Wireless IP for IoT / M2M 101 The Basics
|
|
- Dorcas Short
- 6 years ago
- Views:
Transcription
1 Wireless IP for IoT / M2M 101 The Basics Aeris White Paper A concise introduction to using wireless devices for Internet of Things (IoT) and machine-to-machine (M2M) data transmissions. 1
2 Let our experts lead the way Table of Contents INTRODUCTION 1 WHY DO I NEED WIRELESS IP FOR IOT / M2M COMMUNICATION? 1 WIRELESS IP IN IOT / M2M: THE BASICS 1 Wireless IP Radio Modules... Think Modems 2 Point-to-Point Protocols 2 IP Session Started by Device 2 UDP or TCP? 2 User Datagram Protocol (UDP) 2 Transmission Control Protocol (TCP) 2 Which Protocol to Use? 3 SECURITY 3 ABOUT AERIS 4 2
3 INTRODUCTION Since the introduction of wireless IP for IoT / M2M networks in 1995, communication and data transmission between and among machines is faster than ever before. This revelation has not only increased the speed of business, but also enabled the introduction of many new products and applications for IoT / M2M communication. Aeris has worked with many companies to develop and roll out best-in-class IoT / M2M solutions that rely on a wireless IP data connection. This white paper discusses the best practices for using IP data transport for IoT / M2M applications. WHY DO I NEED WIRELESS IP FOR IOT / M2M COMMUNICATION? The first IoT / M2M applications used Short Message Service (SMS) as their data transport methodology. While very reliable for the delivery of data, SMS is limited to 140 eight-bit bytes (or 160 characters of seven bits) of IoT / M2M application data in every message packet transmission. This is true for both GSM and CDMA cellular technologies. Many IoT / M2M applications require more bandwidth than SMS allows. For example, firmware updates for a remote device or content updates for a digital billboard require more data to be sent than SMS would allow. In 2G GSM and CDMA cellular, the IP data transport technologies are GPRS and 1xRTT. While these have slower data throughput rates compared to 3G and 4G cellular, they are quite sufficient for the IP transmission needs for most IoT / M2M applications. (Readers should be aware that a significant portion of 2G GSM GPRS services are being shut down at the end of 2016 in the United States, so CDMA 1xRTT is the only practical option for new 2G devices.) For IoT / M2M applications requiring faster transmission rates, devices can use 3G CDMA and GSM protocols such as EV-DO and HSPA (or 4G LTE in the future). But today, HSPA geographic coverage in the US does not match the EV-DO coverage, and LTE coverage is not yet sufficient for IoT / M2M applications. Finally, the cost-per-byte of data is significantly lower for wireless IP when compared to SMS as a transport. 3G radio modules are more expensive than 1xRTT modules, so they are only used when the faster transmission rates are required for a particular IoT / M2M application. All of this has led to the mass adoption of wireless IP as the primary method of data transfer for IoT / M2M applications. WIRELESS IP IN IOT / M2M: THE BASICS This section describes the basics of wireless IP for IoT / M2M data transport. First, it is important to recognize that wireless IP data technologies are not the same as wired IP data technologies. Recently, software developers, used to working with DSL, fiber, and cable IP services (and local-area IP networks), have begun working on wireless IP devices. They sometimes attempt to apply wired IP practices to wireless IP implementations, and then things are certain to go awry. 1
4 WIRELESS IP RADIO MODULES THINK MODEMS Wireless IP radio modules (aka, modules) are more similar to old dial-up modems than continuously-connected devices used in DSL and cable IP services (DSL and cable units also perform the functional equivalent of dial-up, but these are usually set to dial immediately at power-on and stay connected until power-off acting as if they were connected via a physical wire to the Internet). To establish a session, the IoT / M2M code must initiate the cellular transmission from the module using a dial-string similar to making a phone call with a dial-up modem. The controller running the IoT / M2M code sends an AT command (for example, ATDT #777) to the module over a RS-232 or USB port. Using AT commands with modules is very similar to using AT commands (originally developed by Hayes Corporation) for traditional dial-up modems. After receiving the ATDT #777 command, the module originates a call using the dialed digits #777 to the Mobile Switching Center (MSC) that is serving the device in the local cellular network. The MSC interprets the digits #777 as a request to establish a data session and allows the process to continue. The detailed mechanisms of establishing an IP session in wireless IP technologies (authorization, authentication, etc.) are not described here. It is sufficient to note that the cellular systems have the necessary equipment, protocols, and communication and control mechanisms to make it happen using relevant cellular standards. POINT-TO-POINT PROTOCOLS Using a Point-to-Point Protocol (PPP) session for IP data transmissions after