SlideShare ist ein Scribd-Unternehmen logo
1 von 98
Prof.PoonamK. 1
Ch 1. Overview of Networking Concepts
• Basics of communication systems
• Transmission Media
• Topology and Types of Networks
• TCP/IP protocolStacks
• Wireless Networks
• The Internet
Prof.PoonamK. 2
Data Communication
• In data communication data refers to facts, concepts and instructions presented in
various form and communicationrefers to actuallyexchange or share theinformation.
• Communication is local: face to face or remote: takes place over distance.
• Data communication is the exchange of data between two devices via some
transmissionmedium.
• Three fundamental Characteristics: Delivery,Accuracy and Timeliness.
Prof.PoonamK. 3
Components of Data Communication
• Message
Is the information to be communicated.
• Sender
which sends the data message.
• Receiver
Which receives the message.
• Medium
Physical path by which message travels from sender to receiver.
• Protocol
set of rules govern data communication. Its agreement betweenvarious communication devices.
Computer Networks
Prof.PoonamK. 4
• Computer Network means an interconnected
collectionof computers.
• Two computers are said to be interconnected if theyare able to exchange
information.
• Connections are through copper wire, fiber optic,microwaves or satellite.
• Here the model and software is absent. User aredirectly exposed to machine.
Goals of Network
Prof.PoonamK. 5
• Resource Sharing
• High reliability
• Distribution of workload
• Saving money
• Expandability
• Powerful communication
• Protectinginformation (Security)
• Preserving information
Prof.PoonamK. 6
Computer Network Application
• Business Application
– Company point of view
• Home Application
– Access to remote information
– Person-to-person communication
– Interactive entertainment
Prof.PoonamK. 7
Transmission Mode
• Used to define direction of signal flow between twolinked devices.
• Three modes are supported
– Simplex
– Half Duplex
– Full Duplex
Prof.PoonamK. 8
Transmission Mode – Three Modes
• Simplex
– Communication is unidirectional. Only one of the twodevices on a link can
transmit; the other can only receive.
– Example: keyboards and traditional Monitors
Mainframe Monitor
Direction of Data
Transmission Mode
Prof.PoonamK. 9
• Half Duplex
– Each station can both transmit and receive, but not at the same time. When one device is
sending, the other can only receive and vice versa.
– Example: Walkie-talkies
Workstation Workstation
Direction of Data at time 1
Direction of Data at time 2
Transmission Mode
Prof.PoonamK. 10
• Full Duplex
– Both stations can send and receive simultaneously.
– Signals going in either direction share the capacity of the link
– Sharing occur in two ways: either link must contain two physically separate transmission
paths, one for sending and the other for receiving or the capacity of the channel is divided
between signals traveling in both directions.
– Example: communication in telephone networks, bothcan talk and listen simultaneously.
Transmission Mode
Prof.PoonamK. 11
• Full Duplex
Workstation Workstation
Direction of Data all the time
Prof.PoonamK. 12
Transmission Technology (Line Configuration)
• It is mainly related to handle the technical issues.
• Two types of transmission technologies are used
– Broadcast Networks
– Point-to-point networks
Broadcast Networks
Prof.PoonamK. 13
• Single communication channel shared by all machines on the network.
• Packets with address are sent by any machine are received by all others.
• Upon receiving packet machine checks address field. If it is for itself, it processes the packet
otherwise simply ignore.
• It allows the possibility of addressing a packet to all destinations by using special code in
address field. When packet with this code is transmitted it is received and processed by every
machine hence mode is broadcasting.
• Geographical localized networks tend to use broadcast networks.
Broadcast Networks
Prof.PoonamK. 14
• Broadcast networks are classified depending on channel allocation
• Static allocation
Each machine is allocated a discrete time interval in which machine can transmit the
packet.
• Dynamic allocation
Centralized: here central or single entity decides which machine is going to transmit next.
It may accept request and takes decision according to algorithm define.
Decentralized: no central entity each machine decides whether to transmit or receive.
Broadcast Networks
Prof.PoonamK. 15
Bus
Ring
Satellite or Radio
Prof.PoonamK. 16
Point-to-Point
• It consist of many connections between individual pairs of machines.
• To go from onesourceto destination, packet first visit oneormore intermediate nodes
(machines).
• Packet is sometime stored on intermediate machine till required line is free.
Mechanism is called store- and-forward.
• Routing algorithms: multiple routes are present and of different length.
• Larger networks are usually point to point.
Topology
Prof.PoonamK. 17
• Topology refers to the way a network is laid out,physicallyor logically.
• Two or more links forms a topology.
• There are basic five topologies
– Mesh
– Ring
– Bus
– Tree
– Star
• Hybrid topology
Mesh Topology
Prof.PoonamK. 18
• Every device has dedicated point-to-point link toevery device.
• Dedicated means links carries traffic between twodevices if connected.
• Fully connected network has n(n-1)/2 physical
channelsto link ‘n’ devices and n-1 ports.
Prof.PoonamK. 19
Advantages
• Dedicated links guarantees that connection carry its owndata thus eliminating traffic
problem
• Privacy and security since every message sent along
dedicated line
• Fault isolation and identification is easy
Disadvantages
• Since every device must be connected to each other
installation is difficult.
• Bulk of wires can be greater than available space.
• The hardware requirement is expensive.
Mesh Topology
Prof.PoonamK. 20
Nodes
Star Topology
Prof.PoonamK. 21
• Each device has dedicated point-to-point look to centralcontroller, usually called HUB.
• Devices not connected directly hence no direct traffic
• Controller acts as exchange: data->controller-
>other device
Advantages
• Only one link and one I/O to connect it to many device.
• Easy to install and configure. Less expensive.
• Additions, deletion involves only one connection.
• Robust, only one link is affected.
Star Topology
Prof.PoonamK. 22
Nodes
Hub
Tree Topology
Prof.PoonamK. 23
• Variation over star. Every device is not connected to centralhub directly but through
secondary hub.
• The central hub is active hub having repeaters to regeneratesignal before sending out.
• Secondary hubs can be active or passive. Passive hubssimply provides physical connection
between device.
• Secondary hub adds two additional advantages to star.
– Allow more device connected to central hub.
– Allows network isolation and priority communication
• Example Cable TV
Tree Topology
Prof.PoonamK. 24
Hub
Hub Hub
Hub
Nodes
BUS Topology
Prof.PoonamK. 25
• It is multipoint. One long cable acts as backbone tolink all devices in network.
• Drop lines: connection running between device andmain cable.
• Tap:punctures the sheathing of cable to create acontactwith metallic core.
• Limitation on number of taps.
Advantages
Prof.PoonamK. 26
• Backbonecable can laid along most efficient path and then connectedto node,
hence less cabling than other topologies. Redundancyof cable is eliminated.
Disadvantages
• Difficult to add new device
• Signal reflection at taps can cause degradation inquality.
• The fault or break in cable stops all transmission
Bus Topology
Prof.PoonamK. 27
Nodes
CableEnd Tap CableEnd
Drop
Line
Ring Topology
Prof.PoonamK. 28
• Here each device has dedicated point-to-point linewith two devices either side
of it.
• Signal reaches to destination through device to
device in one direction.
• Repeateris present.
• To add or remove device only one connection tomove.
• Signal is circulating all the time. If destination isunreachable it issues alarm.
• Break in cablecan affect entire network.
Ring Topology
Prof.PoonamK. 29
Direction
Nodes
Types of Networks - LAN
Prof.PoonamK. 30
• LAN usually privately owned and links devices in single office, building or campus.
LANs are limited to few KM.
• It allows sharing of resources between computers. Resources includes hardware,
software or data.
• One computer with large disk acts as server to other client
• Mostly LAN uses one transmission media and most common topologies: bus, mesh,
ring,star etc.
• Single building LAN or Multiple building LAN
Types of Networks - LAN
Prof.PoonamK. 31
Types of Networks - MAN
Prof.PoonamK. 32
• To extend over an entire city.
• It may be single network as television network or means of connecting number of
LANs into larger network to share resources LAN-LAN
• MAN can be wholly owned and operated by private company or may be service
provided by public company such as telephone company.
• There is broadcast medium to which all computers are connected.
Types of Networks - MAN
Prof.PoonamK. 33
Types of Networks - WAN
Prof.PoonamK. 34
• Provides long-distance transmission of data, voice, image and video information over large
geographical area.
• WANs may utilize private, public or leased communication devices in combinations and can
span unlimited number of miles.
• Irregular topology. E.g satellite or ground radio system
• Hosts are connected by subnet which carry data from host- to-host.
• Two components: transmission line: moves bits betweenmachines and switching elements: to
connect two or more transmission lines.
Types of Networks - WAN
Prof.PoonamK. 35
Internetwork
Prof.PoonamK. 36
R
LAN WAN
LAN
R R
LAN
MAN
R
Protocols and Standards
Prof.PoonamK. 37
• Protocols
– Define it as set of rules that govern data communication.
– An entity which is capable of sending or receiving information will not send any bit stream to other place till both
