SlideShare a Scribd company logo
1 of 25
Download to read offline
1
@ Ashek Mahmud Khan; Dept. of CSE (JUST); 01725-402592
01725-402592
2
@ Ashek Mahmud Khan; Dept. of CSE (JUST); 01725-402592
Uses of Computer Networks
• Business Applications
• Home Applications
• Mobile Users
• Social Issues
Business Applications: Most companies have a substantial number of computers. For example,
a company may have a computer for each worker and use them to design products, write
brochures, and do the payroll.
Fig: A network with two clients and one server
This whole arrangement is called the client-server model. It is widely used and forms the basis
of much network usage.
Fig: The client-server model involves requests and replies
A second goal of setting up a computer network has to do with people rather than information or
even computers. A computer network can provide a powerful communication medium among
employees.
3
@ Ashek Mahmud Khan; Dept. of CSE (JUST); 01725-402592
Home Applications: Internet access provides home users with connectivity to remote
computers. As with companies, home users can access information, communicate with other
people, and buy products and services with e-commerce.
Fig: In a peer-to-peer system there are no fixed clients and servers.
Much of this information is accessed using the client-server model, but there is different, popular
model for accessing information that goes by the name of peer-to-peer communication.
Some of these forms of e-commerce have acquired cute little tags based on the fact that ‘‘to’’
and ‘‘2’’ are pronounced the same. The most popular ones are listed in Fig.
Fig: Some forms of e-commerce
Mobile Users: Mobile computers, such as laptop and handheld computers are one of the fastest-
growing segments of the computer industry.
Fig: Combinations of wireless networks and mobile computing
4
@ Ashek Mahmud Khan; Dept. of CSE (JUST); 01725-402592
Social Issues:
• Network neutrality
• Digital Millennium Copyright Act
• Profiling users
• Phishing
Network Hardware: It is now time to turn our attention from the applications and social aspects
of networking (the dessert) to the technical issues involved in network designs (the spinach).
There is no generally accepted taxonomy into which all computer networks fit, but two
dimensions standout as important: transmission technology and scale.
Broadly speaking, there are two types of transmission technology that are in widespread use:
broad cast links and point-to-point links.
Fig: Classification of interconnected processors by scale.
Personal Area Networks: PANs (Personal Area Networks) let devices communicate over the
range of a person. A common example is a wireless network that connects a computer with its
peripherals. Almost every computer has an attached monitor, keyboard, mouse, and printer.
5
@ Ashek Mahmud Khan; Dept. of CSE (JUST); 01725-402592
Fig: Bluetooth PAN configuration
Local Area Network: The next step up is the LAN (Local Area Network). A LAN is a privately
owned network that operates within and nearby a single building like a home, office or factory.
LANs are widely used to connect personal computers and consumer electronics to let them share
resources (e.g., printers) and exchange information. When LANs are used by companies, they
are called enterprise networks.
Wireless LANs are very popular these days, especially in homes, older office buildings,
cafeterias, and other places where it is too much trouble to install cables.
Fig: Wireless and wired LANs. (a) 802.11. (b) Switched Ethernet
The topology of many wired LANs is built from point-to-point links. IEEE 802.3, popularly
called Ethernet, is, by far, the most common type of wired LAN. Fig. 1-8(b) shows a sample
topology of switched Ethernet.
Metropolitan Area Networks: A MAN (Metropolitan Area Network) covers a city. The best-
known examples of MANs are the cable television networks available in many cities. These
systems grew from earlier community antenna systems used in areas with poor over-the-air
6
@ Ashek Mahmud Khan; Dept. of CSE (JUST); 01725-402592
television reception. In those early systems, a large antenna was placed on top of a nearby hill
and a signal was then piped to the subscribers’ houses.
Fig: A metropolitan area network based on cable TV.
Wide Area Networks: A WAN (Wide Area Network) spans a large geographical area, often a
country or continent. We will begin our discussion with wired WANs, using the example of a
company with branch offices indifferent cities.
Fig: WAN that connects three branch offices in Australia
7
@ Ashek Mahmud Khan; Dept. of CSE (JUST); 01725-402592
Network Software
• Protocol hierarchies
• Design issues for the layers
• Connection-oriented versus connectionless service
• Service primitives
• Relationship of services to protocols
Protocol Hierarchies: To reduce their design complexity, most networks are organized as a
stack of layers or levels, each one built upon the one below it. The number of layers, the name
of each layer, the contents of each layer, and the function of each layer differ from network to
network.
A protocol is an agreement between the communicating parties on how communication is to
proceed.
Fig: Layers, protocols, and interfaces.
Below layer 1 is the physical medium through which actual communication occurs. In Fig.
virtual communication is shown by dotted lines and physical communication by solid lines.
Between each pair of adjacent layers is an interface. The interface defines which primitive
operations and services the lower layer makes available to the upper one.
8
@ Ashek Mahmud Khan; Dept. of CSE (JUST); 01725-402592
Fig: The philosopher-translator-secretary architecture
Fig: Example information flow supporting virtual communication in layer 5.
Connection-oriented versus connectionless service: Layers can offer two different types of
service to the layers above them: connection-oriented and connectionless. In this section we will
look at these two types and examine the differences between them.
9
@ Ashek Mahmud Khan; Dept. of CSE (JUST); 01725-402592
Connection-oriented service is modeled after the telephone system. To talk to someone, you
pick up the phone, dial the number, talk, and then hang up. Similarly, to use a connection-
oriented network service, the service user first establishes a connection, uses the connection, and
then releases the connection.
In contrast to connection-oriented service, connectionless service is modeled after the postal
system. Each message (letter) carries the full destination address, and each one is routed through
the intermediate nodes inside the system independent of all the subsequent messages. There are
different names for messages in different contexts; a packet is a message at the network layer.
Fig: Six different types of service.
Service Primitives: A service is formally specified by a set of primitives (operations) available
to user processes to access the service. These primitives tell the service to perform some action
or report on an action taken by a peer entity.
Fig: Six service primitives that provide a simple connection-oriented service.
10
@ Ashek Mahmud Khan; Dept. of CSE (JUST); 01725-402592
Fig: A simple client-server interaction using acknowledged data grams.
The Relationship of Services to Protocols: Services and protocols are distinct concepts. This
