tdts06: computer networkstdts06/timetable/2013/tdts06-2013-ch1.pdf · notes derived from...
TRANSCRIPT
![Page 1: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/1.jpg)
TDTS06 1-1
TDTS06: Computer Networks
Instructor: Niklas Carlsson
Email: [email protected]
Office: B:476
Office Hours: TBA
Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley.
The slides are adapted and modified based on (among other
things) slides from the book’s companion Website, as well as modified slides by A. Mahanti and C. Williamson.
![Page 2: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/2.jpg)
TDTS06 1-2
People
Examiner and lecturer Niklas Carlsson, Associate Professor
Research area: Design, modeling, and performance evaluation of distributed systems and networks
Lecturer Jose Pena, Associate Professor
Research area: Machine learning
Lab assistants Vengatanathan Krishnamoorthi, PhD student
Farrokh Ghani Zadegan, PhD student
Director of studies Patrick Lambrix
![Page 3: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/3.jpg)
TDTS06 1-3
Course Overview
Written exam Grads: ‘fail’, 3, 4, 5.
Four (4) mandatory lab assignments Must pass all four labs
Eight lab opportunities
Please register on webreg right away!! (deadline on Friday)
One (1) optional assignment Up to 4 bonus marks for exam
Eleven (11) lectures + one (1) exam prep.
See website for more information ...
![Page 4: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/4.jpg)
TDTS06 1-4
My expectations
Read textbook Good textbook, written by highly regarded
researchers in the field
Lots of content
Not time to cover everything during lectures
Work hard Pay attention during lectures
Make sure you understand the material
Start assignments early (some will take time)
Follow deadlines and office hours
![Page 5: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/5.jpg)
TDTS06 1-5
What to expect? (What will be covered?)
Design principles for computer networks Conceptual view of Internet architecture
Design, resource, and performance tradeoffs General working knowledge of protocols/applications
Detailed knowledge of selected protocols/applications
Some practical hands on experience
Glimpse into the future of the Internet Emerging trends and technologies
![Page 6: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/6.jpg)
TDTS06 1-6
![Page 7: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/7.jpg)
TDTS06 1-7
Roadmap (today’s lecture)
What is a Computer Network?
Applications of Networking
Classification of Networks
Layered Architecture (and Protocols)
Network Core
Delay & Loss in Packet-switched Networks
Structure of the Internet
Summary
![Page 8: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/8.jpg)
E.g., https://www.youtube.com/watch?v=w42EsCDAhB4
So, what are computer networks?
TDTS06 1-8
![Page 9: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/9.jpg)
TDTS06 1-9
Computer Network?
“interconnected collection of autonomous computers connected by a communication technology”
What is the Internet? “network of networks”
“collection of networks interconnected by routers”
“a communication medium used by millions” • Email, chat, Web “surfing”, streaming media
Internet Web
![Page 10: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/10.jpg)
TDTS06 1-10
The “nuts and bolts” view of the Internet
local ISP
company network
regional ISP
router workstation
server mobile
![Page 11: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/11.jpg)
TDTS06 1-11
The “nuts and bolts” view of the Internet
millions of connected computing devices called hosts or end-systems PCs, workstations, servers
PDAs, phones, toasters
running network apps
communication links fiber, copper, radio, satellite
links have different capacities (bandwidth)
routers: forward packets
packet: piece of a message (basic unit of transfer)
local ISP
company network
regional ISP
router workstation
server mobile
![Page 12: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/12.jpg)
TDTS06 1-12
![Page 13: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/13.jpg)
TDTS06 1-13
Roadmap
What is a Computer Network?
Applications of Networking
Classification of Networks
Layered Architecture (and Protocols)
Network Core
Delay & Loss in Packet-switched Networks
Structure of the Internet
Summary
![Page 14: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/14.jpg)
Service/company landscape include
TDTS06 1-14
![Page 15: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/15.jpg)
TDTS06 1-15
Applications: Example classes
File transfer
Remote login (telnet, rlogin, ssh)
World Wide Web (WWW)
Instant Messaging (Internet chat, text messaging on cellular phones)
Peer-to-Peer file sharing
Internet Phone (Voice-Over-IP)
Video-on-demand
Distributed Games
… and many more to come/discuss …
![Page 16: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/16.jpg)
TDTS06 1-16
Applications (2)
end systems (hosts): run application programs
e.g. Web, email, ftp
at “edge of network”
client/server model client host requests, receives
service from always-on server
e.g. Web browser/server; email client/server
Client/server model has well-defined roles for each.
![Page 17: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/17.jpg)
TDTS06 1-17
Applications (3)
peer-to-peer model: No fixed clients or servers
Each host can act as both client and server at any time
Examples: Napster, Gnutella, KaZaA, BitTorrent
![Page 18: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/18.jpg)
TDTS06 1-18
![Page 19: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/19.jpg)
TDTS06 1-19
Roadmap
What is a Computer Network?
Applications of Networking
Classification of Networks
Layered Architecture (and Protocols)
Network Core
Delay & Loss in Packet-switched Networks
Structure of the Internet
Summary
![Page 20: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/20.jpg)
TDTS06 1-20
Internet is an example of an internetwork. Internetwork: interconnection of networks
Subnetwork: a constituent of an internet
Intermediate system: a device used to connect two networks allowing hosts of the networks to correspond with each other
• Bridge
• Router
![Page 21: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/21.jpg)
TDTS06 1-21
A Classification of Networks
Wide Area Network (WAN)
Metropolitan Area Network (MAN)
Local Area Network (LAN)
Wireless LAN (WLAN)
Home Networks
Personal Area Network (PAN)
Body Area Network (BAN)
… and more (incl. sensor and ad-hoc) …
![Page 22: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/22.jpg)
TDTS06 1-22
Wide Area Network (WAN)
Spans a large geographic area, e.g., a country or a continent
A WAN consists of several transmission lines and routers
Internet is an example of a WAN
![Page 23: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/23.jpg)
TDTS06 1-23
Metropolitan Area Network (MAN)
home
cable headend
cable distribution
network (simplified)
Typically 500 to 5,000 homes
A Cable TV Network is an example of a MAN
“City sized”: tens of kilometers
![Page 24: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/24.jpg)
TDTS06 1-24
Cable Network Architecture: Overview
home
cable headend
cable distribution
network (simplified)
![Page 25: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/25.jpg)
TDTS06 1-25
Cable Network Architecture: Overview
home
cable headend
cable distribution
network
server(s)
![Page 26: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/26.jpg)
TDTS06 1-26
Local Area Network (LAN)
company/univ local area network (LAN) connects end system to edge router
Ethernet:
shared or dedicated link connects end system and router (a few km)
10 Mbps, 100Mbps, Gigabit Ethernet
widespread deployment: companies, univ, homeLANs
LANs: chapter 5
![Page 27: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/27.jpg)
TDTS06 1-27
Wireless Networks (WLANs)
shared wireless access network connects end system to router via base station or “access point”
wireless LANs: 802.11b (WiFi)
base station
mobile hosts
router
To the wired network
![Page 28: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/28.jpg)
TDTS06 1-28
Wireless Networks (WLANs)
shared wireless access network connects end system to router via base station or “access point”
wireless LANs: 802.11b (WiFi)
wider-area wireless access provided by telco operator
3G, 4G
WAP/GPRS in Europe
WiMax
base station
mobile hosts
router
To the wired network
![Page 29: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/29.jpg)
TDTS06 1-29
Home networks
Typical home network components:
ADSL or cable modem
router/firewall/NAT
Ethernet
wireless access point
wireless access point
wireless laptops
router/ firewall
cable modem
to/from cable
headend
Ethernet (switched)
![Page 30: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/30.jpg)
TDTS06 1-30
![Page 31: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/31.jpg)
TDTS06 1-31
Roadmap
What is a Computer Network?
Applications of Networking
Classification of Networks
Layered Architecture (and Protocols)
Network Core
Delay & Loss in Packet-switched Networks
Structure of the Internet
Summary
![Page 32: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/32.jpg)
But first ...What’s a protocol?
Protocols:
The rules used for communication
Proper, accepted, and expected behavior
Introduction 1-32
![Page 33: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/33.jpg)
But first … What’s a protocol?
Hi
Hi
Got the
time?
