Chapter 5.6 Network and Multiplayer edited by Jeffery.

Slides:



Advertisements
Similar presentations
Part 1: Multiplayer Games Multiplayer Modes. Multiplayer Modes Event Timing Turn-Based Easy to implement Any connection type Real-Time Difficult to implement.
Advertisements

CPSC Network Layer4-1 IP addresses: how to get one? Q: How does a host get IP address? r hard-coded by system admin in a file m Windows: control-panel->network->configuration-
Computer Networks20-1 Chapter 20. Network Layer: Internet Protocol 20.1 Internetworking 20.2 IPv IPv6.
1 o Two issues in practice – Scale – Administrative autonomy o Autonomous system (AS) or region o Intra autonomous system routing protocol o Gateway routers.
1 Chapter 3 TCP and IP. Chapter 3 TCP and IP 2 Introduction Transmission Control Protocol (TCP) Transmission Control Protocol (TCP) User Datagram Protocol.
CS3505 The Internet and Info Hiway transport layer protocols : TCP/UDP.
1 Version 3 Module 8 Ethernet Switching. 2 Version 3 Ethernet Switching Ethernet is a shared media –One node can transmit data at a time More nodes increases.
1 Version 3 Module 8 Ethernet Switching. 2 Version 3 Ethernet Switching Ethernet is a shared media –One node can transmit data at a time More nodes increases.
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
Chapter 5.6 Network and Multiplayer SUNDEEP MYNENI COMP 7970.
Understanding Networks. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
1 Interconnection ECS 152A. 2 Interconnecting with hubs r Backbone hub interconnects LAN segments r Extends max distance between nodes r But individual.
Bob Baker Communications Bob Baker September 1999.
Review on Networking Technologies Linda Wu (CMPT )
Chapter 5.6 Network and Multiplayer. 2 Multiplayer Modes: Event Timing Turn-Based Easy to implement Any connection type Real-Time Difficult to implement.
Defining Network Protocols Application Protocols –Application Layer –Presentation Layer –Session Layer Transport Protocols –Transport Layer Network Protocols.
©Brooks/Cole, 2003 Chapter 6 Computer Networks. ©Brooks/Cole, 2003 Understand the rationale for the existence of networks. Distinguish between the three.
IP Network Basics. For Internal Use Only ▲ Internal Use Only ▲ Course Objectives Grasp the basic knowledge of network Understand network evolution history.
Internet Vulnerabilities & Criminal Activities 1.2 – 9/12/2011 Structure of Internet Communications 1.2 – 9/12/2011 Structure of Internet Communications.
CN2668 Routers and Switches Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
Network Layer4-1 NAT: Network Address Translation local network (e.g., home network) /24 rest of.
Chapter 4: Managing LAN Traffic
Adapted from: Computer Networking, Kurose/Ross 1DT066 Distributed Information Systems Chapter 4 Network Layer.
Chapter 1 Overview Review Overview of demonstration network
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
Computer Networks.  The OSI model is a framework containing seven layers that defines the protocols and devices used at each stage of the process when.
Characteristics of Communication Systems
1 Chapter Overview TCP/IP DoD model. 2 Network Layer Protocols Responsible for end-to-end communications on an internetwork Contrast with data-link layer.
ACM 511 Chapter 2. Communication Communicating the Messages The best approach is to divide the data into smaller, more manageable pieces to send over.
Operating Systems Lesson 10. Networking Communications protocol is the set of standard rules for ◦ Data representation ◦ Signaling ◦ Authentication ◦
CSCE 552 Fall 2012 Multiplayer By Jijun Tang. Multiplayer Modes: Event Timing Turn-Based  Easy to implement  Any connection type Real-Time  Difficult.
1 7-Oct-15 OSI transport layer CCNA Exploration Semester 1 Chapter 4.
Introduction to Networks CS587x Lecture 1 Department of Computer Science Iowa State University.
Transport Layer 3-1 Chapter 4 Network Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012  CPSC.
I. Basic Network Concepts. I.1 Networks Network Node Address Packet Protocol.
1 Networking Chapter Distributed Capabilities Communications architectures –Software that supports a group of networked computers Network operating.
5: Link Layer Part Link Layer r 5.1 Introduction and services r 5.2 Error detection and correction r 5.3Multiple access protocols r 5.4 Link-Layer.
Review the key networking concepts –TCP/IP reference model –Ethernet –Switched Ethernet –IP, ARP –TCP –DNS.
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
TCP/IP Honolulu Community College Cisco Academy Training Center Semester 2 Version 2.1.
Computer Security Workshops Networking 101. Reasons To Know Networking In Regard to Computer Security To understand the flow of information on the Internet.
Transport Layer3-1 Chapter 4: Network Layer r 4. 1 Introduction r 4.2 Virtual circuit and datagram networks r 4.3 What’s inside a router r 4.4 IP: Internet.
Individual Project 1 Sarah Pritchard. Fran, a customer of your company, would like to visit your company’s website from her home computer… How does your.
1 Bus topology network. 2 Data is sent to all computers, but only the destination computer accepts 02608c
1 12-Jan-16 OSI network layer CCNA Exploration Semester 1 Chapter 5.
ISDS 4120 Project 1 DWAYNE CARRAL JR 3/27/15. There are seven layers which make up the OSI (Open Systems Interconnection Model) which is the model for.
Data Communications and Computer Networks Chapter 4 CS 3830 Lecture 19 Omar Meqdadi Department of Computer Science and Software Engineering University.
Network Layer by peterl. forwarding table routing protocols path selection RIP, OSPF, BGP IP protocol addressing conventions datagram format packet handling.
5: DataLink Layer5-1 Hubs Hubs are essentially physical-layer repeaters: m bits coming from one link go out all other links m at the same rate m no frame.
Chapter 3 TCP and IP 1 Chapter 3 TCP and IP. Chapter 3 TCP and IP 2 Introduction Transmission Control Protocol (TCP) User Datagram Protocol (UDP) Internet.
Cisco I Introduction to Networks Semester 1 Chapter 7 JEOPADY.
Client-server communication Prof. Wenwen Li School of Geographical Sciences and Urban Planning 5644 Coor Hall
CSCE 552 Spring 2012 AI (III) & Multiplayer By Jijun Tang.
Week 3: Protocols Protocols. Protocols Protocol Design Packet Length Conveyance Acknowledgement Methodology Error Checking / Correcting Compression Encryption.
IST 201 Chapter 11 Lecture 2. Ports Used by TCP & UDP Keep track of different types of transmissions crossing the network simultaneously. Combination.
Ad Hoc – Wireless connection between two devices Backbone – The hardware used in networking Bandwidth – The speed at which the network is capable of sending.
Chapter 3 TCP and IP Chapter 3 TCP and IP.
Introduction to TCP/IP
Chapter 5 Network and Transport Layers
What the OSI Protocol Layers Do
Layered Architectures
Hubs Hubs are essentially physical-layer repeaters:
The Open System Interconnection (OSI) Model & Network Protocols.
Chapter 5 Network and Transport Layers
Hubs Hubs are essentially physical-layer repeaters:
Data and Computer Communications by William Stallings Eighth Edition
I. Basic Network Concepts
Network Core and QoS.
Chapter 15 – Part 2 Networks The Internal Operating System
Network Core and QoS.
Presentation transcript:

Chapter 5.6 Network and Multiplayer edited by Jeffery

2 Multiplayer Modes: Event Timing Turn-Based Easy to implement Any connection type Real-Time Difficult to implement Latency sensitive Internet adds Lots o’ Latency

3 Multiplayer Modes: Shared I/O, Single Engine Input Devices Shared keyboard layout Multiple devices (e.g. trackballs) Display Full Screen, varying modes Split Screen For this class: network instead!

4 Protocols: Protocol Design Packet Format and Length Acknowledgement Methodology Error Checking / Correcting Compression Encryption Packet Control

5 Protocols: Packets Packets Header = Protocol Manifest Payload Gotchas Pointers Large/Variable Size Arrays ADTs Integer Alignment Endian Order Processor dependant Intrinsic Types (int and long) Unicode vs. ASCII Strings

6 Protocol Stack: Open System Interconnect

7 Protocol Stack: Physical Layer Bandwidth Capacity of data pipe Measured in bps = bits per second Latency Travel time from point A to B Measured in Milliseconds The Medium Fiber, FireWire, IrD, CDMA, … SerialDSLCable LAN 10/100/1G BaseT Wireless b/g/n T1 Speed (bps) 20K 1.5M down 896K up 3M down 256K up 10M 100M 1G b=11M g=54M n=70-150M 1.5M Table: Max Bandwidth Specifications

8 Protocol Stack: Data Link Layer Serializes data to/from physical layer Network Interface Card Ethernet MAC Address

9 Protocol Stack: Network Layer Packet Routing Hops Routers, Hubs, Switches Internet Protocol (IP) Contains Source & Destination IP Address IPv4 Widespread Infrastructure IPv6 Larger IP address

10 Protocol Stack: Network Layer: IP Address Unicast Static DHCP Multicast Requires multicast capable router Broadcast Local Directed Loop Back Send to self AddrAny 0 = address before receiving an address

11 Protocol Stack: Network Layer: DNS Domain Name Service Converts text name to IP address Must contact one or more DNS servers to resolve Local cache resolution possible Game Tips Store local game cache to use when DNS out of order. DNS resolution often slow, use cache for same day resolution.

12 Protocol Stack: Transport Layer Manage data delivery, src to dest Error recovery Data flow TCP and UDP used with IP Contains Source and Destination Port Port + IP = Net Address Port Range = 0-64k Well known Ports 0-1k

13 Protocol Stack: Transport Layer: TCP Guaranteed Correct In Order Delivery Acknowledgement system Ack, Nack, Resend Checksum Out of Band Connection Required Packet Window Packet Coalescence Keep Alive Streamed Data User must serialize data

14 Protocol Stack: Transport Layer: UDP Non Guaranteed Delivery No Acknowledgement system May arrive out of order Checksum Not Connected Source not verified Hop Count Limit = TTL (time to live) Required for Broadcasting Datagram Sent in packets exactly as user sends them

15 Protocol Stack: Session Layer Manages Connections between Apps Connect Terminate Data Exchange Socket API live at this layer Cross platform Cross language

16 Protocol Stack: Session Layer: Sockets Based on File I/O File Descriptors Open/Close Read/Write Winsock Provides standard specification implementation plus more Extension to spec prefixed with “WSA” Requires call to WSAStartup() before use Cleanup with WSAShutdown()

17 Protocol Stack: Session Layer: Socket Design Modes Blocking Non-Blocking Standard Models Standard Select Extended Models Windows WSAEventSelect I/O Completion Ports Unix Poll Kernel Queues

18 Protocol Stack: Presentation Layer Prepares App Data for Transmission Compression Pascal Strings String Tables Float to Fixed Matrix to Quaternion Encryption Endean Order When used cross platform or cross language Serialize Pointers Variable Length Arrays

19 Protocol Stack: Presentation Layer: Buffering Packet Coalescence Induced Latency Dead Data Large Packets

20 Protocol Stack: Application Layer Handles Game Logic Update Models Input Reflection State Reflection Synchronization Dead Reckoning AI Assist Arbitration

21 Real-Time Communications: Connection Models Broadcast Good for player discovery on LANs Peer to Peer Good for 2 player games Made difficult by NAT Client / Server Good for 2+ player games Dedicated lobby server for player discovery

22 Real-Time Communications: Peer to Peer vs. Client/Server BroadcastPeer/PeerClient/Server Connections0 Client = 1 Server = N N = Number of players BroadcastPeer/PeerClient/Server Send1N-1 Client = 1 Server = N ReceiveN-1 Client = 1 Server = N

23 Real-Time Communications: Asynchronous Environments Thread Priority Suspension Pooling Critical Section & Mutex Signal & Event Data Sharing volatile keyword Interlocked Inc/Dec

24 Security: Encryption Goals Authentication Privacy Integrity

25 Security: Firewalls Packet Filter Proxies Circuit Gateways

26 Security: Firewalls: Network Address Translation

27 Security: Firewalls: NAT Traversal Port Forwarding Port Triggering DMZ Determining WAN IP

28 Summary: Topic Coverage Multiplayer Modes Protocols Protocol Stack Real-Time Communications Security

29 Summary: Further Study Socket Programming Serial Communication Server Design Network Gear & Infrastructure VOIP Tools of the Trade Unit & Public Beta Testing Middleware Databases Web Development Asynchronous Programming