Computer Networks. College of Computing. Copyleft 2003~2018. Prof. Lin Weiguo
|
|
- Mabel Horton
- 6 years ago
- Views:
Transcription
1 Computer Networks
2 Computer Networks Prof. Lin Weiguo Coege of Computing Copyeft 2003~2018
3 Roadmap Introduction Physica Layer Data Link Layer Medium Access Subayer Network Layer Transport Layer Appication Layer 3
4 Chapter 1 Introduction
5 Attention The materias beow are avaiabe for use by others. Instructors are wecome to use them in their own courses, downoad them to their own cass' web site, or modify them to suit. However, you must acknowedge the source of the origina and not attempt to pace your own copyright on this materia. Thanks to: 5
6 Topics 1.1 Uses of computer networks 1.2 Network Hardware 1.3 Network Software 1.4 Reference Modes 1.5 Exampe Networks 1.6 Network Standardization Some of the overa issues we be deaing with in this course. 6
7 A Computer Network Communication Link A coection of computers interconnected by communication inks inwei@cuc.edu.cn 7
8 1.1 Uses of Computer Networks Business Appications Home Appications Mobie Users Socia Issues 8
9 Business Appications Companies have a great number of computers Monitor productions, keep track of inventories, do the payro Those computers may have worked in isoation from the others, but at some point, management may have decided to connect them to be abe to distribute information throughout the company. inwei@cuc.edu.cn 9
10 1 st goa: Resource Sharing The goa is to make a programs, equipment, and especiay data avaiabe to anyone on the network without regard to the physica ocation of the resource and the user. Equipment: Printers, Scanner, CD-Burners Information: Customer records, Product information,inventories, financia statements, tax information inwei@cuc.edu.cn 10
11 Cient machine and Server machine Data A network with two cients and one server. inwei@cuc.edu.cn 11
12 Cient/Server mode The C/S mode is widey used and forms the basis of much network usage. The most popuar reaization is that of a Web appication. The cient/server mode invoves requests and repies. inwei@cuc.edu.cn 12
13 2 nd goa: A Computer network to do with peope A second goa of setting up a computer network has to do with peope rather than information or even computers. A computer network can provide a powerfu communication medium among empoyees. Emai VoIP Videoconferencing Cooperate with other to work: desktop sharing inwei@cuc.edu.cn 13
14 3 rd goa: e-commerce A third goa for many companies is doing business eectronicay with other companies, especiay suppiers and customers. e-commerce B2B: Business to business. B2C: Business to consumer. C2C: Consumer to consumer. inwei@cuc.edu.cn 14
15 Home Appications Access to remote information Web Person-to-person communication Emai,IM, VoIP e-commerce Interactive entertainment IPTV, Gaming 15
16 P2P - Peer to Peer In peer-to-peer system there is no fixed division into cients and servers. inwei@cuc.edu.cn 16
17 Other appications Ubiquitous computing IOT ( Internet of Things) Sensor Networks RFID (Radio Frequency IDentification) inwei@cuc.edu.cn 17
18 Mobie Users Combinations of wireess networks and mobie computing. 18
19 Wearabe Computers 19
20 SoLoMo 20
21 Socia Issues Socia networking issues Empoyee rights vs empoyer rights Government vs citizen Hacker and crimina Copyright protection Again, The Internet addiction? 21
22 1.2 Network Hardware Taxonomy of Networks Persona Networks Loca Area Networks Wide Area Networks Wireess Networks 22
23 Cassifying networks By transmission technoogy By scae 23
24 Transmission technoogy Types of transmission technoogy Broadcast inks Point-to-point inks 24
25 Point-to-point inks Point-to-point inks connect individua pairs of machines. Packets : short messages To go from the source to the destination, a packet on a network made up of point-to-point inks may have to first visit one or more intermediate machines. Often mutipe routes, of different engths, are possibe Unicasting: exacty one sender and one receiver inwei@cuc.edu.cn 25
26 Broadcast Networks Broadcast networks have a singe communication channe that is shared by a the machines on the network. Packets sent by any machine are received by a the others. An address fied within the packet specifies the intended recipient. Upon receiving a packet, a machine checks the address fied. If the packet is intended for the receiving machine, that machine processes the packet; if the packet is intended for some other machine, it is just ignored. inwei@cuc.edu.cn 26
27 Broad/Muti-casting Broadcasting address a packet to a destinations by using a specia code in the address fied. Muticasting Some broadcast systems aso support transmission to a subset of the machines inwei@cuc.edu.cn 27
28 Network Topoogies Think of a topoogy as a network's virtua shape or structure. Router inwei@cuc.edu.cn 28
29 Exampe of a Rea network inwei@cuc.edu.cn 29
30 Cassification by scae. 30
31 PAN (Persona area networks) Buetooth ( IEEE ) inwei@cuc.edu.cn 31
32 Loca Area Networks A LAN is a privatey owned network that operates with in and nearby a singe buiding ike a home, office or factory. LANs are widey used to connect persona computers and consumer eectronics to et them share resources and exchange information. inwei@cuc.edu.cn 32
33 Wireess and wired LANs Wireess and wired LANs. (a) (b) Switched Ethernet. 33
34 WLAN (Wireess LAN) Wireess LAN (Wi-Fi IEEE ) inwei@cuc.edu.cn 34
35 Wired LAN Wired LANs charactoristics Use copper wires, optica fibers Are restricted in size Run at speeds of 10Mbps to 1Gbps Low deay Make very few errors 35
36 Ethernet: IEEE802.3 Ethernet is the most common type of wired LAN Switched Ethernet Each computer speaks the Ethernet protoco and connects to a box caed a switch with a point-to-point ink. A switch has mutipe ports, each of which can connect to one computer. The job of the switch is to reay packets between computers that are attached to it, using the address in each packet to determine which computer to send it to. inwei@cuc.edu.cn 36
37 Expand and divide a LAN Expand a LAN to make it arger Switches can be pugged into each other using their ports Divide one arger physica LAN into smaer ogica LANs. VLAN(virtua LAN) Each switch port is tagged with a coor, the switch then forwards packets so that computers attached to the same coor ports are separated from the others. inwei@cuc.edu.cn 37
38 Cassic Ethernet The origina Ethernet design broadcasts a the packets over a singe inear cabe. At most one machine coud successfuy transmit at a time, and distributed arbitration mechanism was used to resove conficts. Computers coud transmit whenever the cabe was ide If two or more packets coided, each computer just waited a random time and tried ater. inwei@cuc.edu.cn 38
39 Cassic LAN Topoogies Two broadcast networks (a) Bus (IEEE 802.3, Ethernet) (b) Ring (IEEE 802.5, Token Ring) 39
40 Channe Aocation methods for Broadcast networks Static aocation Divide time into discrete intervas and use a round-robin agorithm, aowing each machine to broadcast ony when its time sot comes up. It wastes channe capacity when a machine has nothing to say during its aocated sot, so most systems attempt to aocate the channe dynamicay. Dynamic aocation Centraized: there is a singe entity which determines who goes next. Decentraized : there is no centra entity, each machine must decide for itsef whether to transmit. inwei@cuc.edu.cn 40
41 Metropoitan Area Networks MAN covers a city A metropoitan area network based on cabe TV. inwei@cuc.edu.cn 41
42 Wireess MAN WiMax IEEE
43 Wide Area Networks A WAN spans a arge geographica area, often a country or continent. WAN that connects three branch offices in Austraia inwei@cuc.edu.cn 43
44 Communication subnet Transmission ines copper wire, optica fiber, or even radio inks. Most companies do not have transmission ines ying about, so instead they ease the ines. Switching eements Switches are the speciaized computers caed routers that connect two or more transmission ines Subnet: A coection of routers and communication ines that moved packets from the source host to the destination. inwei@cuc.edu.cn 44
45 Differences between WAN &LAN In WAN, the hosts and subnet are owned and operated by different peope The routers wi usuay connect different kinds of networking technoogy. What is connected to the subnet: Individua computers Coud be entire LANs This is how arger networks are buit from smaer ones 45
46 WAN via the Internet VPN: fexibe but ack contro WAN using a virtua private network. inwei@cuc.edu.cn 46
47 WAN via ISP network The subnet is run by Internet Service Provider WAN using an ISP network. 47
48 WAN Terms Packet / Ce the message is cut into packets before sending Packet-switched / store-and-forward the packet is received at each intermediate router in its entirety, stored there unti the required output ine is free, and then forwarded. Routing agorithm There may be many paths in the network that connect two computers. How the network makes the decision as to which path to use is caed the routing agorithm. inwei@cuc.edu.cn 48
49 Internet Internetworks: Coection of interconnected networks. internet (ower case i) is generic term. Internet (upper case I) is wordwide connection to a kinds of machines. inwei@cuc.edu.cn 49
50 1.3 Network Software Protoco Hierarchies Design Issues for the Layers Connection-Oriented and Connectioness Services Service Primitives The Reationship of Services to Protocos 50
51 Phiosophy of Protoco Hierarchies Layering: To reduce their design compexity, most networks are organized as a stack of ayers or eves, each one buit upon the one beow it. Services: The purpose of each ayer is to offer certain service to the higher ayer, shieding those ayers from the detais of how the offered services are actuay impemented. inwei@cuc.edu.cn 51
52 Layer n Protoco Layer n on one machine carries on a conversation with ayer n on another machine. The rues and conventions used in this conversation are coectivey known as the ayer n protoco. A protoco is an agreement between communicating parties on how communication is to proceed. inwei@cuc.edu.cn 52
53 What Is A Protoco Human protocos: what s the time? How are you doing? I have a question - Specific messages sent - Specific actions taken when messages received, or other events Network protocos: Machines rather than humans A communication activity in Internet governed by protocos Protocos define format, order of messages sent and received among network entities, and actions taken on message transmission and receipt. inwei@cuc.edu.cn 53
54 Protoco Exampe Human Network Heo Heo TCP connection request TCP connection repy Got the time? HTTP request It s 10:30 HTTP response inwei@cuc.edu.cn 54
55 Protoco Hierarchies Virtua communication Peers Physica communication Layers, protocos, and interfaces. 55
56 Hierarchy Exampe Name Address Name Address Post Office Post Office 56
57 Terminoogy Peers The entities comprising the corresponding ayers on different machines are caed peers. The peers may be processes, hardware devices, or even human beings. In other words, it is the peers that communicate by using the protoco. Interface: Between each pair of adjacent ayers is an interface. The interface defines which primitive operations and services the ower ayer makes avaiabe to the upper one. 57
58 KISS principe "Keep It Simpe, Stupid", Important to keep it simpe and cean to reduce compexity. How many ayers? Cean interfaces Important that each ayer perform a specific coection of we-understood functions. inwei@cuc.edu.cn 58
59 Network architecture Network architecture: A set of ayers and protocos. The spec must contain enough information to aow an impementer to write the program or buid the hardware for each ayer so that it wi correcty obey the appropriate protoco. Functiona interfaces and impementation detais are not part of the spec, since that's not visibe outside the machine. It is not even necessary that the interfaces on a machines in a network be the same, provided that each machine can correcty use a the protocos. inwei@cuc.edu.cn 59
60 Protoco stack Protoco stack: A ist of protocos used by a system, one protoco per ayer, is caed a protoco stack. Network architectures, protoco stacks, and the protocos themseves are the principa subjects of this course inwei@cuc.edu.cn 60
61 Anaogy of Protoco Hierarchies Urdu Engish Chinese French The phiosopher-transator-secretary architecture. 61
62 Virtua Communication: Sino-US Tak Xi Jinping meets with Barack Obama. 62
63 Information fow Horizonta Exampe information fow supporting virtua communication in ayer 5. Layer4 thinks "SendtoPeer" rather than CaNextLayerDown". 63
64 Terminoogy Header: Upper ayer puts a header in front of the message to identify the message and passes the resut to ower ayer The header incudes contro information such as sequence numbers to keep the right order. Size of messages There is aways a imit to the size of messages imposed by certain ayer protoco. So incoming messages must be broken into smaer units (packets) in this ayer. inwei@cuc.edu.cn 64
65 An Internet Enveope 65
66 TCP/IP Hierarchies CRC HTTP FTP Data HTTP FTP TCP UDP Appication TCP UDP IP ICMP IGMP ARP Transport Internet IP ICMP IGMP ARP ATM Ethernet Preambe ATM Ethernet 66
67 Software or hardware? Athough this section is caed ' network software, it is worth pointing out that the ower ayers of a protoco hierarchy are frequenty impemented in hardware or firmware. Nevertheess, compex protoco agorithms are invoved, even if they are embedded (in whoe or in part) in hardware. inwei@cuc.edu.cn 67
68 Design Issues for the Layers Reiabiity Network Evoution Resource Location Against Threats 68
69 Reiabiity Reiabiity: Making a network that operates correcty even though it is made up of a coection of components that are themseves unreiabe. Mechanisms: Error detection Find errors in received information. Error correction Fix errors in received information. Routing Find a working path through a network. inwei@cuc.edu.cn 69
70 Network Evoution issue Protoco Layering Support change Addressing or Naming Every ayer needs a mechanism for identifying senders and receivers. Internetworking Different network technoogies often have different imitations. Scaabe Design work we when the network gets arge inwei@cuc.edu.cn 70
71 Resource Location Networks provide a service to hosts from their underying resource, such as the capacity of transmission ines. Statistica mutipexing Share network bandwidth dynamicay Fow contro Keep a fast sender from swamping a sow receiver with data. Congestion Network overoading Quaity of Service Differentia service for rea-time deivery and other. inwei@cuc.edu.cn 71
72 Against Threats Confidentiaity Against eavesdropping Authentication Prevent impersonation Integrity Prevent surreptitious changes to messages 72
73 Connection-Oriented vs. Connectioness Services Layers can offer two different types of service to the ayers above them: Connection-oriented Connectioness 73
74 Connection-oriented service Like the teephone system. The system estabishes a connection, uses it, and coses it. Acts ike a tube(circuit). Data comes out the other end in the same order as it goes in. Connection Setup (negotiation) Data Transfer Connection Termination inwei@cuc.edu.cn 74
75 Connectioness service Like the posta system. Each message carries the fu destination address and each one is routed through the intermediate nodes inside the system independent of a the subsequent messages. It is possibe that the first one sent can be deayed so that the subsequent messages arrive first. Message has a name: a packet in network ayer Store-and-forward switching vs. cut-through switching. inwei@cuc.edu.cn 75
76 Quaity of service Each service can be characterized by a QoS: Reiabiity: Wi the message arrive? A reiabe service is impemented by acknowedgement (a receipt from the receiver). Deay (Latency) Deays and overhead are introduced in the ack process inwei@cuc.edu.cn 76
77 Reiabe connection-oriented service A reiabe connection-oriented service guarantees success. They never ose data. Message sequence - message boundaries and order are maintained. Byte streams - messages are broken up or combined; fow is bytes. Can pair mechanism with upper-ayer requirements. A typica situation in which a reiabe connectionoriented service is appropriate is fie transfer. inwei@cuc.edu.cn 77
78 Unreiabe Connectioness Service Connectioness Service /Datagram Service: For some appications, the transit deay introduced by acks are unacceptabe. Like Voice Over IP. Not a appications require connections. Like junk mai. It's not worth the cost to determine if it actuay arrived. Needs a high probabiity of arriva, but 100% not required. Connectioness, no acknowedgment. Acknowedged datagram service: As above, but improved reiabiity via acknowedgment. Request-repy service: Acknowedgment is in the form of a repy. inwei@cuc.edu.cn 78
79 Connection-Oriented and Connectioness Services Six different types of service. 79
80 Service Primitives A service is formay specified by a set of primitives (operations) avaiabe to a user process to access the service. These primitives te the service to perform some action or report on an action taken by a peer entity. If the protoco stack is ocated in the operating system, as it often is, the primitives are normay system cas inwei@cuc.edu.cn 80
81 Service Primitives Five service primitives for impementing a simpe connection-oriented service. inwei@cuc.edu.cn 81
82 Service Primitives Packets sent in a simpe cient-server interaction on a connection-oriented network.( but ife is not so simpe) inwei@cuc.edu.cn 82
83 Services to Protocos Reationship A service is a set of primitives (operations) that a ayer provides to the ayer above it. The service defines what operations the ayer is prepared to perform on behaf of its users, but it says nothing at a about how these operations are impemented. A protoco, in contrast, is a set of rues governing the format and meaning of the packets, or messages that are exchanged by the peer entities within a ayer. Entities use protocos to impement their service definitions. inwei@cuc.edu.cn 83
84 Layer K: a service and a protoco. In other words, services reate to the interfaces between ayers. In contrast, protocos reate to the packets sent between peer entities on different machines. inwei@cuc.edu.cn 84
85 1.4 Reference Modes The OSI Reference Mode The TCP/IP Reference Mode The Mode used in this course A Comparison of the OSI and TCP/IP A Critique of the OSI Mode and Protocos A Critique of the TCP/IP Reference Mode inwei@cuc.edu.cn 85
86 OSI vs. TCP/IP reference mode The protocos associated with the OSI(Open System Interconnect) mode are rarey used any more, the mode itsef is actuay quite genera and sti vaid, and the features discussed at each ayer are sti very important. The TCP/IP mode has the opposite properties: the mode itsef is not of much use but the protocos are widey used. 86
87 The OSI Reference Mode Deveoped by ISO: Internationa Standards Organization (1983,revised in 1995) Principes used to deveop OSI Layering: 1. Need a ayer for each different eve of abstraction. 2. Each ayer performs a we defined function. 3. Each ayer shoud be standardizabe. 4. Layer boundaries shoud minimize data fow across those boundaries. 5. The right number of ayers - don't put too many functions together, but not too many ayers either. inwei@cuc.edu.cn 87
88 The OSI Reference Mode The OSI reference mode. 1983,
89 Physica Layer Purpose Transmits raw bits across a medium. Concerns are Votage: how many vots for 1 / 0 Timing: how many ns a bit asts Dupexing: transmission in both directions? Connectors: how many pins? What is each pin? etc. inwei@cuc.edu.cn 89
90 Data Link Layer Purpose: Transform a raw transmission ine into a ine that appears free of undetected transmission errors to the networks ayer Concerns: Framing - Breaks apart input data into frames and transmit the frames sequentiay. Error handing if the service is reiabe, the receiver confirms correct receipt of each frame by sending back an acknowedgement frame. Fow contro - keeps a fast transmitter from drowning a sow receiver in data. Medium Access Contro how to contro access to the shared channe for broadcast networks. inwei@cuc.edu.cn 90
91 Network Layer Purpose Route packets from source to destination Concerns Routing - What path is foowed by packets from source to destination. Can be based on a static tabe, can be determined when the connection is created, or can be highy dynamic, being determined anew for each packet, to refect the current network oad. Congestion - Contros the number packets in the subnet. Qos Quaity of service provided(deay, transit time, jitter ) Heterogeneity - Interfacing so one type of network can tak to another. Addressing, packet size, protocos inwei@cuc.edu.cn 91
92 Transport Layer Purpose Accept data from above it, spit it up into smaer units if need be, pass them to network ayer, and ensure that the pieces a arrive correcty at the other end. Concerns Service Decisions - What type of service to provide; error-free point to point, datagram, etc. End-to-end: it carries data a the way from the source to the destination. Reiabiity - Ensures that packets arrive at their destination. Reassembes out of order messages. Hides network - Aows detais of the network to be hidden from higher eve ayers. Mapping - Determines which messages beong to which connections. Fow contro - keeps a fast transmitter from fooding a sow receiver. inwei@cuc.edu.cn 92
93 Session Layer Purpose Aow users on different machines to estabish sessions between them Concerns Diaog contro - keep track of whose turn it is to transmit Token Management prevent two parties from attempting the same critica operation at the same time Synchronization checkpointing ong transmissions to aow them to pick up from where they eft off in the event of a crash and subsequent recovery. inwei@cuc.edu.cn 93
94 Presentation Layer Purpose Make it possibe for computers with different data representations to communicate Concerns Syntax and semantics of information transmitted. Understands the nature of the data being transmitted. Converts ASCII/EBCDIC, big endian/itte endian 94
95 Appication Layer contains a variety of protocos that are commony needed by users. HTTP FTP SMTP inwei@cuc.edu.cn 95
96 The TCP/IP Reference Modes Link ayer Internet ayer Transport ayer Appication ayer 96
97 U.S. DoD ARPANET Was a research network sponsored by the DoD Network be abe to survive oss of subnet hardware, with existing conversations not being broken off. A fexibe architecture was needed since appications with divergent requirements were envisioned, ranging from transferring fies to reatime speech transmission inwei@cuc.edu.cn 97
98 The TCP/IP Reference Modes The TCP/IP reference mode (Cerf & Kahn1974, Cark 1988) 98
99 The Key a packet-switching network based on a connectioness ayer that runs across different networks. inwei@cuc.edu.cn 99
100 Link Layer Describes what ink such as seria ines and cassic Ethernet must do to meet the needs of the connectioness internet ayer. It is not reay a ayer at a, in the norma sense of the term, but rather an interface between hosts and transmission inks. inwei@cuc.edu.cn 100
101 The Internet Layer Permit hosts to inject packets into any network and have them trave independenty to the destination ( potentiay on a different network, ike internationa mai) Routing and Congestion contro IP (Internet Protoco) ICMP(Internet Contro Message Protoco) inwei@cuc.edu.cn 101
