SlideShare a Scribd company logo
Introduction
Overview:
• what’s the Internet?
• what’s a protocol?
• network edge; hosts, access net,
physical media
• network core: packet/circuit
switching, Internet structure
• performance: loss, delay, throughput
• security
• protocol layers, service models
• history
1-1
1.1 What is the Internet?
1.2 Network edge
 end systems, access networks, links
1.3 Network core
 circuit switching, packet switching, network structure
1.4 Delay, loss and throughput in packet-switched
networks
1.5 Protocol layers, service models
1.6 Networks under attack: security
1.7 History
1-2
What’s the Internet: “nuts and bolts” view
• millions of connected
computing devices: hosts
= end systems
– running network apps
1-3
Home network
Institutional network
Mobile network
Global ISP
Regional ISP
router
PC
server
wireless
laptop
cellular
handheld
wired
links
access
points
 communication links
 fiber, copper, radio,
satellite
 transmission rate =
bandwidth
 routers: forward packets
(chunks of data)
What’s the Internet: “nuts and bolts” view
• protocols control sending,
receiving of msgs
– e.g., TCP, IP, HTTP, Skype,
Ethernet
• Internet: “network of
networks”
– loosely hierarchical
– public Internet versus private
intranet
• Internet standards
– RFC: Request for comments
– IETF: Internet Engineering Task
Force
1-4
Home network
Institutional network
Mobile network
Global ISP
Regional ISP
What’s the Internet: a service view
• communication infrastructure
enables distributed applications:
– Web, VoIP, email, games, e-
commerce, file sharing
• communication services
provided to apps:
– reliable data delivery from
source to destination
– “best effort” (unreliable) data
delivery
1-5
What’s a protocol?
human protocols:
• “what’s the time?”
• “I have a question”
• introductions
… specific msgs sent
… specific actions taken
when msgs received, or
other events
network protocols:
• machines rather than
humans
• all communication activity
in Internet governed by
protocols
1-6
protocols define format, order of
msgs sent and received among
network entities, and actions
taken on msg transmission,
receipt
What’s a protocol?
a human protocol and a computer network protocol:
1-7
Hi
Hi
Got the
time?
2:00
TCP connection
request
TCP connection
response
Get http://www.awl.com/kurose-ross
<file>
time
1.1 What is the Internet?
1.2 Network edge
 end systems, access networks, links
1.3 Network core
 circuit switching, packet switching, network structure
1.4 Delay, loss and throughput in packet-switched
networks
1.5 Protocol layers, service models
1.6 Networks under attack: security
1.7 History
1-8
A closer look at network structure:
• network edge:
applications and hosts
1-9
 access networks,
physical media: wired,
wireless
communication links
 network core:
 interconnected routers
 network of networks
The network edge:
• end systems (hosts):
– run application programs
– e.g. Web, email
– at “edge of network”
1-10
client/server
peer-peer
 client/server model
 client host requests, receives service
from always-on server
 e.g. Web browser/server; email
client/server
 peer-peer model:
 minimal (or no) use of dedicated
servers
 e.g. Skype, BitTorrent
telephone
network Internet
home
dial-up
modem
ISP
modem
(e.g., AOL)
home
PC
central
office
 Uses existing telephony infrastructure
 Home is connected to central office
 up to 56Kbps direct access to router (often less)
 Can’t surf and phone at same time: not “always on”
Dial-up Modem
telephone
network
DSL
modem
home
PC
home
phone
Internet
DSLAM
Existing phone line:
0-4KHz phone; 4-50KHz
upstream data; 50KHz-1MHz
downstream data
splitter
central
office
Digital Subscriber Line (DSL)
 Also uses existing telephone infrastruture
Cable Network Architecture: Overview
1-13
home
cable headend
cable distribution
network (simplified)
Typically 500 to 5,000 homes
Cable Network Architecture: Overview
1-14
home
cable headend
cable distribution
network
server(s)
Cable Network Architecture: Overview
1-15
home
cable headend
cable distribution
network (simplified)
Wireless access networks
• shared wireless access network
connects end system to router
– via base station aka “access point”
• wireless LANs:
– 802.11b/g (WiFi): 11 or 54 Mbps
• wider-area wireless access
– provided by telco operator
– ~2Mbps over cellular system (EVDO,
UMTS, HSPA)
– Next 4G: WiMAX (10’s Mbps) and
LTE over wide area
1-16
base
station
mobile
hosts
router
Home networks
Typical home network components:
• DSL or cable modem
• router/firewall/NAT
• Ethernet
• wireless access
point
1-17
wireless
access
point
wireless
laptops
router/
firewall
cable
modem
to/from
cable
headend
Ethernet
Physical Media
• Bit: propagates between
transmitter/rcvr pairs
• physical link: what lies
between transmitter & receiver
• guided media:
– signals propagate in solid media:
copper, fiber, coax
• unguided media:
– signals propagate freely, e.g.,
radio
Twisted Pair (TP)
• two insulated copper wires
– Category 3: traditional
phone wires, 10 Mbps
Ethernet
– Category 5:
100Mbps Ethernet
1-18
Physical Media: coax, fiber
Coaxial cable:
• two concentric copper
conductors
• bidirectional
• baseband:
– single channel on cable
– legacy Ethernet
• broadband:
– multiple channels on cable
– HFC
1-19
Fiber optic cable:
 glass fiber carrying light
pulses, each pulse a bit
 high-speed operation:
 high-speed point-to-point
transmission (e.g., 10’s-100’s
Gps)
 low error rate: repeaters
spaced far apart ; immune to
electromagnetic noise
Physical media: radio
• signal carried in
electromagnetic spectrum
• no physical “wire”
• bidirectional
• propagation environment
effects:
– reflection
– obstruction by objects
– interference
1-20
Radio link types:
 terrestrial microwave
 e.g. up to 45 Mbps channels
 LAN (e.g., Wifi)
 11Mbps, 54 Mbps, 300 Mbps
 wide-area (e.g., cellular)
 3G cellular: ~ 1 Mbps
 4G cellular: ~ 21 Mbps
 satellite
 Kbps to 45Mbps channel (or
multiple smaller channels)
 270 msec end-end delay
 geosynchronous versus low
altitude
1.1 What is the Internet?
1.2 Network edge
 end systems, access networks, links
1.3 Network core
 circuit switching, packet switching, network structure
1.4 Delay, loss and throughput in packet-switched
networks
1.5 Protocol layers, service models
1.6 Networks under attack: security
1.7 History
1-21
The Network Core
• mesh of interconnected
routers
• the fundamental question:
how is data transferred
through net?
– circuit switching:
dedicated circuit per call:
telephone net
– packet-switching: data
sent thru net in discrete
“chunks”
1-22
Network Core: Circuit Switching
End-end resources
reserved for “call”
• link bandwidth, switch
capacity
• dedicated resources: no
sharing
• circuit-like (guaranteed)
performance
• call setup required
1-23
Network Core: Circuit Switching
network resources (e.g.,
bandwidth) divided into
“pieces”
• pieces allocated to calls
• resource piece idle if not
used by owning call (no
sharing)
1-24
 dividing link bandwidth into
“pieces”
 frequency division
 time division
Circuit Switching: FDM and TDM
1-25
FDM
frequency
time
TDM
frequency
time
4 users
Example:
Network Core: Packet Switching
each end-end data stream divided
into packets
• user A, B packets share
network resources
• each packet uses full link
bandwidth
• resources used as needed
1-26
resource contention:
 aggregate resource demand
can exceed amount
available
 congestion: packets queue,
wait for link use
 store and forward: packets
move one hop at a time
 Node receives complete packet
before forwardingBandwidth division into “pieces”
Dedicated allocation
Resource reservation
Packet Switching: Statistical Multiplexing
Sequence of A & B packets does not have fixed pattern, bandwidth
shared on demand statistical multiplexing.
TDM: each host gets same slot in revolving TDM frame.
1-27
A
B
C
100 Mb/s
Ethernet
1.5 Mb/s
D E
statistical multiplexing
queue of packets
waiting for output
link
Packet-switching: store-and-forward
• takes L/R seconds to
transmit (push out) packet
of L bits on to link at R bps
• store and forward: entire
packet must arrive at
router before it can be
transmitted on next link
• delay = 3L/R (assuming
zero propagation delay)
Example:
• L = 7.5 Mbits
• R = 1.5 Mbps
• transmission delay = 15
sec
1-28
R R R
L
Internet structure: network of networks
• roughly hierarchical
• at center: “tier-1” ISPs (e.g., Verizon, Sprint, AT&T, Cable and
Wireless), national/international coverage
– treat each other as equals
1-29
Tier 1 ISP
Tier 1 ISP
Tier 1 ISP
Tier-1
providers
interconnect
(peer)
privately
Internet structure: network of networks
• “Tier-2” ISPs: smaller (often regional) ISPs
– Connect to one or more tier-1 ISPs, possibly other tier-2 ISPs
1-30
Tier 1 ISP
Tier 1 ISP
Tier 1 ISP
Tier-2 ISPTier-2 ISP
Tier-2 ISP Tier-2 ISP
Tier-2 ISP
Tier-2 ISP pays
tier-1 ISP for
connectivity to rest
of Internet
 tier-2 ISP is
customer of
tier-1 provider
Tier-2 ISPs also
peer privately
with each other.
Internet structure: network of networks
• “Tier-3” ISPs and local ISPs
– last hop (“access”) network (closest to end systems)
1-31
Tier 1 ISP
Tier 1 ISP
Tier 1 ISP
Tier-2 ISPTier-2 ISP
Tier-2 ISP Tier-2 ISP
Tier-2 ISP
local
ISP
local
ISP
local
ISP
local
ISP
local
ISP Tier 3
ISP
local
ISP
local
ISP
local
ISP
Local and tier- 3
ISPs are
customers of
higher tier ISPs
connecting them
to rest of Internet
Internet structure: network of networks
• a packet passes through many networks!
1-32
Tier 1 ISP
Tier 1 ISP
Tier 1 ISP
Tier-2 ISPTier-2 ISP
Tier-2 ISP Tier-2 ISP
Tier-2 ISP
local
ISP
local
ISP
local
ISP
local
ISP
local
ISP Tier 3
ISP
local
ISP
local
ISP
local
ISP
1.1 What is the Internet?
1.2 Network edge
 end systems, access networks, links
1.3 Network core
 circuit switching, packet switching, network structure
1.4 Delay, loss and throughput in packet-switched
networks
1.5 Protocol layers, service models
1.6 Networks under attack: security
1.7 History
1-33
How do loss and delay occur?
packets queue in router buffers
• packet arrival rate to link exceeds output link capacity
• packets queue, wait for turn
1-34
A
B
packet being transmitted (delay)
packets queueing (delay)
free (available) buffers: arriving packets
dropped (loss) if no free buffers
Four sources of packet delay
• 1. nodal processing:
– check bit errors
– determine output link
1-35
A
B
propagation
transmission
nodal
processing queueing
 2. queueing
 time waiting at output link
for transmission
 depends on congestion level
of router
Delay in packet-switched networks
3. Transmission delay:
• R=link bandwidth (bps)
• L=packet length (bits)
• time to send bits into link
= L/R
4. Propagation delay:
• d = length of physical link
• s = propagation speed in
medium (~2x108
m/sec)
• propagation delay = d/s
1-36
A
B
propagation
transmission
nodal
processing queueing
Note: s and R are very
different quantities!
Nodal delay
• dproc = processing delay
– typically a few microsecs or less
• dqueue = queuing delay
– depends on congestion
• dtrans = transmission delay
– = L/R, significant for low-speed links
• dprop = propagation delay
– a few microsecs to hundreds of msecs
1-37
proptransqueueprocnodal ddddd +++=
Queueing delay (revisited)
• R=link bandwidth (bps)
• L=packet length (bits)
• a=average packet arrival
rate
1-38
traffic intensity = La/R
 La/R ~ 0: average queueing delay small
 La/R -> 1: delays become large
 La/R > 1: more “work” arriving than can be
serviced, average delay infinite!
Packet loss
• queue (buffer) preceding link in buffer has
finite capacity
• packet arriving to full queue dropped (lost)
• lost packet may be retransmitted by previous
node, by source end system, or not at all
1-39
A
B
packet being transmitted
packet arriving to
full buffer is lost
buffer
(waiting area)
Throughput
• throughput: rate (bits/time unit) at which
bits transferred between sender/receiver
– instantaneous: rate at given point in time
– average: rate over longer period of time
1-40
server, with
file of F bits
to send to client
link capacity
Rs bits/sec
link capacity
Rc bits/sec
pipe that can carry
fluid at rate
Rs bits/sec)
pipe that can carry
fluid at rate
Rc bits/sec)
server sends bits
(fluid) into pipe
1.1 What is the Internet?
1.2 Network edge
 end systems, access networks, links
1.3 Network core
 circuit switching, packet switching, network structure
1.4 Delay, loss and throughput in packet-switched
networks
1.5 Protocol layers, service models
1.6 Networks under attack: security
1.7 History
1-41
Protocol “Layers”
Networks are complex!
• many “pieces”:
– hosts
– routers
– links of various
media
– applications
– protocols
– hardware, software
Question:
Is there any hope of
organizing structure of
network?
Or at least our discussion of
networks?
1-42
Organization of air travel
• a series of steps
1-43
ticket (purchase)
baggage (check)
gates (load)
runway takeoff
airplane routing
ticket (complain)
baggage (claim)
gates (unload)
runway landing
airplane routing
airplane routing
Layering of airline functionality
Layers: each layer implements a service
– via its own internal-layer actions
– relying on services provided by layer below
1-44
ticket (purchase)
baggage (check)
gates (load)
runway (takeoff)
airplane routing
departure
airport
arrival
airport
intermediate air-traffic
control centers
airplane routing airplane routing
ticket (complain)
baggage (claim
gates (unload)
runway (land)
airplane routing
ticket
baggage
gate
takeoff/landing
airplane routing
Why layering?
Dealing with complex systems:
• explicit structure allows identification, relationship of
complex system’s pieces
– layered reference model for discussion
• modularization eases maintenance, updating of system
– change of implementation of layer’s service
transparent to rest of system
– e.g., change in gate procedure doesn’t affect
rest of system
1-45
Internet protocol stack
• application: supporting network
applications
– FTP, SMTP, HTTP
• transport: process-process data transfer
– TCP, UDP
• network: routing of datagrams from
source to destination
– IP, routing protocols
• link: data transfer between neighboring
network elements
– PPP, Ethernet
• physical: bits “on the wire”
1-46
application
transport
network
link
physical
ISO/OSI reference model
• presentation: allow applications to
interpret meaning of data, e.g.,
encryption, compression, machine-
specific conventions
• session: synchronization, checkpointing,
recovery of data exchange
1-47
application
presentation
session
transport
network
link
physical
Encapsulation
1-48
source
application
transport
network
link
physical
HtHn M
segment Ht
datagram
destination
application
transport
network
link
physical
HtHnHl M
HtHn M
Ht M
M
network
link
physical
link
physical
HtHnHl M
HtHn M
HtHn M
HtHnHl M
router
switch
message M
Ht M
Hn
frame
1.1 What is the Internet?
1.2 Network edge
 end systems, access networks, links
1.3 Network core
 circuit switching, packet switching, network structure
1.4 Delay, loss and throughput in packet-switched
networks
1.5 Protocol layers, service models
1.6 Networks under attack: security
1.7 History
1-49
Network Security
• The field of network security is about:
– how bad guys can attack computer networks
– how we can defend networks against attacks
– how to design architectures that are immune to
attacks
1-50
Malware into hosts via Internet
• Malware can get in host from a virus, worm, or trojan
horse.
• Spyware malware can record keystrokes, web sites visited,
upload info to collection site.
• Infected host can be enrolled in a botnet, used for spam
and DDoS attacks.
• Malware is often self-replicating: from an infected host,
seeks entry into other hosts
1-51
Malware into hosts via Internet
• Trojan horse
– Hidden part of some
otherwise useful software
– Today often on a Web page
(Active-X, plugin)
• Virus
– infection by receiving object
(e.g., e-mail attachment),
actively executing
– self-replicating: propagate
itself to other hosts, users
1-52
 Worm:
 infection by passively receiving
object that gets itself executed
 self- replicating: propagates to
other hosts, users
Sapphire Worm: aggregate scans/sec
in first 5 minutes of outbreak (CAIDA, UWisc data)
Attack on servers and network infrastructure
• Denial of service (DoS): attackers make resources (server,
bandwidth) unavailable to legitimate traffic by overwhelming
resource with bogus traffic
1-53
1. select target
2. break into hosts around
the network (see botnet)
3. send packets toward target
from compromised hosts target
Packet sniffing
– broadcast media (shared Ethernet, wireless)
– promiscuous network interface reads/records all
packets (e.g., including passwords!) passing by
1-54
A
B
C
src:B dest:A payload
 Wireshark software used for end-of-chapter labs is a
(free) packet-sniffer
False source addresses
• IP spoofing: send packet with false source address
1-55
A
B
C
src:B dest:A payload
1.1 What is the Internet?
1.2 Network edge
 end systems, access networks, links
1.3 Network core
 circuit switching, packet switching, network structure
1.4 Delay, loss and throughput in packet-switched
networks
1.5 Protocol layers, service models
1.6 Networks under attack: security
1.7 History
1-56
Internet History
• 1961: Kleinrock - queueing
theory shows effectiveness of
packet-switching
• 1964: Baran - packet-
switching in military nets
• 1967: ARPAnet conceived by
Advanced Research Projects
Agency
• 1969: first ARPAnet node
operational
• 1972:
– ARPAnet public demonstration
– NCP (Network Control Protocol) first
host-host protocol
– first e-mail program
– ARPAnet has 15 nodes
1-57
1961-1972: Early packet-switching principles
Internet History
• 1970: ALOHAnet satellite network
in Hawaii
• 1974: Cerf and Kahn - architecture
for interconnecting networks
• 1976: Ethernet at Xerox PARC
• ate70’s: proprietary architectures:
DECnet, SNA, XNA
• late 70’s: switching fixed length
packets (ATM precursor)
• 1979: ARPAnet has 200 nodes
Cerf and Kahn’s internetworking
principles:
– minimalism, autonomy - no
internal changes required to
interconnect networks
– best effort service model
– stateless routers
– decentralized control
define today’s Internet architecture
1-58
1972-1980: Internetworking, new and proprietary nets
Internet History
• 1983: deployment of
TCP/IP
• 1982: smtp e-mail
protocol defined
• 1983: DNS defined for
name-to-IP-address
translation
• 1985: ftp protocol defined
• 1988: TCP congestion
control
• new national networks:
Csnet, BITnet, NSFnet,
Minitel
• 100,000 hosts connected
to confederation of
networks
1-59
1980-1990: new protocols, a proliferation of networks
Internet History
• Early 1990’s: ARPAnet
decommissioned
• 1991: NSF lifts restrictions on
commercial use of NSFnet
(decommissioned, 1995)
• early 1990s: Web
– hypertext [Bush 1945, Nelson
1960’s]
– HTML, HTTP: Berners-Lee
– 1994: Mosaic, later Netscape
– late 1990’s: commercialization of
the Web
Late 1990’s – 2000’s:
• more killer apps: instant
messaging, P2P file sharing
• network security to forefront
• est. 50 million host, 100 million+
users
• backbone links running at Gbps
1-60
1990, 2000’s: commercialization, the Web, new apps
Internet History
2007 – till
• ~500 million hosts
• Voice, Video over IP
• P2P applications: BitTorrent (file
sharing) Skype (VoIP), PPLive
(video)
• more applications: YouTube,
gaming
• wireless, mobility
1-61

More Related Content

What's hot

Computer network
Computer networkComputer network
Computer network
NainaKhan28
 
Network Components
Network ComponentsNetwork Components
Network Components
Ifrad Mahbub
 
Data communication MIS
Data communication MISData communication MIS
Data communication MIS
Jerome Aljibe
 
Communications
CommunicationsCommunications
Communications
Rana Usman Sattar
 
Computer Networks for Computer Science Student
Computer Networks for Computer Science StudentComputer Networks for Computer Science Student
Computer Networks for Computer Science Student
rprajat007
 
Computer Network - Unit 1
Computer Network - Unit 1Computer Network - Unit 1
Computer Network - Unit 1
Chandan Gupta Bhagat
 
Data Communication & Network
Data Communication & NetworkData Communication & Network
Data Communication & Network
Maulen Bale
 
Data communication
Data communicationData communication
Data communication
Abdul Rehman
 
data communication
data communicationdata communication
data communication
Rajat Singla
 
Data communications-concepts
Data communications-conceptsData communications-concepts
Data communications-concepts
WBUTTUTORIALS
 
DATA COMMUNICATION PPT
DATA COMMUNICATION PPTDATA COMMUNICATION PPT
DATA COMMUNICATION PPT
Majane Padua
 
Data communication
Data communicationData communication
Unit2.2
Unit2.2Unit2.2
Data Communication & computer network: Channel types
Data Communication & computer network: Channel types Data Communication & computer network: Channel types
Data Communication & computer network: Channel types
Dr Rajiv Srivastava
 
