application_protocol_design_i

application_protocol_design_i - IEG 4180 Network Software...

Info iconThis preview shows pages 1–9. Sign up to view the full content.

View Full Document Right Arrow Icon
IEG 4180 IEG 4180 Network Software Design and Programming Network Software Design and Programming Application Protocol Design Application Protocol Design Part I Part I – Architecture and Algorithms Architecture and Algorithms
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
IEG4180: Network Software Design and Programming - Application Protocol Design Part I 2 Copyright Jack Y. B. Lee All Rights Reserved Contents • 1. Introduction • 2. Topology • 3. Data Delivery Model • 4. Security • 5. Implementation Issues • 6. Interaction Model • 7. Protocol Encoding • 8. Compatibility
Background image of page 2
IEG4180: Network Software Design and Programming - Application Protocol Design Part I 3 Copyright Jack Y. B. Lee All Rights Reserved 1. Introduction • Protocols for Network Applications Network Application Transport Protocols Network Protocol Data-link and MAC Layer Reference Model Network Application TCP / UDP IP Ethernet, ATM, etc. Internet Protocols Transport Protocols Network Application Application Protocols Users Users Users Protocol #1 Protocol #3 Protocol #2 “Want” “What” “How”
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
IEG4180: Network Software Design and Programming - Application Protocol Design Part I 4 Copyright Jack Y. B. Lee All Rights Reserved 2. Topology • Message Flow ± Half-Duplex Process A Process B Msg Msg Msg Time Time Characteristics: •Process ±A±–Send±on
Background image of page 4
IEG4180: Network Software Design and Programming - Application Protocol Design Part I 5 Copyright Jack Y. B. Lee All Rights Reserved 2. Topology • Message Flow ± Simplex Process A Process B Msg Msg Msg Time Time Characteristics: • Only one peer can send at any one time. Msg
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
IEG4180: Network Software Design and Programming - Application Protocol Design Part I 6 Copyright Jack Y. B. Lee All Rights Reserved 2. Topology • Message Flow ± Full Duplex Process A Process B Msg Msg Msg Time Time Characteristics: • Both peers can send simultaneously. Msg Msg Question: Is it possible to implement a full-duplex protocol over a half-duplex network (e.g., satellite receiver)?
Background image of page 6
IEG4180: Network Software Design and Programming - Application Protocol Design Part I 7 Copyright Jack Y. B. Lee All Rights Reserved 2. Topology • Connectivity ± One-to-One • Involves exactly two network application processes (peers). Process A Process B Connection States Connection States {Local A, Peer B, …} {Local A, Peer Y, …} i i +1 {Local A, Peer X, …} i -1 . . . {Local B, Peer A, …} {Local B, Peer V, …} j j +1 {Local B, Peer U, …} j -1 . . .
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
IEG4180: Network Software Design and Programming - Application Protocol Design Part I 8 Copyright Jack Y. B. Lee All Rights Reserved 2. Topology • Connectivity ± One-to-Many and Many-to-One • State management is not symmetric. Process A
Background image of page 8
Image of page 9
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 05/18/2010 for the course INFORMATIO IEG 4180 taught by Professor Jacky.b.lee during the Spring '09 term at CUHK.

Page1 / 65

application_protocol_design_i - IEG 4180 Network Software...

This preview shows document pages 1 - 9. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online