Implementation of cluster control manager for multiple wireless links sharing systems
|
|
- Belinda Holland
- 5 years ago
- Views:
Transcription
1 Implementation of cluster control manager for multiple wireless links sharing systems Hiroshi Mineno Faculty of Information, Shizuoka University, Japan 1
2 Introduction Heterogeneous network access technologies 2G, 3G cellular systems, Wireless LAN hotspots, PHS Multiple network interfaces Ethernet, W-LAN, Bluetooth, IrDA, PHS PDA Bluetooth Wireless LAN PHS 3G Cellular 2G Cellular Laptop PC Communication is enabled by using the most suitable interfaces and access technologies according to the situation. - Office: Ethernet, W-LAN - Outdoor: 2G, 3G cellular, PHS IrDA Phone 2
3 Related research Mobile computing Flexible network support for mobile hosts (X. Zhao) Provides global connectivity by using multiple interfaces Multiple network interface support by policy-based routing on Mobile IPv6 (R. Wakikawa) Flow-to-interface binding policy to a Mobile IPv6 Heterogeneous network Global connectivity for IPv6 mobile ad hoc networks Globally routable address and -gateway operation Draft-ietf-ipv6-router-selection-02.txt (R. Draves) How to choose a router and how to support load-sharing among equivalent routers Ubiquitous networking 3
4 SHAring multiple paths procedure for a cluster network Environment () enables the sharing of multiple wireless links. Ad hoc cluster network User B -High throughput -High reliability -High connectivity Data-1 Data Data-2 User A Data-3 User D User C Data flow Correspondent host Long-range wireless link ( 2G, 3G cellular, PHS, etc.) Short-range wireless link ( x, Bluetooth, etc.) 4
5 SHAring multiple paths procedure for a cluster network Environment () enables the sharing of multiple wireless links. Ad hoc cluster network User B -High throughput -High reliability -High connectivity Data-1 Data User A Data-2 Data flow Long-range wireless link ( 2G, 3G cellular, PHS, etc.) Data-3 - Autonomous cluster configuration User C - Flexible policy-based control Short-rangetraffic wireless link User D Correspondent host ( x, Bluetooth, etc.) 4
6 Ubiquitous networking with Wireless LAN 2G/3G cellular network PHS network a g User A a Cluster network User B Office PHS User D User C 5
7 Ubiquitous networking with Wireless LAN 2G/3G cellular network PHS network b PHS User D Move User A a User C Cluster network Outdoor 5
8 Ubiquitous networking with Wireless LAN 2G/3G cellular network PHS network 3G cellular a User D Move User A Cluster network Train 5
9 Ubiquitous networking with Wireless LAN 2G/3G cellular network PHS network 3G cellular a User D Move User A Cluster network - Autonomous cluster configuration - Flexible policy-based traffic control Train 5
10 Cluster Control Manager (SCCM) Monitoring and advertising sharable resource information as a terminal profile Link status, OS type, remaining battery, etc. Each terminal profile is broadcast periodically Terminal profiles stored in a cluster table Autonomous cluster configuration Providing suitable resource information to the middleware* Available path, delay, bandwidth information User preferences are uniformly stored as a policy Traffic is dispersed based on the specific policy Flexible policy-based traffic control 6 * middleware is the proxy for implementing as substitute for all applications.
11 Architecture of SCCM Policy User preferences Policy manager - Flexible policy based control - Store preferences as a policy - Provide information from table based on the policy Cluster Control Manager Cluster table Terminal Terminal Profile Terminal Profile profile Shared resource information Cluster controller - Monitor resource info - Periodically broadcast as a terminal profile - Receive terminal profiles and update a cluster table Traffic information Suitable resource information Terminal profile Terminal profile Terminal profile middleware SCCM (on the other host) 7
12 Terminal profile format ID ID CPU_info OS_info Battery_info Net I/F{ I/F{ n } } Terminal profile : : Identify each host s s terminal profile information : : Affect relaying performance : : Laptop PC, PDA, Sensor : : Remaining battery information : : Network interface information NetI/F_name[ i ] : Interface name (eth1, lo, etc.) NetI/F_flags[ i ] : Link status (up, running, etc.) NetI/F_IPaddr[ i ] : IP address (IPv4) NetI/F_Bwidth[ i ] : Logical bandwidth NetI/F_RTT[ i ] : Average round trip time NetI/F_Loss[ i ] : Average packet loss ratio Recv_time : : Received time of of this terminal profile Profile_TTL : : Expiration time of of this terminal profile 8
13 Policy description examples Outgoing traffic rules (local) high low IP address, port : , 53: Own IP address, protocol : , TCP: Own IP address : : Own Packet-to-path Port : POP, SMTP: Own, HTTP: All Protocol : TCP: short delay paths Default : All hosts which have enough battery Forwarding traffic rules (local) High priority : Local traffic Queuing : Yes Incoming traffic rules (correspondent node) Flow-to-path Situation-to-path register to the correspondent node like outgoing traffic rules 9
