Advanced Computer Networks Unit - I Network Architecture
Advanced Computer Networks Unit - I Network Architecture
Unit – I
Network Architecture
Network architecture refers to the design of a computer network,
encompassing the physical components, communication protocols, and
configuration that facilitate data transfer and communication between devices.
Components: Includes devices like routers, switches, servers, and clients,
as well as the transmission media (e.g., fiber-optic cables, wireless).
Layers: Networks are typically organized into layers (e.g., OSI model,
TCP/IP model), with each layer having specific functions such as data
link control, routing, and application communication.
Key Aspects of Network Architecture:
1. Topology: The physical or logical layout of devices in a network (e.g.,
star, bus, mesh, ring).
2. Protocols: Standardized rules governing data exchange (e.g., TCP/IP,
HTTP, Ethernet).
3. Switching and Routing: Mechanisms for determining the path that data
takes through a network.
High-Speed Networks
High-speed networks are designed to handle large volumes of data at faster
speeds, typically employing advanced technologies to minimize delays and
improve performance.
Fiber-Optic Networks: Use light signals to transmit data, enabling high-
speed, long-distance communication. Fiber-optic cables offer much
higher bandwidth and lower latency compared to copper cables.
5G Networks: Offer ultra-low latency and high bandwidth, suitable for
applications such as autonomous vehicles, augmented reality (AR), and
the Internet of Things (IoT).
Data Centers: High-speed networks within data centers use high-
bandwidth connections (e.g., InfiniBand) to ensure efficient
communication between servers.
Network-Centric View
A network-centric view focuses on the role of the network as the backbone of
modern communication. It considers how devices interact over the network,
how data flows, and the essential role of protocols and infrastructure in ensuring
seamless communication across systems.
Cloud Computing: Relies on high-performance networks to connect
users to data and services hosted remotely in data centers.
Internet of Things (IoT): Network-centric thinking is critical in enabling
the massive number of connected devices to communicate and share data
efficiently.
Overlay Networks
An overlay network is a virtual network built on top of another network
(usually the Internet). It is designed to provide additional services such as
routing, content distribution, or security.
Routing Overlays:
Overlay networks can be used to implement custom routing schemes that
are optimized for specific tasks, like content delivery, security, or network
resilience. Examples include VPNs (Virtual Private Networks), Tor, or
content distribution networks (CDNs).
Peer-to-Peer Networks:
In a P2P network, each device (peer) can act as both a client and a server,
sharing resources (e.g., files, processing power) directly with other
devices, without relying on a centralized server.
o Examples: BitTorrent (file sharing), Skype (communications),
and Blockchain networks (cryptocurrency).
o Advantages: Decentralization, fault tolerance, scalability.
Content Distribution Networks (CDNs):
CDNs are specialized overlay networks that distribute content (e.g.,
videos, images, websites) to users from locations geographically closer to
them, reducing latency and improving access speeds.
o Example: Akamai, Cloudflare.
Client-Server Networks
In a client-server network, clients (e.g., computers, mobile devices) request
services from centralized servers (e.g., web servers, databases, application
servers).
1. Characteristics:
o Centralized Control: Servers manage and control data, user
access, and resources.
o Scalable: More clients can be added easily without changing the
server architecture.
o Reliability: Servers can be configured for high availability and
fault tolerance (e.g., load balancing, redundancy).
2. Common Protocols:
o HTTP (Hypertext Transfer Protocol) for web-based services.
o FTP (File Transfer Protocol) for file sharing.
o SQL for database access.
Unit – II
Switching: Types of Networks
Switching refers to the process by which data is routed through a
network. The method used for switching determines how data is
transmitted between devices and how the network handles traffic. The
four main types of switching technologies are:
1. Circuit-Switched Networks
A Circuit-Switched Network establishes a dedicated communication
path between two endpoints for the duration of the communication
session. Once the circuit is established, it remains open until the session
ends.
Example: Traditional telephone networks (PSTN).
Characteristics:
o Dedicated Path: A fixed communication path is established
between sender and receiver.
o Fixed Bandwidth: The bandwidth is reserved for the entire
duration of the call, whether or not data is being transmitted.
o Low Latency: Once established, communication happens with
minimal delay.
o Inefficiency: Resources are wasted when no data is being
transmitted.
Advantages:
Predictable quality of service (QoS).
Suitable for voice calls, where continuous, reliable communication is
needed.
Disadvantages:
Not efficient for bursty data traffic.
Requires more infrastructure and setup time for each call.
2. Datagram Networks
In a Datagram Network, each packet (datagram) is treated
independently, and there is no need to establish a dedicated path. Each
datagram can take a different route to the destination.
Example: The Internet (uses IP - Internet Protocol).
Characteristics:
o Connectionless: No prior setup or dedicated path is needed for
communication.
o Packet Routing: Each packet can be routed independently, and
may take different routes through the network.
o Best-Effort Delivery: No guarantees for delivery or ordering of
packets.
Advantages:
Efficient use of network resources.
Scalability: Can handle a large number of devices with no need for
dedicated paths.
Flexible routing: Data can find alternate routes if one path fails.
Disadvantages:
Unreliable delivery: Packets may be lost, duplicated, or arrive out of
order.
No guaranteed QoS, making it unsuitable for real-time services (like
voice or video).
3. Virtual-Circuit Networks
A Virtual-Circuit Network combines aspects of both circuit-switching
and datagram switching. It establishes a logical path (virtual circuit)
between sender and receiver before data transfer begins. However, data is
transmitted in packets like in a datagram network.
Example: Frame Relay, ATM (Asynchronous Transfer Mode), and
MPLS (Multiprotocol Label Switching).
Characteristics:
o Connection-Oriented: A virtual circuit is established between
devices before communication begins, and packets follow this
predefined path.
o Routing Information: Each packet contains routing information
that directs it along the established path.
o Stateful: Each intermediate router or switch maintains state
information about the virtual circuit.
Advantages:
More reliable than datagram networks due to established routes.
Allows for QoS guarantees and better resource management.
Flexible: The virtual circuit can handle errors and congestion more
effectively than circuit-switching.
Disadvantages:
Requires setup time to establish the virtual circuit.
Less flexible than datagram networks because of the fixed path.
4. Message-Switched Networks
In a Message-Switched Network, the entire message is transmitted as a
single unit, with no segmentation into smaller packets. The network
routes the message through various nodes, and the message is stored at
each node until it can be forwarded to the next node.
Example: Telegraph systems and some store-and-forward email
systems.
Characteristics:
o Store-and-Forward: Messages are stored at intermediate nodes
until they can be forwarded to the next hop.
o No Fixed Path: Like datagram networks, there’s no fixed path
between sender and receiver.
o Message Delivery: Messages may experience delays, as they are
temporarily stored before being forwarded.
Advantages:
Ideal for environments where real-time transmission is not critical (e.g.,
email).
Allows for intermittent connectivity.
Disadvantages:
Slow delivery due to store-and-forward operation.
Potential delays in message delivery, which makes it unsuitable for real-
time applications.
Unit – III
1. Circuit-Switched Networks
A Circuit-Switched Network establishes a dedicated communication
path between two endpoints for the duration of the communication
session. Once the circuit is established, it remains open until the session
ends.
Example: Traditional telephone networks (PSTN).
Characteristics:
o Dedicated Path: A fixed communication path is established
between sender and receiver.
o Fixed Bandwidth: The bandwidth is reserved for the entire
duration of the call, whether or not data is being transmitted.
o Low Latency: Once established, communication happens with
minimal delay.
o Inefficiency: Resources are wasted when no data is being
transmitted.
Advantages:
Predictable quality of service (QoS).
Suitable for voice calls, where continuous, reliable communication is
needed.
Disadvantages:
Not efficient for bursty data traffic.
Requires more infrastructure and setup time for each call.
2. Datagram Networks
In a Datagram Network, each packet (datagram) is treated
independently, and there is no need to establish a dedicated path. Each
datagram can take a different route to the destination.
Example: The Internet (uses IP - Internet Protocol).
Characteristics:
o Connectionless: No prior setup or dedicated path is needed for
communication.
o Packet Routing: Each packet can be routed independently, and
may take different routes through the network.
o Best-Effort Delivery: No guarantees for delivery or ordering of
packets.
Advantages:
Efficient use of network resources.
Scalability: Can handle a large number of devices with no need for
dedicated paths.
Flexible routing: Data can find alternate routes if one path fails.
Disadvantages:
Unreliable delivery: Packets may be lost, duplicated, or arrive out of
order.
No guaranteed QoS, making it unsuitable for real-time services (like
voice or video).
3. Virtual-Circuit Networks
A Virtual-Circuit Network combines aspects of both circuit-switching
and datagram switching. It establishes a logical path (virtual circuit)
between sender and receiver before data transfer begins. However, data is
transmitted in packets like in a datagram network.
Example: Frame Relay, ATM (Asynchronous Transfer Mode), and
MPLS (Multiprotocol Label Switching).
Characteristics:
o Connection-Oriented: A virtual circuit is established between
devices before communication begins, and packets follow this
predefined path.
o Routing Information: Each packet contains routing information
that directs it along the established path.
o Stateful: Each intermediate router or switch maintains state
information about the virtual circuit.
