+ All Categories
Home > Documents > Chapter1 Introduction

Chapter1 Introduction

Date post: 06-Mar-2016
Category:
Upload: rohitpatyal82
View: 13 times
Download: 0 times
Share this document with a friend
Description:
l
138
7/21/2019 Chapter1 Introduction http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 1/138 Computer Networks
Transcript
Page 1: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 1/138

Computer Networks

Page 2: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 2/138

Computer Networks

Prof. Lin Weiguo 

College of ComputingCopyleft © 2003~2015

[email protected] 

http://icourse.cuc.edu.cn/computernetworks/

Page 3: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 3/138

[email protected] 3

Roadmap

Introduction

Medium Access Sublayer

Network Layer

Transport Layer

Application Layer

Data Link Layer

Physical Layer

3/17/15 

Page 4: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 4/138

Introduction 

Chapter 1 

Page 5: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 5/138

[email protected] 5

Attention

The materials below are available for use by others.

Instructors are welcome to use them in their own

courses, download them to their own class' web site,

or modify them to suit. However, you mustacknowledge the source of the original and not

attempt to place your own copyright on this

material.

!  Thanks to 

http://authors.phptr.com/tanenbaumcn4/

3/17/15 

Page 6: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 6/138

[email protected] 6

Topics

Some of the overall issues we’ll be dealing with in this course. 

1.1 Uses of computernetworks

1.2 Network Hardware1.3 Network Software

1.4 Reference Models

1.5 Example Networks1.6 Network

Standardization

3/17/15 

Page 7: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 7/138

[email protected] 7

A Computer NetworkCommunication Link

3/17/15 

 A collection of computers interconnected by communication links

Page 8: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 8/138

[email protected] 8

1.1 Uses of Computer Networks

• 

Business Applications

•  Home Applications

•  Mobile Users

•  Social Issues

3/17/15 

Page 9: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 9/138

Business Applications

!  Companies have a great number of 

 computers

Monitor productions, keep track of inventories, do

 the payroll!

 

!  Those computers may have worked in

 isolation from the others, but at some point,

 management may have decided to connect them to be able to distribute information

 throughout the company.

3/17/15  [email protected] 9

Page 10: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 10/138

[email protected] 10

1st goal: Resource Sharing!

  The goal is to make all programs, equipment,and especially data available to anyone on

the network without regard to the physical

location of the resource and the user.!  Equipment:

!  Printers, Scanner, CD-Burners… 

Information:!  Customer records, Product information ,inventories,

financial statements, tax information … 

3/17/15 

Page 11: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 11/138

[email protected] 11

 A network with two clients and one server.

Client machine and Server machine

3/17/15 

Data 

Page 12: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 12/138

Client/Server model

The C/S model is widely used and forms the basis

of much network usage. The most popular

realization is that of a Web application.

3/17/15  [email protected] 12

The client/server model involves requests and replies.

Page 13: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 13/138

[email protected] 13

2nd goal: A Computer network to do

with people

!  A second goal of setting up a computernetwork has to do with people rather thaninformation or even computers. A computer

network can provide a powerfulcommunication medium among employees.

!  Email

VoIP!

  Videoconferencing

Cooperate with other to work: desktop sharing

3/17/15 

Page 14: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 14/138

[email protected] 14

3rd goal: e-Commerce

!  A third goal for many companies is doing

business electronically with other companies,

especially suppliers and customers.

!  e-Commerce

B2B: Business to business.

B2C: Business to consumer.

!  C2C: Consumer to consumer . 

3/17/15 

Page 15: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 15/138

Home Applications

!  Access to remote information

!  Web

!  Person-to-person communication!  Email,IM, VoIP

!  e-commerce

!  Interactive entertainment

!  IPTV, Gaming3/17/15  [email protected] 15

Page 16: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 16/138

[email protected] 16

P2P - Peer to Peer

In peer-to-peer system there is no fixed division into clients and servers.

3/17/15 

Page 17: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 17/138

Other applications

!  Ubiquitous computing

!  IOT ( Internet of Things)

!  Sensor Networks

!  RFID (Radio Frequency IDentification)

3/17/15  [email protected] 17

Page 18: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 18/138

[email protected] 18

Mobile Users

Combinations of wireless networks and mobile

computing.

3/17/15 

Page 19: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 19/138

Wearable Computers 

3/17/15  [email protected] 19

Page 20: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 20/138

SoLoMo

3/17/15  [email protected] 20

Page 21: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 21/138

[email protected] 21

Social Issues

!  Social networking issues

Employee rights vs employer rights

Government vs citizen! 

Hacker and criminal

!  Copyright protection

…… 

3/17/15 

 Again, The Internet addiction ?

