CN-UNIT-1 - Part-1
CN-UNIT-1 - Part-1
CN-UNIT-1 - Part-1
B SAI BABA,M.Tech(Ph.D),VIT,Bhimavaram
What is Computer Network?
● A computer network is a collection of interconnected computers, devices, and
other hardware components that are linked together to facilitate communication,
data sharing, and resource sharing.
● It allows multiple computers and devices to exchange information, access shared
resources, and collaborate effectively.
( or )
(or)
● “ Network of networks “
Where does the Internet come from?
What is WWW?
● The World Wide Web, commonly known as the web, is a system of interconnected documents and
● World Wide Web is an information system that allows users to access and navigate websites and web
● It is a collection of websites, web pages, multimedia content, and hyperlinks that allow users to
● The web is just one of the many services and applications that utilize the internet infrastructure
Network Elements
Subnet ?
● A subnet, short for subnetwork, is a
portion of a larger network that is
divided or segmented into smaller
logical networks.
● It involves dividing a single network
into multiple smaller networks to
improve network performance,
security, and manageability.
Internal Network Cards USB based NIC Wireless NIC
the weakened signal, amplify it, and then retransmit it at its original strength.
● In a network, as data travels over cables (such as copper or fiber-optic cables), it tends
● This attenuation can lead to data loss and degradation, affecting the overall
Figure : In this, the various secondary hubs are connected to the central hub which contains the
repeater. This data flow from top to bottom i.e. from the central hub to the secondary and then to the
devices or from bottom to top i.e. devices to the secondary hub and then to the central hub.
● Tree topology, also known as hierarchical topology, is a network configuration that
combines characteristics of both bus and star topologies.
● In a tree network, all devices are connected to a central hub, which acts as the root of the tree.
From this central hub, branches extend out to other hubs or end devices, creating a
hierarchical structure.
● It is a multi-point connection and a non-robust topology because if the backbone fails the topology
crashes.
1. Central hub: The central hub is the primary element of the tree topology and is responsible for
connecting all the branches and end devices in the network. It acts as the main communication point
for all connected devices.
2. Secondary hub: It is the intermediate levels of the hierarchy. Each Secondary hub is connected to
the central hub or other intermediate hubs. These branches can be further extended into
sub-branches, creating a multi-level hierarchy.
3. End devices: The end devices are the devices located at the leaves of the tree. These devices can be
computers, printers, switches, or any other networked devices.
4.Hierarchical structure: The tree topology exhibits a hierarchical arrangement of devices, which makes
it easy to manage and scale the network. Information generally flows from the top (root) of the tree down
to the leaves and vice versa.
● This topological technology is the combination of all the various types of topologies we have
studied above.
● Hybrid Topology is used when the nodes are free to take any form.
● It means these can be individuals such as Ring or Star topology or can be a combination of
various types of topologies seen above.
Types of Networks
● Networks can be categorized into various types based on their size, geographical
coverage, and the way they are structured.
PAN (Personal Area Network)
● PANs (Personal Area Networks) let devices communicate over the range of a person.
● A Personal Area Network (PAN) is a type of network used for connecting personal devices
in close proximity to an individual.
● PANs are designed to facilitate communication and data exchange between devices such as
smartphones, tablets, laptops, personal computers, wireless headphones,
smartwatches, and other wearable devices.
● Example: Bluetooth devices
● In the simplest form, Bluetooth networks use the master-slave paradigm of Fig. 1-7.
● The system unit (the PC) is normally the master, talking to the mouse, keyboard, etc., as
slaves.
● The master tells the slaves what addresses to use, when they can broadcast, how long they
can transmit, what frequencies they can use, and so on.
Characteristics of a PAN are:
Wired LAN:
➔ Ethernet(IEEE 802.3)is the most common and widely used LAN technology.
➔ It uses twisted-pair or fiber-optic cables to connect devices in a star topology.
➔ Wired LANs run at speeds of 100 Mbps to 1 Gbps, have low delay(microseconds or
nanoseconds), and make very few errors.
Wireless LAN:
● There is a standard for wireless LANs called IEEE 802.11, popularly known as WiFi, to
connect devices without the need for physical cables.
● WLANs use radio waves to transmit data over the airwaves, providing wireless
connectivity and mobility to devices within the network.
● It runs at speeds anywhere from 10 to hundreds of Mbps.
● Access Points:
○ Access points are sometimes called base stations. The access points connect to the
wired network, and all communication between clients goes through an access point
○ Access points provide the wireless connectivity and allow devices to connect to the
WLAN.
● WLANs are widely used in homes, offices, public spaces, airports, hotels, educational
institutions, and various other environments to provide wireless internet access and
facilitate device connectivity.
● Fig. 1-8( a & b) shows a sample topology of WLAN and Switched Ethernet.
● Each computer speaks the Ethernet protocol and connects to a box called a switch with a
point-to-point link.
● Hence the name. A switch has multiple ports, each of which can connect to one computer.
● The job of the switch is to relay packets between computers that are attached to it, using the
address in each packet to determine which computer to send it to.
MAN (Metropolitan Area Network)
● MAN covers a larger geographical area than a Local Area Network (LAN) but is smaller than a Wide Area
Network (WAN).
● A MAN typically spans a city or a metropolitan region, connecting multiple LANs and data centers within the
area.
● The best-known examples of MANs are the cable television networks available in many cities.
● These systems grew from earlier community antenna systems used in areas with poor over-the-air television
reception.
● In those early systems, a large antenna was placed on top of a nearby hill and a signal was then piped to the
subscribers’ houses.
● When the Internet began attracting a mass audience, the cable TV network operators began to realize that with
some changes to the system, they could provide two-way Internet service in unused parts of the spectrum.
● At that point, the cable TV system began to morph from simply a way to distribute television to a metropolitan
area network.
● a MAN might look something like the system shown in Fig. 1-9.
● In this figure we see both television signals and Internet being fed into the centralized cable headend for
subsequent distribution to people’s homes.
Q:: How does the MAN network work?
Why
Reference
Models?
[2]
★ The OSI (Open Systems Interconnection) model and the TCP/IP (Transmission
Control Protocol/Internet Protocol) model are both conceptual frameworks used to
understand and describe how data communication occurs over a network.
★ They both break down the communication process into layers, but there are some key
differences between the two models.
★ Both models serve as important tools for understanding network communication, and
their concepts are used in the design and implementation of modern networks and
protocols.
★ The TCP/IP model's practical implementation and widespread use have made it the
dominant reference model in today's networking landscape.
OSI Reference Model
● OSI stands for Open Systems Interconnection. It has been developed by ISO –
‘International Organization for Standardization‘, in the year 1984.
● The OSI (Open Systems Interconnection) reference model is a conceptual framework
used to understand and standardize how different networking protocols and
technologies interact and communicate with each other.
● The purpose of OSI reference model is to gude technology vendors(Microsoft,CISCO)
and developers , so their H/W and S/W can interoperate and define common
framework.
● It is a 7-layer architecture with each layer having specific functionality to perform.
● All these 7 layers work collaboratively to transmit the data from one person to another
across the globe.
Application Layer
★ At the very top of the OSI Reference Model stack of layers.
★ It provides interface to end user.The application Layer is also called Desktop Layer
★ Its primary focus is to enable communication between software applications running
on different devices across a network.
★ All applications and Softwares we use in daily life like Google chrome, Firefox,Drop
box , Yahoo..etc, that all work with the help of Application layer protocols.
★ Some examples of Application layer protocols include HTTP (Hypertext Transfer
Protocol) for web browsing, SMTP (Simple Mail Transfer Protocol) for sending email,
FTP (File Transfer Protocol) for file transfers, and DNS (Domain Name System) for
translating domain names to IP addresses.
HTTP , HTTPS for Web Browsing
Receiver Side
● Transport layer breaking up messages into smaller segments, then transmitting them over
the network.
● The transport layer also reassembles the segments into the original message when they
reach their destination.
2. Flow Control
1 2
● The Transport Layer manages the flow of data between the sender and receiver to prevent
overwhelming the receiver with data.
● It uses flow control mechanisms to regulate the rate of data transmission and ensure that the
receiver can handle the incoming data..
● Error Control: This layer is responsible for error detection and correction. It checks for errors in
the received data and requests retransmission of any lost or corrupted segments to ensure the data's
integrity.
Transport layer protocols
● Protocols in the transport layer of the OSI model provide communication between applications on
different hosts.
● The two main Transport layer protocols are:
○ Transmission Control Protocol [TCP]
■ The Transmission Control Protocol (TCP) is connection-oriented, meaning that before
exchanging data, the two applications must establish a connection between them.
■ After the connection is established, packets are sent and received reliably.
■ It provides reliable communication between two hosts.
○ User Datagram Protocol [UDP]
■ The User Datagram Protocol (UDP) is connectionless, meaning that data is exchanged
without establishing a connection.
■ Packets are sent and received without any guarantees about their order or
delivery(Unreliable).
Network Layer
Logical Addressing:
● The Network layer operates above the data link layer (Layer 2) and below the transport
layer (Layer 4) in the OSI model.
● It is responsible for delivery of data from original source to destination.
Logical Addressing:
● It is responsible for breaking down the data segments into data packets and is tasked with
reassembling them on the receiver side.
● Devices at the network layer are identified using logical addresses, such as IP (Internet
Protocol) addresses. The network layer adds the source and destination IP addresses to the
data packets to ensure proper delivery.
Routing:
● The Network layer determines the most efficient path for data packets to travel from the source
to the destination across multiple networks.
● It uses routing algorithms and protocols to make forwarding decisions based on the network
topology and destination address.
Congestion:
● The network layer can detect and respond to network congestion, either by slowing down
the rate of packet transmission or by using other congestion control mechanisms.
What is Congestion:
● Congestion in the network layer is a situation where the network is overloaded with
traffic, and this can lead to a number of problems, including:
○ Packet loss
○ Increased delay
Data Link Layer
★ The data link layer is responsible for the node-to-node delivery of the message.
★ The Data Link Layer takes the packets received from the Network Layer and encapsulates
them into frames for transmission over the physical medium. At the receiving end, it
extracts the data from the frames and passes it up to the Network Layer.
★ When a packet arrives in a network, it is the responsibility of the DLL to transmit it to the
Host using its MAC address(Media Access Control).
★ MAC addresses are used for addressing and delivering data frames to the correct destination
on the same network.
2. Error Detection and Correction: The data link layer is responsible for error detection
at the link level. It checks for transmission errors in received frames using error-checking
mechanisms like CRC (Cyclic Redundancy Check). If errors are detected, the layer can
request retransmission of the corrupted frames.
3. Flow Control: The Data Link Layer manages the flow of data between devices to avoid
overwhelming the receiving end. It ensures that data is sent at a rate that the receiving
device can handle.
4. Access control :It ensures that only authorized devices can access the network.
Note:
Switch & Bridge are Data Link Layer devices.
Physical Layer
● It deals with the physical transmission of data bits over a physical medium, such as
copper cables, fiber optics, or wireless channels.
● The primary function of the Physical Layer is to establish and maintain a physical link
between network devices and transmit raw binary data as electrical or optical signals.
● It is also responsible for converting the data frames received from the Data-link layer into
data bits of 1’s and 0’s (raw bits)for transmission over the network.
● The physical layer consists of three main components:
■ Transmission media
■ Transceivers
■ Connectors
● Transmission media includes wires, cables, and optical fibers.
● Transceivers convert electrical signals into optical or radio signals.
● Connectors attach transmission media to devices such as
computers,hub,repeaters,modems .
Note:
Hub, Repeater, Modem, and Cables are Physical Layer devices.
Data Format Layer Function
Data Application Layer Applications access network services
Packet Network Layer Adding IP add, Determine the path for data transfer
Raw Bits Physical Layer Transfer raw bits using physical media
TCP/IP Model
OSI model acts as a reference model and is not implemented on the Internet
because of its late invention. The current model being used is the TCP/IP
model.
● TCP/IP was designed and developed by the Department of Defense (DoD) in the
1960s and is based on standard protocols.
● It stands for Transmission Control Protocol/Internet Protocol.
● The TCP/IP model is a concise version of the OSI model. It contains four layers,
unlike the seven layers in the OSI model.
TCP/IP Model
The Link Layer [Network Access Layer]
● A Network Access Layer is the lowest layer of the TCP/IP model.
● A Network Access Layer is the combination of the Physical layer and Data Link
layer defined in the OSI reference model.
● The Link Layer is the lowest layer of the TCP/IP model and handles the physical
transmission of data over the network medium.
● It is responsible for defining hardware-specific details such as MAC (Media Access
Control) addresses for devices, error detection.
● The functions carried out by this layer are encapsulating the IP datagram into frames
transmitted by the network and mapping of IP addresses into physical addresses.
● The protocols used by this layer are ethernet, token ring, FDDI, X.25, frame relay.
The Internet Layer
● An Internet layer is the second layer of the TCP/IP model.
● An Internet layer is also known as the network layer.
● The Internet layer is responsible for Logical Addressing, Routing, and Congestion
Control data packets across different networks.
1. IP (Internet Protocol)
2. ICMP (Internet Control Message Protocol)
3. ARP (Address Resolution Protocol)
1. IP (Internet Protocol) :
★ It is responsible for delivering packets from the source host to the destination host by
looking at the IP addresses in the packet headers.
★ IP has 2 versions: IPv4 and IPv6.
★ IPv4 is the one that most websites are using currently. But IPv6 is growing as the number of
IPv4 addresses is limited in number when compared to the number of users.
2. ICMP (Internet Control Message Protocol):
★ It is encapsulated within IP Packets and is responsible for providing hosts with information
about network conditions or to report errors.
3. ARP (Address Resolution Protocol):
★ Its job is to find the hardware address of a host from a known IP address. ARP has
several types: Reverse ARP, Proxy ARP, Gratuitous ARP, and Inverse ARP.
The Transport Layer
1. The Transport Layer is responsible for managing end-to-end communication and
ensures reliable data delivery between applications running on different devices.
2. It handles the segmentation and reassembly of data, as well as flow control and
error recovery.
3. It The TCP/IP transport layer protocols exchange data receipt acknowledgments and
retransmit missing packets to ensure that packets arrive in order and without error.
4. It ensures that data is delivered in the correct order, without loss or duplication. The
most commonly used protocols at this layer are the
a. Transmission Control Protocol (TCP), which is connection-oriented and
guarantees reliable delivery.
b. User Datagram Protocol (UDP), which offers a connectionless and faster but
less reliable delivery option.
The Application Layer
★ The TCP/IP model does not have session or presentation layers.
★ The Application layer is responsible for supporting end-user applications and their
protocols.
the data over the world wide web. It transfers the data in the form of plain text, audio,
★ SMTP: SMTP stands for Simple mail transfer protocol. The TCP/IP protocol that
supports the e-mail is known as a Simple mail transfer protocol. This protocol is used
★ SNMP: Simple Network Management Protocol is used for managing and monitoring
corresponding IP addresses.
★ RTP: The RTP (Real-time Transport Protocol) for delivering real-time media such as
Assignment Topic