SlideShare a Scribd company logo
1 of 60
Download to read offline
PART I: OVERVIEW
INTRODUCTION
Subject: Computer Networks
Tutor: Bilal Munir Mughal
1
Ch-1
Content Outline
 DATA COMMUNICATIONS
 Components
 Data Representation
 Data Flow
 NETWORKS
 Network Criteria
 Physical Structures
2
Content Outline
 NETWORK TYPES
 Local Area Network
 Wide Area Network
 Switching
 The Internet
 Accessing the Internet
 STANDARDS AND ADMINISTRATION
 Internet Standards
 Internet Administration
 INTERNET HISTORY
3
Data Communications: Definition
 Data Communications:
 For data communications to occur, the communicating
devices must be part of a communication system
made up of a combination of hardware (physical
equipment) and software (programs).
4
Transfer of data from one device to another via
some form of transmission medium.
Data Communications: Motivations
 Efficient way to share resources
 Cost – less expensive
 Accessibility – easier
 Efficient way to exchange information
 Time – faster
 Size – bigger
 Correctness – more accurate
5
Data Communications: Effectiveness
The effectiveness of a data communications system
depends on four fundamental characteristics:
1. Delivery. The system must deliver data to the correct destination. Data must be
received by the intended device or user and only by that device or user.
2. Accuracy. The system must deliver the data accurately. Data that have been
altered in transmission and left uncorrected are unusable.
3. Timeliness. The system must deliver data in a timely manner. Data delivered late
are useless. In the case of video and audio, timely delivery means delivering data
as they are produced, in the same order that they are produced, and without
significant delay (called real-time transmission).
4. Jitter. Jitter refers to the variation in the packet arrival time. It is the uneven delay
in the delivery of audio or video packets. For example, let us assume that video
packets are sent every 30 ms. If some of the packets arrive with 30-ms delay and
others with 40-ms delay, an uneven quality in the video is the result.
6
Data Communications
7
Hi, how are you?
01010001
Hi, how are you?
User
Computer
you?
how
are
Hi,
you?
how
are
Hi,
01010001
Data Communications: Components
8
Hi, how are you?
5 Protocol
4 Medium
3 Receiver
2 Sender
1 Message
Data Representation
 Numbers
 8/16/32 bit integers
 floating point
 Text
 ASCII, Unicode
 Images
 Bit patterns, Graphics formats JPG/GIF/etc
 Audio  Samples of continuous signal
 Video  Sequence of bitmap images
9
150
2
255
Direction of Data Flow
 Simplex: One direction only
10
Server Monitor
data flow
Keyboard
data flow
Direction of Data Flow
 Half Duplex: Both directions, one at a time
 E.g., walkie-talkies
11
data flow at time 1
data flow at time 2
Direction of Data Flow
 Full Duplex: Both directions simultaneously
 E.g., telephone
 Can be emulated on a single communication link using
various methods
12
data flow
data flow
Networks
 Network: a set of devices connected by media links
13
Media Links
Printer
Workstation
Laptop
Scanner
Server
SD
iMac
Networks: Criteria
 A network must be able to meet a certain number
of criteria. The most important of these are
 Performance
 Reliability
 Security
14
Networks: Criteria
 Performance can be measured in many ways,
including transit time and response time.
 Transit time is the amount of time required for a
message to travel from one device to another.
 Response time is the elapsed time between an inquiry
and a response.
 The performance of a network depends on the
 number of users
 type of transmission medium
 capabilities/efficiency of hardware, software
15
Networks: Criteria
 Performance is often evaluated by two networking
metrics: throughput and delay.
 We often need more throughput and less delay.
 However, these two criteria are often contradictory.
If we try to send more data to the network, we may
increase throughput but we increase the delay
because of traffic congestion in the network.
16
Networks: Criteria
 Reliability
 In addition to accuracy of delivery, network reliability
is measured by the frequency of failure, the time it
takes a link to recover from a failure, and the network’s
robustness in a catastrophe.
 Security
 Network security issues include protecting data from
unauthorized access, protecting data from damage,
and implementing policies and procedures for
recovery from breaches and data losses.
17
Physical Structures: Types of
Connections
 Point-to-point
 Multipoint (multidrop)
18
Point-To-Point Connection
19
A point-to-point connection provides a dedicated link between two devices.
Multipoint Connection
20
Wireless
A multipoint (also called multidrop) connection is one in which more than two specific
devices share a single link.
Topology
 Topology: physical or logical arrangement of
devices
 Mesh
 Star
 Bus
 Ring
 Hybrid
21
Fully Connected Mesh Topology
22
A
C
B
D
Fully Connected Mesh Topology
 Pros:
 Dedicated links
 Robustness
 Privacy
 Easy to identify fault
 Cons:
 A lot of cabling
 A lot of I/O ports
 Difficult to move
23
Number of physical links n (n – 1) / 2 in duplex-mode
A
C
B
D
Star Topology
24
Hub
A D
B C
Drop
Drop
Star Topology
25
Switch
A D
B C
Star Topology
26
Hub
A D
B C
Star Topology
 Pros:
 One I/O port per device
 Little cabling
 Easy to install
 Robustness
 Easy to identify fault
 Cons:
 Single point of failure
 More cabling still required
27
Hub
Number of physical links n
where n = number of nodes
Bus Topology
28
Drop
line
Tap
Terminator
Bus Topology
29
A B C D
Bus Topology
30
Bus Topology
 Pros:
 Little cabling
 Easy to install
 Cons:
 Difficult to modify
 Difficult to isolate fault
 Break in the bus cable
stops all transmission
31
Number of physical links n + 1(backbone)
where n = number of nodes
Ring Topology
32
A
B
C
D
Ring Topology
33
Ring Topology
 Pros:
 Easy to install
 Easy to identify fault
 Cons:
 Delay in large ring
 Break in the ring stops
all transmission
34
Number of physical links n
where n = number of nodes
Hybrid Topologies
35
ACT
ACT
10M100M
1 2 3 4
13 14 15 16
5 6 7 8
17 18 19 20
9 10 11 12
21 22 23 24
UPLINK
1 2 3 4 5 6 7 8 9 101112
131415161718192021222324
COL
COL
PWR
SWITCH
ACT
ACT
10M100M
1 2 3 4
13 14 15 16
5 6 7 8
17 18 19 20
9 10 11 12
21 22 23 24
UPLINK
1 2 3 4 5 6 7 8 9101112
131415161718192021222324
COL
COL
PWR
SWITCH
Network Types
 Local Area Network (LAN)
 Wide Area Network (WAN)
36
Local Area Networks
 Network in a small area e.g. single office, building,
or campus
37
Wide Area Networks
 Network providing long-distance communication over
a country, a continent, the whole world or beyond
38
Wide Area Networks
 Distinct examples of WANs today: point-to-point
WANs and switched WANs.
 Point-to-Point WAN
 Switched WAN
39
Switching
41
Network of Networks
42
Company A
Company D
Network Interface Card (NIC)
Company B
Company C
Internetworking
 How to allow devices from different standards to
communicate
 Gateways/routers – devices capable of
communicating in several standards
 These become "network of networks"
43
Internetworks
 Two or more connected networks become an
internetwork, or internet
 Example: The Internet
44
Network1 Network2
Gateway
Network3
The Internet
 The largest internetwork (network of networks) in the
world
 Devices communicating with TCP/IP protocol suite
45
Accessing The Internet
 Using Telephone Networks
 Dial-up service
 DSL Service
 Using Cable Networks
 Using Wireless Networks
 Direct Connection to the Internet
46
Internet Standards
 An Internet standard is a thoroughly tested
specification that is useful to and adhered to by
those who work with the Internet.
 It is a formalized regulation that must be followed.
47
Internet Standards
 There is a strict procedure by which a specification
attains Internet standard status. A specification
begins as an Internet draft.
 An Internet draft is a working document (a work in
progress) with no official status and a six-month lifetime.
 Upon recommendation from the Internet authorities, a
draft may be published as a Request for Comments
(RFC).
 Each RFC is edited, assigned a number, and made available
to all interested parties.
 RFCs go through maturity levels and are categorized
according to their requirement level.
48
Internet Standards: RFC Maturity
Levels
 Maturity Levels
 An RFC, during its lifetime, falls into one of six maturity
levels:
49
Internet Standards: RFC Maturity
Levels
 Proposed Standard.
 A proposed standard is a specification that is stable, well
understood, and of sufficient interest to the Internet community.
 At this level, the specification is usually tested and implemented
by several different groups.
 Draft Standard.
 A proposed standard is elevated to draft standard status after
at least two successful independent and interoperable
implementations.
 Barring difficulties, a draft standard, with modifications if specific
problems are encountered, normally becomes an Internet
standard.
50
Internet Standards: RFC Maturity
Levels
 Internet Standard.
 A draft standard reaches Internet standard status after
demonstrations of successful implementation.
 Historic.
 The historic RFCs are significant from a historical
perspective.
 They either have been superseded by later specifications or
have never passed the necessary maturity levels to become
an Internet standard.
51
Internet Standards: RFC Maturity
Levels
 Experimental.
 An RFC classified as experimental describes work related to
an experimental situation that does not affect the operation
of the Internet.
 Such an RFC should not be implemented in any functional
Internet service.
 Informational.
 An RFC classified as informational contains general,
historical, or tutorial information related to the Internet.
 It is usually written by someone in a non-Internet
organization, such as a vendor.
52
Internet Standards: RFC
Requirement Levels
RFCs are classified into five requirement levels
 Required.
 An RFC is labeled required if it must be implemented by all
Internet systems to achieve minimum conformance.
 For example, IP and ICMP (Chapter 19) are required
protocols.
 Recommended.
 An RFC labeled recommended is not required for minimum
conformance; it is recommended because of its usefulness.
 For example, FTP (Chapter 26) and TELNET (Chapter 26)
are recommended protocols.
53
Internet Standards: RFC
Requirement Levels
 Elective.
 An RFC labeled elective is not required and not
recommended. However, a system can use it for its own
benefit.
 Limited Use.
 An RFC labeled limited use should be used only in limited
situations. Most of the experimental RFCs fall under this
category.
 Not Recommended.
 An RFC labeled not recommended is inappropriate for
general use. Normally a historic (deprecated) RFC may fall
under this category.
54
Internet Administration
 Appendix G gives the addresses, e-mail addresses,
and telephone numbers for some of groups involved
in growth and development of the internet.
55
Figure 1.17 shows general organization of Internet
administration.
Internet Administration
 The Internet Society (ISOC) is an international,
nonprofit organization formed in 1992 to provide
support for the Internet standards process.
 ISOC accomplishes this through maintaining and
supporting other Internet administrative bodies such as
IAB, IETF, IRTF, and IANA.
 ISOC also promotes research and other scholarly
activities relating to the Internet
56
Internet Administration
 The Internet Architecture Board (IAB) is the technical
advisor to the ISOC.
 The main purposes of the IAB are to oversee the continuing
development of the TCP/IP Protocol Suite and to serve in a
technical advisory capacity to research members of the Internet
community.
 IAB accomplishes this through its two primary components, the
Internet Engineering Task Force (IETF) and the Internet Research
Task Force (IRTF).
 Another responsibility of the IAB is the editorial management of
the RFCs, described earlier.
 IAB is also the external liaison between the Internet and other
standards organizations and forums.
57
Internet Administration
 The Internet Engineering Task Force (IETF) is a forum
of working groups managed by the Internet
Engineering Steering Group (IESG).
 IETF is responsible for identifying operational problems
and proposing solutions to these problems.
 IETF also develops and reviews specifications intended as
Internet standards.
 The working groups are collected into areas, and each
area concentrates on a specific topic.
 Currently nine areas have been defined. The areas include
applications, protocols, routing, network management, IP next
generation (IPng), and security.
58
Internet Administration
 The Internet Research Task Force (IRTF) is a forum
of working groups managed by the Internet
Research Steering Group (IRSG).
 IRTF focuses on long-term research topics related to
Internet protocols, applications, architecture, and
technology.
59
INTERNET HISTORY
 Check your textbook for reference.
60
61
Questions?

More Related Content

Similar to DCN 5th ed. slides ch01-Introduction.pdf

Computer Networks Lecture Notes 01
Computer Networks Lecture Notes 01Computer Networks Lecture Notes 01
Computer Networks Lecture Notes 01Sreedhar Chowdam
 
Telecommunications.PPT
Telecommunications.PPTTelecommunications.PPT
Telecommunications.PPTssuser2cc0d4
 
Ccnapresentation 13020219098042-phpapp02 (1)
Ccnapresentation 13020219098042-phpapp02 (1)Ccnapresentation 13020219098042-phpapp02 (1)
Ccnapresentation 13020219098042-phpapp02 (1)ateeq85905
 
homenet-ews.ppt
homenet-ews.ppthomenet-ews.ppt
homenet-ews.pptTariq Emad
 
Ccna presentation{complete]
Ccna presentation{complete]Ccna presentation{complete]
Ccna presentation{complete]Avijit Nath
 
ITP-22 -COMPUTER NETWORK.pptx
ITP-22 -COMPUTER NETWORK.pptxITP-22 -COMPUTER NETWORK.pptx
ITP-22 -COMPUTER NETWORK.pptxMohammadAsim91
 
Ccna PPT
Ccna PPTCcna PPT
Ccna PPTAIRTEL
 
| IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 4 | April 2014 ...
    | IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 4 | April 2014 ...    | IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 4 | April 2014 ...
| IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 4 | April 2014 ...IJMER
 
15827 sr no01
15827 sr no0115827 sr no01
15827 sr no01pratiklpu
 
Data Communication and Computer Networking Part # 1
Data Communication and Computer Networking Part # 1Data Communication and Computer Networking Part # 1
Data Communication and Computer Networking Part # 1Quaid-i-Azam University
 

Similar to DCN 5th ed. slides ch01-Introduction.pdf (20)

Computer Networks Lecture Notes 01
Computer Networks Lecture Notes 01Computer Networks Lecture Notes 01
Computer Networks Lecture Notes 01
 
networking1.ppt
networking1.pptnetworking1.ppt
networking1.ppt
 
Telecommunications.PPT
Telecommunications.PPTTelecommunications.PPT
Telecommunications.PPT
 
Ccnapresentation 13020219098042-phpapp02 (1)
Ccnapresentation 13020219098042-phpapp02 (1)Ccnapresentation 13020219098042-phpapp02 (1)
Ccnapresentation 13020219098042-phpapp02 (1)
 
ccna presentation
ccna presentationccna presentation
ccna presentation
 
homenet-ews.ppt
homenet-ews.ppthomenet-ews.ppt
homenet-ews.ppt
 
Ccna presentation{complete]
Ccna presentation{complete]Ccna presentation{complete]
Ccna presentation{complete]
 
nv.ppt
nv.pptnv.ppt
nv.ppt
 
unit2-210710110327.pptx
unit2-210710110327.pptxunit2-210710110327.pptx
unit2-210710110327.pptx
 
ITP-22 -COMPUTER NETWORK.pptx
ITP-22 -COMPUTER NETWORK.pptxITP-22 -COMPUTER NETWORK.pptx
ITP-22 -COMPUTER NETWORK.pptx
 
Csc341 – Lecture 1 network management
Csc341 – Lecture 1 network managementCsc341 – Lecture 1 network management
Csc341 – Lecture 1 network management
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
Ccna day 1
Ccna day 1Ccna day 1
Ccna day 1
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
Ccna day1-130802165909-phpapp01
Ccna day1-130802165909-phpapp01Ccna day1-130802165909-phpapp01
Ccna day1-130802165909-phpapp01
 
Ccna PPT
Ccna PPTCcna PPT
Ccna PPT
 
| IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 4 | April 2014 ...
    | IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 4 | April 2014 ...    | IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 4 | April 2014 ...
| IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 4 | April 2014 ...
 
15827 sr no01
15827 sr no0115827 sr no01
15827 sr no01
 
Data Communication and Computer Networking Part # 1
Data Communication and Computer Networking Part # 1Data Communication and Computer Networking Part # 1
Data Communication and Computer Networking Part # 1
 

More from Bilal Munir Mughal

DCN Slides ch10 Error Detection and Correction.ppt
DCN Slides ch10 Error Detection and Correction.pptDCN Slides ch10 Error Detection and Correction.ppt
DCN Slides ch10 Error Detection and Correction.pptBilal Munir Mughal
 
DCN 5th ed. slides ch24 Transport-Layer Protocols.pdf
DCN 5th ed. slides ch24 Transport-Layer Protocols.pdfDCN 5th ed. slides ch24 Transport-Layer Protocols.pdf
DCN 5th ed. slides ch24 Transport-Layer Protocols.pdfBilal Munir Mughal
 
DCN 5th ed. slides ch23 Introduction to Transport Layer.pdf
DCN 5th ed. slides ch23 Introduction to Transport Layer.pdfDCN 5th ed. slides ch23 Introduction to Transport Layer.pdf
DCN 5th ed. slides ch23 Introduction to Transport Layer.pdfBilal Munir Mughal
 
DCN 5th ed. slides ch22 Next Generation IP.pdf
DCN 5th ed. slides ch22 Next Generation IP.pdfDCN 5th ed. slides ch22 Next Generation IP.pdf
DCN 5th ed. slides ch22 Next Generation IP.pdfBilal Munir Mughal
 
DCN 5th ed. slides ch07 Transmission Media.pdf
DCN 5th ed. slides ch07 Transmission Media.pdfDCN 5th ed. slides ch07 Transmission Media.pdf
DCN 5th ed. slides ch07 Transmission Media.pdfBilal Munir Mughal
 
DCN 5th ed. slides ch05 Analog Transmission.pdf
DCN 5th ed. slides ch05 Analog Transmission.pdfDCN 5th ed. slides ch05 Analog Transmission.pdf
DCN 5th ed. slides ch05 Analog Transmission.pdfBilal Munir Mughal
 
DCN 5th ed. slides ch04 Digital Transmission.pdf
DCN 5th ed. slides ch04 Digital Transmission.pdfDCN 5th ed. slides ch04 Digital Transmission.pdf
DCN 5th ed. slides ch04 Digital Transmission.pdfBilal Munir Mughal
 
DCN 5th ed. slides ch03 Introduction to Physical Layer.pdf
DCN 5th ed. slides ch03 Introduction to Physical Layer.pdfDCN 5th ed. slides ch03 Introduction to Physical Layer.pdf
DCN 5th ed. slides ch03 Introduction to Physical Layer.pdfBilal Munir Mughal
 
DCN 5th ed. slides ch02-Network Models.pptx
DCN 5th ed. slides ch02-Network Models.pptxDCN 5th ed. slides ch02-Network Models.pptx
DCN 5th ed. slides ch02-Network Models.pptxBilal Munir Mughal
 

More from Bilal Munir Mughal (9)

DCN Slides ch10 Error Detection and Correction.ppt
DCN Slides ch10 Error Detection and Correction.pptDCN Slides ch10 Error Detection and Correction.ppt
DCN Slides ch10 Error Detection and Correction.ppt
 
DCN 5th ed. slides ch24 Transport-Layer Protocols.pdf
DCN 5th ed. slides ch24 Transport-Layer Protocols.pdfDCN 5th ed. slides ch24 Transport-Layer Protocols.pdf
DCN 5th ed. slides ch24 Transport-Layer Protocols.pdf
 
DCN 5th ed. slides ch23 Introduction to Transport Layer.pdf
DCN 5th ed. slides ch23 Introduction to Transport Layer.pdfDCN 5th ed. slides ch23 Introduction to Transport Layer.pdf
DCN 5th ed. slides ch23 Introduction to Transport Layer.pdf
 
DCN 5th ed. slides ch22 Next Generation IP.pdf
DCN 5th ed. slides ch22 Next Generation IP.pdfDCN 5th ed. slides ch22 Next Generation IP.pdf
DCN 5th ed. slides ch22 Next Generation IP.pdf
 
DCN 5th ed. slides ch07 Transmission Media.pdf
DCN 5th ed. slides ch07 Transmission Media.pdfDCN 5th ed. slides ch07 Transmission Media.pdf
DCN 5th ed. slides ch07 Transmission Media.pdf
 
DCN 5th ed. slides ch05 Analog Transmission.pdf
DCN 5th ed. slides ch05 Analog Transmission.pdfDCN 5th ed. slides ch05 Analog Transmission.pdf
DCN 5th ed. slides ch05 Analog Transmission.pdf
 
DCN 5th ed. slides ch04 Digital Transmission.pdf
DCN 5th ed. slides ch04 Digital Transmission.pdfDCN 5th ed. slides ch04 Digital Transmission.pdf
DCN 5th ed. slides ch04 Digital Transmission.pdf
 
DCN 5th ed. slides ch03 Introduction to Physical Layer.pdf
DCN 5th ed. slides ch03 Introduction to Physical Layer.pdfDCN 5th ed. slides ch03 Introduction to Physical Layer.pdf
DCN 5th ed. slides ch03 Introduction to Physical Layer.pdf
 
DCN 5th ed. slides ch02-Network Models.pptx
DCN 5th ed. slides ch02-Network Models.pptxDCN 5th ed. slides ch02-Network Models.pptx
DCN 5th ed. slides ch02-Network Models.pptx
 

Recently uploaded

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 

Recently uploaded (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 

DCN 5th ed. slides ch01-Introduction.pdf

  • 1. PART I: OVERVIEW INTRODUCTION Subject: Computer Networks Tutor: Bilal Munir Mughal 1 Ch-1
  • 2. Content Outline  DATA COMMUNICATIONS  Components  Data Representation  Data Flow  NETWORKS  Network Criteria  Physical Structures 2
  • 3. Content Outline  NETWORK TYPES  Local Area Network  Wide Area Network  Switching  The Internet  Accessing the Internet  STANDARDS AND ADMINISTRATION  Internet Standards  Internet Administration  INTERNET HISTORY 3
  • 4. Data Communications: Definition  Data Communications:  For data communications to occur, the communicating devices must be part of a communication system made up of a combination of hardware (physical equipment) and software (programs). 4 Transfer of data from one device to another via some form of transmission medium.
  • 5. Data Communications: Motivations  Efficient way to share resources  Cost – less expensive  Accessibility – easier  Efficient way to exchange information  Time – faster  Size – bigger  Correctness – more accurate 5
  • 6. Data Communications: Effectiveness The effectiveness of a data communications system depends on four fundamental characteristics: 1. Delivery. The system must deliver data to the correct destination. Data must be received by the intended device or user and only by that device or user. 2. Accuracy. The system must deliver the data accurately. Data that have been altered in transmission and left uncorrected are unusable. 3. Timeliness. The system must deliver data in a timely manner. Data delivered late are useless. In the case of video and audio, timely delivery means delivering data as they are produced, in the same order that they are produced, and without significant delay (called real-time transmission). 4. Jitter. Jitter refers to the variation in the packet arrival time. It is the uneven delay in the delivery of audio or video packets. For example, let us assume that video packets are sent every 30 ms. If some of the packets arrive with 30-ms delay and others with 40-ms delay, an uneven quality in the video is the result. 6
  • 7. Data Communications 7 Hi, how are you? 01010001 Hi, how are you? User Computer you? how are Hi, you? how are Hi, 01010001
  • 8. Data Communications: Components 8 Hi, how are you? 5 Protocol 4 Medium 3 Receiver 2 Sender 1 Message
  • 9. Data Representation  Numbers  8/16/32 bit integers  floating point  Text  ASCII, Unicode  Images  Bit patterns, Graphics formats JPG/GIF/etc  Audio  Samples of continuous signal  Video  Sequence of bitmap images 9 150 2 255
  • 10. Direction of Data Flow  Simplex: One direction only 10 Server Monitor data flow Keyboard data flow
  • 11. Direction of Data Flow  Half Duplex: Both directions, one at a time  E.g., walkie-talkies 11 data flow at time 1 data flow at time 2
  • 12. Direction of Data Flow  Full Duplex: Both directions simultaneously  E.g., telephone  Can be emulated on a single communication link using various methods 12 data flow data flow
  • 13. Networks  Network: a set of devices connected by media links 13 Media Links Printer Workstation Laptop Scanner Server SD iMac
  • 14. Networks: Criteria  A network must be able to meet a certain number of criteria. The most important of these are  Performance  Reliability  Security 14
  • 15. Networks: Criteria  Performance can be measured in many ways, including transit time and response time.  Transit time is the amount of time required for a message to travel from one device to another.  Response time is the elapsed time between an inquiry and a response.  The performance of a network depends on the  number of users  type of transmission medium  capabilities/efficiency of hardware, software 15
  • 16. Networks: Criteria  Performance is often evaluated by two networking metrics: throughput and delay.  We often need more throughput and less delay.  However, these two criteria are often contradictory. If we try to send more data to the network, we may increase throughput but we increase the delay because of traffic congestion in the network. 16
  • 17. Networks: Criteria  Reliability  In addition to accuracy of delivery, network reliability is measured by the frequency of failure, the time it takes a link to recover from a failure, and the network’s robustness in a catastrophe.  Security  Network security issues include protecting data from unauthorized access, protecting data from damage, and implementing policies and procedures for recovery from breaches and data losses. 17
  • 18. Physical Structures: Types of Connections  Point-to-point  Multipoint (multidrop) 18
  • 19. Point-To-Point Connection 19 A point-to-point connection provides a dedicated link between two devices.
  • 20. Multipoint Connection 20 Wireless A multipoint (also called multidrop) connection is one in which more than two specific devices share a single link.
  • 21. Topology  Topology: physical or logical arrangement of devices  Mesh  Star  Bus  Ring  Hybrid 21
  • 22. Fully Connected Mesh Topology 22 A C B D
  • 23. Fully Connected Mesh Topology  Pros:  Dedicated links  Robustness  Privacy  Easy to identify fault  Cons:  A lot of cabling  A lot of I/O ports  Difficult to move 23 Number of physical links n (n – 1) / 2 in duplex-mode A C B D
  • 27. Star Topology  Pros:  One I/O port per device  Little cabling  Easy to install  Robustness  Easy to identify fault  Cons:  Single point of failure  More cabling still required 27 Hub Number of physical links n where n = number of nodes
  • 31. Bus Topology  Pros:  Little cabling  Easy to install  Cons:  Difficult to modify  Difficult to isolate fault  Break in the bus cable stops all transmission 31 Number of physical links n + 1(backbone) where n = number of nodes
  • 34. Ring Topology  Pros:  Easy to install  Easy to identify fault  Cons:  Delay in large ring  Break in the ring stops all transmission 34 Number of physical links n where n = number of nodes
  • 35. Hybrid Topologies 35 ACT ACT 10M100M 1 2 3 4 13 14 15 16 5 6 7 8 17 18 19 20 9 10 11 12 21 22 23 24 UPLINK 1 2 3 4 5 6 7 8 9 101112 131415161718192021222324 COL COL PWR SWITCH ACT ACT 10M100M 1 2 3 4 13 14 15 16 5 6 7 8 17 18 19 20 9 10 11 12 21 22 23 24 UPLINK 1 2 3 4 5 6 7 8 9101112 131415161718192021222324 COL COL PWR SWITCH
  • 36. Network Types  Local Area Network (LAN)  Wide Area Network (WAN) 36
  • 37. Local Area Networks  Network in a small area e.g. single office, building, or campus 37
  • 38. Wide Area Networks  Network providing long-distance communication over a country, a continent, the whole world or beyond 38
  • 39. Wide Area Networks  Distinct examples of WANs today: point-to-point WANs and switched WANs.  Point-to-Point WAN  Switched WAN 39
  • 41. Network of Networks 42 Company A Company D Network Interface Card (NIC) Company B Company C
  • 42. Internetworking  How to allow devices from different standards to communicate  Gateways/routers – devices capable of communicating in several standards  These become "network of networks" 43
  • 43. Internetworks  Two or more connected networks become an internetwork, or internet  Example: The Internet 44 Network1 Network2 Gateway Network3
  • 44. The Internet  The largest internetwork (network of networks) in the world  Devices communicating with TCP/IP protocol suite 45
  • 45. Accessing The Internet  Using Telephone Networks  Dial-up service  DSL Service  Using Cable Networks  Using Wireless Networks  Direct Connection to the Internet 46
  • 46. Internet Standards  An Internet standard is a thoroughly tested specification that is useful to and adhered to by those who work with the Internet.  It is a formalized regulation that must be followed. 47
  • 47. Internet Standards  There is a strict procedure by which a specification attains Internet standard status. A specification begins as an Internet draft.  An Internet draft is a working document (a work in progress) with no official status and a six-month lifetime.  Upon recommendation from the Internet authorities, a draft may be published as a Request for Comments (RFC).  Each RFC is edited, assigned a number, and made available to all interested parties.  RFCs go through maturity levels and are categorized according to their requirement level. 48
  • 48. Internet Standards: RFC Maturity Levels  Maturity Levels  An RFC, during its lifetime, falls into one of six maturity levels: 49
  • 49. Internet Standards: RFC Maturity Levels  Proposed Standard.  A proposed standard is a specification that is stable, well understood, and of sufficient interest to the Internet community.  At this level, the specification is usually tested and implemented by several different groups.  Draft Standard.  A proposed standard is elevated to draft standard status after at least two successful independent and interoperable implementations.  Barring difficulties, a draft standard, with modifications if specific problems are encountered, normally becomes an Internet standard. 50
  • 50. Internet Standards: RFC Maturity Levels  Internet Standard.  A draft standard reaches Internet standard status after demonstrations of successful implementation.  Historic.  The historic RFCs are significant from a historical perspective.  They either have been superseded by later specifications or have never passed the necessary maturity levels to become an Internet standard. 51
  • 51. Internet Standards: RFC Maturity Levels  Experimental.  An RFC classified as experimental describes work related to an experimental situation that does not affect the operation of the Internet.  Such an RFC should not be implemented in any functional Internet service.  Informational.  An RFC classified as informational contains general, historical, or tutorial information related to the Internet.  It is usually written by someone in a non-Internet organization, such as a vendor. 52
  • 52. Internet Standards: RFC Requirement Levels RFCs are classified into five requirement levels  Required.  An RFC is labeled required if it must be implemented by all Internet systems to achieve minimum conformance.  For example, IP and ICMP (Chapter 19) are required protocols.  Recommended.  An RFC labeled recommended is not required for minimum conformance; it is recommended because of its usefulness.  For example, FTP (Chapter 26) and TELNET (Chapter 26) are recommended protocols. 53
  • 53. Internet Standards: RFC Requirement Levels  Elective.  An RFC labeled elective is not required and not recommended. However, a system can use it for its own benefit.  Limited Use.  An RFC labeled limited use should be used only in limited situations. Most of the experimental RFCs fall under this category.  Not Recommended.  An RFC labeled not recommended is inappropriate for general use. Normally a historic (deprecated) RFC may fall under this category. 54
  • 54. Internet Administration  Appendix G gives the addresses, e-mail addresses, and telephone numbers for some of groups involved in growth and development of the internet. 55 Figure 1.17 shows general organization of Internet administration.
  • 55. Internet Administration  The Internet Society (ISOC) is an international, nonprofit organization formed in 1992 to provide support for the Internet standards process.  ISOC accomplishes this through maintaining and supporting other Internet administrative bodies such as IAB, IETF, IRTF, and IANA.  ISOC also promotes research and other scholarly activities relating to the Internet 56
  • 56. Internet Administration  The Internet Architecture Board (IAB) is the technical advisor to the ISOC.  The main purposes of the IAB are to oversee the continuing development of the TCP/IP Protocol Suite and to serve in a technical advisory capacity to research members of the Internet community.  IAB accomplishes this through its two primary components, the Internet Engineering Task Force (IETF) and the Internet Research Task Force (IRTF).  Another responsibility of the IAB is the editorial management of the RFCs, described earlier.  IAB is also the external liaison between the Internet and other standards organizations and forums. 57
  • 57. Internet Administration  The Internet Engineering Task Force (IETF) is a forum of working groups managed by the Internet Engineering Steering Group (IESG).  IETF is responsible for identifying operational problems and proposing solutions to these problems.  IETF also develops and reviews specifications intended as Internet standards.  The working groups are collected into areas, and each area concentrates on a specific topic.  Currently nine areas have been defined. The areas include applications, protocols, routing, network management, IP next generation (IPng), and security. 58
  • 58. Internet Administration  The Internet Research Task Force (IRTF) is a forum of working groups managed by the Internet Research Steering Group (IRSG).  IRTF focuses on long-term research topics related to Internet protocols, applications, architecture, and technology. 59
  • 59. INTERNET HISTORY  Check your textbook for reference. 60