Professional Documents
Culture Documents
Confidential
•Network Communication
Confidential
What is Networking?
Confidential
Suppose two individuals have some ideas to share
Russian French
Confidential
Three basic elements of Computer Network
Connected
Confidential
Sharing of Resources in Computer Network
Hard-disk
Printer
Modem
Confidential
Signals
Confidential
Protocols
Confidential
Complexity of a Protocol
Packet acknowledgment
Segmentation
Flow control
Error detection
Error correction
Data compression
Data encryption
Confidential
Protocol Interaction
Confidential
Types of Computer Network
Confidential
LAN
Confidential
Layout of LAN
Confidential
MAN
•Within a city
Confidential
Layout of MAN
Building A Building B
Within a City
MAN Link
Network A
Network B
Confidential
WAN
Inter City
or
Inter Country
Confidential
Layout of WAN
WAN Link
City A City B
DELHI
CHENNAI
Confidential
Case Study - I
Confidential
Problem
Confidential
Suggested Solution
Confidential
Transmission Basics
Confidential
Analog and Digital Signals
Confidential
Analog and Digital Signals (continued)
Confidential
Data Modulation
Confidential
Simplex Communication
Confidential
Half Duplex Commnuication
Confidential
Full-Duplex Communications
Confidential
Transmission Direction: Multiplexing
Confidential
Relationships Between Nodes
Confidential
Baseband and Broadband
Confidential
Baseband Communication
Confidential
Broadband Communication
Confidential
Segments and Backbones
Confidential
Transmission Flaws: Noise
Confidential
Latency
Confidential
Common Media Characteristics: Throughput
Confidential
Cost
Many variables can influence final cost of implementing
specific type of media:
Cost of installation
Cost of obsolescence
Confidential
Size and Scalability
Confidential
Noise Immunity
Confidential
Entities of Computer Network
•Service Provider
•Service Requester
•Peers
Confidential
Entities of Computer Network
Confidential
Types Computer Network Classified on Network Entities
Peer to Peer
Per-to-Peer Networks allow any entity to both Request and
Provide Network Services .
Server Centric
Server Centric Networks involve strictly defined roles of entities
( either as a Server or Client ) .
Confidential
Advantages of Server- Based Networks
2. Central file storage, which allows all users to work from the
same set of data and provides easy backup of critical data
Confidential
Advantages of Server-Based Networks(
Networks Cont… )
Confidential
Advantages of Peer-to-Peer Networks
2. Easy setup
Confidential
Disadvantages of Peer-to-Peer Networks
Confidential
Hybrid Network
( based on Network Entities )
Confidential
A Hybrid Network
( based on Network Entities )
Domain - XYZ
Workgroup - ABC
Server
Based
Network
Peer-to-Peer
Network
Confidential
Networking Standards Organizations
Confidential
ANSI
Confidential
EIA and TIA
Confidential
IEEE
Confidential
ITU
Internet Society
Confidential
IANA and ICANN
Confidential
IANA and ICANN (continued)
Confidential
The OSI Model
In 1983, the International Organization for Standardization (ISO) and what is now the
Telecommunication Standardization Sector of the International Telecommunication Union (ITU-T)
published a document called "The Basic Reference Model for Open Systems Interconnection."
Model is imperfect
Confidential
The OSI Model (continued)
Confidential
Presentation Layer
Confidential
Session Layer
Confidential
Session Layer (continued)
Confidential
Transport Layer
Confidential
Transport Layer (continued)
Confidential
Transport Layer (continued)
Confidential
Transport Layer (continued)
Confidential
Transport Layer (continued)
Confidential
Transport Layer (continued)
Confidential
Network Layer
Confidential
Network Layer (continued)
Confidential
Network Layer (continued)
Figure : An IP packet
Confidential
Data Link Layer
Confidential
Data Link Layer (continued)
Confidential
Data Link Layer (continued)
Confidential
Data Link Layer (continued)
Confidential
Data Link Layer (continued)
Confidential
Physical Layer
Protocols accept frames from Data Link layer and
generate voltage to transmit signals
Confidential
Communication Between Two Systems
Confidential
IEEE Networking Specifications (continued)
Confidential
Summary
Standards are documented agreements
containing precise criteria that are used as
guidelines to ensure that materials, products,
processes, and services suit their purpose
Confidential