This document provides an overview of the Domain Name System (DNS) including its hierarchical structure, services, and protocol. DNS acts as a distributed database that maps hostnames to IP addresses and vice versa. It is implemented through a global hierarchy of root servers, top-level domain servers like .com and .edu, and authoritative name servers for each organization. DNS uses a query/response system to look up mappings in a recursive or iterative process. Caching improves efficiency.
The document discusses the Domain Name System (DNS) and how it works to translate domain names to IP addresses. It explains the hierarchical structure of domain names from top-level domains down to subdomains. It also describes how DNS servers store and retrieve resource records containing IP address mappings for domain names. Finally, it provides examples of common resource record types used in the DNS.
The document describes a set of PowerPoint slides for a networking textbook. It provides instructions for using and modifying the slides, with the only requests being to mention the source and copyright if used for teaching or posted online.
Jaimin chp-7 - application layer- 2011 batchJaimin Jani
ย
The document summarizes key concepts related to computer networks and internet protocols. It discusses domain name system (DNS) which allows hosts to be referred to using names instead of IP addresses. It also describes electronic mail protocols like SMTP, POP3, IMAP and message formats. Other topics covered include application layer protocols like HTTP, FTP; network programming using sockets; multimedia protocols like MIME; and video and audio streaming protocols.
Module 1
Data communication components : Physical media, Packet switching, Circuit switching, Delay, loss and throughput,
Network topology, Protocols and standards, OSI model, Connecting LAN and virtual LAN
CCNA 1 Routing and Switching v5.0 Chapter 10Nil Menon
ย
The document discusses the application layer of the OSI model and common application layer protocols. It describes how protocols like HTTP, SMTP, POP, FTP, and SMB allow end-user applications to transfer files, emails and web pages across the network. DNS and DHCP are also covered as they provide important network services like translating domain names to IP addresses and assigning IP configuration to devices.
The document discusses various applications in the application layer of the Internet protocol stack, including the Domain Name System (DNS), electronic mail, the World Wide Web, streaming audio and video, and content delivery. It provides details on DNS, describing how domain names are organized hierarchically and mapped to IP addresses, and how name servers function to look up domain names. It also gives overviews of electronic mail/email, noting its widespread use both personally and for business, and the problem of spam.
The document discusses computer networks and email. It describes how DNS works by converting domain names to IP addresses so humans can access websites using names instead of numbers. It then explains the basic architecture of email, including common email providers and protocols like SMTP, POP, and IMAP. SMTP is used to transfer messages between servers, while POP and IMAP deal with receiving and accessing emails from the server. The document also provides details on email message format, with the header containing sender/recipient info and the body containing the actual content.
The document discusses various application layer protocols including DNS, SMTP, FTP, HTTP, and web applications. It provides the following key points:
- Application layer protocols are divided into those used directly by users like email and those that support user protocols like DNS.
- DNS translates domain names to IP addresses to direct web traffic. SMTP is used for email transmission over the internet while FTP transfers files.
- HTTP transfers web pages over the internet in a similar way to FTP but delivers messages immediately unlike SMTP's store-and-forward system.
- The world wide web is a collection of globally linked web pages accessed through URLs over HTTP using the client-server model of a web server producing and delivering information to
This document discusses application layer protocols. It provides an overview of the architecture of the World Wide Web including how web pages are composed of multiple objects accessed via URLs. It also summarizes HTTP, describing its request/response paradigm and stateless nature. Additionally, it covers FTP for file transfer between clients and servers, including its use of separate control and data connections, and Telnet for remote login sessions.
The document discusses the application layer in computer networks and describes how it interacts with users through applications and uses TCP or UDP to transmit data, covering topics like the domain name system, HTTP requests and responses, email sending and receiving processes, and how proxies and cookies work. It also explains concepts like persistent connections, conditional downloads, and dynamic web pages using client-side and server-side processing.
The document discusses slides being made freely available for use in substantially unaltered form with attribution, notes the copyright of the material, and encourages readers to enjoy the slides on topics including principles of network applications, popular protocols like HTTP, FTP, and DNS, and socket programming.
This document discusses the link layer and provides an overview of its services and context. It describes how the link layer is implemented in network interface cards and how these cards encapsulate datagrams into frames. It also outlines the topics to be covered, including error detection and correction, multiple access protocols, local area networks, and link virtualization.
The application layer is the topmost layer of the OSI model. It provides services to software applications and users including email, file transfer, web access, and directory services. Domain Name Service (DNS) translates human-friendly domain names to IP addresses, allowing applications and users to access resources by name. Electronic mail systems use SMTP for message transfer between mail servers and access protocols like POP and IMAP for users to retrieve messages from their mailboxes on servers. The Hypertext Transfer Protocol (HTTP) underlies the World Wide Web, with clients making requests from and servers responding with web pages and other objects. While the application layer enables useful services, special client software or proxy servers may be required, and intensive processing is needed for applications
This document describes slides for a chapter on the transport layer. It states that the slides can be freely used and modified for educational purposes with proper attribution. It asks users to mention the source if the slides are used for a class and to note any adaptation if slides are posted online. The document also provides copyright information for the material.
The application layer allows users to interface with networks through application layer protocols like HTTP, SMTP, POP3, FTP, Telnet, and DHCP. It provides the interface between applications on different ends of a network. Common application layer protocols include DNS for mapping domain names to IP addresses, HTTP for transferring web page data, and SMTP/POP3 for sending and receiving email messages. The client/server and peer-to-peer models describe how requests are made and fulfilled over the application layer.
This document discusses the network layer and IP protocol. It begins by explaining the key functions of the network layer, including forwarding, routing, and connection setup in some network architectures. It then explains the differences between virtual circuit and datagram networks, as well as the forwarding and routing processes. The document outlines the chapter and describes the IP datagram format and functions of the IP, ICMP, and routing protocols. It also provides details about router architecture and functions.
The document outlines a syllabus for a computer networks course taught by Usha Barad. The syllabus covers 5 topics: 1) introduction to computer networks and the Internet, 2) application layer, 3) transport layer, 4) network layer, and 5) link layer and local area networks. It also lists recommended reference books for the course.
This document provides an overview and outline of topics to be covered in Chapter 4 of the textbook "Computer Networking: A Top Down Approach". The chapter will cover the network layer data plane, including how routers work, IP as an internet protocol, and generalized forwarding. It outlines key concepts like forwarding, routing, and the difference between the data and control planes. It also summarizes the internal components and functions of a router, like lookup and switching fabrics.
HTTP is an application layer protocol for transmitting hypermedia documents across the internet. It uses a request-response model where clients make requests which are serviced by HTTP servers. Common HTTP request methods include GET, POST, PUT and DELETE. A GET request retrieves a resource from the server, while POST submits data to be processed. The HTTP protocol defines the format of requests and responses, including request headers, response status codes and more. Other application layer protocols discussed include SMTP for email transmission and POP3 for retrieving emails from a server.
The document summarizes the application layer of the OSI model. It discusses the World Wide Web and how browsers work to fetch and display web pages. It describes the client-server model of the web including how browsers resolve URLs and make requests to web servers. It also covers HTML, URLs, DNS, and how static and dynamic web pages are generated both on the client-side using JavaScript and on the server-side using languages like PHP.
DNS maps domain names to IP addresses by using a distributed database and servers. It translates human-friendly domain names like www.example.com to numerical IP addresses like 192.0.2.1 that computers use to locate each other on the network. The DNS database contains resource records that associate domain names with IP addresses and other information. Name servers query the DNS database to resolve domain names and return IP addresses to applications and users.
The document discusses the key aspects of Chapter 7 in a computer networking textbook. It provides an outline of the chapter topics, which cover wireless links and characteristics such as CDMA, IEEE 802.11 wireless LANs, cellular networks and standards, and principles of mobility including Mobile IP and handling mobility in cellular networks. It also includes slides on specific elements and functioning of wireless networks, 802.11 protocols, and capabilities such as rate adaptation.
The document discusses the structure of the Internet as a network of networks. It describes how access ISPs connect end systems to the Internet. To scale efficiently, access ISPs connect to regional ISPs, which in turn connect to global transit ISPs. This hierarchy of interconnections forms the complex network of networks that is the Internet. Economic agreements between customer and provider ISPs drive this evolved structure.
This document discusses protocols for real-time multimedia applications such as voice over IP. It introduces the Real-Time Protocol (RTP) which specifies packet structures for carrying audio and video data. RTP runs on top of UDP, providing functions like payload type identification, sequence numbering, and time stamping. It allows for interoperability between multimedia applications that both implement RTP. The document also discusses the Session Initiation Protocol (SIP) which is used to initialize multimedia sessions and exchange session description and control messages.
The document discusses several topics related to computer networks including DHCP, DNS, Telnet, SSH, FTP, HTTP, and electronic mail protocols. It describes how DHCP automatically assigns IP addresses to devices on a network. It also explains the domain name system (DNS), which maps human-friendly domain names to IP addresses and vice versa, allowing computers to connect to other computers using names instead of numeric IP addresses. Additional sections cover protocols for remote login (Telnet, SSH), file transfer (FTP), web protocols (HTTP, URLs, cookies), and electronic mail (SMTP, POP, IMAP, MIME).
DNS translates domain names like www.google.com to IP addresses so that internet resources can be accessed in a meaningful way independent of location. HTTP defines how web pages are requested and transmitted between browsers and servers, such as when typing a website domain into the browser address bar. FTP and SMTP are protocols for transferring files and email messages between servers.
Two ill men shared a hospital room, one by the window and one confined to his bed. Each afternoon, the man by the window described the beautiful scenery outside to his roommate, who lived vicariously through the descriptions. After some time, the man by the window passed away, and the other man asked to move by the window. However, when he looked outside, he saw only a blank wall. The nurse informed him that the deceased man had been blind and could not see outside at all - he had simply been trying to encourage and broaden the perspective of his roommate.
This document provides an overview and objectives for a computer networking course. It will cover networking fundamentals including OSI layers, medium access control protocols, the data link layer, network layer issues, and the transport layer. It will also provide an overview of physical network topologies, connectivity devices, logical topologies, common networking protocols like TCP/IP, and application layer protocols. Important due dates for assignments and exams are also listed.
The document discusses computer networks and email. It describes how DNS works by converting domain names to IP addresses so humans can access websites using names instead of numbers. It then explains the basic architecture of email, including common email providers and protocols like SMTP, POP, and IMAP. SMTP is used to transfer messages between servers, while POP and IMAP deal with receiving and accessing emails from the server. The document also provides details on email message format, with the header containing sender/recipient info and the body containing the actual content.
The document discusses various application layer protocols including DNS, SMTP, FTP, HTTP, and web applications. It provides the following key points:
- Application layer protocols are divided into those used directly by users like email and those that support user protocols like DNS.
- DNS translates domain names to IP addresses to direct web traffic. SMTP is used for email transmission over the internet while FTP transfers files.
- HTTP transfers web pages over the internet in a similar way to FTP but delivers messages immediately unlike SMTP's store-and-forward system.
- The world wide web is a collection of globally linked web pages accessed through URLs over HTTP using the client-server model of a web server producing and delivering information to
This document discusses application layer protocols. It provides an overview of the architecture of the World Wide Web including how web pages are composed of multiple objects accessed via URLs. It also summarizes HTTP, describing its request/response paradigm and stateless nature. Additionally, it covers FTP for file transfer between clients and servers, including its use of separate control and data connections, and Telnet for remote login sessions.
The document discusses the application layer in computer networks and describes how it interacts with users through applications and uses TCP or UDP to transmit data, covering topics like the domain name system, HTTP requests and responses, email sending and receiving processes, and how proxies and cookies work. It also explains concepts like persistent connections, conditional downloads, and dynamic web pages using client-side and server-side processing.
The document discusses slides being made freely available for use in substantially unaltered form with attribution, notes the copyright of the material, and encourages readers to enjoy the slides on topics including principles of network applications, popular protocols like HTTP, FTP, and DNS, and socket programming.
This document discusses the link layer and provides an overview of its services and context. It describes how the link layer is implemented in network interface cards and how these cards encapsulate datagrams into frames. It also outlines the topics to be covered, including error detection and correction, multiple access protocols, local area networks, and link virtualization.
The application layer is the topmost layer of the OSI model. It provides services to software applications and users including email, file transfer, web access, and directory services. Domain Name Service (DNS) translates human-friendly domain names to IP addresses, allowing applications and users to access resources by name. Electronic mail systems use SMTP for message transfer between mail servers and access protocols like POP and IMAP for users to retrieve messages from their mailboxes on servers. The Hypertext Transfer Protocol (HTTP) underlies the World Wide Web, with clients making requests from and servers responding with web pages and other objects. While the application layer enables useful services, special client software or proxy servers may be required, and intensive processing is needed for applications
This document describes slides for a chapter on the transport layer. It states that the slides can be freely used and modified for educational purposes with proper attribution. It asks users to mention the source if the slides are used for a class and to note any adaptation if slides are posted online. The document also provides copyright information for the material.
The application layer allows users to interface with networks through application layer protocols like HTTP, SMTP, POP3, FTP, Telnet, and DHCP. It provides the interface between applications on different ends of a network. Common application layer protocols include DNS for mapping domain names to IP addresses, HTTP for transferring web page data, and SMTP/POP3 for sending and receiving email messages. The client/server and peer-to-peer models describe how requests are made and fulfilled over the application layer.
This document discusses the network layer and IP protocol. It begins by explaining the key functions of the network layer, including forwarding, routing, and connection setup in some network architectures. It then explains the differences between virtual circuit and datagram networks, as well as the forwarding and routing processes. The document outlines the chapter and describes the IP datagram format and functions of the IP, ICMP, and routing protocols. It also provides details about router architecture and functions.
The document outlines a syllabus for a computer networks course taught by Usha Barad. The syllabus covers 5 topics: 1) introduction to computer networks and the Internet, 2) application layer, 3) transport layer, 4) network layer, and 5) link layer and local area networks. It also lists recommended reference books for the course.
This document provides an overview and outline of topics to be covered in Chapter 4 of the textbook "Computer Networking: A Top Down Approach". The chapter will cover the network layer data plane, including how routers work, IP as an internet protocol, and generalized forwarding. It outlines key concepts like forwarding, routing, and the difference between the data and control planes. It also summarizes the internal components and functions of a router, like lookup and switching fabrics.
HTTP is an application layer protocol for transmitting hypermedia documents across the internet. It uses a request-response model where clients make requests which are serviced by HTTP servers. Common HTTP request methods include GET, POST, PUT and DELETE. A GET request retrieves a resource from the server, while POST submits data to be processed. The HTTP protocol defines the format of requests and responses, including request headers, response status codes and more. Other application layer protocols discussed include SMTP for email transmission and POP3 for retrieving emails from a server.
The document summarizes the application layer of the OSI model. It discusses the World Wide Web and how browsers work to fetch and display web pages. It describes the client-server model of the web including how browsers resolve URLs and make requests to web servers. It also covers HTML, URLs, DNS, and how static and dynamic web pages are generated both on the client-side using JavaScript and on the server-side using languages like PHP.
DNS maps domain names to IP addresses by using a distributed database and servers. It translates human-friendly domain names like www.example.com to numerical IP addresses like 192.0.2.1 that computers use to locate each other on the network. The DNS database contains resource records that associate domain names with IP addresses and other information. Name servers query the DNS database to resolve domain names and return IP addresses to applications and users.
The document discusses the key aspects of Chapter 7 in a computer networking textbook. It provides an outline of the chapter topics, which cover wireless links and characteristics such as CDMA, IEEE 802.11 wireless LANs, cellular networks and standards, and principles of mobility including Mobile IP and handling mobility in cellular networks. It also includes slides on specific elements and functioning of wireless networks, 802.11 protocols, and capabilities such as rate adaptation.
The document discusses the structure of the Internet as a network of networks. It describes how access ISPs connect end systems to the Internet. To scale efficiently, access ISPs connect to regional ISPs, which in turn connect to global transit ISPs. This hierarchy of interconnections forms the complex network of networks that is the Internet. Economic agreements between customer and provider ISPs drive this evolved structure.
This document discusses protocols for real-time multimedia applications such as voice over IP. It introduces the Real-Time Protocol (RTP) which specifies packet structures for carrying audio and video data. RTP runs on top of UDP, providing functions like payload type identification, sequence numbering, and time stamping. It allows for interoperability between multimedia applications that both implement RTP. The document also discusses the Session Initiation Protocol (SIP) which is used to initialize multimedia sessions and exchange session description and control messages.
The document discusses several topics related to computer networks including DHCP, DNS, Telnet, SSH, FTP, HTTP, and electronic mail protocols. It describes how DHCP automatically assigns IP addresses to devices on a network. It also explains the domain name system (DNS), which maps human-friendly domain names to IP addresses and vice versa, allowing computers to connect to other computers using names instead of numeric IP addresses. Additional sections cover protocols for remote login (Telnet, SSH), file transfer (FTP), web protocols (HTTP, URLs, cookies), and electronic mail (SMTP, POP, IMAP, MIME).
DNS translates domain names like www.google.com to IP addresses so that internet resources can be accessed in a meaningful way independent of location. HTTP defines how web pages are requested and transmitted between browsers and servers, such as when typing a website domain into the browser address bar. FTP and SMTP are protocols for transferring files and email messages between servers.
Two ill men shared a hospital room, one by the window and one confined to his bed. Each afternoon, the man by the window described the beautiful scenery outside to his roommate, who lived vicariously through the descriptions. After some time, the man by the window passed away, and the other man asked to move by the window. However, when he looked outside, he saw only a blank wall. The nurse informed him that the deceased man had been blind and could not see outside at all - he had simply been trying to encourage and broaden the perspective of his roommate.
This document provides an overview and objectives for a computer networking course. It will cover networking fundamentals including OSI layers, medium access control protocols, the data link layer, network layer issues, and the transport layer. It will also provide an overview of physical network topologies, connectivity devices, logical topologies, common networking protocols like TCP/IP, and application layer protocols. Important due dates for assignments and exams are also listed.
Exponential and Logarthmic funtions (1)Ghaffar Khan
ย
The document discusses exponential decay functions related to drug excretion from the bloodstream over time. It provides an example where an initial 300mg dosage of a drug is half excreted from the bloodstream every 4 hours. It asks the reader to determine the exponential function that models the drug amount A over time t measured in 4 hour increments, and uses that function to calculate the remaining drug amounts after specific time periods.
This document provides an overview of chapter 1 of a computer networks course. It introduces key topics that will be covered, including network hardware, network software, reference models (OSI and TCP/IP), example networks (Novell Netware, ARPANET, NSFNET, Internet), and example data communication services. It discusses concepts like layers, protocols, interfaces, services, and connection-oriented vs connectionless networks at a high level.
This document provides an outline for a textbook on computer networks. It begins with an introduction to computer networks, including their uses in business and home applications. It then discusses network hardware, software, and reference models. Several example networks are described, including the Internet, ATM, Ethernet, and wireless LANs. It concludes with a section on network standardization bodies.
