SlideShare a Scribd company logo
Computer Network
Unit 1
Data Communication and Computer
Network
Introduction and necessity of
computer networking
• A computer network is a group of devices connected with
each other through a transmission medium such as wires,
cables etc.
• A computer network is a set of computers sharing resources
located on or provided by network nodes. The computers use
common communication protocols
over digital interconnections to communicate with each
other. These interconnections are made up
of telecommunication network technologies, based on
physically wired, optical, and wireless radio-frequency
methods that may be arranged in a variety of network
topologies.
• The purpose of having computer network is to send and
receive data stored in other devices over the computer
network.
Network goals and motivation
I. Resource Sharing-
The main goal of the computer network is Resource Sharing. It is to create all
the programs, data and hardware accessible to anyone on the network without
considering the location of resource and the user.
II. Reliability-
If there are alternate sources of supply, all files could be replicated on two or,
machines. If one of them is not available, due to hardware failure, the other
copies could be used.
III. Inter-process Communication –
Network users, located geographically apart, may converse in an interactive
session through the network.
IV. Flexible access –
Files can be accessed from any computer in the network. The project can be
begun on one computer and finished on another.
V. Cost Reduction –
Smaller Computers have much better price/performance compared to larger
ones. Mainframes are may faster one but costly as well.
VI. Communication – A file that was modified or updated on a network can be seen
by the other users on a network immediately.
Network Protocols
• A network protocol is an established set of rules that
determine how data is transmitted between different
devices in the same network.
• Types of protocols are explained below
• TCP
• IP
• HTTP
• HTTPS
• FTP
• SMTP
• POP
• IMAP
Network Protocols
1. TCP (Transmission Control Protocol):
– TCP is used to transfer the data over the internet.
It divides the data into small packets and sends it
to the destination through the network and make
sure that no packets got lost in transmission.
– The use of packets facilitates speedy transmission
since different parts of a message can be sent by
different routes and then reassembled at the
destination.
Tcp used for connection establishment between device and Ip finds
the address of system and sends their and tcp disconnect the connection
Network Protocols
2.IP (Internet Protocol):
– Internet Protocol (P) is the method used to route
information to the proper address. Every
computer on the internet has to have its own
unique address known as the IP address.
– Every packet sent will contain an IP address
showing where it is supposed to go.
– Note IP does not make physical connections
between computers but relies on TCP for this
function.
Network Protocols
3. HTTP (Hyper Text Transfer Protocol):
– HTTP is an application protocol that is used in the
address bar of the web browser before WWW. It
defines a mechanism for communication between
the browser and the web browser.
– Whenever we search anything in the address of
browser so it brings that website in front of us.
– It uses port 80.
Network Protocols
4. HTTPs (Hypertext Transfer Protocol over
Secure Socket Layer)
– It defines secure communication between a web
server and a web browser.
– A web page using this protocol will have https: at
the front of its URL. It uses port 443.
Network Protocols
5. File Transfer Protocol
– The File Transfer Protocol is a standard
communication protocol used for the transfer of
computer files from a server to a client on a
computer network.
– FTP is built on a client–server model architecture
using separate control and data connections
between the client and the server.
– It uses tcp/ip protocol to enable data transfer.
Network Protocols
6. Simple Mail Transfer Protocol
– SMTP is a set of communication guidelines that
allow software to transmit an electronic mail over
the internet is called Simple Mail Transfer
Protocol.
– It is a program used for sending and receiving
messages to other computer users based on e-
mail addresses.
– There are 2 more protocol with SMTP(POP and
IMAP).
Network Protocols
7. Post Office Protocol
– POP is a message access protocol that extracts
and retrieves email from a remote mail server for
access by the host machine. POP is an application
layer protocol in the OSI model that provides end
users the ability to fetch and receive email.
– POP send mail from sender to receiver and have
no backup
Network Protocols
8.IMAP(internet mail access protocol)
– Internet Message Access Protocol (IMAP) is a better version of POP.
– By using IMAP the main advantage is user can retrieve our deleted
email from the server.
9. User Datagram Protocol
– (UDP) is a communications protocol that is primarily used to establish
