You are on page 1of 17

1

Page 1 of 17

1. Computer Networks
Introduction What Is a Network? A network is nothing more than two or more computers connected to each other so that they can exchange information, such as e-mail messages or documents, or share resources, such as disk storage or printers. In most cases, this connection is made via electrical cables that carry the information in the form of electrical signals. But in some cases, other types of connections are used. For example, fiber-optic cables let computers communicate at extremely high speeds by using impulses of light. Wireless networks let computers communicate by using radio signals, so the computers arent restricted by physical cables. In addition to the hardware that comprises the network, a network also requires special software to enable communications. In the early days of networking, you had to add this software to each computer on the network. Nowadays, network support is built into all major operating systems, including all current versions of Windows, Macintosh operating systems, and Linux. A group of computers and associated peripheral devices connected by a communication channel capable of sharing files and other resources among several users is computer network. A network can range from a peer-to-peer network connecting a small number of users in an office or department, to a LAN connecting many users over permanently installed cables and dial-up lines, to a MAN or WAN connecting users on several networks spread over a wide geographic area. Uses of computer network 1. Business Applications Resource sharing the goal is to make all programs, equipment, and especially data available to anyone on the network without regard to the physical location of the resource and the user. An obvious and widespread example is having a group of office workers share a common printer. None of the individuals really needs a private printer, and a high-volume networked printer is often cheaper, faster, and easier to maintain than a large collection of individual printers. Communication medium A second goal of setting up a computer network has to do with people rather than information or even computers. A computer network can provide a powerful communication medium among employees. Virtually every company that has two or more computers now has e-mail (electronic mail), which employees generally use for a great deal of daily communication. In fact, a common gripe around the water cooler is how much email everyone has to deal with, much of it meaningless because bosses have discovered that they can send the same (often content-free) message to all their subordinates at the push of a button. A third goal for increasingly many companies is doing business electronically with other companies, especially suppliers and customers. For example, manufacturers of automobiles, aircraft, and computers, among others, buy subsystems from a variety of suppliers and then assemble the parts. Using computer networks, manufacturers can place orders electronically as needed. Being able to place orders in real time (i.e., as needed) reduces the need for large inventories and enhances efficiency. E-commerce (electronic commerce) A fourth goal that is starting to become more important is doing business with consumers over the Internet. Airlines, bookstores, and music vendors have discovered that many customers like the convenience of shopping from home. Consequently, many companies provide catalogs of their goods and services online and take orders on-line. This sector is expected to grow quickly in the future. It is called e-commerce (electronic commerce). 2. Home Applications Access to remote information Access to remote information comes in many forms. It can be surfing the World Wide Web for information or just for fun. Information available includes the arts, business, cooking, government, health, history, hobbies, recreation, science, sports, travel, and many others. Fun comes in too many ways to mention, plus

file://D:\Documents and Settings\Shishir\Desktop\notesof cn.htm

4/28/2012

Page 2 of 17

some ways that are better left unmentioned. Person-to-person communication The second broad category of network use is personto-person communication, basically the 21st century's answer to the 19th century's telephone. E-mail is already used on a daily basis by millions of people all over the world and its use is growing rapidly. It already routinely contains audio and video as well as text and pictures. Smell may take a while. Interactive entertainment Our third category is entertainment, which is a huge and growing industry. The killer application here (the one that may drive all the rest) is video on demand. A decade or so hence, it may be possible to select any movie or television program ever made, in any country, and have it displayed on your screen instantly. New films may become interactive, where the user is occasionally prompted for the story direction (should Macbeth murder Duncan or just bide his time?) with alternative scenarios provided for all cases. Live television may also become interactive, with the audience participating in quiz shows, choosing among contestants, and so on. Electronic commerce Our fourth category is electronic commerce in the broadest sense of the term. Home shopping is already popular and enables users to inspect the on-line catalogs of thousands of companies. Some of these catalogs will soon provide the ability to get an instant video on any product by just clicking on the product's name. After the customer buys a product electronically but cannot figure out how to use it, on-line technical support may be consulted.

3. Mobile Users Mobile computers, such as notebook computers and personal digital assistants (PDAs), are one of the fastest-growing segments of the computer industry. Many owners of these computers have desktop machines back at the office and want to be connected to their home base even when away from home or en route. Since having a wired connection is impossible in cars and airplanes, there is a lot of interest in wireless networks. In this section we will briefly look at some of the uses of wireless networks. A common reason to use this is the portable office. People on the road often want to use their portable electronic equipment to send and receive telephone calls, faxes, and electronic mail, surf the Web, access remote files, and log on to remote machines. And they want to do this from anywhere on land, sea, or air. For example, at computer conferences these days, the organizers often set up a wireless network in the conference area. Anyone with a notebook computer and a wireless modem can just turn the computer on and be connected to the Internet, as though the computer were plugged into a wired network. Similarly, some universities have installed wireless networks on campus so students can sit under the trees and consult the library's card catalog or read their e-mail. Wireless networks are of great value to fleets of trucks, taxis, delivery vehicles, and repairpersons for keeping in contact with home. For example, in many cities, taxi drivers are independent

file://D:\Documents and Settings\Shishir\Desktop\notesof cn.htm

4/28/2012

Page 3 of 17

businessmen, rather than being employees of a taxi company. In some of these cities, the taxis have a display the driver can see. When a customer calls up, a central dispatcher types in the pickup and destination points. This information is displayed on the drivers' displays and a beep sounds. The first driver to hit a button on the display gets the call. Wireless networks are also important to the military. If you have to be able to fight a war anywhere on earth on short notice, counting on using the local networking infrastructure is probably not a good idea. It is better to bring your own. Although wireless networking and mobile computing are often related, they are not identical. Here we see a distinction between fixed wireless and mobile wireless. Even notebook computers are sometimes wired. For example, if a traveler plugs a notebook computer into the telephone jack in a hotel room, he has mobility without a wireless network.
Table: Combinations of wireless networks and mobile computing.

On the other hand, some wireless computers are not mobile. An important example is a company that owns an older building lacking network cabling, and which wants to connect its computers. Installing a wireless network may require little more than buying a small box with some electronics, unpacking it, and plugging it in. This solution may be far cheaper than having workmen put in cable ducts to wire the building. But of course, there are also the true mobile, wireless applications, ranging from the portable office to people walking around a store with a PDA doing inventory. At many busy airports, car rental return clerks work in the parking lot with wireless portable computers. They type in the license plate number of returning cars, and their portable, which has a built-in printer, calls the main computer, gets the rental information, and prints out the bill on the spot. As wireless technology becomes more widespread, numerous other applications are likely to emerge. Let us take a quick look at some of the possibilities. Wireless parking meters have advantages for both users and city governments. The meters could accept credit or debit cards with instant verification over the wireless link. When a meter expires, it could check for the presence of a car (by bouncing a signal off it) and report the expiration to the police. It has been estimated that city governments in the U.S. alone could collect an additional $10 billion this way. Furthermore, better parking enforcement would help the environment, as drivers who knew their illegal parking was sure to be caught might use public transport instead. Food, drink, and other vending machines are found everywhere. However, the food does not get into the machines by magic. Periodically, someone comes by with a truck to fill them. If the vending machines issued a wireless report once a day announcing their current inventories, the truck driver would know which machines needed servicing and how much of which product to bring. This information could lead to more efficient route planning. Of course, this information could be sent over a standard telephone line as well, but giving every vending machine a fixed telephone connection for one call a day is expensive on account of the fixed monthly charge. Another area in which wireless could save money is utility meter reading. If electricity, gas, water, and other meters in people's homes were to report usage over a wireless network, there would be no need to send out meter readers. Similarly, wireless smoke detectors could call the fire department instead of making a big noise (which has little value if no one is home). As the cost of both the radio devices and the air time drops, more and more measurement and reporting will be done with wireless

file://D:\Documents and Settings\Shishir\Desktop\notesof cn.htm

4/28/2012

Page 4 of 17

networks. 4. Social Issues The widespread introduction of networking has introduced new social, ethical, and political problems. The trouble comes when newsgroups are set up on topics that people actually care about, like politics, religion, or sex. Views posted to such groups may be deeply offensive to some people. Worse yet, they may not be politically correct. Furthermore, messages need not be limited to text. High-resolution color photographs and even short video clips can now easily be transmitted over computer networks. Some people take a live-and-let-live view, but others feel that posting certain material (e.g., attacks on particular countries or religions, pornography, etc.) is simply unacceptable and must be censored. Different countries have different and conflicting laws in this area. Thus, the debate rages. Another fun area is employee rights versus employer rights. Many people read and write e-mail at work. Many employers have claimed the right to read and possibly censor employee messages, including messages sent from a home computer after work. Not all employees agree with this. Even if employers have power over employees, does this relationship also govern universities and students? How about high schools and students? In 1994, Carnegie-Mellon University decided to turn off the incoming message stream for several newsgroups dealing with sex because the university felt the material was inappropriate for minors (i.e., those few students under 18). The fallout from this event took years to settle. Another key topic is government versus citizen. The FBI has installed a system at many Internet service providers to snoop on all incoming and outgoing e-mail for nuggets of interest to it (Blaze and Bellovin, 2000; Sobel, 2001; and Zacks, 2001). The system was originally called Carnivore but bad publicity caused it to be renamed to the more innocent-sounding DCS1000. But its goal is still to spy on millions of people in the hope of finding information about illegal activities. Unfortunately, the Fourth Amendment to the U.S. Constitution prohibits government searches without a search warrant. Whether these 54 words, written in the 18th century, still carry any weight in the 21st century is a matter that may keep the courts busy until the 22nd century. The government does not have a monopoly on threatening people's privacy. The private sector does its bit too. For example, small files called cookies that Web browsers store on users' computers allow companies to track users' activities in cyberspace and also may allow credit card numbers, social security numbers, and other confidential information to leak all over the Internet (Berghel, 2001). Along with the good comes the bad. Life seems to be like that. The Internet makes it possible to find information quickly, but a lot of it is ill-informed, misleading, or downright wrong. The medical advice you plucked from the Internet may have come from a Nobel Prize winner or from a high school dropout. Computer networks have also introduced new kinds of antisocial and criminal behavior. Electronic junk mail (spam) has become a part of life because people have collected millions of e-mail addresses and sell them on CD-ROMs to would-be marketers. E-mail messages containing active content (basically programs or macros that execute on the receiver's machine) can contain viruses that wreak havoc. Identity theft is becoming a serious problem as thieves collect enough information about a victim to obtain get credit cards and other documents in the victim's name. Finally, being able to transmit music and video digitally has opened the door to massive copyright violations that are hard to catch and enforce. A lot of these problems could be solved if the computer industry took computer security seriously. If all messages were encrypted and authenticated, it would be harder to commit mischief. This

file://D:\Documents and Settings\Shishir\Desktop\notesof cn.htm

4/28/2012

Page 5 of 17

technology is well established. The problem is that hardware and software vendors know that putting in security features costs money and their customers are not demanding such features. In addition, a substantial number of the problems are caused by buggy software, which occurs because vendors keep adding more and more features to their programs, which inevitably means more code and thus more bugs. A tax on new features might help, but that is probably a tough sell in some quarters. A refund for defective software might be nice, except it would bankrupt the entire software industry in the first year. Network building blocks Client computers: The computers that end users use to access the resources of the network. Client computers are typically located on users desks. They usually run a desktop version of Windows such as Windows XP Professional, along with application software such as Microsoft Office. Client computers are sometimes referred to as workstations. Server computers: Computers that provide shared resources, such as disk storage and printers, as well as network services, such as e-mail and Internet access. Server computers typically run a specialized network operating system such as Windows Server 2003, NetWare, or Linux, along with special software to provide network services. For example, a server may run Microsoft Exchange to provide e-mail services for the network, or it may run Apache Web Server so that the computer can serve Web pages. Network interface cards (NICs): A card installed in a computer that enables the computer to communicate over a network. Almost all NICs implement a networking standard called Ethernet. Newer computers come with either Ethernet cards already installed or with Ethernet support built into the motherboard so a separate card is not required. Every client and every server computer must have a network interface card (or a built-in network port) in order to be a part of a network. Cable: Computers in a network are usually physically connected to each other using cable. Although several types of cable have been popular over the years, the most commonly used cable today is called twisted pair, also known by its official designation 10BaseT. Another type of cable commonly used is coaxial, also called 10Base2. For high-speed network connections, fiber-optic cable is sometimes used. In many cases, the cables run through the walls and converge on a central room called a wiring closet. But for smaller networks, the cables are often just strung along the floor. Switches: Network cable usually doesnt connect computers directly to each other. Instead, each computer is connected by cable to a device known as a switch. The switch, in turn, connects to the rest of the network. Each switch contains a certain number of ports, typically 8 or 16.Thus, you can use an eight-port switch to connect up to eight computers. Switches can be connected to each other to build larger networks. Older networks may use a more primitive type of device called a hub instead of a switch. A hub provides the same function as a switch, but it isnt as efficient. The term hub is sometimes used to mean switch, even though hubs and switches are not technically the same thing. Wireless networks: In many networks, cables and switches are making way for wireless network connections, which enable computers to communicate via radio signals. In a wireless network, radio transmitters and receivers take the place of cables. The main advantage of wireless networking is its flexibility. With a wireless network, you dont have to run cables through walls or ceilings, and your client computers can be located anywhere within range of the network broadcast. The main disadvantage of wireless networking is that it is inherently less secure than a cabled network. Network software: Although network hardware is essential, what really makes a network work is software. A whole bunch of software has to be set up just right in order to get a network working. Server computers typically use a special network operating system (also known as a NOS) in order to function efficiently, and client computers need to have their network settings configured properly in order to access the network. One of the most important networking choices to make is which network operating system youll use on the networks servers. Thats because much of the task of building a new network and managing an existing one is setting up and maintaining the network operating system on the servers. Network Hardware

file://D:\Documents and Settings\Shishir\Desktop\notesof cn.htm

4/28/2012

Page 6 of 17

Broadly speaking, there are two types of transmission technology that are in widespread use. They are as follows: 1. Broadcast links. 2. Point-to-point links. Broadcast networks have a single communication channel that is shared by all the machines on the network. Short messages, called packets in certain contexts, sent by any machine are received by all the others. An address field within the packet specifies the intended recipient. Upon receiving a packet, a machine checks the address field. If the packet is intended for the receiving machine, that machine processes the packet; if the packet is intended for some other machine, it is just ignored. As an analogy, consider someone standing at the end of a corridor with many rooms off it and shouting Watson, come here. I want you. Although the packet may actually be received (heard) by many people, only Watson responds. The others just ignore it. Another analogy is an airport announcement asking all flight 644 passengers to report to gate 12 for immediate boarding. Broadcast systems generally also allow the possibility of addressing a packet to all destinations by using a special code in the address field. When a packet with this code is transmitted, it is received and processed by every machine on the network. This mode of operation is called broadcasting. Some broadcast systems also support transmission to a subset of the machines, something known as multicasting. One possible scheme is to reserve one bit to indicate multicasting. The remaining n - 1 address bits can hold a group number. Each machine can ''subscribe'' to any or all of the groups. When a packet is sent to a certain group, it is delivered to all machines subscribing to that group. In contrast, point-to-point networks consist of many connections between individual pairs of machines. To go from the source to the destination, a packet on this type of network may have to first visit one or more intermediate machines. Often multiple routes, of different lengths, are possible, so finding good ones is important in point-to-point networks. As a general rule (although there are many exceptions), smaller, geographically localized networks tend to use broadcasting, whereas larger networks usually are point-to-point. Point-to-point transmission with one sender and one receiver is sometimes called unicasting. Local Area Networks Local area networks, generally called LANs, are privately-owned networks within a single building or campus of up to a few kilometers in size. They are widely used to connect personal computers and workstations in company offices and factories to share resources (e.g., printers) and exchange information. LANs are distinguished from other kinds of networks by three characteristics: (1) their size, (2) their transmission technology, and (3) their topology. LANs are restricted in size, which means that the worst-case transmission time is bounded and known in advance. Knowing this bound makes it possible to use certain kinds of designs that would not otherwise be possible. It also simplifies network management. LANs may use a transmission technology consisting of a cable to which all the machines are attached, like the telephone company party lines once used in rural areas. Traditional LANs run at speeds of 10 Mbps to 100 Mbps, have low delay (microseconds or nanoseconds), and make very few errors. Newer LANs operate at up to 10 Gbps. We will adhere to tradition and measure line speeds in megabits/sec (1 Mbps is 1,000,000 bits/sec) and gigabits/sec (1 Gbps is 1,000,000,000 bits/sec). Various topologies are possible for broadcast LANs. Figure shows two of them. In a bus (i.e., a linear cable) network, at any instant at most one machine is the master and is allowed to transmit. All

file://D:\Documents and Settings\Shishir\Desktop\notesof cn.htm

4/28/2012

Page 7 of 17

other machines are required to refrain from sending. An arbitration mechanism is needed to resolve conflicts when two or more machines want to transmit simultaneously. The arbitration mechanism may be centralized or distributed. IEEE 802.3, popularly called Ethernet, for example, is a bus-based broadcast network with decentralized control, usually operating at 10 Mbps to 10 Gbps. Computers on an Ethernet can transmit whenever they want to; if two or more packets collide, each computer just waits a random time and tries again later.
Figure: Two broadcast networks. (a) Bus. (b) Ring.

A second type of broadcast system is the ring. In a ring, each bit propagates around on its own, not waiting for the rest of the packet to which it belongs. Typically, each bit circumnavigates the entire ring in the time it takes to transmit a few bits, often before the complete packet has even been transmitted. As with all other broadcast systems, some rule is needed for arbitrating simultaneous accesses to the ring. Various methods, such as having the machines take turns, are in use. IEEE 802.5 (the IBM token ring), is a ring-based LAN operating at 4 and 16 Mbps. FDDI is another example of a ring network. Broadcast networks can be further divided into static and dynamic, depending on how the channel is allocated. A typical static allocation would be to divide time into discrete intervals and use a roundrobin algorithm, allowing each machine to broadcast only when its time slot comes up. Static allocation wastes channel capacity when a machine has nothing to say during its allocated slot, so most systems attempt to allocate the channel dynamically (i.e., on demand). Dynamic allocation methods for a common channel are either centralized or decentralized. In the centralized channel allocation method, there is a single entity, for example, a bus arbitration unit, which determines who goes next. It might do this by accepting requests and making a decision according to some internal algorithm. In the decentralized channel allocation method, there is no central entity; each machine must decide for itself whether to transmit. You might think that this always leads to confusion, but it does not. Metropolitan Area Networks A metropolitan area network, or MAN, covers a city. The best-known example of a MAN is the cable television network available in many cities. This system grew from earlier community antenna systems used in areas with poor over-the-air television reception. In these early systems, a large antenna was placed on top of a nearby hill and signal was then piped to the subscribers' houses. At first, these were locally-designed, ad hoc systems. Then companies began jumping into the business, getting contracts from city governments to wire up an entire city. The next step was television programming and even entire channels designed for cable only. Often these channels were highly specialized, such as all news, all sports, all cooking, all gardening, and so on. But from their inception until the late 1990s, they were intended for television reception only. Starting when the Internet attracted a mass audience, the cable TV network operators began to

file://D:\Documents and Settings\Shishir\Desktop\notesof cn.htm

4/28/2012

Page 8 of 17

realize that with some changes to the system, they could provide two-way Internet service in unused parts of the spectrum. At that point, the cable TV system began to morph from a way to distribute television to a metropolitan area network. To a first approximation, a MAN might look something like the system shown in figure. In this figure we see both television signals and Internet being fed into the centralized head end for subsequent distribution to people's homes. Figure: A metropolitan area network based on cable TV.

Cable television is not the only MAN. Recent developments in high-speed wireless Internet access resulted in another MAN, which has been standardized as IEEE 802.16. Wide Area Networks A wide area network, or WAN, spans a large geographical area, often a country or continent. It contains a collection of machines intended for running user (i.e., application) programs. We will follow traditional usage and call these machines hosts. The hosts are connected by a communication subnet, or just subnet for short. The hosts are owned by the customers (e.g., people's personal computers), whereas the communication subnet is typically owned and operated by a telephone company or Internet service provider. The job of the subnet is to carry messages from host to host, just as the telephone system carries words from speaker to listener. Separation of the pure communication aspects of the network (the subnet) from the application aspects (the hosts), greatly simplifies the complete network design. In most wide area networks, the subnet consists of two distinct components: transmission lines and switching elements. Transmission lines move bits between machines. They can be made of copper wire, optical fiber, or even radio links. Switching elements are specialized computers that connect three or more transmission lines. When data arrive on an incoming line, the switching element must choose an outgoing line on which to forward them. These switching computers have been called by various names in the past; the name router is now most commonly used. In this model, shown in figure, each host is frequently connected to a LAN on which a router is present, although in some cases a host can be connected directly to a router. The collection of communication lines and routers (but not the hosts) form the subnet. Figure: Relation between hosts on LANs and the subnet

file://D:\Documents and Settings\Shishir\Desktop\notesof cn.htm

4/28/2012

Page 9 of 17

Network Topology The term network topology refers to the shape of how the computers and other network components are connected to each other. There are several different types of network topologies, each with advantages and disadvantages. Node: A node is a device that is connected to the network. A node is the same as a computer. Network topology deals with how the nodes of a network are connected to each other. Packet: A packet is a message that is sent over the network from one node to another node. The packet includes the address of the node that sent the packet, the address of the node the packet is being sent to, and data. Bus topology The first type of network topology is called a bus, in which nodes are strung together in a line, as shown in figure below. Bus topology is commonly used for LANs.

Figure: Bus topology Information sent from a node travels along the backbone until it reaches its destination node. Each end of a bus network must be terminated with a resistor to keep the signal that is sent by a node across the network from bouncing back when it reaches the end of the cable. In a bus topology, every node on the network can see every packet thats sent on the cable. Each node looks at each packet to determine whether the packet is intended for it. If so, the node claims the packet. If not, the node ignores the packet. This way, each computer can respond to data sent to it and ignore data sent to other computers on the network. If the cable in a bus network breaks, the network is effectively divided into two networks. Nodes on either side of the break can continue to communicate with each other, but data cant span the gap between the networks, so nodes on opposite sides of the break cant communicate with each other. Star topology In a star topology, each network node is connected to a central device called a hub or a switch, as shown in figure. The hub takes a signal that comes from any node and passes it along to all the other

file://D:\Documents and Settings\Shishir\Desktop\notesof cn.htm

4/28/2012

Page 10 of 17

nodes in the network. A hub does not perform any type of filtering or routing of the data. It is simply a junction that joins all the different nodes together. Star topologies are also commonly used with LANs. If a cable in a star network breaks, only the node connected to that cable is isolated from the network. The other nodes can continue to operate without interruption unless, of course, the node thats isolated because of the break happens to be the file server. You should be aware of the somewhat technical distinction between a hub and a switch. Simply put, a hub doesnt know anything about the computers that are connected to each of its ports. So when a computer connected to the hub sends a packet to a computer thats connected to another port, the hub sends a duplicate copy of the packet to all its ports. In contrast, a switch knows which computer is connected to each of its ports. As a result, when a switch receives a packet intended for a particular computer, it sends the packet only to the port that the recipient is connected to. Strictly speaking, only networks that use switches have a true star topology. If the network uses a hub, the network topology has the physical appearance of a star, but is actually a bus. Thats because when a hub is used, each computer on the network sees all the packets sent over the network, just like in a bus topology. In a true star topology, as when a switch is used, each computer sees only those packets that were sent specifically to it, as well as broadcast packets that were specifically sent to all computers on the network.

