CSC Unit-3
CSC Unit-3
Communication Network
Networking is the practice of linking two or more computing devices together for the purpose of
sharing data. Networks are built with a combination of computer hardware and computer
software. Networks can be categorized according to
1. The geographic area it spans (LAN, MAN, WAN).
2. Topology (Bus, Star, Ring , Mesh)
3. Types of protocols they support. (TCP/IP. FTP, HTTP, HTTPS, IMAP)
2. Because many products are not yet OSI-compliant, there often is no direct
correspondence between the OSI model and reality.
3. The OSI model defines seven protocol layers and specifies that each layer be insulated
from the other by a well-defined interface.
1. Physical Layer
The physical layer is the lowest level of the OSI model and defines the physical and
electrical characteristics of the connections that make up the network.
It includes such things as interface specifications as well as detailed specifications for the
use of twisted-pair, fiber-optic, and coaxial cables.
Standards of interest at this layer for client/server applications are IEEE 802.3 (Ethernet),
and IEEE 802.6 (Token Ring) that define the requirements for the network interface card
(NIC) and the software requirements for the media access control (MAC) layer.
Other standards here include the serial interfaces EIA232 and X.21.
The data link layer defines the basic packets of data expected to enter or leave the
physical network. Bit patterns, encoding methods, and tokens are known to this layer.
The data link layer detects errors and corrects them by requesting retransmission of
corrupted packets or messages.
This layer is actually divided into two sub layers:
o The media access control (MAC) - The MAC sub layer has network access
responsibility for token passing, collision sensing, and network control.
o The logical link control (LLC). - The LLC sub layer operates above the MAC and
sends and receives data packets and messages.
Ethernet, Token Ring, and FDDI define the record format of the packets (frames) being
communicated between the MAC layer and Network layer.
3. Network Layer
The network layer is responsible for switching and routing messages to their proper
destinations. It coordinates the means for addressing and delivering messages.
It provides for each system a unique network address, determines a route to transmit data
to its destination, segments large blocks of data into smaller packets of data, and performs
flow control.
4. Transport Layer
When a message contains more than one packet, the transport layer sequences the
message packets and regulates inbound traffic flow.
The transport layer is responsible for ensuring end-to-end error-free transmission of data.
The transport layer maintains its own addresses that get mapped onto network addresses.
Because the transport layer services process on systems, multiple transport addresses
(origins or destination) can share a single network address.
5. Session Layer
The session layer provides the services that enable applications running at two
processors to coordinate their communication into a single session.
A session is an exchange of messagesa dialog between two processors.
This layer helps create the session, inform one workstation if the other drops out of
the session, and terminate the session on request.
6. Presentation Layer
The presentation layer is responsible for translating data from the internal machine
form of one processor in the session to that of the other.
7. Application Layer
The application layer is the layer to which the application on the processor directly
talks. The programmer codes to an API defined at this layer.
Messages enter the OSI protocol stack at this level, travel through the layers to the
physical layer, across the network to the physical layer of the other processor, and up
through the layers into the other processor application layer and program
Network Topologies
Topology specifies the geometric arrangement of the network. Common topologies are a bus,
ring, and star.
1. Bus Topology: A bus topology means that each computer on the network is attached to a
common central cable, called a bus or backbone. This is a rather simple network to set up.
Ethernets use this topology.
2. Ring Topology: A ring topology means that each computer is connected to two others,
and they arranged in a ring shape. These are difficult to set up, but offer high bandwidth.
3. Star Topology: A star topology means all computers on the network are connected to a
central hub. These are easy to set up, but bottlenecks can occur because all data must pass
through the hub.
Information
Delivery Point
Hubs
Hubs provide integrated support for the different standard topologies (such as Ethernet, TokenRing, and FDDI) over different types of cabling. By repeating or amplifying signals where
necessary, they enable the use of high-quality UTP cabling in virtually every situation.
There are three different types of hubs.
Workgroup hubs support one LAN segment and are packaged in a small footprint for small
branch offices. Wiring closet hubs support multiple LAN segments and topologies, include
extensive management capabilities, and can house internetworking modules such as routers or
bridges. Network center hubs, at the high end, support numerous LAN connections, have a highspeed backplane with flexible connectivity options between LAN segments, and include fault
tolerance features.
Internetworking Devices Bridges and Routers
Internetworking devices enable the interconnection of multiple LANs in an integrated network.
Bridges provide the means to connect two LANs togetherin effect, to extend the size of the
LAN by dividing the traffic and enabling growth beyond the physical limitations of any one
topology. Bridges operate at the data link layer of the OSI model, which makes them topologyspecific. Thus, bridging can occur between identical topologies only (Ethernet-to-Ethernet,
Token Ring-to-Token Ring). Source-Route Transparent bridging, a technology that enables
bridging between Ethernet and Token-Ring LANs, is seldom used.
Routers operate at the network layer of the OSI model. They provide the means to intelligently
route traffic addressed from one LAN to another. They support the transmission of data between
multiple standard LAN topologies. Routing capabilities and strategies are inherent to each
7
network protocol. Intelligent routers can handle multiple protocols; most leading vendors carry
products that can support mixes of Ethernet, Token Ring, FDDI, and from 8 to 10 different
protocols.
Transmission Control Protocol/Internet Protocol
Today, the Internet is a worldwide interconnected network of universities, research, and commercial
establishments. The TCP/IP protocol suite is now being used in many commercial applications. It is
particularly evident in internetworking between different LAN environments. TCP/IP is specifically
designed to handle communications through "networks of interconnected networks." In fact, it has now
become the de facto protocol for LAN-based Client/Server connectivity and is supported on virtually
every computing platform. More importantly, most inter process communications and development tools
embed support for TCP/IP where multiplatform interoperability is required. It is worth noting that IBM
has followed this growth and not only provides support for TCP/IP on all its platforms, but now enables
the transport of its own interoperability interfaces (such as CPIC, APPC) on TCP/IP.
TCP/IP's Architecture
The TCP/IP protocol suite is composed of the following components: a network protocol (IP) and its
Client/Server Computing routing logic, three transport protocols (TCP, UDP, and ICMP), and a series of
session, presentation and application services. The following sections highlight those of interest.
Internet Protocol
IP represents the network layer and is equivalent to OSI's IP or X.25. A unique network address is
assigned to every system, whether the system is connected to a LAN or a WAN. The system comes with
its associated routing protocols and lower level functions such as network-to-physical address resolution
protocols (ARP). Commonly used routing protocols include RIP, OSPF, IGRP, and Cisco's proprietary
protocol. OSPF has been adopted by the community to be the standards-based preferred protocol for large
networks.
Transport Protocols
TCP provides Transport services over IP. It is connection-oriented, meaning it requires a session to be set
up between two parties to provide its services. It ensures end-to-end data transmission, error recovery,
ordering of data, and flow control. TCP provides the kind of communications that users and programs
expect to have in locally connected sessions.
UDP provides connectionless transport services, and is used in very specific applications that do not
require end-to-end reliability such as that provided by TCP.
Telnet
Telnet is an application service that uses TCP. It provides terminal emulation services and supports
terminal-to-host connections over an internetwork. It is composed of two different portions: a client entity
that provides services to access hosts and a server portion that provides services to be accessed by clients.
Even workstation operating systems such as OS/2 and Windows can provide telnet server support, thus
enabling a remote user to log onto the workstation using this method.
File Transfer Protocol (FTP)
FTP uses TCP services to provide file transfer services to applications. FTP includes a client and server
portion. Server FTP listens for a session initiation request from client FTP. Files may be transferred in
either direction, and ASCII and binary file transfer is supported. FTP provides a simple means to perform
software distribution to hosts, servers, and workstations.
Simple Network Management Protocol (SNMP)
SNMP provides intelligence and services to effectively manage an internetwork. It has been widely
adopted by hub, bridge, and router manufacturers as the preferred technology to monitor and manage their
devices. SNMP uses UDP to support communications between agentsintelligent software that runs in
the devicesand the manager, which runs in the management workstation. Two basic forms of
communications can occur: SNMP polling (in which the manager periodically asks the agent to provide
status and performance data) and trap generation (in which the agent proactively notifies the manager that
a change of status or an anomaly is occurring).
Network File System (NFS)
The NFS protocol enables the use of IP by servers to share disk space and files the same way a Novell or
LAN Manager network server does. It is useful in environments in which servers are running different
operating systems. However, it does not offer support for the same administration facilities that a
NetWare environment typically provides.
Simple Mail Transfer Protocol (SMTP)
SMTP uses TCP connections to transfer text-oriented electronic mail among users on the same host or
among hosts over the network. Developments are under way to adopt a standard to add multimedia
capabilities (MIME) to SMTP. Its use is widespread on the Internet, where it enables any user to reach
millions of users in universities, vendor organizations, standards bodies, and so on. Most electronic mail
systems today provide some form of SMTP gateway to let users benefit from this overall connectivity.
TCP/IP and Internetworks
Interestingly, the interconnected LAN environment exhibits many of the same characteristics found in the
environment for which TCP/IP was designed. In particular
Routing: Internetworks need support for routing; routing is very efficient in TCP/IP environments
with efficient protocols such as OSPF.
Connections versus Connectionless: LAN activity includes both; the TCP/IP protocol suite
efficiently supports both within an integrated framework.
Administrative Load Sensitivity: A LAN administrative support is usually limited; contrary to
IBM's SNA, TCP/IP environments contain a tremendous amount of dynamic capabilities, in
which devices and networks are dynamically discovered, and routing tables are automatically
maintained and synchronized.
Networks of Networks: TCP/IP provides extreme flexibility as the administrative approach to the
management of federations of networks. Taking advantage of its dynamic nature, it enables very
independent management of parts of a network (if appropriate).
Interprocess Communication
At the top of the OSI model, interprocess communications (IPCs) define the format for application-level
interprocess communications. IPCs take advantage of services provided by protocol stacks such as
TCP/IP, LU6.2, Decnet or Novell's IPX/SPX. In reality, a great deal of IPC is involved in most
client/server applications, even where it is not visible to the programmer.
The use of IPC is inherent in multitasking operating environments. The various active tasks operate
independently and receive work requests and send responses through the appropriate IPC protocols. To
effectively implement client/server applications, IPCs are used that operate equivalently between
processes in a single machine or across machine boundaries on a LAN or a WAN.
ATM technologies will enable the use of the same lines for voice, data, or video communications
without pre-allocating exclusive portions of the network to each application. When designing the
architecture of the internetwork, it is important to take into account the communications
requirements. This is not just an issue of total traffic, but also of instantaneous demand and user
response requirements. If the router has access to a T1 or T3 circuit, it can provide service on
demand to any of the workstations on the LAN. This means that a single workstation can use the
entire T1 for the period needed to transmit a document or file.
4. Integrated Services Digital Network
ISDN is a technology that enables digital communications to take place between two systems in
a manner similar to using dial-up lines. Connections are established over the public phone
network, but they provide throughput of up to 64 Kbps. ISDN has two basic components:
A. B-Channel: These two channels (hence the name of 2B+D for basic rate ISDN) provide
communication services for either voice or data switched service. Data can be transmitted
in any communications protocol. The primary data or voice communication is carried. It
has a bit rate of 64 kbit/s in full duplex.
11
B. D-Channel Signaling: This channel is used by the terminal equipment to control call
setup and disconnection. It is much more efficient than call control of a dial-up line; the
time required to set up a call is typically less than three seconds. The bit rate of the D
channel of a basic rate interface is 16 kbit/s, and 64 kbit/s on a primary rate interface.
ISDN Applications
ISDN can provide high quality and performance services for remote access to a LAN.
Multimedia applications offer considerable promise for future use of ISDN. The capability to
simultaneously send information over the same connection enables a telephone conversation, a
video conference, and integrated workstation-to-workstation communications to proceed
concurrently. Faxes, graphics, and structured data all can be communicated and made available
for all participants in the conversation.
Network Management
The provision of a network control center (NCC) to manage all resources in a distributed
network is the major challenge facing most large organizations today.
The key layers in the management system architecture:
1. Presentation describes the management console environment and the tools used there.
2. Reduction enables information to be consolidated and filtered, allowing the presentation
service to delegate tasks through the use of an emerging distributed program services
such as RPC, These provide the following benefits: response to problems and alerts can
be executed locally to reduce latency and maintain availability
3. Gathering of information is done by device agents. These device agents provide detailed
diagnostics, detailed statistics and precise control
There are five key OSI management areas:
1. Fault management - The facilities that enable the detection, isolation, and correction of
abnormal operation of the OSI environment.