dialing in using a module is just like using PPP on traditional dial-up modems on dial-up telephone lines. In traditional dial-up modem connections, the computer that is connected to the modem uses a PPP stack to establish an IP session to the network and remote server. This is under the control of the computer, since the user can choose whether the dial-up modem connection is used for an IP data session or with a terminal emulation program for accessing the server. Similarly, the wireless device must use a PPP stack for the IP data session to the cellular network. IP SESSION STARTED BY THE DEVICE In cellular data technologies, the session is always initiated by the module (under the control of the external IoT / M2M application code) the analogy to dial-up modem service holds true. Thus, until such an IP session is started and connected, there isn t any IP data path for a network system or server to send IP data to the device. IoT / M2M applications are generally designed with this concept in mind. However, if the network or server needs to initiate the transmission of IP data to a device, mechanisms called shoulder-taps must be used to cause the device to start the actual session if it is not in a session. Typically, these shoulder-taps are Mobile- Terminated SMS (MT-SMS) messages sent to the device. UDP OR TCP? We are often asked whether a device should transmit User Datagram Protocol (UDP) packets or use Transmission Control Protocol (TCP) streaming sessions for IoT / M2M data transport. The answer, not surprisingly, is: It depends! From the Internet Engineering Task Force (IETF) detailed definitions, let s briefly describe these two protocols to understand why one may be better than the other for certain IoT / M2M data transmissions. First, it is important to note that both UDP and TCP are used over an underlying IP connection. USER DATAGRAM PROTOCOL (UDP) The UDP format was first defined in an IETF Request for Comment specification, RFC 768. This protocol provides a procedure for applications programs to send messages to other programs with a minimum of protocol mechanism. This protocol is transaction-oriented, and delivery and duplicate protection are not guaranteed. If an application requires ordered, reliable delivery of streams of data, UDP is not the preferred protocol. The format has lower overhead than TCP i.e., fewer bytes are sent in the headers of the packets in UDP than TCP. TRANSMISSION CONTROL PROTOCOL (TCP) The TCP format was first defined in an IETF RFC specification, RFC 761. TCP is a connection-oriented, end-to-end reliable protocol and is intended for use as a highly reliable host-to-host protocol between hosts in IP networks and especially in interconnected systems of such networks. TCP requires that a connection be opened and managed for the duration of the IP data transmission. Within the protocol, transmitted and received packets are acknowledged by the device and the servers. The format has more overhead than UDP i.e., more bytes are sent in the headers of the packets in TCP than UDP. 2
5 WHICH PROTOCOL TO USE? In general, the choice of UDP vs. TCP must take into account: The desired balance between the reliability of TCP and the lower cost of UDP, since UDP uses fewer bytes of overhead to transmit the same amount of application data. The increased complexity of TCP, where the module must open a data stream to a remote host where server programs await connections. Careful design of TCP server programs to allow easy scaling as the number of deployed devices is increased. A desire for the acknowledgments provided by TCP sessions. It is important to note that these two protocols are not mutually exclusive for a given IoT / M2M application. For some communication purposes, a simple transmission of a UDP packet to a remote host may be sufficient including using independent acknowledgment packets via UDP. If an acknowledgment is expected, but not received, either side can retry intelligently (i.e., with limits on number of retries, variable delays between retries, etc.) For other purposes, even in the same application, a device may open a TCP connection to a server and communicate with the higher reliability of a TCP streaming session to a program that accepts these connections and transmissions. Often, the amount of data may require the use of TCP. For example, if an application needs to transmit a large file (more than a few kilobytes), it is better to use TCP, since the consequences of an error during transmission via UDP could mean that the entire file might need a complete retransmission. SECURITY Should transmitted data from an IoT / M2M device be encrypted to enhance security? Let s examine the perceived need. While it is true that the radios in wireless cellular systems can be overheard, the ANSI-2000 CDMA radio protocol is secure to all but the most serious of listeners. The vast majority of individuals and entities do not have the expensive equipment needed to listen to the spread spectrum noisy CDMA transmissions. Furthermore, the cellular nature of the system also ensures that any listening to the radio in the device will necessarily be localized radio frequency (RF) transmissions from a particular cellular module do not travel more than a few miles in dense urban areas. In the Aeris CDMA network, the network transmission of data is very secure. Once the device transmission and data leaves the radio network, it is received at Aeris via Virtual Private Network (VPN) connections from the carrier networks and sent to the customers systems via other VPN connections. These VPN network connections are already encrypted and provide secure access. Finally, content data encryption may require significant processor performance in the module or device to encode and decode data. This process might be beyond the capability of many IoT / M2M application devices. Based on these issues, our experiences, and use of VPN s where appropriate, Aeris does not recommend or require, application-level encryption of IP data to and from the modules. 3
6 ABOUT AERIS Aeris is a pioneer and leader in the market of the Internet of Things as an operator of end-to-end IoT and M2M services and as a technology provider enabling other operators to build profitable IoT businesses. Among our customers are the most demanding users of IoT services today, including Hyundai, Acura, Rand McNally, Leica, and Sprint. Through our technology platform and dedicated IoT and M2M services, we strive to fundamentally improve their businesses by dramatically reducing costs, improving operational efficiency, reducing time-to-market, and enabling new revenue streams. Our global headquarters is in Silicon Valley (Santa Clara, California). Our European headquarters is near London, UK. Visit or follow us on to learn how we can inspire you to create new business models and to participate in the revolution of the Internet of Things. Get in touch Copyright 2015 Aeris Communications, Inc. All Rights Reserved. To learn more, contact us at info@aeris.net or GO-AERIS in North America or in Europe
Wireless IP for M2M / IoT 101
Wireless IP for M2M / IoT 101 Neo White Paper A concise introduction to using wireless devices for M2M / IoT data transmissions. www.neo.aeris.com Let our experts lead the way Table of Contents INTRODUCTION
More informationThe Truth About IoT / M2M Cellular Roaming
The Truth About IoT / M2M Cellular Roaming Aeris White Paper www.aeris.com THE TRUTH ABOUT M2M / IOT CELLULAR ROAMING COPYRIGHT 2016, AERIS COMMUNICATIONS, INC. i Let our experts lead the way Table of
More informationHow to Decide if an MVNO or Carrier Is Right for Your IoT / M2M Application
How to Decide if an MVNO or Carrier Is Right for Your IoT / M2M Application Aeris White Paper www.aeris.com HOW TO DECIDE IF AN MVNO OR CARRIER IS RIGHT FOR YOU COPYRIGHT 2015, AERIS COMMUNICATIONS, INC.
More informationIntroduction to computer networking
edge core Introduction to computer networking Comp Sci 3600 Security Outline edge core 1 2 edge 3 core 4 5 6 The edge core Outline edge core 1 2 edge 3 core 4 5 6 edge core Billions of connected computing
More informationOSI Layer OSI Name Units Implementation Description 7 Application Data PCs Network services such as file, print,
ANNEX B - Communications Protocol Overheads The OSI Model is a conceptual model that standardizes the functions of a telecommunication or computing system without regard of their underlying internal structure
More informationIP Mobility vs. Session Mobility
IP Mobility vs. Session Mobility Securing wireless communication is a formidable task, something that many companies are rapidly learning the hard way. IP level solutions become extremely cumbersome when
More informationUnderstanding IP Event Reporting. Ted Nesse November 17, 2016 North Latitude Technology, LLC
Understanding IP Event Reporting Ted Nesse November 17, 2016 North Latitude Technology, LLC 2 1 Goals Distinguish Internet Protocol reporting, cloud reporting and other types of reporting. Recognize three
More informationLTE : The Future of Mobile Broadband Technology
LTE : The Future of Mobile Broadband Technology Erick Setiawan tukangbajaksawah@gmail.com 1 Become a necessity today, where the wireless broadband technology needed to meet increasing expectations in terms
More informationWhat s a protocol? What s a protocol? A closer look at network structure: What s the Internet? What s the Internet? What s the Internet?
What s the Internet? PC server laptop cellular handheld access points wired s connected computing devices: hosts = end systems running apps communication s fiber, copper, radio transmission rate = bandwidth
More informationModule Three SG. Study Guide. Exam Three Content Areas. Module Three. Chapter Seven, Backbone Networks
SG Exam Three will draw questions from multiple content areas including: our networking textbook, our wireless electronic textbook, our assignments and our class lectures. The purpose of this guide is
More informationChapter 12. Network Organization and Architecture. Chapter 12 Objectives Introduction Introduction
Chapter 12 Objectives Chapter 12 Network Organization and Architecture Become familiar with the fundamentals of network architectures. Be able to describe the ISO/OSI reference model and the TCP/IP standard.
