Computer Science ๐ŸŒ‹/Network Programming ๐Ÿ›ฐ๏ธ

Computer Science ๐ŸŒ‹/Network Programming ๐Ÿ›ฐ๏ธ

MAC Protocols (3)

Today, I learned about the CSMA collisions, "Taking turns" MAC protocols and Cable Internet. Compared to ALOHA, CSMA is more polite protocol algorithm. CSMA: Carrier Sense Multiple access CSMA: listen before transmit: If channel sensed idle: transmit entire frame. If channel sensed busy, defer transmission. In human analogy, "don't interrupt others!" Collision can still occur: Due to propagation..

Computer Science ๐ŸŒ‹/Network Programming ๐Ÿ›ฐ๏ธ

MAC Protocols (2)

Continue to previous review. An ideal multiple access protocol Given: broadcast channel of rate R bps Desiderata: When one node wants to transmit, it can send at rate R. When M nodes want to transmit, each can send at average rate R/M The protocol is fully decentralized: No special node to coordinate transmissions No synchronization of clocks, time slots No master node that represents a single p..

Computer Science ๐ŸŒ‹/Network Programming ๐Ÿ›ฐ๏ธ

MAC protocol (1)

Today, I learned about the MAC protocol. Where is the link layer implemented? At each interface of hosts, routers, switches, access points Link layer implemented mainly in "adoptor" (aka network interface card NIC) or on a chip. e.g. Ethernet card (LAN), 802.11 card (WLAN) NIC implements link layer and physical layer Link layer is implemented in both NIC (hardware) Operating System (software) Fr..

Computer Science ๐ŸŒ‹/Network Programming ๐Ÿ›ฐ๏ธ

TCP (2)

Today, I learned more about the TCP. There are two type of message in TCP: Seq# Byte stream "number" of first byte in segment's data Ack# Seq # of next byte expected from other side So, the packet which is not acknowledged yet is yellow packets. Buffer moves to the next sequence of packets. RTT: Round Trip Time RTT is the length of time it takes for a message to be sent plus the length of time i..

Computer Science ๐ŸŒ‹/Network Programming ๐Ÿ›ฐ๏ธ

TCP (1)

Today, I learned about the TCP. These are the features of TCP. Point-to Point (not Bcast) Single sender, single receiver. Routers don't know TCP con. Reliable, in-order byte stream no "message boundaries" Pipelined TCP congestion and flow control set window size TCP connection state Send and receive buffer Congestion ctrl parameters Sequence number, ACK number for reliability Full duplex data Bi..

Computer Science ๐ŸŒ‹/Network Programming ๐Ÿ›ฐ๏ธ

UDP

Today, I learned about the TCP/UDP model. First, I would like talk about the UDP. Before talking about the UDP, I want to reviewed the daily network strucutre! This is how our network form using TCP model. In the chat room project, I learned that most interactive software program use the TCP! Then, what is UDP? UDP: User Datagram Protocol "Best effort" service, UDP segments may be: Lost Delivere..

Computer Science ๐ŸŒ‹/Network Programming ๐Ÿ›ฐ๏ธ

Data Center Network

Today, I learned about the Data center, which most big tech companies have. 10's to 100's of thousands of hosts, often closely coupled, in close proximity: e-business (ex. Amazon) Content-servers (ex. YouTube, Akamai, Apple, Microsoft) Search engines, data mining (ex. Google) Challenges: Multiple applications, each serving massive numbers of clients Managing/balancing load, avoiding processing, ..

Computer Science ๐ŸŒ‹/Network Programming ๐Ÿ›ฐ๏ธ

A day in life network

People use the network everywhere. Today, I learned about the scenario in real world network. This picture shows us how network make us use the internet in daily life. Connecting laptop needs to get its own IP address, address of first-hop router, address of DNS server. DNS server: use DHCP DHCP request encapsulated in UDP, encapsulated in IP, encapsulated in 802.3 Ethernet Ethernet frame broadc..

Computer Science ๐ŸŒ‹/Network Programming ๐Ÿ›ฐ๏ธ

VLAN

Today, I learned about the VLANs. VALNs: Motivation Drawbacks of this configuration: Lack of traffic isolation: Single broadcast domain: all layer-2 broadcast traffic (APR, DHCP, switch flooding to find unknown location of destination MAC address must cross entire LAN. Secuirty/privacy, efficiency issues Inefficient use of swithches: Each small group needs a switch, while a switch has 96 ports M..

Computer Science ๐ŸŒ‹/Network Programming ๐Ÿ›ฐ๏ธ

Switch

Today, I learned about the switch. What is switch?? ๐Ÿคจ Features: Hosts have dedicated direct connection to switch. Switches buffer packets. Ethernet protocol used on each incoming link, but no collisions; full duplex. Each link is its own collision domain. Example: 'A-to-A' and 'B-to-B' can transmit simultaneously, without collision. Here is the question: how does switch know A' reachable via int..

KB0129
'Computer Science ๐ŸŒ‹/Network Programming ๐Ÿ›ฐ๏ธ' ์นดํ…Œ๊ณ ๋ฆฌ์˜ ๊ธ€ ๋ชฉ๋ก