2:00
TCP connection response
Get http://www.awl.com/kurose-ross
<file> time
Introduction 1-33
TCP connection request
human protocols:
“What’s the time?”
“I have a question”
Introductions
network protocols:
Machines rather than humans
All communication activity in Internet governed by protocols
![Page 34: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/34.jpg)
But first ...What’s a protocol?
Need:
Introduction 1-34
messages
[actions on events]
[actions on events]
![Page 35: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/35.jpg)
But first ...What’s a protocol?
Need:
… specific msgs sent
Introduction 1-35
messages
[actions on events]
[actions on events]
![Page 36: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/36.jpg)
But first ...What’s a protocol?
Need:
… specific msgs sent
… specific actions taken when msgs received, or other events
Introduction 1-36
messages
[actions on events]
[actions on events]
![Page 37: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/37.jpg)
But first ...What’s a protocol?
Need:
… specific msgs sent
… specific actions taken when msgs received, or other events
Network protocols:
Define the order and format of messages exchanged
Defines the actions to take in response to events (e.g., message arrivals, transmissions, losses, and timeouts)
Introduction 1-37
messages
[actions on events]
[actions on events]
![Page 38: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/38.jpg)
TDTS06 1-38
![Page 39: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/39.jpg)
TDTS06 1-39
Layered Architecture: Why?
Networks are complex with many pieces
Hosts, routers, links, applications, protocols, hardware, software
Can we organize it, somehow?
![Page 40: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/40.jpg)
TDTS06 1-40
Layered Architecture: Why?
Networks are complex with many pieces
Hosts, routers, links, applications, protocols, hardware, software
Can we organize it, somehow?
Let’s consider a Web page request …
![Page 41: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/41.jpg)
TDTS06 1-41
Motivation Continued …
Network
Services
Application
Services
Communication
Service
Network
Services
Application
Services
Communication
Service
Web Client Web Server
Application logic
Reliable delivery
Transfer “bits”
![Page 42: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/42.jpg)
TDTS06 1-42
Motivation Continued …
Dealing with complex systems: explicit structure allows identification, relationship
of complex system’s pieces
layered reference model for discussion
modularization eases maintenance, updating of system
change of implementation of layer’s service transparent to rest of system
e.g., change in network technology doesn’t affect rest of system
layering considered harmful? (design vs implemention)
![Page 43: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/43.jpg)
TDTS06 1-43
![Page 44: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/44.jpg)
TDTS06 1-44
Layers, Protocols, Interfaces
![Page 45: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/45.jpg)
TDTS06 1-45
Layers, Protocols, Interfaces
Networks organized as a stack of layers Offer services to the layer above it using a
well-defined interface • programming language analogy: libraries hide details
while providing a service)
Reduces design complexity
Protocols: Logical “horizontal” conversations at any layer (between peers)
Data Transfer: each layer passes data & control information over the interfaces (between neighboring layers)
![Page 46: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/46.jpg)
TDTS06 1-46
Layers, Protocols, Interfaces
Web Client Web Server
Application logic
protocol
Reliable delivery
protocol
Transfer “bits”
protocol Network
Services
Application
Services
Communication
Service
Network
Services
Application
Services
Communication
Service
Layer
Interface
Layer
Interface
![Page 47: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/47.jpg)
TDTS06 1-47
Layered Architecture (cont’d)
A set of layers & protocols is called a Network Architecture.
These specifications enable hardware/software developers to build systems compliant with a particular architecture. E.g., TCP/IP, OSI
![Page 48: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/48.jpg)
TDTS06 1-48
Layering: Design Issues
How many layers? What do they each do?
How to identify senders/receivers? Addressing
Unreliable physical communication medium? Error detection
Error control
Message reordering
Sender can swamp the receiver? Flow control
Multiplexing/Demultiplexing
![Page 49: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/49.jpg)
TDTS06 1-49
Reference Models
![Page 50: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/50.jpg)
TDTS06 1-50
Reference Models
![Page 51: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/51.jpg)
TDTS06 1-51
Internet protocol stack
application: supporting network applications FTP, SMTP, STTP
transport: host-host data transfer TCP, UDP
network: routing of datagrams from source to destination IP, routing protocols
link: data transfer between neighboring network elements PPP, Ethernet
physical: bits “on the wire”
application
transport
network
link
physical
![Page 52: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/52.jpg)
TDTS06 1-52
The Application Layer
Residence of network applications and their application control logic
Examples include: HTTP (Hyper-Text Transfer Protocol)
FTP (File Transfer Protocol)
Telnet
SMTP (Simple Mail Transfer Protocol)
DNS (Domain Name Service)
![Page 53: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/53.jpg)
TDTS06 1-53
The Transport Layer
Concerned with end-to-end data transfer between end systems (hosts)
Transmission unit is called segment
TCP/IP networks such as the Internet provides two types of services to applications “connection-oriented” service – Transmission
Control Protocol (TCP)
“connectionless” service - User Datagram Protocol (UDP)
![Page 54: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/54.jpg)
TDTS06 1-54
The Network Layer
End systems inject datagrams in the networks
A transmission path is determined for each packet (routing)
A “best effort” service Datagrams might be lost
Datagrams might arrive out of order
Analogy: Postal system
![Page 55: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/55.jpg)
TDTS06 1-55
Internet protocol stack
application: supporting network applications FTP, SMTP, STTP
transport: host-host data transfer TCP, UDP
network: routing of datagrams from source to destination IP, routing protocols
link: data transfer between neighboring network elements PPP, Ethernet
physical: bits “on the wire”
application
transport
network
link
physical
![Page 56: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/56.jpg)
TDTS06 1-56
Layering: logical communication
application transport network
link physical
application transport network
link physical
application transport network
link physical
application transport network
link physical
network link
physical
![Page 57: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/57.jpg)
TDTS06 1-57
Layering: logical communication
application transport network
link physical
application transport network
link physical
application transport network
link physical
application transport network
link physical
network link
physical
data
data
data
transport
transport
ack
![Page 58: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/58.jpg)
TDTS06 1-58
Layering: physical communication
application transport network
link physical
application transport network
link physical
application transport network
link physical
application transport network
link physical
network link
physical
data
data
![Page 59: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/59.jpg)
TDTS06 1-59
Encapsulation: Layering and data
Each layer takes data from above
adds header information to create new data unit
passes new data unit to layer below
application transport network
link physical
application transport network
link physical
source destination
M message
![Page 60: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/60.jpg)
TDTS06 1-60
Encapsulation: Layering and data
Each layer takes data from above
adds header information to create new data unit
passes new data unit to layer below
application transport network
link physical
application transport network
link physical
source destination
M
M H t
message
segment
![Page 61: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/61.jpg)
TDTS06 1-61
Encapsulation: Layering and data
Each layer takes data from above
adds header information to create new data unit
passes new data unit to layer below
application transport network
link physical
application transport network
link physical
source destination
M
M
M
H t
H t H n
message
segment
datagram
![Page 62: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/62.jpg)
TDTS06 1-62
Encapsulation: Layering and data
Each layer takes data from above
adds header information to create new data unit
passes new data unit to layer below
application transport network
link physical
application transport network
link physical
source destination
M
M
M
M
H t
H t H n
H t H n H l
message
segment
datagram
frame
![Page 63: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/63.jpg)
TDTS06 1-63
Encapsulation: Layering and data
Each layer takes data from above
adds header information to create new data unit
passes new data unit to layer below
application transport network
link physical
application transport network
link physical
source destination
M
M
M
M
H t
H t H n
H t H n H l M H t H n H l
message
segment
datagram
frame
![Page 64: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/64.jpg)
TDTS06 1-64
Encapsulation: Layering and data
Each layer takes data from above
adds header information to create new data unit
passes new data unit to layer below
application transport network
link physical
application transport network
link physical
source destination
M
M
M
M
H t
H t H n
H t H n H l
M
M
H t H n
H t H n H l
message
segment
datagram
frame
![Page 65: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/65.jpg)
TDTS06 1-65
Encapsulation: Layering and data
Each layer takes data from above
adds header information to create new data unit
passes new data unit to layer below
application transport network
link physical
application transport network
link physical
source destination
M
M
M
M
H t
H t H n
H t H n H l
M
M
M
H t
H t H n
H t H n H l
message
segment
datagram
frame
![Page 66: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/66.jpg)
TDTS06 1-66
Encapsulation: Layering and data
Each layer takes data from above
adds header information to create new data unit
passes new data unit to layer below
application transport network
link physical
application transport network
link physical
source destination
M
M
M
M
H t
H t H n
H t H n H l
M
M
M
M
H t
H t H n
H t H n H l
message
segment
datagram
frame
![Page 67: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/67.jpg)
TDTS06 1-67
Layering: physical communication
application transport network
link physical
application transport network
link physical
application transport network
link physical
application transport network
link physical
network link
physical
data
data
![Page 68: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/68.jpg)
TDTS06 1-68
![Page 69: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/69.jpg)
TDTS06 1-69
Roadmap
What is a Computer Network?
