SlideShare a Scribd company logo
Introduction to Computer Networks
INTRODUCTION TO COMPUTER NETWORKS
Muhammad Adil Raja
Roaming Researchers, Inc.
August 25, 2014
Introduction to Computer Networks
OUTLINE
1 USES OF COMPUTER NETWORKS
2 NETWORK HARDWARE
3 NETWORK SOFTWARE
4 REFERENCE MODELS
5 CONCLUSIONS
Introduction to Computer Networks
OUTLINE
1 USES OF COMPUTER NETWORKS
2 NETWORK HARDWARE
3 NETWORK SOFTWARE
4 REFERENCE MODELS
5 CONCLUSIONS
Introduction to Computer Networks
OUTLINE
1 USES OF COMPUTER NETWORKS
2 NETWORK HARDWARE
3 NETWORK SOFTWARE
4 REFERENCE MODELS
5 CONCLUSIONS
Introduction to Computer Networks
OUTLINE
1 USES OF COMPUTER NETWORKS
2 NETWORK HARDWARE
3 NETWORK SOFTWARE
4 REFERENCE MODELS
5 CONCLUSIONS
Introduction to Computer Networks
OUTLINE
1 USES OF COMPUTER NETWORKS
2 NETWORK HARDWARE
3 NETWORK SOFTWARE
4 REFERENCE MODELS
5 CONCLUSIONS
Introduction to Computer Networks
Uses of Computer Networks
USES OF COMPUTER NETWORKS I
Business Applications.
Resource Sharing.
VPNs (Virtual Private Networks).
Client-Server Model,
Web Application.
Communication Medium Between Employees.
IP Telephony.
Voice over IP (VoIP).
Desktop Sharing.
E-Commerce (Electronic Commerce).
Home Applications.
Internet access provides home users with connectivity to
remote computers.
Personalized information.
Peer-to-peer Communication.
Introduction to Computer Networks
Uses of Computer Networks
USES OF COMPUTER NETWORKS II
Instant Messaging.
Twitter.
Social Networks.
Facebook
Collaborative Websites – Wikis, Wikipedia.
IPTV (IP Television).
Ubiquitous Computing.
Power-line Networks.
RFID (Radio Frequency IDentification).
Mobile Users.
Connectivity.
Wireless Hotspots.
Fixed Wireless and Mobile Wireless.
Text Messaging.
Texting.
Short Message Service.
Introduction to Computer Networks
Uses of Computer Networks
USES OF COMPUTER NETWORKS III
Smart Phones.
GPS (Global Positioning System).
m-commerce (mobile-commerce).
NFC (Near Field Communication).
Sensor Networks.
Wearable computers.
Social Issues.
Profiling users.
Cookies.
Gmail is read by Google.
Spam.
Content intended for criminal behavior.
Phishing.
USe of CAPTCHAs.
Introduction to Computer Networks
Network Hardware
NETWORK HARDWARE I
PANs (Personal Area Networks).
Bluetooth.
LANs (Local Area Networks).
When LANs are used by companies, they are called
enterprise networks.
Access Point (Wireless Routers).
Base Station.
Wireless LANs – IEEE 802.11/ WiFi.
Wired LANs – IEEE 802.3/ Ethernet.
Switched Ethernet.
VLANs.
Classic Ethernet.
Power-line Networks.
Metropolitan Area Network (MAN) – covers a city.
IEEE 802.16 – WiMAX.
Introduction to Computer Networks
Network Hardware
NETWORK HARDWARE II
Wide Area Networks (Wide Area Networks).
A WAN covers a country or a continent.
Subnet – carries messages from host to host.
Transmission Lines – copper, optical, radio.
Switching Elements – connect two or more transmission
lines.
Routers.
Internetworks.
VPN (Virtual Private Networks.
Routing Algorithms.
Forwarding algorithms.
Internetwork.
Internetwork or internet – a collection of interconnected
networks.
Gateway – a machine that connects two or more networks.
Introduction to Computer Networks
Network Software
NETWORK SOFTWARE I
Protocol Hierarchies
Layered architectures.
Protocol – A set of rules for communication between
machines.
Peers in hierarchies.
Network architecture – A set of layers and protocols.
Protocl Stack – A list of protocols used by a certain system,
one protocol per layer.
Design Issues for the Layers.
Error correction.
Routing.
Protocol layering.
Internetworking.
Scalability.
Statistical multiplexing.
Introduction to Computer Networks
Network Software
NETWORK SOFTWARE II
Flow Control.
Congestion.
Real-time Services.
Quality of Service.
Confidentiality Authentication.
Integrity.
Connection-Oriented Versus Connectionless Service.
Introduction to Computer Networks
Reference Models
REFERENCE MODELS I
The OSI Reference Model.
OSI (Open Systems Interconnection).
OSI model.
The TCP/IP Reference Model.
Introduction to Computer Networks
Reference Models
REFERENCE MODELS II
4 REFERENCE MODELS
Layer k
Layer k + 1
Layer k - 1
Protocol
Service provided by layer k
Layer k
Layer k + 1
Layer k - 1
Figure 1-19. The relationship between a service and a protocol.
EFERENCE MODELS
FIGURE: The relationship between a service and a protocol.
Introduction to Computer Networks
Reference Models
THE OSI REFERENCE MODEL I
A Seven Layered Architecture.
1 Application.
2 Presentation – Concerned With the syntax and semantics
of the information transmitted.
3 Session – Dialog control, token management,
synchronization.
4 Transport.
5 Network.
6 Datalink Layer.
7 Physical Layer.
The Application Layer.
HTTP (HyperText Transfer Protocol).
FTP (File Transfer Protocol).
Introduction to Computer Networks
Reference Models
THE OSI REFERENCE MODEL II
Transport Layer.
Accept data from the layer above it.
Split it up into smaller units if need be.
Pass these to the network layer.
Ensure that the pieces all arrive correctly at the other end.
The Network Layer.
Controls the operation of the network.
Determine how packets are routed from the source to the
destination.
The Data Link Layer
The main task of the data lik layer is to transform a raw
transmission facility into a line that appears free of
undetected transmission errors.
It masks the real errors so that the network layer cannot
see them.
Introduction to Computer Networks
Reference Models
THE OSI REFERENCE MODEL III
Accomplishes this task by having the sender break the
input data into data frames.
If the service is reliable, the receiver confirms correct
receipt of each frame by sending back an
acknowledgement frame.
How to control access to the shared channel?
The medium access control sublayer.
The Physical Layer
Concerned with transmitting raw bits over a communication
channel.
The design issues: To receive a 1 as a 1 and a 0 as a 0.
Lifetime of bits (nanoseconds).
Can simultaneous transmission happen in both directions?
How to establish the initial connection.
How to tear it down when both sides are finished?
How many pins the network connector has?
Introduction to Computer Networks
Reference Models
THE OSI REFERENCE MODEL IV
What is each pin used for?
These design issues largely deal with mechanical, electrical
and timing interfaces.
It also deals with the physical transmission medium, which
lies below the physical layer.
Introduction to Computer Networks
Reference Models
THE OSI REFERENCE MODEL V42 INTRODUCTION CHAP. 1
Layer
Presentation
Application
Session
Transport
Network
Data link
Physical
7
6
5
4
3
2
1
Interface
Host A
Name of unit
exchanged
APDU
PPDU
SPDU
TPDU
Packet
Frame
Bit
Presentation
Application
Session
Transport
Network
Data link
Physical
Host B
Network Network
Data link Data link
Physical Physical
Router Router
Internal subnet protocol
Application protocol
Presentation protocol
Transport protocol
Session protocol
Communication subnet boundary
Network layer host-router protocol
Data link layer host-router protocol
Physical layer host-router protocol
Figure 1-20. The OSI reference model.
4. The layer boundaries should be chosen to minimize the information
FIGURE: The OSI reference model.
Introduction to Computer Networks
Reference Models
THE TCP/IP REFERENCE MODEL I
1 The Application Layer (HTTP/FTP/TELNET etc.)
2 The Transport Layer (TCP/UDP).
3 The Internet Layer (IP).
4 The Link Layer.
Introduction to Computer Networks
Reference Models
THE TCP/IP REFERENCE MODEL II
It is shown in Fig. 1-21 as corresponding roughly to the OSI network layer. Its
job is to permit hosts to inject packets into any network and have them travel in-
dependently to the destination (potentially on a different network). They may
even arrive in a completely different order than they were sent, in which case it is
the job of higher layers to rearrange them, if in-order delivery is desired. Note
that ‘‘internet’’ is used here in a generic sense, even though this layer is present in
the Internet.
TCP/IPOSI
Application
Presentation
Session
Transport
Network
Data link
Physical
7
6
5
4
3
2
1
Application
Transport
Internet
Link
Not present
in the model
Figure 1-21. The TCP/IP reference model.
The analogy here is with the (snail) mail system. A person can drop a se-
quence of international letters into a mailbox in one country, and with a little luck,
FIGURE: The TCP/IP reference model.
Introduction to Computer Networks
Reference Models
THE TCP/IP REFERENCE MODEL III
48 INTRODUCTION CHAP. 1
Link Ethernet802.11SONETDSL
IP ICMP
HTTP RTPSMTP DNS
TCP UDP
Internet
Transport
Layers Protocols
Application
Figure 1-22. The TCP/IP model with some protocols we will study.
include the Domain Name System (DNS), for mapping host names onto their net-
work addresses, HTTP, the protocol for fetching pages on the World Wide Web,
and RTP, the protocol for delivering real-time media such as voice or movies.
FIGURE: The TCP/IP model with some protocols we will study.
Introduction to Computer Networks
Reference Models
THE TCP/IP REFERENCE MODEL IV
ig. 1-23 as the framewo
5 Application
4 Transport
3 Network
2 Link
Introduction to Computer Networks
Conclusions
CONCLUSIONS
The figures have been taken from, Computer Networks,
Andrew S. Tanenbaum, 5th Edition.

More Related Content

What's hot

Computer network
Computer networkComputer network
Computer network
Ketan Garg
 
Network
NetworkNetwork
Network
Farhad Khidr
 
TCP/IP Introduction
TCP/IP IntroductionTCP/IP Introduction
TCP/IP Introduction
Naveen Kumar R.B.
 
COMPUTER NETWORKING
COMPUTER NETWORKINGCOMPUTER NETWORKING
COMPUTER NETWORKING
Kiran Buriro
 
basic networking
basic networkingbasic networking
basic networkingAnmol Bagga
 
Network architecture - part-I
Network architecture - part-INetwork architecture - part-I
Network architecture - part-I
csk selva
 
Basic networking in power point by suprabha
Basic networking in power point by suprabhaBasic networking in power point by suprabha
Basic networking in power point by suprabha
Suprabha Sahoo
 
Tcp/ip model
Tcp/ip  modelTcp/ip  model
Tcp/ip model
Kumar Alok
 
How the internet_works
How the internet_worksHow the internet_works
How the internet_worksarun nalam
 
An introduction to networking
An introduction to networkingAn introduction to networking
An introduction to networking
Jafar Nesargi
 
Introduction to Network and System Administration
Introduction to Network and System AdministrationIntroduction to Network and System Administration
Introduction to Network and System Administration
Duressa Teshome
 
TCP/IP Introduction
TCP/IP IntroductionTCP/IP Introduction
TCP/IP Introduction
Dineesha Suraweera
 
Networking fundamentals
Networking fundamentalsNetworking fundamentals
Networking fundamentalsjpprakash
 
Computer Networks Lecture Notes
Computer Networks Lecture NotesComputer Networks Lecture Notes
Computer Networks Lecture Notes
FellowBuddy.com
 
IP Address
IP AddressIP Address
IP Address
Rahul P
 
Osi model
Osi modelOsi model
Osi model
dhawal mehta
 
Networking Fundamentals
Networking  FundamentalsNetworking  Fundamentals
Networking Fundamentals
Manjit Chavda
 
Computer Networking
Computer NetworkingComputer Networking
Computer Networking
kieshore
 

What's hot (20)

Computer network
Computer networkComputer network
Computer network
 
Network
NetworkNetwork
Network
 
TCP/IP Introduction
TCP/IP IntroductionTCP/IP Introduction
TCP/IP Introduction
 
COMPUTER NETWORKING
COMPUTER NETWORKINGCOMPUTER NETWORKING
COMPUTER NETWORKING
 
basic networking
basic networkingbasic networking
basic networking
 
OSI Model
OSI ModelOSI Model
OSI Model
 
Network architecture - part-I
Network architecture - part-INetwork architecture - part-I
Network architecture - part-I
 
Internet Protocols
Internet ProtocolsInternet Protocols
Internet Protocols
 
Basic networking in power point by suprabha
Basic networking in power point by suprabhaBasic networking in power point by suprabha
Basic networking in power point by suprabha
 
Tcp/ip model
Tcp/ip  modelTcp/ip  model
Tcp/ip model
 
How the internet_works
How the internet_worksHow the internet_works
How the internet_works
 
An introduction to networking
An introduction to networkingAn introduction to networking
An introduction to networking
 
Introduction to Network and System Administration
Introduction to Network and System AdministrationIntroduction to Network and System Administration
Introduction to Network and System Administration
 
TCP/IP Introduction
TCP/IP IntroductionTCP/IP Introduction
TCP/IP Introduction
 
Networking fundamentals
Networking fundamentalsNetworking fundamentals
Networking fundamentals
 
Computer Networks Lecture Notes
Computer Networks Lecture NotesComputer Networks Lecture Notes
Computer Networks Lecture Notes
 
IP Address
IP AddressIP Address
IP Address
 
Osi model
Osi modelOsi model
Osi model
 
Networking Fundamentals
Networking  FundamentalsNetworking  Fundamentals
Networking Fundamentals
 
Computer Networking
Computer NetworkingComputer Networking
Computer Networking
 

Viewers also liked

Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer network
Ashita Agrawal
 
Intro of computer_network
Intro of computer_networkIntro of computer_network
Intro of computer_network
Anand Bohara
 
Networking
NetworkingNetworking
Networking
Palash Sachan
 
Basic concepts of computer Networking
Basic concepts of computer NetworkingBasic concepts of computer Networking
Basic concepts of computer NetworkingHj Habib
 
Computer networking devices
Computer networking devicesComputer networking devices
Computer networking devices
Rajesh Sadhukha
 
3 computer network - basic concepts
3   computer network - basic concepts3   computer network - basic concepts
3 computer network - basic conceptsAnkit Garg
 
INTRODUCTION TO COMPUTER NETWORKS
INTRODUCTION TO COMPUTER NETWORKSINTRODUCTION TO COMPUTER NETWORKS
INTRODUCTION TO COMPUTER NETWORKS
Wipro
 
Introduction to computer networks
Introduction to computer networksIntroduction to computer networks
Introduction to computer networks
Nicholas Riungu
 
Introduction to computer networks
Introduction to computer networksIntroduction to computer networks
Introduction to computer networks
sanjeev kumar
 
Introduction to computer networking
Introduction to computer networkingIntroduction to computer networking
Introduction to computer networking
Sameer Sharma
 
