934 Ch1 Networks


Published on

Published in: Education, Technology
  • Be the first to comment

  • Be the first to like this

934 Ch1 Networks

  1. 1. Introduction to Computer Networks <ul><li>What is a Network? </li></ul><ul><li>Why do we need Network? </li></ul><ul><li>Network Classification </li></ul><ul><li>Types of Network </li></ul><ul><li>Basic Hardware Components </li></ul>Computer Networks
  2. 2. What is a Network? <ul><li>A network is a collection of computers and devices connected to each other. The network allows computers to communicate with each other and share resources and information. The Advance Research Projects Agency (ARPA) designed &quot;Advanced Research Projects Agency Network&quot; (ARPANET) for the United States Department of Defence. It was the first computer network in the world in late 1960's and early1970's. </li></ul><ul><li>Why a Network? </li></ul><ul><li>Distribute pieces of computation among computers (nodes) </li></ul><ul><li>Resource Sharing </li></ul><ul><li>Data Sharing </li></ul><ul><li>Remote Data/File Access , Remote I/O Devices </li></ul><ul><li>Personal communications (like e-mail, chat, audio/video conferencing) </li></ul><ul><li>World Wide Web </li></ul>Computer Networks
  3. 3. Computer Networks Network Classification <ul><li>On the basis of </li></ul><ul><ul><li>Scale </li></ul></ul><ul><ul><li>Connection Method </li></ul></ul><ul><ul><li>Functional Relationship </li></ul></ul><ul><ul><li>Network Topology </li></ul></ul><ul><li>Based on their scale, networks can be classified as Local Area Network (LAN) , Wide Area Network (WAN) , Metropolitan Area Network (MAN) , Personal Area Network (PAN) , Virtual Private Network (VPN) , Campus Area Network (CAN) , Storage Area Network (SAN) , etc. </li></ul><ul><li>Connection Method such as Optical Fiber, Ethernet, Wireless LAN etc. </li></ul><ul><li>Network Architecture such as Client-Server or Peer to Peer </li></ul><ul><li>Topology- Bus, Star, Ring , Mesh, Tree, Hybrid </li></ul>
  4. 4. Computer Networks <ul><li>Types of Network </li></ul><ul><ul><li>Personal Area Network (PAN) </li></ul></ul><ul><ul><li>Local Area Network (LAN) </li></ul></ul><ul><ul><li>Campus Area Network (CAN) </li></ul></ul><ul><ul><li>Metropolitan Area Network (MAN) </li></ul></ul><ul><ul><li>Wide Area Network (WAN) </li></ul></ul><ul><ul><li>Global Area Network (GAN) </li></ul></ul><ul><ul><li>Virtual Private Network (VPN) </li></ul></ul><ul><ul><li>Inter network </li></ul></ul><ul><ul><ul><li>Intranet </li></ul></ul></ul><ul><ul><ul><li>Extranet </li></ul></ul></ul><ul><ul><ul><li>Internet </li></ul></ul></ul>
  5. 5. Computer Networks <ul><li>Closing Quiz </li></ul><ul><li>a) Without Computer networks, Computers will be half the use.Comment. </li></ul><ul><li>b) What are the various topologies? Which one is the most secure? </li></ul><ul><li>c) Difference between Internet and Intranet. </li></ul><ul><li>d) Difference between Client Server and Work-group. </li></ul><ul><li>e) Wifi stands for? </li></ul><ul><li>f) What are the various types of networks? Discuss all of them </li></ul>
  6. 6. Computer Networks <ul><li>Uses of Computer Network </li></ul><ul><ul><li>Business Application </li></ul></ul><ul><ul><ul><li>Client Server Architecture </li></ul></ul></ul><ul><ul><ul><li>Email </li></ul></ul></ul><ul><ul><ul><li>E Commerce </li></ul></ul></ul><ul><ul><li>Home Applications </li></ul></ul><ul><ul><ul><li>Access to Remote Information </li></ul></ul></ul><ul><ul><ul><li>Person to Person Communication </li></ul></ul></ul><ul><ul><ul><li>Interactive Entertainment </li></ul></ul></ul><ul><ul><ul><li>E-Commerce </li></ul></ul></ul><ul><ul><li>Mobile User </li></ul></ul><ul><ul><li>Social Issues </li></ul></ul>
