0% found this document useful (0 votes)
9 views27 pages

CN UNIT I

Cn unit-1

Uploaded by

gopigangula36
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views27 pages

CN UNIT I

Cn unit-1

Uploaded by

gopigangula36
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 27

UNIT I

Introduction: History and development of computer networks, Basic Network Architectures:


OSI reference model, TCP/IP reference model, and Networks topologies, types of networks
(LAN, MAN, WAN, circuit switched, packet switched, message switched, extranet, intranet,
Internet, wired, wireless).

Network: A network is the interconnection of a set of devices capable of communication. In


this definition, a device can be a host (or an end system as it is sometimes called) such as a
large computer, desktop, laptop, workstation, cellular phone, or security system.(or) A
network consists of two or more computers that are linked in order to share resources (such as
printers and CDs), exchange files, or allow electronic communications. The computers on a
network may be linked through cables, telephone lines, radio waves, satellites, or infrared
light beams. A device in this definition can also be a connecting device such as a router,
which connects the network to other networks, a switch, which connects devices together, a
modem (modulator-demodulator), which changes the form of data, and so on. These devices
in a network are connected using wired or wireless transmission media such as cable or air.
When we connect two computers at home using a plug-and-play router, we have created a
network, although very small.

Introduction:
Computer Network means the interconnection of a set of autonomous computers. The term
autonomous means that the function of computers is independent of others. However, these
computers can exchange information with each other through the communication channels like
copper wire, fiber optics, microwaves, infrared, and communication satellites can also be used.
Components:
The five components that make up a data communication are the message, sender, receiver, medium,
and protocol.
Figure 1.1 Five components of data communication
1. Message: The message is the information (data) to be communicated. The Popular forms
of information include text, numbers, pictures, audio, and video.
2. Sender: The sender is the device that sends the data message. It can be a computer,
workstation, telephone handset, video camera, and so on.
3. Receiver: The receiver is the device that receives the message. It can be a computer,
workstation, telephone handset, television, and so on.
4. Transmission medium. The transmission medium is the physical path by which a message
travels from sender to receiver. Some examples of transmission media include twisted-pair
wire, coaxial cable, fiber-optic cable, and radio waves.
5. Protocol. A protocol is a set of rules that maintain data communications. It represents an
agreement between the communicating devices. Without a protocol, two devices may be
connected but not communicating, just like a person speaking French cannot be understood
by a person who speaks only Japanese.

Data Flow:
Communication between two devices can be simplex, half-duplex, or full-duplex as shown in
following figure.

Simplex :
In simplex mode, the communication is unidirectional, as on a one-way road. Only one of the two
devices on a link can transmit; the other can only receive (see Figure a).
Keyboards and traditional monitors are examples of simplex devices. The keyboard can
only give input; the monitor can only accept output. The simplex mode can use the entire capacity
of the communication channel to send data in one direction only

Half-Duplex :

In half-duplex mode, each system can both transmit and receive, but not at the same time. When one
device is sending, the other can only receive, and vice versa (see Figure b).
The half-duplex mode is like a one-lane street with traffic allowed in both directions. When cars are
traveling in one direction, cars going the other way must wait. Walkie-talkies are half-duplex
system.
The half-duplex mode is used in cases where there is no need for communication in both directions
at the same time.
Full-Duplex :

In full-duplex mode (also called duplex), both systems can transmit and receive simultaneously (see
Figure c). The full-duplex mode is like a two way street with traffic flowing in both directions at
the same time. In full-duplex mode, signals going in one direction share the capacity of the link: with
signals going in the other direction. This sharing can occur in two ways: Either the link must contain
two physically separate transmission paths, one for sending and the other for receiving; or the
capacity of the channel is divided between signals traveling in both directions.One common example
of full-duplex communication is the telephone network. When two people are communicating by a
telephone line, both can talk and listen at the same time. The full-duplex mode is used when
communication in both directions is required all the time.

