SlideShare a Scribd company logo
AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
MODULE-II
By
Sushree Sangita ray
AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
Module -II
By
Prof.Sushree Sangita Ray
AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
Computer Networks and Internet Technology
• Introduction to Computer Networks,
• Networking components,
• Classification and types of Networks,
• Network Topologies
• Overview with Advantages and Disadvantages, Communication Channels,
• Client Server Architecture,
• LAN concepts,
• Introduction to Internet (History, Concepts, & Myths),
• Difference between Internet, Intranet and Extranet,
• Domain Name Service,
• Internet Protocols and Addressing,
• Services of Internet,
• Internet and Support Technologies,
• Censorship and Privacy issues
AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
Introduction
• A computer network is a group of
computer systems and other computing
hardware devices that are linked together
through communication channels to
facilitate communication and resource-
sharing among a wide range of users.
Networks are commonly categorized
based on their characteristics.
AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
5
To separate / connect one corporate division with
another.
To connect two LANs with different protocols.
To connect a LAN to the Internet.
To break a LAN into segments to relieve traffic
congestion.
To provide a security wall between two different types
of users.
Why Interconnect?
AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
Computer Network
AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
Network component
AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
Network component
• Network Interface Card (NIC)
• Hub
• Switches
• Router
• Modem
• Cables and connectors
• Software
• Servers
AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
Network Interface Cards
A network card, network
adapter or NIC (network
interface card) is a piece of
computer hardware
designed to allow
computers to communicate
over a computer network. It
provides physical access to
a networking medium and
often provides a low-level
addressing system through
the use of MAC addresses.
It allows users to connect to
each other either by using
cables or wirelessly.
AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
HUB
A hub interconnects two or
more workstations into a
local area network.
When a workstation
transmits to a hub, the hub
immediately resends the
data frame out all
connecting links.
A hub can be managed or
unmanaged. A managed
hub possesses enough
processing power that it
can be managed from a
remote location
AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
Bridge
A bridge (or bridge-like device) can be
used to connect two similar LANs,
such as two CSMA/CD LANs.
A bridge can also be used to connect
two closely similar LANs, such as a
CSMA/CD LAN and a token ring
LAN.
The bridge examines the destination
address in a frame and either forwards
this frame onto the next LAN or does
not.
The bridge examines the source
address in a frame and places this
address in a routing table, to be used
for future routing decisions
AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
Transparent Bridge
A transparent bridge does not need
programming but observes all traffic
and builds routing tables from this
observation.
This observation is called backward
learning.
Each bridge has two connections
(ports) and there is a routing table
associated with each port.
A bridge observes each frame that
arrives at a port, extracts the source
address from the frame, and places that
address in the port’s routing table.
A transparent bridge is found with
CSMA/CD (Carrier Sense Multiple
Access with collision Detection)
LANs
AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
13
A transparent bridge can also convert one frame format to
another, but this does not happen too often anymore since
most networks are CSMA/CD.
Note that some people / manufacturers call a bridge such as
this a gateway or sometimes a router.
The bridge removes the headers and trailers from one
frame format and inserts (encapsulates) the headers and
trailers for the second frame format.
Transparent Bridges
AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
Remote Bridges
A remote bridge is capable of
passing a data frame from one
local area network to another
when the two LANs are separated
by a long distance and there is a
wide area network connecting the
two LANs.
A remote bridge takes the frame
before it leaves the first LAN and
encapsulates the WAN headers
and trailers.
When the packet arrives at the
destination remote bridge, that
bridge removes the WAN headers
and trailers leaving the original
frame.
AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
15
A remote bridge is capable of passing a data frame
from one local area network to another when the two
LANs are separated by a long distance and there is a
wide area network connecting the two LANs.
A remote bridge takes the frame before it leaves the
first LAN and encapsulates the WAN headers and
trailers.
When the packet arrives at the destination remote
bridge, that bridge removes the WAN headers and
trailers leaving the original frame.
Remote Bridges
AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
16
Remote Bridges
AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
Switches
The switch support multiple data transfers at one
time.
A switch that employs cut-through architecture is
passing on the frame before the entire frame has
arrived at the switch.
Multiple workstations connected to a switch use
dedicated segments. This is a very efficient way to
isolate heavy users from the network.
A switch can allow simultaneous access to multiple
servers, or multiple simultaneous connections to a
single server.
AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
18
Whether shared or dedicated segments are
involved, the primary goal of a switch is to
isolate a particular pattern of traffic from other
patterns of traffic or from the remainder of the
network
Switches, because of their backplane, can also
allow multiple paths of communications to
simultaneously occur
Isolating Traffic Patterns with Switches
AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
19
AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
20
AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
21
Isolating Traffic Patterns
with Switches
Using a pair of routers, it is possible to
interconnect to switched segments,
essentially creating one large local
area network
AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
A full duplex switch allows for simultaneous
transmission and reception of data to and from a
workstation.
This full duplex connection helps to eliminate
collisions.
To support a full duplex connection to a switch, at least
two pairs of wires are necessary - one for the receive
operation and one for the transmit operation. Most
people install four pairs today, so wiring is not the
problem.
Full Duplex Switches
AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
24
AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
Network servers
Network servers provide the
storage necessary for LAN
software.
They are usually the focal
point for the network operating
system.
Increasingly, network servers
are functioning as bridges,
switches, and routers. By
adding the appropriate card, a
server can assume multiple
functions.
AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
Routers
The device that connects a LAN to a
WAN or a WAN to a WAN.
A router accepts an outgoing packet,
removes any LAN headers and trailers,
and encapsulates the necessary WAN
headers and trailers.
Because a router has to make wide area
network routing decisions, the router
has to dig down into the network layer
of the packet to retrieve the network
destination address.
Thus, routers are often called “layer 3
devices”. They operate at the third
layer, or OSI network layer, of the
packet.
Routers often incorporate firewall
functions.
AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
Server
A server is a powerful computer that provides one or more services to a
network and its users.
On a local area network services will include: managing user accounts to
enable users to log in to the network, running software, enabling saving
to a shared area, printing and access to the internet.
Servers are left on at all times and are not used by individuals on a day-
to-day basis.
AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
Internetwork
• Two or more networks or network segments
connected using devices that operate at layer 3
(the 'network' layer) of the OSI Basic Reference
Model, such as a router. Any interconnection
among or between public, private, commercial,
industrial, or governmental networks may also be
defined as an internetwork.
• The interconnected networks use the Internet
Protocol. There are at least three variants of
internetwork, depending on who administers and
who participates in them:
• Internet
• Intranet
• Extranet 28
AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
Internet
The Internet is a
collection of
interconnected computer
networks, linked by
copper wires, fiber-optic
cables, wireless
connections, etc.; in
contrast, the Web is a
collection of
interconnected
documents and other
resources, linked by
hyperlinks and URLs.
Network of networks.
AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
Intranet
An intranet is a set of
interconnected networks,
using the Internet
Protocol and uses IP-
based tools such as web
browsers, that is under
the control of a single
administrative entity.
That administrative entity
closes the intranet to the
rest of the world, and
allows only specific
users. Most commonly,
an intranet is the internal
network of a company or
other enterprise
AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
Extranet
An extranet is a network or
internetwork that is limited in scope
to a single organization or entity but
which also has limited connections
to the networks of one or more
other usually, but not necessarily,
trusted organizations or entities
(e.g. a company's customers may
be given access to some part of its
intranet creating in this way an
extranet, while at the same time the
customers may not be considered
'trusted' from a security standpoint).
Technically, an extranet may also
be categorized as a CAN, MAN,
WAN, or other type of network,
although, by definition, an extranet
cannot consist of a single LAN; it
must have at least one connection
with an external network.
AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
Applications of an Extranet
• Extranets can be used for a wide variety of
applications. Educational institutions, medical facilities,
and military bases often include extranets in order to
secure confidential information while still allowing
users to access the Internet. For example, a school is
likely to use an extranet in order to allow teachers and
other moderators to make changes to a specific
section of the school website. Because extranets have
access to the Internet, teachers are able to modify
these sections from not only their classroom, but also
from home or another location. As was mentioned
earlier, companies are also likely to have an extranet
in order for changes to be made while employees are
away from the office.
AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
Advantages and Disadvantages of Extranet
Advantages
•
Extranets are able to transfer
large amounts of information.
• Are also able to provide a
