0% found this document useful (0 votes)
14 views

Lecture1 - Computer Network Fundamentals

Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views

Lecture1 - Computer Network Fundamentals

Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 43

1

Module
1 Before Starting

Our course (CYB615) Topics:

Module 1: Computer Networks Fundamentals.


Module 2: Computer Networks Protocols (TCP/UDP/IP/ICMP).
Module 3: Quality of Service.
Module 4: Middleboxes.
Module 5: Network Security.

Required Textbook: Goerzen J., Foundations of Python Network Programming,2004,


Course Technology, Apress, ISBN: 978-1-59059-371-4.

References:
• The official Python Tutorial: http://docs.python.org/tut/
• The Python Tutorial: https://docs.python.org/3/tutorial/

2
Module
1 Before Starting

Our course (Network programming, Course ID: CYB615)

Explores network programming in the Python language. It covers the basic concepts,
modules, and third-party libraries that you are likely to use when communicating
with remote machines using the most popular Internet communication protocols.

The Building Blocks: Stacks and Libraries

1. Protocol stack, is a group of protocols that all work together to allow


software or hardware to perform a function. The TCP/IP protocol stack is a good
example.
2. Using Python libraries of previously written code—whether modules from the
built-in standard library that ships with Python or packages from third-party
distributions that you download and install—that already know how to speak the
network protocol that you want to use.

3
Module
1 So …

The major purposes of this course are:


1. Introduce you to several key networking libraries available for
Python.
2. Teaching you about the lower-level network services on which those
libraries (point.1) are built.

Benefits: Knowing the lower-level material is useful:


1. understand how the libraries work.
2. will understand what is happening when something at a lower level
goes wrong.

4
5
Module
1 Outlines

Module 1(Computer Networks Fundamentals)


1. Definition of computer networks, communication
2. Importance of computer networks
3. Computer networks classifications(types, architectures, topologies,
communications technology)
4. OSI model and communication through an internet
5. Mapping between OSI model and TCP/IP model
6. Data encapsulation and decapsulation
7. Network protocol (TCP, UDP)
8. Routing, Routing table, Routing protocols
9. Middleboxes
10.Throughput, Bandwidth, QoS, Bottleneck
11.Wireless networks (Technologies, types)
12.IEEE
13.Useful Windows Networking Commands

6
Module
1 Definition of computer networks

7
Module
1 Definition of communication

8
Module
1 Importance of computer networks

1.
2.
3.
4.
5.
6.

7.

9
Module
1 Computer networks classifications

10
Module
1 Computer networks types

11
Module
Differences between Computer
1
networks types

12
Module
1 Computer networks architectures

13
Module
Differences between
1
the two architectures

14
Module
1 Computer networks topologies

Star

15
Module Computer networks
1 communications technology

16
Module
1 OSI model

The OSI Model (Open Systems Interconnection Model)

 Was published in 1984 by the International Organization for Standardization

(ISO).

 Conceptual framework used to describe the functions of a networking system

(universal set of rules and protocols and requirements in order to support

compatibility between different products and software).

 In the OSI reference model, the communications between a computing system are

split into seven different abstraction layers.

 Still used today as a means to describe Network Architecture.

17
Module
1 Network Protocol

What is a Network Protocol?

Set of rules that governs the communications between computers on a network.

These rules include guidelines that regulate the following characteristics of a

network:

1. Access method

2. Allowed physical topologies

3. Types of cabling

4. Speed of data transfer.

18
1
Module

Media Layers Host Layers


OSI model

19
Module
Hidden layer
1
(transmission layer)

Note: Transmission Media is another hidden layer under

the Physical Layer

20
Module Communication through
1 an internet

Remember: switches devices do not change data objects

21
Module
logical mapping between
1
OSI model and TCP/IP model

22
Module
1 Data Encapsulation

Segment
packet

frame

23
Module
Encapsulation headers
1
(TCP vs UDP)

Transmission Control Protocol

24
User Datagram Protocol
Module
1 TCP/UDP protocols

TCP three-way handshake

25
Module
Encapsulation headers(IP)
1 Internet protocol

Method that governs how computers share data across the Internet.

When one computer sends data, such as an email or a web form, its message gets parsed
into small packets that contain the sending computer's Internet address, the receiving
computer's address, and part of the message(packet).

26
Module
1 Data Encapsulation

OSI uses a more generic term to refer to messages, rather than frame, packet,
and segment. OSI uses the term protocol data unit (PDU). A PDU represents the
bits that include the headers and trailers for that layer, as well as the
encapsulated data.

For example: A TCP segment of data using


OSI terminology, is a PDU, more
specifically a layer 4 PDU (abbreviated
L4PDU) because TCP is Layer 4 protocol
in the OSI model. In general, OSI refers
to the layer x PDU (LxPDU),
with x referring to the number of the
layer.

27
Module Encapsulation – Decapsulation
1 comparison

28
Module
1 Routing

 Process of selecting a path across one or more networks. The principles of routing can apply to
any type of network, from telephone networks to public transportation.

 In packet-switching networks, such as the Internet, routing selects the paths for Internet
Protocol (IP) packets to travel from their origin to their destination. These Internet routing
decisions are made by specialized pieces of network hardware called routers.

UDP

29
Module
1 Routing Table

30
Module
Routing Protocols
1
Comparison

31
Module
1 Middleboxes

Middlebox is defined as any intermediary device performing functions other than


the normal, standard functions of an IP router on the datagram path between a
source host and destination host.

32
Module
1 Throughput & Bandwidth

Throughput tells you how many packets arrive at their destinations successfully at any given
time. For the most part, throughput capacity is measured in bits per second, but it can also be
measured in data per second.

Bandwidth tells you how much data could theoretically be transferred from a source at any given
time. Bandwidth is measured in bits, megabits, or gigabits per second.

It’s important to remember high bandwidth doesn’t necessarily equal high network
performance. Substantial bandwidth won’t matter if data throughput is still being dragged
down by latency, jitter, or packet loss.

33
Module
1 Throughput & Bandwidth

34
Module
1 Quality-of-Service(QoS)

Quality of Service (QoS)


set of technologies that work on a
network to guarantee its ability to
dependably run high-priority applications
and traffic under limited network capacity.
QoS technologies accomplish this by
providing differentiated handling and
capacity allocation to specific flows in
network traffic.

35
Module
1 Bottleneck

Bottleneck, in a communications context, is a point in the enterprise where the


flow of data is impaired or stopped entirely. Effectively, a bottleneck results
when there is not enough data handling capacity to accommodate the current
volume of traffic.

36
Module
1 Wireless Networks

Wireless network is a computer network that


uses wireless data connections between network
nodes.

 Avoid the costly process of introducing


cables into a building, or as a connection
between various equipment locations.

 Admin telecommunications networks are


generally implemented and administered
using radio communication. This
implementation takes place at the physical
layer of the OSI model network structure.

37
Module
Wireless Communication
1
technologies

1. Satellite Communication
2. Infrared Communication
3. Broadcast Radio
4. Microwave Communication
5. Wi-Fi
6. Mobile Communication Systems
7. Bluetooth Technology
8. Global Positioning System (GPS)
9. Paging
10.Radar
11.Radio Frequency Identification (RFID)

38
Module
1 Types of wireless networks
Wireless PAN

Wireless LAN

Wireless CAN

Wireless ad hoc network

Wireless MAN

Wireless WAN

Cellular network

Global area network

Space network

39
Module
Institute of Electrical
1
and Electronics Engineers (IEEE)

What Does Institute of Electrical and Electronics

Engineers (IEEE) Mean?

The Institute of Electrical and Electronic

Engineers (IEEE) is a global association and

organization of professionals working toward the

development, implementation and maintenance of

technology-centered products and services.

40
Module
16 Useful Windows Networking
1
Commands You Should Know
Command Used For
1 PING Troubleshooting network connection issues. (test whether one network
host is able to communicate with another)
2 IPCONFIG Quickly finding your IP address.

3 GETMAC Quickly finding your MAC address.

4 ARP Display and modify the Address Resolution Protocol cache; useful for
resolving address resolution problems.
5 HOSTNAME Quickly finding your hostname.

6 NSLOOKUP Find the IP address of a device, find the domain name of an IP address
of your device’s DNS server and find mail servers for a domain.
7 NBTSTAT Troubleshooting NetBIOS issues.

8 Route Allow you to view the device’s routing tables. To do so, simply type
Route Print.

41
Module
16 Useful Windows Networking
1
Commands You Should Know
Command Used For
9 NET Displaying available Net switches. (accounts to set password and
logon requirements, file to show a list of open files and sessions
to list, or even disconnect, sessions on the network)
10 NETSTAT Displaying network statistics.
NETSTAT [-a] [-b] [-e] [-f] [-n] [-o] [-p proto] [-r] [-s] [-x] [-t]
[interval]
11 NETSH Displaying and configuring network adapters.

12 TASKKILL Ending processes.

13 TRACERT Trace the route a packet takes before reaching its destination, and
see information on each “hop” along the route.
14 PATHPING Combine that best of both ping and tracert into a single utility.

15 SYSTEMINFO Displaying system information.


16 NET VIEW Viewing devices connected to a network.

42
Module
1 Homework 1

Q: Apply these windows networking commands, then send to me captured screen for
commands (4-8) in your personal desktop computer (Pc) or laptop?

1. ipconfig
2. getmac
3. hostname
4. tracert esu.ac.ae
5. Ping esu.ac.ae
6. netstat –s
7. netstat –n
8. netstat -y

43

You might also like