Computer network

samikshapadgilwar 2,843 views 47 slides Nov 10, 2016
Slide 1
Slide 1 of 47
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26
Slide 27
27
Slide 28
28
Slide 29
29
Slide 30
30
Slide 31
31
Slide 32
32
Slide 33
33
Slide 34
34
Slide 35
35
Slide 36
36
Slide 37
37
Slide 38
38
Slide 39
39
Slide 40
40
Slide 41
41
Slide 42
42
Slide 43
43
Slide 44
44
Slide 45
45
Slide 46
46
Slide 47
47

About This Presentation

A computer network is network of computer .It connects multiple computer in manner to enable meaningful transmission and exchange of data among them.Main objective of CN is sharing of information ,resources and processing load among the connected computer.
you can easily get basic introduction of CO...


Slide Content

Introduction
By;
samiksha padgilwar
(ELECTRONICS AND TELECOMMUNICATION
DEPARTMENT)
1
Computer Networks

Computer Networks
The old model of a single computer serving all of the
organization's computational needs has been replaced
by one in which a large number of separate but
interconnected computers do the job. These systems
are called computer networks.

Uses of Computer Networks
•Business Applications
•Home Applications
•Mobile Users
•Social Issues

Business Applications of Networks
A network with two clients and one server.
This whole arrangement is called the client-server model. It is
widely used and forms the basis of much network usage. It is
applicable when the client and server are both in the same building
(e.g., belong to the same company), but also when they are far apart.

Business Applications of Networks (2)
The client-server model involves requests and replies.

Home Network Applications
Some of the more popular uses of the Internet for home
users are as follows:
1. Access to remote information.
2. Person-to-person communication.
3. Interactive entertainment.
4. Electronic commerce.

Home Network Applications (2)
In peer-to-peer system there are no fixed clients and
servers.

Mobile Users
Mobile computers, such as notebook computers and
personal digital assistants (PDAs), are one of the
fastest growing segments of the computer industry.
Many owners of these computers have desktop
machines back at the office and want to be connected
to their home base even when away from home

Mobile Users (2)
Combinations of wireless networks and mobile
computing.

Social Issues
The widespread introduction of networking has
introduced new social, ethical, and political problems.
A lot of these problems could be solved if the
computer industry took computer security seriously. If
all messages were encrypted and
authenticated, it would be harder to commit mischief.

Network Hardware
•Local Area Networks (LANs)
•Metropolitan Area Networks (MANs)
•Wide Area Networks (WANs)
•Wireless Networks
•Home Networks
•Internetworks

Broadcast Networks
Types of transmission technology
Broadcast links:
Broadcast networks have a single communication channel that is
shared by all the machines on the network.
Point-to-point links:
Point-to-point networks consist of many connections between
individual pairs of machines.

Broadcast Networks (2)
Classification of interconnected processors by scale.

Local Area Networks
Two broadcast networks
(a) Bus (b) Ring
In a bus (i.e., a linear cable) network, at any instant at most one machine is the
master and is allowed to transmit. All other machines are required to refrain from
sending.
In a ring, each bit propagates around on its own, not waiting for the rest of the
packet to which it belongs. Typically, each bit circumnavigates the entire ring in
the time it takes to transmit a few bits, often before the complete packet has even
been transmitted.
Local area networks, generally called LANs, are privately-owned networks within a
single building or campus of up to a few kilometers in size.

Metropolitan Area Networks
A metropolitan area network based on cable TV.
A metropolitan area network, or MAN, covers a city. The best-known example of a
MAN is the cable television network available in many cities.

Wide Area Networks
Relation between hosts on LANs and the subnet.
A wide area network, or WAN, spans a large geographical area, often a country or
continent.

Wide Area Networks (2)
A stream of packets from sender to receiver.

Wireless Networks
Categories of wireless networks:
System interconnection
Wireless LANs
Wireless WANs

Wireless Networks (2)
(a) Bluetooth configuration (b) Wireless LAN

Wireless Networks (3)
(a) Individual mobile computers (b) A flying LAN

Home Network Categories
Some of the more obvious categories (with examples) are as follows:
Computers (desktop PC, PDA, shared peripherals
Entertainment (TV, DVD, VCR, camera, stereo, MP3)
Telecomm (telephone, cell phone, intercom, fax)
Appliances (microwave, fridge, clock, furnace, airco)
Telemetry (utility meter, burglar alarm, babycam).
The fundamental idea is that in the future most homes will be set up
for networking. Every device in the home will be capable of
communicating with every other device, and all of them will be
accessible over the Internet.

Network Software
Protocol Hierarchies
Design Issues for the Layers
Connection-Oriented and Connectionless Services
Service Primitives
The Relationship of Services to Protocols

Architecture of the Internet
Overview of the Internet

Protocol Hierarchies
To reduce their design complexity, most networks are
organized as a stack of layers or levels, each one built upon
the one below it.
The purpose of each layer is to offer certain services to the
higher layers, shielding those layers from the details of how
the offered services are actually implemented.
A protocol is an agreement between the communicating
parties on how communication is to proceed.
The interface defines which primitive operations and
services the lower layer makes available to the upper one.

Protocol Hierarchies (2)
Layers, protocols, and interfaces.

Protocol Hierarchies (3)
The philosopher-translator-secretary architecture.

Protocol Hierarchies (4)
Example information flow supporting virtual communication in layer 5.

