ITTC High-Performance Networking The University of Kansas EECS 881 Architecture and Topology
|
|
- Diana Owen
- 5 years ago
- Views:
Transcription
1 High-Performance Networking The University of Kansas EECS 881 Architecture and Topology James P.G. Sterbenz Department of Electrical Engineering & Computer Science Information Technology & Telecommunications Research Center The University of Kansas rev James P.G. Sterbenz
2 Network Architecture and Topology Outline AT.1 Topology and geography AT.2 Scale AT.3 Resource tradeoffs HSN-AT-2
3 Network Architecture and Topology Outline application application session session transport transport network network network network link link link link end system node network node end system link node network AT.1. Topology and geography AT.2. Scale AT.3. Resource Tradeoffs HSN-AT-3
4 Network Architecture and Topology Topology and Geography AT.1 Topology and geography AT.1.1 Scalability AT.1.2 Latency AT.1.3 Bandwidth AT.1.4 Virtual overlays and lightpaths AT.1.5 Practical constraints AT.2 Scale AT.3 Resource tradeoffs HSN-AT-4
5 infinite bandwidth CPU Ideal Network Model Network Path Principle R = network CPU M app end system M app end system D = 0 zero latency Network Path Principle The network must provide high-bandwidth low-latency paths between end systems. N-II HSN-AT-5
6 Link Topologies Shared Medium Shared medium (e.g. bus topology) problems? HSN-AT-6
7 Link Topologies Shared Medium Shared medium (e.g. bus topology) topology constrained by medium longest path limited to LAN lengths due to delay HSN-AT-7
8 Link Topologies Shared Medium Shared medium (e.g. bus topology) topology constrained by medium longest path limited to LAN lengths due to delay Network scalability? HSN-AT-8
9 Link Topologies Shared Medium Shared medium (e.g. bus topology) topology constrained by medium longest path limited to LAN lengths due to delay Limited scalability all hosts share capacity of bus HSN-AT-9
10 Link Topologies Shared Medium Shared medium (e.g. bus topology) topology constrained by medium longest path limited to LAN lengths due to delay Limited scalability all hosts share capacity of bus contention for shared medium HSN-AT-10
11 Link Topologies Shared Medium Shared medium (e.g. bus topology) topology constrained by medium longest path limited to LAN lengths due to delay Limited scalability all hosts share capacity of bus contention for shared medium collisions in shared medium need MAC (medium access control) HSN-AT-11
12 Link Topologies Shared Medium Shared medium (e.g. bus topology) topology constrained by medium longest path limited to LAN lengths due to delay Limited scalability all hosts share capacity of bus contention for shared medium Example collisions in shared medium need MAC (medium access control) original DIX Ethernet HSN-AT-12
13 Link Topologies Point-to-Point Mesh Point-to-point links between switches space division mesh HSN-AT-13
14 Link Topologies Point-to-Point Mesh Point-to-point links between switches space division mesh Network scalability? HSN-AT-14
15 Link Topologies Point-to-Point Mesh Point-to-point links between switches space division mesh Scalable: add links and expand switches HSN-AT-15
16 Link Topologies Point-to-Point Mesh Point-to-point links between switches space division mesh Scalable: add links and expand switches add switches HSN-AT-16
17 Scalable Topologies Mesh vs. Shared Medium Scalability of Mesh Topologies Mesh network technologies scale better then shared medium. Use power control and directional antennæ to increase spatial reuse in shared medium wireless networks. N-II.4 HSN-AT-17
18 Latency Network Path d i short path long path D = d i Network Latency Principle N-1Al The latency along a path is the sum of all its components. The benefit of optimising an individual link is directly proportional to its relative contribution to the end-to-end latency. HSN-AT-18
19 Latency Topology and Geography Constituents of network latency D = (h 1)d s + h d i Geography: speed of light delay d i SAN LAN MAN WAN GEO Mars Dia 100 m 1 km 100 km km km km RTT 1 μs 10 μs 1 ms 200 ms 480 ms 6 45 min Topology: number of hops h; switching delay d s Network Diameter Principle N-1Ah The number of per hop latencies along a path is bounded by the diameter of the network. The network topology should keep the diameter low. HSN-AT-19
20 Bandwidth Network Path bottleneck r i long path R = min(r i ) Network Bandwidth Principle The maximum bandwidth along a path is limited by the minimum bandwidth link or node, which is the bottleneck. There is no point in optimising a link that is not a bottleneck. N-1Ab HSN-AT-20
21 Overlay Networks Abstract and Hide Underlying Network Overlay networks hide underlying topology VPNs (virtual private networks) secure overlay sessions datagram overlay meshes lightpaths Network Overlay Principle N-IIo Overlay networks must provides the same high-performance paths as he physical networks. The number of overlay layers should be kept as small as possible, and overlays must be adaptable based on end-to-end path requirements and topology information form the lower layers. HSN-AT-21
