transmission media and network topologies client/server architecture layers, protocols, and sockets
|
|
|
- MargaretMargaret Parrish
- 9 years ago
- Views:
Transcription
1 Network Programming 1 Computer Networks transmission media and network topologies client/server architecture layers, protocols, and sockets 2 Network Programming a simple client/server interaction the module socket in Python implementing a simple client/server 3 Guessing a Secret a game: player/dealer communication MCS 275 Lecture 27 Programming Tools and File Management Jan Verschelde, 14 March 2016 Programming Tools (MCS 275) network programming L March / 32
2 Network Programming 1 Computer Networks transmission media and network topologies client/server architecture layers, protocols, and sockets 2 Network Programming a simple client/server interaction the module socket in Python implementing a simple client/server 3 Guessing a Secret a game: player/dealer communication Programming Tools (MCS 275) network programming L March / 32
3 Transmission Media types of connections The unit for transmission speed isbps, bits per second. Four categories of media used for data transmission: 1 twisted pair wire: pair of copper wires used for telephone communications. Transmission speeds vary from 2,400 to 33,600bps. 2 coaxial cable: for many telephone lines or television signal. Data transmission over short distances guarantees speeds up to 10 7 bps. 3 optical fibre: signals transmitted via light-emitting diodes encode bits as presence or absence of light. Transmission speeds reach up to 10 9 bps. 4 electromagnetic waves: wireless over short distances or via satellites across long distances. Programming Tools (MCS 275) network programming L March / 32
4 Network Topologies structure of computer networks Three most common regular topologies: a star network: one central node is connected to all other nodes a ring network: nodes form a closed circuit, messages circle around the ring of nodes a bus network: all nodes on a single bus, used in the Von Neumann architecture Programming Tools (MCS 275) network programming L March / 32
5 Network Programming 1 Computer Networks transmission media and network topologies client/server architecture layers, protocols, and sockets 2 Network Programming a simple client/server interaction the module socket in Python implementing a simple client/server 3 Guessing a Secret a game: player/dealer communication Programming Tools (MCS 275) network programming L March / 32
6 Client/Server Architecture for software and hardware Client/server architecture defines the communication between two computers: one is the server and the other acts as the client. A client places a request or order to a server. The server processes the request. The client does not need to know how the server processes the requests. We distinguish between software and hardware client/server architectures: web and database servers offer software services; file and print servers offer hardware services. Programming Tools (MCS 275) network programming L March / 32
7 Network Programming 1 Computer Networks transmission media and network topologies client/server architecture layers, protocols, and sockets 2 Network Programming a simple client/server interaction the module socket in Python implementing a simple client/server 3 Guessing a Secret a game: player/dealer communication Programming Tools (MCS 275) network programming L March / 32
8 Four Layers in Internet Communication application, transport, network, and link 1 The application layer consists of client and server software. The application prepares the message and defines the destination address. 2 The transport layer formats the message by chopping it into packets attaching a sequence number and destination address to each packet. When receiving, packets are collected and reassembled into a message. 3 The network layer determines the (intermediate) address for each packet. This layer detects when a packet has reached its final destination. 4 The link layer is responsible for the actual transmission of packets. Programming Tools (MCS 275) network programming L March / 32
9 Following a Message through all four layers Application Application Transport Transport Network Network Network Link Link Link source intermediate node destination Programming Tools (MCS 275) network programming L March / 32
10 Network Protocols TCP and UDP Network protocols are rules for network communication. We consider two types of protocols: TCP Transmission Control Protocol First a message is sent that data is coming. Only after the receiver acknowledges this message will the sender send the data. All successful transmissions are confirmed, and retransmissions are acknowledged. UDP User Datagram Protocol Unlike TCP, no connection is established prior to sending data. The sender just carries on after sending a message. TCP is connection oriented, UDP is connectionless. TCP is more reliable whereas UDP is more streamlined. Programming Tools (MCS 275) network programming L March / 32
