unit I PPT2
unit I PPT2
Syllabus
• Course Plan
NETWORK
• A network is a set of devices (often referred to
as nodes) connected by communication links.
• A node can be a computer, printer, or any
other device capable of sending or receiving
data generated by other nodes on the network.
• When we communicate, we are sharing
information. This sharing can be local or
remote.
---------------
Line configuration / line
connectivity
1.POINT TO POINT
2. MULTIPOINT
CHARACTERISTICS OF A NETWORK
The effectiveness of a network depends on the following characteristics.
• Fault Tolerance
• Scalability
– Grow based on the needs
– Have good performance after growth
• Quality of Service(QOS)
– Set priorities
– Manage data traffic to reduce delay, data loss etc.,
• Security
• Delivery: The system must deliver data to the correct destination.
• Accuracy: The system must deliver data accurately.
• Timeliness: The system must deliver data in a timely manner.
CRITERIA NECESSARY FOR AN
EFFECTIVE AND EFFICIENTNETWORK
A network must be able to meet a certain number of criteria. The
most important of these are performance, reliability, and security.
• Factors that affect the Performance of a network:
– Number of users
– Type of transmission medium
– Capabilities of the connected hardware
• Factors that affect the Reliability of a network:
– Efficiency of software
– Frequency of failure
– Recovery time of a network after a failure
• Factors that affect the Security of a network:
– Protecting data from unauthorized access and viruses
COMPONENTS
EXAMPLE: Walkie-talkie
Full-Duplex Mode
NETWORK TOPOLOGY
• Arrangement of nodes of a computer network.
• Topology can be viewed as,
– Physical Topology
– Logical Topology
• Types:
– Bus (Ethernet)
– Ring (Industrial control systems-monitor and control processes)
– Star (airports, hospitals, banks, and educational institutions)
– Mesh (smart home systems)
– Hybrid
BUS
RING
STAR
EXTENDED STAR TOPOLOGY
MESH
NETWORK TYPES
• A computer network is a group of computers linked
to each other that enables the computer to
communicate with another computer and share their
resources, data, and applications.
• A computer network can be categorized by their
size.
• A computer network is mainly of three types:
– Local Area Network (LAN)
– Wide Area Network (WAN)
– Metropolitan Area Network (MAN)
Local Area Network
Local Area Network (LAN)
• A group of computers connected to each other
in a small area such as building, office.
• Used for connecting two or more personal
computers through a communication medium
such as twisted pair, coaxial cable, etc.
• The data is transferred at an extremely faster
rate in Local Area Network.
• LAN can be connected using a common cable
or a Switch.
Advantages of LAN
• Resource Sharing
• Software Applications Sharing.
• Easy and Cheap Communication
• Centralized Data.
• Data Security
• Internet Sharing
DisadvantagesofLAN
• High Setup Cost
• Data Security Threat
• LAN Maintenance Job
• Covers Limited Area
WIDE AREA NETWORK (WAN)
• A Wide Area Network is a network that
extends over a large geographical area such as
states or countries.
• A Wide Area Network is quite bigger network
than the LAN.
• The internet is one of the biggest WAN in the
world.
Advantages:
•Large Geographical area
•Centralized data
•Exchange messages
•Sharing of software and resources
•High bandwidth
Disadvantages:
•Security issue
•Needs Firewall & antivirus software
•High Setup cost
•Troubleshooting problems
METROPOLITAN AREA NETWORK
(MAN)
• covers a larger geographic area by interconnecting a
different LAN to form a larger network.
• covers towns and cities (50 km)
• adequate for distributed computing applications.
• various LANs are connected to each other through a
telephone exchange line.
TRANSMISSION MEDIA
• Transmission media is a communication channel that carries the information
from the sender to the receiver.
• Data is transmitted through the electromagnetic signals.
• The main functionality of the transmission media is to carry the information in
the form of bits (Either as Electrical signals or Light pulses).
• It is a physical path between transmitter and receiver in data communication.
• The characteristics and quality of data transmission are determined by the
characteristics of medium and signal.
• Transmission media is of two types:
– Guided Media(Wired)
– UnGuided Media(wireless).
• Inguided (wired) media, medium characteristics are more important whereas, in
unguided (wireless) media, signal characteristics are more important.
• Different transmission media have different properties such as bandwidth, delay,
cost and ease of installation and maintenance.
• The transmission media is available in the
lowest layer of the OSI reference model,i.e.,
Physical layer.
FACTORS FOR DESIGNING THE
TRANSMISSION MEDIA
• Bandwidth: All the factors are remaining constant, the
greater the bandwidth of a medium, the higher the data
transmission rate of a signal.
• Transmission impairment: When the received signal is
not identical to the transmitted one due to the
transmission impairment. The quality of the signals will
get destroyed due to transmission impairment.
