SlideShare a Scribd company logo
Recap
                    Lecture 04:
                Networking (continue)                               Various types of Networks:LAN, WAN, MAN,
                                                                      WLAN, WMAN
                                                                    Switching Schemes: Broadcast, Circuit Switching,
                                                                    packet Switching, ATM
                                                                    Protocol, what? why?
                                                                    OSI layers and protocol
                      Distributed Systems
                                                                    Routing and RIP algorithm
                            Behzad Bordbar
   School of Computer Science, University of Birmingham, UK


                                   Lecture 04                 1                                  Lecture 04                2




                                                                                    RIP (continue)
                            Overview                              When a link fails cost in the table is set to ∞
  Routing and RIP (continue)                                      Then, the cost in all table is set to ∞ (1+∞ = ∞)
  other protocols: Transport layer protocols (UDP                 3 timers: periodic, expiration, Garbage collection
    , TCP)                                                        RIP is
  Mobile routing                                                      slow in convergence
  WLAN and its architectural issues                                   But, most of the time system stables fast
  Communication Service types:                                    RIP 2 addresses some of the above issues and
  connectionless communication (UDP)                                also Authentication and Multicasting (send
                                                                    packets to all other router.
  connection-oriented communication (TCP)
                                   Lecture 04                 3                                  Lecture 04                4




                                                                          Review of some Protocols
                 Congestion control
                                                                   IP: transfer datagram from one host to another
                                                                      - Unreliable best effort
When load on network high (80% capacity)
                                                                      - only header checksum
     packet queues long, links blocked
                                                                   TCP and UDP
Strategies to address the problem                                       main transport level protocols used by IP
     packet dropping
                                                                   MobileIP
      • reliable of delivery at higher levels
                                                                        connectivity for mobile devices, even in transit
       • Dropping some packets is better than others (MPEG)             device retains single IP address
     reduce rate of transmission                                        re-routing by Home (HA) and Foreign Agents (FA)
      • nodes send choke packets (Ethernet)                             transparent
      • transmission control (TCP)
                                                                   Wireless LAN (IEEE 802.11)
     transmit congestion information to each node
                                                                        radio or infra-red communications
      • QoS guarantees (ATM)
                                   Lecture 04                 5         CSMA/CA based          Lecture 04                  6




                                                                                                                               1
IP                                          Transport layer protocols
Internet Protocol is unreliable and connectionless
                                                                        UDP (basic, used for some IP functions)
Best effort (no error checking or Ack)                                       uses IP address+port number
Packets called Datagram have Header                                          no guarantee of delivery, optional checksum
     IP address of source and destination                                    messages up to 64KB
     Containing version, Header Length (HLEN), length (Header
     +data) …
                                                                        TCP (more sophisticated, most IP functions)
     higher level protocol ?? (info encapsulated UDP, TCP, RIP2,             data stream abstraction, reliable delivery of all data
     …)                                                                      messages divided into segments, sequence numbers
     header checksum                                                         sliding window, acknowledgement+retransmission
     Fragmentation                                                           buffering (with timeout for interactive applications)
     Timestamp (IP address of the router + Universal time)                   checksum (if no match segment dropped)
…                                                                          Both are process-to-process communication
Not all exploited by all higher level protocols
                             Lecture 04                           7                                Lecture 04                         8




        Communication service types                                              Connectionless service
    Connectionless: UDP
         ‘send and pray’ unreliable delivery                           UDP (User Datagram Protocol)
         efficient and easy to implement                                   messages possibly lost, duplicated, delivered out of order,
    Connection-oriented: TCP                                               without telling the user
         with basic reliability guarantees                                 maintains no state information, so cannot detect lost,
         less efficient, memory and time overhead for error                duplicate or out-of-order messages
         correction                                                        each message contains source and destination address
                                                                           may discard corrupted messages due to no error correction
                                                                           (simple checksum) or congestion
                                                                       Used e.g. for DNS (Domain Name System) or RIP.

