# Random Access Protocols

Size: px
Start display at page:

Transcription

1 Lecture Today slotted vs unslotted ALOHA Carrier sensing multiple access Ethernet DataLink Layer 1 Random Access Protocols When node has packet to send transmit at full channel data rate R. no a priori coordination among nodes two or more transmitting nodes collision, random access MAC protocol specifies: how to detect collisions how to recover from collisions (e.g., via delayed retransmissions) Examples of random access MAC protocols: slotted ALOHA ALOHA CSMA, CSMA/CD, CSMA/CA DataLink Layer 2 1

2 Slotted ALOHA Assumptions all frames same size time is divided into equal size slots, time to transmit 1 frame nodes start to transmit frames only at beginning of slots nodes are synchronized if 2 or more nodes transmit in slot, all nodes detect collision Operation when node obtains fresh frame, it transmits in next slot no collision, node can send new frame in next slot if collision, node retransmits frame in each subsequent slot with prob. p until success DataLink Layer 3 Slotted ALOHA Pros single active node can continuously transmit at full rate of channel highly decentralized: only slots in nodes need to be in sync simple Cons collisions, wasting slots idle slots nodes may be able to detect collision in less than time to transmit packet DataLink Layer 4 2

3 Slotted Aloha efficiency Efficiency is the long-run fraction of successful slots when there are many nodes, each with many frames to send N nodes with many frames to send, each transmits in slot with probability q (new arrival or re-tx) prob that node 1 has success in a slot = q(1-q) N-1 Total expected utilization = Nq(1-q) N-1 For max efficiency with N nodes, find q* that maximizes Nq(1-q) N-1 For many nodes, take limit of Nq*(1-q*) N-1 as N goes to infinity, gives 1/e =.37 At best: channel used for useful transmissions 37% of time! DataLink Layer 5 Pure (unslotted) ALOHA unslotted Aloha: simpler, no synchronization when frame first arrives transmit immediately collision probability increases: frame sent at t 0 collides with other frames sent in [t 0-1,t 0 +1] DataLink Layer 6 3

4 Pure Aloha efficiency P(success by given node) = P(node transmits at to). P(no other node transmits in [t 0-1,t 0 ]). P(no other node transmits in [t 0,t 0 +1]) = q. (1-q) N-1. (1-q) N-1 = q. (1-q) 2(N-1) choosing optimum q and then letting N -> infty... Even worse! = 1/(2e) =.18 DataLink Layer 7 CSMA (Carrier Sense Multiple Access) CSMA: listen before transmit: If channel sensed idle: transmit entire frame If channel sensed busy, defer transmission Human analogy: don t interrupt others! Do we then get effective channel partitioning, with no collisions possible? DataLink Layer 8 4

5 CSMA collisions spatial layout of nodes collisions can still occur: propagation delay means two nodes may not hear each other s transmission collision: entire packet transmission time wasted note: role of propagation delay in determining collision probability DataLink Layer 9 CSMA Efficiency Key parameters: Propagation delay (in seconds): t prop packet transmission time t trans Efficiency depends only on t prop /t tran, and decreases with this parameter. DataLink Layer 10 5

6 CSMA Efficiency Decreases with t prop /t trans Decreases with increasing distance between nodes. t_{trans} = R/L, where R is the link speed in bits/s and L is the frame length in bits. So efficiency decreases with increasing link speed R. DataLink Layer 11 CSMA/CD (Collision Detection) CSMA/CD: carrier sensing, deferral as in CSMA collisions detected within short time colliding transmissions aborted, reducing channel wastage collision detection: easy in wired LANs: measure signal strengths, compare transmitted, received signals difficult in wireless LANs: receiver shut off while transmitting human analogy: the polite conversationalist DataLink Layer 12 6

7 CSMA/CD collision detection DataLink Layer 13 Ethernet dominant wired LAN technology: cheap \$20 for 100Mbs! first widely used LAN technology Simpler, cheaper than token LANs and ATM Kept up with speed race: 10 Mbps 10 Gbps Metcalfe s Ethernet sketch DataLink Layer 14 7