  7. 7. Computer Networks Network Hardware <ul><li>There are two types of transmission technology that are widespread in use- </li></ul><ul><ul><li>Broadcast Link </li></ul></ul><ul><ul><li>Point to Point Link </li></ul></ul><ul><li>What is Broadcasting, Multicasting & Unicasting? </li></ul><ul><li>What is Simplex, Half Duplex and Full Duplex mode? </li></ul><ul><li>LAN, MAN, WAN </li></ul><ul><li>Wireless Network </li></ul><ul><li>Inter network </li></ul>
  8. 8. Computer Networks Network Software <ul><li>Protocol Hierarchies – To reduce the design complexity, most networks are organized as a stack of layers or levels, built one over the other. </li></ul><ul><li>They name of each layer, content and functions of each layer are different. </li></ul><ul><li>The purpose of each layer is to offer services to higher layer, shielding those layers from the details of how the offered services are actually implemented. </li></ul><ul><li>Protocol is an agreement between the communicating parties on how communication is to proceed. </li></ul><ul><li>Figure 1.13 from the text book </li></ul><ul><li>No data is directly transferred from layer n of 1 machine to the layer n of the other , instead they have to use the Physical Layer. </li></ul><ul><li>A Set of Layers and Protocols together is called network architecture. </li></ul><ul><li>Communication Example </li></ul>
  9. 9. Computer Networks Design Issues for the Layers <ul><li>Every layer needs a mechanism for identifying senders and receivers </li></ul><ul><li>We need to identify with whom a machine wants to talk, i.e. some form of addressing mechanism is required. </li></ul><ul><li>Rules for Data transfer need to be established. In some cases data only travels one direction, in others both ways. Also need to find out how many logical channels? </li></ul><ul><li>Error Control :- Various error-detecting and error correcting codes are there that have to be used, also at times, the sequence in which data is sent is not the way in which it is received, hence reassembly also needs to be done. </li></ul><ul><li>Flow Control </li></ul><ul><li>Inability to receive long messages, we disassemble, transmit and then reassemble data </li></ul><ul><li>At times sending data packets separately is not efficient, in that case we use multiplexing and demultiplexing. </li></ul><ul><li>Routing </li></ul>
  10. 10. Computer Networks Connection Oriented /Less Services <ul><li>Connection-oriented service : Just like a telephone system, we establish a connection, use and then release the connection. </li></ul><ul><ul><li>Firstly, negotiations take place about the parameters used, such as maximum message size, quality of service required and other issues. </li></ul></ul><ul><li>Connectionless Service : Just like the postal system </li></ul><ul><ul><li>A reliable service is ensured by having the receiver acknowledge the receipt of each message so that sender is sure that it arrived. This introduces overheads and delays. </li></ul></ul><ul><li>Example of connection oriented and connection less service </li></ul><ul><ul><li>Remote login- connection oriented </li></ul></ul><ul><ul><li>Request Reply – Database Query etc </li></ul></ul>
  11. 11. Computer Networks Service Primitives A service is formally specified by a set of primitives ( operations) available to a user process to access the service. Send a message to the peer SEND Terminate a Connection DISCONNECT Block waiting for an incoming message RECEIVE Establish a connection with a waiting peer CONNECT Block waiting for an incoming connection LISTEN Meaning Primitive
  12. 12. Computer Networks Client Machine Server Machine 1)Connection Request 2)ACK 3)Request for Data 4)Reply 5)Disconnect 6)Disconnect How communication takes place?
