You are on page 1of 14

Lecture 1

Introduction
Couse Outline:
Mid
• Chapter 1-5 Book1
Final
• 4 weeks Book 2
• 3 weeks Book 3
S. No Assessments weightage
Class Participation 5-6 05
Quizzes 5-6 15
Assignments 3-4 10
Mid 1 30
Final 1 40
Introduction:
Book 1:
Chapter 1:
1st half of the chapter
Computer Networks

Network Edge Network Core

2nd half of the chapter


• Broader and more abstract view of computer networks
• Delay, loss, throughput of data in a computer network
• Provide quantitative models that take into account end-to-end delay, propagation, and queuing delays.
• Key architectural principles in computer networking, namely, protocol layering and service models.
What is internet?
One sentence statement
“Network of networks”
More Descriptive approach
Descriptive approach

“Service
“Nuts and bolts”
Description”

The Internet is a an infrastructure that


computer network that provides services to
interconnects billions of distributed
computing devices applications.”
throughout the world.
Computer Network: How it works??
• Based on Protocol
“Set of rules to communicates”

Human Analogy: Network Protocols

 Hardware-implemented
protocols: in NIC
 Congestion-control protocols: in
end systems
 protocols in routers :
Protocols are running everywhere
in the Internet
What is a protocol?

• Transmitted and received messages, and actions taken when these messages are sent or
received or other events occur, play a central role in a human protocol.
• The same is true in networking—it takes two (or more) communicating entities running the
same protocol in order to accomplish a task.
• This is where standards come into play
• Internet standards are developed by the Internet Engineering Task Force (IETF).
• They define protocols such as TCP, IP, HTTP (for the Web), and SMTP (for e-mail).
• There are currently nearly 9000 RFCs.
• The IEEE 802 LAN Standards Committee [IEEE 802 2020], for example, specifies the Ethernet
and wireless WiFi standards.
• Host and router have different protocol
Network edge
• Collection of End systems
• desktop PCs,
• servers (Web and e-mail servers),
• mobile devices (laptops, smartphones,
tablets).
• End systems are also referred to as hosts
Client
Server
• An increasing number of non-traditional “things”
are being attached to the Internet as end systems
• End system tends to communicate with each
with the help of internet.
 Connectionless
 Connection oriented
Network edge
Connection oriented
 Application running ,choose this thing
 A developer can specify about an application
that it will work on connection less or
connection oriented mode.
 TCP protocol perform communication in
connection oriented mode.
 Developer just enable this option in its App.
He/she will not worry about how
 Advantages
 Reliability
 Flow control
 Congestion control
Network edge
Connection Less
 Application running ,choose this thing
 No Handshaking
 Send data to the internet without any prior notice
 UDP does that
 Improve speed
Network Core
• The mesh of packet switches and links
that interconnects the Internet’s end
systems.

You might also like