Applications of Networking
Classification of Networks
Layered Architecture (and Protocols)
Network Core
Delay & Loss in Packet-switched Networks
Structure of the Internet
Summary
![Page 70: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/70.jpg)
TDTS06 1-70
mesh of interconnected routers
![Page 71: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/71.jpg)
TDTS06 1-71
mesh of interconnected routers
the fundamental question: how is data transferred through net?
![Page 72: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/72.jpg)
TDTS06 1-72
mesh of interconnected routers
the fundamental question: how is data transferred through net?
circuit-switching: dedicated circuit per call: telephone net
packet-switching: data sent thru net in discrete “chunks”
![Page 73: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/73.jpg)
TDTS06 1-73
Network Taxonomy
Telecommunication networks
Circuit-switched networks
FDM TDM
Packet-switched networks
Networks with VCs
Datagram Networks
![Page 74: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/74.jpg)
TDTS06 1-74
Alt. 1: Circuit-Switching
End-to-end resources reserved for “call”
Link bandwidth, switch capacity
Dedicated resources with no sharing
Guaranteed transmission capacity
Call setup required
“Blocking” may occur
![Page 75: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/75.jpg)
TDTS06 1-75
Alt. 1: Circuit-Switching
Capacity of medium exceeds the capacity required for transmission of a single signal How can we improve “efficiency”? Let’s
multiplex.
Divide link bandwidth into “pieces”:
frequency division - FDMA
time division – TDMA
code division - CDMA (cellular networks)
wavelength division - WDM (optical)
![Page 76: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/76.jpg)
TDTS06 1-76
Circuit-Switching: FDMA and TDMA
FDMA
frequency
time
TDMA
frequency
time
4 users
Example:
![Page 77: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/77.jpg)
TDTS06 1-77
Alt. 2: Packet-Switching
source breaks long messages into smaller “packets”
“store-and-forward” transmission packets share network resources
each packet briefly uses full link bandwidth
resource contention aggregate resource demand can exceed amount
available
congestion: packets queue, wait for link use
analogy: rush hour traffic in cities
![Page 78: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/78.jpg)
TDTS06 1-78
Packet-Switching: Statistical Multiplexing
Resource sharing great for bursty traffic E.g., Sequence of A & B packets does not have fixed
pattern - statistical multiplexing.
In contrast: In TDM each host gets same slot in revolving TDM frame.
A
B
C 10 Mbs Ethernet
1.5 Mbs
D E
statistical multiplexing
queue of packets waiting for output
link
![Page 79: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/79.jpg)
TDTS06 1-79
Packet-Switching: Statistical Multiplexing
Resource sharing great for bursty traffic E.g., Sequence of A & B packets does not have fixed
pattern - statistical multiplexing.
In contrast: In TDM each host gets same slot in revolving TDM frame.
Is packet switching a “slam dunk” winner?
A
B
C 10 Mbs Ethernet
1.5 Mbs
D E
statistical multiplexing
queue of packets waiting for output
link
![Page 80: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/80.jpg)
TDTS06 1-80
Packet-Switching: Statistical Multiplexing
Resource sharing great for bursty traffic E.g., Sequence of A & B packets does not have fixed
pattern - statistical multiplexing.
In contrast: In TDM each host gets same slot in revolving TDM frame.
Is packet switching a “slam dunk” winner? E.g., delay/loss and bandwidth guarantees …
A
B
C 10 Mbs Ethernet
1.5 Mbs
D E
statistical multiplexing
queue of packets waiting for output
link
![Page 81: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/81.jpg)
TDTS06 1-81
Packet-switching: store-and-forward
Takes L/R seconds to transmit (push out) packet of L bits on to link or R bps
Entire packet must arrive at router before it can be transmitted on next link: store and forward
delay = 3L/R
Example:
L = 7.5 Mbits
R = 1.5 Mbps
delay = 15 sec
R R R
L
![Page 82: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/82.jpg)
TDTS06 1-82
Packet-Switching: Message Segmenting
Now break up the message into 5000 packets
Each packet 1,500 bits
1 msec to transmit packet on one link
pipelining: each link works in parallel
Delay reduced from 15 sec to 5.002 sec
![Page 83: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/83.jpg)
TDTS06 1-83
Packet-switched networks: forwarding
datagram network: destination address in packet determines next hop
routes may change during session (flexible?)
no “per flow” state, hence more scalable
virtual circuit network: each packet carries tag (virtual circuit ID), tag
determines next hop
fixed path determined at call setup time
path is not a dedicated path as in circuit switched (i.e., store & forward of packets)
routers maintain per-call state
datagram networks need per packet routing.
![Page 84: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/84.jpg)
TDTS06 1-84
Network Taxonomy
Telecommunication networks
Circuit-switched networks
FDM TDM
Packet-switched networks
Networks with VCs
Datagram Networks
![Page 85: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/85.jpg)
TDTS06 1-85
![Page 86: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/86.jpg)
TDTS06 1-86
Roadmap
What is a Computer Network?
Applications of Networking
Classification of Networks
Layered Architecture (and Protocols)
Network Core
Delay & Loss in Packet-switched Networks
Structure of the Internet
Summary
![Page 87: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/87.jpg)
TDTS06 1-87
How do loss and delay occur?
packets queue in router buffers
packet arrival rate to link exceeds output link capacity
packets queue, wait for turn
if queue is full, arriving packets dropped (Drop-Tail)
A
B
packet being transmitted (delay)
packets queueing (delay)
free (available) buffers: arriving packets dropped (loss) if no free buffers
![Page 88: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/88.jpg)
TDTS06 1-88
Four sources of packet delay
1. Processing delay: check bit errors
determine output link
A
B
propagation
transmission
nodal processing queueing
2. Queueing delay: time waiting at output
link for transmission
depends on congestion level of router
![Page 89: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/89.jpg)
TDTS06 1-89
Delay in packet-switched networks
3. Transmission delay:
R=link bandwidth (bps)
L=packet length (bits)
time to send bits into link = L/R
4. Propagation delay:
d = length of physical link
s = propagation speed in medium (~2x108 m/sec)
propagation delay = d/s
A
B
propagation
transmission
nodal processing queueing
Note: s and R are very different quantities!
![Page 90: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/90.jpg)
TDTS06 1-90
Nodal processing delay
dproc = processing delay typically a few microsecs or less
dqueue = queuing delay depends on congestion
dtrans = transmission delay = L/R, significant for low-speed links
dprop = propagation delay a few microsecs to hundreds of msecs
proptransqueueprocnodal ddddd
![Page 91: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/91.jpg)
TDTS06 1-91
Queueing delay (revisited)
R=link bandwidth (bps)
L=packet length (bits)
a=average packet arrival rate
traffic intensity = aL/R
aL/R ~ 0: average queueing delay small
aL/R -> 1: delays become large
aL/R > 1: more “work” arriving than can be serviced, average delay infinite!
E.g., Assume M/D/1
L/R (aL/R)
W = -----------------
2 (1 – (aL/R))
![Page 92: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/92.jpg)
TDTS06 1-92
“Real” Internet delays and routes
What do “real” Internet delay & loss look like?
Traceroute program: provides delay measurement from source to router along end-to-end Internet path towards destination. For all i: sends three packets that will reach router i on path
towards destination
router i will return packets to sender
sender times interval between transmission and reply.
3 probes
3 probes
3 probes
![Page 93: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/93.jpg)
TDTS06 1-93
![Page 94: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/94.jpg)
TDTS06 1-94
Roadmap
What is a Computer Network?
Applications of Networking
Classification of Networks
Layered Architecture (and Protocols)
Network Core
Delay & Loss in Packet-switched Networks
Structure of the Internet
Summary
![Page 95: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/95.jpg)
TDTS06 1-95
Internet structure: network of networks
roughly hierarchical
at center: “tier-1” ISPs (e.g., UUNet, BBN/Genuity, Sprint, AT&T), national/international coverage
treat each other as equals
Tier 1 ISP
Tier 1 ISP
Tier 1 ISP
Tier-1 providers interconnect (peer) privately
IXP
Tier-1 providers also interconnect at public network access points (NAPs)
![Page 96: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/96.jpg)
TDTS06 1-96
Tier-1 ISP: e.g., Sprint
Sprint US backbone network
![Page 97: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/97.jpg)
TDTS06 1-97
Internet structure: network of networks
“Tier-2” ISPs: smaller (often regional) ISPs Connect to one or more tier-1 ISPs, possibly other tier-2 ISPs
Tier 1 ISP
Tier 1 ISP
Tier 1 ISP
IXP
Tier-2 ISP Tier-2 ISP
Tier-2 ISP Tier-2 ISP
Tier-2 ISP
Tier-2 ISP pays tier-1 ISP for connectivity to rest of Internet tier-2 ISP is customer of tier-1 provider
Tier-2 ISPs also peer privately with each other, interconnect at NAP
![Page 98: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/98.jpg)
TDTS06 1-98
Internet structure: network of networks
“Tier-3” ISPs and local ISPs last hop (“access”) network (closest to end systems)
Tier 1 ISP
Tier 1 ISP
Tier 1 ISP
IXP
Tier-2 ISP Tier-2 ISP
Tier-2 ISP Tier-2 ISP
Tier-2 ISP
local ISP
local ISP
local ISP
local ISP
local ISP Tier 3
ISP
local ISP
local ISP
local ISP
Local and tier- 3 ISPs are customers of higher tier ISPs connecting them to rest of Internet
![Page 99: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/99.jpg)
TDTS06 1-99
Internet structure: network of networks
a packet passes through many networks!
Tier 1 ISP
Tier 1 ISP
Tier 1 ISP
IXP
Tier-2 ISP Tier-2 ISP
Tier-2 ISP Tier-2 ISP
Tier-2 ISP
local ISP
local ISP
local ISP
local ISP
local ISP Tier 3
ISP
local ISP
local ISP
local ISP
![Page 100: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/100.jpg)
TDTS06 1-100
![Page 101: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/101.jpg)
TDTS06 1-101
Introduction: Summary
Covered a “ton” of material! Internet overview what’s a protocol? network edge, core, access
network packet-switching versus
circuit-switching Internet/ISP structure performance: loss, delay layering and service models Internet history
You now have: context, overview,
“feel” of networking more depth, detail to
follow!
![Page 102: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/102.jpg)
TDTS06 1-102
Ohh, and the history …
…
![Page 103: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/103.jpg)
Internet History
1961: Kleinrock - queueing theory shows effectiveness of packet-switching
1964: Baran - packet-switching in military nets
1967: ARPAnet conceived by Advanced Research Projects Agency
1969: first ARPAnet node operational
1972:
ARPAnet public demonstration
NCP (Network Control Protocol) first host-host protocol
first e-mail program
ARPAnet has 15 nodes
1961-1972: Early packet-switching principles
Introduction 1-103
![Page 104: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/104.jpg)
Internet History
1961: Kleinrock - queueing theory shows effectiveness of packet-switching
1964: Baran - packet-switching in military nets
1967: ARPAnet conceived by Advanced Research Projects Agency
1969: first ARPAnet node operational
1972:
ARPAnet public demonstration
NCP (Network Control Protocol) first host-host protocol
first e-mail program
ARPAnet has 15 nodes
1961-1972: Early packet-switching principles
Introduction 1-104
![Page 105: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/105.jpg)
Internet History
1970: ALOHAnet satellite network in Hawaii
1974: Cerf and Kahn - architecture for interconnecting networks
1976: Ethernet at Xerox PARC
late70’s: proprietary architectures: DECnet, SNA, XNA
late 70’s: switching fixed length packets (ATM precursor)
1979: ARPAnet has 200 nodes
Cerf and Kahn’s internetworking principles: minimalism, autonomy -
no internal changes required to interconnect networks
best effort service model
stateless routers decentralized control
define today’s Internet architecture
1972-1980: Internetworking, new and proprietary nets
Introduction 1-105
![Page 106: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/106.jpg)
Internet History
1970: ALOHAnet satellite network in Hawaii
1974: Cerf and Kahn - architecture for interconnecting networks
1976: Ethernet at Xerox PARC
late70’s: proprietary architectures: DECnet, SNA, XNA
late 70’s: switching fixed length packets (ATM precursor)
1979: ARPAnet has 200 nodes
Cerf and Kahn’s internetworking principles: minimalism, autonomy -
no internal changes required to interconnect networks
best effort service model
stateless routers decentralized control
define today’s Internet architecture
1972-1980: Internetworking, new and proprietary nets
Introduction 1-106
![Page 107: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/107.jpg)
Internet History
1983: deployment of TCP/IP
1982: smtp e-mail protocol defined
1983: DNS defined for name-to-IP-address translation
1985: ftp protocol defined
1988: TCP congestion control
new national networks: Csnet, BITnet, NSFnet, Minitel
100,000 hosts connected to confederation of networks
1980-1990: new protocols, a proliferation of networks
Introduction 1-107
![Page 108: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/108.jpg)
Internet History
1983: deployment of TCP/IP
1982: smtp e-mail protocol defined
1983: DNS defined for name-to-IP-address translation
1985: ftp protocol defined
1988: TCP congestion control
new national networks: Csnet, BITnet, NSFnet, Minitel
100,000 hosts connected to confederation of networks
1980-1990: new protocols, a proliferation of networks
Introduction 1-108
![Page 109: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/109.jpg)
Internet History
early 1990’s: ARPAnet decommissioned
1991: NSF lifts restrictions on commercial use of NSFnet (decommissioned, 1995)
early 1990s: Web
hypertext [Bush 1945, Nelson 1960’s]
HTML, HTTP: Berners-Lee
1994: Mosaic, later Netscape
late 1990’s: commercialization of the Web
late 1990’s – 2000’s: more killer apps: instant
messaging, P2P file sharing
network security to forefront
est. 50 million host, 100 million+ users
backbone links running at Gbps
1990, 2000’s: commercialization, the Web, new apps
Introduction 1-109
![Page 110: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/110.jpg)
Internet History
early 1990’s: ARPAnet decommissioned
1991: NSF lifts restrictions on commercial use of NSFnet (decommissioned, 1995)
early 1990s: Web
hypertext [Bush 1945, Nelson 1960’s]
HTML, HTTP: Berners-Lee
1994: Mosaic, later Netscape
late 1990’s: commercialization of the Web
late 1990’s – 2000’s: more killer apps: instant
messaging, P2P file sharing
network security to forefront
est. 50 million host, 100 million+ users
backbone links running at Gbps
1990, 2000’s: commercialization, the Web, new apps
Introduction 1-110
![Page 111: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/111.jpg)
Internet History
2010:
~750 million hosts
voice, video over IP
P2P applications: BitTorrent (file sharing) Skype (VoIP), PPLive (video)
more applications: YouTube, gaming, Twitter, facebook, ...
on-demand streaming
wireless, mobility
smart grid, sustainable ICT, ...
Introduction 1-111
![Page 112: TDTS06: Computer NetworksTDTS06/timetable/2013/tdts06-2013-ch1.pdf · Notes derived from “Computer Networking: A Top Down Approach”, by Jim Kurose and Keith Ross, Addison-Wesley](https://reader034.vdocuments.us/reader034/viewer/2022042108/5e8781dae6695443a07f594f/html5/thumbnails/112.jpg)
Internet History
2010:
~750 million hosts
voice, video over IP
P2P applications: BitTorrent (file sharing) Skype (VoIP), PPLive (video)
more applications: YouTube, gaming, Twitter, facebook, ...
on-demand streaming
wireless, mobility
smart grid, sustainable ICT, ...
Introduction 1-112