Soumettre la recherche
Mettre en ligne
Chapter 3 slides (Distributed Systems)
•
Télécharger en tant que PPT, PDF
•
1 j'aime
•
664 vues
soe sumijan
Suivre
Chapter 3 slides (Distributed Systems)
Lire moins
Lire la suite
Technologie
Signaler
Partager
Signaler
Partager
1 sur 26
Télécharger maintenant
Recommandé
Security in distributed systems
Security in distributed systems
Haitham Ahmed
Multiple access protocol
Multiple access protocol
Merlin Florrence
Icmp V4 And Icmp V6
Icmp V4 And Icmp V6
Ram Dutt Shukla
Overlay network
Overlay network
iQra Rafaqat
Link state routing protocol
Link state routing protocol
Aung Thu Rha Hein
Switching
Switching
Shankar Gangaju
Chapter 5 slides
Chapter 5 slides
lara_ays
Ssl in a nutshell
Ssl in a nutshell
Frank Kelly
Recommandé
Security in distributed systems
Security in distributed systems
Haitham Ahmed
Multiple access protocol
Multiple access protocol
Merlin Florrence
Icmp V4 And Icmp V6
Icmp V4 And Icmp V6
Ram Dutt Shukla
Overlay network
Overlay network
iQra Rafaqat
Link state routing protocol
Link state routing protocol
Aung Thu Rha Hein
Switching
Switching
Shankar Gangaju
Chapter 5 slides
Chapter 5 slides
lara_ays
Ssl in a nutshell
Ssl in a nutshell
Frank Kelly
Computer Network - Network Layer
Computer Network - Network Layer
Manoj Kumar
C11 support for-mobility
C11 support for-mobility
Rio Nguyen
Unit 1 introduction to computer networks
Unit 1 introduction to computer networks
pavan kumar Thatikonda
Application layer protocols
Application layer protocols
N.Jagadish Kumar
switching techniques in data communication and networking
switching techniques in data communication and networking
Harshita Yadav
IP addressing seminar ppt
IP addressing seminar ppt
Smriti Rastogi
Peer To Peer Networking
Peer To Peer Networking
icanhasfay
TCP over wireless slides
TCP over wireless slides
Mahesh Rajawat
Design issues for the layers
Design issues for the layers
jayaprakash
System models 2 in distributed system
System models 2 in distributed system
ishapadhy
Computer Networks - Error Detection & Error Correction
Computer Networks - Error Detection & Error Correction
Saikrishna Tanguturu
Distributed System-Multicast & Indirect communication
Distributed System-Multicast & Indirect communication
MNM Jain Engineering College
Transport layer protocol
Transport layer protocol
N.Jagadish Kumar
WAN Technologies slide show
WAN Technologies slide show
NavleshKumar singh
Error Control In Network Layer
Error Control In Network Layer
Ahtesham Ullah khan
TCP and UDP
TCP and UDP
Ramesh Giri
PPP (Point to Point Protocol)
PPP (Point to Point Protocol)
Ali Jafar
x.509-Directory Authentication Service
x.509-Directory Authentication Service
Swathy T
Unicast multicast & broadcast
Unicast multicast & broadcast
NetProtocol Xpert
Protocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol Suite
Atharaw Deshmukh
Chapter 6 slides
Chapter 6 slides
lara_ays
Chapter 2 system models
Chapter 2 system models
AbDul ThaYyal
Contenu connexe
Tendances
Computer Network - Network Layer
Computer Network - Network Layer
Manoj Kumar
C11 support for-mobility
C11 support for-mobility
Rio Nguyen
Unit 1 introduction to computer networks
Unit 1 introduction to computer networks
pavan kumar Thatikonda
Application layer protocols
Application layer protocols
N.Jagadish Kumar
switching techniques in data communication and networking
switching techniques in data communication and networking
Harshita Yadav
IP addressing seminar ppt
IP addressing seminar ppt
Smriti Rastogi
Peer To Peer Networking
Peer To Peer Networking
icanhasfay
TCP over wireless slides
TCP over wireless slides
Mahesh Rajawat
Design issues for the layers
Design issues for the layers
jayaprakash
System models 2 in distributed system
System models 2 in distributed system
ishapadhy
Computer Networks - Error Detection & Error Correction
Computer Networks - Error Detection & Error Correction
Saikrishna Tanguturu
Distributed System-Multicast & Indirect communication
Distributed System-Multicast & Indirect communication
MNM Jain Engineering College
Transport layer protocol
Transport layer protocol
N.Jagadish Kumar
WAN Technologies slide show
WAN Technologies slide show
NavleshKumar singh
Error Control In Network Layer
Error Control In Network Layer
Ahtesham Ullah khan
TCP and UDP
TCP and UDP
Ramesh Giri
PPP (Point to Point Protocol)
PPP (Point to Point Protocol)
Ali Jafar
x.509-Directory Authentication Service
x.509-Directory Authentication Service
Swathy T
Unicast multicast & broadcast
Unicast multicast & broadcast
NetProtocol Xpert
Protocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol Suite
Atharaw Deshmukh
Tendances
(20)
Computer Network - Network Layer
Computer Network - Network Layer
C11 support for-mobility
C11 support for-mobility
Unit 1 introduction to computer networks
Unit 1 introduction to computer networks
Application layer protocols
Application layer protocols
switching techniques in data communication and networking
switching techniques in data communication and networking
IP addressing seminar ppt
IP addressing seminar ppt
Peer To Peer Networking
Peer To Peer Networking
TCP over wireless slides
TCP over wireless slides
Design issues for the layers
Design issues for the layers
System models 2 in distributed system
System models 2 in distributed system
Computer Networks - Error Detection & Error Correction
Computer Networks - Error Detection & Error Correction
Distributed System-Multicast & Indirect communication
Distributed System-Multicast & Indirect communication
Transport layer protocol
Transport layer protocol
WAN Technologies slide show
WAN Technologies slide show
Error Control In Network Layer
Error Control In Network Layer
TCP and UDP
TCP and UDP
PPP (Point to Point Protocol)
PPP (Point to Point Protocol)
x.509-Directory Authentication Service
x.509-Directory Authentication Service
Unicast multicast & broadcast
Unicast multicast & broadcast
Protocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol Suite
En vedette
Chapter 6 slides
Chapter 6 slides
lara_ays
Chapter 2 system models
Chapter 2 system models
AbDul ThaYyal
Chapter 7 slides
Chapter 7 slides
lara_ays
Chapter 1 slides
Chapter 1 slides
soe sumijan
Chapter 17 corba
Chapter 17 corba
AbDul ThaYyal
Chapter 1 slides
Chapter 1 slides
Pedro Hugo Valencia Morales
Chapter 3 networking and internetworking
Chapter 3 networking and internetworking
AbDul ThaYyal
Chapter 8 distributed file systems
Chapter 8 distributed file systems
AbDul ThaYyal
Chapter 4 a interprocess communication
Chapter 4 a interprocess communication
AbDul ThaYyal
Chapter 11b
Chapter 11b
AbDul ThaYyal
Chapter 5
Chapter 5
AbDul ThaYyal
Chapter 1 characterisation of distributed systems
Chapter 1 characterisation of distributed systems
AbDul ThaYyal
Report-An Expert System for Car Failure Diagnosis-Report
Report-An Expert System for Car Failure Diagnosis-Report
Viralkumar Jayswal
4.file service architecture (1)
4.file service architecture (1)
AbDul ThaYyal
Chapter 9 names
Chapter 9 names
AbDul ThaYyal
Chapter 6 os
Chapter 6 os
AbDul ThaYyal
2. microkernel new
2. microkernel new
AbDul ThaYyal
Chapter 3 slides
Chapter 3 slides
lara_ays
3. challenges
3. challenges
AbDul ThaYyal
Chapter 9 slides
Chapter 9 slides
lara_ays
En vedette
(20)
Chapter 6 slides
Chapter 6 slides
Chapter 2 system models
Chapter 2 system models
Chapter 7 slides
Chapter 7 slides
Chapter 1 slides
Chapter 1 slides
Chapter 17 corba
Chapter 17 corba
Chapter 1 slides
Chapter 1 slides
Chapter 3 networking and internetworking
Chapter 3 networking and internetworking
Chapter 8 distributed file systems
Chapter 8 distributed file systems
Chapter 4 a interprocess communication
Chapter 4 a interprocess communication
Chapter 11b
Chapter 11b
Chapter 5
Chapter 5
Chapter 1 characterisation of distributed systems
Chapter 1 characterisation of distributed systems
Report-An Expert System for Car Failure Diagnosis-Report
Report-An Expert System for Car Failure Diagnosis-Report
4.file service architecture (1)
4.file service architecture (1)
Chapter 9 names
Chapter 9 names
Chapter 6 os
Chapter 6 os
2. microkernel new
2. microkernel new
Chapter 3 slides
Chapter 3 slides
3. challenges
3. challenges
Chapter 9 slides
Chapter 9 slides
Similaire à Chapter 3 slides (Distributed Systems)
ch3.ppt
ch3.ppt
QadarAhmed1
Cs8591 Computer Networks
Cs8591 Computer Networks
Kathirvel Ayyaswamy
Ch3 (1)
Ch3 (1)
Çãñdál Lïght
Network_Model. In the field of Computer Networking.ppt
Network_Model. In the field of Computer Networking.ppt
BlackHat41
Computer Networking network layer chapter 4
Computer Networking network layer chapter 4
RoopaRathod2
Chapter_4_V6.11 Network layer.ppt
Chapter_4_V6.11 Network layer.ppt
MaiTran87348
The Network Ip Address Scheme
The Network Ip Address Scheme
Erin Rivera
Lecture 06
Lecture 06
Naveen Shivegowda
Week6 final
Week6 final
Irfan Ali Memon
Chapter1ccna
Chapter1ccna
ernestlithur
Chapter1ccna
Chapter1ccna
ernestlithur
CCNA Exam Question
CCNA Exam Question
Eng. Emad Al-Atoum
Presentation1.Machine learning,Supervised, semi supervised learning, cluste...
Presentation1.Machine learning,Supervised, semi supervised learning, cluste...
Ashish Gupta
The services provided by the network layer should be independent of the subne...
The services provided by the network layer should be independent of the subne...
Ashish Gupta
Chapter 14 Important questions
Chapter 14 Important questions
Vasuki Boopathy
CS6601 DISTRIBUTED SYSTEMS
CS6601 DISTRIBUTED SYSTEMS
Kathirvel Ayyaswamy
Lecture 1.ppt
Lecture 1.ppt
AmirKhan877722
Junos routing overview from Juniper
Junos routing overview from Juniper
Nam Nguyen
Cisco.actualtests.200 120.v2013-12-10.by.watson.314q (2 new q)
Cisco.actualtests.200 120.v2013-12-10.by.watson.314q (2 new q)
keiko277
FP 303 COMPUTER NETWORK FINAL PAPER JUNE 2012
FP 303 COMPUTER NETWORK FINAL PAPER JUNE 2012
Syahriha Ruslan
Similaire à Chapter 3 slides (Distributed Systems)
(20)
ch3.ppt
ch3.ppt
Cs8591 Computer Networks
Cs8591 Computer Networks
Ch3 (1)
Ch3 (1)
Network_Model. In the field of Computer Networking.ppt
Network_Model. In the field of Computer Networking.ppt
Computer Networking network layer chapter 4
Computer Networking network layer chapter 4
Chapter_4_V6.11 Network layer.ppt
Chapter_4_V6.11 Network layer.ppt
The Network Ip Address Scheme
The Network Ip Address Scheme
Lecture 06
Lecture 06
Week6 final
Week6 final
Chapter1ccna
Chapter1ccna
Chapter1ccna
Chapter1ccna
CCNA Exam Question
CCNA Exam Question
Presentation1.Machine learning,Supervised, semi supervised learning, cluste...
Presentation1.Machine learning,Supervised, semi supervised learning, cluste...
The services provided by the network layer should be independent of the subne...
The services provided by the network layer should be independent of the subne...
