1.59k likes | 1.61k Views
Computer Networks: Introduction. Ivan Marsic Rutgers University. Chapter 1 – Introduction. Topic : Introduction to Data Networking. Goals Communication Media Protocols Reliable Transmission. User Goals and Tunable Knobs. Visible network properties:. Delivery. Correctness.
E N D
Computer Networks:Introduction Ivan Marsic Rutgers University Chapter 1 – Introduction
Topic:Introduction to Data Networking Goals Communication Media Protocols Reliable Transmission
User Goals and Tunable Knobs Visible network properties: Delivery Correctness Fault tolerance Timeliness Cost Customer Tunable network parameters: Network topology Communication protocols Network architecture Components Physical medium Network Engineer
Topology vs. Robustness Paul Baran, 1964
Fully Interconnected Network New York City, 1888
1924: First Mobile Telephone The first version of a mobile radio telephone being used in 1924.
Exploiting Locality Saul Steinberg, “A View of the World from Ninth Avenue,” cover of The New Yorker March 29, 1976
Distortion of Signals threshold "0"/"1"
Packet Error Rate Approximation PER = packet error rate BER = bit error rate n = packet length [in bits]
Packet Transmission (1) Example: Sender sends a 6-bit packet “101101” to the receiver
Transmission Link Capacity Effect of link speed: Link 2 can transmit 10 times more bits per unit of time or, Link 2 can transmit the same message in a 10 times shorter period
Wireless Communication Point source Interfering sources Interference pattern
Radio Signal Propagation Ray tracing simulation in a closed office environment. Signal intensity map for a room with a doorway and a metal desk door desk
3-Layer Protocol Stack Protocol at layer i depends only on the protocols at i1 (not at i1!)
Layer 1 / 3-Layer Protocol Stack Link Layer: Protocol modules at layer 1 (bottom layer) exchange packets over the link
Layer 2 / 3-Layer Protocol Stack Network Layer: Protocol modules at layer 2 (middle layer) route packets from source to destination (possibly over many links)
Layer 3 / 3-Layer Protocol Stack Applications: Network games Internet telephony Email End-to-End Layer: Protocol modules at layer 3 (top layer) create illusion of different link types (tailored to application-specific needs)
Visit http://en.wikipedia.org/wiki/OSI_model for more details on the OSI Reference Architecture ISO OSI Protocol Stack • Application services (SIP, FTP, HTTP, Telnet, …) • Data translation (MIME) • Encryption (SSL) • Compression • Dialog control • Synchronization • Reliable (TCP) • Real-time (RTP) • Source-to-destination (IP) • Routing • Address resolution • Wireless link (WiFi) • Wired link (Ethernet) • Radio spectrum • Infrared • Fiber • Copper
Transmission and Propagation Delays Transmission delay: Propagation delay:
Topic:Reliable Transmission via Retransmission Stop-and-Wait Go-Back-N Selective Repeat
Automatic Repeat reQuest (ARQ) Stop-and-wait ARQ Transmit a frame and wait for acknowledgement (ACK) If positive ACK from receiver, send next frame If ACK does not arrive after a certain period of time (Timeout), retransmits the frame Simple, low efficiency Go-back-N ARQ Transmit frames continuously, no waiting The receiver only ACKs the highest-numbered frames received in sequence ACK comes back after a round-trip delay If timeout, the sender retransmits the frames that are not ACKed and N–1 succeeding frames that were transmitted during the round-trip delay (N frames transmitted during a round-trip delay) Need buffer at sender, does not have to buffer the frames at the receiver, Moderate efficiency and complexity. Less efficient when the round-trip delay is large and data transmission rate is high Selective-repeat ARQ Transmit continuously, no waiting The receiver ACKs all successfully received frames The sender only retransmits (repeats) the unACKed frames when their timers expire Most efficient, but most complex, buffer needed at both sender & receiver, needs per-frame timer
Stop & Wait Sender Utilization Stop & Wait sender utilization, under error-free transmission: Probability of successful transmission, with error rate pe: Expected sender utilization for Stop & Wait, under errors:
Sliding Window – Keeping the Pipe Full • Goal: Sender should be busy sending packets (as long as it has packets ready to send) • Sender utilization as a metric of protocol performance • “Keeping the pipe full”
Topic:Broadcast and Wireless Links ALOHA Hidden and Exposed Stations Carrier Sensing Multiple Access CSMA/CD, CSMA/CD
Transmission Cone, Collision& Vulnerable Period (b) Collision occurs if two (or more) transmission cones overlap. (a)
Parameter Ratio of propagation delay vs. packet transmission time:
Parameter Ratio of propagation delay vs. packet transmission time