Soumettre la recherche
Mettre en ligne
Chapter 3 slides (Distributed Systems)
•
Télécharger en tant que PPT, PDF
•
1 j'aime
•
667 vues
soe sumijan
Suivre
Chapter 3 slides (Distributed Systems)
Lire moins
Lire la suite
Technologie
Signaler
Partager
Signaler
Partager
1 sur 26
Télécharger maintenant
Recommandé
Chapter 5 slides
Chapter 5 slides
lara_ays
What is Network Address Translation (NAT)
What is Network Address Translation (NAT)
Amit Kumar , Jaipur Engineers
Point To Point Protocol
Point To Point Protocol
Phan Vuong
IPv4 Addressing
IPv4 Addressing
TheGodfather HA
Internet control message protocol
Internet control message protocol
asimnawaz54
Quality of Service
Quality of Service
Abhishek Wadhwa
Routing
Routing
Saima Azam
Network Layer,Computer Networks
Network Layer,Computer Networks
guesta81d4b
Recommandé
Chapter 5 slides
Chapter 5 slides
lara_ays
What is Network Address Translation (NAT)
What is Network Address Translation (NAT)
Amit Kumar , Jaipur Engineers
Point To Point Protocol
Point To Point Protocol
Phan Vuong
IPv4 Addressing
IPv4 Addressing
TheGodfather HA
Internet control message protocol
Internet control message protocol
asimnawaz54
Quality of Service
Quality of Service
Abhishek Wadhwa
Routing
Routing
Saima Azam
Network Layer,Computer Networks
Network Layer,Computer Networks
guesta81d4b
Tcp and udp
Tcp and udp
Ahmad Khalid Nasrat
Communication in Distributed Systems
Communication in Distributed Systems
Dilum Bandara
Ospf
Ospf
DeeN Mohammad
UDP - User Datagram Protocol
UDP - User Datagram Protocol
Peter R. Egli
Dns
Dns
Sanoj Kumar
Application layer protocols
Application layer protocols
JUW Jinnah University for Women
Subnet calculation Tutorial
Subnet calculation Tutorial
Ritu Ranjan Shrivastwa
Domain Name System DNS
Domain Name System DNS
Akshay Tiwari
Dhcp
Dhcp
Chinmoy Jena
Ipv4 and Ipv6
Ipv4 and Ipv6
rahul kundu
Network address translation
Network address translation
Varsha Honde
Ospf.ppt
Ospf.ppt
Edgardo Scrimaglia
DHCP
DHCP
Kashif Latif
Chapter 6 slides
Chapter 6 slides
lara_ays
Routing Information Protocol
Routing Information Protocol
Kashif Latif
Subnetting Presentation
Subnetting Presentation
Touhidul Fahim
Ch 20 UNICAST ROUTING SECTION 2
Ch 20 UNICAST ROUTING SECTION 2
Hossam El-Deen Osama
How BGP Works
How BGP Works
ThousandEyes
Ip addressing classful
Ip addressing classful
Abhishek Kesharwani
Distributed deadlock
Distributed deadlock
Md. Mahedi Mahfuj
Chapter 2 system models
Chapter 2 system models
AbDul ThaYyal
Chapter 7 slides
Chapter 7 slides
lara_ays
Contenu connexe
Tendances
Tcp and udp
Tcp and udp
Ahmad Khalid Nasrat
Communication in Distributed Systems
Communication in Distributed Systems
Dilum Bandara
Ospf
Ospf
DeeN Mohammad
UDP - User Datagram Protocol
UDP - User Datagram Protocol
Peter R. Egli
Dns
Dns
Sanoj Kumar
Application layer protocols
Application layer protocols
JUW Jinnah University for Women
Subnet calculation Tutorial
Subnet calculation Tutorial
Ritu Ranjan Shrivastwa
Domain Name System DNS
Domain Name System DNS
Akshay Tiwari
Dhcp
Dhcp
Chinmoy Jena
Ipv4 and Ipv6
Ipv4 and Ipv6
rahul kundu
Network address translation
Network address translation
Varsha Honde
Ospf.ppt
Ospf.ppt
Edgardo Scrimaglia
DHCP
DHCP
Kashif Latif
Chapter 6 slides
Chapter 6 slides
lara_ays
Routing Information Protocol
Routing Information Protocol
Kashif Latif
Subnetting Presentation
Subnetting Presentation
Touhidul Fahim
Ch 20 UNICAST ROUTING SECTION 2
Ch 20 UNICAST ROUTING SECTION 2
Hossam El-Deen Osama
How BGP Works
How BGP Works
ThousandEyes
Ip addressing classful
Ip addressing classful
Abhishek Kesharwani
Distributed deadlock
Distributed deadlock
Md. Mahedi Mahfuj
Tendances
(20)
Tcp and udp
Tcp and udp
Communication in Distributed Systems
Communication in Distributed Systems
Ospf
Ospf
UDP - User Datagram Protocol
UDP - User Datagram Protocol
Dns
Dns
Application layer protocols
Application layer protocols
Subnet calculation Tutorial
Subnet calculation Tutorial
Domain Name System DNS
Domain Name System DNS
Dhcp
Dhcp
Ipv4 and Ipv6
Ipv4 and Ipv6
Network address translation
Network address translation
Ospf.ppt
Ospf.ppt
DHCP
DHCP
Chapter 6 slides
Chapter 6 slides
Routing Information Protocol
Routing Information Protocol
Subnetting Presentation
Subnetting Presentation
Ch 20 UNICAST ROUTING SECTION 2
Ch 20 UNICAST ROUTING SECTION 2
How BGP Works
How BGP Works
Ip addressing classful
Ip addressing classful
Distributed deadlock
Distributed deadlock
En vedette
Chapter 2 system models
Chapter 2 system models
AbDul ThaYyal
Chapter 7 slides
Chapter 7 slides
lara_ays
Chapter 1 slides
Chapter 1 slides
soe sumijan
Chapter 17 corba
Chapter 17 corba
AbDul ThaYyal
Chapter 1 slides
Chapter 1 slides
Pedro Hugo Valencia Morales
Chapter 3 networking and internetworking
Chapter 3 networking and internetworking
AbDul ThaYyal
Chapter 8 distributed file systems
Chapter 8 distributed file systems
AbDul ThaYyal
Chapter 4 a interprocess communication
Chapter 4 a interprocess communication
AbDul ThaYyal
Chapter 11b
Chapter 11b
AbDul ThaYyal
Chapter 5
Chapter 5
AbDul ThaYyal
Chapter 1 characterisation of distributed systems
Chapter 1 characterisation of distributed systems
AbDul ThaYyal
Report-An Expert System for Car Failure Diagnosis-Report
Report-An Expert System for Car Failure Diagnosis-Report
Viralkumar Jayswal
4.file service architecture (1)
4.file service architecture (1)
AbDul ThaYyal
Chapter 9 names
Chapter 9 names
AbDul ThaYyal
Chapter 6 os
Chapter 6 os
AbDul ThaYyal
2. microkernel new
2. microkernel new
AbDul ThaYyal
Chapter 3 slides
Chapter 3 slides
lara_ays
3. challenges
3. challenges
AbDul ThaYyal
Chapter 9 slides
Chapter 9 slides
lara_ays
Chapter 7 security
Chapter 7 security
AbDul ThaYyal
En vedette
(20)
Chapter 2 system models
Chapter 2 system models
Chapter 7 slides
Chapter 7 slides
Chapter 1 slides
Chapter 1 slides
Chapter 17 corba
Chapter 17 corba
Chapter 1 slides
Chapter 1 slides
Chapter 3 networking and internetworking
Chapter 3 networking and internetworking
Chapter 8 distributed file systems
Chapter 8 distributed file systems
Chapter 4 a interprocess communication
Chapter 4 a interprocess communication
Chapter 11b
Chapter 11b
Chapter 5
Chapter 5
Chapter 1 characterisation of distributed systems
Chapter 1 characterisation of distributed systems
Report-An Expert System for Car Failure Diagnosis-Report
Report-An Expert System for Car Failure Diagnosis-Report
4.file service architecture (1)
4.file service architecture (1)
Chapter 9 names
Chapter 9 names
Chapter 6 os
Chapter 6 os
2. microkernel new
2. microkernel new
Chapter 3 slides
Chapter 3 slides
3. challenges
3. challenges
Chapter 9 slides
Chapter 9 slides
Chapter 7 security
Chapter 7 security
Similaire à Chapter 3 slides (Distributed Systems)
ch3.ppt
ch3.ppt
QadarAhmed1
Cs8591 Computer Networks
Cs8591 Computer Networks
Kathirvel Ayyaswamy
Ch3 (1)
Ch3 (1)
Çãñdál Lïght
Network_Model. In the field of Computer Networking.ppt
Network_Model. In the field of Computer Networking.ppt
BlackHat41
Computer Networking network layer chapter 4
Computer Networking network layer chapter 4
RoopaRathod2
Chapter_4_V6.11 Network layer.ppt
Chapter_4_V6.11 Network layer.ppt
MaiTran87348
The Network Ip Address Scheme
The Network Ip Address Scheme
Erin Rivera
independent of the subnet topology. The Transport Layer should be shielded fr...
