1st Slide Set Computer Networks

Size: px
Start display at page:

Download "1st Slide Set Computer Networks"

Transcription

1 Prof. Dr. Christian Baun 1st Slide Set Computer Networks Frankfurt University of Applied Sciences WS1617 1/74 1st Slide Set Computer Networks Prof. Dr. Christian Baun Frankfurt University of Applied Sciences ( : Fachhochschule Frankfurt am Main) Faculty of Computer Science and Engineering

2 Prof. Dr. Christian Baun 1st Slide Set Computer Networks Frankfurt University of Applied Sciences WS1617 2/74 Agenda for Today Organizational Information Fundamentals of computer networks Network services, roles, transmission media and network protocols Classification of networks Parallel/ serial data, synchronous/asynchronous data transmission Directional dependence (anisotropy) of data transmission Devices and topologies Frequency, data signal and fourier series Bitrate, baud rate, bandwidth and latency Media access control Collision domain Protocols TCP/IP reference model Hybrid reference model OSI reference model

3 Prof. Dr. Christian Baun 1st Slide Set Computer Networks Frankfurt University of Applied Sciences WS1617 3/74 Prof. Dr. Christian Baun Academic Training and Career 2005: Diploma in Computer Science from the FH Mannheim 2006: Master of Science from the HS Mannheim : Scientist at Forschungszentrum Karlsruhe and KIT : D-Grid integration project Reference installation Ensuring sustainable operation : Open Cirrus Cloud Computing Testbed Operation and optimization of private clouds Development of cloud services and tools 2011: Doctoral degree from Universität Hamburg Evaluation and Development of Cloud Computing Services as a Basis for the Creation of a Marketplace : Substitute Professor at HS Darmstadt : Quality Specialist for HANA DB at SAP AG Since September 2013: Professor at FH Frankfurt

4 Organizational Information Tell me when problems exist at an early stage!!! Homepage: Check the course page regularly!!! The homepage contains among others the lecture notes Presentation slides in English and German language Exercise sheets in English and German language Sample solutions of the exercise sheers Old exams and their sample solutions Participating in the exercises is not a precondition for exam participation But it is recommended to participate the exercises The content of the English and German slides is identical, but please use the English slides for the exam preparation to become familiar with the technical terms Prof. Dr. Christian Baun 1st Slide Set Computer Networks Frankfurt University of Applied Sciences WS1617 4/74

5 Prof. Dr. Christian Baun 1st Slide Set Computer Networks Frankfurt University of Applied Sciences WS1617 5/74 Computer Networks in Computer Science (1/2) Where would you place the computer networks?

6 Prof. Dr. Christian Baun 1st Slide Set Computer Networks Frankfurt University of Applied Sciences WS1617 6/74 Computer Networks in Computer Science (2/2) Computer networks belong to practical computer science and technical computer science

7 Prof. Dr. Christian Baun 1st Slide Set Computer Networks Frankfurt University of Applied Sciences WS1617 7/74 Situation today and Objective for this Semester

8 Prof. Dr. Christian Baun 1st Slide Set Computer Networks Frankfurt University of Applied Sciences WS1617 8/74 Topics of this Course Image source: unknown Organisational information, introduction Fundamentals of computer networks Reference models Line codes, protocols and services Wired and wireless networks The course includes > 500 slides. But you do not need to memorize them all in detail for the exam...

9 Prof. Dr. Christian Baun 1st Slide Set Computer Networks Frankfurt University of Applied Sciences WS1617 9/74 The Way a good Course works... Image source: Google Mr. Miyagi says: Not only the student learns from his master, also the master learns from his student. Active participation please!

10 Things, which are bad in a Course... Attending late (regularly!) Noisy eating in the course Offensive-smelling food in the course = annoying and disrespectful = annoying = disgusting Noisy greeting of/by people attending late Teamwork at the laptop in the course Filming or photographing the course = embarrassing and disrespectful = annoying for the rows behind = embarrassing and disrespectful Image sources: Google image search. In detail: Antenne Niedersachsen, Ruhrnachrichten, Celantino, Tagesspiegel, adpic, Fudder Prof. Dr. Christian Baun 1st Slide Set Computer Networks Frankfurt University of Applied Sciences WS /74

11 Prof. Dr. Christian Baun 1st Slide Set Computer Networks Frankfurt University of Applied Sciences WS /74 Literature (Computer Networks) Computernetze kompakt, Christian Baun, Springer Vieweg (2015) Computer Networks, Andrew S. Tanenbaum, David J. Wetherall, Pearson (2010) Distributed Systems: Principles and Paradigms, Andrew S. Tanenbaum, Maarten van Steen, Prentice Hall (2006) Ethernet, Jörg Rech, Heise (2014) Wireless LANs, Jörg Rech, Heise (2012) Computernetzwerke, Larry L. Peterson, Bruce S. Davie, dpunkt (2008) TCP/IP, Gerhard Lienemann, Dirk Larisch, Heise (2011) Grundkurs Verteilte Systeme, Günther Bengel, Vieweg (2004) Computernetzwerke, James F. Kurose, Keith W. Ross, Pearson (2008) Prüfungstrainer Rechnernetze, Aufgaben und Lösungen, Jörg Roth, Vieweg (2010) Computernetzwerke, Rüdiger Schreiner, Hanser (2009) Einführung in die Informatik, Heinz Peter Grumm, Manfred Sommer, Oldenburg (2011) The books from Andrew S. Tanenbaum are available in English and German language

12 Prof. Dr. Christian Baun 1st Slide Set Computer Networks Frankfurt University of Applied Sciences WS /74 Generations of Computer Systems Generation Timeframe Technological progress 0 until 1940 (Electro-)mechanical calculating machines Elelectron tubes, relays, jack panels Transistors, batch processing Integrated circuits, time sharing Very large-scale integration, PCs/Workstations until? Distributed systems, the network is the computer In the 1960s and 1970s, first development efforts have been made in the area of computer networks Performance of computers before the 1960s was quite weak These computers were not used for universal purposes They were used for specific tasks, e.g. to calculate the flight path (trajectory) of projectiles

13 Prof. Dr. Christian Baun 1st Slide Set Computer Networks Frankfurt University of Applied Sciences WS /74 Development of Computer Networks (since the 1960s) Arpanet = Advanced Research Projects Agency Network First computer network without central control Developed in the 1960s Connected 4 universities in the US until December 1969 Goal: Robustness to survive the loss of some participants Solution: Decentralized structure and packet switching After 1969, several universities and research facilities in the US joined Arpanet Popular application protocols like Telnet and FTP have been developed in the Arpanet project The story that the development of Arpanet was driven by the fear of a nuclear war is an urban legend. Arpanet s objective was the installation of a robust computer network to make it simple to access the computer resources of different universities. Factors that influenced the development are the unreliable telephone lines that were used as transmission medium (solution: packet switching) and scalability (solution: no central components)

14 Prof. Dr. Christian Baun 1st Slide Set Computer Networks Frankfurt University of Applied Sciences WS /74 Development of Computer Networks (since the 1970s) Networks for connecting terminals with mainframes via serial cables This technology made time sharing possible Example: IBM Systems Network Architecture (SNA) since 1974 In time sharing mode, multiple users work at the same time and in a competitive way via terminals on a single computer by sharing the available computing time of the processor. The distribution of the computing time is done via time slices Host-to-host communication, based of proprietary networks, became available Example: DECnet As of 1975: Direct link between two PDP-11 computers As of 1976: Connecting up to 32 computers Later network technologies based on packet switching, as well as open standards and protocols (TCP/IP)

15 Prof. Dr. Christian Baun 1st Slide Set Computer Networks Frankfurt University of Applied Sciences WS /74 Development of Computer Networks (since the 1980s) Situation: High-performance Personal Computers (PCs) and Workstations Inexpensive network technologies, such as Ethernet and Token Ring Effect: Number of computer networks, built up at universities and companies, increased In the 1980s, the Arpanet switched over to the protocols TCP/IP and became a part of the internet In the late 1980s, the Arpanet was shut down After mid-1990s: Internet access became inexpensive Mobile systems e.g. laptops, tablet computers and mobile phones Computer networks became well-established also at home Paradigm change: Centralized systems = Distributed systems Computer networks are an important topic in computer science because of the growing computing power and storage capacity, as well as the availability of high-performance but inexpensive network technologies such as WLAN and LTE

16 Prof. Dr. Christian Baun 1st Slide Set Computer Networks Frankfurt University of Applied Sciences WS /74 Largest Computer Network (global Internet) Global network for web applications based of TCP/IP

17 Prof. Dr. Christian Baun 1st Slide Set Computer Networks Frankfurt University of Applied Sciences WS /74 Required Components to set up a Computer Network For setting up and running a computer network, these components are required: 1 2 terminal devices with network services running The devices are intended to communicate with each other or access shared resources A network service provides a service for communication or shared resources usage 2 Transmission medium to send and receive data (see slide set 2) Common used transmission media are based of copper wires (e.g. twisted pair cables or coaxial cables) and fiber-optic cables Wireless data transmission is also possible 3 Network protocols (see slides 54) Rules that specify, how computers can communicate The rules (network protocols) are mandatory. Without them, the communication partners cannot understand each other. Just imagine a phone call to a foreign country. The connection is established, but no participant understands the other s language. Only if all participants speak the same language, communication becomes possible

