h002 computer networks

Upload: hitesh-mohapatra

Post on 30-May-2018

214 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/9/2019 H002 Computer Networks

    1/62

    COMPUTERCOMPUTERNETWORKSNETWORKS

    ByBy

    HITESH MAHAPATRAHITESH MAHAPATRA

  • 8/9/2019 H002 Computer Networks

    2/62

    INTRODUCTIONINTRODUCTION

    Two or more than two computer systems connected by

    means of a communication medium like cables is

    termed as a Network.

    Computer Network is a communication systems, which

    links computers and their resources.

    Computer Resources are storage devices e.g. HDD, tapedrive, CDROM, MODEM,RDBMS like Oracle, MS-SQL

    etc and any other computing system (Mainframe,

    Minicomputer etc.).

  • 8/9/2019 H002 Computer Networks

    3/62

    BENEFITSOF A NETWORKBENEFITSOF A NETWORK

    Following are the benefits of a networking which

    help to increase the productivity:

    Information Sharing

    Printer Sharing

    Hard Disk Sharing

    Modem Sharing

    Hardware Sharing

    Software Sharing

    Service Access

    Easy Back-Up Management

    Security

    Centralized Administration and Support

  • 8/9/2019 H002 Computer Networks

    4/62

    TYPESOFNETWORKTYPESOFNETWORK

    LOCAL AREA NETWORK (LAN) :

    LAN connects computers that are located near each other or at

    the same location.

    A corporate network consisting of several building in a campusan example of a LAN

    WIDE AREA NETWORKS (WANLONG HAUL

    NETWORKS) :

    WAN connects a numbers of computers which are located at a

    greater distance from one other or at different location.

    Internet is an example of WAN

  • 8/9/2019 H002 Computer Networks

    5/62

    The key characteristics, which are often used to differentiate

    between these two types of networks, are as follows:

    Geographic Distribution

    Data Rate

    Error Rate

    Communication Link

    Ownership

    Communication Cost

    Note:

    Networks that share some of the characteristics of both LANsand WANs are sometimes referred to as Metropolitan AreaNetworks (MAN). The MANs usually cover a wider geographicarea than LANs. The main objective of MANs is to interconnectLANs located in a entire city or metropolitan area.

  • 8/9/2019 H002 Computer Networks

    6/62

    NETWORKTOPOLOGYNETWORKTOPOLOGY

    It refers to the physical layout of the network, especially the

    location of the computers and how the cable is run between them.

    The choice of the networks topology for installing a computernetwork depends upon a combination of factors, such as:

    The desired performance of the system.

    The desired reliability of the system.

    Size of the system..

    Expandability of the system.

    Availability of communication lines.

    Delays involved in routing information from one node to

    another.

  • 8/9/2019 H002 Computer Networks

    7/62

    The bus topology refers to a linear arrangement ofcomputers that are connected together by a single

    cable referred to as the trunk or backbone. It is often

    used when a network installation is small, simple or

    temporary.Advantages:

    Simple,Reliable,Easy to use and

    understand.

    Least amount of cable to connect

    a computers.

    Easy to extend a bus with the help of a repeater.

    BUSTOPOLOGYBUSTOPOLOGY

  • 8/9/2019 H002 Computer Networks

    8/62

    STARTOPOLOGYSTARTOPOLOGY

    A star network consists of one central switch, hub or computerwhich acts as a router to transmit messages.

    Advantages:

    Good PerformanceEasy to set up and to expand.

    Any non-centralized failure will have very

    little effect on the network, whereas on a

    ring network it would all fail with one fault.

    Disadvantages:

    Expensive to install

    Extra hardware required

    If the host com uter fails the entire system is affected.

  • 8/9/2019 H002 Computer Networks

    9/62

    RINGTOPOLOGYRINGTOPOLOGY

    A ring network is a topology of computer networks where eachconnected to node is two other nodes, so as to create a ring.

