CN 1 22
CN 1 22
CS610
Lecture-1
Hammad Khalid Khan
Course Answers the Basic Question:
Transmission Media
– Hardware Addressing
– Ethernet, WLAN and Bluetooth
– Extending LANs: Fiber Modems, Repeaters, Bridges,
Switches
Part 2: Packet Transmission (Cont’d)
IP Addresses
TCP/IP
Part 4: Network Applications
Client-Server Interaction
Example Applications
Grade Distribution
Assignments 15%
GMDB 5%
Network
System for connecting computers using a single
transmission technology
Internet
Set of networks connected by routers that are configured to
pass traffic among any computers attached to any network
in the set
Classification of Networks
By SIZE
Local Area Network (LAN) versus
Wide Area Network (WAN)
By Connectivity
Point-to-Point versus Broadcast
By Communication Medium
By Mobility
Fixed versus Mobile
Networks in Daily Life
Business
Home
Government
Education
Mastering The Complexity
Course Introduction
Network and Internet
Classification of Networks
Networks in Daily Life
Complexity in Computer Networking
Mastering the Complexity
COMPUTER NETWORKS
CS610
Lecture-2
Hammad Khalid Khan
CHAPTER No. 2
MOTIVATION and TOOLS
Resource Sharing
Sharing a peripheral device such as a printer or a disk
“PING” program
Probing The Internet
“PING” program
Probing The Internet
CS610
Lecture-3
Hammad Khalid Khan
Types of Multiplexing
Resource Sharing
Each character start with a start bit(0), and end with a stop
bit(1)
Baud Rate, Framing, And Errors
Baud rate:
– The number of changes in the signal per second
The receiver
– monitors the incoming carrier,
– detects modulation,
– reconstructs the original data, and
– discards the carrier
Types of Modulation
CS610
Lecture-4
Hammad Khalid Khan
CHAPTER No. 7
PACKETS, FRAMES
and
ERROR DETECTION
Introduction
The solution:
Resource Sharing
Note:
– If both files are both 5MB long, each now takes 24
minutes to transmit
Advantages
Accommodates transmission problems:
– Missing eot indicates sending computer crashed
– Missing soh indicates receiving computer missed
beginning of message
– Bad frame is discarded
Data Stuffing
Data Stuffing
Frame Delimater
COMPUTER NETWORKS
CS610
Lecture-5
Hammad Khalid Khan
Review Lecture 4
Byte Stuffing
Byte Stuffing
Sometimes, the special characters (i.e. soh or eot) may
appear in the data
– Shift Register
– Exclusive or (xor) unit
Hardware Components
CS610
Lecture-6
Hammad Khalid Khan
Review of lecture 5
Byte Stuffing
Transmission Errors
Error Detection
– Parity Check
– Checksum
– CRC
Chapter 7 (cont’d) Combining Building
Blocks
Example 16-bit CRC hardware that uses three shift
registers and three exclusive or (xor) units
Combining Building Blocks (cont’d)
Combining Building Blocks (cont’d)
-Input data is all 1s
-CRC shown after 15,16,17 bits shifted
-Feedback introduces 0s in CRC
DIRECT POINT-TO-POINT
COMMUNICATION
Types of Errors
▪ CRCs can detect the following errors better than
checksums
– Expensive
Direct Point-to-Point Communication
Disadvantages:
– Adding a new computer to the network requires
‘N-1’ new connections
Star Topology in Practice
The Result is:
Summary
CS610
Lecture-7
Hammad Khalid Khan
Review Lecture 6
Key idea
– Reduce number of connections by sharing connections
among many computers
Shared Communication Channels
Thus
– LANs are effective because of spatial locality of
reference,
and
– Temporal locality of reference may give insight into
which computers should be on a LAN
LAN Topologies
Networks may be classified by shape
Originally 3Mbps
Giga-Bit Ethernet
Encoding used in Ethernet
Manchester Encoding: Uses signal changes to encode data
CS610
