Architectures de communication

Size: px
Start display at page:

Download "Architectures de communication"

Transcription

1 Architectures de commuicatio C. Pham RESO-LIP/INRIA Uiversité Lyo 1, basé sur les supports de Keshav, du livre: A Egieerig Approach to Computer Networkig et les supports de l UREC

2 Ce que ous allos voir Pourquoi avos ous besoi de défiir ue architecture de commuicatio? Quelle architecture? Les avatages et les icovéiets de ces architectures. Cours de C. Pham, Uiv. Lyo 1

3 Example Exchage a file over a etwork that corrupts packets but does t lose or reorder them A simple protocol sed file as a series of packets sed a checksum receiver seds OK or ot-ok message seder waits for OK message if o respose, reseds etire file Problems sigle bit corruptio requires retrasmissio of etire file what if lik goes dow? what if ot-ok message itself is corrupted? Cours de C. Pham, Uiv. Lyo 1

4 Défiir ue architecture de commuicatio Peut-o défiir ue architecture qui soit: Modulaire? Flexible? Performate? Portable? Même problématique que lorsque l o écrit u programme O cherche à idetifier les procédures de base (gééricité, modularité ) O découpe le programme e esemble foctioel, chaque esemble pouvat être iter-chageable. O va doc idetifier les services de base d u réseau et ce que doit fourir ue architecture de commuicatio Cours de C. Pham, Uiv. Lyo 1

5 Les services de base A vous de jouer! Cours de C. Pham, Uiv. Lyo 1

6 Protocols Key poit i etworkig: tells how to behave ad commuicate to be uderstood Sytax of a message what fields does it cotai? i what format? Sematics of a message what does a message mea? for example, ot-ok message meas receiver got a corrupted file Actios to take o receipt of a message for example, o receivig ot-ok message, retrasmit the etire file Cours de C. Pham, Uiv. Lyo 1

7 Aother way to view a protocol As providig a service The example protocol provides reliable file trasfer service Peer etities use a protocol to provide a service to a higher-level peer etity for example, postal workers use a protocol to preset customers with the abstractio of a ureliable letter trasfer service Cours de C. Pham, Uiv. Lyo 1

8 Protocol layerig A etwork that provides may services eeds may protocols Turs out that some services are idepedet But others deped o each other Protocol A may use protocol B as a step i its executio for example, packet trasfer is oe step i the executio of the example reliable file trasfer protocol This form of depedecy is called layerig reliable file trasfer is layered above packet trasfer protocol like a subroutie Cours de C. Pham, Uiv. Lyo 1

9 Protocol stack A set of protocol layers Each layer uses the layer below ad provides a service to the layer above Key idea oce we defie a service provided by a layer, we eed kow othig more about the details of how the layer actually implemets the service iformatio hidig decouples chages Cours de C. Pham, Uiv. Lyo 1

10 Some termiology Service access poit (SAP) iterface betwee a upper layer ad a lower layer Protocol data uits (PDUs) packets exchaged betwee peer etities Service data uits (SDUs) packets haded to a layer by a upper layer PDU = SDU + optioal header or trailer Example letter trasfer service protocol data uit betwee customers = letter service data uit for postal service = letter protocol data uit = mailbag (aggregatio of letters) (what is the SDU header?) Cours de C. Pham, Uiv. Lyo 1

11 SAP, SDU, PDU... Cours de C. Pham, Uiv. Lyo 1

12 The importace of beig layered Breaks up a complex problem ito smaller maageable pieces ca compose simple service to provide complex oes for example, WWW (HTTP) is Java layered over TCP over IP (ad uses DNS, ARP, DHCP, RIP, OSPF, BGP, PPP, ICMP) Abstractio of implemetatio details separatio of implemetatio ad specificatio ca chage implemetatio as log as service iterface is maitaied Ca reuse fuctioality upper layers ca share lower layer fuctioality example: WiSock o Microsoft Widows Cours de C. Pham, Uiv. Lyo 1

13 Layerig There is a tesio betwee iformatio-hidig (abstractio) ad achievig good performace Art of protocol desig is to leak eough iformatio to allow good performace but ot so much that small chages i oe layer eed chages to other layers Cours de C. Pham, Uiv. Lyo 1

14 ISO OSI referece model A set of protocols is ope if protocol details are publicly available chages are maaged by a orgaizatio whose membership ad trasactios are ope to the public A system that implemets ope protocols is called a ope system Iteratioal Orgaizatio for Stadards (ISO) prescribes a stadard to coect ope systems ope system itercoect (OSI) Has greatly iflueced thikig o protocol stacks Cours de C. Pham, Uiv. Lyo 1

15 ISO OSI Referece model formally defies what is meat by a layer, a service etc. Service architecture describes the services provided by each layer ad the service access poit Protocol architecture set of protocols that implemet the service architecture compliat service architectures may still use o-compliat protocol architectures Cours de C. Pham, Uiv. Lyo 1

16 Le modèle OSI Cours de C. Pham, Uiv. Lyo 1

17 La couche physique Moves bits betwee physically coected edsystems Stadard prescribes codig scheme to represet a bit shapes ad sizes of coectors bit-level sychroizatio Postal etwork techology for movig letters from oe poit to aother (trais, plaes, vas, bicycles, ships ) Iteret techology to move bits o a wire, wireless lik, satellite chael etc. Cours de C. Pham, Uiv. Lyo 1

