Lecture Notes in Computer Science
|
|
- Cora Shaw
- 8 years ago
- Views:
Transcription
1 Lecture Notes in Computer Science Edited by G. Goos and J. Hartmanis 105 D.W. Davies E. Holler E.D.Jensen S. R. Kimbleton B. W. Lampson G. LeLann K. J. Thurber R. W. Watson Distributed Systems Architecture and Implementation An Advanced Course FBMathematikTUD Edited by B. W. Lampson, M. Paul, and H. J. Siegert Fachbereich MathematlK Techniscbe Koc.occhu.'e Darmstadt Bib'iothek.nv.-Nr.g 48 SO4 Springer-Verlag Berlin Heidelberg New York 1981
2 Contents 1. Motivations, objectives and characterization of distributed systems 1 Gerard LeLann, INRIA Projet Pilote Sirius 1.1. Motivations Technological changes Microelectronics technology Interconnection and communication technology User needs Objectives Increased performance Extensibility Increased availability Resource sharing Comments Characterization What is distributed? What is new? Distributed system architecture model :...'. 10 Richard W. Watson, University of California Lawrence Livermore Laboratory Introduction Layers and interfaces Abstract objects as a unifying concept The model layers Introduction Need for a distributed operating system Application layer Distributed operating system service layer The interprocess communication layer Hardware/firmware Components Issues common to all layers Introduction Identifiers (naming) Error control ; Resource management Synchronization ; Protection.' Object representation, encoding, translation Testing, debugging, and measurement Global implementation and optimization issues Conclusions 43
3 VI CONTENTS 3. Interprocess communication layer: Introduction 44 Kenneth J. Thurber, Sperry Univac 3.1. Introduction Transmission medium Hardware paths links Intervenors Protocols Protocol properties, : Interconnection structure Multiplexing Arbitration Computer networks versus distributed computers Summary 56 ^4. Hardware interconnection technology 57 Kenneth J. Thurber, Sperry Univac 4.1. Introduction Topologies Point-to-point Multi-point Taxonomies Distributed system interfaces Path allocation Bandwidth/throughput tradeoffs More on protocols Buffers Case studies More on networks versus distributed computers Summary Link level 86 Gerard LeLann, INRIA Projet Pilote Sirius 5.1 Introduction HDLC Frame structure JS HDLC elements of procedure The Arpanet IMP-IMP protocol The Cyclades MV8 protocol Hierarchy 94 Donald W. Davies, Computing Technology Unit, National Physical Laboratory ( ) Richard W. Watson, University of California Lawrence Livermore Laboratory l ( ) 6.1. Introduction The problems of a hierarchy Arpanet as an example Addressing, routing and congestion in large mesh networks 104
4 CONTENTS VU 6.4. Topology optimization Packet versus circuit switching Datagrams and virtual circuits Datagrams Virtual circuits Datagrams vs virtual circuits Network interfaces ' Introduction The pseudo device interface strategy Importance of symmetry Need for error checking at all levels Flow and congestion control Full duplex interface Datagram versus virtual circuit interfaces Xerox PUP as an example datagram interface and service X.25 as an example vc interface Implications of X.25 for distributed systems Network frontends Distributed systems and internetwork design issues Introduction Levels of network interconnection Conclusions J IPC interface and end-to-end protocols 140 Richard W. Watson, University of California Lawrence Livermore Laboratory Introduction IPC service Desired IPC characteristics The IPC interface..< Example IPC service model ' Underlying IPC environment Services required by an EEP of the next lower level Levels of end-to-end services Origin, destination identifiers EEP data objects and data stream synchronization marks Error control and EEP state synchronization Introduction Error types and implications Need for end-to-end error assurance Error control mechanisms used while a connection exists Connection management Comparison of three-way-handshake and timer approaches Bounding maximum-packet-lifetime Reliable control information Protection Resource management Introduction Identifier space Segmentation and reassembly : Flow control Priority.173
5 Vlll CONTENTS Measurement and diagnostics Conclusions Distributed control 175 E. Douglas Jensen, Computer Science Department, Carnegie-Mellon University 8.1. Abstract Introduction The control space Communication and the decentralization of control Acknowledgement Identifiers (naming) in distributed systems 191 Richard W. Watson, University of California Lawrence Livermore Laboratory l 9.1. Introduction Identifier goals and implications 195 ^ 9.3. Unique machine-oriented identifiers Human-oriented names Addresses and routing Conclusion Protection 211 Donald W. Davies, Computing Technology Unit, National Physical Laboratory Basic protection needs Protection in distributed systems Single key cryptography and the Data Encryption Standard Measuring the strength of a cipher system The data encryption standard Block and stream ciphers...; Block chaining : Application of a cipher system at different levels in the hierarchy Key distribution Public key cipher systems The discrete exponential function The power function and its use in cryptography The public key cipher of Rivest, Shamir and Adleman The need for a digital signature The registry of public keys Other public key ciphers and signatures Access control : The access matrix The access control list ; Capabilities Access control lists combined with capabilities A simplified model for changing access rights Capabilities in a distributed system 24Q The location of access control in a distributed system 242
