This document provides an overview and syllabus for a computer networking course. It will take a top-down approach, beginning with what services distributed applications require from networks and how networks provide those services. The course will cover topics including network edge, access, and core; delay, loss and throughput; protocol layers and models; network programming; and the application, transport, network, link and physical layers of the TCP/IP stack. The instructor is Dr. Nauman Mazhar and the course will include lectures, assignments, quizzes, and exams.
This document outlines the course Fundamentals of Computer Networks. It discusses the goals of conveying principles and mechanisms to build scalable computer networks that can grow globally and support diverse applications. The course covers topics like routing, end-to-end protocols, congestion control, wireless networks, and applications through a combination of lectures, practical assignments, and conceptual assignments. It also provides an outline of the first lecture covering requirements, architecture, implementation, and an overview of chapters in the textbook.
The document provides an overview of computer networks and the Internet by introducing key concepts and terminology. It describes the Internet as a network of networks that interconnects millions of computing devices and communication links. Protocols control the sending and receiving of messages and define how network entities communicate. The network is organized into layers with different protocols at each layer, known as the Internet protocol stack.
This document provides an overview of the "Computer Networks and Data Communications" course offered at Must.ac.ug. The course is taught on Thursdays from 11:00-12:30pm in the Post Graduate Room1. Students are expected to attend all lectures, complete assignments and projects, and participate in discussions. Prerequisites include basic computer skills and knowledge of the Internet. Students will access course materials through the learning management system using the enrollment key 3114. Evaluation includes in-class assignments, a midterm test, group projects, attendance, and a final exam. The semester project involves designing a campus network using Packet Tracer. Topics covered include networking fundamentals, OSI and TCP/IP models, physical
This document provides an overview of IP networking and TCP/IP basics. It discusses the origins of TCP/IP in the ARPANET project and the distributed network design. It describes the OSI model and compares it to the TCP/IP architecture. It also covers IP addressing and numbering, client-server architecture, IP forwarding, and some common network troubleshooting tools.
ip net basic understanding slide show pptlolo749806
This document provides an overview of IP networking and TCP/IP basics. It discusses the origins of TCP/IP from the ARPANET project in the 1960s and its distributed network design. It also describes the OSI model and how TCP/IP maps to it, with layers for the application, transport, internet, and link levels. Finally, it covers client-server architecture and IP addressing fundamentals like public and private address spaces.
This document outlines the syllabus for the 15-744 Computer Networking course. It introduces the professor, TAs, and course objectives. The course will cover networking from the network layer to application layer, focusing on protocol rules, algorithms, and tradeoffs. Topics will include routing, transport, naming systems, and recent areas like multicast, mobility, and security. Assignments include problem sets, reading responses, a class project, and exams. The next lecture will discuss design considerations for splitting functionality across layers and nodes.
A computer network is a collection of interconnected devices that can communicate with each other to share resources and information. These devices can include computers, servers, routers, switches, printers, and more. Networks can vary in size and complexity, from small local networks within a home or office to vast global networks like the internet.
Computer Networks and Internet.ppt of coitxminahil29
_Happiest birthday patner_"🥺❤️🤭
Many many happy returns of the day ❤️🌏🔐.... may this year brings more happiness 🤗 and success 🥀 for u..... may uh have many more 🥰🫶.... may urhh life be as beautiful as you are 😋🌏🫀..... may ur all desire wishes come true 😌✨🖤..... May uh get double of everything uh want in ur life 🌈💫......you're such a great guy and puri hearted and sweetest girl 🥹🫰🏻🩷....uh deserve all cakes hug an happiness today 🥰👻... hmesha khush rho pyariiii🫣🩷....
Once again happy birthday My Gurl 🥳❤️🔐
_JUG JUG JIYOOO_
This document outlines the course Fundamentals of Computer Networks. It discusses the goals of conveying principles and mechanisms to build scalable computer networks that can grow globally and support diverse applications. The course covers topics like routing, end-to-end protocols, congestion control, wireless networks, and applications through a combination of lectures, practical assignments, and conceptual assignments. It also provides an outline of the first lecture covering requirements, architecture, implementation, and an overview of chapters in the textbook.
The document provides an overview of computer networks and the Internet by introducing key concepts and terminology. It describes the Internet as a network of networks that interconnects millions of computing devices and communication links. Protocols control the sending and receiving of messages and define how network entities communicate. The network is organized into layers with different protocols at each layer, known as the Internet protocol stack.