BASIC NETWORK ARCHITECTURES

THE OSI MODEL


The OSI model is based on the proposal developed by International Standards Organization
(ISO) this model is called as ISO-OSI (Open Systems Interconnection) Reference Model because it
is used for connecting the open systems. That is the systems which are open for communication
with other systems.
It was a first step towards the International standardization of the protocols used in various
layers by Day and Zimmermann in 1983.
The OSI model is a layered framework for the design of network systems that allows
communication between all types of computer systems. It consists of seven separate but related
layers, each of which defines a part of the process of moving information across a network.
Figure: Seven layers of the OSI model

The Following Figure shows the layers involved when a message is sent from device A to device B.
As the message travels from A to B, it may pass through many intermediate nodes. These
intermediate nodes usually involve only the first three layers of the OSI model.

Figure: The OSI reference model

The seven layers of the OSI model are divided into three subgroups.

Layers 1, 2, and 3-physical, data link, and network layers are known as network support layers;
Because they deal with the physical aspects of moving data from one device to another (such as
electrical specifications, physical connections, physical addressing, and transport timing and
reliability).

Layers 5, 6, and 7-session, presentation, and application layers are known as the user support
layers; they allow interoperability among unrelated software systems.

Layer 4, the transport layer, links the two subgroups and ensures that what the lower layers
have transmitted is in a form that the upper layers can use. The upper OSI layers are almost
always implemented in software; lower layers are a combination of hardware and software,
except for the physical layer, which is mostly hardware.

LAYERS IN THE OSI MODEL :

Physical Layer :
The physical layer is used for transmitting the raw bits over a communication channel. Here if the
system at one side sends 1bit, it is received by the other side also as a 1bit, not as a 0 bit. The
functions required to carry a bit stream over a physical medium. It deals with the mechanical and
electrical specifications of the interface and transmission medium.
Following figure shows the position of the physical layer with respect to the transmission medium
and the data link layer.

Figure: Physical layer

The physical layer is also concerned with the following:


 Representation of bits: The physical layer data consists of a stream of bits (sequence
of 0s or 1s) with no interpretation. To be transmitted, bits must be encoded into signals--
electrical or optical.
 Data rate: It represents that how many number of bits can be transferred in each second
is also defined by the physical layer.
 Synchronization of bits:The sender and receiver both must have to use the same bit
rate but also must be synchronized at the bit level.

 Line configuration: The physical layer is concerned with the connection of devices to the
media. In a point-to- point configuration, two devices are connected through a dedicated
link. In a multipoint configuration, a link is shared among several devices.
 Physical topology: The physical topology defines how devices are connected to make a
network. Ex: mesh topology, a star topology, a ring topology, a bus topology, a hybrid
topology.
 Transmission mode: The physical layer also defines the
direction of transmission between the two devices as Simplex,
Half-duplex, and Full-duplex.
Data Link Layer
The data link layer transforms the physical layer, a raw transmission facility, to a reliable
link. It makes the physical layer appear as an error-free to the upper layer (network layer).
Following Figure shows the relationship of the data link layer to the network and physical layers.

 Framing: The data link layer divides the stream of bits received from the network layer
into data units called frames.
 Physical addressing. If frames are to be distributed to different systems on the network,
the data link layer adds a header to the frame to define the sender and/or receiver of the
frame. If the frame is intended for a system outside the sender's network, the receiver
address is the address of the device that connects the network to the next one.
 Flow control: If the rate at which the data is absorbed by the receiver is less than the rate at
which data is transferred by thesender, the data link layer uses a flow control protocols to
maintain same data transfer rate between sender and the receiver
 Error control: The data link layer adds reliability to the physical layer by adding
mechanisms to detect and correct the damaged or lost frames. It also uses a mechanism to
recognize duplicate frames. Error control is normally achieved through a trailer added to
the end of the frame.
 Access control: When two or more devices are connected to the same link, data link
layer protocols are necessary to determine which device has to send the data at any given
time. Otherwise there is a chance of collision. For this purpose a special sub layer in the
data link layer known as medium access sub layer will deal this one.
Network Layer:
The network layer is responsible for the delivery of a packet from source to destination, possibly
across multiple networks. The network layer ensures that each packet gets from its point of origin
to its final destination. If two systems are connected to the same link, there is no need for a network
layer. However, if the two systems are attached to different networks with connecting devices
between the networks, there is often a need for the network layer to maintain source-to- destination
delivery.
Following Figure shows the relationship of the network layer to the data link and transport layers.
Figure: Network layer

Other responsibilities of the network layer include the following:


 Logical addressing: The physical addressing implemented by the data link layer handles
the addressing problem locally. The network layer adds a header to the packet coming from
the upper layer that, among other things, includes the logical addresses of the sender and
receiver.
 Routing: When independent networks or links are connected to create
internetworks(network of networks) or a large network, the connecting devices (called
routers or switches) route or switch the packets to their final destination.
 Congestion Control: If there is traffic in one way of network for transferring the data. It is
known as Congestion, Here we have to find another path for transferring the data by the use
of congestion control protocols
Transport Layer:
 The transport layer is responsible for process-to-process delivery of the entire message.
 A process is an application program running on a host.
 Whereas the network layer maintainsource-to-destination delivery of individual packets, it
does not recognize any relationship between those packets. It treats each one
independently, as though each piece belonged to a separate message, whether or not it does.
 The transport layer, on the other hand, ensures that the whole message arrives intact and in
order, overseeing both error control and flow control at the source-to-destination level.
Following Figure shows the relationship of the transport layer to the network and session

layers.
Transport layer
Other responsibilities of the transport layer include the following:
 Service-point addressing: Computers often run several programs at the same time. For
this reason, source-to- destination delivery means delivery not only from one computer to
the next but also from a specific process (running program) on one computer to a specific
process (running program) on the other.
 Segmentation and reassembly: A message is divided into transmittable segments, with
each segment containing a sequence number. These numbers enable the transport layer to
reassemble the message correctly upon arriving at the destination and to identify and
replace packets that were lost in transmission.
 Connection control: The transport layer can be either connectionless or connection
oriented. A connectionless transport layer treats each segment as an independent packet
and delivers it to the transport layer at the destination machine. A connection oriented
transport layer makes a connection with the transport layer at the destination machine
first before delivering the packets. After all the data are transferred, the connection is
terminated.
 Flow control: Like the data link layer, the transport layer is responsible for flow control.
However, flow control at this layer is performed end to end rather than across a single link.
 Error control: Like the data link layer, the transport layer is responsible for error control.
However, error control at this layer is performed process-to process rather than across a
single link. The sending transport layer makes sure that the entire message arrives at the
receiving transport layer without error (damage, loss, or duplication). Error correction is
usually achieved through retransmission.
Session Layer:
Session layer allows users on different machines to establish the Sessions , maintain the
sessions and synchronize the sessions.
The session layer is responsible for dialog control.
Specific responsibilities of the session layer include the following:
 Dialog control: one of the services of the session layer is to manage dialogue control.
Sessions allow traffic in one direction or both the directions at the same time. In a network
we are having many numbers of systems. If more than one system want to perform the
operation, on that case which system will have the priority is the service provided by
session layer, it is known as token management
 Synchronization: The session layer allows a concept of checkpoints, that if we are
transferring a file which may take 2hours between two machines. After the completion of 1
hour if the system crashes, automatically already transferred data will be lost. For that
purpose such a huge data will be divided into checkpoints.
 Following Figure illustrates the relationship of the session layer to the transport and
presentation layers.
Session layer

Presentation Layer:
 The presentation layer is concerned with the syntax and semantics of the information
exchanged between two systems.
 Following Figure shows the relationship between the presentation layer and the application
and session layers.

Figure: Presentation layer

Specific responsibilities of the presentation layer


include the following:
 The presentation layer is responsible for translation, compression, and encryption.
 Translation: The processes (running programs) in two systems are usually exchanging
information in the form of character strings, numbers, and so on. The information must be
changed to bit streams before being transmitted. Because different computers use different
encoding systems, the presentation layer is responsible for interoperability between these
different encoding methods. The presentation layer at the sender changes the information
from its sender-dependent format into a common format. The presentation layer at the
receiving machine changes the common format into its receiver-dependent format.
 Encryption: To carry sensitive information, a system must be able to ensure privacy.
Encryption means that the sender transforms the original information to another form and
sends the resulting message out over the network. Decryption reverses the original process
to transform the message back to its original form.
 Compression: Data compression reduces the number of bits contained in the information.
Data compression becomes particularly important in the transmission of multimedia such
as text, audio, and video.
Application Layer:
 The application layer enables the user, whether human or software, to access the network.
 It provides user interfaces and support for services such as electronic mail, remote file
access and transfer, shared database management, and other types of distributed
information services.
 The application layer is responsible for providing services to the user.
Following Figure shows the relationship of the application layer to the user and the
presentation layer..

Figure: Application layer

Specific services provided by the application layer include the following:


 Network virtual terminal. A network virtual terminal is a software version of a physical
terminal, and it allows a user to log on to a remote host. To do so, the application creates a
software emulation of a terminal at the remote host. The user's computer talks to the
software terminal which, in turn, talks to the host, and vice versa. The remote host believes
it is communicating with one of its own terminals and allows the user to log on.
 File transfer, access, and management. This application allows a user to access files in a
remote host to retrieve files from a remote computer for use in the local computer, and to
manage or control files in a remote computer locally.
 Mail services. This application provides the basis for e-mail forwarding and storage.
 Directory services. This application provides distributed database sources and access
for global information about various objects and services.
Summary of Layers:
The TCP/IP Reference Model :

Let us now turn from the OSI reference model to the reference model used in the grandparent of all
wide area computer networks,
The ARPANET, and its successor, the world wide Internet. It is useful to mention a few key
aspects of it now. The ARPANET was a research network sponsored by the DoD (U.S. Department
of Defense). It eventually connected hundreds of universities and government installations, using
leased telephone lines. When satellite and radio networks were added later, the existing protocols
had trouble interworking with them, so a new reference architecture was needed. This architecture
later became known as the TCP/IP Reference Model, after its two primary protocols.
The TCP/IP reference model

The Internet Layer:

All these requirements led to the choice of a packet-switching network based on a connectionless
internetwork layer. This layer, called the internet layer, Its job is to permit hosts to inject packets
into any network and have them travel independently to the destination They may even arrive in a
different order than they were sent, in which case it is the job of higher layers to rearrange them, if
in-order delivery is desired. Note that ''internet'' is used here in a generic sense, even though this
layer is present in the Internet.
The internet layer defines an official packet format and protocol called IP (Internet Protocol). The
job of the internet layer is to deliver IP packets where they are supposed to go. Packet routing is
clearly the major issue here, as is avoiding congestion. For these reasons, it is reasonable to say that
the TCP/IP internet layer is similar in functionality to the OSI network layer.
The Transport Layer:
The layer above the internet layer in the TCP/IP model is now usually called the transport layer. It
is designed to allow peer entities on the source and destination hosts to carry on a conversation, just
as in the OSI transport layer. Two end-to- end transport protocols have been defined here. The first
one, TCP (Transmission Control Protocol), is a reliable connection-oriented protocol that allows
a byte stream originating on one machine to be delivered without error on any other machine in the
internet. It fragments the incoming byte stream into discrete messages and passes each one on to the
internet layer. At the destination, the receiving TCP process reassembles the received messages into
the output stream. TCP also handles flow control to make sure a fast sender cannot transfer data
accurately to a slow receiver with more messages than it can handle.
The second protocol in this layer, UDP (User Datagram Protocol), is an unreliable,
connectionless protocol for applications that do not want TCP's sequencing or flow control and
wish to provide their own. It is also widely used for client-server-type request-reply queries and
applications in which prompt delivery is more important than accurate delivery, such as
transmitting speech or video.
Stream Control Transmission Protocol (SCTP): The Stream Control Transmission Protocol
(SCTP) provides support for newer applications such as voice over the Internet. It is a transport
layer protocol that combines the best features of UDP and TCP.
TCP/IP PROTOCOL SUITE:

 The TCP/IP protocol suite was developed prior to the OSI model.
 The layers in the TCP/IP protocol suite do not exactly match those in the OSI model.
 The original TCP/IP protocol suite was defined as having four layers: host-to-network,
internet, transport, and application
 However, when TCP/IP is compared to OSI, we can say that the host-to-network
layer is equivalent to the combination of the physical and data link layers.
 The internet layer is equivalent to the network layer
 The application layer is roughly doing the job of the session, presentation, and
application layers with the transport layer in TCP/IP taking care of part of the duties of
the session layer.
 we assume that the TCP/IP protocol suite is made of five layers: physical, data link,
network, transport, and application. The first four layers provide physical standards,
network interfaces, internetworking, and transport
functions that correspond to the first four layers of the OSI model. The three topmost layers
in the OSI model, however, are represented in TCP/IP by a single layer called the
application layer
 TCP/IP is a hierarchical protocol made up of interactive modules, each of which provides a
specific functionality. At the transport layer, TCP/IP defines three protocols:
Transmission Control Protocol (TCP), User
Datagram Protocol (UDP), and Stream Control Transmission Protocol (SCTP). At the
network layer, the main protocol defined by TCP/IP is the Internetworking Protocol (IP);
there are also some other protocols that support data movement in this layer.

The Application Layer:


The TCP/IP model does not have session and presentation layers. No need for them was perceived,
so they were not included. Experience with the OSI model has proven that they are of little use to
most applications.
On top of the transport layer is the application layer. It contains all the higher-level protocols. The
early ones included virtual terminal (TELNET), file transfer (FTP), and electronic mail (SMTP).
The virtual terminal protocol allows a user on one machine to log onto a distant machine and work
there. The file transfer protocol provides a way to move data efficiently from one machine to
another. Electronic mail was originally just a kind of file transfer, but later a specialized protocol
(SMTP) was developed for it. Many other protocols have been added to these over the years.
HTTP, The protocol for fetching pages on the World Wide Web.
The Host-to-Network Layer:
Below the internet layer is a great void. The TCP/IP reference model does not really say much
about what happens here, except to point out that the host has to connect to the network using some
protocol so it can send IP packets to it. This protocol is not defined and varies from host to host and
network to network.
A Comparison of the OSI and TCP/IP Reference Models:
The OSI and TCP/IP reference models have much in common. Both are based on the concept of a
stack of independent protocols. Also, the functionality of the layers is roughly similar. For example,
in both models the layers up through and including the transport layer are there to provide an end-
to-end, network-independent transport service to processes wishing to communicate. These layers
form the transport provider. Again in both models, the layers above transport are application-
oriented layers, provide users a transport service.
Despite these fundamental similarities, the two models also have many differences. In this
section we will focus on the key differences between the two reference models. It is important to
note that we are comparing the reference models here, not the corresponding protocol stacks.
Three concepts are central to the OSI model:
1. Services.
2. Interfaces.
3. Protocols.
Probably the biggest contribution of the OSI model is to make the distinction between these three
concepts explicitly. Each layer performs some services for the layer above it. The service definition
tells what the layer does, not how entities above it access it or how the layer works. It defines the
layer's semantics.
A layer's interface tells the processes above it how to access it. It specifies what the parameters are
and what results to expect. It, too, says nothing about how the layer works inside.
Finally, the peer protocols used in a layer are the layer's own business. It can use any protocols it
wants to, as long as it gets the job done (i.e., provides the offered services). It can also change them
at will without affecting software in higher layers.
These ideas fit very nicely with modern ideas about object-oriented programming.
The TCP/IP model did not originally clearly distinguish between service, interface, and protocol,
although people have tried to retrofit it after the fact to make it more OSI-like. For example, the
only real services offered by the internet layer are SEND IP PACKET and RECEIVE IP PACKET.

Topology:
The term topology refers to the way in which a network is laid out physically: two or more
devices connect to a link; two or more links form a topology. The topology of a network is the
geometric representation of the relationship of all the links and linking devices (usually called
nodes) to one another.

There are four basic topologies possible: mesh, star, bus, and ring

Mesh topology : In a mesh topology, every device has a dedicated point-to-point link to every
other device. The term

dedicated means that the link carries data only between the two devices it connects.
One practical example of a mesh topology is the connection of telephone regional offices
in which each regional office needs to be connected to every other regional office.

