Slides for Chapter 3: Networking and Internetworking

Size: px
Start display at page:

Download "Slides for Chapter 3: Networking and Internetworking"

Transcription

1 Slides for hapter 3: Networking and Internetworking From oulouris, ollimore and Kindberg istributed Systems: oncepts and esign dition 4, Networking Issues () Performance: Latency (time between send and start to receive) ata transfer rate (bits per second) [max] Transmission time = latency + length / transfer rate System bandwidth, throughput [actual]: total volume of traffic in a given amount of time Using different channels concurrently can make bandwidth > data transfer rate traffic load can make bandwidth < data transfer rate network speed < memory speed (about 000 times) ccess to local disk is usually faster than remote disk Fast (expensive) remote disk + fast network can beat slow (cheap) local disks Networking Issues () Types of Networks () scalability reliability corruption is rare mechanisms in higher-layers to recover errors errors are usually timing failures, the receiver doesn't have resources to handle the messages security firewall on gateways (entry point to org's intranet) encryption is usually in higher-layers mobility--communication is more challenging: locating, routing,... quality of service--real-time services multicasting--one-to-many communication Local rea Networks (LN) floor/building-wide single communication medium no routing, broadcast segments connected by switches or hubs high bandwidth, low latency thernet - 0Mbps, 00Mbps, Gbps no latency guarantees (what could be the consequences?) Personal area networks (PN) [ad-hoc networks]: blue tooth, infra-red for Ps, cell phones, Types of Networks () Metropolitan rea Networks (MN) city-wide, up to 50 km igital Subscriber Line (SL):.5-8 Mbps, 5.5km from switch ellsouth:.8 to 6 Mbps able modem:.5 Mbps, longer range than SL right house w/ Road Runner:.5 to 0Mbps Types of Networks (3) Wide rea Networks (WN) world-wide ifferent organizations Large distances routed, latency. -.5 seconds -0 Mbps (upto 600 Mbps)

2 Types of Networks (4) Wireless local area networks (WLN) I 80. (WiFi) 0-00 Mbps,.5km 80. (997): upto Mbps,.4 GHz 80.a (999): upto 54 Mbps, 5 GHz, ~75 feet outdoor 80.b (999): upto Mbps,.4 GHz, ~50 feet [most popular] 80.g (003): upto 54 Mbps,.4 GHz, ~50 feet [backward compatible with 80.b, becoming more popular] Wireless metropolitan area networks (WMN) I 80.6 (WiMax).5-0 Mbps, 5-50km Types of Networks (5) Wireless wide area networks (WWN) worldwide GSM (Global System for Mobile communications) kbps 3G ( third generation ): kbps to Mbps Types of Networks (6) Network performance Internetworks connecting different kinds of networks routers, gateways Wired: xample Range andwidth Latency (Mbps) (ms) LN thernet - km MN TM 50 km WN IP routing worldwide Internetwork Internet worldwide Wireless: WPN luetooth (80.5.) 0-30m WLN WiFi (I 80.) km WMN WiMX (80.6) 550 km WWN GSM, 3G phone nets worldwide Network principles () Packet transmission message: logical unit of informatio packet: transmission unit restricted length: sufficient buffer storage, reduce hogging Network principles () ata Streaming audio/video Need 0 Mbps (.5 Mbps compressed) play time: the time when a frame need to be displayed for example, 4 frames per second, frame 48 must be display after two seconds IP protocol provides no guaranteesipv6 (new) includes features for real-time streams, stream data are treated separately Resource Reservation Protocol (RSVP), Real-time Transport Protocol (RTP)

3 Network principles (3) Switching schemes (transmission between aribitrary nodes) roadcast: ethernet, token ring, wireless ircuit switching: wires are connected Packet switching: store-and-forward different routes store-and-forward needs to buffer the entire packet before forwarding Frame relay Small packets Looks only at the first few bits on t buffer/store the entire frame Network principles (4) Protocols Key components Sequence of messages Format of messages Network principles (5) Network principles (6) Protocol layers, why? Layer n Message sent Message received ncapsulation in layered protocols Presentation header pplication-layer message Session header Layer Layer Sender ommunication medium Recipient Network header Transport header Network principles (7) Network principles (8) ISO Open Systems Interconnection (OSI) model Layers pplication Presentation Session Transport Network ata link Physical Sender Message sent ommunication medium Message received Recipient Internet layers pplication = application + presentation Transport = transport + session Layers pplication Transport Internetwork Network interface Message Internetwork packets Network-specific packets Underlying Instructor s network Guide for oulouris, ollimore and Kindberg istributed Systems: oncepts and esign dn. 4 Internetwork protocols Underlying network protocols 3

4 Network principles (9) Packet assembly header and data maximum transfer unit (MTU): 500 for thernet 64K for IP (8K is common because of node storage) ports: destination abstraction (application/service protocol) addressing: transport address = network address + port Well-known ports (below 03) Registered ports (04-495) Private (up to 65535) Network principles (0) Packet delivery (at the network layer) atagram packet one-shot, no initial set up different routes, out of order thernet, IP Virtual circuit packet initial set up for resources virtual circuit # for addressing TM Similar but different pairs of protocols at the transport layer (connection-oriented and connectionless) Network principles () Network principles () Routing LN? Routing lgorithm decide which out-going link to forward the packet for circuit switching, the route is determined during the circuit setup time for packet switching, each packet is routed independently update state of the out-going links Routing Table a record for each destination fields: outgoing link, cost (e.g. hop count) Router example Hosts or local networks 3 Links Routers Network principles (3): Routing tables Network principles (4) Routings from Routings from Routings from To Link ost To Link ost To Link ost local 3 0 local 4 0 local Routings from Routings from To Link ost To Link ost local local 0 Router information protocol (RIP) "ellman-ford distance vector" algorithm Sender: send table summary periodically (30s) or changes to neighbors Receiver: onsider receives a table from, updates. -> -> -> X: updates-- has more up-to-date (authoritative) info. -> not -> -> X: oes routing via have a lower cost? 3. -> -> X: does not know X 4. [ -> -> -> X]: doesn t update-- has more up-to-date info 5. Faulty link, cost is infinity RIP- (RF 058) More recent algorithms more information, not just neighbors link-state algorithms, each node responsible for finding the optimum routes 4

