Introduction to Wans
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Life Cycle of Municipal Wi-Fi
A Service of Leibniz-Informationszentrum econstor Wirtschaft Leibniz Information Centre Make Your Publications Visible. zbw for Economics Tseng, Chien-Kai; Huang, Kuang-Chiu Conference Paper Life Cycle of Municipal Wi-Fi 14th Asia-Pacific Regional Conference of the International Telecommunications Society (ITS): "Mapping ICT into Transformation for the Next Information Society", Kyoto, Japan, 24th-27th June, 2017 Provided in Cooperation with: International Telecommunications Society (ITS) Suggested Citation: Tseng, Chien-Kai; Huang, Kuang-Chiu (2017) : Life Cycle of Municipal Wi- Fi, 14th Asia-Pacific Regional Conference of the International Telecommunications Society (ITS): "Mapping ICT into Transformation for the Next Information Society", Kyoto, Japan, 24th-27th June, 2017, International Telecommunications Society (ITS), Calgary This Version is available at: http://hdl.handle.net/10419/168493 Standard-Nutzungsbedingungen: Terms of use: Die Dokumente auf EconStor dürfen zu eigenen wissenschaftlichen Documents in EconStor may be saved and copied for your Zwecken und zum Privatgebrauch gespeichert und kopiert werden. personal and scholarly purposes. Sie dürfen die Dokumente nicht für öffentliche oder kommerzielle You are not to copy documents for public or commercial Zwecke vervielfältigen, öffentlich ausstellen, öffentlich zugänglich purposes, to exhibit the documents publicly, to make them machen, vertreiben oder anderweitig nutzen. publicly available on the internet, or to distribute or otherwise use the documents in public. Sofern die Verfasser die Dokumente unter Open-Content-Lizenzen (insbesondere CC-Lizenzen) zur Verfügung gestellt haben sollten, If the documents have been made available under an Open gelten abweichend von diesen Nutzungsbedingungen die in der dort Content Licence (especially Creative Commons Licences), you genannten Lizenz gewährten Nutzungsrechte. may exercise further usage rights as specified in the indicated licence. -
Lecture 10: Switching & Internetworking
Lecture 10: Switching & Internetworking CSE 123: Computer Networks Alex C. Snoeren HW 2 due WEDNESDAY Lecture 10 Overview ● Bridging & switching ◆ Spanning Tree ● Internet Protocol ◆ Service model ◆ Packet format CSE 123 – Lecture 10: Internetworking 2 Selective Forwarding ● Only rebroadcast a frame to the LAN where its destination resides ◆ If A sends packet to X, then bridge must forward frame ◆ If A sends packet to B, then bridge shouldn’t LAN 1 LAN 2 A W B X bridge C Y D Z CSE 123 – Lecture 9: Bridging & Switching 3 Forwarding Tables ● Need to know “destination” of frame ◆ Destination address in frame header (48bit in Ethernet) ● Need know which destinations are on which LANs ◆ One approach: statically configured by hand » Table, mapping address to output port (i.e. LAN) ◆ But we’d prefer something automatic and dynamic… ● Simple algorithm: Receive frame f on port q Lookup f.dest for output port /* know where to send it? */ If f.dest found then if output port is q then drop /* already delivered */ else forward f on output port; else flood f; /* forward on all ports but the one where frame arrived*/ CSE 123 – Lecture 9: Bridging & Switching 4 Learning Bridges ● Eliminate manual configuration by learning which addresses are on which LANs Host Port A 1 ● Basic approach B 1 ◆ If a frame arrives on a port, then associate its source C 1 address with that port D 1 ◆ As each host transmits, the table becomes accurate W 2 X 2 ● What if a node moves? Table aging Y 3 ◆ Associate a timestamp with each table entry Z 2 ◆ Refresh timestamp for each -
Lab Report: 2.1.3 Connect to an Ethernet Network
Lab Report: 2.1.3 Connect to an Ethernet Network Performance Your Score: 0 of 2 (0%) Elapsed Time: 9 seconds Task Summary Actions you were required to perform: In In Office 1, connect the twisted pair cable between the workstation and the wall plate In In Office 1, confirm that the workstation has a connection to the local network and the Internet Explanation To complete this lab, use twisted pair cable with RJ45 connectors to connect to a wired Ethernet network. RJ45 connectors have eight wires (as seen below) and are larger than RJ11 connectors. Complete the following steps: 1. Under Office 1, select Hardware to go to the workstation. 2. Above the computer, select Back to switch to the back view of the computer. 