Advanced Computer Networks (CSL858) Vinay Ribeiro
|
|
- Dominick Logan
- 7 years ago
- Views:
Transcription
1 Advanced Computer Networks (CSL858) Vinay Ribeiro
2 Goals of Course Develop a strong understanding of network technologies from the physical to application layer design choices strengths and weaknesses Get a feel of networking research Develop healthy critical eye reading key research papers working with simulators, test beds etc. Enhance communication skills and team work form project teams make class presentations
3 Syllabus 1. Brief history of Computer Networks 2. Protocol layering 3. Point-to-point data communications 4. Error detection and correction 5. Multiple access schemes 6. Internetworking 7. Congestion control and Quality-of-Service 8. Applications
4 Course Web Page and Mailing List Web Page Mailing list (join today!) Subscribe from course web page Instructor s vinay.ribeiro [at] gmail
5 Evaluation Assignments (25pts) Minor Exam (15pts) Major Exam (30pts) Project (30pts)
6 Project Details Form teams of 3 students Choose a topic from the list on course web page Form a project web-page and the link to the instructor (Optional) Use material from your project web-page to contribute to any web-based education project (example: Connexions, cnx.org)
7 Brief History of Computer Networking
8 Why History? Understanding of the past is fundamental to an understanding of the present Where did technology come from? Societal conditions Discoveries Culture Economic factors Today s technology will be history soon!
9 History of Computer Networking Communication Computers Computer Networking
10 History of Computer Networking Focus on some key breakthroughs Claude Shannon John Von Neumann ARPANET
11 Von Neumann ( ) Major contributions to quantum physics, functional analysis, set theory, economics, computer science, topology, numerical analysis, hydrodynamics (of explosions), statistics... Pioneer of modern digital computer published (1945) a paper entitled First Draft of a report to the EDVAC presented all of the basic elements of a stored-program computer
12 Von Neumann Machine Other contributor: Konrad Zuse (1936) (courtesy maxmon.com wikipedia.org) A memory containing both data and instructions. Also to allow both data and instruction memory locations to be read from, and written to, in any desired order A calculating unit capable of performing both arithmetic and logical operations on the data A control unit, which could interpret an instruction retrieved from the memory and select alternative courses of action based on the results of previous operations Concept of Reprogrammable Computer
13 Claude Shannon ( ) Boolean Algebra: His 1937 master's thesis, A Symbolic Analysis of Relay and Switching Circuits Boolean algebra and binary arithmetic could be used to simplify the arrangement of the electromechanical relays used in telephone switches Used arrangements of relays to solve Boolean algebra problems Information Theory: In 1948 published A Mathematical Theory of Communication article. Invented concepts such as Entropy of an information source and Capacity of a communication channel. (courtesy: wikipedia.org)
14 Information Entropy random data source sde1rtn. receiver source of information random data generation (as far as receiver concerned) What is the uncertainty in the source data?
15 Entropy p x i 0.3 Assume source draws data randomly 0.2 Call outcome X 0.1 Takes values Prob X = x i := p x i Entropy : x 1, x 2,..., x n n H X = i=1 p x i log 2 p x i bits/symbol x i Compression rate H X
16 Channel Capacity the amount of information that can be reliably transmitted over a communication channel noise source X channel Y receiver Mathematical definition C=max p x I X ;Y where I(X,Y) is called the mutual information between X and Y can transmit information with zero error at any rate smaller than the capacity C impossible to transmit information at rate larger than capacity C
17 Source-Channel Separation Theorem A source X with entropy H(X) can be transmitted error-free over a channel with capacity C if and only if H<C source Source coder Channel coder channel Channel decoder Source decoder receiver image jpeg Reed-Muller (introduces Reed-Muller jpeg image coder coder errors) decoder decoder Key idea: separate the coders for source and channel
18 ARPANET Project Soviet Union appeared to be #1 scientifically US needed to bring together the brain-power resident in discrete pockets at universities and research institutions to strengthen telecom infrastructure against nuclear attack Advanced Research Projects Agency Network (ARPANET) Distributed (no single point of failure), and widespread Combine diverse computing resources Use packet switching
19 ARPANET Internet ARPANET 1969 Internet (2004) (courtesy: som.csudh.edu) (courtesy: internetworldstat.com) What is the future going to be like?