Ch 1 network
Ch 1  networkCh 1  network
Ch 1 network
MohamedAbdELhamed35
 
Data communication basics
Data communication basicsData communication basics
Data communication basics
Naveen Jakhar, I.T.S
 
Dc lec-02 (networks)
Dc lec-02 (networks)Dc lec-02 (networks)
Dc lec-02 (networks)
diaryinc
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networking
Priya Manik
 
Topic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer networkTopic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer network
Atika Zaimi
 
Introduction to Data Communication
Introduction to Data CommunicationIntroduction to Data Communication
Introduction to Data Communication
Kamal Acharya
 

What's hot (20)

Computer network
Computer networkComputer network
Computer network
 
Network Components
Network ComponentsNetwork Components
Network Components
 
Data communication MIS
Data communication MISData communication MIS
Data communication MIS
 
Communications
CommunicationsCommunications
Communications
 
Computer Networks for Computer Science Student
Computer Networks for Computer Science StudentComputer Networks for Computer Science Student
Computer Networks for Computer Science Student
 
Computer Network - Unit 1
Computer Network - Unit 1Computer Network - Unit 1
Computer Network - Unit 1
 
Data Communication & Network
Data Communication & NetworkData Communication & Network
Data Communication & Network
 
Data communication
Data communicationData communication
Data communication
 
data communication
data communicationdata communication
data communication
 
Data communications-concepts
Data communications-conceptsData communications-concepts
Data communications-concepts
 
DATA COMMUNICATION PPT
DATA COMMUNICATION PPTDATA COMMUNICATION PPT
DATA COMMUNICATION PPT
 
Data communication
Data communicationData communication
Data communication
 
Unit2.2
Unit2.2Unit2.2
Unit2.2
 
Data Communication & computer network: Channel types
Data Communication & computer network: Channel types Data Communication & computer network: Channel types
Data Communication & computer network: Channel types
 
Ch 1 network
Ch 1  networkCh 1  network
Ch 1 network
 
Data communication basics
Data communication basicsData communication basics
Data communication basics
 
Dc lec-02 (networks)
Dc lec-02 (networks)Dc lec-02 (networks)
Dc lec-02 (networks)
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networking
 
Topic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer networkTopic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer network
 
Introduction to Data Communication
Introduction to Data CommunicationIntroduction to Data Communication
Introduction to Data Communication
 

Viewers also liked

Sept 2017 static routing and packet forwarding
Sept 2017    static routing and packet forwardingSept 2017    static routing and packet forwarding
Sept 2017 static routing and packet forwarding
shahin raj
 
Sept 2017 network standards and models
Sept 2017   network standards and modelsSept 2017   network standards and models
Sept 2017 network standards and models
shahin raj
 
Sept 2017 technology management
Sept 2017  technology managementSept 2017  technology management
Sept 2017 technology management
shahin raj
 
3 Tier Animation
3 Tier Animation3 Tier Animation
3 Tier Animation
Chris Jobling
 
Internet dan ISP
Internet dan ISPInternet dan ISP
Internet dan ISProsmida
 
Network delay
Network delayNetwork delay
Network delay
Sushma Singh
 
Chap 03
Chap 03Chap 03
Chap 03
IGNOU
 
ISP di malaysia(internet service provider)
ISP di malaysia(internet service provider)ISP di malaysia(internet service provider)
ISP di malaysia(internet service provider)Mohamad Arif
 
Network Tier Architecture
Network Tier ArchitectureNetwork Tier Architecture
Network Tier Architecture
VR Talsaniya
 
Isp, the things to know.
Isp, the things to know.Isp, the things to know.
Isp, the things to know.
Norberth Peter Paul™
 
Chap 01
Chap 01Chap 01
Chap 01
IGNOU
 
NWU Wireless
NWU WirelessNWU Wireless
NWU Wireless
Wilhelm van Belkum
 
Chap 04
Chap 04Chap 04
Chap 04
IGNOU
 
Modeling Style and Delay Model of VHDL By Ap
Modeling Style and Delay Model of VHDL By ApModeling Style and Delay Model of VHDL By Ap
Modeling Style and Delay Model of VHDL By Ap
Er. Ashish Pandey
 
Chap 02
Chap 02Chap 02
Chap 02
IGNOU
 
Josetnis rodriguez electiva i.pptx
Josetnis rodriguez electiva i.pptxJosetnis rodriguez electiva i.pptx
Josetnis rodriguez electiva i.pptx
Josetnis Del Valle Rodriguez Rodriguez
 
Chap 14 rip, ospf
Chap 14 rip, ospfChap 14 rip, ospf
Chap 14 rip, ospf
Noctorous Jamal
 
Albert Eckhout (1610 1666)
Albert Eckhout (1610 1666)Albert Eckhout (1610 1666)
Albert Eckhout (1610 1666)
Mauricio Trindade
 
Sept 2017 boot process
Sept 2017   boot processSept 2017   boot process
Sept 2017 boot process
shahin raj
 
Chap 17 dns
Chap 17 dnsChap 17 dns
Chap 17 dns
Noctorous Jamal
 

Viewers also liked (20)

Sept 2017 static routing and packet forwarding
Sept 2017    static routing and packet forwardingSept 2017    static routing and packet forwarding
Sept 2017 static routing and packet forwarding
 
Sept 2017 network standards and models
Sept 2017   network standards and modelsSept 2017   network standards and models
Sept 2017 network standards and models
 
Sept 2017 technology management
Sept 2017  technology managementSept 2017  technology management
Sept 2017 technology management
 
3 Tier Animation
3 Tier Animation3 Tier Animation
3 Tier Animation
 
Internet dan ISP
Internet dan ISPInternet dan ISP
Internet dan ISP
 
Network delay
Network delayNetwork delay
Network delay
 
Chap 03
Chap 03Chap 03
Chap 03
 
ISP di malaysia(internet service provider)
ISP di malaysia(internet service provider)ISP di malaysia(internet service provider)
ISP di malaysia(internet service provider)
 
Network Tier Architecture
Network Tier ArchitectureNetwork Tier Architecture
Network Tier Architecture
 
Isp, the things to know.
Isp, the things to know.Isp, the things to know.
Isp, the things to know.
 
Chap 01
Chap 01Chap 01
Chap 01
 
NWU Wireless
NWU WirelessNWU Wireless
NWU Wireless
 
Chap 04
Chap 04Chap 04
Chap 04
 
Modeling Style and Delay Model of VHDL By Ap
Modeling Style and Delay Model of VHDL By ApModeling Style and Delay Model of VHDL By Ap
Modeling Style and Delay Model of VHDL By Ap
 
Chap 02
Chap 02Chap 02
Chap 02
 
Josetnis rodriguez electiva i.pptx
Josetnis rodriguez electiva i.pptxJosetnis rodriguez electiva i.pptx
Josetnis rodriguez electiva i.pptx
 
Chap 14 rip, ospf
Chap 14 rip, ospfChap 14 rip, ospf
Chap 14 rip, ospf
 
Albert Eckhout (1610 1666)
Albert Eckhout (1610 1666)Albert Eckhout (1610 1666)
Albert Eckhout (1610 1666)
 
Sept 2017 boot process
Sept 2017   boot processSept 2017   boot process
Sept 2017 boot process
 
Chap 17 dns
Chap 17 dnsChap 17 dns
Chap 17 dns
 

Similar to Sept 2017 introduction

ComputerNetwork_Introductions_C1_en.pptx
ComputerNetwork_Introductions_C1_en.pptxComputerNetwork_Introductions_C1_en.pptx
ComputerNetwork_Introductions_C1_en.pptx
huypmg22git
 
1st Talk
1st Talk1st Talk
1st Talk
Aniruddha Das
 
Lecture No. 1.ppt
Lecture No. 1.pptLecture No. 1.ppt
Lecture No. 1.ppt
MuhammadRizwanHaider2
 
Chapter1 introduction
Chapter1 introductionChapter1 introduction
Chapter1 introduction
Khánh Ghẻ
 
Computer Networks and Internet.ppt of co
Computer Networks and Internet.ppt of coComputer Networks and Internet.ppt of co
Computer Networks and Internet.ppt of co
itxminahil29
 
Chapter_1_.pptx
Chapter_1_.pptxChapter_1_.pptx
Chapter_1_.pptx
javairiaimran1
 
Network th ITM3
Network th ITM3Network th ITM3
Network th ITM3
Aram Mohammed
 
Chapter1
Chapter1Chapter1
Chapter1
guest0af0cf
 
Chapter 1 - Computer Networking a top-down Approach 7th
Chapter 1 - Computer Networking a top-down Approach 7thChapter 1 - Computer Networking a top-down Approach 7th
Chapter 1 - Computer Networking a top-down Approach 7th
Andy Juan Sarango Veliz
 
Lec-01 Introduction Computer Networks...
Lec-01 Introduction Computer Networks...Lec-01 Introduction Computer Networks...
Lec-01 Introduction Computer Networks...
bismahmalik22
 
Ch1 internet Networks
Ch1 internet NetworksCh1 internet Networks
Ch1 internet Networks
cairo university
 
Network chapter 1 ENCS2330 Birzeit_university
Network chapter 1 ENCS2330 Birzeit_universityNetwork chapter 1 ENCS2330 Birzeit_university
Network chapter 1 ENCS2330 Birzeit_university
OmarQalalwehAbuSamra
 
3rd edition chapter1
3rd edition chapter13rd edition chapter1
3rd edition chapter1
nguyễn cầm
 
Module1.ppt
Module1.pptModule1.ppt
Module1.ppt
Steven271868
 
Lec 2 and_3
Lec 2 and_3Lec 2 and_3
Lec 2 and_3
hz3012
 
1 introduction
1 introduction1 introduction
1 introduction
TageleBerihun
 
presentation_intro_to_networking_1457926557_181219.ppt
presentation_intro_to_networking_1457926557_181219.pptpresentation_intro_to_networking_1457926557_181219.ppt
presentation_intro_to_networking_1457926557_181219.ppt
DrPreethiD1
 
presentation_intro_to_networking_1457926557_181219.ppt
presentation_intro_to_networking_1457926557_181219.pptpresentation_intro_to_networking_1457926557_181219.ppt
presentation_intro_to_networking_1457926557_181219.ppt
DrPreethiD1
 
presentation_intro_to_networking_1457926557_181219.ppt
presentation_intro_to_networking_1457926557_181219.pptpresentation_intro_to_networking_1457926557_181219.ppt
presentation_intro_to_networking_1457926557_181219.ppt
DrPreethiD1
 
Chapter1 Introduction.pptx
Chapter1 Introduction.pptxChapter1 Introduction.pptx
Chapter1 Introduction.pptx
huanyuzhang5
 

Similar to Sept 2017 introduction (20)

ComputerNetwork_Introductions_C1_en.pptx
ComputerNetwork_Introductions_C1_en.pptxComputerNetwork_Introductions_C1_en.pptx
ComputerNetwork_Introductions_C1_en.pptx
 
1st Talk
1st Talk1st Talk
1st Talk
 
Lecture No. 1.ppt
Lecture No. 1.pptLecture No. 1.ppt
Lecture No. 1.ppt
 
Chapter1 introduction
Chapter1 introductionChapter1 introduction
Chapter1 introduction
 
Computer Networks and Internet.ppt of co
Computer Networks and Internet.ppt of coComputer Networks and Internet.ppt of co
Computer Networks and Internet.ppt of co
 
Chapter_1_.pptx
Chapter_1_.pptxChapter_1_.pptx
Chapter_1_.pptx
 
Network th ITM3
Network th ITM3Network th ITM3
Network th ITM3
 
Chapter1
Chapter1Chapter1
Chapter1
 
Chapter 1 - Computer Networking a top-down Approach 7th
Chapter 1 - Computer Networking a top-down Approach 7thChapter 1 - Computer Networking a top-down Approach 7th
Chapter 1 - Computer Networking a top-down Approach 7th
 
Lec-01 Introduction Computer Networks...
Lec-01 Introduction Computer Networks...Lec-01 Introduction Computer Networks...
Lec-01 Introduction Computer Networks...
 
Ch1 internet Networks
Ch1 internet NetworksCh1 internet Networks
Ch1 internet Networks
 
Network chapter 1 ENCS2330 Birzeit_university
Network chapter 1 ENCS2330 Birzeit_universityNetwork chapter 1 ENCS2330 Birzeit_university
Network chapter 1 ENCS2330 Birzeit_university
 
3rd edition chapter1
3rd edition chapter13rd edition chapter1
3rd edition chapter1
 
Module1.ppt
Module1.pptModule1.ppt
Module1.ppt
 
Lec 2 and_3
Lec 2 and_3Lec 2 and_3
Lec 2 and_3
 
1 introduction
1 introduction1 introduction
1 introduction
 
presentation_intro_to_networking_1457926557_181219.ppt
presentation_intro_to_networking_1457926557_181219.pptpresentation_intro_to_networking_1457926557_181219.ppt
presentation_intro_to_networking_1457926557_181219.ppt
 
presentation_intro_to_networking_1457926557_181219.ppt
presentation_intro_to_networking_1457926557_181219.pptpresentation_intro_to_networking_1457926557_181219.ppt
presentation_intro_to_networking_1457926557_181219.ppt
 
presentation_intro_to_networking_1457926557_181219.ppt
presentation_intro_to_networking_1457926557_181219.pptpresentation_intro_to_networking_1457926557_181219.ppt
presentation_intro_to_networking_1457926557_181219.ppt
 
Chapter1 Introduction.pptx
Chapter1 Introduction.pptxChapter1 Introduction.pptx
Chapter1 Introduction.pptx
 

More from shahin raj

Sept 2017 communication system and protocols
Sept 2017  communication system and protocolsSept 2017  communication system and protocols
Sept 2017 communication system and protocols
shahin raj
 
Sept 2017 cisco certification routers
Sept 2017  cisco certification routersSept 2017  cisco certification routers
Sept 2017 cisco certification routers
shahin raj
 
Sept 2017 osi and tcp ip protocols
Sept 2017   osi  and tcp ip protocolsSept 2017   osi  and tcp ip protocols
Sept 2017 osi and tcp ip protocols
shahin raj
 
Sept 2017 network design
Sept 2017   network designSept 2017   network design
Sept 2017 network design
shahin raj
 