• Interference: An interference is defined as the process
of disrupting a signal when it travels over a
communication medium on the addition of some
unwanted signal.
CAUSES OF TRANSMISSION
IMPAIRMENT
Attenuation: Attenuation means the loss of energy, i.e., the strength of the
signal decreases with increasing the distance which causes the loss of
energy.
Distortion: Distortion occurs when there is a change in the shape of the
signal. This type of distortion is examined from different signals having
different frequencies. Each frequency component has its own propagation
speed, so they reach at a different time which leads to the delay distortion.
Noise: When data is travelled over a transmission medium, some
unwanted signal is added to it which creates the noise.
TYPES
GUIDED MEDIA
• It is defined as the physical medium through
which the signals are transmitted.
• It is also known as Bounded media.
• Types of Guided media:
– Twisted Pair Cable
– Coaxial Cable
– Fibre Optic Cable
TWISTED PAIR CABLE
Disadvantage:
This cable can only be used for shorter distances because of attenuation.
Shielded Twisted Pair
Intelligent Hub
• Intelligent hub contains a program of
network management and intelligent path
selection
Repeaters
• receives the signal and it regenerates the
signal in original bit pattern before the signal
gets too weak or corrupted.
• works on physical layer.
• has no filtering capability
• Used to expand the coverage area of the
network, repropagate a weak or broken signal
and or service remote nodes.
• amplify the received/input signal to a higher
frequency domain
• also known as signal boosters or range
extender.
• It cannot connect two LANs, but it connects
two segments of the same LAN
Bridges
• operate in physical layer as well as data link layer.
• As a physical layer device, they regenerate the
receive signal.
• As a data link layer, the bridge checks the physical
(MAC) address contained in the frame.
• has a filtering feature.
• It can check the destination address of a frame and
decides, if the frame should be forwarded or
dropped.
• used to connect two or LANs working on the same
protocol.
Types of Bridges
Transparent Bridges
stations are completely unaware of the bridge’s
existence i.e. whether or not a bridge is added or deleted
from the network , reconfiguration of the stations is
unnecessary.
Source Routing Bridges
routing operation is performed by source station and
the frame specifies which route to follow.
Translation Bridges
connect networks with different architectures, such
as Ethernet and Token Ring. These bridges appear as:
– Transparent bridges to an Ethernet host
– Source-routing bridges to a Token Ring host
Switches
• small hardware device which is used to join multiple
computers together with one LAN
• allows us to interconnect links to form a large
network.
• data link layer device.
• multi port bridge with a buffer .
• used to forward the packets based on MAC addresses.
• operated in full duplex mode.
• Packet collision is minimum as it directly
communicates between source and destination.
• It does not broadcast the message
• used to transfer the data only to the device that
has been addressed
• Input ports receive stream of packets, analyzes the
header, determines the output port and passes the
packet onto the fabric.
• Ports contain buffers to hold packets before it is
forwarded.
• If buffer space is unavailable, then packets are
dropped.
• If packets at several input ports queue for a single
output port, then only one of them is forwarded.
Types of Switch
• Two- Layer Switch
– performs at the physical and the data link layer.
– make a filtering decision bases on the MAC
address of the received frame.
• Three- Layer Switch
– a router.
– The switching fabric in a three-layer allows a faster
table lookup and forwarding mechanism
Routers
• three-layer device operates in the physical, data-link, and
network layers.
• As a physical-layer device, it regenerates the signal it
receives.
• As a link-layer device, the router checks the physical
addresses (source and destination) contained in the packet.
• As a network-layer device, a router checks the network-layer
addresses.
• device like a switch that routes data packets based on their
IP addresses.
• connects the LANs and WANs on the internet.
• internetworking device.
• The key function of the router is to determine
the shortest path to the destination.
• Router has a routing table, which is used to
make decision on selecting the route.
• The routing table is updated dynamically
based on which they make decisions on
routing the data packets
Gateway
• operates in all five layers of the internet or
seven layers of OSI model.
• combination of hardware and software.
• connects two independent networks.
• more complex than switch or router.
• works as the messenger agents that take data
from one system, interpret it, and transfer it to
another system.
• also called protocol converters
• accepts a packet formatted for one protocol and
converts it to a packet formatted to another
protocol before forwarding it.
• The gateway must adjust the data rate, size and
data format.
Brouter
• hybrid device combines the features of both bridge and
router.
• Functions as a bridge for nonroutable protocols and a
router for routable protocols.
• As a router, it is capable of routing packets across
networks.
• As a bridge, it is capable of filtering local area network
traffic.
• Provides the best attributes of both a bridge and a router
• Operates at both the Data Link and Network layers and
can replace separate bridges and routers.
NETWORK SOFTWARE
Network architectures and protocol
specifications are essential things, but a good
blueprint is not enough to explain the
phenomenal success of the Internet.
One thing that has made the Internet such a
runaway success is the fact that so much of its
functionality is provided by software running
in general-purpose computers.
• The place to start when implementing a
network application is the interface exported by
the network.
• when we refer to the interface “exported by the
network,” we are generally referring to the
interface that the OS provides to its networking
subsystem. This interface is often called the
network application programming interface
(API).
• The main abstraction of the socket interface, not
surprisingly, is the socket.
• A good way to think of a socket is as the point
where a local application process attaches to the
network.
• The interface defines operations for creating a
socket, attaching the socket to the network,
sending/ receiving messages through the socket,
and closing the socket.
• To simplify the discussion, we will limit
ourselves to showing how sockets are used with
TCP.
1. The first step is to create a socket, which is done with the following
operation:
int socket(int domain, int type, int protocol)
• The reason that this operation takes three arguments is that the socket
interface was designed to be general enough to support any underlying
protocol suite.
• Specifically, the domain argument specifies the protocol family that is
going to be used:
– PF INET denotes the Internet family.
– PF UNIX denotes the Unix pipe facility.
– PF PACKET denotes direct access to the network interface (i.e., it
bypasses the TCP/IP protocol stack).
• The type argument indicates the semantics of the communication.
– SOCK STREAM is used to denote a byte stream.
– SOCK DGRAM is an alternative that denotes a message-oriented
service, such as that provided by UDP.
• The protocol argument identifies the specific protocol that is going to be
2. The next step depends on whether you are a client or a
server.
– int bind(int socket, struct sockaddr *address, int addr len)
– int listen(int socket, int backlog)
– int accept(int socket, struct sockaddr *address, int *addr
len)
• The bind operation, as its name suggests, binds the
newly created socket to the specified address. This is
the network address of the local participant.
• Note that, when used with the Internet protocols,
address is a data structure that includes both the IP
address of the server and a TCP port number
• The port number is usually some well-known number
specific to the service being offered.
• The listen operation then defines how many
connections can be pending on the specified socket.
• Finally, the accept operation carries out the passive
open.
• It is a blocking operation that does not return until a
remote participant has established a connection, and
when it does complete it returns a new socket that
corresponds to this just-established connection, and the
address argument contains the remote participant’s
address.
• Note that when accept returns, the original socket that
was given as an argument still exists and still
corresponds to the passive open; it is used in future
invocations of accept.
• On the client machine, the application process performs an active
open; that is, it says who it wants to communicate with by
invoking the following single operation:
– int connect(int socket, struct sockaddr *address, int addr len)
• This operation does not return until TCP has successfully
established a connection, at which time the application is free to
begin sending data. In this case, address contains the remote
participant’s address.
• In practice, the client usually specifies only the remote
participant’s address and lets the system fill in the local
information. Whereas a server usually listens for messages on a
well-known port, a client typically does not care which port it
uses for itself; the OS simply selects an unused one.
• Once a connection is established, the application
processes invoke the following two operations to send
and receive data:
– int send(int socket, char *message, int msg len, int
flags)
– int recv(int socket, char *buffer, int buf len, int
flags)
• The first operation sends the given message over the
specified socket, while the second operation receives
a message from the specified socket into the given
buffer. Both operations take a set of flags that control
certain details of the operation.
Performance
• Network performance is measured in using:
– Bandwidth
– Throughput
– Latency
– Jitter
– Round Trip Time
BANDWIDTH
The bandwidth of a network is given by the number of bits that can be
transmitted over the network in a certain period of time.
Bandwidth can be measured in two different values: bandwidth in hertz and
bandwidth in bits per second.
Bandwidth in Hertz
• Bandwidth in hertz refers to the range of frequencies contained in a composite
signal or the range of frequencies a channel can pass.
• For example , we can say the bandwidth of a subscriber telephone line is 4kHz.
Bandwidth in Bits per Seconds
• Bandwidth in Bits per Seconds refers to the number of bits transmitted per second.
• For example, the bandwidth of a network is a maximum of 100 Mbps. This means
that this network can send100 Mbps.
Relationship
• There is an explicit relationship between the bandwidth in hertz and bandwidth in
bits per second.
• Basically, an increase in bandwidth in hertz means an increase in bandwidth in bits
•
per second.
Latency
Bandwidth-Delay Product
JITTER
ROUND-TRIP TIME(RTT)
• RTT refers to how long it takes to send a
message from one end of a network to the
other and back, rather than the one-way
latency. This is called as round trip time(RTT)
of the network.
Data Link Control Services
1. Framing
2. Flow Control
3. Error Control
Framing
• The data link layer packs the bits of a message into frames, so
that each frame is distinguishable from another.