Architectures de communication
|
|
- Beatrix Glenn
- 8 years ago
- Views:
Transcription
1 Architectures de commuicatio C. Pham RESO-LIP/INRIA Uiversité Lyo 1, basé sur les supports de Keshav, du livre: A Egieerig Approach to Computer Networkig et les supports de l UREC
2 Ce que ous allos voir Pourquoi avos ous besoi de défiir ue architecture de commuicatio? Quelle architecture? Les avatages et les icovéiets de ces architectures. Cours de C. Pham, Uiv. Lyo 1
3 Example Exchage a file over a etwork that corrupts packets but does t lose or reorder them A simple protocol sed file as a series of packets sed a checksum receiver seds OK or ot-ok message seder waits for OK message if o respose, reseds etire file Problems sigle bit corruptio requires retrasmissio of etire file what if lik goes dow? what if ot-ok message itself is corrupted? Cours de C. Pham, Uiv. Lyo 1
4 Défiir ue architecture de commuicatio Peut-o défiir ue architecture qui soit: Modulaire? Flexible? Performate? Portable? Même problématique que lorsque l o écrit u programme O cherche à idetifier les procédures de base (gééricité, modularité ) O découpe le programme e esemble foctioel, chaque esemble pouvat être iter-chageable. O va doc idetifier les services de base d u réseau et ce que doit fourir ue architecture de commuicatio Cours de C. Pham, Uiv. Lyo 1
5 Les services de base A vous de jouer! Cours de C. Pham, Uiv. Lyo 1
6 Protocols Key poit i etworkig: tells how to behave ad commuicate to be uderstood Sytax of a message what fields does it cotai? i what format? Sematics of a message what does a message mea? for example, ot-ok message meas receiver got a corrupted file Actios to take o receipt of a message for example, o receivig ot-ok message, retrasmit the etire file Cours de C. Pham, Uiv. Lyo 1
7 Aother way to view a protocol As providig a service The example protocol provides reliable file trasfer service Peer etities use a protocol to provide a service to a higher-level peer etity for example, postal workers use a protocol to preset customers with the abstractio of a ureliable letter trasfer service Cours de C. Pham, Uiv. Lyo 1
8 Protocol layerig A etwork that provides may services eeds may protocols Turs out that some services are idepedet But others deped o each other Protocol A may use protocol B as a step i its executio for example, packet trasfer is oe step i the executio of the example reliable file trasfer protocol This form of depedecy is called layerig reliable file trasfer is layered above packet trasfer protocol like a subroutie Cours de C. Pham, Uiv. Lyo 1
9 Protocol stack A set of protocol layers Each layer uses the layer below ad provides a service to the layer above Key idea oce we defie a service provided by a layer, we eed kow othig more about the details of how the layer actually implemets the service iformatio hidig decouples chages Cours de C. Pham, Uiv. Lyo 1
10 Some termiology Service access poit (SAP) iterface betwee a upper layer ad a lower layer Protocol data uits (PDUs) packets exchaged betwee peer etities Service data uits (SDUs) packets haded to a layer by a upper layer PDU = SDU + optioal header or trailer Example letter trasfer service protocol data uit betwee customers = letter service data uit for postal service = letter protocol data uit = mailbag (aggregatio of letters) (what is the SDU header?) Cours de C. Pham, Uiv. Lyo 1
11 SAP, SDU, PDU... Cours de C. Pham, Uiv. Lyo 1
12 The importace of beig layered Breaks up a complex problem ito smaller maageable pieces ca compose simple service to provide complex oes for example, WWW (HTTP) is Java layered over TCP over IP (ad uses DNS, ARP, DHCP, RIP, OSPF, BGP, PPP, ICMP) Abstractio of implemetatio details separatio of implemetatio ad specificatio ca chage implemetatio as log as service iterface is maitaied Ca reuse fuctioality upper layers ca share lower layer fuctioality example: WiSock o Microsoft Widows Cours de C. Pham, Uiv. Lyo 1
13 Layerig There is a tesio betwee iformatio-hidig (abstractio) ad achievig good performace Art of protocol desig is to leak eough iformatio to allow good performace but ot so much that small chages i oe layer eed chages to other layers Cours de C. Pham, Uiv. Lyo 1
14 ISO OSI referece model A set of protocols is ope if protocol details are publicly available chages are maaged by a orgaizatio whose membership ad trasactios are ope to the public A system that implemets ope protocols is called a ope system Iteratioal Orgaizatio for Stadards (ISO) prescribes a stadard to coect ope systems ope system itercoect (OSI) Has greatly iflueced thikig o protocol stacks Cours de C. Pham, Uiv. Lyo 1
15 ISO OSI Referece model formally defies what is meat by a layer, a service etc. Service architecture describes the services provided by each layer ad the service access poit Protocol architecture set of protocols that implemet the service architecture compliat service architectures may still use o-compliat protocol architectures Cours de C. Pham, Uiv. Lyo 1
16 Le modèle OSI Cours de C. Pham, Uiv. Lyo 1
17 La couche physique Moves bits betwee physically coected edsystems Stadard prescribes codig scheme to represet a bit shapes ad sizes of coectors bit-level sychroizatio Postal etwork techology for movig letters from oe poit to aother (trais, plaes, vas, bicycles, ships ) Iteret techology to move bits o a wire, wireless lik, satellite chael etc. Cours de C. Pham, Uiv. Lyo 1
18 La couche Liaiso Itroduit la otio de trame Esemble de bits faisat partie d ue iformatio a faire passer Ex: u From - Thu Ju 6 16:04: Retur-Path: <saissa@bat710.uiv-lyo1.fr> Received: from pluvier (pluvier.es-lyo.fr [ ]) by oceaite.es-lyo.fr (Postfix) with SMTP id 32AC for <Cogduc.Pham@es-lyo.fr>; Thu, 6 Ju :55: (CEST) Received: from bat710.uiv-lyo1.fr ([ ] idet=root) by pluvier with smtp (Exim 3.35 #1 (Debia)) id 17Fxjb-0002sg-00 for <Cogduc.Pham@es-lyo.fr>; Thu, 06 Ju :55: Received: from b710paa (b710paa.uiv-lyo1.fr [ ]) by bat710.uiv-lyo1.fr (8.9.3/8.9.3/Debia ) with SMTP id PAA17174 for <Cogduc.Pham@es-lyo.fr>; Thu, 6 Ju :55: X-Autheticatio-Warig: bat710.uiv-lyo1.fr: Host b710paa.uiv-lyo1.fr [ ] claimed to be b710paa Message-Id: < f670@bat710.uiv-lyo1.fr> X-Seder: saissa@bat710.uiv-lyo1.fr X-Mailer: Widows Eudora Pro Versio (32) [F] Date: Thu, 06 Ju :05: To: Cogduc.Pham@es-lyo.fr From: Saida AISSA <saissa@bat710.uiv-lyo1.fr> Subject: hello Mime-Versio: 1.0 Cotet-Type: text/plai; charset="iso " Cotet-Trasfer-Ecodig: quoted-pritable X-Mozilla-Status: 8001 X-Mozilla-Status2: X-UIDL: oceaite,S=1958 Cours de C. Pham, Uiv. Lyo 1
19 La couche Liaiso (co( co t) Idle markers tell us that a lik is ot carryig a frame Begi ad ed markers delimit a frame O a broadcast lik (such as Etheret) ed-system must receive oly bits meat for it eed datalik-layer address also eed to decide who gets to speak ext these fuctios are provided by Medium Access sublayer (MAC) Some data liks also retrasmit corrupted packets ad pace the rate at which frames are placed o a lik part of logical lik cotrol sublayer layered over MAC sublayer Cours de C. Pham, Uiv. Lyo 1
20 La couche Liaiso (co( co t.) Datalik layer protocols are the first layer of software Very depedet o uderlyig physical lik propeties Usually budle both physical ad datalik layer o host adaptor card example: Etheret Postal service mail bag frames letters Iteret a variety of datalik layer protocols most commo is Etheret others are FDDI, SONET, HDLC Cours de C. Pham, Uiv. Lyo 1
21 Network layer Logically cocateates a set of liks to form the abstractio of a ed-to-ed lik Allows a ed-system to commuicate with ay other ed-system by computig a route betwee them Hides idiosycrasies of datalik layer Provides uique etwork-wide addresses Foud both i ed-systems ad i itermediate systems At ed-systems primarily hides details of datalik layer segmetatio ad reassembly error detectio Cours de C. Pham, Uiv. Lyo 1
22 Network layer (cotd.) At itermediate systems participates i routig protocol to create routig tables resposigle for forwardig packets schedulig the trasmissio order of packets choosig which packets to drop Cours de C. Pham, Uiv. Lyo 1
23 Two types of etwork layers I datagram etworks provides both routig ad data forwardig I coectio-orieted etwork we distiguish betwee data plae ad cotrol plae data plae oly forwards ad schedules data (touches every byte) cotrol plae resposible for routig, call-establishmet, callteardow (does t touch data bytes) Cours de C. Pham, Uiv. Lyo 1
24 Network layer Postal etwork set up iteral routig tables forward letters from source to destiatio static routig multiple qualities of service Iteret etwork layer is provided by Iteret Protocol foud i all ed-systems ad itermediate systems provides abstractio of ed-to-ed lik segmetatio ad reassembly packet-forwardig, routig, schedulig uique IP addresses ca be layered over aythig, but oly best-effort service Cours de C. Pham, Uiv. Lyo 1
25 Couche OSI pour l itercoexio Cours de C. Pham, Uiv. Lyo 1
26 Trasport layer Network provides a raw ed-to-ed service Trasport layer creates the abstractio of a errorcotrolled, flow-cotrolled ad multiplexed ed-toed lik Error cotrol message will reach destiatio despite packet loss, corruptio ad duplicatio retrasmit lost packets; detect, discard, ad retrasmit corrupted packets; detect ad discard duplicated packets Flow cotrol match trasmissio rat to rate curretly sustaiable o the path to destiatio, ad at the destiatio itself Cours de C. Pham, Uiv. Lyo 1
