Unit I

Download as pdf or txt
Download as pdf or txt
You are on page 1of 13

UNIT I - COMPUTER NETWORK: INTRODUCTION

Uses of Computer Networks:– Network Hardware –Network software – OSI and TCP/IP
Reference models – Example Networks :Internet.

DEFINITION

The term ''computer network'' means a collection of autonomous computers interconnected


by a single technology. Two computers are said to be interconnected if they are able to
exchange information. The connection can be via a copper wire; fiber optics, microwaves,
infrared, and communication satellites can also be used.

USES OF COMPUTER NETWORKS:

Computer Networks are used in almost all the area. Some of the common fields are:
1. Business Applications
2. Home Applications
3. Mobile Users and it also has some social issues. They are discussed one by one as
follows.

Business Applications
Many companies have a substantial number of computers. For example, a company may have
separate computers to monitor production, keep track of inventories, and do the payroll
The main use of computer networks in business area is Resource sharing. Resource can be a
printer, scanner, files, documents etc.,

Figure: A network with two clients and one server.

This whole arrangement is called the client-server model. It is widely used and forms the
basis of much network usage. It is applicable when the client and server are both in the same
building

Figure: The client-server model involves requests and replies.


A computer network can provide a powerful communication medium among employees. A
third goal for increasingly many companies is doing business electronically with other
companies (E-Commerce)
Home Applications
Some of the more popular uses of the Internet for home users are as follows:
1. Access to remote information.
2. Person-to-person communication.
3. Interactive entertainment.
4. Electronic commerce.
Access to remote information comes in many forms. Information available includes the arts,
business, cooking, government, health, history, hobbies, recreation, science, sports, travel,
and many others.
Home shopping is already popular and enables users to inspect the on-line catalogs of
thousands of companies. Many people already pay their bills, manage their bank accounts,
and handle their investments electronically.
Mobile Users
Mobile computers, such as notebook computers and personal digital assistants (PDAs), are
one of the fastest-growing segments of the computer industry.
Wireless networks are also important to the military. Although wireless networking and
mobile computing are often related, they are not identical.

Figure: Combinations of wireless networks and mobile computing.

Social Issues
Networking has introduced new social, ethical, and political problems. A popular feature of
many networks is newsgroups or bulletin boards whereby people can exchange messages
with like-minded individuals.
As long as the subjects are restricted to technical topics or hobbies like gardening, not too
many problems will arise.
The trouble comes when newsgroups are set up on topics that people actually care about, like
politics, religion, etc., Views posted to such groups may be deeply offensive to some people.
A lot of these problems could be solved if the computer industry took computer security
seriously. If all messages were encrypted and authenticated, it would be harder to commit
mischief. This technology is well established.

@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@

NETWORK HARDWARE
It includes two concepts transmission technology and scale. There are two types of
transmission technology. They are as follows:
1. Broadcast links.
2. Point-to-point links.
Broadcast networks have a single communication channel that is shared by all the machines
on the network. Short messages( packets) sent by any machine are received by all the others.
Transmitting a packet to subset of machines(subgroup) is called as Multicasting.
In contrast, point-to-point networks consist of many connections between individual pairs of
machines. A point-to-point link with one sender and one receiver is known as Unicasting.
Based on scalability the network can be divided as follows:
Figure: Classification of interconnected processors by scale.

Local Area Networks

Local area networks, generally called LANs, are privately-owned networks within a single
building or campus of up to a few kilometers in size. LANs are distinguished from other
kinds of networks by three characteristics: (1) their size, (2) their transmission technology,
and (3) their topology.LANs are restricted in size.
Traditional LANs run at speeds of 10 Mbps to 100 Mbps, have low delay (microseconds or
nanoseconds), and make very few errors. Newer LANs operate at up to 10 Gbps.Various
topologies are possible for broadcast LANs.
Figure :Two broadcast networks. (a) Bus. (b) Ring.

First type of topology is bus all the computers are connected by a common bus.A second type
of broadcast system is the ring. In a ring, each bit propagates around on its own, not waiting
for the rest of the packet to which it belongs.

Metropolitan Area Networks


A metropolitan area network, or MAN, covers a city. The best-known example of a MAN is
the cable television network available in many cities. In these early systems, a large antenna
was placed on top of a nearby hill and signal was then piped to the subscribers' houses.

Figure :A metropolitan area network based on cable TV.


