Presented By: Vasantha Lakshmi Gutha Graduate student (CS) Course: CENG 5931 University of...

17
FUNDAMENTALS OF COMMUNICATION NETWORKS Presented By: Vasantha Lakshmi Gutha Graduate student (CS) Course: CENG 5931 University of Houston-Clear Lake [email protected] Spring 2011

Transcript of Presented By: Vasantha Lakshmi Gutha Graduate student (CS) Course: CENG 5931 University of...

Page 1: Presented By: Vasantha Lakshmi Gutha Graduate student (CS) Course: CENG 5931 University of Houston-Clear Lake Guthav6317@uhcl.edu Spring 2011.

FUNDAMENTALS OF COMMUNICATION NETWORKS

Presented By:

Vasantha Lakshmi Gutha

Graduate student (CS)

Course: CENG 5931

University of Houston-Clear Lake

[email protected]

Spring 2011

Page 2: Presented By: Vasantha Lakshmi Gutha Graduate student (CS) Course: CENG 5931 University of Houston-Clear Lake Guthav6317@uhcl.edu Spring 2011.

INTRODUCTION SWITCHING TECHNOLOGIES ENCAPSULATION AND MULTIPLEXING NAMING AND ADDRESSING MULTIPLE ACCESS ROUTING AND FORWARDING CONGESTION CONTROL AND FLOW

CONTROL NEW CHALLENGES IN WIRELESS NETWORKS MULTIPLE ACCESS SCHEMES CONGESTION CONTROL IN WIRELESS

NETWORKS CONCLUSION

Page 3: Presented By: Vasantha Lakshmi Gutha Graduate student (CS) Course: CENG 5931 University of Houston-Clear Lake Guthav6317@uhcl.edu Spring 2011.

INTRODUCTION A communication network consists of a set of

interconnected nodes that exchange data with each other. Network nodes exchange control information from a

source device to a destination device. The task of information exchange among communication

networks involves tremendous complexity. The communication task is broken down into subtasks. These subtasks are organized into a number of layers. Each Higher layer uses the service provided by the lower

layer and in turn provides service to the layer above it.

Page 4: Presented By: Vasantha Lakshmi Gutha Graduate student (CS) Course: CENG 5931 University of Houston-Clear Lake Guthav6317@uhcl.edu Spring 2011.

SWITCHING TECHNOLOGIESCommunication networks can be classified into three

categories: Circuit switching: Dedicated communication path is established between

two stations. Communication session involves three phases:

Circuit establishment Data transfer Circuit termination

Packet switching: Data are transmitted as packets or datagrams,

appended with a header or trailer.

Page 5: Presented By: Vasantha Lakshmi Gutha Graduate student (CS) Course: CENG 5931 University of Houston-Clear Lake Guthav6317@uhcl.edu Spring 2011.

SWITCHING TECHNOLOGIES(CONTINUED…) Each packet carries routing information and is

forwarded through the network from node to node. Virtual circuit switching: It is a hybrid technology combining features of both

circuit switching and packet switching. As in circuit switching, a virtual circuit is established. As in packet switching, data are transmitted as

packets. As in circuit switching, all packets of the same session

follow the same path. As in packet switching, packets from different virtual

circuits may be interleaved.

Page 6: Presented By: Vasantha Lakshmi Gutha Graduate student (CS) Course: CENG 5931 University of Houston-Clear Lake Guthav6317@uhcl.edu Spring 2011.

ENCAPSULATION AND MULTIPLEXING When the packets arrives at the destination, it is sent

up through the protocol stack. At each layer, the corresponding header and trailer are

stripped. A communication process running in a host is assigned

a unique port number. This unique port number is carried by all the packets

generated by or designed to this process. A field called frame type in the Ethernet header is used

for multiplexing and demultiplexing.

Page 7: Presented By: Vasantha Lakshmi Gutha Graduate student (CS) Course: CENG 5931 University of Houston-Clear Lake Guthav6317@uhcl.edu Spring 2011.

NAMING AND ADDRESSING A domain name is used to identify a host, such as

www.google.com identifies a Google server. A domain name is more user friendly. Domain names are organized into a tree structure. Port numbers are as addresses for user processes

running in the application layer. In a client-server architecture, a server uses a well-

known port number(smaller than 1024). A client uses ephemeral port numbers that are

randomly chosen and are larger than 1023.

Page 8: Presented By: Vasantha Lakshmi Gutha Graduate student (CS) Course: CENG 5931 University of Houston-Clear Lake Guthav6317@uhcl.edu Spring 2011.

MULTIPLE ACCESS Simplest way of interconnecting two computer hosts is

using a point-to-point link with a host on each end. As the number of hosts increases, this approach may be

inadequate. To share the common media efficiently, all hosts must

follow a set of rules to access the media. Each host should have a fair chance to access the

media. Hosts should not be allowed to take the access media

forever.

Page 9: Presented By: Vasantha Lakshmi Gutha Graduate student (CS) Course: CENG 5931 University of Houston-Clear Lake Guthav6317@uhcl.edu Spring 2011.

ROUTING AND FORWARDING Internet routers are responsible for delivering packets

from source to destination. Routing and forwarding consists of two closely related

parts Maintaining network topology Forwarding packets. Routing information is derived from network topology

and stored in a data structure called routing tables. When there is a packet to deliver, a router consults the

routing table to find out where to forward the packet.

Page 10: Presented By: Vasantha Lakshmi Gutha Graduate student (CS) Course: CENG 5931 University of Houston-Clear Lake Guthav6317@uhcl.edu Spring 2011.

CONGESTION CONTROL AND FLOW CONTROL The receiver will notify the sender how much data it

can receive without causing buffer overflow. Then the sender will not send more data than the

amount allowed by the receiver. The sender may be explicitly notified about the

congestion in the router. then the source will reduce its sending rate until

congestion is dissolved. TCP uses slow start and congestion avoidance to react

to congestion in the network.

Page 11: Presented By: Vasantha Lakshmi Gutha Graduate student (CS) Course: CENG 5931 University of Houston-Clear Lake Guthav6317@uhcl.edu Spring 2011.

NEW CHALLENGES IN WIRELESS NETWORKS Wireless Transmissions: Wireless transmissions consume radio frequency spectrum

in the network area. Mobility: In infrastructure-based wireless networks, each mobile user

is associated with a fixed base station for transmitting and receiving data.

Energy Efficiency: Mobile nodes are usually powered by the batteries they

carry. In infrastructure-based wireless networks, when a node

dies, there is no significant impact on the network topology.

Page 12: Presented By: Vasantha Lakshmi Gutha Graduate student (CS) Course: CENG 5931 University of Houston-Clear Lake Guthav6317@uhcl.edu Spring 2011.

MULTIPLE ACCESS SCHEMES Polling: A polling system is a special types of queuing system

with one server and m stations. Each customer requests service from the server and

departs the system when its service is completed. Any customer that arrives when the buffer is full is

dropped. When the server finishes serving a station, it may

decide which station to serve next. ALOHA and Slotted ALOHA

Page 13: Presented By: Vasantha Lakshmi Gutha Graduate student (CS) Course: CENG 5931 University of Houston-Clear Lake Guthav6317@uhcl.edu Spring 2011.

MULTIPLE ACCESS SCHEMES(CONTINUED..) With pure ALOHA, a station transmits a packet

whenever it wants to. Pure ALOHA is a very simple multiple access

protocol, but its throughput is very low. The exact scheduling of ALOHA is complicated and

hard to analyze. Slotted ALOHA is an extension of pure ALOHA for

improved throughput. Time is divided into slots, and the length of one time

slot is equal to the packet transmission time.

Page 14: Presented By: Vasantha Lakshmi Gutha Graduate student (CS) Course: CENG 5931 University of Houston-Clear Lake Guthav6317@uhcl.edu Spring 2011.

CONGESTION CONTROL IN WIRELESS NETWORKS Congestion control is a key function of the transport

layer. A router buffer is shared by multiple independent

sessions in a store-and-forward communication network.

When the instantaneous arrival rate is higher than the output rate, the router buffer occupancy grows.

Congestion occurs when the buffer is overflow, resulting in packet loss.

Page 15: Presented By: Vasantha Lakshmi Gutha Graduate student (CS) Course: CENG 5931 University of Houston-Clear Lake Guthav6317@uhcl.edu Spring 2011.

CONCLUSION Networks are becoming a strategic cornerstone for

organizations in every industry. As companies explore new global marketplaces and

virtual organizations, they really increasingly on electronic communication.

Access to networks becomes a crucial component of business maneuvers in today’s business environment.

Page 16: Presented By: Vasantha Lakshmi Gutha Graduate student (CS) Course: CENG 5931 University of Houston-Clear Lake Guthav6317@uhcl.edu Spring 2011.

REFERENCESReferences:

1. Cognitive Radio Communications and Networks: Principles and Practice by Alexander M. Wyglinski, Maziar Nekovee, Thomas Hou

2. Local control of cognitive radio networks: Christian Doerr · Dirk Grunwald · Douglas C. Sicker

3. Communication Network http://www.samson.de/pdf_en/l155en.pdf

Page 17: Presented By: Vasantha Lakshmi Gutha Graduate student (CS) Course: CENG 5931 University of Houston-Clear Lake Guthav6317@uhcl.edu Spring 2011.

THANK YOU