Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme
|
|
- Jared Foster
- 7 years ago
- Views:
Transcription
1 Chapter 2 Technical Basics: Layer 1 Methods for Medium Access: Layer 2 Chapter 3 Wireless Networks: Bluetooth, WLAN, WirelessMAN, WirelessWAN Mobile Telecommunication Networks: GSM, GPRS, UMTS Chapter 4 Mobility on the network layer Mobility on the transport layer Mobility support on the application layer Application Layer Mobility Support Conclusion 1
2 Application Example: WWW and Mobility Protocol (HTTP, Hypertext Transfer Protocol) and language (HTML, Hypertext Markup Language) of the WWW have not been designed for mobile applications and mobile devices, thus creating many problems Typical transfer sizes HTTP request: byte Responses on the average <10 kbyte, header 160 byte, GIF 4.1 kbyte, JPEG 12.8 kbyte, HTML 5.6 kbyte, but also many large files that cannot be ignored The Web is no file system Web pages are not simple files to download Static and dynamic content, interaction with servers via forms, content transformation, push technologies etc. Many hyperlinks, automatic loading and reloading, redirecting A single click might have big consequences Mobile devices usually have small displays HTML content usually consists of frames each one too large for the display Interaction is more difficult like with fixed computers 2
3 HTTP 1.0 and Mobility HTTP was designed for fixed networks Designed for high capacity (compared to wireless access) and low delay Big and redundant protocol headers (readable for humans, stateless, therefore big headers in ASCII) Uncompressed content transfer Huge overhead per request compared with the content (e.g., a GET request) since using TCP (3-way-handshake) DNS lookup by client causes additional traffic Caching could reduce network traffic, but is quite often disabled by information providers to be able to create user profiles, usage statistics etc. more and more dynamic objects which cannot be cached Security problems: how to use SSL/TLS together with proxies? POST messages (i.e., sending to a server) can typically not be buffered, very problematic if currently disconnected 3
4 How to support Mobility in WWW? You cannot change the WWW but why not adopting content for mobile clients? Application gateways (like proxies), enhanced servers Simple clients, pre-calculations in the fixed network: compression, filtering, content extraction Automatic adaptation to network characteristics, e.g. picture scaling, color reduction, transformation of document format (e.g., PS to TXT), automatic abstract generation Maybe also use variants of HTTP and HTML: HDML (handheld device markup language): simple language similar to HTML requiring a special browser HDTP (handheld device transport protocol): transport protocol for HDML Problems Proprietary approaches, require special enhancements for browsers Heterogeneous devices make approaches more complicated 4
5 WAP - Wireless Application Protocol Goals of WAP: Deliver Internet content and enhanced services to mobile devices and users (mobile phones, PDAs) Independence from wireless network standards Open for everyone to participate, protocol specifications will be proposed to standardization bodies Applications should scale well beyond current transport media and device types and should also be applicable to future developments Platforms: e.g., GSM (900, 1800, 1900), CDMA IS-95, TDMA IS-136, 3G systems (IMT-2000, UMTS, W-CDMA, cdma2000, ) Scope of standardization: Browser: micro browser, similar to existing, well-known browsers in the Internet Script language: similar to Java script, adapted to the mobile environment WTA/WTAI: Wireless Telephony Application (Interface): access to all telephone functions Content formats: e.g., business cards (vcard), calendar events (vcalender) Protocol layers: transport layer, security layer, session layer etc. WAP 2.0: use of wireless TCP 5
6 WAP - Network Elements Combined with proxies, content can be adopted: fixed network wireless network Internet HTML filter WML WAP proxy Binary WML HTML web server HTML WML HTML filter/ WAP proxy Binary WML PSTN WTA server Binary WML Binary WML (Wireless Markup Language): binary file format for clients 6
7 WAP Architecture (not to be recognized) Service discovery External services EFI Security services Crypto libraries Multimedia Messaging ( ) WAE/WTA User Agent (WML, XHTMLMP) Content formats Push Application framework Provisioning Navigation Discovery Authentication Identification Push OTA Capability Negotiation Synchronisation Cookies Session Service Lookup PKI Secure transport Hypermedia transfer (WTP+WSP, HTTP) Datagrams (WDP, UDP) Streaming Connections (TCP with wireless profile) MMS Transfer Transport Protocol framework Secure bearer IPv4 CSD USSD GPRS... IPv6 SMS FLEX MPAK... Bearer 7
8 Conclusion Lehrstuhl für Informatik 4 Mobile Communications considers may aspects It is about wireless networks (It is about design of mobile devices, not treated here) It also deals with problems on higher layers caused by wireless network device mobility Many wireless networks exist Data networks: WLAN, WMAN (WiMAX), Bluetooth, UWB, Telephony networks: DECT, GSM, GPRS, UMTS, (Broadcast networks like DVB and DAB, as well as satellite communications) 4 th generation: somehow unifying all wireless networks with an IP-based core Not sufficient solved mobility problems on higher layers Mobile IP and variants of TCP are not really good in practice Also other protocols (e.g. routing) are still under development The application layer needs to be redesigned not only because of other transmission situation, but also because of another category of devices 8
9 Following Lectures This lecture was about communication basics; what s next? Distributed Systems: general application layer protocols, cooperation of application processes as addition to communication, support of developing distributed applications using middleware (SS 08) Modeling and Evaluation of Communication Systems: methods for analytic evaluation of new systems or protocols before implementation (SS 08) Simulation: simulative evaluation as addition to analytic evaluation (SS 08) Security in Communication Networks: security-related aspects of communication, e.g. encryption, authentication, anonymity, (?) Multimedia Systems: media formats and coding, quality of service mechanisms, and transfer/storage of multimedia data (?) Mobile Multimedia (Ericsson): media formats, mobile multimedia streaming, mobile broadcasting and mobile TV, IP Multimedia Subsystem IMS, (?) 9
WAP 2.x architecture Features, services and functions
2.x architecture Features, services and functions Peter Arnby, Johan Hjelm and Peter Stark Web services adapted to the wireless environment have been a tremendous success, especially in Japan, where more
More informationWireless Application Protocol (WAP)
Wireless Application Protocol (WAP) Definition Wireless application protocol (WAP) is an application environment and set of communication protocols for wireless devices designed to enable manufacturer-,
More informationTCP and Wireless Networks Classical Approaches Optimizations TCP for 2.5G/3G Systems. Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme
Chapter 2 Technical Basics: Layer 1 Methods for Medium Access: Layer 2 Chapter 3 Wireless Networks: Bluetooth, WLAN, WirelessMAN, WirelessWAN Mobile Networks: GSM, GPRS, UMTS Chapter 4 Mobility on the
More informationMobile IP and Wireless Application Protocol
Mobile IP and Wireless Application Protocol Mobile IP Uses Enable computers to maintain Internet connectivity while moving from one Internet attachment point to another Mobile user's point of attachment
More informationEvolution of the WWW. Communication in the WWW. WWW, HTML, URL and HTTP. HTTP Abstract Message Format. The Client/Server model is used:
Evolution of the WWW Communication in the WWW World Wide Web (WWW) Access to linked documents, which are distributed over several computers in the History of the WWW Origin 1989 in the nuclear research
More informationQuestions for Mobile Communications 2 nd ed.
Questions for Mobile Communications 2 nd ed. Jochen H. Schiller, Freie Universität Berlin, Germany schiller@computer.org, www.jochenschiller.de 1. Introduction 1.1 Discover the current numbers of subscribers
More informationChapter 6: Broadcast Systems. Mobile Communications. Unidirectional distribution systems DVB DAB. High-speed Internet. architecture Container
Mobile Communications Chapter 6: Broadcast Systems Unidirectional distribution systems DAB DVB architecture Container High-speed Internet Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC
More informationIP-based Mobility Management for a Distributed Radio Access Network Architecture. helmut.becker@siemens.com
IP-based Mobility Management for a Distributed Radio Access Network Architecture helmut.becker@siemens.com Outline - Definition IP-based Mobility Management for a Distributed RAN Architecture Page 2 Siemens
More informationApplication Example: WWW. Communication in the WWW. WWW, HTML, URL and HTTP. Loading of Web Pages. The Client/Server model is used in the WWW
Application Example WWW Communication in the WWW In the following application protocol examples for WWW and E-Mail World Wide Web (WWW) Access to linked documents, which are distributed over several computers
More informationTECHNICAL CHALLENGES OF VoIP BYPASS
TECHNICAL CHALLENGES OF VoIP BYPASS Presented by Monica Cultrera VP Software Development Bitek International Inc 23 rd TELELCOMMUNICATION CONFERENCE Agenda 1. Defining VoIP What is VoIP? How to establish
More informationGlossary. network. Also kbit/s: kilobits (1 000) per second; Mbit/s: megabits (1 000 000) per second, and Gbit/s: Gigabits (1 000 000 000) per second.
