SlideShare une entreprise Scribd logo
1  sur  26
Slides for Chapter 3:
Networking and Internetworking
From Coulouris, Dollimore and
Kindberg
Distributed Systems:
Concepts and Design
Edition 3, © Addison-Wesley 2001
Instructor’s Guide for Coulouris,
Dollimore and Kindberg Distributed
Systems: Concepts and Design Edn. 3
© Addison-Wesley Publishers 2000
Figure 3.1
Network types
Range Bandwidth (Mbps) Latency (ms)
LAN 1-2 kms 10-1000 1-10
WAN worldwide 0.010-600 100-500
MAN 2-50 kms 1-150 10
Wireless LAN 0.15-1.5 km 2-11 5-20
Wireless WAN worldwide 0.010-2 100-500
Internet worldwide 0.010-2 100-500
Instructor’s Guide for Coulouris,
Dollimore and Kindberg Distributed
Systems: Concepts and Design Edn. 3
© Addison-Wesley Publishers 2000
Figure 3.2
Conceptual layering of protocol software
Layer n
Layer 2
Layer 1
Message sent Message received
Communication
medium
Sender Recipient
Instructor’s Guide for Coulouris,
Dollimore and Kindberg Distributed
Systems: Concepts and Design Edn. 3
© Addison-Wesley Publishers 2000
Figure 3.3
Encapsulation as it is applied in layered protocols
Presentation header
Application-layer message
Session header
Transport header
Network header
Instructor’s Guide for Coulouris,
Dollimore and Kindberg Distributed
Systems: Concepts and Design Edn. 3
© Addison-Wesley Publishers 2000
Figure 3.4
Protocol layers in the ISO Open Systems Interconnection (OSI) model
Application
Presentation
Session
Transport
Network
Data link
Physical
Message sent Message received
Sender Recipient
Layers
Communication
medium
Instructor’s Guide for Coulouris,
Dollimore and Kindberg Distributed
Systems: Concepts and Design Edn. 3
© Addison-Wesley Publishers 2000
Figure 3.5
OSI protocol summary
Layer Description Examples
Application Protocols that are designed to meet the communication requirements of
specific applications, often defining the interface to a service.
HTTP,FTP, SMTP,
CORBA IIOP
Presentation Protocols at this level transmit data in a network representation that is
independent of the representations used in individual computers, which may
differ. Encryption is also performed in this layer, if required.
Secure Sockets
(SSL),CORBA Data
Rep.
Session At this level reliability and adaptation are performed, such as detection of
failures and automatic recovery.
Transport This is the lowest level at which messages (rather than packets) are handled.
Messages are addressed to communication ports attached to processes,
Protocols in this layer may be connection-oriented or connectionless.
TCP,UDP
Network Transfers data packets between computers in a specific network. In a WAN
or an internetwork this involves the generation of a route passing through
routers. In a single LAN no routing is required.
IP, ATM virtual
circuits
Data link Responsible for transmission of packets between nodes that are directly
connected by a physical link. In a WAN transmission is between pairs of
routers or between routers and hosts. In a LAN it is between any pair of hosts.
Ethernet MAC,
ATM cell transfer,
PPP
Physical The circuits and hardware that drive the network. It transmits sequences of
binary data by analogue signalling, using amplitude or frequency modulation
of electrical signals (on cable circuits), light signals (on fibre optic circuits)
or other electromagnetic signals (on radio and microwave circuits).
Ethernet base- band
signalling, ISDN
Instructor’s Guide for Coulouris,
Dollimore and Kindberg Distributed
Systems: Concepts and Design Edn. 3
© Addison-Wesley Publishers 2000
Figure 3.6
Internetwork layers
Underlying network
Application
Network interface
Transport
Internetwork
Internetwork packets
Network-specific packets
Message
Layers
Internetwork
protocols
Underlying
network
protocols
Instructor’s Guide for Coulouris,
Dollimore and Kindberg Distributed
Systems: Concepts and Design Edn. 3
© Addison-Wesley Publishers 2000
Figure 3.7
Routing in a wide area network
Hosts Links
or local
networks
A
D E
B
C
1
2
5
43
6
Routers
Instructor’s Guide for Coulouris,
Dollimore and Kindberg Distributed
Systems: Concepts and Design Edn. 3
© Addison-Wesley Publishers 2000
Figure 3.8
Routing tables for the network in Figure 3.7
Routings from D Routings from E
To Link Cost To Link Cost
A
B
C
D
E
3
3
6
local
6
1
2
2
0
1
A
B
C
D
E
4
4
5
6
local
2
1
1
1
0
Routings from A Routings from B Routings from C
To Link Cost To Link Cost To Link Cost
A
B
C
D
E
local
1
1
3
1
0
1
2
1
2
A
B
C
D
E
1
local
2
1
4
1
0
1
2
1
A
B
C
D
E
2
2
local
5
5
2
1
0
2
1
Instructor’s Guide for Coulouris,
Dollimore and Kindberg Distributed
Systems: Concepts and Design Edn. 3
© Addison-Wesley Publishers 2000
Figure 3.9
Pseudo-code for RIP routing algorithm
Send: Each t seconds or when Tl changes, send Tl on each non-faulty
outgoing link.
Receive: Whenever a routing table Tr is received on link n:
for all rows Rr in Tr {
if (Rr.link | n) {
Rr.cost = Rr.cost + 1;
Rr.link = n;
if (Rr.destination is not in Tl) add Rr to Tl;
// add new destination to Tl
else for all rows Rl in Tl {
if (Rr.destination = Rl.destination and
(Rr.cost < Rl.cost or Rl.link = n)) Rl = Rr;
// Rr.cost < Rl.cost : remote node has better route
// Rl.link = n : remote node is more authoritative
}
}
}
Instructor’s Guide for Coulouris,
Dollimore and Kindberg Distributed
Systems: Concepts and Design Edn. 3
© Addison-Wesley Publishers 2000
Figure 3.10
Simplified view of the QMW Computer Science network
file
compute
dialup
hammer
henry
hotpoint
138.37.88.230
138.37.88.162
bruno
138.37.88.249
router/
sickle
138.37.95.241138.37.95.240/29
138.37.95.249
copper
138.37.88.248
firewall
web
138.37.95.248/29
server
desktop computers 138.37.88.xx
subnet
subnet
Eswitch
138.37.88
server
server
server
138.37.88.251
custard
138.37.94.246
desktop computers
Eswitch
138.37.94
hubhub
Student subnetStaff subnet
other
servers
router/
firewall
138.37.94.251
1000 Mbps Ethernet
Eswitch: Ethernet switch
100 Mbps Ethernet
file server/
gateway
printers
Campus
router
Campus
router
138.37.94.xx
Instructor’s Guide for Coulouris,
Dollimore and Kindberg Distributed
Systems: Concepts and Design Edn. 3
© Addison-Wesley Publishers 2000
Figure 3.11
Tunnelling for IPv6 migration
A B
IPv6 IPv6
IPv6 encapsulated in IPv4 packets
Encapsulators
IPv4 network
Instructor’s Guide for Coulouris,
Dollimore and Kindberg Distributed
Systems: Concepts and Design Edn. 3
© Addison-Wesley Publishers 2000
Figure 3.12
TCP/IP layers
Messages (UDP) or Streams (TCP)
Application
Transport
Internet
UDP or TCP packets
IP datagrams
Network-specific frames
Message
Layers
Underlying network
Network interface
Instructor’s Guide for Coulouris,
Dollimore and Kindberg Distributed
Systems: Concepts and Design Edn. 3
© Addison-Wesley Publishers 2000
Figure 3.13
Encapsulation in a message transmitted via TCP over an Ethernet
Application message
TCP header
IP header
Ethernet header
Ethernet frame
port
TCP
IP
Instructor’s Guide for Coulouris,
Dollimore and Kindberg Distributed
Systems: Concepts and Design Edn. 3
© Addison-Wesley Publishers 2000
Figure 3.14
The programmer's conceptual view of a TCP/IP Internet
IP
Application Application
TCP UDP
Instructor’s Guide for Coulouris,
Dollimore and Kindberg Distributed
Systems: Concepts and Design Edn. 3
© Addison-Wesley Publishers 2000
Figure 3.15
Internet address structure, showing field sizes in bits
7 24
Class A: 0 Network ID Host ID
14 16
Class B: 1 0 Network ID Host ID
21 8
Class C: 1 1 0 Network ID Host ID
28
Class D (multicast): 1 1 1 0 Multicast address
27
Class E (reserved): 1 1 1 1 unused0
Instructor’s Guide for Coulouris,
Dollimore and Kindberg Distributed
Systems: Concepts and Design Edn. 3
© Addison-Wesley Publishers 2000
Figure 3.16
Decimal representation of Internet addresses
octet 1 octet 2 octet 3
Class A: 1 to 127
0 to 255 0 to 255 1 to 254
Class B: 128 to 191
Class C: 192 to 223
224 to 239Class D (multicast):
Network ID
Network ID
Network ID
Host ID
Host ID
Host ID
Multicast address
0 to 255 0 to 255 1 to 254
0 to 255 0 to 255 0 to 255
0 to 255 0 to 255 0 to 255
Multicast address
0 to 255 0 to 255 1 to 254240 to 255Class E (reserved):
1.0.0.0 to
127.255.255.255
128.0.0.0 to
191.255.255.255
192.0.0.0 to
223.255.255.255
224.0.0.0 to
239.255.255.255
240.0.0.0 to
255.255.255.255
Range of addresses
Instructor’s Guide for Coulouris,
Dollimore and Kindberg Distributed
Systems: Concepts and Design Edn. 3
© Addison-Wesley Publishers 2000
Figure 3.17
IP packet layout
dataIP address of destinationIP address of source
header
up to 64 kilobytes
Instructor’s Guide for Coulouris,
Dollimore and Kindberg Distributed
Systems: Concepts and Design Edn. 3
© Addison-Wesley Publishers 2000
Figure 3.18
IPv6 header layout
Source address
(128 bits)
Destination address
(128 bits)
Version (4 bits) Priority (4 bits) Flow label (24 bits)
Payload length (16 bits) Hop limit (8 bits)Next header (8 bits)
Instructor’s Guide for Coulouris,
Dollimore and Kindberg Distributed
Systems: Concepts and Design Edn. 3
© Addison-Wesley Publishers 2000
Figure 3.19
The MobileIP routing mechanism
Sender
Home
Mobile host MH
Foreign agent FA
Internet
agent
First IP packet
addressed to MH
Address of FA
returned to sender
First IP packet
tunnelled to FA
Subsequent IP packets
tunnelled to FA
Instructor’s Guide for Coulouris,
Dollimore and Kindberg Distributed
Systems: Concepts and Design Edn. 3
© Addison-Wesley Publishers 2000
Figure 3.20
Firewall configurations
Internet
Router/
Protected intranet
a) Filtering router
Internet
b) Filtering router and bastion
filter
Internet
R/filterc) Screened subnet for bastion R/filter Bastion
R/filter Bastion
web/ftp
server
web/ftp
server
web/ftp
server
Instructor’s Guide for Coulouris,
Dollimore and Kindberg Distributed
Systems: Concepts and Design Edn. 3
© Addison-Wesley Publishers 2000
Figure 3.21
IEEE 802 network standards
IEEE No. Title Reference
802.3 CSMA/CD Networks (Ethernet) [IEEE 1985a]
802.4 Token Bus Networks [IEEE 1985b]
802.5 Token Ring Networks [IEEE 1985c]
802.6 Metropolitan Area Networks [IEEE 1994]
802.11 Wireless Local Area Networks [IEEE 1999]
Instructor’s Guide for Coulouris,
Dollimore and Kindberg Distributed
Systems: Concepts and Design Edn. 3
© Addison-Wesley Publishers 2000
Figure 3.22
Wireless LAN configuration
LAN
Server
Wireless
LAN
Laptops
Base station/
access point
Palmtop
radio obstruction
A B C
D
E
Instructor’s Guide for Coulouris,
Dollimore and Kindberg Distributed
Systems: Concepts and Design Edn. 3
© Addison-Wesley Publishers 2000
Figure 3.23
ATM protocol layers
Physical
Application
ATM layer
Higher-layer protocols
ATM cells
ATM virtual channels
Message
Layers
ATM adaption layer
Instructor’s Guide for Coulouris,
Dollimore and Kindberg Distributed
Systems: Concepts and Design Edn. 3
© Addison-Wesley Publishers 2000
Figure 3.24
ATM cell layout
Flags DataVirtual channel idVirtual path id
53 bytes
Header: 5 bytes
Instructor’s Guide for Coulouris,
Dollimore and Kindberg Distributed
Systems: Concepts and Design Edn. 3
© Addison-Wesley Publishers 2000
Figure 3.25
Switching virtual paths in an ATM network
VPI in VPI out
2
3
4
5
VPI = 3
VPI = 5
VPI = 4
Virtual path Virtual channels
VPI = 2
VPI : virtual path identifier
VP switch VP/VC
switch
VP switch
Host
Host

Contenu connexe

Tendances (20)

Tcp and udp
Tcp and udpTcp and udp
Tcp and udp
 
Communication in Distributed Systems
Communication in Distributed SystemsCommunication in Distributed Systems
Communication in Distributed Systems
 
Ospf
 Ospf Ospf
Ospf
 
UDP - User Datagram Protocol
UDP - User Datagram ProtocolUDP - User Datagram Protocol
UDP - User Datagram Protocol
 
Dns
DnsDns
Dns
 
Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
 
Subnet calculation Tutorial
Subnet calculation TutorialSubnet calculation Tutorial
Subnet calculation Tutorial
 
Domain Name System DNS
Domain Name System DNSDomain Name System DNS
Domain Name System DNS
 
Dhcp
DhcpDhcp
Dhcp
 
Ipv4 and Ipv6
Ipv4 and Ipv6Ipv4 and Ipv6
Ipv4 and Ipv6
 
Network address translation
Network address translationNetwork address translation
Network address translation
 
Ospf.ppt
Ospf.pptOspf.ppt
Ospf.ppt
 
DHCP
DHCPDHCP
DHCP
 
Chapter 6 slides
Chapter 6 slidesChapter 6 slides
Chapter 6 slides
 
Routing Information Protocol
Routing Information ProtocolRouting Information Protocol
Routing Information Protocol
 
Subnetting Presentation
Subnetting PresentationSubnetting Presentation
Subnetting Presentation
 
Ch 20 UNICAST ROUTING SECTION 2
Ch 20   UNICAST ROUTING  SECTION  2Ch 20   UNICAST ROUTING  SECTION  2
Ch 20 UNICAST ROUTING SECTION 2
 
How BGP Works
How BGP WorksHow BGP Works
How BGP Works
 
Ip addressing classful
Ip addressing classfulIp addressing classful
Ip addressing classful
 
Distributed deadlock
Distributed deadlockDistributed deadlock
Distributed deadlock
 

En vedette

Chapter 2 system models
Chapter 2 system modelsChapter 2 system models
Chapter 2 system modelsAbDul ThaYyal
 
Chapter 7 slides
Chapter 7 slidesChapter 7 slides
Chapter 7 slideslara_ays
 
Chapter 1 slides
Chapter 1 slidesChapter 1 slides
Chapter 1 slidessoe sumijan
 
Chapter 3 networking and internetworking
Chapter 3 networking and internetworkingChapter 3 networking and internetworking
Chapter 3 networking and internetworkingAbDul ThaYyal
 
Chapter 8 distributed file systems
Chapter 8 distributed file systemsChapter 8 distributed file systems
Chapter 8 distributed file systemsAbDul ThaYyal
 
Chapter 4 a interprocess communication
Chapter 4 a interprocess communicationChapter 4 a interprocess communication
Chapter 4 a interprocess communicationAbDul ThaYyal
 
Chapter 1 characterisation of distributed systems
Chapter 1 characterisation of distributed systemsChapter 1 characterisation of distributed systems
Chapter 1 characterisation of distributed systemsAbDul ThaYyal
 
Report-An Expert System for Car Failure Diagnosis-Report
Report-An Expert System for Car Failure Diagnosis-ReportReport-An Expert System for Car Failure Diagnosis-Report
Report-An Expert System for Car Failure Diagnosis-ReportViralkumar Jayswal
 
4.file service architecture (1)
4.file service architecture (1)4.file service architecture (1)
4.file service architecture (1)AbDul ThaYyal
 
Chapter 3 slides
Chapter 3 slidesChapter 3 slides
Chapter 3 slideslara_ays
 
Chapter 9 slides
Chapter 9 slidesChapter 9 slides
Chapter 9 slideslara_ays
 

En vedette (20)

Chapter 2 system models
Chapter 2 system modelsChapter 2 system models
Chapter 2 system models
 
Chapter 7 slides
Chapter 7 slidesChapter 7 slides
Chapter 7 slides
 
Chapter 1 slides
Chapter 1 slidesChapter 1 slides
Chapter 1 slides
 
Chapter 17 corba
Chapter 17 corbaChapter 17 corba
Chapter 17 corba
 
Chapter 1 slides
Chapter 1 slidesChapter 1 slides
Chapter 1 slides
 
Chapter 3 networking and internetworking
Chapter 3 networking and internetworkingChapter 3 networking and internetworking
Chapter 3 networking and internetworking
 
Chapter 8 distributed file systems
Chapter 8 distributed file systemsChapter 8 distributed file systems
Chapter 8 distributed file systems
 
Chapter 4 a interprocess communication
Chapter 4 a interprocess communicationChapter 4 a interprocess communication
Chapter 4 a interprocess communication
 
Chapter 11b
Chapter 11bChapter 11b
Chapter 11b
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
 
Chapter 1 characterisation of distributed systems
Chapter 1 characterisation of distributed systemsChapter 1 characterisation of distributed systems
Chapter 1 characterisation of distributed systems
 
Report-An Expert System for Car Failure Diagnosis-Report
Report-An Expert System for Car Failure Diagnosis-ReportReport-An Expert System for Car Failure Diagnosis-Report
Report-An Expert System for Car Failure Diagnosis-Report
 
4.file service architecture (1)
4.file service architecture (1)4.file service architecture (1)
4.file service architecture (1)
 
Chapter 9 names
Chapter 9 namesChapter 9 names
Chapter 9 names
 
Chapter 6 os
Chapter 6 osChapter 6 os
Chapter 6 os
 
2. microkernel new
2. microkernel new2. microkernel new
2. microkernel new
 
Chapter 3 slides
Chapter 3 slidesChapter 3 slides
Chapter 3 slides
 
3. challenges
3. challenges3. challenges
3. challenges
 
Chapter 9 slides
Chapter 9 slidesChapter 9 slides
Chapter 9 slides
 
Chapter 7 security
Chapter 7 securityChapter 7 security
Chapter 7 security
 

Similaire à Chapter 3 slides (Distributed Systems)

Network_Model. In the field of Computer Networking.ppt
Network_Model. In the field of Computer Networking.pptNetwork_Model. In the field of Computer Networking.ppt
Network_Model. In the field of Computer Networking.pptBlackHat41
 
Computer Networking network layer chapter 4
Computer Networking network layer chapter 4Computer Networking network layer chapter 4
Computer Networking network layer chapter 4RoopaRathod2
 
Chapter_4_V6.11 Network layer.ppt
Chapter_4_V6.11 Network layer.pptChapter_4_V6.11 Network layer.ppt
Chapter_4_V6.11 Network layer.pptMaiTran87348
 
The Network Ip Address Scheme
The Network Ip Address SchemeThe Network Ip Address Scheme
The Network Ip Address SchemeErin Rivera
 
independent of the subnet topology. The Transport Layer should be shielded fr...
independent of the subnet topology. The Transport Layer should be shielded fr...independent of the subnet topology. The Transport Layer should be shielded fr...
independent of the subnet topology. The Transport Layer should be shielded fr...Ashish Gupta
 
Presentation1.Machine learning, Supervised, semi supervised learning, cluste...
Presentation1.Machine learning,Supervised, semi supervised learning, cluste...Presentation1.Machine learning,Supervised, semi supervised learning, cluste...
Presentation1.Machine learning, Supervised, semi supervised learning, cluste...Ashish Gupta
 
The services provided by the network layer should be independent of the subne...
The services provided by the network layer should be independent of the subne...The services provided by the network layer should be independent of the subne...
The services provided by the network layer should be independent of the subne...Ashish Gupta
 
Chapter 14 Important questions
Chapter 14 Important questionsChapter 14 Important questions
Chapter 14 Important questionsVasuki Boopathy
 
Junos routing overview from Juniper
Junos routing overview from JuniperJunos routing overview from Juniper
Junos routing overview from JuniperNam Nguyen
 
Cisco.actualtests.200 120.v2013-12-10.by.watson.314q (2 new q)
Cisco.actualtests.200 120.v2013-12-10.by.watson.314q (2 new q)Cisco.actualtests.200 120.v2013-12-10.by.watson.314q (2 new q)
Cisco.actualtests.200 120.v2013-12-10.by.watson.314q (2 new q)keiko277
 

Similaire à Chapter 3 slides (Distributed Systems) (20)

ch3.ppt
ch3.pptch3.ppt
ch3.ppt
 
Cs8591 Computer Networks
Cs8591 Computer NetworksCs8591 Computer Networks
Cs8591 Computer Networks
 
Ch3 (1)
Ch3 (1)Ch3 (1)
Ch3 (1)
 
Network_Model. In the field of Computer Networking.ppt
Network_Model. In the field of Computer Networking.pptNetwork_Model. In the field of Computer Networking.ppt
Network_Model. In the field of Computer Networking.ppt
 
Computer Networking network layer chapter 4
Computer Networking network layer chapter 4Computer Networking network layer chapter 4
Computer Networking network layer chapter 4
 
Chapter_4_V6.11 Network layer.ppt
Chapter_4_V6.11 Network layer.pptChapter_4_V6.11 Network layer.ppt
Chapter_4_V6.11 Network layer.ppt
 
The Network Ip Address Scheme
The Network Ip Address SchemeThe Network Ip Address Scheme
The Network Ip Address Scheme
 
independent of the subnet topology. The Transport Layer should be shielded fr...
independent of the subnet topology. The Transport Layer should be shielded fr...independent of the subnet topology. The Transport Layer should be shielded fr...
independent of the subnet topology. The Transport Layer should be shielded fr...
 
Lecture 06
Lecture 06Lecture 06
Lecture 06
 
Week6 final
Week6 finalWeek6 final
Week6 final
 
Chapter1ccna
Chapter1ccnaChapter1ccna
Chapter1ccna
 
Chapter1ccna
Chapter1ccnaChapter1ccna
Chapter1ccna
 
CCNA Exam Question
CCNA Exam QuestionCCNA Exam Question
CCNA Exam Question
 
Presentation1.Machine learning, Supervised, semi supervised learning, cluste...
Presentation1.Machine learning,Supervised, semi supervised learning, cluste...Presentation1.Machine learning,Supervised, semi supervised learning, cluste...
Presentation1.Machine learning, Supervised, semi supervised learning, cluste...
 
The services provided by the network layer should be independent of the subne...
The services provided by the network layer should be independent of the subne...The services provided by the network layer should be independent of the subne...
The services provided by the network layer should be independent of the subne...
 
