Unit 1 PDF

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 85

Gyan Ganga Institute of Technology and Sciences,

Jabalpur (M.P.)

Computer
Networks
CS--602
CS
Department of
Computer Science and Engineering
RGPV University, Bhopal (M.P.)

U.S. National Cybersecurity September 30th, 2004


UNIT - 1

Computer Network: Definitions, goals,


components, Architecture, Classifications &
Types. Layered Architecture: Protocol hierarchy,
Design Issues, Interfaces and Services,
Connection Oriented & Connectionless Services,
Service primitives, Design issues & its
functionality. ISO-OSI Reference Model:
Principle, Model, Descriptions of various layers
and its comparison with TCP/IP. Principals of
physical layer: Media, Bandwidth, Data rate and
Modulations.
Computer Networks
A large number of Separate but interconnected
computer to do job, these systems are called
Computer Networks.
A collection of autonomous computers
interconnected by a single technology termed
as Computer Networks.
• Examples:-Personal Area Network (PAN),Local Area
Network (LAN),Wireless Local Area Network (WLAN),Campus
Area Network (CAN),Metropolitan Area Network (MAN),Wide
Area Network (WAN),Storage-Area Network (SAN),System-
Area Network (also known as SAN)

September 30th, 2004


Computer Networks

September 30th, 2004


Types of Computer Networks

September 30th, 2004


PAN-Personal Area Network

September 30th, 2004


WPAN-Wireless Personal Area Network

September 30th, 2004


LAN-Local Area Network

September 30th, 2004


WLAN-Wireless Local Area Network

September 30th, 2004


CAN-Campus Area Network

September 30th, 2004


SAN: System Area Network

September 30th, 2004


WAN: Wide Area Network

September 30th, 2004


SAN: Storage Area Network

September 30th, 2004


MAN: Metropolitan Storage Area Network

September 30th, 2004


September 30th, 2004
September 30th, 2004
USES : Computer Networks
A.Business Applications
a.Resource Sharing
b.Server-Client model
c.Communication Medium
d.E-Commerce

September 30th, 2004


USES : Computer Networks
B. Home Applications
a.Access to remote information
b.Person-to-person communication
c.Peer-to-peer communication
d.Interactive entertainment
e.Electronic commerce

September 30th, 2004


USES : Computer Networks
C. Mobile Users

September 30th, 2004


What is Topology ?
Network topology refers to the manner in which the
links and nodes of a network are arranged to relate to
each other.
OR
Network Topology is the schematic description of a
network arrangement, connecting various
nodes(sender and receiver) through lines of
connection.

Physical network topology- which is the physical


signal transmission medium.
Logical network topology- refers to the manner in
which data travels through the network between
devices.
September 30th, 2004
Types of Topologies

September 30th, 2004


Peer-to-Peer Network (P2P)
Topology
 Peer-To-Peer Network, the “peers” are computer systems that are connected
to each other via the Internet.
 Files can be shared directly between systems on the network without the
need for a central server.
 Each computer on a P2P network becomes a file server as well as a client.
 A Network in which the computers are managed independently of one
another and have equal rights for initiating communication with each other,
sharing resources, and validating users.

September 30th, 2004


BUS Topology
 A network type in which every computer and network device is connected to
single cable.
 When it has exactly two endpoints, then it is called Linear Bus topology.

September 30th, 2004


BUS Topology
Features
1.It transmits data only in one direction.
2.Every device is connected to a single cable
Advantages
1.It is cost effective.
2.Cable required is least compared to other network topology.
3.Used in small networks.
4.It is easy to understand.
5.Easy to expand joining two cables together.
Disadvantages
1.Cables fails then whole network fails.
2.If network traffic is heavy or nodes are more the
performance of the network decreases.
3.Cable has a limited length.
4.It is slower than the ring topology.
September 30th, 2004
RING Topology
 It forms a ring as each computer is connected to another
computer, with the last one connected to the first. Exactly two
neighbours for each device.

September 30th, 2004


RING Topology
Features
•Ring topology is like a bus topology, but with connected ends.
•The node that receives the message from the previous computer
will retransmit to the next node.
•The data flows in one direction, i.e., it is unidirectional.
•The data flows in a single loop continuously known as an endless
loop.
•It has no terminated ends, i.e., each node is connected to other
node and having no termination point.
•The data in a ring topology flow in a Clockwise direction.
•The most common access method of the ring topology is token
passing.
• Token passing: It is a network access method in which
token is passed from one node to another node.
• Token: It is a frame that circulates around the network.
September 30th, 2004
RING Topology
Advantages
1.Transmitting network is not affected by high traffic or by
adding more nodes, as only the nodes having tokens can
transmit data.
2.Cheap to install and expand
Disadvantages
1.Troubleshooting is difficult in ring topology.
2.Adding or deleting the computers disturbs the network
activity.
3.Failure of one computer disturbs the whole network.

September 30th, 2004


STAR Topology
•Star topology is an arrangement of the network in which every
node is connected to the central hub, switch or a central
computer.
•The central computer is known as a server, and the peripheral
devices attached to the server are known as clients.
•Coaxial cable or RJ-45 cables are used to connect the
computers.
•Hubs or Switches are mainly used as connection devices in
a physical star topology.
•Star topology is the most popular topology in network
implementation.

September 30th, 2004


STAR Topology
Advantages
1.Fast performance with few nodes and low network traffic.
2.Hub can be upgraded easily.
3.Easy to troubleshoot.
4.Easy to setup and modify.
5.Only that node is affected which has failed, rest of the nodes
can work smoothly.

Disadvantages
1.Cost of installation is high.
2.Expensive to use.
3.If the hub fails then the whole network is stopped because all
the nodes depend on the hub.
4.Performance is based on the hub that is it depends on its
capacity
September 30th, 2004
MESH Topology
 point-to-point connection to other nodes or
devices. All the network nodes are connected
to each other. Mesh has n(n-1)/2 physical
channels to link n devices.

September 30th, 2004


MESH Topology
 There are two techniques to transmit data over
the Mesh topology, they are :
1.Routing
2.Flooding
Types of Mesh Topology
1.Partial Mesh Topology : In this topology some
of the systems are connected in the same fashion
as mesh topology but some devices are only
connected to two or three devices.
2.Full Mesh Topology : Each and every nodes
or devices are connected to each other.
September 30th, 2004
MESH Topology
Features
1.Fully connected.
2.Robust.
3.Not flexible.
Advantages
1.Each connection can carry its own data load.
2.Fault is diagnosed easily.
3.Provides security and privacy.
Disadvantages
1.Installation and configuration is difficult.
2.Cabling cost is more.
3.Bulk wiring is required
September 30th, 2004
TREE (hierarchical) Topology
 It has a root node and all other nodes are connected
to it forming a hierarchy.
 It is also called hierarchical topology.
 It should at least have three levels to the hierarchy.

September 30th, 2004


TREE (hierarchical) Topology
Features
1.Ideal if workstations are located in groups.
2.Used in Wide Area Network.
Advantages
1.Extension of bus and star topologies.
2.Expansion of nodes is possible and easy.
3.Easily managed and maintained.
4.Error detection is easily done.
Disadvantages
1.Heavily cabled.
2.Costly.
3.If more nodes are added maintenance is difficult.
4.Central hub fails, network fails.
September 30th, 2004
HYBRID Topology
It is two different types of topologies which is a mixture
of two or more topologies

September 30th, 2004


ISO-OSI Model : Layered Architecture
What is OSI Model?
 The OSI Model is a LOGICAL and
CONCEPTUAL model that defines network
communication used by systems open to
INTERCONNECTION and communication with
other systems.

 The Open System Interconnection (OSI


Model) also defines a logical network and
effectively describes computer packet transfer
by using various layers of protocols.
September 30th, 2004
Characteristics of OSI Model
•A layer should only be created where the definite levels
of abstraction are needed.
•The function of each layer should be selected as per
the internationally standardized protocols.
•The number of layers should be large so that separate
functions should not be put in the same layer. At the
same time, it should be small enough so that
architecture doesn’t become very complicated.
•In the OSI model, each layer relies on the next lower
layer to perform primitive functions. Every level should
able to provide services to the next higher layer
•Changes made in one layer should not need changes in
other layers.
September 30th, 2004
Why OSI Model ?
•Helps you to understand communication over a network
•Troubleshooting is easier by separating functions into
different network layers.
•Helps you to understand new technologies as they are
developed.
•Allows you to compare primary functional relationships
on various network layers.

History of OSI Model

•In 1984, the OSI architecture was formally adopted by


ISO as an international standard.

September 30th, 2004


7 Layers of the OSI Model
•The Upper Layers:
It deals with application issues and mostly
implemented only in software.
The highest is closest to the end system user. In this
layer, communication from one end-user to another
begins by using the interaction between the application
layer.
It will process all the way to end-user.

•The Lower Layers:


These layers handle activities related to data transport.
The PHYSICAL and DATA LINK LAYER also
implemented in software and hardware.
September 30th, 2004
7 Layers of the OSI Model

September 30th, 2004


7 Layers of the OSI Model

September 30th, 2004


7 Layers of the OSI Model

September 30th, 2004


OSI model, showcasing all the layers and how
they communicate with each other.

September 30th, 2004


Protocols supported at various
levels
Layer Name Protocols
Layer 7 Application SMTP, HTTP, FTP, POP3, SNMP

Layer 6 Presentation MPEG, ASCH, SSL, TLS


Layer 5 Session NetBIOS, SAP (Session Announcement Protocol)
Layer 4 Transport TCP, UDP

Layer 3 Network IPv4, IPv6, ICMP, IPSEC, ARP, MPLS.

Layer 2 Data Link PPP, Frame Relay, ATM, Fiber Cable, etc.

Layer 1 Physical RS232, 100BaseTX, ISDN, 11.


September 30th, 2004
Connection Oriented &
Connectionless Services,

September 30th, 2004


Connection Oriented &
Connectionless Services

A data communication network is a


telecommunication network that allows two
or more computers to send and receive data
across the same or distinct networks.

Connection-Oriented Service and


Connectionless Service are the two methods
for establishing a connection before
delivering data from one device to another.

September 30th, 2004


Connection Oriented Services
 Connection-oriented service entails the Establishment and
Termination of a connection for the transmission of data between
two or more devices.
A connection-oriented service is a network service that was
inspired by the Telephone System.
Before delivering data over the same or separate networks, a
connection-oriented service is used to establish an end-to-end
connection between the sender and the receiver.
Packets are forwarded to the receiver in the same sequence as
they were sent by the sender in connection-oriented service.
It employs a handshake approach to establish a connection
between the user and the sender before delivering data across
the network.
Connection-oriented service recognized as a Reliable Network
Service.
September 30th, 2004
Connection Oriented Services

September 30th, 2004


Connection Oriented Services
Sequence of Operation is to be followed in connection oriented
service. These are:-

1. Connection is established.
2. Information is sent.
3. Connection is released.

We can send the message in connection oriented service if there


is an error at the receivers end.
Example : TCP (Transmission Control Protocol).
Why ? Because TCP guarantees that the connection is
created and maintained until the data packet is completed
between the sender and recipient.

September 30th, 2004


Connection Oriented Services
Packets are forwarded to the receiver in the same sequence as they
were sent by the sender .
It employs a handshake approach to establish a connection between
the user and the sender before delivering data across the network.
Assume a transmitter wishes to convey data to a recipient. The sender
then sends a request packet in the form of a SYN packet to the
recipient.
Following that, the receiver sends back a (SYN-ACK) signal/packets in
response to the sender’s request.
That is the confirmation received by the receiver in order to begin
communication between the sender and the receiver. The message or
data can now be sent to the recipient by the sender.
Similarly, a receiver can react or send data in the form of packets to
the sender. A sender can terminate a connection after successfully
sharing or delivering data by sending a signal to the receiver.
It is stated that it is a Dependable Network Service.
September 30th, 2004
Connection Oriented Services- 3 Way Handshake

September 30th, 2004


Types of Connection-Oriented Service

Service Example

Reliable Message Stream Sequence of pages, etc.

