CN UNIT-I PPT
CN UNIT-I PPT
CN UNIT-I PPT
Lavanya
Design: Assistant Professor
Subject : Computer Networks
Class: III-I CSE
1
COMPUTER NETWORKS - ()
Prerequisites
2
COMPUTER NETWORKS - ()
Course Objectives
1. The objective of the course is to equip the students with a
general overview of the concepts and fundamentals of
computer networks.
2. Familiarize the students with the standard models for the
layered approach to communication between machines in a
network and the protocols of the various layers.
Course Outcomes
1. Gain the knowledge of the basic computer network
technology.
2. Gain the knowledge of the functions of each layer in the OSI
and TCP/IP reference model.
3. Obtain the skills of subnetting and routing mechanisms.
4. Familiarity with the essential protocols of computer
networks, and how they can be applied in network design
and implementation.
3
COMPUTER NETWORKS - () - SYLLABUS
UNIT - I
Introduction: Network hardware, Network software, OSI, TCP/IP
Reference models, Example Networks: ARPANET, Internet.
Physical Layer: Guided Transmission media: twisted pairs, coaxial
cable, fiber optics, Wireless transmission.
UNIT - II
Data link layer: Design issues, framing, Error detection and correction.
Elementary data link protocols: simplex protocol, A simplex stop and
wait protocol for an error-free channel, A simplex stop and wait
protocol for noisy channel.
Sliding Window protocols: A one-bit sliding window protocol, A protocol
using Go-Back-N, A protocol using Selective Repeat, Example data
link protocols.
Medium Access sub layer: The channel allocation problem, Multiple
access protocols: ALOHA, Carrier sense multiple access protocols,
collision free protocols. Wireless LANs, Data link layer switching.
4
COMPUTER NETWORKS - () - SYLLABUS
UNIT - III
Network Layer: Design issues, Routing algorithms: shortest path
routing, Flooding, Hierarchical routing, Broadcast, Multicast,
distance vector routing, Congestion Control Algorithms, Quality
of Service, Internetworking, The Network layer in the internet.
UNIT - IV
Transport Layer: Transport Services, Elements of Transport
protocols, Connection management, TCP and UDP protocols.
UNIT - V
Application Layer : Domain name system, SNMP, Electronic Mail;
the World WEB, HTTP, Streaming audio and video.
5
COMPUTER NETWORKS - (CS503PC) - SYLLABUS
TEXT BOOK:
Computer Networks -- Andrew S Tanenbaum, David. j.
Wetherall, 5th Edition. Pearson Education/PHI
REFERENCE BOOKS:
An Engineering Approach to Computer Networks-S. Keshav,
2 nd Edition, Pearson Education
Data Communications and Networking – Behrouz A.
Forouzan. Third Edition TMH.
6
UNIT-I INTRODUCTION
8
UNIT-I INTRODUCTION
9
UNIT-I INTRODUCTION
Message: It is the data or information which needs to be transferred from one
device to another device over a computer network.
Sender: Sender is the device that has the data and needs to send the data to other
device connected to the network.
Receiver: A receiver is the device which is expecting the data from other device on
the network.
Transmission media: In order to transfer data from one device to another device
we need a transmission media such as wires, cables, radio waves etc.
Protocol: A protocol is a set of rules that are agreed by both sender and receiver,
without a protocol two devices can be connected to each other but they cannot
communicate. In order to establish a reliable communication or data sharing
between two different devices we need set of rules that are called protocol. For
example, http and https are the two protocols used by web browsers to get and post
the data to internet, similarly smtp protocol is used by email services connected to
the internet.
10
COMPONENTS OF COMPUTER NETWORKS
1.Nodes
2.Media
3.Services
11
END DEVICES NODES INTERMEDIARY NODES
Computers Switches
printer Routers
VoIP phone Bridges
Security cameras Hubs
Mobile hand held devices Repeaters
12
MEDIA
Wired medium
Wireless medium
13
Features of a Computer Network
Backup: A computer network must have a central server that keeps the
backup of all the data that is to be shared over a network so that in case of a
failure it should be able to recover the data faster.
15
FAULT TOLERANCE
Ablity to
1.Continue Working Despite Failures
2.Ensure no loss of Service.
