CH. 2 Network Models

Size: px
Start display at page:

Download "CH. 2 Network Models"

Transcription

1 Islamic University of Gaza Faculty of Engineering Computer Engineering Department Data com. Discussion ECOM 4014 Lecture # 2 CH. 2 Network Models By Eng. Wafaa Audah Sep. 2013

2 OSI Model Open Systems Interconnection (7-Layers) الشكل المقابل يمثل توزيع ال layers وترتيبها باآللية التي يمثلها ال OSI - Every layer serve its upper layer. - Peer-peer process: كم layer ترع ف عه انذاذا - انهه واصهح نها ي ال layer انه فىقها header هادا انه ذر ت كى ت ذرى عذج شغالخ يه ح دسة ال layer انه ظافرى. آن ح االظافح تركى تانذزكح ي االعه نألسفم ع ذ ان زسم وي االسفم ان االعه ع ذ ان سرقثم ونك تاخرالف ا ى ع ذ ان سرقثم ت رى انذذف او االسانح نهادا ال header فثانران يذرىي انثاك د او انه واصم كم غثقح ع ذ ان زسم رح كى فسى ع ذ ان سرقثم ته ك ت كى انرىاصم وكأ ى صار ت كم غثقح ويث هرها ي ان اد ر تغط ان ظز شى صارتانطز ق ت هى. * بيكىن في الشبكة بيه المرسل والمستقبل intermediate nodes -عه سث م ان ثال router ت كى ذعايم هادا انزاوذز وانرىاصم يعى ي خالل انثالز غثقاخ االون ي االسفم وانه ت س هى انطثقاخ انذاع ح نهشثكح. ايا تان سثح ل switch فث ع م تس عاول غثقر ي االسفم. 2

3 اضافة الهيدرز مه الطبقات السفلية بيكىن كالتالي 3

4 The Physical Layer - The physical layer is responsible for ensuring that a stream of bits is transmitted between two nodes sharing a single link. - The physical layer coordinates all the functions required to transmit a bit stream over the physical medium. - Data rate: Transmission rate number of bits sent per second - Synchronization of bits. هذا ع ا ان زسم وان سرقثم جة ا سرع هى فس ال data rate ك ا أ عا جة ا رى قم انثراخ دسة ال clock ترشاي ت ان زسم وان سرقثم نع ا قم انثراخ تانرزذ ة وانىقد انصذ خ. The Data Link Layer - The data link layer is responsible for ensuring that a packet of data is successfully transmitted between two adjacent nodes in the network. - Flow control: Prevent overwhelming the receiver. - Error control: Detect and retransmit damaged or lost frames; Prevent duplication of frames; using trailer. Hop-to-hop (node-to-node) delivery: add physical address as a header, also add a tailor for error control. Network Layer The network layer is responsible for the delivery of packets from the original source to the final destination. The responsibilities of the network layer: - Logical addressing. - Routing: 4

5 Transport Layer The transport layer is responsible for delivery of a message from one process to another. Responsibilities of the transport layer - Port addressing - Flow control - Error control Session, presentation layers (according to the Dr s recommendations) are not important Application Layer The application layer is the interface between the user and the network (session, presentation and application layers are user support layers) Some of services - Network virtual terminal: Logon to a remote host. - File transfer, access, and management. - Mail services TCP/IP Protocol Suite (Internet Model) 5

6 Packet or Stream of bits The most important protocols according to the layers ADDRESSING There are four levels of addresses are used in an internet employing the TCP/IP protocols. 6

7 Physical Address (يرغ ز و ثم ع ىا انه ك انران ون س ان سرقثم ان هائ ( address Link Logical Address (ثاتد و ثم ان زسم وان سرقثم ان هائ ) Universal addressing Port Address Processes addresses Specific Address Text-Book Questions Review Questions 2. Which layers in the Internet model are the network support layers? The network support layers are the physical, data link, and network layers. 3. Which layer in the Internet model is the user support layer? The application layer supports the user. 7. What are headers and trailers, and how do they get added and removed? Headers and trailers are control data added at the beginning and the end of each data unit at each layer of the sender and removed at the corresponding layers of the receiver. They provide source and destination addresses, synchronization points, information for error detection, etc. 7

8 Exercises 16. Match the following to one or more layers of the OSI model: a. Route determination: Network Layer b. Flow control: Data link, Transport Layers c. Interface to transmission media: Physical Layer d. Provides access for the end user: Application Layer 20. In Figure 2.22, computer A sends a message to computer D via LANl, router Rl, and LAN2. Show the contents of the packets and frames at the network and data link layer for each hop interface. حسب الشرح السابق واضافة كل طبقة للهيدرز الخاصة بها الحل هى كالتالي: 8

9 ع كى 21. In Figure 2.22, assume that the communication is between a process running at computer A with port address i and a process running at computer D with port address j. Show the contents of packets and frames at the network, data link, and transport layer for each hop. 22. Suppose a computer sends a frame to another computer on a bus topology LAN. The physical destination address of the frame is corrupted during the transmission. What happens to the frame? How can the sender be informed about the situation? If the corrupted destination address does not match any station address in the network, the packet is lost. If the corrupted destination address matches one of the stations, the frame is delivered to the wrong station. In this case, however, the error detection mechanism, available in most data link protocols, will find the error and discard the frame. In both cases, the source will somehow be informed using one of the data link control mechanisms discussed in Chapter 11. انع او ادذ ىافق انخهم ياصار تعذ انجذ ذ ان ىجىدج ع ا ادر ان ه ا ايا ا انع ىا تانران رح ذىصم انذاذا تس نهع ىا انغهػ!! ايا االدر ال ذع ع يا ىافق ا ى فهى انرا ع ىا ا ا انع ىا نسر ش يىجىدج تانران انثاك د ان زسهح detection تانذانر يفزوض كى ف ي ثىد خاصح ب error نهذاذا وذع ذ ارسانها تشكم صذ خ انغاء وذع م ا زور ا ى صار ذعزف السو See You at Next lecture Best Wishes 9

