Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 87

Department of Applied Computational Science & Engg.

Program:
Course Code:
Course Name:
Lecture No:
Department of Applied Computational Science & Engg.
C ourse Code : Course Name:

Course Outcomes :

Program Name: Program Code:


Department of Applied Computational Science & Engg.
Course Code : Course Name:

Course Prerequisites

students must possess a foundational understanding of computer science


principles, including familiarity with operating systems, data structures, and
algorithms. Additionally, a basic grasp of networking concepts such as IP
addressing, protocols, and network topologies is required. Proficiency in
fundamental programming languages like Python or Java is recommended to
comprehend network programming aspects. This course is designed to build
upon these prerequisites, offering an introductory exploration of network
architectures, protocols, and technologies.

Program Name: Program Code:


Department of Applied Computational Science & Engg.
Course Code : Course Name:

Syllabus

Program Name: Program Code:


Department of Applied Computational Science & Engg.
Course Code : Course Name:

• Lecture Objectives
The lecture aims to achieve several objectives, including familiarizing students
with the fundamental concepts and principles of computer networks, providing
insight into various network architectures and protocols, exploring the
functionality of networking devices and their interactions within network
infrastructures, examining common networking challenges and solutions, and
fostering the development of critical thinking and problem-solving skills
applicable to real-world networking scenarios. Through theoretical
explanations, practical demonstrations, and interactive discussions, the lecture
endeavors to equip students with the knowledge and skills necessary to
comprehend, analyze, and design computer networks effectively.
Department of Applied Computational Science & Engg.
Course Code : Course Name:

Lecture Outcomes
• Understand the foundational principles and terminology of computer
networks, including the OSI model, TCP/IP protocol suite, and network
addressing.
• Analyze and compare different network architectures such as LANs, WANs,
and wireless networks, along with their respective advantages and
limitations.
• Evaluate various network protocols and their roles in data communication,
including TCP, UDP, IP, HTTP, and DNS.
• Understand the foundational of network devices such as routers, switches,
and firewalls.
Department of Applied Computational Science & Engg.
Course Code : Course Name:

Recommended Books

Program Name: Program Code:


Department of Applied Computational Science & Engg
Course Code :(KCS- 603) Course Name:Computer Networks

DATA & INFORMATION

Data refers to the raw facts that are collected while information refers to processed data that
enables us to take decisions.
Ex. When result of a particular test is declared it contains data of all students, when you find the
marks you have scored you have the information that lets you know whether you have passed or
failed.
The word data refers to any information which is presented in a form that is agreed and
accepted upon by is creators and users.

Program Name: B.Tech. Program Code:


Department of Applied Computational Science & Engg
Course Code :(KCS- 603) Course Name:Computer Networks

DATA COMMUNICATION
▸ Data Communication is a process of exchanging data or information.
▸ In case of computer networks this exchange is done between two devices over a transmission
medium.
▸ This process involves a communication system which is made up of hardware and software.
The hardware part involves the sender and receiver devices and the intermediate devices
through which the data passes. The software part involves certain rules which specify what is
to be communicated, how it is to be communicated and when. It is also called as a Protocol.
▸ The following sections describes the fundamental characteristics that are important for the
effective working of data communication process and is followed by the components that
make up a data communications system.

Program Name: B.Tech. Program Code:


Department of Applied Computational Science & Engg
Course Code :(KCS- 603) Course Name:Computer Networks

Characteristics of Data Communication


▸ The effectiveness of any data communications system depends upon the following four
fundamental characteristics:
▸ Delivery: The data should be delivered to the correct destination and correct user.
▸ Accuracy: The communication system should deliver the data accurately, without
introducing any errors. The data may get corrupted during transmission affecting the
accuracy of the delivered data.
▸ Timeliness: Audio and Video data has to be delivered in a timely manner without any
delay; such a data delivery is called real time transmission of data.
▸ Jitter: It is the variation in the packet arrival time. Uneven Jitter may affect the
timeliness of data being transmitted.

Program Name: B.Tech. Program Code:


Department of Applied Computational Science & Engg
Course Code :(KCS- 603) Course Name:Computer Networks

Components of Data Communication


▸ Message is the information to be communicated by the sender to the receiver.
▸ Sender is any device that is capable of sending the data (message).
▸ Receiver is a device that the sender wants to communicate the data (message).
▸ Transmission Medium It is the path by which the message travels from sender to receiver. It can be
wired or wireless and many subtypes in both.
▸ Protocol
▹ is an agreed upon set or rules used by the sender and receiver to communicate data.
▹ A protocol is a set of rules that governs data communication.
▹ A Protocol is a necessity in data communications without which the communicating entities are
like two persons trying to talk to each other in a different language without know the other
language.

Program Name: B.Tech. Program Code:


Department of Applied Computational Science & Engg
Course Code :(KCS- 603) Course Name:Computer Networks

Components of Data Communication

Program Name: B.Tech. Program Code:


Department of Applied Computational Science & Engg
Course Code :(KCS- 603) Course Name:Computer Networks

▸ Text
DATA REPRESENTATION
▹ Text includes combination of alphabets in small case as well as upper case.
▹ It is stored as a pattern of bits. Prevalent encoding system : ASCII, Unicode
▸ Numbers
▹ Numbers include combination of digits from 0 to 9.
▹ It is stored as a pattern of bits. Prevalent encoding system : ASCII, Unicode
▸ Images
▸ An image is worth a thousand words‖ is a very famous saying. In computers images are digitally stored.
▹ A Pixel is the smallest element of an image. To put it in simple terms, a picture or image is a matrix of pixel
elements.
▹ The pixels are represented in the form of bits. Depending upon the type of image (black n white or color) each pixel
would require different number of bits to represent the value of a pixel.
▹ The size of an image depends upon the number of pixels (also called resolution) and the bit pattern used to indicate
the value of each pixel.

Program Name: B.Tech. Program Code:


Department of Applied Computational Science & Engg
Course Code :(KCS- 603) Course Name:Computer Networks
▹ Example: if an image is purely black and white (two color) each pixel can be
represented by a value either 0 or 1, so an image made up of 10 x 10 pixel elements
would require only 100 bits in memory to be stored. On the other hand an image
that includes gray may require 2 bits to represent every pixel value (00 - black, 01 –
dark gray, 10
▹ light gray, 11 –white). So the same 10 x 10 pixel image would now require 200 bits of
memory to be stored.
▹ Commonly used Image formats : jpg, png, bmp, etc
▸ Audio
▹ Data can also be in the form of sound which can be recorded and broadcasted.
Example: What we hear on the radio is a source of data or information. Audio data is
continuous, not discrete.
▸ Video
▹ Video refers to broadcasting of data in form of picture or movie

Program Name: B.Tech. Program Code:


Department of Applied Computational Science & Engg
Course Code :(KCS- 603) Course Name:Computer Networks

DATA FLOW
▸ Data Flow is devices communicate with each other by sending and receiving data.
The data can flow between the two devices in the following ways.
▹ Simplex
▹ Half Duplex
▹ Full Duplex

Program Name: B.Tech. Program Code:


Department of Applied Computational Science & Engg
Course Code :(KCS- 603) Course Name:Computer Networks

Simplex
▸ In Simplex, communication is unidirectional
▸ Only one of the devices sends the data and the other one only receives the data.
▸ Example: in the above diagram: a cpu send data while a monitor only receives data.

Program Name: B.Tech. Program Code:


Department of Applied Computational Science & Engg
Course Code :(KCS- 603) Course Name:Computer Networks

Half Duplex
▸ In half duplex both the stations can transmit as well as receive but not at the same
time.
▸ When one device is sending other can only receive and viceversa (as shown in figure
above.)
▸ Example: A walkie-talkie.

Program Name: B.Tech. Program Code:


Department of Applied Computational Science & Engg
Course Code :(KCS- 603) Course Name:Computer Networks
Full Duplex
▸ In Full duplex mode, both stations can transmit and receive at the same time.
▸ Example: mobile phones

Program Name: B.Tech. Program Code:


Department of Applied Computational Science & Engg
Course Code :(KCS- 603) Course Name:Computer Networks

COMPUTER NETWORK
▸ An interconnected collection of autonomous computers is called a computer
network. Two computers are said to be interconnected if they are able to exchange
the information. If one computer can forcibly start, stop and control another one,
the computers are not autonomous. A system with one control unit and many slaves
is not a network, nor is a large computer with remote printers and terminals.
▸ A Compute network should ensure
▹ Reliability of the data communication process, should c
▹ Security of the data
▹ Performance by achieving higher throughput and smaller delay times

Program Name: B.Tech. Program Code:


Department of Applied Computational Science & Engg
Course Code :(KCS- 603) Course Name:Computer Networks
 A computer network is a group of computers/devices (Nodes)
that use a set of common communication protocols over digital
interconnections for the purpose of sharing resources located on or
provided by the network nodes.
 The nodes of a computer network may include personal
computers, servers, networking hardware, or other specialised or
general-purpose hosts.
 The interconnections between nodes are formed from a broad
spectrum of telecommunication network technologies, based on
physically wired, optical, and wireless technologies.
 A communication protocol is a set of rules for exchanging
information over a network. physically wired, optical, and
wireless

Program Name: B.Tech. Program Code:


Department of Applied Computational Science & Engg
Course Code :(KCS- 603) Course Name:Computer Networks
Wired Network PC Firewall The Internet

Fiber Optic Network Cable

Router
Switch

Server Other LANS

Wireless Network
Program Name: B.Tech. Program Code:
Department of Applied Computational Science & Engg
Course Code :(KCS- 603) Course Name:Computer Networks

Physical Structures of Network


Type of Connection

▸ A network is two or more devices connected through links. A link is a


communications pathway that transfers data from one device to another. For
visualization purposes, it is simplest to imagine any link as a line drawn between
two points. For communication to occur, two devices must be connected in some
way to the same link at the same time. There are two possible types of
connections: point-to-point and multipoint.
▹ Point-to-Point
▹ Point-to-Multipoint

Program Name: B.Tech. Program Code:


Department of Applied Computational Science & Engg
Course Code :(KCS- 603) Course Name:Computer Networks

Point-to-Point
▸ A point-to-point connection provides a dedicated link between two devices. The
entire capacity of the link is reserved for transmission between those two
devices. Most point-to-pointconnections use an actual length of wire or cable to
connect the two ends, but other options, such as microwave or satellite links, are
also possible. When you change television channels by infrared remote control,
you are establishing a point-to-point connection between the remote control and
the television's control system.

Program Name: B.Tech. Program Code:


Department of Applied Computational Science & Engg
Course Code :(KCS- 603) Course Name:Computer Networks
Point-to-Multipoint
▸ A multipoint (also called multidrop) connection is one in which more than two
specific devices share a single link. In a multipoint environment, the capacity of
the channel is shared, either spatially or temporally. If several devices can use
the link simultaneously, it is a spatially shared connection. If users must take
turns, it is a timeshared connection.

Program Name: B.Tech. Program Code:


Department of Applied Computational Science & Engg
Course Code :(KCS- 603) Course Name:Computer Networks
Physical Topology
▸ The term physical topology refers to the way in which a network is laid out
physically. One or more devices connect to a link; two or more links form a
topology. The topology of a network is the geometric representation of the
relationship of all the links and linking devices (usually called nodes) to one another.
There are four basic topologies possible:
▹ Bus Topology
▹ Star Topology
▹ Ring Topology
▹ Mesh Topology

Program Name: B.Tech. Program Code:


Department of Applied Computational Science & Engg
Course Code :(KCS- 603) Course Name:Computer Networks
Bus Topology
▸ Bus topology was the one of the first topologies used in the design of early local area networks. Ethernet
LANs can use a bus topology, but they are less popular.
▸ The preceding examples all describe point-to-point connections. A bus topology, on the other hand, is
multipoint. One long cable acts as a backbone to link all the devices in a network .
▸ Nodes are connected to the bus cable by drop lines and taps. A drop line is a connection running between
the device and the main cable. A tap is a connector that either splices into the main cable or punctures the
sheathing of a cable to create a contact with the metallic core. As a signal travels along the backbone, some
of its energy is transformed into heat. Therefore, it becomes weaker and weaker as it travels farther and
farther. For this reason there is a limit on the number of taps a bus can support and on the distance
between those taps.

Program Name: B.Tech. Program Code:


Star Topology Department of Applied Computational Science & Engg
Course Code :(KCS- 603) Course Name:Computer Networks
▸ In a star topology, each device has a dedicated point-to-point link only to a central controller, usually called a
hub. The devices are not directly linked to one another. Unlike a mesh topology, a star topology does not
allow direct traffic between devices. The controller acts as an exchange: If one device wants to send data to
another, it sends the data to the controller, which then relays the data to the other connected device .
▸ A star topology is less expensive than a mesh topology. In a star, each device needs only one link and one I/O
port to connect it to any number of others. This factor also makes it easy to install and reconfigure. Far less
cabling needs to be housed, and additions, moves, and deletions involve only one connection: between that
device and the hub.

Program Name: B.Tech. Program Code:


Department of Applied Computational Science & Engg
Course Code :(KCS- 603) Course Name:Computer Networks
Ring Topology
▸ Ring Topology In a ring topology, each device has a dedicated point-to-point connection with only the two
devices on either side of it. A signal is passed along the ring in one direction, from device to device, until it
reaches its destination. Each device in the ring incorporates a repeater. When a device receives a signal
intended for another device, its repeater regenerates the bits and passes them along A ring is relatively
easy to install and reconfigure. Each device is linked to only its immediate neighbors (either physically or
logically). To add or delete a device requires changing only two connections. The only constraints are
media and traffic considerations (maximum ring length and number of devices). In addition, fault isolation
is simplified. Generally in a ring, a signal is circulating at all times. If one device does not receive a signal
within a specified period, it can issue an alarm. The alarm alerts the network operator to the problem and
its location.
▸ However, unidirectional traffic can be a disadvantage. In a simple ring, a break in the ring (such as a
disabled station) can disable the entire network. This weakness can be solved by using a dual ring or a
switch capable of closing off the break. Ring topology was prevalent when IBM introduced its local-area
network Token Ring. Today, the need for higher-speed LANs has made this topology less popular. Hybrid
Topology A network can be hybrid. For example, we can have a main star topology with each branch
connecting several stations in a bus topology as shown in Figure

Program Name: B.Tech. Program Code:


Department of Applied Computational Science & Engg
Course Code :(KCS- 603) Course Name:Computer Networks

Program Name: B.Tech. Program Code:


Department of Applied Computational Science & Engg
Course Code :(KCS- 603) Course Name:Computer Networks
Mesh Topology
▸ A network setup where each computer and network device is interconnected with one another, allowing
for most transmissions to be distributed even if one of the connections go down. It is a topology commonly
used for wireless networks. Below is a visual example of a simple computer setup on a network using
a mesh topology.
▸ Advantages of a mesh topology
▹ Manages high amounts of traffic, because multiple devices can transmit data simultaneously.
▹ A failure of one device does not cause a break in the network or transmission of data.
▹ Adding additional devices does not disrupt data transmission between other devices.
▸ Disadvantages of a mesh topology
▹ The cost to implement is higher than other network topologies, making it a less desirable option.
▹ Building and maintaining the topology is difficult and time consuming.
▹ The chance of redundant connections is high, which adds to the high costs and potential for reduced
efficiency.
Program Name: B.Tech. Program Code:
Department of Applied Computational Science & Engg
Course Code :(KCS- 603) Course Name:Computer Networks

Program Name: B.Tech. Program Code:


Department of Applied Computational Science & Engg
Course Code :(KCS- 603) Course Name:Computer Networks

Categories of Network
▸ Networks are categorized on the basis of their size. The three basic categories of
computer networks are:
▹ Local Area Networks (LAN)
▹ Metropolitan Area Network (MAN)
▹ Wide Area Network (WAN)

Program Name: B.Tech. Program Code:


Department of Applied Computational Science & Engg
Course Code :(KCS- 603) Course Name:Computer Networks
Local Area Networks (LAN)
▸ privately-owned networks within a single building or campus of up to a few kilometers in size.
▸ LANs operate at up to 10 Gbps Various topologies are possible for broadcast LANs.
▸ LAN’s will be either wired or wireless. Twisted pair, coax or fiber optic cable will be utilized in wired
LAN’s.
▸ Every LAN uses a protocol –a set of rules that governs, however, packets are designed and transmitted.
▸ Nodes in a LAN are joined at the side of an exact topology.
▸ The topologies included are Bus
▹ Ring
▹ Bus
▹ Star

Program Name: B.Tech. Program Code:


Department of Applied Computational Science & Engg
Course Code :(KCS- 603) Course Name:Computer Networks

Program Name: B.Tech. Program Code:


Department of Applied Computational Science & Engg
Course Code :(KCS- 603) Course Name:Computer Networks

Metropolitan Area Network (MAN)


▸ The metropolitan area network (MAN) is designed to extend over an entire city.
▸ It may be a single network such as cable television network available in many cities.
▸ A MAN uses distributed queue dual bus.
▸ Range: Within 100 km (a city)
▸ Advantage:
▸ It provides a good back bone for a large network and provides greater access to WANs.
▸ The dual bus used in MAN helps the transmission of data in both direction simultaneously.
▸ A Man usually encompasses several blocks of a city or an entire city.
▸ Disadvantage:
▸ More cable required for a MAN connection from one place to another.
▸ It is difficult to make the system secure from hackers and industrial espionage (spying) graphical regions.

Program Name: B.Tech. Program Code:


Department of Applied Computational Science & Engg
Course Code :(KCS- 603) Course Name:Computer Networks

Program Name: B.Tech. Program Code:


Department of Applied Computational Science & Engg
Course Code :(KCS- 603) Course Name:Computer Networks

Wide Area Network (WAN)

▸ Network that provides long distance transmission of data, voice, image and
video information over large geographical areas that may comprise a country, a
continent.
▸ Range: Beyond 100 km.

Program Name: B.Tech. Program Code:


Department of Applied Computational Science & Engg
Course Code :(KCS- 603) Course Name:Computer Networks
▸ Advantage:
▹ Covers a large geographical area so long distance businesses can connect on the one network.
▹ Shares software and resources with connecting workstations.
▹ Messages can be sent very quickly to anyone else on the network. These messages can have pictures, sounds, or data included
with them (called attachments).
▹ Expensive things (such as printers or phone lines to the internet) can be shared by all the computers on the network without
having to buy a different peripheral for each computer.
▹ Everyone on the network can use the same data. This avoids problems where some users may have older information than others.
▸ Disadvantage:
▹ Need a good firewall to restrict outsiders from entering and disrupting the network
▹ Setting up a network can be an expensive, slow and complicated. The bigger the network the more expensive it is.
▹ Once set up, maintaining a network is a full-time job which requires network supervisors and technicians to be employed.
▹ Security is a real issue when many different people have the ability to use information from other computers. Protection against
hackers and viruses adds more complexity and expense.

Program Name: B.Tech. Program Code:


Department of Applied Computational Science & Engg
Course Code :(KCS- 603) Course Name:Computer Networks

Program Name: B.Tech. Program Code:


Department of Applied Computational Science & Engg
Course Code :(KCS- 603) Course Name:Computer Networks
Technology used in WAN
▸ ISDN ( Integrated service digital network) 2
types Basic rate interface Primary rate
interface
▸ Frame relay
▸ Switched multimegabit data service (SMDS)
▸ Synchronous optical network (SONET)
▸ High data link controlled (HDLC)
▸ Synchronous Data Link Control (SDLC)

Program Name: B.Tech. Program Code:


Department of Applied Computational Science & Engg
Course Code :(KCS- 603) Course Name:Computer Networks

Difference between LAN, MAN & WAN

Program Name: B.Tech. Program Code:


Department of Applied Computational Science & Engg
Course Code :(KCS- 603) Course Name:Computer Networks

Distributed processing
▸ Most networks use distributed processing, in which a task is divided among multiple computers. Instead of
one single large machine being responsible for all aspects of a process, separate computers (usually a
personal computer or workstation) handle a subset.
▸ In a Distributed system, the existence of multiple autonomous computers is transparent(i.e., not visible) to
the user. He can type a command to run a program and it runs. It is up to the operating system to select the
best processor, find and transport all the files to that processor, and put the results in the appropriate place.
▸ Networks use Distributed processing, in which a task is divided among multiple computers. Advantages of
Distributed processing are :
▹ Security/ Encapsulation
▹ Distributed data bases
▹ Faster problem solving
▹ Security through Redundancy
▹ Collaborative processing

Program Name: B.Tech. Program Code:


Department of Applied Computational Science & Engg
Network Criteria
Course Code :(KCS- 603) Course Name:Computer Networks
Performance
▸ The performance can be measured in many ways and depends on number of factors.
▹ Number of users
▹ Type of transmission medium
▹ Hardware
▹ Software
Reliability
▸ This is measured by the following factors
▹ Frequency of failure
▹ Recovery time of a network after a failure.
▹ Catastrophe.
Security
▸ Network security issues include protecting data from the following
▹ Unauthorized access
▹ Viruses

Program Name: B.Tech. Program Code:


Department of Applied Computational Science & Engg
Course Code :(KCS- 603) Course Name:Computer Networks

Internet
▸ The Internet is a worldwide, publicly accessible network of interconnected computer
networks that transmit data using the standard Internet Protocol (IP).
▸ It’s a worldwide network of computers that allows the "sharing" or "networking" of
information at remote sites from other academic institutions, research institutes, private
companies, government agencies, and individuals.
▸ It allows people to send and receive data wherever they are in the world if they have internet
access
▸ Everyone w ill find that they use the internet in one way or another, whether it is to research
some information or simply talk to friends
▸ Today, the Web and the Internet allow connectivity from literally everywhere on earth—even
ships at sea and in outer space.

Program Name: B.Tech. Program Code:


Department of Applied Computational Science & Engg
Course Code :(KCS- 603) Course Name:Computer Networks

History of the internet


▸ • The internet first came about in February 1958 in America
▸ A man named JCR L icklider saw universal networking as a potential unifying
revolution.
▸ He envisioned a globally interconnected set of computers through which everyone
could quickly access data and programs from any site.
▸ Leonard K leinrock at M IT published the first paper on packet sw itching theory in
July 1961 and the first book on the subject in 1964.
▸ The internet began to grow rapidly in the 1970’s as the know ledge of networking
was growing more and more rapidly.
▸ It expanded further in the 1980’s as the general public were becoming more aware
of it.
Program Name: B.Tech. Program Code:
Department of Applied Computational Science & Engg
Course Code :(KCS- 603) Course Name:Computer Networks
▸ The general public gained access to the Internet on July 16, 1986 when the first
Freenet came on-line in Cleveland in the U .S.
▸ Between 1987 and 1988 the number of hosts increased from 10,000 to 60,000
▸ With the development of the World Wide Web (WWW ) in 1991, there was no
stopping the rapid expansion of the Internet.
▸ People only had to download a WWW browser in order to access the info on
millions of websites. Countries around the world joined the Internet and
registered their two-letter domain names, e.g. ca for Canada.
▸ The most important development was in 1993 was the release of the first
graphic web browser software, Mosaic.

Program Name: B.Tech. Program Code:


Department of Applied Computational Science & Engg
Course Code :(KCS- 603) Course Name:Computer Networks

▸ In 1994 the first junk e-mail or "spam" was sent out this year. The first shopping
malls also appeared along with Internet radio stations (mainly rebroadcasting) and
the first cyber bank. • In 1998, the Internet continued to grow , with thousands of
new subscribers every day joining the millions already subscribed.

Program Name: B.Tech. Program Code:


Department of Applied Computational Science & Engg
Course Code :(KCS- 603) Course Name:Computer Networks

Why is it used? / Facilities.


▸ e-mail : we can send and receive message through computers by e-mail facility.
▸ e-commerce : buying and selling of information, products and services through
computer based communication network.
▸ e-governance : government officials can directly gather information and
establish communication network for quick and better administrative control.

Program Name: B.Tech. Program Code:


Department of Applied Computational Science & Engg
Course Code :(KCS- 603) Course Name:Computer Networks

▸ e-banking :any person can withdraw money, transfer or exchange amounts or know
the balance by simply logging through internet.
▸ e-reservation : one can electronically book or reserve ticket of airways, railways,
hotels, etc., with help of internet.
▸ Search engine : one can easily locate and search information around the globe with
help of search engine.
▸ Chatting :a person can instantly communicate with an individual or multiple people
from one computer to another computer using internet.
▸ Video conferencing : it a communicating style in which two or more person residing at
far places can instantly talk and watch each other as they do so in face-to-face
communication.

Program Name: B.Tech. Program Code:


Department of Applied Computational Science & Engg
Course Code :(KCS- 603) Course Name:Computer Networks

Advantages
Advantages:
and Disadvantages
▸ Allows easy and quick access to information
▸ Enables user to access files and information from any computer anywhere in the
world
▸ People can check financial information, purchase products, talk to people and much
more online
▸ Downloading music- quick and easy
▸ User can send information quickly from computer to computer

Program Name: B.Tech. Program Code:


Department of Applied Computational Science & Engg
Course Code :(KCS- 603) Course Name:Computer Networks
Disadvantages:
▸ It promotes violence and bad behavior within society, as it contains violent videos
and other disturbing images
▸ It can encourage negative activities such as pornography and paedophilia, these
things can now be explored more openly due to the internet
▸ It stops children from going out, as they wish to stay home and use the internet to
talk to friends etc

Program Name: B.Tech. Program Code:


Department of Applied Computational Science & Engg
Course Code :(KCS- 603) Course Name:Computer Networks

Types of Internet Connections


▸ Analog or dial-up access users connect to the Internet when the computer dials a
phone number.
▹ Speed very slow upto 128 kbps (kilo byte per second) in case of 2G.
▹ Speed 326 kbps (kilo byte per second) and above in case of 3G.
▸ Broadband :- through modem
▹ Speed very above 256 kbps (kilo byte per second).

Program Name: B.Tech. Program Code:


Department of Applied Computational Science & Engg
Course Code :(KCS- 603) Course Name:Computer Networks
Architecture of Internet

Program Name: B.Tech. Program Code:


Department of Applied Computational Science & Engg
Course Code :(KCS- 603) Course Name:Computer Networks

Internet Service Providers


▸ An Internet service provider (ISP) is an organization that provides services for
accessing, using, or participating in the Internet. Internet service providers can be
organized in various forms, such as commercial, community-owned, non-profit, or
otherwise privately owned.
▸ Internet services typically provided by ISPs can include Internet access,
Internet transit, domain name registration, web hosting, Usenet service, and
colocation.
▸ An ISP typically serves as the access point or the gateway that provides a user,
access to everything available on the Internet.

Program Name: B.Tech. Program Code:


Department of Applied Computational Science & Engg
Course Code :(KCS- 603) Course Name:Computer Networks

PROTOCOLS AND STANDARDS


Protocols
In computer networks, communication occurs between entities in different systems. An entity is anything capable of sending or
receiving information. However, two entities cannot simply send bit streams to each other and expect to be understood. For
communication to occur, the entities must agree on a protocol. A protocol is a set of rules that govern data communications. A
protocol defines what is communicated, how it is communicated, and when it is communicated. The key elements of a protocol
are syntax, semantics, and timing.
▸ Syntax. The term syntax refers to the structure or format of the data, meaning the order in which they are presented. For
example, a simple protocol might expect the first 8 bits of data to be the address of the sender, the second 8 bits to be the
address of the receiver, and the rest of the stream to be the message itself.
▸ Semantics. The word semantics refers to the meaning of each section of bits. How is a particular pattern to be interpreted,
and what action is to be taken based on that interpretation? For example, does an address identify the route to be taken or
the final destination of the message?
▸ Timing. The term timing refers to two characteristics: when data should be sent and how fast they can be sent. For
example, if a sender produces data at 100 Mbps but the receiver can process data at only 1 Mbps, the transmission will
overload the receiver and some data will be lost.

Program Name: B.Tech. Program Code:


Department of Applied Computational Science & Engg
Course Code :(KCS- 603) Course Name:Computer Networks
Standards
▸ Standards are essential in creating and maintaining an open and competitive market for
equipment manufacturers and in guaranteeing national and international interoperability
of data and telecommunications technology and processes. Standards provide guidelines
to manufacturers, vendors, government agencies, and other service providers to ensure
the kind of interconnectivity necessary in today's marketplace and in international
communications. Data communication standards fall into two categories: de facto
(meaning "by fact" or "by convention") and de jure (meaning "by law" or "by regulation").
▸ De facto. Standards that have not been approved by an organized body but have been
adopted as standards through widespread use are de facto standards. De facto standards
are often established originally by manufacturers who seek to define the functionality of a
new product or technology.
▸ De jure. Those standards that have been legislated by an officially recognized body are de
jure standards.

Program Name: B.Tech. Program Code:


Department of Applied Computational Science & Engg
Course Code :(KCS- 603) Course Name:Computer Networks

LAYERED TASKS TO SEND A MASSEGE

Program Name: B.Tech. Program Code:


Department of Applied Computational Science & Engg
Course Code :(KCS- 603) Course Name:Computer Networks

OSI Reference Model


• OSI Reference Model - internationally
standardised network architecture.
• OSI = Open Systems Interconnection: deals with
open systems, i.e. systems open for
communications with other systems.
• Specified in ISO 7498.
• Model has 7 layers.

Program Name: B.Tech. Program Code:


Department of Applied Computational Science & Engg
Course Code :(KCS- 603) Course Name:Computer Networks

7-Layer OSI Model


Layer 7 Application Layer • Layers 1-4 relate to
Layer 6 Presentation Layer communications
technology.
Layer 5 Session Layer
• Layers 5-7 relate to user
Layer 4 Transport Layer applications.
Layer 3 Network Layer

Layer 2 Data Link Layer

Layer 1 Physical Layer

Communications subnet boundary

Program Name: B.Tech. Program Code:


Department of Applied Computational Science & Engg
Course Code :(KCS- 603) Course Name:Computer Networks

Layer 7: Application Layer


• Level at which applications access network services.
– Represents services that directly support software applications for
file transfers, database access, and electronic mail etc.

Program Name: B.Tech. Program Code:


Department of Applied Computational Science & Engg
Course Code :(KCS- 603) Course Name:Computer Networks

Layer 6: Presentation Layer


• Related to representation of transmitted data
– Translates different data representations from the
Application layer into uniform standard format
• Providing services for secure efficient data
transmission
– e.g. data encryption, and data compression.

Program Name: B.Tech. Program Code:


Department of Applied Computational Science & Engg
Course Code :(KCS- 603) Course Name:Computer Networks

Layer 5: Session Layer

• Allows two applications on different computers to


establish, use, and end a session.
– e.g. file transfer, remote login
• Establishes dialog control
– Regulates which side transmits, plus when and how long it
transmits.
• Performs token management and synchronization.

Program Name: B.Tech. Program Code:


Department of Applied Computational Science & Engg
Course Code :(KCS- 603) Course Name:Computer Networks

Layer 4: Transport Layer


• Manages transmission packets
– Repackages long messages when necessary into small
packets for transmission
– Reassembles packets in correct order to get the original
message.
• Handles error recognition and recovery.
– Transport layer at receiving acknowledges packet delivery.
– Resends missing packets

Program Name: B.Tech. Program Code:


Department of Applied Computational Science & Engg
Course Code :(KCS- 603) Course Name:Computer Networks
Layer 3: Network Layer
• Manages addressing/routing of data within the subnet
– Addresses messages and translates logical addresses and
names into physical addresses.
– Determines the route from the source to the destination
computer
– Manages traffic problems, such as switching, routing, and
controlling the congestion of data packets.
• Routing can be:
– Based on static tables
– determined at start of each session
– Individually determined for each packet, reflecting the
current network load.
Program Name: B.Tech. Program Code:
Department of Applied Computational Science & Engg
Course Code :(KCS- 603) Course Name:Computer Networks

Layer 2: Data Link Layer


· Packages raw bits from the Physical layer into frames
(logical, structured packets for data).
· Provides reliable transmission of frames
· It waits for an acknowledgment from the receiving computer.
· Retransmits frames for which acknowledgement not received

Program Name: B.Tech. Program Code:


Department of Applied Computational Science & Engg
Course Code :(KCS- 603) Course Name:Computer Networks

Layer 1: Physical Layer


• Transmits bits from one computer to another
• Regulates the transmission of a stream of bits over a
physical medium.
• Defines how the cable is attached to the network
adapter and what transmission technique is used to
send data over the cable. Deals with issues like
– The definition of 0 and 1, e.g. how many volts represents
a 1, and how long a bit lasts?
– Whether the channel is simplex or duplex?
– How many pins a connector has, and what the function of
each pin is?
Program Name: B.Tech. Program Code:
Department of Applied Computational Science & Engg
Course Code :(KCS- 603) Course Name:Computer Networks

Internet Protocols vs OSI


Application • Explicit Presentation
and session layers
Presentation Application missing in Internet
Session Protocols
• Data Link and
Transport TCP
Network Layers
IP
Network redesigned
Data Link Network Interface

Physical Hardware

Program Name: B.Tech. Program Code:


Department of Applied Computational Science & Engg
Course Code :(KCS- 603) Course Name:Computer Networks

Program Name: B.Tech. Program Code:


Department of Applied Computational Science & Engg
Course Code :(KCS- 603) Course Name:Computer Networks

Services in the OSI Model

• In OSI model, each layer provide services to layer above, and


‘consumes’ services provided by layer below.
• Active elements in a layer called entities.
• Entities in same layer in different machines called peer entities.

Program Name: B.Tech. Program Code:


Department of Applied Computational Science & Engg
Course Code :(KCS- 603) Course Name:Computer Networks

Connections
• Layers can offer connection-oriented or connectionless services.
• Connection-oriented like telephone system.
• Connectionless like postal system.
• Each service has an associated Quality-of-service (e.g. reliable or
unreliable).

Program Name: B.Tech. Program Code:


Department of Applied Computational Science & Engg
Course Code :(KCS- 603) Course Name:Computer Networks

Reliability
• Reliable services never lose/corrupt data.
• Reliable service costs more.
• Typical application for reliable service is file transfer.
• Typical application not needing reliable service is voice traffic.
• Not all applications need connections.

Program Name: B.Tech. Program Code:


Department of Applied Computational Science & Engg
Course Code :(KCS- 603) Course Name:Computer Networks

The Networking Devices


1. NIC Card
2. Repeater
3. Hub
4. Switch
5. Bridge
6. Router
7. Gateway
8. Firewall
Program Name: B.Tech. Program Code:
Department of Applied Computational Science & Engg
Course Code :(KCS- 603) Course Name:Computer Networks
1. Network Interface Card
 NIC is used to physically
connect host devices to the
network media.
 A NIC is a printed circuit board
that fits into the expansion slot
of a bus on a computer
motherboard.
 It can also be a peripheral
device. NICs are sometimes
called network adapters.
 Each NIC is identified by a
unique code called a Media
Access Control (MAC) address.
 This address is used to control
Program Name: B.Tech. Program Code:
Department of Applied Computational Science & Engg
Course Code :(KCS- 603) Course Name:Computer Networks
2. Repeaters
 A repeater is a network device used to
regenerate a signal.
 Repeaters regenerate analog or digital
signals that are distorted by transmission
loss due to attenuation.
 A repeater does not make an intelligent
decision concerning forwarding packets

Program Name: B.Tech. Program Code:


Department of Applied Computational Science & Engg
Course Code :(KCS- 603) Course Name:Computer Networks
3. Hubs
 Hubs concentrate on connections.
 In other words, they take a group
of hosts and allow the network to
see them as a single unit. This is
done passively, without any other
effect on the data transmission.
 Active hubs concentrate hosts and
also regenerate signals.

