Question Did anyone see the program about the Pony Express on the History Channel the other night? They hosted an hour long show about how the postal service.

Slides:



Advertisements
Similar presentations
The Internet.
Advertisements

Intermediate TCP/IP TCP Operation.
Guide to TCP/IP, Third Edition
Chapter 7 Intro to Routing & Switching.  Upon completion of this chapter, you should be able to:  Explain the need for the transport layer.  Identify.
UDP & TCP Where would we be without them!. UDP User Datagram Protocol.
Transport Layer – TCP (Part1) Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF.
CSCI-235 Micro-Computers in Science The Network. Network Fundamentals A computer network consists of two or more computers linked together to exchange.
Chapter 11 Data Link Control
Copyright 1999, S.D. Personick. All Rights Reserved. Telecommunications Networking II Lecture 32 Transmission Control Protocol (TCP) Ref: Tanenbaum pp:
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Services Networking for Home and Small Businesses – Chapter 6.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 11 Data Link Control and Protocols.
Network Layer and Transport Layer.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 OSI Transport Layer Network Fundamentals – Chapter 4.
Chapter 6 Errors, Error Detection, and Error Control.
UDP - User Datagram Protocol UDP – User Datagram Protocol Author : Nir Shafrir Reference The TCP/IP Guide - ( Version Version.
WXES2106 Network Technology Semester /2005 Chapter 8 Intermediate TCP CCNA2: Module 10.
TCP: Software for Reliable Communication. Spring 2002Computer Networks Applications Internet: a Collection of Disparate Networks Different goals: Speed,
Networking. Protocol Stack Generally speaking, sending an message is equivalent to copying a file from sender to receiver.
1.  A protocol is a set of rules that governs the communications between computers on a network.  Functions of protocols:  Addressing  Data Packet.
Process-to-Process Delivery:
TRANSPORT LAYER T.Najah Al-Subaie Kingdom of Saudi Arabia Prince Norah bint Abdul Rahman University College of Computer Since and Information System NET331.
OSI Model Honolulu Community College Cisco Academy Training Center
Lecture 2 TCP/IP Protocol Suite Reference: TCP/IP Protocol Suite, 4 th Edition (chapter 2) 1.
CS134 Web Design & Development Introduction to the Internet Mehmud Abliz.
Time Line of Communication By Jordan Rhodes. Pony Express The Pony Express was founded by William H. Russell, William B. Waddell, and Alexander Majors.
Copyright 2003 CCNA 1 Chapter 9 TCP/IP Transport and Application Layers By Your Name.
CECS 474 Computer Network Interoperability Notes for Douglas E. Comer, Computer Networks and Internets (5 th Edition) Tracy Bradley Maples, Ph.D. Computer.
TCP/IP Yang Wang Professor: M.ANVARI.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Services Networking for Home and Small Businesses – Chapter 6.
Lecture#1 on Internet. Internet Addressing IP address: pattern of 32 or 128 bits often represented in dotted decimal notation IP address: pattern of 32.
Mukesh N. Tekwani Elphinstone College Mumbai
TCP/IP PROTOCOL SUITE The TCPIIP protocol suite was developed prior to the OSI model. Therefore, the layers in the TCP/IP protocol suite do not exactly.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 OSI Transport Layer Network Fundamentals – Chapter 4.
Routers and Routing Basics CCNA 2 Chapter 10.
Copyright 2002, S.D. Personick. All Rights Reserved.1 Telecommunications Networking II Topic 20 Transmission Control Protocol (TCP) Ref: Tanenbaum pp:
The Transmission Control Protocol (TCP) Application Services (Telnet, FTP, , WWW) Reliable Stream Transport (TCP) Connectionless Packet Delivery.
Transport Layer Moving Segments. Transport Layer Protocols Provide a logical communication link between processes running on different hosts as if directly.
CCNA 1 v3.0 Module 11 TCP/IP Transport and Application Layers.
Chapter 5 Peer-to-Peer Protocols and Data Link Layer PART I: Peer-to-Peer Protocols ARQ Protocols and Reliable Data Transfer Flow Control.
Networking Basics CCNA 1 Chapter 11.
INTRANETS MR ROSS UNIT 3 IT APPLICATIONS. DEFINITION An intranet is an internal, secured environment that has a similar look and feel to the Internet,
Institute of Technology Sligo - Dept of Computing Chapter 12 The Transport Layer.
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets, 5e By Douglas E. Comer Lecture PowerPoints.
Networks. Ethernet  Invented by Dr. Robert Metcalfe in 1970 at Xerox Palo Alto Research Center  Allows group of computers to communicate in a Local.
+ The Pony Express By: Kathy Parra. + Who were the founders? The Pony Express was founded by William H. Russell, William B. Waddell, and Alexander Majors.
The Internet Book. Chapter 16 3 A Packet Switching System Can Be Overrun Packet switching allows multiple computers to communicate without delay. –Requires.
Internet Architecture. 2 INTRODUCTION INTERNET developed by a community of researchers centered around the Defense Advanced Research Projects Agency (DARPA)
Chapter 13 Introduction to the Transport Layer
Lecture Focus: Data Communications and Networking  Data Link Layer  Data Link Control Lecture 22 CSCS 311.
UDP & TCP Where would we be without them!. UDP User Datagram Protocol.
Networks, Part 2 March 7, Networks End to End Layer  Build upon unreliable Network Layer  As needed, compensate for latency, ordering, data.
UDP & TCP BS IT 4 th Semester By: Muhammad Hanif User Datagram Protocol & Transmission Control Protocol.
Data Communications and Networks Chapter 6 – IP, UDP and TCP ICT-BVF8.1- Data Communications and Network Trainer: Dr. Abbes Sebihi.
McGraw-Hill Chapter 23 Process-to-Process Delivery: UDP, TCP Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC).
DATA LINK CONTROL. DATA LINK LAYER RESPONSIBILTIES  FRAMING  ERROR CONTROL  FLOW CONTROL.
Introduction Chapter 1. TCP/IP Reference Model Why Another Model? Although the OSI reference model is universally recognized, the historical and technical.
Data Link Layer.
CSCI-100 Introduction to Computing The Network. Network Fundamentals A computer network consists of two or more computers linked together to exchange.
Chapter 9 The Transport Layer The Internet Protocol has three main protocols that run on top of IP: two are for data, one for control.
Chapter 5 Network and Transport Layers
Web Design & Development
Process-to-Process Delivery:
CS4470 Computer Networking Protocols
Protocols & Packet Switching
Chapter 5 Peer-to-Peer Protocols and Data Link Layer
Lecture 4 Peer-to-Peer Protocols and Data Link Layer
Process-to-Process Delivery: UDP, TCP
Computer Networks Protocols
The TCP/IP Model.
Presentation transcript:

Question Did anyone see the program about the Pony Express on the History Channel the other night? They hosted an hour long show about how the postal service has changed through the years with most of the show emphasizing the Pony Express.

The Pony Express With the move West in the 1840’s and 50’s, a need was seen by a gentleman named William Russell to move mail to and from those western fortune seekers. Russell established the Pony Express in 1860 to most efficiently (and cost effectively) transport mail. The Pony Express was made up of eighty riders (less than 120 pounds each), their steeds, four hundred men to run the way stations, and 2000 miles of land between St. Joseph, Missouri and Sacramento, California. Each horse carried twenty-five pounds of equipment (a saddle, four mail pouches, a rifle, and a revolver), up to twenty pounds of mail, and the rider for a maximum of 165 pounds.

Lies Begin Here Trouble occurred early in the history of the Express - a patron mailed a dozen twenty pound packages from St. Joseph. Of course, twelve riders took the twelve packages onto the trail. The problem was there were only twelve horses and riders available. When other mail came to the St. Joseph station, the customers were told there would be a delay of up to five days before the mail could leave town.

Lies Continue The customers, as one can imagine, were incensed. This scenario caused Mr. Russell to restrict all letters and packages ‘to a maximum of ten ounces (about twenty pages). This restriction ensured that no one letter or package would take up the entire twenty pound maximum load, keeping other equally important mail from being transported.

Lies Continue After the ten ounce restriction was put into place, a businessman devised a plan to make money on the new restriction. He found an empty building near the Pony Express station in each town that the Express served. Anyone who wanted to ship a book of greater than twenty pages would call upon his business to split the book apart, address each twenty page portion to a corresponding business in the recipient’s town, and mail the portions. Upon arrival at the other end, the business would reassemble the book and deliver it to the intended recipient.

Lies Continue Reassembly was not, always a simple task. Since the book was split,into many packages, they did not necessarily arrive on the same horse, on the same day, or in the same order that they were originally intended. Fortunately, the originating business numbered the packages for easy and correct reassembly.

Lies Finish Furthermore, this business knew the risks of the Pony Express, so it provided a special guaranteed service (for a fee of course). The business made exact copies of the mail to provide this guaranteed service. Upon receiving a packet, an acknowledgement of receipt was returned to the sender. If no receipt acknowledgement was received within ten days for a particular packet, it was assumed lost and a copy of the packet was resent.

Analogy This analogy illustrates the TCP/IP protocols in the Internet. The Internet Protocol (IP) restricts the packet size to ensure that no user monopolizes the resources (as in the Pony Express): IP does not specify how things must be transformed into the 64K size it is capable of transporting. Also, IP does not concern itself with ensuring that the packets arrive in the correct order, or that they arrive at all. Thus, the Pony Express closely resembles the Internet Protocol.

Analogy The Transmission Control Protocol (TCP) works closely with IP, and fixes the things which the business fixed for the Pony Express. TCP breaks the data (which may be larger than 64k characters) into packets of a size acceptable by IP. Since TCP is responsible for breaking the data into packets, it is also responsible for reassembling the data before handing it to the intended recipient. As packets arrive TCP gathers the packets into the correct order and returns an acknowledgement. If, after some period of time, an expected acknowledgement does not arrive, the TCP sender resends the missing packet

Analogy PONY EXPRESS Trail Horse & Rider Breaking book Taping book Acknowledge receipt Ten day wait for acknowledgement TCP/IP Network IP TCP breaks packets TCP reassembly TCP ACK TCP timeout before resending