(AN AUTONOMOUS UNIT OF RANCHI UNIVERSITY FROM 2009)
- Prakash Kumar, Dept. of CA
-Raju Manjhi, Dept. of CA
__________________________________________________________________________________
Computer Networks
Computer
Network:
It is the
interconnection of multiple devices, generally termed as Hosts connected using
multiple paths for the purpose of sending/receiving data or media.
There are also
multiple devices or mediums which helps in the communication between two
different devices which are known as Network devices. Ex: Router,
Switch, Hub, Bridge.
Transmission
technology
There are two
types of transmission technology that are in widespread use:
·
Broadcast links and
·
Point-to-point links.
On a broadcast network, the communication
channel is shared by all the machines on the network; packets sent by any
machine are received by all the others. An address field within each packet
specifies the intended recipient. Upon receiving a packet, a machine checks the
address field. If the packet is in-tended for the receiving machine, that
machine processes the packet; if the packet is intended for some other machine,
it is just ignored.
Some broadcast
systems also support transmission to a subset of the machines, which known as multi-casting.
Point-to-point links connect individual pairs of machines.
To go from the source to the destination on a network made up of point-to-point
links, short messages, called packets in certain contexts, may have to
first visit one or more inter-mediate machines. Often multiple routes, of
different lengths, are possible, so finding good ones is important in
point-to-point networks.
Point-to-point
transmission with exactly one sender and exactly one receiver is sometimes
called uni-casting.
PANs (Personal Area Networks) let devices
communicate over the range of a person. A common example is a wireless
network that connects a computer with its peripherals. Almost every computer
has an attached monitor, keyboard, mouse, and printer. Without using wireless,
this connection must be done with cables. To help the users, some companies got
together to design a short-range wireless network called Bluetooth to
connect these components without wires. The idea is that if your devices have
Bluetooth, then you need no cables.
Local Area Networks
A LAN is a
privately owned network that operates within and nearby a single building like
a home, office or factory. LANs are widely used to connect personal computers
and consumer electronics to let them share resources (e.g., printers) and
exchange information. When LANs are used by companies, they are called enterprise
networks.
Wired LANs use a
range of different transmission technologies. Most of them use copper wires,
but some use optical fiber. LANs are restricted in size, which means that the
worst-case transmission time is bounded and known in ad-vance. Knowing these
bounds helps with the task of designing network protocols. Typically, wired
LANs run at speeds of 100 Mbps to 1 Gbps, have low delay (microseconds or
nanoseconds), and make very few errors. Newer LANs can operate at up to 10
Gbps.
The topology of
many wired LANs is built from point-to-point links. IEEE 802.3, popularly
called Ethernet.
Switched Ethernet: Each
computer speaks the Ethernet protocol and connects to a box called a switch
with a point-to-point link. A switch has
multiple ports, each of which can connect to one computer. The job of
the switch is to relay packets between computers that are attached to it, using
the address in each packet to determine which computer to send it to.
Metropolitan Area
Networks
MAN (Metropolitan
Area Network) covers a city. The best-known examples of MANs are the cable
television networks available in many cities. At first, these were locally
designed, ad hoc systems. Then companies began jumping into the business,
getting contracts from local governments to wire up en-tire cities. When the
Internet began attracting a mass audience, the cable TV network operators began
to realize that with some changes to the system, they could provide two-way
Internet service in unused parts of the spectrum.
Recent developments in high-speed wireless
Internet access have resulted in another MAN, which has been standardized as
IEEE 802.16 and is popularly known as WiMAX.
Wide Area
Networks
WAN (Wide Area Network) spans a large
geographical area, often a country or continent. We will begin our
discussion with wired WANs, using the example of a company with branch offices
in different cities.
Suppose each of
these offices contains computers intended for running user (i.e., application)
programs. We will follow traditional usage and call these ma-chines hosts.
The rest of the network that connects these hosts is then called the communication
subnet, or just subnet for short. The job of the subnet is to carry
messages from host to host, just as the telephone system carries words
(really just sounds) from speaker to listener.
In most WANs, the subnet consists of two
distinct components: transmission lines and switching elements. Transmission
lines move bits between machines. They can be made of copper wire, optical
fiber, or even radio links. Most com-panies do not have transmission lines
lying about, so instead they lease the lines from a telecommunications company.
Switching elements, or just switches, are specialized computers
that connect two or more transmission lines.
Virtual Private
Network
VPN (Virtual Private Network) Compared to
the dedicated arrangement, a VPN has the usual advantage of virtualization,
which is that it provides flexible reuse of a resource (Internet connectivity).
A VPN also has the usual disadvantage of virtualization, which is a lack of
control over the underlying resources. With a dedicated line, the capacity is
clear. With a VPN our mileage may vary with our Internet service.
Connection-Oriented
Versus Connectionless Service
Connection-oriented
service is modeled after the telephone
system. To talk to someone, you pick up the phone, dial the number,
talk, and then hang up. Similarly, to use a connection-oriented network
service, the service user first establishes a connection, uses the connection,
and then releases the connection. The essential aspect of a connection is that
it acts like a tube: the sender pushes objects (bits) in at one end, and the
receiver takes them out at the other end. In most cases the order is preserved
so that the bits arrive in the order they were sent.
Connectionless service is modeled after the postal system.
Each message (letter) carries the full destination address, and each one is
routed through the intermediate nodes inside the system independent of all the
subsequent messages. There are different names for messages in different
contexts; a packet is a message at the network layer. When the inter-mediate
nodes receive a message in full before sending it on to the next node, this is
called store-and-forward switching.
REFERENCE
MODELS
The
OSI Reference Model: This model is
based on a proposal developed by the International Standards Organization
(ISO) as a first step toward international standardization of the protocols
used in the various layers (Day and Zimmermann, 1983). It was revised in 1995
(Day, 1995). The model is called the ISO OSI (Open Systems
Interconnection) Reference Model because it deals with connecting open
systems—that is, systems that are open for communication with other systems.
The OSI model has seven layers.
The Physical Layer
The physical
layer is concerned with transmitting raw bits over a communi-cation
channel. These design issues largely deal with mechanical, electrical, and
timing interfaces, as well as the physical transmission medium, which lies
below the physical layer.
The Data Link Layer
The main task of
the data link layer is to transform a raw transmission facility into a
line that appears free of undetected transmission errors. It does so by masking
the real errors so the network layer does not see them. It accomplishes this
task by having the sender break up the input data into data frames and transmits
the frames sequentially. If the service is reliable, the receiver confirms
correct receipt of each frame by send-ing back an acknowledgement frame.
Broadcast
networks have an additional issue in the data link layer: how to control access
to the shared channel. A special sublayer of the data link layer, the medium
access control sublayer, deals with this problem.
The Network Layer
The network
layer controls the operation of the subnet. A key design issue is
determining how packets are routed from source to destination. Routes can be
based on static tables that are ‘‘wired into’’ the network and rarely changed,
or more often they can be updated automatically to avoid failed components.
Handling congestion is also a responsibility of the network layer.
The Transport Layer
The basic function of the transport layer
is to accept data from above it, split it up into smaller units if need be,
pass these to the network layer, and ensure that the pieces all arrive
correctly at the other end. The transport layer also determines what type of
service to provide to the ses-sion layer, and, ultimately, to the users of the
network.
The Session Layer
The session layer
allows users on different machines to establish sessions be-tween them.
Sessions offer various services, including dialog control (keeping track
of whose turn it is to transmit), token management, and synchronization.
The Presentation Layer
Unlike the lower
layers, which are mostly concerned with moving bits around, the presentation
layer is concerned with the syntax and semantics of the infor-mation
transmitted. The presentation layer manages these abstract data structures and
al-lows higher-level data structures.
The Application Layer
The application
layer contains a variety of protocols that are commonly needed by users.
One widely used application protocol is HTTP (HyperText Transfer
Protocol), which is the basis for the World Wide Web.
TCP/IP Reference
Model
It was first
described by Cerf and Kahn (1974), and later refined and defined as a standard
in the Internet community (Braden, 1989). The design philosophy behind the model
is discussed by Clark (1988).
The Link Layer
The link layer
describes what links such as serial lines and classic Ethernet must do to meet
the needs of this connectionless internet layer. It is not really a layer at
all, in the normal sense of the term, but rather an interface be-tween hosts
and transmission links.
The Internet Layer
The internet
layer is the linchpin that holds the whole architecture together. Its job
is to permit hosts to inject packets into any network and have them travel
in-dependently to the destination. They may even arrive in a completely
different order than they were sent, in which case it is the job of higher
layers to rearrange them, if in-order delivery is desired.
The internet layer defines an official packet
format and protocol called IP (Internet Protocol), plus a
companion protocol called ICMP (Internet Control Message
Protocol) that helps it function. The job of the internet layer is to deliver
IP packets where they are supposed to go.
The Transport Layer
The layer above the internet layer in the
TCP/IP model is now usually called the transport layer. It is designed
to allow peer entities on the source and desti-nation hosts to carry on a
conversation, just as in the OSI transport layer. Two end-to-end transport protocols
have been defined here. The first one, TCP (Transmission Control
Protocol), is a reliable connection-oriented protocol that allows a byte
stream originating on one machine to be delivered without error on any other
machine in the internet.
The second protocol in this layer, UDP
(User Datagram Protocol), is unreliable, connectionless protocols for
applications that do not want TCP’s sequencing or flow control and wish to
provide their own. It is also widely used for one-shot, client-server-type
request-reply queries and applications, in which prompt delivery is more
important than accurate delivery,
The Application Layer
It contains all the high-er-level protocols.
The early ones included virtual terminal (TELNET), file trans-fer (FTP), and
electronic mail (SMTP).
Difference
between OSI and TCP/IP
OSI(Open System
Interconnection)
|
TCP/IP(Transmission
Control Protocol / Internet Protocol)
|
1. OSI is a
generic, protocol independent standard, acting as a communication gateway
between the network and end user.
|
1. TCP/IP model
is based on standard protocols around which the Internet has developed. It is
a communication protocol, which allows connection of hosts over a network.
|
2. In OSI model
the transport layer guarantees the delivery of packets.
|
2. In TCP/IP
model the transport layer does not guarantees delivery of packets. Still the
TCP/IP model is more reliable.
|
3. Follows
vertical approach.
|
3. Follows
horizontal approach.
|
4. OSI model
has a separate Presentation layer and Session layer.
|
4. TCP/IP does
not have a separate Presentation layer or Session layer.
|
5. OSI is a
reference model around which the networks are built. Generally it is used as
a guidance tool.
|
5. TCP/IP model
is, in a way implementation of the OSI model.
|
6. Network
layer of OSI model provides both connection oriented and connectionless
service.
|
6. The Network
layer in TCP/IP model provides connectionless service.
|
7. OSI model
has a problem of fitting the protocols into the model.
|
7. TCP/IP model
does not fit any protocol
|
8. Protocols
are hidden in OSI model and are easily replaced as the technology changes.
|
8. In TCP/IP
replacing protocol is not easy.
|
9. OSI model
defines services, interfaces and protocols very clearly and makes clear
distinction between them. It is protocol independent.
|
9. In TCP/IP,
services, interfaces and protocols are not clearly separated. It is also
protocol dependent.
|
10. It has 7
layers
|
10. It has 4
layers
|
Sir java lecture 2 kab layenge??
ReplyDeleteWow...nice content sir
ReplyDeleteThank you sir
ReplyDeleteA very thank you sir, for your great work.
ReplyDelete