52.354 Communications Recap Duncan Smeed. Introduction 1-2 Chapter 1: Introduction Our goal: get “feel” and terminology more depth, detail later in course.

Slides:



Advertisements
Similar presentations
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Application Layer – Lecture.
Advertisements

Chapter 3: Transport Layer
Chapter 4 Network Layer slides are modified from J. Kurose & K. Ross CPE 400 / 600 Computer Communication Networks Lecture 14.
Introduction1-1 Introduction to Computer Networks Our goal:  get “feel” and terminology  more depth, detail later in course  approach:  use Internet.
Transport Layer3-1 Transport Layer Our goals: r understand principles behind transport layer services: m multiplexing/demultipl exing m reliable data transfer.
CSIT435 Spring 2001 Final Examination Study Guide.
Lecture 8 Chapter 3 Transport Layer
1 Course Summary What have we learned: a huge amount! m principles m practice ….. using Internet to motivate examples.
1 CPE 400 / 600 Computer Communication Networks Dr. Mehmet Gunes slides are modified from S.K. Kasera and J. Kurose & K. Ross.
Chapter 4 Network Layer slides are modified from J. Kurose & K. Ross CPE 400 / 600 Computer Communication Networks Lecture 13.
91.413: Data Communications I Fall 2007
1 Last Class! Today: r what have we learned? r where is the networking world going? r question and answers r evaluation.
2: Application Layer 1 Chapter 2 Application Layer Computer Networking: A Top Down Approach, 5th edition. Jim Kurose, Keith Ross Addison-Wesley, April.
Some slides are in courtesy of J. Kurose and K. Ross Review of Previous Lecture Electronic Mail: SMTP, POP3, IMAP DNS Socket programming with TCP.
CS 4119: Computer Networks Henning Schulzrinne Dept. of Computer Science Columbia University
1 Computer Networks Transport Layer Protocols. 2 Application-layer Protocols Application-layer protocols –one “piece” of an app –define messages exchanged.
1 Course Summary What have we learned: a huge amount! m principles m practice ….. using Internet to motivate examples.
8-1 Transport Layer Our goals: r understand principles behind transport layer services: m multiplexing/demultipl exing m reliable data transfer m flow.
Introduction 1 Lecture 5 Application Layer slides are modified from J. Kurose & K. Ross University of Nevada – Reno Computer Science & Engineering Department.
1: Introduction1 Part I: Introduction Goal: r get context, overview, “feel” of networking r more depth, detail later in course r approach: m descriptive.
Chapter 1 Introduction Computer Networking: A Top Down Approach 6th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Link Layer data center.
Chapter 2 Application Layer Computer Networking: A Top Down Approach, 5 th edition. Jim Kurose, Keith Ross Addison-Wesley, April A note on the use.
2: Application Layer1 Chapter 2 Application Layer These slides derived from Computer Networking: A Top Down Approach, 6 th edition. Jim Kurose, Keith Ross.
Chapter 5 Link Layer and LANs
Review: –What is AS? –What is the routing algorithm in BGP? –How does it work? –Where is “policy” reflected in BGP (policy based routing)? –Give examples.
Throughput: Internet scenario
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012.
19-1 Last time □ TCP ♦ Throughput ♦ Fairness ♦ Delay modeling □ TCP socket programming.
Introduction1-1 Course Code:EE/TE533 Instructor: Muddathir Qamar.
CS 381 Final Exam Study Guide Final Exam Date: Tuesday, May 12 th Time: 10:30am -12:30pm Room: SB 105 Exam aid: 8 ½ x 11 page of notes front and back.
Data Communications and Computer Networks Chapter 4 CS 3830 Lecture 18 Omar Meqdadi Department of Computer Science and Software Engineering University.
Network Layer4-1 Chapter 4: Network Layer Chapter goals: r understand principles behind network layer services: m network layer service models m forwarding.