The document introduces computer networking concepts including definitions, advantages, disadvantages, classifications and topologies. It defines a network as connecting computers to share resources. Local area networks connect computers in a small area like a building, while wide area networks connect LANs across cities/countries. Key networking hardware includes network interface cards, repeaters, hubs, bridges, routers and switches.
The network layer is responsible for routing packets from source to destination using a routing algorithm. The routing algorithm must deal with issues of correctness, stability, fairness, and optimality. The network layer also handles congestion when more packets enter an area than can be processed. When connecting different network technologies, the same problems are present but are worse as packets may travel through many different networks with different formats and technologies.
The document provides an overview of computer networking fundamentals including:
- The seven layers of the OSI reference model and their functions from physical transmission to application interfaces.
- Reasons for using a layered networking model including modularity, interoperability, and error checking.
- Key networking concepts such as MAC addresses, connection-oriented vs. connectionless transmission, and data encapsulation.
- The document discusses a PowerPoint presentation on computer networking and the Internet.
- It provides an overview of topics to be covered in the chapter including what the Internet is, its structure at the network edge and core, performance issues, protocol layers, security, and history.
- The presentation will use examples from the Internet to help students understand networking concepts and terminology at a high level before covering them in more depth later.
Chapter_1 V6.1 absolute java original slidesmzayed5
ย
The document introduces a set of slides for a lecture on computer networking, noting that the slides can be freely used and modified provided proper attribution is given. It includes a title slide with the course name and authors, as well as an overview slide of the topics that will be covered in the chapter, including what the Internet is, network edge components, the network core, performance factors, protocol layers, security, and the history of networking.
The document discusses slides that are being made freely available for use in teaching networking concepts. It states that the slides can be modified as needed but requests that their source is credited if used for teaching and their copyright is noted if posted online. The slides are from the textbook "Computer Networking: A Top Down Approach" by Jim Kurose and Keith Ross.
3150710 MATERIAL FOR STUDENTS FOR EXAMINATIONjainyshah20
ย
- The document is an introduction to a textbook on computer networking. It provides an overview of topics that will be covered in more depth later in the course.
- It describes what the Internet is at both a "nuts and bolts" level as well as from the perspective of the services it provides applications. Key components include end systems, access networks, physical media, and the interconnected core routers that make up the network of networks.
- The document introduces concepts like protocols, packet switching, delay, loss and throughput that will be important for understanding how information is transmitted over the Internet.
Chapter_1_V7.01.ppt The client sends one request message for the HTML file, a...MushaimAftab
ย
The client sends one request message for the HTML file, and the server responds with the HTML file and three additional response messages for the images.The client sends one request message for the HTML file, and the server responds with the HTML file and three additional response messages for the images.The client sends one request message for the HTML file, and the server responds with the HTML file and three additional response messages for the images. The client sends one request message for the HTML file, and the server responds with the HTML file and three additional response messages for the images.
Under circuit switching, each user is allocated the full 1 Gbps bandwidth when active, even though they only need 100 Mbps. Therefore, the 1 Gbps link can only support 1 user. Under packet switching, the link bandwidth is statistical multiplexed among users. Since each user is active only 10% of the time, the 1 Gbps link can support up to 10 users.
This document introduces a chapter on computer networking. It provides an overview of key topics that will be covered in more depth later, including what the Internet is, what protocols are, the network edge involving hosts and access networks, the network core involving packet and circuit switching, and performance metrics like loss, delay and throughput. It also briefly discusses protocol layers, security, and the history of the Internet. Examples of Internet-connected devices are given to illustrate the wide range of applications and devices that now use the Internet.
The document provides an overview of computer networking and the Internet. It defines what the Internet is, describing it as a network of networks that connects billions of computing devices worldwide. It also defines what a protocol is, explaining that all communication activity on the Internet is governed by protocols that define the format and order of messages sent between network entities. The document further describes the key components of network infrastructure, including end systems, access networks, physical media, and the network core which consists of interconnected routers that forward packets using routing algorithms. It also explains the differences between packet switching and circuit switching in network cores.
Packet switching is better suited than circuit switching for bursty data traffic because it allows statistical multiplexing and sharing of network resources. However, excessive congestion in packet switched networks can lead to increased packet delay and loss. Protocols are needed for reliable data transfer and congestion control to help provide circuit-like behavior when needed.
A computer network is a collection of interconnected devices that can communicate with each other to share resources and information. These devices can include computers, servers, routers, switches, printers, and more. Networks can vary in size and complexity, from small local networks within a home or office to vast global networks like the internet.
The document provides an overview of the key topics that will be covered in Chapter 1 of the textbook "Computer Networking: A Top Down Approach". It outlines the major sections that will be discussed including what the Internet is, the structure of networks including the network edge, core, and hierarchy. It also summarizes that delay, loss, throughput, protocol layers, security, and history will be covered. The goal is to provide an introduction and "feel" for computer networking concepts and terminology that will be explored in more depth throughout the course.
The document provides an overview of computer network structure and the Internet. It discusses that networks have an edge consisting of hosts and access networks, and a core consisting of interconnected routers. There are two main approaches for connecting routers in the core: circuit switching and packet switching. Packet switching is the dominant approach used in today's Internet. It allows for intermittent delays and packet losses that can occur when arrival rates exceed link capacities for short periods. The document then describes the hierarchical structure of the global Internet, where access networks connect to regional and transit ISPs, which are in turn interconnected through peering links and internet exchange points.
The document provides an overview of computer networking and the Internet, explaining what the Internet is, how it works, and its basic components. It describes how end systems connect to access networks like DSL, cable, and WiFi, and how access networks interconnect through the network core of routers using packet switching. The document also outlines the layered architecture of network protocols that allow applications to communicate over the Internet.
The document provides an overview of computer networking and the Internet, describing what the Internet is, how it works, and its basic components. It explains that the Internet is a network of networks comprised of end systems, access networks, physical media, routers that forward packets, and protocols that control communication. The document also outlines some of the key concepts in computer networking like packet switching, circuit switching, delay, loss, and throughput to provide context around how the Internet functions at a high level.
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...Noah Loul
ย
Artificial intelligence is changing how businesses operate. Companies are using AI agents to automate tasks, reduce time spent on repetitive work, and focus more on high-value activities. Noah Loul, an AI strategist and entrepreneur, has helped dozens of companies streamline their operations using smart automation. He believes AI agents aren't just toolsโthey're workers that take on repeatable tasks so your human team can focus on what matters. If you want to reduce time waste and increase output, AI agents are the next move.
