Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
50 views

Computer Networks

This document provides an overview of the Computer Networks lecture 1 course at the University of Saba Region. It outlines the required textbook, grading breakdown, and course content which includes fundamental concepts of computer networks and a history of computer networking. Key networking devices such as NICs, repeaters, hubs, bridges, routers, and firewalls are also defined.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
50 views

Computer Networks

This document provides an overview of the Computer Networks lecture 1 course at the University of Saba Region. It outlines the required textbook, grading breakdown, and course content which includes fundamental concepts of computer networks and a history of computer networking. Key networking devices such as NICs, repeaters, hubs, bridges, routers, and firewalls are also defined.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 59

University of Saba Region

Faculty of Information Technology & Computer Science


Information Technology and Communications
Department (ITC)

Computer Networks

Lecture 1
Fundamental concepts of computer networks.

1
Textbook
❑ Required:
▪ Computer Networking: A Top-Down
Approach, by Jim Kurose and Keith Ross,
8th Edition

❑ Recommended:
▪ Computer Networks: A Systems
Approach, by Larry L. Peterson and Bruce
S. Davie.
▪ Computer Networks, by Andrew S.
Tanenbaum.

Computer Networking:
A Top-Down Approach
8th edition
Jim Kurose, Keith Ross
Pearson, 2020
2
Grading

• Midterm Exam 10 points


• project (2 person ) 30 points
• Final Exam 60 points

3
Course Content
❑ Lecture 1: Fundamental concepts of computer networks
❑ Lecture 2: OSI Model
❑ Lecture 3: TCP/IP Model
❑ Lecture 4: IP address
❑ Lecture 5: IP address (contd.)
❑ Lecture 6: Internet & protocols
❑ Lecture 7: Internet & protocols (contd.)
❑ Lecture 8: Application Layer
❑ Lecture 9: Application Layer (contd.)
❑ Lecture 10: Transport Layer
❑ Lecture 11: Transport Layer (contd.)
❑ Lecture 12: Transport Layer (contd.) 4
History of Computer Networking
▪ 1957: Advanced Research Project Agency formed by US.
▪ 1965: the term "packet" was introduced.
▪ 1969: The development of ARPANET began. It was considered one of
the first computer networks in which first two nodes.
▪ 1971: The first e-mail was sent to across a network to other users.
▪ 1973: Robert Metcalfe developed the Ethernet. In the same year, ARPA
deployed the first international network connection, known as SATNET.
▪ 1974: The use of first router was began.
▪ 1976: Originally called a gateway, Ginny Strazisar develop the first true
IP router.
▪ 1978: The TCP/IP protocol was developed and invented by Bob Kahn for
networks.
▪ 1983: For using TCP/IP, ARPANET finished the transition. The first DNS
implement by Jon Postel and Paul Mockapetris.
▪ 1986: This is the year in which a backbone for ARPANET.
Lecture 1: Fundamental concepts of computer networks. 5
History of Computer Networking
▪ 1988: The first T1 backbone was included with ARPANET. In 1988, for
the first time, the explanation of network firewall technology was
published.
▪ 1990: The first network switch was developed and introduced by a
U.S. network hardware company named Kalpana in 1990.
▪ 1996: An IPv6 was introduced as an improvement over IPv4, as well
as embedded encryption, improved routing.
▪ 1997: The 802.11 standards, containing transmission speeds up to 2
Mbps, for Wi-Fi were introduced.
▪ 1999: The 802.11a standard, containing transmission speeds up to 25
Mbps to use the 5 GHz band, was officially made in 1999. Another
standard 802.11b was available to use for the public in mid-1999,
which offered transmission speeds up to 11 Mbps.
▪ 2003: 802.11g devices, contained transmission speeds up to 20 Mbps,
were available to the public in January 2003. In the same year, for use
with 802.11g, the WPA encryption protocol is released.
Lecture 1: Fundamental concepts of computer networks. 6
History of Computer Networking
▪ 2004: In 2004, as a replacement for WPA, the WPA2 encryption
protocol was introduced. By 2006, WPA2 certification was compulsory
for all Wi-Fi devices.
▪ 2009: The 802.11n standard can operate on the 2.4 GHz and 5 GHz
bandwidths and offers higher transfer speeds over 802.11a and
802.11g. Officially, it was made in 2009.
▪ 2018: In January 2018, WPA3 encryption was released by the Wi-Fi
Alliance, which comprises security enhancements over WPA2.
▪ 2021: …………………

Lecture 1: Fundamental concepts of computer networks. 7


Definition of Computer Networks

Lecture 1: Fundamental concepts of computer networks. 8


Definition of Computer Networks
❑ A network is a set of devices (often referred to as
nodes) connected by communication links.

Printer

Host Host

▪ A node can be a host (such as a computer, a


laptop, a smart phone etc.) or a network device
(such as a switch, a router, etc.).
▪ A link is a communication pathway that transfer
data from one device to another.
Lecture 1: Fundamental concepts of computer networks. 9
Definition of Computer Networks
❑ Computer Network is a set of communication
elements connected by communication links
▪ Communication elements
o Computers, printers, mobile phones, …
o Routers, switches, ...
▪ Communication links
o Optic fiber
o Coaxial cable
o Twisted pair
o Wireless (radio, microwave, satellite)
▪ Topologies
o Ring, Star, Bus, Tree, Mesh
Lecture 1: Fundamental concepts of computer networks. 10
Definition of Computer Networks

Wired Network PC Firewall The Internet

Fiber Optic Network Cable

Router
Switch

Server Other LANS

Wireless Network

Lecture 1: Fundamental concepts of computer networks. 11


Why we need Computer Networks?
▪ Enables users to share hardware like scanners
and printers This reduces costs.
▪ Allows users access to data stored on others'
computers This keeps everyone up-to-date.
▪ Can share access to the Internet.
▪ Can even let users run programs that are not
installed on their own computers reduces the
effort for networks administrators.
▪ …………..etc.
▪ ……………
Lecture 1: Fundamental concepts of computer networks. 12
Transportation vs. Computer Networks
Transportation Network Computer Network
Vehicles/People Packets/Payload
Street address IP address
Intersection Bridge/router
Street, highway, path Link/broadband/path
Traffic jam Network congestion
Stop and go traffic light Flow control
Taking alternative path Alternative route
Collision Collision of packets
HOV lane (high-occupancy vehicle lane) Flow Priority
Following a route to school Routing algorithm
…………………… …………….. 13
Lecture 1: Fundamental concepts of computer networks.
Challenges of Computer Networks
▪ Performance Degradation
▪ Security Issues
▪ Host Identification
▪ Configuration Conflicts
▪ Capacity Concern
▪ Slow Connectivity
▪ Monitoring and maintenance
▪ ……………………..
Lecture 1: Fundamental concepts of computer networks. 14
The Networking Devices(Nodes)

❑ NIC Card
❑ Repeater
❑ Hub
❑ Switch
❑ Bridge
❑ Router
❑ Gateway
❑ Firewall

Lecture 1: Fundamental concepts of computer networks. 15


Network Interface Card (NIC)
▪ NIC is used to physically connect
host devices to the network media.
▪ A NIC is a printed circuit board that
fits into the expansion slot of a bus
on a computer motherboard.
▪ It can also be a peripheral device.
NICs are sometimes called
network adapters.
▪ Each NIC is identified by a unique
code called a Media Access
Control (MAC) address.
▪ This address is used to control
data communication for the host
on the network.
Lecture 1: Fundamental concepts of computer networks. 16
Repeaters
▪ A repeater is a network device used
to regenerate a signal.
▪ Repeaters regenerate analog or
digital signals that are distorted by
transmission loss due to attenuation.
▪ A repeater does not make an
intelligent decision concerning
forwarding packets.
❑ Notes
• A repeater connects segments of a LAN.
• A repeater forwards every frame; it has no
filtering capability.
• A repeater is a regenerator, not an amplifier.
Lecture 1: Fundamental concepts of computer networks. 17
Hubs
▪ Hubs concentrate on
connections.
▪ In other words, they take a
group of hosts and allow the
network to see them as a
single unit. This is done
passively, without any other
effect on the data
transmission.
▪ Active hubs concentrate
hosts and also regenerate
signals.

Lecture 1: Fundamental concepts of computer networks. 18


Bridges
▪ Bridges convert network data
formats and perform basic data
transmission management.
▪ Bridges provide connections
between LANs.
▪ Bridges do not promiscuously
copy traffic to all ports, as hubs
do, but learn which MAC
addresses are reachable through
specific ports.
❑ Notes
• A bridge has a table used in filtering
decisions.
• A bridge does not change the physical
(MAC) addresses in a frame.
Lecture 1: Fundamental concepts of computer networks. 19
Switches
▪ Switches add more intelligence to data transfer
management.
▪ They can determine if data should remain on a LAN
and transfer data only to the connection that needs it.
▪ Another difference between a bridge and switch is that
a switch does not convert data transmission formats

Lecture 1: Fundamental concepts of computer networks. 20


Routers
▪ Routers have all the
capabilities listed above.
▪ Routers can regenerate
signals, concentrate multiple
connections, convert data
transmission formats, and
manage data transfers.
▪ They can also connect to a
WAN, which allows them to
connect LANs that are
separated by great distances.

