SlideShare uma empresa Scribd logo
1 de 80
Chapter 1 Introduction Computer Networking: A Top Down Approach , 4 th  edition.  Jim Kurose, Keith Ross Addison-Wesley, July 2007.  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Chapter 1: Introduction ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Chapter 1: roadmap ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What’s the Internet: “nuts and bolts” view ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Home network Institutional network Mobile network Global ISP Regional ISP router PC server wireless laptop cellular  handheld wired links access  points
“Cool” internet appliances World’s smallest web server http://www-ccs.cs.umass.edu/~shri/iPic.html IP picture frame http://www.ceiva.com/ Web-enabled toaster + weather forecaster Internet phones
What’s the Internet: “nuts and bolts” view ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Home network Institutional network Mobile network Global ISP Regional ISP
What’s the Internet: a service view ,[object Object],[object Object],[object Object],[object Object],[object Object]
What’s a protocol? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],protocols define format, order of msgs sent and received among network entities, and actions taken on msg transmission, receipt
What’s a protocol? ,[object Object],Q:  Other human protocols?  Hi Hi TCP connection request Got the time? 2:00 TCP connection response Get http://www.awl.com/kurose-ross <file> time
Chapter 1: roadmap ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
A closer look at network structure: ,[object Object],[object Object],[object Object],[object Object],[object Object]
The network edge: ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],client/server peer-peer
Access networks and physical media ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Residential access: point to point access ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Residential access: cable modems ,[object Object],[object Object],[object Object],[object Object],[object Object]
Residential access: cable modems Diagram: http://www.cabledatacomnews.com/cmic/diagram.html
Cable Network Architecture: Overview home cable headend cable distribution network (simplified) Typically 500 to 5,000 homes
Cable Network Architecture: Overview home cable headend cable distribution network server(s)
Cable Network Architecture: Overview home cable headend cable distribution network (simplified)
Cable Network Architecture: Overview home cable headend cable distribution network FDM (more shortly): Channels V I D E O V I D E O V I D E O V I D E O V I D E O V I D E O D A T A D A T A C O N T R O L 1 2 3 4 5 6 7 8 9
Company access: local area networks ,[object Object],[object Object],[object Object],[object Object],[object Object]
Wireless access networks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],base station mobile hosts router
Home networks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],wireless access  point wireless laptops router/ firewall cable modem to/from cable headend Ethernet
Physical Media ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Physical Media: coax, fiber ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Physical media: radio ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Chapter 1: roadmap ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Network Core ,[object Object],[object Object],[object Object],[object Object]
Network Core: Circuit Switching ,[object Object],[object Object],[object Object],[object Object],[object Object]
Network Core: Circuit Switching ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Circuit Switching: FDM and TDM FDM frequency time TDM frequency time 4 users Example:
Numerical example ,[object Object],[object Object],[object Object],[object Object],[object Object]
Network Core: Packet Switching ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Bandwidth division into “pieces” Dedicated allocation Resource reservation
Packet Switching: Statistical Multiplexing ,[object Object],[object Object],A B C 100 Mb/s Ethernet 1.5 Mb/s statistical multiplexing queue of packets waiting for output link D E
Packet-switching: store-and-forward ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],R R R L more on delay shortly …
Packet switching versus circuit switching ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],N users 1 Mbps link Q: how did we get value 0.0004?
Packet switching versus circuit switching ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Q:  human analogies of reserved resources (circuit switching) versus on-demand allocation (packet-switching)?
Internet structure: network of networks ,[object Object],[object Object],[object Object],Tier 1 ISP Tier 1 ISP Tier 1 ISP Tier-1 providers interconnect (peer) privately
Tier-1 ISP: e.g., Sprint … to/from customers peering to/from backbone …. … … … POP: point-of-presence
Internet structure: network of networks ,[object Object],[object Object],Tier 1 ISP Tier 1 ISP Tier 1 ISP Tier-2 ISP Tier-2 ISP Tier-2 ISP Tier-2 ISP Tier-2 ISP ,[object Object],[object Object],[object Object],Tier-2 ISPs also peer privately with each other.
Internet structure: network of networks ,[object Object],[object Object],Tier 1 ISP Tier 1 ISP Tier 1 ISP Tier-2 ISP Tier-2 ISP Tier-2 ISP Tier-2 ISP Tier-2 ISP local ISP local ISP local ISP local ISP local ISP Tier 3 ISP local ISP local ISP local ISP Local and tier- 3 ISPs are  customers  of higher tier ISPs connecting them to rest of Internet
Internet structure: network of networks ,[object Object],Tier 1 ISP Tier 1 ISP Tier 1 ISP Tier-2 ISP Tier-2 ISP Tier-2 ISP Tier-2 ISP Tier-2 ISP local ISP local ISP local ISP local ISP local ISP Tier 3 ISP local ISP local ISP local ISP
Chapter 1: roadmap ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
How do loss and delay occur? ,[object Object],[object Object],[object Object],A B packet being transmitted  (delay) packets queueing  (delay) free (available) buffers: arriving packets  dropped ( loss ) if no free buffers
Four sources of packet delay ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],A B propagation transmission nodal processing queueing
Delay in packet-switched networks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Note:  s and R are  very  different quantities! A B propagation transmission nodal processing queueing
Caravan analogy ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],toll  booth toll  booth ten-car  caravan 100 km 100 km
Caravan analogy (more) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],toll  booth toll  booth ten-car  caravan 100 km 100 km
Nodal delay ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Queueing delay (revisited) ,[object Object],[object Object],[object Object],traffic intensity = La/R ,[object Object],[object Object],[object Object]
“ Real” Internet delays and routes ,[object Object],[object Object],[object Object],[object Object],[object Object],3 probes 3 probes 3 probes
“ Real” Internet delays and routes 1  cs-gw (128.119.240.254)  1 ms  1 ms  2 ms 2  border1-rt-fa5-1-0.gw.umass.edu (128.119.3.145)  1 ms  1 ms  2 ms 3  cht-vbns.gw.umass.edu (128.119.3.130)  6 ms 5 ms 5 ms 4  jn1-at1-0-0-19.wor.vbns.net (204.147.132.129)  16 ms 11 ms 13 ms  5  jn1-so7-0-0-0.wae.vbns.net (204.147.136.136)  21 ms 18 ms 18 ms  6  abilene-vbns.abilene.ucaid.edu (198.32.11.9)  22 ms  18 ms  22 ms 7  nycm-wash.abilene.ucaid.edu (198.32.8.46)  22 ms  22 ms  22 ms 8  62.40.103.253 (62.40.103.253)  104 ms 109 ms 106 ms 9  de2-1.de1.de.geant.net (62.40.96.129)  109 ms 102 ms 104 ms 10  de.fr1.fr.geant.net (62.40.96.50)  113 ms 121 ms 114 ms 11  renater-gw.fr1.fr.geant.net (62.40.103.54)  112 ms  114 ms  112 ms 12  nio-n2.cssi.renater.fr (193.51.206.13)  111 ms  114 ms  116 ms 13  nice.cssi.renater.fr (195.220.98.102)  123 ms  125 ms  124 ms 14  r3t2-nice.cssi.renater.fr (195.220.98.110)  126 ms  126 ms  124 ms 15  eurecom-valbonne.r3t2.ft.net (193.48.50.54)  135 ms  128 ms  133 ms 16  194.214.211.25 (194.214.211.25)  126 ms  128 ms  126 ms 17  * * * 18  * * * 19  fantasia.eurecom.fr (193.55.113.142)  132 ms  128 ms  136   ms traceroute:  gaia.cs.umass.edu to www.eurecom.fr Three delay measurements from  gaia.cs.umass.edu to cs-gw.cs.umass.edu  * means no response (probe lost, router not replying) trans-oceanic link
