Chapter 1-2025-2 2
Chapter 1-2025-2 2
• Interconnected ISPs
▪ protocols are everywhere Skype
IP
Streaming
video
• control sending, receiving of
messages local or
regional ISP
• e.g., HTTP (Web), streaming video,
Skype, TCP, IP, WiFi, 4/5G, Ethernet home network content
provider
HTTP network datacenter
▪ Internet standards network
Ethernet
• RFC: Request for Comments
• IETF: Internet Engineering Task enterprise
TCP
Force network
WiFi
Introduction: 1-5
• Today most end users who want Internet connection use the services of What’s a protocol?
Internet service providers (lSPs).
Human protocols: Network protocols:
• ISP: international service providers, national service providers, regional ▪ “what’s the time?” ▪ computers (devices) rather than humans
▪ “I have a question” ▪ all communication activity in Internet
service providers, and local service providers. governed by protocols
▪ introductions
• NSPs are backbone networks created and maintained by specialized
Rules for:
companies Protocols define the format, order of
… specific messages sent messages sent and received among
• RISPs are smaller ISPs that are connected to one or more national ISPs. … specific actions taken network entities, and actions taken
when message received,
or other events on message transmission, receipt
Introduction: 1-12
What’s a protocol? Protocols and Standard
A human protocol and a computer network protocol:
Hi TCP connection
request
Hi TCP connection
response
Got the
time? GET http://gaia.cs.umass.edu/kurose_ross
2:00
<file>
time
• Standard categories :
Protocols and Standard De facto
• The two best known standards are: OSI & Internet model.
• Data communication is a process where data | information is transferred or shared from one device to
• Characteristics another with speed and accuracy using modern networking devices like Hub, wires, modems, etc.
• Components • The data communication system or process uses both hardware and software devices and services for
better communications and data sharing features for better performance
• Data Flow • In data communications, two or more computers or devices transfer digital or analog data using
communications channels.
• In computer networks, computers, laptops, tablets, and mobile phones are connected in a network where
data and information are shared via cables and wires.
Data Communication
The Data Communication Characteristics
Timeline – real
Delivery Accuracy time transmission Jitter
(RTT)
Protocol Protocol
Message
Sender Receiver
Medium
A protocol can be extremely simple or highly complex, depending on its function. Although the
Data communications tasks ! various protocols are often drastically different, many protocols commonly address the
following issues:
• Connection initiation:
• Addressing • Is it the client or server initiating the connection?
• Routing • What information must be exchanged prior to communication?
• Recovery • Negotiation of connection characteristics
• Message formatting • Is the communication of the protocol encrypted?
• Security • How are encryption keys transmitted between communicating hosts?
Transmission
Modes
Networks
• Terminology
• What are the Advantages of Data Communication System?
• Distributed Processing
• Network Criteria
• Physical Structure
• Categories of Network
Networks Distributed Processing
• Network is a set of devices connected by communication links for the purpose of sharing
data. • Most networks use distributed processing, in which a task is divided among multiple computers.
• A node can be a computer, printer, or any other device capable of sending and/or receiving • Instead of one single large machine being responsible for all aspects of a process, separate computers
(usually a personal computer or workstation) handle a subset
data generated by other nodes on the network.
• Networks follow protocols, which define how communications are sent and received.
• Performance can be measured in many ways, including transit time and response time.
• Transit time is the amount of time required for a message to travel from one device to another.
Reliability
• Response time is the elapsed time between an inquiry and a response.
A network must be able to meet certain
number of criteria. Because it helps to • The performance of a network depends on a number of factors, including:
• Jitter
• Evaluated by Transit, Response, Bandwidth,throughput and delay.
Sharing
resources
2) Reliability 3) Security
• Network security issues include protecting data from unauthorized access and
• Measured by:
viruses.
- Frequency of failure • Protection can be accomplished at a number of levels. At the lowest level are user
identification codes and password. At a higher level are encryption techniques.
- Recovery time from a failure
• Network is accessible from many points, it can be susceptible to computer viruses.