                                 Lecture 04                       9                                Lecture 04                         10




                                                                                               MobileIP
        Connection-oriented service
                                                                        At home normal, when elsewhere mobile host:
   TCP (Transmission Control Protocol)                                       notifies HA before leaving
         establishes data stream connection to ensure reliable,              informs FA, who allocates temporary care-of IP address
         in-sequence delivery                                                & tells HA
         error checking and reporting to both ends
                                                                        Packets for mobile host:
         attempts to match speeds (timeouts, buffering)
                                                                             first packet routed to HA, encapsulated in MobileIP
         sliding window: state information includes
          • unacknowledged messages
                                                                             packet and sent to FA (tunnelling)
          • message sequence numbers                                         FA unpacks MobileIP packet and sends to mobile host
          • flow control information (matching the speeds)                   sender notified of the care-of address for future
                                                                             communications which can be direct via FA
   Used e.g. for HTTP, FTP, SMTP on Internet.
                                                                        Problems
                                                                             efficiency low, need to notify HA
                                 Lecture 04                       11                               Lecture 04                         12




                                                                                                                                           2
MobileIP routing                                                             Wireless LAN (802.11)
                     Sender
                                                                                              Radio broadcast (fading strength, obstruction)
                                         Subsequent IP packets
                                        tunnelled to FA                  Mobile host MH
                                                                                              Collision avoidance by
 Address of FA
returned to sender
                                                                                                   slot reservation mechanism by Request to Send (RTS)
First IP packet
                                                                                                   and Clear to Send (CTS)
addressed to MH                                                                                    stations in range pick up RTS/CTS and avoid
                                               Internet
                                                                        Foreign agent FA           transmission at the reserved times
               Home
               agent
                                              First IP packet                                      collisions less likely than Ethernet since RTS/CTS short
                                             tunnelled to FA
                                                                                                   random back off period
                                                                                              Problems
                                                                                                   security (eavesdropping), use shared-key authentication

                                           Lecture 04                                   13                               Lecture 04                       14




                                                                                                                    Summary
         Wireless LAN configuration
                                A                         B                         C
                     Laptops                                                                  Routing and RIP, various timers
     radio obstruction
                                                                                              IP
                                                                        Wireless              Transport layer protocols (UDP , TCP)
                                    D                                    LAN
                      Palmtop/
                     Mobile phone
                                                                E
                                                                                              Mobile routing
                                                                    Base station/
                                                                    access point
                                                                                              WLAN and its architectural issues
                                                                                              Communication Service types:
               Server
                                                                                                Connectionless vs. Connection-oriented
                                                                        LAN
                                                                                              Further reading: end of chapter 3 p. 130

                                           Lecture 04                                   15                               Lecture 04                       16




               Exercises (Lectures 3,4):                                                                           Exercises:
client sends a 200 byte request message to a service, which                                  3.2: The Internet is far too large for any router to hold
      produces a response ontaining 5000 bytes. Estimate the total                                routing information for all destinations. How does
      time to complete the request in each of the following cases,
      with the performance assumptions listed below:
                                                                                                  the Internet routing scheme deal with this issue?
i)    Using connection less (datagram) communication (for                                    3.6: Can we be sure that no two computers in the Internet
      example, UDP);                                                                              have the same IP addresses?
ii) Using connection-oriented communication (for example,                                    3.7: Compare connection less (UDP) and connection-
      TCP);                                                                                       oriented (TCP) communication for the
iii) The server process is in the same machine as the client.                                     implementation of each of the following application-
[Latency per packet (local or remote. incurred on both send and                                   level or presentation-level protocols:
      receive): 5 ms, Connection setup time (TCP only): 5 ms,
      Data transfer rate: 10 Mbps MTU: 1000 bytes Server request                             i) “irtual terminal access (for example, Telnet); ii)file
      processing time: 2 ms Assume that the network is lightly                                    transfer (for example, FTP); iii)ser location (for
      loaded.]                                                                                    example, rwho, finger); iv)information browsing (for
                                           Lecture 04                                   17        example, HTTP); v)remote procedure call.
                                                                                                                         Lecture 04                    18