Advantages:
More reliable than datagram networks due to established routes.
Allows for QoS guarantees and better resource management.
Flexible: The virtual circuit can handle errors and congestion more
effectively than circuit-switching.
Disadvantages:
Requires setup time to establish the virtual circuit.
Less flexible than datagram networks because of the fixed path.
4. Message-Switched Networks
In a Message-Switched Network, the entire message is transmitted as a
single unit, with no segmentation into smaller packets. The network
routes the message through various nodes, and the message is stored at
each node until it can be forwarded to the next node.
Example: Telegraph systems and some store-and-forward email
systems.
Characteristics:
o Store-and-Forward: Messages are stored at intermediate nodes
until they can be forwarded to the next hop.
o No Fixed Path: Like datagram networks, there’s no fixed path
between sender and receiver.
o Message Delivery: Messages may experience delays, as they are
temporarily stored before being forwarded.
Advantages:
Ideal for environments where real-time transmission is not critical (e.g.,
email).
Allows for intermittent connectivity.
Disadvantages:
Slow delivery due to store-and-forward operation.
Potential delays in message delivery, which makes it unsuitable for real-
time applications.
IPv4 Notations
Dotted Decimal Notation: The most common representation of IPv4
addresses. For example, 192.168.0.1.
CIDR Notation (Classless Inter-Domain Routing): A more efficient
way of representing network addresses by appending a slash (/) followed
by the number of bits used for the network portion. For example,
192.168.0.0/24.
Classful Addressing
IPv4 addresses were historically divided into classes to simplify routing
and network organization:
1. Class A: Addresses from 0.0.0.0 to 127.255.255.255. Supports 16 million
hosts per network. The first bit of Class A addresses is always 0.
o Default Subnet Mask: 255.0.0.0
2. Class B: Addresses from 128.0.0.0 to 191.255.255.255. Supports 65,000
hosts per network. The first two bits are 10.
o Default Subnet Mask: 255.255.0.0
3. Class C: Addresses from 192.0.0.0 to 223.255.255.255. Supports 254
hosts per network. The first three bits are 110.
o Default Subnet Mask: 255.255.255.0
4. Class D: Addresses from 224.0.0.0 to 239.255.255.255. Reserved for
multicast communication.
5. Class E: Addresses from 240.0.0.0 to 255.255.255.255. Reserved for
future use.
Unit – IV
Congestion Control, Congestion-Avoidance Mechanisms, and Quality of
Service (QoS)
Congestion Control
Congestion Control refers to mechanisms that prevent network congestion or
mitigate its effects once it occurs. Network congestion happens when there is
too much data traffic in the network, which can lead to delays, packet loss, and
inefficient communication.
Key Concepts in Congestion Control:
1. Feedback Mechanism: Routers or switches provide feedback to the
sender about congestion levels in the network, usually by dropping
packets or sending congestion notifications.
2. Traffic Shaping: Traffic shaping involves controlling the amount and the
rate of data entering the network to avoid congestion.
3. Window-Based Flow Control: Mechanisms like TCP use a window of
available bandwidth to adjust the rate of data transmission based on
network congestion levels.
Congestion-Avoidance Mechanisms
Congestion Avoidance aims to prevent congestion before it happens, rather
than reacting to it. These mechanisms are crucial for maintaining a stable
network performance, especially in scenarios with fluctuating traffic volumes.
Key Congestion-Avoidance Mechanisms:
1. Slow Start (TCP): TCP begins transmission with a small congestion
window, gradually increasing it as it detects that the network is not
congested. If congestion is detected (packet loss), it reduces the window
size.
2. Congestion Window (TCP): The sender adjusts the amount of data sent
based on feedback from the network. The congestion window increases
or decreases depending on packet loss and acknowledgment.
3. Random Early Detection (RED): RED is used in network routers to
detect congestion early and drop packets randomly before the network
reaches full congestion, thus signaling senders to slow down.
4. Explicit Congestion Notification (ECN): ECN allows routers to mark
packets (instead of dropping them) to notify the sender about congestion.
Summary
1. Congestion Control: Prevents or mitigates congestion using feedback
and flow control techniques, such as TCP congestion window, RED, and
ECN.
2. QoS: Ensures that critical traffic (e.g., VoIP) gets necessary bandwidth
and low latency.
3. Routing:
o Intra-Domain: Uses protocols like RIP, OSPF, and BGP for
routing within and between ASes.
o Multicast Routing: Protocols like DVMRP, PIM, and CBT
optimize data delivery to multiple receivers.
4. Spanning Tree: Ensures loop-free network topology in Ethernet-based
networks.
