Computer Networks and the Internet p. 1 What Is the Internet? p. 1 A Nuts and Bolts Description p. 1 A Service Description p. 4 Some Good Hyperlinks
|
|
- Agnes Allen
- 7 years ago
- Views:
Transcription
1 Computer Networks and the Internet p. 1 What Is the Internet? p. 1 A Nuts and Bolts Description p. 1 A Service Description p. 4 Some Good Hyperlinks p. 5 What Is a Protocol? p. 6 A Human Analogy p. 7 Network Protocols p. 8 The Network Edge p. 9 End Systems, Clients, and Servers p. 9 Connectionless and Connection-Oriented Services p. 11 The Network Core p. 13 Circuit Switching, Packet Switching, and Message Switching p. 13 Routing in Data Networks p. 24 Access Networks and Physical Media p. 29 Access Networks p. 29 Physical Media p. 34 Delay and Loss in Packet-Switched Networks p. 38 Types of Delay p. 38 Protocol Layers and Their Service Models p. 44 Layered Architecture p. 45 The Internet Protocol Stack p. 49 Network Entities and Layers p. 53 Internet Backbones, NAPs, and ISPs p. 53 A Brief History of Computer Networking and the Internet p. 56 Development and Demonstration of Early Packet Switching Principles: p. 56 Internetworking, and New and Proprietary Networks: p. 57 A Proliferation of Networks: p. 60 Commercialization and the Web: The 1990s p. 61 Summary p. 62 Homework Problems and Questions p. 64 Problems p. 66 Discussion Questions p. 68 Interview: Leonard Kleinrock p. 70 Application Layer p. 72 Principles of Application Layer Protocols p. 72 Application-Layer Protocols p. 73 What Services Does an Application Need? p. 78 Services Provided by the Internet Transport Protocols p. 80 Network Applications Covered in this Book p. 83 The World Wide Web: HTTP p. 84
2 Overview of HTTP p. 85 Nonpersistent and Persistent Connections p. 87 HTTP Message Format p. 90 User-Server Interaction: Authentication and Cookies p. 94 The Conditional GET p. 96 Web Caches p. 97 File Transfer: FTP p. 104 FTP Commands and Replies p. 105 Electronic Mail in the Internet p. 106 SMTP p. 109 Comparison with HTTP p. 111 Mail Message Formats and MIME p. 112 Mail Access Protocols p. 118 Continuous Media p. 123 DNS--The Internet's Directory Service p. 124 Services Provided by DNS p. 124 Overview of How DNS Works p. 127 DNS Records p. 132 DNS Messages p. 134 Socket Programming with TCP p. 136 Socket Programming with TCP p. 137 An Example Client/Server Application in Java p. 139 Socket Programming with UDP p. 146 Building a Simple Web Server p. 154 Web Server Functions p. 154 Summary p. 158 Homework Problems and Questions p. 159 Problems p. 161 Discussion Questions p. 162 Programming Assignments p. 163 Interview: Tim Berners-Lee p. 165 Transport Layer p. 167 Transport-Layer Services and Principles p. 167 Relationship between Transport and Network Layers p. 169 Overview of the Transport Layer in the Internet p. 171 Multiplexing and Demultiplexing Applications p. 172 Connectionless Transport: UDP p. 177 UDP Segment Structure p. 180 UDP Checksum p. 181 Principles of Reliable Data Transfer p. 182 Building a Reliable Data Transfer Protocol p. 184
3 Pipelined Reliable Data Transfer Protocols p. 193 Go-Back-N (GBN) p. 196 Selective Repeat (SR) p. 201 Connection-Oriented Transport: TCP p. 207 The TCP Connection p. 207 TCP Segment Structure p. 210 Sequence Numbers and Acknowledgment Numbers p. 211 Telnet: A Case Study for Sequence and Acknowledgment Numbers p. 213 Reliable Data Transfer p. 215 Flow Control p. 221 Round Trip Time and Timeout p. 224 TCP Connection Management p. 226 Principles of Congestion Control p. 231 The Causes and the Costs of Congestion p. 231 Approaches toward Congestion Control p. 237 ATM ABR Congestion Control p. 239 TCP Congestion Control p. 240 Overview of TCP Congestion Control p. 241 Modeling Latency: Static Congestion Window p. 249 Modeling Latency: Dynamic Congestion Window p. 253 Summary p. 258 Homework Problems and Questions p. 260 Problems p. 261 Discussion Question p. 268 Programming Assignment p. 268 Interview: Sally Floyd p. 269 Network Layer and Routing p. 271 Introduction and Network Service Models p. 271 Network Service Model p. 273 Origins of Datagram and Virtual Circuit Service p. 279 Routing Principles p. 280 A Link State Routing Algorithm p. 282 A Distance Vector Routing Algorithm p. 286 Other Routing Algorithms p. 295 Hierarchical Routing p. 297 Internet Protocol p. 300 IPv1 Addressing p. 302 Transporting a Datagram from Source to Destination: Addressing and Routing p. 310 Datagram Format p. 314 IP Fragmentation and Reassembly p. 317 ICMP: Internet Control Message Protocol p. 319
