Lecture 01 - 05 Introduction-Final
Lecture 01 - 05 Introduction-Final
COMMUNICATIONS AND
COMPUTER NETWORKS
Course Instructor:
Introduction: 1-3
BASIC COMPONENTS OF A
COMPUTER NETWORK
Introduction: 1-4
TOPICS COVERED
Introduction and overview: Internet?, Network edge: Client Server Programs;
Access Networks and Physical Media; Network Core: Circuit Switching vs. Packet
switching; Protocol layers and their service models: Layered Architecture,
Messages, Segments, Datagrams and Frames
Application Layer: HTTP, FTP, DNS, P2P file distribution
Transport Layer: Transport Layer Services, Multiplexing, De-multiplexing; UDP:
segment structure, Checksum; Connection Oriented TCP: Connection, segment
structure, RTT estimation and timeout
Network Layer: Virtual Circuits and datagram networks; IP protocol: Datagram
format; Routing algorithms: Distance Vector and Link state routing protocols
Link Layer: Link layer services; Error detection techniques; Multiple access
protocols; Random Access Protocols; link layer addressing (ARP); link layer
switches
Physical Layer: Analog and Digital Data; Transmission Impairments; Wireless
and Mobile Networks
Mobility management principles and Security in Computer Networks
COURSE AND REFERENCE
BOOKS
Text Book:
Computer Networking: A Top Down Approach, Kurose, J.F. &Ross, K.W., 7 th Edition
(2017), Addison Wesley.
Reference Books:
Computer Networks and Internets, Comer, D.E., 6th Edition (2014), Addison
Wesley.
Networking: A Beginner's Guide, Hallberg, B., 6th Edition (2013), McGraw Hill.
Computer Networks, Tannenbaum, 5th Edition (2010), Andrew S. Tenanbaum,
David J.Wetherall
EVALUATION CRITERIA
TENTATIVE
Theory (100 %) Lab (100 %)
Terminal (1) 50 %
Note: Strick policy for the cheating in any of the artifact especially assignments.
8
COURSE LEARNING
OUTCOMES
1. Describe the basic network components, services,
technologies and layered network architecture
2. Demonstrate the functionality of each layer using
networking tools.
3. Develop simple network applications.
4. Describe the basic issues in Mobile Networks and
Network Security.
9
LECTURE
# 1:
INTRODUC
TION
Chapter 1: Introduction, Computer Networking: A Top-Down
Approach,
8th edition, Jim Kurose, Keith Ross, Pearson, 2020
CONTENTS
What is the Internet?
What is a protocol?
Network edge: hosts, access network, physical media
Network core: packet/circuit switching, internet structure
Performance: loss, delay, throughput
Security
Protocol layers, service models
History
The Internet: a “nuts and bolts”
view
Billions of connected mobile network
computing devices: national or global ISP
hosts = end systems
running network apps at
Internet’s “edge”
• Interconnected ISPs
Protocols: Streaming
IP
Skype video
set of rules that determine
• how data is transmitted between different devices in local or
the same network. regional ISP
• control sending, receiving of messages
• e.g., HTTP (Web), streaming video, Skype, TCP, IP, WiFi, home network content
4G, Ethernet provider
Internet standards HTTP network datacenter
network
• a technology or methodology applicable to the Ethernet
Internet.
• Internet Standards are created and published by TCP
enterprise
the Internet Engineering Task Force (IETF). network
• RFC: Request for Comments
WiFi
Introduction: 1-13
What’s a protocol?
Human protocols: Network protocols:
“what’s the time?” computers (devices) rather than humans
“I have a question” all communication activity in Internet
introductions governed by protocols
Introduction: 1-14
What’s a protocol?
A human protocol and a computer network protocol:
Hi TCP connection
request
Hi TCP connection
response
Got the
time? GET http://gaia.cs.umass.edu/kurose_ross
2:00
<file>
time
refers to endpoints
personal computers (PCs),
adapters, modems, and the devices local or
regional ISP
that connect to them.
home network
hosts: clients and servers content
provider
network datacenter
servers often in data centers network
enterprise
network
Introduction: 1-17
A closer look at Internet
structure
mobile network
enterprise
network
Introduction: 1-18
A closer look at Internet
structure
mobile network
home network
Network core: content
provider
network datacenter
A core network is the infrastructure that network
Introduction: 1-19
Access networks and physical
media
Q: How to connect end systems to edge
router? mobile network
enterprise access networks, national or global ISP
enterprise
network
Introduction: 1-20
Access networks and physical
media
What to look for: mobile network
network?
shared or dedicated access among users?
