The document provides an overview of the Internet and computer networks. It discusses what the Internet is, including end systems, access networks, and the network core. It describes the network edge, including end systems, access networks, and links. It then covers the network core, explaining circuit switching, packet switching, and the hierarchical structure of the Internet. It discusses concepts like delay, loss, throughput in packet-switched networks. Finally, it introduces the idea of organizing networks using a layered protocol approach and service models.
Sept 2017 topologies and communication mediashahin raj
This document discusses various topics related to telecommunications media and networks. It defines communications, telecommunications, and data communications. It describes different types of telecommunication media like twisted pair wire, coaxial cable, fiber-optic cable, microwave, satellite, infrared, and cellular transmission. It also discusses telecommunication devices, network topologies, network types by size, client-server connections, communications software, and factors that influence the cost and considerations of communication media.
This document provides an overview of data communication and networks. It discusses data communication fundamentals like transmission media, protocols, and data representation. It also covers network basics such as physical structures, topologies, and performance criteria like reliability and security. Specific topics covered include simplex, half-duplex, and full-duplex data flow, point-to-point and multipoint connections, and mesh and star network topologies.
CND_22634_UNIT1_MSBTE_Computer network and Data CommunicationPranoti Doke
1.1 Data communication and its
characteristics
1.2 Components of data communication Transmitter, Receiver, Medium, Message, Protocol. Standards, Standard organizations. Basic block diagram of data communication system
1.3 Data Transmission: Serial, Parallel Synchronous, Asynchronous, Isochronous transmission
1.4 Transmission characteristics: Signaling rate, data rate, bit rate, baud rate
1.5 feed of computer networks, Network criteria, advantages of networking
1.6 Network topologies: Mesh, Star, Bus, Tree, Ring and Hybrid topologies - Schematic diagram, working, ad viint‹i disadvantages and applications
1.7 Network Classification:
Based on Transmission Technology
Point to-point, Multipoint, Broadcast
Based on physical size(scale):
PAN, BAN, LAN, MAN, WAN,VPN
based on Architecture: Peer to Peer, client Server, off a esC ent Se er over Peer-to-Peer Model.
Data communication refers to the exchange of data between two or more devices. There are various transmission media that can be used for this including twisted pair cable, coaxial cable, fiber optic cable, air, vacuum, and seawater. Guided media requires a physical path for transmission while unguided media uses electromagnetic waves for transmission without a physical path.
This document provides an overview of data communications. It discusses the key components of data communication systems including senders, receivers, messages, transmission mediums, and protocols. It describes different types of data flow such as simplex, half-duplex, and full-duplex. It also discusses analog and digital signals and different transmission mediums including guided mediums like coaxial cable and fiber optics, as well as unguided wireless mediums. Finally, it provides information on common networking devices including modems, hubs, switches, and routers.
The document defines and describes various components of computer networks. It discusses what a network is, types of networks including local area networks (LANs) and wide area networks (WANs). It also covers network topologies like bus, star and ring topologies. Additionally, it summarizes common networking hardware such as hubs, routers, gateways and modems. The document also touches on network protocols, architectures, and characteristics of data transmission over networks.
This document summarizes key topics from Lecture 1 on data communication, including definitions of common terminology like session, network, and packetizing. It discusses how networks are needed because point-to-point communication is impractical over large distances or large numbers of devices. Networks allow for distributed processing where separate computers handle subsets of a task. Important criteria for networks are performance, reliability, and security. Common network applications are marketing/sales, financial services, manufacturing, and electronic messaging.
Sept 2017 topologies and communication mediashahin raj
This document discusses various topics related to telecommunications media and networks. It defines communications, telecommunications, and data communications. It describes different types of telecommunication media like twisted pair wire, coaxial cable, fiber-optic cable, microwave, satellite, infrared, and cellular transmission. It also discusses telecommunication devices, network topologies, network types by size, client-server connections, communications software, and factors that influence the cost and considerations of communication media.
This document provides an overview of data communication and networks. It discusses data communication fundamentals like transmission media, protocols, and data representation. It also covers network basics such as physical structures, topologies, and performance criteria like reliability and security. Specific topics covered include simplex, half-duplex, and full-duplex data flow, point-to-point and multipoint connections, and mesh and star network topologies.
CND_22634_UNIT1_MSBTE_Computer network and Data CommunicationPranoti Doke
1.1 Data communication and its
characteristics
1.2 Components of data communication Transmitter, Receiver, Medium, Message, Protocol. Standards, Standard organizations. Basic block diagram of data communication system
1.3 Data Transmission: Serial, Parallel Synchronous, Asynchronous, Isochronous transmission
1.4 Transmission characteristics: Signaling rate, data rate, bit rate, baud rate
1.5 feed of computer networks, Network criteria, advantages of networking
1.6 Network topologies: Mesh, Star, Bus, Tree, Ring and Hybrid topologies - Schematic diagram, working, ad viint‹i disadvantages and applications
1.7 Network Classification:
Based on Transmission Technology
Point to-point, Multipoint, Broadcast
Based on physical size(scale):
PAN, BAN, LAN, MAN, WAN,VPN
based on Architecture: Peer to Peer, client Server, off a esC ent Se er over Peer-to-Peer Model.
Data communication refers to the exchange of data between two or more devices. There are various transmission media that can be used for this including twisted pair cable, coaxial cable, fiber optic cable, air, vacuum, and seawater. Guided media requires a physical path for transmission while unguided media uses electromagnetic waves for transmission without a physical path.
This document provides an overview of data communications. It discusses the key components of data communication systems including senders, receivers, messages, transmission mediums, and protocols. It describes different types of data flow such as simplex, half-duplex, and full-duplex. It also discusses analog and digital signals and different transmission mediums including guided mediums like coaxial cable and fiber optics, as well as unguided wireless mediums. Finally, it provides information on common networking devices including modems, hubs, switches, and routers.
The document defines and describes various components of computer networks. It discusses what a network is, types of networks including local area networks (LANs) and wide area networks (WANs). It also covers network topologies like bus, star and ring topologies. Additionally, it summarizes common networking hardware such as hubs, routers, gateways and modems. The document also touches on network protocols, architectures, and characteristics of data transmission over networks.
This document summarizes key topics from Lecture 1 on data communication, including definitions of common terminology like session, network, and packetizing. It discusses how networks are needed because point-to-point communication is impractical over large distances or large numbers of devices. Networks allow for distributed processing where separate computers handle subsets of a task. Important criteria for networks are performance, reliability, and security. Common network applications are marketing/sales, financial services, manufacturing, and electronic messaging.
A computer network connects two or more computers through wired or wireless communication mediums in order to share computer resources and information. The key components of a computer network include sending devices that transmit information, receiving devices that accept transmitted data, communication devices like modems that enable communication between computers and other devices, and transmission mediums like cables and wireless technologies that carry communication signals from one place to another.
Data communication refers to the transmission of digital data between two or more computers or networks. It involves using computing and communication technologies to transfer data from one place to another. There are three key characteristics of an effective data communication system: delivery of data to the correct destination, accuracy in delivery, and timely delivery. The basic components of a data communication system are a sender that transmits a message or data, a receiver that obtains the message, a transmission medium that allows the message to travel between sender and receiver, and an encoder-decoder that establishes rules and formats for communication.
Computer communications involves the transfer of data between devices using a communications channel. Key components of communication include a sender, receiver, encoding/decoding devices, and transmission medium. Networks connect multiple devices to facilitate communication and sharing of resources. Common network types include local area networks (LANs), metropolitan area networks (MANs), and wide area networks (WANs). Standards define how devices communicate over networks and include protocols, topologies, and technologies like Ethernet, TCP/IP, Wi-Fi, and Bluetooth.
