Title: Introduction to Computer Networks
1- Introduction to Computer Networks
2The Purpose of Networking
- Goals Remote data exchange and remote process
control. - A few desirable properties
- Interoperability,
- Flexibility,
- Geographical range,
- Scalability,
- Privacy and security.
3Range of Coverage
We can classify computer networks according
to their geographical coverage
LAN local area network WLAN wireless local
area network MAN metropolitan area
network WAN wide area network (long haul
network)
Most commonly, were interested in the seamless
integration of all these levels (as in the
Internet).
Note Different levels use very different
technologies.
4Matters of Protocol
Everything in networking happens through
protocols
- A protocol determines how hosts share and access
the medium, - A protocol determines how hosts deal with the
media bandwidth, errors, flow control, etc, - A protocol determines how connections between
hosts are established and maintained, - A protocol determines how information is routed
across short and long distances. - Etc, etc, etc
Question Ok, but what is protocol?
5The ISO/OSI Reference Model Source Computer
Networks, Andrew Tanenbaum
ISO International Standards Organization OSI
Open Systems Interconnection
Application
The protocol stack
Presentation
Session
The idea behind the model Break up the design to
make implementation simpler. Each layer has a
well-defined function. Layers pass to one
another only the information that is relevant at
each level. Communication happens only
between adjacent layers.
Transport
Network
Data link
Physical
6The Layers in the ISO/OSI RF Model
Physical Transmit raw bits over the
medium. Data Link Implements the abstraction of
an error free medium (handle losses, duplication,
errors, flow control). Network
Routing. Transport Break up data into chunks,
send them down the protocol stack, receive
chunks, put them in the right order, pass them
up. Session Establish connections between
different users and different hosts. Presentation
Handle syntax and semantics of the info
examples encoding, encrypting. Application
Protocols commonly needed by applications (cddb,
http, ftp, telnet, etc).
7Communication Between Layers within the Same Host
Its important to specify the services offered to
higher layers in the hierarchy. What they are
how to use them interface API.
Layer n1
SAP
SAP
Layer n
SAPs (service access points) Note This is ISO
terminology.
SAP
SAP
Layer n-1
8Communication Between Layers across Different
Hosts
receiver
sender
data
data
Application
Application
AH
data
PH
Presentation
Presentation
data
Session
Session
SH
data
TH
Transport
Transport
data
Network
Network
NH
data
Data link
Data link
DH DT
data
BITS
Physical
Physical
9The Layers in the TCP/IP Protocol Suite Source
The TCP/IP Protocol Suite, Behrouz A. Forouzan
Application
FTP
HTTP
DNS
NFS
Presentation
Session
Transport
TCP
UDP
IP
ICMP
IGMP
Network
ARP
RARP
Data link
Physical
10Design Alternatives
Point-to-point channels physical links (as in
wiring) connect every two communicating parties
with a private channel.
Broadcast channels communicating parties are
connected by a shared medium hosts can hear
transmissions not necessarily addressed to them.
11Network Topology
We can classify computer networks according
to their topology
bus
star
mesh
hypercube
ring
12Technology
Network Interface Card (NIC) I/O device in the
computer system that allows it to join a network.
The NIC works with a specific medium
(twisted-pair, coaxial cable, optic fiber, etc).
As long as its bus allows, a host can have
multiple NICs.
Host
NIC
NIC
To the host, the NIC is just another I/O device,
which has its own address. A protocol determines
how the NIC accesses the medium.
13Ethernet
Ethernet has a bus topology.
Bus Arbitration by Collision Detection Carrier
Sense Multiple Access with Collision Detection
(CSMA/CD)
Host A listens and finds the bus idle.
Host A starts TX.
Host B starts TX.
Host A detects collision.
Host B completes TX.
Host A backs off.
COLLISION!
Host B backs off.
time
Host B listens and finds the bus idle.
Host B detects collision.
Host B listens and finds the bus idle.
Host B starts TX.
14COTS Ethernet
Ethernet has a bus topology
The medium could be anything that allows for a
bus implementation. (some options are easier to
work with than others)
Host
NIC
Host
NIC
Hub An out-of-the box bus
Host
NIC
15Switched LANs
The bus bandwidth is limited, so go for a
switched architecture.
Host
NIC
Host
NIC
Switch allows for more than one pair to talk at
the same time.
Host
NIC
16Token Ring
Hosts connect to a switch which closes the ring.
Medium access is done by passing around a token.
A
C
B
D
F
E
17Network Architecture for Performance
The keyword is hierarchy
Subnet 1
hub
Subnet 2
hub
Switch
Subnet N
hub
18Network Architecture for Performance and Coverage
Again, the keyword is hierarchy
Subnet 1
Subnet 1
hub
hub
Switch
Switch
Subnet 2
Subnet 2
hub
hub
Subnet N
Subnet N
Router
hub
hub
Connection to other networks
19Security Issues
- Availability
- Accessibility
- Non-repudiation
- Flexibility
- Confidentiality
- Authenticity
- Integrity
- Freshness
- Scalability
20Wireless Networks
21Reasons to Go Wireless
1) 2) 3)
Challenges in Going Wireless
1) 2) 3)
22Medium The Radio Spectrum
Wireless communications use the electromagnetic
spectrum, which is regulated by government
institutions such as the Federal Communications
Commission (FCC). Regulations specify what
bands of frequency can be used for different
applications. For instance FM radio has
88-108MHz (200KHz) and AM radio has 540-1600KHz
(10KHz bandwidth). Regulations also specify the
transmission power that can be used in each band.
