Network Imaging Techniques Gilbert Held
|
|
- Lewis McCoy
- 5 years ago
- Views:
Transcription
1 Network Imaging Techniques Gilbert Held Payoff Supporting imaging applications does not necessarily require an expensive network upgrade. This article discusses several inexpensive, timesaving techniques for protecting network performance while transmitting images across the LAN. Introduction Many network administrators have migrated a LAN to an Asynchronous Transfer Mode infrastructure or upgraded a Token Ring network to Fast Ethernet in an effort to support imaging applications. Although imaging is bandwidth intensive, there are several alternatives for optimizing their transmission over a LAN. Image transmission and printing can be enhanced by using software or by reconfiguring the LAN infrastructure. This article discusses five techniques for enhancing LAN -based imaging that may help users avoid investing in an expensive network upgrade. Transmitting Compressed Files Most images require a minimum of 50 to 100K bytes. If a 10Base-T Ethernet or a 16Mbps Token Ring network is being used, downloading an image can significantly effect network operations. For example, if a 10Base-T Ethernet LAN is operating at 10M bps with 100 active users, each user obtains approximately 100,000 bps of bandwidth. The average delay associated with a 100K-byte image file is eight seconds. If a network user needs to download multiple images, the activity of the workstation would have to be extended, which would result in an increased number of collisions as other network users attempt to perform other operations. More delays would result because each collision is followed by a jam signal during which no station on the network can attempt a retransmission. Compressing Images Prior to Transmission One method of minimizing the effect on network performance is to compress images prior to their transmission. Exhibit 1 illustrates the use of the program NetZIP developed by Software Builders, Inc. (Atlanta GA). This Windows-compliant program can create ZIP files, which are archived and compressed files, and includes a function that automatically extracts previously compressed and archived files. Other programs that perform similar compression and archiving functions include PKZIP/PKUNZIP from PKWARE, Inc. (Brown Deer WI), and ARJ, developed by Robert Jung and LHA. The latter is a public domain archiving program developed in Japan that can be obtained from several computer bulletin board systems in the US. Exhibit 1 illustrates the creation of an archive file named TIF.ZIP that contains 19 images. Using Software Builder's NetZIP Compression Program Exhibit 2 shows the files compressed in TIF.ZIP. The entries in the inner window include a column labeled percent that indicates the percentage of data reduction obtained through the compression of each file in the archive. The file SCREENOO.TIF shows only a 14%
2 reduction. However, each of the files include TIF images that were stored using compression. The use of NetZIP can further compress previously compressed images. Using the NetZIP Program to Archive Previously Compressed Images Using Lossy Compressed Images NetZIP, which is based on the compression used in the PKZIP program, uses a fully reversible, or lossless, compression. This means that the decompression of a previously compressed image results in the exact restoration of the original image. It is important to use lossless compression on text files. The loss of a small amount of detail in an image may not even be noticeable, however, the same loss in a text file could critically alter its meaning. The use of a lossy compression technique can substantially reduce data storage requirements as well as the amount of time required to transport images from a server to workstations. Joint Photographic Experts Group One of the more popular lossy compression methods, Joint Photographic Experts Group (JPEG), is a standard for full-color and gray-scale images. A group known as Independent JPEG developed two public domain software programs compression JPEG (CJPEG) and Decompression JPEG. Compression JPEG provides the capability to convert Graphics Image Format (GIF) and other image files into JPEG format, and decompression JPEG (DJPEG) decompresses a JPEG file back into a different image format. GIF is an image storage format popularized by CompuServe. A GIF image is stored using a lossless compression method known as Lempel-Ziv-Welch (LZW). By converting a GIF image into a JPEG image, users can save file storage space as well as time required to transmit the image on a LAN (see Exhibit 2). Exhibit 3 illustrates the display of the CJPEG help screen that is generated by entering the command line improperly or simply entering the name of the program without arguments. The quality N switch governs the compression quality of the program. A value of 0 for N results in the worst image quality and a value of 100 results in the best quality. For almost all image conversions, the program's default value of 75 results in an image that the naked eye cannot distinguish from the original. However, the differences in storage between the two can be considerable. To illustrate the potential data storage reduction from converting a Graphics Image Format image to a JPEG image, the CJPEG program was used with the following command entry: CJPEG ML3872F.GIF ML3872F.JPG In the command line, ML3872F.GIF represents a multiple listing image of a home stored in GIF format that was used as input to the program. The string ML3872F.JPG represents the name of the output file that contains the converted JPEG image. Because Disk Operating System only supports a three character extension, the extension.jpg is used by the program. Once the Compression JPEG program was executed, a directory listing indicated the following data storage requirements for the following files: ML3872F.GIF30,393 ML3872F.JPG109,618 The simple conversion of a GIF file to a JPEG file resulted in more than a 70% reduction in the storage requirements. Because many viewing programs have a JPEG file
3 format capability and can be used with World Wide Web browsers, many users may have all the software they need to convert GIF files to JPEG files. The conversion of images from a lossless to lossy compression format saves both time and server storage space. The CJPEG Help Screen C:\JPEG>cjpeg C:\JPEG\CJPEG.EXE: must name one input and one output file usage: C:\JPEG\CJPEG.EXE [switches] inputfile outputfile Switches (names may be abbreviated): -quality N Compression quality (0..100; 5-95 is useful range) -grayscale Create monochrome JPEG file -optimize Optimize Huffman table (smaller file, but slow compression) -targa Input file is Targa format (usually not needed) Switches for advanced users: -restart N Set restart interval in rows, or in blocks with B -smooth N Smooth dithered input (N= is strength) -maxmemory N Maximum memory to use (in kbytes) -verbose or Emit debug output -debug Switches for wizards: -qtables file Use quantization tables given in file -sample HxV[...] Set JPEG sampling factors C:\JPEG> Thumbnail Screens If storage of a large number of images is required, the effect of image transmission can be reduced on a LAN through the use of thumbnail screens. The term thumbnail screen represents a collection of images that are displayed by reducing the number of horizontal and vertical scans that make up each image. A thumbnail screen provides a preview of several images simultaneously. Instead of selecting one image after another from a server, a user can view many images on one screen before making a selection. The use of thumbnail screens to reduce LAN transmission has been successfully applied in the parts distribution and real estate industries, and is appropriate for any organization where users may need to view several images prior to selecting one. In a parts distribution environment, a single thumbnail screen provides the images of a dozen related parts. The user can quickly isolate the part that may be the focus of a customer query and display a full screen image of that part. Without the use of a thumbnail screen, the user may have to scroll through a dozen or more full screens of parts, which would impair network performance. Thumbnail creation programs and viewers are available as shareware from several vendors and can be purchased for as little as $5.00 per user under a site license agreement. Compared with the cost of upgrading to a new LAN infrastructure, the use of software to enhance network performance is a nominal expenditure. Network Segmentation There are certain network environments where the use of compression and thumbnail screens only minimally effect network performance because of the overall transfer of
4 images on the network. For such situations, it may be possible to segment the network if the requirement for image access is limited to a defined subset of office employees. A Segmentation Case Study: The Real Estate Office In a real estate office of 25 employees there are 12 agents and a support staff that includes administrative assistants, advertising clerks, contract document preparers, and managers. The office has a common LAN that agents use to preview images of homes stored on a server whenever a potential customer is brought into the office. The other office employees need to perform word processing, and access spreadsheets and data base programs. A few agents may bring customers into the office and begin to browse through stored home images, which can seriously interfere with the interactive query-response communications in progress. To alleviate the effect of the transmission of images on client/server applications, the network could be segmented. The top of Exhibit 4 illustrates a common Ethernet network prior to segmentation, and the lower portion of that illustration indicates the possible segmentation of the network. In this example the network used Novell's NetWare operating system. Segmenting an Ethernet LAN to Minimize the Effect of Image Transmissions One of the lesser-known features of NetWare is the ability of a file server to perform internal bridging to interconnect two LAN segments. Although Novell refers to this as LAN routing, the file server actually functions as a transparent bridge to interconnect the two network segments. The only hardware required to perform bridging is a second Ethernet adapter card that can be obtained for less than $100. Implementing segmentation is relatively inexpensive. In the segmented LAN illustrated at the bottom of Exhibit 4, the 12 agents that require the downloading of images from the server were placed on a common segment. Because an agent typically converses with the client as images are being displayed on their monitor, a delay of ten seconds or more may hardly be noticeable and should not impair productivity as one agent's image requests compete with those of other agents. Image requests are not the only network traffic, however. Support staff members may be trying to create documents on the server when an agent is initiating an image transfer. Although the Ethernet carrier-sense, multiple access with collision detection (CSMA/CD) protocol acts as an arbitrator to provide each station with equivalent LAN access, the large number of frames required to transport each image can only interfere with the frames carrying interactive query-response traffic used to prepare a document. This interference causes delays for users who are entering data into information fields on the document. By segmenting the Ethernet LAN into two segments, the effect of transmitting images on query-response applications is minimized. Reducing the Collision Window On Ethernet Lans In a Carrier Sense Multiple Access/Collision Detection network, stations listen to the network prior to transmitting. If two stations are distant from one another, the probability that one station fails to hear the network and initiates its' own transmission increases. Thus, as the distance between stations increases, the probability of collisions increases. When the first station detects a collision, it transmits a jam signal that precludes transmissions from
5 other workstations for the duration of the Ethernet frame, which causes LAN performance to suffer. Thus, there is a high correlation between reduced Ethernet performance and the distance between very active workstations. Although it is probably impractical to relocate more than a few very active workstations to reduce the distance between stations, it may be relatively easy to reduce the cable distance between the two most active stations on most networks. The file server and print server are normally the most active devices on a LAN. The top of Exhibit 5 illustrates an Ethernet network where a file server is located at a relatively long cable distance from a print server, resulting in a long collision window. The lower portion of Exhibit 5 illustrates a reduction in the collision window between highly active network stations obtained by simply recabling one server closer to the other. Based on the use of performance monitoring equipment, a reduction in network use between 4 and 7% has been obtained by relocating a few active workstations closer to one another. Reducing the Ethernet Collision Window Conclusion Although the transmission and printing of images on a LAN represents a bandwidthintensive application, it may not require a costly and time-consuming LAN upgrade or replacement. As indicated in this article, there are several techniques the communications manager can implement, either individually or with the support of an organization's applications programming branch. The use of a compression and archiving performing program may be obtainable on a site license basis for less than a few hundred dollars and can reduce the time required to transmit images by half. If the scanner and digital camera software support the storage of images in Joint Photographic Experts Group format, as most do, image data storage and transmission time can be reduced even more than they are by using lossless compression techniques. Similarly, a thumbnail capability is included in many commercial picture viewing software products and its use may not require any additional cost. If software does not provide sufficient relief and LAN congestion remains a problem, hardware solutions should be evaluated. Users should first consider recabling an Ethernet LAN to reduce the collision window. Recabling costs are usually minimal. Another possible solution is network segmentation, however, this is a more costly approach that requires the use of a bridge. Before embarking on an expensive and time-consuming network upgrade, network administrators may want to try implementing one or more of the techniques described in this article for reducing the effect of image transmission on LAN performance, saving time and money. Author Biographies Gilbert Held Gilbert Held is director of 4-Degree Consulting, a Macon GA-based high-tech consulting group. He is an internationally recognized author and lecturer, having written more than 40 books and 300 technical articles. He earned a BSEE from Pennsylvania Military College, an MSEE from New York University, and MBA and MSTM degrees from The American
6 University. He has been selected to represent the US at technical conferences in Moscow and Jerusalem and has received numerous awards for excellence in technical writing.
7
8
9
10
DATA COMMUNICATIONS MANAGEMENT. Gilbert Held INSIDE
51-10-06 DATA COMMUNICATIONS MANAGEMENT VIRTUAL LANS Gilbert Held INSIDE Definition, Rationale, Support for Virtual Networking Requirements, Facilitating Adds, Moves, and Changes, Enhancing Network Performance,
More informationThe Corporate Intranet Gilbert Held
51-10-52 The Corporate Intranet Gilbert Held Payoff The growth in the popularity of the Internet has significantly influenced software product development users today can access search tools and browsers
More informationUNDERSTANDING GIGABIT ETHERNET PERFORMANCE
51-20-98 DATA COMMUNICATIONS MANAGEMENT UNDERSTANDING GIGABIT ETHERNET PERFORMANCE Gilbert Held INSIDE Ethernet Frame Flow; The Gigabit Ethernet Frame OVERVIEW Gigabit Ethernet represents the latest Institute
More informationUsing Windows NT in a NetWare Environment Gilbert Held
Previous screen 50-20-40 Using Windows NT in a NetWare Environment Gilbert Held Payoff For companies that require Windows NT clients to work in a NetWare environment, getting the configuration setup right
More informationEvaluating Client/Server Operating Systems: Focus on Windows NT Gilbert Held
5-02-30 Evaluating Client/Server Operating Systems: Focus on Windows NT Gilbert Held Payoff As organizations increasingly move mainframe-based applications to client/server platforms, Information Systems
More informationImage coding and compression
Image coding and compression Robin Strand Centre for Image Analysis Swedish University of Agricultural Sciences Uppsala University Today Information and Data Redundancy Image Quality Compression Coding
More information2. LAN Topologies Gilbert Ndjatou Page 1
2. LAN Topologies Two basic categories of network topologies exist, physical topologies and logical topologies. The physical topology of a network is the cabling layout used to link devices. This refers
More information1: Review Of Semester Provide an overview of encapsulation.
1: Review Of Semester 1 1.1.1.1. Provide an overview of encapsulation. Networking evolves to support current and future applications. By dividing and organizing the networking tasks into separate layers/functions,
More informationManaging Networks with the Global Naming Tree Gilbert Held
51-10-15 Managing Networks with the Global Naming Tree Gilbert Held Payoff An often-overlooked and hidden-from-view characteristic of network management systems is their use of the global naming tree.
More informationcolor bit depth dithered
EPS The EPS (Encapsulated PostScript) format is widely accepted by the graphic arts industry for saving images that will be placed into programs such as Adobe Illustrator and QuarkXPress. It is used on
More informationDigital Image Processing
Lecture 9+10 Image Compression Lecturer: Ha Dai Duong Faculty of Information Technology 1. Introduction Image compression To Solve the problem of reduncing the amount of data required to represent a digital
More informationChapter Seven. Local Area Networks: Part 1. Data Communications and Computer Networks: A Business User s Approach Seventh Edition
Chapter Seven Local Area Networks: Part 1 Data Communications and Computer Networks: A Business User s Approach Seventh Edition After reading this chapter, you should be able to: State the definition of
More informationIMAGE COMPRESSION. Image Compression. Why? Reducing transportation times Reducing file size. A two way event - compression and decompression
IMAGE COMPRESSION Image Compression Why? Reducing transportation times Reducing file size A two way event - compression and decompression 1 Compression categories Compression = Image coding Still-image
More informationImage Compression for Mobile Devices using Prediction and Direct Coding Approach
Image Compression for Mobile Devices using Prediction and Direct Coding Approach Joshua Rajah Devadason M.E. scholar, CIT Coimbatore, India Mr. T. Ramraj Assistant Professor, CIT Coimbatore, India Abstract
More informationChapter 4 NETWORK HARDWARE
Chapter 4 NETWORK HARDWARE 1 Network Devices As Organizations grow, so do their networks Growth in number of users Geographical Growth Network Devices : Are products used to expand or connect networks.
More informationTCOM 370 NOTES 99-1 NETWORKING AND COMMUNICATIONS
TCOM 370 NOTES 99-1 NETWORKING AND COMMUNICATIONS Communication Networks Allow Exchange of Information between Users telephone network for voice communication interconnected computers and peripherals,
More informationPerformance Evaluation of FDDI, ATM, and Gigabit Ethernet as Backbone Technologies Using Simulation
Performance Evaluation of FDDI, ATM, and Gigabit Ethernet as Backbone Technologies Using Simulation Sanjay P. Ahuja, Kyle Hegeman, Cheryl Daucher Department of Computer and Information Sciences University
More information15 Data Compression 2014/9/21. Objectives After studying this chapter, the student should be able to: 15-1 LOSSLESS COMPRESSION
15 Data Compression Data compression implies sending or storing a smaller number of bits. Although many methods are used for this purpose, in general these methods can be divided into two broad categories:
More informationCHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College
CHAPTER 7 MAC LAYER PROTOCOLS Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College MEDIUM ACCESS CONTROL - MAC PROTOCOLS When the two stations transmit data
More informationNETWORKING COMPONENTS
1) OBJECTIVES NETWORKING COMPONENTS The objectives of this chapter are to familiarize with the following: - i) The LAN components ii) iii) iv) Repeater Hub Bridge v) Router vi) Gateway 2) INTRODUCTION
More informationData Compression. Media Signal Processing, Presentation 2. Presented By: Jahanzeb Farooq Michael Osadebey
Data Compression Media Signal Processing, Presentation 2 Presented By: Jahanzeb Farooq Michael Osadebey What is Data Compression? Definition -Reducing the amount of data required to represent a source
More informationChapter 6: Network Communications and Protocols
Learning Objectives Chapter 6: Network Communications and Protocols Understand the function and structure of packets in a network, and analyze and understand those packets Understand the function of protocols
More informationHigh Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols
High Level View EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 Goal: share a communication medium among multiple hosts connected to it Problem: arbitrate between connected hosts Solution goals:
More informationDeltaV Continuous Historian
Frequently Asked Questions Data Analysis Integrated Configuration Scalable Flexible Architecture Contents 1. Introduction 1.1. What is the DeltaV Continuous Historian? 5 1.2. What features are available
More informationINF5063: Programming heterogeneous multi-core processors. September 17, 2010
INF5063: Programming heterogeneous multi-core processors September 17, 2010 High data volumes: Need for compression PAL video sequence 25 images per second 3 bytes per pixel RGB (red-green-blue values)
More informationBest practices for producing high quality PDF files
University of Michigan Deep Blue deepblue.lib.umich.edu 2006-05-05 Best practices for producing high quality PDF files Formats Group, Deep Blue http://hdl.handle.net/2027.42/58005 Best practices for producing
More informationOutline: Connecting Many Computers
Outline: Connecting Many Computers Last lecture: sending data between two computers This lecture: link-level network protocols (from last lecture) sending data among many computers 1 Review: A simple point-to-point
More informationModule 5 Local Area Networks
Module 5 Local Area Networks Lesson 15 LAN Topologies, Access Mechanisms And Media 5.1.1 INTRODUCTION Microelectronics brought a great revolution in computer technology. While the processing power of the
More informationLossless Image Compression with Lossy Image Using Adaptive Prediction and Arithmetic Coding
Lossless Image Compression with Lossy Image Using Adaptive Prediction and Arithmetic Coding Seishi Taka" and Mikio Takagi Institute of Industrial Science, University of Tokyo Abstract Lossless gray scale
More informationIntroduction to LAN Protocols
CHAPTER 2 Chapter Goals Learn about different LAN protocols. Understand the different methods used to deal with media contention. Learn about different LAN topologies. This chapter introduces the various
More informationEE 122: Ethernet and
EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose) High Level View Goal: share a communication medium among multiple hosts
More informationIntroduction to Wireless Networking ECE 401WN Spring 2008
Introduction to Wireless Networking ECE 401WN Spring 2008 Lecture 2: Communication Networks The first major topic we will study will be WLANs. But before that, we need to consider a few basics of networking.
More informationTHE HIDDEN COSTS IN NETWORK BANDWIDTH
Optimization Benefits: THE HIDDEN COSTS IN NETWORK BANDWIDTH Improve performance Improve employee productivity Avoid unnecessary service and equipment upgrades Reduce management expenses Avoid application
More informationMultimedia Signals and Systems Still Image Compression - JPEG
Multimedia Signals and Systems Still Image Compression - JPEG Kunio Takaya Electrical and Computer Engineering University of Saskatchewan January 27, 2008 ** Go to full-screen mode now by hitting CTRL-L
More informationSummary of MAC protocols
Summary of MAC protocols What do you do with a shared media? Channel Partitioning, by time, frequency or code Time Division, Code Division, Frequency Division Random partitioning (dynamic) ALOHA, S-ALOHA,
More informationChapter 12 Multiple Access 12.1
Chapter 12 Multiple Access 12.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 12.2 Figure 12.1 Data link layer divided into two functionality-oriented sublayers
More information7: Image Compression
7: Image Compression Mark Handley Image Compression GIF (Graphics Interchange Format) PNG (Portable Network Graphics) MNG (Multiple-image Network Graphics) JPEG (Join Picture Expert Group) 1 GIF (Graphics
More informationData and information. Image Codning and Compression. Image compression and decompression. Definitions. Images can contain three types of redundancy
Image Codning and Compression data redundancy, Huffman coding, image formats Lecture 7 Gonzalez-Woods: 8.-8.3., 8.4-8.4.3, 8.5.-8.5.2, 8.6 Carolina Wählby carolina@cb.uu.se 08-47 3469 Data and information
More informationImage Coding and Compression
Lecture 17, Image Coding and Compression GW Chapter 8.1 8.3.1, 8.4 8.4.3, 8.5.1 8.5.2, 8.6 Suggested problem: Own problem Calculate the Huffman code of this image > Show all steps in the coding procedure,
More informationNetworking 101. Introduction to Ethernet networking basics; Network types, components, configurations. Routers. Switches. Servers.
Switches Routers PCs Networking 101 Introduction to Ethernet networking basics; Network types, components, configurations Servers Hubs Protocols Cat-5 UTP NICs Page 1 July 28, 2000 Network Types LAN Local
More informationLecture 5: Compression I. This Week s Schedule
Lecture 5: Compression I Reading: book chapter 6, section 3 &5 chapter 7, section 1, 2, 3, 4, 8 Today: This Week s Schedule The concept behind compression Rate distortion theory Image compression via DCT
More informationTest Bank for A Guide to Designing and Implementing Local And Wide Area Networks 2nd Edition by Palmer and Sinclair
Test Bank for A Guide to Designing and Implementing Local And Wide Area Networks 2nd Edition by Palmer and Sinclair Link download full: https://testbankservice.com/download/test-bank-for-aguide-to-designing-and-implementing-local-and-wide-area-networks-2ndedition-by-palmer-and-sinclair/
More informationNorcom. e-fileplan Electronic Cabinet System
Norcom e-fileplan Electronic Cabinet System Revision 2.0 \ Phone: (866) 726-6328 Email:sales@norcom-inc.com e-fileplan Overview e-fileplan is an electronic filing cabinet and document imaging system. e-fileplan
More informationHTML/XML. XHTML Authoring
HTML/XML XHTML Authoring Adding Images The most commonly used graphics file formats found on the Web are GIF, JPEG and PNG. JPEG (Joint Photographic Experts Group) format is primarily used for realistic,
More informationSo, what is data compression, and why do we need it?
In the last decade we have been witnessing a revolution in the way we communicate 2 The major contributors in this revolution are: Internet; The explosive development of mobile communications; and The
More informationLecture (03) (I) OSI Reference Model
Agenda Lecture (03) (I) OSI Reference Model Dr. Ahmed M. ElShafee History OSI Layers Layers function OSI & TCP/IP & NetWare Example protocols OSI Layering Concepts and Benefits OSI Terminologies ١ ٢ History
More information1.6 Graphics Packages
1.6 Graphics Packages Graphics Graphics refers to any computer device or program that makes a computer capable of displaying and manipulating pictures. The term also refers to the images themselves. A
More informationSecuring NetWare Enterprise Local Area Networks H. Van Tran Cynthia D. Heagy Payoff
87-10-10 Securing NetWare Enterprise Local Area Networks H. Van Tran Cynthia D. Heagy Payoff Data security professionals in many organizations must protect data and applications running on local area networks
More informationMultimedia Systems. Part 4. Mahdi Vasighi
Multimedia Systems Part 4 Mahdi Vasighi www.iasbs.ac.ir/~vasighi Department of Computer Science and Information Technology, Institute for Advanced Studies in Basic Sciences, Zanjan, Iran Image Formats
More informationReview For Exam 2. Internetworking. Summary Questions. School of Business Eastern Illinois University. School of Business Eastern Illinois University
School of Business Review For Exam 2 Wednesday 10/6/2004) Abdou Illia, Fall 2004 School of Business Internetworking 3 1. Name the two most known Medium Access Control Protocols found in LANs. How they
More informationFundamentals of Networking. OSI & TCP/IP Model. Kuldeep Sonar 1
Fundamentals of Networking OSI & TCP/IP Model Kuldeep Sonar 1 Kuldeep Sonar 2 OSI Model Kuldeep Sonar 3 Application Layer Layer 7 provides an interface between a host s communication software and any necessary
More informationAvaya C360 SMON User Guide
Avaya C360 SMON User Guide May 2004 Avaya C360 SMON User Guide Copyright 2004 Avaya Inc. All Rights Reserved The products, specifications, and other technical information regarding the products contained
More informationModule 16: Distributed System Structures
Chapter 16: Distributed System Structures Module 16: Distributed System Structures Motivation Types of Network-Based Operating Systems Network Structure Network Topology Communication Structure Communication
More informationInterface The exit interface a packet will take when destined for a specific network.
The Network Layer The Network layer (also called layer 3) manages device addressing, tracks the location of devices on the network, and determines the best way to move data, which means that the Network
More informationLesson 1: Network Communications
Lesson 1: Network Communications This lesson introduces the basic building blocks of network communications and some of the structures used to construct data networks. There are many different kinds of
More informationImage, video and audio coding concepts. Roadmap. Rationale. Stefan Alfredsson. (based on material by Johan Garcia)
Image, video and audio coding concepts Stefan Alfredsson (based on material by Johan Garcia) Roadmap XML Data structuring Loss-less compression (huffman, LZ77,...) Lossy compression Rationale Compression
More informationEE67I Multimedia Communication Systems Lecture 4
EE67I Multimedia Communication Systems Lecture 4 Lossless Compression Basics of Information Theory Compression is either lossless, in which no information is lost, or lossy in which information is lost.
More informationComputers Are Your Future Prentice-Hall, Inc.
Computers Are Your Future 2006 Prentice-Hall, Inc. Computers Are Your Future Chapter 5 Application Software: Tools for Productivity 2006 Prentice-Hall, Inc Slide 2 You Will Learn... ü How system software
More informationModule 15: Network Structures
Module 15: Network Structures Background Topology Network Types Communication Communication Protocol Robustness Design Strategies 15.1 A Distributed System 15.2 Motivation Resource sharing sharing and
More informationINTRODUCTION TO WINDOWS 2000
50-30-31 DATA COMMUNICATIONS MANAGEMENT INTRODUCTION TO WINDOWS 2000 Gilbert Held INSIDE Versions; Features; New Features; Graphic Improvements; Active Directory; Encryption and Compression; Disk Quotas;
More informationSimply Good Pictures Engelmann Media GmbH
Contents 3 Table of Contents Part I 6 1 Features... 7 2 Product... contents 7 3 System... requirements 7 4 Support... 7 Part II First steps 10 1 Installation... 10 2 Program... start 10 3 Demo... version
More informationIntroducing Campus Networks
Cisco Enterprise Architecture Introducing Campus Networks 2003, Cisco Systems, Inc. All rights reserved. 2-1 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0 2-2 Campus Data Center Combines switching
More informationVoice over Internet Protocol
Voice over Internet Protocol Voice over Internet Protocol Contents Introduction Benefits of Integrating Voice and Data Networks Converting Voice to Data Efficient and Reliable Network Infrastructures
More informationMedium Access Protocols
Medium Access Protocols Summary of MAC protocols What do you do with a shared media? Channel Partitioning, by time, frequency or code Time Division,Code Division, Frequency Division Random partitioning
More informationLink Layer and Ethernet
Link Layer and Ethernet 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross traceroute Data Link Layer Multiple
More informationdocalpha Installation Guide
ARTSYL DOCALPHA INSTALLATION GUIDE 1. docalpha Architecture Overview... 2 1.1. docalpha Server Components... 4 1.2. docalpha Production Environment Stations Overview... 4 1.3. docalpha Setup & Administration
More informationTech Note - 05 Surveillance Systems that Work! Calculating Recorded Volume Disk Space
Tech Note - 05 Surveillance Systems that Work! Surveillance Systems Calculating required storage drive (disk space) capacity is sometimes be a rather tricky business. This Tech Note is written to inform
More informationARTSYL DOCALPHA INSTALLATION GUIDE
ARTSYL DOCALPHA INSTALLATION GUIDE 1. docalpha Architecture Overview... 2 1.1. docalpha Server Components... 4 1.2. docalpha Production Environment Stations Overview... 4 1.3. docalpha Setup & Administration
More informationTypical Network Uses
Computer Networks Introduction The next Great Revolution - Computer Networks- computers connected together for exchanging information Our information-oriented society - applications in education, commerce,
More informationSimply Good Pictures Engelmann Media GmbH
Contents 3 Table of Contents Part I 6 1 Features... 7 2 Product... contents 7 3 System... requirements 7 4 Support... 8 Part II First steps 10 1 Installation... 10 2 Program... start 10 3 Demo... version
More informationLink Layer and Ethernet
Link Layer and Ethernet 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross traceroute Data Link Layer Multiple
More informationDigiPoints Volume 1. Student Workbook. Module 8 Digital Compression
Digital Compression Page 8.1 DigiPoints Volume 1 Module 8 Digital Compression Summary This module describes the techniques by which digital signals are compressed in order to make it possible to carry
More informationFeatures. Sequential encoding. Progressive encoding. Hierarchical encoding. Lossless encoding using a different strategy
JPEG JPEG Joint Photographic Expert Group Voted as international standard in 1992 Works with color and grayscale images, e.g., satellite, medical,... Motivation: The compression ratio of lossless methods
More informationMedia Access Control. Networked Systems (H) Lecture 5
Media Access Control Networked Systems (H) Lecture 5 Lecture Outline Controlling access to the channel Link contention Media access control protocols Contention-based protocols CSMA/CD Token ring Slotted
More informationA Novel Image Compression Technique using Simple Arithmetic Addition
Proc. of Int. Conf. on Recent Trends in Information, Telecommunication and Computing, ITC A Novel Image Compression Technique using Simple Arithmetic Addition Nadeem Akhtar, Gufran Siddiqui and Salman
More informationFundamentals of Video Compression. Video Compression
Fundamentals of Video Compression Introduction to Digital Video Basic Compression Techniques Still Image Compression Techniques - JPEG Video Compression Introduction to Digital Video Video is a stream
More informationIT 2004 Data Communication & Networking
IT 2004 Data Communication & Networking Week 4 Network Topology, Architecture & Access Methods P.G.R Nayomi Gamlath MSc(Pdn), BSc (Rajarata) ATI -Kurunegala Why networks? To share resources (such as printer,
More informationStep-by-Step: Handling RF Interference Challenges
WHITE PAPER Step-by-Step: Handling RF Interference Challenges TABLE OF CONTENTS» Introduction» STEP ONE: Identify non-wi-fi interferers» STEP TWO: Locate non-wi-fi interferers» STEP THREE: Identify Wi-Fi
More informationOSI Reference Model. Computer Networks lab ECOM Prepared By : Eng. Motaz Murtaja Eng. Ola Abd Elatief
Islamic University of Gaza Faculty of Engineering Computer Engineering Department Computer Networks lab ECOM 4121 OSI Reference Model Prepared By : Eng. Motaz Murtaja Eng. Ola Abd Elatief May /2010 OSI
More informationShared Ethernet Networks
Lab 1 Shared Ethernet Networks Overview In a shared Ethernet network, end systems are typically connected together using a hub. The hub retransmits any incoming frames on all outgoing lines creating a
More informationDr./ Ahmed Mohamed Rabie Sayed
1 Dr./ Ahmed Mohamed Rabie Sayed 2 A network is a group of two or more computer systems linked together to exchange data and share resources, including expensive peripherals. 3 A local area network (LAN)
More informationCompression; Error detection & correction
Compression; Error detection & correction compression: squeeze out redundancy to use less memory or use less network bandwidth encode the same information in fewer bits some bits carry no information some
More information8 VLANs. 8.1 Introduction. 8.2 vlans. Unit 8: VLANs 1
8 VLANs 8.1 Introduction Layer 2 devices, such as network switches and wireless access points can be used to create virtual LANs (vlans), which can enhanced network security as it can be used to isolate
More informationCCM 4300 Lecture 6 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115
CCM 4300 Lecture 6 Computer Networks, Wireless and Mobile Communications Dr Shahedur Rahman s.rahman@mdx.ac.uk Room: T115 1 Recap of Last Session Access Control ALOHA FDMA, TDMA, CDMA OSI Model Internetworking
More informationInfotech English for computer users
Infotech English for computer users Second edition Student s Book Santiago Remacha Esteras PUBLISHED BY THE PRESS SYNDICATE OF THE UNIVERSITY OF CAMBRIDGE The Pitt Building, Trumpington Street, Cambridge
More informationCS 335 Graphics and Multimedia. Image Compression
CS 335 Graphics and Multimedia Image Compression CCITT Image Storage and Compression Group 3: Huffman-type encoding for binary (bilevel) data: FAX Group 4: Entropy encoding without error checks of group
More informationCCNA Exploration1 Chapter 7: OSI Data Link Layer
CCNA Exploration1 Chapter 7: OSI Data Link Layer LOCAL CISCO ACADEMY ELSYS TU INSTRUCTOR: STELA STEFANOVA 1 Explain the role of Data Link layer protocols in data transmission; Objectives Describe how the
More informationFocus on the ESET NOD32 antivirus system
INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT Int. J. Network Mgmt 2006; 16: 375 379 Published online in Wiley InterScience (www.interscience.wiley.com).623 Focus on the ESET NOD32 antivirus system By Gilbert
More informationCARRIER SENSE MULTIPLE ACCESS (CSMA):
Lecture Handout Computer Networks Lecture No. 8 CARRIER SENSE MULTIPLE ACCESS (CSMA): There is no central control management when computers transmit on Ethernet. For this purpose the Ethernet employs CSMA
More informationDifferential Compression and Optimal Caching Methods for Content-Based Image Search Systems
Differential Compression and Optimal Caching Methods for Content-Based Image Search Systems Di Zhong a, Shih-Fu Chang a, John R. Smith b a Department of Electrical Engineering, Columbia University, NY,
More informationEthernet Hub. Campus Network Design. Hubs. Sending and receiving Ethernet frames via a hub
Campus Network Design Thana Hongsuwan Ethernet Hub 2003, Cisco Systems, Inc. All rights reserved. 1-1 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0 1-2 Sending and receiving Ethernet frames
More informationDistributed System Chapter 16 Issues in ch 17, ch 18
Distributed System Chapter 16 Issues in ch 17, ch 18 1 Chapter 16: Distributed System Structures! Motivation! Types of Network-Based Operating Systems! Network Structure! Network Topology! Communication
More informationTopics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:
1 Topics 2 LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS Multiple access: CSMA/CD, CSMA/CA, token passing, channelization LAN: characteristics, i basic principles i Protocol architecture Topologies
More informationFront Novell Guide to NLSP Migration
Front Novell Guide to NLSP Migration Front : 1 2 Novell Guide to NLSP Migration About This Guide.......................................... 7 Introduction..................................... 7 NetWare
More informationContention Protocols and Networks
4/13/2005 314 Lecture Contention Protocols and Networks 1 Contention Protocols and Networks Contention Protocols CSMA/CD Network Topologies Ethernet 4/13/2005 314 Lecture Contention Protocols and Networks
More informationCCNA Cisco Certified Network Associate CCNA (v3.0)
CCNA Cisco Certified Network Associate CCNA (v3.0) Cisco 200-125 Dumps Available Here at: /cisco-exam/200-125-dumps.html Enrolling now you will get access to 455 questions in a unique set of 200-125 dumps
More informationData Storage. Slides derived from those available on the web site of the book: Computer Science: An Overview, 11 th Edition, by J.
Data Storage Slides derived from those available on the web site of the book: Computer Science: An Overview, 11 th Edition, by J. Glenn Brookshear Copyright 2012 Pearson Education, Inc. Data Storage Bits
More informationIntroduction to LAN Protocols
CHAPTER 2 Introduction to LAN Protocols This chapter introduces the various media-access methods, transmission methods, topologies, and devices used in a local area network (LAN). Topics addressed focus
More informationBridging and Switching Basics
CHAPTER 4 Bridging and Switching Basics This chapter introduces the technologies employed in devices loosely referred to as bridges and switches. Topics summarized here include general link-layer device
More information10/100/1000 Mbps Ethernet 100 Mbps FDDI 155/620 Mbps ATM 4/10/45 Mbps Wireless
TRANSMISSION MEDIA LOCAL AREA NETWORK (LAN) TECHNOLOGY 10/100/1000 Mbps Ethernet 100 Mbps FDDI 155/620 Mbps ATM 4/10/45 Mbps Wireless page - 2 LAN TECHNOLOGY Protocol What is a Protocol? A protocol is
More information