SlideShare a Scribd company logo
Introduction 1-1
CS 325
Computer Networks
Sami Rollins
srollins@mtholyoke.edu
Fall 2005
Introduction 1-2
Introduction
 Main Course Page
 http://www.mtholyoke.edu/courses/srollins/cs325/
Introduction 1-3
Chapter 1
Introduction
Computer Networking:
A Top Down Approach
Featuring the Internet,
3rd edition.
Jim Kurose, Keith Ross
Addison-Wesley, July
2004.
A note on the use of these ppt slides:
We’re making these slides freely available to all (faculty, students, readers).
They’re in PowerPoint form so you can add, modify, and delete slides
(including this one) and slide content to suit your needs. They obviously
represent a lot of work on our part. In return for use, we only ask the
following:
 If you use these slides (e.g., in a class) in substantially unaltered form,
that you mention their source (after all, we’d like people to use our book!)
 If you post any slides in substantially unaltered form on a www site, that
you note that they are adapted from (or perhaps identical to) our slides, and
note our copyright of this material.
Thanks and enjoy! JFK/KWR
All material copyright 1996-2004
J.F Kurose and K.W. Ross, All Rights Reserved
Introduction 1-4
Chapter 1: Introduction
 What applications do you use that use a
computer network?
Introduction 1-5
Chapter 1: Introduction
 What applications do you use that use a
computer network?
 We want to understand what is under the hool
 Top-down approach
 Understand how applications use the network,
then understand how the network supports
those applications
 Use the Internet as an example
Introduction 1-6
What’s the Internet: “nuts and bolts” view
 millions of connected
computing devices: hosts
= end systems
 examples of hosts?
 running network apps
 examples of applications?
local ISP
company
network
regional ISP
router
workstation
server
mobile
Introduction 1-7
What’s the Internet: “nuts and bolts” view
 communication links
 fiber, copper, radio,
satellite
 transmission rate =
bandwidth
• typical bandwidth for
modem? wireless?
 routers: forward packets
(chunks of data)
 what’s in a packet?
local ISP
company
network
regional ISP
router
workstation
server
mobile
Introduction 1-8
What’s the Internet: “nuts and bolts” view
 protocols control sending,
receiving of msgs
 e.g., TCP, IP, HTTP, FTP, PPP
 Internet: “network of
networks”
 loosely hierarchical
 public Internet versus
private intranet
 Internet standards
 RFC: Request for comments
 IETF: Internet Engineering
Task Force
local ISP
company
network
regional ISP
router workstation
server
mobile
Introduction 1-9
What’s the Internet: a service view
 communication
infrastructure enables
distributed applications:
 Web, email, other
examples?
 communication services
provided to apps:
 connection-oriented
reliable
• example apps?
 Connectionless unreliable
• example apps?
Introduction 1-10
What’s a protocol?
human protocols:
 “what’s the time?”
 “I have a question”
 introductions
network protocols:
 machines rather than
humans
 all communication
activity in Internet
governed by protocols
protocols define format, order of msgs
sent and received among network
entities, and actions taken on msg
transmission, receipt
Introduction 1-11
What’s a protocol?
a human protocol and a computer network protocol:
Q: Why are protocols so important?
Hi
Hi
Got the
time?
2:00
TCP connection
req
TCP connection
response
Get http://www.awl.com/kurose-ross
<file>
time
Introduction 1-12
A closer look at network structure:
 network edge:
applications and
hosts
 network core:
 routers
 network of
networks
 access networks,
physical media:
communication links

More Related Content

Similar to Intro

Chapter_1_.pptx
Chapter_1_.pptxChapter_1_.pptx
Chapter_1_.pptx
javairiaimran1
 
Chapter_1_V6.1.ppt
Chapter_1_V6.1.pptChapter_1_V6.1.ppt
Chapter_1_V6.1.ppt
ubaidullah75790
 
Chapter_1 V6.1 absolute java original slides
Chapter_1 V6.1 absolute java original slidesChapter_1 V6.1 absolute java original slides
Chapter_1 V6.1 absolute java original slides
mzayed5
 
Chapter1 5th april2009
Chapter1 5th april2009Chapter1 5th april2009
Chapter1 5th april2009
servago01
 
