Sunteți pe pagina 1din 12

Class Structure

CSIS 7304 • Instructor: Dr. Ka-Cheong Leung


The Wireless Internet and – E-mail: kcleung@eee.hku.hk
– Office Hours: Wednesdays 5:00 – 6:00 p.m. or
Mobile Computing by appointment
• Web page: http://www.cs.hku.hk/~cs7304
Dr. Ka-Cheong Leung – lecture notes and supplementary readings
– assignment handouts and lecture recordings
(http://www.cs.hku.hk/~c7304)
– announcements

Dr. Ka-Cheong Leung CSIS 7304 The Wireless Internet and Mobile Computing Slide 1 Dr. Ka-Cheong Leung CSIS 7304 The Wireless Internet and Mobile Computing Slide 2

Course Readings Grading


• Required textbook • Written assignments 9%
– Mobile Communications
Jochen Schiller, Second Edition, Addison Wesley, 2003 • Midterm Examination (12 July 2006) 26%
• Reference textbook • Final Examination 65%
– Wireless Communications and Networks
William Stallings, Second Edition, Prentice Hall, 2005 • Assignments
– submit electronically via
• Additional readings on wireless TCP http://msccs.cs.hku.hk/intranet2005/default.asp
– will be available on the class web page – due at 7 p.m. on the designated due dates
– no late assignments accepted for credit

Dr. Ka-Cheong Leung CSIS 7304 The Wireless Internet and Mobile Computing Slide 3 Dr. Ka-Cheong Leung CSIS 7304 The Wireless Internet and Mobile Computing Slide 4
Policies Policies
• Advised to acquire the required textbook and
possess a copy of any required readings • No extension granted for the assignments
– need to read any supplementary readings • No make-up midterm and final examination
– not all details covered in class • Academic Integrity Policy prohibits plagiarism
– all work submitted for credit must be done on your own
• responsible to fill in any missing background – work or ideas developed by someone else must be properly
– Prerequisite cited in your coursework
• basic understanding of computer systems and
networking protocols When scholastic dishonesty is suspected, the
• Read ahead the readings to aid your case will be reported to the University
understanding of lectured materials and Disciplinary Committee.
engage class discussions
Dr. Ka-Cheong Leung CSIS 7304 The Wireless Internet and Mobile Computing Slide 5 Dr. Ka-Cheong Leung CSIS 7304 The Wireless Internet and Mobile Computing Slide 6

Acknowledgement Course Topics


• Some lecture slides adopted from:
– presentation slides of “Mobile Communications” (our required • Wireless transmission basics
textbook) authored by Dr. Jochen Schiller
– lecture notes used at the University of Southern California and
evolved over many years, with contributions from Dr. Deborah
• Medium access control
Estrin, Dr. Ramesh Govindan, Dr. Christos Papadopoulos, Dr. John
Heidemann, and Dr. Bill Cheng • GSM and UMTS
• I do introduce and modify some of the slides to fit in our class. • Wireless LANs
Please give credit to the contributors and raise any “bug”
reports to me ☺ • Mobile IP and DHCP
• Mobile transport layer
• All course materials are copyrighted. Any use or
redistribution outside this course is prohibited without
prior permission from all contributors.
• Support for mobility

Dr. Ka-Cheong Leung CSIS 7304 The Wireless Internet and Mobile Computing Slide 7 Dr. Ka-Cheong Leung CSIS 7304 The Wireless Internet and Mobile Computing Slide 8
Focus of the Class The Internet, Circa 1969
• Goal: “Learn how to learn”
– skills acquired for your life, not just for this class
– learn the interplay between human and systems
• Protocols and mechanisms
– will not deal with how bits move in physical media
– did this in your undergraduate class
• We will deal with:
– protocol rules and algorithms for wireless
communications
– investigate mechanism tradeoffs
– why this way and not another?
Dr. Ka-Cheong Leung CSIS 7304 The Wireless Internet and Mobile Computing Slide 9 Dr. Ka-Cheong Leung CSIS 7304 The Wireless Internet and Mobile Computing Slide 10

The Internet, on a Poster, Circa 2000


A Recent Internet ISP Map

[data courtesy of
UCSD’s caida]

Dr. Ka-Cheong Leung CSIS 7304 The Wireless Internet and Mobile Computing Slide 11 Dr. Ka-Cheong Leung CSIS 7304 The Wireless Internet and Mobile Computing Slide 12
Internet Development Mantra Glimpses of the Future?
UCB mote:
Quote from a t-shirt commonly worn at an 8-bit sensor node
IETF meetings: with non-IP based
networking

“We reject kings, presidents and voting.


We believe in rough consensus and http://www.picoweb.net/
(an 8-bit web server with
a sensor network
running code.” (Dave Clark) Ethernet) (tracking the truck)

Dr. Ka-Cheong Leung CSIS 7304 The Wireless Internet and Mobile Computing Slide 13 Dr. Ka-Cheong Leung CSIS 7304 The Wireless Internet and Mobile Computing Slide 14

Some Definitions Networks


Point-to-Point
• Host: computer, PDA, light switch, ...
• Link: path followed by bits

– Wire or wireless Multiple Access
– Broadcast or switched (or both)
• Switch: moves bits between links …
– Packet switching: stateless, store & forward Wireless
– Circuit switching: stateful, cut through

Dr. Ka-Cheong Leung CSIS 7304 The Wireless Internet and Mobile Computing Slide 15 Dr. Ka-Cheong Leung CSIS 7304 The Wireless Internet and Mobile Computing Slide 16
Switched Networks What Is the Problem?
• A network can be defined recursively as...
– two or more nodes – two or more networks
connected by a link, connected by two or
or more nodes

Dr. Ka-Cheong Leung CSIS 7304 The Wireless Internet and Mobile Computing Slide 17 Dr. Ka-Cheong Leung CSIS 7304 The Wireless Internet and Mobile Computing Slide 18

What Is the Problem? But What to Scale?


Always define what kind of“scale” you mean
– Number of hosts, globally routable
– Network should support many link layers
– Geographic distance
– Many versions of software, hardware technologies
– Range of bandwidths
– Different application needs (QoS, etc.)
– Levels of trust / administrative boundaries
– Range of price points for hardware
Lots of dimensions of “scaling” to consider

Dr. Ka-Cheong Leung CSIS 7304 The Wireless Internet and Mobile Computing Slide 19 Dr. Ka-Cheong Leung CSIS 7304 The Wireless Internet and Mobile Computing Slide 20
Applications Rule! Application Considerations
• Sometimes easy to forget in this course • Application input to network
– Traffic data rate
• Aside: What are the implications of global – Traffic pattern (bursty or constant bit rate)
connectivity? – Traffic target (multipoint or single
– Technological issues destination, mobile or fixed)
– Societal issues
– Economic issues
• Network service delivered to application
– Security issues – Delay sensitivity
– etc. – Loss sensitivity

Dr. Ka-Cheong Leung CSIS 7304 The Wireless Internet and Mobile Computing Slide 21 Dr. Ka-Cheong Leung CSIS 7304 The Wireless Internet and Mobile Computing Slide 22

Reliable File Transfer Remote Login


• Loss sensitive • Loss sensitive
• Not delay sensitive relative to round trip • Delay sensitive
times – Subject to interactive constraints
• Point-to-point or multipoint – Can tolerate up to several hundreds of
milliseconds
• Bursty
• Bursty
• Point to point

Dr. Ka-Cheong Leung CSIS 7304 The Wireless Internet and Mobile Computing Slide 23 Dr. Ka-Cheong Leung CSIS 7304 The Wireless Internet and Mobile Computing Slide 24
Network Audio Network Video
• Relatively low bandwidth • High bandwidth
– Digitized samples, packetized • Compressed video, bursty
• Delay variance sensitive
• Loss tolerance function of compression
• Loss tolerant
• Delay tolerance a function of
• Possibly multipoint, long duration
interactivity
sessions
– Natural limit to number of simultaneous • Possibly multipoint
senders • Larger number of simultaneous sources
Dr. Ka-Cheong Leung CSIS 7304 The Wireless Internet and Mobile Computing Slide 25 Dr. Ka-Cheong Leung CSIS 7304 The Wireless Internet and Mobile Computing Slide 26

Web Disruptive Applications


• Transactional traffic • Applications that “disrupt” business as usual
– Short requests, possibly large responses • Not easy to predict: multicast case in point
• Loss (bug?) tolerant • Web was arguably the first, and not many
saw that coming
• Delay sensitive
• Napster is the poster child
– Human interactivity
• Gnutella, Kazaa, Morpheus (?)
• Point-to-point (multipoint is • Others? What’s next?
asynchronous)
Dr. Ka-Cheong Leung CSIS 7304 The Wireless Internet and Mobile Computing Slide 27 Dr. Ka-Cheong Leung CSIS 7304 The Wireless Internet and Mobile Computing Slide 28
Getting Started
• Host configuration
The Global Network • Network configuration
• ISP
• Computers meeting computers
• Computers exchanging data

Dr. Ka-Cheong Leung CSIS 7304 The Wireless Internet and Mobile Computing Slide 29 Dr. Ka-Cheong Leung CSIS 7304 The Wireless Internet and Mobile Computing Slide 30

Host Configuration A Network


• Host configuration needs: • Network configuration needs:
– a physical network cable (Ethernet, etc.) – wires (from the phone or cable company)
– an IP address – Router(s)
– a network mask – a firewall?
– a gateway – an ISP to connect to the Internet
– a DNS server (and other servers) – network addresses (e.g. 192.168.1.xxx)
• Automated with DHCP – servers

Dr. Ka-Cheong Leung CSIS 7304 The Wireless Internet and Mobile Computing Slide 31 Dr. Ka-Cheong Leung CSIS 7304 The Wireless Internet and Mobile Computing Slide 32
An ISP What Is….
• ISP needs:
– a (big?) block of addresses
– connections to one or more other ISPs, peerings
– multiple routers, probably at exchange points • Structure
– servers for your users: mail, web, etc. • Metrics
– servers for you: monitoring, etc
• Failure modes
– competent network admins (recommended)
– an AUP (Acceptable Use Policy)
• Functions
– a lawyer
Dr. Ka-Cheong Leung CSIS 7304 The Wireless Internet and Mobile Computing Slide 33 Dr. Ka-Cheong Leung CSIS 7304 The Wireless Internet and Mobile Computing Slide 34

Idealized Network Structure How Do Computers Find Each Other?

Backbones Computer1 Computer 2

Regionals Internet

Campus LANs

Dr. Ka-Cheong Leung CSIS 7304 The Wireless Internet and Mobile Computing Slide 35 Dr. Ka-Cheong Leung CSIS 7304 The Wireless Internet and Mobile Computing Slide 36
What Are the Different Kinds of Addresses? Domain Naming System (DNS)
• Have domain name (e.g., www.hku.hk) Local
– Global, human readable name Computer 1 DNS server
• DNS translates name to IP address What’s the IP address for www.hku.hk?
(e.g. 147.8.145.50)
– Global, understood by all networks It is 147.8.145.50
• Finally, we need local net address
DNS address manually configured into OS
– e.g., Ethernet (08-00-2c-19-dc-45)
Packets have IP address information
– Local, works only on a particular network
=> DNS server knows Computer 1’s address
Dr. Ka-Cheong Leung CSIS 7304 The Wireless Internet and Mobile Computing Slide 37 Dr. Ka-Cheong Leung CSIS 7304 The Wireless Internet and Mobile Computing Slide 38

Finding Ether Address: Address Resolution (ARP) Sending a Packet Through the Internet
Routers send a packet
to next closest point
H R

R
H
H H R
Broadcast: who knows the
R
Ethernet address for 147.8.145.50?
R
Ethernet

R R
H
Broadcast: I do, it is R H: Hosts
08-00-2c-19-dc-45 H
R: Routers
Ethernet
Dr. Ka-Cheong Leung CSIS 7304 The Wireless Internet and Mobile Computing Slide 39 Dr. Ka-Cheong Leung CSIS 7304 The Wireless Internet and Mobile Computing Slide 40
How Do the Routers Know Where to Send Data? Network Metrics
• Forwarding tables at each router • Bandwidth
populated by routing protocols – Transmission capacity (a.k.a. How many
• Original Internet: manually updated bits can fit in a section of a link?)
• Routing protocols update tables based • Delay
on “cost” – queueing delay
– Exchange tables with neighbors or – Propagation delay (limited by c)
everyone • Delay-bandwidth product
– Use neighbor leading to shortest path – Important for control algorithms

Dr. Ka-Cheong Leung CSIS 7304 The Wireless Internet and Mobile Computing Slide 41 Dr. Ka-Cheong Leung CSIS 7304 The Wireless Internet and Mobile Computing Slide 42

Network Failures Some Backsliding about Robustness

• Packet loss • NAT boxes


– Queue overflows
• Application-level gateways
– Line noise
• Node or link failures • Layer-3 caches
• Routing transients or failures • User tweaking
• Application level service failures
• Some failure is expected (e.g. congestive • All violate the end-to-end principles
loss), but too much failure is bad – Reduce robustness
Dr. Ka-Cheong Leung CSIS 7304 The Wireless Internet and Mobile Computing Slide 43 Dr. Ka-Cheong Leung CSIS 7304 The Wireless Internet and Mobile Computing Slide 44
Lack of Security in the Network Engineering Trade-offs
• Eavesdropping
– credit card numbers or passwords in packets Network can be engineered to provide:
• Using other people’s resources
– worms, DDoS
• Reliability
• Breaking into machines • Low delay
– software bugs, poor configuration, trojan horses
• Cost
• Other things
– physical security, social engineering

• But, strong security is possible


Pick any two
– requires all of good protocols, implementation, and people

Dr. Ka-Cheong Leung CSIS 7304 The Wireless Internet and Mobile Computing Slide 45 Dr. Ka-Cheong Leung CSIS 7304 The Wireless Internet and Mobile Computing Slide 46

S-ar putea să vă placă și