Analysis on Distribution of Real-Time GNSS Data Over IP Networks

Total Page:16

File Type:pdf, Size:1020Kb

Analysis on Distribution of Real-Time GNSS Data Over IP Networks ANALYSIS ON DISTRIBUTION OF REAL-TIME GNSS DATA USING IP NETWORKS by Thomas Surya Sanjaya Yan A thesis submitted in fulfilment of the requirements for the degree of Master of Engineering in Surveying and Spatial Information Systems School of Surveying and Spatial Information Systems The University of New South Wales 2008 ORIGINALITY STATEMENT I hereby declare that this submission is my own work and to the best of my knowledge it contains no materials previously published or written by another person, or sub- stantial proportions of material which have been accepted for the award of any other degree or diploma at UNSW or any other educational institution, except where due acknowledgement is made in the thesis. Any contribution made to the research by others, with whom I have worked at UNSW or elsewhere, is explicitly acknowledged in the thesis. I also declare that the intellectual content of this thesis is the product of my own work, except to the extent that assistance from others in the project's design and conception or in style, presentation and linguistic expression is acknowledged. Signed .................................................... Date ..................................................... Abstract This thesis examines the current implementations for the distribution of real-time GNSS data over IP networks such as the public Internet, focusing on two essential components of the system, data format and transport protocol. The provision of a suitable data format will allow users to take full advantage of the real-time GNSS data distribution system. Types of GNSS supported, message sizes, data rates, data precision levels, hardware and software support and possible future developments are investigated. An analysis is carried out on commonly known GNSS data formats, highlighting the most suitable standard for each evaluation criterion. A similar investigation is carried out on the transport protocols. An analysis is con- ducted on various design aspects of NTRIP and RT-IGS protocols, covering factors such as data latency, integrity, firewalls and proxy server compatibility and scalability. The analysis also covers the design aspects of the new draft Version 2 of NTRIP. The latter parts of this thesis report on the experiment results aimed at providing as- sessment of the current level of implementation of NTRIP. Data latency and integrity using NTRIP over the Internet are examined. Their impacts on users applications as the quality of real-time kinematic positioning is assessed. The results show that the performance of the system satisfies the rigorous requirement of the end-user applica- tion. The draft version of the new NTRIP indicates that UDP will be also supported. A similar investigation is carried out, providing the first experiment results on the new option. Tests using similar metrics, data latency and integrity, were carried out to verify the inherent differences between TCP and UDP. It was ascertained that, in most cases, UDP does offer improvement in terms of reduced latency over TCP. However this improvement is not significant enough to affect the performance of users applications tested. Compatibility tests were also carried out and the test results show that the new option experiences some compatibility issues with firewalls and wireless networks. ii To Jenny. It's amazing how much inspiration one could draw from someone he hardly knew. Acknowledgments I wish to first acknowledge my supervisor, Prof. Chris Rizos, for his guidance and encouragement throughout my research. I am grateful for his trust, patience and sup- port. I would also like to especially thank my co-supervisors, Dr. Samsung Lim and Dr. Craig Roberts, for their encouragement and invaluable advice. The work in this thesis would not have been possible without the assistance and ad- vice provided by Dr.