SlideShare a Scribd company logo
1 of 55
COMPUTER NETWORK
(18EC71)
Dr. Shivashankar
Professor
Department of Electronics & Communication
Engineering
RRIT, Bangalore
2/11/2023 1
Dr. Shivashankar, E&CE, RRIT
Course Outcomes
After Completion of the course, student will be able to
Understand the concepts of networking thoroughly.
Describe the various network architectures
Identify the protocols and services of different layers
Distinguish the basic network configurations and
standards associated with each network models.
Analyze a simple network and measurements of its
parameters.
Text Book:
Data Communications and Networking , Forouzan, 5th
Edition, McGraw Hill, 2016 ISBN: 1-25-906475-3
2/11/2023 2
Dr. Shivashankar, E&CE, RRIT
MODULE-1
DATA COMMUNICATIONS
Data communications are the exchange of data between two
devices via some form of transmission medium such as a wired or
wireless media.
For data communications to occur, the communicating devices
must be part of a communication system made up of a
combination of hardware (physical equipment) and software
(programs).
The effectiveness of a data communications system depends on
four fundamental characteristics:
delivery,
accuracy,
timeliness and
jitter.
2/11/2023 3
Dr. Shivashankar, E&CE, RRIT
COMPONENTS
Figure 1.1: Five Components of Data Communication
1. Message
2. Sender
3. Receiver
4. Transmission Media
5. Protocols
2/11/2023 4
Dr. Shivashankar, E&CE, RRIT
CONTI…
Message: Is the information (data) to be communicated.
EX: text, numbers, pictures, audio, and video.
 Sender: is the device that sends the data message.
Ex: computer, workstation, telephone handset, Mobile etc.
 Receiver: Is the device that receives the message. I
Ex: computer, workstation, telephone handset, Mobile etc.
 Transmission medium: Is the physical path by which a message
travels from sender to receiver.
Ex: twisted-pair wire, coaxial cable, fiber-optic cable, and radio waves.
 Protocol: Is a set of rules that govern data communications. It
represents an agreement between the communicating devices.
Without a protocol, two devices may be connected but not
communicating,
Ex: TCP/IP, UDP etc
2/11/2023 5
Dr. Shivashankar, E&CE, RRIT
Data Representation
Text
• In data communications, text is represented as a bit pattern, a
sequence of bits (0s or 1s).
•Different sets of bit patterns have been designed to represent text
symbols.
•Each set is called a code, and the process of representing symbols
is called coding.
•Today, the prevalent coding system is called Unicode, which uses
32 bits to represent a symbol or character used in any language in
the world.
•The American Standard Code for Information Interchange (ASCII),
developed some decades ago in the United States, now constitutes
the first 127 characters in Unicode and is also referred to as Basic
Latin.
2/11/2023 6
Dr. Shivashankar, E&CE, RRIT
CONTI…
Numbers: Numbers are also represented by bit patterns.
Number is directly converted to a binary number to
simplify mathematical operations.
Images: Images are also represented by bit patterns. In its
simplest form, an image is composed of a matrix of pixels
(picture elements), where each pixel is a small dot.
The size of the pixel depends on the resolution.
If an image is not made of pure white and pure black pixels,
we can increase the size of the bit pattern to include gray
scale.
There are several methods to represent color images. One
method is called RGB, so called because each color is made
of a combination of three primary colors: red, green, and
blue.
2/11/2023 7
Dr. Shivashankar, E&CE, RRIT
CONTI…
Audio refers to the recording or broadcasting of sound or
music. Audio is by nature different from text, numbers, or
images.
It is continuous, not discrete.
Even when we use a microphone to change voice or
music to an electric signal, we create a continuous signal.
Video refers to the recording or broadcasting of a picture
or movie.
Video can either be produced as a continuous entity
(e.g., by a TV camera), or it can be a combination of
images, each a discrete entity, arranged to convey the
idea of motion.
2/11/2023 8
Dr. Shivashankar, E&CE, RRIT
DATA FLOW
Communication between two devices can be simplex, half-duplex,
or full-duplex as shown in Figure 1.2.
Figure 1: Different data flow representation
Keyboards and traditional
monitors are examples of
simplex devices
Each station can both
transmit and receive, but not
at the same time. When one
device is sending, the other
can only receive, and vice
versa.
Walkie-talkies , Radio
Both stations can transmit
and receive simultaneously.
Mobile
2/11/2023 9
Dr. Shivashankar, E&CE, RRIT
NETWORKS
Network is a Interconnection of a set of devices
capable of communication.
A device can be a host such as a large computer,
desktop, laptop, workstation, cellular phone, or security
system.
A device: connecting device such as a router, which
connects the network to other networks, a switch,
which connects devices together, a modem (modulator-
demodulator), which changes the form of data, and so
on.
A network are connected using wired or wireless.
2/11/2023 10
Dr. Shivashankar, E&CE, RRIT
Physical Structures
Type of Connection
Point-to-point connection :
Point-to-point connections are typically used to connect two
systems together over a WAN.
The entire capacity of the link is reserved for transmission
between those two devices.
Most point-to-point connections use an actual length of wire or
cable to connect the two ends, but other options, such as
microwave or satellite links, are also possible.
When we change television channels by infrared remote control,
we are establishing a point-to-point connection between the
remote control and the television’s control system.
Example: telephone call
2/11/2023 11
Dr. Shivashankar, E&CE, RRIT
CONTI…
Multipoint:
Also called multidrop connection.
More than two specific devices share a single link.
In a multipoint environment, the capacity of the channel is
shared, either spatially or temporally.
If several devices can use the link simultaneously, it is a spatially
shared connection.
If users must take turns, it is a timeshared connection.
Figure 2: Types of Connection
2/11/2023 12
Dr. Shivashankar, E&CE, RRIT
NETWORK TYPES
local area network (LAN):
Usually privately owned and connects some hosts in a single office,
building, or campus.
Depending on the needs of an organization, a LAN can be as simple
as two PCs and a printer in someone’s home office, or it can extend
throughout a company and include audio and video devices.
Each host in a LAN has an identifier, an address, that uniquely
defines the host in the LAN.
A packet sent by a host to another host carries both the source
host’s and the destination host’s addresses.
Today, most LANs use a smart connecting switch, which is able to
recognize the destination address of the packet and guide the
packet to its destination without sending it to all other hosts.
2/11/2023 13
Dr. Shivashankar, E&CE, RRIT
CONTI…
Figure 1.8 An isolated LAN in the past and today
2/11/2023 14
Dr. Shivashankar, E&CE, RRIT
CONTI…
Wide Area Network (WAN)
Also an interconnection of devices capable of communication.
A LAN is normally limited in size, spanning an office, a building, or
a campus; a WAN has.
A wider geographical span, spanning a town, a state, a country, or
even the world.
A LAN interconnects hosts; a WAN interconnects connecting
devices such as switches, routers, or modems.
A LAN is normally privately owned by the organization that uses it;
a WAN is normally created and run by communication companies
and leased by an organization that uses it.
We see two distinct examples of WANs today: point-to-point WANs
and switched WANs.
2/11/2023 15
Dr. Shivashankar, E&CE, RRIT
CONTI…
Point-to-Point WAN
A point-to-point WAN is a network that connects
two communicating devices through a
transmission media (cable or air).
2/11/2023 16
Dr. Shivashankar, E&CE, RRIT
Figure 1.9 A point-to-point WAN
CONTI…
Switched WAN
A switched WAN is a network with more than two ends.
A switched WAN, as we will see shortly, is used in the backbone of
global communication today.
A switched WAN is a combination of several point-to-point WANs
that are connected by switches.
2/11/2023 17
Dr. Shivashankar, E&CE, RRIT
Figure 1.10 A switched WAN
CONTI…
Internetwork
When two or more networks are connected, they make
an internetwork, or internet.
To make the communication between employees at
different offices possible, the management leases a point-
to-point dedicated WAN from a service provider, such as a
telephone company, and connects the two LANs.
2/11/2023 18
Dr. Shivashankar, E&CE, RRIT
Figure 1.11 An internetwork made of two LANs and one point-to-point WAN
CONTI…
Switching
An internet is a switched network in which a switch
connects at least two links together.
A switch needs to forward data from a network to