Page 22: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 22/138

1.2 Network Hardware

Taxonomy of Networks

Personal Networks

Local Area Networks

Wide Area Networks

! Wireless Networks

3/17/15  [email protected] 22

Page 23: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 23/138

[email protected] 23

Classifying networks

!  By transmission technology

!  By scale

3/17/15 

Page 24: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 24/138

[email protected] 24

Transmission technology

Types of transmission technology

Broadcast links!  Point-to-point links

3/17/15 

Page 25: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 25/138

[email protected] 25

Point-to-point links

!  Point-to-point links connect individual pairs

of machines.

!  Packets : short messages

!  To go from the source to the destination, a

 packet on a network made up of point-to-point

 links may have to first visit one or more intermediate machines.

!  Often multiple routes, of different lengths, are

 possible

!  Unicasting:!  exactly one sender and one receiver

3/17/15 

Page 26: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 26/138

[email protected] 26

Broadcast Networks

!  Broadcast networks have a single communicationchannel that is shared by all the machines on the

network.

!  Packets sent by any machine are receivedby all the others.!   An address field within the packet specifies the intended

recipient. Upon receiving a packet, a machine checks the

address field. If the packet is intended for the receivingmachine, that machine processes the packet; if the packet is

intended for some other machine, it is just ignored.

3/17/15 

Page 27: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 27/138

[email protected] 27

Broad/Multi-casting

Broadcasting!

 

address a packet to all destinations by using a

special code in the address field .

Multicasting!

 

Some broadcast systems also support

transmission to a subset of the machines

3/17/15 

Page 28: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 28/138

Network Topologies

!  Think of a topology as a network's virtual

 shape or structure.

3/17/15  [email protected] 28

Router

Page 29: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 29/138

Example of a Real network

3/17/15  [email protected] 29

Page 30: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 30/138

[email protected] 30

Classification by scale.

3/17/15 

Page 31: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 31/138

[email protected] 31

PAN (Personal area networks) 

Bluetooth ( IEEE 802.15 )

3/17/15 

Page 32: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 32/138

[email protected] 32

Local Area Networks

!  A LAN is a privately owned networkthat operates with in and nearby a

single building like a home, office or

factory.

!  LANs are widely used to connect

personal computers and consumerelectronics to let them share

resources and exchange

information. 3/17/15 

Page 33: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 33/138

Wireless and wired LANs

3/17/15  [email protected] 33

Wireless and wired LANs.

(a) 802.11. (b) Switched Ethernet.

Page 34: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 34/138

WLAN (Wireless LAN)

3/17/15  [email protected] 34

Wireless LAN (Wi-Fi IEEE 802.11 )

Page 35: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 35/138

[email protected] 35

Wired LAN

3/17/15 

!  Wired LANs charactoristics

!  Use copper wires, optical fibers

!   Are restricted in size

Run at speeds of 10Mbps to 1Gbps

Low delay

Make very few errors

Page 36: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 36/138

Ethernet: IEEE802.3

!  Ethernet is the most common type of wired LAN

!  Switched Ethernet

!  Each computer speaks the Ethernet protocol and

 connects to a box called a switch with a point-to-point link.

!   A switch has multiple ports, each of which can connect to one computer. The job of the switch is to

 relay packets between computers that are attached to it, using the address in each packet to determine

 which computer to send it to.

3/17/15  [email protected] 36

Page 37: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 37/138

Expand and divide a LAN

!  Expand a LAN to make it larger

!  Switches can be plugged into each other using their ports

!  Divide one larger physical LAN into smaller 

 logical LANs.

!  VLAN(virtual LAN)

!  Each switch port is tagged with a “color ”, the switch then forwards packets so that computers attached to

 the same color ports are separated from the others.

3/17/15  [email protected] 37

Page 38: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 38/138

Classic Ethernet

!  The original Ethernet design broadcasts all

 the packets over a single linear cable.

!  At most one machine could successfully

 transmit at a time, and distributed arbitration

 mechanism was used to resolve conflicts.

!  Computers could transmit whenever the cable

 was idle!

  If two or more packets collided, each computer 

 just waited a random time and tried later.

3/17/15  [email protected] 38

Page 39: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 39/138

[email protected] 39

Classic LAN Topologies

Two broadcast networks

(a) Bus (IEEE 802.3, Ethernet)

(b) Ring (IEEE 802.5, Token Ring)

3/17/15 

Ch l All ti th d

Page 40: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 40/138

Channel Allocation methods

for Broadcast networks

Static allocation!

 

Divide time into discrete intervals and use a round-robinalgorithm, allowing each machine to broadcast only when its time

slot comes up.

!  It wastes channel capacity when a machine has nothing to say

during its allocated slot, so most systems attempt to allocate the

channel dynamically.

!  Dynamic allocation

!  Centralized: there is a single entity which determines who goes next.

Decentralized : there is no central entity , each machine

must decide for itself whether to transmit.

