Beruflich Dokumente
Kultur Dokumente
Name: K.SUDHA
Designation: Lecturer
Department: Electrical and Electronics Engineering
Subject code: CS2361
Year: III
Unit: I
Title: Introduction to computer networks
Computer Networks
Computer
network
connects two or more
autonomous
computers.
Applications of Networks
Resource Sharing
Hardware (computing resources, disks, printers)
Software (application software)
Information Sharing
Easy accessibility from anywhere (files,
databases)
Search Capability (WWW)
Communication
Email
Message broadcast
Remote computing
Distributed processing (GRID Computing)
Network Topology
The
network
topology
defines
the way in which
computers,
printers, and other
devices
are
connected.
A
network
topology
describes the layout
of the wire and
devices as well as
the paths used by
data transmissions.
Bus Topology
Commonly referred
to as a linear bus,
all the devices on a
bus topology are
connected by one
single cable.
Ring Topology
A frame travels around the
ring, stopping at each node. If a
node wants to transmit data, it
adds the data as well as the
destination address to the
frame.
The
frame
then
continues
around the ring until it finds
the destination node, which
takes the data out of the frame.
Single ring All the devices on
the network share a single cable
Dual ring The dual ring
topology allows data to be sent
in both directions.
Mesh Topology
The mesh topology
connects all devices
(nodes) to each other
for redundancy and
fault tolerance.
It is used in WANs to
interconnect
LANs
and
for
mission
critical networks like
those used by banks
and
financial
institutions.
Implementing
the
mesh
topology
is
expensive
and
difficult.
Network Components
Physical Media
Interconnecting Devices
Computers
Networking Software
Applications
Networking Media
Networking media
can
be
defined
simply
as
the
means
by
which
signals (data) are
sent
from
one
computer
to
another (either by
cable or wireless
means).
Networking Devices
HUB,
Switches,
Routers,
Wireless
Access
Points,
Modems etc.
In
network
arrangement,
network services are
located
in
a
dedicated computer
whose only function
is to respond to the
requests of clients.
Networking Protocol:
TCP/IP
Applications
E-mail
Searchable Data (Web
Sites)
E-Commerce
News Groups
Internet Telephony
(VoIP)
Video Conferencing
Chat Groups
Instant Messengers
Internet Radio
Network Architecture
Provides a general, effective, fair, and robust
connectivity of computers
Provides a blueprint
Types
OSI Architecture
Internet Architecture
OSI ARCHITECTURE
OSI Architecture
Link Layer
Framing
Error Detection
Reliable Transmission (ARQ protocols)
Medium Access Control:
Link Technologies
Cables:
Leased Lines:
Copper based: T1 (1.544Mbps), T3 (44.736Mbps)
Optical fiber: STS-1 (51.84Mbps), STS-N (N*51.84Mbps)
Link Technologies
Last-Mile Links:
POTS (56Kbps), ISDN (2*64Kbps)
xDSL: ADSL (16-640Kbps, 1.554-8.448Mbps), VDSL
(12.96Mbps-55.2Mbps)
CATV: 40Mbps downstream, 20Mbps upstream
Wireless Links: Cellular, Satellite, Wireless Local Loop
FRAMING
An efficient data transmission technique
It is a message forwarding system in which data
packets, called frames, are passed from one or many
start-points to one
Approaches
Byte oriented Protocol(PPP)
BISYNC
Binary Synchronous Communication
DDCMP
Digital Data Communication Message Protocol
SYH
SOH
Header
STX
ETX
Body
Address
Control
Protocol
Payload
Flag
CRC
SYN
SYN
Class
Count
Header
Body
CRC
Collection of Bits
1.HDLC
High-Level Data Link Control
2.Closed Based Framing(SONET)
Synchronous Optical Network
Header
Body
CRC
Bit Stufffing
After 5 consecutive 1s insert 0
Next bit is 0 stuffed removed
Next bit is 1 end of frame or erorr
Ending
sequence
9 rows
90 columuns
ERROR DETECTION
Detecting Errors In Transmission
Electrical Interference, thermal noise
Approaches
Two Dimensional Parity
Internet Checksum Algorithm
Cyclic Redundancy Check
Number of 1s
even
odd
0000000 (0)
00000000
100000000
1010001 (3)
11010001
01010001
1101001 (4)
01101001
11101001
1111111 (7)
11111111
01111111
Reliable Transmission
Deliver Frames Reliably
Accomplished by Acknowledgements and Timeouts
ARQ-Automatic Repeat Request
Mechanism:
Stop and Wait
Sliding Window
Concurrent Logical Channels
Acknowledgements &
Timeouts
Sender
Receiver
Timeout
Timeout
Timeout
Receiver
(a)
(c)
Receiver
Sender
Receiver
Timeout
Timeout
Timeout
Sender
Timeout
Time
Sender
(b)
(d)
Timeout
Fram
e
0
ACK
Fram
e
0
ACK
(c)
Sender
Timeout
Receiver
Timeout
Sender
Receiver
Fram
Sender
e0
0
ACK
Fram
e
0
ACK
Receiver
Fram
e
0
ACK
Fram
e1
1
ACK
Fram
e
(d)
0
ACK
(e)
Sliding Window
LAR
LFS
LFR
LFA
Ehernet
local-area network (LAN) covered by
the IEEE 802.3.
two modes of operation:
half-duplex
full-duplex modes.
.
Wireless
The process by which the radio waves are propagated
through air and transmits data
Wireless technologies are differentiated by :
Protocol
Connection typePoint-to-Point (P2P)
SpectrumLicensed or unlicensed
Types
Infrared Wireless Transmission
UNIT III
Packet Switching
Types
Connectionless
each packet is labeled with a connection ID
rather than an address.
Example:Datagram packet switching
connection-oriented
each packet is labeled with a destination
address
Example:X.25 vs. Frame Relay
Star Topology
Source Routing
0 Switch 1
3
1
2 Switch 2
2
3 0 1
1
2
1 3 0
0
Host A
0 1 3
1
0 Switch 3
3
2
Host B
2
5
Analogy:
phone call
Each switch
maintains a
VC table
3
11
2 Switch 2
1
0
Host A
7
1
0 Switch 3
3
2
Host B
Datagram Switching
No connection setup phase
Each packet forwarded independently
Sometimes called connectionless
model
Host D
Analogy: postal
system
Each switch
maintains a
forwarding
(routing) table
3
Host C
Host E
0 Switch 1
1
2
Host F
3
2 Switch 2
1
0
Host A
Host G
1
0 Switch 3 Host B
3
2
Host H
Datagram Model
There is no round trip delay waiting for connection setup; a
host can send data as soon as it is ready.
Source host has no way of knowing if the network is capable
of delivering a packet or if the destination host is even up.
Since packets are treated independently, it is possible to
route around link and node failures.
Since every packet must carry the full address of the
destination, the overhead per packet is higher than for the
connection-oriented model.
C
Port 1
Bridge
Port 2
X
Problem: loops
B
B3
C
B5
D
B2
B7
K
F
B1
G
H
B6
B4
I
J
Algorithm Details
Bridges exchange configuration messages
id for bridge sending the message
id for what the sending bridge believes to be
root bridge
distance (hops) from sending bridge to root
bridge
Each bridge records current best configuration
message for each port
Initially, each bridge believes it is the root
Algorithm Details
Bridges exchange configuration messages
id for bridge sending the message
id for what the sending bridge believes to be
root bridge
distance (hops) from sending bridge to root
bridge
Each bridge records current best configuration
message for each port
Initially, each bridge believes it is the root
Thank u