8 Star topology Bus topology popular through mid 90s Now star topology prevails hub DataLink Layer 15 Unreliable, connectionless service Connectionless: No handshaking between sending and receiving adapter. Unreliable: receiving adapter doesn t send acks or nacks to sending adapter stream of datagrams passed to network layer can have gaps gaps will be filled if app is using TCP otherwise, app will see the gaps DataLink Layer 16 8

### Based on Computer Networking, 4 th Edition by Kurose and Ross

Computer Networks Ethernet Hubs and Switches Based on Computer Networking, 4 th Edition by Kurose and Ross Ethernet dominant wired LAN technology: cheap \$20 for NIC first widely used LAN technology Simpler,

### EECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers

EECS 122: Introduction to Computer Networks Multiaccess Protocols Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley Berkeley, CA 94720-1776

### Lecture 7 Multiple Access Protocols and Wireless

Lecture 7 Multiple Access Protocols and Wireless Networks and Security Jacob Aae Mikkelsen IMADA November 11, 2013 November 11, 2013 1 / 57 Lecture 6 Review What is the responsibility of the link layer?

### Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

Ethernet dominant LAN technology: cheap -- \$20 for 100Mbs! first widely used LAN technology Simpler, cheaper than token rings and ATM Kept up with speed race: 10, 100, 1000 Mbps Metcalfe s Etheret sketch

### Ethernet, VLAN, Ethernet Carrier Grade

Ethernet, VLAN, Ethernet Carrier Grade Dr. Rami Langar LIP6/PHARE UPMC - University of Paris 6 Rami.langar@lip6.fr www-phare.lip6.fr/~langar RTEL 1 Point-to-Point vs. Broadcast Media Point-to-point PPP

### LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

LANs Local Area Networks via the Media Access Control (MAC) SubLayer 1 Local Area Networks Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring 2 Network Layer

### Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

Local Area What s a LAN? A transmission system, usually private owned, very speedy and secure, covering a geographical area in the range of kilometres, comprising a shared transmission medium and a set

### CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006

CSE331: Introduction to Networks and Security Lecture 6 Fall 2006 Open Systems Interconnection (OSI) End Host Application Reference model not actual implementation. Transmits messages (e.g. FTP or HTTP)

### TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL

1. Local Area Networks TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL These are networks spanning relatively short distances (e.g. within one building) for local point-to-point and point-to-multipoint

### CSE 123A Computer Networks

CSE 123A Computer Networks Winter 2005 Lecture 5: Data-Link II: Media Access Some portions courtesy Srini Seshan or David Wetherall Last Time Framing: How to translate a bitstream into separate packets

### CS263: Wireless Communications and Sensor Networks

CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 4: Medium Access Control October 5, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Medium Access Control Schemes: FDMA TDMA

Real-Time (Paradigms) (51) 5. Real-Time Communication Data flow (communication) in embedded systems : Sensor --> Controller Controller --> Actor Controller --> Display Controller Controller Major

### CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012

CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012 Important: The solutions to the homework problems from the course book have been provided by the authors.

### Performance Evaluation of Wired and Wireless Local Area Networks

International Journal of Engineering Research and Development ISSN: 2278-067X, Volume 1, Issue 11 (July 2012), PP.43-48 www.ijerd.com Performance Evaluation of Wired and Wireless Local Area Networks Prof.

### CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs)

CS6956: Wireless and Mobile Networks Lecture Notes: //05 IEEE 80. Wireless Local Area Networks (WLANs) CSMA/CD Carrier Sense Multi Access/Collision Detection detects collision and retransmits, no acknowledgement,

### Lecture 17: 802.11 Wireless Networking"

Lecture 17: 802.11 Wireless Networking" CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Lili Qiu, Nitin Vaidya Lecture 17 Overview" Project discussion Intro to 802.11 WiFi Jigsaw discussion

### Operating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師

Lecture 7: Distributed Operating Systems A Distributed System 7.2 Resource sharing Motivation sharing and printing files at remote sites processing information in a distributed database using remote specialized

### Collision of wireless signals. The MAC layer in wireless networks. Wireless MAC protocols classification. Evolutionary perspective of distributed MAC

The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?