  13. 13. Computer Networks Services & Protocols <ul><li>A service is a set of primitives (operations) that a layer provides to the layer above it. </li></ul><ul><li>A service defines what operation the layer is prepared to perform but cannot tell how they will be performed. </li></ul><ul><li>A Protocol is a set of rules governing the format and meaning of the packers or messages that are exchanged by the peer entities within a layer. </li></ul><ul><li>Closing Quiz </li></ul><ul><li>1)What is broadcasting, multicasting and unicasting? </li></ul><ul><li>2)Justify the purpose behind the layered architecture, define service & protocol </li></ul><ul><li>3)What are the various design issues pertaining to Layers? </li></ul><ul><li>4) Differentiate Connection Less & Connection Oriented Service. </li></ul>
  14. 14. Computer Networks OSI Reference Model <ul><li>Open System Interconnection model has seven layers. </li></ul><ul><li>The principles that were applied to arrive at the seven layers can be summarized as follows : </li></ul><ul><ul><li>A layer should be created where a different abstraction is needed. </li></ul></ul><ul><ul><li>Each Layer should perform a well-defined function. </li></ul></ul><ul><ul><li>The function of each layer should be chosen with an eye toward defining internationally standardized protocols. </li></ul></ul><ul><ul><li>The layer boundaries should be chosen to minimize the information flow across the interfaces. </li></ul></ul><ul><ul><li>The number of layers should be large enough that distinct functions need not be thrown together in the same layer out of necessity and small enough that the architecture does not become unwieldy. </li></ul></ul>
  15. 15. Computer Networks Layers in OSI
  16. 16. Computer Networks Layers in OSI
  17. 17. Computer Networks The Application Layer <ul><li>It is the spot where the User communicates with the Computer. </li></ul><ul><li>Example of IE. </li></ul><ul><li>It is also responsible for identifying and establishing the availability of the intended communication partner and determining whether sufficient resources for the intended communication exist. </li></ul><ul><li>Application Layer acts as an interface between the actual application programs. This means that Microsoft Word, for e.g. does not reside at the Application Layer but instead interfaces with the Application Layer Protocols. </li></ul>
  18. 18. Computer Networks The Presentation Layer <ul><li>It presents Data to the Application Layer and is responsible for Data translation and Code Formatting. </li></ul><ul><li>This layer is essentially a translator and provides coding and conversion functions. </li></ul><ul><li>By providing translation services, the Presentation Lauer ensures that data transferred from the Application Layer of one system can be read by the Application Layer of another one. </li></ul><ul><li>Tasks like Data Compression, Decompression, Encryption and Decryption are associated with this layer. </li></ul>
  19. 19. Computer Networks The Session Layer <ul><li>Responsible for setting up, managing and then tearing down sessions between Presentation Layer entities. </li></ul><ul><li>It also provides Dialogue control between devices and nodes. </li></ul><ul><li>Simplex, Half Duplex or Full Duplex mode? The choice is made here </li></ul><ul><li>It keeps different application’s data separate from other application data. </li></ul>
  20. 20. Computer Networks The Transport Layer <ul><li>Data is in the form of segments here. </li></ul><ul><li>The Transport Layer segments and reassembles data into data stream. </li></ul><ul><li>They provide end-to-end data transport services and can establish a logical connection between sending host and destination host on an inter network. </li></ul><ul><li>Both TCP and UDP work at this Layer, TCP is reliable service and UDP is not. (reliable means acknowledgements, sequencing and flow control be used.) </li></ul><ul><li>Features </li></ul><ul><ul><li>Flow Control </li></ul></ul><ul><ul><li>Connection Oriented Communication </li></ul></ul><ul><ul><li>Windowing </li></ul></ul><ul><ul><li>Acknowledgement </li></ul></ul>
  21. 21. Computer Networks The Transport Layer ( Cont…) <ul><li>Connection Oriented Communication is reliable, a device that wants to transmit sets up a connection-oriented communication with a remote device by creating a session. </li></ul><ul><li>A session is established after a 3-way handshake. </li></ul><ul><li>While information is being transferred between hosts, the two machines periodically check in with each other, communicating through their protocol software to ensure that all is going well. </li></ul>
  22. 22. Computer Networks <ul><li>What happens when a machine receives a flood of datagrams too quickly to process? </li></ul><ul><li>It stores them in a memory section called buffer, if the buffer even gets full, transport layer sends a “Not Ready” indicator to the sender. </li></ul><ul><li>A service is considered to be connection-oriented if it has following characteristics – </li></ul><ul><li>A virtual circuit is set up. </li></ul><ul><li>It uses sequencing. </li></ul><ul><li>It uses acknowledgements. </li></ul><ul><li>It uses flow control. </li></ul>The Transport Layer ( Cont…)
