SlideShare a Scribd company logo
IE 20303 Technology Infrastructure for E-Commerce  i.E Business Data Communication & Networking By MohdYuszrenYusak Google me up,Iā€™m on Facebook, Twitter & I have a blog.
First things first  Non fiction-no vampires inside ā€œexamines the factors that contribute to high levels of successā€ Problems? See me ASAP! Tweet with me! yuszrenIE20303 We need to see the world from a different perspective MORE often!- ie class trip anyone? Class starts @ 8.30am starting next week. Any objections? This is your ā€˜defining momentā€™ semester. Less         fooling around please! Anyone interested in ā€˜Outliersā€ by Malcolm Gladwell? MDEC Monday Class time. Iā€™ll stop your marketing class.
Assessments Quiz-10% Work-10% ?(trip report?) 2 Group Work-40% (20% each) ?  40%-Finals
Intro to Data Communications Basic concept of data Why important to study-the value, opportunities upon graduation. Career opportunities. Future trends
Brief History Samuel Morse, Alex Graham Bell Thomas Edison- basic electrical & electronic systems evolve into voice and data communication networks. Read-notes. Why bother about  history? Because history contributes to moral understanding.
Career Opportunities
Ā© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. 9 PART I    Introduction and Internet Applications
Ā© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. 10 Topics Covered 1.1 Growth of Computer Networking 1.2 Why Networking Seems Complex 1.3 The Five Key Aspects of Networking 1.4 Public and Private Parts of the Internet 1.5 Networks, Interoperability, and Standards 1.6 Protocol Suites and Layering Models 1.7 How Data Passes Through Layers 1.8 Headers and Layers 1.9 ISO and the OSI Seven-Layer Reference Model 1.10 The Inside Scoop 1.11 Remainder of the Text 1.12 Summary
Ā© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. 11 1.1 Growth of Computer Networking Computer networking has grown explosively Since the 1970s, computer communication has changed from a research topic to an essential part of infrastructure Networking is used in every aspect of our lives: Business Advertising  Production  Shipping Planning Billing Accounting Educational institutions are using computer networks to provide students and teachers with access to online information Federal, state, and local government offices use networks
Ā© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. 12 1.1 Growth of Computer Networking In short, computer networks are everywhere In 1980, the Internet was a research project that involved a few dozen sites Today, the Internet has grown into a communication system that reaches all of the world The advent and utility of networking has created dramatic economic shifts Network has made telecommuting available to individuals It has changed business communication An entire industry emerged that develops networking technologies, products, and services The importance of computer networks has produced a demand in all industries for people with more networking expertise Companies need workers to plan, acquire, install, operate, and manage the hardware and software systems for networks
Why Research Network? To achieve better network robustness & disaster survivability. How? Packet switching technology at ARPANET = funded by the US Department of Defense (DARPA).
use of a decentralized network with multiple paths between any two points; and second, dividing complete user messages into what he called message blocks before sending them into the network. This first allowed the elimination of single points of failure, and enabled the network to automatically and efficiently work around any failures. Strike 1 The White House Telco Chicago Strike 2 The Pentagon
Ā© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. 15 1.2 Why Networking Seems Complex The networking subject seems complex, because Many technologies exist Each technology has features that distinguish it from the others Companies create commercial network products and services  often by using technologies in new unconventional ways Computer networks seem complex  because technologies can be combined and interconnected in many ways Computer networks can be especially confusing to a beginner because No single underlying theory exists that explains the relationship among all parts Multiple organizations have created computer networks standards some standards are incompatible with others Various organizations have attempted to define conceptual models The set of technologies is diverse and changes rapidly models are either so simplistic that they do not distinguish among details  or so complex that they do not help simplify the subject
Ā© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. 16 1.2 Why Networking Seems Complex The lack of consistency in the field has produced another challenge for beginners:  Multiple groups each attempt to create their own terminology Researchers cling to scientifically precise terminology Marketing teams ofteninvent new terms to distinguish their products or services from others Technical terms are confused with the names of popular products Professionals sometimes use a technical term from one technology when referring to an analogous feature of another technology A large set of terms and acronyms that contains many synonyms Computer networking jargon contains terms that are often abbreviated, misused, or associated with products
Ā© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. 17 1.3 The Five Key Aspects of Networking To master the complexity, it is important to gain a broad background that includes five key aspects: 1.3.1  Network Applications and Network Programming 1.3.2  Data Communications     1.3.3  Packet Switching and Networking Technologies      1.3.4  Internetworking with TCP/IP 1.3.5 Additional Networking Concepts and Technologies   These topics will be covered throughout the book In this chapter a brief introduction will be given
1.3.1  Network Applications and Network Programming      Network services are provided by an application software an application on one computer communicates across a network with an application program running on another computer Network applications span a wide range, such as: email  file transfer  web browsing  voice telephone calls (VoIP) distributed databases audio/video teleconferencing Each application offers a specific service with its own form of user interface But all applications can communicate over a single, shared network Ā© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. 18
1.3.1  Network Applications and Network Programming      A unified underlying network that supports all applications makes a programmer's job much easier only programmer needs to learn about one interface to network and one basic set of functions to be used it is possible to understand network applications, and even possible to write code that communicates over a network, without understanding the hardware/software technologies once a programmer masters the interface, no further knowledge of networking may be needed However, knowledge of the underlying network system allows a programmer to write better code and develop more efficient applications Ā© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. 19
1.3.2  Data Communications Data communications refers to the study of low-level mechanisms and technologies used to send information across a physical communication medium such as a wire, radio wave, or light beam Data communications focuses on ways to use physical phenomena to transfer information  the subject may only seem useful for engineers who design low-level transmission facilities However, we will see that several key concepts that arise from data communications influence the design of many protocol layers Data communications provides a foundation of concepts on which the rest of networking is built 20 Ā© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.
1.3.3  Packet Switching and Networking Technologies     In 1960s, the packet switching concept revolutionized data communications Early communication networks had evolved from telegraph and telephone systems  A physical pair of wires between two parties to form a dedicatedcircuit Although mechanical connection of wires was being replaced by electronic switches, but the underlying paradigm remained the same: form a circuit and then send information across the circuit Packet switching changed networking in a fundamental way It provided the basis for the modern Internet Packet switching allows multiple users to share a network Packet switching divides data into small blocks, called packets It includes an identification of the intended recipient in each packet Devices throughout the network each have information about how to reach each possible destination Ā© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. 21
1.3.3  Packet Switching and Networking Technologies     Many designs for packet switching are possible But there is a need for answers to basic questions: How should a destination be identified? How can a sender find the identification of a destination? How large should a packet be? How can a network recognize the end of one packet? How can a network recognize the beginning of another packet? If a network is shared, then how can they coordinate to insure that each receives a fair opportunity to send? How can packet switching be adapted to wireless networks? How can network technologies be designed to meet various requirements for speed, distance, and economic cost? Many packet switching technologies have been created to meet various requirements for speed, distance, and economic cost Ā© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. 22
1.3.4  Internetworking with TCP/IP In the 1970s, another revolution in computer networks arose: Internet In 1973, Vinton Cerf and Robert Kahn observed that  no single packet switching technology would ever satisfy all needs especially because it would be possible to build low-capacity technologies for homes or offices at extremely low cost They suggested to stop trying to find a single best solution Instead, explore interconnecting many packet switching technologies into a functioning whole They proposed a set of standards be developed for such an interconnection The resulting standards became known as the TCP/IP Internet Protocol Suite (usually abbreviated TCP/IP) The success of TCP/IP lies in its tolerance of heterogeneity TCP / IP takes a virtualization approach  that defines a network-independent packet and a network-independent identification scheme Ā© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. 23
Ā© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. 24 1.4 Public and Private Parts of the Internet The Internet consists of parts that are owned and operated by individuals or organizations From ownership point of view, we can categorize networks 1.4.1  Public Networks       1.4.2  Private Networks   A  public network is run as a service that is available to subscribers Any individual or corporation who pays the subscription fee can use A company that offers service is known as a service provider Public refers to the general availability of service, not to the data being transferred A private network is controlled by one particular group network use is restricted to one group a private network can include circuits leased from a provider
1.4.2  Private Network Network vendors generally divide private networks into four categories based on the size: Consumer Small Office / Home Office (SOHO) Small-to-Medium Business (SMB) Large Enterprise These categories are related to sales and marketing the terminology is loosely defined it is possible to give a qualitative description of each type but one cannot find an exact definition Ā© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. 25
Ā© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. 26 1.5 Networks, Interoperability, and Standards Communication always involves at least two entities one that sends information and another that receives it All entities in a network must agree on how information will be represented and communicated Communication agreements involve many details the way that electrical signals are used to represent data procedures used to initiate and conduct communication,  and the format of messages An important issue is interoperability it refers to the ability of two entities to communicate All communicating parties agree on details and follow the same set of rules, an exact set of specifications Communication protocol, network protocol, or simply protocol to refer to a specification for network communication A protocol specifies the details for one aspect of communication including actions to be taken when errors or unexpected situations arise
Ā© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. 27 1.6 Protocol Suites and Layering Models A set of protocols must be constructed to ensure that the resulting communication system is complete and efficient Each protocol should handle a part of communication not handled by other protocols How can we guarantee that protocols work well together? Instead of creating each protocol in isolation, protocols are designed in complete, cooperative sets called suites or families Each protocol in a suite handles one aspect of networking The protocols in a suite cover all aspects of communication The entire suite is designed to allow the protocols to work together efficiently
Ā© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. 28 1.6 Protocol Suites and Layering Models The fundamental abstraction used to collect protocols into a unified whole is known as a layering model All aspects of a communication problem can be partitioned into pieces that work together each piece is known as a layer Dividing protocols into layers helps both protocol designers and implementers manage the complexity  to concentrate on one aspect of communication at a given time Figure 1.1 illustrates the concept  by showing the layering model used with the Internet protocols Later chapters will help us understand layering  by explaining protocols in detail For now, it is sufficient to learn the purpose of each layer and how protocols are used for communication
Ā© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. 29 1.6 Protocol Suites and Layering Models
Ā© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. 30 1.6 Protocol Suites and Layering Models Physical Layer (Layer 1) specify details about the underlying transmission medium and hardware all specifications related to electrical properties, radio frequencies, and signals belong in layer 1 Network Interface Layer (Layer 2) some publications use the term Data Link specify details about communication between higher layers of protocols (implemented in SW) and the underlying network (implemented in hardware) specifications about  network addresses maximum packet size that a network can support protocols used to access the underlying medium and hardware addressing
Ā© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. 31 1.6 Protocol Suites and Layering Models Internet Layer (Layer 3) Protocols in the Internet layer form the fundamental basis for the Internet Layer 3 protocols specify communication across the Internet (spanning multiple interconnected networks) Transport Layer (Layer 4) Provide for communication from an application program on one computer to an application program on another Includes specifications on controlling the maximum rate a receiver can accept data mechanisms to avoid network congestion techniques to insure that all data is received in the correct order
Ā© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. 32 1.6 Protocol Suites and Layering Models Application Layer (Layer 5) specify how a pair of applications interact when they communicate specify details about  the format and  the meaning of messages that applications can exchange the procedures to be followed Some examples of network applications in layer 5 email exchange file transfer web browsing telephone services and video teleconferencing
Ā© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. 33 1.7 How Data Passes Through Layers Protocol implementations follow the layering model  by passing the output from a protocol in one layer to the input of a protocol in the next  To achieve efficiency rather than copy an entire packet a pair of protocols in adjacent layers pass a pointer to the packet Figure 1.2 illustrates layered protocols on the two computers Each computer contains a set of layered protocols When an application sends data it is placed in a packet, and the packet passes down through each layer of protocols Once it has passed through all layers of protocols on the sending computer the packet leaves the computer and is transmitted across the physical network When it reaches the receiving computer the packet passes up through the layers of protocols If the application on the receiver sends a response, the process is reversed
Ā© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. 34 1.7 How Data Passes Through Layers
Ā© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. 35 1.8 Headers and Layers Each layer of protocol software performs computations that insure the messages arrive as expected To perform such computation, protocol software on the two machines must exchange information each layer on the sender prepends extra information onto the packet the corresponding protocol layer on the receiver removes and uses the extra information Additional information added by a protocol is known as a header Headers are added by protocol software on the sending computer That is, the Transport layer prepends a header, and then the Internet layer prepends a header, and so on If we observe a packet traversing the network, the headers will appear in the order that Figure 1.3 illustrates Although the figure shows headers as the same size in practice headers are not of uniform size and a physical layer header is optional
Ā© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. 36 1.8 Headers and Layers
Ā© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. 37 1.9 ISO and the OSI Seven-Layer Reference Model At the same time the Internet protocols were being developed, two large standards bodies jointly formed an alternative reference model They also created a set of internetworking protocols These organizations are: International Standardization Organization (ISO)  International Telecommunications Union,Telecommunication (ITU-T) The ITU was known as the Consultative Committee for International Telephone and Telegraph (CCITT) The ISO layering model is known as the Open Systems Interconnection (OSI) Seven-Layer Reference Model Figure 1.4 illustrates the seven layers in the model
Ā© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. 38 1.9 ISO and the OSI Seven-Layer Reference Model
Ā© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. 39 1.10 The Inside Scoop ISO and the ITU use a process that accommodates as many viewpoints as possible when creating a standard As a result, some standards can appear to have been designed by a committee making political compromises rather than by engineers and scientists The seven-layer reference model is controversial It did indeed start as a political compromise the model and the OSI protocols were designed as competitors for the Internet protocols ISO and the ITU are huge standards bodies that handle the world-wide telephone system and other global standards The Internet protocols and reference model were created by a small group of about a dozen researchers It is easy to see why the standards organizations might be confident that they could dictate a set of protocols and everyone would switch away from protocols designed by researchers At one point, even the U.S. government was convinced that TCP/IP should be replaced by OSI protocols
Ā© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. 40 1.10 The Inside Scoop Eventually, it became clear that TCP/IP technology was technically superior to OSI and efforts to develop and deploy OSI protocols were terminated Standards bodies were left with the seven-layer model Advocates for the seven-layer model have tried to stretch the definitions to match TCP/IP They argue that layer three could be considered an Internet layer and that a few support protocols might be placed into layers five and six Perhaps the most humorous part of the story is that many engineers still refer to applications as layer 7 protocols even when they know that layers five and six are unfilled and unnecessary
Individual work #1 (10%) Get a copy from Pej Am SSIL 5th floor by 11.am Due 4.30pm today.
Group Work #1 (10%) Next week-task will be given during the 1st hour of class time. Be there! Sit in Groups  Short presentation Refer week 1 slides. Good luck!

More Related Content

What's hot

Internet Architecture and Design Philosophy
Internet Architecture and Design PhilosophyInternet Architecture and Design Philosophy
Internet Architecture and Design Philosophy
Dilum Bandara
Ā 
Computer networks
Computer networksComputer networks
Computer networks
Shamima Akther
Ā 
network
networknetwork
network
wajeehasagheer
Ā 
Chapter 1 v n.2
Chapter 1 v n.2Chapter 1 v n.2
Chapter 1 v n.2
onlyvimal
Ā 
Networking course khurram shahzad
Networking course khurram shahzadNetworking course khurram shahzad
Networking course khurram shahzad
khurrak_shahzad
Ā 
Network Trends
Network TrendsNetwork Trends
Network Trends
Arun ACE
Ā 
IRM GROUP 2 CHAPTER 2
IRM GROUP 2 CHAPTER 2IRM GROUP 2 CHAPTER 2
IRM GROUP 2 CHAPTER 2Rexon Calub
Ā 
Introduction to computer Networks
Introduction to computer NetworksIntroduction to computer Networks
Introduction to computer Networks
ShohanaakterKakon
Ā 
Computer Networks By NADEEM AHMED
Computer Networks By NADEEM AHMED Computer Networks By NADEEM AHMED
Computer Networks By NADEEM AHMED
NA000000
Ā 
NETWORK STANDARD
NETWORK STANDARDNETWORK STANDARD
NETWORK STANDARD
Kak Yong
Ā 
Information Systems for management
Information Systems for managementInformation Systems for management
Information Systems for management
Shareef AP
Ā 
Introduction to computer networks
 Introduction to computer networks Introduction to computer networks
Introduction to computer networks
Aequitas Information Technology Pvt. Ltd.
Ā 
networking concepts
networking conceptsnetworking concepts
networking concepts
mtguillermo
Ā 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer network
Sudhriti Gupta
Ā 
fmxhnkmcjbg,lBasics of network
fmxhnkmcjbg,lBasics of networkfmxhnkmcjbg,lBasics of network
fmxhnkmcjbg,lBasics of network
ammulu99
Ā 
Networking tutorial
Networking tutorialNetworking tutorial
Networking tutorialajaymane22
Ā 
PACE-IT: The OSI Networking Reference Model
PACE-IT: The OSI Networking Reference ModelPACE-IT: The OSI Networking Reference Model
PACE-IT: The OSI Networking Reference Model
Pace IT at Edmonds Community College
Ā 
Classification of Computer Network
Classification of Computer NetworkClassification of Computer Network
Classification of Computer Network
City University, Dhaka, Bangladesh
Ā 
Introduction to computer networks ppt download
Introduction to computer networks   ppt downloadIntroduction to computer networks   ppt download
Introduction to computer networks ppt download
zanetorserwaah
Ā 

What's hot (19)

Internet Architecture and Design Philosophy
Internet Architecture and Design PhilosophyInternet Architecture and Design Philosophy
Internet Architecture and Design Philosophy
Ā 
Computer networks
Computer networksComputer networks
Computer networks
Ā 
network
networknetwork
network
Ā 
Chapter 1 v n.2
Chapter 1 v n.2Chapter 1 v n.2
Chapter 1 v n.2
Ā 
Networking course khurram shahzad
Networking course khurram shahzadNetworking course khurram shahzad
Networking course khurram shahzad
Ā 
Network Trends
Network TrendsNetwork Trends
Network Trends
Ā 
IRM GROUP 2 CHAPTER 2
IRM GROUP 2 CHAPTER 2IRM GROUP 2 CHAPTER 2
IRM GROUP 2 CHAPTER 2
Ā 
Introduction to computer Networks
Introduction to computer NetworksIntroduction to computer Networks
Introduction to computer Networks
Ā 
Computer Networks By NADEEM AHMED
Computer Networks By NADEEM AHMED Computer Networks By NADEEM AHMED
Computer Networks By NADEEM AHMED
Ā 
NETWORK STANDARD
NETWORK STANDARDNETWORK STANDARD
NETWORK STANDARD
Ā 
Information Systems for management
Information Systems for managementInformation Systems for management
Information Systems for management
Ā 
Introduction to computer networks
 Introduction to computer networks Introduction to computer networks
Introduction to computer networks
Ā 
networking concepts
networking conceptsnetworking concepts
networking concepts
Ā 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer network
Ā 
fmxhnkmcjbg,lBasics of network
fmxhnkmcjbg,lBasics of networkfmxhnkmcjbg,lBasics of network
fmxhnkmcjbg,lBasics of network
Ā 
Networking tutorial
Networking tutorialNetworking tutorial
Networking tutorial
Ā 
PACE-IT: The OSI Networking Reference Model
PACE-IT: The OSI Networking Reference ModelPACE-IT: The OSI Networking Reference Model
PACE-IT: The OSI Networking Reference Model
Ā 
Classification of Computer Network
Classification of Computer NetworkClassification of Computer Network
Classification of Computer Network
Ā 
Introduction to computer networks ppt download
Introduction to computer networks   ppt downloadIntroduction to computer networks   ppt download
Introduction to computer networks ppt download
Ā 

Viewers also liked

Seeing through learners' eyes
Seeing through learners' eyesSeeing through learners' eyes
Seeing through learners' eyes
UCD Library
Ā 
UCD Connect & the UCD Library - partners in communication : With an overview ...
UCD Connect & the UCD Library - partners in communication : With an overview ...UCD Connect & the UCD Library - partners in communication : With an overview ...
UCD Connect & the UCD Library - partners in communication : With an overview ...
UCD Library
Ā 
Roger matisse
Roger matisseRoger matisse
Roger matisseIrisat
Ā 
Strategic Partnerships: Irish Poetry Reading Archive and Library Exhibitions
Strategic Partnerships: Irish Poetry Reading Archive and Library ExhibitionsStrategic Partnerships: Irish Poetry Reading Archive and Library Exhibitions
Strategic Partnerships: Irish Poetry Reading Archive and Library Exhibitions
UCD Library
Ā 
PresentaciĆ³ de Web 2.0 a l'Ajuntament de Barcelona
PresentaciĆ³ de Web 2.0 a l'Ajuntament de BarcelonaPresentaciĆ³ de Web 2.0 a l'Ajuntament de Barcelona
PresentaciĆ³ de Web 2.0 a l'Ajuntament de Barcelona
Marc Garriga
Ā 
From Issue Desk to Information Desk: The UCD Journey
From Issue Desk to Information Desk: The UCD JourneyFrom Issue Desk to Information Desk: The UCD Journey
From Issue Desk to Information Desk: The UCD Journey
UCD Library
Ā 
Mobile2012 L2 Think Tank
Mobile2012 L2 Think TankMobile2012 L2 Think Tank
Mobile2012 L2 Think Tank
Henri Kaufman
Ā 
Importance of Editorial Calendar in Digital Marketing
Importance of Editorial Calendar in Digital MarketingImportance of Editorial Calendar in Digital Marketing
Importance of Editorial Calendar in Digital Marketing
Caylor Solutions, Inc.
Ā 
#iCanHazRobot?: improved robot detection for IR usage statistics
#iCanHazRobot?: improved robot detection for IR usage statistics#iCanHazRobot?: improved robot detection for IR usage statistics
#iCanHazRobot?: improved robot detection for IR usage statistics
UCD Library
Ā 
Presentation of iCity Project at Polytechnic University of Catalonia (Compute...
Presentation of iCity Project at Polytechnic University of Catalonia (Compute...Presentation of iCity Project at Polytechnic University of Catalonia (Compute...
Presentation of iCity Project at Polytechnic University of Catalonia (Compute...
Marc Garriga
Ā 
Let's Work Together: UCD Research, UCD Library & Altmetrics
Let's Work Together: UCD Research, UCD Library & AltmetricsLet's Work Together: UCD Research, UCD Library & Altmetrics
Let's Work Together: UCD Research, UCD Library & Altmetrics
UCD Library
Ā 
Is there a place for online social networking in teaching and learning? Autho...
Is there a place for online social networking in teaching and learning? Autho...Is there a place for online social networking in teaching and learning? Autho...
Is there a place for online social networking in teaching and learning? Autho...
UCD Library
Ā 
Smart society, Smart mobility
Smart society, Smart mobilitySmart society, Smart mobility
Smart society, Smart mobility
Marc Garriga
Ā 
Com fer efectiva la transparĆØncia?
Com fer efectiva la transparĆØncia?Com fer efectiva la transparĆØncia?
Com fer efectiva la transparĆØncia?
Marc Garriga
Ā 
Web 2.0: Xarxes Socials. Jornada tĆØcnica.
Web 2.0: Xarxes Socials. Jornada tĆØcnica.Web 2.0: Xarxes Socials. Jornada tĆØcnica.
Web 2.0: Xarxes Socials. Jornada tĆØcnica.
Marc Garriga
Ā 
Presentation #1ODataLicenseEU. LAPSI Seminar, Budapest
Presentation #1ODataLicenseEU. LAPSI Seminar, BudapestPresentation #1ODataLicenseEU. LAPSI Seminar, Budapest
Presentation #1ODataLicenseEU. LAPSI Seminar, Budapest
Marc Garriga
Ā 
Rafa
RafaRafa
RafaIrisat
Ā 
The Open Data movement. Challenges and issues.
The Open Data movement. Challenges and issues.The Open Data movement. Challenges and issues.
The Open Data movement. Challenges and issues.
Marc Garriga
Ā 
Ricardo i oualid dali
Ricardo i oualid  daliRicardo i oualid  dali
Ricardo i oualid daliIrisat
Ā 
Better Parking. Better Communities.
Better Parking. Better Communities.Better Parking. Better Communities.
Better Parking. Better Communities.
Mrinal Wadhwa
Ā 

Viewers also liked (20)

Seeing through learners' eyes
Seeing through learners' eyesSeeing through learners' eyes
Seeing through learners' eyes
Ā 
UCD Connect & the UCD Library - partners in communication : With an overview ...
UCD Connect & the UCD Library - partners in communication : With an overview ...UCD Connect & the UCD Library - partners in communication : With an overview ...
UCD Connect & the UCD Library - partners in communication : With an overview ...
Ā 
Roger matisse
Roger matisseRoger matisse
Roger matisse
Ā 
Strategic Partnerships: Irish Poetry Reading Archive and Library Exhibitions
Strategic Partnerships: Irish Poetry Reading Archive and Library ExhibitionsStrategic Partnerships: Irish Poetry Reading Archive and Library Exhibitions
Strategic Partnerships: Irish Poetry Reading Archive and Library Exhibitions
Ā 
PresentaciĆ³ de Web 2.0 a l'Ajuntament de Barcelona
PresentaciĆ³ de Web 2.0 a l'Ajuntament de BarcelonaPresentaciĆ³ de Web 2.0 a l'Ajuntament de Barcelona
PresentaciĆ³ de Web 2.0 a l'Ajuntament de Barcelona
Ā 
From Issue Desk to Information Desk: The UCD Journey
From Issue Desk to Information Desk: The UCD JourneyFrom Issue Desk to Information Desk: The UCD Journey
From Issue Desk to Information Desk: The UCD Journey
Ā 
Mobile2012 L2 Think Tank
Mobile2012 L2 Think TankMobile2012 L2 Think Tank
Mobile2012 L2 Think Tank
Ā 
Importance of Editorial Calendar in Digital Marketing
Importance of Editorial Calendar in Digital MarketingImportance of Editorial Calendar in Digital Marketing
Importance of Editorial Calendar in Digital Marketing
Ā 
#iCanHazRobot?: improved robot detection for IR usage statistics
#iCanHazRobot?: improved robot detection for IR usage statistics#iCanHazRobot?: improved robot detection for IR usage statistics
#iCanHazRobot?: improved robot detection for IR usage statistics
Ā 
Presentation of iCity Project at Polytechnic University of Catalonia (Compute...
Presentation of iCity Project at Polytechnic University of Catalonia (Compute...Presentation of iCity Project at Polytechnic University of Catalonia (Compute...
Presentation of iCity Project at Polytechnic University of Catalonia (Compute...
Ā 
Let's Work Together: UCD Research, UCD Library & Altmetrics
Let's Work Together: UCD Research, UCD Library & AltmetricsLet's Work Together: UCD Research, UCD Library & Altmetrics
Let's Work Together: UCD Research, UCD Library & Altmetrics
Ā 
Is there a place for online social networking in teaching and learning? Autho...
Is there a place for online social networking in teaching and learning? Autho...Is there a place for online social networking in teaching and learning? Autho...
Is there a place for online social networking in teaching and learning? Autho...
Ā 
Smart society, Smart mobility
Smart society, Smart mobilitySmart society, Smart mobility
Smart society, Smart mobility
Ā 
Com fer efectiva la transparĆØncia?
Com fer efectiva la transparĆØncia?Com fer efectiva la transparĆØncia?
Com fer efectiva la transparĆØncia?
Ā 
Web 2.0: Xarxes Socials. Jornada tĆØcnica.
Web 2.0: Xarxes Socials. Jornada tĆØcnica.Web 2.0: Xarxes Socials. Jornada tĆØcnica.
Web 2.0: Xarxes Socials. Jornada tĆØcnica.
Ā 
Presentation #1ODataLicenseEU. LAPSI Seminar, Budapest
Presentation #1ODataLicenseEU. LAPSI Seminar, BudapestPresentation #1ODataLicenseEU. LAPSI Seminar, Budapest
Presentation #1ODataLicenseEU. LAPSI Seminar, Budapest
Ā 
Rafa
RafaRafa
Rafa
Ā 
The Open Data movement. Challenges and issues.
The Open Data movement. Challenges and issues.The Open Data movement. Challenges and issues.
The Open Data movement. Challenges and issues.
Ā 
Ricardo i oualid dali
Ricardo i oualid  daliRicardo i oualid  dali
Ricardo i oualid dali
Ā 
Better Parking. Better Communities.
Better Parking. Better Communities.Better Parking. Better Communities.
Better Parking. Better Communities.
Ā 