3/17/15  [email protected] 40

Page 41: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 41/138

Metropolitan Area Networks 

!  MAN covers a city

3/17/15  [email protected] 41

 A metropolitan area network based on cable TV.

Page 42: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 42/138

Wireless MAN

3/17/15  [email protected] 42

WiMax IEEE 802.16

Page 43: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 43/138

Wide Area Networks

!  A WAN spans a large geographical area,

 often a country or continent.

3/17/15  [email protected] 43

WAN that connects three branch offices in Australia

Page 44: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 44/138

Communication subnet 

!  Transmission lines

copper wire, optical fiber, or even radio links.

Most companies do not have transmission lines lying about, so

instead they lease the lines.

!  Switching elements

Switches are the specialized computers called routers that

connect two or more transmission lines

Subnet:

!   A collection of routers and communication lines that movedpackets from the source host to the destination.

3/17/15  [email protected] 44

Page 45: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 45/138

[email protected] 45

Differences between WAN &LAN

3/17/15 

!  In WAN, the hosts and subnet are owned and

 operated by different people

!  The routers will usually connect different

 kinds of networking technology.

!  What is connected to the subnet:

Individual computers

!  Could be entire LANs

!  This is how larger networks are built from smaller ones

Page 46: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 46/138

WAN via the Internet

!  VPN: flexible but lack control

3/17/15  [email protected] 46

WAN using a virtual private network.

Page 47: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 47/138

WAN via ISP network

!  The subnet is run by Internet Service Provider

3/17/15  [email protected] 47

WAN using an ISP network.

Page 48: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 48/138

WAN Terms

!  Packet / Cell!  the message is cut into packets before sending

!  Packet-switched / store-and-forward!  the packet is received at each intermediate router in its

entirety, stored there until the required output line is free,

and then forwarded.

!  Routing algorithm!  There may be many paths in the network that connect two

computers. How the network makes the decision as to

which path to use is called the routing algorithm. 

3/17/15  [email protected] 48

Page 49: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 49/138

Internet

!  Internetworks:

!  Collection of interconnected networks.

!  internet (lower case i) is generic term.

Internet (upper case I) is worldwide connection to

 all kinds of machines.

3/17/15  [email protected] 49

Page 50: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 50/138

[email protected] 50

1.3 Network Software

!  Protocol Hierarchies

!  Design Issues for the Layers

!  Connection-Oriented andConnectionless Services

!  Service Primitives

!  The Relationship of Services toProtocols

3/17/15 

Page 51: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 51/138

[email protected] 51

Philosophy of Protocol Hierarchies

Layering:!

 

To reduce their design complexity, mostnetworks are organized as a stack of layers or

levels, each one built upon the one below it.! 

Services:

!  The purpose of each layer is to offer certainservice to the higher layer, shielding those

layers from the details of how the offeredservices are actually implemented.

3/17/15 

Page 52: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 52/138

Layer n Protocol

!  Layer n on one machine carries on a

 conversation with layer n on another 

 machine. The rules and conventions used

 in this conversation are collectively known

 as the layer n protocol.

!   A protocol is an agreement between

 communicating parties on how communication is to proceed.

3/17/15  [email protected] 52

Page 53: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 53/138

[email protected] 53

Human protocols:!  “what’s the time?”

!  “How are you doing?”

!  “I have a question” 

- Specific messages sent- Specific actions taken when

messages received, orother events

Network protocols:!  Machines rather than

humans

!  All communicationactivity in Internetgoverned by protocols

• 

Protocols define format, order of messages sent and

received among network entities, and actions taken

on message transmission and receipt. 

What Is A Protocol 

3/17/15 

Page 54: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 54/138

[email protected] 54

!  Human Network

TCP connection request TCP connection reply 

HTTP request 

HTTP response 

“Got the time?” 

“Hello” “Hello” 

“It’s 10:30” 

Protocol Example 

3/17/15 

Virtual

Page 55: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 55/138

[email protected] 55

Protocol Hierarchies

Layers, protocols, and interfaces.3/17/15 

Physicalcommunication

Virtualcommunication

Peers

Page 56: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 56/138

[email protected] 56

Hierarchy Example 

Name

 Address

Post Office Post Office

Name

 Address

3/17/15 

Page 57: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 57/138

[email protected] 57

!  PeersThe entities comprising the corresponding layers ondifferent machines are called peers. The peers may

be processes, hardware devices, or even humanbeings. In other words, it is the peers thatcommunicate by using the protocol. 

!  Interface: Between each pair of adjacent layers is an interface.The interface defines which primitive operations andservices the lower layer makes available to theupper one. 

Terminology 

3/17/15 

Page 58: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 58/138

[email protected] 58

KISS principle

!  "Keep It Simple, Stupid", 

!  Important to keep it simple and clean to reducecomplexity.

!  How many layers?

!  Clean interfaces

Important that each layer perform a specific

collection of well-understood functions.

3/17/15 

Page 59: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 59/138

[email protected] 59

Network architecture 

!  Network architecture: A set of layers andprotocols.!  The spec must contain enough information to

allow an implementer to write the program or buildthe hardware for each layer so that it will correctlyobey the appropriate protocol.

Functional interfaces and implementation detailsare not part of the spec, since that's not visible

outside the machine.!  It is not even necessary that the interfaces on all

machines in a network be the same, provided thateach machine can correctly use all the protocols.

3/17/15 

Page 60: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 60/138

Protocol stack

!  Protocol stack:!   A list of protocols used by a system, one protocol per

layer, is called a protocol stack.

Network architectures, protocol stacks, and theprotocols themselves are the principal subjectsof this course

3/17/15  [email protected] 60

Analogy of Protocol Hierarchies

Page 61: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 61/138

[email protected] 61

Analogy of Protocol Hierarchies

The philosopher-translator-secretary architecture.

UrduEnglish ChineseFrench

3/17/15 

Virtual Communication:

Page 62: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 62/138

Virtual Communication:

Sino-US Talk

3/17/15  [email protected] 62

Xi Jinping meets with Barack Obama.

Page 63: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 63/138

[email protected] 63

Information flow

Example information flow supporting virtual communication in layer 5.

Layer4 thinks "SendtoPeer" rather than “CallNextLayerDown".3/17/15 

“Horizontal”

Page 64: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 64/138

[email protected] 64

Terminology 

Header:

!  Upper layer puts a header in front of the message to

identify the message and passes the result to lower layer

!  The header includes control information such as sequencenumbers to keep the right order.

Size of messages

!  There is always a limit to the size of messages imposed by

certain layer protocol. So incoming messages must be

broken into smaller units (packets) in this layer. 

3/17/15 

Page 65: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 65/138

An Internet Envelope

3/17/15  [email protected] 65

Page 66: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 66/138

[email protected] 66

TCP/IP Hierarchies

UDPTCP

FTPHTTP

IP ICMP IGMP ARP

EthernetATM

UDPTCP

FTPHTTP

IP ICMP IGMP ARP

EthernetATM

Data

Application

DataFTPHTTP

Transport

Data

UDPTCP

FTPHTTP

Internet

Data

UDPTCP

IP ICMP IGMP ARP

Preamble

Data

CRC

IP ICMP IGMP ARP

EthernetATM

Data

EthernetATM

Data

EthernetATM

Data

IP ICMP IGMP ARP

EthernetATM

Data

UDPTCP

IP ICMP IGMP ARP

Data

UDPTCP

FTPHTTP

Preamble

Internet

Transport

Application

Data

CRC

FTPHTTP

3/17/15 

Page 67: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 67/138

[email protected] 67

Software or hardware?

!  Although this section is called '‘network

software”, it is worth pointing out that the

lower layers of a protocol hierarchy are

frequently implemented in hardware orfirmware. Nevertheless, complex protocol

algorithms are involved, even if they are

embedded (in whole or in part) inhardware.

3/17/15 

Page 68: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 68/138

[email protected] 68

Design Issues for the Layers

!  Reliability

!  Network Evolution

Resource Location

!  Against Threats 

3/17/15 

Page 69: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 69/138

[email protected] 69

Reliability

Reliability: Making a network that operates correctlyeven though it is made up of a collection of componentsthat are themselves unreliable.

Mechanisms:!

 

Error detection

!  Find errors in received information.

!  Error correction! 

Fix errors in received information.!

  Routing!  Find a working path through a network.

3/17/15 

Page 70: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 70/138

Network Evolution issue 

!  Protocol Layering

!  Support change

!  Addressing or Naming

!  Every layer needs a mechanism for identifying

 senders and receivers.

!  Internetworking

!  Different network technologies often have different limitations.

!  Scalable

!  Design work well when the network gets large3/17/15  [email protected] 70

Page 71: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 71/138

Resource Location 

!  Networks provide a service to hosts from their  underlying resource, such as the capacity of 

 transmission lines.

!  Statistical multiplexing

"  Share network bandwidth dynamically

!  Flow control! 

Keep a fast sender from swamping a slow receiver with data.

Congestion! 

Network overloading

Quality of Service! 

Differential service for real-time delivery and other.

3/17/15  [email protected] 71

Page 72: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 72/138

Against Threats

!  Confidentiality

!   Against eavesdropping

 Authentication

Prevent impersonation

!  Integrity

Prevent surreptitious changes to messages

3/17/15  [email protected] 72

C ti O i t d

Page 73: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 73/138

[email protected] 73

Connection-Oriented vs.

