0% found this document useful (0 votes)
39 views111 pages

Lecture 01 - 05 Introduction-Final

Uploaded by

fefavop474
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
39 views111 pages

Lecture 01 - 05 Introduction-Final

Uploaded by

fefavop474
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd

CSC339 - DATA

COMMUNICATIONS AND
COMPUTER NETWORKS

Course Instructor:

Dr. Sheneela Naz


[email protected]
WHAT IS DATA
COMMUNICATION
 Data Communication is the exchange of data between two nodes via some
form of link.
WHAT IS NETWORK

A network consists of two or more computers that are


linked in order to share resources, exchange files, or
allow communications. The computers on a network may
be linked through cables, telephone lines, radio waves,
satellites, or infrared light beams.

Introduction: 1-3
BASIC COMPONENTS OF A
COMPUTER NETWORK

Introduction: 1-4
TOPICS COVERED
 Introduction and overview: Internet?, Network edge: Client Server Programs;
Access Networks and Physical Media; Network Core: Circuit Switching vs. Packet
switching; Protocol layers and their service models: Layered Architecture,
Messages, Segments, Datagrams and Frames
 Application Layer: HTTP, FTP, DNS, P2P file distribution
 Transport Layer: Transport Layer Services, Multiplexing, De-multiplexing; UDP:
segment structure, Checksum; Connection Oriented TCP: Connection, segment
structure, RTT estimation and timeout
 Network Layer: Virtual Circuits and datagram networks; IP protocol: Datagram
format; Routing algorithms: Distance Vector and Link state routing protocols
 Link Layer: Link layer services; Error detection techniques; Multiple access
protocols; Random Access Protocols; link layer addressing (ARP); link layer
switches
 Physical Layer: Analog and Digital Data; Transmission Impairments; Wireless
and Mobile Networks
 Mobility management principles and Security in Computer Networks
COURSE AND REFERENCE
BOOKS
 Text Book:
 Computer Networking: A Top Down Approach, Kurose, J.F. &Ross, K.W., 7 th Edition
(2017), Addison Wesley.
 Reference Books:
 Computer Networks and Internets, Comer, D.E., 6th Edition (2014), Addison
Wesley.
 Networking: A Beginner's Guide, Hallberg, B., 6th Edition (2013), McGraw Hill.
 Computer Networks, Tannenbaum, 5th Edition (2010), Andrew S. Tenanbaum,
David J.Wetherall
EVALUATION CRITERIA
TENTATIVE
Theory (100 %) Lab (100 %)

Quizzes (4) 15 % Assignments (4) 25 %

Assignments (4) 10 % Mid 25 %

Mid 25 % Lab Project 50 %

Terminal (1) 50 %

Note: Strick policy for the cheating in any of the artifact especially assignments.
8
COURSE LEARNING
OUTCOMES
1. Describe the basic network components, services,
technologies and layered network architecture
2. Demonstrate the functionality of each layer using
networking tools.
3. Develop simple network applications.
4. Describe the basic issues in Mobile Networks and
Network Security.

9
LECTURE
# 1:
INTRODUC
TION
Chapter 1: Introduction, Computer Networking: A Top-Down
Approach,
8th edition, Jim Kurose, Keith Ross, Pearson, 2020
CONTENTS
 What is the Internet?
 What is a protocol?
 Network edge: hosts, access network, physical media
 Network core: packet/circuit switching, internet structure
 Performance: loss, delay, throughput
 Security
 Protocol layers, service models
 History
The Internet: a “nuts and bolts”
view
Billions of connected mobile network
computing devices: national or global ISP
 hosts = end systems
 running network apps at
Internet’s “edge”

Packet switches: forward


local or
packets (chunks of data) Internet
regional ISP
 routers, switches
home network content
Communication links provider
network datacenter
 fiber, copper, radio, satellite network

 transmission rate: bandwidth


Networks enterprise
 collection of devices, routers, network
links: managed by an organization
Introduction: 1-12
The Internet: a “nuts and bolts”
view
mobile network
4G
 Internet: “network of networks” national or global ISP