To find the number of physical links in a fully connected mesh network with n nodes, we
first consider that each node must be connected to every other node. Node 1 must be connected to n
- 1 nodes, node 2 must be connected to n – 1 nodes, and finally node n must be connected to n-1
nodes. However each physical link allows communication in both directions (duplex mode).
Figure: A fully connected mesh topology (five devices)

Advantages of mesh topology:


 The use of dedicated links guarantees that each connection can carry its own data load, thus
eliminating the traffic problems that can occur when links must be shared by multiple
devices.
 A mesh topology is robust. If one link becomes unusable, it does not fail the entire system
 There is the advantage of privacy or security. When every message travels along a
dedicated line, only the specific recipient sees it. Dedicated links prevent other users from
accessing the messages.
 Finally, point-to-point links make fault identification and fault correction easy.
Disadvantages of mesh topology:
 The amount of cabling and the number of I/O ports required are high.
 Every device must be connected to every other device, installation and reconnection are
difficult.
 The bulk wiring can be greater than the available space (in walls, ceilings, or floors).
 The hardware required to connect each link (I/O ports and cable) can be prohibitively
expensive.
Star Topology: In a star topology, each device has a dedicated point-to-point link only to a
central controller, usually called a hub. The devices are not directly linked to one another. Unlike a
mesh topology, a star topology does not allow direct traffic between devices. The controller acts as
an exchange: If one device wants to send data to another, it sends the data to the controller, which
then transfers the data to the other connected device.
The star topology is used in local-area networks (LANs),

Advantages of star topology


 A star topology is less expensive than a mesh topology
 In a star, each device needs only one link and one I/O port to connect it to any number of
others. This factor also makes it easy to install and reconfigure.
 less cabling needs to be housed
 Any additions, moves, and deletions involve only one connection: between that device and
the hub.
 If one link fails, only that link is affected. All other links remain active. This factor also
lends itself to easy fault identification and fault correction.
Disadvantages of star topology
 Star topology is the dependency of the whole topology on one single point, the hub. If
the hub goes down, the whole system is dead.
 Although a star requires far less cable than a mesh, each node must be linked to a
central hub. For this reason, often more cabling is required in a star than in some other
topologies (such as ring or bus).
Bus Topology:

A bus topology is multipoint. One long cable acts as a backbone to link all the devices in a network

Nodes are connected to the bus cable by drop lines and taps. A drop line is a connection running
between the device and the main cable. A tap is a connector that either splices into the main
cable or punctures the sheathing of a cable to create a contact with the metallic core. As a
signal travels along the backbone, some of its energy is transformed into heat. Therefore, it
becomes weaker and weaker as it travels farther and farther. For this reason there is a limit on the
number of taps a bus can support and on the distance between those taps.

Bus topology was the one of the first topologies used in the design of early local area
networks. Ethernet LANs can use a bus topology, but they are less popular now
Advantages of bus topology
 ease of installation
 In a bus, this redundancy is eliminated.
Disadvantages of bus topology
 difficult reconnection and fault isolation
 A bus is usually designed to be optimally efficient at installation. It can therefore be difficult
to add new devices.
 A fault or break in the bus cable stops all transmission. The damaged area reflects signals
back in the direction of origin, creating noise in both directions.
Ring Topology: In a ring topology, each device has a dedicated point-to-point connection with
only the two devices on either side of it. A signal is passed along the ring in one direction, from
device to device, until it reaches its destination. Each device in the ring incorporates a repeater.
When a device receives a signal intended for another device, its repeater regenerates the bits and
passes them along.

Advantages of ring topology:


 easy to install and reconfigure
 Each device is linked to only its immediate neighbors (either physically or logically). To
add or delete a device requires changing only two connections
Hybrid Topology: A network can be hybrid. For example, we can have a main star topology with
each branch connecting several stations in a bus topology as shown in Figure

Network Types:
There are several different types of computer networks. Computer networks can be classified by their
size as well as their purpose.
The size of a network can be expressed by the geographic area they occupy and the number of
computers that are part of the network. Networks can cover anything from a handful of devices within
a single room to millions of devices spread across the entire globe.
Some of the different networks based on size are:
 Personal area network, or PAN
 Local area network, or LAN
 Metropolitan area network, or MAN
 Wide area network, or WAN

In terms of purpose, many networks can be considered general purpose, which means they are used
for everything from sending files to a printer to accessing the Internet. Some types of networks,
however, serve a very particular purpose. Some of the different networks based on their main purpose
are:

 Storage area network, or SAN


 Enterprise private network, or EPN
 Virtual private network, or VPN

Personal Area Network:

A personal area network, or PAN, is a computer network organized around an individual person
within a single building. This could be inside a small office or residence. A typical PAN would
include one or more computers, telephones, peripheral devices, video game consoles and other
personal entertainment devices.
If multiple individuals use the same network within a residence, the network is sometimes referred to
as a home area network, or HAN. In a very typical setup, a residence will have a single wired Internet
connection connected to a modem. This modem then provides both wired and wireless connections
for multiple devices. The network is typically managed from a single computer but can be accessed
from any device.
This type of network provides great flexibility. For example, it allows you to:

 Send a document to the printer in the office upstairs while you are sitting on the couch with
your laptop.
 Upload a photo from your cell phone to your desktop computer.
 Watch movies from an online streaming service to your TV.