secure location in which a
company and its partners or
clients are able to
communicate with each other
or make transaction.
• Are also able to communicate
with other extranets, many
individuals and groups alike
can exchange information at
the same time.
Disadvantages
• Extranets are not as secure as
intranets are because they are
connected to the Internet.
• This can allow hackers and thieves to
break into the network and steal or
overhear valuable or confidential
information.
• Extranets are also very expensive to
maintain as the company must pay for
hardware, software, training, and other
costs associated with extranets.
• Fortunately, third party vendors such
as an application service provider may
be able to reduce these costs
significantly.
•
AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
Network topology
• It is the study of the arrangement or mapping of
the elements (links, nodes, etc.) of a network,
especially the physical (real) and logical (virtual)
interconnections between nodes.
• A local area network (LAN) is one example of a
network that exhibits both a physical topology
and a logical topology.
• Any given node in the LAN will have one or more
links to one or more other nodes in the network
and the mapping of these links and nodes onto a
graph results in a geometrical shape that
determines the physical topology of the network.
• The physical and logical topologies might be
identical in any particular network but they also
may be different.
34
AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
• Any particular network topology is determined
only by the graphical mapping of the
configuration of physical and/or logical
connections between nodes .
• Network Topology is, therefore, technically a
part of graph theory. Distances between
nodes, physical interconnections, transmission
rates, and/or signal types may differ in two
networks and yet their topologies may be
identical.
35
AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
Types of Topology
AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
BUS Topology
AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
• The bus topology is designed in such a way that all the stations are
connected through a single cable known as a backbone cable.
• Each node is either connected to the backbone cable by drop cable or
directly connected to the backbone cable.
• When a node wants to send a message over the network, it puts a message
over the network. All the stations available in the network will receive the
message whether it has been addressed or not.
• The bus topology is mainly used in 802.3 (ethernet) and 802.4 standard
networks.
• The configuration of a bus topology is quite simpler as compared to other
topologies.
• The backbone cable is considered as a "single lane" through which the
message is broadcast to all the stations.
• The most common access method of the bus topologies is CSMA (Carrier
Sense Multiple Access).
AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
• CSMA: It is a media access control used to control the data flow so
that data integrity is maintained, i.e., the packets do not get lost.
There are two alternative ways of handling the problems that occur
when two nodes send the messages simultaneously.
• CSMA CD: CSMA CD (Collision detection) is an access method
used to detect the collision. Once the collision is detected, the
sender will stop transmitting the data. Therefore, it works on
"recovery after the collision".
• CSMA CA: CSMA CA (Collision Avoidance) is an access method
used to avoid the collision by checking whether the transmission
media is busy or not. If busy, then the sender waits until the media
becomes idle. This technique effectively reduces the possibility of
the collision. It does not work on "recovery after the collision".
AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
Advantages
• Low-cost cable: In bus topology,
nodes are directly connected to the
cable without passing through a hub.
Therefore, the initial cost of installation
is low.
• Moderate data speeds: Coaxial or
twisted pair cables are mainly used in
bus-based networks that support upto
10 Mbps.
• Familiar technology: Bus topology is
a familiar technology as the installation
and troubleshooting techniques are
well known, and hardware components
are easily available.
• Limited failure: A failure in one node
will not have any effect on other
nodes.
Disadvantages
• Extensive cabling: A bus topology is quite
simpler, but still it requires a lot of cabling.
• Difficult troubleshooting: It requires
specialized test equipment to determine the
cable faults. If any fault occurs in the cable,
then it would disrupt the communication for
all the nodes.
• Signal interference: If two nodes send the
messages simultaneously, then the signals
of both the nodes collide with each other.
• Reconfiguration difficult: Adding new
devices to the network would slow down the
network.
• Attenuation: Attenuation is a loss of signal
leads to communication issues. Repeaters
are used to regenerate the signal.
AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
Ring Topology
AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
Cont..
• Ring topology is like a bus topology, but with connected ends.
• The node that receives the message from the previous computer will
retransmit to the next node.
• The data flows in one direction, i.e., it is unidirectional.
• The data flows in a single loop continuously known as an endless
loop.
• It has no terminated ends, i.e., each node is connected to other
node and having no termination point.
• The data in a ring topology flow in a clockwise direction.
• The most common access method of the ring topology is token
passing.
• Token passing: It is a network access method in which token is passed
from one node to another node.
• Token: It is a frame that circulates around the network.
AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
Working of Token passing
• A token moves around the network, and it is
passed from computer to computer until it
reaches the destination.
• The sender modifies the token by putting the
address along with the data.
• The data is passed from one device to another
device until the destination address matches.
Once the token received by the destination
device, then it sends the acknowledgment to the
sender.
• In a ring topology, a token is used as a carrier.
AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
Advantages of Ring
topology:
• Network Management: Faulty devices can
be removed from the network without bringing
the network down.
• Product availability: Many hardware and
software tools for network operation and
monitoring are available.
• Cost: Twisted pair cabling is inexpensive and
easily available. Therefore, the installation
cost is very low.
• Reliable: It is a more reliable network
because the communication system is not
dependent on the single host computer.
Disadvantages of Ring topology:
• Difficult troubleshooting: It requires
specialized test equipment to determine the
cable faults. If any fault occurs in the cable,
then it would disrupt the communication for all
the nodes.
• Failure: The breakdown in one station leads
to the failure of the overall network.
• Reconfiguration difficult: Adding new
devices to the network would slow down the
network.
• Delay: Communication delay is directly
proportional to the number of nodes. Adding
new devices increases the communication
delay.
AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
Star Topology
AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
Cont..
• Star topology is an arrangement of the network in which every
node is connected to the central hub, switch or a central
computer.
• The central computer is known as a server, and the peripheral
devices attached to the server are known as clients.
• Coaxial cable or RJ-45 cables are used to connect the
computers.
• Hubs or Switches are mainly used as connection devices in
a physical star topology.
• Star topology is the most popular topology in network
implementation.
AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
Advantages of Star topology
• Efficient troubleshooting: Troubleshooting is quite efficient in a star
topology as compared to bus topology. In a bus topology, the
manager has to inspect the kilometers of cable. In a star topology, all
the stations are connected to the centralized network. Therefore, the
network administrator has to go to the single station to troubleshoot
the problem.
• Network control: Complex network control features can be easily
implemented in the star topology. Any changes made in the star
topology are automatically accommodated.
• Limited failure: As each station is connected to the central hub with
its own cable, therefore failure in one cable will not affect the entire
network.
• Familiar technology: Star topology is a familiar technology as its
tools are cost-effective.
• Easily expandable: It is easily expandable as new stations can be
added to the open ports on the hub.
• Cost effective: Star topology networks are cost-effective as it uses
inexpensive coaxial cable.
• High data speeds: It supports a bandwidth of approx 100Mbps.
Ethernet 100BaseT is one of the most popular Star topology
networks.
Disadvantages of Star
topology
• A Central point of
failure: If the central hub
or switch goes down,
then all the connected
nodes will not be able to
communicate with each
other.
• Cable: Sometimes cable
routing becomes difficult
when a significant
amount of routing is
required.
AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
Tree Topology
AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
Tree Topology
• Tree topology combines the characteristics of bus topology and
star topology.
• A tree topology is a type of structure in which all the computers
are connected with each other in hierarchical fashion.
• The top-most node in tree topology is known as a root node, and
all other nodes are the descendants of the root node.
• There is only one path exists between two nodes for the data
transmission. Thus, it forms a parent-child hierarchy.
AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
Cont..
• Advantages of Tree topology
• Support for broadband
transmission: Tree topology is mainly used
to provide broadband transmission, i.e.,
signals are sent over long distances without
being attenuated.
• Easily expandable: We can add the new
device to the existing network. Therefore,
we can say that tree topology is easily
expandable.
• Easily manageable: In tree topology, the
whole network is divided into segments
known as star networks which can be easily
managed and maintained.
• Error detection: Error detection and error
correction are very easy in a tree topology.
• Limited failure: The breakdown in one
station does not affect the entire network.
• Point-to-point wiring: It has point-to-point
wiring for individual segments.
• Disadvantages of Tree topology
• Difficult troubleshooting: If any
fault occurs in the node, then it
becomes difficult to troubleshoot
the problem.
• High cost: Devices required for
broadband transmission are very
costly.
• Failure: A tree topology mainly
relies on main bus cable and
failure in main bus cable will
damage the overall network.
• Reconfiguration difficult: If new
devices are added, then it
becomes difficult to reconfigure.
AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
Mesh Topology
AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
• Mesh technology is an arrangement of the network in which
computers are interconnected with each other through various
redundant connections.
• There are multiple paths from one computer to another computer.
• It does not contain the switch, hub or any central computer which
acts as a central point of communication.
• The Internet is an example of the mesh topology.
• Mesh topology is mainly used for WAN implementations where
communication failures are a critical concern.
• Mesh topology is mainly used for wireless networks.
• Mesh topology can be formed by using the formula:
Number of cables = (n*(n-1))/2;
• Where n is the number of nodes that represents the network.
AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
Mesh Topolog
• Mesh topology is divided into two
categories:
• Fully connected mesh topology
• Partially connected mesh topology
• Full Mesh Topology: In a full mesh
topology, each computer is connected to
all the computers available in the network.
• Partial Mesh Topology: In a partial mesh
topology, not all but certain computers are
connected to those computers with which
AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
Advantages of Mesh topology:
• Reliable: The mesh topology networks are
very reliable as if any link breakdown will not
affect the communication between connected
computers.
• Fast Communication: Communication is very
fast between the nodes.
• Easier Reconfiguration: Adding new devices
would not disrupt the communication between
other devices.
Disadvantages of Mesh topology
• Cost: A mesh topology contains a large
number of connected devices such as a router
and more transmission media than other
topologies.
• Management: Mesh topology networks are
very large and very difficult to maintain and
manage. If the network is not monitored
carefully, then the communication link failure
goes undetected.
• Efficiency: In this topology, redundant
connections are high that reduces the
efficiency of the network.
AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
Hybrid Topology
AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
• The combination of various different topologies is known
as Hybrid topology.
• A Hybrid topology is a connection between different links and
nodes to transfer the data.
• When two or more different topologies are combined together is
termed as Hybrid topology and if similar topologies are
connected with each other will not result in Hybrid topology. For
example, if there exist a ring topology in one branch of ICICI
bank and bus topology in another branch of ICICI bank,
connecting these two topologies will result in Hybrid topology.
AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
• Advantages of Hybrid Topology
• Reliable: If a fault occurs in any part of the network
will not affect the functioning of the rest of the
network.
• Scalable: Size of the network can be easily
expanded by adding new devices without affecting
the functionality of the existing network.
• Flexible: This topology is very flexible as it can be
designed according to the requirements of the
organization.
• Effective: Hybrid topology is very effective as it can
be designed in such a way that the strength of the
network is maximized and weakness of the network
is minimized.
• Disadvantages of Hybrid topology
• Complex design: The major drawback of the
Hybrid topology is the design of the Hybrid
network. It is very difficult to design the
architecture of the Hybrid network.
• Costly Hub: The Hubs used in the Hybrid
topology are very expensive as these hubs
are different from usual Hubs used in other
topologies.
• Costly infrastructure: The infrastructure cost
is very high as a hybrid network requires a lot
of cabling, network devices, etc.
•
AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
Network Model
• A communication subsystem is a complex piece of Hardware and
software. Early attempts for implementing the software for such
subsystems were based on a single, complex, unstructured
program with many interacting components. The resultant
software was very difficult to test and modify.
• To overcome such problem, the ISO has developed a layered
approach. In a layered approach, networking concept is divided
into several layers, and each layer is assigned a particular task.
• Therefore, we can say that networking tasks depend upon the
layers.
AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
• Layered Architecture
• The main aim of the layered architecture is to divide the design into small pieces.
• Each lower layer adds its services to the higher layer to provide a full set of services
to manage communications and run the applications.
• It provides modularity and clear interfaces, i.e., provides interaction between
subsystems.
• It ensures the independence between layers by providing the services from lower to
higher layer without defining how the services are implemented. Therefore, any
modification in a layer will not affect the other layers.
• The number of layers, functions, contents of each layer will vary from network to
network. However, the purpose of each layer is to provide the service from lower to a
higher layer and hiding the details from the layers of how the services are
implemented.
AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
• The basic elements of layered architecture are services,
protocols, and interfaces.
• Service: It is a set of actions that a layer provides to the higher layer.
• Protocol: It defines a set of rules that a layer uses to exchange the
information with peer entity. These rules mainly concern about both the
contents and order of the messages used.
• Interface: It is a way through which the message is transferred from one
layer to another layer.
• In a layer n architecture, layer n on one machine will
have a communication with the layer n on another
machine and the rules used in a conversation are known
as a layer-n protocol.
AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
Cont..
• In case of layered architecture, no data is
transferred from layer n of one machine to layer n of
another machine. Instead, each layer passes the
data to the layer immediately just below it, until the
lowest layer is reached.
• Below layer 1 is the physical medium through which
the actual communication takes place.
• In a layered architecture, unmanageable tasks are
divided into several small and manageable tasks.
• The data is passed from the upper layer to lower
layer through an interface. A Layered architecture
provides a clean-cut interface so that minimum
information is shared among different layers. It also
ensures that the implementation of one layer can be
easily replaced by another implementation.
• A set of layers and protocols is known as network
architecture.
AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
Why do we require Layered architecture?
• Divide-and-conquer approach: Divide-and-conquer approach makes a
design process in such a way that the unmanageable tasks are divided into
small and manageable tasks. In short, we can say that this approach
reduces the complexity of the design.
• Modularity: Layered architecture is more modular. Modularity provides the
independence of layers, which is easier to understand and implement.
• Easy to modify: It ensures the independence of layers so that
implementation in one layer can be changed without affecting other layers.
• Easy to test: Each layer of the layered architecture can be analyzed and
tested individually.
AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
OSI Model
• OSI stands for Open System Interconnection is a reference model that describes how
information from a software
• application in one computer
• moves through a physical medium to the software application in another computer.
• OSI consists of seven layers, and each layer performs a particular network function.
• OSI model was developed by the International Organization for Standardization (ISO) in
1984, and it is now considered as an architectural model for the inter-computer
communications.
• OSI model divides the whole task into seven smaller and manageable tasks. Each layer is
assigned a particular task.
• Each layer is self-contained, so that task assigned to each layer can be performed
independently.
AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
• The OSI model is divided into two layers:
upper layers and lower layers.
• The upper layer of the OSI model mainly
deals with the application related issues, and
they are implemented only in the software.
The application layer is closest to the end
user. Both the end user and the application
layer interact with the software applications.
An upper layer refers to the layer just above
another layer.
• The lower layer of the OSI model deals with
the data transport issues. The data link layer
and the physical layer are implemented in
hardware and software. The physical layer is
the lowest layer of the OSI model and is
closest to the physical medium. The physical
layer is mainly responsible for placing the
information on the physical medium.
AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
• There are the seven OSI layers. Each layer has different functions. A list of
seven layers are given below:
1. Physical Layer
2. Data-Link Layer
3. Network Layer
4. Transport Layer
5. Session Layer
6. Presentation Layer
7. Application Layer
AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
• Application Layer: This layer is responsible for providing interface to the application user. This layer
encompasses protocols which directly interact with the user.
• Presentation Layer: This layer defines how data in the native format of remote host should be
presented in the native format of host.
• Session Layer: This layer maintains sessions between remote hosts. For example, once
user/password authentication is done, the remote host maintains this session for a while and does
not ask for authentication again in that time span.
• Transport Layer: This layer is responsible for end-to-end delivery between hosts.
• Network Layer: This layer is responsible for address assignment and uniquely addressing hosts in a
network.
• Data Link Layer: This layer is responsible for reading and writing data from and onto the line. Link
errors are detected at this layer.
• Physical Layer: This layer defines the hardware, cabling wiring, power output, pulse rate etc.
AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
• https://www.youtube.com/watch?v=Ilk7UX
zV_Qc
AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
Internet Model
• Internet uses TCP/IP protocol suite, also
known as Internet suite. This defines
Internet Model which contains four layered
architecture. OSI Model is general
communication model, but Internet Model
is what the internet uses for all its
communication. The internet is
independent of its underlying network
architecture so is its Model.
AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
TCP/IP
• Application Layer: This layer defines the protocol which
enables user to interact with the network.For example,
FTP, HTTP etc.
• Transport Layer: This layer defines how data should flow
between hosts. Major protocol at this layer is Transmission
Control Protocol (TCP). This layer ensures data delivered
between hosts is in-order and is responsible for end-to-end
delivery.
• Internet Layer: Internet Protocol (IP) works on this layer.
This layer facilitates host addressing and recognition. This
layer defines routing.
• Link Layer: This layer provides mechanism of sending and
receiving actual data. Unlike its OSI Model counterpart, this
layer is independent of underlying network architecture and
hardware.
AMITYGLOBAL
BUSINESS SCHOOL Bhubaneswar
Thank You

More Related Content

Similar to MODULE-II.pptx

networking.ppt
networking.pptnetworking.ppt
networking.ppt
suchita74
 
Computer network_network devices
Computer network_network devicesComputer network_network devices
Computer network_network devices
Sweta Kumari Barnwal
 
Network Management Devices
Network Management DevicesNetwork Management Devices
Network Management Devices
Rahul P
 
Design and Implementation of Network Security using Inter-VLAN-Routing and DHCP
Design and Implementation of Network Security using Inter-VLAN-Routing and DHCPDesign and Implementation of Network Security using Inter-VLAN-Routing and DHCP
Design and Implementation of Network Security using Inter-VLAN-Routing and DHCP
Associate Professor in VSB Coimbatore
 
Networks
Networks   Networks
Networks
pavishkumarsingh
 
Nwk assignment body copy
Nwk assignment body   copyNwk assignment body   copy
Nwk assignment body copyTonny Michael
 
76924356 synopsis-network
76924356 synopsis-network76924356 synopsis-network
76924356 synopsis-network
lklokesh
 
High Performance Communication Networks 2
High Performance Communication Networks 2High Performance Communication Networks 2
High Performance Communication Networks 2
HemaDarshana
 
bank network design.pptx
bank network design.pptxbank network design.pptx
bank network design.pptx
suraj855239
 
Computer network
Computer networkComputer network
Computer network
sana zaib
 
Networking presentation
Networking presentationNetworking presentation
Networking presentationGajan Hai
 
Design and Analysis of a Broadcast Network Using Logical Segmentation
Design and Analysis of a Broadcast Network Using Logical SegmentationDesign and Analysis of a Broadcast Network Using Logical Segmentation
Design and Analysis of a Broadcast Network Using Logical Segmentation
TELKOMNIKA JOURNAL
 
Fundamentals of Computer Networking - Shift Education of Technology
Fundamentals of Computer Networking - Shift Education of TechnologyFundamentals of Computer Networking - Shift Education of Technology
Fundamentals of Computer Networking - Shift Education of Technology
Raphaff
 
Networking Devices
Networking DevicesNetworking Devices
Networking Devices
Nayan Dagliya
 
Presentation for slideshare
Presentation for slidesharePresentation for slideshare
Presentation for slideshare
BSITstudents
 
Networking devices
Networking devicesNetworking devices
Networking devices
Ankit Gupta
 
Ch # 08 communication devices, network typologies , network protocol
Ch # 08 communication devices, network typologies , network protocolCh # 08 communication devices, network typologies , network protocol
Ch # 08 communication devices, network typologies , network protocol
MuhammadRobeel3
 
computer networks
computer networkscomputer networks
computer networks
dee_rosal
 

Similar to MODULE-II.pptx (20)

networking.ppt
networking.pptnetworking.ppt
networking.ppt
 
Computer network_network devices
Computer network_network devicesComputer network_network devices
Computer network_network devices
 
Network Management Devices
Network Management DevicesNetwork Management Devices
Network Management Devices
 
Design and Implementation of Network Security using Inter-VLAN-Routing and DHCP
Design and Implementation of Network Security using Inter-VLAN-Routing and DHCPDesign and Implementation of Network Security using Inter-VLAN-Routing and DHCP
Design and Implementation of Network Security using Inter-VLAN-Routing and DHCP
 
Networks
Networks   Networks
Networks
 
Nwk assignment body copy
Nwk assignment body   copyNwk assignment body   copy
Nwk assignment body copy
 
76924356 synopsis-network
76924356 synopsis-network76924356 synopsis-network
76924356 synopsis-network
 
