CS 455. Week Data Communications and Networking - Behrouz A Forouzan Edition: 4.
|
|
- Bruno Wilkinson
- 6 years ago
- Views:
Transcription
1 CS 455 Week 15 Reading: 1. Data Communications and Networking - Behrouz A Forouzan Edition: 4. Objectives: 1. To implement and present the concepts described in the Project Description. Concepts: 1. Project Presentation Outline: 1. Project Presentation a. Application Layer b. Data Link Layer c. TX/RX Layer d. Circuit Layer References: 1. See the assigned text book. CS 455 Week 15 Page 1
2 CS 455 Week 15 Lecture Notes 1. Application Layer Application layer provides a user interface, which has 11 menu items (or functions): 1. Set Timer 2. Set frame size 3. Enter messages or Load text les 4. Idle RQ (Non-error) 4 ( ) 5. Idle RQ - Implicit I-frame error 6. Idle RQ - Implicit ACK-frame error 7. Idle RQ - Explicit I-frame error 8. Idle RQ - Explicit NAK-frame error 9. Continuous RQ - Non-error 10. Continuous RQ - Corrupted I-frame 11. Exit Menu 1 Set Timer Set how long a timer will expire Use actual time (e.g. msec) Menu 2 Set frame size Set how many bytes of data in one I frame Default: 1/3 of the length of the message Menu 3 Input Messages Enter messages to be sent Or load TXT file as message Menu 4 10 Simulations Simulate different errors for communication protocols Once any menu is selected, communication between both sides will start, following the rules of selected menu Message can only be sent in frame o Default frame size is 1/3 of the message or loaded file o Primary need to send multiple frames to Secondary Menu 4 Idle RQ (Non-error mode) Here, the program simulates non error mode of Idle RQ (no I-Frame, ACK or NACK frame is corrupted or missing) CS 455 Week 15 Page 2
3 Menu 5 and 6. Implicit error mode Simulate implicit Idle RQ protocol In these two simulations, S (secondary) send ACK back only if correctly received frames. S never sends NACK back to P. No ACK indicates corrupted frames P (Primary) re-sent if there is no ACK within a timer limit Menu 5. Implicit I-Frame error mode S does receive a frame, however some bits (flag) of the flame will indicate this frame is lost or wrong. So S does nothing. Menu 6. Implicit ACK error mode Notice: P does receive ACK(N), however there are some bits (flag) in the ACK(N) message will indicate this ACK is lost or malfunction (e.g., become a NACK). Menu 7 and 8. Explicit error mode These two menus simulate explicit Idle RQ protocol o In these two simulations, S (secondary) send ACK back only if correctly received frames. If not correctly received, S sends NACK back to P. o NACK indicates corrupted frames o P (Primary) resent the frames if it received a NACK Menu 7. Explicit I-frame error mode S does receive a frame, however some bits (flag) of the flame will indicate this frame is corrupted or not. If it is corrupted then S sends NACK. CS 455 Week 15 Page 3
4 Menu 8. Explicit NACK error mode While S sending NACK back to P, the NACK is corrupted. o Design and implement your mode o Provide your mechanism in document o Handle as many error cases as possible. For example: NACK lost; NACK malfunction. Menu 9 and 10. Continuour RQ For these two simulations, data link layer needs to maintain a retransmission list. o Menu 9 : See Lecture notes o Menu 10 : Use selective repeat Other Menus Menu 11 terminates the client-side program If necessary, you should add your own menus o For example, to set corrupted I-frame number or to select error type 2. Data Link Layer Thru application layer, user specify: protocol, error mode, message, etc. Data link layer fill these information into an package, before it is transmitted. So, in data link layer o Define format of IFrame, ACK frame, NACK frame o Write down your definition into document in details and indicate the function of each bit in your message CS 455 Week 15 Page 4
5 Both Primary and Secondary should log all the events (operations) into log file. For example, Primary side(file: client_log): Menu 3, timer duration of 2, corrupted frame number 2 4 (total # of frames receive) >> Send I-frame N(S) = 1 << Receive ACK-frame N(R) = 1 Wait idle time 1 Expire timer idle time 2 and timer is expired. << Receive ACK-frame N(R) = 2 >> Send I-frame N(S) = 3 << Receive ACK-frame N(R) = 3 Secondary side (file server_log) E.g.: Menu 3, timer duration is 2 seconds, corrupted frame number is 2 << Receive I-frame N(S) = 1 >> Send ACK-frame N(R) = 1 << Receive I-frame N(S) = 2 (Frame lost/wrong, do nothing) << Receive I-frame N(S) = 2 >> Send ACK-frame N(R) = 2 << Receive I-frame N(S) = 3 >> Send ACK-frame N(R) = 3 3. TX/RX and Circuit Layer TX/RX Layer o TX (transmitter) puts data into circuit layer o RX (receiver) retrieves data from circuit layer Circuit Layer o Circuit layer simulates a physical circuit, there is no physical circuit in this project. o You should use sockets to implement the communication between the primary and the secondary Test Case Example To test menu 5: Start Server (Secondary) First. Start Client (Primary), connect with S. CS 455 Week 15 Page 5
6 1. Set Timer 2 (here use second as an example) 2. Set frame size 20 (default byte) 3. Select Implicit Iframe error mode 4. Input Message: This project is to simulate the error control! 5. Press send button or press enter key on the keyboard 6. Check expected results on both sides Results at Server Side Contents of File data This project is to simulate the error control! Contents of File server_log Simulating: Idle RQ Implicit I-frame error << Receive I-frame N(S) = 1 >> Send ACK-frame N(R) = 1 << R i Receive I-frame N(S) = 2 (Frame lost/wrong) << Receive I-frame N(S) = 2 >> Send ACK-frame N(R) = 2 << Receive I-frame N(S) = 3 >> Send ACK-frame N(R) = 3 3 (total # of frames receive) Results at Client Side Contents of File client_log Simulating: Idle RQ Implicit I-frame error 3 (total # of frames will be sent) >> Send I-frame N(S) = 1 << Receive ACK-frame N(R) = 1 >> idle time 1 >> Expire timer idle time 2 and timer is expired. << Receive ACK-frame N(R) = 2 >> Send I-frame N(S) = 3 << Receive ACK-frame N(R) = 3 CS 455 Week 15 Page 6
10.1 REVIEW QUESTIONS
CHAPTER 10 Data Link Control 10.1 REVIEW QUESTIONS 1. Transmission means to put a signal on a line. Communication is a meaningful and orderly relationship between devices that send and receive data. 3.
More informationCS 421: Computer Networks SPRING MIDTERM I April 7, minutes
CS 421: Computer Networks SPRING 24 MIDTERM I April 7, 24 12 minutes Name: Student No: 1) a) Consider a 1 Mbits/sec channel with a 1 msec one-way propagation delay. We want to transfer a file of size 8
More informationLecture 26: Data Link Layer
Introduction We have seen in previous lectures that the physical layer is responsible for the transmission of row bits (Ones and Zeros) over the channel. It is responsible for issues related to the line
More informationThe Transport Layer Reliability
The Transport Layer Reliability CS 3, Lecture 7 http://www.cs.rutgers.edu/~sn4/3-s9 Srinivas Narayana (slides heavily adapted from text authors material) Quick recap: Transport Provide logical communication
More informationChapter 3. The Data Link Layer. Wesam A. Hatamleh
Chapter 3 The Data Link Layer The Data Link Layer Data Link Layer Design Issues Error Detection and Correction Elementary Data Link Protocols Sliding Window Protocols Example Data Link Protocols The Data
More informationOutline. CS5984 Mobile Computing
CS5984 Mobile Computing Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Outline Review Transmission Control Protocol (TCP) Based on Behrouz Forouzan, Data Communications and Networking,
More informationChapter 11 Data Link Control 11.1
Chapter 11 Data Link Control 11.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 11-1 FRAMING The data link layer needs to pack bits into frames, so that each
More informationChapter 11 Data Link Control 11.1
Chapter 11 Data Link Control 11.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 11-1 1 FRAMING The data link layer needs to pack bits into frames,, so that
More informationData Link Layer. Goals of This Lecture. Engineering Questions. Outline of the Class
Data Link Layer Kuang Chiu Huang TCM NCKU Goals of This Lecture Through the lecture and in-class discussion, students are enabled to describe role and functions of the link layer, and compare different
More informationI. INTRODUCTION. each station (i.e., computer, telephone, etc.) directly connected to all other stations
I. INTRODUCTION (a) Network Topologies (i) point-to-point communication each station (i.e., computer, telephone, etc.) directly connected to all other stations (ii) switched networks (1) circuit switched
More informationERROR AND FLOW CONTROL. Lecture: 10 Instructor Mazhar Hussain
ERROR AND FLOW CONTROL Lecture: 10 Instructor Mazhar Hussain 1 FLOW CONTROL Flow control coordinates the amount of data that can be sent before receiving acknowledgement It is one of the most important
More informationPolitecnico di Milano Scuola di Ingegneria Industriale e dell Informazione. Link Layer. Fundamentals of Communication Networks
Politecnico di Milano Scuola di Ingegneria Industriale e dell Informazione Link Layer Fundamentals of Communication Networks Data Link layer o It is the first logical layer in the protocol stack o Functions
More information16.682: Communication Systems Engineering. Lecture 17. ARQ Protocols
16.682: Communication Systems Engineering Lecture 17 ARQ Protocols Eytan Modiano Automatic repeat request (ARQ) Break large files into packets FILE PKT H PKT H PKT H Check received packets for errors Use
More informationChapter 11 Data Link Control 11.1
Chapter 11 Data Link Control 11.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 11-1 FRAMING The data link layer needs to pack bits into frames, so that each
More informationfile:///c:/users/hpguo/dropbox/website/teaching/fall 2017/CS4470/H...
1 of 9 11/26/2017, 11:28 AM Homework 3 solutions 1. A window holds bytes 2001 to 5000. The next byte to be sent is 3001. Draw a figure to show the situation of the window after the following two events:
More informationReliable Transport : Fundamentals of Computer Networks Bill Nace
Reliable Transport 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross Administration Stuff is due HW #1
More informationThe flow of data must not be allowed to overwhelm the receiver
Data Link Layer: Flow Control and Error Control Lecture8 Flow Control Flow and Error Control Flow control refers to a set of procedures used to restrict the amount of data that the sender can send before
More informationChapter 7: Data Link Control. Data Link Control Protocols
Chapter 7: Data Link Control CS420/520 Axel Krings Page 1 Data Link Control Protocols Need layer of logic above Physical to manage exchange of data over a link frame synchronization flow control error
More informationChapter 7: Data Link Control. CS420/520 Axel Krings Page 1
Chapter 7: Data Link Control CS420/520 Axel Krings Page 1 Data Link Control Protocols Need layer of logic above Physical to manage exchange of data over a link frame synchronization flow control error
More informationLecture 11 Overview. Last Lecture. This Lecture. Next Lecture. Medium Access Control. Flow and error control Source: Sections , 23.
Last Lecture Lecture 11 Overview Medium Access Control This Lecture Flow and error control Source: Sections 11.1-11.2, 23.2 Next Lecture Local Area Networks 1 Source: Sections 13 Data link layer Logical
More informationSTEVEN R. BAGLEY PACKETS
STEVEN R. BAGLEY PACKETS INTRODUCTION Talked about how data is split into packets Allows it to be multiplexed onto the network with data from other machines But exactly how is it split into packets and
More informationProgramming Assignment 2 (50 pts) Due: 9 a.m. Friday, February 8, Data Link Layer Client and Server Processes Using Tanenbaum s PAR Protocol
Programming Assignment 2 (50 pts) Due: 9 a.m. Friday, February 8, 2001 Data Link Layer Client and Server Processes Using Tanenbaum s PAR Protocol Introduction This assignment exposes the student to data
More informationCS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP
CS 5520/ECE 5590NA: Network Architecture I Spring 2008 Lecture 13: UDP and TCP Most recent lectures discussed mechanisms to make better use of the IP address space, Internet control messages, and layering
More informationCommunication Networks
Communication Networks Prof. Laurent Vanbever Exercises week 4 Reliable Transport Reliable versus Unreliable Transport In the lecture, you have learned how a reliable transport protocol can be built on
More informationProgramming Assignment 2
Programming Assignment 2 50 pts. Sending Photos to a Photo Server Due: Thursday, November 17, 2005 1 p.m. Introduction The goal of this assignment is to send a set of digital photographs from a single
More information23-3 TCP. Topics discussed in this section: TCP Services TCP Features Segment A TCP Connection Flow Control Error Control 23.22
23-3 TCP 23.22 TCP is a connection-oriented protocol; it creates a virtual connection between two TCPs to send data. In addition, TCP uses flow and error control mechanisms at the transport level. Topics
More informationReliable Services. Implies... Reliability. Stop and Wait / Idle ARQ. Recovery by Timer Using Stop and Wait
Reliability Services G Fairhurst (c) 998 G Fairhurst (c) 998 efinition of Reliability Stop & wait ARQ s N Implies... All information is received No information is duplicated (no loss, no residual errors)
More informationDepartment of Computer and IT Engineering University of Kurdistan. Data Communication Netwotks (Graduate level) Data Link Layer
Department of Computer and IT Engineering University of Kurdistan Data Communication Netwotks (Graduate level) Data Link Layer By: Dr. Alireza Abdollahpouri Data Link Layer 2 Data Link Layer Application
More informationLecture 6: The Transport Layer
Lecture 6: The Transport Layer Reliable data delivery No lost data No duplicate data Computer Networks, Fall 2015 2 applicabon transport network link physical Computer Networks, Fall 2015 3 message app
More informationCOMPUTER NETWORKS - Window protocols
ARQ techniques (window protocols) Gruppo Reti TLC nome.cognome@polito.it http://www.telematica.polito.it/ Copyright Quest opera è protetta dalla licenza Creative Commons NoDerivs-NonCommercial. Per vedere
More informationCOMPUTER NETWORKS - Window protocols
ARQ techniques (window protocols) Gruppo Reti TLC nome.cognome@polito.it http://www.telematica.polito.it/ COMPUTER NETWORKS Window protocols - 1 Copyright Quest opera è protetta dalla licenza Creative
More informationCS118 Discussion 1A, Week 3. Zengwen Yuan Dodd Hall 78, Friday 10:00 11:50 a.m.
CS118 Discussion 1A, Week 3 Zengwen Yuan Dodd Hall 78, Friday 10:00 11:50 a.m. 1 Outline Application Layer Protocol: DNS, CDN, P2P Transport Layer Protocol: UDP, principles of reliable transport protocol
More informationOutline. EEC-484/584 Computer Networks. Data Link Layer Design Issues. Framing. Lecture 6. Wenbing Zhao Review.
EEC-484/584 Computer Networks Lecture 6 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline Review Data Link Layer Design Issues Error
More informationFlow control: Ensuring the source sending frames does not overflow the receiver
Layer 2 Technologies Layer 2: final level of encapsulation of data before transmission over a physical link responsible for reliable transfer of frames between hosts, hop by hop, i.e. on a per link basis
More informationELEN Network Fundamentals Lecture 15
ELEN 4017 Network Fundamentals Lecture 15 Purpose of lecture Chapter 3: Transport Layer Reliable data transfer Developing a reliable protocol Reliability implies: No data is corrupted (flipped bits) Data
More informationAdvanced Computer Networks. Rab Nawaz Jadoon DCS. Assistant Professor COMSATS University, Lahore Pakistan. Department of Computer Science
Advanced Computer Networks Rab Nawaz Jadoon Department of Computer Science DCS COMSATS Institute of Information Technology Assistant Professor COMSATS University, Lahore Pakistan Advanced Computer Networks
More informationTelecommunication Protocols Laboratory Course. Lecture 2
Telecommunication Protocols Laboratory Course Lecture 2 Last time We began our study of telecommunication protocols at the Logical Link Control sub-layer (LLC) LLC issues Connectionless vs connection-oriented
More informationData Link Control Protocols
Protocols : Introduction to Data Communications Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 23 May 2012 Y12S1L07, Steve/Courses/2012/s1/its323/lectures/datalink.tex,
More informationChapter 5 Peer-to-Peer Protocols. School of Info. Sci. & Eng. Shandong Univ..
hapter 5 Peer-to-Peer Protocols School of Info. Sci. & Eng. Shandong Univ.. Outline 5. Peer-to-peer protocols and service models 5. RQ Protocols 5.3 Other daptation Functions Sliding Window Flow ontrol
More informationConnectionless and Connection-Oriented Protocols OSI Layer 4 Common feature: Multiplexing Using. The Transmission Control Protocol (TCP)
Lecture (07) OSI layer 4 protocols TCP/UDP protocols By: Dr. Ahmed ElShafee ١ Dr. Ahmed ElShafee, ACU Fall2014, Computer Networks II Introduction Most data-link protocols notice errors then discard frames
More informationNo book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6
Announcements No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6 Copyright c 2002 2017 UMaine School of Computing and Information S 1 / 33 COS 140:
More informationData Link Layer, Part 5 Sliding Window Protocols. Preface
Data Link Layer, Part 5 Sliding Window Protocols These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang's courses at GMU can make a single machine-readable
More informationAnnouncements. No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6
Announcements No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6 Copyright c 2002 2017 UMaine Computer Science Department 1 / 33 1 COS 140: Foundations
More informationCS457 Transport Protocols. CS 457 Fall 2014
CS457 Transport Protocols CS 457 Fall 2014 Topics Principles underlying transport-layer services Demultiplexing Detecting corruption Reliable delivery Flow control Transport-layer protocols User Datagram
More informationTYPES OF ERRORS. Data can be corrupted during transmission. Some applications require that errors be detected and corrected.
