Professional Documents
Culture Documents
CNS Unit 1
CNS Unit 1
CNS Unit 1
Computer Networks
Computer Networks & Security – 2019 pattern
Prof. Nalini Mhetre.
SCOE, Pune
7/15/2021 1
What is Computer Network?
• Computer Network is a group of computers connected with
each other through medium like wires, optical fibres or
optical links so that various devices can interact with each
other through a network.
• The aim of the computer network is the sharing of resources
among various devices.
• There are several types of computer networks that vary from
simple to complex level.
Uses Of Computer Network
• Resource sharing:
• Resource sharing is the sharing of resources such as programs,
printers, and data among the users
• Communication medium:
• Computer network behaves as a communication medium among
the users.
• E-commerce:
• Computer network is also important in businesses. We can do the
business over the internet.
Features of Computer network
• A list of Computer network
features is given below.
• Communication speed
• File sharing
• Back up and Roll back is easy
• Software and Hardware sharing
• Security
• Scalability
• Reliability
Network Architectures
Computer Network Architecture
• Computer Network Architecture is
defined as the physical and logical
design of the software, hardware,
protocols, and media of the
transmission of data.
• The three types of network Network
architectures are used Architectures
• Peer to Peer network
• Client-Server network
Peer to Client
• Hybrid Networks Hybrid
Peer Server
Peer-To-Peer network
• A network in which all the
computers are linked together with
equal privilege and responsibilities
for processing the data.
• Useful for small environments,
usually up to 10 computers.
• No dedicated server.
• Special permissions are assigned to
each computer for sharing the
resources
Peer-To-Peer network
• Advantages of Peer-To-Peer Network:
• It is less costly as it does not contain any dedicated server.
• If one computer stops working, other computers will not stop
working.
• It is easy to set up and maintain as each computer manages itself.
• Disadvantages of Peer-To-Peer Network:
• it does not contain the centralized system . Therefore, it cannot
back up the data as the data is different in different locations.
• It has a security issue as the device is managed by itself.
Client Server Network
• Central controller is known as
a server while other computers
are called clients
• Server performs all major
operations
• Server is responsible for
managing all resources
• All clients communicates with
each other through server
Advantages Of Client/Server network
• A Client/Server network contains the centralized system.
Therefore we can back up the data easily.
• A Client/Server network has a dedicated server that improves
the overall performance of the whole system.
• Security is better in Client/Server network as a single server
administers the shared resources.
• It also increases the speed of the sharing resources.
Disadvantages Of Client/Server network:
• Client/Server network is expensive as it requires the server
with large memory.
• A server has a Network Operating System(NOS) to provide
the resources to the clients, but the cost of NOS is very high.
• It requires a dedicated network administrator to manage all
the resources.
Hybrid Network
• A hybrid, in general , is a composition of two different types
of elements
• A hybrid network architecture is created to get benefits of
both , peer to peer and client server architectures in a network
Type of Networks
Computer Network Types
• Computer networks can be categorized by their size. And are
mainly of four types:
M = Message H = Header
Network Hierarchy : Advantages
• The layers generally reduce complexity of communication
between networks
• It increases network lifetime.
• It also uses energy efficiently.
• It does not require overall knowledge and understanding of
network.
Design issues for layers
• Reliability
• Security
• Routing
• Scalability
• Error Control
• Addressing
• Flow Control
• Resource Allocation
Network Models
ISO-OSI reference Model
• First step towards international standardization of the
protocol used in the various layers was by Day and
Zimermann, 1983. And the proposed model was called ISO-
OSI Reference Model
• OSI = Open Systems Interconnection: deals with open
systems, i.e. systems open for communications with other
systems.
• Specified in ISO 7498.
• Model has 7 layers.
ISO-OSI reference Model
• The OSI model has seen layers. The principles that were
applied to arrive at the seven layers can briefly be
summarized as follows:
• A layer should be created where a different abstraction is needed.
• Each layer should perform a well-defined function.
• The function of each layer should be chosen with an eye toward
defining internationally standardized protocols.
• The layer boundaries should be chosen to minimize the information
flow across the interfaces.
• The number of layers should be large enough that distinct functions
need not be thrown together in the same layer out of necessity and
small enough that the architecture does not become unwieldy
7-Layer OSI Model
ISO-OSI reference Model -
Interactions
Layer 7: Application Layer
• Level at which applications access network services.
• Represents services that directly support software
applications for file transfers, database access, and electronic
mail etc.
