You are on page 1of 56

COMPUTER NETWORKS - INF 360

Nicholas Kiget
Office E
Department of Information Technology
School of Information Sciences
Moi University
Cell Phone : 0721246397
Email: kigetn@gmail.com / nkiget@mu.ac.ke

About me:
Research Interests :
Grid Computing and Cloud Computing
E-Learning
Agribusiness Incubation
Academic Information
PHD (IT) (Student) Kibabii University
Msc (IT) MMUST
Bsc (Computer Science) JKUAT

CCNA, MCP, IT Essentials Trainer


Experience
Moi University - Lecturer
MMUST
- Lecturer 2 Years
MMUST
- Network Administrator 3 Years

Course Content
WK TOPIC
1
Network fundamentals
Network Types

SUB TOPIC
- Classification. Network taxonomy (Packet
switching, circuit switching): Wireless, LANs;
WANs; MANs.
- Bridges; Switches; Routers; Brouters; Gateways
- Ethernet; Token Ring; FDDI ASSIGNMENT 1
- OSI; TCP/IP.

2
3
4

Internetworking Devices
Network Standards
Network models.

CAT 1

Network performance

Protocols: Wireless Protocols


and Standards.

Bandwidth; Propagation delay; Latency and


throughput
IP; ARP); ICMP; UDP; TCP; FTP; Remote login
TELNET; SMTP; HTTP; Port Numbers. ASSIGNMENT 2

8
9

Network Design Paradigms:


DNS

Peer-to-Peer; Client-server.
Structure of DNS, How it works

10

CAT 2

11

Network security.

12

Framing and Synchronization. Flow control and


the Sliding Window Algorithm.
Principles of medium access control: Multiple
access protocols: CSMA/CA; CSMA/CD; Token
Passing.

Emerging issues and trends in Fixed and Wireless Data


communication.
Case Studies
END OF SEMESTER EXAMINATION

13
14

Books

References
Andrew S. Tanenbaum, Computer Network,
Prentice-Hall
Doughlas E. Comer, Computer Networks and
Internet
Forouzan B. A. (2005) Data Communications and
Networking.
4th Ed. New Delhi: Tata McGraw-Hill
Publishing Company Limited, ISBN 0-07-063414-9
Comer D. E. & Stevens D
http://www.cisco.com
/public/support/tac/documentation.html
http://www.redhat.com/docs

Grading

Grading Guidelines
Exams: 70% each
CATs + Assignments: 30%

Computer Networks

INTRODUCTION TO COMPUTER
NETWORKS

Introduction to Computer Networks

Computer Networks
Computer
network
connects two or more
autonomous computers.

The computers can be


geographically located
anywhere.

Introduction to Computer Networks

Applications of Networks
Resource Sharing
Hardware (computing resources, disks, printers)
Software (application software)
Information Sharing
Easy accessibility from anywhere (files, databases)
Search Capability (WWW)
Communication
Email
Message broadcast
Remote computing
Distributed processing (GRID Computing)

Introduction to Computer Networks

LAN, MAN & WAN


Network in small geographical Area (Room, Building
or a Campus) is called LAN (Local Area Network)
Network in a City is call MAN (Metropolitan Area
Network)
Network spread geographically (Country or across
Globe) is called WAN (Wide Area Network)

Introduction to Computer Networks

Network Topology
The network topology
defines the way in
which
computers,
printers,
and
other
devices are connected.
A network topology
describes the layout of
the wire and devices as
well as the paths used
by data transmissions.

Introduction to Computer Networks

Bus Topology
Commonly referred to
as a linear bus, all the
devices on a bus
topology are connected
by one single cable.

Introduction to Computer Networks

Star & Tree Topology


The star topology is the most
commonly used architecture in
Ethernet LANs.
When
installed,
the
star
topology resembles spokes in
a bicycle wheel.
Larger networks use the
extended star topology also
called tree topology. When
used with network devices that
filter frames or packets, like
bridges, switches, and routers,
this
topology
significantly
reduces the traffic on the wires
by sending packets only to the
wires of the destination host.

Introduction to Computer Networks

Ring Topology
A frame travels around the ring,
stopping at each node. If a node
wants to transmit data, it adds the
data as well as the destination
address to the frame.
The frame then continues around
the ring until it finds the
destination node, which takes the
data out of the frame.
Single ring All the devices on
the network share a single cable
Dual ring The dual ring topology
allows data to be sent in both
directions.

