Eec 2502 Computer Networks Lecture 1
Eec 2502 Computer Networks Lecture 1
Eec 2502 Computer Networks Lecture 1
LECTURE NOTES
(2021)
COURSE DESCRIPTION
Economic and technological consideration; digital data transmission; Error detection coding and synchronization. Error
detection and recovery; network configurations; principles of data networks and queuing theory. International Organization
for Standardization (ISO), Open systems Interconnection (OSI) reference model; circuit switching, packet switching.
Communication protocol: physical, data link, network and transport layers including Transmission Control Protocol
(TCP/IP); local area networks (LANs). Contention and token passing system (e.g. Carrier Sense Multiple Access with
Collision Detection (SCMA/CD), token bus, token ring, distributed queue dual bus (DQDB), Fiber Distributed Data
Detection Interface (FDDI); current international standards including Integrated Services Digital (ISDN), Broadband –
ISDN(B-ISDN) and Asynchronous Transfer Mode (ATM); data compression; encryption and decryption.
TEXT BOOKS:
REFERENCES BOOKS:
1. An Engineering Approach to Computer Networks - S. Keshav, 2nd Edition, Pearson Education.
2. Understanding communications and Networks, 3rd Edition, W. A. Shay, Cengage Learning.
3. Computer Networking: A Top-Down Approach Featuring the Internet, James F. Kurose, K. W. Ross, 3rd Edition,
Pearson Education.
COMPUTER NETWORKS
A network is the interconnection of a set of devices capable of communication. In this definition, a device can
be a host (or an end system as it is sometimes called) such as a large computer, desktop, laptop, workstation,
cellular phone, or security system. A device in this definition can also be a connecting device such as a router,
which connects the network to other networks, a switch, which connects devices together, a modem (modulator-
demodulator), which changes the form of data, and so on. These devices in a network are connected using wired
or wireless transmission media such as cable or air. When we connect two computers at home using a plug-and-
play router, we have created a network, although very small.
Computer networks are set up to carry computer data. Hence, they are part of the data communication system.
Computer Networks come in many sizes, shapes and forms, as we will see later. They are usually connected
together to make larger networks, with the Internet being the most well-known example of a network of
networks.
Data Representation
Information today comes in different forms such as text, numbers, images, audio, and video.
Text:
In data communications, text is represented as a bit pattern, a sequence of bits (Os or Is). Different sets of bit patterns have
been designed to represent text symbols. Each set is called a code, and the process of representing symbols is called coding.
Today, the prevalent coding system is called Unicode, which uses 32 bits to represent a symbol or character used in any
language in the world. The American Standard Code for Information Interchange (ASCII), developed some decades ago in
the United States, now constitutes the first 127 characters in Unicode and is also referred to as Basic Latin.
Numbers:
Numbers are also represented by bit patterns. However, a code such as ASCII is not used
to represent numbers; the number is directly converted to a binary number to simplify mathematical operations. Appendix B
discusses several different numbering systems.
Images:
Images are also represented by bit patterns. In its simplest form, an image is composed of a matrix of pixels (picture
elements), where each pixel is a small dot. The size of the pixel depends on the resolution. For example, an image can be
divided into 1000 pixels or 10,000 pixels. In the second case, there is a better representation of the image (better resolution),
but more memory is needed to store the image. After an image is divided into pixels, each pixel is assigned a bit pattern.
The size and the value of the pattern depend on the image. For an image made of only black and- white dots (e.g., a
chessboard), a 1-bit pattern is enough to represent a pixel. If an image is not made of pure white and pure black pixels, you
can increase the size of the bit pattern to include gray scale. For example, to show four levels of gray scale, you can use 2-
bit patterns. A black pixel can be represented by 00, a dark gray pixel by 01, a light gray pixel by 10, and a white pixel by
11. There are several methods to represent color images. One method is called RGB, so called because each color is made of
a combination of three primary colors: red, green, and blue. The intensity of each color is measured, and a bit pattern is
assigned to it. Another method is called YCM, in which a color is made of a combination of three other primary colors:
yellow, cyan, and magenta.
Audio:
Audio refers to the recording or broadcasting of sound or music. Audio is by nature different from text, numbers, or images.
It is continuous, not discrete. Even when we use a microphone to change voice or music to an electric signal, we create a
continuous signal.
Video:
Video refers to the recording or broadcasting of a picture or movie. Video can either be produced as a continuous entity
(e.g., by a TV camera), or it can be a combination of images, each a discrete entity, arranged to convey the idea of motion.
Again we can change video to a digital or an analog signal.
Data Flow
Communication between two devices can be simplex, half-duplex, or full-duplexas shown in Figure.
Simplex In simplex mode, the communication is unidirectional, as on a one-way street. Only one of the
two devices on a link can transmit; the other canonly receive (Figure a). Keyboards and traditional monitors
are examples of simplex devices.
Half-Duplex
In half-duplex mode, each station can both transmit and receive, but not at the same time. When one device is
sending, the other can only receive, and vice versa (Figure b). Walkie-talkies and CB (citizens band) radios are
both half- duplex systems.
Full-Duplex
In full-duplex, both stations can transmit and receive simultaneously (Figure c). One common example of full-
duplex communication is the telephone network.When two people are communicating by a telephone line,
both can talk andlisten at the same time. The full-duplex mode is used when communication inboth
directions is required all the time.
Network Criteria
A network must be able to meet a certain number of criteria. The most important of these are performance,
reliability, and security.
Performance
Performance can be measured in many ways, including transit time and response time. Transit time is the amount
of time required for a message to travel from one device to another. Response time is the elapsed time between
an inquiry and a response. The performance of a network depends on a number of factors, including the number
of users, the type of transmission medium, the capabilities of the connected hardware, and the efficiency of the
software.
Performance is often evaluated by two networking metrics: throughput and delay. We often need more
throughput and less delay. However, these two criteria are often contradictory. If we try to send more data to
the network, we may increase throughput but we increase the delay because of traffic congestion in the network.
Reliability: In addition to accuracy of delivery, network reliability is measured by the frequency of failure, the
time it takes a link to recover from a failure, andthe network's robustness in a catastrophe.
Security: Network security issues include protecting data from unauthorized access, protecting data from
damage and development, and implementing policies and procedures for recovery from breaches and data
losses.
Physical Structures
Before continuing discussing networks, we need to define some network attributes.
Type of Connection
A network is two or more devices connected through links. A link is acommunications pathway that
transfers data from one device to another.
There are two possible types of connections: point-to-point and multipoint:
Point-to-Point. A point-to-point connection provides a dedicated link betweentwo devices. The entire
capacity of the link is reserved for transmission between those two devices. Most point-to-point connections
use an actual length of wire or cable to connect the two ends, but other options, such as microwave or
satellite links, are also possible
When you change television channels by infrared remote control, you are establishing a point-to-point
connection between the remote control and the television's control system.
Multipoint. A multipoint (also called multi-drop) connection is one in which more than two specific devices
share a single link. In a multipoint environment, the capacity of the channel is shared, either spatially or
temporally. If several devices can use the link simultaneously, it is a spatially shared connection. If users must
take turns, it is a timeshared connection.
Physical Topology
The term physical topology refers to the way in which a network is laid out physically.
Two or more devices connect to a link; two or more links form a topology. The topology of a network is the
geometric representation of the relationship of all the links and linking devices (usually called nodes) to one
another.
There are four basic topologies possible: mesh, star, bus, and ring
MESH:
A mesh topology is the one where every node is connected to every other node in the network.
A mesh topology can be a full mesh topology or a partially connected mesh topology.
In a full mesh topology, every computer in the network has a connection to each of the other computers in
that network. The number of connections in this network can be calculated using the following formula
(n is the number ofcomputers in the network): n(n-1)/2.