Glossary 2G: Second-generation mobile network or service. Generic name for second generation networks, for example GSM. network. Also kbit/s: kilobits (1 000) per second; Mbit/s: megabits (1 000 000) per
More informationTCP/IP and the Internet
TCP/IP and the Internet Computer networking today is becoming more and more entwined with the internet. By far the most popular protocol set in use is TCP/IP (Transmission Control Protocol/Internet Protocol).
More informationWeb. Services. Web Technologies. Today. Web. Technologies. Internet WWW. Protocols TCP/IP HTTP. Apache. Next Time. Lecture #3 2008 3 Apache.
JSP, and JSP, and JSP, and 1 2 Lecture #3 2008 3 JSP, and JSP, and Markup & presentation (HTML, XHTML, CSS etc) Data storage & access (JDBC, XML etc) Network & application protocols (, etc) Programming
More informationLab 1: Packet Sniffing and Wireshark
Introduction CSC 5991 Cyber Security Practice Lab 1: Packet Sniffing and Wireshark The first part of the lab introduces packet sniffer, Wireshark. Wireshark is a free opensource network protocol analyzer.
More informationMobility and cellular networks
Mobility and cellular s Wireless WANs Cellular radio and PCS s Wireless data s Satellite links and s Mobility, etc.- 2 Cellular s First generation: initially debuted in Japan in 1979, analog transmission
More informationHighly Available Mobile Services Infrastructure Using Oracle Berkeley DB
Highly Available Mobile Services Infrastructure Using Oracle Berkeley DB Executive Summary Oracle Berkeley DB is used in a wide variety of carrier-grade mobile infrastructure systems. Berkeley DB provides
More informationInternet Control Protocols Reading: Chapter 3
Internet Control Protocols Reading: Chapter 3 ARP - RFC 826, STD 37 DHCP - RFC 2131 ICMP - RFC 0792, STD 05 1 Goals of Today s Lecture Bootstrapping an end host Learning its own configuration parameters
More informationObjectives of Lecture. Network Architecture. Protocols. Contents
Objectives of Lecture Network Architecture Show how network architecture can be understood using a layered approach. Introduce the OSI seven layer reference model. Introduce the concepts of internetworking
More informationBASIC ANALYSIS OF TCP/IP NETWORKS
BASIC ANALYSIS OF TCP/IP NETWORKS INTRODUCTION Communication analysis provides powerful tool for maintenance, performance monitoring, attack detection, and problems fixing in computer networks. Today networks
More informationComputer Networks. Lecture 7: Application layer: FTP and HTTP. Marcin Bieńkowski. Institute of Computer Science University of Wrocław
Computer Networks Lecture 7: Application layer: FTP and Marcin Bieńkowski Institute of Computer Science University of Wrocław Computer networks (II UWr) Lecture 7 1 / 23 Reminder: Internet reference model
More information1 Introduction: Network Applications
1 Introduction: Network Applications Some Network Apps E-mail Web Instant messaging Remote login P2P file sharing Multi-user network games Streaming stored video clips Internet telephone Real-time video
More informationLecture 28: Internet Protocols
Lecture 28: Internet Protocols 15-110 Principles of Computing, Spring 2016 Dilsun Kaynar, Margaret Reid-Miller, Stephanie Balzer Reminder: Exam 2 Exam 2 will take place next Monday, on April 4. Further
More informationGuide to Wireless Communications. Digital Cellular Telephony. Learning Objectives. Digital Cellular Telephony. Chapter 8
Guide to Wireless Communications Digital Cellular Telephony Chapter 2 Learning Objectives Digital Cellular Telephony 3 Describe the applications that can be used on a digital cellular telephone Explain
More informationIP and Mobility. Requirements to a Mobile IP. Terminology in Mobile IP
IP and Mobility Chapter 2 Technical Basics: Layer Methods for Medium Access: Layer 2 Chapter Wireless Networks: Bluetooth, WLAN, WirelessMAN, WirelessWAN Mobile Telecommunication Networks: GSM, GPRS, UMTS
More informationMobile Communications
Mobile Communications Lehrstuhl für Informatik 4 RWTH Aachen Dr. Dirk Thißen Prof. Dr. Otto Spaniol Page 1 Organization Lehrstuhl für Informatik 4 Lecture Dates Monday, 16:30 18:00, AH5 Wednesday, 13:30-15:00,
More informationSWE 444 Internet and Web Application Development. Introduction to Web Technology. Dr. Ahmed Youssef. Internet
SWE 444 Internet and Web Application Development Introduction to Web Technology Dr. Ahmed Youssef Internet It is a network of networks connected and communicating using TCP/IP communication protocol 2
More informationFinal for ECE374 05/06/13 Solution!!
