SlideShare a Scribd company logo
1 of 28
Data Communications & Networking
                      Lecture-04


            Course Instructor : Sehrish Rafiq
            Department Of Computer Science
                     University Of Peshawar
Lecture overview
 Categories of Networks
 Internetworks
 An overview of the communication tasks
 Protocol Architecture
 Characteristics of a protocol
Categories of Networks




 In to which category a network falls is determined by its size, its
  ownership, the distance it covers and its physical architecture.
LAN(Local Area Network)
 A local Area network is usually privately owned and links the
  devices in a single office, building or campus.
 LAN size is limited to a few kilometers.
 LAN’s are designed to allow resources to be shared between
  personal computers or work stations.
 In addition to size LAN are distinguished from other types of
  networks by their transmission media and topology.
 Most common topologies:Bus,Ring & Star.
LAN(Local Area Network)
MAN(Metropolitan Area Network)
 A MAN is designed to extend over an entire city.


 It may be a single network such as cable television network or it
  may be a means of connecting a number of connecting a number
  of LANs in to a larger network so that resources may be shared
  LAN-to-LAN.

 A MAN may be wholly owned and operated by a private company
  such as local telephone company.
MAN(Metropolitan Area
     Network)
WAN(Wide Area Network)
 A WAN provides long distance transmission of voice, data, image
  and video information over large geographic areas that may
  comprise a country, a continent or even the whole world.

 WANs may utilize public, leased or private communication devices
  usually in communications and can therefore span an unlimited
  number of miles.

 A WAN that is wholly owned and used by a single company is often
  referred to as enterprise network.
WAN(Wide Area Network)
Internetworks
 When two or more networks are connected, they became an
  internetwork or internet.

 The Internet from “I” is a Wide area network while the
  internet from “i” refers to the interconnection of networks.

 Internet can be thought as internet but the reverse is not
  necessarily true.
History of Internet
   1960,A project of ARPA of US department of
    Defense
   Stanford Research Institute
   University of California at Los Angeles
   University of California at Santa Barbara
   University of Utah
   Features
   Redundant lines
   Decentralized Computing
   1980, NSF and other Government agencies
   1991,Commercial traffic
   April 1995,US government action
   2000,30 million users on 10 million
    computers,240000 networks, 100 countries
   Monthly growth
Communication Tasks
 Transmission System utilization
 Interfacing
 Signal generation
 Synchronization
 Exchange Management
 Error Detection & Correction
 Flow Control
 Addressing
 Routing
 Recovery
 Message formatting
 Security
 Network Management
Transmission System utilization
 Transmission System utilization refers to the need to make
  efficient use of transmission facilities that are typically shared
  among a number of communicating devices.
 Various techniques (referred to as multiplexing) are used to
  allocate the total capacity of a transmission medium among a
  number of users.
 Congestion Control techniques may be required to assure that the
  system is not overwhelmed by excessive demand for transmission
  services.
Interfacing & Signal generation

 To communicate a device must interface with the transmission
  system.
 Once an interface is established, signal generation is required for
  communication.
 The properties of the signal such as form and intensity must be
  such that they are:
 capable of being propagated through the transmission system
 Interpretable as data at the receiver.
Synchronization
 Not only must the signals be generated to confirm to the
  requirements of the transmission system and receiver, but there
  must be some form of synchronization between transmitter and
  receiver.
Exchange Management
 If data are to be exchanged in both directions over a period of
  time, the two parties must cooperate. e.g. Telephone.

 For data processing devices more will be done than simply
  establishing a connection, certain conventions must be decided
  upon.

 These conventions may include whether both devices may
  transmit simultaneously or must take turns, the amount of data to
  be sent at one time, the format of the data and what to do if
  certain contingencies such as an error arise.
Error Detection and Correction
 Error detection and correction are required in circumstances
  where errors cannot be tolerated.

 This is usually the case with data processing systems.


 For example in transferring a file from one computer to another it
  is simply not acceptable for the contents of the file to be
  accidentally altered.
Flow Control
 Flow Control is required to assure that the source does not
  overwhelm the destination by sending data faster than they can be
  processed and absorbed.
Addressing and routing
 When a transmission facility is shared by more than two devices,
  the source system must indicate the identity of the intended
  destination.

 The transmission system must assure that the destination system
  and only that system receives the data.

 Further the transmission system may itself be a network through
  which various paths may be taken.

 A specific route through this network must be chosen.
Recovery
 Recovery techniques are needed in situations in which an
  information exchange ,such as a database transaction or file
  transfer, is interrupted due to a fault somewhere in the system.

 The objective is either to be able to resume activity at the point of
  interruption or atleast to restore the state of systems involved to
  the condition prior to the beginning of exchange.
Message formatting
Message formatting has to do with an agreement between
  two parties as to the form and format of the data to be
  exchanged or transmitted, such as the binary code for
  characters.
Security
 The sender of data may wish to be assured that only the intended
  receiver actually receives the data.

 And the receiver of the data may wish to be assured that the
  received data have not been altered in transit and the data actually
  come from the purported sender.
Network Management
Finally, a data communication facility is a complex system
  that cannot create or run itself.

Network Management capabilities are needed to configure
  the system, monitor its status, react to failures and overloads
  and plan intelligently for future growth.
Protocol Architecture
Instead of implementing the logic for communication
  between two computers as a single module, the task is
  broken up in to subtasks, each of which is implemented
  separately as a structured set of modules.

That structure is referred to as a protocol architecture.
A Simplified Architecture for File
                      Transfer

 Computer Y                                                    Computer Z
                        Files and File Transfer Commands
File Transfer                                                 File Transfer
Application                                                   Application
Communication             Communications-related data units   Communication
service module                                                service module
Network access                                                Network access
module                           Communic
                                  Communic                    module
                                   ations
                                    ations
                                  Network
                                   Network
            Network Interface                  Network Interface
            Logic                              Logic
Characteristics of a Protocol
Direct/Indirect
Monolithic/Structured
Symmetric / Asymmetric
Standard / Non Standard
Suggested Readings
Section 1.1,Section 1.4, Section 2.1 of Data and computer
 communications sixth edition by william stallings
Section 2.4 Categories of networks Data communications
 and networking 2nd edition by Behrouz A foruzan
Thanks!!!

More Related Content

What's hot

Computer network unit 1 notes
Computer network unit  1 notesComputer network unit  1 notes
Computer network unit 1 notesRavi Rajput
 
Voice Over IP (VoIP)
Voice Over IP (VoIP)Voice Over IP (VoIP)
Voice Over IP (VoIP)habib_786
 
MEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROLMEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROLjunnubabu
 
HCI LAB MANUAL
HCI LAB MANUAL HCI LAB MANUAL
HCI LAB MANUAL Um e Farwa
 
Atm( Asynchronous Transfer mode )
Atm( Asynchronous Transfer mode )Atm( Asynchronous Transfer mode )
Atm( Asynchronous Transfer mode )Ali Usman
 
Computer network switching
Computer network switchingComputer network switching
Computer network switchingShivani Godha
 
Network Layer design Issues.pptx
Network Layer design Issues.pptxNetwork Layer design Issues.pptx
Network Layer design Issues.pptxAcad
 
wired and wireless networks
wired and wireless networkswired and wireless networks
wired and wireless networksKavitha Ravi
 
Packet switching
Packet switchingPacket switching
Packet switchingasimnawaz54
 
Interconnection Network
Interconnection NetworkInterconnection Network
Interconnection NetworkAli A Jalil
 
web connectivity in IoT
web connectivity in IoTweb connectivity in IoT
web connectivity in IoTFabMinds
 
Computer Networks Lecture Notes
Computer Networks Lecture NotesComputer Networks Lecture Notes
Computer Networks Lecture NotesFellowBuddy.com
 
Lecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networksLecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networksChandra Meena
 
Networking Models
Networking ModelsNetworking Models
Networking ModelsAftab Mirza
 

What's hot (20)

Computer network unit 1 notes
Computer network unit  1 notesComputer network unit  1 notes
Computer network unit 1 notes
 
Ch1
Ch1Ch1
Ch1
 
Voice Over IP (VoIP)
Voice Over IP (VoIP)Voice Over IP (VoIP)
Voice Over IP (VoIP)
 
MEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROLMEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROL
 
HCI LAB MANUAL
HCI LAB MANUAL HCI LAB MANUAL
HCI LAB MANUAL
 
Atm( Asynchronous Transfer mode )
Atm( Asynchronous Transfer mode )Atm( Asynchronous Transfer mode )
Atm( Asynchronous Transfer mode )
 
Computer network switching
Computer network switchingComputer network switching
Computer network switching
 
Network Layer design Issues.pptx
Network Layer design Issues.pptxNetwork Layer design Issues.pptx
Network Layer design Issues.pptx
 
wired and wireless networks
wired and wireless networkswired and wireless networks
wired and wireless networks
 
Packet switching
Packet switchingPacket switching
Packet switching
 
Fundamental of cellular system
Fundamental of cellular systemFundamental of cellular system
Fundamental of cellular system
 
Interconnection Network
Interconnection NetworkInterconnection Network
Interconnection Network
 
web connectivity in IoT
web connectivity in IoTweb connectivity in IoT
web connectivity in IoT
 
Rpc
RpcRpc
Rpc
 
Computer Networks Lecture Notes
Computer Networks Lecture NotesComputer Networks Lecture Notes
Computer Networks Lecture Notes
 
Lecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networksLecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networks
 
Wireless application protocol ppt
Wireless application protocol  pptWireless application protocol  ppt
Wireless application protocol ppt
 
Routing Protocols in WSN
Routing Protocols in WSNRouting Protocols in WSN
Routing Protocols in WSN
 
Osi reference model
Osi reference modelOsi reference model
Osi reference model
 
Networking Models
Networking ModelsNetworking Models
Networking Models
 

Viewers also liked

Viewers also liked (6)

Lecture 02
Lecture 02Lecture 02
Lecture 02
 
Lecture 05
Lecture 05Lecture 05
Lecture 05
 
Lecture 09
Lecture 09Lecture 09
Lecture 09
 
Lecture 10
Lecture 10Lecture 10
Lecture 10
 
Lecture 08
Lecture 08Lecture 08
Lecture 08
 
Data communication - Lecture-01
Data communication - Lecture-01 Data communication - Lecture-01
Data communication - Lecture-01
 

Similar to Lecture 04

934 Ch1 Networks
934 Ch1  Networks934 Ch1  Networks
934 Ch1 Networkstechbed
 
Introduction to Computers Lecture # 13
Introduction to Computers Lecture # 13Introduction to Computers Lecture # 13
Introduction to Computers Lecture # 13Sehrish Rafiq
 
Network Fundamentals1.pptx
Network Fundamentals1.pptxNetwork Fundamentals1.pptx
Network Fundamentals1.pptxsairakesh41
 
Chapter 1 overview-stij3053 - Network Design
Chapter 1 overview-stij3053 - Network DesignChapter 1 overview-stij3053 - Network Design
Chapter 1 overview-stij3053 - Network Designnakomuri
 
Basic concept of networking
Basic concept of networkingBasic concept of networking
Basic concept of networkingbappyiucse
 
Basic networking tutorial
Basic networking tutorialBasic networking tutorial
Basic networking tutorialreddydivakara
 
Business Data Communications and Networks
Business Data Communications and NetworksBusiness Data Communications and Networks
Business Data Communications and NetworksChristian Reina
 
Networking tutorial
Networking tutorialNetworking tutorial
Networking tutorialajaymane22
 
Networking concepts by Sachidananda M H
Networking concepts by Sachidananda M HNetworking concepts by Sachidananda M H
Networking concepts by Sachidananda M HSachidananda M H
 
10 New Web Application and Security.pptx
10 New Web Application and Security.pptx10 New Web Application and Security.pptx
10 New Web Application and Security.pptxAkshayIngole17
 

Similar to Lecture 04 (20)

934 Ch1 Networks
934 Ch1  Networks934 Ch1  Networks
934 Ch1 Networks
 
Introduction to Computers Lecture # 13
Introduction to Computers Lecture # 13Introduction to Computers Lecture # 13
Introduction to Computers Lecture # 13
 
Internet
InternetInternet
Internet
 
Chapter 2
Chapter 2Chapter 2
Chapter 2
 
Network Fundamentals1.pptx
Network Fundamentals1.pptxNetwork Fundamentals1.pptx
Network Fundamentals1.pptx
 
