SlideShare a Scribd company logo
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Chapter 1 Computer Networks and the Internet Computer Networking: A Top Down Approach Featuring the Internet ,  2 nd  edition.  Jim Kurose, Keith Ross Addison-Wesley, July 2002.
Chapter 1: Introduction ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Chapter 1: roadmap ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What’s the Internet: “nuts and bolts” view ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],local ISP company network regional ISP router workstation server mobile
“Cool” internet appliances World’s smallest web server http://www-ccs.cs.umass.edu/~shri/iPic.html IP picture frame http://www.ceiva.com/ Web-enabled toaster+weather forecaster
What’s the Internet: “nuts and bolts” view ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],local ISP company network regional ISP router workstation server mobile
What’s the Internet: a service view ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What’s a protocol? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],protocols define format, order of msgs sent and received among network entities, and actions taken on msg transmission, receipt
What’s a protocol? ,[object Object],Hi Hi TCP connection req All activity in the Internet that involves two or more communicating remote entities is governed by a protocol. (Routing protocols, Congestion Control protocols, media access protocols, etc.) Got the time? 2:00 TCP connection response Get http://www.awl.com/kurose-ross <file> Time
A closer look at network structure: ,[object Object],[object Object],[object Object],[object Object],[object Object]
Chapter 1: roadmap ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The network edge: ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Network edge: connection-oriented service ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Network edge: connectionless service ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Chapter 1: roadmap ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Network Core ,[object Object],[object Object],[object Object],[object Object]
Network Core: Circuit Switching ,[object Object],[object Object],[object Object],[object Object],[object Object]
Network Core: Circuit Switching ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Circuit Switching: TDMA and TDMA FDMA frequency time TDMA frequency time 4 users Example:
Network Core: Packet Switching ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Bandwidth division into “pieces” Dedicated allocation Resource reservation
Packet Switching: Statistical Multiplexing ,[object Object],[object Object],A B C 10 Mbs Ethernet 1.5 Mbs statistical multiplexing queue of packets waiting for output link D E
Packet switching versus circuit switching ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],N users 1 Mbps link
Packet switching versus circuit switching ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Packet-switching: store-and-forward ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],R R R ,[object Object],[object Object],[object Object],[object Object],L
Packet Switching: Message Segmenting ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Packet-switched networks: forwarding ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Virtual Circuit Networks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Table in PS1 A VC network
Datagram Networks ,[object Object],[object Object],[object Object],[object Object],[object Object]
Network Taxonomy ,[object Object],[object Object],[object Object],[object Object],Telecommunication networks Circuit-switched networks FDM TDM Packet-switched networks Networks with VCs Datagram Networks
Chapter 1: roadmap ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Access networks and physical media ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Residential access: point to point access ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Residential access: cable modems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Company access: local area networks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Wireless access networks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],base station mobile hosts router
Physical Media ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Physical Media: coax, fiber ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Physical media: radio ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Physical Media
Chapter 1: roadmap ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Internet structure: network of networks ,[object Object],[object Object],[object Object],Tier 1 ISP Tier 1 ISP Tier 1 ISP Tier-1 providers interconnect (peer) privately NAP Tier-1 providers also interconnect at public network access points (NAPs)
Tier-1 ISP: e.g., Sprint Sprint US backbone network
Internet structure: network of networks ,[object Object],[object Object],Tier 1 ISP Tier 1 ISP Tier 1 ISP NAP Tier-2 ISP Tier-2 ISP Tier-2 ISP Tier-2 ISP Tier-2 ISP ,[object Object],[object Object],[object Object],Tier-2 ISPs also peer privately with each other, interconnect at NAP
Internet structure: network of networks ,[object Object],[object Object],Tier 1 ISP Tier 1 ISP Tier 1 ISP NAP Tier-2 ISP Tier-2 ISP Tier-2 ISP Tier-2 ISP Tier-2 ISP local ISP local ISP local ISP local ISP local ISP Tier 3 ISP local ISP local ISP local ISP Local and tier- 3 ISPs are  customers  of higher tier ISPs connecting them to rest of Internet
