SlideShare a Scribd company logo
Computer Network
Textbooks
•Data Communications and Networking: B. A.
Forouzan, 4th Edition, TMH
•Computer Networks: A. S. Tanenbaum, 4th Edition,
Pentice Hall
Introduction
•The term telecommunication means communication at a distance
(tele is Greek for “far”).
•The word data refers to information presented in whatever form is
agreed upon by the parties creating and using the data.
•Data communications are the exchange of data between two
devices via some form of transmission medium such as a wire cable.
•A computer network is a number of devices (often referred to as
nodes) connected by communication links.
•Two computer connected to the network can communicate with
each other through other nodes if they are not directly connected.
•Some of the nodes in the network may not be computer at all but
they are network devices (like switches, routers etc.) to facilitate
communication.
1.3
Criteria of Effectiveness of Data Communication
Delivery:
Data must arrive at the correct destination.
Accuracy:
Data must be deliver accurately without any error.
Timeliness:
Data must be delivered in timely manner.
Jitter:
Variation in the data arrival time at the destination.
Different applications have different requirements on these criteria
1.4
Components (Q)
Figure 1.1 Five components of data communication
• Message : The information (data) to be communicated.
• Sender : The device that sends the data message.
• Receiver : The device that receives the data message.
• Transmission medium : The physical path by which a
message travels from sender to receiver.
• Protocol : A set of rules that govern data communications.
1.5
Data Flow
Figure 1.2 Data flow (simplex, half-duplex, and full-duplex)
1.6
Data Flow Examples
 Simplex mode
 Keyboard, mouse, traditional monitor
 GPS device
 Half duplex
 Walkie-talkie
 Citizen band radio
 Advantage: entire bandwidth (capacity of a channel)
can be used for transmission
 Disadvantage: not suitable for high interactive
application
 Full duplex
 Telephone network
1.7
Network Criteria
• Performance: Evaluated by two metrics
1. Throughput: average rate of successful
message delivery
2. Delay: Due to traffic congestion
However these two criteria are often contradictory.
• Reliability: Frequency of failure, recover time, and
robustness
• Security: Unauthorized access, protecting data
from damage etc
• becoming more important now
1.8
Physical structure
Figure 1.3 Types of connections: point-to-point and multipoint
Whether the link capacity is shared or not
Point-to-Point Line Configuration
Point-to-Point Line Configuration
Multipoint Line Configuration
1.11
Figure 1.4 Categories of network based on topology(connectivity)
1.12
Figure 1.5 A fully connected mesh topology (five devices)
1
2
3
4
5
n(n-1) half-duplex links
n(n-1)/2 duplex links
Example: Telephone regional offices
Advantages: Eliminating traffic problem, robustness and privacy
Disadvantages: Many cabling/installation and need many I/O ports on nodes
Figure 1.6 A star topology connecting four stations
Example: Ethernet switch/hub, Wifi access point and LAN
Advantages: robust against a node’s failure or a link failure
Disadvantages: If hub/switch goes down, the whole system is dead
Q. Compare star and mess topology with advantages and
disadvantages
1.14
Figure 1.7 A bus topology connecting three stations
The preceding two are point to point connections, but it is a multipoint connection.
Example: Ethernet LAN can use bus topology
Advantages: Less cabling, Easy of installation,
Disadvantages: Any tap device failure or break in bus will cause the whole system
fail.
Limitation on the number of taps a bus can support because signal becomes weaker
and weaker as it travels farther and farther, difficult to add new device.
The damaged area reflects signals back in the direction of origin, creating noise in
both direction.
1.15
Figure 1.8 A ring topology connecting six stations
Each device has a dedicated point-to-point connection with only the two devices on
either side of it. A signal is passed along the ring in one direction from device to device.
When a device receives a signal intended for another device, its repeater regenerates the
bits and passes them along.
Example: IBM token ring LAN (less popular now).
Advantages: Easy to install a new device just by changing two connections
Disadvantages: Unidirectional traffic, A break in ring can disable the whole network
Figure 1.9 A hybrid topology: For e.g. a star backbone with three bus networks
Q. For n devices in a network, what is the number of cable
links required for a mesh, ring, bus and star topology?
Ans. Mesh n(n-1) half-duplex links
n(n-1)/2 duplex links
Star n
Ring n
Bus n+1
1.17
Categories of Networks based on network size
1.18
Figure 1.10 LAN (range few km)
1.19
Figure 1.10 (Contd.) LAN
1.20
Figure 1.11 MAN (Range town or a city)
1.21
Figure 1.12 WAN (Large geographic areas)
1.22
THE INTERNET
Internet: Interconnection of massive network of
networks. It connects millions of computers together
globally, forming a network in which any computer
can communicate with any other computer as long as
they are both connected to the Internet.
Before Internet:
Many isolated Local Area Networks (LANs) existed
Those LANs had very different hardware and
network protocols
 Protocol example: TCP/IP, IPX (from Novell)
Internet, internet and Intranet (Contd.)
• Internet with a capital "I" refers to the entire Internet
(meaning the biggest collection of networks on the
planet) . Internet with a lowercase "i" refers to any
group of networks that are connected together.
• Intranet refers to a single inter-connected network
within one organization that uses HTTP/Web
technologies for the sharing of information internally.
In other words we could string together intranets to
make our own private internet. We could then
connect our internet to the Internet.
1.24
Figure 1.13 Internetwork or Internet
1.25
PROTOCOLS AND STANDARDS
Protocols: A set of rules that governs data communications
(similar to human language). It defines what is
communicated, how it is communicated, and when it is
communicated.
The key elements of a protocol are syntax, semantics, and
timing
Syntax: It refers to the structure or format of the data.
Semantics: It refers to the meaning of each section of data.
Timing : It refers when data should be sent and how fast
they can be sent.
Standards – public recognized protocols for open market
De facto: A format, language, or protocol that has become a standard not because it has been
approved by a standards organization but because it is widely used and recognized by the
industry as being standard.
E.g. Microsoft’s Windows operating system, along with commonly used business applications
such as Microsoft Word and Excel, has long been the de facto standard for business and home
users. De facto standards can also become de jure standards over time as, for example, HTML
and PDF have done.
De jure: De jure, from Medieval Latin, means from law. that have been endorsed by an official
standards organization.
E.g. TCP/IP, ASCII
Standards Organizations: ANSI, IEEE etc

