Data Link Control (DLC) Protocols

Size: px
Start display at page:

Download "Data Link Control (DLC) Protocols"

Transcription

1 Data Link Control (DLC) Protocols The purpose of a MAC protocol is to let competing computers access a shared medium so that a computer can transmit a data frame to another computer possibly without collision. However, we need to understand the following limitations of MAC protocols: - Packet loss: This can happen due to a MAC layer dropping a packet after failing several retrials. Packet loss can occur due to errors in the medium. Also, a receiver can drop a correctly received packet if the upper layer protocol temporarily runs out of buffer. - Duplicate packets: A receiver can receive multiple copies of the same packet. This can happen due to possible retransmissions occurring at the MAC level. - Unacknowledged data transmission: In case of Ethernet, data frames are not acknowledged at the MAC level. Thus, a sender has no idea if a data frame has been correctly delivered or not. MAC protocols are insensitive to the following two factors: - processing speed of the receiver, and - availability of buffer at the receiver. For example, if a faster router transmits data at a higher rate than the processing speed of another router, the second router will start dropping data packets because of lack of buffer space. Therefore, two computers need to exchange data at a controlled rate determined by their individual speeds and buffer sizes. If two computers user computers or routers communicate for a while, a data link is assumed to exist between the two for that period. The data link may appear on top of a shared medium, say, Ethernet or wireless medium, or a dedicated medium, say, a fiber link connecting two routers. The idea of a data link in different scenarios has been illustrated in Figure D1. A DLC protocol provides a layer of abstraction on top of the MAC protocol to provide better quality of service to its upper layer, namely, the routing protocol, as illustrated in Figure D2. Ideally, we want to achieve the following in a reliable DLC protocol. - The sender gets a confirmation that each and every packet has been correctly delivered to the receiver. - At the receiving end, the user of the DLC protocol gets exactly one copy of each new data packet transmitted by the user of DLC at the sending end. - Packet flow between sender and receiver is regulated by considering their own processing speeds and buffer sizes. 1

2 Note: Though it is desirable to have an ideal DLC protocol, sometimes it is neither achievable nor desirable to satisfy the ideal conditions. Lack of desirability is due to the fact that in certain situations it is more desirable to achieve the ideal condition in another layer of protocol, where it is less expensive to do so. Thus, we can have several DLC protocols delivering data with differing quality levels, as illustrated in Figure D3. Computer (Client) Data Link Computer (Server) Shared medium LAN Router Data Link Router Dedicated physical link Data Link Air interface Base station Cell phone Figure D1: The idea of data link used in different scenarios. 2

3 User User DLC MAC PHY Reliable view Unreliable Physical Medium DLC MAC PHY Figure D2: The DLC layer providing a reliable abstraction of the underlying unreliable layers. User of DLC User of DLC DLC1 DLC2 DLC3 DLC1 DLC2 DLC3 MAC MAC Physical Medium + PHY layer Figure D3: Co-existence of multiple DLC protocols. In the following, we will discuss a variety of DLC protocols with differing capabilities. A very simple DLC protocol without acknowledgement A simple DLC protocol without acknowledgement has been shown in Figure D4. In this protocol, when a user (upper layer protocol) makes a request to a DLC entity to send a packet, the DLC protocol simply make a send request to the underlying MAC. It is possible that retransmissions and acknowledgements (in a WLAN) occur at the MAC level, but there are no retransmissions and ACK at the DLC level. The DLC protocol 3

4 makes a send request exactly once to the underlying MAC. The underlying MAC makes an effort to deliver the packet to the destination, but it may fail to do so, and it may deliver multiple copies of the data packet to the receiver DLC protocol. Thus, the main drawbacks of this protocol are as follow: - A receiver DLC may not receive a data packet sent by the sender DLC. This is possible because there is no more protocol actions at the DLC level, such as ACK and retransmission. Packet loss is possible due to the fact that the MAC layer may fail to deliver the packet. - Due to retransmissions occurring at the MAC level and due to the absence of a mechanism to filter out duplicate packets at the DLC level, the DLC user at the receiver s end may receive multiple copies of the same packet. - The user of a DLC entity at the sender s end does not get a confirmation that the packet has been correctly delivered to the receiver. Request to Transmit DATA from user of DLC Sender DLC Send(DATA) Receiver DLC Request to Transmit DATA from user of DLC Send(DATA) DATA to user of DLC DATA to user of DLC Time Figure D4: A very simple DLC protocol without ACK In some applications, in spite of the drawbacks of the simple DLC protocol of Figure D4, we use the protocol for two reasons as explained below. - We can not do anything better. In some applications, there is no time left to perform additional operations, such as sending an ACK and retransmitting a packet if an ACK is lost. The application just hopes that the packet gets to the other side. If the other side does not receive the packet, no great damage is expected to be done and the user at the receiver s end recovers from the situation caused by the loss of packet after a long time. 4

5 - We do not have to do anything better. We take this view if the occurrences of the drawbacks are rare and hope that an upper layer protocol, such as TCP, circumvents the drawbacks. In order to eliminate some of the drawbacks of the protocol shown in Figure D4, we present a slightly different DLC protocol with an ACK mechanism in the following. A connectionless DLC protocol with acknowledgement In Figure D5, we present a DLC protocol using acknowledgements. In this case, the sender DLC requests the underlying (not shown in the figure) MAC to send a DLC data packet and starts a timer. If the receiver DLC correctly receives the data packet, it gives the data to its (upper layer) user, and sends back an ACK to the sender. If the sender DLC gets a timeout before receiving an ACK, it makes another request to the MAC to send the data. Thus, the sender DLC gets a confirmation if the data is delivered to the user at the receiver DLC end. A request to the MAC to re-send the data packet may cause the receiver to receive multiple copies of the data packet. Also, any retransmission by the MAC layer may also cause the receiver DLC to receive multiple copies of the DLC data packet. Note: The ACK packet seen in Figure D5 is different from any ACK frames used by the MAC layer in WLAN. An ACK packet in the DLC protocol is treated as a data packet by the MAC layer, because the MAC layer does not interpret the header of a packet received by it from the DLC layer. Request to Transmit DATA from user of DLC Sender DLC Send(DATA) Receiver DLC Optional notification to user of DLC Time Send(ACK) [No ACK: Retransmit] Send(DATA) DATA to user of DLC DATA to user of DLC Figure D5: A DLC protocol with ACK In this protocol, the sender DLC gets a conformation of the receipt of data packets by the receiver DLC and packet loss is handled by using retransmission mechanism. However, the receiver may still receive duplicate packets. Handling of duplicate packets may be left to an upper layer protocol, such as the TCP. 5