• Interconnected ISPs
 Protocols: Streaming
IP
Skype video
 set of rules that determine
• how data is transmitted between different devices in local or
the same network. regional ISP
• control sending, receiving of messages
• e.g., HTTP (Web), streaming video, Skype, TCP, IP, WiFi, home network content
4G, Ethernet provider
 Internet standards HTTP network datacenter
network
• a technology or methodology applicable to the Ethernet
Internet.
• Internet Standards are created and published by TCP
enterprise
the Internet Engineering Task Force (IETF). network
• RFC: Request for Comments
WiFi
Introduction: 1-13
What’s a protocol?
Human protocols: Network protocols:
 “what’s the time?”  computers (devices) rather than humans
 “I have a question”  all communication activity in Internet
 introductions governed by protocols

… specific messages sent


Protocols define the format, order of
… specific actions taken
when message received, messages sent and received among
or other events network entities, and actions taken
on msg transmission, receipt

Introduction: 1-14
What’s a protocol?
A human protocol and a computer network protocol:

Hi TCP connection
request
Hi TCP connection
response
Got the
time? GET http://gaia.cs.umass.edu/kurose_ross
2:00
<file>
time

Q: other human protocols?


Introduction: 1-15
Chapter 1: roadmap
 What is the Internet?
 What is a protocol?
 Network edge: hosts, access
network, physical media
 Network core: packet/circuit
switching, internet structure
 Performance: loss, delay, throughput
 Security
 Protocol layers, service models
 History
Introduction: 1-16
A closer look at Internet
structure
mobile network

Network edge: national or global ISP

refers to endpoints
 personal computers (PCs),
adapters, modems, and the devices local or
regional ISP
that connect to them.
home network
 hosts: clients and servers content
provider
network datacenter
 servers often in data centers network

enterprise
network

Introduction: 1-17
A closer look at Internet
structure
mobile network

Network edge: national or global ISP

 hosts: clients and servers


 servers often in data centers
local or
Access networks, physical media: regional ISP

 wired, wireless communication links home network content


provider
network datacenter
network

enterprise
network

Introduction: 1-18
A closer look at Internet
structure
mobile network

Network edge: national or global ISP

 hosts: clients and servers


 servers often in data centers

Access networks, physical media: local or


 wired, wireless communication links regional ISP

home network
Network core: content
provider
network datacenter
A core network is the infrastructure that network

connects together the different networks


 interconnected routers
enterprise
 network of networks network

Introduction: 1-19
Access networks and physical
media
Q: How to connect end systems to edge
router? mobile network
 enterprise access networks, national or global ISP

 a local area network ( LAN ) is used to


connect an end system to an edge router
 residential access nets
 institutional access networks (school, company)
 mobile access networks (WiFi, 4G/5G) local or
regional ISP
What do you use an edge router for?
home network content
 An edge router is a specialized router provider
• located at a network boundary network datacenter
network
• that enables an internal network to connect to
external networks.

enterprise
network

Introduction: 1-20
Access networks and physical
media
What to look for: mobile network

 transmission rate (bits per second) of access national or global ISP

network?
 shared or dedicated access among users?
• Dedicated Internet access
• provides guaranteed bandwidth at all times. local or
• If a business subscribes to a 100 Mbps dedicated regional ISP
Internet connection,
home network content
• it will always have access to 100 Mbps of
provider
bandwidth. network datacenter
network
• Shared internet access (SIA) is a single connection that is
shared between a number of users
• If a business subscribes to a 100 Mbps shared Internet
connection, enterprise
network
• it may get 100 Mbps of bandwidth at certain times,
• receive far less bandwidth during peak traffic periods
Introduction: 1-21
when other subscribers are also using the connection.
LECTURE
# 2:
INTRODUC
TION
Chapter 1: Introduction, Computer Networking: A Top-Down
Approach,
8th edition, Jim Kurose, Keith Ross, Pearson, 2020
Data flow can occur in three ways:
 Simplex: In simplex mode, the communication is
• unidirectional.
• only one of the devices on a link can transmit, the other can
only receive.
• e.g. keyboards, monitors, etc.
 Half-duplex: In this mode, each station can
• both transmit and receive, but not at the same time.
• When one device is sending, the other can only receive, and vice-
versa.
• e.g. walkie-talkies, CB(citizens band) etc.
 Full Duplex : In full duplex mode,
• both stations can transmit and receive simultaneously.
• One common example of full duplex is the Telephone network.
• When two people are communicating by a telephone line, both
can talk and listen at the same time.
• The full-duplex mode is used when communication in both
directions is required all the time. Introduction: 1-23
Wireless access networks
Shared wireless access network connects end system to router
 via base station aka “access point”

