Animation-Based Explanation of Basic Data Communication Principles

Size: px
Start display at page:

Download "Animation-Based Explanation of Basic Data Communication Principles"

Transcription

1 Animation-Based Explanation of Basic Data Communication Principles Author: Drago Hercog, University of Ljubljana, Faculty of Electrical Engineering, Tr_a_ka 25, SI-1000, Ljubljana, Slovenia, Abstract The complexity of communication systems is high. Hence, the presentation of modern communication methods to undergraduate students is difficult. A graphic presentation, and especially an animation can be much more effective than a bare text. The animations must concentrate on basic methods, be enough abstract, user friendly, aesthetic, and possess some kind of flexibility concerning animated scenarios, speed of presentation, possibility of being suspended etc. During our elementary course on communication protocols, we use animations of several types of communication processes. Most of them were developed by undergraduate students as their final projects which forced them to study the relevant protocols in detail and also to do some design/programming work. In the paper, an animation of communication process involving two adjacent layers according to the OSI reference model are presented in more detail. In the lower layer, a very basic and simple ARQ (Automatic Repeat request) protocol is used. The notion of Service Access Point and the use of primitives can be explained, as well as basic ARQ protocol mechanisms, such as the relation between protocol and service data units, the need for memory buffer and the role of timer. The difference between real and virtual channels can also be clearly shown. The abstraction priciple used in the OSI reference model is particularly emphasised. Index Terms Abstraction, animation, basic concepts, communication protocols, OSI reference model INTRODUCTION Although many techniques are being used nowadays to reduce communication system complexity, this complexity continues to be high. This fact, as well as the fact that communication processes evolve both in space and time [1], make modern communication methods quite difficult to be presented to and to be understood by undergraduate students. It is therefore very important to use appropriate pedagogic methods in such a presentation, including those offered by modern computer-based techniques. Simulations have already been recognised as successful research, development and pedagogic tools, used for validation, correctness verification and performance evaluation of protocols, while animations are being used especially as didactic tools to support teaching and understanding of communication systems and protocols by means of their graphic presentation. Many animation programs and particularly simulators have been developed for numerous real-life protocols and usually based on their formal specifications written in formal description techniques, especially those that already possess some graphical syntax, such as SDL [2] or MSC [3]. Although animations have not shown as popular as simulations [4], simulators have often been upgraded by animation user interfaces, in order to graphically present the communication process [5]. Generic animation tools, based on formal protocol specification and applicable to the animation of different communication protocols [6], are very flexible and offer a very broad area of usability, but we will describe here how to create custom-tailored animations. Undergraduate telecommunications students are usually not taught real-life protocols at the very beginning of their protocols course. Rather, they must be given some simple and illustrative notion about how protocols work at first. Therefore, some very streamlined and abstract protocols (even if not usable in every-day practice) are used to this end. Additionally, even more abstract animations can be employed to illustrate them graphically. These animations must focus only on the very essential properties of basic communication algorithms [7]. In the rest of this paper, the most essential points of a basic communication protocols course, as experienced by the author, will be highlighted first. After this, some basic principles of communication protocol animations for didactic purposes will be exposed. Then we will explain how protocol animations are developed for our own educational needs. Finally, an example animation and its didactic aims will be described into details. 1

2 A FIRST COMMUNICATION PROTOCOLS COURSE FOR UNDERGRADUATES Within their first communication protocols course, undergraduates must be exposed to the basic data communication principles, rather than to some complex real-life protocols. During serveral years of teaching a communication protocols course for undergraduate students of telecommunications, the author has found the following to be the key didactic points. The notion of the communication service offered by a service provider to service users must be explained first. Then, it must be shown how users and the service provider interact by means of primitives across service acces points (SAPs). Only then the basic implementation of the service provider, consisting of protocol entities, exchanging protocol data units (PDUs) via the channel, according to the protocol used, and interacting with users across service access points, can be given. The difference between the peer-to-peer communication process running between peer protocol entities and the user-to-provider interaction carried out between protocol entities and service users, must be emphasised. The difference between service data units (SDUs) exchanged across SAPs and protocol data units exchanged across the communication channel is also explained at this point. The relation between the service data unit and protocol data unit and the role of protocol overhead are described as well. The basic model of a protocol entity as interacting with users and communicating with its peer entities is also indicated, together with its basic functions of processing, memorising and time measuring. After these basic principles which closely follow the Open Systems Interconnection (OSI) [8] paradigm, the role of abstraction in design and analysis of complex systems is emphasised. The border between the communication service users and the service provider is described as the border between two adjacent levels of abstraction, with service access point acting as a well-defined interface between them. The difference between the virtual channel connecting users and the more concrete channel connecting protocol entities is also indicated. Only then the principles of OSI reference model and other protocol stack architectures can be explained. Finally, some basic algorithms, used by communication protocols, such as framing, error and flow control, segmentation, etc., are shown, followed by a few actual protocols as examples. GENERAL PROPERTIES OF ANIMATIONS TO EXPLAIN BASIC COMMUNICATION PROTOCOL PRINCIPLES It is well known that, in a learning process, a good picture can be better than a lot of less interesting or even tedious text. This is even more true for a dynamic picture presenting a dynamic process evolving in both time and space. An animation is an artificially prepared picture shown on a two-dimensional screen surface that is being dynamically changed in time. All of this is made in a highly controlled way. Due to their ability to present a process both in time and space on a two-dimensional screen of a computer, animations can be considered among the most interesting modern didactic tools that are quite easily prepared (due to many available tools), and even more easily shown. However, in order to be used effectively in an education process and to be better than some similar media, like video, animations must possess some important properties. Animations must be aesthetic, their use must be user friendly and flexible, as their contents and speed of presentation are concerned. The flexibility of contents means that a user has several options as to choose what to see. Different processes with different properties or event sequences are referred to as different scenarios. The speed of presentation is almost never the natural speed of the process shown and must also be modifiable in order to allow a teacher to add their comments to the animation, or to show it more quickly, not to bore students. The animation must also be interruptable. The picture usually consists of its static part presenting the static environment of the presentation, such as the structure of the animated system, or the space where the animated process is evolving, as well as its dynamic part with moving objects showing the behaviour of the animated system in time, such as data being exchanged between system entities. Both static and dynamic objects have their contents that can be symbolically indicated by their position, shape and colour. Symbols must be used so that they implicitely imply their contents. Animations must be as simple as possible. Both the objects and the scenario must contain only the contents that are essential for the understanding of the topic that is to be explained. In other words, animations must be as abstract as possible, omitting all details that are necessary in real-life systems, but are not absolutely necessary for the basic problem understanding, and usually overburden students' minds. One could say that the abstraction and symbolic nature are the most important properties of animations that distinguish them from videos. ANIMATIONS TO EXPLAIN BASIC COMMUNICATION PROTOCOL PRINCIPLES If animations are used to explain basic communication protocol principles care must be taken to show the communication process along all the essential coordinates: space, time and contents. Along each axis, an appropriate level of abstraction must be chosen. Along the space dimension, both communication entities and communication channels must be easily distiguishable. If the process is concurrently shown at different levels of abstractions (such as in different layers of a protocol stack), the 2