11 Sockets Sockets are objects programs use to connect. Sockets were introduced in 1981 in BSD Unix. Originally used for communication between processes, i.e.: between two programs on same computer. Sockets support communication across platforms, independent of the operating system. In addition to the IP address of the computer, both server and client must use the same port. A port is a 16-bit integer, some are reserved for particular protocols. Any port between 1,024 and 65,535 is free. Sockets support both TCP and UDP. Programming Tools (MCS 275) network programming L March / 32
12 Network Programming 1 Computer Networks transmission media and network topologies client/server architecture layers, protocols, and sockets 2 Network Programming a simple client/server interaction the module socket in Python implementing a simple client/server 3 Guessing a Secret a game: player/dealer communication Programming Tools (MCS 275) network programming L March / 32
13 a simple client/server interaction Running tcp_server.py: The clienttcp_client.py runs in another terminal. Programming Tools (MCS 275) network programming L March / 32
14 connecting client and server Running tcp_client.py in another terminal: Runningtcp_server.py in one terminal: Programming Tools (MCS 275) network programming L March / 32
15 passing data from client to server Running tcp_client.py in another terminal: Runningtcp_server.py in one terminal: Programming Tools (MCS 275) network programming L March / 32
16 Network Programming 1 Computer Networks transmission media and network topologies client/server architecture layers, protocols, and sockets 2 Network Programming a simple client/server interaction the module socket in Python implementing a simple client/server 3 Guessing a Secret a game: player/dealer communication Programming Tools (MCS 275) network programming L March / 32
17 sockets in Python: the socket module The socket module exports the classsocket() which returns an object representing a socket. The first argument ofsocket is the Address Family (AF): AF_UNIX : for UNIX sockets; AF_INET : most commonly used for internet AF_INET supports both TCP and UDP, given respectively by SOCK_STREAM andsock_dgram as second argument ofsocket(). For example: from socket import socket as Socket from socket import AF_INET, SOCK_STREAM sock = Socket(AF_INET, SOCK_STREAM) Programming Tools (MCS 275) network programming L March / 32
18 Network Programming 1 Computer Networks transmission media and network topologies client/server architecture layers, protocols, and sockets 2 Network Programming a simple client/server interaction the module socket in Python implementing a simple client/server 3 Guessing a Secret a game: player/dealer communication Programming Tools (MCS 275) network programming L March / 32
19 defining connections withbind andconnect After a socket is created, both server and client define server_address = (hostname, number) To bind the socket to the address, the server does sock.bind(server_address) and the client contacts the server then via sock.connect(server_address) Programming Tools (MCS 275) network programming L March / 32
20 taking requests withlisten andaccept Withlisten() the server indicates how many incoming connections will be accepted: sock.listen(2) # accept at most 2 connections The server takes requests via theaccept() method: client, client_address = sock.accept() Theaccept() method returns 1 a socketclient for receiving data; 2 the address of the client. Programming Tools (MCS 275) network programming L March / 32
21 sending and receiving data withsend andrecv The client sends data withsend() sock.send(data) The server receives data applyingrecv() data = client.recv(buffer) to the socketclient obtained withaccept(). When all is over, both client and server do sock.close() What is sent must be of type bytes. Programming Tools (MCS 275) network programming L March / 32
22 the methodsencode() anddecode() To avoid an error such as TypeError: a bytes-like object is required, not str we have to work withencode() anddecode(), for example >>> n = 4 >>> b = str(n).encode() >>> b b 4 >>> type(b) <class bytes > >>> c = int(b.decode()) >>> c 4 Programming Tools (MCS 275) network programming L March / 32
23 the scripttcp_server.py The script with the definition of the setup: from socket import socket as Socket from socket import AF_INET, SOCK_STREAM HOSTNAME = # blank so any address can be used PORTNUMBER = # number for the port BUFFER = 80 # size of the buffer SERVER_ADDRESS = (HOSTNAME, PORTNUMBER) SERVER = Socket(AF_INET, SOCK_STREAM) SERVER.bind(SERVER_ADDRESS) SERVER.listen(2) Programming Tools (MCS 275) network programming L March / 32
24 tcp_server.py continued print( server waits for connection ) CLIENT, CLIENT_ADDRESS = SERVER.accept() print( server accepted connection request from,\ CLIENT_ADDRESS) print( server waits for data ) DATA = CLIENT.recv(BUFFER).decode() print( server received \"%s\" % DATA) SERVER.close() Programming Tools (MCS 275) network programming L March / 32
25 the programtcp_client.py from socket import socket as Socket from socket import AF_INET, SOCK_STREAM HOSTNAME = localhost # on same host PORTNUMBER = # same port number BUFFER = 80 # size of the buffer SERVER_ADDRESS = (HOSTNAME, PORTNUMBER) CLIENT = Socket(AF_INET, SOCK_STREAM) CLIENT.connect(SERVER_ADDRESS) print( client is connected ) DATA = input( Give message : ) CLIENT.send(DATA.encode()) Programming Tools (MCS 275) network programming L March / 32
26 Network Programming 1 Computer Networks transmission media and network topologies client/server architecture layers, protocols, and sockets 2 Network Programming a simple client/server interaction the module socket in Python implementing a simple client/server 3 Guessing a Secret a game: player/dealer communication Programming Tools (MCS 275) network programming L March / 32
27 A Little Game player/dealer communication The dealer generates a secret number. The player must guess the number. After each guess, the dealer sends feedback: too low, too high, or found the secret The game terminates when the secret is found. The player is the client, the dealer is the server Programming Tools (MCS 275) network programming L March / 32
28 the setup of the server = the dealer from random import randint from socket import socket as Socket from socket import AF_INET, SOCK_STREAM HOSTNAME = # blank so any address can be used PORTNUMBER = # number for the port BUFFER = 80 # size of the buffer DEALER_ADDRESS = (HOSTNAME, PORTNUMBER) DEALER = Socket(AF_INET, SOCK_STREAM) DEALER.bind(DEALER_ADDRESS) DEALER.listen(1) print( dealer waits for player to connect ) PLAYER, PLAYER_ADDRESS = DEALER.accept() print( dealer accepted connection request from,\ PLAYER_ADDRESS) Programming Tools (MCS 275) network programming L March / 32
29 script for the server continued SECRET = randint(0, 9) print( the secret is %d % SECRET) while True: print( dealer waits for a guess ) GUESS = PLAYER.recv(BUFFER).decode() print( dealer received + GUESS) if int(guess) < SECRET: REPLY = too low elif int(guess) > SECRET: REPLY = too high else: REPLY = found the secret PLAYER.send(REPLY.encode()) if REPLY == found the secret : break DEALER.close() Programming Tools (MCS 275) network programming L March / 32
30 code for the client = the player At the start of the script, we define the setup: from socket import socket as Socket from socket import AF_INET, SOCK_STREAM HOSTNAME = localhost # on same host PORTNUMBER = # same port number BUFFER = 80 # size of the buffer DEALER = (HOSTNAME, PORTNUMBER) PLAYER = Socket(AF_INET, SOCK_STREAM) PLAYER.connect(DEALER) Programming Tools (MCS 275) network programming L March / 32
31 script continued The player is prompted for a guess until the secret number is found. print( player is ready to guess ) while True: GUESS = input( Give number : ) PLAYER.send(GUESS.encode()) ANSWER = PLAYER.recv(BUFFER).decode() print( >, ANSWER) if ANSWER == found the secret : break PLAYER.close() Programming Tools (MCS 275) network programming L March / 32
32 Summary + Assignments We started chapter 12 in Making Use of Python... Assignments: 1 Extend the client/server interaction to simulate a password dialogue. After receiving data from a client, the server returns access granted oraccess denied depending on whether the received data matches the password. 2 Describe how you would implement the game of rock, paper, and scissors in a client/server manner. 3 Redefine the quiz of Project Three as a client/server interaction. The server generates, asks the questions, and gives feedback on the answers submitted by the client. 4 Write an implementation of the server in the previous exercise. 5 Write an implementation of the client in the previous exercise. Programming Tools (MCS 275) network programming L March / 32
CPS221 Lecture: Layered Network Architecture
CPS221 Lecture: Layered Network Architecture Objectives last revised 9/10/12 1. To discuss the OSI layered architecture model 2. To discuss the specific implementation of this model in TCP/IP Materials:
Computer Networks Network architecture
Computer Networks Network architecture Saad Mneimneh Computer Science Hunter College of CUNY New York - Networks are like onions - They stink? - Yes, no, they have layers Shrek and Donkey 1 Introduction
Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD
Ethernet dominant LAN technology: cheap -- $20 for 100Mbs! first widely used LAN technology Simpler, cheaper than token rings and ATM Kept up with speed race: 10, 100, 1000 Mbps Metcalfe s Etheret sketch
Future Stars. Grade X Manual Chapter 1 Networking and Telecommunication. telecommunication. Telephones, telegrams, radios and televisions help
Future Stars Grade X Manual Chapter 1 Networking and Telecommunication 1. Answer the following questions. a. What is telecommunication? Ans: The transfer of information at a far distance is known as telecommunication.
Overview of Network Hardware and Software. CS158a Chris Pollett Jan 29, 2007.
