You are on page 1of 69

Computer Networks CSE 3711

-Background Studies-

Prof. Dr. A.K.M. Muzahidul Islam


Computer Science & Engineering (CSE)
United International University (UIU)

Summer 2023
Outline

Introduction to Data Communication

Introduction to Networking

Introduction to OSI Layer and TCP/IP Layer

Introduction to IP Addressing

Spring 2006
Data Communication
• The fundamental purpose of a communication system is the exchange
of data between two entities.
– E.g., Browsing through the Internet, PC-Laptop data transfer, etc.

• Networks are developed using data communication technology.


• Business data communication system
• consists of computers, ter­minals and communication links
• transmits numeric, textual, graphic, image, voice, etc.

• When we communicate we share information


– Local sharing, e.g. face-to-face
– Remote sharing, e.g. over some distance
• Data
– Information being shared, e.g. text, numbers, images, audio, video, etc.
• Data communication
– Exchange of data between two (or more) devices
1-4
– Via some form of transmission medium Spring 2006
Effective Data Communication
• Fundamental requirements of data communication
– Delivery - Accuracy - Timeliness - Jitter

• The effectiveness of a data communications system


depends on four fundamental characteristics:
– Delivery : The data must be delivered to the
correct destination.
– Accuracy : The data received must be accurate
representation of the data sent.
– Timeliness : The data should be delivered with
in a reasonable time.
– Jitter : It is the variation in the packet arrival
time. Uneven Jitter may affect the
timeliness of data being transmitted.
Components of Data Communication

1 Message: Information (data) to be communicated


2 Sender : the device that sends the data message
3 Receiver: the device that receives the data message
4 Medium: Physical path by which a message travels
5 Protocol: A set of rules that govern data communication

1-6
Spring 2006
Communications Model - Diagram

A Simple Model of Communication, illustrated by the Block Diagram

Communication between workstation and Server


Simplified Communications Model

Details of a Communication Model given using Electronic Mail as an


Example
Model Elements

The following are the key elements of the model:

• Source : Generates data to be transmitted


• Transmitter : Converts data into transmittable
signals
• Transmission
System : Carries data
• Receiver : Converts received signal into data
• Destination : Takes incoming data
Transmission System
• The com­munication links are established through various
• Equipment/Hardware
• Software.
• The requirements of equipment and software depend on
• Type of signal
• - Analog (e.g. voice) or Digital (binary data)
• Digital signals are less expensive to transmit and are more
susceptible to noise and inter­ference.
• For long dis­tance communication, using the existing
telecommunication lines becomes imperative
• The existing telecommunication lines are capa­ble of carrying
analog signals only.
• Communication channel
• The communication path between two devices through which
data are transmitted
• Capacity measured in terms of bandwidth and speed of
transmission.
• Topology of networking
Transmission Medium

The basic building block of any communications facility is


the transmission medium.
It is the physical link between the trans­mitting and the
receiving equipment.
• One of the basic choices facing a business user is the
Transmission Medium.
– Internal use entirely up to business
– Long-distance links made by carrier
• Rapid technology advances change mix media used
– Twisted pair - 10 Mbps – 100 Mbps
– Coaxial Cable – 10 Mbps
– Fiber optic – 1 Gbps
– Wireless – 10 Mbps – 500 Mbps
Communications Tasks
The simple narrative conceals a wealth of technical
complexity. The table below shows the lists of some of
the key tasks that must be performed in a data
communication.
Transmission system utilization Addressing
Interfacing Routing
Signal generation Recovery

Synchronization Message formatting


Exchange management Security

Error detection and correction Network management


Flow control
Networks

• A set of devices connected by communication links.


• Most network uses distributed processing.
• By 2022, there will be 28.5 billion fixed and mobile
personal devices and connections
– up from 18 billion in 2017
– 3.6 networked devices/connections per person, from 2.4 per
person.
• This affects traffic volume in a number of ways:
• It enables a user to be continuously consuming network
capacity
• Capacity can be consumed on multiple devices
simultaneously
• Different broadband devices enable different applications
which may have greater traffic generation capability
Network Criteria
To be considered effective and efficient, a network
must meet a number of criteria: Performance,
Reliability, and Security.
Performance : Can be measured in transmit
time and response time. Depends on factors:
• users,
• transmission medium,
• capabilities of connected hardware and
• the efficiency of software.
Reliability : Improving reliability is
usually related to various bugs fixes for
applications and technologies that result in a better
functioning. For example, announcements of Apple
or Microsoft about new OS updates with “enhanced
functionality and improved reliability”.
Security: The security issue often deals with
vulnerabilities of a system. OS bugs that make the
system vulnerable to an attack are usually 1-15
discussed. Spring 2006
Direction of Data Flow

• Communication between two devices can be:


– Simplex : Unidirectional communication e.g. one-
way street
– Half-duplex : Each station can transmit and receive
but not at the same time
– Full-duplex : Both station can transmit and receive
simultaneously
1-16
Spring 2006
Simplex/Half-duplex/Full-duplex
• Unidirectional
• As on a one-way street

• Both transmit and receive possible,


but not at the same time
• Like a one-lane road with two-
directional traffic
• Walkie-talkie

• Transmit and receive


simultaneously
• Like a two-way street
• Telephone
1-17
Type of Connection
- Point-to-Point & Multipoint

• Dedicated link between two • More than two devices share a


devices single link
• The entire capacity of the • Capacity of the channel is either
channel is reserved – Spatially shared: Devices can
• Ex) Microwave link, TV remote use the link simultaneously
control – Timeshare: Users take turns

1-18
Unicast/Broadcast/Multicast
Three different methods of sending messages
over computer networks:

Unicast - Using unicast method, one device will


send the message to exactly one destination
device e.g. a phone call between two people,
traffic from a web server to a browser,
Applications that use unicast standards (http,
smtp, ftp and telnet), etc.

Broadcast - Broadcast is a packet that’s sent to


all devices on specific network e.g. television
signals, ARP is used on LAN.

Multicast - Multicasting identifies logical groups.


A single message can then be sent to the group
e.g. “on demand” system capable of catering for
the likes of pay per view, or similar subscription-
based services.
Physical Topology

Mesh Star
Dedicated point-to-point link between each devices Dedicated point-to-point link to Central Controller (Hub)

Ring BUS
Dedicated point-to-point link only with the two nodes on One long cable that links all nodes 1-20
each sides
Categories of Networks

Spring 2006
LAN

• Usually privately owned


• A network for a single office, building, or campus  a few Km
• Common LAN topologies: bus, ring, star

1-22
MAN

• Designed to extend to an entire city


• Cable TV network, a company’s connected LANs
• Owned by a private or a public company

Spring 2006 1-23


WAN

• Long distance transmission, e.g., a country, a continent, the


whole world
• Enterprise network: A WAN that is owned and used by a
single company

Spring 2006 1-24


Wide Area Networks (WANs)

• Generally covers a large geographical area


• Require the crossing of public right-of-ways
• Rely at least in part on circuits provided by one or more
common carriers —companies
• Typically consist of a number of interconnected
switching nodes
• A trans-mission from any one device is routed through
these internal nodes to the specified destination device.
• Traditionally, Wide Area Networks have
been implemented using one of two
technologies:
– Circuit switching
– Packet switching
• Subsequently, the following two played major roles
– Frame relay
– Asynchronous Transfer Mode (ATM)
 Gradually being succeeded by services based on
gigabit Ethernet and Internet Protocol technologies.
Circuit Switching
• A dedicated communications path is established between two
stations through the nodes of the network
• The path is connected sequence of physical links between nodes
• On each link, a logical channel is dedicated to the connection
• Data generated by the source station are transmitted along the
dedicated path as rapidly as possible.
• The most common example of circuit switching is the telephone
network
Packet Switching
A1 A2 A3 A4 A5
• It is NOT necessary to dedicate transmission capacity along a path
through the network.
• Data are sent out in a sequence of small chunks called packets
• Packets are passed from node to node along SOME path leading
from source to destination
• Packet-switching networks are commonly used for terminal-to-
computer and computer-to-computer communications
• The Internet is based on a packet-switching protocol, TCP/IP.
Frame Relay
There are two types of packet switching services that are popular:
• Frame Relay and
• Asynchronous Transfer Mode (ATM)
• Packet switching was developed at a time when digital long-distance
transmission facilities exhibited a relatively high error rate compared
to today’s facilities.
• There is a considerable amount of overhead built into packet-switching
schemes to compensate for errors.
• Developed to take advantage of high data rates and low error rates.
Operates at data rates of up to 2 Mbps
• Key to achieving high data rates is to strip out most of the overhead
involved with error control
• Frame Relay turns physical interface in virtual interfaces.
Required No. of connections =
(N × (N – 1)) / 2
N : number of routers]

