Académique Documents
Professionnel Documents
Culture Documents
Unit Staffs:
Consultation times will be announced in week 2, with consultations starting in week 3. Our teaching
team will offer regular consultation times. During the consultation sessions, you can ask any
questions you have about the material presented in the lectures or labs, about your assignments, or
about exam preparations. You can attend any consultation session (not just the ones by your
allocated tutor).
Discussion forum: will be used for general issues like conception and assignment clarification etc.
Weekly Activities:
a) Self-paced reading of the textbook prior to your lecture and completing in-lecture online
quizzes
Laboratory: The labs start in week 1! Each week, you will get a set of tasks on a lab sheet. Your
tutors will guide you through the tasks during the labs.
Students are encouraged to reply to a post in the forums as part of the learning process.
Peer Instruction Session: Peer instruction session (Developed by Eric Mazur of Harvard University)
will be carried out using a response gathering system. You need to bring a device that capable of
web-browsing, e.g. a laptop or smartphone.
Flux.qa (Similar to Kahoot!) will be used for answering the questions in the lecture.
Week 1:
These four functions —are the basic building blocks of any application:
Data storage,
Data access logic (Data manipulation including using SQL, e.g. DBMS software),
Application logic (Business logic), and
Presentation logic (presentation of data and acceptance of user command)
Week 2:
Study Materials:
Lecture:
In IEEE 802.11 (Wi-Fi) terminology, a station (abbreviated as STA) is a device that has the capability
to use the 802.11 protocol. For example, a station may be a laptop, a desktop PC, PDA, access point
or Wi-Fi phone.
SIFS: Shorts IFS (The time receiver waits before it sends an ACK or NAK)
IEEE 802.11 MAC Frame Format [WLAN Frame (Fields length in Bytes)]
2 2 6 6 6 2 6 0-2312 4
Frame D/I Address Address Address Sequence Address Payload CRC
Control (Duration 1 2 3 Control 4
or
Connection
ID)
No. of Speed of each Max. Actual speed Frequency Technology used (for Year
Type Comments
channel channel (Mbps) range (m) (Mbps) used (GHz) generating wireless signal) released
802.11 2.4 1997
OFDM (Orthogonal Less interference.
802.11a 8 54 50 20@17m 5 Frequency Division 1999 Costly, Business
Multiplexing) clients.
Cheap, Popular, Home
users. Interference
802.11b 3 11 150 2.4 1999
with home appliances
(e.g. Microwave oven)
Higher speed, higher
coverage than
802.11g 3 54 150 2.4 OFDM 2003 predecessors.
Interference with
home appliances.
300 64-QAM
MIMO (Multiple Input
450 Multiple Output, Directing Faster, more reliable.
(with 3 Multiple streams to a single This provides a
3
802.11n antennae). Both 2.4 client). significant increase in
(1, 6, 100 2009
Wi-Fi 4 and 5 multiple data without needing
11)
600 transmitters/receivers a higher bandwidth or
(if combined all operate simultaneously at transmit power.
the channels in one or both ends of the link.
one Dual band) 4 Spatial Streams are used.
433 Signal and Data are on
300@20- 256-QAM
separate channel.
30m MU-MIMO (Multi-User
802.11ac 6900 (under 5 MU-MIMO doesn’t
8 100 MIMO, Directing Spatial 2014
Wi-Fi 5 perfect (exclusive) increase the speed to
90@Max streams to a multiple clients
condition when any single client, it
Range simultaneously)
both the AP and can increase the
client has RTS/CTS on Separate overall data
multiple frequency range. throughput of the
antenna) Additional antenna provides entire network.
further speed. Radio beam is
Up to 1,000 shaped with special antenna
so signal is focused in certain
direction (Beamforming).
8 Spatial Streams are used
(Doubles the channel width
up to 80 MHz)
802.11ad 7000 Cannot penetrate
10 5000 2016
Wi-Gig 50,000 (future) walls
54 MHz –
802.11af 790 MHz
White Wi- (VHF and
Cognitive Radio Technology
Fi (Super UHF).
Wi-Fi) Unused TV
Channels
802.11x
2019
Wi-Fi 6
Week 12
1. PHYSICAL LAYER:
FUNCTIONS:
Considered the domain of many hardware-related network design issues such as LAN and
WAN topology
Responsible for various encoding and signaling functions that transform the data from bits
that reside within a computer/other device into signals that can be sent over the network.
Transmit and receive data in both wired and wireless networks.
Primarily executed in hardware by a network interface controller (NIC)
FUNCTIONS:
LOGICAL LINK CONTROL (LLC): This layer establishes and controls logical links between local
devices on a network.
MEDIA ACCESS CONTROL (MAC): Controls access to the network medium.
DATA FRAMING: Responsible for the final encapsulation of higher-level messages into frames
that are sent over the network at the physical layer.
ADDRESSING: Labels information with particular destination location where each device has
a unique number called MAC address or hardware address.
ERROR DETECTION AND HANDLING: Handles errors that occurs at the lower level of network
stack.
