0% found this document useful (0 votes)
16 views26 pages

CN 1

Uploaded by

diyagopal22
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views26 pages

CN 1

Uploaded by

diyagopal22
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 26

Computer Networks

Uses of computer Networks


• Business Applications
• The aim of networking is to make all programs, equipment’s, and data available
to anyone on the network
• Each computer has worked in isolation from the others, but at some point they
are connected to extract and correlate information about the entire company.
• Networks called VPNs (Virtual Private Networks) may be used to join the
individual networks at different sites into one extended network.
• Client server
• Telephone calls between employees may be carried by the computer is called IP
telephony or Voice over IP (VoIP) when Internet technology is used
• Desktop Sharing is remote workers see and interact with a graphical computer
screen.
• Home Applications
• The main usage of networks in home is internet. Internet access provides
home users with connectivity to remote computers.
• Access to remote information Ex: www
• Person-to-person communication Ex: chating
• • Instant Message Ex: Twitter

• • Social Networking Ex: Face Book, Whatsup

• • Wikipedia
• Interactive entertainment Ex: IPTV
• Electronic commerce Ex: shopping
• Mobile Users
• Mobile computers, such as notebook computers and personal digital assistants
(PDAs) are connected to the office or home even when away from home.
• People on the road use their portable electronic equipment to send and receive
telephone calls, faxes, and electronic mail, surf the Web, access remote files,
and log on to remote machines.
• People do this from anywhere on land, sea, or air.
• Wireless hotspots
• SMS
• M-Commerce
• GPS –”geo-tagging.’’
• Wearable computers-smart watches, pacemakers and insulin pumps.
Social Issuses

• Cookies
• Gmail
Network Hardware
• Local Area Networks

• Local area networks, called LANs, are privately-owned networks within a


single building or campus of up to a few kilometers in size.
• They are widely used to connect personal computers and workstations in
company offices and factories
• LANs are distinguished by three characteristics: (1) size, (2) transmission
technology (3) topology.
• LANs are restricted in size. LANs use a transmission technology consisting
of a cable to which all the machines are attached. Various topologies are
used for broadcast LANs.
• In a bus network, at any instant at most one machine is the master and is
allowed to transmit. All other machines are required to refrain from sending.
• Eg: IEEE 802.3(Ethernet).
• In the ring system each bit propagates around on its own, not waiting for the
rest of the packet to which it belongs.
• Eg: IEEE 802.5 (the IBM token ring).
• Metropolitan Area Networks
• A metropolitan area network, or MAN, covers a city like cable television network
available in many cities.
• Wide Area Networks
• A wide area network, or WAN, covers large geographical area, often a
country or continent.
• The hosts are connected by a communication subnet.
• The job of the subnet is to carry messages from host to host.
• In most wide area networks, the subnet consists of two distinct
components: transmission lines and switching elements.
• Transmission lines move bits between machines.
• Switching elements are specialized computers that connect three or more
transmission lines.
• When a packet is sent from one router to another via one or more
intermediate routers, the packet is received at each intermediate router in
its entirety, stored there until the required output line is free, and then
forwarded. This is called store-and-forward or packet-switched subnet.

• If the packets are small and all the same size, they are called cells.
• Wireless Networks

• System interconnection- It is interconnecting the components of a


computer using short-range radio.

• Some short-range wireless networks called Bluetooth are used to connect


these components without wires.

• Wireless LANs are systems in which every computer has a radio modem and
antenna with which it can communicate with other systems.

• Wireless WANs.
• Computers (desktop PC). Home Networks
• Entertainment (TV, DVD).
• Telecommunications (telephone, mobile telephone).
• Appliances (microwave, refrigerator).
• Telemetry (utility meter, smoke/burglar alarm).

• Properties of Home networks:


• o The network and devices have to be easy to install.
• o The network and devices have to be fool proof in operation.
• o Low price is essential for success.
• o Security and reliability is very important.
Network software

• Protocol Hierarchies
• Networks are organized as a stack of layers or levels, each one built upon
the other.

• The number of layers, the name of each layer, the contents of each layer,
and the function of each layer differ from network to network.

• The purpose of each layer is to offer certain services to the higher layers.
• The entities comprising the corresponding layers on different machines are called
peers.
• No data are directly transferred from layer n on one machine to layer n on another
machine.
• Below layer 1 is the physical medium through which actual communication occurs.
• A set of layers and protocols is called a network architecture.
• A list of protocols used by a certain system, one protocol per layer, is called a
protocol stack.
Connection-Oriented and Connectionless Services

• Connection-oriented service first establishes a connection, uses the


connection, and then releases the connection. eg. Telephone system.

• In Connectionless service each message carries the full destination address,


and each one is routed through the system.

• Unreliable connectionless service is called datagram service


Service Primitives
• The server executes LISTEN to indicate that it is prepared to accept incoming
connections. server process is blocked until a request for connection appears.

• The client process executes CONNECT to establish a connection with the server.
The CONNECT call needs to specify who to connect to.

• When the system sees that the packet is requesting a connection, it checks to see
if there is a listener.
• it does two things: unblocks the listener and sends back an acknowledgement. The arrival of
this acknowledgement then releases the client.

• The server executes RECEIVE to prepare to accept the first request. Then the
client executes SEND to transmit its request followed by the execution of RECEIVE
to get the reply.

• The client use DISCONNECT to terminate the connection. When the server gets
the packet, it also issues a DISCONNECT of its own, acknowledging the client and
releasing the connection.

You might also like