low-latency and loss-tolerating connections between applications on
the internet.
– It is connection less and unreliable protocol.
– It transfer data without establishing connection.
– It transfer data in a short distance.
– Use ip service to send data.
– UDP speeds up transmissions by enabling the transfer of data before
an agreement is provided by the receiving party.
Network Protocols
10. TELNET
– Telnet is an application protocol used on the Internet or local area
network to provide a bidirectional interactive text-oriented
communication facility using a virtual terminal connection. User
data is interspersed in-band with Telnet control information in an
8-bit byte oriented data connection over the Transmission Control
Protocol(TCP).
11. DHCP
– DHCP is a network management protocol used to dynamically
assign an IP address to many devices/node on a network so they
can communicate using IP(Internet Protocol).
– DHCP is also used to configure the proper subnet mask, default
gateway, and DNS server information on the device. It uses port
68.
Networking Model
• The two most important network models are
the Open Systems Interconnection Reference
(OSI) and the Internet Model.
• OSI Model
– The OSI Model (Open Systems Interconnection
Model) is a conceptual framework used to
describe the functions of a networking system.
Networking Model
OSI Layer
a. Application Layer
This layer is responsible for providing an interface to the
application user. It provides protocols that allow software
to send and receive information and present meaningful
data to users. A few examples of application layer
protocols are the (HTTP), (FTP), (POP), (SMTP).
b. Presentation Layer
The presentation layer prepares data for the application
layer.
c. Session layer
The session layer creates communication channels, called
sessions, between devices.
OSI Layer
d. Transport Layer
– The transport layer takes data transferred in the session
layer and breaks it into “segments” on the transmitting
end. It is responsible for reassembling the segments on the
receiving end, turning it back into data that can be used by
the session layer.
e. Network Layer
– The network layer has two main functions. One is breaking
up segments into network packets, and reassembling the
packets on the receiving end. The other is routing packets
by discovering the best path across a physical network. The
network layer uses network addresses (typically Internet
Protocol addresses) to route packets to a destination node.
OSI Layer
f. Data Link Layer
– The data link layer establishes and terminates a
connection between two physically-connected
nodes on a network. It breaks up packets into
frames and sends them from source to
destination.
g. Physical Layer
– The physical layer is responsible for the physical
cable or wireless connection between network
nodes.
OSI Layer
Networking Model
Internet Model
• Application Layer
• Transport Layer
• Internet Layer
• Link Layer
Internet Model
• The four layers in the TCP/IP protocol suite are −
• Network Access Layer −It is the lowest layer that is concerned with
the physical transmission of data. TCP/IP does not specifically define
any protocol here but supports all the standard protocols.
• Internet Layer −It defines the protocols for logical transmission of
data over the network. The main protocol in this layer is Internet
Protocol (IP) and it is supported by the protocols ICMP, IGMP, RARP,
and ARP.
• Transport Layer − It is responsible for error-free end-to-end delivery
of data. The protocols defined here are Transmission Control
Protocol (TCP) and User Datagram Protocol (UDP).
• Application Layer − This is the topmost layer and defines the
interface of host programs with the transport layer services. This
layer includes all high-level protocols like Telnet, DNS, HTTP, FTP,
SMTP, etc.
Application and use of networks
1. Communication
It is used for sending and receiving a message from one and
other through network by using electronic mail.
2. Accessing Resources
Networks allow computers to share and access resources with
other computing devices connected to it.
3. Centralization of data
Data can be stored on one server instead of several devices. For
example, on a small home network, all the data can be
centralized by using a server. By doing this, anyone with access
to the network can work with the data stored on the central
server without needing to connect several external hard drives
or flash drives to a computer.
Application and use of networks
5. Transfer of files
One way in which data and information can be shared on a network
is by sharing files. By sharing files, you allow users connected to the
same network (whether that is a local network or the internet) to
gain access to specific files.
6. Increase Productivity
The use of networks allow most people to work and study more
productively.
7. Entertainment
Access to the internet provides access to an almost unlimited
amount of entertainment. Examples include: games , multimedia, books,
movies.

