0% found this document useful (0 votes)
42 views47 pages

Computer Communication Networks: ECC 602 AY 2019-20

Here are the answers to the revision questions: 1. Bits are packaged into frames at the data link layer of the OSI model. 2. JPEG operates at the presentation layer. 3. Flow control takes place at the transport layer. 4. The network layer uses physical addresses to route data to destination hosts - False. It uses logical addresses. 5. In the OSI model, the data link layer is the end user's access to the network. - True 6. In a peer-to-peer network, any client computer can also be a server. - True 7. Wireless networking is secure. - False 8. The standard protocol of the Internet is TCP/

Uploaded by

anitasjadhav
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
42 views47 pages

Computer Communication Networks: ECC 602 AY 2019-20

Here are the answers to the revision questions: 1. Bits are packaged into frames at the data link layer of the OSI model. 2. JPEG operates at the presentation layer. 3. Flow control takes place at the transport layer. 4. The network layer uses physical addresses to route data to destination hosts - False. It uses logical addresses. 5. In the OSI model, the data link layer is the end user's access to the network. - True 6. In a peer-to-peer network, any client computer can also be a server. - True 7. Wireless networking is secure. - False 8. The standard protocol of the Internet is TCP/

Uploaded by

anitasjadhav
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 47

Computer Communication

Networks
ECC 602
AY 2019-20
Anita Jadhav
[email protected]
Schedule in this semester
• As per syllabus 4 hrs/week- 80 Marks
paper
• This week 6 hrs lectures 
• One assignments test and one oral
• Innovative method
• Numericals are there but no idea if the
question paper setter knows this !
Reference book
Chapter 1

Introduction
Uses of Computer Networks

• Business Applications
• Home Applications
• Mobile Users
• Social Issues
Business Applications of Networks

A network with two clients and one server.


Business Applications of Networks (2)

The client-server model involves requests and replies.


Home Network Applications

• Access to remote information


• Person-to-person communication
• Interactive entertainment
• Electronic commerce
Home Network Applications (2)

In peer-to-peer system there are no fixed clients and servers.


Home Network Applications (3)

Some forms of e-commerce.


Mobile Network Users

Combinations of wireless networks and mobile computing.


Broadcast Networks

Types of transmission technology


• Broadcast links
• Point-to-point links
Network Hardware

• Local Area Networks


• Metropolitan Area Networks
• Wide Area Networks
• Wireless Networks
• Home Networks
• Internetworks
Broadcast Networks (2)

Classification of interconnected processors by scale.


Local Area Networks

Two broadcast networks


(a) Bus
(b) Ring
Metropolitan Area Networks

A metropolitan area network based on cable TV.


Wide Area Networks

Relation between hosts on LANs and the subnet.


Wide Area Networks (2)

A stream of packets from sender to receiver.


Wireless Networks

Categories of wireless networks:


• System interconnection
• Wireless LANs
• Wireless WANs
Wireless Networks (2)

(a) Bluetooth configuration


(b) Wireless LAN
Wireless Networks (3)

(a) Individual mobile computers


(b) A flying LAN
Home Network Categories
• Computers (desktop PC, PDA, shared peripherals
• Entertainment (TV, DVD, VCR, camera, stereo, MP3)
• Telecomm (telephone, cell phone, intercom, fax)
• Appliances (microwave, fridge, clock, furnace, airco)
• Telemetry (utility meter, burglar alarm, babycam).
• Network hardware comonents
Network Software

• Protocol Hierarchies
• Design Issues for the Layers
• Connection-Oriented and Connectionless Services
• Service Primitives
• The Relationship of Services to Protocols
Network Software
Protocol Hierarchies

Layers, protocols, and interfaces.


Protocol Hierarchies (2)

The philosopher-translator-secretary architecture.


Protocol Hierarchies (3)

Example information flow supporting virtual communication in layer 5.


Design Issues for the Layers

• Addressing
• Error Control
• Flow Control
• Multiplexing
• Routing
Connection-Oriented and Connectionless
Services

Six different types of service.


Service Primitives

Five service primitives for implementing a simple connection-


oriented service.
Service Primitives (2)

Packets sent in a simple client-server interaction on a


connection-oriented network.
Services to Protocols Relationship

The relationship between a service and a protocol.


Reference Models

• The OSI Reference Model


• The TCP/IP Reference Model
• A Comparison of OSI and TCP/IP
• A Critique of the OSI Model and Protocols
• A Critique of the TCP/IP Reference Model
THE PURPOSE OF THE MODEL

• It breaks communication into smaller, simpler parts that are easier to develop.

• It facilitates standardization of network components to allow multiple vendor


development and support
• It allows different types of network hardware and software to communicate
with each other
• It prevents changes in one layer from affecting the other layer so that they can
develop more quickly

33
Tasks involved in sending letter

34
OSI
Referen
ce
Model:
7
Layers

35
Functions of each layer
Reference Models

The OSI
reference
model.
Reference Models (2)

The TCP/IP reference model.


Reference Models (3)

Protocols and networks in the TCP/IP model initially.


Comparing OSI and TCP/IP Models

Concepts central to the OSI model


• Services
• Interfaces
• Protocols
A Critique of the OSI Model and Protocols

Why OSI did not take over the world


• Bad timing
• Bad technology
• Bad implementations
• Bad politics
Bad Timing

The apocalypse of the two elephants.


A Critique of the TCP/IP Reference Model
Problems:
• Service, interface, and protocol not distinguished
• Not a general model
• Host-to-network “layer” not really a layer
• No mention of physical and data link layers
• Minor protocols deeply entrenched, hard to replace
application

Revision
Bits are packaged into frames at which layer of the OSI model?
a) data link
b) transport 
c) physical 
d) presentation 
Revision
Which of the following operate at the presentation layer?
A . MIDI 
B . FTP 
C . SMTP 
D . TFTP  
E . JPEG
Revision
Flow control takes place at which layer?
a)Physical
b)Transport
c)Network
d)MAC sublayer of the data link layer
e)session
Revision
True or False:
1.The network layer uses physical addresses to route data to destination hosts
2.In the OSI model, the data link layer is the end user's access to the network.
3.In a peer-to-peer network, any client computer can also be a server.
4.Wireless networking is secure.
5.The standard protocol of the Internet is TCP/IP.
6.Standards define maximum acceptable performance.

You might also like