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...Impelsys Inc.
ย
Impelsys provided a robust testing solution, leveraging a risk-based and requirement-mapped approach to validate ICU Connect and CritiXpert. A well-defined test suite was developed to assess data communication, clinical data collection, transformation, and visualization across integrated devices.
Special Meetup Edition - TDX Bengaluru Meetup #52.pptxshyamraj55
ย
Weโre bringing the TDX energy to our community with 2 power-packed sessions:
๐ ๏ธ Workshop: MuleSoft for Agentforce
Explore the new version of our hands-on workshop featuring the latest Topic Center and API Catalog updates.
๐ Talk: Power Up Document Processing
Dive into smart automation with MuleSoft IDP, NLP, and Einstein AI for intelligent document workflows.
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep DiveScyllaDB
ย
Want to learn practical tips for designing systems that can scale efficiently without compromising speed?
Join us for a workshop where weโll address these challenges head-on and explore how to architect low-latency systems using Rust. During this free interactive workshop oriented for developers, engineers, and architects, weโll cover how Rustโs unique language features and the Tokio async runtime enable high-performance application development.
As you explore key principles of designing low-latency systems with Rust, you will learn how to:
- Create and compile a real-world app with Rust
- Connect the application to ScyllaDB (NoSQL data store)
- Negotiate tradeoffs related to data modeling and querying
- Manage and monitor the database for consistently low latencies
How Can I use the AI Hype in my Business Context?Daniel Lehner
ย
๐๐จ ๐ผ๐ ๐๐ช๐จ๐ฉ ๐๐ฎ๐ฅ๐? ๐๐ง ๐๐จ ๐๐ฉ ๐ฉ๐๐ ๐๐๐ข๐ ๐๐๐๐ฃ๐๐๐ง ๐ฎ๐ค๐ช๐ง ๐๐ช๐จ๐๐ฃ๐๐จ๐จ ๐ฃ๐๐๐๐จ?
Everyoneโs talking about AI but is anyone really using it to create real value?
Most companies want to leverage AI. Few know ๐ต๐ผ๐.
โ What exactly should you ask to find real AI opportunities?
โ Which AI techniques actually fit your business?
โ Is your data even ready for AI?
If youโre not sure, youโre not alone. This is a condensed version of the slides I presented at a Linkedin webinar for Tecnovy on 28.04.2025.
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptxAnoop Ashok
ย
In today's fast-paced retail environment, efficiency is key. Every minute counts, and every penny matters. One tool that can significantly boost your store's efficiency is a well-executed planogram. These visual merchandising blueprints not only enhance store layouts but also save time and money in the process.
What is Model Context Protocol(MCP) - The new technology for communication bw...Vishnu Singh Chundawat
ย
The MCP (Model Context Protocol) is a framework designed to manage context and interaction within complex systems. This SlideShare presentation will provide a detailed overview of the MCP Model, its applications, and how it plays a crucial role in improving communication and decision-making in distributed systems. We will explore the key concepts behind the protocol, including the importance of context, data management, and how this model enhances system adaptability and responsiveness. Ideal for software developers, system architects, and IT professionals, this presentation will offer valuable insights into how the MCP Model can streamline workflows, improve efficiency, and create more intuitive systems for a wide range of use cases.
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...Aqusag Technologies
ย
In late April 2025, a significant portion of Europe, particularly Spain, Portugal, and parts of southern France, experienced widespread, rolling power outages that continue to affect millions of residents, businesses, and infrastructure systems.
TrsLabs - Fintech Product & Business ConsultingTrs Labs
ย
Hybrid Growth Mandate Model with TrsLabs
Strategic Investments, Inorganic Growth, Business Model Pivoting are critical activities that business don't do/change everyday. In cases like this, it may benefit your business to choose a temporary external consultant.
An unbiased plan driven by clearcut deliverables, market dynamics and without the influence of your internal office equations empower business leaders to make right choices.
Getting things done within a budget within a timeframe is key to Growing Business - No matter whether you are a start-up or a big company
Talk to us & Unlock the competitive advantage
Technology Trends in 2025: AI and Big Data AnalyticsInData Labs
ย
At InData Labs, we have been keeping an ear to the ground, looking out for AI-enabled digital transformation trends coming our way in 2025. Our report will provide a look into the technology landscape of the future, including:
-Artificial Intelligence Market Overview
-Strategies for AI Adoption in 2025
-Anticipated drivers of AI adoption and transformative technologies
-Benefits of AI and Big data for your business
-Tips on how to prepare your business for innovation
-AI and data privacy: Strategies for securing data privacy in AI models, etc.
Download your free copy nowand implement the key findings to improve your business.
Spark is a powerhouse for large datasets, but when it comes to smaller data workloads, its overhead can sometimes slow things down. What if you could achieve high performance and efficiency without the need for Spark?
At S&P Global Commodity Insights, having a complete view of global energy and commodities markets enables customers to make data-driven decisions with confidence and create long-term, sustainable value. ๐
Explore delta-rs + CDC and how these open-source innovations power lightweight, high-performance data applications beyond Spark! ๐
1. Introduction 1-1
Chapter 1
Introduction
Computer
Networking: A Top
Down Approach
6th
edition
Jim Kurose, Keith Ross
Addison-Wesley
March 2012
A note on the use of these ppt slides:
Weโre making these slides freely available to all (faculty, students, readers).
Theyโre in PowerPoint form so you see the animations; and can add, modify,
and delete slides (including this one) and slide content to suit your needs.
They obviously represent a lot of work on our part. In return for use, we only
ask the following:
๏ถ If you use these slides (e.g., in a class) that you mention their source
(after all, weโd like people to use our book!)
๏ถ If you post any slides on a www site, that you note that they are adapted
from (or perhaps identical to) our slides, and note our copyright of this
material.
Thanks and enjoy! JFK/KWR
All material copyright 1996-2012
J.F Kurose and K.W. Ross, All Rights Reserved
2. Introduction
Chapter 1: introduction
our goal:
๏ถ get โfeelโ and
terminology
๏ถ more depth, detail
later in course
๏ถ approach:
๏ง use Internet as
example
overview:
๏ถ whatโs the Internet?
๏ถ whatโs a protocol?
๏ถ network edge; hosts, access net,
physical media
๏ถ network core: packet/circuit
switching, Internet structure
๏ถ performance: loss, delay, throughput
๏ถ security
๏ถ protocol layers, service models
๏ถ history
1-2
3. Introduction
Chapter 1: roadmap
1.1 what is the Internet?
