoS in VANETs Vorlesung Kommunikationsnetze Research Topics: QoS in VANETs Prof. Dr. H. P. Großmann mit B. Wiegel sowie A. Schmeiser und M. Rabel Sommersemester 2009 Institut für Organisation und Management von Informationssystemen

More information

INTERNET OF THINGS FOR SMART CITIES BY ZANELLA ET AL.

INTERNET OF THINGS FOR SMART CITIES BY ZANELLA ET AL. INTERNET OF THINGS FOR SMART CITIES BY ZANELLA ET AL. From IEEE INTERNET OF THINGS JOURNAL, VOL. 1, NO. 1, FEBRUARY 2014 Presented by: Abid Contents Objective Introduction Smart City Concept & Services

More information

IP Mobility vs. Session Mobility

IP Mobility vs. Session Mobility IP Mobility vs. Session Mobility Securing wireless communication is a formidable task, something that many companies are rapidly learning the hard way. IP level solutions become extremely cumbersome when

More information

CCNA Exploration1 Chapter 7: OSI Data Link Layer

CCNA Exploration1 Chapter 7: OSI Data Link Layer CCNA Exploration1 Chapter 7: OSI Data Link Layer LOCAL CISCO ACADEMY ELSYS TU INSTRUCTOR: STELA STEFANOVA 1 Explain the role of Data Link layer protocols in data transmission; Objectives Describe how the

More information

Self-Adaptive Middleware for Wireless Sensor Networks: A Reference Architecture

Self-Adaptive Middleware for Wireless Sensor Networks: A Reference Architecture Architecting Self-Managing Distributed Systems Workshop ASDS@ECSAW 15 Self-Adaptive Middleware for Wireless Sensor Networks: A Reference Architecture Flávia C. Delicato Federal University of Rio de Janeiro

More information

Network Connectivity and Mobility Part 2

Network Connectivity and Mobility Part 2 Network Connectivity and Mobility Part 2 BSAD 141 Dave Novak Topics Covered Lecture is structured based on the five elements of creating a connected world from the text book (with additional content) 1.

More information

Media Access Control in Ad Hoc Networks

Media Access Control in Ad Hoc Networks Media Access Control in Ad Hoc Networks The Wireless Medium is a scarce precious resource. Furthermore, the access medium is broadcast in nature. It is necessary to share this resource efficiently and

More information

Transport layer issues

Transport layer issues Transport layer issues Dmitrij Lagutin, dlagutin@cc.hut.fi T-79.5401 Special Course in Mobility Management: Ad hoc networks, 28.3.2007 Contents Issues in designing a transport layer protocol for ad hoc

More information

Layering in Networked computing. OSI Model TCP/IP Model Protocols at each layer

Layering in Networked computing. OSI Model TCP/IP Model Protocols at each layer Layering in Networked computing OSI Model TCP/IP Model Protocols at each layer Learning outcomes Understand the need of layering in Networked computing Understand the OSI model and the tcp/ip model Understand

More information

The OSI Model. Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO).

The OSI Model. Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Network Models The OSI Model Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Model for understanding and developing computer-to-computer communication

More information

Introduction and Statement of the Problem

Introduction and Statement of the Problem Chapter 1 Introduction and Statement of the Problem 1.1 Introduction Unlike conventional cellular wireless mobile networks that rely on centralized infrastructure to support mobility. An Adhoc network

More information

b) Diverse forms of physical connection - all sorts of wired connections, wireless connections, fiber optics, etc.

b) Diverse forms of physical connection - all sorts of wired connections, wireless connections, fiber optics, etc. Objectives CPS221 Lecture: Layered Network Architecture last revised 6/22/10 1. To discuss the OSI layered architecture model 2. To discuss the specific implementation of this model in TCP/IP Materials:

More information

Model-Based Design for Large High Integrity Systems: A Discussion Regarding Model Architecture

Model-Based Design for Large High Integrity Systems: A Discussion Regarding Model Architecture Model-Based Design for Large High Integrity Systems: A Discussion Regarding Model Architecture By Mike Anthony and Jon Friedman MathWorks Inc, Natick, MA, 01760 INTRODUCTION From complex controls problems

More information

Appeal Decision. Appeal No USA ALCATEL-LUCENT USA LTD. Tokyo, Japan. Tokyo, Japan

Appeal Decision. Appeal No USA ALCATEL-LUCENT USA LTD. Tokyo, Japan. Tokyo, Japan Appeal Decision Appeal No. 2014-5131 USA Appellant ALCATEL-LUCENT USA LTD. Tokyo, Japan Patent Attorney OKABE, Yuzuru Tokyo, Japan Patent Attorney YOSHIZAWA, Hiroshi The case of appeal against the examiner's

More information

The Analysis and Proposed Modifications to ISO/IEC Software Engineering Software Quality Requirements and Evaluation Quality Requirements