D ISTRIBUTED I NFORMATION S YSTEM 2010 SUMMARY Edith Ngai Uppsala University.
What makes a network good? Ch 2.1: Principles of Network Apps 2: Application Layer1.
Link Layer 5-1 Link layer, LAN s: outline 5.1 introduction, services 5.2 error detection, correction 5.3 multiple access protocols 5.4 LANs  addressing,
1 ECE 156 Computer Network Architecture Professor Krish Chakrabarty Department of Electrical and Computer Engineering Fall 2006.
Data Communications and Computer Networks Chapter 3 CS 3830 Lecture 12 Omar Meqdadi Department of Computer Science and Software Engineering University.
2: Application Layer 1 Chapter 2: Application layer r 2.1 Principles of network applications r 2.2 Web and HTTP r 2.3 FTP r 2.4 Electronic Mail  SMTP,
7-1 Last time □ Wireless link-layer ♦ Introduction Wireless hosts, base stations, wireless links ♦ Characteristics of wireless links Signal strength, interference,
Chapter 4 Network Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Network Layer introduction.
Transport Layer 3-1 Chapter 3 Transport Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Part.
Ch 1. Computer Networks and the Internet Myungchul Kim
5: Link Layer Part Link Layer r 5.1 Introduction and services r 5.2 Error detection and correction r 5.3Multiple access protocols r 5.4 Link-Layer.
CS 3830 Day 6 Introduction 1-1. Announcements  Program 2 posted this afternoon (due date will be week of 9/24) Introduction 1-2.
CS 3830 Day 13 Introduction 1-1. Announcements r Quiz 3: Wednesday, Oct 10 r Prog3 due Wednesday, Oct 10 Transport Layer 3-2.
Link Layer5-1 Synthesis: a day in the life of a web request  journey down protocol stack complete!  application, transport, network, link  putting-it-all-together:
Graciela Perera– August 23, 2010 Department of Computer Science and Information Systems Slide 1 of 14 OVERVIEW FOR NETWORKING CONCEPTS AND ADMINISTRATION.
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012.
Transport Layer 3-1 Chapter 3 Outline r 3.1 Transport-layer services r 3.2 Multiplexing and demultiplexing r 3.3 Connectionless transport: UDP.
Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Application Layer – Lecture.
Midterm Review Chapter 1: Introduction Chapter 2: Application Layer
ECE 374: Computer Networks & Internet Introduction Spring 2015 Prof. Michael Zink.
 1DT014 Datakommunikation I › (Thur) 9-14 › Polacksbacken, Skrivsal  9 Questions › 5 Short questions › 4 Long questions.
ECE 374: Computer Networks & Internet Introduction Spring 2012 Prof. Michael Zink.
Network Layer4-1 Chapter 4 Network Layer All material copyright J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking: A Top Down.
Midterm Review. Chapter 1 Internet Concepts Applications, End-hosts, Routers, Switches, Communication Links Overall architecture How they are organized.
Transport Layer3-1 Chapter 3: Transport Layer Our goals: r understand principles behind transport layer services: m multiplexing/demultipl exing m reliable.
-1- Georgia State UniversitySensorweb Research Laboratory CSC4220/6220 Computer Networks Dr. WenZhan Song Professor, Computer Science.
Chapter 7 Application Layer 1 Some of the slides in this chapter are courtesy of Profs. Kurose/Ross and others.
Introduction 1-1 source application transport network link physical HtHt HnHn M segment HtHt datagram destination application transport network link physical.
2: Transport Layer 11 Transport Layer 1. 2: Transport Layer 12 Part 2: Transport Layer Chapter goals: r understand principles behind transport layer services:
Transport Layer3-1 Transport Layer Never take life seriously. Nobody gets out alive anyway.
Introduction to Networks
CS 280: Summary: A day in the life of a web request
Course Review 2015 Computer networks 赵振刚
Introduction to Networks
Network Layer I have learned from life no matter how far you go
Presentation transcript:

Communications Recap Duncan Smeed

Introduction 1-2 Chapter 1: Introduction Our goal: get “feel” and terminology more depth, detail later in course approach: – use Internet as example Overview: what’s the Internet? what’s a protocol? network edge; hosts, access net, physical media network core: packet/circuit switching, Internet structure performance: loss, delay, throughput security protocol layers, service models history

Introduction 1-3 Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  circuit switching, packet switching, network structure 1.4 Delay, loss and throughput in packet-switched networks 1.5 Protocol layers, service models 1.6 Networks under attack: security 1.7 History

Introduction 1-4 Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  circuit switching, packet switching, network structure 1.4 Delay, loss and throughput in packet-switched networks 1.5 Protocol layers, service models 1.6 Networks under attack: security 1.7 History

Introduction 1-5 Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  circuit switching, packet switching, network structure 1.4 Delay, loss and throughput in packet-switched networks 1.5 Protocol layers, service models 1.6 Networks under attack: security 1.7 History

Introduction 1-6 Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  circuit switching, packet switching, network structure 1.4 Delay, loss and throughput in packet-switched networks 1.5 Protocol layers, service models 1.6 Networks under attack: security 1.7 History

Introduction 1-7 Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  circuit switching, packet switching, network structure 1.4 Delay, loss and throughput in packet-switched networks 1.5 Protocol layers, service models 1.6 Networks under attack: security 1.7 History

Introduction 1-8 Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  circuit switching, packet switching, network structure 1.4 Delay, loss and throughput in packet-switched networks 1.5 Protocol layers, service models 1.6 Networks under attack: security 1.7 History

Introduction 1-9 Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  circuit switching, packet switching, network structure 1.4 Delay, loss and throughput in packet-switched networks 1.5 Protocol layers, service models 1.6 Networks under attack: security 1.7 History

Introduction 1-10 Introduction: Summary Covered a “ton” of material! Internet overview what’s a protocol? network edge, core, access network – packet-switching versus circuit-switching – Internet structure performance: loss, delay, throughput layering, service models security history You now have: context, overview, “feel” of networking more depth, detail to follow!

2: Application Layer11 Chapter 2: Application layer 2.1 Principles of network applications 2.2 Web and HTTP 2.3 FTP 2.4 Electronic Mail – SMTP, POP3, IMAP 2.5 DNS 2.6 P2P applications 2.7 Socket programming with UDP 2.8 Socket programming with TCP

2: Application Layer12 Chapter 2: Application Layer Our goals: conceptual, implementation aspects of network application protocols – transport-layer service models – client-server paradigm – peer-to-peer paradigm learn about protocols by examining popular application-level protocols – HTTP – FTP – SMTP / POP3 / IMAP – DNS programming network applications – socket API

2: Application Layer13 Chapter 2: Application layer 2.1 Principles of network applications 2.2 Web and HTTP 2.3 FTP 2.4 Electronic Mail – SMTP, POP3, IMAP 2.5 DNS 2.6 P2P applications 2.7 Socket programming with UDP 2.8 Socket programming with TCP

2: Application Layer14 Chapter 2: Application layer 2.1 Principles of network applications 2.2 Web and HTTP 2.3 FTP 2.4 Electronic Mail – SMTP, POP3, IMAP 2.5 DNS 2.6 P2P applications 2.7 Socket programming with UDP 2.8 Socket programming with TCP

2: Application Layer15 Chapter 2: Application layer 2.1 Principles of network applications 2.2 Web and HTTP 2.3 FTP 2.4 Electronic Mail – SMTP, POP3, IMAP 2.5 DNS 2.6 P2P applications 2.7 Socket programming with UDP 2.8 Socket programming with TCP

2: Application Layer16 Chapter 2: Application layer 2.1 Principles of network applications 2.2 Web and HTTP 2.3 FTP 2.4 Electronic Mail – SMTP, POP3, IMAP 2.5 DNS 2.6 P2P applications 2.7 Socket programming with UDP 2.8 Socket programming with TCP

2: Application Layer17 Chapter 2: Application layer 2.1 Principles of network applications 2.2 Web and HTTP 2.3 FTP 2.4 Electronic Mail – SMTP, POP3, IMAP 2.5 DNS 2.6 P2P applications 2.7 Socket programming with UDP 2.8 Socket programming with TCP

2: Application Layer18 Chapter 2: Application layer 2.1 Principles of network applications 2.2 Web and HTTP 2.3 FTP 2.4 Electronic Mail – SMTP, POP3, IMAP 2.5 DNS 2.6 P2P applications 2.7 Socket programming with UDP 2.8 Socket programming with TCP

2: Application Layer19 Chapter 2: Application layer 2.1 Principles of network applications 2.2 Web and HTTP 2.3 FTP 2.4 Electronic Mail – SMTP, POP3, IMAP 2.5 DNS 2.6 P2P applications 2.7 Socket programming with UDP 2.8 Socket programming with TCP

2: Application Layer20 Chapter 2: Application layer 2.1 Principles of network applications 2.2 Web and HTTP 2.3 FTP 2.4 Electronic Mail – SMTP, POP3, IMAP 2.5 DNS 2.6 P2P applications 2.7 Socket programming with UDP 2.8 Socket programming with TCP

2: Application Layer21 Chapter 2: Summary application architectures – client-server – P2P – hybrid application service requirements: – reliability, bandwidth, delay Internet transport service model – connection-oriented, reliable: TCP – unreliable, datagrams: UDP our study of network apps now complete! rspecific protocols:  HTTP  FTP  SMTP, POP, IMAP  DNS  P2P: BitTorrent, Skype rsocket programming