Internet structure: network of networks ,[object Object],Tier 1 ISP Tier 1 ISP Tier 1 ISP NAP Tier-2 ISP Tier-2 ISP Tier-2 ISP Tier-2 ISP Tier-2 ISP local ISP local ISP local ISP local ISP local ISP Tier 3 ISP local ISP local ISP local ISP
Chapter 1: roadmap ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
How do loss and delay occur? ,[object Object],[object Object],[object Object],A B packet being transmitted  (delay) packets queueing  (delay) free (available) buffers: arriving packets  dropped ( loss ) if no free buffers
Four sources of packet delay ,[object Object],[object Object],[object Object],A B propagation transmission nodal processing queueing ,[object Object],[object Object],[object Object]
Delay in packet-switched networks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],A B propagation transmission nodal processing queueing Note:  s and R are  very  different quantities!
Caravan analogy ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],ten-car  caravan 100 km 100 km toll  booth toll  booth
Caravan analogy (more) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],ten-car  caravan 100 km 100 km toll  booth toll  booth
Nodal delay ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Queueing delay (revisited) ,[object Object],[object Object],[object Object],traffic intensity = La/R ,[object Object],[object Object],[object Object]
“ Real” Internet delays and routes ,[object Object],[object Object],[object Object],[object Object],[object Object],3 probes 3 probes 3 probes
“ Real” Internet delays and routes 1  cs-gw (128.119.240.254)  1 ms  1 ms  2 ms 2  border1-rt-fa5-1-0.gw.umass.edu (128.119.3.145)  1 ms  1 ms  2 ms 3  cht-vbns.gw.umass.edu (128.119.3.130)  6 ms 5 ms 5 ms 4  jn1-at1-0-0-19.wor.vbns.net (204.147.132.129)  16 ms 11 ms 13 ms  5  jn1-so7-0-0-0.wae.vbns.net (204.147.136.136)  21 ms 18 ms 18 ms  6  abilene-vbns.abilene.ucaid.edu (198.32.11.9)  22 ms  18 ms  22 ms 7  nycm-wash.abilene.ucaid.edu (198.32.8.46)  22 ms  22 ms  22 ms 8  62.40.103.253 (62.40.103.253)  104 ms 109 ms 106 ms 9  de2-1.de1.de.geant.net (62.40.96.129)  109 ms 102 ms 104 ms 10  de.fr1.fr.geant.net (62.40.96.50)  113 ms 121 ms 114 ms 11  renater-gw.fr1.fr.geant.net (62.40.103.54)  112 ms  114 ms  112 ms 12  nio-n2.cssi.renater.fr (193.51.206.13)  111 ms  114 ms  116 ms 13  nice.cssi.renater.fr (195.220.98.102)  123 ms  125 ms  124 ms 14  r3t2-nice.cssi.renater.fr (195.220.98.110)  126 ms  126 ms  124 ms 15  eurecom-valbonne.r3t2.ft.net (193.48.50.54)  135 ms  128 ms  133 ms 16  194.214.211.25 (194.214.211.25)  126 ms  128 ms  126 ms 17  * * * 18  * * * 19  fantasia.eurecom.fr (193.55.113.142)  132 ms  128 ms  136   ms traceroute:  gaia.cs.umass.edu to www.eurecom.fr Three delay measurements from  gaia.cs.umass.edu to cs-gw.cs.umass.edu  * means no response (probe lost, router not replying) trans-oceanic link
Packet loss ,[object Object],[object Object],[object Object]
Chapter 1: roadmap ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Protocol “Layers” ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Why layering? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Internet protocol stack ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],application transport network link physical
Layering: logical communication  ,[object Object],[object Object],[object Object],[object Object],application transport network link physical application transport network link physical application transport network link physical application transport network link physical network link physical
Layering:  logical  communication  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],application transport network link physical application transport network link physical application transport network link physical application transport network link physical network link physical data data data transport transport ack
Layering: physical communication  application transport network link physical application transport network link physical application transport network link physical application transport network link physical network link physical data data
Layering: physical communication  Switching  Hub application transport network link physical application transport network link physical application transport network link physical application transport network link physical network link physical data data link physical
Protocol layering and data ,[object Object],[object Object],[object Object],source destination message segment datagram frame application transport network link physical application transport network link physical M M M M H t H t H n H t H n H l M M M M H t H t H n H t H n H l
Chapter 1: roadmap ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Internet History ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],1961-1972: Early packet-switching principles
Internet History ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],1972-1980: Internetworking, new and proprietary nets
Internet History ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],1980-1990: new protocols, a proliferation of networks
Internet History ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],1990, 2000’s: commercialization, the Web, new apps
Introduction: Summary ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Fun Examples ,[object Object]

More Related Content

What's hot

Unit_I - 3
Unit_I - 3Unit_I - 3
Chapter 2 - Computer Networking a top-down Approach 7th
Chapter 2 - Computer Networking a top-down Approach 7thChapter 2 - Computer Networking a top-down Approach 7th
Chapter 2 - Computer Networking a top-down Approach 7th
Andy Juan Sarango Veliz
 
Unit_I - 2
Unit_I - 2Unit_I - 2
Chapter 6 - Computer Networking a top-down Approach 7th
Chapter 6 - Computer Networking a top-down Approach 7thChapter 6 - Computer Networking a top-down Approach 7th
Chapter 6 - Computer Networking a top-down Approach 7th
Andy Juan Sarango Veliz
 
Computer network introduction
Computer network introductionComputer network introduction
Computer network introduction
Sweta Kumari Barnwal
 
Chapter 9 - Computer Networking a top-down Approach 7th
Chapter 9 - Computer Networking a top-down Approach 7thChapter 9 - Computer Networking a top-down Approach 7th
Chapter 9 - Computer Networking a top-down Approach 7th
Andy Juan Sarango Veliz
 
Chapter 1 - Computer Networking a top-down Approach 7th
Chapter 1 - Computer Networking a top-down Approach 7thChapter 1 - Computer Networking a top-down Approach 7th
Chapter 1 - Computer Networking a top-down Approach 7th
Andy Juan Sarango Veliz
 
Computer network physical layer
Computer network  physical layerComputer network  physical layer
Computer network physical layer
Sweta Kumari Barnwal
 
Bcs 052 solved assignment
Bcs 052 solved assignmentBcs 052 solved assignment
20CS2008 Computer Networks
20CS2008 Computer Networks20CS2008 Computer Networks
20CS2008 Computer Networks
Kathirvel Ayyaswamy
 
Chapter1 intro
Chapter1 introChapter1 intro
Chapter1 intro
Diego Corrales
 
20CS2008 Computer Networks
20CS2008 Computer Networks20CS2008 Computer Networks
20CS2008 Computer Networks
Kathirvel Ayyaswamy
 
Unit 4 - Network Layer
Unit 4 - Network LayerUnit 4 - Network Layer
Unit 4 - Network Layer
Chandan Gupta Bhagat
 
Chapter3 transport
Chapter3 transportChapter3 transport
Chapter3 transport
Diego Corrales
 
CS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKSCS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKS
Kathirvel Ayyaswamy
 
Week1 lec2-bscs1
Week1 lec2-bscs1Week1 lec2-bscs1
Week1 lec2-bscs1
syedhaiderraza
 
CS8591 Computer Networks - Unit III
CS8591 Computer Networks - Unit IIICS8591 Computer Networks - Unit III
CS8591 Computer Networks - Unit III
pkaviya
 
2nd
2nd2nd
Unicasting , Broadcasting And Multicasting New
Unicasting , Broadcasting And Multicasting NewUnicasting , Broadcasting And Multicasting New
Unicasting , Broadcasting And Multicasting New
techbed
 
