0% found this document useful (0 votes)
18 views264 pages

CH 2 Communication

Uploaded by

Harum
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views264 pages

CH 2 Communication

Uploaded by

Harum
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 264

Communication

Networks Including The


Internet
It‘s Everywhere!
But How Are These Apps Architected?
BUT WHAT IS
THE INTERNET?
Internet Network
A global network Two or more connected
providing communication (wirelessly or with a wire)systems
Using a Network
Using a Network
Advantages
Using a Network
Advantages

• File Sharing
Using a Network
Advantages

• File Sharing
• Hardware Sharing
Using a Network
Advantages

• File Sharing
• Hardware Sharing
• Software Sharing
Using a Network
Advantages

• File Sharing
• Hardware Sharing
• Software Sharing
• Communication
Using a Network
Advantages Disadvantages

• File Sharing
• Hardware Sharing
• Software Sharing
• Communication
Using a Network
Advantages Disadvantages

• File Sharing • Equipment cost


• Hardware Sharing
• Software Sharing
• Communication
Using a Network
Advantages Disadvantages

• File Sharing • Equipment cost


• Hardware Sharing • Needs technical
• Software Sharing management
• Communication
Using a Network
Advantages Disadvantages

• File Sharing • Equipment cost


• Hardware Sharing • Needs technical
• Software Sharing management
• Communication • Malware threats - need to
ensure security
Using a Network
Advantages Disadvantages

• File Sharing • Equipment cost


• Hardware Sharing • Needs technical
• Software Sharing management
• Communication • Malware threats - need to
ensure security
• A connected device can
hack into another connected
device - Security Concerns
LAN
• Local Area Network
LAN
• Local Area Network
• Localized through switches
LAN
• Local Area Network
• Localized through switches
• Connected computers are physically close
LAN
• Local Area Network
• Localized through switches
• Connected computers are physically close
• WLAN is wireless
LAN
• Local Area Network
• Localized through switches
• Connected computers are physically close
• WLAN is wireless
• WiFi is an example, helps connect mobile to printer
for instance
WAN
WAN
• Connected computers are miles apart
WAN
• Connected computers are miles apart
• Consists of multiple LANs
WAN
• Connected computers are miles apart
• Consists of multiple LANs
• Imagine a company with multiple office buildings, all
connected with each other
WAN
• Connected computers are miles apart
• Consists of multiple LANs
• Imagine a company with multiple office buildings, all
connected with each other

• Both provided by network providers like PTCL


Imagine we’re all employed at the same office
The Client-Server Model

• Has a dedicated, centralized server that caters to all the clients


The Client-Server Model

• Has a dedicated, centralized server that caters to all the clients


⚬ At least one dedicated computer
The Client-Server Model

• Has a dedicated, centralized server that caters to all the clients


⚬ At least one dedicated computer
⚬ Examples include a web server, bank server etc
The Client-Server Model

• Has a dedicated, centralized server that caters to all the clients


⚬ At least one dedicated computer
⚬ Examples include a web server, bank server etc
• Contains files that a user can request access for
The Client-Server Model

• Has a dedicated, centralized server that caters to all the clients


⚬ At least one dedicated computer
⚬ Examples include a web server, bank server etc
• Contains files that a user can request access for
⚬ The clients requests for access, if the request is approved by
the server, the files are returned to the client
The Client-Server Model

• Has a dedicated, centralized server that caters to all the clients


⚬ At least one dedicated computer
⚬ Examples include a web server, bank server etc
• Contains files that a user can request access for
⚬ The clients requests for access, if the request is approved by
the server, the files are returned to the client
⚬ If multiple users have access to the same file, the same file is
shared between all clients
The Client-Server Model

• Clients can also back-up files onto the server


The Client-Server Model

• Clients can also back-up files onto the server


• Clients can also offload tasks to server to utilize its compute power
The Client-Server Model

• Clients can also back-up files onto the server


• Clients can also offload tasks to server to utilize its compute power
• Provides centralization of resources -> Therefore, is a single point
of failure
The Client-Server Model

• Clients can also back-up files onto the server


• Clients can also offload tasks to server to utilize its compute power
• Provides centralization of resources -> Therefore, is a single point
of failure
⚬ Congestion can be a possible cause of failure
Benefits

• Since files/resources (compute power) are centralised, they


become easier to control, manage and secure on organizational
level like setting Admin privileges
Benefits

• Since files/resources (compute power) are centralised, they


become easier to control, manage and secure on organizational
level like setting Admin privileges
• Clients can be less powerful machine if we offload computational
tasks onto server -> we can buy cheaper client machines
Benefits

• Since files/resources (compute power) are centralised, they


become easier to control, manage and secure on organizational
level like setting Admin privileges
• Clients can be less powerful machine if we offload computational
tasks onto server -> we can buy cheaper client machines
⚬ Is a centralised back up point and its easier to secure one PC
than 50
Examples
Examples
Bank
Examples
Bank
⚬ Server holds acc details
Examples
Bank
⚬ Server holds acc details
⚬ Customer(Client) performs a transaction -> requests the server to
perform an operation
Examples
Bank
⚬ Server holds acc details
⚬ Customer(Client) performs a transaction -> requests the server to
perform an operation
⚬ Server serves and returns the results to client (Eg. Money transferred
successfully)

Organizations
Examples
Bank
⚬ Server holds acc details
⚬ Customer(Client) performs a transaction -> requests the server to
perform an operation
⚬ Server serves and returns the results to client (Eg. Money transferred
successfully)

Organizations
⚬ Employees are the clients that access the same shared file stored
on server
Examples
Bank
⚬ Server holds acc details
⚬ Customer(Client) performs a transaction -> requests the server to
perform an operation
⚬ Server serves and returns the results to client (Eg. Money transferred
successfully)

Organizations
⚬ Employees are the clients that access the same shared file stored
on server
⚬ Several employees can be working on the same file simultaneously
Examples
Bank
⚬ Server holds acc details
⚬ Customer(Client) performs a transaction -> requests the server to
perform an operation
⚬ Server serves and returns the results to client (Eg. Money transferred
successfully)

Organizations
⚬ Employees are the clients that access the same shared file stored
on server
⚬ Several employees can be working on the same file simultaneously
⚬ Sharing resources like printers etc
Peer to Peer

• All computers share the same status


Peer to Peer

• All computers share the same status


• All computers can communicate and share resources
Peer to Peer

• All computers share the same status


• All computers can communicate and share resources
⚬ each computer provides access to resources and data
Benefits

• Reduces possibility of congestion as requests can be divided


Benefits

• Reduces possibility of congestion as requests can be divided


⚬ Divides load between peers
Benefits

• Reduces possibility of congestion as requests can be divided


⚬ Divides load between peers
• Users can download different parts of a file separately as they are
available from multiple hosts
Benefits

• Reduces possibility of congestion as requests can be divided


⚬ Divides load between peers
• Users can download different parts of a file separately as they are
available from multiple hosts
• No need of a singe, expensive server
Drawbacks
Drawbacks

• Reduce security as each computer is at infection risk from other


computers
Drawbacks

• Reduce security as each computer is at infection risk from other


computers
• No central backup management, if even one computer fails to back up,
data is lost to all
Drawbacks

• Reduce security as each computer is at infection risk from other


computers
• No central backup management, if even one computer fails to back up,
data is lost to all
• No central management of files, consistency becomes difficult to
maintain
Drawbacks

• Reduce security as each computer is at infection risk from other


computers
• No central backup management, if even one computer fails to back up,
data is lost to all
• No central management of files, consistency becomes difficult to
maintain
• Some peers (computers) may respond slower than others (they might
be accessed by more peers for instance or just generally be a slower
device)
Client Types - Client Server
Model

Thin Client Thick Client

Relies on connection to the server in order Can run some of the features of the software
to work locally

Requires very few local resources (eg. SSD,


Relies heavily on local resources. Therefore,
RAM, processor power) since computation
need more resources like SSD and RAM
and storage on remote server

More tolerant of a slow network connection as


Reliant on a fast internet connection
they can do wome processing locally
Thick Clients

Pros Cons

More robust since can continue Less secure since client is expected to ensure
functioning without connection to server security

Clients have more - store their own Clients need to obtain data and software
programs and data individually inorder to be able to sun it locally

Since clients access and update data at will,


can lead to data integrity issues and we will
need a mechanism to ensure that all updates
are stored in order - a consensus mechanism
Thin Clients

Pros Cons

Cheaper devices can be used, therefore


High reliance on server
expansion easy

Data updates managed centrally,


Arguably high set up costs
therefore unanimous

Server can offer more intricate protection


Server acts as a single point of failure
against malware
Network Topologies

• The arrangement with which computers are connected with each


other

Bu
s• All devices connected using a single cable
• Easy to set up and extend - Uses less cable
• If main cable is compromised, the network dies
• Very difficult to isolate a malfunctioning computer
• Highly congestion prone
• Least secure since signal passes through all computers
⚬ The packet has recipient address on it, as it passes through the bus, the
system compares address with every computer
• Used where high speeds are not requires and data is tranferred in small
amounts and is not sensitive. Eg: schools, offices
Bus
• All devices connected using a single cable
• Easy to set up and extend - Uses less cable
• If main cable is compromised, the network dies
• Very difficult to isolate a malfunctioning computer
• Highly congestion prone
• Least secure since signal passes through all computers
⚬ The packet has recipient address on it, as it passes through the bus, the
system compares address with every computer
• Used where high speeds are not requires and data is tranferred in small
amounts and is not sensitive. Eg: schools, offices
Bus
• All devices connected using a single cable
• Easy to set up and extend - Uses less cable
• If main cable is compromised, the network dies
• Very difficult to isolate a malfunctioning computer
• Highly congestion prone
• Least secure since signal passes through all computers
⚬ The packet has recipient address on it, as it passes through the bus, the
system compares address with every computer
• Used where high speeds are not requires and data is tranferred in small
amounts and is not sensitive. Eg: schools, offices
Bus
Bus
• All devices connected using a single cable
Bus
• All devices connected using a single cable
• Easy to set up and extend - Uses less cable
Bus
• All devices connected using a single cable
• Easy to set up and extend - Uses less cable
• If main cable is compromised, the network dies
Bus
• All devices connected using a single cable
• Easy to set up and extend - Uses less cable
• If main cable is compromised, the network dies
• Very difficult to isolate a malfunctioning computer
Bus
• All devices connected using a single cable
• Easy to set up and extend - Uses less cable
• If main cable is compromised, the network dies
• Very difficult to isolate a malfunctioning computer
• Highly congestion prone
Bus
• All devices connected using a single cable
• Easy to set up and extend - Uses less cable
• If main cable is compromised, the network dies
• Very difficult to isolate a malfunctioning computer
• Highly congestion prone
• Least secure since signal passes through all computers
Bus
• All devices connected using a single cable
• Easy to set up and extend - Uses less cable
• If main cable is compromised, the network dies
• Very difficult to isolate a malfunctioning computer
• Highly congestion prone
• Least secure since signal passes through all computers
⚬ The packet has recipient address on it, as it passes through the bus, the
system compares address with every computer
• a is tranferred in small amounts and is not sensitive. Eg: schools, offices
Bus
• All devices connected using a single cable
• Easy to set up and extend - Uses less cable
• If main cable is compromised, the network dies
• Very difficult to isolate a malfunctioning computer
• Highly congestion prone
• Least secure since signal passes through all computers
⚬ The packet has recipient address on it, as it passes through the bus, the
system compares address with every computer
• Used where high speeds are not requires and data is tranferred in small
amounts and is not sensitive. Eg: schools, offices
Star
• Every computer is connected to a central switch/server/router
• Easy to connect / remove computers
• Network is centralised, therefore easily monitored and signal travels
uniterrupted
• Lower possibility of congestion
• Single link failure does not impact the network
• However, if central device fails, the network goes down - single point of
failure
Star
• The main server can get overwhelmed with requests - performance of
network depends on the central switch / server
• Here, message sare sent directly from center ot recipient
• Used in large organisations where performance if of the highest priority
• In homes, route acts as the center of star topology
Mesh
Mesh
• All devices are connected to each other
Mesh
• All devices are connected to each other
• No broken link impacts another device
Mesh
• All devices are connected to each other
• No broken link impacts another device
• Packet is sent directly to the recipient
Mesh
• All devices are connected to each other
• No broken link impacts another device
• Packet is sent directly to the recipient
• It is extremely costly to set up, and equally hard to maintain
Mesh
• All devices are connected to each other
• No broken link impacts another device
• Packet is sent directly to the recipient
• It is extremely costly to set up, and equally hard to maintain
• Used in high security places like military establishments
Mesh
• All devices are connected to each other
• No broken link impacts another device
• Packet is sent directly to the recipient
• It is extremely costly to set up, and equally hard to maintain
• Used in high security places like military establishments

Hybrid
Mesh
• All devices are connected to each other
• No broken link impacts another device
• Packet is sent directly to the recipient
• It is extremely costly to set up, and equally hard to maintain
• Used in high security places like military establishments

Hybrid
• Combination of two or more topologies
Mesh
• All devices are connected to each other
• No broken link impacts another device
• Packet is sent directly to the recipient
• It is extremely costly to set up, and equally hard to maintain
• Used in high security places like military establishments

Hybrid
• Combination of two or more topologies
• Highly reliable in case of failures since several sub-networks
Mesh
• All devices are connected to each other
• No broken link impacts another device
• Packet is sent directly to the recipient
• It is extremely costly to set up, and equally hard to maintain
• Used in high security places like military establishments

Hybrid
• Combination of two or more topologies
• Highly reliable in case of failures since several sub-networks
• Easy to troubleshoot or fix errors
Mesh
• All devices are connected to each other
• No broken link impacts another device
• Packet is sent directly to the recipient
• It is extremely costly to set up, and equally hard to maintain
• Used in high security places like military establishments

Hybrid
• Combination of two or more topologies
• Highly reliable in case of failures since several sub-networks
• Easy to troubleshoot or fix errors
• Very complex network, therefore difficult to set up or manage
Cloud
Cloud
• The Cloud is just an offsite building dedicated to servers
Cloud
• The Cloud is just an offsite building dedicated to servers
• Cloud computing is the storage and processing of data on the
cloud to reduce pressure on local resources
Cloud
• The Cloud is just an offsite building dedicated to servers
• Cloud computing is the storage and processing of data on the
cloud to reduce pressure on local resources
• Files can be accessed anytime, from anywhere
Cloud
• The Cloud is just an offsite building dedicated to servers
• Cloud computing is the storage and processing of data on the
cloud to reduce pressure on local resources
• Files can be accessed anytime, from anywhere
• Easy to share and back-up data
Cloud
• The Cloud is just an offsite building dedicated to servers
• Cloud computing is the storage and processing of data on the
cloud to reduce pressure on local resources
• Files can be accessed anytime, from anywhere
• Easy to share and back-up data
• Variable pricing plans that suit everyone and can be altered
seamlessly
Cloud

• Although it provides arguably better security, user has no


control over it
Cloud

• Although it provides arguably better security, user has no


control over it
• Need internet, upload / download speeds depend on the
internet
Cloud

• Although it provides arguably better security, user has no


control over it
• Need internet, upload / download speeds depend on the
internet
• There also exist private clouds, which are used by very
large organizations. These can be highly secures and
regulated
Transmission Media
Transmission Media

• Benefits of wireless
Transmission Media

• Benefits of wireless
⚬ Devices can be more mobile and easier to set up and add devices
as no cable needed
Transmission Media

• Benefits of wireless
⚬ Devices can be more mobile and easier to set up and add devices
as no cable needed
⚬ Many different types of devices can be connected
Transmission Media

• Benefits of wireless
⚬ Devices can be more mobile and easier to set up and add devices
as no cable needed
⚬ Many different types of devices can be connected
• Drawbacks of wireless
Transmission Media

• Benefits of wireless
⚬ Devices can be more mobile and easier to set up and add devices
as no cable needed
⚬ Many different types of devices can be connected
• Drawbacks of wireless
⚬ Easier to hack / prone to interference
Transmission Media

• Benefits of wireless
⚬ Devices can be more mobile and easier to set up and add devices
as no cable needed
⚬ Many different types of devices can be connected
• Drawbacks of wireless
⚬ Easier to hack / prone to interference
⚬ Signal degradation is a problem
Transmission Media

• Benefits of wireless
⚬ Devices can be more mobile and easier to set up and add devices
as no cable needed
⚬ Many different types of devices can be connected
• Drawbacks of wireless
⚬ Easier to hack / prone to interference
⚬ Signal degradation is a problem
• Radio Waves are Electromagnetic waves used in WiFi, their frequency
ranges from 3kHz - 3GHz. They carry data back and forth from wireless
adapter and router Earth’s curvature
Transmission Media

• Microwaves are also EM, between 3GHz-300GHz. Used in TVs and MRIs
• Infrared are also EMWs between 300GHz-300THz
• Satellites are used as boosters between 2 towers that can’t
communicate directly due to Earth’s curvature
Transmission Media

• Microwaves are also EM, between 3GHz-300GHz. Used in TVs and MRIs
Transmission Media

• Microwaves are also EM, between 3GHz-300GHz. Used in TVs and MRIs
• Infrared are also EMWs between 300GHz-300THz
Transmission Media

• Microwaves are also EM, between 3GHz-300GHz. Used in TVs and MRIs
• Infrared are also EMWs between 300GHz-300THz
• Satellites are used as boosters between 2 towers that can’t
communicate directly due to Earth’s curvature
Wired
Wired

• Twisted Cables are used to connect telephone to telephone lines


(Copper cable)
Wired

• Twisted Cables are used to connect telephone to telephone lines


(Copper cable)
• Coaxial is a copper cable used for long distance communication
(Copper cable)
Wired

• Twisted Cables are used to connect telephone to telephone lines


(Copper cable)
• Coaxial is a copper cable used for long distance communication
(Copper cable)
⚬ Low installation cost
Wired

