Web Science/Part1: Foundations of the web/Internet Architecture/Ethernet/Communication over a shared Medium
Home | Part1: Foundations of the web | Part2: Emerging Web properties | Part3: Behavioral Models | Part4: Web & society | Participate | About the Web Science MOOC |
- PART1: Week1: Ethernet · Internet Protocol · Week2: Transmission Control Protocol · Domain Name System · Week3: Internet vs world wide web · HTTP · Week4: Web Content · Dynamic Web Content
- PART2: Week5: How big is the Web? · Descriptive Web Models · Week6: Advanced Statistic Models · Modelling Similarity · Week7: Generative Modelling of the Web · Graph theoretic Web Modelling
- PART3: Week8 : Investigating Meme Spreading · Herding Behaviour · Week9: Online Advertising · User Modelling
- PART4: Week10 : Copyright · Net neutrality · Week11: Internet governance · Privacy
Quick Navigation: Video - Script - further Reading - Quiz - Discussion
Video of the lesson: Communication over a shared medium
|
Quick Navigation: Video - Script - further Reading - Quiz - Discussion
Script for: Communication over a shared medium
Why Ethernet protocol was developed? Let’s assume that we have one or more computers that want to communicate. The key is a shared medium. They want to exchange information. As we all know the smallest node of information is 1 bit. So what we can do is to put this 1 bit to the voltage cable in order to transfer. But if you do this, some problems will arise: - VOLTAGE TIME How long do you have to put voltage on the cable? If you just start putting the voltage on the cable, there will be electromagnetic waves starting to transfer proper data through the cable. The question is how long do you have to do this that others can measure this? - SENDER Who is actually a sender of the data? Let’s imagine 3 computers: A, B and C. We assume that A sends a bit of data. At some point of time B and C receive the data. But the question is who send the data? You can’t figure this out. - RECIPIENT Who is the recipient of the data? If A transfers data then B and C might not know if this data is actually for them. - TRANSERING SIMULTANIOUSLY Who is supposed to use medium? A starts transferring some data then at some point of time B also starts transferring some data. What we have is that C receives corrupted data. - IS DATA CORRUPT? The data might get corrupted while being in the cable due to some external events. For example, if cell phone is close to the cable the electromagnetic waves might cause a change. Participants should figure this out. In order to solve this problem the Ethernet protocol was developed. So what Ethernet can do is: • SYNCHRONIZE TIME INTERVALS Let’s assume computer A sends data at 10 Mbits/s. And computer C has interface that allows 100 Mbits/s. Ethernet as the protocol will be able to synchronize the clocks between these 2 devices. • SPECIFY RECIPIENT AND SENDER If A wants to send data for C then B will know that this data is not for him (while C will know that it’s for him). • DETECT CORRUPTED DATA If data gets corrupted for some reason then computer C will first see that the data is corrupted. • DETECT COLLISIONS If A and B starts to transfer data at the same point of time they know that something went wrong and C will receive corrupted data(because it’s overload by 2 packages). |
Quick Navigation: Video - Script - further Reading - Quiz - Discussion
Further information, readings and exercises about Communication over a shared medium
|
Quick Navigation: Video - Script - further Reading - Quiz - Discussion
Check your understanding of: Communication over a shared medium
|
Quick Navigation: Video - Script - further Reading - Quiz - Discussion
Discuss Communication over a shared medium with others
Join the discussion: Ask and questions and provide answers
"Check your understanding" clarificationRene, I think there are some controversies in the questions.
For example, in the first group of questions called:
You explain that as: This is how a Protocol like token ring is designed. Ok, it means that we should NOT care about that fact (same amount of time), because we assume that we DO use one of the protocols for communication. VS
In my opinion, that problem can also be solved by using one of the protocols ("token ring" for example). Moreover, in previous case we have already ASSUMED that we DO use one of the protocols for communication. Hense, the 2nd case should be unmarked, if we follow the same logic as in previous case. All in all, if we assume that we do NOT use protocols (but want to design a good protocol), correct answers should be:
smalles amount of informationI don't get it: The text says that a bit is the smallest node of information.... and when I click the answer in the second question, the answer is wrong. I might be wrong, but I don't understand: If 1 bit is the smallest amount of data, then it must be the smallest amount that can be transfered, right? --Stefanbazan (discuss • contribs) 12:29, 29 October 2013 (UTC)
Information from the videoI thought that text version of the video might be helpful while refreshing the topic. So here is it. Why Ethernet protocol was developed? Let’s assume that we have one or more computers that want to communicate. The key is a shared medium. They want to exchange information. As we all know the smallest node of information is 1 bit. So what we can do is to put this 1 bit to the voltage cable in order to transfer. But if you do this, some problems will arise: - VOLTAGE TIME How long do you have to put voltage on the cable? If you just start putting the voltage on the cable, there will be electromagnetic waves starting to transfer proper data through the cable. The question is how long do you have to do this that others can measure this? - SENDER Who is actually a sender of the data? Let’s imagine 3 computers: A, B and C. We assume that A sends a bit of data. At some point of time B and C receive the data. But the question is who send the data? You can’t figure this out. - RECIPIENT Who is the recipient of the data? If A transfers data then B and C might not know if this data is actually for them. - TRANSERING SIMULTANIOUSLY Who is supposed to use medium? A starts transferring some data then at some point of time B also starts transferring some data. What we have is that C receives corrupted data. - IS DATA CORRUPT? The data might get corrupted while being in the cable due to some external events. For example, if cell phone is close to the cable the electromagnetic waves might cause a change. Participants should figure this out. In order to solve this problem the Ethernet protocol was developed. So what Ethernet can do is: • SYNCHRONIZE TIME INTERVALS Let’s assume computer A sends data at 10 Mbits/s. And computer C has interface that allows 100 Mbits/s. Ethernet as the protocol will be able to synchronize the clocks between these 2 devices. • SPECIFY RECIPIENT AND SENDER If A wants to send data for C then B will know that this data is not for him (while C will know that it’s for him). • DETECT CORRUPTED DATA If data gets corrupted for some reason then computer C will first see that the data is corrupted. • DETECT COLLISIONS --Jane Kruch (discuss • contribs) 17:51, 26 October 2013 (UTC)
testtest |
navigational context
The following video of the flipped classroom associated with this topic are available: You can find more information on wiki commons and also directly download this file |