7/29/2019 28665722 Computer Networks Ppt
1/22
WELCOMEA POWER POINT PRESENTATION ON
Co-elucidated by
KUMAR ABHISHEK (C.Sc.E)&
KUMAR MURLIDHAR (E.C.E)
7/29/2019 28665722 Computer Networks Ppt
2/22
A Computer Network is an interconnection of a
group of computers. Networks may be Classifiedby what is called the network layer at which they
operate according to basic reference models
considered as standards in the industry such as
the four-layer Internet Protocol Suite model.
7/29/2019 28665722 Computer Networks Ppt
3/22
On the basis of SCALE
7/29/2019 28665722 Computer Networks Ppt
4/22
A network covering a small geographic area, like a home,office, or building.
Current LANs are most likely to be based on Ethernettechnology.
7/29/2019 28665722 Computer Networks Ppt
5/22
Between LANs and WANs
Traditional point-to-pointand switched networks in
WANs inadequate forgrowing needs of
organizations
e.g. Wireless networks, metropolitanextensions to Ethernet
Requirement for highcapacity private and publicnetworks at low costs over
a large area
7/29/2019 28665722 Computer Networks Ppt
6/22
A WAN is a data communications network that covers a relatively
broad geographic area (i.e. one city to another and one country toanother country) and that often uses transmission facilities provided
by common carriers, such as telephone companies.
7/29/2019 28665722 Computer Networks Ppt
7/22
Intranet
Extranet
Theinternet
An INTRANET is a set ofinterconnected networks, using
the Internet Protocol and uses Ip-
base tools such as web browsers,that is under the control of asingle administrative entity.
An EXTRANET is a network or
internetwork that is limited inscope to a single organization orentity but which also has limited
connections to the networks
7/29/2019 28665722 Computer Networks Ppt
8/22
Evolved from ARPANET, 1969Advanced Research ProjectsAgency (ARPA),U.S. Departmentof Defense.
Began in four locations: UCLA,University of Santa Barbara, theUniversity of Utah, and SRI(Stanford Research Institute)
WWW was developed inSpring 1989, at CERN (the
European Laboratory for ParticlePhysics) by Tim Berners-Lee.
Explosive growth came with firstgraphically oriented browser,Mosaic, 1993
7/29/2019 28665722 Computer Networks Ppt
9/22
1. BUS TOPLOGY
Each node is daisy-chained
(connected one right afterthe other) along the same
backbone. Information
sent from a node travels
along the backbone until it
reaches its destinationnode.
7/29/2019 28665722 Computer Networks Ppt
10/22
Similar to a bus network,
rings have nodes daisychained, but the end of the
network in a ring topology
comes back around to the
first node, creating a
complete circuit. Eachnode takes a turn sending
and receiving information
through the use of a token.
7/29/2019 28665722 Computer Networks Ppt
11/22
In a star network, eachnode is connected to a
central device called a hub.
The hub takes a signal that
comes from any node and
passes it along to all theother nodes in the
network.
7/29/2019 28665722 Computer Networks Ppt
12/22
CONDUCTIVE: twisted pairs and coaxialcables
ELECTROMAGNETIC: microwave
LIGHT: lasers and optical fibers (need
clear line of sight)
WIRELESS inner/ outer space ; satellite(omnidirectional security issues)
7/29/2019 28665722 Computer Networks Ppt
13/22
File Transfer, Email, Remote Login
ASCII Text, Sound (syntax layer)
Establish/manage connection
End-to-end control & error checking
(ensure complete data transfer): TCP
Routing and Logical Addressing: IP
Two party communication: Ethernet
How to transmit signal; coding
Hardware means of sending and receiving data on a carrier
THE OSI REFERENCE MODEL
7/29/2019 28665722 Computer Networks Ppt
14/22
7/29/2019 28665722 Computer Networks Ppt
15/22
This protocol, the core of the World Wide Web,facilitates retrieval and transfer of hypertext(mixed media) documents. Stands for the
HypertextT
ransfer protocol
HTTP
A remote terminal emulation protocol thatenables clients to log on to remote hosts on thenetwork.Telnet
Used to remotely manage network devices.Stands for the Simple Network ManagementProtocol.
SNMP
7/29/2019 28665722 Computer Networks Ppt
16/22
Confidentiality Integrity
Availability
Authenticity
SecurityRequirements
7/29/2019 28665722 Computer Networks Ppt
17/22
Eavesdroppingon
transmissions Release of
messagecontents
Difficult todetect
Can beprevented
PassiveAttacks
Masquerade Replay
Modification ofmessages
Denial of service
Easy to detect
Hard to prevent
ActiveAttacks
7/29/2019 28665722 Computer Networks Ppt
18/22
Ingredients
a) Plain text
b) Encryption algorithmc) Secret key
d) Ciphertext
e) Decryption algorithm
7/29/2019 28665722 Computer Networks Ppt
19/22
THE RSA ALGORITHM Key Generation
Selectp, q p and qboth prime,p { q
Calculate n =p q
Calculate J(n)=(p 1)(q 1)
Select integer gcd (J(n), e)=1;
1 < e < J(n)
Calculate d de mod J(n)=1
Public key KU = {e, n}
Private key KR = {d, n}
Encryption
Plaintext: M< n
Cipher text: C=Me (mod n)
Decryption
Cipher text: C
P
laintext:M=
Cd (
modn)
7/29/2019 28665722 Computer Networks Ppt
20/22
Elements ofNetwork
Management
Fault
Accounting
Performance
Security
7/29/2019 28665722 Computer Networks Ppt
21/22
1.THE INTERNET GRID 2.THE GOOGLE WAVES
Grid computing is the combination ofcomputer resources from multipleadministrative domains applied to acommon task, usually to a scientific,
technical or business problem thatrequires a great number of computerprocessing cycles or the need to process
large amounts of data.
Google Wave is It is a web-based
service, computing platform, and
communications protocol designed
to merge e-mail, instant messaging,wikis, and social networking.
7/29/2019 28665722 Computer Networks Ppt
22/22
Computer Networks By Andrew Tenenbaum.
Digital Communication And Networking by Behrouz A. Forouzan.
Communication Networks by Alberto Leon Garcia & IndraWidjaja.
www.google.com, www.dogpile.com, www.ask.com,
www.compnetworking.about.com