We need (4 x (4-1)) /2 = 6 leased


lines.
Asynchronous Transfer Mode (ATM)

• Referred to as cell relay. ATM can be viewed as an evolution


from frame relay.
• Culmination of developments in circuit switching and packet
switching
• Uses fixed-length packets called cells (Reduced Overhead)
• Works in range of 10s and 100s of Mbps and in the Gbps range
• Allows multiple channels with the data rate on each channel
dynamically set on demand
• ATM creates fixed routes between two points before data
transfer begins (TCP/IP - data is divided into packets, each
of which takes a different route to get to its destination).
Internetworks
• Internetwork (Internet) : two or more networks are
connected by internetworking devices
• Internetworking devices: Router, Gateway, etc.
• The Internet: a specific worldwide network

1-33
Spring 2006
The Internet

• Internet evolved from ARPANET, developed in 1969 by the


Advanced Research Projects Agency (ARPA) of the U.S.
Department of Defense (DoD).

– First operational packet-switching network


– Applied to tactical radio communication (packet radio) and to
satellite communication (SATNET)
– Had a need for interoperability
– Led to standardized TCP/IP protocols
Internet Elements
Figure illustrates - the key elements of Internet e.g. PCs,
workstations, servers, mainframes.

Most hosts that use the Internet are connected to a network e.g.,
local area network (LAN) or a wide area network (WAN).
These networks are in turn connected by routers.
Internet Architecture
• The Internet today is made
up of thousands of
overlapping hierarchical
networks.
• Hosts grouped into LANs,
linked to an Internet
service provider (ISP)
through a point of
presence (POP).
• The connection is made in
a series of steps starting
with the customer
premises equipment
(CPE).
• ISPs can be classified as
backbone or regional, with
peering links between.
Example Configuration
Illustrates some of the typical communications
and network elements in use today.

In the upper-left-hand portion of the


figure, we see an individual residential
user connected to an Internet service
provider (ISP) through some sort of
subscriber connection.

The Internet consists of a number of


interconnected routers that span the globe.
The routers forward packets of data from
source to destination through the Internet.

The lower portion shows a LAN


implemented using a single Ethernet
switch, eg. small business or organization.
Layered Models
The Layered Approach
• Digital Equipment Corporation (DEC, est. 1957) was a large
computer company (at one time, the 2nd-largest in the world
after IBM, est. 1924).
• Early stage DECnet and IBM could not communicate with each
other.
• Thus in late 1970s the Open Systems Interconnection (OSI)
reference model was created by the ISO to break the barrier.
• A reference model is a conceptual blueprint of how
communications should take place.
• It addresses all the processes required for effective communication
and divides these processes into logical groupings called layers.
• When a communication system is designed in this manner, it’s
39
known as layered architecture.
The OSI Model
• The OSI isn’t a physical
model. Rather, it’s a set of
guidelines that application
developers can use to create
and implement applications
that run on a network.
• It also provides a
framework for creating and
implementing networking
standards, devices, and
internetworking schemes.

40
The OSI Model
The upper layers (i.e. TOP THREE Layers The bottom layers (i.e. FOUR Layers define
define how the applications within the End how Data is transferred through a physical
stations will communicate with each other wire or Switches and Routers.
and with users. All People Seem To Need Data Processing

41
The OSI Model
The bottom layers (i.e. FOUR Layers define how Data is
transferred through a physical wire or Switches and Routers.

42
The OSI Model (Cont’d)
Summary of the Functions defined at each layer of the OSI Model

43
Internet Layers

• The Five-layer
Internet Model or
TCP/IP Model
dominates data
communication and
Networking Today,
Layer 1 to 5

2-44 Spring
2006
Peer-to-Peer Processes
• When message is sent from Device A to B, the intermediate nodes are involved
in Layer 1 to 3 only.
• In a single machine, each layer calls upon the services of the layer just below
it, whereas between machines the same layers are communicated.
Group 1: Layer 5
• Application:
Interoperability among
unrelated software.
Group 2: Layer 4
• Links the two subgroups
to ensure that what the
lower groups is
delivering is readable
Group 3: Layer 1 to 3
• Network support layer,
that physically move
data between devices.

2-45 Spring
2006
Exchange using the Internet Model
• The process starts at Layer 5 then moves from layer to layer in descending,
sequential order, where at each Layer a Header (Hx) is added to Data unit
(Lx).
• When the formatted data unit passes through Layer 1 it is changed into an
Electromagnetic Signal and transported along a Physical Link.

