This document summarizes a lecture on network layer concepts including link state routing, hierarchical routing, multicasting routing protocols, and subnetting. It discusses key topics like how link state routing works by discovering neighbors, measuring link costs, building link state packets, and distributing them. It also covers hierarchical routing to reduce routing table sizes, and different approaches to multicasting like source-based trees and group-shared trees. Subnetting is introduced as a way to divide networks into smaller subnets.
The document provides information about the network layer. It discusses network layer services including packetizing, addressing, routing, and forwarding. It describes various network layer protocols like IP and ICMPv4. It also covers topics like unicast routing algorithms, multicasting, IPV6 addressing, performance metrics, and congestion control techniques.
This document discusses mobile ad hoc networks (MANETs). It defines MANETs as networks formed dynamically by mobile nodes connected via wireless links, with no fixed infrastructure. It outlines some key applications of MANETs like military operations and disaster recovery. It also explores challenges in MANETs like dynamically changing topologies. The document examines media access control protocols and routing algorithms used in MANETs like DSDV, DSR, and zone routing protocol.
routing table ,What is routing ? , what is static routing , what is dynamic routing , types of routing , routing protocols , routing strategy , Download Routing pdf , Download routing ppt , download routing notes , paper on routing
To Download Complete Documentation Visit My Blog
http://studyofcs.blogspot.com/2015/06/what-is-routerwhat-is-routing.html
Download completer BS Computer Science Degree Study Data
http://studyofcs.blogspot.com/p/bs.html
Routing algorithms in computer networks determine the best path for data transfer between nodes. There are two main types - non-adaptive algorithms which use static routes regardless of network conditions, and adaptive algorithms which can change routes dynamically based on conditions. Examples of routing algorithms include flooding, which broadcasts to all nodes, and link state routing which uses Dijkstra's algorithm to calculate the most efficient paths based on information shared between nodes.
Introduction, Virtual and Datagram networks, study of router, IP protocol and addressing in the Internet, Routing algorithms, Broadcast and Multicast routing
This document summarizes the key differences between packet switching and circuit switching technologies. Packet switching breaks messages into packets that travel independently over networks and are reassembled at their destination, while circuit switching establishes a dedicated connection for the duration of a transmission. Each approach has advantages for certain applications, with packet switching being more scalable and flexible but sometimes less reliable than circuit switching.
Module 3 Part B - computer networks module 2 pptanushaj46
The document discusses several key issues in network layer design including store-and-forward packet switching, services provided to the transport layer, implementation of connectionless and connection-oriented services, and comparison of virtual-circuit and datagram networks. It also covers routing algorithms such as shortest path, flooding, distance vector, link state, and hierarchical routing.
Packet switching breaks messages into packets that are sent over multiple routes to their destination, while circuit switching establishes a dedicated connection for the entire duration of a message transfer. Packet switching offers more efficient use of bandwidth and routes but can experience delays, while circuit switching guarantees bandwidth and quality but is less efficient. Both approaches have advantages for different types of data and network conditions.
The document provides information about the network layer. It discusses network layer services including packetizing, addressing, routing, and forwarding. It describes various network layer protocols like IP and ICMPv4. It also covers topics like unicast routing algorithms, multicasting, IPV6 addressing, performance metrics, and congestion control techniques.
This document discusses mobile ad hoc networks (MANETs). It defines MANETs as networks formed dynamically by mobile nodes connected via wireless links, with no fixed infrastructure. It outlines some key applications of MANETs like military operations and disaster recovery. It also explores challenges in MANETs like dynamically changing topologies. The document examines media access control protocols and routing algorithms used in MANETs like DSDV, DSR, and zone routing protocol.
routing table ,What is routing ? , what is static routing , what is dynamic routing , types of routing , routing protocols , routing strategy , Download Routing pdf , Download routing ppt , download routing notes , paper on routing
To Download Complete Documentation Visit My Blog
http://studyofcs.blogspot.com/2015/06/what-is-routerwhat-is-routing.html
Download completer BS Computer Science Degree Study Data
http://studyofcs.blogspot.com/p/bs.html
Routing algorithms in computer networks determine the best path for data transfer between nodes. There are two main types - non-adaptive algorithms which use static routes regardless of network conditions, and adaptive algorithms which can change routes dynamically based on conditions. Examples of routing algorithms include flooding, which broadcasts to all nodes, and link state routing which uses Dijkstra's algorithm to calculate the most efficient paths based on information shared between nodes.
Introduction, Virtual and Datagram networks, study of router, IP protocol and addressing in the Internet, Routing algorithms, Broadcast and Multicast routing
This document summarizes the key differences between packet switching and circuit switching technologies. Packet switching breaks messages into packets that travel independently over networks and are reassembled at their destination, while circuit switching establishes a dedicated connection for the duration of a transmission. Each approach has advantages for certain applications, with packet switching being more scalable and flexible but sometimes less reliable than circuit switching.
Module 3 Part B - computer networks module 2 pptanushaj46
The document discusses several key issues in network layer design including store-and-forward packet switching, services provided to the transport layer, implementation of connectionless and connection-oriented services, and comparison of virtual-circuit and datagram networks. It also covers routing algorithms such as shortest path, flooding, distance vector, link state, and hierarchical routing.
Packet switching breaks messages into packets that are sent over multiple routes to their destination, while circuit switching establishes a dedicated connection for the entire duration of a message transfer. Packet switching offers more efficient use of bandwidth and routes but can experience delays, while circuit switching guarantees bandwidth and quality but is less efficient. Both approaches have advantages for different types of data and network conditions.
