Laboratorij za strojni vid, Fakulteta za elektrotehniko, Univerza v Ljubljani Komunikacije v Avtomatiki Vaje, Ura 1
|
|
- Amie Kelly
- 5 years ago
- Views:
Transcription
1 Laboratorij za strojni vid, Fakulteta za elektrotehniko, Univerza v Ljubljani Komunikacije v Avtomatiki Vaje, Ura 1 Matej Kristan <matej.kristan@fe.uni-lj.si>
2 Komunikacije v Avtomatiki Ime: Matej Kristan Docent na FE in raziskovalec na FRI. Kje me najdete: Laboratorij za strojni vid (4M nadstropje, FE). Spletna stran: FE: (google search) FRI: Elektronski poštni naslov: matej.kristan@fe.uni-lj.si Področje: Statistično modeliranje procesov. Razpoznavanje vzorcev. Računalniški vid. Kognitivni agenti (AI).
3 Namen in Vsebina Vaj: 1. Pregled nalog, ki se pojavljajo na pisnem izpitu in utrditev snovi, ki jo obravnavate na predavanjih. 2. Obvezen del vaj je tudi seminarska naloga: Seminarske naloge se bodo nanašale na omrežne tehnologije. Razdelitev tem: Po treh tednih (8.11.) bo sledila kontrolna točka. Datum za oddajo seminarske pred novim letom (23.12., 24:00). Praktični del seminarske naloge bo preizkus z Wiresharkom. 3. Obvezen uspešen zagovor seminarske je predpogoj za pisni izpit. Prezentacije, datumi in pomembnejše informacije na spletni strani predmeta: Blok ura?
4 Literatura 1. Dve skripti prof Kovačiča na spletni strani predmeta 2. Interaktivni material na spletni strani predmeta (pride) 3. Computer Networking A top-down approach 4. Computer networks 5. Wikipedia
5 Vsebina današnjih vaj: 1. Ponovili bomo koncept slojnosti komunikacijskega omrežja. 2. Ogledali si bomo delo s programom Wireshark. 3. Na primeru TCP/IP modela in slojnosti bomo demonstrirali funkcionalnost Wiresharka. 4. Domača naloga iz slojnosti omrežja.
6 Komunikacijski sloji: KONCEPT? Splošni problem: Kako komunicirati med procesi na različnih napravah, ne glede na, npr., operacijski sistem in strojno Opremo? V 80 model za računalniška omrežja, ki temelji na Slojih. angleško francosko angleško/ nizozemsko francosko/ nizozemsko nizozemsko nizozemsko Vir slike: Tanenbaum, Computer Networks
7 Komunikacijski sloji: TCP/IP aplikacija Izvirno vozlišče Uporabniški sloj (Application layer) aplikacija Končno vozlišče Uporabniški sloj (Application layer) Prenosni sloj (Transport layer) Prenosni sloj (Transport layer) Omrežni sloj (Network layer) Mrežni sloj (Network layer) Podomrežni sloj (Link layer) Podomrežni sloj (Link layer)
8 TCP/IP: Uporabniški sloj aplikacija Izvirno vozlišče Uporabniški sloj (Application layer) Omrežne aplikacije Nudi dostop aplikacijam do omrežja Primeri protokolov: HTTP, FTP, SMTP, DNS, itd Primeri aplikacij: Telnet Prenosni sloj (Transport layer) Omrežni sloj (Internet layer) Virtualni terminal Podatke, ki se pretakajo imenujemo: Sporočila. Predaja in prejema sporočila s prenosnega sloja. Podomrežni sloj (Link layer)
9 TCP/IP: Prenosni sloj aplikacija Izvirno vozlišče Uporabniški sloj (Application layer) Prenosni sloj (Transport layer) Omrežni sloj (Internet layer) Prenaša sporočila z aplikacijskega sloja med končnimi točkami. Podpira dva protokola: TCP (connection oriented) sporočila razseka v manjše segmente, skrbi za pretok podatkov (congestion control) UDP (connectionless) Paket transportnega sloja imenujemo: Segment Podomrežni sloj (Link layer)
10 TCP/IP: Omrežni sloj aplikacija Izvirno vozlišče Uporabniški sloj (Application layer) Prenosni sloj (Transport layer) Omrežni sloj (Internet layer) Skrbi za prenos omrežnih paketov z ene naprave do druge. Omrežni paket imenujemo: Datagram Prenosni sloj v izvornem vozlišču odda segment in mrežni naslov ponornega vozlišča. Omrežni sloj skrbi, da segment pride od ponornega vozlišča. Protokol IP: definira polja v datagramu, in kako končni sistemi in routerji reagirajo na ta polja. Podomrežni sloj (Link layer)
