Tìm kiếm tài liệu miễn phí

Trang 2 - Quản trị mạng (13.303)

Lecture Wireless and mobile computing – Chapter 12: Protocols and the TCP/IP suite

The following will be discussed in this chapter: Requirement of protocol, why layered approach is adopted, key features of a protocol, simple protocol architecture, addressing, TCP/IP and OSI model, general networking terminology.


Lecture Wireless and mobile computing – Chapter 3: Wireless and mobile computing transmission fundamentals

Chapter 3: Wireless and mobile computing transmission fundamentals. The following will be discussed in this chapter: Signals for conveying information, analog and digital data transmission, channel capacity.


Lecture Wireless and mobile computing – Chapter 27: Wireless and mobile computing simulations

Chapter 27 - Wireless and mobile computing simulations. The following will be discussed in this chapter: What is ns-2? Getting ns? How to use ns-2? Adding your own stuff? Documentation, bug-fixing, fundamentals of discrete event simulation, ns-2 simulation.


Lecture Wireless and mobile computing – Capter 28: Cellular wireless networks

The following will be discussed in this chapter: Principles of cellular networks, cellular geometries, frequency reuse, increasing capacity, macrocell and microcell, operation of cellular system, call stages, design factors, impairments, ist generation cellular networks, 2nd generation cellular networks.


Lecture Wireless and mobile computing – Chapter 13: Protocols and protocol suit review

Lecture Wireless and mobile computing – Chapter 13: Protocols and protocol suit review. The following will be discussed in this chapter: Network access layer, transport layer, protocols, protocol data unit, protocol architecture, TCP/IP stack, layered approach and its advantages, router.


Lecture Wireless and mobile computing – Chapter 14: Protocols and protocol suit review

Lecture Wireless and mobile computing – Chapter 14: Protocols and protocol suit review. The following will be discussed in this chapter: Network access layer, transport layer, protocols, protocol data unit, protocol architecture, TCP/IP stack, layered approach and its advantages, router.


Lecture Wireless and mobile computing – Chapter 2: Wireless and mobile computing transmission fundamentals

Lecture 2 - Wireless and mobile computing transmission fundamentals. The following will be discussed in this chapter: Transmission fundamentals, signals for conveying information, time domain concepts, frequency domain concepts, frequency/time domain,...


Lecture Wireless and mobile computing – Chapter 23: Coding and error control

The following will be discussed in this chapter: Digital communication system, channel coding, types of error control, why use error-correction coding, types of channel coding, requirement of CC and EC, channel En-De/Coding for wireless communication,...


Lecture Wireless and mobile computing – Chapter 26: Satellite communications

The following will be discussed in this chapter: Parabolic reflective antenna, antenna gain, signal loss in satellite communication, noise types, refraction, fading, diffraction and scattering, fast and slow fading, flat and selective fading, diversity techniques.


Lecture Wireless and mobile computing – Chapter 18: Signal encoding techniques

The following will be discussed in this chapter: Where we stand on layers, data representation and signaling used, data encoding, reasons for choosing encoding schemes, factors involved, digital data to analog signal (ASK, FSK, PSK), analog data to digital signal.


Lecture Computer communications & networks: Chapter introdu ce - Forouzan

In this chapter, you will learn about network models, data & signals, digital transmission, transmission media, error detection & correction, data link control, wired LANs – ethernet, wireless LANs, network layer - logical addressing, internet protocols, network layer - delivery, forwarding, and routing, transport layer, switching & vlans, application layer.


Lecture Computer communications & networks: Chapter 31 - Forouzan

Chapter 31 - Network security. Network security can provide five services. Four of these services are related to the message exchanged using the network. The fifth service provides entity authentication or identification.


Lecture Computer communications & networks: Chapter 3 - Forouzan

One of the major functions of the physical layer is to move data in the form of electromagnetic signals across a transmission medium. Whether you are collecting numerical statistics from another computer, sending animated pictures from a design workstation, or causing a bell to ring at a distant control center, you are working with the transmission of data across network connections. Chapter 3 discusses the relationship between data, which are created by a device, and electromagnetic signals, which are transmitted over a medium.


Lecture Computer communications & networks: Chapter 4 - Forouzan

A computer network is designed to send information from one point to another. This information needs to be converted to either a digital signal or an analog signal for transmission. In this chapter, we discuss the first choice, conversion to digital signals.


Lecture Computer communications & networks: Chapter 29 - Forouzan

Chapter 29 discusses multimedia and a set of wiely-used application programs. These programs have generated new issues such as the need for new protocols in other layers to handle the specific problems related to multimedia. We briefly discuss these issues in this chapter.


Lecture Computer communications & networks: Chapter 10 - Forouzan

After explaining some ideas about data and signals and how we can use them efficiently, we discuss the characteristics of transmission media, both guided and unguided, in this chapter. Although transmission media operates under the physical layer, they are controlled by the physical layer.


Lecture Wireless and mobile computing – Chapter 20: Signal encodin techniques

The following will be discussed in this chapter: Differential encoding, modem functions, digital vs analog (advantages of digital over analog), binary amplitude shift keying (limitations), NRZ-L, QPSK Vs.OQPSK, QAM.


Lecture Wireless and mobile computing – Chapter 21: Spread spectrum

The following will be discussed in this chapter: Spread spectrum intro, spread spectrum model, pseudorandom sequences, pn sequence generator, frequency hopping spread spectrum, direct sequence spread spectrum, processing gain, DSSS using BPSK.


Lecture Wireless and mobile computing – Chapter 25: Coding and error control (Review/Recap)

Chapter 25 - Coding and error control (Review/Recap). The following will be discussed in this chapter: CRC Algorithms, ECC, block ECC, convolutional code, turbo codes (block +convolutional), ns2 intro and installation.


Lecture Wireless and mobile computing – Chapter 4: Transmission media

The following will be discussed in this chapter: Transmission media, transmission media classification, transmission media characteristics and design specifications, guided and unguided media, wireless transmission frequencies, antennas, wireless propagation.


Lecture Wireless and mobile computing – Chapter 1: Introduce

The following will be discussed in this chapter: What is wireless communication? Types of wireless communication, multiservice point-to-multipoint wireless network, electromagnetic radiation spectrum, wavelength of some technologies, types of electromagnetic carriers,...


Lecture Wireless and mobile computing – Chapter 22: Spread spectrum (Review/Recap)

The following will be discussed in this chapter: Relationship between bandwidth of a signal (before and after and encoding SS), benefits of SS, FHSS, slow and fast FHSS, DSSS, relationship between bit rate of a signal (before and after DSSS encoding), CDMA.


Lecture Wireless and mobile computing – Chapter 11: Communication networks

The following will be discussed in this chapter: LANs WANs differentiation, path reliability, circuit switching driven example network, circuit switching routing types, semi-permanent connection type, isdn review question, datagram and virtual circuit operational differentiation, limitations of circuit switching for data transmission, virtual channel and virtual path difference.


Lecture Computer communications & networks: Chapter 26 - Forouzan

Chapter 26 - Remote logging, electronic mail, and file transfer. Chapter 26 discusses three common applications in the Internet: remote login, electronic mail, and file transfer. A remote login application allows the user to remotely access the resources of a system. An electronic mail application simulates the tasks ofsnail mail at a much higher speed. A file transfer application transfers files between remote systems.


Lecture Computer communications & networks: Chapter 27 - Forouzan

The World Wide Web (WWW) is a repository of information linked together from points all over the world. The WWW has a unique combination of flexibility, portability, and user-friendly features that distinguish it from other services provided by the Internet. Chapter 27 discuss the ideas and issues in the famous world wide web (WWW). It also briefly describes the client/server application program (HTTP) that is commonly used to access the web.


Lecture Computer communications & networks: Chapter 28 - Forouzan

Chapter 28 - Network management: SNMP. Chapter 28 is devoted to network management. We first discuss the general idea behind network management. We then introduce the client/server application, SNMP, that is used for this purpose in the Internet. Although network management can be implemented in every layer, the Internet has decided to use a client/server application.


Lecture Computer communications & networks: Chapter 12 - Forouzan

Although the previous chapters in this part are issues related to the physical layer or transmission media, Chapter 8 discusses switching, a topic that can be related to several layers. We have included this topic in this part of the book to avoid repeating the discussion for each layer.


Lecture Computer communications & networks: Chapter 13 - Forouzan

This chapter devoted to access control, the duties of the data link layer that are related to the use of the physical layer. The main contents of this chapter include all of the following: Random access, controlled access, channelization.


Lecture Computer communications & networks: Chapter 0 - Forouzan

In this lecture, students will be able to understand: introduction, network models, data & signals, digital transmission, transmission media, error detection & correction, data link control, wired LANs – ethernet, wireless LANs, network layer - logical addressing, internet protocols, network layer - delivery, forwarding, and routing, transport layer, switching & vlans, application layer.


Lecture Computer communications & networks: Chapter 2 - Forouzan

The two dominant networking models are the Open Systems Interconnection (OSI) and the Internet model (TCP/IP).The first is a theoretical framework; the second is the actual model used in today's data communications. In Chapter 2, we first discuss the OSI model to give a general background. We then concentrate on the Internet model, which is the foundation for the rest of the lecture.


Tài liệu mới download

Từ khóa được quan tâm

Có thể bạn quan tâm

Cisco Systems - Configuring a Router
  • 25/01/2013
  • 92.012
  • 780
Cracking part 54
  • 14/09/2010
  • 60.886
  • 274

Bộ sưu tập

Danh mục tài liệu