Computer Networks Notes - 1
Computer Networks Notes - 1
Networks use Distributed processing, in which a task is divided among multiple computers.
Advantages of Distributed processing are
Security/ Encapsulation
Distributed data bases
Faster problem solving
Security through Redundancy
Collaborative processing
Network Criteria
Performance:
The performance can be measured in many ways and depends on number of factors.
Number of users
Type of transmission medium
Hardware
Software
Reliability
Frequency of failure
Recovery time of a network after a failure.
Catastrophe.
Security
Unauthorized access
Viruses
Applications
Accessing Remote databases
Accessing Remote programs
Value added communication facility
Marketing and sales
Financial services
Manufacturing
Electronic message
Directory services
Information services
Teleconferencing
Cellular telephone
Cable television
IMP
Subnet
The end systems are called the HOSTS. The hosts are connected through acommunication
subnet or simply Subnet as shown in fig.
The subnet consists of two parts: a) Transmission lines b) Switching elements.
The Transmission lines transmit the raw bits. The Switching elements are specialized
computers, which switches packets. This is called Interface Message Processor (IMP) or
Router or data switching exchanges or packet switching nodes.
The data can be transmitted through the subnet in two ways. They are
a) Point to point or store and forward
b) Broad casting
Network Architecture
To reduce the design complexity, most networks are organized as a series of layers or
levels, each built upon on the one below it. The number of layers, the name of each layer
,the contents of each layer ,and the function of each layer differ from network to network
However, in all networks the purpose of each layer is to offer certain services to the higher
layers ,shielding those layers from the details of how the offered services are actually
implemented.
Layer 5 protocol
Layer 5 Layer 5
Physical Medium
The interface defines which primitive operation and services the lower layer offers to the
upper one.
a. Simplex communication:
Simplex transmission
A B
Ex: Keyboards, Monitors
A B
Ex: Two-way road, where traffic will be there in both the directions.
REFERENCE MODELS
In 1947, the International Standards Organization (ISO) proposed a network model that covers all
network communications .This model is called Open Systems Interconnection (OSI) model. An open
system is a model that allows any two different systems to communicate regardless of their
underlying architecture.
The OSI model is built of seven layers: Physical (layer 1), Data link (layer 2), Network
(layer 3), Transport (layer 4), Session (layer 5), Presentation (layer 6) and Application layers
(layer 7).
Within a single machine, each layer calls upon the services of the layer just below it.layer 3,for
example, uses the services provided by layer 2 and provides for layer 4.Between machines layer
on one machine communicates with layer x on another machine. This communication is governed
by protocols. The processes on each machine that communicate at a given layer are called peer
–to – peer processor.
At the physical layer, communicate is direct: Machine A sends a stream of bits to machine B. At
the higher layers, however, communication must move down through the layers on machine A, over
to machine B, and then back up through the layers. Each layer in the sending machine adds its own
information to the message it receives from the layer just above it and passes the whole package
to the layer just below it. This information is added in the form of headers or trailers. Headers are
added to the message at layers 6, 5, 4, 3, and 2.At layer 1 the entire message converted to a form
that can be transferred to the receiving machine. At the receiving machine,
Ms. Swagata Panchadhyayee
Assistant Professor, AI/ML, IIE, Kalyani
the message is unwrapped layer by layer, with each process receiving and removing the data meant
for it.
The seven layers can be thought of as belonging to three subgroups. Layers 1, 2, 3 –are the network
support layers; they deal with the physical aspects of moving data from onr machine to another.
Layers 5, 6, 7—can be thought of as user support layers: they allow interoperability among unrelated
software systems. Layer 4,the transport layer, ensures end to end reliable transmission while layer
2 ensures reliable transmission on a single link. The upper layers are implemented almost always
in software; lower layers are a combination of hard ware and software, where as physical layer is
mostly hardware.
Name of unit
Layer exchanged
Application protocol
7 Application Application
OSI TCP/IP
Application Application
Presentation
Not present in
Session the model
Transport Transport
Network Network
Physical Physical
Switching Methods
Two different types of switching methods are used: Circuit switching and Packet switching.
Circuit Switching
Propagation delay
P1
P2
DATA
P3
Ack signal
Ack signal
1 2 3 4
1 2 3 4
1 2 3 4
P1
P2 Packet switching
P3
X.25
It is an interface between DCE and DTE for terminal operation in the packet mode on public data
networks.
It defines how a packet- mode terminal connected to a packet network for the exchange of data.
It defines how the user‘s DTE communicates with the network and how packets are sent over that
network using DCE‘s.
X.25 has three layers:
Physical layer
Frame layer and
Packet layer
Physical Layer:
At the physical layer, X.25 specifies a protocol called X.21.
This is similar to other physical layer protocols.
X.25 provides data link control using a bit oriented protocol called link access procedure balanced
(LAPB).
Packet Layer:
The Network layer in x.25 is called the Packet Layer Protocol (PLP).
This layer is responsible for establishing the connection, transferring data and terminating
the connection.
It is also responsible for creating the virtual circuits and negotiating network services
between two DTEs.
The Frame layer is responsible for making a connection between a DTE and DCE, the
Packet layer is responsible for making a connection between two DTEs.
End-to-End flow and error control between two DTEs are under the jurisdiction of the
Packet Layer.
Examples of Networks
NOVEL NETWARE
The most popular network in pc world system is novel netware.it was designed to be used by
companies from a mainframes to a network of PCs.
1. In this system, each user has a desk top PC functioning as a client.
2. Some number of power full PCs operate as servers providing file services ,data base
services and other services to a collection of clients it uses a proprietary protocol.
3. It is based an old Xerox network system, XNS with various modifications. Because of five-
layers, it looks much like TCP/IP than ISO OSI.
4. Physical and data link layer can choose an Ethernet, IBM token ring and ARC net protocols.
5. The network layer runs an unreliable connectionless Internet work protocol called ARC net
protocols.
6. It passes packets from source to destination transparently; even both are of different
networks.
7. Application layer uses SAP (Service Advertising protocol), to broadcast a packet and tell
what
ISDN was developed by ITU- T in 1976.It is a set of protocols that combines digital telephony and
data transport services. The whole idea is to digitize the telephone network to permit the
transmission of audio, video, and text over existing telephone lines.
The goal of isdn is to form a wide network that provides universal end –to – end connectivity over
digital media. This can be done by integrating all of the separate transmission services into one
without adding links or subscriber lines.
HISTORY
Initially, telecommunications networks were entirely analog networks and were used for the
transmission of analog information in the form of voice.
With the advent of digital processing, subscribers needed to exchange data as well as voice.
Modems were developed to allow digital exchange over analog lines.
To reduce cost and improve performance, the telephone companies gradually began to adddigital
technologies while continuing their analog services to their customers.
Next, customers began to require access to a variety of networks, such as packet- switched
networks and circuit –switched networks. To meet these needs the telephone companies created
Integrated Digital Network (IDN). An IDN is a combination of networks available for different
purposes.
The ISDN integrates customer service with the IDN. With ISDN all customers‘ services become
digital rather than analog and will allow the customers services to be made available on demand.
SERVICES
The purpose of the ISDN is to provide fully integrated digital services to users. These services fall
in to three categories: bearer services, teleservices, and supplementary services.
Bearer service
Bearer services provide the means to transfer information (voice, data, and voice) between users
without the network manipulating the content of information.
Tele Service
In teleservices the network may change or process the contents of the data. These services
correspond to layers 4 – 7 of the OSI ISO model. this service include telephony,telefax,videotex,
telex and teleconferencing.
Supplementary service
Supplementary services are those services that provide additional functionality to the bearer service
and teleservices. These services include call waiting, reverse charging, and message handling.