Application Layer
Application LayerApplication Layer
Application Layer
ushabarad142
 

What's hot (20)

Unit_I - 3
Unit_I - 3Unit_I - 3
Unit_I - 3
 
Chapter 2 - Computer Networking a top-down Approach 7th
Chapter 2 - Computer Networking a top-down Approach 7thChapter 2 - Computer Networking a top-down Approach 7th
Chapter 2 - Computer Networking a top-down Approach 7th
 
Unit_I - 2
Unit_I - 2Unit_I - 2
Unit_I - 2
 
Chapter 6 - Computer Networking a top-down Approach 7th
Chapter 6 - Computer Networking a top-down Approach 7thChapter 6 - Computer Networking a top-down Approach 7th
Chapter 6 - Computer Networking a top-down Approach 7th
 
Computer network introduction
Computer network introductionComputer network introduction
Computer network introduction
 
Chapter 9 - Computer Networking a top-down Approach 7th
Chapter 9 - Computer Networking a top-down Approach 7thChapter 9 - Computer Networking a top-down Approach 7th
Chapter 9 - Computer Networking a top-down Approach 7th
 
Chapter 1 - Computer Networking a top-down Approach 7th
Chapter 1 - Computer Networking a top-down Approach 7thChapter 1 - Computer Networking a top-down Approach 7th
Chapter 1 - Computer Networking a top-down Approach 7th
 
Computer network physical layer
Computer network  physical layerComputer network  physical layer
Computer network physical layer
 
Bcs 052 solved assignment
Bcs 052 solved assignmentBcs 052 solved assignment
Bcs 052 solved assignment
 
20CS2008 Computer Networks
20CS2008 Computer Networks20CS2008 Computer Networks
20CS2008 Computer Networks
 
Chapter1 intro
Chapter1 introChapter1 intro
Chapter1 intro
 
20CS2008 Computer Networks
20CS2008 Computer Networks20CS2008 Computer Networks
20CS2008 Computer Networks
 
Unit 4 - Network Layer
Unit 4 - Network LayerUnit 4 - Network Layer
Unit 4 - Network Layer
 
Chapter3 transport
Chapter3 transportChapter3 transport
Chapter3 transport
 
CS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKSCS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKS
 
Week1 lec2-bscs1
Week1 lec2-bscs1Week1 lec2-bscs1
Week1 lec2-bscs1
 
CS8591 Computer Networks - Unit III
CS8591 Computer Networks - Unit IIICS8591 Computer Networks - Unit III
CS8591 Computer Networks - Unit III
 
2nd
2nd2nd
2nd
 
Unicasting , Broadcasting And Multicasting New
Unicasting , Broadcasting And Multicasting NewUnicasting , Broadcasting And Multicasting New
Unicasting , Broadcasting And Multicasting New
 
Application Layer
Application LayerApplication Layer
Application Layer
 

Viewers also liked

China veneer board market profile sample pages
China veneer board market profile   sample pagesChina veneer board market profile   sample pages
China veneer board market profile sample pages
Beijing Zeefer Consulting Ltd.
 
Economics bee on board
Economics bee on boardEconomics bee on board
Economics bee on board
Natalie Ortiz Villalobos
 
China knitted crocheted silk products industry profile cic1763 sample pages
China knitted crocheted silk products industry profile cic1763   sample pagesChina knitted crocheted silk products industry profile cic1763   sample pages
China knitted crocheted silk products industry profile cic1763 sample pages
Beijing Zeefer Consulting Ltd.
 
China chemical fiber mfg. industry profile cic28 sample pages
China chemical fiber mfg. industry profile cic28   sample pagesChina chemical fiber mfg. industry profile cic28   sample pages
China chemical fiber mfg. industry profile cic28 sample pages
Beijing Zeefer Consulting Ltd.
 
