Anda di halaman 1dari 21

COMSATS Institute of Information Technology, Islamabad

Fall2011 CSC339-Computer Communications and Networks 4(4,0)


Course Instructor: Dr. Sadaf Tanvir
https://sites.google.com/site/sadaftanvir/activities/teaching

September 5 2011

1 1

COMSATS Institute of Information Technology, Islamabad

Course Objectives

To familiarize the students with the world of computer networks Develop their understanding about the abstraction of OSI model and its layers Familiarize them with the issues of network security Introduce them to new network technologies like WiFi, Bluetooth and Zigbee Provide hands on experience by engaging them in a project based on network programming

September 5 2011

2 2

COMSATS Institute of Information Technology, Islamabad

Text Book
Computer Networks
A Systems Approach

By
Larry L. peterson and Bruce S. Davie 4th Edition Reference Books: Computer Networking: A Top Down Approach By James F. Kurose , Keith W. Ross 5th Edition
September 5 2011 3 3

Course Outline
Lec no.
1 2 3 4 5 6 7 8 9 10 11 How to build a network: Requirements, Applications How to build a network: Network Architecture, Network Software Network Software, Performance Metrics, Data Link Networks: Encoding Data Link Layer, Framing Error Detection, Reliable Transmission Reliable Transmission, Ethernet Ethernet, Rings, Wireless (Bluetooth, WiFi, Wimax, Zig-bee) Packet Switching, Switching and Forwarding Bridges and LAN switches Internetworking, Simple Internetworking Address Resolution Protocol(ARP)

Contents

September 5 2011

4 4

12 13 14 15 16 17 18

DHCP, ICMP, Virtual Network and Tunnels Routing Global Internet, Subnetting Multicast Multi-Protocol Label Switches End to End Protocols Congestion Control and Resource Allocation

19
20 21 22 23 24 25 26 27 28

End to End Data


Network Security Cryptographic tools, Key pre-distribution Authentication, Secure Systems Firewalls Applications: SMTP, MIME, IMAP DNS, SNMP, Web Services, Multimedia Applications Overlay Networks, Peer to peer networks Content Distribution Networks Revision

September 5 2011

5 5

Administrivia

Marks Breakdown
Midterms Assignments Quiz Project Final

25% 10% 10% 5% 50%

Exam

September 5 2011

6 6

Chapter 1: Foundation

September 5 2011

7 7

Problems

What is a computer network? How to build a scalable network that will support different applications? How is a computer network different from other types of networks?

What is a computer network architecture?

September 5 2011

Courtesy: Elsevier Inc 2010

Chapter Outline

Applications Requirements Network Architecture Implementing Network Software Performance

September 5 2011

Courtesy: Elsevier Inc 2010

Chapter Goal

Exploring the requirements that different applications and different communities place on the computer network Introducing the idea of network architecture Introducing some key elements in implementing Network Software Define key metrics that will be used to evaluate the performance of computer network
September 5 2011

Courtesy: Elsevier Inc 2010

10

Applications

Most people know about the Internet (a computer network) through applications
World Wide Web Email Online Social Network Streaming Audio Video File Sharing Instant Messaging

September 5 2011

Courtesy: Elsevier Inc 2010

11

Examples of applications

Web pages

Video on demand

Video Conferencing

September 5 2011

12

Application Protocol

URL
Uniform resource locater http://ciit.edu.pk/

HTTP

Hyper Text Transfer Protocol

TCP
Transmission Control Protocol

17 messages for one URL request


6 to find the IP (Internet Protocol) address 3 for connection establishment of TCP 4 for HTTP request and acknowledgement
Request: I got your request and I will send the data Reply: Here is the data you requested; I got the data

4 messages for tearing down TCP connection


September 5 2011 Courtesy: Elsevier Inc 2010 13

Requirements of Applications are different


Nature of the applications like video on demand and videoconferencing in different we have strict timing constraint in the case of videoconferencing whereas we can wait for a while in case of vod. In case of vc data flow has to be bi-directional whereas in case of Vod it is uni directional. Similarly we have another application called google docs to exchange info on docs in real time

September 5 2011

Courtesy: Elsevier Inc 2010

14

Previous examples demonstrate the diversity of applications that can be built on top of the Internet, and hint at the complexity of the Internets design. Starting from the beginning, and addressing one problem at time, In this course, we will see how to build a network that supports such a wide range of applications

September 5 2011

Courtesy: Elsevier Inc 2010

15

To build a network

We will ask questions that arise naturally for building an actual network

For understanding, we would not accept the existing solutions the way they are
Instead, we will be asking (and answering) the question of why networks are designed the way they are Since it is important to recognize the underlying concepts because networks are constantly changing as the technology evolves and new applications are invented

The first step is to identify the set of constraints and requirements that influence network design

September 5 2011

Courtesy: Elsevier Inc 2010

16

Requirements
It is important to understand that the expectations you have of a network depend on your perspective Application Programmer

List the services that his application needs: delay bounded delivery of data

Network Designer
Design a cost-effective network with sharable resources(What are resources?: links, nodes)

Network Provider
List the characteristics of a system that is easy to manage
September 5 2011 Courtesy: Elsevier Inc 2010 17

The next few slides distill these different perspectives into a high-level introduction and identify major considerations that drive network design

September 5 2011

Courtesy: Elsevier Inc 2010

18

Connectivity
Limited

Starting with the obvious, a network must provide connectivity among a set of computers Sometimes it is enough to build a limited network that connects only a few select

machines.
In fact, for reasons of privacy and security, many private (corporate) networks

have the explicit goal of limiting the set of machines that are connected. Scalable In contrast, other networks (of which the Internet is the prime example) are designed to grow in a way that allows them the potential to connect all the computers in the world. A system that is designed to support growth to an arbitrarily large size is said to scale.
September 5 2011 Courtesy: Elsevier Inc 2010 19

Connectivity

Need to understand the following terminologies


Scale Link Nodes Point-to-point Multiple access Connectivity is not merely a direct physical connection Switched Network

(a) (b)

Point-to-point Multiple access

Circuit Switched Packet Switched

Packet, message Data block is a piece of file,image,email etc. Store-and-forward

September 5 2011

Courtesy: Elsevier Inc 2010

20

Connectivity

Terminologies (contd.)
Cloud Hosts Switches internetwork Router/gateway Host-to-host connectivity
Needs Address Routing Unicast/broadcast/multicast

(a)

(b)

(a) (b)

A switched network Interconnection of networks


September 5 2011 Courtesy: Elsevier Inc 2010
21

Anda mungkin juga menyukai