Search For This Site

Monday, November 10, 2008

By connection method

Computer networks may be classified according to the hardware technology that is used to connect the individual devices in the network such as Optical fiber, Ethernet, Wireless LAN, HomePNA, or Power line communication.
Ethernets use physical wiring to connect devices. Often, they employ the use of hubs, switches, bridges, and routers.
Wireless LAN technology is built to connect devices without wiring. These devices use a radio frequency to connect.
Author : KAREN

By scale

Computer networks may be classified according to the scale: Personal area network (PAN), Local Area Network (LAN), Campus Area Network (CAN), Metropolitan area network (MAN), or Wide area network (WAN). As Ethernet increasingly is the standard interface to networks, these distinctions are more important to the network administrator than the end user. Network administrators may have to tune the network, based on delay that derives from distance, to achieve the desired Quality of Service (QoS). The primary difference in the networks is the size.
Controller Area Networks are a special niche, as in control of a vehicle's engine, a boat's electronics, or a set of factory robots.
Author : KAREN

Computer network_(part2)

A computer network is an interconnection of a group of computers. Networks may be classified by what is called the network layer at which they operate according to basic reference models considered as standards in the industry such as the four-layer Internet Protocol Suite model. While the seven-layer Open Systems Interconnection (OSI) reference model is better known in academia, the majority of networks use the Internet Protocol Suite (IP) as their network model.
By scale
By connection method
By functional relationship (Network Architectures)
By network topology
By protocol
Author : KAREN

Sunday, November 2, 2008

OSI Model

The Open System Interconnection (OSI) reference model provides a set of international rules and standard to allow any system obeying these protocols to communicate with other systems that use them. These protocols are arranged in seven separate but interconnected layers, each dealing with a different aspect of the communication. Among other things, this allows hardware, like routers and firewalls, to focus on the particular aspect of communication that applies to them, and ignore other parts.
The seven OSI layers are as :
1. Physical layer
This layer deals with the physical connection between two points. This is the lowest layer, and its major role is communicating raw bit streams. This layer is also responsible for activating, maintaining, and deactivating these bit-stream communications.
2. Data link layer
This layer deals with actually transferring data between two points. The physical layer takes care of sending the raw bits, but this layer provides high-level function, such as error correction and flow control. This layer also provides procedures for activating, maintaining, and deactivating data-link connections.
3. Network layer
This layer works as a middle ground, and its key role is to pass information between lower and higher layers. It provides addressing and routing.
4. Transport layer
This layer provides transparent transfer of data between systems. By providing a means to reliably communicate data, this layer allows the higher layers to worry about other things besides reliable or cost-effective means of data transmission.
5. Session layer
This is layer responsible for establishing and then maintaining connections between network applications.
6. Presentation layer
This layer is responsible for presenting the data to applications in a syntax or language they understands. This allows for things like encryption and data compression.
7. Application layer
This layer is concerned with keeping track of the requirements of the application.


When data is communicated through these protocols, it’s sent in small pieces called packets. Each packet contains implementations of these protocols in layers. Starting from the application layer, the packet wraps these protocol in layers. Starting from the application layer, the packet wraps the presentation layer around that data, which wraps the session layer around that, which wrap the transport layer, and so forth. This process is called encapsulation. Each wrapped layer contains a header and a body. The header contains the protocol information needed for that layer, while the body contains the data for that layer. The body of one layer contains the entire package of previously encapsulated layer, like the skin of an onion or the functional contexts found on a program stack.


When two applications exiting on two different private networks communicate across the Internet, the data packets are encapsulated down to the physical layer where they are passed to a router. Because the router isn't concerned with What 's actually in the packets, it only needs to implement protocols up to the network layer. The router sends the packets out to the Internet, where they reach the other network's router. This router then encapsulates this packet with the lower-layer protocol header needed for the packet to reach its final destination. This process is shown in the following illustration.




the process can be though of as an intricate interoffice bureaucracy, reminiscent of the movie Brazil, At each layer is a highly specialized receptionist who only understands the language and protocol of that layer. as data packets are transmitted, each receptionist performs the necessary duties of her particular layer, puts the packet in an interoffice envelope, writes the header on the outside, and passes it on to the receptionist at the next layer. This receptionist in turn performs the necessary duties of his layer, puts the entire envelope in another envelope, writes the header on the outside, and passes it on to the next receptionist.

each receptionist is only aware of the functions and duties of his or her layer. The roles and responsibilities are defnied in a strict protocol, eliminating he not be desirable for humans, but it's deal work for a computer. the creativity and intelligence of a human mind is better suited to the design of protocols such as these, the creation of programs that implement them, and the invention of hacks that use them to achieve interesting and unintended result. But as with any hack, an understanding of the rules of the system is needed before they can be put together in new ways.

What Is Networking Computer

what is networking computer??,Networking is all about communication, and in order for two or more parties to properly communicate, standards and protocol are required. Just as speaking Japanese to someone who only understands English doesn’t really accomplish much in terms of communication, computer and other pieces of network hardware must speak the same language in order to communicate effectively. This means a set of standards must be laid out ahead of time to create this language. These standards actually consist of more than just the language- they also contain the rules of communication.

As an example, when a help desk support operator picks up the phone, information should be communicated and received in a certain order that follows protocol. The operator usually needs to ask for the caller’s name and the nature of the problem before transferring the call to the appropriate department. This is simply the way the protocol works, and any deviation from this protocol tends to be counterproductive.

Network communications has a standard set of protocol, too. These protocol are defined by the Open System Interconnection(OSI) reference model.