not agreed on set of rules.
– A protocol defines what is communicated, how it is communicatedand when it is communicated.
– The key elements of protocol
• Syntax : refers to the structure or format of the data, meaning the order in which they are presented.
• Semantics : refers to the meaning of each section of bits. How is a particularpattern to be interpreted, and what action is to be taken based
on thatinterpretation
• Timing : refers to two characteristics: when data should be sent and howfast can be sent.
Protocols and Standards
Prof.PoonamK. 38
• Standards
– Are agreed upon rules
– Essential in creating and maintaining an open and competitive market for equipment manufacturers and in
guaranteeing national and international interoperability of data and telecommunications technology and process.
– Provide guidelines to manufacturers, vendors, and other service providers to ensure the kind of interconnectivity
necessary in today’s market.
– Fall in two categories:
• De facto (by fact or by convention): standards that have not been approved by an organized body but have been adopted as standards through
widespread use. They are established by manufacturers
• De jure (by law or by regulation): standards that have been legalized by an officially recognized body.
Protocols and Standards
Prof.PoonamK. 39
• De-facto standardsare divided into two parts
– Proprietary standards are those originally invented by commercial organizations as basis
for the operation of itsproducts. They are called proprietary because they are wholly
owned by the company that invented them. They are also called closed standards
because they close off communication between systems produced by different vendor.
– Non-proprietary standards are those originally developedby groups or committees that
have passed them into the public domain; they are open standards because they open
communications between different systems.
What is LAN
Prof.PoonamK. 40
• LAN is combination of computers, LAN cables, Network interface cards, network
operating system and LAN application software.
What LAN can do
• Share Files
• Transfer Files
• Access information and files
• Share Applications
• Printer Sharing
• Electronic Mail
Components of LAN
Prof.PoonamK. 41
• Computers
– Server
• File Server
• Print Server
• Database Server
– Workstation
• LAN Cables
• Network Adapter Card
• LAN Software
– Network Operating Software
– Application Software
Prof.PoonamK. 42
Server
• Server is computer that serves all the workstations primarilyby storing and retrieving data from
files shared on disk
File Server
• Usually fast computers running at faster speed with large memory.
• Heart of network. Contains monitors and inexpensive keyboards. Have one-or more large, fast, expensive
hard disk.
• Servers must of high quality, heavy duty machines as serves entire network. To serves other machines it
has operating systemcalled network operating system.
Workstations
Prof.PoonamK. 43
• These are various PCs or terminals connected toserver.
• Employees can use them as their own or throughnetworksoftware
• Referred as clients, usually intermediate speed
machines sufficient memory.
• Also have good quality colormonitor as well as highquality keyboards and hard
disk.
• Diskless workstation. Characteristics of workstation.
Characteristics of Workstation
Prof.PoonamK. 44
• Extra messages: NOS loadingetc.
• User authentication:username and password
• Additional drive letters
• User can use remote printer
Network Interface Card
Prof.PoonamK. 45
• Provides the physical connection between the network andthe computer workstation.
• NICs are internal, with card fit into an expansion slot ofmotherboard.
• Now a days, it is on board. Major factor since determinesspeed of network.
• Only two network cards may communicate with each otherat the same time on a LAN.
Wait.
• Such delays are unnoticeable. Gives the appearance as manyworkstations are communicating
simultaneously.
Network Interface Card
Prof.PoonamK. 46
Prof.PoonamK. 47
Working of NIC
• It first listens to all traffic on the cable.
• Filters out the messages designated for your workstation.
• Sends signal to your workstation when workstationis ready to attend them.
• When workstation wants to send request to server, the adaptercard waits for break in
cable traffic and then inserts your message.
• Verifies message also handles error.
Transmission media
Prof.PoonamK. 48
• Cable is medium through which information usuallymoves from one network
device to othernetwork device.
• Network can be based on one type of cable or manytype of cables.
• Decision depends on topology, protocolsand size.
Transmission media
Prof.PoonamK. 49
LAN Cables or transmission medium
Prof.PoonamK. 50
• Twisted pair wire categorized as:
– UTP (Unshielded Twisted Pair): like telephone wire
– STP (Shielded Twisted Pair): like the wire that carrieselectricity
LAN Cables or transmission medium
Prof.PoonamK. 51
• Coaxial Cable
– Thick coaxial cable (Thicknet)
– Thin coaxial cable (Thinnet)
LAN Cables or transmission medium
Prof.PoonamK. 52
• Fiber Optic Cable
Prof.PoonamK. 53
LAN Software
• Network Operating System
– DOS: manage applications on standalone machine
– Needs NOS to control the flow of LAN data messagesbetween stations.
– Makes the disk drive of the server appear to be an extradrive on each workstation.
• Application Software
– In order to accelerate speed of LAN well developedapplication software are necessary.
Types of LAN
Prof.PoonamK. 54
• Server Based LAN
• Peer-to-PeerLAN
Server Based LAN
Prof.PoonamK. 55
• Contains one unattended dedicated computer act as file server and it uses the same
peer LAN NOSproduct to have server-based LAN.
• By managing the computer completely as file server and managing disk in such way
that it gives better performance and increases reliability.
• Dedicated concept helps in expandability of LAN and do more work.
Server Based LAN
Prof.PoonamK. 56
Workstation
Dedicated Server
Peer-to-Peer LAN
Prof.PoonamK. 57
• To connect small group of computers permanently.
• You need simple file transfer utility
• Every computer needs to act as file server as well as workstation at the same time
hence peer-to-peer LAN.
• Disk space and files on your computer becomes communal property.
Peer-to-Peer LAN
Prof.PoonamK. 58
Network Model
Prof.PoonamK. 59
• ISO-OSI Reference Model:Function of each layer
• Internet (TCP/IP)Model:All Layers, Ports, ProtocolStack
Network Model
Prof.PoonamK. 60
Network Model is conceptual structure which shows how various parts are fit together
and work together to transmit data.
Network Model
ISO-OSI Reference Model TCP/IP Refernce Model/
Internet Model
ISO-OSI Reference Model
Prof.PoonamK. 61
• ISO is International Standards Organization developed in 1947. It is multinational
bodydedicated to worldwide agreement on international standards
• An ISO standard develop themodel that covers all aspectsof networkcommunication
called as Open System Interconnection (OSI) model.
• The designing of the OSI model is based on theproposal developed by ISO as first
step towards international standardization of protocol used in various layers.
ISO-OSI Reference Model
Prof.PoonamK. 62
7
6
5
4
3
2
1
Physical Layer
Data Link Layer
Network Layer
Transport Layer
Session Layer
Presentation Layer
Application Layer
Organization of Layer
Prof.PoonamK. 63
• In 7 layered OSI model layers 1, 2 and 3 are the network support layers. They deals with
physical aspects of moving data from one device to other.
• Layers 5,6,7 are acts as user support layers. They allows interoperability between unrelated
software system.
• Layer 4 ensures the end to end reliable data transmissions. While layer 2 ensures reliable
transmission on single link.
• Upper layer OSI layers are almost software dependent. Lower layer models are combination of
hardware and software except for the physical layer which is mostly hardware related.
Physical Layer
Prof.PoonamK. 64
• To transmit a bit stream over a physical medium.
• Deals with mechanical and electrical specification of interfaces andtransmission medium.
• Defines procedure and function for physical devices
• Physical characteristics of Interfaces
– Characteristics of interface between device and transmissionmedium.
Type of transmission medium.
• Representation of bits
– Sequence of 0s and 1s. To be transmit bits must be encoded intosignals- electrical or optical
• Data rate
– Transmission rate- the number of bits per second
Physical Layer
Prof.PoonamK. 65
• Synchronization of bits
– Sender and receiver clock must be synchronized.
• Line Configuration
– Point-to-point or multipoint line configuration
• Physical Topology
– How to connect devices in network
• Transmission mode
– Simplex, Half Duplex, Full Duplex
Physical Layer
Prof.PoonamK. 66
From data link lay er To data link lay er
L2 data L2 data
Physical
Layer
Physical
Layer
Transmission Medium
10101000010
10101000010
Data Link Layer
Prof.PoonamK. 67
• Responsible for node-to-node delivery of frames. It makes physicallayer appear error free to the upper layer.
• Framing
– Divides stream of bits received form network layer into
manageable data units called Frames.
• Physical Addressing
– When frames are send over a network it is required to add headercontaining source and destination address.
• Flow Control
– The rate at which data is absorbed bythe receiver.
• Error Control (Trailer)
– Adding mechanism to detect and retransmit damaged or lost frame
• Access Control
– To determine which device has controlover link at any given time.
Data Link Layer
Prof.PoonamK. 68
From netw orklayer To netw orklayer
To Physical Layer From Physical Layer
T2
Data
10 87
Trailer Source Address Destination Address
Data
Link
Layer
Frame
H2
T2
Data
Link
Layer
Frame
H2
T2
10101000010 10101000010
L3 data L3 data
