Unit 1

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 29

UNIT 1

Introduction to Networks

Dr.M.Kannan
Asst.Prof
MCA-HICAS
INTRODUCTION
• Computer Network is a group of computers
connected with each other through wires, optical
fibres or optical links so that various devices can
interact with each other through a network.
• The aim of the computer network is the sharing
of resources among various devices.
• In the case of computer network technology,
there are several types of networks that vary
from simple to complex level.
Components of Computer Network
1. Network Interface Card.
2. HUB
3. Switches
4. Modem
5. Router
6. Cables and Connecters
Uses Of Computer Network
• Resource sharing: Resource sharing is the sharing of resources such as
programs, printers, and data among the users on the network without
the requirement of the physical location of the resource and user.
• Server-Client model: Computer networking is used in the server-client
model. A server is a central computer used to store the information
and maintained by the system administrator. Clients are the machines
used to access the information stored in the server remotely.
• Communication medium: Computer network behaves as a
communication medium among the users. For example, a company
contains more than one computer has an email system which the
employees use for daily communication.
• E-commerce: Computer network is also important in businesses. We
can do the business over the internet. For example, amazon.com is
doing their business over the internet, i.e., they are doing their
business over the internet.
Computer Network Architecture
• Peer-To-Peer network
Peer-To-Peer network is a network in
which all the computers are linked
together with equal privilege and
responsibilities for processing the data.
Peer-To-Peer network is useful for small
environments, usually up to 10
computers.
Peer-To-Peer network has no dedicated
server.
Special permissions are assigned to each
computer for sharing the resources, but
this can lead to a problem if the computer
with the resource is down.
Computer Network Architecture
• Client/Server Network
The central controller is known as
a server while all other computers in the
network are called clients.
A server performs all the major operations
such as security and network
management.
A server is responsible for managing all
the resources such as files, directories,
printer, etc.
Types of Networks
• LAN(Local Area Network)
• PAN(Personal Area Network)
• MAN(Metropolitan Area Network)
• WAN(Wide Area Network)
LAN(Local Area Network)
Local Area Network is a group of
computers connected to each other in a
small area such as building, office.
LAN is used for connecting two or more
personal computers through a
communication medium such as twisted
pair, coaxial cable, etc.
It is less costly as it is built with
inexpensive hardware such as hubs,
network adapters, and ethernet cables.
The data is transferred at an extremely
faster rate in Local Area Network.
Local Area Network provides higher
security.
PAN(Personal Area Network)
Personal Area Network is a network
arranged within an individual person,
typically within a range of 10 meters.
Personal Area Network is used for
connecting the computer devices of
personal use is known as Personal
Area Network.
Personal Area Network covers an a
rea of 30 feet.
Personal computer devices that are used
to develop the personal area network are
the laptop, mobile phones, media player
and play stations.
MAN(Metropolitan Area Network)
A metropolitan area network is a
network that covers a larger
geographic area by interconnecting
a different LAN to form a larger
network.
Government agencies use MAN
to connect to the citizens and
private industries.
In MAN, various LANs are
connected to each other through a
telephone exchange line.
WAN(Wide Area Network)
A Wide Area Network is a network that
extends over a large geographical area
such as states or countries.
A Wide Area Network is quite bigger
network than the LAN.
A Wide Area Network is not limited to a
single location, but it spans over a large
geographical area through a telephone
line, fibre optic cable or satellite links.
The OSI Model
OSI - Physical Layer – Layer 1
• The lowest layer of the OSI reference model is the
physical layer
• The physical layer contains information in the form
of bits.
• It is responsible for transmitting individual bits from
one node to the next
• When receiving data, this layer will get the signal
received and convert it into 0s and 1s and send
them to the Data Link layer, which will put the
frame back together.
Functions of the Physical Layer
• Bit synchronization: The physical layer provides the
synchronization of the bits by providing a clock. This clock
controls both sender and receiver thus providing
synchronization at the bit level.
• Bit rate control: The Physical layer also defines the transmission
rate i.e. the number of bits sent per second.
• Physical topologies: Physical layer specifies how the different,
devices/nodes are arranged in a network i.e. bus, star, or mesh
topology.
• Transmission mode: Physical layer also defines how the data
flows between the two connected devices. The various
transmission modes possible are Simplex, half-duplex and full-
duplex.
https://www.geeksforgeeks.org/difference-between-simplex-half-duplex-and-fu
ll-duplex-transmission-modes/
Data Link Layer (DLL) – Layer 2
• The data link layer is responsible for the node-
to-node delivery of the message..
• The main function of this layer is to make sure
data transfer is error-free from one node to
another, over the physical layer.
• When a packet arrives in a network, it is the
responsibility of the DLL to transmit it to the
Host using its MAC address.
Functions of the Data Link Layer

• Framing
• Physical addressing
• Error control
• Flow Control
• Access control
Network Layer – Layer 3
• The network layer works for the transmission
of data from one host to the other located in
different networks.
• It also takes care of packet routing i.e.
selection of the shortest path to transmit the
packet, from the number of routes available.
• The sender & receiver’s IP addresses are
placed in the header by the network layer.
Functions of the Network Layer
• Routing: The network layer protocols determine
which route is suitable from source to destination.
This function of the network layer is known as
routing.
• Logical Addressing: To identify each device on
Internetwork uniquely, the network layer defines
an addressing scheme. The sender & receiver’s IP
addresses are placed in the header by the network
layer. Such an address distinguishes each device
uniquely and universally.
Transport Layer – Layer 4
• The transport layer provides services to the
application layer and takes services from the
network layer.
• The data in the transport layer is referred to
as Segments.
• It is responsible for the End to End Delivery of the
complete message. The transport layer also
provides the acknowledgment of the successful
data transmission and re-transmits the data if an
error is found.
Functions of the Transport Layer
• Segmentation and Reassembly: This layer accepts the
message from the (session) layer, and breaks the message
into smaller units. Each of the segments produced has a
header associated with it. The transport layer at the
destination station reassembles the message.
• Service Point Addressing: To deliver the message to the
correct process, the transport layer header includes a type
of address called service point address or port address.
Thus by specifying this address, the transport layer makes
sure that the message is delivered to the correct process.
Services Provided by Transport Layer
• 1. Connection-Oriented Service: It is a three-phase process that
includes
– Connection Establishment
– Data Transfer
– Termination/disconnection
• In this type of transmission, the receiving device sends an
acknowledgment, back to the source after a packet or group of
packets is received. This type of transmission is reliable and
secure.
• 2. Connectionless service: It is a one-phase process and includes
Data Transfer. In this type of transmission, the receiver does not
acknowledge receipt of a packet. This approach allows for much
faster communication between devices. Connection-oriented
service is more reliable than connectionless Service.
Session Layer – Layer 5
• Session establishment, maintenance, and termination: The
layer allows the two processes to establish, use and
terminate a connection.
• Synchronization: This layer allows a process to add
checkpoints that are considered synchronization points in the
data. These synchronization points help to identify the error
so that the data is re-synchronized properly, and ends of the
messages are not cut prematurely and data loss is avoided.
• Dialog Controller: The session layer allows two systems to
start communication with each other in half-duplex or full-
duplex.
Presentation Layer – Layer 6
• Functions of the Presentation Layer
– Translation: For example, ASCII to EBCDIC.
– Encryption/ Decryption: Data encryption
translates the data into another form or code. The
encrypted data is known as the ciphertext and the
decrypted data is known as plain text. A key value
is used for encrypting as well as decrypting data.
– Compression: Reduces the number of bits that
need to be transmitted on the network.
Application Layer – Layer 7
• At the very top of the OSI Reference Model stack
of layers, we find the Application layer which is
implemented by the network applications.
• These applications produce the data, which has to
be transferred over the network.
• This layer also serves as a window for the
application services to access the network and for
displaying the received information to the user.
• Example: Application – Browsers,
Functions of the Application Layer
• Network Virtual Terminal: It allows a user to log on to a
remote host.
• FTAM- File transfer access and management : This
application allows a user to access file in a remote host,
retrieve files in remote host and manage or
control files from a remote computer.
• Mail Services : Provide email service.
• Directory Services : This application provides distributed
database sources
and access for global information about various objects
and services.
TCP/IP Model
• TCP/IP was designed and developed by the
Department of Defense (DoD) in the 1960s
and is based on standard protocols. It stands
for Transmission Control Protocol/Internet
Protocol. The TCP/IP model is a concise
version of the OSI model. It contains four
layers, unlike the seven layers in the OSI
model.
Layers of TCP/IP Model
• Application Layer
• Transport Layer(TCP/UDP)
• Network/Internet Layer(IP)
• Data Link Layer (MAC)
• Physical Layer

https://www.geeksforgeeks.org/tcp-ip-model/
Differences between OSI Model and
TCP/IP Model
Parameters OSI Model TCP/IP Model
OSI stands for Open Systems TCP/IP stands for Transmission
Full Form
Interconnection. Control Protocol/Internet Protocol.

Layers It has 7 layers. It has 4 layers.


Usage It is low in usage. It is mostly used.

Approach It is vertically approached. It is horizontally approached.

Delivery of the package is Delivery of the package is not


Delivery
guaranteed in OSI Model. guaranteed in TCP/IP Model.

Replacement of tools and


Replacing the tools is not easy as it is
Replacement changes can easily be done
in OSI Model.
in this model.

It is less reliable than TCP/IP


Reliability It is more reliable than OSI Model.
Model.

You might also like