The Computer Network
A computer network is a group of computers/devices(Nodes)
that use a set of common communication protocols over digital
interconnections for the purpose of sharing resources located on
or provided by the network nodes.
The nodes of a computer network may include personal
computers, servers, networking hardware, or other specialised or
general-purpose hosts.
The interconnections between nodes are formed from a broad
spectrum of telecommunication network technologies, based on
physically wired, optical, and wireless technologies.
A communication protocol is a set of rules for exchanging
information over a network. physically wired, optical, and
wireless
2.
The Network Diagram
(Clickon the Words Below and Learn More About Each Component)
The Internet
Other LANS
Firewall
Router
Fiber Optic Network Cable
Server
PC
Wireless Network
Wired Network
Switch
3.
The Advantages/Uses ofNetwork
Simultaneous Access
There are moments in any business when several workers may
need to use the same data at the same time.
Shared Peripheral Devices
Personal Communications
Videoconferencing
Voice over Internet Protocol (VoIP):-VoIP transmits the sound of
voice over a computer network using the Internet Protocol (IP )
rather than sending the signal over traditional phone wires
Easier Data Backup
4.
Peer to Peervs. Client-Server
Networks
• In peer to peer Network, there is no centralized management or
security and each computer is in charge of its own local users and
file and folder permissions. Since there is no centralized user
management, any user who wants access to resources on another
computer will need to have an account on that specific computer.
• So, if a user wants access to files on ten different computers, then
that user will need ten separate user accounts. Computers on a
peer to peer network are usually connected together through a
simple hub or network switch
6.
client-server network
• Aclient-server network has clients (workstations) as well as a server (or many
servers). As you can see in figure 1.2, the clients are labeled Computer A,
Computer B, Laptop A, and so on.
• There is also a file server and a directory server, which is used to manage user
accounts and access controls.
• The main advantage here is that every user account is created on the directory server, and then
each computer, laptop, and other servers are joined to a domain where authentication is
centralized for logins and resource permissions.
• domain is a centralized way to manage computers, users, and resources, and each computer
joins the domain and each user is created as a domain user.
• Using a switch rather than a hub reduces broadcast traffic because the switch knows what port
each computer is connected to and doesn’t have to go to each computer or server to find the one
it is trying to get to. Switches can be thought of as "smart" hubs, or hubs can be thought of as
"dumb" switches.
• The client-server model is also very scalable, and the amount of concurrent connections to a
server is only limited to the licensing model in place and eventually the hardware limits in
regards to network bandwidth and server capacity.
8.
Client Server model
•The downsides of the client-server model include:
• Increased costs because servers are more expensive than computers and network switches
are more expensive than hubs.
• More difficult to implement and maintain because of its complexity.
• Single point of failure if a directory server goes down and none of your users can log in.
This is often bypassed by having multiple directory servers (or domain controllers).
• Overall, if your environment has many resources and you want to centralize management of
your users and computers, then you should go with the clientserver model. If you only have
a few computers and users, then a peer to peer configuration should work just fine. Plus,
you can reconfigure it to a clientserver model in the future if needed.
1. Network InterfaceCard
NIC is used to physically connect
host devices to the network
media.
A NIC is a printed circuit board
that fits into the expansion slot of
a bus on a computer
motherboard.
It can also be a peripheral device.
NICs are sometimes called
network adapters.
Each NIC is identified by a
unique code called a Media
Access Control (MAC) address.
This address is used to control
data communication for the host
on the network.
11.
2. Repeaters
Arepeater is a network device used to
regenerate a signal.
Repeaters regenerate analog or digital
signals that are distorted by transmission
loss due to attenuation.
A repeater does not make an intelligent
decision concerning forwarding packets
12.
3. Hubs
Hubsconcentrate on connections.
In other words, they take a group of
hosts and allow the network to see
them as a single unit. This is done
passively, without any other effect
on the data transmission.
Active hubs concentrate hosts and
also regenerate signals.
13.
4. Bridges
Bridgesconvert network data
formats and perform basic data
transmission management.
Bridges provide connections
between LANs.
They also check data to
determine if it should cross the
bridge. This makes each part of
the network more efficient
14.
5. Switches
Switchesadd more intelligence to data transfer management.
They can determine if data should remain on a LAN and transfer
data only to the connection that needs it.
Another difference between a bridge and switch is that a switch
does not convert data transmission formats
15.
6. Routers
Routershave all the capabilities listed
above.
Routers can regenerate signals,
concentrate multiple connections, convert
data transmission formats, and manage
data transfers.
They can also connect to a WAN, which
allows them to connect LANs that are
separated by great distances.
16.
7. Gateway
Agateway is a piece of networking
hardware used in telecommunications
for telecommunications networks that
allows data to flow from one discrete
network to another.
Gateways are distinct from routers or
switches in that they communicate
using more than one protocol to
connect a bunch of networks
17.
8. Firewall
Afirewall is a network device or
software for controlling network security
and access rules.
Firewalls are inserted in connections
between secure internal networks and
potentially insecure external networks
such as the Internet.
Firewalls are typically configured to
reject access requests from
unrecognized sources while allowing
actions from recognized ones.
The vital role firewalls play in network
security grows in parallel with the
constant increase in cyber attacks.
18.
Network Media
The functionof the media is to carry a flow of information through a LAN.
A.Wired Media:- A widely adopted family that uses copper and fiber media in
local area network (LAN) technology are collectively known as Ethernet
1. Copper Cable
a. Coaxial Cables
b. Shielded Twisted Pair(STP)
c. Unshielded Twisted Pair
2. Fibre Optic Cable
B.Wireless Media:- use the atmosphere, or space, as the medium.
19.
1. Copper Cable
The most common, easiest, quickest, and
cheapest form of network media to install.
The disadvantage of sending data over
copper wire is that the further the signal
travels, the weaker it becomes.
20.
a. Coaxial Cable
It can be run longer distances than Twisted pair Cables.
• Speed: 10-100Mbps
• Cost: Inexpensive
• Media and connector size: Medium
• Maximum cable length: 500m
21.
b. Shielded TwistedPair(STP)
• Speed: 0-100Mbps
• Cost: Moderate
• Media and connector size: Medium to large
• Maximum cable length: 100m
22.
c. Unshielded TwistedPair
UTP is a four-pair wire medium
used in a variety of networks.
Each of the eight copper wires
in the UTP cable is covered by
insulating material
Speed: 10-100-1000 Mbps*
Cost: Least Expensive
Media and connector size: Small
Maximum cable length: 100m * (Depending
on the quality/category of cable)
23.
UTP Implementation
EIA/TIAspecifies an RJ-45 connector for
UTP cable.
The letters RJ stand for registered jack.
24.
Fiber Optic Cable
Glass fiber carrying light pulses, each pulse a
bit.
Based on the Total Internal Reflection of
Light.
High-speed point-to-point transmission
10-100’s Gbps
low error rate:
repeaters spaced far apart
immune to electromagnetic noise
25.
Communication Protocols
Internet ProtocolSuite
Also called TCP/IP, is the foundation of all modern
networking.
It defines the addressing, identification, and routing
specifications for IPv4 and for IPv6.
It is the defining set of protocols for the Internet.
IEEE 802
It is a family of IEEE standards dealing with local area networks
and metropolitan area networks.
They operate mostly at levels 1 and 2 of the OSI model.
Ethernet
It is a family of protocols used in wired LANs, described by a set
of standards together called IEEE 802.3
Communication Protocols
Wireless LAN
It is standardized by IEEE 802.11 and shares many properties with wired
Ethernet.
SONET/SDH
Synchronous optical networking (SONET) and Synchronous Digital
Hierarchy (SDH) are standardized multiplexing protocols that transfer
multiple digital bit streams over optical Fibre using lasers.
Asynchronous Transfer Mode(ATM)
It uses asynchronous time-division multiplexing and encodes data into
small, fixed-sized cells.
Good choice for a network that handle both traditional high-throughput data
traffic, and real-time, low-latency content such as voice and video.
28.
Types of Networks
1.Personal Area Network (PAN)
2. Local Area Network (LAN)
3. Campus Area Network (CAN)
4. Metropolitan Area Network (MAN)
5. Wide Area Network (WAN)
6. Storage-Area Network (SAN)
7. Virtual Private Network (VPN)
8. Client Server Network
9. Peer to Peer Network (P2P)
29.