### CSMA/CA. Information Networks p. 1

Information Networks p. 1 CSMA/CA IEEE 802.11 standard for WLAN defines a distributed coordination function (DCF) for sharing access to the medium based on the CSMA/CA protocol Collision detection is not

### Unit of Learning # 2 The Physical Layer. Sergio Guíñez Molinos sguinez@utalca.cl 2-2009

Unit of Learning # 2 The Physical Layer Sergio Guíñez Molinos sguinez@utalca.cl 2-2009 Local Area Network (LAN) Redes de Computadores 2 Historic topologies more used in LAN Ethernet Logical Bus and Physical

### How To Make A Multi-User Communication Efficient

Multiple Access Techniques PROF. MICHAEL TSAI 2011/12/8 Multiple Access Scheme Allow many users to share simultaneously a finite amount of radio spectrum Need to be done without severe degradation of the

### Controlled Random Access Methods

Helsinki University of Technology S-72.333 Postgraduate Seminar on Radio Communications Controlled Random Access Methods Er Liu liuer@cc.hut.fi Communications Laboratory 09.03.2004 Content of Presentation

### EPL 657 Wireless Networks

EPL 657 Wireless Networks Some fundamentals: Multiplexing / Multiple Access / Duplex Infrastructure vs Infrastructureless Panayiotis Kolios Recall: The big picture... Modulations: some basics 2 Multiplexing

### Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III CS: 647 Advanced Topics in Wireless Networks Drs. Baruch Awerbuch & Amitabh Mishra Department of Computer Science Johns Hopkins

### Chapter 4. Medium Access Control. IN2P3 Octobre 2002 Jean-Pierre Thomesse

Chapter 4 Medium Access Control 1 Introduction Objectives To manage the access to the medium or channel To take into account the time constraints To schedule the traffics Different solutions History Different

### Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit

### Module 15: Network Structures

Module 15: Network Structures Background Topology Network Types Communication Communication Protocol Robustness Design Strategies 15.1 A Distributed System 15.2 Motivation Resource sharing sharing and

### EXAMPLES AND PROBLEMS. Competence Based Education Internet Protocols

EXAMPLES AND PROBLEMS Competence Based Education Internet Protocols Example 1 In following figure frames are generated at node A and sent to node C through node B. Determine the minimum transmission rate

### ECE 428 Computer Networks and Security

ECE 428 Computer Networks and Security 1 Instructor: Sagar Naik About the Instructor Office: EIT 4174, ECE Dept. Other courses that I teach ECE 355: Software Engineering ECE 453/CS 447/ SE 465: Software

### Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.

### Overview of Network Hardware and Software. CS158a Chris Pollett Jan 29, 2007.

Overview of Network Hardware and Software CS158a Chris Pollett Jan 29, 2007. Outline Scales of Networks Protocol Hierarchies Scales of Networks Last day, we talked about broadcast versus point-to-point

### Chapter 14: Distributed Operating Systems

Chapter 14: Distributed Operating Systems Chapter 14: Distributed Operating Systems Motivation Types of Distributed Operating Systems Network Structure Network Topology Communication Structure Communication

### RETI DI TELECOMUNICAZIONI

Accademia Navale Armi Navali LAUREA in INGEGNERIA DELLE TELECOMUNICAZIONI RETI DI TELECOMUNICAZIONI Stefano Giordano Lezione n.18n Ethernet Gruppo di Ricerca in Reti di Telecomunicazioni Dipartimento di

### ECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1

ECE 358: Computer Networks Homework #3 Chapter 5 and 6 Review Questions 1 Chapter 5: The Link Layer P26. Let's consider the operation of a learning switch in the context of a network in which 6 nodes labeled

### Data Link Layer. Page 1. Ethernet

Sicherungsebene Network Categories Local Area Networks (LAN): 10m - few km, simple connection structure Ethernet/Fast Ethernet/Gigabit Ethernet Token Bus, Token Ring LAN Wireless LAN (WLAN, up to a few

### Chapter 16: Distributed Operating Systems

Module 16: Distributed ib System Structure, Silberschatz, Galvin and Gagne 2009 Chapter 16: Distributed Operating Systems Motivation Types of Network-Based Operating Systems Network Structure Network Topology

### Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks

Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks 1 Mr. Praveen S Patil, 2 Mr. Rabinarayan Panda, 3 Mr. Sunil Kumar R D 1,2,3 Asst. Professor, Department of MCA, The Oxford College of Engineering,

### a. CSMA/CD is a random-access protocol. b. Polling is a controlled-access protocol. c. TDMA is a channelization protocol.

