Module 2.3a IP 0:00 - 1:00 -
|
|
- Arnold Nash
- 5 years ago
- Views:
Transcription
1 Module 2.3a IP 0:00 - In this video we're going to continue looking at our simplified view of how the internet layers work and in particular we're going to look at the middle layer which is good known as TCP/IP. Before we get too far into this I wanted to remind us of one of the core concepts of using this layer model, and if you recall we talked about a voice conversation message where the top two layers were the same as a postcard communication message. So I want to emphasize is that the higher layers can communicate without any regard as what's happening at the lower layers and that's really important with our model and how we construct messages and send them back and forth. So we're talking about our middle layer of TCP/IP it doesn't matter if the lower layer is working over Wi-Fi or ethernet or cellular connection it doesn't matter, everything we're going to say now moving forward does not have to be concerned with how that physical layer is actually used. So let's take a look at how the middle layer TCP/IP actually works now I 1:00 - mentioned we're giving a simplified view the TCP/IP layer is actually two separate layers, the TCP layer which is a higher layer than the IP layer but for all intensive purposes we're going to consider them the same layer just for simplification. Now full disclosure there is an alternative to TCP that is used in the real world known as UDP or user Datagram protocol. We're not going to really discuss that but I just want to make sure for full disclosure aware that some of the
2 technologies that you use do not use TCP although the vast majority of communication you use on the internet is actually TCP. So the first thing we're going to do is describe IP or the internet protocol, and that's literally what the internet is named after this IP Internet Protocol. In order to send a postcard in the real world you need a destination address and usually you have a return address that you sent it from. Well, you need both of these to communicate on the Internet, and to communicate on the Internet you need the same sort of idea. This protocol requires that you have a sending address where it's coming from and you need a destination address of 2:00 - where it's going to. Now this address does not look like our normal addresses we use for mailing addresses, they use the specific scheme to keep track of all the different devices on the internet. So what is an IP address look like. Well it's four numbers, each number is in the range from 0 to 255. So there's 256 possible numbers. Then you string them together separated by period. Currently is really the number If you launch your browser and you just type in up comes the University of Waterloo. Now that's not very convenient. We ll talk about a different way of addressing website soon but that is an example of how each computer or device on the Internet has its own IP address. Now unfortunately we are running out of IP addresses. If you count up the total number of devices that can be on the internet is 256 x 256 3: x 256, which is approximately four billion different devices. When the internet was first being conceived of, that seemed like a perfectly valid number of IP addresses but when we enter a world where each one of you may have multiple devices and there's lots of hardware that connects all of the internet we have run and we're past four billion devices. So they had to come up with a plan B. There's two ways to address this problem. The first is what they call IP version 6, and the idea of an IP version 6 is that you have a much longer IP address. This is the actual IP address of another computer at the University of waterloo, that uses the IP version 6 scheme. With the IP version 6 scheme we can handle 340 trillion trillion trillion devices on the internet. And that should serve humankind for a long time. The alternative scheme is called Nat. So you did not type in into your web browser, you can just type in So what happens is there is a
3 4:00 - protocol named DNS for Domain Name System. And what happens is when you type in your computer sends that request out to your local DNS server and it then returns back the actual IP address of what you're trying to connect to. So it converts between a more user-friendly human name to an actual IP address. Now your local DNS server may not know exactly where uwaterloo.ca is, so it may go on to say for example the.ca DNS server and says hey you're in Canada do you know where this address is and then it may have come back with the number. So it may require more than one hop to a different DNS server but eventually no matter what name you type in it will come back. There is an international body out there that decides who can get what name. You cannot just go ahead and say hey can I be microsoft.com. So what happens is you can register different names and you can go out and register names for yourself so 5:00 you can have your own custom or vanity name or if you have a business you want to start up you can get your own name. And then you what you do is you register that with an agency that associates your name with a real-world physical address. This is a controversial topic there are countries that control their own rules for how you can get a name. So for example if you want to.ca within Canada. And then there's other new top-level domains such as.ca,.edu,.org and each of these have their own rules for how you can obtain your own name. At the end of the day though you don't have to worry about this, you just simply type in a name and your DNS server will resolve that to an IP address. Now I mentioned that there's only four billion IP addresses out there
4 6:00 - how do you get an IP address. Well there's two categories of IP addresses, there is fixed IP addresses, and big companies like Google and Microsoft have their own fixed IP addresses as well as organizations like the University of Waterloo. In fact, every number that starts with is an actual University of Waterloo address. University of Waterloo has that entire range. But you're just a regular citizen and you want to connect to network whether you're at Waterloo or Starbucks or at your home network. And each one of your device's needs an IP address. Well the way these on the fly or temporary IP addresses are doled out, is known as DHCP, which stands for Dynamic Host Configuration Protocol. So the idea is your device when it turns on and it tries to connect to a network it's sort of sends a message out hey I don't have an IP address can I have IP address please, and then what happens is there's a DHCP server out there that has a bank of IP 7:00 - addresses that it can give out. And what it will do is, it will give you an IP address that you can use. And it also will expire after a certain amount of time, so if you go to Starbucks and Starbucks gives you an IP address that's great but an hour later when you're gone someone else can get that same IP address. And so the DHCP server just keeps track of addresses it has available and gives them out as needed. This is especially important for your mobile devices like your phone and laptop where you may connect to multiple different networks. Now the last tricky piece I want to explain which will really help your understanding of how communication on the internet works, is known as Network Address Translation, and when you connect to your home network or even Starbucks or places on the campus this system is used so that we don't run out of IP addresses. So how NAT actually works is a little complicated, and I don't want to get bogged down in details, so what I'm going to do is give you an analogy using physical addresses that will just give you an understanding of how basically it works. So let's say we have an apartment building and that
