INTRODUCTION TO CROSS LAYER DESIGN AND CROSS LAYER BASIC SCHEMES
|
|
- Augusta Clarke
- 5 years ago
- Views:
Transcription
1 INTRODUCTION TO CROSS LAYER DESIGN AND CROSS LAYER BASIC SCHEMES
2 Chapter 2: INTRODUCTION TO CROSS LAYER DESIGN AND CROSS LAYER BASIC SCHEMES 2.1-Introduction to Cross Layer Design: Cross layer optimization has been a busy topic for the last few years due to the different proposals which attempt to add certain improvements in the OSI model. As for now some researchers assume that cross layer design holds the key to an optimal performance that could provide faster services by allowing different layers to directly communicate each other, which results in significant changes on how the current OSI can work. Cross layer design is one of the proposed designs in the field of communication which can provide such expectation. This work focuses on Cross layer protocol as a better option with respect to layered-protocol. The layered protocol architecture (OSI) model divides networking tasks into layers and defines a pocket of services for each layer to be provided individually, the design of the protocol makes the services realized for different layers, no direct communication between nonadjacent layers is permitted as the architecture forbids such an action, also communication is limited to procedure calls and responses between adjacent layers. Whereas the cross layer design violates the reference architecture, by allowing direct communication between protocols at nonadjacent layers, and allows sharing variables between layers, which gives it a better performance that would satisfy the wireless mesh network demands. Cross layer design is believed to be a promising future in the sense of the date rate transfer and most effective design that can solve the increase of wavelength data rate, normal architecture can also be used at all-time but if the requirements have become heavier in the near future as a video calling, online games and more applications are now used for communication and entertainment, eventually these applications require faster data transfer rate to achieve the maximum possible throughput. Despite the fact that developing new rules in the existing architecture is not an easy task, but the need for better network capacity requires developing the Cross layer Design. There are wild services assigned to layers in order to create the architecture each service cannot be interrupted during the execution time and Cross layer design aims to keep that existing with faster services to be provided. The core idea behind the work is to make direct access among the layers so each one can individually reach other layers and expect data from different layers level. The need
3 for such development existed few years ago because of the increment of the users who require more internet speed and availability. The use of Cross Layer has not been introduced to programmers or users because it is still under experimental and research study, also the possibility of establishing a new rate of transfer has not been ensured and brought into the light clearly until now. But even thus researchers experimented some cross layer designs and proved higher performance in the simulation process using few of the layers as a cross layer design. Therefore, each layer needs to be separately examined to the possibility of adding a new service or modifying the existing once than we may be able to establish a new utility or a function that could allow a specific layer to communicate directly with the nonadjacent layers in the stack, then depending on the results we receive as outcome of the simulation process, framework, protocol, algorithm a cross layer design would be built. It is proved that cross layer design can significantly improve network performance. But in the process of cross layer design, it is difficult to analyze the complex interactions among the layers. The traditional protocol architectures follow strict rules which became basic principles for the network protocols. The layered protocol architecture follows the same strict rules and principles, its design is an attractive design as it works to support standardization of network architecture using the layered model, but it does not provide an optimal performance for wireless mesh network. Considering some features of wireless mesh network are different from wireless sensor and mobile ad hoc network features, as wireless mesh network is concerned more with scalable end to end throughput and quality of service. Cross layer design can be realized between multiple layers or between just two layers. Given a protocol stack, cross layer design can be based in any combination of two protocol layers [3]. QoS which makes the overall network performance critical and in need of optimization, as the performance of the OSI is facing so many challenges, but in the other hand, building new rules for any layer and violating the structure of an existing protocol would need too much effort and research even thus if it is possible. The complications that can come out of such protocol would need time and researches to be optimized. Cross layer design that enables multiple layers to cooperate with each other has been shown to be more efficient for network congestion control than the
4 aforementioned layer design. A cross layer protocol solves such problem by adapting the changes as it has the ability to be widely optimized, in other words a Cross layer design aims to overcome such limitation found in the layered protocol and could not be optimized. Cross layer main work is to maintain the functionalities associated to the original layer and to allow coordination, interaction and joint optimization protocols which are crossing every layer of the stack. Cross layer Design allows different layer architecture to communicate with each other in order to provide services for all layers at all time. It is important to know that Cross layer optimization is still an ongoing research where researchers try to improve the performance for better quality of services but such improvement drives us to solve other issues which may make the process of optimization complicated but possible. Cross layer design can significantly improve the network performance; cross layer can be performed in two ways Loosely coupled Cross layer design: The loosely couple optimize without crossing layers, it focus on one protocol layer in order to improve that single layer. Tightly coupled cross layer design: The tightly couple works different as it optimizes all layers together as one optimization problem. In the typical way used for wireless networks, furthermore data transfer suffers from performance limitation which vary from 10-3 up to 10-1 for wireless links while for wired channels the transfer rate goes from 10-8 to Various scientific researches addressed and worked with low complexity, results for which have proposed different designs which could be adapted and developed according to the success factor and ability of each design. Cross Layer Design can be a significant change for the future of a computerized world, faster world and full of opportunities, but as for now there are security issues, performance attitude being investigated and simulated in order to find and optimize the optimal results that could be ensured to the users. Despite the rapid strides in technology, there are still some fundamental challenges in need of satisfactory solutions.
5 The Open Systems Interconnection (OSI) layered model of networks (and networking techniques subsequently developed to suit it) was based on small, lowspeed networks, by current optical standards [20]. These standards are to be changed accordingly. The Open systems interconnection stills the base of the cross layer design but with new rules that allow us to use the advantage and strength of the OSI. This research work aims to exist and validate a new framework for the existing Cross layer designs and optimize it in Wireless Mesh Networks. Optimizing the cross layer in wireless mesh network has been recently an active topic due to the need of implementing a new framework which would increase the performance of the architecture resulting in satisfying the need and demands of the wired and wireless communication requirements. In the OSI model there are strict boundaries that allow communication within only a single layer, so to avoid these types of boundaries Cross layer optimization has been developed wherein communication between layers is done by allowing one layer to access data of another layer by exchanging information. Allowing the layers to communicate each other independently shall make them faster in the sense of producing calls and responses and can get advantage of the time wasted when execution process is taking place at any layer, other application can find their way to another layer and use the services of those layers. It is also because of the increased size of the applications that need a very high performance such as online video gaming, conference video calling, and the size of a full HD videos, documents and files. Furthermore the use of Cross Layer Design in wireless mesh network was proposed a while ago but has recently become a mainstream subject of study in optical networking. The design of cross layer can make multiple layer work with each other and communicate to achieve higher performance in different level of the OSI or the TCP/IP so a better output is awaited from such improvement, different schemes were established to serve the same but in different styles and with different parameters which lead to the improvement of the TCP/IP protocol and the current OSI, those schemes would be revised later in order to gain a clear understanding on the ways researcher approach to develop the cross layer design.
