CH. 2 Network Models
|
|
- Beatrice Walker
- 5 years ago
- Views:
Transcription
1 Islamic University of Gaza Faculty of Engineering Computer Engineering Department Data com. Discussion ECOM 4014 Lecture # 2 CH. 2 Network Models By Eng. Wafaa Audah Sep. 2013
2 OSI Model Open Systems Interconnection (7-Layers) الشكل المقابل يمثل توزيع ال layers وترتيبها باآللية التي يمثلها ال OSI - Every layer serve its upper layer. - Peer-peer process: كم layer ترع ف عه انذاذا - انهه واصهح نها ي ال layer انه فىقها header هادا انه ذر ت كى ت ذرى عذج شغالخ يه ح دسة ال layer انه ظافرى. آن ح االظافح تركى تانذزكح ي االعه نألسفم ع ذ ان زسم وي االسفم ان االعه ع ذ ان سرقثم ونك تاخرالف ا ى ع ذ ان سرقثم ت رى انذذف او االسانح نهادا ال header فثانران يذرىي انثاك د او انه واصم كم غثقح ع ذ ان زسم رح كى فسى ع ذ ان سرقثم ته ك ت كى انرىاصم وكأ ى صار ت كم غثقح ويث هرها ي ان اد ر تغط ان ظز شى صارتانطز ق ت هى. * بيكىن في الشبكة بيه المرسل والمستقبل intermediate nodes -عه سث م ان ثال router ت كى ذعايم هادا انزاوذز وانرىاصم يعى ي خالل انثالز غثقاخ االون ي االسفم وانه ت س هى انطثقاخ انذاع ح نهشثكح. ايا تان سثح ل switch فث ع م تس عاول غثقر ي االسفم. 2
3 اضافة الهيدرز مه الطبقات السفلية بيكىن كالتالي 3
4 The Physical Layer - The physical layer is responsible for ensuring that a stream of bits is transmitted between two nodes sharing a single link. - The physical layer coordinates all the functions required to transmit a bit stream over the physical medium. - Data rate: Transmission rate number of bits sent per second - Synchronization of bits. هذا ع ا ان زسم وان سرقثم جة ا سرع هى فس ال data rate ك ا أ عا جة ا رى قم انثراخ دسة ال clock ترشاي ت ان زسم وان سرقثم نع ا قم انثراخ تانرزذ ة وانىقد انصذ خ. The Data Link Layer - The data link layer is responsible for ensuring that a packet of data is successfully transmitted between two adjacent nodes in the network. - Flow control: Prevent overwhelming the receiver. - Error control: Detect and retransmit damaged or lost frames; Prevent duplication of frames; using trailer. Hop-to-hop (node-to-node) delivery: add physical address as a header, also add a tailor for error control. Network Layer The network layer is responsible for the delivery of packets from the original source to the final destination. The responsibilities of the network layer: - Logical addressing. - Routing: 4
5 Transport Layer The transport layer is responsible for delivery of a message from one process to another. Responsibilities of the transport layer - Port addressing - Flow control - Error control Session, presentation layers (according to the Dr s recommendations) are not important Application Layer The application layer is the interface between the user and the network (session, presentation and application layers are user support layers) Some of services - Network virtual terminal: Logon to a remote host. - File transfer, access, and management. - Mail services TCP/IP Protocol Suite (Internet Model) 5
6 Packet or Stream of bits The most important protocols according to the layers ADDRESSING There are four levels of addresses are used in an internet employing the TCP/IP protocols. 6
7 Physical Address (يرغ ز و ثم ع ىا انه ك انران ون س ان سرقثم ان هائ ( address Link Logical Address (ثاتد و ثم ان زسم وان سرقثم ان هائ ) Universal addressing Port Address Processes addresses Specific Address Text-Book Questions Review Questions 2. Which layers in the Internet model are the network support layers? The network support layers are the physical, data link, and network layers. 3. Which layer in the Internet model is the user support layer? The application layer supports the user. 7. What are headers and trailers, and how do they get added and removed? Headers and trailers are control data added at the beginning and the end of each data unit at each layer of the sender and removed at the corresponding layers of the receiver. They provide source and destination addresses, synchronization points, information for error detection, etc. 7
8 Exercises 16. Match the following to one or more layers of the OSI model: a. Route determination: Network Layer b. Flow control: Data link, Transport Layers c. Interface to transmission media: Physical Layer d. Provides access for the end user: Application Layer 20. In Figure 2.22, computer A sends a message to computer D via LANl, router Rl, and LAN2. Show the contents of the packets and frames at the network and data link layer for each hop interface. حسب الشرح السابق واضافة كل طبقة للهيدرز الخاصة بها الحل هى كالتالي: 8