3. On the Shelf, expand the Cables category. 4. Select the RJ45 cable. 5. In the Selected Component window, drag and drop the connector to the Ethernet port on the computer. 6. In the Selected Component window, drag the other connector to the Ethernet port on the wall outlet. 7. Select Click to view Windows 10 on the monitor to confirm that the workstation has a connection to the local network and the internet. 8. In the notification area, right-click the Network icon and select Open Network and Sharing Center. The diagram should indicate an active connection to the network and the internet. Lab Report: 2.2.3 Connect a Cable Modem Performance Your Score: 0 of 4 (0%) Elapsed Time: 6 seconds Task Summary Actions you were required to perform: In Connect the cable modem to the Internet using the RG-6 cable In Connect the computer to the cable modem using the Ethernet cable In Plug in the cable modem In Confirm that the computer is properly connected to the Internet Explanation In this lab, your task is to complete the following: Connect the components to make the internet connection. -
Wifi Direct Internetworking
WiFi Direct Internetworking António Teólo∗† Hervé Paulino João M. Lourenço ADEETC, Instituto Superior de NOVA LINCS, DI, NOVA LINCS, DI, Engenharia de Lisboa, Faculdade de Ciências e Tecnologia, Faculdade de Ciências e Tecnologia, Instituto Politécnico de Lisboa Universidade NOVA de Lisboa Universidade NOVA de Lisboa Portugal Portugal Portugal [email protected] [email protected] [email protected] ABSTRACT will enable WiFi communication range and speed even in cases of: We propose to interconnect mobile devices using WiFi-Direct. Hav- network infrastructure congestion, which may happen in highly ing that, it will be possible to interconnect multiple o-the-shelf crowded venues (such as sports and cultural events); or temporary, mobile devices, via WiFi, but without any supportive infrastructure. or permanent, absence of infrastructure, as may happen in remote This will pave the way for mobile autonomous collaborative sys- locations or disaster situations. tems that can operate in any conditions, like in disaster situations, WFD allows devices to form groups, with one of them, called in very crowded scenarios or in isolated areas. This work is relevant Group Owner (GO), acting as a soft access point for remaining since the WiFi-Direct specication, that works on groups of devices, group members. WFD oers node discovery, authentication, group does not tackle inter-group communication and existing research formation and message routing between nodes in the same group. solutions have strong limitations. However, WFD communication is very constrained, current imple- We have a two phase work plan. Our rst goal is to achieve mentations restrict group size 9 devices and none of these devices inter-group communication, i.e., enable the ecient interconnec- may be a member of more than one WFD group. -
Leased-Line Replacement
Leased-Line REPLACEMENT Utilizing gigabit wireless links to provide fiber-like performance at significant savings compared to leased lines. WHITE PAPER Leased-Line Replacement T1 (1.5 Mbps) line is not enough capacity to handle the need, four T1s When considering high-bandwidth connections between locations, the are ordered from the telco at a monthly rate of $500 each ($2,000 per thinking used to be that the only way to get service was to pick up the month). This twelve month commitment also requires a startup fee of phone, call the Local Exchange Carrier (LEC) and order a circuit. As long $1,000 to cover equipment and provisioning of the circuits. This amounts as the startup costs and monthly recurring charges were within the IT to $25,000 for the one year lease to provide a 6 Mbps connection budget, and the IT manager and business administrators were content between the corporate headquarters and the satellite office. with the level of service provided, writing a monthly check to the LEC was not a problem. If troubles were encountered with the service, a In the second scenario, a DS3 leased line is used to connect a school’s phone call to the provider was all that was necessary to resolve the LAN to the district office backbone three miles away. Services such as problem. voice, data, Internet access, and classroom video are transported over the circuit. To establish service, the local carrier requires a startup fee Businesses relying on leased lines find a wide range of performance of $3,000 that covers the cost of edge devices, as well as installation options tailored to suit their needs, from T1/E1 (1.5/2 Mbps), multiple and commissioning. -
The Internet in Transition: the State of the Transition to Ipv6 in Today's
Please cite this paper as: OECD (2014-04-03), “The Internet in Transition: The State of the Transition to IPv6 in Today's Internet and Measures to Support the Continued Use of IPv4”, OECD Digital Economy Papers, No. 234, OECD Publishing, Paris. http://dx.doi.org/10.1787/5jz5sq5d7cq2-en OECD Digital Economy Papers No. 234 The Internet in Transition: The State of the Transition to IPv6 in Today's Internet and Measures to Support the Continued Use of IPv4 OECD FOREWORD This report was presented to the OECD Working Party on Communication, Infrastructures and Services Policy (CISP) in June 2013. The Committee for Information, Computer and Communications Policy (ICCP) approved this report in December 2013 and recommended that it be made available to the general public. It was prepared by Geoff Huston, Chief Scientist at the Asia Pacific Network Information Centre (APNIC). The report is published on the responsibility of the Secretary-General of the OECD. Note to Delegations: This document is also available on OLIS under reference code: DSTI/ICCP/CISP(2012)8/FINAL © OECD 2014 THE INTERNET IN TRANSITION: THE STATE OF THE TRANSITION TO IPV6 IN TODAY'S INTERNET AND MEASURES TO SUPPORT THE CONTINUED USE OF IPV4 TABLE OF CONTENTS FOREWORD ................................................................................................................................................... 2 THE INTERNET IN TRANSITION: THE STATE OF THE TRANSITION TO IPV6 IN TODAY'S INTERNET AND MEASURES TO SUPPORT THE CONTINUED USE OF IPV4 .......................... 4 -
Guidelines on Mobile Device Forensics
NIST Special Publication 800-101 Revision 1 Guidelines on Mobile Device Forensics Rick Ayers Sam Brothers Wayne Jansen http://dx.doi.org/10.6028/NIST.SP.800-101r1 NIST Special Publication 800-101 Revision 1 Guidelines on Mobile Device Forensics Rick Ayers Software and Systems Division Information Technology Laboratory Sam Brothers U.S. Customs and Border Protection Department of Homeland Security Springfield, VA Wayne Jansen Booz-Allen-Hamilton McLean, VA http://dx.doi.org/10.6028/NIST.SP. 800-101r1 May 2014 U.S. Department of Commerce Penny Pritzker, Secretary National Institute of Standards and Technology Patrick D. Gallagher, Under Secretary of Commerce for Standards and Technology and Director Authority This publication has been developed by NIST in accordance with its statutory responsibilities under the Federal Information Security Management Act of 2002 (FISMA), 44 U.S.C. § 3541 et seq., Public Law (P.L.) 107-347. NIST is responsible for developing information security standards and guidelines, including minimum requirements for Federal information systems, but such standards and guidelines shall not apply to national security systems without the express approval of appropriate Federal officials exercising policy authority over such systems. This guideline is consistent with the requirements of the Office of Management and Budget (OMB) Circular A-130, Section 8b(3), Securing Agency Information Systems, as analyzed in Circular A- 130, Appendix IV: Analysis of Key Sections. Supplemental information is provided in Circular A- 130, Appendix III, Security of Federal Automated Information Resources. Nothing in this publication should be taken to contradict the standards and guidelines made mandatory and binding on Federal agencies by the Secretary of Commerce under statutory authority. -
Research on the System Structure of IPV9 Based on TCP/IP/M
International Journal of Advanced Network, Monitoring and Controls Volume 04, No.03, 2019 Research on the System Structure of IPV9 Based on TCP/IP/M Wang Jianguo Xie Jianping 1. State and Provincial Joint Engineering Lab. of 1. Chinese Decimal Network Working Group Advanced Network, Monitoring and Control Shanghai, China 2. Xi'an, China Shanghai Decimal System Network Information 2. School of Computer Science and Engineering Technology Ltd. Xi'an Technological University e-mail: [email protected] Xi'an, China e-mail: [email protected] Wang Zhongsheng Zhong Wei 1. School of Computer Science and Engineering 1. Chinese Decimal Network Working Group Xi'an Technological University Shanghai, China Xi'an, China 2. Shanghai Decimal System Network Information 2. State and Provincial Joint Engineering Lab. of Technology Ltd. Advanced Network, Monitoring and Control e-mail: [email protected] Xi'an, China e-mail: [email protected] Abstract—Network system structure is the basis of network theory, which requires the establishment of a link before data communication. The design of network model can change the transmission and the withdrawal of the link after the network structure from the root, solve the deficiency of the transmission is completed. It solves the problem of original network system, and meet the new demand of the high-quality real-time media communication caused by the future network. TCP/IP as the core network technology is integration of three networks (communication network, successful, it has shortcomings but is a reasonable existence, broadcasting network and Internet) from the underlying will continue to play a role. Considering the compatibility with structure of the network, realizes the long-distance and the original network, the new network model needs to be large-traffic data transmission of the future network, and lays compatible with the existing TCP/IP four-layer model, at the a solid foundation for the digital currency and virtual same time; it can provide a better technical system to currency of the Internet. -
Iot Systems Overview
IoT systems overview CoE Training on Traffic engineering and advanced wireless network planning Sami TABBANE 30 September -03 October 2019 Bangkok, Thailand 1 Objectives •Present the different IoT systems and their classifications 2 Summary I. Introduction II. IoT Technologies A. Fixed & Short Range B. Long Range technologies 1. Non 3GPP Standards (LPWAN) 2. 3GPP Standards IoT Specificities versus Cellular IoT communications are or should be: Low cost , Low power , Long battery duration , High number of connections , Low bitrate , Long range , Low processing capacity , Low storage capacity , Small size devices , Relaxed latency , Simple network architecture and protocols . IoT Main Characteristics Low power , Low cost (network and end devices), Short range (first type of technologies) or Long range (second type of technologies), Low bit rate (≠ broadband!), Long battery duration (years), Located in any area (deep indoor, desert, urban areas, moving vehicles …) Low cost 3GPP Rel.8 Cost 75% 3GPP Rel.8 CAT-4 20% 3GPP Rel.13 CAT-1 10% 3GPP Rel.13 CAT-M1 NB IoT Complexity Extended coverage +20dB +15 dB GPRS CAT-M1 NB-IoT IoT Specificities IoT Specificities and Impacts on Network planning and design Characteristics Impact • High sensitivity (Gateways and end-devices with a typical sensitivity around -150 dBm/-125 dBm with Bluetooth/-95 dBm in 2G/3G/4G) Low power and • Low frequencies strong signal penetration Wide Range • Narrow band carriers far greater range of reception • +14 dBm (ETSI in Europe) with the exception of the G3 band with +27 dBm, +30 dBm but for most devices +20 dBm is sufficient (USA) • Low gateways cost Low deployment • Wide range Extended coverage + strong signal penetration and Operational (deep indoor, Rural) Costs • Low numbers of gateways Link budget: UL: 155 dB (or better), DL: Link budget: 153 dB (or better) • Low Power Long Battery life • Idle mode most of the time. -
Empirical Analysis of the Effects and the Mitigation of Ipv4 Address Exhaustion
TECHNISCHE UNIVERSITÄT BERLIN FAKULTÄT FÜR ELEKTROTECHNIK UND INFORMATIK LEHRSTUHL FÜR INTELLIGENTE NETZE UND MANAGEMENT VERTEILTER SYSTEME Empirical Analysis of the Effects and the Mitigation of IPv4 Address Exhaustion vorgelegt von M.Sc. Philipp Richter geboren in Berlin von der Fakultät IV – Elektrotechnik und Informatik der Technischen Universität Berlin zur Erlangung des akademischen Grades DOKTOR DER NATURWISSENSCHAFTEN -DR. RER. NAT.- genehmigte Dissertation Promotionsausschuss: Vorsitzender: Prof. Dr.