More Related Content

Similar to ch01(Modified).ppt

DATA COMMUNICATIONS
DATA COMMUNICATIONSDATA COMMUNICATIONS
DATA COMMUNICATIONS
rakibpciu12
 
Lecture1-2.ppt
Lecture1-2.pptLecture1-2.ppt
Lecture1-2.ppt
CheriviralaNikhil
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
Pooja Goel
 
Lec1 :- Data communication and network
Lec1 :- Data communication and networkLec1 :- Data communication and network
Lec1 :- Data communication and network
Dhrumil Shah
 
ch1-OK-F.ppt
ch1-OK-F.pptch1-OK-F.ppt
ch1-OK-F.ppt
ssusere4904b1
 
Chap1
Chap1Chap1
Unit_I - 1
Unit_I - 1Unit_I - 1
Introduction to data communication
Introduction to data communicationIntroduction to data communication
Introduction to data communication
Abir Hossain
 
Data communications and Networking
Data communications and Networking Data communications and Networking
Data communications and Networking
awais qarni
 
Data Communication and networks note ppt
Data Communication and networks note pptData Communication and networks note ppt
Data Communication and networks note ppt
RocerthaAkoto1
 
Chapter 1.ppt
Chapter 1.pptChapter 1.ppt
Chapter 1.ppt
AashiqMushtaqKhan
 
Computer Network notes.docx
Computer Network notes.docxComputer Network notes.docx
Computer Network notes.docx
Meenalochini M
 
1. Introduction.ppt
1. Introduction.ppt1. Introduction.ppt
1. Introduction.ppt
test22333
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
Faisal Mehmood
 
Chapter 1 - Introduction
Chapter 1 - IntroductionChapter 1 - Introduction
Chapter 1 - Introduction
Wayne Jones Jnr
 
computer networks fundamentals chapter 1
computer networks fundamentals chapter 1computer networks fundamentals chapter 1
computer networks fundamentals chapter 1
Anas Abu Tabaneh [APP, ASP]
 
Presentation1 Networking.pptx
Presentation1 Networking.pptxPresentation1 Networking.pptx
Presentation1 Networking.pptx
MohammedAnas871930
 
Networking notes
Networking notesNetworking notes
Networking notes
0718928964
 
Network Fundamentals1.pptx
Network Fundamentals1.pptxNetwork Fundamentals1.pptx
Network Fundamentals1.pptx
sairakesh41
 
Overview of data communication and networking
Overview of data communication and networkingOverview of data communication and networking
Overview of data communication and networking
Sisir Ghosh
 

Similar to ch01(Modified).ppt (20)

DATA COMMUNICATIONS
DATA COMMUNICATIONSDATA COMMUNICATIONS
DATA COMMUNICATIONS
 
Lecture1-2.ppt
Lecture1-2.pptLecture1-2.ppt
Lecture1-2.ppt
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Lec1 :- Data communication and network
Lec1 :- Data communication and networkLec1 :- Data communication and network
Lec1 :- Data communication and network
 
ch1-OK-F.ppt
ch1-OK-F.pptch1-OK-F.ppt
ch1-OK-F.ppt
 
Chap1
Chap1Chap1
Chap1
 
Unit_I - 1
Unit_I - 1Unit_I - 1
Unit_I - 1
 
Introduction to data communication
Introduction to data communicationIntroduction to data communication
Introduction to data communication
 
Data communications and Networking
Data communications and Networking Data communications and Networking
Data communications and Networking
 
Data Communication and networks note ppt
Data Communication and networks note pptData Communication and networks note ppt
Data Communication and networks note ppt
 
Chapter 1.ppt
Chapter 1.pptChapter 1.ppt
Chapter 1.ppt
 
Computer Network notes.docx
Computer Network notes.docxComputer Network notes.docx
Computer Network notes.docx
 
1. Introduction.ppt
1. Introduction.ppt1. Introduction.ppt
1. Introduction.ppt
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Chapter 1 - Introduction
Chapter 1 - IntroductionChapter 1 - Introduction
Chapter 1 - Introduction
 
computer networks fundamentals chapter 1
computer networks fundamentals chapter 1computer networks fundamentals chapter 1
computer networks fundamentals chapter 1
 
Presentation1 Networking.pptx
Presentation1 Networking.pptxPresentation1 Networking.pptx
Presentation1 Networking.pptx
 
Networking notes
Networking notesNetworking notes
Networking notes
 
Network Fundamentals1.pptx
Network Fundamentals1.pptxNetwork Fundamentals1.pptx
Network Fundamentals1.pptx
 
Overview of data communication and networking
Overview of data communication and networkingOverview of data communication and networking
Overview of data communication and networking
 

Recently uploaded

2. Operations Strategy in a Global Environment.ppt
2. Operations Strategy in a Global Environment.ppt2. Operations Strategy in a Global Environment.ppt
2. Operations Strategy in a Global Environment.ppt
PuktoonEngr
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
Victor Morales
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
Aditya Rajan Patra
 
Series of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.pptSeries of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.ppt
PauloRodrigues104553
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
Hitesh Mohapatra
 
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
awadeshbabu
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
gerogepatton
 
Question paper of renewable energy sources
Question paper of renewable energy sourcesQuestion paper of renewable energy sources
Question paper of renewable energy sources
mahammadsalmanmech
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
kandramariana6
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
Madan Karki
 
