Lecture11 - COP 5611 Operating Systems Spring 2010 Dan C...

Info iconThis preview shows pages 1–18. Sign up to view the full content.

View Full Document Right Arrow Icon
Click to edit Master subtitle style 5/13/10 Lecture 6 COP 5611 Operating Systems Spring 2010 Dan C. Marinescu Office: HEC 439 B Office hours: M-Wd 2:00-3:00 PM
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
5/13/10 22 2 Lecture 11 n Reading Assignment: Chapter 7 from the online textbook n Last time: ¨ Layering ¨ Link layer n Today: ¨ More about layering and broadcast channels ¨ Network layer ¨ End-to-end-layer n Next time ¨ Congestion
Background image of page 2
5/13/10 First Come First Served (FCFS) 33
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
5/13/10 Stack algorithm 44
Background image of page 4
5/13/10 55
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
5/13/10 The network/transport interface 66
Background image of page 6
5/13/10 Bandwidth and latency 77
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
5/13/10 88 Application requirements
Background image of page 8
5/13/10 Mechanisms to be implemented by protocols of a protocol stack n Error control n Flow control n Congestion control 99
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
5/13/10 1010 Decisions in the Internet
Background image of page 10
5/13/10 The network layer n A network can be viewed as consisting of ¨ Network core – carries out segments from one communicating entity to another ¨ Network periphery – hosting the communicating entities at attachment points n Addressing – each communicating entity must have a unique address. 1111
Background image of page 11

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
5/13/10 Network model n The network layer transports packets n The network core consists of routers which forward packets using routing tables n The entities at the periphery of the network use the transport service provided by the core to communicate with one another. n For a host at the periphery of the network: ¨ the input for network layer on is a segment in a segment buffer at the transport layer. ¨ The output is a link layer buffer. 1212
Background image of page 12
5/13/10 1313   structure  packet bit_string  source   bit_string  destination   bit_string  end_protocol   bit_string  payload   procedure   NETWORK _ SEND  ( segment_buffer destination network_protocol end_protocol ) packet  instance  outgoing_packet outgoing_packet.payload    segment_buffer outgoing_packet.end_protocol  end_protocol outgoing_packet.source     MY _ NETWORK _ ADDRESS outgoing_packet.destination    destination NETWORK _ HANDLE  ( outgoing_packet net_protocol )
Background image of page 13

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
5/13/10 1414 procedure   NETWORK _ HANDLE  ( net_packet net_protocol ) packet  instance  net_packet if   net_packet.destination  °  MY _ NETWORK _ ADDRESS   then next_hop     LOOKUP  ( net_packet.destination forwarding_table ) LINK _ SEND  ( net_packet next_hop link_protocol net_protocol ) else GIVE _ TO _ END _ LAYER  ( net_packet.payload net_packet.end_protocol net_packet . source
Background image of page 14
5/13/10 Encapsulation 1515 frame check frame DATA end protocol DATA Segment presented to the network layer Packet presented to the link layer Frame appearing on the link destination sum network protocol DATA end protocol destination 1111111 97142 1111111 “Fire” RPC Example 41 —> 24 55316 IP mark mark
Background image of page 15

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
5/13/10 G K J source 1 2 3 A B C D E F 4 5 3 4 5 1 2 1 2 3 4 1 2 3 5 1 1 1 1 1 1 2 4 H destination The forwarding table at the nodes
Background image of page 16
5/13/10 destination link A end-layer all other 1 G K J source 1 2 3 A B C D E F 4 5 3 4 5 1 2 1 2 3 4 1 2 3 5 1 1 1 1 1 1 2 4 H destination Forwarding table at node A
Background image of page 17

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 18
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 05/12/2010 for the course CS COP5611 taught by Professor Dancristianmarinescu during the Spring '10 term at University of Central Florida.

Page1 / 49

Lecture11 - COP 5611 Operating Systems Spring 2010 Dan C...

This preview shows document pages 1 - 18. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online