Network Imaging Techniques Gilbert Held

Size: px
Start display at page:

Download "Network Imaging Techniques Gilbert Held"

Transcription

1 Network Imaging Techniques Gilbert Held Payoff Supporting imaging applications does not necessarily require an expensive network upgrade. This article discusses several inexpensive, timesaving techniques for protecting network performance while transmitting images across the LAN. Introduction Many network administrators have migrated a LAN to an Asynchronous Transfer Mode infrastructure or upgraded a Token Ring network to Fast Ethernet in an effort to support imaging applications. Although imaging is bandwidth intensive, there are several alternatives for optimizing their transmission over a LAN. Image transmission and printing can be enhanced by using software or by reconfiguring the LAN infrastructure. This article discusses five techniques for enhancing LAN -based imaging that may help users avoid investing in an expensive network upgrade. Transmitting Compressed Files Most images require a minimum of 50 to 100K bytes. If a 10Base-T Ethernet or a 16Mbps Token Ring network is being used, downloading an image can significantly effect network operations. For example, if a 10Base-T Ethernet LAN is operating at 10M bps with 100 active users, each user obtains approximately 100,000 bps of bandwidth. The average delay associated with a 100K-byte image file is eight seconds. If a network user needs to download multiple images, the activity of the workstation would have to be extended, which would result in an increased number of collisions as other network users attempt to perform other operations. More delays would result because each collision is followed by a jam signal during which no station on the network can attempt a retransmission. Compressing Images Prior to Transmission One method of minimizing the effect on network performance is to compress images prior to their transmission. Exhibit 1 illustrates the use of the program NetZIP developed by Software Builders, Inc. (Atlanta GA). This Windows-compliant program can create ZIP files, which are archived and compressed files, and includes a function that automatically extracts previously compressed and archived files. Other programs that perform similar compression and archiving functions include PKZIP/PKUNZIP from PKWARE, Inc. (Brown Deer WI), and ARJ, developed by Robert Jung and LHA. The latter is a public domain archiving program developed in Japan that can be obtained from several computer bulletin board systems in the US. Exhibit 1 illustrates the creation of an archive file named TIF.ZIP that contains 19 images. Using Software Builder's NetZIP Compression Program Exhibit 2 shows the files compressed in TIF.ZIP. The entries in the inner window include a column labeled percent that indicates the percentage of data reduction obtained through the compression of each file in the archive. The file SCREENOO.TIF shows only a 14%

2 reduction. However, each of the files include TIF images that were stored using compression. The use of NetZIP can further compress previously compressed images. Using the NetZIP Program to Archive Previously Compressed Images Using Lossy Compressed Images NetZIP, which is based on the compression used in the PKZIP program, uses a fully reversible, or lossless, compression. This means that the decompression of a previously compressed image results in the exact restoration of the original image. It is important to use lossless compression on text files. The loss of a small amount of detail in an image may not even be noticeable, however, the same loss in a text file could critically alter its meaning. The use of a lossy compression technique can substantially reduce data storage requirements as well as the amount of time required to transport images from a server to workstations. Joint Photographic Experts Group One of the more popular lossy compression methods, Joint Photographic Experts Group (JPEG), is a standard for full-color and gray-scale images. A group known as Independent JPEG developed two public domain software programs compression JPEG (CJPEG) and Decompression JPEG. Compression JPEG provides the capability to convert Graphics Image Format (GIF) and other image files into JPEG format, and decompression JPEG (DJPEG) decompresses a JPEG file back into a different image format. GIF is an image storage format popularized by CompuServe. A GIF image is stored using a lossless compression method known as Lempel-Ziv-Welch (LZW). By converting a GIF image into a JPEG image, users can save file storage space as well as time required to transmit the image on a LAN (see Exhibit 2). Exhibit 3 illustrates the display of the CJPEG help screen that is generated by entering the command line improperly or simply entering the name of the program without arguments. The quality N switch governs the compression quality of the program. A value of 0 for N results in the worst image quality and a value of 100 results in the best quality. For almost all image conversions, the program's default value of 75 results in an image that the naked eye cannot distinguish from the original. However, the differences in storage between the two can be considerable. To illustrate the potential data storage reduction from converting a Graphics Image Format image to a JPEG image, the CJPEG program was used with the following command entry: CJPEG ML3872F.GIF ML3872F.JPG In the command line, ML3872F.GIF represents a multiple listing image of a home stored in GIF format that was used as input to the program. The string ML3872F.JPG represents the name of the output file that contains the converted JPEG image. Because Disk Operating System only supports a three character extension, the extension.jpg is used by the program. Once the Compression JPEG program was executed, a directory listing indicated the following data storage requirements for the following files: ML3872F.GIF30,393 ML3872F.JPG109,618 The simple conversion of a GIF file to a JPEG file resulted in more than a 70% reduction in the storage requirements. Because many viewing programs have a JPEG file

