WELCOME
A POWER POINT PRESENTATION ON
“COMPUTER NETWORKS”
Co-elucidated by
KUMAR ABHISHEK (C.Sc.E)
&
KUMAR MURLIDHAR (E.C.E)
INTRODUCTION
A “Computer Network” is an interconnection of a
group of computers. Networks may be Classified
by what is called the network layer at which they
operate according to basic reference models
considered as standards in the industry such as
the four-layer Internet Protocol Suite model.
TYPES OF NETWORKS
On the basis of “ SCALE ”
LOCAL AREA NETWORKS(LAN)
A network covering a small geographic area, like a home,
office, or building.
Current LANs are most likely to be based on Ethernet
technology.
METROPOLITAN AREA NETWORK(MAN)
Between LANs
and WANs
Traditional point-to-point and
switched networks in WANs
inadequate for growing needs
of organizations
Requirement for high
capacity private and
public networks at low
costs over a large area
WIDE AREA NETWORK(WAN)
A WAN is a data communications network that covers a relatively
broad geographic area (i.e. one city to another and one country to
another country) and that often uses transmission facilities provided
by common carriers, such as telephone companies.
2.BASED ON “SPAN”
An INTRANET is a
Intra set of
interconnected
networks, using the
Internet Protocol
net and uses Ip-base
tools such as web
browsers, that is
under the control of
a single
administrative
Extra entity.
net An EXTRANET is
a network or
internetwork that
is limited in scope
to a single
The organization or
entity but which
“intern also has limited
connections to
et” the networks
THE INTERNET HISTORY
Evolved from ARPANET, 1969
Advanced Research Projects Agency
(ARPA),U.S. Department of
Defense.
Began in four locations: UCLA,
University of Santa Barbara, the
University of Utah, and SRI
(Stanford Research Institute)
“WWW “ was developed in Spring
1989, at CERN (the European
Laboratory for Particle Physics) by
Tim Berners-Lee.
Explosive growth came with first
graphically oriented browser,
Mosaic, 1993
NETWORK TOPOLOGY
1. BUS TOPLOGY
Each node is daisy-chained
(connected one right after
the other) along the same
backbone. Information
sent from a node travels
along the backbone until it
reaches its destination
node.
2.RING TOPOLOGY
Similar to a bus network,
rings have nodes daisy
chained, but the end of the
network in a ring topology
comes back around to the
first node, creating a
complete circuit. Each
node takes a turn sending
and receiving information
through the use of a token.
3.STAR TOPOLOGY
In a star network, each
node is connected to a
central device called a hub.
The hub takes a signal that
comes from any node and
passes it along to all the
other nodes in the
network.
BASIC TRANSMISSION MEDIA
CONDUCTIVE: twisted pairs and coaxial cables
ELECTROMAGNETIC: microwave
LIGHT: lasers and optical fibers (need clear line of
sight)
WIRELESS – inner/ outer space ; satellite
(omnidirectional security issues)
THE NETWORK ARCHITECTURE
THE OSI REFERENCE MODEL
File Transfer, Email, Remote Login
ASCII Text, Sound (syntax layer)
Establish/manage connection
End-to-end control & error checking
(ensure complete data transfer): TCP
Routing and Logical Addressing: IP
Two party communication: Ethernet
How to transmit signal; coding
Hardware means of sending and
receiving data on a carrier
THE TCP/IP ARCHITECTURE
ASSOCIATED TCP/IP PROTOCOLS &
SERVICES
This protocol, the core of the World Wide Web,
HTTP
●
facilitates retrieval and transfer of hypertext (mixed
media) documents. Stands for the Hypertext Transfer
protocol
A remote terminal emulation protocol
Telnet
●
that enables clients to log on to remote
hosts on the network.
Used to remotely manage network
SNMP
●
devices. Stands for the Simple Network
Management Protocol.
NETWORK SECURITY
Securit ●
Confidentiality
y ●
Integrity
Requir ●
Availability
ements ●
Authenticity
TYPES OF ATTACKS ON A NETWORK
Pas Act
sive ●
Eavesdropping on
transmissions
ive ●
●
Masquerade
Replay
●
Modification of
Att Release of
Att
●
messages
message contents ●
Denial of service
●
Difficult to detect ●
Easy to detect
ack ●
Can be prevented
ack ●
Hard to prevent
s s
SIMPLIFIED MODEL OF
SYMMETRIC ENCRYPTION
Ingredients
a) Plain text
b) Encryption algorithm
c) Secret key
d) Ciphertext
e) Decryption algorithm
PUBLIC-KEY CRYPTOGRAPHY
THE RSA ALGORITHM
Key Generation
Select p, q p and q both prime, p q
Calculate n = p ´ q
Calculate f(n) = (p – 1)(q – 1)
Select integer gcd (f(n), e) = 1;
1 < e < f(n)
Calculate d de mod f(n) = 1
Public key KU = {e, n}
Private key KR = {d, n}
Encryption
Plaintext: M<n
Cipher text: C = Me (mod n)
Decryption
Cipher text: C
Plaintext: M = Cd (mod n)
NETWORK MANAGEMENT
Elements of
Network
Management
Security Fault
Perform Account
ance ing
LATEST DEVELOPMENTS IN COMPUTER
NETWORKING
1.THE INTERNET GRID 2.THE GOOGLE WAVES
Grid computing is the combination of Google Wave is It is a web-based
computer resources from multiple
service, computing platform, and
administrative domains applied to a
common task, usually to a scientific,
communications protocol designed
technical or business problem that to merge e-mail, instant messaging,
requires a great number of computer wikis, and social networking.
processing cycles or the need to process
large amounts of data.
BIBLIOGRAPHY
“Computer Networks” By Andrew Tenenbaum.
Digital Communication And Networking by Behrouz A. Forouzan.
Communication Networks by Alberto Leon Garcia & Indra
Widjaja.
www.google.com, www.dogpile.com, www.ask.com,
www.compnetworking.about.com