3 boundaries between these levels have to be clearly seen. Entities are usually shown as boxes of different shapes and colours that depend on their respective roles and importances. Messages are presented as dynamic objects that are created when the messages are transmitted, can be shown propagating through the channel, and may be removed from the scene when they are consumed by receiving entities. Usually their contents are denoted either with their abstract syntax or, even more abstractly, with only their message types. Either simple text or colours, and possibly combination of both, can be used for this purpose. Sometimes, however, the essential structure of the messages can even be shown, if this is considered important by the animation designer. The time dependence can be shown as only the development of the picture in time, or the trace of behaviour can be left on the scene to produce a figure similar to timing diagrams, Message Sequence Charts (MSC) or some other form. However, for this latter possibility, we need at least one spacial dimension on the screen. PRODUCTION OF ANIMATIONS There are many different tools available to create animations, with different prices, powers, flexibilities, and requirements for designer's experience. One possibility, although neither most powerful nor most flexible, and above all not the easiest one, is to create animations using one of usual programming languages, such as C, C++ or Java. Nevertheless, we have chosen this latter option for the following reasons. The animations we use have mostly been designed and implemented by our students as their final projects. Such projects have to be completed by all students in about 3 to 6 months period before achieving their diploma degree. In this situation, the computer program design and development in one of usual programming languages is considered pedagogically much more advantageous than the use of some exotic special purpose software for animation creation. A student developing an animation program must carefully study and deeply understand the protocol or system to be animated design the user interface design the graphic presentation of the problem to be animated design the animation program code, test and debug the program document the design and development process, as well as the animation program itself Thus, the endeavour needed to develop the animation tool can be considered at least as important as its use from the pedagagic point of view. Projects that are considered too complex for a single student, can of course be partitioned among two of them. Students are free to choose the programming language according to their preferences and existing knowledge, although C, C++ and Java are most frequently used. Animations written as executable programs are very flexible in the sense that animations of different scenarios can be run with the same program, and even different protocol/system parameters can be used. Executable programs require only modest disc space, and can be developed using relatively cheap resources, including only a personal computer, a software development system with compiler for the chosen language, and a word processor to write the documentation. All of these tools are readily available in almost all cases. Executable programs can be run from within different environments, such as from the operating system, other programs, presentations, or web pages. AN EXAMPLE ANIMATION: ERROR CORRECTION IN DATA-LINK LAYER As an example of an animation that was conceived following the described principles and is quite simple, but pedagogically effective, the animation of a simple error-correction protocol in the data-link layer according to the OSI reference model will be presented with more detail. The protocol is very streamlined. It is connection oriented and relies only on the use of positive acknowledgments and timer. The request, indication and confirm primitives are used for connection establishment/release, while only request and indication are employed for data transfer. The protocol itself is not the only point of interest of this animation. The others, at least as important, include: two-layer OSI-type achitecture abstraction principle user to protocol entity interaction versus peer to peer communication the difference between the confirmed service of connection establishment/release and the unconfirmed service of reliable data transfer the presence of overhead in protocol data units 3