5 Network principles (5): Pseudocode for RIP routing algorithm Network principles (6) Tl is the table local table; Tr is the received remote table Send: ach t seconds or when Tl changes, send Tl on each non-faulty outgoing link. Receive: Whenever a routing table Tr is received on link n: for all rows Rr in Tr { if (Rr.link!= n) { // destination not routed via the receiver Rr.cost = Rr.cost + ; Rr.link = n; if (Rr.destination is not in Tl) add Rr to Tl; // add new destination to Tl else for all rows Rl in Tl { if (Rr.destination = Rl.destination and (Rr.cost < Rl.cost or Rl.link = n)) Rl = Rr; // Rr.cost < Rl.cost : remote node has better route // Rl.link = n : remote node is more authoritative } } ongestion control high traffic load, packets dropped due to limited resources reducing transmission rate: "choke packets" from sender to receiver } Networking principles (7) Networking principles (8) Network connecting devices Hubs: extending a segment of LN (broadcast) Switches: switching traffic at data-link level (different segments of a LN), making temporary hardware connections between two ports (or store and forward) [switches do not exchange info with each other] Routers: routing traffic at IP level ridges: linking networks of different types, could be routers as well Tunneling communicate through an "alien" protocol Hide in the payload IPv6 traffic using IPv4 protocols IPv6 encapsulated in IPv4 packets IPv6 IPv4 network IPv6 ncapsulators Internet protocols () Internet protocols (): TP/IP layers IP (Internet Protocol) "network" layer protocol IP addresses TP (Transmission ontrol Protocol) transport layer connection-oriented UP (User atagram Protocol) transport layer connection-less Layers pplication Transport Internet Network interface Underlying network Message Messages (UP) or Streams (TP) UP or TP packets IP datagrams Network-specific frames 5

6 Internet protocols (3): layer encapsulation Internet protocols (4): Programmer s view pplication message TP header port pplication pplication IP header TP TP UP thernet header IP IP thernet frame Internet protocols (5): Internet address structure Internet protocols (6): ecimal representation 3-bit 7 4 lass : 0 Network I Host I 4 6 lass : 0 Network I Host I 8 lass : 0 Network I Host I lass (multicast): 0 Multicast address lass (reserved): 0 unused ( octet octet octet 3 Network I Host I to 7 0 to 55 0 to 55 lass : 0 to 55 Network I Host I lass : 8 to 9 0 to 55 0 to 55 0 to 55 Network I Host I 0 to 55 0 to 55 to 54 lass : 9 to 3 Multicast address lass (multicast): 4 to 39 0 to 55 0 to 55 to 54 lass (reserved): 40 to 55 0 to 55 0 to 55 to 54 Range of addresses to to to to to Internet protocols (7) Internet protocols (8) lassless interdomain routing (IR) shortage of lass networks add a mask field to indicate bits for network portion / [subnet: first bits; host: 0 bits] header IP address of source IP address of destination up to 64 kilobytes data 6

7 Internet protocols (9): Network ddress Translation Sharing one global IP address at home Routers with NT Router has a global IP address from ISP ach machine has a local IP address via HP Machine -> router Router stores the local IP addr and source port # Table entry indexed by a virtual port # Router -> outside put the router IP addr and virtual port # in the packet Outside -> router Reply to the router IP addr and virtual port # Router -> machine Use the virtual port # to find table entry Forward to the local IP address and port # What happens if we want the device to be a server, not a client? Internet protocols (0) SL or able connection to ISP xx subnet thernet switch WiFi base station/ access point Laptop Game box Media hub TV monitor Modem / firewall / router (NT enabled) printer P P luetooth adapter luetooth printer amera Internet protocols () Internet protocols () Server with NT Fixed internal addr and port # Fixed entry in the table ll packets to the port on the router are forwarded to the internal addr and port # in the entry What if more than one internal machines want to offer the same service (port)? IP Protocol unreliable or best-effort lost, duplicated, delayed, out of order header checksum, no data checksum IP packet longer than MTU of the underlying network, break into fragments before sending and reassemble after receiving ddress resolution (on LNs) mapping IP address to lower level address RP: address resolution protocol ethernet: cache; not in cache, broadcast IP addr, receive thernet addr IP spoofing: address can be stolen (not authenticated) Internet protocols (3) Internet Protocols (4): IPv6 RIP-: discussed previously RIP-: IR, better multicast routing, authentication of RIP packets link-state algorithms: e.g., open shortest path first (OSPF) Observed: average latency of IP packets peaks at 30- seconds intervals [RIP updates are processed before IP] because 30-second RIP update intervals, locked steps random interval between 5-45 seconds for RIP update large table size all destinations!! map ip to geographical location default route: store a subset, default to a single link for unlisted destinations IP addresses:8 bits (6 bytes) 3 x 0 38 addresses (7 x 0 3 addresses per square meter!) routing speed no data checksum as before no fragmentation need to know the smallest MTU in data-link layer real-time and special services traffic class: priority, time-dependent (expired data are useless) flow label: timing requirements for streams (reserving resources in advance) next header field extension header types for IPv6 routing information, authentication, encryption... nycast: at least one nodes gets it security currently handled above the IP layer extension header types Migration from IPv4 backward compatibility: IPv6 addresses include IPv4 addresses Islands of IPv6 networks, traffic tunnels though other IPv4 networks 7

8 Internet protocols (5): Internet Protocols (0): Mobile IP Version (4 bits) Traffic class (8 bits) Payload length (6 bits) Source address (8 bits) Flow label (0 bits) Next header (8 bits) Hop limit (8 bits) estination address (8 bits) ynamic Host onfiguration Protocol (HP) assign temporary IP address provide addresses of local resources like NS Routing to maintain continuous access IP routing is subnet-based, fixed relative locations Home agent (H) and Foreign agent (F) H - current location (IP addr) of the mobile host is informed by the mobile host when it moves proxy for the host after it moves inform local routers to remove cached records of the host responds to RP requests F - informed by the host when it arrives new temp IP addr contacts H what the new IP address is H - receives the new IP address and may tell the sender the new IP addr Internet protocols (): MobileIP routing mechanism Internet protocols () ddress of F returned to sender First IP packet addressed to MH Sender Home agent Subsequent IP packets tunnelled to F Internet First IP packet tunnelled to F Mobile host MH Foreign agent F Transport protocols: TP and UP network protocol: host to host transport protocol: process to process Port # s to indicate processes UP no guarantee of delivery checksum is optional max of 64 bytes, same as IP no setup costs, no segments Internet protocols (3) Internet protocols (4) TP arbitrarily long sequence connection-oriented sequencing of segments flow control: acknowledgement includes "window size" (amount of data) for sender to send before next ack interactive service: higher frequency of buffer flush, send when deadline reached or buffer reaches MTU retransmission of lost packets buffering of incoming packets to preserve order and flow checksum on header and data omain names NS distributed data each NS server keeps track of part of the hierarchy unresolved requests are sent to servers higher in the hierarchy 8

9 Internet protocols (5) Internet protocols (6) Firewalls monitor and filter communication controlling what services are available to the outside controlling the use of services controlling internal users access to the outside Filtering at different protocol levels IP packet filtering: addresses, ports.. TP gateway: check for correctness in TP connections e.g., are they partially opened and never used (why?) pplication-level gateway: proxy for applications no direct communication between the inside and outside e.g., smtp proxy can check addresses, content... astion (tcp/ application filter) ): two router filters ccess to web/ftp server, but not LN Hide internal IP addresses astion has the mapping Second router is the second IP filter (invisible to the outside) a) Filtering router Internet b) Filtering router and bastion Internet Internet Router/ filter web/ftp server R/filter web/ftp server astion c) Screened subnet for bastion R/filter astion web/ftp server Protected intranet R/filter Internet protocols (7) Network ase Studies (): thernet and WiFi Virtual Private Network (VPN) extending a secured internal network to an external unsecured host e.g. IPSec tunneling through IP I No. Name Title Reference 80.3 thernet SM/ Networks (thernet) [I 985a] 80.4 Token us Networks [I 985b] 80.5 Token Ring Networks [I 985c] 80.6 Metropolitan rea Networks [I 994] 80. WiFi Wireless Local rea Networks [I 999] luetooth Wireless Personal rea Networks [I 00] Zigee Wireless Sensor Networks [I 003] 80.6 WiMX Wireless Metropolitan rea Networks[I 004a] Network ase Studies (): thernet Network ase Studies (3) thernet, SM/, I 80.3 Xerox Palo lto Research enter (PR), 973, 3Mbps 0,00,000 Mbps extending a segment: hubs and repeaters connecting segments: switches and bridges ontention bus Packet/frame format preamble (7 bytes): hardware timing start frame delimiter () dest addr (6) src addr (6) length () data (46-500): min total becomes 64 bytes, max total is 58 checksum (4): dropped if incorrect arrier Sensing Multiple ccess / ollision etection (SM/) S: listen before transmitting, transmit only when no traffic M: more than one can transmit : collision detected when signals transmitted are not the same as those received (listen to its own transmission) fter detection of a collision send jamming signal wait for a random period before retransmitting T (Tau): time to reach the farthest station When is the collision detected? and send at the same time sends, sends within T seconds sends, sends between T and T seconds sends, sends after T seconds Minimum length of packet for collision detection: packet length > T, between T and T, and < T? 9

10 Network ase Studies (4) Network ase Studies (5): Ranges and speeds Physical implementation: <R><><L> R: data rate in Mbps : medium signaling type: baseband [one channel] or broadband [multiple channels] L: max segment length in 00meters or T (twisted pair cable, hierarchy of hubs) 0ase5 0aseT 00aseT 000aseT ata rate 0 Mbps 0 Mbps 00 Mbps 000 Mbps Max. segment lengths: Twisted wire (UTP) 00 m 00 m 00 m 5 m oaxial cable (STP) 500 m 500 m 500 m 5 m Multi-mode fibre 000 m 000 m 500 m 500 m Mono-mode fibre 5000 m 5000 m 0000 m 000 m Network ase Studies (6): WiFi I 80. wireless LN up to 50m and 54Mbps access point (base station) to land wires d hoc network--no specific access points, "on the fly" network among machines in the neighborhood Radio Frequency (.4, 5GHz band) or infra-red Network ase Studies (7): Problems with wireless SM/ Hidden station: not able to detect another station is transmitting can t see, or vice versa Fading: signals weaken, out of range and are out of range from each other ollision masking: stronger signals could hide others and are out of range from each other, both transmits, collide, can't detect collision, ccess point gets garbage Laptops radio obstruction Server Palmtop Wireless LN ase station/ access point LN Network ase Studies (8) Network ase Studies (9) arrier sensing multiple access with collision avoidance (SM/) reserving slots to transmit if no carrier signal medium is available, out-of-range station requesting a slot, or out-of-range station using a slot Steps. Request to send (RTS) from sender to receiver, specify duration. lear to send (TS) in reply 3. in-range stations see the RTS and/or TS and its duration 4. in-range stations stop transmitting 5. acknowledgement from the receiver Hidden station & Fading: TS, need permission to transmit RTS and TS are short, don't usually collide; random back off if collision detected Should have no collisions, send only when a slot is reserved 0

Recap. Requirements of Networks. Overview of the lecture LAN. Types of Networks. Lecture 03: Networking

Recap. Requirements of Networks. Overview of the lecture LAN. Types of Networks. Lecture 03: Networking Lecture : Networking istributed Systems ehzad ordbar School of omputer Science, University of irmingham, UK Recap rchitecture, what? and why? Tiered rchitecture Various software layer: middleware client/server

More information

Slides for Chapter 3: Networking and Internetworking

Slides for Chapter 3: Networking and Internetworking Slides for Chapter 3: Networking and Internetworking From Coulouris, Dollimore, Kindberg and Blair Distributed Systems: Concepts and Design Edition 5, Addison-Wesley 202 Figure 3. Network performance km

