Computer Networks. College of Computing. Copyleft 2003~2018. Prof. Lin Weiguo

Size: px
Start display at page:

Download "Computer Networks. College of Computing. Copyleft 2003~2018. Prof. Lin Weiguo"

Transcription

1 Computer Networks

2 Computer Networks Prof. Lin Weiguo Coege of Computing Copyeft 2003~2018

3 Roadmap Introduction Physica Layer Data Link Layer Medium Access Subayer Network Layer Transport Layer Appication Layer 3

4 Chapter 1 Introduction

5 Attention The materias beow are avaiabe for use by others. Instructors are wecome to use them in their own courses, downoad them to their own cass' web site, or modify them to suit. However, you must acknowedge the source of the origina and not attempt to pace your own copyright on this materia. Thanks to: 5

6 Topics 1.1 Uses of computer networks 1.2 Network Hardware 1.3 Network Software 1.4 Reference Modes 1.5 Exampe Networks 1.6 Network Standardization Some of the overa issues we be deaing with in this course. 6

7 A Computer Network Communication Link A coection of computers interconnected by communication inks inwei@cuc.edu.cn 7

8 1.1 Uses of Computer Networks Business Appications Home Appications Mobie Users Socia Issues 8

9 Business Appications Companies have a great number of computers Monitor productions, keep track of inventories, do the payro Those computers may have worked in isoation from the others, but at some point, management may have decided to connect them to be abe to distribute information throughout the company. inwei@cuc.edu.cn 9

10 1 st goa: Resource Sharing The goa is to make a programs, equipment, and especiay data avaiabe to anyone on the network without regard to the physica ocation of the resource and the user. Equipment: Printers, Scanner, CD-Burners Information: Customer records, Product information,inventories, financia statements, tax information inwei@cuc.edu.cn 10

11 Cient machine and Server machine Data A network with two cients and one server. inwei@cuc.edu.cn 11

12 Cient/Server mode The C/S mode is widey used and forms the basis of much network usage. The most popuar reaization is that of a Web appication. The cient/server mode invoves requests and repies. inwei@cuc.edu.cn 12

13 2 nd goa: A Computer network to do with peope A second goa of setting up a computer network has to do with peope rather than information or even computers. A computer network can provide a powerfu communication medium among empoyees. Emai VoIP Videoconferencing Cooperate with other to work: desktop sharing inwei@cuc.edu.cn 13

14 3 rd goa: e-commerce A third goa for many companies is doing business eectronicay with other companies, especiay suppiers and customers. e-commerce B2B: Business to business. B2C: Business to consumer. C2C: Consumer to consumer. inwei@cuc.edu.cn 14

15 Home Appications Access to remote information Web Person-to-person communication Emai,IM, VoIP e-commerce Interactive entertainment IPTV, Gaming 15

16 P2P - Peer to Peer In peer-to-peer system there is no fixed division into cients and servers. inwei@cuc.edu.cn 16

17 Other appications Ubiquitous computing IOT ( Internet of Things) Sensor Networks RFID (Radio Frequency IDentification) inwei@cuc.edu.cn 17

18 Mobie Users Combinations of wireess networks and mobie computing. 18

19 Wearabe Computers 19

20 SoLoMo 20

21 Socia Issues Socia networking issues Empoyee rights vs empoyer rights Government vs citizen Hacker and crimina Copyright protection Again, The Internet addiction? 21

22 1.2 Network Hardware Taxonomy of Networks Persona Networks Loca Area Networks Wide Area Networks Wireess Networks 22

23 Cassifying networks By transmission technoogy By scae 23

24 Transmission technoogy Types of transmission technoogy Broadcast inks Point-to-point inks 24

25 Point-to-point inks Point-to-point inks connect individua pairs of machines. Packets : short messages To go from the source to the destination, a packet on a network made up of point-to-point inks may have to first visit one or more intermediate machines. Often mutipe routes, of different engths, are possibe Unicasting: exacty one sender and one receiver inwei@cuc.edu.cn 25

26 Broadcast Networks Broadcast networks have a singe communication channe that is shared by a the machines on the network. Packets sent by any machine are received by a the others. An address fied within the packet specifies the intended recipient. Upon receiving a packet, a machine checks the address fied. If the packet is intended for the receiving machine, that machine processes the packet; if the packet is intended for some other machine, it is just ignored. inwei@cuc.edu.cn 26

27 Broad/Muti-casting Broadcasting address a packet to a destinations by using a specia code in the address fied. Muticasting Some broadcast systems aso support transmission to a subset of the machines inwei@cuc.edu.cn 27

28 Network Topoogies Think of a topoogy as a network's virtua shape or structure. Router inwei@cuc.edu.cn 28

29 Exampe of a Rea network inwei@cuc.edu.cn 29

30 Cassification by scae. 30

31 PAN (Persona area networks) Buetooth ( IEEE ) inwei@cuc.edu.cn 31

32 Loca Area Networks A LAN is a privatey owned network that operates with in and nearby a singe buiding ike a home, office or factory. LANs are widey used to connect persona computers and consumer eectronics to et them share resources and exchange information. inwei@cuc.edu.cn 32

33 Wireess and wired LANs Wireess and wired LANs. (a) (b) Switched Ethernet. 33

34 WLAN (Wireess LAN) Wireess LAN (Wi-Fi IEEE ) inwei@cuc.edu.cn 34

35 Wired LAN Wired LANs charactoristics Use copper wires, optica fibers Are restricted in size Run at speeds of 10Mbps to 1Gbps Low deay Make very few errors 35

36 Ethernet: IEEE802.3 Ethernet is the most common type of wired LAN Switched Ethernet Each computer speaks the Ethernet protoco and connects to a box caed a switch with a point-to-point ink. A switch has mutipe ports, each of which can connect to one computer. The job of the switch is to reay packets between computers that are attached to it, using the address in each packet to determine which computer to send it to. inwei@cuc.edu.cn 36

37 Expand and divide a LAN Expand a LAN to make it arger Switches can be pugged into each other using their ports Divide one arger physica LAN into smaer ogica LANs. VLAN(virtua LAN) Each switch port is tagged with a coor, the switch then forwards packets so that computers attached to the same coor ports are separated from the others. inwei@cuc.edu.cn 37

38 Cassic Ethernet The origina Ethernet design broadcasts a the packets over a singe inear cabe. At most one machine coud successfuy transmit at a time, and distributed arbitration mechanism was used to resove conficts. Computers coud transmit whenever the cabe was ide If two or more packets coided, each computer just waited a random time and tried ater. inwei@cuc.edu.cn 38

39 Cassic LAN Topoogies Two broadcast networks (a) Bus (IEEE 802.3, Ethernet) (b) Ring (IEEE 802.5, Token Ring) 39

40 Channe Aocation methods for Broadcast networks Static aocation Divide time into discrete intervas and use a round-robin agorithm, aowing each machine to broadcast ony when its time sot comes up. It wastes channe capacity when a machine has nothing to say during its aocated sot, so most systems attempt to aocate the channe dynamicay. Dynamic aocation Centraized: there is a singe entity which determines who goes next. Decentraized : there is no centra entity, each machine must decide for itsef whether to transmit. inwei@cuc.edu.cn 40

41 Metropoitan Area Networks MAN covers a city A metropoitan area network based on cabe TV. inwei@cuc.edu.cn 41

42 Wireess MAN WiMax IEEE

43 Wide Area Networks A WAN spans a arge geographica area, often a country or continent. WAN that connects three branch offices in Austraia inwei@cuc.edu.cn 43

44 Communication subnet Transmission ines copper wire, optica fiber, or even radio inks. Most companies do not have transmission ines ying about, so instead they ease the ines. Switching eements Switches are the speciaized computers caed routers that connect two or more transmission ines Subnet: A coection of routers and communication ines that moved packets from the source host to the destination. inwei@cuc.edu.cn 44

