Hour 3: The Network Access Layer Page 1 of 10. Discuss how TCP/IP s Network Access layer relates to the OSI networking model

Size: px
Start display at page:

Download "Hour 3: The Network Access Layer Page 1 of 10. Discuss how TCP/IP s Network Access layer relates to the OSI networking model"

Transcription

1 Hour 3: The Network Access Layer Page 1 of 10 Hour 3: The Network Access Layer At the base of the TCP/IP protoco stack is the Network Access ayer, the coection of services and specifications that provide and manage access to the network hardware. In this hour you earn about the duties of the Network Access ayer and how the Network Access ayer reates to the OSI mode. This hour aso ooks at some common physica network technoogies you find in the Network Access ayer. At the competion of this hour, you be abe to Expain what the Network Access ayer is Discuss how TCP/IP s Network Access ayer reates to the OSI networking mode Expain what a network architecture is List the contents of an ethernet frame Identify the methods that ethernet, token ring, and FDDI use for controing access to the transmission medium Protocos and Hardware The Network Access ayer is the most mysterious and east uniform of TCP/IP s ayers. Basicay, the Network Access ayer manages a the services and functions necessary to prepare the data for the physica network. These responsibiities incude Interfacing with the computer s network adapter. Coordinating the data transmission with the conventions of the appropriate access method. You earn more about access methods ater in this hour. Formatting the data into a unit caed a frame and converting that frame into the stream of eectric or anaog puses that passes across the transmission medium. Checking for errors in incoming frames. Adding error-checking information to outgoing frames so that the receiving computer can check the frame for errors. Acknowedging receipt of data frames and resending frames if acknowedgment is not received. Of course, any formatting tasks performed on an outgoing frame must occur in reverse when the frame reaches its destination and is received by the computer to which it is addressed. The Network Access ayer defines the procedures for interfacing with the network hardware and fie://j:\macmiancomputerpubishing\chapters\jw036.htm 3/22/01

2 Hour 3: The Network Access Layer Page 2 of 10 accessing the transmission medium. Beow the surface of TCP/IP s Network Access ayer, you find an intricate interpay of hardware, software, and transmission-medium specifications. Unfortunatey, at east for the purposes of a concise description, there are many different types of physica networks that a have their own conventions, and any one of these physica networks can form the basis for the Network Access ayer. You earn about these physica network types ater in this hour. A few exampes incude Ethernet Token ring FDDI PPP (Point-to-Point Protoco, through a phone modem) Note - Not every networked computer is on a LAN. The network-access software may provide support for something other than a standard network adapter and a LAN cabe. One of the most common aternatives is a modem connection to a remote network, such as the connection you estabish when you dia in to an Internet service provider (ISP). Modem protoco standards such as Seria Line Internet Protoco (SLIP) and Point-to- Point Protoco (PPP) provide network access for the TCP/IP protoco stack through a modem connection. You earn more about these protocos in Hour 8, "Dia-Up TCP/IP." The good news is that the Network Access ayer is amost totay invisibe to the everyday user. The network adapter driver, couped with key ow-eve components of the operating system and protoco software, manages most of the tasks reegated to the Network Access ayer, and a few short configuration steps are usuay a that is required of a user. These steps are becoming simper with the improved pug-and-pay features of desktop operating systems. As you read through this hour, remember that the ogica, IP-stye addressing discussed in Hours 1, 2, 4, and 5 exist entirey in the software. The protoco system requires additiona services to deiver the data across a specific LAN system and up through the network adapter of a destination computer. These services are the purview of the Network Access ayer. Note - It is worth mentioning that the diversity, compexity, and invisibiity of the Network Access ayer has caused some authors to excude it from discussions of TCP/IP competey, asserting instead that the stack rests on LAN drivers beow the Internet Access ayer. This viewpoint has some merit, but the Network Access ayer reay is part of TCP/IP, and no discussion of the network-communication process is compete without it. The Network Access Layer and the OSI Mode fie://j:\macmiancomputerpubishing\chapters\jw036.htm 3/22/01

3 Hour 3: The Network Access Layer Page 3 of 10 As Hour 2, "How TCP/IP Works," mentioned, TCP/IP is officiay independent of the seven-ayer OSI networking mode, but the OSI mode is often used as a genera framework for understanding protoco systems. OSI terminoogy and concepts are particuary common in discussions of the Network Access ayer because the OSI mode provides additiona subdivisions to the broad category of network access. These subdivisions revea a bit more about the inner workings of this ayer. The OSI mode has been infuentia with computer networking vendors, and the recent trend toward mutiprotoco standards such as NDIS and ODI (discussed ater in this section) has accentuated the need for a common terminoogy that the OSI mode provides. As Figure 3.1 shows, the TCP/IP Network Access ayer roughy corresponds to the OSI Physica and Data Link ayers. The OSI Physica ayer is responsibe for turning the data frame into a stream of bits suitabe for the transmission medium. In other words, the OSI Physica ayer manages and synchronizes the eectrica or anaog puses that form the actua transmission. On the receiving end, the Physica ayer reassembes these puses into a data frame. Figure 3.1 OSI and the Network Access ayer. The OSI Data Link ayer performs two separate functions and is accordingy subdivided into the foowing two subayers: Media Access Contro (MAC) This subayer provides an interface with the network adapter. The network adapter driver, in fact, is often caed the MAC driver, and the hardware address burned into the card at the factory is often referred to as the MAC address. Logica Link Contro (LLC) This subayer performs error-checking functions for frames deivered over the subnet and manages inks between devices communicating on the subnet. Note - In rea network protoco impementations, the distinction between the ayers of TCP/IP and OSI systems has become further compicated by the deveopment of the Network Driver Interface Specification (NDIS) and Open Data-Link Interface (ODI) specification. NDIS (deveoped by Microsoft and 3Com Corp.) and ODI (deveoped by Appe and Nove) are designed to et a singe protoco stack (such as TCP/IP) use mutipe network adapters and to et a singe network adapter use mutipe upper-ayer protocos. This effectivey enabes the upper-ayer protocos to foat independenty of the network access system, which adds great functionaity to the network but aso adds compexity and makes it even more difficut to provide a systematic discussion of how the software components interreate at the ower ayers. Network Architecture In practice, oca area networks are not reay thought of in terms of protoco ayers but by what is caed LAN architecture or network architecture. (Sometimes a network architecture is referred to as a LAN type or a LAN technoogy.) A network architecture, such as ethernet, provides a bunde of specifications governing media access, physica addressing, and the interaction of the computers with fie://j:\macmiancomputerpubishing\chapters\jw036.htm 3/22/01

4 Hour 3: The Network Access Layer Page 4 of 10 the transmission medium. When you decide on a network architecture, you are in effect deciding on a design for the Network Access ayer. A network architecture is a design for the physica network and a coection of specifications defining communications on that physica network. The communication detais are dependent on the physica detais, so the specifications usuay come together as a compete package. These specifications incude considerations such as the foowing: Access method An access method is a set of rues defining how the computers wi share the transmission medium. To avoid data coisions, computers must foow these rues when they transmit data. Data frame format The IP-eve datagram from the Internet ayer is encapsuated in a data frame with a predefined format. The data encosed in the header must suppy the information necessary to deiver data on the physica network. You' earn more about data frames ater in this hour. Cabing type The type of cabe used for a network has an effect on certain other design parameters, such as the eectrica properties of the bitstream transmitted by the adapter. Cabing rues The protocos, cabe type, and eectrica properties of the transmission have an effect on the maximum and minimum engths for the cabe and for the cabe connector specifications. Detais such as cabe type and connector type are not the direct responsibiity of the Network Access ayer, but in order to design the software components of the Network Access ayer, deveopers must assume a specific set of characteristics for the physica network. Thus, the network access software must come with a specific hardware design. Physica Addressing As you earned in Part I, "TCP/IP Basics," the Network Access ayer is necessary in order to reate the ogica IP address, which is configured through the protoco software with the actua permanent physica address of the network adapter. The physica address is burned into the card at the factory. Data frames sent across the LAN must use this physica address to identify the source and destination adapters, but the engthy physica address (48 bits in the case of ethernet) is so unfriendy that it is impractica for peope to use. Aso, encoding the physica address at higher protoco eves compromises the fexibe moduar architecture of TCP/IP, which requires that the upper ayers remain independent of physica detais. TCP/IP uses the Address Resoution Protoco (ARP) and Reverse Address Resoution Protoco (RARP) to reate IP addresses to the physica addresses of the network adapters on the oca network. ARP and RARP provide a ink between the ogica IP addresses seen by the user and the (effectivey invisibe) hardware addresses used on the LAN. You' earn about ARP and RARP in Hour 4, "The Internet Layer." Anatomy of a Frame The Network Access ayer software accepts a datagram from the Internet ayer and converts that data fie://j:\macmiancomputerpubishing\chapters\jw036.htm 3/22/01

5 Hour 3: The Network Access Layer Page 5 of 10 to a form that is consistent with the specifications of the physica network (see Figure 3.2). Because many forms of physica networks exist, there are many formats for data at the Network Access ayer, and it woud not be easy or usefu to describe a these formats in detai. Figure 3.2 The Network Access ayer formats data for the physica network. As an exampe of what happens to the data at the Network Access ayer, consider the case of ethernet, the most common of the LAN architectures. When the ethernet software receives a datagram from the Internet ayer, it performs the foowing steps: 1. Breaks IP ayer data into smaer chunks, if necessary, which wi be sent in the data fied of the ethernet frames. The tota size of the ethernet frame must be between 64 bytes and 1,518 bytes (not incuding the preambe). 2. Packages the chunks of data into frames. Each frame incudes data as we as other information that the network adapters on the ethernet need in order to process the frame. An IEEE ethernet frame incudes the foowing: Preambe: A sequence of bits used to mark the beginning of the frame (8 bytes, the ast of which is the 1-byte Start Frame Deimiter). Recipient address: The 6-byte (48-bit) physica address of the network adapter that is to receive the frame. Source address: The 6-byte (48-bit) physica address of the network adapter that is sending the frame. Length: A 2-byte (16-bit) fied indicating the size of the data fied. Data: The data that is transmitted with the frame. Frame Check Sequence (FCS): A 4-byte (32-bit) checksum vaue for the frame. The FCS is a common means of verifying data transmissions. The sending computer cacuates a Cycica Redundancy Check (CRC) vaue for the frame and encodes the CRC vaue in the frame. The receiving computer then recacuates the CRC and checks the FCS fied to see if the vaues match. If the vaues don t match, some data was ost or changed during transmission. 3. Passes the data frame to ower-eve components corresponding to OSI s physica ayer, which wi convert the frame into a bitstream and send it over the transmission medium. The other network adapters on the ethernet receive the frame and check the destination address. If the destination address matches the address of the network adapter, the adapter software processes the incoming frame and passes the data to higher ayers of the protoco stack. IEEE is not the ony ethernet standard. The Ethernet II standard, used by some vendors, has a sighty different frame format. fie://j:\macmiancomputerpubishing\chapters\jw036.htm 3/22/01

6 Hour 3: The Network Access Layer Page 6 of 10 LAN Technoogies The most common network architectures are the foowing: Ethernet, incuding variants such as the foowing: 10BASE-2 (an ethernet standard using thin coaxia cabe) 10BASE-5 (an ethernet standard using thick coaxia cabe) 10BASE-T (an ethernet standard using twisted-pair cabe in a star configuration) 100BASE-TX (a standard simiar to 10BASE-T with faster transmissions speed (100Mbps) Token ring Note - The Institute of Eectrica and Eectronic Engineers (IEEE) has produced a set of standards for LAN architectures. Athough token ring and ethernet were both created before the IEEE standards, the IEEE specifications for IEEE (ethernet) and IEEE (token ring) now provide vendor-neutra standards for these important LAN technoogies. The foowing sections wi examine ethernet and token ring in greater detai, aong with another LAN technoogy: FDDI. Ethernet Ethernet and its newer sibing Fast Ethernet, are the LAN technoogies most commony used today. Ethernet has become popuar because of its modest price; Ethernet cabe is inexpensive and easiy instaed. Ethernet network adapters and Ethernet hardware components are aso reativey inexpensive. On ethernet networks, a computers share a common transmission medium. Ethernet uses an access method caed Carrier Sense Mutipe Access with Coision Detect (CSMA/CD) for determining when a computer is free to transmit data on to the access medium. Using CSMA/CD, a computers monitor the transmission medium and wait unti the ine is avaiabe before transmitting. If two computers try to transmit at the same time, a coision occurs. The computers then stop, wait for a random time interva, and attempt to transmit again. CSMA/CD can be compared to the protoco foowed by a room fu of poite peope. Someone who wants to speak first istens to determine if anybody ese is currenty speaking (this is the Carrier Sense). If two peope start speaking at the same moment, then both peope wi detect this, stop speaking, and wait before speaking again (this is Coision Detect). Traditiona ethernet works we under ight-to-moderate use but suffers from high coision rates fie://j:\macmiancomputerpubishing\chapters\jw036.htm 3/22/01

7 Hour 3: The Network Access Layer Page 7 of 10 under heavy use. Some of the newer ethernet variants, which may incude inteigent hubs or switches, support higher traffic eves. You earn more about hubs and switches in Hour 9, "Network Hardware." Ethernet is capabe of using a variety of media. Ethernet networks typicay operate at baseband speeds of either 10Mbps or 100Mbps. 1000Mbps (Gigabit) Ethernet systems are now avaiabe and may soon be common. Tabe 3.1 ists terms used to identify cabing media, speeds, and maximum distances. Wireess ethernet is aso becoming popuar. 10BASE-2 and 10BASE-5 coaxia ethernet networks were once very common. Figure 3.3 shows a coaxia 10BASE-2 network. Note that the computers are attached to a singe cabe that acts as the shared transmission medium. In recent years, hub-based ethernet variants such as 10BASE-T (see Figure 3.4) have become vasty more popuar. On a 10BASE-T network, the computers are attached to a centra hub. 10BASE-2 and 10BASE-T may appear to be dissimiar, but internay they are both sti ethernet. Tabe 3.1 Ethernet Media Technoogy Technoogy Name Media Type Operating Speed Maximum Distance 10BASE-2 Thin coax 10 megabits 185 meters 10BASE-5 Thick coax 10 megabits 500 meters 10BASE-T CAT3 or CAT5 10 megabits 100 meters UTP 10BASE-F Fiber optic 10 megabits 2,000 meters 100BASE-TX CAT 5 UTP or STP 100 megabits 100 meters 100BASE-FX Fiber optic 100 megabits 2,000 meters Figure 3.3 A 10BASE-2 coaxia ethernet network. Figure 3.4 A 10BASE-T hub-based ethernet network. Token Ring Token ring technoogy uses a competey different concept for aowing network adapters to transmit data on the media. This access method is known as token passing. Under the token passing access method, the computers on the LAN are connected so that data is passed around the network in a ogica ring (see Figure 3.5). The token ring configuration cas for the computers to be wired to a centra hub caed a MAU or MSAU. Figure 3.5 may not ook ike a ring, but the MSAU is wired so that the data passes from one computer to the next in a circuar motion. The computers pass a packet of data caed a token around the network. Ony the computer that hods the token can transmit a message on to the ring. fie://j:\macmiancomputerpubishing\chapters\jw036.htm 3/22/01

8 Hour 3: The Network Access Layer Page 8 of 10 Figure 3.5 A token ring. Token ring is technicay more sophisticated than ethernet, and it incudes a number of buit-in diagnosis and correction mechanisms that can hep troubeshoot network probems. Aso, because data is transmitted in a more ordery fashion, token ring does not suffer as bady under heavy data traffic. Amost everything about token ring is more expensive than ethernet by comparison the cabe, the network adapter cards, and the other components as we. Token ring typicay operates at either 4Mbps or 16Mbps. It is aso avaiabe at 100Mbps. FDDI Fiber Distributed Data Interface (FDDI) is an expensive LAN technoogy that empoys a pair of fiberoptic rings. One ring is considered primary and the second ring is principay there to repair the primary ring in the event of a breakdown. FDDI uses a token passing access method simiar to token ring. Like token ring, FDDI aso has error-detection and correction capabiities. In a normay operating FDDI ring, the token passes by each machine every so often. If the token is not seen within the maximum amount of time that it takes to circuate the argest ring, it indicates a probem has occurred such as a broken cabe. Fiber-optic cabe such as the cabe used with FDDI can support very arge voumes of data over arge distances. Other Network-Access Technoogies LAN technoogies such as ethernet are common throughout the mechanized word, but there are many other ways to connect computers. Any networking technoogy must have some means of preparing data for the physica network and, therefore, any TCP/IP technoogy must have a Network Access ayer. As was aready mentioned, a modem is another means of supporting a network connection. You' earn more about modems in Hour 8. Wide area network (WAN) technoogies support connections that operate over greater distances but often at sower transmission rates. WAN connections require speciaized hardware that, as you might guess, requires speciaized software at the Network Access ayer. Summary In this hour you earned about the Network Access ayer, the most diverse and arguaby the most compex ayer in the TCP/IP protoco stack. The Network Access ayer defines the procedures for interfacing with the network hardware and accessing the transmission medium. There are many types of LAN architectures and therefore many different forms that the Network Access ayer can take. This hour aso described the contents of an ethernet frame and briefy discussed ethernet, token ring, and FDDI. Q&A fie://j:\macmiancomputerpubishing\chapters\jw036.htm 3/22/01

9 Hour 3: The Network Access Layer Page 9 of 10 Q. What types of services are defined at the Network Access ayer? A. The Network Access ayer incudes services and specifications that manage the process of accessing the physica network. Q. Which OSI ayers correspond to the TCP/IP network Access ayer? A. The Network Access ayer roughy corresponds with the OSI Data Link ayer and Physica ayer. Q. What are the two most common LAN architectures? A. The most common LAN architectures are ethernet, with its severa cabing variants, and token ring. Q. What is CSMA/CD? A. CSMA/CD is Carrier Sense Mutipe Access with Coision Detect, a network-access method used by ethernet. Under CSMA/CD, the computers on a network wait for a moment to transmit and, if two computers attempt to transmit at once, they both stop, wait for a random interva, and transmit again. Q. What is token passing? A. Token passing is a network-access method used by token ring and FDDI. A packet of data caed a token circuates around the network. Ony the computer with the token can transmit data. Key Terms Review the foowing ist of key terms: Access method A procedure for reguating access to the transmission medium. CRC (Cycica Redundancy Check) A checksum cacuation used to verify the contents of a data frame. CSMA/CD The network access method used by ethernet. Data frame A package of data transmitted over an ethernet network. Data Link ayer The second ayer of the OSI mode. Ethernet A very popuar LAN architecture, using the CSMA/CD network-access method. FDDI A token passing network architecture using fiber-optic cabe. fie://j:\macmiancomputerpubishing\chapters\jw036.htm 3/22/01

10 Hour 3: The Network Access Layer Page 10 of 10 Logica Link Contro subayer A subayer of OSI's Data Link ayer that is responsibe for error checking and managing inks between devices on the subnet. Media Access Contro subayer A subayer of OSI's Data Link ayer that is responsibe for the interface with the network adapter. Network architecture A compete specification for a physica network, incuding specifications for access method, data frame, and network cabing. Physica address A permanent network address, burned into the adapter card by the manufacturer, that is used to deiver data across the physica network. Physica ayer The first OSI ayer, responsibe for transating the data frame into a bitstream suitabe for the transmission medium. Preambe A series of bits marking the beginning of a data frame transmission. Token passing The network access method used by token ring. Token ring A LAN architecture featuring a ring topoogy and a token-passing network access method. Copyright Pearson Education. A rights reserved. fie://j:\macmiancomputerpubishing\chapters\jw036.htm 3/22/01

The Network Access Layer. In This Lecture. Network Access Layer. Hour 3

The Network Access Layer. In This Lecture. Network Access Layer. Hour 3 The Network Access Layer Hour 3 In This Lecture Explain what the Network Access layer is Discuss how TCP/IP's Network Access layer relates to the OSI networking model Explain what a network architecture

More information

Introduction to USB Development

Introduction to USB Development Introduction to USB Deveopment Introduction Technica Overview USB in Embedded Systems Recent Deveopments Extensions to USB USB as compared to other technoogies USB: Universa Seria Bus A seria bus standard

More information

Inside TCP/IP, Third Edition Network Support for TCP/IP

Inside TCP/IP, Third Edition Network Support for TCP/IP Inside TCP/IP, Third Edition -- Ch 3 -- Network Support for TCP/IP Page 1 of 47 Inside TCP/IP, Third Edition - 3 - Network Support for TCP/IP One of the reasons for the popuarity of TCP/IP networks is

More information

Computer Networks. College of Computing. Copyleft 2003~2018

Computer Networks. College of Computing.   Copyleft 2003~2018 Computer Networks Prof. Lin Weiguo Coege of Computing Copyeft 2003~2018 inwei@cuc.edu.cn http://icourse.cuc.edu.cn/computernetworks/ http://tc.cuc.edu.cn Internet Contro Message Protoco (ICMP), RFC 792

More information

RDF Objects 1. Alex Barnell Information Infrastructure Laboratory HP Laboratories Bristol HPL November 27 th, 2002*

RDF Objects 1. Alex Barnell Information Infrastructure Laboratory HP Laboratories Bristol HPL November 27 th, 2002* RDF Objects 1 Aex Barne Information Infrastructure Laboratory HP Laboratories Bristo HPL-2002-315 November 27 th, 2002* E-mai: Andy_Seaborne@hp.hp.com RDF, semantic web, ontoogy, object-oriented datastructures

More information

The Internet and the web

The Internet and the web The Internet and the web Contents Introduction 3 1 The Internet at home 4 2 Loca Area Networks sma office/home office 5 3 Loca Area Networks business 6 4 Wide Area Networks 8 5 Wireess networks 9 6 Mobie

More information

Link Registry Protocol Options

Link Registry Protocol Options Link Registry Protoco Options Norman Finn, March 2017 HUAWEI TECHNOLOGIES CO., LTD. IEEE 802.1 TSN At east two obvious choices for P802.1CS Link Registration Protoco An IS-IS-ike protoco. TCP (Transmission

More information

Intro to Programming & C Why Program? 1.2 Computer Systems: Hardware and Software. Why Learn to Program?

Intro to Programming & C Why Program? 1.2 Computer Systems: Hardware and Software. Why Learn to Program? Intro to Programming & C++ Unit 1 Sections 1.1-3 and 2.1-10, 2.12-13, 2.15-17 CS 1428 Spring 2018 Ji Seaman 1.1 Why Program? Computer programmabe machine designed to foow instructions Program a set of

More information

file://j:\macmillancomputerpublishing\chapters\in073.html 3/22/01

file://j:\macmillancomputerpublishing\chapters\in073.html 3/22/01 Page 1 of 15 Chapter 9 Chapter 9: Deveoping the Logica Data Mode The information requirements and business rues provide the information to produce the entities, attributes, and reationships in ogica mode.

More information

Insert the power cord into the AC input socket of your projector, as shown in Figure 1. Connect the other end of the power cord to an AC outlet.

Insert the power cord into the AC input socket of your projector, as shown in Figure 1. Connect the other end of the power cord to an AC outlet. Getting Started This chapter wi expain the set-up and connection procedures for your projector, incuding information pertaining to basic adjustments and interfacing with periphera equipment. Powering Up

More information

Self-Control Cyclic Access with Time Division - A MAC Proposal for The HFC System

Self-Control Cyclic Access with Time Division - A MAC Proposal for The HFC System Sef-Contro Cycic Access with Time Division - A MAC Proposa for The HFC System S.M. Jiang, Danny H.K. Tsang, Samue T. Chanson Hong Kong University of Science & Technoogy Cear Water Bay, Kowoon, Hong Kong

More information

Authorization of a QoS Path based on Generic AAA. Leon Gommans, Cees de Laat, Bas van Oudenaarde, Arie Taal

Authorization of a QoS Path based on Generic AAA. Leon Gommans, Cees de Laat, Bas van Oudenaarde, Arie Taal Abstract Authorization of a QoS Path based on Generic Leon Gommans, Cees de Laat, Bas van Oudenaarde, Arie Taa Advanced Internet Research Group, Department of Computer Science, University of Amsterdam.

More information

MCSE Training Guide: Windows Architecture and Memory

MCSE Training Guide: Windows Architecture and Memory MCSE Training Guide: Windows 95 -- Ch 2 -- Architecture and Memory Page 1 of 13 MCSE Training Guide: Windows 95-2 - Architecture and Memory This chapter wi hep you prepare for the exam by covering the

More information

ngenius Instrumentation Overview

ngenius Instrumentation Overview ngenius Instrumentation Overview NetScout Systems, Inc. 4 Technoogy Park Drive Westford, MA 01886 Teephone: 978-614-4000 Fax: 978-614-4004 Web: http://www.netscout.com NetScout is a registered trademark

More information

lnput/output (I/O) AND INTERFACING

lnput/output (I/O) AND INTERFACING CHAPTER 7 NPUT/OUTPUT (I/O) AND INTERFACING INTRODUCTION The input/output section, under the contro of the CPU s contro section, aows the computer to communicate with and/or contro other computers, periphera

More information

The Big Picture WELCOME TO ESIGNAL

The Big Picture WELCOME TO ESIGNAL 2 The Big Picture HERE S SOME GOOD NEWS. You don t have to be a rocket scientist to harness the power of esigna. That s exciting because we re certain that most of you view your PC and esigna as toos for

More information

Computer Networks. College of Computing. Copyleft 2003~2018

Computer Networks. College of Computing.   Copyleft 2003~2018 Computer Networks Computer Networks Prof. Lin Weiguo Coege of Computing Copyeft 2003~2018 inwei@cuc.edu.cn http://icourse.cuc.edu.cn/computernetworks/ http://tc.cuc.edu.cn Attention The materias beow are

More information

Other Protocols. Arash Habibi Lashkari

Other Protocols. Arash Habibi Lashkari LAN Technology Other Protocols Arash Habibi Lashkari PHD of Computer Science - Information Security July 2010 Other Protocols Outlines: FDDI: Fiber Distributed Data Interface Token Ring: IEEE 802.5 LAN

More information

Special Edition Using Microsoft Excel Selecting and Naming Cells and Ranges

Special Edition Using Microsoft Excel Selecting and Naming Cells and Ranges Specia Edition Using Microsoft Exce 2000 - Lesson 3 - Seecting and Naming Ces and.. Page 1 of 8 [Figures are not incuded in this sampe chapter] Specia Edition Using Microsoft Exce 2000-3 - Seecting and

More information

Windows NT, Terminal Server and Citrix MetaFrame Terminal Server Architecture

Windows NT, Terminal Server and Citrix MetaFrame Terminal Server Architecture Windows NT, Termina Server and Citrix MetaFrame - CH 3 - Termina Server Architect.. Page 1 of 13 [Figures are not incuded in this sampe chapter] Windows NT, Termina Server and Citrix MetaFrame - 3 - Termina

More information

Lecture outline Graphics and Interaction Scan Converting Polygons and Lines. Inside or outside a polygon? Scan conversion.

Lecture outline Graphics and Interaction Scan Converting Polygons and Lines. Inside or outside a polygon? Scan conversion. Lecture outine 433-324 Graphics and Interaction Scan Converting Poygons and Lines Department of Computer Science and Software Engineering The Introduction Scan conversion Scan-ine agorithm Edge coherence

More information

Intro to Programming & C Why Program? 1.2 Computer Systems: Hardware and Software. Hardware Components Illustrated

Intro to Programming & C Why Program? 1.2 Computer Systems: Hardware and Software. Hardware Components Illustrated Intro to Programming & C++ Unit 1 Sections 1.1-3 and 2.1-10, 2.12-13, 2.15-17 CS 1428 Fa 2017 Ji Seaman 1.1 Why Program? Computer programmabe machine designed to foow instructions Program instructions

More information

A METHOD FOR GRIDLESS ROUTING OF PRINTED CIRCUIT BOARDS. A. C. Finch, K. J. Mackenzie, G. J. Balsdon, G. Symonds

A METHOD FOR GRIDLESS ROUTING OF PRINTED CIRCUIT BOARDS. A. C. Finch, K. J. Mackenzie, G. J. Balsdon, G. Symonds A METHOD FOR GRIDLESS ROUTING OF PRINTED CIRCUIT BOARDS A C Finch K J Mackenzie G J Basdon G Symonds Raca-Redac Ltd Newtown Tewkesbury Gos Engand ABSTRACT The introduction of fine-ine technoogies to printed

More information

Navigating and searching theweb

Navigating and searching theweb Navigating and searching theweb Contents Introduction 3 1 The Word Wide Web 3 2 Navigating the web 4 3 Hyperinks 5 4 Searching the web 7 5 Improving your searches 8 6 Activities 9 6.1 Navigating the web

More information

Four Circuit 4 Wire Unit With Dante Network Audio Interface

Four Circuit 4 Wire Unit With Dante Network Audio Interface Network Audio 4 Wire Interface Four Circuit 4 Wire Unit With Dante Network Audio Interface GS-FW012 ip 4 Wire With Dante Interface Highights Four x 4 Wire Circuits Loca Cue Input Dante Network Audio Three

More information

A LAN is a high-speed data network that covers a relatively small geographic area. It typically connects workstations, personal computers, printers,

A LAN is a high-speed data network that covers a relatively small geographic area. It typically connects workstations, personal computers, printers, CBCN4103 A LAN is a high-speed data network that covers a relatively small geographic area. It typically connects workstations, personal computers, printers, servers, and other devices. LANs offer computer

More information

LCD Video Controller. LCD Video Controller. Introduction Safety Precautions Indentifying the Components... 5

LCD Video Controller. LCD Video Controller. Introduction Safety Precautions Indentifying the Components... 5 LCD Video Controer LCD Video Controer Introduction... 3 Safety Precautions... 4 Indentifying the Components... 5 Main Board... 5 Main Board ASIC Features... 6 LVDS Transmitter... 8 Backight Inverter...

More information

ECL Portal. Standardized SCADA solution for ECL Comfort 310. Data sheet. Description

ECL Portal. Standardized SCADA solution for ECL Comfort 310. Data sheet. Description Standardized SCADA soution for ECL Comfort 310 Description The is an effective turnkey SCADA (Supervisory Contro And Data Acquisition) too for professiona users ike service personne of district energy

More information

Functions. 6.1 Modular Programming. 6.2 Defining and Calling Functions. Gaddis: 6.1-5,7-10,13,15-16 and 7.7

Functions. 6.1 Modular Programming. 6.2 Defining and Calling Functions. Gaddis: 6.1-5,7-10,13,15-16 and 7.7 Functions Unit 6 Gaddis: 6.1-5,7-10,13,15-16 and 7.7 CS 1428 Spring 2018 Ji Seaman 6.1 Moduar Programming Moduar programming: breaking a program up into smaer, manageabe components (modues) Function: a

More information

Nearest Neighbor Learning

Nearest Neighbor Learning Nearest Neighbor Learning Cassify based on oca simiarity Ranges from simpe nearest neighbor to case-based and anaogica reasoning Use oca information near the current query instance to decide the cassification

More information

Special Edition Using Microsoft Office Sharing Documents Within a Workgroup

Special Edition Using Microsoft Office Sharing Documents Within a Workgroup Specia Edition Using Microsoft Office 2000 - Chapter 7 - Sharing Documents Within a.. Page 1 of 8 [Figures are not incuded in this sampe chapter] Specia Edition Using Microsoft Office 2000-7 - Sharing

More information

Quick Start Instructions

Quick Start Instructions Eaton Power Xpert Gateway Minisot (PXGMS) UPS Card Quick Start Instructions Ethernet 10/100 Status DHCP EMP + - CMN 100 Act Ident Power PXGMS UPS Restart TX Setup RX Package Contents Power Xpert Gateway

More information

Neural Network Enhancement of the Los Alamos Force Deployment Estimator

Neural Network Enhancement of the Los Alamos Force Deployment Estimator Missouri University of Science and Technoogy Schoars' Mine Eectrica and Computer Engineering Facuty Research & Creative Works Eectrica and Computer Engineering 1-1-1994 Neura Network Enhancement of the

More information

IBC DOCUMENT PROG007. SA/STA SERIES User's Guide V7.0

IBC DOCUMENT PROG007. SA/STA SERIES User's Guide V7.0 IBC DOCUMENT SA/STA SERIES User's Guide V7.0 Page 2 New Features for Version 7.0 Mutipe Schedues This version of the SA/STA firmware supports mutipe schedues for empoyees. The mutipe schedues are impemented

More information

Data Link Protocols. TCP/IP Suite and OSI Reference Model

Data Link Protocols. TCP/IP Suite and OSI Reference Model Data Link Protocols Relates to Lab. This module covers data link layer issues, such as local area networks (LANs) and point-to-point links, Ethernet, and the Point-to-Point Protocol (PPP). 1 TCP/IP Suite

More information

Chapter 3: Introduction to the Flash Workspace

Chapter 3: Introduction to the Flash Workspace Chapter 3: Introduction to the Fash Workspace Page 1 of 10 Chapter 3: Introduction to the Fash Workspace In This Chapter Features and Functionaity of the Timeine Features and Functionaity of the Stage

More information

Avaya Extension to Cellular User Guide Avaya Aura TM Communication Manager Release 5.2.1

Avaya Extension to Cellular User Guide Avaya Aura TM Communication Manager Release 5.2.1 Avaya Extension to Ceuar User Guide Avaya Aura TM Communication Manager Reease 5.2.1 November 2009 2009 Avaya Inc. A Rights Reserved. Notice Whie reasonabe efforts were made to ensure that the information

More information

Sample of a training manual for a software tool

Sample of a training manual for a software tool Sampe of a training manua for a software too We use FogBugz for tracking bugs discovered in RAPPID. I wrote this manua as a training too for instructing the programmers and engineers in the use of FogBugz.

More information

Infinity Connect Web App Customization Guide

Infinity Connect Web App Customization Guide Infinity Connect Web App Customization Guide Contents Introduction 1 Hosting the customized Web App 2 Customizing the appication 3 More information 8 Introduction The Infinity Connect Web App is incuded

More information

M242 COMPUTER NETWORS AND SECURITY

M242 COMPUTER NETWORS AND SECURITY M242 COMPUTER NETWORS AND SECURITY 2.1. Network Models: UNIT - II OSI MODEL AND LAN PROTOCOLS 1. Explain Network model A network is a combination of hardware and software that sends data from one location

More information

DETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS

DETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS DETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS Pave Tchesmedjiev, Peter Vassiev Centre for Biomedica Engineering,

More information

IEEE 802 LANs SECTION C

IEEE 802 LANs SECTION C IEEE 802 LANs SECTION C Outline of the Lecture Basic characteristics of LAN Topology Transmission Media MAC IEEE 802 LANs 802.3 - CSMA/CD based (Ethernet) 802.4 Token bus-based 802.5 Token ring-based Comparison

More information

Contents Presentation... 1 Pack... 2 Connections... 3 Instaation from the CD-ROM... 4 Instaation by Ethernet interface... 6 Instaation by USB interfac

Contents Presentation... 1 Pack... 2 Connections... 3 Instaation from the CD-ROM... 4 Instaation by Ethernet interface... 6 Instaation by USB interfac SAGEM F@st TM 1201 Quick Instaation Guide Contents Presentation... 1 Pack... 2 Connections... 3 Instaation from the CD-ROM... 4 Instaation by Ethernet interface... 6 Instaation by USB interface... 7 Instaation

More information

Enhanced continuous, real-time detection, alarming and analysis of partial discharge events

Enhanced continuous, real-time detection, alarming and analysis of partial discharge events DMS PDMG-RH Partia discharge monitor for GIS Enhanced continuous, rea-time detection, aarming and anaysis of partia discharge events Automatic PD faut cassification High resoution Seectabe UHF fiters and

More information

Contents. Introduction... 1 About the voice messaging system...2

Contents. Introduction... 1 About the voice messaging system...2 Contents CHAPTER.1 Introduction... 1 About the voice messaging system....2 CHAPTER-2 Panning the appication..... 5 dentifying the system manager..... 6 Deciding how to answer cas..... 8 Taioring the automated

More information

User Manual. ASeries A510

User Manual. ASeries A510 User Manua ASeries A510 Interface Converter Seria ó Parae The interfacing speciaists Version 6.00 August 1999 COPYRIGHTS A rights reserved. This document may not, in whoe or part, be copied, photocopied,

More information

Mobile App Recommendation: Maximize the Total App Downloads

Mobile App Recommendation: Maximize the Total App Downloads Mobie App Recommendation: Maximize the Tota App Downoads Zhuohua Chen Schoo of Economics and Management Tsinghua University chenzhh3.12@sem.tsinghua.edu.cn Yinghui (Catherine) Yang Graduate Schoo of Management

More information

1: Review Of Semester Provide an overview of encapsulation.

1: Review Of Semester Provide an overview of encapsulation. 1: Review Of Semester 1 1.1.1.1. Provide an overview of encapsulation. Networking evolves to support current and future applications. By dividing and organizing the networking tasks into separate layers/functions,

More information

OSI Model. Teran Subasinghe MBCS, Bsc.(Hons) in Computer Science - University of Greenwich, UK

OSI Model. Teran Subasinghe MBCS, Bsc.(Hons) in Computer Science - University of Greenwich, UK OSI Model Teran Subasinghe MBCS, Bsc.(Hons) in Computer Science - University of Greenwich, UK What is OSI Model? Open Systems Interconnection Reference Model Developed in 1984 by the International Standards

More information

Ad Hoc Networks 11 (2013) Contents lists available at SciVerse ScienceDirect. Ad Hoc Networks

Ad Hoc Networks 11 (2013) Contents lists available at SciVerse ScienceDirect. Ad Hoc Networks Ad Hoc Networks (3) 683 698 Contents ists avaiabe at SciVerse ScienceDirect Ad Hoc Networks journa homepage: www.esevier.com/ocate/adhoc Dynamic agent-based hierarchica muticast for wireess mesh networks

More information

Computer Networks. College of Computing. Copyleft 2003~2018. Prof. Lin Weiguo

Computer Networks. College of Computing.  Copyleft 2003~2018. Prof. Lin Weiguo Computer Networks Computer Networks Prof. Lin Weiguo Coege of Computing Copyeft 2003~2018 inwei@cuc.edu.cn http://tc.cuc.edu.cn Roadmap Introduction Physica Layer Data Link Layer Medium Access Subayer

More information

ECE544: Communication Networks-II, Spring Transport Layer Protocols Sumathi Gopal March 31 st 2006

ECE544: Communication Networks-II, Spring Transport Layer Protocols Sumathi Gopal March 31 st 2006 ECE544: Communication Networks-II, Spring 2006 Transport Layer Protocos Sumathi Gopa March 31 st 2006 Lecture Outine Introduction to end-to-end protocos UDP RTP TCP Programming detais 2 End-To-End Protocos

More information

5940 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 11, NOVEMBER 2014

5940 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 11, NOVEMBER 2014 5940 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 11, NOVEMBER 014 Topoogy-Transparent Scheduing in Mobie Ad Hoc Networks With Mutipe Packet Reception Capabiity Yiming Liu, Member, IEEE,

More information

1. INTRODUCTION 1.1 Product Introduction 1.2 Product Modes 1.3 Product Package 1.4 Network Printing Architecture 1.5 Network Printing Environment 1.6

1. INTRODUCTION 1.1 Product Introduction 1.2 Product Modes 1.3 Product Package 1.4 Network Printing Architecture 1.5 Network Printing Environment 1.6 Links for mode 504058 (1-Port UTP/BNC Parae Pocket Print Server): Downoads & inks http://www.inteinet-network.com/htm/d-pserver.htm This manua http://inteinet-network.com/mk2/manuas/502993_manua.zip Instructions

More information

Meeting Exchange 4.1 Service Pack 2 Release Notes for the S6200/S6800 Servers

Meeting Exchange 4.1 Service Pack 2 Release Notes for the S6200/S6800 Servers Meeting Exchange 4.1 Service Pack 2 Reease Notes for the S6200/S6800 Servers The Meeting Exchange S6200/S6800 Media Servers are SIP-based voice and web conferencing soutions that extend Avaya s conferencing

More information

Industrial Process Control Trainers with Discovery software PROCON PROCESS CONTROL TRAINERS

Industrial Process Control Trainers with Discovery software PROCON PROCESS CONTROL TRAINERS SYSTEMS Edition 1 I 38S-1 PROCON PROCESS CONTROL TRAINERS Industria Process Contro Trainers with Discovery software Leve & Fow Contro Temperature Contro Pressure Contro SYSTEMS-1 1 Temperature Rig 38-600

More information

MCSE TestPrep SQL Server 6.5 Design & Implementation - 3- Data Definition

MCSE TestPrep SQL Server 6.5 Design & Implementation - 3- Data Definition MCSE TestPrep SQL Server 6.5 Design & Impementation - Data Definition Page 1 of 38 [Figures are not incuded in this sampe chapter] MCSE TestPrep SQL Server 6.5 Design & Impementation - 3- Data Definition

More information

Symmetra. Product Overview. Redundancy. Scalability. Serviceability. Manageability. Components. How to Configure. Specifications.

Symmetra. Product Overview. Redundancy. Scalability. Serviceability. Manageability. Components. How to Configure. Specifications. Introducing Symmetra, the Word's First Power Array, and the foundation for Buiding Near-Continuous Avaiabiity Power Systems Power Array Symmetra What is a "Power Array?" Product Overview Legacy UPS vs

More information

Straight-line code (or IPO: Input-Process-Output) If/else & switch. Relational Expressions. Decisions. Sections 4.1-6, , 4.

Straight-line code (or IPO: Input-Process-Output) If/else & switch. Relational Expressions. Decisions. Sections 4.1-6, , 4. If/ese & switch Unit 3 Sections 4.1-6, 4.8-12, 4.14-15 CS 1428 Spring 2018 Ji Seaman Straight-ine code (or IPO: Input-Process-Output) So far a of our programs have foowed this basic format: Input some

More information

.County of San Mateo

.County of San Mateo -- - -- -- - -- - - --- a - -- w---- a- -- : m- I - -- -- -- --., I -- I.a, e mzzcm.county of San Mateo InterneUIntranet Web Page Design Guideines. September 30,1997 fabe of Corntents Purpose... Approach....

More information

Replication of Virtual Network Functions: Optimizing Link Utilization and Resource Costs

Replication of Virtual Network Functions: Optimizing Link Utilization and Resource Costs Repication of Virtua Network Functions: Optimizing Link Utiization and Resource Costs Francisco Carpio, Wogang Bziuk and Admea Jukan Technische Universität Braunschweig, Germany Emai:{f.carpio, w.bziuk,

More information

Lecture (03) (I) OSI Reference Model

Lecture (03) (I) OSI Reference Model Agenda Lecture (03) (I) OSI Reference Model Dr. Ahmed M. ElShafee History OSI Layers Layers function OSI & TCP/IP & NetWare Example protocols OSI Layering Concepts and Benefits OSI Terminologies ١ ٢ History

More information

Space-Time Trade-offs.

Space-Time Trade-offs. Space-Time Trade-offs. Chethan Kamath 03.07.2017 1 Motivation An important question in the study of computation is how to best use the registers in a CPU. In most cases, the amount of registers avaiabe

More information

DETECTION OF OBSTACLE AND FREESPACE IN AN AUTONOMOUS WHEELCHAIR USING A STEREOSCOPIC CAMERA SYSTEM

DETECTION OF OBSTACLE AND FREESPACE IN AN AUTONOMOUS WHEELCHAIR USING A STEREOSCOPIC CAMERA SYSTEM DETECTION OF OBSTACLE AND FREESPACE IN AN AUTONOMOUS WHEELCHAIR USING A STEREOSCOPIC CAMERA SYSTEM Le Minh 1, Thanh Hai Nguyen 2, Tran Nghia Khanh 2, Vo Văn Toi 2, Ngo Van Thuyen 1 1 University of Technica

More information

Guardian 365 Pro App Guide. For more exciting new products please visit our website: Australia: OWNER S MANUAL

Guardian 365 Pro App Guide. For more exciting new products please visit our website: Australia:   OWNER S MANUAL Guardian 365 Pro App Guide For more exciting new products pease visit our website: Austraia: www.uniden.com.au OWNER S MANUAL Privacy Protection Notice As the device user or data controer, you might coect

More information

A Fast Block Matching Algorithm Based on the Winner-Update Strategy

A Fast Block Matching Algorithm Based on the Winner-Update Strategy In Proceedings of the Fourth Asian Conference on Computer Vision, Taipei, Taiwan, Jan. 000, Voume, pages 977 98 A Fast Bock Matching Agorithm Based on the Winner-Update Strategy Yong-Sheng Chenyz Yi-Ping

More information

Outline. Parallel Numerical Algorithms. Forward Substitution. Triangular Matrices. Solving Triangular Systems. Back Substitution. Parallel Algorithm

Outline. Parallel Numerical Algorithms. Forward Substitution. Triangular Matrices. Solving Triangular Systems. Back Substitution. Parallel Algorithm Outine Parae Numerica Agorithms Chapter 8 Prof. Michae T. Heath Department of Computer Science University of Iinois at Urbana-Champaign CS 554 / CSE 512 1 2 3 4 Trianguar Matrices Michae T. Heath Parae

More information

Introduction to Networking

Introduction to Networking Networking BASICS Introduction to Networking... 2 Network Media... 4 Network Design... 5 Network Architectures... 7 Protocols and Network Software... 9 1 Introduction to Networking A computer network is

More information

Chapter 9. Ethernet. Part II

Chapter 9. Ethernet. Part II Chapter 9 Ethernet Part II CCNA1-1 Chapter 9-2 Note for Instructors These presentations are the result of a collaboration among the instructors at St. Clair College in Windsor, Ontario. Thanks must go

More information

May 13, Mark Lutz Boulder, Colorado (303) [work] (303) [home]

May 13, Mark Lutz Boulder, Colorado (303) [work] (303) [home] "Using Python": a Book Preview May 13, 1995 Mark Lutz Bouder, Coorado utz@kapre.com (303) 546-8848 [work] (303) 684-9565 [home] Introduction. This paper is a brief overview of the upcoming Python O'Reiy

More information

Raj Jain. The Ohio State University Columbus, OH

Raj Jain. The Ohio State University Columbus, OH Columbus, OH 43210 Jain@CIS.Ohio-State.Edu http://www.cis.ohio-state.edu/~jain/ 3-1 Overview ISO/OSI Reference Model TCP/IP Reference Model Differences between ISO and TCP Ethernet/IEEE 802.3 LANs Interconnecting

More information

Lesson 1: Network Communications

Lesson 1: Network Communications Lesson 1: Network Communications This lesson introduces the basic building blocks of network communications and some of the structures used to construct data networks. There are many different kinds of

More information

Development of a National Portal for Tuvalu. Business Case. SPREP Pacific iclim

Development of a National Portal for Tuvalu. Business Case. SPREP Pacific iclim Deveopment of a Nationa Porta for Tuvau Business Case SPREP Pacific iclim Apri 2018 Tabe of Contents 1. Introduction... 3 1.1 Report Purpose... 3 1.2 Background & Context... 3 1.3 Other IKM Activities

More information

Lecture Outline. Lecture 2. OSI model and networking. The OSI model and networking. The OSI model and networking. The OSI model and networking

Lecture Outline. Lecture 2. OSI model and networking. The OSI model and networking. The OSI model and networking. The OSI model and networking Lecture 2 The OSI model Chapter 2, specifically pages 42-58 Dave Novak School of Business Administration, University of Vermont Sources: 1) Network+ Guide to Networks, Dean 2013 2) Comer, Computer Networks

More information

Layering in Networked computing. OSI Model TCP/IP Model Protocols at each layer

Layering in Networked computing. OSI Model TCP/IP Model Protocols at each layer Layering in Networked computing OSI Model TCP/IP Model Protocols at each layer Learning outcomes Understand the need of layering in Networked computing Understand the OSI model and the tcp/ip model Understand

More information

CylanceOPTICS. Frequently Asked Questions

CylanceOPTICS. Frequently Asked Questions CyanceOPTICS Frequenty Asked Questions Question What is CyanceOPTICS? CyanceOPTICS is an AI driven endpoint detection and response component providing consistent visibiity, root cause anaysis, scaabe threat

More information

BGP-Based SPF IETF 96, Berlin. Keyur Patel, Cisco Acee Lindem, Cisco Derek Yeung, Cisco Abhay Roy, Cisco Venu Venugopal, Cisco

BGP-Based SPF IETF 96, Berlin. Keyur Patel, Cisco Acee Lindem, Cisco Derek Yeung, Cisco Abhay Roy, Cisco Venu Venugopal, Cisco BGP-Based SPF IETF 96, Berin Keyur Pate, Cisco Acee Lindem, Cisco Derek Yeung, Cisco Abhay Roy, Cisco Venu Venugopa, Cisco 1 Data Center Routing Routing Probem Space Routing scaing for Massivey Scaabe

More information

More on LANS. LAN Wiring, Interface

More on LANS. LAN Wiring, Interface More on LANS Chapters 10-11 LAN Wiring, Interface Mostly covered this material already NIC = Network Interface Card Separate processor, buffers incoming/outgoing data CPU might not be able to keep up network

More information

UnixWare 7 System Administration UnixWare 7 System Configuration

UnixWare 7 System Administration UnixWare 7 System Configuration UnixWare 7 System Administration - CH 3 - UnixWare 7 System Configuration Page 1 of 8 [Figures are not incuded in this sampe chapter] UnixWare 7 System Administration - 3 - UnixWare 7 System Configuration

More information

Further Optimization of the Decoding Method for Shortened Binary Cyclic Fire Code

Further Optimization of the Decoding Method for Shortened Binary Cyclic Fire Code Further Optimization of the Decoding Method for Shortened Binary Cycic Fire Code Ch. Nanda Kishore Heosoft (India) Private Limited 8-2-703, Road No-12 Banjara His, Hyderabad, INDIA Phone: +91-040-3378222

More information

An Introduction to Design Patterns

An Introduction to Design Patterns An Introduction to Design Patterns 1 Definitions A pattern is a recurring soution to a standard probem, in a context. Christopher Aexander, a professor of architecture Why woud what a prof of architecture

More information

CS 3201 Computer Networks 2014/2015 Handout: Lab 3

CS 3201 Computer Networks 2014/2015 Handout: Lab 3 Lab Content: - Network Devices - Ethernet Network - MAC Address Network Devices: - Hubs, MAU s, and Repeaters Hubs Hubs are one of the most important components of a network because they act as a central

More information

For Review Only. CFP: Cooperative Fast Protection. Bin Wu, Pin-Han Ho, Kwan L. Yeung, János Tapolcai and Hussein T. Mouftah

For Review Only. CFP: Cooperative Fast Protection. Bin Wu, Pin-Han Ho, Kwan L. Yeung, János Tapolcai and Hussein T. Mouftah Journa of Lightwave Technoogy Page of CFP: Cooperative Fast Protection Bin Wu, Pin-Han Ho, Kwan L. Yeung, János Tapocai and Hussein T. Mouftah Abstract We introduce a nove protection scheme, caed Cooperative

More information

Data Link Layer, Part 3 Medium Access Control. Preface

Data Link Layer, Part 3 Medium Access Control. Preface Data Link Layer, Part 3 Medium Access Control These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang's courses at GMU can make a single machine-readable

More information

Automatic Hidden Web Database Classification

Automatic Hidden Web Database Classification Automatic idden Web atabase Cassification Zhiguo Gong, Jingbai Zhang, and Qian Liu Facuty of Science and Technoogy niversity of Macau Macao, PRC {fstzgg,ma46597,ma46620}@umac.mo Abstract. In this paper,

More information

2. LAN Topologies Gilbert Ndjatou Page 1

2. LAN Topologies Gilbert Ndjatou Page 1 2. LAN Topologies Two basic categories of network topologies exist, physical topologies and logical topologies. The physical topology of a network is the cabling layout used to link devices. This refers

More information

Introduction to LAN Topologies Cabling. 2000, Cisco Systems, Inc. 3-1

Introduction to LAN Topologies Cabling. 2000, Cisco Systems, Inc. 3-1 Introduction to LAN Topologies Cabling 2000, Cisco Systems, Inc. 3-1 Objectives Upon completion of this chapter, you will be able to perform the following tasks: Media / Cabling Local Area Network Cabling

More information

ECEn 528 Prof. Archibald Lab: Dynamic Scheduling Part A: due Nov. 6, 2018 Part B: due Nov. 13, 2018

ECEn 528 Prof. Archibald Lab: Dynamic Scheduling Part A: due Nov. 6, 2018 Part B: due Nov. 13, 2018 ECEn 528 Prof. Archibad Lab: Dynamic Scheduing Part A: due Nov. 6, 2018 Part B: due Nov. 13, 2018 Overview This ab's purpose is to expore issues invoved in the design of out-of-order issue processors.

More information

Smart Solutions for Power Protection & Control. SCADA System

Smart Solutions for Power Protection & Control. SCADA System Smart Soutions for Power Protection & Contro SCADA System About ASCADA SAS ASHIDA has Designed, Deveoped & Perfected SCADA (Supervisory Contro & Data Acquisition System) System especiay for Substation

More information

Relational Model. Lecture #6 Autumn, Fall, 2001, LRX

Relational Model. Lecture #6 Autumn, Fall, 2001, LRX Reationa Mode Lecture #6 Autumn, 2001 #06 Reationa Mode HUST,Wuhan,China 121 Reationa Mode Tabe = reation. Coumn headers = attributes. Row = tupe Reation schema = name(attributes). Exampe: Beers(name,

More information

User s Guide. Eaton Bypass Power Module (BPM) For use with the following: Eaton 9155 UPS (8 15 kva)

User s Guide. Eaton Bypass Power Module (BPM) For use with the following: Eaton 9155 UPS (8 15 kva) Eaton Bypass Power Modue (BPM) User s Guide For use with the foowing: Eaton 9155 UPS (8 15 kva) Eaton 9170+ UPS (3 18 kva) Eaton 9PX Spit-Phase UPS (6 10 kva) Specia Symbos The foowing are exampes of symbos

More information

Collaborative Approach to Mitigating ARP Poisoning-based Man-in-the-Middle Attacks

Collaborative Approach to Mitigating ARP Poisoning-based Man-in-the-Middle Attacks Coaborative Approach to Mitigating ARP Poisoning-based Man-in-the-Midde Attacks Seung Yeob Nam a, Sirojiddin Djuraev a, Minho Park b a Department of Information and Communication Engineering, Yeungnam

More information

Archive Software with value add services:

Archive Software with value add services: E-Mai Archive Software with vaue add services: Protect your emais from data oss through reasonabe and secure backup features. Increase the productivity of your team by using the integrated search engine

More information

IrDA IrLAP Throughput Optimisation with Physical Layer Consideration

IrDA IrLAP Throughput Optimisation with Physical Layer Consideration IrDA IrLAP Throughput Optimisation with Physica Layer onsideration Abstract Barker, P. & Boucouvaas, A.. Mutimedia ommunications Research Group Schoo of Design, Engineering & omputing Bournemouth University,

More information

Commentary Unit With Talkback And Dante Network Audio Interface

Commentary Unit With Talkback And Dante Network Audio Interface Network Audio Commentary Interface ensound Commentary Unit With Takback And Dante Network Audio Interface VITA Network Audio Commentary Interface Highights For Commentary Or Takback Two Assignabe 4 Wire

More information

Arithmetic Coding. Prof. Ja-Ling Wu. Department of Computer Science and Information Engineering National Taiwan University

Arithmetic Coding. Prof. Ja-Ling Wu. Department of Computer Science and Information Engineering National Taiwan University Arithmetic Coding Prof. Ja-Ling Wu Department of Computer Science and Information Engineering Nationa Taiwan University F(X) Shannon-Fano-Eias Coding W..o.g. we can take X={,,,m}. Assume p()>0 for a. The

More information

Computing devices have become increasingly mobile at the client end, and the

Computing devices have become increasingly mobile at the client end, and the Pronto: Mobie Gateway With Pubish- Subscribe Paradigm Over Wireess Network Eiko Yoneki University of Cambridge Pronto, a messaging middeware system for mobie appications, provides both centraized and decentraized

More information

Guide to Networking Essentials, 6 th Edition. Chapter 6: Network Reference Models and Standards

Guide to Networking Essentials, 6 th Edition. Chapter 6: Network Reference Models and Standards Guide to Networking Essentials, 6 th Edition Chapter 6: Network Reference Models and Standards Objectives Explain the OSI reference model layers and their relationship to hardware and software Explain

More information

mobile telephone HD Voice Mobile Telephone GSM Highlights MKII Fully Updated Re-Design HD Voice 7kHz Bandwidth Dante / AES67 Option Highlights GSM

mobile telephone HD Voice Mobile Telephone GSM Highlights MKII Fully Updated Re-Design HD Voice 7kHz Bandwidth Dante / AES67 Option Highlights GSM GS-MPI005HD MKII Broadcaster s Mobie Phone Highights HD Voice 7kHz Bandwidth MKII Fuy Updated Re-Design Coour Touchscreen Handset Interface For Ca Screening Dante / AES67 Option Highights UMTS (3G) Highights

More information

Objectives. Hexadecimal Numbering and Addressing. Ethernet / IEEE LAN Technology. Ethernet

Objectives. Hexadecimal Numbering and Addressing. Ethernet / IEEE LAN Technology. Ethernet 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Objectives Ethernet Network Fundamentals Chapter 9 ITE PC v4.0 Chapter 1 1 Introduce Hexadecimal number system Describe the features of various

More information