CHAPTER 12 PRACTICE SET Questions Q12-1. The answer is CSM/CD. a. CSMA/CD is a random-access protocol. b. Polling is a controlled-access protocol. c. TDMA is a channelization protocol. Q12-3. The answer

### ECE 333: Introduction to Communication Networks Fall 2002

ECE 333: Introduction to Communication Networks Fall 2002 Lecture 14: Medium Access Control II Dynamic Channel Allocation Pure Aloha In the last lecture we began discussing medium access control protocols

### Local Area Networks. Guest Instructor Elaine Wong. Elaine_06_I-1

Local Area Networks Guest Instructor Elaine Wong Elaine_06_I-1 Outline Introduction to Local Area Networks (LANs) Network architecture Geographical area LAN applications LAN Technologies Ethernet Fiber

### Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring 2011. Mike Freedman

1 Wireless Networks Reading: Sec5on 2.8 COS 461: Computer Networks Spring 2011 Mike Freedman hep://www.cs.princeton.edu/courses/archive/spring11/cos461/ 2 Widespread Deployment Worldwide cellular subscribers

### LAN Switching. 15-441 Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, 802.11, PPP. Interconnecting LANs

LAN Switching 15-441 Computer Networking Bridges/Switches, 802.11, PPP Extend reach of a single shared medium Connect two or more segments by copying data frames between them Switches only copy data when

### 51-30-21 Selecting a Web Server Connection Rate Gilbert Held

51-30-21 Selecting a Web Server Connection Rate Gilbert Held Payoff Determining the best operating rate for a WAN connection to the Internet is a common problem for organizations wishing to obtain a presence

### Frame Burst Adjusting for Transmitting Video Conference in Gigabit Ethernet

Frame Burst Adjusting for Transmitting Video Conference in Gigabit Ethernet Han-Chieh Chao and Yao-Chung Chang Institute of Electrical Engineering National Dong Hwa University Hualien, Taiwan E-mail: hcc@cc.ndhu.edu.tw

### Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh

Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh, Ph.D. benveniste@ieee.org Mesh 2008, Cap Esterel, France 1 Abstract Abundant hidden node collisions and correlated channel access

### MAC Algorithms in Wireless Networks

Department of Computing Science Master Thesis MAC Algorithms in Wireless Networks Applications, Issues and Comparisons Shoaib Tariq Supervisor: Dr. Jerry Eriksson Examiner: Dr. Per Lindström Dedicated

### 1. The subnet must prevent additional packets from entering the congested region until those already present can be processed.

Congestion Control When one part of the subnet (e.g. one or more routers in an area) becomes overloaded, congestion results. Because routers are receiving packets faster than they can forward them, one

### IT4405 Computer Networks (Compulsory)

IT4405 Computer Networks (Compulsory) INTRODUCTION This course provides a comprehensive insight into the fundamental concepts in data communications, computer network systems and protocols both fixed and

### Architecture and Performance of the Internet

SC250 Computer Networking I Architecture and Performance of the Internet Prof. Matthias Grossglauser School of Computer and Communication Sciences EPFL http://lcawww.epfl.ch 1 Today's Objectives Understanding

### Wiereless LAN 802.11

Tomasz Kurzawa Wiereless LAN 802.11 Introduction The 802.11 Architecture Channels and Associations The 802.11 MAC Protocol The 802.11 Frame Introduction Wireless LANs are most important access networks

### DATA COMMUNICATION AND NETWORKS

DATA COMMUNICATION AND NETWORKS 1. Define the term Computer Networks. A Computer network is a number if computers interconnected by one or more transmission paths. The transmission path often is the telephone

### 1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network

Review questions 1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network B Local area network C Client/server

