Chapter 01 Introduction

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 54

Computer Networks

( CS 3022)
(15/30/55)

Text Book:
1. Computer Networks by Andrew S. Tanenbaum 5th edition
2. Data and Computer Communications, 10th edition, William Stallings
3. Computer Networks: A Systems Approach, 4th Edition Larry L.Peterson, Bruce
S. Davie.
Course Aim:

To introduce students to computer networks and


concentrates on building a firm foundation for
understanding Data Communications and Computer
Networks.
Intended Learning Outcomes
(ILOs):
After completing this course, students will be able to;
1. Describe the basics of data communication
2. Explain the various types of computer networks
3. Experience in designing communication protocols
4. understand the general principles behind multiplexing,
addressing, routing, reliable transmission
5. Compare communications systems in how they solve
similar problems
Course Contents

1. Introduction to Computer Networks: Classification of Computer Networks, ISO-OSI architecture.


2. Data Communication & Data transmission: Data transmission, Time domain, Frequency domain,
Modulation techniques.
3. Transmission media: Twisted pair, Coaxial cable, Optical fiber, Terrestrial Microwave, Satellite
Microwave, Radio wave.
4. Transmission and switching: Frequency Division and Time division multiplexing, Circuit switching,
Packet switching, Message switching.
5. Data link Layer Error detection and correction technique: Parity checks, Cyclic Redundancy Checks
(CRC), Error correcting code, Hamming distance.
6. Framing: character count, starting and ending characters with character stuffing, Starting and ending
flags with bit stuffing.
7. Protocols: Stop and wait protocol, Sliding window protocol, Go back- N, Selective Repeat protocol,
piggybacking. HDLC, LAN Techniques, CSMA/CD, Ethernet, IEEE standard 802 Cabling, MAC sublayer,
token ring, token bus, Cambridge Ring, FDDI.
8. Network layer and Internetworking: Connection less and Connection oriented Services, Virtual circuit
and datagram delivery, Bridge Switches and Routers, Internet Protocol(IP), Routing and Routing
algorithms, Building routing table, RIP, OSP.
9. Network Security: Cryptographic algorithms, Security Mechanisms.
Assessment Strategies:

Theory
Summative: Written examination (65%)
Formative: Continuous assessments tests/ quizzes/ MCQ / Viva (35%);

Practical
Summative: Lab test (65%)
Formative: Continuous assessments tests /Home Assignment (35%)

Note:
The final marks will be calculated as (1/2) × Lecture + (1/2) × Practical.
Introduction
What is a Computer Network?
A Computer network is a collection of computers
and communications hardware and software linked
together to allow sharing of resources and provide a
facility for communication.
Components of a network

The components of a network are:


• Computer systems with network cards
• Communications software
• Networking and Internetworking devices
• Data / Information
• Networked / shared resources
• Users
Different kinds of networks

MAN
Different kinds of networks

• Personal Area Network (PAN)


Used for data transmission amongst devices such as
computers, telephones, tablets and personal digital
assistants.
• Local Area Network (LAN)
A network that serves users within a confined area such as a
building or a campus
• Metropolitan Area Network (MAN)
Covers a geographic area the size of a city
• Wide Area Network (WAN)
Covers a wide geographical area such as a country. The
Internet is the best example of a WAN.
Types of LAN

Peer to peer Client Server


Peer to Peer LAN

Printer
Printer

Peers
All computers on the network communicate and
share resources directly with one another.
Client-server LAN

Print
File Server server

Clients Printer

Consist of clients, computers requesting for files or applications,


and server(s) that provides applications and services to other
computers
Simple Physical Topologies
• Physical topology: physical layout of nodes on a network
• Three fundamental shapes:
▫ Bus
▫ Ring
▫ Star
• May create hybrid topologies
• Topology integral to type of network, cabling
infrastructure, and transmission media used
Bus Topology
Bus Topology

• Single cable connects all network nodes without


intervening connectivity devices
• Devices share responsibility for getting data from one
point to another
• Terminators stop signals after reaching end of wire
▫ Prevent signal bounce
• Inexpensive, not very scalable
• Difficult to troubleshoot, fault-tolerant
Advantages of Bus Topology