Networking presentation
Networking presentationNetworking presentation
Networking presentationGajan Hai
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer network
Rutwik Jadhav
 
Computer Networking : Principles, Protocols and Practice - lesson 1
Computer Networking : Principles, Protocols and Practice - lesson 1Computer Networking : Principles, Protocols and Practice - lesson 1
Computer Networking : Principles, Protocols and Practice - lesson 1
Olivier Bonaventure
 
Computer network Component introduction
 Computer network Component introduction Computer network Component introduction
Computer network Component introduction
Ashutosh Kumaar
 
Powerpoint jaringan komputer
Powerpoint jaringan komputerPowerpoint jaringan komputer
Powerpoint jaringan komputer
niyann
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer network
Online
 
CBSE XII Communication And Network Concepts
CBSE XII Communication And Network ConceptsCBSE XII Communication And Network Concepts
CBSE XII Communication And Network Concepts
Guru Ji
 
Computer Network
Computer NetworkComputer Network
Computer NetworkCma Mohd
 

Viewers also liked (20)

Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer network
 
Intro of computer_network
Intro of computer_networkIntro of computer_network
Intro of computer_network
 
Networking
NetworkingNetworking
Networking
 
Basic concepts of computer Networking
Basic concepts of computer NetworkingBasic concepts of computer Networking
Basic concepts of computer Networking
 
Computer networking devices
Computer networking devicesComputer networking devices
Computer networking devices
 
3 computer network - basic concepts
3   computer network - basic concepts3   computer network - basic concepts
3 computer network - basic concepts
 
INTRODUCTION TO COMPUTER NETWORKS
INTRODUCTION TO COMPUTER NETWORKSINTRODUCTION TO COMPUTER NETWORKS
INTRODUCTION TO COMPUTER NETWORKS
 
Introduction to computer networks
Introduction to computer networksIntroduction to computer networks
Introduction to computer networks
 
Introduction to computer networks
Introduction to computer networksIntroduction to computer networks
Introduction to computer networks
 
Introduction to computer networking
Introduction to computer networkingIntroduction to computer networking
Introduction to computer networking
 
Networking presentation
Networking presentationNetworking presentation
Networking presentation
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer network
 
Computer networks
Computer networksComputer networks
Computer networks
 
Computer Networking : Principles, Protocols and Practice - lesson 1
Computer Networking : Principles, Protocols and Practice - lesson 1Computer Networking : Principles, Protocols and Practice - lesson 1
Computer Networking : Principles, Protocols and Practice - lesson 1
 
Computer network Component introduction
 Computer network Component introduction Computer network Component introduction
Computer network Component introduction
 
Powerpoint jaringan komputer
Powerpoint jaringan komputerPowerpoint jaringan komputer
Powerpoint jaringan komputer
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer network
 
CBSE XII Communication And Network Concepts
CBSE XII Communication And Network ConceptsCBSE XII Communication And Network Concepts
CBSE XII Communication And Network Concepts
 
Computer network ppt
Computer network pptComputer network ppt
Computer network ppt
 
Computer Network
Computer NetworkComputer Network
Computer Network
 

Similar to Introduction To Computer Networks

Andrew S. Tanembaum, Computer Networks, 4th ed.ppt
Andrew S. Tanembaum, Computer Networks, 4th ed.pptAndrew S. Tanembaum, Computer Networks, 4th ed.ppt
Andrew S. Tanembaum, Computer Networks, 4th ed.ppt
NiharikaDubey17
 
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptxpppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
zeyadosama505
 
IMD 251 - Networking
IMD 251 - NetworkingIMD 251 - Networking
IMD 251 - Networkingisma ishak
 
Ccna report
Ccna reportCcna report
Ccna report
Surender Singh
 
Internet basics and Cloud Computing- Manish Jha
Internet basics and Cloud Computing- Manish JhaInternet basics and Cloud Computing- Manish Jha
Internet basics and Cloud Computing- Manish Jha
manish jha
 
Manish Jha- Research Scholar- Internet Basics Requriement
Manish Jha- Research Scholar- Internet Basics RequriementManish Jha- Research Scholar- Internet Basics Requriement
Manish Jha- Research Scholar- Internet Basics Requriement
Manish Jha
 
OSI model (7 LAYER )
OSI model (7 LAYER )OSI model (7 LAYER )
OSI model (7 LAYER )
AAKASH S
 
Computer network
Computer networkComputer network
Computer network
samiksha padgilwar
 
Computer network
Computer networkComputer network
Computer network
samiksha padgilwar
 
Introduction to Networks_v0.2
Introduction to Networks_v0.2Introduction to Networks_v0.2
Introduction to Networks_v0.2Sohail Gohir
 
Cs8591 Computer Networks
Cs8591 Computer NetworksCs8591 Computer Networks
Cs8591 Computer Networks
Kathirvel Ayyaswamy
 
Concept of networking
Concept of networkingConcept of networking
Concept of networking
sumit dimri
 
C C N A Day1
C C N A  Day1C C N A  Day1
C C N A Day1
darulquthni
 
networking1.ppt
networking1.pptnetworking1.ppt
networking1.ppt
ChinmayWaingankar3
 