Packet switching and circuit switching are two different technologies for sending messages over networks. Packet switching breaks messages into packets that can take different routes to the destination, while circuit switching establishes a dedicated connection for the duration of the call. Each approach has advantages - packet switching uses bandwidth efficiently but can experience delays, while circuit switching guarantees quality but is inefficient. Modern networks are shifting more towards packet switching as it allows for easier scaling.
This document provides an overview of computer networking concepts including different network topologies, transmission media, and network components. It defines key networking terms like local area network (LAN), metropolitan area network (MAN), wide area network (WAN), and personal area network (PAN). Different network topologies like bus, star, ring, and mesh are described. Common transmission media include coaxial cable, twisted pair cable, optical fiber, and wireless transmission. Network components such as hubs, switches, routers, bridges, and gateways are also explained.
Here are short notes on X.25, ATM, and Frame Relay:
a. X.25 - X.25 is a protocol suite for packet switched WANs. It establishes switched virtual circuits between DTE devices using X.121 addressing. X.25 uses LAPB for data link layer and PLP for network layer. It provides reliable data transfer over public networks.
b. ATM - Asynchronous Transfer Mode is a cell switching and multiplexing technology designed for B-ISDN. It uses fixed size 53 byte cells and establishes permanent virtual circuits between endpoints. ATM supports real-time multimedia traffic using constant bit rate, variable bit rate and available bit rate.
c. Frame Relay -
This document provides an overview of network layer concepts including network layer services, packet switching, performance metrics, addressing, routing, and congestion control. It describes the key responsibilities of the network layer such as packetizing data, routing packets from source to destination, and error control. Metrics like delay, throughput, and packet loss are discussed as well as congestion control mechanisms to improve performance like retransmission policies and congestion notification.
1) Computer networks allow communication and sharing of resources between computer systems and devices through communication channels. There are several types of networks including LANs, WANs, and MANs.
2) For communication between systems, both must agree on a protocol which sets rules for data transmission. The two main protocol stacks are OSI and TCP/IP.
3) The network layer is responsible for delivering packets from source to destination. It uses services from the data link layer and provides services to the transport layer. Common network layer protocols are IP (Internet Protocol) for connectionless service and MPLS for connection-oriented service.
This document discusses wide area network (WAN) technologies. It begins by defining WAN characteristics such as interconnecting computers over long distances using various media. It then describes different WAN technologies including circuit-switched networks, packet-switched networks, and virtual circuit networks. Specific routing protocols and concepts are explained like distance vector routing, link state routing, static versus dynamic routing. The document concludes by listing various WAN technology options for connecting sites like dial-up, leased lines, frame relay, ATM, microwave links and satellite.
Lecture number 5 Theory.pdf(machine learning)ZainabShahzad9
This document discusses computer networks and routing protocols. It provides an overview of key topics including:
- The difference between routed protocols like IPv4 and IPv6 that transfer user data, and routing protocols like RIP and OSPF that send route update packets.
- Common routing and routed protocols including IGPs, EGPs, RIP, OSPF, EIGRP and BGP.
- Desirable properties of routing algorithms such as correctness, robustness, stability, fairness and efficiency.
- Types of routing including fixed, flooding, dynamic and default routing. Characteristics of distance vector and link state routing protocols are also outlined.
1) Computer networks allow computers to communicate and share resources by connecting them through communication channels. There are several types of networks including LANs, WANs, and MANs.
2) For communication between computers on a network, both sides must agree on protocols which are sets of rules that govern data transmission. The two main protocol stacks are OSI and TCP/IP.
3) The network layer is responsible for delivering packets from source to destination by choosing appropriate paths through routers. It provides connectionless and connection-oriented services to the transport layer above it.
The document provides an overview of computer networking concepts including recommended textbooks, basics of networking terminology and principles, network hardware, protocols and layering, network addressing, and applications of computer networks. It discusses key topics like transmission technologies, local and wide area networks, wireless networks, protocol hierarchies, network services, and the OSI and TCP network models. The goal is to teach students the fundamentals of how networks work rather than specific configuration skills.
This document discusses the key topics for Lab 4 of the CSE-307 Internetworking Essentials course, including network hardware, IP addressing concepts, and configuration of routers using Cisco Packet Tracer. It provides definitions and explanations of communication modes, carrier waves, IP addressing formats, and the functions of switches, routers, and hubs. The lab objectives are to understand these networking components and configure routers with IP addresses using simulation software. Evaluation will include two practical exams before the midterm covering the first four labs.
The document provides an overview of the network layer. It discusses key topics like the functions of the network layer such as logical addressing, routing, and internetworking. It describes different routing algorithms including distance vector, link state, and hierarchical routing. It also covers congestion control mechanisms like leaky bucket algorithm, token bucket algorithm, and admission control that are used to control congestion in the network layer.
The document discusses different methods of switching in computer networks, including circuit switching, packet switching, and message switching. It provides details on circuit-switched networks, packet-switched networks, and virtual circuit networks. For circuit switching, it describes the setup, data transfer, and teardown phases required to establish and terminate connections. For packet switching, it compares datagram and virtual circuit approaches.
This document discusses different media access methods and switching techniques used in computer networks. It describes three main access methods - Carrier-Sense Multiple Access with Collision Detection (CSMA/CD), Carrier-Sense Multiple Access with Collision Avoidance (CSMA/CA), and Token Passing. It also explains three switching techniques - circuit switching, message switching, and packet switching. Circuit switching establishes a dedicated path for data transmission, while message and packet switching employ store-and-forward mechanisms without dedicated paths. Packet switching further divides messages into packets and can use either connectionless or connection-oriented transmission.