20 Computers In the Paint! We will have computers in the paint - Nacho Navarro Computers in Household appliances (networked) Body (monitoring health) Environment (sensor networks) Vehicles Paint?? New types of computers Molecular computers Quantum computers
21 Protocol Layering
22 Protocol Layering Networking suite divided into layers Layer: Essentially a piece of code running some protocol related to a networking task Protocol: convention or standard that controls or enables networking tasks What are some tasks? Why divide into layers?
23 Analogy of Postal Network Registered post need confirmation of receipt
24 OSI model Different layers, different functionality
25 Layers in Internet
26 Need for Standard Protocols Proposals usually submitted as RFCs (Request for Comments) Standards bodies (e.g. Internet Engineering Task Force IETF) debate Produce document defining standard
Privacy and Security in the Internet of Things: Theory and Practice. Bob Baxley; bob@bastille.io HitB; 28 May 2015
Privacy and Security in the Internet of Things: Theory and Practice Bob Baxley; bob@bastille.io HitB; 28 May 2015 Internet of Things (IoT) THE PROBLEM By 2020 50 BILLION DEVICES NO SECURITY! OSI Stack
More informationComputer Network. Interconnected collection of autonomous computers that are able to exchange information
Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.
More informationChapter 7: Computer Networks, the Internet, and the World Wide Web. Invitation to Computer Science, C++ Version, Third Edition
Chapter 7: Computer Networks, the Internet, and the World Wide Web Invitation to Computer Science, C++ Version, Third Edition Objectives In this chapter, you will learn about: Basic networking concepts
More informationCSE 3461 / 5461: Computer Networking & Internet Technologies
Autumn Semester 2014 CSE 3461 / 5461: Computer Networking & Internet Technologies Instructor: Prof. Kannan Srinivasan 08/28/2014 Announcement Drop before Friday evening! k. srinivasan Presentation A 2
More informationSFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005. Lecturer: Kartik Krishnan Lecture 1-3
SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005 Lecturer: Kartik Krishnan Lecture 1-3 Communications and Computer Networks The fundamental purpose of a communication network is the exchange
More informationSchool District of Springfield Township
School District of Springfield Township Springfield Township High School Course Overview Course Name: Computer Science Basics Grade(s) Level: 9-12 Course Description Computer Science Basics provides students
More informationVPN Technologies: Definitions and Requirements
VPN Technologies: Definitions and Requirements 1. Introduction VPN Consortium, January 2003 This white paper describes the major technologies for virtual private networks (VPNs) used today on the Internet.
More informationProgrammable Logic Controllers Definition. Programmable Logic Controllers History
Definition A digitally operated electronic apparatus which uses a programmable memory for the internal storage of instructions for implementing specific functions such as logic, sequencing, timing, counting,
More informationThe OSI model has seven layers. The principles that were applied to arrive at the seven layers can be briefly summarized as follows:
1.4 Reference Models Now that we have discussed layered networks in the abstract, it is time to look at some examples. In the next two sections we will discuss two important network architectures, the
More informationFLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE
Form 2A, Page 1 FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE COURSE NUMBER: CET 2600 COURSE TITLE: Network Fundamentals PREREQUISITE(S): CTS 1131 and CTS 1133 COREQUISITE(S): STUDENT
More informationThe Internet and the Public Switched Telephone Network Disparities, Differences, and Distinctions
The Internet and the Public Switched Telephone Network Disparities, Differences, and Distinctions This paper discusses the telephone network infrastructure commonly known as the Public Switched Telephone
More informationInternet Protocol Address
SFWR 4C03: Computer Networks & Computer Security Jan 17-21, 2005 Lecturer: Kartik Krishnan Lecture 7-9 Internet Protocol Address Addressing is a critical component of the internet abstraction. To give
More informationOSI Seven Layers Model Explained with Examples
OSI Layer Model describes how information is transmitted between networking devices. In this tutorial I will provide a brief introduction of OSI Layer model including its advantage and services. OSI model
More information01 Introduction. The timeline
01 Introduction The pre-mechanical era The mechanical era The electromechanical era The electronic era The microelectronic era The roadmap for the next 10 years alessandro bogliolo isti information science
More informationTHREE YEAR DEGREE (HONS.) COURSE BACHELOR OF COMPUTER APPLICATION (BCA) First Year Paper I Computer Fundamentals
THREE YEAR DEGREE (HONS.) COURSE BACHELOR OF COMPUTER APPLICATION (BCA) First Year Paper I Computer Fundamentals Full Marks 100 (Theory 75, Practical 25) Introduction to Computers :- What is Computer?
