0% found this document useful (0 votes)
17 views

Unit-1 NetWSoft, Design Issue, Connection

Network software encompasses software used for design, implementation, operation and monitoring of computer networks. It helps set up networks, enables access to resources, allows user management, and protects networks from threats. Computer networks use a layered approach and each layer communicates using protocols.

Uploaded by

Ashish Patel
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views

Unit-1 NetWSoft, Design Issue, Connection

Network software encompasses software used for design, implementation, operation and monitoring of computer networks. It helps set up networks, enables access to resources, allows user management, and protects networks from threats. Computer networks use a layered approach and each layer communicates using protocols.

Uploaded by

Ashish Patel
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 15

Network Software

• Network software encompasses a broad range of software used


for design, implementation, and operation and monitoring of
computer networks. Traditional networks were hardware based
with software embedded.

• Functions of Network Software


Helps to set up and install computer networks
Enables users to have access to network resources in a seamless
manner
Allows administrations to add or remove users from the
network
Helps to define locations of data storage and allows users to
access that data
Helps administrators and security system to protect the network
from data breaches, unauthorized access and attacks on a network
Enables network virtualizations
Protocol Hierarchies
• To reduce design complexity, most networks are
organized as a series or hierarchy of layers or levels.

• The number of layers, the name of each layer, the


contents of each layer, and the function of each layer
differ from network to network.

• Layer n on one machine communicates with layer n on


another machine on the network using an some rules
known as the layer n protocol.

• A protocol is an agreement between the communicating


parties on how the communication is to proceed.
Design issues of Layers
Reliability
Network channels and components may be unreliable,
resulting in loss of bits while data transfer. So, an
important design issue is to make sure that the information
transferred is not distorted.

Scalability
Networks are continuously evolving. The sizes are
continually increasing leading to congestion. Also, when
new technologies are applied to the added components, it
may lead to incompatibility issues. Hence, the design
should be done so that the networks are scalable and can
accommodate such additions and alterations.
Addressing
At a particular time, infinite messages are being
transferred between large numbers of computers. So, a
naming or addressing system should exist so that each
layer can identify the sender and receivers of each
message.

Error Control
Unreliable channels introduce a number of errors in the
data streams that are communicated. So, the layers need
to agree upon common error detection and error
correction methods so as to protect data packets while
they are transferred.
Flow Control
If the rate at which data is produced by the sender is
higher than the rate at which data is received by the
receiver, there are chances of overflowing the receiver.
So, a proper flow control mechanism needs to be
implemented.

Resource Allocation
Computer networks provide services in the form of
network resources to the end users. The main design
issue is to allocate and deallocate resources to
processes. The allocation/deallocation should occur so
that minimal interference among the hosts occurs and
there is optimal usage of the resources.
Statistical Multiplexing
It is not feasible to allocate a dedicated path for each
message while it is being transferred from the source to
the destination. So, the data channel needs to be
multiplexed, so as to allocate a fraction of the
bandwidth or time to each host.

Routing
There may be multiple paths from the source to the
destination. Routing involves choosing an optimal path
among all possible paths, in terms of cost and time.
There are several routing algorithms that are used in
network systems.
Security
A major factor of data communication is to defend it
against threats alteration of messages. So, there
should be mechanisms to prevent unauthorized access
to data through authentication and cryptography.
Connection Oriented and Connectionless
Services
Connection Oriented Services
There is a sequence of operation to be followed by the users of
connection oriented service. These are:
1. Connection is established.
2. Information is sent.
3. Connection is released.
In connection oriented service we have to establish a connection
before starting the communication. When connection is
established, we send the message or the information and then we
release the connection.
Connection oriented service is more reliable than connectionless
service. We can resend the message in connection oriented service
if there is an error at the receivers end. Example of connection
oriented is TCP (Transmission Control Protocol) protocol.
Connection Less Services

It is similar to the postal services, as it carries the full address


where the message (letter) is to be carried. Each message is routed
independently from source to destination. The order of message
sent can be different from the order received.

In connectionless the data is transferred in one direction from


source to destination without checking that destination is still
there or not or if it prepared to accept the message. Authentication
is not needed in this. Example of Connectionless service is UDP
(User Datagram Protocol) protocol.
Difference: Connection oriented and Connectionless
service
1. In connection oriented service authentication is needed,
while connectionless service does not need any
authentication.
2. Connection oriented protocol makes a connection and
checks whether message is received or not and sends
again if an error occurs, while connectionless service
protocol does not guarantees a message delivery.
3. Connection oriented service is more reliable than
connectionless service.
4. Connection oriented service interface is stream based
and connectionless is message based.
Service Primitives
A service is formally specified by a set of primitives
(operations) available to a user process to access the
service. These primitives tell the service to perform some
action or report on an action taken by a peer entity.
•LISTEN : When a server is ready to accept an incoming
connection it executes the LISTEN primitive. It blocks waiting
for an incoming connection.

•CONNECT : It connects the server by establishing a connection.


Response is awaited.

•RECIEVE: Then the RECIEVE call blocks the server.

•SEND : Then the client executes SEND primitive to transmit its


request followed by the execution of RECIEVE to get the reply.
Send the message.

•DISCONNECT : This primitive is used for terminating the


connection.
Relationship of services in protocols
• In OSI and TCP/IP model, each layer perform their own
services which are facilitate by protocols.

• For example,
 Ethernet provide physical architecture
 IP provide service of addressing and routing
 TCP, UDP provide service of connection
 SMTP, FTP, HTTP provide service of sharing

You might also like