0% found this document useful (0 votes)
129 views24 pages

Computer Networks: Third Year CSE

Ethernet, Token Ring, Fiber Distributed Data Interface (FDDI)

Uploaded by

S J
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
129 views24 pages

Computer Networks: Third Year CSE

Ethernet, Token Ring, Fiber Distributed Data Interface (FDDI)

Uploaded by

S J
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 24

Computer Networks

Third Year CSE


Why Study Computer Networks?

• Will it be a stairway to
wealth?

• Can get a good-paying


job. Lot of job
opportunities!

06/30/2022 Manisha Y. Joshi 2


Quiz
• What is the first thing you do when you wake
up in the morning?
A. Check email
B. Check SMS
C. Check Facebook
D. Check whatsApp

06/30/2022 Manisha Y. Joshi 3


Quiz
• Guess the approximate number of emails that
are sent per day?
A. 100 million
B. 1 billion
C. 100 billion
D. 300 billion

06/30/2022 Manisha Y. Joshi 4


• Ans D
• 300 billion

06/30/2022 Manisha Y. Joshi 5


Usage : personal level

• Wake-Up: Email
• •Breakfast: Web Browsing, Social Networks

• •During Day: More browsing, video-conferencing

• •Night: Video-on-demand, Online banking/shopping


• •Before bed: Online gaming

06/30/2022 Manisha Y. Joshi 6


Usage: Business Level

• Make data, programs and equipment available


irrespective of physical location
• –Customer/Employee records, inventory, financial
statements etc
• –Custom software, Security software etc
• –Share printers, scanners
• •E-commerce based companies (Amazon, EBay,
Flipkart etc)
06/30/2022 Manisha Y. Joshi 7
Impact

• As of 2010
• •2B (billion) Internet users
• •294B emails sent per day
• •255M (million) websites
• •2B videos watched per day at YouTube
• •600M Facebook users

• As of 2013: 1B YouTube users (15% earth population)


• [Ref: http://mashable.com/2011/01/25/internet-size-
infographic/]

06/30/2022 Manisha Y. Joshi 8


Job Opportunities

• Deploy, maintain and debug


– –Network administrators, network technicians,
field engineers, network analysts
• •Design better networking technology,
protocols and applications
– –Network programmers, research scientists,
professors

06/30/2022 Manisha Y. Joshi 9


Course objectives
• To understand the basic concept of computer network .
• To study theory and practical implementations of
• Network layer protocols
– Internet protocol
– ICMP
– IGMP
• Transport layer protocols
– TCP
– UDP
• Application layer protocols
– DNS
– SMPT
– HTTP
– FTP
– etc
Syllabus
BTCOC602 Computer Networks
[Unit 1] 6 Hrs
• Introduction: Applications of computer networks, Network hardware,
Network software:
• Protocol Hierarchy, Design Issue, connection oriented vs. connectionless,
Service Primitives, Reference models: OSI and TCP/IP, Example networks:
Internet, Network standardization, Performance: Bandwidth and Latency,
Delay and bandwidth product, High-Speed Network, Application
Performance Needs.
[Unit 2] 6 Hrs
• LAN Technologies: X.25, Frame relay, ATM, Ethernet (802.3), FDDI, Token
Rings, Resilient Packet Rings, Wireless LANs: Wi-Fi (802.11), Cell Phone
Technologies, Broadband
• Wireless: Wi-MAX (802.16), Bluetooth (802.15.1), RFID.
[Unit 3] 6 Hrs
• Data Link Layer: Data Link Layer Design Issues: Service provided to network layer
Framing, Error Control, Flow Control, Error Detection and Correction: error correcting
codes, error detecting codes.
[Unit 4] 6 Hrs
• Network Layer and Congestion Control: IPv4/IPv 6, Routers and Routing Algorithms
distance vector link state. TCP UDP and sockets.
• Congestion Control and QOS: General principles, Congestion prevention policies,
Load shading, Jitter control, Quality of service: Packet scheduling, Traffic shaping,
integrated Services.
[Unit 5] 6 Hrs
• Application Layer Protocols: DNS, SMTP, POP, FTP, HTTP.
[Unit 6] 6 Hrs
• Network Security: Authentication, Basics of public key and private key cryptography,
digital signatures and certificates, firewalls.
• Reference Books:
• 1. S. Keshav, An Engineering Approach to Computer Networking, Addison-Wesley
• Professional, 1st Edition, 1997.
• 2. D. Comer, Computer Networks and Internet, Pearson Education, 6th Edition, 2014.
• 3. M. Gallo, W. Hancock, Computer Communications and Networking Technologies,
• Brooks/Cole Publisher, 2001.
• 4. Natalia Olifer, Victor Olifer, Computer Networks: Principles, Technologies and Protocols
• for Network Design, Wiley Publication, 2005.
• Text Books:
• 1. Tanenbaum, Computer Networks, PHI Publication, 5th Edition, 2011.
• 2. B. Forouzan, Data Communications and Networking, McGraw Hill Publication, 5th
• Edition, 2013.
• 3. Larry Peterson and Bruce Davie, Computer Networks: A Systems Approach, Morgan
• Kufman Publication, 5th Edition, 2012.
• 24
Type of network
• Packet switching
– Two processes are connected. i.e. two computers
or devices along with processes are connected.
– Ex computer network, Internet.
• Circuit switching
– Two devices are connected to share the
information signal i. e. voice, video etc
– Ex. Telephone network
– Processes are not connected
06/30/2022 Manisha Y. Joshi 14
points to cover today
• Goals of computer network
• Need for layered Architecture
• OSI structure
• TCP/IP suit
Goals of computer Network
• To make all programs, equipment, and especially
data available to anyone on the network without
regard to the physical location of the resource and
the user.
• To set up a computer network has to do with
people rather than information or even computers
• To do business electronically.
• To starting to become more important is doing
business with consumers over the Internet
Need for layered architecture
• To reduce their design complexity,
• a stack of layers or levels, each one built upon
the one below it.
• The purpose of each layer is to offer certain
services to the higher layers, shielding those
layers from the details of how the offered
services are actually implemented.
• In a sense, each layer is a kind of virtual machine,
offering certain services to the layer above it.
OSI((Open Systems Interconnection)
reference model
TCP/IP
OSI vs TCP/IP
OSI vs TCP/IP
Questions
• What are two reasons for using layered
protocols?
• Which of the OSI layers handles each of the
following:
• (a) Dividing the transmitted bit stream into
frames.
• (b) Determining which route through the
subnet to use.

06/30/2022 Manisha Y. Joshi 23


Multiple Access
 Broadcast link used in LAN consists of multiple sending and
receiving nodes connected to or use a single shared link

Broadcast links Examples

You might also like