Similar to Ie20303week1

COMPUTER NETWORKS NOTES usefull for computer and elctronics students
COMPUTER NETWORKS NOTES usefull for computer and elctronics studentsCOMPUTER NETWORKS NOTES usefull for computer and elctronics students
COMPUTER NETWORKS NOTES usefull for computer and elctronics students
Gorra Narsimhulu
Ā 
COMPUTER NETWORKS NOTES.pdf
COMPUTER NETWORKS NOTES.pdfCOMPUTER NETWORKS NOTES.pdf
COMPUTER NETWORKS NOTES.pdf
GyanendraSingh189549
Ā 
Essay On Network Security
Essay On Network SecurityEssay On Network Security
Setting-up-Computer-Networks in CSS subject
Setting-up-Computer-Networks in CSS subjectSetting-up-Computer-Networks in CSS subject
Setting-up-Computer-Networks in CSS subject
AnneilynLeal
Ā 
6.Copyright Ā© 2016 Pearson Education, Inc. publishing as .docx
6.Copyright Ā© 2016 Pearson Education, Inc. publishing as .docx6.Copyright Ā© 2016 Pearson Education, Inc. publishing as .docx
6.Copyright Ā© 2016 Pearson Education, Inc. publishing as .docx
alinainglis
Ā 
Networking Essay Example
Networking Essay ExampleNetworking Essay Example
Networking Essay Example
Write My Thesis Paper Thornton
Ā 
1-introduction-to-computer-networking.ppt
1-introduction-to-computer-networking.ppt1-introduction-to-computer-networking.ppt
1-introduction-to-computer-networking.ppt
MemMem25
Ā 
Network Topologies And The Network
Network Topologies And The NetworkNetwork Topologies And The Network
Network Topologies And The Network
Kim Moore
Ā 
Routers and Routing Basic Module 1
Routers and Routing Basic Module 1Routers and Routing Basic Module 1
Routers and Routing Basic Module 1
paolo374233
Ā 
Data communication
Data communicationData communication
Data communication
Marlon Newell
Ā 
Internet
Internet Internet
Internet
Saroj Meera Singh
Ā 
Optimization Technologies for Low-Bandwidth Networks
Optimization Technologies for Low-Bandwidth NetworksOptimization Technologies for Low-Bandwidth Networks
Optimization Technologies for Low-Bandwidth Networks
IOSR Journals
Ā 
C010130917
C010130917C010130917
C010130917
IOSR Journals
Ā 
Case Study Ups
Case Study UpsCase Study Ups
Case Study Ups
Jennifer Campbell
Ā 
What is internet architecture? - (Darren's Study Guide: CompTIA A+, 220-1001 ...
What is internet architecture? - (Darren's Study Guide: CompTIA A+, 220-1001 ...What is internet architecture? - (Darren's Study Guide: CompTIA A+, 220-1001 ...
What is internet architecture? - (Darren's Study Guide: CompTIA A+, 220-1001 ...
BDDazza
Ā 
Essay On NT1210- Unit 3 Assignment 1
Essay On NT1210- Unit 3 Assignment 1Essay On NT1210- Unit 3 Assignment 1
Essay On NT1210- Unit 3 Assignment 1
Lakeisha Jones
Ā 
Computer Network Unit I RGPV
Computer Network Unit I RGPV Computer Network Unit I RGPV
Computer Network Unit I RGPV
NANDINI SHARMA
Ā 
The Improvement and Performance of Mobile Environment using Both Cloud and Te...
The Improvement and Performance of Mobile Environment using Both Cloud and Te...The Improvement and Performance of Mobile Environment using Both Cloud and Te...
The Improvement and Performance of Mobile Environment using Both Cloud and Te...
IJwest
Ā 
The improvement and performance
The improvement and performanceThe improvement and performance
The improvement and performance
csandit
Ā 

Similar to Ie20303week1 (20)

COMPUTER NETWORKS NOTES usefull for computer and elctronics students
COMPUTER NETWORKS NOTES usefull for computer and elctronics studentsCOMPUTER NETWORKS NOTES usefull for computer and elctronics students
COMPUTER NETWORKS NOTES usefull for computer and elctronics students
Ā 
COMPUTER NETWORKS NOTES.pdf
COMPUTER NETWORKS NOTES.pdfCOMPUTER NETWORKS NOTES.pdf
COMPUTER NETWORKS NOTES.pdf
Ā 
Essay On Network Security
Essay On Network SecurityEssay On Network Security
Essay On Network Security
Ā 
Setting-up-Computer-Networks in CSS subject
Setting-up-Computer-Networks in CSS subjectSetting-up-Computer-Networks in CSS subject
Setting-up-Computer-Networks in CSS subject
Ā 
6.Copyright Ā© 2016 Pearson Education, Inc. publishing as .docx
6.Copyright Ā© 2016 Pearson Education, Inc. publishing as .docx6.Copyright Ā© 2016 Pearson Education, Inc. publishing as .docx
6.Copyright Ā© 2016 Pearson Education, Inc. publishing as .docx
Ā 
Networking Essay Example
Networking Essay ExampleNetworking Essay Example
Networking Essay Example
Ā 
1-introduction-to-computer-networking.ppt
1-introduction-to-computer-networking.ppt1-introduction-to-computer-networking.ppt
1-introduction-to-computer-networking.ppt
Ā 
Network Topologies And The Network
Network Topologies And The NetworkNetwork Topologies And The Network
Network Topologies And The Network
Ā 
Routers and Routing Basic Module 1
Routers and Routing Basic Module 1Routers and Routing Basic Module 1
Routers and Routing Basic Module 1
Ā 
Data communication
Data communicationData communication
Data communication
Ā 
Internet
Internet Internet
Internet
Ā 
Optimization Technologies for Low-Bandwidth Networks
Optimization Technologies for Low-Bandwidth NetworksOptimization Technologies for Low-Bandwidth Networks
Optimization Technologies for Low-Bandwidth Networks
Ā 
C010130917
C010130917C010130917
C010130917
Ā 
Case Study Ups
Case Study UpsCase Study Ups
Case Study Ups
Ā 
What is internet architecture? - (Darren's Study Guide: CompTIA A+, 220-1001 ...
What is internet architecture? - (Darren's Study Guide: CompTIA A+, 220-1001 ...What is internet architecture? - (Darren's Study Guide: CompTIA A+, 220-1001 ...
What is internet architecture? - (Darren's Study Guide: CompTIA A+, 220-1001 ...
Ā 
Computer 3
Computer 3Computer 3
Computer 3
Ā 
Essay On NT1210- Unit 3 Assignment 1
Essay On NT1210- Unit 3 Assignment 1Essay On NT1210- Unit 3 Assignment 1
Essay On NT1210- Unit 3 Assignment 1
Ā 
Computer Network Unit I RGPV
Computer Network Unit I RGPV Computer Network Unit I RGPV
Computer Network Unit I RGPV
Ā 
The Improvement and Performance of Mobile Environment using Both Cloud and Te...
The Improvement and Performance of Mobile Environment using Both Cloud and Te...The Improvement and Performance of Mobile Environment using Both Cloud and Te...
The Improvement and Performance of Mobile Environment using Both Cloud and Te...
Ā 
The improvement and performance
The improvement and performanceThe improvement and performance
The improvement and performance
Ā 

More from Mohd Yusak

Presentation6
Presentation6Presentation6
Presentation6Mohd Yusak
Ā 
Presentation5
Presentation5Presentation5
Presentation5Mohd Yusak
Ā 
Presentation4
Presentation4Presentation4
Presentation4Mohd Yusak
Ā 
Presentation3
Presentation3Presentation3
Presentation3Mohd Yusak
Ā 
Tone
ToneTone
Tone
Mohd Yusak
Ā 
Presentation2
Presentation2Presentation2
Presentation2Mohd Yusak
Ā 
Presentation1
Presentation1Presentation1
Presentation1Mohd Yusak
Ā 
Presentation9
Presentation9Presentation9
Presentation9Mohd Yusak
Ā 
Presentation8
Presentation8Presentation8
Presentation8Mohd Yusak
Ā 
Chapter 5
Chapter 5Chapter 5
Chapter 5
Mohd Yusak
Ā 
Chapter 9
Chapter 9Chapter 9
Chapter 9
Mohd Yusak
Ā 
Chapter 8
Chapter 8Chapter 8
Chapter 8
Mohd Yusak
Ā 
Chapter 6
Chapter 6Chapter 6
Chapter 6
Mohd Yusak
Ā 
M G Tweek10
M G Tweek10M G Tweek10
M G Tweek10
Mohd Yusak
Ā 
Mg Tweek9
Mg Tweek9Mg Tweek9
Mg Tweek9Mohd Yusak
Ā 
Presentation6
Presentation6Presentation6
Presentation6Mohd Yusak
Ā 
Mg Tweek10
Mg Tweek10Mg Tweek10
Mg Tweek10Mohd Yusak
Ā 
Mg Tweek8
Mg Tweek8Mg Tweek8
Mg Tweek8Mohd Yusak
Ā 
Presentation6
Presentation6Presentation6
Presentation6Mohd Yusak
Ā 
Mg Tweek6
Mg Tweek6Mg Tweek6
Mg Tweek6Mohd Yusak
Ā 

More from Mohd Yusak (20)

Presentation6
Presentation6Presentation6
Presentation6
Ā 
Presentation5
Presentation5Presentation5
Presentation5
Ā 
Presentation4
Presentation4Presentation4
Presentation4
Ā 
Presentation3
Presentation3Presentation3
Presentation3
Ā 
Tone
ToneTone
Tone
Ā 
Presentation2
Presentation2Presentation2
Presentation2
Ā 
Presentation1
Presentation1Presentation1
Presentation1
Ā 
Presentation9
Presentation9Presentation9
Presentation9
Ā 
Presentation8
Presentation8Presentation8
Presentation8
Ā 
Chapter 5
Chapter 5Chapter 5
Chapter 5
Ā 
Chapter 9
Chapter 9Chapter 9
Chapter 9
Ā 
Chapter 8
Chapter 8Chapter 8
Chapter 8
Ā 
Chapter 6
Chapter 6Chapter 6
Chapter 6
Ā 
M G Tweek10
M G Tweek10M G Tweek10
M G Tweek10
Ā 
Mg Tweek9
Mg Tweek9Mg Tweek9
Mg Tweek9
Ā 
Presentation6
Presentation6Presentation6
Presentation6
Ā 
Mg Tweek10
Mg Tweek10Mg Tweek10
Mg Tweek10
Ā 
Mg Tweek8
Mg Tweek8Mg Tweek8
Mg Tweek8
Ā 
Presentation6
Presentation6Presentation6
Presentation6
Ā 
Mg Tweek6
Mg Tweek6Mg Tweek6
Mg Tweek6
Ā 

Recently uploaded

Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
Ā 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
Ā 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
Ā 
Dev Dives: Train smarter, not harder ā€“ active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder ā€“ active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder ā€“ active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder ā€“ active learning and UiPath LLMs for do...
UiPathCommunity
Ā 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
Ā 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
Ā 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
Ā 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
Ā 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
Ā 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
Ā 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
Ā 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
Ā 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
Ā 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
Ā 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
Ā 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
Ā 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
Ā 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
Ā 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
Ā 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
Ā 

Recently uploaded (20)

Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Ā 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Ā 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
Ā 
Dev Dives: Train smarter, not harder ā€“ active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder ā€“ active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder ā€“ active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder ā€“ active learning and UiPath LLMs for do...
Ā 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Ā 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
Ā 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ā 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
Ā 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Ā 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
Ā 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Ā 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Ā 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Ā 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Ā 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Ā 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Ā 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Ā 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Ā 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Ā 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Ā 

Ie20303week1

  • 1. IE 20303 Technology Infrastructure for E-Commerce i.E Business Data Communication & Networking By MohdYuszrenYusak Google me up,Iā€™m on Facebook, Twitter & I have a blog.
  • 2. First things first Non fiction-no vampires inside ā€œexamines the factors that contribute to high levels of successā€ Problems? See me ASAP! Tweet with me! yuszrenIE20303 We need to see the world from a different perspective MORE often!- ie class trip anyone? Class starts @ 8.30am starting next week. Any objections? This is your ā€˜defining momentā€™ semester. Less fooling around please! Anyone interested in ā€˜Outliersā€ by Malcolm Gladwell? MDEC Monday Class time. Iā€™ll stop your marketing class.
  • 3. Assessments Quiz-10% Work-10% ?(trip report?) 2 Group Work-40% (20% each) ? 40%-Finals
  • 4. Intro to Data Communications Basic concept of data Why important to study-the value, opportunities upon graduation. Career opportunities. Future trends
  • 5. Brief History Samuel Morse, Alex Graham Bell Thomas Edison- basic electrical & electronic systems evolve into voice and data communication networks. Read-notes. Why bother about history? Because history contributes to moral understanding.
  • 7.
  • 8.
  • 9. Ā© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. 9 PART I Introduction and Internet Applications
  • 10. Ā© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. 10 Topics Covered 1.1 Growth of Computer Networking 1.2 Why Networking Seems Complex 1.3 The Five Key Aspects of Networking 1.4 Public and Private Parts of the Internet 1.5 Networks, Interoperability, and Standards 1.6 Protocol Suites and Layering Models 1.7 How Data Passes Through Layers 1.8 Headers and Layers 1.9 ISO and the OSI Seven-Layer Reference Model 1.10 The Inside Scoop 1.11 Remainder of the Text 1.12 Summary
  • 11. Ā© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. 11 1.1 Growth of Computer Networking Computer networking has grown explosively Since the 1970s, computer communication has changed from a research topic to an essential part of infrastructure Networking is used in every aspect of our lives: Business Advertising Production Shipping Planning Billing Accounting Educational institutions are using computer networks to provide students and teachers with access to online information Federal, state, and local government offices use networks
  • 12. Ā© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. 12 1.1 Growth of Computer Networking In short, computer networks are everywhere In 1980, the Internet was a research project that involved a few dozen sites Today, the Internet has grown into a communication system that reaches all of the world The advent and utility of networking has created dramatic economic shifts Network has made telecommuting available to individuals It has changed business communication An entire industry emerged that develops networking technologies, products, and services The importance of computer networks has produced a demand in all industries for people with more networking expertise Companies need workers to plan, acquire, install, operate, and manage the hardware and software systems for networks
  • 13. Why Research Network? To achieve better network robustness & disaster survivability. How? Packet switching technology at ARPANET = funded by the US Department of Defense (DARPA).
  • 14. use of a decentralized network with multiple paths between any two points; and second, dividing complete user messages into what he called message blocks before sending them into the network. This first allowed the elimination of single points of failure, and enabled the network to automatically and efficiently work around any failures. Strike 1 The White House Telco Chicago Strike 2 The Pentagon
  • 15. Ā© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. 15 1.2 Why Networking Seems Complex The networking subject seems complex, because Many technologies exist Each technology has features that distinguish it from the others Companies create commercial network products and services often by using technologies in new unconventional ways Computer networks seem complex because technologies can be combined and interconnected in many ways Computer networks can be especially confusing to a beginner because No single underlying theory exists that explains the relationship among all parts Multiple organizations have created computer networks standards some standards are incompatible with others Various organizations have attempted to define conceptual models The set of technologies is diverse and changes rapidly models are either so simplistic that they do not distinguish among details or so complex that they do not help simplify the subject
  • 16. Ā© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. 16 1.2 Why Networking Seems Complex The lack of consistency in the field has produced another challenge for beginners: Multiple groups each attempt to create their own terminology Researchers cling to scientifically precise terminology Marketing teams ofteninvent new terms to distinguish their products or services from others Technical terms are confused with the names of popular products Professionals sometimes use a technical term from one technology when referring to an analogous feature of another technology A large set of terms and acronyms that contains many synonyms Computer networking jargon contains terms that are often abbreviated, misused, or associated with products
  • 17. Ā© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. 17 1.3 The Five Key Aspects of Networking To master the complexity, it is important to gain a broad background that includes five key aspects: 1.3.1 Network Applications and Network Programming 1.3.2 Data Communications 1.3.3 Packet Switching and Networking Technologies 1.3.4 Internetworking with TCP/IP 1.3.5 Additional Networking Concepts and Technologies These topics will be covered throughout the book In this chapter a brief introduction will be given
  • 18. 1.3.1 Network Applications and Network Programming Network services are provided by an application software an application on one computer communicates across a network with an application program running on another computer Network applications span a wide range, such as: email file transfer web browsing voice telephone calls (VoIP) distributed databases audio/video teleconferencing Each application offers a specific service with its own form of user interface But all applications can communicate over a single, shared network Ā© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. 18
  • 19. 1.3.1 Network Applications and Network Programming A unified underlying network that supports all applications makes a programmer's job much easier only programmer needs to learn about one interface to network and one basic set of functions to be used it is possible to understand network applications, and even possible to write code that communicates over a network, without understanding the hardware/software technologies once a programmer masters the interface, no further knowledge of networking may be needed However, knowledge of the underlying network system allows a programmer to write better code and develop more efficient applications Ā© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. 19
  • 20. 1.3.2 Data Communications Data communications refers to the study of low-level mechanisms and technologies used to send information across a physical communication medium such as a wire, radio wave, or light beam Data communications focuses on ways to use physical phenomena to transfer information the subject may only seem useful for engineers who design low-level transmission facilities However, we will see that several key concepts that arise from data communications influence the design of many protocol layers Data communications provides a foundation of concepts on which the rest of networking is built 20 Ā© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.
  • 21. 1.3.3 Packet Switching and Networking Technologies In 1960s, the packet switching concept revolutionized data communications Early communication networks had evolved from telegraph and telephone systems A physical pair of wires between two parties to form a dedicatedcircuit Although mechanical connection of wires was being replaced by electronic switches, but the underlying paradigm remained the same: form a circuit and then send information across the circuit Packet switching changed networking in a fundamental way It provided the basis for the modern Internet Packet switching allows multiple users to share a network Packet switching divides data into small blocks, called packets It includes an identification of the intended recipient in each packet Devices throughout the network each have information about how to reach each possible destination Ā© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. 21
  • 22. 1.3.3 Packet Switching and Networking Technologies Many designs for packet switching are possible But there is a need for answers to basic questions: How should a destination be identified? How can a sender find the identification of a destination? How large should a packet be? How can a network recognize the end of one packet? How can a network recognize the beginning of another packet? If a network is shared, then how can they coordinate to insure that each receives a fair opportunity to send? How can packet switching be adapted to wireless networks? How can network technologies be designed to meet various requirements for speed, distance, and economic cost? Many packet switching technologies have been created to meet various requirements for speed, distance, and economic cost Ā© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. 22
  • 23. 1.3.4 Internetworking with TCP/IP In the 1970s, another revolution in computer networks arose: Internet In 1973, Vinton Cerf and Robert Kahn observed that no single packet switching technology would ever satisfy all needs especially because it would be possible to build low-capacity technologies for homes or offices at extremely low cost They suggested to stop trying to find a single best solution Instead, explore interconnecting many packet switching technologies into a functioning whole They proposed a set of standards be developed for such an interconnection The resulting standards became known as the TCP/IP Internet Protocol Suite (usually abbreviated TCP/IP) The success of TCP/IP lies in its tolerance of heterogeneity TCP / IP takes a virtualization approach that defines a network-independent packet and a network-independent identification scheme Ā© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. 23
  • 24. Ā© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. 24 1.4 Public and Private Parts of the Internet The Internet consists of parts that are owned and operated by individuals or organizations From ownership point of view, we can categorize networks 1.4.1 Public Networks 1.4.2 Private Networks A public network is run as a service that is available to subscribers Any individual or corporation who pays the subscription fee can use A company that offers service is known as a service provider Public refers to the general availability of service, not to the data being transferred A private network is controlled by one particular group network use is restricted to one group a private network can include circuits leased from a provider
  • 25. 1.4.2 Private Network Network vendors generally divide private networks into four categories based on the size: Consumer Small Office / Home Office (SOHO) Small-to-Medium Business (SMB) Large Enterprise These categories are related to sales and marketing the terminology is loosely defined it is possible to give a qualitative description of each type but one cannot find an exact definition Ā© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. 25
  • 26. Ā© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. 26 1.5 Networks, Interoperability, and Standards Communication always involves at least two entities one that sends information and another that receives it All entities in a network must agree on how information will be represented and communicated Communication agreements involve many details the way that electrical signals are used to represent data procedures used to initiate and conduct communication, and the format of messages An important issue is interoperability it refers to the ability of two entities to communicate All communicating parties agree on details and follow the same set of rules, an exact set of specifications Communication protocol, network protocol, or simply protocol to refer to a specification for network communication A protocol specifies the details for one aspect of communication including actions to be taken when errors or unexpected situations arise
  • 27. Ā© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. 27 1.6 Protocol Suites and Layering Models A set of protocols must be constructed to ensure that the resulting communication system is complete and efficient Each protocol should handle a part of communication not handled by other protocols How can we guarantee that protocols work well together? Instead of creating each protocol in isolation, protocols are designed in complete, cooperative sets called suites or families Each protocol in a suite handles one aspect of networking The protocols in a suite cover all aspects of communication The entire suite is designed to allow the protocols to work together efficiently
  • 28. Ā© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. 28 1.6 Protocol Suites and Layering Models The fundamental abstraction used to collect protocols into a unified whole is known as a layering model All aspects of a communication problem can be partitioned into pieces that work together each piece is known as a layer Dividing protocols into layers helps both protocol designers and implementers manage the complexity to concentrate on one aspect of communication at a given time Figure 1.1 illustrates the concept by showing the layering model used with the Internet protocols Later chapters will help us understand layering by explaining protocols in detail For now, it is sufficient to learn the purpose of each layer and how protocols are used for communication
  • 29. Ā© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. 29 1.6 Protocol Suites and Layering Models
  • 30. Ā© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. 30 1.6 Protocol Suites and Layering Models Physical Layer (Layer 1) specify details about the underlying transmission medium and hardware all specifications related to electrical properties, radio frequencies, and signals belong in layer 1 Network Interface Layer (Layer 2) some publications use the term Data Link specify details about communication between higher layers of protocols (implemented in SW) and the underlying network (implemented in hardware) specifications about network addresses maximum packet size that a network can support protocols used to access the underlying medium and hardware addressing
  • 31. Ā© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. 31 1.6 Protocol Suites and Layering Models Internet Layer (Layer 3) Protocols in the Internet layer form the fundamental basis for the Internet Layer 3 protocols specify communication across the Internet (spanning multiple interconnected networks) Transport Layer (Layer 4) Provide for communication from an application program on one computer to an application program on another Includes specifications on controlling the maximum rate a receiver can accept data mechanisms to avoid network congestion techniques to insure that all data is received in the correct order
  • 32. Ā© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. 32 1.6 Protocol Suites and Layering Models Application Layer (Layer 5) specify how a pair of applications interact when they communicate specify details about the format and the meaning of messages that applications can exchange the procedures to be followed Some examples of network applications in layer 5 email exchange file transfer web browsing telephone services and video teleconferencing
  • 33. Ā© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. 33 1.7 How Data Passes Through Layers Protocol implementations follow the layering model by passing the output from a protocol in one layer to the input of a protocol in the next To achieve efficiency rather than copy an entire packet a pair of protocols in adjacent layers pass a pointer to the packet Figure 1.2 illustrates layered protocols on the two computers Each computer contains a set of layered protocols When an application sends data it is placed in a packet, and the packet passes down through each layer of protocols Once it has passed through all layers of protocols on the sending computer the packet leaves the computer and is transmitted across the physical network When it reaches the receiving computer the packet passes up through the layers of protocols If the application on the receiver sends a response, the process is reversed
  • 34. Ā© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. 34 1.7 How Data Passes Through Layers
  • 35. Ā© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. 35 1.8 Headers and Layers Each layer of protocol software performs computations that insure the messages arrive as expected To perform such computation, protocol software on the two machines must exchange information each layer on the sender prepends extra information onto the packet the corresponding protocol layer on the receiver removes and uses the extra information Additional information added by a protocol is known as a header Headers are added by protocol software on the sending computer That is, the Transport layer prepends a header, and then the Internet layer prepends a header, and so on If we observe a packet traversing the network, the headers will appear in the order that Figure 1.3 illustrates Although the figure shows headers as the same size in practice headers are not of uniform size and a physical layer header is optional
  • 36. Ā© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. 36 1.8 Headers and Layers
  • 37. Ā© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. 37 1.9 ISO and the OSI Seven-Layer Reference Model At the same time the Internet protocols were being developed, two large standards bodies jointly formed an alternative reference model They also created a set of internetworking protocols These organizations are: International Standardization Organization (ISO) International Telecommunications Union,Telecommunication (ITU-T) The ITU was known as the Consultative Committee for International Telephone and Telegraph (CCITT) The ISO layering model is known as the Open Systems Interconnection (OSI) Seven-Layer Reference Model Figure 1.4 illustrates the seven layers in the model
  • 38. Ā© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. 38 1.9 ISO and the OSI Seven-Layer Reference Model
  • 39. Ā© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. 39 1.10 The Inside Scoop ISO and the ITU use a process that accommodates as many viewpoints as possible when creating a standard As a result, some standards can appear to have been designed by a committee making political compromises rather than by engineers and scientists The seven-layer reference model is controversial It did indeed start as a political compromise the model and the OSI protocols were designed as competitors for the Internet protocols ISO and the ITU are huge standards bodies that handle the world-wide telephone system and other global standards The Internet protocols and reference model were created by a small group of about a dozen researchers It is easy to see why the standards organizations might be confident that they could dictate a set of protocols and everyone would switch away from protocols designed by researchers At one point, even the U.S. government was convinced that TCP/IP should be replaced by OSI protocols
  • 40. Ā© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. 40 1.10 The Inside Scoop Eventually, it became clear that TCP/IP technology was technically superior to OSI and efforts to develop and deploy OSI protocols were terminated Standards bodies were left with the seven-layer model Advocates for the seven-layer model have tried to stretch the definitions to match TCP/IP They argue that layer three could be considered an Internet layer and that a few support protocols might be placed into layers five and six Perhaps the most humorous part of the story is that many engineers still refer to applications as layer 7 protocols even when they know that layers five and six are unfilled and unnecessary
  • 41. Individual work #1 (10%) Get a copy from Pej Am SSIL 5th floor by 11.am Due 4.30pm today.
  • 42. Group Work #1 (10%) Next week-task will be given during the 1st hour of class time. Be there! Sit in Groups Short presentation Refer week 1 slides. Good luck!