4 Routing in the Internet p. 321 Intra-Autonomous System Routing in the Internet p. 322 Inter-Autonomous System Routing p. 329 What's Inside a Router? p. 332 Input Ports p. 333 Switching Fabrics p. 336 Output Ports p. 338 Where Does Queuing Occur? p. 338 IPv6 p. 341 IPv6 Packet Format p. 342 Transitioning from IPv4 to IPv6 p. 345 Multicast Routing p. 348 Introduction: The Internet Multicast Abstraction and Multicast Groups p. 348 The IGMP Protocol p. 350 Multicast Routing: The General Case p. 355 Multicast Routing in the Internet p. 362 Summary p. 367 Homework Problems and Questions p. 368 Problems p. 370 Discussion Questions p. 374 Programming Assignment p. 375 Interview: Jose Joaquin Garcia-Luna-Aceves p. 377 Link Layer and Local Area Networks p. 379 The Data Link Layer: Introduction, Services p. 379 The Services Provided by the Link Layer p. 380 Adapters Communicating p. 383 Error Detection and Correction Techniques p. 385 Parity Checks p. 386 Checksumming Methods p. 389 Cyclic Redundancy Check (CRC) p. 389 Multiple Access Protocols and LANs p. 391 Channel Partitioning Protocols p. 394 Random Access Protocols p. 398 Taking-Turns Protocols p. 406 Local Area Networks (LANs) p. 407 LAN Addresses and ARP p. 409 LAN Addresses p. 409 Address Resolution Protocol p. 411 Ethernet p. 415 Ethernet Basics p. 417 CSMA/CD: Ethernet's Multiple Access Protocol p. 421
5 Ethernet Technologies p. 423 Hubs, Bridges, and Switches p. 427 Hubs p. 427 Bridges p. 429 Switches p. 437 IEEE LANs p LAN Architecture p Media Access Protocols p. 442 PPP: The Point-to-Point Protocol p. 447 PPP Data Framing p. 449 PPP Link Control Protocol (LCP) and Network Control Protocols p. 451 Asynchronous Transfer Mode (ATM) p. 453 Principle Characteristics of ATM p. 454 ATM Physical Layer p. 456 ATM Layer p. 458 ATM Adaptation Layer p. 459 IP Over ATM p. 461 ARP and ATM p. 464 X.25 and Frame Relay p. 465 A Few Words About X.25 p. 466 Frame Relay p. 467 Summary p. 471 Homework Problems and Questions p. 472 Problems p. 474 Discussion Questions p. 480 Interview: Robert Metcalfe p. 481 Multimedia Networking p. 483 Multimedia Networking Applications p. 484 Examples of Multimedia Applications p. 484 Hurdles for Multimedia in Today's Internet p. 487 How Should the Internet Evolve to Better Support Multimedia? p. 488 Audio and Video Compression p. 489 Streaming Stored Audio and Video p. 491 Accessing Audio and Video from a Web Server p. 493 Sending Multimedia from a Streaming Server to a Helper Application p. 495 Real Time Streaming Protocol (RTSP) p. 497 Making the Best of the Best-Effort Service: An Internet Phone Example p. 501 The Limitations of a Best-Effort Service p. 501 Removing Jitter at the Receiver for Audio p. 503 Recovering from Packet Loss p. 506 Streaming Stored Audio and Video p. 510
6 RTP p. 510 RTP Basics p. 510 RTP Packet Header Fields p. 513 RTP Control Protocol (RTCP) p. 514 H.323 p. 517 Beyond Best-Effort p. 522 Scenario 1: A 1 Mbps Audio Application and an FTP Transfer p. 523 Scenario 2: A 1 Mbps Audio Application and a High Priority FTP Transfer p. 524 Secnario 3: A Misbehaving Audio Application and an FTP Transfer p. 525 Scenario 4: Two 1 Mbps Audio Applications Over an Overloaded 1.5 Mbps Link p. 526 Scheduling and Policing Mechanisms p. 528 Scheduling Mechanisms p. 528 Policing: The Leaky Bucket p. 533 Integrated Services p. 536 Guaranteed Quality of Service p. 538 Controlled-Load Network Service p. 539 RSVP p. 539 The Essence of RSVP p. 540 A Few Simple Examples p. 542 Path Messages p. 544 Reservation Styles p. 544 Transport of Reservation Messages p. 548 Differentiated Services p. 549 Differentiated Services: A Simple Scenario p. 550 Traffic Classification and Conditioning p. 552 Per-Hop Behavior p. 554 A Beginning p. 556 Summary p. 556 Homework Problems and Questions p. 558 Problems p. 559 Discussion Questions p. 561 Interview: Henning Schulzrinne p. 563 Security in Computer Networks p. 565 What is Network Security? p. 565 Secure Communication p. 565 Network Security Considerations in the Internet p. 567 Principles of Cryptography p. 569 Symmetric Key Cryptography p. 571 Public Key Encryption p. 575 Authentication: Who are You? p. 581 Authentication Protocol ap1.0 p. 581
