You are on page 1of 52

Computer

networks and
communications
Chap 1: Introduction
Lecturer: Dr. Trong-Minh Hoang
Chapter 1: INTRODUCTION

Content
1.1 General introduction
1.2 Network types and network technologies
1.3 Network Protocols
1.4 Standard system
Chapter 1: INTRODUCTION
1.1 General introduction
Network
A network is a set of devices (often referred to as nodes) connected by communication
links.
Computer network
“Computer network’’ means a collection of autonomous computers interconnected by
a single technology. Two computers are said to be interconnected if they are able to
exchange information.
The connection need not be via a copper wire; fiber optics, microwaves, infrared, and
communication satellites can also be used.
Networks come in many sizes, shapes, and forms.
The Internet is the most well-known example of a network of networks
Chapter 1: INTRODUCTION
1.1 General introduction
What is telecommunication?
The term telecommunication means communication at a distance. The word data refers
to information presented in whatever form is agreed upon by the parties creating and
using the data.
What is data communications?
Data communications are the exchange of data between two devices via some form of
transmission media such as a wire cable or wireless.
• Delivery → Correct destination
• Accuracy → Accurate data
• Timelines → Real-time transmission
• Jitter → Uneven delay
Chapter 1:INTRODUCTION
1.1 General introduction
USES OF COMPUTER NETWORKS
1. Business Applications
o Distribute information throughout the company (resource sharing), sharing physical
resources such as printers, and tape backup systems are sharing information.
o Client-server model. It is widely used and forms the basis of many network usage.
communication mediums among employees. email (electronic mail), which employees
generally use for a great deal of daily communication.
o Telephone calls between employees may be carried by the computer network instead of by
the phone company. This technology is called IP telephony or Voice over IP (VoIP) when
Internet technology is used.
o Desktop sharing lets remote workers see and interact with a graphical computer screen
doing business electronically, especially with customers and suppliers. This new model is
called e-commerce (electronic commerce) and it has grown rapidly in recent years.
Chapter 1:INTRODUCTION
1.1 General introduction
USES OF COMPUTER NETWORKS
2. Home Applications
o person-to-person communication
o electronic commerce
o entertainment.(game playing,)
3 Mobile Users
o Text messaging or texting
o Smartphones
o GPS (Global Positioning System)
o m-commerce
o NFC (Near Field Communication)
Chapter 1: INTRODUCTION
1.1 General introduction
USES OF COMPUTER NETWORKS
4. Social Issues
With the good comes the bad, as this new-found freedom brings with it many unsolved social,
political, and ethical issues.
o Social networks, message boards, content-sharing sites, and a host of other applications
allow people to share their views with like-minded individuals. As long as the subjects are
restricted to technical topics or hobbies like gardening, not too many problems will arise.
o Computer networks make it very easy to communicate. They also make it easy for the
people who run the network to snoop on the traffic.
o A new twist with mobile devices is location privacy. As part of the process of providing
service to your mobile device, the network operators learn where you are at different times
of the day. This allows them to track your movements. They may know which nightclub
you frequent and which medical center you visit.
Chapter 1: INTRODUCTION
1.1 General introduction
USES OF COMPUTER NETWORKS
5. Electronic Commerce
Online shopping is already popular; users can browse the online catalogs of thousands of
companies and have products shipped right to their doorsteps.
Chapter 1: INTRODUCTION
1.1 General introduction
USES OF COMPUTER NETWORKS
6. The Internet of Things
Ubiquitous computing entails computing that is embedded in everyday life, as in the
vision of Mark Weiser (1991). Many homes are already wired with security systems
that include door and window sensors.
The Internet of Things (IoT) is a network of physical devices, vehicles, home
appliances, and other items that are embedded with sensors, software, and network
connectivity. These devices can exchange data and interact with each other over the
internet, without requiring human-to-human or human-to-computer interaction.
Examples of IoT devices include smart home systems, wearable fitness trackers,
industrial sensors, and self-driving cars. The number of IoT devices is expected to
continue to grow rapidly in the coming years, with estimates suggesting that there will
be over 30 billion connected devices by 2025.