Wide-area cellular access networks  provided by mobile, cellular network


 connects individual devices to operator (10’s km)
other parts of a network through a  10’s Mbps
radio link.  4G cellular networks (5G coming)
 evolved from the first generation
(1G) to the fifth generation (5G) of
cellular networking

to Internet

Introduction: 1-24
Wireless access networks
Shared wireless access network connects end system to router
 via base station aka “access point”

Wireless local area networks (WLANs)


 allows devices to connect and communicate wirelessly
 traditional wired LAN,
 devices communicate over Ethernet cables,
 devices on a WLAN
 communicate via Wi-Fi.

 typically within or around building (~100 ft)


 802.11b/g/n (WiFi): 11, 54, 450 Mbps transmission rate to Internet

Introduction: 1-25
Types of Transmission Media
Guided Media:
It is also referred to as Wired or
Bounded transmission media.
Features:
•High Speed
•Secure
•Used for comparatively shorter
distances

Unguided Media:
It is also referred to as Wireless or Unbounded
transmission media.
No physical medium is required for the
transmission of electromagnetic signals.
Features:
•The signal is broadcasted through air
•Less Secure
•Used for larger distances Introduction: 1-26
Links: physical media
 Twisted Pair Cable –
Twisted Pair is of two types:

Unshielded Twisted Pair (UTP):


Advantages:
⇢ Least expensive  Advantages:
⇢ Easy to install
⇢ High-speed capacity  ⇢ Better performance at a higher
⇢ Susceptible to external interference data rate in comparison to UTP
⇢ Lower capacity and performance in comparison
to STP  ⇢ Eliminates crosstalk
⇢ Short distance transmission due to attenuation
Shielded Twisted Pair (STP):  ⇢ Comparatively faster
It is used in fast-data-rate Ethernet and in voice  ⇢ Comparatively difficult to install
and data channels of telephone lines. and manufacture
 ⇢ More expensive Introduction: 1-27
Links: physical media
Coaxial cable: Fiber optic cable:
 two concentric copper conductors  glass fiber carrying light pulses, each
pulse a bit
 bidirectional  high-speed operation:
 broadband: • high-speed point-to-point
• multiple frequency channels on cable transmission (10’s-100’s Gbps)
• 100’s Mbps per channel  low error rate:
• repeaters spaced far apart
• immune to electromagnetic noise

Introduction: 1-28
Links: physical media
Wireless radio Radio link types:
 signal carried in  terrestrial microwave
electromagnetic spectrum • up to 45 Mbps channels

 no physical “wire”  Wireless LAN (WiFi)


• Up to 100’s Mbps
 broadcast and “half-duplex”  wide-area (e.g., cellular)
(sender to receiver)
• 4G cellular: ~ 10’s Mbps
 propagation environment  satellite
effects: • up to 45 Mbps per channel
• reflection • 270 msec end-end delay
• obstruction by objects
• interference
Introduction: 1-29
LECTURE
# 3:
INTRODUC
TION
Chapter 1: Introduction, Computer Networking: A Top-Down
Approach,
8th edition, Jim Kurose, Keith Ross, Pearson, 2020
Figure 1.3: Types of connection

1.31
NETWORKS TYPES

Networks are categorized on the basis of


their size.
The three basic categories of computer
networks are
1. Local Area Networks (LAN)
2. Wide Area Network (WAN)
3. Metropolitan Area Network (MAN)
1.32
1.3.1 Local Area Network

• A local area network (LAN) is usually privately


owned and connects some hosts in a single
office, building, or campus.
• Usually limited to a few kilometers of area
• Depending on the needs of an organization, a
LAN can be as simple as two PCs and a printer
in someone’s home office, or it can extend
throughout a company and include audio and
video devices.

