Sie sind auf Seite 1von 35

N E T W O R K IN G

G r o u p Me mber s :
9231 : Gururaj Kanche
9232 : Fanoos Kiani
9233 : Sameer Mahajan
9234 : Saima Khan
9235 : Sumit Mathew
O V E R V IE W

• INTRODUCTION
• BENEFITS
• TOPOLOGIES
•COMMUNICATION CHANNELS
• TYPES OF NETWORKS
•TECHNOLOGIES
•SERVICES
•WIRELESS NETWORKING
INTRODUCTION TO NETWORKING

up of interconnected systems sharing resources and interacting

Modem , Service eg . email system

he same programs >> Limited Resources


for document storage
to files
strategy
authorized users to access
t Costs eg . printer

source )
ta ( Transmission Medium )
o communicate ( Protocols )
PROTOCOLS
ds for sending and receiving data .
y corruption of data .
ation computer acknowledges receipt of required data
ust be capable of determining the origin and destination
dardized and scalable method for assigning network addre
of identifying each other across the network .
: Standard method for identifying and verifying devices
the physical arrangement of participating computers in t
tipoint or broadcast type .
error rate , redundancy and recovery procedures .
een nodes are to be routed through : Deterministic , Stochas
the communication lines connecting nodes
ccess or through a sub - network
ct , resource utilization
control or hierarchical control
NETWORKING TOPOLOGIES

ssified by the way they are physically connected is the overal


s the arrangement of the connective medium ( such as wires ) on a
STAR , RING & BUS

o a central host computer . All communications between network devices


nnects between the device and the hub or switch which acts as

ub ) , wont affect the network

tion

sier

own
closed loop in a manner that passes data in one direction from one

nnected in a continuous circle of cable . There are no ends to term

ing topology is not a passive topology


ignal is boosted along the cable when it passes through the comput
ach computer in the network can communicate directly with any oth
ach processes its own applications independently

he connecting wire , cable or optical fiber forms a closed loop


f one computer fails , it can affect the entire network
single circuit made of twisted wire , coaxial cable , or fiber - optic

te by broadcasting data to a specific address on the network

bably the most used form of networks


ls are broadcast in both directions to the entire network .
omponent doesn ’ t affect the functioning of the network .

at a time can transmit data on a Bus network or signals will colli


Devices only listen for data being transmitted , they do not move
COMMUNICATION CHANNELS

• The link by which data or voice are


transmitted between sending and
receiving device

• It uses different kinds of telecommunication
transmission media like :

Ø twisted wire
Ø coaxial cable
Ø Fiber optics
Ø wireless transmission
• Twisted wire

• Consists of pairs of twisted cooper


wires; used to transmit analog
phone conversations but can be
used for data transmission
• Low in cost
• Slow for transmitting data
• Cross talk
• Limits to the amount of data

1.
• coaxial cable

• Consisting of thickly insulated copper


wire; can transmit large volume of
data quickly
• Fast
• Hard to wire
• Can’t support analog phone
conversations



• Fiber optics cable
• A fast light and durable transmission
medium consisting thin strands of
clear class fiber bound into cables
• Data are transmitted as light pulses
• It is suited to systems requiring
transfers of large volumes of data
• More difficult
• More expensive
• Harder to install
• Wireless transmission

• It send signals through air or space


without being tied to a physical line
• It includes:
• Microwave transmission
• Satellites
• Cellular telephones
• Mobile data networks
Typical speeds and costs of

telecommunications transmission media



Medium Speed Cost

Twisted wire Up to 100 mbps low

Microwave Up to 200 + mbps

Satellite Up to 200 +mbps

Coaxial cable up to 200 mbps

Fiber optics cable Up to 6 + Tbps high


Classification of networks by
geographic scope

Ø Local area networks (LAN)


Ø Private branch exchanges (PBX)
Ø Wide area networks (WAN)
• local area networks
• A telecommunication network that
requires its own dedicated channels
and that encompasses a limited
distance
•Gateway

• A communications processor that


connects this similar networks by
providing the translation from one
side of protocols to another
•Router

• Device that forwards pockets of data


from one LAN or WAN to another
• Wide area networks (WANs)
• Spans a large geographical distance.
may consist of a variety of cable,
satellite and microwave
technologies
•Switch lines

•Telephone lines that a person can

access from a terminal to transmit


data to another computer
•Dedicated lines

•Telephone lines tat are continuously

available for transmission by a


lessee. Typically conditioned to
transmit data as high speeds for high
VAN
• Value added networks.
• Value added networks are the
alternative to firms designing and
managing their own networks.
• Value added networks are private,
multipath, data-only, third party
managed networks that can
provide economies in the cost of
service and in network
management because they are
used by multiple organizations.
VAN
• The VAN is set up by a firm that is in
charge of managing the network.
• The firm sells subscriptions to other
firms wishing to use the network.
• Customers do not have to invest in
network equipment and software or
perform their own error checking,
editing, routing, and protocol
conversion.

NETWORK TECHNOLOGIES


• Client server networking
• Peer to peer networking
• Circuit switching
• Packet switching
• Virtual private networking
NETWORK SERVICES
• ISDN (integrated services digital
network)
–BRI (basic rate ISDN)
–PRI (primary rate ISDN)

• DSL (digital subscriber line)


–Asynchronous DSL
–Synchronous DSL
• Frame relay

• ATM (Asynchronous Transfer


Mode)

• Cable modem

• VoIP (voice over IP)


PROTOCOL MODEL

• OSI model
• (Open System Interconnect)
• TCP / IP model
• (Transmission Control
Protocol/
• Internet Protocol)
The Wireless Revolution
Ø Helps businesses more easily stay in
touch with customers, suppliers and
employees and provides more flexible
arrangements for organizing works.
Ø Also created new products , services
v Wireless Devices:-
Ø PC’S
Ø Cell-phones
Ø Personal Digital Assistants (PDA’s)
Ø Smart Phones
Cellular Network Standards and
Generations
v Global System for Mobile Communication (GSM)
• Its international roaming capability
• Seamless same number roaming in more than 170
countries
• Outside North America 900 MHz and 1.8 GHz

v Code Division Multiple Access (CDMA)


• Cheaper to implement
• More efficient in its use of spectrum
• Provides higher quality voice and data than GSM
Mobile Wireless Standards for Web Access
• Wireless Application Protocol (WAP)
• Dial up connection
Encoded Requests Requests


Encoded Content Content

• Cell phone/other device Gateway (encodes and decodes) Web Server

• I-Mode by Japan’s NTT DoCoMo


Direct
Connection

Cell phone/other device


Web Server
Wireless Computer Networks and Internet
Access
• Standards by IEEE for wireless computer
networks.

Ø IEEE 802.15 for PAN (Bluetooth)


Ø IEEE 802.11 for LAN (Wi-Fi)


Ø IEEE 802.16 for MAN (WiMax)


• Bluetooth
Ø It links up to 8 devices within ten meters range.
Ø Low power, radio-based communication
Ø Transmit up to 722 Kbps in 2.4 GHz band
Ø

Wi-Fi
• Three standards in this family 802.11 a, 802.11 b
and 802.11 g
• Operating modes
Ø Infrastructure Mode
Ø Ad-hoc Mode
• Wi-Fi and Wireless Internet Access
Ø 802.11 provides wireless access to internet using
broadband connection
Ø Concept of Hotspot
• Drawbacks
Ø Weak security hence vulnerable to intruders
Ø Susceptibility to interference from nearby system
Ø Range is only 300 feet from base station.

Wi Max

• Wi Max stands for Worldwide Interoperability for


microwave access (IEE802.16 standards)
• Range up to 31miles
• Data transfer rate up to 75 Mbps
• Robust security and quality of service features to
support voice and video
• Wi Max antennas are powerful enough to beam
high speed internet connections to rooftop
antennas of homes and businesses that are
miles away.
Radio Frequency Identification (RFID)
• Provides powerful technology for tracking
movements of goods throughout supply chain
• HOW RFID WORKS
Tag Radio RFID Reader Host computer
Waves

Microchip
holds data Reader
including an transmits
identificatio data to host
n no. the rest system over Processes data from the tag
of tag is an wired or that have been transmitted
antenna that wireless by the reader.
transmits connections
data to
reader
Applications
• Low Frequency System(30 to 500 KHz) have short reading
range, lower system costs and are often used in security,
asset tracking or animal identification applications.
• High frequency RFID systems (850 to 950 MHz) offer reading
ranges that can extend beyond 90 feet and are useful in
applications such as railroad tracking or automated toll
collection for highways or bridges
• RFID available for decades but high tags costs from $1 to
$20 held back its widespread use which now costs only
nineteen cents and will drop to 5 cents within few years.
• At these prices for tags RFID becomes cost effective for
many companies.
• Now major enterprise software vendors, including SAP and
Oracle-people soft offer RFID-ready versions of their
supply chain management applications.
Wireless Sensor Networks

• WSN’s are networks of interconnected wireless


devices that are embedded into physical
environment to provide measurements of many
points over large space.
• These devices have built in processing, storage
and radio frequency sensors and antennas
• Linked into interconnected network that routes
the data they capture to a computer for
analysis.
• Applications in monitoring environmental
changes, monitoring traffic or military activity,
protecting property, establishing security,
detecting chemical, biological or radiological
material.
THANK
YOU

Das könnte Ihnen auch gefallen