18 Prof. Dr. Christian Baun 1st Slide Set Computer Networks Frankfurt University of Applied Sciences WS /74 Computer Networks distinguished by their Dimension (1/3) Depending on the dimension, different groups of computer networks are distinguished Personal Area Network (PAN) Network of small mobile devices, such as cell phones Technologies: USB, FireWire, WLAN, Bluetooth, IrDA Major dimension: Few meters Local Area Network (LAN) Local network Range covers an apartment, building, company site or university campus Major dimension: m Concrete values depend on the transmission medium used and when using wireless networks, also the environment and the transmission power Technologies: Ethernet, Wireless LAN (WLAN), Token Ring (outdated)

19 Prof. Dr. Christian Baun 1st Slide Set Computer Networks Frankfurt University of Applied Sciences WS /74 Computer Networks distinguished by their Dimension (2/3) Metropolitan Area Network (MAN) Connects LANs Range covers a city or agglomeration area Major dimension: 100 km Technologies: Fiber-optic cables, WiMAX (IEEE ) Fiber-optic cables are used because of lesser attenuation (signal weakening) and higher data transmission rates Wide Area Network (WAN) Connects several networks Range covers a large geographic area inside a country or continent Major dimension: 1000 km Technologies: Ethernet (10 Gbit/s), Asynchronous Transfer Mode (ATM)

20 Prof. Dr. Christian Baun 1st Slide Set Computer Networks Frankfurt University of Applied Sciences WS /74 Computer Networks distinguished by their Dimension (3/3) Global Area Network (GAN) Range can covers an unlimited geographic area Connects WANs The internet is a GAN but not every GAN is the internet Example for a GAN: Connects a company s globally distributed offices Technologies: Satellites or fiber-optic cables

21 Prof. Dr. Christian Baun 1st Slide Set Computer Networks Frankfurt University of Applied Sciences WS /74 Parallel Data Transmission Image source: and Google Communication between computers is possible via parallel and serial data transmission With parallel data transmission, in addition to the control lines, multiple data lines exist Example: Parallel port which was the standard interface to connect printers until it was replaced by USB Via this interface, a complete byte of data can be transferred per time unit Benefit: Higher throughput Drawback: Lots of lines are necessary This is cost-intensive for long distances Usage: Local bus systems The image shows the parallel port (25 pins)

22 Prof. Dr. Christian Baun 1st Slide Set Computer Networks Frankfurt University of Applied Sciences WS /74 Serial Data Transmission When serial data transmission is used, the bits are transmitted one after another via the bus Transferring a byte takes 8 times longer compared to parallel data transmission Benefit: Can be used for long range distances, because only few wires are required Drawback: Lesser throughput Usage: Local bus systems and computer networks Image source: The image shows the serial port (25 pins) The image shows the serial port (9 pins)

23 Prof. Dr. Christian Baun 1st Slide Set Computer Networks Frankfurt University of Applied Sciences WS /74 Synchronous and Asynchronous Data Transmission (1/2) To read data from a bit stream, the incoming bit stream need to be sampled over a time window The time window is produced via a clock source Synchronous data transmission The communication partners synchronize the transmission via a clock signal The clock signal is... sent via a dedicated line or wire or it is recovered (= clock recovery) from the transmitted signals by the receiver Benefit: The data transmission does not need to be re-synchronized regularly Drawback: The realization of the clock recovery is expensive, because an additional line or wire is required

24 Prof. Dr. Christian Baun 1st Slide Set Computer Networks Frankfurt University of Applied Sciences WS /74 Synchronous and Asynchronous Data Transmission (2/2) Asynchronous data transmission The communication partners use clock sources that are independent from each other When data is transferred, a start bit is inserted in front of the data The start bit indicates that the receiver is expected to start his clock source A stop bit at the end of the data indicates that the data transmission ends Benefit: No synchronization of the clock sources is necessary Drawbacks: Because the clock sources can differ, the maximum size of the data which can be transferred without interruption is limited The start and stop bits are overhead

25 Prof. Dr. Christian Baun 1st Slide Set Computer Networks Frankfurt University of Applied Sciences WS /74 Data Transmission in Computer Networks In computer networks, the sender specifies the clock pulse and supplies it to the receivers within the bit stream For that reason, data transmission in computer networks is always synchronous Using an additional line or wire, just for the clock signal, is too expensive in computer networks in most cases

26 Prof. Dr. Christian Baun 1st Slide Set Computer Networks Frankfurt University of Applied Sciences WS /74 Directional Dependence (Anisotropy) of Data Transmission Simplex The information transfer only works in one direction After the end of a transmission, the communication channel can be used by another sender Examples: Radio, TV, Pager Duplex (Full-duplex) The information transfer works in both directions simultaneously Examples: Phone, Networks with twisted pair cables because they provide separate wires to send and receive Half-duplex The information transfer works in both directions, but not simultaneously Only one direction at a time Examples: Networks with fiber-optic cables or coaxial cables, because there exists just a single line to sending and receiving Wireless networks with just a single channel

27 Prof. Dr. Christian Baun 1st Slide Set Computer Networks Frankfurt University of Applied Sciences WS /74 Devices in Computer Networks (1/3) Repeater (layer 1) Most simple devices in computer networks Extends the range of LANs by cleaning and amplifying the received electrical or optical signals that are weakened in the transmission media Forwards signals (bits) but does not check their meaning and does not validates their correctness Provides only 2 ports For that reason, it is only suited to extend a LAN Hub (layer 1, Multiport Repeater) Can connect several terminal devices to a LAN Same functionality as a repeater, but provides > 2 ports Forwards incoming signals to all its ports Repeaters and Hubs have no network addresses, because they only forward signals For other network devices, they operate in a transparent way

28 Devices in Computer Networks (2/3) Modem (layer 1-2) Transmit signals over long distances by modulating them to a carrier frequency in the ultra low frequency band Recovers the signals by demodulating the transmitted information Modems are also Bridges (layer 2) Examples: (A)DSL or cable modems for broadband internet access and data modems Bridge (layer 1-2) Connects different physical networks Forwards frames between physical networks Forwards frames only when it is useful Validates the frames integrity via checksums Provides only 2 ports Forwards and filters frames but doesn t actively communicate with other devices = For that reason, Bridges don t need network addresses Examples: Modems, WLAN Access Points Layer-2-Switch (layer 1-2, Multiport Bridge) Same functionality as a Bridge, but provides > 2 ports Prof. Dr. Christian Baun 1st Slide Set Computer Networks Frankfurt University of Applied Sciences WS /74

29 Router (layer 1-3) Large network infrastructures usually consist of several smaller networks with separate logical address ranges Forwards packages between different logical networks Allows to connect the local area network (LAN) to a WAN Layer-3-Switch (layer 1-3) Similar functionality as a Router But is used only within local area networks in order to implement different logical address ranges Do not allow to connect the LAN to a WAN Gateway (layer 1-5) Enables communication between networks that use different protocols and/or different ways to address devices Host or Terminal Device Any device that communicates via computer networks Examples: PCs, mainframes, mobile phones, refrigerators,... All devices in computer networks are also called nodes and wireless network devices are also called stations Prof. Dr. Christian Baun 1st Slide Set Computer Networks Frankfurt University of Applied Sciences WS /74 Devices in Computer Networks (3/3)

30 Prof. Dr. Christian Baun 1st Slide Set Computer Networks Frankfurt University of Applied Sciences WS /74 Topologies of Computer Networks The topology of a computer network... determines how the communication partners are connected with each other affects its reliability a lot The structure of large-scale networks is often a combination of different topologies Physical and logical topology can be different Physical topology: Describes the wiring Logical topology: Describes the flow of data between the terminal devices Topologies are graphically represented with nodes and edges

31 Bus Network All terminal devices are connected via a shared communication cable the bus No active components between the terminal devices and the shared communication cable If a participant fails, it does not affect the network itself Advantage: Cheap to implement In the past, Hubs and Switches have been expensive Shared communication cable fails = complete network fails Only one participant can send data at each point in time = otherwise, collisions will occur A media access control method like CSMA/CD is required Examples: 10BASE2 (Thin Ethernet) and 10BASE5 (Thick Ethernet): 10 Mbps Prof. Dr. Christian Baun 1st Slide Set Computer Networks Frankfurt University of Applied Sciences WS /74

32 Prof. Dr. Christian Baun 1st Slide Set Computer Networks Frankfurt University of Applied Sciences WS /74 10BASE2 (A Journey into the Past)

33 Prof. Dr. Christian Baun 1st Slide Set Computer Networks Frankfurt University of Applied Sciences WS /74 Ring Network Connects participant to participant All data is transferred from participant to participant until the destination is reached Disruption of a single link = network failure Each participant is also a repeater, which amplifies the signal For that reason, large-sized rings (transmission medium dependent) are possible Maximum ring length for Token Ring: 800 m Examples: Token Ring (logical): 4-16 Mbps Fiber Distributed Data Interface (FDDI): Mbps FDDI implements 2 rings One is a secondary backup, in case the primary ring fails