Reliable Byte Stream Song Download, etc.

VoIP
Unreliable Connection
(Voice Over Internet Protocol)

September 30th, 2004


Connection Less Services
 Connectionless service does not need the establishment of any
connection or termination procedure in order to transport data
across a network.
Connectionless service is used to send data from one end to the
other without establishing a connection.
That is there is no need to establish a connection before
delivering data from the transmitter to the receiver.
It is not a dependable network service since it does not
guarantee the passage of data packets to the recipient, and data
packets can arrive at the receiver in any sequence.
 The data packet does not follow a predefined path.
Due to network congestion, the transmitted data packet is not
received by the recipient in connectionless service, and the data
may be lost.
September 30th, 2004
Connection Less Services

September 30th, 2004


Connection Less Services
The sender’s data will be in the packets or data streams that
carry the receiver’s address.
Data can be sent and received in any sequence in a
connectionless service.
It does not guarantee that the packets will be delivered to their
intended destination.
In connectionless the data is transferred in one direction from
source to destination without checking that destination is still
there or not or if it prepared to accept the message.
Authentication is not needed.

Example :- UDP (User Datagram Protocol) Protocol.


it does not acknowledge the data to the recipient. As a result, it is
an Unreliable Protocol.
September 30th, 2004
Connection Less Services Protocols
Internet Protocol (IP) – This protocol is connectionless. In this protocol, all
packets in IP network are routed independently. They might not go through
same route.

User Datagram Protocol (UDP) – This protocol does not establish any
connection before transferring data. It just sends data that’s why UDP is known
as connectionless.

Internet Control Message Protocol (ICMP) – ICMP is called connectionless


simply because it does not need any hosts to handshake before establishing
any connection.

Internetwork Packet Exchange (IPX) – IPX is called connectionless as it


doesn’t need any consistent connection that is required to be maintained while
data packets or messages are being transferred from one system to another.

September 30th, 2004


Types of Connection Less Services

Service Example

Unreliable Datagram Electronic Junk Mail, etc.

Registered mail, text messages


Acknowledged Datagram
along with delivery report, etc.

Queries from remote databases,


Request Reply
etc.
September 30th, 2004
Services Primitives (Operations)
A service is formally specified by a set of primitives (operations)
available to a user process to access the service.
These primitives tell the service to perform some action or report
on an action taken by a peer entity. If the protocol stack is located
in the operating system, as it often is, the primitives are normally
system calls.
These calls cause a trap to kernel mode, which then turns control
of the machine over to the operating system to send the
necessary packets.
The set of primitives available depends on the nature of the
service being provided. The primitives for connection-oriented
service are different from those of connection-less service. There
are five types of service primitives :

September 30th, 2004


Services Primitives (Operations)
The primitives for connection-oriented service are different from
those of connection-less service. There are five types of service
primitives :-

1. LISTEN : When a server is ready to accept an incoming connection it


executes the LISTEN primitive. It blocks waiting for an incoming
connection.
2. CONNECT : It connects the server by establishing a connection. Response
is awaited.
3. RECIEVE: Then the RECIEVE call blocks the server.
4. SEND : Then the client executes SEND primitive to transmit its request
followed by the execution of RECIEVE to get the reply. Send the message.
5. DISCONNECT : This primitive is used for terminating the connection. After
this primitive one can't send any message. When the client sends
DISCONNECT packet then the server also sends the DISCONNECT
packet to acknowledge the client. When the server package is received by
client then the process is terminated.
September 30th, 2004
Connection Oriented Service Primitives

LISTEN Block waiting for an incoming connection.