Overview of Network Hardware and Software CS158a Chris Pollett Jan 29, 2007. Outline Scales of Networks Protocol Hierarchies Scales of Networks Last day, we talked about broadcast versus point-to-point
Local Area Network By Bhupendra Ratha, Lecturer School of Library and Information Science Devi Ahilya University, Indore Email: [email protected] Local Area Network LANs connect computers and peripheral
Chapter 9A. Network Definition. The Uses of a Network. Network Basics
Chapter 9A Network Basics 1 Network Definition Set of technologies that connects computers Allows communication and collaboration between users 2 The Uses of a Network Simultaneous access to data Data
Overview of Computer Networks
Overview of Computer Networks Client-Server Transaction Client process 4. Client processes response 1. Client sends request 3. Server sends response Server process 2. Server processes request Resource
What is CSG150 about? Fundamentals of Computer Networking. Course Outline. Lecture 1 Outline. Guevara Noubir [email protected].
What is CSG150 about? Fundamentals of Computer Networking Guevara Noubir [email protected] CSG150 Understand the basic principles of networking: Description of existing networks, and networking mechanisms
IT4504 - Data Communication and Networks (Optional)
- Data Communication and Networks (Optional) INTRODUCTION This is one of the optional courses designed for Semester 4 of the Bachelor of Information Technology Degree program. This course on Data Communication
Network Programming with Sockets. Process Management in UNIX
Network Programming with Sockets This section is a brief introduction to the basics of networking programming using the BSD Socket interface on the Unix Operating System. Processes in Unix Sockets Stream
Transport Layer Protocols
Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements
Based on Computer Networking, 4 th Edition by Kurose and Ross
Computer Networks Ethernet Hubs and Switches Based on Computer Networking, 4 th Edition by Kurose and Ross Ethernet dominant wired LAN technology: cheap $20 for NIC first widely used LAN technology Simpler,
IP - The Internet Protocol
Orientation IP - The Internet Protocol IP (Internet Protocol) is a Network Layer Protocol. IP s current version is Version 4 (IPv4). It is specified in RFC 891. TCP UDP Transport Layer ICMP IP IGMP Network
IP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP
CSCE 515: Computer Network Programming TCP/IP IP Network Layer Wenyuan Xu Department of Computer Science and Engineering University of South Carolina IP Datagrams IP is the network layer packet delivery
Network: several computers who can communicate. bus. Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb).
1 / 17 Network: several computers who can communicate. Bus topology: bus Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb). Hardware has globally unique MAC addresses (IDs).
Introduction to Computer
PDHonline Course E175 (8 PDH) Introduction to Computer Instructor: Dale W. Callahan, Ph.D., P.E. and Lea B. Callahan, P.E. 2012 PDH Online PDH Center 5272 Meadow Estates Drive Fairfax, VA 22030-6658 Phone
Telecommunications, Networks, and Wireless Computing
Objectives Telecommunications, Networks, and Wireless Computing 1. What are the features of a contemporary corporate telecommunications system? On what major technology developments are they based? 2.
Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur
Module 5 Broadcast Communication Networks Lesson 1 Network Topology Specific Instructional Objectives At the end of this lesson, the students will be able to: Specify what is meant by network topology
Agenda. Distributed System Structures. Why Distributed Systems? Motivation
Agenda Distributed System Structures CSCI 444/544 Operating Systems Fall 2008 Motivation Network structure Fundamental network services Sockets and ports Client/server model Remote Procedure Call (RPC)
Computer Networks. Chapter 5 Transport Protocols
Computer Networks Chapter 5 Transport Protocols Transport Protocol Provides end-to-end transport Hides the network details Transport protocol or service (TS) offers: Different types of services QoS Data
Network Layers. CSC358 - Introduction to Computer Networks
Network Layers Goal Understand how application processes set up a connection and exchange messages. Understand how addresses are determined Data Exchange Between Application Processes TCP Connection-Setup
Introduction to Computer Networks
Introduction to Computer Networks Chen Yu Indiana University Basic Building Blocks for Computer Networks Nodes PC, server, special-purpose hardware, sensors Switches Links: Twisted pair, coaxial cable,
Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages
Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages
DATA COMMUNICATION AND NETWORKS
DATA COMMUNICATION AND NETWORKS 1. Define the term Computer Networks. A Computer network is a number if computers interconnected by one or more transmission paths. The transmission path often is the telephone
Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP
Overview Securing TCP/IP Chapter 6 TCP/IP Open Systems Interconnection Model Anatomy of a Packet Internet Protocol Security (IPSec) Web Security (HTTP over TLS, Secure-HTTP) Lecturer: Pei-yih Ting 1 2
Introduction to computer networks and Cloud Computing
Introduction to computer networks and Cloud Computing Aniel Nieves-González Fall 2015 Computer Netwoks A computer network is a set of independent computer systems that are connected by a communication
The OSI and TCP/IP Models. Lesson 2
The OSI and TCP/IP Models Lesson 2 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Introduction to the OSI Model Compare the layers of the OSI and TCP/IP
Computer Networks. By Hardeep Singh
Computer Networks Contents Introduction Basic Elements of communication systemnetwork Topologies Network types Introduction A Computer network is a network of computers that are geographically distributed,
Network Programming TDC 561
Network Programming TDC 561 Lecture # 1 Dr. Ehab S. Al-Shaer School of Computer Science & Telecommunication DePaul University Chicago, IL 1 Network Programming Goals of this Course: Studying, evaluating
The OSI Model and the TCP/IP Protocol Suite
The OSI Model and the TCP/IP Protocol Suite To discuss the idea of multiple layering in data communication and networking and the interrelationship between layers. To discuss the OSI model and its layer
Introduction to Socket Programming Part I : TCP Clients, Servers; Host information
Introduction to Socket Programming Part I : TCP Clients, Servers; Host information Keywords: sockets, client-server, network programming-socket functions, OSI layering, byte-ordering Outline: 1.) Introduction
3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET
3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET The Business Value of Telecommunications and Networking Business value impacts of the telecommunications and Networking are: Declining transaction costs
What You Will Learn About. Computers Are Your Future. Chapter 8. Networks: Communicating and Sharing Resources. Network Fundamentals
What You Will Learn About Computers Are Your Future Chapter 8 Networks: Communicating and Sharing Resources Basic networking concepts Advantages and disadvantages of networks Peer-to-peer and client/server
CS335 Sample Questions for Exam #2
CS335 Sample Questions for Exam #2.) Compare connection-oriented with connectionless protocols. What type of protocol is IP? How about TCP and UDP? Connection-oriented protocols Require a setup time to
EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst
EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst Data communication in reality In reality, the source and destination hosts are very seldom on the same network, for
Protocols and Architecture. Protocol Architecture.
Protocols and Architecture Protocol Architecture. Layered structure of hardware and software to support exchange of data between systems/distributed applications Set of rules for transmission of data between
Network Programming using sockets
Network Programming using sockets TCP/IP layers Layers Message Application Transport Internet Network interface Messages (UDP) or Streams (TCP) UDP or TCP packets IP datagrams Network-specific frames Underlying
Chapter 11. User Datagram Protocol (UDP)
Chapter 11 User Datagram Protocol (UDP) The McGraw-Hill Companies, Inc., 2000 1 CONTENTS PROCESS-TO-PROCESS COMMUNICATION USER DATAGRAM CHECKSUM UDP OPERATION USE OF UDP UDP PACKAGE The McGraw-Hill Companies,
Chapter 8: Computer Networking. AIMS The aim of this chapter is to give a brief introduction to computer networking.
Chapter 8: Computer Networking AIMS The aim of this chapter is to give a brief introduction to computer networking. OBJECTIVES At the end of this chapter you should be able to: Explain the following terms:
Process Control and Automation using Modbus Protocol
Process Control and Automation using Modbus Protocol Modbus is the fundamental network protocol used in most industrial applications today. It is universal, open and an easy to use protocol. Modbus has
Indian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology
Indian Institute of Technology Kharagpur TCP/IP Part I Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology Kharagpur Lecture 3: TCP/IP Part I On completion, the student
Think! Think! Data communications. Long-Distance. Modems: to analog and back. Transmission Media. The last mile is the hardest for digital information
Data communications Think! Think!?? What makes it possible to communicate from point A to point B?? Long-Distance Transmission Media If you place a call outside the local transport area, an interchange
WHITE PAPER. IP-based Networks: Axis White Paper, 2002-1 - Copyright 2002, Axis Communications www.axis.com
WHITE PAPER IP-based Networks: Basics Axis White Paper, 2002-1 - Copyright 2002, Axis Communications TABLE OF CONTENTS 1. INTRODUCTION... 3 2. BASICS IN NETWORK COMMUNICATION... 3 3. TRANSMISSION FUNDAMENTALS...