Computer Networks for Computer Science Studentrprajat007
This document provides information about data communication systems and their components. It discusses the following key points in 3 sentences:
Data communication systems allow exchange of data between devices via transmission mediums like wires. Effective systems ensure delivery of data to the correct destination, accuracy of the data, timely delivery, and minimal jitter or packet arrival variation. The core components of data communication systems include messages, senders and receivers, transmission mediums, protocols that establish communication rules, and various transmission modes like simplex, half-duplex, and full-duplex.
Academic course on Computer Network Chapter -1 for BCA, Tribhuwan University
** Applicable for other courses as well
Includes the Basic of Computer Network, Topologies, Types of Network
Computer networks can be classified based on their geographical span, interconnectivity, administration, and architecture. They range from personal area networks (PANs) covering 10 meters around a device, to local area networks (LANs) within a building, to metropolitan area networks (MANs) within a city, to wide area networks (WANs) spanning countries, to the largest network, the internet, which interconnects networks worldwide. Networks allow sharing of resources like printers and storage, as well as exchange of information via email, webpages, and other applications.
Data communication involves the transmission of electronic data between nodes through a communication medium. There are several fundamental principles and basic elements of a communication system. The principles include delivery of data to the correct destination, accuracy of the data, and timely delivery. The basic elements are the message, sender, medium, receiver, and protocols. Common wired media include twisted pair cable, coaxial cable, and fiber optic cable. Wireless media include Bluetooth, Wi-Fi, and cellular networks. Protocols like TCP/IP govern how devices communicate by handling delivery and addressing. Data can be transmitted in analog or digital form.
This document provides an introduction to data communications and telecommunications. It discusses what data communication is, the history of telecommunications including key inventions and developments, features of communication like senders, receivers, and message types. It also covers network applications, application service providers, business data communication issues, introduces different types of networks and topologies, store-and-forward systems, and the major data communication frameworks of OSI and TCP/IP. Key concepts like sessions, nodes, links, paths, circuits, and packetizing are also defined.
This document discusses various data communication techniques including packetization, multiplexing, and switching. It describes how data is divided into packets with header information added. It explains different types of multiplexing including frequency division, time division, and statistical time division. It also covers circuit switching versus packet switching and different error control techniques such as parity checks, checksums, and cyclic redundancy checks used to detect errors.
The document discusses computer network models and the physical layer of the OSI model. It provides an overview of the OSI model and its seven layers. It describes the physical layer in detail, including its responsibilities of defining the physical medium and interfaces. Various types of communication media are discussed, including twisted pair wires, coaxial cable, fiber optic cable, and wireless technologies like radio, microwave, satellite, and infrared. The physical layer controls transmission rates and modes and ensures bits are transmitted from one node to the next.
This document discusses various topics related to data communications including:
1. A simplified model of data communications consisting of a source, transmitter, transmission system, receiver and destination.
2. Guided media such as twisted pair, coaxial cable, and optical fiber which have different characteristics like bandwidth and attenuation.
3. Wireless transmission using antennas and frequencies ranging from microwave to satellite to broadcast radio to infrared.
4. Key concepts in data communications including analog vs. digital signals, bandwidth, attenuation, noise and error rates which impact system design factors and capacity.
A computer network connects two or more computers together to allow sharing of resources and communication between users. Common network types include local area networks (LANs) within a building, metropolitan area networks (MANs) within a city, and wide area networks (WANs) spanning multiple cities or countries. The topology, or layout of connections between devices, can take bus, star, ring or mesh forms. Protocols and layered network architectures like TCP/IP or OSI model provide standards for communication between networked devices.
These slides cover the fundamentals of data communication & networking. It covers all data types which are used in communication of data over transmission medium. It is useful for engineering students & also for the candidates who want to master data communication & computer networking.
This document provides an overview of data communication systems and computer networks. It discusses the basic components of a communication system including the message, sender, receiver, transmission medium, and protocols. It then describes different types of network topologies including bus, star, ring, and mesh. The document also defines local, metropolitan, and wide area networks and how they differ in size and scope. Finally, it discusses some important network concepts like protocols, standards, and the organizations that develop standards to ensure interoperability.
This Presentation covers:
Basics of data communications
Network Elements
Introduction to Protocols
Bridges, Routers, HUB, switch, gateway
Packet Switching Concepts
This document defines key data communication terminology like session, network, node, link, path, circuit, and packetizing. It describes different data flow types including simplex, half-duplex, and full-duplex transmission modes. Networks are introduced as interconnected groups of devices that allow sharing of information and resources. Distributed processing and important network criteria like performance, reliability, and security are also outlined. The physical structures of networks include type of connection, either point-to-point or multipoint, and topology.
A computer network connects multiple computers allowing them to communicate and share resources. It requires a minimum of two computers connected by cables or wirelessly with network interface cards. There are different types of networks including local area networks covering a small area like a building, metropolitan area networks spanning a city, and wide area networks covering larger distances like the internet. Networks can be configured in a peer-to-peer setup where computers act as equal partners or a client-server setup with dedicated server computers.
Topic 1.1 basic concepts of computer networkAtika Zaimi
This document provides an overview of computer networks, including their components, characteristics, and classifications. It defines peer-to-peer and client-server networks, describing their advantages and disadvantages. Various network topologies such as bus, star, ring, and mesh are explained. The document also outlines the key standards organizations that set networking guidelines and lists common network hardware functions. Learners will gain an understanding of fundamental network concepts.
This document provides an introduction to data communication, networks, the Internet, and protocols. It defines data communication as the exchange of data between devices via transmission media. Networks are described as sets of connected devices that allow nodes to send and receive data. Key aspects of networks discussed include performance, reliability, security, physical structures, topologies, and categories such as local area networks (LANs) and wide area networks (WANs). The Internet is summarized as a global system of interconnected computer networks that allows for sharing of information. Protocols are defined as sets of rules that govern data communication by determining what is communicated, how, and when.
Sept 2017 static routing and packet forwardingshahin raj
Router 1 receives a packet destined for 192.168.2.0/24 on its FastEthernet 0/0 interface. It does not have a route to this network in its routing table, so it uses the default static route. Router 2 has the packet arrive on its Serial 0/0/0 interface and forwards it out Serial0/0/1 according to its static route to 192.168.2.0/24. Router 3 receives the packet on Serial0/0/1 and forwards it out its FastEthernet 0/1 interface since it has a connected route to 192.168.2.0/24.
The document discusses network standards and models including:
- Network communication involves recognizing data, dividing it into chunks, and adding information to determine source/destination and for error checking before sending.
- Standards are needed for hardware/software from different vendors to communicate through standard protocols that control tasks like these.
- There are formal standards developed by standards bodies and de facto standards that emerge in the marketplace.
- Key networking standards organizations that develop standards through specification, identification of solutions, and acceptance processes are ANSI, IEEE, ISO, and ITU.
A computer network connects two or more computers through wired or wireless communication mediums in order to share computer resources and information. The key components of a computer network include sending devices that transmit information, receiving devices that accept transmitted data, communication devices like modems that enable communication between computers and other devices, and transmission mediums like cables and wireless technologies that carry communication signals from one place to another.
Data communication refers to the transmission of digital data between two or more computers or networks. It involves using computing and communication technologies to transfer data from one place to another. There are three key characteristics of an effective data communication system: delivery of data to the correct destination, accuracy in delivery, and timely delivery. The basic components of a data communication system are a sender that transmits a message or data, a receiver that obtains the message, a transmission medium that allows the message to travel between sender and receiver, and an encoder-decoder that establishes rules and formats for communication.