6 CONTENTS IX 11. Atomic transactions 246 Butler W. Lampson, Xerox Palo Alto Research Center Introduction System overview Consistency and transactions The physical system Disk storage Processors and crashes Communication Simple, compound and restartable actions The stable system Stable storage Stable processors Remote procedures Stable sets and compound actions Stable sets Compound atomic actions Transactions Refinements File representation Ordering of actions Aborts Synchronization., 266 Gerard LeLann, INRIA Projet Pilote Sirius Introduction Consistency and atomicity Event ordering and atomicity.: Partial and total orderings Atomic operations Synchronization Synchronization and types of computing systems Fully replicated computing Strictly partitioned computing Partitioned and partially replicated computing Event ordering examples Link protocols Executives Database system nucleus Synchronization mechanisms for distributed systems Centralized versus decentralized synchronization Centralized mechanisms Decentralized mechanisms Evaluation criteria Multiple copy update 284 Elmar Holler, Instiiutfu'r Datenverarbeitung, Kernforschungszentrum Karlsruhe Introduction..; Basic architecture of multiple copy update mechanisms Solutions to the multiple copy update problem 289
7 X CONTENTS Voting solutions Non voting solutions : 300 D.4. Verification of solutions Evaluation of solutions Applications and protocols 308 Stephen R. Kimbleton and Pearl Wang, National Bureau of Standards 3 ( ) Butler W. Lampson, Xerox Palo Alto Research Center ( ) Introduction Supporting program access to data Distributed applications Database management systems (DBMSs) The need for DBMSs DBMS differences Datamodels ; The relational data model The hierarchical data model The Codasyl data model Data manipulation languages Network virtual data managers NVDM desirability and structure Constructing the network-wide view of data Data integrity Controlling access Maintaining meaning Simplifying specification XNDM - An Experimental Network Data Manager Translation technology Nature of the translation function Translation alternatives : The query translation process an informal description A taxonomy of major translation issues : Implementation approach XNQL translator specifics Data transfer protocols (DTPs) DTP services Data and its translation/transformation Implementing a data translator/transformer A data transfer protocol An example-the NBS experimental network operating system XNOS overview Supporting uniform system-system interactions Parameter and data representation Types Binding Encoding : Conversion : Debugging, testing and measurement A remote debugger Monitoring communication Eventlogs ; Remote procedure calls : 365
8 CONTENTS Xi The no-crash case The crash case Error recovery 371 Gerard LeLann, INRIA Projet Pilote Sinus Introduction Basic concepts and definitions Error recovery The Tandem/16 computing system Sirius-Delta ' Transaction commitment Recovering from failures Unrecoverable faults and failures Hardware issues 377 Kenneth J. Thurber, Sperry Univac 4 ' => Introduction Design issues Executive control functions Approach ' Hardware concept Implicit primitives Explicit primitives Functionally Distributed Architectures (FDA) Control overhead Virtual Machines (VM) and Virtual Machine Monitors (VMM) Local networks." Introduction : Application embedded hardware Tum key systems i Subsystem building blocks Components/modules Chips : Hardware overview Network Systems Corporation HYPERchannel Further issues Conclusion Hardware/software relationships in distributed systems 413 E. Douglas Jensen, Computer Science Department, Carnegie-Mellon University Introduction Assigning functionality to layers i The implementation of functions within layers Hardware/software relationships in distributed computer systems Bus bandwidth Bus medium Broadcasts Acknowledgment deferral Transmission addressing Communication support.419