How do I get to www.randomsite.com?
Networking Primer* *caveat: this is just a brief and incomplete introduction to networking to help students without a networking background learn Network Security. How do I get to www.randomsite.com? Local
Network Security. Vorlesung Kommunikation und Netze SS 10 E. Nett
Network Security Internet not originally designed with (much) security in mind original vision: a group of mutually trusting users attached to a transparent network Security considerations in all layers!
NETWORKING TECHNOLOGIES
NETWORKING TECHNOLOGIES (October 19, 2015) BUS3500 - Abdou Illia, Fall 2015 1 LEARNING GOALS Identify the major hardware components in networks. Identify and explain the various types of computer networks.
TCP/IP Protocol Suite. Marshal Miller Chris Chase
TCP/IP Protocol Suite Marshal Miller Chris Chase Robert W. Taylor (Director of Information Processing Techniques Office at ARPA 1965-1969) "For each of these three terminals, I had three different sets
Ethernet. Ethernet. Network Devices
Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking
COMPUTERS ARE YOUR FUTURE CHAPTER 7 NETWORKS: COMMUNICATING AND SHARING RESOURCES
COMPUTERS ARE YOUR FUTURE CHAPTER 7 NETWORKS: COMMUNICATING AND SHARING RESOURCES Answers to End-of-Chapter Questions Matching g 1. router o 2. node i 3. ring l 4. hub c 5. star n 6. backbone b 7. latency
Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages
Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages
Local-Area Network -LAN
Computer Networks A group of two or more computer systems linked together. There are many [types] of computer networks: Peer To Peer (workgroups) The computers are connected by a network, however, there
Application. Transport. Network. Data Link. Physical. Network Layers. Goal
Layers Goal Understand how application processes set up a connection and exchange messages. Understand how addresses are determined 1 2 Data Exchange Between Processes TCP Connection-Setup Between Processes
ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK
VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK Contemporary Control Systems, Inc. Understanding Ethernet Switches and Routers This extended article was based on a two-part article that was
Introduction To Computer Networking
Introduction To Computer Networking Alex S. 1 Introduction 1.1 Serial Lines Serial lines are generally the most basic and most common communication medium you can have between computers and/or equipment.
Limi Kalita / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (3), 2014, 4802-4807. Socket Programming
Socket Programming Limi Kalita M.Tech Student, Department of Computer Science and Engineering, Assam Down Town University, Guwahati, India. Abstract: The aim of the paper is to introduce sockets, its deployment
CSCI 491-01 Topics: Internet Programming Fall 2008
CSCI 491-01 Topics: Internet Programming Fall 2008 Introduction Derek Leonard Hendrix College September 3, 2008 Original slides copyright 1996-2007 J.F Kurose and K.W. Ross 1 Chapter 1: Introduction Our
Socket Programming. Request. Reply. Figure 1. Client-Server paradigm
Socket Programming 1. Introduction In the classic client-server model, the client sends out requests to the server, and the server does some processing with the request(s) received, and returns a reply
Layered Architectures and Applications
1 Layered Architectures and Applications Required reading: Garcia 2.1, 2.2, 2.3 CSE 3213, Fall 2010 Instructor: N. Vlajic 2 Why Layering?! 3 Montreal London Paris Alice wants to send a mail to Bob and
Lecture 28: Internet Protocols
Lecture 28: Internet Protocols 15-110 Principles of Computing, Spring 2016 Dilsun Kaynar, Margaret Reid-Miller, Stephanie Balzer Reminder: Exam 2 Exam 2 will take place next Monday, on April 4. Further
Final for ECE374 05/06/13 Solution!!
1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -
Mathatma Gandhi University
Mathatma Gandhi University BSc Computer Science IV th semester BCS 402 Computer Network &Internet MULTIPLE CHOICE QUESTIONS 1. The computer network is A) Network computer with cable B) Network computer
What s a protocol? What s a protocol? A closer look at network structure: What s the Internet? What s the Internet? What s the Internet?
What s the Internet? PC server laptop cellular handheld access points wired s connected computing devices: hosts = end systems running apps communication s fiber, copper, radio transmission rate = bandwidth
Access Control: Firewalls (1)
Access Control: Firewalls (1) World is divided in good and bad guys ---> access control (security checks) at a single point of entry/exit: in medieval castles: drawbridge in corporate buildings: security/reception
Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet
Basic Networking Concepts 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet 1 1. Introduction -A network can be defined as a group of computers and other devices connected
How To Understand The Layered Architecture Of A Network
COMPUTER NETWORKS NETWORK ARCHITECTURE AND PROTOCOLS The Need for Standards Computers have different architectures, store data in different formats and communicate at different rates Agreeing on a particular
BCS THE CHARTERED INSTITUTE FOR IT BCS HIGHER EDUCATION QUALIFICATIONS. BCS Level 5 Diploma in IT SEPTEMBER 2014. Computer Networks EXAMINERS REPORT
BCS THE CHARTERED INSTITUTE FOR IT BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT SEPTEMBER 2014 Computer Networks EXAMINERS REPORT General Comments This session is again like the April
2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above
1. How many bits are in an IP address? A. 16 B. 32 C. 64 2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 3. The network number plays what part in an IP address? A. It
TCP/IP Fundamentals. OSI Seven Layer Model & Seminar Outline
OSI Seven Layer Model & Seminar Outline TCP/IP Fundamentals This seminar will present TCP/IP communications starting from Layer 2 up to Layer 4 (TCP/IP applications cover Layers 5-7) IP Addresses Data
Architecture and Performance of the Internet
SC250 Computer Networking I Architecture and Performance of the Internet Prof. Matthias Grossglauser School of Computer and Communication Sciences EPFL http://lcawww.epfl.ch 1 Today's Objectives Understanding
Topics. Computer Networks. Let s Get Started! Computer Networks: Our Definition. How are Networks Used by Computers? Computer Network Components
Topics Use of networks Network structure Implementation of networks Computer Networks Introduction Let s Get Started! Networking today: Where are they? Powerful computers are cheap Networks are everywhere
The exam has 110 possible points, 10 of which are extra credit. There is a Word Bank on Page 8. Pages 7-8 can be removed from the exam.
CS326e Spring 2014 Midterm Exam Name SOLUTIONS UTEID The exam has 110 possible points, 10 of which are extra credit. There is a Word Bank on Page 8. Pages 7-8 can be removed from the exam. 1. [4 Points]
Network Performance: Networks must be fast. What are the essential network performance metrics: bandwidth and latency
Network Performance: Networks must be fast What are the essential network performance metrics: bandwidth and latency Transmission media AS systems Input'signal'f(t) Has'bandwidth'B System'with'H(-) Output'signal'g(t)
CSIS 3230. CSIS 3230 Spring 2012. Networking, its all about the apps! Apps on the Edge. Application Architectures. Pure P2P Architecture
Networking, its all about the apps! CSIS 3230 Chapter 2: Layer Concepts Chapter 5.4: Link Layer Addressing Networks exist to support apps Web Social ing Multimedia Communications Email File transfer Remote
RARP: Reverse Address Resolution Protocol
SFWR 4C03: Computer Networks and Computer Security January 19-22 2004 Lecturer: Kartik Krishnan Lectures 7-9 RARP: Reverse Address Resolution Protocol When a system with a local disk is bootstrapped it
Jean Parrend 1/6 SNMP. Content. 1. Introduction...1
Jean Parrend 1/6 SNMP Content 1. Introduction...1 2. SNMP architecture 1 3. The Management Information Base...3 4. Packet types and structure..4 5. Layered communication...5 Traversing the layers 6. References.6
an interconnected collection of autonomous computers interconnected = able to exchange information
Overview: Network Introduction what is a computer network? digital transmission components of a computer network network hardware network software What is a computer network? an interconnected collection
Operating Systems Design 16. Networking: Sockets
Operating Systems Design 16. Networking: Sockets Paul Krzyzanowski [email protected] 1 Sockets IP lets us send data between machines TCP & UDP are transport layer protocols Contain port number to identify
User Datagram Protocol - Wikipedia, the free encyclopedia
Página 1 de 6 User Datagram Protocol From Wikipedia, the free encyclopedia User Datagram Protocol (UDP) is one of the core protocols of the Internet protocol suite. Using UDP, programs on networked computers
Network layer" 1DT066! Distributed Information Systems!! Chapter 4" Network Layer!! goals: "
1DT066! Distributed Information Systems!! Chapter 4" Network Layer!! Network layer" goals: "! understand principles behind layer services:" " layer service models" " forwarding versus routing" " how a
ICT SEcurity BASICS. Course: Software Defined Radio. Angelo Liguori. SP4TE lab. [email protected]
Course: Software Defined Radio ICT SEcurity BASICS Angelo Liguori [email protected] SP4TE lab 1 Simple Timing Covert Channel Unintended information about data gets leaked through observing the
Data Communication and Computer Network
1 Data communication principles, types and working principles of modems, Network principles, OSI model, functions of data link layer and network layer, networking components, communication protocols- X
Configuring CSS Remote Access Methods
CHAPTER 11 Configuring CSS Remote Access Methods This chapter describes how to configure the Secure Shell Daemon (SSH), Remote Authentication Dial-In User Service (RADIUS), and the Terminal Access Controller
Answer FIVE Questions only. Each carries 20 marks.
