0% found this document useful (0 votes)
2 views

1. Lect1- Introduction, OSI, Performance

The document outlines the course structure for Computer Networks (CS F303) at BITS Pilani, including textbooks, evaluation components, and key concepts in data communications and networking. It covers various network topologies, their advantages and disadvantages, types of networks, network devices, and the fundamentals of internet protocols. Additionally, it discusses the network core, access networks, and physical media used for connectivity.

Uploaded by

surtiaryan2004
Copyright
© © All Rights Reserved
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views

1. Lect1- Introduction, OSI, Performance

The document outlines the course structure for Computer Networks (CS F303) at BITS Pilani, including textbooks, evaluation components, and key concepts in data communications and networking. It covers various network topologies, their advantages and disadvantages, types of networks, network devices, and the fundamentals of internet protocols. Additionally, it discusses the network core, access networks, and physical media used for connectivity.

Uploaded by

surtiaryan2004
Copyright
© © All Rights Reserved
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 116

COMPUTER NETWORKS (CS

F303)
BITS Pilani Dr. Raja Muthalagu, Dr. Pranav M Pawar & Dr. Mithun Mukherjee
Dubai Campus Department of Computer Science
Basic information

Text book(s) [TB]


James F. Kurose & Keith W. Ross “Computer
Networking: A Top-Down Approach Featuring
the Internet”, Sixth Edition,Pearson,2013.
Reference book(s) [RB]
Larry L. Peterson & Bruce S. Davie: Computer
Networks: A Systems Approach, Fourth Edition,
Morgan Kaufmann / Elsevier, New Delhi, 2007
Behrouz A. Forouzan. Data Communications and
Networking (3rd. ed.). McGraw-Hill, Inc., USA,
2003.
Behrouz A. Forouzan and Sophia Chung Fegan.
TCP/IP Protocol Suite (2nd. ed.). McGraw-Hill
Higher Education, 2002.
Evaluation

OB/ Weighta
Sl# Component Duration Date &Time
CB ge
Mid Semester 90 02.04.2025
1. OB* 30%
Exam Minutes AN
Mid Semester Lab 60
2. CB 10% TBA
Exam Minutes
End Semester Lab 90
3. CB 20% TBA
Exam Minutes
Comprehensive 180 26.05.2025
4. CB 40%
Exam Minutes AN
DATA COMMUNICATIONS

• The term telecommunication means


communication at a distance.
• The word data refers to information
presented in whatever form is agreed
upon by the parties creating and using
the data.
• Data communications are the exchange of
data between two devices via some form
of transmission medium such as a wire
cable.

BITS Pilani, Dubai Campus


Network

• A network is a set of devices (often referred to as


nodes) connected by communication links.
• A node can be a computer, printer, or any other
device capable of sending and/or receiving data
generated by other nodes on the network.
• Network Criteria
– Fault Tolerance
– Scalability
– QoS
– Security

BITS Pilani, Dubai Campus


Why we need
Computer networks?

Computer networks help users on the


network to share the resources and in
communication.

BITS Pilani, Dubai Campus


Why we need
Computer networks?
File sharing: Networking of computers
helps the network users to share data files.

BITS Pilani, Dubai Campus


Why we need
Computer networks?

Hardware sharing: Users can share devices


such as printers, scanners, CD-ROM drives, hard
drives etc.

BITS Pilani, Dubai Campus


Why we need
Computer networks?

User communication: Networks allow users to


communicate using e-mail, newsgroups, and
video conferencing etc.

BITS Pilani, Dubai Campus


Why we need
Computer networks?

Application sharing: Applications can be


shared over the network, and this allows to
implement client/server applications.

Network gaming: A lot of network games are


available, which allow multi-users to play from
different locations.

Voice over IP (VoIP): Voice over Internet


Protocol (IP) is a revolutionary change in
telecommunication which allows to send
telephone calls (voice data) using standard
BITS Pilani, Dubai Campus
A Simple Network

BITS Pilani, Dubai Campus


Data Flows

BITS Pilani, Dubai Campus


Types of Connections

BITS Pilani, Dubai Campus


topology

The physical topology of a network refers to


the configuration of cables, computers and
other peripherals.