34 Prof. Dr. Christian Baun 1st Slide Set Computer Networks Frankfurt University of Applied Sciences WS /74 Star Network All participants are connected directly with a central component (Hub or Switch) Outage of the central component leads to an outage of the network itself The central component can be implemented in a redundant way Outage of a participant do not cause an outage of the network itself Advantages: Expandability and stability Examples: Ethernet: 10 Mbps, 100 Mbps, 1 Gbps, 10 Gbps Token Ring (physical): 4-16 Mbps Fibre Channel (storage networks): 2-16 Gbps InfiniBand (cluster): Gbps

35 Prof. Dr. Christian Baun 1st Slide Set Computer Networks Frankfurt University of Applied Sciences WS /74 Media Access Unit Image source: Google Image Search Token Ring demonstrates that the physical and logical topology of a network can be different Token Ring implements a logical ring network Wiring is mostly done equal to a star network Using a Media Access Unit (MAU) is common Each device is connected with just a single cable with the MAU Realizes a star network from a technical point of few Still a ring network from a logical point of view A MAU is a ring in a box If a participant is not connected or does its connection fail, then the MAU bypasses this participant and the ring is still properly functioning

36 Prof. Dr. Christian Baun 1st Slide Set Computer Networks Frankfurt University of Applied Sciences WS /74 Mesh Network Each participant is connected with one or more other participants In a fully connected mesh network, the participants are all connected to each other If participants or connections fail, the communication is typically still possible because the frames are redirected Benefit: Failure safe (depends on the cabling effort) Drawbacks: Cabling effort and energy consumption Furthermore, in not fully connected meshed networks, it is complex to identify the best way from sender to receiver during packet forwarding Examples: Logical topology between Routers Ad-hoc (wireless) networks

37 Prof. Dr. Christian Baun 1st Slide Set Computer Networks Frankfurt University of Applied Sciences WS /74 Tree Network Image source: Google Image Search One or more edges are connected with the root Every edge leads to a leaf node or to the root of another tree Several star topology networks are hierarchically connected Benefits: Failure of a terminal device (leaf node) has no consequences Good expandability and long distances are possible Well suited for searching and sorting algorithms Drawbacks: When a node fails, the complete (sub-)tree behind is no longer accessible In a large tree, the root can be a bottleneck because the communication from one half of the tree to the other half always needs to pass the root Example: Connecting Hubs or Switches via uplink

38 Prof. Dr. Christian Baun 1st Slide Set Computer Networks Frankfurt University of Applied Sciences WS /74 Cellular Network Implemented mainly by wireless networks Cell: Area where the participants can communicate with the base station Advantage: Outage of participants do not affect the network itself Drawback: Maximum dimension is limited by the number of base stations and their positions Examples: Wireless LAN (IEEE ) Global System for Mobile Communications (GSM) Bluetooth hotspots

39 Prof. Dr. Christian Baun 1st Slide Set Computer Networks Frankfurt University of Applied Sciences WS /74 Current Situation Today, Ethernet (1-10 Gbit/s) with Switches (= star topology) is the standard for wired LAN Connecting Hubs and Switches implements a tree topology, if there are no loops in the cabling Cell topology is the standard for wireless networks Mesh topology is one possible use case of wireless networks and it is the logical topology between routers Bus and ring topologies are not longer used for new computer networks 10BASE2 (Thin Ethernet) and 10BASE5 (Thick Ethernet) are outdated May 2004: IBM sells his complete Token Ring product lineup

40 Frequency Image source: Electrical engineering distinguishes between 2 types of voltage: 1 Direct current voltage: Polarity of voltage and voltage level remain constant 2 Alternating current voltage: Polarity of voltage and voltage level change periodically Period: The time it takes for the periodic voltage curve Frequency: Number of oscillations per second The lower the period, the higher is the frequency Fig. A: Rectangular shaped alternating current voltage in theory Fig. B: Sinus shaped alternating current voltage in practice Frequency [Hz] = 1 Period [s] The unit for frequency is the hertz (Hz) 1 Hz means = 1 event (oscillation) per second Example: Alternating current voltage in Europe with 50 Hz Prof. Dr. Christian Baun 1st Slide Set Computer Networks Frankfurt University of Applied Sciences WS /74

41 Prof. Dr. Christian Baun 1st Slide Set Computer Networks Frankfurt University of Applied Sciences WS /74 Data Signal Data exchange takes place through the exchange of binary data Despite the fact that a digital signal is put on the network cable, an analogous signal is sent The signals are subject to physical laws This includes the attenuation (signal weakening) Attenuation causes the weakening of the amplitude of a signal with increasing distance on all transmission media If the amplitude of a data signal has dropped below a certain value, it can no longer be clearly detected Thus, the attenuation limits the maximum bridgeable distance for all transmission media The higher the frequency, the higher is the attenuation

42 Prof. Dr. Christian Baun 1st Slide Set Computer Networks Frankfurt University of Applied Sciences WS /74 Fourier Series Image source: Jörg Rech. Ethernet. Heise According to the fourier series, which is named in honour of Jean Baptiste Joseph Fourier ( ), a square-wave signal (e.g. a binary signal), consists of the sum of a set of oscillating functions A square wave signal consists of a fundamental frequency and harmonics Harmonics are integer multiples of the fundamental frequency They are often referred to as harmonics of the 3rd, 5th, 7th, etc. order The more harmonics are taken into account, the closer to get a perfect square wave

43 Prof. Dr. Christian Baun 1st Slide Set Computer Networks Frankfurt University of Applied Sciences WS /74 Fourier Series and Bandwidth To transmit a square-wave signal clearly, at least the fundamental frequency and the harmonics of the 3rd and 5th order need to be transmitted The harmonics of the 3rd and 5th order are necessary for keeping the square wave its rectangular shape and preventing that it looks rounded Thus, the transmission medium must not only transmit the fundamental frequency bug-free, but also the 3rt and 5th harmonic In practice, the harmonics are more attenuated than the fundamental frequency The bandwidth, from the viewpoint of the transmission medium, is the range of frequencies which can be transmitted via the transmission medium without interferences The attenuation of the signal increases with the frequency

44 Prof. Dr. Christian Baun 1st Slide Set Computer Networks Frankfurt University of Applied Sciences WS /74 Fourier Synthesis of a square-wave Signal Source: Wikipedia The graphs in the first column show the oscillation, which is added in the respective row. The graphs in the second column show all so far recognized oscillations, which are then added to the diagrams of the third column, to reach as close as possible the signal which shall be generated. The more harmonics (multiples of the fundamental frequency) are taken into account, the more we get an ideal square-wave signal. The fourth column shows the amplitude spectrum, normalized to the fundamental frequency

45 Prof. Dr. Christian Baun 1st Slide Set Computer Networks Frankfurt University of Applied Sciences WS /74 Bitrate and Baud Rate Image source: Bitrate: Transferred payload bits per time unit Typically measured as bits per second (bit/s or bps) Baud Rate: Transferred symbols per second Unit of the symbol rate 1 baud means 1 symbol is transferred per second Originally the baud rate described the number of distinct symbol changes (signaling events) when using the telegraph Number of morse characters per second The ratio between bitrate and baud rate depends of the line encoding scheme used The line code... The line code specifies in computer networks the maximum number of signals that can be transmitted via the transmission midia used The line code of a network technology is specified by the layer protocol protocol used More information about line codes provides slide set 3

46 Prof. Dr. Christian Baun 1st Slide Set Computer Networks Frankfurt University of Applied Sciences WS /74 Bandwidth and Latency (1/3) Main factors, influencing the performance of a computer network: Bandwidth (throughput) Latency (delay) The bandwidth specifies how many bits can be transmitted within a period via the network In a network has a bandwidth (throughput) of 1 Mbit/s, one million bits can be transmitted per second Thus, a bit has a width of 1 µs If the bandwidth is doubled, the number of bits that can be transmitted per second doubles too

47 Prof. Dr. Christian Baun 1st Slide Set Computer Networks Frankfurt University of Applied Sciences WS /74 Bandwidth and Latency (2/3) The latency of a network is the time, a message needs to travel from one end of the network to the most distant end Latency = Propagation delay + Transmission delay + Waiting time Propagation delay = Distance Speed of light Velocity factor Distance: Length of the network connection Speed of light: 299, 792, 458 m/s Velocity factor: 1 for vacuum, 0.6 for twisted pair cables, 0.67 for optical fiber and 0.77 for coaxial cables Source: Larry L. Peterson, Bruce S. Davie. Computernetzwerke. dpunkt (2008)

48 Prof. Dr. Christian Baun 1st Slide Set Computer Networks Frankfurt University of Applied Sciences WS /74 Bandwidth and Latency (3/3) Latency = Propagation delay + Transmission delay + Waiting time Transmission delay = Message size Bandwidth Waiting times are caused by network devices (e.g. Switches) They need to cache received data first before forwarding it Transmission delay = 0, if... the message consists only of a single bit Waiting time = 0, if... the network connection between sender and destination is just a single line or a single channel Source: Larry L. Peterson, Bruce S. Davie. Computernetzwerke. dpunkt (2008)

49 Prof. Dr. Christian Baun 1st Slide Set Computer Networks Frankfurt University of Applied Sciences WS /74 Bandwidth-Delay Product Calculates the volume of a network connection Signals cannot be transmitted with infinite speed via the transmission media The propagation speed is in any event limited by the speed of light and it depends on the velocity factor of the transmission medium The product of bandwidth and delay (latency) corresponds to the maximum number of bits that can reside inside the line between sender and receiver Example: A network with 100 Mbit/s bandwidth, and 10 ms latency 100, 000, 000 Bits/s 0.01 s = 1, 000, 000 Bits There are a maximum number of 1, 000, 000 Bits inside the network line This is equivalent to 125, 000 Bytes (approx. 123 kb)

50 Prof. Dr. Christian Baun 1st Slide Set Computer Networks Frankfurt University of Applied Sciences WS /74 Media Access Control When using wired networks, such as Thin Ethernet (10BASE2) or Token Ring, or wireless networks, all participants access a common transmission medium This is called Shared Media A media access control method must ensure, that at any time, only a single participant sends data Only if this condition is satisfied, data can be transmitted error-free For shard media, 2 media access control methods exist: 1 Deterministic media access control 2 Non-deterministic media access control

51 Prof. Dr. Christian Baun 1st Slide Set Computer Networks Frankfurt University of Applied Sciences WS /74 Deterministic Media Access Control Access to the transmission medium is carried out at a certain time in coordination with with the other participants Example: Token passing scheme of Token Ring and FDDI The permission to send is realized via a token The participant who has the token is allowed to send data for a specific (limited!) period of time If a participant finished its sending procedure, he hands over the token to the next participant If a participant does not want to send data, he hands over the token to the next participant immediately No participant is skipped = fair media access control method It is guaranteed that each participant after a specific waiting period with a foreseeable maximum duration is allowed to transmit data

52 Prof. Dr. Christian Baun 1st Slide Set Computer Networks Frankfurt University of Applied Sciences WS /74 Non-deterministic Media Access Control All participants are in terms of access to the transmission medium in direct competition with each other Example: CSMA/CD when using Thin Ethernet (10BASE2) If a participant wants to transmit data, it previously checks if the transmission medium is idle If it is idle, the participant starts to send data If 2 participants transmit data at the same time, both assume the transmission medium is idle = a collision occurs By using CSMA/CD, collisions are detected by all participants If a collision is detected, the sender stop their sending procedures After a random waiting period, the participants try again to send Impossible to predict, are... the waiting period, before the transmission medium can be accessed the amount of data, that can be transferred the probability of collisions CSMA/CD is part of the slide sets that cover the data link layer

53 Prof. Dr. Christian Baun 1st Slide Set Computer Networks Frankfurt University of Applied Sciences WS /74 Collision Domain When multiple network devices share a transmission medium and try to transmit data at the same time, unwanted collisions occur The area in which collisions can expand is called collision domain It is a network, or a part of a network, where multiple network devices share a transmission medium Repeaters and Hubs increase the collision domain Bridges, Switches and Routers divide the collision domain For collision detection, the wired network standard Ethernet uses the media access control method CSMA/CD For wireless networks, a reliable collision detection is impossible For this reason, WLAN uses for collision avoidance the media access control method CSMA/CA

54 Prof. Dr. Christian Baun 1st Slide Set Computer Networks Frankfurt University of Applied Sciences WS /74 Polybius Square (2nd Century BC) The search for efficient forms of communication is not a modern challenge Example: The signaling method of Polybius The 24 letters of the Greek alphabet are placed in a 5x5 matrix The encoding results from the coordinates of the letters in the matrix α β γ δ ɛ 2 ζ η θ ι κ 3 λ µ ν ξ o 4 π ρ σ τ υ 5 φ χ ψ ω Torches are used for the optical transmission of encoded messages In the most simple case, the sender holds up in one hand the torches to announce the line number (y-coordinate) and in his other hand the torches to indicate the column number (x-coordinate)

55 Prof. Dr. Christian Baun 1st Slide Set Computer Networks Frankfurt University of Applied Sciences WS /74 Polybius Square Torches of Polybius Proceeding In order to improve the communication, several strategies exist Potential way to establish the connection: The sender raises 2 torches to transmit his intention for transmission The receiver raises 2 torches to signal readiness to receive Lowering the torches on both sides closes the connection establishment Potential way to transmit data: The sender raises torches to announce the line number The sender lowers the torches The sender raises torches to announce the column number The sender lowers the torches These strategies to establish connections and to transmit data are examples for protocols

56 Prof. Dr. Christian Baun 1st Slide Set Computer Networks Frankfurt University of Applied Sciences WS /74 Protocols A protocol is the set of all previously made agreements between communication partners These agreements include: Rules for connection establishment and clearing Method of synchronization between sender and receiver Measures for the detection and treatment of transmission errors Definition of valid messages (vocabulary) Format and encoding of messages Protocols specify... the syntax (= format of valid messages) the semantics (= vocabulary and meaning of valid messages)

57 Prof. Dr. Christian Baun 1st Slide Set Computer Networks Frankfurt University of Applied Sciences WS /74 Reference Models Communication in computer networks is subdivided into reference models Each layer of a reference model handles a particular aspect of communication and offers interfaces to the overlying layer and underlying layer Each interface consists of a set of operations, which together define a service In the layers, the data is encapsulated (= encapsulation) Because each layer is complete in itself, single protocols can be modified or replaced without affecting all aspects of communication The most popular reference models are the TCP/IP reference model, the OSI reference model and the hybrid reference model

58 Prof. Dr. Christian Baun 1st Slide Set Computer Networks Frankfurt University of Applied Sciences WS /74 TCP/IP Reference Model or DoD Model Developed from 1970 onwards by the Department of Defense (DoD) in the Arpanet project Divides the required functionality to realize communication into 4 layers For each layer, it is specified, what functionality it has to provide These requirements are implemented by communication protocols Concrete implementation is not specified and can be realized in different ways Therefore, for each of the 4 layers, multiple protocols exist Nummber Layer Protocols (Examples) 4 Application Layer HTTP, FTP, SMTP, POP3, DNS, SSH, Telnet 3 Transport Layer TCP, UDP 2 Internet Layer IP (IPv4, IPv6), ICMP, IPsec, IPX 1 Link Layer Ethernet, WLAN, ATM, FDDI, PPP, Token Ring

59 Prof. Dr. Christian Baun 1st Slide Set Computer Networks Frankfurt University of Applied Sciences WS /74 TCP/IP Reference Model Message Structure Each layer adds additional information as header to the message Some protocols (e.g. Ethernet) add in the link layer not only a header but also a trailer at the end of the message The receiver analyzes the header (and trailer) on the same layer

60 Prof. Dr. Christian Baun 1st Slide Set Computer Networks Frankfurt University of Applied Sciences WS /74 Hybrid Reference Model The TCP/IP reference model is represented frequently in the literature (e.g. by Andrew S. Tanenbaum) as a 5-layer model Reason: It makes sense to split the link layer into 2 layers, because they cover completely different responsibilities This model is an extension of the TCP/IP model and is called hybrid reference model The objects of the individual layers will be discussed on the basis of the hybrid reference model

61 Prof. Dr. Christian Baun 1st Slide Set Computer Networks Frankfurt University of Applied Sciences WS /74 Physical Layer Transmits the ones and zeros Physical connection to the network Conversion of data in signals Protocol and transmission medium specify among others: How many bits can be transmitted per second? Can transmission take place simultaneously in both directions? Devices: Repeater, Hub (Multiport Repeater), Modem

62 Prof. Dr. Christian Baun 1st Slide Set Computer Networks Frankfurt University of Applied Sciences WS /74 Data Link Layer Ensures error-free data exchange of frames between devices in physical networks Detects transmission errors with checksums Controls the access to the transmission medium (e.g. via CSMA/CD or CSMA/CA) Bridges and Layer-2-Switches (multiport Bridges) connect physical networks Specifies physical network addresses (MAC addresses) At sender site: Packs the Network Layer packets into frames and transmits them with the desired reliability via a physical network from one device to another At receiver site: Identifies frames in the bit stream from the Physical Layer

63 Prof. Dr. Christian Baun 1st Slide Set Computer Networks Frankfurt University of Applied Sciences WS /74 Network Layer Forwards (routes) packets between logical networks (over physical networks) For this internetworking, the network layer defines logical addresses (IP address) Each IP packet is routet independently to its destination and the path is not recorded At sender site: Packs the segments of the Transport Layer in packets At receiver site: Unpacks the packets in the frames from the Data Link Layer Router and Layer-3-Switches connect logical networks Usually the connectionless Internet Protocol (IP) is used Other protocols (e.g. IPX) have been replaced by IP

64 Prof. Dr. Christian Baun 1st Slide Set Computer Networks Frankfurt University of Applied Sciences WS /74 Transport Layer Transports segments between processes on different devices via so-called end-to-end protocols At sender site: Packs the data of the Application Layer into segments At receiver site: Unpacks the segments in the packets from the network link layer Addresses processes with port numbers Data Link Layer and Network Layer implement physical and logical addressing of the network devices Different transport protocols implement different ways to communicate UDP (User Datagram Protocol): Connectionless communication TCP (Transport Control Protocol): Connection-oriented communication Combination of TCP/IP = de facto standard for computer networks

65 Prof. Dr. Christian Baun 1st Slide Set Computer Networks Frankfurt University of Applied Sciences WS /74 Different Forms of Communication Connectionless communication Analogous to a mailbox Sender transmits messages without prior connection establishment Disadvantage: No validation that a segment arrives at the destination If validation is wanted, it must be implemented in the Application Layer Benefit: Better throughput, because of lesser overhead Connection-oriented communication Analogous to a telephone Prior data exchange, a connection is established between sender and receiver The connection is not terminated, even if no data is transmitted After all data is exchanged, the connection becomes terminated Implements flow control and congestion control Ensures lossless segment delivery in the correct order = Successful delivery is guaranteed

66 Prof. Dr. Christian Baun 1st Slide Set Computer Networks Frankfurt University of Applied Sciences WS /74 Application Layer Contains all protocols that work together with the application programs (e.g. browser or program) Here are the messages (e.g. HTML pages or s), formated according to the used application protocol Some Application Layer protocols: HTTP, FTP, SMTP, POP3, DNS, SSH, Telnet

67 Prof. Dr. Christian Baun 1st Slide Set Computer Networks Frankfurt University of Applied Sciences WS /74 How Communication works (1/2) Vertical communication Messages are packed from top to bottom layer by layer and extracted at the receiver in the reverse layer sequence Data encapsulation and de-encapsulation

68 Prof. Dr. Christian Baun 1st Slide Set Computer Networks Frankfurt University of Applied Sciences WS /74 How Communication works (2/2) Horizontal communication Equal protocol functions are used in the equivalent layers by sender and receiver

69 Prof. Dr. Christian Baun 1st Slide Set Computer Networks Frankfurt University of Applied Sciences WS /74 OSI Reference Model Some years after the TCP/IP reference model (1970s), the OSI reference model was developed from 1979 onwards 1983: Standardized by the Intern. Organization for Standardization (ISO) OSI = Open Systems Interconnection The structure is similar to the TCP/IP reference model The OSI model implements 7 layers In contrast to the hybrid reference model, the Application Layer functionality is distributed across 3 layers in the OSI reference model

70 Prof. Dr. Christian Baun 1st Slide Set Computer Networks Frankfurt University of Applied Sciences WS /74 Session Layer (1/2) Tasks: Establishment, monitoring and termination of sessions A session is the basis for a virtual connection between 2 applications, running on physically independent computers Controls the dialogues (connections) between processes Controls which participant is allowed to send next Provides checkpointing which is useful for longer data transmissions to enable synchronization If the connection fails, returning to a checkpoint avoids starting the transmission from the beginning

71 Prof. Dr. Christian Baun 1st Slide Set Computer Networks Frankfurt University of Applied Sciences WS /74 Session Layer (2/2) Protocols that meet the required capabilities of the Session Layer are Telnet for remote controlling computers and FTP for files transmission These protocols can be assigned to the Application Layer too The Application Layer includes the protocols, used by the users applications FTP and Telnet are used directly by the relevant programs and not by abstract protocols of upper levels Thus, it makes sense to assign these Session Layer protocols to the Application Layer The Session Layer is seldom used in practice, because all tasks intended to this layer are fulfilled by Application Layer protocols today

72 Prof. Dr. Christian Baun 1st Slide Set Computer Networks Frankfurt University of Applied Sciences WS /74 Presentation Layer Contains rules for changing the format (presentation) of messages The sender can notify the receiver that a message has a specific format (e.g. ASCII) to make a perhaps necessary conversion possible Data records can be defined here with fields (e.g. name, student ID number... ) Data types and their length can be defined here Compression and encryption could be covered by this layer The Presentation Layer is seldom used in practice, because all tasks intended to this layer are fulfilled by Application Layer protocols today

73 Prof. Dr. Christian Baun 1st Slide Set Computer Networks Frankfurt University of Applied Sciences WS /74 Reference Models Summary (1/2) The TCP/IP reference model specifies the functions of the layers but how they are implemented The OSI reference model distributes the tasks of the... Link Layer between Physical Layer and Data Link Layer This is useful, because the objectives of Physical Layer and Data Link Layer differ a lot Application Layer between Session, Presentation and Application Layer This is not useful and does not take place in practice Functionalities, which are intended for Session Layer and Presentation Layer, are provided by Application Layer protocols and services

74 Prof. Dr. Christian Baun 1st Slide Set Computer Networks Frankfurt University of Applied Sciences WS /74 Reference Models Summary (2/2) Conclusion: The hybrid reference model illustrates the functioning of computer networks in a realistic way It distinguishes between the Physical Layer and Data Link Layer It does not subdivide the Application Layer It combines the advantages of the TCP/IP reference model and the OSI reference model, without taking over their drawbacks

6th Slide Set Computer Networks

6th Slide Set Computer Networks Prof. Dr. Christian Baun 6th Slide Set Computer Networks Frankfurt University of Applied Sciences WS1718 1/36 6th Slide Set Computer Networks Prof. Dr. Christian Baun Frankfurt University of Applied Sciences

More information

Solution of Exercise Sheet 1

Solution of Exercise Sheet 1 Solution of Exercise Sheet 1 Exercise 1 (Data Rate and Latency) The Prussian semaphore system (dt. Preußischer optischer Telegraf ) was a telegraphic communications system used between Berlin and Koblenz

More information

COMPONENTS OF DATA COMMUNICATION

COMPONENTS OF DATA COMMUNICATION COMPONENTS OF DATA COMMUNICATION ANALOG AND DIGITAL TRANSMISSION An analog signal is one that is continuous with respect to time and may take on any value within a given range of values. Eg Human voice.

More information

Data Communication. Introduction of Communication. Data Communication. Elements of Data Communication (Communication Model)

Data Communication. Introduction of Communication. Data Communication. Elements of Data Communication (Communication Model) Data Communication Introduction of Communication The need to communicate is part of man s inherent being. Since the beginning of time the human race has communicated using different techniques and methods.

More information

IT4405 Computer Networks (Compulsory)

IT4405 Computer Networks (Compulsory) IT4405 Computer Networks (Compulsory) INTRODUCTION This course provides a comprehensive insight into the fundamental concepts in data communications, computer network systems and protocols both fixed and

More information

Digital Communication Networks

Digital Communication Networks Digital Communication Networks MIT PROFESSIONAL INSTITUTE, 6.20s July 25-29, 2005 Professor Muriel Medard, MIT Professor, MIT Slide 1 Digital Communication Networks Introduction Slide 2 Course syllabus

More information

IT 4504 Section 4.0. Network Architectures. 2008, University of Colombo School of Computing 1

IT 4504 Section 4.0. Network Architectures. 2008, University of Colombo School of Computing 1 IT 4504 Section 4.0 Network Architectures 2008, University of Colombo School of Computing 1 Section 4.1 Introduction to Computer Networks 2008, University of Colombo School of Computing 2 Introduction

More information

4th Slide Set Computer Networks

4th Slide Set Computer Networks Prof. Dr. Christian Baun 4th Slide Set Computer Networks Frankfurt University of Applied Sciences WS1718 1/29 4th Slide Set Computer Networks Prof. Dr. Christian Baun Frankfurt University of Applied Sciences

More information

Cisco Cisco Certified Network Associate (CCNA)

Cisco Cisco Certified Network Associate (CCNA) Cisco 200-125 Cisco Certified Network Associate (CCNA) http://killexams.com/pass4sure/exam-detail/200-125 Question: 769 Refer to exhibit: Which destination addresses will be used by Host A to send data

More information

2. A collection of interconnected networks is called an internetwork. 3. Each machine is connected to a central hub with a point-to-point connection.

2. A collection of interconnected networks is called an internetwork. 3. Each machine is connected to a central hub with a point-to-point connection. نموذج أسئلة اختبار النهائي عام 2017 الفصل الدراسي الثاني لمقرر شبكات الحاسب CHOSE 1. channel spectrum divided into frequency bands "FDMA" 2. A collection of interconnected networks is called an internetwork

More information

Layering in Networked computing. OSI Model TCP/IP Model Protocols at each layer

Layering in Networked computing. OSI Model TCP/IP Model Protocols at each layer Layering in Networked computing OSI Model TCP/IP Model Protocols at each layer Learning outcomes Understand the need of layering in Networked computing Understand the OSI model and the tcp/ip model Understand

More information

Fundamentals of Networking Introduction to Networking Devices

Fundamentals of Networking Introduction to Networking Devices Fundamentals of Networking Introduction to Networking Devices Kuldeep Sonar 1 NIC (Network Interface Card) A network interface provides connectivity from an end-user PC or laptop to the public network.

More information

Basics of datacommunication

Basics of datacommunication Data communication I Lecture 1 Course Introduction About the course Basics of datacommunication How is information transported between digital devices? Essential data communication protocols Insight into

More information

Data Networks. Lecture 1: Introduction. September 4, 2008

Data Networks. Lecture 1: Introduction. September 4, 2008 Data Networks Lecture 1: Introduction September 4, 2008 Slide 1 Learning Objectives Fundamental aspects of network Design and Analysis: Architecture: layering, topology design, switching mechanisms Protocols:

More information

M242 COMPUTER NETWORS AND SECURITY

M242 COMPUTER NETWORS AND SECURITY M242 COMPUTER NETWORS AND SECURITY 2.1. Network Models: UNIT - II OSI MODEL AND LAN PROTOCOLS 1. Explain Network model A network is a combination of hardware and software that sends data from one location

More information

Networking Applications

Networking Applications Networking Dr. Ayman A. Abdel-Hamid College of Computing and Information Technology Arab Academy for Science & Technology and Maritime Transport 1 Outline Internet Layers Internet Data Packet transmission

More information

5th Slide Set Computer Networks

5th Slide Set Computer Networks Prof. Dr. Christian Baun 5th Slide Set Computer Networks Frankfurt University of Applied Sciences WS1718 1/38 5th Slide Set Computer Networks Prof. Dr. Christian Baun Frankfurt University of Applied Sciences

More information

Computer Network : Lecture Notes Nepal Engineering College Compiled by: Junior Professor: Daya Ram Budhathoki Nepal Engineering college, Changunarayan

Computer Network : Lecture Notes Nepal Engineering College Compiled by: Junior Professor: Daya Ram Budhathoki Nepal Engineering college, Changunarayan Computer Network : Lecture Notes Nepal Engineering College Compiled by: Junior Professor: Daya Ram Budhathoki Nepal Engineering college, Changunarayan Chapter3: OSI Reference Model: Network Software: Network

More information

Defining Networks with the OSI Model. Module 2

Defining Networks with the OSI Model. Module 2 Defining Networks with the OSI Model Module 2 Objectives Skills Concepts Objective Domain Description Objective Domain Number Understanding OSI Basics Defining the Communications Subnetwork Defining the

More information

1: Review Of Semester Provide an overview of encapsulation.

1: Review Of Semester Provide an overview of encapsulation. 1: Review Of Semester 1 1.1.1.1. Provide an overview of encapsulation. Networking evolves to support current and future applications. By dividing and organizing the networking tasks into separate layers/functions,

More information

Lesson 1: Network Communications

Lesson 1: Network Communications Lesson 1: Network Communications This lesson introduces the basic building blocks of network communications and some of the structures used to construct data networks. There are many different kinds of

More information

FINAL EXAM REVIEW PLEASE NOTE THE MATERIAL FROM LECTURE #16 at the end. Exam 1 Review Material

FINAL EXAM REVIEW PLEASE NOTE THE MATERIAL FROM LECTURE #16 at the end. Exam 1 Review Material FINAL EXAM REVIEW PLEASE NOTE THE MATERIAL FROM LECTURE #16 at the end Chapters in the book 1, 2, 3, 5, 6 Exam 1 Review Material Topics You are also responsible for the reading in the chapters understanding

More information

ET4254 Communications and Networking 1

ET4254 Communications and Networking 1 Topic 2 Aims:- Communications System Model and Concepts Protocols and Architecture Analog and Digital Signal Concepts Frequency Spectrum and Bandwidth 1 A Communications Model 2 Communications Tasks Transmission

More information

Introduction to Network Technologies & Layered Architecture BUPT/QMUL

Introduction to Network Technologies & Layered Architecture BUPT/QMUL Introduction to Network Technologies & Layered Architecture BUPT/QMUL 2015-3-5 Review What is the Internet? How does it work? When & how did it come about? Who controls it? Where is it going? 2 Agenda

More information

CHAPTER -1. Introduction to Computer Networks

CHAPTER -1. Introduction to Computer Networks CHAPTER -1 Introduction to Computer Networks PRELIMINARY DEFINITIONS computer network :: [Tanenbaum] a collection of autonomous computers interconnected by a single technology. communications network ::a

More information

Communicating over the Network

Communicating over the Network Communicating over the Network Network Fundamentals Chapter 2 Version 4.0 1 Network Structure The elements of communication 3 common elements of communication Message source people/electronic devices need

More information

Module 1. Introduction. Version 2, CSE IIT, Kharagpur

Module 1. Introduction. Version 2, CSE IIT, Kharagpur Module 1 Introduction Version 2, CSE IIT, Kharagpur Introduction In this module we shall highlight some of the basic aspects of computer networks in two lessons. In lesson 1.1 we shall start with the historical

More information

INTRODUCTION TO ICT.

INTRODUCTION TO ICT. INTRODUCTION TO ICT. (Introducing Basic Network Concepts) Lecture # 24-25 By: M.Nadeem Akhtar. Department of CS & IT. URL: https://sites.google.com/site/nadeemcsuoliict/home/lectures 1 INTRODUCTION TO

More information

SRM ARTS AND SCIENCE COLLEGE SRM NAGAR, KATTANKULATHUR

SRM ARTS AND SCIENCE COLLEGE SRM NAGAR, KATTANKULATHUR SRM ARTS AND SCIENCE COLLEGE SRM NAGAR, KATTANKULATHUR 603203 DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONS QUESTION BANK (2017-2018) Course / Branch : BCA Semester /Year : EVEN / III Subject Name : Data

More information

Objectives. Learn how computers are connected. Become familiar with different types of transmission media

Objectives. Learn how computers are connected. Become familiar with different types of transmission media Objectives Learn how computers are connected Become familiar with different types of transmission media Learn the differences between guided and unguided media Learn how protocols enable networking 2 Objectives

More information

Chapter 16 Networking

Chapter 16 Networking Chapter 16 Networking Outline 16.1 Introduction 16.2 Network Topology 16.3 Network Types 16.4 TCP/IP Protocol Stack 16.5 Application Layer 16.5.1 Hypertext Transfer Protocol (HTTP) 16.5.2 File Transfer

More information

Communication Networks - 3 general areas: data communications, networking, protocols

Communication Networks - 3 general areas: data communications, networking, protocols Communication Networks - Overview CSE 3213 Fall 2011 1 7 September 2011 Course Content 3 general areas: data communications, networking, protocols 1. Data communications: basic concepts of digital communications

More information

L1: Introduction. Hui Chen, Ph.D. Dept. of Engineering & Computer Science Virginia State University Petersburg, VA 23806

L1: Introduction. Hui Chen, Ph.D. Dept. of Engineering & Computer Science Virginia State University Petersburg, VA 23806 L1: Introduction Hui Chen, Ph.D. Dept. of Engineering & Computer Science Virginia State University Petersburg, VA 23806 8/15/2016 CSCI 445 Fall 2016 1 Acknowledgements Some pictures used in this presentation

More information

TCOM 370 NOTES 99-1 NETWORKING AND COMMUNICATIONS

TCOM 370 NOTES 99-1 NETWORKING AND COMMUNICATIONS TCOM 370 NOTES 99-1 NETWORKING AND COMMUNICATIONS Communication Networks Allow Exchange of Information between Users telephone network for voice communication interconnected computers and peripherals,

More information

The OSI Model. Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO).

The OSI Model. Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Network Models The OSI Model Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Model for understanding and developing computer-to-computer communication

More information

Test Bank for A Guide to Designing and Implementing Local And Wide Area Networks 2nd Edition by Palmer and Sinclair

Test Bank for A Guide to Designing and Implementing Local And Wide Area Networks 2nd Edition by Palmer and Sinclair Test Bank for A Guide to Designing and Implementing Local And Wide Area Networks 2nd Edition by Palmer and Sinclair Link download full: https://testbankservice.com/download/test-bank-for-aguide-to-designing-and-implementing-local-and-wide-area-networks-2ndedition-by-palmer-and-sinclair/

More information

Data Communication. Introduction

Data Communication. Introduction Data Communication Introduction Course Information Assistant Instructor Reza Hassanpour Faris Serdar Taşel Office: L214 Office: L205 Phone: 2331338 Phone: 2331357 Email: reza@cankaya.edu.tr Email: fst@cankaya.edu.tr

More information

Introductions. Computer Networking Lecture 01. January 16, HKU SPACE Community College. HKU SPACE CC CN Lecture 01 1/36

Introductions. Computer Networking Lecture 01. January 16, HKU SPACE Community College. HKU SPACE CC CN Lecture 01 1/36 Introductions Computer Networking Lecture 01 HKU SPACE Community College January 16, 2012 HKU SPACE CC CN Lecture 01 1/36 Outline What is a Computer Network? Basic Requirements of Building a Computer Network

More information

Data Communication. Chapter # 1: Introduction. By: William Stalling

Data Communication. Chapter # 1: Introduction. By: William Stalling Data Communication Chapter # 1: By: Introduction William Stalling Data Communication The exchange of data between two devices via some form of transmission medium such as cable wire. For data communications

More information

Operating Systems. 16. Networking. Paul Krzyzanowski. Rutgers University. Spring /6/ Paul Krzyzanowski

Operating Systems. 16. Networking. Paul Krzyzanowski. Rutgers University. Spring /6/ Paul Krzyzanowski Operating Systems 16. Networking Paul Krzyzanowski Rutgers University Spring 2015 1 Local Area Network (LAN) LAN = communications network Small area (building, set of buildings) Same, sometimes shared,

More information

OSI Model. Teran Subasinghe MBCS, Bsc.(Hons) in Computer Science - University of Greenwich, UK

OSI Model. Teran Subasinghe MBCS, Bsc.(Hons) in Computer Science - University of Greenwich, UK OSI Model Teran Subasinghe MBCS, Bsc.(Hons) in Computer Science - University of Greenwich, UK What is OSI Model? Open Systems Interconnection Reference Model Developed in 1984 by the International Standards

More information

BABU MADHAV INSTITUTE OF INFORMATION TECHNOLOGY, UTU 2017

BABU MADHAV INSTITUTE OF INFORMATION TECHNOLOGY, UTU 2017 5 years Integrated M.Sc (IT) Semester 3 Question Bank 060010310 DSE4 Computer Networks Unit 1 Introduction Short Questions 1. State the term data with respect to computer network. 2. What is data communication?