Connectionless Services 

!  Layers can offer two different types of service

to the layers above them:

Connection-oriented

!  Connectionless

3/17/15 

Page 74: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 74/138

[email protected] 74

Connection-oriented service 

!  Like the telephone system. The system

establishes a connection, uses it, and

closes it.

!  Acts like a tube(Circuit). Data comes out

the other end in the same order as it goes

in.

!  Connection Setup (negotiation)

!  Data Transfer

!  Connection Termination 3/17/15 

Page 75: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 75/138

[email protected] 75

Connectionless service 

!  Like the postal system. Each message carries

the full destination address and each one is

routed through the intermediate nodes inside the

system independent of all the subsequentmessages.

!  It is possible that the first one sent can be

delayed so that the subsequent messages arrivefirst.! 

Message has a name: a packet in network layer

Store-and-forward switching vs. cut-through switching.

3/17/15 

Page 76: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 76/138

[email protected] 76

Quality of service 

!  Each service can be characterized by a QoS:

!  Reliability: Will the message arrive?

!   A reliable service is implemented by acknowledgement

(a receipt from the receiver).!

  Delay (Latency)

!  Delays and overhead are introduced in the ack process

3/17/15 

Page 77: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 77/138

[email protected] 77

Reliable connection-oriented service 

!  A reliable connection-oriented serviceguarantees success. They never lose data.!  Message sequence - message boundaries and order

are maintained.

!  Byte streams - messages are broken up or combined;flow is bytes. Can pair mechanism with upper-layerrequirements.

!  A typical situation in which a reliable connection-

oriented service is appropriate is file transfer.

3/17/15 

Page 78: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 78/138

[email protected] 78

!  Connectionless Service /Datagram Service:!  For some applications, the transit delay introduced by acks

are unacceptable. Like Voice Over IP.

!  Not all applications require connections. Like junk mail. It's

not worth the cost to determine if it actually arrived. Needs

a high probability of arrival, but 100% not required.

Connectionless, no acknowledgment.

!  Acknowledged datagram service: 

!   As above, but improved reliability via acknowledgment.

!  Request-reply service:

!   Acknowledgment is in the form of a reply. 

Unreliable Connectionless Service 

3/17/15 

Page 79: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 79/138

[email protected] 79

Connection-Oriented and Connectionless Services

Six different types of service.

3/17/15 

Page 80: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 80/138

[email protected] 80

Service Primitives 

!  A service is formally specified by a set of

primitives (operations) available to a user

process to access the service.

!  These primitives tell the service to perform someaction or report on an action taken by a peer

entity.

If the protocol stack is located in the operating

system, as it often is, the primitives are normallysystem calls

3/17/15 

Page 81: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 81/138

[email protected] 81

Service Primitives

Five service primitives for implementing a

simple connection-oriented service.

3/17/15 

Page 82: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 82/138

[email protected] 82

Service Primitives

Packets sent in a simple client-server interaction on aconnection-oriented network.( but life is not so simple)

3/17/15 

Page 83: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 83/138

[email protected] 83

Services to Protocols Relationship

 A service is a set of primitives (operations) that a

layer provides to the layer above it. The service

defines what operations the layer is prepared to

perform on behalf of its users, but it says nothing at

all about how these operations are implemented.

!   A protocol, in contrast, is a set of rules governingthe format and meaning of the packets, or

messages that are exchanged by the peer entitieswithin a layer. Entities use protocols to implement

their service definitions.

3/17/15 

Page 84: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 84/138

[email protected] 84

Layer K: a service and a protocol.

In other words, services relate to theinterfaces between layers. In contrast, protocols 

relate to the packets sent between peer entities on

different machines.3/17/15 

Page 85: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 85/138

[email protected] 85

1.4 Reference Models

!  The OSI Reference Model

!  The TCP/IP Reference Model

!  The Model used in this course

!  A Comparison of the OSI and TCP/IP

!  A Critique of the OSI Model and Protocols

!  A Critique of the TCP/IP Reference Model 

3/17/15 

Page 86: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 86/138

[email protected] 86

OSI vs. TCP/IP reference model

!  The protocols associated with the OSI( O  pen

S ystem I nterconnect) model  are rarely

used any more, the model itself is actually

quite general and still valid, and the featuresdiscussed at each layer are still very

important.

The TCP/IP model  has the oppositeproperties: the model itself is not of much use

but the protocols are widely used.

3/17/15 

The OSI Reference Model

Page 87: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 87/138

[email protected] 87

Developed by ISO: International Standards Organization

(1983,revised in 1995)Principles used to develop OSI Layering:

1. Need a layer for each different level of abstraction.

2. Each layer performs a well defined function.3. Each layer should be standardizable.

4. Layer boundaries should minimize data flow across those boundaries.

5. The right number of layers - don't put too many functions together, but not too many layers either.

The OSI Reference Model

3/17/15 

The OSI Reference Model

Page 88: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 88/138

[email protected] 88

e OS e e e ce ode

The OSI

referencemodel.

1983,1995

3/17/15 

Page 89: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 89/138

Physical Layer

!  Purpose 

!  Transmits raw bits across a medium.

Concerns are 

Voltage: how many volts for 1 / 0

Timing: how many ns a bit lasts

!  Duplexing: transmission in both directions?

!  Connectors: how many pins? What is each pin?

etc.

3/17/15  [email protected] 89

Page 90: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 90/138

[email protected] 90

Data Link Layer  

!  Purpose:!  Transform a raw transmission line into a line that appears

free of undetected transmission errors to the networkslayer

Concerns:!

  Framing - Breaks apart input data into frames and transmitthe frames sequentially.

!  Error handling – if the service is reliable, the receiverconfirms correct receipt of each frame by sending back anacknowledgement frame.

!  Flow control - keeps a fast transmitter from drowning a

slow receiver in data.

!  Medium Access Control – how to control access to theshared channel for broadcast networks.

3/17/15 

Network Layer

Page 91: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 91/138

[email protected] 91

Network Layer

Purpose!  Route packets from source to destination

Concerns!

  Routing  - What path is followed by packets from source to

destination. Can be based on a static table, can bedetermined when the connection is created, or can be highlydynamic, being determined anew for each packet, to reflectthe current network load.

!  Congestion - Controls the number packets in the subnet.

!  Qos – Quality of service provided(delay, transit time, jitter 

!

)

!  Heterogeneity - Interfacing so one type of network can talk

to another. Addressing, packet size, protocols… 

3/17/15 

Page 92: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 92/138

[email protected] 92

Transport Layer  

!  Purpose! 

 Accept data from above it, split it up into smaller units if need be,pass them to network layer, and ensure that the pieces all arrivecorrectly at the other end.

Concerns!  Service Decisions - What type of service to provide; error-free point

to point, datagram, etc.

End-to-end: it carries data all the way from the source to thedestination.

Reliability - Ensures that packets arrive at their destination.Reassembles out of order messages.

!  Hides network  - Allows details of the network to be hidden fromhigher level layers.

!  Mapping - Determines which messages belong to whichconnections.

!  Flow control - keeps a fast transmitter from flooding a slow receiver.

3/17/15 

Page 93: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 93/138

Session Layer  

Purpose

!   Allow users on different machines to establish sessions

between them

!  Concerns

!  Dialog control - keep track of whose turn it is to transmit

!  Token Management  – prevent two parties from attempting

the same critical operation at the same time

!  Synchronization – checkpointing long transmissions to

allow them to pick up from where they left off in the eventof a crash and subsequent recovery.

3/17/15  [email protected] 93

Page 94: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 94/138

Presentation Layer

!  Purpose

!  Make it possible for computers with different data representations to communicate

!  Concerns!

 

Syntax and semantics of information transmitted.

Understands the nature of the data being

 transmitted. Converts ASCII/EBCDIC, big

 endian/little endian

3/17/15  [email protected] 94

Page 95: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 95/138

[email protected] 95

Application Layer  

!  contains a variety of protocols that are

commonly needed by users.

HTTP

!  FTP 

!  SMTP

3/17/15 

Page 96: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 96/138

 The TCP/IP Reference Models

•  Link layer

•  Internet layer

• 

Transport layer•

   Application layer

3/17/15  [email protected] 96

Page 97: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 97/138

[email protected] 97

U.S. DoD ARPANET

Was a research network sponsored by the DoD

Network be able to survive loss of subnet

hardware, with existing conversations not being

broken off .!

 

 A flexible architecture was needed sinceapplications with divergent requirements were

envisioned, ranging from transferring files to real-

time speech transmission

3/17/15 

The TCP/IP Reference Models

Page 98: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 98/138

[email protected] 98

The TCP/IP Reference Models

The TCP/IP reference model(Cerf & Kahn1974, Clark 1988)

3/17/15 

Page 99: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 99/138

[email protected] 99

The Key

a packet-switching  network

based on a connectionless layer

that runs across different networks.

3/17/15 

Page 100: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 100/138

[email protected] 100

Link Layer  

!  Describes what link such as serial lines and

classic Ethernet must do to meet the needs

of the connectionless internet layer.

!  It is not really a layer at all, in the normalsense of the term, but rather an interface 

between hosts and transmission links.

3/17/15 

Page 101: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 101/138

[email protected] 101

The Internet Layer  

!  Permit hosts to inject packets into any

network and have them travel independently

to the destination ( potentially on a different

network, like international mail)!  Routing and Congestion control

!  IP (Internet Protocol) 

!

  ICMP(Internet Control Message Protocol)

3/17/15 

Page 102: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 102/138

[email protected] 102

Transport Layer  

!  End2End: Allows peer entities to communicate.

!  TCP - Transmission Control Protocol provides areliable connection oriented protocol that delivers

a byte stream from one node to another.Guarantees delivery and provides flow control.

UDP - User Datagram Protocol provides an

unreliable connection-less protocol for

applications that provide their own. 

3/17/15 

Page 103: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 103/138

Application Layer  

!  Terminal - Telnet

File transfer – FTP

!  The Web - HTTP

!  ! 

3/17/15  [email protected] 103

Page 104: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 104/138

[email protected] 104

The TCP/IP Reference Models

The TCP/IP reference model with some protocols we will study

3/17/15 

Page 105: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 105/138

[email protected] 105

The model used in this course

The reference model used in this course.

3/17/15 

Comparing OSI and TCP/IP

Page 106: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 106/138

 Models

!  Concepts central to the OSI model

!  Services

!  Interfaces

!  Protocols

OSI has good definition of service, interface,

 and protocol as discussed before. Fits well

 with object oriented programming concepts.Protocols are better hidden.

3/17/15  [email protected] 106

Comparing OSI and TCP/IP

Page 107: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 107/138

 Models

!  The TCP/IP model did not originally

 distinguish between service, interface, and

 protocol.

!  With TCP/IP, the protocols came first; model was just a description of the protocols. But

 then the model isn't good for any other 

 protocols.

3/17/15  [email protected] 107

ff

Page 108: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 108/138

[email protected] 108

Different philosophy

!  Which is first?

Reference Model

vs

Corresponding protocols

3/17/15 

S ifi diff

Page 109: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 109/138

[email protected] 109

Specific differences  

!  Number of layers: 7 vs. 4

Connectionless vs. connection-oriented

OSI supports both in the network layer, but only

Connection-oriented communication in thetransport layer

TCP/IP supports only connectionless mode in the

network layer but supports both in the transport

layer, giving the users a choice.

3/17/15 

A Critique of the OSI Model

d P t l

Page 110: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 110/138

[email protected] 110

and Protocols

!  Why OSI did not take over the world!  Bad timing

!  Bad technology

!  Flawed, too complex

!  More political than technical of 7 layers decision

!  Bad implementations

!  Huge, unwieldy, Poor quality

!  Bad politics

!  Academia vs Bureaucrats

3/17/15 

B d Ti i

Page 111: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 111/138

[email protected] 111

Bad Timing

The apocalypse of the two elephants.3/17/15 

A Critique of the TCP/IP Reference

Page 112: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 112/138

Model

!  Service, interface, and protocol not

distinguished

!  Not a general model

!  Link “layer ” not really a layer

!  No mention of physical and data link layers

Minor protocols deeply entrenched, hard to

replace

3/17/15  [email protected] 112

1 5 E l N t k

Page 113: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 113/138

[email protected] 113

1.5 Example Networks

!  The Internet

3G Mobile Phone Networks

!

  Wireless LANs: 802.11!  RFID and Sensor networks

3/17/15 

Th hi t

Page 114: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 114/138

[email protected] 114

The history

!  The story begins in the late 1950s. At theheight of the Cold War, the DoD wanted a

command-and-control network that could

survive a nuclear war.

!  This leads to the ARPANET:

1968 Originally intended as reliable network, with

multiple routing. Used TCP/IP precursor, which

got built into early UNIX.

(ARPA, the Advanced Research Projects Agency )

3/17/15 

Th ARPANET

Page 115: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 115/138

[email protected] 115

The ARPANET

(a) Structure of the telephone system.

(b) Baran’s proposed distributed switching system.3/17/15 

Th ARPANET (2)

Page 116: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 116/138

[email protected] 116

The ARPANET (2)

The original ARPANET design.

IMPs (Interface Message Processors)

3/17/15 

Th ARPANET (3)

Page 117: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 117/138

[email protected] 117

The ARPANET (3)

Growth of the ARPANET (a) December 1969. (b) July 1970.

(c) March 1971. (d)  April 1972. (e) September 1972.

NAP (Network Access Point).

3/17/15 

NSFNET

Page 118: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 118/138

[email protected] 118

NSFNET

The NSFNET backbone in 1988.

3/17/15 

NSFNET

Page 119: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 119/138

[email protected] 119

NSFNET!

 

Late 1970s - Many other folks wanted to get

on the net, but Arpanet was essentially

limited to military contractors. NSF set up

another network to handle this need. Started

at 448 Kbps and by 80's upgraded to 1.5

Mbps.

!  1990 Formed ANS (Advanced Networks andServices) - MERIT, MCI, IBM took over from

the government running at 45 Mbps.

1995 ANSNET sold to AOL, who now runs it.

3/17/15 

Internet Usage

Page 120: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 120/138

[email protected] 120

Internet Usage

!  Growing exponentially.

!  All nodes run TCP/IP. Means that all

nodes have an IP address by which they

can be contacted.!  Traditional applications (1970 –  1990)

E-mail

!  News

Remote login

!  File transfer

3/17/15 

Internet Usage

Page 121: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 121/138

[email protected] 121

Internet Usage!

  1990s :!  the WWW (World Wide Web)

!  invented by CERN physicist Tim Berners-Lee

Together with the Mosaic browser

!  Written by Marc Andreessen at the National Center for

Supercomputer Applications in Urbana, Illinois

!  ISPs (Internet Service Providers)

!  Offer individual users at home the ability to call up one of

their machines and connect to the Internet

3/17/15 

Architecture of the Internet

Page 122: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 122/138

Architecture of the Internet 

3/17/15  [email protected] 122

Overview of the Internet architecture

3G Mobile Phone Networks

Page 123: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 123/138

3G Mobile Phone Networks

3/17/15  [email protected] 123

Cellular design of mobile phone networks

3G Mobile Phone Networks

Page 124: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 124/138

3G Mobile Phone Networks

3/17/15  [email protected] 124

 Architecture of the UMTS 3G mobile phone network.

3G Mobile Phone Networks

Page 125: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 125/138

3G Mobile Phone Networks

3/17/15  [email protected] 125

Mobile phone handover (a) before, (b) after.

Wireless LANs WiFi (802 11)

Page 126: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 126/138

[email protected] 126

Wireless LANs - WiFi (802.11)

(a) Wireless networking with a base station.

(b) Ad hoc networking.3/17/15 

Wireless LANs: 802 11

Page 127: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 127/138

Wireless LANs: 802.11 

3/17/15  [email protected] 127

Multipath fading

Wireless LANs: 802 11

Page 128: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 128/138

Wireless LANs: 802.11 

3/17/15  [email protected] 128

The range of a single radio may not cover the entire system.

Wireless LANs standards

Page 129: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 129/138

[email protected] 129

Wireless LANs standards

The development of the standard!

 

802.11-1997: 1Mbps, 2Mbps (2.4 GHz)

802.11a-1999: 54Mbps (5 GHz band)

802.11b-1999:11Mbps(2.4 GHz)

802.11g-2003: 54Mbps (2.4 GHz)

802.11n-2009:upto 600Mbps (operates on both

the 2.4 GHz and the lesser used 5 GHz bands)!

 

802.11ac-2012:upto 1Gbps(5GHz)

3/17/15 

RFID and Sensor Networks

Page 130: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 130/138

RFID and Sensor Networks 

3/17/15  [email protected] 130

RFID used to network everyday objects.

RFID and Sensor Networks

Page 131: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 131/138

RFID and Sensor Networks 

3/17/15  [email protected] 131

Multihop topology of a sensor network

1 6 Network Standardization

Page 132: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 132/138

[email protected] 132

1.6 Network Standardization

Who’s Who in the Telecommunications World

!  Who’s Who in the International Standards

World

!  Who’s Who in the Internet Standards World

De facto and De jure

3/17/15 

ITU

(International Telecommunication Union)

Page 133: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 133/138

[email protected] 133

(International Telecommunication Union) 

! Main sectors• 

ITU-R: Radio communications

• 

ITU-T: Telecommunications Standardization

•  ITU-D: Development

Classes of Members• 

National governments

•  Sector members

•   Associate members

• 

Regulatory agencies3/17/15 

Network Standardization

Page 134: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 134/138

[email protected] 134

Network Standardization

!  ISO (International Standards Organization)

 ANSI (American National Standards Institute)

!  NIST (National Institute of Standards andTechnology)

!  IEEE (Institute of Electrical and Electronics

Engineering)

3/17/15 

IEEE 802 Standards

Page 135: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 135/138

[email protected] 135

The 802 working groups. The important ones are marked with *.The ones marked with ! are hibernating. The one marked with †

 gave up and disbanded itself.3/17/15 

IEEE 802 Standards

Page 136: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 136/138

IEEE 802 Standards 

3/17/15  [email protected] 136

http://standards.ieee.org/about/get/802/802.html

Internet standards

Page 137: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 137/138

[email protected] 137

Internet standards

! Internet Architecture Board.!

 

IETF: Internet Engineering Task Force

!  RFC: Request for comments

http://www.ietf.org/rfc

!  IRTF (Internet Research Task Force)

Internet Society!

  http://www.isoc.org

3/17/15 

Page 138: Chapter1 Introduction

7/21/2019 Chapter1 Introduction

http://slidepdf.com/reader/full/chapter1-introduction-56dc040333e0a 138/138

END OF CH-1 


Recommended