5 8:00 - apartment building has a physical address known as 555 real street. That's a real physical address in our world but there's a whole bunch of people who live inside the apartment building and they don't even know they're at 55 real street. They all think they live at imaginary lane. So one person might think they live at 100 imaginary lane and someone else might live at a hundred and one imaginary lane. So you might think you live at a hundred and one imaginary lane and then you want to send a postcard to your friend who lives at destination avenue. So you fill out your postcard dear Bob at 789 destination avenue and you return address you put as a hundred and one imaginary lane. And then what you do is you hand your postcard to the nice doorman who lives at real street 55 real street. So you say hey doorman can you please deliver this postcard for me. He says no problem, and then what he does is he changes your return address to be 55 real street, unbeknownst to you. And then he sends out the postcards the destination avenue and then your friend at destination avenue 9:00 - gets your postcard sees your address is 555 real street and then sends it back to you. And then when it arrives the doorman looks at your postcard and goes A HA this is my friend who lives at a hundred one imaginary lane, and again changes the address from real street back to 100 imaginary lane and then passes the postcard onto you. You were completely oblivious to this whole thing the doorman was doing all of this managing for you. So what happens is we can have hundreds or even thousands of computers all sharing the same physical address, and this is another way of getting around this problem of running out of IP addresses. So when you go on your computer and you ask your computer hey what s my IP address, it might come up with a number such as imaginary lane. And in fact, if your IP address begins with , you live in imaginary lane. Alright we just discussed a few technical issues that help us understand how the internet works and how the internet protocol works, but let's actually talk about Internet routing because that's one of the core parts of
6 10:00 - the IP protocol. Whenever your computer sends out a message it has a destination IP address and your computer sends that to a local router and that router may send it to another router, and then another router and eventually you'll reach the computer that it wants to reach. All of these individual routers are all connected together and are constantly sending millions of messages back and forth back and forth and that's how your message gets from one side of the world to another side of the world. How does this work? Let's discuss how it works in the real world say you live in Kitchener Waterloo, and you want to send your postcard to someone in England. Well you fill out your postcard and you get someone's address in England and then you take it to your local mailbox. And then someone picks up that postcard from the mailbox it takes it to a central depot, and they look at the address and they say oh this one's going to England so I might send that to the central Ontario dispatch, I don't know how it actually works in the real world I'm making this up. But we can imagine that it goes to a central Ontario dispatch and someone looks at the address there and goes all this 11:00 - is going to England. So they take it to a candidate dispatch center and then at the candidate dispatch center they look at this address and go all this is going to England, well let's put it on this boat that travels to England and it goes over the sea, on some sort of big boat and he gets over to England and then someone opens it up and goes ahh ok well you want to go to London England, so let's put it and let's give it off to someone who delivers in that region. And then eventually you'll get narrow and narrow and smaller and eventually it will show up at someone's house. So this idea of each person who looks at the postcard along the way knows in general which direction the postcard has to go. And it's complicated but that's how all the network routers on the internet work. Whenever you send out a message each one of them send it to another router that will get you closer and
7 closer to your destination. Now it's hard to visualize how all the routers in the world are connected, I stole this photo and this is from 1999 so this is even a long time 12:00 - ago but this is a visualization of many of the routers that exist in the real world. And so you can see how you might start in one corner of this giant network and make your way through a whole bunch of different paths to your destination at the other side of the world. In general, every message you sent on the internet takes less than 50 hops and a hop being, goes from one router to another router. That's still a lot but you can reach almost any computer from any other computer in the world within about 50 hops. And that's how all the messages on the internet get transmitted. Raw Long Form Transcript 0:00 - in this video we're going to continue 0:02 - looking at our simplified view of how 0:04 - the internet layers work and in 0:06 - particular we're going to look at the 0:07 - middle layer which is good known as 0:10 - tcp/ip before we get too far into this i
8 0:13 - want to remind us of one of the core 0:15 - concepts so using this layer model and 0:17 - if you recall we talked about a voice 0:19 - conversation message where the top two 0:22 - layers were the same as a postcard 0:24 - communication message so i want to 0:27 - emphasize is that the higher layers can 0:29 - communicate without any regard as what's 0:31 - happening at the lower layers and that's 0:33 - really important with our model and how 0:35 - we construct messages and send them back 0:37 - and forth so we're talking about our 0:39 - middle layer of tcp/ip it doesn't matter 0:42 - if the lower layer is working over Wi-Fi 0:45 - or ethernet or cellular connection it 0:47 - doesn't matter everything we're going to 0:49 - say now moving forward 0:51 - does not have to be concerned with how 0:52 - that physical layer is actually used so 0:55 - let's take a look at how the middle 0:57 - layer tcp/ip actually works now i 1:00 - mentioned we're giving a simplified view 1:02 - the tcp IP layer is actually two 1:04 - separate layers the TCP layer which is a 1:06 - higher layer than the IP layer but for 1:09 - all intensive purposes we're going to 1:10 - consider them the same layer just for 1:12 - simplification now full disclosure there 1:15 - is an alternative to tcp that is used in 1:17 - the real world known as UDP or user 1:19 - Datagram protocol we're not going to 1:21 - really discuss that but I just want to 1:23 - make sure for full disclosure aware that 1:25 - some of the technologies that you use do 1:27 - not use TCP although the vast majority 1:29 - of communication you use on the internet 1:31 - is actually tcp so the first thing we're 1:34 - going to do is describe IP or the 1:36 - internet protocol and that's literally 1:38 - what the internet is named after this IP 1:41 - Internet Protocol in order to send a 1:43 - postcard in the real world you need a 1:45 - destination address and usually you have 1:47 - a return address that you sent it from
9 1:49 - will you need both of these to 1:51 - communicate on the Internet and 1:52 - communicate on the Internet 1:53 - you need the same sort of idea this 1:55 - protocol requires that you have a 1:56 - sending address where it's coming from 1:58 - and you need a destination address of 2:00 - where it's going to now this address is 2:02 - not look like our normal addresses we 2:04 - use for mailing addresses they use the 2:05 - specific scheme to keep track of all the 2:08 - different devices on the inner 2:09 - they're so what is an IP address look 2:11 - like while it's four numbers each number 2:13 - is in the range from 0 to 255 so there's 2: possible numbers and then you string 2:18 - them together separated by. currently 2: burr 129 got 97. too late. 2:28-23 if you want your browser and you just 2:31 - type in up comes the 2:38 - University of Waterloo now that's not 2:40 - very convenient will talk about a 2:41 - different way of addressing web site 2:43 - soon but that is an example of how each 2:47 - computer or device on the Internet has 2:49 - its own IP address now unfortunately we 2:53 - are running out of IP addresses if you 2:55 - count up the total number of devices 2:57 - that can be on the internet is 256 x 256 3: x 256 which is approximately four 3:03 - billion different devices when the 3:05 - internet was first being conceived of 3:07 - that seemed like a perfectly valid 3:08 - number of IP addresses but when we enter 3:11 - a world where each one of you may have 3:13 - multiple devices and there's lots of 3:15 - hardware that connects all of the 3:17 - internet we have run and we're past four 3:19 - billion devices so they had to come up 3:21 - with a plan B there's two ways to 3:23 - address this problem the first is what 3:25 - they call IP version 6 and the idea of 3:28 - an IP version 6 is that you have a much
10 3:30 - longer IP address this is the actual IP 3:33 - address of another computer at the 3:34 - University of water leave that uses the 3:36 - IP version 6 ski with the IP version 6 3:39 - scheme we can handle 340 trillion 3:42 - trillion trillion devices on the 3:44 - internet and that should serve humankind 3:46 - for a long time the alternative scheme 3:49 - is called Nat 3:51 - so you did not type in :55-23 into your web browser you can just 3:58 - type in has there's a 4:02 - protocol named Dee and ask for domain 4:05 - name system and what happens is when you 4:08 - type in www waterloo your computer sends 4:12 - that request out to your local dns 4:14 - server and it then returns back the 4:17 - actual IP address 4:18 - of what you're trying to connect to sew 4:20 - it converts between a more user-friendly 4:22 - human name to an actual IP address now 4:26 - your local dns server may not know 4:28 - exactly where you water. CA is so it 4:31 - may go on to say for example the. see a 4:33 - dns server and says hey you're in canada 4:36 - do you know where this address is and 4:37 - then it may have come back with the 4:39 - number so it may require more than one 4:41 - hop to a different dns server but 4:43 - eventually no matter what name you type 4:45 - in it will come back there is an 4:48 - international body out there that 4:50 - decides who can get what name you cannot 4:52 - just go ahead and say hey can I be 4:54 - microsoft.com so what happens is you can 4:57 - register different names and you can go 4:59 - out and register names for yourself so 5:01 - you can have your own custom or vanity 5:02 - name or if you have a business you want 5:04 - to start up you can get your own name 5:06 - and then you what you do is you register 5:08 - that with an agency that associates your 5:11 - name with a real-world physical address
11 5:14 - and this is a controversial topic there 5:17 - are a lot of each country this is a 5:20 - controversial topic there are countries 5:22 - that control their own rules for how you 5:24 - can get a name 5:25 - so for example if you want to. CA 5:27 - within canada and then there's other new 5:30 - top-level domains such as. see a dot ed 5:33 - u dot org and each of these have their 5:36 - own rules for how you can obtain your 5:37 - own name at the end of the day though 5:39 - your computer just types in eight at the 5:42 - end of the day though you don't have to 5:44 - really worry about this you type in a 5:46 - name and they at the end of the day 5:50 - though you don't have to worry about 5:51 - this you just simply type in a name and 5:53 - your dns server will resolve that to an 5:55 - IP address now I mentioned that there's 5:58 - only four billion IP addresses out there 6:00 - how do you get an IP address 6:02 - well there's two categories of IP 6:04 - addresses this fixed IP addresses and 6:07 - big companies like Google and Microsoft 6:09 - have their own fixed IP addresses as 6:11 - well as organizations like the 6:13 - university of waterloo in fact every 6:16 - number that starts with is an 6:19 - actual University of Waterloo 6:20 - address what university of waterloo has 6:23 - that entire range but you're just a 6:25 - regular citizen and you want to connect 6:27 - to network whether you're at Waterloo or 6:30 - starbucks or at your home network and 6:32 - each one of your device's needs an IP 6:34 - address 6:36 - well the way these on the fly or 6:39 - temporary IP addresses are doled out is 6:41 - known as dhcp which stands for dynamic 6:45 - host configuration protocol so the idea 6:47 - is your device when it turns on and it 6:49 - tries to connect to a network it's sort 6:51 - of sense of message out hey I don't have 6:53 - an IP address can i have IP address
12 6:55 - please 6:56 - and then what happens is there's a dhcp 6:58 - server out there that has a bank of IP 7:01 - addresses that it can give out and what 7:03 - it will do is will give you an IP 7:05 - address that you can use and it also 7:07 - will expire after a certain amount of 7:09 - time so if you go to starbucks and 7:11 - starbucks gives you an IP address that's 7:13 - great but an hour later when you're gone 7:15 - someone else can get that same IP 7:17 - address and so the dhcp server just 7:19 - keeps track of addresses it has 7:20 - available and told them out as needed 7:23 - this is especially important for your 7:25 - mobile devices like your phone and 7:26 - laptop swear you may connect to multiple 7:28 - different networks now the last tricky 7:31 - piece I want to explain which will 7:33 - really help your understanding of how 7:34 - communication on the internet works is 7:36 - known as network address translation and 7:39 - when you connect to your home network or 7:41 - even starbucks or places on the campus 7:43 - this system is used so that we don't run 7:46 - out of IP addresses so how not actually 7:49 - works is a little complicated and I 7:51 - don't want to get bogged down in details 7:52 - so what I'm going to do is give you an 7:54 - analogy using physical addresses that 7:56 - will just give you an understanding of 7:57 - how basically it works so let's say we 7:59 - have an apartment building and that 8:01 - apartment building has a physical 8:02 - address known as 555 real street that's 8:05 - real physical address in our world but 8:07 - there's a whole bunch of people who live 8:09 - inside the apartment building and they 8:11 - don't even know they're at 55 real 8:13 - street they all think they live at 8:14 - imaginary lane one person might think 8:16 - they live at 100 imaginary lane and 8:18 - someone else might live at a hundred and
13 8:19 - one imagined 8:20 - Elaine so you might think you live at a 8:22 - hundred and one imaginary lane and then 8:24 - you want to send a postcard to your 8:25 - friend who lives at destination avenue 8:28 - so you fill out your postcard dear Bob 8:30 - at 789 destination avenue and you return 8:33 - address you put as a hundred and one 8:34 - imaginary lane and then what you do is 8:37 - you hand your postcard to the nice 8:40 - doorman who lives at real street 55 real 8:43 - street so you say hey doorman can you 8:45 - please deliver this postcard for me he 8:47 - says no problem and then what he does is 8:50 - he changes your return address to be 55 8:53 - real street 8:54 - unbeknownst to you and then he sends out 8:56 - the postcards the destination avenue and 8:58 - then your friend of destination having 9:00 - you get your postcard sees your address 9:02 - is 555 real street and then sends it 9:04 - back to you and then when it arrives the 9:07 - doorman looks at your postcard ago Zaha 9:09 - this is my friend who lives at a hundred 9:11 - one imaginary lane and again changes the 9:13 - address from real street back 201 9:17 - imaginary lane and then passes the 9:19 - postcard onto you you were completely 9:21 - oblivious to this whole thing the 9:22 - doorman was doing all of this managing 9:24 - for you 9:25 - so what happens is we can have hundreds 9:27 - or even thousands of computers all 9:29 - sharing the same physical address and 9:31 - this is another way of getting around 9:33 - this problem of running out of IP 9:35 - addresses so when you go on your 9:36 - computer and you ask your computer hey 9:39 - whats my IP address it might come up 9:41 - with a number such as imaginary lane and 9:44 - in fact if your IP address begins with 9: you live in imaginary lame 9:50 - alright we just discussed a few 9:52 - technical issues that help us understand
14 9:54 - how the internet works and how the 9:56 - internet protocol works but let's 9:58 - actually talk about Internet routing 9:59 - because that's one of the core parts of 10:01 - the IP protocol whenever your computer 10:04 - sends out a message it has a destination 10:06 - IP address and your computer sends that 10:08 - to a local router and that router may 10:11 - send it to another router 10:12 - another router and then another router 10:14 - and eventually you'll reach the computer 10:15 - that it wants to reach all of these 10:17 - individual routers are all connected 10:19 - together and are constantly sending 10:21 - millions of messages back and forth back 10:23 - and forth and that's how your message 10:25 - gets from one side of the world to 10:27 - another side of the world 10:28 - how does this work let's discuss how it 10:30 - works in the real world say you live in 10:32 - kitchener waterloo and you want to send 10:34 - your postcard to someone in England 10:36 - well you fill out your postcard and you 10:38 - get someone's address in England and 10:40 - then you take it to your local mailbox 10:42 - and then someone picks up that postcard 10:44 - from the mailbox it takes it to a 10:45 - central depot and they look at the 10:47 - address and they say oh this one's going 10:49 - to England so i might send that to the 10:51 - central Ontario dispatch I don't know 10:52 - how it actually works in the real world 10:54 - I'm making this up but we can imagine 10:55 - that it goes to a central Ontario 10:57 - dispatch and they look at someone looks 10:58 - at the address there and goes all this 11:00 - is going to England so they take it to a 11:01 - candidate dispatch center and then at 11:03 - the candidate dispatch center they look 11:05 - at this address and go all this is going 11:07 - to England well let's put it on this 11:08 - boat that travels to England and it goes 11:10 - over the see me on some sort of big boat
15 11:15 - and he gets over to England and then 11:16 - someone opens it up and goes I ok well 11:19 - you want to go to London England so 11:21 - let's put it and let's give it off to 11:23 - someone who delivers in that region and 11:26 - then eventually you'll get narrow and 11:28 - narrow and smaller and eventually it 11:29 - will show up at someone's house so this 11:32 - idea of each person who looks at the 11:34 - postcard along the way nose in general 11:38 - which direction the postcard has to go 11:40 - and it's complicated but that's how all 11:43 - the network routers on the internet work 11:45 - whenever you send out a message each one 11:47 - of them send it to another router that 11:49 - will get you closer and closer to your 11:51 - destination now it's hard to visualize 11:53 - how all the routers in the world are 11:55 - connected i stole this photo and this is 11:57 - from 1999 so this is even a long time 12:00 - ago but this is a visualization of many 12:02 - of the routers that exist in the real 12:04 - world and so you can see how you might 12:06 - start in one corner of this giant 12:09 - network and make your way through a 12:12 - whole bunch of different paths to your 12:13 - destination at the other side of the 12:15 - world in general every message you sent 12:17 - on the internet takes less than 50 hops 12:20 - and a hot being goes from one router to 12:22 - another 12:22 - router that's still a lot but you can 12:24 - reach almost any computer from any other 12:26 - computer in the world within about 50 12:28 - hot and that's how all the messages on 12:30 - the internet get transmitted
IT 341: Introduction to System
IT 341: Introduction to System Administration Private IP Addresses and the Internet Using IP Addresses to Communicate Over the Internet Network Address Translation Private IP Addresses and the Internet
More informationTable of Contents. Cisco How NAT Works
Table of Contents How NAT Works...1 This document contains Flash animation...1 Introduction...1 Behind the Mask...2 Dynamic NAT and Overloading Examples...5 Security and Administration...7 Multi Homing...9
More informationPROFESSOR: Last time, we took a look at an explicit control evaluator for Lisp, and that bridged the gap between
MITOCW Lecture 10A [MUSIC PLAYING] PROFESSOR: Last time, we took a look at an explicit control evaluator for Lisp, and that bridged the gap between all these high-level languages like Lisp and the query
More informationIPv6. The Future of the Internet Some Day
IPv6 The Future of the Internet Some Day Do You Need IPv6? NO! (Well, Probably Not) Should You Know About IPv6? YES! Standard Disclaimer I am certainly not an expert on this. What I'm showing here is my
More informationMITOCW watch?v=w_-sx4vr53m
MITOCW watch?v=w_-sx4vr53m The following content is provided under a Creative Commons license. Your support will help MIT OpenCourseWare continue to offer high-quality educational resources for free. To
More informationCS144 Final Review. Dec 4th, 2009 Tom Wiltzius
CS144 Final Review Dec 4th, 2009 Tom Wiltzius Topics Topics In narrative format! Let's follow Packy as he traverses the Internet! Packy comes into being to help Compy the Computer load a web page Compy
More informationPROFESSOR: Well, now that we've given you some power to make independent local state and to model objects,
MITOCW Lecture 5B PROFESSOR: Well, now that we've given you some power to make independent local state and to model objects, I thought we'd do a bit of programming of a very complicated kind, just to illustrate
More informationInstructor: Craig Duckett. Lecture 03: Tuesday, April 3, 2018 SQL Sorting, Aggregates and Joining Tables
Instructor: Craig Duckett Lecture 03: Tuesday, April 3, 2018 SQL Sorting, Aggregates and Joining Tables 1 Assignment 1 is due LECTURE 5, Tuesday, April 10 th, 2018 in StudentTracker by MIDNIGHT MID-TERM
More informationMITOCW watch?v=zm5mw5nkzjg
MITOCW watch?v=zm5mw5nkzjg The following content is provided under a Creative Commons license. Your support will help MIT OpenCourseWare continue to offer high quality educational resources for free. To
More informationHow To Manually Push s On Iphone And Computer At The Same Time
How To Manually Push Emails On Iphone And Computer At The Same Time Introducing Pushbullet for ios, Mac, and Safari No more taking your phone out of your pocket all the time while working at your Mac.