More informationOver Cellular. Jim Weikert Strategic Marketing Manager ProSoft Technology Technical Track
Accessing EtherNet/IP Networks Over Cellular www.odva.org Jim Weikert Strategic Marketing Manager ProSoft Technology Technical Track Introduction Pervasiveness of Cellular 100% annual increase in iphone
More informationITP 140 Mobile Applications Technologies. Networks
ITP 140 Mobile Applications Technologies Networks A First Look Under the Hood 2 3 Communication Channels Mediums for transporting data from one system to another Physical Twisted Pair (CAT-3, CAT-5/6)
More informationTCP/IP protocol suite
TCP/IP protocol suite The TCP/IP protocol suite was developed prior to the OSI model. Therefore, the layers in the TCP/IP protocol suite do not match exactly with those in the OSI model. The original TCP/IP
More informationData and Computer Communications. Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications
Data and Computer Communications Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based s 1 Need For Protocol Architecture data exchange can involve complex procedures better if task broken into subtasks
More information2G, 3G, 4G... OMG! What G is Right for M2M?
2G, 3G, 4G... OMG! What G is Right for M2M? Introduction Every M2M deployment has four things in common: 1. M2M applications need longrange communications capability. 2. The data gathered by remote devices
More informationWhat s a protocol? What s a protocol? A closer look at network structure: What s the Internet? Hardware view: What s the Internet?
What s the Internet? Hardware view: What s the Internet? Hardware view: PC server wireless laptop cellular handheld access points wired s connected computing devices: hosts = end systems running apps communication
More informationAccess to the Web. Coverage. Basic Communication Technology. CMPT 165: Review
Access to the Web CMPT 165: Review Tamara Smyth, tamaras@cs.sfu.ca School of Computing Science, Simon Fraser University December 5, 2011 Access to the Web requires: a computer (of some kind) a connection
More informationrcell 100 Series MultiConnect Cellular Routers Features Benefits
MultiConnect rcell 100 Series Cellular Routers The MultiConnect rcell 100 Series of cellular routers are a part of MultiTech s comprehensive portfolio of cellular connectivity products optimized for M2M
More informationSystem Programming. Introduction to computer networks
Content : by Dr. B. Boufama School of Computer Science University of Windsor Instructor: Dr. A. Habed adlane@cs.uwindsor.ca http://cs.uwindsor.ca/ adlane/60-256 Content Content 1 Introduction to Computer
More informationUnit title: Mobile Technology: Device Connectivity (SCQF level 5) Outcome 1
1 Outcome 1 A description of mobile device internet connectivity using two current Wi-Fi methods. A description of mobile device internet connectivity using two current GSM mobile telephony methods. A
More informationData Service Options for Spread Spectrum Systems:
GPP C.S00-0-A Version.0 May, 00 Data Service Options for Spread Spectrum Systems: Service Options and GPP 00 GPP and its Organizational Partners claim copyright in this document and individual Organizational
More informationThe Internet and the World Wide Web
Technology Briefing The Internet and the World Wide Web TB5-1 Learning Objectives TB5-2 Learning Objectives TB5-3 How Did the Internet Get Started? Internet derived from internetworking 1960s U.S. Defense
More informationStudy Guide. Module Three
Exam Three will draw questions four content areas: our textbook, our assignments, the Rackspace Web Hosting Tutorial, and our class lectures. The purpose of this guide is to help you focus your exam preparations.
