The document provides an overview of data communication and networking in manufacturing systems. It discusses protocols, layered communication models like the ISO model, and physical network technologies. It introduces the TCP/IP model and motivations for the Internet, including universal connectivity and independence from physical networks. Key topics covered include IP addressing, packet formats, routing between networks, and Ethernet communication.
Data Communication
Networks & Internet
Protocols & Standards
Layered Tasks
Internet Model
OSI Model
Digital Transmission
Analog Transmission
Multiplexing
Transmission Media
Circuit switching and Telephone Network
Signals
Digital Transmission
Analog Transmission
Multiplexing
Transmission Media
A computer network or data network is a telecommunications network which allows computers to exchange data. In computer networks, networked computing devices exchange data with each other using a data link. The connections between nodes are established using either cable media or wireless media.
Data Communication
Networks & Internet
Protocols & Standards
Layered Tasks
Internet Model
OSI Model
Digital Transmission
Analog Transmission
Multiplexing
Transmission Media
Circuit switching and Telephone Network
Signals
Digital Transmission
Analog Transmission
Multiplexing
Transmission Media
A computer network or data network is a telecommunications network which allows computers to exchange data. In computer networks, networked computing devices exchange data with each other using a data link. The connections between nodes are established using either cable media or wireless media.
Full video explained in Hindi
Check youtube channel -
The Avi Security
basic networking concepts is fundamental to a successful career in information technology. Networking technologies underlie all IT activities and a strong comprehension of the hardware and protocols used to create networks is essential to future success. In this training course, you will learn how to configure a workstation to connect to a network, analyze network traffic using a protocol analyzer, examine switch and router configurations, perform basic IPv4 addressing and subnetting, and research network security solutions. basic networking concepts is fundamental to a successful career in information technology. Networking technologies underlie all IT activities and a strong comprehension of the hardware and protocols used to create networks is essential to future success. In this training course, you will learn how to configure a workstation to connect to a network, analyze network traffic using a protocol analyzer, examine switch and router configurations, perform basic IPv4 addressing and subnetting, and research network security solutions.
Basic networking concepts is fundamental to a successful career in information technology. Networking technologies underlie all IT activities and a strong comprehension of the hardware and protocols used to create networks is essential to future success. In this training course, you will learn how to configure a workstation to connect to a network, analyze network traffic using a protocol analyzer, examine switch and router configurations, perform basic IPv4 addressing and subnetting, and research network security solutions.
Computer network is nothing but a set of computers connected to each other, mainly for sharing information,data, programs and resources. Networking reduces the cost of doing business since resources are utilized to maximum extent. Broad categories of networking are LAN,WAN,MAN,STAR,BUS, Ring Topology among others.
For more such innovative content on management studies, join WeSchool PGDM-DLP Program: http://bit.ly/ZEcPAc
Learn Advanced Networking Course At PSK Technologies It Company Nagpur Download free syllabus :-https://www.pskitservices.com/free-internship-company-in-nagpur/
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Full video explained in Hindi
Check youtube channel -
The Avi Security
basic networking concepts is fundamental to a successful career in information technology. Networking technologies underlie all IT activities and a strong comprehension of the hardware and protocols used to create networks is essential to future success. In this training course, you will learn how to configure a workstation to connect to a network, analyze network traffic using a protocol analyzer, examine switch and router configurations, perform basic IPv4 addressing and subnetting, and research network security solutions. basic networking concepts is fundamental to a successful career in information technology. Networking technologies underlie all IT activities and a strong comprehension of the hardware and protocols used to create networks is essential to future success. In this training course, you will learn how to configure a workstation to connect to a network, analyze network traffic using a protocol analyzer, examine switch and router configurations, perform basic IPv4 addressing and subnetting, and research network security solutions.
Basic networking concepts is fundamental to a successful career in information technology. Networking technologies underlie all IT activities and a strong comprehension of the hardware and protocols used to create networks is essential to future success. In this training course, you will learn how to configure a workstation to connect to a network, analyze network traffic using a protocol analyzer, examine switch and router configurations, perform basic IPv4 addressing and subnetting, and research network security solutions.
Computer network is nothing but a set of computers connected to each other, mainly for sharing information,data, programs and resources. Networking reduces the cost of doing business since resources are utilized to maximum extent. Broad categories of networking are LAN,WAN,MAN,STAR,BUS, Ring Topology among others.
