The Fundamentals of Network Communication

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 38

CHAPTER 1

The Fundamentals of Network


Communication
Introduction
• A network consists of two or more computers/devices
connected by some kind of transmission medium, such as
a cable or wireless.

Motivation for networking


• Share resources (printers, hard drives)
• Information
• Communication (exchange of data)
• to get “online”—to access the Internet.
Examples of technology today using networks
• Skype was released for free peer-to-peer voice over the
Internet.

• YouTube was created, providing an easy portal for video


sharing, which was purchased by Google in late 2006.

• Twitter was created, and rapidly gained worldwide


popularity, with 500 million registered users in 2012, who
posted 340 million tweets per day.
Cont.

• Amazon launched its cloud computing platform, Amazon’s


Web Services (AWS).

• Netflix, which used to be a DVD rental service provider,


migrated its infrastructure to the Amazon AWS cloud
computing platform, and became a major online streaming
video provider.
• Netflix has over 1 petabyte of data stored on Amazon’s cloud.
Network Components
• Network interface card
• Network medium
• Interconnecting device
• NIC driver
Steps of Network Communication
• Most network communications start by a user needing to
access a resource on another computer, such as a Web
server or file server.
Cont.
• 1. An application tries to access a network resource by
attempting to send a message to it.
• 2. Network client software detects the attempt to access
the network.
• Client software formats the message generated by the application
and passes the message on to the network protocol.
• 3. The protocol packages the message in a format
suitable for the network and sends it to the NIC driver.
• 4. The NIC driver sends the data in the request to the NIC
card, which converts it into the necessary signals to be
transmitted across the network medium.
Cont.
• Remember that there are two sides to a communication
session, and most of them involve a client trying to access
network resources and a server providing those resources.

• 1. The NIC card on the server receives signals from the network
medium and converts them into message data, which is read by
the NIC driver.
• 2. The NIC driver passes the message to the network protocol.
• 3. The network protocol determines which server software the
message is targeting and passes the message to this designated
software.
• 4. The server software receives the message and responds by
sending the requested data to the client computer, using the four
steps outlined previously.
Layers of the Network Communication Process
• Each step of a client accessing network resources is often referred to
as a “layer” in the network communication process.
• Each layer has a specific function to accomplish, and all the layers
work together.
Cont.
How Two Computers Communicate on a LAN:

• In a network using a protocol such as TCP/IP (the most


common protocol used on networks), computers have two
addresses: a logical address and a physical address.

• With TCP/IP, the logical address is the IP address, and the


physical address is called the Media Access Control
(MAC) address.

• When a message is sent on a network, the IP address is


used to get the message to the correct network, and the
MAC address is used to get the message to the correct
computer on this network.
Cont.
• One of the simplest forms of communication is a ping.
• The ping command sends a message from one computer to another,
essentially asking the other computer whether it’s listening on the network.
• If a computer receives a ping, it replies so that the sending computer knows
the message was received.

• TCP/IP provides
name server functions
through its Domain Name
System
Network Terms
• LANs, Internetworks, WANs, and MANs
• An internetwork is a networked collection of LANs tied together by
devices such as routers, hubs, or switch.
LAN
• A small network, limited to a single collection of machines
and connected by one or more interconnecting devices in
a small geographic area, is called a local area network
(LAN).
Internetworks
• Internetworks are usually created for these reasons:
• 1. Two or more groups of users and their computers should be
logically separated on the network yet still allow the groups to
communicate.
• 2. The number of computers in a single LAN has grown to the point
that network communication is no longer efficient.

• Every time you go online to browse the Web or check


your e-mail, you computer becomes part of the largest
internetwork in the world: the Internet.
WAN
• A WAN spans distances measured in miles and links two or more separate
LANs.

• WANs use the services of third party communication providers, such as


phone companies, to carry network traffic from one location to another.

• Internet is both internetwork and WAN.


Packets and Frames
• When computers transfer information across a network,
they do so in short bursts.

• Each burst, or chunk, of data has the same basic


structure.
• Specifically, each chunk of data contains the MAC addresses and
IP addresses of both the sending (source) and receiving
(destination) computers.

• Word-processing file – one burst/chunk


• Large photo – broken into thousands of chunks
Cont.
• Reasons for pause:

• The pause between bursts might be necessary to allow other computers to


transfer data during pauses.

• The pause allows the receiving computer to process received data, such as
writing it to disk.

• The pause allows the receiving computer to receive data from other
computers at the same time.

• The pause gives the sending computer an opportunity to receive data from
other computers and perform other processing tasks.

• If an error occurs during transmission of a large file, only the chunks of data
involved in the error have to be sent again, not the entire file.
Cont.

• Packets The chunks of data sent across the network are


usually called packets or frames.
• Packet is the more well-known term and is often used generically
to mean a chunk of data sent over the network.
Cont.
• Frames A frame is a packet with the source and destination MAC addresses
added to it.

• Frames have an error-checking code added to the back end of the packet,
which is why they’re called frames.

• Frames are essentially the final state of data before it gets placed on the
network medium as bits.
Cont.
• The process of adding IP addresses and then MAC
addresses to chunks of data is called encapsulation.
• Header
• Trailer
Clients and Servers
• Client A client, in networking terms, can be a workstation
running a client OS, such as Windows 7.
• Network computer – Network server

• Client term usually used in three contexts:


• 1. Client operating system
• 2. Client computer
• 3. Client software (email, browser)
Cont.
• Server What makes a computer a server is the software
installed on it.

• Server term usually used in three contexts:


• 1. Server operating system
• 2. Server computer
• 3. Server software
Network Models
• A network model defines how and where resources are
shared and how access to these resources is regulated.
• two major types:
• 1. peer-to-peer
• 2. server-based (also called client/server)

• In a peer-to-peer network, most computers function as clients or


servers.
• In a server-based network, certain computers take on specialized
roles and function mainly as servers, and ordinary users’ machines
tend to function mainly as clients.
Peer-to-Peer/Workgroup Model
• Peer-to-peer network can take both a client and a server role.

• Any user can share resources on his or her computer with any other user’s
computer.

• Can work on small networks.

• Each user can determine what level of access other users have to his or her
shared resources.
Cont.

• Disadvantages:
• 1. complexity of having to remember multiple sets of credentials to
access resources spread out over several computers.
• 2. more users try to access resources from a particular machine
and endure a performance reduction.
• 3. data organization (keeping track of information).
• 4. each machine must be backed up to protect shared data.
Cont.
• Advantages for small organization:
• 1. easiest and most inexpensive to install.
• 2. can share information immediately.
• 3. client computers are less expensive than server.
• 4. easy to use and don’t require extensive staff training.
• 5. loss of a single machine means loss of only information on it

* Client computers limit the number of network connections to 20.


Server/Domain-Based Model
• Server-based networks provide centralized control over network resources.

• Provides an environment in which users log on to the network with a single


set of credentials.

• Credentials are maintained by one or more servers running a server OS.

• Servers are dedicated to running network services only (no user applications).
Cont.
• A domain is a collection of users and computers whose accounts are
managed by Windows servers called domain controllers.

• A directory service is the software managing centralized access and


security.
• On Windows servers, the directory service software is Active Directory
Cont.
• Advantages:
• 1. Server-based networks are easier to expand.
• 2. multiple servers can be configured to work together (sharing of
load).
• 3. handle many simultaneous user logons and requests for shared
resources efficiently.

• Disadvantages:
• 1. additional overhead of operating a server-based network.
• 2. Server-based networks require one or more dedicated computers to
run the server OS.
• 3. hardware is costly.
Network Servers
• Network Servers are used as the central repository of data and
various programs that are shared by users in a network.

• Network Servers can provide one or more network services.


• Domain controller/directory servers
• File and print servers
• Application servers
• E-mail servers
• Web servers
Domain Controller/Directory Servers
• Any user belonging to a specific domain can access all resources and
information he or she has permission to use simply by logging on to
the domain.

• Domain Controller/Directory Servers is used to store information such


as users, computers, and groups.
File and Print Servers
• With these servers, users can run applications locally but
keep data files on the server.

• File servers are used to store data in a central location, so they must
be kept secure to ensure that only those who are authorized are able
to use the files.

• File servers allow users to:


• 1. store their files remotely, rather than on their local hard disks.
• 2. share files with other users.
Cont.
• Print servers are used to provide access to printers across the
network.
• scheduling the availability of printers
• setting priority for print jobs
• configuring printer properties
Application Servers
• Application servers is a type of server designed to
install, operate and host applications and associated
services for end users.
• Ex. Web Servers
Mail Servers
• Mail servers handle sending and receiving e-mail messages for
network users.

• Mail servers handle two widely used e-mail protocols:


• 1. Post Office Protocol version 3 (POP3). POP3 is used by client e-mail
programs to contact the mail server to download new messages.

• 2. Simple Mail Transfer Protocol (SMTP). SMTP is used by client e-mail


programs to send and receive e-mail messages.
Specialized Networks
• 1. Storage Area Networks (SAN) uses high-speed networking
technologies to provide servers with fast access to large amounts of
disk storage.

• Client computers access the shared data by contacting the servers via the
usual method, and the servers retrieve the requested data from the SAN
devices and pass it along to the client computer.
Cont.
• 2. Wireless Personal Area Networks (WPAN). A wireless personal area
network (WPAN) is a short-range networking technology designed to connect
personal devices to exchange information.

• IEEE 802.15 is the standard for WPANs.


• One product using this standard is Bluetooth, a shortrange wireless technology
developed by Ericsson and found in a variety of devices, such as PDAs, cell
phones, ear phones/headsets, GPS devices, MP3 players, and cars.

You might also like