You are on page 1of 22

WELCOME

A POWER POINT PRESENTATION ON

“COMPUTER NETWORKS”
Co-elucidated by
KUMAR ABHISHEK (C.Sc.E)
&
KUMAR MURLIDHAR (E.C.E)
INTRODUCTION

A “Computer Network” is an interconnection of a


group of computers. Networks may be Classified
by what is called the network layer at which they
operate according to basic reference models
considered as standards in the industry such as
the four-layer Internet Protocol Suite model.
TYPES OF NETWORKS
On the basis of “ SCALE ”
LOCAL AREA NETWORKS(LAN)
 A network covering a small geographic area, like a home,
office, or building.
 Current LANs are most likely to be based on Ethernet
technology.
METROPOLITAN AREA NETWORK(MAN)

Between LANs
and WANs

Traditional point-to-point and


switched networks in WANs
inadequate for growing needs
of organizations

Requirement for high


capacity private and
public networks at low
costs over a large area
WIDE AREA NETWORK(WAN)
 A WAN is a data communications network that covers a relatively
broad geographic area (i.e. one city to another and one country to
another country) and that often uses transmission facilities provided
by common carriers, such as telephone companies.
2.BASED ON “SPAN”
An INTRANET is a

Intra set of
interconnected
networks, using the
Internet Protocol

net and uses Ip-base


tools such as web
browsers, that is
under the control of
a single
administrative

Extra entity.

net An EXTRANET is
a network or
internetwork that
is limited in scope
to a single
The organization or
entity but which
“intern also has limited
connections to
et” the networks
THE INTERNET HISTORY
 Evolved from ARPANET, 1969
Advanced Research Projects Agency
(ARPA),U.S. Department of
Defense.
 Began in four locations: UCLA,
University of Santa Barbara, the
University of Utah, and SRI
(Stanford Research Institute)
 “WWW “ was developed in Spring
1989, at CERN (the European
Laboratory for Particle Physics) by
Tim Berners-Lee.
 Explosive growth came with first
graphically oriented browser,
Mosaic, 1993
NETWORK TOPOLOGY
1. BUS TOPLOGY
Each node is daisy-chained
(connected one right after
the other) along the same
backbone. Information
sent from a node travels
along the backbone until it
reaches its destination
node.
2.RING TOPOLOGY

 Similar to a bus network,


rings have nodes daisy
chained, but the end of the
network in a ring topology
comes back around to the
first node, creating a
complete circuit. Each
node takes a turn sending
and receiving information
through the use of a token.
3.STAR TOPOLOGY

 In a star network, each


node is connected to a
central device called a hub.
The hub takes a signal that
comes from any node and
passes it along to all the
other nodes in the
network.
BASIC TRANSMISSION MEDIA

CONDUCTIVE: twisted pairs and coaxial cables

ELECTROMAGNETIC: microwave

LIGHT: lasers and optical fibers (need clear line of


sight)

WIRELESS – inner/ outer space ; satellite


(omnidirectional  security issues)
THE NETWORK ARCHITECTURE
THE OSI REFERENCE MODEL

File Transfer, Email, Remote Login 

ASCII Text, Sound (syntax layer) 

Establish/manage connection 

End-to-end control & error checking


(ensure complete data transfer): TCP 
Routing and Logical Addressing: IP 

Two party communication: Ethernet 


How to transmit signal; coding
Hardware means of sending and 
receiving data on a carrier
THE TCP/IP ARCHITECTURE
ASSOCIATED TCP/IP PROTOCOLS &
SERVICES

This protocol, the core of the World Wide Web,

HTTP

facilitates retrieval and transfer of hypertext (mixed


media) documents. Stands for the Hypertext Transfer
protocol

A remote terminal emulation protocol

Telnet

that enables clients to log on to remote


hosts on the network.

Used to remotely manage network

SNMP

devices. Stands for the Simple Network


Management Protocol.
NETWORK SECURITY

Securit ●
Confidentiality
y ●
Integrity
Requir ●
Availability
ements ●
Authenticity
TYPES OF ATTACKS ON A NETWORK

Pas Act
sive ●
Eavesdropping on
transmissions
ive ●


Masquerade
Replay

Modification of

Att Release of
Att

messages
message contents ●
Denial of service

Difficult to detect ●
Easy to detect

ack ●
Can be prevented
ack ●
Hard to prevent

s s
SIMPLIFIED MODEL OF
SYMMETRIC ENCRYPTION

Ingredients

a) Plain text
b) Encryption algorithm
c) Secret key
d) Ciphertext
e) Decryption algorithm
PUBLIC-KEY CRYPTOGRAPHY
THE RSA ALGORITHM
  Key Generation
  Select p, q p and q both prime, p  q
 Calculate n = p ´ q
 Calculate f(n) = (p – 1)(q – 1)
 Select integer gcd (f(n), e) = 1;
1 < e < f(n)
 Calculate d de mod f(n) = 1
 Public key KU = {e, n}
 Private key KR = {d, n}

 Encryption
 Plaintext: M<n
 Cipher text: C = Me (mod n)

 Decryption

 Cipher text: C
 Plaintext: M = Cd (mod n)
NETWORK MANAGEMENT
Elements of
Network
Management

Security Fault

Perform Account
ance ing
LATEST DEVELOPMENTS IN COMPUTER
NETWORKING
1.THE INTERNET GRID 2.THE GOOGLE WAVES
 Grid computing is the combination of  Google Wave is It is a web-based
computer resources from multiple
service, computing platform, and
administrative domains applied to a
common task, usually to a scientific,
communications protocol designed
technical or business problem that to merge e-mail, instant messaging,
requires a great number of computer wikis, and social networking.
processing cycles or the need to process
large amounts of data.
BIBLIOGRAPHY
 “Computer Networks” By Andrew Tenenbaum.
 Digital Communication And Networking by Behrouz A. Forouzan.
 Communication Networks by Alberto Leon Garcia & Indra
Widjaja.
 www.google.com, www.dogpile.com, www.ask.com,
www.compnetworking.about.com

You might also like