- Network’s robustness in a catastrophe
Five general concepts that provide the basis for this relationship:
• the way two or more communication devices attached to a
Topology
Line
Configuration link
Categories of
in same way to the same link at the same time.
Network
Point to Point Line Configuration
Line Configuration
• Provide dedicated link between two devices
Point-to-
Multipoint
Point
Multipoint Configuration
Physical Topology • Topology: refers to the way in which the end points or
stations/computer systems, attached to the networks, are
• describes the way in which the computers or nodes are
connected interconnected.
Mesh
Star
Topology
Bus
Ring
Tree
Bus Advantages:
1.It is cost effective.
2.Cable required is least compared to other network
topology.
3.Used in small networks.
• Is a multipoint connection. 4.It is easy to understand.
5.Easy to expand joining two cables together.
• One long cable acts as a backbone to link all the devices in a network.
Disadvantages:
• Nodes are connected to the bus cable by drop line and taps. 1.Cables fails then whole network fails.
2.If network traffic is heavy or nodes are more the
performance of the network decreases.
3.Cable has a limited length. Features of Bus Topology
4.It is slower than the ring topology 1.It transmits data only in one direction.
2.Every device is connected to a single cable
Ring Advantages:
1.Transmitting network is not affected by high traffic or by
adding more nodes, as only the nodes having tokens can
transmit data.
• Each device has a dedicated point-to-point connection with only the 2.Cheap to install and expand
• Fault isolation
Dual Ring Topology.
Star Advantages:
1.Fast performance with few nodes and low network
traffic.
2.Hub can be upgraded easily.
• Dedicated point-to-point link only to the central controller 3.Easy to troubleshoot.
4.Easy to setup and modify.
5.Only that node is affected which has failed, rest of
• Cables run from every computer to a centrally located device called a HUB the nodes can work smoothly.
• Expensive. • There are two techniques to transmit data over the Mesh topology, they are :
1. Routing
• Control the traffic 2. Flooding
• Types of Mesh Topology
1. Partial Mesh Topology : In this topology some of the systems are connected in the same fashion as mesh topology
but some devices are only connected to two or three devices.
2. Full Mesh Topology : Each and every nodes or devices are connected to each other.
Disadvantages:
topology with each branch connecting several stations in a bus
1.Installation and configuration is difficult.
2.Cabling cost is more. topology.
3.Bulk wiring is required.
4.Increased Power Consumption
• fully connected Mesh has [n(n-1)/2] Advantages of Hybrid Topology
physical channels to link n device in a
Features of Mesh Topology duplex –mode and we remove the 2 in the 1.Reliable as Error detecting and trouble shooting is easy.
1.Fully connected. simplex 2.Effective.
2.Robust. • I/O Ports = (n-1) 3.Scalable as size can be increased easily.
3.Not flexible. 4.Flexible.
Disadvantages of Hybrid Topology
1.Complex in design.
2.Costly.
• LAN lets people at one site exchange data and share the use of hardware and
software.
• LANs offer companies a more cost-effective way to link computers than linking
terminals to a mainframe computer.
• The most common uses of LANs at small businesses, for example, are office
automation, accounting, and information management.
• LANs can be set up with wired or wireless connections.
Categories of Networks Categories of Networks
• PAN
• LAN
Based on Size and Coverage • WAN
• CAN
• MAN
• SAN
Based on Scale and Purpose
• CDN
• Extranet
• Intranet
Specialized Networks
• VPN
Type
Uses
Example
Advantages vs disadvantages
Characteristics
Complex or simple
Limit transmission Two types : wired,
Cable TV network
medium & topology wireless
• A wide area network (WAN) provides long-distance transmission of
• LANs are designed to allow resources to be shared between personal
data, image, audio, and video information over large geographic areas
computers.
that may comprise a country
• LANs are distinguished from other type of networks by three
characteristics: size, transmission media and topology. • A complex WAN connects the end system and called switched WAN,
• To connect LANs connecting devices are used, such as repeaters, hubs, • A simple WAN connects home or small LAN to an Internet service
bridges and switches. (Ch. ,16) provider (ISP) and called point-to-point WAN, which is a line leased