J.GODWIN PONSAM & S.CHRISTOBEL DIANA ASST.PROFESSOR SRM University, Kattankulathur

Size: px
Start display at page:

Download "J.GODWIN PONSAM & S.CHRISTOBEL DIANA ASST.PROFESSOR SRM University, Kattankulathur"

Transcription

1 8/22/2011 School of Computing, Department of IT IT 0305 COMPUTER NETWORKS FIFTH SEMESTER UNIT III J.GODWIN PONSAM & S.CHRISTOBEL DIANA ASST.PROFESSOR SRM University, Kattankulathur 1

2 Unit iii School of Computing, Department of IT 8/22/2011 STATIC CHANNEL ALLOCATION DYNAMIC CHANNEL ALLOCATION CSMA IEEE IEEE IEEE IEEE BRIDGES 2

3 Static Channel Allocation Problem FDM Allocates a single channel among multiple competing users If there are N users then the bandwidth is divided into N equal sized portions No interference Problem Bursty traffic TDM Each user is statistically allocated every Nth time slot.

4 Dynamic Channel Allocation Model consists of n independent stations. 2. A single channel is available for communications. 3. Collision Assumption :: If two frames are transmitted simultaneously, they overlap in time and the resulting signal is garbled. This event is a collision. 4a. Continuous Time Assumption :: frame transmissions can begin at any time instant. 4b. Slotted Time Assumption :: time is divided into discrete intervals (slots). Frame transmissions always begin at the start of a time slot.

5 5a. Carrier Sense Assumption :: Stations can tell if the channel is busy (in use) before trying to use it. If the channel is busy, no station will attempt to use the channel until it is idle. 5b. No Carrier Sense Assumption :: Stations are unable to sense channel before attempting to send a frame. They just go ahead and transmit a frame.

6 ALOHA PURE ALOHA Users transmits whenever they have data to be sent Whenever 2 frames try to occupy the channel at the same time there will be collision A sender can always find out the whether or not its frame was destroyed by listening to the channel

7 ALOHA SLOTTED ALOHA uses discrete time intervals as slots A computer is not permitted to send whenever it has data to send instead it is required to wait for the beginning of the next slot

8 CARRIER SENSE MULTIPLE ACCESS 1 persistent CSMAis selfish Sense the channel. IF the channel is idle, THEN transmit. IF the channel is busy, THEN continue to listen until channel is idle. Now transmit immediately.

9 CARRIER SENSE MULTIPLE ACCESS nonpersistent CSMA is less greedy Sense the channel. IF the channel is idle, THEN transmit. If the channel is busy, THEN wait a random amount of time and start over.

10 CARRIER SENSE MULTIPLE ACCESS p persistent CSMA is a slotted approximation Sense the channel. IF the channel is idle, THEN with probability p transmit and with probability (1 p) delay for one time slot and start over. IF the channel is busy, THENdelayone timeslot and start over.

11 CSMA/CD the time slot is usually set to the maximum propagation delay. as p decreases, stations wait longer to transmit but the number of collisions decreases Considerations for the choice of p: (n x p) must be <1for stability, where n is maximum number of stations In all three cases a collision is possible.

12 CSMA/CD If a collision is detected during transmission, THEN immediately cease transmitting the frame. The first station to detect a collision sends a jam signal to all stations to indicate that there has been a collision. After receiving a jam signal, a station that was attempting to transmit waits a random amount of time before attempting to retransmit. The maximum time needed to detect a collision = 2 x propagation delay.

13 Collision Free Protocols Bit Map Protocol Binary Countdown Protocol

14 Collision Free Protocols Contention and data transmission periods alternate The contention period is divided into slots, with 1 bit wide slots for each host in the network. If a host wants to transmit a packet, it sets its contention slot equal to 1. Otherwise, it sets it to 0. The slots pass all hosts in sequence, so every host is aware of who will transmit

15 Collision Free Protocols But what if there are a large number of hosts in the network? The contention period will have to grow to include them all With a large number of hosts, the contention period may be very long, leading to inefficiency

16 Collision Free Protocols Binary Countdown Protocol To overcome the problem of Bitmap protocol During contention period, each host broadcasts its binary address one bit at a time, starting with the most significant bit bits transmitted simultaneously are boolean OR d together Arbitration rule: If a host sent a zero bit but the boolean OR results in a one bit, the host gives up and stops sending address bits Whichever host remains after the entire address has been broadcast gets access to the medium

17 Collision Free Protocols Host Addresses Bit Time

18 IEEE ETHERNET CABLING ENCODING MAC SUBLAYER PROTOCOL OPERATION

19 IEEE ETHERNET The most common kinds of Ethernet cabling.

20 IEEE ETHERNET 10Base5 or Thick Ethernet. Connections onto the cable are done using some vampire taps. 10 represents the speed Base represents the transmission method (base or broadband) 5 represents the maximum length of a single, non amplified sector (500 meters or 200 meters). Transeiver,Transeiver cable, Interface board

21 IEEE ETHERNET CABLING Three kinds of Ethernet cabling. (a) 10Base5, (b) 10Base2, (c) 10Base-T.

22 IEEE ETHERNET CABLING In 10Base5 the transceiver and the interface board are separated. The interface board goes inside the computer, while the transceiver goes on the cable (close to the vampire tap). The transceiver contains the electronics that handle the collision detection. In 10Base2, the connection to the cable is just a passive BNC T junction. The transceiver electronics are situated onto the controller board (inside the PC). In 10BaseT there is no shared cable at all, just the hub. Each station is connected to the hub, using a dedicated, non shared cable.

23 IEEE ETHERNET CABLING 10: 10Mbps; 2: under 200 meters max cable length between two nodes without repeater repeaters used to connect up to multiple segments Time domain Reflectometry

24 IEEE ETHERNET CABLING T stands for Twisted Pair 10/100 Mbps rate; Hub to which nodes are connected by twisted pair, thus star topology

25 IEEE ETHERNET CABLING Cable topologies. (a) Linear, (b) Spine, (c) Tree, (d) Segmented.

26 IEEE ETHERNET ENCODING (a) Binary encoding, (b) Manchester encoding, (c) Differential Manchester encoding.

27 MAC SUBLAYER PROTOCOL Preamble SOFD (7 bytes) (1 byte) Dest. Address (2/6 bytes) Source Address (2/6 bytes Length (2 bytes) Data ( bytes) Pad (0-46) Frame Checksum (4 bytes) IEEE Frame Format

28 MAC SUBLAYER PROTOCOL Preamble :Eachframestartswithapreambleof 7 bytes, each byte containing the bit pattern Manchester encoding is employed here and this enables the receiver's clock to synchronize with the sender's and initialise itself. Start of Frame Delimiter :This field containing a byte sequence denotes the start of the frame itself.

29 MAC SUBLAYER PROTOCOL Source and Dest. Address :The standard allows 2 byte and 6 byte addresses. Note that the 2 byte addresses are always local addresses while the 6 byte ones can be Local or global. 2 Byte Address Manually assigned address Individual(0)/Group(1) (1 bit) Address of the machine (15 bits) 6 Byte Address address Every Ethernet card with globally unique Individual(0)/Group(1) (1 bit) Universal(0)/Local(1) Address of the machine (1 bit) (46 bits)

30 MAC SUBLAYER PROTOCOL Multicast : Sending to group of stations. This is ensured by setting the first bit in either 2 byte/6 byte addresses to 1. Broadcast : Sending to all stations. This can be done by setting all bits in the address field to 1.All Ethernet cards(nodes) are a member of this group. Length : The Length field tells how many bytes are present in the data field, from a minimum of 0 to a maximum of Data :Actually this field can be split up into two parts Data( bytes) Padding(0 46 bytes).

31 MAC SUBLAYER PROTOCOL Frame Checksum : It is a 32 bit hash code of the data. If some bits are erroneously received by the destination (due to noise on the cable), the checksum computed by the destination wouldn't match with the checksum sent and therefore the error will be detected.

32 Binary Exponential Backoff Algorithm After a collision the time is divided in discrete slots (equal to worst round trip propagation, which is 512 bits time or 51.2 us) After the first collision, each station waits 0 or 1 slot time before tries again If two station collide and they pick same number, they will collide again After a second collision, each station waits 0, 1, 2 or 3 at random and waits that number of slot times. After a third collision will happen, the next number to pick is between 0 and and that number of slots is skipped. After 10 collisions have been reached, the number interval is frozen at After 16 collisions, the station gives up to send the frame and reports the failure. Further recovery it is up to the higher layers.

33 MAC SUBLAYER PROTOCOL

34 net Transmission Flowchart transmit packet assemble packet yes deferring on? no start transmission send jam signal transmission done? no collision detect? yes increment attempts yes yes too many attempts? no done transmit ok done excessive collision errors compute and wait backoff time

35 IEEE Token Bus Token Bus is a linear or tree shaped cable in which all the stations are attached Logically, the stations are organized into a ring. A Token is passed from a station to its logical neighbour irrespective of physical location of latter Only token holder is permitted to send frame. When station acquires token it can transmit frames for a certain amount of time (several short frames)

36 IEEE Token Bus Station has 4 possible priorities, 0, 2, 4, 6; station maintains 4 queues for requests. Within each station, Token comes first to priority 6 queue. Sends occur until nothing to send OR timer expires. Token goes next to priority 4 queue. Sends occur until nothing to send OR timer expires. And so on.... Proper setting of the various timers ensures that high priority requests happen first.

37 Token Bus Operation Transmit A C B D Token sequence: C,A,D,B

38 Token Bus Operation Transmit Token A C B D Token sequence: C,A,D,B

39 Token Bus Operation Receive Token A C B D Token sequence: C,A,D,B

40 Token Bus Operation Transmit A C B D Token sequence: C,A,D,B

41 Token Bus Operation Transmit Token A C B D Token sequence: C,A,D,B

42 Token Bus Operation A C B D Receive Token Token sequence: C,A,D,B

43 Token Bus Operation A C B D Transmit Token sequence: C,A,D,B

44 Token Bus Mac Sub Layer Protocol Preamble (1 byte) Start Delmiter( 1byte) Frame Control (1byte) Dest. Address (2/6 bytes) Source Address (2/6 bytes Data ( bytes) Frame Checksum (4 bytes) End Delimiter (1 byte) IEEE Token Bus Frame Format

45 IEEE Token Bus Preamble used to synchronize receiver clock. Start/End Delimiter Used to mark frame boundaries (Analog Encoding) Frame control shows control or data. Destination Address (same as 802.3) usually 6 bytes. Source Address (same as 802.3) usually 6 bytes. Data BIG 8182 or 8174 bytes Checksum (Same as 802.3)

46 IEEE Logical Ring Maintanance

47 SOLICIT_SUCCESSOR Computer Networks IEEE Logical Ring Maintanance Gives sender s address and the current successor's address. Stations not in thering,withaddressbetweenthesetwoareinvitedtobidtobe inserted. No response within given time ==> go on as before. One response ==> newcomer is inserted; becomes new successor. Two or more responses ==> answers collide so garbled. So Resolve_Contention frame is used

48 IEEE Logical Ring Maintanance RESOLVE_CONTENTION Causes responding stations to NOT immediately try to be successors, but use binary countdown by 0, 1, 2, or 3 slots. Mechanism also ensures that traffic isn't slowed down by solicitation. SET_SUCCESSOR Used by a leaving station. Sent to the predecessor to say the leaver's successor is now the predecessor's successor. WHO_FOLLOWS The token sender listens to make sure the successor got and then passed on the token. If doesn't happen, it sends a WHO_FOLLOWS and failed station's successor sends a SET_SUCCESSOR to the failed one's predecessor.

49 IEEE Logical Ring Maintanance SOLICIT_SUCCESSOR_2 The token sender can't find the successor and there's no response from WHO_FOLLOWS; This causes ALL stations to once again bid for a place in the ring this is like starting from scratch. CLAIM_TOKEN If the token holder crashes, then nothing appears on the ring. All station's timers go off and the contention algorithm determines who gets to generate the token.

50 FDDI Use optical fibre cabling as a shared communication medium Optical fibre cables are made of glass Because they are so thin, they are fairly flexible Capable of 100 Mbps Light is used to transmit data Light is not susceptible to electrical interference Optical cabling can span longer distances Optical cabling does not need to be shielded near devices which generate electromagnetic interference

51 FDDI 100Mbps, distance up to 200km, 1000 hosts mainly used as a backbone

52 FDDI Is a token ring category network A token is passed from station to station When a station receives the token, it may transmit data If a station has no data, it allows the token to pass to the next station FDDI uses 2 rings of cabling, moving in opposite directions The second ring is used to allow twice the flow of data The purpose of the second ring is to allow data to reach its destination, even when one station has failed (and cannot forward messages)

53 FDDI Ring Technology

54 FDDI With Node Failure

55 FDDI Token Passing T S:12 D: S:12 2 S:12 3 S:12 D:07 D:07 D:07 4 S:12 S:12 D:07 D:07 S:12 D:07 S:12 D:07 S:12 D:07 5 S:12 D:07 11 S:12 D: S:12 D:07 6 S:12 D:07 S:12 D:07

56 FDDI Token Passing T T

57 FDDI 2 Classes of stations A and B Class A stations connects to both rings Class B stations connects to one of the ring 4 out of 5 encoding is used 16 out of 32 for data 3 are for delimiters 2 are for control 3 are for hardware signaling 8 reserved Data Used to Synchronize Stations Indicates Start of Frame Identifies the Type of Frame Address of the Destination Node Address of the Source Node Status of Frame Holds J. ack Godwin bits Ponsam

58 FDDI Preamble ( 8byte) Start Delmiter( 1byte) Frame Control (1byte) Dest. Address (2/6 bytes) Source Address (2/6 bytes Data ( bytes) Frame End ChecksumDelimiter (4 bytes) (1 byte) Frame Status (1 byte) FDDI Frame Format

59 FDDI Timers Token Holding Timer How long a station can transmit Token Rotation Timer Restarted every time the token is seen Valid Transmission Timer Used to time out and recover from certain transient ring errors

60 IEEE LLC (a) Position of LLC. (b) Protocol formats.

61 IEEE LLC Logical Link Control protocol runs in the top of all IEEE 802 protocols. It hides all the aspects of the 802 protocols, and it provides to the network layer a single format and interface. Usage of LLC: 1. The network layer of sending machine passes a network layer packet onto the LLC layer, using the LLC layer access primitives 2. The LLC sublayer adds the LLC header, containing sequences and acknowledgement numbers 3. The resulting structure is then inserted into the payload filed of an 802 frame and transmitted. 4. At receiver, the reverse process takes place. LLC provides three service options: 1. Unreliable datagram service 2. Acknowledged datagram service 3. Reliable connection oriented service

62 IEEE 802.3U Fast Ethernet

63 IEEE 802.3U Fast Ethernet Reduces the bit time from 10nsec to 100 nsec 100Base T4 Category 3 UTP scheme called 100 Base T4 uses a signaling speed of 25 MHz Needs four twisted pairs, 100Base TX Category 5 Wiring the design 100Base TX is simpler because the wires can handle clock rates upto 125 MHZ and beyond Needs only two twisted pairs 4B5B Encoding scheme is used

64 100Base FX Computer Networks IEEE 802.3U Fast Ethernet Uses two strands of multimode fiber,one for each direction Full duplex with 100 Mbps in each direction Distance between the hub and the station can be 2 km Shared Hub Switched Hub

65 Spanning Tree Bridges Two parallel transparent bridges.

66 Spanning Tree Bridges (2) (a) Interconnected LANs. (b) A spanning tree covering the LANs. The dotted lines are not part of the spanning tree.

67 Remote Bridges Remote bridges can be used to interconnect distant LANs.

68 Repeaters, Hubs, Bridges, Switches, Routers and Gateways (a) Which device is in which layer. (b) Frames, packets, and headers.

69 Repeaters, Hubs, Bridges, Switches, Routers and Gateways (2) (a) A hub. (b) A bridge. (c) a switch.

70 Figure 3.8 BSSs bsss BSS without an access point is called an adhoc network BSS with an access point is called an infrastructure network BSS made of wireless stations and optional central station AP

71 Figure 3.9 ESS Made of two or more BSS with APs ESS uses two types of stations mobile and stationary 72

72 Csma/CA FLOW CHART

73 dcf DCF Uses CSMA/CA NAV How much time must pass before the station are allowed to check the channel for idleness Each time a station sends RTS other stations starts their NAV Collision During HandShaking

74 pcf PCF Contention Free polling access method AP performs polling for stations that are capable of being polled Same time a station wants to use DCF and an AP wants to use PCF, AP has priority Repetition Interval Starts with beacon frame At the end of Contention free period PC sends a CF end Frame

75 Repetition interval

76 Csma/ca and nav

77 Frame format

78 Subfields in fc field

79 Frame format D Duration of transmission that is used to set value of NAV Addresses To DS and From DS Sequence Control Sequence nooftheframe Frame body 2312 bytes FCS 4 bytes CRC

80 Frame Types Management Frames Used for initial communication between stations and APs Control Frames Used for accessing the channel

81 Control frames

82 addressing

83 Figure 3.10 Physical layer 84

84 Figure 3.13 MAC layers in IEEE standard 85

85 Table 3.1 Addresses in IEEE TCP/IP Protocol Suite 86

86 Hidden Station Problem

87

88

89

90 Physical Layer

91 Disclaimer School of Computing, Department of IT 8/22/2011 The contents of the slides are solely for the purpose of teaching students at SRM University. All copyrights and Trademarks of organizations/persons apply even if not specified explicitly. 92

92 School of Computing, Department of IT Review questions 8/22/ List the advantages and disadvantages of Static Channel Allocation 2. Define Pure Aloha 3. Define 1 Persistent CSMA 4. Why Bit Map protocol is called as a reservation protocol? 5.Define Time domain reflectometry 6. List the difference between BSSs and ESSs 7.Why CSMA/CD cannot be implemented in Wireless Lan? 8. Define Hidden terminal problem 9. List the service options provided by LLC 10. Define Exposed terminal problem 93

93 bibliography School of Computing, Department of IT 8/22/ Andrew S. Tanenbaum, Computer Networks, Fourth Edition, Prentice Hall of India, Cisco Network Fundamentals CCNA Exploration Companion Guide, Pearson Education, William Stallings, Data and Computer Communications, Fourth Edition, Prentice Hall of India,

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software Local Area What s a LAN? A transmission system, usually private owned, very speedy and secure, covering a geographical area in the range of kilometres, comprising a shared transmission medium and a set

More information

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks LANs Local Area Networks via the Media Access Control (MAC) SubLayer 1 Local Area Networks Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring 2 Network Layer

More information

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD Ethernet dominant LAN technology: cheap -- $20 for 100Mbs! first widely used LAN technology Simpler, cheaper than token rings and ATM Kept up with speed race: 10, 100, 1000 Mbps Metcalfe s Etheret sketch

More information

CSMA/CA. Information Networks p. 1

CSMA/CA. Information Networks p. 1 Information Networks p. 1 CSMA/CA IEEE 802.11 standard for WLAN defines a distributed coordination function (DCF) for sharing access to the medium based on the CSMA/CA protocol Collision detection is not

More information

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006 CSE331: Introduction to Networks and Security Lecture 6 Fall 2006 Open Systems Interconnection (OSI) End Host Application Reference model not actual implementation. Transmits messages (e.g. FTP or HTTP)

More information

Data Link Layer. Page 1. Ethernet

Data Link Layer. Page 1. Ethernet Sicherungsebene Network Categories Local Area Networks (LAN): 10m - few km, simple connection structure Ethernet/Fast Ethernet/Gigabit Ethernet Token Bus, Token Ring LAN Wireless LAN (WLAN, up to a few

More information

Unit of Learning # 2 The Physical Layer. Sergio Guíñez Molinos sguinez@utalca.cl 2-2009

Unit of Learning # 2 The Physical Layer. Sergio Guíñez Molinos sguinez@utalca.cl 2-2009 Unit of Learning # 2 The Physical Layer Sergio Guíñez Molinos sguinez@utalca.cl 2-2009 Local Area Network (LAN) Redes de Computadores 2 Historic topologies more used in LAN Ethernet Logical Bus and Physical

More information

LAN Switching. 15-441 Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, 802.11, PPP. Interconnecting LANs

LAN Switching. 15-441 Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, 802.11, PPP. Interconnecting LANs LAN Switching 15-441 Computer Networking Bridges/Switches, 802.11, PPP Extend reach of a single shared medium Connect two or more segments by copying data frames between them Switches only copy data when

More information

EECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers

EECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers EECS 122: Introduction to Computer Networks Multiaccess Protocols Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley Berkeley, CA 94720-1776

More information

Based on Computer Networking, 4 th Edition by Kurose and Ross

Based on Computer Networking, 4 th Edition by Kurose and Ross Computer Networks Ethernet Hubs and Switches Based on Computer Networking, 4 th Edition by Kurose and Ross Ethernet dominant wired LAN technology: cheap $20 for NIC first widely used LAN technology Simpler,

More information

2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above

2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above 1. How many bits are in an IP address? A. 16 B. 32 C. 64 2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 3. The network number plays what part in an IP address? A. It

More information

802.11 standard. Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale

802.11 standard. Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale 802.11 standard Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale IEEE 802.11 Requirements Design for small coverage (e.g. office, home) Low/no mobility High data-rate applications Ability to

More information

TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL

TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL 1. Local Area Networks TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL These are networks spanning relatively short distances (e.g. within one building) for local point-to-point and point-to-multipoint

More information

Wiereless LAN 802.11

Wiereless LAN 802.11 Tomasz Kurzawa Wiereless LAN 802.11 Introduction The 802.11 Architecture Channels and Associations The 802.11 MAC Protocol The 802.11 Frame Introduction Wireless LANs are most important access networks

More information

802.11. Markku Renfors. Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak

802.11. Markku Renfors. Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak 802.11 Markku Renfors Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak Contents 802.11 Overview & Architecture 802.11 MAC 802.11 Overview and Architecture

More information

Introduction to Ethernet

Introduction to Ethernet Technical Tutorial 2002 12-06 Table of Contents 1: Introduction 2: Ethernet 3: IEEE standards 4: Topology 5: CSMA/CD 6: Wireless-LAN 7: Transmission Speed 8: Limitations of Ethernet 9: Sena Products and

More information

Network Categories. Network Types for the Local Range. Ethernet. Carrier Sense Multiple Access

Network Categories. Network Types for the Local Range. Ethernet. Carrier Sense Multiple Access Sicherungsebene Network Categories Local Area Networks (LAN): 0m - few km, simple connection structure Ethernet/Fast Ethernet/Gigabit Ethernet Token Bus, Token Ring LAN Wireless LAN (WLAN, up to a few

More information

Chapter 7 Low-Speed Wireless Local Area Networks

Chapter 7 Low-Speed Wireless Local Area Networks Wireless# Guide to Wireless Communications 7-1 Chapter 7 Low-Speed Wireless Local Area Networks At a Glance Instructor s Manual Table of Contents Overview Objectives s Quick Quizzes Class Discussion Topics

More information

RTT 60.5 msec receiver window size: 32 KB

RTT 60.5 msec receiver window size: 32 KB Real-World ARQ Performance: TCP Ex.: Purdue UCSD Purdue (NSL): web server UCSD: web client traceroute to planetlab3.ucsd.edu (132.239.17.226), 30 hops max, 40 byte packets 1 switch-lwsn2133-z1r11 (128.10.27.250)

More information

Random Access Protocols

Random Access Protocols Lecture Today slotted vs unslotted ALOHA Carrier sensing multiple access Ethernet DataLink Layer 1 Random Access Protocols When node has packet to send transmit at full channel data rate R. no a priori

More information

Fast Ethernet and Gigabit Ethernet. Networks: Fast Ethernet 1

Fast Ethernet and Gigabit Ethernet. Networks: Fast Ethernet 1 Fast Ethernet and Gigabit Ethernet Networks: Fast Ethernet 1 Fast Ethernet (100BASE-T) How to achieve 100 Mbps capacity? MII LLC MAC Convergence Sublayer Media Independent Interface Media Dependent Sublayer

More information

CSE 123A Computer Networks

CSE 123A Computer Networks CSE 123A Computer Networks Winter 2005 Lecture 5: Data-Link II: Media Access Some portions courtesy Srini Seshan or David Wetherall Last Time Framing: How to translate a bitstream into separate packets

More information

Fast Ethernet and Gigabit Ethernet. Computer Networks: Fast and Gigabit Ethernet

Fast Ethernet and Gigabit Ethernet. Computer Networks: Fast and Gigabit Ethernet Fast Ethernet and Gigabit Ethernet 1 Fast Ethernet (100BASE-T) How to achieve 100 Mbps capacity? MII LLC MAC Convergence Sublayer Media Independent Interface Media Dependent Sublayer Data Link Layer Physical

More information

11/22/2013 1. komwut@siit

11/22/2013 1. komwut@siit 11/22/2013 1 Week3-4 Point-to-Point, LAN, WAN Review 11/22/2013 2 What will you learn? Representatives for Point-to-Point Network LAN Wired Ethernet Wireless Ethernet WAN ATM (Asynchronous Transfer Mode)

More information

Network Categories. Network Types for the Local Range. Ethernet

Network Categories. Network Types for the Local Range. Ethernet Sicherungsebene Network Categories Chapter 2: Computer Networks 2.1: Physical Layer: representation of digital signals 2.2: Data Link Layer: error protection and access control 2.3: Network infrastructure

More information

Ethernet, VLAN, Ethernet Carrier Grade

Ethernet, VLAN, Ethernet Carrier Grade Ethernet, VLAN, Ethernet Carrier Grade Dr. Rami Langar LIP6/PHARE UPMC - University of Paris 6 Rami.langar@lip6.fr www-phare.lip6.fr/~langar RTEL 1 Point-to-Point vs. Broadcast Media Point-to-point PPP

More information

Token Ring and. Fiber Distributed Data Interface (FDDI) Networks: Token Ring and FDDI 1

Token Ring and. Fiber Distributed Data Interface (FDDI) Networks: Token Ring and FDDI 1 Token Ring and Fiber Distributed Data Interface (FDDI) Networks: Token Ring and FDDI 1 IEEE 802.5 Token Ring Proposed in 1969 and initially referred to as a Newhall ring. Token ring :: a number of stations

More information

Ring Local Area Network. Ring LANs

Ring Local Area Network. Ring LANs Ring Local Area Network Ring interface (1-bit buffer) Ring interface To station From station Ring LANs The ring is a series of bit repeaters, each connected by a unidirectional transmission link All arriving

More information

Controlled Random Access Methods

Controlled Random Access Methods Helsinki University of Technology S-72.333 Postgraduate Seminar on Radio Communications Controlled Random Access Methods Er Liu liuer@cc.hut.fi Communications Laboratory 09.03.2004 Content of Presentation

More information

CS263: Wireless Communications and Sensor Networks

CS263: Wireless Communications and Sensor Networks CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 4: Medium Access Control October 5, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Medium Access Control Schemes: FDMA TDMA

More information

Level 2 Routing: LAN Bridges and Switches

Level 2 Routing: LAN Bridges and Switches Level 2 Routing: LAN Bridges and Switches Norman Matloff University of California at Davis c 2001, N. Matloff September 6, 2001 1 Overview In a large LAN with consistently heavy traffic, it may make sense

More information

IEEE 802.11 Wireless LAN Standard. Updated: 5/10/2011

IEEE 802.11 Wireless LAN Standard. Updated: 5/10/2011 IEEE 802.11 Wireless LAN Standard Updated: 5/10/2011 IEEE 802.11 History and Enhancements o 802.11 is dedicated to WLAN o The group started in 1990 o First standard that received industry support was 802.11b

More information

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs)

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs) CS6956: Wireless and Mobile Networks Lecture Notes: //05 IEEE 80. Wireless Local Area Networks (WLANs) CSMA/CD Carrier Sense Multi Access/Collision Detection detects collision and retransmits, no acknowledgement,

More information

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III CS: 647 Advanced Topics in Wireless Networks Drs. Baruch Awerbuch & Amitabh Mishra Department of Computer Science Johns Hopkins

More information

Overview of Network Hardware and Software. CS158a Chris Pollett Jan 29, 2007.

Overview of Network Hardware and Software. CS158a Chris Pollett Jan 29, 2007. Overview of Network Hardware and Software CS158a Chris Pollett Jan 29, 2007. Outline Scales of Networks Protocol Hierarchies Scales of Networks Last day, we talked about broadcast versus point-to-point

More information

ECE 428 Computer Networks and Security

ECE 428 Computer Networks and Security ECE 428 Computer Networks and Security 1 Instructor: Sagar Naik About the Instructor Office: EIT 4174, ECE Dept. Other courses that I teach ECE 355: Software Engineering ECE 453/CS 447/ SE 465: Software

More information

IT4504 - Data Communication and Networks (Optional)

IT4504 - Data Communication and Networks (Optional) - Data Communication and Networks (Optional) INTRODUCTION This is one of the optional courses designed for Semester 4 of the Bachelor of Information Technology Degree program. This course on Data Communication

More information

ECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1

ECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1 ECE 358: Computer Networks Homework #3 Chapter 5 and 6 Review Questions 1 Chapter 5: The Link Layer P26. Let's consider the operation of a learning switch in the context of a network in which 6 nodes labeled