    Advantages:

    Data is quickly transferred without a bottle neck. (very fast, all

    data traffic is in the same direction)

    The transmission of data is simple as packets travel in one

    direction only.

    Adding additional nodes has very little impact on bandwidth

    It prevents network collisions because of the media access method

    or architecture re uired.

  • 8/9/2019 H002 Computer Networks

    10/62

    Disadvantages:

    Data packets must pass through every computer

    between the sender and recipient therefore this makes it

    slower.

    If any of the nodes fail then the ring is broken and datacannot be transmitted successfully.

    It is difficult to troubleshoot the ring.

    Because all stations are wired together, to add a station

    you must shut down the network temporarily.

    In order for all computers to communicate with each

    other, all computers must be turned on.

  • 8/9/2019 H002 Computer Networks

    11/62

    TOKENRINGTOKENRING

    A token ring is a type of computer network in which allthe computers are arranged (schematically) in a circle. Atoken, which is a special bit pattern, travels around thecircle. To send a message, a computer catches the token,

    attaches a message to it, and then lets it continue totravel around the network.

    Although it is considered a more reliable

    system, a token ring network is slowerand offers less flexibility than schools

    and other businesses need.

    In a token ring, only one computer

    may send information at a time.

  • 8/9/2019 H002 Computer Networks

    12/62

    MEDIUM ACCESSCONTROLMEDIUM ACCESSCONTROL

    PROTOCOLPROTOCOL

    The Medium Access Control (MAC) protocol is used to provide

    the data link layer of the Ethernet LAN system. It defines the

    access method and access control in different local area networks.

    The MAC layer provides an addressing mechanism called physical

    address or MAC address. This is a unique serial number assigned

    to each network adaptor, making it possible to deliver data packets

    to a destination within a subnetwork.

    Media access control is often used as synonym to multiple access

    protocol, since the MAC sublayer provides the protocol and

    control mechanisms that are required for a certain channel access

    method.

  • 8/9/2019 H002 Computer Networks

    13/62

    CMSA/CDPROTOCOLCMSA/CDPROTOCOL

    In computer networking, Carrier Sense Multiple AccessWith Collision Detection (CSMA/CD) is a networkcontrol protocol in which a carrier sensing scheme isused.

    A transmitting data station that detects another signalwhile transmitting a frame, stops transmitting that frame,transmits a jam signal, and then waits for a random time

    interval (known as "backoff delay") before trying to sendthat frame again.

    Ethernet is the classic CSMA/CD protocol.

  • 8/9/2019 H002 Computer Networks

    14/62

    WANTECH

    NOLOGIES

    WANTECH

    NOLOGIES

  • 8/9/2019 H002 Computer Networks

    15/62

    WAN is Wide Area Network.

    A WAN is a data communications network that

    covers a relatively broad geographic area and that

    often uses transmission facilities provided bycommon carriers, such as telephone

    companies(coaxial cables) or communication

    satellites.

    WAN uses no fixed Network Topology.

  • 8/9/2019 H002 Computer Networks

    16/62

    PACKETPACKET--SWITCHINGEXCHANGESSWITCHINGEXCHANGES

    PSEs are hardware devices (special purpose

    computers) dedicated to the task of data

    communication.

    Communication channels of the network

    interconnect the PSEs.

    A computer of a WAN only interacts with the PSE

    of the WAN to which it is connected for sending

    and receiving messages.

  • 8/9/2019 H002 Computer Networks

    17/62

    AWAN of ComputersAWAN of Computers

    3

    B

    FD

    C

    A

    E

    PSE

    PSEPSE

    PSE1

    2

    4

    Computers

  • 8/9/2019 H002 Computer Networks

    18/62

    SWITCHINGTECHNIQUESSWITCHINGTECHNIQUES

    The process moving data from one interface and

    delivering it through another interface, selecting

    the best paths between machines that store

    messages is known as switching.

    There are a number of ways to perform switching:

    Circuit SwitchingPacket Switching

    Message Switching

    Cell Switching

  • 8/9/2019 H002 Computer Networks

    19/62

    CIRCUITSWITCHINGCIRCUITSWITCHING

    A type of communication in which a dedicated

    channel (or circuit) is established for the duration

    of a transmission.

    connection-oriented networks.

    Ideal for communications that require data to be

    transmitted in real-time or for long continuoustransmission.

    Used in PSTN (Public Switched Telephone

    Network).

  • 8/9/2019 H002 Computer Networks

    20/62

    ADVANTAGES : ADVANTAGES :

    No delay other than propagation delay.

    Full capacity of the circuit is available.

    Transmission time required to send a message can

    be known and guaranteed.

    DISADVANTAGES :DISADVANTAGES :

    Additional overhead during circuit establishment

    and circuit disconnection.

    Channel bandwidths may be wasted.

  • 8/9/2019 H002 Computer Networks

    21/62

    PACKET SWITCHINGPACKET SWITCHING

    Packet Switching techniques switch packets of data

    between destinations.

    Each packet is then transmitted individually and can

    even follow different routes to its destination (Store

    and forward).

    connectionless networks.

    Used in X.25 public packet network and the internet.

  • 8/9/2019 H002 Computer Networks

    22/62

    ADVANTAGES : ADVANTAGES :Efficient usage of channels (Bandwidths are

    shared).

    Alternate paths may be used (Failed paths may be

    ignored).

    Suitable for small data bursty in nature.

    DISADVANTAGES :DISADVANTAGES :Each packet needs to be buffered and reassembled.

    Inefficient for large messages.

    Time taken depends on the route chosen.

  • 8/9/2019 H002 Computer Networks

    23/62

    ROUTINGTECHNIQUESROUTINGTECHNIQUES

    In a WAN, when multiple paths exist between thesource and destination computers of a packet, any

    one of the path may be used.

    Packets are routed to their destination as

    determined by a routing algorithm.

    An efficient routing techniqueReduces Network Latency.

    Should be implementable in h/w.

    Should not require Global State Info.

  • 8/9/2019 H002 Computer Networks

    24/62

    Routi al orit s are classifie aseRouti al orit s are classifie ase

    on t e following attri utes :on t e following attri utes :

    Place where routing ecisions are a e.

    Ti e c onstant of the infor ationupon

    which the routing ecisions are ase .

    Control echanis use for yna ic

    routing.

  • 8/9/2019 H002 Computer Networks

    25/62

    PLACEBASEDPLACEBASED

    SOURCE ROUTING :Source computers PSE selects the entire path

    before sending the packet

    HOP-BY-HOP ROUTING :

    Each PSE along the path decides only the next PSE

    for the path.

    HYBRID ROUTING :

    Source comps PSE specifies certain major

    intermediate PSEs of the complete path and the sub

    aths are decided with ho -b -ho method.

  • 8/9/2019 H002 Computer Networks

    26/62

    TIME CONSTANT BASEDTIME CONSTANT BASED

    STATIC ROUTING (Fixed or Deterministic) :

    Routing tables (stored at PSEs) are set once

    and do not change for a very long time.

    DYNAMIC ROUTING (Adaptive) :

    Routing tables are updated relativelyfrequently, reflecting shorter term changes in

    the network environment.

  • 8/9/2019 H002 Computer Networks

    27/62

    CONTROLMECHANISMBASEDCONTROLMECHANISMBASED

    ISOLATED MANNER :Individual PSEs update information in their

    local routing table in an isolated manner.

    CENTRALIZED MANNER :

    Changes in the network

    environment,connectivity, or performance are

    constantly reported to one centralized PSE

    based on which global table is maintained.

    DECENTRALIZED MANNER :

    Each PSE maintains a routing table and the

    table updates are performed by mutual

    interaction among the PSEs.

  • 8/9/2019 H002 Computer Networks

    28/62

    INTERNETWORKINGINTERNETWORKING

  • 8/9/2019 H002 Computer Networks

    29/62

    Interconnecting of two or more networks to form a

    single network is called INTERNETWORKINGand the resulting network is called an

    INTERNETWORK (eg. Internet).

    INTERNETWORKS are heterogeneous networkscomposed of several network segments that may

    differ in topology and protocol.

    Goal of internetworking is to hide the details of

    different physical networks so that resulting

    internetwork functions as a single coordinated unit.

  • 8/9/2019 H002 Computer Networks

    30/62

    INTERCONNECTIONTECHNOLOGIESINTERCONNECTIONTECHNOLOGIES

    Internetworking schemes provide some common

    point of reference for the two networks to

    communicate with each other.This point of reference may be

    High-Level protocol common to the twonetworks.

    A Device that allows interconnection of differenttopologies with different physical and electrical

    characteristics.

    Protocol that allows operating environmentdifferences to be ignored

  • 8/9/2019 H002 Computer Networks

    31/62

    BRIDGESBRIDGES

    Bridges operate at the bottom two layers of the

    OSI model (Physical and Data Link).

    They are used to connect networks that use the

    same communication protocols above the data-link

    layer but may or may not use the same protocols atthe physical and data-link layers.

  • 8/9/2019 H002 Computer Networks

    32/62

    ROUTERSROUTERS

    Routers operate at the Network Layer of the OSImodel.

    They are used to connect networks with the same High

    Level protocols.

    Routers unlike bridges only know which is the next

    router for the data being transferred across thenetwork.

    Routers choose the best route for data based on the

    info in routing table.

  • 8/9/2019 H002 Computer Networks

    33/62

    BROUTERSBROUTERS

    Brouters are hybrid of Bridges and Routers.

    They are complex,expensive and difficult to install.

    They are used for connecting segments with the

    same high level communication protocols.

  • 8/9/2019 H002 Computer Networks

    34/62

    GATEWAYSGATEWAYS

    Gateways are most sophisticated internetworking

    tools.

    Gateways operate at the top three layers of the OSI

    model (Session, Presentation and Application).

    They are used for connecting networks that are built

    on totally different communication architectures.

  • 8/9/2019 H002 Computer Networks

    35/62

    Communication Medium to beCommunication Medium to be

    usedusedDEPENDS ON :

    Location of the two networks.

    Throughput desired.

    OPTIONS AVAILABLE :

    Leased Telephone Lines

    Dedicated Telephone Lines

    Public Data Networks

    Communication Satellites

  • 8/9/2019 H002 Computer Networks

    36/62

    Network Management TechnologiesNetwork Management Technologies

    Network Management is monitoring and analysis of

    network status and activities.

    They monitor Data Throughput, Node and LinkFailures and other Global Occurrences on network.

    They report existence and cause of the problem.

    They should enfold all the protocols and devices on

    a typical heterogeneous internetwork, should beeasy to use and should be intelligent.

    Eg. SNMP,CMIP and DME

  • 8/9/2019 H002 Computer Networks

    37/62

    CO

    MMUN

    ICA

    TION

    CO

    MMUN

    ICA

    TION

    PROTOCOLSPROTOCOLS

  • 8/9/2019 H002 Computer Networks

    38/62

    The term protocol is used to refer to a set ofrules and conventions needed for

    communication between communicating

    parties.

    Computer networks are implemented using the

    concept of layered protocols.

    Requirements of communication protocols for

    network systems and distributed systems are

    different.

  • 8/9/2019 H002 Computer Networks

    39/62

    Protocols forNetwork SystemsProtocols forNetwork Systems

    The OSI/ISO Reference Model

    Provides a framework in which standards can bedeveloped for the services and protocols at each

    layer.

    It is a seven layer architecture in which a

    separate set of protocols is defined for each

    layer.

  • 8/9/2019 H002 Computer Networks

    40/62

    The OSI/ISO Reference ModelThe OSI/ISO Reference Model

    Application Layer

    Presentation Layer

    Session Layer

    Transport Layer

    Network Layer

    Data Link Layer

    Physical Layer

  • 8/9/2019 H002 Computer Networks

    41/62

    Physical Layer:

    Transmits raw bit streams between two sites.

    Data Link Layer:

    Detects and corrects any errors in the transmitted

    data.

    Network Layer:

    Sets up logical path between two sites forcommunication to take place.

    Two popular network layer protocols are X.25

    protocol and Internet Protocol.

  • 8/9/2019 H002 Computer Networks

    42/62

    Transport Layer:

    Provides site-to-site communication and hides allthe details of the communication subnet from the

    session layer by providing network independent

    transport service.

    The two most popular protocols are TCP andUDP.

    Session Layer:

    Provides the means by which presentation

    entities can organize and synchronize their dialog

    and manage their data exchange.

  • 8/9/2019 H002 Computer Networks

    43/62

    Presentation Layer:

    Represents message information to

    communicating application layer entities in a way

    that preserves meaning while resolving syntax

    differences.

    Application Layer:

    Provides services that directly supports the endusers of the network.

  • 8/9/2019 H002 Computer Networks

    44/62

    It is a modified reference model suitable for LANs

    built by IEEE.

    The layers in this model are similar to those of the

    OSI model the only difference being that the last

    two layers of the reference model are modified.

    TheIEEE 802 LANReferenceTheIEEE 802 LANReference

    ModelModel

  • 8/9/2019 H002 Computer Networks

    45/62

    Application

    LayerPresentation

    Layer

    Session Layer

    Transport

    LayerNetwork

    LayerData Link

    Layer

    PhysicalLayer

    Logical-LinkControl Layer

    Medium-Access

    Control Layer

    Physical Layer

    Relationship between theRelationship between the

    IEEE LANMODEL & OSIMODELIEEE LANMODEL & OSIMODEL

  • 8/9/2019 H002 Computer Networks

    46/62

    The physical layer defines interface protocols for thefour types of media that are commonly used in

    LANs : baseband,broadband,fiber optics and

    twisted pair.

    The medium-access-control layer deals with

    medium access control protocols for LANs.

    The logical-link-control layer contains the IEEE

    802.2 standard.

  • 8/9/2019 H002 Computer Networks

    47/62

    Protocol forDi tri tedProtocol forDi tri ted

    SystemsSystems

    Requirements for distributed systems

    TransparencyClient-server based communication

    Group communication

    Security

    Network management

    Scalability

  • 8/9/2019 H002 Computer Networks

    48/62

    The VersatileMessageTransportThe VersatileMessageTransport

    Protocol (VMTP)Protocol (VMTP)

    It is a transport protocol designed for distributed

    operating systems that has special features to

    support request/response behavior between a client

    and one or more server processes.

    Entities are identified by 64 bit identifiers.

    It provides selective retransmission mechanism.

    It uses a rate-based flow control mechanism

  • 8/9/2019 H002 Computer Networks

    49/62

    TheFast Local InternetTheFast Local Internet

    Protocol (FLIP)Protocol (FLIP)

    It is a connectionless protocol designed to supporttransparency, group communication, secure

    communication and easy network management.

    The following FLIP properties helps to achieve theefficiency requirements for distributed systems.

  • 8/9/2019 H002 Computer Networks

    50/62

    FLIP identifies entities called network serviceaccess points (NSAPs)

  • 8/9/2019 H002 Computer Networks

    51/62

    FLIP uses a one way mapping between the private

    address, used to register an endpoint of a network

    connection, and the public address used to

    advertise the endpoint.

    FLIP routes messages based on NSAP.

    FLIP uses a bit in the message header to request

    transmission of sensitive messages across trusted

    networks.

  • 8/9/2019 H002 Computer Networks

    52/62

    ATMNETWORKSATMNETWORKS

  • 8/9/2019 H002 Computer Networks

    53/62

    FEATURESFEATURES

    Enables high-bandwidth distributed applications.

    Provides high transmission speeds for local and

    wide-area networks and services.

    Supports circuit switching and packetswitching.[CELL SWITCHING]

    Uses the concept of virtual networking to pass

    traffic between 2 locations.

    Supports multi-casting.Enables use of single network to efficiently

    transport a wide range multimedia data.

    It is flexible since it grants access to bandwidth

  • 8/9/2019 H002 Computer Networks

    54/62

    BASIC CONCEPTSBASIC CONCEPTS

    Fundamental types of network traffic-CBR & VBR.

    Connection oriented technology.

    Cell Switching technology is based on the digital packet

    switching technology which relays and routes traffic over

    virtual path by means of an address contained within the

    packet.

    In ATM, a virtual path is essentially a bundle of virtual

    channels that can be multiplexed together.

  • 8/9/2019 H002 Computer Networks

    55/62

    ATM

    Protocol Reference Model

    ATM

    Protocol Reference Model

    Other layers not specified in ATM protocol

    reference model

    ATM Adaptation Layer (AAL)

    ATM Layer

    Physical Layer

  • 8/9/2019 H002 Computer Networks

    56/62

    PHYSICALLAYERPHYSICALLAYER

    By carrying cells as a synchronous data stream.

    By carrying cells in the payload portion of an

    externally framed transmission.

    SONET (Synchronous Optical NETwork).

  • 8/9/2019 H002 Computer Networks

    57/62

    ATMLAYERATMLAYER

    Generic Flow Control (GFC)

    Virtual Path Identifier (VPI)Virtual Circuit Identifier (VCI)

    Payload Type Identifier (PTI)

    Cell Loss Priority (CLP) Field

    Header Error Control (HEC) Field

  • 8/9/2019 H002 Computer Networks

    58/62

    4 bits 48 bits8 bits 16 bits 3 bits 1 bit 8 bits

    Payload areaHeader area

    GFC VPI VCI PTI CLP HEC Payload

    ATM CE

    LLFO

    RMA

    TA

    TM CELL

    FO

    RMA

    T

  • 8/9/2019 H002 Computer Networks

    59/62

    ATM ADAPTATIONLAYERATM ADAPTATIONLAYER

    Responsible for providing different types of services todifferent types of traffic according to their specific

    requirements.

    It packages various kinds of user traffics into 48-byte cells,

    together with the overhead.

    Four service classes defined by the ITU:

    CLASS A: Applications having delay sensitive &

    CBR traffic & are connection oriented.

    CLASS B: Applications having delay sensitive &

    CBR traffic & are connection oriented.

    CLASS C: Applications having delay sensitive &

    CBR traffic & are connection oriented.

    CLASS D: Applications having delay sensitive &

    CBR traffic & are connection oriented.

  • 8/9/2019 H002 Computer Networks

    60/62

    Four service classes defined by the ITU:

    CLASS A:Applications having delay sensitive &

    CBR traffic & are connection oriented. Ituses AAL1 protocol.

    CLASS B:Applications having delay sensitive &

    VBR traffic & are connection oriented. It

    uses AAL2 protocol.CLASS C:Applications that are not delay

    sensitive & VBR traffic & are connection

    oriented. It uses AAL3/4 or AAL5 protocol.

    CLASS D:Applications that are not delaysensitive & VBR traffic & are not

    connection oriented. It uses AAL3/4 or

    AAL5 protocol.

  • 8/9/2019 H002 Computer Networks

    61/62

    ATMNETWORKSATMNETWORKS

    ATM SWITCH

    ATMSWITCH

    ATMSWITCH

    Host Computers

  • 8/9/2019 H002 Computer Networks

    62/62

    THANK YOUTHANK YOU