Professional Documents
Culture Documents
CN Unit 1
CN Unit 1
Vision
To build strong teaching environment that responds to the needs of industry and challenges of the society
Mission
• M1 : Developing strong mathematical & computing skill set among the students.
• M2 : Extending the role of computer science and engineering in diverse areas like Internet of Things (IoT),
Artificial Intelligence & Machine Learning and Data Analytics.
• M3 : Imbibing the students with a deep understanding of professional ethics and high integrity to serve the
Nation.
• M4 : Providing an environment to the students for their growth both as individuals and as globally competent
Computer Science professional wit encouragement for innovation & start-up culture.
CO’S TITLE
CO1 Explain basic concepts, OSI reference model, services and role of each layer of OSI model and
TCP/IP, networks devices and transmission media, Analog and digital data transmission
CO2 Apply channel allocation, framing, error and flow control techniques.
CO3 Describe the functions of Network Layer i.e. Logical addressing, subnetting& Routing
Mechanism.
CO4 Explain the different Transport Layer function i.e. Port addressing, Connection Management,
Error control and Flow control mechanism.
CO5 Explain the functions offered by session and presentation layer and their Implementation.
CO6 Explain the different protocols used at application layer i.e. HTTP, SNMP, SMTP, FTP,
TELNET and VPN.
UNIT II
Link layer: Framing, Error Detection, and Correction, Flow control (Elementary Data Link Protocols, Sliding Window
protocols).
Medium Access Control and Local Area Networks: Channel allocation, Multiple access protocols, LAN standards, Link layer
switches & bridges (learning bridge and spanning tree algorithms).
UNIT III
Network Layer: Point-to-point networks, Logical addressing, Basic internetworking (IP, CIDR, ARP, RARP, DHCP, ICMP),
Routing, forwarding and delivery, Static and dynamic routing, Routing algorithms and protocols, Congestion control
algorithms, IPv6.
UNIT IV:
Transport Layer: Process-to-process delivery, Transport layer protocols (UDP and TCP), Multiplexing, Connection
management, Flow control and retransmission, Window management, TCP Congestion control, and Quality of service.
UNIT V:
Application Layer: Domain Name System, World Wide Web and Hyper Text Transfer Protocol, Electronic mail, File
Transfer Protocol, Remote login, Network Management, Data compression, Cryptography – basic concepts.
Topic 6: Network performance and transmission impairments, Switching techniques, and multiplexing.
4. Security:
The ability to prevent:
- unauthorized access, misuse, and forgery.
The ability to prevent:
- confidentiality, integrity, and availability.
The transmission of data from one device to another is known as transmission mode.
The transmission mode is also known as the communication mode.
Each communication channel has a direction associated with it, and transmission media provide the direction.
Therefore, the transmission mode is also known as a directional mode.
The transmission mode is defined in the physical layer.
Transmission
Mode
Half Full
Simplex
Duplex duplex
1. Business Applications:
(a) Resource sharing: Sharing physical resources such as printers, and tape backup systems.
(b) Information Sharing: records, financial statements, tax information.
(c) End “tyranny of geography”: VPNs(Virtual Private Network) are used to join from other places.
(d) High Reliability: File replication
(e) Flexible access, Centralized management and allocation of resources, good network performance, scalability, Saving
money, distribution of processing functions.
2. Home Applications
3. Mobile Users
4. Social uses
7. Physical Topology
The term physical topology refers to the way in which a network is laid out physically.
Two or more devices connect to a link; two or more links form a topology.
The topology of a network is the geometric representation of the relationship of all the links and linking devices
(usually called nodes) to one another. There are four basic topologies possible: mesh, star, bus, and ring.
Media
Wired Wireless
(Guided) (Unguided)
Co-axial
ethernet Fiber optic USB Cable Infrared Radio Microwaves
Cable
Guided media, which are those that provide a channel from one device to another, include
twisted-pair cable, coaxial cable, and fiber-optic cable.
• Twisted-pair and coaxial cable use metallic (copper) conductors that accept and
transport signals in the form of electric current.
• Optical fiber is a cable that accepts and transports signals in the form of light.
• The most common twisted-pair cable used in communications is referred to as unshielded twisted-pair
(UTP).
• IBM has also produced a version of twisted-pair cable for its use called shielded twisted-pair (STP).
• STP cable has a metal foil or braided-mesh covering that encases each pair of insulated conductors.
• Although metal casing improves the quality of cable by preventing the penetration of noise or crosstalk,
it is bulkier and more expensive.
• The most common UTP connector is RJ45 (RJ stands for registered jack), as shown in Figure 7.5. The
RJ45 is a keyed connector, meaning the connector can be inserted in only one way.
Coaxial cable was widely used in analog telephone networks where a single coaxial network could carry
10,000 voice signals.
Later it was used in digital telephone networks where a single coaxial cable could carry digital data up to
600 Mbps.
Cable TV networks also use coaxial cables.
In the traditional cable TV network, the entire network used coaxial cable. Later, however, cable TV
providers replaced most of the media with fiber-optic cable; hybrid networks use coaxial cable only at the
network boundaries, near the consumer premises.
Cable TV uses RG-59 coaxial cable.
Another common application of coaxial cable is in traditional Ethernet LANs.
Micro Waves
Electromagnetic waves ranging in frequencies between 1 and 300 GHz are normally called micro waves.
Microwaves are unidirectional.
When an antenna transmits microwave waves, they can be narrowly focused.
Infrared
Electromagnetic waves ranging in frequencies between 300 GHz and 400 THz are normally called Infrared
waves(wavelength 1mm to 770nm) – used for short-range communication.
Infrared waves, having high frequencies, cannot penetrate walls.
This advantageous characteristic prevents interference between one system and another; a short-range communication
system in one room cannot be affected by another system in the next room.
Layering means decomposing the problem into more manageable components or layers.
Advantages:
1. It provides a more modular design.
2. Easy to troubleshoot.
The basic elements of layered architecture are services, protocols, and interfaces.
• Service: It is a set of actions that a layer provides to the higher layer.
• Protocol: It defines a set of rules that a layer uses to exchange information with a peer
entity. These rules mainly concern both the contents and order of the messages used.
• Interface: It is a way through which the message is transferred from one layer to
another layer.
Framing
• Divides the stream of bits received from the network layer into manageable data units called frames.
Physical addressing
• If frames are to be distributed to different systems on the network, the DLL adds a header to the frame to define the
sender and receiver of the frame.
Access Control
• When two or more devices are connected to the same link, data link layer protocols are necessary to determine which
has control over the link at any given time.
Flow Control
• If the rate at which the data are absorbed by the receiver is less than the rate at which data are produced by the sender
than the DLL impose a flow control mechanism to avoid overwhelming the receiver.
Error control
• It adds reliability to the physical layer by adding mechanism to detect and retransmit damaged or lost frames. Also
uses mechanism to recognize duplicate frames.
Logical Addressing
• The physical addressing implemented by the DL layer handles the addressing problem locally.
• If a packet passes the network boundary, we need another addressing scheme to help distinguish the source
and destination systems.
• This layer adds a header to the packet coming from the upper layer, includes the logical address of the
sender and the receiver.
Routing
• We have written the address but how we will reach that address, for this we use routing protocols and
algorithms.
• When independent networks or links are connected to create internetworks(network of networks) or a large
network, the connecting devices (called routers or switches) route or switch the packets to their final
destination.
The transport layer is responsible for the delivery of a message from one process to another.
Error Control
• Like the DL layer, the transport layer is responsible for error control.
• However, error control at this layer is performed process-to-process rather than across a single link.
• The sending transport layer makes sure that the entire message arrives at the receiving transport layer without
error (damages, loss or duplication).
• This is achieved through retransmission.
The session layer is the network dialog controller. It establishes, maintains, and synchronizes the interaction among
communicating systems.
Dialog Control
• This layer allows two systems to enter into a dialog.
• It allows the communication between two processes to take place in either half-duplex (one way at a time) or full-
duplex (two ways at a time) mode.
Synchronization
• The session layer allows a process to add checkpoints, or synchronization points, to a stream of data.
• For example, if a system is sending a file of 2000 pages, it is advisable to insert checkpoints after every 100 pages to
ensure that each 100-page unit is received and acknowledged independently.
The presentation layer is concerned with the syntax and semantics of the information exchanged between two systems.
The presentation layer is responsible for translation, compression, and encryption.
Translation
• The processes (running programs) in two systems are usually exchanging information in the form of character strings,
numbers, and so on.
• The information must be changed to bit streams before being transmitted.
• It is responsible for interoperability between different encoding methods of different computers.
• The presentation layer at the sender changes the information in its sender-dependent format into a common format.
• The presentation layer at the receiver side changes the common format into its receiver-dependent format.
Encryption
• To carry sensitive information, a system must be able to ensure privacy.
• Encryption means that the sender transforms the original information into another form and sends the resulting
message out over the network.
• Decryption reverses the original process to transform the message back to its original form.
Compression
• Data compression reduces the no of bits contained in the information.
• It becomes important in the transmission of multimedia content such as text, audio, video, etc.,
The application layer provides users support for services such as email, remoter file access and transfer, shared
database management, and other types of distributed information services.
The application layer is responsible for providing services to the user.
4. Application Layer
This layer is équivalent to the combined session, presentation and application layers in the OSI model.
Figure 16.2 Two digital signals: one with two signal levels and the other with four signal levels
A very important consideration in data communications is how fast we can send data, in bits per second, over a
channel.
The data rate depends on three factors:
1. The bandwidth available
2. The level of the signals we use
3. The quality of the channel (the level of noise)
Throughput
• The throughput is a measure of how fast we can actually send data through a network. The throughput is an actual
measurement of how fast we can send data.
• For example, we may have a link with a bandwidth of 1 Mbps, but the devices connected to the end of the link may
handle only 200 kbps. This means that we cannot send more than 200 kbps through this link.
• Propagation Time
• It is the time required for a bit to travel from the source to the destination.
Propagation time = Distance / Propagation speed
18. Switching
o The technique of transferring information from one computer network toanother network is known as switching.
o It helps in deciding the best route for data transmission if there are multiple paths in a larger network.
o A switch is a small hardware device that is used to join multiple computers together with one local area network
(LAN).
o Switches are devices capable of creating temporary connections between two ormore devices linked to the switch.
o Switches are used to forward the packets based on MAC addresses.
o A Switch is used to transfer the data only to the device that has been addressed. It verifies the destination address to
route the packet appropriately.
o It is operated in full duplex mode.
o A technique in which the message is sent in onego, but it is divided into smaller pieces, and they are sent individually.
o The message splits into smaller pieces known as packets and packets are given aunique number to identify their order
at the receiving end.
o Every packet contains some information in its headers such as source address,destination address and sequence
number.
o Packets will travel across the network, taking the shortest path as possible.
o All the packets are reassembled at the receiving end in correct order.
o If the correct order of the packets is reached, then the acknowledgment messagewill be sent.