Unit-4 Part I
Unit-4 Part I
Computer
Networking
& Computer
Security
Computer Networking
A computer network is a set of
nodes connected by media (cable
media or wireless media) such that
nodes are capable of sending or
receiving of information. This node
can be computer ,printer or any
other networking devices.
2
Purpose or Goal
Information Exchange
Resource sharing
Reliability
Reduce cost
Load Sharing
Communication
3
Topologies
Network Topology is the schematic
description of a network
arrangement, connecting various
nodes(sender and receiver)
through lines of connection.
Bus Topology
Ring Topology
Star Topology
Mesh topology
4
Bus Topology
Bus topology is a network type in
which every computer and network
device is connected to single
cable.
5
Advantages
It is cost effective.
Cable required is least compared
to other network topology.
Used in small networks.
It is easy to understand.
Easy to expand joining two
cables together.
6
Disadvantages
Cables fails then whole network
fails.
If network traffic is heavy or
nodes are more the performance
of the network decreases.
Cable has a limited length.
It is slower than the ring
topology.
7
Ring Topology
All nodes of the network are
connected in form of ring. The
single messages called “Token” is
passed through all nodes in one
direction. The token is accepted by
node which has same address and
attached in the token.
8
Advantages
This topology is easy to install
and economical.
It is easy to adjust new node.
Disadvantages
Failure of one node or cable
results in failure of entire
network.
This topology is suitable for
farming small network.
9
Star Topology
In this topology nodes are
connected trough a centralize
device called Hub or switch. The
nodes on the network communicate
by passing the message through
this centralized device.
10
Advantages
Failure of one node does not
result in failure of entire network.
This topology is easy to install,
configure and modify the network.
Extra nodes can be added or
removed from the network without
disturbing to the rest of network.
Very useful in creation of large
network.
11
Disadvantage
Failure of central switch or Hub
result failure of entire network.
It is more costly than ring and
bus topology because of
Hub/Switch and extra cables.
12
A mesh topology
A mesh topology is a network
topology in which all the network
nodes are individually connected
to most of the other nodes. There
is not a concept of a central
switch, hub or computer which
acts as a central point of
communication to pass on the
messages.
13
Diagram
14
Advantages
Each connection can carry its
own data load
It is robust
A fault is diagnosed easily
Provides security and privacy
15
Disadvantages
16
Introduction OSI
The Open System Interconnection
Reference Model (OSI Reference Model
or OSI Model) is an abstract description for
layered communications and computer
network protocol design.
It divides network architecture into seven
layers which, from top to bottom, are the
Application, Presentation, Session, Transport,
Network, Data Link, and Physical Layers. It is
therefore often referred to as the OSI Seven
Layer Model.
17
OSI History
In 1978, the International Standers
Organization (ISO) began to develop its OSI
framework architecture.
18
OSI History
The concept of a 7 layer model was provided
by the work of Charles Bachman, then of
Honeywell.
19
OSI Layers
OSI Model
Data
Layer Function
unit
Network process to
7. Application
application
Data Data representation,
Host 6. Presentation
encryption and decryption
layers
5. Session Interhost communication
Segme End-to-end connections
4. Transport
nts and reliability, Flow control
Path determination and
Packet 3. Network
logical addressing
Media
Frame 2. Data Link Physical addressing
layers
Going from Media,
Not signal and binary
Bit layer 11.to 7: Please Do
Physical Throw Sausage
Pizza Away transmission
Going from layer 7 to 1: All People Seem To Need Data
Processing 20
21
Layer1: Physical Layer
Functions of the Physical Layer
Bit synchronization: The physical layer provides the
synchronization of the bits by providing a clock. This clock controls
both sender and receiver thus providing synchronization at the bit
level.
Bit rate control: The Physical layer also defines the transmission
rate i.e. the number of bits sent per second.
Physical topologies: Physical layer specifies how the different,
devices/nodes are arranged in a network i.e. bus, star, or mesh
topology.
Transmission mode: Physical layer also defines how the data flows
between the two connected devices. The various transmission
modes possible are Simplex, half-duplex and full-duplex.
Note:
Hub, Repeater, Modem, and Cables are Physical Layer devices.
Network Layer, Data Link Layer, and Physical Layer are also known
as Lower Layers or Hardware Layers.
22
Layer 2: Data Link Layer
Functions of the Data Link Layer
Framing: Framing is a function of the data link layer. It provides a
way for a sender to transmit a set of bits that are meaningful to the
receiver. This can be accomplished by attaching special bit
patterns to the beginning and end of the frame.
Physical addressing: After creating frames, the Data link layer
adds physical addresses (MAC addresses) of the sender and/or
receiver in the header of each frame.
Error control: The data link layer provides the mechanism of error
control in which it detects and retransmits damaged or lost frames.
Flow Control: The data rate must be constant on both sides else
the data may get corrupted thus, flow control coordinates the
amount of data that can be sent before receiving an
acknowledgment.
Access control: When a single communication channel is shared
by multiple devices, the MAC sub-layer of the data link layer helps
to determine which device has control over the channel at a given
time.
23
Layer 2: Data Link Layer
Note:
Packet in the Data Link layer is referred to
as Frame.
Data Link layer is handled by the NIC
(Network Interface Card) and device drivers
of host machines.
Switch & Bridge are Data Link Layer devices.
24
Layer 3: Network Layer
Functions of the Network Layer
Routing: The network layer protocols determine
which route is suitable from source to destination.
This function of the network layer is known as routing.
Logical Addressing: To identify each device inter-
network uniquely, the network layer defines an
addressing scheme. The sender & receiver’s IP
addresses are placed in the header by the network
layer. Such an address distinguishes each device
uniquely and universally.
Note:
Segment in the Network layer is referred to
as Packet.
Network layer is implemented by networking devices
such as routers and switches.
25
Layer 4: Transport Layer
Functions of the Transport Layer
Segmentation and Reassembly: This layer accepts the
message from the (session) layer, and breaks the
message into smaller units. Each of the segments
produced has a header associated with it. The transport
layer at the destination station reassembles the message.
Service Point Addressing: To deliver the message to
the correct process, the transport layer header includes a
type of address called service point address or port
address. Thus by specifying this address, the transport
layer makes sure that the message is delivered to the
correct process.
Services Provided by Transport Layer
Connection-Oriented Service
Connectionless Service
26
Layer 4: Transport Layer
Note:
Data in the Transport Layer is
called Segments.
Transport layer is operated by the Operating
System. It is a part of the OS and
communicates with the Application Layer by
making system calls.
The transport layer is called as Heart of the
OSI model.
Device or Protocol Use : TCP, UDP
NetBIOS, PPTP
27
Layer 5: Session Layer
Functions of the Session Layer
Session establishment, maintenance, and
termination: The layer allows the two processes
to establish, use, and terminate a connection.
Synchronization: This layer allows a process to
add checkpoints that are considered
synchronization points in the data. These
synchronization points help to identify the error so
that the data is re-synchronized properly, and
ends of the messages are not cut prematurely and
data loss is avoided.
Dialog Controller: The session layer allows two
systems to start communication with each other
in half-duplex or full-duplex.
28
Layer 5: Session Layer
Note:
Allthe below 3 layers(including Session
Layer) are integrated as a single layer in the
TCP/IP model as the “Application Layer”.
Implementation of these 3 layers is done by
the network application itself. These are also
known as Upper Layers or Software
Layers.
Device or Protocol Use : NetBIOS, PPTP.
29
Layer 6: Presentation Layer
Functions of the Presentation Layer
Translation: For example, ASCII to EBCDIC.
Encryption/ Decryption: Data encryption
translates the data into another form or code.
The encrypted data is known as the ciphertext
and the decrypted data is known as plain text. A
key value is used for encrypting as well as
decrypting data.