4 the importance of buffer memory the importance of timer The animation is a Windows program that runs in a window and offers to the user three basic menus (see Figure 1). In the 'OSI' menu, a user may choose any available animation scenario or exit the program. In the 'Options' menu, a user may modify the property of window resizing or animation speed (either in terms of computed frames per second or drawn frames per second). The remaining menus offer the usual animation controls 'Play', 'Pause' and 'Stop'. The basic picture is static and is also shown in Figure 1. It presents two OSI layers (layers 2 and 3), with the delimitation between them emphasised with a dashed red line, in two distant machines (station A and station B), each of them shown as a grey box. Each machine contains an entity (shown as a light blue box) in each layer. The two entities within the same machine can interact by means of primitives exchanged across the service acces point shown as a dark blue box. The two machines are connected by a channel (a thick black line) in the lower layer, through which protocol data units are to be exchanged. However, a virtual channel may also be imagined connecting the two entities of the upper layer, as indicated by a thin black line in our animation. The latter indicates an imaginary means to directly exchange user data. Primitives are graphically shown as yellow arrows directed either from the upper to the lower layer or vice versa (see Figure 2). A primitive is further described with the OSI-like syntax DL-Service.Primitive, where Primitive indicates the kind of primitive (Request, Indication or Confirm), Service indicates the service that is requested, indicated or confirmed (Establish, Data, or Release), and the prefix DL indicates that the service is provided by the Data-Link layer. User data are presented as a green box marked with the text DATA. They are generated and consumed within the upper layer, but are carried across the channel within the lower layer. Protocol Data Units (PDUs) are generated and consumed in the lower layer and are also shown as green boxes. If a PDU contains user data, the overhead is indicated as H (header) and T (trailer) and is of different colour as user data, otherwise the type of control PDU is indicated (SETUP, DISC or ACK). Timer is presented as a red column that, when running, empties from top towards bottom. The expired timer is shown as an empty column. Four different scenarios can be animated. The connection establishment and release scenarios are very similar and include SETUP/ACK and DISC/ACK, respectively, protocol data unit pairs and the use of timer. All the three primitives are used. The data transfer scenario begins with the DL-Data.Request primitive when the user data are copied across the service access point from the upper to the lower layer. Here, a copy of user data is memorized in case it would be damaged or lost during the PDU transfer. The header and trailer are added to form the PDU which then moves through the channel towards the peer entity. Concurrently, the timer is running. At the receiving end, the header and trailer are stripped away and user data are passed to the upper layer with the DL-Data.Indication primitive. The ACK acknowledgment is sent back towards the sending entity; after its reception, the timer is stopped. For the sake of illustration, we can see in Figure 3 the animation of user data transfer in the moment when the protocol data unit is being transferred through the lower-layer channel, with the timer in the transmitting entity running and a copy of the user message stored in the memory of the transmitting protocol entity. The data transfer with error scenario differs from the previous scenario in the fact that the PDU is damaged during the first transfer, which is indicated with the change of its colour from green to violet. No acknowledgment is sent, the timer expires and the PDU is sent once more. This time, everything goes well and the scenario is terminated like the previous one. The notion of the abstraction that is involved in our animation is twofold. Firstly, the abstraction is used in the presentation itself. All the components of the animated system are shown as abstractly as possible, including the messages themselves that are shown as simple boxes with only their types indicated. More importantly, we must emphasise (and the animation supports us in this) the abstraction that is inherently used in the OSI reference model and all the other protocol stacks. The upper layer is the user of the service provided by the lower layer and does not care about how this service is provided. The dashed red line prevents the upper layer entities to see what is going on in the lower layer. The only way both adjacent layers can interact is by means of primitives passed across the service acces points, and this interaction is strictly controlled. For instance, the upper layer entities do not see the lower layer overhead and do not bother it either. Or. when a protocol data unit is damaged in the lower layer, the upper layer knows nothing about it; it receives the user data only when they have been succesfully transferred from one machine to the other. CONCLUSIONS The use of very simple animations of communication processes that emphasise the basic methods used in communication protocols is advocated. Currently we use animation programs customly designed in one of high-level programming languages 4

5 by students as part of their final projects, which is an important pedagogic advantage of such a production of animations. However, we plan to use a common animation program shell in the future in order to unify the appearance of animations. Actually we use several animations besides the one described here, especially animations of some medium access control (MAC) algorithms. The animations can be used as standalone programs, or can be linked to a computer-based slide presentation or web pages. Currently, the author uses MS Power Point presentations during his lectures, where he includes an animation presentation from time to time. The students' response is positive. REFERENCES [1] Hercog, D., "Didactic Presentation of Wave Phenomena by Means of Computer Animations", in W. Aung et al., Eds, Engineering Education and Research-2001: A Chronicle of Worldwide Innovations, ineer, 2002, pp [2] ITU, "Specification and Description Language (SDL)", ITU-T Recommendation Z.100, International Telecommunication Union, 1999 [3] ITU, "Message Sequence Chart (MSC)", ITU-T Recommendation Z.120, International Telecommunication Union, 1999 [4] Turner, K. J., "Guest Editorial: Protocol animation", Computer Networks, Vol. 40, 2002, pp [5] Hercog, D., " A LAPB Protocol Computer-aided Learning Tool",, August 18-21, 2002, Manchester, UK [6] Combes, P., Dubois, F., Renard, B., "An open animation tool: application to telecommunication systems", Computer Networks, Vol. 40, 2002, pp [7] Braune, B., Wilhelm, R., "Focusing in Algorithm Explanation", IEEE Transactions on Visualisation and Computer Graphics, Vol. 6, No. 1, Jan. - March 2000, pp. 1-7 [8] Day, J., Zimmermann, H., "The OSI Reference Model", Proceedings of the IEEE, Vol. 71, No. 12, Dec. 1983, pp FIGURES AND TABLES FIGURE. 1 ANIMATION PROGRAM WINDOW. FIGURE. 2 A PRIMITIVE. 5

6 FIGURE. 3 A SAMPLE ANIMATION SCENARIO. 6

Structure of Presentation. The Role of Programming in Informatics Curricula. Concepts of Informatics 2. Concepts of Informatics 1

Structure of Presentation. The Role of Programming in Informatics Curricula. Concepts of Informatics 2. Concepts of Informatics 1 The Role of Programming in Informatics Curricula A. J. Cowling Department of Computer Science University of Sheffield Structure of Presentation Introduction The problem, and the key concepts. Dimensions

More information

Communication Networks. MAP-TELE 2011/12 José Ruela

Communication Networks. MAP-TELE 2011/12 José Ruela Communication Networks MAP-TELE 2011/12 José Ruela Network basic mechanisms Network Architectures Protocol Layering Network architecture concept A network architecture is an abstract model used to describe

More information

CS5008: Internet Computing

CS5008: Internet Computing CS5008: Internet Computing Lecture 6: Protocols and Standards A. O Riordan, latest revision 2015 Some slides from Fitzgerald and Dennis, 2010 Networking Protocols A networking protocol is a set of rules

More information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.

More information

How To Design A Layered Network In A Computer Network

How To Design A Layered Network In A Computer Network A Layered Approach to Computer Networks Physical Layer Data Link Layer Network Layer Transport Layer Session Layer Presentation Layer Application Layer Different layer of abstraction Different error control

More information

Chapter 7 Application Protocol Reference Architecture

Chapter 7 Application Protocol Reference Architecture Application Protocol Reference Architecture Chapter 7 Application Protocol Reference Architecture This chapter proposes an alternative reference architecture for application protocols. The proposed reference

More information

Protocols and Architecture. Protocol Architecture.

Protocols and Architecture. Protocol Architecture. Protocols and Architecture Protocol Architecture. Layered structure of hardware and software to support exchange of data between systems/distributed applications Set of rules for transmission of data between

More information

How To Understand The Layered Architecture Of A Network

How To Understand The Layered Architecture Of A Network COMPUTER NETWORKS NETWORK ARCHITECTURE AND PROTOCOLS The Need for Standards Computers have different architectures, store data in different formats and communicate at different rates Agreeing on a particular

More information

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software Local Area What s a LAN? A transmission system, usually private owned, very speedy and secure, covering a geographical area in the range of kilometres, comprising a shared transmission medium and a set

More information

Part 15.1: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Wireless Personal Area Networks (WPANS)

Part 15.1: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Wireless Personal Area Networks (WPANS) 14 June 2002 Clause 5 Clause 5 reprinted with permission from: IEEE Std 802.15.1-2002 IEEE Standard for Information technology Telecommunications and information exchange between systems Local and metropolitan

More information

CPS221 Lecture: Layered Network Architecture

CPS221 Lecture: Layered Network Architecture CPS221 Lecture: Layered Network Architecture Objectives last revised 9/10/12 1. To discuss the OSI layered architecture model 2. To discuss the specific implementation of this model in TCP/IP Materials:

More information

How To Develop Software

How To Develop Software Software Engineering Prof. N.L. Sarda Computer Science & Engineering Indian Institute of Technology, Bombay Lecture-4 Overview of Phases (Part - II) We studied the problem definition phase, with which

More information

VISUAL ALGEBRA FOR COLLEGE STUDENTS. Laurie J. Burton Western Oregon University

VISUAL ALGEBRA FOR COLLEGE STUDENTS. Laurie J. Burton Western Oregon University VISUAL ALGEBRA FOR COLLEGE STUDENTS Laurie J. Burton Western Oregon University VISUAL ALGEBRA FOR COLLEGE STUDENTS TABLE OF CONTENTS Welcome and Introduction 1 Chapter 1: INTEGERS AND INTEGER OPERATIONS

More information

Model Simulation in Rational Software Architect: Business Process Simulation

Model Simulation in Rational Software Architect: Business Process Simulation Model Simulation in Rational Software Architect: Business Process Simulation Mattias Mohlin Senior Software Architect IBM The BPMN (Business Process Model and Notation) is the industry standard notation

More information

ICS 153 Introduction to Computer Networks. Inst: Chris Davison cbdaviso@uci.edu

ICS 153 Introduction to Computer Networks. Inst: Chris Davison cbdaviso@uci.edu ICS 153 Introduction to Computer Networks Inst: Chris Davison cbdaviso@uci.edu 1 ICS 153 Introduction to Computer Networks Course Goals Understand the basic principles of computer networks Design Architecture

More information

Chapter 4 Software Lifecycle and Performance Analysis

Chapter 4 Software Lifecycle and Performance Analysis Chapter 4 Software Lifecycle and Performance Analysis This chapter is aimed at illustrating performance modeling and analysis issues within the software lifecycle. After having introduced software and

More information

Transport Layer Protocols

Transport Layer Protocols Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements

More information

A Tool for Evaluation and Optimization of Web Application Performance

A Tool for Evaluation and Optimization of Web Application Performance A Tool for Evaluation and Optimization of Web Application Performance Tomáš Černý 1 cernyto3@fel.cvut.cz Michael J. Donahoo 2 jeff_donahoo@baylor.edu Abstract: One of the main goals of web application

More information

Masters in Human Computer Interaction

Masters in Human Computer Interaction Masters in Human Computer Interaction Programme Requirements Taught Element, and PG Diploma in Human Computer Interaction: 120 credits: IS5101 CS5001 CS5040 CS5041 CS5042 or CS5044 up to 30 credits from

More information

Overview of Network Hardware and Software. CS158a Chris Pollett Jan 29, 2007.

Overview of Network Hardware and Software. CS158a Chris Pollett Jan 29, 2007. Overview of Network Hardware and Software CS158a Chris Pollett Jan 29, 2007. Outline Scales of Networks Protocol Hierarchies Scales of Networks Last day, we talked about broadcast versus point-to-point

More information

Masters in Advanced Computer Science

Masters in Advanced Computer Science Masters in Advanced Computer Science Programme Requirements Taught Element, and PG Diploma in Advanced Computer Science: 120 credits: IS5101 CS5001 up to 30 credits from CS4100 - CS4450, subject to appropriate

More information

In: Proceedings of RECPAD 2002-12th Portuguese Conference on Pattern Recognition June 27th- 28th, 2002 Aveiro, Portugal

In: Proceedings of RECPAD 2002-12th Portuguese Conference on Pattern Recognition June 27th- 28th, 2002 Aveiro, Portugal Paper Title: Generic Framework for Video Analysis Authors: Luís Filipe Tavares INESC Porto lft@inescporto.pt Luís Teixeira INESC Porto, Universidade Católica Portuguesa lmt@inescporto.pt Luís Corte-Real

More information

Protocol Data Units and Encapsulation

Protocol Data Units and Encapsulation Chapter 2: Communicating over the 51 Protocol Units and Encapsulation For application data to travel uncorrupted from one host to another, header (or control data), which contains control and addressing

More information

Masters in Artificial Intelligence

Masters in Artificial Intelligence Masters in Artificial Intelligence Programme Requirements Taught Element, and PG Diploma in Artificial Intelligence: 120 credits: IS5101 CS5001 CS5010 CS5011 CS4402 or CS5012 in total, up to 30 credits

More information

The Draft IEEE 802.16m System Description Document

The Draft IEEE 802.16m System Description Document 00-0- IEEE 0.m-0/00 0 0 Table of Content Scope References The Draft IEEE 0.m System Description Document Definition, Symbols, Abbreviation Overall Network Architecture IEEE 0.m System Reference Model IEEE

More information

Objectives of Lecture. Network Architecture. Protocols. Contents

Objectives of Lecture. Network Architecture. Protocols. Contents Objectives of Lecture Network Architecture Show how network architecture can be understood using a layered approach. Introduce the OSI seven layer reference model. Introduce the concepts of internetworking

More information

Masters in Networks and Distributed Systems

Masters in Networks and Distributed Systems Masters in Networks and Distributed Systems Programme Requirements Taught Element, and PG Diploma in Networks and Distributed Systems: 120 credits: IS5101 CS5001 CS5021 CS4103 or CS5023 in total, up to

