Review First mile problem Internet End Users Last mile

Slides:



Advertisements
Similar presentations
Answers of Exercise 7 1. Explain what are the connection-oriented communication and the connectionless communication. Give some examples for each of the.
Advertisements

CS 582 / CMPE 481 Distributed Systems Communications.
Department of Computer Engineering University of California at Santa Cruz Networking Systems (1) Hai Tao.
Exam Review. Basic Concepts  Packet switching versus circuit switching  Their advantages and disadvantages  Layered network architecture  Various.
Chapter 4 Network Layer slides are modified from J. Kurose & K. Ross CPE 400 / 600 Computer Communication Networks Lecture 14.
CSE331: Introduction to Networks and Security Lecture 7 Fall 2002.
Chapter 4 Network Layer slides are modified from J. Kurose & K. Ross CPE 400 / 600 Computer Communication Networks Lecture 13.
EE 4272Spring, 2003 Chapter 14 LAN Systems Ethernet (CSMA/CD)  ALOHA  Slotted ALOHA  CSMA  CSMA/CD Token Ring /FDDI Fiber Channel  Fiber Channel Protocol.
Ethernet Frame PreambleDestination Address Source Address Length/ Type LLC/ Data Frame Check Sequence.
TCP/IP Reference Model Host To Network Layer Transport Layer Application Layer Internet Layer.
Exam 2 Review Networking CS 3470, Section 1 Sarah Diesburg.
Slide 15-1 Copyright © 2004 Pearson Education, Inc. Operating Systems: A Modern Perspective, Chapter Networks.
Introduction1-1 Data Communications and Computer Networks Chapter 5 CS 3830 Lecture 27 Omar Meqdadi Department of Computer Science and Software Engineering.
Network Layer4-1 Chapter 4: Network Layer Chapter goals: r understand principles behind network layer services: m network layer service models m forwarding.
TCP/IP Essentials A Lab-Based Approach Shivendra Panwar, Shiwen Mao Jeong-dong Ryoo, and Yihan Li Chapter 5 UDP and Its Applications.
Objectives: Chapter 5: Network/Internet Layer  How Networks are connected Network/Internet Layer Routed Protocols Routing Protocols Autonomous Systems.
ICOM 6115©Manuel Rodriguez-Martinez ICOM 6115 – Computer Networks and the WWW Manuel Rodriguez-Martinez, Ph.D. Lecture 16.
CPS 356: Introduction to Computer Networks Lecture 7: Switching technologies Ch 2.8.2, 3.1, 3.4 Xiaowei Yang
7-1 Last time □ Wireless link-layer ♦ Introduction Wireless hosts, base stations, wireless links ♦ Characteristics of wireless links Signal strength, interference,
Lecture 3 Overview. Protocol An agreed upon convention for communication both endpoints need to understand the protocol. Protocols must be formally defined.
ECE 526 – Network Processing Systems Design Networking: protocols and packet format Chapter 3: D. E. Comer Fall 2008.
EEC-484/584 Computer Networks Lecture 9 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
Routing in the Internet The Global Internet consists of Autonomous Systems (AS) interconnected with eachother: Stub AS: small corporation Multihomed AS:
1 Internet Routing. 2 Terminology Forwarding –Refers to datagram transfer –Performed by host or router –Uses routing table Routing –Refers to propagation.
ICOM 6115©Manuel Rodriguez-Martinez ICOM 6115 – Computer Networks and the WWW Manuel Rodriguez-Martinez, Ph.D. Lecture 21.
ECE453 – Introduction to Computer Networks Lecture 17 – Top – Down Approach (A Review)
TCOM 509 – Internet Protocols (TCP/IP) Lecture 06_a Routing Protocols: RIP, OSPF, BGP Instructor: Dr. Li-Chuan Chen Date: 10/06/2003 Based in part upon.
Lecture 4 Overview. Ethernet Data Link Layer protocol Ethernet (IEEE 802.3) is widely used Supported by a variety of physical layer implementations Multi-access.
1 Bus topology network. 2 Data is sent to all computers, but only the destination computer accepts 02608c
Review of key networking techniques: –Reliable communication over unreliable channels –Error detection and correction –Medium access control –routing –Congestion.
IP1 The Underlying Technologies. What is inside the Internet? Or What are the key underlying technologies that make it work so successfully? –Packet Switching.
TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC).
Assignment 1  Chapter 1:  Question 11  Question 13  Question 14  Question 33  Question 34  Chapter 2:  Question 6  Question 39  Chapter 3: 
BASICS Gabriella Paolini (GARR) 27/05/11 - ICCU Roma 1 How INTERNET works !
INTRODUCTION NETWORKING CONCEPTS AND ADMINISTRATION CSIS 3723
Computer Communication Networks
Chapter 4: Network Layer
Lecture (2).
A quick intro to networking
Networking CS 3470, Section 1 Sarah Diesburg
Whirlwind Tour Of Lectures So Far
Scaling the Network: The Internet Protocol
COMPUTER NETWORKS CS610 Lecture-45 Hammad Khalid Khan.
Course Review 2015 Computer networks 赵振刚
ISO/OSI Model and Collision Domain
Hubs Hubs are essentially physical-layer repeaters:
EEC-484/584 Computer Networks
Chapter 4-1 Network layer
Chapter 5 The Network Layer.
X.25 and Frame Relay Like ATM: wide area network technologies
EEC-484/584 Computer Networks
Getting Connected (Chapter 2 Part 3)
ECE453 – Introduction to Computer Networks
Network Layer I have learned from life no matter how far you go
Chapter 4: Network Layer
Router Construction Outline Switched Fabrics IP Routers
Computer Network Overview
Networking CS 3470 Sarah Diesburg
EEC-484/584 Computer Networks
Chapter 4: Network Layer
Binit Mohanty Ketan Rajawat
Chapter 4: Network Layer
Network Architecture for Cyberspace
Scaling the Network: The Internet Protocol
CS4470 Computer Networking Protocols
Networking CS 3470 Sarah Diesburg
Computer Networks Protocols
EE469 Review 1.
LAN Addresses and ARP IP address: drives the packet to destination network LAN (or MAC or Physical) address: drives the packet to the destination node’s.
Chapter 5 The Network Layer.
Presentation transcript:

Review First mile problem Internet End Users www.cnn.com Last mile Sprint Ameritech www.yahoo.com End Users UUNET MCI www.cnn.com Last mile problem 30-Nov-18 4/598N: Computer Networks

Hierarchical Services Peer-to-Peer Systems Lecture 2 Network Applications Naming Applications Central Server based Easy to administer, not scaleable, fault tolerant Web servers Hierarchical Services Domain Name System – DNS Peer-to-Peer Systems No “server”, can scale, location problem harder Napster, gnutella 30-Nov-18 4/598N: Computer Networks

Lecture 3/4 End-to-end argument Chapter 2: Direct Link Networks KISS principle (Keep It Simple, Stupid) Chapter 2: Direct Link Networks Connecting hosts directly (ethernet, wireless etc.) Encoding (how are we talking - language) NRZ, NRZI, Manchester, 4B/5B Framing (how do we know the end) Sentinel (special boundary), count based, clock based Error Detection CRC Reliable transmission (using ACK, Automatic Repeat Request - ARQ) Sliding Window Algorithm (multiple outstanding frames) Initial sequence number 30-Nov-18 4/598N: Computer Networks

Shared Access Networks Lecture 5 Shared Access Networks Bus (Ethernet) CSMA/CD carrier sense: Can sense the channel for collisions multiple access: More than one node can access the channel collision detection: Sender can detect its own collisions P-persistent and retry Token ring (FDDI) must capture token before transmitting release token after done transmitting Bounds for delay to send frames Wireless (802.11) Mobility issues because of the wireless channels Bluetooth, irda, IEEE 802.11 wireless 30-Nov-18 4/598N: Computer Networks

Switching and forwarding Lecture 6 Switching and forwarding Store-and-Forward Switches Source routing Virtual circuit switching Bridges and Extended LANs Learning bridges Spanning bridge algorithm Choose routes such that there are no loops Does not take congestion into account Cell Switching ATM networks Segmentation and Reassembly 30-Nov-18 4/598N: Computer Networks

Lecture 7 Router construction Internetworking Datagram format Workstation based Switching hardware Crossbar Knockout switch Self routing switches Internetworking Best Effort Service Model Connectionless (datagram-based) Best-effort delivery (unreliable service) packets are lost, delayed, duplicates delivered, delivered out of order Datagram format Global Addressing Scheme 30-Nov-18 4/598N: Computer Networks

Fragmentation and reassembly Lecture 8 Fragmentation and reassembly Different networks have different MTU Global addresses Class A, B, C, CIDR Datagram forwarding every datagram contains destination’s address if directly connected to destination network, then forward to host if not directly connected to destination network, then forward to some router (default router?) 30-Nov-18 4/598N: Computer Networks

Lecture 8 Routing Link state (OSPF) Distance Vector (RIP) Exchange information with connected routers Loops can be a problem Count to infinity problem Define infinity as 16 Split horizon Split horizon with poisoning Link state (OSPF) Exchange state with *all* routers Individual nodes run shortest path algorithm Need reliable flooding of routing state 30-Nov-18 4/598N: Computer Networks

Lecture 9 Internet Multicast routing Peering and transits Subnetting Create organization for local networks Nodes use default routers to forward traffic BGP4 routing for the backbone (complex protocol) stub AS: has a single connection to one other AS carries local traffic only multihomed AS: has connections to more than one AS refuses to carry transit traffic transit AS: has connections to more than one AS carries both transit and local traffic Multicast routing Peering and transits 30-Nov-18 4/598N: Computer Networks

Reliable transmission (TCP) Lecture 10 Reliable transmission (TCP) Connection Establishment/Termination (SYN/FIN) Sequence number selection To guard against packets from earlier connections Connection tear-down (RESET) Round-trip estimation Retransmission ambiguity Window flow control Flow control: keep sender from overrunning receiver Congestion control: keep sender from overrunning network Sliding Window Revisited Adaptive Timeout 30-Nov-18 4/598N: Computer Networks