Instructions: Answer FIVE Questions only. Each carries 20 marks. Question 1 Answer FOUR parts only. Each carries 5 marks: i) Outline the structure of computer names used by DNS. DNS uses a hierarchical
EXPLORER. TFT Filter CONFIGURATION
EXPLORER TFT Filter Configuration Page 1 of 9 EXPLORER TFT Filter CONFIGURATION Thrane & Thrane Author: HenrikMøller Rev. PA4 Page 1 6/15/2006 EXPLORER TFT Filter Configuration Page 2 of 9 1 Table of Content
Objectives. Lecture 4. How do computers communicate? How do computers communicate? Local asynchronous communication. How do computers communicate?
Lecture 4 Continuation of transmission basics Chapter 3, pages 75-96 Dave Novak School of Business University of Vermont Objectives Line coding Modulation AM, FM, Phase Shift Multiplexing FDM, TDM, WDM
Objectives of Lecture. Network Architecture. Protocols. Contents
Objectives of Lecture Network Architecture Show how network architecture can be understood using a layered approach. Introduce the OSI seven layer reference model. Introduce the concepts of internetworking
Cross-platform TCP/IP Socket Programming in REXX
Cross-platform TCP/IP Socket programming in REXX Abstract: TCP/IP is the key modern network technology, and the various REXX implementations have useful, if incompatible interfaces to it. In this session,
Data Communication Networks Introduction
Data Communication Networks Introduction M. R. Pakravan Department of Electrical Engineering Sharif University of Technology Data Networks 1 Introduction The course introduces the underlying concepts and
Lecture 2-ter. 2. A communication example Managing a HTTP v1.0 connection. G.Bianchi, G.Neglia, V.Mancuso
Lecture 2-ter. 2 A communication example Managing a HTTP v1.0 connection Managing a HTTP request User digits URL and press return (or clicks ). What happens (HTTP 1.0): 1. Browser opens a TCP transport
How To Understand The Internet From A Telephone To A Computer (For A Computer)
Basic Concepts In Computer Networking Antonio Carzaniga Faculty of Informatics University of Lugano September 19, 2014 Goal of this Lecture Understand what packet switching is Understand what circuit switching
IT4405 Computer Networks (Compulsory)
IT4405 Computer Networks (Compulsory) INTRODUCTION This course provides a comprehensive insight into the fundamental concepts in data communications, computer network systems and protocols both fixed and
IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life
Overview Dipl.-Ing. Peter Schrotter Institute of Communication Networks and Satellite Communications Graz University of Technology, Austria Fundamentals of Communicating over the Network Application Layer
Computer Networking: A Survey
Computer Networking: A Survey M. Benaiah Deva Kumar and B. Deepa, 1 Scholar, 2 Assistant Professor, IT Department, Sri Krishna College of Arts and Science College, Coimbatore, India. Abstract- Computer
(Refer Slide Time: 02:17)
Internet Technology Prof. Indranil Sengupta Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No #06 IP Subnetting and Addressing (Not audible: (00:46)) Now,
Tutorial on Socket Programming
Tutorial on Socket Programming Computer Networks - CSC 458 Department of Computer Science Seyed Hossein Mortazavi (Slides are mainly from Monia Ghobadi, and Amin Tootoonchian, ) 1 Outline Client- server
ELEN 602: Computer Communications and Networking. Socket Programming Basics
1 ELEN 602: Computer Communications and Networking Socket Programming Basics A. Introduction In the classic client-server model, the client sends out requests to the server, and the server does some processing
Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol
Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol 1 TCP/IP protocol suite A suite of protocols for networking for the Internet Transmission control protocol (TCP) or User Datagram protocol