2. Accounting management - The facilities that enable charges to be established for the use
of managed objects and costs to be identified for the use of those managed objects.
3. Configuration and name management - The facilities that exercise control over, identify,
collect data from, and provide data to managed objects for the purpose of assisting in
providing for continuous operation of interconnection services.
4. Performance management - The facilities needed to evaluate the behavior of managed
objects and the effectiveness of communication activities.
5. Security management - Those aspects of OSI security essential to operate OSI network
management correctly and to protect managed objects.
Network Management Application tools
1. Openview is the standard platform and including products such as Remedy Corporation's
Action Request System for problem tracking/process automation.
2. Tivoli's framework for system administration, management and security.
3. Support applications such as Openvision, implements effective distributed network and
systems management today
12
Additional Notes
SMTP
SMTP is an Internet standard used to transmit email messages between two servers across
different IP (Internet Protocol) networks. It is a text-based protocol in which the text message is
specified along with the list of recipients for the message. Simple Mail Transfer Protocol is a
push protocol and it cannot be used to pull message from the server. However, it has a special
feature through which it can start email queuing process on a remote server. Owing to this
feature, the requesting system can receive the messages directed to it.
Functions of SMTP:
1. SMTP verifies the configuration and allows the computer to send messages. Simple mail
transfer protocol then sends the message to the prescribed destination and keeps a tab on it to
check if the message is successfully delivered or not. If the message is not delivered to the
intended recipient, it sends an error message to the sender of the message.
2. SMTP has one drawback. That is its inability to authenticate the senders, which often results in
e-mail spamming. Today, an enhanced version of SMTP is available, also referred to as Extended
Simple Mail Transfer Protocol (ESMTP). You can use ESMTP to send e-mails that includes
graphics and other attachments.
POP3
POP3 is an Internet based standard used for retrieving e-mail by a user from an e-mail server.
POP is an acronym for Post Office Protocol. POP is basically used to provide simple remote
access to mailboxes. POP3 allows mail clients to connect and download their messages; these
messages are generally removed from the server and stored on the clients local machine. One of
the most important features of POP3 is its ability to check the size of the mailbox and the
message count. POP3 works well in offline environment. It also works well with an always-on
connection, but with some warnings which becomes clear when compared to IMAP.
14
The purpose of a methodology is to describe a disciplined process through which technology can
be applied to achieve the business objectives. Methodology should describe the processes
involved through the entire life cycle, from BPR and systems planning through and including
maintenance of systems in production.
Figure shows the processes in a typical systems integration life cycle. It is necessary to
understand and adhere to the flow of information through the life cycle. This flow allows the
creation and maintenance of the systems encyclopaedia or electronic repository of data
definitions, relationships, revision information, and so on. This is the location of the data models
of all systems. The methodology includes a strict project management discipline that describes
the deliverables expected from each stage of the life cycle. These deliverables ensure that the
models are built and maintained.
