Download presentation
Presentation is loading. Please wait.
Published byNorma James Modified over 9 years ago
1
1 CIS 6930: Review on Network Technology Jonathan C.L. Liu, Ph.D. Department of Computer, Information Science and Engineering (CISE), University of Florida
2
2 Network Hardware Local Area Networks Metropolitan Area Networks Wide Area Networks Wireless Networks Home Networks Inter-networks
3
3 Local Area Networks
4
4 Metropolitan Area Networks A metropolitan area network based on cable TV.
5
5 Wide Area Networks A stream of packets from sender to receiver.
6
6 Wireless Networks (a) Bluetooth configuration (b) Wireless LAN
7
7 Network Software Protocol Hierarchies Design Issues for the Layers Connection-Oriented and Connectionless Services Service Primitives The Relationship of Services to Protocols
8
8
9
9 Connection-Oriented and Connectionless Services Six different types of service.
10
10 Service Primitives Packets sent in a simple client- server interaction on a connection-oriented network.
11
11
12
12
13
13 Fiber Optic Networks A fiber optic ring with active repeaters.
14
14 The Electromagnetic Spectrum The electromagnetic spectrum and its uses for communication.
15
15
16
16 Global Star (a) Relaying in space. (b) Relaying on the ground.
17
17 Structure of the Telephone System A typical circuit route for a medium- distance call.
18
18
19
19 Time Division Multiplexing The T1 carrier (1.544 Mbps).
20
20 Time Division Multiplexing (3) Multiplexing T1 streams into higher carriers.
21
21
22
22
23
23 Packet Switching A comparison of circuit switched and packet- switched networks.
24
24 Functions of the Data Link Layer Provide service interface to the network layer Dealing with transmission errors Regulating data flow Slow receivers not swamped by fast senders
25
25 Elementary Data Link Protocols An Unrestricted Simplex Protocol A Simplex Stop-and-Wait Protocol A Simplex Protocol for a Noisy Channel
26
26 Unrestricted Simplex Protocol
27
27 Simplex Stop-and- Wait Protocol
28
28 For a Noisy Channel A positive acknowledgement with retransmission protocol. Continued
29
29 For a Noisy Channel (2) A positive acknowledgement with retransmission protocol.
30
30 Sliding Window Protocols A One-Bit Sliding Window Protocol A Protocol Using Go Back N A Protocol Using Selective Repeat
31
31
32
32
33
33 Dynamic Channel Allocation Station Model. Single Channel Assumption. Collision Assumption. (a) Continuous Time. (b) Slotted Time. (a) Carrier Sense. (b) No Carrier Sense.
34
34 Pure ALOHA In pure ALOHA, frames are transmitted at completely arbitrary times.
35
35 Pure ALOHA (2) Vulnerable period for the shaded frame.
36
36 Pure ALOHA (3) Throughput versus offered traffic for ALOHA systems.
37
37 Performance Comparison
38
38 CSMA with Collision Detection CSMA/CD can be in one of three states: contention, transmission, or idle.
39
39 Ethernet Cabling The most common kinds of Ethernet cabling.
40
40 Ethernet MAC Sublayer Protocol
41
41 Ethernet Performance Efficiency of Ethernet at 10 Mbps with 512-bit slot times.
42
42 Switched Ethernet A simple example of switched Ethernet.
43
43 Fast Ethernet The original fast Ethernet cabling.
44
44 Some Wireless Networks 384 Kbps 56 Kbps 54 Mbps 5-11 Mbps 1 Mbps 802.15 802.11b 802.11{a,g} IS-95 CDMA, GSM UMTS/WCDMA, CDMA2000.11 p-to-p link 2G 3G Indoor 10 – 30m Outdoor 50 – 200m Mid range outdoor 200m – 4km Long range outdoor 5km – 20km
45
45 Wireless Link Characteristics Differences from a wired link …. decreased signal strength: radio signal attenuates as it propagates through matter (path loss) interference from other sources: standardized wireless network frequencies (e.g., 2.4 GHz) shared by other devices (e.g., phone); devices (motors) interfere as well multipath propagation: radio signal reflects off objects ground, arriving at destination with slightly different times …. make communication across (even a point to point) wireless link much more “difficult”
46
46 IEEE 802.11 Wireless LAN 802.11b 2.4-5 GHz unlicensed radio spectrum up to 11 Mbps direct sequence spread spectrum (DSSS) in physical layer all hosts use same chipping code widely deployed, using base stations 802.11a 5-6 GHz range up to 54 Mbps 802.11g 2.4-5 GHz range up to 54 Mbps All use CSMA/CA for multiple access All have base-station and ad-hoc network versions
47
47 Hidden-Node Problem (a) The hidden station problem. (b) The exposed station problem.
48
48 IEEE 802.11: multiple access avoid collisions: 2 + nodes transmitting at same time 802.11: CSMA - sense before transmitting don’t collide with ongoing transmission by other node 802.11: no collision detection! difficult to receive (sense collisions) when transmitting due to weak received signals (fading) can’t sense all collisions in any case: hidden nodes, and/or fading goal: avoid collisions: CSMA/C(ollision)A(voidance)
49
49 Timing of the protocol The use of virtual channel sensing using CSMA/CA.
50
50 Avoiding collisions (more) idea: allow sender to “reserve” channel rather than random access of data frames: avoid collisions of long data frames sender first transmits small request-to-send (RTS) packets to BS using CSMA RTS may still collide with each other (but they’re short) BS broadcasts clear-to-send (CTS) in response to RTS RTS heard by all nodes sender transmits data frame other stations defer transmissions Avoid data frame collisions completely using small reservation packets!
51
51 Collision Avoidance: RTS-CTS exchange AP A B time RTS(A) RTS(B) RTS(A) CTS(A) DATA (A) ACK(A) reservation collision defer
52
52 802.11: Channels, association 802.11b: 2.4GHz-2.485GHz spectrum divided into 11 channels at different frequencies AP admin chooses frequency for AP interference possible: channel can be same as that chosen by neighboring AP! host: must associate with an AP scans channels, listening for beacon frames containing AP’s name and MAC address selects AP to associate with may perform authentication will typically run DHCP to get IP address in AP’s subnet
53
53 Broadband Wireless The 802.16 Protocol Stack The 802.16 Physical Layer The 802.16 MAC Sublayer Protocol The 802.16 Frame Structure
54
54 The 802.16 Protocol Stack
55
55 The 802.16 Physical Layer The 802.16 transmission environment.
56
56 The 802.16 Physical Layer (2) Frames and time slots for time division duplexing.
57
57 802.16 MAC Sublayer Protocol Service Classes Constant bit rate service Real-time variable bit rate service Non-real-time variable bit rate service Best efforts service
58
58 802.16 Frame Structure (a) A generic frame. (b) A bandwidth request frame.
59
59 Bluetooth Bluetooth Architecture Bluetooth Applications The Bluetooth Protocol Stack The Bluetooth Radio Layer The Bluetooth Baseband Layer The Bluetooth L2CAP Layer The Bluetooth Frame Structure
60
60 M radius of coverage S S S P P P P M S Master device Slave device Parked device (inactive) P 802.15: personal area network less than 10 m diameter replacement for cables (mouse, keyboard, headphones) ad hoc: no infrastructure master/slaves: slaves request permission to send (to master) master grants requests 802.15: evolved from Bluetooth specification 2.4-2.5 GHz radio band up to 721 kbps
61
61 The Bluetooth Protocol Stack The 802.15 version of the Bluetooth protocol architecture.
62
62 The Bluetooth Frame Structure A typical Bluetooth data frame.
63
63 IEEE 802.15.3 - Overview High data rate WPAN Potential future standard Motivation: The need for higher bandwidths currently supported with 802.15.1 100 Mpbs within 10 meter 400 Mpbs within 5 meter Data, High quality TV, Home cinema
64
64 IEEE 802.15.3 - Overview Dynamic topology Mobile devices often join and leave the piconet Short connection times High spatial capacity Multiple Power Management modes Secure Network
65
65 IEEE 802.15.3 - Overview Based on piconets Data Devices (DEV) establish peer-to- peer communication Includes also a Piconet Coordinator (PNC)
66
66 IEEE 802.15.3 - Topology
67
67 IEEE 802.15.3 - Superframe
68
68 IEEE 802.15.3 - Beacon Beacon Control information Allocates GTS Synchronization
69
69 IEEE 802.15.3 - CAP CAP Allows contention via CSMA/CA Command exchange between DEV and PNC File transfers from DEV without request
70
70 IEEE 802.15.3 - CFP CFP Time slot allocation specified in the beacon Reserved bandwidth for DEV MTS: Command, GTS: Data
71
71 IEEE 802.15.3 - GTS GTS reservation DEV sends a Channel Time Request (CTR) to PNC Isochronous data: number and duration of slot(s) Asynchronous data: Total amount of data PNC allocates GTSs to DEV via CTA DEV is responsible of utilizing allocated GTSs
72
72 IEEE 802.15.3 - GTS Two types of GTSs Dynamic GTS Location within a superframe may change PNC can optimize channel utilization Pseudostatic GTS Only for isochronous data Fixed location within a superframe May be changed, but only after a series of notitications to the DEV
73
73 IEEE 802.15.3 Starting a piconet DEV scans the for the best channel and sends out beacons -> the DEV becomes PNC If no channels available: Establishes a child or neighbor piconet instead Requests a private GTS from parent PNC All communication takes place within assigned GTS
74
74 IEEE 802.15.3 - QoS QoS IEEE 802.15.3 supports both synchronous and asynchronous data CAP offers only best-effort The PNC will allocate resources in the CFP Through admission control Synchronous data: Based on number of time slots per superframe, duration of slot, priority and GTS type
75
75 IEEE 802.15.3 - QoS Asynchronous data: Based on total data and priority After performing admission control, GTSs may be allocated
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.