ES623 Networked Embedded Systems

ES623 Networked Embedded Systems ES623 Networked Embedded Systems Introduction to Network models & Data Communication 16 th April 2013 OSI Models An ISO standard that covers all aspects of network communication is the Open Systems Interconnection

More information

ERD ENTITY RELATIONSHIP DIAGRAM

ERD ENTITY RELATIONSHIP DIAGRAM ENTITY RELATIONSHIP DIAGRAM M. Rasti-Barzoki Website: Entity Relationship Diagrams for Data Modelling An Entity-Relationship Diagram () shows how the data that flows in the system is organised and used.

More information

0 0 0 E-mail : ccce@uob.edu.iq Site: cc.uobaghdad.edu.iq فتاه :00 :0 :00 :0 :00 :0 :00 :0 :00 :0 :00 :0 :00 :0 :00 :0 :00 :0 0 0 :00 :0 Online ICDL - - - ICDL - - - ICDL - - - - 0:00 :0 :0 :00 :0 :00 :0

More information

OUR LOGO. SYMBOL LOGO SYMBOL LOGO ORIGINAL STRUCTURE

OUR LOGO. SYMBOL LOGO SYMBOL LOGO ORIGINAL STRUCTURE OUR LOGO. ORIGINAL STRUCTURE SYMBOL LOGO SYMBOL LOGO OUR COLORS. Infographic Color 2A3942 FED708 2A3942 E77525 804D9F CLEAR SPACE. PRINT SAFE AREA MINIMUM SIZE - PRINT H: 30 pt ONLINE SAFE AREA MINIMUM

More information

Improved Method for Sliding Window Printed Arabic OCR

Improved Method for Sliding Window Printed Arabic OCR th Int'l Conference on Advances in Engineering Sciences & Applied Mathematics (ICAESAM'1) Dec. -9, 1 Kuala Lumpur (Malaysia) Improved Method for Sliding Window Printed Arabic OCR Prof. Wajdi S. Besbas

More information

The History and the layers of the OSI Model 30 - October

The History and the layers of the OSI Model 30 - October THE OSI MODEL Established in 1947, the International Standards Organization (ISO) is a multinational body dedicated to worldwide agreement on international standards. An ISO standard that covers all aspects

More information

Umbrella. Branding & Guideline

Umbrella. Branding & Guideline Umbrella. Branding & Guideline OUR LOGO. OUR COLORS. #FFFFFF Font COLOR #2A3942 #64A0C6 mix color C: 75% M: 68% Y: 67% K: 90% H: 320 S:61% B:0 R:0 G:0 B:0 C: 75% M: 68% Y: 67% K: 90% H: 320 S:61% B:0 R:0

More information

Arabic Text Segmentation

Arabic Text Segmentation Arabic Text Segmentation By Dr. Salah M. Rahal King Saud University-KSA 1 OCR for Arabic Language Outline Introduction. Arabic Language Arabic Language Features. Challenges for Arabic OCR. OCR System Stages.

More information

REEM READYMIX Brand Guideline

REEM READYMIX Brand Guideline REEM READYMIX Brand Guideline Implementing Reem Readymix brand in communications V.I - February 2018 Introduction Reem Readymix is a leading supplier of all types of readymix concrete and cementbased plastering

More information

Identity Guidelines. December 2012

Identity Guidelines. December 2012 Identity Guidelines December 2012 Identity Guidelines Contents 1.0 Our Logo Our logo Our wordmark Colour treatments Clear space, large and small sizes Correct logo placement Incorrect logo usage 2.0 Colour

More information

qatar national day 2017 brand guidelines 2017

qatar national day 2017 brand guidelines 2017 2017 brand guidelines 2017 the following guidelines demonstrate how best to apply the brand 2 CONTENTS 3 contents p5. vision & mission p7. logo p8. logo rationale p9. logo clear space p10. logo do s p11.

More information

Network Models. Behrouz A. Forouzan Data communication and Networking Fourth edition

Network Models. Behrouz A. Forouzan Data communication and Networking Fourth edition Chapter 2 Network Models Behrouz A. Forouzan Data communication and Networking Fourth edition 1 Layered Tasks We use the concept of layers in our daily life. As an example, let us consider two friends

More information

LECTURE # 8. Bad Technology Flow control, error control, addressing is multiple Session and Presentation(EMPTY), Network and DL(Full)

LECTURE # 8. Bad Technology Flow control, error control, addressing is multiple Session and Presentation(EMPTY), Network and DL(Full) Critique of OSI Model LECTURE # 8 Reasoning for OSI not getting Widespread Bad Timing(slide) (Apocalypse of Two Elephants) David Clarke of MIT If standards are written too early: subject is badly understood

More information

The OSI Model. Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO).