distinction is so important that we emphasize it again here. A service is a set of primitives
(operations) that a layer provides to the layer above it.
A protocol, in contrast, is a set of rules governing the format and meaning of the packets, or
messages that are exchanged by the peer entities within a layer.
Fig: The relationship between a service and a protocol.
Reference Models:
• OSI reference model
• TCP/IP reference model
• Model used for this text
• Comparison of OSI and TCP/IP
• Critique of OSI model and protocols
• Critique of TCP/IP model
11
@ Ashek Mahmud Khan; Dept. of CSE (JUST); 01725-402592
OSI reference model: Principles for the seven layers
• Layers created for different abstractions
• Each layer performs well-defined function
• Function of layer chosen with definition of international standard protocols in mind
• Minimize information flow across interfaces between boundaries
• Number of layers optimum
Fig: The OSI reference model
OSI Reference Model Layers:
• Physical layer
• Data link layer
12
@ Ashek Mahmud Khan; Dept. of CSE (JUST); 01725-402592
• Network layer
• Transport layer
• Session layer
• Presentation layer
• Application layer
The Physical Layer: The physical layer is concerned with transmitting raw bits over a
communication channel. The design issues have to do with making sure that when one side
sends a 1 bit it is received by the other side as a 1 bit, not as a 0 bit.
The Data Link Layer: The main task of the data link layer is to transform a raw transmission
facility into a line that appears free of undetected transmission errors. It does so by masking the
real errors so the network layer does not see them.
The Network Layer: The network layer controls the operation of the subnet. A key design issue
is determining how packets are routed from source to destination. Routes can be based on static
tables that are ‘‘wired into’’ the network and rarely changed, or more often they can be updated
automatically to avoid failed components.
The Transport Layer: The basic function of the transport layer is to accept data from above it,
split it up into smaller units if need be, pass these to the network layer, and ensure that the pieces
all arrive correctly at the other end. This layer is responsible for end-to-end delivers of
messages between the networked hosts
The Session Layer: The session layer allows users on different machines to establish sessions
between them. This layer is responsible for establishing the process-to-process
communication between the hosts in the network.
The Presentation Layer: Unlike the lower layers, which are mostly concerned with moving bits
around, the presentation layer is concerned with the syntax and semantics of the information
transmitted. The Presentation layer is responsible for protocol conversion, date
encryption/decryption, Expanding graphics command and the date compression.
The Application Layer: The application layer contains a variety of protocols that are
commonly needed by users. One widely used application protocol is HTTP (Hyper Text
Transfer Protocol), which is the basis for the World Wide Web.
TCP/IP Model: TCP/IP is two protocols of this model. TCP stands for Transmission Control
Protocol and IP stands for Internet Protocol. There are 4 Layers in TCP/IP Model.
13
@ Ashek Mahmud Khan; Dept. of CSE (JUST); 01725-402592
The TCP/IP Reference Model:
• Link layer
• Internet layer
• Transport layer
• Application layer
The Link Layer: All these requirements led to the choice of a packet-switching network based
on a connectionless layer that runs across different networks. The lowest layer in the model, the
link layer describes what links such as serial lines and classic Ethernet must do to meet the needs
of this connectionless internet layer.
The Internet Layer: The internet layer is the linchpin that holds the whole architecture
together. It is shown in Fig. as corresponding roughly to the OSI network layer.
Fig: The TCP/IP reference model
The internet layer defines an official packet format and protocol called IP (Internet Protocol),
plus a companion protocol called ICMP (Internet Control Message Protocol) that helps it
function. The job of the internet layer is to deliver IP packets where they are supposed to go.
Packet routing is clearly a major issue here, as is congestion (though IP has not proven effective
at avoiding congestion).
The Transport Layer: The layer above the internet layer in the TCP/IP model is now usually
called the transport layer. Two end-to-end transport protocols have been defined here. The first
one, TCP (Transmission Control Protocol), The second protocol in this layer, UDP (User
Datagram Protocol).
14
@ Ashek Mahmud Khan; Dept. of CSE (JUST); 01725-402592
The Application Layer: On top of the transport layer is the application layer. It contains all the
higher-level protocols. The early ones included virtual terminal (TELNET), file transfer (FTP),
and electronic mail (SMTP).
Fig: The TCP/IP reference model with some protocols we will study
Comparison of the OSI and TCP/IP Reference Models:
Three concepts are central to the OSI model: 1. Services. 2. Interfaces. 3. Protocols.
The main differences between the two models are as follows:
OSI(Open System Interconnection) TCP/IP (Transmission Control Protocol/ Internet
Protocol)
(i) The OSI model consists of 7
architectural layers
(i) Whereas the TCP/IP only has 4 layers.
(ii) Follows horizontal approach (ii) Follows vertical approach.
(iii) OSI is a general model.
(iii) TCP/IP model cannot be used in any
other application.
(iv) OSI model has a problem of fitting the
protocols in the model
(iv) TCP/IP model does not fit any protocol
(v) OSI model has a separate presentation
layer
(v) TCP/IP does not have a separate
presentation layer
(vi) In OSI model the transport layer
guarantees the delivery of packets
(vi) In TCP/IP model the transport layer does
not guarantees delivery of packets.
(vii) Protocols are hidden in OSI model and
are easily replaced as the technology
changes.
(vii) In TCP/IP replacing protocol is not easy.
(viii) Internetworking not supported (viii) TCP/IP supports Internet working
(ix) Loosely layered (ix) Strict layering
15
@ Ashek Mahmud Khan; Dept. of CSE (JUST); 01725-402592
Critique of the OSI Model and Protocols:
• Bad timing.
• Bad technology.
• Bad implementations.
• Bad politics.
First let us look at reason one: bad timing. The time at which a standard is established is
absolutely critical to its success.
16
@ Ashek Mahmud Khan; Dept. of CSE (JUST); 01725-402592
Fig: The apocalypse of the two elephants.
This figure shows the amount of activity surrounding a new subject. When the subject is first
discovered, there is a burst of research activity in the form of discussions, papers, and meetings.
After a while this activity subsides, corporations discover the subject, and the billion-dollar wave
of investment hits.
Bad Technology: The second reason that OSI never caught on is that both the model and the
protocols are flawed. The choice of seven layers was more political than technical, and two of
the layers (session and presentation) are nearly empty, whereas two other ones (data link and
network) are overfull.
Example Networks:
• Internet
• ARPANET
• NSFNET
• Third-generation mobile phone networks
• Wireless LANs: 802.11
• RFID and sensor networks
Internet: The Internet is not really a network at all, but a vast collection of different networks
that use certain common protocols and provide certain common services.
The ARPANET: The Advanced Research Projects Agency Network (ARPANET) was an early
packet switching network and the first network to implement the protocol suite TCP/IP. Both
technologies became the technical foundation of the Internet.
17
@ Ashek Mahmud Khan; Dept. of CSE (JUST); 01725-402592
Fig: (a) Structure of the telephone system. (b) Baran’s proposed distributed switching
system
The software was split into two parts: subnet and host. The subnet software consisted of the IMP
end of the host-IMP connection, the IMP-IMP protocol, and a source IMP to destination IMP
protocol designed to improve reliability. The original ARPANET design is shown in Fig.
Fig: The original ARPANET design
The network grew quickly as more IMPs were delivered and installed; it soon spanned the
United States. Figure shows how rapidly the ARPANET grew in the first 3 years.
18
@ Ashek Mahmud Khan; Dept. of CSE (JUST); 01725-402592
Fig: Growth of the ARPANET (a) December 1969. (b) July 1970. (c) March 1971.
Fig: Growth of the ARPANET (d) April 1972. (e) September 1972.
NSFNET: NSF also funded some (eventually about 20) regional networks that connected to the
backbone to allow users at thousands of universities, research labs, libraries, and museums to
access any of the supercomputers and to communicate with one another. The complete network,
including backbone and the regional networks, was called NSFNET.
Fog: The NSFNET backbone in 1988.
19
@ Ashek Mahmud Khan; Dept. of CSE (JUST); 01725-402592
Architecture of the Internet: The architecture of the Internet has also changed a great deal as it
has grown explosively. The big picture is shown in Fig. Let us examine this figure piece by
piece, starting with a computer at home (at the edges of the figure). To join the Internet, the
computer is connected to an Internet Service Provider, or simply ISP, from who the user
purchases Internet access or connectivity.
Fig: Overview of the Internet architecture
A common way to connect to an ISP is to use the phone line to your house, in which case your
phone company is your ISP.DSL, short for Digital Subscriber Line, reuses the telephone line that
connects to your house for digital data transmission. The computer is connected to a device
called a DSL modem that converts between digital packets and analog signals that can pass
unhindered over the telephone line. At the other end, a device called a DSLAM (Digital
Subscriber Line Access Multiplexer) converts between signals and packets.
Third-Generation Mobile Phone Networks: The third generation, or 3G, systems were
initially deployed in 2001 and offer both digital voice and broadband digital data services. They
also come with a lot of jargon and many different standards to choose from. 3G is loosely
defined by the ITU (an international standards body we will discuss in the next section) as
providing rates of at least 2 Mbps for stationary or walking users and 384 kbps in a moving
vehicle. UMTS (Universal Mobile Telecommunications System), also called WCDMA
(Wideband Code Division Multiple Access), is the main 3G system that is being rapidly
deployed worldwide.
20
@ Ashek Mahmud Khan; Dept. of CSE (JUST); 01725-402592
Fig: Cellular design of mobile phone networks
The architecture of the mobile phone network is very different than that of the Internet. It has
several parts, as shown in the simplified version of the UMTS architecture in Fig.
Fig: Architecture of the UMTS 3G mobile phone network.
First, there is the air interface. This term is a fancy name for the radio communication protocol
that is used over the air between the mobile device (e.g., the cell phone) and the cellular base
station. Advances in the air interface over the past decades have greatly increased wireless data
rates. The UMTS air interface is based on Code Division Multiple Access (CDMA). The cellular
base station together with its controller forms the radio access network. This part is the wireless
side of the mobile phone network. The controller node or RNC (Radio Network Controller)
21
@ Ashek Mahmud Khan; Dept. of CSE (JUST); 01725-402592
controls how the spectrum is used. The base station implements the air interface. It is called
Node B, a temporary label that stuck.
Another difference between mobile phone networks and the traditional Inter-net is mobility.
When a user moves out of the range of one cellular base station and into the range of another
one, the flow of data must be re-routed from the old to the new cell base station. This technique
is known as hand over or hand off, and it is illustrated in Fig.
Fig: Mobile phone handover (a) before (b) after.
Wireless LANs: 802.11:
Fig: (a) Wireless network with an access point. (b) Ad hoc network.
22
@ Ashek Mahmud Khan; Dept. of CSE (JUST); 01725-402592
Fig: Multipath fading
RFID and Sensor Networks: The networks we have studied so far are made up of computing
devices that are easy to recognize, from computers to mobile phones. With Radio Frequency
Identification (RFID), everyday objects can also be part of a computer network.
Fig: RFID used to network everyday objects.
Popular kind of RFID is HF RFID (High Frequency RFID). It operates at 13.56 MHz and is
likely to be in your passport, credit cards, books, and noncontact payment systems.
Fig: Multihop topology of a sensor network.
23
@ Ashek Mahmud Khan; Dept. of CSE (JUST); 01725-402592
Who’s who in the International Standards World?
International standards are produced and published by ISO (International Standards
Organization), a voluntary no treaty organization founded in 1946. Its members are the national
standards organizations of the 157 member countries. These members include ANSI (U.S.), BSI
(Great Britain), AFNOR (France), DIN (Germany), and 153 others.
CD (Committee Draft), DIS (Draft International Standard), IS (International Standard), NIST
(National Institute of Standards and Technology), IEEE (Institute of Electrical and Electronics
Engineers).
Metric Units:
The principal metric prefixes
Network Layer Issues (Che-05)
Network Layer Design Issues:
• Store-and-Forward Packet Switching
• Services Provided to the Transport Layer
• Implementation of Connectionless Service
• Implementation of Connection-Oriented Service
• Comparison of Virtual-Circuit and Datagram Subnets
24
@ Ashek Mahmud Khan; Dept. of CSE (JUST); 01725-402592
Store-and-Forward Packet Switching:
Fig: The environment of the network layer protocols. (Details text book)
Implementation of Connectionless Service:
Fig: Routing within a datagram network.
Having looked at the two classes of service the network layer can provide to its users, it is time
to see how this layer works inside. Two different organizations are possible, depending on the
type of service offered. If connectionless service is offered, packets are injected into the network
25
@ Ashek Mahmud Khan; Dept. of CSE (JUST); 01725-402592
individually and routed independently of each other. In this context, the packets are frequently
called datagram’s (in analogy with telegrams) and the network is called a datagram network.

More Related Content

What's hot

Network lab manual
Network lab manualNetwork lab manual
Network lab manualPrabhu D
 
Unit 3(advanced state modeling & interaction meodelling)
Unit  3(advanced state modeling & interaction meodelling)Unit  3(advanced state modeling & interaction meodelling)
Unit 3(advanced state modeling & interaction meodelling)Manoj Reddy
 
Nonrecursive predictive parsing
Nonrecursive predictive parsingNonrecursive predictive parsing
Nonrecursive predictive parsingalldesign
 
OOAD - UML - Sequence and Communication Diagrams - Lab
OOAD - UML - Sequence and Communication Diagrams - LabOOAD - UML - Sequence and Communication Diagrams - Lab
OOAD - UML - Sequence and Communication Diagrams - LabVicter Paul
 
Problems of cooperative system
Problems of cooperative systemProblems of cooperative system
Problems of cooperative systemfazli khaliq
 
Software Process Models
Software Process ModelsSoftware Process Models
Software Process ModelsHassan A-j
 
Software architecture design ppt
Software architecture design pptSoftware architecture design ppt
Software architecture design pptfarazimlak
 
Line of Code (LOC) Matric and Function Point Matric
Line of Code (LOC) Matric and Function Point MatricLine of Code (LOC) Matric and Function Point Matric
Line of Code (LOC) Matric and Function Point MatricAnkush Singh
 
Software engineering a practitioners approach 8th edition pressman solutions ...
Software engineering a practitioners approach 8th edition pressman solutions ...Software engineering a practitioners approach 8th edition pressman solutions ...
Software engineering a practitioners approach 8th edition pressman solutions ...Drusilla918
 
Software Requirements Specification on Student Information System (SRS on SIS)
Software Requirements Specification on Student Information System (SRS on SIS)Software Requirements Specification on Student Information System (SRS on SIS)
Software Requirements Specification on Student Information System (SRS on SIS)Minhas Kamal
 
Unicast multicast & broadcast
Unicast multicast & broadcastUnicast multicast & broadcast
Unicast multicast & broadcastNetProtocol Xpert
 
Cs8581 networks lab manual 2017
Cs8581 networks lab manual   2017Cs8581 networks lab manual   2017
Cs8581 networks lab manual 2017Kayathri Devi D
 

What's hot (20)

Network lab manual
Network lab manualNetwork lab manual
Network lab manual
 
Unit 3(advanced state modeling & interaction meodelling)
Unit  3(advanced state modeling & interaction meodelling)Unit  3(advanced state modeling & interaction meodelling)
Unit 3(advanced state modeling & interaction meodelling)
 
Nonrecursive predictive parsing
Nonrecursive predictive parsingNonrecursive predictive parsing
Nonrecursive predictive parsing
 
OOAD - UML - Sequence and Communication Diagrams - Lab
OOAD - UML - Sequence and Communication Diagrams - LabOOAD - UML - Sequence and Communication Diagrams - Lab
OOAD - UML - Sequence and Communication Diagrams - Lab
 
Problems of cooperative system
Problems of cooperative systemProblems of cooperative system
Problems of cooperative system
 
The medium access sublayer
 The medium  access sublayer The medium  access sublayer
The medium access sublayer
 
Software Process Models
Software Process ModelsSoftware Process Models
Software Process Models
 
3 tier architecture
3 tier architecture3 tier architecture
3 tier architecture
 
Software architecture design ppt
Software architecture design pptSoftware architecture design ppt
Software architecture design ppt
 
software characteristics
software characteristicssoftware characteristics
software characteristics
 
Requirements Engineering
Requirements EngineeringRequirements Engineering
Requirements Engineering
 
Line of Code (LOC) Matric and Function Point Matric
Line of Code (LOC) Matric and Function Point MatricLine of Code (LOC) Matric and Function Point Matric
Line of Code (LOC) Matric and Function Point Matric
 
Software engineering a practitioners approach 8th edition pressman solutions ...
Software engineering a practitioners approach 8th edition pressman solutions ...Software engineering a practitioners approach 8th edition pressman solutions ...
Software engineering a practitioners approach 8th edition pressman solutions ...
 
Ieee 802.11 wireless lan
Ieee 802.11 wireless lanIeee 802.11 wireless lan
Ieee 802.11 wireless lan
 
Software Requirements Specification on Student Information System (SRS on SIS)
Software Requirements Specification on Student Information System (SRS on SIS)Software Requirements Specification on Student Information System (SRS on SIS)
Software Requirements Specification on Student Information System (SRS on SIS)
 
Unicast multicast & broadcast
Unicast multicast & broadcastUnicast multicast & broadcast
Unicast multicast & broadcast
 
Software Sizing
Software SizingSoftware Sizing
Software Sizing
 
GO BACK N PROTOCOL
GO BACK N PROTOCOLGO BACK N PROTOCOL
GO BACK N PROTOCOL
 
Cs8581 networks lab manual 2017
Cs8581 networks lab manual   2017Cs8581 networks lab manual   2017
Cs8581 networks lab manual 2017
 
Cs8591 Computer Networks
Cs8591 Computer NetworksCs8591 Computer Networks
Cs8591 Computer Networks
 

Similar to Computer networks

Network Advantages And Disadvantages
Network Advantages And DisadvantagesNetwork Advantages And Disadvantages
Network Advantages And DisadvantagesRenee Jones
 