Computer communications involves the transfer of data between devices using a communications channel. Key components of communication include a sender, receiver, encoding/decoding devices, and transmission medium. Networks connect multiple devices to facilitate communication and sharing of resources. Common network types include local area networks (LANs), metropolitan area networks (MANs), and wide area networks (WANs). Standards define how devices communicate over networks and include protocols, topologies, and technologies like Ethernet, TCP/IP, Wi-Fi, and Bluetooth.
Computer Networks for Computer Science Studentrprajat007
This document provides information about data communication systems and their components. It discusses the following key points in 3 sentences:
Data communication systems allow exchange of data between devices via transmission mediums like wires. Effective systems ensure delivery of data to the correct destination, accuracy of the data, timely delivery, and minimal jitter or packet arrival variation. The core components of data communication systems include messages, senders and receivers, transmission mediums, protocols that establish communication rules, and various transmission modes like simplex, half-duplex, and full-duplex.
Academic course on Computer Network Chapter -1 for BCA, Tribhuwan University
** Applicable for other courses as well
Includes the Basic of Computer Network, Topologies, Types of Network
Computer networks can be classified based on their geographical span, interconnectivity, administration, and architecture. They range from personal area networks (PANs) covering 10 meters around a device, to local area networks (LANs) within a building, to metropolitan area networks (MANs) within a city, to wide area networks (WANs) spanning countries, to the largest network, the internet, which interconnects networks worldwide. Networks allow sharing of resources like printers and storage, as well as exchange of information via email, webpages, and other applications.
Data communication involves the transmission of electronic data between nodes through a communication medium. There are several fundamental principles and basic elements of a communication system. The principles include delivery of data to the correct destination, accuracy of the data, and timely delivery. The basic elements are the message, sender, medium, receiver, and protocols. Common wired media include twisted pair cable, coaxial cable, and fiber optic cable. Wireless media include Bluetooth, Wi-Fi, and cellular networks. Protocols like TCP/IP govern how devices communicate by handling delivery and addressing. Data can be transmitted in analog or digital form.
This document provides an introduction to data communications and telecommunications. It discusses what data communication is, the history of telecommunications including key inventions and developments, features of communication like senders, receivers, and message types. It also covers network applications, application service providers, business data communication issues, introduces different types of networks and topologies, store-and-forward systems, and the major data communication frameworks of OSI and TCP/IP. Key concepts like sessions, nodes, links, paths, circuits, and packetizing are also defined.
This document discusses various data communication techniques including packetization, multiplexing, and switching. It describes how data is divided into packets with header information added. It explains different types of multiplexing including frequency division, time division, and statistical time division. It also covers circuit switching versus packet switching and different error control techniques such as parity checks, checksums, and cyclic redundancy checks used to detect errors.
The document discusses computer network models and the physical layer of the OSI model. It provides an overview of the OSI model and its seven layers. It describes the physical layer in detail, including its responsibilities of defining the physical medium and interfaces. Various types of communication media are discussed, including twisted pair wires, coaxial cable, fiber optic cable, and wireless technologies like radio, microwave, satellite, and infrared. The physical layer controls transmission rates and modes and ensures bits are transmitted from one node to the next.
This document discusses various topics related to data communications including:
1. A simplified model of data communications consisting of a source, transmitter, transmission system, receiver and destination.
2. Guided media such as twisted pair, coaxial cable, and optical fiber which have different characteristics like bandwidth and attenuation.
3. Wireless transmission using antennas and frequencies ranging from microwave to satellite to broadcast radio to infrared.
4. Key concepts in data communications including analog vs. digital signals, bandwidth, attenuation, noise and error rates which impact system design factors and capacity.
A computer network connects two or more computers together to allow sharing of resources and communication between users. Common network types include local area networks (LANs) within a building, metropolitan area networks (MANs) within a city, and wide area networks (WANs) spanning multiple cities or countries. The topology, or layout of connections between devices, can take bus, star, ring or mesh forms. Protocols and layered network architectures like TCP/IP or OSI model provide standards for communication between networked devices.
These slides cover the fundamentals of data communication & networking. It covers all data types which are used in communication of data over transmission medium. It is useful for engineering students & also for the candidates who want to master data communication & computer networking.
This document provides an overview of data communication systems and computer networks. It discusses the basic components of a communication system including the message, sender, receiver, transmission medium, and protocols. It then describes different types of network topologies including bus, star, ring, and mesh. The document also defines local, metropolitan, and wide area networks and how they differ in size and scope. Finally, it discusses some important network concepts like protocols, standards, and the organizations that develop standards to ensure interoperability.
This Presentation covers:
Basics of data communications
Network Elements
Introduction to Protocols
Bridges, Routers, HUB, switch, gateway
Packet Switching Concepts
This document defines key data communication terminology like session, network, node, link, path, circuit, and packetizing. It describes different data flow types including simplex, half-duplex, and full-duplex transmission modes. Networks are introduced as interconnected groups of devices that allow sharing of information and resources. Distributed processing and important network criteria like performance, reliability, and security are also outlined. The physical structures of networks include type of connection, either point-to-point or multipoint, and topology.
A computer network connects multiple computers allowing them to communicate and share resources. It requires a minimum of two computers connected by cables or wirelessly with network interface cards. There are different types of networks including local area networks covering a small area like a building, metropolitan area networks spanning a city, and wide area networks covering larger distances like the internet. Networks can be configured in a peer-to-peer setup where computers act as equal partners or a client-server setup with dedicated server computers.
Topic 1.1 basic concepts of computer networkAtika Zaimi
This document provides an overview of computer networks, including their components, characteristics, and classifications. It defines peer-to-peer and client-server networks, describing their advantages and disadvantages. Various network topologies such as bus, star, ring, and mesh are explained. The document also outlines the key standards organizations that set networking guidelines and lists common network hardware functions. Learners will gain an understanding of fundamental network concepts.
This document provides an introduction to data communication, networks, the Internet, and protocols. It defines data communication as the exchange of data between devices via transmission media. Networks are described as sets of connected devices that allow nodes to send and receive data. Key aspects of networks discussed include performance, reliability, security, physical structures, topologies, and categories such as local area networks (LANs) and wide area networks (WANs). The Internet is summarized as a global system of interconnected computer networks that allows for sharing of information. Protocols are defined as sets of rules that govern data communication by determining what is communicated, how, and when.
Sept 2017 static routing and packet forwardingshahin raj
Router 1 receives a packet destined for 192.168.2.0/24 on its FastEthernet 0/0 interface. It does not have a route to this network in its routing table, so it uses the default static route. Router 2 has the packet arrive on its Serial 0/0/0 interface and forwards it out Serial0/0/1 according to its static route to 192.168.2.0/24. Router 3 receives the packet on Serial0/0/1 and forwards it out its FastEthernet 0/1 interface since it has a connected route to 192.168.2.0/24.
The document discusses network standards and models including:
- Network communication involves recognizing data, dividing it into chunks, and adding information to determine source/destination and for error checking before sending.
- Standards are needed for hardware/software from different vendors to communicate through standard protocols that control tasks like these.
- There are formal standards developed by standards bodies and de facto standards that emerge in the marketplace.
- Key networking standards organizations that develop standards through specification, identification of solutions, and acceptance processes are ANSI, IEEE, ISO, and ITU.
The document discusses a network management model where manager applications communicate with managed objects through management protocols. A manager station runs manager applications to monitor and control network elements through agents using communication protocols. The management pyramid shows different levels of network management from business to element management. Network management involves functional areas like fault, configuration, accounting, and performance management across various network types and stages from planning to operation.
A web browser sends an HTTP request to a web server, which passes the request to the application tier. The application tier makes queries and updates to the database and returns the results to the presentation tier. The presentation tier creates an HTML interface and returns it to the browser to display the results of the request.