22 Overlay Networks Lightpath Assignment Lightpath assignment problem preserve high-performance along overlay such that no link carries more than one light path of given wavelength HSN-AT-22
23 Network Architecture and Topology Network Scale AT.1 Topology and geography AT.2 Scale AT.2.1 Network engineering AT.2.2 Hierarchy AT.2.3 Bandwidth aggregation and isolation AT.2.4 Latency optimisation AT.2.5 Wireless network density AT.2.5 Practical constraints AT.3 Resource tradeoffs HSN-AT-23
24 Network Scale Network Engineering Parameters sparse dense topology degree # nodes diameter aggregation sparsely connected low high high low densely connected high low low high Network Scaling Principle N-5Ct Networks should be able to scale in size while balancing switch cost against hop count. HSN-AT-24
25 Network Scale Hierarchy Hierarchy important technique to control latency and aggregation A 1 B C bound state maintained divide network into clusters 4 4 state aggregated per cluster examples: Nimrod, P-NNI Network Hierarchy Principle Use hierarchy and clustering to manage network scale and complexity, and reduce the overhead of routing algorithms. N-5C HSN-AT-25
26 Network Scale Aggregation, Isolation, Latency Backbone WAN regional net MAN LAN neighborhood personal net home DAN Physical hierarchy to limit number of hops and control aggregation example: Internet (NSFNET) prior to 1994 HSN-AT-26
27 Network Scale Aggregation, Isolation, Latency Hierarchy: bandwidth isolation isolate bandwidth in different subnet layers exploit locality at network edge e.g. within campus or enterprise network aggregate bandwidth in network core Hierarchy to Aggregate and Isolate Bandwidth Use hierarchy to manage bandwidth aggregation in the core of the network, and to isolate clusters of traffic locality from one another. N-5B HSN-AT-27
28 Network Scale Aggregation, Isolation, Latency Hierarchy: latency engineering control network diameter and latency engineer low diameter at each level shallow hierarchy 3 5 levels home network or LAN access or campus network MAN WAN backbone Hierarchy to Minimise Latency Use hierarchy and cluster size to minimise network diameter and resultant latency. N-5Cl HSN-AT-28
29 Network Scale Wireless Network Density no control power control overlay Transmission power gives tradeoff between transmission range degree of connectivity Wireless Density Control to Optimise Degree and Diameter N-5Cw Use density control and long link overlays to optimise the tradeoff between dense low-diameter and sparse high-diameter wireless networks. HSN-AT-29
30 Policy-based routing Network Scale Practical Constraints Network provider deployment complex topologies peering not high-performance many hops/pop Administrative Constraints Increase the Importance of Good Design Backbone A Backbone W Backbone S MAN B MAN V 2 1 N-III.2 Policy and administrative constraints distort the criteria that govern the application of many high-performance network design principles. The importance of good (principled) design is elevated when these constraints are present. HSN-AT-30
31 Network Architecture and Topology Resource Tradeoffs AT.1 Topology and geography AT.2 Scale AT.3 Resource tradeoffs AT.3.1 Bandwidth, processing, and memory AT.3.2 Latency as a constraint AT.3.3 Relative scaling with high speed AT.2.4 Active networking HSN-AT-31
32 Resource Tradeoffs Resources and Constraints Network is a collection of resources and constraints: P processing M memory B bandwidth E energy or power L latency $ monetary cost Relative composition must be balanced to optimise cost and performance determine topology, engineering, and functional placement Network Resource Tradeoff & Engineering Principle N-2 Networks are collections of resources. The relative composition of these resources must be balanced to optimise cost and performance, and to determine network topology, engineering, and functional placement. HSN-AT-32
33 Resource Tradeoffs Resources and Constraints Network is a collection of resources and constraints: P processing M memory B bandwidth E energy or power L latency $ monetary cost Relative composition must be balanced to optimise cost and performance determine topology, engineering, and functional placement Objective function to determine optimal mix ( (P), (B), (M), (E), (L)) HSN-AT-33
34 Example 3.5 Example: content cache location Resource Tradeoffs $(B) =, $(M) = 0 where goes the content? Content Cache Location HSN-AT-34
35 Example 3.5 Resource Tradeoffs Content Cache Location Example: content cache location $(B) =, $(M) = 0 everyone has local copy of everything $(B) = 0, $(M) = where goes the content? HSN-AT-35
36 Example 3.5 Resource Tradeoffs Content Cache Location Example: content cache location $(B) =, $(M) = 0 everyone has local copy of everything $(B) = 0, $(M) = single copy on server: stream every time demanded HSN-AT-36
37 Example 3.5 Resource Tradeoffs Content Cache Location Example: content cache location $(B) =, $(M) = 0 everyone has local copy of everything $(B) = 0, $(M) = single copy on server: stream every time demanded is this realistic? HSN-AT-37
