Wireless Networks Technologies: 1. Wi-Fi (Wireless Fidelity)
Wireless Networks Technologies: 1. Wi-Fi (Wireless Fidelity)
-The mobile node just puts the IP address of the fixed node in the
destination field of its IP packets while putting its permanent
address in the source field, and the packets are forwarded to the
fixed node using normal means.
-This layer is responsible for delivering packets form src to st host.
forwarding: move packets from router’s input to appropriate
router output (data plane does forwarding)
routing: determine route taken by packets from source to
destination (control plane does routing)
1. Routing and Forwarding
Forwarding vs Routing
1. Routing and Forwarding
Data plane vs control plane
Data plane
-local, per-router function
-determines which output port to forward for a given datagram
arriving at router’s input port
Control plane
network-wide logic
determines the end-to-end route from src to dst that this datagram
should travel
1. Routing and Forwarding
- Destination-based forwarding considers dst IP address only when it
does lookup from the forwarding table (routing table).
-How does forwarding table look like?
• The bucket holds tokens, and they "leak" out at a fixed rate.
• When a new request or data packet comes in:
- If there are tokens in the bucket, the request is allowed, and the token
is removed from the bucket.
- If no tokens are available (the bucket is empty), the request is either
delayed or dropped.
• This ensures that there can be bursts of traffic, but only to a certain
extent — once the bucket reaches its capacity, the system won't allow
more traffic until the rate at which tokens leak out frees up space in the
bucket.
How the Leaky Bucky Bucket Algorithm Works
- The input rate can vary but the output rate remains constant. Similarly,
in mobile networks, leaky bucket technique can smooth out bursty
traffic. Bursts chunks are stored in the bucket and sent out at an
average rate.
How the Leaky Bucky Bucket Algorithm Works
• Tokens: Tokens are generated at a fixed rate (e.g., one token per
second) and placed in the "bucket.”
• Bucket: The bucket holds a limited number of tokens, and it has a
maximum capacity. Once the bucket reaches this maximum, any
additional tokens generated are discarded
• Token Consumption: Every time a request or data packet is sent, it
consumes a token from the bucket. If a token is available, the request
is allowed. If there are no tokens left, the request is either delayed or
dropped, depending on the system's configuration.
• Burst Handling: Since tokens accumulate over time, the Token Bucket
algorithm allows for bursts of traffic. For example, if a burst of
requests comes in and there are enough accumulated tokens, they
can be consumed quickly. If no tokens are available, the system may
either reject the request or buffer it until tokens become available.
How the Token Bucket Algorithm
Works
6. Network Layer Protocols
• This layer defines how data packets are structured, addressed and routed
1. Internet Protocol (IP)
• IPv4 (Internet Protocol version 4): The most widely used version of IP, which uses 32-bit
addresses to identify devices on a network (approximately 4.3 billion unique addresses).
• IPv6 (Internet Protocol version 6): The newer version, designed to address the limitation
of IPv4 address space, uses 128-bit addresses, allowing for a vast number of unique
addresses.
v) Cable and Satellite TV: These systems use coaxial cables or satellites
to transmit content directly to a subscriber’s receiver, often with
multiple channels.
Components of a Broadcasting System
-Studio (Content Creation)-Where the media is produced, such as
television studios for shows, newsrooms for radio broadcasts, and
editing suites.
-Transmission Equipment- Includes transmitters, antennas, and other
equipment used to send signals to the audience. This may include
broadcasting towers for over-the-air signals.
- Distribution Networks: These include satellite, fiber optic networks,
or cable that carry signals from the studio to the audience.
- Receiver/End-User Equipment: Devices such as radios, televisions,
satellite dishes, set-top boxes, or smart devices that allow the user to
access the broadcasted content.
Broadcasting Standards
Analog vs. Digital: Historically, analog was used for radio and
television broadcasts. However, most countries have moved to digital
broadcasting for better quality and more efficient use of frequencies.
Examples include DVB (Digital Video Broadcasting), ATSC
(Advanced Television Systems Committee), and DAB (Digital Audio
Broadcasting).
HD and UHD TV: High-definition (HD) and ultra-high-definition
(UHD) television broadcasting offer enhanced picture and sound
quality.
DAB+ (Digital Audio Broadcasting): An upgraded version of DAB,
offering better sound quality, more stations, and greater efficiency for
radio broadcasting.
Emerging Technologies in Broadcasting
IPTV (Internet Protocol Television): Transmitting television
programming over internet protocol networks rather than traditional
terrestrial, satellite, or cable formats.
5G Broadcasting: With the advent of 5G, broadcasting may move
toward more immersive and interactive content, including VR and AR
experiences.
OTT (Over-The-Top) Services: These are internet-based services that
provide video, audio, and other content bypassing traditional cable or
satellite methods. Examples include Hulu, Amazon Prime Video, and
Disney+.
Mobile Network Server and
Management
-Mobile network server management refers to the systems and
processes used to control and monitor mobile networks, ensuring that
they function smoothly, securely, and efficiently.