More informationYou can probably work with decimal. binary numbers needed by the. Working with binary numbers is time- consuming & error-prone.
IP Addressing & Subnetting Made Easy Working with IP Addresses Introduction You can probably work with decimal numbers much easier than with the binary numbers needed by the computer. Working with binary
More informationUniversity of St. Thomas ENGR 230 ---- Digital Design 4 Credit Course Monday, Wednesday, Friday from 1:35 p.m. to 2:40 p.m. Lecture: Room OWS LL54
Fall 2005 Instructor Texts University of St. Thomas ENGR 230 ---- Digital Design 4 Credit Course Monday, Wednesday, Friday from 1:35 p.m. to 2:40 p.m. Lecture: Room OWS LL54 Lab: Section 1: OSS LL14 Tuesday
More informationLecture 1. Lecture Overview. Intro to Networking. Intro to Networking. Motivation behind Networking. Computer / Data Networks
Lecture 1 An Introduction to Networking Chapter 1, pages 1-22 Dave Novak BSAD 146, Introduction to Networking School of Business Administration University of Vermont Lecture Overview Brief introduction
More informationThe OSI Model and the TCP/IP Protocol Suite PROTOCOL LAYERS. Hierarchy. Services THE OSI MODEL
The OSI Model and the TCP/IP Protocol Suite - the OSI model was never fully implemented. - The TCP/IP protocol suite became the dominant commercial architecture because it was used and tested extensively
More informationLecture 2: Protocols and Layering. CSE 123: Computer Networks Stefan Savage
Lecture 2: Protocols and Layering CSE 123: Computer Networks Stefan Savage Last time Bandwidth, latency, overhead, message size, error rate Bandwidth-delay product Delay Bandwidth High-level run through
More informationELEC3028 Digital Transmission Overview & Information Theory. Example 1
Example. A source emits symbols i, i 6, in the BCD format with probabilities P( i ) as given in Table, at a rate R s = 9.6 kbaud (baud=symbol/second). State (i) the information rate and (ii) the data rate
More informationEntropy and Mutual Information
ENCYCLOPEDIA OF COGNITIVE SCIENCE 2000 Macmillan Reference Ltd Information Theory information, entropy, communication, coding, bit, learning Ghahramani, Zoubin Zoubin Ghahramani University College London
More informationICTTEN8195B Evaluate and apply network security
ICTTEN8195B Evaluate and apply network security Release 1 ICTTEN8195B Evaluate and apply network security Modification History Release Release 2 Comments This version first released with ICT10 Integrated
More informationPublic Switched Telephone System
Public Switched Telephone System Structure of the Telephone System The Local Loop: Modems, ADSL Structure of the Telephone System (a) Fully-interconnected network. (b) Centralized switch. (c) Two-level
More informationZarządzanie sieciami telekomunikacyjnymi
What Is an Internetwork? An internetwork is a collection of individual networks, connected by intermediate networking devices, that functions as a single large network. Internetworking refers to the industry,
More informationCDMA TECHNOLOGY. Brief Working of CDMA
CDMA TECHNOLOGY History of CDMA The Cellular Challenge The world's first cellular networks were introduced in the early 1980s, using analog radio transmission technologies such as AMPS (Advanced Mobile
More informationEE360: Digital Design I Course Syllabus
: Course Syllabus Dr. Mohammad H. Awedh Fall 2008 Course Description This course introduces students to the basic concepts of digital systems, including analysis and design. Both combinational and sequential
More informationChapter 1 Introduction
Chapter 1 Introduction 1. Shannon s Information Theory 2. Source Coding theorem 3. Channel Coding Theory 4. Information Capacity Theorem 5. Introduction to Error Control Coding Appendix A : Historical
More informationIT4504 - Data Communication and Networks (Optional)
- Data Communication and Networks (Optional) INTRODUCTION This is one of the optional courses designed for Semester 4 of the Bachelor of Information Technology Degree program. This course on Data Communication
More informationLogic in Computer Science: Logic Gates
Logic in Computer Science: Logic Gates Lila Kari The University of Western Ontario Logic in Computer Science: Logic Gates CS2209, Applied Logic for Computer Science 1 / 49 Logic and bit operations Computers
More informationIntroduction to Packet Voice Technologies and VoIP
Introduction to Packet Voice Technologies and VoIP Cisco Networking Academy Program Halmstad University Olga Torstensson 035-167575 olga.torstensson@ide.hh.se IP Telephony 1 Traditional Telephony 2 Basic
More informationWAN Data Link Protocols
WAN Data Link Protocols In addition to Physical layer devices, WANs require Data Link layer protocols to establish the link across the communication line from the sending to the receiving device. 1 Data
More informationScience in History: From the Abacus to the Modern Computer Part 1: The Abacus
Part 1: The Abacus Even before humans could read or write, they needed to count. First they used their fingers, but when they had to deal with figures over ten, a counting device became necessary. Pebbles
More informationFUNDAMENTALS of INFORMATION THEORY and CODING DESIGN
DISCRETE "ICS AND ITS APPLICATIONS Series Editor KENNETH H. ROSEN FUNDAMENTALS of INFORMATION THEORY and CODING DESIGN Roberto Togneri Christopher J.S. desilva CHAPMAN & HALL/CRC A CRC Press Company Boca
More informationComputer Science MS Course Descriptions
Computer Science MS Course Descriptions CSc I0400: Operating Systems Underlying theoretical structure of operating systems; input-output and storage systems, data management and processing; assembly and
More informationKingdom of Saudi Arabia King Saud University
Kingdom of Saudi Arabia King Saud University College of Computer & Information Sciences Department of Computer Engineering The MASTER S PROGRAM IN COMPUTER ENGINEERING ٢٠٠٣ M.S. PROGRAM IN COMPUTER ENGINEERING
More informationCommunications and Computer Networks
SFWR 4C03: Computer Networks and Computer Security January 5-8 2004 Lecturer: Kartik Krishnan Lectures 1-3 Communications and Computer Networks The fundamental purpose of a communication system is the
More informationObjectives of Lecture. Network Architecture. Protocols. Contents
Objectives of Lecture Network Architecture Show how network architecture can be understood using a layered approach. Introduce the OSI seven layer reference model. Introduce the concepts of internetworking
More informationEastern Washington University Department of Computer Science. Questionnaire for Prospective Masters in Computer Science Students
Eastern Washington University Department of Computer Science Questionnaire for Prospective Masters in Computer Science Students I. Personal Information Name: Last First M.I. Mailing Address: Permanent
More informationLesson Plan Course Title: Web Technologies Session Title: Internet Fundamentals & Background
Lesson Plan Course Title: Web Technologies Session Title: Internet Fundamentals & Background Lesson Duration: 2 Hours Performance Objective: Upon completion of the lesson, students will have an understanding
More informationCARLETON UNIVERSITY Department of Systems and Computer Engineering. SYSC4700 Telecommunications Engineering Winter 2014. Term Exam 13 February 2014
