How the Internet Works Acknowledgment and Disclaimer: This presentation is supported in part by the National Science Foundation under Grant 1240841. Any.

Slides:



Advertisements
Similar presentations
CSCI-235 Micro-Computers in Science The Network. Network Fundamentals A computer network consists of two or more computers linked together to exchange.
Advertisements

CECS 474 Computer Network Interoperability Notes for Douglas E. Comer, Computer Networks and Internets (5 th Edition) Tracy Bradley Maples, Ph.D. Computer.
TECHNOLOGY GUIDE 5 Basics of the Internet and the World Wide Web.
Getting on the Internet
Chapter 1: Computer Networks IB 300: Advanced Computer Sciences. Professor: Nabil Elmjati.
CS 381 Introduction to computer networks Lecture 2 1/29/2015.
CPSC 441 Tutorial - Network Tools 1 Network Tools CPSC 441 – Computer Communications Tutorial.
Copyright © 2002 Pearson Education, Inc. Slide 3-1 PERTEMUAN 5.
Review on Networking Technologies Linda Wu (CMPT )
Network Measurement Bandwidth Analysis. Why measure bandwidth? Network congestion has increased tremendously. Network congestion has increased tremendously.
Web and Internet Part I ST: Introduction to Web Interface Design Prof. Angela Guercio Spring 2007.
15-1 Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
Ping and traceroute Lab/Homework exercise Assigned 9/12/2006 Due 9/19/2006 CSIT 220 Fall, 2006 Based on T. Blum Exercises.
7.1 PROTOCOL RULES & PROCEDURES TO GOVERN TRANSMISSION BETWEEN COMPONENTS IN A NETWORK *
Network Topologies.
1 ICMP : Internet Control Message Protocol Computer Network System Sirak Kaewjamnong.
Computer Concepts 2014 Chapter 6 The Internet. 6 Chapter Contents  Section A: Internet Technology  Section B: Fixed Internet Access Chapter 6: The Internet2.
15-1 More Chapter 15 Goals Compare and contrast various technologies for home Internet connections Explain packet switching Describe the basic roles of.
Introduction to Networking. Key Terms packet  envelope of data sent between computers server  provides services to the network client  requests actions.
29-Aug-154/598N: Computer Networks Switching and Forwarding Outline –Store-and-Forward Switches.
Fundamental of IP network ~ ping, traceroute ~ Practice 1 Information and Communications Technology Internet Engineering.
Telecommunications and Networks Chapter 6 – Understanding Technology (Third Edition)
Computer Networking Part 1 CS 1 Rick Graziani Cabrillo College Fall 2005.
Chapter 4 Computer Networks – Part 1
Chapter 4. After completion of this chapter, you should be able to: Explain “what is the Internet? And how we connect to the Internet using an ISP. Explain.
Networks for Distributed Systems n network types n Connection-oriented and connectionless communication n switching technologies l circuit l packet.
Copyright © 2002 Pearson Education, Inc. Slide 3-1 CHAPTER 3 Created by, David Zolzer, Northwestern State University—Louisiana The Internet and World Wide.
Module 2: Information Technology Infrastructure
Computer Concepts 2014 Chapter 5 Local Area Networks.
POSTECH DP&NM Lab. Internet Traffic Monitoring and Analysis: Methods and Applications (1) 4. Active Monitoring Techniques.
Unit 4 Networking Review.
15-1 Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources.
The Internet Trisha Cummings ITE115. What is the Internet? The Internet is a world-wide network of computer networks that use a common communications.
Network Architecture: Design Philosophies IS250 Spring 2010 John Chuang
Circuit & Packet Switching. ► Two ways of achieving the same goal. ► The transfer of data across networks. ► Both methods have advantages and disadvantages.
Information Flow Across the Internet. What is the Internet? A large group of computers that link together to form the Worldwide Area Network (WAN)
Chapter 12 - Packet Switching Introduction Sharing Saves Money –Arranging for multiple devices to share a single transmission path lowers cost because.
ICOM 6115©Manuel Rodriguez-Martinez ICOM 6115 – Computer Networks and the WWW Manuel Rodriguez-Martinez, Ph.D. Lecture 21.
Lecture 6 Page 1 Advanced Network Security Review of Networking Basics Advanced Network Security Peter Reiher August, 2014.
Sem1 - Module 8 Ethernet Switching. Shared media environments Shared media environment: –Occurs when multiple hosts have access to the same medium. –For.
Oz – Foundations of Electronic Commerce © 2002 Prentice Hall Essentials of Telecommunications.
Networks. Ethernet  Invented by Dr. Robert Metcalfe in 1970 at Xerox Palo Alto Research Center  Allows group of computers to communicate in a Local.
PRACTICAL INTRODUCTION TO INTERNET TECHNOLOGY. Practical one PACKET DELAY AND LOSS IN INTERNET In this experiment, you will observe real delays and loss.
CSCI-235 Micro-Computer Applications The Network.
*SWITCHES *WIRELESS Routers. Description/Appearance Forwards data packets (a basic unit of communication) to its destination Can be wireless or connected.
THE INTERNET INTRODUCTION TO BUSINESS TECHNOLOGY.
WAN Transmission Media
CSE 413: Computer Network Circuit Switching and Packet Switching Networks Md. Kamrul Hasan
PACKET SWITCHING AND CIRCUIT SWITCHING AS PART OF NETWORK AND HARDWARE.
1 Switching and Forwarding Sections Connecting More Than Two Hosts Multi-access link: Ethernet, wireless –Single physical link, shared by multiple.
Introduction1-1 Data Communications and Computer Networks Chapter 1 CS 3830 Lecture 2 Omar Meqdadi Department of Computer Science and Software Engineering.
Data Communication Networks Lec 13 and 14. Network Core- Packet Switching.
Motivation and Tools NETD411 – Computer Technology and Architecture.
Internet Options By OTX-West. Discussion Points Technologies  Dial-Up  DSL  Cable Data Transfer Speeds  1 Kbps (Kilobit per second) = one thousand.
1. Layered Architecture of Communication Networks: Circuit Switching & Packet Switching.
Reading for next class No new reading, but there will be a quiz Ch 4.1 – 4.23: Internet applications.
CSCI-100 Introduction to Computing The Network. Network Fundamentals A computer network consists of two or more computers linked together to exchange.
15-1 Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
Networks – Network Fundamentals
NETWORK Unit 1 Module: 2 Objective: 7.
Traceroute traceroute is a Unix utility designed by Van Jacobson in 1987 The Windows equivalent is called tracert The Linux equivalent is called tracepath.
Ping Hackathon 2018.
Wednesday, September 19, 2018 What Is the Internet?
Copyright © 2002 Pearson Education, Inc.
CS222 Web Programming Course Outline
Chapter Goals Compare and contrast various technologies for home Internet connections Explain packet switching Describe the basic roles of various network.
NETWORK Unit 1 Module: 2 Objective: 7.
NETWORK Unit 1 Module: 2 Objective: 7.
WJEC GCSE Computer Science
This material is based upon work supported by the National Science Foundation under Grant #XXXXXX. Any opinions, findings, and conclusions or recommendations.
Presentation transcript:

How the Internet Works Acknowledgment and Disclaimer: This presentation is supported in part by the National Science Foundation under Grant Any opinions, findings, and conclusions or recommendations expressed in these materials are those of the authors and do not necessarily reflect the views of the National Science Foundation.

How is the Internet connected together?

Basic Architecture ●The Internet is a network of networks R R R R

Basic Architecture ●The Internet is a network of networks in which host computers R R R R Hosts

Basic Architecture ●The Internet is a network of networks in which host computers are connected by routers. R R R R HostsRouters

Latency and Ping ● Latency is a measure of the time it takes a piece of data to reach its destination ● typically measured in milliseconds (ms) ● Wireless connections have higher latency than wired ● Ping is a networking utility to measure the latency on the Internet ● Ping takes a hostname or IP address as a parameter and sends a small test packet to the node that is echoed by it ● Once the echo is received time is measured ● Examples from linux ping ping ping

How does data travel through the Internet?

Packet Switching Messages are broken into fixed-sized packets -- e.g., P1, P2, P3. Message P1P2P3 Packets P1 P2 P3 1. Break the Message into Packets

Packet Switching Messages are broken into fixed-sized packets -- e.g., P1, P2, P3. Packets are routed independently ( →, →, →) Message P1P2P3 Packets P1 P2 P3 1. Break the Message into Packets 2. Send the packets to destination

Packet Switching Messages are broken into fixed-sized packets -- e.g., P1, P2, P3. Packets are routed independently ( →, →, →) The original message is re-assembled at the destination. Message P1P2P3 Packets P1 P2 P3 Message P1P2P3 Packets P1 P2 P3 1. Break the Message into Packets 2. Send the packets to destination 3. Reassemble the packets.

Packet Switching: Basic Ideas ●Motivated in the 1960s by the desire for a network that could withstand a nuclear attack: o A decentralized network with multiple paths between points A and B o Dividing the message into small packets that are routed independently o Each router along the path forwards packets to another router along the path

Decentralization and Redundancy ●Decentralized networks with redundant paths provide robustness in network design

Decentralization and Redundancy ●Decentralized networks with redundant paths provide robustness in network design Centralized Network A B

Decentralization and Redundancy ●Decentralized networks with redundant paths provide robustness in network design Centralized Network Vulnerability: Single route from A to B. The network is destroyed by knocking out the center. A B

Decentralization and Redundancy ●Decentralized networks with redundant paths provide robustness in network design Centralized Network Decentralized Network Vulnerability: Single route from A to B. The network is destroyed by knocking out the center. A B A B

Decentralization and Redundancy ●Decentralized networks with redundant paths provide robustness in network design Centralized Network Decentralized Network Vulnerability: Single route from A to B. The network is destroyed by knocking out the center. Robustness: Redundant routes from A to B. Network survives attacks to individual nodes. A B A B

Packet vs Circuit Switching ●In a circuit-switched network (telephones) there is a dedicated channel between A and B ●In a packet-switched network there is no sustained connection between A and B ●Browsing: Navigating from one page to another may seem like it’s a dedicated channel, but it’s not ●Packet switching increases redundancy and robustness

Traceroute ●Traceroute is a networking utility used to trace the route and measure delays of packets moving through the InternetTraceroute ●Traceroute repeatedly sends packets from the source to destination with increasing time to live (TTL or number of hops) starting at 1, 2, 3, … Source Destination ●It uses data received to build a list of hops 1 2 1

traceroute wikipedia.org Destination hostDie after this many hops Domain names and IP addresses of routers and hosts along the way Hop number Round trip times (RTT) or latency for 3 packets to the hop and back.

Internet Performance

Global Bandwidth ● Bandwidth speeds vary across the globe ● The current global average is 18.4 Mbps download ● Korea leads the world with 52.6 Mbps ● In the US the average is 24.4 Mbps

Broadband Access Broadband: high speed Internet service that is always on, typically through cable or DSL modems (Src: OECD)OECD 72.4% Penetration in OECD Countries 6 Countries have over 100% penetration 7 for 3 people in my house

Bandwidth ● Bandwidth or throughput is the rate at which data are downloaded or uploaded in a network. o Measured in Kilobits per second (Kbps) -- thousands, or o Megabits per second (Mbps) -- millions Click me