3 format capability and can be used with World Wide Web browsers, many users may have all the software they need to convert GIF files to JPEG files. The conversion of images from a lossless to lossy compression format saves both time and server storage space. The CJPEG Help Screen C:\JPEG>cjpeg C:\JPEG\CJPEG.EXE: must name one input and one output file usage: C:\JPEG\CJPEG.EXE [switches] inputfile outputfile Switches (names may be abbreviated): -quality N Compression quality (0..100; 5-95 is useful range) -grayscale Create monochrome JPEG file -optimize Optimize Huffman table (smaller file, but slow compression) -targa Input file is Targa format (usually not needed) Switches for advanced users: -restart N Set restart interval in rows, or in blocks with B -smooth N Smooth dithered input (N= is strength) -maxmemory N Maximum memory to use (in kbytes) -verbose or Emit debug output -debug Switches for wizards: -qtables file Use quantization tables given in file -sample HxV[...] Set JPEG sampling factors C:\JPEG> Thumbnail Screens If storage of a large number of images is required, the effect of image transmission can be reduced on a LAN through the use of thumbnail screens. The term thumbnail screen represents a collection of images that are displayed by reducing the number of horizontal and vertical scans that make up each image. A thumbnail screen provides a preview of several images simultaneously. Instead of selecting one image after another from a server, a user can view many images on one screen before making a selection. The use of thumbnail screens to reduce LAN transmission has been successfully applied in the parts distribution and real estate industries, and is appropriate for any organization where users may need to view several images prior to selecting one. In a parts distribution environment, a single thumbnail screen provides the images of a dozen related parts. The user can quickly isolate the part that may be the focus of a customer query and display a full screen image of that part. Without the use of a thumbnail screen, the user may have to scroll through a dozen or more full screens of parts, which would impair network performance. Thumbnail creation programs and viewers are available as shareware from several vendors and can be purchased for as little as $5.00 per user under a site license agreement. Compared with the cost of upgrading to a new LAN infrastructure, the use of software to enhance network performance is a nominal expenditure. Network Segmentation There are certain network environments where the use of compression and thumbnail screens only minimally effect network performance because of the overall transfer of

4 images on the network. For such situations, it may be possible to segment the network if the requirement for image access is limited to a defined subset of office employees. A Segmentation Case Study: The Real Estate Office In a real estate office of 25 employees there are 12 agents and a support staff that includes administrative assistants, advertising clerks, contract document preparers, and managers. The office has a common LAN that agents use to preview images of homes stored on a server whenever a potential customer is brought into the office. The other office employees need to perform word processing, and access spreadsheets and data base programs. A few agents may bring customers into the office and begin to browse through stored home images, which can seriously interfere with the interactive query-response communications in progress. To alleviate the effect of the transmission of images on client/server applications, the network could be segmented. The top of Exhibit 4 illustrates a common Ethernet network prior to segmentation, and the lower portion of that illustration indicates the possible segmentation of the network. In this example the network used Novell's NetWare operating system. Segmenting an Ethernet LAN to Minimize the Effect of Image Transmissions One of the lesser-known features of NetWare is the ability of a file server to perform internal bridging to interconnect two LAN segments. Although Novell refers to this as LAN routing, the file server actually functions as a transparent bridge to interconnect the two network segments. The only hardware required to perform bridging is a second Ethernet adapter card that can be obtained for less than $100. Implementing segmentation is relatively inexpensive. In the segmented LAN illustrated at the bottom of Exhibit 4, the 12 agents that require the downloading of images from the server were placed on a common segment. Because an agent typically converses with the client as images are being displayed on their monitor, a delay of ten seconds or more may hardly be noticeable and should not impair productivity as one agent's image requests compete with those of other agents. Image requests are not the only network traffic, however. Support staff members may be trying to create documents on the server when an agent is initiating an image transfer. Although the Ethernet carrier-sense, multiple access with collision detection (CSMA/CD) protocol acts as an arbitrator to provide each station with equivalent LAN access, the large number of frames required to transport each image can only interfere with the frames carrying interactive query-response traffic used to prepare a document. This interference causes delays for users who are entering data into information fields on the document. By segmenting the Ethernet LAN into two segments, the effect of transmitting images on query-response applications is minimized. Reducing the Collision Window On Ethernet Lans In a Carrier Sense Multiple Access/Collision Detection network, stations listen to the network prior to transmitting. If two stations are distant from one another, the probability that one station fails to hear the network and initiates its' own transmission increases. Thus, as the distance between stations increases, the probability of collisions increases. When the first station detects a collision, it transmits a jam signal that precludes transmissions from

5 other workstations for the duration of the Ethernet frame, which causes LAN performance to suffer. Thus, there is a high correlation between reduced Ethernet performance and the distance between very active workstations. Although it is probably impractical to relocate more than a few very active workstations to reduce the distance between stations, it may be relatively easy to reduce the cable distance between the two most active stations on most networks. The file server and print server are normally the most active devices on a LAN. The top of Exhibit 5 illustrates an Ethernet network where a file server is located at a relatively long cable distance from a print server, resulting in a long collision window. The lower portion of Exhibit 5 illustrates a reduction in the collision window between highly active network stations obtained by simply recabling one server closer to the other. Based on the use of performance monitoring equipment, a reduction in network use between 4 and 7% has been obtained by relocating a few active workstations closer to one another. Reducing the Ethernet Collision Window Conclusion Although the transmission and printing of images on a LAN represents a bandwidthintensive application, it may not require a costly and time-consuming LAN upgrade or replacement. As indicated in this article, there are several techniques the communications manager can implement, either individually or with the support of an organization's applications programming branch. The use of a compression and archiving performing program may be obtainable on a site license basis for less than a few hundred dollars and can reduce the time required to transmit images by half. If the scanner and digital camera software support the storage of images in Joint Photographic Experts Group format, as most do, image data storage and transmission time can be reduced even more than they are by using lossless compression techniques. Similarly, a thumbnail capability is included in many commercial picture viewing software products and its use may not require any additional cost. If software does not provide sufficient relief and LAN congestion remains a problem, hardware solutions should be evaluated. Users should first consider recabling an Ethernet LAN to reduce the collision window. Recabling costs are usually minimal. Another possible solution is network segmentation, however, this is a more costly approach that requires the use of a bridge. Before embarking on an expensive and time-consuming network upgrade, network administrators may want to try implementing one or more of the techniques described in this article for reducing the effect of image transmission on LAN performance, saving time and money. Author Biographies Gilbert Held Gilbert Held is director of 4-Degree Consulting, a Macon GA-based high-tech consulting group. He is an internationally recognized author and lecturer, having written more than 40 books and 300 technical articles. He earned a BSEE from Pennsylvania Military College, an MSEE from New York University, and MBA and MSTM degrees from The American

