Review. Layers Physical layer – sending bits from one place to another, ensuring an okay BER Data link layer – encapsulate information bits into frames,

Slides:



Advertisements
Similar presentations
The ALOHA Protocol “Free for all”: whenever station has a frame to send, it does so. –Station listens for maximum RTT for an ACK. –If no ACK after a specified.
Advertisements

Ethernet – CSMA/CD Review
Multiple access What if multiple machines are sharing the same link?
LECTURE 11 CT1303 LAN. DYNAMIC MAC PROTOCOL No fixed assignment for transmission media or any network resources.. It allows transmission when needed.
– Wireless PHY and MAC Stallings Types of Infrared FHSS (frequency hopping spread spectrum) DSSS (direct sequence.
1 K. Salah Module 4.2: Media Access Control The Media Access Control (MAC) sublayer –Random Access (CSMA), IEEE –Token Passing, IEEE Ch 13-
1 Pertemuan 13 Teknik Akses Jaringan - Random Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
EEC-484/584 Computer Networks Lecture 7 Wenbing Zhao
Department of Computer Engineering University of California at Santa Cruz Networking Systems (1) Hai Tao.
MAC Protocols Media Access Control (who gets the use the channel) zContention-based yALOHA and Slotted ALOHA. yCSMA. yCSMA/CD. TDM and FDM are inefficient.
Distributed systems Module 1 -Basic networking Teaching unit 1 – LAN standards Ernesto Damiani University of Bozen-Bolzano Lesson 5 – Collision management.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 17 Introduction to Computer Networks.
1 Computer Networks Local Area Networks. 2 A LAN is a network: –provides Connectivity of computers, mainframes, storage devices, etc. –spans limited geographical.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
CSC 450/550 Part 3: The Medium Access Control Sublayer.
Distributed systems Module 1 -Basic networking Teaching unit 1 – LAN standards Ernesto Damiani University of Bozen-Bolzano Lesson 4 – Ethernet frame.
EE 4272Spring, 2003 Chapter 14 LAN Systems Ethernet (CSMA/CD)  ALOHA  Slotted ALOHA  CSMA  CSMA/CD Token Ring /FDDI Fiber Channel  Fiber Channel Protocol.
Transmission Control Protocol (TCP) and Packet-Switching Hardware Devang Parekh EE290F 4/15/04.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
Chapter 6 Errors, Error Detection, and Error Control
EEC-484/584 Computer Networks Lecture 7 Wenbing Zhao
Medium Access Control Sublayer
5: DataLink Layer5-1 LAN technologies Data link layer so far: m services, error detection/correction, multiple access Next: LAN technologies m addressing.
9/11/2015 5:55 AM1 Ethernet and CSMA/CD CSE 6590 Fall 2010.
1 Computer Communication & Networks Lecture 13 Datalink Layer: Local Area Network Waleed Ejaz
Chi-Cheng Lin, Winona State University CS412 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
Ch. 16 High-Speed LANs The Emergence of High- Speed LANs Trends –Computing power of PCs has continued to grow. –MIS organizations recognize the.
NUS.SOC.CS2105 Ooi Wei Tsang Application Transport Network Link Physical you are here.
LECTURE9 NET301. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies the absence of other.
Exercises. Problem 1 The link delay is 270ms. Each data frame is 1000 bits. Data rate is 1Mbps. What is the link efficiency of the Stop&Wait protocol?
Module 8: Ethernet Switching
Review the key networking concepts –TCP/IP reference model –Ethernet –Switched Ethernet –IP, ARP –TCP –DNS.
Data and Computer Communications Ninth Edition by William Stallings Data and Computer Communications, Ninth Edition by William Stallings, (c) Pearson Education.
Data Link Layer Moving Frames. Link Layer Protocols: ethernet, wireless, Token Ring and PPP Has node-to-node job of moving network layer.
ECE453 – Introduction to Computer Networks Lecture 17 – Top – Down Approach (A Review)
Cisco 3 - Switching Perrine. J Page 16/4/2016 Chapter 4 Switches The performance of shared-medium Ethernet is affected by several factors: data frame broadcast.
Final Review Focus- Chapter 4: Network layer Chapter 5: Data link layer Notes: Physical layer Understand previous chapters covered in class. Final exam.
Data Communications, Kwangwoon University12-1 Chapter 12. Multiple Access 1.Random Access 2.Controlled Access 3.Channelization.
Lecture Topics: 11/27 Networks Layered Model Ethernet IP.
Networks. Ethernet  Invented by Dr. Robert Metcalfe in 1970 at Xerox Palo Alto Research Center  Allows group of computers to communicate in a Local.
Ethernet Overview it the IEEE standard for Ethernet.
Review of key networking techniques: –Reliable communication over unreliable channels –Error detection and correction –Medium access control –routing –Congestion.
Midterm Review. Physical Layer Physical layer design goal: send out bits as fast as possible with acceptable low error ratio C=B*log(1+S/N) – C is the.
LECTURE9 NET301 11/5/2015Lect 9 NET DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies.
CTC 228 – Computer Networks Fall 2015 Instructor: Robert Spengler.
TCP continued. Discussion – TCP Throughput TCP will most likely generate the saw tooth type of traffic. – A rough estimate is that the congestion window.
EE 122: Lecture 6 Ion Stoica September 13, 2001 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose)
CCNA3 Module 4 Brierley Module 4. CCNA3 Module 4 Brierley Topics LAN congestion and its effect on network performance Advantages of LAN segmentation in.
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
1 Ethernet CSE 3213 Fall February Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed.
Midterm Review. Physical Layer Physical layer design goal: send out bits as fast as possible with acceptable low error ratio C=B*log(1+S/N) – C is the.
Computer Networks 0100-Ethernet Gergely Windisch
Ch. 16 Ethernet Traditional Ethernet IEEE Medium Access Control –Carrier Sense Multiple Access with Collision Detection (CSMA/CD) –The most.
Example DLL Protocols 1. High-Level Data Link Control (HDLC).
Part III. Data Link Layer
Multiple Access Methods
Course Review 2015 Computer networks 赵振刚
High Speed LANs – Ethernet and Token Ring
Computer Communication Networks
CS 457 – Lecture 6 Ethernet Spring 2012.
Net301 lecture9 11/5/2015 Lect 9 NET301.
Multiple Access Methods
Learning Objectives After interacting with this Learning Object, the learner will be able to: Explain the process of collision detection in CSMA/CD.
Lecture 5- Data Link Layer
Binit Mohanty Ketan Rajawat
Multiple Access Methods
EE469 Review 1.
LAN Addresses and ARP IP address: drives the packet to destination network LAN (or MAC or Physical) address: drives the packet to the destination node’s.
Multiple Access Control (MAC) Protocols
Presentation transcript:

Review

Layers Physical layer – sending bits from one place to another, ensuring an okay BER Data link layer – encapsulate information bits into frames, and send frames from one node to another neighboring node Network layer – send packets from one place to another, may travel multiple hops Transportation layer – (TCP) sending segments from one end to the other end, making sure that there is no error, etc.

Physical Layer The goal – sending bits from one place to another Two limiting factors, bandwidth and power. Shannon’s theorem.

Problem

Physical layer If bandwidth is abundant, no special things needs to be done. Like 10Mbps Ethernet. Just pulling voltage up and down. In other cases when bandwidth is not so much, like wireless and telephone lines, have to do something.

Physical Layer Sine waves. Send a sine wave, the other end will receive a sine wave also. It will be on the same frequency, but the amplitude will be different (attenuation) and phase will be different (propagation delay). Typically you are allowed to use only a frequency band. Wireless LAN – g – 2.4G-2.48G. Divided into channels, each channel is 20M. Cellphone – maybe in the 900M band, or the 1.8G band, etc. GSM divides the band (50M) into channels, each channel being 200k. Each channel shared by 8 users in a time division fashion.

Physical Layer You have to send signals *modulated* on a sine wave on the frequency you are allowed to use. Modulation techniques. Frequency. Amplitude. Phase. OFDM (in g and a).

The basic transmission/reception diagram Information bits  baseband waveform  modulated waveform. Received waveform  baseband waveform  information bits

Problem

I, Q channels It is possible to pack two sine waves on the same frequency and send them out, one is sine and the other is cosine, each carrying one baseband waveform. I channel and Q channel.

Problem

Error Correction and Detection By introducing redundancy, the receiver can do some calculation to correct or detect errors. The key is, every error will result in a unique syndrome. You find the syndrome you find the error. If there is a syndrome, there is an error. Cyclic codes. Any cyclic shift of a codeword is still a codeword. Code generated by doing polynomial calculations. Detects error if the remainder is not 0.

Problem

Data Link Layer Sending frames from one end of a link to the other end of the link. The problem is: the receiver may be slow, the link may lose frames, both the data frames and the control frames you want to use.

Data Link Layer Simplest correct protocol. Stop and Wait. – ACK, Timeout, Sequence number Transmission delay and propagation delay. If propagation delay is small, like in a distance of 1km, Stop and Wait is perfectly fine. Otherwise, not efficient.

Data Link Layer Go-back-N. – The sender is allowed a window. The frames in this window can be sent without ACK. – Every time a timeout happens, retransmit. – Receiver has window size 1. Protocol beyond Go-back-N. – Receiver keeps window greater than 1.

Problem

MAC In Ethernet and wireless LAN, nodes share a medium. How to design a protocol to allow nodes share the medium without causing collisions. Collision means two frames were sent at the same time.

MAC You can do polling, but the traffic of computers are random. Contention-based. Nodes know better when they want to send. ALOHA – send when want to, no carrier sense.

Ethernet Ethernet – CSMA/CD. 1-persistent. Exponential backoff. Sense the medium before sending, if busy, don’t send. When medium is free, send. If noticed a jam signal, stop, backoff. The time to backoff is picked randomly from [0,CW-1]. Wait for the backoff time and then check the channel again. If free, send. If busy again, double CW. Until CW is give up when tried 16 times.

CSMA/CA. non-persistent. Exponential backoff. Sense the medium before sending, if busy, don’t send. When medium is free, backoff a time picked randomly from [0,CW-1]. If still free, send. If no ACK received, double CW, repeat the process. Give up when tried 1 times.

Problem

Network Layer Network Layer – moving packets from one place to the other First problem – routing. Shortest path algorithm. Link State Algorithm. Distance Vector Algorithm.

IP IP address. A,B, C, D class. CIDR. The allocation of IP addresses. Internet Protocols. BGP, OSPF, DHCP, ARP. NAT.

Problem

Routers Lookup to find next hop link. Input-buffered switches and scheduling algorithm.

Transportation Layer TCP – send segments from one end to the other end reliably. TCP connection set up. Three-way handshake. Initial sequence number. TCP connection close.

TCP TCP congestion control. AIMD. Why is it used. TCP optimizations. TCP Reno. Fast retransmit and fast recovery.

Problem

TCP Data frame: =242us TCP ACK frame: 20+6 = 26us Each transaction is = 404us And the transferred 1460 * 8 = bits So, 28.9Mbps

Network Security Three tools. Hash function. Block cipher. RSA. Hash functions. Two properties. Block Cipher. Pseudo random permutation. AES. Cipher modes. RSA.

Network Security Applying the tools to realize functions. Digital Signature. Certificate.

Problem