Thesis Statement On Digital Security
Thesis Statement On Digital SecurityThesis Statement On Digital Security
Thesis Statement On Digital Security
Lindsey Jones
 
CN unit 1 part 2 2023.ppt
CN unit 1 part 2 2023.pptCN unit 1 part 2 2023.ppt
CN unit 1 part 2 2023.ppt
mohanravi1986
 
Chapter 1 overview-stij3053 - Network Design
Chapter 1 overview-stij3053 - Network DesignChapter 1 overview-stij3053 - Network Design
Chapter 1 overview-stij3053 - Network Design
nakomuri
 

Similar to Introduction To Computer Networks (20)

Andrew S. Tanembaum, Computer Networks, 4th ed.ppt
Andrew S. Tanembaum, Computer Networks, 4th ed.pptAndrew S. Tanembaum, Computer Networks, 4th ed.ppt
Andrew S. Tanembaum, Computer Networks, 4th ed.ppt
 
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptxpppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
 
IMD 251 - Networking
IMD 251 - NetworkingIMD 251 - Networking
IMD 251 - Networking
 
Ccna report
Ccna reportCcna report
Ccna report
 
Internet basics and Cloud Computing- Manish Jha
Internet basics and Cloud Computing- Manish JhaInternet basics and Cloud Computing- Manish Jha
Internet basics and Cloud Computing- Manish Jha
 
Manish Jha- Research Scholar- Internet Basics Requriement
Manish Jha- Research Scholar- Internet Basics RequriementManish Jha- Research Scholar- Internet Basics Requriement
Manish Jha- Research Scholar- Internet Basics Requriement
 
OSI model (7 LAYER )
OSI model (7 LAYER )OSI model (7 LAYER )
OSI model (7 LAYER )
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
Computer network
Computer networkComputer network
Computer network
 
Computer network
Computer networkComputer network
Computer network
 
Introduction to Networks_v0.2
Introduction to Networks_v0.2Introduction to Networks_v0.2
Introduction to Networks_v0.2
 
Cs8591 Computer Networks
Cs8591 Computer NetworksCs8591 Computer Networks
Cs8591 Computer Networks
 
Concept of networking
Concept of networkingConcept of networking
Concept of networking
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
C C N A Day1
C C N A  Day1C C N A  Day1
C C N A Day1
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
networking1.ppt
networking1.pptnetworking1.ppt
networking1.ppt
 
Thesis Statement On Digital Security
Thesis Statement On Digital SecurityThesis Statement On Digital Security
Thesis Statement On Digital Security
 
CN unit 1 part 2 2023.ppt
CN unit 1 part 2 2023.pptCN unit 1 part 2 2023.ppt
CN unit 1 part 2 2023.ppt
 
Chapter 1 overview-stij3053 - Network Design
Chapter 1 overview-stij3053 - Network DesignChapter 1 overview-stij3053 - Network Design
Chapter 1 overview-stij3053 - Network Design
 

More from adil raja

ANNs.pdf
ANNs.pdfANNs.pdf
ANNs.pdf
adil raja
 
A Software Requirements Specification
A Software Requirements SpecificationA Software Requirements Specification
A Software Requirements Specification
adil raja
 
NUAV - A Testbed for Development of Autonomous Unmanned Aerial Vehicles
NUAV - A Testbed for Development of Autonomous Unmanned Aerial VehiclesNUAV - A Testbed for Development of Autonomous Unmanned Aerial Vehicles
NUAV - A Testbed for Development of Autonomous Unmanned Aerial Vehicles
adil raja
 
DevOps Demystified
DevOps DemystifiedDevOps Demystified
DevOps Demystified
adil raja
 
On Research (And Development)
On Research (And Development)On Research (And Development)
On Research (And Development)
adil raja
 
Simulators as Drivers of Cutting Edge Research
Simulators as Drivers of Cutting Edge ResearchSimulators as Drivers of Cutting Edge Research
Simulators as Drivers of Cutting Edge Research
adil raja
 
The Knock Knock Protocol
The Knock Knock ProtocolThe Knock Knock Protocol
The Knock Knock Protocol
adil raja
 
File Transfer Through Sockets
File Transfer Through SocketsFile Transfer Through Sockets
File Transfer Through Sockets
adil raja
 
Remote Command Execution
Remote Command ExecutionRemote Command Execution
Remote Command Execution
adil raja
 
CMM Level 3 Assessment of Xavor Pakistan
CMM Level 3 Assessment of Xavor PakistanCMM Level 3 Assessment of Xavor Pakistan
CMM Level 3 Assessment of Xavor Pakistan
adil raja
 
Data Warehousing
Data WarehousingData Warehousing
Data Warehousing
adil raja
 
Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...
Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...
Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...
adil raja
 
Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...
Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...
Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...
adil raja
 
Real-Time Non-Intrusive Speech Quality Estimation for VoIP
Real-Time Non-Intrusive Speech Quality Estimation for VoIPReal-Time Non-Intrusive Speech Quality Estimation for VoIP
Real-Time Non-Intrusive Speech Quality Estimation for VoIP
adil raja
 
