72
Computer Network 150702 Hemang Kothari Assistant Professor Computer Engineering Department MEFGI, Rajkot. Email: [email protected] .in Computer Engineering Department - MEFGI 1

Lecture 1 Introduction to computer network -2013

Embed Size (px)

DESCRIPTION

OSI, TCP-IP, ATM, Usage of computer Network

Citation preview

Page 1: Lecture 1   Introduction to computer network -2013

Computer Engineering Department - MEFGI

1

Computer Network150702

Hemang KothariAssistant Professor

Computer Engineering Department MEFGI, Rajkot.

Email: [email protected]

Page 2: Lecture 1   Introduction to computer network -2013

Computer Engineering Department - MEFGI

2

Teaching Scheme

• 150702 - Computer Network

• Theory - 4

• Practical - 2

• Credit - 6

• Final Exam - 70

• Term work -30

• Internal Practical - 50

• Total – 150 Marks

Reference Books:

1. Computer network, Andrew S. Tanenbaum, Pearson.

2. Introduction to Data Communication and Networking, Behrouz Forouzan, TMH.

3. Computer Network, Natalia Olifer, Victor Olifer, Wiley-India edition.

4. Data and computer communication, William Stallings, Pearson.

Page 3: Lecture 1   Introduction to computer network -2013

Computer Engineering Department - MEFGI

3

Expectation

• Smiling Face

• Attendance

• Interactive Session

• Enjoy the joy of learning

• Be an observer

Page 4: Lecture 1   Introduction to computer network -2013

Computer Engineering Department - MEFGI

4

Methodology

• Why Need to learn

• What Definition, Meaning, is all about

• How Performance, Implementation, Simulation, Development

Do Not Worry, We have only 6 Assignment

Page 5: Lecture 1   Introduction to computer network -2013

Computer Engineering Department - MEFGI

5

Computer Network

• Life without friends is boring.

• Photos without Facebook tagging is colorless.

• We love to follow Dipika Padukone & Ranbeer Kapoor love stories.

• Beating a friends on LAN Gaming is the just awesome.

Page 6: Lecture 1   Introduction to computer network -2013

Computer Engineering Department - MEFGI

6

Networking ( You Can’t Live Without It)

Facebook TwitterGoogle

Yahoo !!!WhatsApp

YouTubeeBay MakeMyTrip

Page 7: Lecture 1   Introduction to computer network -2013

Computer Engineering Department - MEFGI

7

You Require …

Page 8: Lecture 1   Introduction to computer network -2013

Computer Engineering Department - MEFGI

8

Module 1: Introduction to Network•Uses of computer network.•Network hardware, Network software•OSI model, TCP/IP model, Comparison of OSI and

TCP/IP model, • Example network: The internet, X.25, Frame Relay,

ATM, Ethernet, Wireless LANs: 802.11.

Page 9: Lecture 1   Introduction to computer network -2013

Computer Engineering Department - MEFGI

9

Use of Computer Network

•Business Applications•Home Applications•Mobile Users• Social Issues

Page 10: Lecture 1   Introduction to computer network -2013

Business Applications of Networks

• A network with two clients and one server.

Page 11: Lecture 1   Introduction to computer network -2013

Business Applications of Networks (2)• The client-server model involves requests and replies.

Page 12: Lecture 1   Introduction to computer network -2013

Home Network Applications

• Access to remote information• Person-to-person communication• Interactive entertainment• Electronic commerce

Page 13: Lecture 1   Introduction to computer network -2013

Home Network Applications (2)

• In peer-to-peer system there are no fixed clients and servers.

Page 14: Lecture 1   Introduction to computer network -2013

Home Network Applications (3)

• Some forms of e-commerce.

Page 15: Lecture 1   Introduction to computer network -2013

Mobile Network Users

• Combinations of wireless networks and mobile computing.

Page 16: Lecture 1   Introduction to computer network -2013

Network Hardware• Local Area Networks• Metropolitan Area Networks• Wide Area Networks• Wireless Networks• Home Networks• Internetworks

Page 17: Lecture 1   Introduction to computer network -2013

Types of transmission technology

• Broadcast links (Speaking loudly in a class)• Point-to-point links (Gap-sap with friend)

Page 18: Lecture 1   Introduction to computer network -2013

Classification By Scale

Page 19: Lecture 1   Introduction to computer network -2013

Local Area Networks

(a) Bus (b) Ring

Page 20: Lecture 1   Introduction to computer network -2013

Metropolitan Area Networks - Cable TV

Page 21: Lecture 1   Introduction to computer network -2013

Wide Area Networks

• Relation between hosts on LANs and the subnet.

Page 22: Lecture 1   Introduction to computer network -2013

Wide Area Networks (2)

• A stream of packets from sender to receiver.

Page 23: Lecture 1   Introduction to computer network -2013

Wireless Networks

Categories of wireless networks:• System interconnection• Wireless LANs

Page 24: Lecture 1   Introduction to computer network -2013

Wireless Networks (2)

(a) Bluetooth configuration (b) Wireless LAN

Page 25: Lecture 1   Introduction to computer network -2013

Computer Engineering Department - MEFGI

25

Task we need to perform (Design Issue)• Addressing• Error Control• Flow Control• Multiplexing• Routing

Solution : Divide the work and solve the issue

Page 26: Lecture 1   Introduction to computer network -2013

Computer Engineering Department - MEFGI

26

Motivation behind layer model

• To reduce the design complexity, most of the networks are organized as a series of layers or levels, each one build upon one below it. • The basic idea of a layered architecture is to divide the design into

small pieces. • Each layer adds to the services provided by the lower layers in such a

manner that the highest layer is provided a full set of services to manage communications and run the applications. • The benefits of the layered models are modularity and clear

interfaces, i.e. open architecture and comparability between the different providers' components.

Page 27: Lecture 1   Introduction to computer network -2013

Computer Engineering Department - MEFGI

27

Element of layered model

• A service is a set of actions that a layer offers to another (higher) layer. • Protocol is a set of rules that a layer uses to exchange information

with a peer entity. These rules concern both the contents and the order of the messages used. • Between the layers service Interfaces are defined. The messages

from one layer to another are sent through those interfaces.

Page 28: Lecture 1   Introduction to computer network -2013

Computer Engineering Department - MEFGI

28

Page 29: Lecture 1   Introduction to computer network -2013

Computer Engineering Department - MEFGI

29

Page 30: Lecture 1   Introduction to computer network -2013

Computer Engineering Department - MEFGI

30

Summary: Why Layered architecture?1. To make the design process easy by breaking unmanageable tasks

into several smaller and manageable tasks (by divide-and-conquer approach).

2. Modularity and clear interfaces, so as to provide comparability between the different providers' components.

3. Ensure independence of layers, so that implementation of each layer can be changed or modified without affecting other layers.

4. Each layer can be analyzed and tested independently of all other layers.

Page 31: Lecture 1   Introduction to computer network -2013

Computer Engineering Department - MEFGI

31

Open System Interconnection Reference Model• The Open System Interconnection (OSI) reference model describes

how information from a software application in one computer moves through a network medium to a software application in another computer.

1. Application2. Presentation3. Session

4. Transport5. Network6. Data link7. Physical

Page 32: Lecture 1   Introduction to computer network -2013

Computer Engineering Department - MEFGI 32

Application Application

Presentation Presentation

Session Session

TransportTransport

Network Network

Data linkData link

Physical Physical

protocol

protocol

protocol

protocol

protocol

protocol

protocol

Page 33: Lecture 1   Introduction to computer network -2013

Computer Engineering Department - MEFGI

33

Application Layer• File transfer (FTP): Connect to a remote machine and send or fetch an

arbitrary file. FTP deals with authentication, listing a directory contents, ASCII or binary files, etc. • Remote login (telnet): A remote terminal protocol that allows a user at

one site to establish a TCP connection to another site, and then pass keystrokes from the local host to the remote host. • Mail (SMTP): Allow a mail delivery agent on a local machine to connect

to a mail delivery agent on a remote machine and deliver mail. • News (NNTP): Allows communication between a news server and a

news client. • Web (HTTP): Base protocol for communication on the World Wide Web.

Page 34: Lecture 1   Introduction to computer network -2013

Computer Engineering Department - MEFGI

34

Presentation Layer

• This layer is concerned with Syntax and Semantics of the information transmitted. Few of the services that Presentation layer provides are:• Encoding data in a standard agreed upon way.• It manages the abstract data structures and converts from representation

used inside computer to network standard representation and back.

MIME: Multi Purpose Internet Mail Extension

Page 35: Lecture 1   Introduction to computer network -2013

Computer Engineering Department - MEFGI

35

Session Layer

• This layer manages Dialogue Control. Session can allow traffic to go in both direction at the same time, or in only one direction at one time. • Token management. For some protocols, it is required that both sides

don't attempt same operation at the same time. To manage these activities, the session layer provides tokens that can be exchanged. Only one side that is holding token can perform the critical operation. • Synchronization/Check Pointing: Session layer provides a way to

insert checkpoints into data streams, so that after a crash, only the data transferred after the last checkpoint have to be repeated.

Page 36: Lecture 1   Introduction to computer network -2013

Computer Engineering Department - MEFGI

36

Transport Layer

• The transport level provides end-to-end communication between processes executing on different machines.• Negotiation of Quality and Type of Services.• Deal with congestion control• Connection establishment and termination.• Multiplexing – Demultiplexing.• Error control

Page 37: Lecture 1   Introduction to computer network -2013

Computer Engineering Department - MEFGI

37

Network Layer

1. Interface between the host and the network (the network layer is typically the boundary between the host and subnet)

2. Routing 3. Congestion and deadlock 4. Internetworking (A path may traverse different network technologies

(e.g., Ethernet, point-to-point links, etc.)

Page 38: Lecture 1   Introduction to computer network -2013

Computer Engineering Department - MEFGI

38

Data Link Layer

1. Group the physical layer bit stream into units called frames. Note that frames are nothing more than ``packets'' or ``messages''. By convention, we shall use the term ``frames'' when discussing DLL packets.

2. Sender calculates the checksum and sends checksum together with data. The checksum allows the receiver to determine when a frame has been damaged in transit or received correctly. This is called error detection and correction.

Page 39: Lecture 1   Introduction to computer network -2013

Computer Engineering Department - MEFGI

39

Continue

3.Error control protocol returns a positive or negative acknowledgment to the sender. A positive acknowledgment indicates the frame was received without errors, while a negative acknowledgment indicates the opposite.

4.Flow control prevents a fast sender from overwhelming a slower receiver. For example, a supercomputer can easily generate data faster than a PC can consume it.

Page 40: Lecture 1   Introduction to computer network -2013

Computer Engineering Department - MEFGI

40

Physical Layer

• The physical layer is concerned with transmission of raw bits over a communication channel. It specifies the mechanical, electrical and procedural network interface specifications and the physical transmission of bit streams over a transmission medium connecting two pieces of communication equipment• Number of pins and functions of each pin of the network connector

(Mechanical) • Signal Level, Data rate (Electrical) • Whether simultaneous transmission in both directions • Establishing and breaking of connection • Deals with physical transmission.

Page 41: Lecture 1   Introduction to computer network -2013

Computer Engineering Department - MEFGI

41

Let’s Evaluate This !!!!!

Page 42: Lecture 1   Introduction to computer network -2013

Computer Engineering Department - MEFGI

42

What we are using – TCP/IP Model

• OSI Model • TCP/IP Hierarchy • Protocols

• 7th

• Application Layer

• 6th

• Presentation Layer

• 5th

• Session Layer

• 4th

• Transport Layer

• 3rd

• Network Layer

• 2nd

• Link Layer

• 1st

• Physical Layer

• Application Layer

• Transport Layer

• Network Layer

• Link Layer

Page 43: Lecture 1   Introduction to computer network -2013

Computer Engineering Department - MEFGI

43

That’s the only difference ?

• OSI • TCP / IP• Application (Layer7)

• Application• Presentation (Layer6)

• Session (Layer 5)

• Transport (Layer 4) • Transport

• Network (Layer 3) • Internet

• Data Link (Layer 2)

• Host to network layer • Physical (Layer 1)

Page 44: Lecture 1   Introduction to computer network -2013

The Upper Layers

OSI TCP / IP

Application (Layer7)

ApplicationPresentation (Layer6)

Session (Layer 5)

Page 45: Lecture 1   Introduction to computer network -2013

The Session Layer

The Session layer permits two parties to hold ongoing communications called a session across a network.• Not found in TCP/IP model• In TCP/IP, its characteristics are provided by the TCP protocol.

(Transport Layer)

Page 46: Lecture 1   Introduction to computer network -2013

The Presentation Layer

The Presentation Layer handles data format information for networked communications. This is done by converting data into a generic format that could be understood by both sides.• Not found in TCP/IP model• In TCP/IP, this function is provided by the Application Layer.

e.g. External Data Representation Standard (XDR) Multipurpose Internet Mail Extensions (MIME)

Page 47: Lecture 1   Introduction to computer network -2013

The Application Layer

The Application Layer is the top layer of the reference model. It provides a set of interfaces for applications to obtain access to networked services as well as access to the kinds of network services that support applications directly.

• OSI- File Transfer Access Method (FTAM), Virtual Terminal, MHS,DS,CMIP

• TCP/IP- FTP,SMTP,TELNET,DNS,SNMP

Page 48: Lecture 1   Introduction to computer network -2013

Comparing Transport for both Models

• The TCP/IP and OSI architecture models both employ all connection and connectionless models at transport layer.• However, the internet architecture refers to the two models in TCP/IP

as simply “connections” and datagrams. But the OSI reference model, with its penchant for “precise” terminology, uses the terms connection-mode and connection-oriented model and the term connectionless-mode for the connectionless model.

Page 49: Lecture 1   Introduction to computer network -2013

Network Vs. Internet

• Like all the other OSI Layers, the network layer provides both connectionless and connection-oriented services. As for the TCP/IP architecture, the internet layer is exclusively connectionless.

OSI TCP / IP

Network (Layer 3) Internet

Page 50: Lecture 1   Introduction to computer network -2013

Data link / Physical vs. Subnet

Data link layer The function of the Data Link Layer is “provides for the control of the physical layer, and detects

and possibly corrects errors which may occur” (IOS/IEC 7498:1984). In another words, the Data Link Layer transforms a stream of raw bits (0s and 1s) from the physical into a data frame and provides an error-free transfer from one node to another, allowing the layers above it to assume virtually error-free transmission

OSI TCP / IP

Data Link (Layer 2)Subnet (host to network layer)

Physical (Layer 1)

Page 51: Lecture 1   Introduction to computer network -2013

Computer Engineering Department - MEFGI

51

Page 52: Lecture 1   Introduction to computer network -2013

Switching TechniquesLet’s Switch it !!!!!!

Page 53: Lecture 1   Introduction to computer network -2013

The Network Core

• The fundamental question: how is data transferred through net?

• Circuit switching: dedicated circuit per call: telephone net

• Packet-switching: data sent thru net in discrete “chunks”

Page 54: Lecture 1   Introduction to computer network -2013

Basic of Switching

• In large networks there might be multiple paths linking sender and receiver. Information may be switched as it travels through various communication channels. There are two typical switching techniques available for digital traffic.

• Circuit Switching • Packet Switching

Page 55: Lecture 1   Introduction to computer network -2013

Circuit Switching • Circuit switching is a technique that directly

connects the sender and the receiver in an unbroken path.

• Telephone switching equipment, for example, establishes a path that connects the caller's telephone to the receiver's telephone by making a physical connection.

• With this type of switching technique, once a connection is established, a dedicated path exists between both ends until the connection is terminated.

• Routing decisions must be made when the circuit is first established, but there are no decisions made after that time

Page 56: Lecture 1   Introduction to computer network -2013

Circuit Switching (Good Vs. Bad) End-end resources reserved

for “call”• link bandwidth, switch

capacity• dedicated resources: no

sharing• circuit-like (guaranteed)

performance• call setup required

network resources (e.g., bandwidth) divided into “pieces”• pieces allocated to calls• resource piece idle if not

used by owning call (no sharing)• dividing link bandwidth into

“pieces”• frequency division• time division

Page 57: Lecture 1   Introduction to computer network -2013

Packet Switching Each end-end data stream divided into packets• User A, B packets share network resources

• Each packet uses full link bandwidth • Resources used as needed, • There are two methods of packet switching: Datagram and virtual circuit.

Bandwidth division into “pieces”

Dedicated allocationResource reservation

Page 58: Lecture 1   Introduction to computer network -2013

Packet Switching• In both packet switching methods, a message is broken into small

parts, called packets. • Each packet is tagged with appropriate source and destination

addresses. • Since packets have a strictly defined maximum length, they can be

stored in main memory instead of disk, therefore access delay and cost are minimized.

• With current technology, packets are generally accepted onto the network on a first-come, first-served basis. If the network becomes overloaded, packets are delayed or discarded (``dropped'').

Page 59: Lecture 1   Introduction to computer network -2013

Example Networks

• The Internet

• Connection-Oriented Networks: X.25, Frame Relay, and ATM

• Ethernet

• Wireless LANs: 802:11

Page 60: Lecture 1   Introduction to computer network -2013

The ARPANET

(a) Structure of the telephone system.(b) Baran’s proposed distributed switching system.

Page 61: Lecture 1   Introduction to computer network -2013

The ARPANET – How it grows

• Growth of the ARPANET (a) December 1969. (b) July 1970.(c) March 1971. (d) April 1972. (e) September 1972.

Page 62: Lecture 1   Introduction to computer network -2013

Internet Usage1. Traditional applications (1970 – 1990) 2. E-mail3. News4. Remote login5. File transfer

Page 63: Lecture 1   Introduction to computer network -2013

Architecture of the Internet

Page 64: Lecture 1   Introduction to computer network -2013

ATM Virtual Circuits

Page 65: Lecture 1   Introduction to computer network -2013

ATM Virtual Circuits (2)

• An ATM cell.

Page 66: Lecture 1   Introduction to computer network -2013

The ATM Reference Model

• The ATM reference model.

Page 67: Lecture 1   Introduction to computer network -2013

The ATM Reference Model (2)

Page 68: Lecture 1   Introduction to computer network -2013

X.25

~ Most widely used today~ an interface between DTE and DCE for terminal operation at the packet mode on

public data network.• A packet switching protocol used in a wide area network• use virtual circuit and asynchronous TDM

Page 69: Lecture 1   Introduction to computer network -2013

X.25 Layers

• Error detection and correction in both the data link and the network layers• Network layer: establishing the connection

transferring the dataterminating the connection

Page 70: Lecture 1   Introduction to computer network -2013

Ethernet

Page 71: Lecture 1   Introduction to computer network -2013

Wireless LANs

(a) Wireless networking with a base station.(b) Ad hoc networking.

Page 72: Lecture 1   Introduction to computer network -2013

Wireless LANs (2)

• The range of a single radio may not cover the entire system.