Computer Networks. Information. Book. Exam. Notes. Paolo Costa costa. Notes. Notes. Notes.

Size: px
Start display at page:

Download "Computer Networks. Information. Book. Exam. Notes. Paolo Costa costa@cs.vu.nl http://www.cs.vu.nl/ costa. Notes. Notes. Notes."

Transcription

1 Computer Networks Introduction Paolo Costa costa Vrije Universiteit Amsterdam Paolo Costa Introduction 1 / 71 (Version April 3, 2008) Information Instructor Paolo Costa costa@cs.vu.nl Office: P-456 (by appointment) Website: calendar (check) slides (available few days before the class) additional material (not for credit) Blackboard (Only for announcements) you are responsible for reading the announcements page Paolo Costa Introduction Course Information 2 / 71 Book Andrew S. Tanenbaum Computer Networks (4 th Edition), 2003 Prentice Hall You are not expected to learn all minor details You can find a detailed specification here ~costa/cn/topics.html Paolo Costa Introduction Course Information 3 / 71 Exam Written test available also in Dutch :) no midterm exams Schedule (tentative) last week of June (just after the end of the course) end of August The exam is scheduled in the week following the last class little time to study study the material as we go Previous exams are available on the course website most including solutions Paolo Costa Introduction Course Information 4 / 71

2 Why Computer Networks? Computer networks are becoming pervasive Virtually all software is networked every developer must know the basis of networking Internet is used daily by milions (if not billions of people) Web Chat Skype Movies / MP3s... and it is getting bigger and bigger Question How old is Internet? Paolo Costa Introduction Motivation 5 / 71 Internet Evolution September 1969 Paolo Costa Introduction Motivation 6 / 71 Internet Evolution December 1969 Paolo Costa Introduction Motivation 7 / 71 Internet Evolution 1971 Paolo Costa Introduction Motivation 8 / 71

3 Internet Evolution 1980 Paolo Costa Introduction Motivation 9 / 71 Internet Evolution 1986 Paolo Costa Introduction Motivation 10 / 71 Internet Evolution 2005 Paolo Costa Introduction Motivation 11 / 71 Internet Evolution Paolo Costa Introduction Motivation 12 / 71

4 Beyond Internet Mobile (smart-)phones Wi-fi Home Internet Public Hotspots Radio / TV Broadcast Cable TV Satellite Personal Networks Bluetooth Healthcare / Fitness Home Networks Mediacenter Paolo Costa Introduction Motivation 13 / 71 The Future (?) Wireless Sensor Networks Sensor devices can: measure compute communicate act Applications Embedded computing Environmental monitoring Ambient intelligence Paolo Costa Introduction Motivation 14 / 71 The Future (?) Vehicular Networks All vehicles are likely to be equipped with a navigation system in the near future (virtually) unlimited power (virtually) unlimited storage wireless antenna Multi-hop communication to detect: traffic jams car accidents fuel prices parking slots dots Paolo Costa Introduction Motivation 15 / 71 Example Accessing a Web Server GET / costa/cn/cn_01.pdf GET / costa/ HTTP/1.1 HTTP/1.1 Host: Host: web browser web server HTTP/ OK HTTP/ OK <html><head>... </head><body> Application Protocol Paolo Costa Introduction Motivation 16 / 71

5 Example Streams or Packets? web browser web server Transport Protocol Paolo Costa Introduction Motivation 17 / 71 Example Interconnections and Paths web browser web server Network Protocol Paolo Costa Introduction Motivation 18 / 71 Example Communication Links Various types and forms of medium: Fiber-optic cable Twisted-pair copper wire Coaxial cable Wireless local-area links (e.g., , Bluetooth) Satellite channel... Physical& Data Link Protocol Paolo Costa Introduction Motivation 19 / 71 Example Communication Security Communication model: Alice sends a message m to Bob m Alice Bob Eve Passive adversary can read the message Active adversary can modify the message Paolo Costa Introduction Motivation 20 / 71

6 Program (1) Introduction [3 hours] the course in one lecture: a tour of all the topics of the course through an end-to-end scenario the layered architecture what is a protocol basic network services: connection-oriented and connectionless service; packet switching vs. circuit switching a bit of an historical perspective Physical Layer [3 hours] Transmitting signals Nyquist & Shannon Copper wires Optical fibers Wireless transmission Satellite ADSL GSM Paolo Costa Introduction Program 21 / 71 Program (2) Data Link Layer [6 hours] Error control PPP ALOHA Ethernet Wi-fi (IEEE ) WiMax Bluetooth Network layer [4 hours] forwarding and routing for datagram and virtual-circuit services general router architecture: interfaces, switching fabric, queues IP: header formats (IPv4 and IPv6), addressing, extensions, fragmentation, IP forwarding Routing algorithms and principles: link-state and distance vector routing, hierarchical routing IP Routing: OSPF, RIP, BGP IP multicast Paolo Costa Introduction Program 22 / 71 Program (3) Transport layer [4 hours] multiplexing/demultiplexing UDP: connectionless transport protocols principles of reliable data transfer principles of congestion control TCP: header format, reliability features, congestion-control features. Application layer [2 hours] the application interface: OS primitives a simple client/server program the Web: HTTP; web caching transfer protocol (SMTP); access protocols (POP and IMAP); message format (MIME) DNS Paolo Costa Introduction Program 23 / 71 Program (4) Network Security [2 hours] Cryptography Digital Signatures Public Key IPSec Firewall VPN SSL Peer-to-peer protocols [2 hours] Napster Gnutella BitTorrent Freenet Kademlia Skype Paolo Costa Introduction Program 24 / 71