Layer 6: Presentation Layer
• Related to representation of transmitted data
• Translates different data representations from the Application
layer into uniform standard format
• Providing services for secure efficient data transmission
• e.g. data encryption, and data compression.
Layer 5: Session Layer
• Allows two applications on different computers to establish,
use, and end a session.
• e.g. file transfer, remote login
• Establishes dialog control
• Regulates which side transmits, plus when and how long it
transmits.
• Performs token management and synchronization.
Layer 4: Transport Layer
• Manages transmission packets
• Repackages long messages when necessary into small packets for
transmission
• Reassembles packets in correct order to get the original message.
• Handles error recognition and recovery.
• Transport layer at receiving acknowledges packet delivery.
• Resends missing packets
Layer 3: Network Layer
• Manages addressing/routing of data within the subnet
• Addresses messages and translates logical addresses and names
into physical addresses.
• Determines the route from the source to the destination computer
• Manages traffic problems, such as switching, routing, and
controlling the congestion of data packets.
• Routing can be:
• Based on static tables
• determined at start of each session
• Individually determined for each packet, reflecting the current
network load.
Layer 2: Data Link Layer
• Packages raw bits from the Physical layer into frames
(logical, structured packets for data).
• Provides reliable transmission of frames
• It waits for an acknowledgment from the receiving computer.
• Retransmits frames for which acknowledgement not received
Layer 1: Physical Layer
• Transmits bits from one computer to another
• Regulates the transmission of a stream of bits over a physical
medium.
• Defines how the cable is attached to the network adapter and
what transmission technique is used to send data over the
cable. Deals with issues like
• The definition of 0 and 1, e.g. how many volts represents a 1, and
how long a bit lasts?
• Whether the channel is simplex or duplex?
• How many pins a connector has, and what the function of each pin
is?
TCP/IP Model
Application Layer
Transport Layer
Internet Layer
Shared connection
Line terminator
Star Topology
Ring Topology
Mesh Topology
Tree / hierarchical Topology
Hybrid Topology
Transmission Mediums
Types of Transmission Mediums
• Transmission medium in Computer Networks is the means
through which data is transferred from one device to another.
• Transmission Medium physically connect computers and
other devices on a network
Types of Transmission Mediums
Medium
Wired or Wireless or
Guided Unguided
Media Media
• Cable made up of
• Inner conductor
• Inner insulator
(dielectric):
Inner insulator
(dielectric)
• Braided shield (metallic):
Outer insulator • Outer insulator
Braided shield (metallic)
Two types:
1. Baseband
2. broadband
Twisted pair cables
- Made of pair of twisted copper wires
Shielded Twisted Pair (STP) Unshielded Twisted Pair (UTP)
• Twisted wire pair • Twisted wire pair.
covered in metal foil. • Eg. CAT 5, CAT 5E, CAT 6
Optical fiber
• Each fiber is made up of
• Core - high quality silica
glass or plastic
• Cladding - high quality silica
glass or plastic, with a lower
refractive index than the core
• Protective outer covering
called buffer.
Radio waves
• Frequencies between 3 KHz and 1 GHz.
• Omnidirectional:
• sending and receiving antennas need not be aligned.
• Low and medium frequency waves can penetrate walls.
• Useful for multicasting.
• For example- AM and FM radio, television.
Micro waves
• Wide band: Waves having frequencies between 1 and 300
GHz .
• Unidirectional.
• sending and receiving antennas need to be aligned
• No inference between antennas.
• Weather conditions impact.
• Very high-frequency microwaves cannot penetrate walls.
• Useful in unicast transmission.
• For example- cellular phones, satellite networks and wireless
LANs.
Infrared waves
• Frequencies from 300 GHz to 400 THz.
• Useful for short-range communication.
• High frequency Infrared waves cannot penetrate walls.
• Prevents interference between systems.
• Used in remote controls.
Network Devices
Network Devices
• Repeater
• Hub
• Bridge
• Switch
• Router
• Brouter
• Gateway
• Access Point
Repeater
• 2 port device
• Connected between links
over the same network
• Regenerates the signal
• Signal can cover longer
Repeater
distance
• Operates at the physical
Host 1 Host 2
layer
• Do not amplify the signal
78
Hub
• Operates at the Physical layer
• Connects multiple devices in a
single LAN: central device
• Broadcasting device
• Single collision domain
• Multiport repeater
• Uplink port
• Types: Active Hub, Passive Hub
79
Bridge
• Operates at data link
layer
• Interconnects two LAN
segments
• 2 port device
• Filters data frames:
• for frame forwarding
decisions
80
Switch
• Operates at data link layer
• Connects multiple devices in
a single LAN: central device
• Multiport device
• Unicasting: point-to-point
device
• Does error checking
• Divides collision domains
81
Router
• Connects LANs and
WANs together
• Network Layer device:
core network device
• Multiple ports
• Routing: IP addresses ,
routing table
• Divides broadcast
domains of hosts
82
Brouter
• Bridging router
• Connects networks with
different protocols
• Features of both bridge and
router
• Work either at data link layer or
at network layer
• As a router: routing
• As a bridge: filter LAN traffic
• Reduce congestion
83
Gateway
• Connect two or more distinct/
dissimilar networks: networking
models not same
• Multiport device
• Messenger agents
• Operate at transport layer and
above
• Protocol converters: handles
Gateway different protocols and standards
from different vendors
• Do all of the functions of routers
84
Access Point
• Connect Wi-Fi devices to
a wired network
• works at the Data Link
layer
• Operate either as bridge
or router.
• Multiple ports
• SSID required for
connection
85
Encoding Techniques
• Digital data, digital signal :: line coding
• Analog data, digital signal
• Digital data, analog signal
• Analog data, analog signal
Line coding schemes
• Digital data converted to digital signal by Line coding.
1 – high
0 - low
NRZ-L
• Two different voltages for 0 and
1 bits
• More often, negative voltage for
one value and positive for the
other
• Voltage constant during same bit
interval
• no transition i.e. no return to
zero voltage
• This is NRZ-L
NRZ-I
• Nonreturn to zero inverted on ones
• Constant voltage pulse for duration
of bit
• Data encoded as presence or absence
of signal transition at beginning of
bit time
• Transition (low to high or high to
low) denotes a binary 1
• No transition denotes binary 0
• An example of differential encoding
NRZ-L and NRZ-I example2
Manchester & Differential Manchester
• Manchester
• Transition in middle of each bit period
• Transition serves as clock and data
• Low to high represents one
• High to low represents zero
• Used by IEEE 802.3
• Differential Manchester
• Midbit transition is clocking only
• Transition at start of a bit period represents zero
• No transition at start of a bit period represents one
• Note: this is a differential encoding scheme
• Used by IEEE 802.5
Spread Spectrum (SS)
• IEEE 802.11
• Wireless LAN standard
• Spread spectrum (SS)
• Spread data over wide bandwidth
• Frequency Hopping (FHSS)
• Signal broadcast over seemingly random series of frequencies
• Direct Sequence (DSSS)
• Each bit is represented by multiple bits in transmitted signal using
Chipping code
98
IEEE 802.11
• Standard for specifications of Wireless Local Area Networks
(WLANs).
• This standard defines interface :
• between wireless client and base station
• between two wireless clients.
• Specifies the set of media access control (MAC) protocols
and physical layer (PHY) protocols for implementing
WLAN.
• The 802.11 (PHY) :
• FHSS: Frequency hopping spread spectrum
• DSSS: Direct Sequence spread spectrum
99
Advantages:
• Greater bandwidth
Spread Spectrum (SS) • Noise reduction
• Resistance to jamming and interception.
100
FHSS
• Frequency hopping: The senders are made to change their
frequencies, from one to another in a specified time interval.
101
FHSS example
Hop sequence1:
f5, f8, f3, f7, f1, f4, f6, f2
Try yourself:
Hop sequence2:
f5, f8, f3, f6, f1, f7, f4, f2
Block diagram of FHSS transmitter, from William Stallings "Data and Computer Communications". 103
FHSS Receiver
Block diagram of FHSS transmitter, from William Stallings "Data and Computer Communications". 104
DSSS
• Used in wireless local area network transmissions.
• Each bit of sender’s data is represented by multiple bits using
chipping code / spreading code.
• Spreading code spreads signal across wider frequency band
• In proportion to number of bits used
• N bit spreading code spreads signal across N times bandwidth of 1
bit code
• The receiver uses the same code to retrieve the original
message.
• Performance similar to FHSS
105
DSSS Transmitter
Block diagram of FHSS transmitter, from William Stallings "Data and Computer Communications". 106
DSSS Receiver
Block diagram of FHSS transmitter, from William Stallings "Data and Computer Communications". 107
FHSS DSSS
Multiple frequencies are used Single frequency is used
It is cheaper It is expensive
This is the commonly used technique Not frequently used
108