### Agenda. Distributed System Structures. Why Distributed Systems? Motivation

Agenda Distributed System Structures CSCI 444/544 Operating Systems Fall 2008 Motivation Network structure Fundamental network services Sockets and ports Client/server model Remote Procedure Call (RPC)

### RTT 60.5 msec receiver window size: 32 KB

Real-World ARQ Performance: TCP Ex.: Purdue UCSD Purdue (NSL): web server UCSD: web client traceroute to planetlab3.ucsd.edu (132.239.17.226), 30 hops max, 40 byte packets 1 switch-lwsn2133-z1r11 (128.10.27.250)

### Data Link Protocols. TCP/IP Suite and OSI Reference Model

Data Link Protocols Relates to Lab. This module covers data link layer issues, such as local area networks (LANs) and point-to-point links, Ethernet, and the Point-to-Point Protocol (PPP). 1 TCP/IP Suite

### Answer: that dprop equals dtrans. seconds. a) d prop. b) d trans

Chapter 1 1) p. 98: P-6 This elementary problem begins to explore propagation delay and transmission delay, two central concepts in data networking. Consider two hosts, A and B, connected by single link

### 802.11. Markku Renfors. Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak

802.11 Markku Renfors Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak Contents 802.11 Overview & Architecture 802.11 MAC 802.11 Overview and Architecture

### Protocolo IEEE 802.15.4. Sergio Scaglia SASE 2012 - Agosto 2012

Protocolo IEEE 802.15.4 SASE 2012 - Agosto 2012 IEEE 802.15.4 standard Agenda Physical Layer for Wireless Overview MAC Layer for Wireless - Overview IEEE 802.15.4 Protocol Overview Hardware implementation

### Network Protocol Design and Evaluation

Network Protocol Design and Evaluation 08 - Analytical Evaluation Stefan Rührup Summer 2009 Overview In the last chapter: Simulation In this part: Analytical Evaluation: case studies 2 Analytical Evaluation

### PERFORMANCE ANALYSIS OF LOW RATE WIRELESS TECHNOLOGIES FOR MEDICAL APPLICATIONS. N. Golmie, D. Cypher, O. Rebala

PERFORMANCE ANALYSIS OF LOW RATE WIRELESS TECHNOLOGIES FOR MEDICAL APPLICATIONS N. Golmie, D. Cypher, O. Rebala National Institute of Standards and Technology, 100 Bureau Drive, Gaithersburg, Maryland

### Network Categories. Network Types for the Local Range. Ethernet. Carrier Sense Multiple Access

Sicherungsebene Network Categories Local Area Networks (LAN): 0m - few km, simple connection structure Ethernet/Fast Ethernet/Gigabit Ethernet Token Bus, Token Ring LAN Wireless LAN (WLAN, up to a few

### Wireless LAN Concepts

Wireless LAN Concepts Wireless LAN technology is becoming increasingly popular for a wide variety of applications. After evaluating the technology, most users are convinced of its reliability, satisfied

### Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages

### DATA COMMUNICATIONS AND NETWORKING. Solved Examples

Page 1 of 10 DATA COMMUNICATIONS AND NETWORKING Solved Examples References: STA: Stallings, Data and Computer Communications, 6 th ed. TAN: Tannenbaum, Computer Networks, 4 th ed.) 1. Given the following

### Gigabit Ethernet: Architectural Design and Issues

Gigabit Ethernet: Architectural Design and Issues Professor of Computer and Information Sciences Columbus, OH 43210 http://www.cis.ohio-state.edu/~jain/ 9-1 Overview Distance-Bandwidth Principle 10 Mbps

### CMPE 150: Introduction to Computer Networks FINAL REVIEW. Venkatesh Rajendran. Spring 2003 UCSC CMPE150 1

CMPE 150: Introduction to Computer Networks FINAL REVIEW Venkatesh Rajendran Spring 2003 UCSC CMPE150 1 Class Final Exam Final exam Three hours 40 50 questions -- comprehensive Multiple choice as the midterm

### TCP for Wireless Networks

TCP for Wireless Networks Outline Motivation TCP mechanisms Indirect TCP Snooping TCP Mobile TCP Fast retransmit/recovery Transmission freezing Selective retransmission Transaction oriented TCP Adapted