More informationLinked Lists. What is a Linked List?
Linked Lists Along with arrays, linked lists form the basis for pretty much every other data stucture out there. This makes learning and understand linked lists very important. They are also usually the
More informationIt s possible to get your inbox to zero and keep it there, even if you get hundreds of s a day.
It s possible to get your email inbox to zero and keep it there, even if you get hundreds of emails a day. It s not super complicated, though it does take effort and discipline. Many people simply need
More informationSetting Up OS/2 Peer-to-Peer Networking & Coexistence of Warp & NT Machines
Setting Up OS/2 Peer-to-Peer Networking & Coexistence of Warp & NT Machines 1998, Frank R. Field, III (furd@mit.edu) (Last revision: February 13, 1998} Ed. Original version is http://web.mit.edu/activities/os2/peer/warppeer.htm.
More information(Refer Slide Time: 00:30)
Information Security Sri Vasan V S Principal Consultant Department of Computer Science and Engineering Indian Institute of Technology, Madras Module 25 Linux File Comparison So in this module we will be
More informationChapter 3. The Basics of Networking
Chapter 3 The Basics of Networking Learning Objectives Tell whether a communication technology (Internet, radio, LAN, etc.) is synchronous or asynchronous; broadcast or point-to-point Explain the roles
More informationLesson 3 Transcript: Part 1 of 2 - Tools & Scripting
Lesson 3 Transcript: Part 1 of 2 - Tools & Scripting Slide 1: Cover Welcome to lesson 3 of the db2 on Campus lecture series. Today we're going to talk about tools and scripting, and this is part 1 of 2
More information1 Connectionless Routing
UCSD DEPARTMENT OF COMPUTER SCIENCE CS123a Computer Networking, IP Addressing and Neighbor Routing In these we quickly give an overview of IP addressing and Neighbor Routing. Routing consists of: IP addressing
More informationWYBCS Android Programming (with AppInventor) Family fun day
WYBCS Android Programming (with AppInventor) Family fun day Overview of the day Intros Hello Android! Installing AppInventor Overview of AppInventor Making your first app What's special about mobile? Changing
More informationMITOCW watch?v=0jljzrnhwoi
MITOCW watch?v=0jljzrnhwoi The following content is provided under a Creative Commons license. Your support will help MIT OpenCourseWare continue to offer high quality educational resources for free. To
More informationMITOCW ocw f99-lec07_300k
MITOCW ocw-18.06-f99-lec07_300k OK, here's linear algebra lecture seven. I've been talking about vector spaces and specially the null space of a matrix and the column space of a matrix. What's in those
More informationBCSWomen Android programming (with AppInventor) Family fun day World record attempt
BCSWomen Android programming (with AppInventor) Family fun day World record attempt Overview of the day Intros Hello Android! Getting your app on your phone Getting into groups Ideas for apps Overview
More informationLesson 5 Transcript: Client Connectivity
Lesson 5 Transcript: Client Connectivity Slide 1: Cover Welcome to lesson 5 of the DB2 on Campus Series. Today we are going to talk about client connectivity. My name is Raul Chong, and I'm the DB2 on
More informationIn particular, we have seen this already when we looked at how images are just bits We started with a very simple device that can be in one of two
1 So far in this course, we have focused on how mathematics and computer science enable us to understand complex phenomena in the world around us. We did this by following a simple process: We start by
More informationIntro. Speed V Growth
Intro Good code is two things. It's elegant, and it's fast. In other words, we got a need for speed. We want to find out what's fast, what's slow, and what we can optimize. First, we'll take a tour of
More informationP1_L3 Operating Systems Security Page 1
P1_L3 Operating Systems Security Page 1 that is done by the operating system. systems. The operating system plays a really critical role in protecting resources in a computer system. Resources such as
More informationSubscribe To The Blog Program in itunes Click Here
THE BLOG PROGRAM Podcast Transcript Episode 29 30 Email Marketing Power Tips For Bloggers (Part 3 of 3) To get automatic updates of this show to your mobile device, you can subscribe here: Click here to
More informationHow to Improve Your Campaign Conversion Rates
How to Improve Your Email Campaign Conversion Rates Chris Williams Author of 7 Figure Business Models How to Exponentially Increase Conversion Rates I'm going to teach you my system for optimizing an email
More informationBBC Learning English Face up to Phrasals Mark's Mistake
BBC Learning English Face up to Phrasals Mark's Email Mistake Episode 1: Email Fun? Mark: Hey Ali, did you check out that email I sent you the one about stupid Peter, saying how stupid he is? Oh dear.
More informationRobert Ragan s TOP 3
Robert Ragan s TOP 3 Internet Genealogy Research POWER TECHNIQUES that Have Stunned Audiences POWER TECHNIQUES TWO: Robert s Unique "Gather, Store and Quick Find Method." You'll have to see it to believe
More informationHow Do I Manually Lock My Iphone 4s A Hotspot Verizon
How Do I Manually Lock My Iphone 4s A Hotspot Verizon Activation and Setup Guide for Apple iphone 4s and iphone 4 8 GB - New Watch this video to learn how to activate a device on your existing My Verizon
More informationAn Introduction to Maple This lab is adapted from a lab created by Bob Milnikel.