Packet loss ,[object Object],[object Object],[object Object],A B packet being transmitted packet arriving to full buffer   is  lost buffer  (waiting area)
Throughput ,[object Object],[object Object],[object Object],server, with file of F bits  to send to client link capacity R s   bits/sec link capacity R c   bits/sec server sends bits  (fluid) into pipe pipe that can carry fluid at rate R s   bits/sec) pipe that can carry fluid at rate R c   bits/sec)
Throughput (more) ,[object Object],R s   bits/sec R c   bits/sec ,[object Object],R s   bits/sec R c   bits/sec link on end-end path that constrains  end-end throughput bottleneck link
Throughput: Internet scenario ,[object Object],[object Object],10 connections (fairly) share backbone bottleneck link R   bits/sec R s R s R s R c R c R c R
Chapter 1: roadmap ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Protocol “Layers” ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Organization of air travel ,[object Object],ticket (purchase) baggage (check) gates (load) runway takeoff airplane routing ticket (complain) baggage (claim) gates (unload) runway landing airplane routing airplane routing
Layering of airline functionality ,[object Object],[object Object],[object Object],ticket (purchase) baggage (check) gates (load) runway (takeoff) airplane routing departure airport arrival airport intermediate air-traffic control centers airplane routing airplane routing ticket (complain) baggage (claim gates (unload) runway (land) airplane routing ticket baggage gate takeoff/landing airplane routing
Why layering? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Internet protocol stack ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],application transport network link physical
ISO/OSI reference model ,[object Object],[object Object],[object Object],[object Object],[object Object],application presentation session transport network link physical
Encapsulation source application transport network link physical segment datagram destination application transport network link physical router switch message frame H t H n M H t H t H n H l M H t H n M H t M M network link physical link physical H t H n H l M H t H n M H t H n M H t H n H l M M H t M H n
Chapter 1: roadmap ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Network Security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Bad guys can put malware into hosts via Internet ,[object Object],[object Object],[object Object],[object Object]
Bad guys can put malware into hosts via Internet ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Sapphire Worm: aggregate scans/sec in first 5 minutes of outbreak (CAIDA, UWisc data)
Bad guys can attack servers and network infrastructure ,[object Object],[object Object],[object Object],[object Object],target
The bad guys can sniff packets ,[object Object],[object Object],[object Object],A B C ,[object Object],src:B dest:A  payload
The bad guys can use false source addresses ,[object Object],A B C src:B  dest:A  payload
The bad guys can record and playback ,[object Object],[object Object],A B C src:B dest:A  user: B; password: foo
Network Security ,[object Object],[object Object],[object Object]
Chapter 1: roadmap ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Internet History ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],1961-1972: Early packet-switching principles
Internet History ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],1972-1980: Internetworking, new and proprietary nets
Internet History ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],1980-1990: new protocols, a proliferation of networks
Internet History ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],1990, 2000’s: commercialization, the Web, new apps
Internet History ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Introduction: Summary ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

Mais conteúdo relacionado

Mais procurados

Chapter 1 - Computer Networking a top-down Approach 7th
Chapter 1 - Computer Networking a top-down Approach 7thChapter 1 - Computer Networking a top-down Approach 7th
Chapter 1 - Computer Networking a top-down Approach 7thAndy Juan Sarango Veliz
 
Lec 2 and_3
Lec 2 and_3Lec 2 and_3
Lec 2 and_3hz3012
 
Slides internet technology
Slides internet technologySlides internet technology
Slides internet technologyInexk Pedrero
 
Network protocols
Network protocolsNetwork protocols
Network protocolsIT Tech
 
communication and network concepts
communication and network concepts communication and network concepts
communication and network concepts Gunjan Mathur
 
1 introduction
1 introduction1 introduction
1 introductiongafurov_x
 
Network Devices & Media
Network Devices & MediaNetwork Devices & Media
Network Devices & MediaSoumyakatkam
 
Information Technology ITM1
Information Technology  ITM1Information Technology  ITM1
Information Technology ITM1Aram Mohammed
 
E business webinternet slides world wide web / protocols
E business webinternet slides  world wide web / protocolsE business webinternet slides  world wide web / protocols
E business webinternet slides world wide web / protocolsAsjadAli34
 
Community Wireless Networks
Community Wireless NetworksCommunity Wireless Networks
Community Wireless Networksdaveph
 
Computer network (12)
Computer network (12)Computer network (12)
Computer network (12)NYversity
 

Mais procurados (20)

Chapter 1 - Computer Networking a top-down Approach 7th
Chapter 1 - Computer Networking a top-down Approach 7thChapter 1 - Computer Networking a top-down Approach 7th
Chapter 1 - Computer Networking a top-down Approach 7th
 
1 introduction
1 introduction1 introduction
1 introduction
 
Lec 2 and_3
Lec 2 and_3Lec 2 and_3
Lec 2 and_3
 
Slides internet technology
Slides internet technologySlides internet technology
Slides internet technology
 
Network protocols
Network protocolsNetwork protocols
Network protocols
 
Networks Basics
Networks BasicsNetworks Basics
Networks Basics
 
Study guide1(1)
Study guide1(1)Study guide1(1)
Study guide1(1)
 
communication and network concepts
communication and network concepts communication and network concepts
communication and network concepts
 
1 introduction
1 introduction1 introduction
1 introduction
 
Chapter 1 v6.1
Chapter 1 v6.1Chapter 1 v6.1
Chapter 1 v6.1
 
Network Devices & Media
Network Devices & MediaNetwork Devices & Media
Network Devices & Media
 
Information Technology ITM1
Information Technology  ITM1Information Technology  ITM1
Information Technology ITM1
 
Ecommerce Chap 11
Ecommerce Chap 11Ecommerce Chap 11
Ecommerce Chap 11
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
E business webinternet slides world wide web / protocols
E business webinternet slides  world wide web / protocolsE business webinternet slides  world wide web / protocols
E business webinternet slides world wide web / protocols
 
Community Wireless Networks
Community Wireless NetworksCommunity Wireless Networks
Community Wireless Networks
 
Networking
NetworkingNetworking
Networking
 
Computer network (12)
Computer network (12)Computer network (12)
Computer network (12)
 
Chapter 4ver2
Chapter 4ver2Chapter 4ver2
Chapter 4ver2
 
Fg c
Fg cFg c
Fg c
 

Semelhante a Chapter1

Chapter_1 V6.1 absolute java original slides
Chapter_1 V6.1 absolute java original slidesChapter_1 V6.1 absolute java original slides
Chapter_1 V6.1 absolute java original slidesmzayed5
 
3150710 MATERIAL FOR STUDENTS FOR EXAMINATION
3150710 MATERIAL FOR STUDENTS FOR EXAMINATION3150710 MATERIAL FOR STUDENTS FOR EXAMINATION
3150710 MATERIAL FOR STUDENTS FOR EXAMINATIONjainyshah20
 
Week 1B.pdf Networking introduction week 1
Week 1B.pdf Networking introduction week 1Week 1B.pdf Networking introduction week 1
Week 1B.pdf Networking introduction week 1whiz5
 
Chapter_1_V7.01gsgsggsgshshsgabbsbshhsh.ppt
Chapter_1_V7.01gsgsggsgshshsgabbsbshhsh.pptChapter_1_V7.01gsgsggsgshshsgabbsbshhsh.ppt
Chapter_1_V7.01gsgsggsgshshsgabbsbshhsh.pptnetacc20052002
 
Tutorial Jaringan komputer
Tutorial Jaringan komputerTutorial Jaringan komputer
Tutorial Jaringan komputerAgus Kurniawan
 
Ch1 2ed 29_dec03
Ch1 2ed 29_dec03Ch1 2ed 29_dec03
Ch1 2ed 29_dec03Sugan Nalla
 
ComputerNetwork_Introductions_C1_en.pptx
ComputerNetwork_Introductions_C1_en.pptxComputerNetwork_Introductions_C1_en.pptx
ComputerNetwork_Introductions_C1_en.pptxhuypmg22git
 