9 xii CONTENTS Bit/word/transmission synchronization Conclusion The National Software Works (NSW) 421 ElmarHoller, InstitutfurDatenverarbeitung, Kernforschungszentrum Karlsruhe Introduction, System architecture NSW components MSG: The NSW interprocess communication facility Front end: The NSW user interface Foreman: providing the tool execution environment File Package: Thefile handling facility for NSW Works Manager: The NSW monitor The NSW reliability concept DAD: A debugging tool for debugging NSW Ethernet, Pup and Violet 446 Butler W. Lampson, Xerox Palo Alto Research Center The Alto and the Ethernet Implementation The Pup internetwork Introduction Design principles and issues The basic model: networks connected with gateways Simplicity Datagrams versus virtual circuits.' Individual networks as packet transport mechanisms Internetwork gateways ' A layered hierarchy of protocols : ; Naming, addressing, and routing Flow control and congestion control Reliable transport Packet fragmentation Implementation Level 0: Packet transport Level 1: Internetwork datagrams Level 2: Interprocess communication Level 3: Application protocols The distributed file system : Introduction Access mechanics Client responsibilities Server crashes and aborted transactions Local caches of shared data : Directories Summary ' Violet: A distributed, replicated calendar system...: Introduction Environment ' System architecture ~.! Replicated data : Sharing and locking The performance of the architecture 482
10 CONTENTS XU Implementation notes Conclusion Conclusion 486 Kenneth J. Thurber, Sperry Univac Introduction What we have defined What we think we know What we conjecture What we think we don't know What we advise What you should know What we don't agree upon Acknowledgements 492 References 493 Index 507
Security (II) ISO 7498-2: Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012
Course Outline: Fundamental Topics System View of Network Security Network Security Model Security Threat Model & Security Services Model Overview of Network Security Security Basis: Cryptography Secret
More informationComputer Network. Interconnected collection of autonomous computers that are able to exchange information
Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.
More informationComputer Networks Vs. Distributed Systems
Computer Networks Vs. Distributed Systems Computer Networks: A computer network is an interconnected collection of autonomous computers able to exchange information. A computer network usually require
More informationEE4367 Telecom. Switching & Transmission. Prof. Murat Torlak
Packet Switching and Computer Networks Switching As computer networks became more pervasive, more and more data and also less voice was transmitted over telephone lines. Circuit Switching The telephone
More informationCOMPUTER NETWORKS SECOND EDITION. ANDREW S.fjANENBAUM. Vrije Universiteit Amsterdam, The Netherlands. Nachrichtentechnische Bib'iothek THD Inv.
COMPUTER NETWORKS SECOND EDITION ANDREW S.fjANENBAUM Vrije Universiteit Amsterdam, The Netherlands Nachrichtentechnische Bib'iothek THD Inv.-Ni,: tq(s ULB Darmstadt iiiiiir 17800787 =3JE Prentice-Hall
More informationProtocols and Architecture. Protocol Architecture.
Protocols and Architecture Protocol Architecture. Layered structure of hardware and software to support exchange of data between systems/distributed applications Set of rules for transmission of data between
More informationCommunication Networks. MAP-TELE 2011/12 José Ruela
Communication Networks MAP-TELE 2011/12 José Ruela Network basic mechanisms Introduction to Communications Networks Communications networks Communications networks are used to transport information (data)
More information524 Computer Networks
524 Computer Networks Section 1: Introduction to Course Dr. E.C. Kulasekere Sri Lanka Institute of Information Technology - 2005 Course Outline The Aim The course is design to establish the terminology
More informationOperating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師
Lecture 7: Distributed Operating Systems A Distributed System 7.2 Resource sharing Motivation sharing and printing files at remote sites processing information in a distributed database using remote specialized
More informationCS 78 Computer Networks. Internet Protocol (IP) our focus. The Network Layer. Interplay between routing and forwarding
CS 78 Computer Networks Internet Protocol (IP) Andrew T. Campbell campbell@cs.dartmouth.edu our focus What we will lean What s inside a router IP forwarding Internet Control Message Protocol (ICMP) IP
More informationInternetworking. Problem: There is more than one network (heterogeneity & scale)
Internetworking Problem: There is more than one network (heterogeneity & scale) Hongwei Zhang http://www.cs.wayne.edu/~hzhang Internetworking: Internet Protocol (IP) Routing and scalability Group Communication
More informationComputer Networks CS321
Computer Networks CS321 Dr. Ramana I.I.T Jodhpur Dr. Ramana ( I.I.T Jodhpur ) Computer Networks CS321 1 / 22 Outline of the Lectures 1 Introduction OSI Reference Model Internet Protocol Performance Metrics
More informationLink Layer. 5.6 Hubs and switches 5.7 PPP 5.8 Link Virtualization: ATM and MPLS
Link Layer 5.1 Introduction and services 5.2 Error detection and correction 5.3Multiple access protocols 5.4 Link-Layer Addressing 5.5 Ethernet 5.6 Hubs and switches 5.7 PPP 5.8 Link Virtualization: and
More informationThe OSI Model and the TCP/IP Protocol Suite PROTOCOL LAYERS. Hierarchy. Services THE OSI MODEL
The OSI Model and the TCP/IP Protocol Suite - the OSI model was never fully implemented. - The TCP/IP protocol suite became the dominant commercial architecture because it was used and tested extensively
More informationCOMMUNICATION NETWORKS WITH LAYERED ARCHITECTURES. Gene Robinson E.A.Robinsson Consulting 972 529-6395 ROB1200@aol.com
COMMUNICATION NETWORKS WITH LAYERED ARCHITECTURES Gene Robinson E.A.Robinsson Consulting 972 529-6395 ROB1200@aol.com 9 March 1999 IEEE802 N-WEST STANDARDS MEETING FOR BROADBAND WIRELESS ACCESS SYSTEMS
More informationHow To Understand And Understand Network Theory
University of Southern California Course Title: EE450: Computer Networks Semester: Fall Semester 2014 Instructor: Professor A. Zahid, azahid@usc.edu Office: PHE 418, 213-740-9058 Office Hours: TTH 9:00
More informationModule 15: Network Structures
Module 15: Network Structures Background Topology Network Types Communication Communication Protocol Robustness Design Strategies 15.1 A Distributed System 15.2 Motivation Resource sharing sharing and
More informationChapter 14: Distributed Operating Systems
Chapter 14: Distributed Operating Systems Chapter 14: Distributed Operating Systems Motivation Types of Distributed Operating Systems Network Structure Network Topology Communication Structure Communication
More informationBasic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet
Basic Networking Concepts 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet 1 1. Introduction -A network can be defined as a group of computers and other devices connected
More informationThe OSI and TCP/IP Models. Lesson 2
The OSI and TCP/IP Models Lesson 2 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Introduction to the OSI Model Compare the layers of the OSI and TCP/IP
More informationInterconnection Networks
Advanced Computer Architecture (0630561) Lecture 15 Interconnection Networks Prof. Kasim M. Al-Aubidy Computer Eng. Dept. Interconnection Networks: Multiprocessors INs can be classified based on: 1. Mode
More informationChapter 16: Distributed Operating Systems
Module 16: Distributed ib System Structure, Silberschatz, Galvin and Gagne 2009 Chapter 16: Distributed Operating Systems Motivation Types of Network-Based Operating Systems Network Structure Network Topology
More informationLecture 2: Protocols and Layering. CSE 123: Computer Networks Stefan Savage
Lecture 2: Protocols and Layering CSE 123: Computer Networks Stefan Savage Last time Bandwidth, latency, overhead, message size, error rate Bandwidth-delay product Delay Bandwidth High-level run through
More informationHow To Understand The Concept Of A Distributed System
Distributed Operating Systems Introduction Ewa Niewiadomska-Szynkiewicz and Adam Kozakiewicz ens@ia.pw.edu.pl, akozakie@ia.pw.edu.pl Institute of Control and Computation Engineering Warsaw University of
More informationStudy Plan Masters of Science in Computer Engineering and Networks (Thesis Track)
Plan Number 2009 Study Plan Masters of Science in Computer Engineering and Networks (Thesis Track) I. General Rules and Conditions 1. This plan conforms to the regulations of the general frame of programs
More informationSecurity for Computer Networks
Security for Computer Networks An Introduction to Data Security in Teleprocessing and Electronic Funds Transfer D. W. Davies Consultant for Data Security and W. L. Price National Physical Laboratory, Teddington,
More informationGuide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols
Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among various
More informationContents. Foreword. Acknowledgments
Foreword Preface Acknowledgments xv xvii xviii CHAPTER 1 Introduction 1 1.1 What Is Mission Critical? 1 1.2 Purpose of the Book 2 1.3 Network Continuity Versus Disaster Recovery 2 1.4 The Case for Mission-Critical
More informationIP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life
Overview Dipl.-Ing. Peter Schrotter Institute of Communication Networks and Satellite Communications Graz University of Technology, Austria Fundamentals of Communicating over the Network Application Layer
More informationNetwork Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶
Network Security 網 路 安 全 Lecture 1 February 20, 2012 洪 國 寶 1 Outline Course information Motivation Introduction to security Basic network concepts Network security models Outline of the course 2 Course
More informationSAN Conceptual and Design Basics
TECHNICAL NOTE VMware Infrastructure 3 SAN Conceptual and Design Basics VMware ESX Server can be used in conjunction with a SAN (storage area network), a specialized high speed network that connects computer
More informationTHE OSI REFERENCE MODEL LES M C LELLAN DEAN WHITTAKER SANDY WORKMAN
THE OSI REFERENCE MODEL LES M C LELLAN DEAN WHITTAKER SANDY WORKMAN OVERVIEW THE NEED FOR STANDARDS OSI - ORGANISATION FOR STANDARDISATION THE OSI REFERENCE MODEL A LAYERED NETWORK MODEL THE SEVEN OSI
More informationCSET 4750 Computer Networks and Data Communications (4 semester credit hours) CSET Required IT Required
CSET 4750 Computer Networks and Data Communications (4 semester credit hours) CSET Required IT Required Current Catalog Description: Computer network architectures and their application to industry needs.
More informationComputer Networks: LANs, WANs The Internet
1 Computer Networks: LANs, WANs The Internet Required reading: Garcia 1.1 and 1.2 CSE 3213, Fall 2010 Instructor: N. Vlajic History of Computers 2 Computer a machine that manipulates data according to
More informationChapter 17: Distributed Systems
Chapter 17: Distributed Systems Chapter 17: Distributed Systems Advantages of Distributed Systems Types of Network-Based Operating Systems Network Structure Communication Structure Communication Protocols
More informationICS 153 Introduction to Computer Networks. Inst: Chris Davison cbdaviso@uci.edu
ICS 153 Introduction to Computer Networks Inst: Chris Davison cbdaviso@uci.edu 1 ICS 153 Introduction to Computer Networks Course Goals Understand the basic principles of computer networks Design Architecture
More informationCommunications and Computer Networks
SFWR 4C03: Computer Networks and Computer Security January 5-8 2004 Lecturer: Kartik Krishnan Lectures 1-3 Communications and Computer Networks The fundamental purpose of a communication system is the
More informationInternet Working 5 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004
5 th lecture Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004 1 43 Last lecture Lecture room hopefully all got the message lecture on tuesday and thursday same
More informationLocal Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software
Local Area What s a LAN? A transmission system, usually private owned, very speedy and secure, covering a geographical area in the range of kilometres, comprising a shared transmission medium and a set
More informationIP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP
CSCE 515: Computer Network Programming TCP/IP IP Network Layer Wenyuan Xu Department of Computer Science and Engineering University of South Carolina IP Datagrams IP is the network layer packet delivery
More informationReal-Time (Paradigms) (51)
Real-Time (Paradigms) (51) 5. Real-Time Communication Data flow (communication) in embedded systems : Sensor --> Controller Controller --> Actor Controller --> Display Controller Controller Major
More informationTopics. Distributed Databases. Desirable Properties. Introduction. Distributed DBMS Architectures. Types of Distributed Databases
Topics Distributed Databases Chapter 21, Part B Distributed DBMS architectures Data storage in a distributed DBMS Distributed catalog management Distributed query processing Updates in a distributed DBMS
More informationAnalysis on Virtualization Technologies in Cloud
Analysis on Virtualization Technologies in Cloud 1 V RaviTeja Kanakala, V.Krishna Reddy, K.Thirupathi Rao 1 Research Scholar, Department of CSE, KL University, Vaddeswaram, India I. Abstract Virtualization
More informationWhat is CSG150 about? Fundamentals of Computer Networking. Course Outline. Lecture 1 Outline. Guevara Noubir noubir@ccs.neu.
What is CSG150 about? Fundamentals of Computer Networking Guevara Noubir noubir@ccs.neu.edu CSG150 Understand the basic principles of networking: Description of existing networks, and networking mechanisms
More informationModule 1. Introduction. Version 2 CSE IIT, Kharagpur
Module 1 Introduction Lesson 2 Layered Network Architecture Specific Functional Objectives On Completion of this lesson, the students will be able to: State the requirement for layered approach Explain
More informationReview: Lecture 1 - Internet History
Review: Lecture 1 - Internet History late 60's ARPANET, NCP 1977 first internet 1980's The Internet collection of networks communicating using the TCP/IP protocols 1 Review: Lecture 1 - Administration
More informationCSE 3461 / 5461: Computer Networking & Internet Technologies
Autumn Semester 2014 CSE 3461 / 5461: Computer Networking & Internet Technologies Instructor: Prof. Kannan Srinivasan 08/28/2014 Announcement Drop before Friday evening! k. srinivasan Presentation A 2
More informationUnderstanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX
APPENDIX A Introduction Understanding TCP/IP To fully understand the architecture of Cisco Centri Firewall, you need to understand the TCP/IP architecture on which the Internet is based. This appendix
More informationOverview of Computer Networks
Overview of Computer Networks Client-Server Transaction Client process 4. Client processes response 1. Client sends request 3. Server sends response Server process 2. Server processes request Resource
More informationInformation and Communications Technology Courses at a Glance
Information and Communications Technology Courses at a Glance Level 1 Courses ICT121 Introduction to Computer Systems Architecture This is an introductory course on the architecture of modern computer
More informationThe OSI Model and the TCP/IP Protocol Suite
The OSI Model and the TCP/IP Protocol Suite To discuss the idea of multiple layering in data communication and networking and the interrelationship between layers. To discuss the OSI model and its layer
More informationProtocol Architecture
Protocol Architecture ed Protocol Architectures OSI Reference Model TCP/IP Protocol Stack Need for Protocols The task of exchanging information between devices requires a high degree of cooperation between
More information8/27/2014. What is a computer network? Introduction. Business Applications (1) Uses of Computer Networks. Business Applications (2)
What is a computer network? Introduction Chapter 1 A number of separate but interconnected computers A collection of autonomous computers interconnected by a single technology COURSE FOCUS: design and
More informationObjectives. Distributed Databases and Client/Server Architecture. Distributed Database. Data Fragmentation
Objectives Distributed Databases and Client/Server Architecture IT354 @ Peter Lo 2005 1 Understand the advantages and disadvantages of distributed databases Know the design issues involved in distributed
More informationInternet Control Protocols Reading: Chapter 3
Internet Control Protocols Reading: Chapter 3 ARP - RFC 826, STD 37 DHCP - RFC 2131 ICMP - RFC 0792, STD 05 1 Goals of Today s Lecture Bootstrapping an end host Learning its own configuration parameters
More informationOverview of Network Hardware and Software. CS158a Chris Pollett Jan 29, 2007.
Overview of Network Hardware and Software CS158a Chris Pollett Jan 29, 2007. Outline Scales of Networks Protocol Hierarchies Scales of Networks Last day, we talked about broadcast versus point-to-point
More informationNetwork Attached Storage. Jinfeng Yang Oct/19/2015
Network Attached Storage Jinfeng Yang Oct/19/2015 Outline Part A 1. What is the Network Attached Storage (NAS)? 2. What are the applications of NAS? 3. The benefits of NAS. 4. NAS s performance (Reliability
More informationThe OSI & Internet layering models
CSE 123 Computer Networks Fall 2009 Lecture 2: Protocols & Layering Today What s a protocol? Organizing protocols via layering Encoding layers in packets The OSI & Internet layering models The end-to-end
More informationAbout the Author About the Technical Contributors About the Technical Reviewers Acknowledgments. How to Use This Book
About the Author p. xv About the Technical Contributors p. xvi About the Technical Reviewers p. xvi Acknowledgments p. xix Preface p. xxiii About This Book p. xxiii How to Use This Book p. xxiv Appendices
More informationProtocol Specification & Design. The Internet and its Protocols. Course Outline (trivia) Introduction to the Subject Teaching Methods
The Internet and its Protocols Protocol Specification & Design Robert Elz kre@munnari.oz.au kre@coe.psu.ac.th http://fivedots.coe.psu.ac.th/~kre/ Friday: 13:30-15:00 (Rm: 101)???: xx:x0-xx:x0 (Rm:???)
More informationChapter 2 - The TCP/IP and OSI Networking Models
Chapter 2 - The TCP/IP and OSI Networking Models TCP/IP : Transmission Control Protocol/Internet Protocol OSI : Open System Interconnection RFC Request for Comments TCP/IP Architecture Layers Application
More informationEthernet. Ethernet. Network Devices
Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking
More informationHow To Understand The Layered Architecture Of A Network
COMPUTER NETWORKS NETWORK ARCHITECTURE AND PROTOCOLS The Need for Standards Computers have different architectures, store data in different formats and communicate at different rates Agreeing on a particular
More informationSFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005. Lecturer: Kartik Krishnan Lecture 1-3
SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005 Lecturer: Kartik Krishnan Lecture 1-3 Communications and Computer Networks The fundamental purpose of a communication network is the exchange
More informationThe OSI Model: Understanding the Seven Layers of Computer Networks
Expert Reference Series of White Papers The OSI Model: Understanding the Seven Layers of Computer Networks 1-800-COURSES www.globalknowledge.com The OSI Model: Understanding the Seven Layers of Computer
More informationRARP: Reverse Address Resolution Protocol
SFWR 4C03: Computer Networks and Computer Security January 19-22 2004 Lecturer: Kartik Krishnan Lectures 7-9 RARP: Reverse Address Resolution Protocol When a system with a local disk is bootstrapped it
More informationClient/Server and Distributed Computing
Adapted from:operating Systems: Internals and Design Principles, 6/E William Stallings CS571 Fall 2010 Client/Server and Distributed Computing Dave Bremer Otago Polytechnic, N.Z. 2008, Prentice Hall Traditional
More informationThe Internet. An Engineering Approach to Computer Networking
The Internet An Engineering Approach to Computer Networking My how you ve grown! The Internet has doubled in size every year since 1969 In 1996, 10 million computers joined the Internet By July 1997, 10
More informationPrinciples and characteristics of distributed systems and environments
Principles and characteristics of distributed systems and environments Definition of a distributed system Distributed system is a collection of independent computers that appears to its users as a single
More informationData Communication and Computer Network
1 Data communication principles, types and working principles of modems, Network principles, OSI model, functions of data link layer and network layer, networking components, communication protocols- X
More informationThe OSI model has seven layers. The principles that were applied to arrive at the seven layers can be briefly summarized as follows:
1.4 Reference Models Now that we have discussed layered networks in the abstract, it is time to look at some examples. In the next two sections we will discuss two important network architectures, the
More informationAgenda. Distributed System Structures. Why Distributed Systems? Motivation
Agenda Distributed System Structures CSCI 444/544 Operating Systems Fall 2008 Motivation Network structure Fundamental network services Sockets and ports Client/server model Remote Procedure Call (RPC)
More informationM.Sc. IT Semester III VIRTUALIZATION QUESTION BANK 2014 2015 Unit 1 1. What is virtualization? Explain the five stage virtualization process. 2.
M.Sc. IT Semester III VIRTUALIZATION QUESTION BANK 2014 2015 Unit 1 1. What is virtualization? Explain the five stage virtualization process. 2. What are the different types of virtualization? Explain
More informationNovember 2013. Defining the Value of MPLS VPNs
November 2013 S P E C I A L R E P O R T Defining the Value of MPLS VPNs Table of Contents Introduction... 3 What Are VPNs?... 4 What Are MPLS VPNs?... 5 What Are the Benefits of MPLS VPNs?... 8 How Do
More informationWhite Paper Abstract Disclaimer
White Paper Synopsis of the Data Streaming Logical Specification (Phase I) Based on: RapidIO Specification Part X: Data Streaming Logical Specification Rev. 1.2, 08/2004 Abstract The Data Streaming specification
More information10 Gigabit Ethernet: Scaling across LAN, MAN, WAN
Arasan Chip Systems Inc. White Paper 10 Gigabit Ethernet: Scaling across LAN, MAN, WAN By Dennis McCarty March 2011 Overview Ethernet is one of the few protocols that has increased its bandwidth, while
More information19 Comparison of Ethernet Systems
Frithjof Klasen Ever since the end of the 90 s, the usage of industrial Ethernet in automation has been a pursued target. Along with this, the desire emerged to have a universal and standard communication
More informationInternetworking and Internet-1. Global Addresses
Internetworking and Internet Global Addresses IP servcie model has two parts Datagram (connectionless) packet delivery model Global addressing scheme awaytoidentifyall H in the internetwork Properties
More informationELEC3030 Computer Networks
ELEC3030 Computer Networks Professor Sheng Chen: Building 86, Room 1021 E-mail: sqc@ecs.soton.ac.uk Download lecture slides from: http://www.ecs.soton.ac.uk/ sqc/el336/ or get them from Course Office (ECS
More informationIntroduction: Why do we need computer networks?
Introduction: Why do we need computer networks? Karin A. Hummel - Adapted slides of Prof. B. Plattner, plattner@tik.ee.ethz.ch - Add-on material included of Peterson, Davie: Computer Networks February
More informationThe Network Layer Functions: Congestion Control
The Network Layer Functions: Congestion Control Network Congestion: Characterized by presence of a large number of packets (load) being routed in all or portions of the subnet that exceeds its link and
More informationCommunication Networks. MAP-TELE 2011/12 José Ruela
Communication Networks MAP-TELE 2011/12 José Ruela Network basic mechanisms Network Architectures Protocol Layering Network architecture concept A network architecture is an abstract model used to describe
More informationLecture 28: Internet Protocols
Lecture 28: Internet Protocols 15-110 Principles of Computing, Spring 2016 Dilsun Kaynar, Margaret Reid-Miller, Stephanie Balzer Reminder: Exam 2 Exam 2 will take place next Monday, on April 4. Further
More informationData Link Protocols. TCP/IP Suite and OSI Reference Model
Data Link Protocols Relates to Lab. This module covers data link layer issues, such as local area networks (LANs) and point-to-point links, Ethernet, and the Point-to-Point Protocol (PPP). 1 TCP/IP Suite
More informationMaster Course Computer Networks IN2097
Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Master Course Computer Networks IN2097 Prof. Dr.-Ing. Georg Carle Christian Grothoff, Ph.D. Chair for
More informationLecture 1. Lecture Overview. Intro to Networking. Intro to Networking. Motivation behind Networking. Computer / Data Networks
Lecture 1 An Introduction to Networking Chapter 1, pages 1-22 Dave Novak BSAD 146, Introduction to Networking School of Business Administration University of Vermont Lecture Overview Brief introduction
More informationChapter 18: Database System Architectures. Centralized Systems
Chapter 18: Database System Architectures! Centralized Systems! Client--Server Systems! Parallel Systems! Distributed Systems! Network Types 18.1 Centralized Systems! Run on a single computer system and
More informationComputer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks
Computer Networks Lecture 06 Connecting Networks Kuang-hua Chen Department of Library and Information Science National Taiwan University Local Area Networks (LAN) 5 kilometer IEEE 802.3 Ethernet IEEE 802.4
More informationKingdom of Saudi Arabia King Saud University
Kingdom of Saudi Arabia King Saud University College of Computer & Information Sciences Department of Computer Engineering The MASTER S PROGRAM IN COMPUTER ENGINEERING ٢٠٠٣ M.S. PROGRAM IN COMPUTER ENGINEERING
More informationCSMC 417. Computer Networks Prof. Ashok K Agrawala. 2011 Ashok Agrawala. January 11 CMSC417 Set 1 1
CSMC 417 Computer Networks Prof. Ashok K Agrawala 2011 Ashok Agrawala 1 General Instructor - Ashok K. Agrawala agrawala@cs.umd.edu 4149 AVW TA - Office Hours Class Meets Tu Th 8:00 9:30 CSIC 3117 2 Prerequisite
More informationSolaris For The Modern Data Center. Taking Advantage of Solaris 11 Features
Solaris For The Modern Data Center Taking Advantage of Solaris 11 Features JANUARY 2013 Contents Introduction... 2 Patching and Maintenance... 2 IPS Packages... 2 Boot Environments... 2 Fast Reboot...
More informationNetwork Design. Yiannos Mylonas
Network Design Yiannos Mylonas Physical Topologies There are two parts to the topology definition: the physical topology, which is the actual layout of the wire (media), and the logical topology, which
More informationDistributed Systems. Virtualization. Paul Krzyzanowski pxk@cs.rutgers.edu
Distributed Systems Virtualization Paul Krzyzanowski pxk@cs.rutgers.edu Except as otherwise noted, the content of this presentation is licensed under the Creative Commons Attribution 2.5 License. Virtualization
More informationHow To Understand The Internet From A Telephone To A Computer (For A Computer)
Basic Concepts In Computer Networking Antonio Carzaniga Faculty of Informatics University of Lugano September 19, 2014 Goal of this Lecture Understand what packet switching is Understand what circuit switching
More informationICTTEN8195B Evaluate and apply network security
ICTTEN8195B Evaluate and apply network security Release 1 ICTTEN8195B Evaluate and apply network security Modification History Release Release 2 Comments This version first released with ICT10 Integrated
More informationMultiMedia and Imaging Databases
MultiMedia and Imaging Databases Setrag Khoshafian A. Brad Baker Technische H FACHBEREIGM W-C^KA VK B_l_3JLJ0 T H E K Inventar-N*.: Sachgebiete: Standort: Morgan Kaufmann Publishers, Inc. San Francisco,
More informationProtocols. Packets. What's in an IP packet
Protocols Precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet Protocol (bottom level) all packets shipped from network to network as IP packets
More informationData Communications and Networking Overview
Data Communications and Networking Overview Raj Jain Washington University Saint Louis, MO 63131 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse473-05/ 2-1
More informationTD 271 Rev.1 (PLEN/15)
INTERNATIONAL TELECOMMUNICATION UNION STUDY GROUP 15 TELECOMMUNICATION STANDARDIZATION SECTOR STUDY PERIOD 2009-2012 English only Original: English Question(s): 12/15 Geneva, 31 May - 11 June 2010 Source:
More informationWhat s a protocol? What s a protocol? A closer look at network structure: What s the Internet? What s the Internet? What s the Internet?
What s the Internet? PC server laptop cellular handheld access points wired s connected computing devices: hosts = end systems running apps communication s fiber, copper, radio transmission rate = bandwidth
More information