18 La couche Liaiso Itroduit la otio de trame Esemble de bits faisat partie d ue iformatio a faire passer Ex: u From - Thu Ju 6 16:04: Retur-Path: <saissa@bat710.uiv-lyo1.fr> Received: from pluvier (pluvier.es-lyo.fr [ ]) by oceaite.es-lyo.fr (Postfix) with SMTP id 32AC for <Cogduc.Pham@es-lyo.fr>; Thu, 6 Ju :55: (CEST) Received: from bat710.uiv-lyo1.fr ([ ] idet=root) by pluvier with smtp (Exim 3.35 #1 (Debia)) id 17Fxjb-0002sg-00 for <Cogduc.Pham@es-lyo.fr>; Thu, 06 Ju :55: Received: from b710paa (b710paa.uiv-lyo1.fr [ ]) by bat710.uiv-lyo1.fr (8.9.3/8.9.3/Debia ) with SMTP id PAA17174 for <Cogduc.Pham@es-lyo.fr>; Thu, 6 Ju :55: X-Autheticatio-Warig: bat710.uiv-lyo1.fr: Host b710paa.uiv-lyo1.fr [ ] claimed to be b710paa Message-Id: < f670@bat710.uiv-lyo1.fr> X-Seder: saissa@bat710.uiv-lyo1.fr X-Mailer: Widows Eudora Pro Versio (32) [F] Date: Thu, 06 Ju :05: To: Cogduc.Pham@es-lyo.fr From: Saida AISSA <saissa@bat710.uiv-lyo1.fr> Subject: hello Mime-Versio: 1.0 Cotet-Type: text/plai; charset="iso " Cotet-Trasfer-Ecodig: quoted-pritable X-Mozilla-Status: 8001 X-Mozilla-Status2: X-UIDL: oceaite,S=1958 Cours de C. Pham, Uiv. Lyo 1

19 La couche Liaiso (co( co t) Idle markers tell us that a lik is ot carryig a frame Begi ad ed markers delimit a frame O a broadcast lik (such as Etheret) ed-system must receive oly bits meat for it eed datalik-layer address also eed to decide who gets to speak ext these fuctios are provided by Medium Access sublayer (MAC) Some data liks also retrasmit corrupted packets ad pace the rate at which frames are placed o a lik part of logical lik cotrol sublayer layered over MAC sublayer Cours de C. Pham, Uiv. Lyo 1

20 La couche Liaiso (co( co t.) Datalik layer protocols are the first layer of software Very depedet o uderlyig physical lik propeties Usually budle both physical ad datalik layer o host adaptor card example: Etheret Postal service mail bag frames letters Iteret a variety of datalik layer protocols most commo is Etheret others are FDDI, SONET, HDLC Cours de C. Pham, Uiv. Lyo 1

21 Network layer Logically cocateates a set of liks to form the abstractio of a ed-to-ed lik Allows a ed-system to commuicate with ay other ed-system by computig a route betwee them Hides idiosycrasies of datalik layer Provides uique etwork-wide addresses Foud both i ed-systems ad i itermediate systems At ed-systems primarily hides details of datalik layer segmetatio ad reassembly error detectio Cours de C. Pham, Uiv. Lyo 1

22 Network layer (cotd.) At itermediate systems participates i routig protocol to create routig tables resposigle for forwardig packets schedulig the trasmissio order of packets choosig which packets to drop Cours de C. Pham, Uiv. Lyo 1

23 Two types of etwork layers I datagram etworks provides both routig ad data forwardig I coectio-orieted etwork we distiguish betwee data plae ad cotrol plae data plae oly forwards ad schedules data (touches every byte) cotrol plae resposible for routig, call-establishmet, callteardow (does t touch data bytes) Cours de C. Pham, Uiv. Lyo 1

24 Network layer Postal etwork set up iteral routig tables forward letters from source to destiatio static routig multiple qualities of service Iteret etwork layer is provided by Iteret Protocol foud i all ed-systems ad itermediate systems provides abstractio of ed-to-ed lik segmetatio ad reassembly packet-forwardig, routig, schedulig uique IP addresses ca be layered over aythig, but oly best-effort service Cours de C. Pham, Uiv. Lyo 1

25 Couche OSI pour l itercoexio Cours de C. Pham, Uiv. Lyo 1

26 Trasport layer Network provides a raw ed-to-ed service Trasport layer creates the abstractio of a errorcotrolled, flow-cotrolled ad multiplexed ed-toed lik Error cotrol message will reach destiatio despite packet loss, corruptio ad duplicatio retrasmit lost packets; detect, discard, ad retrasmit corrupted packets; detect ad discard duplicated packets Flow cotrol match trasmissio rat to rate curretly sustaiable o the path to destiatio, ad at the destiatio itself Cours de C. Pham, Uiv. Lyo 1

27 Trasport layer (cotd.) Multiplexes multiple applicatios to the same ed-toed coectio adds a applicatio-specific idetifier (port umber) so that receivig ed-system ca had i icomig packet to the correct applicatio Some trasport layers provide fewer services e.g. simple error detectio, o flow cotrol, ad o retrasmissio lightweight trasport layer Cours de C. Pham, Uiv. Lyo 1

28 Trasport layer (cotd.) Postal system does t have a trasport layer implemeted, if at all, by customers detect lost letters (how?) ad retrasmit them Iteret two popular protocols are TCP ad UDP TCP provides error cotrol, flow cotrol, multiplexig UDP provides oly multiplexig Cours de C. Pham, Uiv. Lyo 1

29 Sessio layer Not commo Provides full-duplex service, expedited data delivery, ad sessio sychroizatio Duplex if trasport layer is simplex, cocateates two trasport edpoits togeter Expedited data delivery allows some messages to skip ahead i ed-system queues, by usig a separate low-delay trasport layer edpoit Sychroizatio allows users to place marks i data stream ad to roll back to a prespecified mark Cours de C. Pham, Uiv. Lyo 1

30 Example Postal etwork suppose a compay has separate shippig ad receivig clerks chief clerk ca maage both to provide abstractio of a duplex service chief clerk may also sed some messages usig a courier (expedited service) chief clerk ca arrage to have a set of messages either delivered all at oce, or ot at all Iteret does t have a stadard sessio layer Cours de C. Pham, Uiv. Lyo 1

31 Presetatio layer Ulike other layers which deal with headers presetatio layer touches the applicatio data Hides data represetatio differeces betwee applicatios e.g. edia-ess Ca also ecrypt data Usually ad hoc Postal etwork traslator traslates cotets before givig it to chief clerk Iteret o stadard presetatio layer oly defies etwork byte order for 2- ad 4-byte itegers Cours de C. Pham, Uiv. Lyo 1

32 Applicatio layer The set of applicatios that use the etwork Does t provide services to ay other layer Postal etwork the perso who uses the postal system suppose maager wats to sed a set of recall letters traslator traslates letters goig abroad chief clerk seds some priority mail, ad some by regular mail mail clerk seds a message, retrasmits if ot acked postal system computes a route ad forwards the letters datalik layer: letters carried by plaes, trais, automobiles physical layer: the letter itself Cours de C. Pham, Uiv. Lyo 1

