Vous êtes sur la page 1sur 48

Computer Networks

and Internetworking
Layers
Dippal Israni
Assistant Professor, U and P U Patel Department of
Computer Engineering,
Charusat University,

E-Mail ID: dippalisrani.ce@charusat.ac.in


Introduction

Chapter 1
Network
• Collection of computers Interconnected by a single technology
• Two Computers are inter connected if they are able to
exchange information
• To Exchange -> Connection is required
• Wired/ Wireless
• Copper, Fibre Optics, Microwaves, Infrared and
communication satellites
• Internet??
Distributed Computing Computer Networks
A Collection of computer appears its users as a single coherent No Coherence model/ S/W, Users are exposed to actual
system machines
A Layer of s/w on top of os If machines have different h/w and s/w they are fully visible to
users
WWW: It runs on top of internet and presents a model in To access remote machine user logs on to system
which everything looks like a document
Uses of Computer Networks

• Business Applications
• Home Applications
• Mobile Users
• Social Issues
Business Applications
• Resource Sharing
 Group of Employees share a single printer
 No one needs a private printer
 High Volume n/w printer is often cheaper, faster and easier to
maintain.

• Information Sharing
 Companies share their customer reports, their tax
statements, product information, inventories with all their
coworkers
 i.e A bank’s all computer goes down it will not last even 5
minutes
 A Modern Manufacturing company, A small travelling
agency all are dependant on Computer Networks
Business Applications

• For Small Companies -> Network completely


in one building

• For Large Companies -> Dozens of Buildings,


different countries

• VPN is used to join individual networks at


different sites into one extended network.
Business Applications (1)

A network with two clients and one server


Client- Server Model
Small Network: Client and Server in one building
Large Network: Client and server in other building
Business Applications (2)

The client-server model involves requests and replies


• People
 Email
 VOIP
 Video Calling
 Desktop Sharing
 Shared Report
 Remotely Patient Monitoring

• Ecommerce
 Big Basket to Make My trip
Home Applications (1)
• Provide Connectivity to Home users
• Peer to Peer Group (Bit Torrent)
• Instant Messaging
 Started in 1970: Unix’s TALK
• Social Networking
• Wikipedia
• Personal Bank Accounts Online
• Games: CS & FIFA
• Ubiquitous Computing:
 Door Sensors, Window Sensors, Smoke Sensors
• Power Line Networks
 Parlour-> Screen at every seat
 RFID: Idea to Replace Barcodes
Home Applications (1)

In a peer-to-peer system there are no fixed clients and servers.


Home Applications (2)

Some forms of e-commerce


Mobile Users

Combinations of wireless networks and mobile computing


Mobile Users
• Connectivity
 Wireless Networks
 Cellular Phones
 Hotspots based on 802.11 Standard
• GPS
• M-Commerce
 NFC(Near Field Communication)
• Our Mobile Acts as an RFID smartcard for payment
• Sensor Network
 Sense information of physical world -> Wirelessly
 Car -> Gather Data -> Speed, location, Fuel Efficiency,
Vibrations -> upload to database -> proficient or not
 Tracking Zebras
• Wearable Computers
Social Issues
• Wincell
• Network neutrality
 Email to TRAI
 History
 Disrespect to religion, country, flag -> Nw are blocked
 Big Companies get good service and viceversa
• Digital Millennium Copyright Act (DMCA)
 Torrent
• Censorship
 Employer vs employee act
• Profiling users
 Private companies get information based on cookies
• Location Privacy
 Gmail
• Phishing
 Bank try to take data from users
 Security Theft
Network hardware

• Point to point link

• Broadcast

• Unicast

• Broadcast

• Multicast
Network Hardware (1)

• Personal area networks


• Local area networks
• Metropolitan area networks
• Wide area networks
• The internet
Network Hardware (2)

Classification of interconnected processors by scale.


Personal Area Network
• Master – Slave
 What addresses are to
be used
 What frequencies are to
be used
 When to send

Bluetooth PAN configuration


• Devices communicate over certainn range
• Bluetooth, Headphones, RFID
• Pace Makers, Insulin Pumps, Hearing Aids
Local Area Networks
• Companies share i/o resources
Wireless Wired
Access Point Copper wires, optical fibre
IEEE 802.11 IEEE 802.3
Wifi Ethernet
11 Mbps to more than100 100 Mbps to 1 GBPS
Mbps

• One Physical LAN can be divided into two smaller logical units and so one
i.e Heads and faculties

Communication Links
Static Dynamic
Link Establishment Centralized
Decentralized
Local Area Networks

Wireless and wired LANs. (a) 802.11. (b) Switched Ethernet.


Metropolitan Area Networks

A metropolitan area network based on cable TV.


Wimax-IEEE 802.16, 40 MBPS
Wide Area Networks (1)

WAN that connects three branch offices in Australia


Subnet: Two Parts
Transmission Lines Switching Elements
Wide Area Networks (2)

WAN using a virtual private network.


Wide Area Networks (3)

WAN using an ISP network.


Wireless Connection

In wireless Communication each computer has an antenna

•Send Receive Data to/from satellite Orbit

•LEO-720 Km

•GEO-36000 Km

•Mars – 400 Million Km


Network Software

• Protocol hierarchies
• Design issues for the layers
• Connection-oriented versus connectionless
service
• Service primitives
• Relationship of services to protocols
Protocol Hierarchies (1)
Layers
To reduce Design Complexity
Protocols
Set of rules that governs data
communications

Peer
Corresponding layer on
different machine
Interface
Connection between two
layers

Layers, protocols, and interfaces.


Protocol Hierarchies (2)

The philosopher-translator-secretary architecture


Protocol Hierarchies (3)

Example information flow supporting virtual


communication in layer 5.
Design Issues of layers

1. Bits Damaged
 Electrical Noise, Random wireless flaw,
Hardware flaw, Software flaw
• How to solve?
 Detect: Error Detection Codes
 Correct:
 Retransmission
 Error Correction
Design Issues of layers
2. Reliability
 If some links or routers are blocked
• How to solve?
 Identify Sender and receiver
 Design should be scalable
3. Resource Allocation
 Static/ Dynamic
 Statistical Multiplexing
 Sharing Based on statistical data
Design Issues of layers

4. Data Control

 Flow Control/ Congestion

5. Security
 Real time
 EavesDropping
 Confidentiality and Authentication
Connection-Oriented Versus
Connectionless Service

Six different types of service.


Connection oriented Connectionless
Telephone System Postal System
Circuits Packets
Connection less Devices

• When intermediate node receives message


 forwarded to other networks
 Store and Forward
 Cut through Switching
Service Primitives (1)

Six service primitives that provide a simple


connection-oriented service
Service Primitives (2)

A simple client-server interaction using


acknowledged datagrams.
The Relationship of Services to Protocols

The relationship between a service and a protocol.


Reference Models

• OSI reference model


• TCP/IP reference model
• Model used for this text
• Comparison of OSI and TCP/IP
• Critique of OSI model and protocols
• Critique of TCP/IP model
The OSI Reference Model

Principles for the seven layers


• Layers created for different abstractions
• Each layer performs well-defined function
• Function of layer chosen with definition of
international standard protocols in mind
• Minimize information flow across interfaces
between boundaries
• Number of layers optimum
The OSI Reference Model

The OSI reference model


OSI Reference Model Layers

• Physical layer
• Data link layer
• Network layer
• Transport layer
• Session layer
• Presentation layer
• Application layer
The TCP/IP Reference Model Layers

• Link layer
• Internet layer
• Transport layer
• Application layer
The TCP/IP Reference Model (1)

The TCP/IP reference model


The TCP/IP Reference Model (2)

The TCP/IP reference model with some protocols we will study


The Model Used in this Book

The reference model used in this book.


Comparison of the OSI and
TCP/IP Reference Models

Concepts central to OSI model


• Services
• Interfaces
• Protocols

OSI Model TCP/IP Models


Seven layers Four Layers
Transport Layer: Connection Oriented service Transport Layer: Connection Oriented service/
Connection Less Service
NetworkLayer: Connection Oriented service/ Network Layer: Connection Less service
Connection Less Service
End

Chapter 1

Vous aimerez peut-être aussi