Unit 1 (Introduction To Data Communication and Networking)
Unit 1 (Introduction To Data Communication and Networking)
Course Outline:
- Computer Networks
- Andrew S. Tanenbaum (Pearson Education Asia)
Group No From To
1 20JE1092 21JE0172
2 21JE0195 21JE0293
3 21JE0298 21JE0363
NLHC LAB 1
4 21JE0367 21JE0474
5 21JE0475 21JE0577
6 21JE0582 21JE0726
7 21JE0727 21JE0922
8 21JE0930 21JE1037
NLHC LAB 3
9 21JE1038 19JE0056
10 19JE0063 19JE0951
Computer Networks (CSC305)
Course Outline:
Data Communication is the exchange of data (in the forms of 0s and 1s)
between to devices via some form of transmission medium.
• Accuracy
• Timeliness
Overview of Data Communication and Networking
• Message
• Sender
• Receiver
• Medium
• Protocol
Overview of Data Communication and Networking
Networks:
• A network is a set of devices (often referred to as nodes) connected
by media links.
• Networking is the sharing of information and services.
Network Criteria:
To be considered effective and efficient, a network must meet a
number of criteria.
• Performance
• Reliability
• Security
Overview of Data Communication and Networking
Network Criteria:
• Performance -
Can be measured in many ways, including transit time and response
time.
• Security -
Protecting data from:
- Unauthorized access
- Viruses
Overview of Data Communication and Networking
• Scalability • Manageability
• Availability • Adaptability
• Performance • Affordability
• Security
Overview of Data Communication and Networking
FLAT NETWORK
HIERARCHICAL NETWORK
A good network design is
hierarchical, with a clear separation
of functions. It may comprise of
three layers:
- CORE LAYER
- DISTRIBUTION LAYER
- ACCESS LAYER
Overview of Data Communication and Networking
Core Switch: The central hub of the network, responsible for high-speed data transfer between distribution
switches.
Distribution Switches: Two distribution switches connect to the core switch and aggregate traffic from edge
switches.
Edge Switches: These switches connect directly to end devices like access points, printers, clients, scanners, and
VoIP phones.
WLAN Controller: Manages wireless access points and provides centralized control over wireless networks.
I
Router: Connects the campus network to the internet through the ISP.
Firewall: Protects the network from unauthorized access and malicious traffic.
Server Farm: Houses various servers that provide services to network users.
DMZ demilarized Zone: A separate, more secure network segment for isolating sensitive devices or services.
NOC (Network Operations Center): Monitors and manages the network's health and performance.
Key Points:
No Redundancy: The schematic lacks redundancy, which means there are no backup components for
critical devices like the core switch or links to the internet. This makes the network vulnerable to
outages if a key component fails.
Hierarchical Design: The network follows a hierarchical design, with core, distribution, and access
layers, promoting scalability and traffic management.
Wireless Connectivity: The WLAN controller enables wireless access for devices.
Security Measures: The firewall and DMZ zone are implemented for security.
Internet
DMZ
Web server, Email
server, FTP server, etc
Firewall
Firewall
Intranet
It separates an internal LAN from other untrusted networks, usually the Internet.
Resilient Campus Network
Key Components:
Redundant Routers: Two routers connect the campus network to two different ISPs (ISP1 and ISP2), ensuring internet connectivity even if
one ISP experiences an outage.
Firewall: Protects the network from unauthorized access and malicious traffic.
Core Switches: Two core switches form the central backbone of the network, providing high-speed data transfer and redundancy for core
functionality.
Distribution Switches: Multiple distribution switches connect to the core switches, aggregating traffic from access switches and further
distributing it across the network.
Access Switches: These switches connect directly to end devices like computers, printers, and wireless access points, forming the edge of
the network.
Server Farm Switch: A dedicated switch connects to a server farm, providing high-speed connectivity for servers that host essential services.
Key Features:
Resilient Connectivity: The dual ISP connections and redundant core switches ensure continuous network operations even in the event of
failures or outages.
Hierarchical Design: The network follows a hierarchical structure (core, distribution, access) for efficient traffic management and scalability.
Dedicated Server Farm: A separate switch for the server farm optimizes performance for critical services.
Internet Bandwidth, IIT(ISM), Dhanbad
• PGCIL 5Gbps
10G 1G 1G
1 2 3 4 5 6 7 8 9 10 11 12
STACK 1 2 3 4 5 6 7 8 9 10 11 12
Virtu al IP : 172.18.80.111
Fortigate 3700D
P-5 P-5
P-3 P-6 P-6 P-3
HA (a-a) P-4
P-4
80G 80G
P-8 P-8
e1/23
e1/24
e1/24
e1/25
e2/48 e2/48
Secondary_FortiAnalyzer 200F Catalyst 9300L 24 PoE+ 4xG
Primary_FortiAnalyzer 200F
01X 12X 13X 24X G 1 G 2 G 3 G 4
SECONDARY_DNS
BCN BCN
e2/18
STS STS
STS
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 1 2 3 4
BCN
STS
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 1 2 3 4
STS
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 1 2 3 4
10GKeep
KeepAlive Link
alive Link
BCN
STS
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 1 2 3 4
e2/23 PRIMARY_LDAP
SECONDARY_LDAP e2/24 e2/24 SECONDARY_LDAP
CORE-1A CORE-1B
PRIMARY_DHCP e2/21 172.16.252.2 e1/1 e1/1 172.16.252.3
e1/2
80G
e1/2 e2/21 PRIMARY_DHCP
SECONDARY_DHCP e2/22 VPC PAIR LINK e2/22 SECONDARY_DHCP
Syslog e2/18 BCN
STS
ACT
BCN
STS
ACT
BCN
STS
ACT
BCN
STS
ACT
Syslog
N9K-SC-A N9K-SC-A N9K-SC-A N9K-SC-A
O
I
O
I
O
I
O
I
O
I
O
e2/24
CISCO WLC 5520 e3/48
e2/48 CISCO WLC 5520
WHATSUP GOLD e2/25 e2/48 WHATSUP GOLD
e1/9 e1/5
e1/5 e1/7 e1/7 e1/9
40G 40G
40G
40G 40G
40G
Port Chan nel 20
Port Chan nel 30 Port Chan nel 40
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 1 2 3 4 5 6 7 8 9 10 11 12 13
e1/50
14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33
e1/52
34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 1 2 3 4 5 6 7 8 9 10 11
e1/50
12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37
e1/52
38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54
S TS S TS S TS
E NV E NV E NV
Edge switch Edge switch Edge switch Edge switch Edge switch Edge switch
• Established by International
Standards Organization
(ISO). User-Support Layer
When a device (the sender) needs to send data to another device on the same local network, it first needs to determine the receiver's MAC
address.
It does this using a process called Address Resolution Protocol (ARP).
ARP Request:
The sender broadcasts an ARP request packet to all devices on the local network.
Schematic would show: A device sending a broadcast message to all devices on a network segment.
This packet essentially asks, "Who has the IP address 192.168.1.100?" (assuming that's the receiver's IP address).
ARP Response:
Only the device with the matching IP address (the receiver) responds with an ARP response packet.
Schematic would show: The receiver device sending a response message back to the sender.
This response packet includes the receiver's MAC address, such as "00:11:22:33:44:55."
The sender receives the ARP response and stores the receiver's MAC address in its ARP cache, a temporary memory table.
Schematic might show: A table within the sender's device storing IP-MAC address pairs.
Frame Creation and Transmission:
Now that the sender has the receiver's MAC address, it can create a data frame with the appropriate destination MAC address.
Schematic might show: A frame structure with source and destination MAC addresses.
It then transmits this frame directly to the receiver's physical hardware address on the local network.
OSI Reference Model
OSI Reference Model TCP/IP Conceptual Model
/ Internet Layer /
Internetwork Layer
Message Formation
Session Management, Encryption, Data Compression. DNS, SMTP, POP, FTP, WWW, HTTP