SlideShare a Scribd company logo
1 of 40
UNIT 1
Evolution of computer networking
Evolution of computer networking
Need of a Network:
• A network is a set of devices (often referred to as nodes) connected
by communication links. A node can be a computer, printer, or any
other device capable of sending and/or receiving data generated by
other nodes on the network.
• The system was simply not advanced in one day; rather took a long
time to be an all the more incredible, productive and dependable
system.
• Advancement of systems administration began path back in 1969’s by
the improvement of first system called ARPANET, which prompted
the improvement of web.
Evolution of computer networking
Distributed Processing :
• Most networks use distributed processing, in which a task is divided
among multiple computers. Instead of one single large machine being
responsible for all aspects of a process, separate computers (usually a
personal computer or workstation) handle a subset.
Network Criteria
• A network must be able to meet a certain number of criteria. The
most important of these are performance, reliability, and security.
• Performance:
• Performance can be measured in many ways, including transit time
and response time.
• Transit time is the amount of time required for a message to travel
from one device to another. Response time is the elapsed time
between an inquiry and a response.
Network Criteria
• The performance of a network depends on a number of factors,
including the number of users, the type of transmission medium, the
capabilities of the connected hardware, and the efficiency of the
software.
• Performance is often evaluated by two networking metrics:
throughput and delay. We often need more throughput and less
delay. However, these two criteria are often contradictory.
• If we try to send more data to the network, we may increase
throughput but we increase the delay because of traffic congestion in
the network.
Network Criteria
• Reliability: In addition to accuracy of delivery, network reliability is
measured by the frequency of failure, the time it takes a link to
recover from a failure, and the network's robustness in a catastrophe.
• Security: Network security issues include protecting data from
unauthorized access, protecting data from damage and development,
and implementing policies and procedures for recovery from
breaches and data losses.
Evolution of computer networking
• ARPANET(Advanced Research Agency Network):
ARPANET was the network that became the basis for the Internet.
• It was the first network that came into existence in 1969, which was
designed and named by the Advanced Research Projects Agency
(ARPA) and US Department of Defence (DoD).
• It was where a bunch of PCs were associated at various colleges and
US DoD for sharing of information and messages and associating with
individuals to share their perspectives.
Evolution of computer networking
• NSFNET (National Science Federation Network):
• In mid 80’s another federal agency, NSFNET (National Science
Federation Network) created a new network which was more capable
than ARPANET and became the first backbone infrastructure for the
commercial public Internet.
• Its main aim was to use network only for academic research and not
for any kind of private business activity. Later, many privately owned
businesses with their very own private systems joined with ARPANET
and NSFNET to make more capable and wide network, the Internet.
Evolution of computer networking
• ARPANET + NSFNET + PRIVATE NETWORKS = INTERNET
Scale of network technology- Transmission
technology
• Casting in computer networks means transmitting data (stream of
packets) over a network.
• Following are the different types of casting used in networking −
• Unicast transmission
• Broadcast transmission
• Multicast transmission
Transmission technology
Transmission technology
Unicast Transmission (One-to-One)
• In Unicast transmission, the data is transferred from a single sender (or a
single source host) to a single receiver (or a single destination host).
• Application:Television networks.
Example
• In the following figure, Host A sends the IP address 11.1.2.2 data to the
Host B IP address 20.12.4.3.
• Source Address = IP address of host A is 11.1.2.2
• Destination Address = IP address of host B is 20.12.4.3
Transmission technology
Transmission technology
Broadcast Transmission (One-to-All)
• In Broadcast transmission, the data is transmitted from one or more
senders to all the receivers within the same network or in other
networks.
• This type of transmission is useful in network management packets
such as ARP (Address Resolution Protocol) and RIP (Routing
Information Protocol) where all the devices must see the data.
• There are two types of broadcast transmission −
• Directed Broadcast
• Limited Broadcast
Directed Broadcast:
• Directed Broadcast transmits data from one source host to all the
other hosts that exist in some other network.
• It is used in two scenarios −
• When the hosts are responsible for parsing data from broadcast
packets.
• When all the hosts require the same data.
Transmission technology
Transmission technology
• Limited Broadcast: In Limited Broadcast, the data is transmitted from
a single source host to all the other hosts residing in the same
network.
Transmission technology
• Multicast Transmission (One-to-Many):When the data is transmitted
from a single source host to a specific group of hosts having the
interest to receive the data, it is known as multicast transmission.
• Multicast can be more efficient than unicast when different groups of
receivers need to see the same data.
• Example − Multicast is the technique used in Internet streaming of
video or audio teleconference, sending an email to a particular group
of people, etc.
Types of Networks
• A computer network is a group of computers linked to each other
that enables the computer to communicate with another computer
and share their resources, data, and applications.
• A computer network can be categorized by their size.
LAN(Local Area Network)
• Local Area Network is a group of computers connected to each other
in a small area such as building, office.
• LAN is used for connecting two or more personal computers through
a communication medium such as twisted pair, coaxial cable, etc.
• It is less costly as it is built with inexpensive hardware such as hubs,
network adapters, and ethernet cables.
