SlideShare a Scribd company logo
1 of 83
Download to read offline
1
Introduction
Chapter 1
2
1.0 Technology Revolution
• 18th Century Mechanical systems
• 19th CenturySteam Engine
• 20th CenturyInformation
- gathering
- distribution
- processing
- creating
• 21st Century Networks
Human-to-Human, Machine-to-Machine
3
◆ A set of communication elements connected by
communication links
➭ Communication elements
● Computers, printers, mobile phones, …
● Routers, switches, ...
➭ Communication links
● optic fiber
● coaxial cable
● twisted pair
● wireless (radio, microwave, satellite)
➭ Topologies
● Ring, Star, Bus, Tree, Mesh
What is a Computer Network
local ISP
company
network
regional ISP
router
workstation
server
mobile
4
◆ A software/hardware infrastructure
➭ Share resources
● data, files, computing power, video,…
➭ Information highway
● communication between geographically dispersed users
➭ Electronic Society
● Cyberspace
● Virtual global nation
What is a Computer Network
5
Introduction
 Computer Network
– an interconnected collection of autonomous computers
Internet: “network of networks”
– loosely hierarchical
– public Internet versus private intranet
WWW a distributed systems run on the top of Internet
 Distributed System
– High degree of cohesiveness and transparency
– A software system built on top of a network
6
1.1 Uses of Computer Networks
• Business Applications
• Home Applications
• Mobile Users
• Social Issues
7
Business Applications of Networks
A network with two clients and one server.
a. Resource sharing (hardware, software, information, …)
c. Doing business electronically (B2B, B2C, e-commerce)
b. Providing communication medium (e-mail, videoconferenceing)
8
Goals of Networks for Companies
 Resource sharing: equipment, programs, data
 high reliability
– replicated data
– hardware
 Saving money
– mainframe: 10 times faster, but 1000 times more
expensive than PC
– client-server model
 Scalability
– mainframe: replace a larger one
– client-server model: add more servers
 Communication medium for separated employees
9
Business Applications of Networks (2)
The client-server model involves requests and replies.
a. Two processes are involved
b. A communication network is needed
10
Home Network Applications
• Access to remote information
• Person-to-person communication
• Interactive entertainment
• Electronic commerce
11
 Networks for People
– Access to remote information
• e.g.: financial, shopping, customized newspapers,
on-line digital library, WWW
– Person-to-person communication
• email, video conference, newsgroup
– Interactive entertainment
• VOD, interactive movies or TVs, game playing
12
Home Network Applications (2)
In peer-to-peer system there are no fixed clients and servers.
13
Home Network Applications (3)
Some forms of e-commerce.
Music sharing
14
Mobile Network Users
Combinations of wireless networks and mobile computing.
Wireless Mobile Applications
No No Desktop computers in offices
No Yes A notebook computer used in a hotel room
Yes NO Networks in older, unwired buildings
Yes Yes Store inventory with a handheld computer
15
Social Issues
• Network neutrality
• Digital Millennium Copyright Act
• Profiling users
• Phishing
16
Network Hardware
• Personal area networks
• Local area networks
• Metropolitan area networks
• Wide are networks
• The internet
17
Types of transmission technology
• Broadcast links
• Point-to-point links
Network Hardware
18
Network Hardware
– Broadcast networks
• single communication channel shared by all
machines
• broadcasting or multicasting (via packets)
– broadcasting: a special code in address field
– multicasting: reserve one bit to indicate multicasting, the
remaining n-1address bits can hold a group number. Each
machine can subscribe to any groups
• used by localized networks (or satellites)
– point-to-point networks
• many hops
• routing algorithms: multiple routes are possible
• used by large networks
19
Network Hardware
Classification of interconnected processors by scale.
Personal Area Network
20
Bluetooth PAN configuration
Local Area Networks
21
Wireless and wired LANs. (a) 802.11. (b) Switched Ethernet.
22
Local Area Networks (LANs)
Four broadcast networks
(a) Bus 802.3
(b) Ring 802.5
(c) Token Ring 802.4
(d) Wireless LAN 802.11
·Characterics of LANs: (a) privated-owned, (b) small size,
(c) transmission technology, (d) topology
·Ethernets are most popular (up to 10 Gb/s)
23
Local Area Networks
 Characteristics
– small size
– transmission technology
• single cable (single channel)
• 10Mbps ~ 10Gb/s
• 10Gb/s : 10,000,000.000 bps
– topology:
• bus
– Ethernet (IEEE 802.3): 10 or 100 Mbps (10Gb/s)
• ring
– IBM token ring (IEEE 802.5): 4 or 16 Mbps
• Wireless broadcast
 Channel allocation of broadcast networks
– static: each machine has an allocated time slot
– dynamic
24
Metropolitan Area Networks
A metropolitan area network based on cable TV.
25
Wide Area Networks (WANs)
Relation between hosts on LANs and the subnet.
·WANs are point-to-point networks
·WANs consist of two distinct components:
transmission lines (copper, fiber, microwave) and switches (electronics, optics)
 Store-and-forward or packet-switched subnet
Wide Area Networks
WAN that connects three branch offices in Australia
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Wide Area Networks
WAN using a virtual private network.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Wide Area Networks
WAN using an ISP network.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
29
Network Topology
30
Subnet (WANs)
Subnet (WANs) is consists of two components:
– transmission lines (circuits, channels, trunks)
• move bits between machines
– switching elements
• connect transmission lines
• Router: also called packet switching nodes,
intermediate systems, and data switching exchanges
• Operate in store-and-forward, or packet-switched
mode.
31
Wide Area Networks (2)
A stream of packets from sender to receiver. (virtual- circuit)
 Routing decisions are made locally·
 How A makes that decision is called the routing algorithm.
 Will be studied in detail in Chapter 6.
9/17 End
32
Network Software
• Protocol Hierarchies (Layer structure)
• Design Issues for the Layers
• Connection-Oriented and Connectionless Services
• Service Primitives
• The Relationship of Services to Protocols
33
Network Software
Protocol Hierarchies
– a series of layers (levels)
– lower layer provides service to higher layers
– protocol:
• an agreement between the communication parties on how
communication is to proceed
– Peers:
• the corresponding layers on different machines.
– Network architecture: a set of layers and protocols
– Protocol stack:
• a list of protocols used by a certain system, one protocol per
layer
34
Network Software
Protocol Hierarchies
Layers, protocols, and interfaces.
 Peer
Network Architecture: A set of layers and protocols
Protocol Stack: A list of protocols used by a certain system, one protocol per layer.
Virtual
Communication
Physical
Communication
35
◆ Layering
➭ To make things simple: modularization container
➭ Different layer has different functions
➭ Create layer boundary such that
● description of services can be small
● number of interactions across boundary are minimized
● potential for interface standardized
➭ Different level of abstraction in the handling of data (e.g.,
syntax, semantics)
➭ Provide appropriate services to upper layer
➭ Use service primitives of lower layer
Network Software
36
Protocol Hierarchies
The philosopher-translator-secretary architecture.
37
Protocol Hierarchies
Example information flow supporting virtual communication
in layer 5.
Message segmentation Encapsulation
38
Design Issues for the Layers
• Addressing (telephone number, e-mail address, IP
address,…)
• Error Control (error correction codes, ARQ,
HARQ,…)
• Flow Control (feedback-based, rate-based)
• Multiplexing (gathering several small messages
with the same destination into a single large
message or vice versa  Demultiplexing)
• Routing (directing traffic to the destination)
39
Design Issues for Layers
 Identify senders and receivers
– multiple computers and processes: addressing
 Data transfer
– simplex, half-duplex, full-duplex communication
– # of logical channels per connections, priorities
 Error control
– error detection
– error correction
 Sequencing of pieces
40
Design Issues for Layers
 Flow control
– feedback from the receiver
– agreed upon transmission rate
 Length of messages
– long messages: disassemble, transmit, and reassmeble
messages
– short messages: gather several small messages
 Multiplexing and Demultiplexing
– when expensive to set up a separate connection
– needed in physical layer
 Routing: split over two or more layers
– High level: London -> France or Germany -> Rome
– Low level: many available circuits
41
Connection-Oriented and Connectionless
Services
Six different types of service.
Movie download
Voice over IP
Text messaging
42
Service Primitives (operations) (1)
Six service primitives that provide a simple
connection-oriented service
ACCEPT Accept an incoming connection from a peer
43
Service Primitives (2)
Packets sent in a simple client-server interaction on a
connection-oriented network.
If the protocol stack is located in the operating system,
the primitives are normally system calls.
44
Services to Protocols Relationship
The relationship between a service and a protocol.
·The service defines what operations the layer is prepared to perform on behalf of its users
·A service is a set of primitives that a layer provides to the layer above it.
·A protocol is a set of rules governing the format and meaning of the packets which are
exchanged by the peer entities in the same layer.
Service Providers
Service Users
Services related to the interfaces between layers;
 Protocols related to the packets sent between peer entities on different machine.
45
Reference Models
• OSI reference model
• TCP/IP reference model
• Model used for this text
• Comparison of OSI and TCP/IP
• Critique of OSI model and protocols
• Critique of the TCP/IP model
46
The design principle of the OSI
reference model
• A layer should be created where a different
abstraction is needed
• Each layer should perform a well defined function
• The function of each layer can be chosen as an
international standard
• The layer boundaries should be chosen to minimize
the information flow across the interfaces
• The number of layers should be not too large or not
too small (optimum)
47
Reference Models
The OSI
reference
model.
48
The functions of the seven layers
• The physical layer is concerned with transmitting raw bits over a
communication channel
• The data link layer performs flow control and also transforms a raw
transmission facility into a line that appears error free (ARQ)
• The network layer controls the operation of the subnet, e.g. routing,
flow control, internetworking,…
• The transport layer performs assembling and disassembling,
isolates the upper layers from the changes in the network hardware,
and determines the type of services
• The session layer establishes sessions (dialog control, …)
• The presentation layer is concerned with the syntax and semantics
• The application layer contains a variety of commonly used
protocols (e.g. Hyper Text Transfer Protocol for WWW, file
transfer, e-mail, network news,…)
• Link layer
• Internet layer
• Transport layer
• Application layer
49
The TCP/IP Reference Models Layers
The TCP/IP Reference Model (1)
The TCP/IP reference model
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
The TCP/IP Reference Model (2)
The TCP/IP reference model with some protocols we will study
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
The Model Used in this Book
The reference model used in this book.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
53
Comparing OSI and TCP/IP Models
Concepts central to the OSI model
• Services: defines layer’s semantics
• Interfaces: tells the processes above it
how to access it.
• Protocols
Probably the biggest contribution of the OSI model is to make the
distinction between these three concepts explicit.
54
A Critique of the OSI Model and Protocols
Why OSI did not take over the world
• Bad timing
• Bad technology
• Bad implementations
• Bad politics
55
Bad Timing
The apocalypse of the two elephants.
new
discovery
investment
opportunity
right time
to make
56
Bad Technology
• The choice of seven layers was political
- session and presentation layers are nearly empty
- Data and network layers are overfull
• The OSI model is extraordinarily complex
• Some functions e.g. addressing, flow control,
error control reappear again and again
57
Bad Implementations
• Huge, Unwieldy, and Slow
Bad Politics
• Bureaucrats involved too much (European
telecommunication ministries, community, us
government)
58
A Critique of the TCP/IP Reference Model
Problems:
• Service, interface, and protocol not distinguished
• Not a general model
• Host-to-network “layer” not really a layer (is an interface)
• No mention of physical and data link layers
• Minor protocols deeply entrenched, hard to replace
(The virtual terminal protocol, TELNET, was designed
for mechanical teletype terminal)
59
Hybrid Model
The hybrid reference model to be used in this book.
60
Example Networks
• Internet
• ARPANET
• NSFNET
• Third-generation mobile phone networks
• Wireless LANs: 802.11
• RFID and sensor networks
61
The ARPANET
(a) Structure of the telephone system.
(b) Baran’s proposed distributed switching system.
62
 Original backbone of Internet
 Wide area network around which TCP/IP was developed
 Funding from Advanced Research Project Agency
 Initial speed 50 Kbps
ARPANET (1969-1989)
63
The ARPANET (2)
The original ARPANET design.
64
The ARPANET (3)
Growth of the ARPANET (a) December 1969. (b) July 1970.
(c) March 1971. (d) April 1972. (e) September 1972.
65
NSFNET
The NSFNET backbone in 1988.
66
 Funded by National Science Foundation
􀀀
 Motivation: Internet backbone to connect all scientists and engineers
􀀀
 Introduced Internet hierarchy
– Wide area backbone spanning geographic U.S.
– Many mid-level (regional) networks that attach to backbone
– Campus networks at lowest level
􀀀
 Initial speed 1.544 Mbps
NSFNET (1987-1992)
67
Architecture of the Internet
Overview of the Internet architecture
68
Internet Usage
Traditional applications (1970 – 1990)
• E-mail
• News
• Remote login
• File transfer
World Wide Web changed all that and brought millions of new,
nonacademic users.
Internet Service Providers (ISP) offer individual users at home
the ability to call up one of their machines and connect to
the Internet to access all kinds of services.
Third-Generation Mobile
Phone Networks (1)
Cellular design of mobile phone networks
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Third-Generation Mobile
Phone Networks (2)
Architecture of the UMTS 3G mobile phone network.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Third-Generation Mobile
Phone Networks (3)
Mobile phone handover (a) before, (b) after.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
72
Wireless LANs
(a) Wireless networking with a base station.
(b) Ad hoc networking.
Wireless LANs: 802.11 (1)
73
Multipath fading
74
Wireless LANs (2)
The range of a single radio may not cover the entire system.
75
Wireless LANs (3)
A multicell 802.11 network.
76
Network Standardization
• Who’s Who in the Telecommunications World
• Who’s Who in the International Standards World
• Who’s Who in the Internet Standards World
77
◆ Telecommunication
➭ International Telecommunication Union (ITU)
● Telecommunications Standardization Sector (ITU-T)
◆ International Standard
➭ International Standards Organization (ISO)
● ANSI (USA), ETSI (Europe)
● BSI (Great Britain)
● AFNOR(France)
➭ IEEE
◆ Internet Standard
➭ Internet Activities Board (IAB, 1983)
➭ Internet Research Task Force (IRTF)
➭ Internet Engineering Task Force (IETF)
➭ Request for Comments (RFC)
● http://cache2.cis.nctu.edu.tw/Documents/rfc/
● ftp://ftp.merit.edu/internet/documents/rfc/
➭ Internet Draft Standard
➭ Internet Standard
Standard Organizations
78
ITU
• Main sectors
• Radiocommunications
• Telecommunications Standardization
• Development
• Classes of Members
• National governments
• Sector members
• Associate members
• Regulatory agencies
Network Standardization
• Who’s Who in telecommunications
• Who’s Who in international standards
• Who’s Who in internet standards
79
80
Who’s Who in International Standards (1)
The 802 working groups. The important ones are marked with *.
The ones marked with  are hibernating. The one marked with
† gave up and disbanded itself.
(WiFi)
81
Metric Units
The principal metric prefixes.
82
◆ 1969: ARPANET
◆ 1970’s: ALOHA, Ethernet, DECNet, SNA
◆ 1980’s: Proliferation of LAN (Ethernet, Token Ring)
◆ 1987: High speed LAN/MAN (FDDI), BISDN (ATM)
◆ 1990: High speed WAN (NSFNET, 45 Mbps)
◆ 1993: High speed Ethernet (Fast Ethernet, EtherSwitch)
◆ 1996: Interent II (622Mbps)
◆ 1998: Gigabit Ethernet
History of Networking
83
◆ TANET
➭ 1991/12: 64Kbps
➭ 1992/12: 256Kbps
➭ 1994/10: 512Kbps
➭ 1995/12: T1
➭ 1997/5: T3
➭ Current Status:
● T3 to USA by the end of 1998 (Policy routing enforced)
● T3 backbone around the island
● Add a T3 from MOE to CCU
● Internet II (1999/6)
◆ HiNet (1994), SeedNet(數位聯合股份公司)
History of Taiwan’s Network

More Related Content

Similar to Chapter1.pdf

Similar to Chapter1.pdf (20)

CN-Unit 1.pptx
CN-Unit 1.pptxCN-Unit 1.pptx
CN-Unit 1.pptx
 
Basics of Networking
Basics of NetworkingBasics of Networking
Basics of Networking
 
ITE 101 - Week 6
ITE 101 -  Week 6ITE 101 -  Week 6
ITE 101 - Week 6
 
Networking Basic Refresh.pdf
Networking Basic Refresh.pdfNetworking Basic Refresh.pdf
Networking Basic Refresh.pdf
 
network basics
network basicsnetwork basics
network basics
 
Telecommunications, Internet and Wireless Technology
Telecommunications, Internet and Wireless TechnologyTelecommunications, Internet and Wireless Technology
Telecommunications, Internet and Wireless Technology
 
Lesson 3 - Networking
Lesson 3 - NetworkingLesson 3 - Networking
Lesson 3 - Networking
 
Chapter 6
Chapter 6Chapter 6
Chapter 6
 
IARE_CN_PPT_0 (1).pdf
IARE_CN_PPT_0 (1).pdfIARE_CN_PPT_0 (1).pdf
IARE_CN_PPT_0 (1).pdf
 
Telecommunications, the internet, and wireless technology
Telecommunications, the internet, and wireless technologyTelecommunications, the internet, and wireless technology
Telecommunications, the internet, and wireless technology
 
interconnected_network_of_internets.pptx
interconnected_network_of_internets.pptxinterconnected_network_of_internets.pptx
interconnected_network_of_internets.pptx
 
chapter1.ppt
chapter1.pptchapter1.ppt
chapter1.ppt
 
Lecture16.pdf
Lecture16.pdfLecture16.pdf
Lecture16.pdf
 
chapter6 intro to telecommunications.ppt
chapter6 intro to telecommunications.pptchapter6 intro to telecommunications.ppt
chapter6 intro to telecommunications.ppt
 
chapter1.ppt
chapter1.pptchapter1.ppt
chapter1.ppt
 
chapter1.ppt
chapter1.pptchapter1.ppt
chapter1.ppt
 
chapter1.ppt
chapter1.pptchapter1.ppt
chapter1.ppt
 
sunil patel
sunil patelsunil patel
sunil patel
 
chapter1.ppt
chapter1.pptchapter1.ppt
chapter1.ppt
 
Telecom Network
Telecom NetworkTelecom Network
Telecom Network
 

More from Pratik Gohel

Introduction to Asic Design and VLSI Design
Introduction to Asic Design and VLSI DesignIntroduction to Asic Design and VLSI Design
Introduction to Asic Design and VLSI DesignPratik Gohel
 
Information and Theory coding Lecture 18
Information and Theory coding Lecture 18Information and Theory coding Lecture 18
Information and Theory coding Lecture 18Pratik Gohel
 
introduction to machine learning 3c.pptx
introduction to machine learning 3c.pptxintroduction to machine learning 3c.pptx
introduction to machine learning 3c.pptxPratik Gohel
 
introduction to machine learning 3c-feature-extraction.pptx
introduction to machine learning 3c-feature-extraction.pptxintroduction to machine learning 3c-feature-extraction.pptx
introduction to machine learning 3c-feature-extraction.pptxPratik Gohel
 
introduction to machine learning 3d-collab-filtering.pptx
introduction to machine learning 3d-collab-filtering.pptxintroduction to machine learning 3d-collab-filtering.pptx
introduction to machine learning 3d-collab-filtering.pptxPratik Gohel
 
