1.2 The Network Edge Beginning at the edge of a network we are looking at the components with which we are most familiar - namely, the computers that we.

Slides:



Advertisements
Similar presentations
TCP/IP MODEL Maninder Kaur
Advertisements

Introduction 2 1: Introduction.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 OSI Transport Layer Network Fundamentals – Chapter 4.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 OSI Transport Layer Network Fundamentals – Chapter 4.
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Application Layer – Lecture.
Introduction1-1 Introduction to Computer Networks Our goal:  get “feel” and terminology  more depth, detail later in course  approach:  use Internet.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.0 Module 11 TCP/IP Transport and Application Layers.
1 Day 01 - The Internet. 2 Chapter 1 Introduction Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross.
OSI Model 7 Layers 7. Application Layer 6. Presentation Layer
1 Computer Networks Transport Layer Protocols. 2 Application-layer Protocols Application-layer protocols –one “piece” of an app –define messages exchanged.
1: Introduction1 Part I: Introduction Goal: r get context, overview, “feel” of networking r more depth, detail later in course r approach: m descriptive.
Chapter 1 Introduction Computer Networking: A Top Down Approach 6th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
Process-to-Process Delivery:
TRANSPORT LAYER T.Najah Al-Subaie Kingdom of Saudi Arabia Prince Norah bint Abdul Rahman University College of Computer Since and Information System NET331.
Lect3..ppt - 09/12/04 CIS 4100 Systems Performance and Evaluation Lecture 3 by Zornitza Genova Prodanoff.
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 3: TCP/IP Architecture.
CCNA 1 v3.0 Module 11 TCP/IP Transport and Application Layers.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Network Services Networking for Home and Small Businesses – Chapter.
Copyright 2003 CCNA 1 Chapter 9 TCP/IP Transport and Application Layers By Your Name.
Jaringan Komputer Dasar OSI Transport Layer Aurelio Rahmadian.
1.1 What is the Internet What is the Internet? The Internet is a shared media (coaxial cable, copper wire, fiber optics, and radio spectrum) communication.
Introduction1-1 Course Code:EE/TE533 Instructor: Muddathir Qamar.
CS 3214 Computer Systems Godmar Back Lecture 23. Announcements Project 5 due Dec 8 Exercise 10 handed out Exercise 11 coming before Thanksgiving CS 3214.
What makes a network good? Ch 2.1: Principles of Network Apps 2: Application Layer1.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Services Networking for Home and Small Businesses – Chapter 6.
Jozef Goetz, Application Layer PART VI Jozef Goetz, Position of application layer The application layer enables the user, whether human.
TCP/IP Transport and Application (Topic 6)
Day16 Protocols. TCP “Transmission Control Protocol” –Connection oriented Very like a phone call, an actual connection is made between the 2 parties.
Ch 1. Computer Networks and the Internet Myungchul Kim
The Transport Layer application transport network data link physical application transport network data link physical application transport network data.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.0 Module 11 TCP/IP Transport and Application Layers.
CCNA 1 v3.0 Module 11 TCP/IP Transport and Application Layers.
1 End-user Protocols, Services and QoS. 2 Layering: logical communication application transport network link physical application transport network link.
Introduction1-1 Chapter 1 Computer Networks and the Internet Computer Networking: A Top Down Approach Featuring the Internet, 2 nd edition. Jim Kurose,
INTERNET AND PROTOCOLS For more notes and topics visit: eITnotes.com.
McGraw-Hill Chapter 23 Process-to-Process Delivery: UDP, TCP Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Roadmap  Introduction to Basics  Computer Network – Components | Classification  Internet  Clients and Servers  Network Models  Protocol Layers.
Application Layer Functionality and Protocols Abdul Hadi Alaidi
Introduction to Networks
LESSON Networking Fundamentals Understand TCP/IP.
The Transport Layer Implementation Services Functions Protocols
Graciela Perera Introduction Graciela Perera
CS 3214 Computer Systems Networking.
Day 01 - The Internet.
Part 0: Networking Review
Slides taken from: Computer Networking by Kurose and Ross
CS 3214 Computer Systems Lecture 21 Godmar Back.
Chapter 1 Introduction Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011.
CS 3214 Computer Systems Networking.
Networking for Home and Small Businesses – Chapter 6
TCP Transport layer Er. Vikram Dhiman LPU.
Introduction to Networks
Networking for Home and Small Businesses – Chapter 6
Chapter 2 Introduction Application Requirements VS. Transport Services
Transport Layer Unit 5.
Process-to-Process Delivery:
1 TRANSMISSION CONTROL PROTOCOL / INTERNET PROTOCOL (TCP/IP) K. PALANIVEL Systems Analyst, Computer Centre Pondicherry University, Puducherry –
CS4470 Computer Networking Protocols
Computer Networks Topic :User datagram protocol Transmission Control Protocol -Hemashree S( )
Networking for Home and Small Businesses – Chapter 6
OSI Reference Model Unit II
Process-to-Process Delivery: UDP, TCP
The Internet 2nd Lecture
Computer Networks Protocols
Computer Networks Protocols
The TCP/IP Model.
OSI Model 7 Layers 7. Application Layer 6. Presentation Layer
Unit – III Network Essentials
Presentation transcript:

1.2 The Network Edge Beginning at the edge of a network we are looking at the components with which we are most familiar - namely, the computers that we use on a daily basis. 1.2.1 End Systems, Clients, and Servers The computers connected to the Internet are often referred to as hosts or end systems. They are referred to as end systems because they sit at the edge of the Internet. The Internet's end systems include desktop computers (e.g., desktop PCs, Macs, and UNIX-based workstations), servers (e.g., Web and e-mail servers), and mobile computers (e.g., portable computers, PDAs, and phones with wireless Internet connections). Furthermore, an increasing number of alternative devices, such as thin clients and household appliances, Web TVs and set-top boxes, digital cameras, home appliances, factory floor equipment, and environmental sensors, are being attached to the Internet as end systems. End systems are also referred to as hosts because they host (that is, run) applications such as a Web browser program, a Web server program, an e-mail reader program, or an e-mail server program. Throughout we will use the terms hosts and end systems interchangeably; that is, host = end system.

Hosts are sometimes further divided into two categories: a) Clients and b) Servers. Clients tend to be desktop and mobile PCs, PDAs, and so on. Servers tend to be more powerful machines that store and distribute Web pages, stream video, relay e-mail, and so on. In the context of networking software, there is another definition of a client and server. A client program is a program running on one end system that requests and receives a service from a server program running on another end system. The client-server model is undoubtedly the most prevalent structure for Internet applications. The Web, e-mail, file transfer, remote login (for example, Telnet), news-groups, and many other popular applications adopt the client/server model. Since a client program typically runs on one computer and the server program runs on another computer, client/server Internet applications are, by definition, distributed applications. The client program and the server program interact by sending each other messages over the Internet.

Not all Internet applications today consist of pure client programs interacting with pure server programs. For example, in popular Peer-to-Peer (P2P) file-sharing applications (such as KaZaA) the P2P application in the user's end system acts as both a client program and a server program. The program running in a peer (that is, a user's machine) acts as a client when it requests a file from another peer; and the program acts as a server when it sends a file to another peer. In Internet telephony, the two communicating parties interact as peers; there is no sense in which one party requests service from another.

1.2.2 Connectionless and Connection-Oriented Service End systems use the Internet to communicate with each other. Specifically, end-system programs use the services of the Internet to send messages to each other. The links and other pieces of the Internet provide the means to transport these messages between the end-system programs. But what are the characteristics of the communication services that the Internet provides to its end systems? TCP/IP networks, and in particular the Internet, provide two types of services to end-system applications: connection-oriented service and connectionless service. A developer creating an Internet application (for example, an e-mail application, a file transfer application, a Web application, or an Internet phone application) must design the application to use one of these two services. Connection-Oriented Service When an application uses the connection-oriented service, the client program and the server program (residing in different end systems) send control packets to each other before sending packets with the actual data to be transferred. This so-called handshaking procedure alerts the client and server, allowing them to prepare for an onslaught of data packets. Once the handshaking procedure is finished, a connection is said to be established between the two end systems.

Why the terminology connection-oriented service and not just connection service? This terminology is due to the fact that the end systems are connected in a very loose manner. In particular, only the end systems themselves are aware of this connection; the packet switches within the Internet are completely oblivious to the connection. Indeed, a connection in the Internet consists of nothing more than allocated buffers and state variables in the end systems; the intervening packet switches do not maintain any connection-state information. The Internet's connection-oriented service comes bundled with several other services, including reliable data transfer, flow control, and congestion control.

By reliable data transfer we mean that an application can rely on the connection to deliver all of its data without error and in the proper order. Reliability in the Internet is achieved through the use of acknowledgments and retransmissions. To get a preliminary feel for how the Internet implements the reliable transport service, consider an application that has established a connection between end systems A and B. When end system B receives a packet from A, it sends an acknowledgment. When end system A receives the acknowledgment, it knows that the corresponding packet has definitely been received. When end system A doesn't receive an acknowledgment, it assumes the packet it sent wasn't received by B and thus retransmits the packet. Flow control makes sure that neither side of a connection overwhelms the other side by sending too many packets too fast.

The Internet's congestion-control service helps the Internet from entering a state of gridlock. When a packet switch becomes congested, its buffers can overflow and packet loss can occur. In such circumstances, if every pair of communicating end systems continues to pump packets into the network as fast as they can, gridlock sets in and few packets are delivered to their destinations. The Internet avoids this problem by forcing end systems to the rate at which they send packets into the network during periods of congestion. End systems are alerted to the existence of severe congestion when they stop receiving acknowledgments for the packets they have sent.

We emphasize here that although the Internet's connection-oriented service comes bundled with reliable data transfer, flow control, and congestion control, these three features are by no means essential components of a connection-oriented service. A different type of computer network may provide a connection-oriented service to its applications without bundling in, one or more of these features. Indeed, any protocol that performs handshaking between the communicating entities before transferring data is a connection-oriented service. Internet's connection-oriented service has a name - Transmission Control Protocol (TCP). The initial version of the TCP protocol is defined in the Internet for Comments RFC 793. The services that TCP provides to an application include reliable transport, flow control, and congestion control. TCP provides a byte-steam abstraction, reliably delivering a stream of bytes from the sender to the receiver. It is important to note that an application need only care about the services that are provided; it need not worry about how TCP actually implements reliability flow control, or congestion control. Most of the more familiar Internet applications use TCP, the Internet's connection - oriented service. These applications include Telnet (for remote login), SMTP (for e-mail), FTP (for file transfer), and HTTP (for the Web).

Connectionless Service There is no handshaking with the Internet's connectionless service. When one side of an application wants to send packets to the other side of the application, the sending program simply sends the packets. Since there is no handshaking procedure prior to data packet transmission, data can be delivered sooner. This makes connectionless service ideal for simple transaction-oriented applications. But there is no reliable data transfer either, so a source never knows for sure which packets have arrived at the destination. Moreover, the Internet's connectionless service makes no provision for flow control or congestion control. The Internet's connectionless service is called User Datagram Protocol (UDP); UDP is defined in the Internet Request For Comments RFC 768. UDP, the Internet's connectionless service, is used by many applications, including many of the multimedia applications, such as Internet phone and video conferencing.