Cable television is not the only MAN. Recent developments in high-speed wireless Internet
access resulted in another MAN, which has been standardized as IEEE 802.16.

Wide Area Networks


A wide area network, or WAN, spans a large geographical area, often a country or continent.
The hosts are connected by a communication subnet.
In most wide area networks, the subnet consists of two distinct components: transmission
lines and switching elements.
Transmission lines move bits between machines. They can be made of copper wire, optical
fiber, or even radio links.
Switching elements are specialized computers that connect three or more transmission lines.

Figure) Relation between hosts on LANs and the subnet.

Packets are transmitted individually over the network and deposited at the receiving host,
where they are reassembled into the original message and delivered to the receiving process.

Figure : A stream of packets from sender to receiver.

Internetworks
Many networks exist in the world, often with different hardware and software. People
connected to one network often want to communicate with people attached to a different one.
The fulfillment of this desire requires that different, and frequently incompatible networks, be
connected, sometimes by means of machines called gateways to make the connection and
provide the necessary translation, both in terms of hardware and software.
A collection of interconnected networks is called an internetwork or internet. A common
form of internet is a collection of LANs connected by a WAN.An internetwork is formed
when distinct networks are interconnected. In our view, connecting a LAN and a WAN or
connecting two LANs forms an internetwork.

@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@

NETWORK SOFTWARE

Protocol Hierarchies
Network Architecture is the combination of layer and protocols. To reduce their design
complexity, most networks are organized as a stack of layers or levels. Each layer is a kind of
virtual machine, offering certain services to the layer above it. Layer n on one machine
carries on a conversation with layer n on another machine.
Basically, a protocol is an agreement between the communicating parties on how
communication is to proceed. A protocol is a set of rules for communication.Figure)Layers,

protocols, and interfaces.


Between each pair of adjacent layers is an interface. The interface defines which primitive
operations and services the lower layer makes available to the upper one. List of all protocols
used in networks is called as protocol stack.

Design Issues for the Layers


Some of the key design issues that occur in computer networks are present in several layers.
Below, we will briefly mention some of the more important ones.
 Addressing
 Data Transferring Direction
 Flow Control
 Error Control
 Framing
 Routing
Every layer needs a mechanism for identifying senders and receivers. Some form of
addressing is needed in order to specify a specific destination.
Another set of design decisions concerns the rules for data transfer. In some systems, data
only travel in one direction; in others, data can go both ways .Data direction can be (Simple,
Half Duplex and Full Duplex).
Error control is an important issue because physical communication circuits are not perfect.
Transmission errors must be detected and corrected.
Flow control is how to keep a fast sender from swamping a slow receiver with data.
Another design issue is mechanisms for disassembling, transmitting, and then reassembling
messages.
Routing is the technique of determining on which path the packets should go from source to
destination system.

Connection-Oriented and Connectionless Services


Layers can offer two different types of service to the layers above them: connection-oriented
and connectionless.
Connection-oriented service is modeled after the telephone system. To use a connection-
oriented network service, the service user first establishes a connection, uses the connection,
and then releases the connection. It is reliable service.
In contrast, connectionless service is modeled after the postal system. Each message (letter)
carries the full destination address, and each one is routed through the system independent of
all the others. Normally, when two messages are sent to the same destination, the first one
sent will be the first one to arrive. It is also called as Datagram service..It is unreliable
service.

Service Primitives
A service is formally specified by a set of primitives (operations) available to a user process
to access the service. These primitives tell the service to perform some action or report on an
action taken by a peer entity.

Figure)Five service primitives for implementing a simple connection-oriented service.

LISTEN - to indicate that it is prepared to accept incoming connections.


CONNECT - the client establishes a connection with the server. Server address
must be specified.
RECEIVE - the server executes this command to prepare to accept the first
request.
SEND - to transmit the message followed by RECEIVE command.
DISCONNECT - the client and releasing the connection.
The Relationship of Services to Protocols
Services and protocols are distinct concepts; A service is a set of primitives (operations) that
a layer provides to the layer above it. The service defines what operations the layer is
prepared to perform .A service relates to an interface between two layers.
A protocol, in contrast, is a set of rules governing the format and meaning of the packets, or
messages that are exchanged by the peer entities within a layer. the service and the protocol
are completely decoupled.

Figure: The relationship between a service and a protocol.

@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@

REFERENCE MODELS
In these sections we will discuss two important network architectures, the OSI reference
model and the TCP/IP reference model.