Chapter 14 Important questions
Chapter 14 Important questionsChapter 14 Important questions
Chapter 14 Important questions
 
CS6601 DISTRIBUTED SYSTEMS
CS6601 DISTRIBUTED SYSTEMSCS6601 DISTRIBUTED SYSTEMS
CS6601 DISTRIBUTED SYSTEMS
 
Lecture 1.ppt
Lecture 1.pptLecture 1.ppt
Lecture 1.ppt
 
Junos routing overview from Juniper
Junos routing overview from JuniperJunos routing overview from Juniper
Junos routing overview from Juniper
 
Cisco.actualtests.200 120.v2013-12-10.by.watson.314q (2 new q)
Cisco.actualtests.200 120.v2013-12-10.by.watson.314q (2 new q)Cisco.actualtests.200 120.v2013-12-10.by.watson.314q (2 new q)
Cisco.actualtests.200 120.v2013-12-10.by.watson.314q (2 new q)
 

Plus de soe sumijan

Perencanaan Infrastruktur (Trends Infrastructures)
Perencanaan Infrastruktur (Trends Infrastructures)Perencanaan Infrastruktur (Trends Infrastructures)
Perencanaan Infrastruktur (Trends Infrastructures)soe sumijan
 
Chapter 2 slides
Chapter 2 slidesChapter 2 slides
Chapter 2 slidessoe sumijan
 
Computer Vision Pertemuan 06
Computer Vision Pertemuan 06Computer Vision Pertemuan 06
Computer Vision Pertemuan 06soe sumijan
 
Computer Vision Pertemuan 05
Computer  Vision Pertemuan 05Computer  Vision Pertemuan 05
Computer Vision Pertemuan 05soe sumijan
 
Computer Vision Pertemuan 04
Computer  Vision Pertemuan 04Computer  Vision Pertemuan 04
Computer Vision Pertemuan 04soe sumijan
 
e-Government (Strategi dan Implementasinya untuk Pemerinyahan)
e-Government (Strategi dan Implementasinya untuk Pemerinyahan)e-Government (Strategi dan Implementasinya untuk Pemerinyahan)
e-Government (Strategi dan Implementasinya untuk Pemerinyahan)soe sumijan
 
Multimedia dan Computer Vision
Multimedia dan Computer VisionMultimedia dan Computer Vision
Multimedia dan Computer Visionsoe sumijan
 
Aplikasi sistem real time
Aplikasi sistem real timeAplikasi sistem real time
Aplikasi sistem real timesoe sumijan
 

Plus de soe sumijan (9)

Perencanaan Infrastruktur (Trends Infrastructures)
Perencanaan Infrastruktur (Trends Infrastructures)Perencanaan Infrastruktur (Trends Infrastructures)
Perencanaan Infrastruktur (Trends Infrastructures)
 
Chapter 2 slides
Chapter 2 slidesChapter 2 slides
Chapter 2 slides
 
Computer Vision Pertemuan 06
Computer Vision Pertemuan 06Computer Vision Pertemuan 06
Computer Vision Pertemuan 06
 
Computer Vision Pertemuan 05
Computer  Vision Pertemuan 05Computer  Vision Pertemuan 05
Computer Vision Pertemuan 05
 
Computer Vision Pertemuan 04
Computer  Vision Pertemuan 04Computer  Vision Pertemuan 04
Computer Vision Pertemuan 04
 
e-Government (Strategi dan Implementasinya untuk Pemerinyahan)
e-Government (Strategi dan Implementasinya untuk Pemerinyahan)e-Government (Strategi dan Implementasinya untuk Pemerinyahan)
e-Government (Strategi dan Implementasinya untuk Pemerinyahan)
 
Pertemuan 01-02
Pertemuan 01-02Pertemuan 01-02
Pertemuan 01-02
 
Multimedia dan Computer Vision
Multimedia dan Computer VisionMultimedia dan Computer Vision
Multimedia dan Computer Vision
 
Aplikasi sistem real time
Aplikasi sistem real timeAplikasi sistem real time
Aplikasi sistem real time
 

Dernier

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 

Dernier (20)

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 

Chapter 3 slides (Distributed Systems)

  • 1. Slides for Chapter 3: Networking and Internetworking From Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edition 3, © Addison-Wesley 2001
  • 2. Instructor’s Guide for Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 © Addison-Wesley Publishers 2000 Figure 3.1 Network types Range Bandwidth (Mbps) Latency (ms) LAN 1-2 kms 10-1000 1-10 WAN worldwide 0.010-600 100-500 MAN 2-50 kms 1-150 10 Wireless LAN 0.15-1.5 km 2-11 5-20 Wireless WAN worldwide 0.010-2 100-500 Internet worldwide 0.010-2 100-500
  • 3. Instructor’s Guide for Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 © Addison-Wesley Publishers 2000 Figure 3.2 Conceptual layering of protocol software Layer n Layer 2 Layer 1 Message sent Message received Communication medium Sender Recipient
  • 4. Instructor’s Guide for Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 © Addison-Wesley Publishers 2000 Figure 3.3 Encapsulation as it is applied in layered protocols Presentation header Application-layer message Session header Transport header Network header
  • 5. Instructor’s Guide for Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 © Addison-Wesley Publishers 2000 Figure 3.4 Protocol layers in the ISO Open Systems Interconnection (OSI) model Application Presentation Session Transport Network Data link Physical Message sent Message received Sender Recipient Layers Communication medium
  • 6. Instructor’s Guide for Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 © Addison-Wesley Publishers 2000 Figure 3.5 OSI protocol summary Layer Description Examples Application Protocols that are designed to meet the communication requirements of specific applications, often defining the interface to a service. HTTP,FTP, SMTP, CORBA IIOP Presentation Protocols at this level transmit data in a network representation that is independent of the representations used in individual computers, which may differ. Encryption is also performed in this layer, if required. Secure Sockets (SSL),CORBA Data Rep. Session At this level reliability and adaptation are performed, such as detection of failures and automatic recovery. Transport This is the lowest level at which messages (rather than packets) are handled. Messages are addressed to communication ports attached to processes, Protocols in this layer may be connection-oriented or connectionless. TCP,UDP Network Transfers data packets between computers in a specific network. In a WAN or an internetwork this involves the generation of a route passing through routers. In a single LAN no routing is required. IP, ATM virtual circuits Data link Responsible for transmission of packets between nodes that are directly connected by a physical link. In a WAN transmission is between pairs of routers or between routers and hosts. In a LAN it is between any pair of hosts. Ethernet MAC, ATM cell transfer, PPP Physical The circuits and hardware that drive the network. It transmits sequences of binary data by analogue signalling, using amplitude or frequency modulation of electrical signals (on cable circuits), light signals (on fibre optic circuits) or other electromagnetic signals (on radio and microwave circuits). Ethernet base- band signalling, ISDN
  • 7. Instructor’s Guide for Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 © Addison-Wesley Publishers 2000 Figure 3.6 Internetwork layers Underlying network Application Network interface Transport Internetwork Internetwork packets Network-specific packets Message Layers Internetwork protocols Underlying network protocols
  • 8. Instructor’s Guide for Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 © Addison-Wesley Publishers 2000 Figure 3.7 Routing in a wide area network Hosts Links or local networks A D E B C 1 2 5 43 6 Routers
  • 9. Instructor’s Guide for Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 © Addison-Wesley Publishers 2000 Figure 3.8 Routing tables for the network in Figure 3.7 Routings from D Routings from E To Link Cost To Link Cost A B C D E 3 3 6 local 6 1 2 2 0 1 A B C D E 4 4 5 6 local 2 1 1 1 0 Routings from A Routings from B Routings from C To Link Cost To Link Cost To Link Cost A B C D E local 1 1 3 1 0 1 2 1 2 A B C D E 1 local 2 1 4 1 0 1 2 1 A B C D E 2 2 local 5 5 2 1 0 2 1
  • 10. Instructor’s Guide for Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 © Addison-Wesley Publishers 2000 Figure 3.9 Pseudo-code for RIP routing algorithm Send: Each t seconds or when Tl changes, send Tl on each non-faulty outgoing link. Receive: Whenever a routing table Tr is received on link n: for all rows Rr in Tr { if (Rr.link | n) { Rr.cost = Rr.cost + 1; Rr.link = n; if (Rr.destination is not in Tl) add Rr to Tl; // add new destination to Tl else for all rows Rl in Tl { if (Rr.destination = Rl.destination and (Rr.cost < Rl.cost or Rl.link = n)) Rl = Rr; // Rr.cost < Rl.cost : remote node has better route // Rl.link = n : remote node is more authoritative } } }