This document provides an overview of the "Computer Networks and Data Communications" course offered at Must.ac.ug. The course is taught on Thursdays from 11:00-12:30pm in the Post Graduate Room1. Students are expected to attend all lectures, complete assignments and projects, and participate in discussions. Prerequisites include basic computer skills and knowledge of the Internet. Students will access course materials through the learning management system using the enrollment key 3114. Evaluation includes in-class assignments, a midterm test, group projects, attendance, and a final exam. The semester project involves designing a campus network using Packet Tracer. Topics covered include networking fundamentals, OSI and TCP/IP models, physical
This document provides an overview of IP networking and TCP/IP basics. It discusses the origins of TCP/IP in the ARPANET project and the distributed network design. It describes the OSI model and compares it to the TCP/IP architecture. It also covers IP addressing and numbering, client-server architecture, IP forwarding, and some common network troubleshooting tools.
ip net basic understanding slide show pptlolo749806
This document provides an overview of IP networking and TCP/IP basics. It discusses the origins of TCP/IP from the ARPANET project in the 1960s and its distributed network design. It also describes the OSI model and how TCP/IP maps to it, with layers for the application, transport, internet, and link levels. Finally, it covers client-server architecture and IP addressing fundamentals like public and private address spaces.
This document outlines the syllabus for the 15-744 Computer Networking course. It introduces the professor, TAs, and course objectives. The course will cover networking from the network layer to application layer, focusing on protocol rules, algorithms, and tradeoffs. Topics will include routing, transport, naming systems, and recent areas like multicast, mobility, and security. Assignments include problem sets, reading responses, a class project, and exams. The next lecture will discuss design considerations for splitting functionality across layers and nodes.
A computer network is a collection of interconnected devices that can communicate with each other to share resources and information. These devices can include computers, servers, routers, switches, printers, and more. Networks can vary in size and complexity, from small local networks within a home or office to vast global networks like the internet.
Computer Networks and Internet.ppt of coitxminahil29
_Happiest birthday patner_"🥺❤️🤭
Many many happy returns of the day ❤️🌏🔐.... may this year brings more happiness 🤗 and success 🥀 for u..... may uh have many more 🥰🫶.... may urhh life be as beautiful as you are 😋🌏🫀..... may ur all desire wishes come true 😌✨🖤..... May uh get double of everything uh want in ur life 🌈💫......you're such a great guy and puri hearted and sweetest girl 🥹🫰🏻🩷....uh deserve all cakes hug an happiness today 🥰👻... hmesha khush rho pyariiii🫣🩷....
Once again happy birthday My Gurl 🥳❤️🔐
_JUG JUG JIYOOO_
The document discusses the ISO-OSI 7-layer reference model and related IEEE standards. It covers the purpose and functions of each layer, including the physical, data link, network, transport, session, presentation and application layers. It also describes how data is formatted and encapsulated as it passes through each layer. Finally, it discusses the IEEE 802 standards group and some of the key standards they developed that apply to networking, particularly at the data link and physical layers.
This document provides an introduction to computer networks presented by Navpreet Singh, the Network Manager at IIT Kanpur. It discusses the basics of computer networks including definitions, applications, topologies, components, protocols, and networking applications. The course content includes 16 lectures and 8 labs covering topics such as the OSI model, physical media, LAN and WAN technologies, IP addressing, routing, and practical configurations.
This document provides an introduction to computer networks. It discusses the basics of LANs, MANs and WANs. It describes common network topologies like bus, star, ring and mesh. It also discusses the various components that make up a network including physical media, networking devices, computers, networking software and applications. The document is intended to provide a high-level overview of computer networks.
This document provides an overview of key concepts in computer networking and the structure of the Internet. It begins with definitions of the Internet as a globally connected network of hosts, end systems, and routers. Data transmission occurs through various access networks to residential, institutional, or mobile end systems and then through the network core. In the core, routers forward packets via packet switching, where data is broken into packets that are transmitted over shared network links. The Internet structure is described as a hierarchical "network of networks" with different tiers of Internet service providers. The document outlines various networking technologies and concepts to be covered in more depth later.
The document discusses slides created by authors JFK and KWR for their networking textbook. It states that the slides can be freely used and modified by others as long as the source and copyright are mentioned if used substantially unaltered or posted online. The authors thank readers for using the slides and enjoying them.
This document provides an overview of networking concepts including the basic components of a network, common network topologies, network devices, network addressing using IP addresses and subnet masks, network models like OSI and TCP/IP, and basic network communication. Key topics covered include LANs, WANs, Ethernet, wireless networks, routers, switches, TCP, UDP, ports, MAC addresses, and the layers of the OSI and TCP/IP models.
The document discusses protocols and the TCP/IP protocol suite. It describes protocols as mutually agreed upon conventions and rules that allow different computer systems to communicate. It introduces the concept of a layered protocol architecture with different layers providing services to upper layers. It then provides examples of the OSI reference model and the widely used TCP/IP protocol suite as standard protocol architectures. The TCP/IP model includes layers for applications, transport, internet, and network access. Key protocols discussed are IP, TCP, UDP, and several application layer protocols.
