Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
SUBMITTED TO: MS
. 5/5/12
1.Centralized computing
2. Distributed Computing
5/5/12
Client/Server Diagram
5/5/12
5/5/12
Network Types
There are generally three types of Network types we see are as follows: 1. LAN(Local Area Network), 2. WAN(Wide Area Network), and 3. MAN(Metropolitan Area Network)etc.
3.Metropolitan
A metropolitan area network (MAN) is a network that interconnects users with computer resources in a geographic area or region larger than that covered by even a large local area network (LAN) but smaller than the area covered by a wide area 5/5/12 network (WAN).
Area
Network:
The term is applied to the interconnection of networks in a city into a single larger network (which may then also offer efficient connection to a wide area network).
5/5/12
Protocols
FTP : File Transfer Protocol, SMTP : Simple Mail Transfer Protocol, TFTP : Trivial File Transfer protocol, DNS : Domain Naming Service, DHCP : Dynamic Host configuration, IP : Internet Protocol, TCP : Transmission control protocol, and UDP : User datagram protocol. Etc.
5/5/12
Services
Services are the resources which the computers have to offer in the network. There are five most common services in the network we use are: *File Services, *Print Services, *Message Services, *Application Services,
5/5/12
*Database Services.
File services
It Include the network applications designed to store, retrieve, or move data files with the help of this service we can rapidly move files from place to place, take backup, etc. File service include: *File Transfer, *File Storage and Data Migration,* File Update Synchronization. *File Transfer: It means the movement of files from one place to another in a network . *File Storage and Data Migration: Computers store data on variety of Magnetic and Optic disks. Using file storage and data migration functions, all the networked computers can take advantage of the data storage device that is appropriate for their access time, reliability, and longevity needs. As the data ages and become less used, it can be moved from online hard disk to longer-life offline storage media. This is called as file archiving, data migration or backup.
5/5/12
*Application Services:
Application services are the network services that run software for network clients.
*Database
Network database services provide server-based (data or information) storage and retrieval that allows to control and manage the network clients and present data. Database services functions include: *Optimize the computers that store, search, and retrieve database records, *Provide data security, Etc. Aspects of Database services: a> Distributed Data, 5/5/12 b> Replication.
services:
Transmission Media
The medium through which computers communicate with each other is called as transmission medium and it is also called as pathway. Transmission Media is divided in two forms: 1.Cable Media, and 2.Wireless Media.
1.Cable
Computers uses physical medium for connection such as wires that conduct electricity or light called as cable media. 2.Wireless Media: Computers using logical medium for connection. Wireless uses radio 5/5/12 frequencies for transmission.
media:
Protocols
It is a set of rules that defines the computers how to communicate. It is also said as the language of the computers. Such as: HTTP, DHCP, DNS, TCP, UDP, and NNTP etc. The Basics of Network Management Network management is an area of information technology in which many tools, applications and devices are used to monitor and maintain a network. The five areas of the network management model are:
5/5/12
Performance Management: This is to measure the various aspects of the network performance. Some of the performance parameters that are measured are network throughout, user response times. The data of the performance variables are gathered and then analyzed with a reference data. If the received data is above the threshold value, it indicates that the network needs attention and appropriate corrective actions are taken. Configuration Management: This is to monitor the system configuration of the network computers and the various hardware and software that are used in the network. The systems for configuration management store this information in a database for later retrieval. Accounting Management: this is used to measure the network utilization parameters in such way that the users of the network are regulated properly. Such regulations 5/5/12 lead to optimal utilization of the network resources which
5/5/12
5/5/12
Application Layer
Application layer is the top layer of the OSI (Open System Interconnectivity) server layer model. The application layer provides the interface to the communications environment which is used by the application process. This layer provides application services for file transfers, e-mail, and other network software services. Telnet and FTP are applications that exist entirely in the application level. There can be different types of application such as: # computer applications # Network applications # Internetwork applications Some protocols working under application layer are: FTP, TFTP, DHCP, DNS, TELNET etc.
