SlideShare a Scribd company logo
1 of 51
Network Protocol,
Structure & Scope
Gaurav Kumar Goyal(066BCT514)
Janardan Chaudhary(066BCT516)
Nimesh Mishra(066BCT519)
Sanat Maharjan(066BCT531)
Network Protocol
What is network protocol ?
• Network Protocol is a set of rules that governs the communications
between computers on a network.
• The computer network consists of many different protocols for helping it
carrying data packets.
• These protocols are designed to work on different level of network layers.
The functionality of these layers are different depending on the network
model.
• There are two types of network models:
• OSI model
• TCP/IP model
Some of the basic network protocols
1. Ethernet
2. Token Ring
3. FDDI
4. ATM
1.Ethernet
• The Ethernet protocol is by far the most widely used.
• Ethernet uses an access method called CSMA/CD (Carrier Sense
Multiple Access/Collision Detection). This is a system where each
computer listens to the cable before sending anything through the
network.
• If the network is clear, the computer will transmit. If some other node
is already transmitting on the cable, the computer will wait and try
again when the line is clear.
• Sometimes, two computers attempt to transmit at the same instant.
When this happens a collision occurs. Each computer then backs off
and waits a random amount of time before attempting to retransmit.
• With this access method, it is normal to have collisions.
However, the delay caused by collisions and retransmitting is
very small and does not normally effect the speed of
transmission on the network.
• The Ethernet protocol allows for linear bus, star, or tree
topologies.
• Data can be transmitted over wireless access points, twisted
pair, coaxial, or fiber optic cable at a speed of 10 Mbps up to
1000 Mbps.
1.Ethernet (Contd..)
2.Token Ring
• The Token Ring protocol was developed by IBM in the mid-1980s. The
access method used involves token-passing.
• In Token Ring, the computers are connected so that the signal travels
around the network from one computer to another in a logical ring.
• A single electronic token moves around the ring from one computer
to the next.
• If a computer does not have information to transmit, it simply passes
the token on to the next workstation. If a computer wishes to
transmit and receives an empty token, it attaches data to the token.
• The token then proceeds around the ring until it comes to the
computer for which the data is meant. At this point, the data
is captured by the receiving computer.
• The Token Ring protocol requires a star-wired ring using
twisted pair or fiber optic cable.
• It can operate at transmission speeds of 4 Mbps or 16 Mbps.
• Due to the increasing popularity of Ethernet, the use of Token
Ring in school environments has decreased.
2.Token Ring (Contd..)
3.FDDI
• Fiber Distributed Data Interface (FDDI) is a network protocol that is
used primarily to interconnect two or more local area networks, often
over large distances.
• The access method used by FDDI involves token-passing.
• FDDI uses a dual ring physical topology.
• Transmission normally occurs on one of the rings; however, if a break
occurs, the system keeps information moving by automatically using
portions of the second ring to create a new complete ring.
• A major advantage of FDDI is speed. It operates over fiber optic cable
at 100 Mbps.
4.ATM
• Asynchronous Transfer Mode (ATM) is a network protocol that transmits data at
a speed of 155 Mbps and higher.
• ATM works by transmitting all data in small packets of a fixed size; whereas,
other protocols transfer variable length packets.
• ATM supports a variety of media such as video, CD-quality audio, and imaging.
• ATM employs a star topology, which can work with fiber optic as well as twisted
pair cable.
• ATM is most often used to interconnect two or more local area networks. It is
also frequently used by Internet Service Providers to utilize high-speed access to
the Internet for their clients.
• As ATM technology becomes more cost-effective, it will provide another solution
for constructing faster local area networks.
Network Structure
What is Network Structure
• a network structure is anything pertaining to a computer network
• these systems may be anything from the design of the network all the way through
implementation and use
• can be many different things to different people
• from the perspective of one of the people that designed or implemented a network, it
is a collection of wires, computers and components
• is composed mostly of cables, switches and workstations
• in larger businesses, these networks are often designed by a network architect and
implemented by network engineers
• in smaller areas or homes, the physical network is rarely complex enough to need an
actual design
Network Structure’s Classification
• Based on transmission media: Wired (UTP, coaxial
cables, fiber-optic cables) and Wireless
• Based on network size: LAN and WAN (and MAN)
• Based on management method: Peer-to-peer and
Client/Server
• Based on topology (connectivity): Bus, Star, Ring …
Based on network size
• LAN - Local Area Network
• WAN - Wide Area Network
• MAN – Metropolitan Area Network
Based on management
method:
• Peer to Peer
• Client Server
Peer to Peer
• resources are shared between peers without any
central coordination by a server
• act as both suppliers and consumers of resources
• implement an abstract overlay network at the
application layer on top of the physical network
topology
• share resources inexpensively as possible
Peer to Peer (contd..)
• is no centralized security scheme and end users
themselves are allowed to control access to
resources, reducing the security in peer to peer
networks
• users can create any share point that they wish in
their computer and security can only be provided
by assigning a password when they create the
share point
Client Server
• is built on the concept of servers providing
services and a set of clients requesting those
services
• A server is actually a host that is running one or
more server programs, which share their
resources with the clients
• The client initiates the communication session
with the servers by requesting server’s content or
services
Client Server (contd..)
• Servers always await incoming requests from
clients
• have centralized security database, which controls
the access to shared resources on the server
• server contains a list of usernames and passwords
and a user is only allowed to access the network
only if they provide a valid username and a
password to the server
Client Server (contd..)
• After they login, users can only access those
resources that have been granted permission for
by the network administrator
• Widely used functions such as email exchange,
web access and database access are built on the
client–server architecture
Client Server vs Peer to Peer
• A client server system has a server or set of central
servers that manage all the activities in the
network and they are expensive to implement.
• A peer-to-peer network is essentially composed of
user workstations that share files and resources
but are not centrally managed by other computers
Client Server vs Peer to Peer