Compression: Reduces the number of bits that
need to be transmitted on the network.
31
Layer 7: Application Layer
Note: The OSI model acts as a reference
model and is not implemented on the
Internet because of its late invention. The
current model being used is the TCP/IP
model. by the application layer.
Note: 1. The application Layer is also called
Desktop Layer.
2. Device or Protocol Use : SMTP
32
Layer 7: Application Layer
Some examples of application layer
implementations include –
33
OSI Feature
Open system standards over the world
Rigorously defined structured, hierarchical
network model
Complete description of the function
Provide standard test procedures
34
Introduction TCP/IP
The Internet Protocol Suite (commonly
known as TCP/IP) is the set
of communications protocols used for
the Internet and other similar networks.
Application Layer
Application Layer
TELNET, FTP, SMTP, POP3,
Presentation Layer
SNMP, NNTP, DNS,NIS, NFS,
HTTP, ...
Session Layer
36
TCP/IP Stack
37
TCP/IP Encapsulation
38
TCP/IP Some Protocol
Layer Protocol
A device can only send the data but cannot receive it or it can
receive the data but cannot send the data.
Messages flow in both the directions, but not at the same time.
After a pause, the other speaks and first party listens. Speaking
simultaneously will create the distorted sound which cannot be
understood.
Advantage & Disadvantage of Half-
duplex mode
Both the stations can send and receive the message simultaneously.
Full-duplex mode has two simplex channels. One channel has traffic
moving in one direction, and another channel has traffic flowing in
the opposite direction.
70
HUB : It connects multiple computer to make
a single network segment. When using a hub,
every attached computers receive the
messages. Therefore, only one computer
connected to the hub is able to transmit at a
time. It works on physical layer of the OSI
Model.
71
Switch : Like a hub switch is also a common
convergence point of all computers of network
but it is clever than hub . Unlike the hub it is
able to read the MAC address of each frame it
receives and forward each frame to only to the
computer or computers to which a frame is
addressed. This speeds up the network and
reduces congestion. Switches operate at both
the physical layer and the data link layer of the
OSI Model.
72
Bridge : This device is used to broken large
network into more than one segments to reduce
the traffic of network. Bridge operates on data
link layer of the OSI Model.
73
Router : Router is internetworking used to
connect more than one network which works on
same protocol suit. It works on network layer of
the OSI Model. Router is also find the best route
to for packets to travel on the network. A router
has processor, memory and I/O interfaces.
74
Gateway : Gateway is inter networking used
to connect more than one network which works
on different protocol suit. It works on
application, presentation, session and network
layer of the OSI Model.
75
Internetworking :
Internetworking is the practice of connecting a
computer network with other networks through
the use of router or gateways that provide a
common method of routing information
packets between the networks.
76
World Wide Web (www) :
The World Wide Web (abbreviated as WWW or
W3 commonly known as the web) is a system
of interlinked hypertext documents accessed
via the Internet. With a web browser, one can
view web pages that may contain text,
images, videos, and other multimedia and
navigate between them via hyperlinks.
77
E- commerce
Electronic commerce, commonly known as E-
commerce or e-Commerce, is a type of industry
where the buying and selling of products or
services is conducted over electronic systems
such as the Internet and other computer
networks.
78
(i) Business to Business (B2B): It describes e-
commerce conducted between businesses, such as
between a manufacturer and a wholesaler, or
between a wholesaler and a retailer
(ii) Business to consumer(B2C) : It describes e-
commerce conducted between companies/business
and the customers. Online shopping, online
marketing is the B2C e-commerce.
(iii) Business to government(B2G) : It is an e-
commerce that provides selling products, services
or information to governments or government
agencies.
(iv) Consumer to Business(C2B): It is the most
recent E-Commerce business model. In this model,
individual customers offer to sell products and
services to companies who are prepared to
purchase them. This business model is the opposite
of the traditional B2C model.
79