You are on page 1of 62

Casting in Networking

• Transmitting data (stream of packets) over the network is termed


as casting.

• The cast term here signifies some data(stream of packets) is being


transmitted to the recipient(s) from client(s) side over the
communication channel that help them to communicate.

• The term casting is used to describe the different ways in which data
can be sent to recipients

20-Jan-20 ISMT COLLEGE_NETWORKING-3 1


The term casting is used to describe the different ways in which data can
be sent to recipients. In IPv4 there are three methods :

20-Jan-20 ISMT COLLEGE_NETWORKING-3 2


1. Unicast

• Transmitting data from one source host to one destination host is


called as unicast.
• It is a one to one transmission.
• It is useful when there is a participation of single sender and single
recipient.
• Unicast is the most simple data transmission protocol in computer
networking.

20-Jan-20 ISMT COLLEGE_NETWORKING-3 3


For an example: Host A (sender) having IP Address 110.1.2.3
sending data to host B(receiver) having IP Address 120.12.4.2.
Here,
Source Address = IP Address of host A = 11.1.2.3
Destination Address = IP Address of host B = 20.12.4.2

20-Jan-20 ISMT COLLEGE_NETWORKING-3 4


2. Broadcast
• Transmitting data from one source host to all other hosts residing in
the same or other network is called as broadcast.
• It is a one to all transmission.
• It has been designed to distribute data to all the users from a single
server or device.
• Broadcast data transmission system mainly used by television
satellite cable networking. Eg: DTH service.
• one sender, but the information is sent to all connected receivers.

20-Jan-20 ISMT COLLEGE_NETWORKING-3 5


Broadcast CONTD…
• Based on recipient’s network, Broadcast is of 2-types
and they are :

I. Limited Broadcast
II. Direct Broadcast

20-Jan-20 ISMT COLLEGE_NETWORKING-3 6


I. Limited Broadcast
• Transmitting data from one source host to all other hosts residing in
the same network is called as limited broadcast.
• This style of broadcast is used to send to all hosts on the local
network.
• Limited Broadcast is so called because it is limited to the local
network; routers will not route this packet.
• Limited Broadcast Address for any network
= All 32 bits set to 1
= 11111111.11111111.11111111.11111111
= 255.255.255.255
20-Jan-20 ISMT COLLEGE_NETWORKING-3 7
Example:
Host A (sender) having IP Address 11.1.2.3 sending data to all other hosts residing in the
same network.
Here,
Source Address = IP Address of host A = 11.1.2.3
Destination Address = 255.255.255.255

20-Jan-20 ISMT COLLEGE_NETWORKING-3 8


• The all-ones (255.255.255.255) or
(11111111.11111111.11111111.11111111) value was
established as the standard broadcast address for networks
that support broadcast.
• A special definition exists for the IP address 255.255.255.255
It is the broadcast address of the zero network or 0.0.0.0,
which in Internet Protocol standards stands for this network,
i.e. the local network. Transmission to this address is limited
by definition, in that it is never forwarded by the routers
connecting the local network to other networks.

20-Jan-20 ISMT COLLEGE_NETWORKING-3 9


(II) Direct Broadcast
• Transmitting data from one source host to all other hosts
residing in some other network is called as direct broadcast.
• This is useful when a device in one network wants to transfer
packet stream to all the devices over the other network.
• Direct Broadcast Address for any network is the IP Address
where
Network ID is the IP Address of the network where all
the destination hosts are present.
Host ID bits are all set to 1.

20-Jan-20 ISMT COLLEGE_NETWORKING-3 10


Example
Host A(sender) having IP Address 11.1.2.3 sending data to all other hosts residing
in the network B(receiver) having IP Address 20.0.0.0
Here,
Source Address = IP Address of host A = 11.1.2.3
Destination Address = 20.255.255.255

20-Jan-20 ISMT COLLEGE_NETWORKING-3 11


CASTING CONTD…
3. Multicast
• Transmitting data from one source host to a particular group of hosts
having interest in receiving the data is called as multicast.
• It is a one to many transmission.
• Multicast lets server’s direct single copies of data streams that are then
simulated and routed to hosts that request it.
• Multicasting is the networking technique of delivering the same packet
simultaneously to a group of clients.

20-Jan-20 ISMT COLLEGE_NETWORKING-3 12


Examples:
1.Sending a message to a particular group of people on whatsapp,viber
2.Sending an email to a particular group of people
3.Video conference or teleconference

20-Jan-20 ISMT COLLEGE_NETWORKING-3 13


20-Jan-20 ISMT COLLEGE_NETWORKING-3 14
Summary of Casting
• In an IPv4 network, the hosts can communicate one of three different
ways:
1. Unicast - the process of sending a packet from one host to an
individual host
2. Broadcast - the process of sending a packet from one host to all
hosts in the network
3. Multicast - the process of sending a packet from one host to a
selected group of hosts

20-Jan-20 ISMT COLLEGE_NETWORKING-3 15


Transmission Modes in Computer Networks

•Transmission mode refers to the mechanism of transferring of data


between two devices connected over a network.
•It is also called Communication Mode.
•These modes direct the direction of flow of information.
•Buses and networks are designed to allow communication to occur
between individual devices that are interconnected.

20-Jan-20 ISMT COLLEGE_NETWORKING-3 16


There are three types of transmission modes & they are:
1.Simplex Mode
2.Half duplex Mode
3.Full duplex Mode

20-Jan-20 ISMT COLLEGE_NETWORKING-3 17


1.Simplex Mode
• In Simplex mode, the communication is unidirectional, as on a one-
way street.
• Only one of the two devices on a link can transmit, the other can only
receive.
• The simplex mode can use the entire capacity of the channel to send
data in one direction.
• Example: Keyboard and monitors. The keyboard can only introduce
input, the monitor can only give the output.

20-Jan-20 ISMT COLLEGE_NETWORKING-3 18


From the two devices, only one can send or transmit on a link and the other can
only receive the data i.e. we cannot send a message back to the sender just like a
one-way street.

Another example of simplex transmission includes a loudspeaker system. An


announcer sends his/her voice into a microphone and voice is sent through an
amplifier and then to all the speakers.

Examples: FM receiver, TV receiver, TV and Remote etc.

20-Jan-20 ISMT COLLEGE_NETWORKING-3 19


Simplex mode CONTD…
Advantage of Simplex mode
• In this mode, the station can utilize the entire capacity of the
communication channel, so there can be transmitted more data at
a time.

Disadvantage of Simplex mode


• Mainly communications require the two-way exchange of data
but it is unidirectional, so it has no inter-communication between
devices.

20-Jan-20 ISMT COLLEGE_NETWORKING-3 20


Half-Duplex Mode
• In half-duplex mode, each station can both transmit and receive, but
not at the same time.
• When one device is sending, the other can only receive, and vice
versa.
• half-duplex mode is used in cases where there is no need for
communication in both direction at the same time.
• The entire capacity of the channel can be utilized for each direction.
• Example: Walkie- talkie in which message is sent one at a time and
messages are sent in both the directions.

20-Jan-20 ISMT COLLEGE_NETWORKING-3 21


• Another example, this is like a one land road with two-directional
traffic. While cars are traveling in one direction, cars going to another
way must wait.

20-Jan-20 ISMT COLLEGE_NETWORKING-3 22


Half Duplex Contd…

As shown in fig. computer A sends information to computer B. At the end of


transmission, computer B sends information to computer A. Computer A cannot send
any information to computer B, while computer B is transmitting data and vice-
versa.
20-Jan-20 ISMT COLLEGE_NETWORKING-3 23
• Advantage of Half-duplex mode
In half-duplex mode, the entire capacity of a channel is taken over by
whichever of the two devices is transmitting at the same time.

• Disadvantage of Half-Duplex mode


It causes the delay in sending the data at the correct time as when one
device is sending the data, then another has to wait to send data.

20-Jan-20 ISMT COLLEGE_NETWORKING-3 24


Full-Duplex Mode
• In full-duplex mode, both stations can transmit and receive
simultaneously i.e. at the same time.
• In full-duplex mode, signals going in one direction share the capacity
of the link with signals going in other direction, this sharing can occur
in two ways:
• Either the link must contain two physically separate transmission
paths, one for sending and other for receiving
• Or the capacity (i.e. Bandwidth) is divided between signals travelling
in both directions.

20-Jan-20 ISMT COLLEGE_NETWORKING-3 25


Fig : Full-Duplex system

• Full-duplex mode is used when communication in both direction is


required all the time.
• The capacity of the channel, however must be divided between the two
directions.
• Example: Telephone Network in which there is communication
between two persons by a telephone line, through which both can talk
and listen at the same time.
20-Jan-20 ISMT COLLEGE_NETWORKING-3 26
Advantage of Full-duplex mode
Both the stations can send and receive the data at the same time, so the
capacity of link can be shared.

Disadvantage of Full-duplex mode


The bandwidth of the communication channel is divided into two parts
if there is no dedicated path exists between the devices.

20-Jan-20 ISMT COLLEGE_NETWORKING-3 27


20-Jan-20 ISMT COLLEGE_NETWORKING-3 28
The transmission mode or communication mode can
be summarized as :

20-Jan-20 ISMT COLLEGE_NETWORKING-3 29


Cloud Network
• It is the use of remote servers on the internet to store, manage
and process the data rather than local servers.

• In the simplest terms, cloud computing means storing and


accessing data and programs over the Internet instead of your
computer's hard drive. The cloud is just a metaphor for the
Internet.

• Cloud network is referred to a computer network that exists


within or is part of a cloud computing infrastructure

20-Jan-20 ISMT COLLEGE_NETWORKING-3 30


• cloud networking is a branch of cloud computing, which
offers centralized computing resources that are shared
amongst stakeholders.

• For cloud networking, these stakeholders can share both the


network and the computing resources.

20-Jan-20 ISMT COLLEGE_NETWORKING-3 31


Cloud Networking or Cloud Based Networking

20-Jan-20 ISMT COLLEGE_NETWORKING-3 32


20-Jan-20 ISMT COLLEGE_NETWORKING-3 33
• Cloud networking is a type of infrastructure where network
capabilities and resources are available on demand through a
third-party service provider that hosts them on a cloud platform.
• The network resources can include virtual routers, firewalls, and
bandwidth and network management software, with other tools
and functions becoming available as required.
• Companies can either use cloud networking resources to manage
an in-house network or use the resources completely in the cloud.
• Means of accessing storage and application information and data
of all sorts on an online level.
• It is a service rather than the product.

20-Jan-20 ISMT COLLEGE_NETWORKING-3 34


There are basically 5 essential characteristics of Cloud Network.

1. On-demand self-services:
The Cloud computing services does not require any human
administrators, user themselves are able to provision, monitor and
manage computing resources as needed.
2. Broad network access:
The Computing services are generally provided over standard
networks and heterogeneous devices.
3. Rapid elasticity(Scalability):
The Computing services should have IT resources that are able to
scale out and in quickly and on as needed basis. Whenever the user
require services it is provided to him and it is scale out as soon as its
requirement gets over.

20-Jan-20 ISMT COLLEGE_NETWORKING-3 35


4. Resource pooling:
The IT resource (e.g., networks, servers, storage, applications, and
services) present are shared across multiple applications and
occupant in an uncommitted manner. Multiple clients are provided
service from a same physical resource.
5. Measured service:
The resource utilization is tracked for each application and occupant,
it will provide both the user and the resource provider with an
account of what has been used. This is done for various reasons like
monitoring billing and effective use of resource.

20-Jan-20 ISMT COLLEGE_NETWORKING-3 36


CLOUD cont…
Benefits of Cloud
• Companies can reduce the size of their own data
centres.
• The reduction of the numbers of servers, the software
cost and the number of staff.
• Companies can access the required data from any
where at any cost.
• No tension of data missing and server problem.
20-Jan-20 ISMT COLLEGE_NETWORKING-3 37
CLOUD cont…

• Microsoft also offers a set of Web-based apps, Office Online, that are
Internet-only versions of Word, Excel, PowerPoint, and OneNote
accessed via your Web browser without installing anything. That
makes them a version of cloud computing (Web-based=cloud).
• Google Drive
• Apple iCloud

20-Jan-20 ISMT COLLEGE_NETWORKING-3 38


Centralized Network
• A type of network where all users connect to a central server, which is
the acting agent for all communications.
• This server would store both the communications and the user account
information.
• Most public instant messaging platforms use a centralized network.
• Also called centralized server-structure (A star topology, where
connectivity is all in the center).
• In any centralized computer network system all the resources are
stored or managed at one place (computer system).

20-Jan-20 ISMT COLLEGE_NETWORKING-3 39


Fig : centralized server-structure

20-Jan-20 ISMT COLLEGE_NETWORKING-3 40


Fig: Centralized network(Star topology)

20-Jan-20 ISMT COLLEGE_NETWORKING-3 41


Centralized Network CONTD…
• The centralized device is normally known as the server that is
responsible of managing all the processing and controlling.
• Only the administrator has access to the server. All the other
clients on the network request the services from the server.
The administrator is in charge to assign the rights to these
different users/clients that request the services.
• This makes easy for system administrator to keep all that
resources consistent and in accurate form.

20-Jan-20 ISMT COLLEGE_NETWORKING-3 42


CLUSTER
• In a computer system, a computer cluster is a group of servers and
other resources that act like a single system and enable high
availability and, in some cases, load balancing and parallel processing.
• A computer cluster is a set of loosely or tightly
connected computers that work together so that, in many respects, they
can be viewed as a single system.
• The components of a cluster are usually connected to each other
through fast local area networks, with each node (computer used as a
server) running its own instance of an operating system
• Computer clusters have each node set to perform the same task,
controlled and scheduled by software.
20-Jan-20 ISMT COLLEGE_NETWORKING-3 43
Fig : computer cluster
20-Jan-20 ISMT COLLEGE_NETWORKING-3 44
CLUSTER CONT…
• A computer cluster is a single logical unit consisting of multiple
computers that are linked through a LAN.

• In most circumstances, all of the nodes use the same hardware and the
same operating system, although in some setups, different operating
systems can be used on each computer, or different hardware.

• Clusters are usually deployed to improve performance and availability


over that of a single computer, while typically being much more cost-
effective than single computers of comparable speed or availability

20-Jan-20 ISMT COLLEGE_NETWORKING-3 45


There are many types of computer clusters, including:

1. Load-balancing cluster
2. High availability (HA) clusters
3. High performance (HP) clusters

20-Jan-20 ISMT COLLEGE_NETWORKING-3 46


1.Load-balancing cluster : Load-balancing clusters consist of
two or more computing systems, also called nodes. The
workload of the network is spread over these nodes to
increase the computing performance of the network. From a
user perspective, the nodes function as one computer
system.

2. High availability (HA) clusters : A high-availability cluster


network is two or more computing nodes that provide
redundancy in case of hardware or software failure. It is
also referred to as a failover cluster. When a computing
system fails, its operations are transferred to the redundant
node to provide continuous computing services.

20-Jan-20 ISMT COLLEGE_NETWORKING-3 47


3.High performance (HP) clusters : High-performance clusters use the
parallel processing power of the multiple cluster nodes to
provide high-performance computing. This allows the nodes to work
together on a problem. It is often a good solution for businesses whose
networks have high processing requirements but that have limited
budgets.

20-Jan-20 ISMT COLLEGE_NETWORKING-3 48


The major advantages of using computer clusters
are :
1. Cost efficiency: The cluster technique is cost effective for the
amount of power and processing speed being produced. It is more
efficient and much cheaper compared to other solutions like setting
up mainframe computers.
2. Processing speed: Multiple high-speed computers work together to
provide unified processing, and thus faster processing overall.
3. Improved network infrastructure: Different LAN topologies are
implemented to form a computer cluster. These networks create a
highly efficient and effective infrastructure that prevents bottlenecks.

20-Jan-20 ISMT COLLEGE_NETWORKING-3 49


Cluster CONTD…

4. Flexibility: Unlike mainframe computers, computer clusters can be


upgraded to enhance the existing specifications or add extra
components to the system.
5. High availability of resources: If any single component fails in a
computer cluster, the other machines continue to provide
uninterrupted processing. This redundancy is lacking in mainframe
systems.

20-Jan-20 ISMT COLLEGE_NETWORKING-3 50


Virtualization

• Virtualization is the creation of a virtual rather than actual -- version of


something, such as an operating system , a server, a storage device or
network resources.
• The framework divides the resource into one or more
execution environments. Even something as simple as partitioning a
hard drive is considered virtualization because you take one drive and
partition it to create two or more separate hard drives.
• Devices, applications and human users are able to interact with the
virtual resource as if it were a real single logical resource.

20-Jan-20 ISMT COLLEGE_NETWORKING-3 51


• Virtualization is the process of running a virtual instance of a
computer system in a layer abstracted from the actual hardware. Most
commonly it refers to running multiple operating systems on a
computer system simultaneously.
• Virtualized network is used to create a virtual version of a device or
resources.