7 Schedule Calendar Date Room Topic Friday, 4 th April Friday, 11 th April Wednesday, 23 rd April Friday, 25 th April Wednesday, 7 th May Friday, 9 th May Wednesday, 14 th May Friday, 16 th May Wednesday, 4 th June Friday, 6 th June Wednesday, 11 th June Friday, 13 th June Wednesday, 18 th June Friday, 20 th June Introduction Physical Layer Physical Layer Data Link Layer Data Link Layer MAC Sub-Layer Network Layer Network Layer Transport Layer Transport Layer Application Layer Network Security Peer-to-peer Questions & Answers Attention Periodically check the website for up-to-date information Paolo Costa Introduction Program 25 / 71 Overview Hardware Talk just a bit about how you can configure a bunch of computers into a network Local Area Networks (LAN) Metropolitan Area Networks (MAN) Wide Area Networks (WAN) Internetworks Software This is what actually makes computer networks not the hardware! Protocols: describe how two communicating parties exchange information. Services: describe what a network offers to parties that want to communicate. Interfaces: describe how a client can make use of network services, i.e. how the services can be accessed. Reference models Describe how the OSI and Internet networks are organized. Paolo Costa Introduction Overview 26 / 71 Hardware Broadcast network: a single communication channel is shared by all computers sending a packet implies that all others receive it. Point-to-point network: Computers are connected in pairs sending a packet goes strictly from the sender to the receiver, possibly having to visit intermediate machines (routing). Paolo Costa Introduction Hardware 27 / 71 Local Area Networks Bus-based Apart from scale, LANs distinguish themselves from other networks by (generally) using broadcast technology, and having simple topologies: Type (a) - Bus-based All computers are connected to the same wire. When one of them starts sending, the signal is propagated to all others. If two of them start sending at the same time, packets collide and rubbish is the result. Paolo Costa Introduction Hardware 28 / 71

8 Local Area Networks Token-based Type (b) - Token-based a token (which is just a small packet) continuously circulates along the ring. A sending computer 1 waits until the token passes and removes it 2 sends its packet along the ring, 3 waits until the packet returns 4 reinserts the token. Paolo Costa Introduction Hardware 29 / 71 Metropolitan Area Networks (MAN) A MAN is intended to cover an entire city. A well-known example of a MAN is the cable television network: In essence, the original network was used only for broadcasting radio and TV, but it soon became clear that the infrastructure could be used for two-way data communication as well. Paolo Costa Introduction Hardware 30 / 71 Wide Area Networks (WAN) LANs and MANs (traditionally) didn t have any switching elements: the wire did all the work. This makes them extremely efficient, although harder to scale. Here s where WANs come in. In a WAN, hosts are connected to a subnet, which in turn consists of routers (switching elements) and transmission lines. Routers generally adhere to a store-and-forward principle: incoming packets are first buffered (stored) the router takes a decision on where the packet has to go and forwards the packet across the selected output line. Paolo Costa Introduction Hardware 31 / 71 Wireless Networks In wireless networks, the transmission occurs through unguided media. Distinguish four different categories: System interconnection: Basically for replacing the traditional cables that connect local devices to each other (monitor keyboard mouse..., cordless telephone, stereo components). Wireless LANs: Computers communicate through a (wired) base station that is placed at the ceiling, or directly in a peer-to-peer fashion (e.g., home networks). Wireless MANs: Often in the form of access networks: parts of a city offer a wireless mesh through which routing to a Internet access points take place. Wireless WANs: The digital cellular phone networks fall into this category. New technology is now pushing bandwidth to 50 Mbps over several kilometers. Paolo Costa Introduction Hardware 32 / 71

9 Home Networks Many devices in the same home will be connected to a single network and communicate with each other: Computers Entertainment (audio equipment, game centers) Telecommunications (mobile phones, fax devices, intercom) Appliances (refrigerator, microwave, central heating, lights) Telemetry (alarms, cameras, thermostat) We re heading towards centralized solutions (MS media center). Note the specific requirements: 100% robust very easy to use self-managing high bandwidth Paolo Costa Introduction Hardware 33 / 71 Internetworks The assumption so far is that a network is homogeneous: there is hardly any variation in hardware and software. In practice, large networks can only be constructed by interconnecting different kinds of networks internet(work) Internet is just an instance of internetwork (note the capital / lower cases) Examples: Connecting a collection of different kinds of LANs within a department (combine wired/wireless). Connecting LANs to each other through a WAN (think of enterprise networks for multinationals). The WAN acts as a subnet. Connecting WANs to each other (the Internet). Paolo Costa Introduction Hardware 34 / 71 Basic Concepts The Internet uses packet switching Packet switch: a link-layer switch or a router Communication link: a connection between packet switches and/or end systems Route: sequence of switches that a packet goes through (a.k.a. path) Protocol: control the sending and receiving of information to and from end systems and packet switches Paolo Costa Introduction Hardware 35 / 71 Packet Switching Paolo Costa Introduction Hardware 36 / 71

10 Packet Switching The Internet is a packet-switched network Information is transmitted in packets Switches operate on an individual packet A switch (router) receives packets and forwards them along to other switches or to end systems Every forwarding decision is taken on the basis of the information contained in the packet Paolo Costa Introduction Hardware 37 / 71 Circuit Switching Paolo Costa Introduction Hardware 38 / 71 Circuit Switching The telephone network is a typical circuit-switched network Communication requires a connection setup phase in which the network reserves all the necessary resources for that connection (links, buffers, switches, etc.) After a successful setup, the communicating systems are connected by a set of links that are dedicated to their connection for the entire duration of their conversation When the conversation ends, the network tears down the connection, freeing the corresponding resources (links, buffers, etc.) for other connections Paolo Costa Introduction Hardware 39 / 71 Circuit vs. Packet Switching Circuit switching requires an expensive setup phase however, once the connection is established, little or no processing is required Packet switching does not incur any setup cost. however, it always incurs a significant processing and space overhead, on a per-packet basis processing cost for forwarding space overhead because every packet must be self-contained Paolo Costa Introduction Hardware 40 / 71

11 Circuit vs. Packet Switching (2) Circuit switching admits a straightforward implementation of quality-of-service guarantees network resources are reserved at connection setup time Guaranteeing any quality of service with packet switching is very difficult no concept of a connection and again, processing, space overhead, etc. Paolo Costa Introduction Hardware 41 / 71 Circuit vs. Packet Switching (3) Circuit switching allows only a limited sharing of communication resources once a connection is established, the resources are blocked even though there might be long silence periods i.e., circuit switching is an inefficient way to use the network Packet switching achieves a much better utilization of network resources it is designed specifically to share links Paolo Costa Introduction Hardware 42 / 71 Communication Protocols A protocol is an agreement between the communicating parties on how communication is to proceed. E.g., let s consider a phone call: Alice calls Bob Alice hello Bob hello, this is Alice Alice, what s up? bla, bla... okay, bye bye Paolo Costa Introduction Software 43 / 71 Communication Protocols (2) Phases of the protocol handshake: establishes the identities and/or the context conversation: free-form exchange closing: terminates the conversation This protocol assumes a connection-oriented medium The protocol involves two parties (Alice and Bob)... Paolo Costa Introduction Software 44 / 71