More information

Data and Computer Communications. Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications

Data and Computer Communications. Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications Data and Computer Communications Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based s 1 Need For Protocol Architecture data exchange can involve complex procedures better if task broken into subtasks

More information

Prepared by Agha Mohammad Haidari Network Manager ICT Directorate Ministry of Communication & IT

Prepared by Agha Mohammad Haidari Network Manager ICT Directorate Ministry of Communication & IT Network Basics Prepared by Agha Mohammad Haidari Network Manager ICT Directorate Ministry of Communication & IT E-mail :Agha.m@mcit.gov.af Cell:0700148122 After this lesson,you will be able to : Define

More information

Chapter 6: DataLink Layer - Ethernet Olivier Bonaventure (2010)

Chapter 6: DataLink Layer - Ethernet Olivier Bonaventure (2010) Chapter 6: DataLink Layer - Ethernet Olivier Bonaventure (2010) 6.3.2. Ethernet Ethernet was designed in the 1970s at the Palo Alto Research Center [Metcalfe1976]. The first prototype [5] used a coaxial

More information

6 Computer Networks 6.1. Foundations of Computer Science Cengage Learning

6 Computer Networks 6.1. Foundations of Computer Science Cengage Learning 6 Computer Networks 6.1 Foundations of Computer Science Cengage Learning Objectives After studying this chapter, the student should be able to: 6.2 Describe network criteria, physical structures and categories

More information

Lecture Outline. Lecture 2. OSI model and networking. The OSI model and networking. The OSI model and networking. The OSI model and networking

Lecture Outline. Lecture 2. OSI model and networking. The OSI model and networking. The OSI model and networking. The OSI model and networking Lecture 2 The OSI model Chapter 2, specifically pages 42-58 Dave Novak School of Business Administration, University of Vermont Sources: 1) Network+ Guide to Networks, Dean 2013 2) Comer, Computer Networks

More information

IT 2004 Data Communication & Networking

IT 2004 Data Communication & Networking IT 2004 Data Communication & Networking Week 4 Network Topology, Architecture & Access Methods P.G.R Nayomi Gamlath MSc(Pdn), BSc (Rajarata) ATI -Kurunegala Why networks? To share resources (such as printer,

More information

Data Communication and Network. Introducing Networks

Data Communication and Network. Introducing Networks Data Communication and Network Introducing Networks Introduction to Networking Computer network, or simply network Refers to the connection of two or more computers by some type of medium You can connect

More information

Chapter 4: Network Access

Chapter 4: Network Access 4.0.1.1 Chapter 4: Network Access To support our communication, the OSI model divides the functions of a data network into layers. Each layer works with the layers above and below to transmit data. 4.0.1.2

More information

ก ก Information Technology II

ก ก Information Technology II ก ก 202103 Information Technology II ก ก ก ก ก (LAN), ก LAN, ก ก (LAN) ก ก ก LAN ก LAN ก LAN Topology Bus LAN Star LAN Ring LAN Wireless LAN Wireless LAN Wireless ก (LAN) ก ก ก LAN ก LAN WAN ก Random Access

More information

Computer Networks

Computer Networks 15-441 Computer s Lecture 3 Professor Hui Zhang Wean Hall 7126 hzhang@cs.cmu.edu 1 Review of Lecture 1 How long does it take to move 1GB data from campus to your home? 56Kbps modem 2Mbps DSL Other possibilities?

More information

Chapter 12. Network Organization and Architecture

Chapter 12. Network Organization and Architecture Chapter 12 Network Organization and Architecture Chapter 12 Objectives Learn the basic physical components of networks. Become familiar with routing protocols. 2 Computer networks are often classified

More information

It is the process of sharing data, programs, and information between two or more computers.

It is the process of sharing data, programs, and information between two or more computers. 1 Communications It is the process of sharing data, programs, and information between two or more computers. Numerous applications depend on communication systems: E-mail Instant messaging (IM) Internet

More information

Special expressions, phrases, abbreviations and terms of Computer Networks

Special expressions, phrases, abbreviations and terms of Computer Networks access access point adapter Adderssing Realm ADSL (Asymmetrical Digital Subscriber Line) algorithm amplify amplitude analog antenna application architecture ARP (Address Resolution Protocol) AS (Autonomous

More information

Typical Network Uses

Typical Network Uses Computer Networks Introduction The next Great Revolution - Computer Networks- computers connected together for exchanging information Our information-oriented society - applications in education, commerce,

More information

COS 140: Foundations of Computer Science

COS 140: Foundations of Computer Science COS 140: Foundations of C Networks Fall 2017 Copyright c 2002 2017 UMaine School of Computing and Information S 1 / 21 Homework, announcements New chapter (23) online No homework assigned today, sorry!

More information

VISUAL SUMMARY COMMUNICATION CHANNELS COMMUNICATIONS. Communications and Networks

VISUAL SUMMARY COMMUNICATION CHANNELS COMMUNICATIONS. Communications and Networks Rev.Confirming Pages VISUAL SUMMARY Communications and Networks COMMUNICATIONS COMMUNICATION CHANNELS Communications is the process of sharing data, programs, and information between two or more computers.

More information

Internetworking is connecting two or more computer networks with some sort of routing device to exchange traffic back and forth, and guide traffic on

Internetworking is connecting two or more computer networks with some sort of routing device to exchange traffic back and forth, and guide traffic on CBCN4103 Internetworking is connecting two or more computer networks with some sort of routing device to exchange traffic back and forth, and guide traffic on the correct path across the complete network

More information

Chapter 2 Communicating Over the Network

Chapter 2 Communicating Over the Network Chapter 2 Communicating Over the Network Elements of Communication Communicating the Messages Continuous stream of bits 00101010100101010101010101010101010 I have to wait Single communications (e.g. video,

More information

Review For Exam 2. Internetworking. Summary Questions. School of Business Eastern Illinois University. School of Business Eastern Illinois University

Review For Exam 2. Internetworking. Summary Questions. School of Business Eastern Illinois University. School of Business Eastern Illinois University School of Business Review For Exam 2 Wednesday 10/6/2004) Abdou Illia, Fall 2004 School of Business Internetworking 3 1. Name the two most known Medium Access Control Protocols found in LANs. How they

More information

Computer Networks Wolfgang Effelsberg

Computer Networks Wolfgang Effelsberg Computer Networks SS 2004 Prof. Dr. Wolfgang Effelsberg Lehrstuhl für Praktische Informatik IV Universität Mannheim 1. Introduction 1-1 Contents (1) 1. Introduction 1.1 Definition of a Computer Network

More information

Module 2 Overview of Computer Networks

Module 2 Overview of Computer Networks Module 2 Overview of Computer Networks Networks and Communication Give me names of all employees Who earn more than $00,000 ISP intranet backbone satellite link desktop computer: server: network link:

More information

Module 2 Overview of. Computer Networks

Module 2 Overview of. Computer Networks Module Overview of Networks and Communication Give me names of all employees Who earn more than $00,000 ISP intranet backbone satellite link desktop computer: server: network link: CS454/654 - Issues How

More information

Guide to Networking Essentials, 6 th Edition. Chapter 6: Network Reference Models and Standards

Guide to Networking Essentials, 6 th Edition. Chapter 6: Network Reference Models and Standards Guide to Networking Essentials, 6 th Edition Chapter 6: Network Reference Models and Standards Objectives Explain the OSI reference model layers and their relationship to hardware and software Explain

More information

TYPES OF COMPUTER NETWORKS

TYPES OF COMPUTER NETWORKS TYPES OF COMPUTER NETWORKS What is a Network? A network consists of two or more computers that are linked in order to share resources (such as printers and CDs), exchange files, or allow electronic communications.

More information

What is the fundamental purpose of a communication system? Discuss the communication model s elements.

