Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
1 Network Fundamentals:
Now a days computers are being used in almost all business processes. For
example, use of computers to monitor production, inventories, to make payments.
Resources sharing are the important purpose of using computer networks.
Resources like programs, equipments and data are required to share amongst
various users.
i)
Database resource
The database is required to access for decision making by various departments.
The database is maintained by dedicated server and users (clients) can access
the data. One server can provide services to many clients. The client and server
in a network. This arrangement is called as client server model.
ii)
iii)
Client requests for a service and server acknowledges the request. The server
performs the requested work and sends back the result. The process of request
and reply for a client server model is shown in fig
Communication medium
Computer network is a powerful medium for communication. E-mail is very
popularly used amongst company employees. Video-conferencing is other form
of computer assisted communications.
Electronic commerce
Many companies doing business electronically with suppliers and customers.
Customers can place order electronically; this assures fast delivery and efficient
services.
S.No
E - Commerce
i) Business to Consumer
ii)
Business to Business
iii)
Government to Consumer
Application
On line ordering
Supply chain management (Suppliers to
manufacturers)
Different government forms on Internet.
E.g. Income tax, Application forms.
Auctioning of second hand products
File sharing
Network Architecture:
A computer network must provide general, cost effective, fair and robust
connectivity among a large number of computers. Designing a network to meet
these requirements is no small task.
To deal with this complexity, network designers have developed general blue
prints usually called network architectures. It guides the design and
implementation of networks.
1.2.1 Layered Architecture:
Computer network is designed around the concept of layered protocols or
functions. For exchange of data between computers, terminals or other data
processing devices, there is data path between two computers, either directly via
a communication network.
Following factors should be considered.
1.
The source system must either activate the direct data communication path or
inform the communication network to the identity of the desired destination
system.
2.
Provide for standard interface between network functions.
3.
Provide for symmetry in function performed at each node in the network.
Each layer performs the same functions as its counterpart in the other node of
network.
The network software is now highly structured.
1.2.2 Protocol Hierarchies:
Most of all networks are organized as a series of layers, each one built upon the
one below it. Because of layer, it reduces the design complexity.
In layer protocols, a layer is a service provider and may consist of several service
functions. Function is a sub system of a layer.
Each subsystem may also be made up of entities. An entity is a specialized
module of a layer or subsystem.
Name of the layer, total number of layer, function and content of each layer differ
from network to network.
Protocols are the rules that govern network communication
In Fig shows the five layer network.
In Fig. the layers N+1, N and N-1 are involved in the communication process for
layer communication, with each other.
Following components are involved and their function is as follows:
1. Service data unit (SDU)
2. Protocol control information (PCI)
3. Protocol data unit (PDU)
4. Interface control information (ICI)
5. Interface data unit (IDU)
When the IDU from layer N+1 passes to layer N, it becomes the SDU to that
layer. PCI is added to SDU at layer N. ICI performs its function and is discarded.
Another ICI is added to PDU at layer N and it becomes IDU to layer N-1. Thus a
full protocol unit is passed through each layer.
Each layer adds header to data. This header is used by the peer layer entity at
another node of the network to invoke function. This process repeats itself
through each layer.
As each unit traverses through the layer, it has a header added to it i.e. user data
and header (SDU and PCI). This full protocol data unit is passed onto the
communication path, where it arrives at the receiving site.
In short, each layer added its header to users data and passes to its next layer.
This layer process on that data and adds its own header and provides to next
layer for processing. Through transmission channel data passes to receiving site.
Fig. the communication between two sites in a network.
User x and y are connected together by layer service access points (SAPs). If
you consider service provider as a layer. The SAP contains the address of the
specific service function.
Services can be either confirmed or unconfirmed.
The request, an indication, a response, and a confirm are all in confirmed
services.
Connect and disconnect are the example for confirmed and no confirmed
services respectively.
1. Application Layer: The application layer is the layer that the users and userapplications most often interact with. Network communication is discussed in
terms of availability of resources, partners to communicate with, and data
synchronization.
2. Presentation Layer: The presentation layer is responsible for mapping
resources and creating context. It is used to translate lower level networking data
into data that applications expect to see.
3. Session Layer: The session layer is a connection handler. It creates, maintains,
and destroys connections between nodes in a persistent way.
4. Transport Layer: The transport layer is responsible for handing the layers above
it a reliable connection. In this context, reliable refers to the ability to verify that a
piece of data was received intact at the other end of the connection.
This layer can resend information that has been dropped or corrupted and can
acknowledge the receipt of data to remote computers.
5. Network Layer: The network layer is used to route data between different nodes
on the network. It uses addresses to be able to tell which computer to send
information to. This layer can also break apart larger messages into smaller
chunks to be reassembled on the opposite end.
6. Data Link Layer: This layer is implemented as a method of establishing and
maintaining reliable links between different nodes or devices on a network using
existing physical connections.
7. Physical Layer: The physical layer is responsible for handling the actual
physical devices that are used to make a connection. This layer involves the bare
software that manages physical connections as well as the hardware itself (like
Ethernet).
6.
7.
Strict layering
Support connectionless and connection
oriented communication in the network layer
Lossely layered.
Support only connection
oriented communication in the
transport layer.
A metropolitan area network (MAN) is computer network larger than a local area
network, covering an area of a few city blocks to the area of an entire city,
possibly also including the surrounding areas.
A wide area network (WAN) is a network that covers a broad area (i.e.,
any telecommunications network that links across metropolitan, regional, national
or international boundaries) using leased telecommunication lines. Business and
government entities utilize WANs to relay data among employees, clients,
buyers, and suppliers from various geographical locations. In essence, this mode
of telecommunication allows a business to effectively carry out its daily function
regardless of location. The Internet can be considered a WAN as well, and is
used by businesses, governments, organizations, and individuals for almost any
purpose imaginable.
Covers large
geographical area
Error rates
Transmission speed
Equipment cost
Lowest
High speed
Uses inexpensive
equipment
Highest
Low speed
Uses most expensive
equipment
MAN
Covers larger than
LAN and smaller than
WAN
Moderate
Moderate speed
Uses moderately
expensive equipment
Bus topology uses multipoint cabling i.e. multiple devices are connected by
means of connectors or drop cables. One long cable acts as a backbone to link
all the devices in a network.
The signal becomes weak as it travels along the backbone link.
When a device sends a signal down the bus, all the computer or the bus receives
the information, but only one accepts the information using address matching.
Bus is passive topology because it requires termination. Cable cannot be left un
terminated in a bus network.