Network Layer
Prof.PoonamK. 69
• Responsible for the source-to-destination delivery of packetacross multiple networks.
• If two systems are connected to same link, no need ofnetwork layer.
• If systems in different networks then need to implementnetwork layer to accomplish
source-to-destination delivery.
• Logical Addressing
– To handle addressing problems over network logical addressingscheme is used.
• Routing
– When independent networks or link are connected properpathselection should be achieved.
Network Layer
Prof.PoonamK. 70
From Transport lay er To Transport lay er
To Data Link Lay er From Data Link Lay er
T2
Data
A B 10 87
Trailer Source Physical Address Destination Physical Address Source LogicalAddress Destination Logical Address
Network Layer
Packet
L3 data
H3
Network
Layer
Packet
L3 data
H3
L4 data L4 data
Transport Layer
Prof.PoonamK. 71
• Responsible for source-to-destination delivery of entire message. Treats each
message independently.
• Ensures whole message arrived in order and an errorfree
• Security: implements connection between source and destination. Connection
implementation involves: connection establishment, data transfer and connection
release.
• Other issues are:
Transport Layer
Prof.PoonamK. 72
• Service Point Addressing
– Computer runs several processes (running program) at same time. So transport layer makes delivery
from one runningprocess to other running process. So it adds service point address (Port Address) to
header.
• Segmentation and reassembly
– A message is divided into transmittable segments. Sequence number is with segment, which helps to
reassemble segments.
Transport Layer
Prof.PoonamK. 73
• Connection Control
– Connectionless or connection oriented. Connectionless: segment is treated independently and deliver
to transport layer of destination
– Connection oriented: after establishing connection, data istransfer and then connection is terminated.
• Flow Control
– Here flow control is done end-to-end rather across a single link.
• Error Control
– Here error control is done end-to-end rather across a single link.
Transport Layer
Prof.PoonamK. 74
From Session lay er To Session lay er
To Network Lay er From Network Lay er
L5 data
Transport
Layer
H4
H4
H4
L4 data
L5 data
Transport
Layer
L4 data
H4
H4
H4
L4 data L4 data
L4 data L4 data
Session Layer
Prof.PoonamK. 75
• It is a network dialog controller. It establishes, maintains and synchronizes the
interaction between communicating system.
• Dialog Control
– Allows two systems to enter into a dialog. Allows communication between two processes
to take place either half or full duplex.
• Synchronization
– Allows a process to add checkpoints into a stream of data
– E.g. 2000 pages
Session Layer
Prof.PoonamK. 76
Session Layer
Syn
L5 data
L6 data
Session Layer
Syn
L5 data
L6 data
From Presentation lay er To Presentation Lay er
To Transport Lay er From Transport Lay er
H5 H5
Presentation Layer
Prof.PoonamK. 77
• Concerned with the syntax and semantics of the information exchanged between two
systems.
• Translation
– Exchange information: characters, numbers and so on.
– Information must be changed to bit streams before transmitting using encoding techniques.
– Different encoding schemes are used. So presentationlayer changes sender information in
sender-dependentformat whereas on receiver side in receiver-dependent format.
Presentation Layer
Prof.PoonamK. 78
• Encryption and Decryption
– To carry sensitive information, privacy is important.
• Compression
– Reduces the number of bits contained in the information. It is required in case of
transmission of multimedia such as text, audio and video.
Presentation Layer
Prof.PoonamK. 79
From Application lay er To Application lay er
To Session Lay er From Session Lay er
Presentation
Layer
H6
Encoded, Encrypted, and
compressed data
L7 data
Presentation
Layer
H6
Decoded, decrypted, and
decompressed data
L7 data
L6 data L6 data
Application Layer
Prof.PoonamK. 80
• Enablesuser to access the network.
• Provides user interfaces and support or services likeelectronicmail, remote file
access and transfer, shared DBMS and otherdistributed type of
applications.applications.
• Other Issues
Application Layer
Prof.PoonamK. 81
• Network Virtual Terminal
– Is software version of physical terminal which allowsuser to log on to a remote host.
– The user’s computer talks to software terminal, which in turns, talks to host, and vice versa.
• File Transfer, access and Management (FTAM)
– Allows user to access files in remote host (to make changes or read data), to retrieve files
from remote computer for use in local computer and to manage or control other issues.
Application Layer
Prof.PoonamK. 82
• Mail Services
– Provides the basis for email forwarding and storage.
• Directory Services
– Provides distributed database sources and access for
global information about various objects and services.
Application Layer
Prof.PoonamK. 83
User User
From Presentation Lay er To Presentation Lay er
X.500 FTAM X.400
Application
Layer
L7 data
X.500 FTAM X.400
Application
Layer
L7 data
Internet Model (TCP/IP)
Prof.PoonamK. 84
• ARPANET: Grandparent of computer networks andworldwideInternet.
• ARPANET was research network sponsored by
DOD (Department of Defense).
• It eventually connected universities and governmentinstallationsusing leased
telephone lines.
• When satellite and radio networks gets added thereis need of new architecture.
• Goal: to connect multiple networks together in
seamless way. Architecture is TCP/IP.
TCP/IP Model
Prof.PoonamK. 85
Application Layer
Physical Layer
Host-to-Network
Data Link Layer
Transport Layer
Network Layer/ Internet Layer
TCP/IP Model
Prof.PoonamK. 86
• The model is composed of five ordered layers:
– Physical Layer (Layer 1)
– Data Link Layer (Layer 2)
– Network Layer (Layer 3)
– Transport Layer (Layer 4)
– Application Layer (Layer 5)
• At the time of transmitting messages the messageuses intermediate nodes at
lower layers.
Organization of Layers
Prof.PoonamK. 87
• The lower layers physical layer, data link layer and network layer are the network
support layers, deals with physical aspects of moving data from one device to other.
• Layer 5: the upper layer is application –user support layers. Allows interoperability
between unrelated software systems.
• Layer 4: links two subgroups and ensures that what lower layers have transmitted in
the form the upper layer understand.
Prof.PoonamK. 88
Internet Layer
• It is connectionless layer.
• Its job is to permit hosts to inject packets into any network and have them travel
independently to destination (on different network)
• They may arrive in different order than they were sent.
• It is job of higher layer to rearrange them in order.
• Internet Layer defines an official packet format (datagram) and protocol called IP
(InternetProtocol).
Prof.PoonamK. 89
Transport Layer
• It is designed to allow peer entities on the sourceand destinationhosts to carry
on a conversation
• Transport layer of this model deals with two end-to-endprotocols.
• TCP (Transmission Control Protocol)
• UDP(User Datagram Protocol)
Prof.PoonamK. 90
Application Layer
• It consists of all higher-level protocols.
• It uses various protocolslike: TELNET, SMTP, FTPetc.
• TELNET allows user on one machine to log intodistantmachine and work
there.
• FTP provides a way to move data efficiently fromone machine to other.
• SMTP protocol is used for electronic mail facility.
• In addition it provides DNS for mapping hosts,HTTP: World Wide Web.
Host-to-Network Layer
Prof.PoonamK. 91
• Layer is developed by combining physical layer and data link layer.
• In addition to OSI model functionalityit adds a special protocol which helps to send
IP packets over it.
Protocol Stack
Prof.PoonamK. 92
Data Link Protocols defined by the
Physical underlying protocol
Application
TELNET
Session
RPC
TFTP
NFS
SNMP
DNS
FTP
SMTP
Presentation
Transport UDP
TCP
Network IP
ARP
RARP
IGMP
ICMP
IEEE Standards 802.11 Wireless LAN
Prof.PoonamK. 93
• Institute of Electrical and Electronics Engineers (IEEE) defines specification for
wireless LAN, IEEE802.11
• Covers physical and data link layers.
• Architecture – two kind of services
– BSS (Basic Service Set)
– ESS (Extended Service Set)
IEEE Standards 802.11 Wireless LAN
Prof.PoonamK. 94
• Basic Service Set
– Building block of wireless LAN
– Made of stationary or mobile wireless stations and
possible centralbase station called access point (AP)
– Two sets: BSS with AP and BSS Without AP
• BSS without an AP is standalone network and can not send datato other BSSs. Called as adhoc architecture in
which stations can form network without an AP, locates each other and agree to be part of BSS
IEEE Standards 802.11 Wireless LAN
Prof.PoonamK. 95
• Basic Service Set
BSS without AP BSS with AP
AP
IEEE Standards 802.11 Wireless LAN
Prof.PoonamK. 96
• Extended Service Set
– Made of two or more BSSs with APs.
– BSSs are connected through a distribution system usuallya wired LAN.
– Distribution system connects APs in the BSSs
– 802.11 not restrict distribution system, it can be anyIEEE LAN like Ethernet.
– Uses two type of stations: mobile and stationary
– Mobile stations are normal station in BSS.
– Stationary stations are AP stations part of wired LAN.
IEEE Standards 802.11 Wireless LAN
Prof.PoonamK. 97
• Extended Service Set
Server or Gateway
BSS BSS
AP AP
Distributed System
IEEE Standards 802.11 Wireless LAN
Prof.PoonamK. 98
• Extended Service Set
– When BSSs are connected we have infrastructure
network.
– Stations within each of one another can communicatewithout an AP.
– Communication between two stations in different BSSsoccurs via two APs.
– Idea is similar to communication in cellular network.
– Consider Each BSS to cell and each AP to base station
– Mobile station can belong to more than one BSS at sametime.

Weitere ähnliche Inhalte

Was ist angesagt?

Chapter 8 lan_technologies_and_network_topology
Chapter 8 lan_technologies_and_network_topologyChapter 8 lan_technologies_and_network_topology
Chapter 8 lan_technologies_and_network_topology
Aman Jaiswal
 
Computer network (Lecture 1)
Computer network (Lecture 1)Computer network (Lecture 1)
Computer network (Lecture 1)
Vishwajit Nandi
 
Computer Networking
Computer NetworkingComputer Networking
Computer Networking
Alisha Jain
 
( Network topology) )final
( Network topology) )final( Network topology) )final
( Network topology) )final
Jai Kumar
 
Introduction of Computer Networking Technoloy
Introduction of Computer Networking TechnoloyIntroduction of Computer Networking Technoloy
Introduction of Computer Networking Technoloy
Ammar Rahman
 
Telecommunications and computer networks
Telecommunications and computer networksTelecommunications and computer networks
Telecommunications and computer networks
ichiswa
 

Was ist angesagt? (20)

Networks
NetworksNetworks
Networks
 
Chapter 8 lan_technologies_and_network_topology
Chapter 8 lan_technologies_and_network_topologyChapter 8 lan_technologies_and_network_topology
Chapter 8 lan_technologies_and_network_topology
 
20CS2007 Computer Communication Networks
20CS2007 Computer Communication Networks 20CS2007 Computer Communication Networks
20CS2007 Computer Communication Networks
 
20CS2007 Computer Communication Networks
20CS2007 Computer Communication Networks 20CS2007 Computer Communication Networks
20CS2007 Computer Communication Networks
 
Lan technologies
Lan technologiesLan technologies
Lan technologies
 
Computer network (Lecture 1)
Computer network (Lecture 1)Computer network (Lecture 1)
Computer network (Lecture 1)
 
Computer Networking
Computer NetworkingComputer Networking
Computer Networking
 
Introduction to data communications
Introduction to data communicationsIntroduction to data communications
Introduction to data communications
 
( Network topology) )final
( Network topology) )final( Network topology) )final
( Network topology) )final
 
Network and its concepts
Network and its conceptsNetwork and its concepts
Network and its concepts
 
Dc ch08 : local area network overview
Dc ch08 : local area network overviewDc ch08 : local area network overview
Dc ch08 : local area network overview
 
Networking ppt
Networking ppt Networking ppt
Networking ppt
 
Network Connecting Devices UNIT 5
Network Connecting Devices UNIT 5Network Connecting Devices UNIT 5
Network Connecting Devices UNIT 5
 
Introduction of Computer Networking Technoloy
Introduction of Computer Networking TechnoloyIntroduction of Computer Networking Technoloy
Introduction of Computer Networking Technoloy
 
Networking Fundamentals
Networking  FundamentalsNetworking  Fundamentals
Networking Fundamentals
 
Telecommunications and computer networks
Telecommunications and computer networksTelecommunications and computer networks
Telecommunications and computer networks
 
Computer Networks basics and OSI
Computer Networks basics and OSIComputer Networks basics and OSI
Computer Networks basics and OSI
 
Lan architecture
Lan architectureLan architecture
Lan architecture
 
Network in brief
Network in briefNetwork in brief
Network in brief
 
Data comm and networking
Data comm and networkingData comm and networking
Data comm and networking
 