What is the fundamental purpose of a communication system? Discuss the communication model s elements. What is the fundamental purpose of a communication system? The fundamental purpose of a communication system is the exchange of data between two parties. Discuss the communication model s elements. The

More information

Data & Computer Communication

Data & Computer Communication Basic Networking Concepts A network is a system of computers and other devices (such as printers and modems) that are connected in such a way that they can exchange data. A bridge is a device that connects

More information

CS610- Computer Network Solved Subjective From Midterm Papers

CS610- Computer Network Solved Subjective From Midterm Papers Solved Subjective From Midterm Papers May 08,2012 MC100401285 Moaaz.pk@gmail.com Mc100401285@gmail.com PSMD01 CS610- Computer Network Midterm Examination - Fall 2011 1. Where are destination and source

More information

Computer Networking. Chapter #1. Dr. Abdulrhaman Alameer

Computer Networking. Chapter #1. Dr. Abdulrhaman Alameer Computer Networking Chapter #1 Dr. Abdulrhaman Alameer What is Computer Network? It is a collection of computers and devices interconnected by communications channels that facilitate communications among

More information

Area Covered is small Area covered is large. Data transfer rate is high Data transfer rate is low

Area Covered is small Area covered is large. Data transfer rate is high Data transfer rate is low Chapter 15 Networking Concepts 1. Define networking. It is the interconnection of independent computing devices for sharing of information over shared medium. 2. What is the need for networking? / What

More information

Network Models. Behrouz A. Forouzan Data communication and Networking Fourth edition

Network Models. Behrouz A. Forouzan Data communication and Networking Fourth edition Chapter 2 Network Models Behrouz A. Forouzan Data communication and Networking Fourth edition 1 Layered Tasks We use the concept of layers in our daily life. As an example, let us consider two friends

More information

Chapter 9 Introduction to Networks

Chapter 9 Introduction to Networks Chapter 9 Introduction to Networks 9.1 Uses of a network Networks are used in many situations. We can see networks in places like offices, airports and factories. In fact we use networks in many situations

More information

Link Layer and Ethernet

Link Layer and Ethernet Link Layer and Ethernet 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross traceroute Data Link Layer Multiple

More information

ITP 140 Mobile Applications Technologies. Networks

ITP 140 Mobile Applications Technologies. Networks ITP 140 Mobile Applications Technologies Networks A First Look Under the Hood 2 3 Communication Channels Mediums for transporting data from one system to another Physical Twisted Pair (CAT-3, CAT-5/6)

More information

Operating Systems CS 571

Operating Systems CS 571 Computer Networks: Overview Operating Systems CS 571 Network types Range Bandwidth (Mbps) Latency (ms) LAN 1-2 kms 10-1000 1-10 WAN worldwide 0.010-600 100-500 MAN 2-50 kms 1-150 10 Wireless LAN 0.15-1.5

More information

Introduction to Information Science and Technology 2017 Networking I. Sören Schwertfeger 师泽仁

Introduction to Information Science and Technology 2017 Networking I. Sören Schwertfeger 师泽仁 I Sören Schwertfeger 师泽仁 Outline Internet History of the Internet Internet Structure Internet Protocols Network layer details 1. Physical Layer 2. Data Link Layer 3. Network Layer Internet: Huge network

More information

CS321: Computer Networks Introduction to Computer Networks and Internet

CS321: Computer Networks Introduction to Computer Networks and Internet CS321: Computer Networks Introduction to Computer Networks and Internet Dr. Manas Khatua Assistant Professor Dept. of CSE IIT Jodhpur E-mail: manaskhatua@iitj.ac.in What is Data Communication? Data communications

More information

Networking. Networking and Communication Trends Convergence (Accessibility) Speed Stability Simplicity* Embeddedness

Networking. Networking and Communication Trends Convergence (Accessibility) Speed Stability Simplicity* Embeddedness Networking and Communication Trends Convergence (Accessibility) Speed Stability Simplicity* Embeddedness What is a Computer Network General definition Related hardware Network Interface Card Network Operating

More information

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018 CS 43: Computer Networks 27: Media Access Contd. December 3, 2018 Last Class The link layer provides lots of functionality: addressing, framing, media access, error checking could be used independently

More information

Computer Networks (Introduction to TCP/IP Protocols)

Computer Networks (Introduction to TCP/IP Protocols) Network Security(CP33925) Computer Networks (Introduction to TCP/IP Protocols) 부산대학교공과대학정보컴퓨터공학부 Network Type Elements of Protocol OSI Reference Model OSI Layers What we ll learn today 2 Definition of

More information

ECE 650 Systems Programming & Engineering. Spring 2018

ECE 650 Systems Programming & Engineering. Spring 2018 ECE 650 Systems Programming & Engineering Spring 2018 Networking Introduction Tyler Bletsch Duke University Slides are adapted from Brian Rogers (Duke) Computer Networking A background of important areas

More information

Network Architecture

Network Architecture Unit 7 Network Architecture Acknowledgments: These slides were originally developed by Prof. Jean Walrand for EE122. The past and current EE122 instructors including Kevin Fall, Abhay Parekh, Shyam Parekh,

More information

Lecture 7: Internetworking See Chapter 3 of Colouris

Lecture 7: Internetworking See Chapter 3 of Colouris 95-702 Distributed Systems Lecture 7: Internetworking See Chapter 3 of Colouris Learning Goals Preamble: MISM and MSIT grads may need to plan, develop, and manage distributed systems. These distributed

More information

Link Layer and Ethernet

Link Layer and Ethernet Link Layer and Ethernet 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross traceroute Data Link Layer Multiple

More information

ITEC 3800 Data Communication and Network. Introducing Networks

ITEC 3800 Data Communication and Network. Introducing Networks ITEC 3800 Data Communication and Network Introducing Networks Introduction to Networking Computer network, or simply network Refers to the connection of two or more computers by some type of medium You

More information

Time : 3 hours. Full Marks: 70. The figures in the margin indicate full marks. Answer from all the Groups are directed. Group A.

Time : 3 hours. Full Marks: 70. The figures in the margin indicate full marks. Answer from all the Groups are directed. Group A. COPYRIGHT RESERVED End Sem (III) MCA (XVIII) 2017 Time : 3 hours Full Marks: 70 Candidates are required to give their answers in their own words as far as practicable. The figures in the margin indicate

More information

Revision of Previous Lectures

Revision of Previous Lectures Lecture 15 Overview Last Lecture Local area networking This Lecture Wide area networking 1 Source: chapters 8.1-8.3, 17.1, 18.1, 18.2 Next Lecture Wide area networking 2 Source: Chapter 20 COSC244 Lecture

More information

Introduction and Layered Network Architecture. EEE 538 Dr. Nail Akar Bilkent University Electrical and Electronics Engineering Department

Introduction and Layered Network Architecture. EEE 538 Dr. Nail Akar Bilkent University Electrical and Electronics Engineering Department Introduction and Layered Network Architecture EEE 538 Dr. Nail Akar Bilkent University Electrical and Electronics Engineering Department 1 Fundamental Aspects of Network Analysis Architecture Layering

More information

Chapter 6: Network Communications and Protocols

Chapter 6: Network Communications and Protocols Learning Objectives Chapter 6: Network Communications and Protocols Understand the function and structure of packets in a network, and analyze and understand those packets Understand the function of protocols

More information

Chapter 4 NETWORK HARDWARE

Chapter 4 NETWORK HARDWARE Chapter 4 NETWORK HARDWARE 1 Network Devices As Organizations grow, so do their networks Growth in number of users Geographical Growth Network Devices : Are products used to expand or connect networks.

More information

What is a Network? A connection of two or more computers so that they can share resources.

What is a Network? A connection of two or more computers so that they can share resources. NETWORKS What is a Network? A connection of two or more computers so that they can share resources. Network Benefits Remote access Sharing files & resources Communication Cost Maintenance Communication

More information

CEN 444 Computer networks

CEN 444 Computer networks CEN 444 Computer networks Associate-Professor: Mohamed M. Abd-Eldayem Dept. of Comp. Engineering College of Computer and Information Sciences (CCIS) King Saud University Email: mdayem@ksu.edu.sa Chapter

More information

Chapter 12. Network Organization and Architecture. Chapter 12 Objectives Introduction Introduction

Chapter 12. Network Organization and Architecture. Chapter 12 Objectives Introduction Introduction Chapter 12 Objectives Chapter 12 Network Organization and Architecture Become familiar with the fundamentals of network architectures. Be able to describe the ISO/OSI reference model and the TCP/IP standard.

More information

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008 Computer Networks Medium Access Control Mostafa Salehi Fall 2008 2008 1 Outline Issues ALOHA Network Ethernet Token Ring Wireless 2 Main Issues Local Area Network (LAN) : Three or more machines are physically

More information

CCNA Exploration1 Chapter 7: OSI Data Link Layer

CCNA Exploration1 Chapter 7: OSI Data Link Layer CCNA Exploration1 Chapter 7: OSI Data Link Layer LOCAL CISCO ACADEMY ELSYS TU INSTRUCTOR: STELA STEFANOVA 1 Explain the role of Data Link layer protocols in data transmission; Objectives Describe how the

More information

The Link Layer and LANs. Chapter 6: Link layer and LANs

The Link Layer and LANs. Chapter 6: Link layer and LANs The Link Layer and LANs EECS3214 2018-03-14 4-1 Chapter 6: Link layer and LANs our goals: understand principles behind link layer services: error detection, correction sharing a broadcast channel: multiple

More information

Goal and Outline. Computer Networking. What Do We Need? Today s Story Lecture 3: Packet Switched Networks Peter Steenkiste

Goal and Outline. Computer Networking. What Do We Need? Today s Story Lecture 3: Packet Switched Networks Peter Steenkiste Goal and Outline 15-441 15-641 Computer Networking Lecture 3: Packet Switched Networks Peter Steenkiste Fall 2016 www.cs.cmu.edu/~prs/15 441 F16 Goal: gain a basic understanding of how you can build a

More information

Data Transport Networks

Data Transport Networks DC 8-1 DATACOMM John Abbott College JPC Data Transport Networks M. E. Kabay, PhD, CISSP Director of Education, ICSA President, JINBU Corp Copyright 1998 JINBU Corp. All rights reserved DC 8-2 Data Transport

More information

Lecture (02) The TCP/IP Networking Model

Lecture (02) The TCP/IP Networking Model Agenda ١ Lecture (02) The TCP/IP Networking Model Dr. Ahmed M. ElShafee Introduction to networking architecture Historical background The TCP/IP Protocol Architecture The TCP/IP Application Layer The TCP/IP

More information