China down feather products industry profile cic1942 sample pages
China down feather products industry profile cic1942   sample pagesChina down feather products industry profile cic1942   sample pages
China down feather products industry profile cic1942 sample pages
Beijing Zeefer Consulting Ltd.
 
Let me introduce...
Let me introduce...Let me introduce...
Let me introduce...
milita Ramirez
 
01 introduccion al_laboratorio
01 introduccion al_laboratorio01 introduccion al_laboratorio
01 introduccion al_laboratorio
Pamela Espejo
 

Viewers also liked (7)

China veneer board market profile sample pages
China veneer board market profile   sample pagesChina veneer board market profile   sample pages
China veneer board market profile sample pages
 
Economics bee on board
Economics bee on boardEconomics bee on board
Economics bee on board
 
China knitted crocheted silk products industry profile cic1763 sample pages
China knitted crocheted silk products industry profile cic1763   sample pagesChina knitted crocheted silk products industry profile cic1763   sample pages
China knitted crocheted silk products industry profile cic1763 sample pages
 
China chemical fiber mfg. industry profile cic28 sample pages
China chemical fiber mfg. industry profile cic28   sample pagesChina chemical fiber mfg. industry profile cic28   sample pages
China chemical fiber mfg. industry profile cic28 sample pages
 
China down feather products industry profile cic1942 sample pages
China down feather products industry profile cic1942   sample pagesChina down feather products industry profile cic1942   sample pages
China down feather products industry profile cic1942 sample pages
 
Let me introduce...
Let me introduce...Let me introduce...
Let me introduce...
 
01 introduccion al_laboratorio
01 introduccion al_laboratorio01 introduccion al_laboratorio
01 introduccion al_laboratorio
 

Similar to Ch1 2ed 29_dec03

Chapter1
Chapter1Chapter1
Chapter1
guest0af0cf
 
Tcp ip
Tcp ipTcp ip
Tcp ip
mailalamin
 
Lec 4 and_5
Lec 4 and_5Lec 4 and_5
Lec 4 and_5
hz3012
 
3rd edition chapter1
3rd edition chapter13rd edition chapter1
3rd edition chapter1
nguyễn cầm
 
Network th ITM3
Network th ITM3Network th ITM3
Network th ITM3
Aram Mohammed
 
Lecture 1 networking &amp; internetworking
Lecture 1 networking &amp; internetworkingLecture 1 networking &amp; internetworking
Lecture 1 networking &amp; internetworking
Md. Mashiur Rahman
 
Week 1B.pdf Networking introduction week 1
Week 1B.pdf Networking introduction week 1Week 1B.pdf Networking introduction week 1
Week 1B.pdf Networking introduction week 1
whiz5
 
Week2 lec3-bscs1
Week2 lec3-bscs1Week2 lec3-bscs1
Week2 lec3-bscs1
syedhaiderraza
 
Lec 2 and_3
Lec 2 and_3Lec 2 and_3
Lec 2 and_3
hz3012
 
Jaimin chp-1 - introduction - 2011 batch
Jaimin   chp-1  - introduction - 2011 batchJaimin   chp-1  - introduction - 2011 batch
Jaimin chp-1 - introduction - 2011 batch
Jaimin Jani
 
Chapter_1_V6.1.ppt
Chapter_1_V6.1.pptChapter_1_V6.1.ppt
Chapter_1_V6.1.ppt
ubaidullah75790
 
Chapter_1 V6.1 absolute java original slides
Chapter_1 V6.1 absolute java original slidesChapter_1 V6.1 absolute java original slides
Chapter_1 V6.1 absolute java original slides
mzayed5
 