6 University. He has been selected to represent the US at technical conferences in Moscow and Jerusalem and has received numerous awards for excellence in technical writing.

7

8

9

10

DATA COMMUNICATIONS MANAGEMENT. Gilbert Held INSIDE

DATA COMMUNICATIONS MANAGEMENT. Gilbert Held INSIDE 51-10-06 DATA COMMUNICATIONS MANAGEMENT VIRTUAL LANS Gilbert Held INSIDE Definition, Rationale, Support for Virtual Networking Requirements, Facilitating Adds, Moves, and Changes, Enhancing Network Performance,

More information

The Corporate Intranet Gilbert Held

The Corporate Intranet Gilbert Held 51-10-52 The Corporate Intranet Gilbert Held Payoff The growth in the popularity of the Internet has significantly influenced software product development users today can access search tools and browsers

More information

UNDERSTANDING GIGABIT ETHERNET PERFORMANCE

UNDERSTANDING GIGABIT ETHERNET PERFORMANCE 51-20-98 DATA COMMUNICATIONS MANAGEMENT UNDERSTANDING GIGABIT ETHERNET PERFORMANCE Gilbert Held INSIDE Ethernet Frame Flow; The Gigabit Ethernet Frame OVERVIEW Gigabit Ethernet represents the latest Institute

More information

Using Windows NT in a NetWare Environment Gilbert Held

Using Windows NT in a NetWare Environment Gilbert Held Previous screen 50-20-40 Using Windows NT in a NetWare Environment Gilbert Held Payoff For companies that require Windows NT clients to work in a NetWare environment, getting the configuration setup right

More information

Evaluating Client/Server Operating Systems: Focus on Windows NT Gilbert Held

Evaluating Client/Server Operating Systems: Focus on Windows NT Gilbert Held 5-02-30 Evaluating Client/Server Operating Systems: Focus on Windows NT Gilbert Held Payoff As organizations increasingly move mainframe-based applications to client/server platforms, Information Systems

More information

Image coding and compression

Image coding and compression Image coding and compression Robin Strand Centre for Image Analysis Swedish University of Agricultural Sciences Uppsala University Today Information and Data Redundancy Image Quality Compression Coding

More information

2. LAN Topologies Gilbert Ndjatou Page 1

2. LAN Topologies Gilbert Ndjatou Page 1 2. LAN Topologies Two basic categories of network topologies exist, physical topologies and logical topologies. The physical topology of a network is the cabling layout used to link devices. This refers

More information

1: Review Of Semester Provide an overview of encapsulation.

1: Review Of Semester Provide an overview of encapsulation. 1: Review Of Semester 1 1.1.1.1. Provide an overview of encapsulation. Networking evolves to support current and future applications. By dividing and organizing the networking tasks into separate layers/functions,

More information

Managing Networks with the Global Naming Tree Gilbert Held

Managing Networks with the Global Naming Tree Gilbert Held 51-10-15 Managing Networks with the Global Naming Tree Gilbert Held Payoff An often-overlooked and hidden-from-view characteristic of network management systems is their use of the global naming tree.

More information

color bit depth dithered

color bit depth dithered EPS The EPS (Encapsulated PostScript) format is widely accepted by the graphic arts industry for saving images that will be placed into programs such as Adobe Illustrator and QuarkXPress. It is used on

More information

Digital Image Processing

Digital Image Processing Lecture 9+10 Image Compression Lecturer: Ha Dai Duong Faculty of Information Technology 1. Introduction Image compression To Solve the problem of reduncing the amount of data required to represent a digital

More information

Chapter Seven. Local Area Networks: Part 1. Data Communications and Computer Networks: A Business User s Approach Seventh Edition

Chapter Seven. Local Area Networks: Part 1. Data Communications and Computer Networks: A Business User s Approach Seventh Edition Chapter Seven Local Area Networks: Part 1 Data Communications and Computer Networks: A Business User s Approach Seventh Edition After reading this chapter, you should be able to: State the definition of

More information

IMAGE COMPRESSION. Image Compression. Why? Reducing transportation times Reducing file size. A two way event - compression and decompression

IMAGE COMPRESSION. Image Compression. Why? Reducing transportation times Reducing file size. A two way event - compression and decompression IMAGE COMPRESSION Image Compression Why? Reducing transportation times Reducing file size A two way event - compression and decompression 1 Compression categories Compression = Image coding Still-image

More information

Image Compression for Mobile Devices using Prediction and Direct Coding Approach

Image Compression for Mobile Devices using Prediction and Direct Coding Approach Image Compression for Mobile Devices using Prediction and Direct Coding Approach Joshua Rajah Devadason M.E. scholar, CIT Coimbatore, India Mr. T. Ramraj Assistant Professor, CIT Coimbatore, India Abstract

More information

Chapter 4 NETWORK HARDWARE

Chapter 4 NETWORK HARDWARE Chapter 4 NETWORK HARDWARE 1 Network Devices As Organizations grow, so do their networks Growth in number of users Geographical Growth Network Devices : Are products used to expand or connect networks.

More information

TCOM 370 NOTES 99-1 NETWORKING AND COMMUNICATIONS

TCOM 370 NOTES 99-1 NETWORKING AND COMMUNICATIONS TCOM 370 NOTES 99-1 NETWORKING AND COMMUNICATIONS Communication Networks Allow Exchange of Information between Users telephone network for voice communication interconnected computers and peripherals,

More information

Performance Evaluation of FDDI, ATM, and Gigabit Ethernet as Backbone Technologies Using Simulation

Performance Evaluation of FDDI, ATM, and Gigabit Ethernet as Backbone Technologies Using Simulation Performance Evaluation of FDDI, ATM, and Gigabit Ethernet as Backbone Technologies Using Simulation Sanjay P. Ahuja, Kyle Hegeman, Cheryl Daucher Department of Computer and Information Sciences University

More information

15 Data Compression 2014/9/21. Objectives After studying this chapter, the student should be able to: 15-1 LOSSLESS COMPRESSION

15 Data Compression 2014/9/21. Objectives After studying this chapter, the student should be able to: 15-1 LOSSLESS COMPRESSION 15 Data Compression Data compression implies sending or storing a smaller number of bits. Although many methods are used for this purpose, in general these methods can be divided into two broad categories:

More information

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College CHAPTER 7 MAC LAYER PROTOCOLS Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College MEDIUM ACCESS CONTROL - MAC PROTOCOLS When the two stations transmit data

More information

NETWORKING COMPONENTS

NETWORKING COMPONENTS 1) OBJECTIVES NETWORKING COMPONENTS The objectives of this chapter are to familiarize with the following: - i) The LAN components ii) iii) iv) Repeater Hub Bridge v) Router vi) Gateway 2) INTRODUCTION

More information

Data Compression. Media Signal Processing, Presentation 2. Presented By: Jahanzeb Farooq Michael Osadebey

Data Compression. Media Signal Processing, Presentation 2. Presented By: Jahanzeb Farooq Michael Osadebey Data Compression Media Signal Processing, Presentation 2 Presented By: Jahanzeb Farooq Michael Osadebey What is Data Compression? Definition -Reducing the amount of data required to represent a source

More information

Chapter 6: Network Communications and Protocols

Chapter 6: Network Communications and Protocols Learning Objectives Chapter 6: Network Communications and Protocols Understand the function and structure of packets in a network, and analyze and understand those packets Understand the function of protocols

More information

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols High Level View EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 Goal: share a communication medium among multiple hosts connected to it Problem: arbitrate between connected hosts Solution goals:

More information

DeltaV Continuous Historian

DeltaV Continuous Historian Frequently Asked Questions Data Analysis Integrated Configuration Scalable Flexible Architecture Contents 1. Introduction 1.1. What is the DeltaV Continuous Historian? 5 1.2. What features are available

More information

INF5063: Programming heterogeneous multi-core processors. September 17, 2010

INF5063: Programming heterogeneous multi-core processors. September 17, 2010 INF5063: Programming heterogeneous multi-core processors September 17, 2010 High data volumes: Need for compression PAL video sequence 25 images per second 3 bytes per pixel RGB (red-green-blue values)

More information

Best practices for producing high quality PDF files

Best practices for producing high quality PDF files University of Michigan Deep Blue deepblue.lib.umich.edu 2006-05-05 Best practices for producing high quality PDF files Formats Group, Deep Blue http://hdl.handle.net/2027.42/58005 Best practices for producing

More information

Outline: Connecting Many Computers

Outline: Connecting Many Computers Outline: Connecting Many Computers Last lecture: sending data between two computers This lecture: link-level network protocols (from last lecture) sending data among many computers 1 Review: A simple point-to-point

More information

Module 5 Local Area Networks

Module 5 Local Area Networks Module 5 Local Area Networks Lesson 15 LAN Topologies, Access Mechanisms And Media 5.1.1 INTRODUCTION Microelectronics brought a great revolution in computer technology. While the processing power of the

More information

Lossless Image Compression with Lossy Image Using Adaptive Prediction and Arithmetic Coding

Lossless Image Compression with Lossy Image Using Adaptive Prediction and Arithmetic Coding Lossless Image Compression with Lossy Image Using Adaptive Prediction and Arithmetic Coding Seishi Taka" and Mikio Takagi Institute of Industrial Science, University of Tokyo Abstract Lossless gray scale

More information

Introduction to LAN Protocols

Introduction to LAN Protocols CHAPTER 2 Chapter Goals Learn about different LAN protocols. Understand the different methods used to deal with media contention. Learn about different LAN topologies. This chapter introduces the various

More information

EE 122: Ethernet and

EE 122: Ethernet and EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose) High Level View Goal: share a communication medium among multiple hosts

More information

Introduction to Wireless Networking ECE 401WN Spring 2008

Introduction to Wireless Networking ECE 401WN Spring 2008 Introduction to Wireless Networking ECE 401WN Spring 2008 Lecture 2: Communication Networks The first major topic we will study will be WLANs. But before that, we need to consider a few basics of networking.

More information

THE HIDDEN COSTS IN NETWORK BANDWIDTH

THE HIDDEN COSTS IN NETWORK BANDWIDTH Optimization Benefits: THE HIDDEN COSTS IN NETWORK BANDWIDTH Improve performance Improve employee productivity Avoid unnecessary service and equipment upgrades Reduce management expenses Avoid application

More information

Multimedia Signals and Systems Still Image Compression - JPEG

Multimedia Signals and Systems Still Image Compression - JPEG Multimedia Signals and Systems Still Image Compression - JPEG Kunio Takaya Electrical and Computer Engineering University of Saskatchewan January 27, 2008 ** Go to full-screen mode now by hitting CTRL-L

More information

Summary of MAC protocols

Summary of MAC protocols Summary of MAC protocols What do you do with a shared media? Channel Partitioning, by time, frequency or code Time Division, Code Division, Frequency Division Random partitioning (dynamic) ALOHA, S-ALOHA,

More information

Chapter 12 Multiple Access 12.1

Chapter 12 Multiple Access 12.1 Chapter 12 Multiple Access 12.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 12.2 Figure 12.1 Data link layer divided into two functionality-oriented sublayers

More information

7: Image Compression

7: Image Compression 7: Image Compression Mark Handley Image Compression GIF (Graphics Interchange Format) PNG (Portable Network Graphics) MNG (Multiple-image Network Graphics) JPEG (Join Picture Expert Group) 1 GIF (Graphics

More information

Data and information. Image Codning and Compression. Image compression and decompression. Definitions. Images can contain three types of redundancy

Data and information. Image Codning and Compression. Image compression and decompression. Definitions. Images can contain three types of redundancy Image Codning and Compression data redundancy, Huffman coding, image formats Lecture 7 Gonzalez-Woods: 8.-8.3., 8.4-8.4.3, 8.5.-8.5.2, 8.6 Carolina Wählby carolina@cb.uu.se 08-47 3469 Data and information

More information

Image Coding and Compression

Image Coding and Compression Lecture 17, Image Coding and Compression GW Chapter 8.1 8.3.1, 8.4 8.4.3, 8.5.1 8.5.2, 8.6 Suggested problem: Own problem Calculate the Huffman code of this image > Show all steps in the coding procedure,

More information

Networking 101. Introduction to Ethernet networking basics; Network types, components, configurations. Routers. Switches. Servers.

Networking 101. Introduction to Ethernet networking basics; Network types, components, configurations. Routers. Switches. Servers. Switches Routers PCs Networking 101 Introduction to Ethernet networking basics; Network types, components, configurations Servers Hubs Protocols Cat-5 UTP NICs Page 1 July 28, 2000 Network Types LAN Local

More information

Lecture 5: Compression I. This Week s Schedule

Lecture 5: Compression I. This Week s Schedule Lecture 5: Compression I Reading: book chapter 6, section 3 &5 chapter 7, section 1, 2, 3, 4, 8 Today: This Week s Schedule The concept behind compression Rate distortion theory Image compression via DCT

More information

Test Bank for A Guide to Designing and Implementing Local And Wide Area Networks 2nd Edition by Palmer and Sinclair

Test Bank for A Guide to Designing and Implementing Local And Wide Area Networks 2nd Edition by Palmer and Sinclair Test Bank for A Guide to Designing and Implementing Local And Wide Area Networks 2nd Edition by Palmer and Sinclair Link download full: https://testbankservice.com/download/test-bank-for-aguide-to-designing-and-implementing-local-and-wide-area-networks-2ndedition-by-palmer-and-sinclair/

More information

Norcom. e-fileplan Electronic Cabinet System

Norcom. e-fileplan Electronic Cabinet System Norcom e-fileplan Electronic Cabinet System Revision 2.0 \ Phone: (866) 726-6328 Email:sales@norcom-inc.com e-fileplan Overview e-fileplan is an electronic filing cabinet and document imaging system. e-fileplan

More information

HTML/XML. XHTML Authoring

HTML/XML. XHTML Authoring HTML/XML XHTML Authoring Adding Images The most commonly used graphics file formats found on the Web are GIF, JPEG and PNG. JPEG (Joint Photographic Experts Group) format is primarily used for realistic,

More information

So, what is data compression, and why do we need it?

So, what is data compression, and why do we need it? In the last decade we have been witnessing a revolution in the way we communicate 2 The major contributors in this revolution are: Internet; The explosive development of mobile communications; and The

More information

Lecture (03) (I) OSI Reference Model

Lecture (03) (I) OSI Reference Model Agenda Lecture (03) (I) OSI Reference Model Dr. Ahmed M. ElShafee History OSI Layers Layers function OSI & TCP/IP & NetWare Example protocols OSI Layering Concepts and Benefits OSI Terminologies ١ ٢ History

More information

1.6 Graphics Packages

1.6 Graphics Packages 1.6 Graphics Packages Graphics Graphics refers to any computer device or program that makes a computer capable of displaying and manipulating pictures. The term also refers to the images themselves. A

More information

Securing NetWare Enterprise Local Area Networks H. Van Tran Cynthia D. Heagy Payoff

Securing NetWare Enterprise Local Area Networks H. Van Tran Cynthia D. Heagy Payoff 87-10-10 Securing NetWare Enterprise Local Area Networks H. Van Tran Cynthia D. Heagy Payoff Data security professionals in many organizations must protect data and applications running on local area networks

More information

Multimedia Systems. Part 4. Mahdi Vasighi

Multimedia Systems. Part 4. Mahdi Vasighi Multimedia Systems Part 4 Mahdi Vasighi www.iasbs.ac.ir/~vasighi Department of Computer Science and Information Technology, Institute for Advanced Studies in Basic Sciences, Zanjan, Iran Image Formats