Sept 2017 multimedia
Sept 2017   multimediaSept 2017   multimedia
Sept 2017 multimedia
shahin raj
 
Sept 2017 internetworking
Sept 2017   internetworkingSept 2017   internetworking
Sept 2017 internetworking
shahin raj
 
Sept 2017 dynamic routing
Sept 2017   dynamic routingSept 2017   dynamic routing
Sept 2017 dynamic routing
shahin raj
 
Overview note e-comerce
Overview note e-comerceOverview note e-comerce
Overview note e-comerce
shahin raj
 
6 fundamental liberties
6 fundamental liberties6 fundamental liberties
6 fundamental liberties
shahin raj
 

More from shahin raj (9)

Sept 2017 communication system and protocols
Sept 2017  communication system and protocolsSept 2017  communication system and protocols
Sept 2017 communication system and protocols
 
Sept 2017 cisco certification routers
Sept 2017  cisco certification routersSept 2017  cisco certification routers
Sept 2017 cisco certification routers
 
Sept 2017 osi and tcp ip protocols
Sept 2017   osi  and tcp ip protocolsSept 2017   osi  and tcp ip protocols
Sept 2017 osi and tcp ip protocols
 
Sept 2017 network design
Sept 2017   network designSept 2017   network design
Sept 2017 network design
 
Sept 2017 multimedia
Sept 2017   multimediaSept 2017   multimedia
Sept 2017 multimedia
 
Sept 2017 internetworking
Sept 2017   internetworkingSept 2017   internetworking
Sept 2017 internetworking
 
Sept 2017 dynamic routing
Sept 2017   dynamic routingSept 2017   dynamic routing
Sept 2017 dynamic routing
 
Overview note e-comerce
Overview note e-comerceOverview note e-comerce
Overview note e-comerce
 
6 fundamental liberties
6 fundamental liberties6 fundamental liberties
6 fundamental liberties
 

Recently uploaded

ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have oneISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
Las Vegas Warehouse
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
camseq
 
New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
wisnuprabawa3
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
Victor Morales
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
jpsjournal1
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Sinan KOZAK
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
KrishnaveniKrishnara1
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
171ticu
 
Question paper of renewable energy sources
Question paper of renewable energy sourcesQuestion paper of renewable energy sources
Question paper of renewable energy sources
mahammadsalmanmech
 
Engineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdfEngineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdf
abbyasa1014
 
Casting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdfCasting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdf
zubairahmad848137
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
Dr Ramhari Poudyal
 
Textile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdfTextile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdf
NazakatAliKhoso2
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
insn4465
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
Aditya Rajan Patra
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
IJECEIAES
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Christina Lin
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
JamalHussainArman
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
IJECEIAES
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
KrishnaveniKrishnara1
 

Recently uploaded (20)

ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have oneISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
 
New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
 
Question paper of renewable energy sources
Question paper of renewable energy sourcesQuestion paper of renewable energy sources
Question paper of renewable energy sources
 
Engineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdfEngineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdf
 
Casting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdfCasting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdf
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
 
Textile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdfTextile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdf
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
 