Some quick tips for getting started with Maple: An Introduction to Maple This lab is adapted from a lab created by Bob Milnikel. [Even before we start, take note of the distinction between Tet mode and
More informationMITOCW watch?v=hverxup4cfg
MITOCW watch?v=hverxup4cfg PROFESSOR: We've briefly looked at graph isomorphism in the context of digraphs. And it comes up in even more fundamental way really for simple graphs where the definition is
More informationComputer Networks Prof. S. Ghosh Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture 28 IP Version 4
Computer Networks Prof. S. Ghosh Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture 28 IP Version 4 Good day, we will talk about IP version 4 that is the internet
More informationMITOCW watch?v=flgjisf3l78
MITOCW watch?v=flgjisf3l78 The following content is provided under a Creative Commons license. Your support will help MIT OpenCourseWare continue to offer high-quality educational resources for free. To
More informationInstructor: Craig Duckett. Lecture 04: Thursday, April 5, Relationships
Instructor: Craig Duckett Lecture 04: Thursday, April 5, 2018 Relationships 1 Assignment 1 is due NEXT LECTURE 5, Tuesday, April 10 th in StudentTracker by MIDNIGHT MID-TERM EXAM is LECTURE 10, Tuesday,
More informationA Simplified Example of TCP/IP Communication Chuck Cusack
A Simplified Example of TCP/IP Communication Chuck Cusack This is a simple example of how messages are sent from one machine to another (from a source to a destination) using the four-layer Internet software
More informationTaking Control of Your . Terry Stewart Lowell Williamson AHS Computing Monday, March 20, 2006
Taking Control of Your E-Mail Terry Stewart Lowell Williamson AHS Computing Monday, March 20, 2006 Overview Setting up a system that works for you Types of e-mail Creating appointments, contacts and tasks
More information9 R1 Get another piece of paper. We re going to have fun keeping track of (inaudible). Um How much time do you have? Are you getting tired?
Page: 1 of 14 1 R1 And this is tell me what this is? 2 Stephanie x times y plus x times y or hm? 3 R1 What are you thinking? 4 Stephanie I don t know. 5 R1 Tell me what you re thinking. 6 Stephanie Well.
More informationFormal Methods of Software Design, Eric Hehner, segment 1 page 1 out of 5
Formal Methods of Software Design, Eric Hehner, segment 1 page 1 out of 5 [talking head] Formal Methods of Software Engineering means the use of mathematics as an aid to writing programs. Before we can
More informationWeb Mechanisms. Draft: 2/23/13 6:54 PM 2013 Christopher Vickery
Web Mechanisms Draft: 2/23/13 6:54 PM 2013 Christopher Vickery Introduction While it is perfectly possible to create web sites that work without knowing any of their underlying mechanisms, web developers
More informationFor those who might be worried about the down time during Lync Mobility deployment, No there is no down time required
I was trying to find out the Lync Mobility service step by step deployment guide along with the Publishing rule for TMG but couldn't find anywhere except how to install MCX and Auto discovery Service,
More informationText transcript of show #280. August 18, Microsoft Research: Trinity is a Graph Database and a Distributed Parallel Platform for Graph Data
Hanselminutes is a weekly audio talk show with noted web developer and technologist Scott Hanselman and hosted by Carl Franklin. Scott discusses utilities and tools, gives practical how-to advice, and
More informationIn today s video I'm going show you how you can set up your own online business using marketing and affiliate marketing.
Hey guys, Diggy here with a summary of part two of the four part free video series. If you haven't watched the first video yet, please do so (https://sixfigureinc.com/intro), before continuing with this
More informationLesson 4 Transcript: DB2 Architecture
Lesson 4 Transcript: DB2 Architecture Slide 1: Cover Welcome to Lesson 4 of the DB2 on campus series. Today we are going to talk about the DB2 architecture. My name is Raul Chong and I am the DB2 on Campus
More informationSlide 1 CS 170 Java Programming 1 Testing Karel
CS 170 Java Programming 1 Testing Karel Introducing Unit Tests to Karel's World Slide 1 CS 170 Java Programming 1 Testing Karel Hi Everybody. This is the CS 170, Java Programming 1 lecture, Testing Karel.
More informationI'm Andy Glover and this is the Java Technical Series of. the developerworks podcasts. My guest is Brian Jakovich. He is the
I'm Andy Glover and this is the Java Technical Series of the developerworks podcasts. My guest is Brian Jakovich. He is the director of Elastic Operations for Stelligent. He and I are going to talk about
More informationInstructor: Craig Duckett. Lecture 07: Tuesday, April 17 th, 2018 Conflicts and Isolation, MySQL Workbench
Instructor: Craig Duckett Lecture 07: Tuesday, April 17 th, 2018 Conflicts and Isolation, MySQL Workbench 1 MID-TERM EXAM is LECTURE 10, Tuesday, May 1st Assignment 2 is due LECTURE 12, Tuesday, May 8
More informationHow To Make 3-50 Times The Profits From Your Traffic
1 How To Make 3-50 Times The Profits From Your Traffic by Chris Munch of Munchweb.com Copyright Munchweb.com. All Right Reserved. This work cannot be copied, re-published, or re-distributed. No re-sell
More informationPROFESSOR: Well, yesterday we learned a bit about symbolic manipulation, and we wrote a rather stylized
MITOCW Lecture 4A PROFESSOR: Well, yesterday we learned a bit about symbolic manipulation, and we wrote a rather stylized program to implement a pile of calculus rule from the calculus book. Here on the
More informationICANN Start, Episode 1: Redirection and Wildcarding. Welcome to ICANN Start. This is the show about one issue, five questions:
Recorded in October, 2009 [Music Intro] ICANN Start, Episode 1: Redirection and Wildcarding Welcome to ICANN Start. This is the show about one issue, five questions: What is it? Why does it matter? Who
More informationHello, and welcome to another episode of. Getting the Most Out of IBM U2. This is Kenny Brunel, and
Hello, and welcome to another episode of Getting the Most Out of IBM U2. This is Kenny Brunel, and I'm your host for today's episode which introduces wintegrate version 6.1. First of all, I've got a guest
More informationPacket: Data can be broken into distinct pieces or packets and then reassembled after delivery. Computers on the Internet communicate via packets.
Broadband Setup from A to Z Print out all the info below and get to work...have fun!! A word of caution! It is very important that you SECURE your wireless network using WEP or WPA encryption (password).