More information

Review For Exam 2. Internetworking. Summary Questions. School of Business Eastern Illinois University. School of Business Eastern Illinois University

Review For Exam 2. Internetworking. Summary Questions. School of Business Eastern Illinois University. School of Business Eastern Illinois University School of Business Review For Exam 2 Wednesday 10/6/2004) Abdou Illia, Fall 2004 School of Business Internetworking 3 1. Name the two most known Medium Access Control Protocols found in LANs. How they

More information

Fundamentals of Networking. OSI & TCP/IP Model. Kuldeep Sonar 1

Fundamentals of Networking. OSI & TCP/IP Model. Kuldeep Sonar 1 Fundamentals of Networking OSI & TCP/IP Model Kuldeep Sonar 1 Kuldeep Sonar 2 OSI Model Kuldeep Sonar 3 Application Layer Layer 7 provides an interface between a host s communication software and any necessary

More information

Avaya C360 SMON User Guide

Avaya C360 SMON User Guide Avaya C360 SMON User Guide May 2004 Avaya C360 SMON User Guide Copyright 2004 Avaya Inc. All Rights Reserved The products, specifications, and other technical information regarding the products contained

More information

Module 16: Distributed System Structures

Module 16: Distributed System Structures Chapter 16: Distributed System Structures Module 16: Distributed System Structures Motivation Types of Network-Based Operating Systems Network Structure Network Topology Communication Structure Communication

More information

Interface The exit interface a packet will take when destined for a specific network.

Interface The exit interface a packet will take when destined for a specific network. The Network Layer The Network layer (also called layer 3) manages device addressing, tracks the location of devices on the network, and determines the best way to move data, which means that the Network

More information

Lesson 1: Network Communications

Lesson 1: Network Communications Lesson 1: Network Communications This lesson introduces the basic building blocks of network communications and some of the structures used to construct data networks. There are many different kinds of

More information

Image, video and audio coding concepts. Roadmap. Rationale. Stefan Alfredsson. (based on material by Johan Garcia)

Image, video and audio coding concepts. Roadmap. Rationale. Stefan Alfredsson. (based on material by Johan Garcia) Image, video and audio coding concepts Stefan Alfredsson (based on material by Johan Garcia) Roadmap XML Data structuring Loss-less compression (huffman, LZ77,...) Lossy compression Rationale Compression

More information

EE67I Multimedia Communication Systems Lecture 4

EE67I Multimedia Communication Systems Lecture 4 EE67I Multimedia Communication Systems Lecture 4 Lossless Compression Basics of Information Theory Compression is either lossless, in which no information is lost, or lossy in which information is lost.

More information

Computers Are Your Future Prentice-Hall, Inc.

Computers Are Your Future Prentice-Hall, Inc. Computers Are Your Future 2006 Prentice-Hall, Inc. Computers Are Your Future Chapter 5 Application Software: Tools for Productivity 2006 Prentice-Hall, Inc Slide 2 You Will Learn... ü How system software

More information

Module 15: Network Structures

Module 15: Network Structures Module 15: Network Structures Background Topology Network Types Communication Communication Protocol Robustness Design Strategies 15.1 A Distributed System 15.2 Motivation Resource sharing sharing and

More information

INTRODUCTION TO WINDOWS 2000

INTRODUCTION TO WINDOWS 2000 50-30-31 DATA COMMUNICATIONS MANAGEMENT INTRODUCTION TO WINDOWS 2000 Gilbert Held INSIDE Versions; Features; New Features; Graphic Improvements; Active Directory; Encryption and Compression; Disk Quotas;

More information

Simply Good Pictures Engelmann Media GmbH

Simply Good Pictures Engelmann Media GmbH Contents 3 Table of Contents Part I 6 1 Features... 7 2 Product... contents 7 3 System... requirements 7 4 Support... 7 Part II First steps 10 1 Installation... 10 2 Program... start 10 3 Demo... version

More information

Introducing Campus Networks

Introducing Campus Networks Cisco Enterprise Architecture Introducing Campus Networks 2003, Cisco Systems, Inc. All rights reserved. 2-1 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0 2-2 Campus Data Center Combines switching

More information

Voice over Internet Protocol

Voice over Internet Protocol Voice over Internet Protocol Voice over Internet Protocol Contents Introduction Benefits of Integrating Voice and Data Networks Converting Voice to Data Efficient and Reliable Network Infrastructures

More information

Medium Access Protocols

Medium Access Protocols Medium Access Protocols Summary of MAC protocols What do you do with a shared media? Channel Partitioning, by time, frequency or code Time Division,Code Division, Frequency Division Random partitioning

More information

Link Layer and Ethernet

Link Layer and Ethernet Link Layer and Ethernet 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross traceroute Data Link Layer Multiple

More information

docalpha Installation Guide

docalpha Installation Guide ARTSYL DOCALPHA INSTALLATION GUIDE 1. docalpha Architecture Overview... 2 1.1. docalpha Server Components... 4 1.2. docalpha Production Environment Stations Overview... 4 1.3. docalpha Setup & Administration

More information

Tech Note - 05 Surveillance Systems that Work! Calculating Recorded Volume Disk Space

Tech Note - 05 Surveillance Systems that Work! Calculating Recorded Volume Disk Space Tech Note - 05 Surveillance Systems that Work! Surveillance Systems Calculating required storage drive (disk space) capacity is sometimes be a rather tricky business. This Tech Note is written to inform

More information

ARTSYL DOCALPHA INSTALLATION GUIDE

ARTSYL DOCALPHA INSTALLATION GUIDE ARTSYL DOCALPHA INSTALLATION GUIDE 1. docalpha Architecture Overview... 2 1.1. docalpha Server Components... 4 1.2. docalpha Production Environment Stations Overview... 4 1.3. docalpha Setup & Administration

More information

Typical Network Uses

Typical Network Uses Computer Networks Introduction The next Great Revolution - Computer Networks- computers connected together for exchanging information Our information-oriented society - applications in education, commerce,

More information

Simply Good Pictures Engelmann Media GmbH

Simply Good Pictures Engelmann Media GmbH Contents 3 Table of Contents Part I 6 1 Features... 7 2 Product... contents 7 3 System... requirements 7 4 Support... 8 Part II First steps 10 1 Installation... 10 2 Program... start 10 3 Demo... version

More information

Link Layer and Ethernet

Link Layer and Ethernet Link Layer and Ethernet 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross traceroute Data Link Layer Multiple

More information

DigiPoints Volume 1. Student Workbook. Module 8 Digital Compression

DigiPoints Volume 1. Student Workbook. Module 8 Digital Compression Digital Compression Page 8.1 DigiPoints Volume 1 Module 8 Digital Compression Summary This module describes the techniques by which digital signals are compressed in order to make it possible to carry

More information

Features. Sequential encoding. Progressive encoding. Hierarchical encoding. Lossless encoding using a different strategy

Features. Sequential encoding. Progressive encoding. Hierarchical encoding. Lossless encoding using a different strategy JPEG JPEG Joint Photographic Expert Group Voted as international standard in 1992 Works with color and grayscale images, e.g., satellite, medical,... Motivation: The compression ratio of lossless methods

More information

Media Access Control. Networked Systems (H) Lecture 5

Media Access Control. Networked Systems (H) Lecture 5 Media Access Control Networked Systems (H) Lecture 5 Lecture Outline Controlling access to the channel Link contention Media access control protocols Contention-based protocols CSMA/CD Token ring Slotted

More information

A Novel Image Compression Technique using Simple Arithmetic Addition

A Novel Image Compression Technique using Simple Arithmetic Addition Proc. of Int. Conf. on Recent Trends in Information, Telecommunication and Computing, ITC A Novel Image Compression Technique using Simple Arithmetic Addition Nadeem Akhtar, Gufran Siddiqui and Salman

More information

Fundamentals of Video Compression. Video Compression

Fundamentals of Video Compression. Video Compression Fundamentals of Video Compression Introduction to Digital Video Basic Compression Techniques Still Image Compression Techniques - JPEG Video Compression Introduction to Digital Video Video is a stream

More information

IT 2004 Data Communication & Networking

IT 2004 Data Communication & Networking IT 2004 Data Communication & Networking Week 4 Network Topology, Architecture & Access Methods P.G.R Nayomi Gamlath MSc(Pdn), BSc (Rajarata) ATI -Kurunegala Why networks? To share resources (such as printer,

More information

Step-by-Step: Handling RF Interference Challenges

Step-by-Step: Handling RF Interference Challenges WHITE PAPER Step-by-Step: Handling RF Interference Challenges TABLE OF CONTENTS» Introduction» STEP ONE: Identify non-wi-fi interferers» STEP TWO: Locate non-wi-fi interferers» STEP THREE: Identify Wi-Fi

More information

OSI Reference Model. Computer Networks lab ECOM Prepared By : Eng. Motaz Murtaja Eng. Ola Abd Elatief

OSI Reference Model. Computer Networks lab ECOM Prepared By : Eng. Motaz Murtaja Eng. Ola Abd Elatief Islamic University of Gaza Faculty of Engineering Computer Engineering Department Computer Networks lab ECOM 4121 OSI Reference Model Prepared By : Eng. Motaz Murtaja Eng. Ola Abd Elatief May /2010 OSI

More information

Shared Ethernet Networks

Shared Ethernet Networks Lab 1 Shared Ethernet Networks Overview In a shared Ethernet network, end systems are typically connected together using a hub. The hub retransmits any incoming frames on all outgoing lines creating a

More information

Dr./ Ahmed Mohamed Rabie Sayed

Dr./ Ahmed Mohamed Rabie Sayed 1 Dr./ Ahmed Mohamed Rabie Sayed 2 A network is a group of two or more computer systems linked together to exchange data and share resources, including expensive peripherals. 3 A local area network (LAN)

More information

Compression; Error detection & correction

Compression; Error detection & correction Compression; Error detection & correction compression: squeeze out redundancy to use less memory or use less network bandwidth encode the same information in fewer bits some bits carry no information some

More information

8 VLANs. 8.1 Introduction. 8.2 vlans. Unit 8: VLANs 1

8 VLANs. 8.1 Introduction. 8.2 vlans. Unit 8: VLANs 1 8 VLANs 8.1 Introduction Layer 2 devices, such as network switches and wireless access points can be used to create virtual LANs (vlans), which can enhanced network security as it can be used to isolate

More information

CCM 4300 Lecture 6 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115

CCM 4300 Lecture 6 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115 CCM 4300 Lecture 6 Computer Networks, Wireless and Mobile Communications Dr Shahedur Rahman s.rahman@mdx.ac.uk Room: T115 1 Recap of Last Session Access Control ALOHA FDMA, TDMA, CDMA OSI Model Internetworking

More information

Infotech English for computer users

Infotech English for computer users Infotech English for computer users Second edition Student s Book Santiago Remacha Esteras PUBLISHED BY THE PRESS SYNDICATE OF THE UNIVERSITY OF CAMBRIDGE The Pitt Building, Trumpington Street, Cambridge

More information

CS 335 Graphics and Multimedia. Image Compression

CS 335 Graphics and Multimedia. Image Compression CS 335 Graphics and Multimedia Image Compression CCITT Image Storage and Compression Group 3: Huffman-type encoding for binary (bilevel) data: FAX Group 4: Entropy encoding without error checks of group

More information

CCNA Exploration1 Chapter 7: OSI Data Link Layer

CCNA Exploration1 Chapter 7: OSI Data Link Layer CCNA Exploration1 Chapter 7: OSI Data Link Layer LOCAL CISCO ACADEMY ELSYS TU INSTRUCTOR: STELA STEFANOVA 1 Explain the role of Data Link layer protocols in data transmission; Objectives Describe how the

More information

Focus on the ESET NOD32 antivirus system

Focus on the ESET NOD32 antivirus system INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT Int. J. Network Mgmt 2006; 16: 375 379 Published online in Wiley InterScience (www.interscience.wiley.com).623 Focus on the ESET NOD32 antivirus system By Gilbert

More information

CARRIER SENSE MULTIPLE ACCESS (CSMA):

CARRIER SENSE MULTIPLE ACCESS (CSMA): Lecture Handout Computer Networks Lecture No. 8 CARRIER SENSE MULTIPLE ACCESS (CSMA): There is no central control management when computers transmit on Ethernet. For this purpose the Ethernet employs CSMA

More information

Differential Compression and Optimal Caching Methods for Content-Based Image Search Systems

Differential Compression and Optimal Caching Methods for Content-Based Image Search Systems Differential Compression and Optimal Caching Methods for Content-Based Image Search Systems Di Zhong a, Shih-Fu Chang a, John R. Smith b a Department of Electrical Engineering, Columbia University, NY,

More information

Ethernet Hub. Campus Network Design. Hubs. Sending and receiving Ethernet frames via a hub

Ethernet Hub. Campus Network Design. Hubs. Sending and receiving Ethernet frames via a hub Campus Network Design Thana Hongsuwan Ethernet Hub 2003, Cisco Systems, Inc. All rights reserved. 1-1 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0 1-2 Sending and receiving Ethernet frames

More information

Distributed System Chapter 16 Issues in ch 17, ch 18

Distributed System Chapter 16 Issues in ch 17, ch 18 Distributed System Chapter 16 Issues in ch 17, ch 18 1 Chapter 16: Distributed System Structures! Motivation! Types of Network-Based Operating Systems! Network Structure! Network Topology! Communication

More information

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection: 1 Topics 2 LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS Multiple access: CSMA/CD, CSMA/CA, token passing, channelization LAN: characteristics, i basic principles i Protocol architecture Topologies

More information

Front Novell Guide to NLSP Migration

Front Novell Guide to NLSP Migration Front Novell Guide to NLSP Migration Front : 1 2 Novell Guide to NLSP Migration About This Guide.......................................... 7 Introduction..................................... 7 NetWare

More information

Contention Protocols and Networks

Contention Protocols and Networks 4/13/2005 314 Lecture Contention Protocols and Networks 1 Contention Protocols and Networks Contention Protocols CSMA/CD Network Topologies Ethernet 4/13/2005 314 Lecture Contention Protocols and Networks

More information

CCNA Cisco Certified Network Associate CCNA (v3.0)

CCNA Cisco Certified Network Associate CCNA (v3.0) CCNA Cisco Certified Network Associate CCNA (v3.0) Cisco 200-125 Dumps Available Here at: /cisco-exam/200-125-dumps.html Enrolling now you will get access to 455 questions in a unique set of 200-125 dumps

More information

Data Storage. Slides derived from those available on the web site of the book: Computer Science: An Overview, 11 th Edition, by J.

Data Storage. Slides derived from those available on the web site of the book: Computer Science: An Overview, 11 th Edition, by J. Data Storage Slides derived from those available on the web site of the book: Computer Science: An Overview, 11 th Edition, by J. Glenn Brookshear Copyright 2012 Pearson Education, Inc. Data Storage Bits

More information

Introduction to LAN Protocols

Introduction to LAN Protocols CHAPTER 2 Introduction to LAN Protocols This chapter introduces the various media-access methods, transmission methods, topologies, and devices used in a local area network (LAN). Topics addressed focus

More information

Bridging and Switching Basics

Bridging and Switching Basics CHAPTER 4 Bridging and Switching Basics This chapter introduces the technologies employed in devices loosely referred to as bridges and switches. Topics summarized here include general link-layer device

More information

10/100/1000 Mbps Ethernet 100 Mbps FDDI 155/620 Mbps ATM 4/10/45 Mbps Wireless

10/100/1000 Mbps Ethernet 100 Mbps FDDI 155/620 Mbps ATM 4/10/45 Mbps Wireless TRANSMISSION MEDIA LOCAL AREA NETWORK (LAN) TECHNOLOGY 10/100/1000 Mbps Ethernet 100 Mbps FDDI 155/620 Mbps ATM 4/10/45 Mbps Wireless page - 2 LAN TECHNOLOGY Protocol What is a Protocol? A protocol is

More information