Uploaded by idanmatonda

Computer Networks

advertisement
Introduction
When we communicate, we will be sharing
information. This sharing can be local or remote.
Between individuals, local communication usually
occurs face to face, while remote communication
takes place over distance.Data Communication is a
process of exchanging data or information. In case
of computer networks this exchange is done
between two devices over a transmission medium.
For data communications to occur, the
communicating devices must be part of a
communication system made up of a
combination of hardware (physical
equipment) and software (programs). The
hardware part involves the sender and
receiver devices and the intermediate
devices through which the data passes.
The software part involves certain rules
which specify what is to be communicated,
how and when it is to be communicated.
Components of a Data communication system
A data communications system has five components.
1. Message:
The message is the data to be communicated. Popular
forms of information include text, numbers, pictures,
audio, and video.
2. Sender:
The sender is the device that sends the data message. It
can be a computer, workstation, telephone handset, video
camera, etc.
3. Receiver:
The receiver is the device that receives the message. It
can be a computer, workstation, telephone handset,
television, and so on.
4. Transmission medium:
The transmission medium is the physical path by which a
message travels from sender to receiver. Some examples
of transmission media include twisted-pair wire, coaxial
cable, fiber-optic cable, and radio waves.
5. Protocol:
A protocol is a set of rules that govern data
communications. It represents an agreement between
the communicating devices. Without a protocol, two
devices may be connected but not communicating, just
as a person speaking French cannot be understood by a
person who speaks only Japanese.
An effective Data Communication system
The effectiveness of a data communications system
depends on four fundamental characteristics:
delivery, accuracy, timeliness, and jitter.
1. Delivery:
The system must deliver data to the correct
destination. Data must be received by the intended
device or user and only by that device or user.
2. Accuracy:
The system must deliver the data accurately. Data
must not be altered during transmission.
3. Timeliness:
The system must deliver data in a timely manner.
Data delivered late may become useless. In the
case of video and audio, timely delivery means
delivering data in the same order that its was
produced, and without significant delay. This kind
of delivery is called real-time transmission.
4. Jitter:
Jitter refers to the variation in the packet arrival
time. It is the uneven delay in the delivery of
audio or video packets. For example, let us
assume that video packets are sent every 3 ms. If
some of the packets arrive with 3 ms delay and
others with 4 ms delay, an uneven quality in the
video is the result.
Computer Networks
A computer network can be defined as a collection
of nodes. A node can be any device capable of
transmitting or receiving data. The communicating
nodes have to be connected by communication
links.
Network Criteria
A network must be able to meet a certain number of
principles. The most important of these are
performance, reliability, and security.
Performance
Performance can be measured in many ways, including
transit time and response time.Transit time is the
amount of time required for a message to travel from
one device to another. Response time is the elapsed
time between an inquiry and a response. The
performance of a network depends on factors such as
the number of users, the type of transmission medium,
the capabilities of the connected hardware, and the
efficiency of the software.Performance is often
evaluated by two networking metrics: throughput and
delay.We often need more throughput and less delay.
However, these two criteria are often contradictory. If
we try to send more data to the network, we may
increase throughput but we increase the delay because
of traffic congestion in the network
Reliability
In addition to accuracy of delivery, network
reliability is measured by the frequency of
failure, the time it takes a link to recover from a
failure
Security
Network security issues include protecting data
from unauthorized access, protecting data from
damage and development, and implementing
policies and procedures for recovery from
breaches and data losses.
Categories of Networks
Generally, networks are distinguished based on
their geographical span, ownership, the distance
it covers, and its physical architecture. A
network can be as small as distance between
your mobile phone and its Bluetooth headphone
and as large as the internet itself, covering the
whole geographical world.
Personal Area Network (PAN)
A Personal Area Network (PAN) is smallest
network which is very personal to a user. This
may include Bluetooth enabled devices or
infra-red enabled devices. PAN has connectivity
range up to 10 meters. PAN may include wireless
computer keyboard and mouse, Bluetooth
enabled headphones, wireless printers and TV
remotes.
Local Area Network (LAN)
A computer network spanned inside a building and
operated under single administrative system is
generally termed as Local Area Network (LAN).