1.2 network edge
๏ง end systems, access networks, links
1.3 network core
๏ง packet switching, circuit switching, network structure
1.4 delay, loss, throughput in networks
1.5 protocol layers, service models
1.6 networks under attack: security
1.7 history
1-3
4. Introduction
Whatโs the Internet:โnuts and boltsโ view
๏ถmillions of connected
computing devices:
๏ง hosts = end systems
๏ง running network apps
๏ถcommunication links
๏ง fiber, copper,
radio, satellite
๏ง transmission rate:
bandwidth
๏ถPacket switches: forward
packets (chunks of data)
๏ง routers and switches
wired
links
wireless
links
router
mobile network
global ISP
regional ISP
home
network
institutional
network
smartphone
PC
server
wireless
laptop
1-4
5. A day in the life of an application
e.g., Comcast
Googleโs networkweb server
DNS server
school network
web page
browser ISP network
wireless
access point
campus
access switch
6. Introduction
โFunโ internet appliances
IP picture frame
http://www.ceiva.com/
Web-enabled toaster +
weather forecaster
Internet phones
Internet
refrigerator
Slingbox: watch,
control cable TV remotely
1-6
Tweet-a-watt:
monitor energy use
web-enabled
music/shopping/etc
7. Introduction
๏ถ Internet: โnetwork of networksโ
๏ง Interconnected ISPs
๏ถ protocols control sending, receiving
of msgs
๏ง e.g.,TCP, IP, HTTP, Skype, 802.11
๏ถ Internet standards
๏ง RFC: Request for comments
๏ง IETF: Internet EngineeringTask Force
Whatโs the Internet: โnuts and boltsโ view
mobile network
global ISP
regional ISP
home
network
institutional
network
1-7
8. Whatโs the Internet: a service view
๏ถ Infrastructure that provides
services to applications:
๏ง Web,VoIP, email, games, e-
commerce, social nets, โฆ
๏ถ provides programming
interface to apps
๏ง hooks that allow sending
and receiving app programs
to โconnectโ to Internet
๏ง provides service options,
analogous to postal service
mobile network
global ISP
regional ISP
home
network
institutional
network
Introduction 1-8
9. Introduction
Whatโs a protocol?
human protocols:
๏ถ โwhatโs the time?โ
๏ถ โI have a questionโ
๏ถ introductions
โฆ specific msgs sent
โฆ specific actions taken
when msgs received, or
other events
network protocols:
๏ถ machines rather than
humans
๏ถ all communication activity
in Internet governed by
protocols
protocols define format, order
of msgs sent and received
among network entities,
and actions taken on msg
transmission, receipt
1-9
10. Introduction
a human protocol and a computer network protocol:
Q: other human protocols?
Hi
Hi
Got the
time?
2:00
TCP connection
response
Get http://www.awl.com/kurose-ross
<file>
time
TCP connection
request
Whatโs a protocol?
1-10
11. Introduction
Chapter 1: roadmap
1.1 what is the Internet?
1.2 network edge
๏ง end systems, access networks, links
1.3 network core
๏ง packet switching, circuit switching, network structure
1.4 delay, loss, throughput in networks
1.5 protocol layers, service models
1.6 networks under attack: security
1.7 history
1-11
12. Introduction
A closer look at network structure:
๏ถ network edge:
๏ง hosts: clients and servers
๏ง servers often in data
centers
๏ถ access networks, physical
media: wired, wireless
communication links
๏ถ network core:
๏งinterconnected routers
๏งnetwork of networks
mobile network
global ISP
regional ISP
home
network
institutional
network
1-12
13. Introduction
Access networks and physical media
Q: How to connect end
systems to edge router?
๏ถ residential access nets
๏ถ institutional access
networks (school, company)
๏ถ mobile access networks
keep in mind:
๏ถ bandwidth (bits per second)
of access network?
๏ถ shared or dedicated?
1-13
14. Introduction
Physical media
๏ถ bit: propagates between
transmitter/receiver pairs
๏ถ physical link: what lies
between transmitter &
receiver
๏ถ guided media:
๏ง signals propagate in solid
media: copper, fiber, coax
๏ถ unguided media:
๏ง signals propagate freely,
e.g., radio
twisted pair (TP)
๏ถ two insulated copper
wires
๏ง Category 5: 100 Mbps, 1
Gpbs Ethernet
๏ง Category 6: 10Gbps
1-14
15. Introduction
Physical media: coax, fiber
coaxial cable:
๏ถ two concentric copper
conductors
๏ถ bidirectional
๏ถ broadband:
๏ง multiple channels on cable
๏ง HFC
fiber optic cable:
๏ถ glass fiber carrying light
pulses, each pulse a bit
๏ถ high-speed operation:
๏ง high-speed point-to-point
transmission (e.g., 10โs-100โs
Gpbs transmission rate)
๏ถ low error rate:
๏ง repeaters spaced far apart
๏ง immune to electromagnetic
noise
1-15
16. Introduction
Physical media: radio
๏ถ signal carried in
electromagnetic spectrum
๏ถ no physical โwireโ
๏ถ bidirectional
๏ถ propagation environment
effects:
๏ง reflection
๏ง obstruction by objects
๏ง interference
radio link types:
๏ถ terrestrial microwave
๏ง e.g. up to 45 Mbps channels
๏ถ LAN (e.g., WiFi)
๏ง 802.11n/ac 1.2 Gbps
๏ถ wide-area (e.g., cellular)
๏ง 3G cellular: ~ few Mbps
๏ง LTE: 100s of Mbps downstream
๏ถ satellite
๏ง Kbps to 45Mbps channel (or
multiple smaller channels)
๏ง 270 msec end-end delay
๏ง geosynchronous versus low
altitude
1-16
17. Introduction
Chapter 1: roadmap
1.1 what is the Internet?
1.2 network edge
๏ง end systems, access networks, links
1.3 network core
๏ง packet switching, circuit switching, network structure
1.4 delay, loss, throughput in networks
1.5 protocol layers, service models
1.6 networks under attack: security
1.7 history
1-17
18. Introduction
๏ถ mesh of interconnected
routers
๏ถ packet-switching: hosts
break application-layer
messages into packets
๏ง forward packets from one
router to the next, across
links on path from source
to destination
๏ง each packet transmitted at
full link capacity
The network core
1-18
19. Network Layer 4-19
Two key network-core functions
forwarding: move packets from
routerโs input to appropriate
router output
routing: determines source-
destination route taken by
packets
๏ง routing algorithms
routing algorithm
local forwarding table
header value output link
0100
0101
0111
1001
3
2
2
1
1
23
0111
dest address in arriving
packetโs header
20. Internet structure: network of networks
๏ถ End systems connect to Internet via access ISPs (Internet
Service Providers)
๏ง Residential, company and university ISPs
๏ถ Access ISPs in turn must be interconnected.
