SlideShare ist ein Scribd-Unternehmen logo
1 von 32
1-1
Introduction and Review
MET CS-635 Unit 1
1-2
The Network Pipe
• Most basic model of the network
– Phone call
– Tin cans and string
– Two computers connected to one another
• Goal : Move data from one end to other
1-3
Class Exercise
The Living Network Exercise #1
Two individuals are issued cards and are
challenged to communicate the contents of
the cards to each other using only verbal
commands. Participants sit with their backs to
each other. Objective is to observe the
process that takes place, and draw
conclusions about the considerations that
must be taken into account in any networking
situation.
1-4
Standards
• Stations sharing the network media must use
a common set of agreed upon rules to
cooperate
– Protocols
– Standards
• Sources of LAN standards
– IEEE
– IETF
– ATM Forum
1-5
LAN vs. WAN
• Local Area Network
– Privately owned and operated
– All data belongs to your company
– Limited geographic extent
– High Speed
– Building or Campus
1-6
WAN
• Wide Area Network
– You pay somebody to move your data
– You share capacity with other companies
– Wide geographic extent
– Global
• Phone Company
• Leased Lines
• Interconnect LANs
1-7
Basic Network Requirements
• Reliability
• Get data across network securely and error free
• Know when an error has occurred, and handle it
– Corrupted data
– Cable break
• Speed
• Get data across network as fast as possible
• Scalability
• Be able to grow the network
• Be able to migrate to new designs and protocols
1-8
Requirements Continued
• Efficiency
• Divide network capacity among multiple users in an
equitable manner
• MANY approaches to this very fundamental problem
• All users are equal, but some are more equal than
others...
• Cost Effectiveness
• Meet all requirements as inexpensively as possible
1-9
Additional Requirements
• From Interconnections by Perlman
• Scope
• Network should solve as general a problem as possible
• Autoconfigurability
• Plug and play networks
• Auto assignment of addressing
• Auto discovery of topological information
1-10
Data Sources
• Digital Data
– Files, GIF Images, Web Pages, etc.
– Data must still be properly framed for transmission
over the LAN
• Analog Data
– Audio, Video
– Data must be converted first using a codec and
then framed for transmission over the LAN
1-11
Data on LANs
• The LANs we will study all use digital
signaling and digital transmission
• All of the data is converted to 1’s and 0’s by
the time it gets to the network
• The network just moves the 1’s and 0’s
1-12
Signal Encoding
• Moving the 1’s and 0’s
– Need to be able to move digital data over analog
media like copper wire and fiber optic cable
– In fiber, we have presence or absence of light
– In copper, we have a range of voltage levels
• We’ll consider NRZ and Biphase encoding
– NRZ Non-Return to Zero
1-13
NRZ Encoding
• Differential Encoding
– Uses positive and negative voltages as opposed
to absolute voltage levels
– Can reverse wires transmitting differential signal
and it still works
• Easily implemented
• Problems with long strings of 1’s and 0’s
– Clock synchronization gets lost
– So how come FDDI and 100BASE-T use this?
1-14
NRZ-L
• Non-Return to Zero Level
– Constant negative voltage represents 1
– Constant positive voltage represents 0
1 1 0 1 1 0 1 0
0
-V
+V
t
1-15
NRZI
• Non-Return to Zero, Invert on Ones
– Transition up or down at start of bit time means 1
– No Transition means 0
• Users: FDDI and 100BASE-T
1 1 0 1 1 0 1 0
0
-V
+V
t
1-16
Biphase Encoding
• Solve the NRZ synchronization problem by
providing a predictable transition during each
clock phase
• The additional clock transitions double the
bandwidth of the signal
– This puts higher demands on the cabling used
• You can still use differential encoding
1-17
Manchester Encoding
• Transition in middle of the phase
– Low to High is 1, High to Low is 0
