lecture 04

28
Course Instructor : Sehrish Rafiq Department Of Computer Science University Of Peshawar Data Communications & Networking Lecture-04

Upload: sehrish-rafiq

Post on 09-Jul-2015

384 views

Category:

Technology


2 download

TRANSCRIPT

Page 1: Lecture 04

Course Instructor : Sehrish Rafiq

Department Of Computer Science

University Of Peshawar

Data Communications & NetworkingLecture-04

Page 2: Lecture 04

Lecture overviewCategories of NetworksInternetworksAn overview of the communication tasksProtocol ArchitectureCharacteristics of a protocol

Page 3: Lecture 04

Categories of Networks

In to which category a network falls is determined by its size, its ownership, the distance it covers and its physical architecture.

Page 4: Lecture 04

LAN(Local Area Network)A local Area network is usually privately owned and links the

devices in a single office, building or campus.LAN size is limited to a few kilometers.LAN’s are designed to allow resources to be shared between

personal computers or work stations. In addition to size LAN are distinguished from other types of

networks by their transmission media and topology.Most common topologies:Bus,Ring & Star.

Page 5: Lecture 04

LAN(Local Area Network)

Page 6: Lecture 04

MAN(Metropolitan Area Network) A MAN is designed to extend over an entire city.

It may be a single network such as cable television network or it may be a means of connecting a number of connecting a number of LANs in to a larger network so that resources may be shared LAN-to-LAN.

A MAN may be wholly owned and operated by a private company such as local telephone company.

Page 7: Lecture 04

MAN(Metropolitan Area Network)

Page 8: Lecture 04

WAN(Wide Area Network)A WAN provides long distance transmission of voice, data, image

and video information over large geographic areas that may comprise a country, a continent or even the whole world.

WANs may utilize public, leased or private communication devices usually in communications and can therefore span an unlimited number of miles.

A WAN that is wholly owned and used by a single company is often referred to as enterprise network.

Page 9: Lecture 04

WAN(Wide Area Network)

Page 10: Lecture 04

InternetworksWhen two or more networks are connected, they became an

internetwork or internet.

The Internet from “I” is a Wide area network while the internet from “i” refers to the interconnection of networks.

Internet can be thought as internet but the reverse is not necessarily true.

Page 11: Lecture 04

History of Internet 1960,A project of ARPA of US department of

Defense Stanford Research Institute University of California at Los Angeles University of California at Santa Barbara University of Utah Features Redundant lines Decentralized Computing 1980, NSF and other Government agencies 1991,Commercial traffic April 1995,US government action 2000,30 million users on 10 million

computers,240000 networks, 100 countries Monthly growth

Page 12: Lecture 04

Communication Tasks Transmission System utilization Interfacing Signal generation Synchronization Exchange Management Error Detection & Correction Flow Control Addressing Routing Recovery Message formatting Security Network Management

Page 13: Lecture 04

Transmission System uti l izationTransmission System utilization refers to the need to make

efficient use of transmission facilities that are typically shared among a number of communicating devices.

Various techniques (referred to as multiplexing) are used to allocate the total capacity of a transmission medium among a number of users.

Congestion Control techniques may be required to assure that the system is not overwhelmed by excessive demand for transmission services.

Page 14: Lecture 04

Interfacing & Signal generation

To communicate a device must interface with the transmission system.

Once an interface is established, signal generation is required for communication.

The properties of the signal such as form and intensity must be such that they are:

capable of being propagated through the transmission system Interpretable as data at the receiver.

Page 15: Lecture 04

Synchronization

Not only must the signals be generated to confirm to the requirements of the transmission system and receiver, but there must be some form of synchronization between transmitter and receiver.

Page 16: Lecture 04

Exchange ManagementIf data are to be exchanged in both directions over a period of

time, the two parties must cooperate. e.g. Telephone.

For data processing devices more will be done than simply establishing a connection, certain conventions must be decided upon.

These conventions may include whether both devices may transmit simultaneously or must take turns, the amount of data to be sent at one time, the format of the data and what to do if certain contingencies such as an error arise.

Page 17: Lecture 04

Error Detection and CorrectionError detection and correction are required in circumstances

where errors cannot be tolerated.

This is usually the case with data processing systems.

For example in transferring a file from one computer to another it is simply not acceptable for the contents of the file to be accidentally altered.

Page 18: Lecture 04

Flow ControlFlow Control is required to assure that the source does not

overwhelm the destination by sending data faster than they can be processed and absorbed.

Page 19: Lecture 04

Addressing and routingWhen a transmission facility is shared by more than two devices,

the source system must indicate the identity of the intended destination.

The transmission system must assure that the destination system and only that system receives the data.

Further the transmission system may itself be a network through which various paths may be taken.

A specific route through this network must be chosen.

Page 20: Lecture 04

RecoveryRecovery techniques are needed in situations in which an

information exchange ,such as a database transaction or file transfer, is interrupted due to a fault somewhere in the system.

The objective is either to be able to resume activity at the point of interruption or atleast to restore the state of systems involved to the condition prior to the beginning of exchange.

Page 21: Lecture 04

Message formattingMessage formatting has to do with an agreement between

two parties as to the form and format of the data to be exchanged or transmitted, such as the binary code for characters.

Page 22: Lecture 04

SecurityThe sender of data may wish to be assured that only the intended

receiver actually receives the data.

And the receiver of the data may wish to be assured that the received data have not been altered in transit and the data actually come from the purported sender.

Page 23: Lecture 04

Network ManagementFinally, a data communication facility is a complex system

that cannot create or run itself.

Network Management capabilities are needed to configure the system, monitor its status, react to failures and overloads and plan intelligently for future growth.

Page 24: Lecture 04

Protocol ArchitectureInstead of implementing the logic for communication

between two computers as a single module, the task is broken up in to subtasks, each of which is implemented separately as a structured set of modules.

That structure is referred to as a protocol architecture.

Page 25: Lecture 04

A Simplif ied Architecture for Fi le Transfer

File Transfer Application

Communication service module

Network access module

File Transfer Application

Communication service module

Network access module

Files and File Transfer Commands

Communications-related data units

Network Interface Logic

Communications

Network

Communications

Network

Network Interface Logic

Computer Y Computer Z

Page 26: Lecture 04

Characteristics of a ProtocolDirect/IndirectMonolithic/StructuredSymmetric / AsymmetricStandard / Non Standard

Page 27: Lecture 04

Suggested ReadingsSection 1.1,Section 1.4, Section 2.1 of Data and computer

communications sixth edition by william stallingsSection 2.4 Categories of networks Data communications

and networking 2nd edition by Behrouz A foruzan

Page 28: Lecture 04

Thanks!!!