Fundamentals of Computer Networking Hardware Architecture Lecture III IIITMK PowerPoint PPT Presentation

presentation player overlay
1 / 30
About This Presentation
Transcript and Presenter's Notes

Title: Fundamentals of Computer Networking Hardware Architecture Lecture III IIITMK


1
Fundamentals of Computer NetworkingHardwar
e ArchitectureLecture IIIIIITM-K
2
NETWORK ARCHITECTURE
3
Network Architecture
  • Network architecture is the overall design of a
    network.
  • The network design is divided into layers, each
    of which has a function separate from that of the
    other layers.
  • Protocol stack The vertical (top to bottom)
    arrangement of the layers. Each layer is governed
    by its own set of protocols.

4
Protocol Hierarchies
  • Networking software is organized into layers to
    simplify design i.e., each layer providing
    certain kind of service to other layers but keep
    the implementation detail hidden.
  • Peers in the same layer on different hosts
    communicate with each other using the same
    protocol in order to inter operate.
  • Interface between adjacent layers define the
  • Services the lower layer provides to the upper
    layer

5
  • Networks are categorized based on their three
    properties
  • Protocol Topology Architecture

6
NETWORK TOPOLOGIES

7

8

9

10
LAN Hardware and Software
  • Hardware
  • Network interface card (NIC) Inserted into a
    computers expansion slot

11
LAN Software
  • Operating system that supports networking (Unix,
    Linux, Windows, Mac OS)
  • Additional system software

12
PEER-TO-PEER NETWORKS
  • All computers on the network are treated as
    equal.
  • There are no file servers.
  • Users decide which files and peripherals to
    share.
  • They arent suited for networks with many
    computers.
  • They are easy to set up. Example Home networks

13
CLIENT-SERVER NETWORKS
14
CLIENT-SERVER NETWORKS
  • Typical corporate networks are client-server.
  • They use various topologies or physical layouts.
  • The network requires file servers, networked
    computers (clients), and a network operating
    system (NOS).
  • Clients send requests to servers for programs and
    data, and to access peripherals.

15
LAN TOPOLOGIES
  • The physical layout of a LAN is called its
    topology.
  • Topologies resolve the problem of contention,
    which occurs when multiple users try to access
    the LAN at the same time.
  • Collisions or corrupt data occur when different
    computers use the network at the same time

16
BUS NETWORK TOPOLOGY
17
RING NETWORK TOPOLOGY
18
STAR NETWORK TOPOLOGY
19
LAN PROTOCOLS
  • LAN protocols are standards that govern the
    layers of the protocol stack.
  • Lower-layer protocols deal with contention
    between computers.
  • Lower-layer protocols
  • Ethernet
  • Local Talk
  • Token ring

20
  • Higher-layer protocols handle the network
    functions.
  • Higher-layer protocols
  • AppleTalk
  • IPX/SPX
  • NetBeui
  • TCP/IP

21
WIDE AREA NETWORKS
22
WIDE AREA NETWORKS
  • WANs are similar to long-distance telephone
    systems.
  • They have a local access number called a point of
    presence (POP).
  • They contain long-distance trunk lines called
    backbones.

23
POINT OF PRESENCE (POP)
  • A point of presence is a WAN network connection
    point that enables customers to access the WAN by
    making a local telephone call.
  • Media used to create a connection from an
    organization to a POP include
  • 56 Kbps leased line
  • ADSL
  • ISDN
  • T1 line
  • Permanent virtual circuit (PVC)

24
BACKBONES
25
BACKBONES
  • Backbones are high-capacity transmission lines
    that carry WAN traffic.
  • They are regional, continental, or
    transcontinental.

26
WAN ORGANIZATION
  • INTERNET
  • PUBLIC DATA NETWORK(PDN)
  • PRIVATE DATA NETWORK

27
WAN ORGANIZATION
  • 1.INTERNET
  • Backbone providers charge fees to Internet
    Service Providers (ISPs).
  • ISPs sell subscriptions to users.
  • Not secure
  • Not ideal for businesses

28
WAN ORGANIZATION
  • 2.PUBLIC DATA NETWORK
  • A for-profit data communications network
  • Fees paid on a per-byte-transferred basis
  • Good security
  • High bandwidth

29
WAN ORGANIZATION
  • 3.PRIVATE DATA NETWORK
  • Used by corporations, banks and governments
  • Not open to the public
  • Most secure type of WAN
  • Virtual private network Lines are leased to a
    single company

30
WAN PROTOCOLS
  • X.25 Oldest packet switching protocol. It is
    used by automated teller machines and credit card
    authorization devices.
  • Switched Multimegabit Data Service
    (SMDS)Designed for digital phone lines. Faster
    data transfer rates than X.25.
  • Asynchronous Transfer Mode (ATM) Newer type of
    protocol. It is designed for digital lines.
Write a Comment
User Comments (0)
About PowerShow.com