Module 1. Introduction. Version 2, CSE IIT, Kharagpur

Similar documents
Objectives. Learn how computers are connected. Become familiar with different types of transmission media

Revision of Previous Lectures

Communication Networks - 3 general areas: data communications, networking, protocols

Computer Networks. Andrew S. Tanenbaum

CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115

Data Communications and Networks Spring Syllabus and Reading Assignments

Data Communication. Chapter # 1: Introduction. By: William Stalling

Data Communications SYLLABUS. Transmission Impairments, Transmission Media. Data-Digital Signals, Analog Data-analog Signals.

INTRODUCTION DATA COMMUNICATION TELECOMMUNICATIONS SYSTEM COMPONENTS 1/28/2015. Satish Chandra satish0402.weebly.com

TIME SCHEDULE. 2 Physical Layer 15. Course General Outcomes: Sl. G.O On completion of this course the student will be able :

Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005

BROADBAND AND HIGH SPEED NETWORKS

SRM ARTS AND SCIENCE COLLEGE SRM NAGAR, KATTANKULATHUR

Lecture 4. Data Transmission Modes and Switching. Data Transmission & Switching 1-1

Comp277 Assignment 1 Fall 2011 Due 20 th December 2011 at 11:00am

What is the fundamental purpose of a communication system? Discuss the communication model s elements.

Data Communication. Introduction

Local Area Networks (LANs): Packets, Frames and Technologies Gail Hopkins. Part 3: Packet Switching and. Network Technologies.

INTRODUCTION TO ICT.

Overview of Networks

Computer Facilities and Network Management BUS3150 Tutorial - Week 13

Text Book. 1. Computer Networks & Internets by Douglas E Comer. 2. Data and Computer Communication by William Stalling, 5th or above edition.

CHAPTER -1. Introduction to Computer Networks

Data Networks. Lecture 1: Introduction. September 4, 2008

CCNA Exploration1 Chapter 7: OSI Data Link Layer

Chapter 12. Network Organization and Architecture

Data Communication. Introduction of Communication. Data Communication. Elements of Data Communication (Communication Model)

CS610- Computer Network Solved Subjective From Midterm Papers

Special expressions, phrases, abbreviations and terms of Computer Networks

Review of Network Technologies

Digital Communication Networks

PSD2A Computer Networks. Unit : I-V

EEC-484/584 Computer Networks

Internetworking is connecting two or more computer networks with some sort of routing device to exchange traffic back and forth, and guide traffic on

Chapter 4 Network Layer

Introduction. Communication

COMPONENTS OF DATA COMMUNICATION

Chapter Topics Part 1. Network Definitions. Behind the Scenes: Networking and Security

Router Router Microprocessor controlled traffic direction home router DSL modem Computer Enterprise routers Core routers

Class X Subject : IT (Vocational) Chapter -1 Ouestion / Answer

Introduction to Network Technologies & Layered Architecture BUPT/QMUL

TYPES OF COMPUTER NETWORKS

CSE3213 Computer Network I

Computer Network : Lecture Notes Nepal Engineering College Compiled by: Junior Professor: Daya Ram Budhathoki Nepal Engineering college, Changunarayan

Lesson 1: Network Communications

CS 428/528 Computer Networks Lecture 01. Yan Wang

KIBABII UNIVERSITY COLLEGE DEPARTMENT COMPUTER SCIENCE & IT ANSWER ALL QUESTIONS IN SECTION A AND ANY TWO QUESTIONS IN SECTION B

6 Computer Networks 6.1. Foundations of Computer Science Cengage Learning

University of Southern California EE450: Introduction to Computer Networks

CSE 3214: Computer Network Protocols and Applications Network Layer

M242 COMPUTER NETWORS AND SECURITY

Electrical and Computer Engineering Technology

Contents. Introduction to Networking. Preface...i. Introduction... xix

Internet Architecture and Protocol

ECE 333: Introduction to Communication Networks Fall Lecture 1: Introduction

IT114 NETWORK+ Learning Unit 1 Objectives: 1, 2 Time In-Class Time Out-Of-Class Hours 2-3. Lectures: Course Introduction and Overview

Network management and QoS provisioning - revise. When someone have to share the same resources is possible to consider two particular problems:

Introductions. Computer Networking Lecture 01. January 16, HKU SPACE Community College. HKU SPACE CC CN Lecture 01 1/36

CS1302-COMPUTER NETWORKS UNIT I -DATA COMMUNICATION PART A

Data Transmission Definition Data Transmission Analog Transmission Digital Transmission

Layer 3: Network Layer. 9. Mar INF-3190: Switching and Routing

1: Review Of Semester Provide an overview of encapsulation.

Local Area Network Overview

CS321: Computer Networks Introduction to Computer Networks and Internet

A closer look at network structure:

and Networks Data Communications Second Edition Tata McGraw Hill Education Private Limited Managing Director SoftExcel Services Limited, Mumbai

BROADBAND AND HIGH SPEED NETWORKS

Netwoking Essentials

Integrated t Services Digital it Network (ISDN) Digital Subscriber Line (DSL) Cable modems Hybrid Fiber Coax (HFC)

L1: Introduction. Hui Chen, Ph.D. Dept. of Engineering & Computer Science Virginia State University Petersburg, VA 23806

2. A collection of interconnected networks is called an internetwork. 3. Each machine is connected to a central hub with a point-to-point connection.

Networking interview questions

Mobile MOUSe ROUTING AND SWITCHING FUNDAMENTALS ONLINE COURSE OUTLINE

A LAN is a high-speed data network that covers a relatively small geographic area. It typically connects workstations, personal computers, printers,

Module 2 Overview of Computer Networks

Module 2 Overview of. Computer Networks

Network.... communication system for connecting end- systems. End-systems a.k.a. hosts PCs, workstations dedicated computers network components

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur

IT4405 Computer Networks (Compulsory)

Monash University SAMPLE EXAM. Faculty Of Information Technology. Computer Facilities and Network Management

NZQA unit standard version 2 Page 1 of 6. Demonstrate basic knowledge of telecommunications concepts

CS 4453 Computer Networks Winter

MORGANSTATEUNIVERSITY DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING. EEGR510 Communications Networks Credits: 3 COURSE SYLLABUS

Networks 15.2 Multiplexing Technologies Access Networks 15.5 Common Peripheral Interfaces

COMPUTER TECHNIQUE. ( Vocational Stream ) Paper : V. ( Computer Network ) ( Theory )

Optical networking technology

Lecture 8 Winter 2006 Enterprise and Personal Communications Networks

CH : 15 LOCAL AREA NETWORK OVERVIEW

Computer Communications and Network Basics p. 1 Overview of Computer Communications and Networking p. 2 What Does Computer Communications and

Network Connectivity and Mobility

Introduction to computer networking

What is a Network? A connection of two or more computers so that they can share resources.

Introduction. High Speed LANs. Emergence of High-Speed LANs. Characteristics of High Speed LANS. Text ch. 6, High-Speed Networks and

Network Superhighway CSCD 330. Network Programming Winter Lecture 13 Network Layer. Reading: Chapter 4

MORGANSTATEUNIVERSITY DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING. EEGR410 Introduction to Networks. Credits: 3 COURSE SYLLABUS

Prepared by Agha Mohammad Haidari Network Manager ICT Directorate Ministry of Communication & IT

CMSC 332 Computer Networks Network Layer

Reti di Calcolatori I

Computer Networks Question Bank

ITEC 3800 Data Communication and Network. Introducing Networks

Transcription:

Module 1 Introduction Version 2, CSE IIT, Kharagpur

Introduction In this module we shall highlight some of the basic aspects of computer networks in two lessons. In lesson 1.1 we shall start with the historical background of computer networks, i.e. how the advancements in the field of communication and computers (which in turn is boosted by development in the field of VLSI) lead to the emergence of computer networks. Then we shall discuss different type of networks and their classification on the basis of transmission technology and scale. In the following section we shall focus on few applications of computer networks, which spans over different areas in a common man life. Finally, an outline of the entire course is presented in the last section. An overview of layered network architecture is presented in lesson 1.2. The basic terminologies for layered architecture will be covered. Then this lesson provides an introduction of OSI layer architecture (Open System Interconnection Reference Model). Basic functionalities of different layers of OSI and concept of service access points and how information exchange between two peer layers of two different systems take place is explained. Version 2, CSE IIT, Kharagpur

Module 2 Data Communication Fundamentals

This module is concerned with some of the important issues of the physical layer, which provides services to the layer above it, namely the data link layer. In the data link layer, the data consists of 0s and 1s, which are organized into frames to be sent through some transmission media. It is necessary to convert this data into another entity called signal. After introducing the fundamental model of communication, Lesson 2.1 introduces the basic elements of communication such as data, signal and channel characteristics. Different data types, concept of time domain and frequency domain representation of signal, various channel characteristics such as bandwidth, bit interval and bit rate of a digital signal are considered in this section. Lesson 2.2 introduces different transmission media, which are broadly divided into two categories, namely guided and unguided media. Typical characteristics and uses of each type of media starting from twisted-pair cables, coaxial cable, and optical fiber to line-ofsight and satellite communication have been covered in this lesson. Lesson 2.3 will introduce various sources of impairments, such as attenuation, distortion and noise, that a signal suffers as it passes through a communication media. This lesson also will introduce the concept of channel capacity, which specifies the amount of information that can be sent through a medium. Lesson 2.4 deals with the transmission of digital signals, which involves encoding of data. Encoding of digital data involves two types of coding namely line coding and block coding. Various line coding techniques such as unipolar, polar, and bipolar and block coding techniques are presented in this lesson. Encoding of analog data involves conversion to digital form by using techniques like pulse code modulation and delta modulation, which are also discussed in this lesson. Transmission of analog signals is discussed in Lesson 2.5. It is necessary to perform modulation to convert analog data to analog signal. Various aspects of the three possible modulation techniques, namely amplitude, phase and frequency have been discussed in this lesson. Similarly, to convert digital data to analog signal, possible approaches such as amplitude, phase and frequency shift keying have been covered in lesson 2.6. Lesson 2.7 deals with various multiplexing techniques such as Frequency division multiplexing (FDM), time division multiplexing (TDM), Statistical TDM, Wave Division multiplexing (WDM) and Orthogonal Frequency Division Multiplexing (OFDM). So, this module provides necessary background to the students for understanding the topics to be covered in the subsequent lessons dealing with different aspects of computer networks.

Module 3 Data Link control Version 2, CSE IIT, Kharagpur

In the preceding module we have focused on sending signal over some communication link. In practice, much more is needed for effective data communication. In this module, we shall focus on some of the important issues for this purpose. The basic model that we shall use to discuss various issues related to data link control is shown in Fig. 3.1.1. Here two machines are directly connected with the help of a point-to-point communication link that act conceptually like a pair of wire. In many situations, the link may be multipoint, meaning that more than two stations connected to the communication link. In such cases, it is necessary to have mechanism to identify the source-destination pair involved in data transmission. Key features of the link are: Occasionally errors occur in the communication circuit. There is nonzero propagation delay. Communication link and the machines have finite data rate. Figure 3.1.1 Data Link control model Our objective is to devise suitable mechanism for efficient and reliable communication between the two machines through the link. This will require great deal of coordination between the two machines. A layer of logic is added above the physical interface to achieve the necessary control and management referred to as Data Link Control. Key components of the data link control are: Frame synchronization: The beginning and end of a data block (called frame) should be distinguishable. Addressing: In case of multipoint communication the identity of the two stations involved in the communication are to be specified. Flow control: The sender should send frames at a rate such that the receiver is not overwhelmed. Error control: Any bit errors introduced by the transmission system should be corrected. Control and data on the same link: The receiver must be able to distinguish control information from the data being transmitted. Link management: Procedures for the management of the initiation, maintenance, and termination of a sustained data exchange. Version 2, CSE IIT, Kharagpur

In this module we shall discuss various aspects of data link control. Lesson 3.1 will deal with framing and synchronization along with how one can interface the machine to the media. Error detection and error correction techniques will be presented in Lesson 3.2. Lesson 3.3 will introduce various protocols used for flow control and error control. Finally, lesson 3.4 will cover HDLC, the most popular data link control protocol. Version 2, CSE IIT, Kharagpur

Module 4 Switched Communication Networks Version 2, CSE IIT Kharagpur

The techniques of communication between a pair of stations on a network can be classified into two broad categories. Switched network methodology Broadcast Methodology In the switched network methodologies, the network consists of a set of interconnected stations, among which information is transmitted from source to destination through different routes, which is controlled by the switching mechanism. In case of broadcast network, each station is a transmitter-receiver pair and is attached to the transmission medium, which is shared by all stations. Any transmission done by any one of the stations is received by all the stations of the network. In this module we shall discuss about switched communication networks. First we shall have a look at various switching techniques in Lesson 4.1. In this lesson we shall discuss various aspects of circuit switching and discuss the operation of Public Switched Telephone Network (PSTN), which is based on circuit switching. Various aspects of message switching, packet switching and virtual circuit switching have been addressed in Lesson 4.2 Lesson 4.3 presents the Synchronous Optical Network (SONET) that defines a technology for carrying many signals of different capacities through a synchronous, flexible, optical hierarchy. It utilizes the enormous bandwidth of optical fiber to achieve date transfer at a very high rate. X.25 is a packet-switched network developed by ITU-T in 1976. It defines how a packet-mode terminal can be interfaced to a packet network for data communication. However, X.25 does not satisfy the present day requirements of higher data rate. To overcome these limitations, a new standard, known as frame relay was introduced. Lesson 4.4 introduces these two packet switching networks. In the last section of this module, we shall introduce ATM (Asynchronous transfer mode), which can be used both as a LAN or WAN standard. We shall discuss various network devices used in ATM, concept of cell transfer and cell format, then we shall discuss VP switching and VP-VC switching, after that we will have a look at ATM reference model i.e. it s various planes and levels, and finally we will have a look at few of its application. This module is organized in the following five lessons: Lesson 4.1: Switching Techniques: Circuit Switching Lesson 4.2: Switching Techniques: Packet Switching Lesson 4.3: Synchronous Optical Network (SONET) Lesson 4.4: X.25 and Frame Relay Networks Lesson 4.5: ATM Version 2, CSE IIT Kharagpur

Module 5 Broadcast Communication Networks

Data communication networks can be broadly divided into the following two types: Switched communication networks: Here the users are interconnected by means of transmission lines, multiplexers and switches. Broadcast networks: Here a single transmission media is shared by all the users and information is broadcast by an user into the medium. In the preceding module we have covered various switched communication networks. In this module we shall focus on broadcast communication networks. Some examples of broadcast communication networks are: Local area network (LAN) Packet radio network Cellular telephone network Satellite Network These networks can be characterized by the following three parameters: Transmission media Topology Medium Access control (MAC) Technique Characteristics of different transmission media have been covered in Lesson 2.2. Topology and its interrelationship with the transmission media will be considered in Lesson 5.1. In Lesson 5.2 we shall discuss different MAC techniques and in the subsequent lessons we shall consider the abovementioned networks one after the other. Lesson 5.1 Network Topology Lesson 5.2 Medium Access Control Techniques Lesson 5.3 IEEE CSMS/CD based LANs5 Lesson 5.4 EEE Ring LANs Lesson 5.5 High Speed Ring based LANs Lesson 5.6 High Speed Ethernet based LANs Lesson 5.7 Wireless LANs Lesson 5.8 Bluetooth Lesson 5.9 Cellular Telephone Networks Lesson 5.10 Satellite Networks

