6.1. Why do LANs tend to use broadcast networks? Why not use networks consisting of multiplexers and switches?

Save this PDF as:

Size: px
Start display at page:

Download "6.1. Why do LANs tend to use broadcast networks? Why not use networks consisting of multiplexers and switches?"

Transcription

1 TUTORIAL 2 (EKT 332) 6.1. Why do LANs tend to use broadcast networks? Why not use networks consisting of multiplexers and switches? Why broadcast network? -The computers in a LAN are separated by a short distance (typically < 100m) so high speed and reliable communication is possible using a shared broadcast medium. -The cost of the medium is negligible and the overall cost is dominated by the cost of the network interface cards in each computer. -The LAN users usually belong to the same group where all users are generally trusted, so broadcast does not pose much security danger. Why not Multiplexers? -The original reason for avoiding a multiplexer and switch approach to LANs is that a centralized, expensive box is required. -The availability of Application Specific Integrated Circuits (ASICs) has reduced the cost of switching boxes and made switch-based LANs feasible, and in some environments the dominant approach Consider four stations that are all attached to two different bus cables. The stations exchange fixed-size frames of length 1 second. Time is divided into slots of 1 second. When a station has a frame to transmit, the station chooses either bus with equal probability and transmits at the beginning of the next slot with probability p. Find the value of p that maximizes the rate at which frames are successfully transmitted. To maximize the successful transmission rate is to maximize the probability of successful transmission. P(success) = (number of stations) P(one station transmits on one bus) P(no other station transmit on the same bus) 6.9. In a LAN, which MAC protocol has a higher efficiency: ALOHA or CSMA-CD? What about in a WAN? The maximum efficiency achieved by the Slotted ALOHA is The efficiency of CSMA-CD is given by 1/( a), and is sensitive to a = t prop R/L, the ratio between delay-bandwidth product and frame length. In a LAN environment, the end-to-end distance is around 100m and the transmission rates are typically 10Mbps, 100Mbps and 1Gbps (See Table 6.1). An Ethernet frame has a maximum length of 1500 bytes = 12,000 bits. The table shows the efficiency of CSMA-CD at various transmission rate. Assume L = 12,000 bits and propagation speed of 3 x 10 8.

2 Note however that if shorter frame sizes predominate, e.g. 64 byte frames, then a increases by a factor of about 20. According to the above formula the efficiency of CSMA-CD at 1 Gbps then drops to about 0.7. The situation however is worse in that the minimum frame size at 1 Gbps needs to be extended to 512 bytes, as discussed in page 436 of the text. In a WAN environment d is larger. Assuming 100 Km, a is larger by a factor of 10 3 resulting in an efficiency of 0.36, 0.05, and respectively for 10 Mbps, 100 Mbps, and 1 Gbps transmission rates. In the case of 10 Mbps transmission rate the efficiency of CSMA-CD is close to the efficiency of ALOHA but in the other two cases it is much less than ALOHA Suppose that a group of 10 stations is serviced by an Ethernet LAN. How much bandwidth is available to each station if (a) the 10 stations are connected to a 10 Mbps Ethernet hub; (b) the 10 stations are connected to a 100 Mbps Ethernet hub; (c) the 10 stations are connected to a 10 Mbps Ethernet switch. a. Assuming essentially 100% efficiency, the 10 Mbps are shared equally by the 10 stations, so each station can receive a maximum of 1 Mbps on average. b. Assuming essentially 100% efficiency, the 100 Mbps are shared equally by the 10 stations, so each station receives a maximum of 10 Mbps on average. c. The bit rate available to each station depends on the number of collision domains that are configured in the switch. In the best case, each station has nearly 10 Mbps to the Ethernet switch. Each station will have full access to the 10 Mbps if the switch capacity can handle the aggregate rate from all the stations Suppose that 80 percent of the traffic generated in the LAN is for stations in the LAN, and 20 percent is for stations outside the LAN. Is an Ethernet Hub preferable to an Ethernet switch? Does the answer change if the percentages are reversed? The difference between a hub and a switch is that in the hub frame are broadcast to all lines, while in a switch, frames are forwarded to another collision domain only if the destination is in that domain. When 80% of the traffic is local, the switch will only forward 20% of frames to other collision domains, thus increasing the bandwidth available on those domains. If 80% of the traffic is to other collision domains, then the switch forward more traffic to other domains. If there is only one other domain, then the switch forwards almost as much traffic as a hub would and is thus ineffective in containing broadcast traffic. On the other hand, if the switch has multiple broadcast domains, then the amount of traffic forwarded from the switch will be less than that forwarded by a hub Use IEEE and IEEE to discuss three differences between wired and wireless LANs. -Error rate: Unlike wired LANs, wireless LANs have high error rate due to interference and noise. Wireless LANs need to implement ARQ and/or error correction to increase the reliability of the communication channel. -Station mobility: Unlike wired LANs where stations connected to the LANs are static, in wireless LANs, the stations can be mobile and portable. Wireless LAN protocols may have to implement dynamic traffic routing and service handoff when the station moves from one service area to another.

3 -Collision detection: Collision detection is not effective in wireless LANs due to the hidden station problem. Consequently, the sender must wait for explicit acknowledgment (e.g. RTS/CTS) from the receiver to know whether or not a frame has been received. The wireless LAN protocol implements a collision avoidance algorithm rather than the collision detection in wired LAN, and the delay in the contention period is longer than thee round-trip delay of 2t prop of wired LAN because of waiting for the receiver s acknowledgment. -Security: In a wired LAN, the transmission medium is usually physically secure. In a wireless LAN, any device within the geographic transmission area can intercept the transmissions. To provide data security, wireless LANs need to implement encryption at the expense of higher cost and reduced performance. -Power consumption: Portable and mobile devices are usually battery powered, and thus have limited power capacity. The wireless LAN protocol must be designed to be power efficient. All these issues are addressed in the IEEE wireless LAN protocol Why is error control (ARQ and retransmission) included in the MAC layer in IEEE and not in IEEE 802.3? Error control is required in the MAC in IEEE because of the noise and interference in the wireless medium. In contrast, the wired medium for IEEE protocol has very low error rates The LANs in the figure below are interconnected using source routing bridges. Assume that bridges 3 and 4 are not part of the initial spanning tree.

4

6 Assume that queueing and processing delays at the intermediate switch are negligible. Total delay = 2 t prop + T ( number of packets +1) = 2 (3 1/3 ms) + ( µsec) (33 +1) = 17.8 ms Consider the virtual-circuit packet network in Figure Suppose that node 4 in the network fails. Reroute the affected virtual circuits and show the new set of routing tables. When node 4 fails, all the affected connections need to be re-routed. In the example, the VC from A to D needs to be rerouted. One possible new route is A D. The routing tables at nodes 1, 2, and 5 need to be modified. The VC from C to B also needs to be rerouted. A possible new route is C D. The routing tables in 2, 5, and 6 need to be modified. The routing tables in node 3 have to be modified to remove the connections that no longer traverse it.

7 7.59. Explain the difference between the leaky bucket traffic shaper and the token bucket traffic shaper. -In the leaky bucket the packet output rate is always constant. -In the token bucket, the output rate can be variable and is controlled at one packet per token. If there are tokens in the bucket, the packets are sent out as soon as they arrive. The depth of the token bucket limits the traffic burstiness. If there are no tokens in the bucket, the packet has to wait for the arrival of a token, and the token arrival rate becomes the packet output rate. In the case of the empty token bucket where the tokens arrive at a constant rate, the token bucket essentially becomes a leaky bucket Explain where the policing device and the traffic shaping device should be located in the generic packet switch in Figure The traffic policing device should be placed at the input port of the ingress line card. As packets arrive their usage history is updated and the packet if tagged and/or dropped if necessary. The traffic shaping device should be placed in the output port of egress line card, prior to transfer to another switch or network.

4. MAC protocols and LANs

4. MAC protocols and LANs 1 Outline MAC protocols and sublayers, LANs: Ethernet, Token ring and Token bus Logic Link Control (LLC) sublayer protocol Bridges: transparent (spanning tree), source routing

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

Ethernet dominant LAN technology: cheap -- \$20 for 100Mbs! first widely used LAN technology Simpler, cheaper than token rings and ATM Kept up with speed race: 10, 100, 1000 Mbps Metcalfe s Etheret sketch

Wide Area Networks. Learning Objectives. LAN and WAN. School of Business Eastern Illinois University. (Week 11, Thursday 3/22/2007)

School of Business Eastern Illinois University Wide Area Networks (Week 11, Thursday 3/22/2007) Abdou Illia, Spring 2007 Learning Objectives 2 Distinguish between LAN and WAN Distinguish between Circuit

LAN Switching. 15-441 Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, 802.11, PPP. Interconnecting LANs

LAN Switching 15-441 Computer Networking Bridges/Switches, 802.11, PPP Extend reach of a single shared medium Connect two or more segments by copying data frames between them Switches only copy data when

CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012

CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012 Important: The solutions to the homework problems from the course book have been provided by the authors.

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages

ECE 333: Introduction to Communication Networks Fall 2001

ECE 333: Introduction to Communication Networks Fall 2001 Lecture 17: Medium Access Control V Perfectly scheduled approaches Token ring networks 1 We have categorized channel allocation techniques as either

High-Speed LANs Part III: LLC and Bridging

High-Speed LANs Part III: LLC and ridging Raj Jain Washington University Saint Louis, MO 63131 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse473-05/ 1-1 Overview

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks

Computer Networks Lecture 06 Connecting Networks Kuang-hua Chen Department of Library and Information Science National Taiwan University Local Area Networks (LAN) 5 kilometer IEEE 802.3 Ethernet IEEE 802.4

ALOHA Class of Multiple Access Protocols

ALOHA Class of Multiple Access Protocols ALOHA, also called pure ALOHA: Whenever a user has a frame to send, it simply transmits the frame. If collision occurs, it waits for a random period of time and

Introduction to Metropolitan Area Networks and Wide Area Networks

Introduction to Metropolitan Area Networks and Wide Area Networks Chapter 9 Learning Objectives After reading this chapter, you should be able to: Distinguish local area networks, metropolitan area networks,

The Network Layer Functions: Congestion Control

The Network Layer Functions: Congestion Control Network Congestion: Characterized by presence of a large number of packets (load) being routed in all or portions of the subnet that exceeds its link and

IEEE 802 LANs. LAN: Local Area Network What is a local area network?

IEEE 802 LANs LAN: Local Area Network What is a local area network? A LAN is a network that resides in a geographically restricted area LANs usually span a building or a campus 1 Characteristics of LANs

Local & Metropolitan Area Networks

Local & Metropolitan Area Networks CS455 Yonshik Choi, Ph.D. Department of Computer Science Illinois Institute of Technology Rice Campus Local Area Networks Characteristic Smaller geographical area a

- Hubs vs. Switches vs. Routers -

1 Layered Communication - Hubs vs. Switches vs. Routers - Network communication models are generally organized into layers. The OSI model specifically consists of seven layers, with each layer representing

06/02/ Local & Metropolitan Area Networks. Overview. Medium Access Sublayer (1) ACOE322

1 Local & Metropolitan Area Networks ACOE322 Lecture 2 Medium Access Control and Logical Link Control 1 Overview The architecture of a LAN is best described in terms of a layering of protocols that organize

Based on Computer Networking, 4 th Edition by Kurose and Ross

Computer Networks Ethernet Hubs and Switches Based on Computer Networking, 4 th Edition by Kurose and Ross Ethernet dominant wired LAN technology: cheap \$20 for NIC first widely used LAN technology Simpler,

Introduction to Ethernet

Technical Tutorial 2002 12-06 Table of Contents 1: Introduction 2: Ethernet 3: IEEE standards 4: Topology 5: CSMA/CD 6: Wireless-LAN 7: Transmission Speed 8: Limitations of Ethernet 9: Sena Products and

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK Contemporary Control Systems, Inc. Understanding Ethernet Switches and Routers This extended article was based on a two-part article that was

WAN Data Link Protocols In addition to Physical layer devices, WANs require Data Link layer protocols to establish the link across the communication line from the sending to the receiving device. 1 Data

Communication Systems Internetworking (Bridges & Co)

Communication Systems Internetworking (Bridges & Co) Prof. Dr.-Ing. Lars Wolf TU Braunschweig Institut für Betriebssysteme und Rechnerverbund Mühlenpfordtstraße 23, 38106 Braunschweig, Germany Email: wolf@ibr.cs.tu-bs.de

RTT 60.5 msec receiver window size: 32 KB

Real-World ARQ Performance: TCP Ex.: Purdue UCSD Purdue (NSL): web server UCSD: web client traceroute to planetlab3.ucsd.edu (132.239.17.226), 30 hops max, 40 byte packets 1 switch-lwsn2133-z1r11 (128.10.27.250)

From the previous lecture

CS 640: Introduction to Computer Networks Aditya Akella Lecture 7 - IP: Addressing and Forwarding From the previous lecture We will cover spanning tree from the last lecture 2 Spanning Tree Bridges More

Wired Local Area Network (Ethernet)

Chapter 13 Wired Local Area Network (Ethernet) IEEE Standards In 1985, the Computer Society of the IEEE started a project, called Project 802, to set standards to enable intercommunication among equipment

Random Access Protocols

Lecture Today slotted vs unslotted ALOHA Carrier sensing multiple access Ethernet DataLink Layer 1 Random Access Protocols When node has packet to send transmit at full channel data rate R. no a priori

Switches and Bridges. COS 461: Computer Networks Spring 2009 (MW 1:30-2:50 in COS 105) Guest Lecture Jennifer Rexford 1

Switches and Bridges COS 461: Computer Networks Spring 2009 (MW 1:30-2:50 in COS 105) Guest Lecture Jennifer Rexford 1 Goals of Todayʼs Lecture Devices that shuttle data at different layers Repeaters and

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

LANs Local Area Networks via the Media Access Control (MAC) SubLayer 1 Local Area Networks Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring 2 Network Layer

Token Passing: IEEE802.5 standard. IEEE802.5 standard

Token Passing: IEEE802.5 standard. 4 Mbps. maximum token holding time: 10 ms, limiting packet length. packet (token, data) format:. SD, ED mark start, end of packet 1 IEEE802.5 standard. AC access control

Data Communication and Computer Network

1 Data communication principles, types and working principles of modems, Network principles, OSI model, functions of data link layer and network layer, networking components, communication protocols- X

EXAMPLES AND PROBLEMS. Competence Based Education Internet Protocols

EXAMPLES AND PROBLEMS Competence Based Education Internet Protocols Example 1 In following figure frames are generated at node A and sent to node C through node B. Determine the minimum transmission rate

2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above

1. How many bits are in an IP address? A. 16 B. 32 C. 64 2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 3. The network number plays what part in an IP address? A. It

QoS Switching. Two Related Areas to Cover (1) Switched IP Forwarding (2) 802.1Q (Virtual LANs) and 802.1p (GARP/Priorities)

QoS Switching H. T. Kung Division of Engineering and Applied Sciences Harvard University November 4, 1998 1of40 Two Related Areas to Cover (1) Switched IP Forwarding (2) 802.1Q (Virtual LANs) and 802.1p