1. Personal AreaNetwork
1. Personal Area Network (PAN) is a
computer network used for data
transmission amongst devices such
as computers, telephones, tablets
and personal digital assistants.
2. Also Known as HAN (Home Area
Network)
3. PANs can be used for
communication amongst the
personal devices themselves
(interpersonal communication), or for
connecting to a higher level network
and the Internet (an uplink) where
one "master" device takes up the
role as internet router.
30.
2. Local AreaNetwork
Xerox Corporation worked in
collaboration with DEC and Intel
to create Ethernet, which is the
most pervasive LAN architecture
used today.
Ethernet has evolved and has
seen significant improvements in
regard to speed and efficiency.
An upside of a LAN is fast data transfer with data speed that can reach up
to 10Gbps.
Other significant LAN technologies are Fiber Distributed Data Interface
(FDDI) and token ring.
31.
3. Campus AreaNetwork
Larger than LANs, but smaller
than metropolitan area networks
these types of networks are
typically seen in universities, large
K-12 school districts or small
businesses.
They can be spread across
several buildings that are fairly
close to each other so users can
share resources
32.
4. Metropolitan AreaNetwork
1. A MAN is larger than a LAN but smaller than or equal in size to a WAN.
2. The size range anywhere from 5 to 50km in diameter.
3. MANs are typically owned and managed by a single entity.
4. This could be an ISP or telecommunications company that sells its services to
end-users in that metropolitan area.
5. For all intents and purposes, a MAN has the same characteristics as a WAN
with distance constraints.
33.
5. Wide AreaNetwork
• A Wide Area Network exist over a large area
• Data travels through telephone or cable lines
• Usually requires a Modem
• The world’s largest Wide Area Network in the Internet
34.
6. Storage AreaNetwork
SAN may be referred to as a Sub network or special purpose network.
Its special purpose is to allow users on a larger network to connect various
data storage devices with clusters of data servers.
SANs can be accessed in the same fashion as a drive attached to a server.
35.
7. Virtual PrivateNetwork
VPN is a private network that can access
public networks remotely. VPN uses
encryption and security protocols to
retain privacy while it accesses outside
resources.
When employed on a network, VPN
enables an end user to create a virtual
tunnel to a remote location. Typically,
telecommuters use VPN to log in to their
company networks from home.
Authentication is provided to validate the identities of the two peers.
Confidentiality provides encryption of the data to keep it private from prying
eyes.
Integrity is used to ensure that the data sent between the two devices or
sites has not been tampered with.
36.
8. Client/Server Network
Ina client/server arrangement,
network services are located on a
dedicated computer called a server.
The server responds to the requests
of clients.
The server is a central computer that
is continuously available to respond to
requests from clients for file, print,
application, and other services.
Most network operating systems adopt the form of a client/server
relationship.
Typically, desktop computers function as clients, and one or more
computers with additional processing power, memory, and specialized
software function as servers.
37.
9. Peer toPeer Network
Usually very small networks
Each workstation has equivalent capabilities and responsibilities
Does not require a switch or a hub.
These types of networks do not perform well under heavy data
loads.
38.
Network Topologies
Network topologydefines the structure of the network.
A.Physical topology:- It define the actual layout of the wire or media.
1. Bus
2. Ring
3. Star
4. Tree(Hierarchical)
5. Mesh
B.Logical topology:- It defines how the hosts access the media to send data.
1. Broadcast
2. Token passing
C.Hybrid Topology
39.
1. Bus Topology
T
T
Alldevices are connected to a central
cable, called bus or backbone.
There are terminators at each end of the
bus that stops the signal and keeps it
from traveling backwards.
Disadvantages:
1.It is possible that more than one station may attempt
transmission simultaneously (collision or contention).
2.Difficult reconfiguration and fault isolation.
3.A fault or break in the bus cable stops all transmission,
even between devices on the same side of the problem.
4.The damaged area reflects signals in the direction of
origin, creating noise in both directions
Advantages:
1.There is no central controller.
2.Control resides in each station
3.The less interconnecting wire is required.
4.Ease of installation.
5.Backbone cable can be laid along the
most efficient path, and then connected to
the nodes by drop lines of various lengths
40.
2. Ring Topology
•All devices are connected to one another in the shape of
a closed loop.
• Each device is connected directly to two other devices,
one on either side of it.
Advantages:
1.Avoids the collisions that are possible in the bus topology.
2.Each pair of stations has a point-to-point connection.
3.A signal is passed along the ring in one direction, from device to another,
until it reaches its destination.
4.Each device incorporates a repeater.
5.Relatively easy to install and reconfigure.
6.Fault isolation is simplified.
Disadvantages:
1.A break in the ring (such as station disabled) can disable the entire
network.
2.Unidirectional traffic.
41.
3. Star Topology
•All devices are connected to a central hub.
• Nodes communicate across the network by passing data
through the hub or switch.
Advantages:
1. Easy to install and reconfigure.
2. Robustness, if one link fails; only that link is affected. All other links
remain active.
3. Easy fault identification and isolation. As long as the hub is working,
it can be used to monitor link problems and bypass defective links.
Disadvantages:
1. The devices are not linked to each other.
2. If one device wants to send data to another, it sends it to the
controller, which then relays the data to the other connected device.
42.
4. Tree/Hierarchical Topology
Advantages:
1.Itallows more devices to be attached to a single
central hub and can therefore increase the
distance a signal can travel between devices.
2.It allows the network to isolate and prioritize
communications from different computers.
Disadvantages:
1.The devices are not linked to each other.
2.If one device wants to send data to another, it
sends it to the controller, which then relays the
data to the other connected device.
3.The addition of secondary hubs brings two
further advantages.
43.
6. Mesh Topology
Eachhost has its connections to all other hosts.
Mesh topology is implemented to provide as much
protection as possible from interruption of service.
1.A nuclear power plant might use a mesh topology in
the networked control systems.
2.Although the Internet has multiple paths to any one
location, it does not adopt the full mesh topology.
Disadvantages:
1. A large amount of cabling required.
2. A large amount of I/O ports required.
3. Installation and reconfiguration are difficult.
4. The sheer bulk of the wiring can be greater
than the available space (in the walls, ceiling,
or floors) can accommodate.
5. The hardware required to connect each link
(I/O ports and cables) can be prohibitively
expensive.
Advantages:
1. The use of dedicated links guarantees that each
connection can carry its data load, thus eliminating the
traffic problems that can occur when links must be
shared by multiple devices.
2. It is robust, if one link becomes unusable, it does not
incapacitate (affect) the entire system.
3. Privacy and Security (every message sent travels
along a dedicated line; only the intended recipient sees
it).
4. Point-to-point links make fault identification and fault
isolation easy.
44.
Types of Networks
•Local Area Network (LAN) – It is a group of network
components that work within small area.
• Wide Area Network (WAN) – It is a group of LANs that are
interconnected within large area.
LAYERED TASKS
LAYERED TASKS
A network model is a layered architecture
Task broken into subtasks
Implemented separately in layers in stack
Functions need in both systems
Peer layers communicate
Protocol:
A set of rules that governs data communication
It represents an agreement between the communicating
devices
1.46
47.
Tasks involved insending a letter
Sender, Receiver, and Carrier
Hierarchy (services)
Topics discussed in this section:
Topics discussed in this section:
1.47
48.
THE OSI MODEL
THEOSI MODEL
Established in 1947, the International Standards
Established in 1947, the International Standards
Organization (
Organization (ISO
ISO) is a multinational body
) is a multinational body
dedicated to worldwide agreement on
dedicated to worldwide agreement on
international standards.
international standards.
An ISO is the Open Systems Interconnection (
An ISO is the Open Systems Interconnection (OSI
OSI)
)
model is the standard that covers all aspects of
model is the standard that covers all aspects of
network communications from ISO. It was first
network communications from ISO. It was first
introduced in the late 1970s.
introduced in the late 1970s.
1.48
49.
Seven layers ofthe OSI model
Layered Architecture
Layers
Layer 7. Application
Layer 6. Presentation
Layer 5. Session
Layer 4. Transport
Layer 3. Network
Layer 2. Data Link
Layer 1. Physical Sender
Receiver
Layers 1-4 relate to communications technology.
Layers 5-7 relate to user applications.
50.
Layered Architecture
Alayered model
Each layer performs a subset of the required
communication functions
Each layer relies on the next lower layer to
perform more primitive functions
Each layer provides services to the next
higher layer
Changes in one layer should not require
changes in other layers
The processes on each machine at a given
layer are called peer-to-peer process
51.
Communication mustmove downward through the
layers on the sending device, over the
communication channel, and upward to the receiving
device
Each layer in the sending device adds its own
information to the message it receives from the layer
just above it and passes the whole package to the
layer just below it
At the receiving device, the message is unwrapped
layer by layer, with each process receiving and
removing the data meant for it
PEER – TO – PEER PROCESS
52.
PEER – TO– PEER PROCESS
The passing of the data and network information
down through the layers of the sending device and
backup through the layers of the receiving device is
made possible by interface between each pair of
adjacent layers
Interface defines what information and services a
layer must provide for the layer above it.
LAYERS IN THEOSI MODEL
LAYERS IN THE OSI MODEL
1. Physical Layer
2. Data Link Layer
3. Network Layer
4. Transport Layer
5. Session Layer
6. Presentation Layer
7. Application Layer
56.
The physical layeris responsible for movements of
individual bits from one hop (node) to the next.
Function
Physical characteristics of interfaces and media
Representation of bits
Data rate
Synchronization of bits
Line configuration (point-to-point or multipoint)
Physical topology (mesh, star, ring or bus)
Transmission mode ( simplex, half-duplex or
duplex)
Physical Layer
The data linklayer is responsible for moving
frames from one hop (node) to the next.
Function
Framing
Physical addressing
Flow control
Error control
Access control
Data Link Layer
Example 1
Example 1
Infollowing Figure a node with physical address 10 sends a frame to a node
with physical address 87. The two nodes are connected by a link. At the
data link level this frame contains physical addresses in the header. These
are the only addresses needed. The rest of the header contains other
information needed at this level. The trailer usually contains extra bits
needed for error detection
62.
The network layeris responsible for the
delivery of individual packets from
the source host to the destination host.
Source-to-destination delivery
Responsible from the delivery of packets from the
original source to the final destination
Functions
Logical addressing
routing
Network Layer
Example 2
Example 2
Wewant to send data from a
node with network address A and
physical address 10, located on
one LAN, to a node with a
network address P and physical
address 95, located on another
LAN. Because the two devices are
located on different networks, we
cannot use physical addresses
only; the physical addresses only
have local influence. What we
need here are universal addresses
that can pass through the LAN
boundaries. The network (logical)
addresses have this characteristic.
66.
The transport layeris responsible for the delivery
of a message from one process to another.
Process-to- process delivery
Functions
Port addressing
Segmentation and reassembly
Connection control ( Connection-oriented or connection-
less)
Flow control
Error control
Transport Layer
Example 3
Example 3
Datacoming from the
upper layers have port
addresses j and k (j is the
address of the sending
process, and k is the
address of the receiving
process). Since the data size
is larger than the network
layer can handle, the data
are split into two packets,
each packet retaining the
port addresses (j and k).
Then in the network layer,
network addresses (A and
P) are added to each
packet.
70.
The session layeris responsible for dialog
control and synchronization.
Session Layer
It establishes, maintains and synchronize the
interaction between communicating system
Function
Dialog control
Synchronization (checkpoints)
The presentation layeris responsible for translation,
compression, and encryption.
Presentation Layer
Concerned with the syntax and semantics of the
information exchanged between two system
Functions
Translation ( EBCDIC-coded text file ASCII-coded
file)
Encryption and Decryption
Compression
The application layeris responsible for
providing services to the user.
Functions
Network virtual terminal (Remote log-in)
File transfer and access
Mail services
Directory services (Distributed Database)
Accessing the World Wide Web
Application Layer
Summary of layers
OSIModel
Data
unit
Layer Function
User
support
layers
Data
7. Application Network process to application
6. Presentation Data representation and encryption
5. Session Inter-host communication
User
Network
Segment 4. Transport End-to-end connections and reliability
Network
support
layers
Packet 3. Network
Path determination and logical
addressing
Frame 2. Data Link Physical addressing
Bit 1. Physical Media, signal and binary transmission
Sender
Receiver
78.
• Explicit
Presentation and
sessionlayers
missing in Internet
Protocols
• Data Link and
Network Layers
redesigned
Internet Protocols vs OSI
Application
Presentation
Session
Transport
Network
Data Link
Physical
Application
TCP
IP
Network Interface
Hardware
79.
• In OSImodel, each layer provide services to layer above,
and ‘consumes’ services provided by layer below.
• Active elements in a layer called entities.
• Entities in same layer in different machines called peer
entities.
Services in the OSI Model
80.
• Layer Nprovides service to layer N+1
Layering Principles
(N+1) Entity
Service User
(N) Entity
Service Provider
(N+1) Entity
Service User
(N) Entity
Service Provider
Layer N Service
Access Point (SAP)
Layer N protocol
N+1
PDU
Layer N+1 protocol
SDU
PDU - Protocol Data Unit
SDU - Service Data Unit
N
PDU
N
PDU
81.
• Layers canoffer connection-oriented or connectionless
services.
• Connection-oriented like telephone system.
• Connectionless like postal system.
• Each service has an associated Quality-of-service (e.g.
reliable or unreliable).
Connections
82.
• Reliable servicesnever lose/corrupt data.
• Reliable service costs more.
• Typical application for reliable service is file transfer.
• Typical application not needing reliable service is voice
traffic.
• Not all applications need connections.
Reliability
83.
Packets, Frames, andHeaders
• A network packet (also called a datagram) is a formatted unit of data that not only has the information
that is meant to be sent to its destination (the payload) but also contains control information such as
the source and destination address
• . Networks that use packets to send data are called packet switched networks at the Network Layer
(layer 3).
Frames
• Frames are also considered to be a unit of data themselves, and operate at the Data Link layer (layer
2).
• They are very similar to packets in the way the work is constructed, but their structure is different.
Frames are used to transport data on the same network and use source and destination MAC addresses
(discussed in Chapter 5) rather than IP addresses.
• A frame is sent over the network and an Ethernet switch checks the destination address of the frame
against a MAC lookup table in its memory
85.
Headers
•Headers are usedas part of the process of packaging of data for transfer over
•network connections. There are two types of headers, and they are TCP and UDP
•(TCP and UDP are discussed in Chapter 6). TCP headers contain 20 bytes while
•UDP headers contain 8 bytes.
•A header can contain the following information:
•The version of IP (IPv4 or IPv6)
•The sender’s IP address
•The receiver’s IP address
•The number of packets in the message
•The protocol being used
•The time to live
•The packet length (if applicable)
•Synchronization data
86.
What is aCollision Domain?
• What is a Collision?
Ethernet uses
CSMA/CD for determining when a
computer is free to transmit data thru
the medium. Using CSMA/CD all
computers monitor the transmission
medium and wait until the medium is
free before transmitting. If two
computers try to transmit at the same
time a collision will occur.
• What is a Collision Domain?
Only one device in the collision
domain may transmit at any one
time, and the other devices in
the domain listen to the network in
order to avoid data collisions.
87.
What is aBroadcast Domain?
• A Broadcast Domain consists of all the
devices that will receive any broadcast
packet originating from any device
within the network segment.
• In the picture, "Computer A" is
sending a broadcast and switch will
forward it to every ports and all the
switches will get a copy of broadcast
packet. Every switch will flood the
broadcast packet to all the ports.
Router also will get a copy of
broadcast packet, but the Router will
not forward the packet to the next
network segment.
89.
ADDRESSING
ADDRESSING
Four levels ofaddresses are used in an
Four levels of addresses are used in an
internet employing the TCP/IP protocols:
internet employing the TCP/IP protocols:
physical
physical,
, logical
logical,
, port
port, and
, and specific
specific.
.
Physical addresses areimprinted on the
NIC. Most local-area networks (Ethernet)
use a 48-bit (6-byte) physical address written
as 12 hexadecimal digits; every byte (2
hexadecimal digits) is separated by a colon.
Physical Address
Example:
07:01:02:01:2C:4B
A 6-byte (12 hexadecimal digits) physical
address.
93.
The physical addressesin the datagram may change
from hop to hop.
• known also as the MAC address
• Is the address of a node as defined by its
LAN or WAN
• It is included in the frame used by data link
layer
Physical Address
94.
The physical addresseswill change from hop to hop,
but the logical addresses usually remain the same.
IP addresses are necessary for universal
communications that are independent of physical
network.
No two host address on the internet can have the
same IP address
IP addresses in the Internet are 32-bit address that
uniquely define a host.
Logical Address
95.
Port address isa 16-bit address represented by one
decimal number ranged from (0-65535) to choose a
process among multiple processes on the destination
host.
Destination port number is needed for delivery.
Source port number is needed for receiving a reply as an
acknowledgments.
In TCP/IP , a 16-bit port address represented
as one single number. Example: 753
The physical addresses change from hop to hop,
but the logical and port addresses usually remain the same.
Port addresses
Specific addresses
E-mail address(user1@vcet.ac.in)
Universal Resource Locator (URL) (www.vcet.ac.in)
The Domain Name System (DNS) translates human-friendly
computer hostnames ( URL) into IP addresses. For example,
www.example.com is translated to 208.77.188.166
Editor's Notes
#2 I wanted to present this diagram to help the viewer visually understand how a computer network was set-up. I linked each component to the same text links throughout the project.
#10 Once again, I tried to pull graphics from the original network diagram. I had to alter the wireless router graphic in Photoshop to make it look better. I darken the and removed a white background to make it look consistent in relation to the standard router.
#11 Once again, I tried to pull graphics from the original network diagram. I had to alter the wireless router graphic in Photoshop to make it look better. I darken the and removed a white background to make it look consistent in relation to the standard router.
#12 Once again, I tried to pull graphics from the original network diagram. I had to alter the wireless router graphic in Photoshop to make it look better. I darken the and removed a white background to make it look consistent in relation to the standard router.
#13 Once again, I tried to pull graphics from the original network diagram. I had to alter the wireless router graphic in Photoshop to make it look better. I darken the and removed a white background to make it look consistent in relation to the standard router.
#14 Once again, I tried to pull graphics from the original network diagram. I had to alter the wireless router graphic in Photoshop to make it look better. I darken the and removed a white background to make it look consistent in relation to the standard router.
#15 Once again, I tried to pull graphics from the original network diagram. I had to alter the wireless router graphic in Photoshop to make it look better. I darken the and removed a white background to make it look consistent in relation to the standard router.
#17 Once again, I tried to pull graphics from the original network diagram. I had to alter the wireless router graphic in Photoshop to make it look better. I darken the and removed a white background to make it look consistent in relation to the standard router.
#19 Once again, I tried to pull graphics from the original network diagram. I had to alter the wireless router graphic in Photoshop to make it look better. I darken the and removed a white background to make it look consistent in relation to the standard router.
#25 Once again, I tried to pull graphics from the original network diagram. I had to alter the wireless router graphic in Photoshop to make it look better. I darken the and removed a white background to make it look consistent in relation to the standard router.
#27 Once again, I tried to pull graphics from the original network diagram. I had to alter the wireless router graphic in Photoshop to make it look better. I darken the and removed a white background to make it look consistent in relation to the standard router.
#28 I used this slide as a Introduction to the different types of networks. I tried to let the graphics do the talking on this slide. I elaborated more on each network type on subsequent slides.
#29 I kept the graphic the same as the previous graphic representing the Wide Area Network in hopes of creating a degree familiarity. I also include some basic facts about it.
#30 I kept the graphic the same as the previous graphic representing the Local Area Network in hopes of creating a degree familiarity. I also include some basic facts about it.
#31 I kept the graphic the same as the previous graphic representing the Local Area Network in hopes of creating a degree familiarity. I also include some basic facts about it.
#32 I kept the graphic the same as the previous graphic representing the Wide Area Network in hopes of creating a degree familiarity. I also include some basic facts about it.
#33 I kept the graphic the same as the previous graphic representing the Wide Area Network in hopes of creating a degree familiarity. I also include some basic facts about it.
#34 I kept the graphic the same as the previous graphic representing the Wide Area Network in hopes of creating a degree familiarity. I also include some basic facts about it.
#37 I kept the graphic the same as the previous graphic representing the Peer to Peer Area Network in hopes of creating a degree familiarity. I also include some basic facts about it.
#38 The topology section of my presentation may have been a little confusing for those who are not in the IT or networking field. I tried to explain the process and function of topologies using the three subsequent slides and the features of each topology.
#39 I wanted to beak each of these down so it could be explained and understood better. While topology diagrams can be easily understood in the IT field they may be a little hard to grasp to average person.
#40 I wanted to beak each of these down so it could be explained and understood better. While topology diagrams can be easily understood in the IT field they may be a little hard to grasp to average person.
#41 I wanted to beak each of these down so it could be explained and understood better. While topology diagrams can be easily understood in the IT field they may be a little hard to grasp to average person.
#42 I wanted to beak each of these down so it could be explained and understood better. While topology diagrams can be easily understood in the IT field they may be a little hard to grasp to average person.
#43 I wanted to beak each of these down so it could be explained and understood better. While topology diagrams can be easily understood in the IT field they may be a little hard to grasp to average person.
#78 The Physical Layer is concerned with the details of bit transmission over a physical channel.
Design issues for this layer include:
the definition of 0 and 1, e.g. how many volts represents a 1, and how long a bit lasts,
whether the channel is simplex or duplex,
how many pins a connector has, and what the function of each pin is.
More generally, design issues here deal with Mechanical, Electrical and Procedural matters.
#79 In the OSI model, each layer provides services to the layer above it, and ‘consumes’ services provided by the layer below it.
The active elements in each layer are called entities. An entity can be either software or hardware (e.g. an intelligent input/output chip) or some combination (e.g. firmware on a network card).
Entities in the same layer in different machines are known as peer entities.
Layer 7 entities are often referred to as application entities, Layer 6 entities as presentation entities, and so on.
#80 When a Layer n entity provides service to a Layer n+1 entity, the Layer n entity is known as the service provider and the Layer n+1 entity is the service user.
A Layer may offer several classes of service, e.g. fast (expensive) versus slow (cheap) communications, or reliable (expensive) versus unreliable (cheap) communications.
Services are available at service access points (SAPs). Layer n SAPs are the points at which Layer n+1 can access the service offered by Layer n. Each SAP has a unique address.
In order for two adjacent layers to exchange information, there needs to be a well-defined set of rules governing the interface.
Typically, the Layer n+1 entity passes a Service Data Unit (SDU) to the Layer n entity (together with certain control information).
The SDU is precisely the information passed between peer Layer n+1 entities in the Layer n+1 protocol. The control information is directed at the Layer n entity, and is not passed across the network. This control information is needed to help the Layer n entity do its job, e.g. it contains the length of the accompanying SDU.
In order to transfer the SDU, the Layer n entity may have to split it up into a number of smaller pieces; each of these pieces will be given its own header and sent as a separate Protocol Data Unit (PDU), e.g. a packet.
The PDU headers are used as part of the Layer n protocol, and hence they form part of the SDU passed to Layer n-1. PDU headers are used for such things as: distinguishing between data and control PDUs, and sequence numbers.
Note that Transport, Session and Application PDUs are often referred to as TPDUs, SPDUs and APDUs.
#81 Most layers can offer two different types of service:
connection-oriented service, and
connectionless service.
Connection-oriented services are like the telephone system. There are three phases to a connection:
connection establishment (as in picking up the telephone and dialling),
data transfer (conversation), and
connection release (put down the telephone).
Connectionless services are like the postal system. Each message, like a letter, is equipped with the complete address of the recipient, and each message is routed independently. Re-ordering of messages may occur (unlike with a connection-oriented service).
Each service has an associated quality-of-service.
#82 Reliable services never lose or corrupt data; to implement a reliable service typically requires the receiver to acknowledge receipt of each part of a message. Hence providing a reliable service has an overhead, and so a choice needs to be made between cheapness and the level of reliability required.
A typical application of a reliable connection-oriented service is file transfer. A recipient of a file will want to be sure that it is correct, even though this may cost more.
Some applications do not need a reliable service, and indeed may not be able to cope with the delays associated with providing one. A simple example is provided by digitised voice traffic, where delay is less tolerable than the occasional burst of noise.