independent of the subnet topology. The Transport Layer should be shielded fr...
Ashish Gupta
Lecture 06
Lecture 06
Naveen Shivegowda
Week6 final
Week6 final
Irfan Ali Memon
Chapter1ccna
Chapter1ccna
ernestlithur
Chapter1ccna
Chapter1ccna
ernestlithur
CCNA Exam Question
CCNA Exam Question
Eng. Emad Al-Atoum
Presentation1.Machine learning,Supervised, semi supervised learning, cluste...
Presentation1.Machine learning,Supervised, semi supervised learning, cluste...
Ashish Gupta
The services provided by the network layer should be independent of the subne...
The services provided by the network layer should be independent of the subne...
Ashish Gupta
Chapter 14 Important questions
Chapter 14 Important questions
Vasuki Boopathy
CS6601 DISTRIBUTED SYSTEMS
CS6601 DISTRIBUTED SYSTEMS
Kathirvel Ayyaswamy
Lecture 1.ppt
Lecture 1.ppt
AmirKhan877722
Junos routing overview from Juniper
Junos routing overview from Juniper
Nam Nguyen
Cisco.actualtests.200 120.v2013-12-10.by.watson.314q (2 new q)
Cisco.actualtests.200 120.v2013-12-10.by.watson.314q (2 new q)
keiko277
Similaire à Chapter 3 slides (Distributed Systems)
(20)
ch3.ppt
ch3.ppt
Cs8591 Computer Networks
Cs8591 Computer Networks
Ch3 (1)
Ch3 (1)
Network_Model. In the field of Computer Networking.ppt
Network_Model. In the field of Computer Networking.ppt
Computer Networking network layer chapter 4
Computer Networking network layer chapter 4
Chapter_4_V6.11 Network layer.ppt
Chapter_4_V6.11 Network layer.ppt
The Network Ip Address Scheme
The Network Ip Address Scheme
independent of the subnet topology. The Transport Layer should be shielded fr...
independent of the subnet topology. The Transport Layer should be shielded fr...
Lecture 06
Lecture 06
Week6 final
Week6 final
Chapter1ccna
Chapter1ccna
Chapter1ccna
Chapter1ccna
CCNA Exam Question
CCNA Exam Question
Presentation1.Machine learning,Supervised, semi supervised learning, cluste...
Presentation1.Machine learning,Supervised, semi supervised learning, cluste...
The services provided by the network layer should be independent of the subne...
The services provided by the network layer should be independent of the subne...
Chapter 14 Important questions
Chapter 14 Important questions
CS6601 DISTRIBUTED SYSTEMS
CS6601 DISTRIBUTED SYSTEMS
Lecture 1.ppt
Lecture 1.ppt
Junos routing overview from Juniper
Junos routing overview from Juniper
Cisco.actualtests.200 120.v2013-12-10.by.watson.314q (2 new q)
Cisco.actualtests.200 120.v2013-12-10.by.watson.314q (2 new q)
Plus de soe sumijan
Perencanaan Infrastruktur (Trends Infrastructures)
Perencanaan Infrastruktur (Trends Infrastructures)
soe sumijan
Chapter 2 slides
Chapter 2 slides
soe sumijan
Computer Vision Pertemuan 06
Computer Vision Pertemuan 06
soe sumijan
Computer Vision Pertemuan 05
Computer Vision Pertemuan 05
soe sumijan
Computer Vision Pertemuan 04
Computer Vision Pertemuan 04
soe sumijan
e-Government (Strategi dan Implementasinya untuk Pemerinyahan)
e-Government (Strategi dan Implementasinya untuk Pemerinyahan)
soe sumijan
Pertemuan 01-02
Pertemuan 01-02
soe sumijan
Multimedia dan Computer Vision
Multimedia dan Computer Vision
soe sumijan
Aplikasi sistem real time
Aplikasi sistem real time
soe sumijan
Plus de soe sumijan
(9)
Perencanaan Infrastruktur (Trends Infrastructures)
Perencanaan Infrastruktur (Trends Infrastructures)
Chapter 2 slides
Chapter 2 slides
Computer Vision Pertemuan 06
Computer Vision Pertemuan 06
Computer Vision Pertemuan 05
Computer Vision Pertemuan 05
Computer Vision Pertemuan 04
Computer Vision Pertemuan 04
e-Government (Strategi dan Implementasinya untuk Pemerinyahan)
e-Government (Strategi dan Implementasinya untuk Pemerinyahan)
Pertemuan 01-02
Pertemuan 01-02
Multimedia dan Computer Vision
Multimedia dan Computer Vision
Aplikasi sistem real time
Aplikasi sistem real time
Dernier
How to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
naman860154
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
Softradix Technologies
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
Sinan KOZAK
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
comworks
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
Pooja Nehwal
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
Delhi Call girls
Slack Application Development 101 Slides
Slack Application Development 101 Slides
praypatel2
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Safe Software
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
Allon Mureinik
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
Neo4j
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
soniya singh
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
Puma Security, LLC
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
null - The Open Security Community
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
BookNet Canada
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
Mark Billinghurst
The transition to renewables in India.pdf
The transition to renewables in India.pdf
Competition Advisory Services (India) LLP
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
2toLead Limited
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
HostedbyConfluent
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Alan Dix
Dernier
(20)
How to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
Slack Application Development 101 Slides
Slack Application Development 101 Slides
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
The transition to renewables in India.pdf
The transition to renewables in India.pdf
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Chapter 3 slides (Distributed Systems)
1.
Slides for Chapter
3: Networking and Internetworking From Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edition 3, © Addison-Wesley 2001
2.
Instructor’s Guide for
Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 © Addison-Wesley Publishers 2000 Figure 3.1 Network types Range Bandwidth (Mbps) Latency (ms) LAN 1-2 kms 10-1000 1-10 WAN worldwide 0.010-600 100-500 MAN 2-50 kms 1-150 10 Wireless LAN 0.15-1.5 km 2-11 5-20 Wireless WAN worldwide 0.010-2 100-500 Internet worldwide 0.010-2 100-500
3.
Instructor’s Guide for
Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 © Addison-Wesley Publishers 2000 Figure 3.2 Conceptual layering of protocol software Layer n Layer 2 Layer 1 Message sent Message received Communication medium Sender Recipient
4.
Instructor’s Guide for
Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 © Addison-Wesley Publishers 2000 Figure 3.3 Encapsulation as it is applied in layered protocols Presentation header Application-layer message Session header Transport header Network header
5.
Instructor’s Guide for
Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 © Addison-Wesley Publishers 2000 Figure 3.4 Protocol layers in the ISO Open Systems Interconnection (OSI) model Application Presentation Session Transport Network Data link Physical Message sent Message received Sender Recipient Layers Communication medium
6.