• Dedicated Internet access
• provides guaranteed bandwidth at all times. local or
• If a business subscribes to a 100 Mbps dedicated regional ISP
Internet connection,
home network content
• it will always have access to 100 Mbps of
provider
bandwidth. network datacenter
network
• Shared internet access (SIA) is a single connection that is
shared between a number of users
• If a business subscribes to a 100 Mbps shared Internet
connection, enterprise
network
• it may get 100 Mbps of bandwidth at certain times,
• receive far less bandwidth during peak traffic periods
Introduction: 1-21
when other subscribers are also using the connection.
LECTURE
# 2:
INTRODUC
TION
Chapter 1: Introduction, Computer Networking: A Top-Down
Approach,
8th edition, Jim Kurose, Keith Ross, Pearson, 2020
Data flow can occur in three ways:
Simplex: In simplex mode, the communication is
• unidirectional.
• only one of the devices on a link can transmit, the other can
only receive.
• e.g. keyboards, monitors, etc.
Half-duplex: In this mode, each station can
• both transmit and receive, but not at the same time.
• When one device is sending, the other can only receive, and vice-
versa.
• e.g. walkie-talkies, CB(citizens band) etc.
Full Duplex : In full duplex mode,
• both stations can transmit and receive simultaneously.
• One common example of full duplex is the Telephone network.
• When two people are communicating by a telephone line, both
can talk and listen at the same time.
• The full-duplex mode is used when communication in both
directions is required all the time. Introduction: 1-23
Wireless access networks
Shared wireless access network connects end system to router
via base station aka “access point”
to Internet
Introduction: 1-24
Wireless access networks
Shared wireless access network connects end system to router
via base station aka “access point”
Introduction: 1-25
Types of Transmission Media
Guided Media:
It is also referred to as Wired or
Bounded transmission media.
Features:
•High Speed
•Secure
•Used for comparatively shorter
distances
Unguided Media:
It is also referred to as Wireless or Unbounded
transmission media.
No physical medium is required for the
transmission of electromagnetic signals.
Features:
•The signal is broadcasted through air
•Less Secure
•Used for larger distances Introduction: 1-26
Links: physical media
Twisted Pair Cable –
Twisted Pair is of two types:
Introduction: 1-28
Links: physical media
Wireless radio Radio link types:
signal carried in terrestrial microwave
electromagnetic spectrum • up to 45 Mbps channels
1.31
NETWORKS TYPES
1.33
Figure 1.8: An Isolated LAN in the past and today
1.34
1.3.2 Wide Area Network
A wide area network (WAN) is also an connection of
devices capable of communication.
However, there are some differences between a LAN and
a WAN.
LAN WAN
A LAN is normally limited in a WAN has a wider geographical
size span, spanning a town, a state, a
country, or even the world
A LAN interconnects hosts a WAN interconnects connecting
devices such as switches, routers,
or modems
A LAN is normally privately a WAN is normally created and
owned by the organization that run by communication companies
uses it and leased by an organization
that uses it.
1.35
1.3.3 Metropolitan Area Network (MAN)
1.36
Classification by Scale
1.37
Figure 1.9: A Point-to-Point WAN
1.38
Figure 1.10: A Switched WAN
1.39
Figure 1.11: An internetwork made of two LANs and
one WAN
WAN
1.40
Figure 1.12: A heterogeneous network made of WANs
and LANs
1.41
1.3.4 The Internet
1.42
Figure 1.15: The Internet today
Peering
point Peering
point
1.43
Topics from shared video
Five components of data communication
Data Flow
Topologies
Introduction: 1-44
Network Topology
• Disadvantage
• it can only be used for small areas where computers are
in close proximity
Wired Network Topologies: Bus
Topology
Bus topology has a network
arrangement where nodes
make use of a single
communication line for data
transmission.
Many networks at the
beginning of computer
networking era made use of
this topology due to easy
implementation
49
Bus Topology
Advantages
• Since there is a single communication line, means the same medium is shared.
Therefore, the major advantage of using this topology is its simplicity.
• Easy to setup and extend.
• Less costly. Less cabling needs.
Disadvantages
• On the other hand, having a single communication line for data transmission makes it
easier for collision to occur, which is seen as a disadvantage of using this network
topology.
• If the single network cable has a problem or disconnection, the whole network breaks.
• Difficult to identify a problem.
• All devices receive all signals from every other host. This is not efficient.
50
STAR Topology
63
HYBRID Topology
Chapter 1: roadmap
What is the Internet?
What is a protocol?
Network edge: hosts, access
network, physical media
Network core: packet/circuit
switching, internet structure
Performance: loss, delay, throughput
Security
Protocol layers, service models
History
Introduction: 1-65
Switching techniques
In large networks,
• multiple paths from sender to
receiver.
• The switching technique will
decide the best route for data
transmission.
Switching technique is used
• to connect the systems for making
one-to-one communication.