More information

Lecture 7: Internetworking See Chapter 3 of Colouris

Lecture 7: Internetworking See Chapter 3 of Colouris 95-702 Distributed Systems Lecture 7: Internetworking See Chapter 3 of Colouris Learning Goals Preamble: MISM and MSIT grads may need to plan, develop, and manage distributed systems. These distributed

More information

Lecture 04: Networking & Internetworking

Lecture 04: Networking & Internetworking CSIE52400 Distributed Systems Lecture 04: Networking & Internetworking 吳秀陽 Shiow-yang Wu Department of Computer Science and Information Engineering National Dong Hwa University Communication Subsystem

More information

Adaptors Communicating. Link Layer: Introduction. Parity Checking. Error Detection. Multiple Access Links and Protocols

Adaptors Communicating. Link Layer: Introduction. Parity Checking. Error Detection. Multiple Access Links and Protocols Link Layer: Introduction daptors ommunicating hosts and routers are nodes links connect nodes wired links wireless links layer-2 packet is a frame, encapsulates datagram datagram controller sending host

More information

Links. Error Detection. Link Layer. Multiple access protocols. Nodes Links Frame. Shared channel Problem: collisions How nodes share a channel

Links. Error Detection. Link Layer. Multiple access protocols. Nodes Links Frame. Shared channel Problem: collisions How nodes share a channel Link Layer Error Detection Nodes Links Frame R yclic Redundancy hecksum Parity its More about this in exercise! Data Link Layer -1 Data Link Layer -2 Links Two types of links : point-to-point broadcast

More information

Adaptors Communicating. Link Layer: Introduction. Parity Checking. Error Detection. Multiple Access Links and Protocols

Adaptors Communicating. Link Layer: Introduction. Parity Checking. Error Detection. Multiple Access Links and Protocols Link Layer: Introduction daptors ommunicating Terminology: hosts and routers are nodes communication channels that connect adjacent nodes along communication path are links wired links wireless links LNs

More information

Computer Science 425 Distributed Systems CS 425 / ECE 428. Fall 2013

Computer Science 425 Distributed Systems CS 425 / ECE 428. Fall 2013 Computer Science 425 Distributed Systems CS 425 / ECE 428 Fall 2013 Indranil Gupta (Indy) October 10, 2013 Lecture 14 Networking Reading: Chapter 3 (relevant parts) 2013, I. Gupta, K. Nahrtstedt, S. Mitra,

More information

ET4254 Communications and Networking 1

ET4254 Communications and Networking 1 Topic 9 Internet Protocols Aims:- basic protocol functions internetworking principles connectionless internetworking IP IPv6 IPSec 1 Protocol Functions have a small set of functions that form basis of

More information

Networking interview questions

Networking interview questions Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected

More information

Operating Systems CS 571

Operating Systems CS 571 Computer Networks: Overview Operating Systems CS 571 Network types Range Bandwidth (Mbps) Latency (ms) LAN 1-2 kms 10-1000 1-10 WAN worldwide 0.010-600 100-500 MAN 2-50 kms 1-150 10 Wireless LAN 0.15-1.5

More information

Data and Computer Communications. Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications

Data and Computer Communications. Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications Data and Computer Communications Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based s 1 Need For Protocol Architecture data exchange can involve complex procedures better if task broken into subtasks

More information

Defining Networks with the OSI Model. Module 2

Defining Networks with the OSI Model. Module 2 Defining Networks with the OSI Model Module 2 Objectives Skills Concepts Objective Domain Description Objective Domain Number Understanding OSI Basics Defining the Communications Subnetwork Defining the

More information

CS 416: Operating Systems Design April 11, 2011

CS 416: Operating Systems Design April 11, 2011 Modes of connection Operating Systems Design 3. Client-Server Networking Paul Krzyzanowski pxk@cs.rutgers.edu Circuit-switched dedicated path guaranteed (fixed) bandwidth [almost] constant latency Packet-switched

More information

Networks. Other Matters: draft Assignment 2 up (Labs 7 & 8 v. important!!) Ref: [Coulouris&al Ch 3, 4] network performance and principles

Networks. Other Matters: draft Assignment 2 up (Labs 7 & 8 v. important!!) Ref: [Coulouris&al Ch 3, 4] network performance and principles Networks Other Matters: draft Assignment 2 up (Labs 7 & 8 v. important!!) Ref: [Coulouris&al Ch 3, 4] network performance and principles OSI protocol; routing TCP/IP layers and packet organization IP addresses

More information

Name Student ID Department/Year. Final Examination. Introduction to Computer Networks Class#: Fall :50-11:30 Tuesday January 10, 2006

Name Student ID Department/Year. Final Examination. Introduction to Computer Networks Class#: Fall :50-11:30 Tuesday January 10, 2006 Name Student I epartment/year inal xamination Introduction to omputer Networks lass#: 901 31110 all 2005 9:50-11:30 Tuesday January 10, 2006 Prohibited 1. You are not allowed to write down the answers

More information

Data & Computer Communication

Data & Computer Communication Basic Networking Concepts A network is a system of computers and other devices (such as printers and modems) that are connected in such a way that they can exchange data. A bridge is a device that connects

More information

Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5

Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5 Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5 Acknowledgments: Lecture slides are from Computer networks course thought by Jennifer Rexford at Princeton University. When slides are obtained

More information

Announcements. CS 5565 Network Architecture and Protocols. Ethernet. Ethernet. Ethernet Model. Ideal Multiple Access Protocol

Announcements. CS 5565 Network Architecture and Protocols. Ethernet. Ethernet. Ethernet Model. Ideal Multiple Access Protocol nnouncements CS 5565 Network rchitecture and Protocols Lecture 4 odmar ack Project due in parts: pr 5 and May xtra Credit Opportunities: xpand simulator (and your implementation) to introduce multiple

More information

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet Chapter 2 - Part 1 The TCP/IP Protocol: The Language of the Internet Protocols A protocol is a language or set of rules that two or more computers use to communicate 2 Protocol Analogy: Phone Call Parties

More information

Principles behind data link layer services

Principles behind data link layer services Data link layer Goals: Principles behind data link layer services Error detection, correction Sharing a broadcast channel: Multiple access Link layer addressing Reliable data transfer, flow control: Done!