More information

SIP Registration Stress Test

SIP Registration Stress Test SIP Registration Stress Test Miroslav Voznak and Jan Rozhon Department of Telecommunications VSB Technical University of Ostrava 17. listopadu 15/2172, 708 33 Ostrava Poruba CZECH REPUBLIC miroslav.voznak@vsb.cz,

More information

Computer Networks Vs. Distributed Systems

Computer Networks Vs. Distributed Systems Computer Networks Vs. Distributed Systems Computer Networks: A computer network is an interconnected collection of autonomous computers able to exchange information. A computer network usually require

More information

The OSI Model and the TCP/IP Protocol Suite

The OSI Model and the TCP/IP Protocol Suite The OSI Model and the TCP/IP Protocol Suite To discuss the idea of multiple layering in data communication and networking and the interrelationship between layers. To discuss the OSI model and its layer

More information

Zarządzanie sieciami telekomunikacyjnymi

Zarządzanie sieciami telekomunikacyjnymi What Is an Internetwork? An internetwork is a collection of individual networks, connected by intermediate networking devices, that functions as a single large network. Internetworking refers to the industry,

More information

Visualization methods for patent data

Visualization methods for patent data Visualization methods for patent data Treparel 2013 Dr. Anton Heijs (CTO & Founder) Delft, The Netherlands Introduction Treparel can provide advanced visualizations for patent data. This document describes

More information

Departamento de Investigación. LaST: Language Study Tool. Nº 143 Edgard Lindner y Enrique Molinari Coordinación: Graciela Matich

Departamento de Investigación. LaST: Language Study Tool. Nº 143 Edgard Lindner y Enrique Molinari Coordinación: Graciela Matich Departamento de Investigación LaST: Language Study Tool Nº 143 Edgard Lindner y Enrique Molinari Coordinación: Graciela Matich Noviembre 2005 Para citar este documento: Lindner, Edgard; Enrique Molinari,

More information

The Business Process Model

The Business Process Model The Business Process Model by Sparx Systems All material Sparx Systems 2007 Sparx Systems 2007 Page: 1 Table of Contents INTRODUCTION...3 BUSINESS PROCESS MODELING NOTATION (BPMN)...4 FLOW ELEMENTS...4

More information

The Masters of Science in Information Systems & Technology

The Masters of Science in Information Systems & Technology The Masters of Science in Information Systems & Technology College of Engineering and Computer Science University of Michigan-Dearborn A Rackham School of Graduate Studies Program PH: 313-593-5361; FAX:

More information

Secure SCTP against DoS Attacks in Wireless Internet

Secure SCTP against DoS Attacks in Wireless Internet Secure SCTP against DoS Attacks in Wireless Internet Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwjoe@hanyang.ac.kr Abstract. The Stream Control Transport Protocol

More information

A static representation for ToonTalk programs

A static representation for ToonTalk programs A static representation for ToonTalk programs Mikael Kindborg mikki@ida.liu.se www.ida.liu.se/~mikki Department of Computer and Information Science Linköping University Sweden Abstract Animated and static

More information

Networking Test 4 Study Guide

Networking Test 4 Study Guide Networking Test 4 Study Guide True/False Indicate whether the statement is true or false. 1. IPX/SPX is considered the protocol suite of the Internet, and it is the most widely used protocol suite in LANs.

More information

Using UML Part Two Behavioral Modeling Diagrams

Using UML Part Two Behavioral Modeling Diagrams UML Tutorials Using UML Part Two Behavioral Modeling Diagrams by Sparx Systems All material Sparx Systems 2007 Sparx Systems 2007 Page 1 Trademarks Object Management Group, OMG, Unified Modeling Language,

More information

Computer Networks. Chapter 5 Transport Protocols

Computer Networks. Chapter 5 Transport Protocols Computer Networks Chapter 5 Transport Protocols Transport Protocol Provides end-to-end transport Hides the network details Transport protocol or service (TS) offers: Different types of services QoS Data

More information

Masters in Computing and Information Technology

Masters in Computing and Information Technology Masters in Computing and Information Technology Programme Requirements Taught Element, and PG Diploma in Computing and Information Technology: 120 credits: IS5101 CS5001 or CS5002 CS5003 up to 30 credits

More information

Communications and Computer Networks

Communications and Computer Networks SFWR 4C03: Computer Networks and Computer Security January 5-8 2004 Lecturer: Kartik Krishnan Lectures 1-3 Communications and Computer Networks The fundamental purpose of a communication system is the

More information

Lifting the Hood of the Computer: * Program Animation with the Teaching Machine

Lifting the Hood of the Computer: * Program Animation with the Teaching Machine Lifting the Hood of the Computer: * Program Animation with the Teaching Machine Michael P. Bruce-Lockhart and Theodore S. Norvell Electrical and Computer Engineering Faculty of Engineering and Applied

More information

Layered Architectures and Applications

Layered Architectures and Applications 1 Layered Architectures and Applications Required reading: Garcia 2.1, 2.2, 2.3 CSE 3213, Fall 2010 Instructor: N. Vlajic 2 Why Layering?! 3 Montreal London Paris Alice wants to send a mail to Bob and

More information

Applications. Network Application Performance Analysis. Laboratory. Objective. Overview

Applications. Network Application Performance Analysis. Laboratory. Objective. Overview Laboratory 12 Applications Network Application Performance Analysis Objective The objective of this lab is to analyze the performance of an Internet application protocol and its relation to the underlying

More information

eservices for Hospital Equipment

eservices for Hospital Equipment eservices for Hospital Equipment Merijn de Jonge 1, Wim van der Linden 1, and Rik Willems 2 1 Healthcare Systems Architecture Philips Research, The Netherlands 2 Strategy and Innovation Management/Technical

More information

RFC 2544 Testing of Ethernet Services in Telecom Networks

RFC 2544 Testing of Ethernet Services in Telecom Networks RFC 2544 Testing of Ethernet Services in Telecom Networks White Paper Nigel Burgess Agilent Technologies Introduction The object of this paper is to discuss the use and testing of Ethernet services in

