SlideShare a Scribd company logo
1 of 80
Chapter 1 Introduction Computer Networking: A Top Down Approach , 4 th  edition.  Jim Kurose, Keith Ross Addison-Wesley, July 2007.  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Chapter 1: Introduction ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Chapter 1: roadmap ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What’s the Internet: “nuts and bolts” view ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Home network Institutional network Mobile network Global ISP Regional ISP router PC server wireless laptop cellular  handheld wired links access  points
“Cool” internet appliances World’s smallest web server http://www-ccs.cs.umass.edu/~shri/iPic.html IP picture frame http://www.ceiva.com/ Web-enabled toaster + weather forecaster Internet phones
What’s the Internet: “nuts and bolts” view ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Home network Institutional network Mobile network Global ISP Regional ISP
What’s the Internet: a service view ,[object Object],[object Object],[object Object],[object Object],[object Object]
What’s a protocol? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],protocols define format, order of msgs sent and received among network entities, and actions taken on msg transmission, receipt
What’s a protocol? ,[object Object],Q:  Other human protocols?  Hi Hi TCP connection request Got the time? 2:00 TCP connection response Get http://www.awl.com/kurose-ross <file> time
Chapter 1: roadmap ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
A closer look at network structure: ,[object Object],[object Object],[object Object],[object Object],[object Object]
The network edge: ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],client/server peer-peer
Access networks and physical media ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Residential access: point to point access ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Residential access: cable modems ,[object Object],[object Object],[object Object],[object Object],[object Object]
Residential access: cable modems Diagram: http://www.cabledatacomnews.com/cmic/diagram.html
Cable Network Architecture: Overview home cable headend cable distribution network (simplified) Typically 500 to 5,000 homes
Cable Network Architecture: Overview home cable headend cable distribution network server(s)
Cable Network Architecture: Overview home cable headend cable distribution network (simplified)
Cable Network Architecture: Overview home cable headend cable distribution network FDM (more shortly): Channels V I D E O V I D E O V I D E O V I D E O V I D E O V I D E O D A T A D A T A C O N T R O L 1 2 3 4 5 6 7 8 9
Company access: local area networks ,[object Object],[object Object],[object Object],[object Object],[object Object]
Wireless access networks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],base station mobile hosts router
Home networks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],wireless access  point wireless laptops router/ firewall cable modem to/from cable headend Ethernet
Physical Media ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Physical Media: coax, fiber ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Physical media: radio ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Chapter 1: roadmap ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Network Core ,[object Object],[object Object],[object Object],[object Object]
Network Core: Circuit Switching ,[object Object],[object Object],[object Object],[object Object],[object Object]
Network Core: Circuit Switching ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Circuit Switching: FDM and TDM FDM frequency time TDM frequency time 4 users Example:
Numerical example ,[object Object],[object Object],[object Object],[object Object],[object Object]
Network Core: Packet Switching ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Bandwidth division into “pieces” Dedicated allocation Resource reservation
Packet Switching: Statistical Multiplexing ,[object Object],[object Object],A B C 100 Mb/s Ethernet 1.5 Mb/s statistical multiplexing queue of packets waiting for output link D E
Packet-switching: store-and-forward ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],R R R L more on delay shortly …
Packet switching versus circuit switching ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],N users 1 Mbps link Q: how did we get value 0.0004?
Packet switching versus circuit switching ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Q:  human analogies of reserved resources (circuit switching) versus on-demand allocation (packet-switching)?
Internet structure: network of networks ,[object Object],[object Object],[object Object],Tier 1 ISP Tier 1 ISP Tier 1 ISP Tier-1 providers interconnect (peer) privately
Tier-1 ISP: e.g., Sprint … to/from customers peering to/from backbone …. … … … POP: point-of-presence
Internet structure: network of networks ,[object Object],[object Object],Tier 1 ISP Tier 1 ISP Tier 1 ISP Tier-2 ISP Tier-2 ISP Tier-2 ISP Tier-2 ISP Tier-2 ISP ,[object Object],[object Object],[object Object],Tier-2 ISPs also peer privately with each other.
Internet structure: network of networks ,[object Object],[object Object],Tier 1 ISP Tier 1 ISP Tier 1 ISP Tier-2 ISP Tier-2 ISP Tier-2 ISP Tier-2 ISP Tier-2 ISP local ISP local ISP local ISP local ISP local ISP Tier 3 ISP local ISP local ISP local ISP Local and tier- 3 ISPs are  customers  of higher tier ISPs connecting them to rest of Internet
Internet structure: network of networks ,[object Object],Tier 1 ISP Tier 1 ISP Tier 1 ISP Tier-2 ISP Tier-2 ISP Tier-2 ISP Tier-2 ISP Tier-2 ISP local ISP local ISP local ISP local ISP local ISP Tier 3 ISP local ISP local ISP local ISP
Chapter 1: roadmap ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
How do loss and delay occur? ,[object Object],[object Object],[object Object],A B packet being transmitted  (delay) packets queueing  (delay) free (available) buffers: arriving packets  dropped ( loss ) if no free buffers
Four sources of packet delay ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],A B propagation transmission nodal processing queueing
Delay in packet-switched networks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Note:  s and R are  very  different quantities! A B propagation transmission nodal processing queueing
Caravan analogy ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],toll  booth toll  booth ten-car  caravan 100 km 100 km
Caravan analogy (more) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],toll  booth toll  booth ten-car  caravan 100 km 100 km
Nodal delay ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Queueing delay (revisited) ,[object Object],[object Object],[object Object],traffic intensity = La/R ,[object Object],[object Object],[object Object]
“ Real” Internet delays and routes ,[object Object],[object Object],[object Object],[object Object],[object Object],3 probes 3 probes 3 probes
“ Real” Internet delays and routes 1  cs-gw (128.119.240.254)  1 ms  1 ms  2 ms 2  border1-rt-fa5-1-0.gw.umass.edu (128.119.3.145)  1 ms  1 ms  2 ms 3  cht-vbns.gw.umass.edu (128.119.3.130)  6 ms 5 ms 5 ms 4  jn1-at1-0-0-19.wor.vbns.net (204.147.132.129)  16 ms 11 ms 13 ms  5  jn1-so7-0-0-0.wae.vbns.net (204.147.136.136)  21 ms 18 ms 18 ms  6  abilene-vbns.abilene.ucaid.edu (198.32.11.9)  22 ms  18 ms  22 ms 7  nycm-wash.abilene.ucaid.edu (198.32.8.46)  22 ms  22 ms  22 ms 8  62.40.103.253 (62.40.103.253)  104 ms 109 ms 106 ms 9  de2-1.de1.de.geant.net (62.40.96.129)  109 ms 102 ms 104 ms 10  de.fr1.fr.geant.net (62.40.96.50)  113 ms 121 ms 114 ms 11  renater-gw.fr1.fr.geant.net (62.40.103.54)  112 ms  114 ms  112 ms 12  nio-n2.cssi.renater.fr (193.51.206.13)  111 ms  114 ms  116 ms 13  nice.cssi.renater.fr (195.220.98.102)  123 ms  125 ms  124 ms 14  r3t2-nice.cssi.renater.fr (195.220.98.110)  126 ms  126 ms  124 ms 15  eurecom-valbonne.r3t2.ft.net (193.48.50.54)  135 ms  128 ms  133 ms 16  194.214.211.25 (194.214.211.25)  126 ms  128 ms  126 ms 17  * * * 18  * * * 19  fantasia.eurecom.fr (193.55.113.142)  132 ms  128 ms  136   ms traceroute:  gaia.cs.umass.edu to www.eurecom.fr Three delay measurements from  gaia.cs.umass.edu to cs-gw.cs.umass.edu  * means no response (probe lost, router not replying) trans-oceanic link
Packet loss ,[object Object],[object Object],[object Object],A B packet being transmitted packet arriving to full buffer   is  lost buffer  (waiting area)
Throughput ,[object Object],[object Object],[object Object],server, with file of F bits  to send to client link capacity R s   bits/sec link capacity R c   bits/sec server sends bits  (fluid) into pipe pipe that can carry fluid at rate R s   bits/sec) pipe that can carry fluid at rate R c   bits/sec)
Throughput (more) ,[object Object],R s   bits/sec R c   bits/sec ,[object Object],R s   bits/sec R c   bits/sec link on end-end path that constrains  end-end throughput bottleneck link
Throughput: Internet scenario ,[object Object],[object Object],10 connections (fairly) share backbone bottleneck link R   bits/sec R s R s R s R c R c R c R
Chapter 1: roadmap ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Protocol “Layers” ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Organization of air travel ,[object Object],ticket (purchase) baggage (check) gates (load) runway takeoff airplane routing ticket (complain) baggage (claim) gates (unload) runway landing airplane routing airplane routing
Layering of airline functionality ,[object Object],[object Object],[object Object],ticket (purchase) baggage (check) gates (load) runway (takeoff) airplane routing departure airport arrival airport intermediate air-traffic control centers airplane routing airplane routing ticket (complain) baggage (claim gates (unload) runway (land) airplane routing ticket baggage gate takeoff/landing airplane routing
Why layering? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Internet protocol stack ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],application transport network link physical
ISO/OSI reference model ,[object Object],[object Object],[object Object],[object Object],[object Object],application presentation session transport network link physical
Encapsulation source application transport network link physical segment datagram destination application transport network link physical router switch message frame H t H n M H t H t H n H l M H t H n M H t M M network link physical link physical H t H n H l M H t H n M H t H n M H t H n H l M M H t M H n
Chapter 1: roadmap ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Network Security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Bad guys can put malware into hosts via Internet ,[object Object],[object Object],[object Object],[object Object]
Bad guys can put malware into hosts via Internet ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Sapphire Worm: aggregate scans/sec in first 5 minutes of outbreak (CAIDA, UWisc data)
Bad guys can attack servers and network infrastructure ,[object Object],[object Object],[object Object],[object Object],target
The bad guys can sniff packets ,[object Object],[object Object],[object Object],A B C ,[object Object],src:B dest:A  payload
The bad guys can use false source addresses ,[object Object],A B C src:B  dest:A  payload
The bad guys can record and playback ,[object Object],[object Object],A B C src:B dest:A  user: B; password: foo
Network Security ,[object Object],[object Object],[object Object]
Chapter 1: roadmap ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Internet History ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],1961-1972: Early packet-switching principles
Internet History ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],1972-1980: Internetworking, new and proprietary nets
Internet History ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],1980-1990: new protocols, a proliferation of networks
Internet History ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],1990, 2000’s: commercialization, the Web, new apps
Internet History ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Introduction: Summary ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