6 A classical design consideration Because of the unreliable nature of MAC protocols, we build additional functionalities to address packet loss and filtering out duplicate packets into upper level protocols, such as DLC and TCP. A classical question: In what protocol layer we should detect packet loss and filter out duplicates? To answer this question, we need to consider the quality of the physical medium and the tolerance level of applications as far as packet loss and duplicates are concerned. - If we are using a very reliable medium where bit error is rare and far between, any attempt to handle packet loss and detect duplicates at the DLC level will simply add delay to packet delivery. This is because, if the sender expects an ACK for every packet, or, even a block of packets, transmitted by it self, it is going to initiate a timer and wait for an ACK to arrive. This timer mechanism will cause packet transmission to be delayed. Thus, if packet loss is rare and far between, it is better to leave the task of handling packet loss and duplicate detection to TCP. - If we are using an unreliable medium where bit error is high, it is better to detect packet loss and duplicates at the DLC level. In fact, because of the high BER in wireless channels, the IEEE MAC protocol uses an ACK mechanism to detect packet loss at the MAC level. With a high BER medium, if we leave the concerns of packet loss and duplicate detection to the TCP layer, then it becomes too inefficient to do so. To illustrate this point, let us consider the following example. Let TCP be transmitting packets of 10 Kbytes length, and let MAC frames be limited to 1 Kbytes. Thus, somewhere the long TCP packets are fragmented into ten smaller packets so that each can fit in a 1-Kbyte MAC packet. Assume that one out of the ten smaller packets is lost at the MAC level. Thus, the receiver TCP will see a hole in its 10 Kbytes packet, and ask the sender TCP to retransmit the entire packet even though only a small part of the larger packet was missing. If packet loss had been handled at the DLC level, retransmission at the TCP level would have been avoided. 6

7 A reliable DLC protocol--the Automatic Repeat request (ARQ) protocol In the following, we discuss a reliable DLC protocol, commonly known as the ARQ (Automatic Repeat request) protocol. This protocol has the following desirable features: - The sender of a data packet gets a conformation that the receiver has received the packet. This is achieved by having an ACK mechanism in the protocol. Not having received an ACK for a (new) packet allows us to retransmit the packet by associating a timer with the ACK. - The receiver delivers (at most) one copy of the sender s (new) packet to its upper layer. (The idea of at most comes into picture because there is a certain probability that the MAC layer may fail to deliver any packet to the packet s destination MAC.) The idea of delivering one copy of each new data packet implies that there is a need for distinguishing retransmitted packets from a new one. This is achieved by having a sequence number field in the packet header. A 1-bit sequence number is good enough for this purpose. Informal description of the ARQ protocol - At each instant of time, the receiver expects to receive a particular sequence number next. Any arriving packet with a wrong sequence number is rejected. - A packet with the expected sequence number is delivered to the user. - The expected sequence number is (incremented by 1) modulo 2. - The sender waits for a positive ACK before advancing to the next packet. The desired ACK tells the sender to transmit the next packet. Hence, the protocol is Automatic Repeat request. We present the formal behavior of the ARQ protocol in Figures D6 and D7. Figure D6 gives the sender s behavior in SDL (Specification and Description Language), and Figure D7 gives the receiver s behavior in SDL. Note: SDL is an internationally standardized language for specification and description of distributed systems. This language was developed and standardized by the telephone industry in the mid-70s. Communication protocols these days are commonly specified in SDL. Protocol behaviors are specified as communicating processes in SDL, where a process is an extension of the well-known finite-state machine (FSM) notation. A DLC packet in the ARQ protocol contains a sequence number field. The sequence number field is 1-bit long, and, thus, it can take up two distinct values, namely, 0 and 1. At any instant of time, the receiver expects to receive a packet with a certain sequence number. All packets with the other sequence number are considered to be duplicates of the original, expected packet. It is important to have a sequence number field to distinguish a new packet from old ones. 7

8 Start NTFS = 0 IDLE data from Network layer Construct packet p = (NFTS, data) Send p to MAC Start a timer WAIT ACK(seq) Timeout No seq == NFTS Yes NFTS: Next Frame To Send NFTS++ mod 2 Stop timer. 8

9 Figure D6: ARQ Protocol (Sender s behavior in SDL Specification and Description Language) Start NTFR = 0 IDLE Packet p = (seq, data) from MAC Yes NFTR = = seq No Send data to Network layer above NFTR++ mod 2 Construct an ACK packet p = ACK(nseq), where nseq = 1 - NFTR NFTR: Next Frame To Receive Send p to MAC 9

10 Figure D7: ARQ Protocol (Receiver s behavior in SDL Specification and Description Language) Drawback of the ARQ protocol In the ARQ protocol, the sender transmits the next data packet after receiving an ACK for its previous data packet. Thus, the sender needs to wait for an ACK to arrive from the receiver before it can transmit the next data frame. This waiting time causes the protocol to be very inefficient under certain conditions as explained below. Computer A Computer B Request from upper layer Data ACK Figure D8: A satellite link connecting two computers. Consider the interconnection of two computers by a satellite link as shown in Figure D8. Let the speed of the satellite link be 50 Kilobits per second (Kbps). Let the round-trip delay between the two computers via the satellite be 500 ms. Let the data packet length be 1 Kbps. We assume that ACK packets are very small size. At t = 0, computer A receives a request to transmit a packet to computer B. Let A initiate the transmission right away at t = 0. A will continue transmitting until t = 20. The packet will take 250 ms to reach B. Thus, B will receive the complete packet at t = = 270. Next, B will respond by sending a small ACK packet. The ACK packet will arrive at A at t = = 520. The sender was busy transmitting the packet for 20 ms out of the total time of 520 ms. Thus,, we can compute the percentage of time for which A was blocked as follow: (520 20)/520 = 96%. Thus, 96% of the time computer A remains idle. 10

