SlideShare a Scribd company logo
1 
Basic Networking Concepts 
1. Introduction 
2. Protocols 
3. Protocol Layers 
4. Network Interconnection/Internet
1. Introduction 
-A network can be defined as a group of computers and other devices 
connected in some ways so as to be able to exchange data. 
-Each of the devices on the network can be thought of as a node; each 
node has a unique address. 
-Addresses are numeric quantities that are easy for computers to work 
with, but not for humans to remember. 
Example: 204.160.241.98 
-Some networks also provide names that humans can more easily 
remember than numbers. 
Example: www.javasoft.com, corresponding to the above numeric 
address. 
NIC addr1 NIC addr2 NIC addrN 
2 
…
3 
Addressing 
Internet address 
Consists of 4 bytes separated by periods 
Example: 136.102.233.49 
-The R first bytes (R= 1,2,3) correspond to the network address; 
-The remaining H bytes (H = 3,2,1) are used for the host machine. 
-InterNIC Register: organization in charge of the allocation of the 
address ranges corresponding to networks. 
-Criteria considered: 
→ Geographical area (country) 
→ Organization, enterprise 
→ Department 
→ Host 
Domain Name System (DNS) 
-Mnemonic textual addresses are provided to facilitate the manipulation 
of internet addresses. 
-DNS servers are responsible for translating mnemonic textual Internet 
addresses into hard numeric Internet addresses.
Ports 
-An IP address identifies a host machine on the Internet. 
-An IP port will identify a specific application running on an Internet host 
machine. 
-A port is identified by a number, the port number. 
-The number of ports is not functionally limited, in contrast to serial 
communications where only 4 ports are allowed. 
-There are some port numbers which are dedicated for specific 
applications. 
4 
Applications Port numbers 
HTTP 80 
FTP 20 and 21 
Gopher 70 
SMTP (e-mail) 25 
POP3 (e-mail) 110 
Telnet 23 
Finger 79
Data Transmission 
-In modern networks, data are transferred using packet switching. 
-Messages are broken into units called packets, and sent from one 
computer to the other. 
-At the destination, data are extracted from one or more packets and 
used to reconstruct the original message. 
-Each packet has a maximum size, and consists of a header and a data 
area. 
-The header contains the addresses of the source and destination 
computers and sequencing information necessary to reassemble 
the message at the destination. 
5 
packet 
header data 
1001….101 00010000111…000000110001100
Types of Networks 
There are two principle kinds of networks: Wide Area Networks 
(WANs) and Local Area Networks (LANs). 
WANs 
-Cover cities, countries, and continents. 
-Based on packet switching technology 
-Examples of WAN technology: Asynchronous Transfer Mode (ATM), 
Integrated Services Digital Network (ISDN) 
LANs 
-Cover buildings or a set of closely related buildings. 
-Examples of LAN technology: Ethernet, Token Ring, and Fibber 
Distributed Data Interconnect (FDDI). 
Ethernet LANs: based on a bus topology and broadcast communication 
Token ring LANs: based on ring topology 
FDDI LANs: use optical fibbers and an improved token ring mechanism 
based on two rings flowing in opposite directions. 
6
7 
Shared 
bus 
(a) Ethernet LAN 
Ring 
(b) Token Ring LAN 
Dual ring 
(c) FDDI LAN
8 
Network connectivity type Speed Transmission time 
for 10 Mbytes 
(Telephone) dial-up modem 14.4 Kbps 90 min 
ISDN modem 56/128 Kbps 45/12min 
T1 connection 1.54 Mbps 50s 
Ethernet 10 Mbps 9s 
Token ring 4/16 Mbps 
Fast Ethernet 100 Mbps 
FDDI 100 Mbps 
Gigabit Ethernet 1 Gbps 
ATM 25Mbps/2.4Gbs
Interconnection 
-Networks of low capacity may be connected together via a backbone 
network which is a network of high capacity such as a FDDI network, a 
WAN network etc. 
-LANs and WANs can be interconnected via T1 or T3 digital leased 
lines 
-According to the protocols involved, networks interconnection is 
achieved using one or several of the following devices: 
→Bridge: a computer or device that links two similar LANs based on 
the same protocol. 
→ Router: a communication computer that connects different types of 
9 
networks using different protocols. 
→ B-router or Bridge/Router: a single device that combines both the 
functions of bridge and router. 
→ Gateway: a network device that connects two different systems, using 
direct and systematic translation between protocols.
10 
Toronto branch 
Ethernet LAN Router 
Vancouver branch 
Gateway 
Token Ring LAN 
Frame 
Relay 
ATM 
T1 line 
NY headquaters 
Bridge/Route 
Router 
Token Ring LAN 
Bridge 
Bridge/Router 
Ethernet
Network Topology Diagram 
The specification of the network topology diagram requires the 
definition of the characteristics and entities underlying the network: 
-Geographical locations of the different components or subnets 
involved in the network. 
-Description of the LAN topology 
-Description of the WAN topology 
-Description of the network connectors such as routers, bridges, 
repeaters, and gateways. 
11
12 
2. Protocols 
-Define the rules that govern the communications between two 
computers connected to the network. 
-Roles: addressing and routing of messages, error detection and 
recovery, sequence and flow controls etc. 
-A protocol specification consists of the syntax, which defines the kinds 
and formats of the messages exchanged, and the semantic, which 
specifies the action taken by each entity when specific events occur. 
Example: HTTP protocol for communication between web browsers 
and servers.
Request For Comments (RFC): specifications of the protocols involved 
in Internet Communications. 
-Example: sample of RFC 821 describing communications between 
13 
SMTP server and client. 
S: MAIL FROM: Paul@Alpha.ARPA 
R: 250 OK 
S: RCPT TO: Jack@Beta.ARPA 
R: 250 OK 
S: DATA 
R: 354 Beginning of mail; ending by <CRLF>.<CRLF> 
S: Blah blah blah 
S: …etc. 
S: <CRLF>.<CRLF> 
R: 250 OK
-Protocols are designed based on a layered architecture such as the OSI 
reference model. 
-Each entity at a layer n communicates only with entities at layer n-1. 
-The data exchanged, known as Protocol Data Unit (PDU), goes back 
and forth through the layers, each layer adds or removes its own header 
and vice-versa. Therefore a layer n PDU may become a layer n-1 data. 
14 
nth layer 
(n-1)th layer 
… 
nth layer 
(n-1)th layer 
… 
Network
15 
3. Protocol Layers 
The OSI (Open Systems Interconnection) Data Model 
-ISO standard for computer networks design and functioning. 
-Involves at least 7 layers, each playing a specific role when 
applications are communicating over the net. 
-During the sending process, each layer (from top to down) will add 
a specific header to the raw data. 
-At the reception, headers are eliminated conversely until the data 
arrived to the receiving application.
16 
OSI Layers 
Application layer 
(applications connected to the network) 
Presentation layer 
(provides standard data representations for applications) 
Session layer 
(manages sessions among applications) 
Transport layer 
(provides end-to-end errors detection and correction) 
Network layer 
(handles connection to the network by the higher layers) 
Data-link layer 
(provides safe communication of data over the physical network) 
Physical layer 
(defines the physical characteristics of the network)
Physical layer: ensures a safe and efficient travel of data; consists of 
electronic circuits for data transmission etc. 
Data link layer: in charge of data encapsulation under the form of 
packets and their interpretation at the physical layer. 
Network layer: in charge of packets transmission from a source A to a 
destination B. 
Transport layer: in charge of the delivery of packets from a source A 
to a destination B 
Session layer: in charge of the management of network access. 
Presentation layer: determines the format of the data transmitted to 
applications, data compressing/decompressing, encrypting etc. 
Application layer: contains the applications which are used by the 
end-user, such as Java, Word etc. 
17
The TCP/IP Model 
-Consists of only 4 layers: application, transport, internet and network. 
18 
Layers 
Application layer 
(applications and processes running on the network) 
Transport layer 
(provides end-to-end data delivery services) 
Internet layer 
(makes datagrams and handles data routing) 
Network layer 
(provides routines allowing access to the physical network)
Network layer 
-Provides the same functionality as the physical, the data link and 
network layers in the OSI model. 
-Mapping between IP addresses and network physical addresses. 
-Encapsulation of IP datagrams, e.g packets, in format understandable 
by the network. 
Internet layer 
-Lies at the heart of TCP/IP. 
-Based on the Internet Protocol (IP), which provides the frame for 
transmitting data from place A to place B. 
Transport layer 
-Based on two main protocols: TCP (Transmission Control Protocol) 
and UDP (User Datagram protocol) 
Application layer 
-Combines the functions of the OSI application, presentation, and 
session layers. 
-Protocols involved in this layer: HTTP, FTP, SMTP etc. 
19
4. Networks Interconnection/Internet 
Concept of Network Interconnection 
-First implemented in the Defense Advanced Research Project Agency 
Network (Arpanet), in 1966 in USA. 
-Consists of connecting several computer networks based on different 
protocols 
-Requires the definition of a common interconnection protocol on top 
the local protocols. 
-The Internet Protocol (IP) plays this role, by defining unique addresses 
for a network and a host machine. 
20 
FTP Telnet SMTP SNMP 
TCP/UDP 
IP 
Ethernet Arpanet Token ring
21 
P1 P2 
IP 
P4 P3
22 
Internet Protocol (IP) 
Overview 
-The IP protocol provides two main functionality: 
→Decomposition of the initial information flow into packets of 
standardized size, and reassembling at the destination. 
→Routing of a packet through successive networks, from the source 
machine to the destination identified by its IP address. 
-Transmitted packets are not guaranteed to be delivered (datagram 
protocol). 
-The IP protocol does not request for connection (connectionless) 
before sending data and does not make any error detection. 
Functions 
-Decompose the initial data (to be sent) into datagrams. 
-Each datagram will have a header including, the IP address and the 
port number of the destination. 
-Datagrams are then sent to selected gateways, e.g IP routers, connected 
at the same time to the local network and to an IP service provider 
network.
-Datagrams are transferred from gateways to gateways until they arrived 
at their final destination. 
23 
Sender 
Receiver 
packet1 
packet2 
Routers
Structure of an IP packet 
-The fields at the beginning of the packet, called the frame header, 
define the IP protocol’s functionality and limitations. 
-32 bits are allocated for encoding source and destination addresses (32 
bits for each of these address fields). 
-The remainder of the header (16 bits) encodes various information such 
as the total packet length in bytes. 
-Hence an IP packet can be a maximum of 64Kb long. 
24 
0 10 12 16 20 24 
Header 
Checksum 
Source address 
Destination address 
Options 
Data
Transmission Control Protocol (TCP) 
Overview 
-TCP provides by using IP packets a basic service that does guarantee 
safe delivery: 
→error detection 
→safe data transmission 
→assurance that data are received in the correct order 
-Before sending data, TCP requires that the computers communicating 
establish a connection (connection-oriented protocol). 
25 
Client TCP Server 
SYN 
SYN_ACK 
ACK 
DATA 
DATA 
ACK 
DATA 
FIN 
FIN 
ACK
-TCP provides support for sending and receiving arbitrary amounts of 
data as one big stream of byte data (IP is limited to 64Kb). 
-TCP does so by breaking up the data stream into separate IP packets. 
-Packets are numbered, and reassembled on arrival, using sequence and 
sequence acknowledge numbers. 
-TCP also improves the capability of IP by specifying port numbers. 
→ There are 65,536 different TCP ports (sockets) through which every 
26 
TCP/IP machine can talk. 
Structure of a TCP packet 
0 2 4 8 12 20 
Source port 
Destination port 
Sequence No. 
Sequence Ack. No. 
Misc. header 
Data
User Datagram Protocol (UDP) 
Overview 
-Datagram protocol also built on top of IP. 
-Has the same packet-size limit (64Kb) as IP, but allows for port 
number specification. 
-Provides also 65,536 different ports. 
-Hence, every machine has two sets of 65,536 ports: one for TCP and the 
other for UDP. 
-Connectionless protocol, without any error detection facility. 
-Provides only support for data transmission from one end to the other, 
without any further verification. 
-The main interest of UDP is that since it does not make further 
verification, it is very fast. 
-Useful for sending small size data in a repetitive way such as time 
information. 
27
4.5 Internet Application Protocols 
On top of TCP/IP, several services have been developed in order to 
homogenize applications of same nature: 
-FTP (File Transfer Protocol) allows the transfer of collection of files 
between two machines connected to the Internet. 
-Telnet (Terminal Protocol) allows a user to connect to a remote host in 
terminal mode. 
-NNTP (Network News Transfer Protocol) allows the constitution of 
communication groups (newsgroups) organized around specific topics. 
-SMTP (Simple Mail Transfer Protocol) defines a basic service for 
electronic mails. 
-SNMP (Simple Network Management Protocol) allows the 
management of the network. 
28 
FTP Telnet SMTP SNMP 
TCP/UDP 
IP 
Ethernet Arpanet Token ring

More Related Content

What's hot

Network and Protocol
 Network and Protocol Network and Protocol
Network and Protocol
Saif Muttair
 
data communication
data communicationdata communication
data communication
Abirami Thangavel
 
Orientation to Computer Networks
Orientation to Computer NetworksOrientation to Computer Networks
Orientation to Computer Networks
Mukesh Chinta
 
Protocols
ProtocolsProtocols
Protocols
Sonali Chawla
 
Protocols in computer network
Protocols in computer network   Protocols in computer network
Protocols in computer network
priya sehgal
 
Networking Basics
Networking BasicsNetworking Basics
Networking Basics
Carlo Fonda
 
Networking Concepts Lesson 06 - Protocols - Eric Vanderburg
Networking Concepts Lesson 06 - Protocols - Eric VanderburgNetworking Concepts Lesson 06 - Protocols - Eric Vanderburg
Networking Concepts Lesson 06 - Protocols - Eric Vanderburg
Eric Vanderburg
 
Network protocol
Network protocolNetwork protocol
Network protocol
SWAMY NAYAK
 
Osi layer and network protocol
Osi layer and network protocolOsi layer and network protocol
Osi layer and network protocol
Nayan Sarma
 
protocols and types of protocols.
protocols and types of protocols.protocols and types of protocols.
protocols and types of protocols.
Šhæÿæñ Æhmęd
 
OSI model and TCP/IP model
OSI model and TCP/IP modelOSI model and TCP/IP model
OSI model and TCP/IP model
Rubal Sagwal
 
Network Protocol
Network ProtocolNetwork Protocol
Network Protocol
Ketan Nayak
 
OSI Model
OSI ModelOSI Model
OSI Model
Ammar Rahman
 
Application Layer
Application Layer Application Layer
Application Layer
Dr Shashikant Athawale
 
INTRODUCTION TO INTERNET PROTOCOL BY SAIKIRAN PANJALA
INTRODUCTION TO INTERNET PROTOCOL BY SAIKIRAN PANJALAINTRODUCTION TO INTERNET PROTOCOL BY SAIKIRAN PANJALA
INTRODUCTION TO INTERNET PROTOCOL BY SAIKIRAN PANJALA
Saikiran Panjala
 
NETWORK PROTOCOL
NETWORK PROTOCOLNETWORK PROTOCOL
NETWORK PROTOCOL
Kak Yong
 
TCP/IP Network ppt
TCP/IP Network pptTCP/IP Network ppt
TCP/IP Network pptextraganesh
 
Slides for protocol layering and network applications
Slides for protocol layering and network applicationsSlides for protocol layering and network applications
Slides for protocol layering and network applications
jajinekkanti
 
Network protocol structure scope
Network protocol structure scopeNetwork protocol structure scope
Network protocol structure scope
Sanat Maharjan
 

What's hot (20)

Network and Protocol
 Network and Protocol Network and Protocol
Network and Protocol
 
data communication
data communicationdata communication
data communication
 
Internet Protocols
Internet ProtocolsInternet Protocols
Internet Protocols
 
Orientation to Computer Networks
Orientation to Computer NetworksOrientation to Computer Networks
Orientation to Computer Networks
 
Protocols
ProtocolsProtocols
Protocols
 
Protocols in computer network
Protocols in computer network   Protocols in computer network
Protocols in computer network
 
Networking Basics
Networking BasicsNetworking Basics
Networking Basics
 
Networking Concepts Lesson 06 - Protocols - Eric Vanderburg
Networking Concepts Lesson 06 - Protocols - Eric VanderburgNetworking Concepts Lesson 06 - Protocols - Eric Vanderburg
Networking Concepts Lesson 06 - Protocols - Eric Vanderburg
 
Network protocol
Network protocolNetwork protocol
Network protocol
 
Osi layer and network protocol
Osi layer and network protocolOsi layer and network protocol
Osi layer and network protocol
 
protocols and types of protocols.
protocols and types of protocols.protocols and types of protocols.
protocols and types of protocols.
 
OSI model and TCP/IP model
OSI model and TCP/IP modelOSI model and TCP/IP model
OSI model and TCP/IP model
 
Network Protocol
Network ProtocolNetwork Protocol
Network Protocol
 
OSI Model
OSI ModelOSI Model
OSI Model
 
Application Layer
Application Layer Application Layer
Application Layer
 
INTRODUCTION TO INTERNET PROTOCOL BY SAIKIRAN PANJALA
INTRODUCTION TO INTERNET PROTOCOL BY SAIKIRAN PANJALAINTRODUCTION TO INTERNET PROTOCOL BY SAIKIRAN PANJALA
INTRODUCTION TO INTERNET PROTOCOL BY SAIKIRAN PANJALA
 
NETWORK PROTOCOL
NETWORK PROTOCOLNETWORK PROTOCOL
NETWORK PROTOCOL
 
TCP/IP Network ppt
TCP/IP Network pptTCP/IP Network ppt
TCP/IP Network ppt
 
Slides for protocol layering and network applications
Slides for protocol layering and network applicationsSlides for protocol layering and network applications
Slides for protocol layering and network applications
 
Network protocol structure scope
Network protocol structure scopeNetwork protocol structure scope
Network protocol structure scope
 

Similar to Dist 03-4

dist-03-4.pdf
dist-03-4.pdfdist-03-4.pdf
dist-03-4.pdf
Nwaforobinna2
 
NETWORK BASICS.pdf
NETWORK BASICS.pdfNETWORK BASICS.pdf
NETWORK BASICS.pdf
philipsKani1
 
network in details description and example
network in details description and examplenetwork in details description and example
network in details description and example
yabosa1161
 
Basic Networking Network
Basic Networking NetworkBasic Networking Network
Basic Networking Network
JGrace Johnny
 
Project report on mesh hybrid topology network vision
Project report on mesh hybrid topology network visionProject report on mesh hybrid topology network vision
Project report on mesh hybrid topology network vision
Jignesh Ameta
 
Internet basics and Cloud Computing- Manish Jha
Internet basics and Cloud Computing- Manish JhaInternet basics and Cloud Computing- Manish Jha
Internet basics and Cloud Computing- Manish Jha
manish jha
 
Manish Jha- Research Scholar- Internet Basics Requriement
Manish Jha- Research Scholar- Internet Basics RequriementManish Jha- Research Scholar- Internet Basics Requriement
Manish Jha- Research Scholar- Internet Basics Requriement
Manish Jha
 
Fundamentals of Networking
Fundamentals of NetworkingFundamentals of Networking
Fundamentals of NetworkingIsrael Marcus
 
Concept of networking
Concept of networkingConcept of networking
Concept of networking
sumit dimri
 
Class_notes_InternetTechnology
Class_notes_InternetTechnologyClass_notes_InternetTechnology
Class_notes_InternetTechnologyGulrez Khan
 
Network essentials chapter 3
Network essentials  chapter 3Network essentials  chapter 3
Network essentials chapter 3Raghu nath
 
ip-basics.ppt
ip-basics.pptip-basics.ppt
ip-basics.ppt
GioSanBuenaventura1
 
ip net basic understanding slide show ppt
ip net basic understanding slide show pptip net basic understanding slide show ppt
ip net basic understanding slide show ppt
lolo749806
 
Automation Networking By Shivam Singh
Automation Networking By Shivam SinghAutomation Networking By Shivam Singh
Automation Networking By Shivam Singh
Shivam Singh
 
Cisco doc
Cisco docCisco doc
Cisco doc
Prakash V
 
OSI model.pptx
OSI model.pptxOSI model.pptx
OSI model.pptx
SmtArunaAsafAliGovtP
 
Networking fundamentals
Networking  fundamentalsNetworking  fundamentals
Networking fundamentals
The Avi Sharma
 
Network essentials chapter 2
Network essentials  chapter 2Network essentials  chapter 2
Network essentials chapter 2Raghu nath
 
Lecture 2 -_understanding_networks_with_presenter_notes
Lecture 2 -_understanding_networks_with_presenter_notesLecture 2 -_understanding_networks_with_presenter_notes
Lecture 2 -_understanding_networks_with_presenter_notes
Serious_SamSoul
 

Similar to Dist 03-4 (20)

dist-03-4.pdf
dist-03-4.pdfdist-03-4.pdf
dist-03-4.pdf
 
NETWORK BASICS.pdf
NETWORK BASICS.pdfNETWORK BASICS.pdf
NETWORK BASICS.pdf
 
network in details description and example
network in details description and examplenetwork in details description and example
network in details description and example
 
Basic Networking Network
Basic Networking NetworkBasic Networking Network
Basic Networking Network
 
Project report on mesh hybrid topology network vision
Project report on mesh hybrid topology network visionProject report on mesh hybrid topology network vision
Project report on mesh hybrid topology network vision
 
Internet basics and Cloud Computing- Manish Jha
Internet basics and Cloud Computing- Manish JhaInternet basics and Cloud Computing- Manish Jha
Internet basics and Cloud Computing- Manish Jha
 
Manish Jha- Research Scholar- Internet Basics Requriement
Manish Jha- Research Scholar- Internet Basics RequriementManish Jha- Research Scholar- Internet Basics Requriement
Manish Jha- Research Scholar- Internet Basics Requriement
 
Fundamentals of Networking
Fundamentals of NetworkingFundamentals of Networking
Fundamentals of Networking
 
Concept of networking
Concept of networkingConcept of networking
Concept of networking
 
Ccna introduction
Ccna introductionCcna introduction
Ccna introduction
 
Class_notes_InternetTechnology
Class_notes_InternetTechnologyClass_notes_InternetTechnology
Class_notes_InternetTechnology
 
Network essentials chapter 3
Network essentials  chapter 3Network essentials  chapter 3
Network essentials chapter 3
 
ip-basics.ppt
ip-basics.pptip-basics.ppt
ip-basics.ppt
 
ip net basic understanding slide show ppt
ip net basic understanding slide show pptip net basic understanding slide show ppt
ip net basic understanding slide show ppt
 
Automation Networking By Shivam Singh
Automation Networking By Shivam SinghAutomation Networking By Shivam Singh
Automation Networking By Shivam Singh
 
Cisco doc
Cisco docCisco doc
Cisco doc
 
OSI model.pptx
OSI model.pptxOSI model.pptx
OSI model.pptx
 
Networking fundamentals
Networking  fundamentalsNetworking  fundamentals
Networking fundamentals
 
Network essentials chapter 2
Network essentials  chapter 2Network essentials  chapter 2
Network essentials chapter 2
 
Lecture 2 -_understanding_networks_with_presenter_notes
Lecture 2 -_understanding_networks_with_presenter_notesLecture 2 -_understanding_networks_with_presenter_notes
Lecture 2 -_understanding_networks_with_presenter_notes
 

Recently uploaded

Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
rosedainty
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
bennyroshan06
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
Col Mukteshwar Prasad
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
Steve Thomason
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 

Recently uploaded (20)

Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 

Dist 03-4

  • 1. 1 Basic Networking Concepts 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet
  • 2. 1. Introduction -A network can be defined as a group of computers and other devices connected in some ways so as to be able to exchange data. -Each of the devices on the network can be thought of as a node; each node has a unique address. -Addresses are numeric quantities that are easy for computers to work with, but not for humans to remember. Example: 204.160.241.98 -Some networks also provide names that humans can more easily remember than numbers. Example: www.javasoft.com, corresponding to the above numeric address. NIC addr1 NIC addr2 NIC addrN 2 …
  • 3. 3 Addressing Internet address Consists of 4 bytes separated by periods Example: 136.102.233.49 -The R first bytes (R= 1,2,3) correspond to the network address; -The remaining H bytes (H = 3,2,1) are used for the host machine. -InterNIC Register: organization in charge of the allocation of the address ranges corresponding to networks. -Criteria considered: → Geographical area (country) → Organization, enterprise → Department → Host Domain Name System (DNS) -Mnemonic textual addresses are provided to facilitate the manipulation of internet addresses. -DNS servers are responsible for translating mnemonic textual Internet addresses into hard numeric Internet addresses.
  • 4. Ports -An IP address identifies a host machine on the Internet. -An IP port will identify a specific application running on an Internet host machine. -A port is identified by a number, the port number. -The number of ports is not functionally limited, in contrast to serial communications where only 4 ports are allowed. -There are some port numbers which are dedicated for specific applications. 4 Applications Port numbers HTTP 80 FTP 20 and 21 Gopher 70 SMTP (e-mail) 25 POP3 (e-mail) 110 Telnet 23 Finger 79
  • 5. Data Transmission -In modern networks, data are transferred using packet switching. -Messages are broken into units called packets, and sent from one computer to the other. -At the destination, data are extracted from one or more packets and used to reconstruct the original message. -Each packet has a maximum size, and consists of a header and a data area. -The header contains the addresses of the source and destination computers and sequencing information necessary to reassemble the message at the destination. 5 packet header data 1001….101 00010000111…000000110001100
  • 6. Types of Networks There are two principle kinds of networks: Wide Area Networks (WANs) and Local Area Networks (LANs). WANs -Cover cities, countries, and continents. -Based on packet switching technology -Examples of WAN technology: Asynchronous Transfer Mode (ATM), Integrated Services Digital Network (ISDN) LANs -Cover buildings or a set of closely related buildings. -Examples of LAN technology: Ethernet, Token Ring, and Fibber Distributed Data Interconnect (FDDI). Ethernet LANs: based on a bus topology and broadcast communication Token ring LANs: based on ring topology FDDI LANs: use optical fibbers and an improved token ring mechanism based on two rings flowing in opposite directions. 6
  • 7. 7 Shared bus (a) Ethernet LAN Ring (b) Token Ring LAN Dual ring (c) FDDI LAN
  • 8. 8 Network connectivity type Speed Transmission time for 10 Mbytes (Telephone) dial-up modem 14.4 Kbps 90 min ISDN modem 56/128 Kbps 45/12min T1 connection 1.54 Mbps 50s Ethernet 10 Mbps 9s Token ring 4/16 Mbps Fast Ethernet 100 Mbps FDDI 100 Mbps Gigabit Ethernet 1 Gbps ATM 25Mbps/2.4Gbs
  • 9. Interconnection -Networks of low capacity may be connected together via a backbone network which is a network of high capacity such as a FDDI network, a WAN network etc. -LANs and WANs can be interconnected via T1 or T3 digital leased lines -According to the protocols involved, networks interconnection is achieved using one or several of the following devices: →Bridge: a computer or device that links two similar LANs based on the same protocol. → Router: a communication computer that connects different types of 9 networks using different protocols. → B-router or Bridge/Router: a single device that combines both the functions of bridge and router. → Gateway: a network device that connects two different systems, using direct and systematic translation between protocols.
  • 10. 10 Toronto branch Ethernet LAN Router Vancouver branch Gateway Token Ring LAN Frame Relay ATM T1 line NY headquaters Bridge/Route Router Token Ring LAN Bridge Bridge/Router Ethernet
  • 11. Network Topology Diagram The specification of the network topology diagram requires the definition of the characteristics and entities underlying the network: -Geographical locations of the different components or subnets involved in the network. -Description of the LAN topology -Description of the WAN topology -Description of the network connectors such as routers, bridges, repeaters, and gateways. 11
  • 12. 12 2. Protocols -Define the rules that govern the communications between two computers connected to the network. -Roles: addressing and routing of messages, error detection and recovery, sequence and flow controls etc. -A protocol specification consists of the syntax, which defines the kinds and formats of the messages exchanged, and the semantic, which specifies the action taken by each entity when specific events occur. Example: HTTP protocol for communication between web browsers and servers.
  • 13. Request For Comments (RFC): specifications of the protocols involved in Internet Communications. -Example: sample of RFC 821 describing communications between 13 SMTP server and client. S: MAIL FROM: Paul@Alpha.ARPA R: 250 OK S: RCPT TO: Jack@Beta.ARPA R: 250 OK S: DATA R: 354 Beginning of mail; ending by <CRLF>.<CRLF> S: Blah blah blah S: …etc. S: <CRLF>.<CRLF> R: 250 OK
  • 14. -Protocols are designed based on a layered architecture such as the OSI reference model. -Each entity at a layer n communicates only with entities at layer n-1. -The data exchanged, known as Protocol Data Unit (PDU), goes back and forth through the layers, each layer adds or removes its own header and vice-versa. Therefore a layer n PDU may become a layer n-1 data. 14 nth layer (n-1)th layer … nth layer (n-1)th layer … Network
  • 15. 15 3. Protocol Layers The OSI (Open Systems Interconnection) Data Model -ISO standard for computer networks design and functioning. -Involves at least 7 layers, each playing a specific role when applications are communicating over the net. -During the sending process, each layer (from top to down) will add a specific header to the raw data. -At the reception, headers are eliminated conversely until the data arrived to the receiving application.
  • 16. 16 OSI Layers Application layer (applications connected to the network) Presentation layer (provides standard data representations for applications) Session layer (manages sessions among applications) Transport layer (provides end-to-end errors detection and correction) Network layer (handles connection to the network by the higher layers) Data-link layer (provides safe communication of data over the physical network) Physical layer (defines the physical characteristics of the network)
  • 17. Physical layer: ensures a safe and efficient travel of data; consists of electronic circuits for data transmission etc. Data link layer: in charge of data encapsulation under the form of packets and their interpretation at the physical layer. Network layer: in charge of packets transmission from a source A to a destination B. Transport layer: in charge of the delivery of packets from a source A to a destination B Session layer: in charge of the management of network access. Presentation layer: determines the format of the data transmitted to applications, data compressing/decompressing, encrypting etc. Application layer: contains the applications which are used by the end-user, such as Java, Word etc. 17
  • 18. The TCP/IP Model -Consists of only 4 layers: application, transport, internet and network. 18 Layers Application layer (applications and processes running on the network) Transport layer (provides end-to-end data delivery services) Internet layer (makes datagrams and handles data routing) Network layer (provides routines allowing access to the physical network)
  • 19. Network layer -Provides the same functionality as the physical, the data link and network layers in the OSI model. -Mapping between IP addresses and network physical addresses. -Encapsulation of IP datagrams, e.g packets, in format understandable by the network. Internet layer -Lies at the heart of TCP/IP. -Based on the Internet Protocol (IP), which provides the frame for transmitting data from place A to place B. Transport layer -Based on two main protocols: TCP (Transmission Control Protocol) and UDP (User Datagram protocol) Application layer -Combines the functions of the OSI application, presentation, and session layers. -Protocols involved in this layer: HTTP, FTP, SMTP etc. 19
  • 20. 4. Networks Interconnection/Internet Concept of Network Interconnection -First implemented in the Defense Advanced Research Project Agency Network (Arpanet), in 1966 in USA. -Consists of connecting several computer networks based on different protocols -Requires the definition of a common interconnection protocol on top the local protocols. -The Internet Protocol (IP) plays this role, by defining unique addresses for a network and a host machine. 20 FTP Telnet SMTP SNMP TCP/UDP IP Ethernet Arpanet Token ring
  • 21. 21 P1 P2 IP P4 P3
  • 22. 22 Internet Protocol (IP) Overview -The IP protocol provides two main functionality: →Decomposition of the initial information flow into packets of standardized size, and reassembling at the destination. →Routing of a packet through successive networks, from the source machine to the destination identified by its IP address. -Transmitted packets are not guaranteed to be delivered (datagram protocol). -The IP protocol does not request for connection (connectionless) before sending data and does not make any error detection. Functions -Decompose the initial data (to be sent) into datagrams. -Each datagram will have a header including, the IP address and the port number of the destination. -Datagrams are then sent to selected gateways, e.g IP routers, connected at the same time to the local network and to an IP service provider network.
  • 23. -Datagrams are transferred from gateways to gateways until they arrived at their final destination. 23 Sender Receiver packet1 packet2 Routers
  • 24. Structure of an IP packet -The fields at the beginning of the packet, called the frame header, define the IP protocol’s functionality and limitations. -32 bits are allocated for encoding source and destination addresses (32 bits for each of these address fields). -The remainder of the header (16 bits) encodes various information such as the total packet length in bytes. -Hence an IP packet can be a maximum of 64Kb long. 24 0 10 12 16 20 24 Header Checksum Source address Destination address Options Data
  • 25. Transmission Control Protocol (TCP) Overview -TCP provides by using IP packets a basic service that does guarantee safe delivery: →error detection →safe data transmission →assurance that data are received in the correct order -Before sending data, TCP requires that the computers communicating establish a connection (connection-oriented protocol). 25 Client TCP Server SYN SYN_ACK ACK DATA DATA ACK DATA FIN FIN ACK
  • 26. -TCP provides support for sending and receiving arbitrary amounts of data as one big stream of byte data (IP is limited to 64Kb). -TCP does so by breaking up the data stream into separate IP packets. -Packets are numbered, and reassembled on arrival, using sequence and sequence acknowledge numbers. -TCP also improves the capability of IP by specifying port numbers. → There are 65,536 different TCP ports (sockets) through which every 26 TCP/IP machine can talk. Structure of a TCP packet 0 2 4 8 12 20 Source port Destination port Sequence No. Sequence Ack. No. Misc. header Data
  • 27. User Datagram Protocol (UDP) Overview -Datagram protocol also built on top of IP. -Has the same packet-size limit (64Kb) as IP, but allows for port number specification. -Provides also 65,536 different ports. -Hence, every machine has two sets of 65,536 ports: one for TCP and the other for UDP. -Connectionless protocol, without any error detection facility. -Provides only support for data transmission from one end to the other, without any further verification. -The main interest of UDP is that since it does not make further verification, it is very fast. -Useful for sending small size data in a repetitive way such as time information. 27
  • 28. 4.5 Internet Application Protocols On top of TCP/IP, several services have been developed in order to homogenize applications of same nature: -FTP (File Transfer Protocol) allows the transfer of collection of files between two machines connected to the Internet. -Telnet (Terminal Protocol) allows a user to connect to a remote host in terminal mode. -NNTP (Network News Transfer Protocol) allows the constitution of communication groups (newsgroups) organized around specific topics. -SMTP (Simple Mail Transfer Protocol) defines a basic service for electronic mails. -SNMP (Simple Network Management Protocol) allows the management of the network. 28 FTP Telnet SMTP SNMP TCP/UDP IP Ethernet Arpanet Token ring