More information

Mobile Application Part protocol implementation in OPNET

Mobile Application Part protocol implementation in OPNET Mobile Application Part protocol implementation in OPNET Vladimir Vukadinovic and Ljiljana Trajkovic School of Engineering Science Simon Fraser University Vancouver, BC, Canada E-mail: {vladimir, ljilja}@cs.sfu.ca

More information

How To Monitor Performance On Eve

How To Monitor Performance On Eve Performance Monitoring on Networked Virtual Environments C. Bouras 1, 2, E. Giannaka 1, 2 Abstract As networked virtual environments gain increasing interest and acceptance in the field of Internet applications,

More information

PART OF THE PICTURE: The TCP/IP Communications Architecture

PART OF THE PICTURE: The TCP/IP Communications Architecture PART OF THE PICTURE: The / Communications Architecture 1 PART OF THE PICTURE: The / Communications Architecture BY WILLIAM STALLINGS The key to the success of distributed applications is that all the terminals

More information

Process Visualization of a Manufacturing Plant Based On Lean Concept

Process Visualization of a Manufacturing Plant Based On Lean Concept Proceedings of the 2014 International Conference on Industrial Engineering and Operations Management Bali, Indonesia, January 7 9, 2014 Process Visualization of a Manufacturing Plant Based On Lean Concept

More information

Security (II) ISO 7498-2: Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012

Security (II) ISO 7498-2: Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012 Course Outline: Fundamental Topics System View of Network Security Network Security Model Security Threat Model & Security Services Model Overview of Network Security Security Basis: Cryptography Secret

More information

Module 1. Introduction. Version 2 CSE IIT, Kharagpur

Module 1. Introduction. Version 2 CSE IIT, Kharagpur Module 1 Introduction Lesson 2 Layered Network Architecture Specific Functional Objectives On Completion of this lesson, the students will be able to: State the requirement for layered approach Explain

More information

CTI Higher Certificate in Information Systems (Engineering)

CTI Higher Certificate in Information Systems (Engineering) CTI Higher Certificate in Information Systems (Engineering) Module Descriptions 2015 CTI is part of Pearson, the world s leading learning company. Pearson is the corporate owner, not a registered provider

More information

Recipes4Success. Animate a Rocket Ship. Frames 6 - Drawing Tools

Recipes4Success. Animate a Rocket Ship. Frames 6 - Drawing Tools Recipes4Success You can use the drawing tools and path animation tools in Frames to create illustrated cartoons. In this Recipe, you will draw and animate a rocket ship. 2014. All Rights Reserved. This

More information

IEEE 802.11 frame format

IEEE 802.11 frame format IEEE 802.11 frame format Pietro Nicoletti www.studioreti.it 802-11-Frame - 1 P. Nicoletti: see note pag. 2 Copyright note These slides are protected by copyright and international treaties. The title and

More information

Announcements. SE 1: Software Requirements Specification and Analysis. Review: Use Case Descriptions

Announcements. SE 1: Software Requirements Specification and Analysis. Review: Use Case Descriptions Announcements SE 1: Software Requirements Specification and Analysis Lecture 4: Basic Notations Nancy Day, Davor Svetinović http://www.student.cs.uwaterloo.ca/ cs445/winter2006 uw.cs.cs445 Send your group

More information

School of Computer Science

School of Computer Science School of Computer Science Computer Science - Honours Level - 2014/15 October 2014 General degree students wishing to enter 3000- level modules and non- graduating students wishing to enter 3000- level

More information

Overview of the Adobe Flash Professional CS6 workspace

Overview of the Adobe Flash Professional CS6 workspace Overview of the Adobe Flash Professional CS6 workspace In this guide, you learn how to do the following: Identify the elements of the Adobe Flash Professional CS6 workspace Customize the layout of the

More information

Decomposition into Parts. Software Engineering, Lecture 4. Data and Function Cohesion. Allocation of Functions and Data. Component Interfaces

Decomposition into Parts. Software Engineering, Lecture 4. Data and Function Cohesion. Allocation of Functions and Data. Component Interfaces Software Engineering, Lecture 4 Decomposition into suitable parts Cross cutting concerns Design patterns I will also give an example scenario that you are supposed to analyse and make synthesis from The

More information

8/27/2014. What is a computer network? Introduction. Business Applications (1) Uses of Computer Networks. Business Applications (2)

8/27/2014. What is a computer network? Introduction. Business Applications (1) Uses of Computer Networks. Business Applications (2) What is a computer network? Introduction Chapter 1 A number of separate but interconnected computers A collection of autonomous computers interconnected by a single technology COURSE FOCUS: design and

More information

DoS: Attack and Defense

DoS: Attack and Defense DoS: Attack and Defense Vincent Tai Sayantan Sengupta COEN 233 Term Project Prof. M. Wang 1 Table of Contents 1. Introduction 4 1.1. Objective 1.2. Problem 1.3. Relation to the class 1.4. Other approaches

More information

High level code and machine code

High level code and machine code High level code and machine code Teacher s Notes Lesson Plan x Length 60 mins Specification Link 2.1.7/cde Programming languages Learning objective Students should be able to (a) explain the difference

More information

Lecture 1. Lecture Overview. Intro to Networking. Intro to Networking. Motivation behind Networking. Computer / Data Networks

Lecture 1. Lecture Overview. Intro to Networking. Intro to Networking. Motivation behind Networking. Computer / Data Networks Lecture 1 An Introduction to Networking Chapter 1, pages 1-22 Dave Novak BSAD 146, Introduction to Networking School of Business Administration University of Vermont Lecture Overview Brief introduction

More information

An Interactive Visualization Tool for the Analysis of Multi-Objective Embedded Systems Design Space Exploration

An Interactive Visualization Tool for the Analysis of Multi-Objective Embedded Systems Design Space Exploration An Interactive Visualization Tool for the Analysis of Multi-Objective Embedded Systems Design Space Exploration Toktam Taghavi, Andy D. Pimentel Computer Systems Architecture Group, Informatics Institute

More information

Computer Science. Master of Science

Computer Science. Master of Science Computer Science Master of Science The Master of Science in Computer Science program at UALR reflects current trends in the computer science discipline and provides students with a solid theoretical and

More information

Candle Plant process automation based on ABB 800xA Distributed Control Systems

Candle Plant process automation based on ABB 800xA Distributed Control Systems Candle Plant process automation based on ABB 800xA Distributed Control Systems Yousef Iskandarani and Karina Nohammer Department of Engineering University of Agder Jon Lilletuns vei 9, 4879 Grimstad Norway

More information

EUROPASS DIPLOMA SUPPLEMENT

EUROPASS DIPLOMA SUPPLEMENT EUROPASS DIPLOMA SUPPLEMENT TITLE OF THE DIPLOMA (ES) Técnico Superior en Animaciones 3D, Juegos y Entornos Interactivos TRANSLATED TITLE OF THE DIPLOMA (EN) (1) Higher Technician in 3D Animations, Games

More information

CS 325 Computer Graphics

CS 325 Computer Graphics CS 325 Computer Graphics 01 / 25 / 2016 Instructor: Michael Eckmann Today s Topics Review the syllabus Review course policies Color CIE system chromaticity diagram color gamut, complementary colors, dominant

More information

Simulating Rail Traffic Safety Systems using HLA 1516

Simulating Rail Traffic Safety Systems using HLA 1516 Simulating Rail Traffic Safety Systems using HLA 1516 08E-SIW-069 Fred van Lieshout Ferdinand Cornelissen Jan Neuteboom Atos Origin Technical Automation Papendorpseweg 93 3528 BJ Utrecht, The Netherlands

More information

Protocol Architecture

Protocol Architecture Protocol Architecture ed Protocol Architectures OSI Reference Model TCP/IP Protocol Stack Need for Protocols The task of exchanging information between devices requires a high degree of cooperation between

More information

Chapter 2 - The TCP/IP and OSI Networking Models

Chapter 2 - The TCP/IP and OSI Networking Models Chapter 2 - The TCP/IP and OSI Networking Models TCP/IP : Transmission Control Protocol/Internet Protocol OSI : Open System Interconnection RFC Request for Comments TCP/IP Architecture Layers Application

More information

Link Layer. 5.6 Hubs and switches 5.7 PPP 5.8 Link Virtualization: ATM and MPLS

Link Layer. 5.6 Hubs and switches 5.7 PPP 5.8 Link Virtualization: ATM and MPLS Link Layer 5.1 Introduction and services 5.2 Error detection and correction 5.3Multiple access protocols 5.4 Link-Layer Addressing 5.5 Ethernet 5.6 Hubs and switches 5.7 PPP 5.8 Link Virtualization: and

More information

QUIT MACSCHOOL AND DRAG YOUR SERVER ICONS TO THE TRASH OR HIT THE DISCONNECT BUTTON BESIDE THE SERVER ICON IN THE TOP SIDEBAR

QUIT MACSCHOOL AND DRAG YOUR SERVER ICONS TO THE TRASH OR HIT THE DISCONNECT BUTTON BESIDE THE SERVER ICON IN THE TOP SIDEBAR Macintosh Operating System OSX 10.3.x STARTING YOUR COMPUTER Logging in Whenever you start your computer, you will need to enter your computer password at the log in screen. When the log in screen appears,

More information

Network Discovery Protocol LLDP and LLDP- MED

Network Discovery Protocol LLDP and LLDP- MED Network LLDP and LLDP- MED Prof. Vahida Z. Attar College of Engineering, Pune Wellesely Road, Shivajinagar, Pune-411 005. Maharashtra, INDIA Piyush chandwadkar College of Engineering, Pune Wellesely Road,

More information

Wireshark Tutorial. Figure 1: Packet sniffer structure

Wireshark Tutorial. Figure 1: Packet sniffer structure Wireshark Tutorial INTRODUCTION The purpose of this document is to introduce the packet sniffer Wireshark. Wireshark would be used for the lab experiments. This document introduces the basic operation

More information

Network Forensics in a Clean-Slate Internet Architecture

Network Forensics in a Clean-Slate Internet Architecture Network Forensics in a Clean-Slate Internet Architecture Tinus Strauss Department of Computer Science University of Pretoria, South Africa Email: tstrauss@cs.up.ac.za Martin S. Olivier Department of Computer

More information

ELEMENTS AND PRINCIPLES OF DESIGN

ELEMENTS AND PRINCIPLES OF DESIGN APPENDIX A1 4 T T ELEMENTS AND PRINCIPLES OF DESIGN Groups: 1. Select an advertisement. 2. Examine the advertisement to find examples of a few elements and principles of design that you are familiar with.

More information

A Customer Service Management Architecture for the Internet

A Customer Service Management Architecture for the Internet A Customer Service Management Architecture for the Internet Ron A. M. Sprenkels 1, Aiko Pras 1, Bert-Jan van Beijnum 1 and Leo de Goede 1 1 Computer Science department University of Twente (UT) P.O. Box

More information

CSE 3461 / 5461: Computer Networking & Internet Technologies

CSE 3461 / 5461: Computer Networking & Internet Technologies Autumn Semester 2014 CSE 3461 / 5461: Computer Networking & Internet Technologies Instructor: Prof. Kannan Srinivasan 08/28/2014 Announcement Drop before Friday evening! k. srinivasan Presentation A 2

More information

How To Test For 10 Gigabit Ethernet At 10 Gb/S

How To Test For 10 Gigabit Ethernet At 10 Gb/S White Paper Testing Scenarios for Ethernet at 10 Gb/s By Guylain Barlow Introduction As a natural evolution, the typical test concepts borrowed from lower-rate Ethernet apply to 10 Gigabit Ethernet (GigE).

