CN Introduction
CN Introduction
CN Introduction
WHY
WHAT
WHEN
WHY
DECEMBER 1969:
WHEN
1971
WHEN
1980
WHEN
1986
WHEN
2006
More Applications
Beyond Internet
Mobile (smart-)phones
Wi-fi
Home Internet
Public Hotspots
Radio / TV Broadcast
Cable TV
Satellite
Personal Networks
Bluetooth
Healthcare / Fitness
Home Networks
Mediacenter
Data Communication
• Text: bit pattern or sequence of bits, different bit pattern for different symbols called
code,
• Today:32 bit system called Unicode
• Numbers: also represented by bit pattern, no code use, but directly converted to binary
numbers
• Images: represented by bit pattern, composed of matrix of pixels and each pixel is
assigned a pixel value
• Audio &Video
Data flow (simplex, half-duplex, and full-duplex)
Keyboard to Monitor
Walkie Talkie
Telephone Lines
Elements of Network
• N/w Elements:
1. Hub
2. Switch
3. Router
4. Bridge
5. Repeater
6. Links(Optical Fibre, Coaxial Cable, Wireless)
• What we study?
1. Protocols
2. Layers
Elements of Network
Network Interface Card:
NIC is used to physically connect host devices to the network media.
A NIC is a printed circuit board that fits into the expansion slot of a bus on a
computer motherboard.
It can also be a peripheral device. NICs are sometimes called network adapters.
Each NIC is identified by a unique code called a Media Access Control (MAC)
address.
This address is used to control data communication for the host on the network.
Elements of Network
Repeaters
Bridges convert network data formats and perform basic data transmission
management.
Bridges provide connections between LANs.
They also check data to determine if it should cross the bridge. This makes each part
of the network more efficient
Elements of Network
Switches
Uses Of CN:
N/W for companies: Resource Sharing
High Reliability
Saving Money
Scalability
Powerful Comm. medium
Uses Of CN
N/W for People
Access to remote info.
Person to person comm.
Interactive Entertainment
Electronic Commerce
Social Issues
Social , ethical, political
Home Network Applications
• Broadcast links
• Point-to-point links
Broadcast Links
• Mesh Topology
Network Classification-Topology
Bus: All networked nodes are interconnected, peer to peer, using a single, open-ended cable
Advantages:
1)Easy to implement and extend
2)Well suited for temporary networks that must be set up in a hurry
3)Typically the least cheapest topology to implement
4)Failure of one station does not affect others
Disadvantages:
1) Limited cable length and number of stations
2) A cable break can disable the entire network;
Network Classification-Topology
Ring: Token Passing mechanism
Advantages:
1)This type of network topology is very organized
2)Performance is better than that of Bus topology
3)No need for network server to control the connectivity between workstations
4)Additional components do not affect the performance of network
5)Each computer has equal access to resources
Disadvantages:
1)Each packet of data must pass through all the computers between source and destination, slower than star topology
2)If one workstation or port goes down, the entire network gets affected
Network Classification-Topology
Star: Advantages:
1)Compared to Bus topology it gives far much better performance
2)Easy to connect new nodes or devices
3)Centralized management. It helps in monitoring the network
4)Failure of one node or link doesn‘t affect the rest of network
Disadvantages:
1)If central device fails whole network goes down
2)The use of hub, a router or a switch as central device increases the overall cost of the network
Network Software
• Protocol Hierarchies
• Design Issues for the Layers
• Connection-Oriented and Connectionless Services
• Service Primitives
• The Relationship of Services to Protocols
Network Software
• To reduce their design complexity, most networks are organized as a stack of layers or levels,
each one built upon the one below it.
• No of layers, name of layers, content of layers and functions of layers varies from n/w to n/w
• Each layer is a kind of virtual machine offering services to layer above it
[This concept is variously known as information hiding, abstract data types, data
encapsulation, and object-oriented programming.
The fundamental idea is that a particular piece of software (or hardware)
provides a service to its users but keeps the details of its internal state and
algorithms hidden from them.]
Network Software
• When layer n on one machine carries on a conversation with layer n on another machine,
the rules and conventions used in this conversation are collectively known as the layer n
protocol.
• Protocol is an agreement between two communicating parties on how communication is to
be proceed.
• Entity comprising the corresponding layers on different m/c are called as peers ( S/w
processes, h/w devices, human beings..)
• In reality, no data are directly transferred from layer n on one machine to layer n on
another machine. Instead, each layer passes data and control information to the layer
immediately below it, until the lowest layer is reached. Below layer 1 is the physical
medium through which actual communication occurs.
Network Software
• A protocol is synonymous with rule. It consists of a set of rules that govern data communications.
• It determines what is communicated, how it is communicated and when it is communicated.
• The key elements of a protocol are syntax, semantics and timing
• Syntax
– Structure or format of the data
– Indicates how to read the bits - field delineation
• Semantics
– Interprets the meaning of the bits
– Knows which fields define what action
Timing
– When data should be sent and what
– Speed at which data should be sent or speed at which it is being received.
Network Software
• Between each pair of adjacent layers is an interface
• Interface defines which primitive operations or services, the lower layer makes available to the
upper ones.
• When network designers decide how many layers to include in a network and what each one should
do, one of the most important considerations is defining clean interfaces between the layers.
• Doing so, in turn, requires that each layer perform a specific collection of well-understood
functions.
• In addition to minimizing the amount of information that must be passed between layers, clear cut
interfaces also make it simpler to replace one layer with a completely different protocol or
implementation (e.g., replacing all the telephone lines by satellite channels) because all that is
required of the new protocol or implementation is that it offer exactly the same set of services to its
upstairs neighbor as the old one did.
Network Software
Protocol Hierarchies
• Addressing
• Error Control
• Flow Control
• Multiplexing
• Routing
• Scalability
• Security
Connection-Oriented and Connectionless
Services
The OSI
reference
model.
PDU: Protocol
Data Unit
Reference Models (2)