More information

Chapter 5: The Data Link Layer. Chapter 5 Link Layer and LANs. Ethernet. Link Layer. Star topology. Ethernet Frame Structure.

Chapter 5: The Data Link Layer. Chapter 5 Link Layer and LANs. Ethernet. Link Layer. Star topology. Ethernet Frame Structure. hapter 5 Link Layer and LNs omputer Networking: Top Down pproach 5 th edition. Jim Kurose, Keith Ross ddison-wesley, pril 2009. hapter 5: The Data Link Layer Our goals: understand principles behind data

More information

CSE/EE 461 Lecture 7 Bridging LANs. Last Two Times. This Time -- Switching (a.k.a. Bridging)

CSE/EE 461 Lecture 7 Bridging LANs. Last Two Times. This Time -- Switching (a.k.a. Bridging) S/ 461 Lecture 7 ridging LNs Last Two Times Medium ccess ontrol (M) protocols Part of the Link Layer t the heart of Local rea Networks (LNs) ow do multiple parties share a wire or the air? Random access

More information

Link Layer and Ethernet

Link Layer and Ethernet Link Layer and Ethernet 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross traceroute Data Link Layer Multiple

More information

precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet protocol (bottom level)

precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet protocol (bottom level) Protocols precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet protocol (bottom level) all packets shipped from network to network as IP packets

More information

ECE 4450:427/527 - Computer Networks Spring 2017

ECE 4450:427/527 - Computer Networks Spring 2017 ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 6.2: IP Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527 Computer Networks

More information

Chapter 12 Network Protocols

Chapter 12 Network Protocols Chapter 12 Network Protocols 1 Outline Protocol: Set of defined rules to allow communication between entities Open Systems Interconnection (OSI) Transmission Control Protocol/Internetworking Protocol (TCP/IP)

More information

Principles behind data link layer services:

Principles behind data link layer services: Data link layer Goals: Principles behind data link layer services: Error detection, correction Sharing a broadcast channel: Multiple access Link layer addressing Reliable data transfer, flow control Example

More information

Principles behind data link layer services:

Principles behind data link layer services: Data link layer Goals: Principles behind data link layer services: Error detection, correction Sharing a broadcast channel: Multiple access Link layer addressing Reliable data transfer, flow control Example

More information

Fundamental Issues. System Models and Networking Chapter 2,3. System Models. Architectural Model. Middleware. Bina Ramamurthy

Fundamental Issues. System Models and Networking Chapter 2,3. System Models. Architectural Model. Middleware. Bina Ramamurthy System Models and Networking Chapter 2,3 Bina Ramamurthy Fundamental Issues There is no global time. All communications are by means of messages. Message communication may be affected by network delays

More information

Lecture 11: Networks & Networking

Lecture 11: Networks & Networking Lecture 11: Networks & Networking Contents Distributed systems Network types Network standards ISO and TCP/IP network models Internet architecture IP addressing IP datagrams AE4B33OSS Lecture 11 / Page

More information

Quiz. Segment structure and fields Flow control (rwnd) Timeout interval. Phases transition ssthresh setting Cwnd setting

Quiz. Segment structure and fields Flow control (rwnd) Timeout interval. Phases transition ssthresh setting Cwnd setting Quiz v 10/30/2013 (Wednesday), 20 mins v Midterm question (available on website) v TCP basics Segment structure and fields Flow control (rwnd) Timeout interval v TCP Congestion control Phases transition

More information

Chapter 4: network layer. Network service model. Two key network-layer functions. Network layer. Input port functions. Router architecture overview

Chapter 4: network layer. Network service model. Two key network-layer functions. Network layer. Input port functions. Router architecture overview Chapter 4: chapter goals: understand principles behind services service models forwarding versus routing how a router works generalized forwarding instantiation, implementation in the Internet 4- Network

More information

Outline: Connecting Many Computers

Outline: Connecting Many Computers Outline: Connecting Many Computers Last lecture: sending data between two computers This lecture: link-level network protocols (from last lecture) sending data among many computers 1 Review: A simple point-to-point

More information

ITP 140 Mobile Applications Technologies. Networks

ITP 140 Mobile Applications Technologies. Networks ITP 140 Mobile Applications Technologies Networks A First Look Under the Hood 2 3 Communication Channels Mediums for transporting data from one system to another Physical Twisted Pair (CAT-3, CAT-5/6)

More information

Review. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD

Review. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD Review Error Detection: CRC Multiple access protocols Slotted ALOHA CSMA/CD LAN addresses and ARP Ethernet Some slides are in courtesy of J. Kurose and K. Ross Overview Ethernet Hubs, bridges, and switches

More information

EEC-484/584 Computer Networks

EEC-484/584 Computer Networks EEC-484/584 Computer Networks Lecture 13 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review of lecture 12 Routing Congestion

More information

Computer Networks Principles LAN - Ethernet

Computer Networks Principles LAN - Ethernet Computer s Principles LN - thernet Prof. ndrzej Duda duda@imag.fr Interconnection structure - layer subnetwork interconnection layer interconnection layer subnet subnet router switch (bridge) VLN http://duda.imag.fr

More information

Link Layer and Ethernet

Link Layer and Ethernet Link Layer and Ethernet 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross traceroute Data Link Layer Multiple

More information

CIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 8

CIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 8 CIS 551 / TCOM 401 Computer and Network Security Spring 2007 Lecture 8 Announcements Reminder: Project 1 is due on tonight by midnight. Midterm 1 will be held next Thursday, Feb. 8th. Example midterms

More information

THE OSI MODEL. Application Presentation Session Transport Network Data-Link Physical. OSI Model. Chapter 1 Review.

THE OSI MODEL. Application Presentation Session Transport Network Data-Link Physical. OSI Model. Chapter 1 Review. THE OSI MODEL Application Presentation Session Transport Network Data-Link Physical OSI Model Chapter 1 Review By: Allan Johnson Table of Contents Go There! Go There! Go There! Go There! Go There! Go There!