20-Jan-20 ISMT COLLEGE_NETWORKING-3 52


20-Jan-20 ISMT COLLEGE_NETWORKING-3 53
VIRTUALIZATION REFERENCE MODEL

20-Jan-20 ISMT COLLEGE_NETWORKING-3 54


1. GUEST:
The guest represents the system component that interacts with the
virtualization layer rather than with the host, as would normally
happen. Guests usually consist of one or more virtual disk files, and a
VM definition file. Virtual Machines are centrally managed by a host
application that sees and manages each virtual machine as a different
application.
2. HOST:
The host represents the original environment where the guest is
supposed to be managed. Each guest runs on the host using shared
resources donated to it by the host. The operating system, works as the
host and manages the physical resource management, and the device
support.

20-Jan-20 ISMT COLLEGE_NETWORKING-3 55


3. VIRTUALIZATION LAYER:
The virtualization layer is responsible for recreating the same or a
different environment where the guest will operate. It is an additional
abstraction layer between a network and storage hardware, computing,
and the application running on it. Usually it helps to run a single
operating system per machine which can be very inflexible compared
to the usage of virtualization.

20-Jan-20 ISMT COLLEGE_NETWORKING-3 56


Need of Virtualization

20-Jan-20 ISMT COLLEGE_NETWORKING-3 57


Need of Virtualization CONTD…
1. ENHANCED PERFORMANCE-
Currently, the end user system i.e. PC is sufficiently powerful to fulfill all
the basic computation requirements of the user, with various additional
capabilities which are rarely used by the user. Most of their systems have
sufficient resources which can host a virtual machine manager and can
perform a virtual machine with acceptable performance so far.
2. LIMITED USE OF HARDWARE AND SOFTWARE RESOURCES-
The limited use of the resources leads to under-utilization of hardware and
software resources. As all the PCs of the user are sufficiently capable to
fulfill their regular computational needs that’s why many of their computers
are used often which can be used 24/7 continuously without any
interruption. The efficiency of IT infrastructure could be increase by using
these resources after hours for other purposes. This environment is possible
to attain with the help of Virtualization.

20-Jan-20 ISMT COLLEGE_NETWORKING-3 58


Need of Virtualization CONTD…
3. SHORTAGE OF SPACE-
The regular requirement for additional capacity, whether memory storage or
compute power, leads data centers raise rapidly. Companies like Google,
Microsoft and Amazon develop their infrastructure by building data centers
as per their needs. Mostly, enterprises unable to pay to build any other data
center to accommodate additional resource capacity. This heads to the
diffusion of a technique which is known as server consolidation.
4. ECO-FRIENDLY INITIATIVES-
At this time, corporations are actively seeking for various methods to
minimize their expenditures on power which is consumed by their systems.
Data centers are main power consumers and maintaining a data center
operations needs a continuous power supply as well as a good amount of
energy is needed to keep them cool for well-functioning. Therefore, server
consolidation drops the power consumed and cooling impact by having a
fall in number of servers. Virtualization can provide a sophisticated method
of server consolidation.

20-Jan-20 ISMT COLLEGE_NETWORKING-3 59


Need of Virtualization CONTD…
5. ADMINISTRATIVE COSTS-
Furthermore, the rise in demand for capacity surplus, that convert into
more servers in a data center, accountable for a significant increase in
administrative costs. Hardware monitoring, server setup and updates,
defective hardware replacement, server resources monitoring, and
backups are included in common system administration tasks. These
are personnel-intensive operations. The administrative costs is
increased as per the number of servers. Virtualization decreases
number of required servers for a given workload, hence reduces the
cost of administrative employees.

20-Jan-20 ISMT COLLEGE_NETWORKING-3 60


Virtualization CONTD…

• Benefits of Virtualization

1. Better use of Hardware resources


2. Power saving/reduced foot print
3. Recovery
4. Flexibility
5. Researching operating systems & others software (sandbox)

20-Jan-20 ISMT COLLEGE_NETWORKING-3 61


Topics for presentation
I. How does cloud networking work?
II. Explain each of them with necessary diagram.
1. Centralized networks
2. Decentralized networks
3. Distributed networks
III. Virtualization in Computer Network
1. Server Virtualization
2. Network Virtualization
4. Difference between Network and Internet
5. Difference between the Internet and the Web

20-Jan-20 ISMT COLLEGE_NETWORKING-3 62

You might also like