Those Early Days The game of Mem (Tolly Holt) somewhere in a Venice den of software geeks near the Pacific Ocean.

Slides:



Advertisements
Similar presentations
FatMax Licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 2.5 LicenseCreative Commons Attribution-NonCommercial-ShareAlike 2.5.
Advertisements

TCP/IP MODEL Maninder Kaur
Chapter 17 Networking Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design Principles, 6/E William.
Security in VoIP Networks Juan C Pelaez Florida Atlantic University Security in VoIP Networks Juan C Pelaez Florida Atlantic University.
CCNA – Network Fundamentals
29.1 Chapter 29 Multimedia Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Data and Computer Communications Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 2 – Protocol Architecture, TCP/IP, and Internet-Based.
Data and Computer Communications Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 2 – Protocol Architecture, TCP/IP, and Internet-Based.
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Application Layer – Lecture.
Review of Chapters 12, 13 & 14 Transport Layer Session Layer Presentation Layer.
VoIP Voice Transmission Over Data Network. What is VoIP?  A method for Taking analog audio signals Turning audio signals into digital data Digital data.
Introduction to Management Information Systems Chapter 5 Data Communications and Internet Technology HTM 304 Fall 07.
Networking Support In Java Nelson Padua-Perez Chau-Wen Tseng Department of Computer Science University of Maryland, College Park.
TCP/IP history Skills: none IT concepts: Internetwork This work is licensed under a Creative Commons Attribution-Noncommercial- Share Alike 3.0 License.
Reduced TCP Window Size for VoIP in Legacy LAN Environments Nikolaus Färber, Bernd Girod, Balaji Prabhakar.
The Internet and the World Wide Web ICS 61– Winter, 2015.
Internet Architecture Two computers, anywhere in the world, following certain hardware, software, protocol specifications, can communicate, reliably even.
Vocabulary URL = uniform resource locator: web address protocol –set of rules that networked computers follow in order to share data and coordinate communications.
Dr. Philip Cannata 1 Principles of Network Applications.
Wireshark and TCP/IP Basics ACM SIG-Security Lance Pendergrass.
15-1 More Chapter 15 Goals Compare and contrast various technologies for home Internet connections Explain packet switching Describe the basic roles of.
Network Architecture and Protocol Concepts. Network Architectures (1) The network provides one or more communication services to applications –A service.
The generation, storage, and movement of information are central to managing an enterprise’s business processes As a result, businesses must ensure.
TCP/IP Reference Model For more notes and topics visit: eITnotes.com.
Data and Computer Communications Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 2 – Protocol Architecture, TCP/IP, and Internet-Based.
Chapter 4 Computer Networks – Part 1
Networked Games - consistency and real-time Objectives – –Understand the problems associated with networked games. –Realize the importance of satisfying.
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012.
Chapter 9.
Lecture 2 TCP/IP Protocol Suite Reference: TCP/IP Protocol Suite, 4 th Edition (chapter 2) 1.
The Internet: Present Broadband Packet Switching: A Personal Perspective Meehwa Kim.
THE OSI MODEL AND THE TCP/IP PROTOCOL SUITE CS 1202 Lectur3 part2.
Pindaro Demertzoglou Lally School of M&T Internet-Intranets-Extranets.
ZData hierarchy (Figure 6.1) ybit - smallest piece of data ybyte – character yfield - group of bytes yrecord - related fields yfile - related records ydatabase.
Summary - Part 1 - Objectives The purpose of this basic IP technology training is to explain video over an IP network. This training describes how video.
CPS Today’s topics Computer Applications Computer Communications Upcoming Computer Security ( Great Ideas, Chapter 11) Reading Great Ideas, Chapter.
The Internet When was it created and why?. What Is the Internet? A network of computer networks. It connects networks all over the world through the use.
What makes a network good? Ch 2.1: Principles of Network Apps 2: Application Layer1.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Services Networking for Home and Small Businesses – Chapter 6.
Data and Computer Communications Chapter 2 – Protocol Architecture, TCP/IP, and Internet-Based Applications.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 OSI Transport Layer Network Fundamentals – Chapter 4.
1 Next Few Classes Networking basics Protection & Security.
The Internet Trisha Cummings ITE115. What is the Internet? The Internet is a world-wide network of computer networks that use a common communications.
Sockets process sends/receives messages to/from its socket
Networks CS105. What is a computer network? A computer network is a collection of computing devices that are connected in various ways so that they can.
1 Networking Chapter Distributed Capabilities Communications architectures –Software that supports a group of networked computers Network operating.
Chapter 1 Communication Networks and Services Network Architecture and Services.
Transport Layer COM211 Communications and Networks CDA College Theodoros Christophides
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012.
The Internet The History and Future of the Internet.
1 Internet Technologies CSC Internet Internet is a communication technology. Like telephone it enables people to communicate. Telephones enabled.
Lecture (Mar 23, 2000) H/W Assignment 3 posted on Web –Due Tuesday March 28, 2000 Review of Data packets LANS WANS.
1 3 Computing System Fundamentals 3.4 Networked Computer Systems.
Internet multimedia: simplest approach audio, video not streamed: r no, “pipelining,” long delays until playout! r audio or video stored in file r files.
Reading TCP/IP Protocol. Training target: Read the following reading materials and use the reading skills mentioned in the passages above. You may also.
Voice Over Internet Protocol (VoIP) Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Presentation 5 – VoIP and the OSI Model.
Chapter 16 - TCP: Software For Reliable Communication Introduction A Packet Switching System Can Be Overrun (merging highways) TCP Helps IP Guarantee Delivery.
CS4315A. Berrached:CMS:UHD1 Introduction to Operating Systems Chapter 1.
COMPUTER NETWORKS Hwajung Lee. Image Source:
CSCI-100 Introduction to Computing The Network. Network Fundamentals A computer network consists of two or more computers linked together to exchange.
UDP: User Datagram Protocol. What Can IP Do? Deliver datagrams to hosts – The IP address in a datagram header identify a host – treats a computer as an.
Data and Computer Communications Chapter 2 – Protocol Architecture, TCP/IP, and Internet-Based Applications.
Voice Over Internet Protocol Nelson Kattula Computer Science, Masters.
How is all that data traffic controlled on the Internet?
Telemedicine.
Mitel Networks SX-200 ICP Sales Training Terminology.
Web Development & Design Chapter 1, Sections 4, 5 & 6
NETWORKING TECHNOLOGIES (II)
Chapter 8 – Data switching and routing
Presentation transcript:

Those Early Days The game of Mem (Tolly Holt) somewhere in a Venice den of software geeks near the Pacific Ocean

Danny Cohen, the Eclectic FIELDS OF RESEARCH INTEREST * High Performance LANs, and Multi-Computing * Distributed Realtime Simulation * Realtime Interactive Computer Graphics. * Network Security * Information Architecture * BM/C3 (Battle Management / Command, Control, and Communication) * Realtime Digital Computer Communication (Computer Networks). * Application of Digital Computers to Aviation (Cockpit Information Systems). * Flight Simulation, and Computer Image Generation (CIG). * Very Large Scale Integration (VLSI). * Computer Architecture and Parallel Processing. * Secure Digital Speech and Video Communication over Computer Networks. * Mathematical Programming and Operations Research.

A Few of Danny’s Contributions His early work on dynamic perspective showed how to rotate 3D images on a general purpose computer (anticipating virtual reality) and how to do 3D-clipping interactively in realtime. The MOSIS system that Danny initiated and developed has been operational for over 30 years. Danny was one of the first to promote separating IP from TCP, which led to the adoption of UDP as a key protocol in the Interenet; UDP supports the vast amount of streaming traffic in the Internet. His groundbreaking work on the Network Voice Protocol (NVP) defined the protocol that was used to develop the first system that proved the applicability of packet switching networks to voice (and later to video).

Short response time High Throughput High Reliability Interactive Traffic Real-Time Traffic File Transfer

Endians This is an attempt to stop a war. I hope it is not too late and that somehow, magically perhaps, peace will prevail again. The latecomers into the arena believe that the issue is: "What is the proper byte order in messages?". The root of the conflict lies much deeper than that. It is the question of which bit should travel first, the bit from the little end of the word, or the bit from the big end of the word? The followers of the former approach are called the Little- Endians, and the followers of the latter are called the Big-Endians – MEMORY ORDER, TRANSMISSION ORDER, ORDER OF NUMBERS, INTEGERS vs. FRACTIONS “Endian” has over 4,000,000 hits notes/ien/ien137.txt

An Internet Pioneer

A Poem by Danny "In the Beginning, ARPA created the ARPANET. And the ARPANET was without form and void. And darkness was upon the deep. And the spirit of ARPA moved upon the face of the network and ARPA said, 'Let there be a protocol,' and there was a protocol. And ARPA saw that it was good. And ARPA said, 'Let there be more protocols,' and it was so. And ARPA saw that it was good. And ARPA said, 'Let there be more networks,' and it was so.”

An Accomplice in Crime September 1973 University of Sussex, Brighton, England Housed in the dormitories We jogged the hills of Brighton The Razor The Night Owl The Criminal Courier

Danny at ISI But where is his phone?

An Aircraft Instrument Panel

Running to Go Sailing, or Flying, or Biking

Early VOIP (with Sunglasses)

Early VOIP (without Sunglasses)

Danny Then in a Turtleneck

Danny now in a Tux!