38 Example 3.5 Resource Tradeoffs Content Cache Location Example: content cache location $(B) =, $(M) = 0 everyone has local copy of everything $(B) = 0, $(M) = single copy on server: stream every time demanded M and B both have finite (and bounded cost): solution? HSN-AT-38
39 Example 3.5 Resource Tradeoffs Content Cache Location Example: content cache location plot cost of bandwidth vs. depth in network distribution tree cost bandwidth root normalized depth leaves HSN-AT-39
40 Example 3.5 Resource Tradeoffs Content Cache Location Example: content cache location plot cost of bandwidth vs. depth in network distribution tree plot cost of memory cost memory bandwidth root normalized depth leaves HSN-AT-40
41 Example 3.5 Resource Tradeoffs Content Cache Location Example: content cache location plot cost of bandwidth plot cost of memory what next? cost memory bandwidth root normalized depth leaves HSN-AT-41
42 Example 3.5 Resource Tradeoffs Content Cache Location Example: content cache location plot cost of bandwidth plot cost of memory l opt = min[ (B) + (M)] optimal level l cost memory bandwidth root normalized depth l opt leaves HSN-AT-42
43 Example 3.5 Resource Tradeoffs Content Cache Location Example: content cache location plot cost of bandwidth plot cost of memory l opt = min[ (B) + (M)] optimal level l latency constrains level maximum distance from client cost memory l opt = max(l Lmax, l opt ) bandwidth root normalized depth l opt l lat leaves HSN-AT-43
44 Resource Tradeoffs Relative Scaling Relative scaling of resources is important if all resources/constraints scale uniformly, no change speed of light remains constant latency becomes relatively more important bandwidth- -delay product requires increasing M technology scales non-uniformly example: Moore s law increase in P enables IP lookup/classification in hardware, active networking Resource Tradeoffs Change and Enable New Paradigms N-2A The relative cost of resources and constraints changes over time due to non-uniform advances in different aspects of technology. This should motivate constant rethinking about the way in which networks are structured and used. HSN-AT-44
45 Resource Tradeoffs Active Networking Decreasing cost of processing and memory enables more computation in the network nodes Active networking strong AN users inject capsules of code executed on nodes moderate AN network service providers provisions protocols and services may be dynamically provisioned with active packets HSN-AT-45
46 High-Performance Networking Acknowledgements The material in these foils comes from the textbook supplementary materials: Sterbenz & Touch, High-Speed Networking: A Systematic Approach to High-Bandwidth Low-Latency Communication HSN-AT-46
High-Speed Networking: A Systematic Approach to High-Bandwidh Low-Latency Communication
High-Speed Networking: A Systematic Approach to High-Bandwidth Low-Latency Communication James P.G. Sterbenz University of Kansas EECS/ITTC Lancaster University Computing Dept. jpgs@sterbenz.org http://hsn-book.sterbenz.org
More informationHigh-Speed Networking: A Systematic Approach to High-Bandwidth Low-Latency Communication
High-Speed Networking: A Systematic Approach to High-Bandwidth Low-Latency Communication James P.G. Sterbenz The University of Kansas EECS/ITTC Lancaster University Computing Dept. / InfoLab21 jpgs@sterbenz.org
More informationITTC Science of Communication Networks The University of Kansas EECS 784 Identifiers, Names, and Addressing
Science of Communication Networks The University of Kansas EECS 784 Identifiers, Names, and Addressing James P.G. Sterbenz Department of Electrical Engineering & Computer Science Information Technology
More informationHands-On Metro Ethernet Carrier Class Networks
Hands-On Carrier Class Networks Course Description Carriers have offered connectivity services based on traditional TDM, Frame Relay and ATM for many years. However customers now use Ethernet as the interface
More informationITTC Communication Networks Laboratory The University of Kansas EECS 563 Introduction to Protocol Analysis with Wireshark
Communication Networks Laboratory The University of Kansas EECS 563 Introduction to Protocol Analysis with Wireshark Trúc Anh N. Nguyễn, Egemen K. Çetinkaya, Mohammed Alenazi, and James P.G. Sterbenz Department
More informationITTC Communication Networks Laboratory The University of Kansas EECS 780 Introduction to Protocol Analysis with Wireshark
Communication Networks Laboratory The University of Kansas EECS 780 Introduction to Protocol Analysis with Wireshark Trúc Anh N. Nguyễn, Egemen K. Çetinkaya, Mohammed Alenazi, and James P.G. Sterbenz Department
More informationCSMA based Medium Access Control for Wireless Sensor Network
CSMA based Medium Access Control for Wireless Sensor Network H. Hoang, Halmstad University Abstract Wireless sensor networks bring many challenges on implementation of Medium Access Control protocols because
More informationData Communication. Introduction of Communication. Data Communication. Elements of Data Communication (Communication Model)
Data Communication Introduction of Communication The need to communicate is part of man s inherent being. Since the beginning of time the human race has communicated using different techniques and methods.
More informationMobile Wireless Networking Energy Management
Mobile Wireless Networking The University of Kansas EECS 882 Energy Management James P.G. Sterbenz Department of Electrical Engineering & Computer Science Information Technology & Telecommunications Research
More informationITTC High-Performance Networking The University of Kansas EECS 881 Control and Signalling
High-Performance Networking The University of Kansas EEC 881 Control and ignalling James P.G. terbenz Department of Electrical Engineering & Computer cience Information Technology & Telecommunications
More informationLAN design. Chapter 1
LAN design Chapter 1 1 Topics Networks and business needs The 3-level hierarchical network design model Including voice and video over IP in the design Devices at each layer of the hierarchy Cisco switches
More informationWIRELESS SENSOR NETWORK
1 WIRELESS SENSOR NETWORK Dr. H. K. Verma Distinguished Professor (EEE) Sharda University, Greater Noida (Formerly: Deputy Director and Professor of Instrumentation Indian Institute of Technology Roorkee)
More informationOperating Systems CS 571
Computer Networks: Overview Operating Systems CS 571 Network types Range Bandwidth (Mbps) Latency (ms) LAN 1-2 kms 10-1000 1-10 WAN worldwide 0.010-600 100-500 MAN 2-50 kms 1-150 10 Wireless LAN 0.15-1.5
More informationTop-Down Network Design
Top-Down Network Design Chapter Five Designing a Network Topology Original slides copyright by Cisco Press & Priscilla Oppenheimer Network Topology Design Issues Hierarchy Redundancy Modularity Well-defined
More informationLayer 3: Network Layer. 9. Mar INF-3190: Switching and Routing
Layer 3: Network Layer 9. Mar. 2005 1 INF-3190: Switching and Routing Network Layer Goal Enable data transfer from end system to end system End systems Several hops, (heterogeneous) subnetworks Compensate
More informationLAN Systems. Bus topology LANs
Bus topology LANs LAN Systems Design problems: not only MAC algorithm, not only collision domain management, but at the Physical level the signal balancing problem (signal adjustment): Signal must be strong
More informationTOC: Switching & Forwarding
TOC: Switching & Forwarding Why? Switching Techniques Switch Characteristics Switch Examples Switch Architectures Summary TOC Switching Why? Direct vs. Switched Networks: n links Single link Direct Network
More informationMulti Protocol Label Switching
MPLS Multi-Protocol Label Switching Andrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.it/ Network Management and QoS Provisioning - 1 MPLS: introduction
More informationMPLS Multi-Protocol Label Switching
MPLS Multi-Protocol Label Switching Andrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.it/ Computer Networks Design and Management - 1 MPLS: introduction
More informationCiprian Stroe Senior Presales Consultant, CCIE# Cisco and/or its affiliates. All rights reserved.
Ciprian Stroe Senior Presales Consultant, CCIE#45766 2015 Cisco and/or its affiliates. All rights reserved. Complete cloud-managed networking solution Wireless, switching, security, MDM Integrated hardware,
More informationEEC-484/584 Computer Networks
EEC-484/584 Computer Networks Lecture 2 Wenbing Zhao wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Misc. Interested in research? Secure
More informationChapter 6 Connecting Device
Computer Networks Al-Mustansiryah University Elec. Eng. Department College of Engineering Fourth Year Class Chapter 6 Connecting Device 6.1 Functions of network devices Separating (connecting) networks
More informationChapter 16 Networking
Chapter 16 Networking Outline 16.1 Introduction 16.2 Network Topology 16.3 Network Types 16.4 TCP/IP Protocol Stack 16.5 Application Layer 16.5.1 Hypertext Transfer Protocol (HTTP) 16.5.2 File Transfer
More informationIT4405 Computer Networks (Compulsory)
IT4405 Computer Networks (Compulsory) INTRODUCTION This course provides a comprehensive insight into the fundamental concepts in data communications, computer network systems and protocols both fixed and
More informationIntroduction to Networking
Introduction to Networking The fundamental purpose of data communications is to exchange information between user's computers, terminals and applications programs. Simplified Communications System Block
More informationITTC Introduction to Communication Networks The University of Kansas EECS 563 End-to-End Transport
Introduction to Communication Networks The University of Kansas EECS 563 End-to-End Transport James P.G. Sterbenz Department of Electrical Engineering & Computer Science Information Technology & Telecommunications
More informationOPTIMIZING MOBILITY MANAGEMENT IN FUTURE IPv6 MOBILE NETWORKS
OPTIMIZING MOBILITY MANAGEMENT IN FUTURE IPv6 MOBILE NETWORKS Sandro Grech Nokia Networks (Networks Systems Research) Supervisor: Prof. Raimo Kantola 1 SANDRO GRECH - OPTIMIZING MOBILITY MANAGEMENT IN
More informationVirtualization of networks
Virtualization of networks Virtualization of resources: powerful abstraction in systems engineering Computing examples: Virtual memory, virtual devices Virtual machines: e.g., Java IBM VM OS from 1960
More informationInternet II. CS10 : Beauty and Joy of Computing. cs10.berkeley.edu. !!Senior Lecturer SOE Dan Garcia!!! Garcia UCB!