This document provides an overview of key topics in data communications and networking protocols. It defines what a protocol is, describing the key elements of syntax, semantics, and timing. It also discusses layered protocol architectures like TCP/IP and the OSI model. Common protocol functions are explained, such as encapsulation, fragmentation and reassembly, and addressing. Application layer protocols for the internet like HTTP, SMTP, and TCP sockets are covered. The document uses examples to illustrate client-server and peer-to-peer network architectures as well as socket programming.
Introduction to Computer Networking CYSE230killerbladex15
The document provides an overview of topics to be covered in an introduction to computer networking course, including what the Internet is, network protocols, the structure of the network edge and core, performance metrics, layering and security. It outlines key concepts like hosts, access networks, packet switching, and routing. The goal is to help students understand networking terminology and approach the topics by using the Internet as a main example.
This document provides an overview of networking fundamentals including:
1) It describes the layered protocol model used in networking with examples of the ISO OSI model and TCP/IP model.
2) It defines what the Internet is as a network of interconnected networks that allows communication through standardized protocols like TCP, IP, and HTTP across a variety of physical network infrastructures.
3) It discusses different network architectures including client-server, peer-to-peer, caching with proxy servers, thin clients with remote computing, and wireless and wired access networks that connect end systems to the network core.
The document discusses network layering models and protocols. It describes:
1. The OSI reference model which has 7 layers from physical to application layer and defines the function of each layer.
2. The TCP/IP reference model which has 4 layers from host-to-network to application layer and the protocols used at each layer.
3. The key concepts of layers, protocols, services, interfaces, and how layers communicate with PDUs and SDUs.
The document discusses technologies and concepts related to wide area networks (WAN). It begins by defining WAN as a collection of LANs, MANs, and workgroups connected using communication devices and the internet. It then covers WAN characteristics, benefits, services, equipment, topologies, and physical standards. Several data link protocols used in WANs are also explained, including SDLC, HDLC, PPP, X.25, Frame Relay, ISDN, and ATM. The role of standards bodies in WAN standardization is briefly mentioned.
FellowBuddy.com is an innovative platform that brings students together to share notes, exam papers, study guides, project reports and presentation for upcoming exams.
We connect Students who have an understanding of course material with Students who need help.
Benefits:-
# Students can catch up on notes they missed because of an absence.
# Underachievers can find peer developed notes that break down lecture and study material in a way that they can understand
# Students can earn better grades, save time and study effectively
Our Vision & Mission – Simplifying Students Life
Our Belief – “The great breakthrough in your life comes when you realize it, that you can learn anything you need to learn; to accomplish any goal that you have set for yourself. This means there are no limits on what you can be, have or do.”
Like Us - https://www.facebook.com/FellowBuddycom
This document discusses network architectures and protocols. It describes the OSI 7-layer model and the TCP/IP model. The key layers of each model are presented, including their functions and example protocols. Encapsulation is defined as the process of adding header and trailer data to messages at each layer. This allows protocols to communicate indirectly through lower level protocols in the protocol graph.
This document provides an overview of networking and internetworking concepts. It defines what a network is and some common network protocols like TCP/IP. It discusses how network speed is measured by bit rate and latency. It then covers local area networks, wide area networks, and the internet. The document explains the purpose of networks for file sharing, communication, and remote program execution. It also discusses network messaging and different network service models like the OSI reference model and TCP/IP model. Finally, it provides a simplified example of how the TCP/IP protocol functions to route a packet from a source to destination across multiple routers.
This document outlines the course plan and materials for an Advanced Computer Networks course. The course will cover topics like computer network principles, various protocol layers, routing, multimedia networking, and network security. Students will be evaluated based on assignments, a project, short paper, and final exam. The recommended textbooks provide an in-depth look at computer networks, networking protocols, and Internet applications.
Topic 1.1 basic concepts of computer networkAtika Zaimi
This document provides an overview of computer networks, including their components, characteristics, and classifications. It defines peer-to-peer and client-server networks, describing their advantages and disadvantages. Various network topologies such as bus, star, ring, and mesh are explained. The document also outlines the key standards organizations that set networking guidelines and lists common network hardware functions. Learners will gain an understanding of fundamental network concepts.
The document provides an overview of the key topics that will be covered in Chapter 1 of the textbook "Computer Networking: A Top Down Approach". It outlines the major sections that will be discussed including what the Internet is, the structure of networks including the network edge, core, and hierarchy. It also summarizes that delay, loss, throughput, protocol layers, security, and history will be covered. The goal is to provide an introduction and "feel" for computer networking concepts and terminology that will be explored in more depth throughout the course.
The document discusses an introduction chapter from a computer networking textbook, covering topics such as what the Internet is, network structure including the edge, core, and access networks, protocols, and a brief history of the Internet. It provides an overview of key concepts and terms in computer networking and outlines the structure and content of the introduction chapter.
This document contains lecture notes on fundamentals of computer systems from Dr. Atif Shahzad. It covers topics such as logic, Boolean algebra, memory, CPU, registers, fetch-execute cycle, file management, networking, OSI model, LAN, WAN, communication protocols, latency, capacity, broadcast, firewalls, and network speeds. The document provides definitions and explanations of key computer science concepts.
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
More Related Content
Similar to Week_1_Intro_Internet_arch_Applications.ppt
The document discusses the ISO-OSI 7-layer reference model and related IEEE standards. It covers the purpose and functions of each layer, including the physical, data link, network, transport, session, presentation and application layers. It also describes how data is formatted and encapsulated as it passes through each layer. Finally, it discusses the IEEE 802 standards group and some of the key standards they developed that apply to networking, particularly at the data link and physical layers.
This document provides an introduction to computer networks presented by Navpreet Singh, the Network Manager at IIT Kanpur. It discusses the basics of computer networks including definitions, applications, topologies, components, protocols, and networking applications. The course content includes 16 lectures and 8 labs covering topics such as the OSI model, physical media, LAN and WAN technologies, IP addressing, routing, and practical configurations.
This document provides an introduction to computer networks. It discusses the basics of LANs, MANs and WANs. It describes common network topologies like bus, star, ring and mesh. It also discusses the various components that make up a network including physical media, networking devices, computers, networking software and applications. The document is intended to provide a high-level overview of computer networks.
This document provides an overview of key concepts in computer networking and the structure of the Internet. It begins with definitions of the Internet as a globally connected network of hosts, end systems, and routers. Data transmission occurs through various access networks to residential, institutional, or mobile end systems and then through the network core. In the core, routers forward packets via packet switching, where data is broken into packets that are transmitted over shared network links. The Internet structure is described as a hierarchical "network of networks" with different tiers of Internet service providers. The document outlines various networking technologies and concepts to be covered in more depth later.
The document discusses slides created by authors JFK and KWR for their networking textbook. It states that the slides can be freely used and modified by others as long as the source and copyright are mentioned if used substantially unaltered or posted online. The authors thank readers for using the slides and enjoying them.
This document provides an overview of networking concepts including the basic components of a network, common network topologies, network devices, network addressing using IP addresses and subnet masks, network models like OSI and TCP/IP, and basic network communication. Key topics covered include LANs, WANs, Ethernet, wireless networks, routers, switches, TCP, UDP, ports, MAC addresses, and the layers of the OSI and TCP/IP models.
The document discusses protocols and the TCP/IP protocol suite. It describes protocols as mutually agreed upon conventions and rules that allow different computer systems to communicate. It introduces the concept of a layered protocol architecture with different layers providing services to upper layers. It then provides examples of the OSI reference model and the widely used TCP/IP protocol suite as standard protocol architectures. The TCP/IP model includes layers for applications, transport, internet, and network access. Key protocols discussed are IP, TCP, UDP, and several application layer protocols.
This document provides an overview of key topics in data communications and networking protocols. It defines what a protocol is, describing the key elements of syntax, semantics, and timing. It also discusses layered protocol architectures like TCP/IP and the OSI model. Common protocol functions are explained, such as encapsulation, fragmentation and reassembly, and addressing. Application layer protocols for the internet like HTTP, SMTP, and TCP sockets are covered. The document uses examples to illustrate client-server and peer-to-peer network architectures as well as socket programming.
Introduction to Computer Networking CYSE230killerbladex15
The document provides an overview of topics to be covered in an introduction to computer networking course, including what the Internet is, network protocols, the structure of the network edge and core, performance metrics, layering and security. It outlines key concepts like hosts, access networks, packet switching, and routing. The goal is to help students understand networking terminology and approach the topics by using the Internet as a main example.
This document provides an overview of networking fundamentals including:
1) It describes the layered protocol model used in networking with examples of the ISO OSI model and TCP/IP model.
2) It defines what the Internet is as a network of interconnected networks that allows communication through standardized protocols like TCP, IP, and HTTP across a variety of physical network infrastructures.
3) It discusses different network architectures including client-server, peer-to-peer, caching with proxy servers, thin clients with remote computing, and wireless and wired access networks that connect end systems to the network core.
The document discusses network layering models and protocols. It describes:
1. The OSI reference model which has 7 layers from physical to application layer and defines the function of each layer.
2. The TCP/IP reference model which has 4 layers from host-to-network to application layer and the protocols used at each layer.
3. The key concepts of layers, protocols, services, interfaces, and how layers communicate with PDUs and SDUs.
The document discusses technologies and concepts related to wide area networks (WAN). It begins by defining WAN as a collection of LANs, MANs, and workgroups connected using communication devices and the internet. It then covers WAN characteristics, benefits, services, equipment, topologies, and physical standards. Several data link protocols used in WANs are also explained, including SDLC, HDLC, PPP, X.25, Frame Relay, ISDN, and ATM. The role of standards bodies in WAN standardization is briefly mentioned.