6 The different schemes proposed for cross layer can also have some similarities and they may sometime show a function which would work with two different schemes depending on how the layer would act and serve. The main purpose of optimizing the Cross Layer is to create direct access between layers. The goal of creating new rules to the TCP/IP or OSI model is to enable the cross layer design in inheriting the current power they have and use it to develop a powerful architecture that keeps the conventional layered protocol existing and fully functioning with more efficiency and higher performance at the same time. Establishing a new protocol for communication is not required because the TCP/IP is still the best way that communication can have, but we still need and should modify it in order to speed up the transfer rate. The schemes proposed as a solution for cross layer design are fascinating but the assumed performance is not totally proved yet. Most of the hypotheses and research proposals in the cross layer design show a promising future and also show how fast demands are growing for wireless communication. The cross layer design consists of the same layers that are available with the TCP/IP or OSI model and it does not obtain to remove or eliminate any of the seven layers, the only scenario that researchers are digging in is to implement the capability of those layers and make them stronger with respect to the data transfer and communication speed. In the last few years some applications were introduced to the users, those kinds of application uses a high transfer rate capacity in another words they require higher performance and better internet speed. Efficiency, performance and speed are the main objects for developing the cross layer design, there are many schemes that aimed to fulfil the cross layer requirements and provide solutions that were introduced to the research field, and each one of them is just another cross layer design that has probability of success and failure. Eventually most of the researchers focused on two layers in order to make them approachable by each other but not merging them as one layer. Some schemes suggested merging some layers so they can act as one layer which will result in creating faster services because the waiting time for execution will be avoided. Other schemes assumes that allowing direct access in all the stack is not compulsory, instead we can allow the access between three or even two layer depending on the functions and services that we need to optimize. Cross layer optimization is also one of the topics that aims study resource allocation problem in communication network. It is
7 important to know that while optimizing the cross layer design at one layer other layer will not be effected they will function as they were, if we assume one lower layer has been modified so the next higher layer is totally unchanged and that is due to the design of OSI or TCP/IP which does not allow any kind of connection other than the specific services assigned to each layer individually. In order to develop or change any of the content of any layer we have to implement the layer with (hardware, software or framework) entity, but not to eliminate any entity unless it would be replaced with another. The TCP/IP protocol and the OSI theoretical model models have no problems in respect of the services it provides or the way it operates but nowadays they require optimizing to gain more performance, so we can reach the maximum output. The issue with OSI that researchers seek to solve is the performance of overall architecture. Cross layer has potentials that would change the way users think of the communication process, it is a wonderful design that can work in few layers of the stack or may be the entire layer but the main advantage of this design is its ability of not affecting the entire OSI if it is not applicable for optimizing. The seven layers have certain rules that they follow whatever happens even if some data is reporting lost packets, the reason behind that is its roll of resending the lost packet but such roll results in delaying the data transfer. Each layer of the protocol can be optimized by modifying its rules and services but at the same time creating new once, that would fit the need of the other layers. The interaction between layers requires a new interface which would allow such interaction to happen creating direct access among layers. The cross layer approach can be a significant change for the wireless network due to the expected performance coming out of the lack coordinates between layers. Wireless Mesh Network can have a great optimization process but different scenarios must be obtained to evaluate the expected results and apply effective methods. Therefore, Wireless Mesh Networks is one of technique that requires the development and optimization of the TCP/IP and the current OSI model. The routing process is one of the main issues that wireless communication generally suffers from, as the paths increases and the routing process may need more time than the usual time the procedures endure. The routing process is compulsory because each and every place that requires internet will have to use a router where the use of the routers differs from some place to another depending of the location that would to be covered, either
8 wirelessly or wired. So one of the main issues is the routing process and from this issue some schemes were proposed and some are still an open research issues. Cross layer design is a need not a fashion for optimizing the overall architecture of the OSI model and the TCP/IP protocol. Furthermore this work will provide a new framework design to solve IP fragmentation issues by applying the cross layer design in several layers of the stack. 2.2-Review of Literature: In the past there have been different proposals on enhancing transport protocol (usually TCP) performance by means of providing explicit information and notifications from different protocol layers above or below transport. The cross layer notifications can be local notifications from the lower or upper protocol layers of the host device, or it can be explicit communication between the transport peers and the network between them. Cross layer signalling could be used, for example, for delivering hints to a transport sender about the characteristics of the network path, to allow the sender to adjust its sending rate more efficiently than what would be possible using the traditional TCP probing mechanisms [RFC2914, RFC2581]. A Cross layer approach to network design can significantly increase the design complexity. Indeed, protocol layers are extremely useful in allowing designers to optimize a single protocol layer design without the complexity and expertise associated with considering other layers. Thus, cross layer design should not eliminate the design advantages of layering. Keeping some form of separation, while allowing layers to actively interact, appears a good compromise for enabling interaction between layers without eliminating the layering principle [21]. Existing Cross layer optimization solutions often involve only the layers below the application layer, which collectively aim to maximize QoS metrics such as throughput, packet loss rate, average or worst case delay etc., but without considering the specific characteristics and requirements of the applications [22]. The success of layered architecture has been observed in many fields. However, the open system interconnect (OSI) architecture of computer networks may not be able to provide QoS in all parameters, so optimization goals need to pursue in multiple layers. Also, since some applications do not need all layers, and optimizations may conflict with each
9 Cross layer hierarchical layers in communication networks [23]. A layered architecture, like the seven-layer open systems interconnect (OSI) model divides the overall networking task into layers and defines a hierarchy of services to be provided by the individual layers. The services at the layers are realized by designing protocols for the different layers. The architecture forbids direct communication between nonadjacent layers. Communication between adjacent layers is limited to procedure calls and responses. In the framework of reference layered architecture, the designer has two choices at the time of protocol design. Protocols can be designed by respecting the rules of the reference architecture [24]. The concept of Cross layer design is about sharing of information among different protocol layers for adaptation purposes and to increase the inter-layer interactions. Here, adaptation refers to the ability of network protocols and applications to observe and respond to changes in channel conditions. A common misconception is that the layered approach must be completely eliminated and all layers must be integrated and jointly optimized. A common misconception is that the layered approach must be completely eliminated and all layers must be integrated and jointly optimized that is totally a misunderstanding of the Cross layer design [25]. The methodology of layered protocol design carries several advantages from a protocol transparency perspective. For example, protocols in one layer can be designed, enhanced, or even replaced without any impact on other protocol layers. However, such a methodology does not provide a mechanism for performance optimization between different protocol layers, which can significantly compromise network performance. This is particularly true for WMNs because it demands scalable network performance is exposed to many challenging problems such as heterogeneous QoS constraints, multihop wireless communications, and variable link capacity [3]. A protocol at a given layer is implemented by a (software, firmware, or hardware) entity, which communicates with other entities (on other networked systems) implementing the same protocol by Protocol Data Units (PDUs). A PDU is built by payload (data addressed or generated by an entity at a higher adjacent layer) and header (which contains protocol information). PDU format as well as service definition is specified by the protocol at a given level of the stack. The same concepts
10 are at the basis of the de-facto standard protocol stack on the Internet, namely the TCP/IP protocol stack [26]. Therefore, it is reasonable to believe that Cross layer optimization will continue to be one of the most important tasks in protocol design for WMNs. However, critical issues must be considered for Cross layer design, because it has risks due to loss of protocol-layer abstraction, incompatibility with existing protocols, and unforeseen impact on the future design of the network, and difficulty in maintenance and management. Thus, certain guidelines need to be followed when carrying out Cross layer design. Wireless networks represent technologies with growing interest and expectations in the world of communications [3]. A Cross layer design approach is considered for joint routing and resource allocation for the physical (PHY) and the medium access control (MAC) layers in multi-hop wireless backhaul networks [27]. The objective of adopting a cross layer approach for routing is to provide the routing layer with an overall view of underlying information in order to obtain a perfect path with reasonable delay, throughput and reliability [28]. An availability of large variety of optimization solutions requiring information exchange between two or more layers of the protocol stack raises an important issue concerning implementation of different Cross layer solutions inside TCP/IP protocol reference model, their coexistence and interoperability, requiring the availability of a common Cross layer signalling model [26]. The standardization of TCP/IP protocol suite used nowadays in Internet dates back to early 80s. TCP/IP design was developed on the basis of the characteristics of networks and technological solutions available at the moment: most networks constituting the Internet were formed of computer equipment or other terminals interconnected using a cable or Optical fiber. Basically, such networks were characterized by a strong hierarchical structure, large processing power of network terminals, static routing, stable connectivity, small propagation delays, and low errorrates. Nowadays, the environment where TCP/IP operates greatly differs from the one it was designed for [29]. A Cross layer design approach on the other hand, is one that utilizes function across different layers of the protocol stack. Recently several studies prove that Cross layer designs can yield significant performance gains [30].
11 2.3- Basic Cross Layer Design Proposal: Techniques used for Cross layer Designing: 1- Upward information flow. 2- Downward information flow. 3- Back and forth information flows. 4- Merging of adjacent layers. For a convenient discussion we explain each one individually. 1- Upward information flow: It is a scheme which proposes the idea of having direct access between two layers where the flow of the information comes from the lower layer to the higher layer. This scheme supposes that one higher layer is exposed to the lower layer requests which are forbidden by the architecture. The formation of another interface from the lower layer to the higher layer at runtime is an outcome when higher-layer requires data from the lower-layer(s), as appeared in figure 2.1. Making interfaces from the lower layers to the transport layer to empower unequivocal notices reduces such circumstances. Upward data stream fills the need of informing the higher layers about the hidden network conditions. Figure 2.1: The upward information flow in Cross layer Design. 2- Downward information flow: Some Cross layer design recommendations depend on setting parameters on the lower layer of the stack at runtime utilizing an immediate interface from some
12 higher layer, as delineated in figure 2.2. A decent approach to take a gander at the upward and downward information flow is to regard them as warnings and insights, individually. Downward information flow is intended to give indications to the lower layers about how the application information ought to be handled. This plan additionally proposes the restricted information head out from higher layer to lower layer of two or more layers that are not permitted to impart to each other straightforwardly. The stream of data driven from higher layer to the lower layer makes another interface and administrations among them to maintain a strategic distance from the general method for operating in the stack. Figure 0.2: The downward information flow of the cross layer design 3- Back and forth information flows: Two layers, performing different tasks, can collaborate with each other at runtime. The architecture here is violated by the two complimentary new interfaces. The repeated loop between the two layers with information flowing back and forth is clearly shown in the figure 2.3. Basically, with improvements in the signal processing at the physical layer, it becomes capable of recovering packets from collisions. This scheme is concentrating with more than one layer to optimize at run time. It proposes the idea of having two nonadjacent layers working with each other simultaneously. Such scheme intends to provide corporative relation between multiple layers so if one layer is sending notifications to another layer it could also receive notification from
13 the other layer(s). Similarly it is a parallel system where interaction between two layers is possible at both ways up and down in the stack. Figure 0.3: The back and forth information flow of the cross layer design. 4- Merging of adjacent layers: It is a design of two or more adjacent layers that work as new super layer with a union of service provided by the constituent layer. This does not require any new interfaces to be created in the stack. Architecturally speaking, the super layer can be interfaced with the rest of the stack using the interfaces that already exist in the original architect. The idea presented is about getting two layers working as one layer, in other words having all the services provided by these layers interacted and acting like one super layer. Of course such scheme requires rebuilding of the services in the selected layers but if such merging happened to be achievable than data transfer would become faster, because of the fact that we will not do any changes to either interface or services in all the stack of the OSI as it will be exclusively in the selected two layers. Figure 2.4 illustrates the super layer.
