Lecture 1 To 3
Lecture 1 To 3
Communication
Networks
Class Room (BSEE22): https://
classroom.google.com/c/NzQ1OTk1Nzg4NzU2?cjc=7uw2hs3
Class Room (BSCE22):
https://classroom.google.com/c/NzQ1OTk2MTkwNjI4?cjc=b6o5frr
Introduction: 1-1
Assessment Weight-ages
Assignments: 10 %
Quizzes: 10 %
Mid Term Exam: 30 %
Project: 10 %
Final Exam: 40 %
Introduction: 1-2
Chapter 1
Introductio
n
Computer Networking: A
Top-Down Approach
8th edition
Jim Kurose, Keith Ross
Pearson, 2020
Introduction: 1-3
Chapter 1: introduction
Chapter goal: Overview/roadmap:
Get “feel,” “big picture,” What is the Internet? What is a
introduction to terminology protocol?
• more depth, detail later in Network edge: hosts, access network,
course physical media
Network core: packet/circuit switching,
internet structure
Performance: loss, delay, throughput
Protocol layers, service models
Security
Introduction: 1-4
The Internet: a “nuts and bolts”
view
Billions of connected mobile network
computing devices: national or global ISP
hosts = end systems
running network apps at
Internet’s “edge”
Introduction: 1-6
The Internet: a “nuts and bolts”
view
A packet switch takes a packet arriving on one of its incoming
communication links and forwards that packet on one of its outgoing
communication links.
Packet switches come in many shapes and flavors, but the two most
prominent types in today’s Internet are routers and link-layer
switches.
Both types of switches forward packets toward their ultimate
destinations. Link-layer switches are typically used in access
networks, while routers are typically used in the network core.
Introduction: 1-7
The Internet: a “nuts and bolts”
view
The sequence of communication links and packet switches traversed
by a packet from the sending end system to the receiving end system
is known as a route or path through the network.
Introduction: 1-8
Example
Packet-switched networks (which transport packets) are in many ways similar to
transportation networks of highways, roads, and intersections (which transport vehicles).
Consider, for example, a factory that needs to move a large amount of cargo to some
destination warehouse located thousands of kilometers away. At the factory, the cargo is
segmented and loaded into a fleet of trucks. Each of the trucks then independently
travels through the network of highways, roads, and intersections to the destination
warehouse. At the destination warehouse, the cargo is unloaded and grouped with the
rest of the cargo arriving from the same shipment. Thus, in many ways, packets are
analogous to trucks, communication links are analogous to highways and roads, packet
switches are analogous to intersections, and end systems are analogous to buildings. Just
as a truck takes a path through the transportation network, a packet takes a path through
a computer network.
Q: End systems access the Internet through ???
Introduction: 1-9
End systems, packet switches, and other pieces of the Internet run
protocols that control the sending and receiving of information
within the Internet. The Transmission Control Protocol (TCP) and the
Internet Protocol (IP) are two of the most important protocols in the
Internet.
Introduction: 1-10
“Fun” Internet-connected
devices Tweet-a-watt:
monitor energy use
bikes
Gaming devices
Others?
Internet phones Fitbit
Introduction: 1-11
The Internet: a “nuts and bolts”
view
mobile network
4G
Internet: “network of networks” national or global ISP
• Interconnected ISPs
Streaming
protocols are everywhere Skype
IP
video
• control sending, receiving of
local or
messages regional ISP
• e.g., HTTP (Web), streaming video,
home network
Skype, TCP, IP, WiFi, 4G, Ethernet content
provider
HTTP network
Internet standards
datacenter
network
Ethernet
• RFC: Request for Comments
• IETF: Internet Engineering Task TCP
enterprise
Force network
WiFi
Introduction: 1-12
Internet Engineering Task Force
(IETF)
The Internet Engineering Task Force (IETF) develops and promotes
internet standards, ensuring interoperability and functionality across
networks.
The standards are documented as Requests for Comments (RFCs),
which are formal technical and organizational notes that describe
protocols, procedures, and policies for the internet.
Each RFC is uniquely numbered and publicly accessible. For example,
the foundational internet protocol, IPv4, is documented in RFC 791.
Introduction: 1-13
The Internet: a “services” view
Infrastructure that provides mobile network
enterprise
network
Introduction: 1-14
The Internet: a “services” view
The Internet is like a platform that allows different applications, like
email, web browsing, and video streaming, to work by connecting
devices and exchanging data.
These applications run on end systems (like computers or phones)
and use the Internet to send information to each other. Routers and
switches help transfer the data but don’t interact with the apps
themselves.
Developers create these apps by writing programs that use the
Internet to deliver data between devices.
Introduction: 1-15
What’s a protocol?
A protocol is a set of rules and standards that define how data is
transmitted and received over a network.
It ensures proper communication between devices by specifying the
format, timing, sequencing, and error handling during data exchange.
Introduction: 1-16
What’s a protocol?
A human protocol and a computer network protocol:
Hi TCP connection
request
Hi TCP connection
response
Got the
time? GET http://gaia.cs.umass.edu/kurose_ross
2:00
<file>
time
Introduction: 1-17
Virtualization Overview
What is Virtualization?
• Virtualization is the process of creating virtual versions of hardware resources
such as CPUs, memory, storage, and network interfaces. VMware Workstation
is a tool that enables this on a desktop system.
Purpose of Virtualization:
• Testing multiple operating systems without needing physical hardware.
• Setting up virtual labs for learning and development.
Introduction: 1-18
What is a Hypervisor?
A hypervisor is software that allows multiple operating systems (OS)
to run simultaneously on a single physical machine by creating and
managing virtual machines (VMs).
Each VM operates independently, as if it were a separate physical
computer, with its own OS and hardware resources (CPU, memory,
storage, etc.).
Hypervisors are a core component of virtualization technology and
are classified into two main types:
• Type 1 Hypervisor (Bare-Metal Hypervisor)
• Type 2 Hypervisor (Hosted Hypervisor)
Introduction: 1-19
Types of Hypervisors
Type 1 Hypervisor (Bare-Metal Hypervisor)
• Runs directly on the physical hardware without requiring an underlying
operating system.
• Examples: VMware ESXi, Microsoft Hyper-V, Xen, KVM.
• Use Case: Data centers, enterprise environments, and large-scale virtualized
infrastructures.
Type 2 Hypervisor (Hosted Hypervisor)
• Runs on top of an existing operating system (host OS).
• Relies on the host OS to manage hardware resources.
• Examples: VMware Workstation, Oracle VirtualBox, Microsoft Virtual PC.
• Use Case: Personal use, software testing, and development on a single machine.
Introduction: 1-20
VMware Workstation
It is installed on a host operating system (e.g., Windows or Linux) and
uses the host OS to access hardware resources like CPU, memory,
and storage.
It allows users to create, configure, and run virtual machines on their
desktop or laptop for testing, development, or learning purposes.
Introduction: 1-21
Basic Workflow in VMware Workstation
Installing VMware Workstation:
• Install the software on a Windows or Linux host machine.
Creating a Virtual Machine (VM):
• Choose the OS for the VM.
• Configure resources like CPU, RAM, disk size, and network settings.
Installing Guest OS:
• Use an ISO file or bootable disk to install the chosen operating system on the VM.
Taking Snapshots:
• Save the VM state before making changes to avoid data loss.
Connecting Networks:
• Select a network mode (Bridged, NAT, or Host-Only) based on the project requirements.
Introduction: 1-22
Why VMware Workstation is
Useful?
It simplifies learning and testing environments by allowing users to
run multiple OS instances on a single machine.
It provides features like snapshots, cloning, and virtual network
setup, making it ideal for networking and systems engineering
students.
In conclusion, VMware Workstation is indeed a Type 2 Hypervisor,
widely used for personal, academic, and small-scale professional
applications.
Introduction: 1-23
Chapter 1: roadmap
What is the Internet?
What is a protocol?
Network edge: hosts, access
network, physical media
Network core: packet/circuit
switching, internet structure
Performance: loss, delay, throughput
Security
Protocol layers, service models
History
Introduction: 1-24
A closer look at Internet structure
mobile network
enterprise
network
Introduction: 1-25
A closer look at Internet structure
mobile network
enterprise
network
Introduction: 1-26
A closer look at Internet structure
mobile network
Network core:
network
interconnected routers
network of networks enterprise
network
Introduction: 1-27
Access networks and physical media
Q: How to connect end systems mobile network
to edge router?
national or global ISP
enterprise
network
Introduction: 1-28
What is an Access Network?
An access network is the part of a computer network that connects
end devices (like computers, smartphones, and IoT devices) to the
broader network infrastructure, such as the Internet or a service
provider's core network.
It acts as the "last mile" link between the user's device and the core
or backbone network.
Introduction: 1-29
Types of Access Networks
Wired Access Networks:
• Ethernet: Used in LANs (Local Area Networks) within buildings or campuses.
• DSL (Digital Subscriber Line): Provides Internet access over telephone lines.
• Fiber Optics: High-speed data transfer through optical cables (e.g., FTTH -
Fiber to the Home).
Wireless Access Networks:
• Wi-Fi: Wireless access within homes, offices, or public areas.
• Cellular Networks: 4G, 5G, and earlier technologies for mobile devices.
• Satellite Internet: For remote areas without traditional wired or wireless
coverage
Introduction: 1-30
Real-World Example
When you connect your laptop to a Wi-Fi network, the router serves
as part of the access network, allowing your laptop to communicate
with your Internet Service Provider (ISP). The ISP then connects you
to the larger Internet through its core network.
Introduction: 1-31
Access networks: home networks
Wireless and wired
devices
to/from headend or
central office
often combined
in single box
to Internet
to Internet
Introduction: 1-33
Access networks: enterprise networks
Enterprise link to
ISP (Internet)
institutional router
Ethernet institutional mail,
switch web servers
local or
regional ISP
Introduction: 1-35
Host: sends packets of data
host sending function:
takes application message
breaks into smaller chunks, known two packets,
as packets, of length L bits L bits each
transmits packet into access
network at transmission rate R 2 1
Introduction: 1-37
Example
Imagine you are sending a packet with:
• Packet size = 1,000,000 bits (1 Megabit or Mb)
• Transmission rate = 10 Mbps (10 Megabits per second)
• Transmission Delay = ??
Introduction: 1-38
Links: physical media
bit: propagates between Twisted pair (TP)
transmitter/receiver pairs two insulated copper wires
physical link: what lies • Category 5: 100 Mbps, 1 Gbps Ethernet
between transmitter & • Category 6: 10Gbps Ethernet
receiver
guided media:
• signals propagate in solid
media: copper, fiber, coax
unguided media:
• signals propagate freely,
e.g., radio
Introduction: 1-39
Links: physical media
Coaxial cable: Fiber optic cable:
two concentric copper conductors glass fiber carrying light pulses, each
pulse a bit
bidirectional high-speed operation:
broadband: • high-speed point-to-point
• multiple frequency channels on cable transmission (10’s-100’s Gbps)
• 100’s Mbps per channel low error rate:
• repeaters spaced far apart
• immune to electromagnetic noise
Introduction: 1-40
Links: physical media
Wireless radio Radio link types:
signal carried in various Wireless LAN (WiFi)
“bands” in electromagnetic • 10-100’s Mbps; 10’s of meters
spectrum wide-area (e.g., 4G cellular)
no physical “wire” • 10’s Mbps over ~10 Km
broadcast, “half-duplex” (sender Bluetooth: cable replacement
to receiver) • short distances, limited rates
propagation environment terrestrial microwave
effects: • point-to-point; 45 Mbps channels
• reflection satellite
• obstruction by objects • up to 45 Mbps per channel
• Interference/noise • 270 msec end-end delay
Introduction: 1-41
The network core
The network core is the central part of mobile network
national or global ISP
a communication network that
connects different smaller networks
(like your home Wi-Fi or mobile
networks) and makes sure data is
efficiently sent between them. Think of local or
regional ISP
it as the highway system of the
home network
Internet, where data packets (like cars) content
provider
travel to reach their destinations network datacenter
network
Introduction: 1-42
The network core
Main Job:
• The network core moves data between different networks, ensuring it
reaches the right place efficiently.
High Speed:
• It uses powerful devices (routers and switches) and fast cables (like fiber
optics) to handle large amounts of data.
Global Connectivity:
• It connects users, servers, and services worldwide.
Introduction: 1-43
Example
When you send a message on WhatsApp:
• The message starts from your phone (access network).
• It travels to WhatsApp servers through the network core, which connects
your ISP (Internet Service Provider) to WhatsApp’s servers.
• The reply from your friend also goes back through the network core to reach
your phone.
Introduction: 1-44
Packet-switching: store-and-
forward
L bits
per packet
3 2 1
source destination
R bps R bps
Introduction: 1-45
Internet structure: a “network of networks”
mobile network
hosts connect to Internet via access national or global ISP
Internet Service Providers (ISPs)
access ISPs in turn must be
interconnected
• so that any two hosts (anywhere!) local or
regional ISP
can send packets to each other
resulting network of networks is home network content
provider
very complex network datacenter
network
access
… access
net
access
net …
net
access
access net
net
access
access net
net
…
…
access access
net net
access
net
access
net
access
net
access
… net
access access …
net access net
net
Introduction: 1-47
Internet structure: a “network of networks”
Option: connect each access ISP to one global transit ISP?
Customer and provider ISPs have economic agreement.
access
… access
net
access
net …
net
access
access net
net
access
access net
net
…
…
global
access
net
ISP access
net
access
net
access
net
access
net
access
… net
access access …
net access net
net
Introduction: 1-48
Internet structure: a “network of networks”
But if one global ISP is viable business, there will be competitors ….
access
… access
net
access
net …
net
access
access net
net
access
access net
net
ISP A
…
…
access
net ISP B access
net
access
net
ISP C
access
net
access
net
access
… net
access access …
net access net
net
Introduction: 1-49
Internet structure: a “network of networks”
But if one global ISP is viable business, there will be competitors …. who will
want to be connected
Internet exchange point
access
… access
net
access
net …
net
access
access net
net
IXP access
access net
net
ISP A
…
…
access
net
IXP ISP B access
net
access
net
ISP C
access
net
access
net
peering link
access
… net
access access …
net access net
net
Introduction: 1-50
Internet structure: a “network of networks”
… and regional networks may arise to connect access nets to ISPs
access
… access
net
access
net …
net
access
access net
net
IXP access
access net
net
ISP A
…
…
access
net
IXP ISP B access
net
access
net
ISP C
access
net
access
net
regional ISP access
… net
access access …
net access net
net
Introduction: 1-51