Usually,LAN covers an organization’ offices, schools,
colleges or universities. Number of systems
connected in LAN may vary from as least as two to
as much as 16 million.
LAN provides a useful way of sharing the resources
between end users.The resources such as printers,
file servers, scanners, and internet are easily
sharable among computers.
Metropolitan Area Network (MAN)
The Metropolitan Area Network (MAN)
generally expands throughout a city such as
cable TV network Backbone of MAN is
high-capacity and high-speed fiber optics. MAN
works in between Local Area Network and Wide
Area Network. MAN provides uplink for LANs to
WANs or internet.
Wide Area Network
As the name suggests, the Wide Area Network
(WAN) covers a wide area which may span
across provinces and even a whole country.
Generally, telecommunication networks are
Wide Area Network. These networks provide
connectivity to MANs and LANs
Network Topologies
The term topology refers to the physical or
logical layout of a network. Two or more devices
connect to a link and two or more links form a
topology. There are five basic topologies
possible: star, ring, bus, mesh and tree.
Star Topology
In a star topology, each device has a dedicated
point-to-point link only to a central controller,
usually called a hub. The devices are not directly
linked to one another.The controller acts as an
exchange: If one device wants to send data to
another, it sends the data to the controller,
which then relays the data to the other
connected device
Ring topology
In a ring topology, each device has a dedicated
point-to-point connection with only the two devices
on either side of it. A signal is passed along the ring
in one direction, from device to device, until it
reaches its destination. Each device in the ring
incorporates a repeater. When a device receives a
signal intended for another device, its repeater
regenerates the bits and passes them along.
Bus topology
A bus topology, on the other hand, is multipoint.
One long cable acts as a backbone to link all the
devices in a network. Nodes are connected to
the bus cable by drop lines and taps. A drop line
is a connection running between the device and
the main cable. A tap is a connector that either
joints into the main cable or punctures the
sheathing of a cable to create a contact with the
metallic core.
As a signal travels along the backbone,
some of its energy is transformed into
heat. Therefore, it becomes weaker and
weaker as it travels further and further. For
this reason there is a limit on the number
of taps a bus can support and on the
distance between those taps.
Mesh Topology
In a mesh topology, every device has a dedicated
point-to-point link to every other device. The
term dedicated means that the link carries traffic
only between the two devices it connects. A
fully connected mesh network therefore has
n(n-1)/2 physical channels to link n devices.
Every node on the network must have n-1 I/O
ports.
Tree Topology
A tree topology is a variation of a star. As in a
star, nodes in a tree are linked to a central hub
that controls the traffic to the network.
However, not all devices plug directly into the
central hub. The majority of devices connect to
the secondary hub that in turn is connected to
the central hub.
Hybrid Topology
A hybrid network combines several topologies.
internetworks
An internetwork (internet, note with the lowercase letter
i) is two or more networks that can communicate with
each other. The most notable internet is called the
Internet (uppercase letter I), which is a collaboration of
more than hundreds of thousands of interconnected
networks.In modern practice, interconnected networks
use the Internet Protocol. There are at least three
variants of internetworks, depending on who administers
and who participates in them:
• Internet
• Intranet
• Extranet
Internet
The Internet consists of a worldwide interconnection of
governmental, academic, public, and private networks based
upon the networking technologies of the Internet Protocol
Suite. It is the successor of the Advanced Research Projects
Agency Network (ARPANET) developed by the DARPA of the
U.S. Department of Defense. The Internet has revolutionized
many aspects of our daily lives. It has affected the way we do
business as well as the way we spend our leisure time
A Brief History of internet
In the mid-1960s, mainframe computers in
research
organizations
were
standalone
devices.
Computers
from
different
manufacturers were unable to communicate
with one another.
The Advanced Research Projects Agency
(ARPA) in the Department of Defense (DoD)
was interested in finding a way to connect
computers so that the researchers they
funded could share their findings, thereby
reducing costs and eliminating duplication of
effort
In 1967, at an Association for Computing
Machinery (ACM) meeting, ARPA presented its
ideas for ARPANET, a small network of connected
computers. The idea was that each host computer
(not necessarily from the same manufacturer)
would be attached to a specialized computer,
called an interface message processor (IMP).
The IMPs, in turn, would be connected to one another.
Each IMP had to be able to communicate with other
IMPs as well as with its own attached host. By 1969,
ARPANET was a reality. Four nodes, at the University of
California at Los Angeles (UCLA), the University of
California at Santa Barbara (UCSB), Stanford Research
Institute (SRI), and the University of Utah, were
connected via the IMPs to form a network. Software
called the Network Control Protocol (NCP) provided
communication between the hosts.
In 1972, Vint Cerf and Bob Kahn, both of whom were part of
the core ARPANET group, collaborated on what they called
the Internetting Projec1. Cerf and Kahn's landmark 1973
paper outlined the protocols to achieve end-to-end delivery
of packets. This paper on Transmission Control Protocol
(TCP) included concepts such as encapsulation, the
datagram, and the functions of a gateway. Shortly
thereafter, authorities made a decision to split TCP into two
protocols: Transmission Control Protocol (TCP) and
Internetworking Protocol (lP).
IP would handle datagram routing while TCP
would be responsible for higher-level functions
such as segmentation, reassembly, and error
detection. The internetworking protocol became
known as TCP/IIP.
The Internet Today
The Internet has come a long way since the 1960s. The
Internet today is not a simple hierarchical structure. It is
made up of many wide- and local-area networks joined by
connecting devices and switching stations. It is difficult to
give an accurate representation of the Internet because it is
continually changing-new networks are being added,
existing networks are adding addresses, and networks of
defunct companies are being removed.
Today most end users who want Internet
connection use the services of Internet service
providers (lSPs). There are international service
providers, national service providers, regional
service providers, and local service providers.
Intranet
An intranet is a set of networks, using the Internet Protocol
and IP-based tools such as web browsers and file transfer
applications, that is under the control of a single
administrative entity. That administrative entity closes the
intranet to all but specific, authorized users. Most commonly,
an intranet is the internal network of an organization. A large
intranet will typically have at least one web server to provide
users with organizational information.
Extranet
An extranet is a network or internetwork that is limited in scope to
a single organization or entity but which also has limited
connections to the networks of one or more other usually, trusted
organizations or entities (e.g., a company's customers may be
given access to some part of its intranet creating an extranet.
Technically, an extranet may also be categorized as a CAN, MAN,
WAN, or other type of network, although, by definition, an
extranet cannot consist of a single LAN; it must have at least one
connection with an external network.
Applications of Networks
•
•
•
•
•
•
•
Marketing and sales
Financial services
Manufacturing
Electronic messaging
Teleconferencing
Cellular telephone
Education
Networking Devices
Computer networks require devices to provide
connectivity and functionality. Understanding
how these networking devices operate and
identifying the functions they perform are
essential skills for any network administrator.
The following are the commonly used
networking devices.
Hubs
Hubs are used in networks that use twisted-pair
cabling to connect devices. Hubs can also be joined
together to create larger networks. Hubs are simple
devices that direct data packets to all devices
connected to the hub, regardless of whether the data
package is destined for the device. This makes them
inefficient devices and can create a performance
bottleneck on busy networks. In its most basic form, a
hub does nothing except provide a pathway for the
electrical signals to travel along.
Switches
Like hubs, switches are the connectivity points of an Ethernet
network. Devices connect to switches via twisted-pair cabling, one
cable for each device. The difference between hubs and switches
is in how the devices deal with the data that they receive.
Whereas a hub forwards the data it receives to all of the ports on
the device, a switch forwards it only to the port that connects to
the destination device. It does this by learning the (Media Access
Control) MAC address of the devices attached to it, and then by
matching the destination MAC address in the data it receives.
Routers
In a common configuration, routers are used to create larger
networks by joining two network segments. A router derives its
name from the fact that it can route data it receives from one
network onto another. When a router receives a packet of data, it
reads the header of the packet to determine the destination
address. Once it has determined the address, it looks in its routing
table to determine whether it knows how to reach the destination
and, if it does, it forwards the packet to the next hop on the route.
The next hop might be the final destination, or it might be another
router.
Network Cards
Network cards, also called Network Interface Cards, are devices
that enable computers to connect to the network. When specifying
or installing a NIC, you must consider the following issues:
➤ System bus compatibility—If the network interface you are
installing is an internal device, bus compatibility must be verified.
The most common bus system in use is the Peripheral Component
Interconnect (PCI) bus, but some older systems might still use
Industry Standard Architecture (ISA) expansion cards.
➤ Media compatibility—The assumption is that most networks
use twisted-pair cabling, so if you need a card for coaxial or
fiber-optic connections, you must specify this. Wireless network
cards are also available. To install or configure a network interface,
you will need drivers of the device, and might need to configure it,
although many devices are now plug and play
Wireless Access Points
Wireless access points (APs) are a transmitter and
receiver (transceiver) devices used to create a wireless
LAN (WLAN). APs are typically a separate network
device with a built-in antenna, transmitter, and
adapter. APs use the wireless infrastructure network
mode to provide a connection point between WLANs
and a wired Ethernet LAN. APs also typically have
several ports allowing a way to expand the network to
support additional clients.
Depending on the size of the network, one or more APs might be
required. Additional APs are used to allow access to more wireless
clients and to expand the range of the wireless network. Each AP is
limited by a transmissions range i.e the distance a client can be
from a AP and still get a useable signal. The actual distance
depends on the wireless standard being used and the obstructions
and environmental conditions between the client and the AP.A
WAP can operate as a bridge connecting a standard wired network
to wireless devices or as a router passing data transmissions from
one access point to another.
Modems
A modem, short for modulator/demodulator, is a device
that converts the digital signals generated by a computer
into analog signals that can travel over conventional phone
lines. The modem at the receiving end converts the signal
back into a format the computer can understand. Modems
can be used as a means to connect to an Internet Service
Providers or as a mechanism for dialing up to a LAN.
Modems can be internal add-in expansion cards, external
devices that connect to the serial or USB port of a system
Protocols
In computer networks, communication occurs
between devices in different systems. For
communication to occur, the two must agree
on a protocol. A protocol is a set of rules that
govern data communications. A protocol
defines what is communicated, how it is
communicated, and when it is communicated.
The key elements of a protocol are syntax,
semantics, and timing.
Syntax
Syntax refers to the structure or format of the
data, meaning the order in which they are
presented. For example, a simple protocol might
expect the first 8 bits of data to be the address of
the sender, the second 8 bits to be the address of
the receiver, and the rest of the stream to be the
message itself.
Semantics
Semantics refers to the meaning of each
section of bits.How is a particular pattern to
be interpreted, and what action is to be taken
based on that interpretation? For example,
does an address identify the route to be taken
or the final destination of the message?
Timing
Timing refers to two characteristics: when data
should be sent and how fast it can be sent. For
example, if a sender produces data at 100 Mbps
but the receiver can process data the at only 1
Mbps, the transmission will overload the receiver
and some data will be lost.
Standards
Standards are agreed upon rules and are essential in
guaranteeing national and international interoperability of
data and telecommunications technology and processes.
Standards provide guidelines to manufacturers, vendors,
government agencies, and other service providers to ensure
the kind of interconnectivity in international com
munications. Data communication standards fall into two
categories: de facto (meaning "by fact" or "by convention")
and de jure (meaning "by law" or "by regulation").
• De facto standards: are standards that have not
been approved by an organized body but have been
adopted as standards through widespread use are
de facto standards. De facto standards are often
established originally by manufacturers who seek to
define the functionality of a new product or
technology.
• De jure standards. are standards that have been
legislated by an officially recognized body.
THE OSI MODEL
Established in 1947, the International Standards Organization (ISO) is a
multinational
body
dedicated
to
worldwide
agreement
on
international standards. An ISO standard that covers all aspects of
network communications is the Open Systems Interconnection (OSI)
model. It was first introduced in the late 1970s.
⚫ Note:
◦ ISO is the organization.
◦ OSI is the model.
Layers of the OSI Model and their
functions
Download