11 TCP/IP: Podomrežni sloj aplikacija Izvirno vozlišče Uporabniški sloj (Application layer) Prenosni sloj (Transport layer) Omrežni sloj (Internet layer) Podomrežni sloj (Link layer) Pozor: omrežni sloj skrbi za pravilno pot datagramov po omrežju. Podomrežni sloj skrbi za prenos paketa od enega vozlišča do njegovega soseda vzdolž poti. Omrežni sloj odda datagram podomrežnemu sloju, ta pa ga posreduje naslednjemu vozlišču. To vozlišče nato odda datagram lastnemu omrežnemu sloju. Primeri: Wifi Ethernet Podomrežni paket imenujemo: Okvir
12 Koncept slojev pri TCP/IP naslavljanju AplikacijaX1 na Laptopu1 želi poslati podatke AplikacijiY2 na Laptopu2. Laptop1 AplikacijaX1 AplikacijaX2 PortX1 PortX2 Appl.sloj Pren. sloj Laptop2 AplikacijaY1 AplikacijaY2 PortY1 PortY2 IME RAČUNALNIKA X IP: Omrež. sloj IME RAČUNALNIKA Y IP: IME ETHERNET PRIKLJ. X MAC: 00:A0:C9:14:C8:29 Podmrež. sloj IME ETHERNET PRIKLJ. Y MAC: 01:23:45:67:89:ab
13 Enkapsulacija segment datagram okvir sporočilo H t H n H t H l H n H t M M M M application transport network link physical Izvir link physical switch H l H n H n H t H t H t M M M M Ponor application transport network link physical H l H n H n H t H t M M network link physical H n H t M router vir: Kurose & Ross: Computer networks A top-down approach
14 Kaj je Wireshark? Standardni analizator mrežnih protokolov. Precej razširjen v industriji (pri uporabi znanih, kakor tudi razvoju novih protokolov). Omogoča zajem podatkov in analizo v realnem času. Operacijski sistemi: Windows, Linux, OS X, itd. Download:
15 Kaj je Wireshark? IP: IP: OS vmesnik kopira
16 Kaj je Wireshark? (grafični vmesnik) Komandna vrstica Izpis paketov Glava izbranega paketa po slojih Vsebina izbranega paketa v hex in ASCII
17 Primer sledenja protokolu HTTP: Klient HTTP GET... Port:2728 HTTP Port:80 Strežnik HTTP/ OK...
18 Kaj je Wireshark? (ovojnice) 4. HTTP Application lyr. (sporočilo) 3. HTTP Transport lyr. (TCP segment, port) 2. HTTP Internet lyr. (IP datagram, naslov IP) 1. HTTP Link/Phy lyr. (okvir, naslov MAC)
19 Začetni koraki z Wiresharkom 1. Nastavi vmesnik (npr., wireless) in zaženi prisluškovanje. 2. Nastavi filter za prikazovanje paketov določenega tipa. 3. Izberi pogovor, ki mu želiš slediti
20 Začetni koraki podrobneje 1. Izberi Network adapter v Capture->Interfaces in poženi Start. Za nastavitve izberi Capture->Options. Izberi kartico pod Interface. Nastavite Link-layer header type na Ethernet. Če paketkov ne vidite, poskusite spremeniti Capture packets in promiscuous mode na neodkljukano. Capture filter naj bo prazen. Poženi s klikom na Start. 2. Filter lahko nastavljate preko gumba Expression, oziroma ga resetirate s klikom na gumb Clear. 3. Če želite slediti nekemu pogovoru, se postavite na vrstico v glavnem oknu, kliknite desni gumb na miški in izberite Follow TCP stream. Ne pozabite pritisniti Clear, ko želite nadaljevati z delom!
21 Primer priklopa na ftp strežnik: Desni gumb na miški -> Follow TCP stream
22 Več o programu Wireshark Kje dobiti pomoč: Na internetu je mnogo pisne dokumentacije o uporabi Wiresharka. Za kratek uvod priporočam: Dodatna dokumentacija: Google search: wireshark tutorial Wikipedia Razširjena dokumentacija o Wiresharku na matični spletni strani.
23 Domača naloga z Wireshark Naložite si Wireshark Izberite mrežno kartico Preko internetnega brskalnika se povežite na naslov: (ne pozabite pred povezavo izbrisati predpomnilnik v brskalniku Firefox: Tools->Clear recent histroy-> cache ) Poiščite začetek pogovora s http protokolom (uporabite filter) Izberite Follow TCP Stream Odgovorite na vprašanja: Kakšen je vaš IP naslov? Kakšen je ponorni IP naslov? Katera verzija http protokola teče na strežniku? Kdaj je bil dokument index.html nazadnje modificiran? Strežnik posreduje brskalniku več sporočil. Kolikšna je velikost prvega sporočila (ne segmenta), ki vsebuje spletno stran (html) brez slik?
24 Domača naloga z Wireshark Domačo nalogo izvedite, odgovore napišite na list in mi pošljite po elektronski pošti do polnoči v nedeljo (24:00). Kasnejših oddaj ne bom upošteval. Predlogo v MSWordu najdete na spletni strani predmeta. Naloga bo vplivala na vašo končno oceno vaj: 10%.