another network when required.
The two most common types of switched networks:
 Circuit-switched and
Packet-switched networks.
2/11/2023 19
Dr. Shivashankar, E&CE, RRIT
Cont..
Circuit-Switched Network
• In a circuit-switched network, a dedicated connection, called
a circuit, is always available between the two end systems; the
switch can only make it active or inactive.
2/11/2023 Dr. Shivashankar, E&CE, RRIT 20
Figure 8: A circuit Switched Network
Cont…
2/11/2023 Dr. Shivashankar, E&CE, RRIT 21
Packet-Switched Network
• In a computer network, the communication
between the two ends is done in blocks of
data called packets.
Figure 9: A packet-switched network
The Internet
It allowed multiple computers to work on a single network that
was their biggest achievement internet.
Internet is the foremost important tool and the prominent
resource that is being used by almost every person across the globe.
 It connects millions of computers, web pages, websites, and
servers.
The internet is a widespread interconnected network of computers
and electronics devices(that support internet).
It creates a communication medium to share and get information
online.
Origin Of Internet: The internet came in the year 1960 with the
creation of the first working model called ARPANET (Advanced
Research Projects Agency).
2/11/2023 22
Dr. Shivashankar, E&CE, RRIT
Network Models
PROTOCOL LAYERING
In data communication and networking, a protocol defines
the rules that both the sender and receiver and all
intermediate devices need to follow to be able to
communicate effectively.
When communication is simple, we may need only one
simple protocol;
when the communication is complex, we may need to
divide the task between different layers, in which case we
need a protocol at each layer, or this technique we used to
call protocol layering.
This layering allows us to separate the services from the
implementation.
2/11/2023 23
Dr. Shivashankar, E&CE, RRIT
CONTI…
Scenarios
First Scenario
In the first scenario, communication is so simple that it can occur in
only one layer.
Assume Maria and Ann are neighbors with a lot of common ideas.
Communication between Maria and Ann takes place in one layer,
face to face, in the same language, as shown in Figure 4.
2/11/2023 24
Dr. Shivashankar, E&CE, RRIT
Figure 1.16 A single-layer protocol
CONTI…
. First, Maria and Ann know that they should greet each
other when they meet.
Second, they know that they should confine their
vocabulary to the level of their friendship.
Third, each party knows that she should refrain from
speaking when the other party is speaking.
Fourth, each party knows that the conversation should
be a dialog, not a monolog: both should have the
opportunity to talk about the issue.
Fifth, they should exchange some nice words when they
leave.
2/11/2023 25
Dr. Shivashankar, E&CE, RRIT
CONTI…
Second Scenario
In the second scenario, we assume that Ann is offered a higher-
level position in her company, but needs to move to another branch
located in a city very far from Maria.
The two friends still want to continue their communication and
exchange ideas because they have come up with an innovative
project to start a new business when they both retire.
They decide to continue their conversation using regular mail
through the post office.
However, they do not want their ideas to be revealed by other
people if the letters are intercepted. They agree on an
encryption/decryption technique.
2/11/2023 26
Dr. Shivashankar, E&CE, RRIT
CONTI…
Figure 1.17 A three-layer protocol
2/11/2023 27
Dr. Shivashankar, E&CE, RRIT
CONTI…
Principles of Protocol Layering
First Principle
•The first principle dictates that if we want bi-directional
communication, we need to make each layer so that it is
able to perform two opposite tasks, one in each direction.
•For example, the third layer task is to listen (in one
direction) and talk (in the other direction).
•The second layer needs to be able to encrypt and
decrypt.
•The first layer needs to send and receive mail.
2/11/2023 28
Dr. Shivashankar, E&CE, RRIT
CONTI…
Second Principle
•The second principle that we need to follow in protocol
layering is that the two objects under each layer at both
sites should be identical.
•For example, the object under layer 3 at both sites
should be a plaintext letter.
•The object under layer 2 at both sites should be a cipher
text letter.
•The object under layer 1 at both sites should be a piece
of mail.
2/11/2023 29
Dr. Shivashankar, E&CE, RRIT
CONTI…
Logical Connections
•A logical network is a virtual representation of a network that appears
to the user as an entirely separate and self-contained network
•A logical network interface or device is the software entity that is
known by an operating system.
2/11/2023 30
Dr. Shivashankar, E&CE, RRIT
Figure 7: Logical connection between peer layers
TCP/IP PROTOCOL SUITE
•Transmission Control Protocol/Internet Protocol (TCP/IP).
•TCP/IP is a protocol suite (a set of protocols organized in
different layers) used in the Internet today.
•It is a hierarchical protocol made up of interactive
modules, each of which provides a specific functionality.
•Hierarchical means that each upper level protocol is
supported by the services provided by one or more lower
level protocols.
•The original TCP/IP protocol suite was defined as four
software layers built upon the hardware.
•Today, however, TCP/IP is thought of as a five-layer
model.
2/11/2023 31
Dr. Shivashankar, E&CE, RRIT
CONTI…
2/11/2023 32
Dr. Shivashankar, E&CE, RRIT
Figure 1.19 Layers in the TCP/IP protocol suite
CONTI…
Layered Architecture
To show how the layers in the TCP/IP protocol suite are involved in
communication between two hosts, we assume that we want to use the suite in a
small internet made up of three LANs (links), each with a link-layer switch.
2/11/2023 33
Dr. Shivashankar, E&CE, RRIT
Figure 1.20 Communication through
an internet
CONTI…
Layers in the TCP/IP Protocol Suite
 The duty of the data-link and physical layers is hop-to-hop, in
which a hop is a host or router.
The duty of the top three layers is the internet, and the domain of
duty of the two lower layers is the link.
2/11/2023 34
Dr. Shivashankar, E&CE, RRIT
Figure 1.21 Logical connections between layers of the TCP/IP protocol suite
Physical layer
Physical layer is the lowest level in the TCP/IP protocol suite, the
communication between two devices.
Responsible for carrying individual bits in a frame across the link.
Two devices are connected by a transmission medium (cable or
air).
The transmission medium does not carry bits; it carries electrical
or optical signals.
The bits received in a frame from the data-link layer are trans-
formed and sent through the transmission media.
It provides an interface between devices (like PC’s or computers)
and transmission medium.
Hubs, Ethernet, etc. device is used in this layer.
2/11/2023 35
Dr. Shivashankar, E&CE, RRIT
Data Link layer
•The Data-link layer is the second layer from the bottom in the
TCP/IP suits.
•It is responsible for the node-to-node delivery of data.
•Its major role is to ensure error-free transmission of information.
•The routers are responsible for choosing the best links.
•The data-link layer is responsible for taking the datagram and
moving it across the link.
•The data-link layer takes a datagram and encapsulates it in a packet
called a frame.
•data-link layer protocols are Ethernet IEEE 802.2 framing and Point-
to-Point Protocol (PPP) framing.
•A modern computer typically has three separate data link layer for
Ethernet, wireless and Bluetooth.
2/11/2023 36
Dr. Shivashankar, E&CE, RRIT
CONTI…
Network Layer
•The network layer is responsible for creating a connection between
the source computer and the destination computer.
•The "network layer" is the part of the Internet communications
process.
•Network layer is responsible for host-to-host communication and
routing the packet through possible routes.
•The network layer in the Internet includes the main protocol,
Internet Protocol (IP), that defines the format of the packet, called a
datagram at the network layer.
•IP is a connectionless protocol that provides no flow control, no
error control, and no congestion control services.
•Handles the routing and sending of data between different
networks.
2/11/2023 37
Dr. Shivashankar, E&CE, RRIT
CONTI…
The Internet Control Message Protocol (ICMP) used to
determine whether or not data is reaching its intended
destination in a timely manner.
The Internet Group Management Protocol (IGMP)
protocol that allows several devices to share one IP
address so they can all receive the same data. To set up
multicasting on networks that use the Internet Protocol
version 4 (IPv4).
The Dynamic Host Configuration Protocol (DHCP) helps IP
to get the network-layer address for a host.
The Address Resolution Protocol (ARP) is a protocol that
helps IP to find the link- layer address of a host or a router
when its network-layer address is given.
2/11/2023 38
Dr. Shivashankar, E&CE, RRIT
Transport Layer Protocol
•The logical connection at the transport layer is also end-
to-end.
•The transport layer at the source host gets the message
from the application layer, encapsulates it, called a
segment or a user datagram, and sends it, through the
logical (imaginary) connection.
•The transport layer maintains the order of data.
•It receives the data from the upper layer and converts it
into smaller parts known as segments.
•One of the major tasks of the transport layer is to add the
port addressing .
2/11/2023 39
Dr. Shivashankar, E&CE, RRIT
CONTI…
•Transmission Control Protocol (TCP): connection-oriented protocol. It
creates a logical pipe between two TCPs for transferring a stream of bytes.
•TCP provides flow control, error control and congestion control to reduce
the loss of segments due to congestion in the network.
•User Datagram Protocol (UDP): connectionless protocol that transmits
user datagrams.
• In UDP, each user datagram is an independent entity without being
related to the previous or the next one(connectionless).
•UDP is a simple protocol that does not provide flow, error, or congestion
control.
•Stream Control Transmission Protocol (SCTP): Connection oriented: a
transport-layer protocol that ensures reliable, in-sequence transport of
data.
•SCTP provides multihoming support where one or both endpoints of a
connection can consist of more than one IP address
2/11/2023 40
Dr. Shivashankar, E&CE, RRIT
Application Layer
•The actual communication is initiated and reflects.
•Because this layer is on the top of the layer stack, it does not
serve any other layers.
•It takes the help of Transport and all layers below layers.
•Identifying communication partners: It identifies the availability
of communication partners for an application with data to
transmit.
•Determining resource availability: It determines whether
sufficient network resources are available for the requested
communication.
•Synchronizing communication: All the communications occur
between the applications requires cooperation which is managed
by an application layer.
2/11/2023 41
Dr. Shivashankar, E&CE, RRIT
CONTI…
•The Hypertext Transfer Protocol (HTTP): foundation of any data
exchange on the Web(www) and it is a client-server protocol
•The Simple Mail Transfer Protocol (SMTP): the main protocol
used in electronic mail (e-mail) service.
•The File Transfer Protocol (FTP): used for transferring files from
one host to another.
•The Terminal Network (TELNET) and Secure Shell (SSH) are used
for accessing a site remotely.
•The Simple Network Management Protocol (SNMP): used by an
administrator to manage the Internet at global and local levels.
•The Domain Name System (DNS): used by other protocols to
find the network-layer address of a computer.
2/11/2023 42
Dr. Shivashankar, E&CE, RRIT
Encapsulation and De-capsulation
•Encapsulation is the process of adding additional
information when data is traveling in OSI or TCP/IP model.
•The additional information will be added on sender’s
side, starting from Application layer to Physical layer.
•Decapsulation is the process of removing the header and
trailer information from a packet, as it moves toward its
destination.
•The destination device receives the data in its original
form.
•Decapsulation moves in the reverse order, from Layer 1
to Layer 7 in the TCP/IP suite, as the packet travels to the
receiving computer.
2/11/2023 43
Dr. Shivashankar, E&CE, RRIT
CONTI…
2/11/2023 44
Dr. Shivashankar, E&CE, RRIT
Figure 8: Encapsulation/Decapsulation
Encapsulation at the Source Host
1. At the application layer, the data to be exchanged is referred to
as a message. The message is passed to the transport layer.
2. The transport layer takes the message as the payload, It adds
the transport layer header to the payload, called the segment
(in TCP) and the user datagram (in UDP). The transport layer
then passes the packet to the network layer.
3. The network layer takes the transport-layer packet as data or
payload and adds its own header to the payload. The result is
the network- layer packet, called a datagram. The network layer
then passes the packet to the data-link layer.
4. The data-link layer takes the network-layer packet as data or
payload and adds its own header, The result is the link-layer
packet, which is called a frame. The frame is passed to the
physical layer for transmission.
2/11/2023 45
Dr. Shivashankar, E&CE, RRIT
CONTI…
Decapsulation and Encapsulation at the Router
At the router, we have both decapsulation and encapsulation because
the router is connected to two or more links.
1. After the set of bits are delivered to the data-link layer, this layer
decapsulates the datagram from the frame and passes it to the
network layer.
2. The network layer only inspects the source and destination
addresses in the datagram header and consults its forwarding
table to find the next hop to which the datagram is to be delivered.
The datagram is then passed to the data-link layer of the next link.
3. The data-link layer of the next link encapsulates the datagram in a
frame and passes it to the physical layer for transmission.
2/11/2023 46
Dr. Shivashankar, E&CE, RRIT
CONTI…
Decapsulation at the Destination Host
At the destination host, each layer only decapsulates the packet
received, removes the payload, and delivers the payload to the
next-higher layer protocol until the message reaches the application
layer.
It is necessary to say that decapsulation in the host involves error
checking.
2/11/2023 47
Dr. Shivashankar, E&CE, RRIT
Addressing
logical communication between pairs of layers in this model. Any
communication that involves two parties needs two addresses:
source address and destination address.
2/11/2023 48
Dr. Shivashankar, E&CE, RRIT
Figure 1.24 Addressing in the TCP/IP protocol suite
Multiplexing and Demultiplexing
•Multiplexing in this case means that a protocol at a layer can
encapsulate a packet from several next-higher layer protocols (one
at a time);
•Memultiplexing means that a protocol can decapsulate and deliver
a packet to several next-higher layer protocols (one at a time).
2/11/2023 49
Dr. Shivashankar, E&CE, RRIT
Figure 1.25 Multiplexing and demultiplexing
THE OSI MODEL
•Established in 1947, the International Organization for
Standardization (ISO) is a multinational body dedicated to
worldwide agreement on international standards.
•Almost three-fourths of the countries in the world are represented
in the ISO.
•An ISO standard that covers all aspects of network communications
is the Open Systems Interconnection (OSI) model. It was first
introduced in the late 1970s.
An open system is a set of protocols that allows any two different
systems to communicate.
The purpose of the OSI model is to show how to facilitate
communication between different systems without requiring
changes to the logic of the underlying hardware and software.
2/11/2023 50
Dr. Shivashankar, E&CE, RRIT
CONTI…
2/11/2023 51
Dr. Shivashankar, E&CE, RRIT
Figure 1.26 : The OSI model
OSI versus TCP/IP
•Session and presentation aare not added to the TCP/IP protocol
suite.
• The application layer in the suite is usually considered to be the
combination of three layers in the TCP/IP suite.
•OSI model is developed by ISO (International Standard
Organization), whereas TCP Model is developed by ARPANET
(Advanced Research Project Agency Network).
•OSI model helps us to standardize router, switch, motherboard,
and other hardware, whereas TCP/IP helps us to establish a
connection between different types of computers.
•In OSI model, the transport layer is only connection-oriented,
whereas the TCP/IP model is both connection-oriented and
connectionless.
2/11/2023 52
Dr. Shivashankar, E&CE, RRIT
CONTI…
2/11/2023 53
Dr. Shivashankar, E&CE, RRIT
Figure 1.27 TCP/IP and OSI model
QUIZES
1. A computer Networks permits sharing of
a. Resources
b. Information
c. Both a & b
d. None of the above
2. The first operational computer network in the world was ____in US.
a. ARPANET
b. ERNET
c. SKYNET
d. DARPANET
3. _____is the technology that connects the machine and people within small area
a. WAN
b. LAN
c. MAN
d. None of the above
4. ____ is network that covers geographical larger area, such as districts and cities
a. WAN
b. LAN
c. MAN
d. None of the above
2/11/2023 54
Dr. Shivashankar, E&CE, RRIT
CONTI…
5. _____ is network that connects sites connects in diverse locations
a. WAN
b. LAN
c. MAN
d. None of the above
6. Check sum is used for
a. Error correction
b. Error detection
c. Both a&b
d. None of these
7. Network of networks known as
a. Intranet
b. Internet
c. LAN
d. WAN
8. The commonly used protocol for web page transfer is_______
a. HTML
b. WML
c. WTTP
d. HTTP
2/11/2023 55
Dr. Shivashankar, E&CE, RRIT

More Related Content

What's hot (20)

21 Scheme_ MODULE-3_CCN.pdf
21 Scheme_ MODULE-3_CCN.pdf21 Scheme_ MODULE-3_CCN.pdf
21 Scheme_ MODULE-3_CCN.pdf
 
Advance Networking Course Details PPT
Advance Networking Course Details PPTAdvance Networking Course Details PPT
Advance Networking Course Details PPT
 
Bluetooth.ppt
Bluetooth.pptBluetooth.ppt
Bluetooth.ppt
 
Mobile IP
Mobile IPMobile IP
Mobile IP
 
Cs8591 Computer Networks
Cs8591 Computer NetworksCs8591 Computer Networks
Cs8591 Computer Networks
 
COMPUTER NETWORK
COMPUTER NETWORKCOMPUTER NETWORK
COMPUTER NETWORK
 
Industrial Training Report on Telecomunication
Industrial Training Report on Telecomunication Industrial Training Report on Telecomunication
Industrial Training Report on Telecomunication
 
Chapter 8: Switching
Chapter 8: SwitchingChapter 8: Switching
Chapter 8: Switching
 
Basic networking in power point by suprabha
Basic networking in power point by suprabhaBasic networking in power point by suprabha
Basic networking in power point by suprabha
 
I - Mode Technology
I - Mode TechnologyI - Mode Technology
I - Mode Technology
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Mobile Transport layer
Mobile Transport layerMobile Transport layer
Mobile Transport layer
 
Mac protocols
Mac protocolsMac protocols
Mac protocols
 
Mobile computing notes and material
Mobile computing notes and materialMobile computing notes and material
Mobile computing notes and material
 
Design of a campus network
Design of a campus networkDesign of a campus network
Design of a campus network
 
39 ethernet
39 ethernet39 ethernet
39 ethernet
 
Network (Hub,switches)
Network  (Hub,switches)Network  (Hub,switches)
Network (Hub,switches)
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
UNIT I.ppt
UNIT I.pptUNIT I.ppt
UNIT I.ppt
 
IT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTINGIT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTING
 

Similar to MODULE-1_CCN.pptx

Overview of data communication and networking
Overview of data communication and networkingOverview of data communication and networking
Overview of data communication and networkingSisir Ghosh
 
Basic Concepts of Networking.pptx
Basic Concepts of Networking.pptxBasic Concepts of Networking.pptx
Basic Concepts of Networking.pptxAhmadAbba6
 
Network Fundamentals1.pptx
Network Fundamentals1.pptxNetwork Fundamentals1.pptx
Network Fundamentals1.pptxsairakesh41
 
COMPUTER NETWORKING SYSTEM
COMPUTER NETWORKING SYSTEMCOMPUTER NETWORKING SYSTEM
COMPUTER NETWORKING SYSTEMprapti borthakur
 
Computer Networks-1 1st unit (10CS55) VTU
Computer Networks-1 1st unit (10CS55) VTUComputer Networks-1 1st unit (10CS55) VTU
Computer Networks-1 1st unit (10CS55) VTUSiddharaj Junnarkar
 
Introduction to data communication
Introduction to data communicationIntroduction to data communication
Introduction to data communicationAbir Hossain
 
Computer network and communication (107 kb)
Computer network and communication (107 kb)Computer network and communication (107 kb)
Computer network and communication (107 kb)IMRAN KHAN
 
Introduction to Networking And its Types
Introduction to Networking And its TypesIntroduction to Networking And its Types
Introduction to Networking And its TypesHamzaHaji8
 
Network topology and devices
Network topology and devicesNetwork topology and devices
Network topology and devicesKunal Bhansali
 
presentation_internet.pptx
presentation_internet.pptxpresentation_internet.pptx
presentation_internet.pptxbantisworld
 
Networks classification
Networks classificationNetworks classification
Networks classificationMukesh Chinta
 
Computer Networks Module I
Computer Networks Module IComputer Networks Module I
Computer Networks Module IAjit Nayak
 
Computer Networks Unit 1 Introduction and Physical Layer
Computer Networks Unit 1 Introduction and Physical Layer Computer Networks Unit 1 Introduction and Physical Layer
Computer Networks Unit 1 Introduction and Physical Layer Dr. SELVAGANESAN S
 
Computer Network notes.docx
Computer Network notes.docxComputer Network notes.docx
Computer Network notes.docxMeenalochini M
 

Similar to MODULE-1_CCN.pptx (20)

Overview of data communication and networking
Overview of data communication and networkingOverview of data communication and networking
Overview of data communication and networking
 
Basic Concepts of Networking.pptx
Basic Concepts of Networking.pptxBasic Concepts of Networking.pptx
Basic Concepts of Networking.pptx
 
Network Fundamentals1.pptx
Network Fundamentals1.pptxNetwork Fundamentals1.pptx
Network Fundamentals1.pptx
 
COMPUTER NETWORKING SYSTEM
COMPUTER NETWORKING SYSTEMCOMPUTER NETWORKING SYSTEM
COMPUTER NETWORKING SYSTEM
 
Unit 1.pdf
Unit 1.pdfUnit 1.pdf
Unit 1.pdf
 
Computer network
Computer networkComputer network
Computer network
 
Computer Networks-1 1st unit (10CS55) VTU
Computer Networks-1 1st unit (10CS55) VTUComputer Networks-1 1st unit (10CS55) VTU
Computer Networks-1 1st unit (10CS55) VTU
 
3.1 Network Basic
3.1 Network Basic3.1 Network Basic
3.1 Network Basic
 
Introduction to data communication
Introduction to data communicationIntroduction to data communication
Introduction to data communication
 
Computer network and communication (107 kb)
Computer network and communication (107 kb)Computer network and communication (107 kb)
Computer network and communication (107 kb)
 
Network Devices
Network DevicesNetwork Devices
Network Devices
 
Introduction to Networking And its Types
Introduction to Networking And its TypesIntroduction to Networking And its Types
Introduction to Networking And its Types
 
