Latest Posts

27
Taking-Turns Protocols
Taking-Turns Protocols

Remember that two desirable properties of a multiple access protocol are (1) when only one node is active, the active node has a throughput of R bps, and (2) when M nodes are active, then each active node has a throughput of nearly R/M bps. The ALOHA and CSMA protocols have

Tags taking-turns protocols, polling protocol, token-passing protocol, token ring lan, ffdi, lans
55
Random Access Protocols
Random Access Protocols

The second broad class of multiple access protocols are random access protocols. In a random access protocol, a transmitting node always transmits at the full rate of the channel, namely, R bps. When there is a collision, each node involved in the collision repeatedly retransmits its

Tags random access protocol, transmitting node, carrier sensing, collision detection
75
Multiple Access Protocols
Multiple Access Protocols

In the introduction to this section, we noted that there are two types of network links: point-to-point links and broadcast links. A point-to-point link consists of a single sender at one end of the link and a single receiver at the other end of the link. Many link-layer protocols have

Tags broadcast link, cocktail party, multiple access protocols, frame, cdma networks
78
Error-Detection and -Correction Techniques
Error-Detection and -Correction Techniques

In the previous section, we noted that bit-level error detection and correction - detecting and correcting the corruption of bits in a link-layer frame sent from one node to another physically connected neighboring node - are two services often provided by the link layer. We saw in

Tags link layer, parity bit, fec techniques, checksumming techniques, internet checksum, crc codes
96
The Link Layer and Local Area Networks
The Link Layer and Local Area Networks

So far we have learned that the network layer provides a communication service between two hosts. As illustrated in Figure 1, this communication path comprises a series of communication links, starting at the source host, passing through a series of routers, and ending at

Tags network layer, routers, link layer, frames, network adapter
107
Multicast
Multicast

We have examined in the previous section that with broadcast service, packets are delivered to each and every node in the network. In this section we'll focus on multicast service, in which a multicast packet is delivered to only a subset of network nodes. A number of emerging

Tags multicast packet, address indirection, multicast group, soft state, pruning, multicast router
111
Broadcast and Multicast Routing
Broadcast and Multicast Routing

So far in this section, our focus has been on routing protocols that support unicast (i.e., point-to-point) communication, in which a single source node sends a packet to a single destination node. In this section, we focus on broadcast and multicast routing protocols. In broadcast

Tags broadcast routing, multicast routing, broadcast storm, reverse path forwarding, spanning tree, routing protocols
115
Inter-AS Routing: BGP
Inter-AS Routing: BGP

We just studied how ISPs use RIP and OSPF to find out optimal paths for source-destination pairs that are internal to the same AS. Let's now consider how paths are determined for source-destination pairs that span multiple ASs. The Border Gateway Protocol version 4, is the de

Tags bgp peers, subnet, routers, bgp session, autonomous system, peering link, stub network
111
Intra-AS Routing in the Internet: OSPF
Intra-AS Routing in the Internet: OSPF

Like RIP, OSPF routing is extensively used for intra-AS routing in the Internet. OSPF and its closely related cousin, IS-IS, are normally deployed in upper-tier lSPs whereas RIP is deployed in lower-tier ISPs and enterprise networks. The Open in OSPF indicates that the routing

Tags autonomous system, ospf packet, area border routers, link weights
210
Routing in the Internet
Routing in the Internet

After studying Internet addressing and the IP protocol, we now turn our attention to the Internet's routing protocols; their job is to determine the path taken by a datagram between source and destination. We'll see that the Internet's routing protocols embody many of the principles

Tags internet addressing, routing protocol, interior gateway protocols, rip response message, routing table,

Copy Right

The contents available on this website are copyrighted by TechPlus unless otherwise indicated. All rights are reserved by TechPlus, and content may not be reproduced, published, or transferred in any form or by any means, except with the prior written permission of TechPlus.