Download presentation
Presentation is loading. Please wait.
Published byTorhild Engebretsen Modified over 6 years ago
1
The University of Adelaide, School of Computer Science
14 January 2019 Computer Networks, 5th Edition Chapter 9 Applications Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 2 — Instructions: Language of the Computer
2
FIGURE 9.1 Sequence of mail gateways store and forward email messages.
Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved
3
Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 9.2 IMAP state transition diagram. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved
4
Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 9.3 The Firefox web browser. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved
5
Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 9.4 HTTP 1.0 behavior. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved
6
Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 9.5 HTTP 1.1 behavior with persistent connections. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved
7
Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 9.6 SOAP message structure. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved
8
Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 9.7 A session directory tool displays information extracted from SDP messages. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved
9
FIGURE 9.8 Establishing communication through SIP proxies.
Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved
10
Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 9.9 Message flow for a basic SIP session. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved
11
Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 9.10 Devices in an H.323 network. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved
12
Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 9.11 Differentiated Services applied to a VOIP application. DiffServ queueing is applied only on the upstream link from customer router to ISP. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved
13
Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 9.12 Admission control using session control protocol. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved
14
Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 9.13 Co-ordination of SIP signalling and resource reservation. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved
15
Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 9.14 Names translated into addresses, where the numbers 1 to 5 show the sequence of steps in the process. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved
16
Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 9.15 Example of a domain hierarchy. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved
17
Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 9.16 Domain hierarchy partitioned into zones. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved
18
Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 9.17 Hierarchy of name servers. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved
19
Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 9.18 Name resolution in practice, where the numbers 1 to 10 show the sequence of steps in the process. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved
20
Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 9.19 Overlay network layered on top of a physical network. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved
21
Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 9.20 Overlay nodes tunnel through physical nodes. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved
22
Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 9.21 Alternative multicast trees mapped onto a physical topology. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved
23
Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 9.22 Multicast tree embedded in an overlay mesh. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved
24
Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 9.23 The triangle inequality does not necessarily hold in networks. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved
25
Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 9.24 Example topology of a Gnutella peer-to-peer network. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved
26
Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 9.25 Both nodes and objects map (hash) onto the ID space, where objects are maintained at the nearest node in this space. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved
27
Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 9.26 Objects are located by routing through the peer-to-peer overlay network. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved
28
Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 9.27 Example routing table at the node with ID 65a 1 f cx. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved
29
Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 9.28 Adding a node to the network. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved
30
Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 9.29 Peers in a BitTorrent swarm download from other peers that may not yet have the complete file. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved
31
Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 9.30 Components in a Content Distribution Network (CDN). Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.