The Analysis and Proposed Modifications to ISO/IEC Software Engineering Software Quality Requirements and Evaluation Quality Requirements Journal of Software Engineering and Applications, 2016, 9, 112-127 Published Online April 2016 in SciRes. http://www.scirp.org/journal/jsea http://dx.doi.org/10.4236/jsea.2016.94010 The Analysis and Proposed

More information

Dynamic Design of Cellular Wireless Networks via Self Organizing Mechanism

Dynamic Design of Cellular Wireless Networks via Self Organizing Mechanism Dynamic Design of Cellular Wireless Networks via Self Organizing Mechanism V.Narasimha Raghavan, M.Venkatesh, Divya Sridharabalan, T.Sabhanayagam, Nithin Bharath Abstract In our paper, we are utilizing

More information

CSCD 433/533 Advanced Networks

CSCD 433/533 Advanced Networks CSCD 433/533 Advanced Networks Lecture 2 Network Review Winter 2017 Reading: Chapter 1 1 Topics Network Topics Some Review from CSCD330 Applications Common Services Architecture OSI Model AS and Routing

More information

Data Encapsulation & OSI & TCP/IP Models Week 2. Lecturer: Lucy White Office : 324

Data Encapsulation & OSI & TCP/IP Models Week 2. Lecturer: Lucy White Office : 324 Data Encapsulation & OSI & TCP/IP Models Week 2 Lecturer: Lucy White lbwhite@wit.ie Office : 324 1 Network Protocols A protocol is a formal description of a set of rules and conventions that govern a particular

More information

OSI Network Layer. Chapter 5

OSI Network Layer. Chapter 5 OSI Network Layer Network Fundamentals Chapter 5 Objectives Identify the role of the Network Layer, as it describes communication from one end device to another end device. Examine the most common Network

More information

CPS221 Lecture: Layered Network Architecture

CPS221 Lecture: Layered Network Architecture CPS221 Lecture: Layered Network Architecture Objectives last revised 9/8/14 1. To discuss the OSI layered architecture model 2. To discuss the specific implementation of this model in TCP/IP Materials:

More information

European Network on New Sensing Technologies for Air Pollution Control and Environmental Sustainability - EuNetAir COST Action TD1105

European Network on New Sensing Technologies for Air Pollution Control and Environmental Sustainability - EuNetAir COST Action TD1105 European Network on New Sensing Technologies for Air Pollution Control and Environmental Sustainability - EuNetAir COST Action TD1105 A Holistic Approach in the Development and Deployment of WSN-based

More information

Network Layers. Standardization Cruelty 2009/08/12. (C) Herbert Haas

Network Layers. Standardization Cruelty 2009/08/12. (C) Herbert Haas Network Layers Standardization Cruelty (C) Herbert Haas 2009/08/12 The good thing about standards is that there are so many to choose from Andrew S. Tanenbaum Standards We need networking standards Ensure

More information

COMPUTER NETWORK PERFORMANCE. Gaia Maselli Room: 319

COMPUTER NETWORK PERFORMANCE. Gaia Maselli Room: 319 COMPUTER NETWORK PERFORMANCE Gaia Maselli maselli@di.uniroma1.it Room: 319 Computer Networks Performance 2 Overview of first class Practical Info (schedule, exam, readings) Goal of this course Contents

More information

Figure Potential 5G applications

Figure Potential 5G applications 6. 5G Key Concept 6.1 Key Concepts of 5G End-to-end (E2E) quality required by applications and/or users will be far more diversified in the 5G era than what we have seen in the preceding generations. For

More information

LECTURE PLAN. Script. Introduction about MAC Types o ALOHA o CSMA o CSMA/CD o CSMA/CA

LECTURE PLAN. Script. Introduction about MAC Types o ALOHA o CSMA o CSMA/CD o CSMA/CA Course- B.Sc. Applied Physical Science (Computer Science) Year- IIIrd, Sem- Vth Subject Computer Science Paper- XVIIth, Computer Networks Lecture -11 Lecture Title- Medium Access Layer Script Today in

More information

CCNA Exploration Network Fundamentals. Chapter 09 Ethernet

CCNA Exploration Network Fundamentals. Chapter 09 Ethernet CCNA Exploration Network Fundamentals Chapter 09 Ethernet Updated: 07/07/2008 1 9.0.1 Introduction 2 9.0.1 Introduction Internet Engineering Task Force (IETF) maintains the functional protocols and services

More information

(INTERFERENCE AND CONGESTION AWARE ROUTING PROTOCOL)

(INTERFERENCE AND CONGESTION AWARE ROUTING PROTOCOL) Qos of Network Using Advanced Hybrid Routing in WMN, Abstract - Maximizing the network throughput in a multichannel multiradio wireless mesh network various efforts have been devoted. The recent solutions

More information

Guide to Networking Essentials, 6 th Edition. Chapter 6: Network Reference Models and Standards

Guide to Networking Essentials, 6 th Edition. Chapter 6: Network Reference Models and Standards Guide to Networking Essentials, 6 th Edition Chapter 6: Network Reference Models and Standards Objectives Explain the OSI reference model layers and their relationship to hardware and software Explain

More information