CARLETON UNIVERSITY Department of Systems and Computer Engineering SYSC4700 Telecommunications Engineering Winter 2014 Term Exam 13 February 2014 Duration: 75 minutes Instructions: 1. Closed-book exam
More informationCatch Me If You Can: A Practical Framework to Evade Censorship in Information-Centric Networks
Catch Me If You Can: A Practical Framework to Evade Censorship in Information-Centric Networks Reza Tourani, Satyajayant (Jay) Misra, Joerg Kliewer, Scott Ortegel, Travis Mick Computer Science Department
More informationDISTANCE DEGREE PROGRAM CURRICULUM NOTE:
Bachelor of Science in Electrical Engineering DISTANCE DEGREE PROGRAM CURRICULUM NOTE: Some Courses May Not Be Offered At A Distance Every Semester. Chem 121C General Chemistry I 3 Credits Online Fall
More informationCSCA0201 FUNDAMENTALS OF COMPUTING. Chapter 1 History of Computers
CSCA0201 FUNDAMENTALS OF COMPUTING Chapter 1 History of Computers 1 Topics 1. Definition of computer 2. Earliest computer 3. Computer History 4. Computer Generations 2 Definition of Computer Computer is
More informationInternet Concepts. What is a Network?
Internet Concepts Network, Protocol Client/server model TCP/IP Internet Addressing Development of the Global Internet Autumn 2004 Trinity College, Dublin 1 What is a Network? A group of two or more devices,
More informationT.38 fax transmission over Internet Security FAQ
August 17, 2011 T.38 fax transmission over Internet Security FAQ Give me a rundown on the basics of T.38 Fax over IP security. Real time faxing using T.38 SIP trunks is just as secure as sending faxes
More informationAdministrative Issues
CSC 3210 Computer Organization and Programming Introduction and Overview Dr. Anu Bourgeois (modified by Yuan Long) Administrative Issues Required Prerequisites CSc 2010 Intro to CSc CSc 2310 Java Programming
More informationCOURSE SYLLABUS. PRE-REQUISITES: Take CETT-1303(41052); Minimum grade C, CR.
COURSE SYLLABUS COURSE NUMBER AND TITLE: CETT 1325- Digital Fundamentals COURSE (CATALOG) DESCRIPTION An entry level course in digital electronics covering number systems, binary mathematics, digital codes,
More informationNetworking (Exploration 1)
Unit 105: CCNA Fundamentals of Networking (Exploration 1) Unit code: QCF Level 3: Credit value: 10 Guided learning hours: 80 Aim and purpose A/601/7537 BTEC in IT This unit introduces the architecture,
More informationT146 Electro Mechanical Engineering Technician MTCU Code 51021 Program Learning Outcomes
T146 Electro Mechanical Engineering Technician MTCU Code 51021 Program Learning Outcomes Synopsis of the Vocational Learning Outcomes* The graduate has reliably demonstrated the ability to: 1. fabricate
More informationComputer Network and Communication
2 Computer Network and Communication 2.1 INTRODUCTION As we all know, the advances in Information technology revolutionized almost every aspect of our life. Education, industry, banking, researches and
More informationWhat s a protocol? What s a protocol? A closer look at network structure: What s the Internet? What s the Internet? What s the Internet?
What s the Internet? PC server laptop cellular handheld access points wired s connected computing devices: hosts = end systems running apps communication s fiber, copper, radio transmission rate = bandwidth
More informationUnited States Naval Academy Electrical and Computer Engineering Department. EC262 Exam 1
United States Naval Academy Electrical and Computer Engineering Department EC262 Exam 29 September 2. Do a page check now. You should have pages (cover & questions). 2. Read all problems in their entirety.
