CS425/EE673 Summary Lecture Bhaskaran Raman Kameswari Chebrolu - - PowerPoint PPT Presentation

cs425 ee673 summary lecture
SMART_READER_LITE
LIVE PREVIEW

CS425/EE673 Summary Lecture Bhaskaran Raman Kameswari Chebrolu - - PowerPoint PPT Presentation

CS425/EE673 Summary Lecture Bhaskaran Raman Kameswari Chebrolu Indian Institute of Technology, Kanpur Network Layering What is layering? Purpose of layering Inter-layer communication Encapsulation End-to-end versus


slide-1
SLIDE 1

CS425/EE673 Summary Lecture

Bhaskaran Raman Kameswari Chebrolu Indian Institute of Technology, Kanpur

slide-2
SLIDE 2

Network Layering

  • What is layering?
  • Purpose of layering
  • Inter-layer communication
  • Encapsulation
  • End-to-end versus hop-by-hop communication
slide-3
SLIDE 3

Encoding Schemes

  • NRZ; problems with NRZ
  • NRZI
  • Manchester: 50% efficiency
  • 4B/5B: 80% efficiency
slide-4
SLIDE 4

Framing

  • Byte-oriented versus bit-oriented
  • Byte-counting based versus sentinel based
  • Bit/byte stuffing
  • Example protocols:

– BISYNC, HDLC

slide-5
SLIDE 5

Error Detection

  • Parity scheme
  • 2D parity
  • Checksum (used by IP)
  • CRC: based on polynomial division
  • Forward Error Correction (FEC) as an

extension of error detection mechanisms

slide-6
SLIDE 6

Reliable Link Layer: ARQ

  • Stop-and-Wait
  • Notion of Bandwidth x Delay Product
  • Sliding window

– Sequence space required – Variables to be maintained

  • Concurrent logical channels
slide-7
SLIDE 7

Beyond a Single Link

  • Network topologies:

– Bus – Ring – Star

  • Need MAC (Medium Access Control)
slide-8
SLIDE 8

MAC Protocols

  • Aloha
  • Slotted Aloha
  • Ethernet CSMA/CD
slide-9
SLIDE 9

Ethernet: a Case Study

  • Maximum length possible, repeaters
  • Frame format, MTU size
  • CSMA/CD:

– Listen before transmit – Collision detection – Backoff on collision

  • 32-bit jamming sequence
slide-10
SLIDE 10

Token Ring: a Case Study

  • Token circulates the ring

– Token rotation time – Early versus delayed release

  • Token monitor

– Ensures that token is always there in the ring – Checks for corrupted/orphaned frames

slide-11
SLIDE 11

Packet Switching

  • Store and forward functionality
  • Circuit switching versus packet switching
  • Datagrams
  • Virtual circuit switching
  • Comparison between circuit switching, packet

switching, and virtual circuit switching

slide-12
SLIDE 12

Ethernet Bridging

  • Special case of datagram switching
  • Learning bridges
  • Spanning tree

– Tree properties – Distributed algorithm to form a spanning tree

  • Disadvantages of bridging

– Trees poor for routing, fault tolerance – Metric-based routing not possible

slide-13
SLIDE 13

Routing Protocols

  • Distance Vector routing

– Periodic updates, triggered updates – Count-to-infinity problem, split horizon, poison

reverse, hold time

  • Link State routing

– Reliable flooding – Periodic updates, triggered updates – Sequence numbers, TTL

  • Comparison between DV & LS
slide-14
SLIDE 14

Internet Addressing

  • Hierarchical addressing

– Class A, B, C, D, E – Subnets – Forwarding algorithm

  • IP header formatting & fragmentation
  • ARP (Address Resolution Protocols)
  • DHCP (Dynamic Host Configuration Protocol)
slide-15
SLIDE 15

Internet Routing

  • Hierarchical routing
  • CIDR
  • Internet domains, Autonomous Systems (AS)
  • Path vector routing across AS

– Destinations are networks – Stub AS versus transit AS

  • Internet Service Providers (ISPs)
slide-16
SLIDE 16

Transport Protocol

  • Application requirements: reliability, in-order

delivery

  • Multiplexing/demultiplexing
  • UDP & TCP
  • Link layer reliability vs transport layer reliability
slide-17
SLIDE 17

TCP

  • Header format
  • Connection establishment
  • State transition diagram
  • Slow start, congestion avoidance
  • Fast retransmit & fast recovery
  • RTT estimation, Jacobson/Karels algorithm
  • Sequence space wrap-around
slide-18
SLIDE 18

DNS

  • Name space, binding, name resolution
  • Hierarchical name space
  • Resource Records
  • Zones
  • DNS query process
slide-19
SLIDE 19

Applications

  • HTTP:

– URL – Request, Reply, persistent connections – Proxies and caching, end-to-end issues

  • SMTP

– RFC822, MIME, SMTP exchanges – Gateway

slide-20
SLIDE 20

Network Security

  • Cryptography, shared-key
  • Cryptanalysis, types of attacks
  • DES
  • Key management
  • Public key cryptography