Module 6 Internetworking

In the previous modules we have discussed various network technologies. We have observed that LAN technologies are designed to provide high-speed communication over a small geographical region, whereas WAN technologies are designed to provide communication across different cities, countries and continents. But, it has been found that isolated LANs and WANs have limited potential and usefulness. To make the computer networks more useful and suitable for many emerging applications, it is necessary to connect individual heterogeneous networks, both LAN and WAN, distributed across the world using suitable hardware and software in such a way that it gives the user the illusion of a single network. Basic motivations behind internetworking are as follows: To provide a link between networks. To provide a route for delivery of data between processes on different networks. To provide an accounting service that keeps track of the use of various networks and routers and also to maintain status information. To accommodate a number of differences among the networks: o Addressing scheme o Maximum packet size o Network-access mechanism o Timeouts, Error recovery o Status reporting o Routing techniques o User-access control o Connection oriented/connectionless services This module is concerned with internetworking, which allows communication across isolated network boundaries in a seamless manner. Lesson 6.1 introduces various internetworking devices such as repeater/hub, bridge, router and gateway, which are used to interconnect separate LANs and WANs. Lesson 6.2 introduces IP addressing and various protocols at the IP layer and lesson 6.3 deals with Transmission Control and Application layer protocols such as Electronic mail, File transfer, and Remote login. Lesson 6.1 Internetworking Devices Lesson 6.2 Internet Protocol Lesson 6.3 Transport and Application Layer Protocols

Module 7 Routing and Congestion Control

In Lesson number 6.1 we have seen that an internet can be considered as a network of networks connected by routers. When a packet travels from a source to a destination, it is likely to pass through several routers and normally there exist multiple paths between any two source-destination pairs. The routing function of the network layer decides which path a packet to follow from a source node to a destination node. For a connectionless (datagram type) service, each packet is routed independently, whereas for a virtual-circuit type of service, a route is set up at the beginning and all packets follow the same path. The attributes, which are expected from a routing function are: correctness, simplicity, robustness, stability, fairness and optimality and the routing algorithms can be classified based on different metrics. Lesson 7.1 introduces various issues related to routing. In the subsequent three lessons three popular routing algorithms, namely Routing Information Protocol (RIP), Open Shortest Path First (OSPF) and Border Gateway Protocol (BGP) have been covered. A packet switched network may be considered as a network of queues. If the rate at which packets arrive and queue up exceeds the rate at which packets are disbursed, the queue size grows without bounds leading to long delay and buffer overflow. Ultimately, it may lead to deadlock, a catastrophic situation in which the throughput drops to zero as shown in. The objective of the congestion control is to maintain the number of packets within the network or a region of network below the level at which queuing delays blow up. Various congestion control protocols have been covered in Lesson 7.5. This module consists of the following five lessons. Lesson 7.1 Basics of Routing Lesson 7.2 Routing Information Protocol (RIP) Lesson 7.3 Open Shortest Path First (OSPF) Lesson 7.4 Border Gateway Protocol (BGP) Lesson 7.5 Congestion Control Algorithms

Module 8 Network Security

With the ability to contact anybody from anywhere and more and more people joining the internet with diverse applications, network security has become a very important issue. People are now very concerned about communication in a secured manner through internet, which is essentially an insecure public network. Cryptography has been considered to be the solution to this problem. Suitable encryption/decryption techniques can be used for transfer of data through internet between any two hosts in a secured manner. Lesson 8.1 of this module provides an overview of the vast subject of Cryptography. Then lesson 8.2 presents how cryptography can be applied in a number of ways to achieve secured communication through an insecure communication network. Moreover, many organizations have confidential or proprietary information, such as trade secrets, product development plans, marketing strategies, etc., which should be protected from unauthorized access and modification. Although cryptographic techniques can be used to protect data in transit, it does not protect data from digital pests and hackers. To accomplish this, it is necessary to perform user authentication and access control to protect a private network from unauthorized traffic. This can be performed with the help of a firewall, which acts as an interface between a private network and an insecure public network. An overview of the functions Firewalls are given in Lesson 8.3. Lesson 8.1 Cryptography Lesson 8.2 Secured Communication Lesson 8.3 Firewalls