This document discusses different types of networks:
1. The Internet is the common network used for activities like reading news and social media.
2. The Deep Web is a subset not indexed by search engines so it requires directly visiting sites instead of searching. It exists because the Internet is too large to fully index.
3. The Dark Web requires special software to access and is often associated with illegal activities like drug sales, though it also has legitimate uses. It sits on additional private networks like Tor and I2P.
This presentation outlines the core functions of TCP - Transmission Control Protocol.
These comprise TCP Connection Control, TCP Flow Control, TCP Error Control, TCP Congestion Control, TCP Options and TCP Timers.
TCP/IP is the Internet core protocol that provides reliable, connection-oriented and stream-based communication service. Most of Internet traffic is carried in TCP connections, so scalability and reliability are crucial for a stable network on a global scale.
Overview of transport protocols.
The transport layer (OSI layer 4) is the interface between the network and application (network API).
The transport layer provides data transport service and some level of quality of service (QoS) to the application.
While all transport protocols offer data transport services, they have varying levels of quality of service in terms of error detection and correction, packet ordering and packet delay.
Simple transport protocols like UDP are often connectionless while connection-oriented transport protocols like TCP provide many quality of service properties.
This presentation outlines the core functions of TCP - Transmission Control Protocol.
These comprise TCP Connection Control, TCP Flow Control, TCP Error Control, TCP Congestion Control, TCP Options and TCP Timers.
TCP/IP is the Internet core protocol that provides reliable, connection-oriented and stream-based communication service. Most of Internet traffic is carried in TCP connections, so scalability and reliability are crucial for a stable network on a global scale.
Overview of transport protocols.
The transport layer (OSI layer 4) is the interface between the network and application (network API).
The transport layer provides data transport service and some level of quality of service (QoS) to the application.
While all transport protocols offer data transport services, they have varying levels of quality of service in terms of error detection and correction, packet ordering and packet delay.
Simple transport protocols like UDP are often connectionless while connection-oriented transport protocols like TCP provide many quality of service properties.
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
Honest Reviews of Tim Han LMA Course Program.pptxtimhan337
Personal development courses are widely available today, with each one promising life-changing outcomes. Tim Han’s Life Mastery Achievers (LMA) Course has drawn a lot of interest. In addition to offering my frank assessment of Success Insider’s LMA Course, this piece examines the course’s effects via a variety of Tim Han LMA course reviews and Success Insider comments.
2. The Internet: This is the easy one. It’s the common Internet everyone uses to
read news, visit Facebook, and shop. Just consider this the “regular” Internet.
The Deep Web: The deep web is a subset of the Internet that is not indexed
by the major search engines. This means that you have to visit those places
directly instead of being able to search for them. So there aren’t directions to
get there, but they’re waiting if you have an address. The Deep Web is largely
there simply because the Internet is too large for search engines to cover
completely. So the Deep Web is the long tail of what’s left out (your email,
dropbox, fb account etc).
The Dark Web: The Dark Web (also called Darknet) is a subset of the Deep
Web that is not only not indexed, but that also requires something special to
be able to access it, e.g., specific proxying software or authentication to gain
access. The Dark Web often sits on top of additional sub-networks, such as Tor,
I2P, and Freenet, and is often associated with criminal activity of various
degrees, including buying and selling drugs, etc. While the Dark Web is
definitely used for those things more than the standard Internet or the Deep
Web, there are many legitimate uses for the Dark Web as well.