More information

802.11 Wireless LAN Protocol CS 571 Fall 2006. 2006 Kenneth L. Calvert All rights reserved

802.11 Wireless LAN Protocol CS 571 Fall 2006. 2006 Kenneth L. Calvert All rights reserved 802.11 Wireless LAN Protocol CS 571 Fall 2006 2006 Kenneth L. Calvert All rights reserved Wireless Channel Considerations Stations may move Changing propagation delays, signal strengths, etc. "Non-transitive"

More information

EPL 657 Wireless Networks

EPL 657 Wireless Networks EPL 657 Wireless Networks Some fundamentals: Multiplexing / Multiple Access / Duplex Infrastructure vs Infrastructureless Panayiotis Kolios Recall: The big picture... Modulations: some basics 2 Multiplexing

More information

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks Computer Networks Lecture 06 Connecting Networks Kuang-hua Chen Department of Library and Information Science National Taiwan University Local Area Networks (LAN) 5 kilometer IEEE 802.3 Ethernet IEEE 802.4

More information

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit

More information

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur Module 5 Broadcast Communication Networks Lesson 1 Network Topology Specific Instructional Objectives At the end of this lesson, the students will be able to: Specify what is meant by network topology

More information

... neither PCF nor CA used in practice

... neither PCF nor CA used in practice IEEE 802.11 MAC CSMA/CA with exponential backoff almost like CSMA/CD drop CD CSMA with explicit ACK frame added optional feature: CA (collision avoidance) Two modes for MAC operation: Distributed coordination

More information

Collision of wireless signals. The MAC layer in wireless networks. Wireless MAC protocols classification. Evolutionary perspective of distributed MAC

Collision of wireless signals. The MAC layer in wireless networks. Wireless MAC protocols classification. Evolutionary perspective of distributed MAC The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?

More information

Lecture 17: 802.11 Wireless Networking"

Lecture 17: 802.11 Wireless Networking Lecture 17: 802.11 Wireless Networking" CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Lili Qiu, Nitin Vaidya Lecture 17 Overview" Project discussion Intro to 802.11 WiFi Jigsaw discussion

More information

Lecture 7 Multiple Access Protocols and Wireless

Lecture 7 Multiple Access Protocols and Wireless Lecture 7 Multiple Access Protocols and Wireless Networks and Security Jacob Aae Mikkelsen IMADA November 11, 2013 November 11, 2013 1 / 57 Lecture 6 Review What is the responsibility of the link layer?

More information

Data Link Protocols. Link Layer Services. Framing, Addressing, link access: Error Detection:

Data Link Protocols. Link Layer Services. Framing, Addressing, link access: Error Detection: Data Link Protocols Link Layer Services Framing, Addressing, link access: encapsulate datagram into frame, adding header, trailer channel access if shared medium MAC addresses used in frame headers to

More information

Local Area Networks. Guest Instructor Elaine Wong. Elaine_06_I-1

Local Area Networks. Guest Instructor Elaine Wong. Elaine_06_I-1 Local Area Networks Guest Instructor Elaine Wong Elaine_06_I-1 Outline Introduction to Local Area Networks (LANs) Network architecture Geographical area LAN applications LAN Technologies Ethernet Fiber

More information

Industrial Networks & Databases. Protocols and Networks - Device Bus - - Field Bus -

Industrial Networks & Databases. Protocols and Networks - Device Bus - - Field Bus - Industrial Networks & Databases - Device Bus - - Field Bus - - Data Bus - Recall MODBUS protocol is a messaging structure used to set up master/client type communications with slaves/servers between intelligent

More information

LAN / WAN Technologies

LAN / WAN Technologies The Hong Kong Polytechnic University Industrial Centre Knowledge Update Course for Secondary Computer Teachers LAN / WAN Technologies By Edward Cheung email: icec@polyu.edu.hk 15 July, 2003. 030715 LAN

More information

Ethernet. Ethernet. Network Devices

Ethernet. Ethernet. Network Devices Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking

More information

Transport Layer Protocols

Transport Layer Protocols Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements

More information

Final Exam. Route Computation: One reason why link state routing is preferable to distance vector style routing.

Final Exam. Route Computation: One reason why link state routing is preferable to distance vector style routing. UCSD CSE CS 123 Final Exam Computer Networks Directions: Write your name on the exam. Write something for every question. You will get some points if you attempt a solution but nothing for a blank sheet

More information

How To Make A Multi-User Communication Efficient

How To Make A Multi-User Communication Efficient Multiple Access Techniques PROF. MICHAEL TSAI 2011/12/8 Multiple Access Scheme Allow many users to share simultaneously a finite amount of radio spectrum Need to be done without severe degradation of the

More information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.

More information

DATA COMMUNICATION AND NETWORKS

DATA COMMUNICATION AND NETWORKS DATA COMMUNICATION AND NETWORKS 1. Define the term Computer Networks. A Computer network is a number if computers interconnected by one or more transmission paths. The transmission path often is the telephone

More information

IT4405 Computer Networks (Compulsory)

IT4405 Computer Networks (Compulsory) IT4405 Computer Networks (Compulsory) INTRODUCTION This course provides a comprehensive insight into the fundamental concepts in data communications, computer network systems and protocols both fixed and

More information

Chapter 9A. Network Definition. The Uses of a Network. Network Basics

Chapter 9A. Network Definition. The Uses of a Network. Network Basics Chapter 9A Network Basics 1 Network Definition Set of technologies that connects computers Allows communication and collaboration between users 2 The Uses of a Network Simultaneous access to data Data

More information

How To Communicate With A Token Ring Network (Dihon)

How To Communicate With A Token Ring Network (Dihon) Token us Token -procedure: Only someone who possesses a certain ken (= bit sequence), may send. One example for a ken network: IEEE 80. Token us All stations should be treated equally, i.e. they have pass

More information

Performance Evaluation of Wired and Wireless Local Area Networks

Performance Evaluation of Wired and Wireless Local Area Networks International Journal of Engineering Research and Development ISSN: 2278-067X, Volume 1, Issue 11 (July 2012), PP.43-48 www.ijerd.com Performance Evaluation of Wired and Wireless Local Area Networks Prof.