3150710 MATERIAL FOR STUDENTS FOR EXAMINATION
3150710 MATERIAL FOR STUDENTS FOR EXAMINATION3150710 MATERIAL FOR STUDENTS FOR EXAMINATION
3150710 MATERIAL FOR STUDENTS FOR EXAMINATION
jainyshah20
 
Chapter 1 v6.1
Chapter 1 v6.1Chapter 1 v6.1
Chapter 1 v6.1
Savvas Dimopoulos
 
Network chapter 1 ENCS2330 Birzeit_university
Network chapter 1 ENCS2330 Birzeit_universityNetwork chapter 1 ENCS2330 Birzeit_university
Network chapter 1 ENCS2330 Birzeit_university
OmarQalalwehAbuSamra
 
Chapter_1_V7.01gsgsggsgshshsgabbsbshhsh.ppt
Chapter_1_V7.01gsgsggsgshshsgabbsbshhsh.pptChapter_1_V7.01gsgsggsgshshsgabbsbshhsh.ppt
Chapter_1_V7.01gsgsggsgshshsgabbsbshhsh.ppt
netacc20052002
 
Chapter_1_V7.01.ppt
Chapter_1_V7.01.pptChapter_1_V7.01.ppt
Chapter_1_V7.01.ppt
ShyamalaRamachandran1
 
Lecture 1 4
Lecture 1 4Lecture 1 4
Lecture 1 4
Hasam Panezai
 
20CS2008 Computer Networks
20CS2008 Computer Networks20CS2008 Computer Networks
20CS2008 Computer Networks
Kathirvel Ayyaswamy
 
Tutorial Jaringan komputer
Tutorial Jaringan komputerTutorial Jaringan komputer
Tutorial Jaringan komputer
Agus Kurniawan
 
Chapter 1 - Computer Networking a top-down Approach 7th
Chapter 1 - Computer Networking a top-down Approach 7thChapter 1 - Computer Networking a top-down Approach 7th
Chapter 1 - Computer Networking a top-down Approach 7th
Andy Juan Sarango Veliz
 
Chapter1
Chapter1Chapter1
Chapter1
guest0af0cf
 
Computer Networking A Top-Down Approach 6th editiion.pdf
Computer Networking A Top-Down Approach 6th editiion.pdfComputer Networking A Top-Down Approach 6th editiion.pdf
Computer Networking A Top-Down Approach 6th editiion.pdf
ssuser1a7f55
 
Computer Networking books for studying.pdf
Computer Networking books for studying.pdfComputer Networking books for studying.pdf
Computer Networking books for studying.pdf
IbniAmin7
 
Chapter 2 - Computer Networking a top-down Approach 7th
Chapter 2 - Computer Networking a top-down Approach 7thChapter 2 - Computer Networking a top-down Approach 7th
Chapter 2 - Computer Networking a top-down Approach 7th
Andy Juan Sarango Veliz
 
Ch01.pdf kurose and ross
Ch01.pdf kurose and rossCh01.pdf kurose and ross
Ch01.pdf kurose and ross
David Charles
 
3rd edition chapter1
3rd edition chapter13rd edition chapter1
3rd edition chapter1
nguyễn cầm
 
Chapter1 intro
Chapter1 introChapter1 intro
Chapter1 intro
Diego Corrales
 

Similar to Intro (20)

Chapter_1_.pptx
Chapter_1_.pptxChapter_1_.pptx
Chapter_1_.pptx
 
Chapter_1_V6.1.ppt
Chapter_1_V6.1.pptChapter_1_V6.1.ppt
Chapter_1_V6.1.ppt
 
Chapter_1 V6.1 absolute java original slides
Chapter_1 V6.1 absolute java original slidesChapter_1 V6.1 absolute java original slides
Chapter_1 V6.1 absolute java original slides
 
Chapter1 5th april2009
Chapter1 5th april2009Chapter1 5th april2009
Chapter1 5th april2009
 
3150710 MATERIAL FOR STUDENTS FOR EXAMINATION
3150710 MATERIAL FOR STUDENTS FOR EXAMINATION3150710 MATERIAL FOR STUDENTS FOR EXAMINATION
3150710 MATERIAL FOR STUDENTS FOR EXAMINATION
 