 Easy to add to it
 It is easy to set-up and extend bus network.
 Cable length required for this topology is the least
compared to other networks.
 Bus topology costs very less.
 Linear Bus network is mostly used in small networks.
Good for LAN.
Fault tolerance
Disadvantages of Bus Topology

• Management costs can be high


• There is a limit on central cable length and number of
nodes that can be connected.
• Proper termination is required to dump signals. Use of
terminators is must.
• It is difficult to detect and troubleshoot fault at
individual station.
• It is not suitable for networks with heavy traffic.
• Security is very low because all the computers receive the
sent signal from the source.
Ring Topology
▫ Each node is connected to the two nearest nodes so the
entire network forms a circle
▫ One method for passing data on ring networks is token
passing

A
B

c
Token Passing
Token contains a piece of information which along with data is
sent by the source computer. This token then passes to next
node, which checks if the signal is intended to it. If yes, it
receives it and passes the empty to into the network, otherwise
passes token along with the data to next node. This process
continues until the signal reaches its intended destination.
The nodes with token are the ones only allowed to send data.
Other nodes have to wait for an empty token to reach them. This
network is usually found in offices, schools and small buildings.
Advantages of Ring Topology

• Ring topology is well organized. Each node gets to send the


data when it receives an empty token. This helps to reduces
chances of collision. Also in ring topology all the traffic flows
in only one direction at very high speed.
• Even when the load on the network increases, its
performance is better than that of Bus topology.
• There is no need for network server to control the
connectivity between workstations.
• Additional components do not affect the performance of
network.
• Each computer has equal access to resources.
Disadvantages of Ring Topology
• Each packet of data must pass through all the computers
between source and destination.
• If one workstation or port goes down, the entire network
gets affected.
• Network is highly dependent on the wire which connects
different components.
Star Topology

▫ Every node on the network is connected through a


central device
Star Topology (Cont)

• Any single cable connects only two devices


▫ Cabling problems affect two nodes at most
• Requires more cabling than ring or bus networks
▫ More fault-tolerant
• Performance of the network is dependent on the capacity
of central hub.
• Easily moved, isolated, or interconnected with other
networks
▫ Scalable
Advantages of Star Topology

• As compared to Bus topology it gives far much better


performance, signals don’t necessarily get transmitted to all
the workstations. A sent signal reaches the intended
destination.
• Easy to connect new nodes or devices. In star topology new
nodes can be added easily without affecting rest of the
network. Similarly components can also be removed easily.
• Centralized management. It helps in monitoring the network.
• Failure of one node or link doesn’t affect the rest of network.
At the same time its easy to detect the failure and
troubleshoot it.
Disadvantages of Star Topology

• Too much dependency on central device has its own drawbacks.


If it fails whole network goes down.

• Requires more cable than the bus.

• Performance and as well number of nodes which can be added in


such topology is depended on capacity of central device.
OSI-ISO Architecture
Protocol Hierarchy

• To reduce the design complexity of the networks, most


networks are organized as a stack of layer
• Each layer built upon the one below it.
• The purpose of each layer is to offer certain services to the
higher layers.
• Each layer is a kind of virtual machine, offering certain
service to the layer above it.
ISO/OSI Reference Model

• OSI stands for Open Systems Interconnection. It


has been developed by ISO – ‘International
Organization of Standardization‘, in the year 1974.

• It is a 7 layer architecture with each layer having specific


functionality to perform. All these 7 layers work
collaboratively to transmit the data from one person to
another across the globe.

