Вы находитесь на странице: 1из 45

Unit 2

Telecommunication and Networks: Telecommunications Media,


Introduction to Networking ,Classification of Networks Network Topologies,
Network types: LAN, MAN, WAN, Network Architectures-The OSI Model,
TCP/IP The Internet, Intranet and Extranets: Operation of the Internet,
Services provided by Internet, World Wide Web, Intranets and Extranets, IP
Addressing.

Introduction to E-commerce: Electronic Commerce Models, Value Chains


in Electronic Commerce, Types of E-Commerce, Advantage & disadvantages
of E-Commerce-Commerce in India.
DEFINTION & APPLICATIONS
• DEFINTION:
A computer network is defined as the interconnection of two or more
computers. It is done to enable the computers to communicate and share
available resources.
• APPLICATIONS:
i. Sharing of resources such as printers
ii. Sharing of expensive software's and database
iii. Communication from one computer to another computer
iv. Exchange of data and information among users via network
v. Sharing of information over geographically wide areas.
 The importance of computer networks
and various types of Network
• cost reduction by sharing hard- and software resources
• high reliability by having multiple sources of supply
• cost reduction by downsizing to microcomputer-based networks
instead of using mainframes
• greater flexibility because of possibility to connect devices from
various vendors
Types of Computer Networks

NETWORK

PAN LAN WAN MAN CAN


PERSONAL AREA NETWORK(PAN)

• A personal area network is a computer network organized around an


individual person. Smallest network used for personal job.
Connectivity range is less.
• It generally consists of a mobile computer, a cell phone or personal
digital assistant. PAN enables the communication among these
devices. Eg Bluetooth network, TV remote.
• It can also be used for communication among personal devices
themselves for connecting to a digital level network and internet.
• The PANs can be constructed using wireless or cables.
PAN
LOCAL AREA NETWORK(LAN)
• LAN is a network which is designed to operate over a small physical area
such as an office, factory or a group of buildings.
• Privately owned, used in small geographical area.
• LAN’s are easy to design and troubleshoot
• Exchange of information and sharing of resources becomes easy because
of LAN.
• In LAN all machines are connected to a single cable.
• Different types of topologies such as star, tree, bus, ring, etc Can be used
• It is usually a privately owned network.
LAN
WIDE AREA NETWORK(WAN)
• It’s a telecommunication network. WAN is used for communication between devices of
large geographical area such as:- countries or continents and uses a common carrier like
satellite, telephone line.
• WAN contain multiple small networks, such as LANs or MANs. Internet are largest WAN.
• When network spans over a large distance or when the computers to be connected to
each other are at widely separated locations a local area network cannot be used. A
wide area network(WAN) is installed.
• The communication between different users of WAN is established using leased
telephone lines, satellite links and similar channels.
• It is cheaper and more efficient to use the phone network for the link.
• Most WAN networks are used to transfer large blocks of data between its users.
WAN
METROPOLITAN AREA NETWORK(MAN)

• It is in between LAN & WAN technology that covers the entire city.
• It uses similar technology as LAN.
• It can be a single network such as cable TV network, or a measure of
connecting a number of LAN’s o a large network so that resources can
be shared LAN to LAN as well as device to device.
• Larger than LAN. Covers cities and the surrounding areas.
• Can be created by interconnecting two LAN’s.
• Communication is fast as they communicate through Optical fibre
cables. Ex: Cable TV that covers entire city or group of several networks
MAN
CAMPUS AREA NETWORK(CAN)
• The campus area network is made up of an interconnection of LAN
with limited geographical area.
• Network equipments such as switches, routers and the transmission
media i.e. optical fibre etc are almost entirely owned by the campus
owner.
CAN
Open Systems Interconnect (OSI)
Model
• Who made:
• International Standards Organization (ISO)
• A Model of How Protocols and Networking
Components Could be Made
• “Open” means the concepts are non-proprietary; can
be used by anyone.
• OSI is not a protocol. It is a model for understanding
and designing a network architecture that is flexible
and robust.

