CMM Based Software Quality Management

Size: px
Start display at page:

Download "CMM Based Software Quality Management"

Transcription

1 第 18 章网际互联协议 南京大学计算机系 黄皓教授 2007 年 9 月 21 日星期五 2007 年 9 月 25 日星期二 1

2 Reference TCP/IP Tutorial and Technical Overview, ibm.com/redbooks 南京大学计算机系讲义 2

3 Contents 协议的基本功能 网络层提供的服务 IP 协议 IP ICMP ARP RARP DHCP 路由算法 路由协议 IGMP RIP EGP BGP OSPF 拥塞控制 服务质量 南京大学计算机系讲义 3

4 18.1 Protocol Functions Small set of functions that form basis of all protocols Not all protocols have all functions Reduce duplication of effort May have same type of function in protocols at different levels 南京大学计算机系讲义 4

5 18.1 Protocol Functions (1) Encapsulation (2) Fragmentation and reassembly (3) Connection control (4) Ordered delivery (5) Flow control (6) Error control (7) Addressing (8) Multiplexing (9) Transmission services 南京大学计算机系讲义 5

6 (1) Encapsulation Data usually transferred in blocks Protocol data units (PDUs) Each PDU contains data and control information Some PDUs only control 南京大学计算机系讲义 6

7 (1) Encapsulation Three categories of control Address Of sender and/or receiver Error-detecting code E.g. frame check sequence Protocol control Additional information to implement protocol functions 南京大学计算机系讲义 7

8 (1) Encapsulation Addition of control information to data is encapsulation Data accepted or generated by entity and encapsulated into PDU Containing data plus control information e.g. TFTP, HDLC, frame relay, ATM, AAL5, LLC, IEEE 802.3, IEEE 南京大学计算机系讲义 8

9 (2) Fragmentation and Reassembly Exchange data between two entities Characterized as sequence of PDUs of some bounded size Application level message Lower-level protocols may need to break data up into smaller blocks. Advantages of Fragmentation: Communications network may only accept blocks of up to a certain size ATM 53 octets Ethernet 1526 octets More efficient error control Smaller retransmission Fairer Prevent station monopolizing medium Smaller buffers Provision of checkpoint and restart/recovery operations 南京大学计算机系讲义 9

10 (2) Fragmentation and Reassembly Disadvantages of Fragmentation Make PDUs as large as possible because PDU contains some control information Smaller block, larger overhead PDU arrival generates interrupt Smaller blocks, more interrupts More time processing smaller, more numerous PDUs 南京大学计算机系讲义 10

11 (2) Fragmentation and Reassembly Segmented data must be reassembled into messages More complex if PDUs out of order 南京大学计算机系讲义 11

12 (3) Connection Control Connectionless data transfer Each PDU treated independently E.g. datagram Connection-oriented data transfer E.g. virtual circuit Connection-oriented preferred (even required) for lengthy exchange of data Or if protocol details must be worked out dynamically 南京大学计算机系讲义 12

13 (3) Connection Control Logical association, or connection, established between entities Three phases occur Connection establishment Data transfer Connection termination May be interrupt and recovery phases to handle errors 南京大学计算机系讲义 13

14 (3) Connection Control Phases of Connection Oriented Transfer 南京大学计算机系讲义 14

15 (3) Connection Control Connection Establishment Entities agree to exchange data Typically, one station issues connection request (In connectionless fashion) May involve central authority Receiving entity accepts or rejects (simple) May include negotiation Syntax, semantics, and timing Both entities must use same protocol May allow optional features Must be agreed E.g. protocol may specify max PDU size 8000 octets; one station may wish to restrict to 1000 octets 南京大学计算机系讲义 15

16 (3) Connection Control Data Transfer and Termination Both data and control information exchanged e.g. flow control, error control Data flow and acknowledgements may be in one or both directions One side may send termination request Or central authority might terminate 南京大学计算机系讲义 16

17 (3) Connection Control Sequencing Many connection-oriented protocols use sequencing e.g. HDLC, IEEE , tcp PDUs numbered sequentially Each side keeps track of outgoing and incoming numbers Supports three main functions Ordered delivery Flow control Error control Not found in all connection-oriented protocols E.g.frame relay and ATM All connection-oriented protocols include some way of identifying connection Unique connection identifier Combination of source and destination addresses 南京大学计算机系讲义 17

18 (4) Ordered Delivery PDUs may arrive out of order Different paths through network PDU order must be maintained Number PDUs sequentially Easy to reorder received PDUs Finite sequence number field Numbers repeat modulo maximum number Maximum sequence number greater than maximum number of PDUs that could be outstanding In fact, maximum number may need to be twice maximum number of PDUs that could be outstanding e.g. selective-repeat ARQ 南京大学计算机系讲义 18

19 (5) Flow Control Performed by receiving entity to limit amount or rate of data sent Stop-and-wait Credit Each PDU must be acknowledged before next sent Amount of data that can be sent without acknowledgment E.g. HDLC sliding-window Must be implemented in several protocols Network traffic control Buffer space Application overflow E.g. waiting for disk access 南京大学计算机系讲义 19

20 (6) Error Control Guard against loss or damage Error detection and retransmission Sender inserts error-detecting code in PDU Function of other bits in PDU Receiver checks code on incoming PDU If error, discard If transmitter doesn t get acknowledgment in reasonable time, retransmit Error-correction code Enables receiver to detect and possibly correct errors Error control is performed at various layers of protocol Between station and network Inside network 南京大学计算机系讲义 20

21 (7) Addressing Addressing level Addressing scope Connection identifiers Addressing mode 南京大学计算机系讲义 21

22 TCP/IP Concepts 南京大学计算机系讲义 22

23 Addressing Level Level in comms architecture at which entity is named Unique address for each end system e.g. workstation or server And each intermediate system (e.g., router) Network-level address IP address or internet address OSI - network service access point (NSAP) Used to route PDU through network At destination data must routed to some process Each process assigned an identifier TCP/IP port Service access point (SAP) in OSI 南京大学计算机系讲义 23

24 Addressing Scope Global address Global nonambiguity Identifies unique system Synonyms permitted System may have more than one global address Global applicability Possible at any global address to identify any other global address, in any system, by means of global address of other system Enables internet to route data between any two systems 南京大学计算机系讲义 24

25 Addressing Scope Need unique address for each device interface on network MAC address on IEEE 802 network and ATM host address Enables network to route data units through network and deliver to intended system Network attachment point address Addressing scope only relevant for network-level addresses Port or SAP above network level is unique within system Need not be globally unique E.g port 80 web server listening port in TCP/IP 南京大学计算机系讲义 25

26 Connection Identifiers Connection identifier used by both entities for future transmissions Reduced overhead Generally shorter than global identifiers Routing Fixed route may be defined Connection identifier identifies route to intermediate systems Multiplexing Entity may wish more than one connection simultaneously PDUs must be identified by connection identifier Use of state information Once connection established, end systems can maintain state information about connection Flow and error control using sequence numbers 南京大学计算机系讲义 26

27 Addressing Mode Usually address refers to single system or port Individual or unicast address Address can refer to more than one entity or port Multiple simultaneous recipients for data Broadcast for all entities within domain Multicast for specific subset of entities 南京大学计算机系讲义 27

28 (8) Multiplexing Multiple connections into single system E.g. frame relay, can have multiple data link connections terminating in single end system Connections multiplexed over single physical interface Can also be accomplished via port names Also permit multiple simultaneous connections E.g. multiple TCP connections to given system Each connection on different pair of ports 南京大学计算机系讲义 28

29 Multiplexing Between Levels Upward or inward multiplexing Multiple higher-level connections share single lower-level connection More efficient use of lower-level service Provides several higher-level connections where only single lower-level connection exists Downward multiplexing, or splitting Higher-level connection built on top of multiple lower-level connections Traffic on higher connection divided among lower connections Reliability, performance, or efficiency. 南京大学计算机系讲义 29

30 (9) Transmission Services Protocol may provide additional services to entities E.g.: Priority Connection basis On message basis E.g. terminate-connection request Quality of service E.g. minimum throughput or maximum delay threshold Security Security mechanisms, restricting access These services depend on underlying transmission system and lower-level entities 南京大学计算机系讲义 30

31 18.2 Principle of Internetworking Internetworking Terms Requirements of Internetworking Architectural Approaches 南京大学计算机系讲义 31

32 (1) Internetworking Terms (1) Communications Network An internet Facility that provides data transfer service Collection of communications networks interconnected by bridges and/or routers The Internet - note upper case I The global collection of thousands of individual machines and networks Intranet Corporate internet operating within the organization Uses Internet (TCP/IP and http)technology to deliver documents and resources 南京大学计算机系讲义 32

33 (1) Internetworking Terms (2) End System (ES) Device attached to one of the networks of an internet Supports end-user applications or services Intermediate System (IS) Device used to connect two networks Permits communication between end systems attached to different networks 南京大学计算机系讲义 33

34 (1) Internetworking Terms (3) Bridge Router IS used to connect two LANs using similar LAN protocols Address filter passing on packets to the required network only OSI layer 2 (Data Link) Connects two (possibly dissimilar) networks Uses internet protocol present in each router and end system OSI Layer 3 (Network) 南京大学计算机系讲义 34

35 (2) Requirements of Internetworking Link between networks Minimum a physical and link layer Routing and delivery of data between processes on different networks Accounting services and status info Independent of network architectures 南京大学计算机系讲义 35

36 Network Architecture Features Addressing Packet size Access mechanism Timeouts Error recovery Status reporting Routing User access control Connection based or connectionless 南京大学计算机系讲义 36

37 (3) Architectural Approaches Connection oriented Connectionless 南京大学计算机系讲义 37

38 Connection Oriented Assume that each network is connection oriented IS connect two or more networks IS appear as ES to each network Logical connection set up between ESs Concatenation of logical connections across networks Individual network virtual circuits joined by IS May require enhancement of local network services 802, FDDI are datagram services 南京大学计算机系讲义 38

39 Connection Oriented IS Functions Relaying Routing e.g. X.75 used to interconnect X.25 packet switched networks Connection oriented not often used (IP dominant) 南京大学计算机系讲义 39

40 Connectionless Operation Corresponds to datagram mechanism in packet switched network Each NPDU treated separately Network layer protocol common to all DTEs and routers Known generically as the internet protocol Internet Protocol One such internet protocol developed for ARPANET RFC 791 (Get it and study it) Lower layer protocol needed to access particular network 南京大学计算机系讲义 40

41 Connectionless Internetworking Advantages Flexibility Robust No unnecessary overhead Unreliable Not guaranteed delivery Not guaranteed order of delivery Packets can take different routes Reliability is responsibility of next layer up (e.g. TCP) 南京大学计算机系讲义 41

42 18.3 Internetworking of Connectionless (1) IP operation (2) Design Issues 南京大学计算机系讲义 42

43 (1) IP Operation 南京大学计算机系讲义 43

44 (2) Design Issues Routing Datagram lifetime Fragmentation and re-assembly Error control Flow control 南京大学计算机系讲义 44

45 (2) Design Issues The Internet as a Network 南京大学计算机系讲义 45

46 (2) Design Issues Routing End systems and routers maintain routing tables Indicate next router to which datagram should be sent Static May contain alternative routes Dynamic Flexible response to congestion and errors Source routing Source specifies route as sequential list of routers to be followed Security Priority Route recording 南京大学计算机系讲义 46

47 (2) Design Issues Datagram Lifetime Datagrams could loop indefinitely Consumes resources Transport protocol may need upper bound on datagram life Datagram marked with lifetime Time To Live field in IP Once lifetime expires, datagram discarded (not forwarded) Hop count Decrement time to live on passing through a each router Time count Need to know how long since last router (Aside: compare with Logan s Run) 南京大学计算机系讲义 47

48 (2) Design Issues Fragmentation and Re-assembly Different packet sizes When to re-assemble At destination Results in packets getting smaller as data traverses internet Intermediate re-assembly Need large buffers at routers Buffers may fill with fragments All fragments must go through same router Inhibits dynamic routing 南京大学计算机系讲义 48

49 (2) Design Issues IP Fragmentation (1) IP re-assembles at destination only Uses fields in header Data Unit Identifier (ID) Identifies end system originated datagram Source and destination address Protocol layer generating data (e.g. TCP) Identification supplied by that layer Data length Length of user data in octets 南京大学计算机系讲义 49

50 (2) Design Issues IP Fragmentation (2) Offset Position of fragment of user data in original datagram In multiples of 64 bits (8 octets) More flag Indicates that this is not the last fragment 南京大学计算机系讲义 50

51 (2) Design Issues Fragmentation (3) Example 南京大学计算机系讲义 51

52 (3) Design Issues Fragmentation (4) Dealing with Failure Re-assembly may fail if some fragments get lost Need to detect failure Re-assembly time out Assigned to first fragment to arrive If timeout expires before all fragments arrive, discard partial data Use packet lifetime (time to live in IP) If time to live runs out, kill partial data 南京大学计算机系讲义 52

53 (4) Design Issues Error Control Not guaranteed delivery Router should attempt to inform source if packet discarded e.g. for time to live expiring Source may modify transmission strategy May inform high layer protocol Datagram identification needed 南京大学计算机系讲义 53

54 (5) Design Issues Flow Control (5) Allows routers and/or stations to limit rate of incoming data (6) Limited in connectionless systems (5) Send flow control packets Requesting reduced flow,e.g. ICMP 南京大学计算机系讲义 54

55 18.4 Internet Protocol 南京大学计算机系讲义 55

56 Internet Protocol (IP) Version 4 Part of TCP/IP Used by the Internet Specifies interface with higher layer e.g. TCP Specifies protocol format and mechanisms RFC 791 Get it and study it! Will (eventually) be replaced by IPv6 (see later) 南京大学计算机系讲义 56

57 IPv4 Header 南京大学计算机系讲义 57

58 Header Fields (1) VERS: The field contains the IP protocol version. HLEN The current version is 4. 5 is an experimental version. 6 is the version for IPv6. The length of the IP header counted in 32-bit quantities. This doesnot include the data field. Type Of Service The service type is an indication of the quality of service requested for this IP datagram. This field contains the following information: 南京大学计算机系讲义 58

59 Header Fields (2) Precedence: This field specifies the nature and priority of the datagram: 000: Routine 001: Priority 010: Immediate 011: Flash 100: Flash override 101: Critical 110: Internetwork control 111: Network control TOS: Specifies the type of service value: 1000: Minimize delay 0100: Maximize throughput 0010: Maximize reliability 0001: Minimize monetary cost 0000: Normal service MBZ: Reserved for future use. 南京大学计算机系讲义 59

60 Header Fields (3) Total Length The total length of the datagram (or fragment), header and data. Identification A unique number assigned by the sender to aid in reassembling a fragmented datagram. Each fragment of a datagram hasthe same identification number. Time to Live This field indicates the maximum time the datagram is allowed to remain in the internet system. The time is measured in units of seconds, In practise, a router processes the datagram in less than 1 second. The intention is to cause undeliverable datagrams to be discarded, and to bound the maximum datagram lifetime. 南京大学计算机系讲义 60

61 Header Fields (4) Flags More bit Don t fragment Fragmentation offset This field indicates where in the datagram this fragment belongs. The fragment offset is measured in units of 8 octets (64 bits). The first fragment has offset zero 南京大学计算机系讲义 61

62 Header Fields (5) Protocol Number: This field indicates the higher level protocol to which IP should deliver the data in this datagram. 0: Reserved 1: Internet Control Message Protocol (ICMP) 2: Internet Group Management Protocol (IGMP) 3: Gateway-to-Gateway Protocol (GGP) 4: IP (IP encapsulation) 5: Stream 6: Transmission Control Protocol (TCP) 8: Exterior Gateway Protocol (EGP) 9: Private Interior Routing Protocol 17: User Datagram Protocol (UDP) 41: IP Version 6 (IPv6) 50: Encap Security Payload for IPv6 (ESP) 51: Authentication Header for IPv6 (AH) 89: Open Shortest Path First 南京大学计算机系讲义 62

63 Header Fields (6) Header checksum Reverified and recomputed at each router 16 bit ones complement sum of all 16 bit words in header Set to zero during calculation If the header checksum does not match the contents, the datagram is discarded. Source address Destination address 南京大学计算机系讲义 63

64 Header Fields (7) fc (Flag copy): This field indicates whether (1) or not (0) the option field is copied when the datagram is fragmented. class: The option class is a 2-bit unsigned integer: 0: control 1: reserved 2: debugging and measurement 3: reserved 南京大学计算机系讲义 64

65 Header Fields (8) option number 0: End of option list. That is, the option list is terminated by a X'00' byte. It is only required if the IP header length (which is a multiple of 4 bytes) does not match the actual length of the options. 1: No operation. It has a class of 0, the fc bit is not set and there is no length byte or data. That is, a X'01' byte is a NOP. It may be used to align fields in the datagram. 2: Security. It has a class of 0, the fc bit is set and there is a length byte with a value of 11 and 8 bytes of data). It is used for security information needed by U.S. Department of Defense requirements. 3: Loose source routing. It has a class of 0, the fc bit is set and there is a variable length data field. 4: Internet timestamp. It has a class of 2, the fc bit is not set and there is a variable length data field. The total length may be up to 40 bytes. 7: Record route. It has a class of 0, the fc bit is not set and there is a variable length data field. 南京大学计算机系讲义 65

66 8: Stream ID. It has a class of 0, the fc bit is set and there is a length byte with a value of 4 and one data byte. It is used with the SATNET system. 9: Strict source routing. It has a class of 0, the fc bit is set and there is a variable length data field. 南京大学计算机系讲义 66

67 fc class number length DESCRIPTION End of Option list, occupies only 1 octet,no length octet No Operation. occupies only 1 octet,no length octet Security var. Loose Source Routing var. Strict Source Routing var. Record Route Stream ID var. Internet Timestamp. 南京大学计算机系讲义 67

68 Loose source routing The loose source routing option, also called the loose source and record route (LSRR) option, provides a means for the source of an IP datagram to supply explicit routing information. This information is used by the routers when forwarding the datagram to the destination. It is also used to record the route. 南京大学计算机系讲义 68

69 Loose source routing Length Pointer Contains the length of this option field, including the type and length fields. Points to the option data at the next IP address to be processed. It is counted relative to the beginning of the option, so its minimum value is 4. If the pointer is greater than the length of the option, the end of the source route is reached and further routing is to be based on the destination IP address (as for datagrams without this option). route data This field contains a series of 32-bit IP addresses. 南京大学计算机系讲义 69

70 Loose source routing When a datagram arrives at its destination and the source route is not empty (pointer < length) the receiving host: Takes the next IP address in the route data field (the one indicated by the pointer field) and puts it in the destination IP address field of the datagram. Puts the local IP address in the source list at the location pointed to by the pointer field. The IP address for this is the local IP address corresponding to the network on which the datagram will be forwarded. (Routers are attached to multiple physical networks and thus have multiple IP addresses.) Increments the pointer by 4. Transmits the datagram to the new destination IP address. 南京大学计算机系讲义 70

71 Loose source routing The originating host puts the IP address of the first intermediate router in the destination address field The IP addresses of the remaining routers in the path, including the target destination are placed in the source route option. The recorded route in the datagram when it arrives at the target contains the IP addresses of each of the routers that forwarded the datagram. Each router has moved one place in the source route, and normally a different IP address will be used, since the routers record the IP address of the outbound interface but the source route originally contained the IP address of the inbound interface. 南京大学计算机系讲义 71

72 Strict source routing The strict source routing option, also called the strict source and record route (SSRR) option uses the same principle as loose source routing except the intermediate router must send the datagram to the next IP address in the source route via a directly connected network. It cannot use an intermediate router. If this cannot be done, ICMP Destination Unreachable error message is issued. 南京大学计算机系讲义 72

73 Record route This option provides a means to record the route traversed by an IP datagram. It functions similarly to the source routing option. However, this option provides an empty routing data field. This field is filled in as the datagram traverses the network. Sufficient space for this routing information must be provided by the source host. If the data field is filled before the datagram reaches its destination, the datagram is forwarded with no further recording of the route. 南京大学计算机系讲义 73

74 Internet timestamp They cannot be used for performance measurement for two reasons: Because most IP datagrams are forwarded in less than one second, the timestamps are not precise. Because IP routers are not required to have synchronized clocks, they may not be accurate. 南京大学计算机系讲义 74

75 Internet timestamp Length Contains the total length of this option, including the type and length fields. Pointer Points to the next timestamp to be processed (first free time stamp). oflw (overflow) This field contains the number of devices that cannot register timestamps due to a lack of space in the data field. Flag Is a 4-bit value which indicates how timestamps are to be registered: 0: Timestamps only, stored in consecutive 32-bit words. 1: Each timestamp is preceded by the IP address of the registering device. 2 The IP address fields are pre-specified, an IP device only registers when it finds its own address in the list. Timestamp: A 32-bit timestamp recorded in milliseconds since midnight UT (GMT). 南京大学计算机系讲义 75

76 The IP address IP addressing standards are described in RFC 1166 Internet Numbers. When the host is attached to more than one network, it is called multi-homed and has one IP address for each network interface. IP address = <network number><host number> 南京大学计算机系讲义 76

77 The IP address The network number portion of the IP address is administered by one of three Regional Internet Registries (RIR) American Registry for Internet Numbers (ARIN) North America, South America, the Caribbean and sub- Saharan Africa. Reseaux IP Europeens (RIPE) Europe, Middle East, parts of Africa. Asia Pacific Network Information Centre (APNIC) Asia Pacific region. 南京大学计算机系讲义 77

78 Class-based IP addresses 南京大学计算机系讲义 78

79 Reserved IP addresses All bits 0: All bits 1 Loopback An address with all bits zero in the host number portion is interpreted as this host An address with all bits one is interpreted as all networks or all hosts. The class A network is defined as the loopback network. 南京大学计算机系讲义 79

80 IP subnets A new type of physical network is installed at a location. Growth of the number of hosts requires splitting the local network into two or more separate networks. Growing distances require splitting a network into smaller networks, with gateways between them. To avoid having to request additional IP network addresses, the concept of IP subnetting was introduced. The assignment of subnets is done locally. The entire network still appears as one IP network to the outside world. 南京大学计算机系讲义 80

81 IP subnets The host number part of the IP address is subdivided into a second network number and a host number. This second network is termed a subnetwork or subnet. The main network now consists of a number of subnets. The IP address is interpreted as: <network number><subnet number><host number> 南京大学计算机系讲义 81

82 the local administrator chose a subnet number and host number The division is done using a 32-bit subnet mask. Bits with a value of one indicate positions ascribed to the subnet number. Bits with a value of zero bits in the subnet mask indicate positions ascribed to the host number. 南京大学计算机系讲义 82

83 IP routing An important function of the IP layer is IP routing. A device can simultaneously function as both a normal host and a router. 南京大学计算机系讲义 83

84 types of IP routing Direct routing If the destination host is attached to the same physical network as the source host, IP datagrams can be directly exchanged. Indirect routing the destination host is not connected to a network directly attached to the source host. The only way to reach the destination is via one or more IP gateways. The address of the first gateway (the first hop) is called an indirect route in the IP routing algorithm. The address of the first gateway is the only information needed by the source host to send a packet to the destination host. 南京大学计算机系讲义 84

85 IP routing table Each host keeps the set of mappings between the following: Destination IP network address(es) Route(s) to next gateway(s) 南京大学计算机系讲义 85

86 IP routing algorithm 南京大学计算机系讲义 86

87 IP routing algorithm 南京大学计算机系讲义 87

88 南京大学计算机系讲义 88

89 If the IP implementation on any of the hosts does not support subnetting, that host will be able to communicate with any host in its own subnet but not with any machine on another subnet within the same network. 南京大学计算机系讲义 89

90 Broadcasting Limited broadcast address This uses the address It refers to all hosts on the local subnet. Routers do not forward this packet. Network-directed broadcast address This is used in an unsubnetted environment. The network number is a valid network number and the host number is all ones (for example, ). This address refers to all hosts on the specified network. Routers should forward these broadcast messages. Subnet-directed broadcast address: the network number is a valid network number, the subnet number is a valid subnet number and the host number is all ones, the address refers to all hosts on the specified subnet. 南京大学计算机系讲义 90

91 Multicasting Each group is represented by a Class D IP address. For each multicast address, a set of zero or more hosts are listening for packets addressed to the address. This set of hosts is called the host group. Packets sent to a multicast address are forwarded only to the members of the corresponding host group. 南京大学计算机系讲义 91

92 Anycasting Sometimes, the same IP services are provided by different hosts. For example, a user wants to download a file via FTP and the file is available on multiple FTP servers. Hosts that implement the same service provide ananycast address to other hosts that require the service. Connections are made to the first host in the anycast address group to respond. This process is used to guarantee the service is provided by the host with the best connection to the receiver. 南京大学计算机系讲义 92

93 private IP addresses A single Class A network contiguous Class B networks contiguous Class C networks Any organization can use any address in these ranges. Routers in networks not using private addresses are expected to quietly discard all routing information regarding these addresses. All connectivity to external Internet hosts must be provided with application gateways 南京大学计算机系讲义 93

94 Classless Inter-Domain Routing (CIDR) routing table explosion problem A Class B network of 3000 hosts requires one routing table entry at each backbone router. The same environment, if addressed as a range of Class C networks, requires 16 entries. The solution to this problem is called Classless Inter- Domain Routing (CIDR). CIDR is described in RFCs 1518 to 南京大学计算机系讲义 94

95 Classless Inter-Domain Routing (CIDR) 南京大学计算机系讲义 95

96 18.5 Internet Control Message Protocol (ICMP) It is described in RFC 792 with updates in RFC 950. A router or a destination host uses ICMP to inform the source host about errors in datagram processing. 南京大学计算机系讲义 96

97 Characteristic of ICMP ICMP uses IP as if ICMP were a higher level protocol. However, ICMP is an integral part of IP and must be implemented by every IP module. ICMP is used to report errors, not to make IP reliable. Datagrams may still be undelivered without any report on their loss. Reliability must be implemented by the higher-level protocols using IP services. ICMP cannot be used to report errors with ICMP messages. This avoids infinite repetitions. For fragmented datagrams, ICMP messages are only sent about errors with the first fragment. 南京大学计算机系讲义 97

98 Characteristic of ICMP ICMP messages are never sent in response to datagrams with a broadcast or a multicast destination address. ICMP messages are never sent in response to a datagram that does not have a source IP address representing a unique host. 南京大学计算机系讲义 98

99 ICMP type 0: Echo reply 3: Destination unreachable 4: Source quench 5: Redirect 8: Echo 9: Router advertisement 10: Router solicitation 11: Time exceeded 12: Parameter problem 13: Timestamp request 14: Timestamp reply 15: Information request (obsolete) 16: Information reply (obsolete) 17: Address mask request 18: Address mask reply 30: Traceroute 31: Datagram conversion error 32: Mobile host redirect 33: IPv6 Where-Are-You 34: IPv6 I-Am-Here 35: Mobile registration request 36: Mobile registration reply 37: Domain name request 38: Domain name reply 39: SKIP 40: Photuris 南京大学计算机系讲义 99

100 ICMP Code Contains the error code for the datagram reported by this ICMP message. The interpretation is dependent upon the message type. Checksum Data Contains information for this ICMP message. Typically it will contain the portion of the original IP message for which this ICMP message was generated. 南京大学计算机系讲义 100

101 Destination Unreachable (3) received from an intermediate router it means that the router regards the destination IP address as unreachable. received from the destination host the protocol or theport is inactive. 0: Network unreachable 1: Host unreachable 2: Protocol unreachable 3: Port unreachable 4: Fragmentation needed but the Do Not Fragment bit was set 5: Source route failed 6: Destination network unknown 7: Destination host unknown 8: Source host isolated (obsolete) 9: Destination network administratively prohibited 10:Destination host administratively prohibited 11:Network unreachable for this type of service 12:Host unreachable for this type of service 13:Communication administratively prohibited by filtering 14:Host precedence violation 15:Precedence cutoff in effect 南京大学计算机系讲义 101

102 Source Quench (4) code field is always zero. from an intermediate router the router did not have the buffer space needed to queue the datagram. from the destination host it means that the incoming datagrams are arriving too quickly to be processed. 南京大学计算机系讲义 102

103 Redirect (5) received from an intermediate router it means that the host should send future datagrams for the network to the router whose IP address is specified in the ICMP message. T his preferred router will always be on the same subnet as the host that sent the datagram and the router that returned the IP datagram. The router forwards the datagram to its next hop destination. This message will not be sent if the IP datagram contains a source route. 南京大学计算机系讲义 103

104 Router Advertisement (9) and Router Solicitation (10) RFC 1256 Number The number of entries in the message. entry length The length of an entry in 32-bit units. TTL The number of seconds that an entry will be considered valid. router address One of the sender's IP addresses. preference level A signed 32-bit level indicating the preference to be assigned to this address when selecting a default router. 南京大学计算机系讲义 104

105 Timestamp Request (13) and Timestamp Reply (14) The sender initializes the identifier and sequence number The sender sets the originate timestamp. The receiving host fills in the receive and transmit timestamps. 南京大学计算机系讲义 105

106 Echo (8) and Echo Reply (0) Echo is used to detect if another host is active on the network. The sender initializes the identifier, sequence number, and data field. The datagram is then sent to the destination host. The recipient changes the type to Echo Reply and returns the datagram to the sender. It is used by the Ping command. 南京大学计算机系讲义 106

107 ICMP applications Traceroute The Traceroute program is used to determine the route IP datagrams follow through the network. Traceroute is based upon ICMP and UDP. It sends an IP datagram with a TTL of 1 to the destination host. The first router decrements the TTL to 0, discards the datagram and returns an ICMP Time Exceeded message to the source. This process is repeated with successively larger TTL values to identify the exact series of routers in the path to the destination host. 南京大学计算机系讲义 107

108 18.6 Address Resolution Protocol (ARP) ARP is responsible for converting the higher level protocol addresses (IP addresses) to physical network addresses. It is described in RFC 826. 南京大学计算机系讲义 108

109 ARP Question D Q Ethernet R 1 DDN R 2 FDDI S B S S D Q What address is used to send packets? Machine IP address Hardware address S IPs ETH S B IP B ETH B D IP D ETH D R 1 IP R1, IP R11 ETH R1, DDN R1 P IP P FDDI P Q IP Q FDDI Q R 2 IP R2,IP R21 FDDI R2, DDN P 南京大学计算机系讲义 109

110 ARP The ARP module tries to find the address in this ARP cache. If it finds the matching pair, it gives the corresponding 48-bit physical address back to the caller (the device driver), which then transmits the packet. If it doesn't find the pair in its table, it discards the packet (assumption is that a higher level protocol will retransmit) and generates a network broadcast of an ARP request. 南京大学计算机系讲义 110

111 ARP Hardware address space: Specifies the type of hardware; examples are Ethernet or Packet Radio Net. Protocol address space: Specifies the type of protocol, same as the EtherType field in the IEEE 802 header (IP or ARP). Operation code: Specifies whether this is an ARP request (1) or reply (2). 南京大学计算机系讲义 111

112 ftp hostname ARP 用户输入时,的操作南京大学计算机系讲义 112

113 ARP Experiment ARP cache Tcpdump Command arp a will list the cached mapings. Using the tcpdump you can lookup the process of ARP operations 南京大学计算机系讲义 113

114 Proxy-ARP or transparent subnetting When host A wants to send an IP datagram to host B, it first has to determine the physical network address of host B through the use of the ARP protocol. As host A cannot differentiate between the physical networks, its IP routing algorithm thinks that host B is on the local physical network and sends out a broadcast ARP request. Host B doesn t receive this broadcast, but router R does. If router R s routing tables specify that the next hop to that other network is through a different physical device, it will reply to the ARP as if it were host B, saying that the network address of host B is that of the router R itself. 南京大学计算机系讲义 114

115 Proxy-ARP or transparent subnetting When host A wants to send an IP datagram to host B, it first has to determine the physical network address of host B through the use of the ARP protocol. As host A cannot differentiate between the physical networks, its IP routing algorithm thinks that host B is on the local physical network and sends out a broadcast ARP request. Host B doesn t receive this broadcast, but router R does. If router R s routing tables specify that the next hop to that other network is through a different physical device, it will reply to the ARP as if it were host B, saying that the network address of host B is that of the router R itself. 南京大学计算机系讲义 115

116 Reverse Address Resolution Protocol (RARP) computer without hard disk server Where is IP address? How get it? Method: broadcast a request with its hardware address server replies with required IP address 南京大学计算机系讲义 116

117 Reverse Address Resolution Protocol (RARP) The RARP protocol is a network-specific standard protocol. It is described in RFC 903. Some network hosts, such as diskless workstations, do not know their own IP address when they are booted. The hardware address of the host is the known parameter, and the IP address the queried parameter. RARP server must exist on the network that maintains that a database of mappings from hardware address to protocol address must be pre-configured. 南京大学计算机系讲义 117

118 18.7 BOOTP 南京大学计算机系讲义 118

119 BOOTP Introduction 1. What should a new computer know before using Internet? Its IP address and network mask default router DNS server other servers 2. How get them? manually automatically many computers? MH? where and how exchange message? 南京大学计算机系讲义 119

120 Drawbacks of RARP operates at a low level. application server? a small piece of information. waste use hardware address. not suit to some network 南京大学计算机系讲义 120

121 BOOTP The bootstrap protocol (BOOTP) enables a client workstation to initialize with a minimal IP stack and request it s IP address a gateway address the address of a name server from a BOOTP server. The BOOTP specifications can be found in RFC 951 Bootstrap Protocol. 南京大学计算机系讲义 121

122 The BOOTP process The client determines its own hardware address; this is normally in a ROM on the hardware. A BOOTP client sends its hardware address in a UDP datagram to the server. If the client does not know its own IP address, it uses If the client does not know the server's IP address, it uses the limited broadcast address ( ). The UDP port number is 67. 南京大学计算机系讲义 122

123 The server receives the datagram and looks up the hardware address of the client in its configuration file, which contains the client's IP address. The server fills in the remaining fields in the UDP datagram and returns it to the client using UDP port 68. 南京大学计算机系讲义 123

124 code: Indicates a request or a reply. 1: Request 2: Reply HWtype: The type of hardware, for example: Length Hops 1: Ethernet 6: IEEE 802 Networks Hardware address length in bytes. Ethernet and token-ring both use 6, for example. The client sets this to 0. It is incremented by a router that relays the request to another server and is used to identify loops. 南京大学计算机系讲义 124

125 Transaction ID A random number used to match this boot request with the response it generates. Seconds Set by the client. It is the elapsed time in seconds since the client started its boot process. Flags field The most significant bit of the flags field is used as a broadcast flag. All other bits must be set to zero; If a host is unable to receive a unicast IP datagram until it knows its IP address, then this broadcast bit must be set to indicate to the server that the BOOTREPLY must be sent as an IP and MAC broadcast. Otherwise this bit must be set to zero 南京大学计算机系讲义 125

126 Client IP address Set by the client, either to its known IP address or Your IP address Set by the server if the client IP address field was Server IP address Set by the server. Router IP address This is the address of a BOOTP relay agent. Client hardware address Set by the client and used by the server to identify which registered client is booting. 南京大学计算机系讲义 126

127 Server host name Optional server host name terminated by X'00'. Boot file name The client either leaves this null or specifies a generic name, such as router indicating the type of boot file to be used. The server returns the fully qualified file name of a boot file suitable for the client. The value is terminated by X'00'. 南京大学计算机系讲义 127

128 BOOTP forwarding BOOTP relay agent checks the hops field it checks the contents of the router IP address field. If this field is zero, it fills this field with the IP address of the interface on which the BOOTPREQUEST was received. If this field already has an IP address of another relay agent, it is not touched. The value of the hops field is incremented. The relay agent then forwards the BOOTPREQUEST to one or more BOOTP servers. The address of the BOOTP server(s) is preconfigured at the relay agent. 南京大学计算机系讲义 128

129 18.8 DHCP the reason The use of BOOTP allows centralized configuration of multiple clients. It requires a static table to be maintained with an IP address preallocated for every client, even if the client is seldom active. This means that there is no relief on the number of IP addresses required. A client will only be allocated an IP address by the server if it has a valid MAC address. 南京大学计算机系讲义 129

130 DHCP specification RFC 2131: Dynamic Host Configuration Protocol RFC 2132 : DHCP Options and BOOTP Vendor Extensions. DHCP is based on the BOOTP protocol Automatic allocation of reusable network addresses DHCP messages use UDP port 67, 68. DHCP participants can interoperate with BOOTP participants. 南京大学计算机系讲义 130

131 DHCP three mechanisms for IP address allocation Automatic allocation DHCP assigns a permanent IP address to the host. Dynamic allocation DHCP assigns an IP address for a limited period of time. Such a network address is called a lease. This is the only mechanism that allows automatic reuse of addresses that are no longer needed by the host to which it was assigned. Manual allocation The host's address is assigned by a network administrator. 南京大学计算机系讲义 131

132 DHCP the message format 南京大学计算机系讲义 132

133 DHCP message types DHCPDISCOVER DHCPOFFER DHCPREQUEST DHCPACK. DHCPNACK DHCPDECLINE DHCPRELEASE DHCPINFORM 南京大学计算机系讲义 133

134 DHCP Allocating a new network address 南京大学计算机系讲义 134

135 南京大学计算机系讲义 135

136 /discover init nack select offer /request rebind 87.5% /request renew request ack ack 50% /request ack bound 南京大学计算机系讲义 136

ARP ICMP

ARP ICMP ARP ICMP 2 9-1 ARP 9-2 ARP 9-3 ARP 9-4 ICMP 9-5 ICMP 9-6 ICMP 9-7 ICMP 3 ARP ICMP TCP / IP, IP ARP ICMP 3 IP, ARP ICMP IP ARP ICMP 2, 4 9-1 ARP, MAC, IP IP, MAC ARP Address Resolution Protocol, OSI ARP,,

More information

穨control.PDF

穨control.PDF TCP congestion control yhmiu Outline Congestion control algorithms Purpose of RFC2581 Purpose of RFC2582 TCP SS-DR 1998 TCP Extensions RFC1072 1988 SACK RFC2018 1996 FACK 1996 Rate-Halving 1997 OldTahoe

More information

財金資訊-80期.indd

財金資訊-80期.indd IPv6 / LINE YouTube TCP/IP TCP (Transmission Control Protocol) IP (Internet Protocol) (node) (address) IPv4 168.95.1.1 IPv4 1981 RFC 791 --IP IPv4 32 2 32 42 IP (Internet Service Provider ISP) IP IP IPv4

More information

lan03_yen

lan03_yen IEEE 8. LLC Logical Link Control ll rights reserved. No part of this publication and file may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical,

More information

Microsoft PowerPoint - 数据通信-ch1.ppt

Microsoft PowerPoint - 数据通信-ch1.ppt 主 要 内 容 与 基 本 要 求 主 要 内 容 数 据 通 信 与 计 算 机 网 络 计 算 机 网 络 的 发 展 过 程 分 类 以 及 主 要 性 能 指 标 ; 分 组 交 换 的 基 本 原 理 及 其 与 电 路 交 换 报 文 交 换 的 联 系 与 区 别 ; 计 算 机 网 络 的 协 议 与 体 系 结 构 第 1 章 概 述 基 本 要 求 掌 握 分 组 交 换 电 路

More information

TCP/IP TCP/IP OSI IP TCP IP IP TCP/IP TCP/IP

TCP/IP TCP/IP OSI IP TCP IP IP TCP/IP TCP/IP TCP/IP : TCP/IP TCP/IP OSI IP TCP IP IP TCP/IP TCP/IP 1. ASCII EBCDIC Extended Binary-Coded Decimal Interchange Code 2. / (1) (2) Single System Image SSI) (3) I/O (4) 3.OSI OSI Open System Interconnection

More information

IP505SM_manual_cn.doc

IP505SM_manual_cn.doc IP505SM 1 Introduction 1...4...4...4...5 LAN...5...5...6...6...7 LED...7...7 2...9...9...9 3...11...11...12...12...12...14...18 LAN...19 DHCP...20...21 4 PC...22...22 Windows...22 TCP/IP -...22 TCP/IP

More information

IP Access Lists IP Access Lists IP Access Lists

IP Access Lists IP Access Lists IP Access Lists Chapter 10 Access Lists IP Access Lists IP Access Lists IP Access Lists Security) IP Access Lists Access Lists (Network router For example, RouterA can use an access list to deny access from Network 4

More information

工程师培训

工程师培训 .1 TCP/IP TCP/IP 1 .2.2.1 Host 1960 S 1970 S Host Low Speed Lines 1970 S 1980 S pc Server Local Interneting 1980 S 1990 S Branch. pc Branch. WAN Branch. pc pc IBM SNA IBM X.25 2 .2.2 OSI OSI Application

More information

计算机网络概论

计算机网络概论 1 repeater bridge router gateway V.S OSI Repeater(Hub) 1 Repeater 2 3 ( Hub 4 Bridge 1 Bridge 2 N N DL1 DL1 DL2 DL2 Ph1 Ph1 Ph2 Ph2 1 2 Bridge 3 MAC Ethernet FDDI MAC MAC Bridge 4 5 6 7 50873EA6, 00123456

More information

...1 What?...2 Why?...3 How? ( ) IEEE / 23

...1 What?...2 Why?...3 How? ( ) IEEE / 23 .... IEEE 1588 2010 7 8 ( ) IEEE 1588 2010 7 8 1 / 23 ...1 What?...2 Why?...3 How? ( ) IEEE 1588 2010 7 8 2 / 23 ...1 What?...2 Why?...3 How? ( ) IEEE 1588 2010 7 8 3 / 23 IEEE 1588 ( ) IEEE 1588 2010

More information

Microsoft PowerPoint - Aqua-Sim.pptx

Microsoft PowerPoint - Aqua-Sim.pptx Peng Xie, Zhong Zhou, Zheng Peng, Hai Yan, Tiansi Hu, Jun-Hong Cui, Zhijie Shi, Yunsi Fei, Shengli Zhou Underwater Sensor Network Lab 1 Outline Motivations System Overview Aqua-Sim Components Experimental

More information

第 1 章 概 述 1.1 计 算 机 网 络 在 信 息 时 代 中 的 作 用 1.2 计 算 机 网 络 的 发 展 过 程 *1.2.1 分 组 交 换 的 产 生 *1.2.2 因 特 网 时 代 *1.2.3 关 于 因 特 网 的 标 准 化 工 作 1.2.4 计 算 机 网 络 在

第 1 章 概 述 1.1 计 算 机 网 络 在 信 息 时 代 中 的 作 用 1.2 计 算 机 网 络 的 发 展 过 程 *1.2.1 分 组 交 换 的 产 生 *1.2.2 因 特 网 时 代 *1.2.3 关 于 因 特 网 的 标 准 化 工 作 1.2.4 计 算 机 网 络 在 计 算 机 网 络 ( 第 4 版 ) 课 件 第 1 章 计 算 机 网 络 概 述 郭 庆 北 Ise_guoqb@ujn.edu.cn 2009-02-25 第 1 章 概 述 1.1 计 算 机 网 络 在 信 息 时 代 中 的 作 用 1.2 计 算 机 网 络 的 发 展 过 程 *1.2.1 分 组 交 换 的 产 生 *1.2.2 因 特 网 时 代 *1.2.3 关 于 因 特

More information

ebook140-9

ebook140-9 9 VPN VPN Novell BorderManager Windows NT PPTP V P N L A V P N V N P I n t e r n e t V P N 9.1 V P N Windows 98 Windows PPTP VPN Novell BorderManager T M I P s e c Wi n d o w s I n t e r n e t I S P I

More information

ebook140-8

ebook140-8 8 Microsoft VPN Windows NT 4 V P N Windows 98 Client 7 Vintage Air V P N 7 Wi n d o w s NT V P N 7 VPN ( ) 7 Novell NetWare VPN 8.1 PPTP NT4 VPN Q 154091 M i c r o s o f t Windows NT RAS [ ] Windows NT4

More information

SL2511 SR Plus 操作手冊_單面.doc

SL2511 SR Plus 操作手冊_單面.doc IEEE 802.11b SL-2511 SR Plus SENAO INTERNATIONAL CO., LTD www.senao.com - 1 - - 2 - .5 1-1...5 1-2...6 1-3...6 1-4...7.9 2-1...9 2-2 IE...11 SL-2511 SR Plus....13 3-1...13 3-2...14 3-3...15 3-4...16-3

More information

¶C¶L§§¬_™¨ A.PDF

¶C¶L§§¬_™¨ A.PDF 1 9 3 1 9 4 / 7.1 / 1 9 5 7.2 % netstat -rn Routing tables Destination Gateway Flags Refcnt Use Interface 127.0.0.1 127.0.0.1 UH 1 132 lo0 172.16.12.0 172.16.12.2 U 26 49041 le0 1 9 6 / % ping -s almond

More information

2/80 2

2/80 2 2/80 2 3/80 3 DSP2400 is a high performance Digital Signal Processor (DSP) designed and developed by author s laboratory. It is designed for multimedia and wireless application. To develop application

More information

Microsoft PowerPoint - TTCN-Introduction-v5.ppt

Microsoft PowerPoint - TTCN-Introduction-v5.ppt Conformance Testing and TTCN 工研院無線通訊技術部林牧台 / Morton Lin 03-5912360 mtlin@itri.org.tw 1 Outline Introduction and Terminology Conformance Testing Process 3GPP conformance testing and test cases A real world

More information

RAQMON Context Setting MG PDA Applications RTP / FTP/ HTTP TCP/UDP S ignaling control plane (e.g. RS VP, NS IS) Streaming Media, Transaction, Bulk dat

RAQMON Context Setting MG PDA Applications RTP / FTP/ HTTP TCP/UDP S ignaling control plane (e.g. RS VP, NS IS) Streaming Media, Transaction, Bulk dat Realtime Application QOS Monitoring (RAQMON) Dan Romascanu dromasca@avaya.com 1 RAQMON Context Setting MG PDA Applications RTP / FTP/ HTTP TCP/UDP S ignaling control plane (e.g. RS VP, NS IS) Streaming

More information

Chapter #

Chapter # 第三章 TCP/IP 协议栈 本章目标 通过本章的学习, 您应该掌握以下内容 : 掌握 TCP/IP 分层模型 掌握 IP 协议原理 理解 OSI 和 TCP/IP 模型的区别和联系 TCP/IP 介绍 主机 主机 Internet TCP/IP 早期的协议族 全球范围 TCP/IP 协议栈 7 6 5 4 3 应用层表示层会话层传输层网络层 应用层 主机到主机层 Internet 层 2 1 数据链路层

More information

第3章 计算机网络体系结构

第3章  计算机网络体系结构 第 3 章 计 算 机 网 络 体 系 结 构 本 章 内 容 计 算 机 的 网 络 体 系 结 构 网 络 参 考 模 型 五 层 网 络 参 考 模 型 1 3.1 计 算 机 网 络 体 系 结 构 发 展 历 程 分 层 原 理 基 本 概 念 2 发 展 历 程 网 络 体 系 结 构 提 出 的 背 景 计 算 机 网 络 的 复 杂 性 异 质 性 不 同 的 通 信 介 质 有 线

More information

untitled

untitled LBS Research and Application of Location Information Management Technology in LBS TP319 10290 UDC LBS Research and Application of Location Information Management Technology in LBS , LBS PDA LBS

More information

Master Thesis_專門用來製作目錄.doc

Master Thesis_專門用來製作目錄.doc Introduction All-IP [1-4] All-IP packet switching long delay time, jitter packet loss All-IP Budget-Based QoS End-to-End QoS (real time on demand) 1 1.1 Circuit Switching Packet Switching DWDM IP VoIP

More information

IS-IS路由协议中文教程v1

IS-IS路由协议中文教程v1 IS-IS v1.0 Chapter 0 Preface Statement BSCI Building Scalable Cisco Internetworks Configuring IS-IS Protocol IS-IS IS-IS OSI TCP/IP IS-IS OSPF Cisco System BSCI Student Guide Outline 1 OSI IS-IS 2 IS-IS

More information

9 Internet 10 Internet

9 Internet 10 Internet 1 2 3 4 5 6 Internet 7 8 9 Internet 10 Internet 11 12 1 1.1 1.2 1.3 1.4 1.5 1.6 1.1 1.1.1 20 50 20 60 ARPANET ARPANET Internet 20 70 ISO International Organization for Standardization TCP/IP 20 90 Internet

More information

* RRB *

* RRB * *9000000000RRB0010040* *9000000000RRB0020040* *9000000000RRB0030040* *9000000000RRB0040040* *9000000000RRC0010050* *9000000000RRC0020050* *9000000000RRC0030050* *9000000000RRC0040050* *9000000000RRC0050050*

More information

國 立 政 治 大 學 教 育 學 系 2016 新 生 入 學 手 冊 目 錄 表 11 國 立 政 治 大 學 教 育 學 系 博 士 班 資 格 考 試 抵 免 申 請 表... 46 論 文 題 目 申 報 暨 指 導 教 授... 47 表 12 國 立 政 治 大 學 碩 博 士 班 論

國 立 政 治 大 學 教 育 學 系 2016 新 生 入 學 手 冊 目 錄 表 11 國 立 政 治 大 學 教 育 學 系 博 士 班 資 格 考 試 抵 免 申 請 表... 46 論 文 題 目 申 報 暨 指 導 教 授... 47 表 12 國 立 政 治 大 學 碩 博 士 班 論 國 立 政 治 大 學 教 育 學 系 2016 新 生 入 學 手 冊 目 錄 一 教 育 學 系 簡 介... 1 ( 一 ) 成 立 時 間... 1 ( 二 ) 教 育 目 標 與 發 展 方 向... 1 ( 三 ) 授 課 師 資... 2 ( 四 ) 行 政 人 員... 3 ( 五 ) 核 心 能 力 與 課 程 規 劃... 3 ( 六 ) 空 間 環 境... 12 ( 七 )

More information

Microsoft Word - CX VMCO 3 easy step v1.doc

Microsoft Word - CX VMCO 3 easy step v1.doc Abacus Fully Automated Process of VMCO on CX, KA, CPH & KAH 16 Nov 2009 To streamline the VMCO handling on CX, KA, CPH & KAH, Abacus is pleased to inform you that manual submission of VMCO to CX/KA/CPH/KAH

More information

Windows RTEMS 1 Danilliu MMI TCP/IP QEMU i386 QEMU ARM POWERPC i386 IPC PC104 uc/os-ii uc/os MMI TCP/IP i386 PORT Linux ecos Linux ecos ecos eco

Windows RTEMS 1 Danilliu MMI TCP/IP QEMU i386 QEMU ARM POWERPC i386 IPC PC104 uc/os-ii uc/os MMI TCP/IP i386 PORT Linux ecos Linux ecos ecos eco Windows RTEMS 1 Danilliu MMI TCP/IP 80486 QEMU i386 QEMU ARM POWERPC i386 IPC PC104 uc/os-ii uc/os MMI TCP/IP i386 PORT Linux ecos Linux ecos ecos ecos Email www.rtems.com RTEMS ecos RTEMS RTEMS Windows

More information

入學考試網上報名指南

入學考試網上報名指南 入 學 考 試 網 上 報 名 指 南 On-line Application Guide for Admission Examination 16/01/2015 University of Macau Table of Contents Table of Contents... 1 A. 新 申 請 網 上 登 記 帳 戶 /Register for New Account... 2 B. 填

More information

OSI OSI 15% 20% OSI OSI ISO International Standard Organization 1984 OSI Open-data System Interface Reference Model OSI OSI OSI OSI ISO Prototype Prot

OSI OSI 15% 20% OSI OSI ISO International Standard Organization 1984 OSI Open-data System Interface Reference Model OSI OSI OSI OSI ISO Prototype Prot OSI OSI OSI 15% 20% OSI OSI ISO International Standard Organization 1984 OSI Open-data System Interface Reference Model OSI OSI OSI OSI ISO Prototype Protocol OSI OSI OSI OSI OSI O S I 2-1 Application

More information

Microsoft Word - template.doc

Microsoft Word - template.doc HGC efax Service User Guide I. Getting Started Page 1 II. Fax Forward Page 2 4 III. Web Viewing Page 5 7 IV. General Management Page 8 12 V. Help Desk Page 13 VI. Logout Page 13 Page 0 I. Getting Started

More information

LH_Series_Rev2014.pdf

LH_Series_Rev2014.pdf REMINDERS Product information in this catalog is as of October 2013. All of the contents specified herein are subject to change without notice due to technical improvements, etc. Therefore, please check

More information

Computer Architecture

Computer Architecture ECE 3120 Computer Systems Assembly Programming Manjeera Jeedigunta http://blogs.cae.tntech.edu/msjeedigun21 Email: msjeedigun21@tntech.edu Tel: 931-372-6181, Prescott Hall 120 Prev: Basic computer concepts

More information

WTO

WTO 10384 200015128 UDC Exploration on Design of CIB s Human Resources System in the New Stage (MBA) 2004 2004 2 3 2004 3 2 0 0 4 2 WTO Abstract Abstract With the rapid development of the high and new technique

More information

BC04 Module_antenna__ doc

BC04 Module_antenna__ doc http://www.infobluetooth.com TEL:+86-23-68798999 Fax: +86-23-68889515 Page 1 of 10 http://www.infobluetooth.com TEL:+86-23-68798999 Fax: +86-23-68889515 Page 2 of 10 http://www.infobluetooth.com TEL:+86-23-68798999

More information

2015年4月11日雅思阅读预测机经(新东方版)

2015年4月11日雅思阅读预测机经(新东方版) 剑 桥 雅 思 10 第 一 时 间 解 析 阅 读 部 分 1 剑 桥 雅 思 10 整 体 内 容 统 计 2 剑 桥 雅 思 10 话 题 类 型 从 以 上 统 计 可 以 看 出, 雅 思 阅 读 的 考 试 话 题 一 直 广 泛 多 样 而 题 型 则 稳 中 有 变 以 剑 桥 10 的 test 4 为 例 出 现 的 三 篇 文 章 分 别 是 自 然 类, 心 理 研 究 类,

More information

Important Notice SUNPLUS TECHNOLOGY CO. reserves the right to change this documentation without prior notice. Information provided by SUNPLUS TECHNOLO

Important Notice SUNPLUS TECHNOLOGY CO. reserves the right to change this documentation without prior notice. Information provided by SUNPLUS TECHNOLO Car DVD New GUI IR Flow User Manual V0.1 Jan 25, 2008 19, Innovation First Road Science Park Hsin-Chu Taiwan 300 R.O.C. Tel: 886-3-578-6005 Fax: 886-3-578-4418 Web: www.sunplus.com Important Notice SUNPLUS

More information

Windows XP

Windows XP Windows XP What is Windows XP Windows is an Operating System An Operating System is the program that controls the hardware of your computer, and gives you an interface that allows you and other programs

More information

C3_ppt.PDF

C3_ppt.PDF C03-101 1 , 2 (Packet-filtering Firewall) (stateful Inspection Firewall) (Proxy) (Circuit Level gateway) (application-level gateway) (Hybrid Firewall) 2 IP TCP 10.0.0.x TCP Any High Any 80 80 10.0.0.x

More information

KillTest 质量更高 服务更好 学习资料 半年免费更新服务

KillTest 质量更高 服务更好 学习资料   半年免费更新服务 KillTest 质量更高 服务更好 学习资料 http://www.killtest.cn 半年免费更新服务 Exam : JN0-331 Title : SEC,Specialist(JNCIS-SEC) Version : Demo 1 / 10 1. Regarding zone types, which statement is true? A. You cannot assign an

More information

Value Chain ~ (E-Business RD / Pre-Sales / Consultant) APS, Advanc

Value Chain ~ (E-Business RD / Pre-Sales / Consultant) APS, Advanc Key @ Value Chain fanchihmin@yahoo.com.tw 1 Key@ValueChain 1994.6 1996.6 2000.6 2000.10 ~ 2004.10 (E- RD / Pre-Sales / Consultant) APS, Advanced Planning & Scheduling CDP, Collaborative Demand Planning

More information

Simulator By SunLingxi 2003

Simulator By SunLingxi 2003 Simulator By SunLingxi sunlingxi@sina.com 2003 windows 2000 Tornado ping ping 1. Tornado Full Simulator...3 2....3 3. ping...6 4. Tornado Simulator BSP...6 5. VxWorks simpc...7 6. simulator...7 7. simulator

More information

IP TCP/IP PC OS µclinux MPEG4 Blackfin DSP MPEG4 IP UDP Winsock I/O DirectShow Filter DirectShow MPEG4 µclinux TCP/IP IP COM, DirectShow I

IP TCP/IP PC OS µclinux MPEG4 Blackfin DSP MPEG4 IP UDP Winsock I/O DirectShow Filter DirectShow MPEG4 µclinux TCP/IP IP COM, DirectShow I 2004 5 IP TCP/IP PC OS µclinux MPEG4 Blackfin DSP MPEG4 IP UDP Winsock I/O DirectShow Filter DirectShow MPEG4 µclinux TCP/IP IP COM, DirectShow I Abstract The techniques of digital video processing, transferring

More information

一.NETGEAR VPN防火墙产品介绍

一.NETGEAR VPN防火墙产品介绍 NETGEAR VPN NETGEAR 6 http://www.netgear.com.cn - 1 - NETGEAR VPN... 4 1.1 VPN...4 1.2 Dynamic Domain Name Service...4 1.3 Netgear VPN...4 Netgear VPN... 6 2.1 FVS318 to FVS318 IKE Main...7 2.1.1 A VPN

More information

Olav Lundström MicroSCADA Pro Marketing & Sales 2005 ABB - 1-1MRS755673

Olav Lundström MicroSCADA Pro Marketing & Sales 2005 ABB - 1-1MRS755673 Olav Lundström MicroSCADA Pro Marketing & Sales 2005 ABB - 1 - Contents MicroSCADA Pro Portal Marketing and sales Ordering MicroSCADA Pro Partners Club 2005 ABB - 2 - MicroSCADA Pro - Portal Imagine that

More information

UDP 8.2 TCP/IP OSI OSI 3 OSI TCP/IP IP TCP/IP TCP/IP Transport Control Protocol TCP User Datagram Protocol UDP TCP TCP/IP IP TCP TCP/IP TC

UDP 8.2 TCP/IP OSI OSI 3 OSI TCP/IP IP TCP/IP TCP/IP Transport Control Protocol TCP User Datagram Protocol UDP TCP TCP/IP IP TCP TCP/IP TC 8 TCP/IP TCP/IP TCP OSI 8.1 OSI 4 end to end A B FTP OSI Connection Management handshake Flow Control Error Detection IP Response to User s Request TCP/IP TCP 181 UDP 8.2 TCP/IP OSI OSI 3 OSI 3 8.1 TCP/IP

More information

AL-M200 Series

AL-M200 Series NPD4754-00 TC ( ) Windows 7 1. [Start ( )] [Control Panel ()] [Network and Internet ( )] 2. [Network and Sharing Center ( )] 3. [Change adapter settings ( )] 4. 3 Windows XP 1. [Start ( )] [Control Panel

More information

<4D6963726F736F667420576F7264202D2032303130C4EAC0EDB9A4C0E04142BCB6D4C4B6C1C5D0B6CFC0FDCCE2BEABD1A15F325F2E646F63>

<4D6963726F736F667420576F7264202D2032303130C4EAC0EDB9A4C0E04142BCB6D4C4B6C1C5D0B6CFC0FDCCE2BEABD1A15F325F2E646F63> 2010 年 理 工 类 AB 级 阅 读 判 断 例 题 精 选 (2) Computer mouse How does the mouse work? We have to start at the bottom, so think upside down for now. It all starts with mouse ball. As the mouse ball in the bottom

More information

一、选择题

一、选择题 计 算 机 网 络 基 础 第 7 章 练 习 思 考 与 认 识 活 动 一 选 择 题 1. 下 面 命 令 中, 用 于 检 查 WINDOWS2000 下 TCP/IP 配 置 信 息 的 是 ( ) A. cmd B. nslookup C. ipconfig D. ping 2. 内 部 网 关 协 议 RIP 是 一 种 广 泛 使 用 的 基 于 距 离 矢 量 算 法 的 协 议

More information

Chap6.ppt

Chap6.ppt Computer Networks v4 cs.sjtu 12/21/12 6 Internet ftp://ftp.cs.sjtu.edu.cn/ybzhang 61 / 110 Computer Networks v4 cs.sjtu 12/21/12 ftp://ftp.cs.sjtu.edu.cn/ybzhang 62 / 110 Computer Networks v4 cs.sjtu 12/21/12

More information

自由軟體教學平台

自由軟體教學平台 NCHC Opensource task force DRBL steven@nchc.gov.tw, c00hkl00@nchc.gov.tw National Center for High-Performance Computing http://www.nchc.gov.tw Jan, 2003 1 2003/1/28 ( ) 09:00-10:30 10:40-12:00 Linux 13:00-14:30

More information

ch_code_infoaccess

ch_code_infoaccess 地 產 代 理 監 管 局 公 開 資 料 守 則 2014 年 5 月 目 錄 引 言 第 1 部 段 數 適 用 範 圍 1.1-1.2 監 管 局 部 門 1.1 紀 律 研 訊 1.2 提 供 資 料 1.3-1.6 按 慣 例 公 布 或 供 查 閱 的 資 料 1.3-1.4 應 要 求 提 供 的 資 料 1.5 法 定 義 務 及 限 制 1.6 程 序 1.7-1.19 公 開 資

More information

自由軟體教學平台

自由軟體教學平台 NCHC Opensource task force Steven Shiau steven@nchc.gov.tw National Center for High-Performance Computing Sep 10, 2002 1 Outline 1. 2. 3. Service DHCP, TFTP, NFS, NIS 4. 5. 2 DRBL (diskless remote boot

More information

自由軟體教學平台

自由軟體教學平台 NCHC Opensource task force DRBL c00hkl00@nchc.gov.tw, steven@nchc.gov.tw National Center for High-Performance Computing http://www.nchc.gov.tw Dec, 2002 1 Outline 1. 2. DRBL 3. 4. Service DHCP, TFTP, NFS,

More information

计算机网络概论

计算机网络概论 TCP/IP 1. 2. IP 3. TCP/IP 4. IPv6 1 TCP/IP 7 6 5 4 Application Presentation Session Transport 3 Network 2 1 Data Data link link Physical 2 IP IPv4 2.1 IPv4 2.1 IPv4 2.1 IPv4 2.1 IPv4- 2.1 IPv4- 2.1 IPv4-

More information

end to end 7.2 OSI 7 OSI 3 A B 7.2 Packet Routing LAN WAN 7.1.2 141

end to end 7.2 OSI 7 OSI 3 A B 7.2 Packet Routing LAN WAN 7.1.2 141 7 IP IP ARP ICMP IP OSI 3 7.1 7.1.1 7.1 DTE0/1 DCE0/1 DCE0/1 DCE2DCE3 DCE4 7.1 DTE1 DTE2 DCE1 DTE1 DCE2 DCE3 DCE4 MAC DCE2 DCE5 DTE1 DCE1 DCE3 DCE6 DTE2 DCE4 7.1 140 end to end 7.2 OSI 7 OSI 3 A B 7.2

More information

Microsoft PowerPoint - STU_EC_Ch08.ppt

Microsoft PowerPoint - STU_EC_Ch08.ppt 樹德科技大學資訊工程系 Chapter 8: Counters Shi-Huang Chen Fall 2010 1 Outline Asynchronous Counter Operation Synchronous Counter Operation Up/Down Synchronous Counters Design of Synchronous Counters Cascaded Counters

More information

ebook140-11

ebook140-11 11 VPN Windows NT4 B o r d e r M a n a g e r VPN VPN V P N V P N V P V P N V P N TCP/IP 11.1 V P N V P N / ( ) 11.1.1 11 V P N 285 2 3 1. L A N LAN V P N 10MB 100MB L A N VPN V P N V P N Microsoft PPTP

More information

Chinese oil import policies and reforms 随 着 经 济 的 发 展, 目 前 中 国 石 油 消 费 总 量 已 经 跃 居 世 界 第 二 作 为 一 个 负 责 任 的 大 国, 中 国 正 在 积 极 推 进 能 源 进 口 多 元 化, 鼓 励 替 代

Chinese oil import policies and reforms 随 着 经 济 的 发 展, 目 前 中 国 石 油 消 费 总 量 已 经 跃 居 世 界 第 二 作 为 一 个 负 责 任 的 大 国, 中 国 正 在 积 极 推 进 能 源 进 口 多 元 化, 鼓 励 替 代 Chinese oil import policies and reforms SINOPEC EDRI 2014.8 Chinese oil import policies and reforms 随 着 经 济 的 发 展, 目 前 中 国 石 油 消 费 总 量 已 经 跃 居 世 界 第 二 作 为 一 个 负 责 任 的 大 国, 中 国 正 在 积 极 推 进 能 源 进 口 多 元 化,

More information

1. 請 先 檢 查 包 裝 內 容 物 AC750 多 模 式 無 線 分 享 器 安 裝 指 南 安 裝 指 南 CD 光 碟 BR-6208AC 電 源 供 應 器 網 路 線 2. 將 設 備 接 上 電 源, 即 可 使 用 智 慧 型 無 線 裝 置 進 行 設 定 A. 接 上 電 源

1. 請 先 檢 查 包 裝 內 容 物 AC750 多 模 式 無 線 分 享 器 安 裝 指 南 安 裝 指 南 CD 光 碟 BR-6208AC 電 源 供 應 器 網 路 線 2. 將 設 備 接 上 電 源, 即 可 使 用 智 慧 型 無 線 裝 置 進 行 設 定 A. 接 上 電 源 1. 請 先 檢 查 包 裝 內 容 物 AC750 多 模 式 無 線 分 享 器 安 裝 指 南 安 裝 指 南 CD 光 碟 BR-6208AC 電 源 供 應 器 網 路 線 2. 將 設 備 接 上 電 源, 即 可 使 用 智 慧 型 無 線 裝 置 進 行 設 定 A. 接 上 電 源 B. 啟 用 智 慧 型 裝 置 的 無 線 Wi-Fi C. 選 擇 無 線 網 路 名 稱 "edimax.setup"

More information

PowerPoint Presentation

PowerPoint Presentation Decision analysis 量化決策分析方法專論 2011/5/26 1 Problem formulation- states of nature In the decision analysis, decision alternatives are referred to as chance events. The possible outcomes for a chance event

More information

C o n t e n t s...7... 15 1. Acceptance... 17 2. Allow Love... 19 3. Apologize... 21 4. Archangel Metatron... 23 5. Archangel Michael... 25 6. Ask for

C o n t e n t s...7... 15 1. Acceptance... 17 2. Allow Love... 19 3. Apologize... 21 4. Archangel Metatron... 23 5. Archangel Michael... 25 6. Ask for Doreen Virtue, Ph.D. Charles Virtue C o n t e n t s...7... 15 1. Acceptance... 17 2. Allow Love... 19 3. Apologize... 21 4. Archangel Metatron... 23 5. Archangel Michael... 25 6. Ask for a Sign... 27 7.

More information

Microsoft Word - TIP006SCH Uni-edit Writing Tip - Presentperfecttenseandpasttenseinyourintroduction readytopublish

Microsoft Word - TIP006SCH Uni-edit Writing Tip - Presentperfecttenseandpasttenseinyourintroduction readytopublish 我 难 度 : 高 级 对 们 现 不 在 知 仍 道 有 听 影 过 响 多 少 那 次 么 : 研 英 究 过 文 论 去 写 文 时 作 的 表 技 引 示 巧 言 事 : 部 情 引 分 发 言 该 生 使 在 中 用 过 去, 而 现 在 完 成 时 仅 表 示 事 情 发 生 在 过 去, 并 的 哪 现 种 在 时 完 态 成 呢 时? 和 难 过 道 去 不 时 相 关? 是 所 有

More information

HCD0174_2008

HCD0174_2008 Reliability Laboratory Page: 1 of 5 Date: December 23, 2008 WINMATE COMMUNICATION INC. 9 F, NO. 111-6, SHING-DE RD., SAN-CHUNG CITY, TAIPEI, TAIWAN, R.O.C. The following merchandise was submitted and identified

More information

Symantec™ Sygate Enterprise Protection 防护代理安装使用指南

Symantec™ Sygate Enterprise Protection 防护代理安装使用指南 Symantec Sygate Enterprise Protection 防 护 代 理 安 装 使 用 指 南 5.1 版 版 权 信 息 Copyright 2005 Symantec Corporation. 2005 年 Symantec Corporation 版 权 所 有 All rights reserved. 保 留 所 有 权 利 Symantec Symantec 徽 标 Sygate

More information

AL-MX200 Series

AL-MX200 Series PostScript Level3 Compatible NPD4760-00 TC Seiko Epson Corporation Seiko Epson Corporation ( ) Seiko Epson Corporation Seiko Epson Corporation Epson Seiko Epson Corporation Apple Bonjour ColorSync Macintosh

More information

Microsoft PowerPoint - ARC110_栾跃.ppt

Microsoft PowerPoint - ARC110_栾跃.ppt ARC110 软 件 构 架 设 计 的 原 则 和 指 南 课 程 内 容 概 述 介 绍 和 引 言 软 件 构 架 和 构 架 师 软 件 构 架 的 设 计 模 式 框 架 和 参 照 设 计 自 我 介 绍 第 一 代 自 费 留 学 生 : 美 国 南 伊 利 诺 州 立 大 学 (SIUE) 电 机 工 程 学 士 (1984) 及 硕 士 学 位 (1985) 历 任 OwensIllinois,

More information

Microsoft PowerPoint - talk8.ppt

Microsoft PowerPoint - talk8.ppt Adaptive Playout Scheduling Using Time-scale Modification Yi Liang, Nikolaus Färber Bernd Girod, Balaji Prabhakar Outline QoS concerns and tradeoffs Jitter adaptation as a playout scheduling scheme Packet

More information

中国计算机软件专业技术资格和水平考试

中国计算机软件专业技术资格和水平考试 全 国 计 算 机 技 术 与 软 件 专 业 技 术 资 格 ( 水 平 ) 考 试 2009 年 下 半 年 网 络 工 程 师 上 午 试 卷 ( 考 试 时 间 9 : 00~11 : 30 共 150 分 钟 ) 请 按 下 述 要 求 正 确 填 写 答 题 卡 1. 在 答 题 卡 的 指 定 位 置 上 正 确 写 入 你 的 姓 名 和 准 考 证 号, 并 用 正 规 2B 铅

More information

Preface This guide is intended to standardize the use of the WeChat brand and ensure the brand's integrity and consistency. The guide applies to all d

Preface This guide is intended to standardize the use of the WeChat brand and ensure the brand's integrity and consistency. The guide applies to all d WeChat Search Visual Identity Guidelines WEDESIGN 2018. 04 Preface This guide is intended to standardize the use of the WeChat brand and ensure the brand's integrity and consistency. The guide applies

More information

WWW PHP

WWW PHP WWW PHP 2003 1 2 function function_name (parameter 1, parameter 2, parameter n ) statement list function_name sin, Sin, SIN parameter 1, parameter 2, parameter n 0 1 1 PHP HTML 3 function strcat ($left,

More information

Bus Hound 5

Bus Hound 5 Bus Hound 5.0 ( 1.0) 21IC 2007 7 BusHound perisoft PC hound Bus Hound 6.0 5.0 5.0 Bus Hound, IDE SCSI USB 1394 DVD Windows9X,WindowsMe,NT4.0,2000,2003,XP XP IRP Html ZIP SCSI sense USB Bus Hound 1 Bus

More information

1 1 2 OSPF RIP 2

1 1 2 OSPF RIP 2 MPLS VPN 1. TCP/IP IP IP IP IP 1 1 2 OSPF RIP 2 2 RIP OSPF BGP DVMRP IS- IS IP 1. Unicast Routing Protocol Multicast Routing Protocol RIP OSPF BGP IS-IS DVMRP PIM-SM PIM-DM 2. IGP EGP IGPRIP OSPF IS-ISEGP

More information

R3105+ ADSL

R3105+ ADSL ... 1 1 1... 1 1 2... 1... 3 2 1... 3 2 2... 3 2 3... 5 2 4... 5 2 4 1... 5... 7 3 1... 7 3 2... 8 3 2 1... 8 3 2 2... 9 3 3... 12 3 3 1... 13 3 3 2 WAN... 16 3 3 3 LAN... 21 3 3 4 NAT... 22 3 3 5... 24

More information

第4章网络层_2_.doc

第4章网络层_2_.doc ( 章 节 专 题 首 页 ) 课 程 名 称 计 算 机 网 络 章 节 专 题 第 4 章 网 络 层 ( 二 ) 1.IP 数 据 报 的 格 式 ; 教 学 目 标 及 基 本 要 求 2. 理 解 子 网 划 分 的 意 义, 掌 握 如 何 划 分 子 网 ; 3. 理 解 超 网 构 造 原 理, 掌 握 构 造 超 网 ; 4. 知 道 网 际 控 制 报 文 协 议 ICMP 及

More information

ap15_chinese_interpersoanal_writing_ _response

ap15_chinese_interpersoanal_writing_ _response 2015 SCORING GUIDELINES Interpersonal Writing: 6 EXCELLENT excellence in 5 VERY GOOD Suggests excellence in 4 GOOD 3 ADEQUATE Suggests 2 WEAK Suggests lack of 1 VERY WEAK lack of 0 UNACCEPTABLE Contains

More information

Microsoft PowerPoint - ATF2015.ppt [相容模式]

Microsoft PowerPoint - ATF2015.ppt [相容模式] Improving the Video Totalized Method of Stopwatch Calibration Samuel C.K. Ko, Aaron Y.K. Yan and Henry C.K. Ma The Government of Hong Kong Special Administrative Region (SCL) 31 Oct 2015 1 Contents Introduction

More information

Microsoft PowerPoint - ryz_030708_pwo.ppt

Microsoft PowerPoint - ryz_030708_pwo.ppt Long Term Recovery of Seven PWO Crystals Ren-yuan Zhu California Institute of Technology CMS ECAL Week, CERN Introduction 20 endcap and 5 barrel PWO crystals went through (1) thermal annealing at 200 o

More information

untitled

untitled 7.1 7.1.1 IP R1 N N,R1,M IP 1 7.1.2 [Quidway]display ip routing Routing Tables: Destination/Mask proto pref Metric Nexthop Interface 0.0.0.0/0 Static 60 0 120.0.0.2 Serial0 8.0.0.0/8 RIP 100 3 120.0.0.2

More information

1.ai

1.ai HDMI camera ARTRAY CO,. LTD Introduction Thank you for purchasing the ARTCAM HDMI camera series. This manual shows the direction how to use the viewer software. Please refer other instructions or contact

More information

Microsoft PowerPoint - ch6 [相容模式]

Microsoft PowerPoint - ch6 [相容模式] UiBinder wzyang@asia.edu.tw UiBinder Java GWT UiBinder XML UI i18n (widget) 1 2 UiBinder HelloWidget.ui.xml: UI HelloWidgetBinder HelloWidget.java XML UI Owner class ( Composite ) UI XML UiBinder: Owner

More information

10384 X2009230010 UDC The Design and Implementation of Small and Medium-sized Courier Company Logistics Vehicle Scheduling System 2012 06 Abstract With the arrival of the information age, tremendous

More information

BYOD Http Redirect convergence Client (1) 2008R2 NLB( ) (2) NLB Unicast mode switch flooding (arp ) NLB DNS Redirect 1. Round-Robin DNS DNS IP/DNS Cli

BYOD Http Redirect convergence Client (1) 2008R2 NLB( ) (2) NLB Unicast mode switch flooding (arp ) NLB DNS Redirect 1. Round-Robin DNS DNS IP/DNS Cli BYOD 204 2015 GoogleHicloud (Load Balance) Server Load Balance Link Load Balance Server Redirect 1. URL Redirect redirector URL redirect Real Server Client HTTP Real Server Web Client 2 (1) URL Redirect

More information

Improved Preimage Attacks on AES-like Hash Functions: Applications to Whirlpool and Grøstl

Improved Preimage Attacks on AES-like Hash Functions: Applications to Whirlpool and Grøstl SKLOIS (Pseudo) Preimage Attack on Reduced-Round Grøstl Hash Function and Others Shuang Wu, Dengguo Feng, Wenling Wu, Jian Guo, Le Dong, Jian Zou March 20, 2012 Institute. of Software, Chinese Academy

More information

PS PS GMM SM.zte.com.

PS PS GMM SM.zte.com. WBUB-010-1 ZXWN PS V0411.zte.com. PS PS GMM SM.zte.com. PS TMSI Packet-Temporary mobile subscriber identification number P-TMSI) GPRS MS P- TMSI 4 BCD 3G TS 23.003 MSC SGSN SGSN P-TMSI 11 MSC TMSI 00 01

More information

K301Q-D VRT中英文说明书141009

K301Q-D VRT中英文说明书141009 THE INSTALLING INSTRUCTION FOR CONCEALED TANK Important instuction:.. Please confirm the structure and shape before installing the toilet bowl. Meanwhile measure the exact size H between outfall and infall

More information

Microsoft Word - HSK使用手册.doc

Microsoft Word - HSK使用手册.doc HSK / New HSK Online Mock Test/Practices Student User Manual Table of contents New User... 2 1.1 Register... 2 1.2 Login... 3 1.3 Homepage... 4 Free Test... 4 2.1 Start... 5 2.2 Results... 6 Mock Test...

More information

Knowledge and its Place in Nature by Hilary Kornblith

Knowledge and its Place in Nature by Hilary Kornblith Deduction by Daniel Bonevac Chapter 7 Quantified Natural Deduction Quantified Natural Deduction As with truth trees, natural deduction in Q depends on the addition of some new rules to handle the quantifiers.

More information

关 于 瓶 装 水, 你 不 得 不 知 的 8 件 事 情 关 于 瓶 装 水, 你 不 得 不 知 的 8 件 事 情 1 水 质 : 瓶 装 的, 不 一 定 就 是 更 好 的 2 生 产 : 监 管 缺 位, 消 费 者 暴 露 于 风 险 之 中 人 们 往 往 假 定 瓶 装 水 是

关 于 瓶 装 水, 你 不 得 不 知 的 8 件 事 情 关 于 瓶 装 水, 你 不 得 不 知 的 8 件 事 情 1 水 质 : 瓶 装 的, 不 一 定 就 是 更 好 的 2 生 产 : 监 管 缺 位, 消 费 者 暴 露 于 风 险 之 中 人 们 往 往 假 定 瓶 装 水 是 关 于 瓶 装 水, 你 不 得 不 知 的 件 事 情 关 于 瓶 装 水, 你 不 得 不 知 的 8 件 事 情 关 于 瓶 装 水, 你 不 得 不 知 的 8 件 事 情 1 水 质 : 瓶 装 的, 不 一 定 就 是 更 好 的 2 生 产 : 监 管 缺 位, 消 费 者 暴 露 于 风 险 之 中 人 们 往 往 假 定 瓶 装 水 是 干 净 安 全 健 康 的, 广 告 传 递

More information

Logitech Wireless Combo MK45 English

Logitech Wireless Combo MK45 English Logitech Wireless Combo MK45 Setup Guide Logitech Wireless Combo MK45 English................................................................................... 7..........................................

More information

UDC The Design and Implementation of a Specialized Search Engine Based on Robot Technology 厦门大学博硕士论文摘要库

UDC The Design and Implementation of a Specialized Search Engine Based on Robot Technology 厦门大学博硕士论文摘要库 10384 200128011 UDC The Design and Implementation of a Specialized Search Engine Based on Robot Technology 2004 5 2004 2004 2004 5 World Wide Web Robot Web / (Focused Crawling) Web Meta data Web Web I

More information

IP-Routing-05.pdf

IP-Routing-05.pdf RI P R I P - 2 RIP -1 R I P - 2 DV RIP -1 RIP-2 16... RIP-2 RIP-2 RIP -1 R I P - 2 RIP-2 RIP-2 RIP-2 V L S M disc ontiguous addr ess sp ace C I D R Cla ssless In ter -Dom ain Routing 121 1 2 2 IP RIP-2

More information

第 7 章 下 一 代 网 际 协 议 IPv6 141 足 的 措 施 只 能 是 权 宜 之 计 (3) 路 由 表 膨 胀 早 期 IPv4 的 地 址 结 构 也 造 成 了 路 由 表 的 容 量 过 大 IPv4 地 址 早 期 为 网 络 号 + 主 机 号 结 构, 后 来 引 入

第 7 章 下 一 代 网 际 协 议 IPv6 141 足 的 措 施 只 能 是 权 宜 之 计 (3) 路 由 表 膨 胀 早 期 IPv4 的 地 址 结 构 也 造 成 了 路 由 表 的 容 量 过 大 IPv4 地 址 早 期 为 网 络 号 + 主 机 号 结 构, 后 来 引 入 第 7 章 下 一 代 网 际 协 议 IPv6 本 章 是 有 关 下 一 代 网 际 协 议 IPv6 的 描 述, 重 点 介 绍 IPv6 的 产 生 原 因 IPv6 的 地 址 与 IPv6 首 部 格 式 等 通 过 本 章 的 学 习, 读 者 应 重 点 掌 握 和 理 解 以 下 内 容 : IPv4 向 IPv6 发 展 的 必 然 性 IPv6 的 新 特 性 IPv6 地

More information

Microsoft PowerPoint - Performance Analysis of Video Streaming over LTE using.pptx

Microsoft PowerPoint - Performance Analysis of Video Streaming over LTE using.pptx ENSC 427 Communication Networks Spring 2016 Group #2 Project URL: http://www.sfu.ca/~rkieu/ensc427_project.html Amer, Zargham 301149920 Kieu, Ritchie 301149668 Xiao, Lei 301133381 1 Roadmap Introduction

More information

ch08.PDF

ch08.PDF 8-1 CCNA 8.1 CLI 8.1.1 8-2 8-3 8.1.21600 2500 1600 2500 / IOS 8-4 8.2 8.2.1 A 5 IP CLI 1600 2500 8-5 8.1.2-15 Windows 9598NT 2000 HyperTerminal Hilgraeve Microsoft Cisco HyperTerminal Private Edition (PE)

More information

经华名家讲堂

经华名家讲堂 5.1 5.1.1 5.1.2 5.2 5.2.1 5.2.2 5.2.3 5.2.4 5.2.5 5.3 5.3.1 5.3.2 5.3.3 / 5.3.4 / 5.3.5 / 5.4 Internet 5.4.1 Internet 5.4.2 Intranet 1. 2. 1 31 5 5.1 5.1.1 Internet 1 Host 20 60 IBM 2000 2 20 60 20 60

More information

2. 佔 中 對 香 港 帶 來 以 下 影 響 : 正 面 影 響 - 喚 起 市 民 對 人 權 及 ( 專 制 ) 管 治 的 關 注 和 討 論 o 香 港 市 民 總 不 能 一 味 認 命, 接 受 以 後 受 制 於 中 央, 沒 有 機 會 選 出 心 中 的 理 想 特 首 o 一

2. 佔 中 對 香 港 帶 來 以 下 影 響 : 正 面 影 響 - 喚 起 市 民 對 人 權 及 ( 專 制 ) 管 治 的 關 注 和 討 論 o 香 港 市 民 總 不 能 一 味 認 命, 接 受 以 後 受 制 於 中 央, 沒 有 機 會 選 出 心 中 的 理 想 特 首 o 一 220 參 考 答 案 專 題 1. 公 民 抗 命 與 革 命 的 異 同 如 下 : 公 民 抗 命 革 命 相 同 之 處 目 的 兩 種 行 動 都 是 為 了 抗 拒 當 權 政 府 不 受 歡 迎 的 決 定 及 政 策 方 法 兩 者 都 是 在 嘗 試 其 他 合 法 的 抗 爭 行 動 後, 無 可 奈 何 的 最 後 手 段 不 同 之 處 目 的 只 是 令 政 府 的 某 些

More information