9 ع كى 21. In Figure 2.22, assume that the communication is between a process running at computer A with port address i and a process running at computer D with port address j. Show the contents of packets and frames at the network, data link, and transport layer for each hop. 22. Suppose a computer sends a frame to another computer on a bus topology LAN. The physical destination address of the frame is corrupted during the transmission. What happens to the frame? How can the sender be informed about the situation? If the corrupted destination address does not match any station address in the network, the packet is lost. If the corrupted destination address matches one of the stations, the frame is delivered to the wrong station. In this case, however, the error detection mechanism, available in most data link protocols, will find the error and discard the frame. In both cases, the source will somehow be informed using one of the data link control mechanisms discussed in Chapter 11. انع او ادذ ىافق انخهم ياصار تعذ انجذ ذ ان ىجىدج ع ا ادر ان ه ا ايا ا انع ىا تانران رح ذىصم انذاذا تس نهع ىا انغهػ!! ايا االدر ال ذع ع يا ىافق ا ى فهى انرا ع ىا ا ا انع ىا نسر ش يىجىدج تانران انثاك د ان زسهح detection تانذانر يفزوض كى ف ي ثىد خاصح ب error نهذاذا وذع ذ ارسانها تشكم صذ خ انغاء وذع م ا زور ا ى صار ذعزف السو See You at Next lecture Best Wishes 9
ES623 Networked Embedded Systems
ES623 Networked Embedded Systems Introduction to Network models & Data Communication 16 th April 2013 OSI Models An ISO standard that covers all aspects of network communication is the Open Systems Interconnection
More informationERD ENTITY RELATIONSHIP DIAGRAM
ENTITY RELATIONSHIP DIAGRAM M. Rasti-Barzoki Website: Entity Relationship Diagrams for Data Modelling An Entity-Relationship Diagram () shows how the data that flows in the system is organised and used.
More information0 0 0 E-mail : ccce@uob.edu.iq Site: cc.uobaghdad.edu.iq فتاه :00 :0 :00 :0 :00 :0 :00 :0 :00 :0 :00 :0 :00 :0 :00 :0 :00 :0 0 0 :00 :0 Online ICDL - - - ICDL - - - ICDL - - - - 0:00 :0 :0 :00 :0 :00 :0
More informationOUR LOGO. SYMBOL LOGO SYMBOL LOGO ORIGINAL STRUCTURE
OUR LOGO. ORIGINAL STRUCTURE SYMBOL LOGO SYMBOL LOGO OUR COLORS. Infographic Color 2A3942 FED708 2A3942 E77525 804D9F CLEAR SPACE. PRINT SAFE AREA MINIMUM SIZE - PRINT H: 30 pt ONLINE SAFE AREA MINIMUM
More informationImproved Method for Sliding Window Printed Arabic OCR
th Int'l Conference on Advances in Engineering Sciences & Applied Mathematics (ICAESAM'1) Dec. -9, 1 Kuala Lumpur (Malaysia) Improved Method for Sliding Window Printed Arabic OCR Prof. Wajdi S. Besbas
More informationThe History and the layers of the OSI Model 30 - October
THE OSI MODEL Established in 1947, the International Standards Organization (ISO) is a multinational body dedicated to worldwide agreement on international standards. An ISO standard that covers all aspects
More informationUmbrella. Branding & Guideline
Umbrella. Branding & Guideline OUR LOGO. OUR COLORS. #FFFFFF Font COLOR #2A3942 #64A0C6 mix color C: 75% M: 68% Y: 67% K: 90% H: 320 S:61% B:0 R:0 G:0 B:0 C: 75% M: 68% Y: 67% K: 90% H: 320 S:61% B:0 R:0
More informationArabic Text Segmentation
Arabic Text Segmentation By Dr. Salah M. Rahal King Saud University-KSA 1 OCR for Arabic Language Outline Introduction. Arabic Language Arabic Language Features. Challenges for Arabic OCR. OCR System Stages.
More informationREEM READYMIX Brand Guideline
REEM READYMIX Brand Guideline Implementing Reem Readymix brand in communications V.I - February 2018 Introduction Reem Readymix is a leading supplier of all types of readymix concrete and cementbased plastering
More informationIdentity Guidelines. December 2012
Identity Guidelines December 2012 Identity Guidelines Contents 1.0 Our Logo Our logo Our wordmark Colour treatments Clear space, large and small sizes Correct logo placement Incorrect logo usage 2.0 Colour
More informationqatar national day 2017 brand guidelines 2017
2017 brand guidelines 2017 the following guidelines demonstrate how best to apply the brand 2 CONTENTS 3 contents p5. vision & mission p7. logo p8. logo rationale p9. logo clear space p10. logo do s p11.
