You are on page 1of 40

Networking Technologies and E-Commerce

Session 3 Dr. Devendra Kumar Punia d.punia@fsm.ac.in

Last Session
Network speeds LAN topology, media, hardware, protocol WLAN - types WAN switching (frame relay, ATM) Mobile & Wireless Computing - multiplexing

Comparison of communication media

Wired

Coaxial Twisted Pair Fiber Optic

Wireless Radio Microwave Satellite Infrared Cellular Table T4.1, T4.2, T4.5

Internet

The Internet

The Internet is a network of networks. Today, the Internet connects tens of thousands of networks and millions of computer 1990: 3000 networks ( 200,000 users.) 1992: 992,000 hosts. Present: millions of networks, computers, and users.

The Internet

TCP / IP Protocol

Peer to Peer networking

Node to Node delivery

Exchange using Internet

The Physical Layer

The physical layer is responsible for transmitting individual bits from one node to the next.

Data Link Layer

The data link layer is responsible for transmitting frames from one node to the next.

Network Layer

The network layer is responsible for the delivery of packets from the original source to the final destination.

Transport Layer

The transport layer is responsible for delivery of a message from one process to another.

Application Layer

The application layer is responsible for providing services to the user.

Summary of layers functions

Encapsulation

The application data is sent down Each layer adds a header to the data (PDU) from its higher layer.

Multiplexing and Demultiplexing

Different higher layer protocols can use the service by the same lower layer protocol. The same higher layer protocol can use the service by different lower layer protocols.

Naming and Addressing

Uniquely identify processes in different computers for communications.


IP address Domain name Port number MAC address

IP Address
Each host interface in the Internet has a unique IP address. IPv4, 32 bits, dotted-decimal notation

IPv6, 128-bit address

Five Classes of IP Addresses

Subnetting

Three levels of an IP address:


Network ID Subnet ID Host ID

Subnet mask: separates subnet ID and host ID

Internet Assigned Numbers Authority (IANA)

Internet Assigned Numbers Authority (IANA) is responsible for three things:


Assigning IP addresses, that is, the four octets to identify every Internet router, server and workstation Running the root name servers that provide the essential base for the Domain Name System (DNS) Acting as final arbiter and editor for key standards developed by the Internet Community A technique used to express IP addresses via the use of four decimal numbers separated from one another by decimal points

IANA developed the Dotted Decimal Notation

IP version (IPv6)

IP version 6 (IPv6) has been developed to extend source and destination addresses and provide a mechanism to add new operations with built-in security Although IPv4 is still widely used, over the next few years, the IPv4 32-bit address will be replaced with the IPv6 128-bit address Slow adoption of IPv6 is attributed to the enormous difficulty in changing network-layer protocols

Domain Name

Identify a host User friendly Hierarchically organized Domain Name System (DNS): resolves a domain name to the corresponding IP address.

DNS servers and the domain name database Name caching DNS query and reply

The Domain Name Space

Port Number
Address for the application layer user process. Port Number field in TCP or UDP header. Well-known port numbers

1 to 255: Internet wide services 256 to 1023: preserved for Unix specific services 1024 and up: ephemeral port numbers

MAC address

used to get datagram from one interface to another physically-connected interface (same network) 48 bit MAC address (for most LANs) burned in the adapter ROM MAC address allocation administered by IEEE Manufacturers buy portion of MAC address space (to assure uniqueness) Each adapter has a unique MAC address

Internet2 Intranet and Extranet Converged Networks VoIP VPN

Internet2

Internet2 is an outcome of collaborative efforts to address the increasing need for greater bandwidth and sustaining a cuttingedge network capability I2 helps to alleviate traffic jams through the creation of a limited number of regional hubs, called Giga-POPs, which serve as access points for high-performance networks

Intranet & Extranet

Intranet

A LAN that uses the Internet technologies within an organization Open only those inside the organization Example: insurance related information provided to employees over an intranet

Extranet

A LAN that uses the Internet technologies across an organization including some external constituents Open only those invited users outside the organization Accessible through the Internet Example: Suppliers and customers accessing inventory information in a company over an extranet

Converged Networks

Converged Data/Voice networks

Application of voice digitization and compression techniques to enable voice transmission over networks originally developed to transport data

Characteristics of Converged Data/Voice Networks


Low delay, Echo cancellation, Latency and Jitter for voice Call-completion ratio Intelligent network services like AA, caller ID, hunt groups Interface with standard telephone sets Handle megabit data streams for video Low error rates for data Strong security for mission-critical data

Voice over IP (VoIP)

VoIP is transmitting telephone calls over the Internet rather than through the traditional telephone system

PSTN and IP Internetworking

Assured Quality Routing (AQR) marries packet and circuit switching to automatically reroute calls to the PSTN when parameters do not meet accepted ranges

VoIP Call Process VoIP QoS

Jitter buffer discards and bursts (varying periods of packet loss), are concealed by PLC-enabled vocoders

Virtual Private Network (VPN)

VPNs are encrypted tunnels through a shared private or public network, and are very cost-effective as compared to dedicated or leased lines.

Tunneling is the process of encrypting and then encapsulating the outgoing information in IP packets for transit across the Internet and reversing the process at the receiving end. Encryption involves scrambling of data by use of a mathematical algorithm.

VPN Tunnels and Protocols

LAN-to-LAN or site-to-site tunnels

Client-to-LAN tunnels

Usually corporate environments, where users on either LAN can use the tunnel transparently to communicate with one another Need to be set up, so the client must run special software to initiate the creation of a tunnel and then exchange traffic with the corporate network

Virtual Private LAN Service (VPLS)

VPN Protocols

A class of VPN that connects multiple sites over a managed IP/MPLS network to form a single bridged domain
Leading protocols are: PPTP, L2TP, and IPSec

HTTP

Hyper Text Transfer Protocol (HTTP)

This is the Webs application protocol, operates on the clientServer model. The client and server executing on different endsystems communicate using HTTP messages. Also a HTTP dialogue may be concerned with transferring several files associated with a particular web page. Generally a base HTML file and the files relating to several referenced objects. Persistent and non persistent connections Uniform Resource Locator protocol (http, ftp, news) host name (name.domain name) port (usually 80) directory path to the resource resource name http://mail.yahoo.com/

Non-Persistent HTTP
Connect.Rq

TCP

Request File Send File

Disconnect.Rq

Connect.Rq

Persistent HTTP
Connect.Rq

Request File

Send File
Request File Send File

Request File Send File

Disconnect. Rq

Thanks

You might also like