Figure: Star topology Expanding stars Physicists tell us that the universe is expanding, and network administrators know theyre right. A simple bus or star topology is suitable only for small networks, with a dozen or so computers, but small networks inevitably become large networks as more computers are added. For larger networks, its common to create more complicated topologies that combine stars and buses. For example, a bus can be used to connect several stars. In this case, two or more hubs or switches are connected to each other using a bus. Each of these hubs or switches is then the center of a star that connects two or more computers to the network. Figure: A typical star bus network This type of arrangement is commonly used in buildings that have two or more distinct workgroups. The bus that connects the switches is sometimes called a backbone. Another way to expand a star topology is to use a technique called daisy- chaining. When you use daisy-chaining, a hub or switch is connected to another hub or switch as if it were one of the nodes on the star. Then, this second hub or switch serves as the center of a second star. Nodes in particular

file://D:\Documents and Settings\Shishir\Desktop\notesof cn.htm

4/28/2012

Page 11 of 17

areas are connected to hubs (creating stars), and the hubs are connected together along the network backbone (like a bus network). Ring topology A third type of network topology is called a ring, shown in figure. Like a bus network, rings have the nodes daisy-chained. The difference is that the end of the network comes back around to the first node, creating a complete circuit. In a ring network, each node takes a turn sending and receiving information through the use of a token. The token, along with any data, is sent from the first node to the second node, which extracts the data addressed to it and adds any data it wishes to send. Then, the second node passes the token and data to the third node, and so on until it comes back around to the first node again. Only the node with the token is allowed to send data. All other nodes must wait for the token to come to them. In a ring topology, packets are sent around the circle from computer to computer. Each computer looks at each packet to decide whether the packet was intended for it. If not, the packet is passed on to the next computer in the ring. Years ago, ring topologies were common in LANs, as two popular networking technologies used rings: ARCNET and Token Ring. ARCNET is still used for certain applications such as factory automation, but is rarely used in business networks. Token Ring is a popular network technology for IBM midrange computers. Although plenty of Token Ring networks are still in existence, not many new networks use Token Ring any more. Ring topology was also used by FDDI, one of the first types of fiber-optic network connections. FDDI has given way to more efficient fiber-optic techniques, however. So ring networks have all but vanished from business networks.

file://D:\Documents and Settings\Shishir\Desktop\notesof cn.htm

4/28/2012

Page 12 of 17

Figure: Ring topology

Mesh topology A fourth type of network topology, known as mesh, has multiple connections between each of the nodes on the network, as shown in figure. The advantage of a mesh topology is that if one cable breaks, the network can use an alternative route to deliver its packets. Mesh networks are not very practical in a LAN setting. For example, to network eight computers in a mesh topology, each computer would have to have seven network interface cards, and 28 cables would be required to connect each computer to the seven other computers in the network. Obviously, this scheme isnt very scalable. However, mesh networks are common for metropolitan or wide area networks. These networks use devices called routers to route packets from network to network. For reliability and performance reasons, routers are usually arranged in a way that provides multiple paths between any two nodes on the network in a mesh-like arrangement.

Figure: Mesh topology

1.1 Protocol Hierarchies or Protocol Stack Computer networks are designed in a highly structured way to reduce their design complexity. Most networks are organized as a series of layers or levels. The number of layers, the name of each layer, and the function of each layer differs from network to network. However, in all networks, each layer clearly defines various data communication functions and logical operations. Each level is functionally independent of the others, but builds on its predecessor. In order to function, higher levels depend on correct operation of the lower levels. Figure aside

file://D:\Documents and Settings\Shishir\Desktop\notesof cn.htm

4/28/2012

Page 13 of 17

illustrates 7-layer network architecture. Layer (level) n on one computer carries on communication with layer n on another computer. The set of rules and conventions that encompasses electrical, mechanical and functional characteristics of a data link, as well as the control procedures for such communication is called the layer n protocol. Figure: Layers, protocols and interfaces The communication between two layers at the same level (layer n, n = 1) of two different computers is called virtual communication. Here, each layer passes data and control information to the layer immediately below it, until the lowest layer (layer 1). At layer 1, information from one computer is physically transferred to layer 1 of the other (physical communication). The interface between each pair of adjacent layers defines which operations and services the lower layer offers to the upper one. The network architecture thus can be defined as the set of layers and protocols. The ISO and other models Figure below shows the reference model of the Open Systems Interconnection (OSI), which has been developed by the International Standards Organization (ISO). We will briefly define the functions and operation of each layer of this architecture in turn.

Figure: The OSI model Layer 1: the physical layer This layer is concerned with transmitting an electrical signal representation of data over a communication link. Typical conventions would be: voltage levels used to represent a 1 and a 0, duration of each bit, transmission rate, mode of transmission, and functions of pins in a connector. An example of a physical layer protocol is the RS-232 standard. The bottom layer of the OSI Model is the Physical Layer. It addresses the physical characteristics of the network, such as the types of cables used to connect devices, the types of connectors used, how long the cables can be, and so on. For example, the Ethernet standard for 100BaseT cable specifies the electrical characteristics of the twisted-pair cables, the size and shape of the connectors, the maximum length of the cables, and so on. Another aspect of the Physical Layer is that it specifies the

file://D:\Documents and Settings\Shishir\Desktop\notesof cn.htm

4/28/2012

Page 14 of 17

electrical characteristics of the signals used to transmit data over cables from one network node to another. The Physical Layer doesnt define any particular meaning for those signals other than the basic binary values 0 and 1. The higher levels of the OSI model must assign meanings to the bits transmitted at the Physical Layer. One type of Physical Layer device commonly used in networks is a repeater. A repeater is used to regenerate signals when you need to exceed the cable length allowed by the Physical Layer standard or when you need to redistribute a signal from one cable onto two or more cables. An old-style 10BaseT hub is also Physical Layer device. Technically, a hub is a multi-port repeater because its purpose is to regenerate every signal received on any port on the entire hubs other ports. Repeaters and hubs dont examine the contents of the signals that they regenerate. If they did, they would be working at the Data Link Layer, and not at the Physical Layer Layer 2: the data link layer This layer is concerned with error-free transmission of data units. The data unit is an abbreviation of the official name of data-link-service-data-units; it is sometimes called the data frame. The function of the data link layer is to break the input data stream into data frames, transmit the frames sequentially, and process the acknowledgement frame sent back by the receiver. Data frames from this level when transferred to layer 3 are assumed to be error free. The Data Link Layer is the lowest layer at which meaning is assigned to the bits that are transmitted over the network. Data-link protocols address things such as the size of each packet of data to be sent, a means of addressing each packet so that its delivered to the intended recipient, and a way to ensure that two or more nodes dont try to transmit data on the network at the same time. The Data Link Layer also provides basic error detection and correction to ensure that the data sent is the same as the data received. If an uncorrectable error occurs, the data-link standard must specify how the node is to be informed of the error so it can retransmit the data. At the Data Link Layer, each device on the network has an address known as the Media Access Control address, or MAC address. This is the actual hardware address, assigned to the device at the factory. You can see the MAC address for a computers network adapter by opening a command window and running the ipconfig /all command, as shown in figure. In this example, the MAC address (identified as the physical address in the output) of the network card is 00-50-BA-84-39-11. One of the most import functions of the Data Link Layer is to provide a way for packets to be sent safely over the physical media without interference from other nodes attempting to send packets at the same time. Ethernet uses a technique called CSMA/CD to accomplish this. Switches are the most commonly used Data Link Layer devices in most networks. A switch is similar to a hub, but instead of regenerating incoming signals of every port, a switch examines the MAC address of every incoming packet to determine which port to send the packet to.

file://D:\Documents and Settings\Shishir\Desktop\notesof cn.htm

4/28/2012

Page 15 of 17

Figure: Displaying the MAC address of your network adapter

Layer 3: the network layer This layer is the network control layer, and is sometimes called the communication subnet layer. It is concerned with intra-network operation such as addressing and routing within the subnet. Basically, messages from the source host are converted to packets. The packets are then routed to their proper destinations. The Network Layer handles the task of routing network messages from one computer to another. The two most popular Layer-3 protocols are IP (which is usually paired with TCP) and IPX (normally paired with SPX for use with Novell and Windows networks). One important function of the Network Layer is logical addressing. As you know, every network device has a physical address called a MAC address, which is assigned to the device at the factory. When you buy a network interface card to install in a computer, the MAC address of that card is fixed and cant be changed. But what if you want to use some other addressing scheme to refer to the computers and other devices on your network? This is where the concept of logical addressing comes in; a logical address lets gives a network device a place where it can be accessed on the network using an address that you assign. Logical addresses are created and used by Network Layer protocols such as IP or IPX. The Network Layer protocol translates logical addresses to MAC addresses. For example, if you use IP as the Network Layer protocol, devices on the network are assigned IP addresses such as 207.120.67.30. Because the IP protocol must use a Data Link Layer protocol to actually send packets to devices, IP must know how to translate the IP address of a device into the correct MAC address for the device. You can use the ipconfig command to see the IP address of your computer. The IP address shown in that figure is 192.168.1.100. Another important function of the Network layer is routing finding an appropriate path through the network. Routing comes into play when a computer on one network needs to send a packet to a computer on another network. In this case, a Network Layer device called a router forwards the packet to the destination network. An important feature of routers is that they can be used to connect networks that use different Layer2 protocols. For example, a router can be used to connect a local area network that uses Ethernet to a wide area network that runs on a different set of low-level protocols, such as T1. Layer 4: the transport layer This layer is a transport end-to-end control layer (i.e. source-to-destination). A program on the

file://D:\Documents and Settings\Shishir\Desktop\notesof cn.htm

4/28/2012

Page 16 of 17

source computer communicates with a similar program on the destination computer using the message headers and control messages, whereas all the lower layers are only concerned with communication between a computer and its immediate neighbors, not the ultimate source and destination computers. The transport layer is often implemented as part of the operating system. The data link and physical layers are normally implemented in hardware. The Transport Layer is the basic layer at which one network computer communicates with another network computer. The Transport Layer is where youll find one of the most popular networking protocols: TCP. The main purpose of the Transport Layer is to ensure that packets move over the network reliably and without errors. The Transport Layer does this by establishing connections between network devices, acknowledging the receipt of packets, and resending packets that are not received or are corrupted when they arrive. In many cases, the Transport Layer protocol divides large messages into smaller packets that can be sent over the network efficiently. The Transport Layer protocol reassembles the message on the receiving end, making sure that all packets contained in a single transmission are received and no data is lost. Layer 5: the session layer The session layer is the users interface into the network. This layer supports the dialogue through session control, if services can be allocated. A connection between users is usually called a session. A session might be used to allow a user to log into a system or to transfer files between two computers. A session can only be established if the user provides the remote addresses to be connected. The difference between session addresses and transport addresses is that session addresses are intended for users and their programs, whereas transport addresses are intended for transport stations. The Session Layer establishes sessions (instances of communication and data exchange) between network nodes. A session must be established before data can be transmitted over the network. The Session Layer makes sure that these sessions are properly established and maintained. Layer 6: the presentation layer This layer is concerned with transformation of transferred information. The controls include message compression, encryption, peripheral-device-coding and formatting. The Presentation Layer is responsible for converting the data sent over the network from one type of representation to another. For example, the Presentation Layer can apply sophisticated compression techniques so fewer bytes of data are required to represent the information when its sent over the network. At the other end of the transmission, the Transport Layer then uncompresses the data. The Presentation Layer also can scramble the data before it is transmitted and unscramble it at the other end, using a sophisticated encryption technique that would be difficult to break. Layer 7: the application layer This layer is concerned with the application and system activities. The content of the application layer is up to the individual user. The highest layer of the OSI model, the Application Layer, deals with the techniques that application programs use to communicate with the network. The name of this layer is a little confusing because application programs (such as Excel or Word) arent actually part of the layer. Rather, the Application Layer represents the level at which application programs interact with the network, using programming interfaces to request network services. One of the most commonly known used application layer protocols is HTTP, which stands for HyperText Transfer Protocol. HTTP is the basis of the World Wide Web.
osi_model.exe

Presentation of OSI model In this presentation you will see how open system interconnection reference model or OSI model describes the process by which data is sent over a network. The OSI model is divided into seven layers. Each layer represents different stage in the process of preparing data for transmission over a network. The process starts at the application layer on the sending host where applications are connected to networking software. The data to be sent is put in a packet that passes down through each layer accumulating, routing and tracking information until it reaches the physical layer where it

file://D:\Documents and Settings\Shishir\Desktop\notesof cn.htm

4/28/2012

Page 17 of 17

is sent out over a network to its destination. You follow a similar process when you send a letter. Here is an example of the similarities between the functions that each layer of the OSI model and the process of the letter being sent by the private delivery service. You start the process by creating a document and sending it through interoffice mail through a translator. The interoffice mail represents the application layer of the OSI model where the connection between an application and the network software is made. The next stage is the presentation layer where your text is translated into recipient language. In the OSI model the source and the destination client choose common communication syntax at this layer. Next your document goes to the mail room where the destination address is checked to make sure the service delivers to that area and then your document is put into an envelope. This is similar to the session layer of OSI model where the connection is made between the sending and receiving clients. If you ask for guarantee delivery of your letter a tracking number is assigned to it. In the OSI model the transport layer is where reliable or unreliable protocol is choosen. The address is then added to the envelope. In the OSI model the network layer is where destination address is added to the packet. The next step is where secure seal is applied to the envelope and the type of transportation is choosen. In the OSI model the data link layer is where the packet is put into the correct format for transmission. The physical layer is the last stage. The envelope is put on an aeroplane and taken to its destination. This is similar to putting the packet on to the network cable at the physical layer of the OSI model. When you put the seven stages together, you have seven layers of the OSI model. Applied to a network the OSI model defines the following functions. At the application layer network access is applied to an application such as the ability of your word processor to load files from your server or send a document to a print device. At the presentation layer client computer that are communicating with each other choose the best syntax that they have in common. At the session layer protocols maintain the connection between the communicating clients. At the transport layer either of reliable or unreliable protocol is choosen to make the connection to the recipient depending on which type is needed by the communicating clients. At the network layer the destination address is added to each packet. Also when reliable connection is made at the transport layer protocols at the network layer do the tracking and checking needed to insure the connection reliability. At the data link layer the packet that has been assembled in the previous layers is prepared for transmission over the networking hardware. At the physical layer information about the networking hardware is used to send the packet out on to the network. The process works in the opposite way on the client that receives the packet. As it goes up through the layer the information that was attached to the packet before sent is checked or removed at the same layer on the receiving host. When it reaches the application layer only the original data remains. A phrase that may help you remember the order of the OSI layer is All People Seem To Need Data Processing. In this presentation you have seen how the OSI model describes the process by which data is prepared and sent over a network. 1.1.1 Switching

Shishir Modak

file://D:\Documents and Settings\Shishir\Desktop\notesof cn.htm

4/28/2012

You might also like