More informationIntroduction to WAN Technologies
CHAPTER 3 Introduction to WAN Technologies This chapter introduces the various protocols and technologies used in wide- area network (WAN) environments. Topics summarized here include point-to-point links,
More informationComputer Networks Vs. Distributed Systems
Computer Networks Vs. Distributed Systems Computer Networks: A computer network is an interconnected collection of autonomous computers able to exchange information. A computer network usually require
More informationUniversality in the theory of algorithms and computer science
Universality in the theory of algorithms and computer science Alexander Shen Computational models The notion of computable function was introduced in 1930ies. Simplifying (a rather interesting and puzzling)
More informationIntroduction to WAN Technologies
CHAPTER 3 Chapter Goals Become familiar with WAN terminology. Learn about different types of WAN connections. Become familiar with different types of WAN equipment. This chapter introduces the various
More informationMIMO CHANNEL CAPACITY
MIMO CHANNEL CAPACITY Ochi Laboratory Nguyen Dang Khoa (D1) 1 Contents Introduction Review of information theory Fixed MIMO channel Fading MIMO channel Summary and Conclusions 2 1. Introduction The use
More informationCircuits and Boolean Expressions
Circuits and Boolean Expressions Provided by TryEngineering - Lesson Focus Boolean logic is essential to understanding computer architecture. It is also useful in program construction and Artificial Intelligence.
More informationPPP (Point-to-Point Protocol)
PPP (Point-to-Point Protocol) PPP (Point-to-Point Protocol) is the most widely used method for transporting IP packets over a serial link between the user and the Internet Service Provider (ISP). Although
More informationProtocol Data Units and Encapsulation
Chapter 2: Communicating over the 51 Protocol Units and Encapsulation For application data to travel uncorrupted from one host to another, header (or control data), which contains control and addressing
More informationwww.mindteck.com 6LoWPAN Technical Overview
www.mindteck.com 6LoWPAN Technical Overview 6LoWPAN : Slide Index Introduction Acronyms Stack Architecture Stack Layers Applications IETF documents References Confidential Mindteck 2009 2 6LoWPAN - Introduction
More informationAdvanced Higher Mathematics Course Specification (C747 77)
Advanced Higher Mathematics Course Specification (C747 77) Valid from August 2015 This edition: April 2015, version 1.1 This specification may be reproduced in whole or in part for educational purposes
More informationCSE140: Midterm 1 Solution and Rubric
CSE140: Midterm 1 Solution and Rubric April 23, 2014 1 Short Answers 1.1 True or (6pts) 1. A maxterm must include all input variables (1pt) True 2. A canonical product of sums is a product of minterms
More informationCourse Curriculum for Master Degree in Electrical Engineering/Wireless Communications
Course Curriculum for Master Degree in Electrical Engineering/Wireless Communications The Master Degree in Electrical Engineering/Wireless Communications, is awarded by the Faculty of Graduate Studies
More informationGuide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols
Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among various
More informationCCNA R&S: Introduction to Networks. Chapter 5: Ethernet
CCNA R&S: Introduction to Networks Chapter 5: Ethernet 5.0.1.1 Introduction The OSI physical layer provides the means to transport the bits that make up a data link layer frame across the network media.
More informationMaster of Science in Computer Science
Master of Science in Computer Science Background/Rationale The MSCS program aims to provide both breadth and depth of knowledge in the concepts and techniques related to the theory, design, implementation,
More informationDoctor of Philosophy in Computer Science
Doctor of Philosophy in Computer Science Background/Rationale The program aims to develop computer scientists who are armed with methods, tools and techniques from both theoretical and systems aspects
More informationDigital Modulation. David Tipper. Department of Information Science and Telecommunications University of Pittsburgh. Typical Communication System
Digital Modulation David Tipper Associate Professor Department of Information Science and Telecommunications University of Pittsburgh http://www.tele.pitt.edu/tipper.html Typical Communication System Source
More informationPrinciples of Digital Communication
Principles of Digital Communication Robert G. Gallager January 5, 2008 ii Preface: introduction and objectives The digital communication industry is an enormous and rapidly growing industry, roughly comparable
More informationThe WestNet Advantage: -- Textbooks, ebooks, ecourses -- Instructor Resourse Center -- Student Resource Center
The WestNet Advantage: -- Textbooks, ebooks, ecourses -- Instructor Resourse Center -- Student Resource Center The entire cost of the program is funded by the textbook, ebook or ecourse purchase by your
More informationDATA COMMUNICATION (Basics of data communication, OSI layers.)
