Professional Documents
Culture Documents
12/04/2021 1 12/04/2021 2
12/04/2021 3 12/04/2021 4
1
12/04/2021
• Personal Area Networks (PAN) • Used for communication among devices (including
• Local Area Networks (LAN) telephones and PDAs) close to one person
• Metropolitan Area Network (MAN) • Reach is typically a few meters
• Wide Area Networks (WAN) • Can be used for communication among the personal
• Wireless Local Area Network (WLAN) devices themselves (intrapersonal communication),
or for connecting to a higher level network and the
Internet (via uplink)
• Example: Bluetooth network
12/04/2021 9 12/04/2021 10
• Covers a local area, like a home, office, or group of • Large, usually spanning a city
buildings • Typically use wireless infrastructure or optical fiber
• Much higher data rates than WANs connections to link their sites
• Have smaller geographic range than WANs • Might be owned and operated by a single
• Could be wired or wireless organization;
• Example: network in a university campus eg • Will often provide means for internetworking of local
university or in a workplace. networks
• Example: Wimax
12/04/2021 11 12/04/2021 12
2
12/04/2021
• Covers a broad geographical area • The linking of two or more computers using wirless
connection.
• Used to connect LANs together, so that users and • Uses radio communication to accomplish the same
computers in one location can communicate with functionality that a wired LAN has.
users and computers in other distant locations • IEEE 802.11 (WiFi)
• E.g linking different sites of a company or university. • 10-100 Mbps, 1.5km
– 802.11 (1997): upto 2 Mbps, 2.4 GHz
• Largest and most well-known example is the Internet
– 802.11a (1999): upto 54 Mbps, 5 GHz, ~75 feet outdoor
• WANs are most often built using leased lines – 802.11b (1999): upto 11 Mbps, 2.4 GHz, ~150 feet indoor, 300
ft outdoor [most popular]
– 802.11g (2003): upto 54 Mbps, 2.4 GHz, ~150 feet [backward
compatible with 802.11b]
– 802.11n – 2.4GHz and 5GHz, up to 600Mbps
12/04/2021 13 12/04/2021 14
12/04/2021 15 12/04/2021 16
12/04/2021 17 12/04/2021 18
3
12/04/2021
12/04/2021 19 12/04/2021 20
12/04/2021 23 12/04/2021 24
4
12/04/2021
12/04/2021 25 12/04/2021 26
5
4/14/2021
1 2
3 4
Presentation Layer
Application Layer
This layer provides independence from differences in
• User interacts with the OSI model at this layer through data representation/syntax (e.g., encryption)
applications. Examples:
• Application layer provides network services to conversion from ASCII to EBCDIC
applications through different protocols. Encryption and decryption of data
• The application layer contains a variety of protocols that Compression and decompression of data
are commonly needed by users.
• Examples: HTTP, FTP, Telnet, SMTP, POP3.
• These protocols give end-user applications access to
network resources.
3
5 6
1
4/14/2021
Port
65535
9 10
2
4/14/2021
Transport
layer:Multiplexing/demultiplexing Transport layer protocols
Demultiplexing at rcv host: Multiplexing at send host:
gathering data from multiple
delivering received segments
sockets, enveloping data with
• There are two protocols
to correct socket
header (later used for – Transport Control Protocol(TCP)
demultiplexing)
= socket = process – User Datagram Protocol(UDP)
application P3 P1
P1
application P2 P4 application
host 2 host 3
host 1
3-13 14
15 3-16
17 18
3
4/14/2021
Network layer
Transport vs. network layer
• Network layer: logical Household analogy:
communication 12 kids sending letters to 12
kids
(connection) between hosts
• Processes = kids
• Transport layer: logical • App messages = letters in
communication between envelopes
processes • Hosts = houses
– Relies on, enhances, network • Network-layer protocol =
layer services postal service – delivers
The network layer is responsible for message to host.
the delivery of individual packets from • Transport protocol = ann and
bill – delivers message to
the source host to the destination host. correct recipient (kid)
19 3-20
4
4/14/2021
27 28
29 30
5
4/14/2021
Figure 2.3 An exchange using the OSI model Figure 2.14 Summary of layers
31 32
TCP/IP Model
Remembering the 7 Layers
7 - Application All • Developed in the the late-60s
6 - Presentation People • The Defense Advance Research Projects Agency (DARPA)
5 - Session Seem
originally developed Transmission Control
Protocol/Internet Protocol (TCP/IP) to interconnect
4 - Transport To
various defense department computer networks.