VoIP
VoIPVoIP
VoIP
adil raja
 
ULMAN GUI Specifications
ULMAN GUI SpecificationsULMAN GUI Specifications
ULMAN GUI Specifications
adil raja
 
Modeling the Effect of Packet Loss on Speech Quality: Genetic Programming Bas...
Modeling the Effect of Packet Loss on Speech Quality: Genetic Programming Bas...Modeling the Effect of Packet Loss on Speech Quality: Genetic Programming Bas...
Modeling the Effect of Packet Loss on Speech Quality: Genetic Programming Bas...
adil raja
 
ULMAN-GUI
ULMAN-GUIULMAN-GUI
ULMAN-GUI
adil raja
 
Modeling the Effect of Packet Loss on Speech Quality: Genetic Programming Bas...
Modeling the Effect of Packet Loss on Speech Quality: Genetic Programming Bas...Modeling the Effect of Packet Loss on Speech Quality: Genetic Programming Bas...
Modeling the Effect of Packet Loss on Speech Quality: Genetic Programming Bas...
adil raja
 

More from adil raja (20)

ANNs.pdf
ANNs.pdfANNs.pdf
ANNs.pdf
 
A Software Requirements Specification
A Software Requirements SpecificationA Software Requirements Specification
A Software Requirements Specification
 
NUAV - A Testbed for Development of Autonomous Unmanned Aerial Vehicles
NUAV - A Testbed for Development of Autonomous Unmanned Aerial VehiclesNUAV - A Testbed for Development of Autonomous Unmanned Aerial Vehicles
NUAV - A Testbed for Development of Autonomous Unmanned Aerial Vehicles
 
DevOps Demystified
DevOps DemystifiedDevOps Demystified
DevOps Demystified
 
On Research (And Development)
On Research (And Development)On Research (And Development)
On Research (And Development)
 
Simulators as Drivers of Cutting Edge Research
Simulators as Drivers of Cutting Edge ResearchSimulators as Drivers of Cutting Edge Research
Simulators as Drivers of Cutting Edge Research
 
The Knock Knock Protocol
The Knock Knock ProtocolThe Knock Knock Protocol
The Knock Knock Protocol
 
File Transfer Through Sockets
File Transfer Through SocketsFile Transfer Through Sockets
File Transfer Through Sockets
 
Remote Command Execution
Remote Command ExecutionRemote Command Execution
Remote Command Execution
 
Thesis
ThesisThesis
Thesis
 
CMM Level 3 Assessment of Xavor Pakistan
CMM Level 3 Assessment of Xavor PakistanCMM Level 3 Assessment of Xavor Pakistan
CMM Level 3 Assessment of Xavor Pakistan
 
Data Warehousing
Data WarehousingData Warehousing
Data Warehousing
 
Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...
Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...
Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...
 
Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...
Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...
Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...
 
Real-Time Non-Intrusive Speech Quality Estimation for VoIP
Real-Time Non-Intrusive Speech Quality Estimation for VoIPReal-Time Non-Intrusive Speech Quality Estimation for VoIP
Real-Time Non-Intrusive Speech Quality Estimation for VoIP
 
VoIP
VoIPVoIP
VoIP
 
ULMAN GUI Specifications
ULMAN GUI SpecificationsULMAN GUI Specifications
ULMAN GUI Specifications
 
Modeling the Effect of Packet Loss on Speech Quality: Genetic Programming Bas...
Modeling the Effect of Packet Loss on Speech Quality: Genetic Programming Bas...Modeling the Effect of Packet Loss on Speech Quality: Genetic Programming Bas...
Modeling the Effect of Packet Loss on Speech Quality: Genetic Programming Bas...
 
ULMAN-GUI
ULMAN-GUIULMAN-GUI
ULMAN-GUI
 
Modeling the Effect of Packet Loss on Speech Quality: Genetic Programming Bas...
Modeling the Effect of Packet Loss on Speech Quality: Genetic Programming Bas...Modeling the Effect of Packet Loss on Speech Quality: Genetic Programming Bas...
Modeling the Effect of Packet Loss on Speech Quality: Genetic Programming Bas...
 

Recently uploaded

一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
dxobcob
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
SyedAbiiAzazi1
 
Fundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptxFundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptx
manasideore6
 
digital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdfdigital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdf
drwaing
 
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
obonagu
 
sieving analysis and results interpretation
sieving analysis and results interpretationsieving analysis and results interpretation
sieving analysis and results interpretation
ssuser36d3051
 
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.pptPROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
bhadouriyakaku
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
insn4465
 
PPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testingPPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testing
anoopmanoharan2
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
Victor Morales
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
nooriasukmaningtyas
 
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
Mukeshwaran Balu
 
TOP 10 B TECH COLLEGES IN JAIPUR 2024.pptx
TOP 10 B TECH COLLEGES IN JAIPUR 2024.pptxTOP 10 B TECH COLLEGES IN JAIPUR 2024.pptx
TOP 10 B TECH COLLEGES IN JAIPUR 2024.pptx
nikitacareer3
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
ydteq
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
Aditya Rajan Patra
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
SUTEJAS
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
zwunae
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 