Categories of topology
bus topology

• Single cable connects all network nodes without


intervening connectivity devices
• Devices share responsibility for getting data from one
point to another
• Terminators stop signals after reaching end of wire
•Prevent signal bounce
• Two way Comm.
• Ethernet (CSMA/CD or CA)
Advantages of Bus Topology

• Works well for small networks


• Relatively inexpensive to implement
• Easy of installation
• Node failure does not affect others
Disadvantages of Bus Topology

• Not fault tolerant- Reconnection and fault


isolation is difficult
• Potential for congestion with network
traffic
• No security
star topology

A star network is designed with each node (file


server, workstation, peripheral) connected
directly to a central network hub or server
Advantages of Star Topology

• Good option for modern networks


• Low startup costs
• Easy to manage
• Offers opportunities for expansion
• Most popular topology in use; wide variety
of equipment available
• Scalable
• Security is high
Disadvantages of Star Topology

• Hub is a single point of failure.


• Requires more cable than the bus.
ring topology

•In Ring topology each node is connected to the


two nearest nodes so the entire network forms
a circle
•Data only travels in one direction on a Ring
network
•One method for passing data on ring networks
is token passing
How does it work?

• Data hops from one device to another until


it reaches its destination
• Each device communicates its routing
information to every device it connects
with
• Each device then determines what to do
with received data- pass it on or keep it
Advantages of Ring Topology

• Easier to manage; easier to locate a


defective node or cable problem
• Well-suited for transmitting signals over
long distances on a LAN
• Handles high-volume network traffic
• Enables reliable communication
Disadvantages of Ring Topology

• Expensive
• Single point of failure
• Requires more cable and network
equipment at the start
• Not used as widely as bus topology
– Fewer equipment options
– Fewer options for expansion to high-
speed communication
• No security
A fully connected mesh topology (five
devices)

•Every node has a circuit connecting it to every


other node in the network
•Yields greatest redundancy, so if one node
fails, network traffic can be redirected to any of
the other nodes
•Usually reserved for backbone networks since
it is very expensive
mesh topology

• Advantages
– No Traffic
– Easy fault identification
– Robust
• Disadvantages
- Expensive- large number of cables, I/O
port and connections required.
A hybrid topology: a star backbone with three
bus networks
Categories of Networks

• Local Area Networks (LANs)


• Short distances
• Designed to provide local
interconnectivity
• Wifi
• Wide Area Networks (WANs)
• Long distances
• Provide connectivity over large
areas
• Internet
• Metropolitan Area Networks
(MANs)
An isolated LAN connecting 12
computers to a hub in a closet
Network Devices and
Components
 Four major components
1. End Points
• PCs, Servers, Printers, Smart Phones, etc
2. Interconnections
• NIC cards, Media, Connectors
3. Switches
• Connects endpoints to the Local Area Network (LAN)
4. Router
• Connect multiple LANs to form Internetworks
• Chooses best path between LAN and Wider Area
Networks (WAN)

BITS Pilani, Dubai Campus


What’s the Internet: “nuts
and bolts” view
 millions of connected router workstation
computing devices:
server
hosts, end-systems mobile
 pc’s workstations, servers local ISP
 PDA’s, phones,
running network apps
 communication links regional ISP
 fiber, copper, radio,
satellite
 routers: forward packets
(chunks) of data thru
network company
network

BITS Pilani, Dubai Campus


What’s the Internet: “nuts
and bolts” view
 protocols: control router workstation
sending, receiving of
msgs ( syntax, server
mobile
semantics, timing) local ISP
 e.g., TCP, IP, HTTP, FTP,
PPP
 Internet: “network of
regional ISP
networks”

company
network

BITS Pilani, Dubai Campus


What’s the Internet: a
service view
 communication
infrastructure enables
distributed
applications:
 WWW, email, games, e-
commerce, database,
 more?
 communication
services provided:
 connectionless
 connection-oriented

BITS Pilani, Dubai Campus


What’s a network protocol?

all communication activity in Internet


governed by protocols
protocols define format, order
of msgs sent and received
among network entities,
and actions taken on msg
transmission, receipt

… specific msgs sent


… specific actions taken when msgs received, or other
events
34
BITS Pilani, Dubai Campus
What’s a protocol?
a human protocol and a computer network protocol:

Hi TCP connection
req.
Hi
TCP connection
Got the reply.
time? Get http://gaia.cs.umass.edu/index.htm
2:00
<file>
time