16
QUALITY OF SERVICE
The Ability to
1.Grow based on the needs
2.Have good Performance after growth
17
18
19
UNIT-I INTRODUCTION
Applications of Computer Network
Major application computer networks are:
1. Business application
2. Home application
3. Mobile application
1. Business Applications:
Now a days computers are being used in almost all business
processes. For example , use of computers to production ,inventories,
to make payments etc.
20
UNIT-I INTRODUCTION
Applications of Computer Network: Business Applications
Database Resource
The database is maintained by dedicated servers and clients(users)
can access the data. Servers can provide the services to many
clients.
21
UNIT-I INTRODUCTION
Applications of Computer Network: Business Applications
Communication takes the form of the client process sending a
message over the network to the server process. The client process
then waits for a reply message. When the server process gets the
request, it performs the requested work or looks up the requested
data and sends back a reply.
22
UNIT-I INTRODUCTION
Applications of Computer Network: Business Applications
Communication medium
Computer network is a powerful medium for commutation. E-mail is
very popularly used in many company employees. Video conference is
also other form of computer assisted commutation.
Electronic Commerce
Many companies doing business electronically with suppliers and
customers can place order electrically, this assure fast delivery and
efficient services
23
UNIT-I INTRODUCTION
Applications of Computer Network: Home Applications
Now a days use of computers in home is widespread . Popular use of
computers in home are as under
1. Internet Access
2. Personal Communication
3. Entertainment
4. E-Commerce
Internet Access: Information on every field as available on internet
such as Science , Technology, business, government, health, travel
etc.
Personal Communication: E-Mail , instant messaging, chatting,
internet telephony, video phones provide personal communication by
using Internet.
24
UNIT-I INTRODUCTION
Applications of Computer Network: Home Applications
25
UNIT-I INTRODUCTION
Applications of Computer Network: Mobile Applications
26
UNIT-I NETWORK HARDWARE
The applications and social aspects of
networking to the technical issues involved in
network design.
Computer networks consists two important
factors: Transmission Technology and Scale.
There are two types of transmission technology
1. Broadcast links
2. Point-to-Point links.
27
UNIT-I NETWORK HARDWARE
Distance is important as a classification metric
because different technologies are used at
different scales.
Broadcast Systems it allows the possibility of
addressing a packet to all destinations by using a
address field. When a packet with this code is
transmitted, it is received and processed by on
every machine on the network. This mode of
operation is called Broadcasting.
Some broadcast systems also support
transmission to a subset of the machines, which
known as Multicasting. 28
UNIT-I NETWORK HARDWARE
29
UNIT-I NETWORK HARDWARE
Based on scale they can be divided into
31
UNIT-I NETWORK HARDWARE
Personal Area Network
Personal Area Network is a network arranged
within an individual person, typically within a
range of 1meters.
Personal Area Network is used for connecting the
computer devices of personal use is known as
Personal Area Network.
Personal computer devices that are used to
develop the personal area network are the laptop,
mobile phones, media player and play stations.
32
UNIT-I NETWORK HARDWARE
Personal Area Network
PANs (Personal Area Networks) let devices
communicate over the range of a person.
A common example is a wireless network that
connects a computer with its peripherals.
Almost every computer has an attached monitor,
keyboard, mouse, and printer. Without using
wireless, this connection must be done with
cables.
33
UNIT-I NETWORK HARDWARE
Personal Area Network
36
UNIT-I NETWORK HARDWARE
LAN (Local Area Network).
A LAN is a privately owned network that operates within
and nearby a single building like a home, office or
factory.
LANs are widely used to connect personal computers
and consumer electronics to let them share resources
(e.g., printers) and exchange information.
When LANs are used by companies, they are called
enterprise networks.
37
UNIT-I NETWORK HARDWARE
LAN (Local Area Network).
38
UNIT-I NETWORK HARDWARE
MAN(Metropolitan Area Network)
A metropolitan area network is a network that covers
a larger geographic area by interconnecting a
different LAN to form a larger network.
It has a higher range than Local Area Network(LAN).
Government agencies use MAN to connect to the
citizens and private industries.
The most widely used protocols in MAN are RS-232,
Frame Relay, ATM, ISDN, OC-3, ADSL, etc.
The standardized as IEEE 802.16 and is popularly
known as WiMax (world Wide Interoperability for
Microwave Access X)
39
UNIT-I NETWORK HARDWARE
Uses Of Metropolitan Area Network:
MAN is used in communication between the
banks in a city.