25 Konec. Hvala.
Delavnica za konfiguriranje dostopovnih točk WEB konfiguracija LANCOM L-54
Delavnica za konfiguriranje dostopovnih točk WEB konfiguracija LANCOM L-54 Boštjan Lemut Prva povezava na L-54 s povezovalnim kablom povežemo mrežna vmesnika na računalniku in L-54 v brskalniku vpišemo
More informationUvod v svetovni splet
Univerza v Ljubljani Fakulteta za gradbeništvo in geodezijo Uvod v svetovni splet Računalništvo in informatika, GR-UNI, GR-VSŠ Tehnična dokumentacija in informatika, VKI-UNI št. leto 2007/08, 1. semester
More informationSistemske zahteve za SAOP
Sistemske zahteve za SAOP Samostojna delovna postaja višji). icenter je ERP sistem, ki zagotavlja popolno kontrolo nad vsemi poslovnimi procesi v podjetju. V tej postavitvi je SAOP icenter nameščen na
More informationSC/CSE 3213 Winter Sebastian Magierowski York University CSE 3213, W13 L8: TCP/IP. Outline. Forwarding over network and data link layers
SC/CSE 3213 Winter 2013 L8: TCP/IP Overview Sebastian Magierowski York University 1 Outline TCP/IP Reference Model A set of protocols for internetworking The basis of the modern IP Datagram Exchange Examples
More informationDelavnica za konfiguriranje dostopovnih točk Konfiguracija LANCOM L-54 z uporabo orodja LANConfig
Delavnica za konfiguriranje dostopovnih točk Konfiguracija LANCOM L-54 z uporabo orodja LANConfig Boštjan Lemut Prva povezava na L-54 s povezovalnim kablom povežemo mrežna vmesnika na računalniku in L-54
More informationComputer Networks. Dr. Abdel Ilah ALshbatat Dept. of Communication and Computer Engineering Faculty of Engineering Tafila Technical University
Computer Networks Dr. Abdel Ilah ALshbatat Dept. of Communication and Computer Engineering Faculty of Engineering Tafila Technical University 1 Lecture 0 Course Information Title: Computer Networks 2 Course
More informationE&CE 358: Tutorial 1. Instructor: Sherman (Xuemin) Shen TA: Miao Wang
E&CE 358: Tutorial 1 Instructor: Sherman (Xuemin) Shen TA: Miao Wang Email: m59wang@uwaterloo.ca 1 About Tutorials TA: Miao Wang Office: EIT 3133; Tutorials: Th 4:30 5:20 pm Topics Supplementary knowledge
More informationVodnik skozi Google Analytics Beta verzija 1. del. prehod s stare kode (urchin.js), k novi kodi za sledenje (ga.js)
Vodnik skozi Google Analytics Beta verzija 1. del prehod s stare kode (urchin.js), k novi kodi za sledenje (ga.js) Ta vodnik je povzetek Googe vodiča ' Tracking Code Migration Guide Switching from urchin.js
More informationICS 351: Networking Protocols
ICS 351: Networking Protocols IP packet forwarding application layer: DNS, HTTP transport layer: TCP and UDP network layer: IP, ICMP, ARP data-link layer: Ethernet, WiFi 1 Networking concepts each protocol
More informationDružina IEEE802 Poddružina IEEE802.1 Priključitev v omrežje IEEE802.1x
1 Družina IEEE802 Poddružina IEEE802.1 Priključitev v omrežje IEEE802.1x 2 družina standardov, ki opisujejo delovanje lokalnih (LAN) in mestnih (MAN) omrežij delo opravljano v delovnih skupinah več na
More informationLotus Quickr Najhitrejši način izmenjave poslovne vsebine
Lotus Quickr Najhitrejši način izmenjave poslovne vsebine Zoran Povh, IT specialist zoran.povh@si.ibm.com 2007 IBM Corporation Vsebina Kaj je Lotus Quickr? Integracija z namiznimi programi Skupinski prostori
More informationCS 43: Computer Networks. Layering & HTTP September 7, 2018
CS 43: Computer Networks Layering & HTTP September 7, 2018 Last Class: Five-layer Internet Model Application: the application (e.g., the Web, Email) Transport: end-to-end connections, reliability Network:
More informationProtocol Layers & Wireshark TDTS11:COMPUTER NETWORKS AND INTERNET PROTOCOLS
Protocol Layers & Wireshark TDTS11:COMPUTER NETWORKS AND INTERNET PROTOCOLS Mail seban649@student.liu.se Protocol Hi Hi Got the time? 2:00 time TCP connection request TCP connection response Whats
More informationAssignment - 1 Chap. 1 Wired LAN s
Assignment - 1 Chap. 1 Wired LAN s 1. (1 Mark) 1. Draw the frame format of Ethernet. 2. What is unicast, multicast and broadcast address? 3. State the purpose of CRC field. 2. (5 Marks) 1. Explain how
More informationQUESTION BANK UNIT-I
DEPARTMENT OF INFORMATION TECHNOLOGY QUESTION BANK Subject Code: CS1302 Subject Name: Computer Networks Year/ Sem: III / V UNIT-I 1. What is multicast? What is the difference between unicast and multicast?
More informationDefining Networks with the OSI Model. Module 2
Defining Networks with the OSI Model Module 2 Objectives Skills Concepts Objective Domain Description Objective Domain Number Understanding OSI Basics Defining the Communications Subnetwork Defining the
More informationTCP/IP THE TCP/IP ARCHITECTURE
TCP/IP-1 The Internet Protocol (IP) enables communications across a vast and heterogeneous collection of networks that are based on different technologies. Any host computer that is connected to the Internet
More informationOutline. Inter-Process Communication. IPC across machines: Problems. CSCI 4061 Introduction to Operating Systems
Outline CSCI 4061 Introduction to Operating Systems ing Overview Layering and Protocols TCP/IP Protocol Family Client-Server Model Instructor: Abhishek Chandra 2 Inter-Process Communication Intra-node:
More informationL1/L2 NETWORK PROTOCOL TESTING
L1/L2 NETWORK PROTOCOL TESTING MODULE 1 : BASIC OF NETWORKING OSI Model TCP/IP Layers Service data unit & protocol data unit Protocols and standards Network What is network & Internet Network core circuit
More informationNavodila za uporabo izdelkov programske opreme Microsoft
Navodila za uporabo izdelkov programske opreme Microsoft Kazalo Navodila za konfiguracijo odjemalca za e-pošto Outlook Splošno 3 Nastavitev poštnega predala s protokolom MAPI v odjemalcu Outlook 2007 s
More informationLesson 5 TCP/IP suite, TCP and UDP Protocols. Chapter-4 L05: "Internet of Things ", Raj Kamal, Publs.: McGraw-Hill Education
Lesson 5 TCP/IP suite, TCP and UDP Protocols 1 TCP/IP Suite: Application layer protocols TCP/IP Suite set of protocols with layers for the Internet TCP/IP communication 5 layers: L7, L4, L3, L2 and L1
More informationLab - Using Wireshark to Examine a UDP DNS Capture
Topology Objectives Part 1: Record a PC s IP Configuration Information Part 2: Use Wireshark to Capture DNS Queries and Responses Part 3: Analyze Captured DNS or UDP Packets Background / Scenario If you
More informationLab - Using Wireshark to Examine a UDP DNS Capture
Topology Objectives Part 1: Record a PC s IP Configuration Information Part 2: Use Wireshark to Capture DNS Queries and Responses Part 3: Analyze Captured DNS or UDP Packets Background / Scenario If you
More informationTCP/IP Overview. Basic Networking Concepts. 09/14/11 Basic TCP/IP Networking 1
TCP/IP Overview Basic Networking Concepts 09/14/11 Basic TCP/IP Networking 1 What is TCP/IP? TCP/IP is a name refers to an entire collection of data communication protocols: TCP: Transmission Control Protocol
More informationLab 1: Packet Sniffing and Wireshark
Lab 1: Packet Sniffing and Wireshark Fengwei Zhang Wayne State University Course: Cyber Security Practice 1 Packet Sniffer Packet sniffer is a basic tool for observing network packet exchanges in a computer
More informationNew Media & Language Technologies Jozef Stefan International Postgraduate School January Speech apps. Jerneja Žganec Gros
New Media & Language Technologies Jozef Stefan International Postgraduate School January 2005 Speech apps Jerneja Žganec Gros jerneja@alpineon.com THE VOICE WEB The voice web offers access to information
More informationCIT 380: Securing Computer Systems. Network Security Concepts
CIT 380: Securing Computer Systems Network Security Concepts Topics 1. Protocols and Layers 2. Layer 2 Network Concepts 3. MAC Spoofing 4. ARP 5. ARP Spoofing 6. Network Sniffing Protocols A protocol defines
More informationSystem Programming. Introduction to computer networks
Content : by Dr. B. Boufama School of Computer Science University of Windsor Instructor: Dr. A. Habed adlane@cs.uwindsor.ca http://cs.uwindsor.ca/ adlane/60-256 Content Content 1 Introduction to Computer
More informationUNI CS 3470 Networking Project 5: Using Wireshark to Analyze Packet Traces 12
UNI CS 3470 Networking Project 5: Using Wireshark to Analyze Packet Traces 12 Due Wednesday, 12/7, at 11:59:59 PM. One s understanding of network protocols can often be greatly deepened by seeing protocols
More informationOrganizacija računalnikov (OR) UNI-RI, 3.l. RS Vaje. doc.dr. Mira Trebar
Organizacija računalnikov (OR) UNI-RI, 3.l. RS Vaje doc.dr. Mira Trebar 2 Vaja 1 (11.10.2010) Vaje so obvezne (delo v laboratoriju + doma) S1: Logisim MIPS procesor eno-cikelna izvedba ( logisim ) MIPS
More informationNetwork concepts introduction & wireshark
Network concepts introduction & wireshark W0RKSH0P @KirilsSolovjovs Why am I doing this? Many people attending hacker conferences are not in fact experts, but come here to learn and have fun Opportunity
More informationOperating Systems CS 571
Computer Networks: Overview Operating Systems CS 571 Network types Range Bandwidth (Mbps) Latency (ms) LAN 1-2 kms 10-1000 1-10 WAN worldwide 0.010-600 100-500 MAN 2-50 kms 1-150 10 Wireless LAN 0.15-1.5
More informationNetwork Reference Models
Network Reference Models LECTURE (2) Network Reference Models A framework (guideline) for network implementation and troubleshooting. Divides complex functions into simpler components. Importance of reference
More informationThe OSI Model. Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO).
