SlideShare una empresa de Scribd logo
1 de 19
Computer Networks
Chapter 1:Introduction
Computer Networking:
A Top Down Approach ,
4th edition.
Jim Kurose, Keith Ross
Chapter 1: Introduction
Our goal:

 get “feel” and

terminology
 more depth, detail
later in course
 approach:
 use Internet as
example

Overview:
 what’s the Internet?
 what’s a protocol?
 network edge; hosts, access





net, physical media
network core: packet/circuit
switching, Internet structure
performance: loss, delay,
throughput
Protocol layers, service models
History of Internet
What’s the Internet: “nuts and bolts” view
PC

 Interconnects millions Mobile network

of computing devices:
Global ISP
hosts = end systems
wireless
laptop
 running network
cellular
Home network
handheld
apps
Regional ISP
 communication links
 fiber, copper, radio,
access
points
Institutional network
satellite
wired
links
 transmission rate =
bandwidth (bits/sec)
 routers: forward
router
packets (chunks of
data)
server
What’s the Internet: “nuts and bolts” view


protocols control sending,
receiving of msgs




Global ISP

e.g., TCP, IP, HTTP, Skype

Internet: “network of
networks”


Mobile network

public Internet versus
private intranet

 Internet standards
 IETF: Internet Engineering
Task Force
 RFC: Request For Comments
 IETF standard Documents
 More than 5000 RFCs

Home network
Regional ISP

Institutional network
What’s the Internet: A Service View
infrastructure
that provides services to
applications:
 Involve multiple end system
that exchange data with each
other.
 Web, VoIP, email, games, ecommerce, file sharing
 Applications do not run on the
routers
 Communication services provided
to applications:
 reliable data delivery from
source to destination
(connection oriented)
 “best effort” (unreliable) data
 Communication
What’s a protocol?
Human Protocols:
 “what’s the time?”
 “I have a question”
 Interview
… specific msgs sent
… specific actions
taken when msgs
received, or other
events

Network Protocols:
 machines rather than
humans
 all communication
activity in Internet
governed by protocols

protocols define format,
order of msgs sent and
received among network
entities, and actions
taken on msg
transmission, receipt
What’s a protocol?
a human protocol and a computer network protocol:
Hi

TCP connection
request

Hi

TCP connection
response

Got the
time?

Get http://www.awl.com/kurose-ross

2:00

<file>
time
The Network Edge:
 end systems (hosts):




run application programs
e.g. Web, email
at “edge of network”

peer-peer

 client/server model




client host requests, receives
service from always-on server
client/server
e.g. Web browser/server;
email client/server

 Peer-Peer model:




minimal (or no) use of dedicated
servers
e.g. Skype, BitTorrent, Kazaa

 More

in Chapter 2
Network Access
Access Networks:
The physical link that connects an end
system to its “edge router”.

Q: How to connect end systems to

edge router?
Access Networks can be loosely classified
into three categories
 Residential access networks
 Dial up, DSL etc
 Institutional access networks (school,
company)
 Ethernet
 Mobile access networks


Wireless LAN (WiFi)



Wider-area wireless access (WiMAX)

 Reading Assignment
The Network Core
 Mesh of interconnected

routers
 the fundamental question: how
is data transferred through
net?
 circuit switching:
dedicated circuit per call:
telephone networks
 packet-switching: data
sent through network in
discrete “chunks” called
packets
 Hotel reservation analogy
Network Core: Circuit Switching
End-end resources reserved for the
duration of the call
 Three phases
 Establish, Transfer,
Disconnect
 dedicated resources: no sharing
 Guaranteed performance
 Very Reliable
 Developed for Telephone
networks
 Inefficient
 Channel capacity dedicated
for duration of connection
 If no data, capacity wasted
 Set up (connection) takes time
Network Core: Packet Switching












Today’s internet is a packet switched network
Each end-end data stream divided into packets
Each packet contains a portion of user data plus some
control info.
Each packet has to find its own route to the destination
No predetermined path
Decision as to which node to hop to in the next step is
taken only when a node is reached.
Resources used as needed
Congestion : packets queue, wait for link use
Reliability
Less reliable
Store and forward switching
Routers receives complete packet before forwarding
Question: What is Cut through Switching?
Protocol Layers
Networks are complex!
• many “pieces”:
– hosts
– routers
– links of various
media
– applications
– protocols
– hardware,
software

Question:
Is there any way of
organizing network
architecture?
Answer:

