Beruflich Dokumente
Kultur Dokumente
Lecture 1
• Network Components
• Example of Networks
• Reference Models
Scope of the course
• Overview of computer networks, features and components.
• Data link layer: framing, error control, ARQ, Multiple Access, Switching,
Spanning trees.
• Congestion Control.
• Primary:
1. Andrew Tanenbaum and David Wetherall, "Computer
Networks", 5th edition, Pearson, 2011. ISBN: 0132126958
2. Lecture Notes.
• Supplementary:
1. Dimitri Bertsekas and Robert Gallager, "Data Networks", 2nd
Edition, Prentice Hall, 1992, ISBN-10: 0132009161.
2. William Stallings, "Data and Computer Communications", 8th
Edition, Prentice Hall, 2007, ISBN-13: 9780132433105.
3. James Kurose and Keith Ross, "Computer Networking: A Top-
Down Approach", 6th Edition, Addison-Wesley, 2013 ISBN-10:
0132856204 | ISBN-13: 9780132856201.
Notes
Homeworks:
• Will be assigned through the course website on LMS.
• Most of the slides are based on the textbook’s slides and Professor
David Wetherall’s video course (University of Washington - Seattle)
which is also based on the textbook slides.
Topics
• Introduction
• Network Components
• Example of Networks
• Reference Models
Network Components
app
Full-duplex
• Bidirectional
Half-duplex
• Bidirectional
Simplex
• unidirectional
Wireless Links
Message is broadcast
• Received by all nodes in range
A Small Network
• Network Components
• Example of Networks
• Reference Models
Example Networks
WiFi (802.11)
Enterprise / Ethernet
Cable / DSL
Bluetooth
Telephone
Satellite ...
Internet (1)
56 kbps links
T1 links
(1.5 Mbps)
Handover
Wireless LANs (1)
• Network Components
• Example of Networks
• Reference Models
Networks Need Modularity
The network does much for apps:
• Make and break connections
• Find a path through the network
• Transfers information reliably
• Transfers arbitrary length information
• Send as fast as the network allows
• Shares bandwidth among users
• Secures information in transit
• Lets many new hosts be added
• …
Networks Need Modularity
The network does much for apps:
• Make and break connections
• Find a path through the network
• Transfers information reliably
We need a form
• Transfers arbitrary length information
of modularity, to
• Send as fast as the network allows
help manage
• Shares bandwidth among users
complexity and
• Secures information in transit
support reuse
• Lets many new hosts be added
• …
Protocols and Layers
Protocols and layering is the main structuring
method used to divide up network functionality
• Each instance of a protocol layer talks virtually to its
peer using the protocol
• Each instance of a protocol layer uses only the services
of the lower layer
Protocols and Layers (2)
Protocols are horizontal, layers are vertical
Instance Peer
Protocol X
of protocol X X instanc
X e
Service
Lower provided by
layer Protocol Y
instance
Y Y
(of
protocol
Y) Node 1 Node 2
Protocols and Layers (3)
TCP
An example protocol stack
• Used by a web browser on a host that is IP
wirelessly connected to the Internet 802.11
Encapsulation
Encapsulation is the mechanism used to effect
protocol layering
• Lower layer wraps higher layer content, adding its own
information to make a new message for delivery
• Like sending a letter in an envelope; postal service
doesn’t look inside
Encapsulation (2)
IP TCP HTTP IP
TCP UDP
IP ARP
Ethernet
??
Demultiplexing (2)
or
Advantage of Layering (2)
Information hiding and reuse
Browser Server
HTTP HTTP
TCP TCP
IP IP
802.11 Ethernet
Advantage of Layering (4)
Using information hiding to connect different systems
Browser Server
HTTP HTTP
IP TCP HTTP
TCP TCP
IP IP IP IP
802.11 802.11 Ethernet Ethernet
Hides information
• App might care whether it is running over wired or
wireless!
TCP/IP Overhead Example
Consider a 4-layer protocol implementation with application, TCP, IP, and Ethernet layers in
that order (top to bottom). Each layer requires a header except the Ethernet layer, which
requires a header and trailer. The application header is 16 bytes in length, TCP header 20
bytes, IP header 20 bytes, and let the Ethernet header be 14 bytes, and the trailer 4 bytes
(ignore the preamble and gap).
Question:
• Assume a maximum data field for an Ethernet frame of 1500 bytes. What is the
overhead (in %) for a 4096-byte application message?
Hint: the message must be segmented into multiple frames and be careful of how you
consider the data field in the Ethernet frame.
Topics
• Introduction
• Network Components
• Example of Networks
• Reference Models
A Little Guidance Please …
What functionality should we implement at which
layer?
• This is a key design question
• Reference models provide frameworks that guide us »
OSI “7 layer” Reference Model
A principled, international standard, to connect
systems
• Influential, but not used in practice.
7 Application
4 Transport
3 Internet
2/1 Link
Internet Reference Model (3)
IP is the “narrow waist” of the Internet
• Supports many different links below and apps above
Ethernet 3G
2/1 Link
Cable DSL 802.11
Hybrid Model
It is based on the TCP/IP model but we call out the
physical layer and look beyond Internet protocols.
This model will be used in this course
Standards Bodies
Network Network
Router
Link Link
Layer-based Names (3)
For devices in the network:
App App
Proxy or Transport Transport
middlebox Network Network
or gateway
Link Link