Protocol Hierarchies (5)
A message, M, is produced by an application process running in layer 5
and given to layer 4 for transmission.
Layer 4 puts a header in front of the message to identify the message
and passes the result to layer 3.
Layer 3 must break up the incoming messages into smaller units,
packets, prepending a layer 3 header to each packet. In this example, M
is split into two parts, M1and M2. Layer 3 decides which of the
outgoing lines to use and passes the packets to layer 2.
Layer 2 adds not only a header to each piece, but also a trailer, and
gives the resulting unit to layer 1 for physical transmission.
At the receiving machine the message moves upward, from layer to
layer, with headers being stripped off as it progresses.

Design Issues for the Layers
 Addressing
consequence of having multiple destinations
 Error Control
The receiver should be able to inform sender which data was received
correctly
 Flow Control
Keep sender from swamping slow receiver with data
Keep the sender from swamping with data slow networks
 Multiplexing
Use same communication channel for multiple, unrelated
conversations
 Routing
When multiple paths between source and destination, one path must
be chosen

Connection-Oriented and Connectionless
Services
Connection-oriented
Connection-oriented services includes the steps of setting up a call from one computer to
another, transmitting/receiving data, and then releasing the call, just like a voice phone call.
However, the network connecting the computers is a packet switched network, unlike the
phone system's circuit switched network.
Connection-oriented communication is done in one of two ways over a packet switched network: with and without virtual circuits.
Connectionless:
Connectionless services is just packet switching where no call establishment
and release occur. A message is broken into packets, and each packet is transferred
separately. Moreover, the packets can travel different route to the destination since
there is no connection. Connectionless service is typically provided by the UDP
(User Datagram Protocol), which we will examine later.
The packets transferred using UDP are also called data grams.
With Virtual circuit: A virtual circuit is one which appears to the user as equivalent to a
dedicated point-point service but is maintained by computers.
Without virtual circuits: This is what TCP does in the Internet. The only two machines in
the Internet that are aware a connection is established are the two computers at the
endpoints. The Internet itself--its routers and links--have no information about the presence
of a connection between the two computers.

Difference: Connection-Oriented and Connectionless Services
Feature Connectionless Connection-oriented
How is data sent? one packet at a timeas continuous stream of packets
Do packets follow same route? no
virtual circuit: yes
without virtual circuit: no
Are resources reserved in network? no
virtual circuit: yes
without virtual circuit: no
Is connection establishment done? no yes
Is state information stored at
network nodes?
no
virtual circuit: yes
without virtual circuit: no
What is impact of node/switch
crash?
only packets at node are lostall virtual circuits through node fail
What addressing information is
needed on each packet?
full source and destination address
virtual circuit: a virtual circuit
number
without virtual circuit: full source
and destination address

Service Primitives
Five service primitives for implementing a simple connection-
oriented service.

Service Primitives (2)
Packets sent in a simple client-server interaction on a connection-
oriented network.

Services to Protocols Relationship
The relationship between a service and a protocol
A protocol, in contrast, is a set of rules governing the format and meaning of the
packets, or messages that are exchanged by the peer entities within a layer.
A service is like an abstract data type or an object in an object-oriented language. It
defines operations that can be performed on an object but does not specify how these
operations are implemented. A protocol relates to the implementation of the service and
as such is not visible to the user of the service.

Reference Models
The OSI Reference Model
The TCP/IP Reference Model
A Comparison of OSI and TCP/IP
A Critique of the OSI Model and Protocols
A Critique of the TCP/IP Reference Model

The OSI Reference Model

The TCP/IP reference model.

The TCP/IP reference model (2)
Protocols and networks in the TCP/IP model initially.
On top of the transport layer is the application layer. It contains all the higher-level protocols.
The early ones included virtual terminal (TELNET), file transfer (FTP), and electronic mail
(SMTP)

Comparison between OSI and TCP/IP
Reference Models
OSI
1)It has 7 layers
2)Transport layer guarantees delivery of
packets
3)Separate presentation layer
4)Separate session layer
5)Network layer provides both
connectionless and connection oriented
services
6)It defines the services, interfaces and
protocols very clearly and makes a clear
distinction between them
7)It has a problem of protocol filtering into
a model
TCP/IP
1)Has 4 layers
2)Transport layer does not guarantees
delivery of packets
3)No presentation layer, characteristics
are provided by application layer
4)No session layer, characteristics are
provided by transport layer
5)Network layer provides only
connection less services
6)It does not clearly distinguishes
between service interface and
protocols
7)The model does not fit any protocol
stack.

A Critique of the OSI Model and
Protocols
Why OSI did not take over the world:
Bad timing
Bad technology
Bad implementations
Bad politics

A Critique of the TCP/IP Reference
Model
Problems:
Service, interface, and protocol not distinguished
Not a general model
Host-to-network “layer” not really a layer
No mention of physical and data link layers
Minor protocols deeply entrenched, hard to replace

EXAMPLE NETWORKS:
Internet
The ARPANET
NFSNET
Connection-Oriented Network
X.25
ATM
Ethernet
Wireless LANs: 802.11

ATM (Asynchronous Transfer Mode)
ATM virtual circuits
ATM virtual circuits

ATM Virtual Circuits (2)
An ATM cell

The ATM Reference Model
The ATM reference model

The ATM Reference Model (2)
The ATM layers and sublayers and their functions.

References
Computer Networks,Tanenbaum, 4th Edition.
Data Communications and Networking,
Behrouz A. Forouzan, 4
th
Edition.
Computer Networks, A Systems Approach,
Larry L. Peterson & Bruce S. Davie,
4th Edition.