11 Note: The above kind of inefficiency of the ARQ protocol occurs when we have long transit time and high bandwidth. Short packets also cause inefficiency. Sliding Window Protocol The drawback of the ARQ protocol is that the sender must wait for an ACK to come from the receiver before it can send the next data packet. Thus, the sender can not send multiple data packets before waiting for an ACK. The motivation in the design of a sliding window protocol is to allow a sender to send multiple data packets before it waits for an ACK packet. The sender maintains an important data structure, called a Send Window (SW), with the following interpretation: - A send window is the set of sequence numbers corresponding to packets the sender is permitted to send. - These packets have been sent or can be sent, but are as yet not acknowledged. The normal behavior of the sender is as follows (How the sender behaves when there is an error will be explained in a later part.): - All data packets are numbered using a sequence number field of n bits. Thus, data packets are numbered between 0 and 2 n -1. The SW is smaller than the sequence number space so that when the sequence number space wraps around, it is still possible to distinguish a new copy of a packet with a certain sequence number from old data packets with the same sequence number. - If the sender receives a data packet from its user the network layer above itself it processes the packet as follows: o If the SW is not full, the sender prepares a new data packet by including the appropriate sequence number, saves a copy of the new packet, transmits the new data packet, and starts a timer. (For the goback-n error handling mechanism, the sender maintains just one timer corresponding to the oldest unacked packet.) o If the SW is full and there is no space available to buffer the data packet, a notification can be given to the (upper) network layer that the packet could not be transmitted, or the network layer can be blocked by not returning control to the caller. o If the SW is full, but there is space to buffer the data packet, then create a new data packet with the next sequence number and simply buffer the packet. 11

12 - If the sender receives an ACK corresponding to the lower-edge of the SW, i.e., the first packet in the send window, the buffer space for the entry is emptied and the window is advanced by 1. This may cause the sender to transmit a new packet the one at the end of the SW, if one exists. - If the sender receives an ACK for a packet within the send window, but it does not correspond to the one at the lower-edge of the window, then all packets from the start of the send window up to and including the ACKed packet are considered to be acknowledged, and the send window is advanced accordingly. This idea is called block acknowledgement an ACK for one packet implicitly represents acknowledgements for more than one packet. This is possible because the receiver is assumed to send an ACK for each data packet delivered to the network layer. - (For a received ACK, in case of Go-back-N, the timer is restarted for the oldest unacked packet.) Let us take an example. Let the lower-edge of the send window correspond to sequence number 5, the window size is 4, and all the four packets have been transmitted. If the sender receives an ACK for sequence number 7, then data packets with sequence numbers 5, 6, and 7 are considered to be ACKed. Next, the send window is advanced by three, thus, making the window cover sequence numbers 8 through 11, and three more data packets can be transmitted by the sender. Note: Handling of a timeout will be explained in a later part of these notes. The normal behavior of the receiver is explained as follows. The error situation will be explained separately. - For consistency reason, a similar sequence numbering mechanism is also used by the receiver, i.e., packets are numbered using an n-bit field. - The receiver also maintains an important data structure, called a Receive Window (RW), with the following interpretation. - The RW corresponds to the packets the receiver is allowed to accept. Any packet falling outside the window is discarded. - When a packet with a sequence number equal to the lower-edge of the RW is received, the following actions are taken: o The data part of the packet is passed on to the network layer above. o An ACK is sent to the sender. o The RW is advanced (or, rotated) by 1. Note: When the receiver does not receive an expected packet, an error is said to have occurred, and this situation is handled separately as discussed below. Dealing with errors in the sliding window protocol 12

13 From the sender s viewpoint, an error is said to have occurred if it gets a timeout, and a timeout will occur if an ACK does not arrive. The sender does not receive an ACK because the receiver did not generate one or it was lost. From the receiver s viewpoint, there is an error if an out-of-sequence packet arrives. For example, let the receive window correspond to the sequence of packets 4, 5, 6, and 7. At this moment, the expected packet is one with a sequence number 4. If a packet with a sequence number 4 does not arrive, but what comes in is a packet with sequence number 5, then we say that an out-ofsequence packet has arrived. (Any packet that falls outside the receive window is simply dropped.) Errors are handled in two general, well-known manners in the sliding window protocol. These two error handling schemes are called: - Go-Back-N - Selective Repeat. Go-Back-N In this case, if the receiver fails to receive an expected packet (i.e. an out-of-sequence packet arrives), the receiver discards all packets which do not correspond to the loweredge (expected sequence number) of the receive window. When an out-of-sequence packet is received, the receiver sends an ACK for the most recently received in-sequence packet. Eventually, the sender will get a timeout and retransmit all unacknowledged packets from within the send window. The Go-Back-N scheme requires a receive window of size one. This is because out-ofsequence packets are not buffered by the receiver in this case. The Go-Back-N scheme can cause waste of bandwidth if error rate is high. But, this is a useful scheme if the receiver is low on memory and the error rate is low. Selective Repeat - In this case, all out-of-sequence packets within the receive window are buffered (Packets beyond the receive window are discarded.) For these buffered packets, neither ACKs are sent back to the sender nor the data parts of the packets are delivered to the network layer above. - When the sender gets a timeout, the corresponding packet just one is retransmitted. - If the packet corresponding to the lower-edge of the receive window is correctly received by the receiver, all consecutive packets from the receive window starting with the lower-edge packet are delivered to the network layer above, and an ACK for each packet delivered to the network layer is transmitted to the sender. Note: Selective Repeat if often combined with having the receiver send a negative ACK (NAK) when it detects an error a checksum error or an out-of-sequence error. A NAK stimulates retransmission before the corresponding timer expires. 13