Program Name: B.Tech. Program Code:


Department of Applied Computational Science & Engg
Course Code :(KCS- 603) Course Name:Computer Networks
4. Bridges
 Bridges convert network data
formats and perform basic data
transmission management.
 Bridges provide connections
between LANs.
 They also check data to
determine if it should cross the
bridge. This makes each part of
the network more efficient

Program Name: B.Tech. Program Code:


Department of Applied Computational Science & Engg
Course Code :(KCS- 603) Course Name:Computer Networks
6. Routers
 Routers have all the capabilities listed
above.
 Routers can regenerate signals,
concentrate multiple connections,
convert data transmission formats, and
manage data transfers.
 They can also connect to a WAN, which
allows them to connect LANs that are
separated by great distances.

Program Name: B.Tech. Program Code:


Department of Applied Computational Science & Engg
Course Code :(KCS- 603) Course Name:Computer Networks
7. Gateway
 A gateway is a piece of
networking hardware used in
telecommunications for
telecommunications networks that
allows data to flow from one discrete
network to another.
 Gateways are distinct from routers
or switches in that they communicate
using more than one protocol to
connect a bunch of networks

Program Name: B.Tech. Program Code:


Department of Applied Computational Science & Engg
Course Code :(KCS- 603) Course Name:Computer Networks
8. Firewall
 A firewall is a network device or
software for controlling network
security and access rules.
 Firewalls are inserted in connections
between secure internal networks
and potentially insecure external
networks such as the Internet.
 Firewalls are typically configured to
reject access requests from
unrecognized sources while allowing
actions from recognized ones.
 The vital role firewalls play in network
security grows in parallel with the
constant increase in cyber attacks.
Program Name: B.Tech. Program Code:
Department of Applied Computational Science & Engg
Course Code :(KCS- 603) Course Name:Computer Networks
Network Media
The function of the media is to carry a flow of information through a LAN.

A. Wired Media:- A widely adopted family that uses copper and fiber media in
local area network (LAN) technology are collectively known as Ethernet

1. Copper Cable
a. Coaxial Cables
b. Shielded Twisted Pair(STP)
c. Unshielded Twisted Pair

2. Fibre Optic Cable

B. Wireless Media:- use the atmosphere, or space, as the medium.


Program Name: B.Tech. Program Code:
Department of Applied Computational Science & Engg
Course Code :(KCS- 603) Course Name:Computer Networks
1. Copper Cable
 The most common, easiest, quickest,
and cheapest form of network media to
install.
 The disadvantage of sending data over
copper wire is that the further the signal
travels, the weaker it becomes.

Program Name: B.Tech. Program Code:


Department of Applied Computational Science & Engg
Course Code :(KCS- 603) Course Name:Computer Networks
a. Coaxial Cable
 It can be run longer distances than Twisted pair Cables.

• Speed: 10-100Mbps
• Cost: Inexpensive
• Media and connector size: Medium
• Maximum cable length: 500m

Program Name: B.Tech. Program Code:


Department of Applied Computational Science & Engg
Course Code :(KCS- 603) Course Name:Computer Networks
b. Shielded Twisted Pair(STP)
• Speed: 0-100Mbps
• Cost: Moderate
• Media and connector size: Medium to large
• Maximum cable length: 100m

Program Name: B.Tech. Program Code:


Department of Applied Computational Science & Engg
Course Code :(KCS- 603) Course Name:Computer Networks
c. Unshielded Twisted Pair
 UTP is a four-pair wire Speed: 10-100-1000 Mbps*
medium used in a variety of Cost: Least Expensive
networks. Media and connector size: Small
 Each of the eight copper Maximum cable length: 100m * (Depending
wires in the UTP cable is on the quality/category of cable)
covered by insulating material

Program Name: B.Tech. Program Code:


Department of Applied Computational Science & Engg
Course Code :(KCS- 603) Course Name:Computer Networks
UTP Implementation
 EIA/TIA specifies an RJ-45 connector
for UTP cable.
 The letters RJ stand for registered jack.

Program Name: B.Tech. Program Code:


Department of Applied Computational Science & Engg
Course Code :(KCS- 603) Course Name:Computer Networks
Fiber Optic Cable
 Glass fiber carrying light pulses, each pulse
a bit.
 Based on the Total Internal Reflection of
Light.
 High-speed point-to-point transmission
10-100’s Gbps
 low error rate:
 repeaters spaced far apart
 immune to electromagnetic noise

Program Name: B.Tech. Program Code:


THANKS!

You might also like