1.33
Figure 1.8: An Isolated LAN in the past and today

1.34
1.3.2 Wide Area Network
A wide area network (WAN) is also an connection of
devices capable of communication.
However, there are some differences between a LAN and
a WAN.
LAN WAN
A LAN is normally limited in a WAN has a wider geographical
size span, spanning a town, a state, a
country, or even the world
A LAN interconnects hosts a WAN interconnects connecting
devices such as switches, routers,
or modems
A LAN is normally privately a WAN is normally created and
owned by the organization that run by communication companies
uses it and leased by an organization
that uses it.

1.35
1.3.3 Metropolitan Area Network (MAN)

• MAN is of size between LAN & WAN


• It is larger than LAN but smaller than
WAN

1.36
Classification by Scale

1.37
Figure 1.9: A Point-to-Point WAN

1.38
Figure 1.10: A Switched WAN

1.39
Figure 1.11: An internetwork made of two LANs and
one WAN

WAN

1.40
Figure 1.12: A heterogeneous network made of WANs
and LANs

1.41
1.3.4 The Internet

As we discussed before, an internet (note the


lowercase i) is two or more networks that can
communicate with each other. The most notable
internet is called the Internet (uppercase I ), and is
composed of thousands of interconnected networks.
Figure 1.15 shows a conceptual (not geographical)
view of the Internet.

1.42
Figure 1.15: The Internet today

Peering
point Peering
point

1.43
Topics from shared video
 Five components of data communication
 Data Flow
 Topologies

Introduction: 1-44
Network Topology

• Computers in a network have to be connected in some


logical manner
• The layout pattern of the interconnections between
computers in a network is called network topology
• Topology as the virtual shape or structure of the
network
Network Topology

• Network topology is also referred


to as
• 'network architecture’
• Devices on the network are
referred to as
• 'nodes.‘
• The most common nodes are
• computers and peripheral
devices
• Network topology is illustrated by
showing these nodes and their
connections using cables

Types of Topology
Point to Point Topology

• Simplest of all the network topologies


• The network consists of a direct link between two
computers
• Advantage
• faster and more reliable than other types of connections
• since there is a direct connection

• Disadvantage
• it can only be used for small areas where computers are
in close proximity
Wired Network Topologies: Bus
Topology
 Bus topology has a network
arrangement where nodes
make use of a single
communication line for data
transmission.
 Many networks at the
beginning of computer
networking era made use of
this topology due to easy
implementation

49
Bus Topology
 Advantages
• Since there is a single communication line, means the same medium is shared.
Therefore, the major advantage of using this topology is its simplicity.
• Easy to setup and extend.
• Less costly. Less cabling needs.
 Disadvantages
• On the other hand, having a single communication line for data transmission makes it
easier for collision to occur, which is seen as a disadvantage of using this network
topology.
• If the single network cable has a problem or disconnection, the whole network breaks.
• Difficult to identify a problem.
• All devices receive all signals from every other host. This is not efficient.

50
STAR Topology

• All the computers are


connected to a single hub
through a cable
• This hub is the central node
• and all others nodes are
connected to the central node
STAR Topology
RING Topology

• It forms a ring as each


computer is connected to
another computer,
• With the last one connected to
the first.
• Exactly two neighbours for
each device
Wired Network Topologies: Ring
Topology

Dual Ring Topology


54
RING Topology
RING Topology
MESH Topology

• It is a point-to-point connection to other


nodes or devices
• All the network nodes are connected to each
other.
• Mesh has n(n-1)/2 physical channels to link n
devices
• There are two techniques to transmit data
over the Mesh topology, they are :
1. Routing
2. Flooding
MESH Topology
MESH Topology
MESH Topology
TREE Topology

• It has a root node


• and all other nodes are
connected to it forming a
hierarchy.
• It is also called
hierarchical topology.
• It should at least have
three levels to the
hierarchy.
TREE Topology
Wired Network Topologies:
Hybrid Topology
 It is two different types of topologies which is a mixture of two or more topologies. For
example if in an office in one department ring topology is used and in another star topology is
used, connecting these topologies will result in Hybrid Topology (ring topology and star
topology).