Network topology and devices
Network topology and devicesNetwork topology and devices
Network topology and devices
 
presentation_internet.pptx
presentation_internet.pptxpresentation_internet.pptx
presentation_internet.pptx
 
Networks classification
Networks classificationNetworks classification
Networks classification
 
Computer Networks Module I
Computer Networks Module IComputer Networks Module I
Computer Networks Module I
 
Physical Layer.pdf
Physical Layer.pdfPhysical Layer.pdf
Physical Layer.pdf
 
#1 Physical Layer.pdf
#1 Physical Layer.pdf#1 Physical Layer.pdf
#1 Physical Layer.pdf
 
Computer Networks Unit 1 Introduction and Physical Layer
Computer Networks Unit 1 Introduction and Physical Layer Computer Networks Unit 1 Introduction and Physical Layer
Computer Networks Unit 1 Introduction and Physical Layer
 
Computer Network notes.docx
Computer Network notes.docxComputer Network notes.docx
Computer Network notes.docx
 

More from Dr. Shivashankar

21 Scheme_21EC53_MODULE-5_CCN_Dr. ShivaS
21 Scheme_21EC53_MODULE-5_CCN_Dr. ShivaS21 Scheme_21EC53_MODULE-5_CCN_Dr. ShivaS
21 Scheme_21EC53_MODULE-5_CCN_Dr. ShivaSDr. Shivashankar
 
21 SCHEME_21EC53_VTU_MODULE-4_COMPUTER COMMUNCATION NETWORK.pdf
21 SCHEME_21EC53_VTU_MODULE-4_COMPUTER COMMUNCATION NETWORK.pdf21 SCHEME_21EC53_VTU_MODULE-4_COMPUTER COMMUNCATION NETWORK.pdf
21 SCHEME_21EC53_VTU_MODULE-4_COMPUTER COMMUNCATION NETWORK.pdfDr. Shivashankar
 
Network Security_Dr Shivashankar_Module 5.pdf
Network Security_Dr Shivashankar_Module 5.pdfNetwork Security_Dr Shivashankar_Module 5.pdf
Network Security_Dr Shivashankar_Module 5.pdfDr. Shivashankar
 
Wireless Cellular Communication_Module 3_Dr. Shivashankar.pdf
Wireless Cellular Communication_Module 3_Dr. Shivashankar.pdfWireless Cellular Communication_Module 3_Dr. Shivashankar.pdf
Wireless Cellular Communication_Module 3_Dr. Shivashankar.pdfDr. Shivashankar
 
Wireless Cellular Communication_Mudule2_Dr.Shivashankar.pdf
Wireless Cellular Communication_Mudule2_Dr.Shivashankar.pdfWireless Cellular Communication_Mudule2_Dr.Shivashankar.pdf
Wireless Cellular Communication_Mudule2_Dr.Shivashankar.pdfDr. Shivashankar
 
Network Security_4th Module_Dr. Shivashankar
Network Security_4th Module_Dr. ShivashankarNetwork Security_4th Module_Dr. Shivashankar
Network Security_4th Module_Dr. ShivashankarDr. Shivashankar
 
Network Security_3rd Module_Dr. Shivashankar
Network Security_3rd Module_Dr. ShivashankarNetwork Security_3rd Module_Dr. Shivashankar
Network Security_3rd Module_Dr. ShivashankarDr. Shivashankar
 
Network Security_Module_2_Dr Shivashankar
Network Security_Module_2_Dr ShivashankarNetwork Security_Module_2_Dr Shivashankar
Network Security_Module_2_Dr ShivashankarDr. Shivashankar
 
Network Security-Module_1.pdf
Network Security-Module_1.pdfNetwork Security-Module_1.pdf
Network Security-Module_1.pdfDr. Shivashankar
 
Network Security_Module_2.pdf
Network Security_Module_2.pdfNetwork Security_Module_2.pdf
Network Security_Module_2.pdfDr. Shivashankar
 

More from Dr. Shivashankar (10)

21 Scheme_21EC53_MODULE-5_CCN_Dr. ShivaS
21 Scheme_21EC53_MODULE-5_CCN_Dr. ShivaS21 Scheme_21EC53_MODULE-5_CCN_Dr. ShivaS
21 Scheme_21EC53_MODULE-5_CCN_Dr. ShivaS
 
21 SCHEME_21EC53_VTU_MODULE-4_COMPUTER COMMUNCATION NETWORK.pdf
21 SCHEME_21EC53_VTU_MODULE-4_COMPUTER COMMUNCATION NETWORK.pdf21 SCHEME_21EC53_VTU_MODULE-4_COMPUTER COMMUNCATION NETWORK.pdf
21 SCHEME_21EC53_VTU_MODULE-4_COMPUTER COMMUNCATION NETWORK.pdf
 
Network Security_Dr Shivashankar_Module 5.pdf
Network Security_Dr Shivashankar_Module 5.pdfNetwork Security_Dr Shivashankar_Module 5.pdf
Network Security_Dr Shivashankar_Module 5.pdf
 
Wireless Cellular Communication_Module 3_Dr. Shivashankar.pdf
Wireless Cellular Communication_Module 3_Dr. Shivashankar.pdfWireless Cellular Communication_Module 3_Dr. Shivashankar.pdf
Wireless Cellular Communication_Module 3_Dr. Shivashankar.pdf
 
Wireless Cellular Communication_Mudule2_Dr.Shivashankar.pdf
Wireless Cellular Communication_Mudule2_Dr.Shivashankar.pdfWireless Cellular Communication_Mudule2_Dr.Shivashankar.pdf
Wireless Cellular Communication_Mudule2_Dr.Shivashankar.pdf
 
Network Security_4th Module_Dr. Shivashankar
Network Security_4th Module_Dr. ShivashankarNetwork Security_4th Module_Dr. Shivashankar
Network Security_4th Module_Dr. Shivashankar
 
Network Security_3rd Module_Dr. Shivashankar
Network Security_3rd Module_Dr. ShivashankarNetwork Security_3rd Module_Dr. Shivashankar
Network Security_3rd Module_Dr. Shivashankar
 
Network Security_Module_2_Dr Shivashankar
Network Security_Module_2_Dr ShivashankarNetwork Security_Module_2_Dr Shivashankar
Network Security_Module_2_Dr Shivashankar
 
Network Security-Module_1.pdf
Network Security-Module_1.pdfNetwork Security-Module_1.pdf
Network Security-Module_1.pdf
 
Network Security_Module_2.pdf
Network Security_Module_2.pdfNetwork Security_Module_2.pdf
Network Security_Module_2.pdf
 

Recently uploaded

The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 

Recently uploaded (20)

