This document provides an overview of computer networking concepts including:
1. Networks are complex systems consisting of hosts, routers, links, applications, protocols, and hardware/software.
2. Early telephone networks used point-to-point links to directly connect users, while modern data networks allow indirect connections through interconnected nodes using packet switching.
3. The Internet protocol stack includes layers for applications, transport, network, link, and physical, with TCP/IP being the dominant protocols.
This presentation briefly describes the different types of computer networks along with their advantages and disadvantages and comparison between them.
This presentation briefly describes the different types of computer networks along with their advantages and disadvantages and comparison between them.
What is a network?
Need for networking
Components of Network
Types of Network
Evolution of Networking
Communication media
Data Communication Terminologies
Switching Techniques
Digital and Analog Transmission
Network Topology
Network Devices
Communication Protocols
Wireless/Mobile Computing
One way to categorize the different types of computer network designs is by their scope or scale. For historical reasons, the networking industry refers to nearly every type of design as some kind of area network. Common types of area networks are:
LAN - Local Area Network
WAN - Wide Area Network
WLAN - Wireless Local Area Network
MAN - Metropolitan Area Network
SAN - Storage Area Network, System Area Network, Server Area Network, or sometimes Small Area Network
CAN - Campus Area Network, Controller Area Network, or sometimes Cluster Area Network
PAN - Personal Area Network
LAN and WAN are the two primary and best-known categories of area networks, while the others have emerged with technology advances
Virtualization refers to the creation of a virtual resource such as a server, desktop, operating system, file, storage or network.
The main goal of virtualization is to manage workloads by radically transforming traditional computing to make it more scalable.
The server administrator uses a software application to divide one physical server into multiple isolated virtual environments.
WLAN is a wireless computer network that links two or more devices (using-spectrum or OFDM radio) within a limited area such as a home, school, computer laboratory, or office building.
WLAN is a marketed under the Wi-Fi brand name.
Wireless LANs have become popular in the home due to ease of installation and use.
What is a network?
Need for networking
Components of Network
Types of Network
Evolution of Networking
Communication media
Data Communication Terminologies
Switching Techniques
Digital and Analog Transmission
Network Topology
Network Devices
Communication Protocols
Wireless/Mobile Computing
One way to categorize the different types of computer network designs is by their scope or scale. For historical reasons, the networking industry refers to nearly every type of design as some kind of area network. Common types of area networks are:
LAN - Local Area Network
WAN - Wide Area Network
WLAN - Wireless Local Area Network
MAN - Metropolitan Area Network
SAN - Storage Area Network, System Area Network, Server Area Network, or sometimes Small Area Network
CAN - Campus Area Network, Controller Area Network, or sometimes Cluster Area Network
PAN - Personal Area Network
LAN and WAN are the two primary and best-known categories of area networks, while the others have emerged with technology advances
Virtualization refers to the creation of a virtual resource such as a server, desktop, operating system, file, storage or network.
The main goal of virtualization is to manage workloads by radically transforming traditional computing to make it more scalable.
The server administrator uses a software application to divide one physical server into multiple isolated virtual environments.
WLAN is a wireless computer network that links two or more devices (using-spectrum or OFDM radio) within a limited area such as a home, school, computer laboratory, or office building.
WLAN is a marketed under the Wi-Fi brand name.
Wireless LANs have become popular in the home due to ease of installation and use.
A computer network is defined as the interconnection of two or more computers. It is done to enable the computers to communicate and share available resources.
Components of computer network
Network benefits
Disadvantages of computer network
Classification by their geographical area
Network classification by their component role
Types of servers
A
PROJECT REPORT
On
CISCO CERTIFIED NETWORK ASSOCIATE
A computer network, or simply a network, is a collection of computer and other hardware components interconnected by communication channels that allow sharing of resources and information. Where at least one process in one device is able to send/receive data to/from at least one process residing in a remote device, then the two devices are said to be in a network. Simply, more than one computer interconnected through a communication medium for information interchange is called a computer network.
OSI layers describes how the data can be send from one parties to another during data communication. it also gives the detailed information of how the data functionally divided into small pieces and reaches the destination.
6th International Conference on Machine Learning & Applications (CMLA 2024)ClaraZara1
6th International Conference on Machine Learning & Applications (CMLA 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of on Machine Learning & Applications.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...ssuser7dcef0
Power plants release a large amount of water vapor into the
atmosphere through the stack. The flue gas can be a potential
source for obtaining much needed cooling water for a power
plant. If a power plant could recover and reuse a portion of this
moisture, it could reduce its total cooling water intake
requirement. One of the most practical way to recover water
from flue gas is to use a condensing heat exchanger. The power
plant could also recover latent heat due to condensation as well
as sensible heat due to lowering the flue gas exit temperature.
Additionally, harmful acids released from the stack can be
reduced in a condensing heat exchanger by acid condensation. reduced in a condensing heat exchanger by acid condensation.
Condensation of vapors in flue gas is a complicated
phenomenon since heat and mass transfer of water vapor and
various acids simultaneously occur in the presence of noncondensable
gases such as nitrogen and oxygen. Design of a
condenser depends on the knowledge and understanding of the
heat and mass transfer processes. A computer program for
numerical simulations of water (H2O) and sulfuric acid (H2SO4)
condensation in a flue gas condensing heat exchanger was
developed using MATLAB. Governing equations based on
mass and energy balances for the system were derived to
predict variables such as flue gas exit temperature, cooling
water outlet temperature, mole fraction and condensation rates
of water and sulfuric acid vapors. The equations were solved
using an iterative solution technique with calculations of heat
and mass transfer coefficients and physical properties.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
2. 2
!Today’s Networks are complex
hosts
routers
links of various media
applications
protocols
hardware, software
Tomorrow’s will be even more!
3. 3
Early communications
systems
I.e. telephone
point-to-point links
directly connect together the users wishing to
communicate
use dedicated communication circuit
if distance between users increases beyond the
length of the cable, the connection is formed by a
number of sections connected end-to-end in series.
4. 4
Data Networks
set of interconnected nodes exchange information
sharing of the transmission circuits= switching.
many links allow more than one path between every
2 nodes.
network must select an appropriate path for each
required connection.
5. 5
Networking Issues - Telephone
Addressing - identify the end user
phone number 359 52 359524 = country code + city code +
exchange + number
Routing - How to get from source to destination.
Telephone circuit switching: Based on the phone number.
Information Units - How is information sent
6. 6
Networking Issues - Internet
Addressing - identify the end user
IP addresses 132.66.48.37, Refer to a host interface =
network number + host number
Routing- How to get from source to destination
Packet switching: move packets (chunks) of data among
routers from source to destination independently.
Information Units - How is information sent.
Self-descriptive data: packet = data + metadata (header).
7. 7
Telephone networks support a single, end-to-end
quality of service but is expensive to boot
Internet supports no quality of service but is
flexible and cheap
Future networks will have to support a wide
range of service qualities at a reasonable cost
8. 8
History
1961-1972: Early packet-switching principles
1961: Kleinrock - queuing theory shows effectiveness of
packet-switching
1964: Baran - packet-switching in military networks
1967: ARPAnet – conceived by Advanced Research
Projects Agency
1969: first ARPAnet node operational
1972: ARPAnet demonstrated publicly
NCP (Network Control Protocol) first host-host
protocol
first e-mail program
ARPAnet has 15 nodes
9. 9
History
1972-1980: Internetworking, new and
proprietary nets
1970: ALOHAnet satellite network in Hawaii
1973: Metcalfe’s PhD thesis proposes Ethernet
1974: Cerf and Kahn - architecture for interconnecting
networks
late70’s: proprietary architectures: DECnet, SNA, XNA
late 70’s: switching fixed length packets (ATM precursor)
1979: ARPAnet has 200 nodes
10. 10
Cerf and Kahn’s : internetworking principles
minimalism, autonomy - no internal
changes required to interconnect networks
best effort service model
stateless routers
decentralized control
Defines today’s Internet architecture
11. 11
History
1980-1990: new protocols,
proliferation of networks
1983: deployment of TCP/IP
1982: SMTP e-mail protocol defined
1983: DNS defined for name-to-IP-address translation
1985: FTP protocol defined
1988: TCP congestion control
new national networks: CSnet, BITnet, NSFnet, Minitel
100,000 hosts connected to confederation of networks
12. 12
History
1990 - : commercialization and WWW
early 1990’s: ARPAnet decomissioned
1991: NSF lifts restrictions on commercial use of
NSFnet (decommissioned, 1995)
early 1990s: WWW
hypertext [Bush 1945, Nelson 1960’s]
HTML, http: Berners-Lee
1994: Mosaic, later Netscape
late 1990’s: commercialization of WWW
2004-2005: Web 2.0 (O’Reilly)
13. 13
Demand and Supply
Huge growth in users
The introduction of the web
Faster home access
Better user experience.
Infrastructure
Significant portion of telecommunication.
New evolving industries
Although, sometimes temporary setbacks
15. Users around ( the Globe (2002/8
17
Africa
Europe
Latin
AmericaAustralia
Middle
East
USA
Canada
Asia
Pacific
350
300
250
200
150
100
50
0
Africa
Asia/Pacific
Europe
Middle East
USA+Canada
Latin America
Australia
2005
2002
16. 18
Protocol Layers
A way for organizing structure of network
… Or at least our discussion of networks
The idea: a series of steps
17. 19
Advantages of Layering
explicit structure allows identification
relationship of complex system’s pieces
layered reference model for discussion
modularization eases maintenance
updating of system
change of implementation of layer’s
service transparent to rest of system
18. 20
Protocols
A protocol is a set of rules and formats
that govern the communication between
communicating peers
set of valid messages
meaning of each message
Necessary for any function that requires
cooperation between peers
19. 21
Protocols
A protocol provides a service
For example: the post office protocol for reliable
parcel transfer service
Peer entities use a protocol to provide a
service to a higher-level peer entity
for example, truck drivers use a protocol to
present post offices with the abstraction of an
unreliable parcel transfer service
20. 22
Protocol Layers
A network that provides many services needs
many protocols
Some services are independent, But others
depend on each other
A Protocol may use another protocol as a step in
its execution
for example, ground transfer is one step in the
execution of the example reliable parcel transfer
protocol
This form of dependency is called layering
Post office handling is layered above parcel ground
transfer protocol.
21. 23
Open protocols and systems
A set of protocols is open if
protocol details are publicly available
changes are managed by an organization whose
membership and transactions are open to the public
A system that implements open protocols is
called an open system
International Organization for Standards (ISO)
prescribes a standard to connect open systems
open system interconnect (OSI)
Has greatly influenced thinking on protocol
stacks
22. 24
ISO OSI reference model
Reference model
formally defines what is meant by a layer, a service
etc.
Service architecture
describes the services provided by each layer and
the service access point
Protocol architecture
set of protocols that implement the service
architecture
compliant service architectures may still use non-compliant
protocol architectures
23. 25
The seven Layers
Application
Presentation
Session
Transport
Network
Data Link
Physical
Application
Presentation
Session
Transport
Network
Data Link
Physical
Network
Data Link
Physical
End system Intermediate End system
system
24. 26
The seven Layers - protocol stack
Application
Presentation
Session
Transport
Network
Data Link
Physical
Application
Presentation
Session
Transport
Network
Data Link
Physical
data
data
data
data
DH+data+DT
bits
data
AH
PH
SH
TH
Network
Data Link
Physical
NH data
Session and presentation layers are not so important, and are often ignored
25. 27
Postal network
Application: people using the postal system
Session and presentation: chief clerk sends some
priority mail, and some by regular mail ; translator
translates letters going abroad.
mail clerk sends a message, retransmits if not acked
postal system computes a route and forwards the
letters
datalink layer: letters carried by planes, trains,
automobiles
physical layer: the letter itself
26. 28
Internet protocol stack
application: supporting network applications
ftp, smtp, http
transport: host-host data transfer
tcp, udp
network: routing of datagrams from source
to destination
ip, routing protocols
link: data transfer between neighboring
network elements
ppp, ethernet
physical: bits “on the wire”
application
transport
network
link
physical
27. 29
source destination
application
transport
network
Link
physical
application
transport
network
Link
physical
M
M
M
M
Ht
HnHt
Hl HnHt
M
M
M
M
Ht
HnHt
Hl HnHt
message
segment
datagram
frame
Protocol layering and data
28. 30
Physical layer
Moves bits between physically connected
end-systems
Standard prescribes
coding scheme to represent a bit
shapes and sizes of connectors
bit-level synchronization
Internet
technology to move bits on a wire, wireless link, satellite
channel etc.
29. 31
Datalink layer
(Reliable) communication over a single
link.
Introduces the notion of a frame
set of bits that belong together
Idle markers tell us that a link is not carrying a
frame
Begin and end markers delimit a frame
Internet
a variety of datalink layer protocols
most common is Ethernet
others are FDDI, SONET, HDLC
30. end-system must receive only bits meant for it
need datalink-layer address
also need to decide who gets to speak next
these functions are provided by Medium ACcess sublayer (MAC)
32
.(Datalink layer (contd
Ethernet (broadcast link)
Datalink layer protocols are the first layer of software
Very dependent on underlying physical link properties
Usually bundle both physical and datalink in hardware.
31. 33
Network layer
Carries data from source to destination.
Logically concatenates a set of links to form the
abstraction of an end-to-end link
Allows an end-system to communicate with any other
end-system by computing a route between them
Hides idiosyncrasies of datalink layer
Provides unique network-wide addresses
Found both in end-systems and in intermediate systems
32. 34
Network layer types
In datagram networks
provides both routing and data forwarding
In connection-oriented network
separate data plane and control plane
data plane only forwards and schedules data
(touches every byte)
control plane responsible for routing, call-establishment,
call-teardown (doesn’t touch data
bytes)
33. 35
.(Network layer (contd
Internet
network layer is provided by Internet Protocol (IP)
found in all end-systems and intermediate systems
provides abstraction of end-to-end link
segmentation and reassembly
packet-forwarding, routing, scheduling
unique IP addresses
can be layered over anything, but only best-effort
service
34. 36
.(Network layer (contd
At end-systems
primarily hides details of datalink layer
segments and reassemble
detects errors
At intermediate systems
participates in routing protocol to create routing
tables
responsible for forwarding packets
schedules the transmission order of packets
chooses which packets to drop
35. 37
Transport layer
Reliable end-to-end communication.
creates the abstraction of an error-controlled,
flow-controlled and multiplexed end-to-end link
(Network layer provides only a ‘raw’ end-to-end service)
Some transport layers provide fewer services
e.g. simple error detection, no flow control, and no retransmission
Internet
TCP provides error control, flow control, multiplexing
UDP provides only multiplexing
36. 38
.(Transport layer (contd
Error control
GOAL: message will reach destination despite packet loss,
corruption and duplication
ACTIONS: retransmit lost packets; detect, discard, and
retransmit corrupted packets; detect and discard duplicated
packets
Flow control
match transmission rate to rate currently sustainable on the path
to destination, and at the destination itself
Multiplexes multiple applications to the same
end-to-end connection
adds an application-specific identifier (port number) so that
receiving end-system can hand in incoming packet to the correct
application
37. 39
Session layer
Not common
Provides full-duplex service, expedited data
delivery, and session synchronization
Internet
doesn’t have a standard session layer
38. 40
.(Session layer (cont
Duplex
if transport layer is simplex, concatenates two transport
endpoints together
Expedited data delivery
allows some messages to skip ahead in end-system
queues, by using a separate low-delay transport layer
endpoint
Synchronization
allows users to place marks in data stream and to roll back
to a prespecified mark
39. 41
Presentation layer
Usually ad hoc
Touches the application data
(Unlike other layers which deal with headers)
Hides data representation differences between
applications
characters (ASCII, unicode, EBCDIC.)
Can also encrypt data
Internet
no standard presentation layer
only defines network byte order for 2- and 4-byte
integers
40. 42
Application layer
The set of applications that use the network
Doesn’t provide services to any other layer