SlideShare ist ein Scribd-Unternehmen logo
1 von 51
Network
Protocol, Structure & Scope
Gaurav Kumar Goyal(066BCT514)
Janardan Chaudhary(066BCT516)
Nimesh Mishra(066BCT519)
Sanat Maharjan(066BCT531)
Network Protocol
What is network protocol ?
• Network Protocol is a set of rules that governs the communications
between computers on a network.
• The computer network consists of many different protocols for helping it
carrying data packets.
• These protocols are designed to work on different level of network layers.
The functionality of these layers are different depending on the network
model.
• There are two types of network models:
• OSI model
• TCP/IP model
Some of the basic network protocols
1. Ethernet
2. Token Ring
3. FDDI
4. ATM
1.Ethernet
• The Ethernet protocol is by far the most widely used.
• Ethernet uses an access method called CSMA/CD (Carrier Sense
Multiple Access/Collision Detection). This is a system where each
computer listens to the cable before sending anything through the
network.
• If the network is clear, the computer will transmit. If some other node
is already transmitting on the cable, the computer will wait and try
again when the line is clear.
• Sometimes, two computers attempt to transmit at the same instant.
When this happens a collision occurs. Each computer then backs off
and waits a random amount of time before attempting to retransmit.
• With this access method, it is normal to have collisions.
However, the delay caused by collisions and retransmitting is
very small and does not normally effect the speed of
transmission on the network.
• The Ethernet protocol allows for linear bus, star, or tree
topologies.
• Data can be transmitted over wireless access points, twisted
pair, coaxial, or fiber optic cable at a speed of 10 Mbps up to
1000 Mbps.
1.Ethernet (Contd..)
2.Token Ring
• The Token Ring protocol was developed by IBM in the mid-1980s. The
access method used involves token-passing.
• In Token Ring, the computers are connected so that the signal travels
around the network from one computer to another in a logical ring.
• A single electronic token moves around the ring from one computer
to the next.
• If a computer does not have information to transmit, it simply passes
the token on to the next workstation. If a computer wishes to
transmit and receives an empty token, it attaches data to the token.
• The token then proceeds around the ring until it comes to the
computer for which the data is meant. At this point, the data
is captured by the receiving computer.
• The Token Ring protocol requires a star-wired ring using
twisted pair or fiber optic cable.
• It can operate at transmission speeds of 4 Mbps or 16 Mbps.
• Due to the increasing popularity of Ethernet, the use of Token
Ring in school environments has decreased.
2.Token Ring (Contd..)
3.FDDI
• Fiber Distributed Data Interface (FDDI) is a network protocol that is
used primarily to interconnect two or more local area networks, often
over large distances.
• The access method used by FDDI involves token-passing.
• FDDI uses a dual ring physical topology.
• Transmission normally occurs on one of the rings; however, if a break
occurs, the system keeps information moving by automatically using
portions of the second ring to create a new complete ring.
• A major advantage of FDDI is speed. It operates over fiber optic cable
at 100 Mbps.
4.ATM
• Asynchronous Transfer Mode (ATM) is a network protocol that transmits data at
a speed of 155 Mbps and higher.
• ATM works by transmitting all data in small packets of a fixed size; whereas,
other protocols transfer variable length packets.
• ATM supports a variety of media such as video, CD-quality audio, and imaging.
• ATM employs a star topology, which can work with fiber optic as well as twisted
pair cable.
• ATM is most often used to interconnect two or more local area networks. It is
also frequently used by Internet Service Providers to utilize high-speed access to
the Internet for their clients.
• As ATM technology becomes more cost-effective, it will provide another solution
for constructing faster local area networks.
Network Structure
What is Network Structure
• a network structure is anything pertaining to a computer network
• these systems may be anything from the design of the network all the way through
implementation and use
• can be many different things to different people
• from the perspective of one of the people that designed or implemented a network, it
is a collection of wires, computers and components
• is composed mostly of cables, switches and workstations
• in larger businesses, these networks are often designed by a network architect and
implemented by network engineers
• in smaller areas or homes, the physical network is rarely complex enough to need an
actual design
Network Structure’s Classification
• Based on transmission media: Wired (UTP, coaxial
cables, fiber-optic cables) and Wireless
• Based on network size: LAN and WAN (and MAN)
• Based on management method: Peer-to-peer and
Client/Server
• Based on topology (connectivity): Bus, Star, Ring …
Based on network size
• LAN - Local Area Network
• WAN - Wide Area Network
• MAN – Metropolitan Area Network
Based on management
method:
• Peer to Peer
• Client Server
Peer to Peer
• resources are shared between peers without any
central coordination by a server
• act as both suppliers and consumers of resources
• implement an abstract overlay network at the
application layer on top of the physical network
topology
• share resources inexpensively as possible
Peer to Peer (contd..)
• is no centralized security scheme and end users
themselves are allowed to control access to
resources, reducing the security in peer to peer
networks
• users can create any share point that they wish in
their computer and security can only be provided
by assigning a password when they create the
share point
Client Server
• is built on the concept of servers providing
services and a set of clients requesting those
services
• A server is actually a host that is running one or
more server programs, which share their
resources with the clients
• The client initiates the communication session
with the servers by requesting server’s content or
services
Client Server (contd..)
• Servers always await incoming requests from
clients
• have centralized security database, which controls
the access to shared resources on the server
• server contains a list of usernames and passwords
and a user is only allowed to access the network
only if they provide a valid username and a
password to the server
Client Server (contd..)
• After they login, users can only access those
resources that have been granted permission for
by the network administrator
• Widely used functions such as email
exchange, web access and database access are
built on the client–server architecture
Client Server vs Peer to Peer
• A client server system has a server or set of central
servers that manage all the activities in the
network and they are expensive to implement.
• A peer-to-peer network is essentially composed of
user workstations that share files and resources
but are not centrally managed by other computers
