Presentation is loading. Please wait.

Presentation is loading. Please wait.

The University of Adelaide, School of Computer Science

Similar presentations


Presentation on theme: "The University of Adelaide, School of Computer Science"— Presentation transcript:

1 The University of Adelaide, School of Computer Science
14 January 2019 Computer Networks, 5th Edition Chapter 9 Applications Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 2 — Instructions: Language of the Computer

2 FIGURE 9.1 Sequence of mail gateways store and forward email messages.
Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved

3 Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 9.2 IMAP state transition diagram. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved

4 Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 9.3 The Firefox web browser. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved

5 Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 9.4 HTTP 1.0 behavior. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved

6 Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 9.5 HTTP 1.1 behavior with persistent connections. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved

7 Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 9.6 SOAP message structure. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved

8 Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 9.7 A session directory tool displays information extracted from SDP messages. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved

9 FIGURE 9.8 Establishing communication through SIP proxies.
Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved

10 Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 9.9 Message flow for a basic SIP session. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved

11 Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 9.10 Devices in an H.323 network. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved

12 Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 9.11 Differentiated Services applied to a VOIP application. DiffServ queueing is applied only on the upstream link from customer router to ISP. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved

13 Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 9.12 Admission control using session control protocol. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved

14 Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 9.13 Co-ordination of SIP signalling and resource reservation. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved

15 Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 9.14 Names translated into addresses, where the numbers 1 to 5 show the sequence of steps in the process. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved

16 Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 9.15 Example of a domain hierarchy. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved

17 Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 9.16 Domain hierarchy partitioned into zones. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved

18 Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 9.17 Hierarchy of name servers. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved

19 Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 9.18 Name resolution in practice, where the numbers 1 to 10 show the sequence of steps in the process. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved

20 Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 9.19 Overlay network layered on top of a physical network. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved

21 Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 9.20 Overlay nodes tunnel through physical nodes. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved

22 Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 9.21 Alternative multicast trees mapped onto a physical topology. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved

23 Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 9.22 Multicast tree embedded in an overlay mesh. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved

24 Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 9.23 The triangle inequality does not necessarily hold in networks. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved

25 Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 9.24 Example topology of a Gnutella peer-to-peer network. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved

26 Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 9.25 Both nodes and objects map (hash) onto the ID space, where objects are maintained at the nearest node in this space. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved

27 Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 9.26 Objects are located by routing through the peer-to-peer overlay network. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved

28 Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 9.27 Example routing table at the node with ID 65a 1 f cx. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved

29 Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 9.28 Adding a node to the network. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved

30 Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 9.29 Peers in a BitTorrent swarm download from other peers that may not yet have the complete file. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved

31 Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 9.30 Components in a Content Distribution Network (CDN). Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved


Download ppt "The University of Adelaide, School of Computer Science"

Similar presentations


Ads by Google