APPLICATIONS: Wifi
ROUTING: Moving data across a series of interconnected networks. Handle incoming packets
from various sources, determine their final destination, and figure out where they need to be
sent where they're supposed to be.
LOGICAL ADDRESSING: Every device that communicates over a network has associated with
it a logical address, sometimes called a layer three address. For example, on the Internet, the
Internet Protocol (IP) is the network layer protocol and every machine has an IP address. Note
that addressing is done at the data link layer as well, but those addresses refer to local physical
devices. In contrast, logical addresses are independent of particular hardware and must be
unique across an entire internetwork.
DATAGRAM ENCAPSULATION: Encapsulates messages received from a higher-layers by
placing them into datagrams (packets) with a network layer header.
ERROR HANDLING AND DIAGNOSTICS: Special protocol are used to allow devices that to
exchange information about the status of the hosts on the network/device.
FRAGMENTATION AND REASSEMBLY: Some data link layer technologies have limits on the
length of any message that can be sent, so, the network layer splits the packet and send to
data link layer. once arrived, the pieces are reassembled on the destination machine.
FUNCTIONS:
APPLICATIONS: TIP/VDP
5. APPLICATION LAYER
FUNCTIONS:
Routing: 3 components
Routing: 2 types
Email Server:
Physical Layer:
Transmission:
Digital Transmission:
Error detection
Encoding/decoding of symbol and bits between physical layer symbols and bits (frames)
Controls when the device transmits
When to transmit:
Transmission technique:
ADSL
Parity Check:
Checksum:
Cyclic Redundancy Check (CRC): P%G = R. P and R are sent. Receiver does P%G = R OK.
Error Correction:
Stop and wait ARQ: Sender waits for ACK after sending every packet
Continuous ARQ: Sender continuously sends packet. When receives a NAK then resends
packet
TCP Layer:
DNS Servers: Distribute database. Organized in a hierarchy reflecting the structure of the domain
name. Iterative (recursive) DNS lookup.
ARP (Address Resolution Protocol): Data Link Layer
TCP:
Connection oriented – virtual point to point full duplex ckt is established between two
devices
Reliable - Errors are detected and corrected. Segments are reassembled in correct order
Used by: http, smtp, imap, ssh
IP Fragmentation: IP fragmentation is an Internet Protocol (IP) process that breaks packets into
smaller pieces (fragments), so that the resulting pieces can pass through a link with a smaller
maximum transmission unit (MTU) than the original packet size. The fragments are reassembled by
the receiving host.
---------Ack Server
----------Fin Server
Client -----Ack
VoIP:
Guaranteed transport
Low latency
Low jitter
QOS:
Wired LAN:
LAN Types:
Peer to Peer LAN: Home LAN. All computers are both server and client.
Server NOS: NM tools, Network Service (TCP/IP protocol suite, Application Layer protocols
[http, smtp, ftp, ssh, telnet, LDAP, SQL database etc.] Replaces or Augments normal OS.
example: Linux, MS Windows Server 2012)
Client NOS: Network Access(all layers). Part or OS (Windows 10, Mac OS, Linux, Android etc.)
Services provided by NOS:
Directory Service (LDAP – Lightweight Directory Service Protocol. e.g. Active Directory. LDAP
contains: user[name, organization, access right, password, photo], hardware [IP Address,
Network Mask, physical location, purchase date, maintenance interval] and software
[license, access right] information)
Network and User profile
File, web, print, email server
Ethernet: 802.3
Hub Based Ethernet: Physical topology: Star (Point to point), Logical topology: Shared BUS
(Multipoint). Half-duplex. Runs 50% of capacity.
Switched Ethernet: Logical Star. Full diplex. Media not shared. No broadcast. Reads MAC address.
Send to the destination only. Uses Forwarding Table. When this table is empty switch acts like a hub.
Sends the packet to everyone except the sender. Runs at 95% of capacity
Cut-through: transmits immediately as soon as DA has been read from the ethernet frame.
Low latency. Potential for transmitting packet with error
Store & Forward: Gets the entire packet, checks for error then transmits. High latency. Low
error. Low retransmit.
Fragment-free: Reads header only (first 64 bytes) and transmit. Compromise of the above
two.
Hidden Node Problem: When a computer transmits at the same time because it cannot sense that
another computer on the WLAN is currently transmitting (Because it is out of range of the WiFi
signal of the other computer NOT the AP) is referred to as the Hidden Node Problem
Soln: Exponential Backoff (1st collision: 0 or 1 unit time, 2nd col.: 0 and 3 time unit, 3rd Col.: 0 and 7
time unit)
WLAN Channels:
Stop-and-wait ARQ (This is additional to L4 ARQ): devices only send next frame after
receiving ACK for previous frame
Controlled Access: Device sends RTS (Request To Send). AP sends CTS (Clear To Send).
Usually Not implemented
IFS: Inter-Frame Spacing Time (High priority: Short IFS, Normal: IFS, Resend after Collision: Long IFS)
WLAN Topology:
WLAN Design consideration: Overlapping channel, interference (walls other SSID), coverage,
roaming
WLAN Attenuation: 3db attenuation means signal strength halved. 6 db one fourth.
WLAN Security:
Advantages of VLAN:
Subnets organized by functions (People can carry IP address even if they shift office to a
different building)
Limited broadcasting: Only to the subnets not all the ports of the switch.
Efficient: faster, cheaper and easier to config than routing.
CSU/DSU: Channel Service Unit and Data Service Unit (DTU: Data Terminal Unit. CPE: Customer
Premise Equipment.): These are Modems.
CIR (Committed Information Rate): DE (Discard Eligible). Packets sent at the rate exceeding CIR are
DE
MAR (Maximum Allowable Rate): Packets sent at higher than MAR will be discarded.
Carrier Ethernet: Same as LAN. No extra PAD/CSU/DSU needed. Cheaper but slower than ATM
Access VPN: Access company over the Internet. Monash uses it. Special VPN gateway at Monash.
Client has software. This gives Monash IP to the student and staffs.
VPN Advantages:
Lower cost
Easy setup
Secure
Flexible
VPN Disadvantages:
No performance guarantee
Overhead (encapsulation, encryption)
Many incompatible standard
D. Security
Denial of Service (DoS)
TCP SYN flood: send TCP SYN but never send the ACK
ICMP flood: send broadcast ping messages with fake source (Prevention: Do not reply broadcast
ping request, very source address, traffic limit, detect traffic anomaly and block them.)
Packet level FW (examines packet header of incoming packet and takes decision based on
defined rules, make use of acl)
Application level FW (NGFW/DPI: Examines application layer packet contents. E.g. examines
email attachment for viruses)
Comparison: Application level FW is computationally more expensive, more difficult to set up
and more resource intensive than packet level FW.
DMZ: A part of a company network that is accessible from the Internet. Not heavily guarded
like company intranet. Allow extranet’s access to DNS, WWW and Mail servers.
Configuration: 5 pre-defined chains: PREROUTE, INPUT, FORWARD, OUTPUT, POSTROUTE
iptables -A FORWARD -i eth0 -o eth1 -j ACCEPT
Intrusion detection and prevention: Fail2Ban (Monitor system log files and analyse login attempts.
Based on failed attempts, blocks user for hours to weeks)
Encryption: Tool to ensure confidentiality and integrity. Disguise information using mathematical
rules. Based on a key for encryption and decryption.
DES (Data Encryption System): Developed by US Govt and IBM. 56-bit key
3DES: 168 bit key
AES (Advanced Encryption Standard): 128, 192 and 256-bit key
RC4, IDEA, Blowfish
Asymmetric encryption: Sender encrypts message with receiver’s PUBLIC key. Receiver decrypts
message with his (receiver) PRIVATE key.
PKE (Public Key Encryption): RSA (Rivest, Shamir, Adelman), X.509 (TLS): 512 to 1024 bit
Digital Signature: Reverse PKE. Here private key is used for encryption and public key for decryption.
TLS: Transport Layer Security: Add SECURITY layer between TCP and Application. Predecessor: SSL
developed by Netscape. TLS is IEEE standard. Current version 1.2. Certificate is used to prove its
authenticity.
1. Physical security
2. Firewalls
3. Encryption
E. The Internet
VDSL: Very High-Speed Digital Subscriber Line. Eliminates crosstalk. Speed is up to 100 Mbps. VDSL
vectoring aims to eliminate this by separating the lines from each other, allowing them to operate
independently so they retain signal clarity. The industry frequently refers to vectoring as being similar
to "noise cancellation" tech in headphones: by blocking out the excess noise, the line can be more
productive.
FTTN: Fibre To The Node or Fibre To The Neighbourhood. Last mile is connected from the node instead
of the DSLAM at CO. Hence distance between client modem and DSLAM decreases (less than 1 km.).
This reduces crosstalk/noise and increases speed.
DOCSIS: Data Over Cable Service Interface Specification: Shared coaxial cable of cable TV Network.
Shared 10 Gbps. MAC-layer encryption. Authentication provided.
Cheaper
Reliable (No active equipment, No water damage)
Broadcast to customer
Move to IPv6
Use DHCP, NAT, PAT (NAT problem: private IP, Port number changes)
Virtual hosting (Same physical web server hosts multiple instances of websites with same
address. DNS server pointing to the same IP address for several websites)
Use private IP Address space (10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16)
IPv6 Implementation:
Dual stack
6to4: Auto tunnelling is used by to IPv6 devices to communicate over IPv4 Network. 6to4
router and 6to4 relay are required.
Internet structure:
ISP
AS
IXP: Logical- partial mesh between peering ISPs. Physical – Star
Internet governance:
Load balancing (providing service from multiple servers. Two types: DNS based (hostname
maps to multiple IP addresses), Load balancer: request routes to different server)
Content Caching: GGC
CDN: servers in multiple location, own high-BW network, PoP closer to the users. Akamai.
Future Internet:
IoT: Home automation, energy (smart meter, smart grid), environmental, medical, tranport sensors,