-Ing. Sebastian Möller, Technische Universität Berlin Gutachterin: Prof. Anja Feldmann, Ph.D., Technische Universität Berlin Gutachter: Prof. Vern Paxson, Ph.D., University of California, Berkeley Gutachter: Prof. Steve Uhlig, Ph.D., Queen Mary University of London Tag der wissenschaftlichen Aussprache: 2. August 2017 Berlin 2017 Abstract IP addresses are essential resources for communication over the Internet. In IP version 4, an address is represented by 32 bits in the IPv4 header; hence there is a finite pool of roughly 4B addresses available. The Internet now faces a fundamental resource scarcity problem: The exhaustion of the available IPv4 address space. In 2011, the Internet Assigned Numbers Authority (IANA) depleted its pool of available IPv4 addresses. IPv4 scarcity is now reality. In the subsequent years, IPv4 address scarcity has started to put substantial economic pressure on the networks that form the Internet. The pools of available IPv4 addresses are mostly depleted and today network operators have to find new ways to satisfy their ongoing demand for IPv4 addresses. Mitigating IPv4 scarcity is not optional, but mandatory: Networks facing address shortage have to take action in order to be able to accommodate additional subscribers and customers. Thus, if not confronted, IPv4 scarcity has the potential to hinder further growth of the Internet. -
Digital Subscriber Lines and Cable Modems Digital Subscriber Lines and Cable Modems
Digital Subscriber Lines and Cable Modems Digital Subscriber Lines and Cable Modems Paul Sabatino, [email protected] This paper details the impact of new advances in residential broadband networking, including ADSL, HDSL, VDSL, RADSL, cable modems. History as well as future trends of these technologies are also addressed. OtherReports on Recent Advances in Networking Back to Raj Jain's Home Page Table of Contents ● 1. Introduction ● 2. DSL Technologies ❍ 2.1 ADSL ■ 2.1.1 Competing Standards ■ 2.1.2 Trends ❍ 2.2 HDSL ❍ 2.3 SDSL ❍ 2.4 VDSL ❍ 2.5 RADSL ❍ 2.6 DSL Comparison Chart ● 3. Cable Modems ❍ 3.1 IEEE 802.14 ❍ 3.2 Model of Operation ● 4. Future Trends ❍ 4.1 Current Trials ● 5. Summary ● 6. Glossary ● 7. References http://www.cis.ohio-state.edu/~jain/cis788-97/rbb/index.htm (1 of 14) [2/7/2000 10:59:54 AM] Digital Subscriber Lines and Cable Modems 1. Introduction The widespread use of the Internet and especially the World Wide Web have opened up a need for high bandwidth network services that can be brought directly to subscriber's homes. These services would provide the needed bandwidth to surf the web at lightning fast speeds and allow new technologies such as video conferencing and video on demand. Currently, Digital Subscriber Line (DSL) and Cable modem technologies look to be the most cost effective and practical methods of delivering broadband network services to the masses. <-- Back to Table of Contents 2. DSL Technologies Digital Subscriber Line A Digital Subscriber Line makes use of the current copper infrastructure to supply broadband services. -
From Forgotten Intranet to Successful Wiki
Library Faculty Publications Library Faculty/Staff Scholarship & Research 11-5-2010 From forgotten intranet to successful wiki Darcy C. Del Bosque University of Nevada, Las Vegas, [email protected] Kristen Costello University of Nevada, Las Vegas, [email protected] Follow this and additional works at: https://digitalscholarship.unlv.edu/lib_articles Part of the Library and Information Science Commons, Organizational Communication Commons, and the Work, Economy and Organizations Commons Repository Citation Del Bosque, D. C., Costello, K. (2010). From forgotten intranet to successful wiki. Brick and Click Libraries: Proceedings of an Academic Library Symposium 77-82. Northwest Missouri State University. https://digitalscholarship.unlv.edu/lib_articles/48 This Conference Proceeding is protected by copyright and/or related rights. It has been brought to you by Digital Scholarship@UNLV with permission from the rights-holder(s). You are free to use this Conference Proceeding in any way that is permitted by the copyright and related rights legislation that applies to your use. For other uses you need to obtain permission from the rights-holder(s) directly, unless additional rights are indicated by a Creative Commons license in the record and/or on the work itself. This Conference Proceeding has been accepted for inclusion in Library Faculty Publications by an authorized administrator of Digital Scholarship@UNLV. For more information, please contact [email protected]. From Forgotten Intranet to Successful Wiki: Best Practices for Implementing an Academic Library Staff Wiki Kristen Costello Systems Librarian University of Nevada, Las Vegas Darcy Del Bosque Emerging Technologies Librarian University of Nevada, Las Vegas Abstract Communication within an academic library can be challenging.