Computer Network_Unit_1_Part-1
Computer Network_Unit_1_Part-1
Computer Network
Sharad Singh
Assistant Professor
Computer Science & Engineering
UNIT-1:Data communication Components: Representation of data and its flow Networks, Various Connection
Topology, Protocols and Standards, OSI model, Transmission Media, LAN: Wired LAN, Wireless LANs,
Connecting LAN and Virtual LAN, Techniques for Bandwidth utilization: Multiplexing - Frequency division, Time
division and Wave division, Concepts on spread spectrum.
UNIT-2:Data Link Layer and Medium Access Sub Layer: Error Detection and Error Correction - Fundamentals,
Block coding, Hamming Distance, CRC; Flow Control and Error control protocols - Stop and Wait, Go back – N
ARQ, Selective Repeat ARQ, Sliding Window, Piggybacking, Random Access, Multiple access protocols- Pure
ALOHA, Slotted ALOHA, CSMA/CD, CDMA/CA, high level data link control (HDLC), Point To Point protocol
(PPP).
UNIT-3:Network Layer: Repeater, Hub, Switches, Bridges, Gateways, Switching, Logical addressing – IPV4,
IPV6, Address mapping – ARP, RARP, BOOTP and DHCP–Delivery, Forwarding and Unicast Routing protocols.
UNIT-4: Transport Layer: Process to Process Communication, User Datagram Protocol (UDP), Transmission
Control Protocol (TCP), SCTP Congestion Control; Quality of Service, QoS improving techniques: Leaky Bucket
and Token Bucket algorithm.
UNIT-5 :Application Layer: Domain Name Space (DNS), DDNS, TELNET, EMAIL, File Transfer FTP WWW,
HTTP, SNMP, Bluetooth, Firewalls, Basic concepts of Cryptography, Digital Signature.
Course Outcome:
Assessment Tool (s) to be used to
Mapping of Mapping of Module PO-Addressed by
CO# CO Description attain
BL to CO to CO CO
CO
Explore application layer protocols, cryptography BL3 (Apply), BL4 Examination, Assignment, Tutorial,
CO-5 (Analyze)
Module 5 PO1, PO2, PO6
basics, and security mechanisms like firewalls. Quiz
Data Communication:
Data communications are the exchange of data between two devices via
some form of transmission medium such as a wire cable.
Delivery. The system must deliver data to the correct destination. Data must
be received by the intended device or user and only by that device or user.
Accuracy. The system must deliver the data accurately. Data that have been
altered in transmission and left uncorrected are unusable.
Effectiveness of Communication :
Timeliness: The system must deliver data in a timely manner. Data delivered
late are useless. In the case of video and audio, timely delivery means delivering
data as they are produced, in the same order that they are produced, and without
significant delay.This kind of delivery is called real-time transmission
Effectiveness of Communication :
Jitter: Jitter refers to the variation in the packet arrival time. It is the uneven
delay in the delivery of audio or video packets. For example, let us assume that
video packets are sent every 3D ms. If some of the packets arrive with 3D-ms
delay and others with 4D-ms delay, an uneven quality in the video is the result.
Data Communication Component :
.
Data Communication Component :
Sender: The sender is the device that sends the data message. It can be a
computer, workstation, telephone handset, video camera, and so on.
Receiver: The receiver is the device that receives the message. It can be a
computer, workstation, telephone handset, television, and so on.
Data Communication Component :
Today, the prevalent coding system is called Unicode, which uses 32 bits to
represent a symbol or character used in any language in the world. The
American Standard Code for Information Interchange (ASCII), developed
some decades ago in the United States, now constitutes the first 127
characters in Unicode and is also referred to as Basic Latin. Appendix A
includes part of the Unicode.
Data Representation :
Images: Images are also represented by bit patterns. In its simplest form, an
image is composed of a matrix of pixels (picture elements), where each pixel is
a small dot. The size of the pixel depends on the resolution. For example, an
image can be divided into 1000 pixels or 10,000 pixels. In the second case,
there is a better representation of the image (better resolution), but more
memory is needed to store the image
Data Representation :
Both stations can transmit and receive simultaneously (see Figure 1.2c).
The full-duplex mode is like a two-way street with traffic flowing in both
directions at the same time.
One common example of full-duplex communication is the telephone
network. When two people are communicating by a telephone line, both
can talk and listen at the same time.
Categories of topology:
Mesh Topology:
The main disadvantages of a mesh are related to the amount of cabling and
the number of I/O ports required.
First, because every device must be connected to every other device,
installation and reconnection are difficult.
Second, the sheer bulk of the wiring can be greater than the available space
(in walls, ceilings, or floors) can accommodate.
Disadvantage of Mesh topology:
Finally, the hardware required to connect each link (I/O ports and cable)
can be prohibitively expensive.
For these reasons a mesh topology is usually implemented in a limited
fashion, for example, as a backbone connecting the main computers of a
hybrid network that can include several other topologies.
Mesh Topology:
A star topology is less expensive than a mesh topology. In a star, each device
needs only one link and one I/O port to connect it to any number of others.
