Computer Communication1 Computer Communications Summary.

Slides:



Advertisements
Similar presentations
Intro (continued) and Design Principles Nick Feamster CS 3251: Computer Networking I Spring 2013.
Advertisements

Broad-Band Satellite Networks - The Global IT Bridge Presented by Tsoline Mikaelian Abbas Jamalipour By Abbas Jamalipour Proc. of the IEEE, Vol. 89, No.1.
Answers of Exercise 7 1. Explain what are the connection-oriented communication and the connectionless communication. Give some examples for each of the.
ECE 355 Introduction to Computer Networks and Data Communications
Computer Communication1 Computer Communications Summary.
Wireless Communication Networks Tzu-Chieh Tsai Department of Computer Science National Cheng-Chi University.
School of Information Technologies Revision NETS3303/3603 Week 13.
Exam Review. Basic Concepts  Packet switching versus circuit switching  Their advantages and disadvantages  Layered network architecture  Various.
Chapter 4 Network Layer slides are modified from J. Kurose & K. Ross CPE 400 / 600 Computer Communication Networks Lecture 14.
CSIT435 Spring 2001 Final Examination Study Guide.
In-Band Flow Establishment for End-to-End QoS in RDRN Saravanan Radhakrishnan.
Chapter 5 Link Layer slides are modified from J. Kurose & K. Ross CPE 400 / 600 Computer Communication Networks Lecture 20.
1 CPE 400 / 600 Computer Communication Networks Dr. Mehmet Gunes slides are modified from S.K. Kasera and J. Kurose & K. Ross.
91.413: Data Communications I Fall 2007
Transmission Control Protocol (TCP) and Packet-Switching Hardware Devang Parekh EE290F 4/15/04.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 18 Introduction to Computer Networks.
1 Last Class! Today: r what have we learned? r where is the networking world going? r question and answers r evaluation.
Review on Networking Technologies Linda Wu (CMPT )
1 Course Summary What have we learned: a huge amount! m principles m practice ….. using Internet to motivate examples.
What’s the Internet: “nuts and bolts” view
Data Communications and Networking
Introduction 1 Lecture 23 Link Layer (Error Detection/Correction) slides are modified from J. Kurose & K. Ross University of Nevada – Reno Computer Science.
5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Part 1: Overview of the Data Link layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose,
Marina Papatriantafilou – Summary - flashback Based on the book Computer Networking: A Top Down Approach, Jim Kurose, Keith Ross, Addison-Wesley. Course.
1 Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:  SD, ED mark start,
Communications Recap Duncan Smeed. Introduction 1-2 Chapter 1: Introduction Our goal: get “feel” and terminology more depth, detail later in course.
Chapter 1 Overview Review Overview of demonstration network
Computer Communication1 Computer Communications DIT 420 EDA343 Summary.
Introduction1-1 Data Communications and Computer Networks Chapter 5 CS 3830 Lecture 27 Omar Meqdadi Department of Computer Science and Software Engineering.
1 CSE 5346 – Networks II: High Performance Networks.
CS 381 Final Exam Study Guide Final Exam Date: Tuesday, May 12 th Time: 10:30am -12:30pm Room: SB 105 Exam aid: 8 ½ x 11 page of notes front and back.
Our Last Class!!  summary  what does the future look like?
Final Review EECS 489 Computer Networks Z. Morley Mao Monday April 16, 2007.
1 ECE 156 Computer Network Architecture Professor Krish Chakrabarty Department of Electrical and Computer Engineering Fall 2006.
Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:  SD, ED mark start,
ECE 526 – Network Processing Systems Design Networking: protocols and packet format Chapter 3: D. E. Comer Fall 2008.
4: Network Layer4-1 Schedule Today: r Finish Ch3 r Collect 1 st Project r See projects run r Start Ch4 Soon: r HW5 due Monday r Last chance for Qs r First.
4: DataLink Layer1 Chapter 4: The Data Link Layer Our goals: r understand principles behind data link layer services: m error detection, correction m sharing.
4: DataLink Layer1 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single wire, e.g. PPP, SLIP) r broadcast (shared wire.
Final Review Focus- Chapter 4: Network layer Chapter 5: Data link layer Notes: Physical layer Understand previous chapters covered in class. Final exam.
CSC 450/550 Part 1: Introduction. CSC 450/550 Summary (1)Contact information (2)Course objective and topics (3)Course evaluation (4)* The layering principle.
Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Link Layer introduction,
5: DataLink Layer5-1 Link Layer r 5.1 Introduction and services r 5.2 Error detection and correction r 5.3Multiple access protocols r 5.4 Link-Layer Addressing.
1 ECE453 - Introduction to Computer Networks Lecture 1: Introduction.
Ch 5. The Link Layer and Local Area Networks Myungchul Kim
Review of key networking techniques: –Reliable communication over unreliable channels –Error detection and correction –Medium access control –routing –Congestion.
Review. Layers Physical layer – sending bits from one place to another, ensuring an okay BER Data link layer – encapsulate information bits into frames,
Slide #1 CIT 380: Securing Computer Systems TCP/IP.
5: DataLink Layer5a-1 Chapter 5: The Data Link Layer Our goals: r understand principles behind data link layer services: m error detection, correction.
ECE 374: Computer Networks & Internet Introduction Spring 2015 Prof. Michael Zink.
 1DT014 Datakommunikation I › (Thur) 9-14 › Polacksbacken, Skrivsal  9 Questions › 5 Short questions › 4 Long questions.
ECE 374: Computer Networks & Internet Introduction Spring 2012 Prof. Michael Zink.
Midterm Review. Chapter 1 Internet Concepts Applications, End-hosts, Routers, Switches, Communication Links Overall architecture How they are organized.
5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross.
-1- Georgia State UniversitySensorweb Research Laboratory CSC4220/6220 Computer Networks Dr. WenZhan Song Professor, Computer Science.
The OSI Model An overview of the media layer (Physical, Data Link, Network) By Luke Shiffner.
Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:
2: Transport Layer 11 Transport Layer 1. 2: Transport Layer 12 Part 2: Transport Layer Chapter goals: r understand principles behind transport layer services:
Marina Papatriantafilou – Summary - flashback Based on the book Computer Networking: A Top Down Approach, Jim Kurose, Keith Ross, Addison-Wesley. Course.
Networked Multimedia Basics. Network Characteristics.
Part III. Data Link Layer
EE 122: Lecture 19 (Asynchronous Transfer Mode - ATM)
Course Review 2015 Computer networks 赵振刚
Network Layer Functions
X.25 and Frame Relay Like ATM: wide area network technologies
Link Layer and LANs Its not about how hard you hit... It's about how hard you can get hit and keep moving forward 5: DataLink Layer.
Course on Computer Communication and Networks Lecture 16 Synthesis, Summary/flashback and Projection (related topics – continuation of study) EDA344/DIT.
Binit Mohanty Ketan Rajawat
Course on Computer Communication and Networks Lecture 16 Synthesis, Summary/flashback and Projection (related topics – continuation of study) EDA344/DIT.
CS 381: Introduction to Computer Networks
Presentation transcript:

Computer Communication1 Computer Communications Summary

Computer Communication2 Important for the exam When/where:Thursday Dec 17, V You may have with you: English/Swedish dictionary no calculators, PDAs, etc (if/where numbers matter, do rounding) Overview; critical eye; explain: why is this so? / How does it work? Grading 30,40,48 (out of 60)= 3, 4, 5 (CTH) (out of 60) = G, VG (GU)

Computer Communication3 Principles, Organisation Network Problems (in the order faced in the 1st intro): managing communication links (& connections) manage access to shared (broadcast) transmission media, transmission errors, producer-consumer problems, flow and error control, routing, congestion, connecting transparently different networks, performance, serving different types of traffic, mobility security Layering : principle, why

Computer Communication4 Highlights types of delay; performance reliable data transfer (flow, error control) datagram vs VC end-to-end communication, congestion control, quality-of-service and RT traffic routing, also with mobility multiple access protocols (wired, wireless) TCP/IP protocol stack (also applications), evolution (p2p applications, overlays, NAT, streaming apps) LANs and related technologies network security issues covered

Computer Communication5 Types of delay; performance

Computer Communication6 Types of delay; performance Propagation, transmission, queueing, processing Throughput (effective bandwidth) Utilization (efficiency) Packet-switching: impact of store&forward TCP’s slow start Sliding windows performance CSMA performance (parameters, why, …) A B propagation transmission nodal processing queuing

Computer Communication7 Reliable data transfer

Computer Communication8 Reliable data transfer Guaranteed, in-order, correct delivery: Flow control: –stop&wait –sliding windows –sequence numbers –window sizes –dynamic windows (TCP) –performance Error detection: checksums, CRC Error control: go-back-n, selective repeat, FEC methods

Congestion Control Computer Communication9 Quality-of-service and RT traffic Datagram vs VC end-to-end comm.

Computer Communication10 Datagram vs VC end-to-end communication Conceptual differences Example technologies Decisions, comparison, why Redundancy in current networks (internet; eg IP over ATM, MPLS) ATM Network/ MPLS Ethernet LANs

Computer Communication11 Congestion control (CC) why, how congestion occurs CC in TCP and performance; implied weaknesses CC in other ways, e.g. VC-based networks –RT-traffic resource reservation: traffic shaping and policing –Choke packets (rate-based CC)

Computer Communication12 Quality-of-service and RT traffic Conceptual needs: packet/flow marking Admission control Traffic shaping & policing Packet scheduling (switches) Internet context Application-level solutions (FEC, playout delay, caching-CDN) Intserv, Diffserv

Computer Communication13 Routing, also with mobility

Computer Communication14 A E D CB F Routing, also with mobility Routing algorithms Resource, policy issues Addressing mobility, tunneling Mobile Switchi ng Center Public telephone network, and Internet Mobile Switchi ng Center

Computer Communication15 Multiple access algorithms

Computer Communication16 Multiple access algorithms Strategies: (functionality, appropriateness) Contention-based (random access), wired/wireless: –Aloha, CSMA(CD/CA) (collision-delay trade-off) Collision-free: –Channel partitioning: TDMA, FDMA, CDMA –Taking turns: token-passing, reservation-based A B C A’s signal strength space C’s signal strength

Computer Communication17 TCP/IP protocol stack (also applications), evolution

Computer Communication18 TCP/IP protocol stack (also applications), evolution Instantiation of network- solutions (Routing, Congestion control Flow & error control) Limitations, advantages, updates Application-layer networking (P2P applications, overlays, multimedia- application protocols) application transport network link physical

Computer Communication19 LANs & related technologies

Computer Communication20 LANs & related link technologies Protocol Examples Ethernet, ( wimax), GSM: Functionality, performance under low/high load Connecting devices; –functionalities and differences (Hubs, switches) –Algorithms for switch-”routing”: learning& forwarding of packets ARP switch

Computer Communication21 Security issues

Computer Communication22 Security issues C, I, A and methods to achieve them Instantiation in Internet: PGP, IPsec, SSL Firewalls and packet filtering