0% found this document useful (0 votes)
4 views

MN-Unit-1-Notes

The document outlines the modern networking ecosystem, detailing the various user platforms and network access facilities that connect users to applications and content. It discusses the benefits and characteristics of cloud computing, emphasizing flexibility, efficiency, and strategic value, as well as explaining unified communications and network convergence. Additionally, it covers types of internet traffic, congestion control, and techniques for managing network congestion.

Uploaded by

rahulparande20
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views

MN-Unit-1-Notes

The document outlines the modern networking ecosystem, detailing the various user platforms and network access facilities that connect users to applications and content. It discusses the benefits and characteristics of cloud computing, emphasizing flexibility, efficiency, and strategic value, as well as explaining unified communications and network convergence. Additionally, it covers types of internet traffic, congestion control, and techniques for managing network congestion.

Uploaded by

rahulparande20
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

1.

The Modern Networking Ecosystem

Figure 1.0 illustrates the modern networking ecosystem in general terms. This entire ecosystem is designed to
provide services to end users, a term used broadly to encompass individuals working within enterprises, in public
settings, or at home.

End user platforms can vary: Fixed (e.g., desktop PC or workstation), Portable (e.g., laptop), Mobile (e.g., tablet
or smartphone)

Users connect to network-based services and content through various network access facilities, such as:
• DSL and cable modems
• Wi-Fi
• WiMAX (Worldwide Interoperability for Microwave Access) wireless modems
• Cellular modems
These facilities enable direct access to the Internet or a variety of network providers, which include:
• Wi-Fi networks
• Cellular networks
• Private and shared network facilities (e.g., premises enterprise networks)
Ultimately, users rely on these facilities to access applications and content.

Figure 1.0 highlights three main categories of service providers of interest to end users:
1. Application Providers
o Offer applications (apps) that run on user platforms, especially mobile ones.
o App stores have expanded this model to fixed and portable platforms as well.
2. Application Service Providers
o Host and serve applications that run on the provider’s infrastructure rather than being downloaded.
o Examples include web servers, email servers, database servers, and modern cloud computing
platforms.
3. Content Providers
o Deliver the data consumed on user devices, such as email, music, and video.
o This data may be intellectual property (e.g., movies, music) or enterprise-generated content.
o Examples include music labels and movie studios.
2. Cloud Computing Benefits and Characteristics
More and more businesses are moving their IT systems to the cloud, which means using internet-based
services instead of managing everything on their own computers and servers. This shift is known as
enterprise cloud computing.
At the same time, regular people are also using the cloud in their everyday lives. This is called personal cloud
computing—it includes things like backing up photos, syncing files between devices, or sharing documents
online.
In short, cloud computing allows both companies and individuals to store and access data and software over
the internet instead of relying only on local devices.

Characteristics of cloud computing as follows:


1.Broad network access:
Cloud services can be used over the internet from many different types of devices — like smartphones,
laptops, tablets, or desktop computers. These services work through standard internet connections, so you
can access them from almost anywhere, using a wide range of devices and software.

2.Rapid elasticity:
Cloud computing lets you quickly increase or decrease the amount of computing resources you use, based on
what you need. For example, if you’re running a big task and need more servers, you can get them right
away. When the task is done, you can stop using those extra resources so you’re not paying for what you
don’t need.

3.Measured service:
Cloud systems automatically control and optimize resource use by leveraging a metering capability at some
level of abstraction appropriate to the type of service (for example, storage, processing, bandwidth, and
active user accounts).
Resource usage can be monitored, controlled, and reported, providing transparency for both the provider
and consumer of the utilized service.

4.On-demand self-service:
A consumer can independently provision computing capabilities, such as server time and network storage, as
needed automatically without requiring human interaction with each service provider.
Because the service is on demand, the resources are not permanent parts of your IT infrastructure.

5.Resource pooling:
Cloud providers share their computing resources (like storage, memory, and processing power) among many
users. This is called a multitenant model, where resources are assigned and adjusted based on demand.
Users don’t usually know exactly where their data is stored, but they might be able to choose a general
location, like a country or data center. Even private clouds (used by one organization) often share resources
between different departments to use them more efficiently.

The Benefits of Cloud Computing:


1. Flexibility:
Flexibility further integrates:
• Scalability - Cloud infrastructure scales on demand to support fluctuating workload Cloud
infrastructure scales on demand to support fluctuating workloads.
• Storage options - Users can choose public, private or hybrid storage offerings, depending on security
needs and other considerations.
• Control choices - Organizations can determine their level of control with as-a-service options. These
include software as a service (SaaS), platform as a service (PaaS) and infrastructure as a service
(IaaS).
• Tool selection - Users can select from a menu of prebuilt tools and features to build a solution that
fits their specific needs.

2. Efficiency:
• Accessibility: Cloud-based applications and data are accessible from virtually any internet-connected
device.
• Speed to market: Developing in the cloud enables users to get their applications to market quickly.
• Data security: Hardware failures do not result in data loss because of networked backups.
• Savings on equipment: Cloud computing uses remote resources, saving organizations the cost of
servers and other equipment.
• Pay structure: A “utility” pay structure means users only pay for the resources they use.

3. Strategic value:
• Streamlined work: Cloud service providers (CSPs) manage underlying infrastructure, enabling
organizations to focus on application development and other priorities.
• Regular updates: Service providers regularly update offerings to give users the most up-to-date
technology.
• Collaboration: Worldwide access means teams can collaborate from widespread locations.
3. Explain Unified Communication
Unified Communications (UC) focuses on the integration of real time communication services to optimize
business processes.
Key elements of Unified Communications include the following:
1. UC systems typically provide a unified user interface and consistent user experience across multiple
devices and media.
2. UC merges real time communications services with non-real services and business process applications.

Architecture:
Real-Time Communications (RTC) Dashboard:
An RTC dashboard is a key part of Unified Communications (UC). It gives users a single, consistent interface
across devices—like phones, tablets, computers, or office phones. It provides access to real-time tools (e.g.,
instant messaging, audio/video calls, whiteboards) and non-real-time tools (e.g., email, voicemail, fax, SMS).
It also shows presence info, so users can see who’s available to chat or collaborate. RTC dashboards are
essential for teams needing fast, effective communication.
Web conferencing:
Refers to live meetings or presentations in which participants access the meeting or presentation via a
mobile device or the web, either over the Internet, or corporate intranet.
Video teleconferencing (VTC):
Videoconferencing allows users in two or more locations to interact simultaneously via two-way video and
audio transmission. UC systems enable users to participate in video conferences via desktop computers,
smartphones, and mobile devices.
Audio conferencing:
Also called conference calling, refers to a live meeting in which participants are linked together for audio
transmission and reception. A participant may be on a landline, mobile phone, or at a “softphone” - a
computer equipped with microphone and speaker.
Unified messaging:
Unified messaging systems provide a common repository for messages from multiple sources. It allows users
to retrieve saved e-mail, voice mail, and fax messages from a computer, telephone, or mobile device.
Computer users can select and play voice mail recordings that appear in their unified messaging inboxes.
Instant messaging (IM):
Real-time text-based messaging between two or more participants. IM is like online chat because it is text-
based and exchanged bidirectionally in real time.
Presence:
Presence refers to the real-time ability to know someone’s availability, preferred contact method, and current
activity. Initially tied to instant messaging (e.g., "available" or "busy"), it now includes details like whether a
person is on a call, in a meeting, or out of the office. It also often shows a person's location, which can be
helpful for quickly addressing urgent business matters.
IP enabling contact centers:
Refers to the use of IP-based unified communications to enhance customer contact center functionality and
performance.
IP/mobility: Refers to the delivery of information to and collection of information from enterprise personnel
who are usually mobile, using an IP network infrastructure.
Converged IP/wireless infrastructure: A unified networking and communications-based IP packet transfer to
support voice, data, and video transmission and can be extended to include local- and wide area wireless
communications. UC-enabled mobile devices can switch between Wi-Fi and cellular systems in the middle of
a communication session.

4. Explain Network Convergence

Network convergence is when phone systems and computer networks combine into a single, unified system,
allowing voice, data, and video to be transmitted over the same network. You can think of this convergence
in terms of a three-layer model of enterprise communications:
Application Convergence:
refers to the integration of communication tools with business applications. It allows end users to access and
manage various forms of communication through a unified interface. Key points include:
o Unified tools: Voice calls, email, voicemail, and messaging in one place
o Integrated apps: Works with CRM, collaboration, and other business tools
o Rich features: Mixes voice, video, and data smoothly
o Example: One inbox for voicemail, emails, texts, etc.

Enterprise Services :
refer to the network-level support that ensures users can fully benefit from applications and tools.
▪ Privacy & Security: Ensure proper privacy and authentication mechanisms are in place.
▪ Location Tracking: Support features like remote printing and mobile access by knowing user
locations.
▪ Collaboration: Set up environments for teams and applications to work together.
▪ Network Services: Include storage access and remote services for mobile users.
▪ Quality of Service (QoS): Maintain performance and reliability for key applications.
Infrastructure:
refers to the physical and virtual network components that support communication within an enterprise.
o Core Components: Includes LANs, WANs, Internet links, and cloud connections.
o Cloud Integration: Connects to private/public clouds for data storage and web services.
o Convergence: Supports voice, video, and image transmission over networks originally built for data
or voice.
o Mobile Access: Enables delivery of multimedia content (video, text, data) to smartphones via cellular
networks.

5. Explain Types of Networks and Internet traffic


Traffic on the Internet and enterprise networks can be divided into two broad categories: elastic and
inelastic.
Elastic traffic:
Elastic traffic can handle changes in speed (throughput) and delay on the internet without breaking or failing.
This type of traffic works well with how the internet is built and includes common online activities like
downloading files or checking emails.
Flexible: Adjusts to delays and slower speeds without major problems.
Protocols Used: Mostly uses TCP (slows down if the network is busy) or UDP (sends as fast as possible).
Examples:
o Email (SMTP): Not affected much by delays.
o File transfers (FTP/SFTP): More sensitive—larger files mean longer waits.
o Remote logins (Telnet/SSH): Users notice even small delays.
o Web browsing (HTTP/HTTPS): Delays can affect the user experience.
o Network management (SNMP): Usually fine with delays, but during problems, speed is more
important.

Inelastic Traffic:
Inelastic traffic does not easily adapt, if at all, to changes in delay and throughput across an internet.
Examples of inelastic traffic include multimedia transmission, such as voice and video, and high-volume
interactive traffic, such as an interactive simulation application (for example, airline pilot simulation).
The requirements for inelastic traffic may include the following:
1. Throughput
o What it means: The amount of data delivered over time.
o Why it matters: Some apps need a minimum speed to work properly. If it's too low, they can fail
(unlike elastic traffic which just slows down).
2. Delay (Latency)
o What it means: The time it takes for data to travel from sender to receiver.
o Example: In stock trading, even small delays can put someone at a disadvantage.
3. Jitter (Delay Variation)
o What it means: Differences in the time between packet arrivals.
o Why it matters: Real-time apps (like video calls) need packets to arrive steadily. If not, the app adds a
delay buffer to smooth things out.
4. Packet Loss
o What it means: Some data packets don’t reach their destination.
o Impact: Real-time apps vary in how much loss they can handle. Too much can ruin quality (e.g.,
choppy audio or video).
6. Congestion Control and its Effect
Congestion happens when too many data packets are sent through the network, nearing or exceeding its
capacity.
Key Points:
o Cause: Too much traffic for the network to handle.
o Effect: Slower speeds, delays, and dropped packets (poor quality of service).
o Congestion Control: Tries to keep traffic levels low enough to avoid serious performance issues.

Effects of Congestion:
1.Queueing Delay:
Queueing delay is the time a job or data packet has to wait in a queue before it can be processed or
transmitted.
Key Points:
o In Networks: It happens when data (like a call or packet) has to wait at a router or switch because
the network is busy.
o Cause: If packets arrive faster than the router can process them (like during burst transmissions),
they wait in a queue (buffer).
o Impact: Causes delays before the data reaches its destination.
o Where It Happens: Can occur at the origin, intermediate switches, or the receiver's end.
o Measurement: Delay can vary for each packet, so averages are used to measure the overall delay.

2. Packet Loss:
Packet loss occurs when data packets sent across a network don't reach their destination. This can happen
due to errors in transmission or network congestion.
Key Points
Causes:
o Errors in data transmission, especially on wireless networks.
o Congestion when too much data is sent at once.
Impact:
o Real-time apps (e.g., streaming, gaming) suffer if too many packets are lost.
o QoS: Acceptable packet loss depends on the data type (e.g., business networks may require <0.1%
packet loss).
Detection:
o TCP detects and adjusts for packet loss automatically.
o Tools like ping, traceroute, and MTR help network admins measure and diagnose packet loss.