63
HYBRID Topology
Chapter 1: roadmap
 What is the Internet?
 What is a protocol?
 Network edge: hosts, access
network, physical media
 Network core: packet/circuit
switching, internet structure
 Performance: loss, delay, throughput
 Security
 Protocol layers, service models
 History
Introduction: 1-65
Switching techniques
 In large networks,
• multiple paths from sender to
receiver.
• The switching technique will
decide the best route for data
transmission.
 Switching technique is used
• to connect the systems for making
one-to-one communication.

Introduction: 1-66
Packet switching
 connectionless network  Header Part:
switching technique • contains the addressing
 hosts break application-layer information of the packet
• used by the intermediate routers
messages into packets to direct it towards its destination.
 Each packet in a packet The
switching technique has two  Payload Part:
parts: a header and a payload. • carries the actual data.

Introduction: 1-67
18.2.1 Datagram Approach

• the network layer was designed to provide a


connectionless service
• in which the network-layer protocol treats
each packet independently,
• with each packet having no relationship to
any other packet.
The idea was that the network layer is only
responsible for delivery of packets from the
source to the destination.
In this approach, the packets in a message may or
may not travel the same path to their destination.

18.68
Packet Switching & Circuit Switching

There are mainly two methodologies for transmitting


data over the computer network –
1. Connectionless Packet Switching is also known
as datagram switching
2. Connection-oriented packet switching is also
known as virtual circuit switching

Examples of connectionless protocols are Ethernet,


Internet Protocol (IP), and the User Datagram
Protocol (UDP).

18.69
Figure 18.3: A connectionless packet-switched network

18.70
Introduction: 1-71
Packet switching
 The packet switching is a switching technique in which the message is sent in one go, but it is
divided into smaller pieces, and they are sent individually.
 The message splits into smaller pieces known as packets and packets are given a unique
number to identify their order at the receiving end.
 Every packet contains some information in its headers such as source address, destination
address and sequence number.
 Packets will travel across the network, taking the shortest path as possible.
 All the packets are reassembled at the receiving end in correct order.
 If any packet is missing or corrupted, then the message will be sent to resend the message.
 If the correct order of the packets is reached, then the acknowledgment message will be sent.

Introduction: 1-72
Figure 18.4: Forwarding process in a router when used in a

connectionless network

SA DA Data SA DA Data

18.73
A connectionless packet-switched network

Advantage of Packet Switching:

• More efficient use of overall network


bandwidth
• due to flexibility in routing the smaller
packets over shared links

Disadvantage of Packet Switching:


• Longer delays in receiving messages
• due to the time required to package
and route packets.

18.74
18.2.2 Virtual-Circuit Approach

• In a connection-oriented service (also called virtual-


circuit approach),
• there is a relationship between all packets belonging to
a message.
• Before all datagrams in a message can be sent,
• a virtual connection should be set up to define the
path for the datagrams.
• After connection setup, the datagrams can all follow the
same path.
• In this type of service, not only must the packet contain
the source and destination addresses,
• it must also contain a flow label,
• a virtual circuit identifier that defines the virtual
path the packet should follow.
18.75
Figure 18.5: A virtual-circuit packet-switched network

18.76
Figure 18.6: Forwarding process in a router when used in a
virtual
circuit network

Incoming Outgoing
label label

18.77
Figure 18.7: Sending request packet in a virtual-
circuit network

A to B

A to B

A to B A to B

18.78
Figure 18.8: Sending acknowledgments in a virtual-circuit
network

18.79
Figure 18.9: Flow of one packet in an established virtual
circuit

18.80
18.2.2 Virtual-Circuit Approach

• Transmission of packets are made on Per-


Packet basis
1. Transmission of packets from a source machine to a destination machin
e is done on a per source‐destination pair basis,
• meaning that all packets from the same source going to the same
destination are transmitted over the same routes and through the
same
routers
2. Different packet reached their destination in order.
3. Having almost constant delay in packet transmission .
4. The packets include a connection identifier rather than address
information. This identifier is changed every time when the packet is
transmitted.
5. Address information is only transferred to each node during a
connection set-up phase, when the route to the destination is 18.81
Packet-switching: store-and-
forward
L bits
per packet
3 2 1
source destination
R bps R bps

 Transmission delay: takes L/R seconds to


transmit (push out) L-bit packet into link at R One-hop numerical example:
bps  L = 10 Kbits
 Store and forward: entire packet must arrive at  R = 100 Mbps
router before it can be transmitted on next link  one-hop transmission delay
 End-end delay: 2L/R (above), assuming zero = 0.1 msec
propagation delay (more on delay shortly)
Introduction: 1-82
Packet-switching: queueing
delay, loss
R = 100 Mb/s
A C

D
B R = 1.5 Mb/s
E
queue of packets
waiting for output link

Packet queuing and loss: if arrival rate (in bps) to link exceeds
transmission rate (bps) of link for a period of time:
 packets will queue, waiting to be transmitted on output link
 packets can be dropped (lost) if memory (buffer) in router fills
up
Introduction: 1-83
Two key network-core functions

routing algorithm Routing:


 global action:
Forwarding: local forwarding table
header value output link determine source-
 local action: move 0100 3
destination paths
arriving packets 0101 2

from router’s
0111
1001
2
1 taken by packets
input link to  routing algorithms
appropriate 1
router output link 3 2
1
011

destination address in arriving


packet’s header
Introduction: 1-84
Alternative to packet switching: circuit
switching

end-end resources allocated to,


reserved for “call” between source
and destination
 in diagram, each link has four circuits.
• call gets 2nd circuit in top link and 1st
circuit in right link.
 dedicated resources: no sharing
• circuit-like (guaranteed) performance
 circuit segment idle if not used by call (no
sharing)
 commonly used in traditional telephone
networks
Introduction: 1-85
LECTURE
# 4:
INTRODUC
TION
Chapter 1: Introduction, Computer Networking: A Top-Down
Approach,
8th edition, Jim Kurose, Keith Ross, Pearson, 2020
Circuit switching: FDM and TDM
Frequency Division Multiplexing
(FDM) 4 users

frequency
 optical, electromagnetic frequencies
divided into (narrow) frequency
bands
 each call allocated its own band, can
transmit at max rate of that narrow time
band
Time Division Multiplexing (TDM)

frequency
 time divided into slots
 each call allocated periodic slot(s),
can transmit at maximum rate of
(wider) frequency band, but only time
during its time slot(s)
Introduction: 1-87
Internet structure: a “network of networks”

 Hosts connect to Internet via access Internet Service


Providers (ISPs)
• residential, enterprise (company, university, commercial) ISPs
 Access ISPs in turn must be interconnected
• so that any two hosts can send packets to each other
 Resulting network of networks is very complex
• evolution was driven by economics and national policies
 Let’s take a stepwise approach to describe current
Internet structure

Introduction: 1-88
Internet structure: a “network of networks”
Question: given millions of access ISPs, how to connect them together?

access
… access
net
access
net …
net
access
access net
net
access
access net
net


access access
net net

access
net
access
net

access
net
access
… net
access access …
net access net
net

Introduction: 1-89
Internet structure: a “network of networks”
Question: given millions of access ISPs, how to connect them together?

access
… access
net
access
net …
net
access
access
net
… … net

access
access net
net

connecting each access ISP to



each other directly doesn’t scale:


O(N2) connections.
access access

net net

access
net
access
net

access
net
access
… access
… … net
access
net access net
net

Introduction: 1-90
Internet structure: a “network of networks”
Option: connect each access ISP to one global transit ISP?
Customer and provider ISPs have economic agreement.

