MN-Unit-1-Notes
MN-Unit-1-Notes
Figure 1.0 illustrates the modern networking ecosystem in general terms. This entire ecosystem is designed to
provide services to end users, a term used broadly to encompass individuals working within enterprises, in public
settings, or at home.
End user platforms can vary: Fixed (e.g., desktop PC or workstation), Portable (e.g., laptop), Mobile (e.g., tablet
or smartphone)
Users connect to network-based services and content through various network access facilities, such as:
• DSL and cable modems
• Wi-Fi
• WiMAX (Worldwide Interoperability for Microwave Access) wireless modems
• Cellular modems
These facilities enable direct access to the Internet or a variety of network providers, which include:
• Wi-Fi networks
• Cellular networks
• Private and shared network facilities (e.g., premises enterprise networks)
Ultimately, users rely on these facilities to access applications and content.
Figure 1.0 highlights three main categories of service providers of interest to end users:
1. Application Providers
o Offer applications (apps) that run on user platforms, especially mobile ones.
o App stores have expanded this model to fixed and portable platforms as well.
2. Application Service Providers
o Host and serve applications that run on the provider’s infrastructure rather than being downloaded.
o Examples include web servers, email servers, database servers, and modern cloud computing
platforms.
3. Content Providers
o Deliver the data consumed on user devices, such as email, music, and video.
o This data may be intellectual property (e.g., movies, music) or enterprise-generated content.
o Examples include music labels and movie studios.
2. Cloud Computing Benefits and Characteristics
More and more businesses are moving their IT systems to the cloud, which means using internet-based
services instead of managing everything on their own computers and servers. This shift is known as
enterprise cloud computing.
At the same time, regular people are also using the cloud in their everyday lives. This is called personal cloud
computing—it includes things like backing up photos, syncing files between devices, or sharing documents
online.
In short, cloud computing allows both companies and individuals to store and access data and software over
the internet instead of relying only on local devices.
2.Rapid elasticity:
Cloud computing lets you quickly increase or decrease the amount of computing resources you use, based on
what you need. For example, if you’re running a big task and need more servers, you can get them right
away. When the task is done, you can stop using those extra resources so you’re not paying for what you
don’t need.
3.Measured service:
Cloud systems automatically control and optimize resource use by leveraging a metering capability at some
level of abstraction appropriate to the type of service (for example, storage, processing, bandwidth, and
active user accounts).
Resource usage can be monitored, controlled, and reported, providing transparency for both the provider
and consumer of the utilized service.
4.On-demand self-service:
A consumer can independently provision computing capabilities, such as server time and network storage, as
needed automatically without requiring human interaction with each service provider.
Because the service is on demand, the resources are not permanent parts of your IT infrastructure.
5.Resource pooling:
Cloud providers share their computing resources (like storage, memory, and processing power) among many
users. This is called a multitenant model, where resources are assigned and adjusted based on demand.
Users don’t usually know exactly where their data is stored, but they might be able to choose a general
location, like a country or data center. Even private clouds (used by one organization) often share resources
between different departments to use them more efficiently.
2. Efficiency:
• Accessibility: Cloud-based applications and data are accessible from virtually any internet-connected
device.
• Speed to market: Developing in the cloud enables users to get their applications to market quickly.
• Data security: Hardware failures do not result in data loss because of networked backups.
• Savings on equipment: Cloud computing uses remote resources, saving organizations the cost of
servers and other equipment.
• Pay structure: A “utility” pay structure means users only pay for the resources they use.
3. Strategic value:
• Streamlined work: Cloud service providers (CSPs) manage underlying infrastructure, enabling
organizations to focus on application development and other priorities.
• Regular updates: Service providers regularly update offerings to give users the most up-to-date
technology.
• Collaboration: Worldwide access means teams can collaborate from widespread locations.
3. Explain Unified Communication
Unified Communications (UC) focuses on the integration of real time communication services to optimize
business processes.