Chapter 1: INTRODUCTION
1.1 General introduction
Data communication
- Representation: Text, Number, Images, Audio, Video
- Data Flow: Simplex, Half-duplex Full-duplex
Chapter 1: INTRODUCTION
1.1 General introduction
Data communications
The effectiveness of a data communications system depends on four fundamental
characteristics: delivery, accuracy, timeliness, and jitter.
o Delivery. The system must deliver data to the correct destination. Data must be received by
the intended device or user and only by that device or user.
o Accuracy. The system must deliver the data accurately. Data that have been altered in
transmission and left uncorrected are unusable.
o Timeliness. The system must deliver data in a timely manner. Data delivered late are
useless. In the case of video and audio, timely delivery means delivering data as they are
produced, in the same order that they are produced, and without significant delay. This kind
of delivery is called real-time transmission.
o Jitter. Jitter refers to the variation in the packet arrival time. It is the uneven delay in the
delivery of audio or video packets.
Chapter 1: INTRODUCTION
1.1 General introduction
Data communications
A data communications system has five components
o Message. The message is the information (data) to be communicated. Popular
forms of information include text, numbers, pictures, audio, and video.
o Sender. The sender is the device that sends the data message. It can be a computer,
workstation, telephone handset, video camera, and so on.
o Receiver. The receiver is the device that receives the message. It can be a
computer, workstation, telephone handset, television, and so on.
o Transmission medium. The transmission medium is the physical path by which a
message travels from sender to receiver. Some examples of transmission media
include twisted-pair wire, coaxial cable, fiber-optic cable, and radio waves.
o Protocol. A protocol is a set of rules that govern data communications. It represents
an agreement between the communicating devices. Without a protocol, two
devices may be connected but not communicating.
Chapter 1: INTRODUCTION
1.1 General introduction
Data communications
Data Flow. Communication between two devices
can be simplex, half-duplex, or full-duplex
o Simplex. In simplex mode, the communication is
unidirectional. Only one of the two devices on a
link can transmit; the other can only receive.
o Half-Duplex. In half-duplex mode, each station
can both transmit and receive, but not at the same
time. When one device is sending, the other can
only receive it, and vice versa.
o Full-Duplex. In full-duplex, both stations can
transmit and receive simultaneously. One common
example of full-duplex communication is the
telephone network.
Chapter 1: INTRODUCTION
1.1 General introduction
Network criteria
A network must be able to meet a certain number of criteria. The most important of
these are performance, reliability, and security.
o Performance. Performance can be measured in many ways, including transit time and
response time. Performance is often evaluated by two networking metrics: throughput and
delay. We often need more throughput and less delay. However, these two criteria are
often contradictory.
o Reliability. In addition to the accuracy of delivery, network reliability is measured by the
frequency of failure, the time it takes a link to recover from a failure, and the network's
robustness in a catastrophe.
o Security. Network security issues include protecting data from unauthorized access,
protecting data from damage and development, and implementing policies and procedures
for recovery from breaches and data losses.
Chapter 1: INTRODUCTION
1.2 Types of computer network and network technologies
Types of a computer network: Broadband Access Networks
o Broadband access networks are communication networks that provide high-speed
internet access to end-users. These networks use a variety of technologies and
architectures to deliver broadband services, including wired and wireless
connections.
o Wired broadband access networks typically use a physical medium, such as copper
or fiber optic cables, to connect users to the network.
o Wireless broadband access networks use radio waves to connect users to the
network, making them ideal for providing connectivity to mobile devices and
remote locations. Cellular networks, Wi-Fi, and satellite internet are examples of
wireless broadband access technologies.
Chapter 1: INTRODUCTION
1.2 Types of computer network and network technologies
Types of a computer network: Mobile and Wireless Access Networks
o Mobile and wireless access networks are types of communication networks that provide
connectivity to mobile devices and allow for wireless communication over a wide area.
o Mobile networks are typically operated by mobile network operators (MNOs) and use
cellular technology to provide voice and data services. Cellular networks use a series of
interconnected base stations to provide coverage over a wide geographic area, with each
base station providing coverage to a specific geographic area or cell.
o Wireless access networks provide connectivity to devices within a smaller geographic
area, such as a home or office building. Wireless local area networks (WLANs) or Wi-Fi
networks are common examples of wireless access networks.
Chapter 1: INTRODUCTION
1.2 Types of computer network and network technologies
Types of a computer network: Content
Provider Networks
o Content provider networks, also known as
content delivery networks (CDNs), are a type of
network infrastructure that enables the efficient
distribution of digital content such as video,
audio, images, and other types of web content.
o A content provider network typically consists of
a geographically distributed network of servers
that are strategically placed in various locations
around the world.
Chapter 1: INTRODUCTION
1.2 Types of computer network and network technologies
Types of a computer network: Transit
Networks
o Transit networks are a type of
communication network infrastructure that
interconnects multiple other networks to
provide wide-area connectivity.
o Transit networks serve as a backbone for
internet traffic, enabling data to be
transported between different networks
and locations.
Chapter 1: INTRODUCTION
1.2 Types of computer network and network technologies
Types of a computer network:
Enterprise Networks
o Enterprise networks are communication
networks that are designed to meet the
specific needs of businesses and
organizations.
o Enterprise networks typically consist of
multiple interconnected sub-networks,
such as local area networks (LANs), wide
area networks (WANs), and wireless
networks.
Chapter 1: INTRODUCTION
1.2 Types of computer network and network technologies
Network technologies: Personal Area Networks
o Personal Area Networks (PANs) are short-range communication networks that
connect devices in close proximity to an individual user.
o PANs can be established using a variety of wireless communication technologies,
including Bluetooth, ZigBee, and NFC (Near Field Communication). These
technologies enable devices to communicate with one another over short distances,
typically within a range of a few meters.
Chapter 1: INTRODUCTION
1.2 Types of computer network and network technologies
Network technologies: Local Area Networks
o A LAN (Local Area Network) is a private network that operates within and nearby a
single building such as a home, office, or factory. LANs are widely used to connect
personal computers and consumer electronics to let them share resources (e.g.,
printers) and exchange information.

o
Chapter 1: INTRODUCTION
1.2 Types of computer network and network technologies
Network technologies: Home Networks
o Home networks are a type of LAN; they may have a broad, diverse range of Internet-
connected devices, and must be particularly easy to manage, dependable, and secure,
especially in the hands of nontechnical users.
Chapter 1: INTRODUCTION
1.2 Types of computer network and network technologies
Network technologies: Metropolitan Area Networks
o A MAN (Metropolitan Area Network) covers a city. The best-known examples of
MANs are cable television networks.
Chapter 1: INTRODUCTION
1.2 Types of computer network and network technologies
Network technologies: Wide Area Networks
o A WAN (Wide Area Network) spans a large geographical area, often a country, a
continent, or even multiple continents. A WAN may serve a private organization, as in
the case of an enterprise WAN, or it may be a commercial service offering, as in the
case of a transit network.
Chapter 1: INTRODUCTION
1.2 Types of computer network and network technologies
Network technologies: Virtual Private Networks and SD-WANs
Virtual Private Networks (VPNs) and Software-Defined Wide Area Networks (SD-
WANs) are both technologies that allow for secure and efficient network connections.
VPNs are typically used by individual users to securely access a private network, while
SD-WANs are used by organizations to manage and optimize their network traffic across
multiple locations
Chapter 1: INTRODUCTION
1.2 Types of computer network and network technologies
Network technologies: Internetworks
A collection of interconnected networks is called an internetwork or internet.
Chapter 1: INTRODUCTION
1.2 Types of computer network and network technologies
Network technologies: Internetworks
A collection of interconnected networks is called an internetwork or internet.
Chapter 1: INTRODUCTION
1.2 Types of computer network and network technologies
Network technologies: Cellular network
A cellular network is a wireless communication network that uses a series of
interconnected base stations to provide mobile communication services to users. The
network is divided into small geographic areas called cells, each of which is served by a
base station or tower. When a mobile device is within range of a base station, it can
establish a connection to the cellular network.
Chapter 1: INTRODUCTION
1.2 Types of computer network and network technologies
Network technologies: Wireless Networks (WiFi)
802.11 systems operate in unlicensed bands such as the ISM (Industrial, Scientific, and
Medical) bands defined by ITU-R (e.g., 902-928 MHz, 2.4-2.5 GHz, 5.725-5.825 GHz).
802.11 networks have clients, such as laptops and mobile phones, as well as
infrastructure called APs (access points) that is installed in buildings.

(a) Wireless network with an access point. (b) Ad hoc network.


Chapter 1: INTRODUCTION
1.3 Network protocols
Network protocols are sets of rules and conventions that define how data is
transmitted, received, and processed between devices on a network.
Design Goals: Reliability
Reliability is the design issue of making a network that operates correctly even
though it is comprised of a collection of components that are themselves
unreliable.
o One mechanism for finding errors in received information uses codes for error
detection.
o Another reliability issue is finding a working path through a network.