Network Models The OSI Model Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Model for understanding and developing computer-to-computer communication
More informationRAZLOG ZA IZVAJANJE PROGRAMA POPRBAZA
RAZLOG ZA IZVAJANJE PROGRAMA POPRBAZA POPRBAZA je namenjen večji reorganizaciji podatkov v računalnikovem spominu. Reorganizacijo narekujejo bodisi zakonske spremembe, bodisi novosti v programu. Zato je
More informationOSI and TCP/IP Models
EECS 3214 Department of Electrical Engineering & Computer Science York University 18-01-08 12:12 1 OSI and / Models 2 1 / Encapsula5on (Packet) (Frame) 3 / Model and Example Protocols A list of protocols
More informationChapter 2 Communicating Over the Network
Chapter 2 Communicating Over the Network Elements of Communication Communicating the Messages Continuous stream of bits 00101010100101010101010101010101010 I have to wait Single communications (e.g. video,
More informationIntroduction to Networks
Introduction to Networks Khaled Harras School of Computer Science Carnegie Mellon University 15-349 Computer and Network Security Fall 2012 Some material borrowed from Hui Zhang and Adrian Perrig 1 Early
More informationNetwork+ Guide to Networks, Seventh Edition Chapter 2, Solutions
Network+ Guide to Networks, Seventh Edition Chapter 2, Solutions Review Questions 1. Which part of a MAC address is unique to each manufacturer? A. The network identifier B. The OUI C. The device identifier
More informationQ: Do You made a backup before upgrade? A: Only cowards make backups!
Q: Do You made a backup before upgrade? You z malo - you A: Only cowards make backups! Real men don't use backups, they post their stuff on a public ftp server and let the rest of the world make copies.
More informationComputer Networks. General Course Information. Addressing and Routing. Computer Networks 9/8/2009. Basic Building Blocks for Computer Networks
Outline: Computer Networks Introduction General course information. Some basic concepts for computer s. Network programming. General Course Information Course Web page http://www.cs.rochester.edu/~kshen/csc257-fall2009
More informationISO/OSI Reference Model. Data Link Layer. 7. Application. 6. Presentation. 5. Session. 4. Transport. 3. Network. 2. Data Link. 1.
Data Link Layer 1 ISO/OSI Reference Model 7. Application E-Mail, Terminal, Remote login 6. Presentation System dependent presentation of data (EBCDIC/ASCII) 5. Session Connection establishment, termination,
More informationInterconnecting Networks with TCP/IP
Chapter 8 Interconnecting s with TCP/IP 1999, Cisco Systems, Inc. 8-1 Introduction to TCP/IP Internet TCP/IP Early protocol suite Universal 1999, Cisco Systems, Inc. www.cisco.com ICND 8-2 TCP/IP Protocol
More informationNavodila za nastavitev varne povezave po protokolu SSH
Datum: 28. 9. 2010 Navodila za nastavitev varne povezave po protokolu SSH 1. Pogoji za zagotovitev varne povezave po protokolu SSH Za uspešno zagotovitev in nastavitev varne povezave po protokolu SSH je
More informationWireshark Lab: Getting Started v7.0
Wireshark Lab: Getting Started v7.0 Supplement to Computer Networking: A Top-Down Approach, 7th ed., J.F. Kurose and K.W. Ross Tell me and I forget. Show me and I remember. Involve me and I understand.
More informationInternet Applications and the Application Layer Material from Kurose and Ross, Chapter 2: The Application Layer
Midterm Study Sheet Below is a list of topics that will be covered on the midterm exam. Some topics may have summaries to clarify the coverage of the topic during the lecture. Disclaimer: the list may
More informationWireshark Lab: Getting Started v7.0
Wireshark Lab: Getting Started v7.0 Adapted by HMC from the supplement to Computer Networking: A Top-Down Approach, 7 th ed., J.F. Kurose and K.W. Ross Tell me and I forget. Show me and I remember. Involve
More informationNetwork concepts introduction & wireshark. workshop
Network concepts introduction & workshop @KirilsSolovjovs ISO/OSI+DoD model Topics for our workshop Network layer models Ethernet, WiFi Layer3: ARP, ICMP, IPv4, IPv6 Layer4: UDP, TCP Routing Application
More informationCommunicating over the Network. Network Fundamentals. ITE PC v4.0 Chapter Cisco Systems, Inc. All rights reserved.
Communicating over the Network Network Fundamentals 1 Network Structure Define e the components of a network Network components hardware software 2 Network Structure End Devices and their Role in the Network
More informationNetwork Forensics (wireshark) Cybersecurity HS Summer Camp
Network Forensics (wireshark) Cybersecurity HS Summer Camp Packet Sniffer a packet sniffer captures ( sniffs ) messages being sent/received from/by your computer; it will also typically store and/or display
More informationA Simplified Example of TCP/IP Communication Chuck Cusack
A Simplified Example of TCP/IP Communication Chuck Cusack This is a simple example of how messages are sent from one machine to another (from a source to a destination) using the four-layer Internet software
More informationFaculty of Science and IT Course title. Pre-requisite/corequisite
Faculty Course number Faculty of Science and IT 022242 Department Course title Computer Science Network Protocols Number of credit hours 3 Pre-requisite/corequisite Computer network Brief course description.
More informationGetting Wireshark. Detailed installing steps can be found on the Internet, so this tutorial won t cover this part.
Wireshark Tutorial Getting Wireshark Wireshark for Windows and Mac OS X can be easily downloaded from its official website. If you are Linux users, you ll probably find Wireshark in its package repositories.
More informationCS6421: Distributed Systems
CS6421: Distributed Systems Networks and Sockets Prof. Tim Wood!1 Before we start Participation: 1 contributions every 3 weeks - Ask/answer a question in class - Post to Piazza forum - Come of my office
More informationCSEN 503 Introduction to Communication Networks. Mervat AbuElkheir Hana Medhat Ayman Dayf. ** Slides are attributed to J. F.
CSEN 503 Introduction to Communication Networks Mervat AbuElkheir Hana Medhat Ayman Dayf ** Slides are attributed to J. F. Kurose Chapter 3 outline Transport-layer services Multiplexing and demultiplexing
More informationApplication Layer Introduction; HTTP; FTP
Application Layer Introduction; HTTP; FTP Tom Kelliher, CS 325 Feb. 4, 2011 1 Administrivia Announcements Assignment Read 2.4 2.6. From Last Time Packet-switched network characteristics; protocol layers
More informationPosodobitev adapterja Push2TV
Posodobitev adapterja Push2TV 2 NETGEAR priporoča, da posodabljate adapter Push2TV, ker nove posodobitve lahko podpirajo še več brezžičnih prikaznih naprav. 1. S prenosnim računalnikom ali mobilno napravo
More informationCOMS3200/7201 Computer Networks 1 (Version 1.0)
COMS3200/7201 Computer Networks 1 (Version 1.0) Assignment 3 Due 8pm Monday 29 th May 2017. V1 draft (hopefully final) Note that the assignment has three parts Part A, B & C, each worth 50 marks. Total
More informationก ก Information Technology II
ก ก 202103 Information Technology II ก ก ก ก ก (LAN), ก LAN, ก ก (LAN) ก ก ก LAN ก LAN ก LAN Topology Bus LAN Star LAN Ring LAN Wireless LAN Wireless LAN Wireless ก (LAN) ก ก ก LAN ก LAN WAN ก Random Access
More informationNetwork Architecture Models
School of Business Eastern Illinois University Network Architecture Models (September 8, 2009) Abdou Illia, Fall 2009 Learning Objectives 2 Discuss the OSI reference Model Discuss the Internet Model Compare
More informationPowerline 500 dostopna točka WiFi XWNB5201 Navodila za namestitev
Powerline 500 dostopna točka WiFi XWNB5201 Navodila za namestitev Tehnična podpora Zahvaljujemo se vam za nakup izdelkov NETGEAR. Po namestitvi naprave poiščite serijsko številko na nalepki izdelka in
More informationWireshark Lab: Getting Started
Wireshark Lab: Getting Started Tell me and I forget. Show me and I remember. Involve me and I understand. Chinese proverb 2005-2019, J.F Kurose and K.W. Ross, All Rights Reserved Introduction to Wireshark
More informationNavodila za interaktivne naloge Bober
Avtorji dokumenta: Dean Gostiša , Lovro Podgoršek Verzija dokumentacije: 1.1 Datum in kraj: 24. 7. 2013, Ljubljana Navodila za interaktivne naloge Bober Uvod 1.
More information» Nakup in vzdrževanje Oracle programske opreme «Tehnične specifikacije
Obrazec P-5 Specifikacije 30K250316» Nakup in vzdrževanje Oracle programske opreme «Tehnične specifikacije KAZALO VSEBINE 1. Predmet javnega naročila...3 1.1. SKLOP-1: STORITEV VZDRŽEVANJA ORACLE LICENČNE
More informationWireshark Lab: Getting Started v6.0
Wireshark Lab: Getting Started v6.0 Supplement to Computer Networking: A Top-Down Approach, 6 th ed., J.F. Kurose and K.W. Ross Tell me and I forget. Show me and I remember. Involve me and I understand.