14 Figure 0.4: The basic idea of cross layer to join two layers as one layer. The cross layer design is not just about violating the rules. It is more of sharing information between layers, and the normal architecture does not allow sharing of information between non adjacent layers even if required, where in the other hand the cross layer design approach aims to avail such information sharing process. Therefore, the architecture can keep its privileges and rules on some of the layers which are not required to enhance the cross layer design. The congestion control and delay in queuing are an example of the issues that requires the adaption of the cross layer design in order to achieve higher performance. Fundamental questions that must be answered in cross layer design are: what information should be exchanged among layers, and how should such information be factored into each layer's performance adaptation algorithm. Which means exchanging information is not sufficient unless the entities and functions are well discussed and designed. A layer shall not be integrated with new interfaces in the stack until it is decided for what purpose they would be used. The other point is maintaining the information in such way that will not harm the flow of the data from other layers which are not yet integrated with cross layer techniques. In fact there are certain conditions which must be adapted before we can make any change to the current stack architecture. But in the other hand the need for cross layer design grows each day due to the lack of coordination among layers, which resulted in several issues. Also the structure of the current stack can get more complexity and multiple problems can rise up such as congestion control and queuing delay. Figure 2.5 illustrate complete schemes.
15 Figure 2.5: The complete basic schemes for the cross layer design Cross Layer Adaption: Cross layer design has risen as an intriguing new area of exploration in WMNs and WSNs. The essential thought behind cross-layer design is to make data accessible to numerous levels in the protocol stack. With this mutual data, it is then conceivable to settle on more educated choices and improvements. The extent to which data is shared is an open zone of exploration and fascinating field to ponder. A completely cross layer design offers data among all levels in the protocol; nonetheless, giving up the particularity additionally adversely influences the measure of security that the protocol can give. Thus, additional procurements must be made to guarantee the sheltered and secure delivery of sensitive information. It has been demonstrated that traditional protocols, with disjoint layers, give a measure of security; in any case, they are not reasonable for some system sorts for instance the WMNs and WSN situations, as they don't adequately catch its dynamic nature. By misusing cross layer collaborations, specialists would like to build up another system that will settle a portion of the challenges characteristic in WMNs.
16 Late investigates into cross layer design has hoped to advance diverse parts of the WMNs; these methodologies have been utilizing cross layer design to enhance the information exchange rate execution and to accomplish proficiency on the congestion control issue. Optimizing system throughput in hope of making the problem of scalability of WMNs achievable. Satisfying QoS requirements of WMNs. Improving resource efficiency. Specifically, enhancing the information exchange rate of the system is exceptionally compelling as it has an immediate and substantial effect on the performance of the network. Altering transmission range because of element system topology and QoS are a couple of the numerous parameters that system originators must mull over when attempting to increase the efficiency of the WMNs. This issue is exacerbated by the way that frequently there are characteristic clashes between improvement objectives. Moreover, improvement may require collaboration among numerous layers in the protocol stack, along these lines, empowering cross-layer advancement while keeping the layer division rule in place. The vertical module is in charge of social event and controlling all cross-layer communications. To support cross layering in this manner, the protocols must implement a vertical module however, they are free to design the layers in the protocol stack as per the requirements of the network. The advantages of a cross layer design approach are direct consequences of the nature of the wireless link itself. The wireless link characteristics affect all levels of the network protocol stack, and therefore all layers must be responsive to changing channel conditions. Furthermore, tight coupling between protocols at different layers exists. For example, at the physical layer, receiver filters can be dynamically adjusted to respond to interfaces changes at the link layer, power, rate and coding can be adapted, again affecting the interfaces level at the MAC layer, adaptive scheduling can be implemented based on the current level of interfaces and on the current link quality. Adaptive routing (for Ad-hoc networks) or soft handoff (in cellular systems) can be implemented in response to the current interfaces level and distribution in the network at the application layer, soft QoS can be defined, where the application QoS requirements are dynamically adjusted depending again on the current interfaces
17 levels. All the above adaptation protocols react to, and have an impact on, the interference level and distribution in the network. As a consequence, for efficient design, the adaptation protocols at each layer should not be independently developed, but rather should be designed in an integrated way such that the interdependencies between layers can be exploited. The development of cross-layer protocols enhances the network's ability to adapt; performance information can be exchanged among layers for an optimal response to degrading transmission conditions. The integrated adaptive protocol must still have a hierarchical structure. Since network variations take place on different time scales the rate of adaptation for a protocol is determined by its location in the protocol stack. However, information exchange between layers and joint optimization may greatly improve the system performance. Many cross layer designs require formation of new interfaces between the layers. The new interfaces are utilized for data sharing between the layers at run-time. The architecture violation here is clearly the formation of another interface not accessible in the layered design. The research divided the cross layer into three design, We further divide this category into three subcategories depending on the direction of information flow along the new interfaces: Upward: From lower layer(s) to a higher layer, Downward: From higher layer(s) to a lower layer and Back and forth: Iterative flow between two layers [31]. Conclusion: In this chapter, a brief discussion on the cross layer design was presented and explained for understanding the nature of this design. There are many scenarios which require the adaption of the cross layer design. Therefore, different numbers of proposed designs were discussed to analyze the need of such design which can be effective in several aspects of the network protocols. The cross layer design is a tool that can be used to create new functions and entities which can provide multiple services; these services can be used to increase the network performance because it supports and executes functions that would gain advantages of the lack of coordination among layers.
An Industrial Employee Development Application Protocol Using Wireless Sensor Networks
RESEARCH ARTICLE An Industrial Employee Development Application Protocol Using Wireless Sensor Networks 1 N.Roja Ramani, 2 A.Stenila 1,2 Asst.professor, Dept.of.Computer Application, Annai Vailankanni
More informationIntroduction to Internetworking
CHAPTER Introduction to Internetworking Introduction This chapter explains basic internetworking concepts. The information presented here helps readers who are new to internetworking comprehend the technical
More informationOrganizations have developed standard sets of protocols
Network Models Organizations have developed standard sets of protocols Some of these organizations are: The International Standards Organization (ISO) The Institute of Electrical and Electronic Engineers
More informationFramework of Vertical Multi-homing in IPv6-based NGN
ITU-T Recommendation Y.ipv6-vmh Framework of Vertical Multi-homing in IPv6-based NGN Summary This Recommendation describes a framework of vertical multi-homing in IPv6-based NGN. This Recommendation identifies
More informationNeed For Protocol Architecture
Chapter 2 CS420/520 Axel Krings Page 1 Need For Protocol Architecture E.g. File transfer Source must activate communications path or inform network of destination Source must check destination is prepared
More informationNeed For Protocol Architecture
Chapter 2 CS420/520 Axel Krings Page 1 Need For Protocol Architecture E.g. File transfer Source must activate communications path or inform network of destination Source must check destination is prepared
More informationComputer Science 461 Final Exam May 22, :30-3:30pm
NAME: Login name: Computer Science 461 Final Exam May 22, 2012 1:30-3:30pm This test has seven (7) questions, each worth ten points. Put your name on every page, and write out and sign the Honor Code pledge
More informationCHAPTER 18 INTERNET PROTOCOLS ANSWERS TO QUESTIONS
CHAPTER 18 INTERNET PROTOCOLS ANSWERS TO QUESTIONS 18.1 (1) The communications network may only accept blocks of data up to a certain size. (2) Error control may be more efficient with a smaller PDU size.
More informationFLAVIA - # FLexible Architecture for Virtualizable future wireless Internet Access. (FP7 call 5, obj1.1)
FLAVIA - #257263 FLexible Architecture for Virtualizable future wireless Internet Access (FP7 call 5, obj1.1) FLAVIA: Project Overview R&D towards the Future Wireless Internet Paradigm shift: From pre-designed
More informationModule 1. Introduction. Version 2, CSE IIT, Kharagpur
Module 1 Introduction Version 2, CSE IIT, Kharagpur Introduction In this module we shall highlight some of the basic aspects of computer networks in two lessons. In lesson 1.1 we shall start with the historical
More informationThe History and the layers of the OSI Model 30 - October
THE OSI MODEL Established in 1947, the International Standards Organization (ISO) is a multinational body dedicated to worldwide agreement on international standards. An ISO standard that covers all aspects
More informationAbstract of the Book
Book Keywords IEEE 802.16, IEEE 802.16m, mobile WiMAX, 4G, IMT-Advanced, 3GPP LTE, 3GPP LTE-Advanced, Broadband Wireless, Wireless Communications, Cellular Systems, Network Architecture Abstract of the
More informationIntroduction to Mobile Ad hoc Networks (MANETs)
Introduction to Mobile Ad hoc Networks (MANETs) 1 Overview of Ad hoc Network Communication between various devices makes it possible to provide unique and innovative services. Although this inter-device
More informationSIMPLE MODEL FOR TRANSMISSION CONTROL PROTOCOL (TCP) Irma Aslanishvili, Tariel Khvedelidze
80 SIMPLE MODEL FOR TRANSMISSION CONTROL PROTOCOL (TCP) Irma Aslanishvili, Tariel Khvedelidze Abstract: Ad hoc Networks are complex distributed systems that consist of wireless mobile or static nodes that
More informationNetwork protocols and. network systems INTRODUCTION CHAPTER
CHAPTER Network protocols and 2 network systems INTRODUCTION The technical area of telecommunications and networking is a mature area of engineering that has experienced significant contributions for more
More informationCHAPTER 4 CROSS LAYER INTERACTION
38 CHAPTER 4 CROSS LAYER INTERACTION The cross layer interaction techniques used in the lower layers of the protocol stack, solve the hidden and exposed terminal problems of wireless and ad hoc networks.
More informationA Framework for Optimizing IP over Ethernet Naming System
www.ijcsi.org 72 A Framework for Optimizing IP over Ethernet Naming System Waleed Kh. Alzubaidi 1, Dr. Longzheng Cai 2 and Shaymaa A. Alyawer 3 1 Information Technology Department University of Tun Abdul
More informationResearch on Heterogeneous Network Integration in Distribution Communication Network
Research on Heterogeneous Integration in Distribution Communication Wei Li 1, Haonan Zheng 1, Hui He 1 1 (School of Control and Computer Engineering, North China Electric Power University, China) Abstract:
More informationOn the Interdependence of Congestion and Contention in Wireless Sensor Networks
On the Interdependence of Congestion and Contention in Wireless Sensor Networks Mehmet C. Vuran Vehbi C. Gungor School of Electrical & Computer Engineering Georgia Institute of Technology, Atlanta, GA
More informationChapter 5 Ad Hoc Wireless Network. Jang Ping Sheu
Chapter 5 Ad Hoc Wireless Network Jang Ping Sheu Introduction Ad Hoc Network is a multi-hop relaying network ALOHAnet developed in 1970 Ethernet developed in 1980 In 1994, Bluetooth proposed by Ericsson
More informationTCP/IP THE TCP/IP ARCHITECTURE
TCP/IP-1 The Internet Protocol (IP) enables communications across a vast and heterogeneous collection of networks that are based on different technologies. Any host computer that is connected to the Internet
More informationIntroduction to computer networking
edge core Introduction to computer networking Comp Sci 3600 Security Outline edge core 1 2 edge 3 core 4 5 6 The edge core Outline edge core 1 2 edge 3 core 4 5 6 edge core Billions of connected computing
More informationECE 650 Systems Programming & Engineering. Spring 2018
ECE 650 Systems Programming & Engineering Spring 2018 Networking Introduction Tyler Bletsch Duke University Slides are adapted from Brian Rogers (Duke) Computer Networking A background of important areas
More informationWeek 2 / Paper 1. The Design Philosophy of the DARPA Internet Protocols
Week 2 / Paper 1 The Design Philosophy of the DARPA Internet Protocols David D. Clark ACM CCR, Vol. 18, No. 4, August 1988 Main point Many papers describe how the Internet Protocols work But why do they
More informationThe Open System Interconnect model
The Open System Interconnect model Telecomunicazioni Undergraduate course in Electrical Engineering University of Rome La Sapienza Rome, Italy 2007-2008 1 Layered network design Data networks are usually
More informationChapter 09 Network Protocols
Chapter 09 Network Protocols Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Outline Protocol: Set of defined rules to allow communication between entities Open Systems
More informationComputer Communication Networks
Contents ELL 785 Computer Communication Networks Introduction Lecture 1 Taxonomy of communication works Computer Communication Networks Building a work ed work architecture 1-1 Introduction PC server wireless
More informationDr Markus Hagenbuchner CSCI319 SIM. Distributed Systems Chapter 4 - Communication
Dr Markus Hagenbuchner markus@uow.edu.au CSCI319 SIM Distributed Systems Chapter 4 - Communication CSCI319 Chapter 4 Page: 1 Communication Lecture notes based on the textbook by Tannenbaum Study objectives:
More informationActive source routing for ad-hoc network: seamless integration of wireless environment
Active source routing for ad-hoc network: seamless integration of wireless environment 1. Introduction Active networking is the emerging technology that will provide new network environment where lots
More informationOSI Network Layer. Network Fundamentals Chapter 5. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1
OSI Network Layer Network Fundamentals Chapter 5 Version 4.0 1 Objectives Identify the role of the Network Layer, as it describes communication from one end device to another end device. Examine the most
More informationPlease view notes for further information on later slides
Please view notes for further information on later slides 1 2 Mobile telecoms planning is driven primarily by coverage of population and secondarily by coverage of geographic area, often with reference
More informationCross Layer Protocol Design. Radio Communication III
Cross Layer Protocol Design Radio Communication III The layered world of protocols The ISO OSI model OSI model Introduction» The open systems interconnection reference model (OSI model) describes a layered
More informationECE519 Advanced Operating Systems
IT 540 Operating Systems ECE519 Advanced Operating Systems Prof. Dr. Hasan Hüseyin BALIK (10 th Week) (Advanced) Operating Systems 10. Multiprocessor, Multicore and Real-Time Scheduling 10. Outline Multiprocessor
More informationCHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL
WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL 2.1 Topology Control in Wireless Sensor Networks Network topology control is about management of network topology to support network-wide requirement.
More information2. LITERATURE REVIEW. Performance Evaluation of Ad Hoc Networking Protocol with QoS (Quality of Service)
2. LITERATURE REVIEW I have surveyed many of the papers for the current work carried out by most of the researchers. The abstract, methodology, parameters focused for performance evaluation of Ad-hoc routing
More informationCH : 15 LOCAL AREA NETWORK OVERVIEW
CH : 15 LOCAL AREA NETWORK OVERVIEW P. 447 LAN (Local Area Network) A LAN consists of a shared transmission medium and a set of hardware and software for interfacing devices to the medium and regulating
More informationChapter 1 Introduction
Emerging multimedia, high-speed data, and imaging applications are generating a demand for public networks to be able to multiplex and switch simultaneously a wide spectrum of data rates. These networks
More informationThis tutorial will help you in understanding IPv4 and its associated terminologies along with appropriate references and examples.
About the Tutorial Internet Protocol version 4 (IPv4) is the fourth version in the development of the Internet Protocol (IP) and the first version of the protocol to be widely deployed. IPv4 is described
More informationComputer Networks with Internet Technology William Stallings. Chapter 2 Protocols and the TCP/IP Protocol Suite
Computer Networks with Internet Technology William Stallings Chapter 2 Protocols and the TCP/IP Protocol Suite Need For Protocol Architecture E.g. File transfer Source must activate comms. Path or inform
More informationMcGill University - Faculty of Engineering Department of Electrical and Computer Engineering
McGill University - Faculty of Engineering Department of Electrical and Computer Engineering ECSE 494 Telecommunication Networks Lab Prof. M. Coates Winter 2003 Experiment 5: LAN Operation, Multiple Access
More informationData and Computer Communications. Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications
Data and Computer Communications Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based s 1 Need For Protocol Architecture data exchange can involve complex procedures better if task broken into subtasks
More informationSpectrum Management in Cognitive Radio Networks
Spectrum Management in Cognitive Radio Networks Jul 14,2010 Instructor: professor m.j omidi 1/60 BY : MOZHDEH MOLA & ZAHRA ALAVIKIA Contents Overview: Cognitive Radio Spectrum Sensing Spectrum Decision
More informationPeer entities. Protocol Layering. Protocols. Example
Peer entities Protocol Layering An Engineering Approach to Computer Networking Customer A and B are peers Postal worker A and B are peers Protocols A protocol is a set of rules and formats that govern
More informationRequest for Comments: 1787 T.J. Watson Research Center, IBM Corp. Category: Informational April 1995
Network Working Group Y. Rekhter Request for Comments: 1787 T.J. Watson Research Center, IBM Corp. Category: Informational April 1995 Status of this Memo Routing in a Multi-provider Internet This memo
More informationChapter 12 Network Protocols
Chapter 12 Network Protocols 1 Outline Protocol: Set of defined rules to allow communication between entities Open Systems Interconnection (OSI) Transmission Control Protocol/Internetworking Protocol (TCP/IP)
More informationChapter 7 CONCLUSION
97 Chapter 7 CONCLUSION 7.1. Introduction A Mobile Ad-hoc Network (MANET) could be considered as network of mobile nodes which communicate with each other without any fixed infrastructure. The nodes in
More informationChapter 5 OSI Network Layer
Chapter 5 OSI Network Layer The protocols of the OSI model Network layer specify addressing and processes that enable Transport layer data to be packaged and transported. The Network layer encapsulation
More informationLecture 05 Application Layer - I
Computer Networks and Internet Protocol Prof. Soumya Kanti Ghosh Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture 05 Application Layer - I Hi. So, we will
More informationApplication Oriented Networks: An SOA Perspective
Oriented s: An SOA Perspective www.thbs.com Introduction Service Oriented Architecture is the hot topic of discussion in IT circles today. So much so, in fact, that SOA is being seen by many as the future
More informationSWAP and TCP performance
SWAP and TCP performance Jean Tourrilhes, HPLB 23 March 98 1 Introduction The SWAP protocol that we have proposed [4] the HRFWG is designed to carry TCP/IP traffic. Of course, we would never had proposed
More informationSubject: Adhoc Networks
ISSUES IN AD HOC WIRELESS NETWORKS The major issues that affect the design, deployment, & performance of an ad hoc wireless network system are: Medium Access Scheme. Transport Layer Protocol. Routing.