### Ring Local Area Network. Ring LANs

Ring Local Area Network Ring interface (1-bit buffer) Ring interface To station From station Ring LANs The ring is a series of bit repeaters, each connected by a unidirectional transmission link All arriving

### ISSN: 2319-5967 ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September

Analysis and Implementation of IEEE 802.11 MAC Protocol for Wireless Sensor Networks Urmila A. Patil, Smita V. Modi, Suma B.J. Associate Professor, Student, Student Abstract: Energy Consumption in Wireless

### CS 8803 - Cellular and Mobile Network Security: GSM - In Detail

CS 8803 - Cellular and Mobile Network Security: GSM - In Detail Professor Patrick Traynor 9/27/12 Cellular Telecommunications Architecture Background Air Interfaces Network Protocols Application: Messaging

### An Experimental Study of Throughput for UDP and VoIP Traffic in IEEE 802.11b Networks

An Experimental Study of Throughput for UDP and VoIP Traffic in IEEE 82.11b Networks Sachin Garg sgarg@avaya.com Avaya Labs Research Basking Ridge, NJ USA Martin Kappes mkappes@avaya.com Avaya Labs Research

### 28 Networks and Communication Protocols

113 28 Networks and ommunication Protocols Trend in computer systems: personal computing. Reasons why: ost: economies of scale. lso, avoids large initial investment in timesharing system. Performance:

### What is it all about? Some simple solutions. Multiple Access. Contexts for the multiple access problem. Outline. Contexts

Multiple Access An Engineering Approach to Computer Networking What is it all about? ider an audioconference where if one person speaks, all can hear if more than one person speaks at the same time, both

### ECE/CS 372 introduction to computer networks. Lecture 13

ECE/CS 372 introduction to computer networks Lecture 13 Announcements: HW #4 hard copy due today Lab #5 posted is due Tuesday June 4 th HW #5 posted is due Thursday June 6 th Pickup midterms Acknowledgement:

### Gigabit Ethernet. Abstract. 1. Introduction. 2. Benefits of Gigabit Ethernet

Table of Contents Abstract... 2 1. Introduction... 2 2. Benefits of Gigabit Ethernet... 2 2.1 Easy Migration to Higher Performance Levels... 3 2.2 Decreased Overall Costs Over Time... 3 2.3 Supports for

### Overview of Computer Networks

Overview of Computer Networks Client-Server Transaction Client process 4. Client processes response 1. Client sends request 3. Server sends response Server process 2. Server processes request Resource

### Network Categories. Network Types for the Local Range. Ethernet

Sicherungsebene Network Categories Chapter 2: Computer Networks 2.1: Physical Layer: representation of digital signals 2.2: Data Link Layer: error protection and access control 2.3: Network infrastructure

### Lecture 6 Types of Computer Networks and their Topologies Three important groups of computer networks: LAN, MAN, WAN

Lecture 6 Types of Computer Networks and their Topologies Three important groups of computer networks: LAN, MAN, WAN LAN (Local Area Networks) 10/28/2008 Vasile Dadarlat - Computer Networks 1 MAN (Metropolitan

### Network Topologies. Network Topologies

Network Topologies LANs and WANs - Geographical coverage LANs A single geographical location, such as office building, school, etc Typically High speed and cheaper. WANs Spans more than one geographical

### Wireless LAN Services for Hot-Spot

Wireless LAN Services for Hot-Spot Woo-Yong Choi Electronics and Telecommunications Research Institute wychoi53@etri.re.kr ETRI Contents Overview Wireless LAN Services Current IEEE 802.11 MAC Protocol

Local Area Network By Bhupendra Ratha, Lecturer School of Library and Information Science Devi Ahilya University, Indore Email: bhu261@gmail.com Local Area Network LANs connect computers and peripheral

### Network-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2

Network-Oriented Software Development Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2 Topics Layering TCP/IP Layering Internet addresses and port numbers Encapsulation

### Final for ECE374 05/06/13 Solution!!

1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -

802.11 Wireless LAN Protocol CS 571 Fall 2006 2006 Kenneth L. Calvert All rights reserved Wireless Channel Considerations Stations may move Changing propagation delays, signal strengths, etc. "Non-transitive"

