0% found this document useful (0 votes)
13 views25 pages

2024 ECEN423 Slide 1 Updated

The document outlines the course ECEN 423-500 on Computer and Wireless Networks, taught by Professor Xi Zhang, covering topics such as internet architecture, wireless communications, and hybrid networks. It emphasizes the importance of class participation, hands-on projects, and prior knowledge in calculus and programming. Key components include discussions on TCP/IP protocols, flow control mechanisms, and the growth of wireless networks and hotspots.

Uploaded by

ecuevas06
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views25 pages

2024 ECEN423 Slide 1 Updated

The document outlines the course ECEN 423-500 on Computer and Wireless Networks, taught by Professor Xi Zhang, covering topics such as internet architecture, wireless communications, and hybrid networks. It emphasizes the importance of class participation, hands-on projects, and prior knowledge in calculus and programming. Key components include discussions on TCP/IP protocols, flow control mechanisms, and the growth of wireless networks and hotspots.

Uploaded by

ecuevas06
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 25

ECEN 423-500

“Computer and Wireless Networks”

Course Materials: Papers, Reference Texts: Bertsekas/Gallager, Stuber, Stallings, etc


Lecture notes and Paper Reading Lists: available on-line as follows:

Class Website:
https://people.engr.tamu.edu/xizhang/ECEN423/index.html

Instructor’s Research & Projects: https://people.engr.tamu.edu/xizhang

Instructor: Professor Xi Zhang


E-mail: [email protected]

1
Course Introductions and
Contents Overview

Lecture No. 1
Computer Communications Networks Architecture

Internet
Backbone Base Station
Fixed Host

Wireless Cell Mobile Host

3
Why Computer and Mobile Wireless
Networks
• Why computer and wireless networking?
– Location independent access to network resources =>
very convenient for mobile users
– Cost effective => no wiring or cable connections
needed
– Group communications oriented => easy to implement
broadcast & Multicast
– Wireless will do to the Internet what laptops did to
computers => future trends of networking & computing
4
Growth of Wireless Networks Users
Wireless Phone Subscribers (in millions)

70
60
50
40
30
20
10
0
1991 1993 1995 1997

Source: cellular telecom. I ndus. Assn.


Wireless Data Subscriber (in millions)

12
10
8
6
4
2
0
1997 1998 1999 2000 2001 2002
5
Source: Strategis Market Res.
Wireless Internet Wi-Fi Hotspots Space

• It is one of the fastest growing industry sectors


– More than 1,000,000 public hotspots by 2007~2008
• Almost notebooks will have automatically
embedded Wi-Fi card
• Go and check the local hotspots online
– www.ezgoal.com/hotspots/

6
The Course Description
• Only recommended (required) textbooks for this
course, but many classic/recent research papers
• Read and discuss
– your class participation counts
• practice what you have learned
– get your hands dirty: do several term projects
– try to write up research papers
• Tips of taking this class
– You are expected to be prepared for each lecture by
reading the paper BEFORE coming to the lecture
7
Prerequisites
• Basic knowledge of calculus
• Programming experiences
– familiar with C/C++/UNIX
– useful reference books:
• “Internetworking with TCP/IP, Vol’s I, II, III” by
Doug Comer
• “TCP/IP Illustrated, Vol’s 1 & 2” by Stevens

8
Course Components
• Part-I
– Internet architecture and design philosophy
• Part-II
– Wireless communications & networks systems
designs
• Part-III
– Hybrid wireline and wireless networks

9
Start with Internet Architectures

Overview/Review:
• Internet protocol stack
• TCP/IP protocol
• IP and routing algorithms
• MAC/Data link protocol
• PHY layer algorithms

10
Protocol Stack (Internet Philosophy)
• Wireless Web, Location
Independent Services, etc.
Application Layer
 Content adaptation,
Consistency, File systems

Middleware and OS  Wireless TCP

 Mobility, Routing, Ad Hoc


Transport Layer Networks
 QoS

o Scheduling, Ch. Allocations


Network Layer o MAC/PHY Cross-Layer

Link & PHY Layers 11


Packet Switched Networks
• Hosts send data in packets
• network supports all data
communication services by delivering
Host Host
packets video Application

– Web, email, multimedia


Host

Web

Host Host

email
12
One network application example

[email protected] [email protected]
msg

13
What is happening inside ?

[email protected] email
[email protected]
msg
Transport Transport
protocol protocol
Network
Network protocol Network
protocol protocol
Network
protocol
Physical net physical net
Physical net 14
Layered Network Architecture
• network consists of geographically
distributed hosts and switches (nodes)
• Nodes communicate with each other
by standard protocols
A C
host switch
A B C

B
D physical connectivity

network topology Protocol layers


15
a picture of protocol layers
A Application (data)

header data
Transport segment
header DATA
network packet
header DATA tail
Ethernet frame
B
physical connectivity

What’s in the header: info needed for the protocol’s function


16
TCP/IP Protocol Suite
• IP Protocol: Inter-networking protocol
– RFC791
• TCP Protocol: reliable transport protocol
– RFC793

17
The picture of the world
according to IP
application protocols
TCP UDP transport
transport layer protocols
(end-to-end)

universal datagram delivery IP inter-network layer

subnets
hardware-specific
network technologies ethernet token-ring FDDI dialup ATM

18
TCP: Transmission Control Protocol
• a transport protocol
– IP delivers packets “from door to door”
– TCP provides full-duplex, reliable byte-
stream delivery between two application
processes
Application process Application process

More terminology: Write Read


• TCP segment bytes bytes

• Max. segment
TCP TCP
size (MSS)
Send buffer Receive buffer

segment segment 19
TCP: major functionalities
• Header format
• Connection Management
• Open, close
• State management
• Reliability management
• Flow and Congestion control
• Flow control: Do not flood the receiver’s
buffer
• Congestion control: Do not stress the
network by sending too much too fast

20
TCP header format
0 16 31

IP header

source port destination port

Data sequence number


acknowledgment number
u a p r s f
Hlen unused r c s s y i window size
g k h t n n
checksum urgent pointer
Options (viable length)

data

21
opening a connection:
three-way hand-shake

client
open request(x)
server

Passive open

ack(x+1) + request(y)
ack(y+1) enter estab. state
(now in estab. state)

22
TCP’s Two Major Functional Components
• [1] Flow control and congestion control
– Refer to a set of techniques enabling a data source to match
its transmission rate to the currently available service rate at
the receiver and in the networks.
– Flow Control Mechanism Design Ceriteria
» Simple to implement and use least network resources
» Scales well as the network size increases
» Must be stable and converging to equilibriums
• [2] Error Control and Loss Recovery
– Refer to a set of techniques to detect and correct data losses
– Two levels of error control
» Bit-level: inversion of 0 bit to 1, or 1 bit to 0, also called bit corruption =>
often occur over the mobile and wireless networks
» Packet-level: packet loss, duplications, reordering => often occur and be
treated at higher layer protocol, such as TCP, over wired networks.
» Erasure error: the information about the positions of error/loss is
available for error control => packet level loss usually be treated as
erasure loss by using sequence number.

23
Classification of Flow Control Mechanisms

• Open-loop control scheme


– Flow control function is achieved without using
feedback via the closed-loop channel.
• Closed-loop flow control scheme
– Flow control adapt its transmission rate to the bottleneck
available bandwidth according to the feedback through the
closed-loop channel
» Window-based scheme vs. Rate-based schemes
» Explicit scheme vs. Implicit scheme
» End-to-end scheme vs. Hop-by-Hop scheme
• Hybrid schemes
– Mixing open-loop flow control with closed-loop scheme

24
TCP Flow Control Categories and Principles

• Flow control categories


– Implicit,
– Window-based,
– End-to-End scheme.
• TCP Hahoe
– Use timeout to detect packet loss and congestions
• TCP Reno
– Use triple-duplicate ACK to same sequence number and
timeouts to detect packet loss and congestions
– Use fast retransmissions and fast recovery
» Skip Slow Start phase
• TCP Vegas
– Use expected and measured throughputs to detect
congestions
25

You might also like