Computer Networking: LAN and WAN TechnologiesBisrat Girma
This document discusses various network technologies including transmission medium, link configuration, user mobility, area coverage, topology design, and network integration. It describes wired and wireless transmission mediums, point-to-point and point-to-multipoint link configurations, and how networks are designed based on factors like scalability, fault tolerance, and ability of nodes to communicate. It also summarizes common network topologies including bus, star, ring, and their characteristics, and how bridges, routers, gateways, and switches can integrate local and wide area networks.
The document discusses simulating distance vector routing and link state routing algorithms using the NS2 network simulator. It provides background on routing, describes distance vector and flooding routing algorithms, and includes the NS2 code used to simulate a simple network with four nodes using distance vector routing. The simulation establishes connections between nodes using TCP and UDP, introduces a route change, and monitors the routing table updates. The result is that the distance vector routing algorithm was successfully simulated.
Routing and switching are key processes in computer networks. Routing involves selecting the optimal path for data transfer from source to destination using routers and routing algorithms. There are three main types of routing: static, dynamic, and default. Switching transfers information between networks using switches and occurs at the data link layer. There are different switching techniques, including circuit switching, packet switching, and message switching, as well as different switching modes and networks like datagram and virtual circuit networks.
The document discusses routing algorithms used in computer networks. It describes how routing algorithms determine the path that packets take from source to destination. Dynamic routing algorithms adapt to changing network conditions by updating routing tables. Common dynamic algorithms include distance vector routing and link state routing. The document also covers challenges like routing in hierarchical networks, broadcast routing, multicast routing, and routing for mobile and ad-hoc networks.
Multiplexing and switching techniques allow for the efficient transmission of multiple signals over shared communication links and networks. Multiplexing involves sharing bandwidth between users, either through frequency division, wavelength division, or time division approaches. Switching refers to how traffic is directed from input to output ports at nodes in a network. The main types of switching are circuit switching, which establishes a dedicated path for a connection, and packet switching, which divides messages into packets that are routed independently through a network on a store-and-forward basis. These techniques optimize the utilization of communication resources.
The document discusses different network switching techniques including circuit switching, packet switching, datagram switching, virtual circuit networks, and message switching. It provides details on how each technique works, including setup/teardown phases for circuit switching, treating each packet independently for datagram networks, and storing entire messages at intermediate nodes for message switching. Key aspects like bandwidth efficiency and reliability are compared between the different techniques.
Packet switching and circuit switching are two different technologies for sending messages over networks. Packet switching breaks messages into packets that can take different routes to the destination, while circuit switching establishes a dedicated connection for the duration of the call. Each approach has advantages - packet switching uses bandwidth efficiently but can experience delays, while circuit switching guarantees quality but is inefficient. Modern networks are shifting more towards packet switching as it allows for easier scaling.
This document provides an overview of computer networking concepts including different network topologies, transmission media, and network components. It defines key networking terms like local area network (LAN), metropolitan area network (MAN), wide area network (WAN), and personal area network (PAN). Different network topologies like bus, star, ring, and mesh are described. Common transmission media include coaxial cable, twisted pair cable, optical fiber, and wireless transmission. Network components such as hubs, switches, routers, bridges, and gateways are also explained.
Here are short notes on X.25, ATM, and Frame Relay:
a. X.25 - X.25 is a protocol suite for packet switched WANs. It establishes switched virtual circuits between DTE devices using X.121 addressing. X.25 uses LAPB for data link layer and PLP for network layer. It provides reliable data transfer over public networks.
b. ATM - Asynchronous Transfer Mode is a cell switching and multiplexing technology designed for B-ISDN. It uses fixed size 53 byte cells and establishes permanent virtual circuits between endpoints. ATM supports real-time multimedia traffic using constant bit rate, variable bit rate and available bit rate.
c. Frame Relay -
This document provides an overview of network layer concepts including network layer services, packet switching, performance metrics, addressing, routing, and congestion control. It describes the key responsibilities of the network layer such as packetizing data, routing packets from source to destination, and error control. Metrics like delay, throughput, and packet loss are discussed as well as congestion control mechanisms to improve performance like retransmission policies and congestion notification.
1) Computer networks allow communication and sharing of resources between computer systems and devices through communication channels. There are several types of networks including LANs, WANs, and MANs.
2) For communication between systems, both must agree on a protocol which sets rules for data transmission. The two main protocol stacks are OSI and TCP/IP.
3) The network layer is responsible for delivering packets from source to destination. It uses services from the data link layer and provides services to the transport layer. Common network layer protocols are IP (Internet Protocol) for connectionless service and MPLS for connection-oriented service.
This document discusses wide area network (WAN) technologies. It begins by defining WAN characteristics such as interconnecting computers over long distances using various media. It then describes different WAN technologies including circuit-switched networks, packet-switched networks, and virtual circuit networks. Specific routing protocols and concepts are explained like distance vector routing, link state routing, static versus dynamic routing. The document concludes by listing various WAN technology options for connecting sites like dial-up, leased lines, frame relay, ATM, microwave links and satellite.
Lecture number 5 Theory.pdf(machine learning)ZainabShahzad9
This document discusses computer networks and routing protocols. It provides an overview of key topics including:
- The difference between routed protocols like IPv4 and IPv6 that transfer user data, and routing protocols like RIP and OSPF that send route update packets.
