0% found this document useful (0 votes)
24 views

Lecture 01 - 05 Introduction-final

Uploaded by

fefavop474
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views

Lecture 01 - 05 Introduction-final

Uploaded by

fefavop474
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 111

Course Instructor:

Dr. Sheneela Naz


[email protected]
 Data Communication is the exchange of data between two nodes via some form of
link.
A network consists of two or more computers that are linked in
order to share resources, exchange files, or allow
communications. The computers on a network may be linked
through cables, telephone lines, radio waves, satellites, or
infrared light beams.

Introduction: 1-3
Introduction: 1-4
 Introduction and overview: Internet?, Network edge: Client Server Programs;
Access Networks and Physical Media; Network Core: Circuit Switching vs. Packet
switching; Protocol layers and their service models: Layered Architecture,
Messages, Segments, Datagrams and Frames
 Application Layer: HTTP, FTP, DNS, P2P file distribution
 Transport Layer: Transport Layer Services, Multiplexing, De-multiplexing; UDP:
segment structure, Checksum; Connection Oriented TCP: Connection, segment
structure, RTT estimation and timeout
 Network Layer: Virtual Circuits and datagram networks; IP protocol: Datagram
format; Routing algorithms: Distance Vector and Link state routing protocols
 Link Layer: Link layer services; Error detection techniques; Multiple access
protocols; Random Access Protocols; link layer addressing (ARP); link layer
switches
 Physical Layer: Analog and Digital Data; Transmission Impairments; Wireless and
Mobile Networks
 Mobility management principles and Security in Computer Networks
 Text Book:
 Computer Networking: A Top Down Approach, Kurose, J.F. &Ross, K.W., 7 th Edition (2017),
Addison Wesley.
 Reference Books:
 Computer Networks and Internets, Comer, D.E., 6 th Edition (2014), Addison Wesley.
 Networking: A Beginner's Guide, Hallberg, B., 6th Edition (2013), McGraw Hill.
 Computer Networks, Tannenbaum, 5th Edition (2010), Andrew S. Tenanbaum, David
J.Wetherall
Theory (100 %) Lab (100 %)

Quizzes (4) 15 % Assignments (4) 25 %

Assignments (4) 10 % Mid 25 %

Mid 25 % Lab Project 50 %

Terminal (1) 50 %

Note: Strick policy for the cheating in any of the artifact especially assignments.
8
1. Describe the basic network components, services,
technologies and layered network architecture
2. Demonstrate the functionality of each layer using
networking tools.
3. Develop simple network applications.
4. Describe the basic issues in Mobile Networks and
Network Security.

9
Chapter 1: Introduction, Computer Networking: A Top-Down Approach,
8th edition, Jim Kurose, Keith Ross, Pearson, 2020
 What is the Internet?
 What is a protocol?
 Network edge: hosts, access network, physical media
 Network core: packet/circuit switching, internet structure
 Performance: loss, delay, throughput
 Security
 Protocol layers, service models
 History
The Internet: a “nuts and bolts” view
Billions of connected mobile network
computing devices: national or global ISP
 hosts = end systems
 running network apps at
Internet’s “edge”

Packet switches: forward


local or
packets (chunks of data) Internet
regional ISP
 routers, switches
home network content
Communication links provider
network datacenter
 fiber, copper, radio, satellite network

 transmission rate: bandwidth


Networks enterprise
 collection of devices, routers, network
links: managed by an organization
Introduction: 1-12
The Internet: a “nuts and bolts” view
mobile network
4G
 Internet: “network of networks” national or global ISP

