cs425 ee673 summary lecture
play

CS425/EE673 Summary Lecture Bhaskaran Raman Kameswari Chebrolu - PowerPoint PPT Presentation

CS425/EE673 Summary Lecture Bhaskaran Raman Kameswari Chebrolu Indian Institute of Technology, Kanpur Network Layering What is layering? Purpose of layering Inter-layer communication Encapsulation End-to-end versus


  1. CS425/EE673 Summary Lecture Bhaskaran Raman Kameswari Chebrolu Indian Institute of Technology, Kanpur

  2. Network Layering ● What is layering? ● Purpose of layering ● Inter-layer communication ● Encapsulation ● End-to-end versus hop-by-hop communication

  3. Encoding Schemes ● NRZ; problems with NRZ ● NRZI ● Manchester: 50% efficiency ● 4B/5B: 80% efficiency

  4. Framing ● Byte-oriented versus bit-oriented ● Byte-counting based versus sentinel based ● Bit/byte stuffing ● Example protocols: – BISYNC, HDLC

  5. Error Detection ● Parity scheme ● 2D parity ● Checksum (used by IP) ● CRC: based on polynomial division ● Forward Error Correction (FEC) as an extension of error detection mechanisms

  6. Reliable Link Layer: ARQ ● Stop-and-Wait ● Notion of Bandwidth x Delay Product ● Sliding window – Sequence space required – Variables to be maintained ● Concurrent logical channels

  7. Beyond a Single Link ● Network topologies: – Bus – Ring – Star ● Need MAC (Medium Access Control)

  8. MAC Protocols ● Aloha ● Slotted Aloha ● Ethernet CSMA/CD

  9. Ethernet: a Case Study ● Maximum length possible, repeaters ● Frame format, MTU size ● CSMA/CD: – Listen before transmit – Collision detection – Backoff on collision ● 32-bit jamming sequence

  10. Token Ring: a Case Study ● Token circulates the ring – Token rotation time – Early versus delayed release ● Token monitor – Ensures that token is always there in the ring – Checks for corrupted/orphaned frames

  11. Packet Switching ● Store and forward functionality ● Circuit switching versus packet switching ● Datagrams ● Virtual circuit switching ● Comparison between circuit switching, packet switching, and virtual circuit switching

  12. Ethernet Bridging ● Special case of datagram switching ● Learning bridges ● Spanning tree – Tree properties – Distributed algorithm to form a spanning tree ● Disadvantages of bridging – Trees poor for routing, fault tolerance – Metric-based routing not possible

  13. Routing Protocols ● Distance Vector routing – Periodic updates, triggered updates – Count-to-infinity problem, split horizon, poison reverse, hold time ● Link State routing – Reliable flooding – Periodic updates, triggered updates – Sequence numbers, TTL ● Comparison between DV & LS

  14. Internet Addressing ● Hierarchical addressing – Class A, B, C, D, E – Subnets – Forwarding algorithm ● IP header formatting & fragmentation ● ARP (Address Resolution Protocols) ● DHCP (Dynamic Host Configuration Protocol)

  15. Internet Routing ● Hierarchical routing ● CIDR ● Internet domains, Autonomous Systems (AS) ● Path vector routing across AS – Destinations are networks – Stub AS versus transit AS ● Internet Service Providers (ISPs)

  16. Transport Protocol ● Application requirements: reliability, in-order delivery ● Multiplexing/demultiplexing ● UDP & TCP ● Link layer reliability vs transport layer reliability

  17. TCP ● Header format ● Connection establishment ● State transition diagram ● Slow start, congestion avoidance ● Fast retransmit & fast recovery ● RTT estimation, Jacobson/Karels algorithm ● Sequence space wrap-around

  18. DNS ● Name space, binding, name resolution ● Hierarchical name space ● Resource Records ● Zones ● DNS query process

  19. Applications ● HTTP: – URL – Request, Reply, persistent connections – Proxies and caching, end-to-end issues ● SMTP – RFC822, MIME, SMTP exchanges – Gateway

  20. Network Security ● Cryptography, shared-key ● Cryptanalysis, types of attacks ● DES ● Key management ● Public key cryptography

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend