Professional Documents
Culture Documents
During the 20thcentury, the key technology was information gathering, processing, and distribution. The
merging of computers and communications has had a profound influence on the way computer systems are
organized. The concept of the ''computer center'' has a room with a large computer to which all the users bring
their work or jobs for processing is now totally obsolete. The old model of this single computer serving all of the
organization's computational needs has been replaced by one in which a large number of separated but
interconnected computers to do the jobs. These systems collection is called as computer network.
A network is a set of devices (often referred to as nodes) connected by communication links. Where a
node can be a computer, printer, or any other device capable of sending and/or receiving the data generated by
other nodes on the network
CN Definition:
The term ''computer network'' to mean a collection of autonomous computers interconnected by a single
technology that can exchange the information. Two computers are said to be interconnected iff they are able to
exchange information. The connection need not be via a copper wire; fiber optics, microwaves, infrared, and
communication satellites can also be used. Networks come in many sizes, shapes and forms.
Computer network Example: LAN systems in our LAB
There is considerable confusion in the literature between a computer network and a distributed system.
The issue here is resource sharing, and here the main goal is to make all resources (i.e
programs, equipment,project reports and especially data) available to everyone on the network without regard to
1
the physical location of the resources and the user. In the simplest of terms, one can imagine a ―company's
information system‖ as consisting of one or more databases and some number of employees who need to access
the resources remotely. In this model, the data are stored on powerful computers called servers. Often these are
centrally housed/stored and maintained by a system administrator. In contrast, the employees have simpler
machines, called clients, on their desks/tables, with this clients they can access remote data from servers, for
example, to include in spreadsheets which they are constructing. The client and server machines are connected by
a network, as illustrated in Fig. 1-1.
Client2
In client-server model Communication takes the form of the client process sending a message over the
network to the server process. The client process then waits for a reply message. When the server process gets the
request, it performs the requested work or looks up the requested data and sends back a reply. These messages are
shown in Fig. 1-2.
A second Goal is to provide high reliability by having alnerate sources of supply.(i.e maintaining alternative
sources of resources i.e all the files could be replicated or duplicated on two or more machines on the network ) if
one of the machine is failed the other machine can provide the data without interruption of your project work.
Another Goal is Saving Money i.e small computers have much better price/performance ratio than largest
computers(main frame computers) . Main frame large computers may be roughly factor of 10 times faster than
small(personal) computers, but the above main frame computers COST is 1000 times more than our existing small
personal computers. This imbalance has leads to many system administrators to build client server systems
consisting of local computers for each individual user and each user connected to a network.this arrangement is
called as client-server model.shown in above fig.
Another goal of setting up a computer network has to do with people rather than
information or even computers. A computer network can provide a powerful communication medium among
employees. Virtually every company that has two or more computers now has e-mail (electronic mail), which
employees generally use for a great deal of daily communication. But e-mail is not the only form of improved
communication made possible by computer networks. With a network, it is easy for two or more people who work
far apart to write a report together. When one worker makes a change to an online document, the others can see
the change immediately, instead of waiting several days for a letter. Such a speedup makes cooperation among
far-flung groups of people easy where it previously had been impossible. another form of computer-assisted
communication is videoconferencing. Using this technology, employees at distant locations can hold a meeting,
seeing and hearing each other and even writing on a shared virtual blackboard. Videoconferencing is a powerful
tool for eliminating the cost and time previously devoted to travel.
Another goal is scalability is nothing but ―ability to increase the system performance gradually as
the work load increases simply just by adding few more computers(processors) into the network.
One more goal is for increasingly many companies is doing business electronically with
othercompanies, especially suppliers and customers. For example, manufacturers of automobiles, aircraft, and
computers, among others, buy subsystems from a variety of suppliers and then assemble the parts. Using computer
networks, manufacturers can place orders electronically as needed. Being able to place orders in real time (i.e., as
needed) reduces the need for large inventories and enhances efficiency. last goal that is starting to become more
important is doing business with consumers over the Internet. Airlines, bookstores, and music vendors have
discovered that many customers like the convenience of shopping from home.
2
1. Access to remote information. 2. Person-to-person communication.
3. Interactive entertainment. 4. Electronic commerce.
2.Person-to-person communication
Basically the21 century answer to the 19th centuries' telephone • E-mail is used by millions of people. It contains audio,
video, as well as text and pictures.
• Instant messaging: allows two people to type messages at each other in real time
• Chat room: a multiperson version
• Worldwide news groups: with discussions on conceivable topic
• Peer-to- peer communication
– in this form individuals who form a loose group can communicate with others in the group.
– Every person can communicate with one or more other people
– There is no fixed division into clients and servers.
Figure 1-3. In a peer-to-peer system there are no fixed clients and servers.
On-line auctions are more of a peer-to-peer system, sort of consumer-to-consumer.
Some of these forms of e-commerce have acquired cute little tags.
1.1.3 Networks for Interactive entertainment : vedio conferencing, skype call, teleconferencing are the examples
of it.
A huge and growing industry
• Important application:
– video on demand, live television
– Game playing; if the games are played with goggles and threedimensional real-time we have a kind of worldwide
shared virtual reality
3
Mobile computers, such as notebook computers and personal digital assistants (PDAs), are one of the
fastest-growing segments of the computer industry. Many owners of these computers have desktop machines back
at the office and want to be connected to their home base even when away from home or en route. People on the
road often want to use their portable electronic equipment to send and receive telephone calls, faxes, and
electronic mail, surf the Web, access remote files, and log on to remote machines. And they want to do this from
anywhere on land, sea, or air. Wireless networks are also important to the military. wireless networking and
mobile computing are often related, they are not identical, as
Mesh topology : In a mesh topology, every device has a dedicated point-to-point link to every other device.
The term
dedicated means that the link carries data only between the two devices it
connects.
One practical example of a mesh topology is the connection of telephone regional offices in which each
regional office needs to be connected to every other regional office.
To find the number of physical links in a fully connected mesh network with n nodes, we first consider
that each node must be connected to every other node. Node 1 must be connected to n - 1 nodes, node 2 must be
connected to n – 1 nodes, and finally node n must be connected to n-1 nodes. However each physical link
allows communication in both directions (duplex mode).
The use of dedicated links guarantees that each connection can carry its own data
load, thus eliminating the traffic problems that can occur when links must be shared by
multiple devices.
A mesh topology is robust. If one link becomes unusable, it does not fail the entire
system
There is the advantage of privacy or security. When every message travels
along a dedicated line, only the specific recipient sees it. Dedicated links prevent other
users from accessing the messages.
Finally, point-to-point links make fault identification and fault correction easy. 4
Disadv antages of mesh topology:
The amount of cabling and the number of I/O ports required are high.
Every device must be connected to every other device, installation and reconnection are difficult.
The bulk wiring can be greater than the available space (in walls, ceilings, or floors).
The hardware required to connect each link (I/O ports and cable) can be prohibitively expensive.
Star Topology: In a star topology, each device has a dedicated point-to-point link only to a central controller,
usually called a hub. The devices are not directly linked to one another. Unlike a mesh topology, a star topology
does not allow direct traffic between devices. The controller acts as an exchange: If one device wants to send data
to another, it sends the data to the controller, which then transfers the data to the other connected device.
The star topology is used in local-area networks (LANs),
Bus Topology: A bus topology is multipoint. One long cable acts as a backbone to link all the devices in a
network
Nodes are connected to the bus cable by drop lines and taps. A drop line is a connection running between the
device and the main cable. A tap is a connector that either splices into the main cable or punctures the
sheathing of a cable to create a contact with the metallic core. As a signal travels along the backbone,
some of its energy is transformed into heat. Therefore, it becomes weaker and weaker as it travels farther and
farther. For this reason there is a limit on the number of taps a bus can support and on the distance between those
taps.
Bus topology was the one of the first topologies used in the design of early local area networks.
Ethernet LANs can use a bus topology, but they are less popular now
Advantages of bus topology
ease of installation
5
In a bus, this redundancy is eliminated.
Disadvantages of bus topology
difficult reconnection and fault isolation
A bus is usually designed to be optimally efficient at installation. It can therefore be difficult to add new
devices.
A fault or break in the bus cable stops all transmission. The damaged area reflects signals back in the
direction of origin, creating noise in both directions.
Ring Topology: In a ring topology, each device has a dedicated point-to-point connection with only the two
devices on either side of it. A signal is passed along the ring in one direction, from device to device, until it
reaches its destination. Each device in the ring incorporates a repeater. When a device receives a signal
intended for another device, its repeater regenerates the bits and passes them along.
Hybrid Topology: A network can be hybrid. For example, we can have a main star
topology
with each branch connecting several stations in a bus topology as shown in
Figure
- - - - - END OF TOPIC - - - - - -
Broadcast systems generally also allow the possibility of addressing a packet to all destinations by using a
special code in the address field. When a packet with this code is transmitted, it is received and processed
by every machine on the network. This mode of operation is called broadcasting. Some broadcast systems
also support transmission to a subset(group) of the machines,something known as multicasting
In contrast, point-to-point networks consist of many connections between individual pairs of machines.
To go from the source to the destination, a packet on this type of network may have to first visit one or more
intermediate machines. Often multiple routes, of different lengths, are possible, so finding good ones is important
in point-to-point networks. As a general rule, smaller, geographically localized networks tend to use broadcasting,
whereas larger networks usually are point-to-point. Point-to-point transmission with one sender and one receiver
is sometimes called unicasting. criterion for classifying networks is their scale. In Fig. 1-6 we classify multiple
processor systems by their physical size(SCALE). At the top are the personal area networks, networks that are
meant for one person. For example, a wireless network connecting a computer with its mouse, keyboard, and
printer is a personal area network. Also, a PDA that controls the user's hearing aid or pacemaker fits in this
category. Beyond the personal area networks come longer-range networks. These can be divided into local,
metropolitan, and wide area networks. Finally, the connection of two or more networks is called an internetwork.
The worldwide Internet is a well-known example of an internetwork. Distance is important as a classification
metric because different techniques are used at different scales.
7
Local area networks, generally called LANs, are privately-owned
networks within a single building or campus of up to a few kilometers in size. They are widely used to connect
personal computers and workstations in company offices and factories to share resources (e.g., printers) and
exchange information. LANs are distinguished from other kinds of networks by three characteristics:
(1) their size, (2) their transmission technology, and (3) their topology.
LANs are restricted in size, which means that the worst-case transmission time is bounded and known in
advance. Knowing this bound makes it possible to use certain kinds of designs that would not otherwise be
possible. It also simplifies network management. LANs may use a transmission technology consisting of a cable
to which all the machines are attached, like the telephone company party lines once used in rural areas. Traditional
LANs run at speeds of 10 Mbps to 100 Mbps, have low delay (microseconds or nanoseconds), and make very few
errors. Newer LANs operate at up to 10 Gbps. In this book, we will adhere to tradition and measure line speeds in
megabits/sec (1 Mbps is 1,000,000 bits/sec) and gigabits/sec (1Gbps is 1,000,000,000 bits/sec). Various
topologies are possible for broadcast LANs. Figure 1-7
In a bus (i.e., a linear cable) topology network, at any instant at most one machine is the master and is
allowed to transmit. All other machines are required to refrain from sending. An arbitration mechanism is needed
to resolve conflicts when two or more machines want to transmit simultaneously. The arbitration mechanism may
be centralized or distributed. IEEE 802.3, popularly called Ethernet, for example, is a bus-based broadcast
network with decentralized control, usually operating at 10 Mbps to 10 Gbps. Computers on an Ethernet can
transmit whenever they want to; if two or more packets collide, each computer just waits a random time and tries
again later.
8
Figure 1-8. A metropolitan area network based on cable TV.
9
The next step up in wireless networking is the wireless LANs. These are systems in which every computer has a
radio modem and antenna with which it can communicate with other systems. Often there is an antenna on the
ceiling that the machines talk to, as shown in Fig. 1-10(b). However, if the systems are close enough, they can
communicate directly with one another in a peer-to-peer configuration. Wireless LANs are becoming increasingly
common in small offices and homes, where installing Ethernet is considered too much trouble, as well as in older
office buildings, company cafeterias, conference rooms, and other places. There is a standard for wireless LANs,
called IEEE 802.11, which most systems implement and which is becoming very widespread. The third kind of
wireless network is used in wide area systems. The radio network used for cellular telephones is an example of a
low-bandwidth wireless system. This system has already gone through three generations. The first generation was
analog and for voice only. The second generation was digital and for voice only. The third generation is digital
and is for both voice and data.
Internetworks
• Def: A collection of interconnected networks is called an internetwork or simply internet
– Expl: a collection of LANs connected by a WAN
– >Subnet make sense in the context of wide area network =collection of routers and communication lines
The model is called the ISO OSI (Open Systems Interconnection) Reference Model because it deals with
connecting open systems—that is, systems that are open for communication with other systems.
10
Figure 1-17. The OSI reference model.
The OSI model has seven layers.
1. A layer should be created where a different abstraction is needed.
2. Each layer should perform a well-defined function.
3. The function of each layer should be chosen with an eye toward defining internationally standardized protocols.
4. The layer boundaries should be chosen to minimize the information flow across the interfaces.
5. The number of layers should be large enough that distinct functions need not be thrown
together in the same layer out of necessity and small enough that the architecture does not become unwieldy.
Physical Layer :
The physical layer is used for transmitting the raw bits over a communication channel. Here if the
system at one side sends 1bit, it is received by the other side also as a 1bit, not as a 0 bit. The functions
required to carry a bit stream over a physical medium. It deals with the mechanical and electrical specifications
of the interface and transmission medium. Following figure shows the position of the physical layer with respect
to the transmission medium and the data link layer.
Figure: Physical
layer
The physical layer is also concerned with the
following:
Representation of bits: The physical layer data consists of a stream of bits (sequence of 0s or 1s)
with no interpretation. To be transmitted, bits must be encoded into signals--electrical or optical.
Data rate: It represents that how many number of bits can be transferred in each second is also
12
defined by the physical layer.
Synchronization of bits:The sender and receiver both must have to use the same bit rate but also
must be synchronized at the bit level
Line configuration: The physical layer is concerned with the connection of devices to the media. In a point-
to- point configuration, two devices are connected through a dedicated link. In a multipoint configuration,
a link is shared among several devices.
Physical topology: The physical topology defines how devices are connected to make a network.
Ex: mesh topology, a star topology, a ring topology, a bus topology, a hybrid topology.
Transmission mode: The physical layer also defines the direction of transmission between the two
devices as Simplex, Half-duplex, and Full-duplex.
Framing: The data link layer divides the stream of bits received from the network layer into data
units called frames.
Physical addressing. If frames are to be distributed to different systems on the network, the data link
layer adds a header to the frame to define the sender and/or receiver of the frame. If the frame is
intended for a system outside the sender's network, the receiver address is the address of the device that
connects the network to the next one.
Flow control: If the rate at which the data is absorbed by the receiver is less than the rate at which
data is transferred by thesender, the data link layer uses a flow control protocols to maintain same
data transfer rate between sender and the receiver
Error control: The data link layer adds reliability to the physical layer by adding mechanisms to
detect and correct the damaged or lost frames. It also uses a mechanism to recognize duplicate frames.
Error control is normally achieved through a trailer added to the end of the frame.
Access control: When two or more devices are connected to the same link, data link layer
protocols are necessary to determine which device has to send the data at any given time. Otherwise
there is a chance of collision. For this purpose a special sub layer in the data link layer known as
medium access sub layer will deal this one.
Figure: Network
layer
Other responsibilities of the network layer include the following:
Logical addressing: The physical addressing implemented by the data link layer handles the addressing
problem locally. The network layer adds a header to the packet coming from the upper layer that, among
other things, includes the logical addresses of the sender and receiver.
Routing: When independent networks or links are connected to create internetworks(network of
networks) or a large network, the connecting devices (called routers or switches) route or switch the
packets to their final destination.
Congestion Control: If there is traffic in one way of network for transferring the data. It is known as
Congestion, Here we have to find another path for transferring the data by the use of congestion control
protocols
Transport Layer: (process to process delivery of a mesg)
The transport layer is responsible for process-to-process delivery of the entire message.
A process is an application program running on a
host.
Whereas the network layer maintainsource-to-destination delivery of individual packets, it does not
recognize any relationship between those packets. It treats each one independently, as though each piece
belonged to a separate message, whether or not it does.
The transport layer, on the other hand, ensures that the whole message arrives intact and in order,
overseeing both error control and flow control at the source-to-destination level. Following Figure shows
the relationship of the transport layer to the network and session layers.
Transport layer
Other responsibilities of the transport layer include the following:
Service-point addressing: Computers often run several programs at the same time. For this reason,
source-to- destination delivery means delivery not only from one computer to the next but also from a
specific process (running program) on one computer to a specific process (running program) on the other.
Segmentation and reassembly: A message is divided into transmittable segments, with each segment
containing a sequence number. These numbers enable the transport layer to reassemble the message
correctly upon arriving at the destination and to identify and replace packets that were lost in
transmission.
Connection control: The transport layer can be either connectionless or connection oriented. A
connectionless transport layer treats each segment as an independent packet and delivers it to the
14
transport layer at the destination machine. A connection oriented transport layer makes a connection
with the transport layer at the destination machine first before delivering the packets. After all the data
are transferred, the connection is terminated.
Flow control: Like the data link layer, the transport layer is responsible for flow control. However,
flow control at this layer is performed end to end rather than across a single link.
Error control: Like the data link layer, the transport layer is responsible for error control. However, error
control at this layer is performed process-to process rather than across a single link. The sending
transport layer makes sure that the entire message arrives at the receiving transport layer without error
(damage, loss, or duplication). Error correction is usually achieved through retransmission.
Session Layer:
Session layer allows users on different machines to establish the Sessions , maintain the sessions and
synchronize the sessions.
The session layer is responsible for dialog control.
Presentation Layer:
The presentation layer is concerned with the syntax and semantics of the information exchanged
between two systems.
Following Figure shows the relationship between the presentation layer and the application and session
layers.
Figure: Presentation
layer
Specific responsibilities of the presentation layer include the
15
following:
The presentation layer is responsible for translation, compression, and encryption.
Translation: The processes (running programs) in two systems are usually exchanging information in the
form of character strings, numbers, and so on. The information must be changed to bit streams before
being transmitted. Because different computers use different encoding systems, the presentation layer is
responsible for interoperability between these different encoding methods. The presentation layer at the
sender changes the information from its sender-dependent format into a common format. The
presentation layer at the receiving machine changes the common format into its receiver-dependent
format.
Encryption: To carry sensitive information, a system must be able to ensure privacy. Encryption means
that the sender transforms the original information to another form and sends the resulting message out
over the network. Decryption reverses the original process to transform the message back to its original
form.
Compression: Data compression reduces the number of bits contained in the information. Data
compression becomes particularly important in the transmission of multimedia such as text, audio, and
video.
Application Layer:
The application layer enables the user, whether human or software, to access the network.
It provides user interfaces and support for services such as electronic mail, remote file access and
transfer, shared database management, and other types of distributed information services.
The application layer is responsible for providing services to the user.
Following Figure shows the relationship of the application layer to the user and the presentation layer..
Figure: Application
layer
Specific services provided by the application layer include the
following:
Network virtual terminal. A network virtual terminal is a software version of a physical terminal, and it
allows a user to log on to a remote host. To do so, the application creates a software emulation of a
terminal at the remote host. The user's computer talks to the software terminal which, in turn, talks to
the host, and vice versa. The remote host believes it is communicating with one of its own terminals
and allows the user to log on.
File transfer, access, and management. This application allows a user to access files in a remote host to
retrieve files from a remote computer for use in the local computer, and to manage or control files in a
remote computer locally.
Mail services. This application provides the basis for e-mail forwarding and storage.
Directory services. This application provides distributed database sources and access for global
information about various objects and services.
Summary of Layers:
16
- - - - END OF TOPIC - - - -
17
Figure 1-19. Protocols and networks in the TCP/IP model initially.
Let us now turn from the OSI reference model to the reference model used in the grandparent of all
wide area computer networks,
The ARPANET, and its successor, the world wide Internet. It is useful to mention a few key aspects of it
now. The ARPANET was a research network sponsored by the DoD (U.S. Department of Defense). It
eventually connected hundreds of universities and government installations, using leased telephone lines.
When satellite and radio networks were added later, the existing protocols had trouble interworking with them,
so a new reference architecture was needed. This architecture later became known as the TCP/IP Reference
Model, after its two primary protocols.
Fig)The TCP/IP reference model
18
used here in a generic sense, even though this layer is present in the Internet.
The internet layer defines an official packet format and protocol called IP (Internet Protocol). The job of the
internet layer is to deliver IP packets where they are supposed to go. Packet routing is clearly the major issue
here, as is avoiding congestion. For these reasons, it is reasonable to say that the TCP/IP internet layer is similar
in functionality to the OSI network layer.
The TCP/IP protocol suite was developed prior to the OSI model.
The layers in the TCP/IP protocol suite do not exactly match those in the OSI model.
The original TCP/IP protocol suite was defined as having four layers: host-to-network, internet, transport,
and application
However, when TCP/IP is compared to OSI, we can say that the host-to-network layer is
equivalent to the combination of the physical and data link layers.
19
The internet layer is equivalent to the network layer
The application layer is roughly doing the job of the session, presentation, and application layers
with the transport layer in TCP/IP taking care of part of the duties of the session layer.
we assume that the TCP/IP protocol suite is made of five layers: physical, data link, network,
transport, and application. The first four layers provide physical standards, network interfaces,
internetworking, and transportfunctions that correspond to the first four layers of the OSI model. The
three topmost layers in the OSI model, however, are represented in TCP/IP by a single layer called the
application layer
TCP/IP is a hierarchical protocol made up of interactive modules, each of which provides a specific
functionality.
At the transport layer, TCP/IP defines three protocols: Transmission Control Protocol (TCP),
User Datagram Protocol (UDP), and Stream Control Transmission Protocol (SCTP). At the network
layer, the main protocol defined by TCP/IP is the Internetworking Protocol (IP); there are also some
other protocols that support data movement in this layer.
The Application Layer:
The TCP/IP model does not have session and presentation layers. No need for them was perceived, so they were
not included. Experience with the OSI model has proven that they are of little use to most applications.
On top of the transport layer is the application layer. It contains all the higher-level protocols. The early ones
included virtual terminal (TELNET), file transfer (FTP), and electronic mail (SMTP). The virtual terminal
protocol allows a user on one machine to log onto a distant machine and work there. The file transfer protocol
provides a way to move data efficiently from one machine to another. Electronic mail was originally just a kind
of file transfer, but later a specialized protocol (SMTP) was developed for it. Many other protocols have
been added to these over the years. HTTP, The protocol for fetching pages on the World Wide Web.
20