                                                                                                                                                               3

More Related Content

What's hot

MC0087 Internal Assignment (SMU)
MC0087 Internal Assignment (SMU)MC0087 Internal Assignment (SMU)
MC0087 Internal Assignment (SMU)
Krishan Pareek
 
8The Affects of Different Queuing Algorithms within the Router on QoS VoIP a...
8The Affects of Different Queuing Algorithms  within the Router on QoS VoIP a...8The Affects of Different Queuing Algorithms  within the Router on QoS VoIP a...
8The Affects of Different Queuing Algorithms within the Router on QoS VoIP a...
IJCNC
 
Mobile transport layer - traditional TCP
Mobile transport layer - traditional TCPMobile transport layer - traditional TCP
Mobile transport layer - traditional TCP
Vishal Tandel
 
Connection( less & oriented)
Connection( less & oriented)Connection( less & oriented)
Connection( less & oriented)ymghorpade
 
C25008013
C25008013C25008013
C25008013
IJERA Editor
 
Some of the terms about Computer Networking
Some of the terms about Computer NetworkingSome of the terms about Computer Networking
Some of the terms about Computer Networking
Ruchita Tomar
 
communication system l2
communication system l2communication system l2
communication system l2MR Z
 
2 applications.key
2 applications.key2 applications.key
2 applications.key
Olivier Bonaventure
 
HIGH SPEED NETWORKS
HIGH SPEED NETWORKSHIGH SPEED NETWORKS
HIGH SPEED NETWORKS
Kathirvel Ayyaswamy
 
Data Networking Concepts
Data Networking ConceptsData Networking Concepts
Data Networking Concepts
Peter R. Egli
 
Transport layer
Transport layerTransport layer
Transport layer
reshmadayma
 
It2402 mobile communication unit 4
It2402 mobile communication unit 4It2402 mobile communication unit 4
It2402 mobile communication unit 4
RMK ENGINEERING COLLEGE, CHENNAI
 
Enhancing Downlink Performance in Wireless Networks by Simultaneous Multiple ...
Enhancing Downlink Performance in Wireless Networks by Simultaneous Multiple ...Enhancing Downlink Performance in Wireless Networks by Simultaneous Multiple ...
Enhancing Downlink Performance in Wireless Networks by Simultaneous Multiple ...
ambitlick
 
Use of NS-2 to Simulate MANET Routing Algorithms
Use of NS-2 to Simulate MANET Routing AlgorithmsUse of NS-2 to Simulate MANET Routing Algorithms
Use of NS-2 to Simulate MANET Routing AlgorithmsGiancarlo Romeo
 
High speed Networking
High speed NetworkingHigh speed Networking
High speed Networking
sdb2002
 
Computer Network Interview Questions
Computer Network Interview QuestionsComputer Network Interview Questions
Computer Network Interview Questions
Kuntal Bhowmick
 

What's hot (20)

MC0087 Internal Assignment (SMU)
MC0087 Internal Assignment (SMU)MC0087 Internal Assignment (SMU)
MC0087 Internal Assignment (SMU)
 
Lecture24
Lecture24Lecture24
Lecture24
 
Ch05
Ch05Ch05
Ch05
 
8The Affects of Different Queuing Algorithms within the Router on QoS VoIP a...
8The Affects of Different Queuing Algorithms  within the Router on QoS VoIP a...8The Affects of Different Queuing Algorithms  within the Router on QoS VoIP a...
8The Affects of Different Queuing Algorithms within the Router on QoS VoIP a...
 
Mobile transport layer - traditional TCP
Mobile transport layer - traditional TCPMobile transport layer - traditional TCP
Mobile transport layer - traditional TCP
 
Connection( less & oriented)
Connection( less & oriented)Connection( less & oriented)
Connection( less & oriented)
 
C25008013
C25008013C25008013
C25008013
 
Some of the terms about Computer Networking
Some of the terms about Computer NetworkingSome of the terms about Computer Networking
Some of the terms about Computer Networking
 
communication system l2
communication system l2communication system l2
communication system l2
 