More informationChapter 16 Networking
Chapter 16 Networking Outline 16.1 Introduction 16.2 Network Topology 16.3 Network Types 16.4 TCP/IP Protocol Stack 16.5 Application Layer 16.5.1 Hypertext Transfer Protocol (HTTP) 16.5.2 File Transfer
More informationTelecommunication Services Engineering Lab
Logistics Instructor Office: EV006-227, Tel: 1-514-8482424 ext 5846, Email: Glitho@ciiseconcordiaca URL: http://wwwececoncordiaca/~glitho/ Office hours: Friday: 3 pm 5 pm Time: Friday, 17h45-20h15 Room
More informationA+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e. Chapter 10 Networking Essentials
A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e Chapter 10 Networking Essentials Objectives Learn about hardware devices used for networking Learn about the different types of networks
More informationNetworking interview questions
Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected
More informationOpen Systems Interconnection Model
OPEN SYSTEMS INTERCONNECTION AND TCP/IP PROTOCOL SUITE TCP/IP P Open Systems Interconnection Model An ISO standard that covers all aspects of network communications A layered framework consisting of seven
More informationTelecommunication Services Engineering Lab
Logistics Instructor Office: EV007-647, Tel: 1-514-8482424 ext 5846, Email: Glitho@ciiseconcordiaca URL: http://wwwececoncordiaca/~glitho/ Office hours: Tuesday: 3 pm 5 pm Time: Usually: Tuesday, 17h45-20h15
More informationGLOSSARY OF CELLUAR TERMS
GLOSSARY OF CELLUAR TERMS Air Interface: It is the operating system of a wireless network.. Airtime: The amount of time a person spends talking on their cellular device. AMPS: Advanced mobile phone service
More informationPerformance Challenge of 3G over Satellite Methods for Increasing Revenue & Quality of Experience. February 2018
Performance Challenge of 3G over Satellite Methods for Increasing Revenue & Quality of Experience February 2018 Mobile telephony has been in existence for over 40 years. The first generation (1G) developed
More informationChapter 2. Literature Survey. 2.1 Remote access technologies
Chapter 2 Literature Survey This chapter presents a brief report on literature reviewed in context to present work with an aim to identify current state of research in the domain. Literature review is
More informationSwitching Networks (Fall 2010) EE 586 Communication and. August 27, Lecture 2. (modified by Cheung for EE586; based on K&R original) 1-1
EE 586 Communication and Switching Networks (Fall 2010) Lecture 2 August 27, 2010 (modified by Cheung for EE586; based on K&R original) 1-1 Announcements Read Chapter 1 First homework is due 9/3 In Blackboard
More informationTellabs End of Profit study executive summary
Tellabs End of Profit study executive summary Executive summary Between November 2010 and January 2011, Tellabs created a study that analysed revenue and cost trends for carriers in Western Europe, North
More informationCS 204: Advanced Computer Networks
CS 204: Advanced Computer Networks Jiasi Chen Lectures: MWF 12:10-1pm Humanities and Social Sciences 1403 http://www.cs.ucr.edu/~jiasi/teaching/cs204_spring17/ 1 Why Networks? Supports the applications
More informationInternet Routing. Review of Networking Principles. What s the Internet: nuts and bolts view. Communication links
Internet Routing Review of Networking Principles 1 What s the Internet: nuts and bolts view Millions of connected computing devices: hosts, end-systems PC s workstations, servers PDA s, phones, toasters
More informationInternet Routing. Review of Networking Principles
Internet Routing Review of Networking Principles 1 What s the Internet: nuts and bolts view Millions of connected computing devices: hosts, end-systems PC s workstations, servers PDA s, phones, toasters
More informationBroadband and Last Mile Networks
Broadband and Last Mile Networks Last-Mile Network Design Concerns Infrastructure Cost Throughput: Upstream and Downstream Packet or Circuit Switching Congestion Control Latency History: Dial-up First
More informationWireless Personal Area Networks & Wide Area Networks
Wireless Personal Area Networks & Wide Area Networks Patrick J. Stockreisser p.j.stockreisser@cs.cardiff.ac.uk Lecture Outline In the lecture we will: Look at PAN s in more detail Look at example networks
More informationNetworking Applications
Networking Dr. Ayman A. Abdel-Hamid College of Computing and Information Technology Arab Academy for Science & Technology and Maritime Transport 1 Outline Internet Layers Internet Data Packet transmission
More informationLTE-M vs NB-IoT. Comparing New Cellular Connectivity Options
LTE-M vs Comparing New Cellular Connectivity Options Cellular Connectivity Brings New Options Across industries and applications, engineers and product designers are increasingly attracted to the bandwidth
More informationNetwork Protocols and Architectures
Network Protocols and Architectures Introduction 1 What s the Internet: nuts and bolts view Millions of connected computing devices: hosts, end-systems PC s workstations, servers PDA s, phones, toasters
More informationNetwork Connectivity and Mobility Part 2
Network Connectivity and Mobility Part 2 BSAD 141 Dave Novak Topics Covered Lecture is structured based on the five elements of creating a connected world from the text book (with additional content) 1.
More information6WINDGate. White Paper. Packet Processing Software for Wireless Infrastructure
Packet Processing Software for Wireless Infrastructure Last Update: v1.0 - January 2011 Performance Challenges for Wireless Networks As advanced services proliferate and video consumes an ever-increasing
More informationLecture 2: Layering & End-to-End
Lecture 2: Layering & End-to-End CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Mike Freedman & Amin Vahdat Lecture 2 Overview Layering Application interface Transport services Discussion
More informationWHITE PAPER. The 450 MHz Band Ecosystem
WHITE PAPER The 450 MHz Band Ecosystem Introduction M2M communications, in which everyday objects and devices are online and able to interact with each other, have seen significant growth in recent years.
More informationCNT 4007 Computer Networks - Chapter 1 : Overview
CNT 4007 Computer Networks - Chapter 1 : Overview Jonathan Kavalan, Ph.D. Department of Computer, Information Science and Engineering (CISE), University of Florida 1 Chapter 1: Introduction Our goal: get
More informationAnnouncements. TAs office hours: Mohamed Grissa: Mohamed Alkalbani:
Announcements TAs office hours: Mohamed Grissa: grissam@oregonstate.edu Tuesday: 4-5 Friday: 11-12 Mohamed Alkalbani: alkalbmo@oregonstate.edu Wednesday: 11-12 Thursday: 11-12 Lecture slides: Will be posted
More informationMobile and Sensor Systems
Mobile and Sensor Systems Lecture 2: Mobile Medium Access Control Protocols and Wireless Systems Dr Cecilia Mascolo In this lecture We will describe medium access control protocols and wireless systems
More informationA+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e. Chapter 10 Networking Essentials
A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e Chapter 10 Networking Essentials Objectives Learn about hardware devices used for networking Learn about the different types of networks
More informationCCNA Exploration1 Chapter 7: OSI Data Link Layer
CCNA Exploration1 Chapter 7: OSI Data Link Layer LOCAL CISCO ACADEMY ELSYS TU INSTRUCTOR: STELA STEFANOVA 1 Explain the role of Data Link layer protocols in data transmission; Objectives Describe how the
More informationCisco How Virtual Private Networks Work
Table of Contents How Virtual Private Networks Work...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 Background Information...1 What Makes a VPN?...2 Analogy:
More informationPlanning a scalable long-term wireless strategy
Planning a scalable long-term wireless strategy While operators in many markets will continue to invest in maintaining and upgrading 2G networks for the foreseeable future, operators in other markets have
More informationRSC Part I: Introduction
RSC Part I: Introduction Redes y Servicios de Comunicaciones Universidad Carlos III de Madrid These slides are, mainly, part of the companion slides to the book Computer Networking: A Top Down Approach
More informationITP 140 Mobile Applications Technologies. Networks
ITP 140 Mobile Applications Technologies Networks A First Look Under the Hood 2 3 Communication Channels Mediums for transporting data from one system to another Physical Twisted Pair (CAT-3, CAT-5/6)
More informationnetworks List various types of networks and their
Chapter 15 Networks Chapter Goals Describe the core issues related to computer networks List various types of networks and their characteristics Explain various topologies of local-area networks Explain
More informationPart 1: Introduction. Goal: Review of how the Internet works Overview
Part 1: Introduction Goal: Review of how the Internet works Overview Get context Get overview, feel of the Internet Application layer protocols and addressing Network layer / Routing Link layer / Example
More informationData & Computer Communication
Basic Networking Concepts A network is a system of computers and other devices (such as printers and modems) that are connected in such a way that they can exchange data. A bridge is a device that connects
More informationIt is the process of sharing data, programs, and information between two or more computers.
1 Communications It is the process of sharing data, programs, and information between two or more computers. Numerous applications depend on communication systems: E-mail Instant messaging (IM) Internet
More informationCS 348: Computer Networks. - PHY; 30 th July Instructor: Sridhar Iyer IIT Bombay
CS 348: Computer Networks - PHY; 30 th July 2012 Instructor: Sridhar Iyer IIT Bombay Activity: Think-Pair-Share Consider two people who want to communicate by talking. Think Individually (about the following
More informationInput ports, switching fabric, output ports Switching via memory, bus, crossbar Queueing, head-of-line blocking
Last time Router internals Input ports, switching fabric, output ports Switching via memory, bus, crossbar Queueing, head-of-line blocking Mobility Home, visited s Home, foreign agents Permanent, care-of
More informationChapter 15 Networks. Chapter Goals. Networking. Chapter Goals. Networking. Networking. Computer network. Node (host) Any device on a network
Chapter Goals Chapter 15 Networks Describe the core issues related to computer networks List various types of networks and their characteristics Explain various topologies of local-area networks Explain
More informationGPRS and UMTS T
GPRS and UMTS T-110.2100 Global Packet Radio Service GPRS uses the time slots not used for circuit switched services Data rate depends on the availability of free time slots GPRS uses the multislot technique,
More informationCSIS Frequency Division Multiplexing. Basic Types of Multiplexing. Frequency Division Multiplexing. Frequency Division Multiplexing.
Multiplexing: combining information streams from multiple sources for transmission over a shared medium Demultiplexing: separating a combination back into individual information streams CSIS 4222 Ch 11:
More informationFundamental Issues. System Models and Networking Chapter 2,3. System Models. Architectural Model. Middleware. Bina Ramamurthy
System Models and Networking Chapter 2,3 Bina Ramamurthy Fundamental Issues There is no global time. All communications are by means of messages. Message communication may be affected by network delays
More informationCh. 4 - WAN, Wide Area Networks
1 X.25 - access 2 X.25 - connection 3 X.25 - packet format 4 X.25 - pros and cons 5 Frame Relay 6 Frame Relay - access 7 Frame Relay - frame format 8 Frame Relay - addressing 9 Frame Relay - access rate
More informationCSEN 503 Introduction to Communication Networks
CSEN 503 Introduction to Communication Networks 1-1 Mervat AbuElkheir Hana Medhat Ayman Dayf ** Slides are attributed to J. F. Kurose People and Resources 1-2 Course Name Introduction to Communication
More informationWHITE PAPER. Mobility Services Platform (MSP) Using MSP in Wide Area Networks (Carriers)
WHITE PAPER Mobility Services Platform (MSP) Using MSP in Wide Area Networks (Carriers) Table of Contents About This Document... 1 Chapter 1 Wireless Data Technologies... 2 Wireless Data Technology Overview...
More informationDigital terrestrial television broadcasting Interactive channel
Digital terrestrial television broadcasting Interactive channel Televisão digital terrestre Canal de Inteeravidade Parte 1: Protocolos, interfaces fíisicas e interfaces de software Televisión digital terrestre
More informationReview of Topology and Access Techniques / Switching Concepts
Review of Topology and s / Concepts BSAD 141 Dave Novak Sources: Network+ Guide to Networks, Dean 2013 Overview Three base wired topologies Bus, star, ring Two wireless topologies Ad-hoc, infrastructure
More informationb) Diverse forms of physical connection - all sorts of wired connections, wireless connections, fiber optics, etc.
Objectives CPS221 Lecture: Layered Network Architecture last revised 6/22/10 1. To discuss the OSI layered architecture model 2. To discuss the specific implementation of this model in TCP/IP Materials:
More informationThe OSI Model. Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO).
Network Models The OSI Model Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Model for understanding and developing computer-to-computer communication
More informationCPS221 Lecture: Layered Network Architecture
CPS221 Lecture: Layered Network Architecture Objectives last revised 9/8/14 1. To discuss the OSI layered architecture model 2. To discuss the specific implementation of this model in TCP/IP Materials:
More informationPart VI. Appendixes. Appendix A OSI Model and Internet Protocols Appendix B About the CD
Part VI Appendixes Appendix A OSI Model and Internet Protocols Appendix B About the CD OSI Model and Internet Protocols APPENDIX A In this appendix, you will Learn about the OSI model Review the network
More informationUNIT II NETWORKING
UNIT II INTRODUCTION TO WIRELESS NETWORKING Wireless Network The cellular telephone system is responsible for providing coverage throughout a particular area known as coverage region or market The interconnection
More informationIntroduction to Networking
Introduction to Networking The fundamental purpose of data communications is to exchange information between user's computers, terminals and applications programs. Simplified Communications System Block
More informationVirtual Private Networks (VPNs)
CHAPTER 19 Virtual Private Networks (VPNs) Virtual private network is defined as customer connectivity deployed on a shared infrastructure with the same policies as a private network. The shared infrastructure
More informationLecture 2: Internet Structure
Lecture 2: Internet Structure COMP 332, Spring 2018 Victoria Manfredi Acknowledgements: materials adapted from Computer Networking: A Top Down Approach 7 th edition: 1996-2016, J.F Kurose and K.W. Ross,
More informationPhysical Layer: Multiplexing, Spectrum Spreading and Switching. Covers Chapters# 06 & 08 from Text Book
Physical Layer: Multiplexing, Spectrum Spreading and Switching Covers Chapters# 06 & 08 from Text Book 2 Multiplexing From Chapter#06 3 Multiplexing If bandwidth of a medium linking two devices is greater
More informationConcept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space provided.
113 Chapter 9 TCP/IP Transport and Application Layer Services that are located in the transport layer enable users to segment several upper-layer applications onto the same transport layer data stream.
More informationSwitching, Mobile Phones, Cable, Beginning Data Link Layer. CS158a Chris Pollett Feb 21, 2007.
