Académique Documents
Professionnel Documents
Culture Documents
Computer Networks
Week 1
Mr. Adomar L. Ilao
IP picture frame
http://www.ceiva.com/
What is the
Internet(Cont)?
What is the
Internet(Cont)?
What is the
Internet(Cont)?
What is the
Internet(Cont)?
ISP can be RESIDENTIAL ISP (local cable or telephone
companies), corporate ISPs; university ISPs; and ISPs
that provide WiFi access in airports, hotels, coffee
shops and other public places.
Each ISP is a network of packet switches.
ISPs can be access to the end system by 56 kbps dial-up
modem access, residential broadband access such as
cable model or DSL, high-speed local area network
access and wireless access.
What is the
Internet(Cont)?
The Network
Edge(Cont)
Access Networks
Dial-Up
Started in 1990.
It uses analog telephone lines using a dial-up modem.
The term dial-up is employed because the users software
actually dials an ISPs phone number and makes a traditional
phone connection with the ISP.
Phone lines is made up of twisted-pair copper wire.
Drawbacks:
Slow based on a maximum rate of 56 kbps. Example : 3 minutes
song will took 8 minutes to download.
Access Networks(Cont)
DSL(Digital Subscriber Line)
It connects comes from the same company that provides it wired
local phone access (i.e., local telco)
When DSL is used, a customers telco is also its ISP.
DSL uses the existing telephone line (twisted-pair copper wire) to
exchange data with a digital subscriber line access multiplexer
(DSLAM), typically located in the telcos CO.
It carries the signal in different frequencies.
A high-speed downstream channel in the 50 kHz to 1 MHz band
A medium-speed upstream channel, in the 4 khz to 50 kHz band
An ordinary two-way telephone channel in the 0 to 4 kHz band
Access Networks(Cont)
Ethernet
It is a common way to connect end system through LOCAL AREA
NETWORK (LAN).
It is the most prevalent access technology in corporate and
university networks.
It uses twisted-pair copper wire to connect to an Ethernet Switch
It typically offers 100 Mbps access, whereas servers may can have 1
Gbps or even 10 Gbps access.
Fault Intolerant
If any device or cable section attached to the network fails, it will
most likely make the entire network go down.
Difficult Troubleshooting
There is no easy way to determine what node or cable section is
causing a problem, and the network must be troubleshot by a
"process of elimination." This can be very time consuming.
Specialized Cable
The RG-58A/U coaxial cable used in Ethernet networks can not be
used for any other purpose. In the event that the network is
changed to another type, then the cable will have to be replaced.
Access Networks(Cont)
WiFi (Cont)
Drawbacks :
WiFi uses the unlicensed 2.4GHz spectrum, which often crowded with other
devices such as Bluetooth, microwave ovens, cordless phones, or video
sender devices, and among many others. This may cause degradation in
performance.
WiFi networks have limited range. A typical WiFi home router might have a
range of 45m (150ft) indoors and 90m (300ft) outdoors. Ranges may also vary
as WiFi is no exception to the physics of radio wave propagation with
frequency band.
The most common wireless encryption standard, wired equivalent privacy or
WEP has been shown to be breakable even when it has been correctly
configured.
Access points could be used to steal personal and confidential information
transmitted from WiFi consumers.
Intervention of a closed or encrypted access point with other open access
points on the same or a nearby channel can prevent access to the open access
points by others in the area. It poses a high problem in high-density areas
such as large apartment blocks where many residents are operating WiFi
access points.
Wireless networks
Wireless PANs (Bluetooth IEEE
802.15)
very low range
wireless connection to printers etc
Sridhar Iyer
IIT Bombay
34
Access Networks(Cont)
WiMax (Cont)
Drawbacks :
unguided media:
Category 3: traditional
phone wires, 10 Mbps
Ethernet
Category 5 TP: 100Mbps
Ethernet
broadband:
high-speed point-to-point
transmission (e.g., 5 Gps)
signal carried in
electromagnetic spectrum
no physical wire
bidirectional
propagation environment
effects:
reflection
obstruction by objects
interference
Physical Media
Packet Switching
Each packet is sent with a header address. This tells it
where its final destination is, so it knows where to go.