14 SCCM applied architecture for Web HTTP data HTTP client proxy TCP External link GET REQ (1) HTTP REQ (2) HEAD REQ Web server Partial data IP User demands SCCM Policy HTTP proxy (3) Traffic information Policy manager (7) Sort and combine Header (4) Suitable network Cluster table partial data (size info of resources information Terminal profile GET REQ target file) Dispersion controller Cluster controller (5) Partial data (6) Receive other Broadcast terminal profiles terminal profile UDP Cluster link Partial GET Other hosts within cluster 10
15 SCCM applied architecture for Web HTTP data HTTP client (1) HTTP REQ proxy User demands SCCM Policy HTTP proxy - always (3) Traffic information Policy manager (7) Sort sends and regular GET requests through combine its own external Header link (4) Suitable network Cluster table partial data (size info of resources information Terminal profile GET REQ target file) Dispersion controller Cluster controller (5) Partial data (6) Receive other Broadcast Apply terminal forwarding profiles traffic terminal rules: profile TCP Partial -giving data priority to the local traffic UDP - queuing IP forwarding traffic if the local proxy using its external link External link (2) Cluster link HEAD GET REQ REQ Partial GET Web server Other hosts within cluster Apply outgoing traffic rule: 10
16 Evaluation 1. Dynamically changing cluster topology Whether each SCCM could autonomously communicate the sharable resource information and provide the available shared resource information to the proxy. 2. Changing cluster topology under communication Whether the SCCM could dynamically respond to the change of shared resource information even if the host is under communication. 3. Observing competitor appearance within cluster Whether each mobile host can guarantee a minimum performance by using its own external link. 11
17 Experiment 1 IEEE802.11b Mode: Ad-hoc Bandwidth: 11 Mbps PHS Mode: PIAFS Bandwidth: GET GET REQ REQ GET REQ 1Mbytes 1 Host 1 sends five consecutive HTTP GET requests. Host 1 AP 1 Web server Host 2 Host 3 Cluster network AP 2 AP 3 proxy and SCCM runs on each mobile host. AP: Access Point 12
18 Experiment 1 First request GET REQ [ ] Each host s external link status -Host 1 AP 1: connected -Host 2 AP 2: disconnected -Host 3 AP 3: disconnected Host 1 AP 1 Web server Host 2 Host 3 Cluster network AP 2 AP 3 proxy and SCCM runs on each mobile host. AP: Access Point 12
19 Experiment 1 Second request GET REQ [2] Each host s external link status -Host 1 AP 1: connected -Host 2 AP 2: connected -Host 3 AP 3: disconnected Host 1 AP 1 Web server Host 2 Host 3 Cluster network AP 2 AP 3 proxy and SCCM runs on each mobile host. AP: Access Point 12
20 Experiment 1 Third request GET REQ [3] Each host s external link status -Host 1 AP 1: connected -Host 2 AP 2: connected -Host 3 AP 3: connected Host 1 AP 1 Web server Host 2 Host 3 Cluster network AP 2 AP 3 proxy and SCCM runs on each mobile host. AP: Access Point 12
21 Experiment 1 Fourth request GET REQ [4] Each host s external link status -Host 1 AP 1: connected -Host 2 AP 2: connected -Host 3 AP 3: disconnected Host 1 AP 1 Web server Host 2 Host 3 Cluster network AP 2 AP 3 proxy and SCCM runs on each mobile host. AP: Access Point 12
22 Experiment 1 Fifth request GET REQ [5] Each host s external link status -Host 1 AP 1: connected -Host 2 AP 2: disconnected -Host 3 AP 3: disconnected Host 1 AP 1 Web server Host 2 AP 2 Whether the SCCM could dynamically respond to the change of shared resource information even if the host is Host 3 under communication. AP 3 Cluster network proxy and SCCM runs on each mobile host. AP: Access Point 12
23 Result 1 Average throughput [Kbps] Throughput Received data size (1,048,576 bytes) Redundant data 320 KBytes Received data size [Kbytes] Elapsed time [sec] 0 13
24 Experiment 2 IEEE802.11b Mode: Ad-hoc Bandwidth: 11 Mbps PHS Mode: PIAFS Bandwidth: 32 Kbps GET REQ Host 1 sends a HTTP GET request. 32 Kbps Host 1 AP 1 Web server Host 2 Cluster network PHS Mode: PIAFS Bandwidth: AP 2 proxy and SCCM runs on each mobile host. AP: Access Point 14
25 Experiment 2 Elapsed time:0-30sec GET REQ 32 Kbps Each host s external link status -Host 1 AP 1: connected -Host 2 AP 2: connected Host 1 AP 1 Web server Host 2 Cluster network AP 2 proxy and SCCM runs on each mobile host. AP: Access Point 14
26 Experiment 2 After 30 sec GET REQ 32 Kbps Each host s external link status -Host 1 AP 1: connected -Host 2 AP 2: disconnected Host 1 AP 1 Web server Host 2 AP 2 Whether each SCCM could autonomously communicate the proxy and SCCM Cluster sharable network resource information and provide the available runs on each mobile host. shared resource information to the proxy. AP: Access Point 14
27 Result 2 Average throughput [Kbps] Throughput Received data Throughput of Host 2 s2 relaying data Throughput of Host 1 s1 external link Received data from Host 2 s 2 external link (1,048,576 bytes) Received data from Host 1 s 1 external link Guaranteed performance Received data size [Kbytes] 0 30 Disconnect Host 2 s 2 s external link Elapsed time [sec] 0 15
28 Experiment 3 IEEE802.11b Mode: Ad-hoc Bandwidth: 11 Mbps PHS Mode: PIAFS Bandwidth: 32 Kbps Each host had the same external link as in the previous experiment. 32 Kbps Host 1 AP 1 Web server Host 2 Cluster network PHS Mode :PIAFS Bandwidth :64Kbps AP 2 proxy and SCCM runs on each mobile host. AP: Access Point 16
29 Experiment 3 Elapsed time:0-60 sec GET REQ 32 Kbps Host 1 sent a HTTP GET request and started to download the file. Host 1 AP 1 Web server Host 2 Cluster network AP 2 proxy and SCCM runs on each mobile host. AP: Access Point 16
30 Experiment 3 After 60sec GET REQ 32 Kbps Host 2 sent a HTTP GET request and started to download the file. Host 1 AP 1 Web server GET REQ 512 Kbyte 512 Kbyte Host 2 AP 2 proxy and SCCM runs on each mobile host. Cluster Whether network each mobile host can guarantee a minimum performance by using its own external link. AP: Access Point 16
31 Result 3 Average throughput [Kbps] Only Host 1 Host 1 and Host 2 Only Host Throughput Received data Throughput of Host 2 s2 relaying data Throughput of Host 1 s1 external link Received data from Host 2 s2 external link Received data from Host 1 s 1 external link Competitor appeared Elapsed time [sec] Received data size [Kbytes] 17
32 Conclusion and future research Proposed cluster control manager Autonomous cluster configuration Flexible policy-based traffic control Applied SCCM to Web Possible Web respond to a dynamic change in shared network resources Potential guarantee of each mobile host s performance even when competitors appear within the cluster <Future research> Apply the SCCM to Mobile IP Modify for use in Mobile IP version 6 Support secure communication through the cluster 18
33 Thank you for your attention today.
34 Related research on prototype (1999) Implemented as a library that utilizes TCP for reliable socketlevel communication Web (2002) Doesn t require special software for corresponding web server Customized HTTP proxy for the Mobile IPv4 (2003) Enhanced HA disperses IP datagrams to the registered CoAs Increased benefits of for all applications - Autonomous cluster configuration - Flexible policy-based traffic control
Evaluation of Performance of TCP on Mobile IP SHAKE
Vol. 45 No. 10 IPSJ Journal Oct. 2004 Regular Paper Evaluation of Performance of TCP on Mobile IP SHAKE Kenji Koyama, Yosuke Ito, Hiroshi Mineno and Susumu Ishihara We extensively evaluated a method of
More informationComparision study of MobileIPv4 and MobileIPv6
Comparision study of MobileIPv4 and MobileIPv6 Dr. Sridevi Assistant Professor, Dept. of Computer Science, Karnatak University,Dharwad Abstract: IPv4 is being replaced by IPv6 due to the increased demand
More informationHow to Make the Client IP Address Available to the Back-end Server
How to Make the Client IP Address Available to the Back-end Server For Layer 4 - UDP and Layer 4 - TCP services, the actual client IP address is passed to the server in the TCP header. No further configuration
More informationWireless and Mobile Networks Reading: Sections 2.8 and 4.2.5
Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5 Acknowledgments: Lecture slides are from Computer networks course thought by Jennifer Rexford at Princeton University. When slides are obtained
More informationIP/MAC Address Translation
IP/MAC Address Translation -Go over quiz answers -ARP -DHCP -NAT Today Transition from Network to Datalink How do we get datagrams to the right physical host? Tricky part comes when a router is forwarding
More informationCSCI 466 Midterm Networks Fall 2011
CSCI 466 Midterm Networks Fall 2011 Name: This exam consists of 7 problems on the following 9 pages. You may use your single- sided hand- written 8 ½ x 11 note sheet and a calculator during the exam. No
More informationEvaluation of traffic dispersion methods for synchronous distributed multimedia data transmission on multiple links for group of mobile hosts
Int. J. Applied Systemic Studies, Vol. 3, No. 1, 2010 89 Evaluation of traffic dispersion methods for synchronous distributed multimedia data transmission on multiple links for group of mobile hosts Yoshia
More informationLast time. Wireless link-layer. Introduction. Characteristics of wireless links wireless LANs networking. Cellular Internet access
Last time Wireless link-layer Introduction Wireless hosts, base stations, wireless links Characteristics of wireless links Signal strength, interference, multipath propagation Hidden terminal, signal fading
More informationChapter 8 roadmap. Network Security
Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography 8.3 Message integrity 8.4 Securing e-mail 8.5 Securing TCP connections: SSL 8.6 Network layer security: IPsec 8.7 Securing
More informationDynamic Traffic Load Balancing Mechanism for SHAKE Architecture
Dynamic Traffic Load Balancing Mechanism for SHAKE Architecture Hiroshi Esaki, Hiroki Kan Graduate School of Information Science and Technology, The University of Tokyo, Japan hiroshi@wide.ad.jp kohki@hongo.wide.ad.jp
More informationIntegration of Wireless Sensor Network Services into other Home and Industrial networks
Integration of Wireless Sensor Network Services into other Home and Industrial networks using Device Profile for Web Services (DPWS) Ayman Sleman Automation and Process Control Engineering, University
More informationCompSci 356: Computer Network Architectures. Lecture 8: Spanning Tree Algorithm and Basic Internetworking Ch & 3.2. Xiaowei Yang
CompSci 356: Computer Network Architectures Lecture 8: Spanning Tree Algorithm and Basic Internetworking Ch 3.1.5 & 3.2 Xiaowei Yang xwy@cs.duke.edu Review Past lectures Single link networks Point-to-point,
More informationPerformance Evaluation of NEMO Basic Support Implementations
Performance Evaluation of NEMO Basic Support Implementations Romain Kuntz, Koshiro Mitsuya, Ryuji Wakikawa Keio University, Japan E-mail: {kuntz,mitsuya,ryuji}@sfc.wide.ad.jp Abstract. The NEMO Basic Support
More informationRouter Router Microprocessor controlled traffic direction home router DSL modem Computer Enterprise routers Core routers
Router Router is a Microprocessor controlled device that forwards data packets across the computer network. It is used to connect two or more data lines from different net works. The function of the router
More informationCMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 11
CMPE 150/L : Introduction to Computer Networks Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 11 1 Midterm exam Midterm this Thursday Close book but one-side 8.5"x11" note is allowed (must
More informationCS 421: COMPUTER NETWORKS SPRING FINAL May 16, minutes
CS 4: COMPUTER NETWORKS SPRING 03 FINAL May 6, 03 50 minutes Name: Student No: Show all your work very clearly. Partial credits will only be given if you carefully state your answer with a reasonable justification.
More informationCNPE Communications and Networks Lab Book: Data Transmission Over Digital Networks
Lab Book: Data Transmission Over Digital Networks Contents Data Transmission Over Digital Networks... 3 Lab Objectives... 3 Lab Resources... 3 Task 1 Build the Home Network... 3 Task 2 Configure IP Addresses...
More informationMohammad Hossein Manshaei 1393
Mohammad Hossein Manshaei manshaei@gmail.com 1393 Mobile IP 2 Mobile Network Layer: Problems and Concerns Entities and Terminology in Mobile IP Mobile Indirect Routing Mobile IP Agent Advertisement Registration
More informationArchitecture and Prototyping of an based Self-Organizing Hierarchical Ad-Hoc Wireless Network (SOHAN)
Architecture and Prototyping of an 802.11- based Self-Organizing Hierarchical Ad-Hoc Wireless Network (SOHAN) PIMRC 2004, Barcelona Sept 5-8, 2004 S. Ganu, L. Raju, B. Anepu, S. Zhao, I. Seskar and D.
More informationIntroduction to Networks and the Internet
Introduction to Networks and the Internet CMPE 80N Winter 2004 Lecture 18 Announcements Fourth quiz on Monday, March 1 st. Third HTML discussion session today by Kiran (before class). Summary posted on
More informationThe Internetworking Problem. Internetworking. A Translation-based Solution
Cloud Cloud Cloud 1 The Internetworking Problem Internetworking Two nodes communicating across a network of networks How to transport packets through this heterogeneous mass? A B The Internetworking Problem
More informationInternet. 1) Internet basic technology (overview) 3) Quality of Service (QoS) aspects
Internet 1) Internet basic technology (overview) 2) Mobility aspects 3) Quality of Service (QoS) aspects Relevant information: these slides (overview) course textbook (Part H) www.ietf.org (details) IP
More informationOperating Systems. 16. Networking. Paul Krzyzanowski. Rutgers University. Spring /6/ Paul Krzyzanowski
Operating Systems 16. Networking Paul Krzyzanowski Rutgers University Spring 2015 1 Local Area Network (LAN) LAN = communications network Small area (building, set of buildings) Same, sometimes shared,
More informationThe Applications and Gaming Tab - Port Range Forward
The Applications and Gaming Tab - Port Range Forward The Applications and Gaming Tab allows you to set up public services on your network, such as web servers, ftp servers, e-mail servers, or other specialized
More informationInternetworking Part 1
CMPE 344 Computer Networks Spring 2012 Internetworking Part 1 Reading: Peterson and Davie, 3.1 22/03/2012 1 Not all networks are directly connected Limit to how many hosts can be attached Point-to-point:
More informationChapter 1. Uses of Computer Networks Network Hardware Network Software Reference Models Example Networks Network Standardization. Revised: August 2011
Introduction ti Chapter 1 Uses of Computer Networks Network Hardware Network Software Reference Models Example Networks Network Standardization Metric Units Revised: August 2011 Uses of Computer Networks
More informationA Global Mobility Scheme for Seamless Multicasting in Proxy Mobile IPv6 Networks
ICACT Transactions on on the Advanced Communications Technology (TACT) Vol. Vol. 2, 2, Issue Issue 3, 3, May May 2013 2013 233 A Global Mobility Scheme for Seamless Multicasting in Proxy Mobile IPv6 Networks
More informationVorlesung Kommunikationsnetze
Picture 15 13 Vorlesung Kommunikationsnetze Prof. Dr. H. P. Großmann mit B. Wiegel sowie A. Schmeiser und M. Rabel Sommersemester 2009 Institut für Organisation und Management von Informationssystemen
More informationYour Name: Your student ID number:
CSC 573 / ECE 573 Internet Protocols October 11, 2005 MID-TERM EXAM Your Name: Your student ID number: Instructions Allowed o A single 8 ½ x11 (front and back) study sheet, containing any info you wish
More informationReview. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD
Review Error Detection: CRC Multiple access protocols Slotted ALOHA CSMA/CD LAN addresses and ARP Ethernet Some slides are in courtesy of J. Kurose and K. Ross Overview Ethernet Hubs, bridges, and switches
More informationLecture 11: Middleboxes and NAT (Duct tape for IPv4)
CSCI-351 Data communication and Networks Lecture 11: Middleboxes and NAT (Duct tape for IPv4) The slide is built with the help of Prof. Alan Mislove, Christo Wilson, and David Choffnes's class Middleboxes
More informationFundamentals of Computer Networking AE6382
Computer networks are an integral part of the modern computing infrastructure The local network (LAN) is usually Ethernet LAN s are inter-connected with other LAN s in a hierarchical fashion eventually
More informationRAJIV GANDHI COLLEGE OF ENGINEERING AND TECHNOLOGY
RAJIV GANDHI COLLEGE OF ENGINEERING AND TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING QUESTION BANK SUBJECT NAME: COMPUTER NETWORKS SUBJECT CODE: CST52 UNIT-I 2 MARKS 1. What is Network? 2.
More information4. The transport layer
4.1 The port number One of the most important information contained in the header of a segment are the destination and the source port numbers. The port numbers are necessary to identify the application
More informationOutline. A Professional Company in Software-Defined Networking (SDN) Copyright , EstiNet Technologies Inc. All Rights Reserved..
Physical Layer Outline Signal Propagation Media The Calculation of Signal Delivery Time The Evaluation of End-to-end Delay Signal Encoding and Modulation Wired Signal s Encoding, Decoding and Decoding
More informationCSCI 466 Midterm Networks Fall 2011
CSCI 466 Midterm Networks Fall 2011 Name: This exam consists of 7 problems on the following 9 pages. You may use your single- sided hand- written 8 ½ x 11 note sheet and a calculator during the exam. No
More informationIP: Addressing, ARP, Routing
IP: Addressing, ARP, Routing Network Protocols and Standards Autumn 2004-2005 Oct 21, 2004 CS573: Network Protocols and Standards 1 IPv4 IP Datagram Format IPv4 Addressing ARP and RARP IP Routing Basics
More informationAssignment - 1 Chap. 1 Wired LAN s
Assignment - 1 Chap. 1 Wired LAN s 1. (1 Mark) 1. Draw the frame format of Ethernet. 2. What is unicast, multicast and broadcast address? 3. State the purpose of CRC field. 2. (5 Marks) 1. Explain how
More informationChapter 4: network layer. Network service model. Two key network-layer functions. Network layer. Input port functions. Router architecture overview
Chapter 4: chapter goals: understand principles behind services service models forwarding versus routing how a router works generalized forwarding instantiation, implementation in the Internet 4- Network
More informationc) With the selective repeat protocol, it is possible for the sender to receive an ACK for a packet that falls outside of its current window.
Part 1 Question 1 [0.5 Marks] Suppose an application generates chunks of 40 bytes of data every 20 msec, and each chunk gets encapsulated by a TCP segment and then an IP datagram. What percentage of each
More informationNetwork Layer: Router Architecture, IP Addressing
Network Layer: Router Architecture, IP Addressing UG3 Computer Communications & Networks (COMN) Mahesh Marina mahesh@ed.ac.uk Slides thanks to Myungjin Lee and copyright of Kurose and Ross Router Architecture
More informationWhy Your Application only Uses 10Mbps Even the Link is 1Gbps?
Why Your Application only Uses 10Mbps Even the Link is 1Gbps? Contents Introduction Background Information Overview of the Issue Bandwidth-Delay Product Verify Solution How to Tell Round Trip Time (RTT)
More informationCSC 401 Data and Computer Communications Networks
CSC 401 Data and Computer Communications Networks Link Layer, Switches, VLANS, MPLS, Data Centers Sec 6.4 to 6.7 Prof. Lina Battestilli Fall 2017 Chapter 6 Outline Link layer and LANs: 6.1 introduction,
More informationSHIRDI SAI ENGINEERING COLLEGE
SHIRDI SAI ENGINEERING COLLEGE SHIRDI SAI ENGINEERING COLLEGE SHIRDI SAI ENGINEERING COLLEGE SHIRDI SAI ENGINEERING COLLEGE USN SHIRDI SAI ENGG COLLEGE Seventh Semester D.E. Degree Examination,
More informationIntroduction to Information Science and Technology 2017 Networking II. Sören Schwertfeger 师泽仁
II Sören Schwertfeger 师泽仁 Outline Review Network Layer Routing Transport Layer Applications HTTP Demos Internet: Huge network of networks Billions of hosts (computers) Internet Structure Network Edge:
More informationDelhi Noida Bhopal Hyderabad Jaipur Lucknow Indore Pune Bhubaneswar Kolkata Patna Web: Ph:
Serial : BS_CS_A_Computer Network_040 Delhi Noida Bhopal Hyderabad Jaipur Lucknow Indore Pune Bhubaneswar Kolkata Patna Web: E-mail: info@madeeasy.in Ph: 0-45242 CLASS TEST 20-9 COMPUTER SCIENCE & IT Subject
More informationprecise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet protocol (bottom level)
Protocols precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet protocol (bottom level) all packets shipped from network to network as IP packets
More informationOptimized Paging Cache Mappings for efficient location management Hyun Jun Lee, Myoung Chul Jung, and Jai Yong Lee
Optimized Paging Cache Mappings for efficient location management Hyun Jun Lee, Myoung Chul Jung, and Jai Yong Lee Abstract Cellular IP maintains distributed cache for location management and routing purposes.
More informationIntroduction to Firewalls using IPTables
Introduction to Firewalls using IPTables The goal of this lab is to implement a firewall solution using IPTables, and to write and to customize new rules to achieve security. You will need to turn in your
More informationAllstream NGNSIP Security Recommendations
Allstream NGN SIP Trunking Quick Start Guide We are confident that our service will help increase your organization s performance and productivity while keeping a cap on your costs. Summarized below is
More informationSirindhorn International Institute of Technology Thammasat University
Name...ID....Section. Seat No.. Sirindhorn International Institute of Technology Thammasat University Midterm Examination: Semester 2/2006 Course Title : ITS 413 Internet Technologies and Applications
More informationChapter 4: outline. 4.5 routing algorithms link state distance vector hierarchical routing. 4.6 routing in the Internet RIP OSPF BGP
Chapter 4: outline 4.1 introduction 4.2 virtual circuit and datagram networks 4.3 what s inside a router 4.4 IP: Internet Protocol datagram format IPv4 addressing ICMP 4.5 routing algorithms link state
More informationPLEASE READ CAREFULLY BEFORE YOU START
Page 1 of 11 MIDTERM EXAMINATION #1 OCT. 16, 2013 COMPUTER NETWORKS : 03-60-367-01 U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E Fall 2013-75 minutes This examination
More informationRedundancy for Routers using Enhanced VRRP
Redundancy for Routers using Enhanced VRRP 1 G.K.Venkatesh, 2 P.V. Rao 1 Asst. Prof, Electronics Engg, Jain University Banglaore, India 2 Prof., Department of Electronics Engg., Rajarajeshwari College
More information===================================================================== Exercises =====================================================================
===================================================================== Exercises ===================================================================== 1 Chapter 1 1) Design and describe an application-level
More informationLast time. BGP policy. Broadcast / multicast routing. Link virtualization. Spanning trees. Reverse path forwarding, pruning Tunneling
Last time BGP policy Broadcast / multicast routing Spanning trees Source-based, group-shared, center-based Reverse path forwarding, pruning Tunneling Link virtualization Whole networks can act as an Internet
More informationLecture 2: Internet Structure
Lecture 2: Internet Structure COMP 332, Spring 2018 Victoria Manfredi Acknowledgements: materials adapted from Computer Networking: A Top Down Approach 7 th edition: 1996-2016, J.F Kurose and K.W. Ross,
More informationComputer Networks. Wireless and Mobile Networks. László Böszörményi Computer Networks Mobile - 1
Computer Networks Wireless and Mobile Networks László Böszörményi Computer Networks Mobile - 1 Background Number of wireless (mobile) phone subscribers now exceeds number of wired phone subscribers! Computer
More informationCisco Optimizing Converged Cisco Networks. Practice Test. Version 2.6. https://certkill.com
Cisco 642-845 642-845 Optimizing Converged Cisco Networks Practice Test Version 2.6 QUESTION NO: 1 Cisco 642-845: Practice Exam Refer to the exhibit. NBAR is to be configured on router R1 to limit outgoing
More informationFast handoff for Mobile IP and Link Layer Triggers
Fast handoff for Mobile IP and Link Layer Triggers Gang Wu and Alper egin DoCoMo USA Labs Slide1 Overview Handover events necessitate both networklayer and lower layers actions Network-layer needs information
More informationPLEASE READ CAREFULLY BEFORE YOU START
Page 1 of 20 MIDTERM EXAMINATION #1 - B COMPUTER NETWORKS : 03-60-367-01 U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E Fall 2008-75 minutes This examination document
More informationPLEASE READ CAREFULLY BEFORE YOU START
Page 1 of 20 MIDTERM EXAMINATION #1 - A COMPUTER NETWORKS : 03-60-367-01 U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E Fall 2008-75 minutes This examination document
More informationECE 4450:427/527 - Computer Networks Spring 2017
ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 6.2: IP Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527 Computer Networks
More informationTCOM 370 NOTES 99-1 NETWORKING AND COMMUNICATIONS
TCOM 370 NOTES 99-1 NETWORKING AND COMMUNICATIONS Communication Networks Allow Exchange of Information between Users telephone network for voice communication interconnected computers and peripherals,
More informationAllows IGRP or Enhanced IGRP exterior routes to be advertised in updates.
IGRP Commands Use the commands in this chapter to configure and monitor Internet Gateway Routing Protocol (IGRP). For IGRP configuration information and examples, refer to the Configuring IGRP chapter
More informationChapter 4: Network Layer
Chapter 4: Introduction (forwarding and routing) Review of queueing theory Routing algorithms Link state, Distance Vector Router design and operation IP: Internet Protocol IPv4 (datagram format, addressing,
More informationUNIVERSITY OF TORONTO FACULTY OF APPLIED SCIENCE AND ENGINEERING
UNIVERSITY OF TORONTO FACULTY OF APPLIED SCIENCE AND ENGINEERING ECE361 Computer Networks Midterm March 09, 2016, 6:15PM DURATION: 75 minutes Calculator Type: 2 (non-programmable calculators) Examiner:
More informationRMIT University. Data Communication and Net-Centric Computing COSC 1111/2061/1110. Lecture 8. Medium Access Control Methods & LAN
RMIT University Data Communication and Net-Centric Computing COSC 1111/2061/1110 Medium Access Control Methods & LAN Technology Slide 1 Lecture Overview During this lecture, we will Look at several Multiple
More informationStudent ID: CS457: Computer Networking Date: 3/20/2007 Name:
CS457: Computer Networking Date: 3/20/2007 Name: Instructions: 1. Be sure that you have 9 questions 2. Be sure your answers are legible. 3. Write your Student ID at the top of every page 4. This is a closed
More information521262S Computer Networks 2 (fall 2007) Laboratory exercise #4: Multimedia, QoS and testing
521262S Computer Networks 2 (fall 2007) Laboratory exercise #4: Multimedia, QoS and testing Name Student ID Signature In this exercise we will take a little look at the multimedia and Quality of Service
More informationImproving QOS in IP Networks. Principles for QOS Guarantees
Improving QOS in IP Networks Thus far: making the best of best effort Future: next generation Internet with QoS guarantees RSVP: signaling for resource reservations Differentiated Services: differential
More informationCMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 12
CMPE 150/L : Introduction to Computer Networks Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 12 1 Chapter 4: outline 4.1 introduction 4.2 virtual circuit and datagram networks 4.3 what
More informationestadium Project Lab 2: Iperf Command
estadium Project Lab 2: Iperf Command Objectives Being familiar with the command iperf. In this Lab, we will set up two computers (PC1 and PC2) as an ad-hoc network and use the command iperf to measure
More informationBandwidth, Latency, and QoS for Core Components
Bandwidth, Latency, and QoS for Core Components, on page 1 Bandwidth, Latency, and QoS for Optional Cisco Components, on page 18 Bandwidth, Latency, and QoS for Optional Third-Party Components, on page
More informationMobile IP. rek. Petr Grygárek Petr Grygarek, Advanced Computer Networks Technologies 1
Mobile IP Petr Grygárek rek 1 Basic principle Picture from IOS IP and IP Routing Configuration Guide Mobile node maintains the same IP address even while roaming in foreign networks even if it s address
More informationUPnP-Based Telematics Service Discovery for Local Hot-Spots
UPnP-Based Telematics Service Discovery for Local Hot-Spots Dong-Kyun Kim and Sang-Jeong Lee Dept. of Computer Science and Engineering, Soonchunhyang University Asan, Chungnam, Korea {kdk7, sjlee}@sch.ac.kr
More informationNetwork Layer PREPARED BY AHMED ABDEL-RAOUF
Network Layer PREPARED BY AHMED ABDEL-RAOUF Network layer transport segment from sending to receiving host on sending side encapsulates segments into datagrams on receiving side, delivers segments to transport
More informationCS 356: Computer Network Architectures. Lecture 14: Switching hardware, IP auxiliary functions, and midterm review. [PD] chapter 3.4.1, 3.2.
CS 356: Computer Network Architectures Lecture 14: Switching hardware, IP auxiliary functions, and midterm review [PD] chapter 3.4.1, 3.2.7 Xiaowei Yang xwy@cs.duke.edu Switching hardware Software switch
More informationProposed Node and Network Models for M2M Internet
2009-2012 NTT CORPORATION. All Rights Reserved. Proposed Node and Network Models for M2M Internet Yuminobu Igarashi NTT Information Sharing Platform Laboratories 2012 NTT Information Sharing Platform Laboratories
More informationCS519: Computer Networks
Lets start at the beginning : Computer Networks Lecture 1: Jan 26, 2004 Intro to Computer Networking What is a for? To allow two or more endpoints to communicate What is a? Nodes connected by links Lets
More informationinternet technologies and standards
Institute of Telecommunications Warsaw University of Technology 2017 internet technologies and standards Piotr Gajowniczek Andrzej Bąk Michał Jarociński Network Layer The majority of slides presented in
More informationDOCUMENT REFERENCE: SQ EN. SAMKNOWS TEST METHODOLOGY Methodology and technical information relating to the SamKnows testing platform.
DOCUMENT REFERENCE: SQ301-002-EN SAMKNOWS TEST METHODOLOGY Methodology and technical information relating to the SamKnows testing platform. March 2014 SAMKNOWS QUALITY CONTROLLED DOCUMENT. SQ REV LANG
More informationETSF10 Internet Protocols Routing on the Internet
ETSF10 Internet Protocols Routing on the Internet 2013, Part 2, Lecture 1.2 Jens Andersson (Kaan Bür) Routing on the Internet Unicast routing protocols (part 2) [ed.5 ch.20.3] Multicast routing, IGMP [ed.5
More informationChapter 7. Local Area Network Communications Protocols
Chapter 7 Local Area Network Communications Protocols The Network Layer The third layer of the OSI Model is the network layer. The network layer is concerned with providing a means for hosts to communicate
More informationNetwork Architecture
Unit 7 Network Architecture Acknowledgments: These slides were originally developed by Prof. Jean Walrand for EE122. The past and current EE122 instructors including Kevin Fall, Abhay Parekh, Shyam Parekh,
More informationA Novel Information Sharing Architecture Constructed by Broadcast Based Information Sharing System (BBISS)
A Novel Information Sharing Architecture Constructed by Broadcast Based Information Sharing System (BBISS) Keisuke Utsu, Chee Onn Chow 2, Hiroaki Nishikawa 3, and Hiroshi Ishii School of Information and
More informationData Networks. Lecture 1: Introduction. September 4, 2008
Data Networks Lecture 1: Introduction September 4, 2008 Slide 1 Learning Objectives Fundamental aspects of network Design and Analysis: Architecture: layering, topology design, switching mechanisms Protocols:
More informationCS 421: COMPUTER NETWORKS SPRING FINAL May 24, minutes. Name: Student No: TOT
CS 421: COMPUTER NETWORKS SPRING 2012 FINAL May 24, 2012 150 minutes Name: Student No: Show all your work very clearly. Partial credits will only be given if you carefully state your answer with a reasonable
More informationIntroduction to Computer Science 2017 Networking. Sören Schwertfeger
Sören Schwertfeger Outline Internet History of the Internet Internet Structure Internet Protocols Network layer details 1. Physical Layer 2. Data Link Layer 3. Network Layer Internet: Huge network of networks
More informationEEC-684/584 Computer Networks
EEC-684/584 Computer Networks Lecture 14 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review of last lecture Internetworking
More informationECE 697J Advanced Topics in Computer Networks
ECE 697J Advanced Topics in Computer Networks Network Measurement 12/02/03 Tilman Wolf 1 Overview Lab 3 requires performance measurement Throughput Collecting of packet headers Network Measurement Active
More informationReal-Time Protocol (RTP)
Real-Time Protocol (RTP) Provides standard packet format for real-time application Typically runs over UDP Specifies header fields below Payload Type: 7 bits, providing 128 possible different types of
More informationCS/ECE 438: Communication Networks for Computers Spring 2018 Midterm Examination Online
1 CS/ECE 438: Communication Networks for Computers Spring 2018 Midterm Examination Online Solutions 1. General Networking a. In traditional client-server communication using TCP, a new socket is created.
More informationObjective To examine the throughput of a TCP connection as the flow control window size is varied.
Lab 7 TCP Throughput Overview TCP uses a sliding window mechanism to provide flow control. The destination advertises how much space it has available in its buffers, and the source restricts its transmissions
More information1. What is a Computer Network? interconnected collection of autonomous computers connected by a communication technology
Review Questions for exam Preparation (22-07-2017) 1. What is a Computer Network? interconnected collection of autonomous computers connected by a communication technology 2. What is the Internet? "network
More informationDistributed Systems 26. Mobile Ad Hoc Mesh Networks
Distributed Systems 26. Mobile Ad Hoc Mesh Networks Paul Krzyzanowski pxk@cs.rutgers.edu 12/16/2011 1 Mesh Networks Mobile Ad-hoc networks, sensor networks, Decentralized networking No need for routers
More informationNetwork Test and Monitoring Tools
ajgillette.com Technical Note Network Test and Monitoring Tools Author: A.J.Gillette Date: December 6, 2012 Revision: 1.3 Table of Contents Network Test and Monitoring Tools...1 Introduction...3 Link Characterization...4
More informationECE4110, Internetwork Programming, QUIZ 2 - PRACTICE Spring 2006
Email Address ECE4110, Internetwork Programming, QUIZ 2 - PRACTICE Spring 2006 Name (Print) Prof. John A. Copeland Practice for April 11, 2006 Tel.: 404-894-5177 E-Mail: copeland@ece.gatech.edu RULES.
More informationCEN 538 Wireless LAN & MAN Networks
King Saud University College of Computer and Information Sciences Department of Computer Engineering CEN 538 Wireless LAN & MAN Networks Dr. Ridha OUNI rouni@ksu.edu.sa LMS web site References Text book
More informationITP 140 Mobile Applications Technologies. Networks
ITP 140 Mobile Applications Technologies Networks A First Look Under the Hood 2 3 Communication Channels Mediums for transporting data from one system to another Physical Twisted Pair (CAT-3, CAT-5/6)
More information