2-46 Spring
2006
IP Addressing
An IP address is a numeric identifier assigned to each
machine on an IP network.

It designates the specific location of a device on the


network.

IP addressing was designed to allow hosts on one


network to communicate with a host on a different
network regardless of the type of LANs the hosts are
participating in.

49
IP Addressing (Cont’d)
IP Addressing (Cont’d)
Network Addressing
Subdividing an IP address into a network and node
address is determined by the class designation of one’s network.
This figure summarizes the three classes of networks

IP Address:
192.168.100.70

192. 168. | 100.70

52
Network Addressing
Class A: 0xxx xxxx
0000 0000 = 0 - reserved for router
0111 1111 = 127 - reserved for diagnostics
Usable is from 1 until 126 ex. 49.22.102.70
Class B: 10xx xxxx
1000 0000 = 128
1011 1111 = 191

Class C: 110x xxxx


1100 0000 = 192
1101 1111 = 223
Class D: 224 – 239
Class E: 240 - 255
53
Private Addressing

Address Class Reserved Address Space

Class A 10.0.0.0 through 10.255.255.255


Class B 172.16.0.0 through 172.31.255.255
Class C 192.168.0.0 through
192.168.255.255

55
Reserved Addressing
Address Function
Network address of all 0s Interpreted to mean “this network or
segment.”
Network address of all 1s Interpreted to mean “all networks.”
Network 127.0.0.1 Reserved for loopback tests.
Node address of all 0s Interpreted to mean “network address” or
any host on specified network.
Node address of all 1s Interpreted to mean “all nodes” on the
specified network
Entire IP address set to all 0s Used by Cisco routers to designate the default
route. Could also mean “any network.”
Entire IP address set to all 1s (same as Broadcast to all nodes on the current
network; 255.255.255.255) sometimescalled an “all 1s broadcast” or limited
broadcast.

56
System Port (0 ~ 1023)
• 21: File Transfer Protocol (FTP)
• 22: Secure Shell (SSH)
• 23: Telnet remote login service
• 25: Simple Mail Transfer Protocol (SMTP)
• 53: Domain Name System (DNS) service
• 80: Hypertext Transfer Protocol (HTTP) used in the World Wide Web
• 110: Post Office Protocol (POP3)
• 119: Network News Transfer Protocol (NNTP)
• 123: Network Time Protocol (NTP)
• 143: Internet Message Access Protocol (IMAP)
• 161: Simple Network Management Protocol (SNMP)
• 194: Internet Relay Chat (IRC)
http://www.ip-tracker.org/locator/ip-
• 443: HTTP Secure (HTTPS) lookup.php
57
IPv6
• Larger Address Space
• Aggregation-based address hierarchy
– Efficient backbone routing
• Efficient and Extensible IP datagram
• Stateless Address Autoconfiguration
• Security (IPsec mandatory)
• Mobility
128-bit IPv6 Address
3FFE:085B:1F1F:0000:0000:0000:00A9:1234

8 groups of 16-bit hexadecimal numbers separated by “:”


Leading zeros can be removed

3FFE:85B:1F1F::A9:1234

:: = all zeros in one or more group of 16-bit hexadecimal numbers


•  -> System Preferences - > Network -> Interface
•  : bash-3.2$ networksetup –listallhardwareports
• Windows: IPCONFIG /ALL
61
WireShark?

• Wireshark is a network packet/protocol analyzer.


• A network packet analyzer will try to capture network
packets and tries to display that packet data as detailed as
possible.
• Wireshark is perhaps ONE of THE BEST open source packet
analyzers available today for UNIX and Windows.
Some intended purposes
• Network administrators use it to troubleshoot network problems
• Network security engineers use it to examine security problems
• Developers use it to debug protocol implementations
• People use it to learn network protocol internals
However,
• Wireshark isn't an intrusion detection system.
• Wireshark will not manipulate things on the network, it will
only "measure" things from it.
Wireshark Interface

65
Assignment No. 1
• Assignment No. 1
• Install and Configure Wireshark – Latest version
• Windows / Linux Platform
• Create a 3-min video file that shows some functions of
Wireshark
• Upload the file in the Google Drive
• Section E:
• Deadline to submit : December 01, 2021
Summary
Data and Data Communication
Data Communication Model
Direction of Data Flow
Topology
Categories of Network
Internet
Thank You

You might also like