2: Application Layer22 Chapter 2: Summary typical request/reply message exchange: – client requests info or service – server responds with data, status code message formats: – headers: fields giving info about data – data: info being communicated Most importantly: learned about protocols Important themes: rcontrol vs. data msgs  in-band, out-of-band rcentralized vs. decentralized rstateless vs. stateful rreliable vs. unreliable msg transfer r“complexity at network edge”

Transport Layer3-23 Chapter 3: Transport Layer Our goals: understand principles behind transport layer services: – multiplexing/demultiplex ing – reliable data transfer – flow control – congestion control learn about transport layer protocols in the Internet: – UDP: connectionless transport – TCP: connection-oriented transport – TCP congestion control

Transport Layer3-24 Chapter 3 outline 3.1 Transport-layer services 3.2 Multiplexing and demultiplexing 3.3 Connectionless transport: UDP 3.4 Principles of reliable data transfer 3.5 Connection-oriented transport: TCP – segment structure – reliable data transfer – flow control – connection management 3.6 Principles of congestion control 3.7 TCP congestion control

Transport Layer3-25 Chapter 3 outline 3.1 Transport-layer services 3.2 Multiplexing and demultiplexing 3.3 Connectionless transport: UDP 3.4 Principles of reliable data transfer 3.5 Connection-oriented transport: TCP – segment structure – reliable data transfer – flow control – connection management 3.6 Principles of congestion control 3.7 TCP congestion control

Transport Layer3-26 Chapter 3 outline 3.1 Transport-layer services 3.2 Multiplexing and demultiplexing 3.3 Connectionless transport: UDP 3.4 Principles of reliable data transfer 3.5 Connection-oriented transport: TCP – segment structure – reliable data transfer – flow control – connection management 3.6 Principles of congestion control 3.7 TCP congestion control

Transport Layer3-27 Chapter 3 outline 3.1 Transport-layer services 3.2 Multiplexing and demultiplexing 3.3 Connectionless transport: UDP 3.4 Principles of reliable data transfer 3.5 Connection-oriented transport: TCP – segment structure – reliable data transfer – flow control – connection management 3.6 Principles of congestion control 3.7 TCP congestion control

Transport Layer3-28 Chapter 3 outline 3.1 Transport-layer services 3.2 Multiplexing and demultiplexing 3.3 Connectionless transport: UDP 3.4 Principles of reliable data transfer 3.5 Connection-oriented transport: TCP – segment structure – reliable data transfer – flow control – connection management 3.6 Principles of congestion control 3.7 TCP congestion control

Transport Layer3-29 Chapter 3 outline 3.1 Transport-layer services 3.2 Multiplexing and demultiplexing 3.3 Connectionless transport: UDP 3.4 Principles of reliable data transfer 3.5 Connection-oriented transport: TCP – segment structure – reliable data transfer – flow control – connection management 3.6 Principles of congestion control 3.7 TCP congestion control

Transport Layer3-30 Chapter 3 outline 3.1 Transport-layer services 3.2 Multiplexing and demultiplexing 3.3 Connectionless transport: UDP 3.4 Principles of reliable data transfer 3.5 Connection-oriented transport: TCP – segment structure – reliable data transfer – flow control – connection management 3.6 Principles of congestion control 3.7 TCP congestion control

Transport Layer3-31 Chapter 3: Summary principles behind transport layer services: – multiplexing, demultiplexing – reliable data transfer – flow control – congestion control instantiation and implementation in the Internet – UDP – TCP Next: leaving the network “edge” (application, transport layers) into the network “core”

Network Layer4-32 Chapter 4: Network Layer Chapter goals: understand principles behind network layer services: – network layer service models – forwarding versus routing – how a router works – routing (path selection) – dealing with scale – advanced topics: IPv6, mobility instantiation, implementation in the Internet

Network Layer4-33 Chapter 4: Network Layer 4. 1 Introduction 4.2 Virtual circuit and datagram networks 4.3 What’s inside a router 4.4 IP: Internet Protocol – Datagram format – IPv4 addressing – ICMP – IPv6 4.5 Routing algorithms – Link state – Distance Vector – Hierarchical routing 4.6 Routing in the Internet – RIP – OSPF – BGP 4.7 Broadcast and multicast routing

Network Layer4-34 Chapter 4: Network Layer 4. 1 Introduction 4.2 Virtual circuit and datagram networks 4.3 What’s inside a router 4.4 IP: Internet Protocol – Datagram format – IPv4 addressing – ICMP – IPv6 4.5 Routing algorithms – Link state – Distance Vector – Hierarchical routing 4.6 Routing in the Internet – RIP – OSPF – BGP 4.7 Broadcast and multicast routing

Network Layer4-35 Chapter 4: Network Layer 4. 1 Introduction 4.2 Virtual circuit and datagram networks 4.3 What’s inside a router 4.4 IP: Internet Protocol – Datagram format – IPv4 addressing – ICMP – IPv6 4.5 Routing algorithms – Link state – Distance Vector – Hierarchical routing 4.6 Routing in the Internet – RIP – OSPF – BGP 4.7 Broadcast and multicast routing

Network Layer4-36 Chapter 4: Network Layer 4. 1 Introduction 4.2 Virtual circuit and datagram networks 4.3 What’s inside a router 4.4 IP: Internet Protocol – Datagram format – IPv4 addressing – ICMP – IPv6 4.5 Routing algorithms – Link state – Distance Vector – Hierarchical routing 4.6 Routing in the Internet – RIP – OSPF – BGP 4.7 Broadcast and multicast routing

Network Layer4-37 Chapter 4: Network Layer 4. 1 Introduction 4.2 Virtual circuit and datagram networks 4.3 What’s inside a router 4.4 IP: Internet Protocol – Datagram format – IPv4 addressing – ICMP – IPv6 4.5 Routing algorithms – Link state – Distance Vector – Hierarchical routing 4.6 Routing in the Internet – RIP – OSPF – BGP 4.7 Broadcast and multicast routing

Network Layer4-38 Chapter 4: Network Layer 4. 1 Introduction 4.2 Virtual circuit and datagram networks 4.3 What’s inside a router 4.4 IP: Internet Protocol – Datagram format – IPv4 addressing – ICMP – IPv6 4.5 Routing algorithms – Link state – Distance Vector – Hierarchical routing 4.6 Routing in the Internet – RIP – OSPF – BGP 4.7 Broadcast and multicast routing

Network Layer4-39 Chapter 4: Network Layer 4. 1 Introduction 4.2 Virtual circuit and datagram networks 4.3 What’s inside a router 4.4 IP: Internet Protocol – Datagram format – IPv4 addressing – ICMP – IPv6 4.5 Routing algorithms – Link state – Distance Vector – Hierarchical routing 4.6 Routing in the Internet – RIP – OSPF – BGP 4.7 Broadcast and multicast routing

Network Layer4-40 Chapter 4: summary 4. 1 Introduction 4.2 Virtual circuit and datagram networks 4.3 What’s inside a router 4.4 IP: Internet Protocol – Datagram format – IPv4 addressing – ICMP – IPv6 4.5 Routing algorithms – Link state – Distance Vector – Hierarchical routing 4.6 Routing in the Internet – RIP – OSPF – BGP 4.7 Broadcast and multicast routing

5: DataLink Layer5-41 Chapter 5: The Data Link Layer Our goals: understand principles behind data link layer services: – error detection, correction – sharing a broadcast channel: multiple access – link layer addressing – reliable data transfer, flow control: done! instantiation and implementation of various link layer technologies

5: DataLink Layer5-42 Link Layer 5.1 Introduction and services 5.2 Error detection and correction 5.3Multiple access protocols 5.4 Link-layer Addressing 5.5 Ethernet 5.6 Link-layer switches 5.7 PPP 5.8 Link virtualization: MPLS 5.9 A day in the life of a web request

5: DataLink Layer5-43 Link Layer 5.1 Introduction and services 5.2 Error detection and correction 5.3Multiple access protocols 5.4 Link-layer Addressing 5.5 Ethernet 5.6 Link-layer switches 5.7 PPP 5.8 Link virtualization: MPLS 5.9 A day in the life of a web request

5: DataLink Layer5-44 Link Layer 5.1 Introduction and services 5.2 Error detection and correction 5.3Multiple access protocols 5.4 Link-layer Addressing 5.5 Ethernet 5.6 Link-layer switches 5.7 PPP 5.8 Link virtualization: MPLS 5.9 A day in the life of a web request

5: DataLink Layer5-45 Link Layer 5.1 Introduction and services 5.2 Error detection and correction 5.3Multiple access protocols 5.4 Link-Layer Addressing 5.5 Ethernet 5.6 Link-layer switches 5.7 PPP 5.8 Link virtualization: MPLS 5.9 A day in the life of a web request

5: DataLink Layer5-46 Link Layer 5.1 Introduction and services 5.2 Error detection and correction 5.3Multiple access protocols 5.4 Link-Layer Addressing 5.5 Ethernet 5.6 Link-layer switches 5.7 PPP 5.8 Link virtualization: MPLS 5.9 A day in the life of a web request

5: DataLink Layer5-47 Link Layer 5.1 Introduction and services 5.2 Error detection and correction 5.3 Multiple access protocols 5.4 Link-layer Addressing 5.5 Ethernet 5.6 Link-layer switches, LANs, VLANs 5.7 PPP 5.8 Link virtualization: MPLS 5.9 A day in the life of a web request

5: DataLink Layer5-48 Link Layer 5.1 Introduction and services 5.2 Error detection and correction 5.3Multiple access protocols 5.4 Link-Layer Addressing 5.5 Ethernet 5.6 Link-layer switches 5.7 PPP 5.8 Link virtualization: MPLS 5.9 A day in the life of a web request

5: DataLink Layer5-49 Link Layer 5.1 Introduction and services 5.2 Error detection and correction 5.3Multiple access protocols 5.4 Link-Layer Addressing 5.5 Ethernet 5.6 Link-layer switches 5.7 PPP 5.8 Link virtualization: MPLS 5.9 A day in the life of a web request

5: DataLink Layer5-50 Link Layer 5.1 Introduction and services 5.2 Error detection and correction 5.3Multiple access protocols 5.4 Link-Layer Addressing 5.5 Ethernet 5.6 Link-layer switches 5.7 PPP 5.8 Link virtualization: MPLS 5.9 A day in the life of a web request

5: DataLink Layer5-51 Chapter 5: Summary principles behind data link layer services: – error detection, correction – sharing a broadcast channel: multiple access – link layer addressing instantiation and implementation of various link layer technologies – Ethernet – switched LANS, VLANs – PPP – virtualized networks as a link layer: MPLS synthesis: a day in the life of a web request

5: DataLink Layer5-52 Chapter 5: let’s take a breath journey down protocol stack complete (except PHY) solid understanding of networking principles, practice ….. could stop here …. but lots of interesting topics! – wireless – multimedia – security – network management

7: Multimedia Networking7-53 Chapter 7: goals Principles classify multimedia applications identify network services applications need making the best of best effort service Protocols and Architectures specific protocols for best-effort mechanisms for providing QoS architectures for QoS

7: Multimedia Networking7-54 Chapter 7 outline 7.1 multimedia networking applications 7.2 streaming stored audio and video 7.3 making the best out of best effort service 7.4 protocols for real-time interactive applications RTP,RTCP,SIP 7.5 providing multiple classes of service 7.6 providing QoS guarantees

7: Multimedia Networking7-55 Chapter 7 outline 7.1 multimedia networking applications 7.2 streaming stored audio and video 7.3 making the best out of best effort service 7.4 protocols for real-time interactive applications RTP,RTCP,SIP 7.5 providing multiple classes of service 7.6 providing QoS guarantees

7: Multimedia Networking7-56 Chapter 7 outline 7.1 multimedia networking applications 7.2 streaming stored audio and video 7.3 making the best out of best effort service 7.4 protocols for real-time interactive applications RTP,RTCP,SIP 7.5 providing multiple classes of service 7.6 providing QoS guarantees

7: Multimedia Networking7-57 Chapter 7 outline 7.1 multimedia networking applications 7.2 streaming stored audio and video 7.3 making the best out of best effort service 7.4 protocols for real-time interactive applications RTP, RTCP, SIP 7.5 providing multiple classes of service 7.6 providing QoS guarantees

7: Multimedia Networking7-58 Chapter 7 outline 7.1 multimedia networking applications 7.2 streaming stored audio and video 7.3 making the best out of best effort service 7.4 protocols for real-time interactive applications RTP, RTCP, SIP 7.5 providing multiple classes of service 7.6 providing QoS guarantees

7: Multimedia Networking7-59 Chapter 7 outline 7.1 multimedia networking applications 7.2 streaming stored audio and video 7.3 making the best out of best effort service 7.4 protocols for real-time interactive applications RTP, RTCP, SIP 7.5 providing multiple classes of service 7.6 providing QoS guarantees

7: Multimedia Networking7-60 Chapter 7: Summary Principles classify multimedia applications identify network services applications need making the best of best effort service Protocols and Architectures specific protocols for best-effort mechanisms for providing QoS architectures for QoS – multiple classes of service – QoS guarantees, admission control

Student Notes See 52354_recap_student_notes.rtf