Yes possible with a
layered architecture
Organization of air travel
ticket (purchase)

ticket (complain)

baggage (check)

baggage (claim)

gates (load)

gates (unload)

runway takeoff

runway landing

airplane routing

airplane routing
airplane routing

•

A series of steps(actions)
Layering of Airline Functionality
ticket (purchase)

ticket (complain)

ticket

baggage (check)

baggage (claim

baggage

gates (load)

gates (unload)

gate

runway (takeoff)

runway (land)

takeoff/landing

airplane routing

airplane routing

airplane routing
departure
airport

airplane routing

airplane routing

intermediate air-traffic
control centers

arrival
airport

Airline functionality can be divided into layers, providing a frame work in
which we can discuss air travel.
• At the ticketing layer and below
– Airline-counter-to-airline-counter transfer of a person.
• At the gate layer
– Departure-gate –to-arrival-gate transfer of a person is accomplished
Layers: each layer implements a service
– via its own internal-layer actions
– Combined with the services directly below it
•
Why layering?
Dealing with complex systems:
 Discuss a well defined, specific part of a
large and complex system
 Modularization eases maintenance, updating
of system
Change of implementation of layer’s
service transparent to rest of system
e.g. change in gate procedure doesn’t
affect rest of system
Internet Protocol Stack
 To provide structure to design of
network
protocols,
network
designers organize protocols in
layers
 Service – says what a layer does
 Protocol – says how the service is
implemented
 Advantages
 Drawbacks
 When
taken
together
the
protocols of various layers are
called the Protocol Stack.
 Internet Protocol Stack consists
of Five layers
 Physical,
Link,
Network,
Transport
and
Application
layers .
 Organization of Book
Internet Protocol Stack
• Application Layer:
 Network applications and their application layer protocols
reside.
 Provides user interfaces and support for services such as email, file transfer etc.
Hyper Text Transfer Protocol (HTTP)
File Transfer Protocol (FTP)
Session Initiation Protocol (SIP)
 An application layer protocol is distributed over multiple end
systems
 The packets of information at the application layer is called
as a message.
Internet Protocol Stack
• Transport Layer:
 Transports application-layer messages between application
end points.
 Transport layer packet is called as a segment
 Breaks long messages into shorter segments
 There are two Transport Layer Protocols
 Transmission Control Protocol (TCP)
 Connection Oriented service
 Guaranteed delivery of application layer messages
 Flow control
 Congestion Control

 User Datagram Protocol (UDP)
 Connectionless service
 No reliability, flow control and congestion control

Más contenido relacionado

La actualidad más candente

Network protocols
Network protocolsNetwork protocols
Network protocols
Hemnath R.
 
02 protocol architecture
02 protocol architecture02 protocol architecture
02 protocol architecture
Orbay Yeşil
 

La actualidad más candente (20)

01 overview[1]r
01 overview[1]r01 overview[1]r
01 overview[1]r
 
Network protocals
Network protocalsNetwork protocals
Network protocals
 
Chapter 2 - Computer Networking a top-down Approach 7th
Chapter 2 - Computer Networking a top-down Approach 7thChapter 2 - Computer Networking a top-down Approach 7th
Chapter 2 - Computer Networking a top-down Approach 7th
 
Dc ch02 : protocol architecture
Dc ch02 : protocol architectureDc ch02 : protocol architecture
Dc ch02 : protocol architecture
 
Internet1
Internet1Internet1
Internet1
 
Orientation to Computer Networks
Orientation to Computer NetworksOrientation to Computer Networks
Orientation to Computer Networks
 
NETWORK PROTOCOL
NETWORK PROTOCOLNETWORK PROTOCOL
NETWORK PROTOCOL
 
Communication protocol presentation
Communication protocol presentationCommunication protocol presentation
Communication protocol presentation
 
Community Wireless Networks
Community Wireless NetworksCommunity Wireless Networks
Community Wireless Networks
 
Network access layer security protocol
Network access layer security protocolNetwork access layer security protocol
Network access layer security protocol
 
Slides for protocol layering and network applications
Slides for protocol layering and network applicationsSlides for protocol layering and network applications
Slides for protocol layering and network applications
 
Computer Network basic
Computer Network basicComputer Network basic
Computer Network basic
 
Protocols
ProtocolsProtocols
Protocols
 
Network protocols
Network protocolsNetwork protocols
Network protocols
 
Network Protocol and TCP/IP
Network Protocol and TCP/IPNetwork Protocol and TCP/IP
Network Protocol and TCP/IP
 
