Lecture 0
Advanced Computer
Networks
Why study Computer
Networks ?
A group or system of interconnected people or
things.
Course textbook
k s ” ,
wo r
Ne t ral l ,
e rs t h e
m p ut d W e
“Co aum an
en b
Tan o n .
i ti
5t ed
h
Reference books
Disclaimer: I shall be copying slides, figures, and different material for Lecture
presentation from Dr. Junaid Qadir Slides, Online slides available for the below
mentioned books by the authors of the book. For this I am thankful to Dr. Junaid and
the authors for putting some nice slides over the internet.
[Kurose & Ross]
[Peterson & Davie]
Course Contents
Topic 0
Introduction to this course
and to networks
Topic 1
Physical layer technologies:
Topic 2
How do nodes connect over a single
direct link to form a network?
Topic 3
How heterogeneous networks
are connected to form internets?
Net1
Net 2 Net3
Topic 4
How processes on different nodes
communicate over an internetwork?
Topic 5
How various applications
interact over an internetwork?
HTTP SSH POP DNS IMAP
SIP FTP RTP TELNET SMTP
Topic 6
Modern networking trends
Other Related Advanced Topics
A Brief History of Internet
• The history of the Internet begins with the development of
electronic computers in the 1950s.
•
Modern networking trends
Initial concepts of wide area networking originated in several
computer science laboratories in the United States, United
Kingdom, and France.
• The US Department of Defense awarded contracts as early as
the 1960s, including for the development of the ARPANET
project.
• The first message was sent over the ARPANET in 1969 from
computer science laboratory at University of California, Los
Angeles (UCLA) to the second network node at Stanford
Research Institute (SRI).
https://www.internetsociety.org/internet/history-internet/brief-history-internet/
Networking
‘
Networks is a set of technologies –
including hardware, software and
media – that can be used to
connect computers together,
‘ enabling them to communicate,
exchange information and share
’’
resources in real time
[Peter Norton]
Benefits
Resource sharing (cost savings)
Personal communication
Data backups
Reliability (reduced errors/inconsistencies)
Greater performance (distributed computing)
Personalized/ contextualized services
Network
Design Issues
Media; Topology; Protocol;
Addressing; Naming;
Network Topology
Network topology is the study of the physical
(real) and logical (virtual) interconnections
between nodes [Wikipedia]
Topology types:
Point to Point; Bus; Star; Ring; Mesh and Hybrid
Network Topology (cont)
Point to Point Bus
Star
Fully
Tree Connected
Partial
Mesh
Ring
Protocol
‘‘
The rules governing the syntax, semantics,
’
and synchronization of communication.
[Wikipedia]
‘‘
Protocol defines 1) format and 2) order of
messages sent and received among network
entities and 3) action(s) taken on ’
’
transmission and receipt of message
[Kurose and Ross]
Protocol
In this course, we will focus on protocols for data traffic only.
TCP/IP is the most dominant suite of protocols and
is used on the Internet.
TCP/IP suite of protocols is often organized in a
hierarchy of layers
Some other protocol suites (no where as popular)
include: NetBIOS/ NetBEUI and IPX/ SPX.
Introduction to the Protocol Stack
• stack: [m-w.org]
– 1: a large usually conical pile (as of hay, straw, or
grain in the sheaf) left standing in the field for
storage
– 2 a: an orderly pile or heap
21
Layered Architecture
• Network protocol stacks (e.g., TCP/IP, OSI) are
divided into distinct and ordered layers
• Each layer has a very fixed interface with other
layers, although complex services are implemented
inside a layer
• Why the layered approach?
22
Layered Architecture
• Why the layered approach?
• Advantages of the Layered Approach
– Encapsulation of Complexity: only the pertinent,
simple interface is visible to other layers
• Fixed services offered via interface/s
23
An Example of a Non-Layered
Communication
Consider a BigbossX of company SEECSTech who wants
to send a very important letter to BigbossY who
works at EMETech. One way of sending this letter is:
– BigbossX types and prints the letter
– Finds the address of BigbossY
– Get directions to BigbossY’s address at EME
– Drives to EME and gives the letter to BigbossY
– Gets a verbal or written confirmation from BigbossY
24
An Example of a Non-Layered
Communication
• This approach leads to a lot of overhead work,
which is not a part BigbossX’s job
• What if:
– BigbossY’s address is changed
– BigbossY does not understand BigbossX’s language
– BigbossY is not in his office when BigbossX comes to
deliver the letter
– BigbossY handles all of his communication through
email or fax, not snailmail
25
An Example of a Non-Layered
A better way of approaching this problem is:
Communication
BigbossX
BigbossY
SEECSTech
EMETech
Secretary
Secretary
mailman
26
The TCP/IP Protocol Stack
Application Layer
SMTP, POP3, FTP, HTTP…
Transport Layer
TCP and UDP
Network Layer
IP
Medium Access Control Layer
Ethernet, 802.11,…
Physical Layer
UTP, Fiber, Wireless…
27
The TCP/IP Protocol Stack
Application Layer
SMTP, POP3, FTP, HTTP… payload
Transport Layer trans
TCP and UDP payload
hdr
Network Layer net trans
IP payload
hdr hdr
Medium Access Control Layer mac net trans
Ethernet, 802.11,… payload
hdr hdr hdr
Physical Layer phy mac net trans
UTP, Fiber, Wireless… payload
hdr hdr hdr hdr
Channel
28
TCP/IP stack in IoTs
OSI Protocol Stack
– A framework is helpful in the design of
hardware and software for communication
– ISO-OSI Model serves this purpose
– ISO (International Standard Organization)-OSI
(Open System Interconnect)
OSI Layered Architecture
• There are seven layers in the model, hence
the name the 7-Layer model
• The model acts as a frame of reference in
the design of communications and
networking products. However, in this
course we will use TCP/IP 5 Layer model
which is used widely in the World.
Layered Communication
TCP/IP model
Application layer GET / HTML/1.1
Source Port | Destination Port Payload
Transport layer > 1024 | 80
Internet layer
Source IP | Destination IP Payload
Link layer 202.125.157.150 | 202.125.157.196
Source MAC address | Destination MAC address Payload FCS
23:34:aa:bb:cc:dd | 12:34:aa:bb:cc:dd
Networking devices
(same LAN)
Application Application
Transport Transport
Network Network
Data Link Data Link
Bits Bits
Source Host Destination
Bridges/ Host
Repeater/
Switches
(Same LAN)
Hub
Device used in a single LAN: hub, bridge, switch
Internetworking devices
(different LAN)
Application Application
Routers/
Transport Gateway Transport
Network Network
Data Link Data Link
Bits Bits
Source Host Destination Host
(Different network)
Routing example
Layers communicate to corresponding
layers
User sends email
Application layer SMTP data
Source Port | Destination Port Payload
Transport layer > 1024 | 25
Internet layer
Source IP | Destination IP Payload
Link layer 202.125.157.150 | 115.186.131.69
Source MAC address | Destination MAC address Payload FCS
23:34:aa:bb:cc:dd | 12:34:aa:bb:cc:dd
User receives email
Application layer orPOP
IMAP
request
HTTP request
Source Port | Destination Port Payload
Transport layer > 1024 | 80143
110
( (ifif(POP)
HTTP)
IMAP)
Internet layer
Source IP | Destination IP Payload
Link layer 202.125.157.150 | 115.186.131.69
Source MAC address | Destination MAC address Payload FCS
23:34:aa:bb:cc:dd | 12:34:aa:bb:cc:dd
2
Classification of
Networks Sc o pe
Type
a d i g m
P a r
c hy
ie r ar
H
Classification (Geographical Scope)
Decreasing
• Wide Area Networks
Scope
• Metropolitan Area Networks
• Campus Area Networks
• Home Area Networks
• Personal Area Networks
Brief Overview of Contemporary Networks
• Infrastructure Wireless Networks
• Mobile Ad Hoc Networks
• Wireless Sensor Networks
• Cellular Networks
• Broadband Wireless Networks
• Short-range Wireless Networks
Infrastructure Wired/Wireless Networks: 802.1-21
local area network [m-w.org]
: a network of personal computers in a small area (as
an office) for sharing resources (as a printer) or
exchanging data
Ethernet is the most widely installed local area
network (LAN) technology. Ethernet is a link layer
protocol in the TCP/IP stack, describing how
networked devices can format data for transmission
to other network devices on the same network
segment, and how to put that data out on the
network connection
Infrastructure Wireless Networks: 802.11 LANs
• In the infrastructure mode, 802.11 LANs
have a central node called an access point
(AP)
• The AP is a relatively high-end node that acts
as an arbitrator and a relay for other
(potentially resource-constrained) nodes
– All nodes on the network are required to register
(associate) with the AP
– All nodes’ traffic is routed through the AP
– For Internet connectivity, the AP has a wired
backend
Infrastructure Wireless Networks: 802.11 LANs
Image courtesy of Wikipedia
Infrastructure Wireless Networks: 802.11 LANs
• 802.11 standards define the protocols for MAC
and physical layers
• The MAC layer is CSMA/CA based and is common
to most 802.11 networks
• Physical layer is different for each 802.11 variant
• Four famous physical layers are:
– 802.11b
– 802.11a
– 802.11g
– 802.11n
Infrastructure Wireless Networks: 802.11 LANs
• In current deployments, the standard
TCP/IP protocol stack is used on top of
802.11 physical and MAC layers
Application
TCP/UDP
IP
802.11 MAC
Physical Layer
802.11a/b/g/e/n…
Infrastructure Wireless Networks: 802.11b
• Ratified in 1999
• Operates at 2.4 GHz
• Multiple Data rates: 1, 2, 5.5, 11 Mbps
– Data rate is selected and changed according to
the variations in signal quality
• Range: ~35m indoor, ~100m outdoor
Infrastructure Wireless Networks: 802.11a
• Ratified in 1999
• Operates at 5 GHz
• Multiple Data rates: 54, 48, 36, 24, 18, 12,
9 and 6 Mbps
• Best operation with line-of-sight
• Range: ~25m indoor, ~75m outdoor
Infrastructure Wireless Networks: 802.11n
• Ratified in January 2007
• Uses Multiple-Input-Multiple-Output
(MIMO) technology
• Can operate at both 2 GHz and 5 GHz
• 576 possible data rates: Max. 540 Mbps
• Range: ~50m indoor, ~125m outdoor
Mobile Ad Hoc Networks
• The fundamental design constraint is
mobility
• A secondary yet very important design
constraint is energy efficiency
• The 802.11 physical and MAC layers are
used with slight modification, and many
mobility-aware transport and network
layers have been proposed
Wireless Sensor Networks
• Ratified in May 2003 as IEEE 802.15.4
• Can operate at 2.4 GHz, 915 MHz and 868 MHz
• Data rates: 250 Kbps @ 2.4 GHz, 40 Kbps @
915 MHz, 20 Kbps @ 868 MHz
• Range: 10 to 75m
• ZigBee is the body that defines higher layer
protocols
Discussion
Discussion
Cellular Networks
• Network is divided into multiple cells, each
served by a fixed base station
Image courtesy of Wikipedia
Broadband Wireless Networks: WiMAX
• Standardized as 802.16e
• Provides last-mile wireless broadband connectivity
• Operates at 3.5 GHz, 2.3/2.5 GHz, or 5 GHz
• Maximum data rate: ~64 Mbps
• Range: ~10 km
• Provides built-in Quality-of-Service (QoS) support
• Uses MIMO technology with AMC
Short-Range Wireless Networks: Bluetooth
• Standardized as IEEE 802.15.1
• Used to connect devices at short ranges
• Operates at 2.4 GHz
• Maximum data rate: 2.1 Mbps
• Range: ~10m to ~100m
Wide Area Networks
• Circuit Switching
– Dedicated communication path
– All packets travel through
the same path
– No delays occur because
path is designated
– No other user can use a
dedicated circuit until its free
– High costs incurred
Wide Area Networks
• Packet Switching
– Individual packets are sent out separately from
source to destination
– Each packet treated as
a separate message
– All packets may be routed
through different paths
– No dedicated channel required
– Low cost of implementation
– Variable packet length
Difference between telecom and data networks
Circuit switched networks
Source
(Caller) Call establishment
Data transfer
Connection close
(before data transfer)
Destination
(Callee)
Difference between telecom and data networks
Packet switched networks
Source
Destination
…
Message
…
Packets
Classification (Network Paradigm)
Client-server networks:
Examples: DNS, HTTP, DBMS servers and client
Classification (Network Paradigm)
Peer-to-peer (P2P) networks:
Examples: Workgroup computing; P2P networks
such as BitTorrent, Gnutella, Morpheus, etc.
Classification (Hierarchy)
Core
Distribution
Access
Classification (Type)
Internet
Intranet
VPN
Extranet
Image source: http://www.flexsys-group.com
Access technology (Narrowband)
• Uses analog telephone lines
• Utilizes a modulator/ demodulator
(Modem)
• Modems perform error correction/
compression
• V.34 (28.8, 33.6 kbps); V.90 and V.92 (56
kbps)
• Telephone networks limit a single
narrowband channel to 56 kbps
Access technology (Broadband)
• Leased Circuits: E1 (2M), E2 (8M), E3
(34M)
• DSL: Utilizes telephone lines but
performs efficient digital coding
Types: ADSL, HDSL, SDSL, VDSL
• Cable: Utilizes co-axial cables and
provides similar access speeds to DSL
• WiMax: Wireless broadband
technology
Some Standardization Bodies
• IEEE
• IEFT – Internet Engineering Task Force
• 3GPP/3GPP2 – 3rd Gen Partnership Project
• ITU – International Telecommunication Union
Future
• Information Centric Networking
• Internet of Nanothings [Nanonetworks]
http://infocom2018.ieee-infocom.org/program/accepted-paper-list-main-conference
Recap of Network lectures
Media (wired and wireless);
Topology (bus, star, mesh, ring, tree);
Protocol (HTTP, TCP/IP, MAC);
Addressing (IP, MAC);
Naming (domain, hostnames);
Layered Communication (TCP/IP model);
Networking devices (hubs, switches, routers);
Routing and Internetworking;
Announcement: Students are instructed to
choose a research paper to be presented and upload the link.
Deadline: 28-09-2022
[Details in previous lecture slides]
Presentations to be marked based on three parameters mainly.
- Paper quality and preparation: How well you understood the paper and its quality
[where/when it was published]
- Mode of delivery: How well you deliver the paper idea through presentation. How well
you identified the novelty in the paper?
- Contribution: What’s your contribution in reproducing the results?
??
ns /
?
sti o
u e
Q si o n s?
o nfu
C