Lecture-8
Hammad Khalid Khan
Review Lecture 7
Shared Communication Channel
Locality of Reference Principle
LAN Topologies
– Star
– Ring
– Bus
Ethernet
Carrier Sense Multiple Access
A coordination scheme that defines how to take turns
using a shared cable
CSMA/CD
Wireless LANs and CSMA/CA
Token Ring
FDDI
ATM
COMPUTER NETWORKS
CS610
Lecture-9
Hammad Khalid Khan
Review Lecture 8
CSMA/CD
Wireless LANs and CSMA/CA
Token Ring
FDDI
ATM
Chapter 9
Hardware Addressing
and
Frame Type Identification
Introduction
Need to devise technique for delivering message through
LAN medium to single, specific destination computer
Sending computer uses a Hardware Address to identify the
intended destination of a frame
Sending computer also identifies Type of data carried in the
frame
Specifying a Destination
Data sent across a shared network reaches all attached
stations - for all LAN topologies
Numeric value
Hardware Addressing
Specifying a Destination
Packet Filtering
Assigning Hardware Addresses
Broadcasting
Multicasting
COMPUTER NETWORKS
CS610
Lecture-10
Hammad Khalid Khan
Review Lecture 9
Hardware Addressing
Specifying a Destination
Packet Filtering
Assigning Hardware Addresses
Broadcasting
Multicasting
Problems with Broadcasting
For every broadcast frame on the network, each computer
uses computational resources:
– Places contents into memory.
– Interrupts the CPU.
– Allows system software to make a decision whether to
discard or use the frame.
Problems with Broadcasting
– If a pair of computers, use broadcasting, instead of
sending them directly, all other computers waste CPU
time while discarding the frames.
Multicasting
Multicast Addressing
If an application program wishes to receive certain frames,
then
– it programs the interface hardware to accept an
additional set of addresses.
The interface hardware then begins accepting:
– those frames (multicast frames),
– broadcast frames and
– frames that are destined to the station itself.
Multicast Addressing
For example: Computers running an audio application
Can use:
– Explicit Frame Type - Identifying value included with frame
describes type of included data.
– Implicit Frame Type - Receiver must infer type from frame
data.
Headers and Frame Formats
LAN technology standards define frame format for each
technology.
Multicasting
Frame Type Identification
Ethernet Frame Format
Frame Without Type Fields
Network Analyzer
COMPUTER NETWORKS
CS610
Lecture-11
Hammad Khalid Khan
Review Lecture 10
Multicasting
Frame Type Identification
Ethernet Frame Format
Frame Without Type Fields
Network Analyzer
Chapter 10
Uses thin coax that is cheaper and easier to install than thick
Ethernet coax.
Disconnecting one computer (or one loose connection) can disrupt entire network.
CS610
Lecture-12
Hammad Khalid Khan
Review Lecture 11
Does not use coaxial cable, uses twisted pair wiring with RJ-
45 connectors
Wiring Schemes
– 10 Base-T
Advantages and Disadvantages of Wiring Schemes
The Topology Paradox
NICs and Wiring Scheme
Categories of Wires
COMPUTER NETWORKS
CS610
Lecture-13
Hammad Khalid Khan
Review Lecture 12
Wiring Schemes
– 10 Base-T
Advantages and Disadvantages of Wiring Schemes
The Topology Paradox
NICs and Wiring Scheme
Categories of Wires
Wiring Schemes and Other Network
Technologies
Multiple wiring schemes are not limited to Ethernet
technology. Almost all other network technologies use
different wiring schemes
Repeaters
Bridges
COMPUTER NETWORKS
CS610
Lecture-14
Hammad Khalid Khan
Review Lecture 13
Repeaters
Bridges
Bridges
Frame Filtering
Question: How does a bridge build up address lists?