More information

Mathatma Gandhi University

Mathatma Gandhi University Mathatma Gandhi University BSc Computer Science IV th semester BCS 402 Computer Network &Internet MULTIPLE CHOICE QUESTIONS 1. The computer network is A) Network computer with cable B) Network computer

More information

Fiber Distributed Data Interface

Fiber Distributed Data Interface CHPTER 8 Chapter Goals Provide background information about FDDI technology. Explain how FDDI works. Describe the differences between FDDI and Copper Distributed Data Interface (CDDI). Describe how CDDI

More information

IEEE 802.11 Technical Tutorial. Introduction. IEEE 802.11 Architecture

IEEE 802.11 Technical Tutorial. Introduction. IEEE 802.11 Architecture IEEE 802.11 Technical Tutorial Introduction The purpose of this document is to give technical readers a basic overview of the new 802.11 Standard, enabling them to understand the basic concepts, principle

More information

Data Communication and Computer Network

Data Communication and Computer Network 1 Data communication principles, types and working principles of modems, Network principles, OSI model, functions of data link layer and network layer, networking components, communication protocols- X

More information

CCNA 1: Networking Basics. Cisco Networking Academy Program Version 3.0

CCNA 1: Networking Basics. Cisco Networking Academy Program Version 3.0 CCNA 1: Networking Basics Cisco Networking Academy Program Version 3.0 Table of Contents CCNA 1: NETWORKING BASICS...1 TARGET AUDIENCE...3 PREREQUISITES...3 COURSE DESCRIPTION...3 COURSE OBJECTIVES...3

More information

Direct Link Networks. Introduction. Physical Properties. Lecture - Ethernet 1. Areas for Discussion. Ethernet (Section 2.6)

Direct Link Networks. Introduction. Physical Properties. Lecture - Ethernet 1. Areas for Discussion. Ethernet (Section 2.6) reas for Discussion Direct Link Networks Joseph Spring School of Computer Science Sc - Computer Network Protocols & rch s ased on Chapter 2, Peterson & Davie, Computer Networks: Systems pproach, 5 th Ed

More information

Tutorial. www.ccontrols.com

Tutorial. www.ccontrols.com Tutorial 1 Tutorial CONTROLLER AREA NETWORK CAN was designed by Bosch and is currently described by ISO 11898 1. In terms of the Open Systems Interconnection model (OSI), CAN partially defines the services

More information

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages

More information

Wireless LAN advantages. Wireless LAN. Wireless LAN disadvantages. Wireless LAN disadvantages WLAN:

Wireless LAN advantages. Wireless LAN. Wireless LAN disadvantages. Wireless LAN disadvantages WLAN: WLAN: Wireless LAN Make use of a wireless transmission medium Tipically restricted in their diameter: buildings, campus, single room etc.. The global goal is to replace office cabling and to introduce

More information

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK Contemporary Control Systems, Inc. Understanding Ethernet Switches and Routers This extended article was based on a two-part article that was

More information

MAC Algorithms in Wireless Networks

MAC Algorithms in Wireless Networks Department of Computing Science Master Thesis MAC Algorithms in Wireless Networks Applications, Issues and Comparisons Shoaib Tariq Supervisor: Dr. Jerry Eriksson Examiner: Dr. Per Lindström Dedicated

More information

Algorithms for Interference Sensing in Optical CDMA Networks

Algorithms for Interference Sensing in Optical CDMA Networks Algorithms for Interference Sensing in Optical CDMA Networks Purushotham Kamath, Joseph D. Touch and Joseph A. Bannister {pkamath, touch, joseph}@isi.edu Information Sciences Institute, University of Southern

More information

RETI DI TELECOMUNICAZIONI

RETI DI TELECOMUNICAZIONI Accademia Navale Armi Navali LAUREA in INGEGNERIA DELLE TELECOMUNICAZIONI RETI DI TELECOMUNICAZIONI Stefano Giordano Lezione n.18n Ethernet Gruppo di Ricerca in Reti di Telecomunicazioni Dipartimento di

More information

Introduction To Computer Networks

Introduction To Computer Networks Introduction To Computer Networks 1. LAN s and WAN s 2. Some network and internetwork components 3. The communication process 4. Communication media 5. Topologies 6. Communication models and Standards

More information

ECE 333: Introduction to Communication Networks Fall 2002

ECE 333: Introduction to Communication Networks Fall 2002 ECE 333: Introduction to Communication Networks Fall 2002 Lecture 14: Medium Access Control II Dynamic Channel Allocation Pure Aloha In the last lecture we began discussing medium access control protocols

More information

10. Wireless Networks

10. Wireless Networks Computernetzwerke und Sicherheit (CS221) 10. Wireless Networks 1. April 2011 omas Meyer Departement Mathematik und Informatik, Universität Basel Chapter 6 Wireless and Mobile Networks (with changes CS221

More information

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet CCNA R&S: Introduction to Networks Chapter 5: Ethernet 5.0.1.1 Introduction The OSI physical layer provides the means to transport the bits that make up a data link layer frame across the network media.

More information

Networks. The two main network types are: Peer networks

Networks. The two main network types are: Peer networks Networks Networking is all about sharing information and resources. Computers connected to a network can avail of many facilities not available to standalone computers: Share a printer or a plotter among

More information

Lesson 2-3: Ethernet Basics

Lesson 2-3: Ethernet Basics Unit 2: LAN Configurations Lesson 2-3: Ethernet Basics At a Glance Ethernet LAN topology is currently the most common network architecture. Ethernet topologies are generally bus and/or bus-star topologies.