Lecture 1: Fundamental concepts of computer networks. 21


Gateway
▪ A gateway is a piece of
networking hardware used in
telecommunications for
telecommunications networks
that allows data to flow from
one discrete network to
another.
▪ Gateways are distinct from
routers or switches in that
they communicate using
more than one protocol to
connect a bunch of networks

Lecture 1: Fundamental concepts of computer networks. 22


Firewall
▪ A firewall is a network device or
software for controlling network
security and access rules.
▪ Firewalls are inserted in connections
between secure internal networks
and potentially insecure external
networks such as the Internet.
▪ Firewalls are typically configured to
reject access requests from
unrecognized sources while allowing
actions from recognized ones.
▪ The vital role firewalls play in network
security grows in parallel with the
constant increase in cyber attacks.
Lecture 1: Fundamental concepts of computer networks. 23
Data Communications
❑ The term telecommunication means
communication at a distance. The word
data refers to information presented in
whatever form is agreed upon by the parties
creating and using the data. Data
communications are the exchange of data
between two devices via some form of
transmission medium such as a wire cable.

Lecture 1: Fundamental concepts of computer networks. 24


Five Components of Data Communication
Data communications are the exchange of data between two
devices via some form of transmission medium such as a
wire cable.

1. Message
2. Sender
3. Receiver
4. Medium
5. Protocol
Lecture 1: Fundamental concepts of computer networks. 25
Direction of data flow
❑ Simplex: One way traffic
only, one device transmits
and one receives e.g.
Keyboard->monitor
❑ Half Duplex: Both
stations can transmit and
receive but one at time.
e.g. Bus topology. Only
one path from source to
destination. Collisions may
occur.
❑ Full Duplex: Both can
receive and send at the
same time. e.g. Star
topology. Two separate
transmission lines.
Collisions free
Lecture 1: Fundamental concepts of computer networks. 26
Data Representation
❑Text
▪ Represented in bits patterns e.g. 0,1
▪ Different Bit patterns called code.
▪ Present Coding system: Unicode, 32 bits
❑Numbers
▪ Represented in bit patterns
▪ Converted into binary for calculations
❑Images
▪ Represented into matrix of pixels/bits
❑Audio/Video
▪ Continuous data
Lecture 1: Fundamental concepts of computer networks. 27
Categorizing Networks
❑ Networks are categorized based on the
following characteristics:
▪ Based on coverage/ scale : LAN, MAN, WAN
▪ Based on topologies: how the computers are
connected together
▪ Based on architecture
▪ Based on technologies
▪ Based on users
▪ Based on transmission medium
▪ Based on user mobility
▪ Based on link configuration
Lecture 1: Fundamental concepts of computer networks. 28
Categorizing Networks
❑ Based on coverage
Three primary categories: size, ownership, distance
it cover, physical architecture
▪ Local Area Networks (LAN)
• Used for small networks (school, home, office)
▪ Metropolitan Area Network (MAN)
• Backbone network connecting all LANs
• Can cover a city or the entire country
▪ Wide Area Network (WAN)
• Typically between cities and countries

Lecture 1: Fundamental concepts of computer networks. 29


Network coverage
WAN

MAN

LAN

BAN

Lecture 1: Fundamental concepts of computer networks. 30


Local Area Network (LAN)

▪ Privately owned
▪ Links devices in the same office, building,
or campus
▪ Simple LAN: 2 PCs & 1 printer in home or
office
▪ Size is limited to a few kilometers
▪ Allow resources to be shared (hardware,
software, or data)

Lecture 1: Fundamental concepts of computer networks. 31


Local Area Network (LAN)

Lecture 1: Fundamental concepts of computer networks. 32


Metropolitan Area Networks (MAN)

▪ Size between LAN and WAN


▪ Inside a town or a city
▪ Example: the part of the telephone
company network that can provide a
high-speed DSL to the customer

Lecture 1: Fundamental concepts of computer networks. 33


Metropolitan Area Networks (MAN)

Lecture 1: Fundamental concepts of computer networks. 34


Wide Area Network (WAN)