27 Trasport layer (cotd.) Multiplexes multiple applicatios to the same ed-toed coectio adds a applicatio-specific idetifier (port umber) so that receivig ed-system ca had i icomig packet to the correct applicatio Some trasport layers provide fewer services e.g. simple error detectio, o flow cotrol, ad o retrasmissio lightweight trasport layer Cours de C. Pham, Uiv. Lyo 1
28 Trasport layer (cotd.) Postal system does t have a trasport layer implemeted, if at all, by customers detect lost letters (how?) ad retrasmit them Iteret two popular protocols are TCP ad UDP TCP provides error cotrol, flow cotrol, multiplexig UDP provides oly multiplexig Cours de C. Pham, Uiv. Lyo 1
29 Sessio layer Not commo Provides full-duplex service, expedited data delivery, ad sessio sychroizatio Duplex if trasport layer is simplex, cocateates two trasport edpoits togeter Expedited data delivery allows some messages to skip ahead i ed-system queues, by usig a separate low-delay trasport layer edpoit Sychroizatio allows users to place marks i data stream ad to roll back to a prespecified mark Cours de C. Pham, Uiv. Lyo 1
30 Example Postal etwork suppose a compay has separate shippig ad receivig clerks chief clerk ca maage both to provide abstractio of a duplex service chief clerk may also sed some messages usig a courier (expedited service) chief clerk ca arrage to have a set of messages either delivered all at oce, or ot at all Iteret does t have a stadard sessio layer Cours de C. Pham, Uiv. Lyo 1
31 Presetatio layer Ulike other layers which deal with headers presetatio layer touches the applicatio data Hides data represetatio differeces betwee applicatios e.g. edia-ess Ca also ecrypt data Usually ad hoc Postal etwork traslator traslates cotets before givig it to chief clerk Iteret o stadard presetatio layer oly defies etwork byte order for 2- ad 4-byte itegers Cours de C. Pham, Uiv. Lyo 1
32 Applicatio layer The set of applicatios that use the etwork Does t provide services to ay other layer Postal etwork the perso who uses the postal system suppose maager wats to sed a set of recall letters traslator traslates letters goig abroad chief clerk seds some priority mail, ad some by regular mail mail clerk seds a message, retrasmits if ot acked postal system computes a route ad forwards the letters datalik layer: letters carried by plaes, trais, automobiles physical layer: the letter itself Cours de C. Pham, Uiv. Lyo 1
33 Les primitives de services das OSI X peut être 'importe quelle primitives de services d'ue couche doée. Ex: T_CONNECT.request, N_DATA.idicatio Cours de C. Pham, Uiv. Lyo 1
34 Layerig We have broke a complex problem ito smaller, simpler pieces Provides the applicatio with sophisticated services Each layer provides a clea abstractio to the layer above Cours de C. Pham, Uiv. Lyo 1
35 Why seve layers? Need a top ad a bottom -- 2 Need to hide physical lik, so eed datalik -- 3 Need both ed-to-ed ad hop-by-hop actios; so eed at least the etwork ad trasport layers -- 5 Sessio ad presetatio layers are ot so importat, ad are ofte igored So, we eed at least 5, ad 7 seems to be excessive Note that we ca place fuctios i differet layers Cours de C. Pham, Uiv. Lyo 1
36 Le modèle TCP/IP par rapport à OSI Cours de C. Pham, Uiv. Lyo 1
37 Problems with layerig Layerig hides iformatio if it did t the chages to oe layer could require chages everywhere layerig violatio But sometimes hidde iformatio ca be used to improve performace for example, flow cotrol protocol may thik packet loss is always because of etwork cogestio if it is, istead, due to a lossy lik, the flow cotrol breaks this is because we hid iformatio about reaso of packet loss from flow cotrol protocol Cours de C. Pham, Uiv. Lyo 1
38 La ormalisatio 2 orgaismes de ormalisatio pour les réseaux L'ISO (Iteratioal Stadardizatio Orgaizatio) UIT-T (Uio Iteratioale des Télécommuicatio) ex CCITT L'ISO est dépedat de l'onu, les représetats atioaux sot les orgaismes atioaux de ormalisatio ANSI (USA) AFNOR (Frace) DIN (Allemage) BSI (Royaume Ui) HSC (Japo) L'UIT-T compred des idustriels et des opérateurs de télécommuicatio Cours de C. Pham, Uiv. Lyo 1
Domain 1 - Describe Cisco VoIP Implementations
Maual ONT (642-8) 1-800-418-6789 Domai 1 - Describe Cisco VoIP Implemetatios Advatages of VoIP Over Traditioal Switches Voice over IP etworks have may advatages over traditioal circuit switched voice etworks.
More informationSecurity Functions and Purposes of Network Devices and Technologies (SY0-301) 1-800-418-6789. Firewalls. Audiobooks
Maual Security+ Domai 1 Network Security Every etwork is uique, ad architecturally defied physically by its equipmet ad coectios, ad logically through the applicatios, services, ad idustries it serves.