More informationNetwork Models. Behrouz A. Forouzan Data communication and Networking Fourth edition
Chapter 2 Network Models Behrouz A. Forouzan Data communication and Networking Fourth edition 1 Layered Tasks We use the concept of layers in our daily life. As an example, let us consider two friends
More informationLECTURE # 8. Bad Technology Flow control, error control, addressing is multiple Session and Presentation(EMPTY), Network and DL(Full)
Critique of OSI Model LECTURE # 8 Reasoning for OSI not getting Widespread Bad Timing(slide) (Apocalypse of Two Elephants) David Clarke of MIT If standards are written too early: subject is badly understood
More informationThe OSI Model. Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO).
Network Models The OSI Model Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Model for understanding and developing computer-to-computer communication
More informationYazd University. Homepage:
ا Vali Derhami, Razieh Sheikhpour Electrical and Computer Engineering Department Yazd University Homepage: Http://ce.yazd.ac.ir/derhami Email: vderhami@yazd.ac.ir Email: r_sheikhpour@yahoo.com IT ون ا
More informationDesign and Implementation of a Telemetry System for Environmental Applications
Al-Khwarizmi Engineering Journal, Vol. 5, No. 4, PP 39-50 (2009) Al-Khwarizmi Engineering Journal Design and Implementation of a Telemetry System for Environmental Applications Jabir S. Aziz Osama A. Hussein
More informationChapter Two. The OSI Model
Chapter Two الملزمة الثانية The OSI Model The International Standards Organization (ISO) is a multinational body dedicated to worldwide agreement on international standards (Established in 1947). An ISO
More informationModeling Nasta leeq Writing Style
Modeling Nasta leeq Writing Style Aamir Wali National University of Computer and Emerging Sciences Overview: Urdu اب پ ت ٹ ث ج چ ح خ د ڑ ڈ ذ ر ز ژ س ش ص ض ط ظ ع غ ف ق ک گ ل م ن ه ء ی ے ہ ں و In Urdu, a
More informationChapter 2 Network Models 2.1
Chapter 2 Network Models 2.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 2.2 2-1 LAYERED TASKS We use the concept of layers in our daily life. As an example,
More informationCCNA 1: Chapter 2 Exam Answer v %
1. Refer to the exhibit. Cell A at IP address 10.0.0.34 has established an IP session with IP Phone 1? at IP address 172.16.1.103. Based upon the graphic, which device type best describes the function
More informationNetwork Models. Presentation by Dr.S.Radha HOD / ECE SSN College of Engineering
Network Models Presentation by Dr.S.Radha HOD / ECE SSN College of Engineering Objective At the end of this section students will be able to Understand the architecture of the OSI model Understand the
More informationمالحظة:- سيتم هنا كتابة الخطوات الضرورية النجاز العمل المطلوب وليس البرنامج كامال. One Dimensional Array ان ظف فح راخ انثعذ ان احذ ذحراج ان
مالحظة:- سيتم هنا كتابة الخطوات الضرورية النجاز العمل المطلوب وليس البرنامج كامال. One Dimensional Array loop احذ ذرشا ح ف 1 فارا كا د 5=r أ عذد ان ظف فح راخ انثعذ ان احذ ذحراج ان ق حانعذاد i ت 0 عذد انع
More information3 Qurʾānic typography Qurʾānic typography involves getting the following tasks done.
TUGboat, Volume 31 (2010), No. 2 197 Qurʾānic typography comes of age: Æsthetics, layering, and paragraph optimization in ConTEXt Idris Samawi Hamid 1 The background of Oriental TEX Attempts to integrate
More informationReal Time Face Recognition Based on Matlab and Arduino Microcontroller
Real Time Face Recognition Based on Matlab and Arduino Microcontroller Lecturer Dr. Abbas Hssien Miry AL- Mustansiriyah University, Electrical Engineering Department Abstract Recently the access control
More informationRefer to the exhibit. Which set of devices contains only end devices? A,C,D B,E,G,H C,D,G,H,I,J D,E,F,H,I,J E,F,H,I,J
1. What is the purpose of the TCP/IP Network Access layer? path determination and packet switching data presentation the division of segments into packets network media control 2. Which characteristic
More informationA) 9 B) 12 C) 24 D) 32 A) 9 B) 7 C) 8 D) 12 A) 400 B) 420 C) 460 D) 480 A) 16 B) 12 C) 8 D) 4. A) n+1 B) n - 1 C) n D) None of the above
1 4 4 ادب ر اور 2.ر ں رHistory3 ا ض ا رس ا ا ب A) 9 B) 12 C) 24 D) 32 ال 1 ں ا ا ر فا رس ا ب A) 9 B) 7 C) 8 D) 12 "BENZENE" وف ا ل ت ا ظ A) 400 B) 420 C) 460 D) 480 1 2 3 C B A اور D ں combinations ا 3
More informationArabic Diacritics Based Steganography Mohammed A. Aabed, Sameh M. Awaideh, Abdul-Rahman M. Elshafei and Adnan A. Gutub
Arabic Diacritics Based Steganography Mohammed A. Aabed, Sameh M. Awaideh, Abdul-Rahman M. Elshafei and Adnan A. Gutub King Fahd University of Petroleum and Minerals Computer Engineering Department Dhahran
More informationDevelopment Binary Search Algorithm
Development Binary Search Algorithm Ragheed D. Salim* Received 3, January, 2011 Accepted 22, May, 2011 Abstract: There are many methods of searching large amount of data to find one particular piece of
More informationTHE LOGO Guidelines LOGO. Waste Free Environment Brand Guidelines
BRAND GUIDELINES THE LOGO Guidelines LOGO SYMBOL TYPEFACE 2 COLOR SCHEME When do I use the full-color logo? Use the full-color logo as frequently as possible to maximize and strengthen the brand. PRIMARY
More informationOrganizations have developed standard sets of protocols
Network Models Organizations have developed standard sets of protocols Some of these organizations are: The International Standards Organization (ISO) The Institute of Electrical and Electronic Engineers
More informationIntroduction to Search and Recommendation
Introduction to Search and Recommendation Yi Zhang Associate Professor Information Retrieval and Knowledge Management Lab Graduate Director, Technology and Information Management University of California
More informationMATHEMATICAL ANALYSIS OF SQUARE HOLE DRILLING MECHANISM
www.jeasd.org Vol. 22, No.01, January 2018 ISSN 2520-0917 MATHEMATICAL ANALYSIS OF SQUARE HOLE DRILLING MECHANISM Ridha Alwan Ahmed Asst. Lecturer, Computer Engineering Department, Al- Mustansiriyah University,
More informationVOL. 3, NO. 7, Juyl 2012 ISSN Journal of Emerging Trends in Computing and Information Sciences CIS Journal. All rights reserved.
Arabic Hand Written Character Recognition Using Modified Multi-Neural Network Farah Hanna Zawaideh Irbid National University, Computer Information System Department dr.farahzawaideh@inu.edu.jo ABSTRACT
More informationImprove On-Demand Multicast Routing Protocol in Mobile Ad-Hoc Networks المتعذد حسب الطلب
Improve On-Demand Multicast Routing Protocol in Mobile Ad-Hoc Networks تحسين بروتوكول التوجيه ODMRP في الشبكات الالسلكية المخصصة المتنقلة المتعذد حسب الطلب Dr. Intisar Al-Mejibli Informatics Systems Management
More informationنموذج وصف المقرر جايؼح تغذاد كه ح انؼهىو / لسى ػهىو انحاسىب ذنظ ى انى ة فصه 1 نظز + 2 ػ ه )اسثىػ ا(
نموذج وصف المقرر وصف المقرر يوفر وصف المقرر هذا إيجازا مقتضيا ألهم خصائص المقرر ومخرجات التعلم المتوقعة من الطالب تحقيقها مبرهنا عما إذا كان قد حقق االستفادة القصوى من فرص التعلم المتاحة. والبد من الربط
More informationChapter 3 Protocols and the TCP/IP Suite
Chapter 3 Protocols and the TCP/IP Suite 3.1 The Need for a Protocol Architecture need for a standard communication tasks by layers architecture peer protocol: a set of rules or conventions to exchange
More informationCS-461 Internetworking. Dr. Mohamed Aboutabl
CS-461 Internetworking Dr. Mohamed Aboutabl http://www.cs.jmu.edu/users/aboutams The McGraw-Hill Companies, Inc., 2000 1 Chapter 1 Introduction The McGraw-Hill Companies, Inc., 2000 2 Internet today Network
More informationDeveloping a Real Time Method for the Arabic Heterogonous DBMS Transformation
Developing a Real Time Method for the Arabic Heterogonous DBMS Transformation S. M. Hadi, S. Murtatha Department of Information & Comm. Eng. College of Engineering Al- Khawarizmi,University of Baghdad
More informationTCP/IP protocol suite
TCP/IP protocol suite The TCP/IP protocol suite was developed prior to the OSI model. Therefore, the layers in the TCP/IP protocol suite do not match exactly with those in the OSI model. The original TCP/IP
More informationandroidcode.ir/post/install-eclipse-windows-android-lynda
ا موزش برنامه نويسی اندرويد آ زش ای ا رو ز ن ر دو, ۲۶ دی ۰۷:۰۶ ۱۳۹۰ ب.ظ مراحل نصب ايکليپس (Eclipse) روی ويندوز ی ) ( آ زش ا ا در و وز در pdf ا آ زش( 2.43 ( ۰. از ا اس دی رو ده (راھ ی.(SDK ۱.ا ای ا رو ازش
More informationPrinted and Handwritten Arabic Characters Recognition and Convert It to Editable Text Using K-NN and Fuzzy Logic Classifiers
Journal of University of Thi-Qar Vol.9 No. Mar.4 Printed and Handwritten Arabic Characters Recognition and Convert It to Editable Text Using K-NN and Fuzzy Logic Classifiers Zamen F. Jaber Computer Department,
More informationJournal of University of Thi Qar Vol. (10).. No. (2) June Influence of Multiple Encryptions on the Security and Accuracy of
Influence of Multiple Encryptions on the Security and Accuracy of Abstract Sent and Received Data Jehan K. Shareef Information systems (IS) jihansh@yahoo.com Media Faculty/ Thi- Qar University Encryption