More informationPrometno načrtovanje xdsl
Prometno načrtovanje xdsl 1 Kazalo Prometno načrtovanje naročniške zanke Prometno načrtovanje MSAN Izbira agregacijskega modela Izbira opreme 2 Potrebe po pasovni širini Zahtevana pasovna širina na uporabnika
More informationModule 2 Overview of Computer Networks
Module 2 Overview of Computer Networks Networks and Communication Give me names of all employees Who earn more than $00,000 ISP intranet backbone satellite link desktop computer: server: network link:
More informationModule 2 Overview of. Computer Networks
Module Overview of Networks and Communication Give me names of all employees Who earn more than $00,000 ISP intranet backbone satellite link desktop computer: server: network link: CS454/654 - Issues How
More informationCommunicating over the Network
Communicating over the Network Network Fundamentals Chapter 2 Version 4.0 1 Network Structure The elements of communication 3 common elements of communication Message source people/electronic devices need
More informationIntroduction to Internet, Web, and TCP/IP Protocols SEEM
Introduction to Internet, Web, and TCP/IP Protocols SEEM 3460 1 Local-Area Networks A Local-Area Network (LAN) covers a small distance and a small number of computers LAN A LAN often connects the machines
More informationInterconnecting Networks with TCP/IP. 2000, Cisco Systems, Inc. 8-1
Interconnecting Networks with TCP/IP 2000, Cisco Systems, Inc. 8-1 Objectives Upon completion of this chapter you will be able to perform the following tasks: Identify the IP protocol stack, its protocol
More informationComputer Communication & Networks / Data Communication & Computer Networks Week # 03
Computer Communication & Networks / Data Communication & Computer Networks Week # 03 M.Nadeem Akhtar CS & IT Department The University of Lahore Email: nadeem.akhtar@cs.uol.edu.pk URL-https://sites.google.com/site/nadeemuolcsccn/home
More informationLab 2. All datagrams related to favicon.ico had been ignored. Diagram 1. Diagram 2
Lab 2 All datagrams related to favicon.ico had been ignored. Diagram 1 Diagram 2 1. Is your browser running HTTP version 1.0 or 1.1? What version of HTTP is the server running? According to the diagram
More informationIntroduction to Computer Networking
Introduction to Computer Networking Antonio Carzaniga Faculty of Informatics University of Lugano September 17, 2014 Outline General course information Program Preliminary schedule Intro to computer networking:
More informationJAVA Network API. 2 - Connection-Oriented vs. Connectionless Communication
JAVA Network API To be discussed 1 - java.net... 1 2 - Connection-Oriented vs. Connectionless Communication... 1 3 - Connectionless:... 1 4 - Networking Protocols... 2 5 - Sockets... 2 6 - Multicast Addressing...
More informationCSCD 330 Network Programming
CSCD 330 Network Programming Lecture 9 Transport Layer Winter 2019 Reading: Begin Chapter 3 Some Material in these slides from J.F Kurose and K.W. Ross All material copyright 1996-2007 1 Outline Overview
More informationABBYY rešitve za prepoznavo in klasifikacijo dokumentov
ABBYY rešitve za prepoznavo in klasifikacijo dokumentov preabbyy FlexiCapture 9.0. Overview. 1 doc: 10977 Lokalna prisotnost ABBYY: Moscow, Russia; Munich, Germany; Bracknell, UK; Kiev, Ukraine; Milpitas,
More informationIntroduction to computer networking
edge core Introduction to computer networking Comp Sci 3600 Security Outline edge core 1 2 edge 3 core 4 5 6 The edge core Outline edge core 1 2 edge 3 core 4 5 6 edge core Billions of connected computing
More informationLECTURE WK4 NETWORKING
LECTURE WK4 NETWORKING Workbook and Quiz Workbook o Due in WK5 o Must hand in a hard copy to the tutor as well as an online submission Quiz o In the practical class o 30mins to complete the quiz o Short,
More informationMobilne multimedijske storitve. mag. Urban Burnik Fakulteta za elektrotehniko Laboratorij za digitalno obdelavo signalov
Mobilne multimedijske storitve mag. Urban Burnik Fakulteta za elektrotehniko Laboratorij za digitalno obdelavo signalov Uvod Mobilne storitve danes Multimedijske storitve Sistemske zahteve Nova generacija
More informationWireshark Lab: Getting Started
Wireshark Lab: Getting Started This following content is edited from the wireshark lab exercise provided by J.F. Kurose, and K.W. Ross, "Computer Networking: A Top down approach" 5th ed. Pearson, 2010.
