Computer Networks and the Internet
Hailiang Zhao @ ZJU.CS.CCNT http://hliangzhao.me
This slide is a reminder for chapter 1 of the book Computer Networking: A Top-Down Approach.
Computer Networks and the Internet Hailiang Zhao @ ZJU.CS.CCNT - - PowerPoint PPT Presentation
Computer Networks and the Internet Hailiang Zhao @ ZJU.CS.CCNT http://hliangzhao.me This slide is a reminder for chapter 1 of the book Computer Networking: A Top-Down Approach . What is the Internet? The Internet is a computer network that
This slide is a reminder for chapter 1 of the book Computer Networking: A Top-Down Approach.
Hailiang Zhao @ ZJU.CS.CCNT
Hailiang Zhao @ ZJU.CS.CCNT
Hailiang Zhao @ ZJU.CS.CCNT
Hailiang Zhao @ ZJU.CS.CCNT
Hailiang Zhao @ ZJU.CS.CCNT
Hailiang Zhao @ ZJU.CS.CCNT
DSL Internet access
Hailiang Zhao @ ZJU.CS.CCNT
A hybrid fiber-coaxial access network
Hailiang Zhao @ ZJU.CS.CCNT
Hailiang Zhao @ ZJU.CS.CCNT
FTTH using PON architecture
Hailiang Zhao @ ZJU.CS.CCNT
Hailiang Zhao @ ZJU.CS.CCNT
Ethernet Internet access
Hailiang Zhao @ ZJU.CS.CCNT
A typical home network nowadays
Hailiang Zhao @ ZJU.CS.CCNT
Hailiang Zhao @ ZJU.CS.CCNT
The network core: pay attention to these blue lines
Hailiang Zhao @ ZJU.CS.CCNT
Hailiang Zhao @ ZJU.CS.CCNT
Hailiang Zhao @ ZJU.CS.CCNT
A simple circuit-switched network consisting of four switches and four links
Hailiang Zhao @ ZJU.CS.CCNT
With FDM, each circuit continuously gets a fraction of the bandwidth. With TDM, each circuit gets all of the bandwidth periodically during brief intervals of time (that is, during slots)
Hailiang Zhao @ ZJU.CS.CCNT
Interconnection of ISPs
Hailiang Zhao @ ZJU.CS.CCNT
Four typical delays
Hailiang Zhao @ ZJU.CS.CCNT
End-to-end throughput: (a) Client downloads a file from server; (b) 10 clients downloading with 10 servers
Hailiang Zhao @ ZJU.CS.CCNT
Hailiang Zhao @ ZJU.CS.CCNT
Hailiang Zhao @ ZJU.CS.CCNT
Hosts, routers, and link-layer switches; each contains a different set of layers, reflecting their differences in functionality
Hailiang Zhao @ ZJU.CS.CCNT
A distributed denial-of-service attack