▪ Typically between cities and countries


▪ Technology:
• Circuit Switch, Packet Switch, Frame
Relay, ATM
▪ Examples:
• Internet P2P: Networks with the same
network software can be connected
together (Napster)

Lecture 1: Fundamental concepts of computer networks. 35


Wide Area Network (WAN)

Lecture 1: Fundamental concepts of computer networks. 36


Categorizing Networks

❑ Based on topologies
▪ Two or more devices connect to a link; two
or more links form a topology. The
topology of a network is the geometric
representation of the relationship of all the
links and linking devices (usually called
nodes) to one another.
▪ There are four basic topologies possible:
mesh, star, bus, and ring.
Lecture 1: Fundamental concepts of computer networks. 37
Based on topologies
In a bus network, a single cable
Bus running the length of the network
connects all of the nodes.

Each node in a star network is


Star connected to a central computer,
usually the file server.
In a ring network, the nodes are connected
in a circle. In a token ring network, the
Ring information travels around the network in
one direction only. A “token” travels around
the network, like a train, carrying the
information.
Every device has a dedicated point-to-point link
Mesh to every other device.
Lecture 1: Fundamental concepts of computer networks. 38
Bus Networks
▪ Any node can try to send a Nothing The
coming! bus is
message at any time, but free
the bus can only carry one 1 3 P
at a time.
▪ Before a node sends a Boom!
message, it must check that 2 S
the bus isn’t being used – it
senses the data carrier
▪ If the bus is not being used, the message can be sent – but
two nodes could start at the same time, resulting in a collision
of the two messages – the nodes need to detect when this
happens and re-send the message
▪ This protocol is called carrier sense multiple access with
collision detection – or CSMA/CD
Lecture 1: Fundamental concepts of computer networks. 39
Token Ring Network
S

▪ So-called because a
token passes around the 2 3
ring to carry messages
between the nodes
▪ Nodes can only send
when the token passes 1 P

and is empty
▪ There will be no collisions, but a node may have to wait
for the empty token to arrive, so may be slower than a
bus network under light loads but will slow down less
when it gets busier
▪ Any breaks in the cable will affect all users
Lecture 1: Fundamental concepts of computer networks. 40
Star Networks

▪ All nodes are connected 1 P


directly to the server by
a dedicated server – this S
means there are no
collisions.
2 3

▪ This means that if a cable is cut, only one of the nodes is


affected
▪ Messages might be send by the server polling each
node in turn to see whether they have a message to
send, and if they have, delivering it.
▪ Logically, this is the same as a token ring!
Lecture 1: Fundamental concepts of computer networks. 41
Mesh Networks
▪ Every link is dedicated point-to-point link
▪ The term dedicated means that the link carries
traffic only between the two devices it
connects.
▪ To link n devices fully connected mesh has:
n ( n - 1) / 2 physical channels (Full-Duplex)
▪ Every Device on the network must have n - 1 ports
▪ Example: 4 devices in mesh has links: n(n-1) / 2 number of
links = 4 (4-1)/2 = 6. Number of ports per device = n – 1 =
4 –1 = 3
▪ Mesh topology is implemented in a limited fashion; e.g.,
as backbone of hybrid network

Lecture 1: Fundamental concepts of computer networks. 42


Hybrid Topology
▪ A network can be hybrid.
▪ For example, A main star topology with each branch
connecting several stations in a bus topology.

Lecture 1: Fundamental concepts of computer networks. 43


Categorizing Networks
❑ Based on architecture
▪ Peer-2-Peer
o Each computer (peer) has equal responsibilities,
capacities, sharing hardware, data, with the other
computers on the peer-to-peer network
o Good for small businesses and home networks
o Simple and inexpensive

Lecture 1: Fundamental concepts of computer networks. 44


Based on architecture
▪ Client/Server
o All clients must request service from the server
o The server is also called a host
o Different servers perform different tasks: File server,
network server, etc.