2 applications.key
2 applications.key2 applications.key
2 applications.key
 
HIGH SPEED NETWORKS
HIGH SPEED NETWORKSHIGH SPEED NETWORKS
HIGH SPEED NETWORKS
 
Data Networking Concepts
Data Networking ConceptsData Networking Concepts
Data Networking Concepts
 
Mpls
MplsMpls
Mpls
 
Transport layer
Transport layerTransport layer
Transport layer
 
UnIT VIII manet
UnIT VIII manetUnIT VIII manet
UnIT VIII manet
 
It2402 mobile communication unit 4
It2402 mobile communication unit 4It2402 mobile communication unit 4
It2402 mobile communication unit 4
 
Enhancing Downlink Performance in Wireless Networks by Simultaneous Multiple ...
Enhancing Downlink Performance in Wireless Networks by Simultaneous Multiple ...Enhancing Downlink Performance in Wireless Networks by Simultaneous Multiple ...
Enhancing Downlink Performance in Wireless Networks by Simultaneous Multiple ...
 
Use of NS-2 to Simulate MANET Routing Algorithms
Use of NS-2 to Simulate MANET Routing AlgorithmsUse of NS-2 to Simulate MANET Routing Algorithms
Use of NS-2 to Simulate MANET Routing Algorithms
 
High speed Networking
High speed NetworkingHigh speed Networking
High speed Networking
 
Computer Network Interview Questions
Computer Network Interview QuestionsComputer Network Interview Questions
Computer Network Interview Questions
 

Viewers also liked

WT - Circuit & Packet switching
WT - Circuit & Packet switchingWT - Circuit & Packet switching
WT - Circuit & Packet switchingvinay arora
 
Lec 4 and_5
Lec 4 and_5Lec 4 and_5
Lec 4 and_5
hz3012
 
8 Packet Switching
8 Packet Switching8 Packet Switching
8 Packet Switching
Water Birds (Ali)
 
The network layer
The network layerThe network layer
The network layer
Dana Harum
 
10 Circuit Packet
10 Circuit Packet10 Circuit Packet
10 Circuit Packet
Waqas !!!!
 
Power electronics Chp#4
Power electronics Chp#4Power electronics Chp#4
Power electronics Chp#4hz3012
 
Circuit and packet_switching
Circuit and packet_switchingCircuit and packet_switching
Circuit and packet_switching
hoanv
 
ITFT_Switching techniques in networking
ITFT_Switching techniques in networkingITFT_Switching techniques in networking
ITFT_Switching techniques in networking
Sneh Prabha
 
Circuit switching packet switching
Circuit switching  packet  switchingCircuit switching  packet  switching
Circuit switching packet switching
Sneha Dalvi
 
Free Download Powerpoint Slides
Free Download Powerpoint SlidesFree Download Powerpoint Slides
Free Download Powerpoint Slides
George
 

Viewers also liked (11)

Stephen Andrew Weigel
Stephen Andrew WeigelStephen Andrew Weigel
Stephen Andrew Weigel
 
WT - Circuit & Packet switching
WT - Circuit & Packet switchingWT - Circuit & Packet switching
WT - Circuit & Packet switching
 
Lec 4 and_5
Lec 4 and_5Lec 4 and_5
Lec 4 and_5
 
8 Packet Switching
8 Packet Switching8 Packet Switching
8 Packet Switching
 
The network layer
The network layerThe network layer
The network layer
 
10 Circuit Packet
10 Circuit Packet10 Circuit Packet
10 Circuit Packet
 
Power electronics Chp#4
Power electronics Chp#4Power electronics Chp#4
Power electronics Chp#4
 
Circuit and packet_switching
Circuit and packet_switchingCircuit and packet_switching
Circuit and packet_switching
 
ITFT_Switching techniques in networking
ITFT_Switching techniques in networkingITFT_Switching techniques in networking
ITFT_Switching techniques in networking
 
Circuit switching packet switching
Circuit switching  packet  switchingCircuit switching  packet  switching
Circuit switching packet switching
 
Free Download Powerpoint Slides
Free Download Powerpoint SlidesFree Download Powerpoint Slides
Free Download Powerpoint Slides
 