45 Differences between WAN &LAN In WAN, the hosts and subnet are owned and operated by different peope The routers wi usuay connect different kinds of networking technoogy. What is connected to the subnet: Individua computers Coud be entire LANs This is how arger networks are buit from smaer ones 45

46 WAN via the Internet VPN: fexibe but ack contro WAN using a virtua private network. inwei@cuc.edu.cn 46

47 WAN via ISP network The subnet is run by Internet Service Provider WAN using an ISP network. 47

48 WAN Terms Packet / Ce the message is cut into packets before sending Packet-switched / store-and-forward the packet is received at each intermediate router in its entirety, stored there unti the required output ine is free, and then forwarded. Routing agorithm There may be many paths in the network that connect two computers. How the network makes the decision as to which path to use is caed the routing agorithm. inwei@cuc.edu.cn 48

49 Internet Internetworks: Coection of interconnected networks. internet (ower case i) is generic term. Internet (upper case I) is wordwide connection to a kinds of machines. inwei@cuc.edu.cn 49

50 1.3 Network Software Protoco Hierarchies Design Issues for the Layers Connection-Oriented and Connectioness Services Service Primitives The Reationship of Services to Protocos 50

51 Phiosophy of Protoco Hierarchies Layering: To reduce their design compexity, most networks are organized as a stack of ayers or eves, each one buit upon the one beow it. Services: The purpose of each ayer is to offer certain service to the higher ayer, shieding those ayers from the detais of how the offered services are actuay impemented. inwei@cuc.edu.cn 51

52 Layer n Protoco Layer n on one machine carries on a conversation with ayer n on another machine. The rues and conventions used in this conversation are coectivey known as the ayer n protoco. A protoco is an agreement between communicating parties on how communication is to proceed. inwei@cuc.edu.cn 52

53 What Is A Protoco Human protocos: what s the time? How are you doing? I have a question - Specific messages sent - Specific actions taken when messages received, or other events Network protocos: Machines rather than humans A communication activity in Internet governed by protocos Protocos define format, order of messages sent and received among network entities, and actions taken on message transmission and receipt. inwei@cuc.edu.cn 53

54 Protoco Exampe Human Network Heo Heo TCP connection request TCP connection repy Got the time? HTTP request It s 10:30 HTTP response inwei@cuc.edu.cn 54

55 Protoco Hierarchies Virtua communication Peers Physica communication Layers, protocos, and interfaces. 55

56 Hierarchy Exampe Name Address Name Address Post Office Post Office 56

57 Terminoogy Peers The entities comprising the corresponding ayers on different machines are caed peers. The peers may be processes, hardware devices, or even human beings. In other words, it is the peers that communicate by using the protoco. Interface: Between each pair of adjacent ayers is an interface. The interface defines which primitive operations and services the ower ayer makes avaiabe to the upper one. 57

58 KISS principe "Keep It Simpe, Stupid", Important to keep it simpe and cean to reduce compexity. How many ayers? Cean interfaces Important that each ayer perform a specific coection of we-understood functions. inwei@cuc.edu.cn 58

59 Network architecture Network architecture: A set of ayers and protocos. The spec must contain enough information to aow an impementer to write the program or buid the hardware for each ayer so that it wi correcty obey the appropriate protoco. Functiona interfaces and impementation detais are not part of the spec, since that's not visibe outside the machine. It is not even necessary that the interfaces on a machines in a network be the same, provided that each machine can correcty use a the protocos. inwei@cuc.edu.cn 59

60 Protoco stack Protoco stack: A ist of protocos used by a system, one protoco per ayer, is caed a protoco stack. Network architectures, protoco stacks, and the protocos themseves are the principa subjects of this course inwei@cuc.edu.cn 60

61 Anaogy of Protoco Hierarchies Urdu Engish Chinese French The phiosopher-transator-secretary architecture. 61

62 Virtua Communication: Sino-US Tak Xi Jinping meets with Barack Obama. 62

63 Information fow Horizonta Exampe information fow supporting virtua communication in ayer 5. Layer4 thinks "SendtoPeer" rather than CaNextLayerDown". 63

64 Terminoogy Header: Upper ayer puts a header in front of the message to identify the message and passes the resut to ower ayer The header incudes contro information such as sequence numbers to keep the right order. Size of messages There is aways a imit to the size of messages imposed by certain ayer protoco. So incoming messages must be broken into smaer units (packets) in this ayer. inwei@cuc.edu.cn 64

65 An Internet Enveope 65

66 TCP/IP Hierarchies CRC HTTP FTP Data HTTP FTP TCP UDP Appication TCP UDP IP ICMP IGMP ARP Transport Internet IP ICMP IGMP ARP ATM Ethernet Preambe ATM Ethernet 66

67 Software or hardware? Athough this section is caed ' network software, it is worth pointing out that the ower ayers of a protoco hierarchy are frequenty impemented in hardware or firmware. Nevertheess, compex protoco agorithms are invoved, even if they are embedded (in whoe or in part) in hardware. inwei@cuc.edu.cn 67

68 Design Issues for the Layers Reiabiity Network Evoution Resource Location Against Threats 68

69 Reiabiity Reiabiity: Making a network that operates correcty even though it is made up of a coection of components that are themseves unreiabe. Mechanisms: Error detection Find errors in received information. Error correction Fix errors in received information. Routing Find a working path through a network. inwei@cuc.edu.cn 69

70 Network Evoution issue Protoco Layering Support change Addressing or Naming Every ayer needs a mechanism for identifying senders and receivers. Internetworking Different network technoogies often have different imitations. Scaabe Design work we when the network gets arge inwei@cuc.edu.cn 70

71 Resource Location Networks provide a service to hosts from their underying resource, such as the capacity of transmission ines. Statistica mutipexing Share network bandwidth dynamicay Fow contro Keep a fast sender from swamping a sow receiver with data. Congestion Network overoading Quaity of Service Differentia service for rea-time deivery and other. inwei@cuc.edu.cn 71

72 Against Threats Confidentiaity Against eavesdropping Authentication Prevent impersonation Integrity Prevent surreptitious changes to messages 72

73 Connection-Oriented vs. Connectioness Services Layers can offer two different types of service to the ayers above them: Connection-oriented Connectioness 73

74 Connection-oriented service Like the teephone system. The system estabishes a connection, uses it, and coses it. Acts ike a tube(circuit). Data comes out the other end in the same order as it goes in. Connection Setup (negotiation) Data Transfer Connection Termination inwei@cuc.edu.cn 74

75 Connectioness service Like the posta system. Each message carries the fu destination address and each one is routed through the intermediate nodes inside the system independent of a the subsequent messages. It is possibe that the first one sent can be deayed so that the subsequent messages arrive first. Message has a name: a packet in network ayer Store-and-forward switching vs. cut-through switching. inwei@cuc.edu.cn 75

76 Quaity of service Each service can be characterized by a QoS: Reiabiity: Wi the message arrive? A reiabe service is impemented by acknowedgement (a receipt from the receiver). Deay (Latency) Deays and overhead are introduced in the ack process inwei@cuc.edu.cn 76

77 Reiabe connection-oriented service A reiabe connection-oriented service guarantees success. They never ose data. Message sequence - message boundaries and order are maintained. Byte streams - messages are broken up or combined; fow is bytes. Can pair mechanism with upper-ayer requirements. A typica situation in which a reiabe connectionoriented service is appropriate is fie transfer. inwei@cuc.edu.cn 77

78 Unreiabe Connectioness Service Connectioness Service /Datagram Service: For some appications, the transit deay introduced by acks are unacceptabe. Like Voice Over IP. Not a appications require connections. Like junk mai. It's not worth the cost to determine if it actuay arrived. Needs a high probabiity of arriva, but 100% not required. Connectioness, no acknowedgment. Acknowedged datagram service: As above, but improved reiabiity via acknowedgment. Request-repy service: Acknowedgment is in the form of a repy. inwei@cuc.edu.cn 78

79 Connection-Oriented and Connectioness Services Six different types of service. 79

80 Service Primitives A service is formay specified by a set of primitives (operations) avaiabe to a user process to access the service. These primitives te the service to perform some action or report on an action taken by a peer entity. If the protoco stack is ocated in the operating system, as it often is, the primitives are normay system cas inwei@cuc.edu.cn 80

81 Service Primitives Five service primitives for impementing a simpe connection-oriented service. inwei@cuc.edu.cn 81

82 Service Primitives Packets sent in a simpe cient-server interaction on a connection-oriented network.( but ife is not so simpe) inwei@cuc.edu.cn 82

83 Services to Protocos Reationship A service is a set of primitives (operations) that a ayer provides to the ayer above it. The service defines what operations the ayer is prepared to perform on behaf of its users, but it says nothing at a about how these operations are impemented. A protoco, in contrast, is a set of rues governing the format and meaning of the packets, or messages that are exchanged by the peer entities within a ayer. Entities use protocos to impement their service definitions. inwei@cuc.edu.cn 83

84 Layer K: a service and a protoco. In other words, services reate to the interfaces between ayers. In contrast, protocos reate to the packets sent between peer entities on different machines. inwei@cuc.edu.cn 84

85 1.4 Reference Modes The OSI Reference Mode The TCP/IP Reference Mode The Mode used in this course A Comparison of the OSI and TCP/IP A Critique of the OSI Mode and Protocos A Critique of the TCP/IP Reference Mode inwei@cuc.edu.cn 85

86 OSI vs. TCP/IP reference mode The protocos associated with the OSI(Open System Interconnect) mode are rarey used any more, the mode itsef is actuay quite genera and sti vaid, and the features discussed at each ayer are sti very important. The TCP/IP mode has the opposite properties: the mode itsef is not of much use but the protocos are widey used. 86

87 The OSI Reference Mode Deveoped by ISO: Internationa Standards Organization (1983,revised in 1995) Principes used to deveop OSI Layering: 1. Need a ayer for each different eve of abstraction. 2. Each ayer performs a we defined function. 3. Each ayer shoud be standardizabe. 4. Layer boundaries shoud minimize data fow across those boundaries. 5. The right number of ayers - don't put too many functions together, but not too many ayers either. inwei@cuc.edu.cn 87

88 The OSI Reference Mode The OSI reference mode. 1983,

89 Physica Layer Purpose Transmits raw bits across a medium. Concerns are Votage: how many vots for 1 / 0 Timing: how many ns a bit asts Dupexing: transmission in both directions? Connectors: how many pins? What is each pin? etc. inwei@cuc.edu.cn 89

90 Data Link Layer Purpose: Transform a raw transmission ine into a ine that appears free of undetected transmission errors to the networks ayer Concerns: Framing - Breaks apart input data into frames and transmit the frames sequentiay. Error handing if the service is reiabe, the receiver confirms correct receipt of each frame by sending back an acknowedgement frame. Fow contro - keeps a fast transmitter from drowning a sow receiver in data. Medium Access Contro how to contro access to the shared channe for broadcast networks. inwei@cuc.edu.cn 90

91 Network Layer Purpose Route packets from source to destination Concerns Routing - What path is foowed by packets from source to destination. Can be based on a static tabe, can be determined when the connection is created, or can be highy dynamic, being determined anew for each packet, to refect the current network oad. Congestion - Contros the number packets in the subnet. Qos Quaity of service provided(deay, transit time, jitter ) Heterogeneity - Interfacing so one type of network can tak to another. Addressing, packet size, protocos inwei@cuc.edu.cn 91

92 Transport Layer Purpose Accept data from above it, spit it up into smaer units if need be, pass them to network ayer, and ensure that the pieces a arrive correcty at the other end. Concerns Service Decisions - What type of service to provide; error-free point to point, datagram, etc. End-to-end: it carries data a the way from the source to the destination. Reiabiity - Ensures that packets arrive at their destination. Reassembes out of order messages. Hides network - Aows detais of the network to be hidden from higher eve ayers. Mapping - Determines which messages beong to which connections. Fow contro - keeps a fast transmitter from fooding a sow receiver. inwei@cuc.edu.cn 92

93 Session Layer Purpose Aow users on different machines to estabish sessions between them Concerns Diaog contro - keep track of whose turn it is to transmit Token Management prevent two parties from attempting the same critica operation at the same time Synchronization checkpointing ong transmissions to aow them to pick up from where they eft off in the event of a crash and subsequent recovery. inwei@cuc.edu.cn 93

94 Presentation Layer Purpose Make it possibe for computers with different data representations to communicate Concerns Syntax and semantics of information transmitted. Understands the nature of the data being transmitted. Converts ASCII/EBCDIC, big endian/itte endian 94

95 Appication Layer contains a variety of protocos that are commony needed by users. HTTP FTP SMTP inwei@cuc.edu.cn 95

96 The TCP/IP Reference Modes Link ayer Internet ayer Transport ayer Appication ayer 96

97 U.S. DoD ARPANET Was a research network sponsored by the DoD Network be abe to survive oss of subnet hardware, with existing conversations not being broken off. A fexibe architecture was needed since appications with divergent requirements were envisioned, ranging from transferring fies to reatime speech transmission inwei@cuc.edu.cn 97

98 The TCP/IP Reference Modes The TCP/IP reference mode (Cerf & Kahn1974, Cark 1988) 98

99 The Key a packet-switching network based on a connectioness ayer that runs across different networks. inwei@cuc.edu.cn 99

100 Link Layer Describes what ink such as seria ines and cassic Ethernet must do to meet the needs of the connectioness internet ayer. It is not reay a ayer at a, in the norma sense of the term, but rather an interface between hosts and transmission inks. inwei@cuc.edu.cn 100

101 The Internet Layer Permit hosts to inject packets into any network and have them trave independenty to the destination ( potentiay on a different network, ike internationa mai) Routing and Congestion contro IP (Internet Protoco) ICMP(Internet Contro Message Protoco) inwei@cuc.edu.cn 101

102 Transport Layer End2End: Aows peer entities to communicate. TCP - Transmission Contro Protoco provides a reiabe connection oriented protoco that deivers a byte stream from one node to another. Guarantees deivery and provides fow contro. UDP - User Datagram Protoco provides an unreiabe connection-ess protoco for appications that provide their own. inwei@cuc.edu.cn 102

103 Appication Layer Termina - Tenet Fie transfer FTP The Web - HTTP inwei@cuc.edu.cn 103

104 The TCP/IP Reference Modes The TCP/IP reference mode with some protocos we wi study 104

105 The mode used in this course The reference mode used in this course. 105

106 Comparing OSI and TCP/IP Modes Concepts centra to the OSI mode Services Interfaces Protocos OSI has good definition of service, interface, and protoco as discussed before. Fits we with object oriented programming concepts. Protocos are better hidden. 106

107 Comparing OSI and TCP/IP Modes The TCP/IP mode did not originay distinguish between service, interface, and protoco. With TCP/IP, the protocos came first; mode was just a description of the protocos. But then the mode isn't good for any other protocos. inwei@cuc.edu.cn 107

108 Different phiosophy Which is first? Reference Mode vs Corresponding protocos 108

109 Specific differences Number of ayers: 7 vs. 4 Connectioness vs. connection-oriented OSI supports both in the network ayer, but ony Connection-oriented communication in the transport ayer TCP/IP supports ony connectioness mode in the network ayer but supports both in the transport ayer, giving the users a choice. inwei@cuc.edu.cn 109

110 A Critique of the OSI Mode and Protocos Why OSI did not take over the word Bad timing Bad technoogy Fawed, too compex More poitica than technica of 7 ayers decision Bad impementations Huge, unwiedy, Poor quaity Bad poitics Academia vs Bureaucrats inwei@cuc.edu.cn 110

111 Bad Timing The apocaypse of the two eephants. 111

112 A Critique of the TCP/IP Reference Mode Service, interface, and protoco not distinguished Not a genera mode Link ayer not reay a ayer No mention of physica and data ink ayers Minor protocos deepy entrenched, hard to repace inwei@cuc.edu.cn 112

113 1.5 Exampe Networks The Internet 3G Mobie Phone Networks Wireess LANs: RFID and Sensor networks 113

114 The history The story begins in the ate 1950s. At the height of the Cod War, the DoD wanted a command-and-contro network that coud survive a nucear war. This eads to the ARPANET: 1968 Originay intended as reiabe network, with mutipe routing. Used TCP/IP precursor, which got buit into eary UNIX. (ARPA, the Advanced Research Projects Agency ) inwei@cuc.edu.cn 114

115 The ARPANET (a) Structure of the teephone system. (b) Baran s proposed distributed switching system. inwei@cuc.edu.cn 115

116 The ARPANET (2) The origina ARPANET design. IMPs (Interface Message Processors) 116

117 The ARPANET (3) NAP (Network Access Point). Growth of the ARPANET (a) December (b) Juy (c) March (d) Apri (e) September

118 NSFNET The NSFNET backbone in

119 NSFNET Late 1970s - Many other foks wanted to get on the net, but Arpanet was essentiay imited to miitary contractors. NSF set up another network to hande this need. Started at 448 Kbps and by 80's upgraded to 1.5 Mbps Formed ANS (Advanced Networks and Services) - MERIT, MCI, IBM took over from the government running at 45 Mbps ANSNET sod to AOL, who now runs it. inwei@cuc.edu.cn 119

120 Internet Usage Growing exponentiay. A nodes run TCP/IP. Means that a nodes have an IP address by which they can be contacted. Traditiona appications ( ) E-mai News Remote ogin Fie transfer inwei@cuc.edu.cn 120

121 Internet Usage 1990s : the WWW (Word Wide Web) invented by CERN physicist Tim Berners-Lee Together with the Mosaic browser Written by Marc Andreessen at the Nationa Center for Supercomputer Appications in Urbana, Iinois ISPs (Internet Service Providers) Offer individua users at home the abiity to ca up one of their machines and connect to the Internet inwei@cuc.edu.cn 121

122 Architecture of the Internet Overview of the Internet architecture 122

123 3G Mobie Phone Networks Ceuar design of mobie phone networks 123

124 3G Mobie Phone Networks Architecture of the UMTS 3G mobie phone network. 124

125 3G Mobie Phone Networks Mobie phone handover (a) before, (b) after. 125

126 Wireess LANs - WiFi (802.11) (a) Wireess networking with a base station. (b) Ad hoc networking. inwei@cuc.edu.cn 126

127 Wireess LANs: Mutipath fading 127

128 Wireess LANs: The range of a singe radio may not cover the entire system. inwei@cuc.edu.cn 128

129 Wireess LANs standards The deveopment of the standard : 1Mbps, 2Mbps (2.4 GHz) a-1999: 54Mbps (5 GHz band) b-1999:11Mbps(2.4 GHz) g-2003: 54Mbps (2.4 GHz) n-2009:upto 600Mbps (operates on both the 2.4 GHz and the esser used 5 GHz bands) ac-2012:upto 1Gbps(5GHz) inwei@cuc.edu.cn 129

130 RFID and Sensor Networks RFID used to network everyday objects. 130

131 RFID and Sensor Networks Mutihop topoogy of a sensor network inwei@cuc.edu.cn 131

132 1.6 Network Standardization Who s Who in the Teecommunications Word Who s Who in the Internationa Standards Word Who s Who in the Internet Standards Word De facto and De jure inwei@cuc.edu.cn 132

133 ITU (Internationa Teecommunication Union) Main sectors ITU-R: Radio communications ITU-T: Teecommunications Standardization ITU-D: Deveopment Casses of Members Nationa governments Sector members Associate members Reguatory agencies 133

134 Network Standardization ISO (Internationa Standards Organization) ANSI (American Nationa Standards Institute) NIST (Nationa Institute of Standards and Technoogy) IEEE (Institute of Eectrica and Eectronics Engineering) 134

135 IEEE 802 Standards The 802 working groups. The important ones are marked with *. The ones marked with are hibernating. The one marked with gave up and disbanded itsef. 135

136 IEEE 802 Standards 136

137 Internet standards Internet Architecture Board. IETF: Internet Engineering Task Force RFC: Request for comments IRTF (Internet Research Task Force) Internet Society 137

138 END OF CH-1 138

Computer Networks. College of Computing. Copyleft 2003~2018

Computer Networks. College of Computing.   Copyleft 2003~2018 Computer Networks Computer Networks Prof. Lin Weiguo Coege of Computing Copyeft 2003~2018 inwei@cuc.edu.cn http://icourse.cuc.edu.cn/computernetworks/ http://tc.cuc.edu.cn Attention The materias beow are

More information

Reference Models. 7.3 A Comparison of the OSI and TCP/IP Reference Models

Reference Models. 7.3 A Comparison of the OSI and TCP/IP Reference Models Reference Models Contains 7.1 The OSI Reference Model 7.1.1 The Physical Layer 7.1.2 The Data Link Layer 7.1.3 The Network Layer 7.1.4 The Transport Layer 7.1.5 The Session Layer 7.1.6 The Presentation

More information

Review of Lecture 1. EEC-484/584 Computer Networks. Network Hardware. Outline. Lecture 2. Wenbing Zhao

Review of Lecture 1. EEC-484/584 Computer Networks. Network Hardware. Outline. Lecture 2. Wenbing Zhao EEC-484/584 Computer Networks Lecture 2 Review of Lecture 1 Uses of computer networks Network Hardware 3 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and

More information

Hour 3: The Network Access Layer Page 1 of 10. Discuss how TCP/IP s Network Access layer relates to the OSI networking model

Hour 3: The Network Access Layer Page 1 of 10. Discuss how TCP/IP s Network Access layer relates to the OSI networking model Hour 3: The Network Access Layer Page 1 of 10 Hour 3: The Network Access Layer At the base of the TCP/IP protoco stack is the Network Access ayer, the coection of services and specifications that provide

More information

Introduction to USB Development

Introduction to USB Development Introduction to USB Deveopment Introduction Technica Overview USB in Embedded Systems Recent Deveopments Extensions to USB USB as compared to other technoogies USB: Universa Seria Bus A seria bus standard

More information

The Internet and the web

The Internet and the web The Internet and the web Contents Introduction 3 1 The Internet at home 4 2 Loca Area Networks sma office/home office 5 3 Loca Area Networks business 6 4 Wide Area Networks 8 5 Wireess networks 9 6 Mobie

More information

No connection establishment Do not perform Flow control Error control Retransmission Suitable for small request/response scenario E.g.

No connection establishment Do not perform Flow control Error control Retransmission Suitable for small request/response scenario E.g. UDP & TCP 2018/3/26 UDP Header Characteristics of UDP No connection estabishment Do not perform Fow contro Error contro Retransmission Suitabe for sma request/response scenario E.g., DNS Remote Procedure

More information

Computer Networks. College of Computing. Copyleft 2003~2018

Computer Networks. College of Computing.   Copyleft 2003~2018 Computer Networks Prof. Lin Weiguo Coege of Computing Copyeft 2003~2018 inwei@cuc.edu.cn http://icourse.cuc.edu.cn/computernetworks/ http://tc.cuc.edu.cn Internet Contro Message Protoco (ICMP), RFC 792

More information

ngenius Instrumentation Overview

ngenius Instrumentation Overview ngenius Instrumentation Overview NetScout Systems, Inc. 4 Technoogy Park Drive Westford, MA 01886 Teephone: 978-614-4000 Fax: 978-614-4004 Web: http://www.netscout.com NetScout is a registered trademark

More information

ECE544: Communication Networks-II, Spring Transport Layer Protocols Sumathi Gopal March 31 st 2006

ECE544: Communication Networks-II, Spring Transport Layer Protocols Sumathi Gopal March 31 st 2006 ECE544: Communication Networks-II, Spring 2006 Transport Layer Protocos Sumathi Gopa March 31 st 2006 Lecture Outine Introduction to end-to-end protocos UDP RTP TCP Programming detais 2 End-To-End Protocos

More information

Chapter 1. Introduction

Chapter 1. Introduction Chapter 1 Introduction Uses of Computer Networks Business Applications Home Applications Mobile Users Social Issues Business Applications of Networks A network with two clients and one server. Business

More information

EEC-484/584 Computer Networks

EEC-484/584 Computer Networks EEC-484/584 Computer Networks Lecture 2 Wenbing Zhao wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Misc. Interested in research? Secure

More information

Link Registry Protocol Options

Link Registry Protocol Options Link Registry Protoco Options Norman Finn, March 2017 HUAWEI TECHNOLOGIES CO., LTD. IEEE 802.1 TSN At east two obvious choices for P802.1CS Link Registration Protoco An IS-IS-ike protoco. TCP (Transmission

More information

Need For Protocol Architecture

Need For Protocol Architecture Chapter 2 CS420/520 Axel Krings Page 1 Need For Protocol Architecture E.g. File transfer Source must activate communications path or inform network of destination Source must check destination is prepared

More information

Overview of Network Software. CS158a Chris Pollett Jan 31, 2007.

Overview of Network Software. CS158a Chris Pollett Jan 31, 2007. Overview of Network Software CS158a Chris Pollett Jan 31, 2007. Outline Design Issues for Protocol Hierarchies Reference Models Example Networks Protocol Hierarchies-Review To reduce design complexity

More information

Need For Protocol Architecture

Need For Protocol Architecture Chapter 2 CS420/520 Axel Krings Page 1 Need For Protocol Architecture E.g. File transfer Source must activate communications path or inform network of destination Source must check destination is prepared

More information

Chapter 1. Introduction

Chapter 1. Introduction Chapter 1 Introduction Computer Networks The old model of a single computer serving all of the organization s computational needs has been replace by one in which a large number of separate but interconnected

More information

RDF Objects 1. Alex Barnell Information Infrastructure Laboratory HP Laboratories Bristol HPL November 27 th, 2002*

RDF Objects 1. Alex Barnell Information Infrastructure Laboratory HP Laboratories Bristol HPL November 27 th, 2002* RDF Objects 1 Aex Barne Information Infrastructure Laboratory HP Laboratories Bristo HPL-2002-315 November 27 th, 2002* E-mai: Andy_Seaborne@hp.hp.com RDF, semantic web, ontoogy, object-oriented datastructures

More information

COS 140: Foundations of Computer Science

COS 140: Foundations of Computer Science COS 140: Foundations of C Networks Fall 2017 Copyright c 2002 2017 UMaine School of Computing and Information S 1 / 21 Homework, announcements New chapter (23) online No homework assigned today, sorry!

More information

CSE120 Principles of Operating Systems. Prof Yuanyuan (YY) Zhou Scheduling

CSE120 Principles of Operating Systems. Prof Yuanyuan (YY) Zhou Scheduling CSE120 Principes of Operating Systems Prof Yuanyuan (YY) Zhou Scheduing Announcement Homework 2 due on October 25th Project 1 due on October 26th 2 CSE 120 Scheduing and Deadock Scheduing Overview In discussing

More information

Announcements. Program #2 regrades requests due by 11:00 today HW #2 was collected at the start of class Reading

Announcements. Program #2 regrades requests due by 11:00 today HW #2 was collected at the start of class Reading Announcements Program #2 regrades requests due by 11:00 today HW #2 was coected at the start of cass Reading Today: 6.3-6.4 Thursday: 3.1 CMSC 417 - F97 (ect 16) copyright 1997 Jeffrey K. Hoingsworth 1

More information

Chapter 1. Uses of Computer Networks Network Hardware Network Software Reference Models Example Networks Network Standardization. Revised: August 2011

Chapter 1. Uses of Computer Networks Network Hardware Network Software Reference Models Example Networks Network Standardization. Revised: August 2011 Introduction ti Chapter 1 Uses of Computer Networks Network Hardware Network Software Reference Models Example Networks Network Standardization Metric Units Revised: August 2011 Uses of Computer Networks

More information

Data and Computer Communications. Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications

Data and Computer Communications. Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications Data and Computer Communications Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based s 1 Need For Protocol Architecture data exchange can involve complex procedures better if task broken into subtasks

More information

An Adaptive Two-Copy Delayed SR-ARQ for Satellite Channels with Shadowing

An Adaptive Two-Copy Delayed SR-ARQ for Satellite Channels with Shadowing An Adaptive Two-Copy Deayed SR-ARQ for Sateite Channes with Shadowing Jing Zhu, Sumit Roy zhuj@ee.washington.edu Department of Eectrica Engineering, University of Washington Abstract- The paper focuses

More information

Authorization of a QoS Path based on Generic AAA. Leon Gommans, Cees de Laat, Bas van Oudenaarde, Arie Taal

Authorization of a QoS Path based on Generic AAA. Leon Gommans, Cees de Laat, Bas van Oudenaarde, Arie Taal Abstract Authorization of a QoS Path based on Generic Leon Gommans, Cees de Laat, Bas van Oudenaarde, Arie Taa Advanced Internet Research Group, Department of Computer Science, University of Amsterdam.

More information

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Nguyễn Đức Thái

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Nguyễn Đức Thái Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Nguyễn Đức Thái Course details Number of credits: 4 Study time allocation per week: 3 lecture hours for theory 2 lecture hours for exercises and lab work

More information

Inside TCP/IP, Third Edition Network Support for TCP/IP

Inside TCP/IP, Third Edition Network Support for TCP/IP Inside TCP/IP, Third Edition -- Ch 3 -- Network Support for TCP/IP Page 1 of 47 Inside TCP/IP, Third Edition - 3 - Network Support for TCP/IP One of the reasons for the popuarity of TCP/IP networks is

More information

Lecture-4. TCP/IP-Overview:

Lecture-4. TCP/IP-Overview: Lecture-4 TCP/IP-Overview: The history goes back to ARPANET a research network sponsored by DoD US Govt. It eventually connected hundreds of universities and govt installations, using leased telephone

More information

The 3ISYS-ETHG-4C4FC is managed redundant ring Ethernet switch. with 4x10/100/1000Base-T(X) and 4xGigabit Combo ports. With

The 3ISYS-ETHG-4C4FC is managed redundant ring Ethernet switch. with 4x10/100/1000Base-T(X) and 4xGigabit Combo ports. With PRODUCT OVERVIEW The 3ISYS-ETHG-4C4FC is managed redundant ring Ethernet switch with 4x10/100/1000Base-T(X) and 4xGigabit Combo ports. With compete support of Ethernet redundancy protoco, SYS-Ring (recovery

More information

TD-SCDMA Physical Layer Design Overview

TD-SCDMA Physical Layer Design Overview TD-SCDMA Layer Design Overview Author Information Coege: Information Security Engineering Coege Cass: F0503602 Name: SHI Junxiao Instructor: WU Yue Instructor's coege: Information Security Engineering

More information

Computer Communication and Networks

Computer Communication and Networks Computer Communication and Networks Text Books 1. Computer Networks, Andrew S Tanenbaum, Fifth edition. 2. Data Communications and Networking, B Forouzan, 3rd edition. 3. Data and Computer Communications,

More information

King Fahd University of Petroleum & Minerals Computer Engineering g Dept

King Fahd University of Petroleum & Minerals Computer Engineering g Dept King Fahd University of Petroleum & Minerals Computer Engineering g Dept COE 540 Computer Networks Term 121 Dr. Ashraf S. Hasan Mahmoud Rm 22-420 Ext. 1724 Email: ashraf@kfupm.edu.sa 9/1/2012 Dr. Ashraf

More information

Special Edition Using Microsoft Excel Selecting and Naming Cells and Ranges

Special Edition Using Microsoft Excel Selecting and Naming Cells and Ranges Specia Edition Using Microsoft Exce 2000 - Lesson 3 - Seecting and Naming Ces and.. Page 1 of 8 [Figures are not incuded in this sampe chapter] Specia Edition Using Microsoft Exce 2000-3 - Seecting and

More information

Windows NT, Terminal Server and Citrix MetaFrame Terminal Server Architecture

Windows NT, Terminal Server and Citrix MetaFrame Terminal Server Architecture Windows NT, Termina Server and Citrix MetaFrame - CH 3 - Termina Server Architect.. Page 1 of 13 [Figures are not incuded in this sampe chapter] Windows NT, Termina Server and Citrix MetaFrame - 3 - Termina

More information

Computing devices have become increasingly mobile at the client end, and the

Computing devices have become increasingly mobile at the client end, and the Pronto: Mobie Gateway With Pubish- Subscribe Paradigm Over Wireess Network Eiko Yoneki University of Cambridge Pronto, a messaging middeware system for mobie appications, provides both centraized and decentraized

More information

ECE 650 Systems Programming & Engineering. Spring 2018

ECE 650 Systems Programming & Engineering. Spring 2018 ECE 650 Systems Programming & Engineering Spring 2018 Networking Introduction Tyler Bletsch Duke University Slides are adapted from Brian Rogers (Duke) Computer Networking A background of important areas

More information

Networking Applications

Networking Applications Networking Dr. Ayman A. Abdel-Hamid College of Computing and Information Technology Arab Academy for Science & Technology and Maritime Transport 1 Outline Internet Layers Internet Data Packet transmission

More information

CHAPTER -1. Introduction to Computer Networks

CHAPTER -1. Introduction to Computer Networks CHAPTER -1 Introduction to Computer Networks PRELIMINARY DEFINITIONS computer network :: [Tanenbaum] a collection of autonomous computers interconnected by a single technology. communications network ::a

More information

Internet 최양희서울대학교컴퓨터공학부. MMlab 1

Internet 최양희서울대학교컴퓨터공학부. MMlab 1 Internet 최양희서울대학교컴퓨터공학부 MMlab 1 Internet Timeline 3000 BC : Abacus 1642 : Pascal : numerical wheel calculator 1822 : Babbage : difference engine 1945 : Eckert : ENIAC 1969 : first ARPANET connection UCLA,

More information

Service Scheduling for General Packet Radio Service Classes

Service Scheduling for General Packet Radio Service Classes Service Scheduing for Genera Packet Radio Service Casses Qixiang Pang, Amir Bigoo, Victor C. M. Leung, Chris Schoefied Department of Eectrica and Computer Engineering, University of British Coumbia, Vancouver,

More information

CSE120 Principles of Operating Systems. Prof Yuanyuan (YY) Zhou Advanced Memory Management

CSE120 Principles of Operating Systems. Prof Yuanyuan (YY) Zhou Advanced Memory Management CSE120 Principes of Operating Systems Prof Yuanyuan (YY) Zhou Advanced Memory Management Advanced Functionaity Now we re going to ook at some advanced functionaity that the OS can provide appications using

More information

Network and Mobile Compu4ng in the 20 th Century and Beyond. COMP 1400 Memorial University Winter 2015

Network and Mobile Compu4ng in the 20 th Century and Beyond. COMP 1400 Memorial University Winter 2015 Network and Mobile Compu4ng in the 20 th Century and Beyond COMP 1400 Memorial University Winter 2015 What s the Internet: nuts and bolts view PC server wireless laptop smartphone wireless links wired

More information

file://j:\macmillancomputerpublishing\chapters\in073.html 3/22/01

file://j:\macmillancomputerpublishing\chapters\in073.html 3/22/01 Page 1 of 15 Chapter 9 Chapter 9: Deveoping the Logica Data Mode The information requirements and business rues provide the information to produce the entities, attributes, and reationships in ogica mode.

More information

Chapter 1: Introduction

Chapter 1: Introduction EE4272: Computer Networks Chapter 1: Introduction Instructor: Tricia Chigan Dept.: Elec. & Comp. Eng. 1) Data Communications: Deals with the transmission of signals in a reliable & efficient manner. Topics:

More information

Data and Computer Communications

Data and Computer Communications Data and Computer Communications Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications Eighth Edition by William Stallings Chap2: 1 Need For Protocol Architecture data exchange can involve

More information

Guide to Networking Essentials, 6 th Edition. Chapter 6: Network Reference Models and Standards

Guide to Networking Essentials, 6 th Edition. Chapter 6: Network Reference Models and Standards Guide to Networking Essentials, 6 th Edition Chapter 6: Network Reference Models and Standards Objectives Explain the OSI reference model layers and their relationship to hardware and software Explain

More information

CS 428/528 Computer Networks Lecture 01. Yan Wang

CS 428/528 Computer Networks Lecture 01. Yan Wang 1 CS 428/528 Computer Lecture 01 Yan Wang 2 Motivation: Why bother? Explosive growth of networks 1989, 100,000 hosts on the Internet Distributed Applications and Systems E-mail, WWW, multimedia, distributed

More information

Modelling and Performance Evaluation of Router Transparent Web cache Mode

Modelling and Performance Evaluation of Router Transparent Web cache Mode Emad Hassan A-Hemiary IJCSET Juy 2012 Vo 2, Issue 7,1316-1320 Modeing and Performance Evauation of Transparent cache Mode Emad Hassan A-Hemiary Network Engineering Department, Coege of Information Engineering,

More information

Layered Architecture

Layered Architecture 1 Layered Architecture Required reading: Kurose 1.7 CSE 4213, Fall 2006 Instructor: N. Vlajic Protocols and Standards 2 Entity any device capable of sending and receiving information over the Internet

More information

2. A collection of interconnected networks is called an internetwork. 3. Each machine is connected to a central hub with a point-to-point connection.

2. A collection of interconnected networks is called an internetwork. 3. Each machine is connected to a central hub with a point-to-point connection. نموذج أسئلة اختبار النهائي عام 2017 الفصل الدراسي الثاني لمقرر شبكات الحاسب CHOSE 1. channel spectrum divided into frequency bands "FDMA" 2. A collection of interconnected networks is called an internetwork

More information

Ad Hoc Networks 11 (2013) Contents lists available at SciVerse ScienceDirect. Ad Hoc Networks

Ad Hoc Networks 11 (2013) Contents lists available at SciVerse ScienceDirect. Ad Hoc Networks Ad Hoc Networks (3) 683 698 Contents ists avaiabe at SciVerse ScienceDirect Ad Hoc Networks journa homepage: www.esevier.com/ocate/adhoc Dynamic agent-based hierarchica muticast for wireess mesh networks

More information

Nearest Neighbor Learning

Nearest Neighbor Learning Nearest Neighbor Learning Cassify based on oca simiarity Ranges from simpe nearest neighbor to case-based and anaogica reasoning Use oca information near the current query instance to decide the cassification

More information

Development of a National Portal for Tuvalu. Business Case. SPREP Pacific iclim

Development of a National Portal for Tuvalu. Business Case. SPREP Pacific iclim Deveopment of a Nationa Porta for Tuvau Business Case SPREP Pacific iclim Apri 2018 Tabe of Contents 1. Introduction... 3 1.1 Report Purpose... 3 1.2 Background & Context... 3 1.3 Other IKM Activities

More information

Computer Communication & Networks / Data Communication & Computer Networks Week # 03

Computer Communication & Networks / Data Communication & Computer Networks Week # 03 Computer Communication & Networks / Data Communication & Computer Networks Week # 03 M.Nadeem Akhtar CS & IT Department The University of Lahore Email: nadeem.akhtar@cs.uol.edu.pk URL-https://sites.google.com/site/nadeemuolcsccn/home

More information

FCM 742 Network Security

FCM 742 Network Security FCM 742 Network Security Prof. Ping Ji Spring 2016 Computer Networks Overview Modified from sides provided by Prof. Jim Kurose Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge v end systems,

More information

NCH Software Express Delegate

NCH Software Express Delegate NCH Software Express Deegate This user guide has been created for use with Express Deegate Version 4.xx NCH Software Technica Support If you have difficuties using Express Deegate pease read the appicabe

More information

Introduction. Communication

Introduction. Communication Introduction These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang's courses at GMU can make a single machine-readable copy and print a single copy of each

More information

Computer Network : Lecture Notes Nepal Engineering College Compiled by: Junior Professor: Daya Ram Budhathoki Nepal Engineering college, Changunarayan

Computer Network : Lecture Notes Nepal Engineering College Compiled by: Junior Professor: Daya Ram Budhathoki Nepal Engineering college, Changunarayan Computer Network : Lecture Notes Nepal Engineering College Compiled by: Junior Professor: Daya Ram Budhathoki Nepal Engineering college, Changunarayan Chapter3: OSI Reference Model: Network Software: Network

More information

03 The Internet Model and TCP/IP

03 The Internet Model and TCP/IP SE 4C03 Winter 2003 03 The Internet Model and TCP/IP Instructor: W. M. Farmer Revised: 16 January 2003 1 The OSI Model In 1977 the International Standards Organization (ISO) offered the Open Systems Interconnection

More information

Topology-aware Key Management Schemes for Wireless Multicast

Topology-aware Key Management Schemes for Wireless Multicast Topoogy-aware Key Management Schemes for Wireess Muticast Yan Sun, Wade Trappe,andK.J.RayLiu Department of Eectrica and Computer Engineering, University of Maryand, Coege Park Emai: ysun, kjriu@gue.umd.edu

More information

Bridge Talk Release Notes for Meeting Exchange 5.0

Bridge Talk Release Notes for Meeting Exchange 5.0 Bridge Tak Reease Notes for Meeting Exchange 5.0 This document ists new product features, issues resoved since the previous reease, and current operationa issues. New Features This section provides a brief

More information

Chapter 3: Network Protocols and Communications CCENT Routing and Switching Introduction to Networks v6.0 Instructor Planning Guide

Chapter 3: Network Protocols and Communications CCENT Routing and Switching Introduction to Networks v6.0 Instructor Planning Guide Chapter 3: Network Protocols and Communications CCENT Routing and Switching Introduction to Networks v6.0 Instructor Planning Guide CCNET v6 1 Chapter 3: Network Protocols and Communications CCENT Routing

More information

An Introduction to Design Patterns

An Introduction to Design Patterns An Introduction to Design Patterns 1 Definitions A pattern is a recurring soution to a standard probem, in a context. Christopher Aexander, a professor of architecture Why woud what a prof of architecture

More information

Network Architecture Models

Network Architecture Models School of Business Eastern Illinois University Network Architecture Models (September 8, 2009) Abdou Illia, Fall 2009 Learning Objectives 2 Discuss the OSI reference Model Discuss the Internet Model Compare

More information

International Laboratory Accreditation Cooperation. The ILAC Mutual Recognition Arrangement

International Laboratory Accreditation Cooperation. The ILAC Mutual Recognition Arrangement Internationa Laboratory Accreditation Cooperation The ILAC Mutua Recognition Arrangement Enhancing the acceptance of products and services across nationa borders Removing barriers to goba trade Accreditation

More information

Self-Control Cyclic Access with Time Division - A MAC Proposal for The HFC System

Self-Control Cyclic Access with Time Division - A MAC Proposal for The HFC System Sef-Contro Cycic Access with Time Division - A MAC Proposa for The HFC System S.M. Jiang, Danny H.K. Tsang, Samue T. Chanson Hong Kong University of Science & Technoogy Cear Water Bay, Kowoon, Hong Kong

More information

Communicating over the Network

Communicating over the Network Communicating over the Network Network Fundamentals Chapter 2 Version 4.0 1 Network Structure The elements of communication 3 common elements of communication Message source people/electronic devices need

More information

Introduction to computer networking

Introduction to computer networking edge core Introduction to computer networking Comp Sci 3600 Security Outline edge core 1 2 edge 3 core 4 5 6 The edge core Outline edge core 1 2 edge 3 core 4 5 6 edge core Billions of connected computing

More information

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols Guide to Networking Essentials, 6 th Edition Chapter 5: Network Protocols Objectives Describe the purpose of a network protocol, the layers in the TCP/IP architecture, and the protocols in each TCP/IP

More information

Layering in Networked computing. OSI Model TCP/IP Model Protocols at each layer

Layering in Networked computing. OSI Model TCP/IP Model Protocols at each layer Layering in Networked computing OSI Model TCP/IP Model Protocols at each layer Learning outcomes Understand the need of layering in Networked computing Understand the OSI model and the tcp/ip model Understand

More information

Session 1. Introduction to Computer Communications and Networking. Communication Network. A communication network consists of a set

Session 1. Introduction to Computer Communications and Networking. Communication Network. A communication network consists of a set Session 1 Introduction to Computer Communications and Networking Communication Network A communication network consists of a set of equipment and facilities that provides a service. Same as any utility

More information

CSE120 Principles of Operating Systems. Architecture Support for OS

CSE120 Principles of Operating Systems. Architecture Support for OS CSE120 Principes of Operating Systems Architecture Support for OS Why are you sti here? You shoud run away from my CSE120! 2 CSE 120 Architectura Support Announcement Have you visited the web page? http://cseweb.ucsd.edu/casses/fa18/cse120-a/

More information

Operating Systems. 16. Networking. Paul Krzyzanowski. Rutgers University. Spring /6/ Paul Krzyzanowski

Operating Systems. 16. Networking. Paul Krzyzanowski. Rutgers University. Spring /6/ Paul Krzyzanowski Operating Systems 16. Networking Paul Krzyzanowski Rutgers University Spring 2015 1 Local Area Network (LAN) LAN = communications network Small area (building, set of buildings) Same, sometimes shared,

More information

Lecture 2: Network Protocols and Layering

Lecture 2: Network Protocols and Layering Lecture 2: Network Protocols and Layering Dr. Mohammed Hawa Electrical Engineering Department University of Jordan EE426: Communication Networks What is a Network Protocol? A protocol is the set of rules

More information

BEA WebLogic Server. Release Notes for WebLogic Tuxedo Connector 1.0

BEA WebLogic Server. Release Notes for WebLogic Tuxedo Connector 1.0 BEA WebLogic Server Reease Notes for WebLogic Tuxedo Connector 1.0 BEA WebLogic Tuxedo Connector Reease 1.0 Document Date: June 29, 2001 Copyright Copyright 2001 BEA Systems, Inc. A Rights Reserved. Restricted

More information

LCD Video Controller. LCD Video Controller. Introduction Safety Precautions Indentifying the Components... 5

LCD Video Controller. LCD Video Controller. Introduction Safety Precautions Indentifying the Components... 5 LCD Video Controer LCD Video Controer Introduction... 3 Safety Precautions... 4 Indentifying the Components... 5 Main Board... 5 Main Board ASIC Features... 6 LVDS Transmitter... 8 Backight Inverter...

More information

CS3600 SYSTEMS AND NETWORKS

CS3600 SYSTEMS AND NETWORKS CS3600 SYSTEMS AND NETWORKS NORTHEASTERN UNIVERSITY Lecture 17: Internet architecture Prof. Alan Mislove (amislove@ccs.neu.edu) Slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion

More information

Data & Computer Communication

Data & Computer Communication Basic Networking Concepts A network is a system of computers and other devices (such as printers and modems) that are connected in such a way that they can exchange data. A bridge is a device that connects

More information

Overview of Networks

Overview of Networks CMPT765/408 08-1 Overview of Networks Qianping Gu 1 Overview of Networks This note is mainly based on Chapters 1-2 of High Performance of Communication Networks by J. Walrand and P. Pravin, 2nd ed, and

More information

Four Circuit 4 Wire Unit With Dante Network Audio Interface

Four Circuit 4 Wire Unit With Dante Network Audio Interface Network Audio 4 Wire Interface Four Circuit 4 Wire Unit With Dante Network Audio Interface GS-FW012 ip 4 Wire With Dante Interface Highights Four x 4 Wire Circuits Loca Cue Input Dante Network Audio Three

More information

As Michi Henning and Steve Vinoski showed 1, calling a remote

As Michi Henning and Steve Vinoski showed 1, calling a remote Reducing CORBA Ca Latency by Caching and Prefetching Bernd Brügge and Christoph Vismeier Technische Universität München Method ca atency is a major probem in approaches based on object-oriented middeware

More information

Navigating and searching theweb

Navigating and searching theweb Navigating and searching theweb Contents Introduction 3 1 The Word Wide Web 3 2 Navigating the web 4 3 Hyperinks 5 4 Searching the web 7 5 Improving your searches 8 6 Activities 9 6.1 Navigating the web

More information

Infinity Connect Web App Customization Guide

Infinity Connect Web App Customization Guide Infinity Connect Web App Customization Guide Contents Introduction 1 Hosting the customized Web App 2 Customizing the appication 3 More information 8 Introduction The Infinity Connect Web App is incuded

More information

Intro to Programming & C Why Program? 1.2 Computer Systems: Hardware and Software. Why Learn to Program?

Intro to Programming & C Why Program? 1.2 Computer Systems: Hardware and Software. Why Learn to Program? Intro to Programming & C++ Unit 1 Sections 1.1-3 and 2.1-10, 2.12-13, 2.15-17 CS 1428 Spring 2018 Ji Seaman 1.1 Why Program? Computer programmabe machine designed to foow instructions Program a set of

More information

Avaya Extension to Cellular User Guide Avaya Aura TM Communication Manager Release 5.2.1

Avaya Extension to Cellular User Guide Avaya Aura TM Communication Manager Release 5.2.1 Avaya Extension to Ceuar User Guide Avaya Aura TM Communication Manager Reease 5.2.1 November 2009 2009 Avaya Inc. A Rights Reserved. Notice Whie reasonabe efforts were made to ensure that the information

More information

Lecture 3 Protocol Stacks and Layering

Lecture 3 Protocol Stacks and Layering Lecture 3 Protocol Stacks and ing Hui Zhang School of Computer Science Carnegie Mellon University 15-441 Networking, Fall 2007 http://www.cs.cmu.edu/~srini/15-441/f07/ 1 What is a Communication Network?

More information

CS-461 Internetworking. Dr. Mohamed Aboutabl

CS-461 Internetworking. Dr. Mohamed Aboutabl CS-461 Internetworking Dr. Mohamed Aboutabl http://www.cs.jmu.edu/users/aboutams The McGraw-Hill Companies, Inc., 2000 1 Chapter 1 Introduction The McGraw-Hill Companies, Inc., 2000 2 Internet today Network

More information

Computer Networks (Introduction to TCP/IP Protocols)

Computer Networks (Introduction to TCP/IP Protocols) Network Security(CP33925) Computer Networks (Introduction to TCP/IP Protocols) 부산대학교공과대학정보컴퓨터공학부 Network Type Elements of Protocol OSI Reference Model OSI Layers What we ll learn today 2 Definition of

More information

MCSE Training Guide: Windows Architecture and Memory

MCSE Training Guide: Windows Architecture and Memory MCSE Training Guide: Windows 95 -- Ch 2 -- Architecture and Memory Page 1 of 13 MCSE Training Guide: Windows 95-2 - Architecture and Memory This chapter wi hep you prepare for the exam by covering the

More information

CS 520 Networking in the TCP/IP enviornment

CS 520 Networking in the TCP/IP enviornment CS 520 Networking in the TCP/IP enviornment Instructors: Dr. Esam Alwagait alwagait@ksu.edu.sa Dr. Mishari Almishari mialmishari@ksu.edu.sa Slide Set were original prepared by Dr. Tatsuya Susa Contacts

More information

Module 2 Overview of Computer Networks

Module 2 Overview of Computer Networks Module 2 Overview of Computer Networks Networks and Communication Give me names of all employees Who earn more than $00,000 ISP intranet backbone satellite link desktop computer: server: network link:

More information

Module 2 Overview of. Computer Networks

Module 2 Overview of. Computer Networks Module Overview of Networks and Communication Give me names of all employees Who earn more than $00,000 ISP intranet backbone satellite link desktop computer: server: network link: CS454/654 - Issues How

More information

mobile telephone HD Voice Mobile Telephone GSM Highlights MKII Fully Updated Re-Design HD Voice 7kHz Bandwidth Dante / AES67 Option Highlights GSM

mobile telephone HD Voice Mobile Telephone GSM Highlights MKII Fully Updated Re-Design HD Voice 7kHz Bandwidth Dante / AES67 Option Highlights GSM GS-MPI005HD MKII Broadcaster s Mobie Phone Highights HD Voice 7kHz Bandwidth MKII Fuy Updated Re-Design Coour Touchscreen Handset Interface For Ca Screening Dante / AES67 Option Highights UMTS (3G) Highights

More information

Network Protocols and Architectures

Network Protocols and Architectures Network Protocols and Architectures Introduction 1 What s the Internet: nuts and bolts view Millions of connected computing devices: hosts, end-systems PC s workstations, servers PDA s, phones, toasters

More information

Switching Networks (Fall 2010) EE 586 Communication and. August 27, Lecture 2. (modified by Cheung for EE586; based on K&R original) 1-1

Switching Networks (Fall 2010) EE 586 Communication and. August 27, Lecture 2. (modified by Cheung for EE586; based on K&R original) 1-1 EE 586 Communication and Switching Networks (Fall 2010) Lecture 2 August 27, 2010 (modified by Cheung for EE586; based on K&R original) 1-1 Announcements Read Chapter 1 First homework is due 9/3 In Blackboard

More information

Text Books. What is a network? Classification of Networks. Computer Communication and Networks 9/1/2014

Text Books. What is a network? Classification of Networks. Computer Communication and Networks 9/1/2014 Computer Communication and Networks Text Books 1. Computer Networks, Andrew S Tanenbaum, Fifth edition. 2. Data Communications and Networking, B Forouzan, 3rd edition. 3. Data and Computer Communications,

More information

Design of IP Networks with End-to. to- End Performance Guarantees

Design of IP Networks with End-to. to- End Performance Guarantees Design of IP Networks with End-to to- End Performance Guarantees Irena Atov and Richard J. Harris* ( Swinburne University of Technoogy & *Massey University) Presentation Outine Introduction Mutiservice

More information

Language Identification for Texts Written in Transliteration

Language Identification for Texts Written in Transliteration Language Identification for Texts Written in Transiteration Andrey Chepovskiy, Sergey Gusev, Margarita Kurbatova Higher Schoo of Economics, Data Anaysis and Artificia Inteigence Department, Pokrovskiy

More information

Introduction to Information Science and Technology 2017 Networking I. Sören Schwertfeger 师泽仁

Introduction to Information Science and Technology 2017 Networking I. Sören Schwertfeger 师泽仁 I Sören Schwertfeger 师泽仁 Outline Internet History of the Internet Internet Structure Internet Protocols Network layer details 1. Physical Layer 2. Data Link Layer 3. Network Layer Internet: Huge network

More information

.County of San Mateo

.County of San Mateo -- - -- -- - -- - - --- a - -- w---- a- -- : m- I - -- -- -- --., I -- I.a, e mzzcm.county of San Mateo InterneUIntranet Web Page Design Guideines. September 30,1997 fabe of Corntents Purpose... Approach....

More information