SlideShare ist ein Scribd-Unternehmen logo
1 von 23
1-1© 2001 by Prentice Hall
Local Area Networks, 3rd Edition
David A. Stamper
Part 1: Introduction to Data
Communications and Local Area
Networks
Chapter 1
Introduction to Data
communications
© 2001 by Prentice Hall
Chapter Preview
In this chapter you will study:
• The requirements for communication
• What constitutes a network
• The various types of networks in
common use today
• The OSI Reference Model
• Some of the basic terminology of
data communications and networks
© 2001 by Prentice Hall
Essential Elements of
Communication
• A message
• A sender
• A receiver
• A medium
© 2001 by Prentice Hall
Understanding the Message
• In computer systems, data can be
represented by any of several
different codes, the two most
common being:
– the American Standard Code for Information
Interchange (ASCII)
– the Extended Binary Coded Decimal Interchange
Code (EBCDIC)
© 2001 by Prentice Hall
Security
• Sensitive data like your credit card
number or other secret data should be
safeguarded during transmission. The
most common mechanism for protecting
data during transmission is encryption.
– Encryption transforms plain text into an (presumably)
undecipherable form called cipher-text.
© 2001 by Prentice Hall
Two Types of Networks
• Terminal Network
– consists of a single host computer with attached
terminals
– the host computer does all or most of the processing,
and the terminals imply act as input/output (I/O) devices
through which a person gains access to the host’s
applications.
• Network of Computers
– two or more nodes connected by a data communications
medium.
– individual nodes may have terminals attached to them
– a single node on this network can look just like the
terminal network
© 2001 by Prentice Hall
Three Network Subtypes
• Local Area Network (LAN)
• Metropolitan Area Network (MAN)
• Wide Area Network (WAN)
© 2001 by Prentice Hall
LAN/MAN/WAN Comparison
Limited—typically up
to 2,500 meters or 2
miles
High—typically in
excess of 10 Mbps—
10,100 and 1,000 are
standard
Locally owned—
twisted-pair wires,
fiber optic cable,
wireless (not satellite)
Can be any, but most
are desktop computers
Limited—typically up
to 200 kilometers or
100 miles
High—typically
100 Mbps
Locally owned and
common carrier—
twisted-pair wires,
fiber optic cable
Can be any, but most
are desktop computers
and minicomputers
Unlimited
Slower—usually 1.5
Mbps
Locally owned and
common carrier—
twisted-pair wires,
coaxial cable, fiber
optic cable, wireless to
include satellite
Can be any, but most
are desktop computers
Distance
Speed
Media
Nodes
LAN MAN WAN
© 2001 by Prentice Hall
The OSI Reference Model
• The problem of network interconnection is
so important that the ISO created the OSI
Reference Model that describes the
functions a generic network needs to
provide.
• The OSI Reference Model has become the
basis for many data communications
standards.
– Because these standards are placed in the public domain, they are
called open standards and lead to open systems.
© 2001 by Prentice Hall
OSI Peer Layer Communication
ApplicationApplication
PresentationPresentation
SessionSession
TransportTransport
NetworkNetwork
Data LinkData Link
PhysicalPhysical
ApplicationApplication
PresentationPresentation
SessionSession
TransportTransport
NetworkNetwork
Data LinkData Link
PhysicalPhysical
Processor 1 Processor 2
Logical Path Physical Path
© 2001 by Prentice Hall
OSI Reference Model Formatting
Trans-Id Data Date=dd/mm/yy
Trans-Id Data Date=mm-dd-yyyy
ID Length Trans-Id Data Date=mm-dd-yyyy
TSAP ChkSum ID Length Trans-Id Data Date=mm-dd-yyyy
Address Seq Nbr TSAP ChkSum ID Length Trans-Id Data Date=mm-dd-yyyy
Header Address Seq Nbr TSAP ChkSum ID Length Trans-Id Data Date=mm-dd-yyyy Chksum
(a) Application Layer
(b) Presentation Layer
(c) Session Layer
(d) Transport Layer
(e) Network Layer
(f) Data Link Layer
© 2001 by Prentice Hall
The OSI Model at Work
• Application Layer
– The application on Node A builds a record with a transaction
identifier, the number of the account to be updated, the date and
time of the transaction, and the amount to be deducted.
• Presentation Layer
– The presentation layer is responsible for translating from one format
to another.
• Session Layer
– The session layer’s major functions are to set up and perhaps
monitor a set of dialogue rules by which the two applications can
communicate and to bring a session to an orderly conclusion.
© 2001 by Prentice Hall
The OSI Model at Work (cont.)
• Transport Layer
– The transport layer is the first of the OSI layers responsible for
actually transmitting the data.
• Network Layer
– The network layer provides accounting and routing functions.
• Data Link Layer
– The data link layer is responsible for data delineation, error
detection,and logical control of the link.
• Physical Layer
– The physical layer does not append anything to the message. It
simply accepts the message from the data link layer and translates
the bits into signals on the medium.
© 2001 by Prentice Hall
Receiving the Message
1. The message is passed over the link connecting Nodes A
and X.
2. The message is passed to the data link layer in Node X. The
message is checked for transmission errors, the PDU
information applied by A’s data link layer is removed, and
the message is sent to X’s network layer.
3. X’s network layer records the accounting information for
the message and then strips off the network layer protocol
data and examines the destination address. The destination
is not Node X in this case, so the network layer consults its
network routing table and determines the next link on the
path to Node M. X’s network layer affixes the proper
network layer protocol data and sends the message to
Node X’s data link layer.
© 2001 by Prentice Hall
Receiving the Message (cont.)
4. Node X’s data link layer creates its PDU and sends the
message to Node M.
5. Node M’s data link layer receives the message, strips off
Node X’s data link layer protocol data, checks for
transmission errors, and passes the data up to Node M’s
network layer.
6. Node M’s network layer gathers accounting data, strips off
the network layer protocol data, and fins that the message
is destined for an application in this node.
7. The message is passed up to M’s transport layer, where the
sequence number is checked to ensure that no messages
have been lost. The transport layer protocol data is
removed.
© 2001 by Prentice Hall
Receiving the Message (cont.)
8. The message arrives at the session layer, where
relevant protocol data is examined and remove.
9. The message arrives at Node M’s presentation
layer, where appropriate action is taken.
10.The message arrives at the application, where
it is acted on.
© 2001 by Prentice Hall
General Network Implementations:
LANs
• A LAN services a limited geographic area at high speeds—
usually 10 million bits per second or higher. All
components of the LAN are commonly owned by the
organization that uses it.
• The nodes in many of today’s LANs are desktop systems
like personal computers. Henceforth, we will also use the
terms workstations, clients, and servers in referring to LAN
nodes.
• A workstation is used here to represent a LAN user’s
computer; other terms used in referring to a workstation
are client and node.
• A server is a network node that is dedicated to providing
services to client nodes.
© 2001 by Prentice Hall
General Network Implementations:
MANs
• A MAN (metropolitan area network) is a high-
speed network covering wider distances than
LAN.
• A MAN spans distances of approximately 100
miles; therefore, it is suitable for connecting
devices and LANs in a metropolitan area.
• MAN speeds are typically 100 Mbps or higher.
• The most commonly implemented MAN is the
fiber distributed data interface (FDDI). It operates
at 100 Mbps over fiber optic cable for distances
up to 200 kilometers.
© 2001 by Prentice Hall
General Network Implementations:
WANs
• A WAN is the oldest type of network.
• WANs generally span a wide geographic area like
a state, province, country, or multiple countries.
However, some WANs are confined to a limited
geographic area, like a LAN.
• A WAN in a limited geographic area could be
easily extended over a wide area using the same
technologies. The same is not true of a LAN.
© 2001 by Prentice Hall
General Network Implementations:
VANs
• A VAN is a network owned by a communications
utility that sells the services of the network to
other companies.
• A communications utility that owns a VAN
provides connectivity to multiple locations.
• The value added by the communications utility is
the maintenance and management of the
communications circuits.
© 2001 by Prentice Hall
General Network Implementations:
Enterprise Networks
• An enterprise network is an organization’s
complete network.
• With the advent of LANs, many companies
installed departmental LANs to improve the
productivity of work groups.
• Soon, these companies realized that there was a
benefit to having users on one LAN communicate
with users or applications on other LANs or on
the WAN, and the various networks were
connected together to form one corporate-wide
network, the enterprise network.
© 2001 by Prentice Hall
General Network Implementations:
The Internet
• An internet (with a lowercase ‘i’) is the
interconnection of two or more networks. An
enterprise networks just described is an example
of an internet.
• The Internet (with an uppercase ‘I’) is a specific
instance of an internet.
• The Internet is a global network of networks. The
Internet is made up of hundreds of networks,
thousands of nodes, and millions of users
throughout most countries of the world.
© 2001 by Prentice Hall
General Network Implementations:
Intranets
• An intranet is an organization’s private Web.
• Companies have found that WWW capabilities
can improve the information flow and availability
in a company.
• Companies may use an intranet rather than
publishing on the Internet because the
information being provided is intended for
corporate use only and not for the public at large.

Weitere ähnliche Inhalte

Was ist angesagt?

Fundamentals of Networking
Fundamentals of NetworkingFundamentals of Networking
Fundamentals of Networkingjashhad
 
Lec 1(Introduction to Computer Networks & internet)
Lec 1(Introduction to Computer Networks & internet)Lec 1(Introduction to Computer Networks & internet)
Lec 1(Introduction to Computer Networks & internet)maamir farooq
 
Introduction to Data Communication
Introduction to Data CommunicationIntroduction to Data Communication
Introduction to Data CommunicationKamal Acharya
 
Chapter 1: Introduction to Data Communication and Networks
Chapter 1: Introduction to Data Communication and NetworksChapter 1: Introduction to Data Communication and Networks
Chapter 1: Introduction to Data Communication and NetworksShafaan Khaliq Bhatti
 
Computer Networks | Unit-1 | GTU | 4th Semester
Computer Networks | Unit-1 | GTU | 4th Semester Computer Networks | Unit-1 | GTU | 4th Semester
Computer Networks | Unit-1 | GTU | 4th Semester Prof. Maulik Trivedi
 
Overview of data communication and networking
Overview of data communication and networkingOverview of data communication and networking
Overview of data communication and networkingSisir Ghosh
 
1. introduction data comm
1. introduction data comm1. introduction data comm
1. introduction data commHumayoun Kabir
 
Data communications
Data communicationsData communications
Data communicationsUMaine
 
CND_22634_UNIT1_MSBTE_Computer network and Data Communication
CND_22634_UNIT1_MSBTE_Computer network and Data CommunicationCND_22634_UNIT1_MSBTE_Computer network and Data Communication
CND_22634_UNIT1_MSBTE_Computer network and Data CommunicationPranoti Doke
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer networkOnline
 
Fundamentals of Enterprise Networks
Fundamentals ofEnterprise NetworksFundamentals ofEnterprise Networks
Fundamentals of Enterprise NetworksVisualBee.com
 
Introduction to computer networks
Introduction to computer networksIntroduction to computer networks
Introduction to computer networkssanjeev kumar
 
1a introduction to network fundamentals
1a introduction to network fundamentals1a introduction to network fundamentals
1a introduction to network fundamentalskavish dani
 
Computer Networks
Computer NetworksComputer Networks
Computer NetworksRaj vardhan
 

Was ist angesagt? (20)

Fundamentals of Networking
Fundamentals of NetworkingFundamentals of Networking
Fundamentals of Networking
 
Lec 1(Introduction to Computer Networks & internet)
Lec 1(Introduction to Computer Networks & internet)Lec 1(Introduction to Computer Networks & internet)
Lec 1(Introduction to Computer Networks & internet)
 
Introduction to Data Communication
Introduction to Data CommunicationIntroduction to Data Communication
Introduction to Data Communication
 
Chapter 1: Introduction to Data Communication and Networks
Chapter 1: Introduction to Data Communication and NetworksChapter 1: Introduction to Data Communication and Networks
Chapter 1: Introduction to Data Communication and Networks
 
Computer Networks | Unit-1 | GTU | 4th Semester
Computer Networks | Unit-1 | GTU | 4th Semester Computer Networks | Unit-1 | GTU | 4th Semester
Computer Networks | Unit-1 | GTU | 4th Semester
 
Overview of data communication and networking
Overview of data communication and networkingOverview of data communication and networking
Overview of data communication and networking
 
Types of Networks
Types of NetworksTypes of Networks
Types of Networks
 
1. introduction data comm
1. introduction data comm1. introduction data comm
1. introduction data comm
 
Computer Network
Computer NetworkComputer Network
Computer Network
 
Lesson 1 introduction
Lesson 1 introductionLesson 1 introduction
Lesson 1 introduction
 
