Professional Documents
Culture Documents
Lec 1 Introduction To Networks
Lec 1 Introduction To Networks
Lec 1 Introduction To Networks
Objectives
Topic Title Topic Objective
Network classification Explain how networks is classified based on different
factors.
Network Components Explain how host and network devices are used.
Network Representations Explain network representations and how they are used
and Topologies in network topologies.
Network Security Identify some basic security threats and solution for all
networks.
2
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
Introduction
Network Definition
A network can be defined as
two or more computers
connected together in such a
way that they can share
resources.
The purpose of a network is to
share resources:
A file A folder A
printer A disk drive
Or just about anything else that
exists on a computer.
5
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
Network Communications
Network communication, or internetworking, defines a set of protocols (that is, rules and standards)
that allow application programs to talk with each other without regard to the hardware and
operating systems.
Before beginning to communicate establish rules (protocols) or agreements are established to govern
the conversation. Among the protocols that govern successful human communication as an example
are:
• Identification of the sender and receiver.
• Agreement on the method.
• Using Common language.
• Speed and delivery of the message.
• Confirmation that the message was received.
6
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
Network Components
Network Components
Networks
components
Hardware Software
8
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
Network Components
1- Network Devices
Equipment that connects directly to a network segment is referred to as a device.
These devices are broken up into two classifications:
end-user devices
Intermediate network devices
End-user devices
Intermediate devices
9
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
Network Components
End-User Devices
An end device is where a message originates from or where it is received.
Data originates with an end device, flows through the network, and arrives at an end device.
To distinguish one end device from another, each end device on a network has an address.
When an end device initiates communication, it uses the address of the destination end device to
specify where to deliver the message.
An end device is either the source or destination of a message transmitted over the network.
The machine
address called is a numerical label
assigned to each device The application
Media Access connected to a
Control (MAC) address called port
computer network that address.
address. uses the Internet
Protocol for
It is a 6 octet communication.
It is a decimal number.
hexadecimal Well Known Ports
called internet protocol Registered Ports
number. (ex: (IP) address. Dynamic or Private
2A:3E:14:23:1C:87 It is a 4 dotted decimal
) number. (ex:
121.13.0.0)
10
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
Network Components
11
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
Network Components
Hub
Repeater
12
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
Network Components
Switch
Bridge
13
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
Network Components
Router
14
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
Network Components
2- Network Media
Communication across a network is carried through a medium which allows a message to travel from
source to destination.
In wired connections, the medium is either copper, which carries electrical signals, or optical fiber,
which carries light signals.
In wireless connections, the medium is the Earth's atmosphere, or space, and the signals are
microwaves.
Different types of network media have different features and benefits.
Not all network media have the same characteristics, and they are not all appropriate for the same
purpose.
Networks typically use three types of media:
• Metallic wires within cables, such as copper
• Glass, such as fiber optic cables
• Wireless transmission
The criteria for
choosing network
media are:
• The distance the
media can
successfully carry a
signal
• The environment in
which the media is to
be installed
• The amount of data
and the speed at
which it must be
transmitted
• The cost of the media
15
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
and installation
Network Components
2- Network Media
Media Bandwidth describes the maximum data transfer rate of a network or Internet connection.
It measures how much data can be sent over a specific connection in a given amount of time.
While Throughput refers to the actual measured bandwidth, at a specific time of day, using
specific Internet routes, and while a specific set of data is transmitted on the network.
Unfortunately, throughput is often far less than the maximum possible digital bandwidth of the
medium that is being used.
The following are some of the factors that determine throughput:
• Internetworking devices
• Type of data being transferred
• Network topology
• Number of users on the network
• Network media
Media bandwidth and throughput can be measured through the following formula:
16
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
Network Components
2- Network Media
The instantaneous throughput at any instant of time is the rate (in bits/sec) at which destination is
receiving the file. (Many applications display the instantaneous throughput during downloads in the user
interface).
the average throughput is the total payload over the entire session divided by the total time. Total time
is calculated by taking the difference in timestamps between the first and last packet.
The figure shows a client connected to a server through a series of routers. This network is connected by links with
transmission rates R1, R2, ……, and RN. The average throughput to transmit a file S bits can be calculated as
S/min{R1, R2, ……, RN }.
bottleneck link
link on end-end path that constrains end-end throughput
17
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
Example
Rs
Rs Rs
Rc Rc
Rc
3- Rules (Protocols)
Protocols are the rules that the networked devices use to communicate with each other.
The industry standard in networking today is a set of protocols called TCP/IP (Transmission Control
Protocol/Internet Protocol).
TCP/IP is used in home and business networks, as well as being the primary protocol of the Internet.
It is TCP/IP protocols that specify the formatting, addressing and routing mechanisms that ensure our
messages are delivered to the correct recipient.
Protocols define the syntax and the order of messages transferred between the sender and the
receiver.
20
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
Network Components
Network Representations
Network diagrams, often called topology diagrams, use symbols to represent devices within the network.
21
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
Putting It all Together
1. Converted to Binary.
22
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
Putting It all Together
23
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
Putting It all Together
7. The destination device converts the bits into human readable form.
24
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
Classification of Computer Networks
Classification of Networks
There are many distinct types of computer networks. Computer network varies with each other based
on many criteria such as:
• transmission media: Wired (UTP, coaxial cables, fiber-optic cables) and Wireless.
• network scale (size): LAN and WAN (and MAN).
• management method: Peer-to-peer and Client/Server.
• topology (connectivity): Bus, Star, Ring …
26
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26
1- Classification based on Media
Communication across a network is carried through a medium which allows a message to travel from source to
destination.
Different types of network media have different features and benefits.
Not all network media have the same characteristics, and they are not all appropriate for the same purpose.
Networks can be classified based on transmission media to:
27
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27
2- Classification of Networks by Scale
SANs are typically composed of hosts, switches, storage elements, and storage devices that are
interconnected using a variety of technologies, topologies, and protocols.
SANs may also span multiple sites. This simplified presentation of storage to a host is accomplished
through the use of different types of virtualization.
30
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30
Networks of Many Sizes
31
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31
3- Classification based on Management Method
32
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32
3- Classification based on Management Method
33
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33
4- Classification based on Network Topology
35
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 35
4- Classification based on Network Topology
36
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36
4- Classification based on Network Topology
Logical Topology
The logical topology defines how the data should transfer. On the contrary of the physical topology,
which consists of the layout of cables, network devices and wiring. Two of the most common logical
topologies are:
1. Bus topology: 2. Ring topology:
In LAN, Ethernet uses the logical bus topology to In this topology only one node can be allowed to transfer the
data in a network at a given time.
transfer data in case of using a hub device to This mechanism is achieved by a token (the node having
connect end user devices. Although the topology the token only can transmit the data in a network) and
is physical star topology, but the a logically bus hence the collision can be avoided in a network.
topology where the hub broadcasts the data to A multi-station access unit (MSAU) is a hub or concentrator
the entire network. All other nodes on the that connects a group of computers to a token ring local
area network.
network listen the data and check if the data is Token passing controls network access by passing an electronic
intended for them. token sequentially to each host.
When a host receives the token, that host can send data on the
network. If the host has no data to send, it passes the token to the
next host and the process repeats itself.
38
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 38
4- Classification based on Network Topology
Logical Topology
In following figure, the addressing scheme of a network changed in the presence of the router.
The router segmented the network into three different subnetworks with different network addresses.
In this WAN, each end user device should determine how to send data locally and remotely.
39
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 39
Network Transmission
Unicast transmission, in which a packet is sent Broadcast transmission is supported on most LANs (e.g.
from a single source to a specified destination, is Ethernet), and used to send the same message to all
still the predominant form of transmission on computers on the LAN. Some protocols use broadcast to
LANs and within the Internet. In this case there obtain missing information from the network.
is just one sender, but the information is sent to
all connected receivers.
Broadcast
Unicast
Multicast
40
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 40
Reliable Networks
Network Architecture
Networks must support a wide range of applications and services, as well as operate over many
different types of cables and devices, which make up the physical infrastructure.
The term network architecture, in this context, refers to the technologies that support the
infrastructure and the programmed services and rules, or protocols, that move data across the
network.
The following figure shows the four basic characteristics that the underlying architectures need to
address to meet user expectations.
42
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 42
Fault Tolerance
A fault tolerant network limits the impact of a failure by limiting the number of affected devices.
Multiple paths are required for fault tolerance.
Reliable networks provide redundancy by implementing a packet switched network.
Packet switching splits traffic into packets that are routed over a network.
Each packet could theoretically take a different path to the destination. This is not possible with
circuit-switched networks which establish dedicated circuits.
43
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 43
Circuit Switching
Circuit switching was designed in 1878 in order to send telephone calls down a dedicated channel.
This channel remains open and in use throughout the whole call and cannot be used by any other
data or phone calls.
44
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 44
Circuit Switching
46
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 46
Packet Switching
In packet-based networks, the message gets broken into small data packets.
These packets
are sent out
from the
computer and
they travel
around the
network
seeking out
the most
efficient route
to travel as
circuits
become
available.
This does not necessarily mean that they seek out the shortest route.
Each packet may go a different route from the others.
47
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 47
Packet Switching
48
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 48
Packet Switching
49
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 49
Circuit Switching vs. Packet Switching
Connection-oriented Connectionless
50
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 50
Scalability
A scalable network can expand quickly and easily to support new users and
applications without impacting the performance of services to existing users.
51
Network designers follow accepted standards and protocols in order to make the
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 51
networks scalable.
Quality of Service
Voice and live video transmissions require higher expectations for those services being
delivered.
Have you ever watched a live video with constant breaks and pauses? This is caused
when there is a higher demand for bandwidth than available – and QoS isn’t
configured.
Quality of Service (QoS) is the primary mechanism used to ensure reliable delivery of
content for all users.
With a QoS policy in place, the router can more easily manage the flow of data and
52 voice traffic.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 52
Reliable Network
Security
Ensuring Availability:
Combating virus attacks,
Firewalls, Redundant Architecture
There are two main types of network security that must be addressed:
Network infrastructure security
Physical security of network devices
Preventing unauthorized access to the management software on those devices
Information Security
Protection of the information or data transmitted over the network
Three goals of network security:
Confidentiality – only intended recipients can read the data
Integrity – assurance that the data has not be altered with during transmission
Availability – assurance of timely and reliable access to data for authorized users
53
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 53
Security Threats
Internal threats:
Whether intentional or
not, many studies
show that the internal
users of the network
cause the most
security breaches.
With BYOD strategies,
corporate data is more
vulnerable.
55
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 55
Security Solutions
Security must be implemented in multiple layers using more than one security
solution.
Network security components for home or small office network:
Antivirus and antispyware software should be installed on end devices.
Firewall filtering used to block unauthorized access to the network.
56
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 56
Network Security
Security Solutions (Cont.)
Larger networks have additional security requirements:
Dedicated firewall system to provide more advanced firewall capabilities.
Access control lists (ACL) – used to further filter access and traffic forwarding.
Intrusion prevention systems (IPS) – used to identify fast-spreading threats such as
zero-day attacks.
Virtual private networks (VPN) – used to provide secure access for remote workers.
57
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 57
Delays and Packet Loss in Packet-Switched Networks
Delay, loss, and throughput in Packet switched networks
59
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 59
Delay, loss, and throughput in Packet switched networks
Processing Delay
is the time required to examine the packet's header and
determine where to direct the packet.
The processing delay can also include other factors, such as
the time needed to check for bit-level errors in the packet that
occurred in transmitting the packet.
60
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 60
Delay, loss, and throughput in Packet switched networks
Queuing Delay
After the nodal processing, the router directs the packet to the queue that
precedes the link to second router.
At the queue, the packet experiences a queuing delay as it waits to be
transmitted onto the link.
The queuing delay of a specific packet will depend on the number of
other, earlier-arriving packets that are queued and waiting for transmission
across the link;
61
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 61
Delay, loss, and throughput in Packet switched networks
001010011101100
Transmission Delay
Assuming that packets are transmitted in a first-come-first-served manner, as is common in
packet-switched networks, our packet can be transmitted only after all the packets that
have arrived before it have been transmitted.
Denote the length of the packet by L bits and denote the transmission rate of the link (from
router A to router B) by R bits/sec.
The rate R is determined by transmission rate of the link to router B (For example, for a 10
Mbps Ethernet link).
The transmission delay (also called the store-and-forward delay) is L/R.
This is the amount of time required to transmit all of the packet's bits into the link.
62
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 62
Delay, loss, and throughput in Packet switched networks
001010011101100
Propagation Delay
is the time required to propagate from the beginning of the link to
destination at the end of the link.
The bit propagates at the propagation speed of the link.
The propagation delay is the distance between two nodes divided by the
propagation speed.
That is, the propagation delay is d/s, where d is the distance between node
A and node B and s is the propagation speed of the link.
63
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 63
Delay, loss, and throughput in Packet switched networks
Nodal delay
dddprop = propagation
proc ==processing
trans
queue
delay
transmission delay
delay
queuing delay
a= few
L/R,microsecs
significant
typically
depends aonfew toforhundreds
low-speed
microsecs
congestion of links
or lessmsecs
64
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 64
“Real” Internet delays and routes
• What do “real” Internet delay & loss look
like?
• Traceroute program: provides delay
measurement from source to router along
end-end Internet path towards destination.
For all i:
sends three packets that will reach router i
on path towards destination
router i will return packets to sender
sender times interval between
transmission and reply.
3 probes 3 probes
3 probes
65
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 65
Packet loss
buffer
(waiting area) packet being transmitted
A
B
packet arriving to
full buffer is lost
66
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 66
Quiz
Calculate the end-to-end delay for the following figure given that the packet length of
1,500 Bytes, propagation speed of 2.5*108 m/s, the router processing delay is 5 ms, and the
queuing delay is neglected.
68
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 68
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 69