Similar to Lecture04 H

Basic networking 07-2012
Basic networking 07-2012Basic networking 07-2012
Basic networking 07-2012
Samuel Dratwa
 
CISSP - Chapter 4 - Network Fundamental
CISSP - Chapter 4 - Network FundamentalCISSP - Chapter 4 - Network Fundamental
CISSP - Chapter 4 - Network Fundamental
Karthikeyan Dhayalan
 
ETE405-lec7.pdf
ETE405-lec7.pdfETE405-lec7.pdf
ETE405-lec7.pdfmashiur
 
Userspace networking
Userspace networkingUserspace networking
Userspace networking
Stephen Hemminger
 
Introduction to OSI and QUIC
Introduction to OSI and QUICIntroduction to OSI and QUIC
Introduction to OSI and QUIC
Farzad Soltani
 
nv.ppt
nv.pptnv.ppt
nv.ppt
tahaniali27
 
TCP/IP model
TCP/IP modelTCP/IP model
TCP/IP model
Krishnkant Pandey
 
Carrier ethernet-for-power-utilities-presentation
Carrier ethernet-for-power-utilities-presentationCarrier ethernet-for-power-utilities-presentation
Carrier ethernet-for-power-utilities-presentation
Nir Cohen
 
Module 1 slides
Module 1 slidesModule 1 slides
Module 1 slides
AnaniaKapala
 
Ccent notes part 1
Ccent notes part 1Ccent notes part 1
Ccent notes part 1ahmady
 
TCP/IP – Transmission Control Protocol/ Internet Protocol
TCP/IP – Transmission Control Protocol/ Internet ProtocolTCP/IP – Transmission Control Protocol/ Internet Protocol
TCP/IP – Transmission Control Protocol/ Internet Protocol
We Learn - A Continuous Learning Forum from Welingkar's Distance Learning Program.
 
TCP vs UDP / Sumiet23
TCP vs UDP / Sumiet23TCP vs UDP / Sumiet23
TCP vs UDP / Sumiet23
Sumiet Talekar
 
Layers of tcpip.65 to 66
Layers of tcpip.65 to 66Layers of tcpip.65 to 66
Layers of tcpip.65 to 66
myrajendra
 
Physical And Data Link Layers
Physical And Data Link LayersPhysical And Data Link Layers
Physical And Data Link Layers
tmavroidis
 
Topic 2.2 network protocol
Topic 2.2 network protocolTopic 2.2 network protocol
Topic 2.2 network protocol
Atika Zaimi
 
Cours Cisco
Cours CiscoCours Cisco
Cours Cisco123addou
 
Ethernet vs-mpls-tp-in-the-access-presentation
Ethernet vs-mpls-tp-in-the-access-presentationEthernet vs-mpls-tp-in-the-access-presentation
Ethernet vs-mpls-tp-in-the-access-presentation
Nir Cohen
 
02 protocol architecture
02 protocol architecture02 protocol architecture
02 protocol architectureOrbay Yeşil
 
Some important networking questions
Some important networking questionsSome important networking questions
Some important networking questionsSrikanth
 

Similar to Lecture04 H (20)

Basic networking 07-2012
Basic networking 07-2012Basic networking 07-2012
Basic networking 07-2012
 
CISSP - Chapter 4 - Network Fundamental
CISSP - Chapter 4 - Network FundamentalCISSP - Chapter 4 - Network Fundamental
CISSP - Chapter 4 - Network Fundamental
 
ETE405-lec7.pdf
ETE405-lec7.pdfETE405-lec7.pdf
ETE405-lec7.pdf
 
Userspace networking
Userspace networkingUserspace networking
Userspace networking
 
Introduction to OSI and QUIC
Introduction to OSI and QUICIntroduction to OSI and QUIC
Introduction to OSI and QUIC
 
nv.ppt
nv.pptnv.ppt
nv.ppt
 
TCP/IP model
TCP/IP modelTCP/IP model
TCP/IP model
 
Carrier ethernet-for-power-utilities-presentation
Carrier ethernet-for-power-utilities-presentationCarrier ethernet-for-power-utilities-presentation
Carrier ethernet-for-power-utilities-presentation
 