7 Authentication Protocol ap2.0 p. 582 Authentication Protocol ap3.0 p. 583 Authentication Protocol ap3.1 p. 583 Authentication Protocol ap4.0 p. 584 Authentication Protocol ap5.0 p. 586 Integrity p. 588 Generating Digital Signatures p. 589 Message Digests p. 590 Hash Function Algorithms p. 593 Key Distribution and Certification p. 595 The Key Distribution Center p. 595 Public Key Certification p. 598 Secure p. 602 Principles of Secure p. 603 PGP p. 605 Internet Commerce p. 608 Internet Commerce Using SSL p. 609 Internet Commerce Using SET p. 613 Network Layer Security: IPsec p. 616 Authentication Header (AH) Protocol p. 617 The ESP Protocol p. 618 SA and Key Management p. 619 Summary p. 620 Homework Problems and Questions p. 621 Problems p. 622 Discussion Questions p. 623 Interview: Philip Zimmermann p. 624 Network Management p. 626 What Is Network Management? p. 626 The Infrastructure for Network Management p. 631 The Internet Network-Management Framework p. 634 Structure of Management Information: SMI p. 635 Management Information Base: MIB p. 638 SNMP Protocol Operations and Transport Mappings p. 641 Security and Administration p. 644 ASN.1 p. 648 Firewalls p. 653 Packet Filtering p. 654 Application Gateways p. 655 Summary p. 657 Homework Problems and Questions p. 658
8 Problems p. 659 Discussion Questions p. 659 Interview: Jeff Case p. 660 References p. 663 Index p. 689 Table of Contents provided by Blackwell's Book Services and R.R. Bowker. Used with permission.
;. ' ;. - ' Computer Networking. ^4 Top-Down Approach. James F. Kurose. Keith W. Ross. Polytechnic University, Brooklyn PEARSON.
;. ' ;. - ' Computer Networking ^4 Top-Down Approach James F. Kurose University of Massachusetts, Amherst Keith W. Ross Polytechnic University, Brooklyn PEARSON Addison Weslev Boston San Francisco N e
More informationAddress Resolution Protocol (ARP)
Address Resolution Protocol (ARP) Question: how do packets actually get to their destination? IP routing tables: based on network addresses Ethernet physical interfaces only understand ethernet addresses
More informationTransport and Network Layer
Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a
More information10CS64: COMPUTER NETWORKS - II
QUESTION BANK 10CS64: COMPUTER NETWORKS - II Part A Unit 1 & 2: Packet-Switching Networks 1 and Packet-Switching Networks 2 1. Mention different types of network services? Explain the same. 2. Difference
More informationChapter 1: Introduction
Course Summary What have we learned: a huge amount! principles practice.. using Internet to motivate examples 1 Chapter 1: Introduction Our goal: get feel and terminology more depth, detail later in course
More informationEthernet. Ethernet. Network Devices
Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking
More informationComputer Networks. A Top-Down Approach. Behrouz A. Forouzan. and. Firouz Mosharraf. \Connect Mc \ Learn. Hill
Computer Networks A Top-Down Approach Behrouz A. Forouzan and Firouz Mosharraf \Connect Mc \ Learn Graw I Succeed* Hill Preface xvii Trademarks xxiii Chapter 1 Introduction 1 1.1 OVERVIEW OF THE INTERNET
More informationReview: Lecture 1 - Internet History
Review: Lecture 1 - Internet History late 60's ARPANET, NCP 1977 first internet 1980's The Internet collection of networks communicating using the TCP/IP protocols 1 Review: Lecture 1 - Administration
More informationICTTEN8195B Evaluate and apply network security
ICTTEN8195B Evaluate and apply network security Release 1 ICTTEN8195B Evaluate and apply network security Modification History Release Release 2 Comments This version first released with ICT10 Integrated
More informationComputer Networks CS321
Computer Networks CS321 Dr. Ramana I.I.T Jodhpur Dr. Ramana ( I.I.T Jodhpur ) Computer Networks CS321 1 / 22 Outline of the Lectures 1 Introduction OSI Reference Model Internet Protocol Performance Metrics
More informationPART-A Questions. 9. What are the two parts of message inside the envelope?
