Postacademic Interuniversity Course in Information Technology – Module C1p1 Chapter 2 Communications Systems Modeling.

Slides:



Advertisements
Similar presentations
Postacademic Interuniversity Course in Information Technology – Module C1p1 Chapter 2 Communications Systems Modeling.
Advertisements

Network Layer Pertemuan 17 Matakuliah: H0484/Jaringan Komputer Tahun: 2007.
NAT TRAVERSAL FOR IPSEC Research Seminar on Datacommunications Software HIIT
1 William Stallings Data and Computer Communications 7 th Edition Chapter 2 Protocols and Architecture.
1 Pertemuan 19 Layer Network Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
OSI Model MIS 416 – Module II Spring 2002 Networking and Computer Security.
Open System Interconnection (OSI) Model
11 CHAPTER ONE Introducing Networks. Objectives Identify and describe the functions of each of the seven layers of the OSI reference model Identify the.
William Stallings Data and Computer Communications 7 th Edition Chapter 2 Protocols and Architecture.
Chapter 1 NETWORKING BASICS.
Internetworking Fundamentals (Lecture #2) Andres Rengifo Copyright 2008.
COE 342: Data & Computer Communications (T042) Dr. Marwan Abu-Amara Chapter 2: Protocols and Architecture.
4/11/40 page 1 Department of Computer Engineering, Kasetsart University Introduction to Computer Communications and Networks CONSYL Computer and.
1 Review of Important Networking Concepts Introductory material. This slide uses the example from the previous module to review important networking concepts:
Computer Networks Lecture 1 & 2 Introduction and Layer Model Approach Lahore Leads University.
Postacademic Interuniversity Course in Information Technology – Module C1p1 Contents The 19th century telecommunications –Telegraph - Telephone –Digital.
Postacademic Interuniversity Course in Information Technology – Module C1p1 Chapter 3 Applications of Data Communications.
Review: – computer networks – topology: pair-wise connection, point-to-point networks and broadcast networks – switching techniques packet switching and.
Chapter 3 Telecommunication Architectures and Standard.
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
Postacademic Interuniversity Course in Information Technology – Module C1p1 Contents Link multiplexing –Circuit switching Synchronous Time-domain Multiplexing.
Postacademic Interuniversity Course in Information Technology – Module C1p1 Contents Data Communications Applications –File & print serving –Mail –Domain.
Chapter 1: Introduction to Web Applications. This chapter gives an overview of the Internet, and where the World Wide Web fits in. It then outlines the.
Network Architecture & Standards
Postacademic Interuniversity Course in Information Technology – Module C1p1 Contents The 19th century telecommunications –Telegraph - Telephone –Digital.
Introduction and Overview Chapter 1. Why Study TCP/IP? Forms global Internet base technology Has accommodated explosive growth well Protocols work over.
09-07-K.Steenhaut & J.Tiberghien - VUB 1 Telecommunications Concepts Chapter 1.2 Communications Systems Modeling.
Network Protocol Hierarchies
Computer Networks Chapter 2 – Network Models. Summer 2006Computer Networks2 Communication Tasks  The tasks given below need to be taken care of in any.
Postacademic Interuniversity Course in Information Technology – Module C1p1 Chapter 5 Multiplexing.
TELE202 Lecture 5 Packet switching in WAN 1 Lecturer Dr Z. Huang Overview ¥Last Lectures »C programming »Source: ¥This Lecture »Packet switching in Wide.
Postacademic Interuniversity Course in Information Technology – Module C1p1 Contents Communications Theory –Parallel vs. serial transmission –Transmission.
Packet switching network Data is divided into packets. Transfer of information as payload in data packets Packets undergo random delays & possible loss.
William Stallings Data and Computer Communications
Virtual Private Network. VPN In the most basic definition, VPN is a connection which allows 2 computers or networks to communicate with each other across.
END-TO-END ARGUMENTS IN SYSTEM DESIGN J.H. Salter, D.P. Reed and D.D. Clark Presented by Sui-Yu Wang.
OSI Reference Model. Open Systems Interconnection (OSI) Model International standard organization (ISO) established a committee in 1977 to develop an.
S305 – Network Infrastructure Chapter 5 Network and Transport Layers.
Postacademic Interuniversity Course in Information Technology – Module C1p1 Contents Data Communications Applications –File & print serving –Mail –Domain.
1 ECEN “Internet Protocols and Modeling”, Spring 2011 Slide 5.
Professor Douglas Lyon Fairfield University Computer Networks CR320.
Postacademic Interuniversity Course in Information Technology – Module C1p1 Chapter 4 Communications, Theory and Media.
Introduction Chapter 1. Business Applications of Networks A network with two clients and one server. Client-Server Model.
Networks are about Communication! What is a good model of communication?
Computer and Data Communications Read Chapters 1 & 2.
Enterprise Network Systems TCP Mark Clements. 3 March 2008ENS 2 Last Week – Client/ Server Cost effective way of providing more computing power High specs.
Postacademic Interuniversity Course in Information Technology – Module C1p1 Chapter 5 Multiplexing.
Connection-Oriented Networks – Wissam Fawaz1 Connection-Oriented Networks: SONET/SDH, ATM, MPLS, and Optical Networks Wissam Fawaz.
1/15 Chapter 5 Open Systems Interconnection Model.
OSI Model. Open Systems Interconnection (OSI) is a set of internationally recognized, non proprietary standards for networking and for operating system.
Network Models. The OSI Model Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Model for understanding.
1. Introduction and Background Network Performance and Quality of Service.
Postacademic Interuniversity Course in Information Technology – Module C1p1 Contents Introduction Example: a diplomatic negotiation Principles of a layered.
Chapter 5 Network and Transport Layers
Virtual Private Networks,
Network Architecture Layered Architectures Network Protocols
CS408/533 Computer Networks Text: William Stallings Data and Computer Communications, 6th edition Chapter 1 - Introduction.
Chapter 4 Introduction to Network Layer
Local Area Networks Chapter 4.
Introduction.
Telemedicine.
Chapter 1 – Part 2 Introduction.
Chapter 4 Introduction to Network Layer
Introduction Lecture 1.
COMPUTER NETWORKS CS610 Lecture-35 Hammad Khalid Khan.
Chapter 2. Protocols and Architecture
Protocol Layering - Introduction
Chapter Five: Network Software Protocol Hierarchies
Chapter 2 Network Models
Standards, Models and Language
Presentation transcript:

Postacademic Interuniversity Course in Information Technology – Module C1p1 Chapter 2 Communications Systems Modeling

Postacademic Interuniversity Course in Information Technology – Module C1p2 Contents Introduction Example: a diplomatic negotiation Principles of a layered model Connection oriented and connectionless communications Communication networks according to a layered model

Postacademic Interuniversity Course in Information Technology – Module C1p3 Contents Introduction Example: a diplomatic negotiation Principles of a layered model Connection oriented and connectionless communications Communication networks according to a layered model

Postacademic Interuniversity Course in Information Technology – Module C1p4 Layered Network Models The problem: Complexity of networked systems The solution: Decomposition into independent subsystems Layered network model –Introduced by IBM (SNA, 1971) –Standardized by ITU (X200) and ISO (7498) –Method universally adopted –Standards not really obeyed in practice

Postacademic Interuniversity Course in Information Technology – Module C1p5 Contents Introduction Example: a diplomatic negotiation Principles of a layered model Connection oriented and connectionless communications Communication networks according to a layered model

Postacademic Interuniversity Course in Information Technology – Module C1p6 A diplomatic negotiation Translation Cryptography Transmission Service Access Points Political arguments

Postacademic Interuniversity Course in Information Technology – Module C1p7 A diplomatic negotiation Cryptography Transmission Service Access Points Political arguments Single language messages

Postacademic Interuniversity Course in Information Technology – Module C1p8 A diplomatic negotiation Political arguments Transmission Service Access Points Single language messages Encrypted messages

Postacademic Interuniversity Course in Information Technology – Module C1p9 A diplomatic negotiation Political arguments Service Access Points Encrypted messages Single language messages Electromagnetic waves

Postacademic Interuniversity Course in Information Technology – Module C1p10 Contents Introduction Example: a diplomatic negotiation Principles of a layered model Connection oriented and connectionless communications Communication networks according to a layered model

Postacademic Interuniversity Course in Information Technology – Module C1p11 Layered Model Definitions Level (n+1) entity Level (n+1) entity Level (n) entity Level (n) entity Level (n-1) Service Provider Level n Service Access Points Level n Addresses Virtual level n+1 communication path using a level n+1 protocol Virtual level n communication path using a level n protocol Physical Communication Path

Postacademic Interuniversity Course in Information Technology – Module C1p12 Layered Model Definitions Example: The Telephone Service Telephone Network Telephone Service Access Points Telephone Numbers Virtual Interpersonal communication path Physical Communication Path

Postacademic Interuniversity Course in Information Technology – Module C1p13 Layered Model Definitions Protocol Data Units Level (n+1) entity Level (n+1) entity Level (n) entity Level (n) entity Level (n-1) Service Provider (n+1)PDU (n)PDU PDU encapsulation