-Ing. Georg Weber and his colleagues at the Federal Agency for Cartography and Geodesy (BKG), Germany. I am deeply thankful for the support they have given. I would also like to express my gratitude to Michael Moore from Geoscience Australia and Doug Kinlyside and Simon McElroy from the NSW Depart- ment of Lands for their support. The wonderful colleagues at the School and University have provided me with a pleas- ant environment to conduct my study. In no particular order, I would like to thank Peter Mumford, Danny Chen, Dr. Joel Barnes, Leon Daras, Maria Ponce, Brian Don- nelly, Peter Leech, Dr. Yincai Zhou, Dr. Bruce Harvey, Prof. Andrew Dempster, Yong Heo, Usman Iqbal, Prof. Linlin Ge, Dr. Jinling Wang, Fabrizio Tappero, Anthony Cole, Steve Hewitson, Nonie Politi, Binghao Li, Jinghui Wu, Jasmin Kim, Michael Chang, Henry Hu, Asghar Tabatabaei and Tajul Musa for their friendship and en- couragement. My deepest gratitude goes to my family for their love and support. Heartfelt thanks and much love to my father and mother for giving me the opportunities they never had; to my sisters, for their unceasing support and encouragement. Finally, I would like to acknowledge my Lord and Saviour, Jesus Christ, for his grace and mercy. Everlasting, his light will shine when all else fade. Never ending, his glory goes beyond all fame. Thomas Yan iv Contents Abstract ii Acknowledgments iv List of Acronyms x 1 Introduction 1 1.1 Global Navigation Satellite Systems . 1 1.1.1 Relative and Precise Positioning . 2 1.1.2 Real-Time GNSS Applications . 3 1.2 Background and Motivation . 4 1.3 Research Objectives and Contributions . 5 1.4 Structure of The Thesis . 6 2 GNSS Data Formats 7 2.1 Introduction . 7 2.2 Proprietary Formats . 8 2.2.1 Leica LB2 . 8 2.2.2 Ashtech MBEN . 9 2.2.3 Trimble RT17 . 10 2.2.4 Trimble CMR/CMR+ . 10 2.3 Open Formats . 12 2.3.1 RINEX . 12 2.3.2 RTCM SC-104 Standards . 14 2.3.3 RTIGS . 17 2.4 Analysis and Comparison . 18 2.4.1 Compression Technique . 18 2.4.2 Message Size . 18 2.4.3 Data Precision . 21 2.4.4 Hardware and Software Support . 21 2.5 Concluding Remarks . 22 3 GNSS Transport Protocols 24 3.1 Introduction . 24 3.2 Internet Protocol . 24 3.3 Application-layer GNSS Protocols . 26 v CONTENTS vi 3.3.1 System Architecture . 26 3.3.2 Connection Mode . 28 3.3.3 Authentication Method . 29 3.3.4 Stream Identification . 30 3.4 Transport-layer Protocols . 31 3.4.1 Transmission Control Protocol . 31 3.4.2 User Datagram Protocol . 33 3.5 Analysis and comparison . 35 3.5.1 System architecture . 35 3.5.2 Scalability . 36 3.5.3 Firewalls and proxy servers compatibility . 37 3.5.4 Security . 38 3.5.5 Data Integrity . 38 3.5.6 Data Latency . 39 3.5.7 User Acceptance . 39 3.5.8 Interoperability . 40 4 Analysis on Current Implementation 42 4.1 Introduction . 42 4.2 Background . 43 4.3 Evaluation and Analysis . 44 4.3.1 Data Latency . 44 4.3.2 Data Integrity . 46 4.3.3 Positioning Quality . 47 5 Analysis on New Proposed Implementation 58 5.1 Introduction . 58 5.2 NTRIP Version 2 . 59 5.2.1 HTTP 1.1 Compatibility . 60 5.2.2 Sourcetable Filtering . 64 5.2.3 RTSP/RTP Communication . 64 5.3 Analysis and Evaluation . 69 5.3.1 Compatibility Analysis . 69 5.3.2 Performance Analysis . 72 6 Conclusion and Future Work 93 6.1 Summary of The Results . 93 6.2 Future Work . 94 References . 96 A RTSP/RTP Compatibility Test Results 101 List of Figures 3.1 TCP/IP stack connections . 26 3.2 NTRIP system architecture . 27 3.3 RTIGS system architecture . 28 3.4 Message exchange during NtripClient to NtripCaster handshake . 29 3.5 Structure of the RTIGS message header . 30 3.6 TCP header structure . 32 3.7 UDP header structure . 34 3.8 Data flow in a Reverse-RTK system . 36 3.9 RTIGS-NTRIP interface as implemented between GFZ and NRCan (Courtesy of G. Weber) . 41 4.1 Latency snapshot from several SydNET sites . 45 4.2 SydNET data latency as measured using wireless GPRS network . 46 4.3 Plot of coordinate quality of a 4.4km baseline from post-processing . 48 4.4 Plot of coordinate quality of a 4.4km baseline using RTK . 49 4.5 Coordinate quality over 24 hours period on weekend day from post- processing . 49 4.6 Coordinate quality over 24 hours period on weekend day from RTK . 50 4.7 Coordinate quality of fixed phase solutions for 24km baseline from post- processing . 51 4.8 Coordinate quality of fixed phase solutions for 24km baseline from RTK 51 4.9 Coordinate quality of fixed phase solutions for 66km baseline from post- processing . 52 4.10 Coordinate quality of fixed phase solutions for 66km baseline from RTK 52 4.11 RTK coordinate quality with average latency of 0.00s . 53 4.12 RTK coordinate quality with average latency of 0.65s . 54 4.13 RTK coordinate quality with average latency of 1.14s . 54 4.14 RTK coordinate quality with average latency of 2.10s . 55 4.15 RTK coordinate quality with average latency of 3.20s . 55 4.16 RTK coordinate quality on wired link . 56 4.17 RTK coordinate quality on wireless GPRS link . 57 5.1 Connection between modules as used for testing . 73 5.2 Latency as observed on high-speed wired link between UNSW-BKG . 74 5.3 Latency as observed on ADSL link . 76 vii LIST OF FIGURES viii 5.4 Latency as observed on wireless GPRS link . 76 5.5 Time series plot of position quality over short baseline using TCP on high-speed wired link . 78 5.6 Time series plot of position quality over short baseline using UDP on high-speed wired link .