1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -
More informationOPNET Network Simulator
Simulations and Tools for Telecommunications 521365S: OPNET Network Simulator Jarmo Prokkola Research team leader, M. Sc. (Tech.) VTT Technical Research Centre of Finland Kaitoväylä 1, Oulu P.O. Box 1100,
More informationIndex. Common Packet Channel (CPCH) 25 Compression 265, 279 82, 288 header compression 284
bindex.fm Page 296 Tuesday, March 22, 2005 7:17 AM Index 2G, 2.5G, 3G 13 3GPP 118 Release 5 (Rel 5) 124 Release 6 (Rel 6) 125 Release 97/98 (Rel 97/98) 119 Release 99 (Rel 99) 120 4 3GPP2 129 4G 13, 44
More information1. When will an IP process drop a datagram? 2. When will an IP process fragment a datagram? 3. When will a TCP process drop a segment?
Questions 1. When will an IP process drop a datagram? 2. When will an IP process fragment a datagram? 3. When will a TCP process drop a segment? 4. When will a TCP process resend a segment? CP476 Internet
More informationRepeater. BrowserStack Local. browserstack.com 1. BrowserStack Local makes a REST call using the user s access key to browserstack.
Connection Setup Process makes a REST call using the user s access key to chooses a repeater for establishing a secure connection for Local Testing. The repeater exists within the BrowserStack cloud infrastructure.
More informationVALLIAMMAI ENGNIEERING COLLEGE SRM Nagar, Kattankulathur 603203.
VALLIAMMAI ENGNIEERING COLLEGE SRM Nagar, Kattankulathur 603203. DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING Year & Semester : VII/ IV Section : CSE-1 & 2 Subject Code : CS2402 Subject Name : MOBILE
More informationGovernment of Ontario IT Standard (GO-ITS) Number 24.2 Omnibus Technical Standard
Government of Ontario IT Standard (GO-ITS) Number 24.2 Omnibus Technical Standard Version #: 3.0 Status: APPROVED Prepared for the Information Technology Standards Council (ITSC) under the delegated authority
More informationCEB620MOBILE COMPUTING
CEB620MOBILE COMPUTING UNIT 1 1. What is mobile communication? 2. List out the mobile computing function? 3. What are the mobile computing devices? 4. Define mobile? 5. What is wireless device? 6. List
More informationCore Syllabus. Version 2.6 C OPERATE KNOWLEDGE AREA: OPERATION AND SUPPORT OF INFORMATION SYSTEMS. June 2006
Core Syllabus C OPERATE KNOWLEDGE AREA: OPERATION AND SUPPORT OF INFORMATION SYSTEMS Version 2.6 June 2006 EUCIP CORE Version 2.6 Syllabus. The following is the Syllabus for EUCIP CORE Version 2.6, which
More informationInternet, Part 2. 1) Session Initiating Protocol (SIP) 2) Quality of Service (QoS) support. 3) Mobility aspects (terminal vs. personal mobility)
Internet, Part 2 1) Session Initiating Protocol (SIP) 2) Quality of Service (QoS) support 3) Mobility aspects (terminal vs. personal mobility) 4) Mobile IP Session Initiation Protocol (SIP) SIP is a protocol
More informationWireless Communication Methodologies & Wireless Application Protocol
Wireless Communication Methodologies & Wireless Application Protocol (Final Project) By Sankara Krishnaswamy 31 Chadwick Circle Apt # E Nashua NH 03062 Ph: 603 791 8070 (W) 603 888 0053 (H) Email: krisj1@hotmail.com
More informationAdvanced Higher Computing. Computer Networks. Homework Sheets
Advanced Higher Computing Computer Networks Homework Sheets Topic : Network Protocols and Standards. Name the organisation responsible for setting international standards and explain why network standards
More informationMobile Wireless Overview
Mobile Wireless Overview A fast-paced technological transition is occurring today in the world of internetworking. This transition is marked by the convergence of the telecommunications infrastructure
More informationIntroduction to LAN/WAN. Application Layer (Part II)
Introduction to LAN/WAN Application Layer (Part II) Application Layer Topics Domain Name System (DNS) (7.1) Electronic Mail (Email) (7.2) World Wide Web (WWW) (7.3) Electronic Mail (Email) Mostly used
More informationUMTS/GPRS system overview from an IP addressing perspective. David Kessens Jonne Soininen
UMTS/GPRS system overview from an IP addressing perspective David Kessens Jonne Soininen Introduction 1) Introduction to 3GPP networks (GPRS, UMTS) Technical overview and concepts for 3GPP networks Mobility