3. Blocking of new connections:


o In congestion control, when the network is overwhelmed, new incoming connections may be blocked
to prevent further performance degradation.
o This ensures that existing connections continue to function smoothly without overloading the
network.
o By temporarily rejecting new connections, the network can stabilize and maintain the quality of
service for active users.

7. Congestion Control and its Techniques


Congestion control techniques can be broadly classified into two categories: open loop congestion control
and closed loop congestion control.
A. Open loop congestion control:
Open loop congestion control policies are applied to prevent congestion before it happens. The congestion
control is handled either by the source or the destination.
1. Retransmission Policy:
2. Window Policy:
3. Discarding Policy:
4. Acknowledgment Policy:
5. Admission Policy:

B. Control Closed Loop Congestion Control:


1.Backpressure:
Backpressure is a technique in which a congested node stop receiving packet from upstream node. .
Backpressure is a node-to-node congestion control technique that propagate in the opposite direction of
data flow.
The backpressure technique can be applied only to virtual circuit where each node has information of its
above upstream node.

2.Choke Packet Technique:


Choke packet technique is applicable to both virtual networks as well as datagram subnets. A choke packet is
a packet sent by a node to the source to inform it of congestion.

3.Implicit Signaling:
In implicit signaling, there is no communication between the congested nodes and the source. The source
guesses that there is congestion in a network. For example, when sender sends several packets and there is
no acknowledgment for a while, one assumption is that there is a congestion.

4.Explicit Signaling:
o Forward Signaling:
The A bit can be set in a packet moving in the direction of the congestion. This bit can warn the
destination that there is congestion. The receiver in this case can use policies, such as slowing down
the acknowledgments.
o Backward Signaling:
A bit can be set in a packet moving in the direction opposite to th congestion. This bit can warn the
source that there is congestion and that it needs to slow down to avoid the discarding of packets.
A. Binary:
A bit is set in a data packet as it is forwarded by the congested node. When a source receives
a binary indication of congestion on a logical connection, it may reduce its traffic flow.
B. Credit based:
Credit-based schemes control data flow by giving the sender a certain "credit" (in bytes or
packets) that limits how much it can send. Once the credit runs out, the sender must wait for
more before continuing. This prevents buffer overflow and is used in both flow and
congestion control, especially in networks like Frame Relay and ATM.
C. Rate based:
Rate-based schemes set a maximum data rate for the sender. The source can send data up to
this limit. If congestion occurs, any node along the path can send a control message to lower
the allowed rate, helping to manage traffic and avoid overload.

8. Explain Ethernet and Wifi


Ethernet:
Applications of Ethernet
Ethernet is the predominant wired networking technology used across various environments—homes,
offices, data centers, enterprises, and wide-area networks (WANs). With support for data rates up to 100
Gbps and distances from a few meters to tens of kilometers, Ethernet plays a critical role in networking
personal computers, workstations, servers, and data storage devices.
a.Ethernet in the Home:
Ethernet has long been used to create home local area networks (LANs), connecting computers and other
devices to the Internet via a broadband modem/router. Although the rise of high-speed Wi-Fi has reduced
reliance on Ethernet, most home networks still include Ethernet to some degree.
b. Ethernet in the Office:
Ethernet dominates wired office LANs due to its simplicity, performance, and security. It works alongside
Wi-Fi to support both stationary and mobile devices, offering high-speed, interference-free connections.
c. Ethernet in the Data Center:
In data centers, Ethernet is increasingly preferred due to its ability to handle massive volumes of data
between servers and storage units.
d. Ethernet in the Enterprise:
One of Ethernet’s greatest strengths is scalability—both in data rates and physical distance. Enterprises can
extend Ethernet networks across multiple buildings or campuses using a mix of:
• Data rates from 10 Mbps to 100 Gbps
• Various Ethernet cable types and hardware
• Interoperable vendor equipment using the same protocol.