3. Why search engine can not index deep web
But I hope you will prefer the light
4. central office
ISP
telephone
network
DSLAM
voice, data transmitted
at different frequencies over
dedicated line to central office
use existing telephone line to central office DSLAM
data over DSL phone line goes to Internet
voice over DSL phone line goes to telephone net
< 2.5 Mbps upstream transmission rate (typically < 1 Mbps)
< 24 Mbps downstream transmission rate (typically < 10 Mbps)
DSL
modem
splitter
DSL access
multiplexer
6. data, TV transmitted at different
frequencies over shared cable
distribution network
cable
modem
splitter
…
cable headend
CMTS
ISP
cable modem
termination system
HFC: hybrid fiber coax
asymmetric: up to 30Mbps downstream transmission rate, 2 Mbps upstream
transmission rate
network of cable, fiber attaches homes to ISP router
homes share access network to cable headend
unlike DSL, which has dedicated access to central office
7. typically used in companies, universities, etc
10 Mbps, 100Mbps, 1Gbps, 10Gbps transmission rates
today, end systems typically connect into Ethernet switch
Ethernet
switch
institutional mail,
web servers
institutional router
institutional link to
ISP (Internet)
8. shared wireless access network connects end system to router
via base station aka “access point”
wireless LANs:
within building (100 ft)
802.11b/g (WiFi): 11, 54 Mbps
transmission rate
wide-area wireless access
provided by cellular
operator, 10’s km
between 1 and 10 Mbps
3G, 4G: LTE
to Internet to Internet
9. host sending function:
takes application message
breaks into smaller chunks, known
as packets, of length L bits
transmits packet into access
network at transmission rate R
link transmission rate, aka link
capacity, aka link bandwidth
R: link transmission rate
host
12
two packets,
L bits each
packet
transmission
delay
time needed to
transmit L-bit
packet into link
L (bits)
R (bits/sec)
= =
10. mesh of interconnected routers
packet-switching: hosts break
application-layer messages into
packets
forward packets from one
router to the next, across links
on path from source to
destination
each packet transmitted at full
link capacity
11. takes L/R seconds to transmit
(push out) L-bit packet into link
at R bps
store and forward: entire packet
must arrive at router before it
can be transmitted on next link
end-end delay = 2L/R (assuming zero
propagation delay)
one-hop numerical example:
L = 7.5 Mbits
R = 1.5 Mbps
one-hop transmission
delay = 5 sec
more on delay shortly …
source
R bps
destination
123
L bits
per packet
R bps
Time to reach 3 packets to destination? 4L/R
12. A
B
CR = 100 Mb/s
R = 1.5 Mb/s
D
Equeue of packets
waiting for output link
queuing and loss:
If arrival rate (in bits) to link exceeds transmission rate of link for a period of
time:
packets will queue, wait to be transmitted on link
packets can be dropped (lost) if memory (buffer) fills up
13. forwarding: move packets
from router’s input to
appropriate router output
routing: determines source-destination
route taken by packets
routing algorithms
routing algorithm
local forwarding table
header value output link
0100
0101
0111
1001
3
2
2
1
1
23
dest address in arriving
packet’s header
15. forwarding: move packets
from router’s input to
appropriate router output
routing: determines source-destination
route taken by packets
routing algorithms
routing algorithm
local forwarding table
header value output link
0100
0101
0111
1001
3
2
2
1
1
23
dest address in arriving
packet’s header
16. end-end resources allocated to,
reserved for “call” between
source & dest:
In diagram, each link has four circuits.
call gets 2nd circuit in top link and
1st circuit in right link.
dedicated resources: no sharing
circuit-like (guaranteed)
performance
circuit segment idle if not used by call
(no sharing)
Commonly used in traditional
telephone networks
18. A have to send 64000 bits to B over circuit switch over TDMA
Link speed 1Mbps
Link has 20 slots
Setup time 0.2s
Sol:
Per circuit speed 1Mbps/20 = 50Kbps
64000/50000 = 1.28s
1.28+0.2 = 1.3s
Did not has other delays like propogation
19. example:
1 Mb/s link
each user:
• 100 kb/s when “active”
• active 10% of time
circuit-switching:
10 users => 1Mbps/100kbps
packet switching:
with 35 users, probability >
10 active at same time is
less than .0004
packet switching allows more users to use network!
N
users
1 Mbps link
http://www.danielsoper.com/statcalc/calculator.aspx?id=71
20. is packet switching a “winner?”
great for bursty data
resource sharing
simpler, no call setup
excessive congestion possible: packet delay and loss
protocols needed for reliable data transfer, congestion
control
Q: How to provide circuit-like behavior?
bandwidth guarantees needed for audio/video apps
still an unsolved problem (chapter 7)
Q: human analogies of reserved resources (circuit switching) versus on-demand
allocation (packet-switching)?