Reverse
Telex charging
Teleconferencing
Message
Circuit Packet Cell
switching switching. switching Handling
-
Bearer Services
To allow flexibility, digital pipes between customers and the ISDN office are organized intomultiple
channels of different sizes. The ISDN standard defines three channel types, each with a different
transmission rate: bearer channels, data channels, and hybrid channels
Channel Rates
Bearer (B) 64
Data (D) 16,64
Hybrid (H) 384,1536,1920
B Channel
A B channel is defined at a rate of 64 Kbps .It is the basic user channel and can carry any type of
digital information in full duplex mode as long as the required transmission rate does not exceed 64
Kbps. A B channel can be used to carry digital data, digitized voice, or other low data – rate
information.
D Channel
A D channel can be either 16 or 64 Kbps, depending on the need of the user. The primary function
of a D channel is to carry control signaling for the B channels. A D channel carries the
Ms. Swagata Panchadhyayee
Assistant Professor, AI/ML, IIE, Kalyani
control signaling for all the channels in a given path, using a method called common – channel
(Out – of – band) signaling.
Less common uses for the D channel include low- rate data transfer and applications such as
telemetry and alarm transmission.
H Channel
H Channels are available with data rates of 384 Kbps (HO), 1536 Kbps (H11), or 1920(H12).
These e rates suit for high data rate applications such as video, teleconferencing and so on.
ISDN
Integrated services digital network
IDN
Packet
switched
Digital
Pipes
ISDN
Circuit
switching
Office
Subscriber loops
………….
User Interfaces
Digital subscriber loops are two types: basic rate interface (BRI ) and primary rate interface (PRI
) .Each type is suited to a different level of customer needs .Both include one D channel and some
number of either B or H channels.
BRI
The basic rate interface specifies a digital pipe consisting of two B channels and one 16Kbps D
channel.
To ISDN office
PRI
The usual PRI specifies a digital pipe with 23 B channels and one 64 Kbps D channel.
To ISDN office
P R I 1.544 Mbps
PRI requires a digital pipe of 1.544 Mbps. Conceptually, the PRI services is like a large pipe
containing 24 smaller pipes, 23 for the B channels and for the D channel. The rest of the pipe carries
the overhead bits.
One PRI can provide full – duplex transmission between as many as 23 sources and receiving
nodes. The individual transmission are collected from their source and multiplexed on to a single
path for sending to the ISDN office.
Functional Grouping
Functional Grouping used at the subscriber‘s premises includes network terminations, terminal
equipment and terminal adapters, enables users to access the services of the BRI and PRI.
An NT1 device controls the physical and electrical termination of the ISDN at user‘s internal system
to the digital subscriber loop. These functions are comparable to those defined for the OSIphysical
layer.
An NT1 organizes the date stream from connected subscribers into frames that can be sent
over the digital pipe, and translates the frame received from the network into a format usable by the
subscriber‘s device.
The TE is used by ISDN in the same manner as DTE in other protocol. Examples of TE1 are
digital telephones, integrated voice/data terminals, digital facsimiles.
To provide backward compatibility with a customer‘s existing equipment, the ISDN standard defines
a second level of terminal equipment called Terminal Equipment 1 ( TE1 ).This is a non ISDN
device, such as terminal, workstation or regular telephone. This can be used with the helpof
another device called a terminal adapter (TA).
Reference Points
This refers to the label used to identify individual interface between two elements of an ISDN
installation. There are four reference points that defines the interface between a subscriber‘s
equipment and the network. They are R, S, T and U.
Reference Point R defines the connection between a TE2 and a Ta. Reference Point S defines
the connection between a TE1 or TA and an NT1 or NT2. Reference Point T defines the interface
between an NT2 and NT1. Reference Point U defines the interface between an NT1 and the
ISDN office.
R S U
To ISDN
TE2 TA
NT1 Office
S U
TE1 To ISDN
NT1 Office
S T U
To ISDN
TE1
2 NT1 Office
B channel D channel
User‘s choice
Layers 4,5,6,7
The ISDN physical layer specifications are defined by two ITU-T standards: L430 for BRI access
and I.431 for PRI access. These standards define all aspects of the BRI and PRI. Of these aspects,
four are of primary importance:
The mechanical and electrical specifications of interfaces R, S, T and U.
Encoding
Multiplexing channels to make them carriable by the BRI and PRI digital pipe.
Power supply