The header address also describes the sequence for
reassembly at the destination computer so that the
packets are put back into the correct order.
One packet also contains details of how many packets
should be arriving so that the recipient computer knows
if one packet has failed to turn up.
If a packet fails to arrive, the recipient computer sends a
message back to the computer which originally sent the
data, asking for the missing packet to be resent.
Packet Switching
Difference between circuit switching and
packet switching:
Packet Switching
Message is broken up into segments (packets).
Each packet carries the identification of the intended
recipient, data used to assist in data correction and
the position of the packet in the sequence.
Each packet is treated individually by the switching
centre and may be sent to the destination by a totally
different route to all the others.
Packet Switching
Packet Switching
Advantages:
Security
Bandwidth used to full potential
Devices of different speeds can communicate
Not affected by line failure (rediverts signal)
Availability do not have to wait for a direct
connection to become available
During a crisis or disaster, when the public
telephone network might stop working, e-mails
and texts can still be sent via packet switching
Packet Switching
Disadvantages
Under heavy use there can be a delay
Data packets can get lost or become
corrupted
Protocols are needed for a reliable
transfer
Not so good for some types data streams
e.g real-time video streams can lose
frames due to the way packets arrive out
of sequence.
Circuit Switching
There are three phases in
circuit switching:
Establish
Transfer
Disconnect
Circuit Switching
With the expanded use of the Internet for
voice and video, analysts predict a gradual
shift away from circuit-switched networks.
A circuit-switched network is excellent for
data that needs a constant link from end-toend. For example real-time video.
Circuit Switching
Circuit Switching
Advantages:
Circuit is dedicated to the call no
interference, no sharing
Guaranteed the full bandwidth for the
duration of the call
Guaranteed Quality of Service
Circuit Switching
Disadvantages:
Inefficient the equipment may be unused
for a lot of the call, if no data is being sent,
the dedicated line still remains open
Takes a relatively long time to set up the
circuit
During a crisis or disaster, the network may
become unstable or unavailable.
It was primarily developed for voice traffic
rather than data traffic.
Multiplexing in Circuit-Switched
Networks
It implements either FREQUENCY-DIVISION
MULTIPLEXING or TIME-DIVISION
MULTIPLEXING.
Multiplexing in Circuit-Switched
Networks(Cont)
Frequency-Divison Multiplexing
The frequency spectrum of a link is divided up among the
connections established across the link.
The link dedicates a frequency band to each connection for
the duration of the connection.
Multiplexing in Circuit-Switched
Networks(Cont)
Time Division Multiplexing
Time is divided into frames or fixed duration, and each frame is
divided into fixed number of time slots.
When network establishes a connection across a link, the
network dedicates one time slot in every frame to this
connection.
These slots are dedicated for the sole use of that connection,
with one time slot available for use (in every frame) to transmit
the connections data.
The programs on these routers use routing algorithms that call upon
their routing tables to determine the best path to send each packet.
Routing Packets
AGIS
ANS
ATMnet
BBNplanet
Compuserve
CRL
CWIX
DataXchange
DIGEX
Epoch
GetNet
GlobalCenter
GoodNet
GridNet
IBM
Interconnect
InternetMCI
iSTAR
MCIWorldcom 2000
(current pdf)
NapNet
Netrail
NFS
PsiNet
Savvis
Sprint
UUNET
Example :
Nbtstat s = to list the current NetBIOS sessions and their
status, including statistics.
Tracert www.facebook.com = determine the number of
hops.
Types of Delay
Types of Delay(Cont)
Processing delay
The time required to examine the packet's header and
determine where to direct the packet is part of the
processing delay.
The processing delay can also include other factors,
such as the time needed to check for bit-level errors in
the packet that occurred in transmitting the packet's
bits from the upstream router to router A.
Processing delays in high-speed routers are typically
on the order of microseconds or less.
After this nodal processing, the router directs the
packet to the queue that precedes the link to router B.
Types of Delay(Cont)
Queuing delay
The packet experiences a queuing delay as it waits to be
transmitted onto the link.
The queuing delay of a specific packet will depend on the
number of other, earlier-arriving packets that are queued
and waiting for transmission across the link.
The delay of a given packet can vary significantly from
packet to packet. If the queue is empty and no other
packet is currently being transmitted, then our packet's
queuing delay is zero. On the other hand, if the traffic is
heavy and many other packets are also waiting to be
transmitted, the queuing delay will be long.
It can be on the order of milliseconds to microseconds in
practice.
Types of Delay(Cont)
Transmission delay
Assuming that packets are transmitted in first-come- first-serve
manner, as is common in the Internet, our packet can be transmitted
once all the packets that have arrived before it have been transmitted.
Denote the length of the packet by L bits, and denote the transmission
rate of the link from router A to router B by R bits/sec.
The rate R is determined by transmission rate of the link to router B.
For example, for a 10-Mbps Ethernet link, the rate is R = 10 Mbps; for
a 100-Mbps Ethernet link, the rate is R = 100 Mbps. The transmission
delay is also known as the store-and-forward delay. This is the amount
of time required to transmit all of the packet's bits into the link.
Transmission delays are typically on the order of microseconds or less.
Types of Delay(Cont)
Propagation delay
Once a bit is pushed onto the link, it needs to
propagate to router B.
The time required to propagate from the
beginning of the link to router B is the propagation
delay.
The bit propagates at the propagation speed of
the link. The propagation speed depends on the
physical medium of the link.
Protocol Layering
OSI Model
Network Architectures:
OSI Model
The OSI Model is a layered
framework for the design of
network systems that allows
communication between all
types of computer systems.
It consists of seven separate
but related layers, each of
which defines a part of the
process of moving information
across a network.
Application
Seventh Layer
Presentation
Sixth Layer
Session
Fifth Layer
Transport
Fourth Layer
Network
Third Layer
Data Link
Second Layer
Physical
First Layer
application
transport
network
Data link
physical
source
message
segment
Ht
datagram Hn Ht
frame Hl Hn Ht
Encapsulation
application
transport
network
link
physical
link
physical
switch
destination
M
Ht
Hn Ht
Hl H n H t
M
M
application
transport
network
link
physical
Hn H t
Hl Hn Ht
M
M
network
link
physical
Hn Ht
router
funding for projects that might provide dramatic advances for military
timeframe of research could be 5 years or longer
formed with an emphasis towards basic computing research
was not oriented only to military products
1969
ARPANET commissioned by DoD for research into networking
1971
15 nodes (23 hosts) networked for the first time
used NCP (network control protocol) to allow computers to communicate
UCLA, SRI, UCSB, Univ of Utah, BBN, MIT, RAND, SDC, Harvard, Lincoln Lab, Stanford, UIU(C),
CWRU, CMU, NASA/Ames
1972
the first e-mail program was created by Ray Tomlinson of BBN
1973
first international connections to the ARPANET
1974
first use of term internet in a paper on Transmission Control Protocol
1976
Elizabeth II, Queen of the United Kingdom, sends her first email
1972:
ARPAnet demonstrated
publicly
NCP (Network Control
Protocol) first host-host
protocol
first e-mail program
ARPAnet has 15 nodes
Internet History
1972-1980: Internetworking, new and proprietary nets
Chapter 1: Introduction
86
Internet History
1980-1990: new protocols, a proliferation of networks
1983: deployment of
TCP/IP
1982: smtp e-mail
protocol defined
1983: DNS defined for
name-to-IP-address
translation
1985: ftp protocol defined
1988: TCP congestion
control
Internet History
1990s: commercialization, the WWW