20CS2008 Computer Networks
20CS2008 Computer Networks 20CS2008 Computer Networks
20CS2008 Computer Networks
 
Application Layer
Application LayerApplication Layer
Application Layer
 
02 protocol architecture
02 protocol architecture02 protocol architecture
02 protocol architecture
 
Network protocol structure scope
Network protocol structure scopeNetwork protocol structure scope
Network protocol structure scope
 
Chapter 4ver2
Chapter 4ver2Chapter 4ver2
Chapter 4ver2
 

Similar a Week1 lec2-bscs1

Ch1 2ed 29_dec03
Ch1 2ed 29_dec03Ch1 2ed 29_dec03
Ch1 2ed 29_dec03
Sugan Nalla
 
Lec 2 and_3
Lec 2 and_3Lec 2 and_3
Lec 2 and_3
hz3012
 
preKnowledge-InternetNetworking Android's mobile operating system is based on...
preKnowledge-InternetNetworking Android's mobile operating system is based on...preKnowledge-InternetNetworking Android's mobile operating system is based on...
preKnowledge-InternetNetworking Android's mobile operating system is based on...
jeronimored
 
Ccent notes part 1
Ccent notes part 1Ccent notes part 1
Ccent notes part 1
ahmady
 
Osimodelwithneworkingoverview 150618094119-lva1-app6892
Osimodelwithneworkingoverview 150618094119-lva1-app6892Osimodelwithneworkingoverview 150618094119-lva1-app6892
Osimodelwithneworkingoverview 150618094119-lva1-app6892
Aswini Badatya
 
Osimodelwithneworkingoverview 150618094119-lva1-app6892
Osimodelwithneworkingoverview 150618094119-lva1-app6892Osimodelwithneworkingoverview 150618094119-lva1-app6892
Osimodelwithneworkingoverview 150618094119-lva1-app6892
Saumendra Pradhan
 

Similar a Week1 lec2-bscs1 (20)

Week2 lec1-bscs1
Week2 lec1-bscs1Week2 lec1-bscs1
Week2 lec1-bscs1
 
Ch1 2ed 29_dec03
Ch1 2ed 29_dec03Ch1 2ed 29_dec03
Ch1 2ed 29_dec03
 
Lec 2 and_3
Lec 2 and_3Lec 2 and_3
Lec 2 and_3
 
Week2 lec2-bscs1
Week2 lec2-bscs1Week2 lec2-bscs1
Week2 lec2-bscs1
 
Lecture 12
Lecture 12Lecture 12
Lecture 12
 
Tcp ip
Tcp ipTcp ip
Tcp ip
 
Chapter1
Chapter1Chapter1
Chapter1
 
preKnowledge-InternetNetworking Android's mobile operating system is based on...
preKnowledge-InternetNetworking Android's mobile operating system is based on...preKnowledge-InternetNetworking Android's mobile operating system is based on...
preKnowledge-InternetNetworking Android's mobile operating system is based on...
 
preKnowledge-InternetNetworking.ppt
preKnowledge-InternetNetworking.pptpreKnowledge-InternetNetworking.ppt
preKnowledge-InternetNetworking.ppt
 
nv.ppt
nv.pptnv.ppt
nv.ppt
 
1st Talk
1st Talk1st Talk
1st Talk
 
01 pengenalan
01 pengenalan01 pengenalan
01 pengenalan
 
Jaimin chp-1 - introduction - 2011 batch
Jaimin   chp-1  - introduction - 2011 batchJaimin   chp-1  - introduction - 2011 batch
Jaimin chp-1 - introduction - 2011 batch
 
Week_1_Intro_Internet_arch_Applications.ppt
Week_1_Intro_Internet_arch_Applications.pptWeek_1_Intro_Internet_arch_Applications.ppt
Week_1_Intro_Internet_arch_Applications.ppt
 
Computer network basics
Computer network basicsComputer network basics
Computer network basics
 
Fundamental Of Computer Network.
Fundamental Of Computer Network. Fundamental Of Computer Network.
Fundamental Of Computer Network.
 
