This document provides an overview of the CS303: Computer Networks course, including the evaluation scheme, topics to be covered, and introductory information on data communications, networks, protocols, layered tasks, the OSI model, TCP/IP protocol suite, and addressing in networks. The key topics include data communication components and data flow, physical network structures and categories, elements of communication protocols, layered approaches to tasks, the seven layers of the OSI model and functions of each layer, comparison of OSI and TCP/IP models, and different types of addresses used including physical, logical, port, and specific addresses.
Presiding Officer Training module 2024 lok sabha elections
CS303: Computer Networks (V Sem) Unit-1 Overview
1. CS303: Computer Networks
(V Sem)
Unit-1
Dr. Sadhvi
Assistant Professor
Indian Institute of Information Technology Dharwad
2. Acknowledgement
● The contents of the slides are mostly taken from:
○ “Data Communications and Networking”, Fourth edition,
Behrouz Forouzan - McGraw-Hill, 2007.
● Other contents are taken from:
○ "Computer Networking: a Top-Down Approach”, Eighth
edition, J.F. Kurose, K.W. Ross - Pearson, 2020.
○ Other Internet sources.
5. DATA
COMMUNICATIONS
• The term telecommunication means communication
at a distance.
• The word data refers to information presented in
whatever form is agreed upon by the parties creating
and using the data.
• Data communications is the exchange of data between
two devices via some form of transmission medium
such as a wire cable.
▪ Components of a data communications system
▪ Data Flow
Topics discussed in this section:
8. NETWORKS
• A network is a set of devices (often referred to as
nodes) connected by communication links.
• A node can be a computer, printer, or any other device
capable of sending and/or receiving data generated by
other nodes on the network.
• A link can be a cable, air, optical fiber, or any
medium which can transport a signal carrying
information.
▪ Network Criteria
▪ Physical Structures
▪ Categories of Networks
Topics discussed in this section:
9. Network Criteria
■ Performance
■ Depends on Network Elements
■ Measured in terms of Delay and Throughput
■ Reliability
■ Failure rate of network components
■ Measured in terms of availability/robustness
■ Security
■ Data protection against corruption/loss of data due to:
■ Errors
■ Malicious users
10. Physical Structures
■ Type of Connection
■ Point to Point - single transmitter and receiver
■ Multipoint - multiple recipients of single transmission
■ Physical Topology
■ Connection of devices
■ Type of transmission - unicast, mulitcast, broadcast
13. Figure 1.5 A fully connected mesh topology (five devices)
Advantages:
1.Eliminate traffic problems
2.Robust
3.Privacy and Security is
maintained
4.Fault identification and fault
isolation is easy
Disadvantages:
1.Amount of cabling
2.Number of I/O ports
14. Figure 1.6 A star topology connecting four stations
Advantages:
1.Less cabling and less I/O ports
required
2.Easy to install and configure
3.Fault identification and fault
isolation is easy
Disadvantages:
1.Single point of failure
15. Figure 1.7 A bus topology connecting three stations
Advantages:
1.Ease of installation
2.Less cabling
Disadvantages:
1.Fault isolation is difficult
2.Limited number of devices can be
connected
3.Fault or break in the bus cable stops
all transmission
16. Figure 1.8 A ring topology connecting six stations
Advantages:
1.Easy to install and configure
2.Fault isolation is simplified
Disadvantages:
1.Unidirectional traffic
17. Figure 1.9 A hybrid topology: a star backbone with three bus networks
18. Categories of Networks
■ Local Area Networks (LANs)
■ Short distances
■ Designed to provide local interconnectivity
■ Wide Area Networks (WANs)
■ Long distances
■ Provide connectivity over large areas
■ Metropolitan Area Networks (MANs)
■ Provide connectivity over areas such as a city, a campus
19. Figure 1.10 An isolated LAN connecting 12 computers to a hub in a closet
21. Figure 1.12 A heterogeneous network made of four WANs and two LANs
22. PROTOCOLS
• A protocol is synonymous with rule.
• It consists of a set of rules that govern data
communications.
• It determines what is communicated, how it is
communicated and when it is communicated.
• The key elements of a protocol are syntax, semantics
and timing
▪ Syntax
▪ Semantics
▪ Timing
Topics discussed in this section:
23. Elements of a Protocol
■ Syntax
■ Structure or format of the data
■ Indicates how to read the bits - field delineation
■ Semantics
■ Interprets the meaning of the bits
■ Knows which fields define what action
■ Timing
■ When data should be sent and
■ Speed at which data should be sent or speed at which it is being
received.
24. LAYERED
TASKS
• We use the concept of layers in our daily life.
• For example, consider two friends who communicate
through postal mail.
• The process of sending a letter to a friend would be
complex if there were no services available from the
post office.
Sender, Receiver, and Carrier
Hierarchy
Topics discussed in this section:
26. THE OSI MODEL
• Established in 1947, the International Standards
Organization (ISO) is a multinational body dedicated
to worldwide agreement on international standards.
• An ISO standard that covers all aspects of network
communications is the Open Systems Interconnection
(OSI) model. It was first introduced in the late 1970s.
Layered Architecture
Peer-to-Peer Processes
Encapsulation
Topics discussed in this section:
27. ISO is the organization.
OSI is the model.
Note
31. LAYERS IN THE OSI MODEL
• In this section, we briefly describe the functions of
each layer in the OSI model.
Physical Layer
Data Link Layer
Network Layer
Transport Layer
Session Layer
Presentation Layer
Application Layer
Topics discussed in this section:
35. • The data link layer is responsible for moving frames from
one hop (node) to the next.
• Error detection and correction
• Flow control
• Ensuring well-defined reliable service interface to the
network layer
• Encapsulating packets from network layer to frames
Note
38. • The network layer is responsible for the delivery of
individual packets from the source host to the destination
host.
• Logical addressing
• Routing
Note
41. • The transport layer is responsible for the delivery of a message
from one process to another.
• Service-point addressing
• Segmentation and reassembly
• Connection control (Connectionless or connection oriented)
• Error control - Transmission error detection
• Flow Control
Note
44. • The session layer is responsible for dialog control and
synchronization.
• Connection parameter negotiations
• Acknowledgement of data received during a session
• Retransmission of data if it is not received by a device
Note
46. The presentation layer is responsible for
•Content translation
•Graphics formatting
•Compression and expansion of message
•Encryption and decryption of message for security
Note
48. The application layer is responsible for providing services to
the user.
•Electronic mail
•File transfers
•Electronic messaging
•Browsing the World Wide Web
•Printing over the network
Note
50. TCP/IP PROTOCOL SUITE
• The layers in the TCP/IP protocol suite do not exactly
match those in the OSI model.
• The original TCP/IP protocol suite was defined as having
four layers: host-to-network, internet, transport, and
application.
• However, when TCP/IP is compared to OSI, we can say
that the TCP/IP protocol suite is made of five layers:
physical, data link, network, transport, and application.
Physical and Data Link Layers
Network Layer
Transport Layer
Application Layer
Topics discussed in this section:
52. ADDRESSING
• Four levels of addresses are used in an internet
employing the TCP/IP protocols: physical, logical, port,
and specific.
Physical Addresses
Logical Addresses
Port Addresses
Specific Addresses
Topics discussed in this section:
55. • The physical address, also known as the link address, is the
address of a node as defined by its LAN or WAN.
• It is included in the frame used by the data link layer. It is the
lowest-level address.
• The physical addresses have authority over the network (LAN
or WAN).
• For example, Ethernet uses a 6-byte (48-bit) physical address
that is imprinted on the network interface card (NIC).
Physical Addresses
56. A node with physical address 10 sends a frame to a node
with physical address 87. The two nodes are connected
by a link (bus topology LAN).
Example 2.1 Physical addresses
57. Most local-area networks use a 48-bit (6-byte) physical
address written as 12 hexadecimal digits; every byte (2
hexadecimal digits) is separated by a colon, as shown
below:
Example 2.2
07:01:02:01:2C:4B
A 6-byte (12 hexadecimal digits) physical address.
58. • Logical addresses are necessary for universal communications
that are independent of underlying physical networks.
• Physical addresses are not adequate in an internetwork
environment where different networks can have different address
formats universal addressing system is needed.
• Therefore logical addresses A logical address in the Internet is
currently a 32-bit address that can uniquely define a host
connected to the Internet.
• No two publicly addressed and visible hosts on the Internet can
have the same IP address.
Logical Addresses
59. Figure 2.20 shows a part of an internet with two routers
connecting three LANs. Each device (computer or router) has a
pair of addresses (logical and physical) for each connection. In
this case, each computer is connected to only one link and
therefore has only one pair of addresses. Each router, however, is
connected to three networks (only two are shown in the figure). So
each router has three pairs of addresses, one for each connection.
Example 2.3
61. • The IP address and the physical address are necessary. However,
arrival of the data at the destination is not the final objective.
• Today, computers can run multiple processes at the same time
target process to process communication.
• For example, computer A can communicate with computer C by using
TELNET. At the same time, computer A communicates with computer B by
using the File Transfer Protocol (FTP). For these processes to receive data
simultaneously, we need a method to label the different processes.
• In other words, they need addresses. In the TCP/IP, a 16-bit label,
called as port address, is assigned to the processes.
Port Addresses
62. Figure 2.21 shows two computers communicating via the Internet.
The sending computer is running three processes at this time with
port addresses a, b, and c. The receiving computer is running two
processes at this time with port addresses j and k.
Process a in the sending computer needs to communicate with
process j in the receiving computer. Note that although physical
addresses change from hop to hop, logical and port addresses
remain the same from the source to destination.
Example 2.4
64. The physical addresses will change from hop to hop,
but the logical addresses usually remain the same.
Note
65. • Some applications have user-friendly addresses that are designed
for that specific address.
• Examples include the e-mail address (for example, xyz@abc.edu)
and the Universal Resource Locator (URL) (for example,
www.facebook.com).
• The first defines the recipient of an e-mail and the second is used
to find a document on the World Wide Web.
Specific Addresses
66. Example 2.5
A port address is a 16-bit address represented by one
decimal number as shown.
80
A 16-bit port address represented
as one single number.