Wifi:
Wi-Fi is the predominant wireless Internet access technology, used in homes, offices, and public spaces. Wi-Fi
in the home now connects computers, tablets, smartphones, and a host of electronic devices, such as video
cameras, TVs, and thermostats. Wi-Fi in the enterprise has become an essential means of enhancing worker
productivity and network effectiveness. And public Wi-Fi hotspots have expanded dramatically to provide
free Internet access in must public places

Wi-Fi in the Home:


Wi-Fi began by replacing Ethernet cables for connecting computers to each other and the internet. A central
router/modem connects all devices—desktop, laptop, smartphones—either via Ethernet or wirelessly. Wi-Fi
made networking simpler and more mobile.
Today, Wi-Fi is the default home networking method, especially for smartphones and tablets. These devices
automatically use Wi-Fi when available, reducing cellular data usage. Wi-Fi is also key for the growing
Internet of Things (IoT), linking smart devices throughout the home.

Public Wi-Fi:
Wi-Fi hotspots are now available in cafes, airports, hotels, hospitals, stores, and more—making it rare to be
far from internet access. Apps make connecting easier, and satellite-based Wi-Fi (like from Iridium) is
extending coverage to remote areas, though current speeds are limited.
Enterprise Wi-Fi:
Wi-Fi use in businesses has grown rapidly. Now, about half of all enterprise network traffic runs over Wi-Fi.
Employees prefer portable devices—laptops, tablets, smartphones—which Wi-Fi supports more flexibly than
Ethernet.
Thanks to faster standards like 802.11ac (Gigabit Wi-Fi), enterprise networks can handle many mobile users
at once. Wi-Fi is no longer just for meeting rooms—it now covers entire office buildings, outdoor areas, and
remote locations.
The BYOD (Bring Your Own Device) trend is supported by Wi-Fi’s flexibility, letting employees stay productive
whether they’re at the office, home, a café, or on the road.

9. Explain 4G and 5G CELLULAR


Cellular technology is the foundation of mobile wireless communications and supports users in locations that
are not easily served by wired networks. Cellular technology is the underlying technology for mobile
telephones, personal communications systems, wireless Internet, and wireless web applications, and much
more.

Fourth Generation(4G):
The evolution of smartphones and cellular networks has ushered in a new generation of capabilities and
standards, which is collectively called 4G. 4G systems provide ultra-broadband Internet access for a variety of
mobile devices including laptops, smartphones, and tablets. 4G networks support Mobile web access and
high-bandwidth applications such as high-definition mobile TV, mobile video conferencing, and gaming
services.
These requirements have led to the development of a fourth generation (4G) of mobile wireless technology
that is designed to maximize bandwidth and throughput while also maximizing spectral efficiency
4G systems have the following characteristics:
• Based on an all-IP packet switched network
• Support peak data rates of up to approximately 100 Mbps for high mobility mobile access and up to
approximately 1 Gbps for low mobility access such as local wireless access
• Dynamically share and use the network resources to support more simultaneous users per cell
• Support smooth handovers across heterogeneous networks
• Support high QoS for next-generation multimedia applications

Fifth Generation(5G):
5G is the latest technology for mobile networks, which started being used worldwide in 2019. It’s the
successor to the current 4G networks used by most mobile phones today. 5G will provide faster speeds,
stronger connections, and the ability to connect more devices at once.
How Fast is 5G? 5G will offer download speeds that can reach 10 gigabits per second (Gbit/s) — that’s a lot
faster than the current 4G speeds, which max out at around 1 Gbit/s. It will be fast enough for things like HD
streaming, gaming, and running smart cities.
What Makes 5G Faster? To achieve these speeds, 5G uses higher-frequency radio waves. These waves can
carry more data, but they don’t travel as far as the ones used by 4G, so 5G needs more antennas and smaller
coverage areas (cells).
Different Types of 5G Bands:
• Low Band (600-700 MHz) – This is similar to the frequency used by 4G, so it’s not much faster. It can
cover large areas, like current 4G networks.
• Mid Band (2.5-3.7 GHz) – This offers a balance between speed and coverage. It can provide faster
speeds (100-900 Mbit/s) and is being rolled out in most cities.
• High Band (25-39 GHz) – This provides the fastest speeds (up to 1 Gbit/s or more) but has a short
range. It’s best for dense areas like stadiums and airports.
The Future of 5G: 5G will eventually connect more devices, such as smart appliances and cars, through a
concept called the Internet of Things (IoT). It will also improve internet speeds for homes and businesses,
competing with traditional internet providers.

Opt) A Typical Network Hierarchy A Typical Network Hierarchy:

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy