Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 54

Networking Fundamentals

COMPUTER N/W SARITA PATIL 1


BITL301 Computer Network

Teaching Scheme: Credit Examination


TH: 04 Hours/Week 04 Scheme:
TU:---Hour/Week TAE: 20 Marks
CAE: 20 Marks
ESE: 60 Marks
Prerequisite:- Data Communication
 

COMPUTER N/W SARITA PATIL 2


UCOL205: Computer Networks
Teaching Scheme: Credit: Examination Scheme:
Lectures: 03 Hrs./Week 3 TAE: 10 Marks , CAE: 15 Marks, ESE :50 Marks
 
Prerequisite (If any):
Course Objectives: After completing this course, student will be able to

1. Build an understanding of the fundamental concepts of computer networking


2. Know about routing mechanisms and different routing protocols
3. Understand transport layer functions
4. Know about different application layer protocols
Couse Outcomes:
 CO1.  Summarize services offered by layers of OSI model and TCP/IP model
 CO2.  Determine the different network management techniques of various protocol.
CO3. Explaining wireless network and different wireless standards.
CO4: : Explore various recent trends in networking.

COMPUTER N/W SARITA PATIL 3


• Course OCourse Objectives:
• 1. To understand services offered by layers of OSI model
• 2.To understand various topological network architectures
and essential components to design it.
• 3.To provide routing and network management techniques
• 4.To understand various application layer protocols and its
applications in client / server.
• 5.To fathom wireless network and different wireless
standards.
• 6.To explore recent trends in networking.bjectives:
• 1. To understand services offered by layers of OSI model
• 2.To understand various topological network architectures and
essential components to design it.
COMPUTER N/W SARITA PATIL 4
Course Outcomes:
• Course Outcomes:
Graduates shall be able to:
•1.Graduates shall be able to:
Describe & classify various protocols, models in network.
•2.
Describe
Discuss&&classify
designvarious protocols,using
the network models in network.
various routing
•algorithms.
Discuss & design the network using various routing algorithms.
•3.
Differentiate & summarize
Differentiate variousvarious
& summarize congestion control &control &
congestion
avoidance algorithm.
avoidance algorithm.
• Categorize & explain recent technologies in computer network.
4. Categorize & explain recent technologies in computer
network.

COMPUTER N/W SARITA PATIL 5


Unit I Introduction to Computer Networks and Logical Link 07 Hours
Medium Access Control
Introduction – Network architecture -Design. Reference models- The OSI Reference Model- The TCP/IP
Reference Model - A Comparison of the OSI and TCP/IP Reference Models
Design Issues, Switching Techniques: Circuit and Packet Switching, Connectionless and Connection-
oriented Services, Virtual Circuit and Datagram Subnets .Autonomous system

Unit II Network Layer-I


07 Hours
Routing Algorithms: Optimality principle, shortest path routing, flooding, Distance Vector routing, link
state routing, hierarchical routing. Network layer services, IP protocol, IPv4, Problems with IPv4,IPV6,
Subnetting, Network layer Protocols: ARP, RARP, ICMP, DHCP, Unicast Routing Algorithms: RIP, OSPF,
BGP

Unit III Transport Layer 08 Hours


UDP : UDP functionality, UDP Header;
TCP : TCP Features, byte-stream, Connection-oriented, TCP Header Format, 2-way, 3-way Handshake,
TCP State Diagram, TCP Sliding Window, Congestion Control Algorithms, Leaky Bucket, Token Bucket,
Congestion Avoidance, TCP Tahoe, Fast Retransmit, Fast Recovery, Timer Management.

COMPUTER N/W SARITA PATIL 6


Unit IV Application Layer 07 Hours
Domain Name System (DNS), Naming and Address Schemes, DNS servers, Email:
MIME, SMTP and POP3. Remote login, File Transfer Protocol (FTP), SNMP, DHCP and
BOOTP.
World Wide Web, HTTP
Unit V WIRELESS LAN,MAN,WAN 08 Hours
Introduction (Infrastructure and Ad-hoc Networks),Fundamentals of WLAN – technical
issues, Network Architecture, IEEE 802.11- physical layer, Mac Layer Mechanism,
CSMA/CA, Bluetooth - Specification, Transport Layer, Middleware Protocol Group,
Bluetooth Profiles of IEEE 802.16 –differences between IEEE 802.11 and 802.16,
Unit VI SENSOR NETWORKS and Protocol 07 Hours
Sensor Node Architecture (hardware components),Sensor Network Architectures (Concept
of sink and source, Topologies, Design Principles)
Routing in MANET : AODV, DSDV, DSR
Routing Protocols for WSNs: Flooding, SPIN, LEACH,PEGASIS, Directed Diffusion,
Geographic Routing
COMPUTER N/W SARITA PATIL 7
• Text:
• Andrew S. Tanenbaum, "Computer Networks", PHI, Fifth
Edition, ISBN : 978-0132-126953
• Behrouz A. Forouzan, TCP/IP Protocol Suite, McGraw Hill
Education, ISBN: 978-0-07-070652-1,
• 4th Edition.
• Reference:
• James F. Kurose and Keith W. Ross, "Computer Networking:
A Top-Down Approach Featuring
• the Internet", Pearson Education, 6th Edition, ISBN : 978-
02737-68968

COMPUTER N/W SARITA PATIL 8


What we cover in this chapter
• 1.What is a Computer Network?
• 2.Difference between LAN/WAN
• 3.Site-to-Site WAN topologies 
• 4.Collision Domain
• 5.Broadcast Domain
• 6.Networking devices 

COMPUTER N/W SARITA PATIL 9


What is a computer network?
A set of computers connected together for sharing information & resources

COMPUTER N/W SARITA PATIL 10


A Simple Network

COMPUTER N/W SARITA PATIL 11


Benefits of a Network

• Information sharing: Authorized users can use other


computers on the network to access and share information
and data. This could include special group projects,
databases, etc.
• Hardware sharing: One device connected to a network,
can be shared by many users.
• Software sharing: Instead of purchasing and installing a
software program on each computer, it can be installed on
the server. All of the users can then access the program from
a single location.

COMPUTER N/W SARITA PATIL 12


Types of Networks
• Local Area Network (LAN) – It is a group of network components that work
within small area.
• Wide Area Network (WAN) – It is a group of LANs that are interconnected within
large area.

COMPUTER N/W SARITA PATIL 13


Site to Site WAN Topology
• Hub and Spoke Topology: The hub and spoke topology is a network
design where we have a central device (the hub) that is connected to
multiple other devices (the spokes).

• Full Mesh Topology: when every node has a circuit connecting it to


every other node in a network.

• Partial Mesh Topology :full mesh scheme but others are only


connected to one or two in the network.

COMPUTER N/W SARITA PATIL 14


Hub and Spoke Topology

COMPUTER N/W SARITA PATIL 15


Full Mesh Topology

COMPUTER N/W SARITA PATIL 16


Partial Mesh Topology

COMPUTER N/W SARITA PATIL 17


What is a Collision Domain?
• What is a Collision?
Ethernet uses CSMA/CD
for determining when a computer is free to
transmit data thru the medium. Using
CSMA/CD all computers monitor the
transmission medium and wait until the
medium is free before transmitting. If two
computers try to transmit at the same time a
collision will occur.
• What is a Collision Domain?
Only one device in the collision
domain may transmit at any one time, and
the other devices in the domain listen to the
network in order to avoid data collisions.

COMPUTER N/W SARITA PATIL 18


What is a Broadcast Domain?
• A Broadcast Domain consists of all the
devices that will receive any broadcast
packet originating from any device
within the network segment.
• In the picture, "Computer A" is sending
a broadcast and switch will forward it to
every ports and all the switches will get
a copy of broadcast packet. Every switch
will flood the broadcast packet to all the
ports. Router also will get a copy of
broadcast packet, but the Router will
not forward the packet to the next
network segment.

COMPUTER N/W SARITA PATIL 19


Networking Devices

COMPUTER N/W SARITA PATIL 20


Repeater
• A repeater does exactly that – It
repeats any electric signals that
come into one port out of its
other port.
• Ethernet or WiFi data
transmissions can only span a
limited distance. Repeater helps
to extend that distance.

COMPUTER N/W SARITA PATIL 21


HUB
• A HUB is a multiport repeater.
• It allows to connect multiple PCs to a single
network.
• A HUB receives signal from one port and
transmit it to all the other devices
connected in that HUB. It is not an
intelligent device. If a computer A sends
out a signal, computer B,C & D will also
receive even though it was meant only for
computer B.
• It is a Half duplex Device.
• One collision domain and one broadcast
domain per device.

COMPUTER N/W SARITA PATIL 22


Switch
• A switch is an intelligent device.
• Unlike network hubs, a network switch
forwards data only to one or multiple
devices that need to receive it, rather than
broadcasting the same data out of each of
its ports.
• If computer A send a message to computer
B, a switch will make sure that only
computer B receives it.
• Switch can operate as full duplex or half
duplex.
• It has one collision domain per port and
one broadcast domain per device.

COMPUTER N/W SARITA PATIL 23


Bridge
• A bridge does the same function
as a switch. But it is slower and
has less ports than a switch.
(Switch has 24 & 48 ports
whereas bridge has 2 ports)
• It operates only in Half duplex
mode.
• One collision domain per port
and one broadcast domain per
device.

COMPUTER N/W SARITA PATIL 24


Router
• Routers joins multiple networks
together. It forward packets based
on IP addresses.
• A router is the device which allows
a PC to connect to WAN
link/Internet.
• A router finds the best path to the
destination.
• One collision domain per port and
one broadcast domain per port.
(Router breaks broadcast domain.)
COMPUTER N/W SARITA PATIL 25
Firewall
• Primary function of a Firewall is to
protect a network from
unauthorized users/hackers.
• Firewalls can be configured with
"rules". Firewall rules can be used to
allow/deny network traffic from/to
the network. These rules can be
based on Source/Destination
network, Source/Destination IP
Address, Source/Destination
TCP/UDP port numbers, Protocols,
Applications etc.
COMPUTER N/W SARITA PATIL 26
Wireless Access Points
• When you don’t have Wi-Fi on
a device, If you want Wi-Fi for
that device you can use
wireless access point and
connect to the device that you
need wi-fi.

COMPUTER N/W SARITA PATIL 27


Load Balancer
• Load balancers allow you to
distribute load between
several servers.
• Advantages of load balancer is
Reliability and capacity.

COMPUTER N/W SARITA PATIL 28


OSI Model

COMPUTER N/W SARITA PATIL 29


OSI Model
OSI stands for Open System Interconnection is a
reference model
describes how information from software application in
one computer moves through a physical medium to the
software application in another computer.
OSI consists of seven layers, and each layer performs a
particular network function.

COMPUTER N/W SARITA PATIL 30


Continue
Developed by the International Organization for Standardization (ISO) in 1984,

now considered as an architectural model for the inter-computer


communications.

Divides the whole task into seven smaller and manageable tasks.

Each layer is assigned a particular task

Each layer is self-contained, so that task assigned to each layer can be


performed independently.

COMPUTER N/W SARITA PATIL 31


Characteristics of OSI Model:

COMPUTER N/W SARITA PATIL 32


Characteristics of OSI Model:
Divided into two layers: upper layers and lower layers.
The upper layer of the OSI model
 deals with the application related issues, and they are implemented only in
the software.
 The application layer is closest to the end user. Both the end user and the
application layer interact with the software applications.
 An upper layer refers to the layer just above another layer.
The lower layer of the OSI model
 deals with the data transport issues. The data link layer and the physical layer
are implemented in hardware and software.
 The physical layer is the lowest layer of the OSI model and is closest to the
physical medium.
 The physical layer is mainly responsible for placing the information on the
physical medium.
COMPUTER N/W SARITA PATIL 33
OSI Layers
• There are the seven OSI layers. Each layer has different
functions. A list of seven layers are given below:
• Physical Layer
• Data-Link Layer
• Network Layer
• Transport Layer
• Session Layer
• Presentation Layer
• Application Layer
COMPUTER N/W SARITA PATIL 34
Functions of the OSI Layers

COMPUTER N/W SARITA PATIL 35


 The It is the lowest layer of the OSI model.
Physical layer  Transmit the individual bits from one node to another
node.
 Establishes, maintains and deactivates the physical
connection.
 Specifies the mechanical, electrical and procedural
network interface specifications.
Functions of a Physical layer:
 Line Configuration: It defines the way how two or more
devices can be connected physically.
 Data Transmission: It defines the transmission mode
whether it is simplex, half-duplex or full-duplex mode
between the two devices on the network.
 Topology:  defines the way how network devices are
arranged.
 Signals:  determines the type of the signal used for
transmitting the information.

COMPUTER N/W SARITA PATIL 36


• responsible for the error-free transfer of data
Data-Link Layer frames.
• defines the format of the data on the network.
• provides a reliable and efficient communication
between two or more devices.

• Responsible for the unique identification of


each device that resides on a local network.
• Contains two sub-layers:
• Logical Link Control Layer
• responsible for transferring the packets to the Network
layer of the receiver that is receiving.
• identifies the address of the network layer protocol from
the header.
• provides flow control.
• Media Access Control Layer
• a link between the Logical Link Control layer and the
network's physical layer.
• used for transferring the packets over the network.

COMPUTER N/W SARITA PATIL 37


Functions of the Data-link layer
•Framing: The data link layer translates the physical's raw bit stream into packets known as
Frames. The Data link layer adds the header and trailer to the frame. The header which is added
to the frame contains the hardware destination and source address. 

•Physical Addressing: The Data link layer adds a header to the frame that contains a
destination address. The frame is transmitted to the destination address mentioned in the
header.

•Flow Control: Flow control is the main functionality of the Data-link layer. It is the technique
through which the constant data rate is maintained on both the sides so that no data get
corrupted. It ensures that the transmitting station such as a server with higher processing
speed does not exceed the receiving station, with lower processing speed.

•Error Control: Error control is achieved by adding a calculated value CRC (Cyclic Redundancy
Check) that is placed to the Data link layer's trailer which is added to the message frame before
it is sent to the physical layer. If any error seems to occurr, then the receiver sends the
acknowledgment for the retransmission of the corrupted frames.

•Access Control: When two or more devices are connected to the same communication
channel, then the data link layer protocols are used to determine which device has control over
the link at a given time.
COMPUTER N/W SARITA PATIL 38
• It is a layer 3 that manages device
Network Layer addressing, tracks the location of
devices on the network.
• It determines the best path to move
data from source to the destination
based on the network conditions, the
priority of service, and other factors.
• The Data link layer is responsible for
routing and forwarding the packets.
• Routers are the layer 3 devices, they
are specified in this layer and used to
provide the routing services within an
internetwork.
• The protocols used to route the
network traffic are known as Network
layer protocols. Examples of protocols
are IP and Ipv6.
COMPUTER N/W SARITA PATIL 39
Functions of Network Layer:
• Internetworking: An internetworking is the main responsibility of the
network layer. It provides a logical connection between different devices.
• Addressing: A Network layer adds the source and destination address to
the header of the frame. Addressing is used to identify the device on the
internet.
• Routing: Routing is the major component of the network layer, and it
determines the best optimal path out of the multiple paths from source
to the destination.
• Packetizing: A Network Layer receives the packets from the upper layer
and converts them into packets. This process is known as Packetizing. It is
achieved by internet protocol (IP).

COMPUTER N/W SARITA PATIL 40


Transport Layer

COMPUTER N/W SARITA PATIL 41


• The Transport layer is a Layer 4 ensures that messages are transmitted in the order in which
they are sent and there is no duplication of data.
• The main responsibility of the transport layer is to transfer the data completely.
• It receives the data from the upper layer and converts them into smaller units known as
segments.
• This layer can be termed as an end-to-end layer as it provides a point-to-point connection
between source and destination to deliver the data reliably.
• The two protocols used in this layer are:
• Transmission Control Protocol
• It is a standard protocol that allows the systems to communicate over the internet.
• It establishes and maintains a connection between hosts.
• When data is sent over the TCP connection, then the TCP protocol divides the data into smaller units
known as segments. Each segment travels over the internet using multiple routes, and they arrive in
different orders at the destination. The transmission control protocol reorders the packets in the correct
order at the receiving end.
• User Datagram Protocol
• User Datagram Protocol is a transport layer protocol.
• It is an unreliable transport protocol as in this case receiver does not send any acknowledgment when
the packet is received, the sender does not wait for any acknowledgment. Therefore, this makes a
protocol unreliable.
COMPUTER N/W SARITA PATIL 42
COMPUTER N/W SARITA PATIL 43
Session Layer

COMPUTER N/W SARITA PATIL 44


• It is a layer 3 in the OSI model.
• The Session layer is used to establish, maintain and synchronizes the
interaction between communicating devices.
• Functions of Session layer:
• Dialog control: Session layer acts as a dialog controller that creates a
dialog between two processes or we can say that it allows the
communication between two processes which can be either half-duplex
or full-duplex.
• Synchronization: Session layer adds some checkpoints when transmitting
the data in a sequence. If some error occurs in the middle of the
transmission of data, then the transmission will take place again from the
checkpoint. This process is known as Synchronization and recovery.

COMPUTER N/W SARITA PATIL 45


Presentation Layer

A Presentation layer is mainly


concerned with the syntax and
semantics of the information
exchanged between the two
systems.
It acts as a data translator for a
network.
This layer is a part of the
operating system that converts
the data from one presentation
format to another format.
The Presentation layer is also
known as the syntax layer.

COMPUTER N/W SARITA PATIL 46


• Functions of Presentation layer:
• Translation: The processes in two systems exchange the information in
the form of character strings, numbers and so on. Different computers
use different encoding methods, the presentation layer handles the
interoperability between the different encoding methods. It converts the
data from sender-dependent format into a common format and changes
the common format into receiver-dependent format at the receiving end.
• Encryption: Encryption is needed to maintain privacy. Encryption is a
process of converting the sender-transmitted information into another
form and sends the resulting message over the network.
• Compression: Data compression is a process of compressing the data,
i.e., it reduces the number of bits to be transmitted. Data compression is
very important in multimedia such as text, audio, video.

COMPUTER N/W SARITA PATIL 47


• An application layer serves
Application Layer as a window for users and
application processes to
access network service.
• handles issues such as
network transparency,
resource allocation, etc.
• An application layer is not
an application, but it
performs the application
layer functions.
• This layer provides the
network services to the
end-users.
COMPUTER N/W SARITA PATIL 48
Functions of Application layer:
• File transfer, access, and management (FTAM): An
application layer allows a user to access the files in a remote
computer, to retrieve the files from a computer and to
manage the files in a remote computer.

• Mail services: An application layer provides the facility for


email forwarding and storage.

• Directory services: An application provides the distributed


database sources and is used to provide that global
information about various objects.
COMPUTER N/W SARITA PATIL 49
Autonomous System (AS)
• AS stands for Autonomous System, is a portion of a large internetwork
that is under a given administrative authority.
• Autonomous systems can be under the authority of a particular
corporation or institution, or they can be defined by the uniform use
of a particular routing protocol such as Open Shortest Path First (OSPF
).
• Networks within an autonomous system communicate routing
information to each other using an Interior Gateway Protocol (IGP).
• An autonomous system shares routing information with other
autonomous systems using the Border Gateway Protocol (BGP). 

COMPUTER N/W SARITA PATIL 50


Autonomous
systems are part of
the routing
infrastructure of a
large internetwork
and can be
subdivided into
routing domains.

COMPUTER N/W SARITA PATIL 51


types of autonomous systems:

• Stub AS:
• This AS is connected to only one other AS. A corporate network that is connected to an AS is
considered to have the same AS number as the AS it is connected to.
• Transit AS:
• This AS is connected to more than one other AS and can be used for transit traffic between
autonomous systems. They are usually administered by large Internet service providers (ISPs).
• Multihomed AS:
• This AS is connected to more than one other AS but does not let transit traffic from another
AS pass through itself. An example might be a corporate network with several Internet
connections to different ISPs.
• Internet Exchange Point (IX or IXP): A physical infrastructure through which ISPs or 
content delivery networks (CDNs) exchange internet traffic between their networks
(autonomous systems).
• An Internet exchange point (IX or IXP) is the physical infrastructure through which 
Internet service providers (ISPs) and content delivery networks (CDNs) exchange Internet
traffic between their networks (autonomous
COMPUTER N/W
systems)SARITA PATIL 52
COMPUTER N/W SARITA PATIL 53
COMPUTER N/W SARITA PATIL 54

You might also like