More informationNetworking for Data Acquisition Systems. Fabrice Le Goff - 14/02/ ISOTDAQ
Networking for Data Acquisition Systems Fabrice Le Goff - 14/02/2018 - ISOTDAQ Outline Generalities The OSI Model Ethernet and Local Area Networks IP and Routing TCP, UDP and Transport Efficiency Networking
More informationScribe Notes -- October 31st, 2017
Scribe Notes -- October 31st, 2017 TCP/IP Protocol Suite Most popular protocol but was designed with fault tolerance in mind, not security. Consequences of this: People realized that errors in transmission
More informationITU-T Y Framework of multi-homing in IPv6-based NGN
INTERNATIONAL TELECOMMUNICATION UNION ITU-T Y.2052 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (02/2008) SERIES Y: GLOBAL INFORMATION INFRASTRUCTURE, INTERNET PROTOCOL ASPECTS AND NEXT-GENERATION NETWORKS
More information3. Evaluation of Selected Tree and Mesh based Routing Protocols
33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in
More informationVideo Streaming Over the Internet
Video Streaming Over the Internet 1. Research Team Project Leader: Graduate Students: Prof. Leana Golubchik, Computer Science Department Bassem Abdouni, Adam W.-J. Lee 2. Statement of Project Goals Quality
More informationChapter - 1 INTRODUCTION
Chapter - 1 INTRODUCTION Worldwide Interoperability for Microwave Access (WiMAX) is based on IEEE 802.16 standard. This standard specifies the air interface of fixed Broadband Wireless Access (BWA) system
More informationNetwork Models. Presentation by Dr.S.Radha HOD / ECE SSN College of Engineering
Network Models Presentation by Dr.S.Radha HOD / ECE SSN College of Engineering Objective At the end of this section students will be able to Understand the architecture of the OSI model Understand the
More informationNetwork Architecture
Unit 7 Network Architecture Acknowledgments: These slides were originally developed by Prof. Jean Walrand for EE122. The past and current EE122 instructors including Kevin Fall, Abhay Parekh, Shyam Parekh,
More informationEEC-484/584 Computer Networks
EEC-484/584 Computer Networks Lecture 2 Wenbing Zhao wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Misc. Interested in research? Secure
More informationRouting Basics. What is Routing? Routing Components. Path Determination CHAPTER
CHAPTER 5 Routing Basics This chapter introduces the underlying concepts widely used in routing protocols Topics summarized here include routing protocol components and algorithms In addition, the role
More informationIntegrated Services. Integrated Services. RSVP Resource reservation Protocol. Expedited Forwarding. Assured Forwarding.
Integrated Services An architecture for streaming multimedia Aimed at both unicast and multicast applications An example of unicast: a single user streaming a video clip from a news site An example of
More informationECS-087: Mobile Computing
ECS-087: Mobile Computing TCP over wireless TCP and mobility Most of the Slides borrowed from Prof. Sridhar Iyer s lecture IIT Bombay Diwakar Yagyasen 1 Effect of Mobility on Protocol Stack Application:
More informationTCP PERFORMANCE FOR FUTURE IP-BASED WIRELESS NETWORKS
TCP PERFORMANCE FOR FUTURE IP-BASED WIRELESS NETWORKS Deddy Chandra and Richard J. Harris School of Electrical and Computer System Engineering Royal Melbourne Institute of Technology Melbourne, Australia
More informationAppendix B. Standards-Track TCP Evaluation
215 Appendix B Standards-Track TCP Evaluation In this appendix, I present the results of a study of standards-track TCP error recovery and queue management mechanisms. I consider standards-track TCP error
More informationIT4405 Computer Networks (Compulsory)
IT4405 Computer Networks (Compulsory) INTRODUCTION This course provides a comprehensive insight into the fundamental concepts in data communications, computer network systems and protocols both fixed and
More informationChapter 2 Overview of the Design Methodology
Chapter 2 Overview of the Design Methodology This chapter presents an overview of the design methodology which is developed in this thesis, by identifying global abstraction levels at which a distributed
More informationThe Affinity Effects of Parallelized Libraries in Concurrent Environments. Abstract
The Affinity Effects of Parallelized Libraries in Concurrent Environments FABIO LICHT, BRUNO SCHULZE, LUIS E. BONA, AND ANTONIO R. MURY 1 Federal University of Parana (UFPR) licht@lncc.br Abstract The
More information15-441: Computer Networking. Wireless Networking
15-441: Computer Networking Wireless Networking Outline Wireless Challenges 802.11 Overview Link Layer Ad-hoc Networks 2 Assumptions made in Internet Host are (mostly) stationary Address assignment, routing
More informationDelayed ACK Approach for TCP Performance Improvement for Ad Hoc Networks Using Chain Topology
Delayed ACK Approach for TCP Performance Improvement for Ad Hoc Networks Using Chain Topology Prashant Kumar Gupta M.Tech. Scholar, Computer Networks, Bhilai Institute of Technology, Durg (C.G.), India
More informationAMCP/4-WP/70. b) requirements and recommendations together with their rationale; and
Appendix A to the Report on Agenda Item 3 3A-1 APPENDIX A VHF DIGITAL LINK (VDL) DESIGN GUIDELINES 1. INTRODUCTION 1.1 In the absence of a comprehensive and detailed set of operational requirements, the
More information3+1+0 (3) IT 201 T. Principles of Information and Technology Systems. Prereq: CS 110T IT 222 T. Communications and Networks Fundamentals (4)
Principles of Information and Technology Systems IT 201 T Prereq: CS 110T This course aims to develop an understanding of the components of computing and their relationships, significant impacts of IT
More informationVorlesung Kommunikationsnetze Research Topics: QoS in VANETs
Vorlesung Kommunikationsnetze Research Topics: QoS in VANETs Prof. Dr. H. P. Großmann mit B. Wiegel sowie A. Schmeiser und M. Rabel Sommersemester 2009 Institut für Organisation und Management von Informationssystemen
More informationINTERNET OF THINGS FOR SMART CITIES BY ZANELLA ET AL.
INTERNET OF THINGS FOR SMART CITIES BY ZANELLA ET AL. From IEEE INTERNET OF THINGS JOURNAL, VOL. 1, NO. 1, FEBRUARY 2014 Presented by: Abid Contents Objective Introduction Smart City Concept & Services
More informationIP Mobility vs. Session Mobility
IP Mobility vs. Session Mobility Securing wireless communication is a formidable task, something that many companies are rapidly learning the hard way. IP level solutions become extremely cumbersome when
More informationCCNA Exploration1 Chapter 7: OSI Data Link Layer
CCNA Exploration1 Chapter 7: OSI Data Link Layer LOCAL CISCO ACADEMY ELSYS TU INSTRUCTOR: STELA STEFANOVA 1 Explain the role of Data Link layer protocols in data transmission; Objectives Describe how the
More informationSelf-Adaptive Middleware for Wireless Sensor Networks: A Reference Architecture
Architecting Self-Managing Distributed Systems Workshop ASDS@ECSAW 15 Self-Adaptive Middleware for Wireless Sensor Networks: A Reference Architecture Flávia C. Delicato Federal University of Rio de Janeiro
More informationNetwork Connectivity and Mobility Part 2
Network Connectivity and Mobility Part 2 BSAD 141 Dave Novak Topics Covered Lecture is structured based on the five elements of creating a connected world from the text book (with additional content) 1.