High Performance Communication Networks 2
High Performance Communication Networks 2High Performance Communication Networks 2
High Performance Communication Networks 2
 
bank network design.pptx
bank network design.pptxbank network design.pptx
bank network design.pptx
 
Computer network
Computer networkComputer network
Computer network
 
Networking presentation
Networking presentationNetworking presentation
Networking presentation
 
Design and Analysis of a Broadcast Network Using Logical Segmentation
Design and Analysis of a Broadcast Network Using Logical SegmentationDesign and Analysis of a Broadcast Network Using Logical Segmentation
Design and Analysis of a Broadcast Network Using Logical Segmentation
 
Fundamentals of Computer Networking - Shift Education of Technology
Fundamentals of Computer Networking - Shift Education of TechnologyFundamentals of Computer Networking - Shift Education of Technology
Fundamentals of Computer Networking - Shift Education of Technology
 
Networking Devices
Networking DevicesNetworking Devices
Networking Devices
 
Presentation for slideshare
Presentation for slidesharePresentation for slideshare
Presentation for slideshare
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
Computer networking
Computer networkingComputer networking
Computer networking
 
Cna
CnaCna
Cna
 
Ch # 08 communication devices, network typologies , network protocol
Ch # 08 communication devices, network typologies , network protocolCh # 08 communication devices, network typologies , network protocol
Ch # 08 communication devices, network typologies , network protocol
 
computer networks
computer networkscomputer networks
computer networks
 

Recently uploaded

Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
Kartik Tiwari
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
gb193092
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 

Recently uploaded (20)

Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 

MODULE-II.pptx

  • 2. AMITYGLOBAL BUSINESS SCHOOL Bhubaneswar Module -II By Prof.Sushree Sangita Ray
  • 3. AMITYGLOBAL BUSINESS SCHOOL Bhubaneswar Computer Networks and Internet Technology • Introduction to Computer Networks, • Networking components, • Classification and types of Networks, • Network Topologies • Overview with Advantages and Disadvantages, Communication Channels, • Client Server Architecture, • LAN concepts, • Introduction to Internet (History, Concepts, & Myths), • Difference between Internet, Intranet and Extranet, • Domain Name Service, • Internet Protocols and Addressing, • Services of Internet, • Internet and Support Technologies, • Censorship and Privacy issues
  • 4. AMITYGLOBAL BUSINESS SCHOOL Bhubaneswar Introduction • A computer network is a group of computer systems and other computing hardware devices that are linked together through communication channels to facilitate communication and resource- sharing among a wide range of users. Networks are commonly categorized based on their characteristics.
  • 5. AMITYGLOBAL BUSINESS SCHOOL Bhubaneswar 5 To separate / connect one corporate division with another. To connect two LANs with different protocols. To connect a LAN to the Internet. To break a LAN into segments to relieve traffic congestion. To provide a security wall between two different types of users. Why Interconnect?
  • 8. AMITYGLOBAL BUSINESS SCHOOL Bhubaneswar Network component • Network Interface Card (NIC) • Hub • Switches • Router • Modem • Cables and connectors • Software • Servers
  • 9. AMITYGLOBAL BUSINESS SCHOOL Bhubaneswar Network Interface Cards A network card, network adapter or NIC (network interface card) is a piece of computer hardware designed to allow computers to communicate over a computer network. It provides physical access to a networking medium and often provides a low-level addressing system through the use of MAC addresses. It allows users to connect to each other either by using cables or wirelessly.
  • 10. AMITYGLOBAL BUSINESS SCHOOL Bhubaneswar HUB A hub interconnects two or more workstations into a local area network. When a workstation transmits to a hub, the hub immediately resends the data frame out all connecting links. A hub can be managed or unmanaged. A managed hub possesses enough processing power that it can be managed from a remote location
  • 11. AMITYGLOBAL BUSINESS SCHOOL Bhubaneswar Bridge A bridge (or bridge-like device) can be used to connect two similar LANs, such as two CSMA/CD LANs. A bridge can also be used to connect two closely similar LANs, such as a CSMA/CD LAN and a token ring LAN. The bridge examines the destination address in a frame and either forwards this frame onto the next LAN or does not. The bridge examines the source address in a frame and places this address in a routing table, to be used for future routing decisions
  • 12. AMITYGLOBAL BUSINESS SCHOOL Bhubaneswar Transparent Bridge A transparent bridge does not need programming but observes all traffic and builds routing tables from this observation. This observation is called backward learning. Each bridge has two connections (ports) and there is a routing table associated with each port. A bridge observes each frame that arrives at a port, extracts the source address from the frame, and places that address in the port’s routing table. A transparent bridge is found with CSMA/CD (Carrier Sense Multiple Access with collision Detection) LANs
  • 13. AMITYGLOBAL BUSINESS SCHOOL Bhubaneswar 13 A transparent bridge can also convert one frame format to another, but this does not happen too often anymore since most networks are CSMA/CD. Note that some people / manufacturers call a bridge such as this a gateway or sometimes a router. The bridge removes the headers and trailers from one frame format and inserts (encapsulates) the headers and trailers for the second frame format. Transparent Bridges
  • 14. AMITYGLOBAL BUSINESS SCHOOL Bhubaneswar Remote Bridges A remote bridge is capable of passing a data frame from one local area network to another when the two LANs are separated by a long distance and there is a wide area network connecting the two LANs. A remote bridge takes the frame before it leaves the first LAN and encapsulates the WAN headers and trailers. When the packet arrives at the destination remote bridge, that bridge removes the WAN headers and trailers leaving the original frame.
  • 15. AMITYGLOBAL BUSINESS SCHOOL Bhubaneswar 15 A remote bridge is capable of passing a data frame from one local area network to another when the two LANs are separated by a long distance and there is a wide area network connecting the two LANs. A remote bridge takes the frame before it leaves the first LAN and encapsulates the WAN headers and trailers. When the packet arrives at the destination remote bridge, that bridge removes the WAN headers and trailers leaving the original frame. Remote Bridges
  • 17. AMITYGLOBAL BUSINESS SCHOOL Bhubaneswar Switches The switch support multiple data transfers at one time. A switch that employs cut-through architecture is passing on the frame before the entire frame has arrived at the switch. Multiple workstations connected to a switch use dedicated segments. This is a very efficient way to isolate heavy users from the network. A switch can allow simultaneous access to multiple servers, or multiple simultaneous connections to a single server.
  • 18. AMITYGLOBAL BUSINESS SCHOOL Bhubaneswar 18 Whether shared or dedicated segments are involved, the primary goal of a switch is to isolate a particular pattern of traffic from other patterns of traffic or from the remainder of the network Switches, because of their backplane, can also allow multiple paths of communications to simultaneously occur Isolating Traffic Patterns with Switches
  • 21. AMITYGLOBAL BUSINESS SCHOOL Bhubaneswar 21 Isolating Traffic Patterns with Switches Using a pair of routers, it is possible to interconnect to switched segments, essentially creating one large local area network
  • 23. AMITYGLOBAL BUSINESS SCHOOL Bhubaneswar A full duplex switch allows for simultaneous transmission and reception of data to and from a workstation. This full duplex connection helps to eliminate collisions. To support a full duplex connection to a switch, at least two pairs of wires are necessary - one for the receive operation and one for the transmit operation. Most people install four pairs today, so wiring is not the problem. Full Duplex Switches
  • 25. AMITYGLOBAL BUSINESS SCHOOL Bhubaneswar Network servers Network servers provide the storage necessary for LAN software. They are usually the focal point for the network operating system. Increasingly, network servers are functioning as bridges, switches, and routers. By adding the appropriate card, a server can assume multiple functions.
  • 26. AMITYGLOBAL BUSINESS SCHOOL Bhubaneswar Routers The device that connects a LAN to a WAN or a WAN to a WAN. A router accepts an outgoing packet, removes any LAN headers and trailers, and encapsulates the necessary WAN headers and trailers. Because a router has to make wide area network routing decisions, the router has to dig down into the network layer of the packet to retrieve the network destination address. Thus, routers are often called “layer 3 devices”. They operate at the third layer, or OSI network layer, of the packet. Routers often incorporate firewall functions.
  • 27. AMITYGLOBAL BUSINESS SCHOOL Bhubaneswar Server A server is a powerful computer that provides one or more services to a network and its users. On a local area network services will include: managing user accounts to enable users to log in to the network, running software, enabling saving to a shared area, printing and access to the internet. Servers are left on at all times and are not used by individuals on a day- to-day basis.
  • 28. AMITYGLOBAL BUSINESS SCHOOL Bhubaneswar Internetwork • Two or more networks or network segments connected using devices that operate at layer 3 (the 'network' layer) of the OSI Basic Reference Model, such as a router. Any interconnection among or between public, private, commercial, industrial, or governmental networks may also be defined as an internetwork. • The interconnected networks use the Internet Protocol. There are at least three variants of internetwork, depending on who administers and who participates in them: • Internet • Intranet • Extranet 28
  • 29. AMITYGLOBAL BUSINESS SCHOOL Bhubaneswar Internet The Internet is a collection of interconnected computer networks, linked by copper wires, fiber-optic cables, wireless connections, etc.; in contrast, the Web is a collection of interconnected documents and other resources, linked by hyperlinks and URLs. Network of networks.
  • 30. AMITYGLOBAL BUSINESS SCHOOL Bhubaneswar Intranet An intranet is a set of interconnected networks, using the Internet Protocol and uses IP- based tools such as web browsers, that is under the control of a single administrative entity. That administrative entity closes the intranet to the rest of the world, and allows only specific users. Most commonly, an intranet is the internal network of a company or other enterprise
  • 31. AMITYGLOBAL BUSINESS SCHOOL Bhubaneswar Extranet An extranet is a network or internetwork that is limited in scope to a single organization or entity but which also has limited connections to the networks of one or more other usually, but not necessarily, trusted organizations or entities (e.g. a company's customers may be given access to some part of its intranet creating in this way an extranet, while at the same time the customers may not be considered 'trusted' from a security standpoint). Technically, an extranet may also be categorized as a CAN, MAN, WAN, or other type of network, although, by definition, an extranet cannot consist of a single LAN; it must have at least one connection with an external network.
  • 32. AMITYGLOBAL BUSINESS SCHOOL Bhubaneswar Applications of an Extranet • Extranets can be used for a wide variety of applications. Educational institutions, medical facilities, and military bases often include extranets in order to secure confidential information while still allowing users to access the Internet. For example, a school is likely to use an extranet in order to allow teachers and other moderators to make changes to a specific section of the school website. Because extranets have access to the Internet, teachers are able to modify these sections from not only their classroom, but also from home or another location. As was mentioned earlier, companies are also likely to have an extranet in order for changes to be made while employees are away from the office.