Chapter 14 Important questions
Chapter 14 Important questions
CS6601 DISTRIBUTED SYSTEMS
CS6601 DISTRIBUTED SYSTEMS
Lecture 1.ppt
Lecture 1.ppt
Junos routing overview from Juniper
Junos routing overview from Juniper
Cisco.actualtests.200 120.v2013-12-10.by.watson.314q (2 new q)
Cisco.actualtests.200 120.v2013-12-10.by.watson.314q (2 new q)
FP 303 COMPUTER NETWORK FINAL PAPER JUNE 2012
FP 303 COMPUTER NETWORK FINAL PAPER JUNE 2012
Plus de soe sumijan
Perencanaan Infrastruktur (Trends Infrastructures)
Perencanaan Infrastruktur (Trends Infrastructures)
soe sumijan
Chapter 2 slides
Chapter 2 slides
soe sumijan
Computer Vision Pertemuan 06
Computer Vision Pertemuan 06
soe sumijan
Computer Vision Pertemuan 05
Computer Vision Pertemuan 05
soe sumijan
Computer Vision Pertemuan 04
Computer Vision Pertemuan 04
soe sumijan
e-Government (Strategi dan Implementasinya untuk Pemerinyahan)
e-Government (Strategi dan Implementasinya untuk Pemerinyahan)
soe sumijan
Pertemuan 01-02
Pertemuan 01-02
soe sumijan
Multimedia dan Computer Vision
Multimedia dan Computer Vision
soe sumijan
Aplikasi sistem real time
Aplikasi sistem real time
soe sumijan
Plus de soe sumijan
(9)
Perencanaan Infrastruktur (Trends Infrastructures)
Perencanaan Infrastruktur (Trends Infrastructures)
Chapter 2 slides
Chapter 2 slides
Computer Vision Pertemuan 06
Computer Vision Pertemuan 06
Computer Vision Pertemuan 05
Computer Vision Pertemuan 05
Computer Vision Pertemuan 04
Computer Vision Pertemuan 04
e-Government (Strategi dan Implementasinya untuk Pemerinyahan)
e-Government (Strategi dan Implementasinya untuk Pemerinyahan)
Pertemuan 01-02
Pertemuan 01-02
Multimedia dan Computer Vision
Multimedia dan Computer Vision
Aplikasi sistem real time
Aplikasi sistem real time
Dernier
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
Raghuram Pandurangan
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
Rick Flair
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Pim van der Noll
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
Wes McKinney
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
Farhan Tariq
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
panagenda
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
ThousandEyes
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
LoriGlavin3
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
LoriGlavin3
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
MounikaPolabathina
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
BookNet Canada
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
LoriGlavin3
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
Pixlogix Infotech
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
BookNet Canada
A Framework for Development in the AI Age
A Framework for Development in the AI Age
Cprime
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
Hiroshi SHIBATA
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
panagenda
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
Ingrid Airi González
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
Sergiu Bodiu
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
IES VE
Dernier
(20)
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
A Framework for Development in the AI Age
A Framework for Development in the AI Age
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
Chapter 3 slides (Distributed Systems)
1.
Slides for Chapter
3: Networking and Internetworking From Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edition 3, © Addison-Wesley 2001
2.
Instructor’s Guide for
Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 © Addison-Wesley Publishers 2000 Figure 3.1 Network types Range Bandwidth (Mbps) Latency (ms) LAN 1-2 kms 10-1000 1-10 WAN worldwide 0.010-600 100-500 MAN 2-50 kms 1-150 10 Wireless LAN 0.15-1.5 km 2-11 5-20 Wireless WAN worldwide 0.010-2 100-500 Internet worldwide 0.010-2 100-500
3.
Instructor’s Guide for
Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 © Addison-Wesley Publishers 2000 Figure 3.2 Conceptual layering of protocol software Layer n Layer 2 Layer 1 Message sent Message received Communication medium Sender Recipient
4.
Instructor’s Guide for
Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 © Addison-Wesley Publishers 2000 Figure 3.3 Encapsulation as it is applied in layered protocols Presentation header Application-layer message Session header Transport header Network header
5.
Instructor’s Guide for
Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 © Addison-Wesley Publishers 2000 Figure 3.4 Protocol layers in the ISO Open Systems Interconnection (OSI) model Application Presentation Session Transport Network Data link Physical Message sent Message received Sender Recipient Layers Communication medium
6.