14 Note: Too many short control packets, such as ACKs, flowing in the network is not a good idea simply because they require additional processing, buffer space, and transmissions. Thus, the information fields in an ACK, such as the sequence number of the data packet being ACKed, are inserted into the data packets moving in the direction of the ACK packets. This concept of combining information from an ACK with a data packet in the reverse direction in the same direction as that of the ACK is called piggybacking. Note: Go-Back-N and Selective Repeat schemes are not DLC-level protocols by themselves. Rather, these are error handling schemes to be used with the sliding window protocol. Thus, we have a sliding window protocol with Go-Back-N and another sliding window protocol with Selective Repeat. Comparison of Go-Back-N and Selective Repeat Comparison Metric Go-Back-N Selective Repeat Receive buffer size One Many Efficiency Low High Waste of sender s High Low energy (important in wireless devices) Note: Some practical DLC protocols, such as the PPP (Point-to-Point Protocol) and HDLC (High-level Data Link Control) protocols will be discussed in the tutorial classes. 14

15 15

Transport Layer Protocols

Transport Layer Protocols Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements

More information

Stop And Wait. ACK received; transmit frame 2 CS 455 3

Stop And Wait. ACK received; transmit frame 2 CS 455 3 Data Link Layer, Part 5 Sliding Window Protocols These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang's courses at GMU can make a single machine-readable

More information

Data Link Layer. Flow Control. Flow Control

Data Link Layer. Flow Control. Flow Control Data Link Layer Flow Control 1 Flow Control Flow Control is a technique for speed-matching of transmitter and receiver. Flow control ensures that a transmitting station does not overflow a receiving station

More information

Computer Networks. Chapter 5 Transport Protocols

Computer Networks. Chapter 5 Transport Protocols Computer Networks Chapter 5 Transport Protocols Transport Protocol Provides end-to-end transport Hides the network details Transport protocol or service (TS) offers: Different types of services QoS Data

More information

CSE331: Introduction to Networks and Security. Lecture 9 Fall 2006

CSE331: Introduction to Networks and Security. Lecture 9 Fall 2006 CSE33: Introduction to Networks and Security Lecture 9 Fall 2006 Announcements Project Due TODAY HW Due on Friday Midterm I will be held next Friday, Oct. 6th. Will cover all course material up to next

More information

Computer Networks. Data Link Layer

Computer Networks. Data Link Layer Computer Networks The Data Link Layer 1 Data Link Layer Application Transport Network DLL PHY 2 What does it do? What functions it performs? Typically: Handling transmission errors, a.k.a., error control.

More information

CMPE 150 Winter 2009

CMPE 150 Winter 2009 CMPE 150 Winter 2009 Lecture 6 January 22, 2009 P.E. Mantey CMPE 150 -- Introduction to Computer Networks Instructor: Patrick Mantey mantey@soe.ucsc.edu http://www.soe.ucsc.edu/~mantey/ / t / Office: Engr.

More information

Final Exam. Route Computation: One reason why link state routing is preferable to distance vector style routing.

Final Exam. Route Computation: One reason why link state routing is preferable to distance vector style routing. UCSD CSE CS 123 Final Exam Computer Networks Directions: Write your name on the exam. Write something for every question. You will get some points if you attempt a solution but nothing for a blank sheet

More information

Midterm Exam CMPSCI 453: Computer Networks Fall 2011 Prof. Jim Kurose

Midterm Exam CMPSCI 453: Computer Networks Fall 2011 Prof. Jim Kurose Midterm Exam CMPSCI 453: Computer Networks Fall 2011 Prof. Jim Kurose Instructions: There are 4 questions on this exam. Please use two exam blue books answer questions 1, 2 in one book, and the remaining

More information

TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP)

TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP) TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) *Slides adapted from a talk given by Nitin Vaidya. Wireless Computing and Network Systems Page

More information

ECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1

ECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1 ECE 358: Computer Networks Homework #3 Chapter 5 and 6 Review Questions 1 Chapter 5: The Link Layer P26. Let's consider the operation of a learning switch in the context of a network in which 6 nodes labeled

More information

Data Link Layer(1) Principal service: Transferring data from the network layer of the source machine to the one of the destination machine

Data Link Layer(1) Principal service: Transferring data from the network layer of the source machine to the one of the destination machine Data Link Layer(1) Principal service: Transferring data from the network layer of the source machine to the one of the destination machine Virtual communication versus actual communication: Specific functions

More information

TCP in Wireless Mobile Networks

TCP in Wireless Mobile Networks TCP in Wireless Mobile Networks 1 Outline Introduction to transport layer Introduction to TCP (Internet) congestion control Congestion control in wireless networks 2 Transport Layer v.s. Network Layer

More information

EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst

EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst Data communication in reality In reality, the source and destination hosts are very seldom on the same network, for

More information

CS268 Exam Solutions. 1) End-to-End (20 pts)

CS268 Exam Solutions. 1) End-to-End (20 pts) CS268 Exam Solutions General comments: ) If you would like a re-grade, submit in email a complete explanation of why your solution should be re-graded. Quote parts of your solution if necessary. In person

More information

BCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS

BCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS BCS THE CHARTERED INSTITUTE FOR IT BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS Friday 2 nd October 2015 Morning Answer any FOUR questions out of SIX. All questions carry

More information

High-Level Data Link Control

High-Level Data Link Control High-Level Data Link Control This class of data link layer protocols includes High-level Data Link Control (HDLC), Link Access Procedure Balanced (LAPB) for X.25, Link Access Procedure for D-channel (LAPD)

More information

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software Local Area What s a LAN? A transmission system, usually private owned, very speedy and secure, covering a geographical area in the range of kilometres, comprising a shared transmission medium and a set

More information

RARP: Reverse Address Resolution Protocol

RARP: Reverse Address Resolution Protocol SFWR 4C03: Computer Networks and Computer Security January 19-22 2004 Lecturer: Kartik Krishnan Lectures 7-9 RARP: Reverse Address Resolution Protocol When a system with a local disk is bootstrapped it

More information

Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation

Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation R.Navaneethakrishnan Assistant Professor (SG) Bharathiyar College of Engineering and Technology, Karaikal, India.

More information

Ethernet. Ethernet. Network Devices

Ethernet. Ethernet. Network Devices Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking

More information

1. The subnet must prevent additional packets from entering the congested region until those already present can be processed.

