SlideShare a Scribd company logo
1 of 60
Download to read offline
Faculty of Computing
Advanced Computer 
Networks
MSIT 6101
Tesfa Tegegne (PhD)
Learning Outcomes
• To gain a general understanding of the
principles and concepts governing the
operations of computer networks;
• To provide you with the opportunity to become
skillful in the implementation and use of
communication protocols;
• To grasp the basic research methodologies in
the field of computer networks
• To conduct basic research in the emerging
fields of computer Networks
Course Plan
1. Computer Networks and Internet
2. Application layer
3. Transport layer
4. Network layer and Routing
5. Link layer and Local Area Networks
6. Multimedia Networking (if time allows)
7. Security in Computer Networking
Evaluation
• Assignment (paper review, presentation)
• Project
• Short paper 
• Final exam
Reading Materials
Text book:
1. James Kurose, Keith W. Ross, Computer 
Networking, a top down approach, 6th ed., 
Addison Wesley
2. Andrew S. Tanenbaum, Computer Networks, 
Prentice Hall 
3. Douglas Comer, Computer Networks and 
Internets (with Internet Applications),
Prentice Hall 
4. Articles from journals and conferences
Introduction
1.1 what is the Internet?
1.2 network edge
 end systems, access networks, links
1.3 network core
 packet switching, circuit switching, network structure
1.4 delay, loss, throughput in networks
1.5 protocol layers, service models
1.6 networks under attack: security
1.7 history
What is the internet nuts and bolts View
• millions of connected computing 
devices: 
– hosts = end systems
– running network apps
 communication links
 fiber, copper, radio,
satellite
 transmission rate:
bandwidth
 Packet switches: forward packets
(chunks of data)
 routers and switches
wired
links
wireless
links
router
mobile network
global ISP
regional ISP
home 
network
institutional
network
smartphone
PC
server
wireless
laptop
Internet
What is it:
• A collection of protocols
• Mainly centered around two centerpieces:
– IP (network layer)
– UDP/TCP (transport layer)
• Does not mandate a physical medium or 
format
• Does not mandate or limit the 
services/applications above (integrates 
services)
“Fun” internet appliances
IP picture frame
http://www.ceiva.com/
Web‐enabled toaster +
weather forecaster
Internet phones
Internet 
refrigerator
Slingbox: watch,
control cable TV remotely
Tweet‐a‐watt: 
monitor energy use
What’s the Internet: “nuts and bolts” view
• Internet: “network of 
networks”
– Interconnected ISPs
• protocols control sending, 
receiving of msgs
– e.g., TCP, IP, HTTP, Skype,  
802.11
• Internet  standards
– RFC: Request for comments
– IETF: Internet Engineering Task 
Force
What’s the Internet: a service view
• Infrastructure that provides 
services to applications:
– Web, VoIP, email, games, e‐
commerce, social nets, …
• provides programming 
interface to apps
– hooks that allow sending 
and receiving  app programs 
to “connect” to Internet
– provides service options, 
analogous to postal service
mobile network
global ISP
regional ISP
home 
network
institutional
network
What’s a protocol?
human protocols:
• “what’s the time?”
• “I have a question”
• introductions
… specific msgs sent
… specific actions taken 
when msgs received, or 
other events
network protocols:
• machines rather than 
humans
• all communication activity 
in Internet governed by 
protocols
protocols define format, order of
msgs sent and received
among network entities, and
actions taken on msg
transmission, receipt
What’s a protocol?
a human protocol and a computer network protocol:
Q: other human protocols?
Hi
Hi
Got the
time?
2:00
TCP connection
response
<file>
time
TCP connection
request
A closer look at network structure:
• network edge:
– hosts: clients and servers
– servers often in data 
centers
 access networks, physical
media: wired, wireless
communication links
 network core:
interconnected routers
network of networks
mobile network
global ISP
regional ISP
home 
network
institutional
network
Access networks and physical media
Q: How to connect end 
systems to edge 
router?
• residential access nets
• institutional access 
networks (school, company)
• mobile access networks
keep in mind: 
• bandwidth (bits per second) 
of access network?
• shared or dedicated?
Access net: digital subscriber line (DSL)
central office
ISP
telephone
network
DSLAM
voice, data transmitted
at different frequencies over
dedicated line to central office
 use existing telephone line to central office DSLAM
 data over DSL phone line goes to Internet
 voice over DSL phone line goes to telephone net
 < 2.5 Mbps upstream transmission rate (typically < 1 Mbps)
 < 24 Mbps downstream transmission rate (typically < 10 Mbps)
DSL
modem
splitter
DSL access 
multiplexer
Access net: cable network
cable
modem
splitter
…
cable headend
Channels
V
I
D
E
O
V
I
D
E
O
V
I
D
E
O
V
I
D
E
O
V
I
D
E
O
V
I
D
E
O
D
A
T
A
D
A
T
A
C
O
N
T
R
O
L
1 2 3 4 5 6 7 8 9
frequency division multiplexing: different channels transmitted
in different frequency bands
Access net: cable network
data, TV transmitted at different 
frequencies over shared cable 
distribution network
cable
modem
splitter
…
cable headend
CMTS
ISP
cable modem
termination system
 HFC: hybrid fiber coax
 asymmetric: up to 30Mbps downstream transmission rate, 2 Mbps
upstream transmission rate
 network of cable, fiber attaches homes to ISP router
 homes share access network to cable headend
 unlike DSL, which has dedicated access to central office
Access net: home network
cable or DSL modem
router, firewall, NAT
wired Ethernet (100 Mbps)
wireless access 
point (54 Mbps)
wireless
devices
often combined 
in single box
to/from headend or 
central office
Enterprise access networks (Ethernet)
• typically used in companies, universities, etc
• 10 Mbps, 100Mbps, 1Gbps, 10Gbps transmission rates
• today, end systems typically connect into Ethernet switch
Ethernet 
switch
institutional mail,
web servers
institutional router
institutional link to 
ISP (Internet)
Wireless access networks
• shared wireless access network connects end system to router
– via base station aka “access point”
wireless LANs:
 within building (100 ft)
 802.11b/g (WiFi): 11, 54 Mbps
transmission rate
wide-area wireless access
 provided by telecom (cellular)
operator, 10’s km
 between 1 and 10 Mbps
 3G, 4G: LTE
to Internet
to Internet
The network core
• mesh of interconnected 
routers
• packet‐switching: hosts 
break application‐layer 
messages into packets
– forward packets from 
one router to the next, 
across links on path 
from source to 
destination
– each packet transmitted 
at full link capacity
Packet‐switching: store‐and‐forward
• takes L/R seconds to 
transmit (push out) L‐bit 
packet into link at R bps
• store and forward: entire 
packet must  arrive at router 
before it can be transmitted 
on next link
one‐hop numerical 
example:
 L = 7.5 Mbits
 R = 1.5 Mbps
 one‐hop transmission 
delay = 5 sec
more on delay shortly …
source
R bps
destination
123
L bits
per packet
R bps
Packet Switching: queuing delay, loss
A
B
CR = 100 Mb/s
R = 1.5 Mb/s
D
E
queue of packets
waiting for output 
link
queuing and loss:
 If arrival rate (in bits) to link exceeds transmission rate of
link for a period of time:
 packets will queue, wait to be transmitted on link
 packets can be dropped (lost) if memory (buffer) fills up
Two key network‐core functions
forwarding: move 
packets from router’s input 
to appropriate router output
routing: determines source-
destination route taken by
packets
 routing algorithms
routing algorithm
local forwarding table
header value output link
0100
0101
0111
1001
3
2
2
1
1
23
dest address in arriving
packet’s header
Alternative core: circuit switching
end‐end resources allocated 
to, reserved for “call”
between source & dest:
• In diagram, each link has four circuits. 
– call gets 2nd circuit in top 
link and 1st circuit in right 
link.
• dedicated resources: no sharing
– circuit‐like (guaranteed) 
performance
• circuit segment idle if not used by call 
(no sharing)
• Commonly used in traditional 
telephone networks
Circuit switching: FDM versus TDM
FDM
frequency
timeTDM
frequency
time
4 users
Example:
Packet switching versus circuit switching
example:
 1 Mb/s link
 each user: 
• 100 kb/s when “active”
• active 10% of time
• circuit‐switching:
– 10 users
• packet switching:
– with 35 users, probability > 
10 active at same time is less 
than .0004 *
packet switching allows more users to use network!
N
users
1 Mbps link
Q: how did we get value 0.0004?
Q: what happens if > 35 users ?
Packet switching versus circuit switching
• great for bursty data
– resource sharing
– simpler, no call setup
• excessive congestion possible: packet delay and loss
– protocols needed for reliable data transfer, congestion 
control
• Q: How to provide circuit‐like behavior?
– bandwidth guarantees needed for audio/video apps
is packet switching a “slam dunk winner?”
Q: human analogies of reserved resources (circuit switching)
versus on-demand allocation (packet-switching)?
Internet structure: network of networks
• End systems connect to Internet via access
ISPs (Internet Service Providers)
– Residential, company and university ISPs
• Access ISPs in turn must be interconnected.
– So that any two hosts can send packets to each
other
• Resulting network of networks is very
complex
– Evolution was driven by economics and national
policies
• Let’s take a stepwise approach to describe
current Internet structure
Internet structure: network of networks
Option: connect each access ISP to every other access ISP? 
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
netaccess
net
access
net
connecting each access ISP to each other 
directly doesn’t scale: O(N2) connections.
Internet structure: network of networks
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
netaccess
net
access
net
Option: connect each access ISP to a global transit ISP? Customer
and provider ISPs have economic agreement.
global
ISP
Internet structure: network of networks
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
netaccess
net
access
net
But if one global ISP is viable business, there will be competitors
….
ISP B
ISP A
ISP C
Internet structure: network of networks
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
netaccess
net
access
net
But if one global ISP is viable business, there will be competitors
…. which must be interconnected
ISP B
ISP A
ISP C
IXP
IXP
peering link
Internet exchange point
Internet structure: network of networks
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
netaccess
net
access
net
… and regional networks may arise to connect access nets to
ISPS
ISP B
ISP A
ISP C
IXP
IXP
regional net
Internet structure: network of networks
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
netaccess
net
access
net
… and content provider networks (e.g., Google, Microsoft) may run their
own network, to bring services, content close to end users
ISP B
ISP A
ISP B
IXP
IXP
regional net
Content provider network
Internet structure: network of networks
• at center: small # of well‐connected large networks
– “tier‐1” commercial ISPs (e.g., Level 3, Sprint, AT&T, NTT), national & 
international coverage
– content provider network (e.g, Google): private network that connects it 
data centers to Internet, often bypassing tier‐1, regional ISPs
access
ISP
access
ISP
access
ISP
access
ISP
access
ISP
access
ISP
access
ISP
access
ISP
Regional ISP Regional ISP
IXP IXP
Tier 1 ISP Tier 1 ISP Google
IXP
How do loss and delay occur?
packets queue in router buffers 
• packet arrival rate to link (temporarily) exceeds output link 
capacity
• packets queue, wait for turn
A
B
packet being transmitted (delay)
packets queueing (delay)
free (available) buffers: arriving packets 
dropped (loss) if no free buffers
Four sources of packet delay
dproc: nodal processing
 check bit errors
 determine output link
 typically < msec
A
B
propagation
transmission
nodal
processing queueing
dqueue: queueing delay
 time waiting at output link for
transmission
 depends on congestion level of
router
dnodal = dproc + dqueue + dtrans + dprop
Four sources of packet delay
dtrans: transmission delay:
 L: packet length (bits)
 R: link bandwidth (bps)
 dtrans = L/R
dprop: propagation delay:
 d: length of physical link
 s: propagation speed in medium
(~2x108 m/sec)
 dprop = d/s
dtrans and dprop
very different
propagation
nodal
processing queueing
dnodal = dproc + dqueue + dtrans + dprop
A
B
transmission
“Real” Internet delays and routes
• what do “real” Internet delay & loss look like? 
• traceroute program: provides delay 
measurement from source to router along end‐end 
Internet path towards destination.  For all i:
– sends three packets that will reach router i on path 
towards destination
– router i will return packets to sender
– sender times interval between transmission and reply.
3 probes
3 probes
3 probes
Packet loss
• queue (buffer) preceding link in buffer has finite 
capacity
• packet arriving to full queue dropped (lost)
• lost packet may be retransmitted by previous 
node, by source end system, or not at all
A
B
packet being transmitted
packet arriving to
full buffer is lost
buffer 
(waiting area)
* Check out the Java applet for an interactive animation on queuing and loss
Throughput
• throughput: rate (bits/time unit) at which bits 
transferred between sender/receiver
– instantaneous: rate at given point in time
– average: rate over longer period of time
server, with
file of F bits
to send to client
link capacity
Rs bits/sec
link capacity
Rc bits/sec
server sends bits
(fluid) into pipe
pipe that can carry
fluid at rate
Rs bits/sec)
pipe that can carry
fluid at rate
Rc bits/sec)
Throughput…
• Rs < Rc What is average end‐end throughput?
Rs bits/sec Rc bits/sec
 Rs > Rc What is average end-end throughput?
link on end-end path that constrains end-end throughput
bottleneck link
Rs bits/sec Rc bits/sec
Throughput: Internet scenario
Rs
Rs
Rs
Rc
Rc
Rc
R
• per‐connection 
end‐end 
throughput: 
min(Rc,Rs,R/10)
• in practice: Rc or 
Rs is often 
bottleneck
10 connections (fairly) share 
backbone bottleneck link Rbits/sec
1.5 protocol layers, service models
Protocol “layers”
Networks are 
complex,
with many “pieces”:
– hosts
– routers
– links of various 
media
– applications
– protocols
– hardware, software
Question:
is there any hope of 
organizing structure of 
network?
…. or at least our discussion 
of networks?
Organization of air travel
• a series of steps
Layering of airline functionality
layers: each layer implements a service
– via its own internal‐layer actions
– relying on services provided by layer below
Introduction
Why layering?
dealing with complex systems:
• explicit structure allows identification, 
relationship of complex system’s pieces
– layered reference model for discussion
• modularization eases maintenance, updating 
of system
– change of implementation of layer’s service 
transparent to rest of system
– e.g., change in gate procedure doesn’t affect rest 
of system
• layering considered harmful?
1‐50
Internet protocol stack
• application: supporting network 
applications
– FTP, SMTP, HTTP
• transport: process‐process data 
transfer
– TCP, UDP
• network: routing of datagrams
from source to destination
– IP, routing protocols
• link: data transfer between 
neighboring  network elements
– Ethernet, 802.111 (WiFi), PPP
• physical: bits “on the wire”
Application
Transport
Network
Link 
Physical
ISO/OSI reference model
• presentation: allow applications 
to interpret meaning of data, 
e.g., encryption, compression, 
machine‐specific conventions
• session: synchronization, 
checkpointing, recovery of data 
exchange
• Internet stack “missing” these 
layers!
– these services, if needed, must be 
implemented in application
– needed?
Application
Presentation
Session 
Transport
Network
Data link 
Physical
Introduction
source
application
transport
network
link
physical
HtHn M
segment Ht
datagram
destination
application
transport
network
link
physical
HtHnHl M
HtHn M
Ht M
M
network
link
physical
link
physical
HtHnHl M
HtHn M
HtHn M
HtHnHl M
router
switch
Encapsulation
message M
Ht M
Hn
frame
1‐53
Introduction
1.6 networks under attack: security
1‐54
Network security
• field of network security:
– how bad guys can attack computer networks
– how we can defend networks against attacks
– how to design architectures that are immune to 
attacks
• Internet not originally designed with (much) 
security in mind
– original vision: “a group of mutually trusting users 
attached to a transparent network” 
– Internet protocol designers playing “catch‐up”
– security considerations in all layers!
Bad guys: put malware into hosts via 
Internet
• malware can get in host from:
– virus: self‐replicating infection by 
receiving/executing  object (e.g., e‐mail 
attachment)
– worm: self‐replicating infection by passively 
receiving object that gets itself executed
• spyware malware can record keystrokes, web 
sites visited, upload info to collection site
• infected host can be enrolled in  botnet, used 
for spam. DDoS attacks
Introduction
target
Denial of Service (DoS): attackers make resources (server, 
bandwidth) unavailable to legitimate traffic by 
overwhelming resource with bogus traffic
1. select target
2. break into hosts around the
network (see botnet)
3. send packets to target from
compromised hosts
Bad guys: attack server, network
infrastructure
1‐57
Introduction
Bad guys can sniff packets
packet “sniffing”:
– broadcast media (shared ethernet, wireless)
– promiscuous network interface reads/records all 
packets (e.g., including passwords!) passing by
A
B
C
src:B dest:A     payload
 wireshark software used for end-of-chapter labs is a (free) packet-sniffer
1‐58
Introduction
Bad guys can use fake addresses
IP spoofing: send packet with false source 
addressA
B
C
src:B dest:A     payload
1‐59
… lots more on security (throughout, Chapter 8 of the book)
Questions…..

More Related Content

What's hot

Networking Concepts Lesson 06 - Protocols - Eric Vanderburg
Networking Concepts Lesson 06 - Protocols - Eric VanderburgNetworking Concepts Lesson 06 - Protocols - Eric Vanderburg
Networking Concepts Lesson 06 - Protocols - Eric VanderburgEric Vanderburg
 
Communications Systems
Communications SystemsCommunications Systems
Communications SystemsLiam Dunphy
 
SOLUTION MANUAL OF COMMUNICATION NETWORKS BY ALBERTO LEON GARCIA & INDRA WIDJAJA
SOLUTION MANUAL OF COMMUNICATION NETWORKS BY ALBERTO LEON GARCIA & INDRA WIDJAJASOLUTION MANUAL OF COMMUNICATION NETWORKS BY ALBERTO LEON GARCIA & INDRA WIDJAJA
SOLUTION MANUAL OF COMMUNICATION NETWORKS BY ALBERTO LEON GARCIA & INDRA WIDJAJAvtunotesbysree
 
Introduction to Data-Link Layer
Introduction to Data-Link LayerIntroduction to Data-Link Layer
Introduction to Data-Link LayerAbdullaziz Tagawy
 
DPRoPHET in Delay Tolerant Network
DPRoPHET in Delay Tolerant NetworkDPRoPHET in Delay Tolerant Network
DPRoPHET in Delay Tolerant NetworkPhearin Sok
 
Unit 2 cnd_22634_pranoti doke
Unit 2 cnd_22634_pranoti dokeUnit 2 cnd_22634_pranoti doke
Unit 2 cnd_22634_pranoti dokePranoti Doke
 
Osi model with neworking overview
Osi model with neworking overviewOsi model with neworking overview
Osi model with neworking overviewSripati Mahapatra
 
Lec 2 and_3
Lec 2 and_3Lec 2 and_3
Lec 2 and_3hz3012
 
EC8551 COMMUNICATION NETWORKS
EC8551 COMMUNICATION NETWORKSEC8551 COMMUNICATION NETWORKS
EC8551 COMMUNICATION NETWORKSGOWTHAMMS6
 
Computer networks
Computer networksComputer networks
Computer networksTej Kiran
 
Communication protocol presentation
Communication protocol presentationCommunication protocol presentation
Communication protocol presentationGopi A
 
Jaimin chp-1 - introduction - 2011 batch
Jaimin   chp-1  - introduction - 2011 batchJaimin   chp-1  - introduction - 2011 batch
Jaimin chp-1 - introduction - 2011 batchJaimin Jani
 

What's hot (20)

Networking Concepts Lesson 06 - Protocols - Eric Vanderburg
Networking Concepts Lesson 06 - Protocols - Eric VanderburgNetworking Concepts Lesson 06 - Protocols - Eric Vanderburg
Networking Concepts Lesson 06 - Protocols - Eric Vanderburg
 
Chapter3 transport
Chapter3 transportChapter3 transport
Chapter3 transport
 
Application layer : DNS
Application layer : DNSApplication layer : DNS
Application layer : DNS
 
Communications Systems
Communications SystemsCommunications Systems
Communications Systems
 
SOLUTION MANUAL OF COMMUNICATION NETWORKS BY ALBERTO LEON GARCIA & INDRA WIDJAJA
SOLUTION MANUAL OF COMMUNICATION NETWORKS BY ALBERTO LEON GARCIA & INDRA WIDJAJASOLUTION MANUAL OF COMMUNICATION NETWORKS BY ALBERTO LEON GARCIA & INDRA WIDJAJA
SOLUTION MANUAL OF COMMUNICATION NETWORKS BY ALBERTO LEON GARCIA & INDRA WIDJAJA
 
Transport layer services
Transport layer servicesTransport layer services
Transport layer services
 
Introduction to Data-Link Layer
Introduction to Data-Link LayerIntroduction to Data-Link Layer
Introduction to Data-Link Layer
 
DPRoPHET in Delay Tolerant Network
DPRoPHET in Delay Tolerant NetworkDPRoPHET in Delay Tolerant Network
DPRoPHET in Delay Tolerant Network
 
Point to-point protocol (ppp)
Point to-point protocol (ppp)Point to-point protocol (ppp)
Point to-point protocol (ppp)
 
Unit 2 cnd_22634_pranoti doke
Unit 2 cnd_22634_pranoti dokeUnit 2 cnd_22634_pranoti doke
Unit 2 cnd_22634_pranoti doke
 
Chapter4 Network
Chapter4 NetworkChapter4 Network
Chapter4 Network
 
Networks software
Networks softwareNetworks software
Networks software
 
Osi model with neworking overview
Osi model with neworking overviewOsi model with neworking overview
Osi model with neworking overview
 
Lec 2 and_3
Lec 2 and_3Lec 2 and_3
Lec 2 and_3
 
EC8551 COMMUNICATION NETWORKS
EC8551 COMMUNICATION NETWORKSEC8551 COMMUNICATION NETWORKS
EC8551 COMMUNICATION NETWORKS
 
Network th ITM3
Network th ITM3Network th ITM3
Network th ITM3
 
Computer networks
Computer networksComputer networks
Computer networks
 
1st Talk
1st Talk1st Talk
1st Talk
 
Communication protocol presentation
Communication protocol presentationCommunication protocol presentation
Communication protocol presentation
 
Jaimin chp-1 - introduction - 2011 batch
Jaimin   chp-1  - introduction - 2011 batchJaimin   chp-1  - introduction - 2011 batch
Jaimin chp-1 - introduction - 2011 batch
 

Similar to 1 introduction

Week 1B.pdf Networking introduction week 1
Week 1B.pdf Networking introduction week 1Week 1B.pdf Networking introduction week 1
Week 1B.pdf Networking introduction week 1whiz5
 
lec 3 4 Core Delays Thruput Net Arch.ppt
lec 3 4 Core Delays Thruput Net Arch.pptlec 3 4 Core Delays Thruput Net Arch.ppt
lec 3 4 Core Delays Thruput Net Arch.pptMahamKhurram4
 
Lec 4 and_5
Lec 4 and_5Lec 4 and_5
Lec 4 and_5hz3012
 
Lec 2(intoduction of computer networkes)
Lec 2(intoduction of computer networkes)Lec 2(intoduction of computer networkes)
Lec 2(intoduction of computer networkes)maamir farooq
 
Sept 2017 introduction
Sept 2017   introductionSept 2017   introduction
Sept 2017 introductionshahin raj
 
Week_1_Intro_Internet_arch_Applications.ppt
Week_1_Intro_Internet_arch_Applications.pptWeek_1_Intro_Internet_arch_Applications.ppt
Week_1_Intro_Internet_arch_Applications.ppthome107
 
preKnowledge-InternetNetworking Android's mobile operating system is based on...
preKnowledge-InternetNetworking Android's mobile operating system is based on...preKnowledge-InternetNetworking Android's mobile operating system is based on...
preKnowledge-InternetNetworking Android's mobile operating system is based on...jeronimored
 
preKnowledge-InternetNetworking.ppt
preKnowledge-InternetNetworking.pptpreKnowledge-InternetNetworking.ppt
preKnowledge-InternetNetworking.pptabdullahalamin69
 
ComputerNetwork_Introductions_C1_en.pptx
ComputerNetwork_Introductions_C1_en.pptxComputerNetwork_Introductions_C1_en.pptx
ComputerNetwork_Introductions_C1_en.pptxhuypmg22git
 
Chapter1 Introduction.pptx
Chapter1 Introduction.pptxChapter1 Introduction.pptx
Chapter1 Introduction.pptxhuanyuzhang5
 
Unit i packet switching networks
Unit i  packet switching networksUnit i  packet switching networks
Unit i packet switching networkssangusajjan
 
Computer networking Chapter 3.hsjwjjajskwkkw
Computer networking Chapter 3.hsjwjjajskwkkwComputer networking Chapter 3.hsjwjjajskwkkw
Computer networking Chapter 3.hsjwjjajskwkkwAgentNawab
 
network basics
network basicsnetwork basics
network basicsAvin Ash
 
Lec-01 Introduction Computer Networks...
Lec-01 Introduction Computer Networks...Lec-01 Introduction Computer Networks...
Lec-01 Introduction Computer Networks...bismahmalik22
 
Chapter1 introduction
Chapter1 introductionChapter1 introduction
Chapter1 introductionKhánh Ghẻ
 

Similar to 1 introduction (20)

Week 1B.pdf Networking introduction week 1
Week 1B.pdf Networking introduction week 1Week 1B.pdf Networking introduction week 1
Week 1B.pdf Networking introduction week 1
 
lec 3 4 Core Delays Thruput Net Arch.ppt
lec 3 4 Core Delays Thruput Net Arch.pptlec 3 4 Core Delays Thruput Net Arch.ppt
lec 3 4 Core Delays Thruput Net Arch.ppt
 
Lec 4 and_5
Lec 4 and_5Lec 4 and_5
Lec 4 and_5
 
Tcp ip
Tcp ipTcp ip
Tcp ip
 
Chapter_1_.pptx
Chapter_1_.pptxChapter_1_.pptx
Chapter_1_.pptx
 
Lec 2(intoduction of computer networkes)
Lec 2(intoduction of computer networkes)Lec 2(intoduction of computer networkes)
Lec 2(intoduction of computer networkes)
 
Sept 2017 introduction
Sept 2017   introductionSept 2017   introduction
Sept 2017 introduction
 
Week_1_Intro_Internet_arch_Applications.ppt
Week_1_Intro_Internet_arch_Applications.pptWeek_1_Intro_Internet_arch_Applications.ppt
Week_1_Intro_Internet_arch_Applications.ppt
 
preKnowledge-InternetNetworking Android's mobile operating system is based on...
preKnowledge-InternetNetworking Android's mobile operating system is based on...preKnowledge-InternetNetworking Android's mobile operating system is based on...
preKnowledge-InternetNetworking Android's mobile operating system is based on...
 
preKnowledge-InternetNetworking.ppt
preKnowledge-InternetNetworking.pptpreKnowledge-InternetNetworking.ppt
preKnowledge-InternetNetworking.ppt
 
ComputerNetwork_Introductions_C1_en.pptx
ComputerNetwork_Introductions_C1_en.pptxComputerNetwork_Introductions_C1_en.pptx
ComputerNetwork_Introductions_C1_en.pptx
 
Chapter1 Introduction.pptx
Chapter1 Introduction.pptxChapter1 Introduction.pptx
Chapter1 Introduction.pptx
 
Lecture 01
Lecture 01Lecture 01
Lecture 01
 
Unit i packet switching networks
Unit i  packet switching networksUnit i  packet switching networks
Unit i packet switching networks
 
Week1 lec2-bscs1
Week1 lec2-bscs1Week1 lec2-bscs1
Week1 lec2-bscs1
 
Computer networking Chapter 3.hsjwjjajskwkkw
Computer networking Chapter 3.hsjwjjajskwkkwComputer networking Chapter 3.hsjwjjajskwkkw
Computer networking Chapter 3.hsjwjjajskwkkw
 
network basics
network basicsnetwork basics
network basics
 
Networking lecture1
Networking lecture1Networking lecture1
Networking lecture1
 
Lec-01 Introduction Computer Networks...
Lec-01 Introduction Computer Networks...Lec-01 Introduction Computer Networks...
Lec-01 Introduction Computer Networks...
 
Chapter1 introduction
Chapter1 introductionChapter1 introduction
Chapter1 introduction
 

Recently uploaded

FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 

Recently uploaded (20)

FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 

1 introduction