Ähnlich wie Networking Concepts

Computer networks
Computer networksComputer networks
Computer networks
Tej Kiran
 
Skr+3200+chapter+1+(kweh)
Skr+3200+chapter+1+(kweh)Skr+3200+chapter+1+(kweh)
Skr+3200+chapter+1+(kweh)
Ammar Shafiq
 
types of computer networks, protocols and standards
types of computer networks, protocols and standardstypes of computer networks, protocols and standards
types of computer networks, protocols and standards
Midhun Menon
 
Computer Networks
Computer NetworksComputer Networks
Computer Networks
Imdad Ullah
 

Ähnlich wie Networking Concepts (20)

Unit 1 introduction to computer networks
Unit 1  introduction to computer networksUnit 1  introduction to computer networks
Unit 1 introduction to computer networks
 
Data communications_Network_Model (1).pdf
Data communications_Network_Model (1).pdfData communications_Network_Model (1).pdf
Data communications_Network_Model (1).pdf
 
Computer networks
Computer networksComputer networks
Computer networks
 
ch01.ppt
ch01.pptch01.ppt
ch01.ppt
 
Skr+3200+chapter+1+(kweh)
Skr+3200+chapter+1+(kweh)Skr+3200+chapter+1+(kweh)
Skr+3200+chapter+1+(kweh)
 
Introduction to networking by vikas jagtap
 Introduction to networking by vikas jagtap Introduction to networking by vikas jagtap
Introduction to networking by vikas jagtap
 
Chapter 1 Introduction to computer networks ppt by DMB
Chapter 1 Introduction to computer networks ppt by DMBChapter 1 Introduction to computer networks ppt by DMB
Chapter 1 Introduction to computer networks ppt by DMB
 
Chapter 1 ppt by dmb
Chapter 1 ppt by dmbChapter 1 ppt by dmb
Chapter 1 ppt by dmb
 
types of computer networks, protocols and standards
types of computer networks, protocols and standardstypes of computer networks, protocols and standards
types of computer networks, protocols and standards
 
Types of cn, protocols and standards
Types of cn, protocols and standardsTypes of cn, protocols and standards
Types of cn, protocols and standards
 
Ch 1 network
Ch 1  networkCh 1  network
Ch 1 network
 
Unit_1.pdf computer networks and computer topology
Unit_1.pdf computer networks and computer topologyUnit_1.pdf computer networks and computer topology
Unit_1.pdf computer networks and computer topology
 
Introduction to Networks computer networking.pptx
Introduction to Networks computer networking.pptxIntroduction to Networks computer networking.pptx
Introduction to Networks computer networking.pptx
 
Network Chap1
Network Chap1Network Chap1
Network Chap1
 
Computer Networks
Computer NetworksComputer Networks
Computer Networks
 
Chap1 networking
Chap1 networkingChap1 networking
Chap1 networking
 
20CS2007 Computer Communication Networks
20CS2007 Computer Communication Networks 20CS2007 Computer Communication Networks
20CS2007 Computer Communication Networks
 
Communication and network concepts
Communication and network conceptsCommunication and network concepts
Communication and network concepts
 
Data Communication 1
Data Communication 1Data Communication 1
Data Communication 1
 
Presentation On Computer Network
Presentation On Computer NetworkPresentation On Computer Network
Presentation On Computer Network
 

Kürzlich hochgeladen

+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
Health
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
masabamasaba
 
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
chiefasafspells
 
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
masabamasaba
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
masabamasaba
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
masabamasaba
 

Kürzlich hochgeladen (20)

Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
 
Artyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptxArtyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptx
 
%in Harare+277-882-255-28 abortion pills for sale in Harare
%in Harare+277-882-255-28 abortion pills for sale in Harare%in Harare+277-882-255-28 abortion pills for sale in Harare
%in Harare+277-882-255-28 abortion pills for sale in Harare
 
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
 
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
 
%in Benoni+277-882-255-28 abortion pills for sale in Benoni
%in Benoni+277-882-255-28 abortion pills for sale in Benoni%in Benoni+277-882-255-28 abortion pills for sale in Benoni
%in Benoni+277-882-255-28 abortion pills for sale in Benoni
 
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park %in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
 
What Goes Wrong with Language Definitions and How to Improve the Situation
What Goes Wrong with Language Definitions and How to Improve the SituationWhat Goes Wrong with Language Definitions and How to Improve the Situation
What Goes Wrong with Language Definitions and How to Improve the Situation
 
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
 
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
 
Announcing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareAnnouncing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK Software
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
 
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
 
WSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go Platformless
 
WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?
 

Networking Concepts

  • 1. Prof.PoonamK. 1 Ch 1. Overview of Networking Concepts • Basics of communication systems • Transmission Media • Topology and Types of Networks • TCP/IP protocolStacks • Wireless Networks • The Internet
  • 2. Prof.PoonamK. 2 Data Communication • In data communication data refers to facts, concepts and instructions presented in various form and communicationrefers to actuallyexchange or share theinformation. • Communication is local: face to face or remote: takes place over distance. • Data communication is the exchange of data between two devices via some transmissionmedium. • Three fundamental Characteristics: Delivery,Accuracy and Timeliness.
  • 3. Prof.PoonamK. 3 Components of Data Communication • Message Is the information to be communicated. • Sender which sends the data message. • Receiver Which receives the message. • Medium Physical path by which message travels from sender to receiver. • Protocol set of rules govern data communication. Its agreement betweenvarious communication devices.
  • 4. Computer Networks Prof.PoonamK. 4 • Computer Network means an interconnected collectionof computers. • Two computers are said to be interconnected if theyare able to exchange information. • Connections are through copper wire, fiber optic,microwaves or satellite. • Here the model and software is absent. User aredirectly exposed to machine.
  • 5. Goals of Network Prof.PoonamK. 5 • Resource Sharing • High reliability • Distribution of workload • Saving money • Expandability • Powerful communication • Protectinginformation (Security) • Preserving information
  • 6. Prof.PoonamK. 6 Computer Network Application • Business Application – Company point of view • Home Application – Access to remote information – Person-to-person communication – Interactive entertainment
  • 7. Prof.PoonamK. 7 Transmission Mode • Used to define direction of signal flow between twolinked devices. • Three modes are supported – Simplex – Half Duplex – Full Duplex
  • 8. Prof.PoonamK. 8 Transmission Mode – Three Modes • Simplex – Communication is unidirectional. Only one of the twodevices on a link can transmit; the other can only receive. – Example: keyboards and traditional Monitors Mainframe Monitor Direction of Data
  • 9. Transmission Mode Prof.PoonamK. 9 • Half Duplex – Each station can both transmit and receive, but not at the same time. When one device is sending, the other can only receive and vice versa. – Example: Walkie-talkies Workstation Workstation Direction of Data at time 1 Direction of Data at time 2
  • 10. Transmission Mode Prof.PoonamK. 10 • Full Duplex – Both stations can send and receive simultaneously. – Signals going in either direction share the capacity of the link – Sharing occur in two ways: either link must contain two physically separate transmission paths, one for sending and the other for receiving or the capacity of the channel is divided between signals traveling in both directions. – Example: communication in telephone networks, bothcan talk and listen simultaneously.
  • 11. Transmission Mode Prof.PoonamK. 11 • Full Duplex Workstation Workstation Direction of Data all the time
  • 12. Prof.PoonamK. 12 Transmission Technology (Line Configuration) • It is mainly related to handle the technical issues. • Two types of transmission technologies are used – Broadcast Networks – Point-to-point networks
  • 13. Broadcast Networks Prof.PoonamK. 13 • Single communication channel shared by all machines on the network. • Packets with address are sent by any machine are received by all others. • Upon receiving packet machine checks address field. If it is for itself, it processes the packet otherwise simply ignore. • It allows the possibility of addressing a packet to all destinations by using special code in address field. When packet with this code is transmitted it is received and processed by every machine hence mode is broadcasting. • Geographical localized networks tend to use broadcast networks.
  • 14. Broadcast Networks Prof.PoonamK. 14 • Broadcast networks are classified depending on channel allocation • Static allocation Each machine is allocated a discrete time interval in which machine can transmit the packet. • Dynamic allocation Centralized: here central or single entity decides which machine is going to transmit next. It may accept request and takes decision according to algorithm define. Decentralized: no central entity each machine decides whether to transmit or receive.
  • 16. Prof.PoonamK. 16 Point-to-Point • It consist of many connections between individual pairs of machines. • To go from onesourceto destination, packet first visit oneormore intermediate nodes (machines). • Packet is sometime stored on intermediate machine till required line is free. Mechanism is called store- and-forward. • Routing algorithms: multiple routes are present and of different length. • Larger networks are usually point to point.
  • 17. Topology Prof.PoonamK. 17 • Topology refers to the way a network is laid out,physicallyor logically. • Two or more links forms a topology. • There are basic five topologies – Mesh – Ring – Bus – Tree – Star • Hybrid topology
  • 18. Mesh Topology Prof.PoonamK. 18 • Every device has dedicated point-to-point link toevery device. • Dedicated means links carries traffic between twodevices if connected. • Fully connected network has n(n-1)/2 physical channelsto link ‘n’ devices and n-1 ports.
  • 19. Prof.PoonamK. 19 Advantages • Dedicated links guarantees that connection carry its owndata thus eliminating traffic problem • Privacy and security since every message sent along dedicated line • Fault isolation and identification is easy Disadvantages • Since every device must be connected to each other installation is difficult. • Bulk of wires can be greater than available space. • The hardware requirement is expensive.
  • 21. Star Topology Prof.PoonamK. 21 • Each device has dedicated point-to-point look to centralcontroller, usually called HUB. • Devices not connected directly hence no direct traffic • Controller acts as exchange: data->controller- >other device Advantages • Only one link and one I/O to connect it to many device. • Easy to install and configure. Less expensive. • Additions, deletion involves only one connection. • Robust, only one link is affected.
  • 23. Tree Topology Prof.PoonamK. 23 • Variation over star. Every device is not connected to centralhub directly but through secondary hub. • The central hub is active hub having repeaters to regeneratesignal before sending out. • Secondary hubs can be active or passive. Passive hubssimply provides physical connection between device. • Secondary hub adds two additional advantages to star. – Allow more device connected to central hub. – Allows network isolation and priority communication • Example Cable TV
  • 25. BUS Topology Prof.PoonamK. 25 • It is multipoint. One long cable acts as backbone tolink all devices in network. • Drop lines: connection running between device andmain cable. • Tap:punctures the sheathing of cable to create acontactwith metallic core. • Limitation on number of taps.
  • 26. Advantages Prof.PoonamK. 26 • Backbonecable can laid along most efficient path and then connectedto node, hence less cabling than other topologies. Redundancyof cable is eliminated. Disadvantages • Difficult to add new device • Signal reflection at taps can cause degradation inquality. • The fault or break in cable stops all transmission
  • 28. Ring Topology Prof.PoonamK. 28 • Here each device has dedicated point-to-point linewith two devices either side of it. • Signal reaches to destination through device to device in one direction. • Repeateris present. • To add or remove device only one connection tomove. • Signal is circulating all the time. If destination isunreachable it issues alarm. • Break in cablecan affect entire network.
  • 30. Types of Networks - LAN Prof.PoonamK. 30 • LAN usually privately owned and links devices in single office, building or campus. LANs are limited to few KM. • It allows sharing of resources between computers. Resources includes hardware, software or data. • One computer with large disk acts as server to other client • Mostly LAN uses one transmission media and most common topologies: bus, mesh, ring,star etc. • Single building LAN or Multiple building LAN
  • 31. Types of Networks - LAN Prof.PoonamK. 31
  • 32. Types of Networks - MAN Prof.PoonamK. 32 • To extend over an entire city. • It may be single network as television network or means of connecting number of LANs into larger network to share resources LAN-LAN • MAN can be wholly owned and operated by private company or may be service provided by public company such as telephone company. • There is broadcast medium to which all computers are connected.
  • 33. Types of Networks - MAN Prof.PoonamK. 33
  • 34. Types of Networks - WAN Prof.PoonamK. 34 • Provides long-distance transmission of data, voice, image and video information over large geographical area. • WANs may utilize private, public or leased communication devices in combinations and can span unlimited number of miles. • Irregular topology. E.g satellite or ground radio system • Hosts are connected by subnet which carry data from host- to-host. • Two components: transmission line: moves bits betweenmachines and switching elements: to connect two or more transmission lines.
  • 35. Types of Networks - WAN Prof.PoonamK. 35
  • 37. Protocols and Standards Prof.PoonamK. 37 • Protocols – Define it as set of rules that govern data communication. – An entity which is capable of sending or receiving information will not send any bit stream to other place till both not agreed on set of rules. – A protocol defines what is communicated, how it is communicatedand when it is communicated. – The key elements of protocol • Syntax : refers to the structure or format of the data, meaning the order in which they are presented. • Semantics : refers to the meaning of each section of bits. How is a particularpattern to be interpreted, and what action is to be taken based on thatinterpretation • Timing : refers to two characteristics: when data should be sent and howfast can be sent.
  • 38. Protocols and Standards Prof.PoonamK. 38 • Standards – Are agreed upon rules – Essential in creating and maintaining an open and competitive market for equipment manufacturers and in guaranteeing national and international interoperability of data and telecommunications technology and process. – Provide guidelines to manufacturers, vendors, and other service providers to ensure the kind of interconnectivity necessary in today’s market. – Fall in two categories: • De facto (by fact or by convention): standards that have not been approved by an organized body but have been adopted as standards through widespread use. They are established by manufacturers • De jure (by law or by regulation): standards that have been legalized by an officially recognized body.
  • 39. Protocols and Standards Prof.PoonamK. 39 • De-facto standardsare divided into two parts – Proprietary standards are those originally invented by commercial organizations as basis for the operation of itsproducts. They are called proprietary because they are wholly owned by the company that invented them. They are also called closed standards because they close off communication between systems produced by different vendor. – Non-proprietary standards are those originally developedby groups or committees that have passed them into the public domain; they are open standards because they open communications between different systems.
  • 40. What is LAN Prof.PoonamK. 40 • LAN is combination of computers, LAN cables, Network interface cards, network operating system and LAN application software. What LAN can do • Share Files • Transfer Files • Access information and files • Share Applications • Printer Sharing • Electronic Mail
  • 41. Components of LAN Prof.PoonamK. 41 • Computers – Server • File Server • Print Server • Database Server – Workstation • LAN Cables • Network Adapter Card • LAN Software – Network Operating Software – Application Software
  • 42. Prof.PoonamK. 42 Server • Server is computer that serves all the workstations primarilyby storing and retrieving data from files shared on disk File Server • Usually fast computers running at faster speed with large memory. • Heart of network. Contains monitors and inexpensive keyboards. Have one-or more large, fast, expensive hard disk. • Servers must of high quality, heavy duty machines as serves entire network. To serves other machines it has operating systemcalled network operating system.
  • 43. Workstations Prof.PoonamK. 43 • These are various PCs or terminals connected toserver. • Employees can use them as their own or throughnetworksoftware • Referred as clients, usually intermediate speed machines sufficient memory. • Also have good quality colormonitor as well as highquality keyboards and hard disk. • Diskless workstation. Characteristics of workstation.
  • 44. Characteristics of Workstation Prof.PoonamK. 44 • Extra messages: NOS loadingetc. • User authentication:username and password • Additional drive letters • User can use remote printer
  • 45. Network Interface Card Prof.PoonamK. 45 • Provides the physical connection between the network andthe computer workstation. • NICs are internal, with card fit into an expansion slot ofmotherboard. • Now a days, it is on board. Major factor since determinesspeed of network. • Only two network cards may communicate with each otherat the same time on a LAN. Wait. • Such delays are unnoticeable. Gives the appearance as manyworkstations are communicating simultaneously.
  • 47. Prof.PoonamK. 47 Working of NIC • It first listens to all traffic on the cable. • Filters out the messages designated for your workstation. • Sends signal to your workstation when workstationis ready to attend them. • When workstation wants to send request to server, the adaptercard waits for break in cable traffic and then inserts your message. • Verifies message also handles error.
  • 48. Transmission media Prof.PoonamK. 48 • Cable is medium through which information usuallymoves from one network device to othernetwork device. • Network can be based on one type of cable or manytype of cables. • Decision depends on topology, protocolsand size.
  • 50. LAN Cables or transmission medium Prof.PoonamK. 50 • Twisted pair wire categorized as: – UTP (Unshielded Twisted Pair): like telephone wire – STP (Shielded Twisted Pair): like the wire that carrieselectricity
  • 51. LAN Cables or transmission medium Prof.PoonamK. 51 • Coaxial Cable – Thick coaxial cable (Thicknet) – Thin coaxial cable (Thinnet)
  • 52. LAN Cables or transmission medium Prof.PoonamK. 52 • Fiber Optic Cable
  • 53. Prof.PoonamK. 53 LAN Software • Network Operating System – DOS: manage applications on standalone machine – Needs NOS to control the flow of LAN data messagesbetween stations. – Makes the disk drive of the server appear to be an extradrive on each workstation. • Application Software – In order to accelerate speed of LAN well developedapplication software are necessary.
  • 54. Types of LAN Prof.PoonamK. 54 • Server Based LAN • Peer-to-PeerLAN
  • 55. Server Based LAN Prof.PoonamK. 55 • Contains one unattended dedicated computer act as file server and it uses the same peer LAN NOSproduct to have server-based LAN. • By managing the computer completely as file server and managing disk in such way that it gives better performance and increases reliability. • Dedicated concept helps in expandability of LAN and do more work.
  • 56. Server Based LAN Prof.PoonamK. 56 Workstation Dedicated Server
  • 57. Peer-to-Peer LAN Prof.PoonamK. 57 • To connect small group of computers permanently. • You need simple file transfer utility • Every computer needs to act as file server as well as workstation at the same time hence peer-to-peer LAN. • Disk space and files on your computer becomes communal property.
  • 59. Network Model Prof.PoonamK. 59 • ISO-OSI Reference Model:Function of each layer • Internet (TCP/IP)Model:All Layers, Ports, ProtocolStack
  • 60. Network Model Prof.PoonamK. 60 Network Model is conceptual structure which shows how various parts are fit together and work together to transmit data. Network Model ISO-OSI Reference Model TCP/IP Refernce Model/ Internet Model
  • 61. ISO-OSI Reference Model Prof.PoonamK. 61 • ISO is International Standards Organization developed in 1947. It is multinational bodydedicated to worldwide agreement on international standards • An ISO standard develop themodel that covers all aspectsof networkcommunication called as Open System Interconnection (OSI) model. • The designing of the OSI model is based on theproposal developed by ISO as first step towards international standardization of protocol used in various layers.
  • 62. ISO-OSI Reference Model Prof.PoonamK. 62 7 6 5 4 3 2 1 Physical Layer Data Link Layer Network Layer Transport Layer Session Layer Presentation Layer Application Layer
  • 63. Organization of Layer Prof.PoonamK. 63 • In 7 layered OSI model layers 1, 2 and 3 are the network support layers. They deals with physical aspects of moving data from one device to other. • Layers 5,6,7 are acts as user support layers. They allows interoperability between unrelated software system. • Layer 4 ensures the end to end reliable data transmissions. While layer 2 ensures reliable transmission on single link. • Upper layer OSI layers are almost software dependent. Lower layer models are combination of hardware and software except for the physical layer which is mostly hardware related.
  • 64. Physical Layer Prof.PoonamK. 64 • To transmit a bit stream over a physical medium. • Deals with mechanical and electrical specification of interfaces andtransmission medium. • Defines procedure and function for physical devices • Physical characteristics of Interfaces – Characteristics of interface between device and transmissionmedium. Type of transmission medium. • Representation of bits – Sequence of 0s and 1s. To be transmit bits must be encoded intosignals- electrical or optical • Data rate – Transmission rate- the number of bits per second
  • 65. Physical Layer Prof.PoonamK. 65 • Synchronization of bits – Sender and receiver clock must be synchronized. • Line Configuration – Point-to-point or multipoint line configuration • Physical Topology – How to connect devices in network • Transmission mode – Simplex, Half Duplex, Full Duplex
  • 66. Physical Layer Prof.PoonamK. 66 From data link lay er To data link lay er L2 data L2 data Physical Layer Physical Layer Transmission Medium 10101000010 10101000010
  • 67. Data Link Layer Prof.PoonamK. 67 • Responsible for node-to-node delivery of frames. It makes physicallayer appear error free to the upper layer. • Framing – Divides stream of bits received form network layer into manageable data units called Frames. • Physical Addressing – When frames are send over a network it is required to add headercontaining source and destination address. • Flow Control – The rate at which data is absorbed bythe receiver. • Error Control (Trailer) – Adding mechanism to detect and retransmit damaged or lost frame • Access Control – To determine which device has controlover link at any given time.
  • 68. Data Link Layer Prof.PoonamK. 68 From netw orklayer To netw orklayer To Physical Layer From Physical Layer T2 Data 10 87 Trailer Source Address Destination Address Data Link Layer Frame H2 T2 Data Link Layer Frame H2 T2 10101000010 10101000010 L3 data L3 data