35
BITS Pilani, Dubai Campus
Protocols and Standards
Protocols are rules and regulations.
• It defines what is communicated, how it is communicated, and
when it is communicated.
• Key elements of protocol are,
• Syntax: Format of data
• Semantics: Meaning of each section of bits
• Timing: When data should sent and how fast?
Standards are agreed rules.
• Essential for creating and maintaining an open and competitive
market for equipment manufacturers
• For national and international interoperability.
• De facto standards: Not been approved by an organized body
but have been adopted as standards through widespread use.
• De jure

36
BITS Pilani, Dubai Campus
Protocols and Standards
Standard Organizations
• Standard Creation Committees
• ISO (International Standard Organization)
• International Telecommunication Union-Telecommunication Standards
Sector (ITU-T)
• American National Standards Institute (ANSI)
• Institute of Electrical and Electronics Engineers (IEEE)
• Electronic Industries Association (EIA)
• Forums
• Regulatory Agencies: FCC (Federal Communications
Commissions)
Internet Standards
• Internet draft: Lifetime of only 6 month
• RFC (Request for Comment): After recommendation from
internet authorities, draft will be converted to RFC.

MITADT SOE, Loni, PUne


12/04/25 37
BITS Pilani, Dubai Campus
A closer look at network structure:
• network edge:
• applications and hosts
• network core:
– routers
– network of networks
• access networks
– residential
– institutional
– mobile
• physical media
– wire (digital / analog)
– wireless (radio / cellular)

38
BITS Pilani, Dubai Campus
The network edge:
• end systems (hosts):
– run application programs
– e.g., WWW, email
– at “edge of network”
• client/server model
– client host requests, receives service
– from server
– e.g., WWW client (browser)/ server;
– email client/server
• peer-peer model:
– host interaction symmetric
– e.g.: teleconferencing

39
BITS Pilani, Dubai Campus
Network edge: connection-oriented
service
Goal: data transfer TCP service [RFC 793]
between end sys. reliable, in-order byte-
stream data transfer
handshaking: setup – dealing with loss:
(prepare for) data transfer acknowledgements and
retransmissions
ahead of time
flow control:
– set up “state” in two
– sender won’t overcome
communicating hosts receiver
TCP - Transmission Control congestion control:
Protocol – senders “slow down
sending rate” when
– Internet’s de-facto network congestion
connection-oriented detected
service

40
BITS Pilani, Dubai Campus
Network edge: connectionless service

Goal: data transfer App’s using TCP:


between end systems HTTP (WWW), FTP (file
– same as before! transfer), Telnet (remote
UDP - User Datagram login), SMTP (email)
Protocol [RFC 768]:
Internet’s connectionless
service
App’s using UDP:
– unreliable data transfer streaming media,
– no flow control teleconferencing, Internet
– no congestion control
telephony

41
BITS Pilani, Dubai Campus
The Network Core
• mesh of interconnected
routers
• the fundamental question:
how is data transferred
through net?
– circuit switching: dedicated circuit
per call: telephone net
– packet-switching: data sent thru
net in discrete “chunks”

42
BITS Pilani, Dubai Campus
Network Core: Circuit Switching

• End-end resources
reserved for “call”
• link bandwidth, switch
capacity
• dedicated resources: no
sharing
• circuit-like (guaranteed)
performance
• call setup required

43
BITS Pilani, Dubai Campus
Network Core: Circuit Switching
• network resources
(e.g., bandwidth)
divided into “pieces”
• pieces allocated to calls
• resource piece idle if not
used by owning call (no
sharing)
• dividing link bandwidth
into “pieces”
– frequency division
– time division
– code division

44
BITS Pilani, Dubai Campus
Network Core: Packet Switching
resource contention:
• each end-end data  aggregate resource
stream divided into demand can exceed
packets amount available
• user A, B packets share  congestion: packets
network resources queue, wait for link use
• each packet uses full link  store and forward:
bandwidth packets move one hop
• resources used as at a time
needed,division into “pieces”
Bandwidth
 transmit over link

Dedicated allocation  wait turn at next


Resource reservation link

45
BITS Pilani, Dubai Campus
Network Core: Packet Switching

10 Mbs
A Ethernet statistical multiplexing C

1.5 Mbs
B
queue of packets 45 Mbs
waiting for output
link

D E

46
BITS Pilani, Dubai Campus
BITS Pilani, Dubai Campus
Packet-switched networks: routing
Goal: move packets among routers from source to
destination
– we’ll study several path selection algorithms
datagram network:
– destination address determines next hop
– routes may change during session

48
BITS Pilani, Dubai Campus
Access networks and physical media

Q: How to connect end


systems to edge router?
• residential access nets
• institutional access
networks (school,
company)
• mobile access networks
Keep in mind:
bandwidth (bits per second)
of access network?
shared (e.g. cable, ethernet)
or dedicated (e.g., DSL)?
49
BITS Pilani, Dubai Campus
Residential access: point to point access

Dialup via modem


– up to 56Kbps direct access to router (conceptually)

DSL: digital subscriber line


– up to 1 Mbps home-to-router
– up to 8 Mbps router-to-home

50
BITS Pilani, Dubai Campus
Institutional access: local area networks

company/univ local area


network (LAN) connects
end system to edge
router
Ethernet:
– shared or dedicated cable
connects end system and router
– 10 Mbs, 100Mbps, Gigabit
Ethernet

51
BITS Pilani, Dubai Campus
Wireless access networks

• shared wireless access


network connects end
system to router router
• wireless LANs: base
– radio spectrum replaces station
wire
– e.g., Wavelan 10 Mbps
• wider-area wireless
access
– wireless access to ISP mobile
router via cellular network hosts

52
BITS Pilani, Dubai Campus
Open Systems Interconnection
(OSI) Model

BITS Pilani, Dubai Campus


HISTORY

• Rapid growth of computer networks


caused compatibility problems
• ISO recognized the problem and released
the OSI model in 1984
• OSI stands for Open Systems
Interconnection and consists of 7
Layers
• The use of layers is designed to reduce
complexity and make standardization
easier

BITS Pilani, Dubai Campus


OSI Reference Model
• The OSI model is now considered the primary
Architectural model for inter-computer
communications.
• The OSI model describes how information or data
makes its way from application programmes
(such as spreadsheets) through a network
medium (such as wire) to another application
programme located on another network.
• The OSI reference model divides the problem of moving
information between computers over a network
medium into SEVEN smaller and more manageable
problems .
• This separation into smaller more manageable
functions is known as layering.

BITS Pilani, Dubai Campus


OSI Reference Model : 7 Layers

BITS Pilani, Dubai Campus


OSI: A Layered Network Model

 The process of breaking up the functions or tasks of


networking into layers reduces complexity.
 Each layer provides a service to the layer above or
below it in the protocol specification.
 Each layer communicates with the same layer’s
software or hardware on other computers.
 The lower 4 layers (transport, network, data link and
physical —Layers 4, 3, 2, and 1) are concerned with the
flow of data from end to end through the network.
 The upper four layers of the OSI model (application,
presentation and session—Layers 7, 6 and 5) are
orientated more toward services to the applications.
 Data is Encapsulated with the necessary protocol
information as it moves down the layers before network
transit.

BITS Pilani, Dubai Campus


The interaction between layers in the OSI model

BITS Pilani, Dubai Campus


BITS Pilani, Dubai Campus
An exchange using the OSI model

BITS Pilani, Dubai Campus


APPLICATION Layer
• Application layer interacts with
7 Application application programs and is the highest
level of OSI model.
6 Presentation • Applications are the software
programs used by people to
5 Session communicate over the network
• Application layer contains management
4 Transport functions to support distributed
applications.
3 Network • Examples of application layer are
applications such as file transfer,
electronic mail, remote login etc.
2 Data Link
Main Topics
• File Transfer Protocol (FTP)
1 Physical
• HyperText Transfer Protocol (HTTP)
BITS Pilani, Dubai Campus
APPLICATION Layer

The application layer is responsible for


providing services to the user.
BITS Pilani, Dubai Campus
presentation Layer
• Presentation layer defines the format
7 Application
in which the data is to be exchanged
between the two communicating
6 Presentation entities.
• Concerned with the syntax and
5 Session semantics of the information.
• Preserves the meaning of the
4 Transport information.
• Also handles data compression and
3 Network data encryption & decryption
(cryptography).
2 Data Link Main Topics
• Protocol conversion
1 Physical • Data translation
• Encryption BITS Pilani, Dubai Campus
presentation Layer

The presentation layer is responsible for translation,


compression, and encryption.