Introduction: 1-66
Packet switching
connectionless network Header Part:
switching technique • contains the addressing
hosts break application-layer information of the packet
• used by the intermediate routers
messages into packets to direct it towards its destination.
Each packet in a packet The
switching technique has two Payload Part:
parts: a header and a payload. • carries the actual data.
Introduction: 1-67
18.2.1 Datagram Approach
18.68
Packet Switching & Circuit Switching
18.69
Figure 18.3: A connectionless packet-switched network
18.70
Introduction: 1-71
Packet switching
The packet switching is a switching technique in which the message is sent in one go, but it is
divided into smaller pieces, and they are sent individually.
The message splits into smaller pieces known as packets and packets are given a unique
number to identify their order at the receiving end.
Every packet contains some information in its headers such as source address, destination
address and sequence number.
Packets will travel across the network, taking the shortest path as possible.
All the packets are reassembled at the receiving end in correct order.
If any packet is missing or corrupted, then the message will be sent to resend the message.
If the correct order of the packets is reached, then the acknowledgment message will be sent.
Introduction: 1-72
Figure 18.4: Forwarding process in a router when used in a
connectionless network
SA DA Data SA DA Data
18.73
A connectionless packet-switched network
18.74
18.2.2 Virtual-Circuit Approach
18.76
Figure 18.6: Forwarding process in a router when used in a
virtual
circuit network
Incoming Outgoing
label label
18.77
Figure 18.7: Sending request packet in a virtual-
circuit network
A to B
A to B
A to B A to B
18.78
Figure 18.8: Sending acknowledgments in a virtual-circuit
network
18.79
Figure 18.9: Flow of one packet in an established virtual
circuit
18.80
18.2.2 Virtual-Circuit Approach
D
B R = 1.5 Mb/s
E
queue of packets
waiting for output link
Packet queuing and loss: if arrival rate (in bps) to link exceeds
transmission rate (bps) of link for a period of time:
packets will queue, waiting to be transmitted on output link
packets can be dropped (lost) if memory (buffer) in router fills
up
Introduction: 1-83
Two key network-core functions
from router’s
0111
1001
2
1 taken by packets
input link to routing algorithms
appropriate 1
router output link 3 2
1
011
frequency
optical, electromagnetic frequencies
divided into (narrow) frequency
bands
each call allocated its own band, can
transmit at max rate of that narrow time
band
Time Division Multiplexing (TDM)
frequency
time divided into slots
each call allocated periodic slot(s),
can transmit at maximum rate of
(wider) frequency band, but only time
during its time slot(s)
Introduction: 1-87
Internet structure: a “network of networks”
Introduction: 1-88
Internet structure: a “network of networks”
Question: given millions of access ISPs, how to connect them together?
access
… access
net
access
net …
net
access
access net
net
access
access net
net
…
…
access access
net net
access
net
access
net
access
net
access
… net
access access …
net access net
net
Introduction: 1-89
Internet structure: a “network of networks”
Question: given millions of access ISPs, how to connect them together?
access
… access
net
access
net …
net
access
access
net
… … net
access
access net
net
…
each other directly doesn’t scale:
…
O(N2) connections.
access access
…
net net
access
net
access
net
access
net
access
… access
… … net
access
net access net
net
Introduction: 1-90
Internet structure: a “network of networks”
Option: connect each access ISP to one global transit ISP?
Customer and provider ISPs have economic agreement.
access
… access
net
access
net …
net
access
access net
net
access
access net
net
…
…
global
access
net
ISP access
net
access
net
access
net
access
net
access
… net
access access …
net access net
net
Introduction: 1-91
Internet structure: a “network of networks”
But if one global ISP is viable business, there will be competitors ….
access
… access
net
access
net …
net
access
access net
net
access
access net
net
ISP A
…
…
access
net ISP B access
net
access
net
ISP C
access
net
access
net
access
… net
access access …
net access net
net
Introduction: 1-92
Internet structure: a “network of networks”
But if one global ISP is viable business, there will be competitors …. who will
want to be connected
Internet exchange point
access
… access
net
access
net …
net
access
access net
net
IXP access
access net
net
ISP A
…
…
access
net
IXP ISP B access
net
access
net
ISP C
access
net
access
net
peering link
access
… net
access access …
net access net
net
Introduction: 1-93
Internet structure: a “network of networks”
… and regional networks may arise to connect access nets to ISPs
access
… access
net
access
net …
net
access
access net
net
IXP access
access net
net
ISP A
…
…
access
net
IXP ISP B access
net
access
net
ISP C
access
net
access
net
regional ISP access
… net
access access …
net access net
net
Introduction: 1-94
Internet structure: a “network of networks”
… and content provider networks (e.g., Google, Microsoft, Akamai) may
run their own network, to bring services, content close to end users
… access
… access
net
access
net
net
access
access net
net
IXP access
access net
net
ISP A
…
…
Content provider network
access
net
IXP ISP B access
net
access
net
ISP C
access
net
access
net
regional ISP access
… net
access access …
net access net
net
Introduction: 1-95
Internet structure: a “network of networks”
Introduction: 1-99
Example: organization of air travel
Introduction: 1-101
Why layering?