Key elements of Unified Communications include the following:
1. UC systems typically provide a unified user interface and consistent user experience across multiple
devices and media.
2. UC merges real time communications services with non-real services and business process applications.
Architecture:
Real-Time Communications (RTC) Dashboard:
An RTC dashboard is a key part of Unified Communications (UC). It gives users a single, consistent interface
across devices—like phones, tablets, computers, or office phones. It provides access to real-time tools (e.g.,
instant messaging, audio/video calls, whiteboards) and non-real-time tools (e.g., email, voicemail, fax, SMS).
It also shows presence info, so users can see who’s available to chat or collaborate. RTC dashboards are
essential for teams needing fast, effective communication.
Web conferencing:
Refers to live meetings or presentations in which participants access the meeting or presentation via a
mobile device or the web, either over the Internet, or corporate intranet.
Video teleconferencing (VTC):
Videoconferencing allows users in two or more locations to interact simultaneously via two-way video and
audio transmission. UC systems enable users to participate in video conferences via desktop computers,
smartphones, and mobile devices.
Audio conferencing:
Also called conference calling, refers to a live meeting in which participants are linked together for audio
transmission and reception. A participant may be on a landline, mobile phone, or at a “softphone” - a
computer equipped with microphone and speaker.
Unified messaging:
Unified messaging systems provide a common repository for messages from multiple sources. It allows users
to retrieve saved e-mail, voice mail, and fax messages from a computer, telephone, or mobile device.
Computer users can select and play voice mail recordings that appear in their unified messaging inboxes.
Instant messaging (IM):
Real-time text-based messaging between two or more participants. IM is like online chat because it is text-
based and exchanged bidirectionally in real time.
Presence:
Presence refers to the real-time ability to know someone’s availability, preferred contact method, and current
activity. Initially tied to instant messaging (e.g., "available" or "busy"), it now includes details like whether a
person is on a call, in a meeting, or out of the office. It also often shows a person's location, which can be
helpful for quickly addressing urgent business matters.
IP enabling contact centers:
Refers to the use of IP-based unified communications to enhance customer contact center functionality and
performance.
IP/mobility: Refers to the delivery of information to and collection of information from enterprise personnel
who are usually mobile, using an IP network infrastructure.
Converged IP/wireless infrastructure: A unified networking and communications-based IP packet transfer to
support voice, data, and video transmission and can be extended to include local- and wide area wireless
communications. UC-enabled mobile devices can switch between Wi-Fi and cellular systems in the middle of
a communication session.
Network convergence is when phone systems and computer networks combine into a single, unified system,
allowing voice, data, and video to be transmitted over the same network. You can think of this convergence
in terms of a three-layer model of enterprise communications:
Application Convergence:
refers to the integration of communication tools with business applications. It allows end users to access and
manage various forms of communication through a unified interface. Key points include:
o Unified tools: Voice calls, email, voicemail, and messaging in one place
o Integrated apps: Works with CRM, collaboration, and other business tools
o Rich features: Mixes voice, video, and data smoothly
o Example: One inbox for voicemail, emails, texts, etc.
Enterprise Services :
refer to the network-level support that ensures users can fully benefit from applications and tools.
▪ Privacy & Security: Ensure proper privacy and authentication mechanisms are in place.
▪ Location Tracking: Support features like remote printing and mobile access by knowing user
locations.
▪ Collaboration: Set up environments for teams and applications to work together.
▪ Network Services: Include storage access and remote services for mobile users.
▪ Quality of Service (QoS): Maintain performance and reliability for key applications.
Infrastructure:
refers to the physical and virtual network components that support communication within an enterprise.
o Core Components: Includes LANs, WANs, Internet links, and cloud connections.
o Cloud Integration: Connects to private/public clouds for data storage and web services.
o Convergence: Supports voice, video, and image transmission over networks originally built for data
or voice.
o Mobile Access: Enables delivery of multimedia content (video, text, data) to smartphones via cellular
networks.
Inelastic Traffic:
Inelastic traffic does not easily adapt, if at all, to changes in delay and throughput across an internet.
Examples of inelastic traffic include multimedia transmission, such as voice and video, and high-volume
interactive traffic, such as an interactive simulation application (for example, airline pilot simulation).
The requirements for inelastic traffic may include the following:
1. Throughput
o What it means: The amount of data delivered over time.
o Why it matters: Some apps need a minimum speed to work properly. If it's too low, they can fail
(unlike elastic traffic which just slows down).
2. Delay (Latency)
o What it means: The time it takes for data to travel from sender to receiver.
o Example: In stock trading, even small delays can put someone at a disadvantage.
3. Jitter (Delay Variation)
o What it means: Differences in the time between packet arrivals.
o Why it matters: Real-time apps (like video calls) need packets to arrive steadily. If not, the app adds a
delay buffer to smooth things out.
4. Packet Loss
o What it means: Some data packets don’t reach their destination.
o Impact: Real-time apps vary in how much loss they can handle. Too much can ruin quality (e.g.,
choppy audio or video).
6. Congestion Control and its Effect
Congestion happens when too many data packets are sent through the network, nearing or exceeding its
capacity.
Key Points:
o Cause: Too much traffic for the network to handle.
o Effect: Slower speeds, delays, and dropped packets (poor quality of service).
o Congestion Control: Tries to keep traffic levels low enough to avoid serious performance issues.
Effects of Congestion:
1.Queueing Delay:
Queueing delay is the time a job or data packet has to wait in a queue before it can be processed or
transmitted.
Key Points:
o In Networks: It happens when data (like a call or packet) has to wait at a router or switch because
the network is busy.
o Cause: If packets arrive faster than the router can process them (like during burst transmissions),
they wait in a queue (buffer).
o Impact: Causes delays before the data reaches its destination.
o Where It Happens: Can occur at the origin, intermediate switches, or the receiver's end.
o Measurement: Delay can vary for each packet, so averages are used to measure the overall delay.
2. Packet Loss:
Packet loss occurs when data packets sent across a network don't reach their destination. This can happen
due to errors in transmission or network congestion.
Key Points
Causes:
o Errors in data transmission, especially on wireless networks.
o Congestion when too much data is sent at once.
Impact:
o Real-time apps (e.g., streaming, gaming) suffer if too many packets are lost.
o QoS: Acceptable packet loss depends on the data type (e.g., business networks may require <0.1%
packet loss).
Detection:
o TCP detects and adjusts for packet loss automatically.
o Tools like ping, traceroute, and MTR help network admins measure and diagnose packet loss.
3.Implicit Signaling:
In implicit signaling, there is no communication between the congested nodes and the source. The source
guesses that there is congestion in a network. For example, when sender sends several packets and there is
no acknowledgment for a while, one assumption is that there is a congestion.
4.Explicit Signaling:
o Forward Signaling:
The A bit can be set in a packet moving in the direction of the congestion. This bit can warn the
destination that there is congestion. The receiver in this case can use policies, such as slowing down
the acknowledgments.
o Backward Signaling:
A bit can be set in a packet moving in the direction opposite to th congestion. This bit can warn the
source that there is congestion and that it needs to slow down to avoid the discarding of packets.
A. Binary:
A bit is set in a data packet as it is forwarded by the congested node. When a source receives
a binary indication of congestion on a logical connection, it may reduce its traffic flow.
B. Credit based:
Credit-based schemes control data flow by giving the sender a certain "credit" (in bytes or
packets) that limits how much it can send. Once the credit runs out, the sender must wait for
more before continuing. This prevents buffer overflow and is used in both flow and
congestion control, especially in networks like Frame Relay and ATM.
C. Rate based:
Rate-based schemes set a maximum data rate for the sender. The source can send data up to
this limit. If congestion occurs, any node along the path can send a control message to lower
the allowed rate, helping to manage traffic and avoid overload.
Wifi:
Wi-Fi is the predominant wireless Internet access technology, used in homes, offices, and public spaces. Wi-Fi
in the home now connects computers, tablets, smartphones, and a host of electronic devices, such as video
cameras, TVs, and thermostats. Wi-Fi in the enterprise has become an essential means of enhancing worker
productivity and network effectiveness. And public Wi-Fi hotspots have expanded dramatically to provide
free Internet access in must public places
Public Wi-Fi:
Wi-Fi hotspots are now available in cafes, airports, hotels, hospitals, stores, and more—making it rare to be
far from internet access. Apps make connecting easier, and satellite-based Wi-Fi (like from Iridium) is
extending coverage to remote areas, though current speeds are limited.
Enterprise Wi-Fi:
Wi-Fi use in businesses has grown rapidly. Now, about half of all enterprise network traffic runs over Wi-Fi.
Employees prefer portable devices—laptops, tablets, smartphones—which Wi-Fi supports more flexibly than
Ethernet.
Thanks to faster standards like 802.11ac (Gigabit Wi-Fi), enterprise networks can handle many mobile users
at once. Wi-Fi is no longer just for meeting rooms—it now covers entire office buildings, outdoor areas, and
remote locations.
The BYOD (Bring Your Own Device) trend is supported by Wi-Fi’s flexibility, letting employees stay productive
whether they’re at the office, home, a café, or on the road.
Fourth Generation(4G):
The evolution of smartphones and cellular networks has ushered in a new generation of capabilities and
standards, which is collectively called 4G. 4G systems provide ultra-broadband Internet access for a variety of
mobile devices including laptops, smartphones, and tablets. 4G networks support Mobile web access and
high-bandwidth applications such as high-definition mobile TV, mobile video conferencing, and gaming
services.
These requirements have led to the development of a fourth generation (4G) of mobile wireless technology
that is designed to maximize bandwidth and throughput while also maximizing spectral efficiency
4G systems have the following characteristics:
• Based on an all-IP packet switched network
• Support peak data rates of up to approximately 100 Mbps for high mobility mobile access and up to
approximately 1 Gbps for low mobility access such as local wireless access
• Dynamically share and use the network resources to support more simultaneous users per cell
• Support smooth handovers across heterogeneous networks
• Support high QoS for next-generation multimedia applications
Fifth Generation(5G):
5G is the latest technology for mobile networks, which started being used worldwide in 2019. It’s the
successor to the current 4G networks used by most mobile phones today. 5G will provide faster speeds,
stronger connections, and the ability to connect more devices at once.
How Fast is 5G? 5G will offer download speeds that can reach 10 gigabits per second (Gbit/s) — that’s a lot
faster than the current 4G speeds, which max out at around 1 Gbit/s. It will be fast enough for things like HD
streaming, gaming, and running smart cities.
What Makes 5G Faster? To achieve these speeds, 5G uses higher-frequency radio waves. These waves can
carry more data, but they don’t travel as far as the ones used by 4G, so 5G needs more antennas and smaller
coverage areas (cells).
Different Types of 5G Bands:
• Low Band (600-700 MHz) – This is similar to the frequency used by 4G, so it’s not much faster. It can
cover large areas, like current 4G networks.
• Mid Band (2.5-3.7 GHz) – This offers a balance between speed and coverage. It can provide faster
speeds (100-900 Mbit/s) and is being rolled out in most cities.
• High Band (25-39 GHz) – This provides the fastest speeds (up to 1 Gbit/s or more) but has a short
range. It’s best for dense areas like stadiums and airports.
The Future of 5G: 5G will eventually connect more devices, such as smart appliances and cars, through a
concept called the Internet of Things (IoT). It will also improve internet speeds for homes and businesses,
competing with traditional internet providers.