Introduction to embedded System.pptx
Introduction to embedded System.pptxIntroduction to embedded System.pptx
Introduction to embedded System.pptxPratik Gohel
 
710402_Lecture 1.ppt
710402_Lecture 1.ppt710402_Lecture 1.ppt
710402_Lecture 1.pptPratik Gohel
 
Interdependencies of IoT and cloud computing.pptx
Interdependencies of IoT and cloud computing.pptxInterdependencies of IoT and cloud computing.pptx
Interdependencies of IoT and cloud computing.pptxPratik Gohel
 
6-IoT protocol.pptx
6-IoT protocol.pptx6-IoT protocol.pptx
6-IoT protocol.pptxPratik Gohel
 
C Programming for ARM.pptx
C Programming for ARM.pptxC Programming for ARM.pptx
C Programming for ARM.pptxPratik Gohel
 
ARM Introduction.pptx
ARM Introduction.pptxARM Introduction.pptx
ARM Introduction.pptxPratik Gohel
 
machine learning.ppt
machine learning.pptmachine learning.ppt
machine learning.pptPratik Gohel
 

More from Pratik Gohel (18)

Introduction to Asic Design and VLSI Design
Introduction to Asic Design and VLSI DesignIntroduction to Asic Design and VLSI Design
Introduction to Asic Design and VLSI Design
 
Information and Theory coding Lecture 18
Information and Theory coding Lecture 18Information and Theory coding Lecture 18
Information and Theory coding Lecture 18
 
introduction to machine learning 3c.pptx
introduction to machine learning 3c.pptxintroduction to machine learning 3c.pptx
introduction to machine learning 3c.pptx
 
introduction to machine learning 3c-feature-extraction.pptx
introduction to machine learning 3c-feature-extraction.pptxintroduction to machine learning 3c-feature-extraction.pptx
introduction to machine learning 3c-feature-extraction.pptx
 
introduction to machine learning 3d-collab-filtering.pptx
introduction to machine learning 3d-collab-filtering.pptxintroduction to machine learning 3d-collab-filtering.pptx
introduction to machine learning 3d-collab-filtering.pptx
 
13486500-FFT.ppt
13486500-FFT.ppt13486500-FFT.ppt
13486500-FFT.ppt
 
Introduction to embedded System.pptx
Introduction to embedded System.pptxIntroduction to embedded System.pptx
Introduction to embedded System.pptx
 
Lecture 3.ppt
Lecture 3.pptLecture 3.ppt
Lecture 3.ppt
 
710402_Lecture 1.ppt
710402_Lecture 1.ppt710402_Lecture 1.ppt
710402_Lecture 1.ppt
 
UNIT-2.pptx
UNIT-2.pptxUNIT-2.pptx
UNIT-2.pptx
 
Interdependencies of IoT and cloud computing.pptx
Interdependencies of IoT and cloud computing.pptxInterdependencies of IoT and cloud computing.pptx
Interdependencies of IoT and cloud computing.pptx
 
6-IoT protocol.pptx
6-IoT protocol.pptx6-IoT protocol.pptx
6-IoT protocol.pptx
 
IOT gateways.pptx
IOT gateways.pptxIOT gateways.pptx
IOT gateways.pptx
 
AVRTIMER.pptx
AVRTIMER.pptxAVRTIMER.pptx
AVRTIMER.pptx
 
C Programming for ARM.pptx
C Programming for ARM.pptxC Programming for ARM.pptx
C Programming for ARM.pptx
 
ARM Introduction.pptx
ARM Introduction.pptxARM Introduction.pptx
ARM Introduction.pptx
 
arm
armarm
arm
 
machine learning.ppt
machine learning.pptmachine learning.ppt
machine learning.ppt
 

Recently uploaded

Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxabhijeetpadhi001
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 

Recently uploaded (20)

Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptx
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 

Chapter1.pdf

  • 2. 2 1.0 Technology Revolution • 18th Century Mechanical systems • 19th CenturySteam Engine • 20th CenturyInformation - gathering - distribution - processing - creating • 21st Century Networks Human-to-Human, Machine-to-Machine
  • 3. 3 ◆ A set of communication elements connected by communication links ➭ Communication elements ● Computers, printers, mobile phones, … ● Routers, switches, ... ➭ Communication links ● optic fiber ● coaxial cable ● twisted pair ● wireless (radio, microwave, satellite) ➭ Topologies ● Ring, Star, Bus, Tree, Mesh What is a Computer Network local ISP company network regional ISP router workstation server mobile
  • 4. 4 ◆ A software/hardware infrastructure ➭ Share resources ● data, files, computing power, video,… ➭ Information highway ● communication between geographically dispersed users ➭ Electronic Society ● Cyberspace ● Virtual global nation What is a Computer Network
  • 5. 5 Introduction  Computer Network – an interconnected collection of autonomous computers Internet: “network of networks” – loosely hierarchical – public Internet versus private intranet WWW a distributed systems run on the top of Internet  Distributed System – High degree of cohesiveness and transparency – A software system built on top of a network
  • 6. 6 1.1 Uses of Computer Networks • Business Applications • Home Applications • Mobile Users • Social Issues
  • 7. 7 Business Applications of Networks A network with two clients and one server. a. Resource sharing (hardware, software, information, …) c. Doing business electronically (B2B, B2C, e-commerce) b. Providing communication medium (e-mail, videoconferenceing)
  • 8. 8 Goals of Networks for Companies  Resource sharing: equipment, programs, data  high reliability – replicated data – hardware  Saving money – mainframe: 10 times faster, but 1000 times more expensive than PC – client-server model  Scalability – mainframe: replace a larger one – client-server model: add more servers  Communication medium for separated employees
  • 9. 9 Business Applications of Networks (2) The client-server model involves requests and replies. a. Two processes are involved b. A communication network is needed
  • 10. 10 Home Network Applications • Access to remote information • Person-to-person communication • Interactive entertainment • Electronic commerce
  • 11. 11  Networks for People – Access to remote information • e.g.: financial, shopping, customized newspapers, on-line digital library, WWW – Person-to-person communication • email, video conference, newsgroup – Interactive entertainment • VOD, interactive movies or TVs, game playing
  • 12. 12 Home Network Applications (2) In peer-to-peer system there are no fixed clients and servers.
  • 13. 13 Home Network Applications (3) Some forms of e-commerce. Music sharing
  • 14. 14 Mobile Network Users Combinations of wireless networks and mobile computing. Wireless Mobile Applications No No Desktop computers in offices No Yes A notebook computer used in a hotel room Yes NO Networks in older, unwired buildings Yes Yes Store inventory with a handheld computer
  • 15. 15 Social Issues • Network neutrality • Digital Millennium Copyright Act • Profiling users • Phishing
  • 16. 16 Network Hardware • Personal area networks • Local area networks • Metropolitan area networks • Wide are networks • The internet
  • 17. 17 Types of transmission technology • Broadcast links • Point-to-point links Network Hardware
  • 18. 18 Network Hardware – Broadcast networks • single communication channel shared by all machines • broadcasting or multicasting (via packets) – broadcasting: a special code in address field – multicasting: reserve one bit to indicate multicasting, the remaining n-1address bits can hold a group number. Each machine can subscribe to any groups • used by localized networks (or satellites) – point-to-point networks • many hops • routing algorithms: multiple routes are possible • used by large networks
  • 19. 19 Network Hardware Classification of interconnected processors by scale.
  • 21. Local Area Networks 21 Wireless and wired LANs. (a) 802.11. (b) Switched Ethernet.
  • 22. 22 Local Area Networks (LANs) Four broadcast networks (a) Bus 802.3 (b) Ring 802.5 (c) Token Ring 802.4 (d) Wireless LAN 802.11 ·Characterics of LANs: (a) privated-owned, (b) small size, (c) transmission technology, (d) topology ·Ethernets are most popular (up to 10 Gb/s)
  • 23. 23 Local Area Networks  Characteristics – small size – transmission technology • single cable (single channel) • 10Mbps ~ 10Gb/s • 10Gb/s : 10,000,000.000 bps – topology: • bus – Ethernet (IEEE 802.3): 10 or 100 Mbps (10Gb/s) • ring – IBM token ring (IEEE 802.5): 4 or 16 Mbps • Wireless broadcast  Channel allocation of broadcast networks – static: each machine has an allocated time slot – dynamic
  • 24. 24 Metropolitan Area Networks A metropolitan area network based on cable TV.
  • 25. 25 Wide Area Networks (WANs) Relation between hosts on LANs and the subnet. ·WANs are point-to-point networks ·WANs consist of two distinct components: transmission lines (copper, fiber, microwave) and switches (electronics, optics)  Store-and-forward or packet-switched subnet
  • 26. Wide Area Networks WAN that connects three branch offices in Australia Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
  • 27. Wide Area Networks WAN using a virtual private network. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
  • 28. Wide Area Networks WAN using an ISP network. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
  • 30. 30 Subnet (WANs) Subnet (WANs) is consists of two components: – transmission lines (circuits, channels, trunks) • move bits between machines – switching elements • connect transmission lines • Router: also called packet switching nodes, intermediate systems, and data switching exchanges • Operate in store-and-forward, or packet-switched mode.
  • 31. 31 Wide Area Networks (2) A stream of packets from sender to receiver. (virtual- circuit)  Routing decisions are made locally·  How A makes that decision is called the routing algorithm.  Will be studied in detail in Chapter 6. 9/17 End
  • 32. 32 Network Software • Protocol Hierarchies (Layer structure) • Design Issues for the Layers • Connection-Oriented and Connectionless Services • Service Primitives • The Relationship of Services to Protocols
  • 33. 33 Network Software Protocol Hierarchies – a series of layers (levels) – lower layer provides service to higher layers – protocol: • an agreement between the communication parties on how communication is to proceed – Peers: • the corresponding layers on different machines. – Network architecture: a set of layers and protocols – Protocol stack: • a list of protocols used by a certain system, one protocol per layer
  • 34. 34 Network Software Protocol Hierarchies Layers, protocols, and interfaces.  Peer Network Architecture: A set of layers and protocols Protocol Stack: A list of protocols used by a certain system, one protocol per layer. Virtual Communication Physical Communication
  • 35. 35 ◆ Layering ➭ To make things simple: modularization container ➭ Different layer has different functions ➭ Create layer boundary such that ● description of services can be small ● number of interactions across boundary are minimized ● potential for interface standardized ➭ Different level of abstraction in the handling of data (e.g., syntax, semantics) ➭ Provide appropriate services to upper layer ➭ Use service primitives of lower layer Network Software
  • 37. 37 Protocol Hierarchies Example information flow supporting virtual communication in layer 5. Message segmentation Encapsulation
  • 38. 38 Design Issues for the Layers • Addressing (telephone number, e-mail address, IP address,…) • Error Control (error correction codes, ARQ, HARQ,…) • Flow Control (feedback-based, rate-based) • Multiplexing (gathering several small messages with the same destination into a single large message or vice versa  Demultiplexing) • Routing (directing traffic to the destination)
  • 39. 39 Design Issues for Layers  Identify senders and receivers – multiple computers and processes: addressing  Data transfer – simplex, half-duplex, full-duplex communication – # of logical channels per connections, priorities  Error control – error detection – error correction  Sequencing of pieces
  • 40. 40 Design Issues for Layers  Flow control – feedback from the receiver – agreed upon transmission rate  Length of messages – long messages: disassemble, transmit, and reassmeble messages – short messages: gather several small messages  Multiplexing and Demultiplexing – when expensive to set up a separate connection – needed in physical layer  Routing: split over two or more layers – High level: London -> France or Germany -> Rome – Low level: many available circuits
  • 41. 41 Connection-Oriented and Connectionless Services Six different types of service. Movie download Voice over IP Text messaging
  • 42. 42 Service Primitives (operations) (1) Six service primitives that provide a simple connection-oriented service ACCEPT Accept an incoming connection from a peer
  • 43. 43 Service Primitives (2) Packets sent in a simple client-server interaction on a connection-oriented network. If the protocol stack is located in the operating system, the primitives are normally system calls.
  • 44. 44 Services to Protocols Relationship The relationship between a service and a protocol. ·The service defines what operations the layer is prepared to perform on behalf of its users ·A service is a set of primitives that a layer provides to the layer above it. ·A protocol is a set of rules governing the format and meaning of the packets which are exchanged by the peer entities in the same layer. Service Providers Service Users Services related to the interfaces between layers;  Protocols related to the packets sent between peer entities on different machine.
  • 45. 45 Reference Models • OSI reference model • TCP/IP reference model • Model used for this text • Comparison of OSI and TCP/IP • Critique of OSI model and protocols • Critique of the TCP/IP model
  • 46. 46 The design principle of the OSI reference model • A layer should be created where a different abstraction is needed • Each layer should perform a well defined function • The function of each layer can be chosen as an international standard • The layer boundaries should be chosen to minimize the information flow across the interfaces • The number of layers should be not too large or not too small (optimum)
  • 48. 48 The functions of the seven layers • The physical layer is concerned with transmitting raw bits over a communication channel • The data link layer performs flow control and also transforms a raw transmission facility into a line that appears error free (ARQ) • The network layer controls the operation of the subnet, e.g. routing, flow control, internetworking,… • The transport layer performs assembling and disassembling, isolates the upper layers from the changes in the network hardware, and determines the type of services • The session layer establishes sessions (dialog control, …) • The presentation layer is concerned with the syntax and semantics • The application layer contains a variety of commonly used protocols (e.g. Hyper Text Transfer Protocol for WWW, file transfer, e-mail, network news,…)
  • 49. • Link layer • Internet layer • Transport layer • Application layer 49 The TCP/IP Reference Models Layers
  • 50. The TCP/IP Reference Model (1) The TCP/IP reference model Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
  • 51. The TCP/IP Reference Model (2) The TCP/IP reference model with some protocols we will study Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
  • 52. The Model Used in this Book The reference model used in this book. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
  • 53. 53 Comparing OSI and TCP/IP Models Concepts central to the OSI model • Services: defines layer’s semantics • Interfaces: tells the processes above it how to access it. • Protocols Probably the biggest contribution of the OSI model is to make the distinction between these three concepts explicit.
  • 54. 54 A Critique of the OSI Model and Protocols Why OSI did not take over the world • Bad timing • Bad technology • Bad implementations • Bad politics
  • 55. 55 Bad Timing The apocalypse of the two elephants. new discovery investment opportunity right time to make
  • 56. 56 Bad Technology • The choice of seven layers was political - session and presentation layers are nearly empty - Data and network layers are overfull • The OSI model is extraordinarily complex • Some functions e.g. addressing, flow control, error control reappear again and again
  • 57. 57 Bad Implementations • Huge, Unwieldy, and Slow Bad Politics • Bureaucrats involved too much (European telecommunication ministries, community, us government)
  • 58. 58 A Critique of the TCP/IP Reference Model Problems: • Service, interface, and protocol not distinguished • Not a general model • Host-to-network “layer” not really a layer (is an interface) • No mention of physical and data link layers • Minor protocols deeply entrenched, hard to replace (The virtual terminal protocol, TELNET, was designed for mechanical teletype terminal)
  • 59. 59 Hybrid Model The hybrid reference model to be used in this book.
  • 60. 60 Example Networks • Internet • ARPANET • NSFNET • Third-generation mobile phone networks • Wireless LANs: 802.11 • RFID and sensor networks
  • 61. 61 The ARPANET (a) Structure of the telephone system. (b) Baran’s proposed distributed switching system.
  • 62. 62  Original backbone of Internet  Wide area network around which TCP/IP was developed  Funding from Advanced Research Project Agency  Initial speed 50 Kbps ARPANET (1969-1989)
  • 63. 63 The ARPANET (2) The original ARPANET design.
  • 64. 64 The ARPANET (3) Growth of the ARPANET (a) December 1969. (b) July 1970. (c) March 1971. (d) April 1972. (e) September 1972.
  • 66. 66  Funded by National Science Foundation 􀀀  Motivation: Internet backbone to connect all scientists and engineers 􀀀  Introduced Internet hierarchy – Wide area backbone spanning geographic U.S. – Many mid-level (regional) networks that attach to backbone – Campus networks at lowest level 􀀀  Initial speed 1.544 Mbps NSFNET (1987-1992)
  • 67. 67 Architecture of the Internet Overview of the Internet architecture
  • 68. 68 Internet Usage Traditional applications (1970 – 1990) • E-mail • News • Remote login • File transfer World Wide Web changed all that and brought millions of new, nonacademic users. Internet Service Providers (ISP) offer individual users at home the ability to call up one of their machines and connect to the Internet to access all kinds of services.
  • 69. Third-Generation Mobile Phone Networks (1) Cellular design of mobile phone networks Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
  • 70. Third-Generation Mobile Phone Networks (2) Architecture of the UMTS 3G mobile phone network. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
  • 71. Third-Generation Mobile Phone Networks (3) Mobile phone handover (a) before, (b) after. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
  • 72. 72 Wireless LANs (a) Wireless networking with a base station. (b) Ad hoc networking.
  • 73. Wireless LANs: 802.11 (1) 73 Multipath fading
  • 74. 74 Wireless LANs (2) The range of a single radio may not cover the entire system.
  • 75. 75 Wireless LANs (3) A multicell 802.11 network.
  • 76. 76 Network Standardization • Who’s Who in the Telecommunications World • Who’s Who in the International Standards World • Who’s Who in the Internet Standards World
  • 77. 77 ◆ Telecommunication ➭ International Telecommunication Union (ITU) ● Telecommunications Standardization Sector (ITU-T) ◆ International Standard ➭ International Standards Organization (ISO) ● ANSI (USA), ETSI (Europe) ● BSI (Great Britain) ● AFNOR(France) ➭ IEEE ◆ Internet Standard ➭ Internet Activities Board (IAB, 1983) ➭ Internet Research Task Force (IRTF) ➭ Internet Engineering Task Force (IETF) ➭ Request for Comments (RFC) ● http://cache2.cis.nctu.edu.tw/Documents/rfc/ ● ftp://ftp.merit.edu/internet/documents/rfc/ ➭ Internet Draft Standard ➭ Internet Standard Standard Organizations
  • 78. 78 ITU • Main sectors • Radiocommunications • Telecommunications Standardization • Development • Classes of Members • National governments • Sector members • Associate members • Regulatory agencies
  • 79. Network Standardization • Who’s Who in telecommunications • Who’s Who in international standards • Who’s Who in internet standards 79
  • 80. 80 Who’s Who in International Standards (1) The 802 working groups. The important ones are marked with *. The ones marked with  are hibernating. The one marked with † gave up and disbanded itself. (WiFi)
  • 81. 81 Metric Units The principal metric prefixes.
  • 82. 82 ◆ 1969: ARPANET ◆ 1970’s: ALOHA, Ethernet, DECNet, SNA ◆ 1980’s: Proliferation of LAN (Ethernet, Token Ring) ◆ 1987: High speed LAN/MAN (FDDI), BISDN (ATM) ◆ 1990: High speed WAN (NSFNET, 45 Mbps) ◆ 1993: High speed Ethernet (Fast Ethernet, EtherSwitch) ◆ 1996: Interent II (622Mbps) ◆ 1998: Gigabit Ethernet History of Networking
  • 83. 83 ◆ TANET ➭ 1991/12: 64Kbps ➭ 1992/12: 256Kbps ➭ 1994/10: 512Kbps ➭ 1995/12: T1 ➭ 1997/5: T3 ➭ Current Status: ● T3 to USA by the end of 1998 (Policy routing enforced) ● T3 backbone around the island ● Add a T3 from MOE to CCU ● Internet II (1999/6) ◆ HiNet (1994), SeedNet(數位聯合股份公司) History of Taiwan’s Network