In a partially connected mesh topology, at least two of the computers in the network have connections to multiple
other computers in that network. It is an inexpensive way to implement redundancy in a network. In the event
that one of the primary computers or connections in the network fails, the rest of the network continues to
operate normally.
Advantages of a mesh topology
Can handle high amounts of traffic, because multiple devices can transmitdata
simultaneously.
A failure of one device does not cause a break in the network or transmissionof data.
Adding additional devices does not disrupt data transmission between otherdevices.
Disadvantages of a mesh topology
The cost to implement is higher than other network topologies, making it aless desirable
option.
Building and maintaining the topology is difficult and time consuming.
The chance of redundant connections is high, which adds to the high costsand potential for
reduced efficiency.
STAR:
A star network, star topology is one of the most common network setups. In this configuration, every node
connects to a central network device, likea hub, switch, or computer. The central network device acts as
a server and the peripheral devices act as clients. Depending on the type of network card usedin each
computer of the star topology, a coaxial cable or a RJ-45 network cableis used to connect computers together.
BUS:
A line topology, a bus topology is a network setup in which each computer and network device are
connected to a single cable or backbone.
Advantages of bus topology
It works well when you have a small network.
It's the easiest network topology for connecting computers or peripheralsin a linear
fashion.
It requires less cable length than a star topology.Disadvantages of
bus topology
It can be difficult to identify the problems if the whole network goes down.
It can be hard to troubleshoot individual device issues.
Bus topology is not great for large networks.
Terminators are required for both ends of the main cable.
Additional devices slow the network down.
If a main cable is damaged, the network fails or splits into two.
RING:
A ring topology is a network configuration in which device connections createa circular data path. In a ring
network, packets of data travel from one device tothe next until they reach their destination. Most ring topologies
allow packets to travel only in one direction, called a unidirectional ring network. Others permit data to move
in either direction, called bidirectional.
The major disadvantage of a ring topology is that if any individual connection in the ring is broken, the entire
network is affected.
Ring topologies may be used in either local area networks (LANs) or wide area networks (WANs).
Advantages of ring topology
All data flows in one direction, reducing the chance of packet collisions.
A network server is not needed to control network connectivity betweeneach
workstation.
Data can transfer between workstations at high speeds.
Additional workstations can be added without impacting performance ofthe network.
Disadvantages of ring topology
All data being transferred over the network must pass through each workstation on the
network, which can make it slower than a star topology.
The entire network will be impacted if one workstation shuts down.
The hardware needed to connect each workstation to the network is more expensive than
Ethernet cards and hubs/switches.
Hybrid Topology A network can be hybrid. For example, we can have a main star topology with each
branch connecting several stations in a bus topology asshown in Figure
Other types
WLAN (Wireless LAN)
A LAN that uses high frequency radio waves for communication.
Provides short range connectivity with high speed data transmission.
PAN (Personal Area Network)
Network organized by the individual user for its personal use.
SAN (Storage Area Network)
Connects servers to data storage devices via fiber-optic cables.E.g.:
Used for daily backup of organization or a mirror copy.
Network Architecture
To reduce the design complexity, most networks are organized as a series of layers or levels,
each built upon on the one below it. The number of layers, the name of each layer ,the contents
of each layer ,and the function of each layer differ from network to network However, in all
networks the purpose of each layer is to offer certain services to the higher layers ,shielding
those layers from the details of how the offered services are actually implemented.
Layer n on one machine carries on a conversation with layer n on another machine. The rules
and conventions used in this conversation are collectively known as the layer n Protocol. The
entities comprising the corresponding layers on different machines are called Peers.
The interface defines which primitive operation and services the lower layer offers to the upper
one.
A set of layers and protocol is called network architecture.
REFERENCE MODELS
Transport Layer:
Service – Point addressing
Segmentation and reassembly
Flow control
Error control
Session Layer:
-Dialog control
-Synchronization
Presentation Layer:
Data encoding
Encryption
Compression
Application Layer:
File Transfer
Mail services
Directory services