course ec-321: computer networks credits 3(2, 1)
DESCRIPTION
Course EC-321: Computer Networks Credits 3(2, 1). Introduction. Name :Mr. Liaqat Ali Title / Role :Assistant Professor - PowerPoint PPT PresentationTRANSCRIPT
![Page 1: Course EC-321: Computer Networks Credits 3(2, 1)](https://reader036.vdocuments.net/reader036/viewer/2022062321/568136d0550346895d9e6b3e/html5/thumbnails/1.jpg)
Course EC-321:Computer Networks
Credits 3(2, 1)
![Page 2: Course EC-321: Computer Networks Credits 3(2, 1)](https://reader036.vdocuments.net/reader036/viewer/2022062321/568136d0550346895d9e6b3e/html5/thumbnails/2.jpg)
Introduction
Name : Mr. Liaqat Ali
Title / Role : Assistant Professor
Education : MS (Telecommunications), BE (Electrical),
MCSE, MCITP, CIW, MCDBA, MCTS, MCT
Experience : 12 Years, 7 years on the job, 5 years teaching
Company : NUST, TEG Australia, Macquaire Telecomm Australia
Email : [email protected]
![Page 3: Course EC-321: Computer Networks Credits 3(2, 1)](https://reader036.vdocuments.net/reader036/viewer/2022062321/568136d0550346895d9e6b3e/html5/thumbnails/3.jpg)
Course Materials
Text Book : Computer Network by Andrew S. Tanenbaum Prentice Hall Fourth Edition
Reference Books: Computer Networks, a top down approach by Keith Ross
Course Evaluation: Midterm – 30%
Quizzes --- 10%
Labs work - 20%
Final Exam – 40%
No credit for work that is not your own.
![Page 4: Course EC-321: Computer Networks Credits 3(2, 1)](https://reader036.vdocuments.net/reader036/viewer/2022062321/568136d0550346895d9e6b3e/html5/thumbnails/4.jpg)
Focus
Intro to data networks from an engineering perspective.
Broad coverage.
Network architectures.
Network protocols,
Layered design.
Protocol stack.
TCP/IP and the Internet,
Hands-on aspect
![Page 5: Course EC-321: Computer Networks Credits 3(2, 1)](https://reader036.vdocuments.net/reader036/viewer/2022062321/568136d0550346895d9e6b3e/html5/thumbnails/5.jpg)
Topics Covered
Introduction and Overview.
Physical Layer.
Medium Access Control (MAC).
Link Layer.
Network Layer.
Routing.
Internetworking and IP.
IP Routing and Control.
Transport Layer.
Application Layer.
Putting It All Together!
![Page 6: Course EC-321: Computer Networks Credits 3(2, 1)](https://reader036.vdocuments.net/reader036/viewer/2022062321/568136d0550346895d9e6b3e/html5/thumbnails/6.jpg)
Course Outline.
Introduction
History, basic concepts, terminology. More, “not-so-basic” concepts:protocols, layering,, etc.
Physical layer
Transmitting data. Data link layer
Reliable transmission. Accessing the communication medium
Medium access control protocols. LANs
Ethernet, token ring, wireless LANs.
![Page 7: Course EC-321: Computer Networks Credits 3(2, 1)](https://reader036.vdocuments.net/reader036/viewer/2022062321/568136d0550346895d9e6b3e/html5/thumbnails/7.jpg)
Course Outline.
Transport layer
E2E communication.. Types of transport service. Connectionless versus connection-oriented. UDP.and TCP.
Application layer
DNS, telnet, ftp, news, e-mail. The Web.
HTTP, HTML.Search engines, Proxy and caches
Peer-to-peer, and Security.
![Page 8: Course EC-321: Computer Networks Credits 3(2, 1)](https://reader036.vdocuments.net/reader036/viewer/2022062321/568136d0550346895d9e6b3e/html5/thumbnails/8.jpg)
What’s a network?
Merriam-Webster Dictionary:
“|A fabric or structure of cords or wires that cross at regular intervals…”
“A system of computers, terminals and databases connected by communication lines”
“A computer network is defined as the interconnection of 2 or more independent computers.” [Ramteke,”Networks”, pg. 24].
![Page 9: Course EC-321: Computer Networks Credits 3(2, 1)](https://reader036.vdocuments.net/reader036/viewer/2022062321/568136d0550346895d9e6b3e/html5/thumbnails/9.jpg)
Why network?
Before networks:
One large computer (mainframe) used for all processing in businesses, universities, etc.