Chapter 1: INTRODUCTION
1.3 Network protocols
Design Goals: Resource Allocation
Designs that continue to work well when the network gets large are said to be
scalable.
o Many designs share network bandwidth dynamically, according to the short-
term needs of hosts, rather than by giving each host a fixed fraction of the
bandwidth that it may or may not use.
o The problem that occurs at every level is how to keep a fast sender from
swamping a slow receiver with data. Feedback from the receiver to the sender
is often used. This subject is called flow control.
o Overloading of the network is called congestion.
o Quality of service is the name given to mechanisms that reconcile these
competing demands.
Chapter 1: INTRODUCTION
1.3 Network protocols
Design Goals: Evolvability
Another design issue concerns the evolution of the network. Over time, networks
grow larger and new designs emerge that need to be connected to the existing
network.
o Since there are many computers on the network, every layer needs a
mechanism for identifying the senders and receivers that are involved in a
particular message. This mechanism is called addressing or naming, in the low
and high layers, respectively.
o An aspect of growth is that different network technologies often have different
limitations. This leads to mechanisms for disassembling, transmitting, and then
reassembling messages. This overall topic is called internetworking.
Chapter 1: INTRODUCTION
1.3 Network protocols
Design Goals: Security
The last major design issue is to secure the network by defending it against
different kinds of threats.
o Mechanisms that provide confidentiality defend against this threat, and they are
used in multiple layers.
o Mechanisms for authentication prevent someone from impersonating someone
else.
o Other mechanisms for integrity prevent surreptitious changes to messages.
Chapter 1: INTRODUCTION
1.3 Network protocols
Protocol Layering
To reduce their design complexity, most
networks are organized as a stack of layers or
levels, each one built upon the one below it.
The purpose of each layer is to offer certain
services to the higher layers while shielding
those layers from the details of how the
offered services are actually implemented. In
a sense, each layer is a kind of virtual
machine, offering certain services to the layer
above it.
A protocol is an agreement between the
communicating parties on how
communication is to proceed.
Chapter 1: INTRODUCTION
1.3 Network protocols
Protocol Layering
o A set of layers and protocols is called network architecture.
o A list of the protocols used by a certain system, one protocol per layer, is called a
protocol stack.
o Between each pair of adjacent layers is an interface.
o The entities comprising the corresponding layers on different machines are called
peers.
Chapter 1: INTRODUCTION
1.3 Network protocols
Protocol Layering
o Example information flow
supporting virtual
communication in layer 5.
Chapter 1: INTRODUCTION
1.3 Network protocols
Connections and Reliability
Layers offer two types of service to the layers above them: connection-oriented
and connectionless. They may also offer various levels of reliability.
o Connection-oriented service is modeled after the telephone system. A circuit is
another name for a connection with associated resources, such as a fixed
bandwidth.
o In contrast to connection-oriented service, connectionless service is modeled
after the postal system. There are different names for messages in different
contexts; a packet is a message at the network layer. Unreliable (meaning not
acknowledged) connectionless service is often called datagram service.
Chapter 1: INTRODUCTION
1.3 Network protocols
Connections and Reliability
Six different types of service.
Chapter 1: INTRODUCTION
1.3 Network protocols
Service Primitives
A service is formally specified by a set of primitives (operations) available to
user processes to access the service. These primitives tell the service to perform
some action or report on an action taken by a peer entity.
Chapter 1: INTRODUCTION
1.3 Network protocols
Service Primitives
A simple client-server interaction using acknowledged datagrams.
Chapter 1: INTRODUCTION
1.3 Network protocols
The Relationship of Services to Protocols
Services and protocols are distinct concepts. A service is a set of primitives
(operations) that a layer provides to the layer above it. A protocol, in contrast, is a set
of rules governing the format and meaning of the packets, or messages that are
exchanged by the peer entities within a layer.
Chapter 1: INTRODUCTION
1.4 Reference Model
The OSI Reference Model
This model is based on a
proposal developed by the
International Standards
Organization (ISO) as a first
step toward international
standardization of the protocols
used in the various layers.
Chapter 1: INTRODUCTION
1.4 Reference Model
The OSI Reference Model
The principles that were applied to arrive at the seven layers can be briefly
summarized as follows:
o A layer should be created where a different abstraction is needed.
o Each layer should perform a well-defined function.
o The function of each layer should be chosen with an eye toward defining
internationally standardized protocols.
o The layer boundaries should be chosen to minimize the information flow
across the interfaces.
o The number of layers should be large enough that distinct functions need not
be thrown together in the same layer out of necessity and small enough that
the architecture does not become unwieldy.