The OSI Model. Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Network Models The OSI Model Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Model for understanding and developing computer-to-computer communication

More information

Yazd University. Homepage:

Yazd University. Homepage: ا Vali Derhami, Razieh Sheikhpour Electrical and Computer Engineering Department Yazd University Homepage: Http://ce.yazd.ac.ir/derhami Email: vderhami@yazd.ac.ir Email: r_sheikhpour@yahoo.com IT ون ا

More information

Design and Implementation of a Telemetry System for Environmental Applications

Design and Implementation of a Telemetry System for Environmental Applications Al-Khwarizmi Engineering Journal, Vol. 5, No. 4, PP 39-50 (2009) Al-Khwarizmi Engineering Journal Design and Implementation of a Telemetry System for Environmental Applications Jabir S. Aziz Osama A. Hussein

More information

Chapter Two. The OSI Model

Chapter Two. The OSI Model Chapter Two الملزمة الثانية The OSI Model The International Standards Organization (ISO) is a multinational body dedicated to worldwide agreement on international standards (Established in 1947). An ISO

More information

Modeling Nasta leeq Writing Style

Modeling Nasta leeq Writing Style Modeling Nasta leeq Writing Style Aamir Wali National University of Computer and Emerging Sciences Overview: Urdu اب پ ت ٹ ث ج چ ح خ د ڑ ڈ ذ ر ز ژ س ش ص ض ط ظ ع غ ف ق ک گ ل م ن ه ء ی ے ہ ں و In Urdu, a

More information

Chapter 2 Network Models 2.1

Chapter 2 Network Models 2.1 Chapter 2 Network Models 2.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 2.2 2-1 LAYERED TASKS We use the concept of layers in our daily life. As an example,

More information

CCNA 1: Chapter 2 Exam Answer v %

CCNA 1: Chapter 2 Exam Answer v % 1. Refer to the exhibit. Cell A at IP address 10.0.0.34 has established an IP session with IP Phone 1? at IP address 172.16.1.103. Based upon the graphic, which device type best describes the function

More information

Network Models. Presentation by Dr.S.Radha HOD / ECE SSN College of Engineering

Network Models. Presentation by Dr.S.Radha HOD / ECE SSN College of Engineering Network Models Presentation by Dr.S.Radha HOD / ECE SSN College of Engineering Objective At the end of this section students will be able to Understand the architecture of the OSI model Understand the

More information

مالحظة:- سيتم هنا كتابة الخطوات الضرورية النجاز العمل المطلوب وليس البرنامج كامال. One Dimensional Array ان ظف فح راخ انثعذ ان احذ ذحراج ان

مالحظة:- سيتم هنا كتابة الخطوات الضرورية النجاز العمل المطلوب وليس البرنامج كامال. One Dimensional Array ان ظف فح راخ انثعذ ان احذ ذحراج ان مالحظة:- سيتم هنا كتابة الخطوات الضرورية النجاز العمل المطلوب وليس البرنامج كامال. One Dimensional Array loop احذ ذرشا ح ف 1 فارا كا د 5=r أ عذد ان ظف فح راخ انثعذ ان احذ ذحراج ان ق حانعذاد i ت 0 عذد انع

More information

3 Qurʾānic typography Qurʾānic typography involves getting the following tasks done.

3 Qurʾānic typography Qurʾānic typography involves getting the following tasks done. TUGboat, Volume 31 (2010), No. 2 197 Qurʾānic typography comes of age: Æsthetics, layering, and paragraph optimization in ConTEXt Idris Samawi Hamid 1 The background of Oriental TEX Attempts to integrate

More information

Real Time Face Recognition Based on Matlab and Arduino Microcontroller

Real Time Face Recognition Based on Matlab and Arduino Microcontroller Real Time Face Recognition Based on Matlab and Arduino Microcontroller Lecturer Dr. Abbas Hssien Miry AL- Mustansiriyah University, Electrical Engineering Department Abstract Recently the access control

More information

Refer to the exhibit. Which set of devices contains only end devices? A,C,D B,E,G,H C,D,G,H,I,J D,E,F,H,I,J E,F,H,I,J

Refer to the exhibit. Which set of devices contains only end devices? A,C,D B,E,G,H C,D,G,H,I,J D,E,F,H,I,J E,F,H,I,J 1. What is the purpose of the TCP/IP Network Access layer? path determination and packet switching data presentation the division of segments into packets network media control 2. Which characteristic

More information

A) 9 B) 12 C) 24 D) 32 A) 9 B) 7 C) 8 D) 12 A) 400 B) 420 C) 460 D) 480 A) 16 B) 12 C) 8 D) 4. A) n+1 B) n - 1 C) n D) None of the above

A) 9 B) 12 C) 24 D) 32 A) 9 B) 7 C) 8 D) 12 A) 400 B) 420 C) 460 D) 480 A) 16 B) 12 C) 8 D) 4. A) n+1 B) n - 1 C) n D) None of the above 1 4 4 ادب ر اور 2.ر ں رHistory3 ا ض ا رس ا ا ب A) 9 B) 12 C) 24 D) 32 ال 1 ں ا ا ر فا رس ا ب A) 9 B) 7 C) 8 D) 12 "BENZENE" وف ا ل ت ا ظ A) 400 B) 420 C) 460 D) 480 1 2 3 C B A اور D ں combinations ا 3

More information

Arabic Diacritics Based Steganography Mohammed A. Aabed, Sameh M. Awaideh, Abdul-Rahman M. Elshafei and Adnan A. Gutub

Arabic Diacritics Based Steganography Mohammed A. Aabed, Sameh M. Awaideh, Abdul-Rahman M. Elshafei and Adnan A. Gutub Arabic Diacritics Based Steganography Mohammed A. Aabed, Sameh M. Awaideh, Abdul-Rahman M. Elshafei and Adnan A. Gutub King Fahd University of Petroleum and Minerals Computer Engineering Department Dhahran

More information

Development Binary Search Algorithm

Development Binary Search Algorithm Development Binary Search Algorithm Ragheed D. Salim* Received 3, January, 2011 Accepted 22, May, 2011 Abstract: There are many methods of searching large amount of data to find one particular piece of

More information

THE LOGO Guidelines LOGO. Waste Free Environment Brand Guidelines

THE LOGO Guidelines LOGO. Waste Free Environment Brand Guidelines BRAND GUIDELINES THE LOGO Guidelines LOGO SYMBOL TYPEFACE 2 COLOR SCHEME When do I use the full-color logo? Use the full-color logo as frequently as possible to maximize and strengthen the brand. PRIMARY