Data can be corrupted during transmission. Some applications require that errors be detected and corrected. TYPES OF ERRORS There are two types of errors, 1. Single Bit Error The term single-bit error
More information3. Data Link Layer 3-2
3. Data Link Layer 3.1 Transmission Errors 3.2 Error Detecting and Error Correcting Codes 3.3 Bit Stuffing 3.4 Acknowledgments and Sequence Numbers 3.5 Flow Control 3.6 Examples: HDLC, PPP 3. Data Link
More informationLocal Networks. Lecture 4 6-Apr-2016
Local Networks Lecture 4 6-Apr-2016 Roadmap of the Course So far Basic telecom concepts General study of LANs LAN topologies Flow and error control Today we continue the general study of LANs Medium access
More informationTransport Protocols Reading: Sections 2.5, 5.1, and 5.2
Transport Protocols Reading: Sections 2.5, 5.1, and 5.2 CE443 - Fall 1390 Acknowledgments: Lecture slides are from Computer networks course thought by Jennifer Rexford at Princeton University. When slides
More informationChapter 23 Process-to-Process Delivery: UDP, TCP, and SCTP 23.1
Chapter 23 Process-to-Process Delivery: UDP, TCP, and SCTP 23.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 23-1 PROCESS-TO-PROCESS DELIVERY 23.2 The transport
More informationIntroduction to Data Communications & Networking
Introduction to Data Communications & Networking Data Link Layer (Set 5) Chapter 10 and Chapter 11 Dr. Ali Maqousi, Dr. Tatiana Balikhina amaqousi@uop.edu.jo, tbalikhina@uop.edu.jo Department of Computer
More informationEECS 122, Lecture 19. Reliable Delivery. An Example. Improving over Stop & Wait. Picture of Go-back-n/Sliding Window. Send Window Maintenance
EECS 122, Lecture 19 Today s Topics: More on Reliable Delivery Round-Trip Timing Flow Control Intro to Congestion Control Kevin Fall, kfall@cs cs.berkeley.eduedu Reliable Delivery Stop and Wait simple
More informationEE382C Lecture 14. Reliability and Error Control 5/17/11. EE 382C - S11 - Lecture 14 1
EE382C Lecture 14 Reliability and Error Control 5/17/11 EE 382C - S11 - Lecture 14 1 Announcements Don t forget to iterate with us for your checkpoint 1 report Send time slot preferences for checkpoint
More informationProject 2 Reliable Transport
Project 2 Reliable Transport UC Berkeley CS 168, Fall 2014 Version 1.0 Due: 11:59am (noon), November 2nd, 2014 In this project, you will build a simple reliable transport protocol, BEARS TP (BTP). Your
More information(Sicherungsschicht) Chapter 5 (part 2) [Wa0001] HDLC - 1.
Data Link Layer (cont.) (Sicherungsschicht) Chapter 5 (part 2) [Wa0001] HDLC - 1 LOGICAL LINK CONTROL MEDIUM ACCESS CONTROL PHYSICAL SIGNALING DATA LINK LAYER PHYSICAL LAYER ACCESS UNIT INTERFACE PHYSICAL
More informationInternet Protocols Fall Outline
Internet Protocols Fall 2004 Lecture 12 TCP Andreas Terzis Outline TCP Connection Management Sliding Window ACK Strategy Nagle s algorithm Timeout estimation Flow Control CS 449/Fall 04 2 1 TCP Connection
More informationRFIC TX/RX Configuration
RFIC TX/RX Configuration RFIC TX/RX Configuration 01/19/17 1 of 10 www.murata.com RXC101 Configuration When the RXC101 is configured in microcontroller mode, data can be received in three ways; directly
More informationrdt2.0 has a fatal flaw!
rdt2. has a fatal flaw! rdt2.1:, handles garbled ACK/NAKs what happens if ACK/NAK corrupted? doesn t know what happened at! can t just retransmit: possible duplicate handling duplicates: retransmits current
More informationData link layer functions. 2 Computer Networks Data Communications. Framing (1) Framing (2) Parity Checking (1) Error Detection
2 Computer Networks Data Communications Part 6 Data Link Control Data link layer functions Framing Needed to synchronise TX and RX Account for all bits sent Error control Detect and correct errors Flow
More information1999, Scott F. Midkiff
Lecture Topics Direct Link Networks: Multiaccess Protocols (.7) Multiaccess control IEEE 80.5 Token Ring and FDDI CS/ECpE 556: Computer Networks Originally by Scott F. Midkiff (ECpE) Modified by Marc Abrams
More informationData Link Layer (cont.) ( h h h ) (Sicherungsschicht) HDLC - 1.
