









































































Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
Computer Network and Security slides chapter 1
Typology: Slides
1 / 81
This page cannot be seen from the preview
Don't miss anything!
Computer Networking: A Top Down Approach , 5 th^ edition. Jim Kurose, Keith Ross Addison-Wesley, April
All material copyright 1996-2009J.F Kurose and K.W. Ross, All Rights Reserved
get “feel” and terminology more depth, detail later in course approach: use Internet as example
what’s the Internet? what’s a protocol? network edge; hosts, access net, physical media network core: packet/circuit switching, Internet structure performance: loss, delay, throughput security protocol layers, service models history
What’s the Internet: “nuts and bolts” view
millions of connected computing devices: hosts = end systems running network apps Home network
Institutional network
Mobile network Global ISP
Regional ISP
router
PC server wireless laptop cellularhandheld
wiredlinks
accesspoints
communication links fiber, copper, radio, satellite transmission rate = bandwidth routers: forward packets (chunks of data)
World’s smallest web server http://www-ccs.cs.umass.edu/~shri/iPic.html
IP picture frame http://www.ceiva.com/
Web-enabled toaster + weather forecaster
Internet phones
What’s the Internet: a service view
communication infrastructure enables distributed applications: Web, VoIP, email, games, e-commerce, file sharing communication services provided to apps: reliable data delivery from source to destination “best effort” (unreliable) data delivery
human protocols:
“what’s the time?”
“I have a question”
introductions
… specific msgs sent
… specific actions taken when msgs received, or other events
network protocols: machines rather than humans all communication activity in Internet governed by protocols
protocols define format, order of msgs sent and received among network entities, and actions taken on msg transmission, receipt
1.1 What is the Internet? 1.2 Network edge end systems, access networks, links 1.3 Network core circuit switching, packet switching, network structure 1.4 Delay, loss and throughput in packet-switched networks 1.5 Protocol layers, service models 1.6 Networks under attack: security 1.7 History
A closer look at network structure:
interconnected routers network of networks
Access networks and physical media
Q: How to connect end systems to edge router? residential access nets institutional access networks (school, company) mobile access networks Keep in mind: bandwidth (bits per second) of access network? shared or dedicated?
telephone network Internet
home dial-up modem
ISP modem (e.g., AOL)
home PC
central office
Uses existing telephony infrastructure Home is connected to central office up to 56Kbps direct access to router (often less) Can’t surf and phone at same time: not “always on”
Residential access: cable modems
Does not use telephone infrastructure Instead uses cable TV infrastructure HFC: hybrid fiber coax asymmetric: up to 30Mbps downstream, 2 Mbps upstream network of cable and fiber attaches homes to ISP router homes share access to router unlike DSL, which has dedicated access
Residential access: cable modems
Diagram: http://www.cabledatacomnews.com/cmic/diagram.html
home
cable headend
cable distribution network
server(s)
home
cable headend
cable distribution network (simplified)