Basic networking tutorial
Basic networking tutorialBasic networking tutorial
Basic networking tutorialreddydivakara
 
Data Communication
Data Communication Data Communication
Data Communication MSSadeq
 
Introduction to Networks_v0.2
Introduction to Networks_v0.2Introduction to Networks_v0.2
Introduction to Networks_v0.2Sohail Gohir
 
fmxhnkmcjbg,lBasics of network
fmxhnkmcjbg,lBasics of networkfmxhnkmcjbg,lBasics of network
fmxhnkmcjbg,lBasics of networkammulu99
 
Basic networking tutorial
Basic networking tutorialBasic networking tutorial
Basic networking tutorialRodel Morales
 
What is network architecture
What is network architecture What is network architecture
What is network architecture Sorcia D'Arceuil
 
The Abstracted Network for Industrial Internet
The Abstracted Network for Industrial InternetThe Abstracted Network for Industrial Internet
The Abstracted Network for Industrial InternetMeshDynamics
 
Computer Network By Pawan Thakur HOD CS & IT VIM BHOPAL
Computer Network By Pawan Thakur HOD CS & IT VIM BHOPALComputer Network By Pawan Thakur HOD CS & IT VIM BHOPAL
Computer Network By Pawan Thakur HOD CS & IT VIM BHOPALGovt. P.G. College Dharamshala
 
Networking tutorial
Networking tutorialNetworking tutorial
Networking tutorialajaymane22
 
IRM GROUP 2 CHAPTER 2
IRM GROUP 2 CHAPTER 2IRM GROUP 2 CHAPTER 2
IRM GROUP 2 CHAPTER 2Rexon Calub
 

Similar to Computer networks (20)

Network Advantages And Disadvantages
Network Advantages And DisadvantagesNetwork Advantages And Disadvantages
Network Advantages And Disadvantages
 
Computer network solution
Computer network solutionComputer network solution
Computer network solution
 
Internet
InternetInternet
Internet
 
Basic networking tutorial
Basic networking tutorialBasic networking tutorial
Basic networking tutorial
 
Data Communication
Data Communication Data Communication
Data Communication
 
Introduction to Networks_v0.2
Introduction to Networks_v0.2Introduction to Networks_v0.2
Introduction to Networks_v0.2
 
Cn
CnCn
Cn
 
Cnetworks
CnetworksCnetworks
Cnetworks
 
fmxhnkmcjbg,lBasics of network
fmxhnkmcjbg,lBasics of networkfmxhnkmcjbg,lBasics of network
fmxhnkmcjbg,lBasics of network
 
Basic networking tutorial
Basic networking tutorialBasic networking tutorial
Basic networking tutorial
 
Cs8591 Computer Networks
Cs8591 Computer NetworksCs8591 Computer Networks
Cs8591 Computer Networks
 
What is network architecture
What is network architecture What is network architecture
What is network architecture
 
The Abstracted Network for Industrial Internet
The Abstracted Network for Industrial InternetThe Abstracted Network for Industrial Internet
The Abstracted Network for Industrial Internet
 
Computer Network By Pawan Thakur HOD CS & IT VIM BHOPAL
Computer Network By Pawan Thakur HOD CS & IT VIM BHOPALComputer Network By Pawan Thakur HOD CS & IT VIM BHOPAL
Computer Network By Pawan Thakur HOD CS & IT VIM BHOPAL
 
Networking tutorial
Networking tutorialNetworking tutorial
Networking tutorial
 
Basic lecture
Basic lectureBasic lecture
Basic lecture
 
Lesson 1 introduction
Lesson 1 introductionLesson 1 introduction
Lesson 1 introduction
 
Computer network
Computer networkComputer network
Computer network
 
Computer network
Computer networkComputer network
Computer network
 
IRM GROUP 2 CHAPTER 2
IRM GROUP 2 CHAPTER 2IRM GROUP 2 CHAPTER 2
IRM GROUP 2 CHAPTER 2
 

More from Jessore University of Science & Technology, Jessore.

More from Jessore University of Science & Technology, Jessore. (15)

Compact it job solution part 01 (Preliminary)
Compact it job solution part 01 (Preliminary)Compact it job solution part 01 (Preliminary)
Compact it job solution part 01 (Preliminary)
 
Distributed system
Distributed systemDistributed system
Distributed system
 
Automata Theory
Automata TheoryAutomata Theory
Automata Theory
 
Software Engineering
Software EngineeringSoftware Engineering
Software Engineering
 
Operating system
Operating systemOperating system
Operating system
 
Pattern recognition
Pattern recognitionPattern recognition
Pattern recognition
 
Artificial Intelligence
Artificial IntelligenceArtificial Intelligence
Artificial Intelligence
 
Number system and digital device (Chapter 3)
Number system and digital device (Chapter 3)Number system and digital device (Chapter 3)
Number system and digital device (Chapter 3)
 
Programming Language (chapter 5 for class 11 and 12)
Programming Language (chapter 5 for class 11 and 12)Programming Language (chapter 5 for class 11 and 12)
Programming Language (chapter 5 for class 11 and 12)
 
A to z of Cyber Crime
A to z of Cyber CrimeA to z of Cyber Crime
A to z of Cyber Crime
 
Syntax analysis
Syntax analysisSyntax analysis
Syntax analysis
 
Industrial Management
Industrial ManagementIndustrial Management
Industrial Management
 
Computer Graphics
Computer GraphicsComputer Graphics
Computer Graphics
 
IEEE-488
IEEE-488IEEE-488
IEEE-488
 
HTML-Bangla E-book
HTML-Bangla E-bookHTML-Bangla E-book
HTML-Bangla E-book
 

Recently uploaded

Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxAnaBeatriceAblay2
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 

Recently uploaded (20)

Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 

Computer networks

  • 1. 1 @ Ashek Mahmud Khan; Dept. of CSE (JUST); 01725-402592 01725-402592
  • 2. 2 @ Ashek Mahmud Khan; Dept. of CSE (JUST); 01725-402592 Uses of Computer Networks • Business Applications • Home Applications • Mobile Users • Social Issues Business Applications: Most companies have a substantial number of computers. For example, a company may have a computer for each worker and use them to design products, write brochures, and do the payroll. Fig: A network with two clients and one server This whole arrangement is called the client-server model. It is widely used and forms the basis of much network usage. Fig: The client-server model involves requests and replies A second goal of setting up a computer network has to do with people rather than information or even computers. A computer network can provide a powerful communication medium among employees.
  • 3. 3 @ Ashek Mahmud Khan; Dept. of CSE (JUST); 01725-402592 Home Applications: Internet access provides home users with connectivity to remote computers. As with companies, home users can access information, communicate with other people, and buy products and services with e-commerce. Fig: In a peer-to-peer system there are no fixed clients and servers. Much of this information is accessed using the client-server model, but there is different, popular model for accessing information that goes by the name of peer-to-peer communication. Some of these forms of e-commerce have acquired cute little tags based on the fact that ‘‘to’’ and ‘‘2’’ are pronounced the same. The most popular ones are listed in Fig. Fig: Some forms of e-commerce Mobile Users: Mobile computers, such as laptop and handheld computers are one of the fastest- growing segments of the computer industry. Fig: Combinations of wireless networks and mobile computing
  • 4. 4 @ Ashek Mahmud Khan; Dept. of CSE (JUST); 01725-402592 Social Issues: • Network neutrality • Digital Millennium Copyright Act • Profiling users • Phishing Network Hardware: It is now time to turn our attention from the applications and social aspects of networking (the dessert) to the technical issues involved in network designs (the spinach). There is no generally accepted taxonomy into which all computer networks fit, but two dimensions standout as important: transmission technology and scale. Broadly speaking, there are two types of transmission technology that are in widespread use: broad cast links and point-to-point links. Fig: Classification of interconnected processors by scale. Personal Area Networks: PANs (Personal Area Networks) let devices communicate over the range of a person. A common example is a wireless network that connects a computer with its peripherals. Almost every computer has an attached monitor, keyboard, mouse, and printer.
  • 5. 5 @ Ashek Mahmud Khan; Dept. of CSE (JUST); 01725-402592 Fig: Bluetooth PAN configuration Local Area Network: The next step up is the LAN (Local Area Network). A LAN is a privately owned network that operates within and nearby a single building like a home, office or factory. LANs are widely used to connect personal computers and consumer electronics to let them share resources (e.g., printers) and exchange information. When LANs are used by companies, they are called enterprise networks. Wireless LANs are very popular these days, especially in homes, older office buildings, cafeterias, and other places where it is too much trouble to install cables. Fig: Wireless and wired LANs. (a) 802.11. (b) Switched Ethernet The topology of many wired LANs is built from point-to-point links. IEEE 802.3, popularly called Ethernet, is, by far, the most common type of wired LAN. Fig. 1-8(b) shows a sample topology of switched Ethernet. Metropolitan Area Networks: A MAN (Metropolitan Area Network) covers a city. The best- known examples of MANs are the cable television networks available in many cities. These systems grew from earlier community antenna systems used in areas with poor over-the-air
  • 6. 6 @ Ashek Mahmud Khan; Dept. of CSE (JUST); 01725-402592 television reception. In those early systems, a large antenna was placed on top of a nearby hill and a signal was then piped to the subscribers’ houses. Fig: A metropolitan area network based on cable TV. Wide Area Networks: A WAN (Wide Area Network) spans a large geographical area, often a country or continent. We will begin our discussion with wired WANs, using the example of a company with branch offices indifferent cities. Fig: WAN that connects three branch offices in Australia
  • 7. 7 @ Ashek Mahmud Khan; Dept. of CSE (JUST); 01725-402592 Network Software • Protocol hierarchies • Design issues for the layers • Connection-oriented versus connectionless service • Service primitives • Relationship of services to protocols Protocol Hierarchies: To reduce their design complexity, most networks are organized as a stack of layers or levels, each one built upon the one below it. The number of layers, the name of each layer, the contents of each layer, and the function of each layer differ from network to network. A protocol is an agreement between the communicating parties on how communication is to proceed. Fig: Layers, protocols, and interfaces. Below layer 1 is the physical medium through which actual communication occurs. In Fig. virtual communication is shown by dotted lines and physical communication by solid lines. Between each pair of adjacent layers is an interface. The interface defines which primitive operations and services the lower layer makes available to the upper one.
  • 8. 8 @ Ashek Mahmud Khan; Dept. of CSE (JUST); 01725-402592 Fig: The philosopher-translator-secretary architecture Fig: Example information flow supporting virtual communication in layer 5. Connection-oriented versus connectionless service: Layers can offer two different types of service to the layers above them: connection-oriented and connectionless. In this section we will look at these two types and examine the differences between them.
  • 9. 9 @ Ashek Mahmud Khan; Dept. of CSE (JUST); 01725-402592 Connection-oriented service is modeled after the telephone system. To talk to someone, you pick up the phone, dial the number, talk, and then hang up. Similarly, to use a connection- oriented network service, the service user first establishes a connection, uses the connection, and then releases the connection. In contrast to connection-oriented service, connectionless service is modeled after the postal system. Each message (letter) carries the full destination address, and each one is routed through the intermediate nodes inside the system independent of all the subsequent messages. There are different names for messages in different contexts; a packet is a message at the network layer. Fig: Six different types of service. Service Primitives: A service is formally specified by a set of primitives (operations) available to user processes to access the service. These primitives tell the service to perform some action or report on an action taken by a peer entity. Fig: Six service primitives that provide a simple connection-oriented service.
