1 / 28

Computer Networks

Computer Networks. Introduction. Communication across Network. VoIP Desktop Sharing E mail Instant Messaging Social Network. VoIP.

norbertor
Télécharger la présentation

Computer Networks

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Computer Networks Introduction

  2. Communication across Network • VoIP • Desktop Sharing • E mail • Instant Messaging • Social Network

  3. VoIP • VoIP is a technology that allows telephone calls to be made over computer networks like the Internet. VoIP converts analog voice signals into digital data packets and supports real-time, two-way transmission of conversations using Internet Protocol (IP). • Example : Skype

  4. Desktop Sharing • Desktop sharing is a common name for technologies and products that allow remote access on a person's computer desktop. • Desktop sharing is an online technology that makes it possible to access the desktop of a computer from a remote location • The open source product VNC provides cross-platform solution for remote log-in.

  5. IM • Instant messaging (IM) is a type of online chat which offers real-time text transmission over the Internet • Example: Yahoo Messenger • Social Network : Facebook

  6. RFID • What if barcodes were replaced by chips that could not only be read more quickly but could have their information updated as well? And what if those chips could communicate with other devices? These chips already exist and the technology they use is called RFID – short for Radio Frequency Identifaction. • Radio-frequency identification (RFID) is the use of a wireless non-contact radio system to transfer data from a tag attached to an object, for the purposes of automatic identification and tracking.

  7. Network Software • The first computer networks were designed with the hardware as the main concern • And the software as an afterthought. This strategy no longer works. • Network software is now highly structured.

  8. Network Software • Protocol hierarchies • Design issues for the layers • Connection-oriented versus connectionless service • Service primitives • Relationship of services to protocols

  9. Protocol hierarchies • To reduce their design complexity, most networks are organized as a stack of layers or levels, each one built upon the one below it. • The number of layers • The name of each layer, • The contents of each layer, • The function of each layer differ from network to network. • The purpose of each layer is to offer certain services to the higher layers while shielding those layers from the details of how the offered services are actually implemented. In a sense, • Each layer is a kind of virtual machine, offering certain services to the layer above it.

  10. When layer n on one machine carries on a conversation with layer n on another machine, the rules and conventions used in this conversation are collectively known as the layer n protocol. • Basically, a protocol is an agreement between the communicating parties on how communication is to proceed.

  11. Protocol Hierarchies

  12. In reality, no data are directly transferred from layer n on one machine to layer n on another machine. Instead, each layer passes data and control information to the layer immediately below it, until the lowest layer is reached. • Below layer 1 is the physical medium through which actual communication occurs.

  13. Between each pair of adjacent layers is an interface. • The interface defines which primitive operations and services the lower layer makes available to the upper one. • When network designers decide how many layers to include in a network and what each one should do, one of the most important considerations is defining clean interfaces between the layers. • Doing so, in turn, requires that each layer perform a specific collection of well-understood functions. In addition to minimizing the amount of information that must be passed between layers, • Clear cut interfaces also make it simpler to replace one layer with a completely different protocol or implementation

  14. A set of layers and protocols is called a network architecture. • The specification of an architecture must contain enough information to allow an implementer to write the program or build the hardware for each layer so that it will correctly obey the appropriate protocol. • A list of the protocols used by a certain system, one protocol per layer, is called a protocol stack.

  15. Protocol Hierarchies

  16. Protocol Hierarchies

  17. Design Issues for Layers • Reliability • Finding a working path through Network • Scalability • Resource Allocation • Flow Control • Quality Of Service • Secure your Network

  18. Connection-Oriented Versus Connectionless Service • Connection-oriented service is modeled after the telephone system. • Similarly, to use a connection-oriented network service, the service user first establishes a connection, uses the connection, and then releases the connection. • In most cases the order is preserved so that the bits arrive in the order they were sent.

  19. A negotiation about the parameters to be used, such as maximum message size, quality of service required, and other issues. • Typically, one side makes a proposal and the other side can accept it, reject it, or make a counterproposal. • A circuit is another name for a connection with associated resources, such as a fixed bandwidth. This dates from the telephone network in which a circuit was a path over copper wire that carried a phone conversation.

  20. each packet is routed through the intermediate nodes inside the system independent of all the subsequent messages. • There are different names for messages in different contexts; a packet is a message at the network layer. • When the intermediate nodes receive a message in full before sending it on to the next node, this is called store-and-forward switching. • The alternative, in which the onward transmission of a message at a node starts before it is completely received by the node, is called cut-through switching. • Normally, when two messages are sent to the same destination, the first one sent will be the first one to arrive. • However, it is possible that the first one sent can be delayed so that the second one arrives first.

  21. Request-reply service. • In this service the sender transmits a single datagram containing a request; the reply contains the answer. • Request-reply is commonly used to implement communication in the client-server model:

  22. Connection-Oriented Versus Connectionless Service

  23. Service Primitives • Primitives means operations • A service in computer network consists of set of primitives that layer provides to layer above it. • The primitives are used by user to access the service. • The primitives asks the service to do some action. The primitives are like system calls.

  24. Service Primitives • The primitives varies for different services. The following are the some of the primitives used in Computer Network.

  25. Client Server Interaction

  26. The Relationship of Services to Protocols • Services and protocols are distinct concepts. • This distinction is so important that we emphasize it again here. • A service is a set of primitives (operations) that a layer provides to the layer above it. • The service defines what operations the layer is prepared to perform on behalf of its users, but it says nothing at all about how these operations are implemented. • A service relates to an interface between two layers, with the lower layer being the service provider and the upper layer being the service user.

  27. A protocol, in contrast, is a set of rules governing the format and meaning of the packets, or messages that are exchanged by the peer entities within a layer. • Entities use protocols to implement their service definitions. • They are free to change their protocols at will, provided they do not change the service visible to their users. • In this way, the service and the protocol are completely decoupled. • This is a key concept that any network designer should understand well.

  28. The Relationship of Services to Protocols

More Related