1. The subnet must prevent additional packets from entering the congested region until those already present can be processed. Congestion Control When one part of the subnet (e.g. one or more routers in an area) becomes overloaded, congestion results. Because routers are receiving packets faster than they can forward them, one

More information

EKSAMEN / EXAM TTM4100 18 05 2007

EKSAMEN / EXAM TTM4100 18 05 2007 1.1 1.1.1...... 1.1.2...... 1.1.3...... 1.1.4...... 1.1.5...... 1.1.6...... 1.1.7...... 1.1.8...... 1.1.9...... 1.1.10.... 1.1.11... 1.1.16.... 1.1.12... 1.1.17.... 1.1.13... 1.1.18.... 1.1.14... 1.1.19....

More information

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs)

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs) CS6956: Wireless and Mobile Networks Lecture Notes: //05 IEEE 80. Wireless Local Area Networks (WLANs) CSMA/CD Carrier Sense Multi Access/Collision Detection detects collision and retransmits, no acknowledgement,

More information

0,2 D(0) A(1) D(1) 1,3 D(2) 0,2 D(0) A(1) D(1) 1,3 D(2) D(3) D(3) D(1) D(1) A(4) D(2) 4,6 D(3) A(4) 4,6 GO BACK 3 SELECTIVE REJECT WINDOW SLIDES

0,2 D(0) A(1) D(1) 1,3 D(2) 0,2 D(0) A(1) D(1) 1,3 D(2) D(3) D(3) D(1) D(1) A(4) D(2) 4,6 D(3) A(4) 4,6 GO BACK 3 SELECTIVE REJECT WINDOW SLIDES WASHINGTON UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE CS423 Computer Communications: More Error Recovery Fall 1995 This is the fourth of probably 7 lectures on the Data Link Layer. In the last lecture we

More information

TCP and Wireless Networks Classical Approaches Optimizations TCP for 2.5G/3G Systems. Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme

TCP and Wireless Networks Classical Approaches Optimizations TCP for 2.5G/3G Systems. Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme Chapter 2 Technical Basics: Layer 1 Methods for Medium Access: Layer 2 Chapter 3 Wireless Networks: Bluetooth, WLAN, WirelessMAN, WirelessWAN Mobile Networks: GSM, GPRS, UMTS Chapter 4 Mobility on the

More information

Simulation-Based Comparisons of Solutions for TCP Packet Reordering in Wireless Network

Simulation-Based Comparisons of Solutions for TCP Packet Reordering in Wireless Network Simulation-Based Comparisons of Solutions for TCP Packet Reordering in Wireless Network 作 者 :Daiqin Yang, Ka-Cheong Leung, and Victor O. K. Li 出 處 :Wireless Communications and Networking Conference, 2007.WCNC

More information

Final for ECE374 05/06/13 Solution!!

Final for ECE374 05/06/13 Solution!! 1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -

More information

Networking Test 4 Study Guide

Networking Test 4 Study Guide Networking Test 4 Study Guide True/False Indicate whether the statement is true or false. 1. IPX/SPX is considered the protocol suite of the Internet, and it is the most widely used protocol suite in LANs.

More information

Data Communications & Networks. Session 6 Main Theme Reliable Data Transfer. Dr. Jean-Claude Franchitti

Data Communications & Networks. Session 6 Main Theme Reliable Data Transfer. Dr. Jean-Claude Franchitti Data Communications & Networks Session 6 Main Theme Reliable Data Transfer Dr. Jean-Claude Franchitti New York University Computer Science Department Courant Institute of Mathematical Sciences Adapted

More information

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages

More information

Lecture Objectives. Lecture 07 Mobile Networks: TCP in Wireless Networks. Agenda. TCP Flow Control. Flow Control Can Limit Throughput (1)

Lecture Objectives. Lecture 07 Mobile Networks: TCP in Wireless Networks. Agenda. TCP Flow Control. Flow Control Can Limit Throughput (1) Lecture Objectives Wireless and Mobile Systems Design Lecture 07 Mobile Networks: TCP in Wireless Networks Describe TCP s flow control mechanism Describe operation of TCP Reno and TCP Vegas, including

More information

Data Link Layer Overview

Data Link Layer Overview Data Link Layer Overview Date link layer deals with two basic issues: Part I How data frames can be reliably transmitted, and Part II How a shared communication medium can be accessed In many networks,

More information

3.4 SLIDING WINDOW PROTOCOLS

3.4 SLIDING WINDOW PROTOCOLS SEC. 3.3 SLIDING WINDOW PROTOCOLS 211 3.4 SLIDING WINDOW PROTOCOLS In the previous protocols, data frames were transmitted in one direction only. In most practical situations, there is a need for transmitting

More information

Names & Addresses. Names & Addresses. Hop-by-Hop Packet Forwarding. Longest-Prefix-Match Forwarding. Longest-Prefix-Match Forwarding

Names & Addresses. Names & Addresses. Hop-by-Hop Packet Forwarding. Longest-Prefix-Match Forwarding. Longest-Prefix-Match Forwarding Names & Addresses EE 122: IP Forwarding and Transport Protocols Scott Shenker http://inst.eecs.berkeley.edu/~ee122/ (Materials with thanks to Vern Paxson, Jennifer Rexford, and colleagues at UC Berkeley)

More information

Ring Local Area Network. Ring LANs

Ring Local Area Network. Ring LANs Ring Local Area Network Ring interface (1-bit buffer) Ring interface To station From station Ring LANs The ring is a series of bit repeaters, each connected by a unidirectional transmission link All arriving

More information

CSMA/CA. Information Networks p. 1

CSMA/CA. Information Networks p. 1 Information Networks p. 1 CSMA/CA IEEE 802.11 standard for WLAN defines a distributed coordination function (DCF) for sharing access to the medium based on the CSMA/CA protocol Collision detection is not

More information

CPS221 Lecture: Layered Network Architecture

CPS221 Lecture: Layered Network Architecture CPS221 Lecture: Layered Network Architecture Objectives last revised 9/10/12 1. To discuss the OSI layered architecture model 2. To discuss the specific implementation of this model in TCP/IP Materials:

More information

Computer Networks UDP and TCP

Computer Networks UDP and TCP Computer Networks UDP and TCP Saad Mneimneh Computer Science Hunter College of CUNY New York I m a system programmer specializing in TCP/IP communication protocol on UNIX systems. How can I explain a thing