12 Communication Protocols (3) Let s revisit the phone-call protocol Alice hello Bob hello, this is Alice Alice who? sorry, wrong number Paolo Costa Introduction Software 45 / 71 Communication Protocols (4) Another run of the phone-call protocol Alice hello Bob hello? anybody there? Paolo Costa Introduction Software 46 / 71 Communication Protocols: Principles A protocol is a lot like a program in fact, it is a distributed program, where different processes can send messages to each other It is an executable specification It must be unambiguous It must be complete i.e., it must include actions and/or responses for all possible situations and all possible messages A network protocol must also define all the necessary message formats Paolo Costa Introduction Software 47 / 71 Protocol Layering Alice and Bob Alice calls Bob to decide where to go for dinner Alice hello Bob hello, this is Alice Alice, what s up? let s go out to dinner where for dinner protocol... okay, bye bye Paolo Costa Introduction Software 48 / 71

13 Protocol Layering Alice and Bob Alice calls Bob to decide where to go for dinner where for dinner protocol phone call protocol call setup voice over IP... Paolo Costa Introduction Software 49 / 71 Protocol Layering Philosophers Fundamental to all software that makes a computer network run, is the notion of protocol hierarchies: structuring the services that a network must offer in terms of layers. Paolo Costa Introduction Software 50 / 71 Protocol Layering The Concepts Two parties at different sites, but at the same level, always agree on how they will exchange information Example: we all agree to speak English. In order for one party to send and receive information, it can only make use of the communication services offered by the layer directly underneath it. Example: The use of interpreters in negotiations between countries. Services offered by a layer are always fully specified in terms of an interface that makes those services accessible. Example: phones have buttons that allow you to dial a number Example: cars have pedals to control the engine. Paolo Costa Introduction Software 51 / 71 Protocol Layering Example (1) In a protocol stack, Layer k puts its entire packet as data into a Layer k 1 packet; the latter may add a header and/or a trailer. It may occur that Layer k data has to be split across several Layer k 1 packets fragmentation Paolo Costa Introduction Software 52 / 71

14 Protocol Layering Example (2) Paolo Costa Introduction Software 53 / 71 Protocol Layering Design Issues Addressing how to denote the intended recipient Error Control how to detect (and possibly fix) transmission errors Flow Control how to prevent a fast sender from swamping a slow receiver Multiplexing / Demultiplexing how to support multiple communications in parallel Routing how to route packets to the destination Paolo Costa Introduction Software 54 / 71 Services Connections or Not (1/2) (Most) Network layers offer one or both of the following types of services: Connection-oriented This is the telephone model: you first establish a connection, then do a lot communication, and finally release the connection. circuit-switch is a form of connection-oriented protocols Connectionless The postal model: your data is put into some kind of envelope on which the destination address has been written. The envelope + contents is sent to the destination, and that s it. packet-switch is a form of connection-oriented protocols Paolo Costa Introduction Software 55 / 71 Services Connection-oriented protocol Let s consider go back to Alice calls Bob Alice hello Bob hello, this is Alice Alice, what s up? bla, bla... okay, bye bye Paolo Costa Introduction Software 56 / 71

15 Services Connectionless protocol Another example: air traffic control... United 971, turn left heading left to 2-7-0, United Alitalia 631, contact Malpensa approach at Alitalia 631, contact Malpensa approach at point 2-0, Alitalia 631, ciao... Center, request, Delta United 971, climb and maintain flight level flight level 3-7-0, United Delta 800, go ahead requesting flight level 3-5-0, Delta 800 Delta 800, unable at the moment Paolo Costa Introduction Software 57 / 71 Services Connections or Not (2/2) Each service can provide some quality: Is data delivered in the order it was sent? With connections, this is generally the case. Is data transmission reliable? Generally offered with connections, but not always with connectionless services. Reliability requires sending acknowledgments performance may degrade. Paolo Costa Introduction Software 58 / 71 Service Primitives (1/2) A service is specified by means of a set of primitives, also called operations, available to clients. Example of primitives for a simple connection-oriented service: Paolo Costa Introduction Software 59 / 71 Service Primitives (2/2) Server LISTEN RECEIVE SEND DISCONNECT Client CONNECT SEND RECEIVE DISCONNECT Paolo Costa Introduction Software 60 / 71

16 Services vs. Protocols Service: set of primitives that a layer provides to the layer above it. Protocol: set of rules that prescribe the layout and meaning of packets, and often the order in which specific packets should be sent. Note: The same service can be realized by different protocols; each protocol can be implemented differently (using different data structures, programming languages, etc.) Paolo Costa Introduction Software 61 / 71 The OSI Model Note: Knowing the layering by heart is important Paolo Costa Introduction Reference Models 62 / 71 OSI Physical Layer Essence: Describes the transmission of raw bits in terms of mechanical and electrical issues: Example: Connect two computers by means of a wire: Setting -3V on the wire corresponds to a binary 1; +4V is a binary 0 The wire is not to be longer than 15 meters You may change the voltage at most 20,000 times per second Question what s the transfer rate? Paolo Costa Introduction Reference Models 63 / 71 OSI Data Link Layer (1/2) Observation: We need to at least detect bit transmission errors send bits in frames that add redundancy to detect something went wrong Examples: Add a parity bit to every 7 transmitted bits: 1 says there were odd number of 1 s; 0 says there were an even number of 1 s Add a checksum (cyclic redundancy check) that should match the bits before it Also: Provide the mechanisms so that fast senders don t overwhelm slow receivers (flow control) Paolo Costa Introduction Reference Models 64 / 71

17 OSI Data Link Layer (2/2) Observation: We also need to specify how a number of computers can share a common channel (i.e., wire) medium access control sublayer (MAC): Specifies how one out of several competing senders, is eventually allowed exclusive access to the wire Common approach 1: listen to each other; retreat when you hear someone else, and try again later Common approach 2: wait your turn by passing a token between all stations Well-known protocols: Ethernet, token ring, token bus, FDDI Paolo Costa Introduction Reference Models 65 / 71 OSI Network Layer Essence: Describes how routing (and congestion) is to be done. Mostly needed in subnets. How do we find out which computers/routers are in the network? How do we calculate the best route from A to B? What happens when a computer/router goes down? Should multicasting/broadcasting be supported? What happens if a router becomes overloaded and starts dropping packets (congestion)? Can we detect and avoid hot spots? Paolo Costa Introduction Reference Models 66 / 71 OSI Transport Layer Observation: Generally offers connection-oriented as well as connectionless services, and varying degrees of reliability. This layer provides the actual network interface to applications Often provides network interface through sockets (UNIX, Windows) Allows to set up a connection to another application, and subsequently deliver data reliably, and in the order that it was sent Often also support for secure connections Also support for datagrams: unreliable message passing on a per-message basis Paolo Costa Introduction Reference Models 67 / 71 OSI Session and Presentation Layers Session Tells how applications can set up long-lasting communications, for example, allowing a connection to be re-established when suddenly broken (think of downloading large files). Presentation Describes everything that is needed to exchange data in a platform-independent way. Example: think of byte ordering in different computers, or passing binary data through Paolo Costa Introduction Reference Models 68 / 71

18 OSI Application Layer Contains the rest Traditional: Name services (DNS), security, (SMTP), News (NNTP), Web (HTTP) Modern: All types of middleware protocols to support distributed systems: New transfer protocols for object systems like Java (RMI), CORBA (IIOP), DCOM (propriety) Special protocols to handle replication, fault tolerance, caching, data persistence, etc. High-level protocols: Special application-level protocols for e-commerce, banking, EDI, etc. Peer-to-peer protocols: BitTorrent, EMule, Skype,... Paolo Costa Introduction Reference Models 69 / 71 The TCP/IP Model The bad thing is that TCP/IP did not make a clear distinction between services, interfaces, and protocols. That makes it much harder to re-implement certain layers. TCP/IP protocol suite is successful because 1 it was there when needed (OSI implementations were terrible) 2 freely distributed with the UNIX operating system Paolo Costa Introduction Reference Models 70 / 71 Example: The Internet ISP POP NAP Internet Service Provider Point Of Presence interface between telephone system and ISP s network Network Access Point connection point to different backbones Paolo Costa Introduction Reference Models 71 / 71

How To Understand The Internet From A Telephone To A Computer (For A Computer)

How To Understand The Internet From A Telephone To A Computer (For A Computer) Basic Concepts In Computer Networking Antonio Carzaniga Faculty of Informatics University of Lugano September 19, 2014 Goal of this Lecture Understand what packet switching is Understand what circuit switching

More information

EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak

EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak Packet Switching and Computer Networks Switching As computer networks became more pervasive, more and more data and also less voice was transmitted over telephone lines. Circuit Switching The telephone

More information

ELEC3030 Computer Networks

ELEC3030 Computer Networks ELEC3030 Computer Networks Professor Sheng Chen: Building 86, Room 1021 E-mail: sqc@ecs.soton.ac.uk Download lecture slides from: http://www.ecs.soton.ac.uk/ sqc/el336/ or get them from Course Office (ECS

More information

Overview of Network Hardware and Software. CS158a Chris Pollett Jan 29, 2007.

Overview of Network Hardware and Software. CS158a Chris Pollett Jan 29, 2007. Overview of Network Hardware and Software CS158a Chris Pollett Jan 29, 2007. Outline Scales of Networks Protocol Hierarchies Scales of Networks Last day, we talked about broadcast versus point-to-point

More information

Computer Networks Vs. Distributed Systems

Computer Networks Vs. Distributed Systems Computer Networks Vs. Distributed Systems Computer Networks: A computer network is an interconnected collection of autonomous computers able to exchange information. A computer network usually require

More information

Topics. Computer Networks. Let s Get Started! Computer Networks: Our Definition. How are Networks Used by Computers? Computer Network Components

Topics. Computer Networks. Let s Get Started! Computer Networks: Our Definition. How are Networks Used by Computers? Computer Network Components Topics Use of networks Network structure Implementation of networks Computer Networks Introduction Let s Get Started! Networking today: Where are they? Powerful computers are cheap Networks are everywhere

More information

CSMC 417. Computer Networks Prof. Ashok K Agrawala. 2011 Ashok Agrawala. January 11 CMSC417 Set 1 1

CSMC 417. Computer Networks Prof. Ashok K Agrawala. 2011 Ashok Agrawala. January 11 CMSC417 Set 1 1 CSMC 417 Computer Networks Prof. Ashok K Agrawala 2011 Ashok Agrawala 1 General Instructor - Ashok K. Agrawala agrawala@cs.umd.edu 4149 AVW TA - Office Hours Class Meets Tu Th 8:00 9:30 CSIC 3117 2 Prerequisite

More information

8/27/2014. What is a computer network? Introduction. Business Applications (1) Uses of Computer Networks. Business Applications (2)

8/27/2014. What is a computer network? Introduction. Business Applications (1) Uses of Computer Networks. Business Applications (2) What is a computer network? Introduction Chapter 1 A number of separate but interconnected computers A collection of autonomous computers interconnected by a single technology COURSE FOCUS: design and

More information

What is CSG150 about? Fundamentals of Computer Networking. Course Outline. Lecture 1 Outline. Guevara Noubir noubir@ccs.neu.

What is CSG150 about? Fundamentals of Computer Networking. Course Outline. Lecture 1 Outline. Guevara Noubir noubir@ccs.neu. What is CSG150 about? Fundamentals of Computer Networking Guevara Noubir noubir@ccs.neu.edu CSG150 Understand the basic principles of networking: Description of existing networks, and networking mechanisms

More information

How To Understand And Understand Network Theory

How To Understand And Understand Network Theory University of Southern California Course Title: EE450: Computer Networks Semester: Fall Semester 2014 Instructor: Professor A. Zahid, azahid@usc.edu Office: PHE 418, 213-740-9058 Office Hours: TTH 9:00

More information

Overview of Computer Networks

Overview of Computer Networks Overview of Computer Networks Client-Server Transaction Client process 4. Client processes response 1. Client sends request 3. Server sends response Server process 2. Server processes request Resource

More information

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life Overview Dipl.-Ing. Peter Schrotter Institute of Communication Networks and Satellite Communications Graz University of Technology, Austria Fundamentals of Communicating over the Network Application Layer

More information

Computer Networks and the Internet

Computer Networks and the Internet ? Computer the IMT2431 - Data Communication and Network Security January 7, 2008 ? Teachers are Lasse Øverlier and http://www.hig.no/~erikh Lectures and Lab in A126/A115 Course webpage http://www.hig.no/imt/in/emnesider/imt2431

More information

IT4405 Computer Networks (Compulsory)

IT4405 Computer Networks (Compulsory) IT4405 Computer Networks (Compulsory) INTRODUCTION This course provides a comprehensive insight into the fundamental concepts in data communications, computer network systems and protocols both fixed and

More information

CSCI 491-01 Topics: Internet Programming Fall 2008

CSCI 491-01 Topics: Internet Programming Fall 2008 CSCI 491-01 Topics: Internet Programming Fall 2008 Introduction Derek Leonard Hendrix College September 3, 2008 Original slides copyright 1996-2007 J.F Kurose and K.W. Ross 1 Chapter 1: Introduction Our

More information

Introduction Chapter 1. Uses of Computer Networks

Introduction Chapter 1. Uses of Computer Networks Introduction Chapter 1 Uses of Computer Networks Network Hardware Network Software Reference Models Example Networks Network Standardization Metric Units Revised: August 2011 Uses of Computer Networks

More information

Lecture 28: Internet Protocols

Lecture 28: Internet Protocols Lecture 28: Internet Protocols 15-110 Principles of Computing, Spring 2016 Dilsun Kaynar, Margaret Reid-Miller, Stephanie Balzer Reminder: Exam 2 Exam 2 will take place next Monday, on April 4. Further

More information

Introduction to computer networks and Cloud Computing

Introduction to computer networks and Cloud Computing Introduction to computer networks and Cloud Computing Aniel Nieves-González Fall 2015 Computer Netwoks A computer network is a set of independent computer systems that are connected by a communication

More information

Communications and Computer Networks

Communications and Computer Networks SFWR 4C03: Computer Networks and Computer Security January 5-8 2004 Lecturer: Kartik Krishnan Lectures 1-3 Communications and Computer Networks The fundamental purpose of a communication system is the

More information

R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol?

R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol? Chapter 1 Review Questions R1. What is the difference between a host and an end system? List several different types of end systems. Is a Web server an end system? 1. There is no difference. Throughout

More information

Telecommunications, Networks, and Wireless Computing

Telecommunications, Networks, and Wireless Computing Objectives Telecommunications, Networks, and Wireless Computing 1. What are the features of a contemporary corporate telecommunications system? On what major technology developments are they based? 2.

More information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.

More information

IT4504 - Data Communication and Networks (Optional)

IT4504 - Data Communication and Networks (Optional) - Data Communication and Networks (Optional) INTRODUCTION This is one of the optional courses designed for Semester 4 of the Bachelor of Information Technology Degree program. This course on Data Communication

More information

ICS 153 Introduction to Computer Networks. Inst: Chris Davison cbdaviso@uci.edu

ICS 153 Introduction to Computer Networks. Inst: Chris Davison cbdaviso@uci.edu ICS 153 Introduction to Computer Networks Inst: Chris Davison cbdaviso@uci.edu 1 ICS 153 Introduction to Computer Networks Course Goals Understand the basic principles of computer networks Design Architecture

More information

Data Communication Networks Introduction

Data Communication Networks Introduction Data Communication Networks Introduction M. R. Pakravan Department of Electrical Engineering Sharif University of Technology Data Networks 1 Introduction The course introduces the underlying concepts and

More information

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶 Network Security 網 路 安 全 Lecture 1 February 20, 2012 洪 國 寶 1 Outline Course information Motivation Introduction to security Basic network concepts Network security models Outline of the course 2 Course

More information

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet Basic Networking Concepts 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet 1 1. Introduction -A network can be defined as a group of computers and other devices connected

More information

What is this Course All About

What is this Course All About Fundamentals of Computer Networks ECE 478/578 Lecture #1 Instructor: Loukas Lazos Dept of Electrical and Computer Engineering University of Arizona What is this Course All About Fundamental principles

More information

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages

More information

Architecture and Performance of the Internet

Architecture and Performance of the Internet SC250 Computer Networking I Architecture and Performance of the Internet Prof. Matthias Grossglauser School of Computer and Communication Sciences EPFL http://lcawww.epfl.ch 1 Today's Objectives Understanding

More information

CSE 3461 / 5461: Computer Networking & Internet Technologies

CSE 3461 / 5461: Computer Networking & Internet Technologies Autumn Semester 2014 CSE 3461 / 5461: Computer Networking & Internet Technologies Instructor: Prof. Kannan Srinivasan 08/28/2014 Announcement Drop before Friday evening! k. srinivasan Presentation A 2

More information

Address Resolution Protocol (ARP)

Address Resolution Protocol (ARP) Address Resolution Protocol (ARP) Question: how do packets actually get to their destination? IP routing tables: based on network addresses Ethernet physical interfaces only understand ethernet addresses

More information

Communication Networks. MAP-TELE 2011/12 José Ruela

Communication Networks. MAP-TELE 2011/12 José Ruela Communication Networks MAP-TELE 2011/12 José Ruela Network basic mechanisms Introduction to Communications Networks Communications networks Communications networks are used to transport information (data)

More information

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 2 An Introduction to Networking

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 2 An Introduction to Networking FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 2 An Introduction to Networking Learning Objectives Upon completion of this chapter, you should be able to: Describe the

More information

1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network

1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network Review questions 1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network B Local area network C Client/server

More information

Network Simulation Traffic, Paths and Impairment

Network Simulation Traffic, Paths and Impairment Network Simulation Traffic, Paths and Impairment Summary Network simulation software and hardware appliances can emulate networks and network hardware. Wide Area Network (WAN) emulation, by simulating

More information

Ethernet. Ethernet. Network Devices

Ethernet. Ethernet. Network Devices Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking

More information

Introduction to Computer Networks

Introduction to Computer Networks Introduction to Computer Networks Chen Yu Indiana University Basic Building Blocks for Computer Networks Nodes PC, server, special-purpose hardware, sensors Switches Links: Twisted pair, coaxial cable,

More information

Computer Networking: A Survey

Computer Networking: A Survey Computer Networking: A Survey M. Benaiah Deva Kumar and B. Deepa, 1 Scholar, 2 Assistant Professor, IT Department, Sri Krishna College of Arts and Science College, Coimbatore, India. Abstract- Computer

More information

Network Edge and Network Core

Network Edge and Network Core Computer Networks Network Edge and Network Core Based on Computer Networking, 4 th Edition by Kurose and Ross What s s the Internet: Nuts and Bolts View PC server wireless laptop cellular handheld access

More information

Chapter 9A. Network Definition. The Uses of a Network. Network Basics

Chapter 9A. Network Definition. The Uses of a Network. Network Basics Chapter 9A Network Basics 1 Network Definition Set of technologies that connects computers Allows communication and collaboration between users 2 The Uses of a Network Simultaneous access to data Data

More information

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK Contemporary Control Systems, Inc. Understanding Ethernet Switches and Routers This extended article was based on a two-part article that was

More information

Networking Test 4 Study Guide

Networking Test 4 Study Guide Networking Test 4 Study Guide True/False Indicate whether the statement is true or false. 1. IPX/SPX is considered the protocol suite of the Internet, and it is the most widely used protocol suite in LANs.

More information

an interconnected collection of autonomous computers interconnected = able to exchange information

an interconnected collection of autonomous computers interconnected = able to exchange information Overview: Network Introduction what is a computer network? digital transmission components of a computer network network hardware network software What is a computer network? an interconnected collection

More information

PLANEAMENTO E GESTÃO DE REDES INFORMÁTICAS COMPUTER NETWORKS PLANNING AND MANAGEMENT 2008-2009

PLANEAMENTO E GESTÃO DE REDES INFORMÁTICAS COMPUTER NETWORKS PLANNING AND MANAGEMENT 2008-2009 Mestrado em Engenharia Informática e de Computadores PLANEAMENTO E GESTÃO DE REDES INFORMÁTICAS COMPUTER NETWORKS PLANNING AND MANAGEMENT 2008-2009 Conceitos de Redes e Arquitecturas - Networks and Architectures

More information

Computer Networks CS321

Computer Networks CS321 Computer Networks CS321 Dr. Ramana I.I.T Jodhpur Dr. Ramana ( I.I.T Jodhpur ) Computer Networks CS321 1 / 22 Outline of the Lectures 1 Introduction OSI Reference Model Internet Protocol Performance Metrics

More information

;. ' ;. - ' Computer Networking. ^4 Top-Down Approach. James F. Kurose. Keith W. Ross. Polytechnic University, Brooklyn PEARSON.

;. ' ;. - ' Computer Networking. ^4 Top-Down Approach. James F. Kurose. Keith W. Ross. Polytechnic University, Brooklyn PEARSON. ;. ' ;. - ' Computer Networking ^4 Top-Down Approach James F. Kurose University of Massachusetts, Amherst Keith W. Ross Polytechnic University, Brooklyn PEARSON Addison Weslev Boston San Francisco N e

More information

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks Computer Networks Lecture 06 Connecting Networks Kuang-hua Chen Department of Library and Information Science National Taiwan University Local Area Networks (LAN) 5 kilometer IEEE 802.3 Ethernet IEEE 802.4

More information

Chapter 1 Computer Networks and the Internet

Chapter 1 Computer Networks and the Internet CSF531 Advanced Computer Networks 高 等 電 腦 網 路 Chapter 1 Computer Networks and the Internet 吳 俊 興 國 立 高 雄 大 學 資 訊 工 程 學 系 Outline 1.1 What is the Internet? 1.2 Network edge 1.3 Network core 1.4 Access networks

More information

How do I get to www.randomsite.com?

How do I get to www.randomsite.com? Networking Primer* *caveat: this is just a brief and incomplete introduction to networking to help students without a networking background learn Network Security. How do I get to www.randomsite.com? Local

More information

DATA COMMUNICATION AND NETWORKS

DATA COMMUNICATION AND NETWORKS DATA COMMUNICATION AND NETWORKS 1. Define the term Computer Networks. A Computer network is a number if computers interconnected by one or more transmission paths. The transmission path often is the telephone

More information

Agenda. Distributed System Structures. Why Distributed Systems? Motivation

Agenda. Distributed System Structures. Why Distributed Systems? Motivation Agenda Distributed System Structures CSCI 444/544 Operating Systems Fall 2008 Motivation Network structure Fundamental network services Sockets and ports Client/server model Remote Procedure Call (RPC)

More information

Chapter 8: Computer Networking. AIMS The aim of this chapter is to give a brief introduction to computer networking.

Chapter 8: Computer Networking. AIMS The aim of this chapter is to give a brief introduction to computer networking. Chapter 8: Computer Networking AIMS The aim of this chapter is to give a brief introduction to computer networking. OBJECTIVES At the end of this chapter you should be able to: Explain the following terms:

More information

CSCI 362 Computer and Network Security

CSCI 362 Computer and Network Security The Purpose of ing CSCI 362 Computer and Security Introduction to ing Goals: Remote exchange and remote process control. A few desirable properties: Interoperability, Flexibility, Geographical range, Scalability,

More information

Protocols. Packets. What's in an IP packet

Protocols. Packets. What's in an IP packet Protocols Precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet Protocol (bottom level) all packets shipped from network to network as IP packets

More information

Data Communication and Computer Network

Data Communication and Computer Network 1 Data communication principles, types and working principles of modems, Network principles, OSI model, functions of data link layer and network layer, networking components, communication protocols- X

More information

How To Use A Network Over The Internet (Networking) With A Network (Netware) And A Network On A Computer (Network)

How To Use A Network Over The Internet (Networking) With A Network (Netware) And A Network On A Computer (Network) 1 TCP Transmission Control Protocol, is a connection based Internet protocol responsible for breaking data into packets to send over a network using IP (internet protocol) IP works at the TCP/IP Internet

More information

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols

More information

What s a protocol? What s a protocol? A closer look at network structure: What s the Internet? What s the Internet? What s the Internet?

What s a protocol? What s a protocol? A closer look at network structure: What s the Internet? What s the Internet? What s the Internet? What s the Internet? PC server laptop cellular handheld access points wired s connected computing devices: hosts = end systems running apps communication s fiber, copper, radio transmission rate = bandwidth

More information

Wide Area Networks. Learning Objectives. LAN and WAN. School of Business Eastern Illinois University. (Week 11, Thursday 3/22/2007)

Wide Area Networks. Learning Objectives. LAN and WAN. School of Business Eastern Illinois University. (Week 11, Thursday 3/22/2007) School of Business Eastern Illinois University Wide Area Networks (Week 11, Thursday 3/22/2007) Abdou Illia, Spring 2007 Learning Objectives 2 Distinguish between LAN and WAN Distinguish between Circuit

More information

Computer Networks III

Computer Networks III Computer Networks III Wide Area Networks and Packet Switching Network Protocols and the OSI Layers The Internet Internet Infrastructure 1 Wide Area Networks (recap) 2 Page 1 Basic WAN structure Host Router

More information

Mathatma Gandhi University

Mathatma Gandhi University Mathatma Gandhi University BSc Computer Science IV th semester BCS 402 Computer Network &Internet MULTIPLE CHOICE QUESTIONS 1. The computer network is A) Network computer with cable B) Network computer

More information

PART-A Questions. 9. What are the two parts of message inside the envelope?

PART-A Questions. 9. What are the two parts of message inside the envelope? PART-A Questions 1. Differentiate between internet and intranet. 2. What are the two types of spread spectrum? 3. Define hamming distance. 4. What are carrier sense protocols? 5. What are the two types

More information

COMPUTER NETWORKS SECOND EDITION. ANDREW S.fjANENBAUM. Vrije Universiteit Amsterdam, The Netherlands. Nachrichtentechnische Bib'iothek THD Inv.

COMPUTER NETWORKS SECOND EDITION. ANDREW S.fjANENBAUM. Vrije Universiteit Amsterdam, The Netherlands. Nachrichtentechnische Bib'iothek THD Inv. COMPUTER NETWORKS SECOND EDITION ANDREW S.fjANENBAUM Vrije Universiteit Amsterdam, The Netherlands Nachrichtentechnische Bib'iothek THD Inv.-Ni,: tq(s ULB Darmstadt iiiiiir 17800787 =3JE Prentice-Hall

More information

Local Area Network By Bhupendra Ratha, Lecturer School of Library and Information Science Devi Ahilya University, Indore Email: bhu261@gmail.com Local Area Network LANs connect computers and peripheral

More information

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP Overview Securing TCP/IP Chapter 6 TCP/IP Open Systems Interconnection Model Anatomy of a Packet Internet Protocol Security (IPSec) Web Security (HTTP over TLS, Secure-HTTP) Lecturer: Pei-yih Ting 1 2

More information

SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005. Lecturer: Kartik Krishnan Lecture 1-3

SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005. Lecturer: Kartik Krishnan Lecture 1-3 SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005 Lecturer: Kartik Krishnan Lecture 1-3 Communications and Computer Networks The fundamental purpose of a communication network is the exchange

More information

Local-Area Network -LAN

Local-Area Network -LAN Computer Networks A group of two or more computer systems linked together. There are many [types] of computer networks: Peer To Peer (workgroups) The computers are connected by a network, however, there

More information

Chapter 7: Computer Networks, the Internet, and the World Wide Web. Invitation to Computer Science, C++ Version, Third Edition

Chapter 7: Computer Networks, the Internet, and the World Wide Web. Invitation to Computer Science, C++ Version, Third Edition Chapter 7: Computer Networks, the Internet, and the World Wide Web Invitation to Computer Science, C++ Version, Third Edition Objectives In this chapter, you will learn about: Basic networking concepts

More information

Chapter 5. Data Communication And Internet Technology

Chapter 5. Data Communication And Internet Technology Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN

More information

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages

More information

Chapter 1: Introduction

Chapter 1: Introduction Course Summary What have we learned: a huge amount! principles practice.. using Internet to motivate examples 1 Chapter 1: Introduction Our goal: get feel and terminology more depth, detail later in course

More information

Module 2 Overview of Computer Networks

Module 2 Overview of Computer Networks Module 2 Overview of Computer Networks Networks and Communication Give me names of all employees Who earn more than $100,000 % ISP intranet % % % backbone satellite link desktop computer: server: network

More information

Network Security. Vorlesung Kommunikation und Netze SS 10 E. Nett

Network Security. Vorlesung Kommunikation und Netze SS 10 E. Nett Network Security Internet not originally designed with (much) security in mind original vision: a group of mutually trusting users attached to a transparent network Security considerations in all layers!

More information

Telecommunications, the Internet, and Wireless Technology

Telecommunications, the Internet, and Wireless Technology Chapter 6 Telecommunications, the Internet, and Wireless Technology 6.1 Copyright 2011 Pearson Education, Inc. STUDENT LEARNING OBJECTIVES What are the principal components of telecommunications networks

More information

C20.0001 Information Systems for Managers Fall 1999

C20.0001 Information Systems for Managers Fall 1999 New York University, Leonard N. Stern School of Business C20.0001 Information Systems for Managers Fall 1999 Networking Fundamentals A network comprises two or more computers that have been connected in

More information

The OSI and TCP/IP Models. Lesson 2

The OSI and TCP/IP Models. Lesson 2 The OSI and TCP/IP Models Lesson 2 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Introduction to the OSI Model Compare the layers of the OSI and TCP/IP

More information

1 Introduction to mobile telecommunications

1 Introduction to mobile telecommunications 1 Introduction to mobile telecommunications Mobile phones were first introduced in the early 1980s. In the succeeding years, the underlying technology has gone through three phases, known as generations.

More information

Zarządzanie sieciami telekomunikacyjnymi

Zarządzanie sieciami telekomunikacyjnymi What Is an Internetwork? An internetwork is a collection of individual networks, connected by intermediate networking devices, that functions as a single large network. Internetworking refers to the industry,

More information

Computer Networking Networks

Computer Networking Networks Page 1 of 8 Computer Networking Networks 9.1 Local area network A local area network (LAN) is a network that connects computers and devices in a limited geographical area such as a home, school, office

More information

Introduction to LAN/WAN. Network Layer

Introduction to LAN/WAN. Network Layer Introduction to LAN/WAN Network Layer Topics Introduction (5-5.1) Routing (5.2) (The core) Internetworking (5.5) Congestion Control (5.3) Network Layer Design Isues Store-and-Forward Packet Switching Services

More information

Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX

Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX APPENDIX A Introduction Understanding TCP/IP To fully understand the architecture of Cisco Centri Firewall, you need to understand the TCP/IP architecture on which the Internet is based. This appendix

More information

Introduction: Why do we need computer networks?

Introduction: Why do we need computer networks? Introduction: Why do we need computer networks? Karin A. Hummel - Adapted slides of Prof. B. Plattner, plattner@tik.ee.ethz.ch - Add-on material included of Peterson, Davie: Computer Networks February

More information

Data Link Protocols. TCP/IP Suite and OSI Reference Model

Data Link Protocols. TCP/IP Suite and OSI Reference Model Data Link Protocols Relates to Lab. This module covers data link layer issues, such as local area networks (LANs) and point-to-point links, Ethernet, and the Point-to-Point Protocol (PPP). 1 TCP/IP Suite

More information

Internet Protocol: IP packet headers. vendredi 18 octobre 13

Internet Protocol: IP packet headers. vendredi 18 octobre 13 Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)

More information

Core Syllabus. Version 2.6 C OPERATE KNOWLEDGE AREA: OPERATION AND SUPPORT OF INFORMATION SYSTEMS. June 2006

Core Syllabus. Version 2.6 C OPERATE KNOWLEDGE AREA: OPERATION AND SUPPORT OF INFORMATION SYSTEMS. June 2006 Core Syllabus C OPERATE KNOWLEDGE AREA: OPERATION AND SUPPORT OF INFORMATION SYSTEMS Version 2.6 June 2006 EUCIP CORE Version 2.6 Syllabus. The following is the Syllabus for EUCIP CORE Version 2.6, which

More information

Network Models and Protocols

Network Models and Protocols 669-5ch01.fm Page 1 Friday, April 12, 2002 2:01 PM C H A P T E R Network Models and Protocols 1 EXAM OBJECTIVES 1.1 Layered Network Models 1.2 The Layers of the TCP/IP 5-Layer Model 1.3 Network Protocols

More information

Network: several computers who can communicate. bus. Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb).

Network: several computers who can communicate. bus. Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb). 1 / 17 Network: several computers who can communicate. Bus topology: bus Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb). Hardware has globally unique MAC addresses (IDs).

More information

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among various

More information

Objectives of Lecture. Network Architecture. Protocols. Contents

Objectives of Lecture. Network Architecture. Protocols. Contents Objectives of Lecture Network Architecture Show how network architecture can be understood using a layered approach. Introduce the OSI seven layer reference model. Introduce the concepts of internetworking

More information

Introduction. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross

Introduction. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross Introduction Abusayeed Saifullah CS 5600 Computer Networks These slides are adapted from Kurose and Ross Goals of This Course v Be familiar with Fundamental network topics Some advanced topics State-of-the-art

More information

Module 1. Introduction. Version 2 CSE IIT, Kharagpur

Module 1. Introduction. Version 2 CSE IIT, Kharagpur Module 1 Introduction Lesson 2 Layered Network Architecture Specific Functional Objectives On Completion of this lesson, the students will be able to: State the requirement for layered approach Explain

More information

TYLER JUNIOR COLLEGE School of Continuing Studies 1530 SSW Loop 323 Tyler, TX 75701 1.800.298.5226 www.tjc.edu/continuingstudies/mycaa

TYLER JUNIOR COLLEGE School of Continuing Studies 1530 SSW Loop 323 Tyler, TX 75701 1.800.298.5226 www.tjc.edu/continuingstudies/mycaa TYLER JUNIOR COLLEGE School of Continuing Studies 1530 SSW Loop 323 Tyler, TX 75701 1.800.298.5226 www.tjc.edu/continuingstudies/mycaa Education & Training Plan CompTIA N+ Specialist Program Student Full

More information

Outline. CSc 466/566. Computer Security. 18 : Network Security Introduction. Network Topology. Network Topology. Christian Collberg

Outline. CSc 466/566. Computer Security. 18 : Network Security Introduction. Network Topology. Network Topology. Christian Collberg Outline Network Topology CSc 466/566 Computer Security 18 : Network Security Introduction Version: 2012/05/03 13:59:29 Department of Computer Science University of Arizona collberg@gmail.com Copyright

More information

Technical Support Information Belkin internal use only

Technical Support Information Belkin internal use only The fundamentals of TCP/IP networking TCP/IP (Transmission Control Protocol / Internet Protocols) is a set of networking protocols that is used for communication on the Internet and on many other networks.

More information

Introduction to Computer

Introduction to Computer PDHonline Course E175 (8 PDH) Introduction to Computer Instructor: Dale W. Callahan, Ph.D., P.E. and Lea B. Callahan, P.E. 2012 PDH Online PDH Center 5272 Meadow Estates Drive Fairfax, VA 22030-6658 Phone

More information

Communication Systems Internetworking (Bridges & Co)

Communication Systems Internetworking (Bridges & Co) Communication Systems Internetworking (Bridges & Co) Prof. Dr.-Ing. Lars Wolf TU Braunschweig Institut für Betriebssysteme und Rechnerverbund Mühlenpfordtstraße 23, 38106 Braunschweig, Germany Email: wolf@ibr.cs.tu-bs.de

More information

RARP: Reverse Address Resolution Protocol

RARP: Reverse Address Resolution Protocol SFWR 4C03: Computer Networks and Computer Security January 19-22 2004 Lecturer: Kartik Krishnan Lectures 7-9 RARP: Reverse Address Resolution Protocol When a system with a local disk is bootstrapped it

More information

The OSI model has seven layers. The principles that were applied to arrive at the seven layers can be briefly summarized as follows:

The OSI model has seven layers. The principles that were applied to arrive at the seven layers can be briefly summarized as follows: 1.4 Reference Models Now that we have discussed layered networks in the abstract, it is time to look at some examples. In the next two sections we will discuss two important network architectures, the

More information