More informationComputer Networking LAB 2 HTTP
Computer Networking LAB 2 HTTP 1 OBJECTIVES The basic GET/response interaction HTTP message formats Retrieving large HTML files Retrieving HTML files with embedded objects HTTP authentication and security
More informationCDMAone Cellular Phone and WAP Contents
Hitachi Review Vol. 49 (2000), No. 1 21 cdmaone Cellular Phone and WAP Contents Service Teruo Fujii OVERVIEW: The number of mobile phone users in Japan has increased rapidly in recent years, passing the
More informationProtocols. Packets. What's in an IP packet
Protocols Precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet Protocol (bottom level) all packets shipped from network to network as IP packets
More informationM3-R3: INTERNET AND WEB DESIGN
M3-R3: INTERNET AND WEB DESIGN NOTE: 1. There are TWO PARTS in this Module/Paper. PART ONE contains FOUR questions and PART TWO contains FIVE questions. 2. PART ONE is to be answered in the TEAR-OFF ANSWER
More informationW H I T E PA P E R. The concept of robust header compression, ROHC
The concept of robust header compression, ROHC F E B R U A R Y 2 0 0 4 W W W. E F F N E T. C O M The concept of robust header compression, ROHC C O N T E N T S The need for IP header compression.....................3
More informationARIB STD-T63-27.103 V3.1.0. Wide area network synchronisation standard
ARIB STD-T63-27.103 V3.1.0 Wide area network synchronisation standard Refer to "Industrial Property Rights (IPR)" in the preface of ARIB STD-T63 for Related Industrial Property Rights. Refer to "Notice"
More informationNokia E90 Communicator Using WLAN
Using WLAN Nokia E90 Communicator Using WLAN Nokia E90 Communicator Using WLAN Legal Notice Nokia, Nokia Connecting People, Eseries and E90 Communicator are trademarks or registered trademarks of Nokia
More informationHTTP. Internet Engineering. Fall 2015. Bahador Bakhshi CE & IT Department, Amirkabir University of Technology
HTTP Internet Engineering Fall 2015 Bahador Bakhshi CE & IT Department, Amirkabir University of Technology Questions Q1) How do web server and client browser talk to each other? Q1.1) What is the common
More informationThe OSI model has seven layers. The principles that were applied to arrive at the seven layers can be briefly summarized as follows:
1.4 Reference Models Now that we have discussed layered networks in the abstract, it is time to look at some examples. In the next two sections we will discuss two important network architectures, the
More informationCPS221 Lecture: Layered Network Architecture
CPS221 Lecture: Layered Network Architecture Objectives last revised 9/10/12 1. To discuss the OSI layered architecture model 2. To discuss the specific implementation of this model in TCP/IP Materials:
More informationThe Difference Between WAP And XML
TECHNOLOGY NEWS Will WAP Deliver the Wireless Internet? Neal Leavitt With users increasingly adopting Internet-enabled cellular phones and other handheld devices, vendors are looking for platform-independent
More informationLab VI Capturing and monitoring the network traffic
Lab VI Capturing and monitoring the network traffic 1. Goals To gain general knowledge about the network analyzers and to understand their utility To learn how to use network traffic analyzer tools (Wireshark)
More informationBluetooth Protocol Architecture
Bluetooth WHITE PAPER DATE Aug 25th 99 N.B. DOCUMENT NO. 1.C.120/1.0 RESPONSIBLE Riku Mettala E-MAIL ADDRESS riku.mettala@nmp.nokia.com STATUS Bluetooth Protocol Architecture Version 1.0 This white paper
More informationConnecting IPv6 capable Bluetooth Low Energy sensors with the Internet of Things
Connecting IPv6 capable Bluetooth Low Energy sensors with the Internet of Things Johanna Nieminen (Nokia), Future Internet SHOK preconference 30.05.2012 IoT Taxonomy ZigBee 802.5.4 Bluetooth Video RFID
More informationDevelopment of Wireless Networks
Development of Wireless Networks Cellular Revolution In 1990 mobile phone users populate 11 million. By 2004 the figure will become 1 billion Phones are most obvious sign of the success of wireless technology.