### SPI I2C LIN Ethernet. u Today: Wired embedded networks. u Next lecture: CAN bus u Then: 802.15.4 wireless embedded network

u Today: Wired embedded networks Ø Characteristics and requirements Ø Some embedded LANs SPI I2C LIN Ethernet u Next lecture: CAN bus u Then: 802.15.4 wireless embedded network Network from a High End

### CSC 313 Data Communications COURSE PARTICULARS COURSE INSTRUCTORS COURSE DESCRIPTION COURSE OBJECTIVES

CSC 313 Data Communications COURSE PARTICULARS Course Code: CSC 313 Course Title: Data Communications No. of Units: 3 Course Duration: Two hours of theory per week for 15 weeks. Status: Compulsory Course

### Wireless and Mobile Networks

Wireless and Mobile Networks Reading: Sec7ons 2.8 and 4.2.5 COS 461: Computer Networks Spring 2009 (MW 1:30 2:50 in COS 105) Mike Freedman Teaching Assistants: WyaO Lloyd and Jeff Terrace hop://www.cs.princeton.edu/courses/archive/spring09/cos461/

### Computer Networks and the Internet

? Computer the IMT2431 - Data Communication and Network Security January 7, 2008 ? Teachers are Lasse Øverlier and http://www.hig.no/~erikh Lectures and Lab in A126/A115 Course webpage http://www.hig.no/imt/in/emnesider/imt2431

### Topics: The Internet Network Edge Network Core Internet Backbone Loss & Delay Internet Protocol Stack CHAPTER 1: OVERVIEW OF COMPUTER NETWORKS

Topics: The Internet Network Edge Network Core Internet Backbone Loss & Delay Internet Protocol Stack CHAPTER 1: OVERVIEW OF COMPUTER NETWORKS 1 THE INTERNET The Internet is a computer network that connects

### Dynamic Load Balance Algorithm (DLBA) for IEEE 802.11 Wireless LAN

Tamkang Journal of Science and Engineering, vol. 2, No. 1 pp. 45-52 (1999) 45 Dynamic Load Balance Algorithm () for IEEE 802.11 Wireless LAN Shiann-Tsong Sheu and Chih-Chiang Wu Department of Electrical

### TCP in Wireless Networks

Outline Lecture 10 TCP Performance and QoS in Wireless s TCP Performance in wireless networks TCP performance in asymmetric networks WAP Kurose-Ross: Chapter 3, 6.8 On-line: TCP over Wireless Systems Problems

### COMPUTER NETWORKS HANDOUTS LECTURERS # 01 45 PREPARED BY: HAMMAD KHALID KHAN. Copyright Virtual University of Pakistan

COMPUTER NETWORKS (CS610) HANDOUTS LECTURERS # 01 45 PREPARED BY: HAMMAD KHALID KHAN 1 Table of contents Lecture No. 1...4 INTRODUCTION...4 Lecture No. 2...9 Motivation and Tools...9 Lecture No. 3...13

### CS698T Wireless Networks: Principles and Practice

CS698T Wireless Networks: Principles and Practice Topic 10 IEEE 802.15.4 Bhaskaran Raman, Department of CSE, IIT Kanpur http://www.cse.iitk.ac.in/users/braman/courses/wless-spring2007/ Personal Area Networks

### CSCI 362 Computer and Network Security

The Purpose of ing CSCI 362 Computer and Security Introduction to ing Goals: Remote exchange and remote process control. A few desirable properties: Interoperability, Flexibility, Geographical range, Scalability,

### A research perspective on the adaptive protocols' architectures and system infrastructures to support QoS in wireless communication systems

Workshop on Quality of Service in Geographically Distributed Systems A research perspective on the adaptive protocols' architectures and system infrastructures to support QoS in wireless communication

### ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK Contemporary Control Systems, Inc. Understanding Ethernet Switches and Routers This extended article was based on a two-part article that was

### Module 1. Introduction. Version 2 CSE IIT, Kharagpur

Module 1 Introduction Lesson 2 Layered Network Architecture Specific Functional Objectives On Completion of this lesson, the students will be able to: State the requirement for layered approach Explain