Lecture 01
Lecture 01Lecture 01
Lecture 01
maruthi vardhan
 
lec 3 4 Core Delays Thruput Net Arch.ppt
lec 3 4 Core Delays Thruput Net Arch.pptlec 3 4 Core Delays Thruput Net Arch.ppt
lec 3 4 Core Delays Thruput Net Arch.ppt
MahamKhurram4
 
preKnowledge-InternetNetworking.ppt
preKnowledge-InternetNetworking.pptpreKnowledge-InternetNetworking.ppt
preKnowledge-InternetNetworking.ppt
abdullahalamin69
 
preKnowledge-InternetNetworking Android's mobile operating system is based on...
preKnowledge-InternetNetworking Android's mobile operating system is based on...preKnowledge-InternetNetworking Android's mobile operating system is based on...
preKnowledge-InternetNetworking Android's mobile operating system is based on...
jeronimored
 
Chapter 1 v6.1
Chapter 1 v6.1Chapter 1 v6.1
Chapter 1 v6.1
david123456aa
 
nv.ppt
nv.pptnv.ppt
nv.ppt
tahaniali27
 
Review Questions -11.Is web server an end system A. There is no.pdf
Review Questions -11.Is web server an end system A. There is no.pdfReview Questions -11.Is web server an end system A. There is no.pdf
Review Questions -11.Is web server an end system A. There is no.pdf
anjanaarts2014
 
Networks (Distributed computing)
Networks (Distributed computing)Networks (Distributed computing)
Networks (Distributed computing)
Sri Prasanna
 

Similar to Ch1 2ed 29_dec03 (20)

Chapter1
Chapter1Chapter1
Chapter1
 
Tcp ip
Tcp ipTcp ip
Tcp ip
 
Lec 4 and_5
Lec 4 and_5Lec 4 and_5
Lec 4 and_5
 
3rd edition chapter1
3rd edition chapter13rd edition chapter1
3rd edition chapter1
 
Network th ITM3
Network th ITM3Network th ITM3
Network th ITM3
 
Lecture 1 networking &amp; internetworking
Lecture 1 networking &amp; internetworkingLecture 1 networking &amp; internetworking
Lecture 1 networking &amp; internetworking
 
Week 1B.pdf Networking introduction week 1
Week 1B.pdf Networking introduction week 1Week 1B.pdf Networking introduction week 1
Week 1B.pdf Networking introduction week 1
 
Week2 lec3-bscs1
Week2 lec3-bscs1Week2 lec3-bscs1
Week2 lec3-bscs1
 
Lec 2 and_3
Lec 2 and_3Lec 2 and_3
Lec 2 and_3
 
Jaimin chp-1 - introduction - 2011 batch
Jaimin   chp-1  - introduction - 2011 batchJaimin   chp-1  - introduction - 2011 batch
Jaimin chp-1 - introduction - 2011 batch
 
Chapter_1_V6.1.ppt
Chapter_1_V6.1.pptChapter_1_V6.1.ppt
Chapter_1_V6.1.ppt
 
Chapter_1 V6.1 absolute java original slides
Chapter_1 V6.1 absolute java original slidesChapter_1 V6.1 absolute java original slides
Chapter_1 V6.1 absolute java original slides
 
Lecture 01
Lecture 01Lecture 01
Lecture 01
 
lec 3 4 Core Delays Thruput Net Arch.ppt
lec 3 4 Core Delays Thruput Net Arch.pptlec 3 4 Core Delays Thruput Net Arch.ppt
lec 3 4 Core Delays Thruput Net Arch.ppt
 
preKnowledge-InternetNetworking.ppt
preKnowledge-InternetNetworking.pptpreKnowledge-InternetNetworking.ppt
preKnowledge-InternetNetworking.ppt
 
preKnowledge-InternetNetworking Android's mobile operating system is based on...
preKnowledge-InternetNetworking Android's mobile operating system is based on...preKnowledge-InternetNetworking Android's mobile operating system is based on...
preKnowledge-InternetNetworking Android's mobile operating system is based on...
 
