0% found this document useful (0 votes)
130 views14 pages

Computer Networking: A Top Down Approach: A Note On The Use of These PPT Slides

Uploaded by

Fegan Shukurov
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
130 views14 pages

Computer Networking: A Top Down Approach: A Note On The Use of These PPT Slides

Uploaded by

Fegan Shukurov
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 14

Chapter 1

Introduction

A note on the use of these ppt slides:


We’re making these slides freely available to all (faculty, students, readers). Computer
They’re in PowerPoint form so you see the animations; and can add, modify,
and delete slides (including this one) and slide content to suit your needs. Networking: A Top
They obviously represent a lot of work on our part. In return for use, we only
ask the following: Down Approach
 If you use these slides (e.g., in a class) that you mention their source
(after all, we’d like people to use our book!)
6th edition
 If you post any slides on a www site, that you note that they are adapted Jim Kurose, Keith Ross
from (or perhaps identical to) our slides, and note our copyright of this Addison-Wesley
material.
March 2012
Thanks and enjoy! JFK/KWR

All material copyright 1996-2012


J.F Kurose and K.W. Ross, All Rights Reserved

Introduction 1-1
Chapter 1: introduction
our goal: overview:
• get “feel” and • what’s the Internet?

terminology • what’s a protocol?

• more depth, detail • network edge; hosts, access net,


physical media
later in course • network core: packet/circuit
• approach: switching, Internet structure
– use Internet as • performance: loss, delay, throughput
example • security
• protocol layers, service models
• history

Introduction 1-2
Chapter 1: roadmap
1.1 what is the Internet?
1.2 network edge
 end systems, access networks, links
1.3 network core
 packet switching, circuit switching, network structure
1.4 delay, loss, throughput in networks
1.5 protocol layers, service models
1.6 networks under attack: security
1.7 history

Introduction 1-3
What’s the Internet: “nuts and bolts” view
PC • millions of connected computing mobile network
server devices:

wireless
– hosts = end systems global ISP
laptop – running network apps
smartphone
home
 communication links network
 fiber, copper, radio, regional ISP
wireless satellite
links  transmission rate:
wired bandwidth
links

 Packet switches: forward packets


router (chunks of data) institutional
 routers and switches network

Introduction 1-4
“Fun” internet appliances

Web-enabled toaster +
weather forecaster

IP picture frame
http://www.ceiva.com/

Tweet-a-watt:
monitor energy use

Slingbox: watch,
control cable TV remotely
Internet
refrigerator Internet phones
Introduction 1-5
What’s the Internet: “nuts and bolts” view
mobile network
• Internet: “network of networks”
– Interconnected ISPs global ISP
• protocols control sending,
receiving of msgs home
– e.g., TCP, IP, HTTP, Skype, 802.11 network
regional ISP
• Internet standards
– RFC: Request for comments
– IETF: Internet Engineering Task
Force

institutional
network

Introduction 1-6
What’s the Internet: a service view
mobile network
• Infrastructure that provides
services to applications: global ISP

– Web, VoIP, email, games, e-


commerce, social nets, … home
network
• provides programming interface regional ISP
to apps
– hooks that allow sending and
receiving app programs to
“connect” to Internet
– provides service options,
analogous to postal service
institutional
network

Introduction 1-7
What’s a protocol?
human protocols: network protocols:
• “what’s the time?” • machines rather than
• “I have a question” humans
• introductions • all communication activity
in Internet governed by
protocols
… specific msgs sent
… specific actions taken protocols define format,
when msgs received, or order of msgs sent and
other events received among network
entities, and actions taken
on msg transmission,
Introduction
receipt 1-8
What’s a protocol?
a human protocol and a computer network protocol:

Hi TCP connection
request
Hi TCP connection
response
Got the
time? Get http://www.awl.com/kurose-ross
2:00
<file>
time

Q: other human protocols?


Introduction 1-9
Chapter 1: roadmap
1.1 what is the Internet?
1.2 network edge
 end systems, access networks, links
1.3 network core
 packet switching, circuit switching, network structure
1.4 delay, loss, throughput in networks
1.5 protocol layers, service models
1.6 networks under attack: security
1.7 history

Introduction 1-10
The network edge:
• end systems (hosts):
– run application programs
– e.g. Web, email
– at “edge of network”

• client/server model
– e.g. Web browser/server; email
client/server
– Distributed applications

• peer-peer model:
– minimal (or no) use of
dedicated servers
– e.g. Skype, BitTorrent

11
Network edge: connection-oriented service

Goal: data transfer between


TCP
end service
systems [RFC 793]
• handshaking: setup a connection
• reliable, in-order
for data transfer
byte-
ahead of time stream data transfer
– loss: acknowledgements
• TCP - Transmission Control Protocol and retransmissions
• flow
– Internet’s connection-oriented control:
service
– sender won’t overwhelm
receiver
• congestion control:
– senders “slow down sending
rate” when network
congested

12
Network edge: connectionless service

Goal: data transfer between end systems


• UDP - User Datagram Protocol [RFC 768]:
– No handshaking – less work!
– Less delay
– Internet’s connectionless service
• unreliable data transfer
• no flow control
• no congestion control

13
TCP vs. UDP

App’s using TCP:


• HTTP (Web), FTP (file transfer), Telnet
(remote login), SMTP (email)

App’s using UDP:


• streaming media, teleconferencing, DNS,
Internet telephony, network games

14

You might also like