Premium Essay

Packet Switching

In: Computers and Technology

Submitted By Raiymbek
Words 3704
Pages 15
Некоммерческое Акционерное Общество
АЛМАТИНСКИЙ УНИВЕРСИТЕТ ЭНЕРГЕТИКИ И СВЯЗИ

Кафедра иностранных языков

СЕМЕСТРОВАЯ РАБОТА №2
По дисциплине: «Английский язык»
Технический перевод

Специальность: 6M071900 – Радиотехника электроника и телекоммуникации Выполнила: Шаймагамбетова А.А. № з. к.: 12М3068 Группа СССп-12-01 Проверила: Бухина С.Б. __________________________ «_____»_________________________2012 год

Алматы 2012 СОДЕРЖАНИЕ

1 Annotation 3 2 PACKET SWITCHING 3 3 КОММУТАЦИЯ ПАКЕТОВ 6 ТЕРМИНОЛОГИЧЕСКИЙ СЛОВАРЬ 10 СПИСОК ЛИТЕРАТУРЫ 11

Annotation

This text describes packet switching, its modes and history. The main topic of this text is how packet switching works. Packet switching is a digital networking communications method that groups all transmitted data – regardless of content, type, or structure – into suitably sized blocks, called packets. The concept of switching small blocks of data was first explored by Paul Baran in the early 1960s. Independently, Donald Davies at the National Physical Laboratory (NPL) in the UK had developed the same ideas a few years. Two major packet switching modes exist; (1) connectionless packet switching, also known as datagram switching, and (2) connection-oriented packet switching, also known as virtual circuit switching. In the first case each packet includes complete addressing or routing information.

1 PACKET SWITCHING

Packet switching is a digital networking communications method that groups all transmitted data – regardless of content, type, or structure – into suitably sized…...

Similar Documents

Free Essay

Packet Sniffer Report

...IMPLEMENTATION OF PACKET SNIFFING IN JAVA USING JPCAP LIBRARY Project Report Submitted in Partial Fulfillment of the Requirement for the Award of Degree of Bachelor of Engineering in Computer Science Engineering of Rajiv Gandhi Proudyogiki Vishwavidalaya, Bhopal (MP) By Siddharth Pateriya Swarna Swaminathan (0131CS081077) (0131CS081084) Department of Computer Science Engineering Jai Narain College of Technology, Bhopal June – 2012 DECLARATION We, Siddharth Pateriya and Swarna Swaminathan, the students of Bachelor of Engineering (Computer Science Engineering), Jai Narain College of Technology, Bhopal hereby declare that the work presented in this Major Project is an authentic record of our own and has been carried out taking care of Engineering Ethics under the guidance of Prof. Manish Mishra. Siddharth Pateriya Swarna Swaminathan (0131CS081077) (0131CS081084) CERTIFICATE This is to certify that the work embodied in this Major Project entitled “Implementation of Packet Sniffing in Java using Jpcap Library” has been satisfactorily completed by the students of final year, Mr. Siddharth Pateriya and Ms.Swarna Swaminathan. The work was carried out satisfactorily under the supervision and guidance of the undersigned in the Department of Computer Science Engineering, Jai Narain College of Technology and Science, Bhopal for the......

Words: 8200 - Pages: 33

Premium Essay

Brand Switching in Telecom Industry

...INTRODUCTION Definition of Cellular/Mobile phone The Cellular telephone (commonly "mobile phone" or "cell phone" or "handphone") is a long-range, portable electronic device used for mobile communication. In addition to the standard voice function of a telephone, current mobile phones can support many additional services such as SMS for text messaging, email, packet switching for access to the Internet, and MMS for sending and receiving photos and video. Most current mobile phones connect to a cellular network of base stations (cell sites), which is in turn interconnected to the public switched telephone network (PSTN) (the exception is satellite phones. Cellular telephone is also defined as a type of short-wave analog or digital telecommunication in which a subscriber has a wireless connection from a mobile telephone to a relatively nearby transmitter. The transmitter's span of coverage is called a cell. Generally, cellular telephone service is available in urban areas and along major highways. As the cellular telephone user moves from one cell or area of coverage to another, the telephone is effectively passed on to the local cell transmitter. A cellular telephone is not to be confused with a cordless telephone (which is simply a phone with a very short wireless connection to a local phone outlet). A newer service similar to cellular is personal communications services (PCS). The Global Cellular Mobile Industry: The global mobile phone industry is based on many......

Words: 302 - Pages: 2

Premium Essay

Packet

...Chapter 2 Packet 4 Review notes: Internal rhyme: __________________________________________________ ____________________________________________________________________ Ex: _________________________________________________________________ Alliteration: ___________________________________________________ ____________________________________________________________________ Ex: _________________________________________________________________ Onomatopoeia:___________________________________________________ ____________________________________________________________________ Ex: _________________________________________________________________ Read the biography of Edgar Allan Poe on pages 253-4 and list 4 facts about his life. a. b. c. d. “The Raven” p. 274-277 1. What is the setting of the poem (time and place)? 2. What is the rhyme scheme in the first stanza? Does Poe maintain this rhyme scheme? 3. List all the questions that the narrator asks the raven. 4. What does the narrator say he is trying to do in lines 9-10? 5. In the third stanza, list all the words that are examples of alliteration. What effect does this alliteration have on the poem? 6. How does the significance of the word “nevermore” change throughout the poem? 7. What is the mood throughout the poem? What images help establish this mood? 8. In line 101, what do you think the narrator means when he begs the bird to “Take thy beak from out...

Words: 294 - Pages: 2

Free Essay

Lan Switching

...roduct Description LAN Switching and Wireless CCNA Exploration Labs and Study Guide Allan Johnson LAN Switching and Wireless, CCNA Exploration Labs and Study Guide is designed to help you learn about and apply your knowledge of the LAN switching and wireless topics from Version 4 of the Cisco® Networking Academy® CCNA® Exploration curriculum. Each chapter contains a Study Guide section and a Labs and Activities section. Study Guide The dozens of exercises in this book help you learn the concepts and configurations crucial to your success as a CCNA exam candidate. Each chapter is slightly different and includes matching, multiple-choice, fill-in-the-blank, and open-ended questions designed to help you Review vocabulary Strengthen troubleshooting skills Boost configuration skills Reinforce concepts Research topics Packet Tracer Activities—This icon identifies exercises interspersed throughout the Study Guide section where you can practice or visualize a specific task using Packet Tracer, a powerful network simulation program developed by Cisco. Labs and Activities The Labs and Activities sections begin with a Command Reference table and include all the online curriculum labs to ensure that you have mastered the practical skills needed to succeed in this course. Hands-On Labs—This icon identifies the hands-on labs created for each chapter. Work through all the Basic, Challenge, and Troubleshooting labs as provided to gain a deep......

Words: 339 - Pages: 2

Free Essay

Packet Sniffing

... A SEMINAR REPORT ON | PACKET SNIFFER | SUBMITTED BY SUBMITTED ONKUNAL GOPAL THAKUR MAY 14,2010VISHAL SHIRGUPPIJUSTIN FRANCISSHAZIA ALIUNDER THE GUIDANCE OF MR. SUNIL SURVEFR. CONCEICAO RODRIGUES COLLEGE OF ENGINEERINGBANDRA(W)MUMBAI – 400 050 | CERTIFICATE This is to certify that, Mr. KUNAL GOPAL THAKUR , Mr. VISHAL SHIRGUPPI ,Mr. JUSTIN FRANCIS and Ms. SHAZIA ALI have completed their project on PACKET SNIFFER satisfactorily in partial fulfillment under the department of Computer Engineering during academic year 2009-2010. ____________________________ Teacher In-Charge ACKNOWLEDGEMENT We would like to express our sincere thanks and gratitude to our guide Mr. Sunil Surve for his valuable guidance and suggestions. We are highly indebted to him for providing us an excellent opportunity to learn and present our studies in the form of this seminar report. We take this opportunity to thank the members of the teaching and non-teaching staff of Fr.CRCE for the timely help extended by them. Lastly thanking our parents, for their morale support and encouragement. Kunal Gopal Thakur Vishal Shirguppi Justin Francis Shazia Ali ABSTRACT: Packet sniffing is a technique of monitoring every packet that crosses the network. A packet sniffer is a piece of software or......

Words: 3356 - Pages: 14

Free Essay

Hiring Packet

...8610 Hansen Ave. Shakopee, MN 55379 BIFFS, INC. Instructions for New Hire Packet – Applicant Directions 1. Page 2 – Checklist - Fill in or verify your name and social security number. Supervisor to fill in the date of hire & Company assigned (EID) employee identification number. 2. Pages 3 – 7 – DOT Application - must all be completed including 10 years (if CDL holder); 3 years (if non-CDL holder) of previous work history, addresses, & phone numbers. ** If there is any time frame for unemployment or selfemployment please list. DOT is looking for a complete trail of information provided by the driver representing where they have been from date to date. Please complete this form and provide a signature/ date at bottom of page 7. Read “Driver Rights” provided by your company. 3. Page 8 - Previous Employer form – Only sign the top box on the first page where it states Applicant signature and date. Company / Supervisors will send out to the previous employers listed on driver’s application. 4. Page 9 – DISCLOSURE - sign and date bottom *Company is required to order and obtain a current MVR for driver prior to hiring or being moved into a driving position. Driver written authorization is required. 5. Page 10 top Record of Violations form – Fill in any moving traffic violations you have had within the past 12 months; provide a signature & date. If no violations check box. Page 10 bottom – Annual Review (SKIP) to be completed by supervisor with a current MVR. MVR=Motor...

Words: 8061 - Pages: 33

Premium Essay

Code Switching

...Code Switching Code Switching, in terms of language, is the use of more than one language, by a person or more, during their conversations with each other. Code Switching is done simply because those persons know more than one language and have more than one language in common. This switch may last for a couple of sentences, for only a single phrase or may be only for a single word. It depends on how the persons take it with themselves and the others. In the article Code Switching it is written that “the switch is commonly made according to the subject of discourse, but may be for a variety of other reasons such as the mood of the speaker. For example, a person might only swear in French Language” ( 1 ). As described in the article Code Switching, there are number of situations why code switching occurs: A family that has recently immigrated to a country where a different language is spoken may switch back and forth between that language and their mother tongue, while they are learning the new language……...(this phenomenon is Morocco, Tunisia and Algeria)……………… Also, in countries with a large number of people from different ethnic backgrounds, communities will commonly switch between the language of their indigenous roots……….. code switching regularly happens between North American Mormon missionaries stationed overseas.”( 1 ) Because of the effectiveness of code switching it is widely used during our conversation. Code switching helps us to express......

Words: 2662 - Pages: 11

Free Essay

Ethernet Switching Modes

...Ethernet Ethernet Switching Modes Michael Martin NTC/405 February 16, 2015 Ronald Bowell Ethernet Switching Modes Ethernet has transformed computer systems from isolated, solitary islands to a network of computing devices with limitless potential. Unfortunately, before Ethernet, network computing was administered solely by proto-geeks who wore white coats and pocket protectors. Previously, the best idea these so-called geeks came up with before Ethernet, was sneaker-net, which meant individuals had to save the files to a disk, lace up their tennis shoes and marched to the next computing device. All of this was done before Ethernet was an industry standard. However, more recently, geeks have utilized the potential of Ethernet to move frames or packets across a network. Ethernet invented and utilized in the 1990s focuses on a hybrid star bus (Meyers, 2009). Because of Ethernets adequate performance, and superior economics, it won the heart of network administrators and most people using networking equipment. Today, Ethernet focuses on wired LAN technology and continues to grow in speed and sophistication. Despite Ethernet’s sophistication, its means of communication is done in a systematic manner. For instance, Ethernet sends data across a network in frames or packets. Data is wrapped in six layers of assembly which consist of first a Preamble, next a recipient MAC address, followed by a senders MAC address, length, (Data), Pad, and the cyclic redundancy......

Words: 1264 - Pages: 6

Premium Essay

Packet Tracer

...Packet T P Tracer - Connec a Router to a LAN ct Topology T Addressing Table A g Device Interface G0 0/0 R1 R G0 0/1 S0 0/0/0 (DCE) G0 0/0 R2 R G0 0/1 S0 0/0/0 PC1 P PC2 P PC3 P PC4 P NIC NIC NIC NIC IP Addr ress 192.168.10 0.1 192.168.11 1.1 209.165.20 00.225 10.1.1.1 10.1.2.1 209.165.20 00.226 192.168.10 0.10 192.168.11 1.10 10.1.1.10 10.1.2.10 Subnet Mask S 255 5.255.255.0 255 5.255.255.0 255 5.255.255.252 255 5.255.255.0 255 5.255.255.0 255 5.255.255.252 255 5.255.255.0 255 5.255.255.0 255 5.255.255.0 255 5.255.255.0 Default G Gateway N/A N/A N/A N/A N/A N/A 192.168.10.1 192.168.11.1 10.1.1.1 10.1.2.1 Objectives O Part 1: Di isplay Route Information er Part 2: Co onfigure Rou uter Interface es Part 3: Ve erify the Con nfiguration © 2013 Cisco and its affiliates. All rights reserve This docume is Cisco Public. d/or ed. ent Page 1 of 5 Packet Tracer - Connect a Router to a LAN Background In this activity, you will use various show commands to display the current state of the router. You will then use the Addressing Table to configure router Ethernet interfaces. Finally, you will use commands to verify and test your configurations. Note: The routers in this activity are partially configured. Some of the configurations are not covered in this course, but are provided to assist you in using verification commands. Part 1: Display Router Information Step 1: Display interface information on R1. Note: Click a device and then click the CLI tab to access......

Words: 1346 - Pages: 6

Free Essay

Packet Switching

...Packet Switching The concept of packet switching was first developed in the early 1960s, by researchers at the Massachusetts Institute of Technology. Packet switching is the dividing of messages into packets before they are sent, transmitting each packet individually, and then reassembling them into the original message once all of them have arrived at the intended destination. Packets are the fundamental unit of information transport in all modern computer networks, and increasingly in other communications networks as well. Each packet, which can be of fixed or variable size depending on the protocol, consists of a header, body, and a trailer. The body contains a segment of the message being transmitted. The header contains a set of instructions regarding the packet's data, the number of packets into which the message has been divided, the identification number of the particular packet, the protocol, packet length and synchronization. Packets are typically routed from source to destination using network switches and routers. Each packet contains address information that identifies the sending computer and intended recipient. Using these addresses, network switches and routers determine how best to transfer the packet to its destination Pros and Cons of Packet Switching Packet switching is the alternative to circuit switching protocols used historically for telephone (voice) networks and sometimes with ISDN connections. Compared to circuit switching, packet......

Words: 307 - Pages: 2

Premium Essay

Packet Tracer

...------------------------------------------------- Name: Amanpreet Singh Date: 05/31/2015 Week# 4 ------------------------------------------------- Activity# 6.6.1.2 – Skills Integration Challenge ------------------------------------------------- Activity Report 1. Write a short paragraph (minimum five college-level sentences) below that summarizes what was accomplished in this lab, what you learned by performing it, what challenges you faced. ------------------------------------------------- This week’s packet tracer was arguably difficult but at the same time, they were very informative and educational. I had to refer to the book several times to learn the commands for configuration. In the end, it was a long packet tracer but it surely helped and I am glad I learned from it. ------------------------------------------------- Packet Tracer – Skills Integration Challenge Addressing Table Device | Interface | IP Address | Subnet Mask | Default Gateway | VLAN | R1 | S0/0/0 | 172.31.1.2 | 255.255.255.0 | N/A | N/A | | G0/0.10 | 172.31.10.1 | 255.255.255.0 | N/A | 10 | | G0/0.20 | 172.31.20.1 | 255.255.255.0 | N/A | 20 | | G0/0.30 | 172.31.30.1 | 255.255.255.0 | N/A | 30 | | G0/0.88 | 172.31.88.1 | 255.255.255.0 | N/A | 88 | | G0/0.99 | 172.31.99.1 | 255.255.255.0 | N/A | 99 | S1 | VLAN 88 | 172.31.88.33 | 255.255.255.0 | 172.31.88.1 | 88 | PC-A | NIC | 172.31.10.21 | 255.255.255.0 | 172.31.10.1 | 10 | PC-B | NIC |......

Words: 493 - Pages: 2

Premium Essay

Acme Packet

...accounting conventions. These figures are bound to follow the concepts of Prudence and Accruals. Which says that expense should be recorded when it can be foresee. Whereas cash flows statement only consists of all the cash movements within the business. Cash flow tends to deduct or add any movements which cannot be justifiable in monetary term or within which the cash is not involved. ii. Provide a likely and economically sound reason why this company has both an extremely high Gross Margin and a negative Operating Margin. Acme Packet is in session delivery network solutions and is vulnerable to both technological advancement and marketing its product. The fact that Gross Margin is high because the cost of providing this service is low but generates high profit margin. But however due to vulnerability to technological advancements they must incur tons of money into their research and development program in order to upgrade its solutions. Acme Packet must also have to incur heavy marketing cost in order to showcase their solutions due to fierce competition among the players in IT industry. Gross Margin is (Total Revenue minus Total Cost of Goods Sold) divided by Total Revenue. Operating Margin is (Total Revenue minus Total Operating Expenses) divided by Total Revenue. Mechanics: iii. Why do we add back a decrease to Accounts Receivable? A decrease in Accounts Receivable indicates that one of our customer had paid his owed account. When a customer pay his /......

Words: 420 - Pages: 2

Premium Essay

Brand Switching in Telecommunication Sector

...INTRODUCTION Definition of Cellular/Mobile phone The Cellular telephone (commonly "mobile phone" or "cell phone" or "handphone") is a long-range, portable electronic device used for mobile communication. In addition to the standard voice function of a telephone, current mobile phones can support many additional services such as SMS for text messaging, email, packet switching for access to the Internet, and MMS for sending and receiving photos and video. Most current mobile phones connect to a cellular network of base stations (cell sites), which is in turn interconnected to the public switched telephone network (PSTN) (the exception is satellite phones. Cellular telephone is also defined as a type of short-wave analog or digital telecommunication in which a subscriber has a wireless connection from a mobile telephone to a relatively nearby transmitter. The transmitter's span of coverage is called a cell. Generally, cellular telephone service is available in urban areas and along major highways. As the cellular telephone user moves from one cell or area of coverage to another, the telephone is effectively passed on to the local cell transmitter. A cellular telephone is not to be confused with a cordless telephone (which is simply a phone with a very short wireless connection to a local phone outlet). A newer service similar to cellular is personal communications services (PCS). The Global Cellular Mobile Industry: The global mobile phone industry is based on many......

Words: 880 - Pages: 4

Free Essay

Packet Filtering

...Packet Filtering Index Should arriving packet be allowed in? Should a departing packet be let out? Filter packet-by-packet, making decisions to forward/drop a packet based on: Functions of Packet Filter Control: Allow only those packets that you are interested in to pass through. Security: Reject packets from malicious outsiders Watchfulness: Log packets to/from outside world In a software firewall, packet filtering is done by a program called a packet filter. The packet filter examines the header of each packet based on a specific set of rules, and on that basis, decides to prevent it from passing (called DROP) or allow it to pass (called ACCEPT). There are three ways in which a packet filter can be configured, once the set of filtering rules has been defined. In the first method, the filter accepts only those packets that it is certain are safe, dropping all others. This is the most secure mode, but it can cause inconvenience if legitimate packets are inadvertently dropped. In the second method, the filter drops only the packets that it is certain are unsafe, accepting all others. This mode is the least secure, but is causes less inconvenience, particularly in casual Web browsing. In the third method, if the filter encounters a packet for which its rules do not provide instructions, that packet can be quarantined, or the user can be specifically queried concerning what should be done with it. This can be inconvenient if it causes numerous dialog boxes to......

Words: 256 - Pages: 2

Free Essay

Switching

...tching Checkpoint: Switching When comparing and contrasting the two different switches, both types of switching seem to be commonly used, depending on the person’s preference. Circuit switching seems to be more expensive and barely used anymore, it’s more of an older form. Packet switching is however more modern and both expensive and inexpensive depending on the demand and usage. Also while making a call if you were to talk for a certain amount of minutes you would be charged for those minutes. VOIP you don’t have the circuit dedication, you would in the long run have a shared cost. Even though packet seems to be the more recent of the two, circuit switching is actually more reliable then packet. When the circuit is dedicated, you are able to get all the information across without losing bits and pieces. Then again when using circuit switching you can also encounter congestion due to being open for other types of services. With that being said you can run into packet losses and that would create information loss and failure in communication. Reason packet switching is more modern, is the simple fact it is digital. This allows data and any other content to be compressed down into blocks. This not only makes it less congested, but makes it so more memory is really needed. You would also have more power required in order to use such a method. Packet switching can lead paths being switch among packets. Number on factor that I feel is important, is being able to engage......

Words: 333 - Pages: 2