(Contd..)
• Tasks or workloads are partitioned between
servers, and services are requested by clients
• Tasks or workloads are partitioned between peers
and these peers are said to form a peer to peer
network
Client Server vs Peer to Peer
(Contd..)
• There are designated clients that request for services
and servers that provide services in Client-server
• Peers act as both service providers and service
consumers in P2P
• Are more stable and could be scaled as much as we
need in Client-server
• Suffer in performance as the number of nodes
increase in P2P
Client Server vs Peer to Peer
(Contd..)
• Servers define rights and roles for client
computers in Client-server
• All computers have same rights and roles in P2P
• A dedicated file server provides level of access to
the clients, providing better security in Client-
server
• Security is handled by the end users in P2P
Based on Topologies
• Bus Topologies
• Star Topologies
• Mesh Topologies
• Ring Topologies
Bus Topologies
• uses one cable to connect multiple computers
• cable is also called a trunk, a backbone, and a
segment
• To prevent packets from bouncing up and down
the cable, devices called terminators must be
attached to both ends of the cable
• Only one computer at a time can transmit a packet
Bus Topologies (Contd..)
• listen to all traffic on the network but accept only the
packets that are addressed to them
• Broadcast packets are an exception because all
computers on the network accept them
• When a computer sends out a packet, it travels in both
directions from the computer.
• number of computers on a bus topology network has a
major influence on the performance of the network
Bus Topologies (Contd..)
• bus is a passive topology
• The computers on a bus topology only listen or
send data
• do not take data and send it on or regenerate it
• So if one computer on the network fails, the
network is still up
Bus Topologies (Contd..)
Star Topologies
• all computers are connected through one central
hub or switch
• Computer in a star topology are all connected to a
central hub
• A star topology actually comes from the days of
the mainframe system
• The mainframe system had a centralized point
where the terminals connected
Star Topologies (Contd..)
Mesh Topologies
• more commonly seen with something like the
national phone network
• With the mesh topology, every workstation has a
connection to every other component of the
network
• Computers in a mesh topology are all connected to
every other component of the network
Mesh Topologies (Contd..)
Ring Topologies
• all computers are connected with a cable that loops
around
• the ring topology is a circle that has no start and no
end
• Terminators are not necessary in a ring topology
• Signals travel in one direction on a ring while they are
passed from one computer to the next.
• Each computer checks the packet for its destination
and passes it on as a repeater would
Ring Topologies (Contd..)
Scope of Network
Local area network
• A local area network (LAN) is a network that connects computers
and devices in a limited geographical area such as home, school,
computer laboratory, office building, or closely positioned group
of buildings.
• Each computer or device on the network is a node.
• Current wired LANs are most likely to be based on Ethernet
technology, although new standards like ITU-T G.hn also provide
a way to create a wired LAN using existing home wires (coaxial
cables, phone lines and power lines).Typical library network, in a
branching tree topology and controlled access to resources.
• All interconnected devices must understand the network layer
(layer 3), because they are handling multiple subnets (the
different colors).
Local area network (Contd..)
• Those inside the library, which have only 10/100 Mbit/s Ethernet
connections to the user device and a Gigabit Ethernet connection to the
central router, could be called "layer 3 switches" because they only have
Ethernet interfaces and must understand IP.
• It would be more correct to call them access routers, where the router
at the top is a distribution router that connects to the Internet and
academic networks customer access routers.
• The defining characteristics of LANs, in contrast to WANs (Wide Area
Networks), include their higher data transfer rates, smaller geographic
range, and no need for leased telecommunication lines.
• Current Ethernet or other IEEE 802.3 LAN technologies operate at
speeds up to 10 Grit/s. This is the data transfer rate. IEEE has projects
investigating the standardization of 40 and 100 Grit/s
Personal area network
• A personal area network (PAN) is a computer network used for
communication among computer and different information
technological devices close to one person.
• Some examples of devices that are used in a PAN are personal
computers, printers, fax machines, telephones, PDAs, scanners,
and even video game consoles.
• A PAN may include wired and wireless devices. The reach of a
PAN typically extends to 10 meters.
• A wired PAN is usually constructed with USB and Fire wire
connections while technologies such as Bluetooth and infrared
communication typically form a wireless PAN.
Home area network
• A home area network (HAN) is a residential LAN which is used
for communication between digital devices typically deployed in
the home, usually a small number of personal computers and
accessories, such as printers and mobile computing devices.
• An important function is the sharing of Internet access, often a
broadband service through a CATV or Digital Subscriber Line
(DSL) provider. It can also be referred to as an office area
network (OAN).
Wide area network
• A wide area network (WAN) is a computer network that covers
a large geographic area such as a city, country, or spans even
intercontinental distances, using a communications channel
that combines many types of media such as telephone lines,
cables, and air waves.
• A WAN often uses transmission facilities provided by common
carriers, such as telephone companies.
• WAN technologies generally function at the lower three layers
of the OSI reference model: the physical layer, the data link
layer, and the network layer.
Campus network
• A campus network is a computer network made up of an
interconnection of local area networks (LAN's) within a limited
geographical area.
• The networking equipment (switches, routers) and transmission
media (optical fiber, copper plant, Cat5 cabling etc.) are almost
entirely owned (by the campus tenant / owner: an enterprise,
university, government etc.).
• In the case of a university campus-based campus network, the
network is likely to link a variety of campus buildings including;
academic departments, the university library and student
residence halls.
Metropolitan area network
• A Metropolitan area network is a large computer network that
usually spans a city or a large campus.
• Sample EPN made of Frame relay WAN connections and dialup
remote access.
• Sample VPN used to interconnect 3 offices and remote users
Virtual private network
• A virtual private network (VPN) is a computer network in which some of the
links between nodes are carried by open connections or virtual circuits in
