Computer Networks - Unit I
Computer Networks - Unit I
UNIT - I
Networking:
Networking is the process of connecting computers, servers, and devices to share data,
resources, and communication efficiently. It forms the backbone of modern digital
communication systems.
Types of Network Applications
1.Web Browsers:
1. Examples: Google Chrome, Mozilla Firefox, Microsoft Edge
2. Web browsers allow users to access and navigate websites and web-based
applications over the internet. They use network protocols such as HTTP and
HTTPS to retrieve web content.
2.Email Clients:
1. Examples: Microsoft Outlook, Apple Mail, Gmail
2. Email clients facilitate the sending, receiving, and management of email
messages over email servers, typically using protocols like SMTP, IMAP, and POP3.
3.File Transfer Protocols:
1. Examples: FTP (File Transfer Protocol), SFTP (Secure File Transfer Protocol)
2. These applications enable the transfer of files between devices and servers. FTP
and SFTP ensure secure and efficient file exchange over networks.
4.Messaging Apps:
1. Examples: WhatsApp, Slack, Microsoft Teams
2. Messaging applications allow real-time text, voice, and video communication
between individuals and groups, enhancing collaboration and connectivity.
5.Video Conferencing Tools:
1. Examples: Zoom, Microsoft Teams, Cisco Webex
2. Video conferencing applications enable virtual meetings, webinars, and remote
collaboration through live video and audio communication.
Importance of Network Applications
2.Data Sharing and Accessibility: They facilitate the sharing and access of data and
resources, promoting efficient information exchange and decision-making.
Network hardware is a set of physical or network devices that are essential for
interaction and communication between hardware units operational on a
computer network. These are dedicated hardware components that connect to
each other and enable a network to function effectively and efficiently.
Control Layer:
Acts as the "brain" of the system, managing network control software and
operating systems.
Translates application requirements into network actions and controls the
infrastructure layer via APIs.
Infrastructure Layer:
Contains physical and virtual network devices (data plane).
Responsible for forwarding data packets based on instructions from the control
layer.
Fundamentals of Network Software
Protocols:
Protocols are the rules governing communication between devices. They define
how data is transmitted, formatted, and interpreted.
Step 1: Person A interacts with e-mail application like Gmail, outlook, etc.
Writes his email to send. (This happens at Application Layer).
Step 2: At Presentation Layer, Mail application prepares for data transmission
like encrypting data and formatting it for transmission.
Step 3: At Session Layer, There is a connection established between the sender
and receiver on the internet.
Step 4: At Transport Layer, Email data is broken into smaller segments. It adds
sequence number and error-checking information to maintain the reliability of the
information.
Step 5: At Network Layer, Addressing of packets is done in order to find the
best route for transfer.
Step 6: At Data Link Layer, data packets are encapsulated into frames, then
MAC address is added for local devices and then it checks for error using error
detection.
Step 7: At Physical Layer, Frames are transmitted in the form of electrical/
optical signals over a physical network medium like ethernet cable or WiFi.
After the email reaches the receiver i.e. Person B, the process will reverse and
decrypt the e-mail content. At last, the email will be shown on Person B email
client.
Advantages of OSI Model
The OSI Model defines the communication of a computing system into 7 different
layers. Its advantages include:
•It divides network communication into 7 layers which makes it easier to understand
and troubleshoot.
•It standardizes network communications, as each layer has fixed functions and
protocols.
•Diagnosing network problems is easier with the OSI model.
•It is easier to improve with advancements as each layer can get updates separately.
• The main work of TCP/IP is to transfer the data of a computer from one device
to another.
• The main condition of this process is to make data reliable and accurate so
that the receiver will receive the same information which is sent by the sender.
• To ensure that, each message reaches its final destination accurately, the
TCP/IP model divides its data into packets and combines them at the other end,
which helps in maintaining the accuracy of the data while transferring from
one end to another end.
•Network Access Layer:
•Responsible for generating data, requesting connections, and framing packets (e.g., Ethernet, PPP).
•Ensures error prevention and identifies network protocols like TCP/IP.
•Internet/Network Layer:
•Handles logical data transmission across networks.
•Key protocols:
•IP: Routes packets using IP addresses (IPv4/IPv6).
•ICMP: Reports network issues.
•ARP: Resolves IP to hardware addresses.
•Example: Sending an email by routing packets via IP addresses to the destination.
•Transport Layer:
•Manages end-to-end communication and ensures data integrity.
•Key protocols:
•TCP: Reliable, ordered transmission with connection establishment.
•UDP: Lightweight, connectionless communication for small data transfers.
•Application Layer:
•Provides end-to-end communication for user applications.
•Key protocols:
•HTTP/HTTPS: Web communication and secure transactions.
•SSH: Encrypted remote access.
•NTP: Synchronizes clocks for accurate timekeeping.
OSI Model TCP/IP Model
TCP/IP stands for Transmission Control Protocol/Internet
OSI stands for Open Systems Interconnection.
Protocol.
Package delivery is guaranteed in OSI Model. Package delivery is not guaranteed in the TCP/IP Model.
In the OSI model, Only layers 1,2 and 3 are necessary for All layers of the TCP/IP model are needed for data
data transmission. transmission.
OSI Model is a conceptual framework, less used in Widely used in actual networks like Internet and
practical applications. Communication Systems.
Example Networks:
Internet:
•The internet is a global network of interconnected devices and networks that communicate using
standardized protocols like TCP/IP. It enables billions of devices worldwide to share information,
access resources, and connect users across different locations.
•Real-World Example: Services like Google and Amazon utilize the internet to provide search
engines, cloud storage, online shopping, and streaming platforms. The internet supports global
connectivity for personal, educational, and business purposes.
•Twisted Pair Cable: It is made up of insulated copper wires twisted together that’s why it
called is as twisted pair cable. Mostly used in telephone networks and Ethernet cables. It is
affordable.
•Coaxial Cable: In coaxial cable one central conductor surrounded by insulation, a metallic
shield, and an exterior cover. This type of cable used in television networks and for long-
distance communication lines. It provides better protection against interruption than
twisted pair cables.
•Optical Fiber: This cable uses light signals to transfer data. Made up of glass or plastic
fibers, it provides very high bandwidth and low signal reduction, making it ideal for long-
distance and high-speed data transmission. It immune to electromagnetic obstruction but
more expensive than copper cables.