More information

Organizations have developed standard sets of protocols

Organizations have developed standard sets of protocols Network Models Organizations have developed standard sets of protocols Some of these organizations are: The International Standards Organization (ISO) The Institute of Electrical and Electronic Engineers

More information

Introduction to Search and Recommendation

Introduction to Search and Recommendation Introduction to Search and Recommendation Yi Zhang Associate Professor Information Retrieval and Knowledge Management Lab Graduate Director, Technology and Information Management University of California

More information

MATHEMATICAL ANALYSIS OF SQUARE HOLE DRILLING MECHANISM

MATHEMATICAL ANALYSIS OF SQUARE HOLE DRILLING MECHANISM www.jeasd.org Vol. 22, No.01, January 2018 ISSN 2520-0917 MATHEMATICAL ANALYSIS OF SQUARE HOLE DRILLING MECHANISM Ridha Alwan Ahmed Asst. Lecturer, Computer Engineering Department, Al- Mustansiriyah University,

More information

VOL. 3, NO. 7, Juyl 2012 ISSN Journal of Emerging Trends in Computing and Information Sciences CIS Journal. All rights reserved.

VOL. 3, NO. 7, Juyl 2012 ISSN Journal of Emerging Trends in Computing and Information Sciences CIS Journal. All rights reserved. Arabic Hand Written Character Recognition Using Modified Multi-Neural Network Farah Hanna Zawaideh Irbid National University, Computer Information System Department dr.farahzawaideh@inu.edu.jo ABSTRACT

More information

Improve On-Demand Multicast Routing Protocol in Mobile Ad-Hoc Networks المتعذد حسب الطلب

Improve On-Demand Multicast Routing Protocol in Mobile Ad-Hoc Networks المتعذد حسب الطلب Improve On-Demand Multicast Routing Protocol in Mobile Ad-Hoc Networks تحسين بروتوكول التوجيه ODMRP في الشبكات الالسلكية المخصصة المتنقلة المتعذد حسب الطلب Dr. Intisar Al-Mejibli Informatics Systems Management

More information

نموذج وصف المقرر جايؼح تغذاد كه ح انؼهىو / لسى ػهىو انحاسىب ذنظ ى انى ة فصه 1 نظز + 2 ػ ه )اسثىػ ا(

نموذج وصف المقرر جايؼح تغذاد كه ح انؼهىو / لسى ػهىو انحاسىب ذنظ ى انى ة فصه 1 نظز + 2 ػ ه )اسثىػ ا( نموذج وصف المقرر وصف المقرر يوفر وصف المقرر هذا إيجازا مقتضيا ألهم خصائص المقرر ومخرجات التعلم المتوقعة من الطالب تحقيقها مبرهنا عما إذا كان قد حقق االستفادة القصوى من فرص التعلم المتاحة. والبد من الربط

More information

Chapter 3 Protocols and the TCP/IP Suite

Chapter 3 Protocols and the TCP/IP Suite Chapter 3 Protocols and the TCP/IP Suite 3.1 The Need for a Protocol Architecture need for a standard communication tasks by layers architecture peer protocol: a set of rules or conventions to exchange

More information

CS-461 Internetworking. Dr. Mohamed Aboutabl

CS-461 Internetworking. Dr. Mohamed Aboutabl CS-461 Internetworking Dr. Mohamed Aboutabl http://www.cs.jmu.edu/users/aboutams The McGraw-Hill Companies, Inc., 2000 1 Chapter 1 Introduction The McGraw-Hill Companies, Inc., 2000 2 Internet today Network

More information

Developing a Real Time Method for the Arabic Heterogonous DBMS Transformation

Developing a Real Time Method for the Arabic Heterogonous DBMS Transformation Developing a Real Time Method for the Arabic Heterogonous DBMS Transformation S. M. Hadi, S. Murtatha Department of Information & Comm. Eng. College of Engineering Al- Khawarizmi,University of Baghdad

More information

TCP/IP protocol suite

TCP/IP protocol suite TCP/IP protocol suite The TCP/IP protocol suite was developed prior to the OSI model. Therefore, the layers in the TCP/IP protocol suite do not match exactly with those in the OSI model. The original TCP/IP

More information

androidcode.ir/post/install-eclipse-windows-android-lynda

androidcode.ir/post/install-eclipse-windows-android-lynda ا موزش برنامه نويسی اندرويد آ زش ای ا رو ز ن ر دو, ۲۶ دی ۰۷:۰۶ ۱۳۹۰ ب.ظ مراحل نصب ايکليپس (Eclipse) روی ويندوز ی ) ( آ زش ا ا در و وز در pdf ا آ زش( 2.43 ( ۰. از ا اس دی رو ده (راھ ی.(SDK ۱.ا ای ا رو ازش

More information

Printed and Handwritten Arabic Characters Recognition and Convert It to Editable Text Using K-NN and Fuzzy Logic Classifiers

Printed and Handwritten Arabic Characters Recognition and Convert It to Editable Text Using K-NN and Fuzzy Logic Classifiers Journal of University of Thi-Qar Vol.9 No. Mar.4 Printed and Handwritten Arabic Characters Recognition and Convert It to Editable Text Using K-NN and Fuzzy Logic Classifiers Zamen F. Jaber Computer Department,

More information

Journal of University of Thi Qar Vol. (10).. No. (2) June Influence of Multiple Encryptions on the Security and Accuracy of

Journal of University of Thi Qar Vol. (10).. No. (2) June Influence of Multiple Encryptions on the Security and Accuracy of Influence of Multiple Encryptions on the Security and Accuracy of Abstract Sent and Received Data Jehan K. Shareef Information systems (IS) jihansh@yahoo.com Media Faculty/ Thi- Qar University Encryption