33 Les primitives de services das OSI X peut être 'importe quelle primitives de services d'ue couche doée. Ex: T_CONNECT.request, N_DATA.idicatio Cours de C. Pham, Uiv. Lyo 1

34 Layerig We have broke a complex problem ito smaller, simpler pieces Provides the applicatio with sophisticated services Each layer provides a clea abstractio to the layer above Cours de C. Pham, Uiv. Lyo 1

35 Why seve layers? Need a top ad a bottom -- 2 Need to hide physical lik, so eed datalik -- 3 Need both ed-to-ed ad hop-by-hop actios; so eed at least the etwork ad trasport layers -- 5 Sessio ad presetatio layers are ot so importat, ad are ofte igored So, we eed at least 5, ad 7 seems to be excessive Note that we ca place fuctios i differet layers Cours de C. Pham, Uiv. Lyo 1

36 Le modèle TCP/IP par rapport à OSI Cours de C. Pham, Uiv. Lyo 1

37 Problems with layerig Layerig hides iformatio if it did t the chages to oe layer could require chages everywhere layerig violatio But sometimes hidde iformatio ca be used to improve performace for example, flow cotrol protocol may thik packet loss is always because of etwork cogestio if it is, istead, due to a lossy lik, the flow cotrol breaks this is because we hid iformatio about reaso of packet loss from flow cotrol protocol Cours de C. Pham, Uiv. Lyo 1

38 La ormalisatio 2 orgaismes de ormalisatio pour les réseaux L'ISO (Iteratioal Stadardizatio Orgaizatio) UIT-T (Uio Iteratioale des Télécommuicatio) ex CCITT L'ISO est dépedat de l'onu, les représetats atioaux sot les orgaismes atioaux de ormalisatio ANSI (USA) AFNOR (Frace) DIN (Allemage) BSI (Royaume Ui) HSC (Japo) L'UIT-T compred des idustriels et des opérateurs de télécommuicatio Cours de C. Pham, Uiv. Lyo 1

Domain 1 - Describe Cisco VoIP Implementations

Domain 1 - Describe Cisco VoIP Implementations Maual ONT (642-8) 1-800-418-6789 Domai 1 - Describe Cisco VoIP Implemetatios Advatages of VoIP Over Traditioal Switches Voice over IP etworks have may advatages over traditioal circuit switched voice etworks.

More information

Security Functions and Purposes of Network Devices and Technologies (SY0-301) 1-800-418-6789. Firewalls. Audiobooks

Security Functions and Purposes of Network Devices and Technologies (SY0-301) 1-800-418-6789. Firewalls. Audiobooks Maual Security+ Domai 1 Network Security Every etwork is uique, ad architecturally defied physically by its equipmet ad coectios, ad logically through the applicatios, services, ad idustries it serves.

More information

Domain 1 Components of the Cisco Unified Communications Architecture

Domain 1 Components of the Cisco Unified Communications Architecture Maual CCNA Domai 1 Compoets of the Cisco Uified Commuicatios Architecture Uified Commuicatios (UC) Eviromet Cisco has itroduced what they call the Uified Commuicatios Eviromet which is used to separate

More information

Two-Phased Mapping & Identifier/Locator Network Protocol (ILNP) Youn-Hee Han, Hyon-Young Choi

Two-Phased Mapping & Identifier/Locator Network Protocol (ILNP) Youn-Hee Han, Hyon-Young Choi Two-Phased Mappig & Idetifier/Locator Network Protocol (ILNP) You-Hee Ha, Hyo-Youg Choi Two-Phased Mappig Prefix:ETR à Prefix:AS# (Phase I) ad AS#:ETRs (Phase II) Phase II mappig iformatio ca be distributed

More information

Your organization has a Class B IP address of 166.144.0.0 Before you implement subnetting, the Network ID and Host ID are divided as follows:

Your organization has a Class B IP address of 166.144.0.0 Before you implement subnetting, the Network ID and Host ID are divided as follows: Subettig Subettig is used to subdivide a sigle class of etwork i to multiple smaller etworks. Example: Your orgaizatio has a Class B IP address of 166.144.0.0 Before you implemet subettig, the Network

More information

Management of Wireless Sensor Networks using TCP/IP

Management of Wireless Sensor Networks using TCP/IP Maagemet of Wireless Sesor etworks usig TCP/IP Markus Awader, Gerald Wagekecht, ad Torste Brau Istitute of Computer Sciece ad Applied Mathematics Uiversity of Ber, Switzerlad Email: {awader, wage, brau}@iam.uibe.ch

More information

June 3, 1999. Voice over IP

June 3, 1999. Voice over IP Jue 3, 1999 Voice over IP This applicatio ote discusses the Hypercom solutio for providig ed-to-ed Iteret protocol (IP) coectivity i a ew or existig Hypercom Hybrid Trasport Mechaism (HTM) etwork, reducig

More information

Data Center Ethernet Facilitation of Enterprise Clustering. David Flynn, Linux Networx Orlando, Florida March 16, 2004

Data Center Ethernet Facilitation of Enterprise Clustering. David Flynn, Linux Networx Orlando, Florida March 16, 2004 Data Ceter Etheret Facilitatio of Eterprise Clusterig David Fly, Liux Networx Orlado, Florida March 16, 2004 1 2 Liux Networx builds COTS based clusters 3 Clusters Offer Improved Performace Scalability

More information

Authentication - Access Control Default Security Active Directory Trusted Authentication Guest User or Anonymous (un-authenticated) Logging Out

Authentication - Access Control Default Security Active Directory Trusted Authentication Guest User or Anonymous (un-authenticated) Logging Out FME Server Security Table of Cotets FME Server Autheticatio - Access Cotrol Default Security Active Directory Trusted Autheticatio Guest User or Aoymous (u-autheticated) Loggig Out Authorizatio - Roles

More information

E-Plex Enterprise Access Control System

E-Plex Enterprise Access Control System Eterprise Access Cotrol System Egieered for Flexibility Modular Solutio The Eterprise Access Cotrol System is a modular solutio for maagig access poits. Employig a variety of hardware optios, system maagemet

More information

iprox sensors iprox inductive sensors iprox programming tools ProxView programming software iprox the world s most versatile proximity sensor

iprox sensors iprox inductive sensors iprox programming tools ProxView programming software iprox the world s most versatile proximity sensor iprox sesors iprox iductive sesors iprox programmig tools ProxView programmig software iprox the world s most versatile proximity sesor The world s most versatile proximity sesor Eato s iproxe is syoymous

More information

BaanERP 5.0c. EDI User Guide

BaanERP 5.0c. EDI User Guide BaaERP 5.0c A publicatio of: Baa Developmet B.V. P.O.Box 143 3770 AC Bareveld The Netherlads Prited i the Netherlads Baa Developmet B.V. 1999. All rights reserved. The iformatio i this documet is subject

More information

! encor e networks TM

! encor e networks TM ! ecor e etworks TM Copyright 2003 Ecore Networks, Ic. All rights reserved. SigalPath 201 (SP201 ) Istallatio Guide Versio C, July 2004 Part Number 15469.1000 SigalPath Software Versio 1100 This Istallatio

More information

Verizon Wireless Broadband Network Connectivity and Data Transport Solutions. Verizon Wireless White Paper

Verizon Wireless Broadband Network Connectivity and Data Transport Solutions. Verizon Wireless White Paper Verizo Wireless Broadbad Network Coectivity ad Data Trasport Solutios Verizo Wireless White Paper Cotets 1. Itroductio......................................................................................

More information

Characterizing End-to-End Packet Delay and Loss in the Internet

Characterizing End-to-End Packet Delay and Loss in the Internet Characterizig Ed-to-Ed Packet Delay ad Loss i the Iteret Jea-Chrysostome Bolot Xiyu Sog Preseted by Swaroop Sigh Layout Itroductio Data Collectio Data Aalysis Strategy Aalysis of packet delay Aalysis of

More information

ODBC. Getting Started With Sage Timberline Office ODBC

ODBC. Getting Started With Sage Timberline Office ODBC ODBC Gettig Started With Sage Timberlie Office ODBC NOTICE This documet ad the Sage Timberlie Office software may be used oly i accordace with the accompayig Sage Timberlie Office Ed User Licese Agreemet.

More information

Message Exchange in the Utility Market Using SAP for Utilities. Point of View by Marc Metz and Maarten Vriesema

Message Exchange in the Utility Market Using SAP for Utilities. Point of View by Marc Metz and Maarten Vriesema Eergy, Utilities ad Chemicals the way we see it Message Exchage i the Utility Market Usig SAP for Utilities Poit of View by Marc Metz ad Maarte Vriesema Itroductio Liberalisatio of utility markets has

More information

BaanERP. BaanERP Windows Client Installation Guide

BaanERP. BaanERP Windows Client Installation Guide BaaERP A publicatio of: Baa Developmet B.V. P.O.Box 143 3770 AC Bareveld The Netherlads Prited i the Netherlads Baa Developmet B.V. 1999. All rights reserved. The iformatio i this documet is subject to

More information

Protection of Communication Infrastructures

Protection of Communication Infrastructures Protectio of Commuicatio Ifrastructures Chapter 6 Iteret Firewalls 1 Itroductio to Network Firewalls (1) I buildig costructio, a firewall is desiged to keep a fire from spreadig from oe part of the buildig

More information

(VCP-310) 1-800-418-6789

(VCP-310) 1-800-418-6789 Maual VMware Lesso 1: Uderstadig the VMware Product Lie I this lesso, you will first lear what virtualizatio is. Next, you ll explore the products offered by VMware that provide virtualizatio services.

More information

Domain 1: Configuring Domain Name System (DNS) for Active Directory

Domain 1: Configuring Domain Name System (DNS) for Active Directory Maual Widows Domai 1: Cofigurig Domai Name System (DNS) for Active Directory Cofigure zoes I Domai Name System (DNS), a DNS amespace ca be divided ito zoes. The zoes store ame iformatio about oe or more

More information

Baan Service Master Data Management

Baan Service Master Data Management Baa Service Master Data Maagemet Module Procedure UP069A US Documetiformatio Documet Documet code : UP069A US Documet group : User Documetatio Documet title : Master Data Maagemet Applicatio/Package :

More information

Configuring Additional Active Directory Server Roles

Configuring Additional Active Directory Server Roles Maual Upgradig your MCSE o Server 2003 to Server 2008 (70-649) 1-800-418-6789 Cofigurig Additioal Active Directory Server Roles Active Directory Lightweight Directory Services Backgroud ad Cofiguratio

More information

InventoryControl. The Complete Inventory Tracking Solution for Small Businesses

InventoryControl. The Complete Inventory Tracking Solution for Small Businesses IvetoryCotrol The Complete Ivetory Trackig Solutio for Small Busiesses Regular Logo 4C Productivity Solutios for Small Busiesses Logo Outlie Get i cotrol of your ivetory with Wasp Ivetory Cotrol the complete

More information

SYSTEM INFO. MDK - Multifunctional Digital Communications System. Efficient Solutions for Information and Safety

SYSTEM INFO. MDK - Multifunctional Digital Communications System. Efficient Solutions for Information and Safety Commuicatios Systems for Itercom, PA, Emergecy Call ad Telecommuicatios MDK - Multifuctioal Digital Commuicatios System SYSTEM INFO ms NEUMANN ELEKTRONIK GmbH Efficiet Solutios for Iformatio ad Safety

More information

Engineering Data Management

Engineering Data Management BaaERP 5.0c Maufacturig Egieerig Data Maagemet Module Procedure UP128A US Documetiformatio Documet Documet code : UP128A US Documet group : User Documetatio Documet title : Egieerig Data Maagemet Applicatio/Package

More information

Bio-Plex Manager Software

Bio-Plex Manager Software Multiplex Suspesio Array Bio-Plex Maager Software Extract Kowledge Faster Move Your Research Forward Bio-Rad cotiues to iovate where it matters most. With Bio-Plex Maager 5.0 software, we offer valuable

More information

Domain 1: Designing a SQL Server Instance and a Database Solution

Domain 1: Designing a SQL Server Instance and a Database Solution Maual SQL Server 2008 Desig, Optimize ad Maitai (70-450) 1-800-418-6789 Domai 1: Desigig a SQL Server Istace ad a Database Solutio Desigig for CPU, Memory ad Storage Capacity Requiremets Whe desigig a

More information

Verizon Wireless Private Network

Verizon Wireless Private Network Verizo Wireless Private Network Cotets 1. Itroductio...................................................................................... 3 1.1 Audiece....................................................................................

More information

Unicenter TCPaccess FTP Server

Unicenter TCPaccess FTP Server Uiceter TCPaccess FTP Server Release Summary r6.1 SP2 K02213-2E This documetatio ad related computer software program (hereiafter referred to as the Documetatio ) is for the ed user s iformatioal purposes

More information

The OSI and TCP/IP Models. Lesson 2

The OSI and TCP/IP Models. Lesson 2 The OSI and TCP/IP Models Lesson 2 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Introduction to the OSI Model Compare the layers of the OSI and TCP/IP

More information

In nite Sequences. Dr. Philippe B. Laval Kennesaw State University. October 9, 2008

In nite Sequences. Dr. Philippe B. Laval Kennesaw State University. October 9, 2008 I ite Sequeces Dr. Philippe B. Laval Keesaw State Uiversity October 9, 2008 Abstract This had out is a itroductio to i ite sequeces. mai de itios ad presets some elemetary results. It gives the I ite Sequeces

More information

Telecom. White Paper. Actionable Intelligence in the SDN Ecosystem: Optimizing Network Traffic through FRSA

Telecom. White Paper. Actionable Intelligence in the SDN Ecosystem: Optimizing Network Traffic through FRSA Telecom White Paper Actioable Itelligece i the SDN Ecosystem: Optimizig Network Traffic through FRSA About the Authors Sumit Kapoor Sumit is a solutio architect i the telecom busiess uit at Tata Cosultacy

More information

Communication Networks. MAP-TELE 2011/12 José Ruela

Communication Networks. MAP-TELE 2011/12 José Ruela Communication Networks MAP-TELE 2011/12 José Ruela Network basic mechanisms Network Architectures Protocol Layering Network architecture concept A network architecture is an abstract model used to describe

More information

Network Models OSI vs. TCP/IP

Network Models OSI vs. TCP/IP Network Models OSI vs. TCP/IP Network Models Using a formal model allows us to deal with various aspects of Networks abstractly. We will look at two popular models OSI reference model TCP/IP model Both

More information

Pre-Installation Network Planning Forms--S8700 Media Server

Pre-Installation Network Planning Forms--S8700 Media Server Pre-Istallatio Network Plaig Forms--S8700 Media Server S8700 Media Server with a Avaya G600 Media Gateways S8700 Media Server with Avaya MCC1/SCC1 Gateways Before you istall ad cofigure a Avaya media server,

More information

Desktop Management. Desktop Management Tools

Desktop Management. Desktop Management Tools Desktop Maagemet 9 Desktop Maagemet Tools Mac OS X icludes three desktop maagemet tools that you might fid helpful to work more efficietly ad productively: u Stacks puts expadable folders i the Dock. Clickig

More information

Protocol Architecture

Protocol Architecture Protocol Architecture ed Protocol Architectures OSI Reference Model TCP/IP Protocol Stack Need for Protocols The task of exchanging information between devices requires a high degree of cooperation between

More information

CS100: Introduction to Computer Science

CS100: Introduction to Computer Science Review: History of Computers CS100: Itroductio to Computer Sciece Maiframes Miicomputers Lecture 2: Data Storage -- Bits, their storage ad mai memory Persoal Computers & Workstatios Review: The Role of

More information

Lesson 17 Pearson s Correlation Coefficient

Lesson 17 Pearson s Correlation Coefficient Outlie Measures of Relatioships Pearso s Correlatio Coefficiet (r) -types of data -scatter plots -measure of directio -measure of stregth Computatio -covariatio of X ad Y -uique variatio i X ad Y -measurig

More information

PUBLIC RELATIONS PROJECT 2016

PUBLIC RELATIONS PROJECT 2016 PUBLIC RELATIONS PROJECT 2016 The purpose of the Public Relatios Project is to provide a opportuity for the chapter members to demostrate the kowledge ad skills eeded i plaig, orgaizig, implemetig ad evaluatig

More information

STUDENTS PARTICIPATION IN ONLINE LEARNING IN BUSINESS COURSES AT UNIVERSITAS TERBUKA, INDONESIA. Maya Maria, Universitas Terbuka, Indonesia

STUDENTS PARTICIPATION IN ONLINE LEARNING IN BUSINESS COURSES AT UNIVERSITAS TERBUKA, INDONESIA. Maya Maria, Universitas Terbuka, Indonesia STUDENTS PARTICIPATION IN ONLINE LEARNING IN BUSINESS COURSES AT UNIVERSITAS TERBUKA, INDONESIA Maya Maria, Uiversitas Terbuka, Idoesia Co-author: Amiuddi Zuhairi, Uiversitas Terbuka, Idoesia Kuria Edah

More information

Systems Design Project: Indoor Location of Wireless Devices

Systems Design Project: Indoor Location of Wireless Devices Systems Desig Project: Idoor Locatio of Wireless Devices Prepared By: Bria Murphy Seior Systems Sciece ad Egieerig Washigto Uiversity i St. Louis Phoe: (805) 698-5295 Email: bcm1@cec.wustl.edu Supervised

More information

How To Design A Layered Network In A Computer Network

How To Design A Layered Network In A Computer Network A Layered Approach to Computer Networks Physical Layer Data Link Layer Network Layer Transport Layer Session Layer Presentation Layer Application Layer Different layer of abstraction Different error control

More information

Professional Networking

Professional Networking Professioal Networkig 1. Lear from people who ve bee where you are. Oe of your best resources for etworkig is alumi from your school. They ve take the classes you have take, they have bee o the job market

More information

Communications and Computer Networks

Communications and Computer Networks SFWR 4C03: Computer Networks and Computer Security January 5-8 2004 Lecturer: Kartik Krishnan Lectures 1-3 Communications and Computer Networks The fundamental purpose of a communication system is the

More information

IT Support. 020 8269 6878 n www.premierchoiceinternet.com n support@premierchoiceinternet.com. 30 Day FREE Trial. IT Support from 8p/user

