Lecture 1 Internet CPE 401 / 601 Computer Network Systems slides are modified from Dave Hollinger and Daniel Zappala Lecture 1 Introduction.

Slides:



Advertisements
Similar presentations
Protocol layers and Wireshark Rahul Hiran TDTS11:Computer Networks and Internet Protocols 1 Note: T he slides are adapted and modified based on slides.
Advertisements

OSI Model OSI MODEL.
Summer Workshop on Cyber Security Computer Networks Security (Part 1) Dr. Hamed Mohsenian-Rad University of California at Riverside and Texas Tech University.
James 1:5 If any of you lacks wisdom, he should ask God, who gives generously to all without finding fault, and it will be given to him.
Lecture 2 Protocol Layers CPE 401 / 601 Computer Network Systems slides are modified from Dave Hollinger.
Introduction1-1 Introduction to Computer Networks Our goal:  get “feel” and terminology  more depth, detail later in course  approach:  use Internet.
Lecture 1 Internet Overview: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  network structure,
CS 325 Computer Networks Sami Rollins Fall 2003.
Lecture Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  network structure,
1 Day 01 - The Internet. 2 Chapter 1 Introduction Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross.
EEC-484/584 Computer Networks Lecture 1 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
Lecture 1 Internet CPE 401 / 601 Computer Network Systems slides are modified from Dave Hollinger and Daniel Zappala.
Lecture 1 Overview: roadmap 1.1 What is computer network? the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  network.
Lecture 1 Internet Overview: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  network structure,
Introduction1-1 CS 325 Computer Networks Sami Rollins Fall 2005.
What’s the Internet: “nuts and bolts” view
 The Open Systems Interconnection model (OSI model) is a product of the Open Systems Interconnection effort at the International Organization for Standardization.
Computer Communication & Networks
1: Introduction1 Part I: Introduction Goal: r get context, overview, “feel” of networking r more depth, detail later in course r approach: m descriptive.
Chapter 1 Introduction Computer Networking: A Top Down Approach 6th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
Chapter 2 The Infrastructure. Copyright © 2003, Addison Wesley Understand the structure & elements As a business student, it is important that you understand.
Lecture 1 Internet Overview: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Protocol layers, service models.
CS448 Computer Networking Chapter 1 Introduction to Computer Networks Instructor: Li Ma Office: NBC 126 Phone: (713)
RSC Part I: Introduction Redes y Servicios de Comunicaciones Universidad Carlos III de Madrid These slides are, mainly, part of the companion slides to.
Instructor: Christopher Cole Some slides taken from Kurose & Ross book IT 347: Chapter 1.
Protocol Architectures. Simple Protocol Architecture Not an actual architecture, but a model for how they work Similar to “pseudocode,” used for teaching.
Introduction1-1 Course Code:EE/TE533 Instructor: Muddathir Qamar.
Internet Addresses. Universal Identifiers Universal Communication Service - Communication system which allows any host to communicate with any other host.
CS 3214 Computer Systems Godmar Back Lecture 23. Announcements Project 5 due Dec 8 Exercise 10 handed out Exercise 11 coming before Thanksgiving CS 3214.
Layer Architecture Layer architecture simplifies the network design. It is easy to debug network applications in a layered architecture network. The network.
Lecture 1 Internet CPE 401 / 601 Computer Network Systems slides are modified from Dave Hollinger and Daniel Zappala Lecture 2 Introduction.
Lecture 3 Overview. Protocol An agreed upon convention for communication both endpoints need to understand the protocol. Protocols must be formally defined.
TCOM 509 – Internet Protocols (TCP/IP) Lecture 03_b Protocol Layering Instructor: Dr. Li-Chuan Chen Date: 09/15/2003 Based in part upon slides of Prof.
Ch 1. Computer Networks and the Internet Myungchul Kim
Introduction1-1 Data Communications and Computer Networks Chapter 1 CS 3830 Lecture 1 Omar Meqdadi Department of Computer Science and Software Engineering.
Basic Concepts of Internet Technology What is a computer network? Isolated computers vs. networked computers internetworking The Internet What’s a protocol?
Introduction 1-1 Networking Admin  1 to 4 lectures a week for 11 weeks for a total of 23 lectures  Interleaves with Functional Programming  First prac.
1 Network Core and Network Edge By Muhammad Hanif To BS IT 4 th Semester.
IP1 The Underlying Technologies. What is inside the Internet? Or What are the key underlying technologies that make it work so successfully? –Packet Switching.
1 ECE453 - Introduction to Computer Networks Lecture 1: Introduction.
Introduction1-1 Chapter 1 Computer Networks and the Internet Computer Networking: A Top Down Approach Featuring the Internet, 2 nd edition. Jim Kurose,
1 Networking. 2 Network “... communication system for connecting end-systems” End-systems a.k.a. “hosts” PCs, workstations dedicated computers network.
1 Netprog: OSI Reference Model Networking. 2 Network “... communication system for connecting end-systems” End-systems a.k.a. “hosts” PCs, workstations.
1: Introduction1 Internet Services and Protocols Adapted from “Computer Networking: A Top Down Approach Featuring the Internet” Kurose and Ross, Addison.
Introduction 1-1 1DT057 Distributed Information Systems Chapter 1 Introduction.
Network Architecture IS250 Spring 2010 John Chuang
IP and Networking Basics Selection of slides taken from Internet Society Workshop Resource Centre:
1 Ram Dantu University of North Texas, Practical Networking.
Computer Engineering and Networks, College of Engineering, Majmaah University Protocols OSI reference MODEL TCp /ip model Mohammed Saleem Bhat
Computer Networking A Top-Down Approach Featuring the Internet Introduction Jaypee Institute of Information Technology.
CS 5565 Network Architecture and Protocols
Computer Networks Dr. Adil Yousif CS Lecture 1.
Graciela Perera Introduction Graciela Perera
CS 3214 Computer Systems Networking.
Day 01 - The Internet.
Part 0: Networking Review
Slides taken from: Computer Networking by Kurose and Ross
CS 3214 Computer Systems Lecture 21 Godmar Back.
OSI NETWORK MODEL.
An Aleksandar,   Accounts have been created for any students in EECS 340 who did not already have one.  Physical access to the labs has.
CS 3214 Computer Systems Networking.
Introduction 1 1: Introduction.
Lecture 2 Overview.
Chapter 1: Introduction
CPE 401 / 601 Computer Network Systems
CPE 401 / 601 Computer Network Systems
Networking.
Computer Networking A Top-Down Approach Featuring the Internet
Networking.
Internet Technologies Presenter: Samuel Wagema Mob: /
Presentation transcript:

Lecture 1 Internet CPE 401 / 601 Computer Network Systems slides are modified from Dave Hollinger and Daniel Zappala Lecture 1 Introduction

Network “... communication system for connecting end- systems” End-systems a.k.a. “hosts” PCs, workstations dedicated computers network components 2

Multiaccess vs. Point-to-point Multi-access means shared medium – many end-systems share the same physical communication resources (wire, frequency,...) – There must be some arbitration mechanism. Point-to-point – only 2 systems involved – no doubt about where data came from ! 3

Internetwork Connection of 2 or more distinct (possibly dissimilar) networks. Requires some kind of network device to facilitate the connection. 4 Net ANet B

The Internet millions of connected computing devices: hosts = end systems – running network apps communication links – fiber, copper, radio, satellite routers: – forward packets (chunks of data) 5 Home network Institutional network Mobile network Global ISP Regional ISP router PC server wireless laptop cellular handheld wired links access points

The network edge: end systems (hosts): – run application programs – e.g. Web, – at “edge of network” client/server peer-peer  client/server model  client host requests, receives service from always-on server  e.g. Web browser/server; client/server  peer-peer model:  minimal (or no) use of dedicated servers  e.g. Skype, BitTorrent

The Internet 7 Internet Mapping Project, Bill Cheswick

A Network of Networks roughly hierarchical – Tier-1 ISPs provide national, international coverage – Tier-2 ISPs provide regional coverage – Tier-3 and lower levels provide local coverage any tier may sell to business and residential customers any ISP may have a link to any other ISP – not strictly hierarchical 8

Inernet2 Backbone 9

Level3 Backbone 10

Many Different Internet Service Providers Each network is independent Interoperability requires using Internet standards: IP, TCP – the Internet is global and must run these standards – your private intranet can do whatever you want it to do 11

Internet Design Goals primary goal: interoperability among existing networks – a network of networks – obey administrative boundaries secondary goals – fault tolerance – multiple transport protocols – support a variety of networks – distributed management – cost effective, low effort for host attachment, accountability first three were more important, so remaining four did not receive as much attention no mention of security 12

Internet Design Principles minimal assumptions about services network should support – ability to send packets – no reliability or security end-to-end principle – keep the core of the network as simple as possible – put complex functionality at the edges – exception: significant performance improvement 13

The Internet Hourglass Internet 14

Layering Divide a task into pieces and then solve each piece independently (or nearly so) Establishing a well defined interface between layers makes porting easier Major Advantages:  Code Reuse  Extensibility 15

The Internet at each Hop 16

Interface and Peer-to-peer Protocols Interface protocols describe communication between layers on the same endpoint. Peer-to-peer protocols describe communication between peers at the same layer. 17 Process Transport Network Data Link Process Transport Network Data Link Interface Protocols Peer-to-peer Protocols

Protocol An agreed upon convention for communication. – both endpoints need to understand the protocol. Protocols must be formally defined and unambiguous! Protocols define – format, – order of msgs sent and received among network entities, – actions taken on msg transmission, receipt We will study lots of existing protocols and perhaps develop a few of our own. 18

The Physical Layer Responsibility: – transmission of raw bits over a communication channel Issues: – mechanical and electrical interfaces – time per bit – distances 19

The Data Link Layer Responsibility: – provide an error-free communication link – Data Link Control sublayer – Medium Access Control sublayer Issues: – framing (dividing data into chunks) header & trailer bits – addressing

The Network Layer Responsibilities: – path selection between end-systems (routing). – flow control. – fragmentation & reassembly – translation between different network types. Issues: – packet headers – virtual circuits 21

The Transport Layer Responsibilities: – provides virtual end-to-end links between peer processes. – end-to-end flow control Issues: – headers – error detection – reliable communication 22

The Application Layer Responsibilities: – anything not provided by any of the other layers – TCP/IP model Session and Presentation Layer functions Issues: – application level protocols – appropriate selection of “type of service” 23

Layering & Headers Each layer needs to add some control information to the data in order to do it’s job. This information is typically prepended to the data before being given to the lower layer. Once the lower layers deliver the data and control information - the peer layer uses the control information. 24