You are on page 1of 47

1

Computer Networks Ch-1


By Jignesh Patel

Uses of Computer Networks


Business Application (n/w for companies)

For Monitoring.
Resource Sharing (e.g. Printer, Scanner etc)
Remote Data Sharing Across Network.
E-commerce.

Home Application (n/w for People)

Access to remote information


Person-to-person communication (peer-to-peer)
Interactive entertainment
E-commerce
By Jignesh Patel

Mobile Users
PDA
WAP
M-commerce

Social Issues
social, ethical, and political problems.
Open Newspaper.

By Jignesh Patel

Network Hardware
About Technical aspect of Network design.
Two Dimensions are important

1. Transmission technology.
2. Scale

By Jignesh Patel

Transmission Technology
Creating a link between nodes
Link: path followed by bits
Wired or wireless
Broadcast or point-to-point (or both)

Node: any device connected to a link

By Jignesh Patel

Types of Links
Point-to-Point

Multiple Access

By Jignesh Patel

Packet Transmission Modes


Unicast (Point-to-Point)
Transmission to single specific receiver

Broadcast
Transmission to all network nodes

Multicast
Transmission to specific subset of nodes

Anycast
Transmission to one of a specific subset of nodes
By Jignesh Patel

Scale
As per the scale networks can be classified into
LAN
MAN
WAN
Wireless Network

All can be differentiated by their size.

By Jignesh Patel

LAN (local Area Networks)


A local area network (LAN) is a group of computers
within a small area, such as a house, office or school,
that are connected to each other. Most academic
institutions and corporate networks use LANs.
allowed to access other devices on the LAN,
provided it has the necessary permissions.
This allows users to share data, share expensive
resources

like

printers

and

scanners,

and

communicate via email and instant messaging.


By Jignesh Patel

10

The characteristics of a LAN are its arrangement


of nodes (topologies), the physical media used to
connect the nodes, e.g. fiber optic cable, and the
communication protocol used to send or receive
data.
Most current LANs run on Ethernet and use the
IEEE 802.3 protocol for communication.

By Jignesh Patel

11

By Jignesh Patel

12

The following characteristics are some advantages of LAN:


Very high network speeds and data transfer rates
Traditional LAN 10 mbps to 100 mbps
Newer LAN up to 10 gbps (Ethernet)

Protection from the outside world, thus creating a


trusted computing environment (Firewalls are usually
used to protect LANs and to provide a secure computing
environment.)
By Jignesh Patel

13

Broadcast N/W
These all are a broadcasting system,
where intended machine will get the
message and other will simply discard
it.
Broadcasting N/W can be divided in
1.

Static (Based on time & RR)

2.

Dynamic (single entity decided


whos next broadcaster)

By Jignesh Patel

14

MAN(Metropolitan Area Networks


A metropolitan area network (MAN) is a
computer network that usually spans a city or a
large campus. A MAN usually interconnects a
number of local area networks (LANs) using a highcapacity backbone technology, such as fiber-optical
links, and provides up-link services to wide area
networks (or WAN) and the Internet.

By Jignesh Patel

15

By Jignesh Patel

16

WAN (Wide Area Networks)


WAN, spans a large geographical area, often a country or continent.
Contains a collection of machines intended for running user
applications
Host

PCs are connected to subnet for communication (subnet

consist of Transmission Link & Switching Element-Router)

WAN media include metallic circuits, fiber-optic links, or wireless


links such as satellite, microwave, or free-air optic systems
(Transmission Link).
Uses internetworking devices such as routers, modems, switches,
gateways, multiplexers, bridges (Switching Element).
By Jignesh Patel

17

A WAN is a geographically-dispersed collection of LANs. A


network device called a router connects LANs to a WAN. In IP
networking, the router maintains both a LAN address and a
WAN address.
A WAN differs from a LAN in several important ways. Most
WANs (like the Internet) are not owned by any one
organization but rather exist under collective or distributed
ownership and management. WANs tend to use technology
like ATM, Frame Relay and X.25 for connectivity over the
longer distances.
By Jignesh Patel

18

By Jignesh Patel

Types of Data Communications Network

20

Wireless Network

Radio frequency signals used in a wireless network

By Jignesh Patel

21

PAN
A WPAN (wireless personal area network) is a
network for interconnecting devices centered
around an individual person's workspace - in
which the connections are wireless. Typically, a
WPAN uses some technology that permits
communication within about 10 meters (33 ft)
such as Bluetooth, which was used as the basis
for a new standard, IEEE 802.15.
A Bluetooth PAN is also called a piconet

By Jignesh Patel

22

By Jignesh Patel

23

WLAN
WLANs provide wireless network communication
over short distances using radio or infrared signals
instead of traditional network cabling.
A WLAN typically extends an existing wired local
area network. WLANs are built by attaching a device
called the access point (AP) to the edge of the wired
network. Clients communicate with the AP using a
wireless network adapter similar in function to a
traditional Ethernet adapter.
By Jignesh Patel

24

By Jignesh Patel

25

WMAN
A Wireless Metropolitan Area Network (WMAN) is
also known as a Wireless Local Loop (WLL). WMANs
are based on the IEEE 802.16 standard. Wireless local
loop can reach effective transfer speeds of 1 to 10 Mbps
within a range of 4 to 10 k.m., which makes it useful
mainly for telecommunications companies.
The best-known wireless metropolitan area network
is WiMAX, which can reach speeds on the order of 70
Mbps over a radius of several k.m.(uses high Radio
frequency -microwaves)
By Jignesh Patel

26

By Jignesh Patel

27

WWAN
Wireless Wide Area Networks (WWAN) are the most
common of all wireless networks, because all mobile
phones are connected to a wireless wide area network.
The main technologies are:
GSM (Global System for Mobile Communication)
GPRS (General Packet Radio Service)
UMTS (Universal Mobile Telecommunication System)

By Jignesh Patel

28

By Jignesh Patel

29

By Jignesh Patel

30

Internetworks
Collection of interconnected networks called
internetworks (internet).

By Jignesh Patel

31

Network
Software
2
Protocol Hierarchies
Design issues for the layers
Connection-Oriented and Connectionless
Services

By Jignesh Patel

32

Protocol Hierarchies
To reduce design complexity, most networks are
designed as a stack of layers.
Each provides different services to other layers.
Each has different functions.
Protocol is a agreement between layers.
The entities comprising the corresponding layers on
different machines are called peers (can be H/W device,
processes or human beings)
Peers communicates through protocols.

By Jignesh Patel

33

Virtual
Connection

Physical
Connection

By Jignesh Patel

34

Set of layers and protocol is called a network


architecture.
A list of protocol used by a certain system, one
protocol per layer, is called a protocol stack.
Example if 2 philosophers, one who speaks English
& Urdu and other who speaks Chinese & French.

By Jignesh Patel

35

By Jignesh Patel

36

More technical Example of communication

By Jignesh Patel

37

Design Issues for the Layers


There are some key design issues occur in computer
networks are present in several layers
Addressing
Error control
Flow control
Multiplexing
Demultiplexing
Routing
By Jignesh Patel

38

Addressing:- Every layer needs a mechanism to


identify senders and receivers.
Error control: Its

an

important

issue

because

physical

communication circuits are not perfect.


Many error detecting and error correcting codes are
available.
Both sending and receiving ends are must agree to use
any one code.
By Jignesh Patel

39

Data Transfer:- Rules for Data transfer must


define.
1. Simple : Transmit or Receive.
2. Half Duplex - transmit ,receive alternatively.
3. Full Duplex transmit, receive simultaneously.

Flow control:- This property leads to


mechanisms for disassembling, transmitting
and then reassembling messages.
By Jignesh Patel

40

Routing :- When there are multiple paths between


source and destination, a route must be chosen.
Multiplexing and Demultiplexing :Inconvenient & expensive to set up a separate
connection

for

each

pair

of

communicating

processes.

By Jignesh Patel

41

Connection-Oriented & Connectionless


Services
These two distinct techniques are used in data
communications to transfer data. Each has its
own advantages and disadvantages.
Connection-Oriented: The most common example for the connection
oriented service is the PSTN (Public Switched
Telephone Network), the analogue phone system
that you use every day.
By Jignesh Patel

42

When using a connection-oriented protocol, you incur


the overhead of setting up a virtual circuit (a defined
communications path) between the sender and
receiver, which is maintained until the sender and
receiver have completed their entire conversation.

By Jignesh Patel

43

Connectionless: Contrast

this

with

Connectionless

service,

which does not require establishing a session and


a

virtual

circuit.

You

can

think

of

a connectionless protocol as being akin to mailing


a post card. You send it and hope that the receiver
gets it.

By Jignesh Patel

44

TCP, DCCP, Connection-oriented Ethernet, ATM, Frame


Relay,

TIPC,

SCTP,

IPX/SPX,

X.25

are

popular connection oriented protocols.


HTTP, IP, UDP, ICMP, IPX, TIPC, NetBEUI are
connectionless protocols.

By Jignesh Patel

45

Comparison of Both services Transfer


Connection-Oriented

Connectionless

Example :PSTN
Occupies whole line during
communication. Hence same
line cant be use until
conversation gets over.
Costly due to holding whole
communication line.

Example :Mailing System


Communication channel is
shared. Hence when line is
free,
can
be
use
for
communication.
More cheaper (you will pay
when use. when line is free you
are not paying.)
More robust. Packet may take
any route as per condition.
Does not get quality in voice
due to compression of packets
and delay difference between
packets.

Less robust. If connection gets


lost data is gone.
Quality in voice due to no
delay in packets and no
compression of packets.

By Jignesh Patel

46

Comparison of Both services Transfer


Connection-Oriented

Connectionless

Due to beforehand connection


every intermediate router
comes
to
know
about
connection. Hence all of them
expect it to occupy resources
( memory, processor time
etc).so there wont be problem
of holding packets or C.P.U.
not available.
Packets order maintained.1st
packet which is sent received
1st.
Reliable , due to line is at our
disposal so until connection
gets over there is no worry.

No connection. Hence certain


issues can occur.

Packets pumped into n/w &


free to take any route. So
probably packet which is sent
1st receive 2nd or last.
Not much reliable because line
is shared so connection speed
is base upon n/w traffic (e.g.
internet )
By Jignesh Patel

47

E.g. X.25 is a ConnectionOriented protocol: the routing


information used by the
network is carried only in the
packets used to establish the
connection;
thereafter
addressing information is not
required.

E.g. In IP each packet is routed


according to the information
within that packet (typically by
using the Destination Address)

By Jignesh Patel

You might also like