0% found this document useful (0 votes)
49 views42 pages

(Lecture 1) Introduction To Computer Networks

Download as pdf or txt
Download as pdf or txt
Download as pdf or txt
You are on page 1/ 42

ECE 408

Introduction to Computer Networks

Lecture 1: Introduction
Fall 2018
Uses of Computer Networks
• Computer networks are collections of autonomous
computers that exchanges information
• e.g., the Internet, the Intranet
• They have many uses:
• Business Applications
• Home Applications
• Mobile Users
• These uses raise:
• Social Issues
• Components
• Network devices
• Network links
Internet
• A Massive Network of Networks
• millions of connected computing router
workstation
devices server
• hosts = end systems mobile
• running network apps local ISP
• communication links
• fiber, copper, radio, satellite
• bandwidth (transmission rate) regional ISP
• Packet switches
• forward packets (chunks of data)
• routers and switches

company
network
Business Applications
• Companies use networks and computers for resource
sharing with the client-server model:

request

response

client-server model

• Other popular uses are communication


• email, VoIP, e-commerce, desktop sharing, telemedicine
Home Applications
• Homes contain many networked devices
• Computers, TVs, connected to the Internet by cable, DSL,
wireless, etc.
• Home users communicate
• Social networks, consume content, video, and transactions,
auctions
• Peer-to-peer model
• No fixed clients and servers
Home Applications
• Person-to-person model
• Instant messaging, Twitter, Facebook, Wikipedia, etc.
• E-commerce (e.g., home shopping)
• Entertainment (e.g., IPTV, VOD)
• Ubiquitous computing → IoT (Internet of Things)
• Internet, Intranet
• Ethernet, Wi-Fi, powerlines, RFID, etc.
Mobile Users
• Tablets, laptops, and smart phones are popular
devices; Wi-Fi hotspots and cellular provide wireless
connectivity.
• Mobile users communicate (voice and texts),
consume content, (video and Web), and use sensors.
• Wireless and mobile are related but different:
Mobile Users
• Global Mobile Data Traffic
• 7.2 EB(exabytes)/month in 2016 (63% growth)
• 18 fold growth in the past five years
• 7 fold growth by 2021 (49 EB/month)

Source: Cisco Visual Networking Index, 2017: Global Mobile Data Traffic Forecast Update, 2016–
2021 White Paper
Mobile Users
• Smartphones: primary internet access points
• By 2021, 98% traffic and 75% connections from “smart”
devices
• 4G: 75% traffic and 53% connections
• 5G: 1.5% traffic and 0.2% connections
Wireless Body Sensor Network

Wireless
connection
(Bluetooth)

Sensors data
though internet
IoT based Real-time Monitoring System
Communication Links
• Point-to-point links
• Connects individual pairs of machines, from source to
the destination via packets
• Multiple routes (of different lengths) possible
• unicasting
• Broadcasting links
• Communication channel shared on the network
• packets sent by any machine received by all others
• wireless network is a common example
• multicasting
Network Classification

• Networks can be classified by topology


Network Classification

• Networks can be classified by media characteristics


• Wired network
• Guided media including fiber optics, copper wires, twisted-
pair cable, coaxial cable, etc.
• Wireless network
• Unguided media including radio link
Network Classification

• Networks can be classified by their scale:


Scale Distance Type
Vicinity < 2-10m PAN (Personal Area Network)
Building < 100m – 1km LAN (Local Area Network)
City < 10km MAN (Metropolitan Area Network)
Country 100 – 100km WAN (Wide Area Network)
Planet The Internet (network of all
networks)
Personal Area Network

• Connect devices over the range of a person


• Bluetooth, ZigBee, RFID, NFC, etc.
Local Area Network
• Connect devices in a home or office building
• Called enterprise network in a company

Wireless LAN Wired LAN with


with 802.11 switched Ethernet
Metropolitan Area Networks

• Connect devices over a metropolitan area


• Example MAN based on cable TV:
Wide Area Networks
• Connect devices over a country
• WAN connecting three branch offices (hosts)
• subnet: carry messages from host to host
Wide Area Networks
• VPN (Virtual Private Network)
• a WAN built from virtual links that run on top of the
Internet
Network Protocol
human protocols: network protocols:
• “what’s the time?” • machines rather than
• “I have a question” humans
• introductions • all communication activity
in Internet governed by
protocols

protocols define format, order of messages


sent and received among network
entities, and actions taken on msg
transmission, receipt
Network Protocol
a human protocol and a computer network protocol:

Hi
TCP connection
req
Hi
TCP connection
Got the response
time? Get http://ece.iit.edu
2:00
<file>
time

Q: Why are protocols so important?


