... channel
❍
receiver read data from underlying channel
Wait for
call from
above
packet = make_pkt(data)
udt_send(packet)
rdt_send(data)
extract (packet,data)
deliver_data(data)
Wait for
call from
below
rdt_rcv(packet)
sender
receiver
... TCP and UDP
application
transport
network
data link
physical
application
transport
network
data link
physical
network
data link
physical
network
data link
physical
network
data link
physical
network
data ... link
physical
application
transport
network
data link
physical
network
data link
physical
network
data link
physical
network
data link
physical
network
data link
physical
network
data link
physical
l
o
g
i
c
a
l
...
... stored
audio and video
2) Streaming live
audio and video
3) Real-time
interactive audio
and video
Jitter is the variability
of packet delays within
the same packet stream
7: Multimedia Networking ... is a positive constant.
Remaining packets in talkspurt are played out periodically
7: Multimedia Networking 7-5
MM Networking Applications
Fundamental
characteristics:
❒
Typically delay ... resolution
audio stream as the
redundant information
ã for example, nominal
stream PCM at 64 kbps
and redundant stream
GSM at 13 kbps.
ã
Whenever there is non-consecutive loss, the
receiver can conceal...
... management
agent
data
agent
data
agent
data
agent
data
managed device
managed device
managed device
managed device
managing
entity
data
network
management
protocol
definitions:
managed devices
contain
managed objects
... whose
data is gathered into a
Management Information
Base (MIB)
managing entity
Network
Management
9-
15
SNMP protocol
Two ways to convey MIB info, commands:
agent
data
Managed device
managing
entity
response
agent
data
Managed ... management?
❒
Internet- standard management framework
❍
Structure of Management Information: SMI
❍
Management Information Base: MIB
❍
SNMP Protocol Operations and Transport Mappings
❍
Security and Administration
❒
ASN.1
...
... to Bob. In a similar manner, theInternet has an
API that the program sending data must follow to have theInternet deliver the
data to the program that will receive the data.
The postal service, ... actively add and update this material over time. As in earlier edi-
tions, the Web site contains the interactive Java applets that animate many key
networking concepts. The site also has interactive ... upstream rates are different, the access is
said to be asymmetric. The actual downstream and upstream transmission rates
achieved may be less than the rates noted above, as the DSL provider may purpose-
fully...
...
SSL and TCP/IP
Application
TCP
IP
Normal Application
Application
SSL
TCP
IP
Application
with SSL
ã SSL provides application programming interface (API)
to applications
ã C and Java ...
“I am Alice”
R
MAC
Transfer $1M
from Bill to Susan
MAC =
f(msg,s,R)
Defending against playback
attack: nonce
73
Toy: Data Records
❒ Why not encrypt data in constant stream as we ... libraries/classes readily available
80
Real SSL: Handshake (1)
Purpose
1. Server authentication
2. Negotiation: agree on crypto algorithms
3. Establish keys
4. Client authentication...
... the
mechanism that defines the location of the MARS/SARs/insulator sites, however it is
clear that the functional characteristic of the nuclear attachment substrate is analogous
to the spatial ... effecting organizational properties may be the same. The poly-
functional nature of RNA has already been a lluded to; similarly, DN A, in w hat has
D’Onofrio and An Theoretical Biology and Medical Modelling ... containing the magnetized bits of data rotates at a high
speed beneath the servo head. As the disk rotates, a new bit (flux boundary) travels
across the receiving boundary area of the servo head...
...
learners can model their own work in this area of academic writing.
The Internet
The Internet has made many opportunities available to both learners and educators that
were not feasible in the ... features of academic essays (topic sentences, paragraphs, conclusions), but rather
the differences, namely connectors and organization, which set compare/contrast essays
apart from other academic ... a few. And, at our very fingertips are assorted, authentic
materials whose access are not limited to either temporal or spatial constraints, for the
Internet is easily accessed 24 hours a day...
... CCCCATGTCGCCTTTAGT
OMCB-KO-R TCGCTAGAACACATTGAC
OMCA-F ATGATGAAACGGTTCAAT
OMCA-R TTAGTTACCGTGTGCTTC
OMCB-F CTGCTGCTCGCAGCAAGT
OMCB-R GTGTGATCTGCAACTGTT
OMCA-PBAD-F CACCGAGGAATAATAAATGATG
AAACGGTTCAATTTC
OMCA-PBAD-R ... CACCGAGGAATAATAAATGATG
AAACGGTTCAATTTC
OMCA-PBAD-R TTAGTTACCGTGTGCTTC
OMCB-PBAD-F CACCGAGGAATAATAAATGATG
AACGCACAAAAATCA
OMCB-PBAD-R TTACATTTTCACTTTAGT
Shewanella oneidensis MR-1 OmcA and OmcB kinetics J. Borloo et al.
3736 ... used as a positive control to display omcA
(lane 1) and omcB (lane 6). DNA standards are indicated at the left
and right of the agarose gels. (B) Visualization and separation of
high molecular mass...