More informationChapter 2 Network Models 2.1
Chapter 2 Network Models 2.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 2-1 LAYERED TASKS We use the concept of layers in our daily life. As an example,
More informationStrings 20/11/2018. a.k.a. character arrays. Strings. Strings
ECE 150 Fundamentals of Programming Outline 2 a.k.a. character arrays In this lesson, we will: Define strings Describe how to use character arrays for strings Look at: The length of strings Copying strings
More informationUrdu Usage Guide ر ہاردو
ب" Urdu Usage Guide و 6 اردو ر This guide will explain how to use Urdu on the computer. After Urdu support has been installed and it is possible to toggle between English and Urdu, two additional items
More informationCPS221 Lecture: Layered Network Architecture
CPS221 Lecture: Layered Network Architecture Objectives last revised 9/8/14 1. To discuss the OSI layered architecture model 2. To discuss the specific implementation of this model in TCP/IP Materials:
More informationProposed keyboard layout for Swahili in Arabic script
أ Proposed keyboard layout for Swahili in Arabic script Kevin Donnelly kevin@dotmon.com Version 0.1, March 2010 Introduction Swahili was originally written in Arabic script in its area of origin (the littoral
More informationCourse: APPLICATION PROGRAMMING IN THE.NET Semester: Fall-2013/2014
Individual assignment Student Name: ID: 1-Learning Outcomes being assessed: LO1. Explain critically the concepts of the.net framework. LO2. Design, implement and test programs in the C# language 2-Handing
More informationNetworks: Access Management
Networks: Access Management Class Notes # 3 Protocols and Layers (part 1) September 19, 2003 Functions A small set of functions form the basis of all protocols. Not all protocols have all functions; this
More informationISO/IEC JTC 1/SC 2. Yoshiki MIKAMI, SC 2 Chair Toshiko KIMURA, SC 2 Secretariat JTC 1 Plenary 2012/11/05-10, Jeju
ISO/IEC JTC 1/SC 2 Yoshiki MIKAMI, SC 2 Chair Toshiko KIMURA, SC 2 Secretariat 2012 JTC 1 Plenary 2012/11/05-10, Jeju what is new Work items ISO/IEC 10646 2 nd ed. 3 rd ed. (2012) ISO/IEC 14651 Amd.1-2
More informationAward Winning Typefaces by Linotype
Newly released fonts and Midan awarded coveted design prize Award Winning Typefaces by Linotype Bad Homburg, 23 April 2007. Linotype has once again received critical recognition for their commitment to
More informationظرة ول. Information Technology ١
ظرة ول ات Information Technology Dr. Ahmed Abd El-Ghany Abd El-Ghany Ewees IT 14 Ewees Part 1 ١ وواوتھ : ھ ادة ا $% إ"! وا! وات إد+ل وإ+*اج أو '&ت أو أو ا"*"- 4"5 ز و $12 ا 1 م ا/ب إ" 4 زھ $&8 ا 2"5 ن
More informationIntroduction to Search/Retrieval Technologies. Yi Zhang Information System and Technology Management IRKM Lab University of California Santa Cruz
Introduction to Search/Retrieval Technologies Yi Zhang Information System and Technology Management IRKM Lab University of California Santa Cruz 1 Information Retrieval and Knowledge Management Lab Focus:
More informationManaging Resource Sharing Conflicts in an Open Embedded Software Environment
Managing Resource Sharing Conflicts in an Open Embedded Software Environment Koutheir Attouchi To cite this version: Koutheir Attouchi. Managing Resource Sharing Conflicts in an Open Embedded Software
More informationBRAND GUIDELINES JANUARY 2017
BRAND GUIDELINES JANUARY 2017 GETTING AROUND Page 03 05 06 07 08 09 10 12 14 15 Section 01 - Our Logo 02 - Logo Don ts 03 - Our Colors 04 - Our Typeface 06 - Our Art Style 06 - Pictures 07 - Call to Action
More informationDesign and Analysis WLAN Nodes Performance Based on Roaming Technique
The Proceedings of the 4 th Conference of College of Education for Pure Sciences Design and Analysis WLAN Nodes Performance Based on Roaming Technique Khalil I. Alsaif Mosul University Computer Science
More informationب ام خذا ذ بخش ذ ه زباى
ب ام خذا ذ بخش ذ ه زباى ع اى هذرک : بز اه یسی PLC FATEK ایجاد ارتباط با FATEK PLC 9 1 ا.رضایی 1391.7.27 ت ضیحات : تعذاد صفح : شوار یزایش : یزایش ک ذ : تاریخ یزایش : +9821-228-831-70 1 www.dornamehr.com
More informationThe Use of Dynamic Sliding Window with IPSec. إستخدام نافذة اإلنزالق الديناميكية مع تقنية IPSec
The Proceedings of the 4 th Conference of College of Education for Pure Sciences The Use of Dynamic Sliding Window with IPSec Mishall H. Awaad Department of Computer Science, Education College, Thi-Qar
More informationISeCure. The ISC Int'l Journal of Information Security. High Capacity Steganography Tool for Arabic Text Using Kashida.