More informationENEE 457: Computer Systems Security 11/07/16. Lecture 18 Computer Networking Basics
ENEE 457: Computer Systems Security 11/07/16 Lecture 18 Computer Networking Basics Charalampos (Babis) Papamanthou Department of Electrical and Computer Engineering University of Maryland, College Park
More informationTCP / IP. Isidro Martinez Director, Latin Amèrica
TCP / IP Isidro Martinez Director, Latin Amèrica Summary TCP/IP introduction IP addressing LAN, PSTN Services: Ping TCP, UDP DNS FTP, HTTP, Telnet SMTP, POP3 TCP/IP protocol suite Defines a set of protocols
More informationIme in priimek: Kazalo
Ime in priimek: Datum: Naloga: Multicast Kazalo Naloga... 1 1. Uvod... 1 1.1. IP multicast... 1 1.2. Protokol IGMP... 1 1.3. Unicast in multicast usmerjanje/posredovanje... 2 1.4. Ethernet multicast (IGMP
More informationMrežni koncepti (koncept, skica, nacrt, plan) o Pregled na najvažnije koncepte mreže. Slanje paketa sa Argon-1 prema Neon-u
Mrežni koncepti (koncept, skica, nacrt, plan) Arhitektura tu protokola o Pregled na najvažnije koncepte mreže Protokol slojevi Encapsulation Uvod u mreže. Mrežna apstrakcija Ova prezentacija koristi primjer
More informationBEng. (Hons) Telecommunications. Examinations for / Semester 2
BEng. (Hons) Telecommunications Cohort: BTEL/16B/FT Examinations for 2016 2017 / Semester 2 Resit Examinations for BTEL/15B/FT MODULE: NETWORKS MODULE CODE: CAN 1102C Duration: 2 ½ hours Instructions to
More informationCS 4390 Computer Networks. Transport Services and Protocols
CS 4390 Computer Networks UT D data Session 07 Transport Layer Overview and UDP Adapted from Computer Networking a Top-Down Approach 1996-2012 by J.F Kurose and K.W. Ross, All Rights Reserved Transport
More information03 The Internet Model and TCP/IP
SE 4C03 Winter 2003 03 The Internet Model and TCP/IP Instructor: W. M. Farmer Revised: 16 January 2003 1 The OSI Model In 1977 the International Standards Organization (ISO) offered the Open Systems Interconnection
More informationData Communication EDA344, DIT420 Description of Lab 1 and Optional Programming HTTP Assignment
Data Communication EDA344, DIT420 Description of Lab 1 and Optional Programming HTTP Assignment Aras Atalar Prajith R G 24/01/2018 Overview Lab 1 (Compulsory): WIRESHARK lab General Description Programming
More informationWireshark Lab: Getting Started v6.0 Supplement to Computer Networking: A Top-Down Approach, 6th ed., J.F. Kurose and K.W. Ross
Wireshark Lab: Getting Started v6.0 Supplement to Computer Networking: A Top-Down Approach, 6th ed., J.F. Kurose and K.W. Ross 2005-21012, J.F Kurose and K.W. Ross, All Rights Reserved In the Wireshark
More informationComputer Networking: A Top Down Approach Featuring the. Computer Networks with Internet Technology, William
Dr. John Keeney 3BA33 TCP/IP protocol architecture with IP OSI Model Layers TCP/IP Protocol Architecture Layers TCP/IP Protocol Suite Application Layer Application Layer Telnet FTP HTTP DNS RIPng SNMP
More informationTransport Layer. Gursharan Singh Tatla. Upendra Sharma. 1
Transport Layer Gursharan Singh Tatla mailme@gursharansingh.in Upendra Sharma 1 Introduction The transport layer is the fourth layer from the bottom in the OSI reference model. It is responsible for message
More informationChapter 1 Introduction
Chapter 1 Introduction A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations;
More informationThe Administration Tab - Diagnostics
The Administration Tab - Diagnostics The diagnostic tests (Ping and Traceroute) allow you to check the connections of your network components. Ping Test. The Ping test will check the status of a connection.
More information5105: BHARATHIDASAN ENGINEERING COLLEGE NATTARMPALLI UNIT I FUNDAMENTALS AND LINK LAYER PART A
5105: BHARATHIDASAN ENGINEERING COLLEGE NATTARMPALLI 635 854. NAME OF THE STAFF : R.ANBARASAN DESIGNATION & DEPARTMENT : AP/CSE SUBJECT CODE : CS 6551 SUBJECT NAME : COMPUTER NETWORKS UNIT I FUNDAMENTALS
More informationNetworking Basics. EC512 Spring /15/2015 EC512 - Prof. Thomas Skinner 1
Networking Basics EC512 Spring 2015 2/15/2015 EC512 - Prof. Thomas Skinner 1 Protocols Protocols are required in order to allow information to be extracted from the stream of bits flowing from one point
More informationPrirejanje in preverjanje tipov
Uvod v C# Drugi del Dedovanje Sintaksa Prirejanje in preverjanje tipov Kaste preverjenih tipov Prekrivanje metod Dinamično povezovanje (poenostavljeno) Skrivanje Dinamično povezovanje (s skrivanjem) Fragile
More informationTCP /IP Fundamentals Mr. Cantu
TCP /IP Fundamentals Mr. Cantu OSI Model and TCP/IP Model Comparison TCP / IP Protocols (Application Layer) The TCP/IP subprotocols listed in this layer are services that support a number of network functions:
More informationHow we calculate volume with the use of NTF method. Kako izračunamo volumen z uporabo metode NTF
RMZ Materials and Geoenvironment, Vol. 55, No. 1, pp. 127-134, 2008 127 How we calculate volume with the use of NTF method Kako izračunamo volumen z uporabo metode NTF An e s Du r g u t o v i ć 1, Mi l
More informationUniversity of Maryland Baltimore County Department of Information Systems Spring 2015
University of Maryland Baltimore County Department of Information Systems Spring 2015 IS 450/650: Data Communications and Networks Homework Assignment 1 Wireshark Lab (Handed Out: February 3, 2015 (Tuesday),
More information