Introduction to Computer Networks

Mesh Topology
The mesh topology
connects all devices
(nodes) to each other
for redundancy and
fault tolerance.
It is used in WANs to
interconnect LANs and
for
mission
critical
networks like those
used by banks and
financial institutions.
Implementing the mesh
topology is expensive
and difficult.

Introduction to Computer Networks

Network Components
Physical Media
Interconnecting Devices
Computers
Networking Software
Applications

Introduction to Computer Networks

Networking Media
Networking media can
be defined simply as
the means by which
signals (data) are sent
from one computer to
another (either by cable
or wireless means).

Introduction to Computer Networks

Networking Devices
HUB, Switches, Routers,
Wireless Access Points,
Modems etc.

Introduction to Computer Networks

Computers: Clients and Servers


In
a
client/server
network arrangement,
network services are
located in a dedicated
computer whose only
function is to respond
to the requests of
clients.
The server contains the
file, print, application,
security, and
other
services in a central
computer
that
is
continuously available
to respond to client
requests.

Introduction to Computer Networks

Networking Protocol: TCP/IP

LAN Technologies

Networking Technologies
LAN TECHNOLOGIES
WAN TECHNOLOGIES
WIRELESS TECHNOLOGIES

LAN Technologies

LAN & WLAN TECHNOLOGIES


Options
Ethernet
Fast Ethernet
Gigabit Ethernet
10 Gig Ethernet
Wifi

LAN Technologies

Ethernet and Wifi Media Access


Ethernet and
technologies

Wi-Fi

are

both

multi-access

Broadcast medium, shared by many hosts


Simultaneous transmissions will result in collisions

Media Access Control (MAC) protocol required


Rules on how to share medium

The Data Link Layer is divided into two Part MAC


Media Access Control) Sublayer and LLC (Logic
Link Control) Sublayer

LAN Technologies

Ethernet (802.3)
10 Base 5 (Thicknet) (Bus Topology)
10 Base 2 (Thinnet) (Bus Topology)
10 Base T (UTP) (Star/Tree Topology)
10 Base FL (Fiber) (Star/Tree Topology)

LAN Technologies

Ethernet
Physical Media :10 Base5
10 Base2
10 BaseT
10 BaseFL

- Thick Co-axial Cable with Bus Topology


- Thin Co-axial Cable with Bus Topology
- UTP Cat 3/5 with Tree Topology
- Multimode/Singlemode Fiber with Tree
Topology

Maximum Segment Length


10 Base5
10 Base2
10 BaseT

- 500 m with at most 4 repeaters (Use Bridge to extend


the network)
- 185 m with at most 4 repeaters (Use Bridge to extend
the network)
- 100 m with at most 4 hubs (Use Switch to extend the
network)

LAN Technologies

Ethernet CSMA/CD
CSMA/CD (carrier sense multiple access with
collision detection) media access protocol is used.
Data is transmitted in the form of packets.
Sense channel prior to actual packet transmission.
Transmit packet only if channel is sensed idle;
else, defer the transmission until channel becomes
idle.
After packet transmission is started, the node
monitors its own transmission to see if the packet
has experienced a collision.
If the packet is observed to be undergoing a
collision, the transmission is aborted and the
packet is retransmitted after a random interval of
time using Binary Exponential Backoff algorithm.

LAN Technologies

Ethernet Address
End nodes are identified by their Ethernet
Addresses (MAC Address or Hardware Address)
which is a unique 6 Byte address.
MAC Address is represented in Hexa Decimal format
e.g 00:05:5D:FE:10:0A
The first 3 bytes identify a vendor (also called prefix)
and the last 3 bytes are unique for every host or
device

LAN Technologies

Ethernet BUS Topology

Repeater

LAN Technologies

Ethernet STAR Topology

Hub

LAN Technologies

Fast Ethernet
100 Mbps bandwidth
Uses same CSMA/CD media access protocol and
packet format as in Ethernet.
100BaseTX (UTP) and 100BaseFX (Fiber) standards
Physical media :100 BaseTX
- UTP Cat 5e
100 BaseFX - Multimode / Singlemode Fiber
Full Duplex/Half Duplex operations.

LAN Technologies

Fast Ethernet
Provision for Auto-Negotiation of media speed:
10 Mbps or 100Mbps (popularly available for copper
media only).
Maximum Segment Length
100 Base TX - 100 m
100 Base FX - 2 Km (Multimode Fiber)
100 Base FX - 20 km (Singlemode Fiber)

LAN Technologies

Gigabit Ethernet
1 Gbps bandwidth.
Uses same CSMA/CD media access protocol as in
Ethernet and is backward compatible (10/100/100
modules are available).
1000BaseT (UTP), 1000BaseSX (Multimode Fiber)
and 1000BaseLX (Multimode/Singlemode Fiber)
standards.
Maximum Segment Length
1000 Base T
- 100m (Cat 5e/6)
1000 Base SX - 275 m (Multimode Fiber)
1000 Base LX - 512 m (Multimode Fiber)
1000 Base LX - 20 Km (Singlemode Fiber)
1000 Base LH - 80 Km (Singlemode Fiber)

LAN Technologies

10 Giga Ethernet
10 Gbps bandwidth.
Uses same CSMA/CD media access protocol as in
Ethernet.
Propositioned for Metro-Ethernet
Maximum Segment Length
1000 Base-T
- Not available
10GBase-LR
- 10 Km (Singlemode Fiber)
10GBase-ER
- 40 Km (Singlemode Fiber)

LAN Technologies

802.11 Wireless LAN


Network
connectivity
to the
legacy
wired LAN

Desktop
with PCI 802.11 LAN card

Access Point

Laptop
with PCMCIA 802.11 LAN card

Provides network connectivity over wireless media


An Access Point (AP) is installed to act as Bridge
between Wireless and Wired Network
The AP is connected to wired network and is
equipped with antennae to provide wireless
connectivity

LAN Technologies

802.11 Wireless LAN


Range ( Distance between Access Point and WLAN
client) depends on structural hindrances and RF
gain of the antenna at the Access Point
To service larger areas, multiple APs may be
installed with a 20-30% overlap
A client is always associated with one AP and when
the client moves closer to another AP, it associates
with the new AP (Hand-Off)
Three flavors:
802.11b
802.11a
802.11g

LAN Technologies

WLAN : 802.11b
The most popular 802.11 standard currently in
deployment.
Supports 1, 2, 5.5 and 11 Mbps data rates in the 2.4
GHz ISM (Industrial-Scientific-Medical) band

LAN Technologies

WLAN : 802.11a
Operates in the 5 GHz UNII (Unlicensed National
Information Infrastructure) band
Incompatible with devices operating in 2.4GHz
Supports Data rates up to 54 Mbps.

LAN Technologies

WLAN : 802.11g
Supports data rates as high as 54 Mbps on the 2.4
GHz band
Provides backward compatibility with 802.11b
equipment

Wireless networking protocols


The 802.11 family of radio protocols are commonly referred to
as WiFi.
802.11a supports up to 54 Mbps using the 5 GHz unlicensed
bands.
802.11b supports up to 11 Mbps using the 2.4 GHz unlicensed
band.
802.11g supports up to 54 Mbps using the 2.4 GHz unlicensed
band.
802.11n supports up to 600 Mbps using the 2.4 GHz and 5 GHz
unlicensed
bands.is not 802.11 WiFi! It is a completely different
802.16
(WiMAX)
technology that uses a variety of licensed and unlicensed
38
frequencies.

What is WIMAX ?
WiMAX (Worldwide Interoperability for
Microwave Access)
is a telecommunications protocol that
provides fixed and mobile Internet access.
The current WiMAX revision provides up to
40 Mbit/s with the IEEE 802.16m update
expected to offer up to 1 Gbit/s fixed
speeds.

What is WIMAX ?
WiMAX is an IP based, wireless
broadband access technology that
provides performance similar to
802.11/Wi-Fi networks with the coverage
and QOS (quality of service) of cellular
networks. WiMAX is also an acronym
meaning "Worldwide Interoperability for
Microwave Access (WiMAX).

