CN Introduction

You might also like

Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 73

Computer Networks CCT204

1. BOOK: Computer Networks


By Andrew Tannenbaum 5th Edition

2.Data Communications and Networks: 3rd ed


By Behrouz A. Forouzan. Tata McGraw Hill Publication.

Facilitator: Prof. Harshala Shingne


Computer Networks
Course Learning Objective:

1.To develop an understanding of modern network architectures from a


design and performance perspective.

2.To introduce the student to the major concepts involved in network


protocols.

3. To provide an opportunity to do network programming


Computer Networks
Course Outcomes:

1.Understand basics of computer networks and reference models

2. Identify the Design issues of each layer of OSI model

3. Implement the protocols of OSI model


Computer Networks

7 layers Of OSI Model


Introduction
3 W of Computer Networks

WHY
WHAT
WHEN
WHY

• Computer networks are becoming pervasive


• Virtually all software is networked
• every developer must know the basis of networking
• Internet is used daily by billions
• Web
Email
Chat
Movies / MP3s
• ... and it is getting bigger and bigger
WHAT

Interconnected collection of autonomous computers.

Connection between computers can be wired or


wireless
WHEN

SEPT 1969 ARPANET: 2 nodes connected


WHEN

DECEMBER 1969:
WHEN

1971
WHEN

1980
WHEN

1986
WHEN

2006
More Applications
Beyond Internet
Mobile (smart-)phones
Wi-fi
Home Internet
Public Hotspots
Radio / TV Broadcast
Cable TV
Satellite
Personal Networks
Bluetooth
Healthcare / Fitness
Home Networks
Mediacenter
Data Communication

The term telecommunication means communication at a distance.

The word data refers to information presented in whatever form is


agreed upon by the parties creating and using the data.

Data communications are the exchange of data between two devices


via some form of transmission medium such as a wire cable.
Components of a data
communication system

• Message : Text, numbers, pictures, audio, video, etc..


• Sender
• Receiver
• Transmission Medium : Physical path like optical cable, radio
waves.
• Protocol : Set of rules that governs data transmission
Data Representation

• Text: bit pattern or sequence of bits, different bit pattern for different symbols called
code,
• Today:32 bit system called Unicode

• Numbers: also represented by bit pattern, no code use, but directly converted to binary
numbers

• Images: represented by bit pattern, composed of matrix of pixels and each pixel is
assigned a pixel value

• Audio &Video
Data flow (simplex, half-duplex, and full-duplex)

Keyboard to Monitor

Walkie Talkie

Telephone Lines
Elements of Network

• Commonly used n/w: Internet, Ethernet(LAN),Wi-fi

• N/w Elements:
1. Hub
2. Switch
3. Router
4. Bridge
5. Repeater
6. Links(Optical Fibre, Coaxial Cable, Wireless)

• What we study?
1. Protocols
2. Layers
Elements of Network
Network Interface Card:
 NIC is used to physically connect host devices to the network media.
 A NIC is a printed circuit board that fits into the expansion slot of a bus on a
computer motherboard.
 It can also be a peripheral device. NICs are sometimes called network adapters.
 Each NIC is identified by a unique code called a Media Access Control (MAC)
address.
 This address is used to control data communication for the host on the network.
Elements of Network
Repeaters

A repeater is a network device used to regenerate a signal.


Repeaters regenerate analog or digital signals that are distorted by
transmission loss due to attenuation.
A repeater does not make an intelligent decision concerning forwarding
packets
Elements of Network
Hubs

Hubs concentrate on connections.


In other words, they take a group of hosts and allow the network to see them as a
single unit. This is done passively, without any other effect on the data transmission.
Active hubs concentrate hosts and also regenerate signals.
Elements of Network
Bridges

Bridges convert network data formats and perform basic data transmission
management.
Bridges provide connections between LANs.
They also check data to determine if it should cross the bridge. This makes each part
of the network more efficient
Elements of Network
Switches

Switches add more intelligence to data transfer management.


They can determine if data should remain on a LAN and transfer data only to the
connection that needs it.
Another difference between a bridge and switch is that a switch does not convert data
transmission formats
Elements of Network
Routers

Routers have all the capabilities listed above.


