Integrated Services Digital Network You do not need a modem but instead need a device called an ISDN terminal adapter. In this.

Slides:



Advertisements
Similar presentations
There are many types of WAN technologies that can be used to solve the problems of users who need network access from remote locations. We will go through.
Advertisements

Click to continue Network Protocols. Click to continue Networking Protocols A protocol defines the rules of procedures, which computers must obey when.
TCP/IP MODEL Maninder Kaur
OSI MODEL Maninder Kaur
Copyright Methods available There are a number of ways of connecting to the internet. These include: - ‘Dial-up’ - Integrated Subscriber.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Communicating over the Network Network Fundamentals – Chapter 2.
Department of Computer Engineering University of California at Santa Cruz Networking Systems (1) Hai Tao.
Networking Theory (Part 1). Introduction Overview of the basic concepts of networking Also discusses essential topics of networking theory.
04/26/2004CSCI 315 Operating Systems Design1 Computer Networks.
Review on Networking Technologies Linda Wu (CMPT )
TCP: Software for Reliable Communication. Spring 2002Computer Networks Applications Internet: a Collection of Disparate Networks Different goals: Speed,
COMPUTER NETWORKS.
The OSI Model A layered framework for the design of network systems that allows communication across all types of computer systems regardless of their.
 The Open Systems Interconnection model (OSI model) is a product of the Open Systems Interconnection effort at the International Organization for Standardization.
Gursharan Singh Tatla Transport Layer 16-May
©Brooks/Cole, 2003 Chapter 6 Computer Networks. ©Brooks/Cole, 2003 Understand the rationale for the existence of networks. Distinguish between the three.
1.  A protocol is a set of rules that governs the communications between computers on a network.  Functions of protocols:  Addressing  Data Packet.
Process-to-Process Delivery:
15-1 More Chapter 15 Goals Compare and contrast various technologies for home Internet connections Explain packet switching Describe the basic roles of.
Chapter 2 The Infrastructure. Copyright © 2003, Addison Wesley Understand the structure & elements As a business student, it is important that you understand.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
TCP/IP Reference Model For more notes and topics visit: eITnotes.com.
Review: – computer networks – topology: pair-wise connection, point-to-point networks and broadcast networks – switching techniques packet switching and.
Presentation on Osi & TCP/IP MODEL
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
How the Internet Works. The Internet and the Web The Web is actually just one of many computer applications that run on the Internet Among others are.
Chapter 4. After completion of this chapter, you should be able to: Explain “what is the Internet? And how we connect to the Internet using an ISP. Explain.
1 Module 15: Network Structures n Topology n Network Types n Communication.
Introduction network Protocol
Chapter 2 – X.25, Frame Relay & ATM. Switched Network Stations are not connected together necessarily by a single link Stations are typically far apart.
Internet Addresses. Universal Identifiers Universal Communication Service - Communication system which allows any host to communicate with any other host.
ASYNCHRONOUS Sends A letter at a time. The devices are not synchronised. The letter is framed by start and stop bits. The start bits are to ‘wake up’ the.
Mukesh N. Tekwani Elphinstone College Mumbai
1 7-Oct-15 OSI transport layer CCNA Exploration Semester 1 Chapter 4.
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Introduction Slide 1 A Communications Model Source: generates.
Network Technologies Chapter 2. Approaches to Network Communication Connection-Oriented –Circuit-switched –A dedicated connection (circuit) is formed.
Chapter Three Network Protocols By JD McGuire ARP Address Resolution Protocol Address Resolution Protocol The core protocol in the TCP/IP suite that.
The OSI Model.
15-1 Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources.
Huda AL-Omair_ networks61 Wide Area Network. Huda AL-Omair_ networks62 What is a WAN? Wide area network or WAN is a computer network covering a wide geographical.
Information Flow Across the Internet. What is the Internet? A large group of computers that link together to form the Worldwide Area Network (WAN)
MODULE I NETWORKING CONCEPTS.
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
Computer Security Workshops Networking 101. Reasons To Know Networking In Regard to Computer Security To understand the flow of information on the Internet.
OS Services And Networking Support Juan Wang Qi Pan Department of Computer Science Southeastern University August 1999.
Network Protocols n ISO OSI 7-layer model n TCP/IP suite l TCP/UDP l IP l Ethernet/Token Ring l ICMP.
Data Communications and Networks
William Stallings Data and Computer Communications
Connecting to the Internet.
Prepared by Engr.Jawad Ali BSc(Hons)Computer Systems Engineering University of Engineering and Technology Peshawar.
Network Protocols and Standards (Part 2). The OSI Model In 1984, the International Organization for Standardization (ISO) defined a standard, or set of.
Individual Project 1 Sarah Pritchard. Fran, a customer of your company, would like to visit your company’s website from her home computer… How does your.
Data Communication Network Models
McGraw-Hill Chapter 23 Process-to-Process Delivery: UDP, TCP Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
The OSI Model. Understanding the OSI Model In early 1980s, manufacturers began to standardize networking so that networks from different manufacturers.
1 14-Jun-16 S Ward Abingdon and Witney College CCNA Exploration Semester 1 OSI transport layer CCNA Exploration Semester 1 Chapter 4.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 OSI transport layer CCNA Exploration Semester 1 – Chapter 4.
Computer Networks.
NETWORK Unit 1 Module: 2 Objective: 7.
Layered Architectures
Lecture 6: TCP/IP Networking By: Adal Alashban
Understanding the OSI Reference Model
The Open System Interconnection (OSI) Model & Network Protocols.
Topic 5: Communication and the Internet
NETWORKING TECHNOLOGIES (II)
Process-to-Process Delivery:
Chapter Goals Compare and contrast various technologies for home Internet connections Explain packet switching Describe the basic roles of various network.
NETWORK Unit 1 Module: 2 Objective: 7.
NETWORK Unit 1 Module: 2 Objective: 7.
Process-to-Process Delivery: UDP, TCP
Presentation transcript:

Integrated Services Digital Network You do not need a modem but instead need a device called an ISDN terminal adapter. In this network sending voice, video and computer data and user can receive telephone calls using the one line. Conduct videoconferencing easily. Designed to replace public telecom system Wide variety of services Entirely digital domain First generation ( narrowband ISDN ) –64 kbps channel is the basic unit –Circuit-switching orientation –Contributed to frame relay Second generation ( broadband ISDN ) –100s of mbps –Packet-switching orientation –Contributed to ATM ( cell relay )

Disadvantages Your main telephone socket has to be changed to an ISDN box by an engineer. Your computer has to be fitted with an ISDN modem which is more expensive than a standard modem. It is more expensive than Dial-up on a monthly basis. Should you move house, you have to pay for your telephone line to be converted back again to a normal line.

Asymmetric Digital Subscriber Line A technology that turns traditional copper wires into fast data pipes. This offers internet connections up to 30 times faster than the fastest dial up modem. The connections work by splitting your phone line into two separate channels, one for data (internet) and one for voice (phone calls) which means you can talk on the phone and be connected to the internet at the same time.

Advantages Faster downloads compared to dial-up or ISDN No need for a second phone line - by allowing voice and data transfer at the same time (you can use the phone as normal while connected to the internet). Because ADSL transfers data digitally it doesn't need to convert the data from digital to analogue and back again. ADSL connections are Always on, which makes the usual long wait to connect a thing of the past

Disadvantages ADSL connections are not available to everyone, you need to be within 3 miles of an ADSL enabled exchange. The hardware costs can be quite significant as you will need a special ADSL modem and ADSL filters to use the service, most ISPs allow you to hire these items which can reduce the initial cost. Because ADSL connections are Always on you will need a firewall to protect your PC

OSI( Open Systems Interconnection Layers Application Layer Presentation Layer Session Layer Transport Layer Network Layer Data Link Layer Physical Layer

The Physical Layer Deals with transmitting raw bits over a communication channel. How many volts for 1 or 0. How many microseconds a bit lasts.

Data link Layer Break the input data up into data frames. Process the acknowledgement frames sent back by the receiver. Solve the problems caused by damaged, lost and duplicate frames. Full duplex transmission Physical details of interfacing with the cable. Handles data flow control. It can support Ethernet, Token Ring.

Network Layer Routing packets from source to destination. Routes can be static or dynamic In broadcast networks, routing problem is simple, so the network layer is thin. It contain IP address which is connectionless Datagram protocol.

Transport Layer Accept data from the session layer, split it up into smaller units if needed, pass these to the network layer and ensure that the all pieces arrive correctly at the other end The transport layer is a true end-to-end layer, from source to destination Establishing and deleting connections across the network. what type of service to provide the session layer with and ultimately, the users of the entire network TCP and UDP protocols

Session Layer Allows users on different machines to establish sessions between them A session might be used to allow a user to log into a remote timesharing system or to transfer a file between two machines Example: token management. Only the side holding the token may perform the critical operation. The Session Layer adds traffic flow and control information, such as establishing and terminating connections between host computers

Presentation Layer Concerned with the syntax and semantics of the information transmitted. The Presentation Layer adds formatting, display and encryption information, such as helping to maintain compatibility with different coding methods and file types used on computer systems. A typical example of a presentation service is encoding data in a standard agreed upon way. [Character strings, integers, floating-point numbers…].

Application Layer The application layer contains a variety of protocols that are commonly needed. The application sends the continuous data stream. Example: incompatible terminal type. Other application is file transfer (ftp),HTTP

TCP/IP Protocol Stack The most standard protocol is the transmission control protocol/Internet Protocol (TCP/IP). It has the similar protocols and functions. The TCP/IP protocol allows different computers from many different suppliers which is running different operating system. It is the protocol where internet is based. More correctly it is referred to as a protocol suite because it is a collection of protocols

TCP/IP and OSI Protocol Stack application: supporting network applications –ftp, smtp, http transport: host-host data transfer –tcp, udp network: routing of datagrams from source to destination –ip, routing protocols link: data transfer between neighboring network elements –ppp, ethernet, ATM physical: bits “on the wire” Application Layer Transport Layer Network Layer Data link Layer Physical

Sockets The combination of IP Address and port number. This is used in a similar way to a file, giving programs the opportunity to exchange data across the network. Allows programmers to establish communication between process running on computers There are two types pf sockets Datagram: Allow a computer to send a single message Stream: Supports ongoing data exchange between participating processes. It has two components IP Address Port Number Example: : 80

IP address Internet Protocol Address –4 groups of numbers ranging from 0-255,separated by full stop. –Every web site has a unique address known as IP Address –32 bit (4-byte) binary number –Like Domain Name : IP address: Identify the network Identify the specific computer

Hands-on: Find Your PC’s IP Click the “start” button on the taskbar Click “Run” Type in “cmd” to display a MS-DOS window Type “ipconfig /all” at the prompt and press enter key See who “owns” your IP address – Trace a route to your PC –

Ethernet Ethernet uses a system of sending signals called ‘Carrier Sense Multiple Access / Collision Detect’ CSMA/CD. When a piece of data is to be sent, it is broken into smaller packets, then data to be sent waits until the communication line is clear, and then sends. If two different devices send at exactly the same time, there will be a collision and the packet will become corrupted. The system detects the collision and puts a stop to all signals being sent until the communication line is clear, devices are then able to send at random intervals, and the destroyed packet can be resent. If the communication line is very busy some signals never make it and have to be resent by the operator. Ethernet speeds are about 10 Mbps.

Token Ring A ring network may use a Token to carry a message from one device to another. The sender waits for the Token to arrive, sticks the message on to it and the Token goes around the ring visiting every device until the message finds its destination. Occasionally the Token may get lost and if it travels around the ring a second time it gets destroyed and a new one created. The system avoids collisions as only one Token is allowed on the network, it is also fair as busy devices are serviced the same as less busy ones.