More informationMedia Access Control in Ad Hoc Networks
Media Access Control in Ad Hoc Networks The Wireless Medium is a scarce precious resource. Furthermore, the access medium is broadcast in nature. It is necessary to share this resource efficiently and
More informationTransport layer issues
Transport layer issues Dmitrij Lagutin, dlagutin@cc.hut.fi T-79.5401 Special Course in Mobility Management: Ad hoc networks, 28.3.2007 Contents Issues in designing a transport layer protocol for ad hoc
More informationLayering in Networked computing. OSI Model TCP/IP Model Protocols at each layer
Layering in Networked computing OSI Model TCP/IP Model Protocols at each layer Learning outcomes Understand the need of layering in Networked computing Understand the OSI model and the tcp/ip model Understand
More informationThe OSI Model. Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO).
Network Models The OSI Model Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Model for understanding and developing computer-to-computer communication
More informationIntroduction and Statement of the Problem
Chapter 1 Introduction and Statement of the Problem 1.1 Introduction Unlike conventional cellular wireless mobile networks that rely on centralized infrastructure to support mobility. An Adhoc network
More informationb) Diverse forms of physical connection - all sorts of wired connections, wireless connections, fiber optics, etc.
Objectives CPS221 Lecture: Layered Network Architecture last revised 6/22/10 1. To discuss the OSI layered architecture model 2. To discuss the specific implementation of this model in TCP/IP Materials:
More informationModel-Based Design for Large High Integrity Systems: A Discussion Regarding Model Architecture
Model-Based Design for Large High Integrity Systems: A Discussion Regarding Model Architecture By Mike Anthony and Jon Friedman MathWorks Inc, Natick, MA, 01760 INTRODUCTION From complex controls problems
More informationAppeal Decision. Appeal No USA ALCATEL-LUCENT USA LTD. Tokyo, Japan. Tokyo, Japan
Appeal Decision Appeal No. 2014-5131 USA Appellant ALCATEL-LUCENT USA LTD. Tokyo, Japan Patent Attorney OKABE, Yuzuru Tokyo, Japan Patent Attorney YOSHIZAWA, Hiroshi The case of appeal against the examiner's
More informationThe Analysis and Proposed Modifications to ISO/IEC Software Engineering Software Quality Requirements and Evaluation Quality Requirements
Journal of Software Engineering and Applications, 2016, 9, 112-127 Published Online April 2016 in SciRes. http://www.scirp.org/journal/jsea http://dx.doi.org/10.4236/jsea.2016.94010 The Analysis and Proposed
More informationDynamic Design of Cellular Wireless Networks via Self Organizing Mechanism
Dynamic Design of Cellular Wireless Networks via Self Organizing Mechanism V.Narasimha Raghavan, M.Venkatesh, Divya Sridharabalan, T.Sabhanayagam, Nithin Bharath Abstract In our paper, we are utilizing
More informationCSCD 433/533 Advanced Networks
CSCD 433/533 Advanced Networks Lecture 2 Network Review Winter 2017 Reading: Chapter 1 1 Topics Network Topics Some Review from CSCD330 Applications Common Services Architecture OSI Model AS and Routing
More informationData Encapsulation & OSI & TCP/IP Models Week 2. Lecturer: Lucy White Office : 324
Data Encapsulation & OSI & TCP/IP Models Week 2 Lecturer: Lucy White lbwhite@wit.ie Office : 324 1 Network Protocols A protocol is a formal description of a set of rules and conventions that govern a particular
More informationOSI Network Layer. Chapter 5
OSI Network Layer Network Fundamentals Chapter 5 Objectives Identify the role of the Network Layer, as it describes communication from one end device to another end device. Examine the most common Network
More informationCPS221 Lecture: Layered Network Architecture
CPS221 Lecture: Layered Network Architecture Objectives last revised 9/8/14 1. To discuss the OSI layered architecture model 2. To discuss the specific implementation of this model in TCP/IP Materials:
More informationEuropean Network on New Sensing Technologies for Air Pollution Control and Environmental Sustainability - EuNetAir COST Action TD1105
European Network on New Sensing Technologies for Air Pollution Control and Environmental Sustainability - EuNetAir COST Action TD1105 A Holistic Approach in the Development and Deployment of WSN-based
More informationNetwork Layers. Standardization Cruelty 2009/08/12. (C) Herbert Haas
Network Layers Standardization Cruelty (C) Herbert Haas 2009/08/12 The good thing about standards is that there are so many to choose from Andrew S. Tanenbaum Standards We need networking standards Ensure
More informationCOMPUTER NETWORK PERFORMANCE. Gaia Maselli Room: 319
COMPUTER NETWORK PERFORMANCE Gaia Maselli maselli@di.uniroma1.it Room: 319 Computer Networks Performance 2 Overview of first class Practical Info (schedule, exam, readings) Goal of this course Contents
More informationFigure Potential 5G applications
6. 5G Key Concept 6.1 Key Concepts of 5G End-to-end (E2E) quality required by applications and/or users will be far more diversified in the 5G era than what we have seen in the preceding generations. For
More informationLECTURE PLAN. Script. Introduction about MAC Types o ALOHA o CSMA o CSMA/CD o CSMA/CA
Course- B.Sc. Applied Physical Science (Computer Science) Year- IIIrd, Sem- Vth Subject Computer Science Paper- XVIIth, Computer Networks Lecture -11 Lecture Title- Medium Access Layer Script Today in
More informationCCNA Exploration Network Fundamentals. Chapter 09 Ethernet
CCNA Exploration Network Fundamentals Chapter 09 Ethernet Updated: 07/07/2008 1 9.0.1 Introduction 2 9.0.1 Introduction Internet Engineering Task Force (IETF) maintains the functional protocols and services
More information(INTERFERENCE AND CONGESTION AWARE ROUTING PROTOCOL)
Qos of Network Using Advanced Hybrid Routing in WMN, Abstract - Maximizing the network throughput in a multichannel multiradio wireless mesh network various efforts have been devoted. The recent solutions
More informationGuide to Networking Essentials, 6 th Edition. Chapter 6: Network Reference Models and Standards
Guide to Networking Essentials, 6 th Edition Chapter 6: Network Reference Models and Standards Objectives Explain the OSI reference model layers and their relationship to hardware and software Explain
More information