cs10.berkeley.edu CS10 : Beauty and Joy of Computing Internet II!!Senior Lecturer SOE Dan Garcia!!!www.cs.berkeley.edu/~ddgarcia CS10 L17 Internet II (1)! Why Networks?! Originally sharing I/O devices
More informationE-Commerce. Infrastructure I: Computer Networks
E-Commerce Infrastructure I: Computer Networks Almost all computers today are networked or part of a distributed system. I will provide an overview of networking and a basic description of network technology.
More informationITTC High-Performance Networking The University of Kansas EECS 881 End-to-End Transport
High-Performance Networking The University of Kansas EECS 881 End-to-End Transport James P.G. Sterbenz Department of Electrical Engineering & Computer Science Information Technology & Telecommunications
More informationSensor Network Protocols
EE360: Lecture 15 Outline Sensor Network Protocols Announcements 2nd paper summary due March 7 Reschedule Wed lecture: 11-12:15? 12-1:15? 5-6:15? Project poster session March 15 5:30pm? Next HW posted
More informationDistributed Queue Dual Bus
Distributed Queue Dual Bus IEEE 802.3 to 802.5 protocols are only suited for small LANs. They cannot be used for very large but non-wide area networks. IEEE 802.6 DQDB is designed for MANs It can cover
More informationNetwork Processors Outline
High-Performance Networking The University of Kansas EECS 881 James P.G. Sterbenz Department of Electrical Engineering & Computer Science Information Technology & Telecommunications Research Center The
More informationNetworking interview questions
Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected
More informationCS61C : Machine Structures
inst.eecs.berkeley.edu/~cs61c CS61C : Machine Structures Lecture 36 I/O : Networks TA Sameer The Yellow Dart Iyengar inst.eecs/~cs61c-ti Next year: Forget Elmo Get a Robot buddy New human-like robots that
More informationIntroducing Campus Networks
Cisco Enterprise Architecture Introducing Campus Networks 2003, Cisco Systems, Inc. All rights reserved. 2-1 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0 2-2 Campus Data Center Combines switching
More informationPervasive and Mobile Computing. Dr. Atiq Ahmed. Introduction Network Definitions Network Technologies Network Functions 1/38
Department of Computer Science & Information Technology University of Balochistan Course Objectives To discuss the fundamental problems in the emerging area of mobile and pervasive computing, along with
More informationTDT Appendix E Interconnection Networks
TDT 4260 Appendix E Interconnection Networks Review Advantages of a snooping coherency protocol? Disadvantages of a snooping coherency protocol? Advantages of a directory coherency protocol? Disadvantages
More informationNetwork Control and Signalling
Network Control and Signalling 1. Introduction 2. Fundamentals and design principles 3. Network architecture and topology 4. Network control and signalling 5. Network components 5.1 links 5.2 switches
More informationData Communications. Connecting Devices
Data Communications Connecting Devices Connecting Devices Networks do not normally operate in isolation. They are connected to one another or to the Internet. To connect LANs, or segments of LANs, we use
More informationCommunication has significant impact on application performance. Interconnection networks therefore have a vital role in cluster systems.