Switching, Mobile Phones, Cable, Beginning Data Link Layer CS158a Chris Pollett Feb 21, 2007. Outline Switching Mobile Phones Cable Start of Data Link Layer Switching We will now examine how the switching
More informationChapter 10: Wireless Networking. School of information science and Engineering, SDU
Chapter 10: Wireless Networking School of information science and Engineering, SDU 10.1 Introduction to Wireless Networks Requirement to the networks: Provides ubiquitous personal communications; Accommodate
More informationInternet of Things: Latest Technology Development and Applications
Internet of Things: Latest Technology Development and Applications Mr UY Tat-Kong Assistant Vice President Network Evolution Planning & Development 22 August 2014 Agenda Communication Technologies Development
More informationECE 4450:427/527 - Computer Networks Spring 2017
ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 5.1: Link Layer Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527 Computer
More informationEnabling the Wireless Internet
Enabling the Wireless Internet Presented to IEEE CVT-Dallas February 15, 2000 Barry Herbert barry.herbert herbert@nortelnetworks.com Operator Market Dynamics Price/Min in U.S. Cents 16 14 12 10 8 6 4 2
More informationChapter 1: introduction
Chapter 1: introduction our goal: v get feel and terminology v more depth, detail later in course v approach: use Internet as example overview: v what s the Internet? v what s a protocol? v edge; hosts,
More informationLecture 2: Internet Architecture
CS 3700 Networks and Distributed Systems Lecture 2: Internet Architecture Revised 1/6/14 Organizing Network Functionality 2 Organizing Network Functionality 2 Networks are built from many components! Networking
More informationChapter 6 The Internet
Chapter The Internet Computer Concepts 2014 Chapter Contents Section A: Internet Technology Section B: Fixed Internet Access Section C: Portable and Mobile Internet Access Section D: Internet Services
More informationIntroduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005
Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005 Network and Telecommunications Basics Chapter Outline The telecommunications system Network services
More informationEfficient Mail Submission and Delivery (EMSD) On Windows CE
Efficient Mail Submission and Delivery (EMSD) On Windows CE Neda Document Number: 103-101-01.02 Last Updated: Author unspecified Doc. Revision: source unspecified Neda Communications, Inc. First Published:
More informationXcel Energy Leverages 4G LTE to Enable Reliable, High Speed Connectivity to Distribution End Points
Xcel Energy Leverages 4G LTE to Enable Reliable, High Speed Connectivity to Distribution End Points Presented By: Speakers: David Markland, Senior Manager, Product Management, Sierra Wireless Dan Lysaker,
More informationLecture Outline. Lecture 2. OSI model and networking. The OSI model and networking. The OSI model and networking. The OSI model and networking
Lecture 2 The OSI model Chapter 2, specifically pages 42-58 Dave Novak School of Business Administration, University of Vermont Sources: 1) Network+ Guide to Networks, Dean 2013 2) Comer, Computer Networks
More information4G Mobile Communications
4G Mobile Communications Welcome to 4G The term 4G is used broadly to include several types of broadband wireless access communication systems, not only cellular telephone systems. One of the terms to
More informationIn-Vehicle Tracking Platform
In-Vehicle Tracking Platform Mobile Resource Management (MRM) PinPoint XT Connectivity for Fleet Management, Vehicle Telemetry, and Field Service The PinPoint XT in-vehicle tracking platform simplifies
More informationIMMS-CELL-GSM. Cellular Communications Kit. Installation Instructions
IMMS-CELL-GSM Cellular Communications Kit Installation Instructions TABLE OF CONTENTS... Before You Install... 1 Operating Systems: GSM, and GSM-E...2 Circuit Switched Data (CSD)...2 Installation Notes...
More informationECE 650 Systems Programming & Engineering. Spring 2018
ECE 650 Systems Programming & Engineering Spring 2018 Networking Introduction Tyler Bletsch Duke University Slides are adapted from Brian Rogers (Duke) Computer Networking A background of important areas
More informationAIRAVE Frequently Asked Questions
AIRAVE Frequently Asked Questions 2008 Sprint - 1-2008 Sprint. Sprint and the logo are trademarks of Sprint. Other marks are the property of their respective owners. AIRAVE FAQs General 1. What do I need
More informationAlcatel-Lucent 9500 Microwave Packet Radio (ETSI Markets)
Alcatel-Lucent 9500 Microwave Packet Radio (ETSI Markets) The Alcatel-Lucent 9500 Microwave Packet Radio (MPR) provides cost-effective IP transformation for seamless microwave transport of TDM, ATM, IP
More informationLANCOM Techpaper Smart WLAN controlling
The widespread use of wireless access points and wireless routers provides great convenience and flexibility in network access for businesses, universities and other organizations. In recent years, wireless
More information