01 - Computer Networks Introduction
01 - Computer Networks Introduction
Client
?
?
?
?
Server
Intellectual
interest
Change/reinven5on
Course Informa5on
Oce
Hours:
Hulya
Seferoglu:
W
(11:00am-
12:00pm
&
1:00pm-2:00pm),
in
SEO
1037
Prerequisites:
ECE
333
(Computer
CommunicaNon
Networks
I)
AND
ECE
341
(Probability
and
Random
Processes
for
Engineers)
OR
equivalent
classes
in
computer
networks
and
probability
and
random
processes.
Suggested
Textbooks:
Dimitri
P.
Bertsekas
and
Robert
G.
Gallager,
Data
Networks,
2nd
EdiNon,
PrenNce
Hall,
1992.
R.
Srikant
and
Lei
Ying,
CommunicaNon
Networks:
An
OpNmizaNon,
Control,
and
StochasNc
Networks
PerspecNve,
Cambridge
University
Press,
2014.
James
F.
Kurose
and
Keith
W.
Ross,
Computer
Networking:
A
Top-Down
Approach,
6th
EdiNon,
Addison-
Wesley,
2013.
Course
Informa5on
Course
Descrip5on:
In
this
course,
we
will
learn
about
some
advanced
topics
in
computer
networks.
Our
goal
will
be
to
give
some
insight
on
the
theory
and
raNonale
behind
the
todays
networking
protocols
and
algorithms.
Such
theoreNcal
understanding
has
paramount
importance
to
cope
with
the
issues
that
will
possibly
arise
in
the
next-generaNon
computer
networks.
Topics
will
include:
a
brief
review
of
the
layered
structure
of
networks,
staNsNcal
mulNplexing
and
queues,
scheduling
in
packet
switches,
scheduling
in
wireless
networks
(including
stochasNc
scheduling),
network
uNlity
maximizaNon
and
its
relaNonship
to
TCP
protocols
as
well
as
MAC
and
physical
layer
protocols.
Time
permidng;
we
may
also
cover
selected
topics
on
peer-to-peer
networks,
network
coding,
and
network
security.
Course
Informa5on
Deliverables
and
Grading
What
Grade
Homework
20%
Midterm
25%
Project
20%
Final Exam
35%
Course
Informa5on
Project
Details
The
class
project
will
involve
reading
one
to
two
important
research
papers
ad
repor5ng
on
them.
Project
steps
are
summarized
in
the
following.
1) Project
Proposal:
You
are
to
select
a
topic
and
one-two
papers
from
the
project
list.
Project
proposal
(selec5ng
a
topic
and
papers)
is
due
on
09/10.
This
step
will
be
1%
of
your
grade.
2) Project
Report
I:
You
should
study
the
papers
you
selected
in
the
rst
step
and
write
a
3-page
(single
column
10pt)
report.
Your
report
should
summarize
the
papers
you
study
and
explain
how
they
relate
to
each
other.
Project
Report
I
is
due
on
10/22.
This
step
will
be
5%
of
your
grade.
3) Project
Report
II:
You
should
write
a
4-page
(single
column
10pt)
report.
This
report
should
be
devoted
to
iden5fying
an
open
problem
(in
the
area
you
studied
in
the
rst
two
steps)
and
your
approach
and
solu5on
to
the
problem.
Project
Report
II
is
due
on
11/19.
This
step
will
be
9%
of
your
grade.
4) Project
Presenta5on:
You
will
need
to
prepare
10-min
oral
presenta5on
on
the
project.
Project
presenta5on
should
include
your
mo5va5on
to
choose
the
topic,
summary
of
the
papers,
and
the
open
problems
in
the
area
and
your
approach.
Presenta5ons
will
be
scheduled
in
the
last
two
weeks
of
classes.
This
step
will
be
5%
of
your
grade.
Course
Informa5on
Project
Details
Note
I:
If
you
wish
to
research
a
topic
that
is
not
on
the
list,
that
would
be
ok,
but
you
should
seek
my
approval
for
your
plan.
Note
II:
Projects
can
be
conducted
as
a
team
of
up
to
two
students.
Two-people
projects
should
select
at
least
two
papers
to
study.
Note
III:
Dierent
projects
and
teams
may
select
the
same/similar
papers.
Each
team
is
responsible
for
their
independent
project.
If
we
no5ce
that
mul5ple
projects
on
the
same
topic
are
iden5cal,
both
teams
will
get
0
grade
from
their
project.
They
will
also
be
subject
to
the
rules
of
UIC
Academic
Integrity
Policy.
Course
Informa5on
Project
Topics
Course
Informa5on
Tenta5ve
lecture
schedule
Course
Informa5on
Tenta5ve
lecture
schedule
Course
Informa5on
General
policies
Late
policy:
No
late
homeworks,
project
proposals,
and
project
reports
will
be
accepted.
Homework
solu5ons
will
be
posted
online
shortly
ajer
the
deadline.
Homeworks,
project
proposals,
project
reports
not
submiWed
by
the
deadline
will
get
zero
points.