Lecture 1: Fundamental concepts of computer networks. 45


Categorizing Networks
❑ Based on Technologies
▪ Vary depending on the type of devices we use for
interconnecting computers and devices together
▪ Ethernet
▪ LAN technology allowing computers to access the
network
▪ Susceptible to collision
▪ Can be based on BUS or STAR topologies
▪ Operates at 10Mbps or 100Mbps, (10/100)
▪ Fast Ethernet operates at 100 Mbps /
▪ Gigabit Ethernet (1998 IEEE 802.3z)
▪ 10-Gigabit Ethernet (10GE or 10GbE or 10 GigE)
Lecture 1: Fundamental concepts of computer networks. 46
Based on Technologies

▪ Physical layer
o Gigabit Ethernet using optical fiber, twisted pair
cable, or balanced copper cable
▪ Token Ring
o LAN technology
o Only the computer with the token can transmit
o No collision
o Typically 72-260 devices can be connected
together
▪ TCP/IP and UDP
o Uses packet transmission
Lecture 1: Fundamental concepts of computer networks. 47
Based on Technologies
▪ 802.11
o Standard for wireless LAN
o Wi-Fi (wireless fidelity) is used to describe that
the device is in 802.11 family or standards
o Typically used for long range (300-1000 feet)
o Variations include: .11 (1-2 Mbps); .11a (up to
54 Mbps); .11b (up to 11 Mbps); .11g (54 Mbps
and higher
▪ 802.11n
o Next generation wireless LAN technology
o Improving network throughput (600 Mbps
compared to 450 Mbps) – thus potentially
supporting a user throughput of 110 Mbit/s
Lecture 1: Fundamental concepts of computer networks. 48
Based on Technologies
❑ WiMAX
o Worldwide Interoperability for Microwave
Access
o Provides wireless transmission of data from
point-to-multipoint links to portable and fully
mobile internet access (up to 3 Mbit/s)
o The intent is to deliver the last mile wireless
broadband access as an alternative to cable
and DSL
o Based on the IEEE 802.16(d/e) standard (also
called Broadband Wireless Access)
Lecture 1: Fundamental concepts of computer networks. 49
Network Technologies
▪ Personal area network (PAN)
o A low range computer network
o PANs can be used for communication among
the personal devices themselves
o Wired with computer buses such as USB and
FireWire.
▪ Wireless personal area network (WPAN)
o Uses network technologies such as IrDA,
Bluetooth, UWB, Z-Wave and ZigBee

Lecture 1: Fundamental concepts of computer networks. 50


Categorizing Networks
❑ Based on users
▪ Access Network: end-users access
network services
▪ Core Network: traffic from between access
and core networks transported Access
Network
Access Core
Network Network
Core
Network
Access
Network
Access Core Network
Network (or Backbone/Transport Network)

Access
Access
Network
Core Network
Network Core
Network

Access
Network Access
Network

Lecture 1: Fundamental concepts of computer networks. 51


Categorizing Networks
❑ Based on transmission medium
▪ Wired
o Easy to control signal transmission
o Protect from interference from other
transmitting sources
o Higher data rates, less errors, more predictable

▪ Wireless
o Allows mobility
o Allows convenience

Lecture 1: Fundamental concepts of computer networks. 52


Categorizing Networks
❑ Based on user mobility
▪ Fixed
o Devices in the network are fixed (do not move)
o Easier to design network; predict traffic
requirements

▪ Mobile
o Devices may be move
o Difficult to know how much capacity is needed
in advance

Lecture 1: Fundamental concepts of computer networks. 53


Categorizing Networks
❑ Based on link configuration
▪ Point-to-point (two devices)
o Dedicated link between two devices
o Entire capacity of the link is reserved for
transmission between those two devices
Serial Connection, Like a T1 between Routers

Direct Ethernet or Wireless

Cable Direct to Hub or Switch


Hub

Lecture 1: Fundamental concepts of computer networks. 54


Based on link configuration
▪ Point-to-multipoint (shared among N devices)
o More than two devices share a single link
o Capacity is shared
o Channel is shared either spatially or temporally
Branch
Offices

Corporate
Office

Lecture 1: Fundamental concepts of computer networks. 55


Network Criteria

Network Criteria

Performance Reliability Security

Lecture 1: Fundamental concepts of computer networks.


56
Performance

▪ Depends on a number of factors.


o number of users
o type of transmission medium(data rate)
o hardware
o software : error-free delivery

▪ Evaluated by two networking metrics:


o Throughput and Delay.
Lecture 1: Fundamental concepts of computer networks.
57
Reliability
▪ Frequency of failure
▪ Recovery time of a network after a failure
▪ Catastrophe
o Networks must be protected from catastrophic
events such as fire, earthquake, or theft.
Security
▪ Protecting data from Unauthorized access
▪ Protecting data from Viruses and Worms
Lecture 1: Fundamental concepts of computer networks.
58
End
Lecture 1: Fundamental concepts of
computer networks.

Lecture 1: Fundamental concepts of computer networks. 59

You might also like