PART-A Questions 1. Differentiate between internet and intranet. 2. What are the two types of spread spectrum? 3. Define hamming distance. 4. What are carrier sense protocols? 5. What are the two types
More informationProtocol Specification & Design. The Internet and its Protocols. Course Outline (trivia) Introduction to the Subject Teaching Methods
The Internet and its Protocols Protocol Specification & Design Robert Elz kre@munnari.oz.au kre@coe.psu.ac.th http://fivedots.coe.psu.ac.th/~kre/ Friday: 13:30-15:00 (Rm: 101)???: xx:x0-xx:x0 (Rm:???)
More informationAsynchronous Transfer Mode: ATM. ATM architecture. ATM: network or link layer? ATM Adaptation Layer (AAL)
Asynchrous Transfer Mode: architecture 1980s/1990 s standard for high-speed (155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture Goal: integrated, end-end transport
More informationCourse Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.
Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols
More informationChapter 1: Introduction
Course Summary What have we learned: a huge amount! principles practice.. using Internet to motivate examples 1 Chapter 1: Introduction Our goal: get feel and terminology more depth, detail later in course
More informationNote! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages
Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages
More informationNortel - 920-803. Technology Standards and Protocol for IP Telephony Solutions
1 Nortel - 920-803 Technology Standards and Protocol for IP Telephony Solutions QUESTION: 1 To achieve the QoS necessary to deliver voice between two points on a Frame Relay network, which two items are
More informationCS 5480 Computer Networks
CS 5480 Computer Networks Professor Sneha Kumar Kasera School of Computing 1 My Background PhD - Computer Science dept, UMass Amherst (1999) Bell Labs research (1999 2003) research interests computer networks
More informationEITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst
EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst Data communication in reality In reality, the source and destination hosts are very seldom on the same network, for
More informationCALIFORNIA STATE UNIVERSITY CHANNEL ISLANDS COURSE MODIFICATION PROPOSAL
CALIFORNIA STATE UNIVERSITY CHANNEL ISLANDS COURSE MODIFICATION PROPOSAL Courses must be submitted by October 15, 2013, and finalized by the end of the fall semester to make the next catalog (2014-15)
More informationIP - The Internet Protocol
Orientation IP - The Internet Protocol IP (Internet Protocol) is a Network Layer Protocol. IP s current version is Version 4 (IPv4). It is specified in RFC 891. TCP UDP Transport Layer ICMP IP IGMP Network
More informationCDA 4504 -- Introduction to Computer Networks
CDA 4504 -- Introduction to Computer Networks [Description] [Prereqs] [Textbooks] [Contents] [Slides] [Assignments] [Grading] [Admin Info] [Submission] [Academic Integrity] Course Description and Goals
More informationHow To Understand And Understand Network Theory
University of Southern California Course Title: EE450: Computer Networks Semester: Fall Semester 2014 Instructor: Professor A. Zahid, azahid@usc.edu Office: PHE 418, 213-740-9058 Office Hours: TTH 9:00
More informationIndian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology
Indian Institute of Technology Kharagpur TCP/IP Part I Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology Kharagpur Lecture 3: TCP/IP Part I On completion, the student
More informationInternet Protocol: IP packet headers. vendredi 18 octobre 13
Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)
More informationPrefix COMP Course# 429 Title Computer Networks Units (3) 3 hours lecture per week 3 hours lecture per week
CALIFORNIA STATE UNIVERSITY CHANNEL ISLANDS COURSE MODIFICATION PROPOSAL Courses must be submitted by October 15, 2010, to make the next catalog (2011-12) production DATE (CHANGE DATE EACH TIME REVISED):
More informationProtocols and Architecture. Protocol Architecture.
Protocols and Architecture Protocol Architecture. Layered structure of hardware and software to support exchange of data between systems/distributed applications Set of rules for transmission of data between
More information920-803 - technology standards and protocol for ip telephony solutions
920-803 - technology standards and protocol for ip telephony solutions 1. Which CODEC delivers the greatest compression? A. B. 711 C. D. 723.1 E. F. 726 G. H. 729 I. J. 729A Answer: C 2. To achieve the
More informationGuide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols
Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among various
More informationData Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles.
Data Networking and Architecture The course focuses on theoretical principles and practical implementation of selected Data Networking protocols and standards. Physical network architecture is described
More informationCMPSCI 453 Computer Networking. Professor V. Arun Department of Computer Science University of Massachusetts Amherst
CMPSCI 453 Computer Networking Professor V. Arun Department of Computer Science University of Massachusetts Amherst 1 What is this course about? introductory (first) course in computer networking q learn
More informationIP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life
Overview Dipl.-Ing. Peter Schrotter Institute of Communication Networks and Satellite Communications Graz University of Technology, Austria Fundamentals of Communicating over the Network Application Layer
More informationOverview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP
Overview Securing TCP/IP Chapter 6 TCP/IP Open Systems Interconnection Model Anatomy of a Packet Internet Protocol Security (IPSec) Web Security (HTTP over TLS, Secure-HTTP) Lecturer: Pei-yih Ting 1 2
More informationFinal for ECE374 05/06/13 Solution!!
1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -
More informationSecurity in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity
Basic Security Requirements and Techniques Confidentiality The property that stored or transmitted information cannot be read or altered by an unauthorized party Integrity The property that any alteration
More informationQuality of Service in the Internet. QoS Parameters. Keeping the QoS. Traffic Shaping: Leaky Bucket Algorithm
Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:
More informationNetwork Simulation Traffic, Paths and Impairment
Network Simulation Traffic, Paths and Impairment Summary Network simulation software and hardware appliances can emulate networks and network hardware. Wide Area Network (WAN) emulation, by simulating
More informationPost-Class Quiz: Telecommunication & Network Security Domain
1. What type of network is more likely to include Frame Relay, Switched Multi-megabit Data Services (SMDS), and X.25? A. Local area network (LAN) B. Wide area network (WAN) C. Intranet D. Internet 2. Which
More informationSSVP SIP School VoIP Professional Certification
SSVP SIP School VoIP Professional Certification Exam Objectives The SSVP exam is designed to test your skills and knowledge on the basics of Networking and Voice over IP. Everything that you need to cover
More informationInternet Control Protocols Reading: Chapter 3
Internet Control Protocols Reading: Chapter 3 ARP - RFC 826, STD 37 DHCP - RFC 2131 ICMP - RFC 0792, STD 05 1 Goals of Today s Lecture Bootstrapping an end host Learning its own configuration parameters
More informationSSVVP SIP School VVoIP Professional Certification
SSVVP SIP School VVoIP Professional Certification Exam Objectives The SSVVP exam is designed to test your skills and knowledge on the basics of Networking, Voice over IP and Video over IP. Everything that
More informationAdvanced Higher Computing. Computer Networks. Homework Sheets
Advanced Higher Computing Computer Networks Homework Sheets Topic : Network Protocols and Standards. Name the organisation responsible for setting international standards and explain why network standards
More informationInterconnection of Heterogeneous Networks. Internetworking. Service model. Addressing Address mapping Automatic host configuration
Interconnection of Heterogeneous Networks Internetworking Service model Addressing Address mapping Automatic host configuration Wireless LAN network@home outer Ethernet PPS Internet-Praktikum Internetworking
More information1 Introduction: Network Applications
1 Introduction: Network Applications Some Network Apps E-mail Web Instant messaging Remote login P2P file sharing Multi-user network games Streaming stored video clips Internet telephone Real-time video
More informationChapter 32 Internet Security
Chapter 32 Internet Security Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 32: Outline 32.1 NETWORK-LAYER SECURITY 32.2 TRANSPORT-LAYER SECURITY 32.3
More information21.4 Network Address Translation (NAT) 21.4.1 NAT concept
21.4 Network Address Translation (NAT) This section explains Network Address Translation (NAT). NAT is also known as IP masquerading. It provides a mapping between internal IP addresses and officially
More informationThe Internet. Internet Technologies and Applications
The Internet Internet Technologies and Applications Aim and Contents Aim: Review the main concepts and technologies used in the Internet Describe the real structure of the Internet today Contents: Internetworking
More informationUnderstanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX
APPENDIX A Introduction Understanding TCP/IP To fully understand the architecture of Cisco Centri Firewall, you need to understand the TCP/IP architecture on which the Internet is based. This appendix
More informationLinux Network Security
Linux Network Security Course ID SEC220 Course Description This extremely popular class focuses on network security, and makes an excellent companion class to the GL550: Host Security course. Protocols
More informationOverview of TCP/IP. TCP/IP and Internet
Overview of TCP/IP System Administrators and network administrators Why networking - communication Why TCP/IP Provides interoperable communications between all types of hardware and all kinds of operating
More informationProtocols. Packets. What's in an IP packet
Protocols Precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet Protocol (bottom level) all packets shipped from network to network as IP packets
More informationIntroduction to TCP/IP
Introduction to TCP/IP Raj Jain The Ohio State University Columbus, OH 43210 Nayna Networks Milpitas, CA 95035 Email: Jain@ACM.Org http://www.cis.ohio-state.edu/~jain/ 1 Overview! Internetworking Protocol
More informationObjectives of Lecture. Network Architecture. Protocols. Contents
Objectives of Lecture Network Architecture Show how network architecture can be understood using a layered approach. Introduce the OSI seven layer reference model. Introduce the concepts of internetworking
More informationNetwork-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2
Network-Oriented Software Development Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2 Topics Layering TCP/IP Layering Internet addresses and port numbers Encapsulation
More informationData Communication Networks and Converged Networks
Data Communication Networks and Converged Networks The OSI Model and Encapsulation Layer traversal through networks Protocol Stacks Converged Data/Telecommunication Networks From Telecom to Datacom, Asynchronous
More informationTCP/IP, Addressing and Services
TCP/IP, Addressing and Services S. Hussain Ali M.S. (Computer Engineering) Department of Computer Engineering King Fahd University of Petroleum and Minerals Dhahran, Saudi Arabia 1 Topics Covered in this
More informationNetworking 4 Voice and Video over IP (VVoIP)
Networking 4 Voice and Video over IP (VVoIP) Course Objectives This course will give delegates a good understanding of LANs, WANs and VVoIP (Voice and Video over IP). It is aimed at those who want to move
More informationNetwork Programming TDC 561
Network Programming TDC 561 Lecture # 1 Dr. Ehab S. Al-Shaer School of Computer Science & Telecommunication DePaul University Chicago, IL 1 Network Programming Goals of this Course: Studying, evaluating
More informationCSIS 3230. CSIS 3230 Spring 2012. Networking, its all about the apps! Apps on the Edge. Application Architectures. Pure P2P Architecture
Networking, its all about the apps! CSIS 3230 Chapter 2: Layer Concepts Chapter 5.4: Link Layer Addressing Networks exist to support apps Web Social ing Multimedia Communications Email File transfer Remote
More informationNetwork Layer: Network Layer and IP Protocol
1 Network Layer: Network Layer and IP Protocol Required reading: Garcia 7.3.3, 8.1, 8.2.1 CSE 3213, Winter 2010 Instructor: N. Vlajic 2 1. Introduction 2. Router Architecture 3. Network Layer Protocols
More informationEncapsulating Voice in IP Packets
Encapsulating Voice in IP Packets Major VoIP Protocols This topic defines the major VoIP protocols and matches them with the seven layers of the OSI model. Major VoIP Protocols 15 The major VoIP protocols
More informationMultimedia Networking and Network Security
CMPT371 12-1 Multimedia Networking and Network Security 1 Multimedia Networking and Network Security This note is based on Chapters 7 and 8 of the text book. Outline of multimedia networking Multimedia
More informationChapter 9. IP Secure
Chapter 9 IP Secure 1 Network architecture is usually explained as a stack of different layers. Figure 1 explains the OSI (Open System Interconnect) model stack and IP (Internet Protocol) model stack.