Internet
InternetInternet
Internet
 
Chapter 1 overview-stij3053 - Network Design
Chapter 1 overview-stij3053 - Network DesignChapter 1 overview-stij3053 - Network Design
Chapter 1 overview-stij3053 - Network Design
 
COMPUTER NETWORKING
COMPUTER NETWORKINGCOMPUTER NETWORKING
COMPUTER NETWORKING
 
Basic concept of networking
Basic concept of networkingBasic concept of networking
Basic concept of networking
 
Basic networking tutorial
Basic networking tutorialBasic networking tutorial
Basic networking tutorial
 
Networking fundamentalsss
Networking fundamentalsssNetworking fundamentalsss
Networking fundamentalsss
 
Business Data Communications and Networks
Business Data Communications and NetworksBusiness Data Communications and Networks
Business Data Communications and Networks
 
Computer Network - Unit 1
Computer Network - Unit 1Computer Network - Unit 1
Computer Network - Unit 1
 
Networking tutorial
Networking tutorialNetworking tutorial
Networking tutorial
 
Basic lecture
Basic lectureBasic lecture
Basic lecture
 
Networking concepts by Sachidananda M H
Networking concepts by Sachidananda M HNetworking concepts by Sachidananda M H
Networking concepts by Sachidananda M H
 
10 New Web Application and Security.pptx
10 New Web Application and Security.pptx10 New Web Application and Security.pptx
10 New Web Application and Security.pptx
 
Chapter4
Chapter4Chapter4
Chapter4
 
Cn
CnCn
Cn
 
Cnetworks
CnetworksCnetworks
Cnetworks
 

More from Sehrish Rafiq

Introduction to Computers Lecture # 14
Introduction to Computers Lecture # 14Introduction to Computers Lecture # 14
Introduction to Computers Lecture # 14Sehrish Rafiq
 
Introduction to Computers Lecture # 12
Introduction to Computers Lecture # 12Introduction to Computers Lecture # 12
Introduction to Computers Lecture # 12Sehrish Rafiq
 
Introduction to Computers Lecture # 11
Introduction to Computers Lecture # 11Introduction to Computers Lecture # 11
Introduction to Computers Lecture # 11Sehrish Rafiq
 
Introduction to Computers Lecture # 10
Introduction to Computers Lecture # 10Introduction to Computers Lecture # 10
Introduction to Computers Lecture # 10Sehrish Rafiq
 
Introduction to Computers Lecture # 9
Introduction to Computers Lecture # 9Introduction to Computers Lecture # 9
Introduction to Computers Lecture # 9Sehrish Rafiq
 
Introduction to Computers Lecture # 8
Introduction to Computers Lecture # 8Introduction to Computers Lecture # 8
Introduction to Computers Lecture # 8Sehrish Rafiq
 
Introduction to Computers Lecture # 7
Introduction to Computers Lecture # 7Introduction to Computers Lecture # 7
Introduction to Computers Lecture # 7Sehrish Rafiq
 
Introduction to computers Lecture # 4
Introduction to computers Lecture # 4Introduction to computers Lecture # 4
Introduction to computers Lecture # 4Sehrish Rafiq
 
Introduction to Computers Lecture # 5
Introduction to Computers Lecture # 5Introduction to Computers Lecture # 5
Introduction to Computers Lecture # 5Sehrish Rafiq
 
Introduction to Computers Lecture # 3
Introduction to Computers Lecture # 3Introduction to Computers Lecture # 3
Introduction to Computers Lecture # 3Sehrish Rafiq
 
Introduction to Computers Lecture # 2
Introduction to Computers Lecture # 2Introduction to Computers Lecture # 2
Introduction to Computers Lecture # 2Sehrish Rafiq
 
Introduction to Computers Lecture # 1
Introduction to Computers Lecture # 1Introduction to Computers Lecture # 1
Introduction to Computers Lecture # 1Sehrish Rafiq
 
Data Communications and Networking Lecture 16
Data Communications and Networking Lecture 16Data Communications and Networking Lecture 16
Data Communications and Networking Lecture 16Sehrish Rafiq
 

More from Sehrish Rafiq (20)

Introduction to Computers Lecture # 14
Introduction to Computers Lecture # 14Introduction to Computers Lecture # 14
Introduction to Computers Lecture # 14
 
Introduction to Computers Lecture # 12
Introduction to Computers Lecture # 12Introduction to Computers Lecture # 12
Introduction to Computers Lecture # 12
 
Introduction to Computers Lecture # 11
Introduction to Computers Lecture # 11Introduction to Computers Lecture # 11
Introduction to Computers Lecture # 11
 
Introduction to Computers Lecture # 10
Introduction to Computers Lecture # 10Introduction to Computers Lecture # 10
Introduction to Computers Lecture # 10
 
Introduction to Computers Lecture # 9
Introduction to Computers Lecture # 9Introduction to Computers Lecture # 9
Introduction to Computers Lecture # 9
 
Introduction to Computers Lecture # 8
Introduction to Computers Lecture # 8Introduction to Computers Lecture # 8
Introduction to Computers Lecture # 8
 
Introduction to Computers Lecture # 7
Introduction to Computers Lecture # 7Introduction to Computers Lecture # 7
Introduction to Computers Lecture # 7
 
Introduction to computers Lecture # 4
Introduction to computers Lecture # 4Introduction to computers Lecture # 4
Introduction to computers Lecture # 4
 
Introduction to Computers Lecture # 5
Introduction to Computers Lecture # 5Introduction to Computers Lecture # 5
Introduction to Computers Lecture # 5
 
Introduction to Computers Lecture # 3
Introduction to Computers Lecture # 3Introduction to Computers Lecture # 3
Introduction to Computers Lecture # 3
 
Introduction to Computers Lecture # 2
Introduction to Computers Lecture # 2Introduction to Computers Lecture # 2
Introduction to Computers Lecture # 2
 
Introduction to Computers Lecture # 1
Introduction to Computers Lecture # 1Introduction to Computers Lecture # 1
Introduction to Computers Lecture # 1
 
Data Communications and Networking Lecture 16
Data Communications and Networking Lecture 16Data Communications and Networking Lecture 16
Data Communications and Networking Lecture 16
 
Lecture 24
Lecture 24Lecture 24
Lecture 24
 
Lecture 18
Lecture 18Lecture 18
Lecture 18
 
Lecture 21
Lecture 21Lecture 21
Lecture 21
 
Lecture 13
Lecture 13Lecture 13
Lecture 13
 
Lecture 12
Lecture 12Lecture 12
Lecture 12
 
Lecture 11
Lecture 11Lecture 11
Lecture 11
 
Lecture 07
Lecture 07Lecture 07
Lecture 07
 

Recently uploaded

Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 

Recently uploaded (20)

Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 

Lecture 04

  • 1. Data Communications & Networking Lecture-04 Course Instructor : Sehrish Rafiq Department Of Computer Science University Of Peshawar
  • 2. Lecture overview  Categories of Networks  Internetworks  An overview of the communication tasks  Protocol Architecture  Characteristics of a protocol
  • 3. Categories of Networks  In to which category a network falls is determined by its size, its ownership, the distance it covers and its physical architecture.
  • 4. LAN(Local Area Network)  A local Area network is usually privately owned and links the devices in a single office, building or campus.  LAN size is limited to a few kilometers.  LAN’s are designed to allow resources to be shared between personal computers or work stations.  In addition to size LAN are distinguished from other types of networks by their transmission media and topology.  Most common topologies:Bus,Ring & Star.
  • 6. MAN(Metropolitan Area Network)  A MAN is designed to extend over an entire city.  It may be a single network such as cable television network or it may be a means of connecting a number of connecting a number of LANs in to a larger network so that resources may be shared LAN-to-LAN.  A MAN may be wholly owned and operated by a private company such as local telephone company.
  • 8. WAN(Wide Area Network)  A WAN provides long distance transmission of voice, data, image and video information over large geographic areas that may comprise a country, a continent or even the whole world.  WANs may utilize public, leased or private communication devices usually in communications and can therefore span an unlimited number of miles.  A WAN that is wholly owned and used by a single company is often referred to as enterprise network.
  • 10. Internetworks  When two or more networks are connected, they became an internetwork or internet.  The Internet from “I” is a Wide area network while the internet from “i” refers to the interconnection of networks.  Internet can be thought as internet but the reverse is not necessarily true.
  • 11. History of Internet  1960,A project of ARPA of US department of Defense  Stanford Research Institute  University of California at Los Angeles  University of California at Santa Barbara  University of Utah  Features  Redundant lines  Decentralized Computing  1980, NSF and other Government agencies  1991,Commercial traffic  April 1995,US government action  2000,30 million users on 10 million computers,240000 networks, 100 countries  Monthly growth
  • 12. Communication Tasks  Transmission System utilization  Interfacing  Signal generation  Synchronization  Exchange Management  Error Detection & Correction  Flow Control  Addressing  Routing  Recovery  Message formatting  Security  Network Management
  • 13. Transmission System utilization  Transmission System utilization refers to the need to make efficient use of transmission facilities that are typically shared among a number of communicating devices.  Various techniques (referred to as multiplexing) are used to allocate the total capacity of a transmission medium among a number of users.  Congestion Control techniques may be required to assure that the system is not overwhelmed by excessive demand for transmission services.
  • 14. Interfacing & Signal generation  To communicate a device must interface with the transmission system.  Once an interface is established, signal generation is required for communication.  The properties of the signal such as form and intensity must be such that they are:  capable of being propagated through the transmission system  Interpretable as data at the receiver.
  • 15. Synchronization  Not only must the signals be generated to confirm to the requirements of the transmission system and receiver, but there must be some form of synchronization between transmitter and receiver.
  • 16. Exchange Management  If data are to be exchanged in both directions over a period of time, the two parties must cooperate. e.g. Telephone.  For data processing devices more will be done than simply establishing a connection, certain conventions must be decided upon.  These conventions may include whether both devices may transmit simultaneously or must take turns, the amount of data to be sent at one time, the format of the data and what to do if certain contingencies such as an error arise.
  • 17. Error Detection and Correction  Error detection and correction are required in circumstances where errors cannot be tolerated.  This is usually the case with data processing systems.  For example in transferring a file from one computer to another it is simply not acceptable for the contents of the file to be accidentally altered.
  • 18. Flow Control  Flow Control is required to assure that the source does not overwhelm the destination by sending data faster than they can be processed and absorbed.
  • 19. Addressing and routing  When a transmission facility is shared by more than two devices, the source system must indicate the identity of the intended destination.  The transmission system must assure that the destination system and only that system receives the data.  Further the transmission system may itself be a network through which various paths may be taken.  A specific route through this network must be chosen.
  • 20. Recovery  Recovery techniques are needed in situations in which an information exchange ,such as a database transaction or file transfer, is interrupted due to a fault somewhere in the system.  The objective is either to be able to resume activity at the point of interruption or atleast to restore the state of systems involved to the condition prior to the beginning of exchange.
  • 21. Message formatting Message formatting has to do with an agreement between two parties as to the form and format of the data to be exchanged or transmitted, such as the binary code for characters.
  • 22. Security  The sender of data may wish to be assured that only the intended receiver actually receives the data.  And the receiver of the data may wish to be assured that the received data have not been altered in transit and the data actually come from the purported sender.
  • 23. Network Management Finally, a data communication facility is a complex system that cannot create or run itself. Network Management capabilities are needed to configure the system, monitor its status, react to failures and overloads and plan intelligently for future growth.
  • 24. Protocol Architecture Instead of implementing the logic for communication between two computers as a single module, the task is broken up in to subtasks, each of which is implemented separately as a structured set of modules. That structure is referred to as a protocol architecture.
  • 25. A Simplified Architecture for File Transfer Computer Y Computer Z Files and File Transfer Commands File Transfer File Transfer Application Application Communication Communications-related data units Communication service module service module Network access Network access module Communic Communic module ations ations Network Network Network Interface Network Interface Logic Logic
  • 26. Characteristics of a Protocol Direct/Indirect Monolithic/Structured Symmetric / Asymmetric Standard / Non Standard
  • 27. Suggested Readings Section 1.1,Section 1.4, Section 2.1 of Data and computer communications sixth edition by william stallings Section 2.4 Categories of networks Data communications and networking 2nd edition by Behrouz A foruzan