More informationQuality of Service in Mobile and Wireless Networks: The Need for Proactive and Adaptive Applications
Quality of Service in Mobile and Wireless Networks: The Need for Proactive and Adaptive Applications Marc Bechler, Hartmut Ritter, Jochen H. Schiller Institute of Telematics, University of Karlsruhe [mbechler
More informationPacket Capture. Document Scope. SonicOS Enhanced Packet Capture
Packet Capture Document Scope This solutions document describes how to configure and use the packet capture feature in SonicOS Enhanced. This document contains the following sections: Feature Overview
More informationCourse Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.
Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols
More informationIP Telephony (Voice over IP)
(Voice over IP) Instructor Ai-Chun Pang, acpang@csie.ntu.edu.tw Office Number: 417, New building of CSIE Textbook Carrier Grade Voice over IP, D. Collins, McGraw-Hill, Second Edition, 2003. Requirements
More informationINTELLIGENT NETWORK SERVICES MIGRATION MORE VALUE FOR THE
INTELLIGENT NETWORK SERVICES MIGRATION MORE VALUE FOR THE Voice over LTE SUBSCRIBER TECHNOLOGY White Paper Mobile operators have invested a lot of time and money in Intelligent Network (IN) services for
More informationS y s t e m A r c h i t e c t u r e
S y s t e m A r c h i t e c t u r e V e r s i o n 5. 0 Page 1 Enterprise etime automates and streamlines the management, collection, and distribution of employee hours, and eliminates the use of manual
More informationPotential Threats to WAP Enabled Devices
Potential Threats to WAP Enabled Devices Eric Chien ABSTRACT The number of WAP-enabled devices is on the rise. Cellular phones are the first widespread devices to adopt WAP (Wireless Application Protocol)
More informationInternet Technologies. World Wide Web (WWW) Proxy Server Network Address Translator (NAT)
Internet Technologies World Wide Web (WWW) Proxy Server Network Address Translator (NAT) What is WWW? System of interlinked Hypertext documents Text, Images, Videos, and other multimedia documents navigate
More informationFrom Digital Television to Internet? A general technical overview of the- DVB- Multimedia Home Platform Specifications
From Digital Television to Internet? A general technical overview of the- DVB- Multimedia Home Platform Specifications Vita Hinze-Hoare Abstract This paper provides a general technical overview of the
More informationComparison of WAP Push and Short Message Service (SMS)
Comparison of WAP Push and Short Message Service (SMS) About Openwave Openwave Systems Inc. (Nasdaq: OPWV) is the worldwide leader of open IP-based communication infrastructure software and applications.
More information802.16 - Usage. Wireless Broadband Networks. Need for Speed WMAN
Wireless Broadband Networks - Usage WLAN: Support of mobile devices, but low data rate for higher number of users What to do for a high number of users or even needed QoS support? Problem of the last mile
More informationApplication Layer -1- Network Tools
EITF25 Internet: Technology and Applications Application Layer -1- Network Tools 2015, Lecture 08 Kaan Bür Previously on EITF25 Addressing above IP Ports, sockets Process-to-process delivery Transport
More informationTHE OSI REFERENCE MODEL LES M C LELLAN DEAN WHITTAKER SANDY WORKMAN
THE OSI REFERENCE MODEL LES M C LELLAN DEAN WHITTAKER SANDY WORKMAN OVERVIEW THE NEED FOR STANDARDS OSI - ORGANISATION FOR STANDARDISATION THE OSI REFERENCE MODEL A LAYERED NETWORK MODEL THE SEVEN OSI
More informationEvolution of the WWW. Communication in the WWW. WWW, HTML, URL and HTTP. HTTP - Message Format. The Client/Server model is used:
Evolution of the WWW Communication in the WWW World Wide Web (WWW) Access to linked documents, which are distributed over several computers in the History of the WWW Origin 1989 in the nuclear research
More informationChapter 6: Conclusion
Chapter 6: Conclusion In this research we have designed the bandwidth optimization control protocol to manage the proposed Dual-bandwidth data path for the CDMA2000-WLAN integrated network. The user s
More informationCleaning Encrypted Traffic
Optenet Documentation Cleaning Encrypted Traffic Troubleshooting Guide iii Version History Doc Version Product Date Summary of Changes V6 OST-6.4.300 01/02/2015 English editing Optenet Documentation
More informationDeployment Guide Microsoft IIS 7.0
Deployment Guide Microsoft IIS 7.0 DG_IIS_022012.1 TABLE OF CONTENTS 1 Introduction... 4 2 Deployment Guide Overview... 4 3 Deployment Guide Prerequisites... 4 4 Accessing the AX Series Load Balancer...