5/5/12
Presentation Layer
Presentation layer is responsible for how data is presented to the user. The presentation layer is responsible for the following services: # Data Representation, # Data Security, and # Data Compression. # Data Representation: In data representation presentation layer define the type of data. # Data Security : The security at this layer is provided in the form of data encryption, in which the data format is converted and made in unreadable form for the unauthorized users. The data can be read by only that user who has the encryption key. # Data Compression: The data compression and decompression is done before transmitting the data in the network. 5/5/12 Protocols working under presentation layer are ASCII,
Session Layer
The session layer establishes, manages, and terminates sessions between applications as they interact on different hosts on a network. Session: It can be defined as time of communication occurring between two intelligent devices. Communication Modes in Session layer # Simplex: In this communication mode only one-way data transfers. E.g. Only one computer can send data while the other will only receive.
5/5/12
# Half duplex: In this communication mode two way data transfers but only one at a time. When first stops sending other starts transmitting.
# Full duplex: In this mode two way data communication is possible at a same time.
5/5/12
Transport layer role is to establish end-to-end connections from one computer to another in the network and provide reliable transport of data between devices.Transport layer lies between upper layer that deals mainly with data representation, and the lower layer responsible for actual data flow and the transport layer is also the first layer responsible for transmission. Basic Transport layer services: # Multiplexing, # Connection Management # Flow control(Buffering/Windowing) #Reliable Transport(positive acknowledgement/error checking) # Multiplexing: It allows multiple applications to share single transport medium to communicate with other computers. # Connection Management: The transport layer is responsible to establish, maintain and terminate connections between networked devices. Connection oriented service has three 5/5/12 phases:
Transport Layer
# Connection-Establishment # Data-Transfer # Connection-Termination Flow Control: It is to control the flow of data according to the destination capacity to receive. The transport layer is provides flow control in two ways: # Buffering # Windowing # Buffering: It is responsible for ensuring that sufficient buffers are available in the destination for the processing of data and that the data is transmitted at a rate does not exceed what the destination computer can handle. # Windowing: It is a flow control scheme in which the source computer monitors and make adjustments to the amount of information successfully sent to the destination computer. The source computer waits for the acknowledgement after sending data, for next 5/5/12 transmission it waits until then the first data is received
Network Layer
The Network layer is the third layer in the OSI model and it is responsible for identifying computers in the network as well as to define a best route through which the network computers will communicate. Some of the specific jobs normally performed by the network layer include: Logical Addressing: Every device that communicates over a network has associated with it a logical address, sometimes called a layer three address. For example, on the internet, the Internet Protocol (IP) is the network layer protocol and every machine has an IP address. Note that addressing is done at the data link layer as well, but those addresses refer to local physical devices. In contrast, logical addresses are independent of particular hardware and must be unique across an entire internetwork.
5/5/12
Connectionless: Itdoes not require a session connection between sender and receiver. The sender simply starts sending packets (called datagrams) to the destination. This service does not have the reliability of the connection-oriented method, but it is useful for periodic burst transfers. Neither system must maintain state information for the systems that they send transmission to or receive transmission from. A connectionless network provides minimal services. Delivering Packets: The Network layer is responsible for determining the paths and deliver packet across the network. The technique used to route packet is as follows: #Circuit Switching #Message Switching #Packet Switching
5/5/12
Circuit Switching: A type of communications in which a dedicated channel(or circuit) is established for the duration of a transmission. The most ubiquitous circuitswitching network is the telephone system, which links together wire segments to create a single unbroken line for each telephone call. Message Switching: A data-switching strategy that requires no physical path to exist between sender and receiver before communication can take place. Message switching passes messages via relays, called switching offices, in a store-and-forward network. Each switching office receives a message, checks it for errors, and retransmits it to the next switching office on the route to the destination. Packet Switching: The packet switching, divides messages into packets and sends each packet individually. The Internet is based on a packet-switching 5/5/12 protocol.
Datalink Layer
The second-lowest layer (layer 2) in the OSI Reference Model stack is the data link layer and it looks after the transmission of blocks of data over the physical link. Two sub layers work under Data link Layer is as follows: # LLC(Logical link control) # MAC(Media access control) # LLC(Logical link control): Logical link control refers to the functions required for the establishment and control of logical links between local devices on a network. # Media Access Control (MAC): This refers to the procedures used by devices to control access to the network medium. Since many networks use a shared medium (such as a single network cable, or a series of cables that are electrically connected into a single virtual medium) it is necessary to have rules for managing the medium to avoid conflicts. For example. Ethernet uses the CSMA/CD method of media access control, while Token Ring uses token passing. 5/5/12
Physical layer
The physical layer is the lowest and the first layer in the OSI model. Physical layer is responsible for determining the transmission medium and transmitting the data according to the signals supported by the transmission medium. It is responsible for defining the mechanical and electrical specifications for the transmission medium within a connection, as well as the transformation or encoding of data into bits. Example: EIA/TIA-232, V.35, EIA/TIA-449, RJ-45, Ethernet, 802.3
5/5/12
Network devices
5/5/12
Network
devices are components used to connect computers or other electronic devices together so that they can share files or resources like printers or fax machines. Devices used to setup a Local Area Network (LAN) are the most common type of network devices used by the public. A LAN requires a hub, router, cabling or radio technology, network cards, and if online access is desired, a high-speed modem.
Devices: Network
5/5/12
Modems:
Modem, short for modulatordemodulator is an electronic device that converts a computers digital signals into specific frequencies to travel over telephone or cable television lines. At the destination, the receiving modem demodulates the frequencies back into digital data. Computers use modems to communicate with one another over a network. There are two types of Modem: 1. Asynchronous Modem ,and 2. synchronous modem.
5/5/12
5/5/12
Need of HUB: Generally when we build a network using two or more computers, we need a hub. However, it is possible to connect two computers to each other directly without the need of hub but when we add a third computer in the network, we need a hub to allow a proper data communication within the network Types of Hub: There are mainly three types of Hub as follows: 1.Active hub, 2.Passive hub, and 3. intelligent hub.
5/5/12
participation in data communication within the network/LAN. Active hubs come with various features, such as receiving the signal (data) from the input port and storing it for sometime before forwarding it, this feature allows the hub to monitor the data it is forwarding, some hubs come with a feature that helps in transmitting data that has high priority before the data that has lower priority (this feature is very important for some applications and some type of networks), some hubs help in synchronizing data communication (by retransmitting the packets, which are not properly received at the receiving computer or by adjusting re-transmission of the data packets to compensate 5/5/12 timing)
Repeater: Repeaters, located within the physical layer of a network, regenerate and propagate signals from one to another. They do not change any information being transmitted, and they cannot filter any information. Repeaters help to extend the distances of networks by boosting weak signals. With physical media like Ethernet or Wi-Fi, data transmissions can only span a limited distance before the quality of the signal degrades. Repeaters attempt to preserve signal integrity and extend the distance over which data can safely travel. Actual network devices that serve as repeaters usually have some other name. Active hubs, for example, are repeaters. Active hubs are sometimes also 5/5/12 called "multiport repeaters.
Repeater
5/5/12
congestion in Ethernet, Token Ring, and Fiber Distributed Data Interface (FDDI) LANs by reducing traffic and increasing bandwidth. Such switches, known as LAN switches, are designed to work with existing cable infrastructures so that they can be installed with minimal disruption of existing networks. Often, they replace shared hubs. This case study describes how LAN switching works, how virtual LANs work, and how to configure virtual LANs (VLANs) in a topology. Types of Switches: 1.ATM Switch, 2. LAN Switch etc. # ATM Switch: ATM (asynchronous transfer mode) is a dedicated-connection switching technology that organizes digital data into 53-byte cell units and transmits them over a physical medium using digital signal technology. Individually, a cell is processed asynchronously relative to other related cells and is 5/5/12 queued before being multiplexed over the transmission
There are three forwarding methods a switch can use: Store and forward : The switch buffers and, typically, performs
a checksum on each frame before forwarding it on.
5/5/12