• Twisted Cables are used to connect telephone to telephone lines


(Copper cable)
• Coaxial is a copper cable used for long distance communication
(Copper cable)
⚬ Low installation cost
⚬ flexible, therefore, easy to install
Wired

• Twisted Cables are used to connect telephone to telephone lines


(Copper cable)
• Coaxial is a copper cable used for long distance communication
(Copper cable)
⚬ Low installation cost
⚬ flexible, therefore, easy to install
⚬ since it is very old, a lot more experienced technicians
Wired

• Twisted Cables are used to connect telephone to telephone lines


(Copper cable)
• Coaxial is a copper cable used for long distance communication
(Copper cable)
⚬ Low installation cost
⚬ flexible, therefore, easy to install
⚬ since it is very old, a lot more experienced technicians
⚬ less bandwidth
Wired

• Twisted Cables are used to connect telephone to telephone lines


(Copper cable)
• Coaxial is a copper cable used for long distance communication
(Copper cable)
⚬ Low installation cost
⚬ flexible, therefore, easy to install
⚬ since it is very old, a lot more experienced technicians
⚬ less bandwidth
⚬ needs repeaters
Wired

• Twisted Cables are used to connect telephone to telephone lines


(Copper cable)
• Coaxial is a copper cable used for long distance communication
(Copper cable)
⚬ Low installation cost
⚬ flexible, therefore, easy to install
⚬ since it is very old, a lot more experienced technicians
⚬ less bandwidth
⚬ needs repeaters
⚬ high interference
Wired
• Fiber Optic cables use Total Internal Reflection to transmit light
Wired
• Fiber Optic cables use Total Internal Reflection to transmit light
⚬ Light pulses have corresponding binary values
Wired
• Fiber Optic cables use Total Internal Reflection to transmit light
⚬ Light pulses have corresponding binary values
⚬ Less interference
Wired
• Fiber Optic cables use Total Internal Reflection to transmit light
⚬ Light pulses have corresponding binary values
⚬ Less interference
⚬ Greater bandwidth thus faster transmission
Wired
• Fiber Optic cables use Total Internal Reflection to transmit light
⚬ Light pulses have corresponding binary values
⚬ Less interference
⚬ Greater bandwidth thus faster transmission
⚬ Low signal degradation therefore less amplifiers required
Wired
• Fiber Optic cables use Total Internal Reflection to transmit light
⚬ Light pulses have corresponding binary values
⚬ Less interference
⚬ Greater bandwidth thus faster transmission
⚬ Low signal degradation therefore less amplifiers required
⚬ Lighter
Wired
• Fiber Optic cables use Total Internal Reflection to transmit light
⚬ Light pulses have corresponding binary values
⚬ Less interference
⚬ Greater bandwidth thus faster transmission
⚬ Low signal degradation therefore less amplifiers required
⚬ Lighter
⚬ Expensive
Wired
• Fiber Optic cables use Total Internal Reflection to transmit light
⚬ Light pulses have corresponding binary values
⚬ Less interference
⚬ Greater bandwidth thus faster transmission
⚬ Low signal degradation therefore less amplifiers required
⚬ Lighter
⚬ Expensive
⚬ Technical maintenance and installation
Wired
• Fiber Optic cables use Total Internal Reflection to transmit light
⚬ Light pulses have corresponding binary values
⚬ Less interference
⚬ Greater bandwidth thus faster transmission
⚬ Low signal degradation therefore less amplifiers required
⚬ Lighter
⚬ Expensive
⚬ Technical maintenance and installation
⚬ Breaks when bent
Wired
• Fiber Optic cables use Total Internal Reflection to transmit light
⚬ Light pulses have corresponding binary values
⚬ Less interference
⚬ Greater bandwidth thus faster transmission
⚬ Low signal degradation therefore less amplifiers required
⚬ Lighter
⚬ Expensive
⚬ Technical maintenance and installation
⚬ Breaks when bent
⚬ One direction transfer
Wired
• Fiber Optic cables use Total Internal Reflection to transmit light
⚬ Light pulses have corresponding binary values
⚬ Less interference
⚬ Greater bandwidth thus faster transmission
⚬ Low signal degradation therefore less amplifiers required
⚬ Lighter
⚬ Expensive
⚬ Technical maintenance and installation
⚬ Breaks when bent
⚬ One direction transfer
⚬ No power, only data
Hardware
• Switch is a connecting device that is used to send a message directly
to a host (unicast message)
Hardware
• Switch is a connecting device that is used to send a message directly
to a host (unicast message)
• NIC (Network Interface Card) provides devices with a mac address - a
unique id for a device that allows connection to the network
Hardware
• Switch is a connecting device that is used to send a message directly
to a host (unicast message)
• NIC (Network Interface Card) provides devices with a mac address - a
unique id for a device that allows connection to the network
• Wireless NIC using antennas, offers NIC functionality without having to
connect to a cable
Hardware
• Switch is a connecting device that is used to send a message directly
to a host (unicast message)
• NIC (Network Interface Card) provides devices with a mac address - a
unique id for a device that allows connection to the network
• Wireless NIC using antennas, offers NIC functionality without having to
connect to a cable
• Bridge receives data within the network and decides which link the
data should go to, thereby decreasing congestion.
Hardware
• Switch is a connecting device that is used to send a message directly
to a host (unicast message)
• NIC (Network Interface Card) provides devices with a mac address - a
unique id for a device that allows connection to the network
• Wireless NIC using antennas, offers NIC functionality without having to
connect to a cable
• Bridge receives data within the network and decides which link the
data should go to, thereby decreasing congestion.
• Wireless Access Point allows you to connect to a LAN without using
cables
Hardware
• Switch is a connecting device that is used to send a message directly
to a host (unicast message)
• NIC (Network Interface Card) provides devices with a mac address - a
unique id for a device that allows connection to the network
• Wireless NIC using antennas, offers NIC functionality without having to
connect to a cable
• Bridge receives data within the network and decides which link the
data should go to, thereby decreasing congestion.
• Wireless Access Point allows you to connect to a LAN without using
cables
• Repeater boosts signals
Router vs Gateway