More information

feature model-driven development Test-Driven Modeling for Model-Driven Development

feature model-driven development Test-Driven Modeling for Model-Driven Development feature model-driven development Test-Driven Modeling for Model-Driven Development Yuefeng Zhang, Motorola Extreme Programming is a code-centric, lightweight software development process. 1 3 One of XP

More information

Computer Aided Design and Drafting (CAD)

Computer Aided Design and Drafting (CAD) Oakland Community College 2015-2016 Catalog 1 Computer Aided Design and Drafting (CAD) CAD 1050 Geometric Dimensioning and Tolerancing (GD&T) This course is designed to cover the fundamentals as well as

More information

Remote control of CAN-based industrial equipment using Internet technologies

Remote control of CAN-based industrial equipment using Internet technologies Remote control of CAN-based industrial equipment using Internet technologies Prof. Dr.-Ing. Gerhard Gruhler, University of Applied Sciences Reutlingen, Steinbeis Technology Transfer Center Automation (STA),

More information

Table of Contents Author s Preface... 3 Table of Contents... 5 Introduction... 6 Step 1: Define Activities... 7 Identify deliverables and decompose

Table of Contents Author s Preface... 3 Table of Contents... 5 Introduction... 6 Step 1: Define Activities... 7 Identify deliverables and decompose 1 2 Author s Preface The Medialogist s Guide to Project Time Management is developed in compliance with the 9 th semester Medialogy report The Medialogist s Guide to Project Time Management Introducing

More information

Performance Evaluation of Wired and Wireless Local Area Networks

Performance Evaluation of Wired and Wireless Local Area Networks International Journal of Engineering Research and Development ISSN: 2278-067X, Volume 1, Issue 11 (July 2012), PP.43-48 www.ijerd.com Performance Evaluation of Wired and Wireless Local Area Networks Prof.

More information

Future Landscapes. Research report CONTENTS. June 2005

Future Landscapes. Research report CONTENTS. June 2005 Future Landscapes Research report June 2005 CONTENTS 1. Introduction 2. Original ideas for the project 3. The Future Landscapes prototype 4. Early usability trials 5. Reflections on first phases of development

More information

User s Guide The SimSphere Biosphere/Atmosphere Modeling Tool

User s Guide The SimSphere Biosphere/Atmosphere Modeling Tool User s Guide The SimSphere Biosphere/Atmosphere Modeling Tool User s Guide Revision 11/1/00 Contents Introduction 3 1. SimSphere Modeling Tool Overview 4 System Requirements 4 Your User Status 4 Main Menu

More information

EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak

EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak Packet Switching and Computer Networks Switching As computer networks became more pervasive, more and more data and also less voice was transmitted over telephone lines. Circuit Switching The telephone

More information

BlueJ Teamwork Tutorial

BlueJ Teamwork Tutorial BlueJ Teamwork Tutorial Version 2.0 for BlueJ Version 2.5.0 (and 2.2.x) Bruce Quig, Davin McCall School of Engineering & IT, Deakin University Contents 1 OVERVIEW... 3 2 SETTING UP A REPOSITORY... 3 3

More information

An Approach to Teaching Introductory-Level Computer Programming

An Approach to Teaching Introductory-Level Computer Programming Olympiads in Informatics, 2013, Vol. 7, 14 22 14 2013 Vilnius University An Approach to Teaching Introductory-Level Computer Programming Michael DOLINSKY Department of Mathematics, Gomel State University

More information

Eastern Washington University Department of Computer Science. Questionnaire for Prospective Masters in Computer Science Students

Eastern Washington University Department of Computer Science. Questionnaire for Prospective Masters in Computer Science Students Eastern Washington University Department of Computer Science Questionnaire for Prospective Masters in Computer Science Students I. Personal Information Name: Last First M.I. Mailing Address: Permanent

More information

RESOURCE ALLOCATION FOR INTERACTIVE TRAFFIC CLASS OVER GPRS

RESOURCE ALLOCATION FOR INTERACTIVE TRAFFIC CLASS OVER GPRS RESOURCE ALLOCATION FOR INTERACTIVE TRAFFIC CLASS OVER GPRS Edward Nowicki and John Murphy 1 ABSTRACT The General Packet Radio Service (GPRS) is a new bearer service for GSM that greatly simplify wireless

More information

Candidates should attempt FOUR questions. All questions carry 25 marks.

Candidates should attempt FOUR questions. All questions carry 25 marks. UNIVERSITY OF ABERDEEN Exam 2010 Degree Examination in ES 3567 Communications Engineering 1B Xday X Notes: 9.00 a.m. 12 Noon (i) CANDIDATES ARE PERMITTED TO USE APPROVED CALCULATORS (II) CANDIDATES ARE

More information

Software Development Kit

Software Development Kit Open EMS Suite by Nokia Software Development Kit Functional Overview Version 1.3 Nokia Siemens Networks 1 (21) Software Development Kit The information in this document is subject to change without notice

More information

TDDC88 Lab 2 Unified Modeling Language (UML)

TDDC88 Lab 2 Unified Modeling Language (UML) TDDC88 Lab 2 Unified Modeling Language (UML) Introduction What is UML? Unified Modeling Language (UML) is a collection of graphical notations, which are defined using a single meta-model. UML can be used

More information

INTERNATIONAL TELECOMMUNICATION UNION

INTERNATIONAL TELECOMMUNICATION UNION INTERNATIONAL TELECOMMUNICATION UNION ITU-T X.690 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (07/2002) SERIES X: DATA NETWORKS AND OPEN SYSTEM COMMUNICATIONS OSI networking and system aspects Abstract

More information

Customer Service Portal. Initial Information. Screen shots and initial help. Ver. 1.1

Customer Service Portal. Initial Information. Screen shots and initial help. Ver. 1.1 Customer Service Portal Initial Information Screen shots and initial help. Ver. 1.1 08.06.2015 Notes: Copyright 2015 QuantityWare GmbH. All rights reserved. SAP, R/3, mysap, mysap.com, xapps, xapp, SAP

More information

Socket Programming in the Data Communications Laboratory

Socket Programming in the Data Communications Laboratory Socket Programming in the Data Communications Laboratory William E. Toll Assoc. Prof. Computing and System Sciences Taylor University Upland, IN 46989 btoll@css.tayloru.edu ABSTRACT Although many data

More information

ICOM 5026-090: Computer Networks Chapter 6: The Transport Layer. By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 UPRM

ICOM 5026-090: Computer Networks Chapter 6: The Transport Layer. By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 UPRM ICOM 5026-090: Computer Networks Chapter 6: The Transport Layer By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 Outline The transport service Elements of transport protocols A

More information