access
… access
net
access
net …
net
access
access net
net
access
access net
net


global
access
net
ISP access
net

access
net
access
net

access
net
access
… net
access access …
net access net
net

Introduction: 1-91
Internet structure: a “network of networks”
But if one global ISP is viable business, there will be competitors ….

access
… access
net
access
net …
net
access
access net
net
access
access net
net
ISP A


access
net ISP B access
net

access
net
ISP C
access
net

access
net
access
… net
access access …
net access net
net

Introduction: 1-92
Internet structure: a “network of networks”
But if one global ISP is viable business, there will be competitors …. who will
want to be connected
Internet exchange point
access
… access
net
access
net …
net
access
access net
net
IXP access
access net
net
ISP A


access
net
IXP ISP B access
net

access
net
ISP C
access
net

access
net
peering link
access
… net
access access …
net access net
net

Introduction: 1-93
Internet structure: a “network of networks”
… and regional networks may arise to connect access nets to ISPs

access
… access
net
access
net …
net
access
access net
net
IXP access
access net
net
ISP A


access
net
IXP ISP B access
net

access
net
ISP C
access
net

access
net
regional ISP access
… net
access access …
net access net
net

Introduction: 1-94
Internet structure: a “network of networks”
… and content provider networks (e.g., Google, Microsoft, Akamai) may
run their own network, to bring services, content close to end users
… access
… access
net
access
net

net
access
access net
net
IXP access
access net
net
ISP A


Content provider network
access
net
IXP ISP B access
net

access
net
ISP C
access
net

access
net
regional ISP access
… net
access access …
net access net
net

Introduction: 1-95
Internet structure: a “network of networks”

Tier 1 ISP Tier 1 ISP Google

IXP IXP IXP


Regional ISP Regional ISP

access access access access access access access access


ISP ISP ISP ISP ISP ISP ISP ISP

At “center”: small # of well-connected large networks


 “tier-1” commercial ISPs (e.g., Level 3, Sprint, AT&T, NTT), national & international coverage
 content provider networks (e.g., Google, Facebook): private network that connects its
data centers to Internet, often bypassing tier-1, regional ISPs
Introduction: 1-96
LECTURE
# 5:
INTRODUC
TION
Chapter 1: Introduction, Computer Networking: A Top-Down
Approach,
8th edition, Jim Kurose, Keith Ross, Pearson, 2020
Chapter 1: roadmap
 What is the Internet?
 What is a protocol?
 Network edge: hosts, access
network, physical media
 Network core: packet/circuit
switching, internet structure
 Performance: loss, delay, throughput
 Security
 Protocol layers, service models
 History
Introduction: 1-98
Protocol “layers” and reference models

Networks are complex,


with many “pieces”: Question:
 hosts is there any hope of
 routers organizing structure of
 links of various media network?
 applications
 protocols
 hardware, software …. or at least our
discussion of networks?

Introduction: 1-99
Example: organization of air travel

ticket (purchase) ticket (complain)


baggage (check) baggage (claim)
gates (load) gates (unload)
runway takeoff runway landing
airplane routing airplane routing
airplane routing

airline travel: a series of steps, involving many services


Introduction: 1-100
Example: organization of air travel

ticket (purchase) ticketing service ticket (complain)


baggage (check) baggage service baggage (claim)
gates (load) gate service gates (unload)
runway takeoff runway service runway landing
airplane routing routing service
airplane routing airplane routing

layers: each layer implements a service Q: describe in words


 via its own internal-layer actions the service provided
 relying on services provided by layer below in each layer above

Introduction: 1-101
Why layering?
dealing with complex systems:
 explicit structure allows identification, relationship of
complex system’s pieces
• layered reference model for discussion
 modularization eases maintenance, updating of system
• change in layer's service implementation: transparent to rest of
system
• e.g., change in gate procedure doesn’t affect rest of system

Introduction: 1-102
Internet protocol stack
 application: supporting network applications
• IMAP, SMTP, HTTP
application
 transport: process-process data transfer
• TCP, UDP transport
 network: routing of datagrams from source to
destination network
• IP, routing protocols
link
 link: data transfer between neighboring
network elements physical
• Ethernet, 802.11 (WiFi), PPP
 physical: bits “on the wire”
Introduction: 1-103
source
message M application Encapsulation
segment Ht M transport
datagram Hn Ht M network
frame Hl Hn Ht M link
physical
link
physical

switch

destination Hn Ht M network
M application
Hl Hn Ht M link Hn Ht M
Ht M transport physical
Hn Ht M network
Hl Hn Ht M link router
physical
Introduction: 1-104
Chapter 1: roadmap
 What is the Internet?
 What is a protocol?
 Network edge: hosts, access
network, physical media
 Network core: packet/circuit
switching, internet structure
 Performance: loss, delay, throughput
 Security
 Protocol layers, service models
 History
Introduction: 1-105
Internet history
1961-1972: Early packet-switching principles
 1961: Kleinrock - queueing  1972:
theory shows effectiveness of • ARPAnet public demo
packet-switching • NCP (Network Control Protocol)
 1964: Baran - packet-switching first host-host protocol
in military nets • first e-mail program
 1967: ARPAnet conceived by • ARPAnet has 15 nodes
Advanced Research Projects
Agency
 1969: first ARPAnet node
operational
Introduction: 1-106
Internet history
1972-1980: Internetworking, new and proprietary nets
 1970: ALOHAnet satellite network
Cerf and Kahn’s internetworking
in Hawaii principles:
 1974: Cerf and Kahn - architecture  minimalism, autonomy - no
for interconnecting networks internal changes required to
 1976: Ethernet at Xerox PARC interconnect networks
 best-effort service model
 late70’s: proprietary architectures:
 stateless routing
DECnet, SNA, XNA  decentralized control
 late 70’s: switching fixed length
define today’s Internet architecture
packets (ATM precursor)
 1979: ARPAnet has 200 nodes
Introduction: 1-107
Internet history
1980-1990: new protocols, a proliferation of networks
 1983: deployment of TCP/IP  new national networks: CSnet,
 1982: smtp e-mail protocol BITnet, NSFnet, Minitel
defined  100,000 hosts connected to
 1983: DNS defined for name- confederation of networks
to-IP-address translation
 1985: ftp protocol defined
 1988: TCP congestion control

Introduction: 1-108
Internet history
1990, 2000s: commercialization, the Web, new applications
 early 1990s: ARPAnet late 1990s – 2000s:
decommissioned  more killer apps: instant
 1991: NSF lifts restrictions on messaging, P2P file sharing
commercial use of NSFnet  network security to forefront
(decommissioned, 1995)
 est. 50 million host, 100 million+
 early 1990s: Web
users
• hypertext [Bush 1945, Nelson 1960’s]
 backbone links running at Gbps
• HTML, HTTP: Berners-Lee
• 1994: Mosaic, later Netscape
• late 1990s: commercialization of the
Web
Introduction: 1-109
Internet history
2005-present: more new applications, Internet is “everywhere”
 ~18B devices attached to Internet (2017)
• rise of smartphones (iPhone: 2007)
 aggressive deployment of broadband access
 increasing ubiquity of high-speed wireless access: 4G/5G, WiFi
 emergence of online social networks:
• Facebook: ~ 2.5 billion users
 service providers (Google, FB, Microsoft) create their own networks
• bypass commercial Internet to connect “close” to end user, providing
“instantaneous” access to search, video content, …
 enterprises run their services in “cloud” (e.g., Amazon Web Services,
Microsoft Azure)
Introduction: 1-110
Chapter 1: summary
We’ve covered a “ton” of material!
 Internet overview
 what’s a protocol? You now have:
 network edge, access network, core  context, overview,
• packet-switching versus circuit-
switching vocabulary, “feel”
• Internet structure of networking
 performance: loss, delay, throughput  more depth,
 layering, service models detail, and fun to
 security follow!
 history
Introduction: 1-111

You might also like