Introduction To Networking 2024
Introduction To Networking 2024
over a network.
Topology : Ring, Star, Bus, Tree, Mesh
Topologies
What is a Computer Network
LAN, MAN & WAN
14
How Data Flows through the OSI Layers
Computer networks components comprise both
physical components as well as the software required
for installing computer networks.
Hardware components :
◦ server
◦ client
◦ transmission medium and
◦ connecting devices.
Software components:
o operating system and
o protocols.
Servers: Servers are high-configuration computers that
manage the resources of the network. The network operating
system is typically installed in the server and so they give
user accesses to the network resources. Servers can be of
various kinds: file servers, database servers, print servers etc.
device.
Why use repeaters?
The strength of the signal will go down after 200 mtr- No repeater
With a repeater -If a device is sending a signal, after 200 there will be
attenuation (signal weakening) but because of the repeater , the signal can
travel even after 200 meters. Hence increases the distance covered by the
signal.
Repeaters
Its job is to regenerate the signal(original voltage value) over the same
Hubs are also used to connect 2 LANs but they have to be identical.
M1 M3 M5
Bridge interfaces are port P1 and Port2
M1, M2, M3 and M4 are to the left of the interface (P1) and
if M1 to M3 – don’t forward
How does it decide ?
M6 M7
M2 M4
P1
Bridge P2
MAC Port
M1 P1
M2 P1
M3 P1
M4 P1
M5 P2
M6 P2
M7 P2
If M1 wants to send a message to M5 , the bridge checks the table and decides if to
forward or not
Drawback of Static table
The table has to be maintained manually. Eg: if a machine
M1 M3 M5
Dynamic bridge
Initially the table is empty.
interface.
If M1 has to send a packet to M6, Source address- M1,
broadcasted.
And when the reply(Ack) come in from M6 to M1 (SA – M6 and
router.
Switches can perform error checking before
forwarding data, which are very efficient by not
forwarding packets that have errors or forwarding
good packets selectively to correct devices only.
Switches can also read the MAC address and
If a packet is unable to decide then it uses flooding, send the packet to all
the interfaces.
2. Filtering
Decide whether to forward /block the packet (if the packet is
54
Each layer adds (or encapsulates) some form of header or trailer.
(Layer 2, the Data Link layer, is responsible for adding a trailer)
as the data flow from Device A to Device B.
When the end system receives the unstructured bit stream from
data transfer. So, an important design issue is to make sure that the information
transferred is not distorted.
2. Scalability
Networks are continuously evolving. The sizes are continually increasing leading to
congestion. Also, when new technologies are applied to the added components, it may
lead to incompatibility issues. Hence, the design should be done so that the networks
are scalable and can accommodate such additions and alterations.
3. Addressing
At a particular time, innumerable messages are being transferred between large numbers
of computers. So, a naming or addressing system should exist so that each layer can
identify the sender and receivers of each message.
1. .
4. Error Control
Unreliable channels introduce a number of errors in the data
it is being transferred from the source to the destination. So, the data
channel needs to be multiplexed, so as to allocate a fraction of the
bandwidth or time to each host.
7.Routing
There may be multiple paths from the source to the destination.
2. Authorization
1.Authentication
Authentication is the process of verifying who you are.
long communications.
This ensures that data streams up to the checkpoints are
have to be re-transmitted.
Eg: session restoration-restoration of multiple tabs of a browser in
case of network interruption.
Checkpointing-downloading a long YouTube video
NOTE: The coding for presentation and session layer is provided
by the application and not the operating system
4. Transport Layer
Responsible for process to process delivery of the entire
message.
Computers often run several processes at the same time. For
connection is terminated
Connection Less ( as Internet)
It sends the data, but does not establish and verify a
packet packet
discarded discarded
1 packet
87 10 Data accepted
87 10 Data
2 3
4
Network
Network Network
B1 B2
A2 A1
H
R1
A4 Eg: Transmitting R2
A3 a message from A2 to B2 is
t the responsibility of the network Layer
Ip address of the source and destination is added at the
network layer of the source machine.
IP address consists of net id and host id
a routing algorithm.
3. Fragmentation :
When data reaches the network layer, terminology used in
packet.
From the source machine if the packet has to pass through a
router, the router might have a size constraint based on its
buffer size
i.e it can accept packets of only a certain size.
Hence network layer perform fragmentation to pass the data to
leaky bucket .
6. Data Link Layer
When sending data to the physical layer it puts a header(MAC
checks for physical transmission errors and packages bits into data
"frames".
The data link layer provides error-free transfer of data frames
Access Control (MAC) layer and the Logical Link Control (LLC)
layer.
Data Link Layer Functions
1. Framing: Divide the stream of bits received from network layer
into data units called frames
2. Physical Addressing: The Data Link layer adds a header to the
frame in order to define physical address of the sender or receiver of
the frame, if the frames are to be distributed to different systems on
the network.
3. Flow Control: A flow control mechanism allows two stations
working at different speeds to communicate with each other.
When a data frame (Layer-2 data) is sent from one host to another
over a single medium, it is required that the sender and receiver
should work at the same speed. If sender is sending too fast the
receiver may be overloaded, (swamped) and data may be lost.
4. Error Control:
Add mechanisms to detect and retransmit damaged or lost frames.
of frame.
5. Access Control: Protocols of this layer determine which of the
devices has control over the link at any given time, when two or
more devices are connected to the same link.
7. Physical layer
It provides the hardware means of sending and receiving data on a
carrier.
Functions
1.Representation of Bits: Data in this layer consists of stream of bits. The
bits must be encoded into signals for transmission. It defines the type of
encoding i.e. how 0's and 1's are changed to signal.
2. Data Rate: This layer defines the rate of transmission which is the
number of bits per second.
3. Synchronization: It deals with the synchronization of the transmitter
and receiver. The sender and receiver are synchronized at bit level.
4. Interface: The physical layer defines the transmission interface
between devices and transmission medium.
5. Line Configuration: This layer connects devices with the medium:
Point to Point configuration(dedicated link between 2 devices) and
Multipoint configuration(shared link between more than 2 devices)
6.Topologies: Devices must be connected using the following
topologies: Mesh, Star, Ring and Bus.
7.Transmission Modes: Physical Layer defines the direction of
transmission between two devices: Simplex(signals can flow only in
one direction), Half Duplex(signals can flow in both directions not
at the same time). Full Duplex(signals can flow in both directions at
the same time).
OSI Model
Data
Layer Function
unit
7. Application Application process
Data representation,
Data 6. Presentation
Host encryption and decryption
layers 5. Session Interhost communication
Segme End-to-end connections
4. Transport
nts and reliability, Flow control
Path determination and
Packet 3. Network
logical addressing
Media
Frame 2. Data Link Physical addressing
layers
Media, signal and binary
Bit 1. Physical
transmission
Going from layer 7 to 1: All People Seem To Need Data
Processing
91
The Internet Protocol Suite (commonly known as TCP/IP)
is the set of communications protocols used for
the Internet and other similar networks.
It is named from two of the most important protocols in it:
◦ the Transmission Control Protocol (TCP)(layer 4) and
◦ the Internet Protocol (IP)(layer 3), which were the first two
networking protocols defined in this standard.
92
1. Application layer
User interacts directly with the application software, where
application process creates user data and transmits this data to other
application process on same or another host via one of the transport
layer protocol (TCP or UDP).
Application layer protocols:
HTTP(hyper text transfer protocol): Is the protocol that web
browsers and web servers use to communicate with each other.
FTP protocol : Used to exchange computer files within hosts. Setting
up an FTP server becomes necessary for businesses that manage
their own network and need to establish a file transfer (exchange of
documents) between company employees.
DNS protocol: Domain names are alphabetic which are easier to
remember. Internet is however based on IP addresses.DNS involves
converting a host name into its IP address.
2. Transport layer
Transport layer is the third layer in the TCP/IP reference model.
The transport layer receives the data from the application layer and
splits it into separate packets, with an order number and port
number. It is also responsible for error and flow control.
The core protocols of transport layer are Transmission Control
Protocol (TCP) and User Datagram Protocol (UDP).
TCP - is a connection-oriented protocol.
of frame.
5. Access Control: Protocols of this layer determine which of the
devices has control over the link at any given time, when two or
more devices are connected to the same link.
5. Physical layer
It provides the hardware means of sending and receiving data on a
carrier.
Functions
1.Representation of Bits: Data in this layer consists of stream of bits. The
bits must be encoded into signals for transmission. It defines the type of
encoding i.e. how 0's and 1's are changed to signal.
2. Data Rate: This layer defines the rate of transmission which is the
number of bits per second.
3. Synchronization: It deals with the synchronization of the transmitter
and receiver. The sender and receiver are synchronized at bit level.
4. Interface: The physical layer defines the transmission interface
between devices and transmission medium.
5. Line Configuration: This layer connects devices with the medium:
Point to Point configuration and Multipoint configuration
6.Topologies: Devices must be connected using the following
topologies: Mesh, Star, Ring and Bus.
7.Transmission Modes: Physical Layer defines the direction of
transmission between two devices: Simplex, Half Duplex, Full
Duplex.
OSI TCP/IP
4. Separate Presentation and Session Layer 4. TCP/IP combines the presentation and session
layer into its application layer
5 The OSI model supports both 5. The TCP/IP model supports only
connection-less and connection- Connectionless communication in transport
oriented communication in the layer.
transport layer
6. Theoretical model Model around which Internet is developes