It can be used in an Airline Reservation.
40
UNIT-I NETWORK HARDWARE
MAN(Metropolitan Area Network)
A MAN (Metropolitan Area Network) covers a city.
The best-known examples of MANs are the cable
television networks available in many cities.
These systems grew from earlier community
antenna systems used in areas with poor over-
the-air television reception.
In those early systems, a large antenna was
placed on top of a nearby hill and a signal was
then piped to the subscribers’ houses.
41
UNIT-I NETWORK HARDWARE
MAN(Metropolitan Area Network)
42
UNIT-I NETWORK HARDWARE
WAN(Wide Area Network)
A Wide Area Network is a network that extends
over a large geographical area such as states or
countries.
A Wide Area Network is quite bigger network than
the MAN & LAN. Typically within a range of 100k
meters-1000k meters
The Internet is one of the biggest WAN in the
world.
A Wide Area Network is widely used in the field of
Business, government, and education.
43
UNIT-I NETWORK HARDWARE
Advantages Of Wide Area Network:
Geographical area: Suppose if the branch of our
office is in a different city then we can connect with
them through WAN. The Internet provides a leased
line through which we can connect with another
branch.
Centralized data: In case of WAN network, data is
centralized. Therefore, we do not need to buy the
emails, files or back up servers.
Get updated files: Software companies work on the
live server. Therefore, the programmers get the
updated files within seconds.
44
UNIT-I NETWORK HARDWARE
Advantages Of Wide Area Network:
Exchange messages: In a WAN network, messages
are transmitted fast. The web application like
Facebook, Whatsapp, Skype allows you to
communicate with friends.
Global business: We can do the business over the
Internet globally.
High bandwidth: If we use the leased lines for our
company then this gives the high bandwidth. The
high bandwidth increases the data transfer rate
which in turn increases the productivity of our
company.
45
UNIT-I NETWORK HARDWARE
Disadvantages of Wide Area Network:
Security issue: A WAN network has more security
issues as compared to LAN and MAN network as all
the technologies are combined together that creates
the security problem.
Needs Firewall & antivirus software: The data is
transferred on the internet which can be changed or
hacked by the hackers, so the firewall needs to be
used. Some people can inject the virus in our system
so antivirus is needed to protect from such a virus.
High Setup cost: An installation cost of the WAN
network is high as it involves the purchasing of
routers, switches. 46
UNIT-I NETWORK HARDWARE
Internetworks
An Internetwork is defined as two or more
computer network LANs or MAN or WAN, and they
are configured by a local addressing scheme. This
process is known as Internetworking.
48
UNIT-I NETWORK SOFTWARE
Network software used for design,
implementation, operations and monitoring
of computer networks.
One of Software – Defined Networking
(SDN), software is separated from the hardware
thus making it more adaptable to the computer
network.
49
UNIT-I NETWORK SOFTWARE
We will discuss on network software
50
UNIT-I NETWORK SOFTWARE
Functions of Network Software
53
UNIT-I NETWORK SOFTWARE
Layered Architecture
Each lower layer adds its services to the higher
layer to provide a full set of services to manage
communications.
It provides modularity and interfaces, i.e., provides
interaction between subsystems.
Therefore, any modification in a layer will not
affect the other layers.
In a layer n architecture, layer n on one machine
will have a communication with the layer n on
another machine and the rules used in a
conversation are known as a layer-n protocol. 54
UNIT-I NETWORK SOFTWARE
55
Figure: Layered Architecture
UNIT-I NETWORK SOFTWARE
Layered Architecture
The basic elements of layered architecture are
services, protocols, and interfaces.
Service: It is a set of actions that a layer provides to the
higher layer.
Protocol: It defines a set of rules that a layer uses to
exchange the information with peer entity. These rules
mainly concern about both the contents and order of the
messages used.
Interface: It is a way through which the message is
transferred from one layer to another layer.
56
UNIT-I NETWORK SOFTWARE
Protocol Hierarchies
57
UNIT-I NETWORK SOFTWARE
Protocol Hierarchies
A protocol outlines the what, how and when of a
communication.
The three aspects of a protocol are −
Syntax − It defines the format of data that is to be sent
or received.
Semantics − It defines the meaning of each section of
bits that are transferred.
Timings − It defines the time at which data is
transferred as well as the speed at which it is transferred.
58
UNIT-I NETWORK SOFTWARE
Figure 1-13. Layers, protocols, and interfaces.
61
UNIT-I NETWORK SOFTWARE
Protocol Hierarchies
Routing
There may be multiple paths from the source to the
destination. Routing involves choosing an optimal path
among all possible paths. So requires some routing
algorithms.
Security
A major factor of computer networks is to defend it
against threats like eavesdropping(to listen some one
conversations without knowing them) and
surreptitious(something is done secret) alteration of
messages. So here requires authentication techniques.
66
UNIT-I NETWORK SOFTWARE
Connection-Oriented Versus Connectionless Service
Connection-oriented service is related to the telephone
system. It includes the connection establishment and
connection termination. In connection-oriented service,
Handshake method is used to establish the connection
between sender and receiver.
70
UNIT-I NETWORK SOFTWARE
Service Primitives
75
UNIT-I REFERENCE MODELS
In computer networks, reference models
give a conceptual framework that
standardizes communication between
heterogeneous networks.
The two popular reference models are −
1. OSI Model
2. TCP/IP Protocol Suite
76
UNIT-I REFERENCE MODELS
OSI Reference Model
79
UNIT-I NETWORK SOFTWARE
80
UNIT-I REFERENCE MODELS
OSI Reference Model : Characteristics of OSI Model
The lowest layer is the physical layer of the OSI
model and is closest to the physical medium.
The physical layer is mainly responsible for placing
the information on the physical medium.
81
UNIT-I REFERENCE MODELS: OSI REFERENCE MODEL
82
UNIT-I REFERENCE MODELS
OSI Reference Model : Principles of OSI Model
A layer should be created where a different
abstraction is needed.
Each layer should perform a well-defined
function.
The function of each layer should be chosen
standardized protocols.
The layer boundaries should be chosen
information flow across the interfaces.
83
UNIT-I REFERENCE MODELS
OSI Reference Model : Physical Layer
84
UNIT-I REFERENCE MODELS
OSI Reference Model : Physical Layer
The main functionality of the physical layer is to
transmit the individual bits from one node to another
node.
It is the lowest layer of the OSI model.
85
UNIT-I REFERENCE MODELS
OSI Reference Model : Functions of a Physical Layer
Line Configuration: It defines the way how two or more
devices can be connected physically.
Data Transmission: It defines the transmission mode
whether it is simplex, half-duplex or full-duplex mode
between the two devices on the network.
Topology: It defines the way how network devices are
arranged.
Signals: It determines the type of the signal used for
transmitting the information.
86
UNIT-I REFERENCE MODELS
OSI Reference Model : Data Link Layer
87
UNIT-I REFERENCE MODELS
OSI Reference Model : Data Link Layer
This layer is responsible for the error-free transfer
of data frames.
It defines the format of the data on the network.
88
UNIT-I REFERENCE MODELS
OSI Reference Model : Data Link Layer
It contains two sub-layers:
Logical Link Control Layer
1. It is responsible for transferring the packets to the
Network layer of the receiver that is receiving.
2. It identifies the address of the network layer protocol
from the header.
3. It also provides flow control.
Media Access Control Layer
1. A Media access control layer is a link between the
Logical Link Control layer and the network's physical
layer.
2. It is used for transferring the packets over the network.
89
UNIT-I REFERENCE MODELS
OSI Reference Model : Functions of Data Link Layer
Framing: The data link layer translates the
physical's raw bit stream into packets known as
Frames. The Data link layer adds the header and
trailer to the frame. The header which is added to the
frame contains the hardware destination and source
address.
Physical Addressing: The Data link layer adds a
header to the frame that contains a destination
address. The frame is transmitted to the destination
address mentioned in the header. 90
UNIT-I REFERENCE MODELS
OSI Reference Model : Functions of Data Link Layer
Flow Control: Flow control is the main
functionality of the Data-link layer. It is the
technique through which the constant data rate is
maintained on both the sides so that no data get
corrupted.
It ensures that the transmitting station such as a
server with higher processing speed does not exceed
the receiving station, with lower processing speed.
91
UNIT-I REFERENCE MODELS
OSI Reference Model : Functions of Data Link Layer
Error Control: Error control is achieved by adding a
calculated value CRC (Cyclic Redundancy Check) that is
placed to the Data link layer's trailer which is added to the
message frame before it is sent to the physical layer. If any
error seems to occurr, then the receiver sends the
acknowledgment for the retransmission of the corrupted
frames.
Access Control: When two or more devices are connected
to the same communication channel, then the data link layer
protocols are used to determine which device has control
over the link at a given time.
92
UNIT-I REFERENCE MODELS
OSI Reference Model : Network Layer
93
UNIT-I REFERENCE MODELS
OSI Reference Model : Network Layer
Network Layer manages that device addressing,
tracks the location of devices on the network.
It determines the best path to move data from
source to the destination based on the network
conditions, the priority of service, and other
factors.
94
UNIT-I REFERENCE MODELS
OSI Reference Model : Network Layer
The Data link layer is responsible for routing and
forwarding the packets.
Routers are specified in this layer and used to
provide the routing services within an
internetwork.
The protocols used to route the network traffic are
known as Network layer protocols. Examples of
protocols are IPv4 and Ipv6.
95
UNIT-I REFERENCE MODELS
OSI Reference Model : Function of Network Layer
98
UNIT-I REFERENCE MODELS
OSI Reference Model : Transport Layer
99
UNIT-I NETWORK SOFTWARE
100
UNIT-I REFERENCE MODELS
OSI Reference Model : Transport Layer
101
UNIT-I REFERENCE MODELS
OSI Reference Model : Transport Layer
102
UNIT-I REFERENCE MODELS
OSI Reference Model : Transport Layer
Transmission Control Protocol
❖ It is a standard protocol that allows the systems to
communicate over the internet.
❖ When data is sent over the TCP connection, then the TCP
protocol divides the data into smaller units known as
segments.
103
UNIT-I REFERENCE MODELS
OSI Reference Model : Transport Layer
104
UNIT-I REFERENCE MODELS
OSI Reference Model : Transport Layer
107
UNIT-I REFERENCE MODELS
OSI Reference Model : Functions of Transport Layer
Connection control: Transport layer provides two services
Connection-oriented service and connectionless service.
A connectionless service treats each segment as an
individual packet, and they all travel in different routes to
reach the destination.
A connection-oriented service makes a connection with the
transport layer at the destination machine before delivering
the packets.
In connection-oriented service, all the packets travel in the
single route.
108
UNIT-I REFERENCE MODELS
OSI Reference Model : Functions of Transport Layer
110
UNIT-I OSI REFERENCE MODELS
Session Layer
The session layer is responsible for dialog control
and synchronization
It establishes, maintains, and synchronizes the
interaction among communicating systems.
111
UNIT-I OSI REFERENCE MODELS
Session Layer
UNIT-I OSI REFERENCE MODELS
Functions of Session Layer
113
UNIT-I OSI REFERENCE MODELS
Presentation Layer
114
UNIT-I OSI REFERENCE MODELS
Presentation Layer
UNIT-I
UNIT-I OSI Reference
OSI REFERENCE models
MODELS
Functions of Presentation Layer
Translation. The processes (running programs) in two
systems are usually exchanging information in the form of
character strings, numbers, and so on.
Encryption. Encryption means that the sender transforms
the original information to another form and sends the
resulting message out over the network.
Decryption. reverses the original process to transform the
message back to its original form.
Compression &Decompression. Data compression reduces
the number of bits contained in the information and
decompression message back to its original form 116
UNIT-I
UNIT-I OSI Reference
OSI REFERENCE models
MODELS
Application Layer
It provides user interfaces and support for services
such as electronic mail, remote file access and
transfer, shared database management, and other
types of distributed information services.
117
UNIT-I
UNIT-I OSI Reference
OSI REFERENCE models
MODELS
Application Layer
118
UNIT-I
UNIT-I OSI Reference
OSI REFERENCE models
MODELS
Functions of Application Layer
Network virtual terminal. A network virtual
terminal is a software version of a physical terminal,
and it allows a user to log on to a remote host.
File transfer, access, and management. This
application allows a user to access files in a remote
host (to make changes or read data), to retrieve files
from a remote computer for use in the local
computer, and to manage or control files in a remote
computer locally.
119
UNIT-I
UNIT-I OSI Reference
OSI REFERENCE models
MODELS
Functions of Application Layer
120
Summary of OSI layers Reference Model
TCP/IP REFERNCE MODEL
Network Layers
• At the network layer (or, more accurately, the internetwork
layer), TCP/IP supports the Internetworking Protocols.
Such as : ARP, RARP, ICMP, and IGMP.
TCP/IP REFERNCE MODEL
Network Layers
• Internetworking Protocol (IP). It is an unreliable
and connectionless protocol. IP provides no error
checking or tracking. IP transports data in packets
called datagrams.
• Address Resolution Protocol (ARP). It is used to
Map the from logical address to physical address.
ARP is used to find the physical address of the node
when its Internet address is known.
TCP/IP REFERNCE MODEL
Network Layers
• Reverse Address Resolution Protocol (RARP). It
is used to Map the from physical address to logical
address.
• Internet Control Message Protocol (ICMP). It is
a mechanism to sends query and error reporting
messages.
• The Internet Group Message Protocol (IGMP).
It is used to facilitate the simultaneous
transmission of a message to a group of recipients.
TCP/IP REFERNCE MODEL
Transport Layers
• Traditionally the transport layer was represented in
TCP/IP by two protocols: TCP and UDP.
• And additionally added SCTP, has been devised to
meet the needs of some newer applications.
ARPANET
In the 1980s, ARPANET was handed over to a separate new
Military Networks(MNets), the Defense Data
Networks(DDNets), and NSFNet, a network of scientific
and academic computers funded by the National Science
Foundation(NSF).
The software was split into two parts: subnet and host. The
subnet software consisted of the IMP end of the host-IMP
connection, the IMP-IMP protocol, and a source IMP to
destination IMP protocol designed to improve reliability.
Then that original ARPANET design.
135
EXAMPLE NETWORKS : ARPANET
UNIT-I EXAMPLE NETWORKS : ARPANET, INTERNET.
136
EXAMPLE NETWORKS : INTERNET
UNIT-I EXAMPLE NETWORKS : ARPANET, INTERNET.
Internet
The Internet is a collection of different networks
that are use certain common protocols and provide
certain common services.
Different networks are combination of any two
types of networks such as LAN ,MAN & WAN
Common Protocols are TCP & UDP
Common Services are Connection-Oriented and
Connection Less Services
137
UNIT-I(Part-2) : PHYSICAL LAYER
Twisted-pair Cable :
Twisted-Pair Cable is twisted together it consists of
two conductors (normally copper), each with its own
plastic insulation.
Twisted-pair Cable
• One wire is used to carry the signals to the
receiver, and the other wire is used for a ground
reference.
Advantages :
• It is cheap.
• Installation of the unshielded twisted pair is easy.
• It can be used for high-speed LAN.
Disadvantage:
• This cable can only be used for shorter distances because
of attenuation.
UNIT-I : GUIDED TRANSMISSION MEDIA
Shielded Twisted pair
• A shielded twisted pair is a cable that contains the mesh
surrounding the wire that allows the higher transmission
rate.
Characteristics Of Shielded Twisted Pair:
• The cost of the shielded twisted pair cable is not very high
and not very low.
• An installation of STP is easy.
• It has higher capacity as compared to unshielded twisted
pair cable.
• It is shielded that provides the higher data transmission
rate.
UNIT-I : GUIDED TRANSMISSION MEDIA
Shielded Twisted pair
UNIT-I : GUIDED TRANSMISSION MEDIA
Shielded Twisted pair
Disadvantages
• It is more expensive as compared to UTP
• It has a higher attenuation rate.
UNIT-I : GUIDED TRANSMISSION MEDIA
Coaxial Cable
• Coaxial cable is very commonly used transmission
media.
• The coaxial cable contains two conductors parallel
to each other.
• The inner conductor of the coaxial cable is made up
of copper, and the outer conductor is made up of
copper mesh. The middle core is made up of non-
conductive cover that separates the inner conductor
from the outer conductor.
• It has a higher frequency as compared to Twisted
pair cable.
UNIT-I : GUIDED TRANSMISSION MEDIA
Coaxial Cable
UNIT-I : GUIDED TRANSMISSION MEDIA
• Cellular Phones
• Satellite Networks
• Wireless LANs
UNIT-I : WIRELESS TRANSMISSION