1.1 What is the Internet? 1.2 Network edge 1.3 Network core 1.4 Network access and physical media 1.5 Internet structure and ISPs 1.6 Delay & loss in packet-switched networks 1.7 Protocol layers, service models 1.8 History
1. Introduction This section discusses the legal protection of information and the security issues of computer data and electronic information systems and is organised into four parts: First, it focuses briefly on the basic conceptual distinction between information and data, providing a basis of understanding of the primary object of legal and technical means of protection. Second, access to Government information will be discussed
Carrier Sense Multiple Access(CSMA) In certain situations nodes can hear each other by listening to the channel “Carrier Sensing CSMA: Polite version of Aloha Nodes listen to the channel before they start transmission Channel idle=> Transmit Channel busy = Wait (join backlog) When do backlogged nodes transmit? When channel becomes idle backlogged nodes attempt transmission with probability q=1 Persistent protocol, q=1 Non-persistent protocol,< 1
October 22, 2001 Personal IdentityⅢ . Review soul criterion and body criterion Soul criterion: x is the same person as y iff and y have the same soul. Problems: i)There is no way to establish body-soul correlations; and no way to establish personality correlations. So soul criterion doesn't make sense of our practices of recognizing and identifying people ii)We have no special access to souls, so even in our own case we can't be sure it's the same soul \inside\ us whenever we are conscious. ii) The problem of identity is \pushed back\: what is it for person-stage x to have the same soul as person-stage y? What makes for sameness of souls? Body criterion: x is the same person as y iff x and y have the same living human body