More informationDomain 1 Components of the Cisco Unified Communications Architecture
Maual CCNA Domai 1 Compoets of the Cisco Uified Commuicatios Architecture Uified Commuicatios (UC) Eviromet Cisco has itroduced what they call the Uified Commuicatios Eviromet which is used to separate
More informationTwo-Phased Mapping & Identifier/Locator Network Protocol (ILNP) Youn-Hee Han, Hyon-Young Choi
Two-Phased Mappig & Idetifier/Locator Network Protocol (ILNP) You-Hee Ha, Hyo-Youg Choi Two-Phased Mappig Prefix:ETR à Prefix:AS# (Phase I) ad AS#:ETRs (Phase II) Phase II mappig iformatio ca be distributed
More informationYour organization has a Class B IP address of 166.144.0.0 Before you implement subnetting, the Network ID and Host ID are divided as follows:
Subettig Subettig is used to subdivide a sigle class of etwork i to multiple smaller etworks. Example: Your orgaizatio has a Class B IP address of 166.144.0.0 Before you implemet subettig, the Network
More informationManagement of Wireless Sensor Networks using TCP/IP
Maagemet of Wireless Sesor etworks usig TCP/IP Markus Awader, Gerald Wagekecht, ad Torste Brau Istitute of Computer Sciece ad Applied Mathematics Uiversity of Ber, Switzerlad Email: {awader, wage, brau}@iam.uibe.ch
More informationJune 3, 1999. Voice over IP
Jue 3, 1999 Voice over IP This applicatio ote discusses the Hypercom solutio for providig ed-to-ed Iteret protocol (IP) coectivity i a ew or existig Hypercom Hybrid Trasport Mechaism (HTM) etwork, reducig
More informationData Center Ethernet Facilitation of Enterprise Clustering. David Flynn, Linux Networx Orlando, Florida March 16, 2004
Data Ceter Etheret Facilitatio of Eterprise Clusterig David Fly, Liux Networx Orlado, Florida March 16, 2004 1 2 Liux Networx builds COTS based clusters 3 Clusters Offer Improved Performace Scalability
More informationAuthentication - Access Control Default Security Active Directory Trusted Authentication Guest User or Anonymous (un-authenticated) Logging Out
FME Server Security Table of Cotets FME Server Autheticatio - Access Cotrol Default Security Active Directory Trusted Autheticatio Guest User or Aoymous (u-autheticated) Loggig Out Authorizatio - Roles
More informationE-Plex Enterprise Access Control System
Eterprise Access Cotrol System Egieered for Flexibility Modular Solutio The Eterprise Access Cotrol System is a modular solutio for maagig access poits. Employig a variety of hardware optios, system maagemet
More informationiprox sensors iprox inductive sensors iprox programming tools ProxView programming software iprox the world s most versatile proximity sensor
iprox sesors iprox iductive sesors iprox programmig tools ProxView programmig software iprox the world s most versatile proximity sesor The world s most versatile proximity sesor Eato s iproxe is syoymous
More informationBaanERP 5.0c. EDI User Guide
BaaERP 5.0c A publicatio of: Baa Developmet B.V. P.O.Box 143 3770 AC Bareveld The Netherlads Prited i the Netherlads Baa Developmet B.V. 1999. All rights reserved. The iformatio i this documet is subject
More information! encor e networks TM
! ecor e etworks TM Copyright 2003 Ecore Networks, Ic. All rights reserved. SigalPath 201 (SP201 ) Istallatio Guide Versio C, July 2004 Part Number 15469.1000 SigalPath Software Versio 1100 This Istallatio
More informationVerizon Wireless Broadband Network Connectivity and Data Transport Solutions. Verizon Wireless White Paper
Verizo Wireless Broadbad Network Coectivity ad Data Trasport Solutios Verizo Wireless White Paper Cotets 1. Itroductio......................................................................................
More informationCharacterizing End-to-End Packet Delay and Loss in the Internet
Characterizig Ed-to-Ed Packet Delay ad Loss i the Iteret Jea-Chrysostome Bolot Xiyu Sog Preseted by Swaroop Sigh Layout Itroductio Data Collectio Data Aalysis Strategy Aalysis of packet delay Aalysis of
More informationODBC. Getting Started With Sage Timberline Office ODBC
ODBC Gettig Started With Sage Timberlie Office ODBC NOTICE This documet ad the Sage Timberlie Office software may be used oly i accordace with the accompayig Sage Timberlie Office Ed User Licese Agreemet.
More informationMessage Exchange in the Utility Market Using SAP for Utilities. Point of View by Marc Metz and Maarten Vriesema
Eergy, Utilities ad Chemicals the way we see it Message Exchage i the Utility Market Usig SAP for Utilities Poit of View by Marc Metz ad Maarte Vriesema Itroductio Liberalisatio of utility markets has
More informationBaanERP. BaanERP Windows Client Installation Guide
BaaERP A publicatio of: Baa Developmet B.V. P.O.Box 143 3770 AC Bareveld The Netherlads Prited i the Netherlads Baa Developmet B.V. 1999. All rights reserved. The iformatio i this documet is subject to
More informationProtection of Communication Infrastructures
Protectio of Commuicatio Ifrastructures Chapter 6 Iteret Firewalls 1 Itroductio to Network Firewalls (1) I buildig costructio, a firewall is desiged to keep a fire from spreadig from oe part of the buildig
More information(VCP-310) 1-800-418-6789
Maual VMware Lesso 1: Uderstadig the VMware Product Lie I this lesso, you will first lear what virtualizatio is. Next, you ll explore the products offered by VMware that provide virtualizatio services.