CONNECTION Establish a connection with a waiting peer.

RECEIVE Block waiting for an incoming message.

SEND Sending a message to the peer.

DISCONNECT Terminate a connection.

September 30th, 2004


Connection Less Service Primitives

UNIDATA This primitive sends a packet of data

FACILITY Primitive for enquiring about the performance of the


network, like delivery statistics
REPORT

September 30th, 2004


Connection Oriented Service V/S Connection Less Service
Comparison Connection-Oriented Service Connection Less Service
Parameter
Related System It is designed and developed based on the It is service based on the postal system.
telephone system.
Definition It is used to create an end to end connection It is used to transfer the data packets between senders to
between the senders to the receiver before the receiver without creating any connection.
transmitting the data over the same or different
network.

Virtual path It creates a virtual path between the sender It does not create any virtual connection or path between
and the receiver. the sender and the receiver.
Authentication It requires authentication before transmitting It does not require authentication before transferring data
the data packets to the receiver. packets.
Data Packets Path All data packets are received in the same order Not all data packets are received in the same order as
as those sent by the sender. those sent by the sender.
Bandwidth Requirement It requires a higher bandwidth to transfer the It requires low bandwidth to transfer the data packets.
data packets.
Data Reliability It is a more reliable connection service because It is not a reliable connection service because it does not
it guarantees data packets transfer from one guarantee the transfer of data packets from one end to
end to the other end with a connection. another for establishing a connection.

Congestion There is no congestion as it provides an end- There may be congestion due to not providing an end-to-
to-end connection between sender and end connection between the source and receiver to
receiver during transmission of data. transmit of data packets.
Examples Transmission Control Protocol (TCP) is an User Datagram Protocol (UDP), Internet Protocol (IP), and
example of a connection-oriented service. Internet Control Message Protocol (ICMP) are examples of
connectionless service.
September 30th, 2004
Connection Oriented Service V/S Connection Less Service

Parameter Connection Oriented Connectionless

Reservation of resources Necessary Not Necessary

Utilization of resources Less Good

State information Lot of information required Not much information is


required to be stored
Delays More Less
Overheads Less More
Packets travel Sequentially Randomly
Guarantee of service Guaranteed No guarantee

Connection Connection needs to be Connection need not be


established established
Congestion due to Not possible Very much possible
overloading
September 30th, 2004
Connection Oriented Service V/S Connection Less Service

Parameter Connection Oriented Connectionless

Reservation of resources Necessary Not Necessary

Utilization of resources Less Good

State information Lot of information required Not much information is


required to be stored
Delays More Less
Overheads Less More
Packets travel Sequentially Randomly
Guarantee of service Guaranteed No guarantee

Connection Connection needs to be Connection need not be


established established
Congestion due to Not possible Very much possible
overloading
September 30th, 2004
CONNECTORS
AIM : To study various types of CONNECTORS used in
Computer Networks.

What is Network Cabling?

i. Cable is the medium through which information usually moves


from one network device to another.
ii. There are several types of cable which are commonly used
with LANs.
iii. In some cases, a network will utilize only one type of cable,
other networks will use a variety of cable types.
iv. The type of cable chosen for a network is related to the
network's topology, protocol, and size.

September 30th, 2004


Cables and CONNECTORS
Understanding the characteristics of different types of cable and how they relate
to other aspects of a network is necessary for the development of a successful
network.
• Unshielded Twisted Pair (UTP) Cable

September 30th, 2004


CONNECTORS
Understanding the characteristics of different types of cable and how they relate
to other aspects of a network is necessary for the development of a successful
network.
• Shielded Twisted Pair (STP) Cable

September 30th, 2004


CONNECTORS
Understanding the characteristics of different types of cable and how they relate
to other aspects of a network is necessary for the development of a successful
network.
• Coaxial Cable

September 30th, 2004


CONNECTORS
Understanding the characteristics of different types of cable and how they relate
to other aspects of a network is necessary for the development of a successful
network.
• Fiber Optic Cable

September 30th, 2004


CONNECTORS
Understanding the characteristics of different types of cable and how they relate
to other aspects of a network is necessary for the development of a successful
network.
• USB (Universal Serial Bus)
– USB 1.1 standard supports data transfer rates of 12 Mbps.
– USB 2.0 (Also referred to as Hi-Speed USB) specification defines a new High-speed
transfer rate of 480 Mb/sec.