Chapter 1 v6.1
Chapter 1 v6.1Chapter 1 v6.1
Chapter 1 v6.1
 
Network chapter 1 ENCS2330 Birzeit_university
Network chapter 1 ENCS2330 Birzeit_universityNetwork chapter 1 ENCS2330 Birzeit_university
Network chapter 1 ENCS2330 Birzeit_university
 
Chapter_1_V7.01gsgsggsgshshsgabbsbshhsh.ppt
Chapter_1_V7.01gsgsggsgshshsgabbsbshhsh.pptChapter_1_V7.01gsgsggsgshshsgabbsbshhsh.ppt
Chapter_1_V7.01gsgsggsgshshsgabbsbshhsh.ppt
 
Chapter_1_V7.01.ppt
Chapter_1_V7.01.pptChapter_1_V7.01.ppt
Chapter_1_V7.01.ppt
 
Lecture 1 4
Lecture 1 4Lecture 1 4
Lecture 1 4
 
20CS2008 Computer Networks
20CS2008 Computer Networks20CS2008 Computer Networks
20CS2008 Computer Networks
 
Tutorial Jaringan komputer
Tutorial Jaringan komputerTutorial Jaringan komputer
Tutorial Jaringan komputer
 
Chapter 1 - Computer Networking a top-down Approach 7th
Chapter 1 - Computer Networking a top-down Approach 7thChapter 1 - Computer Networking a top-down Approach 7th
Chapter 1 - Computer Networking a top-down Approach 7th
 
Chapter1
Chapter1Chapter1
Chapter1
 
Computer Networking A Top-Down Approach 6th editiion.pdf
Computer Networking A Top-Down Approach 6th editiion.pdfComputer Networking A Top-Down Approach 6th editiion.pdf
Computer Networking A Top-Down Approach 6th editiion.pdf
 
Computer Networking books for studying.pdf
Computer Networking books for studying.pdfComputer Networking books for studying.pdf
Computer Networking books for studying.pdf
 
Chapter 2 - Computer Networking a top-down Approach 7th
Chapter 2 - Computer Networking a top-down Approach 7thChapter 2 - Computer Networking a top-down Approach 7th
Chapter 2 - Computer Networking a top-down Approach 7th
 
Ch01.pdf kurose and ross
Ch01.pdf kurose and rossCh01.pdf kurose and ross
Ch01.pdf kurose and ross
 
3rd edition chapter1
3rd edition chapter13rd edition chapter1
3rd edition chapter1
 
Chapter1 intro
Chapter1 introChapter1 intro
Chapter1 intro
 

Recently uploaded

Series of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.pptSeries of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.ppt
PauloRodrigues104553
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
wisnuprabawa3
 
Building Electrical System Design & Installation
Building Electrical System Design & InstallationBuilding Electrical System Design & Installation
Building Electrical System Design & Installation
symbo111
 
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
ihlasbinance2003
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
SUTEJAS
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
NidhalKahouli2
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
gerogepatton
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
KrishnaveniKrishnara1
 
digital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdfdigital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdf
drwaing
 
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
Mukeshwaran Balu
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Christina Lin
 
This is my Environmental physics presentation
This is my Environmental physics presentationThis is my Environmental physics presentation
This is my Environmental physics presentation
ZainabHashmi17
 
一比一原版(UC Berkeley毕业证)加利福尼亚大学|伯克利分校毕业证成绩单专业办理
一比一原版(UC Berkeley毕业证)加利福尼亚大学|伯克利分校毕业证成绩单专业办理一比一原版(UC Berkeley毕业证)加利福尼亚大学|伯克利分校毕业证成绩单专业办理
一比一原版(UC Berkeley毕业证)加利福尼亚大学|伯克利分校毕业证成绩单专业办理
skuxot
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
IJECEIAES
 
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.pptPROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
bhadouriyakaku
 
introduction to solar energy for engineering.pdf
introduction to solar energy for engineering.pdfintroduction to solar energy for engineering.pdf
introduction to solar energy for engineering.pdf
ravindarpurohit26
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
Victor Morales
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
Aditya Rajan Patra
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
Hitesh Mohapatra
 

Recently uploaded (20)

Series of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.pptSeries of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.ppt
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
 
Building Electrical System Design & Installation
Building Electrical System Design & InstallationBuilding Electrical System Design & Installation
Building Electrical System Design & Installation
 
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
 
digital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdfdigital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdf
 
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
 
This is my Environmental physics presentation
This is my Environmental physics presentationThis is my Environmental physics presentation
This is my Environmental physics presentation
 
一比一原版(UC Berkeley毕业证)加利福尼亚大学|伯克利分校毕业证成绩单专业办理
一比一原版(UC Berkeley毕业证)加利福尼亚大学|伯克利分校毕业证成绩单专业办理一比一原版(UC Berkeley毕业证)加利福尼亚大学|伯克利分校毕业证成绩单专业办理
一比一原版(UC Berkeley毕业证)加利福尼亚大学|伯克利分校毕业证成绩单专业办理
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
 
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.pptPROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
 
introduction to solar energy for engineering.pdf
introduction to solar energy for engineering.pdfintroduction to solar energy for engineering.pdf
introduction to solar energy for engineering.pdf
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
 

Intro

  • 1. Introduction 1-1 CS 325 Computer Networks Sami Rollins srollins@mtholyoke.edu Fall 2005
  • 2. Introduction 1-2 Introduction  Main Course Page  http://www.mtholyoke.edu/courses/srollins/cs325/
  • 3. Introduction 1-3 Chapter 1 Introduction Computer Networking: A Top Down Approach Featuring the Internet, 3rd edition. Jim Kurose, Keith Ross Addison-Wesley, July 2004. A note on the use of these ppt slides: We’re making these slides freely available to all (faculty, students, readers). They’re in PowerPoint form so you can add, modify, and delete slides (including this one) and slide content to suit your needs. They obviously represent a lot of work on our part. In return for use, we only ask the following:  If you use these slides (e.g., in a class) in substantially unaltered form, that you mention their source (after all, we’d like people to use our book!)  If you post any slides in substantially unaltered form on a www site, that you note that they are adapted from (or perhaps identical to) our slides, and note our copyright of this material. Thanks and enjoy! JFK/KWR All material copyright 1996-2004 J.F Kurose and K.W. Ross, All Rights Reserved
  • 4. Introduction 1-4 Chapter 1: Introduction  What applications do you use that use a computer network?
  • 5. Introduction 1-5 Chapter 1: Introduction  What applications do you use that use a computer network?  We want to understand what is under the hool  Top-down approach  Understand how applications use the network, then understand how the network supports those applications  Use the Internet as an example
  • 6. Introduction 1-6 What’s the Internet: “nuts and bolts” view  millions of connected computing devices: hosts = end systems  examples of hosts?  running network apps  examples of applications? local ISP company network regional ISP router workstation server mobile
  • 7. Introduction 1-7 What’s the Internet: “nuts and bolts” view  communication links  fiber, copper, radio, satellite  transmission rate = bandwidth • typical bandwidth for modem? wireless?  routers: forward packets (chunks of data)  what’s in a packet? local ISP company network regional ISP router workstation server mobile
  • 8. Introduction 1-8 What’s the Internet: “nuts and bolts” view  protocols control sending, receiving of msgs  e.g., TCP, IP, HTTP, FTP, PPP  Internet: “network of networks”  loosely hierarchical  public Internet versus private intranet  Internet standards  RFC: Request for comments  IETF: Internet Engineering Task Force local ISP company network regional ISP router workstation server mobile
  • 9. Introduction 1-9 What’s the Internet: a service view  communication infrastructure enables distributed applications:  Web, email, other examples?  communication services provided to apps:  connection-oriented reliable • example apps?  Connectionless unreliable • example apps?
  • 10. Introduction 1-10 What’s a protocol? human protocols:  “what’s the time?”  “I have a question”  introductions network protocols:  machines rather than humans  all communication activity in Internet governed by protocols protocols define format, order of msgs sent and received among network entities, and actions taken on msg transmission, receipt
  • 11. Introduction 1-11 What’s a protocol? a human protocol and a computer network protocol: Q: Why are protocols so important? Hi Hi Got the time? 2:00 TCP connection req TCP connection response Get http://www.awl.com/kurose-ross <file> time
  • 12. Introduction 1-12 A closer look at network structure:  network edge: applications and hosts  network core:  routers  network of networks  access networks, physical media: communication links