However,
to
accommodate
for
unforeseen
circumstances,
your
homework
with
the
lowest
grade
(including
0
for
a
missing
one)
will
be
dropped.
This
means
that
you
can
skip
one
homework
without
asking
permission.
This
does
not
apply
to
your
project
proposals
and
project
reports.
CollaboraDon
on
homeworks:
You
are
allowed
to
discuss
with
your
classmates,
but
you
are
supposed
to
do
your
homework
individually.
If
we
no5ce
that
two
homeworks
are
iden5cal,
both
students
will
get
0
grade;
they
will
also
be
subject
to
the
rules
of
UIC
Academic
Integrity
Policy.
AFendance
is
not
mandatory.
It
is
up
to
you
to
keep
up
with
the
materials.
Exam
Policy:
1)
All
the
exams,
i.e.,
Midterm
and
Final
Exam,
are
closed
book,
closed
notes.
You
can
bring
one
page
cheat
sheet
to
the
exam,
but
you
cannot
access
your
slides,
notes,
book
etc.
2)
You
will
be
given
the
opportunity
to
take
a
make-up
exam
only
in
cases
of
medical
or
personal
emergencies,
which
must
be
veried.
If
such
an
emergency
occurs,
call
me
or
leave
a
note
(or
phone
message)
with
the
department
secretary
as
soon
as
possible.
If
you
will
be
out
of
town
when
an
exam
is
scheduled,
I
must
be
told
in
advance
and
may
require
you
to
take
the
exam
early.
Otherwise,
if
you
miss
an
exam
you
will
receive
0
points.
Grading
Policy:
Curve.
Religious
Holidays:
Students
who
wish
to
observe
their
religious
holidays
should
no5fy
instructor
by
the
tenth
day
of
the
semester
of
the
date
when
they
will
be
absent
unless
the
religious
holiday
is
observed
on
or
before
the
tenth
day
of
the
semester.
In
such
cases,
the
students
should
no5fy
the
instructor
at
least
ve
days
in
advance
of
the
date
when
he/she
will
be
absent.
Every
reasonable
eort
will
be
made
to
honor
the
request.
Academic
Integrity:
Dishonest
ac5ons
by
students
including
plagiarism
will
result
in
appropriate
disciplinary
ac5on.
Inten5onal
use
or
aWempt
to
use
unauthorized
assistance,
materials,
informa5on,
or
people
in
any
examina5on,
quiz,
or
assignment
may
lead
to
penal5es
such
as
a
failing
grade.
UIC
Academic
Integrity
Policy
will
be
followed.
Roadmap
Goals
and
Mo5va5on
Course
Informa5on,
Tenta5ve
Syllabus,
Policies,
and
Requirements
Network
Components
Protocols
and
Layers
Reference
Models
Network
Core
Network
Components
Parts
of
a
Network
Applica5on
Applica5on
Node
Link
Network
Components
Parts
of
a
Network
Applica5on
Applica5on
Node
Host
Host
Link
Routers
Network
Components
Parts
of
a
Network
Applica5ons
Host
Router
Applica5on
Router
Host
Network
Components
Component
Func5on
Example
YouTube,
Facebook,
CandyCrash
Host,
or
end-system,
edge
device,
node,
source,
sink
Support apps
Smartphones,
laptop,
desktop
Router,
or
switch,
node,
hub,
intermediate
system
Relays
messages
between
links
Link, or channel
Connects nodes
Wired, wireless
Types
of
Links
Full-duplex:
Bi-direc5onal
Applica5ons
Applica5on
Host
Host
Applica5on
Wireless
Links
Message
is
broadcast
Received
by
all
nodes
in
the
transmission
range
Wireless
Links
Message
is
broadcast
Received
by
all
nodes
in
the
transmission
range
Wireless
Links
Message
is
broadcast
Received
by
all
nodes
in
the
transmission
range
Building
a
Network
Connect
two/more
laptops.
Building a Network
Example
Networks
mobile network
WiFi
(802.11)
Ethernet
ISP
(Internet
Service
Provider)
Cable/DSL
Cellular
(2G,
3G,
4G)
Bluetooth
Telephone
Satellite
global ISP
home
network
institutional
network
regional ISP
Scale
Type
Example
Close
PAN(Personal
Area
proximity
Network)
Bluetooth
Building
WiFi,
Ethernet
City,
Campus
MAN
(Metropolitan
Area
Network)
Cable, DSL
Country
Large ISP
Planet
The
Internet
(network
of
all
networks)
The
Internet
global ISP
home
network
institutional
network
regional ISP
Roadmap
Goals
and
Mo5va5on
Course
Informa5on,
Tenta5ve
Syllabus,
Policies,
and
Requirements
Network
Components
Protocols
and
Layers
Reference
Models
Network
Core
Instance
of
lower
layer
protocol
Y
Protocol
X
X
Node 1
Protocol Y
Node 2
Instance
of
protocol
X
at
peer
node
Instance
of
lower
layer
protocol
Y
Protocol
X
X
Node 1
Protocol Y
Node 2
Instance
of
protocol
X
at
peer
node
global ISP
HTTP
home
network
TCP
IP
802.11
Wireless
Medium
institutional
network
regional ISP
Encapsula5on
We
said
that
layers
are
implemented
on
top
of
each
other,
but
we
did
not
talk
about
how
this
layering
scheme
works
Encapsula5on
is
the
mechanism
used
to
eect
protocol
layering
Lower
layer
wraps
higher
layer
content,
adding
its
own
informa5on
to
make
a
new
message
for
delivery
Like
sending
a
leWer
in
an
envelope;
postal
service
doesnt
look
inside
Encapsula5on
HTTP
TCP
IP
802.11
HTTP
HTTP
HTTP
HTTP
TCP
TCP
TCP
IP
IP
802.11
Encapsula5on
HTTP
HTTP
TCP
HTTP
TCP
IP
HTTP
TCP
IP
802.11
HTTP
HTTP
HTTP
TCP
TCP
HTTP
TCP
IP
IP
HTTP
TCP
IP
HTTP
TCP
IP
802.11
HTTP
802.11
TCP
IP
802.11
802.11
Encapsula5on
Normally
we
draw
a
message
like
this:
Each
layer
adds
its
own
header
802.11
IP
TCP
HTTTP
Last bits
Demul5plexing
Incoming
message
must
be
passed
to
the
protocols
that
it
uses
SMTP
HTTP
DNS
TCP
UDP
IP
ARP
Ethernet
???
Demul5plexing
Done
with
demulDplexing
keys
in
the
headers
SMTP
HTTP
DNS
TCP
UDP
IP protocol eld
IP
ARP
Ethertype
value
Ethernet
Ethernet
IP
TCP
HTTTP
Incoming
message
Advantage
of
Layering
Informa5on
hiding
and
reuse
Browser
Server
HTTP
HTTP
HTTP
HTTP
TCP
TCP
TCP
TCP
IP
IP
IP
IP
802.11
802.11
Ethernet
Ethernet
Browser
OR
Server
Disadvantage
of
Layering
Adds
overhead
But
minor
for
long
messages
Hides
informa5on
App
may
care
whether
it
is
running
over
wired
or
wireless
Roadmap
Goals
and
Mo5va5on
Course
Informa5on,
Tenta5ve
Syllabus,
Policies,
and
Requirements
Network
Components
Protocols
and
Layers
Reference
Models
Network
Core
Reference
Models
What
func5onality
should
we
implement
at
which
layer?
For
example,
sharing
bandwidth
@
which
layer?
This
is
a
key
ques5on
No
clear
answer
to
this
ques5on,
but
Reference
models
provide
frameworks
that
guide
us
Reference Models
(6) Presenta5on
(5) Session
(4) Transport
(3) Network
(1) Physical
Reference
Models
Internet
Reference
Model
Applica5on
Transport
Internet (IP)
Link
Reference
Models
Internet
Reference
Model
7 Applica5on
4 Transport
3 Internet (IP)
2/1 Link
Reference
Models
Internet
Reference
Model
7 Applica5on
4 Transport
- TCP, UDP
3 Internet (IP)
- IP
2/1 Link
Roadmap
Goals
and
Mo5va5on
Course
Informa5on,
Tenta5ve
Syllabus,
Policies,
and
Requirements
Network
Components
Protocols
and
Layers
Reference
Models
Network
Core
Packet-switching:
store-and-forward
L
bits
per
packet
source
3 2 1
R bps
R bps
desNnaNon
One-hop
numerical
example:
L
=
7.5
Mbits
R
=
1.5
Mbps
one-hop
transmission
delay
=
5
sec
R = 100 Mb/s
R = 1.5 Mb/s
queue of packets
waiting for output link
D
E
1-55
FDM
4 users
frequency
time
TDM
frequency
time
1 Mbps link
circuit-switching:
10
users
N
users
..
example:
1
Mb/s
link
each
user:
packet
switching:
with
35
users,
probability
>
10
ac5ve
at
same
5me
is
less
than
.0004
*
A
B
packets queueing (delay)
free (available) buffers: arriving packets
dropped (loss) if no free buffers
propagation
nodal
processing
queueing
propagation
nodal
processing
queueing
Caravan
analogy
100 km
ten-car
caravan
toll
booth
Cars
propagate
at
100
km/hr
Toll
booth
takes
12
sec
to
service
car
(bit
transmission
5me)
Car~bit;
caravan
~
packet
Q:
How
long
un5l
caravan
is
lined
up
before
2nd
toll
booth?
100 km
toll
booth
average
queueing
delay
trac
intensity
=
La/R
La/R
~
0:
avg.
queueing
delay
small
v La/R
->
1:
avg.
queueing
delay
large
v La/R
>
1:
more
work
arriving
than
can
be
serviced,
average
delay
innite!
v
La/R ~ 0
La/R -> 1