Data Link Layer (cont.) ( h h h ) (Sicherungsschicht) HDLC - 1 LOGICAL L LINK CONTROL MEDIUM ACCESS CONTROL PHYSICAL SIGNALING DATA LINK LAYER PHYSICAL LAYER ACCESS UNIT INTERFACE PHYSICAL MEDIA ATTACHMENT
More informationPreview Test: HW3. Test Information Description Due:Nov. 3
Preview Test: HW3 Test Information Description Due:Nov. 3 Instructions Multiple Attempts Not allowed. This test can only be taken once. Force Completion This test can be saved and resumed later. Question
More informationTransport Protocols Reading: Sections 2.5, 5.1, and 5.2
Transport Protocols Reading: Sections 2.5, 5.1, and 5.2 COS 461: Computer Networks Spring 2006 (MW 1:30-2:50 in Friend 109) Jennifer Rexford Teaching Assistant: Mike Wawrzoniak http://www.cs.princeton.edu/courses/archive/spring06/cos461/
More informationTSIN02 - Internetworking
Lecture 4: Transport Layer Literature: Forouzan: ch 11-12 2004 Image Coding Group, Linköpings Universitet Lecture 4: Outline Transport layer responsibilities UDP TCP 2 Transport layer in OSI model Figure
More informationChapter 3: Transport Layer Part A
Chapter 3: Transport Layer Part A Course on Computer Communication and Networks, CTH/GU The slides are adaptation of the slides made available by the authors of the course s main textbook 3: Transport
More informationPretty Good Protocol - Design Specification
Document # Date effective October 23, 2006 Author(s) Ryan Herbst Supersedes Draft Revision 0.02 January 12, 2007 Document Title Pretty Good Protocol - Design Specification CHANGE HISTORY LOG Revision Effective
More informationATA Power Management SATA Device Initiated Power Management (DIPM)
ATA/ATAPI T13 / e04149-r0 ATA Power Management SATA Device Initiated Power Management (DIPM) John Masiewicz Western Digital john.masiewicz@wdc.com 949-672-7686 John Masiewicz October 8, 2004 Background
More informationQuestion. Reliable Transport: The Prequel. Don t parse my words too carefully. Don t be intimidated. Decisions and Their Principles.
Question How many people have not yet participated? Reliable Transport: The Prequel EE122 Fall 2012 Scott Shenker http://inst.eecs.berkeley.edu/~ee122/ Materials with thanks to Jennifer Rexford, Ion Stoica,
More informationCS 455. Week 9. Reading: 1. Data Communications and Networking Behrouz A Forouzan Edition: 4.
CS 455 Week 9 Reading: 1. Data Communications and Networking Behrouz A Forouzan Edition: 4. Objectives: 1. To test the students knowledge on the concepts covered from Week 1 through Week 7. Concepts: 1.
More informationData Link Control. Claude Rigault ENST Claude Rigault, ENST 11/3/2002. Data Link control 1
Data Link Control Claude Rigault ENST claude.rigault@enst.fr Data Link control Data Link Control Outline General principles of Data Link Control HDLC Data Link control 2 General principles of Data Link
More informationTelematics. 5rd Tutorial - LLC vs. MAC, HDLC, Flow Control, E2E-Arguments
19540 - Telematics 5rd Tutorial - LLC vs. MAC, HDLC, Flow Control, E2E-Arguments Matthias Wa hlisch Department of Mathematics and Computer Science Institute of Computer Science 19. November, 2009 Institute
More informationData Link Layer. Learning Objectives. Position of the data-link layer. MCA 207, Data Communication & Networking
Data Link Layer Bharati Vidyapeeth s Institute of Computer Applications and Management,New Delhi-63 by Vishal Jain U2. 1 Learning Objectives To introduce the design issues of data link layer. To discuss
More informationECE 435 Network Engineering Lecture 10
ECE 435 Network Engineering Lecture 10 Vince Weaver http://web.eece.maine.edu/~vweaver vincent.weaver@maine.edu 28 September 2017 Announcements HW#4 was due HW#5 will be posted. midterm/fall break You
More informationFINAL May 21, minutes
CS 421: COMPUTER NETWORKS SPRING 2004 FINAL May 21, 2004 160 minutes Name: Student No: 1) a) Consider a 1 Mbits/sec channel with a 20 msec one-way propagation delay, i.e., 40 msec roundtrip delay. We want
More informationTransport Protocols Reading: Sections 2.5, 5.1, and 5.2. Goals for Todayʼs Lecture. Role of Transport Layer
Transport Protocols Reading: Sections 2.5, 5.1, and 5.2 CS 375: Computer Networks Thomas C. Bressoud 1 Goals for Todayʼs Lecture Principles underlying transport-layer services (De)multiplexing Detecting
More informationARQ and HARQ inter-working for IEEE m system
ARQ and HARQ inter-working for IEEE 802.16m system Document Number: IEEE C802.16m-08/1053r1 Date Submitted: 2008-09-17 Source: Xiangying Yang (xiangying.yang@intel.com) Yuan Zhu Muthaiah Venkatachalam
More informationLecture 20 Overview. Last Lecture. This Lecture. Next Lecture. Transport Control Protocol (1) Transport Control Protocol (2) Source: chapters 23, 24
Lecture 20 Overview Last Lecture Transport Control Protocol (1) This Lecture Transport Control Protocol (2) Source: chapters 23, 24 Next Lecture Internet Applications Source: chapter 26 COSC244 & TELE202
More informationPROBLEMSAND EXERCISES
Departamento de Tecnología Electrónica Computer Networking Unit 3: Transport layer PROBLEMSAND EXERCISES Transport Layer 95 Pr1: port numbers Suppose that the client A initiates a TCP connection to a Web
More informationChapter III: Transport Layer
Chapter III: Transport Layer UG3 Computer Communications & Networks (COMN) Myungjin Lee myungjin.lee@ed.ac.uk Slides copyright of Kurose and Ross rdt2.0 has a fatal flaw! what happens if ACK/NAK corrupted?
More informationCOMPUTER NETWORK. Homework #2. Due Date: April 12, 2017 in class
Computer Network Homework#2 COMPUTER NETWORK Homework #2 Due Date: April 12, 2017 in class Question 1 Suppose a process in Host C has a UDP socket with port number 6789. Suppose both Host A and Host B
More informationMME SGs Service Configuration Mode Commands
SGs Service Configuration Mode Commands The SGs Service Configuration Mode is used to create and manage the LTE Mobility Management Entity () SGs services on this system. The SGs service creates an SGs
More informationNWEN 243. Networked Applications. Layer 4 TCP and UDP
NWEN 243 Networked Applications Layer 4 TCP and UDP 1 About the second lecturer Aaron Chen Office: AM405 Phone: 463 5114 Email: aaron.chen@ecs.vuw.ac.nz Transport layer and application layer protocols
More informationTCP: Flow and Error Control
1 TCP: Flow and Error Control Required reading: Kurose 3.5.3, 3.5.4, 3.5.5 CSE 4213, Fall 2006 Instructor: N. Vlajic TCP Stream Delivery 2 TCP Stream Delivery unlike UDP, TCP is a stream-oriented protocol
More informationCPE 448/548 Exam #1 (100 pts) February 14, Name Class: 448
Name Class: 448 1) (14 pts) A message M = 11001 is transmitted from node A to node B using the CRC code. The CRC generator polynomial is G(x) = x 3 + x 2 + 1 ( bit sequence 1101) a) What is the transmitted
More informationMME SGs Service Configuration Mode Commands
MME SGs Service Configuration Mode Commands The MME SGs Service Configuration Mode is used to create and manage the LTE Mobility Management Entity (MME) SGs services on this system. The SGs service creates
More informationReliable Transport I: Concepts and TCP Protocol
Reliable Transport I: Concepts and TCP Protocol Brad Karp UCL Computer Science CS 3035/GZ01 29 th October 2013 Part I: Transport Concepts Layering context Transport goals Transport mechanisms 2 Context:
More informationFlow Control, and Congestion Control
TCP Sliding Windows, Flow Control, and Congestion Control Lecture material taken from Computer Networks A Systems Approach, Fourth Ed.,Peterson and Davie, Morgan Kaufmann, 2007. Computer Networks TCP Sliding
More informationOutline. Connecting to the access network: DHCP and mobile IP, LTE. Transport layer: UDP and TCP
Outline Connecting to the access network: DHCP and mobile IP, LTE Transport layer: UDP and TCP IETF TCP/IP protocol suite User application, e.g., http with Mozilla Communication for each process on computer
More informationThis presentation covers Unsolicited Events notification and handling, and standalone acknowledgments used to confirm reliable delivery or
This presentation covers Unsolicited Events notification and handling, and standalone acknowledgments used to confirm reliable delivery or communicate errors. 1 2 UE packets are used to asynchronously
More informationCMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 8
CMPE 150/L : Introduction to Computer Networks Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 8 1 A lot of students have been having difficulty seeing the HTTP packets generated when navigating
More informationCOMPUTER NETWORKS UNIT 3
COMPUTER NETWORKS UNIT 3 1. Illustrate about Reservation, Polling and Token Passing. [10 marks] Controlled access: In controlled access, the stations consult one another to find which station has the right
More informationThe MMDVM Specification ( )
The MMDVM Specification (20150922) Introduction The MMDVM is intended to be an open-source Multi-Mode Digital Voice Modem, which utilises the power of an ARM processor and a simple analogue interface board.