Chapter 1 v6.1
Chapter 1 v6.1Chapter 1 v6.1
Chapter 1 v6.1
 
nv.ppt
nv.pptnv.ppt
nv.ppt
 
Review Questions -11.Is web server an end system A. There is no.pdf
Review Questions -11.Is web server an end system A. There is no.pdfReview Questions -11.Is web server an end system A. There is no.pdf
Review Questions -11.Is web server an end system A. There is no.pdf
 
Networks (Distributed computing)
Networks (Distributed computing)Networks (Distributed computing)
Networks (Distributed computing)
 

Recently uploaded

Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
LucaBarbaro3
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
Public CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptxPublic CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptx
marufrahmanstratejm
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Tatiana Kojar
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
Intelisync
 
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
Data Hops
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 

Recently uploaded (20)

Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
Public CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptxPublic CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptx
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
 
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 

Ch1 2ed 29_dec03

  • 1.
  • 2.
  • 3.
  • 4.
  • 5. “Cool” internet appliances World’s smallest web server http://www-ccs.cs.umass.edu/~shri/iPic.html IP picture frame http://www.ceiva.com/ Web-enabled toaster+weather forecaster
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19. Circuit Switching: TDMA and TDMA FDMA frequency time TDMA frequency time 4 users Example:
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 40.
  • 41.
  • 42. Tier-1 ISP: e.g., Sprint Sprint US backbone network
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52.
  • 53.
  • 54.
  • 55. “ Real” Internet delays and routes 1 cs-gw (128.119.240.254) 1 ms 1 ms 2 ms 2 border1-rt-fa5-1-0.gw.umass.edu (128.119.3.145) 1 ms 1 ms 2 ms 3 cht-vbns.gw.umass.edu (128.119.3.130) 6 ms 5 ms 5 ms 4 jn1-at1-0-0-19.wor.vbns.net (204.147.132.129) 16 ms 11 ms 13 ms 5 jn1-so7-0-0-0.wae.vbns.net (204.147.136.136) 21 ms 18 ms 18 ms 6 abilene-vbns.abilene.ucaid.edu (198.32.11.9) 22 ms 18 ms 22 ms 7 nycm-wash.abilene.ucaid.edu (198.32.8.46) 22 ms 22 ms 22 ms 8 62.40.103.253 (62.40.103.253) 104 ms 109 ms 106 ms 9 de2-1.de1.de.geant.net (62.40.96.129) 109 ms 102 ms 104 ms 10 de.fr1.fr.geant.net (62.40.96.50) 113 ms 121 ms 114 ms 11 renater-gw.fr1.fr.geant.net (62.40.103.54) 112 ms 114 ms 112 ms 12 nio-n2.cssi.renater.fr (193.51.206.13) 111 ms 114 ms 116 ms 13 nice.cssi.renater.fr (195.220.98.102) 123 ms 125 ms 124 ms 14 r3t2-nice.cssi.renater.fr (195.220.98.110) 126 ms 126 ms 124 ms 15 eurecom-valbonne.r3t2.ft.net (193.48.50.54) 135 ms 128 ms 133 ms 16 194.214.211.25 (194.214.211.25) 126 ms 128 ms 126 ms 17 * * * 18 * * * 19 fantasia.eurecom.fr (193.55.113.142) 132 ms 128 ms 136 ms traceroute: gaia.cs.umass.edu to www.eurecom.fr Three delay measurements from gaia.cs.umass.edu to cs-gw.cs.umass.edu * means no response (probe lost, router not replying) trans-oceanic link
  • 56.
  • 57.
  • 58.
  • 59.
  • 60.
  • 61.
  • 62.
  • 63. Layering: physical communication application transport network link physical application transport network link physical application transport network link physical application transport network link physical network link physical data data
  • 64. Layering: physical communication Switching Hub application transport network link physical application transport network link physical application transport network link physical application transport network link physical network link physical data data link physical
  • 65.
  • 66.
  • 67.
  • 68.
  • 69.
  • 70.
  • 71.
  • 72.

Editor's Notes

  1. Two simple multiple access control techniques. Each mobile’s share of the bandwidth is divided into portions for the uplink and the downlink. Also, possibly, out of band signaling. As we will see, used in AMPS, GSM, IS-54/136