If this sounds familiar to you, you likely have a PAN in your house without
having called it by its name.
Local Area Network:
A local area network, or LAN, consists of a computer network at a single site, typically an
individual office building. A LAN is very useful for sharing resources, such as data storage and
printers. LANs can be built with relatively inexpensive hardware, such as hubs, network adapters
and Ethernet cables.
The smallest LAN may only use two computers, while larger LANs can accommodate thousands
of computers. A LAN typically relies mostly on wired connections for increased speed and
security, but wireless connections can also be part of a LAN. High speed and relatively low cost
are the defining characteristics of LANs.
LANs are typically used for single sites where people need to share resources among themselves
but not with the rest of the outside world. Think of an office building where everybody should be
able to access files on a central server or be able to print a document to one or more central
printers. Those tasks should be easy for everybody working in the same office, but you would not
want somebody just walking outside to be able to send a document to the printer from their cell
phone! If a local area network, or LAN, is entirely wireless, it is referred to as a wireless local area
network, or WLAN.

Metropolitan Area Network:


A metropolitan area network, or MAN, consists of a computer network across an entire city,
college campus or small region. A MAN is larger than a LAN, which is typically limited to a
single building or site. Depending on the configuration, this type of network can cover an area
from several
miles to tens of miles. A MAN is often used to connect several LANs together to form a bigger
network. When this type of network is specifically designed for a college campus, it is sometimes
referred to as a campus area network, or CAN.
Wide Area Network:
A wide area network, or WAN, occupies a very large area, such as an entire country or the entire
world. A WAN can contain multiple smaller networks, such as LANs or MANs. The Internet is
the best-known example of a public WAN.

Private Networks:
One of the benefits of networks like PAN and LAN is that they can be kept entirely private by
restricting some communications to the connections within the network. This means that those
communications never go over the Internet.
For example, using a LAN, an employee is able to establish a fast and secure connection to a
company database without encryption since none of the communications between the employee's
computer and the database on the server leave the LAN. But, what happens if the same employee
wants to use the database from a remote location? What you need is a private network.
One approach to a private network is to build an enterprise private network, or EPN. An EPN is
a computer network that is entirely controlled by one organization, and it is used to connect
multiple locations. Historically, telecommunications companies, like AT&T, operated their own
network, separate from the public Internet. EPNs are still fairly common in certain sectors where
security is of the highest concern. For example, a number of health facilities may establish their
own network between multiple sites to have full control over the confidentiality of patient records.
Storage Area Networks:

This term is fairly new within the past two decades. It is used to explain a relatively
local network that is designed to provide high-speed connection in server-to-server
applications (cluster environments), storage area networks (called “SANs” as well)
and processor-to-processor applications. The computers connected on a SAN operate
as a single system at very high speeds.

Enterprise Private Network (EPN)

These types of networks are built and owned by businesses that want to securely
connect its various locations to share computer resources.
Virtual Private Network (VPN)

By extending a private network across the Internet, a VPN lets its users send and
receive data as if their devices were connected to the private network – even if
they’re not. Through a virtual point-to- point connection, users can access a private
network remotely.

Switching:

Switching is process to forward packets coming in from one port to a


port leading towards the destination. When data comes on a port it is
called ingress, and when data leaves a port or goes out it is called egress.
A communication system may include number of switches and nodes. At
broad level, switching can be divided into two major categories:

 Connectionless: The data is forwarded on behalf of forwarding


tables. No previous handshaking is required and
acknowledgements are optional.

