Professional Documents
Culture Documents
NETWORKS
By
ASHWINI AVABHRAT
(01)
SHWETA DESHPANDE
(10)
SANDEEPA GUPTA (17)
INTRODUCTION
Two or more than two computer systems
connected by means of a communication
medium like cables is termed as a
Network.
Note:
Networks that share some of the characteristics
of both LANs and WANs are sometimes referred
to as Metropolitan Area Networks (MAN). The
MANs usually cover a wider geographic area than
LANs. The main objective of MANs is to
interconnect LANs located in a entire city or
NETWORK TOPOLOGY
It refers to the physical layout of the network,
especially the location of the computers and how
the cable is run between them.
Advantages:
Good Performance
Easy to set up and to expand.
Any non-centralized failure will have very
little effect on the network, whereas on a
ring network it would all fail with one fault.
Disadvantages:
Expensive to install
Extra hardware required
RING TOPOLOGY
A ring network is a topology of computer
networks where each connected to node is two
other nodes, so as to create a ring.
Advantages:
Data is quickly transferred without a ‘bottle
neck’. (very fast, all data traffic is in the same
direction)
The transmission of data is simple as packets
travel in one direction only.
Adding additional nodes has very little impact on
Disadvantages:
Data packets must pass through every
computer between the sender and
recipient therefore this makes it slower.
If any of the nodes fail then the ring is
broken and data cannot be transmitted
successfully.
It is difficult to troubleshoot the ring.
Because all stations are wired together,
to add a station you must shut down the
network temporarily.
In order for all computers to
communicate with each other, all
computers must be turned on.
TOKEN RING
A token ring is a type of computer
network in which all the computers are
arranged (schematically) in a circle. A
token, which is a special bit pattern,
travels around the circle. To send a
message, a computer catches the token,
attaches a message to it, and then lets it
continue to travel around the network.
1
PSE PSE
A
2 3
PSE PSE
C 4
D F
SWITCHING TECHNIQUES
The process moving data from one
interface and delivering it through
another interface, selecting the best
paths between machines that store
messages is known as switching.
connection-oriented networks.
DISADVANTAGES :
Additional overhead during circuit
establishment and circuit
PACKET SWITCHING
connectionless networks.
ADVANTAGES :
Efficient usage of channels
(Bandwidths are shared).
Alternate paths may be used (Failed
paths may be ignored).
Suitable for small data bursty in
nature.
DISADVANTAGES :
Each packet needs to be buffered and
reassembled.
Inefficient for large messages.
ROUTING TECHNIQUES
In a WAN, when multiple paths exist
between the source and destination
computers of a packet, any one of the
path may be used.
• HOP-BY-HOP ROUTING :
Each PSE along the path decides only
the next PSE for the path.
• HYBRID ROUTING :
Source comps PSE specifies certain
major intermediate PSEs of the complete
path and the sub paths are decided
TIME CONSTANT BASED
• OPTIONS AVAILABLE :
Leased Telephone Lines
Dedicated Telephone Lines
Public Data Networks
Communication Satellites
Network Management
Technologies
Network Management is monitoring
and analysis of network status and
activities.
They monitor Data Throughput, Node
and Link Failures and other Global
Occurrences on network.
They report existence and cause of the
problem.
They should enfold all the protocols
and devices on a typical
heterogeneous internetwork, should
COMMUNICATION
PROTOCOLS
• The term protocol is used to refer to
a set of rules and conventions
needed for communication between
communicating parties.
• Requirements of communication
protocols for network systems and
distributed systems are different.
Protocols for Network Systems
Network Layer:
• Sets up logical path between two
sites for communication to take
place.
• Two popular network layer protocols
Transport Layer:
Provides site-to-site communication
and hides all the details of the
communication subnet from the
session layer by providing network
independent transport service.
The two most popular protocols are
TCP and UDP.
Session Layer:
Provides the means by which
presentation entities can organize
and synchronize their dialog and
Presentation Layer:
Represents message information to
communicating application layer
entities in a way that preserves
meaning while resolving syntax
differences.
Application Layer:
Provides services that directly
supports the end users of the
network.
The IEEE 802 LAN Reference
Model
It is a connectionless protocol
designed to support transparency,
group communication, secure
communication and easy network
management.
ATM Layer
Physical Layer
PHYSICAL LAYER
ATM
SWITCH
ATM ATM
SWITCH SWITCH
THANK YOU