More information

Chapter 2 Network Models 2.1

Chapter 2 Network Models 2.1 Chapter 2 Network Models 2.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 2-1 LAYERED TASKS We use the concept of layers in our daily life. As an example,

More information

Strings 20/11/2018. a.k.a. character arrays. Strings. Strings

Strings 20/11/2018. a.k.a. character arrays. Strings. Strings ECE 150 Fundamentals of Programming Outline 2 a.k.a. character arrays In this lesson, we will: Define strings Describe how to use character arrays for strings Look at: The length of strings Copying strings

More information

Urdu Usage Guide ر ہاردو

Urdu Usage Guide ر ہاردو ب" Urdu Usage Guide و 6 اردو ر This guide will explain how to use Urdu on the computer. After Urdu support has been installed and it is possible to toggle between English and Urdu, two additional items

More information

CPS221 Lecture: Layered Network Architecture

CPS221 Lecture: Layered Network Architecture CPS221 Lecture: Layered Network Architecture Objectives last revised 9/8/14 1. To discuss the OSI layered architecture model 2. To discuss the specific implementation of this model in TCP/IP Materials:

More information

Proposed keyboard layout for Swahili in Arabic script

Proposed keyboard layout for Swahili in Arabic script أ Proposed keyboard layout for Swahili in Arabic script Kevin Donnelly kevin@dotmon.com Version 0.1, March 2010 Introduction Swahili was originally written in Arabic script in its area of origin (the littoral

More information

Course: APPLICATION PROGRAMMING IN THE.NET Semester: Fall-2013/2014

Course: APPLICATION PROGRAMMING IN THE.NET Semester: Fall-2013/2014 Individual assignment Student Name: ID: 1-Learning Outcomes being assessed: LO1. Explain critically the concepts of the.net framework. LO2. Design, implement and test programs in the C# language 2-Handing

More information

Networks: Access Management

Networks: Access Management Networks: Access Management Class Notes # 3 Protocols and Layers (part 1) September 19, 2003 Functions A small set of functions form the basis of all protocols. Not all protocols have all functions; this

More information

ISO/IEC JTC 1/SC 2. Yoshiki MIKAMI, SC 2 Chair Toshiko KIMURA, SC 2 Secretariat JTC 1 Plenary 2012/11/05-10, Jeju

ISO/IEC JTC 1/SC 2. Yoshiki MIKAMI, SC 2 Chair Toshiko KIMURA, SC 2 Secretariat JTC 1 Plenary 2012/11/05-10, Jeju ISO/IEC JTC 1/SC 2 Yoshiki MIKAMI, SC 2 Chair Toshiko KIMURA, SC 2 Secretariat 2012 JTC 1 Plenary 2012/11/05-10, Jeju what is new Work items ISO/IEC 10646 2 nd ed. 3 rd ed. (2012) ISO/IEC 14651 Amd.1-2

More information

Award Winning Typefaces by Linotype

Award Winning Typefaces by Linotype Newly released fonts and Midan awarded coveted design prize Award Winning Typefaces by Linotype Bad Homburg, 23 April 2007. Linotype has once again received critical recognition for their commitment to

More information

ظرة ول. Information Technology ١

ظرة ول. Information Technology ١ ظرة ول ات Information Technology Dr. Ahmed Abd El-Ghany Abd El-Ghany Ewees IT 14 Ewees Part 1 ١ وواوتھ : ھ ادة ا $% إ"! وا! وات إد+ل وإ+*اج أو '&ت أو أو ا"*"- 4"5 ز و $12 ا 1 م ا/ب إ" 4 زھ $&8 ا 2"5 ن

More information

Introduction to Search/Retrieval Technologies. Yi Zhang Information System and Technology Management IRKM Lab University of California Santa Cruz

Introduction to Search/Retrieval Technologies. Yi Zhang Information System and Technology Management IRKM Lab University of California Santa Cruz Introduction to Search/Retrieval Technologies Yi Zhang Information System and Technology Management IRKM Lab University of California Santa Cruz 1 Information Retrieval and Knowledge Management Lab Focus:

More information

Managing Resource Sharing Conflicts in an Open Embedded Software Environment

Managing Resource Sharing Conflicts in an Open Embedded Software Environment Managing Resource Sharing Conflicts in an Open Embedded Software Environment Koutheir Attouchi To cite this version: Koutheir Attouchi. Managing Resource Sharing Conflicts in an Open Embedded Software

More information

BRAND GUIDELINES JANUARY 2017

BRAND GUIDELINES JANUARY 2017 BRAND GUIDELINES JANUARY 2017 GETTING AROUND Page 03 05 06 07 08 09 10 12 14 15 Section 01 - Our Logo 02 - Logo Don ts 03 - Our Colors 04 - Our Typeface 06 - Our Art Style 06 - Pictures 07 - Call to Action

More information

Design and Analysis WLAN Nodes Performance Based on Roaming Technique

Design and Analysis WLAN Nodes Performance Based on Roaming Technique The Proceedings of the 4 th Conference of College of Education for Pure Sciences Design and Analysis WLAN Nodes Performance Based on Roaming Technique Khalil I. Alsaif Mosul University Computer Science

More information

ب ام خذا ذ بخش ذ ه زباى

ب ام خذا ذ بخش ذ ه زباى ب ام خذا ذ بخش ذ ه زباى ع اى هذرک : بز اه یسی PLC FATEK ایجاد ارتباط با FATEK PLC 9 1 ا.رضایی 1391.7.27 ت ضیحات : تعذاد صفح : شوار یزایش : یزایش ک ذ : تاریخ یزایش : +9821-228-831-70 1 www.dornamehr.com

More information

The Use of Dynamic Sliding Window with IPSec. إستخدام نافذة اإلنزالق الديناميكية مع تقنية IPSec

The Use of Dynamic Sliding Window with IPSec. إستخدام نافذة اإلنزالق الديناميكية مع تقنية IPSec The Proceedings of the 4 th Conference of College of Education for Pure Sciences The Use of Dynamic Sliding Window with IPSec Mishall H. Awaad Department of Computer Science, Education College, Thi-Qar

More information

ISeCure. The ISC Int'l Journal of Information Security. High Capacity Steganography Tool for Arabic Text Using Kashida.