Module 1 slides
Module 1 slidesModule 1 slides
Module 1 slides
 
Ccent notes part 1
Ccent notes part 1Ccent notes part 1
Ccent notes part 1
 
TCP/IP – Transmission Control Protocol/ Internet Protocol
TCP/IP – Transmission Control Protocol/ Internet ProtocolTCP/IP – Transmission Control Protocol/ Internet Protocol
TCP/IP – Transmission Control Protocol/ Internet Protocol
 
TCP vs UDP / Sumiet23
TCP vs UDP / Sumiet23TCP vs UDP / Sumiet23
TCP vs UDP / Sumiet23
 
Layers of tcpip.65 to 66
Layers of tcpip.65 to 66Layers of tcpip.65 to 66
Layers of tcpip.65 to 66
 
Chapter1 sept 8_05[one.]
Chapter1 sept 8_05[one.]Chapter1 sept 8_05[one.]
Chapter1 sept 8_05[one.]
 
Physical And Data Link Layers
Physical And Data Link LayersPhysical And Data Link Layers
Physical And Data Link Layers
 
Topic 2.2 network protocol
Topic 2.2 network protocolTopic 2.2 network protocol
Topic 2.2 network protocol
 
Cours Cisco
Cours CiscoCours Cisco
Cours Cisco
 
Ethernet vs-mpls-tp-in-the-access-presentation
Ethernet vs-mpls-tp-in-the-access-presentationEthernet vs-mpls-tp-in-the-access-presentation
Ethernet vs-mpls-tp-in-the-access-presentation
 
02 protocol architecture
02 protocol architecture02 protocol architecture
02 protocol architecture
 
Some important networking questions
Some important networking questionsSome important networking questions
Some important networking questions
 

More from itsvineeth209

Evolution,Drivers Of Indian Retail
Evolution,Drivers Of Indian RetailEvolution,Drivers Of Indian Retail
Evolution,Drivers Of Indian Retailitsvineeth209
 
Intro To Tretailing 6.2.09
Intro To Tretailing 6.2.09Intro To Tretailing 6.2.09
Intro To Tretailing 6.2.09itsvineeth209
 
Indian Retail Sector
Indian Retail SectorIndian Retail Sector
Indian Retail Sectoritsvineeth209
 
Rm 10 Report Writing 2
Rm   10   Report Writing 2Rm   10   Report Writing 2
Rm 10 Report Writing 2itsvineeth209
 
Rm 6 Sampling Design
Rm   6   Sampling DesignRm   6   Sampling Design
Rm 6 Sampling Designitsvineeth209
 
Rm 1 Intro Types Research Process
Rm   1   Intro Types   Research ProcessRm   1   Intro Types   Research Process
Rm 1 Intro Types Research Processitsvineeth209
 
Rm 5 Methods Of Data Collection
Rm   5   Methods Of Data CollectionRm   5   Methods Of Data Collection
Rm 5 Methods Of Data Collectionitsvineeth209
 
Rm 4 Research Design
Rm   4   Research DesignRm   4   Research Design
Rm 4 Research Designitsvineeth209
 
Rm 2 Problem Identification
Rm   2   Problem IdentificationRm   2   Problem Identification
Rm 2 Problem Identificationitsvineeth209
 
Transportation Problem
Transportation ProblemTransportation Problem
Transportation Problemitsvineeth209
 
Transportation Problem
Transportation ProblemTransportation Problem
Transportation Problemitsvineeth209
 
Procedure Of Simplex Method
Procedure Of Simplex MethodProcedure Of Simplex Method
Procedure Of Simplex Methoditsvineeth209
 
North West Corner Rule
North   West Corner RuleNorth   West Corner Rule
North West Corner Ruleitsvineeth209
 

More from itsvineeth209 (20)

Green Marketing
Green MarketingGreen Marketing
Green Marketing
 
Evolution,Drivers Of Indian Retail
Evolution,Drivers Of Indian RetailEvolution,Drivers Of Indian Retail
Evolution,Drivers Of Indian Retail
 
