Title: CS455 Introduction to Computer Networks
1CS455 Introduction to Computer Networks
WSU Vancouver
- Dr. Wenzhan Song
- Assistant Professor, Computer Science
2Course roadmap
- Introduction
- Application Layer WWW, FTP, email, DNS,
multimedia - Transport Layer reliable end-end data transfer
principles, UDP, TCP - Network Layer IP addressing, routing and other
issues - Data Link Layer framing, error control, flow
control - Medium Access Control (MAC) Layer
multiple-access, channel allocation - Physical Layer wired, wireless, satellite
- Other Topics network security, social issues,
hot topics, research directions
3Roadmap Network Layer
- Network layer design issues
- overview of service models
- Virtual circuits and datagram networks
- IP Internet Protocol
- datagram format, IPv4 addressing
- NAT, IPv6
- ICMP, ARP, DHCP
- Routing algorithms
- distance vector
- link state
- Routing Protocol in Internet
- RIP
- OSPF
- BGP
- Other issues in network layer
4Other issues in network layer
- Congestion control (in network)
- QoS
- Internetworking
5Congestion
- When too much traffic is offered, congestion sets
in and performance degrades sharply.
6General Principles of Congestion Control
- Monitor the system .
- detect when and where congestion occurs.
- Pass information to where action can be taken.
- Adjust system operation to correct the problem.
7Congestion Prevention Policies
- Policies that affect congestion.
8Congestion Control in Virtual-Circuit Subnets
- (a) A congested subnet.
- (b) A redrawn subnet, eliminates congestion and a
virtual circuit from A to B.
9Hop-by-Hop Choke Packets
- (a) A choke packet that affects only the source.
- (b) A choke packet that affects each hop it
passes through.
10Quality of Service
- Requirements
- Techniques for Achieving Good Quality of Service
- Integrated Services
- Differentiated Services
- Label Switching and MPLS
11Requirements
- How stringent the quality-of-service requirements
are.
12Techniques to achieve good QoS
- Overprovisioning
- used in telephone network, providing enough
router capacity, buffer space and bandwidth - Traffic shaping
- Smooth out the traffic on the server side, rather
than on client side - Proportional routing
- Split traffic over multiple paths
- Buffering
- Leaky bucket algorithm
- The token bucket algorithm
- Resource reservation
- Admission control
- Packet scheduling
13Buffering
- Smoothing the output stream by buffering packets.
14The Leaky Bucket Algorithm
- (a) A leaky bucket with water.
- (b) a leaky bucket with packets.
15The Token Bucket Algorithm
- Token Bucket provide different traffic shaping
than leaky bucket - Allow burst traffic
- May throw tokens, but not packets
5-34
16Traffic shape
(a) Input to a leaky bucket. (b) Output from a
leaky bucket. Output from a token bucket with
capacities of (c) 250 KB, (d) 500 KB, (e) 750 KB
(f) Output from a 500KB token bucket feeding a
10-MB/sec leaky bucket.
17Admission Control
5-34
- An example of flow specification.
18Packet Scheduling
Byte-by-byte round robin
- (a) A router with five packets queued for line O.
- (b) Finishing times for the five packets.
19Label Switching and MPLS
- Transmitting a TCP segment using IP, MPLS, and
PPP.
- MPLS MultiProtocol Label Switching
- MPLS vs. VC network
- Similarity based on label switching, differ
than routing - Difference no pre-connection setup, it is
on-demand VC creation
20Switch and Router
- (a) Two Ethernets connected by a switch.
- (b) Two Ethernets connected by routers.
21Tunneling
- Tunneling a packet from Paris to London.
22Tunneling (2)
- Tunneling a car from France to England.
23Reading Assignment