Ccent notes part 1
Ccent notes part 1Ccent notes part 1
Ccent notes part 1
 
Osi model with neworking overview
Osi model with neworking overviewOsi model with neworking overview
Osi model with neworking overview
 
Osimodelwithneworkingoverview 150618094119-lva1-app6892
Osimodelwithneworkingoverview 150618094119-lva1-app6892Osimodelwithneworkingoverview 150618094119-lva1-app6892
Osimodelwithneworkingoverview 150618094119-lva1-app6892
 
Osimodelwithneworkingoverview 150618094119-lva1-app6892
Osimodelwithneworkingoverview 150618094119-lva1-app6892Osimodelwithneworkingoverview 150618094119-lva1-app6892
Osimodelwithneworkingoverview 150618094119-lva1-app6892
 

Más de syedhaiderraza (20)

Week16 lec1
Week16 lec1Week16 lec1
Week16 lec1
 
Week15 lec1
Week15 lec1Week15 lec1
Week15 lec1
 
Week14 lec2
Week14 lec2Week14 lec2
Week14 lec2
 
Week14 lec1
Week14 lec1Week14 lec1
Week14 lec1
 
Week13 lec2
Week13 lec2Week13 lec2
Week13 lec2
 
Week13 lec1
Week13 lec1Week13 lec1
Week13 lec1
 
Week11 lec2
Week11 lec2Week11 lec2
Week11 lec2
 
Week11 lec1
Week11 lec1Week11 lec1
Week11 lec1
 
Week10 lec1
Week10 lec1Week10 lec1
Week10 lec1
 
Week9 lec1
Week9 lec1Week9 lec1
Week9 lec1
 
Week8 lec2-bscs1
Week8 lec2-bscs1Week8 lec2-bscs1
Week8 lec2-bscs1
 
Week8 lec1-bscs1
Week8 lec1-bscs1Week8 lec1-bscs1
Week8 lec1-bscs1
 
Week5 lec3-bscs1
Week5 lec3-bscs1Week5 lec3-bscs1
Week5 lec3-bscs1
 
Week5 lec2-bscs1
Week5 lec2-bscs1Week5 lec2-bscs1
Week5 lec2-bscs1
 
Week5 lec1-bscs1
Week5 lec1-bscs1Week5 lec1-bscs1
Week5 lec1-bscs1
 
Week4 lec2-bscs1
Week4 lec2-bscs1Week4 lec2-bscs1
Week4 lec2-bscs1
 
Week4 lec1-bscs1
Week4 lec1-bscs1Week4 lec1-bscs1
Week4 lec1-bscs1
 
Week3 lec3-bscs1
Week3 lec3-bscs1Week3 lec3-bscs1
Week3 lec3-bscs1
 
Week3 lec 2
Week3 lec 2Week3 lec 2
Week3 lec 2
 
Week3 lec 1
Week3 lec 1Week3 lec 1
Week3 lec 1
 

Último

Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
MateoGardella
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 

Último (20)

Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 

Week1 lec2-bscs1

  • 1. Computer Networks Chapter 1:Introduction Computer Networking: A Top Down Approach , 4th edition. Jim Kurose, Keith Ross
  • 2. Chapter 1: Introduction Our goal:  get “feel” and terminology  more depth, detail later in course  approach:  use Internet as example Overview:  what’s the Internet?  what’s a protocol?  network edge; hosts, access     net, physical media network core: packet/circuit switching, Internet structure performance: loss, delay, throughput Protocol layers, service models History of Internet
  • 3. What’s the Internet: “nuts and bolts” view PC  Interconnects millions Mobile network of computing devices: Global ISP hosts = end systems wireless laptop  running network cellular Home network handheld apps Regional ISP  communication links  fiber, copper, radio, access points Institutional network satellite wired links  transmission rate = bandwidth (bits/sec)  routers: forward router packets (chunks of data) server
  • 4. What’s the Internet: “nuts and bolts” view  protocols control sending, receiving of msgs   Global ISP e.g., TCP, IP, HTTP, Skype Internet: “network of networks”  Mobile network public Internet versus private intranet  Internet standards  IETF: Internet Engineering Task Force  RFC: Request For Comments  IETF standard Documents  More than 5000 RFCs Home network Regional ISP Institutional network
  • 5. What’s the Internet: A Service View infrastructure that provides services to applications:  Involve multiple end system that exchange data with each other.  Web, VoIP, email, games, ecommerce, file sharing  Applications do not run on the routers  Communication services provided to applications:  reliable data delivery from source to destination (connection oriented)  “best effort” (unreliable) data  Communication
  • 6. What’s a protocol? Human Protocols:  “what’s the time?”  “I have a question”  Interview … specific msgs sent … specific actions taken when msgs received, or other events Network Protocols:  machines rather than humans  all communication activity in Internet governed by protocols protocols define format, order of msgs sent and received among network entities, and actions taken on msg transmission, receipt
  • 7. What’s a protocol? a human protocol and a computer network protocol: Hi TCP connection request Hi TCP connection response Got the time? Get http://www.awl.com/kurose-ross 2:00 <file> time
  • 8. The Network Edge:  end systems (hosts):    run application programs e.g. Web, email at “edge of network” peer-peer  client/server model   client host requests, receives service from always-on server client/server e.g. Web browser/server; email client/server  Peer-Peer model:   minimal (or no) use of dedicated servers e.g. Skype, BitTorrent, Kazaa  More in Chapter 2
  • 9. Network Access Access Networks: The physical link that connects an end system to its “edge router”. Q: How to connect end systems to edge router? Access Networks can be loosely classified into three categories  Residential access networks  Dial up, DSL etc  Institutional access networks (school, company)  Ethernet  Mobile access networks  Wireless LAN (WiFi)  Wider-area wireless access (WiMAX)  Reading Assignment
  • 10. The Network Core  Mesh of interconnected routers  the fundamental question: how is data transferred through net?  circuit switching: dedicated circuit per call: telephone networks  packet-switching: data sent through network in discrete “chunks” called packets  Hotel reservation analogy
  • 11. Network Core: Circuit Switching End-end resources reserved for the duration of the call  Three phases  Establish, Transfer, Disconnect  dedicated resources: no sharing  Guaranteed performance  Very Reliable  Developed for Telephone networks  Inefficient  Channel capacity dedicated for duration of connection  If no data, capacity wasted  Set up (connection) takes time
  • 12. Network Core: Packet Switching           Today’s internet is a packet switched network Each end-end data stream divided into packets Each packet contains a portion of user data plus some control info. Each packet has to find its own route to the destination No predetermined path Decision as to which node to hop to in the next step is taken only when a node is reached. Resources used as needed Congestion : packets queue, wait for link use Reliability Less reliable Store and forward switching Routers receives complete packet before forwarding Question: What is Cut through Switching?
  • 13. Protocol Layers Networks are complex! • many “pieces”: – hosts – routers – links of various media – applications – protocols – hardware, software Question: Is there any way of organizing network architecture? Answer: Yes possible with a layered architecture
  • 14. Organization of air travel ticket (purchase) ticket (complain) baggage (check) baggage (claim) gates (load) gates (unload) runway takeoff runway landing airplane routing airplane routing airplane routing • A series of steps(actions)
  • 15. Layering of Airline Functionality ticket (purchase) ticket (complain) ticket baggage (check) baggage (claim baggage gates (load) gates (unload) gate runway (takeoff) runway (land) takeoff/landing airplane routing airplane routing airplane routing departure airport airplane routing airplane routing intermediate air-traffic control centers arrival airport Airline functionality can be divided into layers, providing a frame work in which we can discuss air travel. • At the ticketing layer and below – Airline-counter-to-airline-counter transfer of a person. • At the gate layer – Departure-gate –to-arrival-gate transfer of a person is accomplished Layers: each layer implements a service – via its own internal-layer actions – Combined with the services directly below it •
  • 16. Why layering? Dealing with complex systems:  Discuss a well defined, specific part of a large and complex system  Modularization eases maintenance, updating of system Change of implementation of layer’s service transparent to rest of system e.g. change in gate procedure doesn’t affect rest of system
  • 17. Internet Protocol Stack  To provide structure to design of network protocols, network designers organize protocols in layers  Service – says what a layer does  Protocol – says how the service is implemented  Advantages  Drawbacks  When taken together the protocols of various layers are called the Protocol Stack.  Internet Protocol Stack consists of Five layers  Physical, Link, Network, Transport and Application layers .  Organization of Book
  • 18. Internet Protocol Stack • Application Layer:  Network applications and their application layer protocols reside.  Provides user interfaces and support for services such as email, file transfer etc. Hyper Text Transfer Protocol (HTTP) File Transfer Protocol (FTP) Session Initiation Protocol (SIP)  An application layer protocol is distributed over multiple end systems  The packets of information at the application layer is called as a message.
  • 19. Internet Protocol Stack • Transport Layer:  Transports application-layer messages between application end points.  Transport layer packet is called as a segment  Breaks long messages into shorter segments  There are two Transport Layer Protocols  Transmission Control Protocol (TCP)  Connection Oriented service  Guaranteed delivery of application layer messages  Flow control  Congestion Control  User Datagram Protocol (UDP)  Connectionless service  No reliability, flow control and congestion control