Unit 1
Unit 1
SCHOOL OF COMPUTING
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
FUNDAMENTALS OF COMPUTER NETWORKS
10211CS130
SUBJECT CORE
2
School of Computing - CSE
3
School of Computing - CSE
4
School of Computing - CSE
5
School of Computing - CSE
Exchange of data between two devices via some forms of transmission medium(such as wire
cable) is Data Communications.
For data communications to occur, the communicating devices must be part of a communication
system made of a combination of hardware and software.
1.Sender
2.Receiver
3.Message
4.Tramsmission Medium
5. Protocol
1.Message - It is the information to be communicated. Popular
School of Computing - CSE
8
2. Sender - It is the device which sends the data messages. It can be a computer,
workstation, telephone handset etc.
A network is a combination of hardware and software that sends data from one
location to another
Hardware : The hardware consists of the physical equipment that carries signals
from one point of the network to another.
Software : The software consists of instruction sets that make possible the
services that we expect from a network.
10
School of Computing - CSE
11
School of Computing - CSE
Layered Tasks
OSI Model
TCP / IP Model
Addressing
12
Layered Tasks School of Computing - CSE
Example :
What is ISO ?
What is OSI ?
An ISO standard that covers all aspects of network communications is the Open
Systems Interconnection (OSI) model. It was first introduced in the late 1970s.
Layered Architecture
15
School of Computing - CSE
APPLICATION LAYER
PRESENTATION LAYER
SESSION LAYER
TRANSPORT LAYER
NETWORK LAYER
PHYSICAL LAYER
16
PHYSICAL LAYER School of Computing - CSE
17
This layer includes the physical equipment involved in the data transfer, such as the
cables and switches.
This is also the layer where the data gets converted into a bit stream, which is a string
of 1s and 0s.
The physical layer of both devices must also agree on a signal convention so that the
1s can be distinguished from the 0s on both devices.
18
School of Computing - CSE
The physical layer is responsible for movements of individual bits from one
hop (node) to the next
Data link layer 19
School of Computing - CSE
The data link layer is very similar to the network layer, except the data link
layer facilitates data transfer between two devices on the SAME network.
The data link layer takes packets from the network layer and breaks them
into smaller pieces called frames.
Like the network layer, the data link layer is also responsible for flow
control and error control in intra-network communication (The transport
layer only does flow control and error control for inter-network
communications).
20
School of Computing - CSE
The data link layer is responsible for moving frames from one hop (node) to the
next
Hop-to-hop delivery 21
School of Computing - CSE
Network layer 22
School of Computing - CSE
The network layer is responsible for facilitating data transfer between two different
networks.
If the two devices communicating are on the same network, then the network layer
is unnecessary.
The network layer breaks up segments from the transport layer into smaller units,
called packets, on the sender’s device, and reassembling these packets on the
receiving device.
The network layer also finds the best physical path for the data to reach its
destination; this is known as routing.
23
School of Computing - CSE
The network layer is responsible for the delivery of individual packets from
the source host to the destination host
Source-to-destination delivery 24
School of Computing - CSE
Transport layer 25
School of Computing - CSE
Layer 4 is responsible for end-to-end communication between the two devices. This
includes taking data from the session layer and breaking it up into chunks called
segments before sending it to layer 3.
The transport layer on the receiving device is responsible for reassembling the
segments into data - the session layer can consume.
The transport layer is also responsible for flow control and error control.
Flow control determines an optimal speed of transmission to ensure that a sender
with a fast connection doesn’t overwhelm a receiver with a slow connection.
The transport layer performs error control on the receiving end by ensuring that the
data received is complete, and requesting a retransmission if it isn’t.
26
School of Computing - CSE
The transport layer is responsible for the delivery of a message from one
process to another process.
Reliable process-to-process delivery of a message
School of Computing - CSE
27
Session layer 28
School of Computing - CSE
This is the layer responsible for opening and closing communication between the two
devices.
The time between when the communication is opened and closed is known as the
session.
The session layer ensures that the session stays open long enough to transfer all the
data being exchanged, and then promptly closes the session in order to avoid wasting
resources.
The session layer also synchronizes data transfer with checkpoints.
29
School of Computing - CSE
This layer is primarily responsible for preparing data so that it can be used by the
application layer; in other words, layer 6 makes the data presentable for
applications to consume.
The presentation layer is responsible for translation, encryption, and compression
of data.
Two communicating devices communicating may be using different encoding
methods, so layer 6 is responsible for translating incoming data into a syntax that
the application layer of the receiving device can understand.
31
School of Computing - CSE
This is the only layer that directly interacts with data from the user. Software
applications like web browsers and email clients rely on the application layer to
initiate communications.
But it should be made clear that client software applications are not part of the
application layer; rather the application layer is responsible for the protocols and
data manipulation that the software relies on to present meaningful data to the user.
Application layer protocols include HTTP as well as SMTP (Simple Mail Transfer
Protocol is one of the protocols that enables email communications).
34
School of Computing - CSE
The original TCP/IP protocol suite was defined as having four layers : host-to-
network, network(internet), transport and application
The layers in the TCP/IP protocol suite do not exactly match those in the OSI 37
model.
School of Computing - CSE
However, when TCP/IP is compared to OSI, we can say that the TCP/IP protocol
suite is made of five layers: physical, data link, network, transport, and application
ADDRESSING 38
School of Computing - CSE
Four levels of addresses are used in an internet employing the TCP/IP protocols:
physical, logical, port, and specific
Relationship of layers and addresses in TCP/IP (Internet Model)
39
School of Computing - CSE
Physical Address 40
School of Computing - CSE
The physical address, also known as the link address, is the address of the node as
In Figure below a node with physical address 10 sends a frame to a node with physical
address 87. The two nodes are connected by a link (bus topology LAN). As the figure
shows, the computer with physical address 10 is the sender, and the computer with
physical address 87 is the receiver.
Logical Address 42
School of Computing - CSE
A logical address in the Internet is currently 32-bit address that can uniquely define
a host connected to the Internet.
No two publicly addressed and visible hosts on the Internet can have the same IP
address.
Example
Figure in the next slide shows a part of an internet with two routers connecting three
LANs. Each device (computer or router) has a pair of addresses (logical and physical)
for each connection. In this case, each computer is connected to only one link and
therefore has only one pair of addresses. Each router, however, is connected to three
networks (only two are shown in the figure). So each router has three pairs of
addresses, one for each connection.
43
School of Computing - CSE
Port Address 44
School of Computing - CSE
Example
Figure in the next slide shows two computers communicating via the Internet. The
sending computer is running three processes at this time with port addresses a, b,
and c. The receiving computer is running two processes at this time with port
addresses j and k. Process a in the sending computer needs to communicate with
process j in the receiving computer. Note that although physical addresses change
from hop to hop, logical and port addresses remain the same from the source to
destination.
45
School of Computing - CSE
TOPOLOGY School of Computing - CSE
46
Topology defines the structure of the network of how all the components are interconnected to each
other.
https://www.tutorialspoint.com/data_communication_computer_network/computer_network_topologies.htm
Transmission Media School of Computing - CSE
47
48
School of Computing - CSE
https://www.javatpoint.com/transmission-media
TRANSMISSION IMPAIRMENT
49
School of Computing - CSE
This means that the signal at the beginning of the medium is not the same as the
Attenuation
Amplitude Distortion
Delay Distortion
Noise
Based on Size(Strength –
Volume):
PAN
LAN
MAN
WAN
Based on Connectivity:
Wired
Wireless
Infrastructure Based
Infrastructure-less
(Adhoc)
WIRED LAN School of Computing - CSE
56
57
School of Computing - CSE
58
School of Computing - CSE
What Is Ethernet?
If two or more connected devices on a shared network attempt to transmit data
packets at the same time, a packet collision occurs. Ethernet technology provides
rules that allow network-connected devices to talk to one another without packet
collisions.
59
Ethernet was designed to solve the problem of packet collision. ItSchoolprovides network
of Computing - CSE
devices
with a set of rules that essentially says: "Make sure no one else is talking before you talk. If you
hear someone talking while you're talking, stop, listen, and wait for the talking to end before you
talk again.“
Ethernet is commonly associated with connected devices in a wired LAN or WAN. Using a
wired Ethernet cable, devices are connected to an Ethernet switch. Ethernet has the ability to
use both wired and fiber cables
More formally, Ethernet is a common name for the IEEE 802.3 standard based on the
Carrier Sense Multiple Access/Collision Detection (CSMA/CD) protocol. CSMA/CD
defines when to transmit and what is to happen if a collision is detected, as well as
endpoint addressing, transmission speeds, and media.
Ethernet has evolved dramatically since its first application. Today it's the de facto
protocol for IP-based networks
A token-ring network is a local area network (LAN) topology that sends data in one direction60
School of Computing - CSE
throughout a specified number of locations by using a token.
The token is the symbol of authority for control of the transmission line. This token allows any
sending station in the network (ring) to send data when the token arrives at that location.
Stations in a token-ring network are physically connected, typically in a star-wired ring topology,
to a wiring concentrator such as the IBM® 8228 Multistation Access Unit. The concentrator
serves as a logical ring around which data is transmitted at 4 million, 16 million, or 100 million
bits per second (Mbps). Each station is connected to the concentrator typically by shielded
twisted pair (STP) cabling.
Connecting Devices 61
School of Computing - CSE
A router is a device that connects two or more
packet-switched networks or subnetworks. It
serves two primary functions: managing traffic
between these networks by forwarding data
packets to their intended IP addresses, and
allowing multiple devices to use the same Internet
connection.
https://www.tutorialspoint.com/what-are-network-connecting-devices
Switching Techniques 62
School of Computing - CSE
https://www.javatpoint.com/computer-network-switching-techniques
Circuit Switching 63
School of Computing - CSE
Circuit Switching
Communication through circuit switching has 3 phases:
• Circuit establishment
• Data transfer
• Circuit Disconnect
65
Below, we will discuss the various metrics for ascertaining the performance quality of any network.
Metrics
1. Bandwidth
This is one of the network performance metrics that is measured in Hertz or bit per second.
Bandwidth explains the amount of data transmitted through a network in a given amount of time.
For example, let us consider the bandwidth of a subscriber telephone line as 4 kHz.
while bit per second is used to classify signals transmitted in digital format.
For example, we can say the bandwidth of a Fast Ethernet network is a maximum of 100 Mbps, which means
that the network can send 100 Mbps of data.
2. Throughput
69
School of Computing - CSE
Throughput refers to the particular amount of deliverable or service produced at the production end and
successfully delivered at the receiving end.
In-network relates to the amount of data transmitted successfully through a network bandwidth.
**We can say that a throughput exists within a network bandwidth, so throughput cannot exceed a network
bandwidth but can be less than network bandwidth**
A network with bandwidth of 10 Mbps can pass only an average of 12, 000 frames per minute
where each frame carries an average of 10, 000 bits. What will be the throughput for this
network?
Latency in-network is said to be the lag time for message delivery in a network. It explains how long it
takes for a message that leaves the sender end to arrive at the receiver end along with a network. If it takes
longer for a message to be delivered along with a network, we can say a network has more latency, the
lesser time it takes we can say the network has less latency.
Transmission Time is a time based on how long it takes to send the signal
down the transmission line.
Transmission time = Message size / Bandwidth
Queuing time is a time based on how long the packet has to sit around in the
router. Quite frequently the wire is busy, so we are not able to transmit a packet
immediately.
Processing delay is the delay based on how long it takes the router to figure out
where to send the packet.
4. Jitter
72
School of Computing - CSE
A jitter is a form of latency. It is experienced when a delay variation is caused by the delay of specific data
packets sent through a network.
For instance, when we send audio data, video data, and image data through a network, the video and audio
data may encounter latency along their transmission path. In this case, the receiving end would experience
jitter because the video data is time-sensitive and needs no latency or delay for the successful transmission of
data. This is the same with the audio data. But, when downloading a file, jitter is hardly a concern, as the data
here is not time-sensitive, and the receiving end can receive the data whenever its download is complete.
5. Packet loss
Packet loss is used to categorize the amount of data packets sent from the sender end that did not arrive at
the receiver end. This metric can be measured by identifying the number of data packets that left the sender
end and calculating the amount of data that arrived at the receiver end. Now, we can know the number of data
packets lost along the transmission process.
6. Bandwidth-delay product 73
School of Computing - CSE
The bandwidth-delay product is a performance metric that helps to capture lost data packets during
transmission. It is a performance metric that ascertains buffering needs of a network system. This would help in
capturing the lost data packets during the transmission of data along a network path.
It indicates number of bits (or bytes) which can be transmitted before an ACK (acknowledgement) is
received from the other end. In other words, it is estimation of number of bits "in transit" through the
transmission medium.
74
School of Computing - CSE
Any Queries ….