Client Server vs Peer to Peer
(Contd..)
• Tasks or workloads are partitioned between
servers, and services are requested by clients
• Tasks or workloads are partitioned between peers
and these peers are said to form a peer to peer
network
Client Server vs Peer to Peer
(Contd..)
• There are designated clients that request for services
and servers that provide services in Client-server
• Peers act as both service providers and service
consumers in P2P
• Are more stable and could be scaled as much as we
need in Client-server
• Suffer in performance as the number of nodes
increase in P2P
Client Server vs Peer to Peer
(Contd..)
• Servers define rights and roles for client
computers in Client-server
• All computers have same rights and roles in P2P
• A dedicated file server provides level of access to
the clients, providing better security in Client-
server
• Security is handled by the end users in P2P
Based on Topologies
• Bus Topologies
• Star Topologies
• Mesh Topologies
• Ring Topologies
Bus Topologies
• uses one cable to connect multiple computers
• cable is also called a trunk, a backbone, and a
segment
• To prevent packets from bouncing up and down
the cable, devices called terminators must be
attached to both ends of the cable
• Only one computer at a time can transmit a packet
Bus Topologies (Contd..)
• listen to all traffic on the network but accept only the
packets that are addressed to them
• Broadcast packets are an exception because all
computers on the network accept them
• When a computer sends out a packet, it travels in both
directions from the computer.
• number of computers on a bus topology network has a
major influence on the performance of the network
Bus Topologies (Contd..)
• bus is a passive topology
• The computers on a bus topology only listen or
send data
• do not take data and send it on or regenerate it
• So if one computer on the network fails, the
network is still up
Bus Topologies (Contd..)
Star Topologies
• all computers are connected through one central
hub or switch
• Computer in a star topology are all connected to a
central hub
• A star topology actually comes from the days of
the mainframe system
• The mainframe system had a centralized point
where the terminals connected
Star Topologies (Contd..)
Mesh Topologies
• more commonly seen with something like the
national phone network
• With the mesh topology, every workstation has a
connection to every other component of the
network
• Computers in a mesh topology are all connected to
every other component of the network
Mesh Topologies (Contd..)
Ring Topologies
• all computers are connected with a cable that loops
around
• the ring topology is a circle that has no start and no
end
• Terminators are not necessary in a ring topology
• Signals travel in one direction on a ring while they are
passed from one computer to the next.
• Each computer checks the packet for its destination
and passes it on as a repeater would
Ring Topologies (Contd..)
Scope of Network
Local area network
• A local area network (LAN) is a network that connects computers
and devices in a limited geographical area such as home, school,
computer laboratory, office building, or closely positioned group
of buildings.
• Each computer or device on the network is a node.
• Current wired LANs are most likely to be based on Ethernet
technology, although new standards like ITU-T G.hn also provide
a way to create a wired LAN using existing home wires (coaxial
cables, phone lines and power lines).Typical library network, in a
branching tree topology and controlled access to resources.
• All interconnected devices must understand the network layer
(layer 3), because they are handling multiple subnets (the
different colors).
Local area network (Contd..)
• Those inside the library, which have only 10/100 Mbit/s Ethernet
connections to the user device and a Gigabit Ethernet connection to the
central router, could be called "layer 3 switches" because they only have
Ethernet interfaces and must understand IP.
• It would be more correct to call them access routers, where the router
at the top is a distribution router that connects to the Internet and
academic networks customer access routers.
• The defining characteristics of LANs, in contrast to WANs (Wide Area
Networks), include their higher data transfer rates, smaller geographic
range, and no need for leased telecommunication lines.
• Current Ethernet or other IEEE 802.3 LAN technologies operate at
speeds up to 10 Grit/s. This is the data transfer rate. IEEE has projects
investigating the standardization of 40 and 100 Grit/s
Personal area network
• A personal area network (PAN) is a computer network used for
communication among computer and different information
technological devices close to one person.
• Some examples of devices that are used in a PAN are personal
computers, printers, fax machines, telephones, PDAs, scanners,
and even video game consoles.
• A PAN may include wired and wireless devices. The reach of a
PAN typically extends to 10 meters.
• A wired PAN is usually constructed with USB and Fire wire
connections while technologies such as Bluetooth and infrared
communication typically form a wireless PAN.
Home area network
• A home area network (HAN) is a residential LAN which is used
for communication between digital devices typically deployed in
the home, usually a small number of personal computers and
accessories, such as printers and mobile computing devices.
• An important function is the sharing of Internet access, often a
broadband service through a CATV or Digital Subscriber Line
(DSL) provider. It can also be referred to as an office area
network (OAN).
Wide area network
• A wide area network (WAN) is a computer network that covers
a large geographic area such as a city, country, or spans even
intercontinental distances, using a communications channel
that combines many types of media such as telephone lines,
cables, and air waves.
• A WAN often uses transmission facilities provided by common
carriers, such as telephone companies.
• WAN technologies generally function at the lower three layers
of the OSI reference model: the physical layer, the data link
layer, and the network layer.
Campus network
• A campus network is a computer network made up of an
interconnection of local area networks (LAN's) within a limited
geographical area.
• The networking equipment (switches, routers) and transmission
media (optical fiber, copper plant, Cat5 cabling etc.) are almost
entirely owned (by the campus tenant / owner: an
enterprise, university, government etc.).
• In the case of a university campus-based campus network, the
network is likely to link a variety of campus buildings including;
academic departments, the university library and student
residence halls.
Metropolitan area network
• A Metropolitan area network is a large computer network that
usually spans a city or a large campus.
• Sample EPN made of Frame relay WAN connections and dialup
remote access.
• Sample VPN used to interconnect 3 offices and remote users
Virtual private network
• A virtual private network (VPN) is a computer network in which some of the
links between nodes are carried by open connections or virtual circuits in
some larger network (e.g., the Internet) instead of by physical wires.
• The data link layer protocols of the virtual network are said to be tunneled
through the larger network when this is the case.
• One common application is secure communications through the public
Internet, but a VPN need not have explicit security features, such as
authentication or content encryption.
• VPNs, for example, can be used to separate the traffic of different user
communities over an underlying network with strong security features.
• VPN may have best-effort performance, or may have a defined service level
agreement (SLA) between the VPN customer and the VPN service provider.
Generally, a VPN has a topology more complex than point-to-point.
Backbone network
• A Backbone network (BBN) a backbone network or network backbone is part of a
computer network infrastructure that interconnects various pieces of network,
providing a path for the exchange of information between different LANs or sub
networks a backbone can tie together diverse networks in the same building, in
different buildings in a campus environment, or over wide areas.
• Normally, the backbone's capacity is greater than the networks connected to it.
• A large corporation that has many locations may have a backbone network that ties
all of the locations together, for example, if a server cluster needs to be accessed by
different departments of a company that are located at different geographical
locations.
• The pieces of the network connections (for example: Ethernet, wireless) that bring
these departments together is often mentioned as network backbone.
• Network congestion is often taken into consideration while designing backbones.
• Backbone networks should not be confused with the Internet backbone.
Backbone network
• A Backbone network (BBN) a backbone network or network backbone is part of a
computer network infrastructure that interconnects various pieces of network,
providing a path for the exchange of information between different LANs or sub
networks a backbone can tie together diverse networks in the same building, in
different buildings in a campus environment, or over wide areas.
• Normally, the backbone's capacity is greater than the networks connected to it.
• A large corporation that has many locations may have a backbone network that ties
all of the locations together, for example, if a server cluster needs to be accessed by
different departments of a company that are located at different geographical
locations.
• The pieces of the network connections (for example: Ethernet, wireless) that bring
these departments together is often mentioned as network backbone.
• Network congestion is often taken into consideration while designing backbones.
• Backbone networks should not be confused with the Internet backbone.
Global area network
• A global area network (GAN) is a network used for supporting mobile communications
across an arbitrary number of wireless LANs, satellite coverage areas, etc.
• The key challenge in mobile communications is handing off the user communications
from one local coverage area to the next.
• In IEEE Project 802, this involves a succession of terrestrial wireless LANs.
Internet
• The Internet is a global system of interconnected governmental, academic, corporate,
public, and private computer networks.
• It is based on the networking technologies of the Internet Protocol Suite.
• It is the successor of the Advanced Research Projects Agency Network (ARPANET)
developed by DARPA of the United States Department of Defense.
• The Internet is also the communications backbone underlying the World Wide Web
(WWW).
• Participants in the Internet use a diverse array of methods of several hundred
documented, and often standardized, protocols compatible with the Internet Protocol
Suite and an addressing system (IP addresses) administered by the Internet Assigned
Numbers Authority and address registries.
• Service providers and large enterprises exchange information about the reachability of
their address spaces through the Border Gateway Protocol (BGP), forming a redundant
worldwide mesh of transmission paths.
Intranets and extranets
• Intranets and extranets are parts or extensions of a computer network, usually a local area
network.
• An intranet is a set of networks, using the Internet Protocol and IP-based tools such as web
browsers and file transfer applications that is under the control of a single administrative
entity.
• That administrative entity closes the intranet to all but specific, authorized users. Most
commonly, an intranet is the internal network of an organization.
• A large intranet will typically have at least one web server to provide users with organizational
information.
• An extranet is a network that is limited in scope to a single organization or entity and also has
limited connections to the networks of one or more other usually, but not necessarily, trusted
organizations or entities—a company's customers may be given access to some part of its
intranet—while at the same time the customers may not be considered trusted from a
security standpoint.
• Technically, an extranet may also be categorized as a CAN, MAN, WAN, or other type of
network, although an extranet cannot consist of a single LAN; it must have at least one
connection with an external network.
Overlay network
• An overlay network is a virtual computer network that is built on top of another
network.
• Nodes in the overlay are connected by virtual or logical links, each of which
corresponds to a path, perhaps through many physical links, in the underlying
network.
• A sample overlay network: IP over SONET over Optical For example, many peer-to-
peer networks are overlay networks because they are organized as nodes of a virtual
system of links run on top of the Internet.
• The Internet was initially built as an overlay on the telephone network. Overlay
networks have been around since the invention of networking when computer
systems were connected over telephone lines using modem, before any data network
existed.
Overlay network (Conntd..)
• Nowadays the Internet is the basis for many overlaid networks that can be constructed
to permit routing of messages to destinations specified by an IP address.
• For example, distributed hash tables can be used to route messages to a node having a
specific logical address, whose IP address is known in advance.
• Overlay networks have also been proposed as a way to improve Internet routing, such
as through quality of service guarantees to achieve higher-quality streaming media.
• Previous proposals such as Insert, Differ, and IP Multicast have not seen wide
acceptance largely because they require modification of all routers in the
network.[citation needed] On the other hand, an overlay network can be
incrementally deployed on end-hosts running the overlay protocol software, without
cooperation from Internet service providers.
• The overlay has no control over how packets are routed in the underlying network
between two overlay nodes, but it can control, for example, the sequence of overlay
nodes a message traverses before reaching its destination.

Weitere ähnliche Inhalte

Was ist angesagt?

Network access methods
Network access methodsNetwork access methods
Network access methods
Jaleel James
 

Was ist angesagt? (20)

MVA slides lesson 2
MVA slides lesson 2MVA slides lesson 2
MVA slides lesson 2
 
MVA slides lesson 8
MVA slides lesson 8MVA slides lesson 8
MVA slides lesson 8
 
HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005
HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005
HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005
 
Net essentials6e ch3
Net essentials6e ch3Net essentials6e ch3
Net essentials6e ch3
 
98 366 mva slides lesson 7
98 366 mva slides lesson 798 366 mva slides lesson 7
98 366 mva slides lesson 7
 
MVA slides lesson 1
MVA slides lesson 1MVA slides lesson 1
MVA slides lesson 1
 
Understanding local area networking
Understanding local area networkingUnderstanding local area networking
Understanding local area networking
 
Computer Network Components
Computer Network  ComponentsComputer Network  Components
Computer Network Components
 
MVA slides lesson 5
MVA slides lesson 5MVA slides lesson 5
MVA slides lesson 5
 
Network use and configuration
Network use and configurationNetwork use and configuration
Network use and configuration
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
 
Topic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer networkTopic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer network
 
Net+, 6th Ed. CH. 1
Net+, 6th Ed. CH. 1Net+, 6th Ed. CH. 1
Net+, 6th Ed. CH. 1
 
98 366 mva slides lesson 5
98 366 mva slides lesson 598 366 mva slides lesson 5
98 366 mva slides lesson 5
 
Network access methods
Network access methodsNetwork access methods
Network access methods
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Network Topology & Networking Devices
Network Topology & Networking DevicesNetwork Topology & Networking Devices
Network Topology & Networking Devices
 
NETWORKING PPT
NETWORKING PPTNETWORKING PPT
NETWORKING PPT
 
Network
NetworkNetwork
Network
 
Peer To Peer Networking
Peer To Peer NetworkingPeer To Peer Networking
Peer To Peer Networking
 

Ähnlich wie Networkprotocolstructurescope 130719081246-phpapp01

Networking presentationNetworking presentation.pptNetworking presentation.ppt...
Networking presentationNetworking presentation.pptNetworking presentation.ppt...Networking presentationNetworking presentation.pptNetworking presentation.ppt...
Networking presentationNetworking presentation.pptNetworking presentation.ppt...
nesarahmad37
 
12 ipt 0303 transmitting and receiving
12 ipt 0303   transmitting and receiving12 ipt 0303   transmitting and receiving
12 ipt 0303 transmitting and receiving
ctedds
 
Lecture 1_Introduction to Networking_1.ppt
Lecture 1_Introduction to Networking_1.pptLecture 1_Introduction to Networking_1.ppt
Lecture 1_Introduction to Networking_1.ppt
flyinimohamed
 

Ähnlich wie Networkprotocolstructurescope 130719081246-phpapp01 (20)

Unit2.2
Unit2.2Unit2.2
Unit2.2
 
DS Unit-4-Communication .pdf
DS Unit-4-Communication .pdfDS Unit-4-Communication .pdf
DS Unit-4-Communication .pdf
 
Networking presentationNetworking presentation.pptNetworking presentation.ppt...
Networking presentationNetworking presentation.pptNetworking presentation.ppt...Networking presentationNetworking presentation.pptNetworking presentation.ppt...
Networking presentationNetworking presentation.pptNetworking presentation.ppt...
 
12 ipt 0303 transmitting and receiving
12 ipt 0303   transmitting and receiving12 ipt 0303   transmitting and receiving
12 ipt 0303 transmitting and receiving
 
Network protocol
Network protocolNetwork protocol
Network protocol
 
Networking
Networking Networking
Networking
 
Computer networks
Computer networksComputer networks
Computer networks
 
KRISHNA_COMPUTER_PROJECT.pptx
KRISHNA_COMPUTER_PROJECT.pptxKRISHNA_COMPUTER_PROJECT.pptx
KRISHNA_COMPUTER_PROJECT.pptx
 
Computer networks grade 7
Computer networks grade 7Computer networks grade 7
Computer networks grade 7
 
Computer network
Computer networkComputer network
Computer network
 
Module 1 Introduction to Computer Networks.pptx
Module 1 Introduction to Computer Networks.pptxModule 1 Introduction to Computer Networks.pptx
Module 1 Introduction to Computer Networks.pptx
 
Networking basics
Networking basicsNetworking basics
Networking basics
 
1-introduction-to-computer-networking-converted 2.pptx
1-introduction-to-computer-networking-converted 2.pptx1-introduction-to-computer-networking-converted 2.pptx
1-introduction-to-computer-networking-converted 2.pptx
 
network fundamentals
network fundamentalsnetwork fundamentals
network fundamentals
 
1-introduction-to-computer-networking.pdf
1-introduction-to-computer-networking.pdf1-introduction-to-computer-networking.pdf
1-introduction-to-computer-networking.pdf
 
1-introduction-to-computer-networking.pdf
1-introduction-to-computer-networking.pdf1-introduction-to-computer-networking.pdf
1-introduction-to-computer-networking.pdf
 
Computer Network
Computer NetworkComputer Network
Computer Network
 
CNE CHP1.pdf
CNE CHP1.pdfCNE CHP1.pdf
CNE CHP1.pdf
 
Lecture 1_Introduction to Networking_1.ppt
Lecture 1_Introduction to Networking_1.pptLecture 1_Introduction to Networking_1.ppt
Lecture 1_Introduction to Networking_1.ppt
 
Networking
NetworkingNetworking
Networking
 

Kürzlich hochgeladen

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Kürzlich hochgeladen (20)

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 

Networkprotocolstructurescope 130719081246-phpapp01

  • 1. Network Protocol, Structure & Scope Gaurav Kumar Goyal(066BCT514) Janardan Chaudhary(066BCT516) Nimesh Mishra(066BCT519) Sanat Maharjan(066BCT531)
  • 3. What is network protocol ? • Network Protocol is a set of rules that governs the communications between computers on a network. • The computer network consists of many different protocols for helping it carrying data packets. • These protocols are designed to work on different level of network layers. The functionality of these layers are different depending on the network model. • There are two types of network models: • OSI model • TCP/IP model
  • 4. Some of the basic network protocols 1. Ethernet 2. Token Ring 3. FDDI 4. ATM
  • 5. 1.Ethernet • The Ethernet protocol is by far the most widely used. • Ethernet uses an access method called CSMA/CD (Carrier Sense Multiple Access/Collision Detection). This is a system where each computer listens to the cable before sending anything through the network. • If the network is clear, the computer will transmit. If some other node is already transmitting on the cable, the computer will wait and try again when the line is clear. • Sometimes, two computers attempt to transmit at the same instant. When this happens a collision occurs. Each computer then backs off and waits a random amount of time before attempting to retransmit.
  • 6. • With this access method, it is normal to have collisions. However, the delay caused by collisions and retransmitting is very small and does not normally effect the speed of transmission on the network. • The Ethernet protocol allows for linear bus, star, or tree topologies. • Data can be transmitted over wireless access points, twisted pair, coaxial, or fiber optic cable at a speed of 10 Mbps up to 1000 Mbps. 1.Ethernet (Contd..)
  • 7. 2.Token Ring • The Token Ring protocol was developed by IBM in the mid-1980s. The access method used involves token-passing. • In Token Ring, the computers are connected so that the signal travels around the network from one computer to another in a logical ring. • A single electronic token moves around the ring from one computer to the next. • If a computer does not have information to transmit, it simply passes the token on to the next workstation. If a computer wishes to transmit and receives an empty token, it attaches data to the token.
  • 8. • The token then proceeds around the ring until it comes to the computer for which the data is meant. At this point, the data is captured by the receiving computer. • The Token Ring protocol requires a star-wired ring using twisted pair or fiber optic cable. • It can operate at transmission speeds of 4 Mbps or 16 Mbps. • Due to the increasing popularity of Ethernet, the use of Token Ring in school environments has decreased. 2.Token Ring (Contd..)
  • 9. 3.FDDI • Fiber Distributed Data Interface (FDDI) is a network protocol that is used primarily to interconnect two or more local area networks, often over large distances. • The access method used by FDDI involves token-passing. • FDDI uses a dual ring physical topology. • Transmission normally occurs on one of the rings; however, if a break occurs, the system keeps information moving by automatically using portions of the second ring to create a new complete ring. • A major advantage of FDDI is speed. It operates over fiber optic cable at 100 Mbps.
  • 10. 4.ATM • Asynchronous Transfer Mode (ATM) is a network protocol that transmits data at a speed of 155 Mbps and higher. • ATM works by transmitting all data in small packets of a fixed size; whereas, other protocols transfer variable length packets. • ATM supports a variety of media such as video, CD-quality audio, and imaging. • ATM employs a star topology, which can work with fiber optic as well as twisted pair cable. • ATM is most often used to interconnect two or more local area networks. It is also frequently used by Internet Service Providers to utilize high-speed access to the Internet for their clients. • As ATM technology becomes more cost-effective, it will provide another solution for constructing faster local area networks.
  • 12. What is Network Structure • a network structure is anything pertaining to a computer network • these systems may be anything from the design of the network all the way through implementation and use • can be many different things to different people • from the perspective of one of the people that designed or implemented a network, it is a collection of wires, computers and components • is composed mostly of cables, switches and workstations • in larger businesses, these networks are often designed by a network architect and implemented by network engineers • in smaller areas or homes, the physical network is rarely complex enough to need an actual design
  • 13. Network Structure’s Classification • Based on transmission media: Wired (UTP, coaxial cables, fiber-optic cables) and Wireless • Based on network size: LAN and WAN (and MAN) • Based on management method: Peer-to-peer and Client/Server • Based on topology (connectivity): Bus, Star, Ring …
  • 14. Based on network size • LAN - Local Area Network • WAN - Wide Area Network • MAN – Metropolitan Area Network
  • 15. Based on management method: • Peer to Peer • Client Server
  • 16. Peer to Peer • resources are shared between peers without any central coordination by a server • act as both suppliers and consumers of resources • implement an abstract overlay network at the application layer on top of the physical network topology • share resources inexpensively as possible
  • 17. Peer to Peer (contd..) • is no centralized security scheme and end users themselves are allowed to control access to resources, reducing the security in peer to peer networks • users can create any share point that they wish in their computer and security can only be provided by assigning a password when they create the share point
  • 18. Client Server • is built on the concept of servers providing services and a set of clients requesting those services • A server is actually a host that is running one or more server programs, which share their resources with the clients • The client initiates the communication session with the servers by requesting server’s content or services
  • 19. Client Server (contd..) • Servers always await incoming requests from clients • have centralized security database, which controls the access to shared resources on the server • server contains a list of usernames and passwords and a user is only allowed to access the network only if they provide a valid username and a password to the server
  • 20. Client Server (contd..) • After they login, users can only access those resources that have been granted permission for by the network administrator • Widely used functions such as email exchange, web access and database access are built on the client–server architecture
  • 21. Client Server vs Peer to Peer • A client server system has a server or set of central servers that manage all the activities in the network and they are expensive to implement. • A peer-to-peer network is essentially composed of user workstations that share files and resources but are not centrally managed by other computers
  • 22. Client Server vs Peer to Peer (Contd..) • Tasks or workloads are partitioned between servers, and services are requested by clients • Tasks or workloads are partitioned between peers and these peers are said to form a peer to peer network
  • 23. Client Server vs Peer to Peer (Contd..) • There are designated clients that request for services and servers that provide services in Client-server • Peers act as both service providers and service consumers in P2P • Are more stable and could be scaled as much as we need in Client-server • Suffer in performance as the number of nodes increase in P2P
  • 24. Client Server vs Peer to Peer (Contd..) • Servers define rights and roles for client computers in Client-server • All computers have same rights and roles in P2P • A dedicated file server provides level of access to the clients, providing better security in Client- server • Security is handled by the end users in P2P
  • 25. Based on Topologies • Bus Topologies • Star Topologies • Mesh Topologies • Ring Topologies
  • 26. Bus Topologies • uses one cable to connect multiple computers • cable is also called a trunk, a backbone, and a segment • To prevent packets from bouncing up and down the cable, devices called terminators must be attached to both ends of the cable • Only one computer at a time can transmit a packet
  • 27. Bus Topologies (Contd..) • listen to all traffic on the network but accept only the packets that are addressed to them • Broadcast packets are an exception because all computers on the network accept them • When a computer sends out a packet, it travels in both directions from the computer. • number of computers on a bus topology network has a major influence on the performance of the network
  • 28. Bus Topologies (Contd..) • bus is a passive topology • The computers on a bus topology only listen or send data • do not take data and send it on or regenerate it • So if one computer on the network fails, the network is still up
  • 30. Star Topologies • all computers are connected through one central hub or switch • Computer in a star topology are all connected to a central hub • A star topology actually comes from the days of the mainframe system • The mainframe system had a centralized point where the terminals connected
  • 32. Mesh Topologies • more commonly seen with something like the national phone network • With the mesh topology, every workstation has a connection to every other component of the network • Computers in a mesh topology are all connected to every other component of the network
  • 34. Ring Topologies • all computers are connected with a cable that loops around • the ring topology is a circle that has no start and no end • Terminators are not necessary in a ring topology • Signals travel in one direction on a ring while they are passed from one computer to the next. • Each computer checks the packet for its destination and passes it on as a repeater would
  • 37. Local area network • A local area network (LAN) is a network that connects computers and devices in a limited geographical area such as home, school, computer laboratory, office building, or closely positioned group of buildings. • Each computer or device on the network is a node. • Current wired LANs are most likely to be based on Ethernet technology, although new standards like ITU-T G.hn also provide a way to create a wired LAN using existing home wires (coaxial cables, phone lines and power lines).Typical library network, in a branching tree topology and controlled access to resources. • All interconnected devices must understand the network layer (layer 3), because they are handling multiple subnets (the different colors).
  • 38. Local area network (Contd..) • Those inside the library, which have only 10/100 Mbit/s Ethernet connections to the user device and a Gigabit Ethernet connection to the central router, could be called "layer 3 switches" because they only have Ethernet interfaces and must understand IP. • It would be more correct to call them access routers, where the router at the top is a distribution router that connects to the Internet and academic networks customer access routers. • The defining characteristics of LANs, in contrast to WANs (Wide Area Networks), include their higher data transfer rates, smaller geographic range, and no need for leased telecommunication lines. • Current Ethernet or other IEEE 802.3 LAN technologies operate at speeds up to 10 Grit/s. This is the data transfer rate. IEEE has projects investigating the standardization of 40 and 100 Grit/s
  • 39. Personal area network • A personal area network (PAN) is a computer network used for communication among computer and different information technological devices close to one person. • Some examples of devices that are used in a PAN are personal computers, printers, fax machines, telephones, PDAs, scanners, and even video game consoles. • A PAN may include wired and wireless devices. The reach of a PAN typically extends to 10 meters. • A wired PAN is usually constructed with USB and Fire wire connections while technologies such as Bluetooth and infrared communication typically form a wireless PAN.
  • 40. Home area network • A home area network (HAN) is a residential LAN which is used for communication between digital devices typically deployed in the home, usually a small number of personal computers and accessories, such as printers and mobile computing devices. • An important function is the sharing of Internet access, often a broadband service through a CATV or Digital Subscriber Line (DSL) provider. It can also be referred to as an office area network (OAN).
  • 41. Wide area network • A wide area network (WAN) is a computer network that covers a large geographic area such as a city, country, or spans even intercontinental distances, using a communications channel that combines many types of media such as telephone lines, cables, and air waves. • A WAN often uses transmission facilities provided by common carriers, such as telephone companies. • WAN technologies generally function at the lower three layers of the OSI reference model: the physical layer, the data link layer, and the network layer.
  • 42. Campus network • A campus network is a computer network made up of an interconnection of local area networks (LAN's) within a limited geographical area. • The networking equipment (switches, routers) and transmission media (optical fiber, copper plant, Cat5 cabling etc.) are almost entirely owned (by the campus tenant / owner: an enterprise, university, government etc.). • In the case of a university campus-based campus network, the network is likely to link a variety of campus buildings including; academic departments, the university library and student residence halls.
  • 43. Metropolitan area network • A Metropolitan area network is a large computer network that usually spans a city or a large campus. • Sample EPN made of Frame relay WAN connections and dialup remote access. • Sample VPN used to interconnect 3 offices and remote users
  • 44. Virtual private network • A virtual private network (VPN) is a computer network in which some of the links between nodes are carried by open connections or virtual circuits in some larger network (e.g., the Internet) instead of by physical wires. • The data link layer protocols of the virtual network are said to be tunneled through the larger network when this is the case. • One common application is secure communications through the public Internet, but a VPN need not have explicit security features, such as authentication or content encryption. • VPNs, for example, can be used to separate the traffic of different user communities over an underlying network with strong security features. • VPN may have best-effort performance, or may have a defined service level agreement (SLA) between the VPN customer and the VPN service provider. Generally, a VPN has a topology more complex than point-to-point.
  • 45. Backbone network • A Backbone network (BBN) a backbone network or network backbone is part of a computer network infrastructure that interconnects various pieces of network, providing a path for the exchange of information between different LANs or sub networks a backbone can tie together diverse networks in the same building, in different buildings in a campus environment, or over wide areas. • Normally, the backbone's capacity is greater than the networks connected to it. • A large corporation that has many locations may have a backbone network that ties all of the locations together, for example, if a server cluster needs to be accessed by different departments of a company that are located at different geographical locations. • The pieces of the network connections (for example: Ethernet, wireless) that bring these departments together is often mentioned as network backbone. • Network congestion is often taken into consideration while designing backbones. • Backbone networks should not be confused with the Internet backbone.
  • 46. Backbone network • A Backbone network (BBN) a backbone network or network backbone is part of a computer network infrastructure that interconnects various pieces of network, providing a path for the exchange of information between different LANs or sub networks a backbone can tie together diverse networks in the same building, in different buildings in a campus environment, or over wide areas. • Normally, the backbone's capacity is greater than the networks connected to it. • A large corporation that has many locations may have a backbone network that ties all of the locations together, for example, if a server cluster needs to be accessed by different departments of a company that are located at different geographical locations. • The pieces of the network connections (for example: Ethernet, wireless) that bring these departments together is often mentioned as network backbone. • Network congestion is often taken into consideration while designing backbones. • Backbone networks should not be confused with the Internet backbone.
  • 47. Global area network • A global area network (GAN) is a network used for supporting mobile communications across an arbitrary number of wireless LANs, satellite coverage areas, etc. • The key challenge in mobile communications is handing off the user communications from one local coverage area to the next. • In IEEE Project 802, this involves a succession of terrestrial wireless LANs.
  • 48. Internet • The Internet is a global system of interconnected governmental, academic, corporate, public, and private computer networks. • It is based on the networking technologies of the Internet Protocol Suite. • It is the successor of the Advanced Research Projects Agency Network (ARPANET) developed by DARPA of the United States Department of Defense. • The Internet is also the communications backbone underlying the World Wide Web (WWW). • Participants in the Internet use a diverse array of methods of several hundred documented, and often standardized, protocols compatible with the Internet Protocol Suite and an addressing system (IP addresses) administered by the Internet Assigned Numbers Authority and address registries. • Service providers and large enterprises exchange information about the reachability of their address spaces through the Border Gateway Protocol (BGP), forming a redundant worldwide mesh of transmission paths.
  • 49. Intranets and extranets • Intranets and extranets are parts or extensions of a computer network, usually a local area network. • An intranet is a set of networks, using the Internet Protocol and IP-based tools such as web browsers and file transfer applications that is under the control of a single administrative entity. • That administrative entity closes the intranet to all but specific, authorized users. Most commonly, an intranet is the internal network of an organization. • A large intranet will typically have at least one web server to provide users with organizational information. • An extranet is a network that is limited in scope to a single organization or entity and also has limited connections to the networks of one or more other usually, but not necessarily, trusted organizations or entities—a company's customers may be given access to some part of its intranet—while at the same time the customers may not be considered trusted from a security standpoint. • Technically, an extranet may also be categorized as a CAN, MAN, WAN, or other type of network, although an extranet cannot consist of a single LAN; it must have at least one connection with an external network.
  • 50. Overlay network • An overlay network is a virtual computer network that is built on top of another network. • Nodes in the overlay are connected by virtual or logical links, each of which corresponds to a path, perhaps through many physical links, in the underlying network. • A sample overlay network: IP over SONET over Optical For example, many peer-to- peer networks are overlay networks because they are organized as nodes of a virtual system of links run on top of the Internet. • The Internet was initially built as an overlay on the telephone network. Overlay networks have been around since the invention of networking when computer systems were connected over telephone lines using modem, before any data network existed.
  • 51. Overlay network (Conntd..) • Nowadays the Internet is the basis for many overlaid networks that can be constructed to permit routing of messages to destinations specified by an IP address. • For example, distributed hash tables can be used to route messages to a node having a specific logical address, whose IP address is known in advance. • Overlay networks have also been proposed as a way to improve Internet routing, such as through quality of service guarantees to achieve higher-quality streaming media. • Previous proposals such as Insert, Differ, and IP Multicast have not seen wide acceptance largely because they require modification of all routers in the network.[citation needed] On the other hand, an overlay network can be incrementally deployed on end-hosts running the overlay protocol software, without cooperation from Internet service providers. • The overlay has no control over how packets are routed in the underlying network between two overlay nodes, but it can control, for example, the sequence of overlay nodes a message traverses before reaching its destination.