• The OSI model defines a hierarchical architecture that


logically partitions the functions required to support
system-to-system communication.
Data Transmission in ISO/OSI Ref. Model.
The Layered Approach to
Communication
7. Application

6. Presentation

5. Session

4. Transport

3. Network

2. Data Link

1. Physical
Division of Layers
7. Application

6. Presentation
Upper Layers
5. Session

4. Transport Middle Layer

3. Network

2. Data Link
Lower Layers
1. Physical
The Function of a Layer
• Each layer deals with one aspect of
networking
▫ Layer 1 deals with the communication media
• Each layer communicates with the adjacent
layers
▫ In both directions
▫ Ex: Network layer communicates with:
 Transport layer
 Data Link layer
• Each layer formats the data packet
▫ Ex: Adds or deletes addresses
Role of Layers
Node A

7. Application

6. Presentation

Data In

To/from
1. Physical Node B

Data Out
Communication Between Layers

7. Application

Data
Encapsulation

6. Presentation

Data
Stripping

5. Session
7. Application Layer
• This provides a mechanism for applications to
access the services provided by OSI environment
for the users.

• Purpose
▫ User application to network service interface
• Examples
▫ File request from server
▫ E-mail services
▫ etc.
6. Presentation Layer
The presentation layer performs:
• Data Reformatting
• Encryption
• Compression

Purpose
▫ Formats data for exchange between points of
communication
5. Session Layer
• The session layer establishes, manages, and
terminates user connections. A session is an
exchange of message between computers. It
synchronizes user tasks.

• Purpose
▫ Oversee a communication session
 Establish
 Maintain
 Terminate
4. Transport Layer
• The transport layer controls the flow of data. It
ensures that message is delivered error free. It divides
large message into small packets for efficient
transmission.
• Purpose
▫ Repackage proper and efficient delivery of packages
 Error free
 In sequence
 Without duplication

Services:
1. Connection oriented service
2. Connection less service
3. Network Layer
• The network layer is responsible for
establishing, maintaining and terminating
network connections. It manages the delivery of
data form source to destination.
• Purpose
▫ Addressing and routing the packets
• Example application at the router
▫ If the packet size is large, splits into small packets
2. Data Link Layer
• The data link layer is responsible for the reliability of the physical link
established at layer 1. Data link must decide the following:
1 Framing: The data link layer divides the stream of bits into manageable
data units called frames.
2 Flow Control: The rate of sending data can be more than the of
receiving data link layer imposes flow control
mechanism to prevent it.
3 Errors Control: The data link layer detects and retransmits damaged
or lost frames. It also prevents the duplication of
frames.
4 Access Control: If two or more devices are connected to the same link,
data link layer determines which device has control
over the link at a given time.
• Purpose
▫ Manages the flow of data over the physical media
▫ Responsible for error-free transmission over the physical media
▫ Assures error-free data submission to the Network Layer
1. Physical Layer
The physical layer is the bottom layer of the OSI model. It transmits stream of
bits and defines how the data is transmitted over the network and what control
signals are used. Its main function is to control how stream of bits is send and
received over the physical medium. Physical layer must decide the following:
1 Characteristic of Media: The physical layer defines the characteristics
and type of transmission medium.
2 Representation of Bits: The bits are encoded into electrical signals for
transmission.
3 Data Rate: physical layer defines the number of that will be sent in each
second.
4 Transmission Mode: The physical layer defines the direction of
transmission between two devices: simple, half-duplex or
full-duplex.

• Purpose
▫ Deals with the transmission of 0s and 1s over the physical media
 Translation of bits into signals
53

ISO/OSI Reference Model: Summary

• Bottom layers
▫ Support for physical connectivity, frame formation,
encoding, and signal transmission

• Middle layers
▫ Establish and maintain a communication session
between two network nodes
▫ Monitor for error conditions

• Uppermost layers
▫ Application/software support for interpretation,
presentation, and encryption of data.
54

ISO/OSI Reference Model: Summary

• The key idea throughout is that although actual data


transmission is vertical, each layer is programmed as though it
were horizontal.
• The sending process has some data it wants to send to the
receiving process.
• It gives the data to the application layer, which then attaches the
application header (AH), to the front of it and gives the resulting
item to the presentation layer.
• The presentation layer may transform this item in various ways
and possibly add a header to the front, giving the result to the
session layer.
• This process it repeated until the data reach the physical layer,
where they are actually transmitted to the receiving machine.
• On that machine the various headers are stripped off one by one
as the message propagates up the layers until it finally arrives at
the receiving process.

You might also like