๏ถ So that any two hosts can send packets to each other
๏ถ Resulting network of networks is very complex
๏ถ Evolution was driven by economics and national policies
๏ถ Letโs take a stepwise approach to describe current Internet
structure
21. Internet structure: network of networks
Question: given millions of access ISPs, how to connect them
together?
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
netaccess
net
access
net
โฆ
โฆ
โฆโฆ
โฆ
โฆ
22. Internet structure: network of networks
Option: connect each access ISP to every other access ISP?
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
netaccess
net
access
net
โฆ
โฆ
โฆโฆ
โฆ
โฆ
โฆ
โฆ
โฆ
โฆโฆ
connecting each access ISP
to each other directly doesnโt
scale: O(N2
) connections.
23. Internet structure: network of networks
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
netaccess
net
access
net
โฆ
โฆ
โฆโฆ
โฆ
โฆ
Option: connect each access ISP to a global transit ISP? Customer
and provider ISPs have economic agreement.
global
ISP
24. Internet structure: network of networks
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
netaccess
net
access
net
โฆ
โฆ
โฆโฆ
โฆ
โฆ
But if one global ISP is viable business, there will be competitors
โฆ.
ISP B
ISP A
ISP C
25. Internet structure: network of networks
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
netaccess
net
access
net
โฆ
โฆ
โฆโฆ
โฆ
โฆ
But if one global ISP is viable business, there will be competitors
โฆ. which must be interconnected
ISP B
ISP A
ISP C
IXP
IXP
peering link
Internet exchange point
26. Internet structure: network of networks
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
netaccess
net
access
net
โฆ
โฆ
โฆโฆ
โฆ
โฆ
โฆ and regional networks may arise to connect access nets to
ISPS
ISP B
ISP A
ISP C
IXP
IXP
regional net
27. Internet structure: network of networks
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
netaccess
net
access
net
โฆ
โฆ
โฆโฆ
โฆ
โฆ
โฆ and content provider networks (e.g., Google, Microsoft,
Akamai ) may run their own network, to bring services, content
close to end users
ISP B
ISP A
ISP B
IXP
IXP
regional net
Content provider network
28. Introduction
Internet structure: network of networks
๏ถ at center: small # of well-connected large networks
๏ง โtier-1โ commercial ISPs (e.g., Level 3, Sprint,AT&T, NTT), national &
international coverage
๏ง content provider network (e.g, Google): private network that connects
it data centers to Internet, often bypassing tier-1, regional ISPs 1-28
access
ISP
access
ISP
access
ISP
access
ISP
access
ISP
access
ISP
access
ISP
access
ISP
Regional ISP Regional ISP
IXP IXP
Tier 1 ISP Tier 1 ISP Google
IXP
30. Introduction
Chapter 1: roadmap
1.1 what is the Internet?
1.2 network edge
๏ง end systems, access networks, links
1.3 network core
๏ง packet switching, circuit switching, network structure
1.4 delay, loss, throughput in networks
1.5 protocol layers, service models
1.6 networks under attack: security
1.7 history
1-30
31. Introduction
How do loss and delay occur?
packets queue in router buffers
๏ถ packet arrival rate to link (temporarily) exceeds output link
capacity
๏ถ packets queue, wait for turn
A
B
packet being transmitted (delay)
packets queueing (delay)
free (available) buffers: arriving packets
dropped (loss) if no free buffers
1-31
32. Introduction
Throughput
๏ถ throughput: rate (bits/time unit) at which bits
transferred between sender/receiver
๏ง instantaneous: rate at given point in time
๏ง average: rate over longer period of time
server, with
file of F bits
to send to client
link capacity
Rs bits/sec
link capacity
Rc bits/sec
server sends bits
(fluid) into pipe
pipe that can carry
fluid at rate
Rs bits/sec)
pipe that can carry
fluid at rate
Rc bits/sec)
1-32
33. Introduction
Throughput (more)
๏ถ Rs < Rc What is average end-end throughput?
Rs bits/sec Rc bits/sec
๏ถ Rs > Rc What is average end-end throughput?
link on end-end path that constrains end-end
throughput
bottleneck link
Rs bits/sec Rc bits/sec
1-33
34. Introduction
Throughput: Internet scenario
10 connections (fairly) share
backbone bottleneck link R bits/sec
Rs
Rs
Rs
Rc
Rc
Rc
R
๏ถ per-connection end-
end throughput:
min(Rc,Rs,R/10)
๏ถ in practice: Rc or Rs is
often bottleneck
1-34
35. Introduction
Chapter 1: roadmap
1.1 what is the Internet?
1.2 network edge
๏ง end systems, access networks, links
1.3 network core
๏ง packet switching, circuit switching, network structure
1.4 delay, loss, throughput in networks
1.5 protocol layers, service models
1.6 networks under attack: security
1.7 history
1-35
36. Introduction
Organization of air travel
๏ถ a series of steps
ticket (purchase)
baggage (check)
gates (load)
runway takeoff
airplane routing
ticket (complain)
baggage (claim)
gates (unload)
runway landing
airplane routing
airplane routing
1-36
37. Introduction
ticket (purchase)
baggage (check)
gates (load)
runway (takeoff)
airplane routing
departure
airport
arrival
airport
intermediate air-traffic
control centers
airplane routing airplane routing
ticket (complain)
baggage (claim
gates (unload)
runway (land)
airplane routing
ticket
baggage
gate
takeoff/landing
airplane routing
Layering of airline functionality
layers: each layer implements a service
๏ง via its own internal-layer actions
๏ง relying on services provided by layer below
1-37
38. Introduction
Why layering?
dealing with complex systems:
๏ถ explicit structure allows identification, relationship
of complex systemโs pieces
๏ง layered reference model for discussion
๏ถ modularization eases maintenance, updating of
system
๏ง change of implementation of layerโs service transparent
to rest of system
๏ง e.g., change in gate procedure doesnโt affect rest of
system
๏ถ layering considered harmful?
1-38
39. Introduction
Internet protocol stack
๏ถ application: supporting network
applications
๏ง FTP, SMTP, HTTP
๏ถ transport: process-process data
transfer
๏ง TCP, UDP
๏ถ network: routing of datagrams from
source to destination
๏ง IP, routing protocols
๏ถ link: data transfer between
neighboring network elements
๏ง Ethernet, 802.111 (WiFi), PPP
๏ถ physical: bits โon the wireโ
application
transport
network
link
physical
1-39
40. Introduction
Chapter 1: roadmap
1.1 what is the Internet?
1.2 network edge
๏ง end systems, access networks, links
1.3 network core
๏ง packet switching, circuit switching, network structure
1.4 delay, loss, throughput in networks
1.5 protocol layers, service models
1.6 networks under attack: security
1.7 history
1-40
41. Introduction
Network security
๏ถ field of network security:
๏ง how bad guys can attack computer networks
๏ง how we can defend networks against attacks
๏ง how to design architectures that are immune to
attacks
๏ถ Internet not originally designed with (much)
security in mind
๏ง original vision: โa group of mutually trusting users
attached to a transparent networkโ ๏
๏ง Internet protocol designers playing โcatch-upโ
๏ง security considerations in all layers!
1-41
42. Introduction
Bad guys: put malware into hosts via Internet
๏ถ malware can get in host from:
๏ง virus: self-replicating infection by receiving/executing
object (e.g., e-mail attachment)
๏ง worm: self-replicating infection by passively receiving
object that gets itself executed
๏ถ spyware malware can record keystrokes, web
sites visited, upload info to collection site
๏ถ infected host can be enrolled in botnet, used for
spam. DDoS attacks
1-42
43. Introduction
target
Denial of Service (DoS): attackers make resources
(server, bandwidth) unavailable to legitimate traffic
by overwhelming resource with bogus traffic
1. select target
2. break into hosts around
the network (see botnet)
3. send packets to target from
compromised hosts
Bad guys: attack server, network infrastructure
1-43
44. Introduction
Bad guys can sniff packets
packet โsniffingโ:
๏ง broadcast media (shared ethernet, wireless)
๏ง promiscuous network interface reads/records all packets
(e.g., including passwords!) passing by
A
B
C
src:B dest:A payload
๏ถ wireshark software used for end-of-chapter labs is a
(free) packet-sniffer
1-44
45. Introduction
Bad guys can use fake addresses
IP spoofing: send packet with false source address
A
B
C
src:B dest:A payload
1-45
โฆ lots more on security (throughout, Chapter 8)
46. Introduction
Chapter 1: roadmap
1.1 what is the Internet?
1.2 network edge
๏ง end systems, access networks, links
1.3 network core
๏ง packet switching, circuit switching, network structure
1.4 delay, loss, throughput in networks
1.5 protocol layers, service models
1.6 networks under attack: security
1.7 history
1-46
47. Introduction
Internet history
๏ถ 1961: Kleinrock -
queueing theory shows
effectiveness of packet-
switching
๏ถ 1964: Baran - packet-
switching in military nets
๏ถ 1967: ARPAnet
conceived by Advanced
Research Projects
Agency
๏ถ 1969: first ARPAnet node
operational
๏ถ 1972:
๏ง ARPAnet public demo
๏ง NCP (Network Control
Protocol) first host-host
protocol
๏ง first e-mail program
๏ง ARPAnet has 15 nodes
1961-1972: Early packet-switching principles
1-47
48. Introduction
๏ถ 1970: ALOHAnet satellite
network in Hawaii
๏ถ 1974: Cerf and Kahn -
architecture for interconnecting
networks
๏ถ 1976: Ethernet at Xerox PARC
๏ถ late70โs: proprietary
architectures: DECnet, SNA,
XNA
๏ถ late 70โs: switching fixed length
packets (ATM precursor)
๏ถ 1979: ARPAnet has 200 nodes
Cerf and Kahnโs
internetworking principles:
๏ง minimalism, autonomy - no
internal changes required to
interconnect networks
๏ง best effort service model
๏ง stateless routers
๏ง decentralized control
define todayโs Internet
architecture
1972-1980: Internetworking, new and proprietary nets
Internet history
1-48
49. Introduction
๏ถ 1983: deployment of
TCP/IP
๏ถ 1982: smtp e-mail
protocol defined
๏ถ 1983: DNS defined for
name-to-IP-address
translation
๏ถ 1985: ftp protocol defined
๏ถ 1988: TCP congestion
control
๏ถ new national networks:
Csnet, BITnet, NSFnet,
Minitel
๏ถ 100,000 hosts connected
to confederation of
networks
1980-1990: new protocols, a proliferation of networks
Internet history
1-49
50. Introduction
๏ถearly 1990โs: ARPAnet
decommissioned
๏ถ1991: NSF lifts restrictions on
commercial use of NSFnet
(decommissioned, 1995)
๏ถearly 1990s: Web
๏ง hypertext [Bush 1945, Nelson
1960โs]
๏ง HTML, HTTP: Berners-Lee
๏ง 1994: Mosaic, later Netscape
๏ง late 1990โs: commercialization
of theWeb
late 1990โs โ 2000โs:
๏ถ more killer apps: instant
messaging, P2P file sharing
๏ถ network security to
forefront
๏ถ est. 50 million host, 100
million+ users
๏ถ backbone links running at
Gbps
1990, 2000โs: commercialization, the Web, new apps
Internet history
1-50
51. Introduction
2005-present
๏ถ ~750 million hosts
๏ง Smartphones and tablets
๏ถ Aggressive deployment of broadband access
๏ถ Increasing ubiquity of high-speed wireless access
๏ถ Emergence of online social networks:
๏ง Facebook: soon one billion users
๏ถ Service providers (Google, Microsoft) create their own
networks
๏ง Bypass Internet, providing โinstantaneousโ access to
search, emai, etc.
๏ถ E-commerce, universities, enterprises running their
services in โcloudโ (eg,Amazon EC2)
Internet history
1-51
52. Introduction
Introduction: summary
covered a โtonโ of material!
๏ถ Internet overview
๏ถ whatโs a protocol?
๏ถ network edge, core, access
network
๏ง packet-switching versus
circuit-switching
๏ง Internet structure
๏ถ performance: loss, delay,
throughput
๏ถ layering, service models
๏ถ security
๏ถ history
you now have:
๏ถ context, overview, โfeelโ
of networking
๏ถ more depth, detail to
follow!
1-52
Editor's Notes
#27: ----- Meeting Notes (8/24/15 15:41) -----
traceroute between here and through Dallas IXP