 Connection Oriented: Before switching data to be forwarded to


destination, there is a need to pre-establish circuit along the path
between both endpoints. Data is then forwarded on that circuit.
After the transfer is completed, circuits can be kept for future use
or can be turned down immediately.
Circuit Switching
When two nodes communicate with each other over a dedicated communication path, it is
called circuit switching.There 'is a need of pre-specified route from which data will
travels and no other data is permitted.In circuit switching, to transfer the data, circuit must be
established so that the data transfer can take place.

Circuits can be permanent or temporary. Applications which use circuit


switching may have to go through three phases:

 Establish a circuit
 Transfer the data
 Disconnect the circuit

Circuit switching was designed for voice applications. Telephone is the best suitable example of
circuit switching. Before a user can make a call, a virtual path between caller and callee is established
over the network.

Message Switching:

This technique was somewhere in middle of circuit switching and packet switching. In message
switching, the whole message is treated as a data unit and is switching / transferred in its entirety.
A switch working on message switching, first receives the whole message and buffers it until there are
resources available to transfer it to the next hop. If the next hop is not having enough resource to
accommodate large size message, the message is stored and switch waits.

This technique was considered substitute to circuit switching. As in circuit switching the whole path is
blocked for two entities only. Message switching is replaced by packet switching. Message switching
has the following drawbacks:

 Every switch in transit path needs enough storage to accommodate entire


message.

 Because of store-and-forward technique and waits included until


resources are available, message switching is very slow.

 Message switching was not a solution for streaming media and real-time
applications.

Packet Switching:

Shortcomings of message switching gave birth to an idea of packet switching. The entire message
is broken down into smaller chunks called packets. The switching information is added in the
header of each packet and transmitted independently.

It is easier for intermediate networking devices to store small size packets and they do not take
much resources either on carrier path or in the internal memory of switches.
Packet switching enhances line efficiency as packets from multiple applications can be multiplexed
over the carrier. The internet uses packet switching technique. Packet switching enables the user to
differentiate data streams based on priorities. Packets are stored and forwarded according to their
priority to provide quality of service.

Internetworking :

Internetworking started as a way to connect disparate types of computernetworking technology.


Computer network term is used to describe two or more computers that are linked to each other.
When two or more computer networks or computer network segments are connected using devices
such as a router then it is called as computer internetworking.

Internetworking is a term used by Cisco. Any interconnection among or between public, private,
commercial, industrial, or governmental computer networks may also be defined as an internetwork
or Internetworking.
In modern practice, the interconnected computer networks or Internetworking use the Internet
Protocol. Two architectural models are commonly used to describe the protocols and methods used
in internetworking. The standard reference model for internetworking is Open Systems
Interconnection (OSI).

Internetworking is implemented in Layer 3 (Network Layer) of this model The most notable example
of internetworking is the Internet (capitalized). There are three variants of internetwork or
Internetworking, depending on who administers and who participates in them :

 Extranet

 Intranet

 Internet

Intranets and extranets may or may not have connections to the Internet. If connected to the
Internet, the intranet or extranet is normally protected from being accessed from the Internet
without proper authorization. The Internet is not considered to be a part of the intranet or extranet,
although it may serve as a portal for access to portions of an extranet.
Extranet : An extranet is a network of internetwork or Internetworking that is limited in scope to a
single organisation or entity but which also has limited connections to the networks of one or more
other usually, but not necessarily, trusted organizations or entities .Technically, an extranet may
also be categorized as a MAN, WAN, or other type of network, although, by definition, an extranet
cannot consist of a single LAN; it must have at least one connection with an external network.

Intranet : An intranet is a set of interconnected networks or Internetworking, using the Internet


Protocol and uses IP-based tools such as web browsers and ftp tools, that is under the control of a
single administrative entity. That administrative entity closes the intranet to the rest of the world,
and allows only specific users. Most commonly, an intranet is the internal network of a company or
other enterprise. A large intranet will typically have its own web server to provide users with
browseable information.

Internet : A specific Internetworking, consisting of a worldwide interconnection of governmental,


academic, public, and private networks based upon the Advanced Research Projects Agency
Network (ARPANET) developed by ARPA of the U.S. Department of Defense also hometo the World
Wide Web (WWW) and referred to as the 'Internet' with a capital 'I' to distinguish it from other
generic internetworks. Participants in the Internet, or their service providers, use IP Addresses
obtained from address registries that control assignments.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy