Computer networking (nnm)
- 2. NETWORKING OF COMPUTERS
What is computer network?
Why we need a computer network ?
How a computer network works ?
Network models
IP Addressing
Network Topology
Different type of network
Requirements for network
Applications
Security
- 3. WHAT IS NETWORK ?
Interconnection of computers
How to interconnect ?
Links required for interconnecting „N‟
nodes
Suitable ?
Solution ?
- 4. GOALS OF THE NETWORKING
Resource Sharing
Information/Data Sharing
Centralized Computing
Remote Computing
Communication – Mail, Video Conferencing
Improving Security
Managing Tasks and Applications
- 8. SOME BASICS
Why a computer network is required ?
Data transfer
How to identify a node in network ?
IP address
How data flows in networks ?
Packet form
What is Packet switching ?
Statistical Multiplexing
ReceiverSender
Packet
Transmission
- 9. SOME BASICS……..
Channel capacity = Maximum data rate for a channel
Nyquist Theorem:
Bandwidth = W
Data rate =< 2W
Bilevel encoding:
Data rate = 2 X Bandwidth
Multilevel encoding:
Data rate = 2 X Bandwidth X log 2 M
For example if M = 4, Capacity = 4 X Bandwidth
Shannon‟s Theorem:
Maximum number of bits/sec = W log2 (1+S/N)
For telephone line: S/N = 30 dB, W = 3K; Capacity =
30Kbps
- 10. TREND: TRAFFIC > CAPACITY
Expensive Bandwidth Cheap Bandwidth
Sharing No sharing
Multicast Unicast
Needs QoS QoS is not an issue
Wireless LAN Possible in LAN
- 12. OSI REFERENCE MODEL
The seven layers
Each layer hides complexity of lower layer
Layering enforces modularity
- 13. End-to-end layer: top 4 OSI layers
Network layer: OSI network layer
Link layer: bottom 2 OSI layers
A-P-S-T are implemented in software
N-D-P are implemented in hardware
THE SEVEN LAYERS
- 14. THE SEVEN LAYERS ………….
Physical layer
Transmission of bit stream over physical medium
Coding scheme, connector shape and size, bit-level
synchronization
Data link layer
Reliable transfer of information across the physical link
Sends blocks - frames
Medium access control (MAC): data link-layer address and access
to the medium
Logical link control: link error control and flow control
Ethernet card: physical and data link layers
- 15. THE SEVEN LAYERS ………….
Network layer
Concatenate logically a set of links to form an end-to-
end link.
Compute a route
Segmentation and reassembly
Unique network-wide addresses : IP address
The beauty of IP is that we can layer it over any data
link layer technology
Type-of-service in the IP
- 16. THE SEVEN LAYERS ………….
Transport layer
Create the abstraction of an error-controlled,
and flow-controlled, end-to-end link
Multiplex multiple applications to the same
end-to-end connection
Port number
- 17. THE SEVEN LAYERS ………….
Best-effort network layer
- drops packets
- delays packets
- reorders packets
- corrupts packet contents
Many applications want
reliable transport
- all packets reach receiver…
…in order they were sent
- no data corrupted
- “reliable byte stream”
Need a transport protocol,
e.g., Internet‟s Transmission
Control Protocol (TCP)
- 18. PRINCIPLES OF RELIABLE DATA TRANSFER
Important in application, transport, and link layers
Top-10 list of important networking topics!
Sending
Process
Receiving
Process
Reliable Channel
Sending
Process
Receiving
Process
Unreliable Channel
RDT protocol
(sending side)
RDT protocol
(receiving side)
Application Layer
Network Layer
Transport Layer
Characteristics of unreliable channel will determine
complexity of reliable data transfer protocol
- 19. THE SEVEN LAYERS ………….
Session layer
provides the control structure for communication between
applications
The Internet does not have a standard session layer protocol.
Presentation layer
deals with data
encrypt data
The Internet does not support a standard presentation layer.
Application layer
Provides access to the users
WWW: browser, server, navigation
file transfer using TCP
real-time audio and video retrieval using UDP
- 20. TCP/IP MODEL
TCP/IP protocol consists of four/five layers
The lower layers correspond to the layer of the
OSI model.
The application layer of the TCP/IP model
represents the three topmost layers of the OSI
model
TCP/IP is based on two principles
IP Over everything
end to end
- 21. TCP/IP MODEL………..
TCP – Transmission Control Protocol
IP – Internet Protocol (Routing)
TCP/IP Model TCP/IP Protocols OSI Ref Model
Physical
Datalink
Network
Transport
Session
Presentation
Application
Physical
Datalink
Network
Transport
Session
Presentation
Application
Host to
Network
Network
Transport
Application
Host to
Network
Network
Transport
Application
UDP
HTTPTelnet
Point
- to -
Point
Packet
Radio
Ethernet
IP
TCP
FTP
UDP
HTTPTelnet
Point
- to -
Point
Packet
Radio
Ethernet
IP
TCP
FTP
- 22. ADVANTAGE OF TCP/IP MODEL
Open Protocol Standards
Independent of actual physical network &
Computer hardware or software. Run over
Ethernet/ Token Ring/ Modems/ Unix/
Windows PCs
Uses Common Global address scheme (IP
addressing) that enables global
connectivity
- 23. IP ADDRESSING
IP addressing scheme is integral to the process of routing IP
datagram through an internetwork.
Each IP address has specific component and follows a basic
format.
These IP addresses can be subdivided and used to create
addresses for sub networks.
Each host on a TCP/IP network is assigned a unique 32-bit
logical address that is divided into two main parts: the
network number and the host number.
The network number identifies a network and must be
assigned by the internet Network Information Center
(InterNIC) if the network is to be part of the internet.
- 24. IP ADDRESSING
An Internet Service Provider (ISP) can obtain
blocks of network addresses from InterNIC and
can itself assign address space as necessary.
The host number identifies a host on a network
and is assigned by the local network
administrator.
- 28. COMPONENTS OF A NETWORK
Server :Computer that provides shared
resources to network users.
Clients :Computer that access shared network
resources provided by server.
Media : Way of connecting computers. e.g.
Cable, fiber optics, telephone line.
Resources: Files, printers or other items to
be used by network users.
- 30. CLIENT-SERVER ARCHITECTURE
server:
always-on host
permanent IP address
clients:
communicate with
server
may be intermittently
connected
may have dynamic IP
addresses
do not communicate
directly with each other
client/server
- 31. P2P ARCHITECTURE
no always-on server
users directly
communicate
peers are intermittently
connected and change IP
addresses
Highly scalable but
difficult to manage
peer-peer
- 32. HYBRID OF CLIENT-SERVER AND P2P
Skype
voice-over-IP P2P application
centralized server: finding address of remote
party
client-client connection: direct (not through
server)
Instant messaging
chatting between two users is P2P
centralized service: client presence detection
user registers its IP address with central server
when it comes online
user contacts central server to find IP
addresses of buddies
- 33. NETWORK TOPOLOGY
Defines the way in which
computers, printers, and
other devices are
connected.
Describes the layout of the
wire and devices as well as
the paths used by data
transmissions.
- 34. BUS TOPOLOGY
All the devices on a bus topology are
connected by one single cable
At a time only one host can send messages
Passive topology. Hosts on the bus are not
responsible for moving data
Failure of any host doesn‟t affect the
Network
- 35. STAR & TREE TOPOLOGY
Commonly used architecture in Ethernet
LAN
Larger networks use the extended star
topology also called tree topology
- 40. IEEE 802 STANDARDS
802.1 Network management and bridging
802.2 Logical link control
802.3 Ethernet and fast Ethernet
802.4 Token bus
802.5 Token ring
802.7 Broadband
802.8 Fiber – optics
802.9 Integrate data and voice
802.10 Security and privacy
802.11 Wireless LAN
802.16 WiMAX (Broadband Wireless Access)
- 41. DIFFERENT TYPES OF NETWORKS
Local Area Network (LAN)
Metropolitan Area Network (MAN)
Wide Area Network (WAN)
- 42. LOCAL AREA NETWORK (LAN)
A network confined to a single location e.g. one
building or one complex
Used for Sharing
Hardware e.g. Printers
Software
Data
Maximum distance limited by signal strength
- 44. METROPOLITAN AREA NETWORK (MAN)
A network that covers an entire city
Usually Cable is signal carrier
Maximum range of about 75 kilometers (45
miles) or so, and with high-speed transmission
capabilities
T3 = 45 megabits per second (Mbps)
Unlike LANs, MANs generally include provisions
for both voice and data transmissions.
- 45. WIDE AREA NETWORK (WAN)
A Network spread over wide areas such as
across cities, states or countries
High speed data lines used to connect LANs in
separate geographical locations
Communication using telephone lines, satellite or
Microwave links
WANs can be centralized or distributed
More accurately wide-area internetworks(WAIs)
- 46. REQUIREMENTS FOR NETWORK
Server – Win NT/2000/2003, Unix/Linux,
Netware
Client – Win XP, Win NT/2000, Linux, DOS
NIC – Ethernet
Transmission media – twisted pair, coaxial
cables, fiber optics
Topology – bus, ring, star, tree
Protocol – TCP/IP
Interconnection devices – Hub, switch, router,
bridge, gateway
- 48. APPLICATIONS
Internet
Email
Downloads
E - Commerce
Group Chatting
Internet Telephony (VoIP)
Video Conferencing
IPTV
Internet Radio
Server based audio & video services
- 50. TYPES OF MALWARE
Viruses: Code that attaches itself to programs,
disks, or memory to propagate itself
Worms: Installs copies of itself on other
machines on a network, e.g., by finding user
names and passwords
Trojan horses: Pretend to be a utility. Convince
users to install on PC
Spyware: Collect personal information
Hoax: Use emotion to propagate, e.g., child's last
wish