More informationLecture 05 Application Layer - I
Computer Networks and Internet Protocol Prof. Soumya Kanti Ghosh Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture 05 Application Layer - I Hi. So, we will
More informationIf Statements, For Loops, Functions
Fundamentals of Programming If Statements, For Loops, Functions Table of Contents Hello World Types of Variables Integers and Floats String Boolean Relational Operators Lists Conditionals If and Else Statements
More informationOut for Shopping-Understanding Linear Data Structures English
Out for Shopping-Understanding Linear Data Structures English [MUSIC PLAYING] [MUSIC PLAYING] TANZEELA ALI: Hi, it's Tanzeela Ali. I'm a software engineer, and also a teacher at Superior University, which
More informationANALOGIES TO HELP EXPLAIN INBOUND MARKETING
1 7 AWESOME ANALOGIES TO HELP EXPLAIN INBOUND MARKETING q A Publication of HubSpot s Partner Program 2 WHO WROTE THIS EBOOK? More like, who didn t write this ebook?!? The analogies on the next 14 pages
More informationMITOCW watch?v=se4p7ivcune
MITOCW watch?v=se4p7ivcune The following content is provided under a Creative Commons license. Your support will help MIT OpenCourseWare continue to offer high quality educational resources for free. To
More informationCODE MAROON TEST SEPT. 30, 2011 SURVEY RESULTS
CODE MAROON TEST SEPT. 30, 2011 SURVEY RESULTS SMS (text) Message 1. Respondents were asked if they received the Code Maroon test by SMS (text) message. The responses indicate that 93% of the respondents
More informationFig (1) sending and receiving s
Electronic Mail Protocols (SMTP, POP, IMAP) It is important to (1) distinguish the user interface (i.e., your mail reader) from the underlying message transfer protocols (such as SMTP, POP or IMAP), and
More informationHi everyone. Starting this week I'm going to make a couple tweaks to how section is run. The first thing is that I'm going to go over all the slides
Hi everyone. Starting this week I'm going to make a couple tweaks to how section is run. The first thing is that I'm going to go over all the slides for both problems first, and let you guys code them
More informationDjango urls Django Girls Tutorial
Django urls Django Girls Tutorial about:reader?url=https://tutorial.djangogirls.org/en/django_urls/ 1 di 6 13/11/2017, 20:01 tutorial.djangogirls.org Django urls Django Girls Tutorial DjangoGirls 6-8 minuti
More informationLecture (02) The TCP/IP Networking Model
Agenda ١ Lecture (02) The TCP/IP Networking Model Dr. Ahmed M. ElShafee Introduction to networking architecture Historical background The TCP/IP Protocol Architecture The TCP/IP Application Layer The TCP/IP
More informationDESIGN YOUR OWN BUSINESS CARDS
DESIGN YOUR OWN BUSINESS CARDS USING VISTA PRINT FREE CARDS I m sure we ve all seen and probably bought the free business cards from Vista print by now. What most people don t realize is that you can customize
More informationPost Experiment Interview Questions
Post Experiment Interview Questions Questions about the Maximum Problem 1. What is this problem statement asking? 2. What is meant by positive integers? 3. What does it mean by the user entering valid
More informationWhere we are in the Course
Network Layer Where we are in the Course Moving on up to the Network Layer! Application Transport Network Link Physical CSE 461 University of Washington 2 Network Layer How to connect different link layer
More informationmismatch between what is maybe possible today and what is going on in many of today's IDEs.
What will happen if we do very, very small and lightweight tools instead of heavyweight, integrated big IDEs? Lecturer: Martin Lippert, VMware and Eclispe tooling expert LIPPERT: Welcome, everybody, to
More informationWeek - 01 Lecture - 04 Downloading and installing Python
Programming, Data Structures and Algorithms in Python Prof. Madhavan Mukund Department of Computer Science and Engineering Indian Institute of Technology, Madras Week - 01 Lecture - 04 Downloading and
More informationCS4450. Computer Networks: Architecture and Protocols. Lecture 13 THE Internet Protocol. Spring 2018 Rachit Agarwal
CS4450 Computer Networks: Architecture and Protocols Lecture 13 THE Internet Protocol Spring 2018 Rachit Agarwal 2 Reflection The events in last few days have left me sad! Such events must be condemned
More informationMITOCW watch?v=qota76ga_fy
MITOCW watch?v=qota76ga_fy The following content is provided under a Creative Commons license. Your support will help MIT OpenCourseWare continue to offer high quality educational resources for free. To
More informationAT&T Voice DNA Administrator Guide
AT&T Voice DNA Administrator Guide GET STARTED Page 2 Contents GET STARTED... 5 Log In... 6 About the AT&T Voice DNA Administrator Dashboard... 10 Use Search... 16 Move IP Phones... 22 Support... 33 Frequently
More informationChrome if I want to. What that should do, is have my specifications run against four different instances of Chrome, in parallel.
Hi. I'm Prateek Baheti. I'm a developer at ThoughtWorks. I'm currently the tech lead on Mingle, which is a project management tool that ThoughtWorks builds. I work in Balor, which is where India's best
More informationHow to Stay Safe on Public Wi-Fi Networks
How to Stay Safe on Public Wi-Fi Networks Starbucks is now offering free Wi-Fi to all customers at every location. Whether you re clicking connect on Starbucks Wi-Fi or some other unsecured, public Wi-Fi
More informationCNBK Communications and Networks Lab Book: Purpose of Hardware and Protocols Associated with Networking Computer Systems
Lab Book: Purpose of Hardware and Protocols Associated with Networking Computer Systems Contents Purpose of Hardware and Protocols Associated with Computer Networks... 3 Lab Objectives... 3 Lab Resources...
More informationLecture (02) The TCP/IP Networking Model
Lecture (02) The TCP/IP Networking Model Dr. Ahmed M. ElShafee ١ Agenda Introduction to networking architecture Historical background The TCP/IP Protocol Architecture The TCP/IP Application Layer The TCP/IP
More informationHow to Get Your Inbox to Zero Every Day
How to Get Your Inbox to Zero Every Day MATT PERMAN WHATSBESTNEXT.COM It s possible to get your email inbox to zero and keep it there, even if you get hundreds of emails a day. It s not super complicated,
More information(Refer Slide Time: 02.06)
Data Structures and Algorithms Dr. Naveen Garg Department of Computer Science and Engineering Indian Institute of Technology, Delhi Lecture 27 Depth First Search (DFS) Today we are going to be talking
More informationCOMP 2000 W 2012 Lab no. 3 Page 1 of 11
COMP 2000 W 2012 Lab no. 3 Page 1 of 11 Lab Introduction Background The Internet is based on packet-switched protocols. Information is carried in packets (it is divided into packets), which can be imagined
More informationData Structures and Algorithms Dr. Naveen Garg Department of Computer Science and Engineering Indian Institute of Technology, Delhi.