Chapter 1: INTRODUCTION
1.4 Reference Model
The TCP/IP Reference Model
The TCP/IP reference model is used in the grandparent of all wide area computer
networks, the ARPANET, and its successor, the worldwide Internet.
Chapter 1: INTRODUCTION
1.5 Standards
Innovation in Internet technology often depends as much on policy and legal
issues as it does on the technology itself. Traditionally, Internet protocols have
advanced through a standardization process.
Standardization and Open Source
o Standards define what is needed for interoperability: no more, no less.
o A protocol standard defines the protocol over the wire but not the service
interface inside the box, except to help explain the protocol.
o Standards fall into two categories: de facto and de jure. De facto (Latin for
‘‘from the fact’’) standards are those that have just happened, without any
formal plan. De jure (Latin for ‘‘by law’’) standards, in contrast, are adopted
through the rules of some formal standardization body.
o In practice, the relationships between standards, companies, and
standardization bodies are complicated.
Chapter 1: INTRODUCTION
1.5 Standards
Telecommunications World
o In 1865, representatives from many European governments met to form the
predecessor to today’s ITU (International Telecommunication Union).
o ITU has three main sectors. ITU-T, ITU-R, and TTU-D.
o The real work of ITU-T is done in its Study Groups. There are currently 11
o Study Groups, often as large as 400 people, that cover topic ranging from
telephone billing to multimedia services to security.
o the Study Groups are divided into Working Parties, which are in turn divided
o into Expert Teams, which are in turn divided into ad hoc groups. Once a
bureaucracy, always a bureaucracy.
Chapter 1: INTRODUCTION
1.5 Standards
the International Standards World
International standards are produced and published by ISO (International
Standards Organization†), a voluntary non-treaty organization founded in 1946.
o Over 21,000 standards have been issued, including the OSI standards. ISO has
over 200 Technical Committees (TCs), numbered in the order of their
creation, each dealing with some specific subject.
o A major player in the standards world is the IEEE (Institute of Electrical and
Electronics Engineers), the largest professional organization in the world. In
addition to publishing scores of journals and running hundreds of conferences
each year, IEEE has a standardization group that develops standards in the
area of electrical engineering and computing.
Chapter 1: INTRODUCTION
1.5 Standards
Internet Standards World
When the ARPANET was set up, DoD created an informal committee to oversee
it. In 1983, the committee was renamed the IAB (Internet Activities Board). The
meaning of the acronym ‘‘IAB’’ was later changed to Internet Architecture Board.
o 1989, the IAB has reorganized again. The researchers were moved to the IRTF
(Internet Research Task Force), which was made a subsidiary of IAB, along
with the IETF (Internet Engineering Task Force). Later, the Internet Society
was created, populated by people interested in the Internet.
o For Web standards, the World Wide Web Consortium (W3C) develops
protocols and guidelines to facilitate the long-term growth of the Web.
Chapter 1: INTRODUCTION
1.5 Standards
Metric Units
Chapter 1: Problems
R.1
1. An alternative to a LAN is simply a big timesharing system with terminals for all users.
Give two advantages of a client-server system using a LAN.
2. Five routers are to be connected in a point-to-point subnet. Between each pair of routers,
the designers may put a high-speed line, a medium-speed line, a low-speed line, or no
line. If it takes 50 ms of computer time to generate and inspect each topology, how long
will it take to inspect all of them?.
3. What are two reasons for using layered protocols? What is one possible disadvantage of
using layered protocols?
4. What does ‘‘negotiation’’ mean when discussing network protocols? Give an example.
5. Which of the OSI layers and TCP/IP layers handles each of the following:
(a) Dividing the transmitted bit stream into frames.
(b) Determining which route through the subnet to use.
Chapter 1: Problems
R.1
1. List two ways in which the OSI reference model and the TCP/IP reference model are the
same. Now list two ways in which they differ.
2. What is the main difference between TCP and UDP?
3. Wireless networks are easy to install, which makes them inexpensive since installation
costs usually far overshadow equipment costs. Nevertheless, they also have some
disadvantages. Name two of them.
4. List two advantages and two disadvantages of having international standards for network
protocols.
5. Suppose there is a change in the service (set of operations) provided by layer k. How
does this impact services at layers k-1 and k+1?
THANK YOU

You might also like