SlideShare a Scribd company logo
1 of 23
INTERNET ARCHITECTURE
INTERNET ARCHITECTURE
• Connecting hosts running the same
applications but located in different types of
networks. A computer network is a complex
system that is built on top of multiple
components. These components can vary in
technologies making up different types of
networks that offer different types of
applications.
INTERNET ARCHITECTURE
• For example in the figure below, we have two BitTorrent clients that communicate
even though they are using very different networks/technologies (Wifi vs
Ethernet). So, how do these technologies and components interconnect and come
together to meet the needs of each application? The designers of the network
protocols provide structure to the network architecture by organizing the
protocols into layers.
INTERNET ARCHITECTURE
• Architecture, layers and functionalities. So, the functionalities in the network
architecture are implemented by dividing the architectural model into layers. Each
layer offers different services.
• An analogy. An analogy we can use to explain a layered architecture is the airline
system. Let's look first at the actions that a passenger needs to take to move from
the origin to the destination place. The passenger purchases the ticket, checks the
bags, goes through the gates and after the plane takes off, the passenger travels
on the plane to their final destination. At the final destination, the passenger
leaves the aircraft, goes through the gate and claims their baggage.
INTERNET ARCHITECTURE
• We can look at the above picture to identify a
structure (or layers) and the services (or
functionalities) that are offered at every component
of the structure. Dividing the services into layers we
get the framework
• The same principle of layers and functionalities is
implemented with the model of the Internet
architecture.
OSI MODEL
• The Internet architecture follows a layered model, where every layer
provides some service to the layer above.
• The International Organization for Standardization (ISO) proposed the
seven-layered OSI model shown below, which consists of the following
layers: application layer, presentation layer, session layer, transport layer,
network layer, data link layer, and physical layer.
OSI MODEL
• The Internet architecture model though has five layers. The application,
presentation, and session layers are combined into a single layer, and this
combined layer is called the application layer. The interface between the
application layer and the transport layer are the sockets. It is up to the
application developer to design the functionality of the overall application.
•
Application, Presentation, and Session Layers
•
The Application Layer
• The application layer includes multiple protocols, some of the most
popular ones include: 1) The HTTP protocol (web), SMTP (e-mail), 2) The
FTP protocol (transfers files between two end hosts), and 3) The DNS
protocol (translates domain names to IP addresses). So the services that
this layer offers are multiple depending on the application that is
implemented.
The Application Layer
• The same is true for the interface through which it is accessed, and the
protocol that is implemented. At the application layer, we refer to the
packet of information as a message.
The Presentation Layer
• The presentation layer plays the intermediate role of formatting the
information that it receives from the layer below and delivering it to the
application layer. For example, some functionalities of this layer are
formatting a video stream or translating integers from big endian to little
endian format.
The Session Layer
• The session layer is responsible for the mechanism that manages the
different transport streams that belong to the same session between end-
user application processes. For example, in the case of teleconference
application, it is responsible to tie together the audio stream and the
video stream.
•
Transport and Network Layer
• The Transport Layer
The transport layer is responsible for the end-to-end communication
between end hosts.
In this layer, there are two transport protocols, namely TCP and UDP.
The services that TCP offers include: a connection-oriented service to the
applications that are running on the layer above,
On the other hand, the UDP protocol provides a connectionless best-
effort service to the applications that are running in the layer above,
without reliability, flow or congestion control. At the transport layer, we
refer to the packet of information as a segment.
Transport and Network Layer
The Network Layer
• In this layer, we refer to the packet of information as a datagram.
The network layer is responsible for moving datagrams from one
Internet host to another.
• The protocols in the network layer are: 1) The IP Protocol, which we
often refer to as “the glue” that binds the Internet together. All
Internet hosts and devices that have a network layer must run the
IP protocol.
• The IP protocol defines a) the fields in the datagram, and b) how
the source/destination hosts and the intermediate routers use
these fields, so the datagrams that a source Internet host sends
reach their destination. 2) The routing protocols that determine the
routes that the datagrams can take between sources and
destinations.
The Network Layer
Data Link Layer and Physical Layer
• The Data Link Layer
• In this layer, we refer to the packets of
information as frames. Some example
protocols in this layer include Ethernet, PPP,
WiFi.
• The data link layer is responsible to move the
frames from one node (host or router) to the
next node.
Data Link Layer and Physical Layer
The Physical Layer
• The Physical Layer
The physical layer facilitates the interaction
with the actual hardware and is responsible to
transfer bits within a frame between two
nodes that are connected through a physical
link.
Ethernet, has different physical layer protocols
for twisted-pair copper wire, coaxial cable,
and single-mode fiber optics.
The Physical Layer
Layers Encapsulation
To understand the concepts of encapsulation and de-encapsulation, let's take a
look at the following diagram which shows the physical path that data take from
the sending host to the receiving host.
Layers Encapsulation
Encapsulation and De-encapsulation.
The sending host sends an application layer message M to the
transport layer. The transport layer receives the message, and it appends
the transport layer header information (Ht).
The application message along with the transport layer header is
called segment (or transport-layer segment). The segment thus
encapsulates the application layer message.
This added information can help the receiving host to a) inform the
receiver-side transport layer about which application to deliver the message
up to, and b) perform error detection and determine whether bits in the
message have been changed along the route.
The segment is then forwarded to network layer which in turn,
adds it's own network header information (Hn). The entire combination of
the segment and the network header is called datagram.
The header information that the network layer appends includes
the source and destination addresses of the end hosts. The same process
continues for the link layer which in turn it appends its own header
information(Hl).
The End to End Principle
The end-to-end (e2e) principle is a design choice that characterized and shaped
significantly the current architecture of the Internet. The e2e principle suggests
that specific application-level functions usually cannot, and preferably should
not be built into the lower levels of the system at the core of the network.
The End to End Principle
The end-to-end (e2e) principle is a design choice that characterized and shaped
significantly the current architecture of the Internet. The e2e principle suggests
that specific application-level functions usually cannot, and preferably should
not be built into the lower levels of the system at the core of the network.
• https://www.omscs-notes.com/computer-
networks/introduction-history-and-internet-
architecture/

More Related Content

What's hot

What's hot (20)

TCP/IP 3-way Handshake
TCP/IP 3-way Handshake TCP/IP 3-way Handshake
TCP/IP 3-way Handshake
 
Introduction to Computer Networks Lecture slides ppt
Introduction to Computer Networks Lecture slides pptIntroduction to Computer Networks Lecture slides ppt
Introduction to Computer Networks Lecture slides ppt
 
Systems Analyst and Design - Data Dictionary
Systems Analyst and Design -  Data DictionarySystems Analyst and Design -  Data Dictionary
Systems Analyst and Design - Data Dictionary
 
Gateway and firewall
Gateway and firewallGateway and firewall
Gateway and firewall
 
Advance Networking Course Details PPT
Advance Networking Course Details PPTAdvance Networking Course Details PPT
Advance Networking Course Details PPT
 
PPT on Basic of Gateway
PPT on Basic of GatewayPPT on Basic of Gateway
PPT on Basic of Gateway
 
Chapter 1: Introduction to Data Communication and Networks
Chapter 1: Introduction to Data Communication and NetworksChapter 1: Introduction to Data Communication and Networks
Chapter 1: Introduction to Data Communication and Networks
 
Physical And Data Link Layers
Physical And Data Link LayersPhysical And Data Link Layers
Physical And Data Link Layers
 
Datapath design
Datapath designDatapath design
Datapath design
 
Network media
Network mediaNetwork media
Network media
 
Ch 8 Client Server
Ch 8  Client  ServerCh 8  Client  Server
Ch 8 Client Server
 
Data link layer
Data link layer Data link layer
Data link layer
 
02 protocol architecture
02 protocol architecture02 protocol architecture
02 protocol architecture
 
IP Security
IP SecurityIP Security
IP Security
 
File Transfer Protocol
File Transfer ProtocolFile Transfer Protocol
File Transfer Protocol
 
Network connectivity devices
Network connectivity devicesNetwork connectivity devices
Network connectivity devices
 
Network Layer by-adeel
Network Layer by-adeelNetwork Layer by-adeel
Network Layer by-adeel
 
Chapter07 determining system requirements
Chapter07 determining system requirementsChapter07 determining system requirements
Chapter07 determining system requirements
 
Network protocol
Network protocolNetwork protocol
Network protocol
 
INSTRUCTION LEVEL PARALLALISM
INSTRUCTION LEVEL PARALLALISMINSTRUCTION LEVEL PARALLALISM
INSTRUCTION LEVEL PARALLALISM
 

Similar to INTERNET ARCHITECTURE.pptx

Osi reference model and the tcp
Osi reference model and the tcpOsi reference model and the tcp
Osi reference model and the tcpAgrippa Mungazi
 
CN unit 1 part 2 2023.ppt
CN unit 1 part 2 2023.pptCN unit 1 part 2 2023.ppt
CN unit 1 part 2 2023.pptmohanravi1986
 
OSI and TCP/IP reference models in networking
OSI and TCP/IP reference models in networkingOSI and TCP/IP reference models in networking
OSI and TCP/IP reference models in networkingMeenakshiGupta233101
 
unit1 network model osi and tcpip.pptx
unit1  network model osi and tcpip.pptxunit1  network model osi and tcpip.pptx
unit1 network model osi and tcpip.pptx183JAIDEEP
 
CN-OSI-TCP-Models-001.pdf
CN-OSI-TCP-Models-001.pdfCN-OSI-TCP-Models-001.pdf
CN-OSI-TCP-Models-001.pdfskknowledge
 
Internet basics and Cloud Computing- Manish Jha
Internet basics and Cloud Computing- Manish JhaInternet basics and Cloud Computing- Manish Jha
Internet basics and Cloud Computing- Manish Jhamanish jha
 
Manish Jha- Research Scholar- Internet Basics Requriement
Manish Jha- Research Scholar- Internet Basics RequriementManish Jha- Research Scholar- Internet Basics Requriement
Manish Jha- Research Scholar- Internet Basics RequriementManish Jha
 
Iso osi and tcp-ip reference models
Iso osi and tcp-ip reference modelsIso osi and tcp-ip reference models
Iso osi and tcp-ip reference modelsbhavanatmithun
 
Overview of an OSI reference Model
Overview of an OSI reference ModelOverview of an OSI reference Model
Overview of an OSI reference ModelDarshan Bhatt
 

Similar to INTERNET ARCHITECTURE.pptx (20)

Week2 lec1-bscs1
Week2 lec1-bscs1Week2 lec1-bscs1
Week2 lec1-bscs1
 
Osi model
Osi modelOsi model
Osi model
 
Osi reference model and the tcp
Osi reference model and the tcpOsi reference model and the tcp
Osi reference model and the tcp
 
CN unit 1 part 2 2023.ppt
CN unit 1 part 2 2023.pptCN unit 1 part 2 2023.ppt
CN unit 1 part 2 2023.ppt
 
OSI and TCP/IP reference models in networking
OSI and TCP/IP reference models in networkingOSI and TCP/IP reference models in networking
OSI and TCP/IP reference models in networking
 
unit1 network model osi and tcpip.pptx
unit1  network model osi and tcpip.pptxunit1  network model osi and tcpip.pptx
unit1 network model osi and tcpip.pptx
 
Week2 lec2-bscs1
Week2 lec2-bscs1Week2 lec2-bscs1
Week2 lec2-bscs1
 
Osi model
Osi modelOsi model
Osi model
 
PC 106 PPT-06
PC 106 PPT-06PC 106 PPT-06
PC 106 PPT-06
 
Lecture 3- tcp-ip
Lecture  3- tcp-ipLecture  3- tcp-ip
Lecture 3- tcp-ip
 
Ens
EnsEns
Ens
 
CN-OSI-TCP-Models-001.pdf
CN-OSI-TCP-Models-001.pdfCN-OSI-TCP-Models-001.pdf
CN-OSI-TCP-Models-001.pdf
 
Internet basics and Cloud Computing- Manish Jha
Internet basics and Cloud Computing- Manish JhaInternet basics and Cloud Computing- Manish Jha
Internet basics and Cloud Computing- Manish Jha
 
Manish Jha- Research Scholar- Internet Basics Requriement
Manish Jha- Research Scholar- Internet Basics RequriementManish Jha- Research Scholar- Internet Basics Requriement
Manish Jha- Research Scholar- Internet Basics Requriement
 
Iso osi and tcp-ip reference models
Iso osi and tcp-ip reference modelsIso osi and tcp-ip reference models
Iso osi and tcp-ip reference models
 
OSI &TCP/IP Model
OSI &TCP/IP ModelOSI &TCP/IP Model
OSI &TCP/IP Model
 
Overview of an OSI reference Model
Overview of an OSI reference ModelOverview of an OSI reference Model
Overview of an OSI reference Model
 
Dc2 t1
Dc2 t1Dc2 t1
Dc2 t1
 
OSI model.pptx
OSI model.pptxOSI model.pptx
OSI model.pptx
 
Ta 104-tcp
Ta 104-tcpTa 104-tcp
Ta 104-tcp
 

More from Shanthini28

NON VERBAL COMMUNICATION.pptx
NON VERBAL COMMUNICATION.pptxNON VERBAL COMMUNICATION.pptx
NON VERBAL COMMUNICATION.pptxShanthini28
 
CORPORATE COMMUNICATION - Introduction.pptx
CORPORATE COMMUNICATION - Introduction.pptxCORPORATE COMMUNICATION - Introduction.pptx
CORPORATE COMMUNICATION - Introduction.pptxShanthini28
 
Talent_Acquisition.pptx
Talent_Acquisition.pptxTalent_Acquisition.pptx
Talent_Acquisition.pptxShanthini28
 
EMPLOYER BRANDING.pptx
EMPLOYER BRANDING.pptxEMPLOYER BRANDING.pptx
EMPLOYER BRANDING.pptxShanthini28
 
14_2018_05_20!11_35_22_AM.pptx
14_2018_05_20!11_35_22_AM.pptx14_2018_05_20!11_35_22_AM.pptx
14_2018_05_20!11_35_22_AM.pptxShanthini28
 
operations_management (1).ppt
operations_management (1).pptoperations_management (1).ppt
operations_management (1).pptShanthini28
 
INVENTORY MANAGEMENT.ppt
INVENTORY MANAGEMENT.pptINVENTORY MANAGEMENT.ppt
INVENTORY MANAGEMENT.pptShanthini28
 
IMPLEMENTATION OF OD.pptx
IMPLEMENTATION OF OD.pptxIMPLEMENTATION OF OD.pptx
IMPLEMENTATION OF OD.pptxShanthini28
 
part 2 CHAPTER 11 Marketing.pptx
part 2 CHAPTER 11 Marketing.pptxpart 2 CHAPTER 11 Marketing.pptx
part 2 CHAPTER 11 Marketing.pptxShanthini28
 
CELLULAR MANUFACTURING SYSTEMS.pptx
CELLULAR MANUFACTURING SYSTEMS.pptxCELLULAR MANUFACTURING SYSTEMS.pptx
CELLULAR MANUFACTURING SYSTEMS.pptxShanthini28
 
ORGANISATION OF HR DEPARTMENT.pptx
ORGANISATION OF HR DEPARTMENT.pptxORGANISATION OF HR DEPARTMENT.pptx
ORGANISATION OF HR DEPARTMENT.pptxShanthini28
 
Operation strategy and competitiveness.pptx
Operation strategy and competitiveness.pptxOperation strategy and competitiveness.pptx
Operation strategy and competitiveness.pptxShanthini28
 
Grade 12 Chapter 4 Planning .pptx
Grade 12 Chapter 4  Planning .pptxGrade 12 Chapter 4  Planning .pptx
Grade 12 Chapter 4 Planning .pptxShanthini28
 
2 ISSUE AND REDEMPTION OF DEBENTURES_HSSTIMES.pptx
2 ISSUE AND REDEMPTION OF DEBENTURES_HSSTIMES.pptx2 ISSUE AND REDEMPTION OF DEBENTURES_HSSTIMES.pptx
2 ISSUE AND REDEMPTION OF DEBENTURES_HSSTIMES.pptxShanthini28
 
Grade 11 Chapter 6 - Social Responsibilities of Business.pptx
Grade 11 Chapter 6 - Social Responsibilities of Business.pptxGrade 11 Chapter 6 - Social Responsibilities of Business.pptx
Grade 11 Chapter 6 - Social Responsibilities of Business.pptxShanthini28
 
Chapter 5 Bank Reconciliation statement.pptx
Chapter 5 Bank Reconciliation statement.pptxChapter 5 Bank Reconciliation statement.pptx
Chapter 5 Bank Reconciliation statement.pptxShanthini28
 
Diff between life, fire and marine insurance.pptx
Diff between life, fire and marine insurance.pptxDiff between life, fire and marine insurance.pptx
Diff between life, fire and marine insurance.pptxShanthini28
 
Chapter 11 International Trade.pptx
Chapter 11 International Trade.pptxChapter 11 International Trade.pptx
Chapter 11 International Trade.pptxShanthini28
 
Grade 12 AccountancyCh 3. Partnership_Admission.pptx
Grade 12 AccountancyCh 3. Partnership_Admission.pptxGrade 12 AccountancyCh 3. Partnership_Admission.pptx
Grade 12 AccountancyCh 3. Partnership_Admission.pptxShanthini28
 
Grade 12 BS - Chapter 3 Business Environment.pptx
Grade 12 BS - Chapter 3 Business Environment.pptxGrade 12 BS - Chapter 3 Business Environment.pptx
Grade 12 BS - Chapter 3 Business Environment.pptxShanthini28
 

More from Shanthini28 (20)

NON VERBAL COMMUNICATION.pptx
NON VERBAL COMMUNICATION.pptxNON VERBAL COMMUNICATION.pptx
NON VERBAL COMMUNICATION.pptx
 
CORPORATE COMMUNICATION - Introduction.pptx
CORPORATE COMMUNICATION - Introduction.pptxCORPORATE COMMUNICATION - Introduction.pptx
CORPORATE COMMUNICATION - Introduction.pptx
 
Talent_Acquisition.pptx
Talent_Acquisition.pptxTalent_Acquisition.pptx
Talent_Acquisition.pptx
 
EMPLOYER BRANDING.pptx
EMPLOYER BRANDING.pptxEMPLOYER BRANDING.pptx
EMPLOYER BRANDING.pptx
 
14_2018_05_20!11_35_22_AM.pptx
14_2018_05_20!11_35_22_AM.pptx14_2018_05_20!11_35_22_AM.pptx
14_2018_05_20!11_35_22_AM.pptx
 
operations_management (1).ppt
operations_management (1).pptoperations_management (1).ppt
operations_management (1).ppt
 
INVENTORY MANAGEMENT.ppt
INVENTORY MANAGEMENT.pptINVENTORY MANAGEMENT.ppt
INVENTORY MANAGEMENT.ppt
 
IMPLEMENTATION OF OD.pptx
IMPLEMENTATION OF OD.pptxIMPLEMENTATION OF OD.pptx
IMPLEMENTATION OF OD.pptx
 
part 2 CHAPTER 11 Marketing.pptx
part 2 CHAPTER 11 Marketing.pptxpart 2 CHAPTER 11 Marketing.pptx
part 2 CHAPTER 11 Marketing.pptx
 
CELLULAR MANUFACTURING SYSTEMS.pptx
CELLULAR MANUFACTURING SYSTEMS.pptxCELLULAR MANUFACTURING SYSTEMS.pptx
CELLULAR MANUFACTURING SYSTEMS.pptx
 
ORGANISATION OF HR DEPARTMENT.pptx
ORGANISATION OF HR DEPARTMENT.pptxORGANISATION OF HR DEPARTMENT.pptx
ORGANISATION OF HR DEPARTMENT.pptx
 
Operation strategy and competitiveness.pptx
Operation strategy and competitiveness.pptxOperation strategy and competitiveness.pptx
Operation strategy and competitiveness.pptx
 
Grade 12 Chapter 4 Planning .pptx
Grade 12 Chapter 4  Planning .pptxGrade 12 Chapter 4  Planning .pptx
Grade 12 Chapter 4 Planning .pptx
 
2 ISSUE AND REDEMPTION OF DEBENTURES_HSSTIMES.pptx
2 ISSUE AND REDEMPTION OF DEBENTURES_HSSTIMES.pptx2 ISSUE AND REDEMPTION OF DEBENTURES_HSSTIMES.pptx
2 ISSUE AND REDEMPTION OF DEBENTURES_HSSTIMES.pptx
 
Grade 11 Chapter 6 - Social Responsibilities of Business.pptx
Grade 11 Chapter 6 - Social Responsibilities of Business.pptxGrade 11 Chapter 6 - Social Responsibilities of Business.pptx
Grade 11 Chapter 6 - Social Responsibilities of Business.pptx
 
Chapter 5 Bank Reconciliation statement.pptx
Chapter 5 Bank Reconciliation statement.pptxChapter 5 Bank Reconciliation statement.pptx
Chapter 5 Bank Reconciliation statement.pptx
 
Diff between life, fire and marine insurance.pptx
Diff between life, fire and marine insurance.pptxDiff between life, fire and marine insurance.pptx
Diff between life, fire and marine insurance.pptx
 
Chapter 11 International Trade.pptx
Chapter 11 International Trade.pptxChapter 11 International Trade.pptx
Chapter 11 International Trade.pptx
 
Grade 12 AccountancyCh 3. Partnership_Admission.pptx
Grade 12 AccountancyCh 3. Partnership_Admission.pptxGrade 12 AccountancyCh 3. Partnership_Admission.pptx
Grade 12 AccountancyCh 3. Partnership_Admission.pptx
 
Grade 12 BS - Chapter 3 Business Environment.pptx
Grade 12 BS - Chapter 3 Business Environment.pptxGrade 12 BS - Chapter 3 Business Environment.pptx
Grade 12 BS - Chapter 3 Business Environment.pptx
 

Recently uploaded

Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 

Recently uploaded (20)

Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 

INTERNET ARCHITECTURE.pptx

  • 2. INTERNET ARCHITECTURE • Connecting hosts running the same applications but located in different types of networks. A computer network is a complex system that is built on top of multiple components. These components can vary in technologies making up different types of networks that offer different types of applications.
  • 3. INTERNET ARCHITECTURE • For example in the figure below, we have two BitTorrent clients that communicate even though they are using very different networks/technologies (Wifi vs Ethernet). So, how do these technologies and components interconnect and come together to meet the needs of each application? The designers of the network protocols provide structure to the network architecture by organizing the protocols into layers.
  • 4. INTERNET ARCHITECTURE • Architecture, layers and functionalities. So, the functionalities in the network architecture are implemented by dividing the architectural model into layers. Each layer offers different services. • An analogy. An analogy we can use to explain a layered architecture is the airline system. Let's look first at the actions that a passenger needs to take to move from the origin to the destination place. The passenger purchases the ticket, checks the bags, goes through the gates and after the plane takes off, the passenger travels on the plane to their final destination. At the final destination, the passenger leaves the aircraft, goes through the gate and claims their baggage.
  • 5. INTERNET ARCHITECTURE • We can look at the above picture to identify a structure (or layers) and the services (or functionalities) that are offered at every component of the structure. Dividing the services into layers we get the framework • The same principle of layers and functionalities is implemented with the model of the Internet architecture.
  • 6. OSI MODEL • The Internet architecture follows a layered model, where every layer provides some service to the layer above. • The International Organization for Standardization (ISO) proposed the seven-layered OSI model shown below, which consists of the following layers: application layer, presentation layer, session layer, transport layer, network layer, data link layer, and physical layer.
  • 7. OSI MODEL • The Internet architecture model though has five layers. The application, presentation, and session layers are combined into a single layer, and this combined layer is called the application layer. The interface between the application layer and the transport layer are the sockets. It is up to the application developer to design the functionality of the overall application. • Application, Presentation, and Session Layers • The Application Layer • The application layer includes multiple protocols, some of the most popular ones include: 1) The HTTP protocol (web), SMTP (e-mail), 2) The FTP protocol (transfers files between two end hosts), and 3) The DNS protocol (translates domain names to IP addresses). So the services that this layer offers are multiple depending on the application that is implemented.
  • 8. The Application Layer • The same is true for the interface through which it is accessed, and the protocol that is implemented. At the application layer, we refer to the packet of information as a message.
  • 9. The Presentation Layer • The presentation layer plays the intermediate role of formatting the information that it receives from the layer below and delivering it to the application layer. For example, some functionalities of this layer are formatting a video stream or translating integers from big endian to little endian format.
  • 10. The Session Layer • The session layer is responsible for the mechanism that manages the different transport streams that belong to the same session between end- user application processes. For example, in the case of teleconference application, it is responsible to tie together the audio stream and the video stream. •
  • 11. Transport and Network Layer • The Transport Layer The transport layer is responsible for the end-to-end communication between end hosts. In this layer, there are two transport protocols, namely TCP and UDP. The services that TCP offers include: a connection-oriented service to the applications that are running on the layer above, On the other hand, the UDP protocol provides a connectionless best- effort service to the applications that are running in the layer above, without reliability, flow or congestion control. At the transport layer, we refer to the packet of information as a segment.
  • 13. The Network Layer • In this layer, we refer to the packet of information as a datagram. The network layer is responsible for moving datagrams from one Internet host to another. • The protocols in the network layer are: 1) The IP Protocol, which we often refer to as “the glue” that binds the Internet together. All Internet hosts and devices that have a network layer must run the IP protocol. • The IP protocol defines a) the fields in the datagram, and b) how the source/destination hosts and the intermediate routers use these fields, so the datagrams that a source Internet host sends reach their destination. 2) The routing protocols that determine the routes that the datagrams can take between sources and destinations.
  • 15. Data Link Layer and Physical Layer • The Data Link Layer • In this layer, we refer to the packets of information as frames. Some example protocols in this layer include Ethernet, PPP, WiFi. • The data link layer is responsible to move the frames from one node (host or router) to the next node.
  • 16. Data Link Layer and Physical Layer
  • 17. The Physical Layer • The Physical Layer The physical layer facilitates the interaction with the actual hardware and is responsible to transfer bits within a frame between two nodes that are connected through a physical link. Ethernet, has different physical layer protocols for twisted-pair copper wire, coaxial cable, and single-mode fiber optics.
  • 19. Layers Encapsulation To understand the concepts of encapsulation and de-encapsulation, let's take a look at the following diagram which shows the physical path that data take from the sending host to the receiving host.
  • 20. Layers Encapsulation Encapsulation and De-encapsulation. The sending host sends an application layer message M to the transport layer. The transport layer receives the message, and it appends the transport layer header information (Ht). The application message along with the transport layer header is called segment (or transport-layer segment). The segment thus encapsulates the application layer message. This added information can help the receiving host to a) inform the receiver-side transport layer about which application to deliver the message up to, and b) perform error detection and determine whether bits in the message have been changed along the route. The segment is then forwarded to network layer which in turn, adds it's own network header information (Hn). The entire combination of the segment and the network header is called datagram. The header information that the network layer appends includes the source and destination addresses of the end hosts. The same process continues for the link layer which in turn it appends its own header information(Hl).
  • 21. The End to End Principle The end-to-end (e2e) principle is a design choice that characterized and shaped significantly the current architecture of the Internet. The e2e principle suggests that specific application-level functions usually cannot, and preferably should not be built into the lower levels of the system at the core of the network.
  • 22. The End to End Principle The end-to-end (e2e) principle is a design choice that characterized and shaped significantly the current architecture of the Internet. The e2e principle suggests that specific application-level functions usually cannot, and preferably should not be built into the lower levels of the system at the core of the network.