More informationHow To Understand The Layered Architecture Of A Network
COMPUTER NETWORKS NETWORK ARCHITECTURE AND PROTOCOLS The Need for Standards Computers have different architectures, store data in different formats and communicate at different rates Agreeing on a particular
More informationCSE 3461 / 5461: Computer Networking & Internet Technologies
Autumn Semester 2014 CSE 3461 / 5461: Computer Networking & Internet Technologies Instructor: Prof. Kannan Srinivasan 08/28/2014 Announcement Drop before Friday evening! k. srinivasan Presentation A 2
More informationInternetworking. Problem: There is more than one network (heterogeneity & scale)
Internetworking Problem: There is more than one network (heterogeneity & scale) Hongwei Zhang http://www.cs.wayne.edu/~hzhang Internetworking: Internet Protocol (IP) Routing and scalability Group Communication
More informationHow To Design A Layered Network In A Computer Network
A Layered Approach to Computer Networks Physical Layer Data Link Layer Network Layer Transport Layer Session Layer Presentation Layer Application Layer Different layer of abstraction Different error control
More informationNetwork Models and Protocols
669-5ch01.fm Page 1 Friday, April 12, 2002 2:01 PM C H A P T E R Network Models and Protocols 1 EXAM OBJECTIVES 1.1 Layered Network Models 1.2 The Layers of the TCP/IP 5-Layer Model 1.3 Network Protocols
More informationNetwork layer: Overview. Network layer functions IP Routing and forwarding
Network layer: Overview Network layer functions IP Routing and forwarding 1 Network layer functions Transport packet from sending to receiving hosts Network layer protocols in every host, router application
More informationChapter 10. Network Security
Chapter 10 Network Security 10.1. Chapter 10: Outline 10.1 INTRODUCTION 10.2 CONFIDENTIALITY 10.3 OTHER ASPECTS OF SECURITY 10.4 INTERNET SECURITY 10.5 FIREWALLS 10.2 Chapter 10: Objective We introduce
More informationLink Layer. 5.6 Hubs and switches 5.7 PPP 5.8 Link Virtualization: ATM and MPLS
Link Layer 5.1 Introduction and services 5.2 Error detection and correction 5.3Multiple access protocols 5.4 Link-Layer Addressing 5.5 Ethernet 5.6 Hubs and switches 5.7 PPP 5.8 Link Virtualization: and
More informationChapter 11. User Datagram Protocol (UDP)
Chapter 11 User Datagram Protocol (UDP) The McGraw-Hill Companies, Inc., 2000 1 CONTENTS PROCESS-TO-PROCESS COMMUNICATION USER DATAGRAM CHECKSUM UDP OPERATION USE OF UDP UDP PACKAGE The McGraw-Hill Companies,
More information8.2 The Internet Protocol
TCP/IP Protocol Suite HTTP SMTP DNS RTP Distributed applications Reliable stream service TCP UDP User datagram service Best-effort connectionless packet transfer Network Interface 1 IP Network Interface
More informationIT4504 - Data Communication and Networks (Optional)
- Data Communication and Networks (Optional) INTRODUCTION This is one of the optional courses designed for Semester 4 of the Bachelor of Information Technology Degree program. This course on Data Communication
More informationBasic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet
Basic Networking Concepts 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet 1 1. Introduction -A network can be defined as a group of computers and other devices connected
More informationHow To Use A Network Over The Internet (Networking) With A Network (Netware) And A Network On A Computer (Network)
1 TCP Transmission Control Protocol, is a connection based Internet protocol responsible for breaking data into packets to send over a network using IP (internet protocol) IP works at the TCP/IP Internet
More information1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet
Review questions 1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet C Media access method D Packages 2 To which TCP/IP architecture layer
More informationRaritan Valley Community College Academic Course Outline. CISY 253 - Advanced Computer Networking
Raritan Valley Community College Academic Course Outline CISY 253 - Advanced Computer Networking I. Basic Course Information A. Course number and Title: CISY 253- Advanced Computer Networking (TCP/IP)
More informationIntroduction to IP networking
DD2395 p2 2011 Introduction to IP networking Olof Hagsand KTH CSC 1 Example: Packet transfer www.server.org An end host requests a web-page from a server via a local-area network The aim of this lecture
More informationUser Datagram Protocol - Wikipedia, the free encyclopedia
Página 1 de 6 User Datagram Protocol From Wikipedia, the free encyclopedia User Datagram Protocol (UDP) is one of the core protocols of the Internet protocol suite. Using UDP, programs on networked computers
More informationEDA 1200 4.3 Training Programs. Catalog of Course Descriptions
EDA 1200 4.3 Training Programs Catalog of Course Descriptions Catalog of Course Descriptions INTRODUCTION...3 ACCESS NETWORKS, AN OVERVIEW...4 CORE NETWORKS, AN OVERVIEW...6 EDA 1200 4.3 INSTALLATION AND
More informationNote! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages
Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages
More informationProtocol Architecture. ATM architecture
Asynchronous Transfer Mode (ATM) Asynchronous Transfer Mode: ATM 1990 s/00 standard for high-speed (155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture Goal: integrated,
More informationCorso di Network Security a.a. 2012/2013. Collection of some exercises on the second part of the course
University of Parma Department of Information Engineering Corso di Network Security a.a. 2012/2013 Collection of some exercises on the second part of the course 1) Specify the name of the CHAP messages
More informationZarządzanie sieciami telekomunikacyjnymi
What Is an Internetwork? An internetwork is a collection of individual networks, connected by intermediate networking devices, that functions as a single large network. Internetworking refers to the industry,
More informationModule 7 Internet And Internet Protocol Suite
Module 7 Internet And Internet Protocol Suite Lesson 21 Internet and IPv4 LESSON OBJECTIVE General The lesson will discuss a popular network layer protocol, i.e. the Internet Protocol Specific The focus
More informationQoS Parameters. Quality of Service in the Internet. Traffic Shaping: Congestion Control. Keeping the QoS
Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:
More informationContent Networking Fundamentals
Content Networking Fundamentals Silvano Da Ros Cisco Press 800 East 96th Street Indianapolis, IN 46240 USA X Contents Introduction Part I Overview of Content Networking 3 Chapter 1 Introducing Content
More informationCCNA R&S: Introduction to Networks. Chapter 5: Ethernet
CCNA R&S: Introduction to Networks Chapter 5: Ethernet 5.0.1.1 Introduction The OSI physical layer provides the means to transport the bits that make up a data link layer frame across the network media.
More informationOutline. CSc 466/566. Computer Security. 18 : Network Security Introduction. Network Topology. Network Topology. Christian Collberg
Outline Network Topology CSc 466/566 Computer Security 18 : Network Security Introduction Version: 2012/05/03 13:59:29 Department of Computer Science University of Arizona collberg@gmail.com Copyright
More informationTCP/IP and the Internet
TCP/IP and the Internet Computer networking today is becoming more and more entwined with the internet. By far the most popular protocol set in use is TCP/IP (Transmission Control Protocol/Internet Protocol).
More informationNetworking Test 4 Study Guide
Networking Test 4 Study Guide True/False Indicate whether the statement is true or false. 1. IPX/SPX is considered the protocol suite of the Internet, and it is the most widely used protocol suite in LANs.
More informationNetworking. Systems Design and. Development. CRC Press. Taylor & Francis Croup. Boca Raton London New York. CRC Press is an imprint of the
Networking Systems Design and Development Lee Chao CRC Press Taylor & Francis Croup Boca Raton London New York CRC Press is an imprint of the Taylor & Francis Croup, an Informa business AN AUERBACH BOOK
More informationProtocol Architecture
Protocol Architecture ed Protocol Architectures OSI Reference Model TCP/IP Protocol Stack Need for Protocols The task of exchanging information between devices requires a high degree of cooperation between
More informationQuality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic.
Quality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic. A Network and Data Link Layer infrastructure Design to Improve QoS in Voice and video Traffic Jesús Arturo Pérez,
More informationLecture 28: Internet Protocols
Lecture 28: Internet Protocols 15-110 Principles of Computing, Spring 2016 Dilsun Kaynar, Margaret Reid-Miller, Stephanie Balzer Reminder: Exam 2 Exam 2 will take place next Monday, on April 4. Further
More informationDetailed Table of Contents
Detailed Table of Contents Foreword Preface 1. Networking Protocols and OSI Model 1 1.1 Protocols in Computer Communications 3 1.2 The OSI Model 7 1.3 OSI Layer Functions 11 Summary 19 Key Terms and Concepts
More informationESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK
VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK Contemporary Control Systems, Inc. Understanding Ethernet Switches and Routers This extended article was based on a two-part article that was
More informationRTP / RTCP. Announcements. Today s Lecture. RTP Info RTP (RFC 3550) I. Final Exam study guide online. Signup for project demos
Announcements I. Final Exam study guide online RTP / RTCP Internet Protocols CSC / ECE 573 Fall, 2005 N. C. State University II. III. Signup for project demos Teaching evaluations at end today copyright
More information