2024 ECEN423 Slide 1 Updated
2024 ECEN423 Slide 1 Updated
Class Website:
https://people.engr.tamu.edu/xizhang/ECEN423/index.html
1
Course Introductions and
Contents Overview
Lecture No. 1
Computer Communications Networks Architecture
Internet
Backbone Base Station
Fixed Host
3
Why Computer and Mobile Wireless
Networks
• Why computer and wireless networking?
– Location independent access to network resources =>
very convenient for mobile users
– Cost effective => no wiring or cable connections
needed
– Group communications oriented => easy to implement
broadcast & Multicast
– Wireless will do to the Internet what laptops did to
computers => future trends of networking & computing
4
Growth of Wireless Networks Users
Wireless Phone Subscribers (in millions)
70
60
50
40
30
20
10
0
1991 1993 1995 1997
12
10
8
6
4
2
0
1997 1998 1999 2000 2001 2002
5
Source: Strategis Market Res.
Wireless Internet Wi-Fi Hotspots Space
6
The Course Description
• Only recommended (required) textbooks for this
course, but many classic/recent research papers
• Read and discuss
– your class participation counts
• practice what you have learned
– get your hands dirty: do several term projects
– try to write up research papers
• Tips of taking this class
– You are expected to be prepared for each lecture by
reading the paper BEFORE coming to the lecture
7
Prerequisites
• Basic knowledge of calculus
• Programming experiences
– familiar with C/C++/UNIX
– useful reference books:
• “Internetworking with TCP/IP, Vol’s I, II, III” by
Doug Comer
• “TCP/IP Illustrated, Vol’s 1 & 2” by Stevens
8
Course Components
• Part-I
– Internet architecture and design philosophy
• Part-II
– Wireless communications & networks systems
designs
• Part-III
– Hybrid wireline and wireless networks
9
Start with Internet Architectures
Overview/Review:
• Internet protocol stack
• TCP/IP protocol
• IP and routing algorithms
• MAC/Data link protocol
• PHY layer algorithms
10
Protocol Stack (Internet Philosophy)
• Wireless Web, Location
Independent Services, etc.
Application Layer
Content adaptation,
Consistency, File systems
Web
Host Host
email
12
One network application example
[email protected] [email protected]
msg
13
What is happening inside ?
[email protected] email
[email protected]
msg
Transport Transport
protocol protocol
Network
Network protocol Network
protocol protocol
Network
protocol
Physical net physical net
Physical net 14
Layered Network Architecture
• network consists of geographically
distributed hosts and switches (nodes)
• Nodes communicate with each other
by standard protocols
A C
host switch
A B C
B
D physical connectivity
header data
Transport segment
header DATA
network packet
header DATA tail
Ethernet frame
B
physical connectivity
17
The picture of the world
according to IP
application protocols
TCP UDP transport
transport layer protocols
(end-to-end)
subnets
hardware-specific
network technologies ethernet token-ring FDDI dialup ATM
18
TCP: Transmission Control Protocol
• a transport protocol
– IP delivers packets “from door to door”
– TCP provides full-duplex, reliable byte-
stream delivery between two application
processes
Application process Application process
• Max. segment
TCP TCP
size (MSS)
Send buffer Receive buffer
segment segment 19
TCP: major functionalities
• Header format
• Connection Management
• Open, close
• State management
• Reliability management
• Flow and Congestion control
• Flow control: Do not flood the receiver’s
buffer
• Congestion control: Do not stress the
network by sending too much too fast
20
TCP header format
0 16 31
IP header
data
21
opening a connection:
three-way hand-shake
client
open request(x)
server
Passive open
ack(x+1) + request(y)
ack(y+1) enter estab. state
(now in estab. state)
22
TCP’s Two Major Functional Components
• [1] Flow control and congestion control
– Refer to a set of techniques enabling a data source to match
its transmission rate to the currently available service rate at
the receiver and in the networks.
– Flow Control Mechanism Design Ceriteria
» Simple to implement and use least network resources
» Scales well as the network size increases
» Must be stable and converging to equilibriums
• [2] Error Control and Loss Recovery
– Refer to a set of techniques to detect and correct data losses
– Two levels of error control
» Bit-level: inversion of 0 bit to 1, or 1 bit to 0, also called bit corruption =>
often occur over the mobile and wireless networks
» Packet-level: packet loss, duplications, reordering => often occur and be
treated at higher layer protocol, such as TCP, over wired networks.
» Erasure error: the information about the positions of error/loss is
available for error control => packet level loss usually be treated as
erasure loss by using sequence number.
23
Classification of Flow Control Mechanisms
24
TCP Flow Control Categories and Principles