Presentation is loading. Please wait.

Presentation is loading. Please wait.

Information and Communication Technology Fundamentals Credits Hours: 2+1 Instructor: Ayesha Bint Saleem.

Similar presentations


Presentation on theme: "Information and Communication Technology Fundamentals Credits Hours: 2+1 Instructor: Ayesha Bint Saleem."— Presentation transcript:

1 Information and Communication Technology Fundamentals Credits Hours: 2+1 Instructor: Ayesha Bint Saleem

2 HIGHLIGHTS OF LAST LECTURE

3 3 aspects of a network Software Hardware Medium

4 Software Application Protocols Packet Payload (Data part) Header (Control information part)

5 Hardware Modem ISDN DSL LAN Card Wireless LAN Card ATM Wimax

6 Medium Wired Twisted pair cable Co-axial cable Fiber optic cable Wireless

7 Network Topologies Point 2 Point Bus Ring Mesh Star

8 Network Linking Devices Hub Bridge Switch Router Gateway

9 Classification of Networks according to geographical scope Wide Area Networks Metropolitan Area Networks Campus Area Networks Local Area Networks Home Area Networks Personal Area Networks Decreasing Scope

10 NETWORKS - II

11 Presentation Credits “Data Communications and Networking”, Behrouz A. Forouzan “Computer Networks”, Tanenbaum Dr Junaid, EE Dept, SEECS

12 Types of communication According to data direction Simplex One-way communication (only send or only receive) Half-Duplex Two-way communication (send/receive) but one at a time Full Duplex Two-way communication (send/receive) at the same time

13 Types of communication According to intended recipients Unicast Sending data to only one recipient Multicast Sending data to multiple recipients Possibly at different locations Broadcast Sending data to everybody

14 You open a browser e.g. Internet Explorer Type address on the browser’s address bar

15 NETWORKING SOFTWARE

16 Example application http://www.niit.edu.pk Other browsers include Firefox, Opera. Browser acts as: a client of webserver fetches and displays user requested documents 1 2 This is an example of a browser (Internet Explorer) Address Bar

17 The SEECS page is displayed in front of you after some time

18

19 A lot of things are happening from your typing the address to getting to see the SEECS home page Inside your computer AND On the network

20 Like Locating where the SEECS server is located which is hosting the SEECS website Establishing a connection with the SEECS server Requesting server to send you the webpage Receiving data from server in the form of packets Ensuring packets arriving are free of error Arranging packets in order to re-create the original webpage

21 Who is dealing-with/enabling all this? Network software on your computer Network software on the NIIT server Network software on many other devices that you are not aware of DNS Server Router Possibly many others

22 Network software follows different procedures to have the web-page displayed to you These procedures are called protocols Variety of protocols are running on your computer Each responsible to perform a different task

23 To reduce design complexity, the functions that a network software provides are organized as a stack of levels or layers Each layer uses the services of the layer below it Each layer offers some services to the layer above it

24 The concept of layering is used in daily life

25 Two friends communicating through postal mail Letter is written, put in an envelope, and dropped in mailbox The letter is carried from the mailbox to a post office The letter is delivered to a carrier by the post office Letter is picked up removed from the envelope and read The letter is carried from the post office to the mailbox The letter is delivered to from the carrier to the post office Parcel is carried from the source to destination Higher Layers Middle Layers Lower Layers

26 Internet Model The layering structure that internet uses Consists of five layers

27 Internet TCP/IP Model Physical Layer Data Link Layer Network Layer Transport Layer Application Layer TCP IP

28 Physical Layer: Responsible for transmitting raw bits over a communication medium (channel) Data Link Layer Source DLL gives a packet to the physical layer in the form of bits Destination DLL receives bits of the packet from the physical layer Node to node delivery of a packet Error control Use of Acknowledgements

29 Network Layer End –to-end delivery of a packet Transport Layer Process to process delivery of a packet May include error control Application layer Enable use of network Provides Interface

30 Addressing in the Internet Each station must be addressable Two kinds of addresses: 1) Physical addressing ( MAC addresses) 2) Logical addressing ( IP addresses)

31 Addressing in the Internet The communicating applications (source/ destination applications) must also be identifiable Identified through TCP ports A socket (IP address + TCP port) identifies both an application and the machine it’s on.

32 Physical Addressing: MAC MAC Address: 48 bits (Ethernet) Flat addressing Usually non-configurable

33 Logical Addressing: IP IP Version 4; Address: 32 bits IP Version 6; Address: 128 bits Hierarchical addressing 2 parts: a network part and a host part. Machines in a LAN have the same network part; they differ in host parts 4,294,967,296 possible addresses = 2 32

34 Logical Addressing: IP How is the network part of an IP address defined Subnet mask

35 IP (Internet Protocol) IP Address 192.168.15. 2 (decimal) 11000000 10101000 00001111 00000010 (binary) Subnet Mask: 255.255.255.0 (decimal) 11111111 11111111 11111111 00000000 (binary) IP Address 192.168.15. 2 (decimal) 11000000 10101000 00001111 00000010 (binary) Subnet Mask: 255.255.255.0 (decimal) 11111111 11111111 11111111 00000000 (binary) Network partHost part

36 Applications Identification How to identify source/ destination application communicating The source/ destination applications are identified through TCP ports Common TCP Ports: HTTP: 80; SMTP: 25; DNS: 53

37 Naming Machine addresses are difficult to memorize Solution : Provide recognizable names to numerically addressed Internet resources. google.com; stanford.edu; niit.edu.pk Examples :

38 Naming How to manage address to name mapping? 1)A hosts file on each machine Unix/ Linux: /etc/hosts file Windows: %SystemRoot%\system32\drivers\etc 2)A decentralized domain name server system Scalable solution The name to IP mapping is available at a DNS server

39 WWWWWW DNSDNS Example application (contd.)

40 DNS Client/Server Exchange WWWWWW DNSDNS Reques t Tell me the IP address of www.niit.edu.pk? www.niit.edu.pk

41 WWWWWW DNSDNS Reply The IP address of www.niit.edu.pk is 202.125.157.196 www.niit.edu.pk DNS Client/Server Exchange The IP address of www.niit.edu.pk is 202.125.157.196 www.niit.edu.pk

42 ARP Client/Server Exchange WWWWWW DNSDNS Request Any one knows the MAC (physical) address of 202.125.157.196 ? Request

43 WWWWWW DNSDNS Reply The MAC address of 202.125.157.196 is 12:34:aa:bb:cc:dd ARP Client/Server Exchange The MAC address of 202.125.157.196 is 12:34:aa:bb:cc:dd

44 HTTP Client/Server Exchange WWWWWW DNSDNS Send me the index.html page for the host www.niit.edu.pk using HTTP version 1.1www.niit.edu.pk Request Send me the index.html page for the host www.niit.edu.pk using HTTP version 1.1www.niit.edu.pk


Download ppt "Information and Communication Technology Fundamentals Credits Hours: 2+1 Instructor: Ayesha Bint Saleem."

Similar presentations


Ads by Google