BITS Pilani, Dubai Campus


Session Layer

7 Application
•Session layer provides mechanism for
controlling the dialogue between the
6 Presentation two end systems. It defines how to
start, control and end conversations
(called sessions) between applications.
5 Session •This layer requests for a logical
connection to be established on an end-
4 Transport user’s request.
•Any necessary log-on or password
validation is also handled by this layer.
3 Network •Session layer is also responsible for
terminating the connection.
•This layer provides services like dialogue
2 Data Link
discipline which can be full duplex or half
duplex.
1 Physical Session layer is responsible for,
•Dialog control
BITS Pilani, Dubai Campus
SESSION Layer

The session layer is responsible for dialog


control and synchronization.

BITS Pilani, Dubai Campus


Transport Layer

7 Application • Purpose of this layer is to provide a reliable


mechanism for the exchange of data
between two processes in different
6 Presentation computers.
• Ensures that the data units are delivered
error free.
5 Session • Ensures that data units are delivered in
sequence.
4 Transport
• Ensures that there is no loss or duplication of
data units.
• Provides connectionless or connection
3 Network oriented service.
• Provides for the connection management.
• Multiplex multiple connection over a single
2 Data Link channel.
• Transport layer responsible for,
• Delivery of a message from one process to
1 Physical another, Service point addressing,
Segmentation and reassembly, Connection
BITS Pilani, Dubai Campus
Data link error control checks for
error in each router and end-
system (frame) (hop to hop), but
transport layer error control
checks for error only at the end-
systems (segments) (source to
destination).

BITS Pilani, Dubai Campus


Transport Layer

The transport layer is responsible for the delivery


of a message from one process to another.

BITS Pilani, Dubai Campus


Reliable process-to-process delivery of a message

BITS Pilani, Dubai Campus


Network Layer

• Implements routing of frames (packets)


7 Application
through the network.
• Defines the most optimum path the packet
6 Presentation should take from the source to the
destination
• Defines logical addressing (IP address) so that
5 Session any endpoint can be identified.
• Handles congestion in the network.
• Facilitates interconnection between
4 Transport heterogeneous networks (Internetworking).
• The network layer also defines how to fragment
a packet into smaller packets to
3 Network accommodate different media.
Network layer is responsible for,
2 Data Link • Internetworking
• Routing algorithms
• Internet Protocol (IP) addressing
1 Physical • Network device: Routers
BITS Pilani, Dubai Campus
Network layer

BITS Pilani, Dubai Campus


Source-to-destination delivery

BITS Pilani, Dubai Campus


Data Link Layer
7 Application
• Data link layer attempts to provide reliable
communication over the physical layer
interface.
6 Presentation • Breaks the outgoing data into frames and
reassemble the received frames.
• Create and detect frame boundaries.
5 Session • Handle errors by implementing an
acknowledgement and retransmission scheme.
• Implement flow control.
4 Transport • Add Physical address (MAC)
• Supports points-to-point as well as broadcast
communication.
3 Network • Supports simplex, half-duplex or full-duplex
communication.
Data link layer is responsible for,
2 Data Link • Framing methods
• Error detection and correction methods
1 Physical • Flow control
• Frame format
•Access control BITS Pilani, Dubai Campus
Data Link Layer

The data link layer is responsible for moving


frames from one hop (node) to the next.

BITS Pilani, Dubai Campus


Hop-to-hop delivery

BITS Pilani, Dubai Campus


Physical Layer

7 Application • Provides physical interface for


transmission of information.
• Convert the logical 1’s and 0’s
6 Presentation
coming from layer 2 into electrical
signals.
5 Session • Transmission of the electrical signals
over a communication channel.
4 Transport Physical layer responsible for,
• Transmission medium,
3 Network Representation of bits, Data rate,
Synchronization of bits, Encoding,
2 Data Link Modulation, Line configuration: Point
to point, Multipoint, Physical
1 Physical topology: Bus, Star, Ring, Hybrid,
Transmission modes: simplex, half-
BITS Pilani, Dubai Campus
Physical Layer

