Академический Документы
Профессиональный Документы
Культура Документы
OUTLINE
Organisational Issues Recommended Books Network Design Process Control Model Introduction to Information Theory
Basics Example: Radio Channel Channel Theory: Signaling Rate
Introduction to Network Design Data Used by Network Designers: Network Information System Conclusions
Organisational Issues
Teaching Contact hours: Fridays 14:00-18:00 Lectures: 14:00-16:00
Room TBC Prof Algirdas Paktas
Laboratories/Tutorials: 16:00-18:00
Room TBC very many workstations, all shall have necessary software, please obtain UNIX account before week 6; Lab Tutorial Assistants (TAs): TBC Surgery Hours by Prof Algirdas Paktas Wednesday and Friday 18:00-19:00 in T10-04 The calendar in Semester 2, 2011/12 contains 12 teaching weeks (including 1 week for revisions)
2001-2008 Algirdas Paktas CS3026N Computer Network Analysis, Design and Security
Module History
Due to so many changes some course materials may still bear old codes, numbers, titles, or other inconsistences please be sensible and patient. 2011-: CT3020 Network Planning and Simulation 2008: CS3026 Computer Network Analysis, Design and Security
Officially named Network Design and Security (by mistake will be changed in the next incarnation); There are currently different modules and even specialised IT security programmes available at the Dept of Computing this one is not especially focusing on it look elsewhere if you are serious; Due to the total re-shaffle of the Departments teaching portfolio in Spring 2008 (for 2008/9 Academic Year) this module will stick to its traditional Network Planning and Management values with exposure to the network management and security issues; THIS MODULE IS NOT SUITABLE FOR STUDENTS WHO HAVE NOT GOT SUFFICIENT TECHNICAL BACKGROUND, IT IS NOT CONSIDERING MANAGEMENT ISSUES PER SE BUT ONLY IN THE CONTEXT OF NETWORK PLANNING/OPERATION! Re-badged version of the IM213 after the merger: LGU + UNL = LONDONMET; Originally inherited from the University of North London; Significantly modified in 2001 and 2002 (changed textbooks and for Labs introduced use of Network Simulator ns-2 and later on WAN Design Tool DELite); Slowly changing from 2003 (both lectures and courseworks); Started from 1998 (?) One of the modules designated as starred (equivalent of level 3) at the UNL; Mostly focused on the theory, routing protocols and LAN design issues;
2001-2008 Algirdas Paktas CS3026N Computer Network Analysis, Design and Security
Labs:
Introduction to WAN Design Tool Delite (wk 1) Further Tutorial for WAN Design Tool Delite (wk 2) Work on Coursework Part 1 is using Delite (wk 2-6)
2001-2008 Algirdas Paktas CS3026N Computer Network Analysis, Design and Security 5
Coursework
Comprises 60% of the total module mark It is an INDIVIDUAL assignment Consists of 2 parts Will be issued approximately by week 2 Submission deadlines:
Week 12, Friday.
2001-2008 Algirdas Paktas CS3026N Computer Network Analysis, Design and Security
Recommended Books
Wide Area Network Design: Concepts and Tools for Optimization
ISBN: 1-55860-458-8
2001-2008 Algirdas Paktas CS3026N Computer Network Analysis, Design and Security 9
Recommended Books
Practical Computer Network Analysis and Design
by James D. McCabe
San Francisco,
Morgan Kaufman Publishers, 1998
ISBN 1-55860-498-7 STRONGLY 2001-2008 Algirdas Paktas RECOMMENDED!!! CS3026N Computer Network Analysis, Design and Security
10
Additional Reading
Documentation for Network Simulator and Animator, Marc Greis Tutorial.
2001-2008 Algirdas Paktas CS3026N Computer Network Analysis, Design and Security
11
Design Management Tasks Plan Review Resource Reviews & Verification Design Change Final Review Verification Validation
Network Topology
Network topology defines components (nodes and communications links) and structure of their connectivity With each node is associated its location in case of WANs coordinates of sites are required With each communications link is associated link capacity representing maximal data rate which can be carried by the link and is defined by the transmission technology Topology can be represented as a graph Or it can be described with the help of some special notation (language) Defining network topology and planning of link capacities is primary task of any network design Graph Theory is used for selecting graph topology
2001-2008 Algirdas Paktas CS3026N Computer Network Analysis, Design and Security 13
Thus, Information (or Communication Theory) lies there where all these areas are overlapping:
PSYCHOLOGY
TECHNOLOGY
LOGIC LINGUISTICS
2001-2008 Algirdas Paktas CS3026N Computer Network Analysis, Design and Security
15
In (a) the theory examines the information inherent in a source of communication and the possibility of conveying that information in a given channel. In (b) the theory provides an alternative model of language to that given by a structural or grammatical approach.