ISeCure. The ISC Int'l Journal of Information Security. High Capacity Steganography Tool for Arabic Text Using Kashida. The ISC Int'l Journal of Information Security July 2010, Volume 2, Number 2 (pp. 107 118) http://www.isecure-journal.org High Capacity Steganography Tool for Arabic Text Using Kashida Adnan Abdul-Aziz

More information

Image Coloring using Genetic Algorithm

Image Coloring using Genetic Algorithm Republic of Iraq Ministry of Higher Education And Scientific Research Baghdad University College of Science Image Coloring using Genetic Algorithm A Project Report Submitted to the College of Science,

More information

Discussion Chapter#11

Discussion Chapter#11 The Islamic University of Gaza Faculty of Engineering Department of Computer Engineering ECOM 4314: Data Communication Instructor: Dr. Aiman Abu Samra T.A.: Eng. Alaa O. Shama Discussion Chapter#11 Selective

More information

Chapter 2 Network Models 2.1

Chapter 2 Network Models 2.1 Chapter 2 Network Models 2.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Network Models n Network Architecture: n A) Hardware: at the core of any network;

More information

Brand Identity Manual Fonts and Typography

Brand Identity Manual Fonts and Typography Brand Identity Manual Fonts and Typography Brand Fonts NCB TYPE LANGUAGE To maintain a coherent brand identity, NCB uses a set of compatible and typefaces as its corporate primary fonts. These adjacent

More information

1: Review Of Semester Provide an overview of encapsulation.

1: Review Of Semester Provide an overview of encapsulation. 1: Review Of Semester 1 1.1.1.1. Provide an overview of encapsulation. Networking evolves to support current and future applications. By dividing and organizing the networking tasks into separate layers/functions,

More information

Satellite Images Classification in Rural Areas Based on Fractal Dimension

Satellite Images Classification in Rural Areas Based on Fractal Dimension Satellite Images Classification in Rural Areas Based on Fractal Dimension Mohammed Sahib Mahdi Assistant Professor Department of Computer Science College of Science Alnahrain University email: altaeimohamed@gmail.com

More information

Privacy Preserving in Data Mining أبقاء انغش ف حؼذ انب ا اث

Privacy Preserving in Data Mining أبقاء انغش ف حؼذ انب ا اث Privacy Preserving in Data Mining أبقاء انغش ف حؼذ انب ا اث Assistant Lecturer/ Heba Adnan Raheem Master Computer Sciences Kerbala university/college of Sciences (Computer Department) Assistant Professor

More information

ار ا ار ا ا م ا وا وال. ٢٩ ٢٥ ذار ٢٠١٢

ار ا ار ا ا م ا وا وال.  ٢٩ ٢٥ ذار ٢٠١٢ ار ا ار ا ا م ا وا وال ا اى ا د. ا ي mustafa.eleoui@hiast.edu.sy meleoui@gmail.com ٢٩ ٢٥ ذار ٢٠١٢ ات ه م LATEX أ"!ا ام )& +,ا )*ا XeArabic (& ا'&%ل %ا -./*ا ا%دت 2) 3 آ&( ل %4 ا 78 رات ا%*6- إدراج ا; 7

More information

SHEFA STORE CORPORATE DESIGN MANUAL BRAND & FUNCTION // CORPORATE DESIGN GUIDELINES. 01 : Corporate Identity. 02 : Corporate Stationery

SHEFA STORE CORPORATE DESIGN MANUAL BRAND & FUNCTION // CORPORATE DESIGN GUIDELINES. 01 : Corporate Identity. 02 : Corporate Stationery BRAND & FUNCTION // CORPORATE DESIGN GUIDELINES SHEFA STORE CORPORATE DESIGN MANUAL 01 : Corporate Identity 02 : Corporate Stationery 03 : Interactive Designs www.shefa-store.com Corporate Identity 01

More information

Online Arabic Handwritten Character Recognition Based on a Rule Based Approach

Online Arabic Handwritten Character Recognition Based on a Rule Based Approach Journal of Computer Science 2012, 8 (11), 1859-1868 ISSN 1549-3636 2012 doi:10.3844/jcssp.2012.1859.1868 Published Online 8 (11) 2012 (http://www.thescipub.com/jcs.toc) Online Arabic Handwritten Character

More information

b) Diverse forms of physical connection - all sorts of wired connections, wireless connections, fiber optics, etc.

b) Diverse forms of physical connection - all sorts of wired connections, wireless connections, fiber optics, etc. Objectives CPS221 Lecture: Layered Network Architecture last revised 6/22/10 1. To discuss the OSI layered architecture model 2. To discuss the specific implementation of this model in TCP/IP Materials:

More information

Proposed Solution for Writing Domain Names in Different Arabic Script Based Languages

Proposed Solution for Writing Domain Names in Different Arabic Script Based Languages Proposed Solution for Writing Domain Names in Different Arabic Script Based Languages TF-AIDN, June/2014 Presented by AbdulRahman I. Al-Ghadir Researcher in SaudiNIC Content What we have done so far? Problem

More information

An Ontology Based Approach to Enhance Information Retrieval from Al-Shamelah Digital Librar