Similarity
Router vs Gateway

Similarity

• Connect 2 or more networks


Router vs Gateway

Similarity

• Connect 2 or more networks


• Can connect to WAN
Router vs Gateway

Similarity

• Connect 2 or more networks


• Can connect to WAN
• Receives packets from source and fwd to destination IP
Router vs Gateway

Similarity

• Connect 2 or more networks


• Can connect to WAN
• Receives packets from source and fwd to destination IP

Difference
Router vs Gateway

Similarity

• Connect 2 or more networks


• Can connect to WAN
• Receives packets from source and fwd to destination IP

Difference
• Gateways connect two dissimilar networks, whereas router connects
similar networks
Bit Streaming - Video Transmission
The Mechanism
Bit Streaming - Video Transmission
The Mechanism
• Data is compressed before transmitting
Bit Streaming - Video Transmission
The Mechanism
• Data is compressed before transmitting
• Vid is transmitted continuously as a series of bits
Bit Streaming - Video Transmission
The Mechanism
• Data is compressed before transmitting
• Vid is transmitted continuously as a series of bits
• Vid is hosted on server, and sent to client computer’s buffer
Bit Streaming - Video Transmission
The Mechanism
• Data is compressed before transmitting
• Vid is transmitted continuously as a series of bits
• Vid is hosted on server, and sent to client computer’s buffer
• Streaming software receives bit-stream from buffer
Bit Streaming - Video Transmission
The Mechanism
• Data is compressed before transmitting
• Vid is transmitted continuously as a series of bits
• Vid is hosted on server, and sent to client computer’s buffer
• Streaming software receives bit-stream from buffer
• Vid is encoded into bit-stream and uploaded on server
On Demand
Bit Streaming - Video Transmission
The Mechanism
• Data is compressed before transmitting
• Vid is transmitted continuously as a series of bits
• Vid is hosted on server, and sent to client computer’s buffer
• Streaming software receives bit-stream from buffer
• Vid is encoded into bit-stream and uploaded on server
On Demand
• Tape converted to bit-streaming format (encoding)
Bit Streaming - Video Transmission
The Mechanism
• Data is compressed before transmitting
• Vid is transmitted continuously as a series of bits
• Vid is hosted on server, and sent to client computer’s buffer
• Streaming software receives bit-stream from buffer
• Vid is encoded into bit-stream and uploaded on server
On Demand
• Tape converted to bit-streaming format (encoding)
• Encoded videos uploaded to dedicated servers
Bit Streaming - Video Transmission
The Mechanism
• Data is compressed before transmitting
• Vid is transmitted continuously as a series of bits
• Vid is hosted on server, and sent to client computer’s buffer
• Streaming software receives bit-stream from buffer
• Vid is encoded into bit-stream and uploaded on server
On Demand
• Tape converted to bit-streaming format (encoding)
• Encoded videos uploaded to dedicated servers
• Link for video on website
Bit Streaming - Video Transmission
The Mechanism
• Data is compressed before transmitting
• Vid is transmitted continuously as a series of bits
• Vid is hosted on server, and sent to client computer’s buffer
• Streaming software receives bit-stream from buffer
• Vid is encoded into bit-stream and uploaded on server
On Demand
• Tape converted to bit-streaming format (encoding)
• Encoded videos uploaded to dedicated servers
• Link for video on website
• User clicks link to (temporarily) download video, can be paused /
forwarded / rewinded etc
Real Time
• A live event is captured with a camera connected to a computer (internet)
Real Time
• A live event is captured with a camera connected to a computer (internet)
• Video is encoded in live-time and uploaded to a streaming server
Real Time
• A live event is captured with a camera connected to a computer (internet)
• Video is encoded in live-time and uploaded to a streaming server
• Link placed on Website
Real Time
• A live event is captured with a camera connected to a computer (internet)
• Video is encoded in live-time and uploaded to a streaming server
• Link placed on Website
• Since server sends frames to users in ;live time, can not be paused
Real Time
• A live event is captured with a camera connected to a computer (internet)
• Video is encoded in live-time and uploaded to a streaming server
• Link placed on Website
• Since server sends frames to users in ;live time, can not be paused

Imp of bit rate


Real Time
• A live event is captured with a camera connected to a computer (internet)
• Video is encoded in live-time and uploaded to a streaming server
• Link placed on Website
• Since server sends frames to users in ;live time, can not be paused

Imp of bit rate


• Bitrate is the amount of data encoded for a unit of time (frame)
Real Time
• A live event is captured with a camera connected to a computer (internet)
• Video is encoded in live-time and uploaded to a streaming server
• Link placed on Website
• Since server sends frames to users in ;live time, can not be paused

Imp of bit rate


• Bitrate is the amount of data encoded for a unit of time (frame)
• For streaming is usually referenced in megabits per second (Mbps) for
video, and in kilobits per second (kbps) for audio.
Real Time
• A live event is captured with a camera connected to a computer (internet)
• Video is encoded in live-time and uploaded to a streaming server
• Link placed on Website
• Since server sends frames to users in ;live time, can not be paused

Imp of bit rate


• Bitrate is the amount of data encoded for a unit of time (frame)
• For streaming is usually referenced in megabits per second (Mbps) for
video, and in kilobits per second (kbps) for audio.
• From a streaming perspective, a higher video bitrate means a higher
quality video that requires more bandwidth
Real Time
• A live event is captured with a camera connected to a computer (internet)
• Video is encoded in live-time and uploaded to a streaming server
• Link placed on Website
• Since server sends frames to users in ;live time, can not be paused

Imp of bit rate


• Bitrate is the amount of data encoded for a unit of time (frame)
• For streaming is usually referenced in megabits per second (Mbps) for
video, and in kilobits per second (kbps) for audio.
• From a streaming perspective, a higher video bitrate means a higher
quality video that requires more bandwidth
• Quality - Speed Trade off
Bit Streaming
Pros
Bit Streaming
Pros
• No need to wait for the whole file to download
Bit Streaming
Pros
• No need to wait for the whole file to download
• No need to store large files
Bit Streaming
Pros
• No need to wait for the whole file to download
• No need to store large files
• On-demand playback
Bit Streaming
Pros
• No need to wait for the whole file to download
• No need to store large files
• On-demand playback
• Plays in browser, non software required
Bit Streaming
Pros
• No need to wait for the whole file to download
• No need to store large files
• On-demand playback
• Plays in browser, non software required