Data Structures and Algorithms Dr. Naveen Garg Department of Computer Science and Engineering Indian Institute of Technology, Delhi Lecture 18 Tries Today we are going to be talking about another data
More informationArduino IDE Friday, 26 October 2018
Arduino IDE Friday, 26 October 2018 12:38 PM Looking Under The Hood Of The Arduino IDE FIND THE ARDUINO IDE DOWNLOAD First, jump on the internet with your favorite browser, and navigate to www.arduino.cc.
More informationInstructor (Mehran Sahami):
Programming Methodology-Lecture09 Instructor (Mehran Sahami): Alrighty, welcome back. Wow, that's pretty loud. Welcome back to CS106a. I hope I didn't just shatter your eardrums. And thanks for making
More informationMITOCW watch?v=yarwp7tntl4
MITOCW watch?v=yarwp7tntl4 The following content is provided under a Creative Commons license. Your support will help MIT OpenCourseWare continue to offer high quality, educational resources for free.
More informationLesson 9 Transcript: Backup and Recovery
Lesson 9 Transcript: Backup and Recovery Slide 1: Cover Welcome to lesson 9 of the DB2 on Campus Lecture Series. We are going to talk in this presentation about database logging and backup and recovery.
More informationMITOCW MIT6_172_F10_lec18_300k-mp4
MITOCW MIT6_172_F10_lec18_300k-mp4 The following content is provided under a Creative Commons license. Your support will help MIT OpenCourseWare continue to offer high quality educational resources for
More informationChapter 1. Introduction. 1.1 Understanding Bluetooth as a Software Developer
Chapter 1 Introduction Bluetooth is a way for devices to wirelessly communicate over short distances. Wireless communication has been around since the late nineteenth century, and has taken form in radio,
More informationSmart formatting for better compatibility between OpenOffice.org and Microsoft Office
Smart formatting for better compatibility between OpenOffice.org and Microsoft Office I'm going to talk about the backbreaking labor of helping someone move and a seemingly unrelated topic, OpenOffice.org
More informationRuby on Rails Welcome. Using the exercise files
Ruby on Rails Welcome Welcome to Ruby on Rails Essential Training. In this course, we're going to learn the popular open source web development framework. We will walk through each part of the framework,
More informationConfiguring a Microsoft Windows 2000 DHCP and DNS Server
Configuring a Microsoft Windows 2000 DHCP and DNS Server White Paper Abstract This white paper sets out to describe the steps necessary to install a Brother printer into a Windows 2000 network that is
More informationThe following content is provided under a Creative Commons license. Your support
MITOCW Lecture 9 The following content is provided under a Creative Commons license. Your support will help MIT OpenCourseWare continue to offer high-quality educational resources for free. To make a donation
More informationA Step by Step Guide to Postcard Marketing Success
A Step by Step Guide to Postcard Marketing Success Table of Contents Why VerticalResponse?...3 Why Postcards?...4 So why use postcards in this modern era?...4 Quickstart Guide...6 Step 1: Setup Your Account...8
More informationTCP/IP stack is the family of protocols that rule the current internet. While other protocols are also used in computer networks, TCP/IP is by far
TCP/IP stack is the family of protocols that rule the current internet. While other protocols are also used in computer networks, TCP/IP is by far the most common of them. TCP/IP can be compared to the
More informationVideo/Audio Transcript
Video/Audio Transcript Video Title: How to apply for the New OSAP Date: June 6, 2017 Running Time: 5:16 0:00 [Music begins] 0:01 [Green text on a white background appears saying: How to apply for OSAP:
More informationPowerful communications solution provides cost-effective mobility for Valley ENT medical practitioners and greater accessibility for patients
Valley ENT Powerful communications solution provides cost-effective mobility for Valley ENT medical practitioners and greater accessibility for patients Mitel Series X revitalizes ailing network There
More informationThe following content is provided under a Creative Commons license. Your support
MITOCW Lecture 8 The following content is provided under a Creative Commons license. Your support will help MIT OpenCourseWare continue to offer high quality educational resources for free. To make a donation
More informationWell, Hal just told us how you build robust systems. The key idea was-- I'm sure that many of
MITOCW Lecture 3B [MUSIC PLAYING] Well, Hal just told us how you build robust systems. The key idea was-- I'm sure that many of you don't really assimilate that yet-- but the key idea is that in order
More informationMITOCW watch?v=r6-lqbquci0
MITOCW watch?v=r6-lqbquci0 The following content is provided under a Creative Commons license. Your support will help MIT OpenCourseWare continue to offer high quality educational resources for free. To
More informationInstalling and Configuring the Voice UPB Bridge updated 22-Jan-2018
Installing and Configuring the Voice UPB Bridge updated 22-Jan-2018 Before starting these instructions, you should already have your Voice assistant installed and working. These instructions can be used
More information1 GSW Bridging and Switching
1 Sandwiched between the physical and media access layers of local area networking (such as Ethernet) and the routeing of the Internet layer of the IP protocol, lies the thorny subject of bridges. Bridges
More informationIP subnetting made easy
Version 1.0 June 28, 2006 By George Ou Introduction IP subnetting is a fundamental subject that's critical for any IP network engineer to understand, yet students have traditionally had a difficult time
More informationPart 2: The Material PART 2
PART 2 With the introduction of what an object is, now we are ready to learn the CONSTRUCTOR concept. Just to refresh our memory, let s take a look at what we have learned in part 1. A sample class declaration,
More informationThe Stack, Free Store, and Global Namespace
Pointers This tutorial is my attempt at clarifying pointers for anyone still confused about them. Pointers are notoriously hard to grasp, so I thought I'd take a shot at explaining them. The more information
More information