- Common routing and routed protocols including IGPs, EGPs, RIP, OSPF, EIGRP and BGP.
- Desirable properties of routing algorithms such as correctness, robustness, stability, fairness and efficiency.
- Types of routing including fixed, flooding, dynamic and default routing. Characteristics of distance vector and link state routing protocols are also outlined.
1) Computer networks allow computers to communicate and share resources by connecting them through communication channels. There are several types of networks including LANs, WANs, and MANs.
2) For communication between computers on a network, both sides must agree on protocols which are sets of rules that govern data transmission. The two main protocol stacks are OSI and TCP/IP.
3) The network layer is responsible for delivering packets from source to destination by choosing appropriate paths through routers. It provides connectionless and connection-oriented services to the transport layer above it.
The document provides an overview of computer networking concepts including recommended textbooks, basics of networking terminology and principles, network hardware, protocols and layering, network addressing, and applications of computer networks. It discusses key topics like transmission technologies, local and wide area networks, wireless networks, protocol hierarchies, network services, and the OSI and TCP network models. The goal is to teach students the fundamentals of how networks work rather than specific configuration skills.
This document discusses the key topics for Lab 4 of the CSE-307 Internetworking Essentials course, including network hardware, IP addressing concepts, and configuration of routers using Cisco Packet Tracer. It provides definitions and explanations of communication modes, carrier waves, IP addressing formats, and the functions of switches, routers, and hubs. The lab objectives are to understand these networking components and configure routers with IP addresses using simulation software. Evaluation will include two practical exams before the midterm covering the first four labs.
The document provides an overview of the network layer. It discusses key topics like the functions of the network layer such as logical addressing, routing, and internetworking. It describes different routing algorithms including distance vector, link state, and hierarchical routing. It also covers congestion control mechanisms like leaky bucket algorithm, token bucket algorithm, and admission control that are used to control congestion in the network layer.
The document discusses different methods of switching in computer networks, including circuit switching, packet switching, and message switching. It provides details on circuit-switched networks, packet-switched networks, and virtual circuit networks. For circuit switching, it describes the setup, data transfer, and teardown phases required to establish and terminate connections. For packet switching, it compares datagram and virtual circuit approaches.
This document discusses different media access methods and switching techniques used in computer networks. It describes three main access methods - Carrier-Sense Multiple Access with Collision Detection (CSMA/CD), Carrier-Sense Multiple Access with Collision Avoidance (CSMA/CA), and Token Passing. It also explains three switching techniques - circuit switching, message switching, and packet switching. Circuit switching establishes a dedicated path for data transmission, while message and packet switching employ store-and-forward mechanisms without dedicated paths. Packet switching further divides messages into packets and can use either connectionless or connection-oriented transmission.
Computer Networking: LAN and WAN TechnologiesBisrat Girma
This document discusses various network technologies including transmission medium, link configuration, user mobility, area coverage, topology design, and network integration. It describes wired and wireless transmission mediums, point-to-point and point-to-multipoint link configurations, and how networks are designed based on factors like scalability, fault tolerance, and ability of nodes to communicate. It also summarizes common network topologies including bus, star, ring, and their characteristics, and how bridges, routers, gateways, and switches can integrate local and wide area networks.
The document discusses simulating distance vector routing and link state routing algorithms using the NS2 network simulator. It provides background on routing, describes distance vector and flooding routing algorithms, and includes the NS2 code used to simulate a simple network with four nodes using distance vector routing. The simulation establishes connections between nodes using TCP and UDP, introduces a route change, and monitors the routing table updates. The result is that the distance vector routing algorithm was successfully simulated.
Routing and switching are key processes in computer networks. Routing involves selecting the optimal path for data transfer from source to destination using routers and routing algorithms. There are three main types of routing: static, dynamic, and default. Switching transfers information between networks using switches and occurs at the data link layer. There are different switching techniques, including circuit switching, packet switching, and message switching, as well as different switching modes and networks like datagram and virtual circuit networks.
The document discusses routing algorithms used in computer networks. It describes how routing algorithms determine the path that packets take from source to destination. Dynamic routing algorithms adapt to changing network conditions by updating routing tables. Common dynamic algorithms include distance vector routing and link state routing. The document also covers challenges like routing in hierarchical networks, broadcast routing, multicast routing, and routing for mobile and ad-hoc networks.
Multiplexing and switching techniques allow for the efficient transmission of multiple signals over shared communication links and networks. Multiplexing involves sharing bandwidth between users, either through frequency division, wavelength division, or time division approaches. Switching refers to how traffic is directed from input to output ports at nodes in a network. The main types of switching are circuit switching, which establishes a dedicated path for a connection, and packet switching, which divides messages into packets that are routed independently through a network on a store-and-forward basis. These techniques optimize the utilization of communication resources.
The document discusses different network switching techniques including circuit switching, packet switching, datagram switching, virtual circuit networks, and message switching. It provides details on how each technique works, including setup/teardown phases for circuit switching, treating each packet independently for datagram networks, and storing entire messages at intermediate nodes for message switching. Key aspects like bandwidth efficiency and reliability are compared between the different techniques.
Similar to Lecture9 is going on the road today so we have a good day (20)
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.pptHenry Hollis
The History of NZ 1870-1900.
Making of a Nation.
From the NZ Wars to Liberals,
Richard Seddon, George Grey,
Social Laboratory, New Zealand,
Confiscations, Kotahitanga, Kingitanga, Parliament, Suffrage, Repudiation, Economic Change, Agriculture, Gold Mining, Timber, Flax, Sheep, Dairying,
A Visual Guide to 1 Samuel | A Tale of Two HeartsSteve Thomason
These slides walk through the story of 1 Samuel. Samuel is the last judge of Israel. The people reject God and want a king. Saul is anointed as the first king, but he is not a good king. David, the shepherd boy is anointed and Saul is envious of him. David shows honor while Saul continues to self destruct.
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...EduSkills OECD
Andreas Schleicher, Director of Education and Skills at the OECD presents at the launch of PISA 2022 Volume III - Creative Minds, Creative Schools on 18 June 2024.
🔥🔥🔥🔥🔥🔥🔥🔥🔥
إضغ بين إيديكم من أقوى الملازم التي صممتها
ملزمة تشريح الجهاز الهيكلي (نظري 3)
💀💀💀💀💀💀💀💀💀💀
تتميز هذهِ الملزمة بعِدة مُميزات :
1- مُترجمة ترجمة تُناسب جميع المستويات
2- تحتوي على 78 رسم توضيحي لكل كلمة موجودة بالملزمة (لكل كلمة !!!!)
#فهم_ماكو_درخ
3- دقة الكتابة والصور عالية جداً جداً جداً
4- هُنالك بعض المعلومات تم توضيحها بشكل تفصيلي جداً (تُعتبر لدى الطالب أو الطالبة بإنها معلومات مُبهمة ومع ذلك تم توضيح هذهِ المعلومات المُبهمة بشكل تفصيلي جداً
5- الملزمة تشرح نفسها ب نفسها بس تكلك تعال اقراني
6- تحتوي الملزمة في اول سلايد على خارطة تتضمن جميع تفرُعات معلومات الجهاز الهيكلي المذكورة في هذهِ الملزمة
واخيراً هذهِ الملزمة حلالٌ عليكم وإتمنى منكم إن تدعولي بالخير والصحة والعافية فقط
كل التوفيق زملائي وزميلاتي ، زميلكم محمد الذهبي 💊💊
🔥🔥🔥🔥🔥🔥🔥🔥🔥
Chapter wise All Notes of First year Basic Civil Engineering.pptxDenish Jangid
Chapter wise All Notes of First year Basic Civil Engineering
Syllabus
Chapter-1
Introduction to objective, scope and outcome the subject
Chapter 2
Introduction: Scope and Specialization of Civil Engineering, Role of civil Engineer in Society, Impact of infrastructural development on economy of country.
Chapter 3
Surveying: Object Principles & Types of Surveying; Site Plans, Plans & Maps; Scales & Unit of different Measurements.
Linear Measurements: Instruments used. Linear Measurement by Tape, Ranging out Survey Lines and overcoming Obstructions; Measurements on sloping ground; Tape corrections, conventional symbols. Angular Measurements: Instruments used; Introduction to Compass Surveying, Bearings and Longitude & Latitude of a Line, Introduction to total station.
Levelling: Instrument used Object of levelling, Methods of levelling in brief, and Contour maps.
Chapter 4
Buildings: Selection of site for Buildings, Layout of Building Plan, Types of buildings, Plinth area, carpet area, floor space index, Introduction to building byelaws, concept of sun light & ventilation. Components of Buildings & their functions, Basic concept of R.C.C., Introduction to types of foundation
Chapter 5
Transportation: Introduction to Transportation Engineering; Traffic and Road Safety: Types and Characteristics of Various Modes of Transportation; Various Road Traffic Signs, Causes of Accidents and Road Safety Measures.
Chapter 6
Environmental Engineering: Environmental Pollution, Environmental Acts and Regulations, Functional Concepts of Ecology, Basics of Species, Biodiversity, Ecosystem, Hydrological Cycle; Chemical Cycles: Carbon, Nitrogen & Phosphorus; Energy Flow in Ecosystems.
Water Pollution: Water Quality standards, Introduction to Treatment & Disposal of Waste Water. Reuse and Saving of Water, Rain Water Harvesting. Solid Waste Management: Classification of Solid Waste, Collection, Transportation and Disposal of Solid. Recycling of Solid Waste: Energy Recovery, Sanitary Landfill, On-Site Sanitation. Air & Noise Pollution: Primary and Secondary air pollutants, Harmful effects of Air Pollution, Control of Air Pollution. . Noise Pollution Harmful Effects of noise pollution, control of noise pollution, Global warming & Climate Change, Ozone depletion, Greenhouse effect
Text Books:
1. Palancharmy, Basic Civil Engineering, McGraw Hill publishers.
2. Satheesh Gopi, Basic Civil Engineering, Pearson Publishers.
3. Ketki Rangwala Dalal, Essentials of Civil Engineering, Charotar Publishing House.
4. BCP, Surveying volume 1
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...TechSoup
Whether you're new to SEO or looking to refine your existing strategies, this webinar will provide you with actionable insights and practical tips to elevate your nonprofit's online presence.
This presentation was provided by Rebecca Benner, Ph.D., of the American Society of Anesthesiologists, for the second session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session Two: 'Expanding Pathways to Publishing Careers,' was held June 13, 2024.
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...indexPub
The recent surge in pro-Palestine student activism has prompted significant responses from universities, ranging from negotiations and divestment commitments to increased transparency about investments in companies supporting the war on Gaza. This activism has led to the cessation of student encampments but also highlighted the substantial sacrifices made by students, including academic disruptions and personal risks. The primary drivers of these protests are poor university administration, lack of transparency, and inadequate communication between officials and students. This study examines the profound emotional, psychological, and professional impacts on students engaged in pro-Palestine protests, focusing on Generation Z's (Gen-Z) activism dynamics. This paper explores the significant sacrifices made by these students and even the professors supporting the pro-Palestine movement, with a focus on recent global movements. Through an in-depth analysis of printed and electronic media, the study examines the impacts of these sacrifices on the academic and personal lives of those involved. The paper highlights examples from various universities, demonstrating student activism's long-term and short-term effects, including disciplinary actions, social backlash, and career implications. The researchers also explore the broader implications of student sacrifices. The findings reveal that these sacrifices are driven by a profound commitment to justice and human rights, and are influenced by the increasing availability of information, peer interactions, and personal convictions. The study also discusses the broader implications of this activism, comparing it to historical precedents and assessing its potential to influence policy and public opinion. The emotional and psychological toll on student activists is significant, but their sense of purpose and community support mitigates some of these challenges. However, the researchers call for acknowledging the broader Impact of these sacrifices on the future global movement of FreePalestine.
3. Dr. Tamer Omar
Link State Routing
(an adaptive routing algorithm)
1. Discover your neighbors and learn their
addresses.
2. Measure the cost (delay) to each neighbor.
3. Construct a packet containing all this
information
4. Send this packet to all other routers.
5. Compute the shortest path to every other
router.
4. Dr. Tamer Omar
1. Discovering Your Neighbors
❑ Send “Hello” packet on each point-to-
point line. Destination node replies with
its address.
5. Dr. Tamer Omar
1. Discovering Your Neighbors
Nine routers and a broadcast LAN.
6. Dr. Tamer Omar
1. Discovering Your Neighbors
A graph model of previous slide.
7. Dr. Tamer Omar
2. Measuring Line Cost
❑ Send an “ECHO” packet over the line.
❑ Destination is required to respond to “ECHO”
packet immediately.
❑ Measure the time required for this operation.
❑ Question: Should we measure just the time it
takes to transmit the packet, or should we
include the time that the packet waits in the
queue?
9. Dr. Tamer Omar
4. Distributing the Link State Packets
❑Use selective flooding
❑Sequence numbers prevent duplicate
packets from being propagated
❑Lower sequence numbers are rejected
as obsolete
10. Dr. Tamer Omar
4. Distributing the Link State Packets
The packet buffer for router B in previous slide
▪ the link state packet from A arrives directly, so it must be sent
to C and F and acknowledged to A, as indicated by the flag
bits. Similarly, the packet from F has to be forwarded to A and
C and acknowledged to F.
11. Dr. Tamer Omar
Hierarchical Routing
❑ As a network size grows, routing table grows.
❑ Divide routers into regions
❑ Each router knows all the details about routing
within its region and knows nothing about the
internal structure of other region.
❑ Advantage: less storage requirement
❑ Penalty: longer path.
12. Dr. Tamer Omar
Hierarchical Routing
❑ As a network size grows, routing table grows.
❑ Divide routers into regions
❑ Each router knows all the details about routing
within its region and knows nothing about the
internal structure of other region.
❑ Works like telephone routing
❑ Advantage: less storage requirement
❑ Penalty: longer path.
14. Dr. Tamer Omar
Unicast Routing Protocols
❑ In unicast communication, there is one source and one
destination. The relationship between the source and the
destination is one-to-one.
❑ A unicast packet starts from the source S1 and passes through
routers to reach the destination D1.
❑ In unicast routing, each router in the domain has a table that
defines a shortest path tree to possible destinations.
16. Dr. Tamer Omar
Multicasting Routing Protocols
❑ In multicast communication, there is one source and a group of
destinations. The relationship is one-to-many. In this type of
communication, the source address is a unicast address, but the
destination address is a group address, which defines one or
more destinations.
A multicast packet starts from the
source S1 and goes to all
destinations that
belong to group G1. In multicasting,
when a router receives a packet, it
may forward it
through several of its interfaces
17. Dr. Tamer Omar
Multicasting Routing Protocols
❑ A multicast packet may have destinations in more than
one network. Forwarding of a single packet to
members of a group requires a shortest path tree. If we
have n groups, we may need n shortest path trees. We
can imagine the complexity of multicast routing. Two
approaches have been used to solve the problem:
source-based trees and group-shared trees.
❑ Source-Based Tree. In the source-based tree approach,
each router needs to have one shortest path tree for
each group. The shortest path tree for a group defines
the next hop for each network that has loyal
member(s) for that group.
18. Dr. Tamer Omar
Source-based trees
If router Rl receives a packet with destination address G1, it needs to send a copy of
the packet to the attached network, a copy to router R2, and a copy to router R4 so
that all members of G1 can receive a copy. In this approach, if the number of groups is
m, each router needs to have m shortest path trees, one for each group. We can
imagine the complexity of the routing table if we have hundreds or thousands of
groups. H
19. Dr. Tamer Omar
Group-Shared Tree
❑In the group-shared tree approach, instead of each
router having m shortest path trees, only one
designated router, called the center core, takes the
responsibility of distributing multicast traffic.
❑The core has m shortest path trees in its routing table.
The rest of the routers in the domain have none. If a
router receives a multicast packet, it encapsulates the
packet in a unicast packet and sends it to the core
router. The core router removes the multicast packet
from its capsule, and consults its routing table to
route the packet.
