... channel
❍
receiver read data from underlying channel
Wait for
call from
above
packet = make_pkt(data)
udt_send(packet)
rdt_send(data)
extract (packet,data)
deliver_data(data)
Wait for
call from
below
rdt_rcv(packet)
sender
receiver
... TCP and UDP
application
transport
network
data link
physical
application
transport
network
data link
physical
network
data link
physical
network
data link
physical
network
data link
physical
network
data ... link
physical
application
transport
network
data link
physical
network
data link
physical
network
data link
physical
network
data link
physical
network
data link
physical
network
data link
physical
l
o
g
i
c
a
l
...
... stored
audio and video
2) Streaming live
audio and video
3) Real-time
interactive audio
and video
Jitter is the variability
of packet delays within
the same packet stream
7: Multimedia Networking ... resolution
audio stream as the
redundant information
ã for example, nominal
stream PCM at 64 kbps
and redundant stream
GSM at 13 kbps.
ã
Whenever there is non-consecutive loss, the
receiver can conceal ... is a positive constant.
Remaining packets in talkspurt are played out periodically
7: Multimedia Networking 7-5
MM Networking Applications
Fundamental
characteristics:
❒
Typically delay...
... management
agent
data
agent
data
agent
data
agent
data
managed device
managed device
managed device
managed device
managing
entity
data
network
management
protocol
definitions:
managed devices
contain
managed objects
... whose
data is gathered into a
Management Information
Base (MIB)
managing entity
Network
Management
9-
15
SNMP protocol
Two ways to convey MIB info, commands:
agent
data
Managed device
managing
entity
response
agent
data
Managed ... management?
❒
Internet- standard management framework
❍
Structure of Management Information: SMI
❍
Management Information Base: MIB
❍
SNMP Protocol Operations and Transport Mappings
❍
Security and Administration
❒
ASN.1
...
...
SSL and TCP/IP
Application
TCP
IP
Normal Application
Application
SSL
TCP
IP
Application
with SSL
ã SSL provides application programming interface (API)
to applications
ã C and Java ...
“I am Alice”
R
MAC
Transfer $1M
from Bill to Susan
MAC =
f(msg,s,R)
Defending against playback
attack: nonce
73
Toy: Data Records
❒ Why not encrypt data in constant stream as we ... libraries/classes readily available
80
Real SSL: Handshake (1)
Purpose
1. Server authentication
2. Negotiation: agree on crypto algorithms
3. Establish keys
4. Client authentication...