The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 

MODULE-1_CCN.pptx

  • 1. COMPUTER NETWORK (18EC71) Dr. Shivashankar Professor Department of Electronics & Communication Engineering RRIT, Bangalore 2/11/2023 1 Dr. Shivashankar, E&CE, RRIT
  • 2. Course Outcomes After Completion of the course, student will be able to Understand the concepts of networking thoroughly. Describe the various network architectures Identify the protocols and services of different layers Distinguish the basic network configurations and standards associated with each network models. Analyze a simple network and measurements of its parameters. Text Book: Data Communications and Networking , Forouzan, 5th Edition, McGraw Hill, 2016 ISBN: 1-25-906475-3 2/11/2023 2 Dr. Shivashankar, E&CE, RRIT
  • 3. MODULE-1 DATA COMMUNICATIONS Data communications are the exchange of data between two devices via some form of transmission medium such as a wired or wireless media. For data communications to occur, the communicating devices must be part of a communication system made up of a combination of hardware (physical equipment) and software (programs). The effectiveness of a data communications system depends on four fundamental characteristics: delivery, accuracy, timeliness and jitter. 2/11/2023 3 Dr. Shivashankar, E&CE, RRIT
  • 4. COMPONENTS Figure 1.1: Five Components of Data Communication 1. Message 2. Sender 3. Receiver 4. Transmission Media 5. Protocols 2/11/2023 4 Dr. Shivashankar, E&CE, RRIT
  • 5. CONTI… Message: Is the information (data) to be communicated. EX: text, numbers, pictures, audio, and video.  Sender: is the device that sends the data message. Ex: computer, workstation, telephone handset, Mobile etc.  Receiver: Is the device that receives the message. I Ex: computer, workstation, telephone handset, Mobile etc.  Transmission medium: Is the physical path by which a message travels from sender to receiver. Ex: twisted-pair wire, coaxial cable, fiber-optic cable, and radio waves.  Protocol: Is a set of rules that govern data communications. It represents an agreement between the communicating devices. Without a protocol, two devices may be connected but not communicating, Ex: TCP/IP, UDP etc 2/11/2023 5 Dr. Shivashankar, E&CE, RRIT
  • 6. Data Representation Text • In data communications, text is represented as a bit pattern, a sequence of bits (0s or 1s). •Different sets of bit patterns have been designed to represent text symbols. •Each set is called a code, and the process of representing symbols is called coding. •Today, the prevalent coding system is called Unicode, which uses 32 bits to represent a symbol or character used in any language in the world. •The American Standard Code for Information Interchange (ASCII), developed some decades ago in the United States, now constitutes the first 127 characters in Unicode and is also referred to as Basic Latin. 2/11/2023 6 Dr. Shivashankar, E&CE, RRIT
  • 7. CONTI… Numbers: Numbers are also represented by bit patterns. Number is directly converted to a binary number to simplify mathematical operations. Images: Images are also represented by bit patterns. In its simplest form, an image is composed of a matrix of pixels (picture elements), where each pixel is a small dot. The size of the pixel depends on the resolution. If an image is not made of pure white and pure black pixels, we can increase the size of the bit pattern to include gray scale. There are several methods to represent color images. One method is called RGB, so called because each color is made of a combination of three primary colors: red, green, and blue. 2/11/2023 7 Dr. Shivashankar, E&CE, RRIT
  • 8. CONTI… Audio refers to the recording or broadcasting of sound or music. Audio is by nature different from text, numbers, or images. It is continuous, not discrete. Even when we use a microphone to change voice or music to an electric signal, we create a continuous signal. Video refers to the recording or broadcasting of a picture or movie. Video can either be produced as a continuous entity (e.g., by a TV camera), or it can be a combination of images, each a discrete entity, arranged to convey the idea of motion. 2/11/2023 8 Dr. Shivashankar, E&CE, RRIT
  • 9. DATA FLOW Communication between two devices can be simplex, half-duplex, or full-duplex as shown in Figure 1.2. Figure 1: Different data flow representation Keyboards and traditional monitors are examples of simplex devices Each station can both transmit and receive, but not at the same time. When one device is sending, the other can only receive, and vice versa. Walkie-talkies , Radio Both stations can transmit and receive simultaneously. Mobile 2/11/2023 9 Dr. Shivashankar, E&CE, RRIT
  • 10. NETWORKS Network is a Interconnection of a set of devices capable of communication. A device can be a host such as a large computer, desktop, laptop, workstation, cellular phone, or security system. A device: connecting device such as a router, which connects the network to other networks, a switch, which connects devices together, a modem (modulator- demodulator), which changes the form of data, and so on. A network are connected using wired or wireless. 2/11/2023 10 Dr. Shivashankar, E&CE, RRIT
  • 11. Physical Structures Type of Connection Point-to-point connection : Point-to-point connections are typically used to connect two systems together over a WAN. The entire capacity of the link is reserved for transmission between those two devices. Most point-to-point connections use an actual length of wire or cable to connect the two ends, but other options, such as microwave or satellite links, are also possible. When we change television channels by infrared remote control, we are establishing a point-to-point connection between the remote control and the television’s control system. Example: telephone call 2/11/2023 11 Dr. Shivashankar, E&CE, RRIT
  • 12. CONTI… Multipoint: Also called multidrop connection. More than two specific devices share a single link. In a multipoint environment, the capacity of the channel is shared, either spatially or temporally. If several devices can use the link simultaneously, it is a spatially shared connection. If users must take turns, it is a timeshared connection. Figure 2: Types of Connection 2/11/2023 12 Dr. Shivashankar, E&CE, RRIT
  • 13. NETWORK TYPES local area network (LAN): Usually privately owned and connects some hosts in a single office, building, or campus. Depending on the needs of an organization, a LAN can be as simple as two PCs and a printer in someone’s home office, or it can extend throughout a company and include audio and video devices. Each host in a LAN has an identifier, an address, that uniquely defines the host in the LAN. A packet sent by a host to another host carries both the source host’s and the destination host’s addresses. Today, most LANs use a smart connecting switch, which is able to recognize the destination address of the packet and guide the packet to its destination without sending it to all other hosts. 2/11/2023 13 Dr. Shivashankar, E&CE, RRIT
  • 14. CONTI… Figure 1.8 An isolated LAN in the past and today 2/11/2023 14 Dr. Shivashankar, E&CE, RRIT
  • 15. CONTI… Wide Area Network (WAN) Also an interconnection of devices capable of communication. A LAN is normally limited in size, spanning an office, a building, or a campus; a WAN has. A wider geographical span, spanning a town, a state, a country, or even the world. A LAN interconnects hosts; a WAN interconnects connecting devices such as switches, routers, or modems. A LAN is normally privately owned by the organization that uses it; a WAN is normally created and run by communication companies and leased by an organization that uses it. We see two distinct examples of WANs today: point-to-point WANs and switched WANs. 2/11/2023 15 Dr. Shivashankar, E&CE, RRIT
  • 16. CONTI… Point-to-Point WAN A point-to-point WAN is a network that connects two communicating devices through a transmission media (cable or air). 2/11/2023 16 Dr. Shivashankar, E&CE, RRIT Figure 1.9 A point-to-point WAN
  • 17. CONTI… Switched WAN A switched WAN is a network with more than two ends. A switched WAN, as we will see shortly, is used in the backbone of global communication today. A switched WAN is a combination of several point-to-point WANs that are connected by switches. 2/11/2023 17 Dr. Shivashankar, E&CE, RRIT Figure 1.10 A switched WAN
  • 18. CONTI… Internetwork When two or more networks are connected, they make an internetwork, or internet. To make the communication between employees at different offices possible, the management leases a point- to-point dedicated WAN from a service provider, such as a telephone company, and connects the two LANs. 2/11/2023 18 Dr. Shivashankar, E&CE, RRIT Figure 1.11 An internetwork made of two LANs and one point-to-point WAN
  • 19. CONTI… Switching An internet is a switched network in which a switch connects at least two links together. A switch needs to forward data from a network to another network when required. The two most common types of switched networks:  Circuit-switched and Packet-switched networks. 2/11/2023 19 Dr. Shivashankar, E&CE, RRIT
  • 20. Cont.. Circuit-Switched Network • In a circuit-switched network, a dedicated connection, called a circuit, is always available between the two end systems; the switch can only make it active or inactive. 2/11/2023 Dr. Shivashankar, E&CE, RRIT 20 Figure 8: A circuit Switched Network
  • 21. Cont… 2/11/2023 Dr. Shivashankar, E&CE, RRIT 21 Packet-Switched Network • In a computer network, the communication between the two ends is done in blocks of data called packets. Figure 9: A packet-switched network
  • 22. The Internet It allowed multiple computers to work on a single network that was their biggest achievement internet. Internet is the foremost important tool and the prominent resource that is being used by almost every person across the globe.  It connects millions of computers, web pages, websites, and servers. The internet is a widespread interconnected network of computers and electronics devices(that support internet). It creates a communication medium to share and get information online. Origin Of Internet: The internet came in the year 1960 with the creation of the first working model called ARPANET (Advanced Research Projects Agency). 2/11/2023 22 Dr. Shivashankar, E&CE, RRIT
  • 23. Network Models PROTOCOL LAYERING In data communication and networking, a protocol defines the rules that both the sender and receiver and all intermediate devices need to follow to be able to communicate effectively. When communication is simple, we may need only one simple protocol; when the communication is complex, we may need to divide the task between different layers, in which case we need a protocol at each layer, or this technique we used to call protocol layering. This layering allows us to separate the services from the implementation. 2/11/2023 23 Dr. Shivashankar, E&CE, RRIT
  • 24. CONTI… Scenarios First Scenario In the first scenario, communication is so simple that it can occur in only one layer. Assume Maria and Ann are neighbors with a lot of common ideas. Communication between Maria and Ann takes place in one layer, face to face, in the same language, as shown in Figure 4. 2/11/2023 24 Dr. Shivashankar, E&CE, RRIT Figure 1.16 A single-layer protocol
  • 25. CONTI… . First, Maria and Ann know that they should greet each other when they meet. Second, they know that they should confine their vocabulary to the level of their friendship. Third, each party knows that she should refrain from speaking when the other party is speaking. Fourth, each party knows that the conversation should be a dialog, not a monolog: both should have the opportunity to talk about the issue. Fifth, they should exchange some nice words when they leave. 2/11/2023 25 Dr. Shivashankar, E&CE, RRIT
  • 26. CONTI… Second Scenario In the second scenario, we assume that Ann is offered a higher- level position in her company, but needs to move to another branch located in a city very far from Maria. The two friends still want to continue their communication and exchange ideas because they have come up with an innovative project to start a new business when they both retire. They decide to continue their conversation using regular mail through the post office. However, they do not want their ideas to be revealed by other people if the letters are intercepted. They agree on an encryption/decryption technique. 2/11/2023 26 Dr. Shivashankar, E&CE, RRIT
  • 27. CONTI… Figure 1.17 A three-layer protocol 2/11/2023 27 Dr. Shivashankar, E&CE, RRIT
  • 28. CONTI… Principles of Protocol Layering First Principle •The first principle dictates that if we want bi-directional communication, we need to make each layer so that it is able to perform two opposite tasks, one in each direction. •For example, the third layer task is to listen (in one direction) and talk (in the other direction). •The second layer needs to be able to encrypt and decrypt. •The first layer needs to send and receive mail. 2/11/2023 28 Dr. Shivashankar, E&CE, RRIT
  • 29. CONTI… Second Principle •The second principle that we need to follow in protocol layering is that the two objects under each layer at both sites should be identical. •For example, the object under layer 3 at both sites should be a plaintext letter. •The object under layer 2 at both sites should be a cipher text letter. •The object under layer 1 at both sites should be a piece of mail. 2/11/2023 29 Dr. Shivashankar, E&CE, RRIT
  • 30. CONTI… Logical Connections •A logical network is a virtual representation of a network that appears to the user as an entirely separate and self-contained network •A logical network interface or device is the software entity that is known by an operating system. 2/11/2023 30 Dr. Shivashankar, E&CE, RRIT Figure 7: Logical connection between peer layers
  • 31. TCP/IP PROTOCOL SUITE •Transmission Control Protocol/Internet Protocol (TCP/IP). •TCP/IP is a protocol suite (a set of protocols organized in different layers) used in the Internet today. •It is a hierarchical protocol made up of interactive modules, each of which provides a specific functionality. •Hierarchical means that each upper level protocol is supported by the services provided by one or more lower level protocols. •The original TCP/IP protocol suite was defined as four software layers built upon the hardware. •Today, however, TCP/IP is thought of as a five-layer model. 2/11/2023 31 Dr. Shivashankar, E&CE, RRIT
  • 32. CONTI… 2/11/2023 32 Dr. Shivashankar, E&CE, RRIT Figure 1.19 Layers in the TCP/IP protocol suite
  • 33. CONTI… Layered Architecture To show how the layers in the TCP/IP protocol suite are involved in communication between two hosts, we assume that we want to use the suite in a small internet made up of three LANs (links), each with a link-layer switch. 2/11/2023 33 Dr. Shivashankar, E&CE, RRIT Figure 1.20 Communication through an internet
  • 34. CONTI… Layers in the TCP/IP Protocol Suite  The duty of the data-link and physical layers is hop-to-hop, in which a hop is a host or router. The duty of the top three layers is the internet, and the domain of duty of the two lower layers is the link. 2/11/2023 34 Dr. Shivashankar, E&CE, RRIT Figure 1.21 Logical connections between layers of the TCP/IP protocol suite
  • 35. Physical layer Physical layer is the lowest level in the TCP/IP protocol suite, the communication between two devices. Responsible for carrying individual bits in a frame across the link. Two devices are connected by a transmission medium (cable or air). The transmission medium does not carry bits; it carries electrical or optical signals. The bits received in a frame from the data-link layer are trans- formed and sent through the transmission media. It provides an interface between devices (like PC’s or computers) and transmission medium. Hubs, Ethernet, etc. device is used in this layer. 2/11/2023 35 Dr. Shivashankar, E&CE, RRIT
  • 36. Data Link layer •The Data-link layer is the second layer from the bottom in the TCP/IP suits. •It is responsible for the node-to-node delivery of data. •Its major role is to ensure error-free transmission of information. •The routers are responsible for choosing the best links. •The data-link layer is responsible for taking the datagram and moving it across the link. •The data-link layer takes a datagram and encapsulates it in a packet called a frame. •data-link layer protocols are Ethernet IEEE 802.2 framing and Point- to-Point Protocol (PPP) framing. •A modern computer typically has three separate data link layer for Ethernet, wireless and Bluetooth. 2/11/2023 36 Dr. Shivashankar, E&CE, RRIT
  • 37. CONTI… Network Layer •The network layer is responsible for creating a connection between the source computer and the destination computer. •The "network layer" is the part of the Internet communications process. •Network layer is responsible for host-to-host communication and routing the packet through possible routes. •The network layer in the Internet includes the main protocol, Internet Protocol (IP), that defines the format of the packet, called a datagram at the network layer. •IP is a connectionless protocol that provides no flow control, no error control, and no congestion control services. •Handles the routing and sending of data between different networks. 2/11/2023 37 Dr. Shivashankar, E&CE, RRIT
  • 38. CONTI… The Internet Control Message Protocol (ICMP) used to determine whether or not data is reaching its intended destination in a timely manner. The Internet Group Management Protocol (IGMP) protocol that allows several devices to share one IP address so they can all receive the same data. To set up multicasting on networks that use the Internet Protocol version 4 (IPv4). The Dynamic Host Configuration Protocol (DHCP) helps IP to get the network-layer address for a host. The Address Resolution Protocol (ARP) is a protocol that helps IP to find the link- layer address of a host or a router when its network-layer address is given. 2/11/2023 38 Dr. Shivashankar, E&CE, RRIT