• Interconnected ISPs
 Protocols: IP
Streaming
Skype video
 set of rules that determine
• how data is transmitted between different devices
in the same network. local or
regional ISP
• control sending, receiving of messages
• e.g., HTTP (Web), streaming video, Skype, TCP, IP,
WiFi, 4G, Ethernet home network content
provider
 Internet standards HTTP network datacenter
network
• a technology or methodology applicable to Ethernet
the Internet.
• Internet Standards are created and published TCP
by the Internet Engineering Task Force (IETF). enterprise
network
• RFC: Request for Comments
WiFi
Introduction: 1-13
What’s a protocol?
Human protocols: Network protocols:
 “what’s the time?”  computers (devices) rather than humans
 “I have a question”  all communication activity in Internet
 introductions governed by protocols

… specific messages sent


Protocols define the format, order of
… specific actions taken
when message received, messages sent and received among
or other events network entities, and actions taken
on msg transmission, receipt

Introduction: 1-14
What’s a protocol?
A human protocol and a computer network protocol:

Hi TCP connection
request
Hi TCP connection
response
Got the
time? GET http://gaia.cs.umass.edu/kurose_ross
2:00
<file>
time

Q: other human protocols?


Introduction: 1-15
Chapter 1: roadmap
 What is the Internet?
 What is a protocol?
 Network edge: hosts, access network,
physical media
 Network core: packet/circuit
switching, internet structure
 Performance: loss, delay, throughput
 Security
 Protocol layers, service models
 History
Introduction: 1-16
A closer look at Internet structure
mobile network

Network edge: national or global ISP

refers to endpoints
 personal computers (PCs),
adapters, modems, and the devices local or
regional ISP
that connect to them.
home network
 hosts: clients and servers content
provider
network datacenter
 servers often in data centers network

enterprise
network

Introduction: 1-17
A closer look at Internet structure
mobile network

Network edge: national or global ISP

 hosts: clients and servers


 servers often in data centers
local or
Access networks, physical media: regional ISP

wired, wireless communication links home network content


provider
network datacenter
network

enterprise
network

Introduction: 1-18
A closer look at Internet structure
mobile network

Network edge: national or global ISP

 hosts: clients and servers


 servers often in data centers
Access networks, physical media:
local or
 wired, wireless communication links regional ISP

Network core: home network content


provider
network
A core network is the infrastructure datacenter
network
that connects together the different
networks
 interconnected routers enterprise
 network of networks network

Introduction: 1-19
Access networks and physical media
Q: How to connect end systems to edge router?
 enterprise access networks, mobile network
 a local area network ( LAN ) is used to national or global ISP
connect an end system to an edge router
 residential access nets
 institutional access networks (school, company)
 mobile access networks (WiFi, 4G/5G)
What do you use an edge router for?
local or
 An edge router is a specialized router regional ISP
• located at a network boundary
• that enables an internal network to connect to home network content
external networks. provider
network datacenter
network

enterprise
network

Introduction: 1-20
Access networks and physical media
What to look for: mobile network

 transmission rate (bits per second) of access national or global ISP


network?
 shared or dedicated access among users?
• Dedicated Internet access
• provides guaranteed bandwidth at all times.
• If a business subscribes to a 100 Mbps dedicated local or
regional ISP
Internet connection,
• it will always have access to 100 Mbps of
home network content
bandwidth. provider
• Shared internet access (SIA) is a single connection that network datacenter
is shared between a number of users network

• If a business subscribes to a 100 Mbps shared Internet


connection,
• it may get 100 Mbps of bandwidth at certain times, enterprise
• receive far less bandwidth during peak traffic periods network
when other subscribers are also using the connection.
Introduction: 1-21
Chapter 1: Introduction, Computer Networking: A Top-Down Approach,
8th edition, Jim Kurose, Keith Ross, Pearson, 2020
Data flow can occur in three ways:
 Simplex: In simplex mode, the communication is
• unidirectional.
• only one of the devices on a link can transmit, the
other can only receive.
• e.g. keyboards, monitors, etc.
 Half-duplex: In this mode, each station can
• both transmit and receive, but not at the same time.
• When one device is sending, the other can only receive,
and vice-versa.
• e.g. walkie-talkies, CB(citizens band) etc.
 Full Duplex : In full duplex mode,
• both stations can transmit and receive simultaneously.
• One common example of full duplex is the Telephone
network.
• When two people are communicating by a telephone
line, both can talk and listen at the same time.
• The full-duplex mode is used when communication in
both directions is required all the time. Introduction: 1-23
Wireless access networks
Shared wireless access network connects end system to router
 via base station aka “access point”