There are portions of the spectrum that are
UNLICENSED, however. The most popular wireless
networks of today operate in unlicensed bands.
23Omnidirectional Antenna
Radiates in all azimuth directions.
24Directional Antenna
Radiates in a cone.
25Design Alternatives
Point-to-point channels Information flows in
beams that connect communicating parties.
signal received
signal not received
The antennas on the transmitter and receiver need
to be properly aligned for signals to go through.
On the flip-side, directional antennas have great
power efficiency and range.
Directional antennas are a good choice for
systems with fixed infrastructure. They introduce
additional difficulties in infrastructure-less
systems or when transmitters and receivers can
move around, but offer reduced power consumption.
26Design Alternatives
Broadcast channels Information radiates in all
possible directions from the transmitter.
signal received
Theres no need to align antennas on the
transmitter and receiver. If signals radiate in
all directions, a receiver will the transmitters
independently of their relative positions.
Because power radiates all around,
omnidirectional antennas cant reach as far as
directional antennas. Note also that quite a bit
of power can be wasted.
signal received
This is a good choice for mobile systems. At the
expense of increased power consumption, coverage
reaches 360o.
27Concepts in Radio Communications
Coverage f(PowerTX)
D
A
E
B
C
Multipath
Noise
28Multiple Access to the Radio Spectrum
Spatial Division Multiple Access (SDMA) each
pair of nodes communicates through a tight beam
that takes a portion of space.
Frequency Division Multiple Access (FDMA) each
pair of nodes uses a distinct subrange of the
total frequency band for the application.
T0
T1
T2
T3
T4
T5
T6
T7
T8
A
B
frequency spectrum
29Multiple Access to the Radio Spectrum
Time Division Multiple Access (TDMA) each pair
of nodes uses a different time slot to
communicate. During its time, the pair can use
the entire frequency band allocated for the
application.
T0
T2
T3
T4
T4
T0
T0
T1
T1
T1
T2
T3
time
one time unit
one time unit
one time unit
Code Division Multiple Access (CDMA) can be seen
as a combination of FDMA and TDMA.
Frequency Hopping Spread Spectrum (FHSS)
transmitters use each frequency band for a random
time then move to another randomly chosen TX
and RX must agree to a hopping sequence.
T0
time
T1
time
T2
time
30Remember Ethernet?When Problems Get Worse
- Assume that all wireless devices use the same
channel. Arbitration of access to the medium
(Medium Access Control, or MAC, a protocol in the
Data Link layer) is similar to Ethernets
CSMA/CD. - Most radios in wireless networking cant transmit
and receive at the same time, so we cant detect
collisions. Instead, well do CSMA/CA (collision
avoidance). - Collisions are bad because they reduce the
effective bandwidth and also because they cause
waste of power. - Even when two transmissions do not collide, they
may still interfere with each other causing bit
error rates to rise. -
31Types of Wireless Networks
Fixed Infrastructure
wired backbone
BS
BS
BS
Ad Hoc
- Easy to deploy.
- Good in changing environments.
- Allows for node mobility.
- Can be designed for self-configurability.
- Can be designed for scalability.
32Data Link Layer Medium Access Control
(Coordinated access to a shared resource)
- Power is a scarce resource so is the RF
spectrum. - Collisions lead to wasted power and wasted
spectrum. - Need to impose some kind of access discipline so
as to avoid collisions.
33The MAC Layer Challenge
- Maximize throughput
- Minimize collisions.
- Avoid exposed nodes.
- An interesting option schedule medium access.
- Related challenges
- Clock synchronization.
- Distributed coordination for determining
schedule.
34IEEE 802.11 DCF (CSMA/CA)
start
NAV starts with the Duration field value of the
last transmission sensed on the medium and counts
down to zero.
NAV0
NO
YES
Sense Medium
Medium Idle
Random Backoff Time
NO
YES
Transmit Frame
Collision?
YES
NO
35The Hidden Node Problem
- Station C can sense stations A and B.
- Stations A and C cant sense each other.
- Problem coordinate transmissions from A and C so
as to avoid collisions.
A
B
C
36The Hidden Node Problem
- Station C can sense stations A and B.
- Stations A and C cant sense each other.
- Problem coordinate transmissions from A and C so
as to avoid collisions.
A
B
C
- Solution RTS/CTS/DATA/ACK handshake A sends
RTS - to B, B sends CTS to A, C hears CTS and stays
quiet, A sends DATA - to B, B replies to A with an ACK.
37The Exposed Node Problem
A
B
C
D
An exposed node is one that is in range of the
transmitter, but outside range of the receiver.
Problem exposed nodes reduce bandwidth.
38The Network Layer Challenge
- How do we build routes dynamically?
- Pro-active algorithms.
- Reactive algorithms.
- Will the routing protocol scale up to LARGE
networks? - Can routing adapt to changes in network traffic,
propagation conditions, etc.? - Packet forwarding costs power. Can we do routing
in a way that balances power consumption?
39Security Issues
- Availability
- Accessibility
- Self-organization
- Non-repudiation
- Flexibility
- Confidentiality
- Authenticity
- Integrity
- Freshness
- Scalability
- As of today, the network can be vulnerable at
multiple levels - PHY radio jamming, physical actions to the node.
- MAC DoS via fake requests or schedules.
- NET fake route advertisements (black hole
attack).