Instructor’s Guide for
Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 © Addison-Wesley Publishers 2000 Figure 3.5 OSI protocol summary Layer Description Examples Application Protocols that are designed to meet the communication requirements of specific applications, often defining the interface to a service. HTTP,FTP, SMTP, CORBA IIOP Presentation Protocols at this level transmit data in a network representation that is independent of the representations used in individual computers, which may differ. Encryption is also performed in this layer, if required. Secure Sockets (SSL),CORBA Data Rep. Session At this level reliability and adaptation are performed, such as detection of failures and automatic recovery. Transport This is the lowest level at which messages (rather than packets) are handled. Messages are addressed to communication ports attached to processes, Protocols in this layer may be connection-oriented or connectionless. TCP,UDP Network Transfers data packets between computers in a specific network. In a WAN or an internetwork this involves the generation of a route passing through routers. In a single LAN no routing is required. IP, ATM virtual circuits Data link Responsible for transmission of packets between nodes that are directly connected by a physical link. In a WAN transmission is between pairs of routers or between routers and hosts. In a LAN it is between any pair of hosts. Ethernet MAC, ATM cell transfer, PPP Physical The circuits and hardware that drive the network. It transmits sequences of binary data by analogue signalling, using amplitude or frequency modulation of electrical signals (on cable circuits), light signals (on fibre optic circuits) or other electromagnetic signals (on radio and microwave circuits). Ethernet base- band signalling, ISDN
7.
Instructor’s Guide for
Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 © Addison-Wesley Publishers 2000 Figure 3.6 Internetwork layers Underlying network Application Network interface Transport Internetwork Internetwork packets Network-specific packets Message Layers Internetwork protocols Underlying network protocols
8.
Instructor’s Guide for
Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 © Addison-Wesley Publishers 2000 Figure 3.7 Routing in a wide area network Hosts Links or local networks A D E B C 1 2 5 43 6 Routers
9.
Instructor’s Guide for
Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 © Addison-Wesley Publishers 2000 Figure 3.8 Routing tables for the network in Figure 3.7 Routings from D Routings from E To Link Cost To Link Cost A B C D E 3 3 6 local 6 1 2 2 0 1 A B C D E 4 4 5 6 local 2 1 1 1 0 Routings from A Routings from B Routings from C To Link Cost To Link Cost To Link Cost A B C D E local 1 1 3 1 0 1 2 1 2 A B C D E 1 local 2 1 4 1 0 1 2 1 A B C D E 2 2 local 5 5 2 1 0 2 1
10.
Instructor’s Guide for
Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 © Addison-Wesley Publishers 2000 Figure 3.9 Pseudo-code for RIP routing algorithm Send: Each t seconds or when Tl changes, send Tl on each non-faulty outgoing link. Receive: Whenever a routing table Tr is received on link n: for all rows Rr in Tr { if (Rr.link | n) { Rr.cost = Rr.cost + 1; Rr.link = n; if (Rr.destination is not in Tl) add Rr to Tl; // add new destination to Tl else for all rows Rl in Tl { if (Rr.destination = Rl.destination and (Rr.cost < Rl.cost or Rl.link = n)) Rl = Rr; // Rr.cost < Rl.cost : remote node has better route // Rl.link = n : remote node is more authoritative } } }
11.
Instructor’s Guide for
Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 © Addison-Wesley Publishers 2000 Figure 3.10 Simplified view of the QMW Computer Science network file compute dialup hammer henry hotpoint 138.37.88.230 138.37.88.162 bruno 138.37.88.249 router/ sickle 138.37.95.241138.37.95.240/29 138.37.95.249 copper 138.37.88.248 firewall web 138.37.95.248/29 server desktop computers 138.37.88.xx subnet subnet Eswitch 138.37.88 server server server 138.37.88.251 custard 138.37.94.246 desktop computers Eswitch 138.37.94 hubhub Student subnetStaff subnet other servers router/ firewall 138.37.94.251 1000 Mbps Ethernet Eswitch: Ethernet switch 100 Mbps Ethernet file server/ gateway printers Campus router Campus router 138.37.94.xx
12.
Instructor’s Guide for
Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 © Addison-Wesley Publishers 2000 Figure 3.11 Tunnelling for IPv6 migration A B IPv6 IPv6 IPv6 encapsulated in IPv4 packets Encapsulators IPv4 network
13.
Instructor’s Guide for
Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 © Addison-Wesley Publishers 2000 Figure 3.12 TCP/IP layers Messages (UDP) or Streams (TCP) Application Transport Internet UDP or TCP packets IP datagrams Network-specific frames Message Layers Underlying network Network interface
14.
Instructor’s Guide for
Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 © Addison-Wesley Publishers 2000 Figure 3.13 Encapsulation in a message transmitted via TCP over an Ethernet Application message TCP header IP header Ethernet header Ethernet frame port TCP IP
15.
Instructor’s Guide for
Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 © Addison-Wesley Publishers 2000 Figure 3.14 The programmer's conceptual view of a TCP/IP Internet IP Application Application TCP UDP
16.
Instructor’s Guide for
Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 © Addison-Wesley Publishers 2000 Figure 3.15 Internet address structure, showing field sizes in bits 7 24 Class A: 0 Network ID Host ID 14 16 Class B: 1 0 Network ID Host ID 21 8 Class C: 1 1 0 Network ID Host ID 28 Class D (multicast): 1 1 1 0 Multicast address 27 Class E (reserved): 1 1 1 1 unused0
17.
Instructor’s Guide for
Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 © Addison-Wesley Publishers 2000 Figure 3.16 Decimal representation of Internet addresses octet 1 octet 2 octet 3 Class A: 1 to 127 0 to 255 0 to 255 1 to 254 Class B: 128 to 191 Class C: 192 to 223 224 to 239Class D (multicast): Network ID Network ID Network ID Host ID Host ID Host ID Multicast address 0 to 255 0 to 255 1 to 254 0 to 255 0 to 255 0 to 255 0 to 255 0 to 255 0 to 255 Multicast address 0 to 255 0 to 255 1 to 254240 to 255Class E (reserved): 1.0.0.0 to 127.255.255.255 128.0.0.0 to 191.255.255.255 192.0.0.0 to 223.255.255.255 224.0.0.0 to 239.255.255.255 240.0.0.0 to 255.255.255.255 Range of addresses
18.
Instructor’s Guide for
Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 © Addison-Wesley Publishers 2000 Figure 3.17 IP packet layout dataIP address of destinationIP address of source header up to 64 kilobytes
19.
Instructor’s Guide for
Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 © Addison-Wesley Publishers 2000 Figure 3.18 IPv6 header layout Source address (128 bits) Destination address (128 bits) Version (4 bits) Priority (4 bits) Flow label (24 bits) Payload length (16 bits) Hop limit (8 bits)Next header (8 bits)
20.
Instructor’s Guide for
Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 © Addison-Wesley Publishers 2000 Figure 3.19 The MobileIP routing mechanism Sender Home Mobile host MH Foreign agent FA Internet agent First IP packet addressed to MH Address of FA returned to sender First IP packet tunnelled to FA Subsequent IP packets tunnelled to FA
21.
Instructor’s Guide for
Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 © Addison-Wesley Publishers 2000 Figure 3.20 Firewall configurations Internet Router/ Protected intranet a) Filtering router Internet b) Filtering router and bastion filter Internet R/filterc) Screened subnet for bastion R/filter Bastion R/filter Bastion web/ftp server web/ftp server web/ftp server
22.
Instructor’s Guide for
Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 © Addison-Wesley Publishers 2000 Figure 3.21 IEEE 802 network standards IEEE No. Title Reference 802.3 CSMA/CD Networks (Ethernet) [IEEE 1985a] 802.4 Token Bus Networks [IEEE 1985b] 802.5 Token Ring Networks [IEEE 1985c] 802.6 Metropolitan Area Networks [IEEE 1994] 802.11 Wireless Local Area Networks [IEEE 1999]
23.
Instructor’s Guide for
Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 © Addison-Wesley Publishers 2000 Figure 3.22 Wireless LAN configuration LAN Server Wireless LAN Laptops Base station/ access point Palmtop radio obstruction A B C D E
24.
Instructor’s Guide for
Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 © Addison-Wesley Publishers 2000 Figure 3.23 ATM protocol layers Physical Application ATM layer Higher-layer protocols ATM cells ATM virtual channels Message Layers ATM adaption layer
25.
Instructor’s Guide for
Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 © Addison-Wesley Publishers 2000 Figure 3.24 ATM cell layout Flags DataVirtual channel idVirtual path id 53 bytes Header: 5 bytes
26.
Instructor’s Guide for
Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 © Addison-Wesley Publishers 2000 Figure 3.25 Switching virtual paths in an ATM network VPI in VPI out 2 3 4 5 VPI = 3 VPI = 5 VPI = 4 Virtual path Virtual channels VPI = 2 VPI : virtual path identifier VP switch VP/VC switch VP switch Host Host
Télécharger maintenant