Indian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology

Indian Institute of Technology Kharagpur TCP/IP Part I Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology Kharagpur Lecture 3: TCP/IP Part I On completion, the student

Level 2 Routing: LAN Bridges and Switches

Level 2 Routing: LAN Bridges and Switches Norman Matloff University of California at Davis c 2001, N. Matloff September 6, 2001 1 Overview In a large LAN with consistently heavy traffic, it may make sense

11/22/2013 1. komwut@siit

11/22/2013 1 Week3-4 Point-to-Point, LAN, WAN Review 11/22/2013 2 What will you learn? Representatives for Point-to-Point Network LAN Wired Ethernet Wireless Ethernet WAN ATM (Asynchronous Transfer Mode)

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006

CSE331: Introduction to Networks and Security Lecture 6 Fall 2006 Open Systems Interconnection (OSI) End Host Application Reference model not actual implementation. Transmits messages (e.g. FTP or HTTP)

What You Will Learn About. Computers Are Your Future. Chapter 8. Networks: Communicating and Sharing Resources. Network Fundamentals

What You Will Learn About Computers Are Your Future Chapter 8 Networks: Communicating and Sharing Resources Basic networking concepts Advantages and disadvantages of networks Peer-to-peer and client/server

Review of Legacy LANs: IEEE 802.{2,3,5} MACs

Review of Legacy LANs: IEEE 802.{2,3,5} MACs 1 Medium Access Control Methods (MACs) Most LANs use shared transmission media. Hence need a mechanism to control access for one station at a time. Most common

Networking Devices. Lesson 6

Networking Devices Lesson 6 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Network Interface Cards Modems Media Converters Repeaters and Hubs Bridges and

Final for ECE374 05/06/13 Solution!!

1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -

EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst

EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst Data communication in reality In reality, the source and destination hosts are very seldom on the same network, for

Local Area Networks. Ethernet 802.3 LAN - 7-1.

Local Area Networks Ethernet 802.3 LAN - 7-1 Local Area Networks (Lokale Netze) Wide Area Network LAN - 7-2 Local Area Networks What is a LAN? Multiple systems attached to an often shared medium high total

16.36 Communication Systems Engineering

MIT OpenCourseWare http://ocw.mit.edu 16.36 Communication Systems Engineering Spring 2009 For information about citing these materials or our Terms of Use, visit: http://ocw.mit.edu/terms. 16.36: Communication

The Internet software layers

The Internet software layers SMTP, Telnet, FTP, POP3, IMAP TCP, UDP IP: RIP, BGP, OSPF Ethernet, Wireless LAN, Token Ring Twisted pair, coaxial, microwave, optical fiber Ethernet 1973 Xerox s researcher

EECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers

EECS 122: Introduction to Computer Networks Multiaccess Protocols Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley Berkeley, CA 94720-1776

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages

ECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1

ECE 358: Computer Networks Homework #3 Chapter 5 and 6 Review Questions 1 Chapter 5: The Link Layer P26. Let's consider the operation of a learning switch in the context of a network in which 6 nodes labeled

Point-to-Point Vs. Shared Channel Communication In LANs Point-to-point:

Point-to-Point Vs. Shared Channel Communication In LANs Point-to-point: Computers connected by communication channels that each connect exactly two computers with access to full channel bandwidth. Forms

Star topology. Ethernet. Ethernet Frame Structure (more) Ethernet Frame Structure. Ethernet uses CSMA/CD. Unreliable, connectionless service

thernet dominant wired LN technology: cheap \$0 for 00Mbs! first widely used LN technology Simpler, cheaper than token LNs and TM Kept up with speed race: 0 Mbps 0 bps Star topology us topology popular

Communication Networks Chapter 5. Switching Technology

Communication Networks Chapter 5. Switching Technology o Circuit Switching o Message Switching o Virtual Circuit / Virtual Connection o Datagram Recapitulation: Telecommunications Network LAN 1 Backbone

Medium Access Sublayer

Medium Access Sublayer Topology of the Network Bus, Ring, Tree Protocols IEEE 802.3 for bus topology IEEE 802.4 for token bus IEEE 802.5 for token ring FDDI for fibre ring IEEE 802.11 for wireless networks

EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak

Packet Switching and Computer Networks Switching As computer networks became more pervasive, more and more data and also less voice was transmitted over telephone lines. Circuit Switching The telephone

Virtual LANs. http://www.cis.ohio-state.edu/~jain/cis788-97/ or http://www.netlab.ohio-state.edu/~jain/cis788-97/ Raj Jain

Virtual LANs Professor of Computer and Information Sciences Please download and print the handouts from: http://www.cis.ohio-state.edu/~jain/cis788-97/ or http://www.netlab.ohio-state.edu/~jain/cis788-97/

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

Local Area What s a LAN? A transmission system, usually private owned, very speedy and secure, covering a geographical area in the range of kilometres, comprising a shared transmission medium and a set

8 Wide Area Network (WAN)

Wide Area Network (WAN).1 Introduction Objectives.2 Why need a WAN?.3 Switching Techniques.3.1 Circuit switching network.3.2 Packet switching Network.3.2.1 How Packet Switching Network Works?.3.2.2 Datagram

TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL

1. Local Area Networks TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL These are networks spanning relatively short distances (e.g. within one building) for local point-to-point and point-to-multipoint

College 5, Routing, Internet. Host A. Host B. The Network Layer: functions

CSN-s 5/1 College 5, Routing, Internet College stof 1 Inleiding: geschiedenis, OSI model, standaarden, ISOC/IETF/IRTF structuur Secties: 1.2, 1.3, 1.4, 1.5 2 Fysieke laag: Bandbreedte/bitrate Secties:

CSE331: Introduction to Networks and Security Homework 1 Fall 2006 Due: 29 Sept. 2006

CSE331: Introduction to Networks and Security Homework 1 Fall 006 Due: 9 Sept. 006 What to turn in: Submit hardcopy answers to the questions below. Please include your name, e-mail address, and the number

BCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS

BCS THE CHARTERED INSTITUTE FOR IT BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS Friday 2 nd October 2015 Morning Answer any FOUR questions out of SIX. All questions carry

TCP PERFORMANCE IN MOBILE-IP

TCP PERFORMANCE IN MOBILE-IP Foo Chun Choong Department of Electrical Engineering, National University of Singapore ABSTRACT The throughput performance of TCP in Mobile-IP [1] was investigated. Compared

Distributed Systems 3. Network Quality of Service (QoS)

Distributed Systems 3. Network Quality of Service (QoS) Paul Krzyzanowski pxk@cs.rutgers.edu 1 What factors matter for network performance? Bandwidth (bit rate) Average number of bits per second through

ProCurve Networking. LAN Aggregation Through Switch Meshing. Technical White paper

ProCurve Networking LAN Aggregation Through Switch Meshing Technical White paper Introduction... 3 Understanding Switch Meshing... 3 Creating Meshing Domains... 5 Types of Meshing Domains... 6 Meshed and

Overview of Network Hardware and Software. CS158a Chris Pollett Jan 29, 2007.

Overview of Network Hardware and Software CS158a Chris Pollett Jan 29, 2007. Outline Scales of Networks Protocol Hierarchies Scales of Networks Last day, we talked about broadcast versus point-to-point

Local Area Networks. Guest Instructor Elaine Wong. Elaine_06_I-1

Local Area Networks Guest Instructor Elaine Wong Elaine_06_I-1 Outline Introduction to Local Area Networks (LANs) Network architecture Geographical area LAN applications LAN Technologies Ethernet Fiber

Faculty of Engineering Computer Engineering Department Islamic University of Gaza 2012. Network Chapter# 19 INTERNETWORK OPERATION

Faculty of Engineering Computer Engineering Department Islamic University of Gaza 2012 Network Chapter# 19 INTERNETWORK OPERATION Review Questions ٢ Network Chapter# 19 INTERNETWORK OPERATION 19.1 List

Ethernet, VLAN, Ethernet Carrier Grade Dr. Rami Langar LIP6/PHARE UPMC - University of Paris 6 Rami.langar@lip6.fr www-phare.lip6.fr/~langar RTEL 1 Point-to-Point vs. Broadcast Media Point-to-point PPP

Computer Networks Vs. Distributed Systems

Computer Networks Vs. Distributed Systems Computer Networks: A computer network is an interconnected collection of autonomous computers able to exchange information. A computer network usually require

Overview. Next Lecture. Last Lecture. This Lecture. Flow control and error control. Local area networking 1 Source: Sections 13

Overview Last Lecture Flow control and error control This Lecture Local area networking 1 Source: Sections 13 Next Lecture Local area networking 2 Source: Sections 17.1-17.2 1 Data Link Layer Standards

Computer Networks III

Computer Networks III Wide Area Networks and Packet Switching Network Protocols and the OSI Layers The Internet Internet Infrastructure 1 Wide Area Networks (recap) 2 Page 1 Basic WAN structure Host Router

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.

QoS issues in Voice over IP

COMP9333 Advance Computer Networks Mini Conference QoS issues in Voice over IP Student ID: 3058224 Student ID: 3043237 Student ID: 3036281 Student ID: 3025715 QoS issues in Voice over IP Abstract: This

Exhibit n.2: The layers of a hierarchical network

3. Advanced Secure Network Design 3.1 Introduction You already know that routers are probably the most critical equipment piece in today s networking. Without routers, internetwork communication would

Myriad of different LAN technologies co-existing in a WAN. For example:

Myriad of different LAN technologies co-existing in a WAN. For example: Fast Ethernet (100 Mbps) Gigabit Ethernet (1000 Mbps); 10 and 100 GigE Purdue CS backbone: 10 Gbps AT&T (tier-1 provider)? WLAN (11,

Lecture 6 Types of Computer Networks and their Topologies Three important groups of computer networks: LAN, MAN, WAN

Lecture 6 Types of Computer Networks and their Topologies Three important groups of computer networks: LAN, MAN, WAN LAN (Local Area Networks) 10/28/2008 Vasile Dadarlat - Computer Networks 1 MAN (Metropolitan

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit

Overview of Computer Networks

Overview of Computer Networks Client-Server Transaction Client process 4. Client processes response 1. Client sends request 3. Server sends response Server process 2. Server processes request Resource

Final Exam. Route Computation: One reason why link state routing is preferable to distance vector style routing.

UCSD CSE CS 123 Final Exam Computer Networks Directions: Write your name on the exam. Write something for every question. You will get some points if you attempt a solution but nothing for a blank sheet

What is VLAN Routing?

Application Note #38 February 2004 What is VLAN Routing? This Application Notes relates to the following Dell product(s): 6024 and 6024F 33xx Abstract Virtual LANs (VLANs) offer a method of dividing one

Communication Systems I

Communication Systems I Course Map Contents Recap of the networks we ve seen so far Basics of protocols HTTP example The OSI model Packet and Circuit switching Physical media What to expect next Recap

SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005. Lecturer: Kartik Krishnan Lecture 1-3

SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005 Lecturer: Kartik Krishnan Lecture 1-3 Communications and Computer Networks The fundamental purpose of a communication network is the exchange

Congestion Control Overview

Congestion Control Overview Problem: When too many packets are transmitted through a network, congestion occurs t very high traffic, performance collapses completely, and almost no packets are delivered

Multiprotocol Label Switching (MPLS)

Multiprotocol Label Switching (MPLS) รศ.ดร. อน นต ผลเพ ม Asso. Prof. Anan Phonphoem, Ph.D. anan.p@ku.ac.th http://www.cpe.ku.ac.th/~anan Computer Engineering Department Kasetsart University, Bangkok, Thailand

Communications and Computer Networks

SFWR 4C03: Computer Networks and Computer Security January 5-8 2004 Lecturer: Kartik Krishnan Lectures 1-3 Communications and Computer Networks The fundamental purpose of a communication system is the

CSE 123: Computer Networks Fall Quarter, 2014 MIDTERM EXAM

CSE 123: Computer Networks Fall Quarter, 2014 MIDTERM EXAM Instructor: Alex C. Snoeren Name SOLUTIONS Student ID Question Score Points 1 15 15 2 35 35 3 25 25 4 15 15 5 10 10 Total 100 100 This exam is

Overview of Routing between Virtual LANs

Overview of Routing between Virtual LANs This chapter provides an overview of virtual LANs (VLANs). It describes the encapsulation protocols used for routing between VLANs and provides some basic information

EVOLVING ENTERPRISE NETWORKS WITH SPB-M APPLICATION NOTE

EVOLVING ENTERPRISE NETWORKS WITH SPB-M APPLICATION NOTE EXECUTIVE SUMMARY Enterprise network managers are being forced to do more with less. Their networks are growing in size and complexity. They need

Transport and Network Layer

Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a

R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol?

Chapter 1 Review Questions R1. What is the difference between a host and an end system? List several different types of end systems. Is a Web server an end system? 1. There is no difference. Throughout

SFWR 4C03: Computer Networks and Computer Security January 19-22 2004 Lecturer: Kartik Krishnan Lectures 7-9 RARP: Reverse Address Resolution Protocol When a system with a local disk is bootstrapped it

Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup.

CEN 007C Computer Networks Fundamentals Instructor: Prof. A. Helmy Homework : Network Layer Assigned: Nov. 28 th, 2011. Due Date: Dec 8 th, 2011 (to the TA) 1. ( points) What are the 2 most important network-layer

CSMA/CA. Information Networks p. 1

Information Networks p. 1 CSMA/CA IEEE 802.11 standard for WLAN defines a distributed coordination function (DCF) for sharing access to the medium based on the CSMA/CA protocol Collision detection is not

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur

Module 5 Broadcast Communication Networks Lesson 1 Network Topology Specific Instructional Objectives At the end of this lesson, the students will be able to: Specify what is meant by network topology

Study on VLAN in Wireless Networks

Study on VLAN in Wireless Networks Rajul Chokshi and Dr. Chansu Yu Department of Electrical and Computer Engineering Cleveland State University Cleveland, Ohio 44115 April 30, 2007 Abstract This technical

Management Software. Web Browser User s Guide AT-S106. For the AT-GS950/48 Gigabit Ethernet Smart Switch. Version 1.0.0. 613-001339 Rev.

Management Software AT-S106 Web Browser User s Guide For the AT-GS950/48 Gigabit Ethernet Smart Switch Version 1.0.0 613-001339 Rev. A Copyright 2010 Allied Telesis, Inc. All rights reserved. No part of

Unit of Learning # 2 The Physical Layer. Sergio Guíñez Molinos sguinez@utalca.cl 2-2009

Unit of Learning # 2 The Physical Layer Sergio Guíñez Molinos sguinez@utalca.cl 2-2009 Local Area Network (LAN) Redes de Computadores 2 Historic topologies more used in LAN Ethernet Logical Bus and Physical

The Network Layer. Network Layer Design Objectives

1 next CITS3002 help3002 CITS3002 schedule The Network Layer The Data Link Layer had the responsibility of reliably transmitting frames across along a single wire (or wireless,...) link. The Network Layer's

Ethernet. Ethernet. Network Devices

Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking

Backbone and WAN part 2

Backbone and WAN part 2 Backbone Architecture Switched Backbones: most common type of backbone, used in distribution layer, used in new buildings, sometimes in core layer, can be rack or chassis based.