0% found this document useful (0 votes)
39 views

Overview of Comp NWs

This document provides an overview of computer networks and the internet. It discusses the OSI model and TCP model, with 7 layers of abstraction. It describes key protocols at each layer, including application layer protocols like HTTP, FTP, SMTP, and DNS. It also discusses network hardware, software, history of the internet and ARPANET, internet administration, layered protocol architecture, and internet protocol stack with PDUs at each layer.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
39 views

Overview of Comp NWs

This document provides an overview of computer networks and the internet. It discusses the OSI model and TCP model, with 7 layers of abstraction. It describes key protocols at each layer, including application layer protocols like HTTP, FTP, SMTP, and DNS. It also discusses network hardware, software, history of the internet and ARPANET, internet administration, layered protocol architecture, and internet protocol stack with PDUs at each layer.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 42

Advanced Computer

Networks
Module 1
Overview of Computer Networks and the Internet. History.
Protocols, Review of last mile technologies used for internet
access. Packet switching. Basic ideas about delay queuing
throughput. Concept of Quality of Service, Protocol layering . OSI
model and TCP model

Application layer protocols - Client-server architecture Network


layer 7 application architecture, Web, HTTP, FTP, SMTP, POP3,
and DNS, Peer-to-peer file sharing networks.
Overview of Computer Networks
and the Internet.
Data Communication
Process of transmitting data from one point to
another
Key elements in the model

• Source: Device which generates the data to be transmitted

• Transmitter: Device which transforms and encodes the information that needs to
be transmitted

• Transmission medium: provides the path for data communication

• Receiver: Device which accepts the signal from the transmission media and
converts in to a form that can be handled by the destination device

• Destination: Takes the incoming data from the receiver

• Protocol. A protocol is a set of rules that govern data communications. It


represents an agreement between the communicating devices. Without a
protocol, two devices may be connected but not communicating.
Computer Networks
• A computer network is a
group of computers that use
a set of common
communication protocols
over digital interconnections
for the purpose of sharing
resources located on or
provided by the network
nodes.
Network Hardware
Network Hardware

• Local Area Networks


• Metropolitan Area Networks
• Wide Area Networks
Network Hardware

• Local Area Networks


• Metropolitan Area Networks
• Wide Area Networks
Network Hardware

• Local Area Networks


• Metropolitan Area Networks
• Wide Area Networks
Network Software

Protocol defines the format and the order of messages


exchanged between two or more communication entities, as
well as actions taken on the transmission and receipt of a
message or event.
The Internet
• The Internet is a computer network that
interconnects hundreds of millions of
computing devices throughout the world.
• These computing devices were primarily PCs,
Linux work stations and servers.
Hosts or end systems

Non traditional end systems such as laptops, smart phones, tablets, web cams,
sensing devices, security systems etc are connected to the internet.

Communication links
The end systems connected using communication links. Different types are there
based on physical medium-coaxial cable, copper wire, fiber optics and radio
spectrum. Each of them transmit at different rates measured in meter/sec

Segmentation and Reassembling


The end system send data to another end system by segmenting the it in to packets /
segments and adds header. At the destination end system, these packets are
reassembled to form the original data. The end systems access internet thru Internet
Service Providers(ISP).
History of Internet
• The ARPANET is the Grandparent of all wide area computer
networks, and its successor, the world wide Internet.

• The internet has no single inventor. It has evolved over time

• The ARPANET(Advanced Research Project Agency), research


network sponsored by the DoD (U.S. Department of Defense), was
interested to connect computers, in 1960s

• It eventually connected hundreds of universities and government


installations, using leased telephone lines.

• When satellite and radio networks were added later, the existing
protocols had trouble interworking with them, so a new reference
architecture was needed.
 This architecture was later known as the TCP/IP Reference
Model.
 Later it is split into two protocols TCP and IP. TCP for
segmentation and IP for routing.

 Internet was first described by Vint Cerf and Bob Kahn (1972)-
both were part of ARPANET group.
 The design philosophy behind the model is discussed by Clark
(1988).
 In 1977 internet consisting of three different networks
(ARPANET, packet radio and satellite) ,and was successful.
 In 1983, the ARPANET protocols were abolished and TCP/IP
become the official protocol for ARPANET. Again ARPANET is
split into two networks one for military users and one for non-
military users.
Internet Administration
 The Internet society (ISOC) is an international non profit
organization formed in 1992 to provide support for internet
standard process. The Internet Architecture Board (IAB) is a
technical advisor of ISOC.

 The Internet Engineering Task Force (IETF) is a forum of working


groups managed by Internet Engineering Steering Group(IESG). It
is responsible for identifying operational problems and proposing
solutions to these problems.

 The IRTF(Internet Research Task Force) is a forum of working


groups managed by Internet Research Steering Group(IRSG),
focus on long term research topics related to Internet protocol,
applications, architecture and technology
Protocol Layers and their
service models
How to take an
airplane trip from one
place to another?
It has a Layered Architecture
(Benefits of Layering)
 Allows us to discuss a well-defined, specific part of a large and
complex system.

 Provides modularity, making it much easier to change the


implementation of the service provided by the layer.

 As long as the layer provides the same service to the layer above
it, and uses the same services from the layer below it, the
remainder of the system remains unchanged when a layer’s
implementation is changed. This feature is import advantage for
large and complex systems that are constantly being updated.

 Each layer provides its service by


– performing certain actions within that layer and by using the
services of the layer directly below it.
Protocol

 Defines the format and the order of messages exchanged

between two or more communicating entities,

 Defines actions taken on the transmission and/or receipt of a

message or other event.

 Different protocols are used to accomplish different


communication tasks.

 Used by The Internet, and computer networks


 Network designers organize protocols—and the network
hardware and software that implement the protocols—
 In layers.
 Each protocol belongs to one of the layers
 Layer architecture simplifies the network design.
Advantage and Disadvantage
Layering provides a structured way to One layer may duplicate lower-layer
discuss system components. functionality. For example, many
protocol stacks provide error recovery on
both a per-link basis and an end-to-end
Modularity makes it easier to update basis.
system components. Divide complex task
into several smaller and simpler tasks.
Functionality at one layer may need
information (for example, a time stamp
Separate services from implementation value) that is present only in another
layer; this violates the goal of separation
of layers.
n-PDUs - layer-n protocol data units

Different PDUs at different layers in the protocol architecture


 Each layer communicate with each other by exchanging layer-n
messages. These messages are called layer-n protocol data
units, or more commonly n-PDUs.

 The contents and format of an n-PDU, as well as the manner in


which the n-PDUs are exchanged among the network elements,
are defined by a layer-n protocol.

 When taken together, the protocols of the various layers are


called the protocol stack.

The protocols of the various layers are called the protocol stack.
 Interfaces
 For one layer to interoperate with the layer below it, the interfaces
between the two layers must be defined.

 Standard bodies define precisely the interfaces and permit the developers
of networking software and hardware to implement the interior of the
layers as they please.

 Therefore, if a new and improved implementation of a layer is released, the


new implementation can replace the old implementation and, in theory,
the layers will continue to interoperate.
Layer Functions
 Each layer may perform one or more of the following generic set
of tasks:
 Error control, which makes the logical channel between the
layers in two peer network elements more reliable.

 Flow control, which avoids overwhelming a slower peer with


PDUs.

 Segmentation and Reassembly, which at the transmitting side


divides large data chunks into smaller pieces; and at the
receiving side reassembles the smaller pieces into the original
large chunk.

 Multiplexing, which allows several higher-level sessions to


share a single lower-level connection.
Internet Protocol Stack

The internet protocol stack and protocol data units


⚫ Instead of using n-PDU for each of the five layers, we give
special names to the PDUs in four of the five layers: frame,
datagram, segment, and message.

⚫ No name is commonly used at physical layer

⚫ A protocol layer can be implemented


⚫ In software - (Application layer protocols and Transport
layer protocols)
⚫ In hardware - (Physical layer and data link layer as they
deal with communication)
⚫ As a combination of the two - (Network Layer)
Internet Layer Services:
⚫ Application layer: (layer 5)
⚫ Responsible for supporting network applications.

⚫ On top of the transport layer is the application layer.

⚫ It simply include any session and presentation functions


that they require.

⚫ It contains all the higher- level protocols including HTTP to


support the Web, SMTP to support electronic mail, and FTP
to support file transfer.
Transport layer: (layer 4)

⚫ Responsible for transporting application-layer messages


between the client and server sides of an application.

⚫ In the Internet there are two transport protocols, either of


which can transport application-layer messages.
⚫ TCP
⚫ UDP
⚫ TCP
⚫ Provides a connection-oriented service to its applications.
⚫ Guaranteed delivery of application-layer messages to the
destination
⚫ Flow control (i.e., sender/receiver speed matching).
⚫ Segments long messages into shorter segments
⚫ Provides a congestion control mechanism, so that a source
throttles its transmission rate when the network is
congested.
⚫ UDP
⚫ Provides its applications a connnectionless service.
⚫ It is an unreliable and connectionless protocol.
⚫ There is no need to establish a connection prior to data
transfer.
⚫ UDP is used when acknowledgement of data does not hold
any significance.
⚫ UDP does not provide congestion control mechanism.
⚫ UDP does not guarantee ordered delivery of data.
⚫ Network layer: (layer 3)
⚫ Responsible for routing datagrams from one host to another.
⚫ The Internet's network layer has two principle components.

IP protocol.
⚫ A protocol that defines the fields in the IP datagram as well
as how the end systems and routers act on these fields.
⚫ There is only one IP protocol, and all Internet components
that have a network layer must run the IP protocol.
Routing protocols
⚫ Determine the routes that datagrams take between sources
and destinations.
⚫ The Internet has many routing protocols.

⚫ It is often simply referred to as the IP layer, reflecting that fact


that IP is the glue that binds the Internet together.
⚫ Link layer:
– The network layer routes a packet through a series of
routers between the source and destination.

– At each node IP passes the datagram to the link layer, which


delivers the datagram to the next node along the route.
– The services provided at the link layer depend on the
specific link-layer protocol that is employed over the link
hence a datagram may be handled by different link-layer
protocols at different links along its route.
⚫ Physical layer:

⚫ The job of the physical layer is to move the individual bits


within the frame from one node to the next.

⚫ The protocols in this layer are again link dependent, and


further depend on the actual transmission medium of the link
(e.g., twisted-pair copper wire, single mode fiber optics).
Application Layer
Application programs using the network
Transport Layer (TCP/UDP)
Management of end-to-end message transmission,
error detection and error correction

Network Layer (IP)


Handling of datagrams : routing and congestion
Data Link Layer
Management of cost effective and reliable data delivery,
access to physical networks

Physical Layer
Physical Media
Network Entities and Layers
⚫ The most important network entities are end systems and
packet switches.
⚫ There are two types of packet switches: routers and bridges.

Hosts, routers and bridges – each contain a different set of layers,


reflecting their differences in functionality
⚫ End systems, routers and bridges organize the networking
hardware and software into layers.

⚫ But routers and bridges do not implement all of the layers in


the protocol stack; they typically only implement the bottom
layers.
Thank You

You might also like