15
Open Systems Interconnect (OSI)
Model
OSI
Role of the router, Hub, switch
Role of the router, Hub, switch
NETWORK CLASSIFICATION BY THEIR
COMPONENT ROLE

LOCAL AREA NETWORK

PEER TO PEER NETWORK CLIENT SERVER NETWORK


PEER TO PEER NETWORK
• In peer to peer network each computer is responsible for making its
own resources available to other computers on the network.
• Each computer is responsible for setting up and maintaining its own
security for these resources.
• Also each computer is responsible for accessing the required network
resources from peer to peer relationships.
• Peer to peer network is useful for a small network containing less than
10 computers on a single LAN .
• In peer to peer network each computer can function as both client and
server.
• Peer to peer networks do not have a central control system. There are
no servers in peer networks.
• Peer networks are amplified into home group.
ADVANTAGES & DISADVANTAGES OF
PEER TO PEER NETWORK
Advantages:
 Use less expensive computer hardware
 Easy to administer
 No NOS(network operating system) required
 More built in redundancy
 Easy setup & low cost

Disadvantages:
 Not very secure
 No central point of storage or file archiving
 Additional load on computer because of resource sharing
 Hard to maintain version control
CLIENT/SERVER NETWORK
• In client-server network relationships, certain computers act as server and
other act as clients. A server is simply a computer, that available the network
resources and provides service to other computers when they request it. A
client is the computer running a program that requests the service from a
server.
• Local area network(LAN) is based on client server network relationship.
• A client-server network is one n which all available network resources such
as files, directories, applications and shared devices, are centrally managed
and hosted and then are accessed by client.
• Client serve network are defined by the presence of servers on a network
that provide security and administration of the network.
ADVANTAGES AND DISADVANTAGES
OF CLIENT-SERVER NETWORK
Advantages:
 Very secure
 Better performance
 Centralized backup
 very reliable