Sept 2017 introduction

  • 1. Introduction Overview: • what’s the Internet? • what’s a protocol? • network edge; hosts, access net, physical media • network core: packet/circuit switching, Internet structure • performance: loss, delay, throughput • security • protocol layers, service models • history 1-1
  • 2. 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  circuit switching, packet switching, network structure 1.4 Delay, loss and throughput in packet-switched networks 1.5 Protocol layers, service models 1.6 Networks under attack: security 1.7 History 1-2
  • 3. What’s the Internet: “nuts and bolts” view • millions of connected computing devices: hosts = end systems – running network apps 1-3 Home network Institutional network Mobile network Global ISP Regional ISP router PC server wireless laptop cellular handheld wired links access points  communication links  fiber, copper, radio, satellite  transmission rate = bandwidth  routers: forward packets (chunks of data)
  • 4. What’s the Internet: “nuts and bolts” view • protocols control sending, receiving of msgs – e.g., TCP, IP, HTTP, Skype, Ethernet • Internet: “network of networks” – loosely hierarchical – public Internet versus private intranet • Internet standards – RFC: Request for comments – IETF: Internet Engineering Task Force 1-4 Home network Institutional network Mobile network Global ISP Regional ISP
  • 5. What’s the Internet: a service view • communication infrastructure enables distributed applications: – Web, VoIP, email, games, e- commerce, file sharing • communication services provided to apps: – reliable data delivery from source to destination – “best effort” (unreliable) data delivery 1-5
  • 6. What’s a protocol? human protocols: • “what’s the time?” • “I have a question” • introductions … specific msgs sent … specific actions taken when msgs received, or other events network protocols: • machines rather than humans • all communication activity in Internet governed by protocols 1-6 protocols define format, order of msgs sent and received among network entities, and actions taken on msg transmission, receipt
  • 7. What’s a protocol? a human protocol and a computer network protocol: 1-7 Hi Hi Got the time? 2:00 TCP connection request TCP connection response Get http://www.awl.com/kurose-ross <file> time
  • 8. 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  circuit switching, packet switching, network structure 1.4 Delay, loss and throughput in packet-switched networks 1.5 Protocol layers, service models 1.6 Networks under attack: security 1.7 History 1-8
  • 9. A closer look at network structure: • network edge: applications and hosts 1-9  access networks, physical media: wired, wireless communication links  network core:  interconnected routers  network of networks
  • 10. The network edge: • end systems (hosts): – run application programs – e.g. Web, email – at “edge of network” 1-10 client/server peer-peer  client/server model  client host requests, receives service from always-on server  e.g. Web browser/server; email client/server  peer-peer model:  minimal (or no) use of dedicated servers  e.g. Skype, BitTorrent
  • 11. telephone network Internet home dial-up modem ISP modem (e.g., AOL) home PC central office  Uses existing telephony infrastructure  Home is connected to central office  up to 56Kbps direct access to router (often less)  Can’t surf and phone at same time: not “always on” Dial-up Modem
  • 12. telephone network DSL modem home PC home phone Internet DSLAM Existing phone line: 0-4KHz phone; 4-50KHz upstream data; 50KHz-1MHz downstream data splitter central office Digital Subscriber Line (DSL)  Also uses existing telephone infrastruture
  • 13. Cable Network Architecture: Overview 1-13 home cable headend cable distribution network (simplified) Typically 500 to 5,000 homes
  • 14. Cable Network Architecture: Overview 1-14 home cable headend cable distribution network server(s)
  • 15. Cable Network Architecture: Overview 1-15 home cable headend cable distribution network (simplified)
  • 16. Wireless access networks • shared wireless access network connects end system to router – via base station aka “access point” • wireless LANs: – 802.11b/g (WiFi): 11 or 54 Mbps • wider-area wireless access – provided by telco operator – ~2Mbps over cellular system (EVDO, UMTS, HSPA) – Next 4G: WiMAX (10’s Mbps) and LTE over wide area 1-16 base station mobile hosts router
  • 17. Home networks Typical home network components: • DSL or cable modem • router/firewall/NAT • Ethernet • wireless access point 1-17 wireless access point wireless laptops router/ firewall cable modem to/from cable headend Ethernet
  • 18. Physical Media • Bit: propagates between transmitter/rcvr pairs • physical link: what lies between transmitter & receiver • guided media: – signals propagate in solid media: copper, fiber, coax • unguided media: – signals propagate freely, e.g., radio Twisted Pair (TP) • two insulated copper wires – Category 3: traditional phone wires, 10 Mbps Ethernet – Category 5: 100Mbps Ethernet 1-18
  • 19. Physical Media: coax, fiber Coaxial cable: • two concentric copper conductors • bidirectional • baseband: – single channel on cable – legacy Ethernet • broadband: – multiple channels on cable – HFC 1-19 Fiber optic cable:  glass fiber carrying light pulses, each pulse a bit  high-speed operation:  high-speed point-to-point transmission (e.g., 10’s-100’s Gps)  low error rate: repeaters spaced far apart ; immune to electromagnetic noise
  • 20. Physical media: radio • signal carried in electromagnetic spectrum • no physical “wire” • bidirectional • propagation environment effects: – reflection – obstruction by objects – interference 1-20 Radio link types:  terrestrial microwave  e.g. up to 45 Mbps channels  LAN (e.g., Wifi)  11Mbps, 54 Mbps, 300 Mbps  wide-area (e.g., cellular)  3G cellular: ~ 1 Mbps  4G cellular: ~ 21 Mbps  satellite  Kbps to 45Mbps channel (or multiple smaller channels)  270 msec end-end delay  geosynchronous versus low altitude
  • 21. 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  circuit switching, packet switching, network structure 1.4 Delay, loss and throughput in packet-switched networks 1.5 Protocol layers, service models 1.6 Networks under attack: security 1.7 History 1-21
  • 22. The Network Core • mesh of interconnected routers • the fundamental question: how is data transferred through net? – circuit switching: dedicated circuit per call: telephone net – packet-switching: data sent thru net in discrete “chunks” 1-22
  • 23. Network Core: Circuit Switching End-end resources reserved for “call” • link bandwidth, switch capacity • dedicated resources: no sharing • circuit-like (guaranteed) performance • call setup required 1-23
  • 24. Network Core: Circuit Switching network resources (e.g., bandwidth) divided into “pieces” • pieces allocated to calls • resource piece idle if not used by owning call (no sharing) 1-24  dividing link bandwidth into “pieces”  frequency division  time division
  • 25. Circuit Switching: FDM and TDM 1-25 FDM frequency time TDM frequency time 4 users Example:
  • 26. Network Core: Packet Switching each end-end data stream divided into packets • user A, B packets share network resources • each packet uses full link bandwidth • resources used as needed 1-26 resource contention:  aggregate resource demand can exceed amount available  congestion: packets queue, wait for link use  store and forward: packets move one hop at a time  Node receives complete packet before forwardingBandwidth division into “pieces” Dedicated allocation Resource reservation
  • 27. Packet Switching: Statistical Multiplexing Sequence of A & B packets does not have fixed pattern, bandwidth shared on demand statistical multiplexing. TDM: each host gets same slot in revolving TDM frame. 1-27 A B C 100 Mb/s Ethernet 1.5 Mb/s D E statistical multiplexing queue of packets waiting for output link
  • 28. Packet-switching: store-and-forward • takes L/R seconds to transmit (push out) packet of L bits on to link at R bps • store and forward: entire packet must arrive at router before it can be transmitted on next link • delay = 3L/R (assuming zero propagation delay) Example: • L = 7.5 Mbits • R = 1.5 Mbps • transmission delay = 15 sec 1-28 R R R L
  • 29. Internet structure: network of networks • roughly hierarchical • at center: “tier-1” ISPs (e.g., Verizon, Sprint, AT&T, Cable and Wireless), national/international coverage – treat each other as equals 1-29 Tier 1 ISP Tier 1 ISP Tier 1 ISP Tier-1 providers interconnect (peer) privately
  • 30. Internet structure: network of networks • “Tier-2” ISPs: smaller (often regional) ISPs – Connect to one or more tier-1 ISPs, possibly other tier-2 ISPs 1-30 Tier 1 ISP Tier 1 ISP Tier 1 ISP Tier-2 ISPTier-2 ISP Tier-2 ISP Tier-2 ISP Tier-2 ISP Tier-2 ISP pays tier-1 ISP for connectivity to rest of Internet  tier-2 ISP is customer of tier-1 provider Tier-2 ISPs also peer privately with each other.
  • 31. Internet structure: network of networks • “Tier-3” ISPs and local ISPs – last hop (“access”) network (closest to end systems) 1-31 Tier 1 ISP Tier 1 ISP Tier 1 ISP Tier-2 ISPTier-2 ISP Tier-2 ISP Tier-2 ISP Tier-2 ISP local ISP local ISP local ISP local ISP local ISP Tier 3 ISP local ISP local ISP local ISP Local and tier- 3 ISPs are customers of higher tier ISPs connecting them to rest of Internet
  • 32. Internet structure: network of networks • a packet passes through many networks! 1-32 Tier 1 ISP Tier 1 ISP Tier 1 ISP Tier-2 ISPTier-2 ISP Tier-2 ISP Tier-2 ISP Tier-2 ISP local ISP local ISP local ISP local ISP local ISP Tier 3 ISP local ISP local ISP local ISP
  • 33. 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  circuit switching, packet switching, network structure 1.4 Delay, loss and throughput in packet-switched networks 1.5 Protocol layers, service models 1.6 Networks under attack: security 1.7 History 1-33
  • 34. How do loss and delay occur? packets queue in router buffers • packet arrival rate to link exceeds output link capacity • packets queue, wait for turn 1-34 A B packet being transmitted (delay) packets queueing (delay) free (available) buffers: arriving packets dropped (loss) if no free buffers
  • 35. Four sources of packet delay • 1. nodal processing: – check bit errors – determine output link 1-35 A B propagation transmission nodal processing queueing  2. queueing  time waiting at output link for transmission  depends on congestion level of router
  • 36. Delay in packet-switched networks 3. Transmission delay: • R=link bandwidth (bps) • L=packet length (bits) • time to send bits into link = L/R 4. Propagation delay: • d = length of physical link • s = propagation speed in medium (~2x108 m/sec) • propagation delay = d/s 1-36 A B propagation transmission nodal processing queueing Note: s and R are very different quantities!
  • 37. Nodal delay • dproc = processing delay – typically a few microsecs or less • dqueue = queuing delay – depends on congestion • dtrans = transmission delay – = L/R, significant for low-speed links • dprop = propagation delay – a few microsecs to hundreds of msecs 1-37 proptransqueueprocnodal ddddd +++=
  • 38. Queueing delay (revisited) • R=link bandwidth (bps) • L=packet length (bits) • a=average packet arrival rate 1-38 traffic intensity = La/R  La/R ~ 0: average queueing delay small  La/R -> 1: delays become large  La/R > 1: more “work” arriving than can be serviced, average delay infinite!
  • 39. Packet loss • queue (buffer) preceding link in buffer has finite capacity • packet arriving to full queue dropped (lost) • lost packet may be retransmitted by previous node, by source end system, or not at all 1-39 A B packet being transmitted packet arriving to full buffer is lost buffer (waiting area)
  • 40. Throughput • throughput: rate (bits/time unit) at which bits transferred between sender/receiver – instantaneous: rate at given point in time – average: rate over longer period of time 1-40 server, with file of F bits to send to client link capacity Rs bits/sec link capacity Rc bits/sec pipe that can carry fluid at rate Rs bits/sec) pipe that can carry fluid at rate Rc bits/sec) server sends bits (fluid) into pipe
  • 41. 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  circuit switching, packet switching, network structure 1.4 Delay, loss and throughput in packet-switched networks 1.5 Protocol layers, service models 1.6 Networks under attack: security 1.7 History 1-41
  • 42. Protocol “Layers” Networks are complex! • many “pieces”: – hosts – routers – links of various media – applications – protocols – hardware, software Question: Is there any hope of organizing structure of network? Or at least our discussion of networks? 1-42
  • 43. Organization of air travel • a series of steps 1-43 ticket (purchase) baggage (check) gates (load) runway takeoff airplane routing ticket (complain) baggage (claim) gates (unload) runway landing airplane routing airplane routing
  • 44. Layering of airline functionality Layers: each layer implements a service – via its own internal-layer actions – relying on services provided by layer below 1-44 ticket (purchase) baggage (check) gates (load) runway (takeoff) airplane routing departure airport arrival airport intermediate air-traffic control centers airplane routing airplane routing ticket (complain) baggage (claim gates (unload) runway (land) airplane routing ticket baggage gate takeoff/landing airplane routing
  • 45. Why layering? Dealing with complex systems: • explicit structure allows identification, relationship of complex system’s pieces – layered reference model for discussion • modularization eases maintenance, updating of system – change of implementation of layer’s service transparent to rest of system – e.g., change in gate procedure doesn’t affect rest of system 1-45
  • 46. Internet protocol stack • application: supporting network applications – FTP, SMTP, HTTP • transport: process-process data transfer – TCP, UDP • network: routing of datagrams from source to destination – IP, routing protocols • link: data transfer between neighboring network elements – PPP, Ethernet • physical: bits “on the wire” 1-46 application transport network link physical
  • 47. ISO/OSI reference model • presentation: allow applications to interpret meaning of data, e.g., encryption, compression, machine- specific conventions • session: synchronization, checkpointing, recovery of data exchange 1-47 application presentation session transport network link physical
  • 48. Encapsulation 1-48 source application transport network link physical HtHn M segment Ht datagram destination application transport network link physical HtHnHl M HtHn M Ht M M network link physical link physical HtHnHl M HtHn M HtHn M HtHnHl M router switch message M Ht M Hn frame
  • 49. 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  circuit switching, packet switching, network structure 1.4 Delay, loss and throughput in packet-switched networks 1.5 Protocol layers, service models 1.6 Networks under attack: security 1.7 History 1-49
  • 50. Network Security • The field of network security is about: – how bad guys can attack computer networks – how we can defend networks against attacks – how to design architectures that are immune to attacks 1-50
  • 51. Malware into hosts via Internet • Malware can get in host from a virus, worm, or trojan horse. • Spyware malware can record keystrokes, web sites visited, upload info to collection site. • Infected host can be enrolled in a botnet, used for spam and DDoS attacks. • Malware is often self-replicating: from an infected host, seeks entry into other hosts 1-51
  • 52. Malware into hosts via Internet • Trojan horse – Hidden part of some otherwise useful software – Today often on a Web page (Active-X, plugin) • Virus – infection by receiving object (e.g., e-mail attachment), actively executing – self-replicating: propagate itself to other hosts, users 1-52  Worm:  infection by passively receiving object that gets itself executed  self- replicating: propagates to other hosts, users Sapphire Worm: aggregate scans/sec in first 5 minutes of outbreak (CAIDA, UWisc data)
  • 53. Attack on servers and network infrastructure • Denial of service (DoS): attackers make resources (server, bandwidth) unavailable to legitimate traffic by overwhelming resource with bogus traffic 1-53 1. select target 2. break into hosts around the network (see botnet) 3. send packets toward target from compromised hosts target
  • 54. Packet sniffing – broadcast media (shared Ethernet, wireless) – promiscuous network interface reads/records all packets (e.g., including passwords!) passing by 1-54 A B C src:B dest:A payload  Wireshark software used for end-of-chapter labs is a (free) packet-sniffer
  • 55. False source addresses • IP spoofing: send packet with false source address 1-55 A B C src:B dest:A payload
  • 56. 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  circuit switching, packet switching, network structure 1.4 Delay, loss and throughput in packet-switched networks 1.5 Protocol layers, service models 1.6 Networks under attack: security 1.7 History 1-56
  • 57. Internet History • 1961: Kleinrock - queueing theory shows effectiveness of packet-switching • 1964: Baran - packet- switching in military nets • 1967: ARPAnet conceived by Advanced Research Projects Agency • 1969: first ARPAnet node operational • 1972: – ARPAnet public demonstration – NCP (Network Control Protocol) first host-host protocol – first e-mail program – ARPAnet has 15 nodes 1-57 1961-1972: Early packet-switching principles
  • 58. Internet History • 1970: ALOHAnet satellite network in Hawaii • 1974: Cerf and Kahn - architecture for interconnecting networks • 1976: Ethernet at Xerox PARC • ate70’s: proprietary architectures: DECnet, SNA, XNA • late 70’s: switching fixed length packets (ATM precursor) • 1979: ARPAnet has 200 nodes Cerf and Kahn’s internetworking principles: – minimalism, autonomy - no internal changes required to interconnect networks – best effort service model – stateless routers – decentralized control define today’s Internet architecture 1-58 1972-1980: Internetworking, new and proprietary nets
  • 59. Internet History • 1983: deployment of TCP/IP • 1982: smtp e-mail protocol defined • 1983: DNS defined for name-to-IP-address translation • 1985: ftp protocol defined • 1988: TCP congestion control • new national networks: Csnet, BITnet, NSFnet, Minitel • 100,000 hosts connected to confederation of networks 1-59 1980-1990: new protocols, a proliferation of networks
  • 60. Internet History • Early 1990’s: ARPAnet decommissioned • 1991: NSF lifts restrictions on commercial use of NSFnet (decommissioned, 1995) • early 1990s: Web – hypertext [Bush 1945, Nelson 1960’s] – HTML, HTTP: Berners-Lee – 1994: Mosaic, later Netscape – late 1990’s: commercialization of the Web Late 1990’s – 2000’s: • more killer apps: instant messaging, P2P file sharing • network security to forefront • est. 50 million host, 100 million+ users • backbone links running at Gbps 1-60 1990, 2000’s: commercialization, the Web, new apps
  • 61. Internet History 2007 – till • ~500 million hosts • Voice, Video over IP • P2P applications: BitTorrent (file sharing) Skype (VoIP), PPLive (video) • more applications: YouTube, gaming • wireless, mobility 1-61

Editor's Notes

  1. Two simple multiple access control techniques. Each mobile’s share of the bandwidth is divided into portions for the uplink and the downlink. Also, possibly, out of band signaling. As we will see, used in AMPS, GSM, IS-54/136