This factor also makes it easy to install and reconfigure.
For less cabling needs to be housed, and additions, moves, and deletions
involve only one connection: between that device and the hub.
Star Topology :
Star Topology :
Other advantages include robustness. If one link fails, only that link is
affected. All other links remain active. This factor also lends itself to easy
fault identification and fault isolation. As long as the hub is working, it can
be used to monitor link problems and bypass defective links.
Star Topology Disadvantage:
Nodes are connected to the bus cable by drop lines and taps. A drop line
is a connection running between the device and the main cable.
A tap is a connector that either splices into the main cable or punctures
the sheathing of a cable to create a contact with the metallic core.
As a signal travels along the backbone, some of its energy is
transformed into heat. Therefore, it becomes weaker and weaker as it
travels farther and farther
Bus Topology:
For this reason, there is a limit on the number of taps a bus can support and,
on the distance, between those taps.
Advantage of Bus Topology:
OSI consists of seven layers, and each layer performs a particular network
function.
OSI Model:
OSI model was developed by the International Organization for
Standardization (ISO) in 1984, and it is now considered as an architectural
model for the inter-computer communications.
The lower layer of the OSI model deals with the data transport issues. The data
link layer and the physical layer are implemented in hardware and software. The
physical layer is the lowest layer of the OSI model and is closest to the physical
medium. The physical layer is mainly responsible for placing the information on
the physical medium.
Layers of OSI Model:
There are the seven OSI layers. Each layer has different functions. A list of
seven layers are given below:
Physical Layer
Data-Link Layer
Network Layer
Transport Layer
Session Layer
Presentation Layer
Application Layer
Layers of OSI Model:
Physical Layer:
Functionality Physical Layer:
The main functionality of the physical layer is to transmit the individual bits
from one node to another node.
It is the lowest layer of the OSI model.
It establishes, maintains and deactivates the physical connection.
It specifies the mechanical, electrical and procedural network interface
specifications.
Function Physical Layer:
Line Configuration: It defines the way how two or more devices can be
connected physically.
Data Transmission: It defines the transmission mode whether it is simplex,
half-duplex or full-duplex mode between the two devices on the network.
Topology: It defines the way how network devices are arranged.
Signals: It determines the type of the signal used for transmitting the
information.
Data-Link Layer
Data-Link Layer:
This layer is responsible for the error-free transfer of data frames. It
defines the format of the data on the network.
It provides a reliable and efficient communication between two or more
devices.
It is mainly responsible for the unique identification of each device that
resides on a local network.
Data-Link Layer:
It contains two sub-layers:
1.Logical Link Control Layer:
It is responsible for transferring the packets to the Network layer of the
receiver that is receiving.
It identifies the address of the network layer protocol from the header.
It also provides flow control.
Data-Link Layer:
Media Access Control Layer:
A Media access control layer is a link between the Logical Link Control
layer and the network's physical layer.
It is used for transferring the packets over the network.
Functions of the Data-link layer
Framing: The data link layer translates the physical's raw bit stream into
packets known as Frames. The Data link layer adds the header and trailer to
the frame. The header which is added to the frame contains the hardware
destination and source address.
Functions of the Data-link layer
Framing: The data link layer translates the physical's raw bit stream into
packets known as Frames. The Data link layer adds the header and trailer to
the frame. The header which is added to the frame contains the hardware
destination and source address.
Functions of the Data-link layer
Physical Addressing: The Data link layer adds a header to the frame that
contains a destination address. The frame is transmitted to the destination
address mentioned in the header.
Functions of the Data-link layer
Flow Control: Flow control is the main functionality of the Data-link layer. It
is the technique through which the constant data rate is maintained on both the
sides so that no data get corrupted. It ensures that the transmitting station such
as a server with higher processing speed does not exceed the receiving station,
with lower processing speed.
Functions of the Data-link layer
Error Control: Error control is achieved by adding a calculated value CRC
(Cyclic Redundancy Check) that is placed to the Data link layer's trailer which
is added to the message frame before it is sent to the physical layer. If any
error seems to occurr, then the receiver sends the acknowledgment for the
retransmission of the corrupted frames.
Functions of the Data-link layer
Access Control: When two or more devices are connected to the same
communication channel, then the data link layer protocols are used to
determine which device has control over the link at a given time.
Network Layer:
Network Layer:
It is a layer 3 that manages device addressing, tracks the location of devices on the
network.
It determines the best path to move data from source to the destination based on the
network conditions, the priority of service, and other factors.
The Data link layer is responsible for routing and forwarding the packets.
Routers are the layer 3 devices, they are specified in this layer and used to provide the
routing services within an internetwork.
The protocols used to route the network traffic are known as Network layer protocols.
Examples of protocols are IP and Ipv6.
Network Layer:
Routers are the layer 3 devices, they are specified in this layer and used to
provide the routing services within an internetwork.
The protocols used to route the network traffic are known as Network layer
protocols. Examples of protocols are IP and Ipv6.
Function of Network Layer:
Addressing: A Network layer adds the source and destination address to the
header of the frame. Addressing is used to identify the device on the internet.
Function of Network Layer: