Introduction 1-1 Networking Admin  1 to 4 lectures a week for 11 weeks for a total of 23 lectures  Interleaves with Functional Programming  First prac.

Slides:



Advertisements
Similar presentations
Introduction 2 1: Introduction.
Advertisements

James 1:5 If any of you lacks wisdom, he should ask God, who gives generously to all without finding fault, and it will be given to him.
Introduction1-1 Introduction to Computer Networks Our goal:  get “feel” and terminology  more depth, detail later in course  approach:  use Internet.
Lecture 1 Internet Overview: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  network structure,
CS 325 Computer Networks Sami Rollins Fall 2003.
Lecture Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  network structure,
Network Layer4-1 Chapter 4 Network Layer Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross Addison-Wesley,
1 Day 01 - The Internet. 2 Chapter 1 Introduction Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross.
Chapter 2 Application Layer Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross Addison-Wesley, July.
Networking Based on the powerpoint presentation of Computer Networking: A Top Down Approach Featuring the Internet, Third Edition, J.F. Kurose and K.W.
EEC-484/584 Computer Networks Lecture 1 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
6: Wireless and Mobile Networks Wireless LANs.
Lecture 1 Overview: roadmap 1.1 What is computer network? the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  network.
Lecture 1 Internet Overview: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  network structure,
Introduction1-1 CS 325 Computer Networks Sami Rollins Fall 2005.
Dr. Philip Cannata 1 Principles of Network Applications.
1-1 CS 456 – Computer Networks □ Instructor: Ian Goldberg □ Classes: Tuesday and Thursday 8:30 – 9:50am MC 4063 (section.
1: Introduction1 Part I: Introduction Goal: r get context, overview, “feel” of networking r more depth, detail later in course r approach: m descriptive.
Chapter 1 Introduction Computer Networking: A Top Down Approach 6th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
Lecture 1 Internet CPE 401 / 601 Computer Network Systems slides are modified from Dave Hollinger and Daniel Zappala Lecture 1 Introduction.
6: Wireless and Mobile Networks6-1 Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition.
Introduction1-1 Chapter 1 Introduction Computer Networking: A Top Down Approach, 4 th edition. Jim Kurose, Keith Ross Addison-Wesley, July A note.
Introduction 1-1 Chapter 1 Introduction Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on.
Introduction1-1 Chapter 1: Introduction Our goal:  get “feel” and terminology  more depth, detail later in course  approach:  use Internet as example.
RSC Part I: Introduction Redes y Servicios de Comunicaciones Universidad Carlos III de Madrid These slides are, mainly, part of the companion slides to.
Introduction Chapter 1 Introduction Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross Addison-Wesley,
Instructor: Christopher Cole Some slides taken from Kurose & Ross book IT 347: Chapter 1.
2: Application Layer1 CS 4244: Internet Software Development Dr. Eli Tilevich.
Chapter 1 Introduction Terminology, Net Edge Computer Networking: A Top Down Approach, 5 th edition. Jim Kurose, Keith Ross Addison-Wesley, April 2009.
Introduction1-1 Course Code:EE/TE533 Instructor: Muddathir Qamar.
CS 3214 Computer Systems Godmar Back Lecture 23. Announcements Project 5 due Dec 8 Exercise 10 handed out Exercise 11 coming before Thanksgiving CS 3214.
Introduction Switches and Access. 2 Chapter 1 Introduction Computer Networking: A Top Down Approach Featuring the Internet, 5 rd edition. Jim.
Introduction 1-1 Chapter 1 Introduction Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on.
Chapter 1 Introduction Circuit/Packet Switching Protocols Computer Networking: A Top Down Approach, 5 th edition. Jim Kurose, Keith Ross Addison-Wesley,
Transport Layer3-1 Chapter 3 Transport Layer Computer Networking: A Top Down Approach Featuring the Internet, 2 nd edition. Jim Kurose, Keith Ross Addison-Wesley,
Introduction1-1 Chapter 1 Computer Networks and the Internet Computer Networking: A Top Down Approach Featuring the Internet, 2 nd edition. Jim Kurose,
Introduction1-1 Data Communications and Computer Networks Chapter 1 CS 3830 Lecture 1 Omar Meqdadi Department of Computer Science and Software Engineering.
Basic Concepts of Internet Technology What is a computer network? Isolated computers vs. networked computers internetworking The Internet What’s a protocol?
Transport Layer3-1 Chapter 3 Transport Layer Computer Networking: A Top Down Approach 4 th edition. Jim Kurose, Keith Ross Addison-Wesley, July A.
Internet History CS 4244: Internet Programming Dr. Eli Tilevich.
Introduction1-1 Chapter 1 Computer Networks and the Internet Computer Networking: A Top Down Approach Featuring the Internet, 2 nd edition. Jim Kurose,
Introduction 1-1 Chapter 1 Introduction Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on.
Introduction1-1 Chapter 1 Computer Networks and the Internet Computer Networking: A Top Down Approach Featuring the Internet, 2 nd edition. Jim Kurose,
Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
Introduction1-1 Computer Network (  Instructor  Ai-Chun Pang 逄愛君, m Office Number: 417  Textbook.
Marina Papatriantafilou – Introduction to computer communication Based on the book Computer Networking: A Top Down Approach, Jim Kurose, Keith Ross, Addison-Wesley.
Chapter 4 Network Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
Chapter 9 Network Management
Chapter 1, slide: 1 Summer 2010 CS 372 Introduction to Computer Networks* Monday, June 21, 2010 School of Electrical Engineering and Computer Science Oregon.
1: Introduction1 Internet Services and Protocols Adapted from “Computer Networking: A Top Down Approach Featuring the Internet” Kurose and Ross, Addison.
Introduction 1-1 1DT057 Distributed Information Systems Chapter 1 Introduction.
1 Ram Dantu University of North Texas, Practical Networking.
Computer Networks Dr. Adil Yousif CS Lecture 1.
Course on Computer Communication and Networks Lecture 1 Chapter 1: Introduction Part A: Internet, Protocol Layering and Data CTH EDA344/ GU DIT 420.
Overview: Cloud Datacenters
Graciela Perera Introduction Graciela Perera
CS 3214 Computer Systems Networking.
Day 01 - The Internet.
Slides taken from: Computer Networking by Kurose and Ross
CS 3214 Computer Systems Lecture 21 Godmar Back.
Chapter 6 Wireless and Mobile Networks
CS 3214 Computer Systems Networking.
Introduction 1 1: Introduction.
Lecture 2 Overview.
Chapter 3 Transport Layer
Chapter 1: Introduction
CPE 401 / 601 Computer Network Systems
Chapter 1 Introduction Computer Networking: A Top Down Approach 6th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
Chapter 1: Introduction
Chapter 4 Network Layer A note on the use of these ppt slides:
Presentation transcript:

Introduction 1-1 Networking Admin  1 to 4 lectures a week for 11 weeks for a total of 23 lectures  Interleaves with Functional Programming  First prac this week (THU 17): then every second teaching week (5 pracs in total)

Practicals with a difference  Two weeks to ‘execute them’  Self assessment  They will be as last year, so you will be able to have the solutions ahead of handing in, if you like  responsibility  Well, PERSONAL RESPONSIBILITY should be the keyword of your relation with this course  It worked reasonably well last year and the year before Introduction 1-2

The course is entirely based on a book (a very good one!)  First 5 chapters (about 500 pages)  Of course, some material will be left out: altogether about 260 pages  Still, 10 to 20 pages to read per lecture (depending on difficulty)  Book must be read BEFORE practicals, though might be understood for real just after ending prac Introduction 1-3

The book again…  Important: references in the book. Get used to that and use them (within reason)  Another important resource, of course: the internet (for example wikipedia and from there to ‘core’ documents, up to RFCs; is a very useful resource for protocols) Introduction 1-4

So why having lectures?  Actually not too sure: tradition? Lack of inventiveness? Because life has to be hard, as parents / teachers kept telling you? ;-)  Lectures to get your interest going, or to clarify general / difficult concepts  To ease the difficulty of self learning (which remains the best way to learn, however)  As interactive as possible, please (like, don’t fall asleep…) Introduction 1-5

Introduction 1-6 The book (and a lot of material!) Computer Networking: A Top Down Approach, 4 th edition. Jim Kurose, Keith Ross Addison-Wesley, July A note on the use of these ppt slides: We’re making these slides freely available to all (faculty, students, readers). They’re in PowerPoint form so you can add, modify, and delete slides (including this one) and slide content to suit your needs. They obviously represent a lot of work on our part. In return for use, we only ask the following:  If you use these slides (e.g., in a class) in substantially unaltered form, that you mention their source (after all, we’d like people to use our book!)  If you post any slides in substantially unaltered form on a www site, that you note that they are adapted from (or perhaps identical to) our slides, and note our copyright of this material. Thanks and enjoy! JFK/KWR All material copyright J.F Kurose and K.W. Ross, All Rights Reserved

Introduction 1-7 Chapter 1: Introduction Our goal:  get “feel” and terminology  more depth, detail later in course  approach:  use Internet as example Overview:  what’s the Internet?  what’s a protocol?  network edge; hosts, access net, physical media  network core: packet/circuit switching, Internet structure  performance: loss, delay, throughput  security  protocol layers, service models  history

Introduction 1-8 Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  circuit switching, packet switching, network structure 1.4 Delay, loss and throughput in packet-switched networks 1.5 Protocol layers, service models 1.6 Networks under attack: security 1.7 History

Introduction 1-9 What’s the Internet: “nuts and bolts” view  millions of connected computing devices: hosts = end systems  running network apps Home network Institutional network Mobile network Global ISP Regional ISP router PC server wireless laptop cellular handheld wired links access points  communication links  fiber, copper, radio, satellite  transmission rate = bandwidth  routers: forward packets (chunks of data)

Introduction 1-10 “Cool” internet appliances World’s smallest web server IP picture frame Web-enabled toaster + weather forecaster Internet phones

Introduction 1-11 What’s the Internet: “nuts and bolts” view  protocols control sending, receiving of msgs  e.g., TCP, IP, HTTP, Skype, Ethernet  Internet: “network of networks”  loosely hierarchical  public Internet versus private intranet  Internet standards  RFC: Request for comments  IETF: Internet Engineering Task Force Home network Institutional network Mobile network Global ISP Regional ISP

Introduction 1-12 What’s the Internet: a service view  communication infrastructure enables distributed applications:  Web, VoIP, , games, e-commerce, file sharing  communication services provided to apps:  reliable data delivery from source to destination  “best effort” (unreliable) data delivery

Introduction 1-13 What’s a protocol? human protocols:  “what’s the time?”  “I have a question”  introductions … specific msgs sent … specific actions taken when msgs received, or other events network protocols:  machines rather than humans  all communication activity in Internet governed by protocols protocols define format, order of msgs sent and received among network entities, and actions taken on msg transmission, receipt

Introduction 1-14 What’s a protocol? a human protocol and a computer network protocol: Q: Other human protocols? Hi Got the time? 2:00 TCP connection request TCP connection response Get time

Introduction 1-15 Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  circuit switching, packet switching, network structure 1.4 Delay, loss and throughput in packet-switched networks 1.5 Protocol layers, service models 1.6 Networks under attack: security 1.7 History

Introduction 1-16 A closer look at network structure:  network edge: applications and hosts  access networks, physical media: wired, wireless communication links  network core:  interconnected routers  network of networks

Introduction 1-17 The network edge:  end systems (hosts):  run application programs  e.g. Web,  at “edge of network” client/server peer-peer  client/server model  client host requests, receives service from always-on server  e.g. Web browser/server; client/server  peer-peer model:  minimal (or no) use of dedicated servers  e.g. Skype, BitTorrent