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
Mukeshwaran Balu
 
CSM Cloud Service Management Presentarion
CSM Cloud Service Management PresentarionCSM Cloud Service Management Presentarion
CSM Cloud Service Management Presentarion
rpskprasana
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
Dr Ramhari Poudyal
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
VICTOR MAESTRE RAMIREZ
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
insn4465
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
nooriasukmaningtyas
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
MIGUELANGEL966976
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
JamalHussainArman
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
University of Maribor
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
NidhalKahouli2
 

Recently uploaded (20)

2. Operations Strategy in a Global Environment.ppt
2. Operations Strategy in a Global Environment.ppt2. Operations Strategy in a Global Environment.ppt
2. Operations Strategy in a Global Environment.ppt
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
 
Series of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.pptSeries of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.ppt
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
 
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
 
Question paper of renewable energy sources
Question paper of renewable energy sourcesQuestion paper of renewable energy sources
Question paper of renewable energy sources
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
 
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
 
CSM Cloud Service Management Presentarion
CSM Cloud Service Management PresentarionCSM Cloud Service Management Presentarion
CSM Cloud Service Management Presentarion
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
 

ch01(Modified).ppt

  • 1. Computer Network Textbooks •Data Communications and Networking: B. A. Forouzan, 4th Edition, TMH •Computer Networks: A. S. Tanenbaum, 4th Edition, Pentice Hall
  • 2. Introduction •The term telecommunication means communication at a distance (tele is Greek for “far”). •The word data refers to information presented in whatever form is agreed upon by the parties creating and using the data. •Data communications are the exchange of data between two devices via some form of transmission medium such as a wire cable. •A computer network is a number of devices (often referred to as nodes) connected by communication links. •Two computer connected to the network can communicate with each other through other nodes if they are not directly connected. •Some of the nodes in the network may not be computer at all but they are network devices (like switches, routers etc.) to facilitate communication.
  • 3. 1.3 Criteria of Effectiveness of Data Communication Delivery: Data must arrive at the correct destination. Accuracy: Data must be deliver accurately without any error. Timeliness: Data must be delivered in timely manner. Jitter: Variation in the data arrival time at the destination. Different applications have different requirements on these criteria
  • 4. 1.4 Components (Q) Figure 1.1 Five components of data communication • Message : The information (data) to be communicated. • Sender : The device that sends the data message. • Receiver : The device that receives the data message. • Transmission medium : The physical path by which a message travels from sender to receiver. • Protocol : A set of rules that govern data communications.
  • 5. 1.5 Data Flow Figure 1.2 Data flow (simplex, half-duplex, and full-duplex)
  • 6. 1.6 Data Flow Examples  Simplex mode  Keyboard, mouse, traditional monitor  GPS device  Half duplex  Walkie-talkie  Citizen band radio  Advantage: entire bandwidth (capacity of a channel) can be used for transmission  Disadvantage: not suitable for high interactive application  Full duplex  Telephone network
  • 7. 1.7 Network Criteria • Performance: Evaluated by two metrics 1. Throughput: average rate of successful message delivery 2. Delay: Due to traffic congestion However these two criteria are often contradictory. • Reliability: Frequency of failure, recover time, and robustness • Security: Unauthorized access, protecting data from damage etc • becoming more important now
  • 8. 1.8 Physical structure Figure 1.3 Types of connections: point-to-point and multipoint Whether the link capacity is shared or not Point-to-Point Line Configuration
  • 11. 1.11 Figure 1.4 Categories of network based on topology(connectivity)
  • 12. 1.12 Figure 1.5 A fully connected mesh topology (five devices) 1 2 3 4 5 n(n-1) half-duplex links n(n-1)/2 duplex links Example: Telephone regional offices Advantages: Eliminating traffic problem, robustness and privacy Disadvantages: Many cabling/installation and need many I/O ports on nodes
  • 13. Figure 1.6 A star topology connecting four stations Example: Ethernet switch/hub, Wifi access point and LAN Advantages: robust against a node’s failure or a link failure Disadvantages: If hub/switch goes down, the whole system is dead Q. Compare star and mess topology with advantages and disadvantages
  • 14. 1.14 Figure 1.7 A bus topology connecting three stations The preceding two are point to point connections, but it is a multipoint connection. Example: Ethernet LAN can use bus topology Advantages: Less cabling, Easy of installation, Disadvantages: Any tap device failure or break in bus will cause the whole system fail. Limitation on the number of taps a bus can support because signal becomes weaker and weaker as it travels farther and farther, difficult to add new device. The damaged area reflects signals back in the direction of origin, creating noise in both direction.
  • 15. 1.15 Figure 1.8 A ring topology connecting six stations Each device has a dedicated point-to-point connection with only the two devices on either side of it. A signal is passed along the ring in one direction from device to device. When a device receives a signal intended for another device, its repeater regenerates the bits and passes them along. Example: IBM token ring LAN (less popular now). Advantages: Easy to install a new device just by changing two connections Disadvantages: Unidirectional traffic, A break in ring can disable the whole network
  • 16. Figure 1.9 A hybrid topology: For e.g. a star backbone with three bus networks Q. For n devices in a network, what is the number of cable links required for a mesh, ring, bus and star topology? Ans. Mesh n(n-1) half-duplex links n(n-1)/2 duplex links Star n Ring n Bus n+1
  • 17. 1.17 Categories of Networks based on network size
  • 18. 1.18 Figure 1.10 LAN (range few km)
  • 20. 1.20 Figure 1.11 MAN (Range town or a city)
  • 21. 1.21 Figure 1.12 WAN (Large geographic areas)
  • 22. 1.22 THE INTERNET Internet: Interconnection of massive network of networks. It connects millions of computers together globally, forming a network in which any computer can communicate with any other computer as long as they are both connected to the Internet. Before Internet: Many isolated Local Area Networks (LANs) existed Those LANs had very different hardware and network protocols  Protocol example: TCP/IP, IPX (from Novell)
  • 23. Internet, internet and Intranet (Contd.) • Internet with a capital "I" refers to the entire Internet (meaning the biggest collection of networks on the planet) . Internet with a lowercase "i" refers to any group of networks that are connected together. • Intranet refers to a single inter-connected network within one organization that uses HTTP/Web technologies for the sharing of information internally. In other words we could string together intranets to make our own private internet. We could then connect our internet to the Internet.
  • 25. 1.25 PROTOCOLS AND STANDARDS Protocols: A set of rules that governs data communications (similar to human language). It defines what is communicated, how it is communicated, and when it is communicated. The key elements of a protocol are syntax, semantics, and timing Syntax: It refers to the structure or format of the data. Semantics: It refers to the meaning of each section of data. Timing : It refers when data should be sent and how fast they can be sent.
  • 26. Standards – public recognized protocols for open market De facto: A format, language, or protocol that has become a standard not because it has been approved by a standards organization but because it is widely used and recognized by the industry as being standard. E.g. Microsoft’s Windows operating system, along with commonly used business applications such as Microsoft Word and Excel, has long been the de facto standard for business and home users. De facto standards can also become de jure standards over time as, for example, HTML and PDF have done. De jure: De jure, from Medieval Latin, means from law. that have been endorsed by an official standards organization. E.g. TCP/IP, ASCII Standards Organizations: ANSI, IEEE etc

Editor's Notes

  1. 1
  2. 3
  3. 4
  4. 5
  5. 6
  6. 7
  7. 8
  8. 9
  9. 10
  10. 11
  11. 12
  12. 13
  13. 14
  14. 15
  15. 16
  16. 17
  17. 18
  18. 19
  19. 20
  20. 21
  21. 22
  22. 24
  23. 25
  24. 26