102 Transport Layer End2End: Aows peer entities to communicate. TCP - Transmission Contro Protoco provides a reiabe connection oriented protoco that deivers a byte stream from one node to another. Guarantees deivery and provides fow contro. UDP - User Datagram Protoco provides an unreiabe connection-ess protoco for appications that provide their own. inwei@cuc.edu.cn 102
103 Appication Layer Termina - Tenet Fie transfer FTP The Web - HTTP inwei@cuc.edu.cn 103
104 The TCP/IP Reference Modes The TCP/IP reference mode with some protocos we wi study 104
105 The mode used in this course The reference mode used in this course. 105
106 Comparing OSI and TCP/IP Modes Concepts centra to the OSI mode Services Interfaces Protocos OSI has good definition of service, interface, and protoco as discussed before. Fits we with object oriented programming concepts. Protocos are better hidden. 106
107 Comparing OSI and TCP/IP Modes The TCP/IP mode did not originay distinguish between service, interface, and protoco. With TCP/IP, the protocos came first; mode was just a description of the protocos. But then the mode isn't good for any other protocos. inwei@cuc.edu.cn 107
108 Different phiosophy Which is first? Reference Mode vs Corresponding protocos 108
109 Specific differences Number of ayers: 7 vs. 4 Connectioness vs. connection-oriented OSI supports both in the network ayer, but ony Connection-oriented communication in the transport ayer TCP/IP supports ony connectioness mode in the network ayer but supports both in the transport ayer, giving the users a choice. inwei@cuc.edu.cn 109
110 A Critique of the OSI Mode and Protocos Why OSI did not take over the word Bad timing Bad technoogy Fawed, too compex More poitica than technica of 7 ayers decision Bad impementations Huge, unwiedy, Poor quaity Bad poitics Academia vs Bureaucrats inwei@cuc.edu.cn 110
111 Bad Timing The apocaypse of the two eephants. 111
112 A Critique of the TCP/IP Reference Mode Service, interface, and protoco not distinguished Not a genera mode Link ayer not reay a ayer No mention of physica and data ink ayers Minor protocos deepy entrenched, hard to repace inwei@cuc.edu.cn 112
113 1.5 Exampe Networks The Internet 3G Mobie Phone Networks Wireess LANs: RFID and Sensor networks 113
114 The history The story begins in the ate 1950s. At the height of the Cod War, the DoD wanted a command-and-contro network that coud survive a nucear war. This eads to the ARPANET: 1968 Originay intended as reiabe network, with mutipe routing. Used TCP/IP precursor, which got buit into eary UNIX. (ARPA, the Advanced Research Projects Agency ) inwei@cuc.edu.cn 114
115 The ARPANET (a) Structure of the teephone system. (b) Baran s proposed distributed switching system. inwei@cuc.edu.cn 115
116 The ARPANET (2) The origina ARPANET design. IMPs (Interface Message Processors) 116
117 The ARPANET (3) NAP (Network Access Point). Growth of the ARPANET (a) December (b) Juy (c) March (d) Apri (e) September
118 NSFNET The NSFNET backbone in
119 NSFNET Late 1970s - Many other foks wanted to get on the net, but Arpanet was essentiay imited to miitary contractors. NSF set up another network to hande this need. Started at 448 Kbps and by 80's upgraded to 1.5 Mbps Formed ANS (Advanced Networks and Services) - MERIT, MCI, IBM took over from the government running at 45 Mbps ANSNET sod to AOL, who now runs it. inwei@cuc.edu.cn 119
120 Internet Usage Growing exponentiay. A nodes run TCP/IP. Means that a nodes have an IP address by which they can be contacted. Traditiona appications ( ) E-mai News Remote ogin Fie transfer inwei@cuc.edu.cn 120
121 Internet Usage 1990s : the WWW (Word Wide Web) invented by CERN physicist Tim Berners-Lee Together with the Mosaic browser Written by Marc Andreessen at the Nationa Center for Supercomputer Appications in Urbana, Iinois ISPs (Internet Service Providers) Offer individua users at home the abiity to ca up one of their machines and connect to the Internet inwei@cuc.edu.cn 121
122 Architecture of the Internet Overview of the Internet architecture 122
123 3G Mobie Phone Networks Ceuar design of mobie phone networks 123
124 3G Mobie Phone Networks Architecture of the UMTS 3G mobie phone network. 124
125 3G Mobie Phone Networks Mobie phone handover (a) before, (b) after. 125
126 Wireess LANs - WiFi (802.11) (a) Wireess networking with a base station. (b) Ad hoc networking. inwei@cuc.edu.cn 126
127 Wireess LANs: Mutipath fading 127
128 Wireess LANs: The range of a singe radio may not cover the entire system. inwei@cuc.edu.cn 128
129 Wireess LANs standards The deveopment of the standard : 1Mbps, 2Mbps (2.4 GHz) a-1999: 54Mbps (5 GHz band) b-1999:11Mbps(2.4 GHz) g-2003: 54Mbps (2.4 GHz) n-2009:upto 600Mbps (operates on both the 2.4 GHz and the esser used 5 GHz bands) ac-2012:upto 1Gbps(5GHz) inwei@cuc.edu.cn 129
130 RFID and Sensor Networks RFID used to network everyday objects. 130
131 RFID and Sensor Networks Mutihop topoogy of a sensor network inwei@cuc.edu.cn 131
132 1.6 Network Standardization Who s Who in the Teecommunications Word Who s Who in the Internationa Standards Word Who s Who in the Internet Standards Word De facto and De jure inwei@cuc.edu.cn 132
133 ITU (Internationa Teecommunication Union) Main sectors ITU-R: Radio communications ITU-T: Teecommunications Standardization ITU-D: Deveopment Casses of Members Nationa governments Sector members Associate members Reguatory agencies 133
134 Network Standardization ISO (Internationa Standards Organization) ANSI (American Nationa Standards Institute) NIST (Nationa Institute of Standards and Technoogy) IEEE (Institute of Eectrica and Eectronics Engineering) 134
135 IEEE 802 Standards The 802 working groups. The important ones are marked with *. The ones marked with are hibernating. The one marked with gave up and disbanded itsef. 135
136 IEEE 802 Standards 136
137 Internet standards Internet Architecture Board. IETF: Internet Engineering Task Force RFC: Request for comments IRTF (Internet Research Task Force) Internet Society 137
138 END OF CH-1 138
Computer Networks. College of Computing. Copyleft 2003~2018
Computer Networks Computer Networks Prof. Lin Weiguo Coege of Computing Copyeft 2003~2018 inwei@cuc.edu.cn http://icourse.cuc.edu.cn/computernetworks/ http://tc.cuc.edu.cn Attention The materias beow are
More informationReference Models. 7.3 A Comparison of the OSI and TCP/IP Reference Models
Reference Models Contains 7.1 The OSI Reference Model 7.1.1 The Physical Layer 7.1.2 The Data Link Layer 7.1.3 The Network Layer 7.1.4 The Transport Layer 7.1.5 The Session Layer 7.1.6 The Presentation
More informationReview of Lecture 1. EEC-484/584 Computer Networks. Network Hardware. Outline. Lecture 2. Wenbing Zhao
EEC-484/584 Computer Networks Lecture 2 Review of Lecture 1 Uses of computer networks Network Hardware 3 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and
More informationHour 3: The Network Access Layer Page 1 of 10. Discuss how TCP/IP s Network Access layer relates to the OSI networking model
Hour 3: The Network Access Layer Page 1 of 10 Hour 3: The Network Access Layer At the base of the TCP/IP protoco stack is the Network Access ayer, the coection of services and specifications that provide
More informationIntroduction to USB Development
Introduction to USB Deveopment Introduction Technica Overview USB in Embedded Systems Recent Deveopments Extensions to USB USB as compared to other technoogies USB: Universa Seria Bus A seria bus standard
More informationThe Internet and the web
The Internet and the web Contents Introduction 3 1 The Internet at home 4 2 Loca Area Networks sma office/home office 5 3 Loca Area Networks business 6 4 Wide Area Networks 8 5 Wireess networks 9 6 Mobie
More informationNo connection establishment Do not perform Flow control Error control Retransmission Suitable for small request/response scenario E.g.
UDP & TCP 2018/3/26 UDP Header Characteristics of UDP No connection estabishment Do not perform Fow contro Error contro Retransmission Suitabe for sma request/response scenario E.g., DNS Remote Procedure
More informationComputer Networks. College of Computing. Copyleft 2003~2018
Computer Networks Prof. Lin Weiguo Coege of Computing Copyeft 2003~2018 inwei@cuc.edu.cn http://icourse.cuc.edu.cn/computernetworks/ http://tc.cuc.edu.cn Internet Contro Message Protoco (ICMP), RFC 792
More informationngenius Instrumentation Overview
ngenius Instrumentation Overview NetScout Systems, Inc. 4 Technoogy Park Drive Westford, MA 01886 Teephone: 978-614-4000 Fax: 978-614-4004 Web: http://www.netscout.com NetScout is a registered trademark
More informationECE544: Communication Networks-II, Spring Transport Layer Protocols Sumathi Gopal March 31 st 2006
ECE544: Communication Networks-II, Spring 2006 Transport Layer Protocos Sumathi Gopa March 31 st 2006 Lecture Outine Introduction to end-to-end protocos UDP RTP TCP Programming detais 2 End-To-End Protocos
More informationChapter 1. Introduction
Chapter 1 Introduction Uses of Computer Networks Business Applications Home Applications Mobile Users Social Issues Business Applications of Networks A network with two clients and one server. Business
More informationEEC-484/584 Computer Networks
EEC-484/584 Computer Networks Lecture 2 Wenbing Zhao wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Misc. Interested in research? Secure
More informationLink Registry Protocol Options
Link Registry Protoco Options Norman Finn, March 2017 HUAWEI TECHNOLOGIES CO., LTD. IEEE 802.1 TSN At east two obvious choices for P802.1CS Link Registration Protoco An IS-IS-ike protoco. TCP (Transmission
More informationNeed For Protocol Architecture
Chapter 2 CS420/520 Axel Krings Page 1 Need For Protocol Architecture E.g. File transfer Source must activate communications path or inform network of destination Source must check destination is prepared
More informationOverview of Network Software. CS158a Chris Pollett Jan 31, 2007.
Overview of Network Software CS158a Chris Pollett Jan 31, 2007. Outline Design Issues for Protocol Hierarchies Reference Models Example Networks Protocol Hierarchies-Review To reduce design complexity
More informationNeed For Protocol Architecture
Chapter 2 CS420/520 Axel Krings Page 1 Need For Protocol Architecture E.g. File transfer Source must activate communications path or inform network of destination Source must check destination is prepared
More informationChapter 1. Introduction
Chapter 1 Introduction Computer Networks The old model of a single computer serving all of the organization s computational needs has been replace by one in which a large number of separate but interconnected
More informationRDF Objects 1. Alex Barnell Information Infrastructure Laboratory HP Laboratories Bristol HPL November 27 th, 2002*
RDF Objects 1 Aex Barne Information Infrastructure Laboratory HP Laboratories Bristo HPL-2002-315 November 27 th, 2002* E-mai: Andy_Seaborne@hp.hp.com RDF, semantic web, ontoogy, object-oriented datastructures
More informationCOS 140: Foundations of Computer Science
COS 140: Foundations of C Networks Fall 2017 Copyright c 2002 2017 UMaine School of Computing and Information S 1 / 21 Homework, announcements New chapter (23) online No homework assigned today, sorry!
More informationCSE120 Principles of Operating Systems. Prof Yuanyuan (YY) Zhou Scheduling
CSE120 Principes of Operating Systems Prof Yuanyuan (YY) Zhou Scheduing Announcement Homework 2 due on October 25th Project 1 due on October 26th 2 CSE 120 Scheduing and Deadock Scheduing Overview In discussing
More informationAnnouncements. Program #2 regrades requests due by 11:00 today HW #2 was collected at the start of class Reading
Announcements Program #2 regrades requests due by 11:00 today HW #2 was coected at the start of cass Reading Today: 6.3-6.4 Thursday: 3.1 CMSC 417 - F97 (ect 16) copyright 1997 Jeffrey K. Hoingsworth 1
More informationChapter 1. Uses of Computer Networks Network Hardware Network Software Reference Models Example Networks Network Standardization. Revised: August 2011
Introduction ti Chapter 1 Uses of Computer Networks Network Hardware Network Software Reference Models Example Networks Network Standardization Metric Units Revised: August 2011 Uses of Computer Networks
More informationData and Computer Communications. Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications
Data and Computer Communications Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based s 1 Need For Protocol Architecture data exchange can involve complex procedures better if task broken into subtasks
More informationAn Adaptive Two-Copy Delayed SR-ARQ for Satellite Channels with Shadowing
An Adaptive Two-Copy Deayed SR-ARQ for Sateite Channes with Shadowing Jing Zhu, Sumit Roy zhuj@ee.washington.edu Department of Eectrica Engineering, University of Washington Abstract- The paper focuses
More informationAuthorization of a QoS Path based on Generic AAA. Leon Gommans, Cees de Laat, Bas van Oudenaarde, Arie Taal
Abstract Authorization of a QoS Path based on Generic Leon Gommans, Cees de Laat, Bas van Oudenaarde, Arie Taa Advanced Internet Research Group, Department of Computer Science, University of Amsterdam.
More informationComputer Networks 1 (Mạng Máy Tính 1) Lectured by: Nguyễn Đức Thái
Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Nguyễn Đức Thái Course details Number of credits: 4 Study time allocation per week: 3 lecture hours for theory 2 lecture hours for exercises and lab work
More informationInside TCP/IP, Third Edition Network Support for TCP/IP
Inside TCP/IP, Third Edition -- Ch 3 -- Network Support for TCP/IP Page 1 of 47 Inside TCP/IP, Third Edition - 3 - Network Support for TCP/IP One of the reasons for the popuarity of TCP/IP networks is
More informationLecture-4. TCP/IP-Overview:
Lecture-4 TCP/IP-Overview: The history goes back to ARPANET a research network sponsored by DoD US Govt. It eventually connected hundreds of universities and govt installations, using leased telephone
More informationThe 3ISYS-ETHG-4C4FC is managed redundant ring Ethernet switch. with 4x10/100/1000Base-T(X) and 4xGigabit Combo ports. With
PRODUCT OVERVIEW The 3ISYS-ETHG-4C4FC is managed redundant ring Ethernet switch with 4x10/100/1000Base-T(X) and 4xGigabit Combo ports. With compete support of Ethernet redundancy protoco, SYS-Ring (recovery
More informationTD-SCDMA Physical Layer Design Overview
TD-SCDMA Layer Design Overview Author Information Coege: Information Security Engineering Coege Cass: F0503602 Name: SHI Junxiao Instructor: WU Yue Instructor's coege: Information Security Engineering
More informationComputer Communication and Networks
Computer Communication and Networks Text Books 1. Computer Networks, Andrew S Tanenbaum, Fifth edition. 2. Data Communications and Networking, B Forouzan, 3rd edition. 3. Data and Computer Communications,
More informationKing Fahd University of Petroleum & Minerals Computer Engineering g Dept
King Fahd University of Petroleum & Minerals Computer Engineering g Dept COE 540 Computer Networks Term 121 Dr. Ashraf S. Hasan Mahmoud Rm 22-420 Ext. 1724 Email: ashraf@kfupm.edu.sa 9/1/2012 Dr. Ashraf
More informationSpecial Edition Using Microsoft Excel Selecting and Naming Cells and Ranges
Specia Edition Using Microsoft Exce 2000 - Lesson 3 - Seecting and Naming Ces and.. Page 1 of 8 [Figures are not incuded in this sampe chapter] Specia Edition Using Microsoft Exce 2000-3 - Seecting and
More informationWindows NT, Terminal Server and Citrix MetaFrame Terminal Server Architecture
Windows NT, Termina Server and Citrix MetaFrame - CH 3 - Termina Server Architect.. Page 1 of 13 [Figures are not incuded in this sampe chapter] Windows NT, Termina Server and Citrix MetaFrame - 3 - Termina
More informationComputing devices have become increasingly mobile at the client end, and the
Pronto: Mobie Gateway With Pubish- Subscribe Paradigm Over Wireess Network Eiko Yoneki University of Cambridge Pronto, a messaging middeware system for mobie appications, provides both centraized and decentraized
More informationECE 650 Systems Programming & Engineering. Spring 2018
ECE 650 Systems Programming & Engineering Spring 2018 Networking Introduction Tyler Bletsch Duke University Slides are adapted from Brian Rogers (Duke) Computer Networking A background of important areas
More informationNetworking Applications
Networking Dr. Ayman A. Abdel-Hamid College of Computing and Information Technology Arab Academy for Science & Technology and Maritime Transport 1 Outline Internet Layers Internet Data Packet transmission
More informationCHAPTER -1. Introduction to Computer Networks
CHAPTER -1 Introduction to Computer Networks PRELIMINARY DEFINITIONS computer network :: [Tanenbaum] a collection of autonomous computers interconnected by a single technology. communications network ::a
More informationInternet 최양희서울대학교컴퓨터공학부. MMlab 1
Internet 최양희서울대학교컴퓨터공학부 MMlab 1 Internet Timeline 3000 BC : Abacus 1642 : Pascal : numerical wheel calculator 1822 : Babbage : difference engine 1945 : Eckert : ENIAC 1969 : first ARPANET connection UCLA,
More informationService Scheduling for General Packet Radio Service Classes
Service Scheduing for Genera Packet Radio Service Casses Qixiang Pang, Amir Bigoo, Victor C. M. Leung, Chris Schoefied Department of Eectrica and Computer Engineering, University of British Coumbia, Vancouver,
More informationCSE120 Principles of Operating Systems. Prof Yuanyuan (YY) Zhou Advanced Memory Management
CSE120 Principes of Operating Systems Prof Yuanyuan (YY) Zhou Advanced Memory Management Advanced Functionaity Now we re going to ook at some advanced functionaity that the OS can provide appications using
More informationNetwork and Mobile Compu4ng in the 20 th Century and Beyond. COMP 1400 Memorial University Winter 2015
Network and Mobile Compu4ng in the 20 th Century and Beyond COMP 1400 Memorial University Winter 2015 What s the Internet: nuts and bolts view PC server wireless laptop smartphone wireless links wired
More informationfile://j:\macmillancomputerpublishing\chapters\in073.html 3/22/01
Page 1 of 15 Chapter 9 Chapter 9: Deveoping the Logica Data Mode The information requirements and business rues provide the information to produce the entities, attributes, and reationships in ogica mode.
More informationChapter 1: Introduction
EE4272: Computer Networks Chapter 1: Introduction Instructor: Tricia Chigan Dept.: Elec. & Comp. Eng. 1) Data Communications: Deals with the transmission of signals in a reliable & efficient manner. Topics:
More informationData and Computer Communications
Data and Computer Communications Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications Eighth Edition by William Stallings Chap2: 1 Need For Protocol Architecture data exchange can involve
More informationGuide to Networking Essentials, 6 th Edition. Chapter 6: Network Reference Models and Standards
Guide to Networking Essentials, 6 th Edition Chapter 6: Network Reference Models and Standards Objectives Explain the OSI reference model layers and their relationship to hardware and software Explain
More informationCS 428/528 Computer Networks Lecture 01. Yan Wang
1 CS 428/528 Computer Lecture 01 Yan Wang 2 Motivation: Why bother? Explosive growth of networks 1989, 100,000 hosts on the Internet Distributed Applications and Systems E-mail, WWW, multimedia, distributed
More informationModelling and Performance Evaluation of Router Transparent Web cache Mode
Emad Hassan A-Hemiary IJCSET Juy 2012 Vo 2, Issue 7,1316-1320 Modeing and Performance Evauation of Transparent cache Mode Emad Hassan A-Hemiary Network Engineering Department, Coege of Information Engineering,
More informationLayered Architecture
1 Layered Architecture Required reading: Kurose 1.7 CSE 4213, Fall 2006 Instructor: N. Vlajic Protocols and Standards 2 Entity any device capable of sending and receiving information over the Internet
More information2. A collection of interconnected networks is called an internetwork. 3. Each machine is connected to a central hub with a point-to-point connection.
نموذج أسئلة اختبار النهائي عام 2017 الفصل الدراسي الثاني لمقرر شبكات الحاسب CHOSE 1. channel spectrum divided into frequency bands "FDMA" 2. A collection of interconnected networks is called an internetwork
More informationAd Hoc Networks 11 (2013) Contents lists available at SciVerse ScienceDirect. Ad Hoc Networks
Ad Hoc Networks (3) 683 698 Contents ists avaiabe at SciVerse ScienceDirect Ad Hoc Networks journa homepage: www.esevier.com/ocate/adhoc Dynamic agent-based hierarchica muticast for wireess mesh networks
More informationNearest Neighbor Learning
Nearest Neighbor Learning Cassify based on oca simiarity Ranges from simpe nearest neighbor to case-based and anaogica reasoning Use oca information near the current query instance to decide the cassification
More informationDevelopment of a National Portal for Tuvalu. Business Case. SPREP Pacific iclim
Deveopment of a Nationa Porta for Tuvau Business Case SPREP Pacific iclim Apri 2018 Tabe of Contents 1. Introduction... 3 1.1 Report Purpose... 3 1.2 Background & Context... 3 1.3 Other IKM Activities
More informationComputer Communication & Networks / Data Communication & Computer Networks Week # 03
Computer Communication & Networks / Data Communication & Computer Networks Week # 03 M.Nadeem Akhtar CS & IT Department The University of Lahore Email: nadeem.akhtar@cs.uol.edu.pk URL-https://sites.google.com/site/nadeemuolcsccn/home
More informationFCM 742 Network Security
FCM 742 Network Security Prof. Ping Ji Spring 2016 Computer Networks Overview Modified from sides provided by Prof. Jim Kurose Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge v end systems,
More informationNCH Software Express Delegate
NCH Software Express Deegate This user guide has been created for use with Express Deegate Version 4.xx NCH Software Technica Support If you have difficuties using Express Deegate pease read the appicabe
More informationIntroduction. Communication
Introduction These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang's courses at GMU can make a single machine-readable copy and print a single copy of each
More informationComputer Network : Lecture Notes Nepal Engineering College Compiled by: Junior Professor: Daya Ram Budhathoki Nepal Engineering college, Changunarayan
Computer Network : Lecture Notes Nepal Engineering College Compiled by: Junior Professor: Daya Ram Budhathoki Nepal Engineering college, Changunarayan Chapter3: OSI Reference Model: Network Software: Network
More information03 The Internet Model and TCP/IP
SE 4C03 Winter 2003 03 The Internet Model and TCP/IP Instructor: W. M. Farmer Revised: 16 January 2003 1 The OSI Model In 1977 the International Standards Organization (ISO) offered the Open Systems Interconnection
More informationTopology-aware Key Management Schemes for Wireless Multicast
Topoogy-aware Key Management Schemes for Wireess Muticast Yan Sun, Wade Trappe,andK.J.RayLiu Department of Eectrica and Computer Engineering, University of Maryand, Coege Park Emai: ysun, kjriu@gue.umd.edu
More informationBridge Talk Release Notes for Meeting Exchange 5.0
Bridge Tak Reease Notes for Meeting Exchange 5.0 This document ists new product features, issues resoved since the previous reease, and current operationa issues. New Features This section provides a brief
More informationChapter 3: Network Protocols and Communications CCENT Routing and Switching Introduction to Networks v6.0 Instructor Planning Guide
Chapter 3: Network Protocols and Communications CCENT Routing and Switching Introduction to Networks v6.0 Instructor Planning Guide CCNET v6 1 Chapter 3: Network Protocols and Communications CCENT Routing
More informationAn Introduction to Design Patterns
An Introduction to Design Patterns 1 Definitions A pattern is a recurring soution to a standard probem, in a context. Christopher Aexander, a professor of architecture Why woud what a prof of architecture
More informationNetwork Architecture Models
School of Business Eastern Illinois University Network Architecture Models (September 8, 2009) Abdou Illia, Fall 2009 Learning Objectives 2 Discuss the OSI reference Model Discuss the Internet Model Compare
More informationInternational Laboratory Accreditation Cooperation. The ILAC Mutual Recognition Arrangement
Internationa Laboratory Accreditation Cooperation The ILAC Mutua Recognition Arrangement Enhancing the acceptance of products and services across nationa borders Removing barriers to goba trade Accreditation
More informationSelf-Control Cyclic Access with Time Division - A MAC Proposal for The HFC System
Sef-Contro Cycic Access with Time Division - A MAC Proposa for The HFC System S.M. Jiang, Danny H.K. Tsang, Samue T. Chanson Hong Kong University of Science & Technoogy Cear Water Bay, Kowoon, Hong Kong
More informationCommunicating over the Network
Communicating over the Network Network Fundamentals Chapter 2 Version 4.0 1 Network Structure The elements of communication 3 common elements of communication Message source people/electronic devices need
More informationIntroduction to computer networking
edge core Introduction to computer networking Comp Sci 3600 Security Outline edge core 1 2 edge 3 core 4 5 6 The edge core Outline edge core 1 2 edge 3 core 4 5 6 edge core Billions of connected computing
More informationGuide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols
Guide to Networking Essentials, 6 th Edition Chapter 5: Network Protocols Objectives Describe the purpose of a network protocol, the layers in the TCP/IP architecture, and the protocols in each TCP/IP
More informationLayering in Networked computing. OSI Model TCP/IP Model Protocols at each layer
Layering in Networked computing OSI Model TCP/IP Model Protocols at each layer Learning outcomes Understand the need of layering in Networked computing Understand the OSI model and the tcp/ip model Understand
More informationSession 1. Introduction to Computer Communications and Networking. Communication Network. A communication network consists of a set
Session 1 Introduction to Computer Communications and Networking Communication Network A communication network consists of a set of equipment and facilities that provides a service. Same as any utility
More informationCSE120 Principles of Operating Systems. Architecture Support for OS
CSE120 Principes of Operating Systems Architecture Support for OS Why are you sti here? You shoud run away from my CSE120! 2 CSE 120 Architectura Support Announcement Have you visited the web page? http://cseweb.ucsd.edu/casses/fa18/cse120-a/
More informationOperating Systems. 16. Networking. Paul Krzyzanowski. Rutgers University. Spring /6/ Paul Krzyzanowski
Operating Systems 16. Networking Paul Krzyzanowski Rutgers University Spring 2015 1 Local Area Network (LAN) LAN = communications network Small area (building, set of buildings) Same, sometimes shared,
More informationLecture 2: Network Protocols and Layering
Lecture 2: Network Protocols and Layering Dr. Mohammed Hawa Electrical Engineering Department University of Jordan EE426: Communication Networks What is a Network Protocol? A protocol is the set of rules
More informationBEA WebLogic Server. Release Notes for WebLogic Tuxedo Connector 1.0
BEA WebLogic Server Reease Notes for WebLogic Tuxedo Connector 1.0 BEA WebLogic Tuxedo Connector Reease 1.0 Document Date: June 29, 2001 Copyright Copyright 2001 BEA Systems, Inc. A Rights Reserved. Restricted
More informationLCD Video Controller. LCD Video Controller. Introduction Safety Precautions Indentifying the Components... 5
LCD Video Controer LCD Video Controer Introduction... 3 Safety Precautions... 4 Indentifying the Components... 5 Main Board... 5 Main Board ASIC Features... 6 LVDS Transmitter... 8 Backight Inverter...
More informationCS3600 SYSTEMS AND NETWORKS
CS3600 SYSTEMS AND NETWORKS NORTHEASTERN UNIVERSITY Lecture 17: Internet architecture Prof. Alan Mislove (amislove@ccs.neu.edu) Slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion
More informationData & Computer Communication
Basic Networking Concepts A network is a system of computers and other devices (such as printers and modems) that are connected in such a way that they can exchange data. A bridge is a device that connects
More informationOverview of Networks
CMPT765/408 08-1 Overview of Networks Qianping Gu 1 Overview of Networks This note is mainly based on Chapters 1-2 of High Performance of Communication Networks by J. Walrand and P. Pravin, 2nd ed, and
More informationFour Circuit 4 Wire Unit With Dante Network Audio Interface
Network Audio 4 Wire Interface Four Circuit 4 Wire Unit With Dante Network Audio Interface GS-FW012 ip 4 Wire With Dante Interface Highights Four x 4 Wire Circuits Loca Cue Input Dante Network Audio Three
More informationAs Michi Henning and Steve Vinoski showed 1, calling a remote
Reducing CORBA Ca Latency by Caching and Prefetching Bernd Brügge and Christoph Vismeier Technische Universität München Method ca atency is a major probem in approaches based on object-oriented middeware
More informationNavigating and searching theweb
Navigating and searching theweb Contents Introduction 3 1 The Word Wide Web 3 2 Navigating the web 4 3 Hyperinks 5 4 Searching the web 7 5 Improving your searches 8 6 Activities 9 6.1 Navigating the web
More informationInfinity Connect Web App Customization Guide
Infinity Connect Web App Customization Guide Contents Introduction 1 Hosting the customized Web App 2 Customizing the appication 3 More information 8 Introduction The Infinity Connect Web App is incuded
More informationIntro to Programming & C Why Program? 1.2 Computer Systems: Hardware and Software. Why Learn to Program?
Intro to Programming & C++ Unit 1 Sections 1.1-3 and 2.1-10, 2.12-13, 2.15-17 CS 1428 Spring 2018 Ji Seaman 1.1 Why Program? Computer programmabe machine designed to foow instructions Program a set of
More informationAvaya Extension to Cellular User Guide Avaya Aura TM Communication Manager Release 5.2.1
Avaya Extension to Ceuar User Guide Avaya Aura TM Communication Manager Reease 5.2.1 November 2009 2009 Avaya Inc. A Rights Reserved. Notice Whie reasonabe efforts were made to ensure that the information
More informationLecture 3 Protocol Stacks and Layering
Lecture 3 Protocol Stacks and ing Hui Zhang School of Computer Science Carnegie Mellon University 15-441 Networking, Fall 2007 http://www.cs.cmu.edu/~srini/15-441/f07/ 1 What is a Communication Network?
More informationCS-461 Internetworking. Dr. Mohamed Aboutabl
CS-461 Internetworking Dr. Mohamed Aboutabl http://www.cs.jmu.edu/users/aboutams The McGraw-Hill Companies, Inc., 2000 1 Chapter 1 Introduction The McGraw-Hill Companies, Inc., 2000 2 Internet today Network
More informationComputer Networks (Introduction to TCP/IP Protocols)
Network Security(CP33925) Computer Networks (Introduction to TCP/IP Protocols) 부산대학교공과대학정보컴퓨터공학부 Network Type Elements of Protocol OSI Reference Model OSI Layers What we ll learn today 2 Definition of
More informationMCSE Training Guide: Windows Architecture and Memory
MCSE Training Guide: Windows 95 -- Ch 2 -- Architecture and Memory Page 1 of 13 MCSE Training Guide: Windows 95-2 - Architecture and Memory This chapter wi hep you prepare for the exam by covering the
More informationCS 520 Networking in the TCP/IP enviornment
CS 520 Networking in the TCP/IP enviornment Instructors: Dr. Esam Alwagait alwagait@ksu.edu.sa Dr. Mishari Almishari mialmishari@ksu.edu.sa Slide Set were original prepared by Dr. Tatsuya Susa Contacts
More informationModule 2 Overview of Computer Networks
Module 2 Overview of Computer Networks Networks and Communication Give me names of all employees Who earn more than $00,000 ISP intranet backbone satellite link desktop computer: server: network link:
More informationModule 2 Overview of. Computer Networks
Module Overview of Networks and Communication Give me names of all employees Who earn more than $00,000 ISP intranet backbone satellite link desktop computer: server: network link: CS454/654 - Issues How
More informationmobile telephone HD Voice Mobile Telephone GSM Highlights MKII Fully Updated Re-Design HD Voice 7kHz Bandwidth Dante / AES67 Option Highlights GSM
GS-MPI005HD MKII Broadcaster s Mobie Phone Highights HD Voice 7kHz Bandwidth MKII Fuy Updated Re-Design Coour Touchscreen Handset Interface For Ca Screening Dante / AES67 Option Highights UMTS (3G) Highights
More informationNetwork Protocols and Architectures
Network Protocols and Architectures Introduction 1 What s the Internet: nuts and bolts view Millions of connected computing devices: hosts, end-systems PC s workstations, servers PDA s, phones, toasters
More informationSwitching Networks (Fall 2010) EE 586 Communication and. August 27, Lecture 2. (modified by Cheung for EE586; based on K&R original) 1-1
EE 586 Communication and Switching Networks (Fall 2010) Lecture 2 August 27, 2010 (modified by Cheung for EE586; based on K&R original) 1-1 Announcements Read Chapter 1 First homework is due 9/3 In Blackboard
More informationText Books. What is a network? Classification of Networks. Computer Communication and Networks 9/1/2014
Computer Communication and Networks Text Books 1. Computer Networks, Andrew S Tanenbaum, Fifth edition. 2. Data Communications and Networking, B Forouzan, 3rd edition. 3. Data and Computer Communications,
More informationDesign of IP Networks with End-to. to- End Performance Guarantees
Design of IP Networks with End-to to- End Performance Guarantees Irena Atov and Richard J. Harris* ( Swinburne University of Technoogy & *Massey University) Presentation Outine Introduction Mutiservice
More informationLanguage Identification for Texts Written in Transliteration
Language Identification for Texts Written in Transiteration Andrey Chepovskiy, Sergey Gusev, Margarita Kurbatova Higher Schoo of Economics, Data Anaysis and Artificia Inteigence Department, Pokrovskiy
More informationIntroduction to Information Science and Technology 2017 Networking I. Sören Schwertfeger 师泽仁
I Sören Schwertfeger 师泽仁 Outline Internet History of the Internet Internet Structure Internet Protocols Network layer details 1. Physical Layer 2. Data Link Layer 3. Network Layer Internet: Huge network
More information.County of San Mateo
-- - -- -- - -- - - --- a - -- w---- a- -- : m- I - -- -- -- --., I -- I.a, e mzzcm.county of San Mateo InterneUIntranet Web Page Design Guideines. September 30,1997 fabe of Corntents Purpose... Approach....
More information