More Related Content

Similar to Computer Network and commpunitcation 1.pptx

Network Protocol and TCP/IP
Network Protocol and TCP/IPNetwork Protocol and TCP/IP
Network Protocol and TCP/IP
Bwsrang Basumatary
 
uniti-websitebasics-230517110223-12e31dbc (1).pptx
uniti-websitebasics-230517110223-12e31dbc (1).pptxuniti-websitebasics-230517110223-12e31dbc (1).pptx
uniti-websitebasics-230517110223-12e31dbc (1).pptx
bmit1
 
INFORMATION PRACTICES CBSE CLASS 12 UNIT 3
INFORMATION PRACTICES CBSE CLASS 12 UNIT 3INFORMATION PRACTICES CBSE CLASS 12 UNIT 3
INFORMATION PRACTICES CBSE CLASS 12 UNIT 3
NIMISHMUTYAPU
 
IT2255 Web Essentials - Unit I Website Basics
IT2255 Web Essentials - Unit I  Website BasicsIT2255 Web Essentials - Unit I  Website Basics
IT2255 Web Essentials - Unit I Website Basics
pkaviya
 
CNP proficiency.pptx
CNP proficiency.pptxCNP proficiency.pptx
CNP proficiency.pptx
theshivammit13
 
Internet basics and Cloud Computing- Manish Jha
Internet basics and Cloud Computing- Manish JhaInternet basics and Cloud Computing- Manish Jha
Internet basics and Cloud Computing- Manish Jha
manish jha
 
Manish Jha- Research Scholar- Internet Basics Requriement
Manish Jha- Research Scholar- Internet Basics RequriementManish Jha- Research Scholar- Internet Basics Requriement
Manish Jha- Research Scholar- Internet Basics Requriement
Manish Jha
 
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01Cbsecommunicationandnetworkconcepts 121216105200-phpapp01
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01Gaurav Mehndiratta
 
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01Cbsecommunicationandnetworkconcepts 121216105200-phpapp01
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01
Ishant Tiwari
 
COC to-manage-and-monitor-the-network.pdf
COC to-manage-and-monitor-the-network.pdfCOC to-manage-and-monitor-the-network.pdf
COC to-manage-and-monitor-the-network.pdf
habtex1230
 
06 - OSI Model.ppt
06 - OSI Model.ppt06 - OSI Model.ppt
06 - OSI Model.ppt
ssuserf7cd2b
 
06 - OSI Model.ppt
06 - OSI Model.ppt06 - OSI Model.ppt
06 - OSI Model.ppt
ssuserf7cd2b
 
lecture 4.pptx
lecture 4.pptxlecture 4.pptx
lecture 4.pptx
MelkamuEndale1
 
Presentation (1)
Presentation (1)Presentation (1)
Presentation (1)
Janani Ramasamy
 
Networking fundamentalsss
Networking fundamentalsssNetworking fundamentalsss
Networking fundamentalsss
shahinaz Altabbakh
 
unit-1fon (1).pptx
unit-1fon (1).pptxunit-1fon (1).pptx
unit-1fon (1).pptx
DeepVala5
 
Introduction to Computer Networking
Introduction to Computer NetworkingIntroduction to Computer Networking
Introduction to Computer Networking
shankars73
 
Protocol architecture TCP IP
Protocol architecture TCP IPProtocol architecture TCP IP
Protocol architecture TCP IP
ToufiqueAhmed13
 
Introduction to Computer Networks
Introduction to Computer NetworksIntroduction to Computer Networks
Introduction to Computer Networks
Pankaj Gautam
 

Similar to Computer Network and commpunitcation 1.pptx (20)

Network Protocol and TCP/IP
Network Protocol and TCP/IPNetwork Protocol and TCP/IP
Network Protocol and TCP/IP
 
uniti-websitebasics-230517110223-12e31dbc (1).pptx
uniti-websitebasics-230517110223-12e31dbc (1).pptxuniti-websitebasics-230517110223-12e31dbc (1).pptx
uniti-websitebasics-230517110223-12e31dbc (1).pptx
 
INFORMATION PRACTICES CBSE CLASS 12 UNIT 3
INFORMATION PRACTICES CBSE CLASS 12 UNIT 3INFORMATION PRACTICES CBSE CLASS 12 UNIT 3
INFORMATION PRACTICES CBSE CLASS 12 UNIT 3
 
IT2255 Web Essentials - Unit I Website Basics
IT2255 Web Essentials - Unit I  Website BasicsIT2255 Web Essentials - Unit I  Website Basics
IT2255 Web Essentials - Unit I Website Basics
 