Wide-area cellular access networks  provided by mobile, cellular network


 connects individual devices to operator (10’s km)
other parts of a network through a  10’s Mbps
radio link.  4G cellular networks (5G coming)
 evolved from the first generation
(1G) to the fifth generation (5G) of
cellular networking

to Internet

Introduction: 1-24
Wireless access networks
Shared wireless access network connects end system to router
 via base station aka “access point”

Wireless local area networks (WLANs)


 allows devices to connect and communicate wirelessly
 traditional wired LAN,
 devices communicate over Ethernet cables,
 devices on a WLAN
 communicate via Wi-Fi.

 typically within or around building (~100 ft)


 802.11b/g/n (WiFi): 11, 54, 450 Mbps transmission rate to Internet

Introduction: 1-25
Types of Transmission Media
Guided Media:
It is also referred to as Wired or
Bounded transmission media.
Features:
•High Speed
•Secure
•Used for comparatively shorter
distances

Unguided Media:
It is also referred to as Wireless or Unbounded
transmission media.
No physical medium is required for the transmission of
electromagnetic signals.
Features:
•The signal is broadcasted through air
•Less Secure
•Used for larger distances Introduction: 1-26
Links: physical media

 Twisted Pair Cable –


Twisted Pair is of two types:

Unshielded Twisted Pair (UTP):


Advantages:
⇢ Least expensive  Advantages:
⇢ Easy to install
⇢ High-speed capacity  ⇢ Better performance at a higher
⇢ Susceptible to external interference data rate in comparison to UTP
⇢ Lower capacity and performance in comparison to STP
⇢ Short distance transmission due to attenuation
 ⇢ Eliminates crosstalk
 ⇢ Comparatively faster
Shielded Twisted Pair (STP):
 ⇢ Comparatively difficult to install
It is used in fast-data-rate Ethernet and in voice and data and manufacture
channels of telephone lines.
 ⇢ More expensive
Introduction: 1-27
Links: physical media
Coaxial cable: Fiber optic cable:
 two concentric copper conductors  glass fiber carrying light pulses, each
pulse a bit
 bidirectional
 high-speed operation:
 broadband: • high-speed point-to-point
• multiple frequency channels on cable transmission (10’s-100’s Gbps)
• 100’s Mbps per channel  low error rate:
• repeaters spaced far apart
• immune to electromagnetic noise

Introduction: 1-28
Links: physical media
Wireless radio Radio link types:
 signal carried in  terrestrial microwave
electromagnetic spectrum • up to 45 Mbps channels
 no physical “wire”  Wireless LAN (WiFi)
 broadcast and “half-duplex” • Up to 100’s Mbps
(sender to receiver)  wide-area (e.g., cellular)
 propagation environment • 4G cellular: ~ 10’s Mbps
effects:
 satellite
• reflection
• up to 45 Mbps per channel
• obstruction by objects
• 270 msec end-end delay
• interference

Introduction: 1-29
Chapter 1: Introduction, Computer Networking: A Top-Down Approach,
8th edition, Jim Kurose, Keith Ross, Pearson, 2020
Figure 1.3: Types of connection

1.31
NETWORKS TYPES

Networks are categorized on the basis of


their size.
The three basic categories of computer
networks are
1. Local Area Networks (LAN)
2. Wide Area Network (WAN)
1. Metropolitan Area Network (MAN)
1.32
1.3.1 Local Area Network

• A local area network (LAN) is usually privately


owned and connects some hosts in a single
office, building, or campus.
• Usually limited to a few kilometers of area
• Depending on the needs of an organization, a
LAN can be as simple as two PCs and a printer
in someone’s home office, or it can extend
throughout a company and include audio and
video devices.