This document discusses different types of network delay. It defines network delay as the time it takes for data to travel from one node to another across the network, measured in fractions of seconds. The main types of delay are transmission delay, which is the time to transmit a packet onto an outgoing link; propagation delay, the time for a bit to move from one end of a wire to another; processing delay, the time for a router to process a packet; and queuing delay, the time a packet spends waiting in a queue before being processed. Formulas are provided for calculating transmission delay based on packet length and bandwidth, and propagation delay based on wire length and velocity.
This chapter discusses local area networks (LANs) and wide area networks (WANs). It covers the underlying technologies of wired and wireless Ethernet LANs as well as different types of point-to-point and switched WANs such as Frame Relay and ATM. The chapter also explains how devices like repeaters, bridges, and routers connect LANs and WANs to form internetworks.
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive function. Exercise causes chemical changes in the brain that may help protect against mental illness and improve symptoms for those who already suffer from conditions like anxiety and depression.
An Internet service provider (ISP) is a company that provides individuals and other companies access to the Internet and related services such as website building and hosting. ISPs provide various connectivity options like dial-up, DSL, cable, WiFi, and satellite. When choosing an ISP, factors to consider include uptime commitments, appropriate technology, manageable technical support, price, equipment flexibility and quality, downstream and upstream speeds, security, and availability in your location.
The document provides an overview of the history and development of the Internet, including:
- How the Internet originated from ARPANET and other early networks in the 1960s and 1970s.
- The roles of protocols and standards like TCP/IP in enabling communication across different networks.
- The organizations involved in establishing Internet standards, including standards committees, forums, and regulatory agencies.
- The process through which an Internet specification attains standard status, starting as a draft RFC.
- The key groups that coordinate Internet administration and development, such as ISOC, IAB, IETF, and ICANN.
NWU Wireless provides wireless network access and mobility services to NWU, WISPs, and other individuals through various SSIDs that are segmented by VLANs and VPN connections. The network incorporates wireless controllers, radius servers, a directory server, and a network access control system for authentication, authorization, and accounting of wireless users across the university and partner networks.
This document provides an overview of IPv4 addressing and classful addressing. It discusses IP address classes and how to identify the class of an address. It also covers network addresses, subnetting, and supernetting. The key points are:
- IPv4 addresses are 32-bit addresses divided into classes A, B, C, D and E based on the high-order bits.
- Classful addressing assigns address blocks to networks but wastes many addresses.
- Subnetting and supernetting were introduced to allow better allocation of addresses within classful blocks through the use of subnet and supernet masks.
The document provides an overview of the OSI model and TCP/IP protocol suite. It describes the seven layers of the OSI model and the functions of each layer. It also explains the four layers of the TCP/IP protocol suite and how they correspond to the OSI model. Finally, it discusses the different types of addresses used in TCP/IP including physical, logical, and port addresses.
Este documento presenta un mapa conceptual sobre el cambio y la innovación. Define el cambio como la transición de un estado a otro y la innovación como un cambio que introduce novedades. Explica que el cambio y la innovación están relacionados con la ingeniería de sistemas y la tecnología debido a que los procesos se modifican e incluyen nuevos conocimientos. También señala que el cambio planeado implica un sistema, un agente de cambio y un estado deseado.
This document provides an overview of routing protocols, including intra-domain routing protocols like RIP and OSPF, and inter-domain routing protocols like BGP. It defines intra-domain routing as routing within an autonomous system and inter-domain routing as routing between autonomous systems. The document describes the basic concepts and mechanisms of distance vector routing, link state routing, and path vector routing, and how protocols like RIP, OSPF, and BGP implement these different routing approaches.
Albert Eckhout nasceu na Holanda em 1610 e morreu em 1666, foi pintor e botânico que retratou a população, flora e fauna do Brasil holandês após integrar a comitiva de João Maurício de Nassau a Pernambuco em 1637, onde permaneceu até 1644 desenhando a região nordeste.
The document describes the components and boot sequence of a Cisco router. It includes:
- ROM, flash memory, and NVRAM store the router operating system and configurations.
- During boot, the router performs POST, loads IOS from flash using bootstrap, and loads the startup configuration from NVRAM.
- The configuration register controls the boot process and can force certain modes like ROM monitor for troubleshooting.
This document summarizes Chapter 17 of the TCP/IP Protocol Suite, which discusses the Domain Name System (DNS). The key points covered include:
- The hierarchical structure of domain names and organization of the DNS name space.
- How name resolution works to map names to IP addresses and vice versa through DNS servers and records.
- Common record types like A, PTR, MX and NS records.
- The top-level domains like .com, .edu and country codes as well as the root servers.
- DNS query and response message formats.
- Examples of typical DNS queries and responses.
The Slides Introduction of Computer Network. All about the course will explain in the slides, read to understand what we should learn. Computer Networking is the practice of connecting computers together to enable communication and data exchange between them. In general, Computer Network is a collection of two or more computers. It helps users to communicate more easily. In this article, we are going to discuss the basics which everyone must know before going deep into Computer Networking.
The document discusses network topologies and protocols. It covers basic topologies like bus, ring and star and derived topologies like tree and mesh. It then discusses protocols for unicast, multicast and broadcast transmission. Finally, it discusses concepts like packets, frames, bandwidth and different types of networks classified by size and physical medium.
This document provides an overview of key concepts in computer networking and the structure of the Internet. It begins with definitions of the Internet as a globally connected network of hosts, end systems, and routers. Data transmission occurs through various access networks to residential, institutional, or mobile end systems and then through the network core. In the core, routers forward packets via packet switching, where data is broken into packets that are transmitted over shared network links. The Internet structure is described as a hierarchical "network of networks" with different tiers of Internet service providers. The document outlines various networking technologies and concepts to be covered in more depth later.
This document provides an overview of computer networking and the Internet. It begins with definitions of key terms like protocols, the network edge, and access networks. It then describes the network core and how data is transferred through circuit switching and packet switching. Packet switching uses statistical multiplexing to efficiently share bandwidth and allow more users to access the network compared to circuit switching. The Internet structure forms a hierarchical network of networks with high bandwidth connections between major tier 1 ISPs at the top level.
Computer Networks and Internet.ppt of coitxminahil29
_Happiest birthday patner_"🥺❤️🤭
Many many happy returns of the day ❤️🌏🔐.... may this year brings more happiness 🤗 and success 🥀 for u..... may uh have many more 🥰🫶.... may urhh life be as beautiful as you are 😋🌏🫀..... may ur all desire wishes come true 😌✨🖤..... May uh get double of everything uh want in ur life 🌈💫......you're such a great guy and puri hearted and sweetest girl 🥹🫰🏻🩷....uh deserve all cakes hug an happiness today 🥰👻... hmesha khush rho pyariiii🫣🩷....
Once again happy birthday My Gurl 🥳❤️🔐
_JUG JUG JIYOOO_
The document provides an overview of computer networking and the Internet. It defines what the Internet is, describing it as a network of networks that connects billions of computing devices worldwide. It also defines what a protocol is, explaining that all communication activity on the Internet is governed by protocols that define the format and order of messages sent between network entities. The document further describes the key components of network infrastructure, including end systems, access networks, physical media, and the network core which consists of interconnected routers that forward packets using routing algorithms. It also explains the differences between packet switching and circuit switching in network cores.
The document provides an overview of computer networking and the Internet. It discusses the key components of the network edge such as end systems, access networks, and physical media. It then covers the network core, describing how routers forward packets through packet switching and the overall structure of the Internet as a network of interconnected networks. The document also briefly touches on alternative approaches like circuit switching and issues related to delay, loss and throughput.
The document provides an overview of the key topics that will be covered in Chapter 1 of the textbook "Computer Networking: A Top Down Approach". It outlines the major sections that will be discussed including what the Internet is, the structure of networks including the network edge, core, and hierarchy. It also summarizes that delay, loss, throughput, protocol layers, security, and history will be covered. The goal is to provide an introduction and "feel" for computer networking concepts and terminology that will be explored in more depth throughout the course.
The document discusses a note on the use of PowerPoint slides for a computer networking textbook. It states that the slides are being made freely available for all to use and modify as needed with only two conditions: 1) mentioning the source if used for a class, and 2) noting any adaptation or copyright if posted online. The copyright is held by the authors Jim Kurose and Keith Ross.
A computer network is a collection of interconnected devices that can communicate with each other to share resources and information. These devices can include computers, servers, routers, switches, printers, and more. Networks can vary in size and complexity, from small local networks within a home or office to vast global networks like the internet.
This document provides an introduction to computer networking and the Internet. It begins with an overview of what the Internet is, including its key components like end systems, communication links, and packet switches. It then discusses the network edge, including access networks and physical media. The core network and packet switching are introduced. Sources of delay, loss, and throughput in networks are covered. Finally, the chapter roadmap is provided, outlining topics like protocol layers, network security, and history that will be discussed.
The document discusses an introduction chapter from a computer networking textbook, covering topics such as what the Internet is, network structure including the edge, core, and access networks, protocols, and a brief history of the Internet. It provides an overview of key concepts and terms in computer networking and outlines the structure and content of the introduction chapter.
ELEC 6851 is an introduction to telecommunication networks course offered at Concordia University. The course covers topics such as the transport layer, network layer, and link layer. It also covers wireless and cellular communication. The textbook is "Computer Networking: A Top-Down Approach" and assessments include a midterm, final, and project. More details are provided on the ENCS Moodle page.
This document discusses network access and physical media. It begins by defining the network edge as consisting of end systems or hosts that run applications. It then describes various access network types for connecting hosts, including DSL, cable, fiber, wireless networks, and mobile networks. It also covers the different physical media used for communication links, such as twisted pair copper wire, coaxial cable, fiber optic cable, and wireless radio spectrum.
This document outlines the course plan and materials for an Advanced Computer Networks course. The course will cover topics like computer network principles, various protocol layers, routing, multimedia networking, and network security. Students will be evaluated based on assignments, a project, short paper, and final exam. The recommended textbooks provide an in-depth look at computer networks, networking protocols, and Internet applications.
The document provides an introduction to computer networking concepts. It defines a network as consisting of two or more connected computers that can share resources and information. Networks allow for sharing of hardware, software, data, and centralized administration. There are different types of networks classified by transmission medium (wired vs wireless), size (LAN vs WAN), management method (peer-to-peer vs client/server), and topology (bus, star, ring). Common transmission media include twisted-pair cables, coaxial cables, and fiber-optic cables. LANs are small, local networks while WANs connect multiple LANs over longer distances using technologies like broadband. Client/server networks have dedicated server computers that provide resources to
The document provides an introduction to computer networking concepts. It defines a network as consisting of two or more connected computers that can share resources and information. Networks allow for sharing of hardware, software, files and administration. There are different types of networks classified by transmission medium (wired vs wireless), size (LAN vs WAN), management method (peer-to-peer vs client/server), and topology (bus, star, ring). Common transmission media include twisted-pair cables, coaxial cables, and fiber-optic cables. LANs are small, local networks while WANs connect multiple LANs over longer distances using technologies like broadband. Peer-to-peer networks have no hierarchy while client/server networks
The document provides an introduction to computer networking concepts. It defines a network as consisting of two or more connected computers that can share resources and information. Networks allow for sharing of hardware, software, files and administration. There are different types of networks classified by transmission medium (wired vs wireless), size (LAN vs WAN), management method (peer-to-peer vs client/server), and topology (bus, star, ring). Common transmission media include twisted-pair cables, coaxial cables, and fiber-optic cables. LANs are small, local networks while WANs connect multiple LANs over longer distances using technologies like broadband. Peer-to-peer networks have no hierarchy while client/server networks
This document provides an introduction to computer networks. It begins with an overview of what the Internet is, including its nuts and bolts view as a network of interconnected networks. It describes the network edge, including hosts like clients and servers, and access networks using various physical media. It then discusses the network core, explaining the differences between circuit switching which reserves resources for calls, and packet switching where resources are shared on demand. Packet switching allows for more efficient use of network resources through statistical multiplexing, but can lead to congestion issues. The document provides examples and diagrams to illustrate key networking concepts.
Sept 2017 communication system and protocolsshahin raj
Photonics involves the control and use of photons in various applications. It includes optoelectronics, which uses light in electronics; quantum electronics, which involves light-matter interaction in devices like lasers; and quantum optics, which studies light's quantum properties. Photonic communications specifically applies these photonic technologies to transmit information over long distances using fiber optics. Fibers allow extremely wide bandwidth, are small and lightweight, provide immunity to electromagnetic interference, and enable transmission rates over 1 Gbit/s. Communication protocols and digital/analog transmission ensure error-free and efficient routing of data between senders and receivers.
Routers are network devices that direct traffic between networks using hardware and software for path selection and packet switching. They perform functions like path selection, packet switching, broadcast containment, VLAN linking, and security/access control. Routers operate at the network edge connecting to WAN links and the internet, at the network core as the backbone, and anywhere for tasks like network segmentation and security. A hierarchical network design using routers reduces workload, constrains broadcasts, enhances simplicity and scaling.
1. The document discusses network integration and communication architectures, describing layered network models like OSI and TCP/IP.
2. It explains key aspects of each layer in the OSI model and their functions in facilitating communication across a network.
3. The physical and data link layers deal with physical transmission and frame handling, while higher layers include network, transport, and application layers.
Traditional network design was based on general rules and focused on capacity planning rather than optimization. A top-down approach begins by analyzing customer requirements and applications before selecting devices. The network design life cycle includes phases for analysis, design, implementation, operation, optimization, and retirement. Key aspects of network analysis and design involve understanding customer needs, prioritizing performance requirements, and recognizing necessary trade-offs during optimization.
Network Integration (Multimedia)
This document discusses multimedia networking and integration. It defines multimedia as the digital integration of various media types including text, graphics, images, video, animation and sound. It classifies different media as captured/natural vs synthesized/artificial, and discrete vs continuous. The document then discusses considerations for networked multimedia including large data sizes, real-time requirements, and best-effort networks. It also covers multimedia networking systems, protocols, and technologies like compression to address bandwidth limitations.
1. Asynchronous Transfer Mode (ATM) is a cell-switching and multiplexing technology that combines the benefits of circuit switching and packet switching. It uses fixed-length cells to carry information across networks.
2. ATM networks are built using ATM switches and end-points. Switches are connected via User-Network Interfaces (UNI) and Network-Network Interfaces (NNI). Common ATM end-points include workstations, routers, and video codecs.
3. ATM provides guaranteed bandwidth through virtual circuits established over packet-switched networks. It is highly scalable and efficient for transmitting voice and video due to its small, fixed-length cells.
Dynamic routing protocols dynamically share routing information between routers to automatically update routing tables when network topologies change and determine the best path to destinations. They discover remote networks, maintain up-to-date routing information, choose the best path to destination networks, and find new paths when the current path is unavailable. Dynamic routing protocols are grouped and classified based on their routing algorithm, protocol messages, whether they are interior or exterior gateway protocols, and if they are distance vector or link state protocols.
The document provides an overview of key internet technologies including how the internet works via packet switching, e-commerce models, file transfer protocol (FTP), hypertext transfer protocol (HTTP), hypertext markup language (HTML), really simple syndication (RSS), PHP, Apache web server, MySQL database, database servers, stored procedures, authentication, roles of e-commerce like e-mail and electronic shopping, advantages and disadvantages of e-commerce, virtual servers, a brief history and functions of PHP, dynamic content, domain names, web hosting servers, and how hosting provides the infrastructure for a website.
This document summarizes the key ways that a person can become a Malaysian citizen according to the Constitution:
1. Citizenship can be acquired by operation of law, such as being born in Malaysia to Malaysian parents.
2. Citizenship can also be obtained through registration, such as a woman marrying a Malaysian citizen.
3. A person over age 21 can apply for naturalization if they have lived in Malaysia for a period of time and intend to reside permanently.
4. When new territories join Malaysia, Parliament will determine citizenship for residents of those areas.
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsVictor Morales
K8sGPT is a tool that analyzes and diagnoses Kubernetes clusters. This presentation was used to share the requirements and dependencies to deploy K8sGPT in a local environment.
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTjpsjournal1
The rivalry between prominent international actors for dominance over Central Asia's hydrocarbon
reserves and the ancient silk trade route, along with China's diplomatic endeavours in the area, has been
referred to as the "New Great Game." This research centres on the power struggle, considering
geopolitical, geostrategic, and geoeconomic variables. Topics including trade, political hegemony, oil
politics, and conventional and nontraditional security are all explored and explained by the researcher.
Using Mackinder's Heartland, Spykman Rimland, and Hegemonic Stability theories, examines China's role
in Central Asia. This study adheres to the empirical epistemological method and has taken care of
objectivity. This study analyze primary and secondary research documents critically to elaborate role of
china’s geo economic outreach in central Asian countries and its future prospect. China is thriving in trade,
pipeline politics, and winning states, according to this study, thanks to important instruments like the
Shanghai Cooperation Organisation and the Belt and Road Economic Initiative. According to this study,
China is seeing significant success in commerce, pipeline politics, and gaining influence on other
governments. This success may be attributed to the effective utilisation of key tools such as the Shanghai
Cooperation Organisation and the Belt and Road Economic Initiative.
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Sinan KOZAK
Sinan from the Delivery Hero mobile infrastructure engineering team shares a deep dive into performance acceleration with Gradle build cache optimizations. Sinan shares their journey into solving complex build-cache problems that affect Gradle builds. By understanding the challenges and solutions found in our journey, we aim to demonstrate the possibilities for faster builds. The case study reveals how overlapping outputs and cache misconfigurations led to significant increases in build times, especially as the project scaled up with numerous modules using Paparazzi tests. The journey from diagnosing to defeating cache issues offers invaluable lessons on maintaining cache integrity without sacrificing functionality.
Batteries -Introduction – Types of Batteries – discharging and charging of battery - characteristics of battery –battery rating- various tests on battery- – Primary battery: silver button cell- Secondary battery :Ni-Cd battery-modern battery: lithium ion battery-maintenance of batteries-choices of batteries for electric vehicle applications.
Fuel Cells: Introduction- importance and classification of fuel cells - description, principle, components, applications of fuel cells: H2-O2 fuel cell, alkaline fuel cell, molten carbonate fuel cell and direct methanol fuel cells.
Literature Review Basics and Understanding Reference Management.pptxDr Ramhari Poudyal
Three-day training on academic research focuses on analytical tools at United Technical College, supported by the University Grant Commission, Nepal. 24-26 May 2024
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesChristina Lin
Traditionally, dealing with real-time data pipelines has involved significant overhead, even for straightforward tasks like data transformation or masking. However, in this talk, we’ll venture into the dynamic realm of WebAssembly (WASM) and discover how it can revolutionize the creation of stateless streaming pipelines within a Kafka (Redpanda) broker. These pipelines are adept at managing low-latency, high-data-volume scenarios.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.
1. Introduction
Overview:
• what’s the Internet?
• what’s a protocol?
• network edge; hosts, access net,
physical media
• network core: packet/circuit
switching, Internet structure
• performance: loss, delay, throughput
• security
• protocol layers, service models
• history
1-1
2. 1.1 What is the Internet?
1.2 Network edge
end systems, access networks, links
1.3 Network core
circuit switching, packet switching, network structure
1.4 Delay, loss and throughput in packet-switched
networks
1.5 Protocol layers, service models
1.6 Networks under attack: security
1.7 History
1-2
3. What’s the Internet: “nuts and bolts” view
• millions of connected
computing devices: hosts
= end systems
– running network apps
1-3
Home network
Institutional network
Mobile network
Global ISP
Regional ISP
router
PC
server
wireless
laptop
cellular
handheld
wired
links
access
points
communication links
fiber, copper, radio,
satellite
transmission rate =
bandwidth
routers: forward packets
(chunks of data)
4. What’s the Internet: “nuts and bolts” view
• protocols control sending,
receiving of msgs
– e.g., TCP, IP, HTTP, Skype,
Ethernet
• Internet: “network of
networks”
– loosely hierarchical
– public Internet versus private
intranet
• Internet standards
– RFC: Request for comments
– IETF: Internet Engineering Task
Force
1-4
Home network
Institutional network
Mobile network
Global ISP
Regional ISP
5. What’s the Internet: a service view
• communication infrastructure
enables distributed applications:
– Web, VoIP, email, games, e-
commerce, file sharing
• communication services
provided to apps:
– reliable data delivery from
source to destination
– “best effort” (unreliable) data
delivery
1-5
6. What’s a protocol?
human protocols:
• “what’s the time?”
• “I have a question”
• introductions
… specific msgs sent
… specific actions taken
when msgs received, or
other events
network protocols:
• machines rather than
humans
• all communication activity
in Internet governed by
protocols
1-6
protocols define format, order of
msgs sent and received among
network entities, and actions
taken on msg transmission,
receipt
7. What’s a protocol?
a human protocol and a computer network protocol:
1-7
Hi
Hi
Got the
time?
2:00
TCP connection
request
TCP connection
response
Get http://www.awl.com/kurose-ross
<file>
time
8. 1.1 What is the Internet?
1.2 Network edge
end systems, access networks, links
1.3 Network core
circuit switching, packet switching, network structure
1.4 Delay, loss and throughput in packet-switched
networks
1.5 Protocol layers, service models
1.6 Networks under attack: security
1.7 History
1-8
9. A closer look at network structure:
• network edge:
applications and hosts
1-9
access networks,
physical media: wired,
wireless
communication links
network core:
interconnected routers
network of networks
10. The network edge:
• end systems (hosts):
– run application programs
– e.g. Web, email
– at “edge of network”
1-10
client/server
peer-peer
client/server model
client host requests, receives service
from always-on server
e.g. Web browser/server; email
client/server
peer-peer model:
minimal (or no) use of dedicated
servers
e.g. Skype, BitTorrent
16. Wireless access networks
• shared wireless access network
connects end system to router
– via base station aka “access point”
• wireless LANs:
– 802.11b/g (WiFi): 11 or 54 Mbps
• wider-area wireless access
– provided by telco operator
– ~2Mbps over cellular system (EVDO,
UMTS, HSPA)
– Next 4G: WiMAX (10’s Mbps) and
LTE over wide area
1-16
base
station
mobile
hosts
router
17. Home networks
Typical home network components:
• DSL or cable modem
• router/firewall/NAT
• Ethernet
• wireless access
point
1-17
wireless
access
point
wireless
laptops
router/
firewall
cable
modem
to/from
cable
headend
Ethernet
18. Physical Media
• Bit: propagates between
transmitter/rcvr pairs
• physical link: what lies
between transmitter & receiver
• guided media:
– signals propagate in solid media:
copper, fiber, coax
• unguided media:
– signals propagate freely, e.g.,
radio
Twisted Pair (TP)
• two insulated copper wires
– Category 3: traditional
phone wires, 10 Mbps
Ethernet
– Category 5:
100Mbps Ethernet
1-18
19. Physical Media: coax, fiber
Coaxial cable:
• two concentric copper
conductors
• bidirectional
• baseband:
– single channel on cable
– legacy Ethernet
• broadband:
– multiple channels on cable
– HFC
1-19
Fiber optic cable:
glass fiber carrying light
pulses, each pulse a bit
high-speed operation:
high-speed point-to-point
transmission (e.g., 10’s-100’s
Gps)
low error rate: repeaters
spaced far apart ; immune to
electromagnetic noise
20. Physical media: radio
• signal carried in
electromagnetic spectrum
• no physical “wire”
• bidirectional
• propagation environment
effects:
– reflection
– obstruction by objects
– interference
1-20
Radio link types:
terrestrial microwave
e.g. up to 45 Mbps channels
LAN (e.g., Wifi)
11Mbps, 54 Mbps, 300 Mbps
wide-area (e.g., cellular)
3G cellular: ~ 1 Mbps
4G cellular: ~ 21 Mbps
satellite
Kbps to 45Mbps channel (or
multiple smaller channels)
270 msec end-end delay
geosynchronous versus low
altitude
21. 1.1 What is the Internet?
1.2 Network edge
end systems, access networks, links
1.3 Network core
circuit switching, packet switching, network structure
1.4 Delay, loss and throughput in packet-switched
networks
1.5 Protocol layers, service models
1.6 Networks under attack: security
1.7 History
1-21
22. The Network Core
• mesh of interconnected
routers
• the fundamental question:
how is data transferred
through net?
– circuit switching:
dedicated circuit per call:
telephone net
– packet-switching: data
sent thru net in discrete
“chunks”
1-22
23. Network Core: Circuit Switching
End-end resources
reserved for “call”
• link bandwidth, switch
capacity
• dedicated resources: no
sharing
• circuit-like (guaranteed)
performance
• call setup required
1-23
24. Network Core: Circuit Switching
network resources (e.g.,
bandwidth) divided into
“pieces”
• pieces allocated to calls
• resource piece idle if not
used by owning call (no
sharing)
1-24
dividing link bandwidth into
“pieces”
frequency division
time division
25. Circuit Switching: FDM and TDM
1-25
FDM
frequency
time
TDM
frequency
time
4 users
Example:
26. Network Core: Packet Switching
each end-end data stream divided
into packets
• user A, B packets share
network resources
• each packet uses full link
bandwidth
• resources used as needed
1-26
resource contention:
aggregate resource demand
can exceed amount
available
congestion: packets queue,
wait for link use
store and forward: packets
move one hop at a time
Node receives complete packet
before forwardingBandwidth division into “pieces”
Dedicated allocation
Resource reservation
27. Packet Switching: Statistical Multiplexing
Sequence of A & B packets does not have fixed pattern, bandwidth
shared on demand statistical multiplexing.
TDM: each host gets same slot in revolving TDM frame.
1-27
A
B
C
100 Mb/s
Ethernet
1.5 Mb/s
D E
statistical multiplexing
queue of packets
waiting for output
link
28. Packet-switching: store-and-forward
• takes L/R seconds to
transmit (push out) packet
of L bits on to link at R bps
• store and forward: entire
packet must arrive at
router before it can be
transmitted on next link
• delay = 3L/R (assuming
zero propagation delay)
Example:
• L = 7.5 Mbits
• R = 1.5 Mbps
• transmission delay = 15
sec
1-28
R R R
L
29. Internet structure: network of networks
• roughly hierarchical
• at center: “tier-1” ISPs (e.g., Verizon, Sprint, AT&T, Cable and
Wireless), national/international coverage
– treat each other as equals
1-29
Tier 1 ISP
Tier 1 ISP
Tier 1 ISP
Tier-1
providers
interconnect
(peer)
privately
30. Internet structure: network of networks
• “Tier-2” ISPs: smaller (often regional) ISPs
– Connect to one or more tier-1 ISPs, possibly other tier-2 ISPs
1-30
Tier 1 ISP
Tier 1 ISP
Tier 1 ISP
Tier-2 ISPTier-2 ISP
Tier-2 ISP Tier-2 ISP
Tier-2 ISP
Tier-2 ISP pays
tier-1 ISP for
connectivity to rest
of Internet
tier-2 ISP is
customer of
tier-1 provider
Tier-2 ISPs also
peer privately
with each other.
31. Internet structure: network of networks
• “Tier-3” ISPs and local ISPs
– last hop (“access”) network (closest to end systems)
1-31
Tier 1 ISP
Tier 1 ISP
Tier 1 ISP
Tier-2 ISPTier-2 ISP
Tier-2 ISP Tier-2 ISP
Tier-2 ISP
local
ISP
local
ISP
local
ISP
local
ISP
local
ISP Tier 3
ISP
local
ISP
local
ISP
local
ISP
Local and tier- 3
ISPs are
customers of
higher tier ISPs
connecting them
to rest of Internet
32. Internet structure: network of networks
• a packet passes through many networks!
1-32
Tier 1 ISP
Tier 1 ISP
Tier 1 ISP
Tier-2 ISPTier-2 ISP
Tier-2 ISP Tier-2 ISP
Tier-2 ISP
local
ISP
local
ISP
local
ISP
local
ISP
local
ISP Tier 3
ISP
local
ISP
local
ISP
local
ISP
33. 1.1 What is the Internet?
1.2 Network edge
end systems, access networks, links
1.3 Network core
circuit switching, packet switching, network structure
1.4 Delay, loss and throughput in packet-switched
networks
1.5 Protocol layers, service models
1.6 Networks under attack: security
1.7 History
1-33
34. How do loss and delay occur?
packets queue in router buffers
• packet arrival rate to link exceeds output link capacity
• packets queue, wait for turn
1-34
A
B
packet being transmitted (delay)
packets queueing (delay)
free (available) buffers: arriving packets
dropped (loss) if no free buffers
35. Four sources of packet delay
• 1. nodal processing:
– check bit errors
– determine output link
1-35
A
B
propagation
transmission
nodal
processing queueing
2. queueing
time waiting at output link
for transmission
depends on congestion level
of router
36. Delay in packet-switched networks
3. Transmission delay:
• R=link bandwidth (bps)
• L=packet length (bits)
• time to send bits into link
= L/R
4. Propagation delay:
• d = length of physical link
• s = propagation speed in
medium (~2x108
m/sec)
• propagation delay = d/s
1-36
A
B
propagation
transmission
nodal
processing queueing
Note: s and R are very
different quantities!
37. Nodal delay
• dproc = processing delay
– typically a few microsecs or less
• dqueue = queuing delay
– depends on congestion
• dtrans = transmission delay
– = L/R, significant for low-speed links
• dprop = propagation delay
– a few microsecs to hundreds of msecs
1-37
proptransqueueprocnodal ddddd +++=
38. Queueing delay (revisited)
• R=link bandwidth (bps)
• L=packet length (bits)
• a=average packet arrival
rate
1-38
traffic intensity = La/R
La/R ~ 0: average queueing delay small
La/R -> 1: delays become large
La/R > 1: more “work” arriving than can be
serviced, average delay infinite!
39. Packet loss
• queue (buffer) preceding link in buffer has
finite capacity
• packet arriving to full queue dropped (lost)
• lost packet may be retransmitted by previous
node, by source end system, or not at all
1-39
A
B
packet being transmitted
packet arriving to
full buffer is lost
buffer
(waiting area)
40. Throughput
• throughput: rate (bits/time unit) at which
bits transferred between sender/receiver
– instantaneous: rate at given point in time
– average: rate over longer period of time
1-40
server, with
file of F bits
to send to client
link capacity
Rs bits/sec
link capacity
Rc bits/sec
pipe that can carry
fluid at rate
Rs bits/sec)
pipe that can carry
fluid at rate
Rc bits/sec)
server sends bits
(fluid) into pipe
41. 1.1 What is the Internet?
1.2 Network edge
end systems, access networks, links
1.3 Network core
circuit switching, packet switching, network structure
1.4 Delay, loss and throughput in packet-switched
networks
1.5 Protocol layers, service models
1.6 Networks under attack: security
1.7 History
1-41
42. Protocol “Layers”
Networks are complex!
• many “pieces”:
– hosts
– routers
– links of various
media
– applications
– protocols
– hardware, software
Question:
Is there any hope of
organizing structure of
network?
Or at least our discussion of
networks?
1-42
43. Organization of air travel
• a series of steps
1-43
ticket (purchase)
baggage (check)
gates (load)
runway takeoff
airplane routing
ticket (complain)
baggage (claim)
gates (unload)
runway landing
airplane routing
airplane routing
44. Layering of airline functionality
Layers: each layer implements a service
– via its own internal-layer actions
– relying on services provided by layer below
1-44
ticket (purchase)
baggage (check)
gates (load)
runway (takeoff)
airplane routing
departure
airport
arrival
airport
intermediate air-traffic
control centers
airplane routing airplane routing
ticket (complain)
baggage (claim
gates (unload)
runway (land)
airplane routing
ticket
baggage
gate
takeoff/landing
airplane routing
45. Why layering?
Dealing with complex systems:
• explicit structure allows identification, relationship of
complex system’s pieces
– layered reference model for discussion
• modularization eases maintenance, updating of system
– change of implementation of layer’s service
transparent to rest of system
– e.g., change in gate procedure doesn’t affect
rest of system
1-45
46. Internet protocol stack
• application: supporting network
applications
– FTP, SMTP, HTTP
• transport: process-process data transfer
– TCP, UDP
• network: routing of datagrams from
source to destination
– IP, routing protocols
• link: data transfer between neighboring
network elements
– PPP, Ethernet
• physical: bits “on the wire”
1-46
application
transport
network
link
physical
47. ISO/OSI reference model
• presentation: allow applications to
interpret meaning of data, e.g.,
encryption, compression, machine-
specific conventions
• session: synchronization, checkpointing,
recovery of data exchange
1-47
application
presentation
session
transport
network
link
physical
49. 1.1 What is the Internet?
1.2 Network edge
end systems, access networks, links
1.3 Network core
circuit switching, packet switching, network structure
1.4 Delay, loss and throughput in packet-switched
networks
1.5 Protocol layers, service models
1.6 Networks under attack: security
1.7 History
1-49
50. Network Security
• The field of network security is about:
– how bad guys can attack computer networks
– how we can defend networks against attacks
– how to design architectures that are immune to
attacks
1-50
51. Malware into hosts via Internet
• Malware can get in host from a virus, worm, or trojan
horse.
• Spyware malware can record keystrokes, web sites visited,
upload info to collection site.
• Infected host can be enrolled in a botnet, used for spam
and DDoS attacks.
• Malware is often self-replicating: from an infected host,
seeks entry into other hosts
1-51
52. Malware into hosts via Internet
• Trojan horse
– Hidden part of some
otherwise useful software
– Today often on a Web page
(Active-X, plugin)
• Virus
– infection by receiving object
(e.g., e-mail attachment),
actively executing
– self-replicating: propagate
itself to other hosts, users
1-52
Worm:
infection by passively receiving
object that gets itself executed
self- replicating: propagates to
other hosts, users
Sapphire Worm: aggregate scans/sec
in first 5 minutes of outbreak (CAIDA, UWisc data)
53. Attack on servers and network infrastructure
• Denial of service (DoS): attackers make resources (server,
bandwidth) unavailable to legitimate traffic by overwhelming
resource with bogus traffic
1-53
1. select target
2. break into hosts around
the network (see botnet)
3. send packets toward target
from compromised hosts target
54. Packet sniffing
– broadcast media (shared Ethernet, wireless)
– promiscuous network interface reads/records all
packets (e.g., including passwords!) passing by
1-54
A
B
C
src:B dest:A payload
Wireshark software used for end-of-chapter labs is a
(free) packet-sniffer
55. False source addresses
• IP spoofing: send packet with false source address
1-55
A
B
C
src:B dest:A payload
56. 1.1 What is the Internet?
1.2 Network edge
end systems, access networks, links
1.3 Network core
circuit switching, packet switching, network structure
1.4 Delay, loss and throughput in packet-switched
networks
1.5 Protocol layers, service models
1.6 Networks under attack: security
1.7 History
1-56
57. Internet History
• 1961: Kleinrock - queueing
theory shows effectiveness of
packet-switching
• 1964: Baran - packet-
switching in military nets
• 1967: ARPAnet conceived by
Advanced Research Projects
Agency
• 1969: first ARPAnet node
operational
• 1972:
– ARPAnet public demonstration
– NCP (Network Control Protocol) first
host-host protocol
– first e-mail program
– ARPAnet has 15 nodes
1-57
1961-1972: Early packet-switching principles
58. Internet History
• 1970: ALOHAnet satellite network
in Hawaii
• 1974: Cerf and Kahn - architecture
for interconnecting networks
• 1976: Ethernet at Xerox PARC
• ate70’s: proprietary architectures:
DECnet, SNA, XNA
• late 70’s: switching fixed length
packets (ATM precursor)
• 1979: ARPAnet has 200 nodes
Cerf and Kahn’s internetworking
principles:
– minimalism, autonomy - no
internal changes required to
interconnect networks
– best effort service model
– stateless routers
– decentralized control
define today’s Internet architecture
1-58
1972-1980: Internetworking, new and proprietary nets
59. Internet History
• 1983: deployment of
TCP/IP
• 1982: smtp e-mail
protocol defined
• 1983: DNS defined for
name-to-IP-address
translation
• 1985: ftp protocol defined
• 1988: TCP congestion
control
• new national networks:
Csnet, BITnet, NSFnet,
Minitel
• 100,000 hosts connected
to confederation of
networks
1-59
1980-1990: new protocols, a proliferation of networks
60. Internet History
• Early 1990’s: ARPAnet
decommissioned
• 1991: NSF lifts restrictions on
commercial use of NSFnet
(decommissioned, 1995)
• early 1990s: Web
– hypertext [Bush 1945, Nelson
1960’s]
– HTML, HTTP: Berners-Lee
– 1994: Mosaic, later Netscape
– late 1990’s: commercialization of
the Web
Late 1990’s – 2000’s:
• more killer apps: instant
messaging, P2P file sharing
• network security to forefront
• est. 50 million host, 100 million+
users
• backbone links running at Gbps
1-60
1990, 2000’s: commercialization, the Web, new apps
61. Internet History
2007 – till
• ~500 million hosts
• Voice, Video over IP
• P2P applications: BitTorrent (file
sharing) Skype (VoIP), PPLive
(video)
• more applications: YouTube,
gaming
• wireless, mobility
1-61
Editor's Notes
Two simple multiple access control techniques.
Each mobile’s share of the bandwidth is divided into portions for the uplink and the downlink. Also, possibly, out of band signaling.
As we will see, used in AMPS, GSM, IS-54/136