  • 11. Instructor’s Guide for Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 © Addison-Wesley Publishers 2000 Figure 3.10 Simplified view of the QMW Computer Science network file compute dialup hammer henry hotpoint 138.37.88.230 138.37.88.162 bruno 138.37.88.249 router/ sickle 138.37.95.241138.37.95.240/29 138.37.95.249 copper 138.37.88.248 firewall web 138.37.95.248/29 server desktop computers 138.37.88.xx subnet subnet Eswitch 138.37.88 server server server 138.37.88.251 custard 138.37.94.246 desktop computers Eswitch 138.37.94 hubhub Student subnetStaff subnet other servers router/ firewall 138.37.94.251 1000 Mbps Ethernet Eswitch: Ethernet switch 100 Mbps Ethernet file server/ gateway printers Campus router Campus router 138.37.94.xx
  • 12. Instructor’s Guide for Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 © Addison-Wesley Publishers 2000 Figure 3.11 Tunnelling for IPv6 migration A B IPv6 IPv6 IPv6 encapsulated in IPv4 packets Encapsulators IPv4 network
  • 13. Instructor’s Guide for Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 © Addison-Wesley Publishers 2000 Figure 3.12 TCP/IP layers Messages (UDP) or Streams (TCP) Application Transport Internet UDP or TCP packets IP datagrams Network-specific frames Message Layers Underlying network Network interface
  • 14. Instructor’s Guide for Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 © Addison-Wesley Publishers 2000 Figure 3.13 Encapsulation in a message transmitted via TCP over an Ethernet Application message TCP header IP header Ethernet header Ethernet frame port TCP IP
  • 15. Instructor’s Guide for Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 © Addison-Wesley Publishers 2000 Figure 3.14 The programmer's conceptual view of a TCP/IP Internet IP Application Application TCP UDP
  • 16. Instructor’s Guide for Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 © Addison-Wesley Publishers 2000 Figure 3.15 Internet address structure, showing field sizes in bits 7 24 Class A: 0 Network ID Host ID 14 16 Class B: 1 0 Network ID Host ID 21 8 Class C: 1 1 0 Network ID Host ID 28 Class D (multicast): 1 1 1 0 Multicast address 27 Class E (reserved): 1 1 1 1 unused0
  • 17. Instructor’s Guide for Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 © Addison-Wesley Publishers 2000 Figure 3.16 Decimal representation of Internet addresses octet 1 octet 2 octet 3 Class A: 1 to 127 0 to 255 0 to 255 1 to 254 Class B: 128 to 191 Class C: 192 to 223 224 to 239Class D (multicast): Network ID Network ID Network ID Host ID Host ID Host ID Multicast address 0 to 255 0 to 255 1 to 254 0 to 255 0 to 255 0 to 255 0 to 255 0 to 255 0 to 255 Multicast address 0 to 255 0 to 255 1 to 254240 to 255Class E (reserved): 1.0.0.0 to 127.255.255.255 128.0.0.0 to 191.255.255.255 192.0.0.0 to 223.255.255.255 224.0.0.0 to 239.255.255.255 240.0.0.0 to 255.255.255.255 Range of addresses
  • 18. Instructor’s Guide for Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 © Addison-Wesley Publishers 2000 Figure 3.17 IP packet layout dataIP address of destinationIP address of source header up to 64 kilobytes
  • 19. Instructor’s Guide for Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 © Addison-Wesley Publishers 2000 Figure 3.18 IPv6 header layout Source address (128 bits) Destination address (128 bits) Version (4 bits) Priority (4 bits) Flow label (24 bits) Payload length (16 bits) Hop limit (8 bits)Next header (8 bits)
  • 20. Instructor’s Guide for Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 © Addison-Wesley Publishers 2000 Figure 3.19 The MobileIP routing mechanism Sender Home Mobile host MH Foreign agent FA Internet agent First IP packet addressed to MH Address of FA returned to sender First IP packet tunnelled to FA Subsequent IP packets tunnelled to FA
  • 21. Instructor’s Guide for Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 © Addison-Wesley Publishers 2000 Figure 3.20 Firewall configurations Internet Router/ Protected intranet a) Filtering router Internet b) Filtering router and bastion filter Internet R/filterc) Screened subnet for bastion R/filter Bastion R/filter Bastion web/ftp server web/ftp server web/ftp server
  • 22. Instructor’s Guide for Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 © Addison-Wesley Publishers 2000 Figure 3.21 IEEE 802 network standards IEEE No. Title Reference 802.3 CSMA/CD Networks (Ethernet) [IEEE 1985a] 802.4 Token Bus Networks [IEEE 1985b] 802.5 Token Ring Networks [IEEE 1985c] 802.6 Metropolitan Area Networks [IEEE 1994] 802.11 Wireless Local Area Networks [IEEE 1999]
  • 23. Instructor’s Guide for Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 © Addison-Wesley Publishers 2000 Figure 3.22 Wireless LAN configuration LAN Server Wireless LAN Laptops Base station/ access point Palmtop radio obstruction A B C D E
  • 24. Instructor’s Guide for Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 © Addison-Wesley Publishers 2000 Figure 3.23 ATM protocol layers Physical Application ATM layer Higher-layer protocols ATM cells ATM virtual channels Message Layers ATM adaption layer
  • 25. Instructor’s Guide for Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 © Addison-Wesley Publishers 2000 Figure 3.24 ATM cell layout Flags DataVirtual channel idVirtual path id 53 bytes Header: 5 bytes
  • 26. Instructor’s Guide for Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 © Addison-Wesley Publishers 2000 Figure 3.25 Switching virtual paths in an ATM network VPI in VPI out 2 3 4 5 VPI = 3 VPI = 5 VPI = 4 Virtual path Virtual channels VPI = 2 VPI : virtual path identifier VP switch VP/VC switch VP switch Host Host