September 30th, 2004


CONNECTORS
RJ-11 (Registered Jack)
• Standard telephone cable connectors, RJ-11 has 4 wires (and RJ-12 has 6
wires). RJ-11 is the acronym for Registered Jack-11, a four- or six-wire
connector primarily used to connect telephone equipment.

September 30th, 2004


CONNECTORS
RJ-45 (Registered Jack)
• The acronym for Registered Jack-45 is RJ-45. The RJ-45 connector is an
eight-wire connector that is commonly used to connect computers to a local
area network (LAN), particularly Ethernet LANs. Although they are slightly
larger than the more commonly used RJ-11 connectors, RJ-45s can be used
to connect some types of telephone equipment.

September 30th, 2004


CONNECTORS
F-Type
• The F connector is a type of RF connector commonly used for cable and
universally for satellite television. They are also used for the cable TV
connection in DOCSIS cable modems, usually with RG-6 tri-shield cable.
The F connector is inexpensive, yet has good performance up to 1 GHz.
One reason for its low cost is that it uses the center wire of the coaxial cable
as the pin of the male connector. The male connector body is typically
crimped onto the exposed outer braid. Female connectors have a 3/8-32
thread. Most male connectors have a matching threaded connecting ring,
though push-on versions are also available.

September 30th, 2004


CONNECTORS
ST (Straight Tip) and SC (Subscriber Connector or Standard Connector)
• Fiber network segments always require two fiber cables: one for transmitting
data, and one for receiving. Each end of a fiber cable is fitted with a plug that
can be inserted into a network adapter, hub, or switch. In the North America,
most cables use a square SC connector (Subscriber Connector or Standard
Connector) that slides and locks into place when inserted into a node or
connected to another fiber cable.

September 30th, 2004


CONNECTORS
MT-RJ (Mechanical Transfer Registered Jack)
• MT-RJ connectors are used with single-mode and multimode fiber-optic
cables. The MT-RJ connectors are constructed with a plastic housing and
provide for accurate alignment via their metal guide pins and plastic ferrules.
• Used for Gigabit ethernet. To connect to modules with MT-RJinterfaces, use
multimode fiber-optic cables.

September 30th, 2004


CONNECTORS
DB-9
• The DB9 (originally DE-9) connector is an analog 9-pin plug of the D-
Subminiature connector family (D-Sub or Sub-D).
• The DB9 connector is mainly used for serial connections, allowing for the
asynchronous transmission of data as provided for by standard RS-232 (RS-
232C).

September 30th, 2004


CONNECTORS
BNC connector
• The BNC connector (Bayonet Neill–Concelman) is a miniature quick
connect/disconnect RF connector used for coaxial cable. It features two
bayonet lugs on the female connector; mating is achieved with only a quarter
turn of the coupling nut. BNCs are ideally suited for cable termination for
miniature-to-subminiature coaxial cable (e.g., RG-58, 59, to RG-179, RG-
316). They are used with radio, television, and other radio-
frequency electronic equipment, test instruments, video signals, and was
once a popular connector for10BASE2 computer networks.

September 30th, 2004


UTP Wiring

September 30th, 2004


UTP Wiring

September 30th, 2004


UTP Wiring Connection Guide

September 30th, 2004


UTP Wiring Connection Guide

September 30th, 2004


UTP Wiring Connection Guide

September 30th, 2004


UTP Wiring Connection Guide

September 30th, 2004


UTP Wiring Connection Guide

September 30th, 2004


UTP Wiring Connection Guide

September 30th, 2004

You might also like