An Ontology Based Approach to Enhance Information Retrieval from Al-Shamelah Digital Librar IUG Journal of Natural and Engineering Studies Peer-reviewed Journal of Islamic University-Gaza ISSN 2409-4587 IUGNES Vol 24, No 1, 2016, pp 39-53 An Ontology Based Approach to Enhance Information Retrieval

More information

A Performance Comparison of Various Routing Protocols Based on Load-Balance in Mobile Ad Hoc Networks

A Performance Comparison of Various Routing Protocols Based on Load-Balance in Mobile Ad Hoc Networks A Performance Comparison of Various Routing Protocols Based on Load-Balance in Mobile Ad Hoc Networks Ali Hassan Muosa Department of Computer Science, Faculty Science Computers and Mathematic, Thi- Qar

More information

MEMORANDUM OF UNDERSTANDING. between [PLEASE INSERT NAME OF THE OVERSEAS GOVERNMENT AGENCY AND NAME OF THE COUNTRY] and

MEMORANDUM OF UNDERSTANDING. between [PLEASE INSERT NAME OF THE OVERSEAS GOVERNMENT AGENCY AND NAME OF THE COUNTRY] and MEMORANDUM OF UNDERSTANDING between [PLEASE INSERT NAME OF THE OVERSEAS GOVERNMENT AGENCY AND NAME OF THE COUNTRY] and THE PUBLIC PRIVATE PARTNERSHIP AUTHORITY, PRIME MINISTER S OFFICE, THE PEOPLE'S REPUBLIC

More information

A MELIORATED KASHIDA-BASED APPROACH FOR ARABIC TEXT STEGANOGRAPHY

A MELIORATED KASHIDA-BASED APPROACH FOR ARABIC TEXT STEGANOGRAPHY A MELIORATED KASHIDA-BASED APPROACH FOR ARABIC TEXT STEGANOGRAPHY Ala'a M. Alhusban and Jehad Q. Odeh Alnihoud Computer Science Dept, Al al-bayt University, Mafraq, Jordan ABSTRACT Steganography is an

More information

Segmentation and Recognition of Arabic Printed Script

Segmentation and Recognition of Arabic Printed Script Institute of Advanced Engineering and Science IAES International Journal of Artificial Intelligence (IJ-AI) Vol. 2, No. 1, March 2013, pp. 20~26 ISSN: 2252-8938 20 Segmentation and Recognition of Arabic

More information

Energy-aware and secure routing with trust levels for wireless ad hoc and sensor networks

Energy-aware and secure routing with trust levels for wireless ad hoc and sensor networks Scholars' Mine Doctoral Dissertations Student Research & Creative Works Spring 2007 Energy-aware and secure routing with trust levels for wireless ad hoc and sensor networks Eyad Taqieddin Follow this

More information

Network Reference Models

Network Reference Models Network Reference Models LECTURE (2) Network Reference Models A framework (guideline) for network implementation and troubleshooting. Divides complex functions into simpler components. Importance of reference

More information

Journal of Kerbala University, Vol. 11 No.4 Scientific. 2013

Journal of Kerbala University, Vol. 11 No.4 Scientific. 2013 Extending Public Switched Telephone Networks Billing Services Using VoIP Applications جعزيز الخدمات الححاسبية لشبكات الهاجف العامة باسحخدام جطبيقات الصىت عبر بروجىكىل اإلنحرنث Saif Ali Abed Computer Science

More information

Microsoft Word 2007 إعداد أمل امحد رئيص قطم جكنولوجيا املعلومات مكحبة البحر األعظم العامة مجعية الرعاية املحكاملة

Microsoft Word 2007 إعداد أمل امحد رئيص قطم جكنولوجيا املعلومات مكحبة البحر األعظم العامة مجعية الرعاية املحكاملة 2009 Microsoft Word 2007 إعداد هبة حممود حممد األمري رئيص قطم جكنولوجيا املعلومات مكحبة البحر األعظم العامة مجعية الرعاية املحكاملة - مراجعة رشا عصمث رئيص قطم جكنولوجيا املعلومات املركس الثقايف عال مرضي

More information

UNIT III NETWORK LAYER 1. What are the network support layers and the user support layers? Network support layers: The network support layers are Physical layer, Data link layer and Network layer. These

More information

SCALE-SPACE APPROACH FOR CHARACTER SEGMENTATION IN SCANNED IMAGES OF ARABIC DOCUMENTS

SCALE-SPACE APPROACH FOR CHARACTER SEGMENTATION IN SCANNED IMAGES OF ARABIC DOCUMENTS 31 st December 016. Vol.94. No. 005-016 JATIT & LLS. All rights reserved. ISSN: 199-8645 www.jatit.org E-ISSN: 1817-3195 SCALE-SPACE APPROACH FOR CHARACTER SEGMENTATION IN SCANNED IMAGES OF ARABIC DOCUMENTS

More information

Language Manual. Arabic HQ and HD

Language Manual. Arabic HQ and HD Language Manual Arabic HQ and HD Language Manual: Arabic HQ and HD Published 22 March 2011 Copyright 2003-2011 Acapela Group. All rights reserved This document was produced by Acapela Group. We welcome

More information

Chapter 2 Network Models

Chapter 2 Network Models Computer Networks Al-Mustansiryah University Elec. Eng. Department College of Engineering Fourth Year Class Chapter 2 Network Models 2.1 2-1 LAYERED TASKS We use the concept of layers in our daily life.

More information

Islamic University of Gaza Faculty of Engineering Department of Computer Engineering ECOM 4021: Networks Discussion. Chapter 1.

Islamic University of Gaza Faculty of Engineering Department of Computer Engineering ECOM 4021: Networks Discussion. Chapter 1. Islamic University of Gaza Faculty of Engineering Department of Computer Engineering ECOM 4021: Networks Discussion Chapter 1 Foundation Eng. Haneen El-Masry February, 2014 A Computer Network A computer

More information

Compiler and Translators

Compiler and Translators 1 References "Compilers Principles, techniques, & tools", by Alfred Aho, second edition, Pearson Addison Wesley, 2007. Compiler and Translators Translator is a program that takes as input a program written

More information

TCP/IP THE TCP/IP ARCHITECTURE

TCP/IP THE TCP/IP ARCHITECTURE TCP/IP-1 The Internet Protocol (IP) enables communications across a vast and heterogeneous collection of networks that are based on different technologies. Any host computer that is connected to the Internet

More information

Packet Steganography Using IP ID. Abstract

Packet Steganography Using IP ID. Abstract Packet Steganography Using IP ID *1 Head of Computer Science Department, Collage of Science, University of Diyala, Iraq 2* Computer Eng., University of Technology, Baghdad, Iraq Received 21 January 2014

More information

APPENDIX F THE TCP/IP PROTOCOL ARCHITECTURE

APPENDIX F THE TCP/IP PROTOCOL ARCHITECTURE APPENDIX F THE TCP/IP PROTOCOL ARCHITECTURE William Stallings F.1 TCP/IP LAYERS... 2 F.2 TCP AND UDP... 4 F.3 OPERATION OF TCP/IP... 6 F.4 TCP/IP APPLICATIONS... 10 Copyright 2014 Supplement to Computer

More information

Network Model: Each layer has a specific function.

Network Model: Each layer has a specific function. OBJECTIVES: To discuss the OSI model and its layer architecture and to show the interface between the layers. To briefly discuss the functions of each layer in the OSI model. To introduce the TCP/IP protocol.

More information

Advanced Computer Networks. Rab Nawaz Jadoon DCS. Assistant Professor COMSATS University, Lahore Pakistan. Department of Computer Science

Advanced Computer Networks. Rab Nawaz Jadoon DCS. Assistant Professor COMSATS University, Lahore Pakistan. Department of Computer Science Advanced Computer Networks Department of Computer Science DCS COMSATS Institute of Information Technology Rab Nawaz Jadoon Assistant Professor COMSATS University, Lahore Pakistan Advanced Computer Networks

More information

Research Article Offline Handwritten Arabic Character Recognition Using Features Extracted from Curvelet and Spatial Domains

Research Article Offline Handwritten Arabic Character Recognition Using Features Extracted from Curvelet and Spatial Domains Research Journal of Applied Sciences, Engineering and Technology 11(2): 158-164, 2015 DOI: 10.19026/rjaset.11.1702 ISSN: 2040-7459; e-issn: 2040-7467 2015 Maxwell Scientific Publication Corp. Submitted:

More information

PERFORMANCE OF THE GOOGLE DESKTOP, ARABIC GOOGLE DESKTOP AND PEER TO PEER APPLICATION IN ARABIC LANGUAGE

PERFORMANCE OF THE GOOGLE DESKTOP, ARABIC GOOGLE DESKTOP AND PEER TO PEER APPLICATION IN ARABIC LANGUAGE PERFORMANCE OF THE GOOGLE DESKTOP, ARABIC GOOGLE DESKTOP AND PEER TO PEER APPLICATION IN ARABIC LANGUAGE Abd El Salam AL HAJJAR, Anis ISMAIL, Mohammad HAJJAR, Mazen EL- SAYED University Institute of TechnologyLebanese

More information

THE LOGO Guidelines LOGO. Waste Free Environment Brand Guidelines

THE LOGO Guidelines LOGO. Waste Free Environment Brand Guidelines BRAND GUIDELINES THE LOGO Guidelines LOGO SYMBOL TYPEFACE 2 COLOR SCHEME When do I use the full-color logo? Use the full-color logo as frequently as possible to maximize and strengthen the brand. PRIMARY

More information

Data Communication and Network. Introducing Networks

Data Communication and Network. Introducing Networks Data Communication and Network Introducing Networks Introduction to Networking Computer network, or simply network Refers to the connection of two or more computers by some type of medium You can connect

More information

Using Arabic Wordnet for semantic indexation in information retrieval system

Using Arabic Wordnet for semantic indexation in information retrieval system www.ijcsi.org 327 Using Arabic Wordnet for semantic indexation in information retrieval system Mohammed Alaeddine Abderrahim 1, Mohammed El Amine Abderrahim 2 Mohammed Amine Chikh 2 1 Department of Computer

More information

1 See footnote 2, below.

1 See footnote 2, below. To: UTC From: Azzeddine Lazrek, Cadi Ayyad University, Marrakesh, Morocco (with Debbie Anderson, SEI, UC Berkeley, and with assistance from Murray Sargent, Laurentiu Iancu, and others) RE: Arabic Math

More information

االنتفاخ في انقراءاخ انقرآ يح

االنتفاخ في انقراءاخ انقرآ يح االنتفاخ في انقراءاخ انقرآ يح * 00 8 يهخص 00 Abstract This research aims at locating some of the areas of this unique literary art in the Quranic readings (Qira at), and illustrating the effect of this

More information

Introduction to Protocols

Introduction to Protocols Chapter 6 Introduction to Protocols 1 Chapter 6 Introduction to Protocols What is a Network Protocol? A protocol is a set of rules that governs the communications between computers on a network. These

More information

COMS Introduction to Computers. Networking

COMS Introduction to Computers. Networking COMS 1001 Introduction to Computers Networking What's Ahead Networking layers Network Speeds Protocols, sockets, client/server Routing, DNS, Ethernet, LANs, wireless What is a Network? Loose definition:

More information