Unit 1 - Chapter1 Introduction Part 1
Unit 1 - Chapter1 Introduction Part 1
UNIT-1
Introduction
Chapter 1
Mrutyunjaya S Emmi
Asst. Professor,
Dept. of MCA,
GIT, Belagavi
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
What is Computer Network?
‘Computer Network’’ to mean a collection of
autonomous computers interconnected by a
single technology. Two computers are said to
be interconnected if they are able to exchange
information. The connection need not be via a
copper wire; fiber optics, microwaves,
infrared, and communication satellites can
also be used.
Need of Computer Network
The networks needed for the following reasons:
• Hardware Sharing
• Data and Information Sharing
• Software Sharing
• Facilitated Communication
Components of Networks
There are 5 basic components of networks.
1. Servers
2. Clients
3. Modems
4. Routers
5. Channels
Uses of Computer Networks
• Business Applications
• Home Applications
• Mobile Users
• Social Issues
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Business Applications Examples
• Resource Sharing
• Common Printer
• Backup Systems,
• VPN (Virtual Private Networks)
• Ending the limitation of geographic
disperse working environments.
• Client - Server
Business Applications (1)
A network with two clients and one server
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Business Application
• Client-Server Model
• Data Sharing
• Web Application
• Personal Information Sharing
• Email
• VoIP
• Video
• Tele-Conferencing
• Desktop Sharing
• Telemedicine
• e-commerce
• Shopping from home
Business Applications (2)
The client-server model involves requests
and replies
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Home Applications
• Ken Olsen, 1977 President,
• Digital Equipment Corporation (DEC), Second
Largest Computer Company (after IBM) said
• “There is no reason for any individual to have a
computer in his home”
• Single Biggest Reason for purchasing a home
computer is Internet.
• Surfing the web is done for variety of reasons:
• Arts, Business, Cooking, Government, Health, History,
Hobbies, Recreation, Science, Sports, Travel, …
• Newspaper, online Digital Libraries,
• Client-Server Access vs Peer-to-Peer
Communication.
Home Applications (1)
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Home Applications
• Entertainment:
• MP3 and DVD-quality movies
• TV shows – IPTV (IP TeleVision)
• Interactive Live TV
• Game Playing
• Multiperson real-time simulation games.
• Ubiquitous Computing
• Smart Home Monitoring
• RFID (Radio Frequency Identification)
• Replacing Bar Codes with a smart devices that
may turn the real world in to the Internet of things.
Mobile Users
• Mobile computers (handheld and laptops)
• Fastest growing segments in computer history.
• Individuals are able to use their mobile devices to:
• Read and send email,
• Tweet,
• Watch Movies,
• Download Music,
• Play Games,
• Serf the Web
• Internet connectivity allows for those applications to
be easily built
• Wireless Networks (Cars, Boats, and Airplanes can not have
wired Connections)
• Cellular Networks
• Wireless hotspots (802.11 Standard).
• Wireless Networking, Mobile Wireless Networks
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Mobile Users
Combinations of wireless networks and
mobile computing
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Mobile Users
• Smart Phones – Integration of Internet with Telephony
• Driving the wireless-mobile applications
• 3G & 4G cellular networks provides fast data services
• GPS is a standard feature
• m-commerce (mobile commerce)
• NFC (Near Field Communication) smart phones act as an RFID
smartcard and interact with nearby reader for payment.
• Sensor Networks
• Nodes that Sense/gather data about state of the physical world.
• It is revolutionizing science
• Wearable Computers
• Implantable Devices
• Pacemakers, Insulin pumps, …
• Controllable wirelessly
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Social Issues
• Network neutrality
• Digital Millennium Copyright Act
• Profiling users
• Phishing
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Network Neutrality
• Communications are not to be
differentiated by their
• content, or
• source, or
• who is providing the content
Digital Millennium Copyright Act.
• Warning messages to the operators and
the users who are suspect of infringing
copyrights.
Profiling Users
• Computer Networks make it very easy to
communicate.
• They also make it easy for the people who run the
network to snoop on the traffic.
• Sets up a conflict over issues such as employee
rights vs. employer rights.
• Government vs. Citizens rights.
• Companies collect data to Profile users.
Phishing
• e-mail messages that masquerade as originating from
a trustworthy party.
• This is illegal activity.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Network Hardware
Two dimensions of computer networks:
• Transmission Technology
• Scale
• Transmission Technology
• Point-to-point links
• Broadcast links
Network Hardware
• Two types of transmission technologies:
• Point-to-point
• Connect individual pairs of machines
• Packets (short messages) may have to visit one or more
intermediates machines.
• Multiple routes of different lengths are possible.
• Finding good ones is important.
• Unicasting – transmission with exactly one sender and exactly
one receiver.
• Broadcast
• Communication channel shared by all machines
• Packets send by any machine are received by all the others.
• An address field within each packed specifies the intended recipient.
• If packed is intended for some other machine, it is just ignored
• If packed is indented for the recipient machine then it is processed.
• Wireless network is a common example of a broadcast link
• Communication is shared over a coverage region that depends on the wireless channel
and the transmitting machine.
• Broadcast systems usually also allow the possibility of addressing a
packet to all destinations.
Network Hardware
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Personal Area Network
Bluetooth PAN (Personal Area Network)
configuration
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Local Area Networks
Wireless and wired LANs.
(a) IEEE 802.11 or WiFi.
(b) Switched Ethernet (IEEE 802.3).
• Switched Ethernet
• Switch; Hardware that connects two devices point-to-point
• A Switch has multiple ports
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Local Area Networks (LAN)
• Virtual LAN or VLAN
/ Switch
• Protocol hierarchies
• Design issues for the layers
• Connection-oriented versus connectionless
service
• Service primitives
• Relationship of services to protocols
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Protocol Hierarchies (1)
• Datagram:
• Unreliable (not acknowledged) connectionless service.
• It is analogous to telegram service
Example of Applications
• Acknowledged Datagram:
• The convenience of not having to establish a connection, but
• Reliability essential
• Similar to “Return Receipt” for the letter.
• Example: Text Messaging on mobile phones
• Request-Reply Service:
• Sender transmits a single datagram containing a request;
• The reply contains the answer.
• Example: Mobile phone sending the query to a “map server”
to retrieve the map data.
Connection-Oriented Versus
Connectionless Service
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
The OSI Reference Model
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
The OSI Reference Model
• Physical layer
• Data link layer
• Network layer
• Transport layer
• Session layer
• Presentation layer
• Application layer
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Physical Layer
• Is concerned with transmitting raw bits over a communication
channel.
• Design Issues:
• Ensuring that when one side sends a 1 – bit of information it is
received as 1-bit (not as 0-bit or 2-or more- bits).
• What type of signal should be used to represent “1” and “0”?
• How many nano seconds a bit lasts?
• Whether transmission can occur simultaneously in both direction?
• How initial connection is being established?
• How it is torn down when both sides are finished?
• How many pins the network connector has?
• What each pin is used for? Etc.
• Link layer
• Internet layer
• Transport layer
• Application layer
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
The TCP/IP Reference Model (1)
SCTP
ARP
RARP IGMP
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Service
• Each layer provides a service to the layer above it.
• The service definition tells what the layer does, not
how entities above it access it or how the layer works.
• It defines the layer’s semantics.
Interface
• A layer’s interface tells the processes above it how to
access it.
• It specifies what the parameters are and what results
to expect.
• This layer also says nothing about how the layer
works inside.
Protocol
• A layer’s protocol its is own business: it can use any
protocols it wants to as long as it gets the job done
(i.e. provides the offered services).
• A layer is allowed to change the protocol with the
condition that it will not affect the software in higher
layers.
Object Oriented Programming
• Those ideas fit very nicely with modern ideas about object-
oriented programming.
• An object has:
• A set of methods (operations) that processes outside the object can
invoke.
• A set of data (method’s parameters) that defines the object.
• The code internal to the object is its protocol and is not visible or of
any of concern outside the object.
• The object provides the set of services through object’s interface.
The Properties
• TCP/IP model did not originally distinguish between:
• Services
• Interfaces, and
• Protocols
• The model was retrofitted after the fact to make it more OSI-like.
• However, OSI model has a better hidden then in the TCP/IP
model and can be replaced relatively easily as the technology
changes.
The Properties
• The OSI reference model was devised before the corresponding
protocols were invented.
• This ordering meant that the model was not biased toward one
particular set of protocols: a fact that made it quite general.
• The downside of this ordering was that the designers did not have
much experience with the subject and did not have a good idea of
which functionality to put in which layer.
• With TCP/IP the reverse was true: The protocols came first, and
the model was really just a description of the existing protocols.
• There was no problem with protocols fitting the model.
• The trouble was that the model did not fit any other protocol stacks:
It was not especially useful for describing other non-TCP/IP
networks.
Critique of the OSI Model and Protocols
• Bad timing.
• Bad technology.
• Bad implementations.
• Bad politics.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
OSI Model Bad Timing
• Internet
• ARPANET
• NSFNET
• Third-generation mobile phone networks
• Wireless LANs: 802.11
• RFID and sensor networks
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Internet
• Is a vast collection different networks
that use certain common protocols and
provide certain common services.
The ARPANET
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Wireless LANs: 802.11 (2)
Multipath fading
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Wireless LANs: 802.11 (3)
The range of a single radio may not cover
the entire system.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
RFID and Sensor Networks (1)
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Who’s Who in International Standards (1)
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011