1.33
Figure 1.8: An Isolated LAN in the past and today

1.34
1.3.2 Wide Area Network
A wide area network (WAN) is also an connection of
devices capable of communication.
However, there are some differences between a LAN and
a WAN.
LAN WAN
A LAN is normally limited in size a WAN has a wider geographical
span, spanning a town, a state, a
country, or even the world
A LAN interconnects hosts a WAN interconnects connecting
devices such as switches, routers,
or modems
A LAN is normally privately a WAN is normally created and
owned by the organization that run by communication companies
uses it and leased by an organization that
uses it.

1.35
1.3.3 Metropolitan Area Network (MAN)

• MAN is of size between LAN & WAN


• It is larger than LAN but smaller than WAN

1.36
Classification by Scale

1.37
Figure 1.9: A Point-to-Point WAN

1.38
Figure 1.10: A Switched WAN

1.39
Figure 1.11: An internetwork made of two LANs and one WAN

WAN

1.40
Figure 1.12: A heterogeneous network made of WANs and LANs

1.41
1.3.4 The Internet

As we discussed before, an internet (note the


lowercase i) is two or more networks that can
communicate with each other. The most notable
internet is called the Internet (uppercase I ), and is
composed of thousands of interconnected networks.
Figure 1.15 shows a conceptual (not geographical)
view of the Internet.

1.42
Figure 1.15: The Internet today

1.43
Topics from shared video
 Five components of data communication
 Data Flow
 Topologies

Introduction: 1-44
Network Topology

• Computers in a network have to be connected in some


logical manner
• The layout pattern of the interconnections between
computers in a network is called network topology
• Topology as the virtual shape or structure of the
network
Network Topology

• Network topology is also referred


to as
• 'network architecture’
• Devices on the network are
referred to as
• 'nodes.‘
• The most common nodes are
• computers and peripheral
devices
• Network topology is illustrated by
showing these nodes and their
connections using cables

Types of Topology
Point to Point Topology

• Simplest of all the network topologies


• The network consists of a direct link between two
computers
• Advantage
• faster and more reliable than other types of connections
• since there is a direct connection
• Disadvantage
• it can only be used for small areas where computers are
in close proximity
Wired Network Topologies: Bus Topology
 Bus topology has a network
arrangement where nodes
make use of a single
communication line for data
transmission.
 Many networks at the
beginning of computer
networking era made use of
this topology due to easy
implementation

49
Bus Topology
 Advantages
• Since there is a single communication line, means the same medium is shared.
Therefore, the major advantage of using this topology is its simplicity.
• Easy to setup and extend.
• Less costly. Less cabling needs.
 Disadvantages
• On the other hand, having a single communication line for data transmission makes
it easier for collision to occur, which is seen as a disadvantage of using this network
topology.
• If the single network cable has a problem or disconnection, the whole network
breaks.
• Difficult to identify a problem.
• All devices receive all signals from every other host. This is not efficient.

50
STAR Topology

• All the computers are connected to


a single hub through a cable
• This hub is the central node
• and all others nodes are connected
to the central node
STAR Topology
RING Topology

• It forms a ring as each computer is


connected to another computer,
• With the last one connected to the
first.
• Exactly two neighbours for each
device
Wired Network Topologies: Ring Topology

Dual Ring Topology


54
RING Topology
RING Topology
MESH Topology

• It is a point-to-point connection to other


nodes or devices
• All the network nodes are connected to each
other.
• Mesh has n(n-1)/2 physical channels to link n
devices
• There are two techniques to transmit data
over the Mesh topology, they are :
1. Routing
2. Flooding
MESH Topology
MESH Topology
MESH Topology
TREE Topology

• It has a root node


• and all other nodes are
connected to it forming a
hierarchy.
• It is also called hierarchical
topology.
• It should at least have three
levels to the hierarchy.
TREE Topology
Wired Network Topologies: Hybrid Topology
 It is two different types of topologies which is a mixture of two or more topologies.
For example if in an office in one department ring topology is used and in another
star topology is used, connecting these topologies will result in Hybrid Topology
(ring topology and star topology).