More informationDomain 1: Configuring Domain Name System (DNS) for Active Directory
Maual Widows Domai 1: Cofigurig Domai Name System (DNS) for Active Directory Cofigure zoes I Domai Name System (DNS), a DNS amespace ca be divided ito zoes. The zoes store ame iformatio about oe or more
More informationBaan Service Master Data Management
Baa Service Master Data Maagemet Module Procedure UP069A US Documetiformatio Documet Documet code : UP069A US Documet group : User Documetatio Documet title : Master Data Maagemet Applicatio/Package :
More informationConfiguring Additional Active Directory Server Roles
Maual Upgradig your MCSE o Server 2003 to Server 2008 (70-649) 1-800-418-6789 Cofigurig Additioal Active Directory Server Roles Active Directory Lightweight Directory Services Backgroud ad Cofiguratio
More informationInventoryControl. The Complete Inventory Tracking Solution for Small Businesses
IvetoryCotrol The Complete Ivetory Trackig Solutio for Small Busiesses Regular Logo 4C Productivity Solutios for Small Busiesses Logo Outlie Get i cotrol of your ivetory with Wasp Ivetory Cotrol the complete
More informationSYSTEM INFO. MDK - Multifunctional Digital Communications System. Efficient Solutions for Information and Safety
Commuicatios Systems for Itercom, PA, Emergecy Call ad Telecommuicatios MDK - Multifuctioal Digital Commuicatios System SYSTEM INFO ms NEUMANN ELEKTRONIK GmbH Efficiet Solutios for Iformatio ad Safety
More informationEngineering Data Management
BaaERP 5.0c Maufacturig Egieerig Data Maagemet Module Procedure UP128A US Documetiformatio Documet Documet code : UP128A US Documet group : User Documetatio Documet title : Egieerig Data Maagemet Applicatio/Package
More informationBio-Plex Manager Software
Multiplex Suspesio Array Bio-Plex Maager Software Extract Kowledge Faster Move Your Research Forward Bio-Rad cotiues to iovate where it matters most. With Bio-Plex Maager 5.0 software, we offer valuable
More informationDomain 1: Designing a SQL Server Instance and a Database Solution
Maual SQL Server 2008 Desig, Optimize ad Maitai (70-450) 1-800-418-6789 Domai 1: Desigig a SQL Server Istace ad a Database Solutio Desigig for CPU, Memory ad Storage Capacity Requiremets Whe desigig a
More informationVerizon Wireless Private Network
Verizo Wireless Private Network Cotets 1. Itroductio...................................................................................... 3 1.1 Audiece....................................................................................
More informationUnicenter TCPaccess FTP Server
Uiceter TCPaccess FTP Server Release Summary r6.1 SP2 K02213-2E This documetatio ad related computer software program (hereiafter referred to as the Documetatio ) is for the ed user s iformatioal purposes
More informationThe OSI and TCP/IP Models. Lesson 2
The OSI and TCP/IP Models Lesson 2 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Introduction to the OSI Model Compare the layers of the OSI and TCP/IP
More informationIn nite Sequences. Dr. Philippe B. Laval Kennesaw State University. October 9, 2008
I ite Sequeces Dr. Philippe B. Laval Keesaw State Uiversity October 9, 2008 Abstract This had out is a itroductio to i ite sequeces. mai de itios ad presets some elemetary results. It gives the I ite Sequeces
More informationTelecom. White Paper. Actionable Intelligence in the SDN Ecosystem: Optimizing Network Traffic through FRSA
Telecom White Paper Actioable Itelligece i the SDN Ecosystem: Optimizig Network Traffic through FRSA About the Authors Sumit Kapoor Sumit is a solutio architect i the telecom busiess uit at Tata Cosultacy
More informationCommunication Networks. MAP-TELE 2011/12 José Ruela
Communication Networks MAP-TELE 2011/12 José Ruela Network basic mechanisms Network Architectures Protocol Layering Network architecture concept A network architecture is an abstract model used to describe
More informationNetwork Models OSI vs. TCP/IP
Network Models OSI vs. TCP/IP Network Models Using a formal model allows us to deal with various aspects of Networks abstractly. We will look at two popular models OSI reference model TCP/IP model Both
More informationPre-Installation Network Planning Forms--S8700 Media Server
Pre-Istallatio Network Plaig Forms--S8700 Media Server S8700 Media Server with a Avaya G600 Media Gateways S8700 Media Server with Avaya MCC1/SCC1 Gateways Before you istall ad cofigure a Avaya media server,
More informationDesktop Management. Desktop Management Tools
Desktop Maagemet 9 Desktop Maagemet Tools Mac OS X icludes three desktop maagemet tools that you might fid helpful to work more efficietly ad productively: u Stacks puts expadable folders i the Dock. Clickig
More informationProtocol Architecture
Protocol Architecture ed Protocol Architectures OSI Reference Model TCP/IP Protocol Stack Need for Protocols The task of exchanging information between devices requires a high degree of cooperation between
More informationCS100: Introduction to Computer Science
Review: History of Computers CS100: Itroductio to Computer Sciece Maiframes Miicomputers Lecture 2: Data Storage -- Bits, their storage ad mai memory Persoal Computers & Workstatios Review: The Role of
More informationLesson 17 Pearson s Correlation Coefficient
Outlie Measures of Relatioships Pearso s Correlatio Coefficiet (r) -types of data -scatter plots -measure of directio -measure of stregth Computatio -covariatio of X ad Y -uique variatio i X ad Y -measurig
More informationPUBLIC RELATIONS PROJECT 2016
PUBLIC RELATIONS PROJECT 2016 The purpose of the Public Relatios Project is to provide a opportuity for the chapter members to demostrate the kowledge ad skills eeded i plaig, orgaizig, implemetig ad evaluatig
More informationSTUDENTS PARTICIPATION IN ONLINE LEARNING IN BUSINESS COURSES AT UNIVERSITAS TERBUKA, INDONESIA. Maya Maria, Universitas Terbuka, Indonesia
STUDENTS PARTICIPATION IN ONLINE LEARNING IN BUSINESS COURSES AT UNIVERSITAS TERBUKA, INDONESIA Maya Maria, Uiversitas Terbuka, Idoesia Co-author: Amiuddi Zuhairi, Uiversitas Terbuka, Idoesia Kuria Edah
More informationSystems Design Project: Indoor Location of Wireless Devices
Systems Desig Project: Idoor Locatio of Wireless Devices Prepared By: Bria Murphy Seior Systems Sciece ad Egieerig Washigto Uiversity i St. Louis Phoe: (805) 698-5295 Email: bcm1@cec.wustl.edu Supervised
More informationHow To Design A Layered Network In A Computer Network
A Layered Approach to Computer Networks Physical Layer Data Link Layer Network Layer Transport Layer Session Layer Presentation Layer Application Layer Different layer of abstraction Different error control
More informationProfessional Networking
Professioal Networkig 1. Lear from people who ve bee where you are. Oe of your best resources for etworkig is alumi from your school. They ve take the classes you have take, they have bee o the job market
More informationCommunications and Computer Networks
SFWR 4C03: Computer Networks and Computer Security January 5-8 2004 Lecturer: Kartik Krishnan Lectures 1-3 Communications and Computer Networks The fundamental purpose of a communication system is the
More informationIT Support. 020 8269 6878 n www.premierchoiceinternet.com n support@premierchoiceinternet.com. 30 Day FREE Trial. IT Support from 8p/user
IT Support IT Support Premier Choice Iteret has bee providig reliable, proactive & affordable IT Support solutios to compaies based i Lodo ad the South East of Eglad sice 2002. Our goal is to provide our
More informationVladimir N. Burkov, Dmitri A. Novikov MODELS AND METHODS OF MULTIPROJECTS MANAGEMENT
Keywords: project maagemet, resource allocatio, etwork plaig Vladimir N Burkov, Dmitri A Novikov MODELS AND METHODS OF MULTIPROJECTS MANAGEMENT The paper deals with the problems of resource allocatio betwee
More informationOne Goal. 18-Months. Unlimited Opportunities.
18 fast-track 18-Moth BACHELOR S DEGREE completio PROGRAMS Oe Goal. 18-Moths. Ulimited Opportuities. www.ortheaster.edu/cps Fast-Track Your Bachelor s Degree ad Career Goals Complete your bachelor s degree
More informationChapter 3: Review of Important Networking Concepts. Magda El Zarki Dept. of CS UC Irvine elzarki@uci.edu http://www.ics.uci.
Chapter 3: Review of Important Networking Concepts Magda El Zarki Dept. of CS UC Irvine elzarki@uci.edu http://www.ics.uci.edu/~magda 1 Networking Concepts Protocol Architecture Protocol Layers Encapsulation
More informationL5352 Ethernet Communications Interface
L5352 Etheret Commuicatios Iterface Techical Maual HA470898 Issue 2 Copyright SSD Drives Ic 2005 All rights strictly reserved. No part of this documet may be stored i a retrieval system, or trasmitted
More informationNetworking Test 4 Study Guide
Networking Test 4 Study Guide True/False Indicate whether the statement is true or false. 1. IPX/SPX is considered the protocol suite of the Internet, and it is the most widely used protocol suite in LANs.
More informationNetwork-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2
Network-Oriented Software Development Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2 Topics Layering TCP/IP Layering Internet addresses and port numbers Encapsulation
More information*The most important feature of MRP as compared with ordinary inventory control analysis is its time phasing feature.
Itegrated Productio ad Ivetory Cotrol System MRP ad MRP II Framework of Maufacturig System Ivetory cotrol, productio schedulig, capacity plaig ad fiacial ad busiess decisios i a productio system are iterrelated.
More informationCPS221 Lecture: Layered Network Architecture
CPS221 Lecture: Layered Network Architecture Objectives last revised 9/10/12 1. To discuss the OSI layered architecture model 2. To discuss the specific implementation of this model in TCP/IP Materials:
More informationAgenda. Outsourcing and Globalization in Software Development. Outsourcing. Outsourcing here to stay. Outsourcing Alternatives
Outsourcig ad Globalizatio i Software Developmet Jacques Crocker UW CSE Alumi 2003 jc@cs.washigto.edu Ageda Itroductio The Outsourcig Pheomeo Leadig Offshore Projects Maagig Customers Offshore Developmet
More informationHow To Understand The Layered Architecture Of A Network
COMPUTER NETWORKS NETWORK ARCHITECTURE AND PROTOCOLS The Need for Standards Computers have different architectures, store data in different formats and communicate at different rates Agreeing on a particular
More informationEqualizer Installation and Administration Guide
Equalizer Istallatio ad Admiistratio Guide Versio 7.2.3 Jauary 2007 Coyote Poit Systems, Ic. 675 North First Street Suite 975 Sa Jose, Califoria 95112 Copyright 1997-2007 Coyote Poit Systems, Ic. All Rights
More informationConfidence Intervals for One Mean
Chapter 420 Cofidece Itervals for Oe Mea Itroductio This routie calculates the sample size ecessary to achieve a specified distace from the mea to the cofidece limit(s) at a stated cofidece level for a
More informationZ-TEST / Z-STATISTIC: used to test hypotheses about. µ when the population standard deviation is unknown
Z-TEST / Z-STATISTIC: used to test hypotheses about µ whe the populatio stadard deviatio is kow ad populatio distributio is ormal or sample size is large T-TEST / T-STATISTIC: used to test hypotheses about
More informationObjectives of Lecture. Network Architecture. Protocols. Contents
Objectives of Lecture Network Architecture Show how network architecture can be understood using a layered approach. Introduce the OSI seven layer reference model. Introduce the concepts of internetworking
More information3G Security VoIP Wi-Fi IP Telephony Routing/Switching Unified Communications. NetVanta. Business Networking Solutions
3G Security VoIP Wi-Fi IP Telephoy Routig/Switchig Uified Commuicatios NetVata Busiess Networkig Solutios Opportuity to lower Total Cost of Owership ad improve Retur o Ivestmet The ADTRAN Advatage ADTRAN
More informationTHE TCP/IP PROTOCOL SUITE
CHAPTER 1 Protocols and Layers 25 a truck or plane. It sounds like a very complicated way to deliver one message, but this system makes the overall task of delivering many messages easier, not harder.
More information8 Interconnection. Networks and Clusters 8
8 Itercoectio Networks ad Clusters 8 The edium is the essage because it is the medium that shapes ad cotrols the search ad form of huma associatios ad actios. arshall cluha Uderstadig edia (1964) The marvels
More informationSOCIAL MEDIA. Keep the conversations going
SOCIAL MEDIA Keep the coversatios goig Social media is where most of the world is. It is therefore a ope source of cosumer data, a chael of commuicatio ad a platform for establishig relatioships with customers.
More informationDetermining the sample size
Determiig the sample size Oe of the most commo questios ay statisticia gets asked is How large a sample size do I eed? Researchers are ofte surprised to fid out that the aswer depeds o a umber of factors
More informationDistributed Queue Dual Bus (DQDB) Metropolitan Area Networks. DQDB - Transmission principle. DQDB - Example MAN
Metropolita Area Networks Bridge larger distaces tha a LAN, usage e.g. withi the city rage or o a campus. Oly oe or two cables, o switchig elemets. Thus a simple etwork desig is achieved. All computers
More informationProperties of MLE: consistency, asymptotic normality. Fisher information.
Lecture 3 Properties of MLE: cosistecy, asymptotic ormality. Fisher iformatio. I this sectio we will try to uderstad why MLEs are good. Let us recall two facts from probability that we be used ofte throughout
More informationFUEL / VEHICLE TRACKING UNIT GPS tracking and fuel monitoring solution providers
FUEL / VEHICLE TRACKING UNIT GPS trackig ad fuel moitorig solutio providers fuel moitorig ow olie.. Fu ckig el Tra ow o lie www.fueltracksidia.com 20 Chael GPS Receiver GSM/GPRS Commuicatio PRODUCT FEATURES
More informationA Network Monitoring System with a Peer-to- Peer Architecture
A Network Moitorig System with a Peer-to- Peer Architecture Paulo Salvador ad Rui Valadas Uiversity of Aveiro Istitute of Telecommuicatios Summary Motivatio Peer-to-peer architecture System elemets Data
More informationUnderstanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX
APPENDIX A Introduction Understanding TCP/IP To fully understand the architecture of Cisco Centri Firewall, you need to understand the TCP/IP architecture on which the Internet is based. This appendix
More informationFlood Emergency Response Plan
Flood Emergecy Respose Pla This reprit is made available for iformatioal purposes oly i support of the isurace relatioship betwee FM Global ad its cliets. This iformatio does ot chage or supplemet policy
More informationNational Institute on Aging. What Is A Nursing Home?
Natioal Istitute o Agig AgePage Nursig Homes: Makig The Right Choice Lucille has lived i her home for 33 years. Eve after her husbad died 3 years ago, she was able to maage o her ow. Recetly, she broke
More informationLocation, Location, Location! Modeling Data Proximity in the Cloud
Locatio, Locatio, Locatio! Modelig Data Proximity i the Cloud Birjodh Tiwaa tiwaa@eecs.umich.edu Uiversity of Michiga rbor, MI Hitesh Ballai hiballa@microsoft.com Microsoft Research Cambridge, UK Mahesh
More informationThe Fundamental Capacity-Delay Tradeoff in Large Mobile Ad Hoc Networks
The Fudametal Capacity-Delay Tradeoff i Large Mobile Ad Hoc Networks Xiaoju Li ad Ness B. Shroff School of Electrical ad Computer Egieerig, Purdue Uiversity West Lafayette, IN 47907, U.S.A. {lix, shroff}@ec.purdue.edu
More informationProtocols. Packets. What's in an IP packet
Protocols Precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet Protocol (bottom level) all packets shipped from network to network as IP packets
More informationOverview of TCP/IP. TCP/IP and Internet
Overview of TCP/IP System Administrators and network administrators Why networking - communication Why TCP/IP Provides interoperable communications between all types of hardware and all kinds of operating
More informationCREATIVE MARKETING PROJECT 2016
CREATIVE MARKETING PROJECT 2016 The Creative Marketig Project is a chapter project that develops i chapter members a aalytical ad creative approach to the marketig process, actively egages chapter members
More informationUnderstanding Active Directory Services
06_IsideWi_ch06 12/3/03 1:59 PM Page 281 6 Uderstadig Active Directory Services C LASSIC NT HAS MANY ECCENTRICITIES big ad small that limit its scalability ad fuctioality. May of these eccetricities stem
More informationOpenText RightFax Fax Server
OpeText RightFax Fax Server Icrease employee productivity, improve iformatio goverace, ad reduce costs by itegratig fax ito eterprise-wide busiess applicatios. Compaies eed a cetralized fax ifrastructure
More informationRepeating Decimals are decimal numbers that have number(s) after the decimal point that repeat in a pattern.
5.5 Fractios ad Decimals Steps for Chagig a Fractio to a Decimal. Simplify the fractio, if possible. 2. Divide the umerator by the deomiator. d d Repeatig Decimals Repeatig Decimals are decimal umbers
More informationComputer Networks CS321
Computer Networks CS321 Dr. Ramana I.I.T Jodhpur Dr. Ramana ( I.I.T Jodhpur ) Computer Networks CS321 1 / 22 Outline of the Lectures 1 Introduction OSI Reference Model Internet Protocol Performance Metrics
More informationExtending Your Management Reach to Remote Users
Extedig Your Maagemet Reach to Remote Users White Paper LANDESK WHITE PAPER : Extedig Your Maagemet Reach to Remote Users Table of Cotets Executive Summary... 3 Obstacles to Cost-Effective Remote Maagemet...
More informationDocument Control Solutions
Documet Cotrol Solutios State of the art software The beefits of Assai Assai Software Services provides leadig edge Documet Cotrol ad Maagemet System software for oil ad gas, egieerig ad costructio. AssaiDCMS
More informationSFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005. Lecturer: Kartik Krishnan Lecture 1-3
SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005 Lecturer: Kartik Krishnan Lecture 1-3 Communications and Computer Networks The fundamental purpose of a communication network is the exchange
More informationMultiplexers and Demultiplexers
I this lesso, you will lear about: Multiplexers ad Demultiplexers 1. Multiplexers 2. Combiatioal circuit implemetatio with multiplexers 3. Demultiplexers 4. Some examples Multiplexer A Multiplexer (see
More informationORBCOMM - SYSTEM STATUS, EVOLUTION AND APPLICATIONS. Workshop Satellitenkommunikation in Deutschland DLR / Köln-Porz 27. - 28.
ORBCOMM - System Status, Evolutio ad Applicatios 1 ORBCOMM - SYSTEM STATUS, EVOLUTION AND APPLICATIONS M. Kassebom B. Peé C. Tobeh I. Kalis E. Pütz J.J. Stolte R.L. Burdett OHB-System AG Uiversitätsallee
More informationOn the Capacity of Hybrid Wireless Networks
O the Capacity of Hybrid ireless Networks Beyua Liu,ZheLiu +,DoTowsley Departmet of Computer Sciece Uiversity of Massachusetts Amherst, MA 0002 + IBM T.J. atso Research Ceter P.O. Box 704 Yorktow Heights,
More informationTransport and Network Layer
Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a
More informationIncremental calculation of weighted mean and variance
Icremetal calculatio of weighted mea ad variace Toy Fich faf@cam.ac.uk dot@dotat.at Uiversity of Cambridge Computig Service February 009 Abstract I these otes I eplai how to derive formulae for umerically
More informationChapter 6: Variance, the law of large numbers and the Monte-Carlo method
Chapter 6: Variace, the law of large umbers ad the Mote-Carlo method Expected value, variace, ad Chebyshev iequality. If X is a radom variable recall that the expected value of X, E[X] is the average value
More information5: Introduction to Estimation
5: Itroductio to Estimatio Cotets Acroyms ad symbols... 1 Statistical iferece... Estimatig µ with cofidece... 3 Samplig distributio of the mea... 3 Cofidece Iterval for μ whe σ is kow before had... 4 Sample
More informationRadio Dispatch Systems
Radio Dispatch Systems ZETRON DISPATCH SOLUTIONS: AT THE CENTER OF YOUR CRITICAL OPERATIONS Your dispatch system is the ceterpoit through which your key operatios are coordiated ad cotrolled. That s why
More informationCCH Accountants Starter Pack
CCH Accoutats Starter Pack We may be a bit smaller, but fudametally we re o differet to ay other accoutig practice. Util ow, smaller firms have faced a stark choice: Buy cheaply, kowig that the practice
More informationMANUFACTURING. Link your products directly to your ERP system in real-time
MANUFACTURING Lik your products directly to your ERP system i real-time Exted ERP Exted ERP is a complete mobile solutio extedig your ERP system by brigig warehouse processes to the users o the floor
More informationThe Modern Malware Review. Analysis of New and Evasive Malware in Live Enterprise Networks 1st Edition, March 2013
The Moder Malware Review Aalysis of New ad Evasive Malware i Live Eterprise Networks 1st Editio, March 2013 THE MODERN MALWARE REVIEW MARCH 2013 TABLE OF CONTENTS Backgroud ad Goals 3 A Focus o Actioable
More informationProject Deliverables. CS 361, Lecture 28. Outline. Project Deliverables. Administrative. Project Comments
Project Deliverables CS 361, Lecture 28 Jared Saia Uiversity of New Mexico Each Group should tur i oe group project cosistig of: About 6-12 pages of text (ca be loger with appedix) 6-12 figures (please
More informationSECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES
SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES Read Sectio 1.5 (pages 5 9) Overview I Sectio 1.5 we lear to work with summatio otatio ad formulas. We will also itroduce a brief overview of sequeces,
More informationPENSION ANNUITY. Policy Conditions Document reference: PPAS1(7) This is an important document. Please keep it in a safe place.
PENSION ANNUITY Policy Coditios Documet referece: PPAS1(7) This is a importat documet. Please keep it i a safe place. Pesio Auity Policy Coditios Welcome to LV=, ad thak you for choosig our Pesio Auity.
More informationCHAPTER 3 DIGITAL CODING OF SIGNALS
CHAPTER 3 DIGITAL CODING OF SIGNALS Computers are ofte used to automate the recordig of measuremets. The trasducers ad sigal coditioig circuits produce a voltage sigal that is proportioal to a quatity
More information