• The data is transferred at an extremely faster rate in Local Area
Network.
• Local Area Network provides higher security.
LAN(Local Area Network)
PAN(Personal Area Network)
• Personal Area Network is a network arranged within an
individual person, typically within a range of 10 meters.
• Personal Area Network is used for connecting the computer
devices of personal use is known as Personal Area Network.
• Thomas Zimmerman was the first research scientist to bring
the idea of the Personal Area Network.
• Personal Area Network covers an area of 30 feet.
• Personal computer devices that are used to develop the
personal area network are the laptop, mobile phones, media
player and play stations.
PAN(Personal Area Network)
MAN(Metropolitan Area Network)
• A metropolitan area network is a network that covers a larger
geographic area by interconnecting a different LAN to form a
larger network.
• Government agencies use MAN to connect to the citizens and
private industries.
• In MAN, various LANs are connected to each other through a
telephone exchange line.
• The most widely used protocols in MAN are RS-232, Frame
Relay, ATM, ISDN, OC-3, ADSL, etc.
• It has a higher range than Local Area Network(LAN).
Uses Of Metropolitan Area Network
• MAN is used in communication between the banks in a city.
• It can be used in an Airline Reservation.
• It can be used in a college within a city.
• It can also be used for communication in the military.
WAN(Wide Area Network)
• A Wide Area Network is a network that extends over a large
geographical area such as states or countries.
• A Wide Area Network is quite bigger network than the LAN.
• A Wide Area Network is not limited to a single location, but it
spans over a large geographical area through a telephone line,
fibre optic cable or satellite links.
• The internet is one of the biggest WAN in the world.
• A Wide Area Network is widely used in the field of Business,
government, and education.
WAN(Wide Area Network)
Advantages Of Wide Area Network:
• Geographical area: A Wide Area Network provides a large geographical
area. Suppose if the branch of our office is in a different city then we can
connect with them through WAN. The internet provides a leased line
through which we can connect with another branch.
• Centralized data: In case of WAN network, data is centralized. Therefore,
we do not need to buy the emails, files or back up servers.
• Get updated files: Software companies work on the live server.
Therefore, the programmers get the updated files within seconds.
• Exchange messages: In a WAN network, messages are transmitted fast.
The web application like Facebook, Whatsapp, Skype allows you to
communicate with friends.
• Sharing of software and resources: In WAN network, we can share the
software and other resources like a hard drive, RAM.
• Global business: We can do the business over the internet globally.
Disadvantages of Wide Area Network:
• The following are the disadvantages of the Wide Area Network:
• Security issue: A WAN network has more security issues as
compared to LAN and MAN network as all the technologies are
combined together that creates the security problem.
• Needs Firewall & antivirus software: The data is transferred on
the internet which can be changed or hacked by the hackers, so the
firewall needs to be used. Some people can inject the virus in our
system so antivirus is needed to protect from such a virus.
• High Setup cost: An installation cost of the WAN network is high as
it involves the purchasing of routers, switches.
• Troubleshooting problems: It covers a large area so fixing the
problem is difficult.
Diff b/w LAN,WAN,MAN
Network Devices
• Network devices, also known as networking hardware, are physical
devices that allow hardware on a computer network to communicate
and interact with one another.
• Repeater, Hub, Bridge, Switch, Routers, Gateway, router, and NIC, etc.
Repeater
• A repeater strengthens a signal and resends it to its destination.
Repeaters are used to combat attenuation, bypass interference and
extend the range of a signal.
• They are commonly used within wireless networks but also work with
fiber optics, telephones and TV broadcasting, among others.
Network Devices -HUB
HUB
• A hub is a physical device used to join multiple devices on the same
LAN.
• For example, a laptop, desktop computer and printer can connect into
a hub's ports with Ethernet cables and be part of the same local
network.
• Unlike a bridge, router or switch, a hub broadcasts messages it
receives from one port to all remaining ports without examining the
frames or isolating the message for the intended destination.
Network Devices -HUB
• Hubs cannot filter data, so data packets are sent to all connected
devices.
• Hubs do not have the intelligence to find out the best path for data
packets which leads to inefficiencies and wastage.
• A hub can be used with both digital and analog data
Network Devices -HUB
Network Devices -SWITCH
SWITCH
• Switches generally have a more intelligent role than hubs.
• A switch is a multiport device.
• Switches improves network efficiency over hubs or routers because of the
virtual circuit capability.
• Switches also improve network security.
• A switch can work at either the Data Link layer or the Network layer of the
OSI model.
• Its high-performance device.
• It reduces traffic from bringing the switch to a halt.
How do switches work?
• Switches connect devices on a local area network (LAN). Such
devices are attached to the switch by cables that plug into a
port on the switch. When a device sends data through the
network, the switch receives the data packet and examines the
packet's destination Media Access Control (MAC) address.
• Think of the MAC address as a unique label for each device on
the network. The switch then determines which port the
destination device is connected to and forwards the packet to
that port.
• If the destination device is not on the same LAN, the switch
forwards the packet to the appropriate router to send it to the
intended destination.
How do switches work?
• Each switch maintains a database, called a MAC address table,
that maps MAC addresses to specific switch ports. When a
device on the network communicates with another device for
the first time, the switch adds the MAC address and
corresponding port number to its MAC address table. From that
point on, the switch knows which port to forward packets to for
that MAC address.