63
HYBRID Topology
Chapter 1: roadmap
 What is the Internet?
 What is a protocol?
 Network edge: hosts, access network,
physical media
 Network core: packet/circuit
switching, internet structure
 Performance: loss, delay, throughput
 Security
 Protocol layers, service models
 History
Introduction: 1-65
Switching techniques
 In large networks,
• multiple paths from sender to
receiver.
• The switching technique will
decide the best route for data
transmission.
 Switching technique is used
• to connect the systems for making
one-to-one communication.

Introduction: 1-66
Packet switching
 connectionless network  Header Part:
switching technique • contains the addressing
information of the packet
 hosts break application-layer
• used by the intermediate routers
messages into packets to direct it towards its destination.
 Each packet in a packet The
switching technique has two  Payload Part:
parts: a header and a payload. • carries the actual data.

Introduction: 1-67
18.2.1 Datagram Approach

• the network layer was designed to provide a


connectionless service
• in which the network-layer protocol treats
each packet independently,
• with each packet having no relationship to
any other packet.
The idea was that the network layer is only
responsible for delivery of packets from the
source to the destination.
In this approach, the packets in a message may or
may not travel the same path to their destination.

18.68
Packet Switching & Circuit Switching

There are mainly two methodologies for transmitting


data over the computer network –
1. Connectionless Packet Switching is also known
as datagram switching
2. Connection-oriented packet switching is also
known as virtual circuit switching

Examples of connectionless protocols are Ethernet,


Internet Protocol (IP), and the User Datagram
Protocol (UDP).

18.69
Figure 18.3: A connectionless packet-switched network

18.70
Introduction: 1-71
Packet switching
 The packet switching is a switching technique in which the message is sent in one go,
but it is divided into smaller pieces, and they are sent individually.
 The message splits into smaller pieces known as packets and packets are given a
unique number to identify their order at the receiving end.
 Every packet contains some information in its headers such as source address,
destination address and sequence number.
 Packets will travel across the network, taking the shortest path as possible.
 All the packets are reassembled at the receiving end in correct order.
 If any packet is missing or corrupted, then the message will be sent to resend the
message.
 If the correct order of the packets is reached, then the acknowledgment message will
be sent.

Introduction: 1-72
Figure 18.4: Forwarding process in a router when used in a
connectionless network

SA DA Data SA DA Data

18.73
A connectionless packet-switched network

Advantage of Packet Switching:

• More efficient use of overall network


bandwidth
• due to flexibility in routing the smaller
packets over shared links

Disadvantage of Packet Switching:


• Longer delays in receiving messages
• due to the time required to package and
route packets.

18.74
18.2.2 Virtual-Circuit Approach

• In a connection-oriented service (also called virtual-


circuit approach),
• there is a relationship between all packets belonging to
a message.
• Before all datagrams in a message can be sent,
• a virtual connection should be set up to define the
path for the datagrams.
• After connection setup, the datagrams can all follow the
same path.
• In this type of service, not only must the packet contain
the source and destination addresses,
• it must also contain a flow label,
• a virtual circuit identifier that defines the virtual
path the packet should follow.
18.75
Figure 18.5: A virtual-circuit packet-switched network

18.76
Figure 18.6: Forwarding process in a router when used in a virtual
circuit network

18.77
Figure 18.7: Sending request packet in a virtual-circuit network

A to B

A to B

A to B A to B

18.78
Figure 18.8: Sending acknowledgments in a virtual-circuit network

18.79
Figure 18.9: Flow of one packet in an established virtual circuit

18.80
18.2.2 Virtual-Circuit Approach

• Transmission of packets are made on Per-Packet


basis
1. Transmission of packets from a source machine to a destination machine is done
on a per source‐destination pair basis,
• meaning that all packets from the same source going to the same
destination are transmitted over the same routes and through the same
routers
2. Different packet reached their destination in order.
3. Having almost constant delay in packet transmission .
4. The packets include a connection identifier rather than address information.
This identifier is changed every time when the packet is transmitted.
5. Address information is only transferred to each node during a connection set-up
phase, when the route to the destination is discovered and an entry is added to
the switching table in each network node through which the connection passes