– Always a mid-phase transition, so you never lose
the clock
– Users: 10BASE-T and 10BASE-2
1 1 0 1 1 0 1 0
0
-V
+V
t
1-18
Differential Manchester
• Transition in middle of phase again
– Transition just provides clocking
– Transition at start of phase is 0
– No Transition at start of phase is 1
1 1 0 1 1 0 1 0
0
-V
+V
t
1-19
Recovering the Clock
• LANs are, for the most part, asynchronous
networks
• Clocks are locally generated and recovered
• Need a data encoding technique that allows
the clock to be recovered
• Problems with synchronous networks and
clock skew
1-20
Nyquist and PCM
• PCM = Pulse Coded Modulation
– Sample signal at regular intervals
– Send the numbers over the network
• Nyquist’s result:
– max data rate = 2H log2 V bits/second
– H is the bandwidth of the signal in Hertz
– V is the number of sampling levels used
• This fundamental limit discovered in 19241924
drives all digital communication today
1-21
Multiplexing
• Sharing the communications channel
– Need to share with LANs and WANs
– Cost effective use of the capacity
• TDM
– A time slice just for you
– Most LANs
– Phone trunk lines
• FDM
– A frequency just for you
– CATV
1-22
Switching
• Process of establishing a path through the
network
• Need a way to get from here to there
• Many ways to accomplish this
• We will examine:
– Circuit Switching
– Packet Switching
– Cell Switching
1-23
Circuit Switching
• Connection Oriented
• Phone call
• Dedicated circuit established
– Fixed path through network
– Predictable performance and delay
– Wasted bandwidth when quiet
• Call setup and teardown
1-24
Packet Switching
• Connectionless
• Most LANs
• No dedicated circuit established
– Random path through network
– No predictable performance or delay
– Bandwidth only used when needed
• Store and forward network
1-25
Cell Switching
• Hybrid technique used in ATM networks
• Makes efficient use of media like packet
switched network
• Has predictable characteristics of circuit
switched network
1-26
Metrics
• We will use the following performance metrics
throughout the course
– Bandwidth
– A range of frequencies in Hertz
– For signals: Delta between the maximum and minimum
frequency components
– For media: Maximum frequency component that may be
carried by the media
– Data Rate
– Speed at which data is communicated in bits per second
1-27
Metrics Continued
– Capacity
– Maximum Data Rate sustainable by a channel allowing for
Gaussian (thermal) noise
– Shannon’s Equation: C = H log2 (1 + S/N)
– Latency
– Delay in seconds from the time a transmission is initiated
until it is received
– Throughput
– Also called effective data rate
– Rate in bits per second or bytes per second in which actual
application data is moved, in its entirety, across a medium
– Allows for latency and protocol overhead
1-28
OSI Reference Model
Physical
Data Link
Network
Transport
Session
Presentation
Application
1
2
3
Most of our time
Rest of our time
As needed
Course Emphasis OSI Stack
Layer
1-29
Using the stack to communicate
• Systems that wish to communicate use
stacks that implement the same standards
• Different vendors may produce different
implementation but implementations must
both be compliant
• Each layer in a station must interoperate with
corresponding layer on the remote station
• Need interoperability testing
– Note: This is how the trade show “Interop” started
1-30
Interconnecting two hosts
Physical
Data Link
Network
Transport
1
2
3
Physical
Data Link
Network
Transport
1
2
3
Host A Host B
1-31
Making the connection
• Corresponding layers in each system
establish a logical connection
• Data is sent from the application ‘down’ the
stack
• Each layer encapsulates data from next
higher layer
• Encapsulations stripped on way ‘up’ the
receiving stack
1-32
Layer Encapsulation
PHY
DLL
Net
Trans
PHY
DLL
Net
Trans
data
datadata
This is what
goes on the
wire

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Chapter07
Chapter07Chapter07
Chapter07
 
Chapter06
Chapter06Chapter06
Chapter06
 
IT8602 Mobile Communication - Unit III
IT8602 Mobile Communication  - Unit IIIIT8602 Mobile Communication  - Unit III
IT8602 Mobile Communication - Unit III
 
MVA slides lesson 5
MVA slides lesson 5MVA slides lesson 5
MVA slides lesson 5
 
Week 3
Week 3Week 3
Week 3
 
Telecommunications and Network Security Presentation
Telecommunications and Network Security PresentationTelecommunications and Network Security Presentation
Telecommunications and Network Security Presentation
 
internet network for o level
 internet network for o level  internet network for o level
internet network for o level
 
Unit 3 ppt-idc
Unit 3 ppt-idcUnit 3 ppt-idc
Unit 3 ppt-idc
 
Unit 1 ppt-idc
Unit 1 ppt-idcUnit 1 ppt-idc
Unit 1 ppt-idc
 
Unit 2 ppt-idc
Unit 2 ppt-idcUnit 2 ppt-idc
Unit 2 ppt-idc
 
Ethernet, Point-to-Point Protocol, ARP
Ethernet, Point-to-Point Protocol, ARP Ethernet, Point-to-Point Protocol, ARP
Ethernet, Point-to-Point Protocol, ARP
 
Topic : ISDN(integrated services digital network) part 2
Topic : ISDN(integrated services digital network) part 2Topic : ISDN(integrated services digital network) part 2
Topic : ISDN(integrated services digital network) part 2
 
98 366 mva slides lesson 7
98 366 mva slides lesson 798 366 mva slides lesson 7
98 366 mva slides lesson 7
 
Basics of Network Layer and Transport Layer
Basics of Network Layer and Transport LayerBasics of Network Layer and Transport Layer
Basics of Network Layer and Transport Layer
 
Chap1 networking
Chap1 networkingChap1 networking
Chap1 networking
 
98 366 mva slides lesson 5
98 366 mva slides lesson 598 366 mva slides lesson 5
98 366 mva slides lesson 5
 
Internet introduction
Internet introductionInternet introduction
Internet introduction
 
Switching
SwitchingSwitching
Switching
 
MVA slides lesson 7
MVA slides lesson 7MVA slides lesson 7
MVA slides lesson 7
 
MVA slides lesson 2
MVA slides lesson 2MVA slides lesson 2
MVA slides lesson 2
 

Andere mochten auch

Andere mochten auch (6)

خواطر من وحي آيات البصر
خواطر من وحي آيات البصرخواطر من وحي آيات البصر
خواطر من وحي آيات البصر
 
Java script
Java scriptJava script
Java script
 
Netbook selection
Netbook selectionNetbook selection
Netbook selection
 
Java script Learn Easy
Java script Learn Easy Java script Learn Easy
Java script Learn Easy
 
Word press as an example of wcms
Word press as an example of wcmsWord press as an example of wcms
Word press as an example of wcms
 
Top 9 java script interview questions answers
Top 9 java script interview questions answersTop 9 java script interview questions answers
Top 9 java script interview questions answers
 

Ähnlich wie Network's Type

Wan technologies
Wan technologiesWan technologies
Wan technologiesOnline
 
Skr+3200+chapter+1+(kweh)
Skr+3200+chapter+1+(kweh)Skr+3200+chapter+1+(kweh)
Skr+3200+chapter+1+(kweh)Ammar Shafiq
 
chapter1.ppt
chapter1.pptchapter1.ppt
chapter1.pptExamIUB
 
chapter1.ppt
chapter1.pptchapter1.ppt
chapter1.pptExamIUB
 
chapter1.ppt
chapter1.pptchapter1.ppt
chapter1.pptExamIUB
 
18ec743-Multimedia_Communications_UNIT_I.docx
18ec743-Multimedia_Communications_UNIT_I.docx18ec743-Multimedia_Communications_UNIT_I.docx
18ec743-Multimedia_Communications_UNIT_I.docxVeenask6
 
chapter1.ppt
chapter1.pptchapter1.ppt
chapter1.pptExamIUB
 
CISSP - Chapter 4 - Intranet and extranets
CISSP - Chapter 4 - Intranet and extranetsCISSP - Chapter 4 - Intranet and extranets
CISSP - Chapter 4 - Intranet and extranetsKarthikeyan Dhayalan
 
chapter1.ppt
chapter1.pptchapter1.ppt
chapter1.pptExamIUB
 
chapter1.ppt
chapter1.pptchapter1.ppt
chapter1.pptExamIUB
 
chapter6 intro to telecommunications.ppt
chapter6 intro to telecommunications.pptchapter6 intro to telecommunications.ppt
chapter6 intro to telecommunications.pptTakudzwaM1
 
Telecom Network
Telecom NetworkTelecom Network
Telecom NetworkExamIUB
 
chapter1.ppt
chapter1.pptchapter1.ppt
chapter1.pptExamIUB
 
chapter1.ppt
chapter1.pptchapter1.ppt
chapter1.pptExamIUB
 
chapter1.ppt
chapter1.pptchapter1.ppt
chapter1.pptExamIUB
 
chapter1.ppt
chapter1.pptchapter1.ppt
chapter1.pptExamIUB
 
Data communications_Network_Model (1).pdf
Data communications_Network_Model (1).pdfData communications_Network_Model (1).pdf
Data communications_Network_Model (1).pdfSujanTimalsina5
 
chapter1.ppt
chapter1.pptchapter1.ppt
chapter1.pptExamIUB
 
Fundamentals of Enterprise Networks
Fundamentals ofEnterprise NetworksFundamentals ofEnterprise Networks
Fundamentals of Enterprise NetworksVisualBee.com
 
NETWORK DESIGN.ppt
NETWORK DESIGN.pptNETWORK DESIGN.ppt
NETWORK DESIGN.pptdheepaT2
 

Ähnlich wie Network's Type (20)

Wan technologies
Wan technologiesWan technologies
Wan technologies
 
Skr+3200+chapter+1+(kweh)
Skr+3200+chapter+1+(kweh)Skr+3200+chapter+1+(kweh)
Skr+3200+chapter+1+(kweh)
 
chapter1.ppt
chapter1.pptchapter1.ppt
chapter1.ppt
 
chapter1.ppt
chapter1.pptchapter1.ppt
chapter1.ppt
 
chapter1.ppt
chapter1.pptchapter1.ppt
chapter1.ppt
 
18ec743-Multimedia_Communications_UNIT_I.docx
18ec743-Multimedia_Communications_UNIT_I.docx18ec743-Multimedia_Communications_UNIT_I.docx
18ec743-Multimedia_Communications_UNIT_I.docx
 
chapter1.ppt
chapter1.pptchapter1.ppt
chapter1.ppt
 
CISSP - Chapter 4 - Intranet and extranets
CISSP - Chapter 4 - Intranet and extranetsCISSP - Chapter 4 - Intranet and extranets
CISSP - Chapter 4 - Intranet and extranets
 
chapter1.ppt
chapter1.pptchapter1.ppt
chapter1.ppt
 
chapter1.ppt
chapter1.pptchapter1.ppt
chapter1.ppt
 
chapter6 intro to telecommunications.ppt
chapter6 intro to telecommunications.pptchapter6 intro to telecommunications.ppt
chapter6 intro to telecommunications.ppt
 
Telecom Network
Telecom NetworkTelecom Network
Telecom Network
 
chapter1.ppt
chapter1.pptchapter1.ppt
chapter1.ppt
 
chapter1.ppt
chapter1.pptchapter1.ppt
chapter1.ppt
 
chapter1.ppt
chapter1.pptchapter1.ppt
chapter1.ppt
 
chapter1.ppt
chapter1.pptchapter1.ppt
chapter1.ppt
 
Data communications_Network_Model (1).pdf
Data communications_Network_Model (1).pdfData communications_Network_Model (1).pdf
Data communications_Network_Model (1).pdf
 
chapter1.ppt
chapter1.pptchapter1.ppt
chapter1.ppt
 
Fundamentals of Enterprise Networks
Fundamentals ofEnterprise NetworksFundamentals ofEnterprise Networks
Fundamentals of Enterprise Networks
 
NETWORK DESIGN.ppt
NETWORK DESIGN.pptNETWORK DESIGN.ppt
NETWORK DESIGN.ppt
 

Kürzlich hochgeladen

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 

Kürzlich hochgeladen (20)

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

Network's Type

  • 2. 1-2 The Network Pipe • Most basic model of the network – Phone call – Tin cans and string – Two computers connected to one another • Goal : Move data from one end to other
  • 3. 1-3 Class Exercise The Living Network Exercise #1 Two individuals are issued cards and are challenged to communicate the contents of the cards to each other using only verbal commands. Participants sit with their backs to each other. Objective is to observe the process that takes place, and draw conclusions about the considerations that must be taken into account in any networking situation.
  • 4. 1-4 Standards • Stations sharing the network media must use a common set of agreed upon rules to cooperate – Protocols – Standards • Sources of LAN standards – IEEE – IETF – ATM Forum
  • 5. 1-5 LAN vs. WAN • Local Area Network – Privately owned and operated – All data belongs to your company – Limited geographic extent – High Speed – Building or Campus
  • 6. 1-6 WAN • Wide Area Network – You pay somebody to move your data – You share capacity with other companies – Wide geographic extent – Global • Phone Company • Leased Lines • Interconnect LANs
  • 7. 1-7 Basic Network Requirements • Reliability • Get data across network securely and error free • Know when an error has occurred, and handle it – Corrupted data – Cable break • Speed • Get data across network as fast as possible • Scalability • Be able to grow the network • Be able to migrate to new designs and protocols
  • 8. 1-8 Requirements Continued • Efficiency • Divide network capacity among multiple users in an equitable manner • MANY approaches to this very fundamental problem • All users are equal, but some are more equal than others... • Cost Effectiveness • Meet all requirements as inexpensively as possible
  • 9. 1-9 Additional Requirements • From Interconnections by Perlman • Scope • Network should solve as general a problem as possible • Autoconfigurability • Plug and play networks • Auto assignment of addressing • Auto discovery of topological information
  • 10. 1-10 Data Sources • Digital Data – Files, GIF Images, Web Pages, etc. – Data must still be properly framed for transmission over the LAN • Analog Data – Audio, Video – Data must be converted first using a codec and then framed for transmission over the LAN
  • 11. 1-11 Data on LANs • The LANs we will study all use digital signaling and digital transmission • All of the data is converted to 1’s and 0’s by the time it gets to the network • The network just moves the 1’s and 0’s
  • 12. 1-12 Signal Encoding • Moving the 1’s and 0’s – Need to be able to move digital data over analog media like copper wire and fiber optic cable – In fiber, we have presence or absence of light – In copper, we have a range of voltage levels • We’ll consider NRZ and Biphase encoding – NRZ Non-Return to Zero
  • 13. 1-13 NRZ Encoding • Differential Encoding – Uses positive and negative voltages as opposed to absolute voltage levels – Can reverse wires transmitting differential signal and it still works • Easily implemented • Problems with long strings of 1’s and 0’s – Clock synchronization gets lost – So how come FDDI and 100BASE-T use this?
  • 14. 1-14 NRZ-L • Non-Return to Zero Level – Constant negative voltage represents 1 – Constant positive voltage represents 0 1 1 0 1 1 0 1 0 0 -V +V t
  • 15. 1-15 NRZI • Non-Return to Zero, Invert on Ones – Transition up or down at start of bit time means 1 – No Transition means 0 • Users: FDDI and 100BASE-T 1 1 0 1 1 0 1 0 0 -V +V t
  • 16. 1-16 Biphase Encoding • Solve the NRZ synchronization problem by providing a predictable transition during each clock phase • The additional clock transitions double the bandwidth of the signal – This puts higher demands on the cabling used • You can still use differential encoding
  • 17. 1-17 Manchester Encoding • Transition in middle of the phase – Low to High is 1, High to Low is 0 – Always a mid-phase transition, so you never lose the clock – Users: 10BASE-T and 10BASE-2 1 1 0 1 1 0 1 0 0 -V +V t
  • 18. 1-18 Differential Manchester • Transition in middle of phase again – Transition just provides clocking – Transition at start of phase is 0 – No Transition at start of phase is 1 1 1 0 1 1 0 1 0 0 -V +V t
  • 19. 1-19 Recovering the Clock • LANs are, for the most part, asynchronous networks • Clocks are locally generated and recovered • Need a data encoding technique that allows the clock to be recovered • Problems with synchronous networks and clock skew
  • 20. 1-20 Nyquist and PCM • PCM = Pulse Coded Modulation – Sample signal at regular intervals – Send the numbers over the network • Nyquist’s result: – max data rate = 2H log2 V bits/second – H is the bandwidth of the signal in Hertz – V is the number of sampling levels used • This fundamental limit discovered in 19241924 drives all digital communication today
  • 21. 1-21 Multiplexing • Sharing the communications channel – Need to share with LANs and WANs – Cost effective use of the capacity • TDM – A time slice just for you – Most LANs – Phone trunk lines • FDM – A frequency just for you – CATV
  • 22. 1-22 Switching • Process of establishing a path through the network • Need a way to get from here to there • Many ways to accomplish this • We will examine: – Circuit Switching – Packet Switching – Cell Switching
  • 23. 1-23 Circuit Switching • Connection Oriented • Phone call • Dedicated circuit established – Fixed path through network – Predictable performance and delay – Wasted bandwidth when quiet • Call setup and teardown
  • 24. 1-24 Packet Switching • Connectionless • Most LANs • No dedicated circuit established – Random path through network – No predictable performance or delay – Bandwidth only used when needed • Store and forward network
  • 25. 1-25 Cell Switching • Hybrid technique used in ATM networks • Makes efficient use of media like packet switched network • Has predictable characteristics of circuit switched network
  • 26. 1-26 Metrics • We will use the following performance metrics throughout the course – Bandwidth – A range of frequencies in Hertz – For signals: Delta between the maximum and minimum frequency components – For media: Maximum frequency component that may be carried by the media – Data Rate – Speed at which data is communicated in bits per second
  • 27. 1-27 Metrics Continued – Capacity – Maximum Data Rate sustainable by a channel allowing for Gaussian (thermal) noise – Shannon’s Equation: C = H log2 (1 + S/N) – Latency – Delay in seconds from the time a transmission is initiated until it is received – Throughput – Also called effective data rate – Rate in bits per second or bytes per second in which actual application data is moved, in its entirety, across a medium – Allows for latency and protocol overhead
  • 28. 1-28 OSI Reference Model Physical Data Link Network Transport Session Presentation Application 1 2 3 Most of our time Rest of our time As needed Course Emphasis OSI Stack Layer
  • 29. 1-29 Using the stack to communicate • Systems that wish to communicate use stacks that implement the same standards • Different vendors may produce different implementation but implementations must both be compliant • Each layer in a station must interoperate with corresponding layer on the remote station • Need interoperability testing – Note: This is how the trade show “Interop” started
  • 30. 1-30 Interconnecting two hosts Physical Data Link Network Transport 1 2 3 Physical Data Link Network Transport 1 2 3 Host A Host B
  • 31. 1-31 Making the connection • Corresponding layers in each system establish a logical connection • Data is sent from the application ‘down’ the stack • Each layer encapsulates data from next higher layer • Encapsulations stripped on way ‘up’ the receiving stack