Review of key networking techniques: –Reliable communication over unreliable channels –Error detection and correction –Medium access control –routing –Congestion.

Slides:



Advertisements
Similar presentations
COS 461 Fall 1997 Data Link Layer u Today: LANs other than Ethernet –token rings –switched networks –cellular technology u remaining issues –error detection.
Advertisements

Review: Routing algorithms Distance Vector algorithm. –What information is maintained in each router? –How to distribute the global network information?
Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross- Layer Information Awareness Xin Yu Department Of Computer Science New York University,
UNIT-IV Computer Network Network Layer. Network Layer Prepared by - ROHIT KOSHTA In the seven-layer OSI model of computer networking, the network layer.
8-Reliability and Channel Coding Dr. John P. Abraham Professor UTPA.
MAC Layer (Mis)behaviors Christophe Augier - CSE Summer 2003.
5-1 Link Layer: Introduction Some terminology: r hosts and routers are nodes r communication channels that connect adjacent nodes along communication path.
1 Link Layer & Network Layer Some slides are from lectures by Nick Mckeown, Ion Stoica, Frans Kaashoek, Hari Balakrishnan, and Sam Madden Prof. Dina Katabi.
Department of Computer Engineering University of California at Santa Cruz Networking Systems (1) Hai Tao.
The OSI Reference Model
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Chapter 5 Link Layer slides are modified from J. Kurose & K. Ross CPE 400 / 600 Computer Communication Networks Lecture 20.
Transmission Control Protocol (TCP) and Packet-Switching Hardware Devang Parekh EE290F 4/15/04.
CS335 Networking & Network Administration Tuesday, April 20, 2010.
20101 The Data Link Layer Chapter Design Issues Controls communication between 2 machines directly connected by “wire”-like link Services Provided.
Networking. Protocol Stack Generally speaking, sending an message is equivalent to copying a file from sender to receiver.
Error Checking continued. Network Layers in Action Each layer in the OSI Model will add header information that pertains to that specific protocol. On.
Introduction 1 Lecture 23 Link Layer (Error Detection/Correction) slides are modified from J. Kurose & K. Ross University of Nevada – Reno Computer Science.
1 Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:  SD, ED mark start,
CIS 725 Wireless networks. Low bandwidth High error rates.
Itrat Rasool Quadri ST ID COE-543 Wireless and Mobile Networks
Section 4 : The OSI Network Layer CSIS 479R Fall 1999 “Network +” George D. Hickman, CNI, CNE.
Our Last Class!!  summary  what does the future look like?
Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:  SD, ED mark start,
TCP1 Transmission Control Protocol (TCP). TCP2 Outline Transmission Control Protocol.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Data Link Layer Part I – Designing Issues and Elementary.
Review the key networking concepts –TCP/IP reference model –Ethernet –Switched Ethernet –IP, ARP –TCP –DNS.
ICOM 6115©Manuel Rodriguez-Martinez ICOM 6115 – Computer Networks and the WWW Manuel Rodriguez-Martinez, Ph.D. Lecture 14.
Chapter 5 Peer-to-Peer Protocols and Data Link Layer PART I: Peer-to-Peer Protocols ARQ Protocols and Reliable Data Transfer Flow Control.
1 Transport Layer Lecture 10 Imran Ahmed University of Management & Technology.
ECE453 – Introduction to Computer Networks Lecture 17 – Top – Down Approach (A Review)
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. © The McGraw-Hill Companies, Inc. Medium Access Control Asst. Prof. Chaiporn.
COP 5611 Operating Systems Spring 2010 Dan C. Marinescu Office: HEC 439 B Office hours: M-Wd 2:00-3:00 PM.
CSE 461 University of Washington1 Where we are in the Course Finishing off the Link Layer! – Builds on the physical layer to transfer frames over connected.
Wireless TCP. References r Hari Balakrishnan, Venkat Padmanabhan, Srinivasan Seshan and Randy H. Katz, " A Comparison of Mechanisms for Improving TCP.
5: DataLink Layer5-1 Link Layer r 5.1 Introduction and services r 5.2 Error detection and correction r 5.3Multiple access protocols r 5.4 Link-Layer Addressing.
Lecture 4 Overview. Ethernet Data Link Layer protocol Ethernet (IEEE 802.3) is widely used Supported by a variety of physical layer implementations Multi-access.
Routing and Routing Protocols
Chapter 24 Transport Control Protocol (TCP) Layer 4 protocol Responsible for reliable end-to-end transmission Provides illusion of reliable network to.
1 Computer Communication & Networks Lecture 21 Network Layer: Delivery, Forwarding, Routing Waleed.
Lecture Topics: 11/27 Networks Layered Model Ethernet IP.
Error Detection.
1 Computer Communication & Networks Lecture 25 Transport Layer: Congestion Control Waleed Ejaz
Review. Layers Physical layer – sending bits from one place to another, ensuring an okay BER Data link layer – encapsulate information bits into frames,
Transport Layer: Sliding Window Reliability
1 Transport Layer: Basics Outline Intro to transport UDP Congestion control basics.
IP1 The Underlying Technologies. What is inside the Internet? Or What are the key underlying technologies that make it work so successfully? –Packet Switching.
TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC).
Day 13 Intro to MANs and WANs. MANs Cover a larger distance than LANs –Typically multiple buildings, office park Usually in the shape of a ring –Typically.
Assignment 1  Chapter 1:  Question 11  Question 13  Question 14  Question 33  Question 34  Chapter 2:  Question 6  Question 39  Chapter 3: 
Chapter 3: The Data Link Layer –to achieve reliable, efficient communication between two physically connected machines. –Design issues: services interface.
The Data Link Layer Chapter
Data Link Layer.
Click to edit Master subtitle style
Data Link Layer What does it do?
Chapter 5 The Network Layer.
Data Link Layer: Data Link Control
Process-to-Process Delivery:
Chapter 5 Peer-to-Peer Protocols and Data Link Layer
Review First mile problem Internet End Users Last mile
Overview Jaringan Komputer (3)
Lecture 5- Data Link Layer
Network Architecture for Cyberspace
Figure Areas in an autonomous system
Chapter 5 Peer-to-Peer Protocols and Data Link Layer
Lecture 4 Peer-to-Peer Protocols and Data Link Layer
Error Checking continued
Data Link Layer. Position of the data-link layer.
Flow Control Protocols
Presentation transcript:

Review of key networking techniques: –Reliable communication over unreliable channels –Error detection and correction –Medium access control –routing –Congestion control

Reliable communication over unreliable channels: –Positive acknowledgement with retransmission (PAR) Sender progresses only after receiving positive ACK Sender retransmits if timeout Receiver only accepts the correct packet (a sequence number is required to do this). –Sliding window protocol PAR + pipelined communication. Senders allows multiple outstanding packets Receivers buffer out of order packets

Error detection/correction –CRC checksum Sender/receiver agrees on the generator Sender makes sure that all messages sent can be divisible by the generator –Add n 0-bits to the message –Perform binary division –Add the remainder to the message Receiver verifies a message is valid by dividing the message by the generator CRC checksum used in Ethernet frame –Internet checksum 1’s complement of the sums of 16 bit numbers Used in UDP, TCP, etc.

Error detection/correction –Error correction. Is typically more expensive than detecting errors and retransmission Used only when retransmission is expensive or when retransmission is inefficient –Ad hoc mobile networks –Satellite link –Real time applications (Video streaming)

Medium access control: –Use when multiple stations can access a shared channel –There are three types of medium access control protocols. Protocols that allow collisions: try out your luck and fix the problem if collision occurs. Collision free protocols: make sure that no collision can possibly happen Limited collision protocols: have the combined advantages of the previous two types of protocols.

Protocols that allow collisions –ALOHA, slotted ALOHA, CSMA, CSMA/CD Collision free protocols –Bitmap method, binary countdown, token based. Limited collision protocols –Adaptive tree walk

Routing –Flooding –Shortest path routing (Dijkstra algorithm) Centralized algorithm –Distributed routing algorithms have two components: Maintaining the topology information Compute the routes –Distance vector algorithm Each router distributes its routing table to its neighbors Each router updates its routing table based on the tables received from its neighbors.

Routing –Link state algorithm Each router obtain the link information for links directly connected to the router Each router flood the network with the link state information (all routers in the system receive link state packets). Shortest path algorithm is used to compute routes based on the link state database.

Congestion control: –Congestion is a global event. –Congestion happens when the network cannot handle the number of data injected into the network. –Congestion control techniques: Open loop or close loop Can be done either in the network layer or transport layer Traffic shaping –Leaky bucket algorithm and token bucket algorithm Admission control Chock packet Hop-by hop chock packet Load sheding

Congestion control mechanism in the Internet: –Done in TCP –Slow start, AIMD –Early random drop.