dealing with complex systems:
explicit structure allows identification, relationship of
complex system’s pieces
• layered reference model for discussion
modularization eases maintenance, updating of system
• change in layer's service implementation: transparent to rest of
system
• e.g., change in gate procedure doesn’t affect rest of system
Introduction: 1-102
Internet protocol stack
application: supporting network applications
• IMAP, SMTP, HTTP
application
transport: process-process data transfer
• TCP, UDP transport
network: routing of datagrams from source to
destination network
• IP, routing protocols
link
link: data transfer between neighboring
network elements physical
• Ethernet, 802.11 (WiFi), PPP
physical: bits “on the wire”
Introduction: 1-103
source
message M application Encapsulation
segment Ht M transport
datagram Hn Ht M network
frame Hl Hn Ht M link
physical
link
physical
switch
destination Hn Ht M network
M application
Hl Hn Ht M link Hn Ht M
Ht M transport physical
Hn Ht M network
Hl Hn Ht M link router
physical
Introduction: 1-104
Chapter 1: roadmap
What is the Internet?
What is a protocol?
Network edge: hosts, access
network, physical media
Network core: packet/circuit
switching, internet structure
Performance: loss, delay, throughput
Security
Protocol layers, service models
History
Introduction: 1-105
Internet history
1961-1972: Early packet-switching principles
1961: Kleinrock - queueing 1972:
theory shows effectiveness of • ARPAnet public demo
packet-switching • NCP (Network Control Protocol)
1964: Baran - packet-switching first host-host protocol
in military nets • first e-mail program
1967: ARPAnet conceived by • ARPAnet has 15 nodes
Advanced Research Projects
Agency
1969: first ARPAnet node
operational
Introduction: 1-106
Internet history
1972-1980: Internetworking, new and proprietary nets
1970: ALOHAnet satellite network
Cerf and Kahn’s internetworking
in Hawaii principles:
1974: Cerf and Kahn - architecture minimalism, autonomy - no
for interconnecting networks internal changes required to
1976: Ethernet at Xerox PARC interconnect networks
best-effort service model
late70’s: proprietary architectures:
stateless routing
DECnet, SNA, XNA decentralized control
late 70’s: switching fixed length
define today’s Internet architecture
packets (ATM precursor)
1979: ARPAnet has 200 nodes
Introduction: 1-107
Internet history
1980-1990: new protocols, a proliferation of networks
1983: deployment of TCP/IP new national networks: CSnet,
1982: smtp e-mail protocol BITnet, NSFnet, Minitel
defined 100,000 hosts connected to
1983: DNS defined for name- confederation of networks
to-IP-address translation
1985: ftp protocol defined
1988: TCP congestion control
Introduction: 1-108
Internet history
1990, 2000s: commercialization, the Web, new applications
early 1990s: ARPAnet late 1990s – 2000s:
decommissioned more killer apps: instant
1991: NSF lifts restrictions on messaging, P2P file sharing
commercial use of NSFnet network security to forefront
(decommissioned, 1995)
est. 50 million host, 100 million+
early 1990s: Web
users
• hypertext [Bush 1945, Nelson 1960’s]
backbone links running at Gbps
• HTML, HTTP: Berners-Lee
• 1994: Mosaic, later Netscape
• late 1990s: commercialization of the
Web
Introduction: 1-109
Internet history
2005-present: more new applications, Internet is “everywhere”
~18B devices attached to Internet (2017)
• rise of smartphones (iPhone: 2007)
aggressive deployment of broadband access
increasing ubiquity of high-speed wireless access: 4G/5G, WiFi
emergence of online social networks:
• Facebook: ~ 2.5 billion users
service providers (Google, FB, Microsoft) create their own networks
• bypass commercial Internet to connect “close” to end user, providing
“instantaneous” access to search, video content, …
enterprises run their services in “cloud” (e.g., Amazon Web Services,
Microsoft Azure)
Introduction: 1-110
Chapter 1: summary
We’ve covered a “ton” of material!
Internet overview
what’s a protocol? You now have:
network edge, access network, core context, overview,
• packet-switching versus circuit-
switching vocabulary, “feel”
• Internet structure of networking
performance: loss, delay, throughput more depth,
layering, service models detail, and fun to
security follow!
history
Introduction: 1-111