Routers can regenerate signals, concentrate multiple connections, convert data
transmission formats, and manage data transfers.
They can also connect to a WAN, which allows them to connect LANs that are
separated by great distances.
Elements of Network
Gateway

A gateway is a piece of networking hardware used in telecommunications


for telecommunications networks that allows data to flow from one discrete
network to another.
Gateways are distinct from routers or switches in that they communicate
using more than one protocol to connect a bunch of networks
Elements of Network
Firewall
A firewall is a network device or software for controlling network security and access
rules.
 Firewalls are inserted in connections between secure internal networks and
potentially insecure external networks such as the Internet.
Firewalls are typically configured to reject access requests from unrecognized
sources while allowing actions from recognized ones.
The vital role firewalls play in network security grows in parallel with the constant
increase in cyber attacks.
Uses of CN
Computer Networks Vs Distributed Systems

 Uses Of CN:
N/W for companies: Resource Sharing
High Reliability
Saving Money
Scalability
Powerful Comm. medium
Uses Of CN
 N/W for People
Access to remote info.
Person to person comm.
Interactive Entertainment
Electronic Commerce
 Social Issues
Social , ethical, political
Home Network Applications

Some forms of e-commerce.


Home Network Applications

• Access to remote information


• Person-to-person communication
• Interactive entertainment
• Electronic commerce
Business Applications of Networks

A network with two clients and one server.


Business Applications of Networks (2)

The client-server model involves requests and replies.


Home Network Applications (2)

In peer-to-peer system there are no fixed clients and servers.


Mobile Network Users

Combinations of wireless networks and mobile computing.


Network Hardware

Computer Networks fit on :


•Transmission Technology
•Scale
Types of transmission technology

• Broadcast links
• Point-to-point links
Broadcast Links

• Broadcast links is in contrast a communication channel that is


shared by all the machines in the network.
• The difference between point-to-point and broadcast, is that in
broadcast networks, the packets are sent by any machine and
received by all the other machines.
Point to Point Links

• Point-to-point links is a connection between individual pairs of


machines.
• In this connection, a short message from the source to the
destination is sent which is called a “packet”.
• This packet may have to visit one or more intermediate machines
before it reaches the destination, therefore finding good routes
within the network is important in point-to-point transmission.
• A point-to-point transmission with one sender and one receiver is
called unicasting.
Classification on the basis of inter-processor distance

Classification of interconnected processors by scale.


Local Area Networks
Network in small geographical Area(Room, Building or a
Campus)is called LAN(Local Area Network)–10m–
1km,Room,Building,Campus

Two broadcast networks


(a) Bus
(b) Ring
Metropolitan Area Networks

• Network in a City is call MAN (Metropolitan Area Network),


• Cable television n/w–10km,City
Wide Area Networks

Relation between hosts on LANs and the subnet.

Network spread geographically (Country or across Globe)is called WAN


Wide Area Network),leased telephone lines, subnet consist of
routers/links-100–1000km, Country
Wide Area Networks (2)

A stream of packets from sender to receiver.


Wireless Networks

Categories of wireless networks:


• System interconnection
• Wireless LANs
• Wireless WANs
Wireless Networks (2)

(a) Bluetooth configuration


(b) Wireless LAN
Wireless Networks (3)

(a) Individual mobile computers


(b) A flying LAN
Home Network Categories
• Computers (desktop PC, PDA, shared peripherals
• Entertainment (TV, DVD, VCR, camera, stereo, MP3)
• Telecomm (telephone, cell phone, intercom, fax)
• Appliances (microwave, fridge, clock, furnace, airco)
• Telemetry (utility meter, burglar alarm, babycam).
Network Classification-Topology
• The network topology defines the way in which computers, printers, and
other devices are connected. A network topology describes the layout of
the wire and devices as well as the paths used by data transmissions.