IT Support. 020 8269 6878 n www.premierchoiceinternet.com n support@premierchoiceinternet.com. 30 Day FREE Trial. IT Support from 8p/user IT Support IT Support Premier Choice Iteret has bee providig reliable, proactive & affordable IT Support solutios to compaies based i Lodo ad the South East of Eglad sice 2002. Our goal is to provide our

More information

Vladimir N. Burkov, Dmitri A. Novikov MODELS AND METHODS OF MULTIPROJECTS MANAGEMENT

Vladimir N. Burkov, Dmitri A. Novikov MODELS AND METHODS OF MULTIPROJECTS MANAGEMENT Keywords: project maagemet, resource allocatio, etwork plaig Vladimir N Burkov, Dmitri A Novikov MODELS AND METHODS OF MULTIPROJECTS MANAGEMENT The paper deals with the problems of resource allocatio betwee

More information

One Goal. 18-Months. Unlimited Opportunities.

One Goal. 18-Months. Unlimited Opportunities. 18 fast-track 18-Moth BACHELOR S DEGREE completio PROGRAMS Oe Goal. 18-Moths. Ulimited Opportuities. www.ortheaster.edu/cps Fast-Track Your Bachelor s Degree ad Career Goals Complete your bachelor s degree

More information

Chapter 3: Review of Important Networking Concepts. Magda El Zarki Dept. of CS UC Irvine elzarki@uci.edu http://www.ics.uci.

Chapter 3: Review of Important Networking Concepts. Magda El Zarki Dept. of CS UC Irvine elzarki@uci.edu http://www.ics.uci. Chapter 3: Review of Important Networking Concepts Magda El Zarki Dept. of CS UC Irvine elzarki@uci.edu http://www.ics.uci.edu/~magda 1 Networking Concepts Protocol Architecture Protocol Layers Encapsulation

More information

L5352 Ethernet Communications Interface

L5352 Ethernet Communications Interface L5352 Etheret Commuicatios Iterface Techical Maual HA470898 Issue 2 Copyright SSD Drives Ic 2005 All rights strictly reserved. No part of this documet may be stored i a retrieval system, or trasmitted

More information

Networking Test 4 Study Guide

Networking Test 4 Study Guide Networking Test 4 Study Guide True/False Indicate whether the statement is true or false. 1. IPX/SPX is considered the protocol suite of the Internet, and it is the most widely used protocol suite in LANs.

More information

Network-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2

Network-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2 Network-Oriented Software Development Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2 Topics Layering TCP/IP Layering Internet addresses and port numbers Encapsulation

More information

*The most important feature of MRP as compared with ordinary inventory control analysis is its time phasing feature.

*The most important feature of MRP as compared with ordinary inventory control analysis is its time phasing feature. Itegrated Productio ad Ivetory Cotrol System MRP ad MRP II Framework of Maufacturig System Ivetory cotrol, productio schedulig, capacity plaig ad fiacial ad busiess decisios i a productio system are iterrelated.

More information

CPS221 Lecture: Layered Network Architecture

CPS221 Lecture: Layered Network Architecture CPS221 Lecture: Layered Network Architecture Objectives last revised 9/10/12 1. To discuss the OSI layered architecture model 2. To discuss the specific implementation of this model in TCP/IP Materials:

More information

Agenda. Outsourcing and Globalization in Software Development. Outsourcing. Outsourcing here to stay. Outsourcing Alternatives

Agenda. Outsourcing and Globalization in Software Development. Outsourcing. Outsourcing here to stay. Outsourcing Alternatives Outsourcig ad Globalizatio i Software Developmet Jacques Crocker UW CSE Alumi 2003 jc@cs.washigto.edu Ageda Itroductio The Outsourcig Pheomeo Leadig Offshore Projects Maagig Customers Offshore Developmet

More information

How To Understand The Layered Architecture Of A Network

How To Understand The Layered Architecture Of A Network COMPUTER NETWORKS NETWORK ARCHITECTURE AND PROTOCOLS The Need for Standards Computers have different architectures, store data in different formats and communicate at different rates Agreeing on a particular

More information

Equalizer Installation and Administration Guide

Equalizer Installation and Administration Guide Equalizer Istallatio ad Admiistratio Guide Versio 7.2.3 Jauary 2007 Coyote Poit Systems, Ic. 675 North First Street Suite 975 Sa Jose, Califoria 95112 Copyright 1997-2007 Coyote Poit Systems, Ic. All Rights

More information

Confidence Intervals for One Mean

Confidence Intervals for One Mean Chapter 420 Cofidece Itervals for Oe Mea Itroductio This routie calculates the sample size ecessary to achieve a specified distace from the mea to the cofidece limit(s) at a stated cofidece level for a

More information

Z-TEST / Z-STATISTIC: used to test hypotheses about. µ when the population standard deviation is unknown

Z-TEST / Z-STATISTIC: used to test hypotheses about. µ when the population standard deviation is unknown Z-TEST / Z-STATISTIC: used to test hypotheses about µ whe the populatio stadard deviatio is kow ad populatio distributio is ormal or sample size is large T-TEST / T-STATISTIC: used to test hypotheses about

More information

Objectives of Lecture. Network Architecture. Protocols. Contents

Objectives of Lecture. Network Architecture. Protocols. Contents Objectives of Lecture Network Architecture Show how network architecture can be understood using a layered approach. Introduce the OSI seven layer reference model. Introduce the concepts of internetworking

More information

3G Security VoIP Wi-Fi IP Telephony Routing/Switching Unified Communications. NetVanta. Business Networking Solutions

3G Security VoIP Wi-Fi IP Telephony Routing/Switching Unified Communications. NetVanta. Business Networking Solutions 3G Security VoIP Wi-Fi IP Telephoy Routig/Switchig Uified Commuicatios NetVata Busiess Networkig Solutios Opportuity to lower Total Cost of Owership ad improve Retur o Ivestmet The ADTRAN Advatage ADTRAN

More information

THE TCP/IP PROTOCOL SUITE

THE TCP/IP PROTOCOL SUITE CHAPTER 1 Protocols and Layers 25 a truck or plane. It sounds like a very complicated way to deliver one message, but this system makes the overall task of delivering many messages easier, not harder.

More information

8 Interconnection. Networks and Clusters 8

8 Interconnection. Networks and Clusters 8 8 Itercoectio Networks ad Clusters 8 The edium is the essage because it is the medium that shapes ad cotrols the search ad form of huma associatios ad actios. arshall cluha Uderstadig edia (1964) The marvels

More information

SOCIAL MEDIA. Keep the conversations going

SOCIAL MEDIA. Keep the conversations going SOCIAL MEDIA Keep the coversatios goig Social media is where most of the world is. It is therefore a ope source of cosumer data, a chael of commuicatio ad a platform for establishig relatioships with customers.

More information

Determining the sample size

Determining the sample size Determiig the sample size Oe of the most commo questios ay statisticia gets asked is How large a sample size do I eed? Researchers are ofte surprised to fid out that the aswer depeds o a umber of factors

More information

Distributed Queue Dual Bus (DQDB) Metropolitan Area Networks. DQDB - Transmission principle. DQDB - Example MAN

Distributed Queue Dual Bus (DQDB) Metropolitan Area Networks. DQDB - Transmission principle. DQDB - Example MAN Metropolita Area Networks Bridge larger distaces tha a LAN, usage e.g. withi the city rage or o a campus. Oly oe or two cables, o switchig elemets. Thus a simple etwork desig is achieved. All computers

More information

Properties of MLE: consistency, asymptotic normality. Fisher information.

Properties of MLE: consistency, asymptotic normality. Fisher information. Lecture 3 Properties of MLE: cosistecy, asymptotic ormality. Fisher iformatio. I this sectio we will try to uderstad why MLEs are good. Let us recall two facts from probability that we be used ofte throughout

More information

FUEL / VEHICLE TRACKING UNIT GPS tracking and fuel monitoring solution providers

FUEL / VEHICLE TRACKING UNIT GPS tracking and fuel monitoring solution providers FUEL / VEHICLE TRACKING UNIT GPS trackig ad fuel moitorig solutio providers fuel moitorig ow olie.. Fu ckig el Tra ow o lie www.fueltracksidia.com 20 Chael GPS Receiver GSM/GPRS Commuicatio PRODUCT FEATURES

More information

A Network Monitoring System with a Peer-to- Peer Architecture

A Network Monitoring System with a Peer-to- Peer Architecture A Network Moitorig System with a Peer-to- Peer Architecture Paulo Salvador ad Rui Valadas Uiversity of Aveiro Istitute of Telecommuicatios Summary Motivatio Peer-to-peer architecture System elemets Data

More information

Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX

Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX APPENDIX A Introduction Understanding TCP/IP To fully understand the architecture of Cisco Centri Firewall, you need to understand the TCP/IP architecture on which the Internet is based. This appendix

More information

Flood Emergency Response Plan

Flood Emergency Response Plan Flood Emergecy Respose Pla This reprit is made available for iformatioal purposes oly i support of the isurace relatioship betwee FM Global ad its cliets. This iformatio does ot chage or supplemet policy

More information

National Institute on Aging. What Is A Nursing Home?

National Institute on Aging. What Is A Nursing Home? Natioal Istitute o Agig AgePage Nursig Homes: Makig The Right Choice Lucille has lived i her home for 33 years. Eve after her husbad died 3 years ago, she was able to maage o her ow. Recetly, she broke

More information

Location, Location, Location! Modeling Data Proximity in the Cloud

Location, Location, Location! Modeling Data Proximity in the Cloud Locatio, Locatio, Locatio! Modelig Data Proximity i the Cloud Birjodh Tiwaa tiwaa@eecs.umich.edu Uiversity of Michiga rbor, MI Hitesh Ballai hiballa@microsoft.com Microsoft Research Cambridge, UK Mahesh

More information

The Fundamental Capacity-Delay Tradeoff in Large Mobile Ad Hoc Networks

The Fundamental Capacity-Delay Tradeoff in Large Mobile Ad Hoc Networks The Fudametal Capacity-Delay Tradeoff i Large Mobile Ad Hoc Networks Xiaoju Li ad Ness B. Shroff School of Electrical ad Computer Egieerig, Purdue Uiversity West Lafayette, IN 47907, U.S.A. {lix, shroff}@ec.purdue.edu

More information

Protocols. Packets. What's in an IP packet

Protocols. Packets. What's in an IP packet Protocols Precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet Protocol (bottom level) all packets shipped from network to network as IP packets

More information

Overview of TCP/IP. TCP/IP and Internet

Overview of TCP/IP. TCP/IP and Internet Overview of TCP/IP System Administrators and network administrators Why networking - communication Why TCP/IP Provides interoperable communications between all types of hardware and all kinds of operating

More information

CREATIVE MARKETING PROJECT 2016

CREATIVE MARKETING PROJECT 2016 CREATIVE MARKETING PROJECT 2016 The Creative Marketig Project is a chapter project that develops i chapter members a aalytical ad creative approach to the marketig process, actively egages chapter members

More information

Understanding Active Directory Services

Understanding Active Directory Services 06_IsideWi_ch06 12/3/03 1:59 PM Page 281 6 Uderstadig Active Directory Services C LASSIC NT HAS MANY ECCENTRICITIES big ad small that limit its scalability ad fuctioality. May of these eccetricities stem

More information

OpenText RightFax Fax Server

OpenText RightFax Fax Server OpeText RightFax Fax Server Icrease employee productivity, improve iformatio goverace, ad reduce costs by itegratig fax ito eterprise-wide busiess applicatios. Compaies eed a cetralized fax ifrastructure

More information

Repeating Decimals are decimal numbers that have number(s) after the decimal point that repeat in a pattern.

Repeating Decimals are decimal numbers that have number(s) after the decimal point that repeat in a pattern. 5.5 Fractios ad Decimals Steps for Chagig a Fractio to a Decimal. Simplify the fractio, if possible. 2. Divide the umerator by the deomiator. d d Repeatig Decimals Repeatig Decimals are decimal umbers

More information

Computer Networks CS321

Computer Networks CS321 Computer Networks CS321 Dr. Ramana I.I.T Jodhpur Dr. Ramana ( I.I.T Jodhpur ) Computer Networks CS321 1 / 22 Outline of the Lectures 1 Introduction OSI Reference Model Internet Protocol Performance Metrics

More information

Extending Your Management Reach to Remote Users

Extending Your Management Reach to Remote Users Extedig Your Maagemet Reach to Remote Users White Paper LANDESK WHITE PAPER : Extedig Your Maagemet Reach to Remote Users Table of Cotets Executive Summary... 3 Obstacles to Cost-Effective Remote Maagemet...

More information

Document Control Solutions

Document Control Solutions Documet Cotrol Solutios State of the art software The beefits of Assai Assai Software Services provides leadig edge Documet Cotrol ad Maagemet System software for oil ad gas, egieerig ad costructio. AssaiDCMS

More information

SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005. Lecturer: Kartik Krishnan Lecture 1-3

SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005. Lecturer: Kartik Krishnan Lecture 1-3 SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005 Lecturer: Kartik Krishnan Lecture 1-3 Communications and Computer Networks The fundamental purpose of a communication network is the exchange

More information

Multiplexers and Demultiplexers

Multiplexers and Demultiplexers I this lesso, you will lear about: Multiplexers ad Demultiplexers 1. Multiplexers 2. Combiatioal circuit implemetatio with multiplexers 3. Demultiplexers 4. Some examples Multiplexer A Multiplexer (see

More information

ORBCOMM - SYSTEM STATUS, EVOLUTION AND APPLICATIONS. Workshop Satellitenkommunikation in Deutschland DLR / Köln-Porz 27. - 28.

ORBCOMM - SYSTEM STATUS, EVOLUTION AND APPLICATIONS. Workshop Satellitenkommunikation in Deutschland DLR / Köln-Porz 27. - 28. ORBCOMM - System Status, Evolutio ad Applicatios 1 ORBCOMM - SYSTEM STATUS, EVOLUTION AND APPLICATIONS M. Kassebom B. Peé C. Tobeh I. Kalis E. Pütz J.J. Stolte R.L. Burdett OHB-System AG Uiversitätsallee

More information

On the Capacity of Hybrid Wireless Networks

On the Capacity of Hybrid Wireless Networks O the Capacity of Hybrid ireless Networks Beyua Liu,ZheLiu +,DoTowsley Departmet of Computer Sciece Uiversity of Massachusetts Amherst, MA 0002 + IBM T.J. atso Research Ceter P.O. Box 704 Yorktow Heights,

More information

Transport and Network Layer

Transport and Network Layer Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a

More information

Incremental calculation of weighted mean and variance

Incremental calculation of weighted mean and variance Icremetal calculatio of weighted mea ad variace Toy Fich faf@cam.ac.uk dot@dotat.at Uiversity of Cambridge Computig Service February 009 Abstract I these otes I eplai how to derive formulae for umerically

More information

Chapter 6: Variance, the law of large numbers and the Monte-Carlo method

Chapter 6: Variance, the law of large numbers and the Monte-Carlo method Chapter 6: Variace, the law of large umbers ad the Mote-Carlo method Expected value, variace, ad Chebyshev iequality. If X is a radom variable recall that the expected value of X, E[X] is the average value

More information

5: Introduction to Estimation

5: Introduction to Estimation 5: Itroductio to Estimatio Cotets Acroyms ad symbols... 1 Statistical iferece... Estimatig µ with cofidece... 3 Samplig distributio of the mea... 3 Cofidece Iterval for μ whe σ is kow before had... 4 Sample

More information

Radio Dispatch Systems

Radio Dispatch Systems Radio Dispatch Systems ZETRON DISPATCH SOLUTIONS: AT THE CENTER OF YOUR CRITICAL OPERATIONS Your dispatch system is the ceterpoit through which your key operatios are coordiated ad cotrolled. That s why

More information

CCH Accountants Starter Pack

CCH Accountants Starter Pack CCH Accoutats Starter Pack We may be a bit smaller, but fudametally we re o differet to ay other accoutig practice. Util ow, smaller firms have faced a stark choice: Buy cheaply, kowig that the practice

More information

MANUFACTURING. Link your products directly to your ERP system in real-time

MANUFACTURING. Link your products directly to your ERP system in real-time MANUFACTURING Lik your products directly to your ERP system i real-time Exted ERP Exted ERP is a complete mobile solutio extedig your ERP system by brigig warehouse processes to the users o the floor

More information

The Modern Malware Review. Analysis of New and Evasive Malware in Live Enterprise Networks 1st Edition, March 2013

The Modern Malware Review. Analysis of New and Evasive Malware in Live Enterprise Networks 1st Edition, March 2013 The Moder Malware Review Aalysis of New ad Evasive Malware i Live Eterprise Networks 1st Editio, March 2013 THE MODERN MALWARE REVIEW MARCH 2013 TABLE OF CONTENTS Backgroud ad Goals 3 A Focus o Actioable

More information

Project Deliverables. CS 361, Lecture 28. Outline. Project Deliverables. Administrative. Project Comments

Project Deliverables. CS 361, Lecture 28. Outline. Project Deliverables. Administrative. Project Comments Project Deliverables CS 361, Lecture 28 Jared Saia Uiversity of New Mexico Each Group should tur i oe group project cosistig of: About 6-12 pages of text (ca be loger with appedix) 6-12 figures (please

More information

SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES

SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES Read Sectio 1.5 (pages 5 9) Overview I Sectio 1.5 we lear to work with summatio otatio ad formulas. We will also itroduce a brief overview of sequeces,

More information

PENSION ANNUITY. Policy Conditions Document reference: PPAS1(7) This is an important document. Please keep it in a safe place.

PENSION ANNUITY. Policy Conditions Document reference: PPAS1(7) This is an important document. Please keep it in a safe place. PENSION ANNUITY Policy Coditios Documet referece: PPAS1(7) This is a importat documet. Please keep it i a safe place. Pesio Auity Policy Coditios Welcome to LV=, ad thak you for choosig our Pesio Auity.

More information

CHAPTER 3 DIGITAL CODING OF SIGNALS

CHAPTER 3 DIGITAL CODING OF SIGNALS CHAPTER 3 DIGITAL CODING OF SIGNALS Computers are ofte used to automate the recordig of measuremets. The trasducers ad sigal coditioig circuits produce a voltage sigal that is proportioal to a quatity

More information