2001-2008 Algirdas Paktas CS3026N Computer Network Analysis, Design and Security 16
2001-2008 Algirdas Paktas CS3026N Computer Network Analysis, Design and Security
17
MESSAGE
MESSAGE
TIME
CONTINOUS DISCRETE
TIME
2001-2008 Algirdas Paktas CS3026N Computer Network Analysis, Design and Security
18
2001-2008 Algirdas Paktas CS3026N Computer Network Analysis, Design and Security
19
2001-2008 Algirdas Paktas CS3026N Computer Network Analysis, Design and Security
20
CODER
CHANNEL
DECODER
RECEIVER
NOISE
2001-2008 Algirdas Paktas CS3026N Computer Network Analysis, Design and Security
21
TRANSMITTER
ENCODER
MODULATOR
CHANNEL
TRANSMISSION MEDIUM
RECEIVER
DEMODULATOR DECODER
INFORMATION IN
INFORMATION OUT
2001-2008 Algirdas Paktas CS3026N Computer Network Analysis, Design and Security
22
Televisions, cordless phones, garage-door openers, radiocontrolled model airplanes and cars, pagers, cellular phones, and security systems are all examples of commonplace radio communication technology.
Understanding radio wave propagation is essential in the planning and operation of radio communications to ensure that communications can be established at all.
2001-2008 Algirdas Paktas CS3026N Computer Network Analysis, Design and Security 23
The traveling waves are detected at a remote point (the receiver). The information received at the receiver is recovered while any noise or other undesirable artifacts of the transmission journey are removed
2001-2008 Algirdas Paktas CS3026N Computer Network Analysis, Design and Security 24
2001-2008 Algirdas Paktas CS3026N Computer Network Analysis, Design and Security
26
2001-2008 Algirdas Paktas CS3026N Computer Network Analysis, Design and Security
27
2001-2008 Algirdas Paktas CS3026N Computer Network Analysis, Design and Security
28
EXAMPLE. A frequency of 9680 kHz would be equivalent to a wavelength of 30.99 meters, which we would round to 31 meters (wavelengths 1190 meters are referred as short waves). Thus, 9680 kHz, 9.68 megahertz (MHz), and 31 meters all refer to the same operating frequency.
2001-2008 Algirdas Paktas CS3026N Computer Network Analysis, Design and Security 29
Each bearer that is used for creation of the low-pass communication channel has its characteristic passband (bandwidth) of B Hz
2001-2008 Algirdas Paktas CS3026N Computer Network Analysis, Design and Security 30
Using 2 symbols, S1=1 and S2=0 (a signaling efficiency of 1 bit per baud), we can achieve a rate 2400 bits/s. Using 4 symbols as defined above (a signalling efficiency of 2 bits per baud), we can represent the data stream as
S2S4S4S3S2S2S3S3S1S1S1S1S1S1S1S1S3S1S3S1S2S4S4S3
2001-2008 Algirdas Paktas CS3026N Computer Network Analysis, Design and Security
34
Thus, each constellation consists of 16 signal points which can be used to represent the 16 combinations of 4-bits
2001-2008 Algirdas Paktas CS3026N Computer Network Analysis, Design and Security 36
37
2001-2008 Algirdas Paktas CS3026N Computer Network Analysis, Design and Security
38
2001-2008 Algirdas Paktas CS3026N Computer Network Analysis, Design and Security
41
For HF communications, noise in the propagation medium predominates while for VHF, noise generated within the first stages of the receiver is usually the determining factor.
2001-2008 Algirdas Paktas CS3026N Computer Network Analysis, Design and Security 42
2001-2008 Algirdas Paktas CS3026N Computer Network Analysis, Design and Security
44
2001-2008 Algirdas Paktas CS3026N Computer Network Analysis, Design and Security
47
Where
C is channel capacity in bits/s Bw is one-way transmission bandwidth (Hz) S=EbR is signal power (W) N0 - signal sided noise power spectral density (W/Hz). Eb is energy/bit of the received signal R is information rate (bits/s)
2001-2008 Algirdas Paktas CS3026N Computer Network Analysis, Design and Security
49
Overview
Every network has three characteristics:
Performance = f(Capacity,Delay) Reliability = f(Complexity,Structure,Number of components,...) Cost
First we need to find agree-upon quantitative numbers. Based on the quantitative numbers of these characteristics, we can evaluate different design alternative by ordering them and ruling out losers
Download FTS2001 SDP Pricer Users Guide from the Help link
Familiarise yourself with the tool functionality and answer the following questions: What is CSS? What is DTS? What is FRS/ATM? What is PSS/IPS?
Conclusions
Computer networks are very complex systems They are based on use of electromagnetic waves which are carrying digital signals in presence of noise Channel capacity is predefined by bandwidth, signaling and noise Computer networks can be used practically only when strict agreements (protocols) about information interchange between sender and receiver are specified (Theory+Standards) and implemented (Products) Network design tools may help to create computer networks which are suitable for particular purpose 2001-2008 Algirdas Paktas 55
CS3026N Computer Network Analysis, Design and Security