Chapter 1: Introduction Computer
Networks & Internet
Content
▪ The concept
▪ Components of computer networks
▪ Types of networks
▪ OSI model
What is a network?
▪ A network consists of two or more computers that are
linked in order to share resources (such as printers and
CDs), exchange files, or allow electronic communications.
The computers on a network may be linked through cables,
telephone lines, radio waves, satellites, or infrared light
beams.
▪ Environments
– Homes
– Small businesses
– Large enterprises
Large enterprise network
▪ Main office
– Several buildings
– Hundreds of employee
Home Mobile ▪ Remote location
Office Users
– Branch office:
Internet • Local network resource
• Access information from
main office
– Home office
• on-demand connections to
the main or branch offices
Branch Office Main Office
– Mobile users
• Connect while traveling
Network devices
▪ PCs: ▪ Switch:
– End devices – Connect end-devices
– Data source & destination – Transmit data in local network
▪ Connection Link ▪ Routers
– NIC – Connect different networks
– Wire: cable; wireless; digital – Routing
– subscriber line (DSL), fiber
to the home (FTTH), …
Connection Internet Style
Connection Internet Style
Connection Internet Style
Network Security
▪ Closed network
– Secure from outside
– Misuse from inside
▪ Open network
– More threats
– Grow e-business
▪ Balance between Closed network and
Open network
Closed network
Open network
Devices symbols
Bridge Switch Router Access ISDN Multi-layer Network
server switch switch switch
DSU/CSU
Personal File Server Data Service Unit/ Modem Web Server
computer Channel Service Unit
WAN “cloud” VLAN Hub Network Cloud or
(Color May Vary) Broadcast Domain
Ethernet Fast Ethernet Serial Line Circuit Switched
Line
Mapping
▪ Cloud: Internet or WAN ▪ PC: server.
▪ Round Shape: router. ▪ Laptop /monitor: End-devices
▪ Straight Line: Ethernet connection
▪ Square Shape: switch.
▪ Z line: serial connection
Question
▪ How are the PCs connect together to
share data? For example: computer lab or
internet lab,…
Network Protocol
▪ A network protocol defines rules and
conventions for communication between
network devices.
▪ Network protocols include mechanisms
for devices to identify and make
connections with each other, as well as
formatting rules that specify how data is
packaged into messages sent and
received
Network Protocols
▪ TCP
▪ UDP
▪ FTP
▪ HTTP
▪ HTTPS
▪ DNS
▪ SMTP
▪ POP
▪ Telnet
▪ SSH
▪ …..
Port Numbers
F T S D T S R
Application T E M N F N I
Layer P L T S T M P
N P P P
E
T
21 23 25 53 69 161 520 Port
Transport Numbers
Layer TCP UDP
Protocol vs Standard
▪ Protocol: a set of rules that governs
data communication.
▪ Standards: agreed-upon rules.
Classification of computer networks
▪ Environments
– LAN
– MAN
– WAN
▪ Design
– Workgroup ( Peer-to-Peer)
– Client/Server
▪ Topology
Bus ; Point to Point
Star ; Tree ; Ring
Mesh ; Hybrid
– ….
Type of network- Environments
❑ Local Area Network (LAN): many connected
computer in a building, campus or factory.
❑ Metropolitan Area Network (MAN): network
across a small region or entire a city.
❑ Wide Area Network (WAN): cover a very large
area, such as entire country or entire the
world.
Type of network- Environments
LAN models
Metropolitan Area Networks (MANs)
▪ Cover a city
▪ Interconnecting networks for a big company in a metropolitan
area
▪ Owned by Network Operators or big companies
▪ Exp, Cable TV networks
Wide Area Networks (WANs)
▪ Cover a country or continent
Type of network- Design
❑Workgroup ( Peer-to-Peer)
Type of network- Design
❑Client/Server
Type of network- Topology
Components of a computer network
▪ Hosts (PCs, laptops, handhelds)
▪ Routers & Switches (IP router, Ethernet
switch)
▪ Links (wired, wireless)
▪ Protocols (IP, TCP, UDP, HTTPS,…)
▪ Applications (network services) - Server
▪ Humans and Service agents - Internet
Service Provider(ISP)
Characteristics of a Network
▪ Speed (data rate):
– How fast data is transmitted
▪ Cost
– Cost of components, installation, and maintenance
▪ Security
– Both storage data and transmitted data
▪ Availability
– 24/7
▪ Scalability
– Meet new needs when the network grows.
▪ Reliability
– Probability of failure
▪ Topology
Reduce common threats
▪ Physical installation
– Room: locked, only 1 door, electronic access, security cameras,…
– Environment: temperature and humidity control systems; electrostatic and magnetic
interference; remotely monitor and alarm the environmental; …
– Electrical: UPS, …
– Maintenance: label all equipment cabling; rack-to-rack connections; do not leave a
console connected; always log off administrative interfaces
▪ Reconnaissance Attacks
– information gathering
• determine which IP addresses
• determines which services or ports are active
• determine the type and version of the application and operating system
▪ Password Attacks
– Do not allow users to have the same password on multiple systems.