  • 10. 10 @ Ashek Mahmud Khan; Dept. of CSE (JUST); 01725-402592 Fig: A simple client-server interaction using acknowledged data grams. The Relationship of Services to Protocols: Services and protocols are distinct concepts. This distinction is so important that we emphasize it again here. A service is a set of primitives (operations) that a layer provides to the layer above it. A protocol, in contrast, is a set of rules governing the format and meaning of the packets, or messages that are exchanged by the peer entities within a layer. Fig: The relationship between a service and a protocol. Reference Models: • OSI reference model • TCP/IP reference model • Model used for this text • Comparison of OSI and TCP/IP • Critique of OSI model and protocols • Critique of TCP/IP model
  • 11. 11 @ Ashek Mahmud Khan; Dept. of CSE (JUST); 01725-402592 OSI reference model: Principles for the seven layers • Layers created for different abstractions • Each layer performs well-defined function • Function of layer chosen with definition of international standard protocols in mind • Minimize information flow across interfaces between boundaries • Number of layers optimum Fig: The OSI reference model OSI Reference Model Layers: • Physical layer • Data link layer
  • 12. 12 @ Ashek Mahmud Khan; Dept. of CSE (JUST); 01725-402592 • Network layer • Transport layer • Session layer • Presentation layer • Application layer The Physical Layer: The physical layer is concerned with transmitting raw bits over a communication channel. The design issues have to do with making sure that when one side sends a 1 bit it is received by the other side as a 1 bit, not as a 0 bit. The Data Link Layer: The main task of the data link layer is to transform a raw transmission facility into a line that appears free of undetected transmission errors. It does so by masking the real errors so the network layer does not see them. The Network Layer: The network layer controls the operation of the subnet. A key design issue is determining how packets are routed from source to destination. Routes can be based on static tables that are ‘‘wired into’’ the network and rarely changed, or more often they can be updated automatically to avoid failed components. The Transport Layer: The basic function of the transport layer is to accept data from above it, split it up into smaller units if need be, pass these to the network layer, and ensure that the pieces all arrive correctly at the other end. This layer is responsible for end-to-end delivers of messages between the networked hosts The Session Layer: The session layer allows users on different machines to establish sessions between them. This layer is responsible for establishing the process-to-process communication between the hosts in the network. The Presentation Layer: Unlike the lower layers, which are mostly concerned with moving bits around, the presentation layer is concerned with the syntax and semantics of the information transmitted. The Presentation layer is responsible for protocol conversion, date encryption/decryption, Expanding graphics command and the date compression. The Application Layer: The application layer contains a variety of protocols that are commonly needed by users. One widely used application protocol is HTTP (Hyper Text Transfer Protocol), which is the basis for the World Wide Web. TCP/IP Model: TCP/IP is two protocols of this model. TCP stands for Transmission Control Protocol and IP stands for Internet Protocol. There are 4 Layers in TCP/IP Model.
  • 13. 13 @ Ashek Mahmud Khan; Dept. of CSE (JUST); 01725-402592 The TCP/IP Reference Model: • Link layer • Internet layer • Transport layer • Application layer The Link Layer: All these requirements led to the choice of a packet-switching network based on a connectionless layer that runs across different networks. The lowest layer in the model, the link layer describes what links such as serial lines and classic Ethernet must do to meet the needs of this connectionless internet layer. The Internet Layer: The internet layer is the linchpin that holds the whole architecture together. It is shown in Fig. as corresponding roughly to the OSI network layer. Fig: The TCP/IP reference model The internet layer defines an official packet format and protocol called IP (Internet Protocol), plus a companion protocol called ICMP (Internet Control Message Protocol) that helps it function. The job of the internet layer is to deliver IP packets where they are supposed to go. Packet routing is clearly a major issue here, as is congestion (though IP has not proven effective at avoiding congestion). The Transport Layer: The layer above the internet layer in the TCP/IP model is now usually called the transport layer. Two end-to-end transport protocols have been defined here. The first one, TCP (Transmission Control Protocol), The second protocol in this layer, UDP (User Datagram Protocol).
  • 14. 14 @ Ashek Mahmud Khan; Dept. of CSE (JUST); 01725-402592 The Application Layer: On top of the transport layer is the application layer. It contains all the higher-level protocols. The early ones included virtual terminal (TELNET), file transfer (FTP), and electronic mail (SMTP). Fig: The TCP/IP reference model with some protocols we will study Comparison of the OSI and TCP/IP Reference Models: Three concepts are central to the OSI model: 1. Services. 2. Interfaces. 3. Protocols. The main differences between the two models are as follows: OSI(Open System Interconnection) TCP/IP (Transmission Control Protocol/ Internet Protocol) (i) The OSI model consists of 7 architectural layers (i) Whereas the TCP/IP only has 4 layers. (ii) Follows horizontal approach (ii) Follows vertical approach. (iii) OSI is a general model. (iii) TCP/IP model cannot be used in any other application. (iv) OSI model has a problem of fitting the protocols in the model (iv) TCP/IP model does not fit any protocol (v) OSI model has a separate presentation layer (v) TCP/IP does not have a separate presentation layer (vi) In OSI model the transport layer guarantees the delivery of packets (vi) In TCP/IP model the transport layer does not guarantees delivery of packets. (vii) Protocols are hidden in OSI model and are easily replaced as the technology changes. (vii) In TCP/IP replacing protocol is not easy. (viii) Internetworking not supported (viii) TCP/IP supports Internet working (ix) Loosely layered (ix) Strict layering
  • 15. 15 @ Ashek Mahmud Khan; Dept. of CSE (JUST); 01725-402592 Critique of the OSI Model and Protocols: • Bad timing. • Bad technology. • Bad implementations. • Bad politics. First let us look at reason one: bad timing. The time at which a standard is established is absolutely critical to its success.
  • 16. 16 @ Ashek Mahmud Khan; Dept. of CSE (JUST); 01725-402592 Fig: The apocalypse of the two elephants. This figure shows the amount of activity surrounding a new subject. When the subject is first discovered, there is a burst of research activity in the form of discussions, papers, and meetings. After a while this activity subsides, corporations discover the subject, and the billion-dollar wave of investment hits. Bad Technology: The second reason that OSI never caught on is that both the model and the protocols are flawed. The choice of seven layers was more political than technical, and two of the layers (session and presentation) are nearly empty, whereas two other ones (data link and network) are overfull. Example Networks: • Internet • ARPANET • NSFNET • Third-generation mobile phone networks • Wireless LANs: 802.11 • RFID and sensor networks Internet: The Internet is not really a network at all, but a vast collection of different networks that use certain common protocols and provide certain common services. The ARPANET: The Advanced Research Projects Agency Network (ARPANET) was an early packet switching network and the first network to implement the protocol suite TCP/IP. Both technologies became the technical foundation of the Internet.
  • 17. 17 @ Ashek Mahmud Khan; Dept. of CSE (JUST); 01725-402592 Fig: (a) Structure of the telephone system. (b) Baran’s proposed distributed switching system The software was split into two parts: subnet and host. The subnet software consisted of the IMP end of the host-IMP connection, the IMP-IMP protocol, and a source IMP to destination IMP protocol designed to improve reliability. The original ARPANET design is shown in Fig. Fig: The original ARPANET design The network grew quickly as more IMPs were delivered and installed; it soon spanned the United States. Figure shows how rapidly the ARPANET grew in the first 3 years.
  • 18. 18 @ Ashek Mahmud Khan; Dept. of CSE (JUST); 01725-402592 Fig: Growth of the ARPANET (a) December 1969. (b) July 1970. (c) March 1971. Fig: Growth of the ARPANET (d) April 1972. (e) September 1972. NSFNET: NSF also funded some (eventually about 20) regional networks that connected to the backbone to allow users at thousands of universities, research labs, libraries, and museums to access any of the supercomputers and to communicate with one another. The complete network, including backbone and the regional networks, was called NSFNET. Fog: The NSFNET backbone in 1988.
  • 19. 19 @ Ashek Mahmud Khan; Dept. of CSE (JUST); 01725-402592 Architecture of the Internet: The architecture of the Internet has also changed a great deal as it has grown explosively. The big picture is shown in Fig. Let us examine this figure piece by piece, starting with a computer at home (at the edges of the figure). To join the Internet, the computer is connected to an Internet Service Provider, or simply ISP, from who the user purchases Internet access or connectivity. Fig: Overview of the Internet architecture A common way to connect to an ISP is to use the phone line to your house, in which case your phone company is your ISP.DSL, short for Digital Subscriber Line, reuses the telephone line that connects to your house for digital data transmission. The computer is connected to a device called a DSL modem that converts between digital packets and analog signals that can pass unhindered over the telephone line. At the other end, a device called a DSLAM (Digital Subscriber Line Access Multiplexer) converts between signals and packets. Third-Generation Mobile Phone Networks: The third generation, or 3G, systems were initially deployed in 2001 and offer both digital voice and broadband digital data services. They also come with a lot of jargon and many different standards to choose from. 3G is loosely defined by the ITU (an international standards body we will discuss in the next section) as providing rates of at least 2 Mbps for stationary or walking users and 384 kbps in a moving vehicle. UMTS (Universal Mobile Telecommunications System), also called WCDMA (Wideband Code Division Multiple Access), is the main 3G system that is being rapidly deployed worldwide.
  • 20. 20 @ Ashek Mahmud Khan; Dept. of CSE (JUST); 01725-402592 Fig: Cellular design of mobile phone networks The architecture of the mobile phone network is very different than that of the Internet. It has several parts, as shown in the simplified version of the UMTS architecture in Fig. Fig: Architecture of the UMTS 3G mobile phone network. First, there is the air interface. This term is a fancy name for the radio communication protocol that is used over the air between the mobile device (e.g., the cell phone) and the cellular base station. Advances in the air interface over the past decades have greatly increased wireless data rates. The UMTS air interface is based on Code Division Multiple Access (CDMA). The cellular base station together with its controller forms the radio access network. This part is the wireless side of the mobile phone network. The controller node or RNC (Radio Network Controller)
  • 21. 21 @ Ashek Mahmud Khan; Dept. of CSE (JUST); 01725-402592 controls how the spectrum is used. The base station implements the air interface. It is called Node B, a temporary label that stuck. Another difference between mobile phone networks and the traditional Inter-net is mobility. When a user moves out of the range of one cellular base station and into the range of another one, the flow of data must be re-routed from the old to the new cell base station. This technique is known as hand over or hand off, and it is illustrated in Fig. Fig: Mobile phone handover (a) before (b) after. Wireless LANs: 802.11: Fig: (a) Wireless network with an access point. (b) Ad hoc network.
  • 22. 22 @ Ashek Mahmud Khan; Dept. of CSE (JUST); 01725-402592 Fig: Multipath fading RFID and Sensor Networks: The networks we have studied so far are made up of computing devices that are easy to recognize, from computers to mobile phones. With Radio Frequency Identification (RFID), everyday objects can also be part of a computer network. Fig: RFID used to network everyday objects. Popular kind of RFID is HF RFID (High Frequency RFID). It operates at 13.56 MHz and is likely to be in your passport, credit cards, books, and noncontact payment systems. Fig: Multihop topology of a sensor network.
  • 23. 23 @ Ashek Mahmud Khan; Dept. of CSE (JUST); 01725-402592 Who’s who in the International Standards World? International standards are produced and published by ISO (International Standards Organization), a voluntary no treaty organization founded in 1946. Its members are the national standards organizations of the 157 member countries. These members include ANSI (U.S.), BSI (Great Britain), AFNOR (France), DIN (Germany), and 153 others. CD (Committee Draft), DIS (Draft International Standard), IS (International Standard), NIST (National Institute of Standards and Technology), IEEE (Institute of Electrical and Electronics Engineers). Metric Units: The principal metric prefixes Network Layer Issues (Che-05) Network Layer Design Issues: • Store-and-Forward Packet Switching • Services Provided to the Transport Layer • Implementation of Connectionless Service • Implementation of Connection-Oriented Service • Comparison of Virtual-Circuit and Datagram Subnets
  • 24. 24 @ Ashek Mahmud Khan; Dept. of CSE (JUST); 01725-402592 Store-and-Forward Packet Switching: Fig: The environment of the network layer protocols. (Details text book) Implementation of Connectionless Service: Fig: Routing within a datagram network. Having looked at the two classes of service the network layer can provide to its users, it is time to see how this layer works inside. Two different organizations are possible, depending on the type of service offered. If connectionless service is offered, packets are injected into the network
  • 25. 25 @ Ashek Mahmud Khan; Dept. of CSE (JUST); 01725-402592 individually and routed independently of each other. In this context, the packets are frequently called datagram’s (in analogy with telegrams) and the network is called a datagram network.