For more such innovative content on management studies, join WeSchool PGDM-DLP Program: http://bit.ly/ZEcPAc
Learn Advanced Networking Course At PSK Technologies It Company Nagpur Download free syllabus :-https://www.pskitservices.com/free-internship-company-in-nagpur/
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Chapter 5 introduction to computer communication networks
1. Data Communication & Networking in
Manufacturing System
Data Communication & Networking in
Manufacturing System
N. A. Sutisna
PLM Consultant, IBM Indonesia
Lecturer, President University
2. Chapter 5
Introduction to computer
communication networks
Chapter 5
Introduction to computer
communication networks
Data Communication & Networking in
Manufacturing System
Data Communication & Networking in
Manufacturing System
3. Protocol
A protocol is a series of steps, involving two or more parties,
designed to accomplish a task
Everyone involved in the protocol must know the protocol and
all of the steps to follow in advance
Everyone in the protocol must agree to follow it
The protocol must be unambiguous; each step must be well
defined and there must be no chance of a misunderstanding.
The protocol must be complete; there must be a specified
action for every possible situation.
4. Communication Protocol Model
A template to describe a protocol
It has three components
Address: naming
Format: messages
Behavior: rules Protocol Model
Address:
- how to name a partner
Format:
- specify the message formats
Rules:
- specify the behaviors of the
protocol
- what should be done when
something happens
6. Can a single protocol do it all?
Computer communication has to deal all sorts of problems
Electrical/Optical signals/noise
Errror detection and recovery
medium control access
message boundary
routing, fragmentation
flow control (net congestion)
loss and duplicated messages
synchronization
representation
application specific
Yes. It can be done but
how to develop in timely fashion (debug, verify and low cost)
how to maintain it
how to extend and evolve it
7. Layered Approach
Divide and conquer
partition into multiple layers of software
each layer has clear programming interfaces
each interface provides a service to adjacent layers
each layer solves a limited set of problems
each layer encapsulates the related details
Pros
reduce complexity, isolate changes, promote
manageability
Cons
efficiency
8. ISO Reference Model
Not every layer is created equal
physical and data link are hardware heavy
network and transport are software heavy
session and presentation are typically light layers
Some functions occurs in
multiple layers:
+ Error handling may be in
every layer
+ Flow control can be in
multiple layers
Layer Number Layer Name Problems to Be Solved
7 Application layer application specific (Lab #2)
6 Presentation layer data representation (XDR)
5 Session layer synchronization & dialog (client/server)
4 Transport layer reliable delivery of messages (sockets)
3 Network layer routing & fragmentation
2 Data link layer medium access control & framing
1 Physical layer signaling, physical connections
9. ISO vs. TCP/IPISO vs. TCP/IP
1. Physical
2.Data Link
3.Network
4.Transport
5.Session
6.Presentation
7.Application
Host to
network
Internet
Transport
Application
10. Physical layer protocols
Highly physical network technology dependent
Main tasks
define the signaling protocol
what is the meaning of 1s or 0s
voltages or frequencies
what is bad signals
define the physical connections required
RS232 connectors for RS232 serial line communication
RJ45 or BNC connectors for Ethernet
define the communication media
define the network topology
11. Physical Network Technologies
Circuit-switched network (CS)
connection-oriented network
establish connection before communication
once communication established, a circuit line is
reserved for the communicating partners
example: telephone network
Packet-switched network (PS)
store-forward based network
packet sent from a node to another node
the intermediate node stores the packet and decides to
forward to another node towards the destination
no circuit line is reserved
example: Ethernet
12. Circuit connection
in out
In Out
3 2
4 1
Routing table
In Out
2 4
Routing table
In Out
2 4
Routing table
In Out
2 2
3 4
Routing table
Host A
Host B
13. Comparisons: CS and PS
Circuit-switched Packet-switched
line resource dedicated shared
performance guaranteed averaged
cost expensive less
adaptive routing not easy easy
switch device highly complex simple
reliability high higher
utilization low higher
14. Network Types by Scope
WAN
wide area network
cross large span of space (continental)
typically heterogeneous and low speed
example: Internet
MAN
metro-area network
regional scope (city-wide)
LAN
local area network
limited scope (a couple of buildings)
typically homogeneous & high speed
example: Ethernet & Token ring
15. Network Transmission Medium
Open air
radio, microwaves, satellites, infrared
noise signals, collision
Optical
clear signals, low power and high rate (Gbps)
Copper wire
Lower cost interfaces
Bi-directional
16. Bus Network Topology
Every nodes tap into a common medium
Signals may collide with each other
need to arbitrate who will get the bus
capable of broadcasting message (one send & many listen)
the common medium is the bottleneck
single node failure causes no network failure
the medium failure brings down the network
Example: (old, 10BASE2, 10BASE5) Ethernet
common medium
18. Star Network Topology
One node at the center as the master node
Other nodes linked to the master as slaves
slaves communicate via master
easy to arbitrate among slaves (master decides)
not scalable (the master is the bottleneck)
normally for small networks or that requires predictable
performance
master failure shutdowns the whole net
Example: Ethernet, DSL
Master
slave
slave
slave
slave slave
19. Ring Network TopologyRing Network Topology
Nodes are arranged in a ring
One node receives from its predecessor &
sends to its successor
• arbitrate who can access the ring
• messages forwarded by each node
• sender deletes its messages from the ring
• the common ring is the single point of failure (complicated
connectors needed)
20. Mash Network TopologyMash Network Topology
Nodes are arranged in grids
• each node can talk to its neighbors directly
• non-neighbor nodes needs store-and-forward for
communication
21. Hyper Network TopologyHyper Network Topology
No restrictions on how to link the nodes
Topology can adapt to individual organization
needs
Master
slave
slave
slave
slave slave
22. Data Link Layer Protocols
Main tasks
medium access control
arbitrate who can use the transmission medium
framing
define the boundaries of a packet
Physical technology dependent (like physical layer)
typically implemented in hardware or firmware
when you buy a network card, you get both physical
and data link layer protocols in the card
23. Introduction to Internet and
TCP/IP
Introduction to Internet and
TCP/IP
Data Communication & Networking in
Manufacturing System
Data Communication & Networking in
Manufacturing System
24. Motivations for Internet
Observations:
Different physical networks everywhere
connection between limited hosts
different needs for different technologies
legacy networks
Limited connectivity
each physical technology has its limits
Different technologies use different “languages”
Need for a uniform virtual network
universal connectivity
every host speaks the same language independent of
physical networks
25. Virtual Network over Physical Networks
…...Ethernet Token Ring
ATM
(Asynchronous Transfer Mode)
Internet Protocol (Network layer)
Internet
Virtual network
Physical network
hosts
26. Design Goals of Internet
A virtual (global) network
independent of physical technologies
independent of locations
universal language
Universal connectivity
every host is equal no matter of
its architecture and system origin
its physical network attachment
Scalable
growth without limits
Robust
no single point of failure
27. Problems to be Solved
Universal naming
how to translate the universal name to local name
used by local physical network?
Routing
how to route IP packages among different local
networks to reach the destination?
Fragmentation
different physical networks use different package
sizes.
how this should be handled?
Error handling
28. Internet Architecture
Internet: ‘‘the mother of all
networks’’
THE network of (interconnected) networks
Physical networks interconnected via gateways
Gateway(router) is a host glues nets together
attached to multiple nets
forward IP packages between nets
Token Ring
Gateway
Ethernet
Other nets Gateway
29. IP Packet Format
IP packet consists of header and data portions
IP header IP data portion
V HL type total length
Identification F frag. offset
TTL prot header cksum
Source IP address
Destination IP address
options if any
IP Header Format
30. IP Address
IP address specifies a connection to a network instead
of a host
IP address == NetID + HostID
Dotted notation
each byte in an IP address represented as a decimal
bytes are separated with a period (.)
example: 152.15.35.44
Classes
0 8 16 24 31
0 NetID HostID
10 NetID HostID
110 NetID HostID
1110 Multicast address
11110 reserved for future use
class A
class B
class C
class D
class E
31. How do computers talk to each other
on an ethernet bus
Each computer on the internet as a unique IP address.
Each network interface (e.g. ethernet card) has a unique
address
8.2.1.1 wants to send a message 8.2.1.3
It yells “yaahoo, who is 8.1.2.3”
Each computer listens to messages on the bus (collision detection
and resolution) for “yaahoo”
8.2.1.3 replies to 00550DA2F5D82 “I am 02950JX2F5Y82”
8.2.1.1 sends the message to 8.2.1.3.
8.2.1.1 8.2.1.2 8.2.1.3
00550DA2F5D82 02550JA2F5D82 02950JX2F5Y82
32. IP Routing
Principles
Route packages according to their destination IP net ID
Forward packages hop by hop
each gateway has the routing knowledge of its nearby
neighbors
hosts route packages to gateway and gateway does the rest.
Routing types
direct routing
If the destination net ID is the same as the local net ID, no
routing to gateway is needed and send the package via
underlying physical network
indirect routing
if the destination net ID is different from the local net ID, send
the package to an appropriate gateway.
33. IP Rules
Fragmentation rules
if underlying net size < packet size & not final dest
break packet into small packets and send them
if final dest is reached & packets are fragmented
reassemble fragmental packets into original size
Error rules
if IP header is erroneous, drop/report it
34. Table-Driven IP Routing
Each IP host has a IP routing table
each entry associates a destination net ID with a
forwarding gateway
each route has a performance metrics
number of hops to reach the destination
Route table for 152.15.36.9
152.15.x.x
uncc
ncsu
152.15.254.254
163.29.x.x
163.29.10.88
152.15.36.9
152.15.35.1
net3
e0
Dest. Net ID Next hop host NIF
163.29 152.15.254.2
54
e0
Default 152.15.35.1 e0
35. Routes in an IP Routing Table
Next-hop routes
the destination is an IP net ID: a packages
addressed to any host in the net, send to the
associated gateway
Host-specific routines
the destination is a complete IP address: route all
packages to the specified host via the associated
gateway
Default routes
the catch all routing: all packages not specified by
the above, send the gateway associated with the
default route.
the gateway associated with the default route is
called default gateway
36. Topology of the internet
net: 9.1.1.x
net: 8.2.1.x
9.1.1.3
net 1.1.1.x
net 2.1.1.x
net 3.1.1.x
9.1.1.2
9.1.1.4
9.1.1.1
8.2.1.1
8.2.1.2 8.2.1.3
8.2.1.4
d
c
b
a
1 2 3
4
hardware addresses
37. Sub-netting
All hosts in a network must have the
same net work number
As the number of networks grow, so
does the need for net work numbers
Solution: subnet, divide the host name
portion of the IP address into subnet id
and the host
Subnet mask and routing table.
38. Intranet example: home networkingIntranet example: home networking
Router
PC
PC
PC
Broadband
provider
Internet
Internet IP
Address
Intranet IP
address
Intranet IP
address
Intranet IP
address
Intranet IP
address
39. PPP protocol (phone dialin)
Computer (client) dials to a modem.
Computer on the other (ISP server) end
is on the internet.
The ISP server assigns an ip address for
the dialing computer
All messages send from the client are
routed by the isp host to the rest of the
internet.
40. DHCP protocol (most ethernet)
Client sends a message (on the local
bus) to a DHCP server requesting an IP
address for the session
DHCP server assigns an ip address
41. IP Fragmentation
IP packages are broken to fit underlying physical network
when a package is sent
locations of fragmentation
original package sender
gateways that forward the package
IP packages are reassembled at the final destination
gateway
fragment
net 1 net 2
assemble
42. IP Fragmentation Example
IP header 800 bytes 800 bytes 250 bytes
Original IP datagram
IP header
(fragment 1)
IP header
(fragment 2)
IP header
(fragment 3)
800 bytes
800 bytes
250 bytes
Fragment 1 (offset 0)
Fragment 2 (offset 800)
Fragment 3 (offset 1600)
fragmentation
43. ISO vs. TCP/IPISO vs. TCP/IP
1. Physical
2.Data Link
3.Network
4.Transport
5.Session
6.Presentation
7.Application
Host to
network
Internet
Transport
Application
44. Transport Layer
Why do we need a transport layer?
Network layer provides delivery only
from a host to a host
in a best effort fashion
Users want to transport data
from application to application
in a reliable delivery
Transport layer fits the gap between user needs and IP
messaging
provide communication endpoint for applications
deliver messages reliably
45. Problems to Be Solved in Transportation
layer
Missing packets
Duplicated packets
Out of order packets
Flow control
Synchronization
46. Reliable Delivery via Unreliable
Networks
Missing packet
acknowledge and timeout
retransmission
Duplicate messages
sequencing packets
Out of order messages
sequencing packets
Flow control
wait and stop
window-sliding
Synchronization
hand shaking
47. Transport Protocols in TCP/IP
User Datagram Protocol (UDP)
provide communication endpoint for applications
best effort delivery of messages (packets)
message boundary is observed
the protocol embedded in Internet Datagram sockets
Transmission Control Protocol (TCP)
provide communication endpoint for applications
reliable delivery via connection-based
communication
no message boundary between packages
the protocol embedded in Internet Stream sockets
49. Denial of service attacksDenial of service attacks
Exploits the TCP session establishment
protocol.
An attacker will send syn, but never sends
ack. This type of attack is also called “sync
flood”.
Synchronized attacks launched on multiple
(often victim) machines.
50. TCP Retransmission
Sender
is free to divide user stream data in packets
expects an ack for each packet sent
starts a timer when a packet is sent
upon an ack reception, advances seq_no expected
upon a timer expiration, resends the packet
Receiver
sends an ack whenever a packet is received
deletes the packet if it duplicated
is free to pass acknowledged packets to user
is forced to pass to user the data when receives a
PUSH