– Disable accounts after a specific number of unsuccessful logins.
– Do not use plaintext passwords.
– Use strong passwords.
OSI Introduction
▪ Multi-vendors
▪ → one standard
▪ →OSI model
OSI Introduction
▪ Established in 1947, the International Standards
Organization (ISO) is a multinational body dedicated to
worldwide agreement on international standards. Almost
three-fourths of countries in the world are represented in
the ISO.
▪ An ISO standard that covers all aspects of network
communications is the Open Systems Interconnection
(OSI) model. It was first introduced in the late 1970s.
OSI Introduction
▪ OSI: is a set of protocols that allow any two different
systems to communicate regardless of their underlying
architecture. Allows complete interoperability between
systems
ISO is the organization;
OSI is the model.
OSI model overview
OSI model overview
OSI model overview
Application
Application
(Upper) Presentation
Layers
Session
OSI model overview
Application
Application
(Upper) Presentation
Layers
Session
Transport Layer
Network Layer
Data Flow
Layers
Data Link
Physical
Role of Application Layers
EXAMPLES
User Interface
Telnet
Application
FTP
Role of Application Layers
EXAMPLES
User Interface
Telnet
Application
FTP
• How data is presented ASCII
Presentation • Special processing EBCDIC
such as encryption JPEG
Role of Application Layers
EXAMPLES
User Interface
Telnet
Application
FTP
• How data is presented ASCII
Presentation • Special processing EBCDIC
such as encryption JPEG
Keeping different Operating System/
Session applications’
Application Access
data separate
Scheduling
Role of Application Layers
EXAMPLES
User Interface
Telnet
Application
FTP
• How data is presented ASCII
Presentation • Special processing EBCDIC
such as encryption JPEG
Keeping different Operating System/
Session applications’
Application Access
data separate
Scheduling
Transport Layer
Network Layer
Data Link
Physical
Role of Data Flow Layers
EXAMPLES
• Move bits between devices
Physical • Specifies voltage, wire speed and EIA/TIA-232
pin-out cables V.35
Role of Data Flow Layers
EXAMPLES
• Combines bits into bytes and
bytes into frames 802.3 / 802.2
Data Link • Access to media using MAC address HDLC
• Error detection not correction
• Move bits between devices
Physical • Specifies voltage, wire speed and EIA/TIA-232
pin-out cables V.35
Role of Data Flow Layers
EXAMPLES
Provide logical addressing which IP
Network
routers use for path determination IPX
• Combines bits into bytes and
bytes into frames 802.3 / 802.2
Data Link • Access to media using MAC address HDLC
• Error detection not correction
• Move bits between devices
Physical • Specifies voltage, wire speed and EIA/TIA-232
pin-out cables V.35
Role of Data Flow Layers
EXAMPLES
• Reliable or unreliable delivery TCP
Transport • Error correction before retransmit UDP
SPX
• Provide logical addressing which IP
Network
routers use for path determination IPX
• Combines bits into bytes and
bytes into frames 802.3 / 802.2
Data Link • Access to media using MAC address HDLC
• Error detection (not correction)
• Move bits between devices
Physical • Specifies voltage, wire speed and EIA/TIA-232
pin-out cables V.35
Role of Data Flow Layers
Application
Presentation
EXAMPLES
Session
• Reliable or unreliable delivery TCP
Transport • Error correction before retransmit UDP
SPX
Provide logical addressing which IP
Network
routers use for path determination IPX
• Combines bits into bytes and
bytes into frames 802.3 / 802.2
Data Link
• Access to media using MAC address HDLC
• Error detection not correction
• Move bits between devices
Physical • Specifies voltage, wire speed and EIA/TIA-232
pin-out cables V.35
OSI model overview
OSI model:
Upper layers (L4 – L7): implemented mostly in software
Lower layers (L2 & L3): combination of software and hardware.
Physical layer (L1): mostly in hardware.
Each layer adds header to the message except layer 2 adds header
and a trailer.
Encapsulating Data
Encapsulating Data
Application
Presentation DATA
Upper Layer Data Session
Segment
Transport
TCP Header Upper Layer Data
Network Packet
IP Header Data
LLC Header Data FCS
Data Link Frame
MAC Header Data FCS
Physical Bits
0101110101001000010
De-encapsulating Data
Application
Presentation
Session
Upper Layer Data
Transport
Upper Layer Data
Network
TCP+ Upper Layer Data
IP + TCP + Upper Layer Data
Data Link
LLC Hdr + IP + TCP + Upper Layer Data
Physical
0101110101001000010
Sending Data
An exchange using the OSI model
Protocol Data Unit PDU
Protocols on each layers
Summary
1. How to connect to the internet ?
2. Basic network devices
3. Characteristics of network
4. Network Classification
5. Components of Network
6. What is OSI model
7. Functions of each layer