Unit – V
Optical Networking: SONET/SDH Standards
Optical networking uses fiber optic cables to carry high-speed data signals
over long distances with minimal signal degradation. SONET (Synchronous
Optical Network) and SDH (Synchronous Digital Hierarchy) are the two
primary standards for optical networking, used to transport digital signals over
optical fiber.
SONET/SDH Standards:
SONET: Primarily used in North America, SONET provides
standardized data rates for transmission in optical networks.
SDH: A similar standard used worldwide, except in North America. SDH
and SONET are compatible, and SDH was developed to standardize
international networks.
Key Features of SONET/SDH:
1. Hierarchical Structure: Both SONET and SDH organize signals in a
hierarchy, with each level representing a multiple of base transmission
rates (e.g., OC-1 or STM-1).
2. Synchronous Transmission: The use of a synchronous clock allows
multiple signals to be multiplexed over the same optical fiber, making it
efficient and less prone to signal interference.
3. Scalability: SONET/SDH can handle data rates from low-speed links
(like 1.5 Mbps) up to ultra-high-speed ones (up to 40 Gbps or higher).
4. Protection: Features such as automatic protection switching ensure that
the network can recover from failures quickly by rerouting data.
Traffic Engineering
Traffic Engineering refers to the process of optimizing the flow of data across
a network to ensure efficient usage of resources and maintain performance
requirements.
Traffic Engineering Requirements:
1. Capacity Planning: Ensuring that the network has sufficient bandwidth
to handle peak traffic loads.
2. Traffic Sizing: Determining the amount of traffic a network segment can
carry without degradation.
3. Characterization: Analyzing traffic types (e.g., voice, video, data) to
optimize network design and performance.
Key Factors in Traffic Engineering:
Protocols: Protocols like MPLS (Multiprotocol Label Switching) and
RSVP (Resource Reservation Protocol) are used for path selection, load
balancing, and resource reservation.
Time and Delay Considerations: Networks should minimize delays,
particularly for latency-sensitive applications like VoIP and real-time
streaming.
Throughput: The network's ability to carry data efficiently over time,
which needs to be optimized for all traffic types.
Availability and Reliability: Traffic engineering also ensures high
availability (uptime) and reliability through redundancy and fault-tolerant
paths.
Security Protocols
1. IPSec (Internet Protocol Security):
o IPSec provides secure communication over IP networks through
encryption and authentication mechanisms.
o Modes:
Transport mode: Encrypts only the payload of the packet.
Tunnel mode: Encrypts the entire packet, providing secure
communication for VPNs.
2. SSL/TLS (Secure Sockets Layer/Transport Layer Security):
o SSL/TLS is a cryptographic protocol that ensures privacy and
integrity of data during transmission over networks.
o Commonly used for securing web communications (HTTPS).
3. PGP (Pretty Good Privacy):
o PGP is used for email encryption and file encryption. It ensures
data privacy through public-key cryptography.
4. Firewalls:
o Firewalls are security systems that control the incoming and
outgoing network traffic based on predetermined security rules.
o Types:
Packet filtering firewalls: Inspect packets and determine if
they should be allowed or blocked.
Stateful inspection: Keeps track of the state of active
connections and allows packets to flow based on the state.
Datacenter Design and Interconnection Networks
Datacenter Design focuses on the physical and logical infrastructure of
datacenters, including servers, storage, networking, and power systems.
Key Aspects:
1. Scalability: The datacenter should be able to scale with growing business
needs.
2. Redundancy: Critical components should be redundant to ensure high
availability.
3. Efficiency: Power and cooling systems should be optimized for energy
efficiency.
Interconnection Networks:
Datacenter Networks (DCNs) connect servers and storage systems
within a datacenter. These networks typically use technologies such as:
o Ethernet: A common technology for local interconnections in a
datacenter.
o InfiniBand: A high-speed interconnection technology used for
low-latency, high-throughput networking.
o Leaf-Spine Architecture: A two-tier architecture where leaf
switches connect to spine switches, allowing for efficient data flow.
Summary
SONET/SDH standards enable high-speed optical networking with
synchronous transmission.
Traffic Engineering ensures efficient data transmission by considering
traffic size, protocols, and delay.
Multimedia over the Internet includes technologies such as IP
Multicasting and VoIP for transmitting voice and video data efficiently.
DNS translates domain names to IP addresses and supports dynamic
updates.
SNMP facilitates network management through monitoring and
configuration.
Security protocols like IPSec, SSL/TLS, and PGP ensure secure
communication over networks.
Datacenter Design and Interconnection Networks focus on building
efficient, scalable, and redundant infrastructures for data storage and
processing.