  • 69. Network Layer Prof.PoonamK. 69 • Responsible for the source-to-destination delivery of packetacross multiple networks. • If two systems are connected to same link, no need ofnetwork layer. • If systems in different networks then need to implementnetwork layer to accomplish source-to-destination delivery. • Logical Addressing – To handle addressing problems over network logical addressingscheme is used. • Routing – When independent networks or link are connected properpathselection should be achieved.
  • 70. Network Layer Prof.PoonamK. 70 From Transport lay er To Transport lay er To Data Link Lay er From Data Link Lay er T2 Data A B 10 87 Trailer Source Physical Address Destination Physical Address Source LogicalAddress Destination Logical Address Network Layer Packet L3 data H3 Network Layer Packet L3 data H3 L4 data L4 data
  • 71. Transport Layer Prof.PoonamK. 71 • Responsible for source-to-destination delivery of entire message. Treats each message independently. • Ensures whole message arrived in order and an errorfree • Security: implements connection between source and destination. Connection implementation involves: connection establishment, data transfer and connection release. • Other issues are:
  • 72. Transport Layer Prof.PoonamK. 72 • Service Point Addressing – Computer runs several processes (running program) at same time. So transport layer makes delivery from one runningprocess to other running process. So it adds service point address (Port Address) to header. • Segmentation and reassembly – A message is divided into transmittable segments. Sequence number is with segment, which helps to reassemble segments.
  • 73. Transport Layer Prof.PoonamK. 73 • Connection Control – Connectionless or connection oriented. Connectionless: segment is treated independently and deliver to transport layer of destination – Connection oriented: after establishing connection, data istransfer and then connection is terminated. • Flow Control – Here flow control is done end-to-end rather across a single link. • Error Control – Here error control is done end-to-end rather across a single link.
  • 74. Transport Layer Prof.PoonamK. 74 From Session lay er To Session lay er To Network Lay er From Network Lay er L5 data Transport Layer H4 H4 H4 L4 data L5 data Transport Layer L4 data H4 H4 H4 L4 data L4 data L4 data L4 data
  • 75. Session Layer Prof.PoonamK. 75 • It is a network dialog controller. It establishes, maintains and synchronizes the interaction between communicating system. • Dialog Control – Allows two systems to enter into a dialog. Allows communication between two processes to take place either half or full duplex. • Synchronization – Allows a process to add checkpoints into a stream of data – E.g. 2000 pages
  • 76. Session Layer Prof.PoonamK. 76 Session Layer Syn L5 data L6 data Session Layer Syn L5 data L6 data From Presentation lay er To Presentation Lay er To Transport Lay er From Transport Lay er H5 H5
  • 77. Presentation Layer Prof.PoonamK. 77 • Concerned with the syntax and semantics of the information exchanged between two systems. • Translation – Exchange information: characters, numbers and so on. – Information must be changed to bit streams before transmitting using encoding techniques. – Different encoding schemes are used. So presentationlayer changes sender information in sender-dependentformat whereas on receiver side in receiver-dependent format.
  • 78. Presentation Layer Prof.PoonamK. 78 • Encryption and Decryption – To carry sensitive information, privacy is important. • Compression – Reduces the number of bits contained in the information. It is required in case of transmission of multimedia such as text, audio and video.
  • 79. Presentation Layer Prof.PoonamK. 79 From Application lay er To Application lay er To Session Lay er From Session Lay er Presentation Layer H6 Encoded, Encrypted, and compressed data L7 data Presentation Layer H6 Decoded, decrypted, and decompressed data L7 data L6 data L6 data
  • 80. Application Layer Prof.PoonamK. 80 • Enablesuser to access the network. • Provides user interfaces and support or services likeelectronicmail, remote file access and transfer, shared DBMS and otherdistributed type of applications.applications. • Other Issues
  • 81. Application Layer Prof.PoonamK. 81 • Network Virtual Terminal – Is software version of physical terminal which allowsuser to log on to a remote host. – The user’s computer talks to software terminal, which in turns, talks to host, and vice versa. • File Transfer, access and Management (FTAM) – Allows user to access files in remote host (to make changes or read data), to retrieve files from remote computer for use in local computer and to manage or control other issues.
  • 82. Application Layer Prof.PoonamK. 82 • Mail Services – Provides the basis for email forwarding and storage. • Directory Services – Provides distributed database sources and access for global information about various objects and services.
  • 83. Application Layer Prof.PoonamK. 83 User User From Presentation Lay er To Presentation Lay er X.500 FTAM X.400 Application Layer L7 data X.500 FTAM X.400 Application Layer L7 data
  • 84. Internet Model (TCP/IP) Prof.PoonamK. 84 • ARPANET: Grandparent of computer networks andworldwideInternet. • ARPANET was research network sponsored by DOD (Department of Defense). • It eventually connected universities and governmentinstallationsusing leased telephone lines. • When satellite and radio networks gets added thereis need of new architecture. • Goal: to connect multiple networks together in seamless way. Architecture is TCP/IP.
  • 85. TCP/IP Model Prof.PoonamK. 85 Application Layer Physical Layer Host-to-Network Data Link Layer Transport Layer Network Layer/ Internet Layer
  • 86. TCP/IP Model Prof.PoonamK. 86 • The model is composed of five ordered layers: – Physical Layer (Layer 1) – Data Link Layer (Layer 2) – Network Layer (Layer 3) – Transport Layer (Layer 4) – Application Layer (Layer 5) • At the time of transmitting messages the messageuses intermediate nodes at lower layers.
  • 87. Organization of Layers Prof.PoonamK. 87 • The lower layers physical layer, data link layer and network layer are the network support layers, deals with physical aspects of moving data from one device to other. • Layer 5: the upper layer is application –user support layers. Allows interoperability between unrelated software systems. • Layer 4: links two subgroups and ensures that what lower layers have transmitted in the form the upper layer understand.
  • 88. Prof.PoonamK. 88 Internet Layer • It is connectionless layer. • Its job is to permit hosts to inject packets into any network and have them travel independently to destination (on different network) • They may arrive in different order than they were sent. • It is job of higher layer to rearrange them in order. • Internet Layer defines an official packet format (datagram) and protocol called IP (InternetProtocol).
  • 89. Prof.PoonamK. 89 Transport Layer • It is designed to allow peer entities on the sourceand destinationhosts to carry on a conversation • Transport layer of this model deals with two end-to-endprotocols. • TCP (Transmission Control Protocol) • UDP(User Datagram Protocol)
  • 90. Prof.PoonamK. 90 Application Layer • It consists of all higher-level protocols. • It uses various protocolslike: TELNET, SMTP, FTPetc. • TELNET allows user on one machine to log intodistantmachine and work there. • FTP provides a way to move data efficiently fromone machine to other. • SMTP protocol is used for electronic mail facility. • In addition it provides DNS for mapping hosts,HTTP: World Wide Web.
  • 91. Host-to-Network Layer Prof.PoonamK. 91 • Layer is developed by combining physical layer and data link layer. • In addition to OSI model functionalityit adds a special protocol which helps to send IP packets over it.
  • 92. Protocol Stack Prof.PoonamK. 92 Data Link Protocols defined by the Physical underlying protocol Application TELNET Session RPC TFTP NFS SNMP DNS FTP SMTP Presentation Transport UDP TCP Network IP ARP RARP IGMP ICMP
  • 93. IEEE Standards 802.11 Wireless LAN Prof.PoonamK. 93 • Institute of Electrical and Electronics Engineers (IEEE) defines specification for wireless LAN, IEEE802.11 • Covers physical and data link layers. • Architecture – two kind of services – BSS (Basic Service Set) – ESS (Extended Service Set)
  • 94. IEEE Standards 802.11 Wireless LAN Prof.PoonamK. 94 • Basic Service Set – Building block of wireless LAN – Made of stationary or mobile wireless stations and possible centralbase station called access point (AP) – Two sets: BSS with AP and BSS Without AP • BSS without an AP is standalone network and can not send datato other BSSs. Called as adhoc architecture in which stations can form network without an AP, locates each other and agree to be part of BSS
  • 95. IEEE Standards 802.11 Wireless LAN Prof.PoonamK. 95 • Basic Service Set BSS without AP BSS with AP AP
  • 96. IEEE Standards 802.11 Wireless LAN Prof.PoonamK. 96 • Extended Service Set – Made of two or more BSSs with APs. – BSSs are connected through a distribution system usuallya wired LAN. – Distribution system connects APs in the BSSs – 802.11 not restrict distribution system, it can be anyIEEE LAN like Ethernet. – Uses two type of stations: mobile and stationary – Mobile stations are normal station in BSS. – Stationary stations are AP stations part of wired LAN.
  • 97. IEEE Standards 802.11 Wireless LAN Prof.PoonamK. 97 • Extended Service Set Server or Gateway BSS BSS AP AP Distributed System
  • 98. IEEE Standards 802.11 Wireless LAN Prof.PoonamK. 98 • Extended Service Set – When BSSs are connected we have infrastructure network. – Stations within each of one another can communicatewithout an AP. – Communication between two stations in different BSSsoccurs via two APs. – Idea is similar to communication in cellular network. – Consider Each BSS to cell and each AP to base station – Mobile station can belong to more than one BSS at sametime.