  • 39. Transport Layer Protocol •The logical connection at the transport layer is also end- to-end. •The transport layer at the source host gets the message from the application layer, encapsulates it, called a segment or a user datagram, and sends it, through the logical (imaginary) connection. •The transport layer maintains the order of data. •It receives the data from the upper layer and converts it into smaller parts known as segments. •One of the major tasks of the transport layer is to add the port addressing . 2/11/2023 39 Dr. Shivashankar, E&CE, RRIT
  • 40. CONTI… •Transmission Control Protocol (TCP): connection-oriented protocol. It creates a logical pipe between two TCPs for transferring a stream of bytes. •TCP provides flow control, error control and congestion control to reduce the loss of segments due to congestion in the network. •User Datagram Protocol (UDP): connectionless protocol that transmits user datagrams. • In UDP, each user datagram is an independent entity without being related to the previous or the next one(connectionless). •UDP is a simple protocol that does not provide flow, error, or congestion control. •Stream Control Transmission Protocol (SCTP): Connection oriented: a transport-layer protocol that ensures reliable, in-sequence transport of data. •SCTP provides multihoming support where one or both endpoints of a connection can consist of more than one IP address 2/11/2023 40 Dr. Shivashankar, E&CE, RRIT
  • 41. Application Layer •The actual communication is initiated and reflects. •Because this layer is on the top of the layer stack, it does not serve any other layers. •It takes the help of Transport and all layers below layers. •Identifying communication partners: It identifies the availability of communication partners for an application with data to transmit. •Determining resource availability: It determines whether sufficient network resources are available for the requested communication. •Synchronizing communication: All the communications occur between the applications requires cooperation which is managed by an application layer. 2/11/2023 41 Dr. Shivashankar, E&CE, RRIT
  • 42. CONTI… •The Hypertext Transfer Protocol (HTTP): foundation of any data exchange on the Web(www) and it is a client-server protocol •The Simple Mail Transfer Protocol (SMTP): the main protocol used in electronic mail (e-mail) service. •The File Transfer Protocol (FTP): used for transferring files from one host to another. •The Terminal Network (TELNET) and Secure Shell (SSH) are used for accessing a site remotely. •The Simple Network Management Protocol (SNMP): used by an administrator to manage the Internet at global and local levels. •The Domain Name System (DNS): used by other protocols to find the network-layer address of a computer. 2/11/2023 42 Dr. Shivashankar, E&CE, RRIT
  • 43. Encapsulation and De-capsulation •Encapsulation is the process of adding additional information when data is traveling in OSI or TCP/IP model. •The additional information will be added on sender’s side, starting from Application layer to Physical layer. •Decapsulation is the process of removing the header and trailer information from a packet, as it moves toward its destination. •The destination device receives the data in its original form. •Decapsulation moves in the reverse order, from Layer 1 to Layer 7 in the TCP/IP suite, as the packet travels to the receiving computer. 2/11/2023 43 Dr. Shivashankar, E&CE, RRIT
  • 44. CONTI… 2/11/2023 44 Dr. Shivashankar, E&CE, RRIT Figure 8: Encapsulation/Decapsulation
  • 45. Encapsulation at the Source Host 1. At the application layer, the data to be exchanged is referred to as a message. The message is passed to the transport layer. 2. The transport layer takes the message as the payload, It adds the transport layer header to the payload, called the segment (in TCP) and the user datagram (in UDP). The transport layer then passes the packet to the network layer. 3. The network layer takes the transport-layer packet as data or payload and adds its own header to the payload. The result is the network- layer packet, called a datagram. The network layer then passes the packet to the data-link layer. 4. The data-link layer takes the network-layer packet as data or payload and adds its own header, The result is the link-layer packet, which is called a frame. The frame is passed to the physical layer for transmission. 2/11/2023 45 Dr. Shivashankar, E&CE, RRIT
  • 46. CONTI… Decapsulation and Encapsulation at the Router At the router, we have both decapsulation and encapsulation because the router is connected to two or more links. 1. After the set of bits are delivered to the data-link layer, this layer decapsulates the datagram from the frame and passes it to the network layer. 2. The network layer only inspects the source and destination addresses in the datagram header and consults its forwarding table to find the next hop to which the datagram is to be delivered. The datagram is then passed to the data-link layer of the next link. 3. The data-link layer of the next link encapsulates the datagram in a frame and passes it to the physical layer for transmission. 2/11/2023 46 Dr. Shivashankar, E&CE, RRIT
  • 47. CONTI… Decapsulation at the Destination Host At the destination host, each layer only decapsulates the packet received, removes the payload, and delivers the payload to the next-higher layer protocol until the message reaches the application layer. It is necessary to say that decapsulation in the host involves error checking. 2/11/2023 47 Dr. Shivashankar, E&CE, RRIT
  • 48. Addressing logical communication between pairs of layers in this model. Any communication that involves two parties needs two addresses: source address and destination address. 2/11/2023 48 Dr. Shivashankar, E&CE, RRIT Figure 1.24 Addressing in the TCP/IP protocol suite
  • 49. Multiplexing and Demultiplexing •Multiplexing in this case means that a protocol at a layer can encapsulate a packet from several next-higher layer protocols (one at a time); •Memultiplexing means that a protocol can decapsulate and deliver a packet to several next-higher layer protocols (one at a time). 2/11/2023 49 Dr. Shivashankar, E&CE, RRIT Figure 1.25 Multiplexing and demultiplexing
  • 50. THE OSI MODEL •Established in 1947, the International Organization for Standardization (ISO) is a multinational body dedicated to worldwide agreement on international standards. •Almost three-fourths of the countries in the world are represented in the ISO. •An ISO standard that covers all aspects of network communications is the Open Systems Interconnection (OSI) model. It was first introduced in the late 1970s. An open system is a set of protocols that allows any two different systems to communicate. The purpose of the OSI model is to show how to facilitate communication between different systems without requiring changes to the logic of the underlying hardware and software. 2/11/2023 50 Dr. Shivashankar, E&CE, RRIT
  • 51. CONTI… 2/11/2023 51 Dr. Shivashankar, E&CE, RRIT Figure 1.26 : The OSI model
  • 52. OSI versus TCP/IP •Session and presentation aare not added to the TCP/IP protocol suite. • The application layer in the suite is usually considered to be the combination of three layers in the TCP/IP suite. •OSI model is developed by ISO (International Standard Organization), whereas TCP Model is developed by ARPANET (Advanced Research Project Agency Network). •OSI model helps us to standardize router, switch, motherboard, and other hardware, whereas TCP/IP helps us to establish a connection between different types of computers. •In OSI model, the transport layer is only connection-oriented, whereas the TCP/IP model is both connection-oriented and connectionless. 2/11/2023 52 Dr. Shivashankar, E&CE, RRIT
  • 53. CONTI… 2/11/2023 53 Dr. Shivashankar, E&CE, RRIT Figure 1.27 TCP/IP and OSI model
  • 54. QUIZES 1. A computer Networks permits sharing of a. Resources b. Information c. Both a & b d. None of the above 2. The first operational computer network in the world was ____in US. a. ARPANET b. ERNET c. SKYNET d. DARPANET 3. _____is the technology that connects the machine and people within small area a. WAN b. LAN c. MAN d. None of the above 4. ____ is network that covers geographical larger area, such as districts and cities a. WAN b. LAN c. MAN d. None of the above 2/11/2023 54 Dr. Shivashankar, E&CE, RRIT
  • 55. CONTI… 5. _____ is network that connects sites connects in diverse locations a. WAN b. LAN c. MAN d. None of the above 6. Check sum is used for a. Error correction b. Error detection c. Both a&b d. None of these 7. Network of networks known as a. Intranet b. Internet c. LAN d. WAN 8. The commonly used protocol for web page transfer is_______ a. HTML b. WML c. WTTP d. HTTP 2/11/2023 55 Dr. Shivashankar, E&CE, RRIT