3 - Network Need
• DARPA an agency of the U.S. Department of Defense
2 - Data Link Data
• Has four layers.
1 - Physical Processing
33 34
35 36
6
4/14/2021
37 38
39 40
41 42
7
4/14/2021
43 44
7th
Application Layer
6th
application Presentation Layer Application
layer Application data message Layer
5th
Session Layer
4th
Transport Layer
transport TCP TCP TCP
segment
Transport Layer
layer header data header data header data 3rd
Internet Layer
Network Layer
2nd
Internet IP TCP
packet
Link Layer
layer header header data 1st
Network Access
Layer
Physical Layer
45 46
8
ECCI 2105 / ECSI 2208 19/04/2021
Transmission Media
1 2
1
ECCI 2105 / ECSI 2208 19/04/2021
9 10
2
ECCI 2105 / ECSI 2208 19/04/2021
13 14
15 16
17 18
3
ECCI 2105 / ECSI 2208 19/04/2021
19 20
copper or aluminum
conductor
21 22
23 24
4
ECCI 2105 / ECSI 2208 19/04/2021
25 26
27 28
29 30
5
ECCI 2105 / ECSI 2208 19/04/2021
31 32
33 34
35 36
6
ECCI 2105 / ECSI 2208 19/04/2021
37 38
41 42
7
ECCI 2105 / ECSI 2208 19/04/2021
Antennas Antennas
43 44
45 46
47 48
8
ECCI 2105 / ECSI 2208 19/04/2021
49 50
51 52
Infrared
• Uses transmitters/receivers (transceivers) that modulate
noncoherent infrared light.
• Transceivers must be within line of sight of each other
(directly or via reflection ).
• Unlike radio waves, infrared does not penetrate walls.
• Example use: TV remote control
53
9
19/04/2021
6.1 2
TRANSMISSION MODES
Data transmission modes
• The transmission of binary data across a
link can be accomplished in either parallel
or serial mode
mode..
• In parallel mode, multiple bits are sent with
each clock tick
tick..
• In serial mode, 1 bit is sent with each clock
tick..
tick
• While there is only one way to send parallel
data, there are two subclasses of serial
transmission: asynchronous and
synchronous..
synchronous
3 4
5 6
1
19/04/2021
Asynchronous Transmission
Figure 4 Asynchronous transmission
• In asynchronous transmission, we
send 1 start bit(s) (0) at the beginning
and 1 or more stop bits (1s) at the end
of each byte.
• In addition to the control data small
gaps are inserted between each
chunk to distinguish each group.
• Slower data rate
7 8
Synchronous Transmission
Asynchronous transmission
• In synchronous transmission, we send bits one
after another without start or stop bits or gaps.
• Synchronous transmission sends data as one long
bit stream or block of data.
• Each bit is sent one after the other.
• It is the responsibility of the receiver to group the
bits.
• The receiver counts the bits and reconstructs
bytes.
• Needs clock signal between the sender and the
receiver
9 10
Synchronous Transmission
Synchronous transmission
• It is essential that timing is maintained between
sender and receiver as there are no start and stop
bits and no gaps.
• Needs clock signal between the sender and the
receiver
• Requires master/slave configuration. The master
provides the timing signal.
• Faster data rate compared to asynchronous
transmission as there are no start and stop bits
11 12
2
19/04/2021
6.13 6.14
MULTIPLEXING
6.15 16
17 18
3
19/04/2021
FM
6.19 20
21 6.22
23 24
4
19/04/2021
6.25 26
6.29
5
25/04/2021
3 4
5 6
1
25/04/2021
frequency bands
• Unused transmission
time in frequency
bands go idle.
• Example: 6-station
LAN, 1,3,4 have
packets, frequency
bands 2,5,6 idle
7 8
11 12
2
25/04/2021
Ethernet
• Widely used LAN technology
• First network to provide CSMA/CD
• Developed in 1976 by Xerox PARC (Palo Alto Research
Center) in cooperation with DEC and Intel
LAN Technologies • Can support data rates in the range of 10Mbps- 10 Gbps
• Used with a bus or star topology
•Ethernet
•FDDI
•Token Ring
17 18
3
25/04/2021
switch
star
19 20
21 22
23 24
4
25/04/2021
27 28
D
C
29 30
5
25/04/2021
FDDI
FDDI
E
B
C D
31 32
Copyri ght ©2000 The McGra w Hi l l Companies Leon-Garcia & Wi djaja: Communication Networks Fi gure 6.62
6.33
6
ECCI 2105 4/26/2021
between host/router
and physical link 223.1.3.1 223.1.3.2
– router’s typically have
multiple interfaces
– IP addresses associated with
each interface 223.1.1.1 = 11011111 00000001 00000001 00000001
223 1 1 1
1 2
3 4
5 6
1
ECCI 2105 4/26/2021
7 8
9 10
11 12
2
ECCI 2105 4/26/2021
13 14
15 16
Default route:
•In computer networking, the default route is a setting on a computer that
defines the packet forwarding rule to use when no specific route can be
determined for a given Internet Protocol (IP) destination address.
•All packets for destinations not established in the routing table are sent via
17
the default route. 18
3
ECCI 2105 4/26/2021
19 20
21 22
part of IP address
– can physically reach each 223.1.2.6 223.1.3.27
other without network consisting of 3 subnets
223.1.2.1 223.1.2.2 223.1.3.1 223.1.3.2
intervening router
23 24
4
ECCI 2105 4/26/2021
Features of CIDR
• Elimination of classful addressing
Routing (CIDR)
25 26
29 30
5
ECCI 2105 4/26/2021
31 32
33 34
35 36
6
4/28/2021
Introduction
• Internet Protocol version 6, is a new addressing protocol
• It is 128 bits unlike IPv4 which is 32 bits hence it has very
many IP addresses
IPv6 • Along with its offering of enormous amount of logical address
space, this protocol has ample of features which addresses
today’s shortcoming of IPv4.
1 2
3 4
5 6
1
4/28/2021
7 Page 8
The double colon "::" can be used to compress leading zeros in an address as
displayed in the given example. Page 9 Page 10
2
4/28/2021
Page 13 Page 14
Page 15 Page 16
2001:0DB8::84C2
HTTP
2001:0DB8::84C2
Zone Y
3
4/28/2021
Page 19 Page 20
4
06/05/2021
Introduction
Routing Protocols
1 2
Introduction Introduction
3 4
5 6
1
06/05/2021
9 10
11 12
2
06/05/2021
13 14
17
3
5/6/2021
1 2
3 4
5 6
1
5/6/2021
8.9 10
2
5/6/2021
Each
packet
contains a
In the virtual circuit approach, a pre- virtual
planned route is established before any circuit
packets are sent. identifier
as well as VCI - Virtual circuit identifier
data.
8.13 14
15 16
Note
17 18
3
5/6/2021
MPLS
• The fundamental concept behind MPLS is that of labeling
packets.
• MPLS adds a label in front of each packet.
MPLS • In MPLS forwarding is based on the label rather than on the
destination IP address.
• Making the label an index into an internal table makes finding
the correct output line just a matter of table lookup.
Multiprotocol Label Switching • Using this technique, forwarding can be done very quickly
compared to routing based on IP address.
• MPLS makes use of virtual circuits – MPLS is connection
oriented - connection has to be established before data can
be sent
19 20
6.21 6.22
6.23 6.24
4
5/6/2021
25 26
MPLS MPLS
• New MPLS header had to be • The MPLS headers are not part of the network layer
added in (IP) packet or the data link layer frame
front of the IP header.
• On a router-to-router line
• MPLS is to a large extent independent of both layers
using PPP as the framing • Among other things, this property means it is possible
protocol, the frame format, to build MPLS switches that can forward both IP
including the PPP, MPLS, IP,
and TCP headers, is as
packets and non-IP packets, depending on what shows
shown up.
• This feature is where the ‘‘multiprotocol’’ in the name
MPLS came from.
• MPLS can also carry IP packets over non-IP networks
e.g ethernet
27 28
5
5/10/2021
Virtual LANs
3 Collision domains
3 Broadcast domains
1 ECSE 2106 2
Advantages Of VLAN
Note: • Reduce cost and installation time:
– Instead of physically moving a station to another segment or another
switch, it can be moved by software.