ISO OSI REFERENCE MODEL


The OSI model is based on a proposal developed by the International Standards Organization
(ISO) as a first step toward international standardization of the protocols used in the various
layers (Day and Zimmermann, 1983). It was revised in 1995 (Day, 1995). The model is
called the ISO OSI (Open Systems Interconnection) Reference Model because it deals with
connecting open systems—that is, systems that are open for communication with other
systems. Figure: The OSI reference model.
The OSI model has seven layers. The principles that were applied to arrive at the seven layers
can be briefly summarized as follows:
1. A layer should be created where a different abstraction is needed.
2. Each layer should perform a well-defined function.
3. The function of each layer should be chosen with an eye toward defining internationally
standardized protocols.
4. The layer boundaries should be chosen to minimize the information flow across the
interfaces.
5. The number of layers should be large enough that distinct functions need not be thrown
together in the same layer out of necessity and small enough that the architecture does not
become unwieldy.

The Physical Layer


The physical layer is concerned with transmitting raw bits over a communication channel.
The design issues have to do with making sure that when one side sends a 1 bit, it is received
by the other side as a 1 bit, not as a0 bit.
The design issues here largely deal with mechanical, electrical, and timing interfaces, and the
physical transmission medium, which lies below the physical layer
Deciding how many volts to represent 1 and how many volts to represent 0.

The Data Link Layer


The main task of the data link layer is to transform a raw transmission facility into the
network layer. It performs the following:
Framing - Breaking the bit stream into frames
Flow control – Regulating the flow of fast sender and slow receiver vice versa.
Error control – Error Detection and Error Correction.

The Network Layer


The network layer controls the operation of the subnet. A key design issue is determining
how packets are routed from source to destination. If too many packets are present in the
subnet at the same time, the control of such congestion also belongs to the network layer.
The Transport Layer
The basic function of the transport layer is to accept data from above, split it up into smaller
units if need be, pass these to the network layer, and ensure that the pieces all arrive correctly
at the other end..
The transport layer also determines what type of service to provide to the session
layer(connection oriented or connectionless).The transport layer is a true end-to-end layer, all
the way from the source to the destination

The Session Layer


The session layer allows users on different machines to establish sessions between them.
Sessions offer various services.
Dialog control - keeping track of whose turn it is to transmit
Token management - preventing two parties from attempting the same critical operation at
the same time
Synchronization - check pointing long transmissions to allow them to continue from where
they were after a crash.
The Presentation Layer
The presentation layer manages these abstract data structures and allows higher-level data
structures (e.g., banking records), to be defined and exchanged. It checks the syntax and
semantics of information.

The Application Layer


The application layer contains a variety of protocols that are commonly needed by users. One
widely-used application protocol is HTTP (HyperText Transfer Protocol), which is the basis
for the World Wide Web. When a browser wants a Web page, it sends the name of the page it
wants to the server using HTTP. The server then sends the page back. Other application
protocols are used for file transfer, electronic mail, and network news.

###########################################################################
TCP/IP REFERENCE MODEL
This reference model used in the grandparent of all wide area computer networks, the
ARPANET, and its successor, the worldwide Internet

The Internet Layer


All these requirements led to the choice of a packet-switching network based on a
connectionless internetwork layer. This layer, called the internet layer, is the linchpin that
holds the whole architecture together.
Its job is to permit hosts to inject packets into any network and have them travel
independently to the destination (potentially on a different network). They may even arrive in
a different order than they were sent, in which case it is the job of higher layers to rearrange
them, if in-order delivery is desired..
The internet layer defines an official packet format and protocol called IP (Internet Protocol).
The job of the internet layer is to deliver IP packets where they are supposed to go. Packet
routing is clearly the major issue here, as is avoiding congestion.

Figure : The TCP/IP reference model.

The Transport Layer


The layer above the internet layer in the TCP/IP model is now usually called the transport
layer. It is designed to allow peer entities on the source and destination hosts to carry on a
conversation, just as in the OSI transport layer.
Two end-to-end transport protocols have been defined here. The first one, TCP
(Transmission Control Protocol), is a reliable connection-oriented protocol that allows a byte
stream originating on one machine to be delivered without error on any other machine in the
internet. It fragments the incoming byte stream into discrete messages and passes each one on
to the internet layer.
At the destination, the receiving TCP process reassembles the received messages into the
output stream. TCP also handles flow control to make sure a fastsender cannot swamp a slow
receiver with more messages than it can handle.
The second protocol in this layer, UDP (User Datagram Protocol), is an unreliable,
connectionless protocol for applications that do not want TCP's sequencing or flow control
and wish to provide their own. It is also widely used for one-shot, client-server-type request-
reply queries and applications in which prompt delivery is more important than accurate
delivery, such as transmitting speech or video. The relation of IP, TCP, and UDP is

Figure : Protocols and networks in the TCP/IP model initially.

The Application Layer


The TCP/IP model does not have session or presentation layers. On top of the transport layer
is the application layer. It contains all the higher-level protocols. The early ones included
virtual terminal (TELNET), file transfer (FTP), and electronic mail (SMTP).
The virtual terminal protocol allows a user on one machine to log onto a distant machine and
work there. The file transfer protocol provides a way to move data efficiently from one
machine to another. Electronic mail was originally just a kind of file transfer, but later a
specialized protocol (SMTP) was developed for it.
Many other protocols have been added to these over the years: the Domain Name System
(DNS) for mapping host namesonto their network addresses, NNTP, the protocol for moving
USENET news articles around, and HTTP, theprotocol for fetching pages on the World Wide
Web, and many others.

The Host-to-Network Layer


The TCP/IP reference model does not really say much about what happens here, except to
point out that the host has to connect to the network using some protocol so it can send IP
packets to it. This protocol is not defined and varies from host to host and network to
network.

@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
EXAMPLE NETWORKS

THE INTERNET
The Internet is not a network at all, but a vast collection of different networks that use certain
common protocols and provide certain common services.

The ARPANET
In the late 1950s, At the height of the Cold War, the DoD wanted a command-and-control
network that could survive a nuclear war. At that time, all military communications used the
public telephone network, Here the black dots represent telephone switching offices, each of
which was connected to thousands of telephones. These switching offices were, in turn,
connected to higher-level switching offices (toll offices).

Figure (a) Structure of the telephone system. (b) Baran's proposed distributed switching
system.

Around 1960, the DoD awarded a contract to the RAND Corporation to find a solution. One
of its employees, Paul Baran, came up with the highly distributed and fault-tolerant design.
Baran proposed using digital packet-switching technology throughout the system.
In 1967, ARPA(Advanced Research Project Agency) developed a network. That was called
as ARPANET. The design of ARPANET is based on a subnet. The subnet would consist of
minicomputers called IMPs (Interface Message Processors) connected by 56-kbps
transmission lines.

Figure . The original ARPANET design.


NSFNET
By the late 1970s, NSF (the U.S. National Science Foundation) saw the enormous impact the
ARPANET was having on university research, allowing scientists across the country to share
data and collaborate on research projects.
. NSF's response was to design a successor to the ARPANET that would be open to all
university research groups. To have something concrete to start with, NSF decided to build a
backbone network to connect its six supercomputer centers. Each supercomputer was given a
little brother, consisting of an LSI-11 microcomputer called a fuzzball. The fuzzballs were
connected with 56-kbps leased lines and formed the subnet.
NSF also funded some (eventually about 20) regional networks that connected to the
backbone to allow users at thousands of universities, research labs, libraries, and museums to
access any of the supercomputers and to communicate with one another. The complete
network, including the backbone and the regional networks, was called NSFNET

Figure . The NSFNET backbone in 1988.

Internet Usage
Traditionally (meaning 1970 to about 1990), the Internet and its predecessors had four main
applications:
1. E-mail. The ability to compose, send, and receive electronic mail has been around
since the early days of the ARPANET and is enormously popular. Many people get
dozens of messages a day and consider it their primary way of interacting with the
outside world, far outdistancing the telephone and snail mail. E-mail programs are
available on virtually every kind of computer these days.
2. News. Newsgroups are specialized forums in which users with a common interest can
exchange messages. Thousands of newsgroups exist, devoted to technical and
nontechnical topics, including computers, science, recreation, and politics. Each
newsgroup has its own etiquette, style, and customs, and woe betide anyone violating
them.
3. Remote login. Using the telnet, rlogin, or ssh programs, users anywhere on the Internet
can log on to any other machine on which they have an account.
4. File transfer. Using the FTP program, users can copy files from one machine on the
Internet to another. Vast numbers of articles, databases, and other information are
available this way.
Architecture of the Internet

Figure . Overview of the Internet.

@@@@@@@@@@@@@@@@@@

You might also like