The physical layer is responsible for


movements of
individual bits from one hop (node) to the
next.
BITS Pilani, Dubai Campus
How Does It All Work Together
• Each layer contains a
Protocol Data Unit (PDU)
• PDU’s are used for peer-to-peer
contact between corresponding
layers.
• Data is handled by the top three
layers, then Segmented by the
Transport layer.
• The Network layer places it into
packets and the Data Link
frames the packets for
transmission.
• Physical layer converts it to bits
and sends it out over the media.
• The receiving computer
reverses the process using the
information contained in the
PDU.
2

BITS Pilani, Dubai Campus


Summary of layers

BITS Pilani, Dubai Campus


TCP/IP Protocol Suite
• The layers in the TCP/IP protocol suite do not exactly
match those in the OSI model.
• The original TCP/IP protocol suite was defined as having
four layers: host-to-network, internet, transport, and
application.
• However, when TCP/IP is compared to OSI, the TCP/IP
protocol suite is made of five layers: physical, data link,
network, transport, and application.

81
BITS Pilani, Dubai Campus
TCP/IP Protocol Suite

82
BITS Pilani, Dubai Campus
Types of address

BITS Pilani, Dubai Campus


Physical addresses

Most local- area networks use a 48-bit (6-byte)


physical address written as 12 hexadecimal
digits; every byte (2 hexadecimal digits) is
separated by a colon, as shown below
07:01:02:01:2C:4B

A 6-byte (12 hexadecimal digits) physical address.


for example, the MAC address
10101010.11110000.11000001.11100010.01110111.01010001 in binary
can be represented as shorter hexadecimal equivalent
AA.F0.C1.E2.77.51

BITS Pilani, Dubai Campus


BITS Pilani, Dubai Campus
Physical addresses (MAC Addresses)

In a node with physical address 10 sends a


frame to a node with physical address 87. The
two nodes are connected by a link (bus
topology LAN). As the figure shows, the
computer with physical address 10 is the
sender, and the computer with physical
BITS Pilani, Dubai Campus
IP address

• The format of an IP address is a 32-bit numeric


address written as four numbers separated by periods.
Each number can be zero to 255. For example,
1.160.10.240
Format could be an IP address.
xxxxxxxx.xxxxxxxx.xxxxxxxx.xxxxxxxx
where x is either 0 or 1
Example 1:

11111111.11111111.00000000.0000000
0

255.255.0.0
Example 2:

11111111.11111111.10000000.0000000
0
BITS Pilani, Dubai Campus
Logical Address (IP addresses)

BITS Pilani, Dubai Campus


Example

Figure shows a part of an internet with two routers


connecting three LANs. Each device (computer or
router) has a pair of addresses (logical and physical)
for each connection. In this case, each computer is
connected to only one link and therefore has only
one pair of addresses. Each router, however, is
connected to three networks (only two are shown in
the figure). So each router has three pairs of
addresses, one for each connection.

BITS Pilani, Dubai Campus


Port addresses

Figure shows two computers communicating


via the Internet. The sending computer is
running three processes at this time with port
addresses a, b, and c. The receiving computer
is running two processes at this time with port
addresses j and k. Process a in the sending
computer needs to communicate with process
Thereceiving
j in the physical addresses will change from hop to hop,
computer.
but the logical and port addresses usually remain the
same.

BITS Pilani, Dubai Campus


Port addresses

BITS Pilani, Dubai Campus


Port addresses

Figure shows two computers communicating


via the Internet. The sending computer is
running three processes at this time with port
addresses a, b, and c. The receiving computer
is running two processes at this time with port
addresses j and k. Process a in the sending
computer needs to communicate with process
Thereceiving
j in the physical addresses will change from hop to hop,
computer.
but the logical and port addresses usually remain the same.

BITS Pilani, Dubai Campus


Port addresses

A port address is a 16-bit address represented by


one decimal number as shown.

753

A 16-bit port address represented


as one single number.

Ports 0 to 1024 are reserved for use by certain privileged


services.

BITS Pilani, Dubai Campus


Network Criteria

Throughput - actual number of bits it can


transfer per second.
Bandwidth- maximum number of bits it can
transfer per second.

The latency or delay of a channel is the time


that elapses between sending information and
the earliest possible reception of it

BITS Pilani, Dubai Campus


Example
A network with bandwidth of 10 Mbps can pass only an
average of 12,000 frames per minute with each frame
carrying an average of 10,000 bits. What is the
throughput of this network?

BITS Pilani, Dubai Campus


Example
A network with bandwidth of 10 Mbps can pass only an
average of 12,000 frames per minute with each frame
carrying an average of 10,000 bits. What is the
throughput of this network?

Solution
We can calculate the throughput as

The throughput is almost one-fifth of the bandwidth in


this case.
BITS Pilani, Dubai Campus
End to End Delay

The time required to transmit a packet along its entire path


Created by an application, handed over to the OS, passed to a
network card (NIC), encoded, transmitted over a physical medium
(copper, fibre, air), received by an intermediate device (switch,
router), analyzed, retransmitted over another medium, etc.
The most common measurement uses ping for total round-trip-
time (RTT).

BITS Pilani, Dubai Campus


Types of Delay in Packet
Switching

Transmission delays

Propagation delays

Processor delays

Buffer delays

BITS Pilani, Dubai Campus


Transmission Delay
The time required to push all the bits in a
packet on the transmission medium in use
For N=Number of bits (size of the packet),
S=maximum transmission rate (BW) of the
network, d=delay
d = N/S
For example, to transmit 1024 bits using Fast
Ethernet (100Mbps):

d = 1024/1x100x10e6 = 1.024 micro seconds


BITS Pilani, Dubai Campus
Propagation Delay

• Once a bit is 'pushed' on to the transmission


medium, the time required for the bit to propagate
to the end of its physical trajectory
• The velocity of propagation of the circuit depends
mainly on the actual distance of the physical circuit
• In the majority of cases this is close to the speed
of light.
For d = distance, s = propagation velocity
PD = d/s

BITS Pilani, Dubai Campus


Latency

Latency = Propagation delay +


Transmission delay + Queueing time +
Processing time
BITS Pilani, Dubai Campus
Processing Delay
• Required time to analyze a packet header and
decide where to send the packet (eg. a routing
decision)
- Inside a router this depends on the number of entries
in the routing table, the implementation of data
structures, hardware in use, etc.
• This can include error verification /
checksumming (i.e. IPv4, IPv6 header
checksum)

BITS Pilani, Dubai Campus


Queuing Delay

The time a packet is queued until it is
transmitted

The number of packets waiting in the queue will
depend on traffic intensity and of the type of
traffic

Router queue algorithms try to adapt delays to
specific preferences, or impose equal delay on
all traffic.

BITS Pilani, Dubai Campus


Example

What is the propagation time if the distance between the


two points is 12,000 km? Assume the propagation speed
to be 2.4 × 10^8 m/s in cable.

BITS Pilani, Dubai Campus


Example

What is the propagation time if the distance between the


two points is 12,000 km? Assume the propagation speed
to be 2.4 × 10^8 m/s in cable.

Solution
We can calculate the propagation time as

The example shows that a bit can go over the Atlantic


Ocean in only 50 ms if there is a direct cable between the
source and the destination.
BITS Pilani, Dubai Campus
Example
What are the propagation time and the transmission
time for a 2500byte message (an e-mail) if the bandwidth
of the network is 1 Gbps? Assume that the distance
between the sender and the receiver is 12,000 km and
that light travels at 2.4 × 10^8 m/s.

Solution
We can calculate the propagation and transmission time
as shown on the next slide:

BITS Pilani, Dubai Campus


Example

Note that in this case, because the message is short and


the bandwidth is high, the dominant factor is the
propagation time, not the transmission time. The
transmission time can be ignored.

BITS Pilani, Dubai Campus


Example
What are the propagation time and the transmission
time for a 5000000 byte message (an image) if the
bandwidth of the network is 1 Mbps? Assume that the
distance between the sender and the receiver is 12,000
km and that light travels at 2.4 × 108 m/s.

Solution
We can calculate the propagation and transmission
times as shown on the next slide.

BITS Pilani, Dubai Campus


Example

Note that in this case, because the message is very long


and the bandwidth is not very high, the dominant factor
is the transmission time, not the propagation time. The
propagation time can be ignored.

BITS Pilani, Dubai Campus


Example

How long does it take to send a file of 640,000 bits from host A to host
B over a circuit-switched network?

– All links are 1.536 Mb/s


– Each link uses TDM with 24 slots/sec (TDM = Time Division
Multiplexing)
– 500 msec to establish end-to-end circuit

BITS Pilani, Dubai Campus


Example

Solution:

For a TDM link, time is divided into frames of fixed duration and each frame is
divided into a fixed number of time slots. When the network establish a
connection across a link, the network dedicates one time slot in every frame to
the connection. These slots are edicated for the sole use of that connection,
with a time slot available for use (in every frame) to transmit the connection's
data.

Each circuit has a transmission rate of (1.536 Mbps)/24 = 64 Kbps, so it takes


(640000bits)/(64 Kbps) = 10 seconds to transmit the file. To this 10 seconds
we add the circuit establishment time, giving 10.5 seconds to send the file.
Note that the transmission time is independent of the number links: the
transmission time would be 10 seconds if the end-to-end circuit passes through
one link or one-hundred links.

BITS Pilani, Dubai Campus


Example

Calculate the total time required to transfer a 1.5-MB file in the


following cases, assuming a RTT of 80 ms, a packet size of 1 KB and
an initial 2×RTT of “handshaking” before data is sent.
(a)The bandwidth is 10 Mbps, and data packets can be sent
continuously.
(b)The bandwidth is 100 Mbps, but after we finish sending each data
packet, we must wait one RTT before sending the next.

BITS Pilani, Dubai Campus


Example

Solution:
(a) The bandwidth is 10 Mbps, and data packets can be sent
continuously.
total time = initial handshaking + network delay
initial handshaking = 2*RTT = 2*80 ms = 160 ms.
Delay = propagation delay + transmission delay (assuming
processing & queuing
delays are not
significant).
= 40 ms + (1.5-MB / 10 Mbps)
= 40 ms + (1.5*1,048,576 B / 10*1,000,000 bps)
= 40 ms + (1.5*1,048,576*8 b / 10*1,000,000 bps)
= 40 ms + (12,582,912 bits / 10,000,000 bps)
= 40 ms + 1.26 s
= 40 ms + 1260 ms
= 1300 ms
» total time = initial handshaking + network delay
= 160 ms + 1300 ms
= 1460 ms BITS Pilani, Dubai Campus
(b) The bandwidth is 100 Mbps, but after we finish sending each data
packet, we must wait one RTT before sending the next.
First, count number of packets needed to send the file:
1.5-MB / 1 KB = 12,582,912 bits / 1024(8) bits
= 12,582,912 bits / 8192 bits
= 1536
Thus, we need (1536-1) RTTs to be added to the total delay time. ( After transmitting a
packet, we wait for one RTT. Therefore, since RTT>transmission time+propagation delay, by the
time we transmit the next packet, the first packet has already reached the other side. So, we need the
transmission time of a packet + one RTT for each of the first 999 packet. For the last packet, we
must wait for the propagation delay for the last bit to reach the other side. Therefore, the total time is
as before plus 1535 RTTs.)
Second, we need to calculate the network delay in this case:
Delay = propagation delay + transmission delay
= 40 ms + (1.5-MB / 100 Mbps)
= 40 ms + (1.5*1,048,576 B / 100*1,000,000 bps)
= 40 ms + (1.5*1,048,576*8 b / 100*1,000,000 bps)
= 40 ms + (12,582,912 bits / 100,000,000 bps)
= 40 ms + 0.126 s = 40 ms + 126 ms = 166 ms
» total time = initial handshaking + network delay + 1535
(80 ms)
= 160 ms + 166 ms + 122800 ms
= 123,126 ms
BITS Pilani, Dubai Campus
Example

Calculate the total time required to transfer a 1000-KB file in the


following cases, assuming an RTT of 100 ms, a packet size of 1 KB
and an initial 2 × RTT of “handshaking” before data is sent.
(a)The bandwidth is 1.5 Mbps, and data packets can be sent
continuously.
(b)The bandwidth is 1.5 Mbps, but after we finish sending each
data packet we must wait one RTT before sending the next

BITS Pilani, Dubai Campus


Solution:
(a) The bandwidth is 1.5 Mbps, and data packets can be sent
continuously.
» total time = initial handshaking + network delay

= 200 ms + 5500 ms
= 5700 ms
= 5.7 s

(b) The bandwidth is 1.5 Mbps, but after we finish sending each
data packet we must wait one RTT before sending the next.
» total time = handshake + network delay + (number
of packets-1) * RTT
= 200 ms + 5700 ms + (1000 - 1)*100 ms
= 105,800 ms
= 105.8 s

BITS Pilani, Dubai Campus

You might also like