More informationLecture 2-ter. 2. A communication example Managing a HTTP v1.0 connection. G.Bianchi, G.Neglia, V.Mancuso
Lecture 2-ter. 2 A communication example Managing a HTTP v1.0 connection Managing a HTTP request User digits URL and press return (or clicks ). What happens (HTTP 1.0): 1. Browser opens a TCP transport
More informationEthereal: Getting Started
Ethereal: Getting Started Computer Networking: A Topdown Approach Featuring the Internet, 3 rd edition. Version: July 2005 2005 J.F. Kurose, K.W. Ross. All Rights Reserved Tell me and I forget. Show me
More informationIntroduction VOIP in an 802.11 Network VOIP 3
Solutions to Performance Problems in VOIP over 802.11 Wireless LAN Wei Wang, Soung C. Liew Presented By Syed Zaidi 1 Outline Introduction VOIP background Problems faced in 802.11 Low VOIP capacity in 802.11
More informationMobile Communications Chapter 9: Mobile Transport Layer
Mobile Communications Chapter 9: Mobile Transport Layer Motivation TCP-mechanisms Classical approaches Indirect TCP Snooping TCP Mobile TCP PEPs in general Additional optimizations Fast retransmit/recovery
More informationMobile IP Network Layer Lesson 01 OSI (open systems interconnection) Seven Layer Model and Internet Protocol Layers
Mobile IP Network Layer Lesson 01 OSI (open systems interconnection) Seven Layer Model and Internet Protocol Layers Oxford University Press 2007. All rights reserved. 1 OSI (open systems interconnection)
More informationSQA Higher Computing Unit 3b Computer Networking
SCHOLAR Study Guide SQA Higher Computing Unit 3b Computer Networking David Bethune Heriot-Watt University Andy Cochrane Heriot-Watt University Tom Kelly Heriot-Watt University Ian King Heriot-Watt University
More informationADVANTAGES OF AV OVER IP. EMCORE Corporation
ADVANTAGES OF AV OVER IP More organizations than ever before are looking for cost-effective ways to distribute large digital communications files. One of the best ways to achieve this is with an AV over
More informationICTTEN8195B Evaluate and apply network security
ICTTEN8195B Evaluate and apply network security Release 1 ICTTEN8195B Evaluate and apply network security Modification History Release Release 2 Comments This version first released with ICT10 Integrated
More informationAuthentication and Authorisation for Integrated SIP Services in Heterogeneous Environments 1
Authentication and Authorisation for Integrated SIP Services in Heterogeneous Environments 1 Dorgham Sisalem, Jiri Kuthan Fraunhofer Institute for Open Communication Systems (FhG Fokus) Kaiserin-Augusta-Allee
More informationTransport Layer Security Protocols
SSL/TLS 1 Transport Layer Security Protocols Secure Socket Layer (SSL) Originally designed to by Netscape to secure HTTP Version 2 is being replaced by version 3 Subsequently became Internet Standard known
More informationNetwork Technologies
Network Technologies Glenn Strong Department of Computer Science School of Computer Science and Statistics Trinity College, Dublin January 28, 2014 What Happens When Browser Contacts Server I Top view:
More information4.1 CD304 - BSc (Hons) Information Technology (Diploma to Degree Top-up 1 year Full Time)
4.1 CD304 - BSc (Hons) Information Technology (Diploma to Degree Top-up 1 year Full Time) 1. OBJECTIVES The Programme is geared towards producing computer professionals, with a thorough understanding of
More informationWireless Java Programming for Enterprise Applications
Wireless Java Programming for Enterprise Applications Mobile Devices Go Corporate Dan Harkey Shan Appajodu Mike Urkin WILEY PUBLISHING, INC. Jl. ^E^.^l.^ Contents Foreword Preface v vii Part 1. Technologies
More informationTomás P. de Miguel DIT-UPM. dit UPM
Tomás P. de Miguel DIT- 15 12 Internet Mobile Market Phone.com 15 12 in Millions 9 6 3 9 6 3 0 1996 1997 1998 1999 2000 2001 0 Wireless Internet E-mail subscribers 2 (January 2001) Mobility The ability
More informationLehrstuhl für Informatik 4 Kommunikation und verteilte Systeme
Chapter 2: Representation of Multimedia Data Chapter 3: Multimedia Systems Communication Aspects and Services Multimedia Applications and Communication Protocols Quality of Service and Resource Management
More informationDigital media glossary
A Ad banner A graphic message or other media used as an advertisement. Ad impression An ad which is served to a user s browser. Ad impression ratio Click-throughs divided by ad impressions. B Banner A
More informationNetworked AV Systems Pretest
Networked AV Systems Pretest Instructions Choose the best answer for each question. Score your pretest using the key on the last page. If you miss three or more out of questions 1 11, consider taking Essentials
More informationMobile Communications
Organization Lecture Dates Mobile Communications Wednesday, 13:30-15:00, in 5052 Material (Slide Copies and Video Recordings) http://www-i4.informatik.rwth-aachen.de/ content/teaching/lectures/sub/mobil/ws0506/index.html
More informationDigital Audio and Video Data
Multimedia Networking Reading: Sections 3.1.2, 3.3, 4.5, and 6.5 CS-375: Computer Networks Dr. Thomas C. Bressoud 1 Digital Audio and Video Data 2 Challenges for Media Streaming Large volume of data Each
More informationOverview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP
Overview Securing TCP/IP Chapter 6 TCP/IP Open Systems Interconnection Model Anatomy of a Packet Internet Protocol Security (IPSec) Web Security (HTTP over TLS, Secure-HTTP) Lecturer: Pei-yih Ting 1 2
More informationNow SMS/MMS Android Modem Quick Start Guide
Now SMS/MMS Android Modem Quick Start Guide Using a GSM modem, or an Android phone as a modem, is a quick and efficient way to get started with SMS and/or MMS applications. No special service provider
More informationGSM GPRS. Course requirements: Understanding Telecommunications book by Ericsson (Part D PLMN) + supporting material (= these slides)
GSM Example of a PLMN (Public Land Mobile Network) At present most successful cellular mobile system (over 200 million subscribers worldwide) Digital (2 nd Generation) cellular mobile system operating
More informationTechnology/Internet Usage Workshop
Technology/Internet Usage Workshop 1) Workshop Goals (1 st Slide) 2) Computers Desk Top (Show examples) Lap-Top Hand-held Wireless Device Introduce Tammy Welsh from Gateway 3) What is the Internet? The
More informationUnit 23. RTP, VoIP. Shyam Parekh
Unit 23 RTP, VoIP Shyam Parekh Contents: Real-time Transport Protocol (RTP) Purpose Protocol Stack RTP Header Real-time Transport Control Protocol (RTCP) Voice over IP (VoIP) Motivation H.323 SIP VoIP
More informationCellular Networks: Background and Classical Vulnerabilities
Cellular Networks: Background and Classical Vulnerabilities Patrick Traynor CSE 545 1 Cellular Networks Provide communications infrastructure for an estimated 2.6 billion users daily. The Internet connects
More informationMaster Kurs Rechnernetze Computer Networks IN2097
Chair for Network Architectures and Services Institute for Informatics TU München Prof. Carle, Dr. Fuhrmann Master Kurs Rechnernetze Computer Networks IN2097 Prof. Dr.-Ing. Georg Carle Dr. Thomas Fuhrmann
More informationConfiguration Guide. BES12 Cloud
Configuration Guide BES12 Cloud Published: 2016-04-08 SWD-20160408113328879 Contents About this guide... 6 Getting started... 7 Configuring BES12 for the first time...7 Administrator permissions you need
More information