0% found this document useful (0 votes)
4 views

Lecture 1_CSC523_Computer Networks

The document outlines a course on Computer Networks, detailing various layers including the Application, Transport, Network, and Link layers, along with their respective protocols and services. It emphasizes the structure of the Internet, describing its components such as end systems, communication links, and routers, while also discussing the difference between connection-oriented and connectionless services. Additionally, it highlights the importance of Internet standards and protocols defined by the Internet Engineering Task Force (IETF).

Uploaded by

teeboibass
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views

Lecture 1_CSC523_Computer Networks

The document outlines a course on Computer Networks, detailing various layers including the Application, Transport, Network, and Link layers, along with their respective protocols and services. It emphasizes the structure of the Internet, describing its components such as end systems, communication links, and routers, while also discussing the difference between connection-oriented and connectionless services. Additionally, it highlights the importance of Internet standards and protocols defined by the Internet Engineering Task Force (IETF).

Uploaded by

teeboibass
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 31

CSC523

Computer Network
Dr. Nwohiri A.M.
Dept. of Comp. Sciences
University of Lagos
Computer Networks and the Internet

• The Internet
• Network Edge
• Network Core
• Delay, Loss, Throughput

Course Application Layer

Outline • Principles of Network Architectures


• The Web and HTTP
• File Transfer: FTP
• Electronic Mail in the Internet
• DNS - the Internet's Directory Service
• Peer-to-Peer Applications
• Socket Programming: Creating Network Applications
Transport Layer
• Introduction and Transport-Layer Services
• Multiplexing and Demultiplexing
• Connectionless Transport: UDP
• Principles of Reliable Data Transfer
• Connection Oriented Transport: TCP
• Principles of Congestion Control
Course The Network Layer
Outline • Introduction
• Virtual Circuit and Datagram Networks
• What’s Inside a Router?
• The Internet Protocol (IP): Forwarding and Addressing in the
Internet
• Routing Algorithms
• Routing in the Internet
• Broadcast and Multicast Routing
The Link Layer: Links, Access Networks, and LANs
• Introduction to the Link Layer
• Error-Detection and -Correction Techniques
• Multiple Access Links and Protocols
• Switched Local Area Networks
• Link
Course • Data Center Networking

Outline Wireless and Mobile Networks


• Wireless Links and Network Characteristics
• WiFi: 802.11 Wireless LANs
• Cellular Internet Access
• Mobility Management: Principles 555 6.5.1 Addressing
• Mobile IP 564
• Managing Mobility in Cellular Networks
Computer Networking: A Top-Down
Approach. Kurose and Ross. 7th Edition.

Computer Networks and Internet. 5th


Edition by Douglas E. Comer
Recommen
ded Text Data Networks, IP and the Internet by
Martin P. Clark.

Manual – coming soon.


Compute
r What is the The Network A Network Core

Networks Internet Edge

and the
Internet Delay, Loss, and
Throughput in packet- Protocol layers
switched networks
Submarine
communication
s cable
Internet: A Nuts-and-
Bolts Description
• The Internet is a computer network that interconnects billions of
computing devices throughout the world.
• By nuts and bolts of the Internet we mean the basic hardware and
software components that make up the Internet.
• Devices: PCs, Linux workstations, servers , and nontraditional Internet
“things” such as laptops, smartphones, tablets, TVs, gaming consoles,
thermostats, home security systems, home appliances, watches, eye
glasses, cars, traffic control systems and more.
• Indeed, the term computer network is beginning to sound a bit
outdated, given the many nontraditional devices that are being
hooked up to the Internet.
• In Internet jargon, these devices are called hosts or end systems. By
some estimates, in 2020 there were about 25 billion devices
connected to the Internet [Gartner 2014].
'Nuts and Bolts' View
• End systems are connected together by a network
of communication links and packet switches.
• Links - coaxial cable, copper wire, fibre optics,
twisted pair, etc.
• End systems run protocols that control the sending
and receiving of information within the Internet
• When one end system has data to send to another
end system, the sending end system segments the
data. The resulting packages of information, known
as packets, are then sent through the network to
the destination end system, where they are
reassembled into the original data.
Internet Service Providers (ISPs)
The Internet is all about connecting end systems to each
other, so the ISPs that provide access to end systems
must also be interconnected.
'Nuts and Bolts' View
'Nuts and Bolts' View
• Rather than provide a dedicated path between communicating end systems, the Internet uses a
technique known as packet switching that allows multiple communicating end systems to share a
path, or parts of a path, at the same time.
• Any network connected to the Internet must run the IP protocol and conform to certain naming and
addressing conventions.
• At the technical and developmental level, the Internet is made possible through creation, testing, and
implementation of Internet standards. These standards are developed by the Internet Engineering
Task Force (IETF).
• The IETF standards documents are called Request For Comments (RFCs). RFCs define protocols such
as TCP, IP, HTTP (for the web), and SMTP (for e-mail). There are more than 2,000 different RFCs.
• An RFC is authored by individuals or groups of engineers and computer scientists in the form of a
memorandum describing methods, behaviors, research, or innovations applicable to the working of
the Internet and Internet-connected systems. It is submitted either for peer review or to convey new
concepts, information, or occasionally engineering humor
Summary
What is the Internet?
1. millions of connected computing devices: hosts, end-systems
• PCs, workstations, servers
• PDAs phones, toasters, running network apps

2. communication links
• fiber, copper, radio, satellite
• transmission rate = bandwidth

3. routers: forward packets (chunks of data)


4. Protocols control sending, receiving of msgs
• TCP, IP, HTTP, FTP, PPP

5. Internet standards
• RFC: Request for comments
• IETF: Internet Engineering Task Force
Internet: A
Service View
A networking infrastructure
that provides services to
distributed applications.
A Service View
The Internet provides two services to its distributed applications: a
connection-oriented service and a connectionless oriented service.
Loosely speaking, connection-oriented service guarantees that data
transmitted from a sender to a receiver will eventually be delivered to
the receiver in order and its entirety.
Connectionless service does not make any guarantees about eventual
delivery. Typically, a distributed application makes use of one or the
other of these two services and not both.
The internet: Nuts & Bolts vs
Service

We have given two descriptions of the Internet, one in terms of its hardware
and software components, the other in terms of the services it provides to
distributed applications.
Summary
Communication infrastructure Communication services
enables distributed applications: provided to apps:
• Web • connectionless
• email • connection-oriented
• games
• e-commerce
• database
• voting
• file (MP3) sharing
Now that we have got a bit of a feel for what the
Internet is, let us consider another important
buzzword in computer networking – protocol.

Networki A protocol defines the format and the order of


messages exchanged between two or more
ng communicating entities, as well as the actions
taken on the transmission and/or receipt of a
Protocols message or other event.
Mastering the field of computer networking is
equivalent to understanding the what, why, and
how of networking protocols.
Human vs
network
protocol
Network
structure
A closer look at network structure:

Network edge: applications and hosts


Network core: routers
Physical media: communication links
Network Edge

End systems, clients, and servers


In computer networking jargon, the computers
that we use on a daily basis are often referred to
as hosts or end systems because they host (run)
application-level programs such as a Web browser
or server program, or an e-mail program.
They are also referred to as end systems because
they sit at the edge of the network of networks.
Network
Edge
Hosts are sometimes further divided
into two categories: clients and servers.
In a client/server model, a client
program running on one end system
requests and receives information from
a server running on another end system.
Network Edge
The Web, e-mail, file transfer, remote login (for example, Telnet), newsgroups, and
many other popular applications adopt the client/server model.

Since a client typically runs on one computer and the server runs on another computer,
client/server Internet applications are, by definition, distributed applications. The
client and the server interact with each other by communicating over the Internet.

At this level of abstraction, the routers, links and other 'pieces' of the Internet serve as
a 'black box' that transfers messages between the distributed, communicating
components of an Internet application.
Connectionless &
Connection-oriented services
o We have seen that end systems exchange messages with each other
according to an application-level protocol in order to accomplish
some task.
o The links, routers, and other pieces of the Internet provide the
means to transport these messages between the end-system
applications.
Connection-oriented
service

When an application uses the connection-


oriented service, the client and the server
(residing in different end systems) send control
packets to each other before sending packets
with real data (such as e-mail messages).
TCP service [RfC 793]

• Reliable, in-order byte- stream data


transfer: acknowledgements and
retransmissions
Summary
• Flow control: sender won't overwhelm
receiver

• Congestion control: senders “slow down


sending rate" when network congested
There is no handshaking with the Internet's
Connectio connectionless service. When one side of an application
wants to send packets to another side of an application,
nless the sending application simply sends the packets.
service
Since there is no handshaking procedure prior to the
transmission of the packets, data can be delivered faster.
But there are no acknowledgements either, so a source
never knows for sure which packets arrive at the
destination. Moreover, the service makes no provision
for flow control or congestion control.

The Internet's connectionless service is provided by User


Datagram Protocol (UDP); UDP is defined in the Internet
RFC 768.
Connectionless service
• There is no handshaking with the Internet's connectionless service.
When one side of an application wants to send packets to another side
of an application, the sending application simply sends the packets.
• Since there is no handshaking procedure prior to the transmission of the
packets, data can be delivered faster. But there are no
acknowledgements either, so a source never knows for sure which
packets arrive at the destination. Moreover, the service makes no
provision for flow control or congestion control.
• The Internet's connectionless service is provided by User Datagram
Protocol (UDP); UDP is defined in the Internet RFC 768.
Most of the more familiar Internet applications use TCP, the Internet's
connection-oriented service. These applications include Telnet (remote login),
SMTP (for electronic mail), FTP (for file transfer), and HTTP (for the Web).

Nevertheless, UDP, the Internet's connectionless service, is used by many


applications, including many of the emerging multimedia applications, such as
Internet phone, audio-on-demand, and video conferencing.
UDP:
• Unreliable data transfer
• No flow control
• No congestion control

Applications using TCP: HTTP (WWW), FTP (File


Summar Transfer),Telnet (remote login), SMTP (email)
y
Applications using UDP: Streaming media,
Teleconferencing, Internet telephony
The Network Core

You might also like