Introduction to Computer Networking CYSE230
Introduction to Computer Networking CYSE230Introduction to Computer Networking CYSE230
Introduction to Computer Networking CYSE230killerbladex15
 
Chapter1 Introduction.pptx
Chapter1 Introduction.pptxChapter1 Introduction.pptx
Chapter1 Introduction.pptxhuanyuzhang5
 
Computer networking Chapter 3.hsjwjjajskwkkw
Computer networking Chapter 3.hsjwjjajskwkkwComputer networking Chapter 3.hsjwjjajskwkkw
Computer networking Chapter 3.hsjwjjajskwkkwAgentNawab
 

Semelhante a Chapter1 (20)

Chapter_1_V6.1.ppt
Chapter_1_V6.1.pptChapter_1_V6.1.ppt
Chapter_1_V6.1.ppt
 
Chapter_1 V6.1 absolute java original slides
Chapter_1 V6.1 absolute java original slidesChapter_1 V6.1 absolute java original slides
Chapter_1 V6.1 absolute java original slides
 
3150710 MATERIAL FOR STUDENTS FOR EXAMINATION
3150710 MATERIAL FOR STUDENTS FOR EXAMINATION3150710 MATERIAL FOR STUDENTS FOR EXAMINATION
3150710 MATERIAL FOR STUDENTS FOR EXAMINATION
 
Chapter_1_.pptx
Chapter_1_.pptxChapter_1_.pptx
Chapter_1_.pptx
 
Network th ITM3
Network th ITM3Network th ITM3
Network th ITM3
 
20CS2008 Computer Networks
20CS2008 Computer Networks20CS2008 Computer Networks
20CS2008 Computer Networks
 
Week 1B.pdf Networking introduction week 1
Week 1B.pdf Networking introduction week 1Week 1B.pdf Networking introduction week 1
Week 1B.pdf Networking introduction week 1
 
Chapter_1_V7.01gsgsggsgshshsgabbsbshhsh.ppt
Chapter_1_V7.01gsgsggsgshshsgabbsbshhsh.pptChapter_1_V7.01gsgsggsgshshsgabbsbshhsh.ppt
Chapter_1_V7.01gsgsggsgshshsgabbsbshhsh.ppt
 
Chapter_1_V7.01.ppt
Chapter_1_V7.01.pptChapter_1_V7.01.ppt
Chapter_1_V7.01.ppt
 
Tutorial Jaringan komputer
Tutorial Jaringan komputerTutorial Jaringan komputer
Tutorial Jaringan komputer
 
Lecture No. 1.ppt
Lecture No. 1.pptLecture No. 1.ppt
Lecture No. 1.ppt
 
Ch1 2ed 29_dec03
Ch1 2ed 29_dec03Ch1 2ed 29_dec03
Ch1 2ed 29_dec03
 
Chapter1 intro
Chapter1 introChapter1 intro
Chapter1 intro
 
ComputerNetwork_Introductions_C1_en.pptx
ComputerNetwork_Introductions_C1_en.pptxComputerNetwork_Introductions_C1_en.pptx
ComputerNetwork_Introductions_C1_en.pptx
 
Lecture1 intro
Lecture1 introLecture1 intro
Lecture1 intro
 
Introduction to Computer Networking CYSE230
Introduction to Computer Networking CYSE230Introduction to Computer Networking CYSE230
Introduction to Computer Networking CYSE230
 
Chapter1 Introduction.pptx
Chapter1 Introduction.pptxChapter1 Introduction.pptx
Chapter1 Introduction.pptx
 
Week1 lec2-bscs1
Week1 lec2-bscs1Week1 lec2-bscs1
Week1 lec2-bscs1
 
Computer networking Chapter 3.hsjwjjajskwkkw
Computer networking Chapter 3.hsjwjjajskwkkwComputer networking Chapter 3.hsjwjjajskwkkw
Computer networking Chapter 3.hsjwjjajskwkkw
 
Chapter_1_v8.1.pdf
Chapter_1_v8.1.pdfChapter_1_v8.1.pdf
Chapter_1_v8.1.pdf
 

Último

Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 

Último (20)

Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 

Chapter1

  • 1.
  • 2.
  • 3.
  • 4.
  • 5. “Cool” internet appliances World’s smallest web server http://www-ccs.cs.umass.edu/~shri/iPic.html IP picture frame http://www.ceiva.com/ Web-enabled toaster + weather forecaster Internet phones
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16. Residential access: cable modems Diagram: http://www.cabledatacomnews.com/cmic/diagram.html
  • 17. Cable Network Architecture: Overview home cable headend cable distribution network (simplified) Typically 500 to 5,000 homes
  • 18. Cable Network Architecture: Overview home cable headend cable distribution network server(s)
  • 19. Cable Network Architecture: Overview home cable headend cable distribution network (simplified)
  • 20. Cable Network Architecture: Overview home cable headend cable distribution network FDM (more shortly): Channels V I D E O V I D E O V I D E O V I D E O V I D E O V I D E O D A T A D A T A C O N T R O L 1 2 3 4 5 6 7 8 9
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31. Circuit Switching: FDM and TDM FDM frequency time TDM frequency time 4 users Example:
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39. Tier-1 ISP: e.g., Sprint … to/from customers peering to/from backbone …. … … … POP: point-of-presence
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52. “ Real” Internet delays and routes 1 cs-gw (128.119.240.254) 1 ms 1 ms 2 ms 2 border1-rt-fa5-1-0.gw.umass.edu (128.119.3.145) 1 ms 1 ms 2 ms 3 cht-vbns.gw.umass.edu (128.119.3.130) 6 ms 5 ms 5 ms 4 jn1-at1-0-0-19.wor.vbns.net (204.147.132.129) 16 ms 11 ms 13 ms 5 jn1-so7-0-0-0.wae.vbns.net (204.147.136.136) 21 ms 18 ms 18 ms 6 abilene-vbns.abilene.ucaid.edu (198.32.11.9) 22 ms 18 ms 22 ms 7 nycm-wash.abilene.ucaid.edu (198.32.8.46) 22 ms 22 ms 22 ms 8 62.40.103.253 (62.40.103.253) 104 ms 109 ms 106 ms 9 de2-1.de1.de.geant.net (62.40.96.129) 109 ms 102 ms 104 ms 10 de.fr1.fr.geant.net (62.40.96.50) 113 ms 121 ms 114 ms 11 renater-gw.fr1.fr.geant.net (62.40.103.54) 112 ms 114 ms 112 ms 12 nio-n2.cssi.renater.fr (193.51.206.13) 111 ms 114 ms 116 ms 13 nice.cssi.renater.fr (195.220.98.102) 123 ms 125 ms 124 ms 14 r3t2-nice.cssi.renater.fr (195.220.98.110) 126 ms 126 ms 124 ms 15 eurecom-valbonne.r3t2.ft.net (193.48.50.54) 135 ms 128 ms 133 ms 16 194.214.211.25 (194.214.211.25) 126 ms 128 ms 126 ms 17 * * * 18 * * * 19 fantasia.eurecom.fr (193.55.113.142) 132 ms 128 ms 136 ms traceroute: gaia.cs.umass.edu to www.eurecom.fr Three delay measurements from gaia.cs.umass.edu to cs-gw.cs.umass.edu * means no response (probe lost, router not replying) trans-oceanic link
  • 53.
  • 54.
  • 55.
  • 56.
  • 57.
  • 58.
  • 59.
  • 60.
  • 61.
  • 62.
  • 63.
  • 64. Encapsulation source application transport network link physical segment datagram destination application transport network link physical router switch message frame H t H n M H t H t H n H l M H t H n M H t M M network link physical link physical H t H n H l M H t H n M H t H n M H t H n H l M M H t M H n
  • 65.
  • 66.
  • 67.
  • 68.
  • 69.
  • 70.
  • 71.
  • 72.
  • 73.
  • 74.
  • 75.
  • 76.
  • 77.
  • 78.
  • 79.
  • 80.