The ISC Int'l Journal of Information Security July 2010, Volume 2, Number 2 (pp. 107 118) http://www.isecure-journal.org High Capacity Steganography Tool for Arabic Text Using Kashida Adnan Abdul-Aziz
More informationImage Coloring using Genetic Algorithm
Republic of Iraq Ministry of Higher Education And Scientific Research Baghdad University College of Science Image Coloring using Genetic Algorithm A Project Report Submitted to the College of Science,
More informationDiscussion Chapter#11
The Islamic University of Gaza Faculty of Engineering Department of Computer Engineering ECOM 4314: Data Communication Instructor: Dr. Aiman Abu Samra T.A.: Eng. Alaa O. Shama Discussion Chapter#11 Selective
More informationChapter 2 Network Models 2.1
Chapter 2 Network Models 2.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Network Models n Network Architecture: n A) Hardware: at the core of any network;
More informationBrand Identity Manual Fonts and Typography
Brand Identity Manual Fonts and Typography Brand Fonts NCB TYPE LANGUAGE To maintain a coherent brand identity, NCB uses a set of compatible and typefaces as its corporate primary fonts. These adjacent
More information1: Review Of Semester Provide an overview of encapsulation.
1: Review Of Semester 1 1.1.1.1. Provide an overview of encapsulation. Networking evolves to support current and future applications. By dividing and organizing the networking tasks into separate layers/functions,
More informationSatellite Images Classification in Rural Areas Based on Fractal Dimension
Satellite Images Classification in Rural Areas Based on Fractal Dimension Mohammed Sahib Mahdi Assistant Professor Department of Computer Science College of Science Alnahrain University email: altaeimohamed@gmail.com
More informationPrivacy Preserving in Data Mining أبقاء انغش ف حؼذ انب ا اث
Privacy Preserving in Data Mining أبقاء انغش ف حؼذ انب ا اث Assistant Lecturer/ Heba Adnan Raheem Master Computer Sciences Kerbala university/college of Sciences (Computer Department) Assistant Professor
More informationار ا ار ا ا م ا وا وال. ٢٩ ٢٥ ذار ٢٠١٢
ار ا ار ا ا م ا وا وال ا اى ا د. ا ي mustafa.eleoui@hiast.edu.sy meleoui@gmail.com ٢٩ ٢٥ ذار ٢٠١٢ ات ه م LATEX أ"!ا ام )& +,ا )*ا XeArabic (& ا'&%ل %ا -./*ا ا%دت 2) 3 آ&( ل %4 ا 78 رات ا%*6- إدراج ا; 7
More informationSHEFA STORE CORPORATE DESIGN MANUAL BRAND & FUNCTION // CORPORATE DESIGN GUIDELINES. 01 : Corporate Identity. 02 : Corporate Stationery
BRAND & FUNCTION // CORPORATE DESIGN GUIDELINES SHEFA STORE CORPORATE DESIGN MANUAL 01 : Corporate Identity 02 : Corporate Stationery 03 : Interactive Designs www.shefa-store.com Corporate Identity 01
More informationOnline Arabic Handwritten Character Recognition Based on a Rule Based Approach
Journal of Computer Science 2012, 8 (11), 1859-1868 ISSN 1549-3636 2012 doi:10.3844/jcssp.2012.1859.1868 Published Online 8 (11) 2012 (http://www.thescipub.com/jcs.toc) Online Arabic Handwritten Character
More informationb) Diverse forms of physical connection - all sorts of wired connections, wireless connections, fiber optics, etc.
Objectives CPS221 Lecture: Layered Network Architecture last revised 6/22/10 1. To discuss the OSI layered architecture model 2. To discuss the specific implementation of this model in TCP/IP Materials:
More informationProposed Solution for Writing Domain Names in Different Arabic Script Based Languages
Proposed Solution for Writing Domain Names in Different Arabic Script Based Languages TF-AIDN, June/2014 Presented by AbdulRahman I. Al-Ghadir Researcher in SaudiNIC Content What we have done so far? Problem
More informationAn Ontology Based Approach to Enhance Information Retrieval from Al-Shamelah Digital Librar
IUG Journal of Natural and Engineering Studies Peer-reviewed Journal of Islamic University-Gaza ISSN 2409-4587 IUGNES Vol 24, No 1, 2016, pp 39-53 An Ontology Based Approach to Enhance Information Retrieval
More informationA Performance Comparison of Various Routing Protocols Based on Load-Balance in Mobile Ad Hoc Networks
A Performance Comparison of Various Routing Protocols Based on Load-Balance in Mobile Ad Hoc Networks Ali Hassan Muosa Department of Computer Science, Faculty Science Computers and Mathematic, Thi- Qar
More informationMEMORANDUM OF UNDERSTANDING. between [PLEASE INSERT NAME OF THE OVERSEAS GOVERNMENT AGENCY AND NAME OF THE COUNTRY] and
MEMORANDUM OF UNDERSTANDING between [PLEASE INSERT NAME OF THE OVERSEAS GOVERNMENT AGENCY AND NAME OF THE COUNTRY] and THE PUBLIC PRIVATE PARTNERSHIP AUTHORITY, PRIME MINISTER S OFFICE, THE PEOPLE'S REPUBLIC
More informationA MELIORATED KASHIDA-BASED APPROACH FOR ARABIC TEXT STEGANOGRAPHY
A MELIORATED KASHIDA-BASED APPROACH FOR ARABIC TEXT STEGANOGRAPHY Ala'a M. Alhusban and Jehad Q. Odeh Alnihoud Computer Science Dept, Al al-bayt University, Mafraq, Jordan ABSTRACT Steganography is an
More informationSegmentation and Recognition of Arabic Printed Script
Institute of Advanced Engineering and Science IAES International Journal of Artificial Intelligence (IJ-AI) Vol. 2, No. 1, March 2013, pp. 20~26 ISSN: 2252-8938 20 Segmentation and Recognition of Arabic
More informationEnergy-aware and secure routing with trust levels for wireless ad hoc and sensor networks
Scholars' Mine Doctoral Dissertations Student Research & Creative Works Spring 2007 Energy-aware and secure routing with trust levels for wireless ad hoc and sensor networks Eyad Taqieddin Follow this
More informationNetwork Reference Models
Network Reference Models LECTURE (2) Network Reference Models A framework (guideline) for network implementation and troubleshooting. Divides complex functions into simpler components. Importance of reference
More informationJournal of Kerbala University, Vol. 11 No.4 Scientific. 2013
Extending Public Switched Telephone Networks Billing Services Using VoIP Applications جعزيز الخدمات الححاسبية لشبكات الهاجف العامة باسحخدام جطبيقات الصىت عبر بروجىكىل اإلنحرنث Saif Ali Abed Computer Science
More informationMicrosoft Word 2007 إعداد أمل امحد رئيص قطم جكنولوجيا املعلومات مكحبة البحر األعظم العامة مجعية الرعاية املحكاملة
2009 Microsoft Word 2007 إعداد هبة حممود حممد األمري رئيص قطم جكنولوجيا املعلومات مكحبة البحر األعظم العامة مجعية الرعاية املحكاملة - مراجعة رشا عصمث رئيص قطم جكنولوجيا املعلومات املركس الثقايف عال مرضي
More informationUNIT III NETWORK LAYER 1. What are the network support layers and the user support layers? Network support layers: The network support layers are Physical layer, Data link layer and Network layer. These
More informationSCALE-SPACE APPROACH FOR CHARACTER SEGMENTATION IN SCANNED IMAGES OF ARABIC DOCUMENTS
31 st December 016. Vol.94. No. 005-016 JATIT & LLS. All rights reserved. ISSN: 199-8645 www.jatit.org E-ISSN: 1817-3195 SCALE-SPACE APPROACH FOR CHARACTER SEGMENTATION IN SCANNED IMAGES OF ARABIC DOCUMENTS
More informationLanguage Manual. Arabic HQ and HD
Language Manual Arabic HQ and HD Language Manual: Arabic HQ and HD Published 22 March 2011 Copyright 2003-2011 Acapela Group. All rights reserved This document was produced by Acapela Group. We welcome
More informationChapter 2 Network Models
Computer Networks Al-Mustansiryah University Elec. Eng. Department College of Engineering Fourth Year Class Chapter 2 Network Models 2.1 2-1 LAYERED TASKS We use the concept of layers in our daily life.
More informationIslamic University of Gaza Faculty of Engineering Department of Computer Engineering ECOM 4021: Networks Discussion. Chapter 1.
Islamic University of Gaza Faculty of Engineering Department of Computer Engineering ECOM 4021: Networks Discussion Chapter 1 Foundation Eng. Haneen El-Masry February, 2014 A Computer Network A computer
More informationCompiler and Translators
1 References "Compilers Principles, techniques, & tools", by Alfred Aho, second edition, Pearson Addison Wesley, 2007. Compiler and Translators Translator is a program that takes as input a program written
More informationTCP/IP THE TCP/IP ARCHITECTURE
TCP/IP-1 The Internet Protocol (IP) enables communications across a vast and heterogeneous collection of networks that are based on different technologies. Any host computer that is connected to the Internet
More informationPacket Steganography Using IP ID. Abstract
Packet Steganography Using IP ID *1 Head of Computer Science Department, Collage of Science, University of Diyala, Iraq 2* Computer Eng., University of Technology, Baghdad, Iraq Received 21 January 2014
More informationAPPENDIX F THE TCP/IP PROTOCOL ARCHITECTURE
APPENDIX F THE TCP/IP PROTOCOL ARCHITECTURE William Stallings F.1 TCP/IP LAYERS... 2 F.2 TCP AND UDP... 4 F.3 OPERATION OF TCP/IP... 6 F.4 TCP/IP APPLICATIONS... 10 Copyright 2014 Supplement to Computer
More informationNetwork Model: Each layer has a specific function.
OBJECTIVES: To discuss the OSI model and its layer architecture and to show the interface between the layers. To briefly discuss the functions of each layer in the OSI model. To introduce the TCP/IP protocol.
More informationAdvanced Computer Networks. Rab Nawaz Jadoon DCS. Assistant Professor COMSATS University, Lahore Pakistan. Department of Computer Science
Advanced Computer Networks Department of Computer Science DCS COMSATS Institute of Information Technology Rab Nawaz Jadoon Assistant Professor COMSATS University, Lahore Pakistan Advanced Computer Networks
More informationResearch Article Offline Handwritten Arabic Character Recognition Using Features Extracted from Curvelet and Spatial Domains
Research Journal of Applied Sciences, Engineering and Technology 11(2): 158-164, 2015 DOI: 10.19026/rjaset.11.1702 ISSN: 2040-7459; e-issn: 2040-7467 2015 Maxwell Scientific Publication Corp. Submitted:
More informationPERFORMANCE OF THE GOOGLE DESKTOP, ARABIC GOOGLE DESKTOP AND PEER TO PEER APPLICATION IN ARABIC LANGUAGE
PERFORMANCE OF THE GOOGLE DESKTOP, ARABIC GOOGLE DESKTOP AND PEER TO PEER APPLICATION IN ARABIC LANGUAGE Abd El Salam AL HAJJAR, Anis ISMAIL, Mohammad HAJJAR, Mazen EL- SAYED University Institute of TechnologyLebanese
More informationTHE LOGO Guidelines LOGO. Waste Free Environment Brand Guidelines
BRAND GUIDELINES THE LOGO Guidelines LOGO SYMBOL TYPEFACE 2 COLOR SCHEME When do I use the full-color logo? Use the full-color logo as frequently as possible to maximize and strengthen the brand. PRIMARY
More informationData Communication and Network. Introducing Networks
Data Communication and Network Introducing Networks Introduction to Networking Computer network, or simply network Refers to the connection of two or more computers by some type of medium You can connect
More informationUsing Arabic Wordnet for semantic indexation in information retrieval system
www.ijcsi.org 327 Using Arabic Wordnet for semantic indexation in information retrieval system Mohammed Alaeddine Abderrahim 1, Mohammed El Amine Abderrahim 2 Mohammed Amine Chikh 2 1 Department of Computer
More information1 See footnote 2, below.
To: UTC From: Azzeddine Lazrek, Cadi Ayyad University, Marrakesh, Morocco (with Debbie Anderson, SEI, UC Berkeley, and with assistance from Murray Sargent, Laurentiu Iancu, and others) RE: Arabic Math
More informationاالنتفاخ في انقراءاخ انقرآ يح
االنتفاخ في انقراءاخ انقرآ يح * 00 8 يهخص 00 Abstract This research aims at locating some of the areas of this unique literary art in the Quranic readings (Qira at), and illustrating the effect of this
More informationIntroduction to Protocols
Chapter 6 Introduction to Protocols 1 Chapter 6 Introduction to Protocols What is a Network Protocol? A protocol is a set of rules that governs the communications between computers on a network. These
More informationCOMS Introduction to Computers. Networking
COMS 1001 Introduction to Computers Networking What's Ahead Networking layers Network Speeds Protocols, sockets, client/server Routing, DNS, Ethernet, LANs, wireless What is a Network? Loose definition:
More information