• Mesh Topology
Network Classification-Topology
Bus: All networked nodes are interconnected, peer to peer, using a single, open-ended cable
Advantages:
1)Easy to implement and extend
2)Well suited for temporary networks that must be set up in a hurry
3)Typically the least cheapest topology to implement
4)Failure of one station does not affect others
Disadvantages:
1) Limited cable length and number of stations
2) A cable break can disable the entire network;
Network Classification-Topology
Ring: Token Passing mechanism
Advantages:
1)This type of network topology is very organized
2)Performance is better than that of Bus topology
3)No need for network server to control the connectivity between workstations
4)Additional components do not affect the performance of network
5)Each computer has equal access to resources
Disadvantages:
1)Each packet of data must pass through all the computers between source and destination, slower than star topology
2)If one workstation or port goes down, the entire network gets affected
Network Classification-Topology
Star: Advantages:
1)Compared to Bus topology it gives far much better performance
2)Easy to connect new nodes or devices
3)Centralized management. It helps in monitoring the network
4)Failure of one node or link doesn‘t affect the rest of network
Disadvantages:
1)If central device fails whole network goes down
2)The use of hub, a router or a switch as central device increases the overall cost of the network
Network Software
• Protocol Hierarchies
• Design Issues for the Layers
• Connection-Oriented and Connectionless Services
• Service Primitives
• The Relationship of Services to Protocols
Network Software
• To reduce their design complexity, most networks are organized as a stack of layers or levels,
each one built upon the one below it.
• No of layers, name of layers, content of layers and functions of layers varies from n/w to n/w
• Each layer is a kind of virtual machine offering services to layer above it
[This concept is variously known as information hiding, abstract data types, data
encapsulation, and object-oriented programming.
The fundamental idea is that a particular piece of software (or hardware)
provides a service to its users but keeps the details of its internal state and
algorithms hidden from them.]
Network Software
• When layer n on one machine carries on a conversation with layer n on another machine,
the rules and conventions used in this conversation are collectively known as the layer n
protocol.
• Protocol is an agreement between two communicating parties on how communication is to
be proceed.
• Entity comprising the corresponding layers on different m/c are called as peers ( S/w
processes, h/w devices, human beings..)
• In reality, no data are directly transferred from layer n on one machine to layer n on
another machine. Instead, each layer passes data and control information to the layer
immediately below it, until the lowest layer is reached. Below layer 1 is the physical
medium through which actual communication occurs.
Network Software
• A protocol is synonymous with rule. It consists of a set of rules that govern data communications.
• It determines what is communicated, how it is communicated and when it is communicated.
• The key elements of a protocol are syntax, semantics and timing
• Syntax
– Structure or format of the data
– Indicates how to read the bits - field delineation
• Semantics
– Interprets the meaning of the bits
– Knows which fields define what action
Timing
– When data should be sent and what
– Speed at which data should be sent or speed at which it is being received.
Network Software
• Between each pair of adjacent layers is an interface
• Interface defines which primitive operations or services, the lower layer makes available to the
upper ones.
• When network designers decide how many layers to include in a network and what each one should
do, one of the most important considerations is defining clean interfaces between the layers.
• Doing so, in turn, requires that each layer perform a specific collection of well-understood
functions.
• In addition to minimizing the amount of information that must be passed between layers, clear cut
interfaces also make it simpler to replace one layer with a completely different protocol or
implementation (e.g., replacing all the telephone lines by satellite channels) because all that is
required of the new protocol or implementation is that it offer exactly the same set of services to its
upstairs neighbor as the old one did.
Network Software
Protocol Hierarchies

Layers, protocols, and interfaces.


Network Software
• A set of layers and protocols is called a network architecture.
• The specification of an architecture must contain enough information to
allow an implementer to write the program or build the hardware for each
layer so that it will correctly obey the appropriate protocol.
• Neither the details of the implementation nor the specification of the
interfaces is part of the architecture because these are hidden away inside
the machines and not visible from the outside.
• A list of the protocols used by a certain system, one protocol per layer, is
called a protocol stack.
Protocol Hierarchies (2)

The philosopher-translator-secretary architecture.


Protocol Hierarchies (3)

Example information flow supporting virtual communication in layer 5.


Design Issues for the Layers

• Addressing
• Error Control
• Flow Control
• Multiplexing
• Routing
• Scalability
• Security
Connection-Oriented and Connectionless
Services

Six different types of service.


Service Primitives

• A service is formally specified by a set of primitives


(operations) available to user processes to access the service.
• These primitives tell the service to perform some action or
report on an action taken by a peer entity.
• The primitives for connection-oriented service are different
from those of connectionless service
Service Primitives

Five service primitives for implementing a simple connection-


oriented service.
Service Primitives (2)

Packets sent in a simple client-server interaction on a


connection-oriented network.
Services to Protocols Relationship

The relationship between a service and a protocol.


Reference Models

• The OSI Reference Model


• The TCP/IP Reference Model
• A Comparison of OSI and TCP/IP
Reference Models

The OSI
reference
model.

PDU: Protocol
Data Unit
Reference Models (2)

The TCP/IP reference model.


Reference Models (3)

Protocols and networks in the TCP/IP model initially.


Comparing OSI and TCP/IP Models

Concepts central to the OSI model


• Services
• Interfaces
• Protocols

You might also like