More informationAnnouncements. IP Forwarding & Transport Protocols. Goals of Today s Lecture. Are 32-bit Addresses Enough? Summary of IP Addressing.
IP Forwarding & Transport Protocols EE 122: Intro to Communication Networks Fall 2007 (WF 4-5:30 in Cory 277) Vern Paxson TAs: Lisa Fowler, Daniel Killebrew & Jorge Ortiz http://inst.eecs.berkeley.edu/~ee122/
More informationECE251: Thursday November 8
ECE251: Thursday November 8 Universal Asynchronous Receiver & Transmitter Text Chapter 22, Sections 22.1.1-22.1.4-read carefully TM4C Data Sheet Section 14-no need to read this A key topic but not a lab
More informationData Link Control Layer, Error Detection, Error Correction, and Framing
Data Link Control Layer, Error Detection, Error Correction, and Framing EEE 538, WEEK 2 Dr. Nail Akar Bilkent University Electrical and Electronics Engineering Department 1 Error Detection Techniques Used
More informationQuestion Points Score total 100
CS457: Computer Networking Date: 3/21/2008 Name: Instructions: 1. Be sure that you have 8 questions 2. Be sure your answers are legible. 3. Write your Student ID at the top of every page 4. This is a closed
More informationTCP over Wireless PROF. MICHAEL TSAI 2016/6/3
TCP over Wireless PROF. MICHAEL TSAI 2016/6/3 2 TCP Congestion Control (TCP Tahoe) Only ACK correctly received packets Congestion Window Size: Maximum number of bytes that can be sent without receiving
More informationENRICHMENT OF SACK TCP PERFORMANCE BY DELAYING FAST RECOVERY Mr. R. D. Mehta 1, Dr. C. H. Vithalani 2, Dr. N. N. Jani 3
Research Article ENRICHMENT OF SACK TCP PERFORMANCE BY DELAYING FAST RECOVERY Mr. R. D. Mehta 1, Dr. C. H. Vithalani 2, Dr. N. N. Jani 3 Address for Correspondence 1 Asst. Professor, Department of Electronics
More informationComputer Networks & Security 2016/2017
Computer Networks & Security 2016/2017 Transport Layer (04) Dr. Tanir Ozcelebi Courtesy: Kurose & Ross Courtesy: Forouzan TU/e Computer Science Security and Embedded Networked Systems Transport Layer Our
More informationMSP430F149 P3.4/UTXD0 P3.5/URXD0 P1.5 P1.6 P1.7 MSP430F149 P1.0 P5.4 P5.3 P5.2 P5.1. Figure B-1. BSL Replicator Block Diagram
Appendix B Appendix B MSP430 BSL Replicator Author: Greg Morton, MSP430 Applications B.1 BSL Replicator Overview The BSL Replicator application, executing on a host MSP430F149 device, uses the BSL protocol
More informationDATA LINK LAYER UNIT 7.
DATA LINK LAYER UNIT 7 1 Data Link Layer Design Issues: 1. Service provided to network layer. 2. Determining how the bits of the physical layer are grouped into frames (FRAMING). 3. Dealing with transmission
More information