More Related Content

What's hot

Chapter 1 - Computer Networking a top-down Approach 7th
Chapter 1 - Computer Networking a top-down Approach 7thChapter 1 - Computer Networking a top-down Approach 7th
Chapter 1 - Computer Networking a top-down Approach 7thAndy Juan Sarango Veliz
 
Lec 2 and_3
Lec 2 and_3Lec 2 and_3
Lec 2 and_3hz3012
 
Slides internet technology
Slides internet technologySlides internet technology
Slides internet technologyInexk Pedrero
 
Network protocols
Network protocolsNetwork protocols
Network protocolsIT Tech
 
communication and network concepts
communication and network concepts communication and network concepts
communication and network concepts Gunjan Mathur
 
1 introduction
1 introduction1 introduction
1 introductiongafurov_x
 
Network Devices & Media
Network Devices & MediaNetwork Devices & Media
Network Devices & MediaSoumyakatkam
 
Information Technology ITM1
Information Technology  ITM1Information Technology  ITM1
Information Technology ITM1Aram Mohammed
 
E business webinternet slides world wide web / protocols
E business webinternet slides  world wide web / protocolsE business webinternet slides  world wide web / protocols
E business webinternet slides world wide web / protocolsAsjadAli34
 
Community Wireless Networks
Community Wireless NetworksCommunity Wireless Networks
Community Wireless Networksdaveph
 
Computer network (12)
Computer network (12)Computer network (12)
Computer network (12)NYversity
 

What's hot (20)

Chapter 1 - Computer Networking a top-down Approach 7th
Chapter 1 - Computer Networking a top-down Approach 7thChapter 1 - Computer Networking a top-down Approach 7th
Chapter 1 - Computer Networking a top-down Approach 7th
 
1 introduction
1 introduction1 introduction
1 introduction
 
Lec 2 and_3
Lec 2 and_3Lec 2 and_3
Lec 2 and_3
 
Slides internet technology
Slides internet technologySlides internet technology
Slides internet technology
 
Network protocols
Network protocolsNetwork protocols
Network protocols
 
Networks Basics
Networks BasicsNetworks Basics
Networks Basics
 
Study guide1(1)
Study guide1(1)Study guide1(1)
Study guide1(1)
 
communication and network concepts
communication and network concepts communication and network concepts
communication and network concepts
 
1 introduction
1 introduction1 introduction
1 introduction
 
Chapter 1 v6.1
Chapter 1 v6.1Chapter 1 v6.1
Chapter 1 v6.1
 
Network Devices & Media
Network Devices & MediaNetwork Devices & Media
Network Devices & Media
 
Information Technology ITM1
Information Technology  ITM1Information Technology  ITM1
Information Technology ITM1
 
Ecommerce Chap 11
Ecommerce Chap 11Ecommerce Chap 11
Ecommerce Chap 11
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
E business webinternet slides world wide web / protocols
E business webinternet slides  world wide web / protocolsE business webinternet slides  world wide web / protocols
E business webinternet slides world wide web / protocols
 
Community Wireless Networks
Community Wireless NetworksCommunity Wireless Networks
Community Wireless Networks
 
Networking
NetworkingNetworking
Networking
 
Computer network (12)
Computer network (12)Computer network (12)
Computer network (12)
 
Chapter 4ver2
Chapter 4ver2Chapter 4ver2
Chapter 4ver2
 
Fg c
Fg cFg c
Fg c
 

Similar to Chapter1

Chapter_1 V6.1 absolute java original slides
Chapter_1 V6.1 absolute java original slidesChapter_1 V6.1 absolute java original slides
Chapter_1 V6.1 absolute java original slidesmzayed5
 
3150710 MATERIAL FOR STUDENTS FOR EXAMINATION
3150710 MATERIAL FOR STUDENTS FOR EXAMINATION3150710 MATERIAL FOR STUDENTS FOR EXAMINATION
3150710 MATERIAL FOR STUDENTS FOR EXAMINATIONjainyshah20
 
Week 1B.pdf Networking introduction week 1
Week 1B.pdf Networking introduction week 1Week 1B.pdf Networking introduction week 1
Week 1B.pdf Networking introduction week 1whiz5
 
Chapter_1_V7.01gsgsggsgshshsgabbsbshhsh.ppt
Chapter_1_V7.01gsgsggsgshshsgabbsbshhsh.pptChapter_1_V7.01gsgsggsgshshsgabbsbshhsh.ppt
Chapter_1_V7.01gsgsggsgshshsgabbsbshhsh.pptnetacc20052002
 
Tutorial Jaringan komputer
Tutorial Jaringan komputerTutorial Jaringan komputer
Tutorial Jaringan komputerAgus Kurniawan
 
Ch1 2ed 29_dec03
Ch1 2ed 29_dec03Ch1 2ed 29_dec03
Ch1 2ed 29_dec03Sugan Nalla
 
ComputerNetwork_Introductions_C1_en.pptx
ComputerNetwork_Introductions_C1_en.pptxComputerNetwork_Introductions_C1_en.pptx
ComputerNetwork_Introductions_C1_en.pptxhuypmg22git
 
Lec-01 Introduction Computer Networks...
Lec-01 Introduction Computer Networks...Lec-01 Introduction Computer Networks...
Lec-01 Introduction Computer Networks...bismahmalik22
 
Introduction to Computer Networking CYSE230
Introduction to Computer Networking CYSE230Introduction to Computer Networking CYSE230
Introduction to Computer Networking CYSE230killerbladex15
 
Chapter1 Introduction.pptx
Chapter1 Introduction.pptxChapter1 Introduction.pptx
Chapter1 Introduction.pptxhuanyuzhang5
 
Computer networking Chapter 3.hsjwjjajskwkkw
Computer networking Chapter 3.hsjwjjajskwkkwComputer networking Chapter 3.hsjwjjajskwkkw
Computer networking Chapter 3.hsjwjjajskwkkwAgentNawab
 

Similar to Chapter1 (20)

Chapter_1_V6.1.ppt
Chapter_1_V6.1.pptChapter_1_V6.1.ppt
Chapter_1_V6.1.ppt
 
Chapter_1 V6.1 absolute java original slides
Chapter_1 V6.1 absolute java original slidesChapter_1 V6.1 absolute java original slides
Chapter_1 V6.1 absolute java original slides
 
3150710 MATERIAL FOR STUDENTS FOR EXAMINATION
3150710 MATERIAL FOR STUDENTS FOR EXAMINATION3150710 MATERIAL FOR STUDENTS FOR EXAMINATION
3150710 MATERIAL FOR STUDENTS FOR EXAMINATION
 
Chapter_1_.pptx
Chapter_1_.pptxChapter_1_.pptx
Chapter_1_.pptx
 
Network th ITM3
Network th ITM3Network th ITM3
Network th ITM3
 
20CS2008 Computer Networks
20CS2008 Computer Networks20CS2008 Computer Networks
20CS2008 Computer Networks
 
Week 1B.pdf Networking introduction week 1
Week 1B.pdf Networking introduction week 1Week 1B.pdf Networking introduction week 1
Week 1B.pdf Networking introduction week 1
 
Chapter_1_V7.01gsgsggsgshshsgabbsbshhsh.ppt
Chapter_1_V7.01gsgsggsgshshsgabbsbshhsh.pptChapter_1_V7.01gsgsggsgshshsgabbsbshhsh.ppt
Chapter_1_V7.01gsgsggsgshshsgabbsbshhsh.ppt
 
Chapter_1_V7.01.ppt
Chapter_1_V7.01.pptChapter_1_V7.01.ppt
Chapter_1_V7.01.ppt
 
Tutorial Jaringan komputer
Tutorial Jaringan komputerTutorial Jaringan komputer
Tutorial Jaringan komputer
 
Lecture No. 1.ppt
Lecture No. 1.pptLecture No. 1.ppt
Lecture No. 1.ppt
 
Ch1 2ed 29_dec03
Ch1 2ed 29_dec03Ch1 2ed 29_dec03
Ch1 2ed 29_dec03
 
Chapter1 intro
Chapter1 introChapter1 intro
Chapter1 intro
 
ComputerNetwork_Introductions_C1_en.pptx
ComputerNetwork_Introductions_C1_en.pptxComputerNetwork_Introductions_C1_en.pptx
ComputerNetwork_Introductions_C1_en.pptx
 
Lec-01 Introduction Computer Networks...
Lec-01 Introduction Computer Networks...Lec-01 Introduction Computer Networks...
Lec-01 Introduction Computer Networks...
 
Lecture1 intro
Lecture1 introLecture1 intro
Lecture1 intro
 
Introduction to Computer Networking CYSE230
Introduction to Computer Networking CYSE230Introduction to Computer Networking CYSE230
Introduction to Computer Networking CYSE230
 
Chapter1 Introduction.pptx
Chapter1 Introduction.pptxChapter1 Introduction.pptx
Chapter1 Introduction.pptx
 
Week1 lec2-bscs1
Week1 lec2-bscs1Week1 lec2-bscs1
Week1 lec2-bscs1
 
Computer networking Chapter 3.hsjwjjajskwkkw
Computer networking Chapter 3.hsjwjjajskwkkwComputer networking Chapter 3.hsjwjjajskwkkw
Computer networking Chapter 3.hsjwjjajskwkkw
 

Recently uploaded

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 

Recently uploaded (20)

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 

Chapter1

  • 1.
  • 2.
  • 3.
  • 4.
  • 5. “Cool” internet appliances World’s smallest web server http://www-ccs.cs.umass.edu/~shri/iPic.html IP picture frame http://www.ceiva.com/ Web-enabled toaster + weather forecaster Internet phones
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16. Residential access: cable modems Diagram: http://www.cabledatacomnews.com/cmic/diagram.html
  • 17. Cable Network Architecture: Overview home cable headend cable distribution network (simplified) Typically 500 to 5,000 homes
  • 18. Cable Network Architecture: Overview home cable headend cable distribution network server(s)
  • 19. Cable Network Architecture: Overview home cable headend cable distribution network (simplified)
  • 20. Cable Network Architecture: Overview home cable headend cable distribution network FDM (more shortly): Channels V I D E O V I D E O V I D E O V I D E O V I D E O V I D E O D A T A D A T A C O N T R O L 1 2 3 4 5 6 7 8 9
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31. Circuit Switching: FDM and TDM FDM frequency time TDM frequency time 4 users Example:
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39. Tier-1 ISP: e.g., Sprint … to/from customers peering to/from backbone …. … … … POP: point-of-presence
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52. “ Real” Internet delays and routes 1 cs-gw (128.119.240.254) 1 ms 1 ms 2 ms 2 border1-rt-fa5-1-0.gw.umass.edu (128.119.3.145) 1 ms 1 ms 2 ms 3 cht-vbns.gw.umass.edu (128.119.3.130) 6 ms 5 ms 5 ms 4 jn1-at1-0-0-19.wor.vbns.net (204.147.132.129) 16 ms 11 ms 13 ms 5 jn1-so7-0-0-0.wae.vbns.net (204.147.136.136) 21 ms 18 ms 18 ms 6 abilene-vbns.abilene.ucaid.edu (198.32.11.9) 22 ms 18 ms 22 ms 7 nycm-wash.abilene.ucaid.edu (198.32.8.46) 22 ms 22 ms 22 ms 8 62.40.103.253 (62.40.103.253) 104 ms 109 ms 106 ms 9 de2-1.de1.de.geant.net (62.40.96.129) 109 ms 102 ms 104 ms 10 de.fr1.fr.geant.net (62.40.96.50) 113 ms 121 ms 114 ms 11 renater-gw.fr1.fr.geant.net (62.40.103.54) 112 ms 114 ms 112 ms 12 nio-n2.cssi.renater.fr (193.51.206.13) 111 ms 114 ms 116 ms 13 nice.cssi.renater.fr (195.220.98.102) 123 ms 125 ms 124 ms 14 r3t2-nice.cssi.renater.fr (195.220.98.110) 126 ms 126 ms 124 ms 15 eurecom-valbonne.r3t2.ft.net (193.48.50.54) 135 ms 128 ms 133 ms 16 194.214.211.25 (194.214.211.25) 126 ms 128 ms 126 ms 17 * * * 18 * * * 19 fantasia.eurecom.fr (193.55.113.142) 132 ms 128 ms 136 ms traceroute: gaia.cs.umass.edu to www.eurecom.fr Three delay measurements from gaia.cs.umass.edu to cs-gw.cs.umass.edu * means no response (probe lost, router not replying) trans-oceanic link
  • 53.
  • 54.
  • 55.
  • 56.
  • 57.
  • 58.
  • 59.
  • 60.
  • 61.
  • 62.
  • 63.
  • 64. Encapsulation source application transport network link physical segment datagram destination application transport network link physical router switch message frame H t H n M H t H t H n H l M H t H n M H t M M network link physical link physical H t H n H l M H t H n M H t H n M H t H n H l M M H t M H n
  • 65.
  • 66.
  • 67.
  • 68.
  • 69.
  • 70.
  • 71.
  • 72.
  • 73.
  • 74.
  • 75.
  • 76.
  • 77.
  • 78.
  • 79.
  • 80.