SYSTEM INTEGRATION LIFE CYCLE
1
SYSTEM
PLANNING
2
PROJECT INITITATION
3
ARCHITECTURE DEFINITION
SYSTEMS ENCYCLOPEDIA
ANALYSIS
DESIGN
DEVELOPMENT
FACILITIES ENGINEERING
IMPLEMENTATION
POST IMPLEMENTATION
15
Project Initiation
Architecture Definition
Analysis
Design
Development
Facilities Engineering
Major Activities
Initiate systems planning
Gather data
Identify current situation
Describe existing systems
Define requirements
Analyze applications and data architectures
Analyze technology platforms
Prepare implementation plan
Screen request
Identify relationship to long-range systems plan
Initiate project
Prepare plan for next phase
Gather data
Expand the requirements to the next level of detail
Conceptualize alternative solutions
Develop proposed conceptual architecture
Select specific products and vendors
Gather data
Develop a logical model of the new application system
Define general information system requirements
Prepare external system design
Perform preliminary design
Perform detailed design
Design system test
Design user aids
Design conversion system
Set up the development environment
Code modules
Develop user aids
Conduct system test
Gather data
Conduct site survey
Document facility requirements
Design data center
Plan site preparation
Prepare site
Plan hardware installation
Install and test hardware
16
Implementation
Post-implementation
Support
Project Management
The objectives of effective project management are to
1. Plan the project:
Define project scope
Define deliverables
Enforce methodology
Identify tasks and estimates
Establish project organization and staffing
Document assumptions
Identify client responsibilities
Define acceptance criteria
Define requirements for internal quality assurance review
Determine project schedules and milestones
Document costs and payment terms
2. Manage and control project execution:
Maintain personal commitment
Establish regular status reporting
Monitor project against approved milestones
Follow established decision and change request procedures log and follow up on
problems
3. Complete the project:
Establish clear, unambiguous acceptance criteria
Deliver a high-quality product consistent with approved criteria
Obtain clear acceptance of the product
17
Architecture Definition
The purpose of the architecture definition phase in the methodology is to define the application
architecture and select the technology platform for the application. The organization must
consider and weight the following criteria:
Cost of operation
Ease of use for system users
Response time
Availability
Security
Flexibility to change
Use of existing technology
System interface
These application architecture issues must be carefully evaluated and weighed from a business
perspective. Only after completing this process can managers legitimately review the technical
architecture options.
The following set of technical architecture choices must be analyzed for existing structure,
organization standard and the new requirement for
Hardware (including peripherals) - environmental issues, such as temperature, dirt, and
service availability
Distributed versus centralized
Network configuration
Communications protocols
System softwareoptions are available in the locale and on the anticipated hardware and
communications platforms
Database software
Application development tools (for example, CASE)Availability of tools for the
candidate platforms, database engine, operating system, and communications platforms
Development environmento The other platform tools are being considered
o the architectural priorities related to development?
Application software (make or buy, package selection, and so on)
o Viability of the vendor
o Availability of support, source code ,
o The application architecture requirements related to product acquisition
Human interfaceExpectation of User
Systems Development Environment
An SDE comprises hardware, software, interfaces, standards, procedures, and training that are
selected and used by an enterprise to optimize its information systems support to strategic
planning, management, and operations.
18
Integrated table maintenance. A single table maintenance function is provided for all
applications in the organization.
The advantages of building an SDE and including these types of components are most evident in
the following areas:
19
Consistent application designBy virtue of the prototype, systems have a common look
and feel from the user's and the developer's perspectives. This is an essential component
of the single-system image.
Client/server applications vary considerably in their client processing requirements and their I/O
demands on the client processor and server. As multi windowed and multimedia applications
become prevalent during 1994, many applications will require the bandwidth only provided by a
32-bit I/O bus using VESA VL-bus or Intel PCI technology. Windowed applications require
considerable processing power to provide adequate response levels.
20
Macintosh
The Mac System 7 operating system is visually intuitive and provides the best productivity when
response time to GUI operations is secondary. The Motorola 68040, 8Mbytes RAM, 120Mbyte
disk is recommended.
Notebooks
Users working remotely on a regular basis may find that a notebook computer best satisfies their
requirements. The notebook computer is the fastest growing market today.
Pen
Pen-based clients provide the capability to operate applications using a pen to point and select or
write without the need for a mouse or keyboard. Frequently, they are used for verification,
selection, and inquiry applications where selection lists are available. Developers using this
technology use object-oriented software techniques that are RAM-intensive.
UNIX workstation
UNIX client workstations are used when the client processing needs are intensive. In many
applications requiring UNIX, X-terminals connected to a UNIX presentation server will be the
clients of choice.
The introduction of software from SunSoft, Insignia Solutions, and Locus Computing that
supports the execution of DOS and Windows applications in a UNIX window makes the UNIX
desktop available to users requiring software from both environments.
X-Terminals
X-terminals provide the capability to perform only presentation services at the workstation.
Processing services are provided by another UNIX, Windows, OS/2 or VMS server. Database,
communications, and applications services are provided by the same or other servers in the
network. The minimum memory configuration requirement for an X-terminal used in a client/
server application is 4-8 Mbytes RAM, depending on the number of open windows.
21