21. Dr. Tamer Omar
Multicast Routing
❑ Multicast routing is a networking method for efficient
distribution of one-to-many traffic. A multicast source,
such as a live video conference, sends traffic in one
stream to a multicast group. The multicast group
contains receivers such as computers, devices, and IP
phones.
• Voice over IP (VOIP)
• Video on demand (VOD)
• Video conferencing
• IP television (IPTV)
22. Dr. Tamer Omar
Broadcasting
❑ In broadcast communication, the relationship between
the source and the destination is one-to-all. There is
only one source, but all the other hosts are the
destinations
23. Dr. Tamer Omar
Congestion Control Algorithms
❑ Congestion Control is a mechanism that
controls the entry of data packets into the
network, enabling a better use of a shared
network infrastructure and avoiding
congestive collapse. Congestive-Avoidance
Algorithms (CAA) are implemented at the TCP
layer as the mechanism to avoid congestive
collapse in a network.
24. Dr. Tamer Omar
General Principles of Congestion Control
❑ Open loop solutions attempt to solve the
problem by good design
❑ Closed loop solutions are based on the concept of a
feedback loop. This approach has three parts when
applied to congestion control:
1. Monitor the system to detect when and where
congestion occurs.
2. Pass this information to places where action can be
taken.
3. Adjust system operation to correct the problem.
25. Dr. Tamer Omar
Policies that affect congestion.
❑ Retransmission Policy :
It is the policy in which retransmission of the
packets are taken care of. If the sender feels
that a sent packet is lost or corrupted, the
packet needs to be retransmitted. This
transmission may increase the congestion in
the network.
▪ To prevent congestion, retransmission
timers must be designed to prevent
congestion and also able to optimize
efficiency.
26. Dr. Tamer Omar
Policies that affect congestion.
❑ Window Policy :
The type of window at the sender’s side may
also affect the congestion. Several packets in
the Go-back-n window are re-sent, although
some packets may be received successfully at
the receiver side. This duplication may
increase the congestion in the network and
make it worse.
❑ Therefore, Selective repeat window should be
adopted as it sends the specific packet that
may have been lost.
27. Dr. Tamer Omar
Policies that affect congestion.
❑ Discarding Policy :
A good discarding policy adopted by the
routers is that the routers may prevent
congestion and at the same time partially
discard the corrupted or less sensitive
packages and also be able to maintain the
quality of a message.
▪ In case of audio file transmission, routers
can discard less sensitive packets to
prevent congestion and also maintain the
quality of the audio file.
28. Dr. Tamer Omar
Policies that affect congestion.
❑ Acknowledgment Policy :
Since acknowledgements are also the part of
the load in the network, the acknowledgment
policy imposed by the receiver may also affect
congestion. Several approaches can be used
to prevent congestion related to
acknowledgment.
▪ The receiver should send
acknowledgement for N packets rather
than sending acknowledgement for a single
packet. The receiver should send an
acknowledgment only if it has to send a
29. Dr. Tamer Omar
Policies that affect congestion.
❑ Admission Policy :
In admission policy a mechanism should be
used to prevent congestion. Switches in a flow
should first check the resource requirement of
a network flow before transmitting it further. If
there is a chance of a congestion or there is a
congestion in the network, router should deny
establishing a virtual network connection to
prevent further congestion.
30. Dr. Tamer Omar
Logical Addressing
❑ IP address
The Internet addresses are 32 bits in length;
this gives us a maximum of 232addresses.
These addresses are referred to as IPv4 (IP
version 4) addresses or simply IP addresses if
there is no confusion.
❑ A new design of the IP layer called the new generation
of IP or IPv6 (lP version 6). In this version, the
Internet uses 128-bit addresses that give much greater
flexibility in address allocation. These addresses are
referred to as IPv6 (IP version 6) addresses.
❑ In this lecture, we first discuss IPv4 addresses, which
are currently being used in the Internet.
31. Dr. Tamer Omar
IPv4 ADDRESSES
❑ An IPv4 address is a 32-bit address that uniquely and
universally defines the connection of a device (for example, a
computer or a router) to the Internet.
❑ An identifier for a computer or device on a TCP/IP network.
Networks using the TCP/IP protocol route messages based on
the IP address of the destination.
❑ The IPv4 addresses are universal in the sense that the
addressing system must be accepted by any host that wants to
be connected to the Internet
❑ Address Space
• An address space is the total number of addresses used by
the protocol. If a protocol uses N bits to define an address,
the address space is 2N because each bit can have two
different values (0 or 1) and N bits can have 2N values
32. Dr. Tamer Omar
IPv4 ADDRESSES
❑ IPv4 uses 32-bit addresses, which means that the
address space is 232 or 4,294,967,296 (more than 4
billion). This means that, theoretically, if there were no
restrictions, more than 4 billion devices could be
connected to the Internet. We will see shortly that the
actual number is much less because of the restrictions
imposed on the addresses.
❑ Notations
• There are two prevalent notations to show an IPv4
address: binary notation and dotte ddecimal
notation.
33. Dr. Tamer Omar
Binary Notation
❑ In binary notation, the IPv4 address is displayed as
32 bits. Each octet is often referred to as a byte. So
it is common to hear an IPv4 address referred to as
a 32-bit address or a 4-byte address. The following
is an example of an IPv4 address in binary notation:
01110101 10010101 00011101 0000001
34. Dr. Tamer Omar
Dotted-Decimal Notation
❑ To make the IPv4 address more compact and easier
to read, Internet addresses are usually written in
decimal form with a decimal point (dot) separating
the bytes. The following is the dotted~decimal
notation of the above address:
117.149.29.2
35. Dr. Tamer Omar
Classful Addressing
❑ Each IP address breaks down into the following sections:
▪ Net ID—Identifies a network. The first several bits of a
net ID, known as the class field or class bits, identify the
class of the IP address.
▪ Host ID—Identifies a host on a network.
❑ In classful addressing, the address space is divided into five
classes: A, B, C, D, and E. Each class occupies some part of
the address space.
❑ We can find the class of an address when given the address
in binary notation or dotted-decimal notation. If the address
is given in binary notation, the first few bits can
immediately tell us the class of the address. If the address is
given in decimal-dotted notation, the first byte defines the
class.
36. Dr. Tamer Omar
Classful Addressing
• Class A - 168.212.226.204
• supports 16 million hosts on each of 127 networks
• Class B - 168.212.226.204
• supports 65,000 hosts on each of 16,000 networks
– NDUS has two Class B addresses
• 134.129.xxx.xxx Eastern ND
• 134.234.xxx.xxx Western ND
• Class C - 168.212.226.204
• supports 254 hosts on each of 2 million networks
38. Dr. Tamer Omar
Classful Addressing
Class Address range Remarks
A 0.0.0.0 to 127.255.255.255 The IP address 0.0.0.0 is used by a host at
startup for temporary communication. This
address is never a valid destination
address. Addresses starting with 127 are
reserved for loopback test. Packets
destined to these addresses are processed
locally as input packets rather than sent to
the link.
B 128.0.0.0 to 191.255.255.255 N/A
C 192.0.0.0 to 223.255.255.255 N/A
D 224.0.0.0 to 239.255.255.255 Multicast addresses.
E 240.0.0.0 to 255.255.255.255 Reserved for future use, except for the
broadcast address 255.255.255.255.
39. Dr. Tamer Omar
Classes and Blocks
❑ One problem with classful addressing is that each class is divided into a
fixed number
❑ When an organization requested a block of addresses, it was granted one
in class A, B, or C. Class A addresses were designed for large
organizations with a large number of attached hosts or routers. Class B
addresses were designed for midsize organizations with tens of
thousands of attached hosts or routers. Class C addresses were designed
for small organizations with a small number of attached hosts or routers
40. Dr. Tamer Omar
Classes and Blocks
❑ We can see the flaw in this design. A block in class A
address is too large for almost any organization. This means
most of the addresses in class A were wasted and were not
used. A block in class B is also very large, probably too
large for many of the organizations that received a class B
block. A block in class C is probably too small for many
organizations. Class D addresses were designed for
multicasting. Each address in this class is used to define one
group of hosts on the Internet. The Internet authorities
wrongly predicted a need for 268,435,456 groups. This
never happened and many addresses were wasted here too.
And lastly, the class E addresses were reserved for future
use; only a few were used, resulting in another waste of
addresses
41. Dr. Tamer Omar
Subnetting
◼ Divide a network to smaller networks
(subnets)
◼ Reasons
◼ Reduce network traffic
◼ Improve network performance
◼ Management
◼ Allocate host bits for subnet bits
◼ Make use of subnet masks
42. Dr. Tamer Omar
Mask
❑ Although the length of the netid and hostid (in bits) is
predetermined in classful addressing, we can also use a 32-
bit number called the default mask.
❑ The mask can help us to find the netid and the hostid. For
example, the mask for a class A address has eight 1s, which
means the first 8 bits of any address in class A define the
netid; the next 24 bits define the hosted
43. Dr. Tamer Omar
Subnet Mask
◼ A 32-bit string
◼ All 1s and then all 0s, they never mix
◼ It specifies number of bits for network
ID in an IP address
45. Dr. Tamer Omar
Subnet Mask (Example II)
◼ IP Address: 201.100.26.171
◼ Subnet Mask: 255.255.255.192
11111111.11111111.11111111.11000000
◼ First 26 bits as network ID, therefore
◼ Network ID: 201.100.26.128
◼ Host ID: 43
46. Dr. Tamer Omar
Subnet Mask (Example III)
◼ Design a subnet mask for a Class B
network with 25 subnets
◼ Number of bits for subnet = lg(25+2) = 5
◼ Number of bits for network ID = 16+5=21
◼ Subnet mask is
11111111.11111111.11111000.00000000
255.255.248.0
47. Dr. Tamer Omar
Subnet Mask (Example IV)
◼ Given IP address 203.59.43.134 and
subnet mask 255.255.255.192, find
valid host range in this subnet
◼ Network ID: 203.59.43.128
◼ All 0 and all 1 host IDs are reserved,
therefore
◼ 203.59.43.129 – 203.59.43.190
◼ Number of hosts 62
◼ To verify: 62 = 26-2
48. Dr. Tamer Omar
Subnet Mask (Example VI)
◼ A block of addresses is granted to a small
organization. We know that one of the
addresses is 205.16.37.39/28.
◼ Find the first address
◼ Address: 11001101 00010000 00100101 00100111
AND
◼ Mask 11111111 11111111 11111111 11110000
◼ First address 11001101 00010000 00100101 00100000
◼ Find the last address
◼ Address: 11001101 00010000 00100101 00100111
OR
◼ Mask Complement 00000000 00000000 00000000 00001111
◼ Last address 11001101 00010000 00100101 00101111
◼ The number of addresses
◼ Mask Complement+1=1111+1=16