© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets with Internet Applications, 4e By Douglas.

Slides:



Advertisements
Similar presentations
1 Computer Networks and Internets, 5e By Douglas E. Comer Lecture PowerPoints Adapted from the notes By Lami Kaya, © 2009 Pearson Education.
Advertisements

© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets with Internet Applications, 4e By Douglas.
CCNA2 Module 4. Discovering and Connecting to Neighbors Enable and disable CDP Use the show cdp neighbors command Determine which neighboring devices.
1 Semester 2 Module 4 Learning about Other Devices Yuda college of business James Chen
Answers of Exercise 7 1. Explain what are the connection-oriented communication and the connectionless communication. Give some examples for each of the.
© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets with Internet Applications, 4e By Douglas.
© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets with Internet Applications, 4e By Douglas.
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets, 5e By Douglas E. Comer Lecture PowerPoints.
© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets with Internet Applications, 4e By Douglas.
© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets with Internet Applications, 4e By Douglas.
CSCI 4550/8556 Computer Networks Comer, Chapter 1: Introduction.
© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets with Internet Applications, 4e By Douglas.
Networking Theory (Part 1). Introduction Overview of the basic concepts of networking Also discusses essential topics of networking theory.
Chapter 29 Structure of Computer Names Domain Names Within an Organization The DNS Client-Server Model The DNS Server Hierarchy Resolving a Name Optimization.
© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets with Internet Applications, 4e By Douglas.
© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets with Internet Applications, 4e By Douglas.
© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets with Internet Applications, 4e By Douglas.
© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets with Internet Applications, 4e By Douglas.
1 Computer Networks and Internets, 5e By Douglas E. Comer Lecture PowerPoints Adapted from the notes By Lami Kaya, © 2009 Pearson Education.
1 CCNA 2 v3.1 Module 8. 2 TCP/IP Suite Error and Control Messages CCNA 2 Module 8.
© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets with Internet Applications, 4e By Douglas.
© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets with Internet Applications, 4e By Douglas.
© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets with Internet Applications, 4e By Douglas.
1 Introduction Computer Networks Fall Computer Networks  Network: system for connecting computers using a single transmission technology  An.
Introduction 1 Lecture 3 Networking Concepts slides are modified from J. Kurose & K. Ross University of Nevada – Reno Computer Science & Engineering Department.
Connecting LANs, Backbone Networks, and Virtual LANs
NET0183 Networks and Communications Lectures 19 and 20 Support Protocols: ARP and ICMP 8/25/20091 NET0183 Networks and Communications by Dr Andy Brooks.
CCNA Introduction to Networking 5.0 Rick Graziani Cabrillo College
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 9 Internet Control Message.
1 Computer Networks and Internets Spring 2005 Assistant Professor JainShing Liu.
23-Support Protocols and Technologies Dr. John P. Abraham Professor UTPA.
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets, 5e By Douglas E. Comer Lecture PowerPoints.
Chapter 4. After completion of this chapter, you should be able to: Explain “what is the Internet? And how we connect to the Internet using an ISP. Explain.
Computers Are Your Future Tenth Edition Chapter 8: Networks: Communicating & Sharing Resources Copyright © 2009 Pearson Education, Inc. Publishing as Prentice.
How do loss and delay occur?
1 Introduction and Internet Applications Chapter 1 Introduction and Overview.
© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 ITGN 235: Principles of Networking ITGN 225: Networking.
Introduction 1-1 “Real” Internet delays and routes  What do “real” Internet delay & loss look like?  Traceroute program: provides delay measurement from.
Chapter 1 - Introduction How do Computer Networks and Internet operate? Explosive growth Internet Economic impact Complexity Abstractions and concepts.
Computer Networks and Internets 《计算机网络与因特网》课件 林坤辉
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets, 5e By Douglas E. Comer Lecture PowerPoints.
Computer Networks Performance Metrics
Computer Networks with Internet Technology William Stallings
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 6: Static Routing Routing and Switching Essentials.
Four sources of packet delay
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets, 5e By Douglas E. Comer Lecture PowerPoints.
Introduction 1-1 Chapter 1 Part 3 Delay, loss and throughput These slides derived from Computer Networking: A Top Down Approach, 6 th edition. Jim Kurose,
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets, 5e By Douglas E. Comer Lecture PowerPoints.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Connecting Devices CORPORATE INSTITUTE OF SCIENCE & TECHNOLOGY, BHOPAL Department of Electronics and.
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets, 5e By Douglas E. Comer Lecture PowerPoints.
Introduction 1-1 Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  circuit switching,
PRACTICAL INTRODUCTION TO INTERNET TECHNOLOGY. Practical one PACKET DELAY AND LOSS IN INTERNET In this experiment, you will observe real delays and loss.
Chapter 8 - Internet: The Early Years Many Independent Networks The Proliferation Of LANS Facts About LANs –Engineers have devised many LAN technologies.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 6: Static Routing Routing and Switching Essentials.
Network Behaviour & Impairments
Computer Networks Performance Metrics Computer Networks Spring 2013.
CHAPTER 6: STATIC ROUTING Static Routing 2 nd semester
Motivation and Tools NETD411 – Computer Technology and Architecture.
Reading for next class No new reading, but there will be a quiz Ch 4.1 – 4.23: Internet applications.
The Concept of Universal Service
Ping and traceroute.
Lecture PowerPoints By Lami Kaya,
Circuit Switching Circuit switching refers to a communication mechanism that establishes a path between a sender and receiver with guaranteed isolation.
Chapter 3 Internet Applications and Network Programming
Computer Networks and Internets, 5e By Douglas E. Comer
Chapter 2: Static Routing
Chapter 2: Static Routing
Review Lecture 1 Course Introduction Network and Internet
Motivation, Terminology, Layered systems (and other random stuff)
Presentation transcript:

© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets with Internet Applications, 4e By Douglas E. Comer

© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.2 Chapter 1 Introduction

© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved Growth Of Computer Networking (1) NW is used in everywhere such as business, billing, advertising, federal, state and local government offices. Computer networks (NW) have been growing explosively and its impact include: –More and more individual and business use networks to exchange data –Network industry has emerged to develop NW technologies, products, and services –Network has produced a demand in all industries for network professionals to plan, acquire, install, operate, and manage the hardware (HW) and software (SW) systems related to networks

© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved Complexity In Network Systems (1) Computer NW is a complex subject: –Many technologies exist, and each has features that distinguish it from the others –Multiple organizations have created network standards independently, which are not all compatible –Many companies have created commercial network products and services that use the technologies in unconventional ways –Finally, network is complex because multiple technologies exist that can be used to interconnect two or more network As a result, many combinations of NW are possible

© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved Complexity In Network Systems (2) NW can be especially confusing to a beginner –because there is no single underlying theory that explains the relationship among all parts. –Because multiple organizations define NW technologies and standards, multiple terms exist for a given concept –Professionals often use a technical term from one technology when referring to an analogous feature of another –In addition to a large set of terms and acronyms that contains many synonyms

© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved Mastering The Complexity To master the complexity –one must look beyond the details and concentrate on concepts For example (Ex): –although it is not important to understand the details of wires used to connect computers to a specific NW –it is important to understand the few basic categories of wiring schemes that exist and the advantages of each Similarly, –although it is not important to learn the details of how a particular communication protocol handles a congested NW –it is important to know what congestion is and why it must be handled

© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved Concepts And Terminology The text focuses on concepts and avoids unnecessary detail –explains the purpose of each network technology –gives the advantages and disadvantages –describes some of the consequences of using the technology –uses analogies and illustrations to simplify explanations –introduces networking terminology –notes popular abbreviations and synonyms that professionals use

© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved The Value Of Hands-On Experience This text provides a conceptual overview of the material that is essential for a beginner: –deep understanding can only result from personal experience Readers are strongly encouraged to gain as much hands-on experience, Possibilities include: –building application programs that communicate over a NW –configuring network systems –observing protocols in action –and measuring system performance The companion lab text, “Hands-On Networking”, contains many suggestions for experiments and projects –Some of the exercises throughout the text refer to “Hands-On Networking” –and recommend specific experiments that will help the reader gain deeper appreciation of the material

© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.9 Chapter 2 Motivation and Tools

© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved Introduction This chapter discusses the size and rapid growth of the Internet, and introduces a few basic tools that can be used to explore NW

© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved Resource Sharing (1) Some of the earliest computer network were built to extend existing computing facilities. –NW were devised that allowed multiple computers to access a shared peripheral device such as a printer or a disk Main motivation for the first network were share large- scale computational power The U.S. Department of Defense (DoD) –Advanced Research Projects Agency (ARPA) was concerned about the lack of high-powered computers

© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved Resource Sharing (2) Many of the ARPA research projects needed access to the latest equipment –Each research group wanted one of each new computer type By the latter 1960s, it became obvious that the ARPA budget could not keep up with demand –As an alternative, ARPA started investigating data NW –The agency decided to give each group one computer –Interconnect the computer with a data NW The ARPA NW research turned out to be revolutionary

© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved Growth Of The Internet The Internet has grown from the early research prototype –to a global communication system that reaches all countries Figure 2.1 illustrates how the Internet has grown –The figure contains a graph of the number of computers attached to the Internet as a function of the years from When plotted on log-scale as in Figure 2.2 –the growth appears approximately linear meaning that the Internet has experienced exponential growth over two decades –The Internet has been doubling in size every 9-12 months

© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.14

© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.15

© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved Probing The Internet (1) The program begins by walking through the Domain Name System (DNS), –system that stores names for computers and then uses a program that tests to see whether the computer is currently online Tools used to probe the Internet are also available to users One of the simplest probing tools is a program known as ping: –Ex: ping The ping program sends a message to the specified computer and then waits a short time for a response. –If a response arrives, ping reports to the user that the computer is alive –otherwise, ping reports that the computer is not responding –Ex: is alive Figure 2.3 shows an example of ping output with the timing and repetition options turned on

© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.17

© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved Probing The Internet (2) In Figure 2.3, ping sends one request each second –and produces one line of output for each response received The output tells the size of the packet received –the sequence number, and the round-trip time in milliseconds When the user interrupts the program, –ping produces a summary that specifies the number of packets sent and received –packet loss –and the minimum –mean –and maximum round-trip times

© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.19

© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.20

© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved Interpreting A Ping Response (1) When no response is received, ping cannot help determine the reason: –The remote computer could be turned off –disconnected from the NW –its NW interface could have failed –SW running may not respond to ping –the local computer could be disconnected from the NW –the NW to which the remote computer attaches could have failed –failure of an intermediate computer or NW –Finally, ping sometimes fails because the NW has become so congested with traffic that delays are unreasonably long Ping has no way to determine the cause of the problem

© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved Interpreting A Ping Response (2) Another reason why ping may fail to generate a response is less subtle: –some companies configure their site to reject ping packets The motivation for disabling ping is security: –if a corporation allows ping traffic to enter its site the site becomes susceptible to a denial-of-service or flooding attack –so many ping packets arrive that the company's NW and computers cannot respond to legitimate requests –To avoid such attacks, the company merely rejects ping packets before they enter

© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved “Real” Internet delays and routes What do “real” Internet delay & loss look like? Traceroute program: provides delay measurement from source to intermediate router along end-end Internet path towards destination. For all i: –sends three packets that will reach router i on path towards destination –router i will return packets to sender –sender times interval between transmission and reply. 3 probes

© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved “Real” Internet delays and routes 1 cs-gw ( ) 1 ms 1 ms 2 ms 2 border1-rt-fa5-1-0.gw.umass.edu ( ) 1 ms 1 ms 2 ms 3 cht-vbns.gw.umass.edu ( ) 6 ms 5 ms 5 ms 4 jn1-at wor.vbns.net ( ) 16 ms 11 ms 13 ms 5 jn1-so wae.vbns.net ( ) 21 ms 18 ms 18 ms 6 abilene-vbns.abilene.ucaid.edu ( ) 22 ms 18 ms 22 ms 7 nycm-wash.abilene.ucaid.edu ( ) 22 ms 22 ms 22 ms ( ) 104 ms 109 ms 106 ms 9 de2-1.de1.de.geant.net ( ) 109 ms 102 ms 104 ms 10 de.fr1.fr.geant.net ( ) 113 ms 121 ms 114 ms 11 renater-gw.fr1.fr.geant.net ( ) 112 ms 114 ms 112 ms 12 nio-n2.cssi.renater.fr ( ) 111 ms 114 ms 116 ms 13 nice.cssi.renater.fr ( ) 123 ms 125 ms 124 ms 14 r3t2-nice.cssi.renater.fr ( ) 126 ms 126 ms 124 ms 15 eurecom-valbonne.r3t2.ft.net ( ) 135 ms 128 ms 133 ms ( ) 126 ms 128 ms 126 ms 17 * * * 18 * * * 19 fantasia.eurecom.fr ( ) 132 ms 128 ms 136 ms traceroute: gaia.cs.umass.edu to Three delay measurements from gaia.cs.umass.edu to cs-gw.cs.umass.edu * means no response (probe lost, router not replying) trans-oceanic link

© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved Tracing A Route (1) Figure shows the output from traceroute with the destination traceroute provides more information than ping –Each line corresponds to each of intermediate computers –and one corresponds to the final destination itself –traceroute prints the name of the intermediate computer, and gives the minimum, average, and maximum round-trip times traceroute cannot be used for all destinations –NW administrators may choose to disable it to prevent outsiders from obtaining detailed information about their architecture

© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved Tracing A Route (2) Figure illustrates another features of traceroute: –a report of packet loss The line with asterisks indicates two of three probes received no response (i.e., packets were lost) In a later test, all probes were received successfully We can conclude that the loss was a temporary condition –probably caused by congestion on one of the paths between the source and destination