Advantages:
– Cost: An optical fiber and fiber modems are sufficient to
connect many computers located on seperate buildings
Frame Filtering
A Cycle of Bridges
CS610
Lecture-15
Hammad Khalid Khan
Review Lecture 14
Start up and Stand by Modes of a Bridge
Planning a Bridge
FDDI hub
Token ring hub
Chapter 13
WAN Technologies
and
Routing
Introduction
Packet Switches
CS610
Lecture-16
Hammad Khalid Khan
Review Lecture 15
Wide Area Networks
Packet Switches
Must have:
– Universal Routing - Next hop for each possible
destination
– Optimal Routes - Next hop in table must be on shortest
path to destination
Modeling a WAN
Use a graph:
– Nodes model switches
– Edges model direct connections between switches
Routing in a WAN
Default Routes
COMPUTER NETWORKS
CS610
Lecture-17
Hammad Khalid Khan
Review Lecture 16
Source Independence
Routing in a WAN
Modeling a WAN
Static Routing
– Simple
– Low Network Overhead
– Inflexible
Dynamic Routing
– Can work around network failures automatically
Computing Shortest Path in a Graph
Assume graph representation of network at each node
Shortest path is then the path with lowest total weight (sum
of weights of all edges)
In more detail:
Wait for next update message
Iterate through entries in message
If entry has shorter path to destination:
Insert source as next hop to destination
Record distance as distance from next hop to destination
PLUS distance from this switch to next hop
Link-State Routing (SPF)
Comparison
Distance Vector Routing
– Very simple to implement
– Packet Switch updates its own routing table first
– Used in RIP
Link-State Algorithm
– Much more complex
– Switches perform independent computations
– Used in OSPF
Examples-WAN Technology
ARPANET
– Began in 1960s
– Funded by Advanced Research Projects Agency, an
organization of the US Defense Department
– Incubator for many of current ideas, algorithms and
internet technologies
Examples-WAN Technology
X.25
– Early standard for connection-oriented networking
– From ITU, which was originally CCITT
– Predates computer connections, used for
terminal/timesharing connection
Examples-WAN Technology
Frame Relay
– Telco service for delivering blocks of data
– Connection-based service; must contract with telco for
circuit between two endpoints
– Typically 56Kbps or 1.5Mbps; can run to 100Mbps
Examples-WAN Technology
Next-Hope Forwarding
Source Independence
Hierarchical Addressing
Introduction
CS610
Lecture-18
Hammad Khalid Khan
Review Lecture 17
Routing Table Computation
CS610
Lecture-19
Hammad Khalid Khan
Review Lecture 18
A single Global Technology
VPI/VCI
Labels and Label Switching
Quality Of Service
COMPUTER NETWORKS
CS610
Lecture-20
Hammad Khalid Khan
Review Lecture 19
Label Switching
Private Network
– Owned by single organization or company
Public Network
– Owned by common carrier e.g. Phone Company)
Private Network
Connectionless
– Similar to postal system; endpoint puts data to send into a
packet and hands to network for delivery
Public and Private Networks
Summary
CS610
Lecture-21
Hammad Khalid Khan
Review Lecture 20
Cells vs Packets
ATM Critique
Network Ownership
– Private vs Public Networks
Virtual Private Network
VPN (Virtual Private Network) combines features of private
and public networks.
– Limited to single organization
– Uses public network for connectivity
Connectionless
– Similar to postal system; endpoint puts data to send into a
packet and hands to network for delivery.
Connection-Oriented Service
One endpoint requests connection from network.
Permanent connections
– Originally hard-wired
– Now configured at system unit time.
Connection Duration & Persistence
Switched Connections
– Computer maintains permanent connection to network
– Network makes connection on demand
Connectionless
– Less overhead.
– Easier to implement network.
Examples of Service Paradigms
Addresses & Connection Identifiers
Address is a complete, unique identifier.
Service Paradigm
Connection-Oriented Service
Connection-less Service
COMPUTER NETWORKS
CS610
Lecture-21
Hammad Khalid Khan
Review Lecture 21
Virtual Private Networks (VPNs)
Service Paradigm
– Connected-Oriented Service
– Connectionless Service
Delay
Throughput
Delay
Important quantitative property of networks.
Delay
Throughput
Relationship between Delay and Throughput
Delay-Throughput Product
Jitter