More information

Indian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology

Indian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology Indian Institute of Technology Kharagpur TCP/IP Part I Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology Kharagpur Lecture 3: TCP/IP Part I On completion, the student

More information

Outline. CSc 466/566. Computer Security. 18 : Network Security Introduction. Network Topology. Network Topology. Christian Collberg

Outline. CSc 466/566. Computer Security. 18 : Network Security Introduction. Network Topology. Network Topology. Christian Collberg Outline Network Topology CSc 466/566 Computer Security 18 : Network Security Introduction Version: 2012/05/03 13:59:29 Department of Computer Science University of Arizona collberg@gmail.com Copyright

More information

Introduction to Metropolitan Area Networks and Wide Area Networks

Introduction to Metropolitan Area Networks and Wide Area Networks Introduction to Metropolitan Area Networks and Wide Area Networks Chapter 9 Learning Objectives After reading this chapter, you should be able to: Distinguish local area networks, metropolitan area networks,

More information

First Midterm for ECE374 03/09/12 Solution!!

First Midterm for ECE374 03/09/12 Solution!! 1 First Midterm for ECE374 03/09/12 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam

More information

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks LANs Local Area Networks via the Media Access Control (MAC) SubLayer 1 Local Area Networks Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring 2 Network Layer

More information

Mobile Computing/ Mobile Networks

Mobile Computing/ Mobile Networks Mobile Computing/ Mobile Networks TCP in Mobile Networks Prof. Chansu Yu Contents Physical layer issues Communication frequency Signal propagation Modulation and Demodulation Channel access issues Multiple

More information

Lecture 15. IP address space managed by Internet Assigned Numbers Authority (IANA)

Lecture 15. IP address space managed by Internet Assigned Numbers Authority (IANA) Lecture 15 IP Address Each host and router on the Internet has an IP address, which consist of a combination of network number and host number. The combination is unique; no two machines have the same

More information

Asynchronous Transfer Mode: ATM. ATM architecture. ATM: network or link layer? ATM Adaptation Layer (AAL)

Asynchronous Transfer Mode: ATM. ATM architecture. ATM: network or link layer? ATM Adaptation Layer (AAL) Asynchrous Transfer Mode: architecture 1980s/1990 s standard for high-speed (155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture Goal: integrated, end-end transport

More information

Protocol Data Units and Encapsulation

Protocol Data Units and Encapsulation Chapter 2: Communicating over the 51 Protocol Units and Encapsulation For application data to travel uncorrupted from one host to another, header (or control data), which contains control and addressing

More information

Network Layer: Network Layer and IP Protocol

Network Layer: Network Layer and IP Protocol 1 Network Layer: Network Layer and IP Protocol Required reading: Garcia 7.3.3, 8.1, 8.2.1 CSE 3213, Winter 2010 Instructor: N. Vlajic 2 1. Introduction 2. Router Architecture 3. Network Layer Protocols

More information

Network-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2

Network-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2 Network-Oriented Software Development Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2 Topics Layering TCP/IP Layering Internet addresses and port numbers Encapsulation

More information

IP - The Internet Protocol

IP - The Internet Protocol Orientation IP - The Internet Protocol IP (Internet Protocol) is a Network Layer Protocol. IP s current version is Version 4 (IPv4). It is specified in RFC 891. TCP UDP Transport Layer ICMP IP IGMP Network

More information

The OSI model has seven layers. The principles that were applied to arrive at the seven layers can be briefly summarized as follows:

The OSI model has seven layers. The principles that were applied to arrive at the seven layers can be briefly summarized as follows: 1.4 Reference Models Now that we have discussed layered networks in the abstract, it is time to look at some examples. In the next two sections we will discuss two important network architectures, the

More information

IP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP

IP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP CSCE 515: Computer Network Programming TCP/IP IP Network Layer Wenyuan Xu Department of Computer Science and Engineering University of South Carolina IP Datagrams IP is the network layer packet delivery

More information

ICOM 5026-090: Computer Networks Chapter 6: The Transport Layer. By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 UPRM

ICOM 5026-090: Computer Networks Chapter 6: The Transport Layer. By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 UPRM ICOM 5026-090: Computer Networks Chapter 6: The Transport Layer By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 Outline The transport service Elements of transport protocols A

More information

Based on Computer Networking, 4 th Edition by Kurose and Ross

Based on Computer Networking, 4 th Edition by Kurose and Ross Computer Networks Ethernet Hubs and Switches Based on Computer Networking, 4 th Edition by Kurose and Ross Ethernet dominant wired LAN technology: cheap $20 for NIC first widely used LAN technology Simpler,

More information

A study of Skype over IEEE 802.16 networks: voice quality and bandwidth usage

A study of Skype over IEEE 802.16 networks: voice quality and bandwidth usage Iowa State University Digital Repository @ Iowa State University Graduate Theses and Dissertations Graduate College 2011 A study of Skype over IEEE 802.16 networks: voice quality and bandwidth usage Kuan-yu

More information

Improving Throughput Performance of the IEEE 802.11 MAC Layer Using Congestion Control Methods

Improving Throughput Performance of the IEEE 802.11 MAC Layer Using Congestion Control Methods Improving Throughput Performance of the IEEE 802.11 MAC Layer Using Congestion Control Methods Song Ci CS Department University of Michigan-Flint Flint, MI48502 cisong@umich.edu Guevara Noubir College

More information

[Prof. Rupesh G Vaishnav] Page 1

[Prof. Rupesh G Vaishnav] Page 1 Basics The function of transport layer is to provide a reliable end-to-end communications service. It also provides data transfer service for the user layers above and shield the upper layers from the

More information

Lecture 15: Congestion Control. CSE 123: Computer Networks Stefan Savage

Lecture 15: Congestion Control. CSE 123: Computer Networks Stefan Savage Lecture 15: Congestion Control CSE 123: Computer Networks Stefan Savage Overview Yesterday: TCP & UDP overview Connection setup Flow control: resource exhaustion at end node Today: Congestion control Resource

More information

Lecture Computer Networks

Lecture Computer Networks Prof. Dr. H. P. Großmann mit M. Rabel sowie H. Hutschenreiter und T. Nau Sommersemester 2012 Institut für Organisation und Management von Informationssystemen Thomas Nau, kiz Lecture Computer Networks

More information

What is CSG150 about? Fundamentals of Computer Networking. Course Outline. Lecture 1 Outline. Guevara Noubir noubir@ccs.neu.

What is CSG150 about? Fundamentals of Computer Networking. Course Outline. Lecture 1 Outline. Guevara Noubir noubir@ccs.neu. What is CSG150 about? Fundamentals of Computer Networking Guevara Noubir noubir@ccs.neu.edu CSG150 Understand the basic principles of networking: Description of existing networks, and networking mechanisms

More information

Applied Data Communication Lecture 14

Applied Data Communication Lecture 14 Applied Data Communication Lecture 14 Character oriented Data Link Character-oriented data link control Asynchronous Synchronous Kristjan Sillmann reaalajasüsteemide õppetool TTÜ automaatikainstituut character-oriented

More information

Communication Systems Internetworking (Bridges & Co)

Communication Systems Internetworking (Bridges & Co) Communication Systems Internetworking (Bridges & Co) Prof. Dr.-Ing. Lars Wolf TU Braunschweig Institut für Betriebssysteme und Rechnerverbund Mühlenpfordtstraße 23, 38106 Braunschweig, Germany Email: wolf@ibr.cs.tu-bs.de

More information

Module 1. Introduction. Version 2 CSE IIT, Kharagpur

Module 1. Introduction. Version 2 CSE IIT, Kharagpur Module 1 Introduction Lesson 2 Layered Network Architecture Specific Functional Objectives On Completion of this lesson, the students will be able to: State the requirement for layered approach Explain

More information

TCP over Wireless Networks

TCP over Wireless Networks TCP over Wireless Networks Raj Jain Professor of Computer Science and Engineering Washington University in Saint Louis Saint Louis, MO 63130 Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse574-10/

More information

Objectives of Lecture. Network Architecture. Protocols. Contents

Objectives of Lecture. Network Architecture. Protocols. Contents Objectives of Lecture Network Architecture Show how network architecture can be understood using a layered approach. Introduce the OSI seven layer reference model. Introduce the concepts of internetworking

More information

Mobile Communications Chapter 9: Mobile Transport Layer

Mobile Communications Chapter 9: Mobile Transport Layer Mobile Communications Chapter 9: Mobile Transport Layer Motivation TCP-mechanisms Classical approaches Indirect TCP Snooping TCP Mobile TCP PEPs in general Additional optimizations Fast retransmit/recovery

More information

Performance Analysis of the IEEE 802.11 Wireless LAN Standard 1

Performance Analysis of the IEEE 802.11 Wireless LAN Standard 1 Performance Analysis of the IEEE. Wireless LAN Standard C. Sweet Performance Analysis of the IEEE. Wireless LAN Standard Craig Sweet and Deepinder Sidhu Maryland Center for Telecommunications Research

More information

Protocols and Architecture. Protocol Architecture.

Protocols and Architecture. Protocol Architecture. Protocols and Architecture Protocol Architecture. Layered structure of hardware and software to support exchange of data between systems/distributed applications Set of rules for transmission of data between

More information

Level 2 Routing: LAN Bridges and Switches

Level 2 Routing: LAN Bridges and Switches Level 2 Routing: LAN Bridges and Switches Norman Matloff University of California at Davis c 2001, N. Matloff September 6, 2001 1 Overview In a large LAN with consistently heavy traffic, it may make sense

More information

Visualizations and Correlations in Troubleshooting

Visualizations and Correlations in Troubleshooting Visualizations and Correlations in Troubleshooting Kevin Burns Comcast kevin_burns@cable.comcast.com 1 Comcast Technology Groups Cable CMTS, Modem, Edge Services Backbone Transport, Routing Converged Regional

More information

Outline. TCP connection setup/data transfer. 15-441 Computer Networking. TCP Reliability. Congestion sources and collapse. Congestion control basics

Outline. TCP connection setup/data transfer. 15-441 Computer Networking. TCP Reliability. Congestion sources and collapse. Congestion control basics Outline 15-441 Computer Networking Lecture 8 TCP & Congestion Control TCP connection setup/data transfer TCP Reliability Congestion sources and collapse Congestion control basics Lecture 8: 09-23-2002

More information

TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL

TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL 1. Local Area Networks TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL These are networks spanning relatively short distances (e.g. within one building) for local point-to-point and point-to-multipoint

More information

Lab Exercise 802.11. Objective. Requirements. Step 1: Fetch a Trace

Lab Exercise 802.11. Objective. Requirements. Step 1: Fetch a Trace Lab Exercise 802.11 Objective To explore the physical layer, link layer, and management functions of 802.11. It is widely used to wireless connect mobile devices to the Internet, and covered in 4.4 of

More information

How To Understand The Internet From A Telephone To A Computer (For A Computer)

How To Understand The Internet From A Telephone To A Computer (For A Computer) Basic Concepts In Computer Networking Antonio Carzaniga Faculty of Informatics University of Lugano September 19, 2014 Goal of this Lecture Understand what packet switching is Understand what circuit switching

More information

The Problem with TCP. Overcoming TCP s Drawbacks

The Problem with TCP. Overcoming TCP s Drawbacks White Paper on managed file transfers How to Optimize File Transfers Increase file transfer speeds in poor performing networks FileCatalyst Page 1 of 6 Introduction With the proliferation of the Internet,

More information

Technical Support Information Belkin internal use only

Technical Support Information Belkin internal use only The fundamentals of TCP/IP networking TCP/IP (Transmission Control Protocol / Internet Protocols) is a set of networking protocols that is used for communication on the Internet and on many other networks.

More information

Internet Working 5 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004

Internet Working 5 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004 5 th lecture Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004 1 43 Last lecture Lecture room hopefully all got the message lecture on tuesday and thursday same

More information

COMP 3331/9331: Computer Networks and Applications. Lab Exercise 3: TCP and UDP (Solutions)

COMP 3331/9331: Computer Networks and Applications. Lab Exercise 3: TCP and UDP (Solutions) COMP 3331/9331: Computer Networks and Applications Lab Exercise 3: TCP and UDP (Solutions) AIM To investigate the behaviour of TCP and UDP in greater detail. EXPERIMENT 1: Understanding TCP Basics Tools

More information

An enhanced TCP mechanism Fast-TCP in IP networks with wireless links

An enhanced TCP mechanism Fast-TCP in IP networks with wireless links Wireless Networks 6 (2000) 375 379 375 An enhanced TCP mechanism Fast-TCP in IP networks with wireless links Jian Ma a, Jussi Ruutu b and Jing Wu c a Nokia China R&D Center, No. 10, He Ping Li Dong Jie,

More information

EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science

EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science Examination Computer Networks (2IC15) on Monday, June 22 nd 2009, 9.00h-12.00h. First read the entire examination. There

More information

How do I get to www.randomsite.com?

How do I get to www.randomsite.com? Networking Primer* *caveat: this is just a brief and incomplete introduction to networking to help students without a networking background learn Network Security. How do I get to www.randomsite.com? Local

More information

Access Control: Firewalls (1)

Access Control: Firewalls (1) Access Control: Firewalls (1) World is divided in good and bad guys ---> access control (security checks) at a single point of entry/exit: in medieval castles: drawbridge in corporate buildings: security/reception

More information

28 Networks and Communication Protocols

28 Networks and Communication Protocols 113 28 Networks and ommunication Protocols Trend in computer systems: personal computing. Reasons why: ost: economies of scale. lso, avoids large initial investment in timesharing system. Performance:

More information

SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005. Lecturer: Kartik Krishnan Lecture 1-3

SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005. Lecturer: Kartik Krishnan Lecture 1-3 SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005 Lecturer: Kartik Krishnan Lecture 1-3 Communications and Computer Networks The fundamental purpose of a communication network is the exchange

More information

The OSI and TCP/IP Models. Lesson 2

The OSI and TCP/IP Models. Lesson 2 The OSI and TCP/IP Models Lesson 2 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Introduction to the OSI Model Compare the layers of the OSI and TCP/IP

More information

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages

More information

1 Introduction to mobile telecommunications

1 Introduction to mobile telecommunications 1 Introduction to mobile telecommunications Mobile phones were first introduced in the early 1980s. In the succeeding years, the underlying technology has gone through three phases, known as generations.

More information

Link Layer. 5.6 Hubs and switches 5.7 PPP 5.8 Link Virtualization: ATM and MPLS

Link Layer. 5.6 Hubs and switches 5.7 PPP 5.8 Link Virtualization: ATM and MPLS Link Layer 5.1 Introduction and services 5.2 Error detection and correction 5.3Multiple access protocols 5.4 Link-Layer Addressing 5.5 Ethernet 5.6 Hubs and switches 5.7 PPP 5.8 Link Virtualization: and

More information

(Refer Slide Time: 02:17)

(Refer Slide Time: 02:17) Internet Technology Prof. Indranil Sengupta Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No #06 IP Subnetting and Addressing (Not audible: (00:46)) Now,

More information

Multiple Choice Questions

Multiple Choice Questions Comp18112: VoIP Examples/Revision 1 Barry 7/03/11 University of Manchester School of Computer Science COMP18112: Foundations of Distributed Computing 2011 Voice over Internet Protocol (VoIP) Questions

More information

Improved Digital Media Delivery with Telestream HyperLaunch

Improved Digital Media Delivery with Telestream HyperLaunch WHITE PAPER Improved Digital Media Delivery with Telestream THE CHALLENGE Increasingly, Internet Protocol (IP) based networks are being used to deliver digital media. Applications include delivery of news

More information

MOBILITY AND MOBILE NETWORK OPTIMIZATION

MOBILITY AND MOBILE NETWORK OPTIMIZATION MOBILITY AND MOBILE NETWORK OPTIMIZATION netmotionwireless.com Executive Summary Wireless networks exhibit uneven and unpredictable performance characteristics which, if not correctly managed, can turn

More information

Wiereless LAN 802.11

Wiereless LAN 802.11 Tomasz Kurzawa Wiereless LAN 802.11 Introduction The 802.11 Architecture Channels and Associations The 802.11 MAC Protocol The 802.11 Frame Introduction Wireless LANs are most important access networks

More information

First Semester Examinations 2011/12 INTERNET PRINCIPLES

First Semester Examinations 2011/12 INTERNET PRINCIPLES PAPER CODE NO. EXAMINER : Martin Gairing COMP211 DEPARTMENT : Computer Science Tel. No. 0151 795 4264 First Semester Examinations 2011/12 INTERNET PRINCIPLES TIME ALLOWED : Two Hours INSTRUCTIONS TO CANDIDATES

More information

Quality of Service in the Internet. QoS Parameters. Keeping the QoS. Traffic Shaping: Leaky Bucket Algorithm

Quality of Service in the Internet. QoS Parameters. Keeping the QoS. Traffic Shaping: Leaky Bucket Algorithm Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:

More information

CSE 473 Introduction to Computer Networks. Exam 2 Solutions. Your name: 10/31/2013

CSE 473 Introduction to Computer Networks. Exam 2 Solutions. Your name: 10/31/2013 CSE 473 Introduction to Computer Networks Jon Turner Exam Solutions Your name: 0/3/03. (0 points). Consider a circular DHT with 7 nodes numbered 0,,...,6, where the nodes cache key-values pairs for 60

More information

Overview of Network Hardware and Software. CS158a Chris Pollett Jan 29, 2007.

Overview of Network Hardware and Software. CS158a Chris Pollett Jan 29, 2007. Overview of Network Hardware and Software CS158a Chris Pollett Jan 29, 2007. Outline Scales of Networks Protocol Hierarchies Scales of Networks Last day, we talked about broadcast versus point-to-point

More information

LAN Switching. 15-441 Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, 802.11, PPP. Interconnecting LANs

LAN Switching. 15-441 Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, 802.11, PPP. Interconnecting LANs LAN Switching 15-441 Computer Networking Bridges/Switches, 802.11, PPP Extend reach of a single shared medium Connect two or more segments by copying data frames between them Switches only copy data when

More information

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III CS: 647 Advanced Topics in Wireless Networks Drs. Baruch Awerbuch & Amitabh Mishra Department of Computer Science Johns Hopkins

More information