Intro To Tretailing 6.2.09
Intro To Tretailing 6.2.09Intro To Tretailing 6.2.09
Intro To Tretailing 6.2.09
 
Indian Retail Sector
Indian Retail SectorIndian Retail Sector
Indian Retail Sector
 
Sampling Design
Sampling DesignSampling Design
Sampling Design
 
Sampling Design
Sampling DesignSampling Design
Sampling Design
 
Rm 10 Report Writing 2
Rm   10   Report Writing 2Rm   10   Report Writing 2
Rm 10 Report Writing 2
 
Rm 6 Sampling Design
Rm   6   Sampling DesignRm   6   Sampling Design
Rm 6 Sampling Design
 
Rm 1 Intro Types Research Process
Rm   1   Intro Types   Research ProcessRm   1   Intro Types   Research Process
Rm 1 Intro Types Research Process
 
Rm 5 Methods Of Data Collection
Rm   5   Methods Of Data CollectionRm   5   Methods Of Data Collection
Rm 5 Methods Of Data Collection
 
Rm 3 Hypothesis
Rm   3   HypothesisRm   3   Hypothesis
Rm 3 Hypothesis
 
Research Design
Research DesignResearch Design
Research Design
 
Rm 4 Research Design
Rm   4   Research DesignRm   4   Research Design
Rm 4 Research Design
 
Rm 2 Problem Identification
Rm   2   Problem IdentificationRm   2   Problem Identification
Rm 2 Problem Identification
 
Vam
VamVam
Vam
 
Transportation Problem
Transportation ProblemTransportation Problem
Transportation Problem
 
Transportation Problem
Transportation ProblemTransportation Problem
Transportation Problem
 
Simplex Method
Simplex MethodSimplex Method
Simplex Method
 
Procedure Of Simplex Method
Procedure Of Simplex MethodProcedure Of Simplex Method
Procedure Of Simplex Method
 
North West Corner Rule
North   West Corner RuleNorth   West Corner Rule
North West Corner Rule
 

Recently uploaded

LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 

Recently uploaded (20)

LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 

Lecture04 H

  • 1. Recap Lecture 04: Networking (continue) Various types of Networks:LAN, WAN, MAN, WLAN, WMAN Switching Schemes: Broadcast, Circuit Switching, packet Switching, ATM Protocol, what? why? OSI layers and protocol Distributed Systems Routing and RIP algorithm Behzad Bordbar School of Computer Science, University of Birmingham, UK Lecture 04 1 Lecture 04 2 RIP (continue) Overview When a link fails cost in the table is set to ∞ Routing and RIP (continue) Then, the cost in all table is set to ∞ (1+∞ = ∞) other protocols: Transport layer protocols (UDP 3 timers: periodic, expiration, Garbage collection , TCP) RIP is Mobile routing slow in convergence WLAN and its architectural issues But, most of the time system stables fast Communication Service types: RIP 2 addresses some of the above issues and connectionless communication (UDP) also Authentication and Multicasting (send packets to all other router. connection-oriented communication (TCP) Lecture 04 3 Lecture 04 4 Review of some Protocols Congestion control IP: transfer datagram from one host to another - Unreliable best effort When load on network high (80% capacity) - only header checksum packet queues long, links blocked TCP and UDP Strategies to address the problem main transport level protocols used by IP packet dropping MobileIP • reliable of delivery at higher levels connectivity for mobile devices, even in transit • Dropping some packets is better than others (MPEG) device retains single IP address reduce rate of transmission re-routing by Home (HA) and Foreign Agents (FA) • nodes send choke packets (Ethernet) transparent • transmission control (TCP) Wireless LAN (IEEE 802.11) transmit congestion information to each node radio or infra-red communications • QoS guarantees (ATM) Lecture 04 5 CSMA/CA based Lecture 04 6 1
  • 2. IP Transport layer protocols Internet Protocol is unreliable and connectionless UDP (basic, used for some IP functions) Best effort (no error checking or Ack) uses IP address+port number Packets called Datagram have Header no guarantee of delivery, optional checksum IP address of source and destination messages up to 64KB Containing version, Header Length (HLEN), length (Header +data) … TCP (more sophisticated, most IP functions) higher level protocol ?? (info encapsulated UDP, TCP, RIP2, data stream abstraction, reliable delivery of all data …) messages divided into segments, sequence numbers header checksum sliding window, acknowledgement+retransmission Fragmentation buffering (with timeout for interactive applications) Timestamp (IP address of the router + Universal time) checksum (if no match segment dropped) … Both are process-to-process communication Not all exploited by all higher level protocols Lecture 04 7 Lecture 04 8 Communication service types Connectionless service Connectionless: UDP ‘send and pray’ unreliable delivery UDP (User Datagram Protocol) efficient and easy to implement messages possibly lost, duplicated, delivered out of order, Connection-oriented: TCP without telling the user with basic reliability guarantees maintains no state information, so cannot detect lost, less efficient, memory and time overhead for error duplicate or out-of-order messages correction each message contains source and destination address may discard corrupted messages due to no error correction (simple checksum) or congestion Used e.g. for DNS (Domain Name System) or RIP. Lecture 04 9 Lecture 04 10 MobileIP Connection-oriented service At home normal, when elsewhere mobile host: TCP (Transmission Control Protocol) notifies HA before leaving establishes data stream connection to ensure reliable, informs FA, who allocates temporary care-of IP address in-sequence delivery & tells HA error checking and reporting to both ends Packets for mobile host: attempts to match speeds (timeouts, buffering) first packet routed to HA, encapsulated in MobileIP sliding window: state information includes • unacknowledged messages packet and sent to FA (tunnelling) • message sequence numbers FA unpacks MobileIP packet and sends to mobile host • flow control information (matching the speeds) sender notified of the care-of address for future communications which can be direct via FA Used e.g. for HTTP, FTP, SMTP on Internet. Problems efficiency low, need to notify HA Lecture 04 11 Lecture 04 12 2
  • 3. MobileIP routing Wireless LAN (802.11) Sender Radio broadcast (fading strength, obstruction) Subsequent IP packets tunnelled to FA Mobile host MH Collision avoidance by Address of FA returned to sender slot reservation mechanism by Request to Send (RTS) First IP packet and Clear to Send (CTS) addressed to MH stations in range pick up RTS/CTS and avoid Internet Foreign agent FA transmission at the reserved times Home agent First IP packet collisions less likely than Ethernet since RTS/CTS short tunnelled to FA random back off period Problems security (eavesdropping), use shared-key authentication Lecture 04 13 Lecture 04 14 Summary Wireless LAN configuration A B C Laptops Routing and RIP, various timers radio obstruction IP Wireless Transport layer protocols (UDP , TCP) D LAN Palmtop/ Mobile phone E Mobile routing Base station/ access point WLAN and its architectural issues Communication Service types: Server Connectionless vs. Connection-oriented LAN Further reading: end of chapter 3 p. 130 Lecture 04 15 Lecture 04 16 Exercises (Lectures 3,4): Exercises: client sends a 200 byte request message to a service, which 3.2: The Internet is far too large for any router to hold produces a response ontaining 5000 bytes. Estimate the total routing information for all destinations. How does time to complete the request in each of the following cases, with the performance assumptions listed below: the Internet routing scheme deal with this issue? i) Using connection less (datagram) communication (for 3.6: Can we be sure that no two computers in the Internet example, UDP); have the same IP addresses? ii) Using connection-oriented communication (for example, 3.7: Compare connection less (UDP) and connection- TCP); oriented (TCP) communication for the iii) The server process is in the same machine as the client. implementation of each of the following application- [Latency per packet (local or remote. incurred on both send and level or presentation-level protocols: receive): 5 ms, Connection setup time (TCP only): 5 ms, Data transfer rate: 10 Mbps MTU: 1000 bytes Server request i) “irtual terminal access (for example, Telnet); ii)file processing time: 2 ms Assume that the network is lightly transfer (for example, FTP); iii)ser location (for loaded.] example, rwho, finger); iv)information browsing (for Lecture 04 17 example, HTTP); v)remote procedure call. Lecture 04 18 3