DATA COMMUNICATION (Basics of data communication, OSI layers.) K.K.DHUPAR SDE (NP-II) ALTTC ALTTC/NP/KKD/Data Communication 1 Data Communications History 1838: Samuel Morse & Alfred Veil Invent Morse Code
More informationSyllabus. No: CIS 150. Title: Networking Fundamentals. Credits: 4. Coordinator: Dr. B. Dike-Anyiam, Computer Science & Networking Lecturer
Syllabus No: CIS 150 Title: Networking Fundamentals Credits: 4 Coordinator: Dr. B. Dike-Anyiam, Computer Science & Networking Lecturer Instructor: Dr. B. Dike-Anyiam, Computer Science & Networking Lecturer
More informationUSING MULTICAST IN THE GLOBAL COMMUNICATIONS INFRASTRUCTURE FOR GROUP COMMUNICATION
USING MULTICAST IN THE GLOBAL COMMUNICATIONS INFRASTRUCTURE FOR GROUP COMMUNICATION Deborah A. Agarwal, Information and Computing Sciences Division, Ernest Orlando Lawrence Berkeley National Laboratory
More information524 Computer Networks
524 Computer Networks Section 1: Introduction to Course Dr. E.C. Kulasekere Sri Lanka Institute of Information Technology - 2005 Course Outline The Aim The course is design to establish the terminology
More informationCount the Dots Binary Numbers
Activity 1 Count the Dots Binary Numbers Summary Data in computers is stored and transmitted as a series of zeros and ones. How can we represent words and numbers using just these two symbols? Curriculum
More informationResolving ABET/TAC Criteria on Continuous Improvement: Surviving ABET Accreditation!
Resolving ABET/TAC Criteria on Continuous Improvement: Surviving ABET Accreditation! by Nasser Michigan Technological University alaraje@mtu.edu Abstract: The Electrical Engineering Technology program
More informationChapter 5. Data Communication And Internet Technology
Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN
More informationNetwork Data Management Protocol (NDMP) White Paper
Network Data Management Protocol (NDMP) White Paper Summary What is the primary goal of enterprise storage management? To back up and restore information in an intelligent, secure, timely, cost-effective
More informationIntroduction to computer networks and Cloud Computing
Introduction to computer networks and Cloud Computing Aniel Nieves-González Fall 2015 Computer Netwoks A computer network is a set of independent computer systems that are connected by a communication
More informationTAA: Introduction to Wide Area Networks online course specification
Illuminating Technology Course aim: TAA: Introduction to Wide Area Networks online course specification To explain the principles of operation, capabilities and features of various types of wide area network
More informationUnderstanding IP Faxing (Fax over IP)
Understanding IP Faxing (Fax over IP) A detailed technical overview of how VoIP technology and IP Faxing (Fax over IP) are changing the way organizations utilize existing network infrastructures for voice
More informationCSCI 4717 Computer Architecture. Function. Data Storage. Data Processing. Data movement to a peripheral. Data Movement
CSCI 4717/5717 Computer Architecture Topic: Functional View & History Reading: Sections 1.2, 2.1, & 2.3 Function All computer functions are comprised of four basic operations: Data processing Data storage
More informationProtocols and Architecture. Protocol Architecture.
Protocols and Architecture Protocol Architecture. Layered structure of hardware and software to support exchange of data between systems/distributed applications Set of rules for transmission of data between
More informationMECE 102 Mechatronics Engineering Orientation
MECE 102 Mechatronics Engineering Orientation Mechatronic System Components Associate Prof. Dr. of Mechatronics Engineering Çankaya University Compulsory Course in Mechatronics Engineering Credits (2/0/2)
More informationSYLLABUS MAC 1105 COLLEGE ALGEBRA Spring 2011 Tuesday & Thursday 12:30 p.m. 1:45 p.m.
SYLLABUS MAC 1105 COLLEGE ALGEBRA Spring 2011 Tuesday & Thursday 12:30 p.m. 1:45 p.m. Instructor: Val Mohanakumar Office Location: Office Phone #: 253 7351 Email: vmohanakumar@hccfl.edu Webpage: http://www.hccfl.edu/faculty-info/vmohanakumar.aspx.
More informationComputer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks
Computer Networks Lecture 06 Connecting Networks Kuang-hua Chen Department of Library and Information Science National Taiwan University Local Area Networks (LAN) 5 kilometer IEEE 802.3 Ethernet IEEE 802.4
More informationIntroduction. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross
Introduction Abusayeed Saifullah CS 5600 Computer Networks These slides are adapted from Kurose and Ross Goals of This Course v Be familiar with Fundamental network topics Some advanced topics State-of-the-art
More informationNetworks 2. Gabriela Ochoa. 2014 University of Stirling CSCU9B1 Essential Skills for the Information Age. Content
Networks 2 Gabriela Ochoa Lecture Networks 2/Slide 1 Content How is Internet connected? Internet backbone Internet service providers (ISP) How to connect a home computer to the Internet? How do networks
More informationCOMPUTER NETWORKS SECOND EDITION. ANDREW S.fjANENBAUM. Vrije Universiteit Amsterdam, The Netherlands. Nachrichtentechnische Bib'iothek THD Inv.
COMPUTER NETWORKS SECOND EDITION ANDREW S.fjANENBAUM Vrije Universiteit Amsterdam, The Netherlands Nachrichtentechnische Bib'iothek THD Inv.-Ni,: tq(s ULB Darmstadt iiiiiir 17800787 =3JE Prentice-Hall
More informationAppendix A: Science Practices for AP Physics 1 and 2
Appendix A: Science Practices for AP Physics 1 and 2 Science Practice 1: The student can use representations and models to communicate scientific phenomena and solve scientific problems. The real world
More informationPoznan University of Technology Faculty of Electrical Engineering
Poznan University of Technology Faculty of Electrical Engineering Contact Person: Pawel Kolwicz Vice-Dean Faculty of Electrical Engineering pawel.kolwicz@put.poznan.pl List of Modules Academic Year: 2015/16
More informationRouting with OSPF. Introduction
Routing with OSPF Introduction The capabilities of an internet are largely determined by its routing protocol. An internet's scalability, its ability to quickly route around failures, and the consumption
More informationNetworked AV Systems Pretest
Networked AV Systems Pretest Instructions Choose the best answer for each question. Score your pretest using the key on the last page. If you miss three or more out of questions 1 11, consider taking Essentials
More informationDesign and Modeling of Internet Protocols. Dmitri Loguinov March 1, 2005
Design and Modeling of Internet Protocols Dmitri Loguinov March 1, 2005 1 Agenda What is protocol scalability Why TCP does not scale Future high-speed applications AQM congestion control Other work at
More informationOSI Reference Model: An Overview
OSI Reference Model: An Overview Gaurav Bora 1, Saurabh Bora 2, Shivendra Singh 3, Sheikh Mohamad Arsalan 4 ( 1 Department of Electronics, Uttarakhand Technical University, Dehradun, INDIA) ( 2 Department
More informationUnderstanding IP Faxing (Fax over IP)
A RICOH COMPANY Understanding IP Faxing (Fax over IP) A detailed technical overview of how VoIP technology and IP Faxing (Fax over IP) are changing the way organizations utilize existing network infrastructures
More informationAnalog-to-Digital Voice Encoding
Analog-to-Digital Voice Encoding Basic Voice Encoding: Converting Analog to Digital This topic describes the process of converting analog signals to digital signals. Digitizing Analog Signals 1. Sample
More informationChapter 17. Transport-Level Security
Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics
More information