Professional Documents
Culture Documents
Computer Networks: Zaka Ul-Mustafa
Computer Networks: Zaka Ul-Mustafa
Introduction
Zaka Ul-Mustafa
Zaka-mcs@nust.edu.pk Faculty offices, Old telecom building. Office timings: During Student Teacher Interaction
Text Book
Course Goals
Fundamental understanding of the network architecture and how to provide application requirements Cover core as well as newer networking technologies Goal is to cover as much breadth rather than depth As much hands on experience as possible Quantitative approach
Course policies
Final: 50% Midterm 30% Quizzes & Assignments 20% None Projects/homework/critiques are due at right before the beginning of class. I do not accept late
late policy
submissions.
DATA COMMUNICATION
Communication and Telecommunication. Data Communication---------- Exchange of 0s and 1s. Data Communication --------- Local; Remote Effective Data Communication: (Fundamental characteristics) a) Delivery-------- correct destination b) Accuracy------- correct data c) Timeliness----- Same order; No significant delay
Components
Network Applications
Marketing and Sales Financial Services Manufacturing Electronic Messaging Directory Services Information Services Electronic Data Interchange Teleconferencing Cellular TelePhone Cable Television
A network with two clients and one server. Resource Sharing & Client Server Model
Strong Communication. Emails, video conferencing Manufacturing Processes Inventory control E-commerce
PROTOCOLS
Merely sending the bit stream from one node to another and expecting a proper communication to occur ! Life is not that simple!!! Protocol defines: What is communicated; how it is communicated and When it is communicated.
STANDARDS
There are many factors needed to be synchronized. Why standards are necessary?(Competitive Market) Two types of standards: a) De facto (By Fact) b)De Jure (By Law)
i) Proprietary (closed standards) ii) Nonproprietary (Open standards;Developed by groups or committees)
De Jure Standards
De jure standards are those ratified by recognized international standards bodies such as the ISO and IEEE. Ethernet is an example of a de jure standard
De facto standards
de facto standards usually result from a standards battle in the market where dominance is achieved by being first, being bigger, being better or having more marketing clout. But standards battles can also be won by second to market, smaller, inferior products and standards. The Sony Playstation was second to market after Sega Those which arent necessarily open or based on any de jure standards. DOS is an example of a de facto standard. At a time when it mattered, there were three distinct DOS products on the market: MS-DOS from Microsoft, PC DOS from IBM, and DR DOS from Digital Research. Although they were similar products with similar features, each had its own quirks which meant you could never be 100 per cent certain your software would run on them all.
Standards are developed by cooperation between: Standards Creation committees, forums and government agencies Standards Creation Committees: a) ISO(International standards Organization,1947,82 members)
Provides models for Compatibility, improved Quality, increased productivity decreased prices) Standards Sector) United nation developed CCIIT. Two popular standards developed by ITU are V series and X series.
b) ITU-T c) IEEE
It sponsored an important project for local area network called Project 802
Forums
To accommodate the need of working models, agreements and to facilitate the process of standardization. Forum works with universities and users to test evaluate and standardize new technologies. Internet Society (ISOC) and Internet Engineering Task Force(IETF)
ISOC concentrates on user issues, including enhancement to the TCP/IP protocol suit. IETF reviewa internet software and hardware. e.g SNMP (Simple Network Management Protocol)
Regulatory Agencies
All communication Technologies require approval from Government Agencies The purpose of these agencies is to protect people interest by regulating radio and Wireless communication IN Pakistan: PTA (Pakistan Telecom Authority) In America: FCC
Network Hardware
Local Area Networks Metropolitan Area Networks Wide Area Networks Wireless Networks Home Networks Internetworks
Broadcast Networks
By a specific bit pattern in address field Multicast, one bit for indicating multicast transmission other n-1 bits for group address.
Point-to-point links
Types of Networks
There are three different ways in which we classify the networks Organizational Point of View Geographical Point of View Computing Point of View
From organizational point of view, networks are divided into two types
Peer-to-Peer Server based
Peer-to-Peer
These are also called Workgroups. A peer-to-peer network comprises of 10 or less users and is suitable for small-sized business organizations. In this model of networking the resources are randomly scattered on the network with every machine acting as a server as well as client
From geographical point of view, there are three types of networks. LAN WAN MAN/CAN
A LAN encompasses a small area such as a floor or a building with all the machines connected directly via the same medium generally.
Tree
Channel allocation may be static (e.g round robin) or dynamic Two broadcast networks (centralized or decentralized).
Mesh: Some more I/O ports are needed? topologies How many cables and Advantages & disadvantages
Star: Hub. As a repeater, active Hubs, passive Hubs. Advantages Less cables as compared to ? In case of a single link failure Easy Fault Identification
Disadvantages
Mesh topology
A WAN comprises of a very large physical area that covers countries and continents. Internet is one good example of a WAN. The machines in a WAN are connected through different mediums and protocols. Generally, the Dial-up-Networks are used for this purpose.
Relation between hosts on LANs and the subnet. Host: Machines for running user programs.
MAN (Metropolitan Area Network) or CAN (Campus Area Network) A MAN is almost similar to a WAN except that a MAN only encompasses an area that is within a city. CAN is a campus area Network which is used with in a campus for the sharing of resources.
Centralized Networks
The centralized networks rely totally on one dedicated machine called server for all the processing and computing and the clients or the terminals act as dumb entities. If the client requires a certain set of data, whole of the data set is transferred at the client end, which also is wastage of the network bandwidth.
Client-Server Networks
In this model of networking, only the required set of data is returned to the client while both the server and the client take part in the processing or computing of the queries. This is a more efficient way of processing and is hence applied generally more than the centralized method, nowadays. .
Network Software
Layers . To reduce complexity Shielding, data encapsulation Peer layers Protocol. The agreement between layers and parties. Interfaces No data is directly communicated between two layers Protocol stack Network architecture. Set of layers and protocols.
Dessign issues