-1- Georgia State UniversitySensorweb Research Laboratory CSC4220/6220 Computer Networks Dr. WenZhan Song Professor, Computer Science.

Slides:



Advertisements
Similar presentations
Quality of Service Requirements
Advertisements

Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
TELE202 Lecture 8 Congestion control 1 Lecturer Dr Z. Huang Overview ¥Last Lecture »X.25 »Source: chapter 10 ¥This Lecture »Congestion control »Source:
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Chapter 5 Network Layer.
Congestion Control Algorithms
Congestion Control Algorithms
The Network Layer Functions: Congestion Control
The Network Layer Chapter 5. Network Layer Design Isues a)Store-and-Forward Packet Switching b)Services Provided to the Transport Layer c)Implementation.
The Network Layer Chapter Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011.
Review: Routing algorithms Distance Vector algorithm. –What information is maintained in each router? –How to distribute the global network information?
Network and Communications Hongsik Choi Department of Computer Science Virginia Commonwealth University.
Computer Networks NYUS FCSIT Spring 2008 Milos STOLIC, Bs.C. Teaching Assistant
1 The Network Layer Chapter 5. 2 Network Layer Design Isues Store-and-Forward Packet Switching Services Provided to the Transport Layer Implementation.
Quality of Service Requirements
1 Quality of Service Requirements Techniques for Achieving Good Quality of Service Integrated Services Differentiated Services Label Switching and MPLS.
Computer Communication1 Computer Communications Summary.
4-1 Network layer r transport segment from sending to receiving host r on sending side encapsulates segments into datagrams r on rcving side, delivers.
Chapter 4 Network Layer slides are modified from J. Kurose & K. Ross CPE 400 / 600 Computer Communication Networks Lecture 14.
CSIT435 Spring 2001 Final Examination Study Guide.
Chapter 4 Network Layer slides are modified from J. Kurose & K. Ross CPE 400 / 600 Computer Communication Networks Lecture 13.
Computer Communication1 Computer Communications Summary.
Chapter 4 Queuing, Datagrams, and Addressing
Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Link Layer data center.
Chapter 5 Link Layer and LANs
The Network Layer Chapter 5.
Communications Recap Duncan Smeed. Introduction 1-2 Chapter 1: Introduction Our goal: get “feel” and terminology more depth, detail later in course.
Chapter 5 The Network Layer.
The Network Layer Week 5. Network Layer Design Isues Store-and-Forward Packet Switching Services Provided to the Transport Layer Implementation of Connectionless.
CS 381 Final Exam Study Guide Final Exam Date: Tuesday, May 12 th Time: 10:30am -12:30pm Room: SB 105 Exam aid: 8 ½ x 11 page of notes front and back.
Data Communications and Computer Networks Chapter 4 CS 3830 Lecture 18 Omar Meqdadi Department of Computer Science and Software Engineering University.
Network Layer4-1 Chapter 4: Network Layer Chapter goals: r understand principles behind network layer services: m network layer service models m forwarding.
Objectives: Chapter 5: Network/Internet Layer  How Networks are connected Network/Internet Layer Routed Protocols Routing Protocols Autonomous Systems.
Final Review EECS 489 Computer Networks Z. Morley Mao Monday April 16, 2007.
Link Layer 5-1 Link layer, LAN s: outline 5.1 introduction, services 5.2 error detection, correction 5.3 multiple access protocols 5.4 LANs  addressing,
The Network Layer Chapter 5. Network Layer Design Isues Store-and-Forward Packet Switching Services Provided to the Transport Layer Implementation of.
7-1 Last time □ Wireless link-layer ♦ Introduction Wireless hosts, base stations, wireless links ♦ Characteristics of wireless links Signal strength, interference,
Chapter 4 Network Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Network Layer introduction.
5: Link Layer Part Link Layer r 5.1 Introduction and services r 5.2 Error detection and correction r 5.3Multiple access protocols r 5.4 Link-Layer.
1 Network Layer Lecture 13 Imran Ahmed University of Management & Technology.
Link Layer5-1 Synthesis: a day in the life of a web request  journey down protocol stack complete!  application, transport, network, link  putting-it-all-together:
IP addresses. Network Layer introduction 4.2 virtual circuit and datagram networks 4.3 what’s inside a router 4.4 IP: Internet Protocol datagram.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 23 Congestion Control and Quality of Service.
1 Lecture, November 27, 2002 TCP Other Internet Protocols; Internet Traffic Scalability of Virtual Circuit Networks QoS.
The Network Layer Chapter 5 1/4/2016www.ishuchita.com1.
Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
Lecture Network layer -- May Congestion control Algorithms.
Chapter 5 The Network Layer.
 1DT014 Datakommunikation I › (Thur) 9-14 › Polacksbacken, Skrivsal  9 Questions › 5 Short questions › 4 Long questions.
Network Layer4-1 Chapter 4 Network Layer All material copyright J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking: A Top Down.
Chapter 4 Network Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
The Network Layer Congestion Control Algorithms & Quality-of-Service Chapter 5.
Assignment 1  Chapter 1:  Question 11  Question 13  Question 14  Question 33  Question 34  Chapter 2:  Question 6  Question 39  Chapter 3: 
Graciela Perera Department of Computer Science and Information Systems Slide 1 of 18 INTRODUCTION NETWORKING CONCEPTS AND ADMINISTRATION CSIS 3723 Graciela.
INTRODUCTION NETWORKING CONCEPTS AND ADMINISTRATION CSIS 3723
Network Layer, and Logical Addresses
CS 280: Summary: A day in the life of a web request
Course Review 2015 Computer networks 赵振刚
Chapter 4: Network Layer
Chapter 5 The Network Layer.
Introduction to Computer Networks
Introduction An introduction to the software and organization of the Internet Lab.
Tanenbaum Chapter 5 Network
Network Layer I have learned from life no matter how far you go
Congestion Control, Quality of Service, & Internetworking
Chapter 4 Network Layer Computer Networking: A Top Down Approach 5th edition. Jim Kurose, Keith Ross Addison-Wesley, April Network Layer.
The Network Layer Congestion Control Algorithms & Quality-of-Service
CS 381: Introduction to Computer Networks
Chapter 5 The Network Layer.
Chapter 4: Network Layer
Chapter 5: Link Layer 5.1 Introduction and services
Presentation transcript:

-1- Georgia State UniversitySensorweb Research Laboratory CSC4220/6220 Computer Networks Dr. WenZhan Song Professor, Computer Science

-2- Georgia State UniversitySensorweb Research Laboratory Course roadmap Introduction Application Layer: WWW, FTP, , DNS, multimedia Transport Layer: reliable end-end data transfer principles, UDP, TCP Network Layer: IP addressing, routing and other issues Data Link Layer: framing, error control, flow control Medium Access Control (MAC) Layer: multiple-access, channel allocation Physical Layer: wired, wireless, satellite Other Topics: network security, social issues, hot topics, research directions

-3- Georgia State UniversitySensorweb Research Laboratory Roadmap Network Layer Network layer design issues overview of service models Virtual circuits and datagram networks IP: Internet Protocol datagram format, IPv4 addressing NAT, IPv6 ICMP, ARP, DHCP Routing algorithms distance vector link state Routing Protocol in Internet RIP OSPF BGP Other issues in network layer

-4- Georgia State UniversitySensorweb Research Laboratory Other issues in network layer Congestion control (in network) QoS Internetworking

-5- Georgia State UniversitySensorweb Research Laboratory Congestion When too much traffic is offered, congestion sets in and performance degrades sharply.

-6- Georgia State UniversitySensorweb Research Laboratory General Principles of Congestion Control Monitor the system. detect when and where congestion occurs. Pass information to where action can be taken. Adjust system operation to correct the problem.

-7- Georgia State UniversitySensorweb Research Laboratory Congestion Prevention Policies Policies that affect congestion.

-8- Georgia State UniversitySensorweb Research Laboratory Congestion Control in Virtual-Circuit Subnets (a) A congested subnet. (b) A redrawn subnet, eliminates congestion and a virtual circuit from A to B.

-9- Georgia State UniversitySensorweb Research Laboratory Hop-by-Hop Choke Packets (a) A choke packet that affects only the source. (b) A choke packet that affects each hop it passes through.

-10- Georgia State UniversitySensorweb Research Laboratory Quality of Service Requirements Techniques for Achieving Good Quality of Service Integrated Services Differentiated Services Label Switching and MPLS

-11- Georgia State UniversitySensorweb Research Laboratory Requirements How stringent the quality-of-service requirements are.

-12- Georgia State UniversitySensorweb Research Laboratory Techniques to achieve good QoS Overprovisioning used in telephone network, providing enough router capacity, buffer space and bandwidth Traffic shaping Smooth out the traffic on the server side, rather than on client side Proportional routing Split traffic over multiple paths Buffering Leaky bucket algorithm The token bucket algorithm Resource reservation Admission control Packet scheduling

-13- Georgia State UniversitySensorweb Research Laboratory Buffering Smoothing the output stream by buffering packets.

-14- Georgia State UniversitySensorweb Research Laboratory The Leaky Bucket Algorithm (a) A leaky bucket with water. (b) a leaky bucket with packets.

-15- Georgia State UniversitySensorweb Research Laboratory The Token Bucket Algorithm (a) Before. (b) After Token Bucket provide different traffic shaping than leaky bucket: (1)Allow burst traffic (2)May throw tokens, but not packets

-16- Georgia State UniversitySensorweb Research Laboratory Traffic shape (a) Input to a leaky bucket. (b) Output from a leaky bucket. Output from a token bucket with capacities of (c) 250 KB, (d) 500 KB, (e) 750 KB (f) Output from a 500KB token bucket feeding a 10-MB/sec leaky bucket.

-17- Georgia State UniversitySensorweb Research Laboratory Admission Control An example of flow specification. 5-34

-18- Georgia State UniversitySensorweb Research Laboratory Packet Scheduling (a) A router with five packets queued for line O. (b) Finishing times for the five packets. Byte-by-byte round robin

-19- Georgia State UniversitySensorweb Research Laboratory Label Switching and MPLS Transmitting a TCP segment using IP, MPLS, and PPP. MPLS: MultiProtocol Label Switching MPLS vs. VC network:  Similarity: based on label switching, differ than routing  Difference: no pre-connection setup, it is on-demand “VC” creation

-20- Georgia State UniversitySensorweb Research Laboratory Switch and Router (a) Two Ethernets connected by a switch. (b) Two Ethernets connected by routers.

-21- Georgia State UniversitySensorweb Research Laboratory Tunneling Tunneling a packet from Paris to London.

-22- Georgia State UniversitySensorweb Research Laboratory Tunneling (2) Tunneling a car from France to England.

-23- Georgia State UniversitySensorweb Research Laboratory Reading Assignment Chapter 5