  23. 23. Computer Networks Windowing: The quantity of data segments (in bytes) that the transmitting machine is allowed to send without receiving an acknowledgement for them is called window. Acknowledgments: Non-duplication of data is achieved through positive acknowledgement with re transmission. The sender documents each segment it sends and waits for this acknowledgement before sending the next segment. It starts a timer and retransmits if it expires before an acknowledgement is returned from receiving end. The Transport Layer ( Cont…)
  24. 24. Computer Networks <ul><li>It manages device addressing, tracks the location of devices on the network and determines the best way to move data, which means that the NL must support transport traffic between devices that aren’t locally attached. </li></ul><ul><li>Routers are specified at the NL and provide the routing services </li></ul><ul><li>How does it work? </li></ul><ul><li>Two type of packets are used : </li></ul><ul><li>Data Packets (Routed Packets) & Route Update Packets. </li></ul><ul><li>The Routing Table consist of the following information : </li></ul><ul><li>Network Address </li></ul><ul><li>Interface </li></ul><ul><li>Metric </li></ul>The Network Layer
  25. 25. Computer Networks The Network Layer ( Cont…)
  26. 26. Computer Networks The Data Link Layer <ul><li>The DLL provides Physical Transmission of the Data and handles error notification, network topology and flow control. That means that DLL will make sure that the messages are delivered to proper device on a LAN using hardware address and will translate messages from the Network Layer into bits for the Physical Layer to transmit. </li></ul><ul><li>Data is in the form of Frames here.DLL adds a custom header containing the Hardware Destination and Source Address. </li></ul><ul><li>The DLL consists of two sublayers :- </li></ul><ul><ul><li>MAC (Media Access Control) </li></ul></ul><ul><ul><li>LLC ( Logical Link Control) </li></ul></ul><ul><li>Bridges and Switches work at DLL </li></ul><ul><li>Collision Domain / Broadcast Domain </li></ul>
  27. 27. Computer Networks The Physical Layer <ul><li>The Physical Layer does 2 things –send bits and receive bits. </li></ul><ul><li>The Physical Layer communicates directly with the various types of actual communication media. </li></ul><ul><li>Different type of media can be used to represent bit value. Some use audio tones, while others use State Transitions- Change in voltage from high to low and vice versa. </li></ul><ul><li>The Physical Layer specifies the electrical, mechanical, procedural and functional requirements for activating, maintaining & deactivating a physical link between end systems. </li></ul><ul><li>Interface between DCE and DTE is identified here. DCE is usually located at the service provider and DTE is attached device. </li></ul><ul><li>Hubs and Repeaters work at Physical Layer. </li></ul>
  28. 28. Computer Networks The TCP/IP Model
  29. 29. Computer Networks The TCP/IP Model <ul><li>TCP/IP model is also called DOD Model </li></ul><ul><li>It has the following Layers </li></ul><ul><ul><li>Process / Application Layer </li></ul></ul><ul><ul><li>Host-to-Host Layer </li></ul></ul><ul><ul><li>Internet Layer </li></ul></ul><ul><ul><li>Network Access Layer </li></ul></ul><ul><li>TCP/IP Protocol Suite </li></ul>
  30. 30. Computer Networks The Process/Application Layer <ul><li>It has the following Protocols </li></ul><ul><ul><li>Telnet </li></ul></ul><ul><ul><li>FTP </li></ul></ul><ul><ul><li>TFTP </li></ul></ul><ul><ul><li>NFS </li></ul></ul><ul><ul><li>SMTP </li></ul></ul><ul><ul><li>LPD </li></ul></ul><ul><ul><li>X Window </li></ul></ul><ul><ul><li>SNMP </li></ul></ul><ul><ul><li>DNS </li></ul></ul><ul><ul><li>DHCP/BootP </li></ul></ul>
  31. 31. Computer Networks The Host-to-Host Layer <ul><li>The main purpose of this layer is to shield the upper-layer applications from the complexities of the network </li></ul><ul><li>It consists of 2 protocols </li></ul><ul><ul><li>TCP </li></ul></ul><ul><ul><li>UDP </li></ul></ul><ul><li>TCP takes large blocks of information from an application and breaks them into segments. </li></ul><ul><li>It numbers and sequences each segment so that the destination’s TCP can put the segments back into the order. </li></ul><ul><li>Before sending, it establishes a connection, a virtual circuit, provides reliable service and works in a full-duplex mode. </li></ul><ul><li>It also waits for an acknowledgement from the receiver. </li></ul>
  32. 32. Computer Networks The Host to Host Layer TCP/IP Segment Format
  33. 33. Computer Networks The Host-to-Host Layer <ul><li>UDP on the other hand, is a scale-down model. </li></ul><ul><li>It does not sequence the segments and does not care in which order the segments arrive at the destination. </li></ul><ul><li>UDP does not create a virtual circuit either. </li></ul>
  34. 34. Computer Networks The Host-to-Host Layer The Internet Layer
  35. 35. Computer Networks The Network Layer <ul><li>The Physical Connectivity & actual Transmission of data takes place here. </li></ul>Comparison Of OSI & TCP/IP <ul><li>Revolves around the concept of </li></ul><ul><ul><li>Services </li></ul></ul><ul><ul><li>Interfaces </li></ul></ul><ul><ul><li>Protocols </li></ul></ul>