Protocol Layers
• Protocol layering is the main structuring method used
to divide up network functionality.

• Each protocol instance talks


virtually to its peer
• Each layer communicates
only by using the one below
• Lower layer services are
accessed by an interface
• At bottom, messages are
carried by the medium
Protocol Layers
• Example: the philosopher-translator-secretary
architecture
• Each protocol at different layers serves a different
purpose
Protocol Layers
• Each lower layer adds its own header (with control
information) to the message to transmit and removes
it on receive

• Layers may also split and join messages, etc.


Design Issues for Layers
• Each layer solves a particular problem but must
include mechanisms to address a set of recurring
design issues
Issue Example mechanisms at different layers
Reliability despite Codes for error detection/correction
failures Routing around failures
Network growth Addressing and naming
and evolution Protocol layering
Allocation of resources Multiple access
like bandwidth Congestion and flow control
Quality of Service (QoS)
Security against Confidentiality of messages
various threats Authentication of communicating parties
Data Integrity
Connection-Oriented vs. Connectionless
• Service provided by a layer may be kinds of either:
• Connection-oriented, must be set up for ongoing use
(and torn down after use), e.g., phone call
• Connectionless, messages are handled separately, e.g.,
postal delivery
Unreliable Communication
• Why consider using “unreliable communication”?
• Reliable communication may not be available in a given
layer
• Packets can occasionally be damaged in transit
• It’s up to the higher protocol levels to recover them
• Delays inherent in providing a reliable service may be
unacceptable
• especially for real-time applications
Relationship of Services to Protocols

• A layer provides a service to the one above [vertical]


• A layer talks to its peer using a protocol [horizontal]
Relationship of Services to Protocols

• A service is like an abstract data type or an object in an


OOP
• Defines operations that can be performed on an object but does
not specify how these operations are implemented
• A protocol relates to the implementation of the service and
as such is not visible to the user of the service
Reference Models

• ISO (International Organization for Standardization)


• OSI (Open Systems Interconnection) model
• consists of 7 layers
• Application (APDU)
• Presentation (PPDU)
• Session (SPDU)
• Transport (TPDU)
• Network (packet)
• Data Link (frame)
• Physical (bits)

• IETF (Internet Engineering Task Force )


• TCP/IP model
• Application
• Transport
• Internet
• Link
OSI Reference Models
• A principled, international standard, seven layer
model to connect different systems
– Provides functions needed by users
– Converts different representations
– Manages task dialogs
– Provides end-to-end delivery
– Sends packets over multiple links
– Sends frames of information
– Sends bits as signals
Layer 7 : Application
• Contains a variety of protocols that are commonly
needed by the user
• HTTP (HyperText Transfer Protocol) for World Wide
Web (WWW)
• File transfer, e-mail, Telnet…
Layer 6 : Presentation
• Concerned with the syntax and semantics of the
information transmitted
• Data structure could be changed, in order to make it
possible for computers with different internal data
representations to communicate
• e.g., MPEG, HTML, JPEG…
Layer 5 : Session
• Allows users on different machines to establish
sessions between them
• dialog control (keeping track of transmission turns)
• token management (preventing same critical operations)
• synchronization (fail-safe/recovery)
Layer 4 : Transport
• A true end-to-end layer
• Transfer data from source to destination
• Message split/merge from/to Layer 3
• e.g., TCP, UDP
Layer 3 : Network
• Controls the operation of the subnet
• Determining how packets are routed from source to
destination
• Routes can be based on static tables, or automatically
updated table to avoid failed components
• Handling congestion/bottlenecks in the network
• Quality of Service (QoS)
• delay, transit time, jitter, etc..
Layer 2 : Data Link
• Transforms a raw transmission facility into a line that
appears free of undetected transmission errors
• Masks real errors by masking them
• Error handling
• Medium Access Control (MAC) sublayer
• controlling access to the shared channel
Layer 1 : Physical
• Transmitting raw bits over a communication channel
• Making sure bit 0 or 1 is received by the other end
OSI Reference Model
TCP/IP Model
Hybrid Model
• It is based on the TCP/IP model but we call out
the physical layer and look beyond Internet
protocols.

You might also like