18.81
Packet-switching: store-and-forward

L bits
per packet
3 2 1
source destination
R bps R bps

 Transmission delay: takes L/R seconds to


transmit (push out) L-bit packet into link at R One-hop numerical example:
bps  L = 10 Kbits
 Store and forward: entire packet must arrive at  R = 100 Mbps
router before it can be transmitted on next link  one-hop transmission delay
 End-end delay: 2L/R (above), assuming zero = 0.1 msec
propagation delay (more on delay shortly)
Introduction: 1-82
Packet-switching: queueing delay, loss
R = 100 Mb/s
A C

D
B R = 1.5 Mb/s
E
queue of packets
waiting for output link

Packet queuing and loss: if arrival rate (in bps) to link exceeds
transmission rate (bps) of link for a period of time:
 packets will queue, waiting to be transmitted on output link
 packets can be dropped (lost) if memory (buffer) in router fills
up
Introduction: 1-83
Two key network-core functions

routing algorithm Routing:


Forwarding: local
local forwarding
forwarding table
table
 global action:
header value output link determine source-
 local action: 0100 3
destination paths
0101 2
move arriving 0111 2
taken by packets
1001 1
packets from
router’s input link  routing algorithms
to appropriate 1
router output link 3 2

destination address in arriving


packet’s header
Introduction: 1-84
Alternative to packet switching: circuit switching
end-end resources allocated to,
reserved for “call” between source
and destination
 in diagram, each link has four circuits.
• call gets 2nd circuit in top link and 1st
circuit in right link.
 dedicated resources: no sharing
• circuit-like (guaranteed) performance
 circuit segment idle if not used by call (no
sharing)
 commonly used in traditional telephone
networks
Introduction: 1-85
Chapter 1: Introduction, Computer Networking: A Top-Down Approach,
8th edition, Jim Kurose, Keith Ross, Pearson, 2020
Circuit switching: FDM and TDM
Frequency Division Multiplexing
(FDM) 4 users
 optical, electromagnetic frequencies

frequency
divided into (narrow) frequency
bands
 each call allocated its own band, can
transmit at max rate of that narrow
band time
Time Division Multiplexing (TDM)

frequency
 time divided into slots
 each call allocated periodic slot(s), can
transmit at maximum rate of (wider)
frequency band, but only during its time
time slot(s)
Introduction: 1-87
Internet structure: a “network of networks”
 Hosts connect to Internet via access Internet Service
Providers (ISPs)
• residential, enterprise (company, university, commercial) ISPs
 Access ISPs in turn must be interconnected
• so that any two hosts can send packets to each other
 Resulting network of networks is very complex
• evolution was driven by economics and national policies
 Let’s take a stepwise approach to describe current
Internet structure

Introduction: 1-88
Internet structure: a “network of networks”
Question: given millions of access ISPs, how to connect them together?

access access
net net
access
net
access
access net
net
access
access net
net

access access
net net

access
net
access
net

access
net
access
net
access access
net access net
net

Introduction: 1-89
Internet structure: a “network of networks”
Question: given millions of access ISPs, how to connect them together?

access access
net net
access
net
access
access net
net
access
access net
net

connecting each access ISP to


each other directly doesn’t scale:
access
access
net O(N2) connections. net

access
net
access
net

access
net
access
net
access access
net access net
net

Introduction: 1-90
Internet structure: a “network of networks”
Option: connect each access ISP to one global transit ISP?
Customer and provider ISPs have economic agreement.
access access
net net
access
net
access
access net
net
access
access net
net

global
access
net
ISP access
net

access
net
access
net

access
net
access
net
access access
net access net
net

Introduction: 1-91
Internet structure: a “network of networks”
But if one global ISP is viable business, there will be competitors ….

access access
net net
access
net
access
access net
net
access
access net
net ISP A

access
net ISP B access
net

access ISP C
net
access
net

access
net
access
net
access access
net access net
net

Introduction: 1-92
Internet structure: a “network of networks”
But if one global ISP is viable business, there will be competitors …. who will
want to be connected
Internet exchange point
access access
net net
access
net
access
access net
net
IXP access
access net
net ISP A

access
net
IXP ISP B access
net

access ISP C
net
access
net

access
net
peering link
access
net
access access
net access net
net

Introduction: 1-93
Internet structure: a “network of networks”
… and regional networks may arise to connect access nets to ISPs

access access
net net
access
net
access
access net
net
IXP access
access net
net ISP A

access
net
IXP ISP B access
net

access ISP C
net
access
net

access
net
regional ISP access
net
access access
net access net
net

Introduction: 1-94
Internet structure: a “network of networks”
… and content provider networks (e.g., Google, Microsoft, Akamai) may
run their own network, to bring services, content close to end users
access access
net net
access
net
access
access net
net
IXP access
access net
net ISP A

Content provider network


access
net
IXP ISP B access
net

access ISP C
net
access
net

access
net
regional ISP access
net
access access
net access net
net

Introduction: 1-95
Internet structure: a “network of networks”
Tier 1 ISP Tier 1 ISP Google

IXP IXP IXP


Regional ISP Regional ISP

access access access access access access access access


ISP ISP ISP ISP ISP ISP ISP ISP

At “center”: small # of well-connected large networks


 “tier-1” commercial ISPs (e.g., Level 3, Sprint, AT&T, NTT), national & international coverage
 content provider networks (e.g., Google, Facebook): private network that connects its
data centers to Internet, often bypassing tier-1, regional ISPs
Introduction: 1-96
Chapter 1: Introduction, Computer Networking: A Top-Down Approach,
8th edition, Jim Kurose, Keith Ross, Pearson, 2020
Chapter 1: roadmap
 What is the Internet?
 What is a protocol?
 Network edge: hosts, access network,
physical media
 Network core: packet/circuit
switching, internet structure
 Performance: loss, delay, throughput
 Security
 Protocol layers, service models
 History
Introduction: 1-98
Protocol “layers” and reference models
Networks are complex,
with many “pieces”: Question:
 hosts is there any hope of
 routers organizing structure of
 links of various media network?
 applications
 protocols
 hardware, software
…. or at least our
discussion of networks?

Introduction: 1-99
Example: organization of air travel

ticket (purchase) ticket (complain)


baggage (check) baggage (claim)
gates (load) gates (unload)
runway takeoff runway landing
airplane routing airplane routing
airplane routing

airline travel: a series of steps, involving many services


Introduction: 1-100
Example: organization of air travel

ticket (purchase) ticketing service ticket (complain)


baggage (check) baggage service baggage (claim)
gates (load) gate service gates (unload)
runway takeoff runway service runway landing
airplane routing routing service
airplane routing airplane routing

layers: each layer implements a service Q: describe in words


 via its own internal-layer actions the service provided
in each layer above
 relying on services provided by layer below
Introduction: 1-101
Why layering?
dealing with complex systems:
 explicit structure allows identification, relationship of
complex system’s pieces
• layered reference model for discussion
 modularization eases maintenance, updating of system
• change in layer's service implementation: transparent to rest of
system
• e.g., change in gate procedure doesn’t affect rest of system

Introduction: 1-102
Internet protocol stack
 application: supporting network applications
• IMAP, SMTP, HTTP
application
 transport: process-process data transfer
• TCP, UDP transport
 network: routing of datagrams from source to
destination network
• IP, routing protocols
link
 link: data transfer between neighboring
network elements physical
• Ethernet, 802.11 (WiFi), PPP
 physical: bits “on the wire”
Introduction: 1-103
source
message M application Encapsulation
segment Ht M transport
datagram Hn Ht M network
frame Hl Hn Ht M link
physical
link
physical

switch

destination Hn Ht M network
M application Hl Hn Ht M link Hn Ht M
Ht M transport physical
Hn Ht M network
Hl Hn Ht M link router
physical
Introduction: 1-104
Chapter 1: roadmap
 What is the Internet?
 What is a protocol?
 Network edge: hosts, access network,
physical media
 Network core: packet/circuit
switching, internet structure
 Performance: loss, delay, throughput
 Security
 Protocol layers, service models
 History
Introduction: 1-105
Internet history
1961-1972: Early packet-switching principles
 1961: Kleinrock - queueing  1972:
theory shows effectiveness of • ARPAnet public demo
packet-switching • NCP (Network Control Protocol)
 1964: Baran - packet-switching first host-host protocol
in military nets • first e-mail program
 1967: ARPAnet conceived by • ARPAnet has 15 nodes
Advanced Research Projects
Agency
 1969: first ARPAnet node
operational
Introduction: 1-106
Internet history
1972-1980: Internetworking, new and proprietary nets
 1970: ALOHAnet satellite network
in Hawaii Cerf and Kahn’s internetworking
principles:
 1974: Cerf and Kahn - architecture  minimalism, autonomy - no
for interconnecting networks internal changes required to
 1976: Ethernet at Xerox PARC interconnect networks
 best-effort service model
 late70’s: proprietary architectures:
DECnet, SNA, XNA  stateless routing
 decentralized control
 late 70’s: switching fixed length
packets (ATM precursor) define today’s Internet architecture

 1979: ARPAnet has 200 nodes


Introduction: 1-107
Internet history
1980-1990: new protocols, a proliferation of networks
 1983: deployment of TCP/IP  new national networks: CSnet,
 1982: smtp e-mail protocol BITnet, NSFnet, Minitel
defined  100,000 hosts connected to
 1983: DNS defined for name- confederation of networks
to-IP-address translation
 1985: ftp protocol defined
 1988: TCP congestion control

Introduction: 1-108
Internet history
1990, 2000s: commercialization, the Web, new applications
 early 1990s: ARPAnet late 1990s – 2000s:
decommissioned  more killer apps: instant
 1991: NSF lifts restrictions on messaging, P2P file sharing
commercial use of NSFnet  network security to forefront
(decommissioned, 1995)
 est. 50 million host, 100 million+
 early 1990s: Web users
• hypertext [Bush 1945, Nelson 1960’s]
• HTML, HTTP: Berners-Lee
 backbone links running at Gbps
• 1994: Mosaic, later Netscape
• late 1990s: commercialization of the
Web
Introduction: 1-109
Internet history
2005-present: more new applications, Internet is “everywhere”
 ~18B devices attached to Internet (2017)
• rise of smartphones (iPhone: 2007)
 aggressive deployment of broadband access
 increasing ubiquity of high-speed wireless access: 4G/5G, WiFi
 emergence of online social networks:
• Facebook: ~ 2.5 billion users
 service providers (Google, FB, Microsoft) create their own networks
• bypass commercial Internet to connect “close” to end user, providing
“instantaneous” access to search, video content, …
 enterprises run their services in “cloud” (e.g., Amazon Web Services,
Microsoft Azure)
Introduction: 1-110
Chapter 1: summary
We’ve covered a “ton” of material!
 Internet overview
 what’s a protocol? You now have:
 network edge, access network, core  context, overview,
• packet-switching versus circuit-
switching vocabulary, “feel”
• Internet structure of networking
 performance: loss, delay, throughput  more depth,
 layering, service models detail, and fun to
 security follow!
 history
Introduction: 1-111

You might also like