More information

Real-Time (Paradigms) (51)

Real-Time (Paradigms) (51) Real-Time (Paradigms) (51) 5. Real-Time Communication Data flow (communication) in embedded systems : Sensor --> Controller Controller --> Actor Controller --> Display Controller Controller Major

More information

Basic processes in IEEE802.11 networks

Basic processes in IEEE802.11 networks Module contents IEEE 802.11 Terminology IEEE 802.11 MAC Frames Basic processes in IEEE802.11 networks Configuration parameters.11 Architect. 1 IEEE 802.11 Terminology Station (STA) Architecture: Device

More information

WiFi. Is for Wireless Fidelity Or IEEE 802.11 Standard By Greg Goldman. WiFi 1

WiFi. Is for Wireless Fidelity Or IEEE 802.11 Standard By Greg Goldman. WiFi 1 WiFi Is for Wireless Fidelity Or IEEE 802.11 Standard By Greg Goldman WiFi 1 What is the goal of 802.11 standard? To develop a Medium Access Control (MAC) and Physical Layer (PHY) specification for wireless

More information

A Technical Tutorial on the IEEE 802.11 Protocol

A Technical Tutorial on the IEEE 802.11 Protocol A Technical Tutorial on the IEEE 802.11 Protocol By Pablo Brenner Director of Engineering copyright BreezeCOM 1997 Introduction The purpose of this document is to give technical readers a basic overview

More information

EXAMPLES AND PROBLEMS. Competence Based Education Internet Protocols

EXAMPLES AND PROBLEMS. Competence Based Education Internet Protocols EXAMPLES AND PROBLEMS Competence Based Education Internet Protocols Example 1 In following figure frames are generated at node A and sent to node C through node B. Determine the minimum transmission rate

More information

Chapter 4. Medium Access Control. IN2P3 Octobre 2002 Jean-Pierre Thomesse

Chapter 4. Medium Access Control. IN2P3 Octobre 2002 Jean-Pierre Thomesse Chapter 4 Medium Access Control 1 Introduction Objectives To manage the access to the medium or channel To take into account the time constraints To schedule the traffics Different solutions History Different

More information

Lecture 6 Types of Computer Networks and their Topologies Three important groups of computer networks: LAN, MAN, WAN

Lecture 6 Types of Computer Networks and their Topologies Three important groups of computer networks: LAN, MAN, WAN Lecture 6 Types of Computer Networks and their Topologies Three important groups of computer networks: LAN, MAN, WAN LAN (Local Area Networks) 10/28/2008 Vasile Dadarlat - Computer Networks 1 MAN (Metropolitan

More information

Candidates should attempt FOUR questions. All questions carry 25 marks.

Candidates should attempt FOUR questions. All questions carry 25 marks. UNIVERSITY OF ABERDEEN Exam 2010 Degree Examination in ES 3567 Communications Engineering 1B Xday X Notes: 9.00 a.m. 12 Noon (i) CANDIDATES ARE PERMITTED TO USE APPROVED CALCULATORS (II) CANDIDATES ARE

More information

Wired & Wireless LAN Connections

Wired & Wireless LAN Connections Lecture 5 Wired & Wireless LAN Connections Network Interface Card (NIC) Ethernet Wiring - Thick Ethernet - Thin Ethernet - Star (Hub) Ethernet Extending LAN - Fiber Modem - Repeater - Bridge - Switch Short

More information

Operating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師

Operating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師 Lecture 7: Distributed Operating Systems A Distributed System 7.2 Resource sharing Motivation sharing and printing files at remote sites processing information in a distributed database using remote specialized

More information

Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks

Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks 1 Mr. Praveen S Patil, 2 Mr. Rabinarayan Panda, 3 Mr. Sunil Kumar R D 1,2,3 Asst. Professor, Department of MCA, The Oxford College of Engineering,

More information

Ajay Gummalla-July 2001

Ajay Gummalla-July 2001 DOCSIS Overview Ajay Gummalla Ethernet in the First Mile Study Group July 2001 Ajay Gummalla-July 2001 1 HFC Plant Topology VIDEO combiner Fiber TX Fiber Fiber RX Tap CMTS Fiber RX Fiber Fiber TX 2way

More information

Communication Systems Internetworking (Bridges & Co)

Communication Systems Internetworking (Bridges & Co) Communication Systems Internetworking (Bridges & Co) Prof. Dr.-Ing. Lars Wolf TU Braunschweig Institut für Betriebssysteme und Rechnerverbund Mühlenpfordtstraße 23, 38106 Braunschweig, Germany Email: wolf@ibr.cs.tu-bs.de

More information

BCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS

BCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS BCS THE CHARTERED INSTITUTE FOR IT BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS Friday 2 nd October 2015 Morning Answer any FOUR questions out of SIX. All questions carry

More information

ECE/CS 372 introduction to computer networks. Lecture 13

ECE/CS 372 introduction to computer networks. Lecture 13 ECE/CS 372 introduction to computer networks Lecture 13 Announcements: HW #4 hard copy due today Lab #5 posted is due Tuesday June 4 th HW #5 posted is due Thursday June 6 th Pickup midterms Acknowledgement:

More information

Gigabit Ethernet: Architectural Design and Issues

Gigabit Ethernet: Architectural Design and Issues Gigabit Ethernet: Architectural Design and Issues Professor of Computer and Information Sciences Columbus, OH 43210 http://www.cis.ohio-state.edu/~jain/ 9-1 Overview Distance-Bandwidth Principle 10 Mbps

More information

Data Link Protocols. TCP/IP Suite and OSI Reference Model

Data Link Protocols. TCP/IP Suite and OSI Reference Model Data Link Protocols Relates to Lab. This module covers data link layer issues, such as local area networks (LANs) and point-to-point links, Ethernet, and the Point-to-Point Protocol (PPP). 1 TCP/IP Suite

More information

Written examination in Computer Networks

Written examination in Computer Networks Written examination in Computer Networks February 14th 2014 Last name: First name: Student number: Provide on all sheets (including the cover sheet) your last name, rst name and student number. Use the

More information

DATA COMMUNICATIONS AND NETWORKING. Solved Examples

DATA COMMUNICATIONS AND NETWORKING. Solved Examples Page 1 of 10 DATA COMMUNICATIONS AND NETWORKING Solved Examples References: STA: Stallings, Data and Computer Communications, 6 th ed. TAN: Tannenbaum, Computer Networks, 4 th ed.) 1. Given the following

More information

Local Area Network By Bhupendra Ratha, Lecturer School of Library and Information Science Devi Ahilya University, Indore Email: bhu261@gmail.com Local Area Network LANs connect computers and peripheral

More information