Recently uploaded (20)

一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
 
Fundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptxFundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptx
 
digital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdfdigital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdf
 
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
 
sieving analysis and results interpretation
sieving analysis and results interpretationsieving analysis and results interpretation
sieving analysis and results interpretation
 
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.pptPROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
 
PPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testingPPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testing
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
 
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
 
TOP 10 B TECH COLLEGES IN JAIPUR 2024.pptx
TOP 10 B TECH COLLEGES IN JAIPUR 2024.pptxTOP 10 B TECH COLLEGES IN JAIPUR 2024.pptx
TOP 10 B TECH COLLEGES IN JAIPUR 2024.pptx
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 

Introduction To Computer Networks

  • 1. Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS Muhammad Adil Raja Roaming Researchers, Inc. August 25, 2014
  • 2. Introduction to Computer Networks OUTLINE 1 USES OF COMPUTER NETWORKS 2 NETWORK HARDWARE 3 NETWORK SOFTWARE 4 REFERENCE MODELS 5 CONCLUSIONS
  • 3. Introduction to Computer Networks OUTLINE 1 USES OF COMPUTER NETWORKS 2 NETWORK HARDWARE 3 NETWORK SOFTWARE 4 REFERENCE MODELS 5 CONCLUSIONS
  • 4. Introduction to Computer Networks OUTLINE 1 USES OF COMPUTER NETWORKS 2 NETWORK HARDWARE 3 NETWORK SOFTWARE 4 REFERENCE MODELS 5 CONCLUSIONS
  • 5. Introduction to Computer Networks OUTLINE 1 USES OF COMPUTER NETWORKS 2 NETWORK HARDWARE 3 NETWORK SOFTWARE 4 REFERENCE MODELS 5 CONCLUSIONS
  • 6. Introduction to Computer Networks OUTLINE 1 USES OF COMPUTER NETWORKS 2 NETWORK HARDWARE 3 NETWORK SOFTWARE 4 REFERENCE MODELS 5 CONCLUSIONS
  • 7. Introduction to Computer Networks Uses of Computer Networks USES OF COMPUTER NETWORKS I Business Applications. Resource Sharing. VPNs (Virtual Private Networks). Client-Server Model, Web Application. Communication Medium Between Employees. IP Telephony. Voice over IP (VoIP). Desktop Sharing. E-Commerce (Electronic Commerce). Home Applications. Internet access provides home users with connectivity to remote computers. Personalized information. Peer-to-peer Communication.
  • 8. Introduction to Computer Networks Uses of Computer Networks USES OF COMPUTER NETWORKS II Instant Messaging. Twitter. Social Networks. Facebook Collaborative Websites – Wikis, Wikipedia. IPTV (IP Television). Ubiquitous Computing. Power-line Networks. RFID (Radio Frequency IDentification). Mobile Users. Connectivity. Wireless Hotspots. Fixed Wireless and Mobile Wireless. Text Messaging. Texting. Short Message Service.
  • 9. Introduction to Computer Networks Uses of Computer Networks USES OF COMPUTER NETWORKS III Smart Phones. GPS (Global Positioning System). m-commerce (mobile-commerce). NFC (Near Field Communication). Sensor Networks. Wearable computers. Social Issues. Profiling users. Cookies. Gmail is read by Google. Spam. Content intended for criminal behavior. Phishing. USe of CAPTCHAs.
  • 10. Introduction to Computer Networks Network Hardware NETWORK HARDWARE I PANs (Personal Area Networks). Bluetooth. LANs (Local Area Networks). When LANs are used by companies, they are called enterprise networks. Access Point (Wireless Routers). Base Station. Wireless LANs – IEEE 802.11/ WiFi. Wired LANs – IEEE 802.3/ Ethernet. Switched Ethernet. VLANs. Classic Ethernet. Power-line Networks. Metropolitan Area Network (MAN) – covers a city. IEEE 802.16 – WiMAX.
  • 11. Introduction to Computer Networks Network Hardware NETWORK HARDWARE II Wide Area Networks (Wide Area Networks). A WAN covers a country or a continent. Subnet – carries messages from host to host. Transmission Lines – copper, optical, radio. Switching Elements – connect two or more transmission lines. Routers. Internetworks. VPN (Virtual Private Networks. Routing Algorithms. Forwarding algorithms. Internetwork. Internetwork or internet – a collection of interconnected networks. Gateway – a machine that connects two or more networks.
  • 12. Introduction to Computer Networks Network Software NETWORK SOFTWARE I Protocol Hierarchies Layered architectures. Protocol – A set of rules for communication between machines. Peers in hierarchies. Network architecture – A set of layers and protocols. Protocl Stack – A list of protocols used by a certain system, one protocol per layer. Design Issues for the Layers. Error correction. Routing. Protocol layering. Internetworking. Scalability. Statistical multiplexing.
  • 13. Introduction to Computer Networks Network Software NETWORK SOFTWARE II Flow Control. Congestion. Real-time Services. Quality of Service. Confidentiality Authentication. Integrity. Connection-Oriented Versus Connectionless Service.
  • 14. Introduction to Computer Networks Reference Models REFERENCE MODELS I The OSI Reference Model. OSI (Open Systems Interconnection). OSI model. The TCP/IP Reference Model.
  • 15. Introduction to Computer Networks Reference Models REFERENCE MODELS II 4 REFERENCE MODELS Layer k Layer k + 1 Layer k - 1 Protocol Service provided by layer k Layer k Layer k + 1 Layer k - 1 Figure 1-19. The relationship between a service and a protocol. EFERENCE MODELS FIGURE: The relationship between a service and a protocol.
  • 16. Introduction to Computer Networks Reference Models THE OSI REFERENCE MODEL I A Seven Layered Architecture. 1 Application. 2 Presentation – Concerned With the syntax and semantics of the information transmitted. 3 Session – Dialog control, token management, synchronization. 4 Transport. 5 Network. 6 Datalink Layer. 7 Physical Layer. The Application Layer. HTTP (HyperText Transfer Protocol). FTP (File Transfer Protocol).
  • 17. Introduction to Computer Networks Reference Models THE OSI REFERENCE MODEL II Transport Layer. Accept data from the layer above it. Split it up into smaller units if need be. Pass these to the network layer. Ensure that the pieces all arrive correctly at the other end. The Network Layer. Controls the operation of the network. Determine how packets are routed from the source to the destination. The Data Link Layer The main task of the data lik layer is to transform a raw transmission facility into a line that appears free of undetected transmission errors. It masks the real errors so that the network layer cannot see them.
  • 18. Introduction to Computer Networks Reference Models THE OSI REFERENCE MODEL III Accomplishes this task by having the sender break the input data into data frames. If the service is reliable, the receiver confirms correct receipt of each frame by sending back an acknowledgement frame. How to control access to the shared channel? The medium access control sublayer. The Physical Layer Concerned with transmitting raw bits over a communication channel. The design issues: To receive a 1 as a 1 and a 0 as a 0. Lifetime of bits (nanoseconds). Can simultaneous transmission happen in both directions? How to establish the initial connection. How to tear it down when both sides are finished? How many pins the network connector has?
  • 19. Introduction to Computer Networks Reference Models THE OSI REFERENCE MODEL IV What is each pin used for? These design issues largely deal with mechanical, electrical and timing interfaces. It also deals with the physical transmission medium, which lies below the physical layer.
  • 20. Introduction to Computer Networks Reference Models THE OSI REFERENCE MODEL V42 INTRODUCTION CHAP. 1 Layer Presentation Application Session Transport Network Data link Physical 7 6 5 4 3 2 1 Interface Host A Name of unit exchanged APDU PPDU SPDU TPDU Packet Frame Bit Presentation Application Session Transport Network Data link Physical Host B Network Network Data link Data link Physical Physical Router Router Internal subnet protocol Application protocol Presentation protocol Transport protocol Session protocol Communication subnet boundary Network layer host-router protocol Data link layer host-router protocol Physical layer host-router protocol Figure 1-20. The OSI reference model. 4. The layer boundaries should be chosen to minimize the information FIGURE: The OSI reference model.
  • 21. Introduction to Computer Networks Reference Models THE TCP/IP REFERENCE MODEL I 1 The Application Layer (HTTP/FTP/TELNET etc.) 2 The Transport Layer (TCP/UDP). 3 The Internet Layer (IP). 4 The Link Layer.
  • 22. Introduction to Computer Networks Reference Models THE TCP/IP REFERENCE MODEL II It is shown in Fig. 1-21 as corresponding roughly to the OSI network layer. Its job is to permit hosts to inject packets into any network and have them travel in- dependently to the destination (potentially on a different network). They may even arrive in a completely different order than they were sent, in which case it is the job of higher layers to rearrange them, if in-order delivery is desired. Note that ‘‘internet’’ is used here in a generic sense, even though this layer is present in the Internet. TCP/IPOSI Application Presentation Session Transport Network Data link Physical 7 6 5 4 3 2 1 Application Transport Internet Link Not present in the model Figure 1-21. The TCP/IP reference model. The analogy here is with the (snail) mail system. A person can drop a se- quence of international letters into a mailbox in one country, and with a little luck, FIGURE: The TCP/IP reference model.
  • 23. Introduction to Computer Networks Reference Models THE TCP/IP REFERENCE MODEL III 48 INTRODUCTION CHAP. 1 Link Ethernet802.11SONETDSL IP ICMP HTTP RTPSMTP DNS TCP UDP Internet Transport Layers Protocols Application Figure 1-22. The TCP/IP model with some protocols we will study. include the Domain Name System (DNS), for mapping host names onto their net- work addresses, HTTP, the protocol for fetching pages on the World Wide Web, and RTP, the protocol for delivering real-time media such as voice or movies. FIGURE: The TCP/IP model with some protocols we will study.
  • 24. Introduction to Computer Networks Reference Models THE TCP/IP REFERENCE MODEL IV ig. 1-23 as the framewo 5 Application 4 Transport 3 Network 2 Link
  • 25. Introduction to Computer Networks Conclusions CONCLUSIONS The figures have been taken from, Computer Networks, Andrew S. Tanenbaum, 5th Edition.