VLANs create separate broadcast • Increase security:
– A group of users needing a high security can be put into a VLAN so
domains. that NO users outside the VLAN can communicate with them.
– Stations belong to the same group can send broadcast messages that
will NOT be received by users in others VLAN groups
• Creating Virtual Workgroups
– EXAMPLE: people from different departments working on the same
project can be put on the same VLAN
– Different departments can be in different VLANs
1
5/10/2021
MAN
Wireless Networks PAN
802.15.x
LAN
802.11
802.16
WAN
10m 100m e.g 2G,
e.g Bluetooth e.g WiFi 2-6km
e.G WiMax
3G, 4G
6-9 6-10
6-11 12
2
5/10/2021
6-13 6-14
Introduction
• The linking of two or more computers without using wires
• Uses radio communication to accomplish the same
functionality that a wired LAN
Wireless LAN • IEEE 802.11 (WiFi – Wireless Fidelity)
• Uses unlicensed spectrum – 2.4GHz or 5GHz
• 10-600 Mbps, 1.5km
– 802.11 (1997): upto 2 Mbps, 2.4 GHz
– 802.11a (1999): upto 54 Mbps, 5 GHz, ~75 feet outdoor
– 802.11b (1999): upto 11 Mbps, 2.4 GHz, ~150 feet indoor, 300
ft outdoor [most popular]
– 802.11g (2003): upto 54 Mbps, 2.4 GHz, ~150 feet [backward
compatible with 802.11b]
– 802.11n – up to 600 Mbps, 2.4GHz or 5GHz
15 16
17 18
3
5/10/2021
19 20
21 22
Introduction Introduction
• Bluetooth is a wireless LAN technology designed to • Bluetooth was originally started as a project by the Ericsson
connect devices of different functions such as Company.
telephones, notebooks, computers (desktop and • It is named for Harald Blaatand, the king of Denmark (940-
laptop), cameras, printers, coffee makers, and 981) who united Denmark and Norway.
so on. • Blaatand translates to Bluetooth in English.
• A Bluetooth LAN is an ad hoc network, which means • Today, Bluetooth technology is the implementation of a
that the network is formed spontaneously; the devices, protocol defined by the IEEE 802.15 standard.
sometimes called gadgets, find each other and make a
• The standard defines a wireless personal-area network (PAN)
network called a piconet.
operable in an area the size of a room or a hall.
• A Bluetooth LAN, by nature, cannot be large. It cannot
handle many devices
23 24
4
5/10/2021
25 26
Architecture Piconet
• Bluetooth defines two types of networks:
piconet and scatternet.
27 28
Piconet Scatternet
• A Bluetooth network is called a piconet, or a
small net.
• A piconet can have up to eight stations, one of
which is called the primary the rest are called
secondary.
• A piconet can have only one primary station. The
primary station is the master and the other are
slaves.
• The communication between the primary and the
secondary can be one-to-one or one-to-many.
Fig. 3.25 shows a piconet.
29 30
5
5/10/2021
Scatternet
• Piconets can be combined to form what is called
a scatternet.
• A secondary station in one piconet can be the Wimax
primary in another piconet.
• This station can receive messages from the
primary in the first piconet (as a secondary) and, Wireless Interoperability for
acting as a primary, deliver them to secondaries
Microwave Access
in the second piconet.
• A station can be a member of two piconets. Fig.
3.26 illustrates a scatternet.
31 32
Introduction
• In practical terms, WiMAX operation is similar to WiFi
but at higher speeds, over greater distances and for a
greater number of users.
• Range - 30-mile (50-km) radius from base station
• Speed – Up to 70 Mbps
• Line-of-sight not needed between user and base
station
• Frequency bands - 2 to 11 GHz and 10 to 66 GHz
(licensed and unlicensed bands)
• Defines both the MAC and PHY layers and allows
multiple PHY-layer specifications
33 34
Architecture Architecture
• A WiMAX system consists of two parts: • A WiMAX tower station can connect directly to the
– A WiMAX tower, similar in concept to a cell-phone Internet using a high-bandwidth, wired connection
tower e.g fiber.
• A single WiMAX tower can provide coverage to a very • It can also connect to another WiMAX tower using a
large area – radius of up to 50km - as big as 8,000 line-of-sight, microwave link.
square km. – This connection to a second tower (often referred to as
– A WiMAX receiver - The receiver and antenna a backhaul), along with the ability of a single tower to
could be a small box, or they could be built into a cover up to 3,000 square miles, is what allows WiMAX to
provide coverage to remote rural areas.
laptop the way WiFi access is today.
35 36
6
5/10/2021
Wimax Services
– There is the non-line-of-sight, WiFi sort of service, where a
small antenna on your computer connects to the tower.
• In this mode, WiMAX uses a lower frequency range -- 2 GHz to 11
GHz (similar to WiFi).
• Lower-wavelength transmissions are not as easily disrupted by
Cellular Networks
physical obstructions -- they are better able to diffract, or bend,
around obstacles.
• Up to 8km
– There is line-of-sight service, where a fixed dish antenna
points straight at the WiMAX tower from a rooftop or pole.
• Line-of-sight transmissions use higher frequencies, with ranges
reaching a possible 66 GHz.
• Up to a range of 50km
37 38
39 40
1G 2G 2.5G 3G 4G
41 42
7
5/10/2021
43 44
47 48
8
5/10/2021
5G 5G
5G
Machine to machine communication
• Machine to machine (M2M) is a broad label
that can be used to describe any technology
that enables networked devices to exchange
information and perform actions without the
manual assistance of humans.
• Example - In product restocking, for example,
a vending machine can message the
distributor when a particular item is running
low.
51 52
53 54
9
5/10/2021
200 802.11n
4G – LTE/LTE-A
54 802.11a,g 802.11a,g point-to-point data PAN LAN MAN
WAN
Data rate (Mbps)
802.15.x 802.11
5-11 802.11b 802.16 (WiMAX) 802.16
4 3G cellular 10m 100m e.g 2G,
UMTS/WCDMA-HSPDA, CDMA2000-1xEVDO
enhanced e.g Bluetooth e.g WiFi 2-6km
1 802.15
e.G WiMax
3G, 4G
10
5/17/2021
1 2
5 6
1
5/17/2021
Data Terminal Equipment and Data Data Terminal Equipment and Data Communication
Communication Equipment Equipment
• Data terminal equipment (DTE)
• Source of data
• They connect into data communication equipment
(DCE) like a channel service unit/data service unit
(CSU/DSU).
• Router interfaces, for example, are data terminal
equipment (DTE)
• It could also be a computer
• DCE – Data communicating equipment
– Devices used to establish, maintain and terminate
DTE-DCE-DTE WAN Connection communication network sessions in a WAN
– Made up of CSU and DSU
7 8
9 10
11 12
2
5/17/2021
13 14
15 16
17 18
3
5/17/2021
19 20
21 22
Frame Relay
X.25
• Frame-relay is an older WAN technology that was an
alternative to leased lines.
• X.25 supports multiple simultaneous conversations by
multiplexing packets and using virtual communication • With a leased line, only one company uses the link so it’s
channels. quite an expensive option.
• X.25 Packet Switched networks allow remote devices to • Frame-relay offers point-to-point and point-to-multipoint
communicate with each other over private digital links
without the expense of individual leased lines. circuits with a switched/shared network, which is cheaper
• It was developed before the OSI Reference Model or the than a dedicated line.
equivalent Network Access Layer of the TCP/IP protocol • It offers lower-cost data transfer when compared to typical
model, and its functionality does not map precisely to either point-to-point applications, by using virtual connections
model.
within the frame relay network
• X.25 is now obsolete. It was replaced by IP, ATM, frame relay
etc • The Virtual connections are combined into a single physical
connection at each location.
• It operates at the physical and data link layers of the OSI
reference model.
23 24
4
5/17/2021
25 26
27 28
29 30
5
5/17/2021
31 32
ATM switches
H
ATM Network H
H H H
H H H H H H destination
33 34
35 36
6
5/17/2021
39 40
7
6/3/2021
Outline
• Virtual private networks
• Firewall
• Intrusion detection system
Network Security
1 2
8-3 8-4
firewall
8-5 8-6
1
6/3/2021
8-7 8-8
8-9 8-10
2
6/3/2021
13 14
15 16