More Related Content

Similar to Computer Networks: Evolution of Computer Networks.pptx

Networking presentationNetworking presentation.pptNetworking presentation.ppt...
Networking presentationNetworking presentation.pptNetworking presentation.ppt...Networking presentationNetworking presentation.pptNetworking presentation.ppt...
Networking presentationNetworking presentation.pptNetworking presentation.ppt...nesarahmad37
 
Unit1_COMPUTER_COMMUNICATIONSSlides.pptx
Unit1_COMPUTER_COMMUNICATIONSSlides.pptxUnit1_COMPUTER_COMMUNICATIONSSlides.pptx
Unit1_COMPUTER_COMMUNICATIONSSlides.pptxNANDIKHATHARANIKUMAR1
 
data communication and networking
data communication and networkingdata communication and networking
data communication and networkingprashanna13
 
unit 1PPT.pptx
unit 1PPT.pptxunit 1PPT.pptx
unit 1PPT.pptxLokeshc28
 
Unit - 1.pptx
Unit - 1.pptxUnit - 1.pptx
Unit - 1.pptxKavinD11
 
data communication and Network.ppt
data communication and Network.pptdata communication and Network.ppt
data communication and Network.pptGetachewDires1
 
Computer Networks.pptx
Computer Networks.pptxComputer Networks.pptx
Computer Networks.pptxrocky781582
 
Networking Fundamentals
Networking  FundamentalsNetworking  Fundamentals
Networking FundamentalsManjit Chavda
 
info technology.pptx
info technology.pptxinfo technology.pptx
info technology.pptxssuser07362a
 
ICT 101 LECTURE 2 - BASICS OF COMPUTER NETWORKS.pptx
ICT 101 LECTURE 2 - BASICS OF COMPUTER NETWORKS.pptxICT 101 LECTURE 2 - BASICS OF COMPUTER NETWORKS.pptx
ICT 101 LECTURE 2 - BASICS OF COMPUTER NETWORKS.pptxmbombongafu
 
UNIT 4 computer networking powerpoint presentation .pdf
UNIT 4 computer networking powerpoint presentation .pdfUNIT 4 computer networking powerpoint presentation .pdf
UNIT 4 computer networking powerpoint presentation .pdfshubhangisonawane6
 
interconnected_network_of_internets.pptx
interconnected_network_of_internets.pptxinterconnected_network_of_internets.pptx
interconnected_network_of_internets.pptxGaganaP13
 

Similar to Computer Networks: Evolution of Computer Networks.pptx (20)

Networking presentationNetworking presentation.pptNetworking presentation.ppt...
Networking presentationNetworking presentation.pptNetworking presentation.ppt...Networking presentationNetworking presentation.pptNetworking presentation.ppt...
Networking presentationNetworking presentation.pptNetworking presentation.ppt...
 
Communications
CommunicationsCommunications
Communications
 
ch01.ppt
ch01.pptch01.ppt
ch01.ppt
 
Networking.pptx
Networking.pptxNetworking.pptx
Networking.pptx
 
Unit1_COMPUTER_COMMUNICATIONSSlides.pptx
Unit1_COMPUTER_COMMUNICATIONSSlides.pptxUnit1_COMPUTER_COMMUNICATIONSSlides.pptx
Unit1_COMPUTER_COMMUNICATIONSSlides.pptx
 
data communication and networking
data communication and networkingdata communication and networking
data communication and networking
 
computer network 2
computer network 2computer network 2
computer network 2
 
unit 1PPT.pptx
unit 1PPT.pptxunit 1PPT.pptx
unit 1PPT.pptx
 
network.pdf
network.pdfnetwork.pdf
network.pdf
 
Unit - 1.pptx
Unit - 1.pptxUnit - 1.pptx
Unit - 1.pptx
 
data communication and Network.ppt
data communication and Network.pptdata communication and Network.ppt
data communication and Network.ppt
 
Computer Networks.pptx
Computer Networks.pptxComputer Networks.pptx
Computer Networks.pptx
 
Computer Communications
Computer CommunicationsComputer Communications
Computer Communications
 
Networking Fundamentals
Networking  FundamentalsNetworking  Fundamentals
Networking Fundamentals
 
info technology.pptx
info technology.pptxinfo technology.pptx
info technology.pptx
 
ICT 101 LECTURE 2 - BASICS OF COMPUTER NETWORKS.pptx
ICT 101 LECTURE 2 - BASICS OF COMPUTER NETWORKS.pptxICT 101 LECTURE 2 - BASICS OF COMPUTER NETWORKS.pptx
ICT 101 LECTURE 2 - BASICS OF COMPUTER NETWORKS.pptx
 
lecture-1.1.pptx
lecture-1.1.pptxlecture-1.1.pptx
lecture-1.1.pptx
 
UNIT 4 computer networking powerpoint presentation .pdf
UNIT 4 computer networking powerpoint presentation .pdfUNIT 4 computer networking powerpoint presentation .pdf
UNIT 4 computer networking powerpoint presentation .pdf
 
interconnected_network_of_internets.pptx
interconnected_network_of_internets.pptxinterconnected_network_of_internets.pptx
interconnected_network_of_internets.pptx
 
Networking
Networking Networking
Networking
 

Recently uploaded

Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 

Recently uploaded (20)

Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 

Computer Networks: Evolution of Computer Networks.pptx

  • 1. UNIT 1 Evolution of computer networking
  • 2. Evolution of computer networking Need of a Network: • A network is a set of devices (often referred to as nodes) connected by communication links. A node can be a computer, printer, or any other device capable of sending and/or receiving data generated by other nodes on the network. • The system was simply not advanced in one day; rather took a long time to be an all the more incredible, productive and dependable system. • Advancement of systems administration began path back in 1969’s by the improvement of first system called ARPANET, which prompted the improvement of web.
  • 3. Evolution of computer networking Distributed Processing : • Most networks use distributed processing, in which a task is divided among multiple computers. Instead of one single large machine being responsible for all aspects of a process, separate computers (usually a personal computer or workstation) handle a subset.
  • 4. Network Criteria • A network must be able to meet a certain number of criteria. The most important of these are performance, reliability, and security. • Performance: • Performance can be measured in many ways, including transit time and response time. • Transit time is the amount of time required for a message to travel from one device to another. Response time is the elapsed time between an inquiry and a response.
  • 5. Network Criteria • The performance of a network depends on a number of factors, including the number of users, the type of transmission medium, the capabilities of the connected hardware, and the efficiency of the software. • Performance is often evaluated by two networking metrics: throughput and delay. We often need more throughput and less delay. However, these two criteria are often contradictory. • If we try to send more data to the network, we may increase throughput but we increase the delay because of traffic congestion in the network.
  • 6. Network Criteria • Reliability: In addition to accuracy of delivery, network reliability is measured by the frequency of failure, the time it takes a link to recover from a failure, and the network's robustness in a catastrophe. • Security: Network security issues include protecting data from unauthorized access, protecting data from damage and development, and implementing policies and procedures for recovery from breaches and data losses.
  • 7. Evolution of computer networking • ARPANET(Advanced Research Agency Network): ARPANET was the network that became the basis for the Internet. • It was the first network that came into existence in 1969, which was designed and named by the Advanced Research Projects Agency (ARPA) and US Department of Defence (DoD). • It was where a bunch of PCs were associated at various colleges and US DoD for sharing of information and messages and associating with individuals to share their perspectives.
  • 8. Evolution of computer networking • NSFNET (National Science Federation Network): • In mid 80’s another federal agency, NSFNET (National Science Federation Network) created a new network which was more capable than ARPANET and became the first backbone infrastructure for the commercial public Internet. • Its main aim was to use network only for academic research and not for any kind of private business activity. Later, many privately owned businesses with their very own private systems joined with ARPANET and NSFNET to make more capable and wide network, the Internet.
  • 9. Evolution of computer networking • ARPANET + NSFNET + PRIVATE NETWORKS = INTERNET
  • 10. Scale of network technology- Transmission technology • Casting in computer networks means transmitting data (stream of packets) over a network. • Following are the different types of casting used in networking − • Unicast transmission • Broadcast transmission • Multicast transmission
  • 12. Transmission technology Unicast Transmission (One-to-One) • In Unicast transmission, the data is transferred from a single sender (or a single source host) to a single receiver (or a single destination host). • Application:Television networks. Example • In the following figure, Host A sends the IP address 11.1.2.2 data to the Host B IP address 20.12.4.3. • Source Address = IP address of host A is 11.1.2.2 • Destination Address = IP address of host B is 20.12.4.3
  • 14. Transmission technology Broadcast Transmission (One-to-All) • In Broadcast transmission, the data is transmitted from one or more senders to all the receivers within the same network or in other networks. • This type of transmission is useful in network management packets such as ARP (Address Resolution Protocol) and RIP (Routing Information Protocol) where all the devices must see the data. • There are two types of broadcast transmission − • Directed Broadcast • Limited Broadcast
  • 15. Directed Broadcast: • Directed Broadcast transmits data from one source host to all the other hosts that exist in some other network. • It is used in two scenarios − • When the hosts are responsible for parsing data from broadcast packets. • When all the hosts require the same data.
  • 17. Transmission technology • Limited Broadcast: In Limited Broadcast, the data is transmitted from a single source host to all the other hosts residing in the same network.
  • 18. Transmission technology • Multicast Transmission (One-to-Many):When the data is transmitted from a single source host to a specific group of hosts having the interest to receive the data, it is known as multicast transmission. • Multicast can be more efficient than unicast when different groups of receivers need to see the same data. • Example − Multicast is the technique used in Internet streaming of video or audio teleconference, sending an email to a particular group of people, etc.
  • 19. Types of Networks • A computer network is a group of computers linked to each other that enables the computer to communicate with another computer and share their resources, data, and applications. • A computer network can be categorized by their size.
  • 20. LAN(Local Area Network) • Local Area Network is a group of computers connected to each other in a small area such as building, office. • LAN is used for connecting two or more personal computers through a communication medium such as twisted pair, coaxial cable, etc. • It is less costly as it is built with inexpensive hardware such as hubs, network adapters, and ethernet cables. • The data is transferred at an extremely faster rate in Local Area Network. • Local Area Network provides higher security.
  • 22. PAN(Personal Area Network) • Personal Area Network is a network arranged within an individual person, typically within a range of 10 meters. • Personal Area Network is used for connecting the computer devices of personal use is known as Personal Area Network. • Thomas Zimmerman was the first research scientist to bring the idea of the Personal Area Network. • Personal Area Network covers an area of 30 feet. • Personal computer devices that are used to develop the personal area network are the laptop, mobile phones, media player and play stations.
  • 24. MAN(Metropolitan Area Network) • A metropolitan area network is a network that covers a larger geographic area by interconnecting a different LAN to form a larger network. • Government agencies use MAN to connect to the citizens and private industries. • In MAN, various LANs are connected to each other through a telephone exchange line. • The most widely used protocols in MAN are RS-232, Frame Relay, ATM, ISDN, OC-3, ADSL, etc. • It has a higher range than Local Area Network(LAN).
  • 25.
  • 26. Uses Of Metropolitan Area Network • MAN is used in communication between the banks in a city. • It can be used in an Airline Reservation. • It can be used in a college within a city. • It can also be used for communication in the military.
  • 27. WAN(Wide Area Network) • A Wide Area Network is a network that extends over a large geographical area such as states or countries. • A Wide Area Network is quite bigger network than the LAN. • A Wide Area Network is not limited to a single location, but it spans over a large geographical area through a telephone line, fibre optic cable or satellite links. • The internet is one of the biggest WAN in the world. • A Wide Area Network is widely used in the field of Business, government, and education.
  • 29. Advantages Of Wide Area Network: • Geographical area: A Wide Area Network provides a large geographical area. Suppose if the branch of our office is in a different city then we can connect with them through WAN. The internet provides a leased line through which we can connect with another branch. • Centralized data: In case of WAN network, data is centralized. Therefore, we do not need to buy the emails, files or back up servers. • Get updated files: Software companies work on the live server. Therefore, the programmers get the updated files within seconds. • Exchange messages: In a WAN network, messages are transmitted fast. The web application like Facebook, Whatsapp, Skype allows you to communicate with friends. • Sharing of software and resources: In WAN network, we can share the software and other resources like a hard drive, RAM. • Global business: We can do the business over the internet globally.
  • 30. Disadvantages of Wide Area Network: • The following are the disadvantages of the Wide Area Network: • Security issue: A WAN network has more security issues as compared to LAN and MAN network as all the technologies are combined together that creates the security problem. • Needs Firewall & antivirus software: The data is transferred on the internet which can be changed or hacked by the hackers, so the firewall needs to be used. Some people can inject the virus in our system so antivirus is needed to protect from such a virus. • High Setup cost: An installation cost of the WAN network is high as it involves the purchasing of routers, switches. • Troubleshooting problems: It covers a large area so fixing the problem is difficult.
  • 32. Network Devices • Network devices, also known as networking hardware, are physical devices that allow hardware on a computer network to communicate and interact with one another. • Repeater, Hub, Bridge, Switch, Routers, Gateway, router, and NIC, etc.
  • 33. Repeater • A repeater strengthens a signal and resends it to its destination. Repeaters are used to combat attenuation, bypass interference and extend the range of a signal. • They are commonly used within wireless networks but also work with fiber optics, telephones and TV broadcasting, among others.
  • 34. Network Devices -HUB HUB • A hub is a physical device used to join multiple devices on the same LAN. • For example, a laptop, desktop computer and printer can connect into a hub's ports with Ethernet cables and be part of the same local network. • Unlike a bridge, router or switch, a hub broadcasts messages it receives from one port to all remaining ports without examining the frames or isolating the message for the intended destination.
  • 35. Network Devices -HUB • Hubs cannot filter data, so data packets are sent to all connected devices. • Hubs do not have the intelligence to find out the best path for data packets which leads to inefficiencies and wastage. • A hub can be used with both digital and analog data
  • 37. Network Devices -SWITCH SWITCH • Switches generally have a more intelligent role than hubs. • A switch is a multiport device. • Switches improves network efficiency over hubs or routers because of the virtual circuit capability. • Switches also improve network security. • A switch can work at either the Data Link layer or the Network layer of the OSI model. • Its high-performance device. • It reduces traffic from bringing the switch to a halt.
  • 38.
  • 39. How do switches work? • Switches connect devices on a local area network (LAN). Such devices are attached to the switch by cables that plug into a port on the switch. When a device sends data through the network, the switch receives the data packet and examines the packet's destination Media Access Control (MAC) address. • Think of the MAC address as a unique label for each device on the network. The switch then determines which port the destination device is connected to and forwards the packet to that port. • If the destination device is not on the same LAN, the switch forwards the packet to the appropriate router to send it to the intended destination.
  • 40. How do switches work? • Each switch maintains a database, called a MAC address table, that maps MAC addresses to specific switch ports. When a device on the network communicates with another device for the first time, the switch adds the MAC address and corresponding port number to its MAC address table. From that point on, the switch knows which port to forward packets to for that MAC address.