Cons
Bit Streaming
Pros
• No need to wait for the whole file to download
• No need to store large files
• On-demand playback
• Plays in browser, non software required

Cons

• Highly dependent on internet


Bit Streaming
Pros
• No need to wait for the whole file to download
• No need to store large files
• On-demand playback
• Plays in browser, non software required

Cons

• Highly dependent on internet


⚬ Hangs if inadequate bandwidth or buffer capacity
Bit Streaming
Pros
• No need to wait for the whole file to download
• No need to store large files
• On-demand playback
• Plays in browser, non software required

Cons

• Highly dependent on internet


⚬ Hangs if inadequate bandwidth or buffer capacity
• Can be accompanied with viruses
Internet vs WWW
Internet
• Everything from gaming to chatting
Internet vs WWW
Internet
• Everything from gaming to chatting
• Pathway for information exchange
Internet vs WWW
Internet
• Everything from gaming to chatting
• Pathway for information exchange
• Massive network of networks
Internet vs WWW
Internet
• Everything from gaming to chatting
• Pathway for information exchange
• Massive network of networks
⚬ interconnected networks
Internet vs WWW
Internet
• Everything from gaming to chatting
• Pathway for information exchange
• Massive network of networks
⚬ interconnected networks
• Uses TCP/IP protocol
Internet vs WWW
Internet
• Everything from gaming to chatting
• Pathway for information exchange
• Massive network of networks
⚬ interconnected networks
• Uses TCP/IP protocol
World Wide Web
Internet vs WWW
Internet
• Everything from gaming to chatting
• Pathway for information exchange
• Massive network of networks
⚬ interconnected networks
• Uses TCP/IP protocol
World Wide Web
• Collection of webpages stored on websites
Internet vs WWW
Internet
• Everything from gaming to chatting
• Pathway for information exchange
• Massive network of networks
⚬ interconnected networks
• Uses TCP/IP protocol
World Wide Web
• Collection of webpages stored on websites
⚬ Webpages are written in HTML
Internet vs WWW
Internet
• Everything from gaming to chatting
• Pathway for information exchange
• Massive network of networks
⚬ interconnected networks
• Uses TCP/IP protocol
World Wide Web
• Collection of webpages stored on websites
⚬ Webpages are written in HTML
⚬ URLs specify the location of webpages
Internet vs WWW
Internet
• Everything from gaming to chatting
• Pathway for information exchange
• Massive network of networks
⚬ interconnected networks
• Uses TCP/IP protocol
World Wide Web
• Collection of webpages stored on websites
⚬ Webpages are written in HTML
⚬ URLs specify the location of webpages
• https used to transmit data
Internet vs WWW
Internet
• Everything from gaming to chatting
• Pathway for information exchange
• Massive network of networks
⚬ interconnected networks
• Uses TCP/IP protocol
World Wide Web
• Collection of webpages stored on websites
⚬ Webpages are written in HTML
⚬ URLs specify the location of webpages
• https used to transmit data
• Browsing webpage
CSMA - CD
CSMA - CD

• Carrier Sense Multiple Access - with Collision Detection


CSMA - CD

• Carrier Sense Multiple Access - with Collision Detection


⚬ Data collision within the network can result in failure of delivery
CSMA - CD

• Carrier Sense Multiple Access - with Collision Detection


⚬ Data collision within the network can result in failure of delivery
• A device checks channel status before transmitting the data
CSMA - CD

• Carrier Sense Multiple Access - with Collision Detection


⚬ Data collision within the network can result in failure of delivery
• A device checks channel status before transmitting the data
⚬ transmits only when channel free
CSMA - CD

• Carrier Sense Multiple Access - with Collision Detection


⚬ Data collision within the network can result in failure of delivery
• A device checks channel status before transmitting the data
⚬ transmits only when channel free
⚬ However, if a collision still occurs
CSMA - CD

• Carrier Sense Multiple Access - with Collision Detection


⚬ Data collision within the network can result in failure of delivery
• A device checks channel status before transmitting the data
⚬ transmits only when channel free
⚬ However, if a collision still occurs
■ Halts transmission (further packets stopped)
CSMA - CD

• Carrier Sense Multiple Access - with Collision Detection


⚬ Data collision within the network can result in failure of delivery
• A device checks channel status before transmitting the data
⚬ transmits only when channel free
⚬ However, if a collision still occurs
■ Halts transmission (further packets stopped)
■ both devices resend their data at different (randomized)
timeout values
CSMA - CD

• Carrier Sense Multiple Access - with Collision Detection


⚬ Data collision within the network can result in failure of delivery
• A device checks channel status before transmitting the data
⚬ transmits only when channel free
⚬ However, if a collision still occurs
■ Halts transmission (further packets stopped)
■ both devices resend their data at different (randomized)
timeout values
• Collision is detected via voltage change
PSTN
PSTN

• Public Switched Telephone Network


PSTN

• Public Switched Telephone Network


• Consists if different kinds of communication lines
PSTN

• Public Switched Telephone Network


• Consists if different kinds of communication lines
• Bi-directional data transmission
PSTN

• Public Switched Telephone Network


• Consists if different kinds of communication lines
• Bi-directional data transmission
• Communication passes through different switching centres
PSTN

• Public Switched Telephone Network


• Consists if different kinds of communication lines
• Bi-directional data transmission
• Communication passes through different switching centres
⚬ switching centres are switches that tell where to route data
PSTN

• Public Switched Telephone Network


• Consists if different kinds of communication lines
• Bi-directional data transmission
• Communication passes through different switching centres
⚬ switching centres are switches that tell where to route data
• Dedicated channel between two points for duration of a call -
maintained throughout
PSTN

• Public Switched Telephone Network


PSTN

• Remains active even during power outage


• Allows for faster data transmission with consistent transmission
speeds
PSTN

• Remains active even during power outage


• Allows for faster data transmission with consistent transmission
speeds
• Is expensive to set up / maintain
PSTN

• Remains active even during power outage


• Allows for faster data transmission with consistent transmission
speeds
• Is expensive to set up / maintain
• Disruption to main network could halt the entire system - no
alternates
PSTN

• Remains active even during power outage


• Allows for faster data transmission with consistent transmission
speeds
• Is expensive to set up / maintain
• Disruption to main network could halt the entire system - no
alternates
• Modem: Is a device that connects devices to the internet using a
PSTN
IP Addressing
IP Addressing

• Internet Protocol
IP Addressing

• Internet Protocol
• IP address is used to locate a device on a network
IP Addressing

• Internet Protocol
• IP address is used to locate a device on a network
• Each address is unique within a network
IP Addressing

• Internet Protocol
• IP address is used to locate a device on a network
• Each address is unique within a network
• Allows devices to send data to correct destinations
IP Addressing

• Internet Protocol
• IP address is used to locate a device on a network
• Each address is unique within a network
• Allows devices to send data to correct destinations
• Public IP Addresses are registered on the internet
IP Addressing

• Internet Protocol
• IP address is used to locate a device on a network
• Each address is unique within a network
• Allows devices to send data to correct destinations
• Public IP Addresses are registered on the internet
⚬ assigned by ISP
IP Addressing

• Internet Protocol
• IP address is used to locate a device on a network
• Each address is unique within a network
• Allows devices to send data to correct destinations
• Public IP Addresses are registered on the internet
⚬ assigned by ISP
⚬ Unique throughout the ISP
IP Addressing

• Private IP addresses are assigned by routers


IP Addressing

• Private IP addresses are assigned by routers


⚬ You need a public IP to access the internet
IP Addressing

• Private IP addresses are assigned by routers


⚬ You need a public IP to access the internet
⚬ Can only be reached internally - within a subnet
IP Addressing

• Private IP addresses are assigned by routers


⚬ You need a public IP to access the internet
⚬ Can only be reached internally - within a subnet
⚬ More secure than public IP
IP Addressing

• Private IP addresses are assigned by routers


⚬ You need a public IP to access the internet
⚬ Can only be reached internally - within a subnet
⚬ More secure than public IP
• NAT translates ur private IP to public IP using a router
IP Addressing

• Private IP addresses are assigned by routers


⚬ You need a public IP to access the internet
⚬ Can only be reached internally - within a subnet
⚬ More secure than public IP
• NAT translates ur private IP to public IP using a router
• Static IP stays same even if system rejoins network - ISP assigned
IP Addressing

• Private IP addresses are assigned by routers


⚬ You need a public IP to access the internet
⚬ Can only be reached internally - within a subnet
⚬ More secure than public IP
• NAT translates ur private IP to public IP using a router
• Static IP stays same even if system rejoins network - ISP assigned
• Dynamic IP changes on every reconnected - internally assigned
IPv4
IPv4
• Each IP address should contain 4 numbers, b/w 0 and 255 denary
numbers dot separated
IPv4
• Each IP address should contain 4 numbers, b/w 0 and 255 denary
numbers dot separated
• Address < 32 bits
⚬ 192.168.1.1
IPv4
• Each IP address should contain 4 numbers, b/w 0 and 255 denary
numbers dot separated
• Address < 32 bits
⚬ 192.168.1.1
IPv6
IPv4
• Each IP address should contain 4 numbers, b/w 0 and 255 denary
numbers dot separated
• Address < 32 bits
⚬ 192.168.1.1
IPv6
• Should be a valid hex number
IPv4
• Each IP address should contain 4 numbers, b/w 0 and 255 denary
numbers dot separated
• Address < 32 bits
⚬ 192.168.1.1
IPv6
• Should be a valid hex number
• 8 groups of 4 each
IPv4
• Each IP address should contain 4 numbers, b/w 0 and 255 denary
numbers dot separated
• Address < 32 bits
⚬ 192.168.1.1
IPv6
• Should be a valid hex number
• 8 groups of 4 each
• colon separated
⚬ 2001:0B00:0000:F000:0000:1110:0000:0000
IPv4
• Each IP address should contain 4 numbers, b/w 0 and 255 denary
numbers dot separated
• Address < 32 bits
⚬ 192.168.1.1
IPv6
• Should be a valid hex number
• 8 groups of 4 each
• colon separated
⚬ 2001:0B00:0000:F000:0000:1110:0000:0000
• Introduced when number of IP addresses needed exceeded the max
of IPv4
Subnets
Subnets
• Systems connected to each other in the same network using a
switch
Subnets
• Systems connected to each other in the same network using a
switch
• Each Subnet is allocated a different range of IP addresses
Subnets
• Systems connected to each other in the same network using a
switch
• Each Subnet is allocated a different range of IP addresses
⚬ This reduces unnecessary broadcast of messages
Subnet Masks
Subnet Masks

• IP Address looks something like: 192.168.1.1


Subnet Masks

• IP Address looks something like: 192.168.1.1


⚬ 4 parts - each b/w 0-255
Subnet Masks

• IP Address looks something like: 192.168.1.1


⚬ 4 parts - each b/w 0-255
• IP address contains:
Subnet Masks

• IP Address looks something like: 192.168.1.1


⚬ 4 parts - each b/w 0-255
• IP address contains:
⚬ Network Address: What network the host resides in
Subnet Masks

• IP Address looks something like: 192.168.1.1


⚬ 4 parts - each b/w 0-255
• IP address contains:
⚬ Network Address: What network the host resides in
⚬ Host address: exact ID of host within the said network
Subnet Masks

• IP Address looks something like: 192.168.1.1


⚬ 4 parts - each b/w 0-255
• IP address contains:
⚬ Network Address: What network the host resides in
⚬ Host address: exact ID of host within the said network
• In the original IP design, first 8 bits were network address,
remaining 24 host address
Subnet Masks

• IP Address looks something like: 192.168.1.1


⚬ 4 parts - each b/w 0-255
• IP address contains:
⚬ Network Address: What network the host resides in
⚬ Host address: exact ID of host within the said network
• In the original IP design, first 8 bits were network address,
remaining 24 host address
⚬ This was a problem since it limited to only 256 networks and
2^24 hosts - number of networks is clearly inadequate!! (over
40'000 last yr)
Subnet Masks
Subnet Masks
• Subnet Mask is used to identify how many of these octets are used for
network/host address using Classful Addressing:
Subnet Masks
• Subnet Mask is used to identify how many of these octets are used for
network/host address using Classful Addressing:
⚬ Class A:
Subnet Masks
• Subnet Mask is used to identify how many of these octets are used for
network/host address using Classful Addressing:
⚬ Class A:
■ Top bit is 0, therefore only 0-127 in first byte
Subnet Masks
• Subnet Mask is used to identify how many of these octets are used for
network/host address using Classful Addressing:
⚬ Class A:
■ Top bit is 0, therefore only 0-127 in first byte
■ 128 networks (8 bits)
Subnet Masks
• Subnet Mask is used to identify how many of these octets are used for
network/host address using Classful Addressing:
⚬ Class A:
■ Top bit is 0, therefore only 0-127 in first byte
■ 128 networks (8 bits)
⚬ Class B:
Subnet Masks
• Subnet Mask is used to identify how many of these octets are used for
network/host address using Classful Addressing:
⚬ Class A:
■ Top bit is 0, therefore only 0-127 in first byte
■ 128 networks (8 bits)
⚬ Class B:
■ Top bits 10 -> only 128-191
Subnet Masks
• Subnet Mask is used to identify how many of these octets are used for
network/host address using Classful Addressing:
⚬ Class A:
■ Top bit is 0, therefore only 0-127 in first byte
■ 128 networks (8 bits)
⚬ Class B:
■ Top bits 10 -> only 128-191
■ 16k networks (16 bits)
Subnet Masks
• Subnet Mask is used to identify how many of these octets are used for
network/host address using Classful Addressing:
⚬ Class A:
■ Top bit is 0, therefore only 0-127 in first byte
■ 128 networks (8 bits)
⚬ Class B:
■ Top bits 10 -> only 128-191
■ 16k networks (16 bits)
⚬ Class C:
Subnet Masks
• Subnet Mask is used to identify how many of these octets are used for
network/host address using Classful Addressing:
⚬ Class A:
■ Top bit is 0, therefore only 0-127 in first byte
■ 128 networks (8 bits)
⚬ Class B:
■ Top bits 10 -> only 128-191
■ 16k networks (16 bits)
⚬ Class C:
■ Top bits 110 -> only 192223
Subnet Masks
• Subnet Mask is used to identify how many of these octets are used for
network/host address using Classful Addressing:
⚬ Class A:
■ Top bit is 0, therefore only 0-127 in first byte
■ 128 networks (8 bits)
⚬ Class B:
■ Top bits 10 -> only 128-191
■ 16k networks (16 bits)
⚬ Class C:
■ Top bits 110 -> only 192223
■ 2 Million networks (24 bits)
DNS
DNS
• Domain Name Service - resolves names of websites to numbers
DNS
• Domain Name Service - resolves names of websites to numbers
⚬ Eg: zainematics.com = 243.15.657.1
DNS
• Domain Name Service - resolves names of websites to numbers
⚬ Eg: zainematics.com = 243.15.657.1
• DNS looks for IP address stored against a name and returns it
DNS
• Domain Name Service - resolves names of websites to numbers
⚬ Eg: zainematics.com = 243.15.657.1
• DNS looks for IP address stored against a name and returns it

URL
DNS
• Domain Name Service - resolves names of websites to numbers
⚬ Eg: zainematics.com = 243.15.657.1
• DNS looks for IP address stored against a name and returns it

URL

• http: tells browser what protocol is being used to access


information
DNS
• Domain Name Service - resolves names of websites to numbers
⚬ Eg: zainematics.com = 243.15.657.1
• DNS looks for IP address stored against a name and returns it

URL

• http: tells browser what protocol is being used to access


information
• zainematics.com is the Domain name
DNS
• Domain Name Service - resolves names of websites to numbers
⚬ Eg: zainematics.com = 243.15.657.1
• DNS looks for IP address stored against a name and returns it

URL

• http: tells browser what protocol is being used to access


information
• zainematics.com is the Domain name
• Ch1.html is the filename of what we are viewing
DNS
• Domain Name Service - resolves names of websites to numbers
⚬ Eg: zainematics.com = 243.15.657.1
• DNS looks for IP address stored against a name and returns it

URL

• http: tells browser what protocol is being used to access


information
• zainematics.com is the Domain name
• Ch1.html is the filename of what we are viewing
• %20 is the coding for space
DNS
• Domain Name Service - resolves names of websites to numbers
⚬ Eg: zainematics.com = 243.15.657.1
• DNS looks for IP address stored against a name and returns it

URL

• http: tells browser what protocol is being used to access


information
• zainematics.com is the Domain name
• Ch1.html is the filename of what we are viewing
• %20 is the coding for space
• ? separates URL from parameters
• How is URL used to get IP
• How is URL used to get IP
⚬ URL is parsed to obtain Domain Name
• How is URL used to get IP
⚬ URL is parsed to obtain Domain Name
⚬ Domain name is sent to the nearest DNS, it resolves the query
by searching its database
• How is URL used to get IP
⚬ URL is parsed to obtain Domain Name
⚬ Domain name is sent to the nearest DNS, it resolves the query
by searching its database
■ If matching IP is found it is returned
• How is URL used to get IP
⚬ URL is parsed to obtain Domain Name
⚬ Domain name is sent to the nearest DNS, it resolves the query
by searching its database
■ If matching IP is found it is returned
■ Else query forwarded to a higher level DNS
• How is URL used to get IP
⚬ URL is parsed to obtain Domain Name
⚬ Domain name is sent to the nearest DNS, it resolves the query
by searching its database
■ If matching IP is found it is returned
■ Else query forwarded to a higher level DNS
• If still not found, error returned

You might also like