CSC461-CN-Lecture-6-Jan-23-2013

download CSC461-CN-Lecture-6-Jan-23-2013

of 58

Transcript of CSC461-CN-Lecture-6-Jan-23-2013

  • 7/28/2019 CSC461-CN-Lecture-6-Jan-23-2013

    1/58

    BITS PilaniPilani | Dubai | Goa | Hyderabad

    Computer NetworksLecture-6, January 23, 2013Rahul Banerjee , PhD (CSE)

    Professor, Department of Computer Science & Information Systems

    E-mail: [email protected]

  • 7/28/2019 CSC461-CN-Lecture-6-Jan-23-2013

    2/58

    BITS Pilani, Deemed to be University under Section 3 of UGC Act, 1956

    How to discover what route your data is actuallytaking during its travel across the globe? Simple basics that go into programming for the

    network-based applications Briefly revisiting the TCP/IP Architecture Current State-of-the-art and Evolving Research

    Directions

    From Clusters and Grids to Clouds Wearable Computing Ubiquitous or Pervasive Computing

    Select References to the literature

    Summary

    Interaction Points

  • 7/28/2019 CSC461-CN-Lecture-6-Jan-23-2013

    3/58

    BITS Pilani, Deemed to be University under Section 3 of UGC Act, 1956

    There do exist several techniques, commands andtools for discovering the actual route a unit of data(say a packet) has taken during its travel from your

    computer to the remote computer situatedanywhere else in the world.

    A very common way to discover it at the user levelis through the Traceroute command / utility.

    It may be known by slightly different names acrossoperating systems like traceroute, tracert etc.

    Lets, now, see how does it work!

    How to Discover theRoute Your Data TakesDuring Its Travel?

  • 7/28/2019 CSC461-CN-Lecture-6-Jan-23-2013

    4/58

    BITS Pilani, Deemed to be University under Section 3 of UGC Act, 1956

    On MS-Windows, itlooks like:

  • 7/28/2019 CSC461-CN-Lecture-6-Jan-23-2013

    5/58

    BITS Pilani, Deemed to be University under Section 3 of UGC Act, 1956

    On MacOS, it looks like:

  • 7/28/2019 CSC461-CN-Lecture-6-Jan-23-2013

    6/58

    BITS Pilani, Deemed to be University under Section 3 of UGC Act, 1956

    On Linux OS, it lookslike:

  • 7/28/2019 CSC461-CN-Lecture-6-Jan-23-2013

    7/58BITS Pilani, Deemed to be University under Section 3 of UGC Act, 1956

    The application-processes of the simplest kindmight involve a client-server relationship.

    APIs help! All network-capable Operating Systems have some application

    programming interface (API) that makes application-to-applicationcommunication possible over networks without necessarily knowingintricate details of the underlying mechanisms.

    University of California at Berkeleys BSD Socket API is one of themost common APIs in use for writing such applications Lets us see how things work in this case, from programmers point

    of view!

    Simple Basics of Programming for Network-based Applications

  • 7/28/2019 CSC461-CN-Lecture-6-Jan-23-2013

    8/58BITS Pilani, Deemed to be University under Section 3 of UGC Act, 1956

    Server-side operations Client-side operations In each case, in the world of the Internet, we have,

    often, two basic choices to make: Octet-stream-oriented reliable communication Datagram-oriented so-called unreliable communication

    Lets see the first type first!

    Create a socket or an end-point on the server side Associate a transport port or a local address at which the

    application shall listen to incoming requests Enable and announce that server is ready to listen at this port with

    queue-size

    Accept any incoming (passive) connection request

    Basic Operations Involved

  • 7/28/2019 CSC461-CN-Lecture-6-Jan-23-2013

    9/58BITS Pilani, Deemed to be University under Section 3 of UGC Act, 1956

    At client-side: Create a socket or an end-point Send (passive) connection request to server

    Overall:

    Connect SendReceive .Close

    Basic Operations Involved

  • 7/28/2019 CSC461-CN-Lecture-6-Jan-23-2013

    10/58BITS Pilani, Deemed to be University under Section 3 of UGC Act, 1956

    How to discover what route your data is actuallytaking during its travel across the globe? Simple basics that go into programming for the

    network-based applications Briefly revisiting the TCP/IP Architecture Current State-of-the-art and Evolving Research

    Directions

    From Clusters and Grids to Clouds Wearable Computing Ubiquitous or Pervasive Computing

    Select References to the literature

    Summary

    Interaction Points

  • 7/28/2019 CSC461-CN-Lecture-6-Jan-23-2013

    11/58

    BITS PilaniPilani | Dubai | Goa | Hyderabad

    Rahul Banerjee

    Thank you for your kind attention!

  • 7/28/2019 CSC461-CN-Lecture-6-Jan-23-2013

    12/58

    References

    Larry L. Peterson & Bruce S. Davie : Computer Networks: A Systems Approach,Fifth Edition, Morgan Kaufmann / Elsevier, New Delhi, 2011.

    S. Keshav: Computer Networking: An Engineering Approach, PearsonEducation, New Delhi, 1997.

    A. S. Tanenbaum: Computer Networks, Fifth Edition, Pearson Education, NewDelhi, 2012.

    Y. Zheng and S. Akhtar: Networks for Computer Scientists and Engineers,Oxford University Press, New York, 2002.

    A. Leon Garcia and I. Widjaja: Communication Networks: FundamentalConcepts and Key Architectures , Second Edition, Tata McGraw-Hill, New Delhi,2004.

    Mohammed G. Gouda: Elements of Network Protocol Design, Wiley Student

    Edition, John Wiley & Sons (Pte.) Ltd., Singapore, 2004. Thomas G. Robertazzi: Computer Networks and Systems: Queuing Theory and

    Performance Evaluation, Third Edition, Springer-Verlag, New York, 2000.

    23/01/13 (c) Dr. Rahul Banerjee, BITS Pilani, INDIA 12

  • 7/28/2019 CSC461-CN-Lecture-6-Jan-23-2013

    13/58

  • 7/28/2019 CSC461-CN-Lecture-6-Jan-23-2013

    14/58

  • 7/28/2019 CSC461-CN-Lecture-6-Jan-23-2013

    15/58

    References

    Larry L. Peterson & Bruce S. Davie : Computer Networks: A Systems Approach,Fifth Edition, Morgan Kaufmann / Elsevier, New Delhi, 2011.

    S. Keshav: Computer Networking: An Engineering Approach, PearsonEducation, New Delhi, 1997.

    A. S. Tanenbaum: Computer Networks, Fifth Edition, Pearson Education, NewDelhi, 2012.

    Y. Zheng and S. Akhtar: Networks for Computer Scientists and Engineers,Oxford University Press, New York, 2002.

    A. Leon Garcia and I. Widjaja: Communication Networks: FundamentalConcepts and Key Architectures , Second Edition, Tata McGraw-Hill, New Delhi,2004.

    Mohammed G. Gouda: Elements of Network Protocol Design, Wiley Student

    Edition, John Wiley & Sons (Pte.) Ltd., Singapore, 2004. Thomas G. Robertazzi: Computer Networks and Systems: Queuing Theory and

    Performance Evaluation, Third Edition, Springer-Verlag, New York, 2000.

    Dr. Rahul Banerjee, BITS, Pilani (India)23/01/13 (c) Dr. Rahul Banerjee, BITS Pilani, INDIA 15

  • 7/28/2019 CSC461-CN-Lecture-6-Jan-23-2013

    16/58

    Network Architecture &Reference Models

    Architecture versus Reference Model: Asimplistic perspective: Architecture: It may be seen as a detailed

    generic blueprint with unambiguous definitionsof services , interfaces , organization anddefined protocols that helps in design andimplementation of a set of relevant protocolstack / suite based network / internetwork

    Reference Model: It is the same as thearchitecture minus the specifically definedreadily usable protocols.

    Wednesday, 23 January 13 16(c) Dr. Rahul Banerjee, BITS-Pilani, INDIA

  • 7/28/2019 CSC461-CN-Lecture-6-Jan-23-2013

    17/58

    17

    The ISO OSI Reference Model

    (c) Dr. Rahul Banerjee, BITS-Pilani, INDIA

  • 7/28/2019 CSC461-CN-Lecture-6-Jan-23-2013

    18/58

  • 7/28/2019 CSC461-CN-Lecture-6-Jan-23-2013

    19/58

    19

    A Simplified Network ReferenceModel

    Host-1 Host-2

    Application Layer Application Layer

    Upper Layer-to- Lower Layer Interface Upper Layer-to- Lower Layer Interface

    Upper Layer-to- Lower Layer InterfaceUpper Layer-to- Lower Layer Interface

    Upper Layer-to- Lower Layer InterfaceUpper Layer-to- Lower Layer Interface

    Same Layer -to- Same Layer Virtual Communication Interface

    Same Layer -to- Same Layer Virtual Communication Interface

    Same Layer -to- Same Layer Virtual Communication Interface

    Same Layer -to- Same Layer

    Virtual Communication Interface

    Same Layer -to- Same Layer Physical Communication Interface

    (c) Dr. Rahul Banerjee, BITS-Pilani, INDIA

  • 7/28/2019 CSC461-CN-Lecture-6-Jan-23-2013

    20/58

  • 7/28/2019 CSC461-CN-Lecture-6-Jan-23-2013

    21/58

    23/01/13 (c) Dr. Rahul Banerjee, BITS Pilani, INDIA 21

    Architecture of the Internet 1 of 2 Brief Historical Notes:

    Initiated by the US Department of Defense (DoD) through its Advanced Research Project Agency (ARPA) and was hence called ARPANet.

    Originally, it was a point-to-point WAN involving only four nodesacross the USA.

    Original architecture that led to ARPANET has evolved over the years

    that have passed by. In later years, ARPA / DARPA dissociated with it and allowed to this tobe blossomed into the Global Public Internet as we see it now.

    Current Status: It is loosely hierarchical.

    Has no single body that owns it or rigidly controls it. ---Mostly run through volunteer efforts and by consensus. Runs several services, in a distributed manner, including

    the immensely popular World-Wide Web. Is helped by global cooperation including those from

    governments and corporates apart from academia

  • 7/28/2019 CSC461-CN-Lecture-6-Jan-23-2013

    22/58

  • 7/28/2019 CSC461-CN-Lecture-6-Jan-23-2013

    23/58

  • 7/28/2019 CSC461-CN-Lecture-6-Jan-23-2013

    24/58

  • 7/28/2019 CSC461-CN-Lecture-6-Jan-23-2013

    25/58

    25

    A Bus Topology based ComputerNetwork

    SHARED BUS

    (c) Dr. Rahul Banerjee, BITS-Pilani,INDIA

    N1 N2 N3 N4

  • 7/28/2019 CSC461-CN-Lecture-6-Jan-23-2013

    26/58

  • 7/28/2019 CSC461-CN-Lecture-6-Jan-23-2013

    27/58

    An Ethernet LAN

    27 (c) Dr. Rahul Banerjee,BITS, Pilani, India

    Personal Computer

    WorkstaJon

    WorkstaJonWorkstation

  • 7/28/2019 CSC461-CN-Lecture-6-Jan-23-2013

    28/58

  • 7/28/2019 CSC461-CN-Lecture-6-Jan-23-2013

    29/58

  • 7/28/2019 CSC461-CN-Lecture-6-Jan-23-2013

    30/58

    30

    A Tree Topology based ComputerNetwork

    NC1 NC2

    NC11

    NR

    NC21

    NC22

    NC12

    (c) Dr. Rahul Banerjee, BITS-Pilani,INDIA

  • 7/28/2019 CSC461-CN-Lecture-6-Jan-23-2013

    31/58

    31

    A Star Topology based ComputerNetwork

    C

    C

    C

    Switch

    (c) Dr. Rahul Banerjee, BITS-Pilani,INDIA

    S

    N1

    N2

    N3

    N4

  • 7/28/2019 CSC461-CN-Lecture-6-Jan-23-2013

    32/58

    Another Form of Ethernet LAN

    32 (c) Dr. Rahul Banerjee,BITS, Pilani, India

    The Ethernet Switch

    Personal Computer

    Network Printer

    WorkstaJon

    WorkstaJon

    Laptop Computer

    WorkstaJon

    Tablet PC

  • 7/28/2019 CSC461-CN-Lecture-6-Jan-23-2013

    33/58

    (c) Dr. Rahul Banerjee, BITS, Pilani, India 33

    Summary of Network Topologies

    Bus Topology Shared Switched

    Tree Topology Ring Topology

    Single Double

    Star Topology Irregular Topology Complete Topology

  • 7/28/2019 CSC461-CN-Lecture-6-Jan-23-2013

    34/58

    Of Clusters, Grids and Clouds Abrief introducJon

    Networks: A set of autonomous compute/communicaJon nodes interconnected for the

    purpose of meaningful resource sharing, require supporJng protocol stacks, nottransparent to the users

    Clusters Homogeneous (pla_orm / OS), all involved nodes o`en belong to a single enJty

    and frequently designed for high-performance compuJng, may be limited to oneor more racks within the same room (example: HPC clusters), easiest to deployand manage

    Grids O`en heterogeneous (pla_orm / OS), Frequently spread over mulJple networks

    and network types, may involve single or mulJple organizaJons, require greatereffort in deployment and administraJon

    Clouds May be public, private and hybrid, support mulJple levels of abstracJons /

    virtualizaJon, typically spread over wide areas, expected to be transparent to the

    user, offer the highest levels of redundancy / availability,

    J a n u a r y 2 3

    , 2 0 1 3

    ( c ) D

    r . R a h u

    l B a n e r j e e

    , B I T S P i l a n i

    , I N D I A

  • 7/28/2019 CSC461-CN-Lecture-6-Jan-23-2013

    35/58

    A few points of signicance

    VirtualizaJon is the underlying commontechnology involved in all the three paradigms

    Networking is the key enabler ingredient in eachof these cases

    Cost-effecJveness, robustness and scalabilityimprove as we move from cluster to cloud but

    overheads and internal complexity add up

    J a n u a r y 2 3

    , 2 0 1 3

    ( c ) D

    r . R a h u

    l B a n e r j e e

    , B I T S P i l a n i

    , I N D I A

    Types of Clouds & Associated

  • 7/28/2019 CSC461-CN-Lecture-6-Jan-23-2013

    36/58

    Types of Clouds & AssociatedVirtualizaJon

    Types of Clouds: ClassicaJon-1 Public Clouds (mulJ-tenancy, wide variaJons, mulJ-

    service, on-demand capacity addiJon a common feature) Private Clouds (single tenancy, limited variaJons, higher

    capital investments, greater control, more secure) Hybrid Clouds (near-opJmal best of both worlds, if

    congured well)

    Types of Clouds: ClassicaJon-2 Infrastructure Cloud, ComputaJonal Cloud etc.

    Types of Clouds: ClassicaJon-3 < basis: service virtualizaJon> Pla_orm as a service, So`ware as a service, Storage as a

    service, CollaboraJon & Sharing Services etc.

    J a n u a r y 2 3

    , 2 0 1 3

    ( c ) D

    r . R a h u

    l B a n e r j e e

    , B I T S P i l a n i

    , I N D I A

  • 7/28/2019 CSC461-CN-Lecture-6-Jan-23-2013

    37/58

    Case-Study of of a Network-BasedMulJ-site CollaboraJon System Design

  • 7/28/2019 CSC461-CN-Lecture-6-Jan-23-2013

    38/58

    BITS Pilani, Deemed to be University under Section 3 of UGC Act, 1956

    Project BITS-Connect 2.0

  • 7/28/2019 CSC461-CN-Lecture-6-Jan-23-2013

    39/58

    BITS Pilani, Deemed to be University under Section 3 of UGC Act, 1956

    Project BITS-Connect 2.0The Immersive Tele-presence Rooms

    This is how an18-seater immersive tele-presence roomlooks like at allthe Indiancampuses.

    Chancellors officeis equipped with

    one two-seatersystem

  • 7/28/2019 CSC461-CN-Lecture-6-Jan-23-2013

    40/58

    (c) Dr. Rahul Banerjee, BITS,Pilani, India 40

    A Few More Networking Terms Repeaters / Repeater Hubs / Shared Hubs: where usually Physical

    layer / level exist with L1-protocol data unit (raw bits) regeneration andonward transmission

    Managed Hubs / Layer-2 Switching Hubs: where Physical and Data Linklayers / levels exist with ability to handle and deliver Layer-2-protocoldata unit (frame)

    Bridges: where Physical and Data Link layers / levels exist with L2-protocol data unit (frame) processing and forwarding

    Switches: where Physical and Data Link and / or Network (sometimeseven higher) layers / levels exist with Layer-2 and / or Layer-3-protocoldata unit (frame / packet) processing, switched routing / forwarding

    Routers: where Physical and Data Link and Network layers / levels existwith L3-protocol data unit (packet) processing, routing and forwarding

    Gateways: where two or more different networks meet and may requireprotocol / message translation capabilities

    Clouds: abstraction of node connectivity in the networking context

  • 7/28/2019 CSC461-CN-Lecture-6-Jan-23-2013

    41/58

    Copyright: Dr. Rahul BanerjeeBITS, Pilani (India)

    41

    IPv4: The Header Structure0 31

    Identification 16-bit Flags 3-bit Fragment Offset 13- bit

    Ver. 4-bit IHL 4-bit Type of Service 8-bit Total Length 16-bit

    Source Address 32-bit

    Destination Address 32-bit

    TTL 8-bit Protocol Type 8-bit Header Checksum 16-bit

    Options + Padding

  • 7/28/2019 CSC461-CN-Lecture-6-Jan-23-2013

    42/58

    Copyright: Dr. Rahul BanerjeeBITS, Pilani (India)

    42

    IPv6: The Header Structure

    0 4 16 31

    Payload Length Next Header Hop Limit(16-bit) (8-bit) (8-bit)

    Source Address (128-bit)

    Destination Address (128-bit)

    Ver. TClass Flow Label(4-bit) (8-bit) (20-bit)

  • 7/28/2019 CSC461-CN-Lecture-6-Jan-23-2013

    43/58

    Frames: Link Layer (L-2) Data Units

    Frame The unit of Data as expressed at the Data Link Layer(Layer-2 of the Hypothe0cal model used for instruc0on) isconvenJonally called a Frame.

    Frames can take different formats and sizesdepending upon the protocol in quesJon Frames do include elds like synchronizaJon,

    addressing, payload, control-informaJon etc.

    Frame Forwarding The process of moving frames from one port to another in a

    bridge or switch.

    43 (c) Dr. Rahul Banerjee,BITS, Pilani, India

    h

  • 7/28/2019 CSC461-CN-Lecture-6-Jan-23-2013

    44/58

    Frames: Factors that ma er!

    Synchronization: Transmitter & Receiver need tobe in sync Start Delimiter: Required to mark starting bit End Delimiter: Required to mark the end bit Control Information: Information suggesting data

    handling and interpretation Error Detection / Correction / Retransmission Flow Control: Required for avoiding data loss

    due to overflow at receiving end Data Length: Needed if data-field is not of fixed

    size

    44 (c) Dr. Rahul Banerjee,BITS, Pilani, India

  • 7/28/2019 CSC461-CN-Lecture-6-Jan-23-2013

    45/58

    A Sample Frame Format

    n-Byte Preamble Start-of -Frame Delimiter DesJnaJon Add . Source Address

    Length of Data

    Data FieldPad Field

    Checksum

    45 (c) Dr. Rahul Banerjee,BITS, Pilani, India

  • 7/28/2019 CSC461-CN-Lecture-6-Jan-23-2013

    46/58

    Logical View of a 10-Gbps Unit

    h p://www.ovislinkcorp.co.uk/linkd.GIF

    7 1 6 6 2 46=

  • 7/28/2019 CSC461-CN-Lecture-6-Jan-23-2013

    47/58

    Summary of Differences Between L-2 Switches,Routers (L-3) and L-3 Switches

    Bridges and Layer-2 switches divide thenetwork into segments or micro-segments(apart from helping in Layer-2 protocoltranslaJon, management, security etc.)

    In effect, we can say that Layer-2 Switches / Bridges separate collision

    domains Layer-2 Switches / Bridges can carry out protocol

    translaJons

    23/01/13 (c) Dr. Rahul Banerjee, SDET Unit, BITS-Pilani, INDIA 47

  • 7/28/2019 CSC461-CN-Lecture-6-Jan-23-2013

    48/58

    Summary of Differences Between L-2 Switches,Routers (L-3) and L-3 Switches

    Routers are Layer-3 devices who handle Layer-3 packet rouJng within andoutside the local network / internetwork and therefore effecJvelyseparate broadcast domains which end at its different network interfaceseach of which carries a separate Subnet-idenJer / Subnet-address (apartfrom Layer-3 protocol translaJon, monitoring, security and management)

    Thus, in effect, we can say that: Routers Separate broadcast domains (each of such broadcast domains which

    end at its different network interfaces each of which carries a separateSubnet-idenJer / Subnet-address )

    Routers can carry out interior rouJng and / or exterior rouJng, depending

    upon their locaJon in the network Routers can carry out protocol translaJons (in terms of protocol-specic

    packet formats as well as in terms of allowing appropriately forma edselecJve data specic to rouJng protocols they may support).

    23/01/13 (c) Dr. Rahul Banerjee, SDET Unit, BITS-Pilani, INDIA 48

  • 7/28/2019 CSC461-CN-Lecture-6-Jan-23-2013

    49/58

    Summary of Differences Between L-2 Switches,Routers (L-3) and L-3 Switches

    Layer-3 switches are devices which can handle all funcJonaliJes of Layer-2Switches as well as fast (o`en based on header/tag/label switching) Layer-3packet rouJng within but not outside the local network / internetwork; andtherefore, effecJvely separate broadcast domains which end at its differentLAN interfaces each of which carries a separate Subnet-idenJer / Subnet-

    address (apart from opJonal Layer-3 protocol translaJon, monitoring, securityand management)

    Thus, in effect, we can say that: L-3 Switches Separate broadcast domains (each of such broadcast domains which

    end at its different LAN interfaces each of which carries a separate Subnet-

    idenJer / Subnet-address ) L-3 Switches can carry out fast interior rouJng / packet-switching o`en based on

    header/tag/label switching

    Layer-3 Switches, opJonally, can carry out protocol translaJons (in terms ofprotocol-specic packet formats).

    23/01/13 (c) Dr. Rahul Banerjee, SDET Unit, BITS-Pilani, INDIA 49

  • 7/28/2019 CSC461-CN-Lecture-6-Jan-23-2013

    50/58

    Inside a Layer-2 Switch

    Elements of a Layer-2 Switch Processors (Front-end Processors on Line Cards) for

    Frame RouJng

    MulJple Buffers for MulJple Queues

    Shared I/O Bus or Ring (1 st / 2 nd Gen.) / SwitchingFabric (3 rd Gen.)

    I/P Line Controllers (ILC)

    O/P Line Controllers (OLC)

    50 (c) Dr. Rahul Banerjee, BITS,Pilani, India

  • 7/28/2019 CSC461-CN-Lecture-6-Jan-23-2013

    51/58

    Fixed

    Lasers

    Electronic

    Switches G xG

    MEMS

    Group 1

    L x M Crossbar

    Linecard 1

    Linecard 2

    Linecard L

    Group2

    L x M Crossbar

    Linecard 1

    Linecard 2

    Linecard L

    L x M Crossbar

    Linecard 1

    Linecard 2

    Linecard L

    Group G

    M x L Crossbar

    Linecard 1

    Linecard 2

    Linecard L

    Electronic

    Switches

    Optical

    Receivers

    Group1

    M x L Crossbar

    Linecard 1

    Linecard 2

    Linecard L

    Group 2

    M x L Crossbar

    Linecard 1

    Linecard 2

    Linecard L

    Group G

    G xG

    MEMS

    G xG MEMS

    G xG MEMS

    1

    2

    3

    M

    StaticMEMS

    12

    3

    M

    1

    2

    3

    M

    1

    2

    3

    M

    1

    2

    3

    M

    1

    2

    3

    M

    1

    2

    3

    M

    An Example of a Hybrid Switching Fabric

    Dr. Nick McKeown , Stanford University

  • 7/28/2019 CSC461-CN-Lecture-6-Jan-23-2013

    52/58

    Some More Terms of Relevance Collision Domain

    The set of all stations connected to a networkwhere faithful detection of a collision can occur.

    A collision domain terminates at a switch port. Late Collision

    A failure of the network in which the collisionindication arrives too late in the frametransmission to be automatically dealt with by themedium access control (MAC) Protocol.

    The defective frame may not be detected by allstations requiring that the application layer detectand retransmit the lost frame, resulting in greatlyreduced throughput.

    CRC Cyclic Redundancy Check is an error-checking

    technique used to ensure the fidelity of receiveddata.

    52 (c) Dr. Rahul Banerjee, BITS, Pilani, India

  • 7/28/2019 CSC461-CN-Lecture-6-Jan-23-2013

    53/58

    Pervasive CompuJng with AR

    anuary 23, 2013 (c) Dr. Rahul Banerjee, BITS Pilani, INDIA

  • 7/28/2019 CSC461-CN-Lecture-6-Jan-23-2013

    54/58

    Wearable CompuJng Elements

    anuary 23, 2013 (c) Dr. Rahul Banerjee, BITS Pilani, INDIA

  • 7/28/2019 CSC461-CN-Lecture-6-Jan-23-2013

    55/58

    E-Fabric of a Wearable Garment

    anuary 23, 2013 (c) Dr. Rahul Banerjee, BITS Pilani, INDIA

  • 7/28/2019 CSC461-CN-Lecture-6-Jan-23-2013

    56/58

    Wireless CommunicaJon in Wearables

    anuary 23, 2013 (c) Dr. Rahul Banerjee, BITS Pilani, INDIA

  • 7/28/2019 CSC461-CN-Lecture-6-Jan-23-2013

    57/58

    User Interface & Sensors

    anuary 23, 2013 (c) Dr. Rahul Banerjee, BITS Pilani, INDIA

  • 7/28/2019 CSC461-CN-Lecture-6-Jan-23-2013

    58/58

    Paradiso & Starners Shoes forElectrical Energy GeneraJon