Computer Network Is Defined As the Collection of Autonomous Computers Interconnected By

Total Page:16

File Type:pdf, Size:1020Kb

Computer Network Is Defined As the Collection of Autonomous Computers Interconnected By

Unit 1 -- Introduction

Computer Network is defined as the collection of autonomous computers interconnected by a single technology.

Uses of Computer Networks

1. Business Applications : A company may have separate computers to monitor production, keep track of inventories and do the payroll. Initially, each of these computers may have worked in isolation from the others, but at some point, management may have decided to connect them to be able to extract and correlate information about the entire company. a) Resource sharing : A group of office workers share a common printer. This issue is termed as resource sharing and the goal is to make all programs, equipment and especially data available to anyone on the network without regard to the physical location of the resources and the user. In larger companies, the computers and employees may be scattered over dozens of offices and plants in many countries. A company’s information consisting of one or more databases and some number of employees need to access them remotely. In this model, the data are stored on powerful computers called servers. Servers are maintained by system administrator. The employees have simple machines called clients, with which they can access remote data. This whole arrangement is called client-server model. b) Communication medium : Second goal of computer network has to do with people rather than information or even computers. A computer network can provide a powerful communication medium among employees through e-mail (electronic mail) . E-mail is not the only form of improved communication made possible by computer networks, it is even easy for two or more people who work far apart to write a report together. c) Electronic Commerce : Third goal for increasing companies is doing business electronically with other companies as well as doing business with consumers over the internet.

2. Home Applications : a) Access to remote information : It comes in many forms. It can be surfing the WWW for information or just for fun. Information available induces the arts, business, cooking, government, health, history, hobbies, recreation etc. b) Person-to-person Communication : E-mail is already used on a daily basis by millions of people all over the world and its use is growing rapidly. It already routinely contains audio and video as well as text and pictures. Instant messaging is the facility which a group of people can type messages for all to see. This is done with an idea of chat room. Another type of communication often goes by the name of peer-to-peer communication. The idea is fairly simple. Members registered under the site had on their hard disks in a central database maintained on the server. If a members want to access, he checked the database to see who had it and went directly there to get it. c) Interactive Entertainment : It is easy to select a movie or program ever made, in any county and have it displayed on your screen instantly.

Computer Networks Page 1 Unit 1 -- Introduction d) Electronic commerce : Home shopping is already popular and enables users to inspect the online catalogs of thousand of companies. Some of these catalogs will provide the ability to get an instant video on any product by just clicking on products name. another area in which e-commerce is already happening is access to financial institutions.

3. Mobile Users 4. Social Issues

NETWORK HARDWARE Transmission technology classified as 1. Broadcast links : Broadcast networks have a single communication channel that is shared by all the machines on the network. Shot messages called packets in certain contexts, sent by any machine are received by all the others. An address field within the packet specifies the intended recipient. Upon receiving a packet, a machine checks the address field. If the packet is intended for the receiving machine, that machine processes the packet; if the packet is intended for some other machine, it is just ignored. When a packet with this code is transmitted, it is received and processed by every machine on the network, this mode of operation called broadcasting. Some broadcasting systems also support transmission to a subset of the machines, known as multicasting.

2. Point – to – point networks : It consists of many connections between individual pairs of machines. As a general rule, smaller localized networks make use of broadcasting where as larger networks are point-to-point. The transmission with one sender and one receiver is sometimes called as unicasting.

Local Area Networks (LAN): LANs are privately-owned networks within a single building or campus of up to few kilometers in size. They are widely used to connect personal computers and workstations in company offices. LANs are distinguished from other kind of networks by three characteristics

1) Size : LANs are restricted in size, which means the worst case transmission time is bounded and known in advance.

2) Transmission technology : LANs may use a transmission technology consisting of a cable to which all the machines are connected. LANs run at speed of 10Mbps to 100Mbps, have low delay, make few errors. Newer LANs operate at up to 10Gbps.

3) Topology : Various topologies are used by LAN’s. Bus Topology : In bus topology, at any instant at most one machine is the master and is allowed to transmit. All other machines are required to refrain from sending. An arbitration mechanism is needed to resolve conflicts when two or more machines want to transmit simultaneously. The arbitration mechanism may be centralized or distributed. Ex : Ethernet

Computer Networks Page 2 Unit 1 -- Introduction

Ring Topology : In a ring network, each bit propagates around on its own, not waiting or the rest of the packet to which it belongs. Typically each bit circumnavigates the entire ring in the time it takes to transmit a few bits, often before the complete packet has even been transmitted. Ex : FDDI

Broadcast networks can be further divided into static and dynamic, depending upon how the channel is allocated. Static : In this allocation ,we would divide the time into discrete intervals and use a round-robin algorithm, allowing each machine to broadcast only when its time slot comes up. This allocation wastes channel capacity when a machine has nothing to say during its allocated slot. Dynamic : This allocation may be centralized or distributed. In the centralized channel allocation method, there is a single entity which determines who goes next. It might accepts the request and making a decision according to some internal algorithm. In decentralized channel allocation method, there is no central entity; each machine must decide for itself whether to transmit.

Metropolitan Area Networks (MAN)  A MAN covers a city. The best example is cable television network.  At first, there were locally designed ad hoc systems.  Then companies began jumping into the business, getting contracts from city governments to wire up an entire city.  The next step was television programming and even entire channels designed for cable only.  Starting when the Internet attracted a mass audience, the cable TV network operators began to realize that with some changes to the system, they could provide two-way internet service in unused parts of the spectrum.  At that point the cable TV system began to morph from a way to distribute television to a metropolitan area network.

Computer Networks Page 3 Unit 1 -- Introduction

 In the figure we see both television signals and Internet being fed into centralized head end for subsequent distribution to peoples home.

Wide Area Networks (WAN)  A WAN spans a large geographical area, often a country or a continent.  It contains a collection of machines intended for running user programs called as hosts.  The hosts are connected by a communication subnet.  The hosts are owned by the customers whereas the communication subnet is typically owned and operated by telephone company or Internet Service Provider.  The job of subnet is to carry messages form host to host.  The subnet consists of two distinct components : transmission lines and switching elements.  Transmission lines move bits between links.  Switching elements are specialized computers that connect three or more transmission lines.  When data arrive on an incoming line, the switching element must choose an outgoing line on which to forward them. Switching Elements in computer terminology called routers.  Router makes the decision by using routing algorithm.  The subnet is according to the principle called as store-and-forward or packet-switched subnet.  When a process on some host has a message to be sent to a process on some other host, the sending host first cuts the message into packets, each one bearing its number in the sequence.  When packets are small in size, they are often called cells.  The packets are individually transported over the network and deposited at the receiving host where they are reassembled into the original message and delivered to the receiving process.

Computer Networks Page 4 Unit 1 -- Introduction

Internetworks  A collection of interconnected networks called an internetwork or internet.  Many networks exist in the world, often with different hardware and software.  People connected to one network often want to communicate with people attached to a different one.  The fulfillment of this desire requires that different and frequently incompatible networks, be connected, sometimes by means of machines called gateways to make the connection and provide the necessary translation, both in terms of hardware and software.

NETWORK SOFTWARE The first computer networks were designed with the hardware as the main concern and the software as the after thought. Network software is now highly structured.

To reduce their design complexity, most network are organized as a stack of layers or levels. The number of layers, the name of the layer, the contents of each layer and the function of each layer differ from network to network. The purpose of each layer is to offer certain services to the higher layers and receive services from the lower layers.

Layer n on one machine caries on conversation with layer n on another machine. The rules and conventions used in this conversation are collectively known as the layer n protocol. A protocol is an agreement between the communicating parties on how to communication is to proceed. In reality, no data are directly transferred from layer n on one machine to layer n on another machine. Instead, each layer passes data and control information to the layer immediate below it, until the lowest layer is reached. Below layer 1 there is a physical medium through which actual communication occurs.

Between each pair of adjacent layer is an interface. The interface defines which primitive operations and services the lower layer makes available to the upper one. A set of layers and protocols is called network architecture. A list of protocols used by a certain system, one protocol per layer, is called a protocol stack.

Computer Networks Page 5 Unit 1 -- Introduction

 A message M, is produced by an application process running in layer 5 and given to layer 4 for transmission.  Layer 4 puts a header in front of the message to identify the message and passes the result to layer 3.  The header includes control information, such as sequence numbers to allow layer 4 on the destination machine to deliver messages in the right order if the lower layers do not maintain sequence.  In many networks, there is no limit to the size of the messages transmitted in the layer 4 protocol, but there is nearly always a limit imposed by the layer 3 protocol.  So it break up the incoming messages into smaller units called packets prepending a layer 3 header to each packet.  Layer 3 decides which of the outgoing lines to use and passes the packets to layer 2.  Layer 2 adds not only header to each piece, but also trailer and gives the resulting unit to layer 1 for physical transmission.  At receiving machine the message moves upwards from layer to layer, with headers being stripped off as it progresses.

Design Issues for the layers 1. Every layer needs a mechanism for identifying senders and receivers. Network have many computers, some of which have multiple processes, a means is needed for a process on one machine to specify with whom it wants to talk. So some form of Addressing is needed. 2. Network concerns the rules for data transfer. In some systems, data only travel in one direction; in others, data can go both ways. The protocol must also determine how many logical connections. Many networks provide at least two logical channels per connection, one for normal data and one for urgent data. 3. Error Control is an important issue because physical communication circuits are not perfect. Many error-detecting and error-correcting codes are known, but both ends of the connection must agree on which one is being used. 4. An issue that occurs at every level is how to keep a fast sender from swamping a slow receiver with data. This subject is called flow control. 5. The inability of all processes to accept arbitrarily long messages must be solved. This property leads to mechanisms for disassembling, transmitting and then reassembling messages.

Computer Networks Page 6 Unit 1 -- Introduction

6. When it is inconvenient or expensive to set up a separate connection or each pair of communicating processes, the underlying layer may decide to use the same connection for multiple, unrelated conversations. With use of multiplexing and demultiplexing it can be done by any layer. 7. When there is a multiple paths between source and destination, a route must be chosen. This is termed as routing.

Connection Oriented Services  Connection oriented service is modeled after the telephone system.  To talk to someone, you pick up the phone, dial the number, talk and then hang up.  Similarly in connection-oriented network, the service user first establishes a connection, uses the connection and then releases the connection.  It provides reliable message stream, reliable byte stream, but unreliable connection.

Connection Less Services  It is modeled after the postal system. Each letter carries the full destination address, and each one is routed through the system independent of all the others.  Normally, when two messages are sent to same address, the first one is received first. But there may be cases where second message delivers first.  Also known as datagram service. It provides unreliable message. It can be made as reliable service by using acknowledged datagram service or request-reply service.

Selective Primitives  A service is formally specified by a set of primitives (operations) available to a user process to access the service.  Primitives will tell the service to perform some action or report on an action taken by a peer entity.  The set of primitives available depends on the nature of the service being provided.  The primitives for connection oriented service are different from connection less services. Example primitives for implementing a simple connection oriented service is Primitive Meaning LISTEN Block waiting for an incoming connection CONNECT Establish a connection with a waiting peer RECEIVE Block waiting for an incoming message SEND Send a message to the peer DISCONNECT Terminate the connection

1. The server executes LISTEN to indicate that it is prepared to accept incoming connections. 2. The client process executes CONNECT to establish a connection with the server. The CONNECT call needs to specify who to connect to, so it might have a parameter giving the server’s address. 3. The next step is for the server to execute RECEIVE to prepare to accept the first request. 4. Then the client executes SEND to transmit its request followed by the execution of RECEIVE to get the reply. 5. Server process the request, it uses SEND to return the answer to the client. 6. If it is done, the client can use DISCONNECT to terminate the connection.

Computer Networks Page 7 Unit 1 -- Introduction

7. Usually, an initial DISCONNECT is a blocking call, suspending the client and sending a packet to the server saying that connection is no longer needed. 8. When the server gets the packet, it also issues a DISCONNECT of its own, acknowledging the client and releasing the connection.

Types of Communication There are three ways of communication or data transfer. They are 1. Simplex Communication : Data travels only in one direction. Eg. Cable TV network 2. Half Duplex Communication : Data transmission is possible in both directions but not simultaneously. 3. Full Duplex Communication : Data transmission can be in both the directions even at the same time. E.g. Telephone

OSI REFERENCE MODEL The model is called the ISO OSI (open Systems Interconnection) Reference Model because it deals with connecting open systems – that is, system that are open for communication with other systems. It has seven layers 1. Physical Layer 2. Data Link Layer 3. Network Layer 4. Transport Layer 5. Session Layer 6. Presentation Layer 7. Application Layer

Physical Layer  Physical layer is concerned with transmitting raw bits over a communication channel.

Computer Networks Page 8 Unit 1 -- Introduction

 The design issues have to do with making sure that when one side sends a 1 bit, it is receives 1 bit on other side but not 0.  Other design issues largely deal with transmission , electrical, and physical transmission medium, which lies below the physical layer.

Data Link Layer  The main task of the data link layer is to transform a raw transmission facility into a line that appears free of undetected transmission errors to the network layer.  It breaks the data into data frames and takes care of acknowledgements.  It solves the problems caused by damaged, lost and duplicate frames. It retransmits if a frame is lost.  It regulates the traffic in case of fast sender transmitting to a slow receiver.  A special sub layer of the data link layer, the medium access control sublayer, deals with the problem of broadcast networks.

Network Layer  Network layer controls the operation of the subnet.  It establishes routes form source to destination by using routing algorithms.  It controls the congestion i.e. if too many packets are present in the subnet at the same time, it will get rid of this situation.  It keeps track of accounting information about the data sent by each user.  It establishes connections with other heterogeneous networks.

Transport Layer  Transport layer accepts data from the session layer, divide it into small pieces if necessary, pass these small pieces to the network layer and make sure that the data reached the other end correctly.  It establishes and deletes connections across the network and regulates the flow of information.  It takes care of multiplexing data and establishing multiple connections when high throughput is in demand.

Session Layer  Session layer allows users on different machine to establish sessions.  It manages the dialogue control in situations like half-duplex communications.  The session layer prevents both sides from attempting the same operation at the same time by a service called token management.  It provides synchronization by inserting checkpoints into the data stream so that after a crash, only the data transferred after the last checkpoint have to be retransferred.

Presentation Layer  Presentation layer is mainly interested in the syntax and semantics of the information transmitted.

Computer Networks Page 9 Unit 1 -- Introduction

 It converts the information between the representations used in individual computer and globally accepted standards.

Application Layer  Application layer contains various protocols implemented for user interaction. Ex. HTTP  Since different file systems use their own representation for files names, file transfer between different file systems is commonly implemented in application layer.

TCP/IP REFERENCE MODEL TCP/IP reference models was designed with the following goals : 1. Connecting multiple networks to make them look as a single network. 2. Enabling network to survive from partial failures except for some critical failures. TCP/IP reference model consists four layers

Internet Layer  Internet Layer is similar to the network layer in OSI model.  It enables the hosts in any network to send packets to the destinations in any network. These packets take independent paths between the source and destination. They may not even reach the destination in the same order. It is the responsibility of higher layers to arrange them in proper order.  The format of these packets and the delivery protocol is defined by the internet layer itself.  The delivery protocol is called “internet protocol” (IP) and is a connectionless protocol.

Transport Layer Two end-to-end protocols were defined in this layer which enable the source and destination peers to exchange data with each other. They are Transmission Control Protocol (TCP)  It is a reliable connection –orient protocol.  It enables error-free transmission  It segments the incoming data stream into discrete messages at the sender and groups those messages into the output data stream at the receiving end.  It handles flow-control also to synchronize the data transfers between fast senders and slow receivers.

User Datagram Protocol (UDP)  It is unreliable connectionless protocol.

Computer Networks Page 10 Unit 1 -- Introduction

 It does not handle sequencing of messages and flow control.  It is generally used in application involving client-server interaction, speech or video

Application Layer All high level protocols are implemented in this layer. They include  TELNET - Virtual Terminal  FTP - File Transfer Protocol  SMTP - Simple Mail Transfer Protocol  DNS - Domain Name Space

Host-to-Network Layer  This layer is similar to data link layer and physical layer in OSI reference model.  TCP/IP reference model does not much about this layer.

COMPARISION OF OSI AND TCP/IP REFERENCE MODELS  Both the reference models are based on the concept of a stack of protocols.  Layers in both the models have roughly functionalities. The differences are as follows : OSI TCP/IP This model clearly distinguishes among the concepts This model does not pay much attention in this of services, interfaces and protocols. distinction. Protocols of each layer are hidden from that of other The same applies in this model also but the layers transparency is less. New technologies can be added easily It is not so easy to add new technology in this model This model was designed before its protocols came First protocols came and then the model. into existence. This model has seven layers This model has four layers It supports both connection less and connection- It supports only connectionless internet protocol (IP) in oriented protocols in its network layer its corresponding internetwork layer.

NOVELL NETWARE  Novell Netware was designed for the companies varying from mainframe to a network of PC’s.  Novell Netware is based on the client-server model.  In this system, each user has a PC which functions as a client. And, some of the PC’s which are more powerful than the client’s one are used as servers.  The servers provides a number of services such as file services, database services and others.  The protocol stack used in Novell Netware is

Application Layer SAP File Server …

Computer Networks Page 11 Unit 1 -- Introduction

Transport Layer NCP SPX

Network Layer IPX

Data Link Layer Ethernet Token Ring ARC Net

Physical Layer Ethernet Token Ring ARC Net

Physical Layer  The physical layer can be taken from among various industries standard such as Ethernet, Token Ring, ARC Net.

Data Link Layer  The data link layer is also similar to physical layer in which any industry standards can be chosen such as Ethernet, Token Ring and ARC net.

Network Layer  The network layer implements an unreliable connectionless internetwork protocol called IPX (Internet Packet eXchange).  In this layer the packets are passed from source to destination in a transparent manner.  The source and destination can be located on different networks.  The IPX uses 12 bytes of address. The format of IPX packet is

2 2 1 1 12 12 variable Check Packet Transport Packet Destination Address Source Address Data Sum Length Control Type

Checksum (2 bytes) : It is rarely used since the underlying data link layer also provides checksum. Packet length (2 bytes) : It tells how long the entire packet is, header plus data. Transport Control (1 byte) : It counts how many networks the packet has traversed. When it exceeds a maximum, a packet is discarded. Packet Type (1 byte) : It is used to mark various control packets. Destination Address (12 bytes) : It indicates the address of receiver (destination) Source Address (12 bytes) : It indicates the address of sender (source). Date (Variable Length) : This field consists of the original message or data to be transmitted.

Transport Layer  The transport layer runs a connection oriented transport protocol called NCP (Network Core Protocol).  A part from the data transportation, NCP provides various other services.  NCP is treated as the heart of the Novell NetWare.  The layer also makes use of second protocol called SPX (Sequenced Packet eXchange) which provide only transportation.

Application Layer

Computer Networks Page 12 Unit 1 -- Introduction

 The application layer consists of various protocols such as SAP(Service Advertising Protocol).  About once in a minute, each server broadcast a packet giving its address and telling what services it offers. The packets are seen and collected by special agent processes running on the router machines.  When a client machine is booted, it broadcasts a request asking where the nearest server is.  The agent on the local router machine sees the request, looks in its database of servers and matches up the request with the best server. The choice of server to use is then sent back to the client.  The client now establish an NCP connection with server.

ARPANET  In mid-1960’s at the height of the Cole War, DoD wanted a command and control network that could survive a nuclear war.  Traditional circuit switched telephone networks were considered too vulnerable, since loss of one line or switch would certainly terminate all conversations using them and might even partition the network.  To solve this problem, DoD turned to its research arm, ARPA (Advanced Research Projects Agency) was created.  ARPA decided that the network the DoD needed should be packet-switched network, consisting of a subnet and host computers.  The subnet would consist of minicomputers called IMP’s (Interface Message Processors) connected by transmission lines.  For high reliability, each IMP would be connected to at least two other IMP’s. The subnet was to be a datagram subnet, so if some lines and IMP’s were destroyed, messages could be automatically rerouted along alternative path.  Each node of the network was to consist of an IMP and a host, in the same room, connected by a wire.  A host could send messages of up to 8063 bits to its IMP, which would then break these up into packets of at most 1008 bits and forward them independently toward the destination.  Each packet was received in its entirety before being forwarded, so the subnet was the first electronic store and forward packet switching network.  The software was split into two parts : subnet and host.  The subnet software consisted of the IMP end of the host-IMP connection, the IMP – IMP protocol, and a source IMP to destination IMP protocol to improve reliability.

 Outside the subnet, software was also needed namely, the host of the host-IMP connection, the host- host protocol, and the application software.

Computer Networks Page 13 Unit 1 -- Introduction

 Later the IMP software was changed to allow terminals to connect directly to a special IMP, called a TIP (Terminal Interface Processor).  Subsequent changes included having multiple hosts per IMP, host talking to multiple IMPs, and hosts and IMPs separated by a large distance.  As the scale increased, finding hosts became increasingly expensive, so DNS (Domain Name System) was created to organize machines into domains and map host names onto IP addresses.

Computer Networks Page 14

Recommended publications