  • 33. AMITYGLOBAL BUSINESS SCHOOL Bhubaneswar Advantages and Disadvantages of Extranet Advantages • Extranets are able to transfer large amounts of information. • Are also able to provide a secure location in which a company and its partners or clients are able to communicate with each other or make transaction. • Are also able to communicate with other extranets, many individuals and groups alike can exchange information at the same time. Disadvantages • Extranets are not as secure as intranets are because they are connected to the Internet. • This can allow hackers and thieves to break into the network and steal or overhear valuable or confidential information. • Extranets are also very expensive to maintain as the company must pay for hardware, software, training, and other costs associated with extranets. • Fortunately, third party vendors such as an application service provider may be able to reduce these costs significantly. •
  • 34. AMITYGLOBAL BUSINESS SCHOOL Bhubaneswar Network topology • It is the study of the arrangement or mapping of the elements (links, nodes, etc.) of a network, especially the physical (real) and logical (virtual) interconnections between nodes. • A local area network (LAN) is one example of a network that exhibits both a physical topology and a logical topology. • Any given node in the LAN will have one or more links to one or more other nodes in the network and the mapping of these links and nodes onto a graph results in a geometrical shape that determines the physical topology of the network. • The physical and logical topologies might be identical in any particular network but they also may be different. 34
  • 35. AMITYGLOBAL BUSINESS SCHOOL Bhubaneswar • Any particular network topology is determined only by the graphical mapping of the configuration of physical and/or logical connections between nodes . • Network Topology is, therefore, technically a part of graph theory. Distances between nodes, physical interconnections, transmission rates, and/or signal types may differ in two networks and yet their topologies may be identical. 35
  • 38. AMITYGLOBAL BUSINESS SCHOOL Bhubaneswar • The bus topology is designed in such a way that all the stations are connected through a single cable known as a backbone cable. • Each node is either connected to the backbone cable by drop cable or directly connected to the backbone cable. • When a node wants to send a message over the network, it puts a message over the network. All the stations available in the network will receive the message whether it has been addressed or not. • The bus topology is mainly used in 802.3 (ethernet) and 802.4 standard networks. • The configuration of a bus topology is quite simpler as compared to other topologies. • The backbone cable is considered as a "single lane" through which the message is broadcast to all the stations. • The most common access method of the bus topologies is CSMA (Carrier Sense Multiple Access).
  • 39. AMITYGLOBAL BUSINESS SCHOOL Bhubaneswar • CSMA: It is a media access control used to control the data flow so that data integrity is maintained, i.e., the packets do not get lost. There are two alternative ways of handling the problems that occur when two nodes send the messages simultaneously. • CSMA CD: CSMA CD (Collision detection) is an access method used to detect the collision. Once the collision is detected, the sender will stop transmitting the data. Therefore, it works on "recovery after the collision". • CSMA CA: CSMA CA (Collision Avoidance) is an access method used to avoid the collision by checking whether the transmission media is busy or not. If busy, then the sender waits until the media becomes idle. This technique effectively reduces the possibility of the collision. It does not work on "recovery after the collision".
  • 40. AMITYGLOBAL BUSINESS SCHOOL Bhubaneswar Advantages • Low-cost cable: In bus topology, nodes are directly connected to the cable without passing through a hub. Therefore, the initial cost of installation is low. • Moderate data speeds: Coaxial or twisted pair cables are mainly used in bus-based networks that support upto 10 Mbps. • Familiar technology: Bus topology is a familiar technology as the installation and troubleshooting techniques are well known, and hardware components are easily available. • Limited failure: A failure in one node will not have any effect on other nodes. Disadvantages • Extensive cabling: A bus topology is quite simpler, but still it requires a lot of cabling. • Difficult troubleshooting: It requires specialized test equipment to determine the cable faults. If any fault occurs in the cable, then it would disrupt the communication for all the nodes. • Signal interference: If two nodes send the messages simultaneously, then the signals of both the nodes collide with each other. • Reconfiguration difficult: Adding new devices to the network would slow down the network. • Attenuation: Attenuation is a loss of signal leads to communication issues. Repeaters are used to regenerate the signal.
  • 42. AMITYGLOBAL BUSINESS SCHOOL Bhubaneswar Cont.. • Ring topology is like a bus topology, but with connected ends. • The node that receives the message from the previous computer will retransmit to the next node. • The data flows in one direction, i.e., it is unidirectional. • The data flows in a single loop continuously known as an endless loop. • It has no terminated ends, i.e., each node is connected to other node and having no termination point. • The data in a ring topology flow in a clockwise direction. • The most common access method of the ring topology is token passing. • Token passing: It is a network access method in which token is passed from one node to another node. • Token: It is a frame that circulates around the network.
  • 43. AMITYGLOBAL BUSINESS SCHOOL Bhubaneswar Working of Token passing • A token moves around the network, and it is passed from computer to computer until it reaches the destination. • The sender modifies the token by putting the address along with the data. • The data is passed from one device to another device until the destination address matches. Once the token received by the destination device, then it sends the acknowledgment to the sender. • In a ring topology, a token is used as a carrier.
  • 44. AMITYGLOBAL BUSINESS SCHOOL Bhubaneswar Advantages of Ring topology: • Network Management: Faulty devices can be removed from the network without bringing the network down. • Product availability: Many hardware and software tools for network operation and monitoring are available. • Cost: Twisted pair cabling is inexpensive and easily available. Therefore, the installation cost is very low. • Reliable: It is a more reliable network because the communication system is not dependent on the single host computer. Disadvantages of Ring topology: • Difficult troubleshooting: It requires specialized test equipment to determine the cable faults. If any fault occurs in the cable, then it would disrupt the communication for all the nodes. • Failure: The breakdown in one station leads to the failure of the overall network. • Reconfiguration difficult: Adding new devices to the network would slow down the network. • Delay: Communication delay is directly proportional to the number of nodes. Adding new devices increases the communication delay.
  • 46. AMITYGLOBAL BUSINESS SCHOOL Bhubaneswar Cont.. • Star topology is an arrangement of the network in which every node is connected to the central hub, switch or a central computer. • The central computer is known as a server, and the peripheral devices attached to the server are known as clients. • Coaxial cable or RJ-45 cables are used to connect the computers. • Hubs or Switches are mainly used as connection devices in a physical star topology. • Star topology is the most popular topology in network implementation.
  • 47. AMITYGLOBAL BUSINESS SCHOOL Bhubaneswar Advantages of Star topology • Efficient troubleshooting: Troubleshooting is quite efficient in a star topology as compared to bus topology. In a bus topology, the manager has to inspect the kilometers of cable. In a star topology, all the stations are connected to the centralized network. Therefore, the network administrator has to go to the single station to troubleshoot the problem. • Network control: Complex network control features can be easily implemented in the star topology. Any changes made in the star topology are automatically accommodated. • Limited failure: As each station is connected to the central hub with its own cable, therefore failure in one cable will not affect the entire network. • Familiar technology: Star topology is a familiar technology as its tools are cost-effective. • Easily expandable: It is easily expandable as new stations can be added to the open ports on the hub. • Cost effective: Star topology networks are cost-effective as it uses inexpensive coaxial cable. • High data speeds: It supports a bandwidth of approx 100Mbps. Ethernet 100BaseT is one of the most popular Star topology networks. Disadvantages of Star topology • A Central point of failure: If the central hub or switch goes down, then all the connected nodes will not be able to communicate with each other. • Cable: Sometimes cable routing becomes difficult when a significant amount of routing is required.
  • 49. AMITYGLOBAL BUSINESS SCHOOL Bhubaneswar Tree Topology • Tree topology combines the characteristics of bus topology and star topology. • A tree topology is a type of structure in which all the computers are connected with each other in hierarchical fashion. • The top-most node in tree topology is known as a root node, and all other nodes are the descendants of the root node. • There is only one path exists between two nodes for the data transmission. Thus, it forms a parent-child hierarchy.
  • 50. AMITYGLOBAL BUSINESS SCHOOL Bhubaneswar Cont.. • Advantages of Tree topology • Support for broadband transmission: Tree topology is mainly used to provide broadband transmission, i.e., signals are sent over long distances without being attenuated. • Easily expandable: We can add the new device to the existing network. Therefore, we can say that tree topology is easily expandable. • Easily manageable: In tree topology, the whole network is divided into segments known as star networks which can be easily managed and maintained. • Error detection: Error detection and error correction are very easy in a tree topology. • Limited failure: The breakdown in one station does not affect the entire network. • Point-to-point wiring: It has point-to-point wiring for individual segments. • Disadvantages of Tree topology • Difficult troubleshooting: If any fault occurs in the node, then it becomes difficult to troubleshoot the problem. • High cost: Devices required for broadband transmission are very costly. • Failure: A tree topology mainly relies on main bus cable and failure in main bus cable will damage the overall network. • Reconfiguration difficult: If new devices are added, then it becomes difficult to reconfigure.
  • 52. AMITYGLOBAL BUSINESS SCHOOL Bhubaneswar • Mesh technology is an arrangement of the network in which computers are interconnected with each other through various redundant connections. • There are multiple paths from one computer to another computer. • It does not contain the switch, hub or any central computer which acts as a central point of communication. • The Internet is an example of the mesh topology. • Mesh topology is mainly used for WAN implementations where communication failures are a critical concern. • Mesh topology is mainly used for wireless networks. • Mesh topology can be formed by using the formula: Number of cables = (n*(n-1))/2; • Where n is the number of nodes that represents the network.
  • 53. AMITYGLOBAL BUSINESS SCHOOL Bhubaneswar Mesh Topolog • Mesh topology is divided into two categories: • Fully connected mesh topology • Partially connected mesh topology • Full Mesh Topology: In a full mesh topology, each computer is connected to all the computers available in the network. • Partial Mesh Topology: In a partial mesh topology, not all but certain computers are connected to those computers with which
  • 54. AMITYGLOBAL BUSINESS SCHOOL Bhubaneswar Advantages of Mesh topology: • Reliable: The mesh topology networks are very reliable as if any link breakdown will not affect the communication between connected computers. • Fast Communication: Communication is very fast between the nodes. • Easier Reconfiguration: Adding new devices would not disrupt the communication between other devices. Disadvantages of Mesh topology • Cost: A mesh topology contains a large number of connected devices such as a router and more transmission media than other topologies. • Management: Mesh topology networks are very large and very difficult to maintain and manage. If the network is not monitored carefully, then the communication link failure goes undetected. • Efficiency: In this topology, redundant connections are high that reduces the efficiency of the network.
  • 56. AMITYGLOBAL BUSINESS SCHOOL Bhubaneswar • The combination of various different topologies is known as Hybrid topology. • A Hybrid topology is a connection between different links and nodes to transfer the data. • When two or more different topologies are combined together is termed as Hybrid topology and if similar topologies are connected with each other will not result in Hybrid topology. For example, if there exist a ring topology in one branch of ICICI bank and bus topology in another branch of ICICI bank, connecting these two topologies will result in Hybrid topology.
  • 57. AMITYGLOBAL BUSINESS SCHOOL Bhubaneswar • Advantages of Hybrid Topology • Reliable: If a fault occurs in any part of the network will not affect the functioning of the rest of the network. • Scalable: Size of the network can be easily expanded by adding new devices without affecting the functionality of the existing network. • Flexible: This topology is very flexible as it can be designed according to the requirements of the organization. • Effective: Hybrid topology is very effective as it can be designed in such a way that the strength of the network is maximized and weakness of the network is minimized. • Disadvantages of Hybrid topology • Complex design: The major drawback of the Hybrid topology is the design of the Hybrid network. It is very difficult to design the architecture of the Hybrid network. • Costly Hub: The Hubs used in the Hybrid topology are very expensive as these hubs are different from usual Hubs used in other topologies. • Costly infrastructure: The infrastructure cost is very high as a hybrid network requires a lot of cabling, network devices, etc. •
  • 58. AMITYGLOBAL BUSINESS SCHOOL Bhubaneswar Network Model • A communication subsystem is a complex piece of Hardware and software. Early attempts for implementing the software for such subsystems were based on a single, complex, unstructured program with many interacting components. The resultant software was very difficult to test and modify. • To overcome such problem, the ISO has developed a layered approach. In a layered approach, networking concept is divided into several layers, and each layer is assigned a particular task. • Therefore, we can say that networking tasks depend upon the layers.
  • 59. AMITYGLOBAL BUSINESS SCHOOL Bhubaneswar • Layered Architecture • The main aim of the layered architecture is to divide the design into small pieces. • Each lower layer adds its services to the higher layer to provide a full set of services to manage communications and run the applications. • It provides modularity and clear interfaces, i.e., provides interaction between subsystems. • It ensures the independence between layers by providing the services from lower to higher layer without defining how the services are implemented. Therefore, any modification in a layer will not affect the other layers. • The number of layers, functions, contents of each layer will vary from network to network. However, the purpose of each layer is to provide the service from lower to a higher layer and hiding the details from the layers of how the services are implemented.
  • 60. AMITYGLOBAL BUSINESS SCHOOL Bhubaneswar • The basic elements of layered architecture are services, protocols, and interfaces. • Service: It is a set of actions that a layer provides to the higher layer. • Protocol: It defines a set of rules that a layer uses to exchange the information with peer entity. These rules mainly concern about both the contents and order of the messages used. • Interface: It is a way through which the message is transferred from one layer to another layer. • In a layer n architecture, layer n on one machine will have a communication with the layer n on another machine and the rules used in a conversation are known as a layer-n protocol.
  • 61. AMITYGLOBAL BUSINESS SCHOOL Bhubaneswar Cont.. • In case of layered architecture, no data is transferred from layer n of one machine to layer n of another machine. Instead, each layer passes the data to the layer immediately just below it, until the lowest layer is reached. • Below layer 1 is the physical medium through which the actual communication takes place. • In a layered architecture, unmanageable tasks are divided into several small and manageable tasks. • The data is passed from the upper layer to lower layer through an interface. A Layered architecture provides a clean-cut interface so that minimum information is shared among different layers. It also ensures that the implementation of one layer can be easily replaced by another implementation. • A set of layers and protocols is known as network architecture.
  • 62. AMITYGLOBAL BUSINESS SCHOOL Bhubaneswar Why do we require Layered architecture? • Divide-and-conquer approach: Divide-and-conquer approach makes a design process in such a way that the unmanageable tasks are divided into small and manageable tasks. In short, we can say that this approach reduces the complexity of the design. • Modularity: Layered architecture is more modular. Modularity provides the independence of layers, which is easier to understand and implement. • Easy to modify: It ensures the independence of layers so that implementation in one layer can be changed without affecting other layers. • Easy to test: Each layer of the layered architecture can be analyzed and tested individually.
  • 63. AMITYGLOBAL BUSINESS SCHOOL Bhubaneswar OSI Model • OSI stands for Open System Interconnection is a reference model that describes how information from a software • application in one computer • moves through a physical medium to the software application in another computer. • OSI consists of seven layers, and each layer performs a particular network function. • OSI model was developed by the International Organization for Standardization (ISO) in 1984, and it is now considered as an architectural model for the inter-computer communications. • OSI model divides the whole task into seven smaller and manageable tasks. Each layer is assigned a particular task. • Each layer is self-contained, so that task assigned to each layer can be performed independently.
  • 64. AMITYGLOBAL BUSINESS SCHOOL Bhubaneswar • The OSI model is divided into two layers: upper layers and lower layers. • The upper layer of the OSI model mainly deals with the application related issues, and they are implemented only in the software. The application layer is closest to the end user. Both the end user and the application layer interact with the software applications. An upper layer refers to the layer just above another layer. • The lower layer of the OSI model deals with the data transport issues. The data link layer and the physical layer are implemented in hardware and software. The physical layer is the lowest layer of the OSI model and is closest to the physical medium. The physical layer is mainly responsible for placing the information on the physical medium.
  • 65. AMITYGLOBAL BUSINESS SCHOOL Bhubaneswar • There are the seven OSI layers. Each layer has different functions. A list of seven layers are given below: 1. Physical Layer 2. Data-Link Layer 3. Network Layer 4. Transport Layer 5. Session Layer 6. Presentation Layer 7. Application Layer
  • 67. AMITYGLOBAL BUSINESS SCHOOL Bhubaneswar • Application Layer: This layer is responsible for providing interface to the application user. This layer encompasses protocols which directly interact with the user. • Presentation Layer: This layer defines how data in the native format of remote host should be presented in the native format of host. • Session Layer: This layer maintains sessions between remote hosts. For example, once user/password authentication is done, the remote host maintains this session for a while and does not ask for authentication again in that time span. • Transport Layer: This layer is responsible for end-to-end delivery between hosts. • Network Layer: This layer is responsible for address assignment and uniquely addressing hosts in a network. • Data Link Layer: This layer is responsible for reading and writing data from and onto the line. Link errors are detected at this layer. • Physical Layer: This layer defines the hardware, cabling wiring, power output, pulse rate etc.
  • 68. AMITYGLOBAL BUSINESS SCHOOL Bhubaneswar • https://www.youtube.com/watch?v=Ilk7UX zV_Qc
  • 69. AMITYGLOBAL BUSINESS SCHOOL Bhubaneswar Internet Model • Internet uses TCP/IP protocol suite, also known as Internet suite. This defines Internet Model which contains four layered architecture. OSI Model is general communication model, but Internet Model is what the internet uses for all its communication. The internet is independent of its underlying network architecture so is its Model.
  • 70. AMITYGLOBAL BUSINESS SCHOOL Bhubaneswar TCP/IP • Application Layer: This layer defines the protocol which enables user to interact with the network.For example, FTP, HTTP etc. • Transport Layer: This layer defines how data should flow between hosts. Major protocol at this layer is Transmission Control Protocol (TCP). This layer ensures data delivered between hosts is in-order and is responsible for end-to-end delivery. • Internet Layer: Internet Protocol (IP) works on this layer. This layer facilitates host addressing and recognition. This layer defines routing. • Link Layer: This layer provides mechanism of sending and receiving actual data. Unlike its OSI Model counterpart, this layer is independent of underlying network architecture and hardware.