Recommended publications
  • IMS/ISC: .Org Proposal Form
    TOP THE .ORG TLD IS A PUBLIC TRUST » « A Joint Effort of the INTERNET MULTICASTING SERVICE and eorg INTERNET SOFTWARE CONSORTIUM » TRANSMITTAL » FITNESS DISCLOSURE » « VOICE YOUR SUPPORT » PROPOSAL » SUPPLEMENTARY MATERIALS » « SPREAD THE DOT » CONFIDENTIAL INFORMATION » SUPPLEMENTAL QUESTIONS » .org Proposal Form Executive Summary This is a joint bid between the Internet Multicasting Service (IMS) and the Internet Software Consortium (ISC). We are both public benefit corporations with a long history of operating public works and creating freely available software for key infrastructure services on the Internet. The .org Top Level Domain (TLD) is the home for the noncommercial organizations of the world, and we would operate the .org registry service as a public trust: ● We have designed a rock-solid service in strategic exchange points throughout the world. We will build this service on our existing infrastructure and operate a stable, high-performance, high-availability registry service for the .org TLD. ● We will operate this service with strong support for registrars, the registrants in the .org TLD, the general Internet community, ICANN, and our other constituencies. ● We will build on our deep familiarity with the subject area and our extensive experience in provisioning complex Internet services. We will provide a smooth transition with no break in service. ● The .org TLD registry service will support all IETF recommended protocols. Our software, including packages for registry servers, registrar clients, Whois, namespace management, and secure DNS solutions will be freely available with no restrictions in source and binary form. ● We will work with our extensive network of partners throughout the world to provide substantial input to the standards process and advances in core technologies.
    [Show full text]
  • MTU and Datagram Fragmentation If Datagram Size > MTU, Perform Fragmentation
    2G1305 Internetworking/Internetteknik Spring 2006, Period 4 Lecture notes of G. Q. Maguire Jr. For use in conjunction with TCP/IP Protocol Suite, by Behrouz A. Forouzan, 3rd Edition, McGraw-Hill, 2006 KTH Information and Communication Technology © 1998, 1999, 2000,2002, 2003, 2005, 2006 G.Q.Maguire Jr. All rights reserved. No part of this course may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without written permission of the author. Last modified: 2006.03.13:09:07 Maguire Cover.fm5 Total pages: 1 [email protected] 2006.03.13 2G1305 Internetworking/Internetteknik Spring 2006, Period 4 Module 1: Introduction Lecture notes of G. Q. Maguire Jr. For use in conjunction with TCP/IP Protocol Suite, by Behrouz A. Forouzan, 3rd Edition, McGraw-Hill, 2006. KTH Information and Communication Technology For this lecture: Chapters 1-5 © 1998, 1999, 2000,2002, 2003, 2005, 2006 G.Q.Maguire Jr. All rights reserved. No part of this course may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without written permission of the author. Last modified: 2006.03.13:10:46 Maguire Introduction.fm5 Total pages: 74 [email protected] 2006.03.13 Welcome to the Internetworking course! The course should be fun. We will dig deeper into the TCP/IP protocols and protocols built upon them. Information about the course is available from the course web page: http://www.it.kth.se/courses/2G1305/ Note that the above URL will change - due to the reoganization of KTH to: http://www.cos.ict.kth.se/education/msc/ccs/courses/2G1305/ Maguire Welcome to the Internetworking course! Introduction 3 of 74 [email protected] 2006.03.13 Internetworking/Internetteknik Staff Associated with the Course Instructor (Kursansvarig) prof.
    [Show full text]
  • From Delay-Tolerant Networks to Vehicular Delay-Tolerant Networks Paulo Rog´Erio Pereira, Member, IEEE, Augusto Casaca, Senior Member, IEEE, Joel J
    IEEE COMMUNICATIONS SURVEYS & TUTORIALS 1 From Delay-Tolerant Networks to Vehicular Delay-Tolerant Networks Paulo Rog´erio Pereira, Member, IEEE, Augusto Casaca, Senior Member, IEEE, Joel J. P. C. Rodrigues, Senior Member, IEEE, Vasco N. G. J. Soares, Student Member, IEEE, Joan Triay, Student Member, IEEE, and Cristina Cervell´o-Pastor Abstract—This paper provides an introductory overview of Bergen Linux User Group [3] with the results presented in Vehicular Delay-Tolerant Networks. First, an introduction to Fig. 1. Nine packets were sent over a distance of approximately Delay-Tolerant Networks and Vehicular Delay-Tolerant Networks 5 Km, each carried by an individual pigeon and containing one is given. Delay-Tolerant schemes and protocols can help in situations where network connectivity is sparse or with large ping (ICMP Echo Request) packet. The session log shows variations in density, or even when there is no end-to-end that four responses were received with largely variable round- connectivity by providing a communications solution for non real- trip times, averaging about 1.5 hours, and a packet loss ratio of time applications. Some special issues like routing are addressed 55%. Naturally, with these unusually high and largely variable in the paper and an introductory description of applications delays and packet loss ratios, the Internet protocols would not and the most important projects is given. Finally, some research challenges are discussed and conclusions are detailed. work properly, resulting in timeouts and cancellations. The DTN Research Group (DTNRG) [4], which was char- Index Terms—Vehicular Delay-Tolerant Networks, Delay/Disruption-Tolerant Networks, Vehicular Ad Hoc tered as part of the Internet Research Task Force (IRTF), has Networks, Intelligent Transport Systems.
    [Show full text]
  • Introduction to Networks in DAQ
    Introduction Protocols Networks for Data Acquisition Introduction to Networks in DAQ Niko Neufeld [email protected] CERN ISOTDAQ 2010, Ankara Niko Neufeld [email protected] Introduction to Networks in DAQ Introduction Protocols Networks for Data Acquisition Acknowledgments & Disclaimer I Thanks to B. Martin for material on the ATLAS network I Thanks to G. Liu and J.C. Garnier for comments and suggestions for an earlier draft of these lecture-notes I Most of the material will be in parts familiar to at least some of you - I hope you discover some new angle I In the same spirit I hope you can cope with a few \forward" references Niko Neufeld [email protected] Introduction to Networks in DAQ Introduction Protocols Networks for Data Acquisition Outline Introduction General Network technologies Moving the data around Protocols IP TCP/IP networking Networks for Data Acquisition Efficiency Networking at the host side DAQ networks Further Reading Niko Neufeld [email protected] Introduction to Networks in DAQ Introduction General Protocols Network technologies Networks for Data Acquisition Moving the data around Definition of a network A network is a collection of independent devices, which can communicate as peers with each other 1 I peer: There are no masters nor slaves on a network I independent:The network exists as long as there are at least two connected devices 1Networks are for democrats! Niko Neufeld [email protected] Introduction to Networks in DAQ Introduction General Protocols Network technologies Networks for Data Acquisition
    [Show full text]
  • Circumventing Invasive Internet Surveillance with “Carrier Pigeons”
    Circumventing Invasive Internet Surveillance with “Carrier Pigeons” Rewilding the endangered world wide web of avian migration pathways By Anthony Judge Theme: Police State & Civil Rights Global Research, July 01, 2013 laetusinpraesens.org Introduction Recent disclosures have revealed the extreme level of surveillance of telephone and internet communications, as discussed separately with respect to the US National Security Agency, the UK GCHQ, and other members of theFive Eyes Anglosphere agreement (Vigorous Application of Derivative Thinking to Derivative Problems, 2013). There is therefore a case for exploring how such surveillance can be avoided, if that is considered desirable. The situation can be compared to that in any wilderness where predators deliberately create zones of fear through the manner of their engagement with potential prey — prior to any attack, as recently noted (Scared to death: how predators really kill, New Scientist, 5 June 2013, pp. 36-39). Extensive use has been made in the past ofcarrier pigeons for secure communications, notably in arenas of threat, and most notably in World War I, continuing into World War II, but to a lesser degree. The founder of the news agency Reuters made use of carrier pigeons for the delivery of vital financial data in parallel with introduction of the telegraph. Other little-known examples are cited in what follows. With the current development in the insecurity of computer and internet technology, there is a case for exploring alternative possibilities in the light of the threat of internet surveillance and the need for secure communications. Security agencies are effectively framing the “war on terrorism” as a global war in which independent governments and institutions are a source of potential security threat — as well as the world population at large.
    [Show full text]
  • Feral Ecologies: a Foray Into the Worlds of Animals and Media Sara
    Feral Ecologies: A Foray into the Worlds of Animals and Media Sara A. Swain A Dissertation Submitted to The Faculty of Graduate Studies In Partial Fulfillment of the Requirements For the Degree of Doctor of Philosophy Graduate Program in Communication and Culture York University Toronto, ON September 2016 Sara Swain 2016 ii Abstract This dissertation wonders what non-human animals can illuminate about media in the visible contact zones where they meet. It treats these zones as rich field sites from which to excavate neglected material-discursive-semiotic relationships between animals and media. What these encounters demonstrate is that animals are historically and theoretically implicated in the imagination and materialization of media and their attendant processes of communication. Chapter 1 addresses how animals have been excluded from the cultural production of knowledge as a result of an anthropocentric perspective that renders them invisible or reduces them to ciphers for human meanings. It combines ethology and cinematic realism to craft a reparative, non-anthropocentric way of looking that is able to accommodate the plenitude of animals and their traces, and grant them the ontological heft required to exert productive traction in the visual field. Chapter 2 identifies an octopus’s encounter with a digital camera and its chance cinematic inscription as part of a larger phenomenon of “accidental animal videos.” Because non-humans are the catalysts for their production, these videos offer welcome realist counterpoints to traditional wildlife imagery, and affirm cinema’s ability to intercede non-anthropocentrically between humans and the world. Realism is essential to cinematic communication, and that realism is ultimately an achievement of non- human intervention.
    [Show full text]
  • Computer Network 1 Computer Network
    Computer network 1 Computer network Network science Theory · History Graph · Complex network · Contagion Small-world · Scale-free · Community structure · Percolation · Evolution · Controllability · Topology · Graph drawing · Social capital · Link analysis · Optimization Reciprocity · Closure · Homophily Transitivity · Preferential attachment Balance · Network effect · Influence Types of Networks Information · Telecommunication Social · Biological · Neural Interdependent · Semantic Random · Dependency · Flow Graphs Vertex · Edge · Component Directed · Multigraph · Bipartite Weighted · Hypergraph · Random Cycle · Loop · Path Neighborhood · Clique · Complete · Cut Data structure · Adjacency list & matrix Incidence list & matrix Metrics and Algorithms Centrality · Degree · Betweenness Closeness · PageRank · Motif Clustering · Degree distribution · Assortativity · Distance · Modularity Models Random · Erdős–Rényi Barabási–Albert · Watts–Strogatz ERGM · Epidemic · Hierarchical Browse Topics · Software · Network scientists Graph theory · Network theory A computer network is a communications network that connects a collection of different or similar types of computers and networks to allow communication and data exchange between systems, software applications, and users. The computers that are involved in the network that originate, route and terminate the data are called nodes,[1] and each have a unique location identity. The interconnection of computers is accomplished with a combination of cable or wireless media and networking hardware devices.
    [Show full text]
  • The Internet Is a Packet-Switched Network, 37 Hastings Comm
    Hastings Communications and Entertainment Law Journal Volume 37 | Number 2 Article 3 1-1-2015 The nI ternet Is a Packet-Switched Network Kendall Koning Follow this and additional works at: https://repository.uchastings.edu/ hastings_comm_ent_law_journal Part of the Communications Law Commons, Entertainment, Arts, and Sports Law Commons, and the Intellectual Property Law Commons Recommended Citation Kendall Koning, The Internet Is a Packet-Switched Network, 37 Hastings Comm. & Ent. L.J. 273 (2015). Available at: https://repository.uchastings.edu/hastings_comm_ent_law_journal/vol37/iss2/3 This Article is brought to you for free and open access by the Law Journals at UC Hastings Scholarship Repository. It has been accepted for inclusion in Hastings Communications and Entertainment Law Journal by an authorized editor of UC Hastings Scholarship Repository. For more information, please contact [email protected]. The Internet Is a Packet-Switched Network by KENDALL KONING* I. Introduction .................................. ..... 273 II. Packet-Switched Networks Are Telecommunications Services ......... 276 A. Computer II and The Basic Packet-Switching Service ................. 277 B. Computer III and Basic Protocol Processing .............. 280 1. Operation of the Network Itself ................ .... ............ 281 2. Evolution of Public Networks ..................... 281 3. Internetworking. ............................... 282 C. The Classification of Frame Relay.......... ............. 284 D. The Computer Inquiries and the 1996 Act ........... ..... 285 III. The Internet Is a Packet Switched Network ........... ....... 286 A. Protocol Processing in Internet Protocol Networks ..... ..... 287 B. The Internet Transmits User Data Unmodified ........ ........ 291 C. Intercepting Proxy Caches and Content Delivery Networks.........293 IV. The Information Service Classification Is Anachronistic ................... 295 A. From Online Services to Internet Service Providers .... ..... 296 B. The Information Services Classification and Overlay Networks ..297 C.
    [Show full text]
  • Independent Submission B. Carpenter Request for Comments: 6214 Univ
    Independent Submission B. Carpenter Request for Comments: 6214 Univ. of Auckland Category: Informational R. Hinden ISSN: 2070-1721 Check Point Software 1 April 2011 Adaptation of RFC 1149 for IPv6 Abstract This document specifies a method for transmission of IPv6 datagrams over the same medium as specified for IPv4 datagrams in RFC 1149. Status of This Memo This document is not an Internet Standards Track specification; it is published for informational purposes. This is a contribution to the RFC Series, independently of any other RFC stream. The RFC Editor has chosen to publish this document at its discretion and makes no statement about its value for implementation or deployment. Documents approved for publication by the RFC Editor are not a candidate for any level of Internet Standard; see Section 2 of RFC 5741. Information about the current status of this document, any errata, and how to provide feedback on it may be obtained at http://www.rfc-editor.org/info/rfc6214. Copyright Notice Copyright (c) 2011 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Carpenter & Hinden Informational [Page 1] RFC 6214 IPv6 and RFC 1149 1 April 2011 Table of Contents 1. Introduction . 2 2. Normative Notation . 2 3. Detailed Specification . 2 3.1.
    [Show full text]
  • Tecnología, Sociedad E Internet : Hacia Una Comprensión Crítica De La Tecnología, Las Tecnologías Digitales Y Su Cambio
    Correa Lucero, Horacio Tecnología, sociedad e internet : hacia una comprensión crítica de la tecnología, las tecnologías digitales y su cambio. Un estudio de las tensiones en torno a la mercantilización en Internet. Esta obra está bajo una Licencia Creative Commons Argentina. Reconocimiento - Compartir Igual 2.5 https://creativecommons.org/licenses/by-sa/2.5/ar/ Documento descargado de RIDAA-UNQ Repositorio Institucional Digital de Acceso Abierto de la Universidad Nacional de Quilmes de la Universidad Nacional de Quilmes Cita recomendada: Correa Lucero, H. (2019). Tecnología, sociedad e internet : hacia una comprensión crítica de la tecnología, las tecnologías digitales y su cambio. Un estudio de las tensiones en torno a la mercantilización en Internet. (Tesis de posgrado). Bernal, Argentina : Universidad Nacional de Quilmes. Disponible en RIDAA-UNQ Repositorio Institucional Digital de Acceso Abierto de la Universidad Nacional de Quilmes http://ridaa.unq.edu.ar/handle/20.500.11807/1042 Puede encontrar éste y otros documentos en: https://ridaa.unq.edu.ar Correa Lucero, Horacio, Repositorio Institucional Digital de Acceso Abierto, Febrero de 2015, 314 pp., http://ridaa.unq.edu.ar, Universidad Nacional de Quilmes, Secretaría de Posgrado, Doctorado en Ciencias Sociales y Humanas Tecnología, sociedad e internet. Hacia una comprensión crítica de la tecnología, las tecnologías digitales y su cambio. Un estudio de las tensiones en torno a la mercantilización en Internet. TESIS DOCTORAL Horacio Correa Lucero [email protected] Resumen El trabajo desarrolla una perspectiva de análisis de Internet a partir de una propuesta teórica que comprenda a las tecnologías en general, y a las tecnologías digitales en particular. En concreto, entonces, puede decirse que la tesis presenta dos nudos interrelacionados.
    [Show full text]
  • Anexo A. RFC´S
    Gerardo L. Ahuatzin Sánchez – “Desarrollo de un esquema de traducción de direcciones IPv6-IPv4-IPv6” Anexo A. RFC´s A.1.- Desarrollo de políticas de seguridad en las computadoras RFC 1281 Guidelines for the Secure Operation of the Internet RFC 1457 Security Label Framework for the Internet RFC 2196 Site Security Handbook RFC 2323 IETF Identification and Security Guidelines RFC 2411 IP Security Document Roadmap A.2.- Diseño y administración de redes RFC 817 MODULARITY AND EFFICIENCY IN PROTOCOL IMPLEMENTATION Use of the Internet as a Subnetwork for Experimentation with the OSI Network RFC 1070 Layer A Measurement Study of Changes in Service-Level Reachability in the Global RFC 1273 TCP/IP Internet: RFC 1627 Network 10 Considered Harmful (Some Practices Shouldn't be Codified) IAB Recommendations for the Development of Internet Network Management RFC 1052 Standards RFC 1065 Structure and Identification of Management Information for TCP/IP-based internets RFC 1366 Guidelines for Management of IP Address Space RFC 1466 Guidelines for Management of IP Address Space RFC 1631 The IP Network Address Translator (NAT) RFC 1715 The H Ratio for Address Assignment Efficiency RFC 1881 IPv6 Address Allocation Management RFC 1916 Enterprise Renumbering: Experience and Information Solicitation RFC 1933 Transition Mechanisms for IPv6 Hosts and Routers RFC 1958 Architectural Principles of the Internet RFC 2063 Traffic Flow Measurement: Architecture RFC 2064 Traffic Flow Measurement: Meter MIB 119 Gerardo L. Ahuatzin Sánchez – “Desarrollo de un esquema de
    [Show full text]
  • An Introduction to Computer Networks Stanford Univ CS144 Fall 2012
    An Introduction to Computer Networks Stanford Univ CS144 Fall 2012 PDF generated using the open source mwlib toolkit. See http://code.pediapress.com/ for more information. PDF generated at: Tue, 09 Oct 2012 17:42:20 UTC Contents Articles --WEEK ONE-- 1 Introduction 2 Internet 2 What the Internet is 20 Internet protocol suite 20 OSI model 31 Internet Protocol 39 Transmission Control Protocol 42 User Datagram Protocol 59 Internet Control Message Protocol 65 Hypertext Transfer Protocol 68 Skype protocol 75 BitTorrent 81 Architectural Principles 95 Encapsulation (networking) 95 Packet switching 96 Hostname 100 End-to-end principle 102 Finite-state machine 107 --END WEEK ONE-- 118 References Article Sources and Contributors 119 Image Sources, Licenses and Contributors 124 Article Licenses License 125 1 --WEEK ONE-- 2 Introduction Internet Routing paths through a portion of the Internet as visualized by the Opte Project General Access · Censorship · Democracy Digital divide · Digital rights Freedom · History · Network neutrality Phenomenon · Pioneers · Privacy Sociology · Usage Internet governance Internet Corporation for Assigned Names and Numbers (ICANN) Internet Engineering Task Force (IETF) Internet Governance Forum (IGF) Internet Society (ISOC) Protocols and infrastructure Domain Name System (DNS) Hypertext Transfer Protocol (HTTP) IP address Internet exchange point Internet Protocol (IP) Internet Protocol Suite (TCP/IP) Internet service provider (ISP) Simple Mail Transfer Protocol (SMTP) Services Blogs · Microblogs · E-mail Fax · File sharing · File transfer Instant messaging · Gaming Podcast · TV · Search Shopping · Voice over IP (VoIP) Internet 3 World Wide Web Guides Outline Internet portal The Internet is a global system of interconnected computer networks that use the standard Internet protocol suite (often called TCP/IP, although not all applications use TCP) to serve billions of users worldwide.
    [Show full text]