Disadvantages:
 requires professional administration
 More hardware-intensive
 More software intensive
 Expensive dedicated software
Basic Definitions
• FTP and its purpose
• File Transfer Protocol (FTP) is a standard Internet protocol for transmitting files
between computers on the Internet over TCP/IP connections.
• FTP is a client-server protocol that relies on two communications channels between
client and server: a command channel for controlling the conversation and a data
channel for transmitting file content. Clients initiate conversations with servers by
requesting to download a file. Using FTP, a client can upload, download, delete,
rename, move and copy files on a server. A user typically needs to log on to the FTP
server, although some servers make some or all of their content available without
login, also known as anonymous FTP.
• The main purpose of FTP (file transfer protocol) is the move files from a client to a
server. Then, another client or web interface can download those files from the
server. This is done using commands to transfer the data.
Basic Definitions
• A VPN connection is the extension of a private network that includes links
across shared or public networks, such as the Internet. VPN connections (VPNs)
enable organizations to send data between two computers across the Internet
in a manner that emulates the properties of a point-to-point private link.
• Data Encapsulation
• When a network device sends a message, the message will take the form of a
packet. Each OSI (open system interconnection) model layer adds a header to
the packet. The packet is then covered with some information directing it
onward to a destination; this is analogous to the address on a letter in which the
actual message is carried inside the envelope. Similarly, the message in the
packet is encapsulated with some information such as the address of next node,
protocol information, the type of data and the source and destination
addresses.
Basic Definitions
• HTTP (Hypertext Transfer Protocol) HTTP (Hypertext Transfer Protocol) is the set of rules for
transferring files (text, graphic images, sound, video, and other multimedia files) on the
World Wide Web. As soon as a Web user opens their Web browser, the user is indirectly
making use of HTTP.
Instead of HyperText Transfer Protocol (HTTP), this website uses HyperText Transfer Protocol
Secure (HTTPS). Using HTTPS, the computers agree on a "code"between them, and then they
scramble the messages using that "code" so that no one in between can read them. This keeps
your information safe from hackers.
• URL stands for Uniform Resource Locator, and is used to specify addresses on the World
Wide Web. A URL is the fundamental network identification for any resource connected to
the web (e.g., hypertext pages, images, and sound files). URLs have the following format:
protocol://hostname/other_information
• URL is an acronym for Uniform Resource Locator and is a reference (an address) to a
resource on the Internet. A URL has two main components: Protocol identifier: For
the URL http://example.com , the protocol identifier is http . Resource name: For
the URL http://example.com , the resource name is example.com .
Basic Definitions
• NNTP
• NNTP (Network News Transfer Protocol) is the predominant protocol used by
computer clients and servers for managing the notes posted on Usenet
newsgroups. NNTP replaced the original Usenet protocol, UNIX-to-UNIX Copy
Protocol (UUCP) some time ago. NNTP servers manage the global network of
collected Usenet newsgroups and include the server at your Internet access
provider. An NNTP client is included as part of a Netscape, Internet Explorer,
Opera, or other Web browser or you may use a separate client program called
a newsreader.
• SMTP
• The email server responsible for sending emails is called the SMTP (Simple
Mail Transfer Protocol) server. One SMTP server can pass on the mail to
another SMTPserver and relay it to the destination through several hops.
Diagrams
Diagrams
Diagrams
layers of the TCP/IP Application layer
in terms of OSI reference model
• TCP/IP also is a layered protocol but
does not use all of the OSI layers,
though the layers are equivalent in
operation and function (Fig. 2). The
network access layer is equivalent to
OSI layers 1 and 2. The Internet
Protocol layer is comparable to layer 3
in the OSI model. The host-to-host
layer is equivalent to OSI layer 4. These
are the TCP and UDP (user datagram
protocol) functions. Finally, the
application layer is similar to OSI layers
5, 6, and 7 combined.
layers of the TCP/IP Application layer
in terms of OSI reference model
• In the OSI model, data flows down the transmit layers, over the physical link, and then up
through the receive layers.
• The seven layers of the OSI model somewhat correspond with the four layers that make up
the TCP/IP protocol.
• The header is added and then removed during the encapsulation and de-encapsulation of
the packet data at the TCP layer.
• The IPv4 header is used during the Internet Protocol process in data transmission.
• The new IPv6 header for the Internet Protocol is similar to IPv4 but uses 128-bit source and
destination addresses.
• TCP/IP is the older of the two approaches to data communications and is well established
throughout the world. The OSI model, however, is a proven concept that is used in all other
data communications protocols. It will continue to be used as a guideline for all other
communications applications.
TCP/IP Layers
• It contains four layers, unlike seven layers in the OSI model. The
layers are:
• Process/Application Layer
• Host-to-Host/Transport Layer
• Internet Layer
• Network Access/Link Layer
comparison of the TCP/IP and OSI
model
comparison of the TCP/IP and OSI
model TCP/IP OSI

TCP refers to Transmission Control Protocol. OSI refers to Open Systems Interconnection.

TCP/IP has 4 layers. OSI has 7 layers.


TCP/IP is more reliable OSI is less reliable

TCP/IP does not have very strict boundaries. OSI has strict boundaries

TCP/IP follow a horizontal approach. OSI follows a vertical approach.

TCP/IP uses both session and presentation layer in


the application layer itself. OSI uses different session and presentation layers.

TCP/IP developed protocols then model. OSI developed model then protocol.
Layers Of TCP/IP
• 1. Network Access Layer –
• This layer corresponds to the combination of Data Link Layer and Physical Layer of the OSI model. It looks out for
hardware addressing and the protocols present in this layer allows for the physical transmission of data.
We just talked about ARP being a protocol of Internet layer, but there is a conflict about declaring it as a protocol of
Internet Layer or Network access layer. It is described as residing in layer 3, being encapsulated by layer 2 protocols.
• 2. Internet Layer –
• This layer parallels the functions of OSI’s Network layer. It defines the protocols which are responsible for logical
transmission of data over the entire network. The main protocols residing at this layer are :
• IP – stands for Internet Protocol and it is responsible for delivering packets from the source host to the destination
host by looking at the IP addresses in the packet headers. IP has 2 versions:
• IPv4 and IPv6. IPv4 is the one that most of the websites are using currently. But IPv6 is growing as the number of IPv4
addresses are limited in number when compared to the number of users.
• ICMP – stands for Internet Control Message Protocol. It is encapsulated within IP datagrams and is responsible for
providing hosts with information about network problems.
• ARP – stands for Address Resolution Protocol. Its job is to find the hardware address of a host from a known IP
address. ARP has several types: Reverse ARP, Proxy ARP, Gratuitous ARP and Inverse ARP.
Layers Of TCP/IP
• 3. Host-to-Host Layer –
• This layer is analogous to the transport layer of the OSI model. It is responsible for end-to-end communication
and error-free delivery of data. It shields the upper-layer applications from the complexities of data. The two
main protocols present in this layer are :
• Transmission Control Protocol (TCP) – It is known to provide reliable and error-free communication between
end systems. It performs sequencing and segmentation of data. It also has acknowledgment feature and
controls the flow of the data through flow control mechanism. It is a very effective protocol but has a lot of
overhead due to such features. Increased overhead leads to increased cost.
• User Datagram Protocol (UDP) – On the other hand does not provide any such features. It is the go-to protocol
if your application does not require reliable transport as it is very cost-effective. Unlike TCP, which is
connection-oriented protocol, UDP is connectionless.
• 4. Process Layer –
• This layer performs the functions of top three layers of the OSI model: Application, Presentation and Session
Layer. It is responsible for node-to-node communication and controls user-interface specifications. Some of the
protocols present in this layer are: HTTP, HTTPS, FTP, TFTP, Telnet, SSH, SMTP, SNMP, NTP, DNS, DHCP, NFS, X
Window, LPD. Have a look at Protocols in Application Layer for some information about these protocols.
TCP/IP model and protocols
• Protocols
• HTTP and HTTPS – HTTP stands for Hypertext transfer protocol. It is used by the World Wide Web to manage
communications between web browsers and servers. HTTPS stands for HTTP-Secure. It is a combination of HTTP
with SSL(Secure Socket Layer). It is efficient in cases where the browser need to fill out forms, sign in, authenticate
and carry out bank transactions.

• SSH – SSH stands for Secure Shell. It is a terminal emulations software similar to Telnet. The reason SSH is
more preferred is because of its ability to maintain the encrypted connection. It sets up a secure session
over a TCP/IP connection.
• NTP – NTP stands for Network Time Protocol. It is used to synchronize the clocks on our computer to one
standard time source. It is very useful in situations like bank transactions. Assume the following situation
without the presence of NTP. Suppose you carry out a transaction, where your computer reads the time
at 2:30 PM while the server records it at 2:28 PM. The server can crash very badly if it’s out of sync.
Advantages of fiber optics have over other media

• Speed
Fiber-optic communication systems can be used to transmit more
information than copper cables and preferred for digital communications.
*Secure
Fiber optics is a media where no electro magnetic interference and it is
highly secured.
*Bandwidth is high
Fiber optic cables have a much greater bandwidth than metal cables. The
amount of information that can be transmitted per unit time of fibre over
other transmission media is its most significant advantage.
Electronic Data Interchange
• EDI replaces postal mail, fax and email.
While email is also an electronic
approach, the documents exchanged
via email must still be handled by
people rather than computers. Having
people involved slows down the
processing of the documents and also
introduces errors. Instead, EDI
documents can flow straight through to
the appropriate application on the
receiver’s computer (e.g., the Order
Management System) and processing
can begin immediately.
Encryption and Decryption on a network
Revision Questions
• What is WWW? What is the use of hypertext links in Internet access?
• You need to connect two computers for file sharing. Is it possible to
do this without using a hub or router? Explain your answer.(point to
point network)
• Enumerate ipconfig? Explain the steps involved?
• Enumerate point to point link?
Thank You

Вам также может понравиться