scholarly journals Understanding Traversal of a Packet in Internet

2020 ◽  
Author(s):  
Ram Rustagi P

In this series of articles on Experiential Learning of Networking Technologies, we have discussed a number of network protocols starting from HTTP [7] at application layer, TCP [3] and UDP [1] protocols at transport layers that provide end to end communications, and IP addressing [2] and routing for packet delivery at network layer. We have defined a number of experiential exercises for each underlying concept which provide a practical understanding of these protocols. Now, we would like to take a holistic view of these protocols which we have learned so far and look at how all these protocols come into play when an internet user makes a simple web request, e.g., what happens from network perspective when a user enters google.com in the URL bar of a web browser [12]. From the perspective of user, web page of Google’s search interface is displayed in the browser window, but inside the network both at the user’s local network and the internet, a lot of network activity takes place. The focus of this article is to understand the traversal of packets in the network triggered by any such user activity.

2017 ◽  
Author(s):  
Ram P. Rustagi ◽  
Viraj Kumar

We have all experienced a degree of frustration when a web page takes longer than expected to load. The delay between the moment when the user enters a URL (or clicks a link) and when the page contents are finally displayed has two causes: the time needed to fetch the page contents from one or more web servers (known as the end to end network delay) and the time needed to render the content in the browser window (known as the page load time). In this article, we will explore the components of the former delay via a simple set of experiments.


Author(s):  
Jerry Pournelle

While we haven’t yet reached the age of true interactive Internet, there are many video, audio and multimedia formats you will encounter that can enrich your computing experience. The big three are Windows Media Player, Quicktime, and RealPlayer. All three are compatible with Macintosh and Windows, although you may have to download them. Each handles streaming audio and video, and downloadable formats such as MP3 and MPEG. All three programs will automatically download software, if available, when they need it to play a file, and each has plugins which are automatically installed for use by your web browser, so you can play multimedia content directly from a web page. Be aware that the three programs will battle for control over which program plays which files. All three have preference settings which will allow you to make that program the default player for your chosen formats. However, each also handles a couple of proprietary formats which the others do not, so it’s good to have all three. Besides playing audio and video, the latest versions of Windows Media Player (http://windowsmedia.com/) can help you make audio CDs or import music from CDs to your hard drive. Be aware that if you rip music from your CD collection to certain Windows Media formats, those files might not be playable on other computers. WMP plays files ending in the suffixes .wmv and .wma, among others. Quicktime (http://www.apple.com/quicktime/) and iTunes (http://www.apple.com/itunes/) together handle audio and video playing, as well as advanced functions of CD-burning and music-importing. iTunes also offers the ability to share song lists over your local network—even between Macs and PCs—to convert music to MP3s, and to interface with an iPod. Quicktime plays files ending in the suffix .mov, among others. RealOne (http://www.real.com/) is the latest version of RealPlayer, which plays its own proprietary streaming formats, as well as many of the standard formats. It comes in free and pay versions, although you may have to dig for the free version. RealOne plays files ending with the suffixes .rm and .ram, among others.


2019 ◽  

In any TCP-based client-server communication, the application layer is implemented in the application program whereas the transport layer (i.e., TCP protocol) is implemented in the underlying operating system. TCP achieves reliability using acknowledgement packets and retransmitting any packets that are lost in the network, or corrupted, or delayed or delivered out-of-order. In addition, the TCP protocol ensures that the receiver application is not overwhelmed by data from the sender application — only the amount of data that the receiver can consume is transmitted. This is called TCP Flow Control. In this article, we explain the basics of flow control and provide experiential learning exercises to help understand its impact on TCP performance.


2018 ◽  
Author(s):  
Ram P. Rustagi ◽  
Viraj Kumar

With the rapid increase in the volume of e-commerce, the security of web-based transactions is of increasing concern. A widespread but dangerously incorrect belief among web users is that all security issues are taken care of when a website uses HTTPS (secure HTTP). While HTTPS does provide security, websites are often developed and deployed in ways that make them and their users vulnerable to hackers. In this article we explore some of these vulnerabilities. We first introduce the key ideas and then provide several experiential learning exercises so that readers can understand the challenges and possible solutions to them in a hands-on manner.


Author(s):  
He Hu ◽  
Xiaoyong Du

Online tagging is crucial for the acquisition and organization of web knowledge. We present TYG (Tag-as-You-Go) in this paper, a web browser extension for online tagging of personal knowledge on standard web pages. We investigate an approach to combine a K-Medoid-style clustering algorithm with the user input to achieve semi-automatic web page annotation. The annotation process supports user-defined tagging schema and comprises an automatic mechanism that is built upon clustering techniques, which can automatically group similar HTML DOM nodes into clusters corresponding to the user specification. TYG is a prototype system illustrating the proposed approach. Experiments with TYG show that our approach can achieve both efficiency and effectiveness in real world annotation scenarios.


Author(s):  
Aasha Jayant Sharma

Sustainability related areas like CSR, business ethics and corporate governance as subjects is seen in most business school curriculum, whether its inclusion leads to inculcating interest and values for responsible business practices is still a big question. Sustainability incorporates holistic view of issues; the curriculum therefore, has to make linkages to social issues and has to be contextual. The focus of business school curriculum has to be on sensitizing students towards responsible citizenship along with competency building in the area of sustainability. Here, experiential' or action learning would be helpful. The chapter posits the importance of experiential learning in the context of management education and highlights the fact that unless sensitized to the sustainability issues, business schools or at corporate level will see it only from compliance perspective. The chapter also discusses success story of existing modules on experiential learning crafted by 2 NGO's intended to sensitize the participants.


Nowadays the usage of mobile phones is widely spread in our lifestyle; we use cell phones as a camera, a radio, a music player, and even as a web browser. Since most web pages are created for desktop computers, navigating through web pages is highly fatigued. Hence, there is a great interest in computer science to adopt such pages with rich content into small screens of our mobile devices. On the other hand, every web page has got many different parts that do not have the equal importance to the end user. Consequently, the authors propose a mechanism to identify the most useful part of a web page to a user regarding his or her search query while the information loss is avoided. The challenge here comes from the fact that long web contents cannot be easily displayed in both vertical and horizontal ways.


2019 ◽  
Vol 9 (1) ◽  
Author(s):  
K. Agashkov ◽  
V. Krotov ◽  
M. Krasniakova ◽  
D. Shevchuk ◽  
Y. Andrianov ◽  
...  

AbstractLamina I spino-parabrachial neurons (SPNs) receive peripheral nociceptive input, process it and transmit to the supraspinal centres. Although responses of SPNs to cutaneous receptive field stimulations have been intensively studied, the mechanisms of signal processing in these neurons are poorly understood. Therefore, we used an ex-vivo spinal cord preparation to examine synaptic and cellular mechanisms determining specific input-output characteristics of the neurons. The vast majority of the SPNs received a few direct nociceptive C-fiber inputs and generated one spike in response to saturating afferent stimulation, thus functioning as simple transducers of painful stimulus. However, 69% of afferent stimulation-induced action potentials in the entire SPN population originated from a small fraction (19%) of high-output neurons. These neurons received a larger number of direct Aδ- and C-fiber inputs, generated intrinsic bursts and efficiently integrated a local network activity via NMDA-receptor-dependent mechanisms. The high-output SPNs amplified and integrated the nociceptive input gradually encoding its intensity into the number of generated spikes. Thus, different mechanisms of signal processing allow lamina I SPNs to play distinct roles in nociception.


2007 ◽  
Vol 97 (6) ◽  
pp. 4120-4128 ◽  
Author(s):  
Susanta Bandyopadhyay ◽  
John J. Hablitz

Dopamine modulates prefrontal cortex excitability in complex ways. Dopamine's net effect on local neuronal networks is therefore difficult to predict based on studies on pharmacologically isolated excitatory or inhibitory connections. In the present work, we have studied the effects of dopamine on evoked activity in acute rat brain slices when both excitation and inhibition are intact. Whole cell recordings from layer II/III pyramidal cells under conditions of normal synaptic transmission showed that bath-applied dopamine (30 μM) increased the outward inhibitory component of composite postsynaptic currents, whereas inward excitatory currents were not significantly affected. Optical imaging with the voltage-sensitive dye N-(3-(triethylammonium)propyl)-4-(4-(p-diethylaminophenyl)buta-dienyl)pyridinium dibromide revealed that bath application of dopamine significantly decreased the amplitude, duration, and lateral spread of activity in local cortical networks. This effect of dopamine was observed both with single and train (5 at 20 Hz) stimuli. The effect was mimicked by the D1-like receptor agonist R(+)-6-chloro-7,8-dihydroxy-1-methyl-1-phenyl-2,3,4,5-tetrahydro-1H-3-benzazepine hydrobromide (1 μM) and was blocked by R(+)-7-chloro-8-hydroxy-3-methyl-1-phenyl-2,3,4,5-tetrahydro-1H-3-benzazepine hydrochloride (10 μM), a selective antagonist for D1-like receptors. The D2-like receptor agonist quinpirole (10 μM) had no significant effect on evoked dye signals. Our results suggest that dopamine's effect on inhibition dominates over that on excitation under conditions of normal synaptic transmission. Such neuromodulation by dopamine may be important for maintenance of stability in local neuronal networks in the prefrontal cortex.


2016 ◽  
Vol 2016 ◽  
pp. 1-13 ◽  
Author(s):  
Dileep Basam ◽  
J. Scot Ransbottom ◽  
Randy Marchany ◽  
Joseph G. Tront

Moving Target IPv6 Defense (MT6D) imparts radio-frequency hopping behavior to IPv6 networks by having participating nodes periodically hop onto new addresses while giving up old addresses. Our previous research efforts implemented a solution to identify and acquire these old addresses that are being discarded by MT6D hosts on a local network besides being able to monitor and visualize the incoming traffic on these addresses. This was essentially equivalent to forming a darknet out of the discarded MT6D addresses, but the solution presented in the previous research effort did not include database integration for it to scale and be extended. This paper presents a solution with a new architecture that not only extends the previous solution in terms of automation and database integration but also demonstrates the ability to deploy a honeypot on a virtual LXC (Linux Container) on-demand based on any interesting traffic pattern observed on a discarded address. The proposed architecture also allows an MT6D host to query the solution database for network activity on its relinquished addresses as a JavaScript Object Notation (JSON) object. This allows an MT6D host to identify suspicious activity on its discarded addresses and strengthen the MT6D scheme parameters accordingly. We have built a proof-of-concept for the proposed solution and analyzed the solution’s feasibility and scalability.


Sign in / Sign up

Export Citation Format

Share Document