What is Wimax ?
WiMAX is a wireless digital communications
system, also known as IEEE 802.16, that is
intended for wireless "metropolitan area
networks". WiMAX can provide broadband
wireless access (BWA) up to 30 miles (50 km)
for fixed stations, and 3 - 10 miles (5 - 15 km)
for mobile stations. In contrast, the WiFi/802.11
wireless local area network standard is limited
in most cases to only 100 - 300 feet (30 100m).

What is WIMAX ?
The name "WiMAX" was created by the
WiMAX Forum, which was formed in June
2001 to promote conformity and
interoperability of the standard. The forum
describes WiMAX as "a standards-based
technology enabling the delivery of
last mile wireless broadband access as an
alternative to cable and DSL".

What is last mile operation ?


The "last mile" or "last kilometer" is the
final leg of delivering connectivity from a
communications provider to a customer.
The phrase is therefore often used by the
telecommunications and cable television
industries. The actual distance of this leg
may be considerably more than a mile,
especially in rural areas.

What is last mile operation ?


It is typically seen as an expensive
challenge because "fanning out" wires and
cables is a considerable physical
undertaking. Because the last mile of a
network to the user is also the first mile
from the user to the world, the term "first
mile" is sometimes used.

Two Technologies for Sending Messages


1. Packet-switched
2. Circuit-switched
Each has its advantages and
disadvantages depending on what you
are trying to do.

Packet Switching
In packet-based networks, the message gets broken
into small data packets.
These packets are sent out from the computer and they
travel around the network seeking out the most efficient
route to travel as circuits become available.
This does not necessarily mean that they seek out the
shortest route.
Each packet may go a different route from the others.

Packet Switching
Each packet is sent with a header address which
tells it where its final destination is, so it knows
where to go.
The header address also describes the sequence for
reassembly at the destination computer so that the
packets are put back into the correct order.
One packet also contains details of how many
packets should be arriving so that the recipient
computer knows if one packet has failed to turn up.
If a packet fails to arrive, the recipient computer
UDP =
sends a message back to the computer which
User
originally sent the data, asking for the missing
Datagram
packet to be resent.
Protocol

Packet Switching
Advantages
Security
Bandwidth used to full potential
Devices of different speeds can communicate
Not affected by line failure (redirects signal)
Availability no waiting for a direct
connection to become available
During a crisis or disaster, when the public
telephone network might stop working, emails and texts can still be sent via packet
switching

Packet Switching
Disadvantages
Under heavy use there can be a delay
Data packets can get lost or become
corrupted
Protocols are needed for a reliable transfer
Not so good for some types data streams (e.g.
real-time video streams can lose frames due
to the way packets arrive out of sequence)

Circuit Switching
Circuit switching was designed in 1878 in order
to send telephone calls down a dedicated
channel.
This channel remains open and in use
throughout the whole call and cannot be used
by any other data or phone calls.

Circuit Switching
There are three phases in circuit switching:
Establish
Transfer
Disconnect

The telephone message is sent all together;


it is not broken up.
The message arrives in the same order that
it was originally sent.

Circuit Switching
In modern circuit-switched networks, electronic
signals pass through several switches before a
connection is established.
During a call no other network traffic can use
those switches.
The resources remain dedicated to the circuit
during the entire data transfer and the entire
message follows the same path.
Circuit switching can be analog or digital.

Circuit Switching
With the expanded use of the Internet
for voice and video, analysts predict a
gradual shift away from circuit-switched
networks.
A circuit-switched network is excellent
for data that needs a constant link from
end-to-end, for example, real-time
video.

Circuit Switching
Advantages
Circuit is dedicated to the call no
interference, no sharing
Guaranteed the full bandwidth for the
duration of the call
Guaranteed quality of service

Circuit Switching
Disadvantages
Inefficient the equipment may be unused
for a lot of the call; if no data is being sent,
the dedicated line still remains open.
It takes a relatively long time to set up the
circuit.
During a crisis or disaster, the network may
become unstable or unavailable.
It was primarily developed for voice traffic
rather than data traffic.

Routing Technique
Routing is an essential part of a packet switching
network. The principal conditions that influence
routing decisions are failures and congestion.
Adaptive routing is a technique that changes the
routing decisions as the network conditions
change.
However, adaptive routing algorithms rely on
information exchanged among nodes, which may
degrade the performance since the overhead
involved in information exchanging and decision
making.

You might also like