Instructor’s Guide for
Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 © Addison-Wesley Publishers 2000 Figure 3.5 OSI protocol summary Layer Description Examples Application Protocols that are designed to meet the communication requirements of specific applications, often defining the interface to a service. HTTP,FTP, SMTP, CORBA IIOP Presentation Protocols at this level transmit data in a network representation that is independent of the representations used in individual computers, which may differ. Encryption is also performed in this layer, if required. Secure Sockets (SSL),CORBA Data Rep. Session At this level reliability and adaptation are performed, such as detection of failures and automatic recovery. Transport This is the lowest level at which messages (rather than packets) are handled. Messages are addressed to communication ports attached to processes, Protocols in this layer may be connection-oriented or connectionless. TCP,UDP Network Transfers data packets between computers in a specific network. In a WAN or an internetwork this involves the generation of a route passing through routers. In a single LAN no routing is required. IP, ATM virtual circuits Data link Responsible for transmission of packets between nodes that are directly connected by a physical link. In a WAN transmission is between pairs of routers or between routers and hosts. In a LAN it is between any pair of hosts. Ethernet MAC, ATM cell transfer, PPP Physical The circuits and hardware that drive the network. It transmits sequences of binary data by analogue signalling, using amplitude or frequency modulation of electrical signals (on cable circuits), light signals (on fibre optic circuits) or other electromagnetic signals (on radio and microwave circuits). Ethernet base- band signalling, ISDN
7.
Instructor’s Guide for
Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 © Addison-Wesley Publishers 2000 Figure 3.6 Internetwork layers Underlying network Application Network interface Transport Internetwork Internetwork packets Network-specific packets Message Layers Internetwork protocols Underlying network protocols
8.
Instructor’s Guide for
Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 © Addison-Wesley Publishers 2000 Figure 3.7 Routing in a wide area network Hosts Links or local networks A D E B C 1 2 5 43 6 Routers
9.
Instructor’s Guide for
Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 © Addison-Wesley Publishers 2000 Figure 3.8 Routing tables for the network in Figure 3.7 Routings from D Routings from E To Link Cost To Link Cost A B C D E 3 3 6 local 6 1 2 2 0 1 A B C D E 4 4 5 6 local 2 1 1 1 0 Routings from A Routings from B Routings from C To Link Cost To Link Cost To Link Cost A B C D E local 1 1 3 1 0 1 2 1 2 A B C D E 1 local 2 1 4 1 0 1 2 1 A B C D E 2 2 local 5 5 2 1 0 2 1
10.
Instructor’s Guide for
Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 © Addison-Wesley Publishers 2000 Figure 3.9 Pseudo-code for RIP routing algorithm Send: Each t seconds or when Tl changes, send Tl on each non-faulty outgoing link. Receive: Whenever a routing table Tr is received on link n: for all rows Rr in Tr { if (Rr.link | n) { Rr.cost = Rr.cost + 1; Rr.link = n; if (Rr.destination is not in Tl) add Rr to Tl; // add new destination to Tl else for all rows Rl in Tl { if (Rr.destination = Rl.destination and (Rr.cost < Rl.cost or Rl.link = n)) Rl = Rr; // Rr.cost < Rl.cost : remote node has better route // Rl.link = n : remote node is more authoritative } } }
11.
Instructor’s Guide for
Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 © Addison-Wesley Publishers 2000 Figure 3.10 Simplified view of the QMW Computer Science network file compute dialup hammer henry hotpoint 138.37.88.230 138.37.88.162 bruno 138.37.88.249 router/ sickle 138.37.95.241138.37.95.240/29 138.37.95.249 copper 138.37.88.248 firewall web 138.37.95.248/29 server desktop computers 138.37.88.xx subnet subnet Eswitch 138.37.88 server server server 138.37.88.251 custard 138.37.94.246 desktop computers Eswitch 138.37.94 hubhub Student subnetStaff subnet other servers router/ firewall 138.37.94.251 1000 Mbps Ethernet Eswitch: Ethernet switch 100 Mbps Ethernet file server/ gateway printers Campus router Campus router 138.37.94.xx
12.
Instructor’s Guide for
Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 © Addison-Wesley Publishers 2000 Figure 3.11 Tunnelling for IPv6 migration A B IPv6 IPv6 IPv6 encapsulated in IPv4 packets Encapsulators IPv4 network
13.
Instructor’s Guide for
Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 © Addison-Wesley Publishers 2000 Figure 3.12 TCP/IP layers Messages (UDP) or Streams (TCP) Application Transport Internet UDP or TCP packets IP datagrams Network-specific frames Message Layers Underlying network Network interface
14.
Instructor’s Guide for
Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 © Addison-Wesley Publishers 2000 Figure 3.13 Encapsulation in a message transmitted via TCP over an Ethernet Application message TCP header IP header Ethernet header Ethernet frame port TCP IP
15.
Instructor’s Guide for
Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 © Addison-Wesley Publishers 2000 Figure 3.14 The programmer's conceptual view of a TCP/IP Internet IP Application Application TCP UDP
16.
Instructor’s Guide for
Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 © Addison-Wesley Publishers 2000 Figure 3.15 Internet address structure, showing field sizes in bits 7 24 Class A: 0 Network ID Host ID 14 16 Class B: 1 0 Network ID Host ID 21 8 Class C: 1 1 0 Network ID Host ID 28 Class D (multicast): 1 1 1 0 Multicast address 27 Class E (reserved): 1 1 1 1 unused0
17.
Instructor’s Guide for
Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 © Addison-Wesley Publishers 2000 Figure 3.16 Decimal representation of Internet addresses octet 1 octet 2 octet 3 Class A: 1 to 127 0 to 255 0 to 255 1 to 254 Class B: 128 to 191 Class C: 192 to 223 224 to 239Class D (multicast): Network ID Network ID Network ID Host ID Host ID Host ID Multicast address 0 to 255 0 to 255 1 to 254 0 to 255 0 to 255 0 to 255 0 to 255 0 to 255 0 to 255 Multicast address 0 to 255 0 to 255 1 to 254240 to 255Class E (reserved): 1.0.0.0 to 127.255.255.255 128.0.0.0 to 191.255.255.255 192.0.0.0 to 223.255.255.255 224.0.0.0 to 239.255.255.255 240.0.0.0 to 255.255.255.255 Range of addresses
18.
Instructor’s Guide for
Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 © Addison-Wesley Publishers 2000 Figure 3.17 IP packet layout dataIP address of destinationIP address of source header up to 64 kilobytes
19.
Instructor’s Guide for
Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 © Addison-Wesley Publishers 2000 Figure 3.18 IPv6 header layout Source address (128 bits) Destination address (128 bits) Version (4 bits) Priority (4 bits) Flow label (24 bits) Payload length (16 bits) Hop limit (8 bits)Next header (8 bits)
20.
Instructor’s Guide for
Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 © Addison-Wesley Publishers 2000 Figure 3.19 The MobileIP routing mechanism Sender Home Mobile host MH Foreign agent FA Internet agent First IP packet addressed to MH Address of FA returned to sender First IP packet tunnelled to FA Subsequent IP packets tunnelled to FA
21.
Instructor’s Guide for
Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 © Addison-Wesley Publishers 2000 Figure 3.20 Firewall configurations Internet Router/ Protected intranet a) Filtering router Internet b) Filtering router and bastion filter Internet R/filterc) Screened subnet for bastion R/filter Bastion R/filter Bastion web/ftp server web/ftp server web/ftp server
22.
Instructor’s Guide for
Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 © Addison-Wesley Publishers 2000 Figure 3.21 IEEE 802 network standards IEEE No. Title Reference 802.3 CSMA/CD Networks (Ethernet) [IEEE 1985a] 802.4 Token Bus Networks [IEEE 1985b] 802.5 Token Ring Networks [IEEE 1985c] 802.6 Metropolitan Area Networks [IEEE 1994] 802.11 Wireless Local Area Networks [IEEE 1999]
23.
Instructor’s Guide for
Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 © Addison-Wesley Publishers 2000 Figure 3.22 Wireless LAN configuration LAN Server Wireless LAN Laptops Base station/ access point Palmtop radio obstruction A B C D E
24.
Instructor’s Guide for
Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 © Addison-Wesley Publishers 2000 Figure 3.23 ATM protocol layers Physical Application ATM layer Higher-layer protocols ATM cells ATM virtual channels Message Layers ATM adaption layer
25.
Instructor’s Guide for
Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 © Addison-Wesley Publishers 2000 Figure 3.24 ATM cell layout Flags DataVirtual channel idVirtual path id 53 bytes Header: 5 bytes
26.
Instructor’s Guide for
Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 © Addison-Wesley Publishers 2000 Figure 3.25 Switching virtual paths in an ATM network VPI in VPI out 2 3 4 5 VPI = 3 VPI = 5 VPI = 4 Virtual path Virtual channels VPI = 2 VPI : virtual path identifier VP switch VP/VC switch VP switch Host Host
Télécharger maintenant