Data communications
Data communicationsData communications
Data communications
 
CND_22634_UNIT1_MSBTE_Computer network and Data Communication
CND_22634_UNIT1_MSBTE_Computer network and Data CommunicationCND_22634_UNIT1_MSBTE_Computer network and Data Communication
CND_22634_UNIT1_MSBTE_Computer network and Data Communication
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer network
 
Fundamentals of Enterprise Networks
Fundamentals ofEnterprise NetworksFundamentals ofEnterprise Networks
Fundamentals of Enterprise Networks
 
Networking
NetworkingNetworking
Networking
 
Introduction to computer networks
Introduction to computer networksIntroduction to computer networks
Introduction to computer networks
 
1a introduction to network fundamentals
1a introduction to network fundamentals1a introduction to network fundamentals
1a introduction to network fundamentals
 
Introduction to internet
Introduction to internetIntroduction to internet
Introduction to internet
 
Networking
NetworkingNetworking
Networking
 
Computer Networks
Computer NetworksComputer Networks
Computer Networks
 

Andere mochten auch

Programme du SPF du 05 avril 2012
Programme du SPF du 05 avril 2012Programme du SPF du 05 avril 2012
Programme du SPF du 05 avril 2012bsalim68
 
The combined International Symposium on Sports Medicine - 2013
The combined International Symposium on Sports Medicine - 2013The combined International Symposium on Sports Medicine - 2013
The combined International Symposium on Sports Medicine - 2013Ron Golan
 
Study the corrosion inhibition of urea fertilizer
Study the  corrosion inhibition of urea fertilizerStudy the  corrosion inhibition of urea fertilizer
Study the corrosion inhibition of urea fertilizerIAEME Publication
 
Simulative analysis of channel and qo s aware scheduler to enhance the capaci...
Simulative analysis of channel and qo s aware scheduler to enhance the capaci...Simulative analysis of channel and qo s aware scheduler to enhance the capaci...
Simulative analysis of channel and qo s aware scheduler to enhance the capaci...IAEME Publication
 

Andere mochten auch (9)

SISTEMA DE GESTION DE CONTENIDOS (CMS)
SISTEMA DE GESTION DE CONTENIDOS (CMS)SISTEMA DE GESTION DE CONTENIDOS (CMS)
SISTEMA DE GESTION DE CONTENIDOS (CMS)
 
Programme du SPF du 05 avril 2012
Programme du SPF du 05 avril 2012Programme du SPF du 05 avril 2012
Programme du SPF du 05 avril 2012
 
10120130406014 2-3
10120130406014 2-310120130406014 2-3
10120130406014 2-3
 
The combined International Symposium on Sports Medicine - 2013
The combined International Symposium on Sports Medicine - 2013The combined International Symposium on Sports Medicine - 2013
The combined International Symposium on Sports Medicine - 2013
 
2013 Buick Verano in Columbia SC - Catalog
2013 Buick Verano in Columbia SC - Catalog2013 Buick Verano in Columbia SC - Catalog
2013 Buick Verano in Columbia SC - Catalog
 
WRIT 312 Fall 2013
WRIT 312 Fall 2013WRIT 312 Fall 2013
WRIT 312 Fall 2013
 
COSC 111 - Spring 2012
COSC 111 - Spring 2012COSC 111 - Spring 2012
COSC 111 - Spring 2012
 
Study the corrosion inhibition of urea fertilizer
Study the  corrosion inhibition of urea fertilizerStudy the  corrosion inhibition of urea fertilizer
Study the corrosion inhibition of urea fertilizer
 
Simulative analysis of channel and qo s aware scheduler to enhance the capaci...
Simulative analysis of channel and qo s aware scheduler to enhance the capaci...Simulative analysis of channel and qo s aware scheduler to enhance the capaci...
Simulative analysis of channel and qo s aware scheduler to enhance the capaci...
 

Ähnlich wie Networks

Networking Bridge course_PPT.pptx
Networking Bridge course_PPT.pptxNetworking Bridge course_PPT.pptx
Networking Bridge course_PPT.pptxakshataharage
 
Computer_Network
Computer_NetworkComputer_Network
Computer_NetworkRavi Jiyani
 
Sept 2017 network standards and models
Sept 2017   network standards and modelsSept 2017   network standards and models
Sept 2017 network standards and modelsshahin raj
 
Computer network
Computer networkComputer network
Computer networkHazratAli82
 
interconnected_network_of_internets.pptx
interconnected_network_of_internets.pptxinterconnected_network_of_internets.pptx
interconnected_network_of_internets.pptxGaganaP13
 
Unit1_COMPUTER_COMMUNICATIONSSlides.pptx
Unit1_COMPUTER_COMMUNICATIONSSlides.pptxUnit1_COMPUTER_COMMUNICATIONSSlides.pptx
Unit1_COMPUTER_COMMUNICATIONSSlides.pptxNANDIKHATHARANIKUMAR1
 
Computer Networks: Evolution of Computer Networks.pptx
Computer Networks: Evolution of Computer Networks.pptxComputer Networks: Evolution of Computer Networks.pptx
Computer Networks: Evolution of Computer Networks.pptxVishwaTej10
 
2.Introduction to Network Devices.ppt
2.Introduction to Network Devices.ppt2.Introduction to Network Devices.ppt
2.Introduction to Network Devices.pptjaba kumar
 
Unit - 1.pptx
Unit - 1.pptxUnit - 1.pptx
Unit - 1.pptxKavinD11
 
Computer Networking_XII_CS_CBSE_OFKVS.ppt
Computer Networking_XII_CS_CBSE_OFKVS.pptComputer Networking_XII_CS_CBSE_OFKVS.ppt
Computer Networking_XII_CS_CBSE_OFKVS.pptmv9499596
 
Networking presentationNetworking presentation.pptNetworking presentation.ppt...
Networking presentationNetworking presentation.pptNetworking presentation.ppt...Networking presentationNetworking presentation.pptNetworking presentation.ppt...
Networking presentationNetworking presentation.pptNetworking presentation.ppt...nesarahmad37
 
Networkinglesson 120115093046-phpapp01
Networkinglesson 120115093046-phpapp01Networkinglesson 120115093046-phpapp01
Networkinglesson 120115093046-phpapp01Sour Summer
 

Ähnlich wie Networks (20)

Internet
InternetInternet
Internet
 
Networking Bridge course_PPT.pptx
Networking Bridge course_PPT.pptxNetworking Bridge course_PPT.pptx
Networking Bridge course_PPT.pptx
 
Computer_Network
Computer_NetworkComputer_Network
Computer_Network
 
Computer networks
Computer networksComputer networks
Computer networks
 
Sept 2017 network standards and models
Sept 2017   network standards and modelsSept 2017   network standards and models
Sept 2017 network standards and models
 
Computer network
Computer networkComputer network
Computer network
 
final NEtworking.pptx
final  NEtworking.pptxfinal  NEtworking.pptx
final NEtworking.pptx
 
interconnected_network_of_internets.pptx
interconnected_network_of_internets.pptxinterconnected_network_of_internets.pptx
interconnected_network_of_internets.pptx
 
Networking Fundamentals.ppt
Networking Fundamentals.pptNetworking Fundamentals.ppt
Networking Fundamentals.ppt
 
Chapter 6
Chapter 6Chapter 6
Chapter 6
 
Networking fundamentalsss
Networking fundamentalsssNetworking fundamentalsss
Networking fundamentalsss
 
Unit1_COMPUTER_COMMUNICATIONSSlides.pptx
Unit1_COMPUTER_COMMUNICATIONSSlides.pptxUnit1_COMPUTER_COMMUNICATIONSSlides.pptx
Unit1_COMPUTER_COMMUNICATIONSSlides.pptx
 
Itm 4
Itm 4Itm 4
Itm 4
 
Acem lan
Acem lanAcem lan
Acem lan
 
Computer Networks: Evolution of Computer Networks.pptx
Computer Networks: Evolution of Computer Networks.pptxComputer Networks: Evolution of Computer Networks.pptx
Computer Networks: Evolution of Computer Networks.pptx
 
2.Introduction to Network Devices.ppt
2.Introduction to Network Devices.ppt2.Introduction to Network Devices.ppt
2.Introduction to Network Devices.ppt
 
Unit - 1.pptx
Unit - 1.pptxUnit - 1.pptx
Unit - 1.pptx
 
Computer Networking_XII_CS_CBSE_OFKVS.ppt
Computer Networking_XII_CS_CBSE_OFKVS.pptComputer Networking_XII_CS_CBSE_OFKVS.ppt
Computer Networking_XII_CS_CBSE_OFKVS.ppt
 
Networking presentationNetworking presentation.pptNetworking presentation.ppt...
Networking presentationNetworking presentation.pptNetworking presentation.ppt...Networking presentationNetworking presentation.pptNetworking presentation.ppt...
Networking presentationNetworking presentation.pptNetworking presentation.ppt...
 
Networkinglesson 120115093046-phpapp01
Networkinglesson 120115093046-phpapp01Networkinglesson 120115093046-phpapp01
Networkinglesson 120115093046-phpapp01
 

Mehr von AyuMohamad

Seri kota-question
Seri kota-questionSeri kota-question
Seri kota-questionAyuMohamad
 
Selangor question
Selangor questionSelangor question
Selangor questionAyuMohamad
 
Seri kota-scheme
Seri kota-schemeSeri kota-scheme
Seri kota-schemeAyuMohamad
 
Selangor scheme
Selangor schemeSelangor scheme
Selangor schemeAyuMohamad
 
Wilayah persekutuan-scheme
Wilayah persekutuan-schemeWilayah persekutuan-scheme
Wilayah persekutuan-schemeAyuMohamad
 
Kota tinggi-scheme
Kota tinggi-schemeKota tinggi-scheme
Kota tinggi-schemeAyuMohamad
 
Wlayah persekutuan-question
Wlayah persekutuan-questionWlayah persekutuan-question
Wlayah persekutuan-questionAyuMohamad
 
Kota tinggi-question
Kota tinggi-questionKota tinggi-question
Kota tinggi-questionAyuMohamad
 
Marking scheme-trial-ict-2012
Marking scheme-trial-ict-2012Marking scheme-trial-ict-2012
Marking scheme-trial-ict-2012AyuMohamad
 
Soalan percubaan-ict-ting5-2012
Soalan percubaan-ict-ting5-2012Soalan percubaan-ict-ting5-2012
Soalan percubaan-ict-ting5-2012AyuMohamad
 
Seri kota-scheme
Seri kota-schemeSeri kota-scheme
Seri kota-schemeAyuMohamad
 
Contoh rpm rpt
Contoh rpm rptContoh rpm rpt
Contoh rpm rptAyuMohamad
 
Module networks
Module networksModule networks
Module networksAyuMohamad
 
Module multimedia
Module multimediaModule multimedia
Module multimediaAyuMohamad
 

Mehr von AyuMohamad (20)

Seri kota-question
Seri kota-questionSeri kota-question
Seri kota-question
 
Selangor question
Selangor questionSelangor question
Selangor question
 
Seri kota-scheme
Seri kota-schemeSeri kota-scheme
Seri kota-scheme
 
Selangor scheme
Selangor schemeSelangor scheme
Selangor scheme
 
Wilayah persekutuan-scheme
Wilayah persekutuan-schemeWilayah persekutuan-scheme
Wilayah persekutuan-scheme
 
Kota tinggi-scheme
Kota tinggi-schemeKota tinggi-scheme
Kota tinggi-scheme
 
Wlayah persekutuan-question
Wlayah persekutuan-questionWlayah persekutuan-question
Wlayah persekutuan-question
 
Kota tinggi-question
Kota tinggi-questionKota tinggi-question
Kota tinggi-question
 
Marking scheme-trial-ict-2012
Marking scheme-trial-ict-2012Marking scheme-trial-ict-2012
Marking scheme-trial-ict-2012
 
Soalan percubaan-ict-ting5-2012
Soalan percubaan-ict-ting5-2012Soalan percubaan-ict-ting5-2012
Soalan percubaan-ict-ting5-2012
 
Seri kota-scheme
Seri kota-schemeSeri kota-scheme
Seri kota-scheme
 
Topology
TopologyTopology
Topology
 
Software
SoftwareSoftware
Software
 
Software
SoftwareSoftware
Software
 
Hardware
HardwareHardware
Hardware
 
Contoh rpm rpt
Contoh rpm rptContoh rpm rpt
Contoh rpm rpt
 
Module networks
Module networksModule networks
Module networks
 
Module multimedia
Module multimediaModule multimedia
Module multimedia
 
Contoh rph
Contoh rphContoh rph
Contoh rph
 
Hsp ict 2006
Hsp ict 2006Hsp ict 2006
Hsp ict 2006
 

Kürzlich hochgeladen

A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 

Kürzlich hochgeladen (20)

A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 

Networks

  • 1. 1-1© 2001 by Prentice Hall Local Area Networks, 3rd Edition David A. Stamper Part 1: Introduction to Data Communications and Local Area Networks Chapter 1 Introduction to Data communications
  • 2. © 2001 by Prentice Hall Chapter Preview In this chapter you will study: • The requirements for communication • What constitutes a network • The various types of networks in common use today • The OSI Reference Model • Some of the basic terminology of data communications and networks
  • 3. © 2001 by Prentice Hall Essential Elements of Communication • A message • A sender • A receiver • A medium
  • 4. © 2001 by Prentice Hall Understanding the Message • In computer systems, data can be represented by any of several different codes, the two most common being: – the American Standard Code for Information Interchange (ASCII) – the Extended Binary Coded Decimal Interchange Code (EBCDIC)
  • 5. © 2001 by Prentice Hall Security • Sensitive data like your credit card number or other secret data should be safeguarded during transmission. The most common mechanism for protecting data during transmission is encryption. – Encryption transforms plain text into an (presumably) undecipherable form called cipher-text.
  • 6. © 2001 by Prentice Hall Two Types of Networks • Terminal Network – consists of a single host computer with attached terminals – the host computer does all or most of the processing, and the terminals imply act as input/output (I/O) devices through which a person gains access to the host’s applications. • Network of Computers – two or more nodes connected by a data communications medium. – individual nodes may have terminals attached to them – a single node on this network can look just like the terminal network
  • 7. © 2001 by Prentice Hall Three Network Subtypes • Local Area Network (LAN) • Metropolitan Area Network (MAN) • Wide Area Network (WAN)
  • 8. © 2001 by Prentice Hall LAN/MAN/WAN Comparison Limited—typically up to 2,500 meters or 2 miles High—typically in excess of 10 Mbps— 10,100 and 1,000 are standard Locally owned— twisted-pair wires, fiber optic cable, wireless (not satellite) Can be any, but most are desktop computers Limited—typically up to 200 kilometers or 100 miles High—typically 100 Mbps Locally owned and common carrier— twisted-pair wires, fiber optic cable Can be any, but most are desktop computers and minicomputers Unlimited Slower—usually 1.5 Mbps Locally owned and common carrier— twisted-pair wires, coaxial cable, fiber optic cable, wireless to include satellite Can be any, but most are desktop computers Distance Speed Media Nodes LAN MAN WAN
  • 9. © 2001 by Prentice Hall The OSI Reference Model • The problem of network interconnection is so important that the ISO created the OSI Reference Model that describes the functions a generic network needs to provide. • The OSI Reference Model has become the basis for many data communications standards. – Because these standards are placed in the public domain, they are called open standards and lead to open systems.
  • 10. © 2001 by Prentice Hall OSI Peer Layer Communication ApplicationApplication PresentationPresentation SessionSession TransportTransport NetworkNetwork Data LinkData Link PhysicalPhysical ApplicationApplication PresentationPresentation SessionSession TransportTransport NetworkNetwork Data LinkData Link PhysicalPhysical Processor 1 Processor 2 Logical Path Physical Path
  • 11. © 2001 by Prentice Hall OSI Reference Model Formatting Trans-Id Data Date=dd/mm/yy Trans-Id Data Date=mm-dd-yyyy ID Length Trans-Id Data Date=mm-dd-yyyy TSAP ChkSum ID Length Trans-Id Data Date=mm-dd-yyyy Address Seq Nbr TSAP ChkSum ID Length Trans-Id Data Date=mm-dd-yyyy Header Address Seq Nbr TSAP ChkSum ID Length Trans-Id Data Date=mm-dd-yyyy Chksum (a) Application Layer (b) Presentation Layer (c) Session Layer (d) Transport Layer (e) Network Layer (f) Data Link Layer
  • 12. © 2001 by Prentice Hall The OSI Model at Work • Application Layer – The application on Node A builds a record with a transaction identifier, the number of the account to be updated, the date and time of the transaction, and the amount to be deducted. • Presentation Layer – The presentation layer is responsible for translating from one format to another. • Session Layer – The session layer’s major functions are to set up and perhaps monitor a set of dialogue rules by which the two applications can communicate and to bring a session to an orderly conclusion.
  • 13. © 2001 by Prentice Hall The OSI Model at Work (cont.) • Transport Layer – The transport layer is the first of the OSI layers responsible for actually transmitting the data. • Network Layer – The network layer provides accounting and routing functions. • Data Link Layer – The data link layer is responsible for data delineation, error detection,and logical control of the link. • Physical Layer – The physical layer does not append anything to the message. It simply accepts the message from the data link layer and translates the bits into signals on the medium.
  • 14. © 2001 by Prentice Hall Receiving the Message 1. The message is passed over the link connecting Nodes A and X. 2. The message is passed to the data link layer in Node X. The message is checked for transmission errors, the PDU information applied by A’s data link layer is removed, and the message is sent to X’s network layer. 3. X’s network layer records the accounting information for the message and then strips off the network layer protocol data and examines the destination address. The destination is not Node X in this case, so the network layer consults its network routing table and determines the next link on the path to Node M. X’s network layer affixes the proper network layer protocol data and sends the message to Node X’s data link layer.
  • 15. © 2001 by Prentice Hall Receiving the Message (cont.) 4. Node X’s data link layer creates its PDU and sends the message to Node M. 5. Node M’s data link layer receives the message, strips off Node X’s data link layer protocol data, checks for transmission errors, and passes the data up to Node M’s network layer. 6. Node M’s network layer gathers accounting data, strips off the network layer protocol data, and fins that the message is destined for an application in this node. 7. The message is passed up to M’s transport layer, where the sequence number is checked to ensure that no messages have been lost. The transport layer protocol data is removed.
  • 16. © 2001 by Prentice Hall Receiving the Message (cont.) 8. The message arrives at the session layer, where relevant protocol data is examined and remove. 9. The message arrives at Node M’s presentation layer, where appropriate action is taken. 10.The message arrives at the application, where it is acted on.
  • 17. © 2001 by Prentice Hall General Network Implementations: LANs • A LAN services a limited geographic area at high speeds— usually 10 million bits per second or higher. All components of the LAN are commonly owned by the organization that uses it. • The nodes in many of today’s LANs are desktop systems like personal computers. Henceforth, we will also use the terms workstations, clients, and servers in referring to LAN nodes. • A workstation is used here to represent a LAN user’s computer; other terms used in referring to a workstation are client and node. • A server is a network node that is dedicated to providing services to client nodes.
  • 18. © 2001 by Prentice Hall General Network Implementations: MANs • A MAN (metropolitan area network) is a high- speed network covering wider distances than LAN. • A MAN spans distances of approximately 100 miles; therefore, it is suitable for connecting devices and LANs in a metropolitan area. • MAN speeds are typically 100 Mbps or higher. • The most commonly implemented MAN is the fiber distributed data interface (FDDI). It operates at 100 Mbps over fiber optic cable for distances up to 200 kilometers.
  • 19. © 2001 by Prentice Hall General Network Implementations: WANs • A WAN is the oldest type of network. • WANs generally span a wide geographic area like a state, province, country, or multiple countries. However, some WANs are confined to a limited geographic area, like a LAN. • A WAN in a limited geographic area could be easily extended over a wide area using the same technologies. The same is not true of a LAN.
  • 20. © 2001 by Prentice Hall General Network Implementations: VANs • A VAN is a network owned by a communications utility that sells the services of the network to other companies. • A communications utility that owns a VAN provides connectivity to multiple locations. • The value added by the communications utility is the maintenance and management of the communications circuits.
  • 21. © 2001 by Prentice Hall General Network Implementations: Enterprise Networks • An enterprise network is an organization’s complete network. • With the advent of LANs, many companies installed departmental LANs to improve the productivity of work groups. • Soon, these companies realized that there was a benefit to having users on one LAN communicate with users or applications on other LANs or on the WAN, and the various networks were connected together to form one corporate-wide network, the enterprise network.
  • 22. © 2001 by Prentice Hall General Network Implementations: The Internet • An internet (with a lowercase ‘i’) is the interconnection of two or more networks. An enterprise networks just described is an example of an internet. • The Internet (with an uppercase ‘I’) is a specific instance of an internet. • The Internet is a global network of networks. The Internet is made up of hundreds of networks, thousands of nodes, and millions of users throughout most countries of the world.
  • 23. © 2001 by Prentice Hall General Network Implementations: Intranets • An intranet is an organization’s private Web. • Companies have found that WWW capabilities can improve the information flow and availability in a company. • Companies may use an intranet rather than publishing on the Internet because the information being provided is intended for corporate use only and not for the public at large.