some larger network (e.g., the Internet) instead of by physical wires.
• The data link layer protocols of the virtual network are said to be tunneled
through the larger network when this is the case.
• One common application is secure communications through the public
Internet, but a VPN need not have explicit security features, such as
authentication or content encryption.
• VPNs, for example, can be used to separate the traffic of different user
communities over an underlying network with strong security features.
• VPN may have best-effort performance, or may have a defined service level
agreement (SLA) between the VPN customer and the VPN service provider.
Generally, a VPN has a topology more complex than point-to-point.
Backbone network
• A Backbone network (BBN) a backbone network or network backbone is part of a
computer network infrastructure that interconnects various pieces of network,
providing a path for the exchange of information between different LANs or sub
networks a backbone can tie together diverse networks in the same building, in
different buildings in a campus environment, or over wide areas.
• Normally, the backbone's capacity is greater than the networks connected to it.
• A large corporation that has many locations may have a backbone network that ties
all of the locations together, for example, if a server cluster needs to be accessed by
different departments of a company that are located at different geographical
locations.
• The pieces of the network connections (for example: Ethernet, wireless) that bring
these departments together is often mentioned as network backbone.
• Network congestion is often taken into consideration while designing backbones.
• Backbone networks should not be confused with the Internet backbone.
Backbone network
• A Backbone network (BBN) a backbone network or network backbone is part of a
computer network infrastructure that interconnects various pieces of network,
providing a path for the exchange of information between different LANs or sub
networks a backbone can tie together diverse networks in the same building, in
different buildings in a campus environment, or over wide areas.
• Normally, the backbone's capacity is greater than the networks connected to it.
• A large corporation that has many locations may have a backbone network that ties
all of the locations together, for example, if a server cluster needs to be accessed by
different departments of a company that are located at different geographical
locations.
• The pieces of the network connections (for example: Ethernet, wireless) that bring
these departments together is often mentioned as network backbone.
• Network congestion is often taken into consideration while designing backbones.
• Backbone networks should not be confused with the Internet backbone.
Global area network
• A global area network (GAN) is a network used for supporting mobile communications
across an arbitrary number of wireless LANs, satellite coverage areas, etc.
• The key challenge in mobile communications is handing off the user communications
from one local coverage area to the next.
• In IEEE Project 802, this involves a succession of terrestrial wireless LANs.
Internet
• The Internet is a global system of interconnected governmental, academic, corporate,
public, and private computer networks.
• It is based on the networking technologies of the Internet Protocol Suite.
• It is the successor of the Advanced Research Projects Agency Network (ARPANET)
developed by DARPA of the United States Department of Defense.
• The Internet is also the communications backbone underlying the World Wide Web
(WWW).
• Participants in the Internet use a diverse array of methods of several hundred
documented, and often standardized, protocols compatible with the Internet Protocol
Suite and an addressing system (IP addresses) administered by the Internet Assigned
Numbers Authority and address registries.
• Service providers and large enterprises exchange information about the reachability of
their address spaces through the Border Gateway Protocol (BGP), forming a redundant
worldwide mesh of transmission paths.
Intranets and extranets
• Intranets and extranets are parts or extensions of a computer network, usually a local area
network.
• An intranet is a set of networks, using the Internet Protocol and IP-based tools such as web
browsers and file transfer applications that is under the control of a single administrative
entity.
• That administrative entity closes the intranet to all but specific, authorized users. Most
commonly, an intranet is the internal network of an organization.
• A large intranet will typically have at least one web server to provide users with organizational
information.
• An extranet is a network that is limited in scope to a single organization or entity and also has
limited connections to the networks of one or more other usually, but not necessarily, trusted
organizations or entities—a company's customers may be given access to some part of its
intranet—while at the same time the customers may not be considered trusted from a
security standpoint.
• Technically, an extranet may also be categorized as a CAN, MAN, WAN, or other type of
network, although an extranet cannot consist of a single LAN; it must have at least one
connection with an external network.
Overlay network
• An overlay network is a virtual computer network that is built on top of another
network.
• Nodes in the overlay are connected by virtual or logical links, each of which
corresponds to a path, perhaps through many physical links, in the underlying
network.
• A sample overlay network: IP over SONET over Optical For example, many peer-to-
peer networks are overlay networks because they are organized as nodes of a virtual
system of links run on top of the Internet.
• The Internet was initially built as an overlay on the telephone network. Overlay
networks have been around since the invention of networking when computer
systems were connected over telephone lines using modem, before any data network
existed.
Overlay network (Conntd..)
• Nowadays the Internet is the basis for many overlaid networks that can be constructed
to permit routing of messages to destinations specified by an IP address.
• For example, distributed hash tables can be used to route messages to a node having a
specific logical address, whose IP address is known in advance.
• Overlay networks have also been proposed as a way to improve Internet routing, such
as through quality of service guarantees to achieve higher-quality streaming media.
• Previous proposals such as Insert, Differ, and IP Multicast have not seen wide
acceptance largely because they require modification of all routers in the
network.[citation needed] On the other hand, an overlay network can be
incrementally deployed on end-hosts running the overlay protocol software, without
cooperation from Internet service providers.
• The overlay has no control over how packets are routed in the underlying network
between two overlay nodes, but it can control, for example, the sequence of overlay
nodes a message traverses before reaching its destination.

More Related Content

What's hot

TCP- Transmission Control Protocol
TCP-  Transmission Control Protocol TCP-  Transmission Control Protocol
TCP- Transmission Control Protocol Akhil .B
 
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)k33a
 
PPP(Point-to-Point Protocol): Components & Characteristics
PPP(Point-to-Point Protocol): Components & CharacteristicsPPP(Point-to-Point Protocol): Components & Characteristics
PPP(Point-to-Point Protocol): Components & CharacteristicsAnuj Parajuli
 
communication-protocols
 communication-protocols communication-protocols
communication-protocolsAli Kamil
 
Internet protocol (ip) ppt
Internet protocol (ip) pptInternet protocol (ip) ppt
Internet protocol (ip) pptDulith Kasun
 
TCP/IP Network ppt
TCP/IP Network pptTCP/IP Network ppt
TCP/IP Network pptextraganesh
 
Circuit and packet_switching
Circuit and packet_switchingCircuit and packet_switching
Circuit and packet_switchinghoanv
 
TCP - IP Presentation
TCP - IP PresentationTCP - IP Presentation
TCP - IP PresentationHarish Chand
 
Multiplexing and spreading
Multiplexing and spreadingMultiplexing and spreading
Multiplexing and spreadingShankar Gangaju
 
Computer network switching
Computer network switchingComputer network switching
Computer network switchingShivani Godha
 
ATM Networking Concept
ATM Networking ConceptATM Networking Concept
ATM Networking ConceptTushar Ranjan
 
Hub, switch, router, bridge & and repeater
Hub, switch, router, bridge & and repeaterHub, switch, router, bridge & and repeater
Hub, switch, router, bridge & and repeaterMaksudujjaman
 
Routing Information Protocol
Routing Information ProtocolRouting Information Protocol
Routing Information ProtocolKashif Latif
 
Computer Network - Network Layer
Computer Network - Network LayerComputer Network - Network Layer
Computer Network - Network LayerManoj Kumar
 
Mobile transportlayer
Mobile transportlayerMobile transportlayer
Mobile transportlayerRahul Hada
 

What's hot (20)

TCP- Transmission Control Protocol
TCP-  Transmission Control Protocol TCP-  Transmission Control Protocol
TCP- Transmission Control Protocol
 
Osi model
Osi modelOsi model
Osi model
 
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)
 
PPP(Point-to-Point Protocol): Components & Characteristics
PPP(Point-to-Point Protocol): Components & CharacteristicsPPP(Point-to-Point Protocol): Components & Characteristics
PPP(Point-to-Point Protocol): Components & Characteristics
 
Lan technologies
Lan technologiesLan technologies
Lan technologies
 
communication-protocols
 communication-protocols communication-protocols
communication-protocols
 
Switching
SwitchingSwitching
Switching
 
Internet protocol (ip) ppt
Internet protocol (ip) pptInternet protocol (ip) ppt
Internet protocol (ip) ppt
 
TCP/IP Network ppt
TCP/IP Network pptTCP/IP Network ppt
TCP/IP Network ppt
 
Circuit and packet_switching
Circuit and packet_switchingCircuit and packet_switching
Circuit and packet_switching
 
TCP - IP Presentation
TCP - IP PresentationTCP - IP Presentation
TCP - IP Presentation
 
Multiplexing and spreading
Multiplexing and spreadingMultiplexing and spreading
Multiplexing and spreading
 
Computer network switching
Computer network switchingComputer network switching
Computer network switching
 
ATM Networking Concept
ATM Networking ConceptATM Networking Concept
ATM Networking Concept
 
Hub, switch, router, bridge & and repeater
Hub, switch, router, bridge & and repeaterHub, switch, router, bridge & and repeater
Hub, switch, router, bridge & and repeater
 
X.25 and frame relay
X.25 and frame relayX.25 and frame relay
X.25 and frame relay
 
Routing Information Protocol
Routing Information ProtocolRouting Information Protocol
Routing Information Protocol
 
TCP/ IP
TCP/ IP TCP/ IP
TCP/ IP
 
Computer Network - Network Layer
Computer Network - Network LayerComputer Network - Network Layer
Computer Network - Network Layer
 
Mobile transportlayer
Mobile transportlayerMobile transportlayer
Mobile transportlayer
 

Viewers also liked

AOS Lab 2: Hello, xv6!
AOS Lab 2: Hello, xv6!AOS Lab 2: Hello, xv6!
AOS Lab 2: Hello, xv6!Zubair Nabi
 
Introduction of Software Engineering
Introduction of Software EngineeringIntroduction of Software Engineering
Introduction of Software EngineeringZafar Ayub
 
Customer App Flow
Customer App FlowCustomer App Flow
Customer App FlowZafar Ayub
 
How to add system calls to OS/161
How to add system calls to OS/161How to add system calls to OS/161
How to add system calls to OS/161Xiao Qin
 
Supplier management v4.0_11_mar_12
Supplier management v4.0_11_mar_12Supplier management v4.0_11_mar_12
Supplier management v4.0_11_mar_12Jeran Binning
 
Overlay networks ppt
Overlay networks pptOverlay networks ppt
Overlay networks pptAkshay Hegde
 
Internet application
Internet applicationInternet application
Internet applicationRezaul Rahat
 
Bai 20-Mạng máy tính
Bai 20-Mạng máy tínhBai 20-Mạng máy tính
Bai 20-Mạng máy tínhbatup1989
 
Introduction To Organization Fundamentals Ppt Presentation Eashwer
Introduction To  Organization   Fundamentals   Ppt Presentation   EashwerIntroduction To  Organization   Fundamentals   Ppt Presentation   Eashwer
Introduction To Organization Fundamentals Ppt Presentation EashwerChockalingam Eswaramurthi
 
The Top 7 Outcomes Measures and 3 Measurement Essentials
The Top 7 Outcomes Measures and 3 Measurement EssentialsThe Top 7 Outcomes Measures and 3 Measurement Essentials
The Top 7 Outcomes Measures and 3 Measurement EssentialsHealth Catalyst
 
Lecture application layer
Lecture application layerLecture application layer
Lecture application layerHasam Panezai
 

Viewers also liked (20)

AOS Lab 2: Hello, xv6!
AOS Lab 2: Hello, xv6!AOS Lab 2: Hello, xv6!
AOS Lab 2: Hello, xv6!
 
Mang internet
Mang internetMang internet
Mang internet
 
Network Topologies
Network TopologiesNetwork Topologies
Network Topologies
 
Computer network
Computer networkComputer network
Computer network
 
Introduction of Software Engineering
Introduction of Software EngineeringIntroduction of Software Engineering
Introduction of Software Engineering
 
Overlay networks
Overlay networksOverlay networks
Overlay networks
 
Customer App Flow
Customer App FlowCustomer App Flow
Customer App Flow
 
How to add system calls to OS/161
How to add system calls to OS/161How to add system calls to OS/161
How to add system calls to OS/161
 
Supplier management v4.0_11_mar_12
Supplier management v4.0_11_mar_12Supplier management v4.0_11_mar_12
Supplier management v4.0_11_mar_12
 
SKYPE AS OVERLAY NETWORK
SKYPE AS OVERLAY NETWORKSKYPE AS OVERLAY NETWORK
SKYPE AS OVERLAY NETWORK
 
Overlay network
Overlay networkOverlay network
Overlay network
 
Overlay networks ppt
Overlay networks pptOverlay networks ppt
Overlay networks ppt
 
Use case
Use caseUse case
Use case
 
Internet application
Internet applicationInternet application
Internet application
 
Bai 20-Mạng máy tính
Bai 20-Mạng máy tínhBai 20-Mạng máy tính
Bai 20-Mạng máy tính
 
Introduction To Organization Fundamentals Ppt Presentation Eashwer
Introduction To  Organization   Fundamentals   Ppt Presentation   EashwerIntroduction To  Organization   Fundamentals   Ppt Presentation   Eashwer
Introduction To Organization Fundamentals Ppt Presentation Eashwer
 
Computer Network
Computer NetworkComputer Network
Computer Network
 
The Top 7 Outcomes Measures and 3 Measurement Essentials
The Top 7 Outcomes Measures and 3 Measurement EssentialsThe Top 7 Outcomes Measures and 3 Measurement Essentials
The Top 7 Outcomes Measures and 3 Measurement Essentials
 
Organisation Structure
Organisation StructureOrganisation Structure
Organisation Structure
 
Lecture application layer
Lecture application layerLecture application layer
Lecture application layer
 

Similar to Network Protocols & Structures Explained

DS Unit-4-Communication .pdf
DS Unit-4-Communication .pdfDS Unit-4-Communication .pdf
DS Unit-4-Communication .pdfSantoshUpreti6
 
Networking presentationNetworking presentation.pptNetworking presentation.ppt...
Networking presentationNetworking presentation.pptNetworking presentation.ppt...Networking presentationNetworking presentation.pptNetworking presentation.ppt...
Networking presentationNetworking presentation.pptNetworking presentation.ppt...nesarahmad37
 
CISSP - Chapter 4 - Network Topology
CISSP - Chapter 4 - Network TopologyCISSP - Chapter 4 - Network Topology
CISSP - Chapter 4 - Network TopologyKarthikeyan Dhayalan
 
12 ipt 0303 transmitting and receiving
12 ipt 0303   transmitting and receiving12 ipt 0303   transmitting and receiving
12 ipt 0303 transmitting and receivingctedds
 
Computer networks
Computer networksComputer networks
Computer networkssamina khan
 
KRISHNA_COMPUTER_PROJECT.pptx
KRISHNA_COMPUTER_PROJECT.pptxKRISHNA_COMPUTER_PROJECT.pptx
KRISHNA_COMPUTER_PROJECT.pptxADITYAKUMAR554673
 
Computer networks grade 7
Computer networks grade 7Computer networks grade 7
Computer networks grade 7samina khan
 
Module 1 Introduction to Computer Networks.pptx
Module 1 Introduction to Computer Networks.pptxModule 1 Introduction to Computer Networks.pptx
Module 1 Introduction to Computer Networks.pptxAASTHAJAJOO
 
1-introduction-to-computer-networking-converted 2.pptx
1-introduction-to-computer-networking-converted 2.pptx1-introduction-to-computer-networking-converted 2.pptx
1-introduction-to-computer-networking-converted 2.pptxYashwant Srikrishnan
 
network fundamentals
network fundamentalsnetwork fundamentals
network fundamentalsSithu PM
 
1-introduction-to-computer-networking.pdf
1-introduction-to-computer-networking.pdf1-introduction-to-computer-networking.pdf
1-introduction-to-computer-networking.pdfsophia763824
 
1-introduction-to-computer-networking.pdf
1-introduction-to-computer-networking.pdf1-introduction-to-computer-networking.pdf
1-introduction-to-computer-networking.pdfJamesOtieno34
 
Computer Network
Computer NetworkComputer Network
Computer NetworkRubaya Mim
 

Similar to Network Protocols & Structures Explained (20)

Unit2.2
Unit2.2Unit2.2
Unit2.2
 
DS Unit-4-Communication .pdf
DS Unit-4-Communication .pdfDS Unit-4-Communication .pdf
DS Unit-4-Communication .pdf
 
Networking presentationNetworking presentation.pptNetworking presentation.ppt...
Networking presentationNetworking presentation.pptNetworking presentation.ppt...Networking presentationNetworking presentation.pptNetworking presentation.ppt...
Networking presentationNetworking presentation.pptNetworking presentation.ppt...
 
CISSP - Chapter 4 - Network Topology
CISSP - Chapter 4 - Network TopologyCISSP - Chapter 4 - Network Topology
CISSP - Chapter 4 - Network Topology
 
12 ipt 0303 transmitting and receiving
12 ipt 0303   transmitting and receiving12 ipt 0303   transmitting and receiving
12 ipt 0303 transmitting and receiving
 
Network protocol
Network protocolNetwork protocol
Network protocol
 
Networking
Networking Networking
Networking
 
Computer networks
Computer networksComputer networks
Computer networks
 
KRISHNA_COMPUTER_PROJECT.pptx
KRISHNA_COMPUTER_PROJECT.pptxKRISHNA_COMPUTER_PROJECT.pptx
KRISHNA_COMPUTER_PROJECT.pptx
 
Computer networks grade 7
Computer networks grade 7Computer networks grade 7
Computer networks grade 7
 
Computer network
Computer networkComputer network
Computer network
 
MVA slides lesson 1
MVA slides lesson 1MVA slides lesson 1
MVA slides lesson 1
 
Module 1 Introduction to Computer Networks.pptx
Module 1 Introduction to Computer Networks.pptxModule 1 Introduction to Computer Networks.pptx
Module 1 Introduction to Computer Networks.pptx
 
Networking basics
Networking basicsNetworking basics
Networking basics
 
1-introduction-to-computer-networking-converted 2.pptx
1-introduction-to-computer-networking-converted 2.pptx1-introduction-to-computer-networking-converted 2.pptx
1-introduction-to-computer-networking-converted 2.pptx
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
 
network fundamentals
network fundamentalsnetwork fundamentals
network fundamentals
 
1-introduction-to-computer-networking.pdf
1-introduction-to-computer-networking.pdf1-introduction-to-computer-networking.pdf
1-introduction-to-computer-networking.pdf
 
1-introduction-to-computer-networking.pdf
1-introduction-to-computer-networking.pdf1-introduction-to-computer-networking.pdf
1-introduction-to-computer-networking.pdf
 
Computer Network
Computer NetworkComputer Network
Computer Network
 

More from Sanat Maharjan

Automate+ Final Report
Automate+ Final ReportAutomate+ Final Report
Automate+ Final ReportSanat Maharjan
 
Automate+ Final Presentation
Automate+ Final PresentationAutomate+ Final Presentation
Automate+ Final PresentationSanat Maharjan
 
Chap 6 IMplementation of Information System
Chap 6 IMplementation of Information SystemChap 6 IMplementation of Information System
Chap 6 IMplementation of Information SystemSanat Maharjan
 
Chapter 6 Information System-Critical Success Factor
Chapter 6 Information System-Critical Success FactorChapter 6 Information System-Critical Success Factor
Chapter 6 Information System-Critical Success FactorSanat Maharjan
 

More from Sanat Maharjan (7)

xaml overview
xaml overviewxaml overview
xaml overview
 
Automate+ Final Report
Automate+ Final ReportAutomate+ Final Report
Automate+ Final Report
 
Automate+ Final Presentation
Automate+ Final PresentationAutomate+ Final Presentation
Automate+ Final Presentation
 
Chap 6 IMplementation of Information System
Chap 6 IMplementation of Information SystemChap 6 IMplementation of Information System
Chap 6 IMplementation of Information System
 
Chapter 6 Information System-Critical Success Factor
Chapter 6 Information System-Critical Success FactorChapter 6 Information System-Critical Success Factor
Chapter 6 Information System-Critical Success Factor
 
AutoMate+
AutoMate+AutoMate+
AutoMate+
 
FarMate
FarMateFarMate
FarMate
 

Recently uploaded

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 

Recently uploaded (20)

Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 

Network Protocols & Structures Explained

  • 1. Network Protocol, Structure & Scope Gaurav Kumar Goyal(066BCT514) Janardan Chaudhary(066BCT516) Nimesh Mishra(066BCT519) Sanat Maharjan(066BCT531)
  • 3. What is network protocol ? • Network Protocol is a set of rules that governs the communications between computers on a network. • The computer network consists of many different protocols for helping it carrying data packets. • These protocols are designed to work on different level of network layers. The functionality of these layers are different depending on the network model. • There are two types of network models: • OSI model • TCP/IP model
  • 4. Some of the basic network protocols 1. Ethernet 2. Token Ring 3. FDDI 4. ATM
  • 5. 1.Ethernet • The Ethernet protocol is by far the most widely used. • Ethernet uses an access method called CSMA/CD (Carrier Sense Multiple Access/Collision Detection). This is a system where each computer listens to the cable before sending anything through the network. • If the network is clear, the computer will transmit. If some other node is already transmitting on the cable, the computer will wait and try again when the line is clear. • Sometimes, two computers attempt to transmit at the same instant. When this happens a collision occurs. Each computer then backs off and waits a random amount of time before attempting to retransmit.
  • 6. • With this access method, it is normal to have collisions. However, the delay caused by collisions and retransmitting is very small and does not normally effect the speed of transmission on the network. • The Ethernet protocol allows for linear bus, star, or tree topologies. • Data can be transmitted over wireless access points, twisted pair, coaxial, or fiber optic cable at a speed of 10 Mbps up to 1000 Mbps. 1.Ethernet (Contd..)
  • 7. 2.Token Ring • The Token Ring protocol was developed by IBM in the mid-1980s. The access method used involves token-passing. • In Token Ring, the computers are connected so that the signal travels around the network from one computer to another in a logical ring. • A single electronic token moves around the ring from one computer to the next. • If a computer does not have information to transmit, it simply passes the token on to the next workstation. If a computer wishes to transmit and receives an empty token, it attaches data to the token.
  • 8. • The token then proceeds around the ring until it comes to the computer for which the data is meant. At this point, the data is captured by the receiving computer. • The Token Ring protocol requires a star-wired ring using twisted pair or fiber optic cable. • It can operate at transmission speeds of 4 Mbps or 16 Mbps. • Due to the increasing popularity of Ethernet, the use of Token Ring in school environments has decreased. 2.Token Ring (Contd..)
  • 9. 3.FDDI • Fiber Distributed Data Interface (FDDI) is a network protocol that is used primarily to interconnect two or more local area networks, often over large distances. • The access method used by FDDI involves token-passing. • FDDI uses a dual ring physical topology. • Transmission normally occurs on one of the rings; however, if a break occurs, the system keeps information moving by automatically using portions of the second ring to create a new complete ring. • A major advantage of FDDI is speed. It operates over fiber optic cable at 100 Mbps.
  • 10. 4.ATM • Asynchronous Transfer Mode (ATM) is a network protocol that transmits data at a speed of 155 Mbps and higher. • ATM works by transmitting all data in small packets of a fixed size; whereas, other protocols transfer variable length packets. • ATM supports a variety of media such as video, CD-quality audio, and imaging. • ATM employs a star topology, which can work with fiber optic as well as twisted pair cable. • ATM is most often used to interconnect two or more local area networks. It is also frequently used by Internet Service Providers to utilize high-speed access to the Internet for their clients. • As ATM technology becomes more cost-effective, it will provide another solution for constructing faster local area networks.
  • 12. What is Network Structure • a network structure is anything pertaining to a computer network • these systems may be anything from the design of the network all the way through implementation and use • can be many different things to different people • from the perspective of one of the people that designed or implemented a network, it is a collection of wires, computers and components • is composed mostly of cables, switches and workstations • in larger businesses, these networks are often designed by a network architect and implemented by network engineers • in smaller areas or homes, the physical network is rarely complex enough to need an actual design
  • 13. Network Structure’s Classification • Based on transmission media: Wired (UTP, coaxial cables, fiber-optic cables) and Wireless • Based on network size: LAN and WAN (and MAN) • Based on management method: Peer-to-peer and Client/Server • Based on topology (connectivity): Bus, Star, Ring …
  • 14. Based on network size • LAN - Local Area Network • WAN - Wide Area Network • MAN – Metropolitan Area Network
  • 15. Based on management method: • Peer to Peer • Client Server
  • 16. Peer to Peer • resources are shared between peers without any central coordination by a server • act as both suppliers and consumers of resources • implement an abstract overlay network at the application layer on top of the physical network topology • share resources inexpensively as possible
  • 17. Peer to Peer (contd..) • is no centralized security scheme and end users themselves are allowed to control access to resources, reducing the security in peer to peer networks • users can create any share point that they wish in their computer and security can only be provided by assigning a password when they create the share point
  • 18. Client Server • is built on the concept of servers providing services and a set of clients requesting those services • A server is actually a host that is running one or more server programs, which share their resources with the clients • The client initiates the communication session with the servers by requesting server’s content or services
  • 19. Client Server (contd..) • Servers always await incoming requests from clients • have centralized security database, which controls the access to shared resources on the server • server contains a list of usernames and passwords and a user is only allowed to access the network only if they provide a valid username and a password to the server
  • 20. Client Server (contd..) • After they login, users can only access those resources that have been granted permission for by the network administrator • Widely used functions such as email exchange, web access and database access are built on the client–server architecture
  • 21. Client Server vs Peer to Peer • A client server system has a server or set of central servers that manage all the activities in the network and they are expensive to implement. • A peer-to-peer network is essentially composed of user workstations that share files and resources but are not centrally managed by other computers
  • 22. Client Server vs Peer to Peer (Contd..) • Tasks or workloads are partitioned between servers, and services are requested by clients • Tasks or workloads are partitioned between peers and these peers are said to form a peer to peer network
  • 23. Client Server vs Peer to Peer (Contd..) • There are designated clients that request for services and servers that provide services in Client-server • Peers act as both service providers and service consumers in P2P • Are more stable and could be scaled as much as we need in Client-server • Suffer in performance as the number of nodes increase in P2P
  • 24. Client Server vs Peer to Peer (Contd..) • Servers define rights and roles for client computers in Client-server • All computers have same rights and roles in P2P • A dedicated file server provides level of access to the clients, providing better security in Client- server • Security is handled by the end users in P2P
  • 25. Based on Topologies • Bus Topologies • Star Topologies • Mesh Topologies • Ring Topologies
  • 26. Bus Topologies • uses one cable to connect multiple computers • cable is also called a trunk, a backbone, and a segment • To prevent packets from bouncing up and down the cable, devices called terminators must be attached to both ends of the cable • Only one computer at a time can transmit a packet
  • 27. Bus Topologies (Contd..) • listen to all traffic on the network but accept only the packets that are addressed to them • Broadcast packets are an exception because all computers on the network accept them • When a computer sends out a packet, it travels in both directions from the computer. • number of computers on a bus topology network has a major influence on the performance of the network
  • 28. Bus Topologies (Contd..) • bus is a passive topology • The computers on a bus topology only listen or send data • do not take data and send it on or regenerate it • So if one computer on the network fails, the network is still up
  • 30. Star Topologies • all computers are connected through one central hub or switch • Computer in a star topology are all connected to a central hub • A star topology actually comes from the days of the mainframe system • The mainframe system had a centralized point where the terminals connected
  • 32. Mesh Topologies • more commonly seen with something like the national phone network • With the mesh topology, every workstation has a connection to every other component of the network • Computers in a mesh topology are all connected to every other component of the network
  • 34. Ring Topologies • all computers are connected with a cable that loops around • the ring topology is a circle that has no start and no end • Terminators are not necessary in a ring topology • Signals travel in one direction on a ring while they are passed from one computer to the next. • Each computer checks the packet for its destination and passes it on as a repeater would
  • 37. Local area network • A local area network (LAN) is a network that connects computers and devices in a limited geographical area such as home, school, computer laboratory, office building, or closely positioned group of buildings. • Each computer or device on the network is a node. • Current wired LANs are most likely to be based on Ethernet technology, although new standards like ITU-T G.hn also provide a way to create a wired LAN using existing home wires (coaxial cables, phone lines and power lines).Typical library network, in a branching tree topology and controlled access to resources. • All interconnected devices must understand the network layer (layer 3), because they are handling multiple subnets (the different colors).
  • 38. Local area network (Contd..) • Those inside the library, which have only 10/100 Mbit/s Ethernet connections to the user device and a Gigabit Ethernet connection to the central router, could be called "layer 3 switches" because they only have Ethernet interfaces and must understand IP. • It would be more correct to call them access routers, where the router at the top is a distribution router that connects to the Internet and academic networks customer access routers. • The defining characteristics of LANs, in contrast to WANs (Wide Area Networks), include their higher data transfer rates, smaller geographic range, and no need for leased telecommunication lines. • Current Ethernet or other IEEE 802.3 LAN technologies operate at speeds up to 10 Grit/s. This is the data transfer rate. IEEE has projects investigating the standardization of 40 and 100 Grit/s
  • 39. Personal area network • A personal area network (PAN) is a computer network used for communication among computer and different information technological devices close to one person. • Some examples of devices that are used in a PAN are personal computers, printers, fax machines, telephones, PDAs, scanners, and even video game consoles. • A PAN may include wired and wireless devices. The reach of a PAN typically extends to 10 meters. • A wired PAN is usually constructed with USB and Fire wire connections while technologies such as Bluetooth and infrared communication typically form a wireless PAN.
  • 40. Home area network • A home area network (HAN) is a residential LAN which is used for communication between digital devices typically deployed in the home, usually a small number of personal computers and accessories, such as printers and mobile computing devices. • An important function is the sharing of Internet access, often a broadband service through a CATV or Digital Subscriber Line (DSL) provider. It can also be referred to as an office area network (OAN).
  • 41. Wide area network • A wide area network (WAN) is a computer network that covers a large geographic area such as a city, country, or spans even intercontinental distances, using a communications channel that combines many types of media such as telephone lines, cables, and air waves. • A WAN often uses transmission facilities provided by common carriers, such as telephone companies. • WAN technologies generally function at the lower three layers of the OSI reference model: the physical layer, the data link layer, and the network layer.
  • 42. Campus network • A campus network is a computer network made up of an interconnection of local area networks (LAN's) within a limited geographical area. • The networking equipment (switches, routers) and transmission media (optical fiber, copper plant, Cat5 cabling etc.) are almost entirely owned (by the campus tenant / owner: an enterprise, university, government etc.). • In the case of a university campus-based campus network, the network is likely to link a variety of campus buildings including; academic departments, the university library and student residence halls.
  • 43. Metropolitan area network • A Metropolitan area network is a large computer network that usually spans a city or a large campus. • Sample EPN made of Frame relay WAN connections and dialup remote access. • Sample VPN used to interconnect 3 offices and remote users
  • 44. Virtual private network • A virtual private network (VPN) is a computer network in which some of the links between nodes are carried by open connections or virtual circuits in some larger network (e.g., the Internet) instead of by physical wires. • The data link layer protocols of the virtual network are said to be tunneled through the larger network when this is the case. • One common application is secure communications through the public Internet, but a VPN need not have explicit security features, such as authentication or content encryption. • VPNs, for example, can be used to separate the traffic of different user communities over an underlying network with strong security features. • VPN may have best-effort performance, or may have a defined service level agreement (SLA) between the VPN customer and the VPN service provider. Generally, a VPN has a topology more complex than point-to-point.
  • 45. Backbone network • A Backbone network (BBN) a backbone network or network backbone is part of a computer network infrastructure that interconnects various pieces of network, providing a path for the exchange of information between different LANs or sub networks a backbone can tie together diverse networks in the same building, in different buildings in a campus environment, or over wide areas. • Normally, the backbone's capacity is greater than the networks connected to it. • A large corporation that has many locations may have a backbone network that ties all of the locations together, for example, if a server cluster needs to be accessed by different departments of a company that are located at different geographical locations. • The pieces of the network connections (for example: Ethernet, wireless) that bring these departments together is often mentioned as network backbone. • Network congestion is often taken into consideration while designing backbones. • Backbone networks should not be confused with the Internet backbone.
  • 46. Backbone network • A Backbone network (BBN) a backbone network or network backbone is part of a computer network infrastructure that interconnects various pieces of network, providing a path for the exchange of information between different LANs or sub networks a backbone can tie together diverse networks in the same building, in different buildings in a campus environment, or over wide areas. • Normally, the backbone's capacity is greater than the networks connected to it. • A large corporation that has many locations may have a backbone network that ties all of the locations together, for example, if a server cluster needs to be accessed by different departments of a company that are located at different geographical locations. • The pieces of the network connections (for example: Ethernet, wireless) that bring these departments together is often mentioned as network backbone. • Network congestion is often taken into consideration while designing backbones. • Backbone networks should not be confused with the Internet backbone.
  • 47. Global area network • A global area network (GAN) is a network used for supporting mobile communications across an arbitrary number of wireless LANs, satellite coverage areas, etc. • The key challenge in mobile communications is handing off the user communications from one local coverage area to the next. • In IEEE Project 802, this involves a succession of terrestrial wireless LANs.
  • 48. Internet • The Internet is a global system of interconnected governmental, academic, corporate, public, and private computer networks. • It is based on the networking technologies of the Internet Protocol Suite. • It is the successor of the Advanced Research Projects Agency Network (ARPANET) developed by DARPA of the United States Department of Defense. • The Internet is also the communications backbone underlying the World Wide Web (WWW). • Participants in the Internet use a diverse array of methods of several hundred documented, and often standardized, protocols compatible with the Internet Protocol Suite and an addressing system (IP addresses) administered by the Internet Assigned Numbers Authority and address registries. • Service providers and large enterprises exchange information about the reachability of their address spaces through the Border Gateway Protocol (BGP), forming a redundant worldwide mesh of transmission paths.
  • 49. Intranets and extranets • Intranets and extranets are parts or extensions of a computer network, usually a local area network. • An intranet is a set of networks, using the Internet Protocol and IP-based tools such as web browsers and file transfer applications that is under the control of a single administrative entity. • That administrative entity closes the intranet to all but specific, authorized users. Most commonly, an intranet is the internal network of an organization. • A large intranet will typically have at least one web server to provide users with organizational information. • An extranet is a network that is limited in scope to a single organization or entity and also has limited connections to the networks of one or more other usually, but not necessarily, trusted organizations or entities—a company's customers may be given access to some part of its intranet—while at the same time the customers may not be considered trusted from a security standpoint. • Technically, an extranet may also be categorized as a CAN, MAN, WAN, or other type of network, although an extranet cannot consist of a single LAN; it must have at least one connection with an external network.
  • 50. Overlay network • An overlay network is a virtual computer network that is built on top of another network. • Nodes in the overlay are connected by virtual or logical links, each of which corresponds to a path, perhaps through many physical links, in the underlying network. • A sample overlay network: IP over SONET over Optical For example, many peer-to- peer networks are overlay networks because they are organized as nodes of a virtual system of links run on top of the Internet. • The Internet was initially built as an overlay on the telephone network. Overlay networks have been around since the invention of networking when computer systems were connected over telephone lines using modem, before any data network existed.
  • 51. Overlay network (Conntd..) • Nowadays the Internet is the basis for many overlaid networks that can be constructed to permit routing of messages to destinations specified by an IP address. • For example, distributed hash tables can be used to route messages to a node having a specific logical address, whose IP address is known in advance. • Overlay networks have also been proposed as a way to improve Internet routing, such as through quality of service guarantees to achieve higher-quality streaming media. • Previous proposals such as Insert, Differ, and IP Multicast have not seen wide acceptance largely because they require modification of all routers in the network.[citation needed] On the other hand, an overlay network can be incrementally deployed on end-hosts running the overlay protocol software, without cooperation from Internet service providers. • The overlay has no control over how packets are routed in the underlying network between two overlay nodes, but it can control, for example, the sequence of overlay nodes a message traverses before reaching its destination.