Smaller, cheaper computers…
Personal computers or workstations on desktops.
Interconnecting many smaller computers is advantageous! Why?
![Page 10: Course EC-321: Computer Networks Credits 3(2, 1)](https://reader036.vdocuments.net/reader036/viewer/2022062321/568136d0550346895d9e6b3e/html5/thumbnails/10.jpg)
Why network?
Computers everywhere.
Also means ubiquitous communication.
Users connected anywhere/anytime.
PC, laptop, cell phone.
Networking computers together is critical!
![Page 11: Course EC-321: Computer Networks Credits 3(2, 1)](https://reader036.vdocuments.net/reader036/viewer/2022062321/568136d0550346895d9e6b3e/html5/thumbnails/11.jpg)
Why network?
Provide access to local and remote resources.
Collection of interconnected end systems:
Computing devices (mainframes, workstations, PCs)
Peripherals (printers, scanners, terminals).
![Page 12: Course EC-321: Computer Networks Credits 3(2, 1)](https://reader036.vdocuments.net/reader036/viewer/2022062321/568136d0550346895d9e6b3e/html5/thumbnails/12.jpg)
Why network?
Resource sharing!
Hardware: printers, disks, terminals, etc. Software: text processors, compilers, etc. Data.
Robustness.
Fault tolerance through redundancy. Load balancing.
Processing and data can be distributed over the network. Location independence.
Users can access their files, etc. from anywhere in the network.
![Page 13: Course EC-321: Computer Networks Credits 3(2, 1)](https://reader036.vdocuments.net/reader036/viewer/2022062321/568136d0550346895d9e6b3e/html5/thumbnails/13.jpg)
Problems?
Security!
It’s much easier to protect centralized resources than when they are distributed.
Network itself as the target..
![Page 14: Course EC-321: Computer Networks Credits 3(2, 1)](https://reader036.vdocuments.net/reader036/viewer/2022062321/568136d0550346895d9e6b3e/html5/thumbnails/14.jpg)
POTS or PSTN
For over 100 years, the POTS (Plain Old Telephone System) a.k.a. PSTN (Public Switched Telephone Network) handles voice-band communications.
The PSTN is well designed and engineered for the transmission and switching of voice Real-time.
Low latency.
High reliability.
Moderate fidelity.
![Page 15: Course EC-321: Computer Networks Credits 3(2, 1)](https://reader036.vdocuments.net/reader036/viewer/2022062321/568136d0550346895d9e6b3e/html5/thumbnails/15.jpg)
Communication Model
Source
Network
Destination
![Page 16: Course EC-321: Computer Networks Credits 3(2, 1)](https://reader036.vdocuments.net/reader036/viewer/2022062321/568136d0550346895d9e6b3e/html5/thumbnails/16.jpg)
Simplified Communication Model
![Page 17: Course EC-321: Computer Networks Credits 3(2, 1)](https://reader036.vdocuments.net/reader036/viewer/2022062321/568136d0550346895d9e6b3e/html5/thumbnails/17.jpg)
Components
End systems (or hosts),
Routers/switches/bridges, and
Links (twisted pair, coaxial cable, fiber, radio, etc.).
![Page 18: Course EC-321: Computer Networks Credits 3(2, 1)](https://reader036.vdocuments.net/reader036/viewer/2022062321/568136d0550346895d9e6b3e/html5/thumbnails/18.jpg)
Components (cont’d)
Source
generates data to be transmitted Transmitter
Converts data into transmittable signals Transmission System
Carries data Receiver
Converts received signal into data Destination
Takes incoming data
![Page 19: Course EC-321: Computer Networks Credits 3(2, 1)](https://reader036.vdocuments.net/reader036/viewer/2022062321/568136d0550346895d9e6b3e/html5/thumbnails/19.jpg)
Networking
Point to point communication not usually practical
Devices are too far apart.
Large set of devices would need impractical number of connections.
Solution is a communications network.
![Page 20: Course EC-321: Computer Networks Credits 3(2, 1)](https://reader036.vdocuments.net/reader036/viewer/2022062321/568136d0550346895d9e6b3e/html5/thumbnails/20.jpg)
Simplified Network Model
![Page 21: Course EC-321: Computer Networks Credits 3(2, 1)](https://reader036.vdocuments.net/reader036/viewer/2022062321/568136d0550346895d9e6b3e/html5/thumbnails/21.jpg)
Key Tasks in Computer Networking
Application (User Interface)
Encoding/Decoding, Encryption.
Transmission.
Signal Generation.
Error detection and correction.
Addressing and routing
End-to-end Recovery.
Security.
![Page 22: Course EC-321: Computer Networks Credits 3(2, 1)](https://reader036.vdocuments.net/reader036/viewer/2022062321/568136d0550346895d9e6b3e/html5/thumbnails/22.jpg)
Key Tasks in Computer Networking
Transmission.
Signal Generation.
Error detection and correction.
Addressing and routing
End-to-end Recovery.
Security.
Physical Layer
Data Link Layer
Network Layer
Transport Layer
Application Layer
![Page 23: Course EC-321: Computer Networks Credits 3(2, 1)](https://reader036.vdocuments.net/reader036/viewer/2022062321/568136d0550346895d9e6b3e/html5/thumbnails/23.jpg)
Connecting End Systems
Dedicated link
Multiple access / shared medium
![Page 24: Course EC-321: Computer Networks Credits 3(2, 1)](https://reader036.vdocuments.net/reader036/viewer/2022062321/568136d0550346895d9e6b3e/html5/thumbnails/24.jpg)
Connecting End Systems
![Page 25: Course EC-321: Computer Networks Credits 3(2, 1)](https://reader036.vdocuments.net/reader036/viewer/2022062321/568136d0550346895d9e6b3e/html5/thumbnails/25.jpg)
Shared Communication Infrastructure
A stream of packets from sender to receiver.
![Page 26: Course EC-321: Computer Networks Credits 3(2, 1)](https://reader036.vdocuments.net/reader036/viewer/2022062321/568136d0550346895d9e6b3e/html5/thumbnails/26.jpg)
Types of Data Networks
Several ways to classify data networks.
For example, according to “coverage”.
Local Area Networks (LANs) typically provide networking capabilities within a building, campus.Typically within 5-mile radius.
Wide-Area Networks (WANs) span greater geographic distances (e.g., world-wide).
Metropolitan Area Networks (MANs) span more restricted distances, e.g., geographic regions.
![Page 27: Course EC-321: Computer Networks Credits 3(2, 1)](https://reader036.vdocuments.net/reader036/viewer/2022062321/568136d0550346895d9e6b3e/html5/thumbnails/27.jpg)
Types of Data Networks (cont’d)
Classification according to topology…
What is network topology?
The way network elements are interconnected.
Star Ring Bus
Mesh
![Page 28: Course EC-321: Computer Networks Credits 3(2, 1)](https://reader036.vdocuments.net/reader036/viewer/2022062321/568136d0550346895d9e6b3e/html5/thumbnails/28.jpg)
Network Protocols
• Diplomats use rules, called protocols, as guides for formal interactions.
• A communication protocol is a set of rules that specify the format and meaning of messages exchanged between computers across a network.
• A set of related protocols that are designed for compatibility are called protocol suite.
![Page 29: Course EC-321: Computer Networks Credits 3(2, 1)](https://reader036.vdocuments.net/reader036/viewer/2022062321/568136d0550346895d9e6b3e/html5/thumbnails/29.jpg)
Human and Computer Protocols
Hi
Hi
Got thetime?
2:00<data>
time
Human Protocol Computer ProtocolWeb client
Web server
![Page 30: Course EC-321: Computer Networks Credits 3(2, 1)](https://reader036.vdocuments.net/reader036/viewer/2022062321/568136d0550346895d9e6b3e/html5/thumbnails/30.jpg)
Layering
What is it?
Building complex systems is hard!
Approach: “Divide and conquer”.
Split job into smaller jobs, or layers.
Analogy to other fields.
Building a house: digging, foundation, framing, etc.
Car assembly line…
Basic idea: each step dependent on the previous step but does not need to be aware of how the previous step was done.
![Page 31: Course EC-321: Computer Networks Credits 3(2, 1)](https://reader036.vdocuments.net/reader036/viewer/2022062321/568136d0550346895d9e6b3e/html5/thumbnails/31.jpg)
Analogy: Air Travel
The problem: air travel.
Decomposed into series of steps:
Arrival at airport
Check-in
Boarding
Takeoff
Departure from airport
Baggage claim
Deplane
Landing
![Page 32: Course EC-321: Computer Networks Credits 3(2, 1)](https://reader036.vdocuments.net/reader036/viewer/2022062321/568136d0550346895d9e6b3e/html5/thumbnails/32.jpg)
Analogy: Air Travel
Arrival
Check-in
Boarding
Takeoff
Dep
art
ing
air
port
Departure
Baggage claim
Deplane
Landing
Arr
ivin
g a
irport
Traveling
intermediate air traffic sites
Airplane routing Airplane routing
![Page 33: Course EC-321: Computer Networks Credits 3(2, 1)](https://reader036.vdocuments.net/reader036/viewer/2022062321/568136d0550346895d9e6b3e/html5/thumbnails/33.jpg)
Protocol Architecture
Task of communication broken up into modules
For example file transfer could use three modules
File transfer application
Communication service module
Network access module
![Page 34: Course EC-321: Computer Networks Credits 3(2, 1)](https://reader036.vdocuments.net/reader036/viewer/2022062321/568136d0550346895d9e6b3e/html5/thumbnails/34.jpg)
Simplified File Transfer Architecture
![Page 35: Course EC-321: Computer Networks Credits 3(2, 1)](https://reader036.vdocuments.net/reader036/viewer/2022062321/568136d0550346895d9e6b3e/html5/thumbnails/35.jpg)
A Three Layer Model
Application Layer
Transport Layer
Network Access Layer
![Page 36: Course EC-321: Computer Networks Credits 3(2, 1)](https://reader036.vdocuments.net/reader036/viewer/2022062321/568136d0550346895d9e6b3e/html5/thumbnails/36.jpg)
Network Access Layer
Exchange of data between the computer and the network
Sending computer provides address of destination
May invoke levels of service
Dependent on type of network used (LAN, packet switched etc.)
![Page 37: Course EC-321: Computer Networks Credits 3(2, 1)](https://reader036.vdocuments.net/reader036/viewer/2022062321/568136d0550346895d9e6b3e/html5/thumbnails/37.jpg)
Transport Layer
Reliable data exchange
Independent of network being used
Independent of application
![Page 38: Course EC-321: Computer Networks Credits 3(2, 1)](https://reader036.vdocuments.net/reader036/viewer/2022062321/568136d0550346895d9e6b3e/html5/thumbnails/38.jpg)
Application Layer
Support for different user applications
e.g. e-mail, file transfer
![Page 39: Course EC-321: Computer Networks Credits 3(2, 1)](https://reader036.vdocuments.net/reader036/viewer/2022062321/568136d0550346895d9e6b3e/html5/thumbnails/39.jpg)
Layered Protocol Design
• Layering model is a solution to the problem of complexity in network protocols
• The model divides the network protocols into layers, each of which solves part of the network communication problem– Each layer has its own protocol!
• Each layer implements a service to the layer above– Relying on services provided by the layers below.
![Page 40: Course EC-321: Computer Networks Credits 3(2, 1)](https://reader036.vdocuments.net/reader036/viewer/2022062321/568136d0550346895d9e6b3e/html5/thumbnails/40.jpg)
Layers
Layers are the different components that need to be designed/implemented when designing/implementing networks.
Each layer responsible for a set of functions.
Top layer relies on services provided by bottom layer.
Layer makes it service available to higher layer through an interface.
![Page 41: Course EC-321: Computer Networks Credits 3(2, 1)](https://reader036.vdocuments.net/reader036/viewer/2022062321/568136d0550346895d9e6b3e/html5/thumbnails/41.jpg)
Network/Protocol Architecture
Set of layers, what their functions are, the services each of them provide, and the interfaces between them.
Examples:
ISO-OSI 7 layer architecture.
TCP-IP architecture (Internet).
![Page 42: Course EC-321: Computer Networks Credits 3(2, 1)](https://reader036.vdocuments.net/reader036/viewer/2022062321/568136d0550346895d9e6b3e/html5/thumbnails/42.jpg)
Example 1: ISO OSI Architecture
ISO: International Standards Organization
OSI: Open Systems Interconnection.
Application
Presentation
Session
Transport
NetworkData link
Physical
![Page 43: Course EC-321: Computer Networks Credits 3(2, 1)](https://reader036.vdocuments.net/reader036/viewer/2022062321/568136d0550346895d9e6b3e/html5/thumbnails/43.jpg)
TCP/IP Protocol Architecture
What is it?
Building complex systems is hard!
Approach: “Divide and conquer”.
Split job into smaller jobs, or layers.
Analogy to other fields.
Building a house: digging, foundation, framing, etc.
Car assembly line…
Basic idea: each step dependent on the previous step but does not need to be aware of how the previous step was done.
![Page 44: Course EC-321: Computer Networks Credits 3(2, 1)](https://reader036.vdocuments.net/reader036/viewer/2022062321/568136d0550346895d9e6b3e/html5/thumbnails/44.jpg)
TCP/IP Protocol Architecture