0% found this document useful (0 votes)
98 views74 pages

MIS 6040 Networking and Wireless Communications - Introduction and General Overview

This document describes the MIS 6040 course on networking and wireless communications, which covers fundamental principles of wireless technology and computer networks at various layers, designing and implementing wired and wireless local area networks, and assessing students through assignments, projects, exams, and a laboratory component. The course content includes topics such as networking hardware, reference models, each layer of the OSI and TCP/IP models, wireless networking standards, and network security.

Uploaded by

Abreham Getachew
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
98 views74 pages

MIS 6040 Networking and Wireless Communications - Introduction and General Overview

This document describes the MIS 6040 course on networking and wireless communications, which covers fundamental principles of wireless technology and computer networks at various layers, designing and implementing wired and wireless local area networks, and assessing students through assignments, projects, exams, and a laboratory component. The course content includes topics such as networking hardware, reference models, each layer of the OSI and TCP/IP models, wireless networking standards, and network security.

Uploaded by

Abreham Getachew
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 74

MIS 6040: Networking and Wireless Communications

Credit Units: 3
Expected Learning Outcomes
By the end of this course, students will:

Describe the fundamental principles of wireless communication technology.

Explain the fundamental principles of computer networks at various layers


including physical, data link, network, and transport and application levels.

Describe the TCP/IP model.

Design and implement various types of wired Local Area Networks


including choice of media, IP addressing and routing.

Design and implement wireless Local Area Networks.


Course Content
•Uses of Computer Networks; Business, Home and Mobile Users, Social Issues;

•Network Hardware; Personal Area Network, Local Area Networks, Metropolitan


Area Networks, Wide Area Networks, Internetworks, Network Software;

•Reference Models; OSI and TCP/IP, Network Standardization

•Physical Layer; Theoretical Basis For Data Communication, Guided Transmission


Media, Wireless Transmission, Antennas and Propagation, Signal Encoding
Techniques, Spread Spectrum, Communication Satellites, Communication Satellites,
Digital Modulation and Multiplexing, The Public Switched Telephone Network,
Mobile Telephone System

•Data Link Layer; Error Detection And Correction, Elementary Data Link Protocols,
Sliding Window Protocols.

•Medium Access Control Sublayer; Channel Allocation Problem, Multiple Access


Protocols, Ethernet, Cellular Wireless Networks, Cordless Systems and Wireless
Local Loop Mobile IP and Wireless Access Protocol
Course Content (cont’d)

•Wireless LANs; Wireless LAN Technology, IEEE 802.11 Wireless LAN Standard,
Wireless Lans, Broadband Wireless, Bluetooth, RFID, Data Link Layer Switching

•The Network Layer; Network Layer Design Issues, Routing Algorithms,


Congestion Control Algorithms, Quality Of Service, Internetworking, Network
Layer in the Internet

•The Transport Layer; The Transport Service, Elements Of Transport Protocols,


Congestion Control Algorithms, UDP and TCP, Performance Issues

•Application Layer; Electronic Mail, The Domain Name System, The World Wide
Web, Real time Audio and Video, etc.

•Network Security; Cryptography, Symmetric-Key Algorithms, Public-Key


Algorithms, Digital Signatures, Management of Public Keys, Communication
Security, Authentication Protocols, Email Security; Web Security.
Course Assessment
Class assignments, take-home assignments, tests, small projects to
demonstrate use of software tools:

Laboratory Work 20%


Project 20%
Assignments 10%
Mid-semester Exam 20%
Final semester Exam 30%
Total 100%

Core Reading Materials


Tanenbaum, A.S., Wetherall, D.J. (2011). Computer Networks. 5th Edition,
Upper Saddle River, New Jersey: Prentice Hall.

Stallings, W. (2005). Wireless Communications & Networks. 2nd Edition,


Upper Saddle River, New Jersey: Prentice Hall.
Introductory Discussion

Question 1

What is a telecommunications network?

What is a computer network?


Introductory Discussion (cont’d)

Question 2 Shown is a generalized switching network

B 2
1
3 D
5
E
4 6
7
A F

= communication network node = End station

Analyze the switching fabric critically


Lesson 1: General Overview of Networking

The Network is the Computer

Sun Microsystems Inc.


Local Memory Local Memory Local Memory

CPU CPU CPU


Servers 1 Client 1 Client N

Communication Network

•Collection of processors;
•Non-shared (main) memory;
•message exchange over a network

Fig. 1 (a). Network = Platform for Distributed Applications


Why Distribution

Sharing of expensive
resources
Reduced
Costs Laser Printers;
Databases;
Special purpose servers
Why Distribution

Several small machines


provide a service;
instead of one large machine
Availability

Cost of redundancy is low


Why Distribution

Integrity
Replication, partitioning
& Caching
Why Distribution

Response time, throughput, etc

Performance
Replication, partitioning
& Caching

Performance
scalability
Motivation for Distribution

1. Technological Changes

CPU Power;

Bandwidth capacity

2. User Needs Power at the desktop


Key Point 1

Information transfer over a communications


network makes distributed applications
possible

The Network is the Computer


Uses of Computer Networks

• Business Applications;

• Home Applications;

• Social Issues
1. Business Applications

Server

Client 1
Network
Commodity
Machines

CPU;
Main Memory;
Secondary Memory
Client 2 Client/Server Model
Business Applications (cont’d)

Request
Client Server
machine machine

Client process Network


Reply
Server process

The Client/Server Model


Business Applications

Resource Sharing
Electronic email
Communications

Videoconferencing

Companies doing business with other companies


(Customers & suppliers)

Companies doing business with customers


(electronic commerce)
2. Home Applications
Some popular uses of networks and Internet
(for home users) include the following:

Access to remote information

Person-to-person communication (instant messaging,


chat rooms, etc)

Entertainment – video on demand

Tele-learning
Electronic commerce
3. Social Issues
Can two views be accommodated in
a closed coupled cyber world?

The views touch on the following:


Morality;
Law;
Right;
Wrong
Networking Issues
Need for Abstraction

PC1 Network Service PC2

Application Application
Program 1 Program 2
Do not interact with
hardware directly

Fig. 1(b). Need for abstraction


Protocol Layering

2 provides
services to 3
Layer 3
Layer 2
Layer 1
2 uses
services of 1

Fig. 2. Simple Protocol Stack


Protocol Layering

Protocol 3
Layer 3 Layer 3
Protocol 2
Layer 2 Layer 2
Protocol 1
Layer 1 Layer 1

Terminology:

Protocol Stack: Set of protocols;

Network Architecture: Layers & Protocols


Protocol Layering: Advantages

The advantages of protocol layers include:

• Complexity – reduced;
• Accelerated Evolution;

Layering • Programmer specialization/focus;


Advantages
• Learning/teaching easier;

• Troubleshooting
Example – Layering Advantage

Security layer (SSL) added

Application Layer

SSL Handshake SSL Change Cipher SSL Alert Application


Protocol Spec. Protocol Protocol Data
Protocol

SSL Record Protocol

Transmission Control Protocol (TCP)

IPv4 to IPv6

Fig. 3. Evolution: SSL and IPv6


Protocol Layering

Question:

What may be some of the disadvantages of protocol


layering?
Discussion Question

Organizations are also structured in layered manner:

From your experience (if any), highlight the


advantages and disadvantages of:

(i). Too many layers;

(ii). Too few layers.


How may layers are needed?

Key Principles/Questions as a Guide:

1. Is a well-defined function performed?

2. Are the layers too few?

3. Are the layers too many as to be incomprehensible?


The OSI Reference Model

Platform 1 Platform 2
Network Service

Fig. 4. Open Systems Model

Open Systems – any two platforms


Machine 1 Machine 2
Protocol
Upper Layers
Application Application

Presentation Protocol Presentation

Protocol Session
Session

Protocol
Transport Transport
Lower Layers

Network Protocol Network

Data link Protocol Data link

Physical Protocol Physical

Fig. 5 The OSI Reference Model


Design Issues

Physical Layer
Mechanical;
Electrical;
Timing

How many volts represent 1 bit and a 0 bit?


Key
How many nanoseconds a bit lasts?
Questions
How many pins per connector, what functions?
Data Link Layer

PC1 PC2
Physical link (media)

Check transmission errors;

Traffic regulation mechanism (flow regulation);

Controlling access to a shared channel


Network Layer

PC1 PC2
Network Service
(redundant routes)
Net 2
Net 1

How are packets routed from source to destination?

How are the end systems (PC1 & PC2) addressed?

Is there any messaging service, depicting the state of the network?


Transport Layer

Several Functions:

- End to end acknowledgements;

- Sequencing, if necessary;

- Error control – reliable service (retransmissions)


Session Layer

Parties establish sessions:

Dialog control (whose turn to transmit);

Check pointing (synchronization), etc

Establish, Maintain, Tear Down

Sessions
Presentation Layer

Syntax and semantics


of the information transferred

Encryption/decryption

Compression/decompression

Formatting
Application Layer

Contains protocols needed by users

HTTP;
SMTP;
FTP;
SNMP
Application Application
Presentation Presentation
Session Session
Transport Transport

Network Network Network Network


Data link Data link Data link Data link
Physical Physical Physical Physical

End system Intermediate Systems End system

User IS IS User

ES ES
IS

Fig. 6 The end systems and intermediate systems


Internet Suite of Protocols (TCP/IP)

TCP/IP Layers Example TCP/IP Protocols


Application File Transfer Protocol (FTP);
Hypertext Transfer Protocol
(HTTP); Simple Mail Transfer
Protocol (SMTP); Simple Network
Management Protocol (SNMP);
Remote Login (Telnet)
Transport (Host-to-Host) Transmission Control Protocol
(TCP); User Datagram Protocol
(UDP)
Internet Internet Protocol

Data Link Ethernet, Token Ring, FDDI


Physical The actual physical media and
related issues
TCP/IP Attributes

Open standards – specifications in public domain

Accessibility – implementations available in OSs

Simplicity – develop prototype implementations,


then standardize
TCP/IP Model

Connectionless
Transport
TCP/IP Applications
Service

Transport Control Protocol User Datagram Protocol


(TCP) (UDP)
Internet Protocol
(IP)
Connection Data Link Layer
Oriented
Transport Physical Layer
Connectionless
Service Network
Service

Fig. 7. Connection-oriented and Connectionless Services


Networks: Classification
Inter-Processor Processors located Example
Distance in same
10 m Room Local Area Network
100 m Building (LAN)
1 km Campus
Metropolitan
10 km City Area Network
100 km Country (MAN)
1000 km Continent
Wide Area Network
10,000 km The Earth
(WAN)
Internet
Networks: Classification (Cont’d)

Fundamental Differences:

Size

Ownership

Speeds

Technologies
Summary

Distributed computing applications use data


networks

A layered approach applied in protocol design

Technology introduces complexity – social issues


Group Discussion Question

How should we handle the dilemma below?

Technology introduces complexity – social issues


Network Planning & Design Guidelines
Network
Management

Network Network Network


Provisioning Operations Maintenance

Planning Fault Management Fault Management


Configuration Management
Design Network installation
Performance Management
Security Management
Network repairs
Accounting Management
Reports Management Facilities installation
& Maintenance
Inventory Management
Data gathering & Analyses Routine network tests
Fig. 1. Network Management Functional Groups
Introduction
To properly plan and design a network, it is first essential
to Identify the Customer’s Needs & Goals:

Analyze Business Goals and Constraints;

Analyze Technical Goals and Constraints;

Characterize the Existing Network;

Characterize Network Traffic


Business Goal
Increase revenue and profit;

Improve corporate communications;

Build partnerships with other companies;

Expand into worldwide markets;

Modernize outdated technologies;

Offer better customer support;

Offer new customer services


Business Constraints

Politics and Policies

Budgetary and Staffing Constraints;

Scheduling – time frames


Internetwork Design Goals:

Functionality;

Scalability;
Before doing the design,
first establish the goals Manageability;

Cost-effectiveness;

Adaptability
(a). Functionality:

The network must enable the users to meet


their individual job requirements.

In such a way that the overall business


requirements of the organization are met.

Ultimately, we talk about applications


Functionality –
Applications :
New applications set:
App. 1 App. 2 App. 3 App. N Multimedia, real-time,
mission-critical

TCP, UDP and other higher layer protocols

IP Protocol

Networking technologies
(LAN, MAN, WAN
Functionality – Applications :
Application Reliability Delay Jitter Bandwidth

E-mail High Low Low Low

File High Low Low Medium


Transfer
Web access High Medium Low Medium

Remote High Medium Medium Low


Login
Audio Low Low High Medium

Video Low Low High High

Telephony Low High High Low

Videoconfer Low High High High


encing
Functionality – Applications :

Application Typical Data rates

Voice 6 kbps to 64 kbps

Web applications 10 kbps to 500 kbps

File transfer 10 kbps to 1 Mbps

Video (streaming) 100 kbps to 1 Mbps

Video Conferencing 128 kbps to 1 Mbps

Medical Images 10 Mbps to 100 Mbps

Virtual Reality Greater than 80 Mbps


Functionality – Applications :

Bandwidth requirements are not a critical


problem for LAN design;

Technologies have enabled high LAN speeds


(10 Mbps, 100 Mbps, 1 Gbps, and – soon – 10
Gbps) which accommodate user needs quite
well.
(b). Scalability

The network must be able to support the needs of


the organization even as the organization grows:

number of users;
intensity of applications.
The PC
LAN;
How do we scale
WAN;
the following?
Server
(c). Adaptability

The network should be designed with an eye to future


technologies:

should support new technologies as they


become available (such as Voice-over-IP).
(d). Manageability – must be manageable

If design is highly complex:

The network management team may require an


excessive amount of time and support to work
with network operations personnel.

In particular, chances are that another organization may be


in charge of managing the network.
(e). Cost-Effectiveness:

The cost of implementing the network must be


within agreed-upon budgetary constraints.

Once the goals are captured,


a design methodology can be
applied such as shown:
Internetwork Design Methodology
Business
Analyze Requirements
Technical

Develop Internetwork
Structure (Topology)
Design Methodology

Set Up Addressing and


Naming Conventions

Provision the hardware

Deploy Internetwork
Implement, Monitor,
Operating System
Maintain the Network
(IOS) Features
Hierarchical Design

To properly build an internework that can


effectively address a user’s needs, we need:

A three-layer hierarchical
model to organize traffic flow

Access;
Distribution;
Core Layers
Telecom
service provider
Core

Campus
Distribution Backbone

Building
Backbone
Router
Access
Switch

PC PC PC PC PC PC PC PC
Remote workgroups Local workgroups
(a). Access Layer

The principal function:

Connect workgroups

(users grouped on the network based on a community of


interest: marketing, administration, engineering, IT, etc)

to the distribution layer.

Design Rule: Move user servers and services


down to the access layer.
(b). Distribution Layer

Provides connectivity between several parts of the access


layer;

Determines access across the Campus Backbone;

Selectively grants specific access to users and departments;

Provides restriction of network advertisements by routing


protocols, as well as route summarization.
(b). Distribution Layer

Network policy is said to be implemented at this layer.

Layer based on: FDDI, Fast Ethernet;


Gigabit Ethernet, or ATM.

Design Rule: Implement policy at


the distribution layer.
(c). Core Layer

The primary function of the core layer is to provide


optimal transport between different sites.

A leased service
(c). Core Layer

Core Tier topology

Site B

Telecomm Service Site C


Site A Provider

Site D
(c). Core Layer

The Core tier is usually implemented as a high-speed WAN:

T1/T3 {E1/E3} leased lines;


Frame Relay.

Because of WAN provider tariffs,


efficient use of bandwidth in the
core is nearly always a concern

Design rule: Design the core for optimized transport.


Benefits of a Hierarchical Design Model

A hierarchical design model provides the following characteristics:

(i). Scalability Functions such as route summarizations performed at both


the distribution and core layers help a network scale; also, in a hierarchical
model, problems can be recognized more easily.

(ii). Ease of Implementation With clear functionality assigned to each


layer, network implementation becomes easy. A phased approach can also be
employed when deploying a large network; this is generally most cost-
effective due to the cost of resources. Deploy the core first, then the
distribution, and finally the access layers. Using this approach leads to efficient
allocation of engineering resources.

(iii). Ease of Troubleshooting: The functions of each layer being well defined
also makes problem isolation less complicated. Temporary segmentation of the
network to reduce the scope of the problem is also accomplished without
requiring full-scale enterprise outage.
Hierarchical Design Guidelines:
Guidelines for effective use of the hierarchical design model include
the following:

(i). Choose a Hierarchical Model that fits your requirements:


Each network has its own requirements, and while some cases
may require the three layers of the hierarchical model, some may only
require two. In many small networks, a single layer is sufficient.

(ii). Do not place end stations on backbones


A backbone without end stations improves the reliability of the
network, facilitates traffic management, and makes planning for
increased bandwidth easier.

(iii). Follow the 80/20 Rule for LAN traffic


That is, 80% of the LAN traffic should be local – this is
achieved by positioning the needed servers on the workgroup LAN.
Summary

Understand network design goals;

Follow a structured methodology;

Organize the network in a hierarchy

You might also like