More information

Chapter 09 Network Protocols

Chapter 09 Network Protocols Chapter 09 Network Protocols Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Outline Protocol: Set of defined rules to allow communication between entities Open Systems

More information

The Link Layer and LANs: Ethernet and Swiches

The Link Layer and LANs: Ethernet and Swiches The Link Layer and LNs: Ethernet and Swiches EECS3214 2018-03-21 Link layer, LNs: outline 6.1 introduction, services 6.2 error detection, correction 6.3 multiple access protocols 6.4 LNs addressing, RP

More information

Chapter 7. Local Area Network Communications Protocols

Chapter 7. Local Area Network Communications Protocols Chapter 7 Local Area Network Communications Protocols The Network Layer The third layer of the OSI Model is the network layer. The network layer is concerned with providing a means for hosts to communicate

More information

EEC-684/584 Computer Networks

EEC-684/584 Computer Networks EEC-684/584 Computer Networks Lecture 14 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review of last lecture Internetworking

More information

Networking and Internetworking 1

Networking and Internetworking 1 Networking and Internetworking 1 To do q q Networks and distributed systems Internet architecture xkcd Internet history Early days ~1960 ARPA sponsored research on computer networking to enable remote

More information

CS 356: Computer Network Architectures. Lecture 14: Switching hardware, IP auxiliary functions, and midterm review. [PD] chapter 3.4.1, 3.2.

CS 356: Computer Network Architectures. Lecture 14: Switching hardware, IP auxiliary functions, and midterm review. [PD] chapter 3.4.1, 3.2. CS 356: Computer Network Architectures Lecture 14: Switching hardware, IP auxiliary functions, and midterm review [PD] chapter 3.4.1, 3.2.7 Xiaowei Yang xwy@cs.duke.edu Switching hardware Software switch

More information

Chapter 4: network layer

Chapter 4: network layer Chapter 4: network layer chapter goals: understand principles behind network layer services: network layer service models forwarding versus routing how a router works routing (path selection) broadcast,

More information

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols Guide to Networking Essentials, 6 th Edition Chapter 5: Network Protocols Objectives Describe the purpose of a network protocol, the layers in the TCP/IP architecture, and the protocols in each TCP/IP

More information

Size of Storage Number of Bits Decimal Range Range, From 0 to 2 n 1. Short Description Hard Disk USB Flash Drive Optical Disc

Size of Storage Number of Bits Decimal Range Range, From 0 to 2 n 1. Short Description Hard Disk USB Flash Drive Optical Disc 12 Appendix Memory Tables Answer Key hapter 1 TABLE 1-1 Kilobyte, Megabyte, Gigabyte, Terabyte Term Size (Bytes) Size (2 n Bytes) Rounded Size (Bytes) Kilobyte 1024 2 10 1000 Megabyte 1,048,576 2 20 1,000,000

More information

Introduction to Internetworking

Introduction to Internetworking Introduction to Internetworking Introductory terms Communications Network Facility that provides data transfer services An internet Collection of communications networks interconnected by bridges and/or

More information

Router Architecture Overview

Router Architecture Overview Chapter 4: r Introduction (forwarding and routing) r Review of queueing theory r Router design and operation r IP: Internet Protocol m IPv4 (datagram format, addressing, ICMP, NAT) m Ipv6 r Generalized

More information

Computer Networks (Introduction to TCP/IP Protocols)

Computer Networks (Introduction to TCP/IP Protocols) Network Security(CP33925) Computer Networks (Introduction to TCP/IP Protocols) 부산대학교공과대학정보컴퓨터공학부 Network Type Elements of Protocol OSI Reference Model OSI Layers What we ll learn today 2 Definition of

More information

Summary of MAC protocols

Summary of MAC protocols Summary of MAC protocols What do you do with a shared media? Channel Partitioning, by time, frequency or code Time Division, Code Division, Frequency Division Random partitioning (dynamic) ALOHA, S-ALOHA,

More information

Chapter 4: Network Layer

Chapter 4: Network Layer Chapter 4: Introduction (forwarding and routing) Review of queueing theory Routing algorithms Link state, Distance Vector Router design and operation IP: Internet Protocol IPv4 (datagram format, addressing,

More information

Internetwork Protocols

Internetwork Protocols Internetwork Protocols Background to IP IP, and related protocols Internetworking Terms (1) Communications Network Facility that provides data transfer service An internet Collection of communications

More information

King Fahd University of Petroleum and Minerals College of Computer Sciences and Engineering Department of Computer Engineering

King Fahd University of Petroleum and Minerals College of Computer Sciences and Engineering Department of Computer Engineering Student Name: Section #: King Fahd University of Petroleum and Minerals College of Computer Sciences and Engineering Department of Computer Engineering COE 344 Computer Networks (T072) Final Exam Date

More information

EITF25 Internet Techniques and Applications L7: Internet. Stefan Höst

EITF25 Internet Techniques and Applications L7: Internet. Stefan Höst EITF25 Internet Techniques and Applications L7: Internet Stefan Höst What is Internet? Internet consists of a number of networks that exchange data according to traffic agreements. All networks in Internet

More information

Introduction. IP Datagrams. Internet Service Paradigm. Routers and Routing Tables. Datagram Forwarding. Example Internet and Conceptual Routing Table

Introduction. IP Datagrams. Internet Service Paradigm. Routers and Routing Tables. Datagram Forwarding. Example Internet and Conceptual Routing Table Introduction Datagram Forwarding Gail Hopkins Service paradigm IP datagrams Routing Encapsulation Fragmentation Reassembly Internet Service Paradigm IP Datagrams supports both connectionless and connection-oriented

More information

On Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August 1964

On Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August 1964 The requirements for a future all-digital-data distributed network which provides common user service for a wide range of users having different requirements is considered. The use of a standard format

More information

1-1. Switching Networks (Fall 2010) EE 586 Communication and. October 25, Lecture 24

1-1. Switching Networks (Fall 2010) EE 586 Communication and. October 25, Lecture 24 EE 586 Communication and Switching Networks (Fall 2010) Lecture 24 October 25, 2010 1-1 Announcements Midterm 1: Mean = 92.2 Stdev = 8 Still grading your programs (sorry about the delay) Network Layer

More information

Growth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs.

Growth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs. Internetworking Multiple networks are a fact of life: Growth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs. Fault isolation,

More information

This Lecture. BUS Computer Facilities Network Management. Information Sharing. Local Area Network

This Lecture. BUS Computer Facilities Network Management. Information Sharing. Local Area Network This Lecture US3150 - omputer Facilities Network Management Local rea Network (LN). LN applications. LN topologies: us, Tree, Ring, Faculty of Information Technology Monash University Star. LN protocol

More information

ITP 140 Mobile Applications Technologies. Networks

ITP 140 Mobile Applications Technologies. Networks ITP 140 Mobile Applications Technologies Networks A First Look Under the Hood 2 3 Communication Channels Mediums for transporting data from one system to another Physical Twisted Pair (CAT-3, CAT-5/6)

More information

ARP, IP. Chong-Kwon Kim. Each station (or network interface) should be uniquely identified Use 6 byte long address

ARP, IP. Chong-Kwon Kim. Each station (or network interface) should be uniquely identified Use 6 byte long address ARP, IP Chong-Kwon Kim Routing Within a LAN MAC Address Each station (or network interface) should be uniquely identified Use 6 byte long address Broadcast & Filter Broadcast medium Signals are transmitted

More information

CHAPTER 17 - NETWORK AMD DISTRIBUTED SYSTEMS

CHAPTER 17 - NETWORK AMD DISTRIBUTED SYSTEMS CHAPTER 17 - NETWORK AMD DISTRIBUTED SYSTEMS OBJECTIVES Provide a high-level overview of distributed systems and the networks that interconnect them Discuss the general structure of distributed operating

More information

Data Link Layer. Our goals: understand principles behind data link layer services: instantiation and implementation of various link layer technologies

Data Link Layer. Our goals: understand principles behind data link layer services: instantiation and implementation of various link layer technologies Data Link Layer Our goals: understand principles behind data link layer services: link layer addressing instantiation and implementation of various link layer technologies 1 Outline Introduction and services

More information

Lecture 8. Network Layer (cont d) Network Layer 1-1

Lecture 8. Network Layer (cont d) Network Layer 1-1 Lecture 8 Network Layer (cont d) Network Layer 1-1 Agenda The Network Layer (cont d) What is inside a router Internet Protocol (IP) IPv4 fragmentation and addressing IP Address Classes and Subnets Network

More information

The Basics of Wireless Communication Octav Chipara

The Basics of Wireless Communication Octav Chipara The asics of Wireless ommunication Octav hipara genda hannel model: the protocol model High-level media access TM, SM hidden/exposed terminal problems WLN Fundamentals of routing proactive on-demand 2

More information

===================================================================== Exercises =====================================================================

===================================================================== Exercises ===================================================================== ===================================================================== Exercises ===================================================================== 1 Chapter 1 1) Design and describe an application-level

More information

Chapter 5 Network Layer

Chapter 5 Network Layer Chapter 5 Network Layer Network Layer IPv4 2 IP Header Application Header + data 3 IP IP IP IP 4 Focus on Transport Layer IP IP 5 Network Layer The Network layer (Layer 3) provides services to exchange

More information

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 12

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 12 CMPE 150/L : Introduction to Computer Networks Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 12 1 Chapter 4: outline 4.1 introduction 4.2 virtual circuit and datagram networks 4.3 what

More information

EE 122: Ethernet and

EE 122: Ethernet and EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose) High Level View Goal: share a communication medium among multiple hosts

More information

cs144 Midterm Review Fall 2010

cs144 Midterm Review Fall 2010 cs144 Midterm Review Fall 2010 Administrivia Lab 3 in flight. Due: Thursday, Oct 28 Midterm is this Thursday, Oct 21 (during class) Remember Grading Policy: - Exam grade = max (final, (final + midterm)/2)

More information

Networking and Internetworking 1

Networking and Internetworking 1 Networking and Internetworking 1 Today l Networks and distributed systems l Internet architecture xkcd Networking issues for distributed systems Early networks were designed to meet relatively simple requirements

More information

Unit 5: Internet Protocols skong@itt-tech.edutech.edu Internet Protocols She occupied herself with studying a map on the opposite wall because she knew she would have to change trains at some point. Tottenham

More information

CS 43: Computer Networks Switches and LANs. Kevin Webb Swarthmore College December 5, 2017

CS 43: Computer Networks Switches and LANs. Kevin Webb Swarthmore College December 5, 2017 CS 43: Computer Networks Switches and LANs Kevin Webb Swarthmore College December 5, 2017 Ethernet Metcalfe s Ethernet sketch Dominant wired LAN technology: cheap $20 for NIC first widely used LAN technology

More information

ICS 351: Networking Protocols

ICS 351: Networking Protocols ICS 351: Networking Protocols IP packet forwarding application layer: DNS, HTTP transport layer: TCP and UDP network layer: IP, ICMP, ARP data-link layer: Ethernet, WiFi 1 Networking concepts each protocol

More information

Distributed Systems. 7. Network Layer. Werner Nutt

Distributed Systems. 7. Network Layer. Werner Nutt Distributed Systems 7. Network Layer Werner Nutt Network Layer Transports segments from sending to receiving host On sending side encapsulates segments into datagrams On receiving side, delivers segments

More information

ECS 15; Lectures 17 and 18. The Internet. What is the internet, and how does it work? TA feedback

ECS 15; Lectures 17 and 18. The Internet. What is the internet, and how does it work? TA feedback ECS 15; Lectures 17 and 18 The Internet What is the internet, and how does it work? TA feedback Python -- Run your code!! Term paper: Start a paragraph with the point of the paragraph, not in modern times

More information

Lecture 3. The Network Layer (cont d) Network Layer 1-1

Lecture 3. The Network Layer (cont d) Network Layer 1-1 Lecture 3 The Network Layer (cont d) Network Layer 1-1 Agenda The Network Layer (cont d) What is inside a router? Internet Protocol (IP) IPv4 fragmentation and addressing IP Address Classes and Subnets

More information

Medium Access Protocols

Medium Access Protocols Medium Access Protocols Summary of MAC protocols What do you do with a shared media? Channel Partitioning, by time, frequency or code Time Division,Code Division, Frequency Division Random partitioning

More information

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061/1110. Lecture 8. Medium Access Control Methods & LAN

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061/1110. Lecture 8. Medium Access Control Methods & LAN RMIT University Data Communication and Net-Centric Computing COSC 1111/2061/1110 Medium Access Control Methods & LAN Technology Slide 1 Lecture Overview During this lecture, we will Look at several Multiple

More information

Bridges. Bridge Functions. Example of No-frills Bridge. No-frills Bridges. Example of Learning Bridge. Learning Bridges

Bridges. Bridge Functions. Example of No-frills Bridge. No-frills Bridges. Example of Learning Bridge. Learning Bridges ridge Functions To extend size of LNs either geographically or in terms number of users. Protocols that include collisions can be performed in a collision domain of limited size. In ring networks the number

More information

EC441 Fall 2018 Introduction to Computer Networking Chapter4: Network Layer Data Plane

EC441 Fall 2018 Introduction to Computer Networking Chapter4: Network Layer Data Plane EC441 Fall 2018 Introduction to Computer Networking Chapter4: Network Layer Data Plane This presentation is adapted from slides produced by Jim Kurose and Keith Ross for their book, Computer Networking:

More information

Now Arriving at Layer 3. Packet Forwarding. Router Design. Network Layers and Routers. Switching and Forwarding. Forwarding

Now Arriving at Layer 3. Packet Forwarding. Router Design. Network Layers and Routers. Switching and Forwarding. Forwarding Now rriving at Layer Packet orwarding although layer switches and layer routers are similar in many ways and TM/Virtual are used at layer these days 9/7/6 S/ 48 - UIU, all 6 9/7/6 S/ 48 - UIU, all 6 Layers

More information

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols High Level View EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 Goal: share a communication medium among multiple hosts connected to it Problem: arbitrate between connected hosts Solution goals:

More information

Introduction to Networks and the Internet

Introduction to Networks and the Internet Introduction to Networks and the Internet CMPE 80N Winter 2004 Lecture 18 Announcements Fourth quiz on Monday, March 1 st. Third HTML discussion session today by Kiran (before class). Summary posted on

More information

OSI Network Layer. Network Fundamentals Chapter 5. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1

OSI Network Layer. Network Fundamentals Chapter 5. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1 OSI Network Layer Network Fundamentals Chapter 5 Version 4.0 1 Objectives Identify the role of the Network Layer, as it describes communication from one end device to another end device. Examine the most

More information

RAJIV GANDHI COLLEGE OF ENGINEERING AND TECHNOLOGY

RAJIV GANDHI COLLEGE OF ENGINEERING AND TECHNOLOGY RAJIV GANDHI COLLEGE OF ENGINEERING AND TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING QUESTION BANK SUBJECT NAME: COMPUTER NETWORKS SUBJECT CODE: CST52 UNIT-I 2 MARKS 1. What is Network? 2.

More information

Introduction to Open System Interconnection Reference Model

Introduction to Open System Interconnection Reference Model Chapter 5 Introduction to OSI Reference Model 1 Chapter 5 Introduction to Open System Interconnection Reference Model Introduction The Open Systems Interconnection (OSI) model is a reference tool for understanding

More information

SEMESTER 1 Chapter 5 OSI Network Layer V What services does the network layer provide?

SEMESTER 1 Chapter 5 OSI Network Layer V What services does the network layer provide? SEMESTER 1 Chapter 5 OSI Network Layer V 4.0 5.1.1.1 What services does the network layer provide? What are the 4 basic processes used at the network layer? What is the PDU of the network layer? What information

More information

Data Communication & Networks G Session 7 - Main Theme Networks: Part I Circuit Switching, Packet Switching, The Network Layer

Data Communication & Networks G Session 7 - Main Theme Networks: Part I Circuit Switching, Packet Switching, The Network Layer Data Communication & Networks G22.2262-001 Session 7 - Main Theme Networks: Part I Circuit Switching, Packet Switching, The Network Layer Dr. Jean-Claude Franchitti New York University Computer Science

More information

The Internet. 9.1 Introduction. The Internet is a global network that supports a variety of interpersonal and interactive multimedia applications.

The Internet. 9.1 Introduction. The Internet is a global network that supports a variety of interpersonal and interactive multimedia applications. The Internet 9.1 Introduction The Internet is a global network that supports a variety of interpersonal and interactive multimedia applications. Associated with each access network - ISP network, intranet,

More information

Question 7: What are Asynchronous links?

Question 7: What are Asynchronous links? Question 1:.What is three types of LAN traffic? Unicasts - intended for one host. Broadcasts - intended for everyone. Multicasts - intended for an only a subset or group within an entire network. Question2:

More information

Chapter 6: Network Communications and Protocols

Chapter 6: Network Communications and Protocols Learning Objectives Chapter 6: Network Communications and Protocols Understand the function and structure of packets in a network, and analyze and understand those packets Understand the function of protocols

More information

Local Area Network Overview

Local Area Network Overview Local Area Network Overview Chapter 15 CS420/520 Axel Krings Page 1 LAN Applications (1) Personal computer LANs Low cost Limited data rate Back end networks Interconnecting large systems (mainframes and

More information

Networks Fall This exam consists of 10 problems on the following 13 pages.

Networks Fall This exam consists of 10 problems on the following 13 pages. CSCI 466 Final Networks Fall 2011 Name: This exam consists of 10 problems on the following 13 pages. You may use your two- sided hand- written 8 ½ x 11 note sheet during the exam and a calculator. No other

More information

Reminder: Datalink Functions Computer Networking. Datalink Architectures

Reminder: Datalink Functions Computer Networking. Datalink Architectures Reminder: Datalink Functions 15-441 15 441 15-641 Computer Networking Lecture 5 Media Access Control Peter Steenkiste Fall 2015 www.cs.cmu.edu/~prs/15-441-f15 Framing: encapsulating a network layer datagram

More information

Example questions for the Final Exam, part A

Example questions for the Final Exam, part A ETSF10, ETSF05 Ht 2010 Example questions for the Final Exam, part A 1. In AdHoc routing there are two main strategies, reactive and proactive routing. Describe in a small number of words the concept of

More information