Cluster Networks Introduction Communication has significant impact on application performance. Interconnection networks therefore have a vital role in cluster systems. As usual, the driver is performance
More informationinternet technologies and standards
Institute of Telecommunications Warsaw University of Technology 2017 internet technologies and standards Piotr Gajowniczek Andrzej Bąk Michał Jarociński Internet datacenters Introduction Internet datacenters:
More informationData Center Interconnect Solution Overview
CHAPTER 2 The term DCI (Data Center Interconnect) is relevant in all scenarios where different levels of connectivity are required between two or more data center locations in order to provide flexibility
More informationTOC: Switching & Forwarding
TOC: Switching & Forwarding Why? Switching Techniques Switch Characteristics Switch Examples Switch Architectures Summary Why? Direct vs. Switched Networks: Single link Switches Direct Network Limitations:
More informationIntroduction. Computer Networks Term B10
Introduction Computer Networks Term B10 Introduction Outline Preliminary Definitions Internet Components Network Application Paradigms Classifying networks by transmission technology by size/scale by topology
More informationHands-On VPLS: Virtual Private LAN Service
Hands-On Course Description Carriers have offered connectivity services based on traditional TDM, Frame Relay and ATM for many years. However, the cost of operating separate networks to provide each of
More informationITTC Introduction to Communication Networks The University of Kansas EECS 563 Network Routing
Introduction to Communication Networks The University of Kansas EECS 563 Network Routing James P.G. Sterbenz Department of Electrical Engineering & Computer Science Information Technology & Telecommunications
More informationEnd-to-End Transport Outline
KU EECS 88 High-Performance Networking End-to-End Transport High-Performance Networking The University of Kansas EECS 88 End-to-End Transport James P.G. Sterbenz Department of Electrical Engineering &
More informationHY436: Network Virtualization
HY436: Network Virtualization 20/10/2014 Xenofontas Dimitropoulos Credits: Bing Wang, Rob Sherwood, Ben Pfaff, Nick Feamster Agenda Network virtualization basics Early Forms of Vnets Overlay networks VPNs
More informationToward a Reliable Data Transport Architecture for Optical Burst-Switched Networks
Toward a Reliable Data Transport Architecture for Optical Burst-Switched Networks Dr. Vinod Vokkarane Assistant Professor, Computer and Information Science Co-Director, Advanced Computer Networks Lab University
More informationLecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren
Lecture 9: Bridging CSE 123: Computer Networks Alex C. Snoeren Lecture 9 Overview Finishing up media access Ethernet Contention-free methods (rings) Moving beyond one wire Link technologies have limits
More informationInternetwork Expert s CCNP Bootcamp. Hierarchical Campus Network Design Overview
Internetwork Expert s CCNP Bootcamp Hierarchical Campus Network Design Overview http:// Hierarchical Campus Network Design Overview Per Cisco, a three layer hierarchical model to design a modular topology
More informationBridging and Switching Basics
CHAPTER 4 Bridging and Switching Basics This chapter introduces the technologies employed in devices loosely referred to as bridges and switches. Topics summarized here include general link-layer device
More informationIntroduction to Networks Network Types. BTEC Nat IT Computer Networks
Introduction to Networks Network Types 1 BTEC Nat IT Computer Networks Different types of Networks Understand the purpose of a computer network Create network drawings Understand Packet Switching BTEC
More informationData & Computer Communication
Basic Networking Concepts A network is a system of computers and other devices (such as printers and modems) that are connected in such a way that they can exchange data. A bridge is a device that connects
More informationITTC Communication Networks The University of Kansas EECS 780 End-to-End Transport
Communication Networks The University of Kansas EECS 780 End-to-End Transport James P.G. Sterbenz Department of Electrical Engineering & Computer Science Information Technology & Telecommunications Research
More informationComputer Network??? Why Computer Networks? Network Classification. Introduction to Computer Networks. Classification of a Computer network by Scale
Computer Network??? A computer network is an interconnection of a group of computers and the world of computers Introduction to Computer Networks Budditha Hettige Why Computer Networks? Resource Sharing
More informationPLEASE READ CAREFULLY BEFORE YOU START
Page 1 of 11 MIDTERM EXAMINATION #1 OCT. 16, 2013 COMPUTER NETWORKS : 03-60-367-01 U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E Fall 2013-75 minutes This examination
More informationSilberschatz and Galvin Chapter 15
Silberschatz and Galvin Chapter 15 Network Structures CPSC 410--Richard Furuta 3/30/99 1 Chapter Topics Background and motivation Network topologies Network types Communication issues Network design strategies
More informationITTC Mobile Wireless Networking The University of Kansas EECS 882 Mobile Ad Hoc Networks
Mobile Wireless Networking The University of Kansas EECS 882 Mobile Ad Hoc Networks James P.G. Sterbenz Department of Electrical Engineering & Computer Science Information Technology & Telecommunications
More informationWAN Edge MPLSoL2 Service
4 CHAPTER While Layer 3 VPN services are becoming increasing popular as a primary connection for the WAN, there are a much larger percentage of customers still using Layer 2 services such Frame-Relay (FR).
More informationRouting. 4. Mar INF-3190: Switching and Routing
Routing 4. Mar. 004 1 INF-3190: Switching and Routing Routing: Foundations! Task! To define the route of packets through the network! From the source! To the destination system! Routing algorithm! Defines
More informationCSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca
CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Jannotti Administrivia Homework I out later today, due next Thursday Today: Link Layer (cont.)
More informationIntroduction to Computer Networks. Budditha Hettige
Introduction to Computer Networks Budditha Hettige Computer Network??? A computer network is an interconnection of a group of computers and the world of computers Why Computer Networks? Resource Sharing
More informationCS61C : Machine Structures
CS61C L36 I/O : Networks (1) inst.eecs.berkeley.edu/~cs61c CS61C : Machine Structures Lecture 36 I/O : Networks TA Sameer The Yellow Dart Iyengar inst.eecs/~cs61c-ti Next year: Forget Elmo Get a Robot
More informationCSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca
CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Janno< Administrivia Homework I out later today, due next Thursday, Sep 25th Today: Link Layer
More informationInternet, Education, and Collaboration of USP. Kazunori Sugiura Sept 9 th 2002
Internet, Education, and Collaboration of USP Kazunori Sugiura uhyo@sfc.wide.ad.jp Sept 9 th 2002 Last lecture in USP Importance of better internet connectivity What kind of problem do we have Discuss
More informationNetworks. Distributed Systems. Philipp Kupferschmied. Universität Karlsruhe, System Architecture Group. May 6th, 2009
Networks Distributed Systems Philipp Kupferschmied Universität Karlsruhe, System Architecture Group May 6th, 2009 Philipp Kupferschmied Networks 1/ 41 1 Communication Basics Introduction Layered Communication
More informationRandomized User-Centric Clustering for Cloud Radio Access Network with PHY Caching
Randomized User-Centric Clustering for Cloud Radio Access Network with PHY Caching An Liu, Vincent LAU and Wei Han the Hong Kong University of Science and Technology Background 2 Cloud Radio Access Networks
More informationCS61C : Machine Structures
inst.eecs.berkeley.edu/~cs61c CS61C : Machine Structures Lecture 36 I/O : Networks 2008-04-25 TA Brian Zimmer CS61C L36 I/O : Networks (1) inst.eecs/~cs61c-th NASA To Develop Small Satellites NASA has
More informationCSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca
CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Janno< Administrivia Homework I out later today, due next ursday, Sep 27th Today: Link Layer
More informationContents. Introduction to Networking. Preface...i. Introduction... xix
Contents Introduction to Networking Introduction to Networking Preface...i Key Topics...i Course Objectives...ii Pedagogical Features...ii Learning Objectives, Unit Summaries, Discussion Questions, and
More informationIntroductions. Computer Networking Lecture 01. January 16, HKU SPACE Community College. HKU SPACE CC CN Lecture 01 1/36
Introductions Computer Networking Lecture 01 HKU SPACE Community College January 16, 2012 HKU SPACE CC CN Lecture 01 1/36 Outline What is a Computer Network? Basic Requirements of Building a Computer Network
More informationMetro Ethernet Design and Engineering for CO
Hands-On Metro Ethernet Design and Engineering for CO Designing Carrier Networks that Deliver Metro Ethernet Services Course Description Carriers have offered connectivity services based on traditional
More informationMTA_98-366_Vindicator930
MTA_98-366_Vindicator930 Number: 98-366 Passing Score: 700 Time Limit: 45 min File Version: 1.0 http://www.gratisexam.com/ Microsoft Technology Associate Networking Fundamentals MTA 98-366 Exam A QUESTION
More informationCSCD 433/533 Advanced Networks
CSCD 433/533 Advanced Networks Lecture 2 Network Review Winter 2017 Reading: Chapter 1 1 Topics Network Topics Some Review from CSCD330 Applications Common Services Architecture OSI Model AS and Routing
More informationReview of the 5 Criteria
Review of the 5 Criteria Howard Frazier Broadcom Corporation September, 2006 IEEE 802.3 HSSG 1 Outline Audience Purpose 5 Criteria Guidelines for responses Summary Successful examples IEEE 802.3 HSSG 2
More informationTCP/IP THE TCP/IP ARCHITECTURE
TCP/IP-1 The Internet Protocol (IP) enables communications across a vast and heterogeneous collection of networks that are based on different technologies. Any host computer that is connected to the Internet
More information6 Computer Networks 6.1. Foundations of Computer Science Cengage Learning
6 Computer Networks 6.1 Foundations of Computer Science Cengage Learning Objectives After studying this chapter, the student should be able to: 6.2 Describe network criteria, physical structures and categories
More informationRMIT University. Data Communication and Net-Centric Computing COSC 1111/2061/1110. Lecture 8. Medium Access Control Methods & LAN
RMIT University Data Communication and Net-Centric Computing COSC 1111/2061/1110 Medium Access Control Methods & LAN Technology Slide 1 Lecture Overview During this lecture, we will Look at several Multiple
More informationBrocade: Landmark Routing on Peer to Peer Networks. Ling Huang, Ben Y. Zhao, Yitao Duan, Anthony Joseph, John Kubiatowicz
Brocade: Landmark Routing on Peer to Peer Networks Ling Huang, Ben Y. Zhao, Yitao Duan, Anthony Joseph, John Kubiatowicz State of the Art Routing High dimensionality and coordinate-based P2P routing Decentralized
More informationCSCI Computer Networks
CSCI-1680 - Computer Networks Link Layer III: LAN & Switching Chen Avin Based partly on lecture notes by David Mazières, Phil Levis, John Jannotti, Peterson & Davie, Rodrigo Fonseca Today: Link Layer (cont.)
More informationMASERGY S MANAGED SD-WAN
MASERGY S MANAGED New Performance Options for Hybrid Networks Business Challenges WAN Ecosystem Features and Benefits Use Cases INTRODUCTION Organizations are leveraging technology to transform the way
More informationIntroduction. Computer Networks: Introduction 1
Introduction Computer Networks: Introduction 1 Network Definitions and Classification Preliminary definitions and network terminology Sample application paradigms Classifying networks by transmission technology
More informationQoS and System Capacity Optimization in WiMAX Multi-hop Relay Using Flexible Tiered Control Technique
2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore QoS and System Capacity Optimization in WiMAX Multi-hop Relay Using Flexible Tiered
More informationCompTIA Network+ Study Guide Table of Contents
CompTIA Network+ Study Guide Table of Contents Course Introduction Table of Contents Getting Started About This Course About CompTIA Certifications Module 1 / Local Area Networks Module 1 / Unit 1 Topologies
More informationArchitectural Considerations. Lecture 16: Prof. Shervin Shirmohammadi SITE, University of Ottawa. Prof. Shervin Shirmohammadi CEG
Lecture 16: Architectural Considerations Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4185 16-1 Network Architecture Architecture: high-level, end-to-end structure
More informationLecture 16: Architectural Considerations
Lecture 16: Architectural Considerations Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4185 16-1 Network : high-level, end-to-end structure for the network. Relationships
More informationNon-Uniform Memory Access (NUMA) Architecture and Multicomputers
Non-Uniform Memory Access (NUMA) Architecture and Multicomputers Parallel and Distributed Computing Department of Computer Science and Engineering (DEI) Instituto Superior Técnico February 29, 2016 CPD
More informationPUCPR. Internet Protocol. Edgard Jamhour E N G L I S H S E M E S T E R
PUCPR Internet Protocol Address Resolution and Routing Edgard Jamhour 2014 E N G L I S H S E M E S T E R 1. Address Resolution The IP address does not identify, indeed, a computer, but a network interface.
More informationINTERNATIONAL LAW ENFORCEMENT CCTV NETWORK SERVICES
INTERNATIONAL LAW ENFORCEMENT CCTV NETWORK SERVICES CASE STUDY Application of High-Assurance Network Encryption Sector: Use Case: Solution: Goverment CCTV security HD video transmission in real time Layer
More informationReminder: Datalink Functions Computer Networking. Datalink Architectures
Reminder: Datalink Functions 15-441 15 441 15-641 Computer Networking Lecture 5 Media Access Control Peter Steenkiste Fall 2015 www.cs.cmu.edu/~prs/15-441-f15 Framing: encapsulating a network layer datagram
More informationInternetworking Part 1
CMPE 344 Computer Networks Spring 2012 Internetworking Part 1 Reading: Peterson and Davie, 3.1 22/03/2012 1 Not all networks are directly connected Limit to how many hosts can be attached Point-to-point:
More informationINTERNATIONAL LAW ENFORCEMENT HD CCTV NETWORK
INTERNATIONAL LAW ENFORCEMENT HD CCTV NETWORK CASE STUDY Application of High-Assurance Network Encryption Sector: Use Case: Solution: Government CCTV security Real-time HD video transmission across Layer
More informationA Cluster-Based Energy Balancing Scheme in Heterogeneous Wireless Sensor Networks
A Cluster-Based Energy Balancing Scheme in Heterogeneous Wireless Sensor Networks Jing Ai, Damla Turgut, and Ladislau Bölöni Networking and Mobile Computing Research Laboratory (NetMoC) Department of Electrical
More informationCisco Virtualized Workload Mobility Introduction
CHAPTER 1 The ability to move workloads between physical locations within the virtualized Data Center (one or more physical Data Centers used to share IT assets and resources) has been a goal of progressive
More informationFunctional Requirements for Grid Oriented Optical Networks
Functional Requirements for Grid Oriented Optical s Luca Valcarenghi Internal Workshop 4 on Photonic s and Technologies Scuola Superiore Sant Anna Pisa June 3-4, 2003 1 Motivations Grid networking connection
More informationIntroduction to Network Technologies & Layered Architecture BUPT/QMUL
Introduction to Network Technologies & Layered Architecture BUPT/QMUL 2015-3-5 Review What is the Internet? How does it work? When & how did it come about? Who controls it? Where is it going? 2 Agenda
More informationNon-Uniform Memory Access (NUMA) Architecture and Multicomputers
Non-Uniform Memory Access (NUMA) Architecture and Multicomputers Parallel and Distributed Computing Department of Computer Science and Engineering (DEI) Instituto Superior Técnico September 26, 2011 CPD
More information