FellowBuddy.com is an innovative platform that brings students together to share notes, exam papers, study guides, project reports and presentation for upcoming exams.
We connect Students who have an understanding of course material with Students who need help.
Benefits:-
# Students can catch up on notes they missed because of an absence.
# Underachievers can find peer developed notes that break down lecture and study material in a way that they can understand
# Students can earn better grades, save time and study effectively
Our Vision & Mission – Simplifying Students Life
Our Belief – “The great breakthrough in your life comes when you realize it, that you can learn anything you need to learn; to accomplish any goal that you have set for yourself. This means there are no limits on what you can be, have or do.”
Like Us - https://www.facebook.com/FellowBuddycom
This document discusses network architectures and protocols. It describes the OSI 7-layer model and the TCP/IP model. The key layers of each model are presented, including their functions and example protocols. Encapsulation is defined as the process of adding header and trailer data to messages at each layer. This allows protocols to communicate indirectly through lower level protocols in the protocol graph.
This document provides an overview of networking and internetworking concepts. It defines what a network is and some common network protocols like TCP/IP. It discusses how network speed is measured by bit rate and latency. It then covers local area networks, wide area networks, and the internet. The document explains the purpose of networks for file sharing, communication, and remote program execution. It also discusses network messaging and different network service models like the OSI reference model and TCP/IP model. Finally, it provides a simplified example of how the TCP/IP protocol functions to route a packet from a source to destination across multiple routers.
This document outlines the course plan and materials for an Advanced Computer Networks course. The course will cover topics like computer network principles, various protocol layers, routing, multimedia networking, and network security. Students will be evaluated based on assignments, a project, short paper, and final exam. The recommended textbooks provide an in-depth look at computer networks, networking protocols, and Internet applications.
Topic 1.1 basic concepts of computer networkAtika Zaimi
This document provides an overview of computer networks, including their components, characteristics, and classifications. It defines peer-to-peer and client-server networks, describing their advantages and disadvantages. Various network topologies such as bus, star, ring, and mesh are explained. The document also outlines the key standards organizations that set networking guidelines and lists common network hardware functions. Learners will gain an understanding of fundamental network concepts.
The document provides an overview of the key topics that will be covered in Chapter 1 of the textbook "Computer Networking: A Top Down Approach". It outlines the major sections that will be discussed including what the Internet is, the structure of networks including the network edge, core, and hierarchy. It also summarizes that delay, loss, throughput, protocol layers, security, and history will be covered. The goal is to provide an introduction and "feel" for computer networking concepts and terminology that will be explored in more depth throughout the course.
The document discusses an introduction chapter from a computer networking textbook, covering topics such as what the Internet is, network structure including the edge, core, and access networks, protocols, and a brief history of the Internet. It provides an overview of key concepts and terms in computer networking and outlines the structure and content of the introduction chapter.
This document contains lecture notes on fundamentals of computer systems from Dr. Atif Shahzad. It covers topics such as logic, Boolean algebra, memory, CPU, registers, fetch-execute cycle, file management, networking, OSI model, LAN, WAN, communication protocols, latency, capacity, broadcast, firewalls, and network speeds. The document provides definitions and explanations of key computer science concepts.
Similar to Week_1_Intro_Internet_arch_Applications.ppt (20)
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceIndexBug
Imagine a world where machines not only perform tasks but also learn, adapt, and make decisions. This is the promise of Artificial Intelligence (AI), a technology that's not just enhancing our lives but revolutionizing entire industries.
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
“An Outlook of the Ongoing and Future Relationship between Blockchain Technologies and Process-aware Information Systems.” Invited talk at the joint workshop on Blockchain for Information Systems (BC4IS) and Blockchain for Trusted Data Sharing (B4TDS), co-located with with the 36th International Conference on Advanced Information Systems Engineering (CAiSE), 3 June 2024, Limassol, Cyprus.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
1. Computer
Networking: A
Top Down
Approach
6th edition
Jim Kurose, Keith Ross
Addison-Wesley
March 2012
Dr Nauman Mazhar
Faculty of Information Technology (FIT)
University of Central Punjab (UCP)
Computer Communications
& Networks
SENS-3523
• Introduction; Edge, Access, Core N/W
Week: 1
2. Instructor
DR NAUMAN MAZHAR
Associate Professor, Faculty of IT
PhD (Computer Engineering)
Computer Networks & Security
CASE, Islamabad, research element in Michigan State University, USA
MS (Computer Engineering)
Computer Networks & Security
IOWA State University, USA
BE (Avionics Engineering)
College of Aeronautical Engg (CAE), PAF Academy Risalpur (NED Univ)
nau.maz@ucp.edu.pk
2
3. Course Intro
• Basic course in Computer Networking
• Provides overview of…
– What are computer networks
– How do they operate
– How are they designed
• Adopts TOP DOWN approach…
– What services distributed applications require from N/Ws
– What N/W services & how they are provided to support operation of
remote applications – layered approach
– Relevant networking protocols/standards/algorithms, both in wired &
wireless domains
3
Computer Network ??
allow remote, distributed
applications to
communicate & provide
variety of services
4. • Computer Networks & the Internet
– Nuts & Bolts description
– Services description
– Network Edge & Core
– Delay, Loss & Throughput in packet switched networks
– Network architectures (TCP/IP, OSI)
• Application Layer
– Network applications, principles/architectures
– Services required by Apps, & made available by Networks
– Application layer protocols
(Web/HTTP, DNS, FTP, SMTP, POP3)
– Apps development; Socket Programming (TCP & UDP)
Course Contents
4
5. • Transport Layer
– Connection less, unreliable transport – UDP
– Reliable Data Transfer (Go-Back-N, Selective Repeat ARQ)
– Connection oriented transport – TCP
– TCP Connection management, Flow control, Congestion Control
• Network Layer
– Network service model – Datagram & VC networks
– Forwarding & routing, What’s inside a router
– IPv4 protocol, Addressing, Subnetting, CIDR
– DHCP, NAT, ICMP, IPv6 protocol
– Routing algorithms – LS/DV routing
Course Contents
5
6. • Link Layer
– Link layer functions
– Multiple access protocols
– Link layer addressing, ARP
– Link layer Technologies…
• Ethernet – IEEE 802.3 standard
• WiFi – IEEE 802.11 standard
Course Contents
6
8. Books Recommended
Text:
Computer Networking: A Top-Down Approach (6th Ed)
by James F. Kurose & Keith W. Ross
Unix Network Programming – Vol I
by W Richards Stevens
Ref:
Computer Networking: A Systems Approach (5th Ed)
by Larry L. Peterson & Bruce S. Davie
8
9. Course Methodology
Lectures
• 16 power point lectures
• Study relevant sections of Text/Ref books
Assignments
• Assignment done individually or in groups
• To be submitted exactly when due
• 5% marks deduction per day for being late
• After one week – Not Accepted
Exam Pattern
• Exams to include complete material in covered chapters
• MCQs, short answers, problems, design questions
9
10. Grading Policy
Quizzes ………. 04 15%
Assignments ………. 04 15%
Class participation ..….…. 05%
Mid-exam ..….…. 25%
Final-exam .……… 40%
Distribution is tentative and flexible
10
11. • Your work in this class must be your own
• If students are found to have:
– collaborated excessively, or
– copied/shared answers
• For the first infraction…
– all involved, at a min, will receive grades of 0
• Further infractions…
– will result in failure in course
Academic Honesty
11
12. Office Hours
12
Office : Room 11, C-Block
Office Hours: ???
Attendance Policy
Strictly in accordance with the Univ policy…
14. Chapter 1: roadmap
1.1 what is the Internet?
1.2 network edge
end systems (hosts), access networks, links
1.3 network core
packet switching, circuit switching, network structure
1.4 performance
delay, loss, thruput in networks
1.5 protocol layers, service models
1.6 networks under attack: security
1.7 history
14
15. What is the Internet: “Nuts & Bolts” view
Computing devices:
• hosts & end systems
• run network apps
• generate/use data
Communication links:
• copper, fiber,
radio, satellite
• data rate & distance
Packet switches:
forward packets
(chunks of data)
switches & routers
wired
links
wireless
links
router
smartphone
PC
server
wireless
laptop
15
• What basic components make
up the Internet…
16. • Internet: “network of networks”
– hierarchical structure
– interconnected ISPs
(lower tier ISPs, upper tier ISPs, …)
– home N/Ws plug into ISP N/Ws
• Networking “protocols”
– run at end systems & switches
– control sending/receiving of msgs
– HTTP, DNS, TCP, IP, Skype
• Internet standards
– IETF : Internet Engineering Task Force
– RFC : Request for comments
16
What’s the Internet: “Nuts & Bolts” view
17. “Fun” Internet appliances
IP picture frame
http://www.ceiva.com/
Web-enabled toaster +
weather forecaster
Internet phones
Internet
refrigerator
Slingbox: watch,
control cable TV remotely
Tweet-a-watt:
monitor energy use
17
18. What’s the Internet: Services view
• What services are provided to Apps
by Internet…
– Apps: Web, Email, VoIP, E-commerce,
Internet TV/radio, audio/video on demand,
video conf, online games, social nets
– Distributed Apps: involve multiple end
systems that exchange data remotely
– Require different Types of Services:
reliable or unreliable data delivery,
thruput/delay needs, security
– How does N/W provide services to
applications…???
18
19. What’s the Internet: Services view
• End Systems provide an interface
to apps
– Network API
“library functions” that allow
“process” on source end system to:
• “connect” to Internet
• “send/recv” data
– Specifies syntax
• how an appl asks Internet to
“send/receive data”
(provides options for various
types of services …)
19
20. An important buzzword in computer networking… “Protocol“
“pre-defined set of rules”
Analogy… Human protocol & Computer Network protocol…
What’s a protocol?
Hi
Hi
Got the
time?
2 pm
TCP connection
response
Get http://www.awl.com/kurose-ross
<file>
time
TCP connection
request
20
21. Why Network protocols?
• machines need coordination to interact with other machines
• require some protocol to operate in coordination
Network protocols define…
format/order of msgs among network entities,
& actions taken on msg Tx/Rx
21
all communications activity in Internet governed by protocols…
specific msgs sent
specific actions taken when msgs sent/recvd, or other events
occur
22. Network Structure
network edge:
end systems
hosts, servers, apps
access networks
N/Ws connecting end
systems to edge routers
wired/wireless comm
links
network core:
interconnection of routers
route pkts from src to dst host
form network of networks
22
23. The network edge
End systems (hosts):
host (run) appl programs
e.g, Web, email
Client/server model:
hosts act as clients or servers
server – always ON powerful machine
client – request/receive service
e.g, web browser/server,
email client/server
Peer-peer model:
all hosts equal
minimal (or no) use of dedicated servers
e.g, Skype, BitTorrent, Gnutella
23
24. Access networks
Networks to connect end
systems to edge router
• Several types of access networks
used in various settings…
– home access
– enterprise access
– wireless access
points to note…
• range & data rate of access
network ?
• access is shared or dedicated ?
24
25. Home Access
How do homes connect to
Internet
• Digital Subscriber Line (DSL)
• Cable Internet access
• Fiber to the Home (FTTH)
• Dial up modem
Two most prevalent ones are
DSL & Cable
25
26. Enterprise access networks (Ethernet)
26
Local Area Network (LAN) – connects end systems to edge router
Ethernet : most prevalent access N/W technology
twisted pair copper wire & LAN switches
dedicated link between host and switch
typically 100 Mbps to end systems; 1 - 10 Gbps to servers
27. Wireless access networks
• Shared wireless access network connects end system to edge router
– via “access point”or “base station”
Wireless LANs:
within building (100 m)
802.11b/g (WiFi): 11, 54 Mbps
transmission rate
Wide-area Wireless access:
by cellular N/W operator
range 10’s of kms
data rate 1 - 10 Mbps
3G, 4G, LTE,….
WiMAX
to Internet
to Internet 27
28. • Mesh of interconnected routers
• Fundamental question…
“how is data transferred thru N/W”
– Circuit switching
̶ resources along the path reserved
for Tx duration
e.g, telephone network
̶ guaranteed service
– Packet switching
̶ N/W resources used on demand
e.g, Internet
̶ best effort service
The network core
28
30. Network Architecture
• Network communications - a complex task
• To deal with this complexity… SIMPLIFY
– comm task divided into modules
– modules arranged in layers
– each layer performs a subset of comm function
– Forms a Network Architecture
• multiple layers
• each layer has one/more Protocols
• protocols perform specific comm tasks
• provide/obtain services to/from higher/lower layer
30
31. Example of a layered
network system
Network Architecture
Network Architecture
A structured set of protocols to implement the
communications function
application
transport
network
link
physical
31
32. Internet protocol stack
• Application: support applications (network API)
FTP, SMTP, HTTP, DNS, DHCP
• Transport: process-process data transfer (ports)
TCP (reliable), UDP (unreliable)
• Network: host-host data transfer, global
addressing (IP addr), routing of pkts from src to
dest
IPv4, IPv6
• Link: hop-hop data transfer, between
neighboring network elements
Ethernet, WiFi (802.11), 3G/4G, PPP
• Physical: bits “on the wire”
application
transport
network
link
physical
32
33. TCP/IP Model
• Some of the protocols & networks in TCP/IP protocol stack…
33
Ethernet WiFi PPP
3G/4G
HTTP FTP SMTP DNS
34. Encapsulation
34
Data generated by Appl layer
When being sent, each layer
appends its header
When being received, each
layer removes its header
Principle of Encapsulation &
Decapsulation
35. Why Layered Architecture
• Network Architecture - layered architecture
– provides modularity
• changes in one layer do not require changes in other layers
• simplifies system maintenance & upgradation
– facilitates process of network evolution
• allows to change/improve underlying technologies, with
increase in application demands
35
37. Some network apps
• e-mail
• web surfing
• search engine
• P2P file sharing
• text messaging
• social networking
• remote login
• streaming stored video
(YouTube, Netflix)
• IP radio, TV
• multi-user N/W games
• voice over IP
(Skype, viber)
• real-time video
conferencing
• …..
37
How these appls are created…
38. 38
Creating network apps
Write appl programs to run only on
end systems
appl comm over N/W
web browser comm with server
No need to write software for
network-core devices…
network-core devices function at
lower layers
confining appls to end systems
allows rapid appl development &
deployment
application
transport
network
data link
physical
application
transport
network
data link
physical
application
transport
network
data link
physical
40. Client-server architecture
Servers
• always-on host
• permanent addr (IP & port)
• rely on fixed infra-structure
• data centers for scaling
Clients
• request services from servers
• intermittent host connections
• dynamic addr (IP & port)
• no direct comm with each other
client/server
40
41. P2P architecture
• NO always-on server
– arbitrary end systems comm directly
• peers request services from other
peers, & also provide services
• Self Scalability
– new peers bring new service demands
– also add new service capacity
• Complex Management
– peers connect intermittently
– change IP addrs
• min, or no reliance, on infra-structure
41
peer-peer
42. Architectural Challenges
Client Server
• Infra-structure intensive
• Cost of server hardware, software & access network B/W
• System management needs/costs
• May become a bottleneck
P2P
• Not ISP friendly; require high upload B/W
• Security issues
• Incentives; users need to volunteer storage, bandwidth &
computation resource
42
43. How do Appls comm
• Appls within same host
– processes usually comm
using IPC
(Inter Process Comm)
– Pipes, FIFOs, shared
memory
43
Applications are processes running on hosts…
Appls in distant hosts
processes comm by
exchanging messages
Sockets, RPC
44. • Remote processes comm thru sockets…
Socket : “software interface between process & N/W”
• Process sends/receives msgs to/from its socket
– process reads/writes the socket to receive/send msgs
44
Sockets
45. Process Address
• to receive msgs, process must
have identifier
• host device has unique
IP address (32 bits)
but many processes may run
on same host
need another level of
identifier – Port No (16 bits)
• identifier includes both
IP address & port number
associated with a process
on a host…
– Socket address
IP addr + Port No
45
to send HTTP msg to web server gaia.cs.umass.edu…
IP address: 128.119.245.12 port number: 80
46. Socket Programming
• Allows network applications to communicate across an Internet
• Socket API mainly provides
Transport layer service
interface
• Stream-sockets for TCP
• Datagram-sockets for UDP
• Based on client/server
architecture
Socket Interface
TCP UDP
IP
Network Access
46
47. Client/Server functions
• Client / Server may run on same or different hosts
• Client makes Request…
– sends message to server to perform a task
• Server Responds…
– performs task & sends back reply
Client
process
Server
process
1. Client sends request
2. Server
handles
request
3. Server sends response
4. Client
handles
response
Resource
47
48. Servers
• Servers : long-running application processes (daemons)
– typically created at boot-time by OS
– run continuously in background
– web server, or mail server
• Server waits for requests on a well-known port associated with
a particular service
– Port 7: echo server
– Port 23: telnet server
– Port 25: mail server
– Port 53: DNS server
– Port 80: HTTP server
/etc/services
provides list of available
services
(Linux machine)
48
49. Clients
• Client – appl launched to access some service, mostly on remote
system
– web browser, ftp client, telnet client, ssh client
• Client does not need well known port
– usually assigned ephemeral port by kernel
– can also be selected by application
Server - need not know client location
Client - needs to know server location
(port + IP address)
49
50. Socket
• Socket is an endpoint of bidirectional comm…
– identified by socket descriptor
• Clients & Servers comm with each other thru sockets
– open a socket
– write data to socket
– read data from socket
App
socket
3 2 1
Dest.
50
51. Socket Address
• The pair IP Address + Port -– makes up a “socket-address”
Server
Client
Client socket address
128.2.194.242:3479
Server socket address
208.216.181.15:53
Client IP address
128.2.194.242
Server IP address
208.216.181.15
3479 is an
ephemeral port
allocated by
kernel (unix)
53 is a well-known
port associated with
DNS servers
51
52. TCP & UDP Ports
• TCP and UDP port numbers ranges:
– values 0 – 216 (65,536 ports)
– Internet Assigned Numbers Authority (IANA)
• Well Known Ports (0 - 1023)
– used by system processes for well known services
– HTTP: 80, E-mail: 25, DNS: 53
• Registered Ports (1024 - 49151)
– used by vendors for common applications
– Web Proxy: 8080, IPSec: 1293, Kaaza: 1214
• Dynamic or Ephemeral Ports (49152 - 65535)
– used by clients
– automatically allocated by kernel on temporary basis
52
53. Summary
1.1 what is the Internet?
1.2 network edge
end systems, access networks, links
1.3 network core
packet switching, circuit switching, network structure
1.4 delay, loss, throughput in networks
1.5 protocol layers, service models
1.6 networks under attack: security
1.7 history
53