CNP proficiency.pptx
CNP proficiency.pptxCNP proficiency.pptx
CNP proficiency.pptx
 
Internet basics and Cloud Computing- Manish Jha
Internet basics and Cloud Computing- Manish JhaInternet basics and Cloud Computing- Manish Jha
Internet basics and Cloud Computing- Manish Jha
 
Manish Jha- Research Scholar- Internet Basics Requriement
Manish Jha- Research Scholar- Internet Basics RequriementManish Jha- Research Scholar- Internet Basics Requriement
Manish Jha- Research Scholar- Internet Basics Requriement
 
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01Cbsecommunicationandnetworkconcepts 121216105200-phpapp01
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01
 
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01Cbsecommunicationandnetworkconcepts 121216105200-phpapp01
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01
 
COC to-manage-and-monitor-the-network.pdf
COC to-manage-and-monitor-the-network.pdfCOC to-manage-and-monitor-the-network.pdf
COC to-manage-and-monitor-the-network.pdf
 
06 - OSI Model.ppt
06 - OSI Model.ppt06 - OSI Model.ppt
06 - OSI Model.ppt
 
06 - OSI Model.ppt
06 - OSI Model.ppt06 - OSI Model.ppt
06 - OSI Model.ppt
 
lecture 4.pptx
lecture 4.pptxlecture 4.pptx
lecture 4.pptx
 
Presentation (1)
Presentation (1)Presentation (1)
Presentation (1)
 
Networking fundamentalsss
Networking fundamentalsssNetworking fundamentalsss
Networking fundamentalsss
 
Dist 03-4
Dist 03-4Dist 03-4
Dist 03-4
 
unit-1fon (1).pptx
unit-1fon (1).pptxunit-1fon (1).pptx
unit-1fon (1).pptx
 
Introduction to Computer Networking
Introduction to Computer NetworkingIntroduction to Computer Networking
Introduction to Computer Networking
 
Protocol architecture TCP IP
Protocol architecture TCP IPProtocol architecture TCP IP
Protocol architecture TCP IP
 
Introduction to Computer Networks
Introduction to Computer NetworksIntroduction to Computer Networks
Introduction to Computer Networks
 

Recently uploaded

Using IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandUsing IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New Zealand
IES VE
 
BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024
Ortus Solutions, Corp
 
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Hivelance Technology
 
Lecture 1 Introduction to games development
Lecture 1 Introduction to games developmentLecture 1 Introduction to games development
Lecture 1 Introduction to games development
abdulrafaychaudhry
 
De mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FMEDe mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FME
Jelle | Nordend
 
How to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good PracticesHow to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good Practices
Globus
 
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
Juraj Vysvader
 
Advanced Flow Concepts Every Developer Should Know
Advanced Flow Concepts Every Developer Should KnowAdvanced Flow Concepts Every Developer Should Know
Advanced Flow Concepts Every Developer Should Know
Peter Caitens
 
Understanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSageUnderstanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSage
Globus
 
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
Tier1 app
 
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBrokerSOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar
 
Text-Summarization-of-Breaking-News-Using-Fine-tuning-BART-Model.pptx
Text-Summarization-of-Breaking-News-Using-Fine-tuning-BART-Model.pptxText-Summarization-of-Breaking-News-Using-Fine-tuning-BART-Model.pptx
Text-Summarization-of-Breaking-News-Using-Fine-tuning-BART-Model.pptx
ShamsuddeenMuhammadA
 
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdfDominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
AMB-Review
 
How Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptxHow Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptx
wottaspaceseo
 
A Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdfA Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdf
kalichargn70th171
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2
 
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus
 
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Globus
 
GlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote sessionGlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote session
Globus
 
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoamOpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
takuyayamamoto1800
 

Recently uploaded (20)

Using IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandUsing IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New Zealand
 
BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024
 
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
 
Lecture 1 Introduction to games development
Lecture 1 Introduction to games developmentLecture 1 Introduction to games development
Lecture 1 Introduction to games development
 
De mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FMEDe mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FME
 
How to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good PracticesHow to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good Practices
 
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
 
Advanced Flow Concepts Every Developer Should Know
Advanced Flow Concepts Every Developer Should KnowAdvanced Flow Concepts Every Developer Should Know
Advanced Flow Concepts Every Developer Should Know
 
Understanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSageUnderstanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSage
 
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
 
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBrokerSOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBroker
 
Text-Summarization-of-Breaking-News-Using-Fine-tuning-BART-Model.pptx
Text-Summarization-of-Breaking-News-Using-Fine-tuning-BART-Model.pptxText-Summarization-of-Breaking-News-Using-Fine-tuning-BART-Model.pptx
Text-Summarization-of-Breaking-News-Using-Fine-tuning-BART-Model.pptx
 
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdfDominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
 
How Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptxHow Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptx
 
A Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdfA Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdf
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
 
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024
 
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
 
GlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote sessionGlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote session
 
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoamOpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
 

Computer Network and commpunitcation 1.pptx

  • 1. Computer Network Unit 1 Data Communication and Computer Network
  • 2. Introduction and necessity of computer networking • A computer network is a group of devices connected with each other through a transmission medium such as wires, cables etc. • A computer network is a set of computers sharing resources located on or provided by network nodes. The computers use common communication protocols over digital interconnections to communicate with each other. These interconnections are made up of telecommunication network technologies, based on physically wired, optical, and wireless radio-frequency methods that may be arranged in a variety of network topologies. • The purpose of having computer network is to send and receive data stored in other devices over the computer network.
  • 3. Network goals and motivation I. Resource Sharing- The main goal of the computer network is Resource Sharing. It is to create all the programs, data and hardware accessible to anyone on the network without considering the location of resource and the user. II. Reliability- If there are alternate sources of supply, all files could be replicated on two or, machines. If one of them is not available, due to hardware failure, the other copies could be used. III. Inter-process Communication – Network users, located geographically apart, may converse in an interactive session through the network. IV. Flexible access – Files can be accessed from any computer in the network. The project can be begun on one computer and finished on another. V. Cost Reduction – Smaller Computers have much better price/performance compared to larger ones. Mainframes are may faster one but costly as well. VI. Communication – A file that was modified or updated on a network can be seen by the other users on a network immediately.
  • 4. Network Protocols • A network protocol is an established set of rules that determine how data is transmitted between different devices in the same network. • Types of protocols are explained below • TCP • IP • HTTP • HTTPS • FTP • SMTP • POP • IMAP
  • 5. Network Protocols 1. TCP (Transmission Control Protocol): – TCP is used to transfer the data over the internet. It divides the data into small packets and sends it to the destination through the network and make sure that no packets got lost in transmission. – The use of packets facilitates speedy transmission since different parts of a message can be sent by different routes and then reassembled at the destination. Tcp used for connection establishment between device and Ip finds the address of system and sends their and tcp disconnect the connection
  • 6. Network Protocols 2.IP (Internet Protocol): – Internet Protocol (P) is the method used to route information to the proper address. Every computer on the internet has to have its own unique address known as the IP address. – Every packet sent will contain an IP address showing where it is supposed to go. – Note IP does not make physical connections between computers but relies on TCP for this function.
  • 7. Network Protocols 3. HTTP (Hyper Text Transfer Protocol): – HTTP is an application protocol that is used in the address bar of the web browser before WWW. It defines a mechanism for communication between the browser and the web browser. – Whenever we search anything in the address of browser so it brings that website in front of us. – It uses port 80.
  • 8. Network Protocols 4. HTTPs (Hypertext Transfer Protocol over Secure Socket Layer) – It defines secure communication between a web server and a web browser. – A web page using this protocol will have https: at the front of its URL. It uses port 443.
  • 9. Network Protocols 5. File Transfer Protocol – The File Transfer Protocol is a standard communication protocol used for the transfer of computer files from a server to a client on a computer network. – FTP is built on a client–server model architecture using separate control and data connections between the client and the server. – It uses tcp/ip protocol to enable data transfer.
  • 10. Network Protocols 6. Simple Mail Transfer Protocol – SMTP is a set of communication guidelines that allow software to transmit an electronic mail over the internet is called Simple Mail Transfer Protocol. – It is a program used for sending and receiving messages to other computer users based on e- mail addresses. – There are 2 more protocol with SMTP(POP and IMAP).
  • 11. Network Protocols 7. Post Office Protocol – POP is a message access protocol that extracts and retrieves email from a remote mail server for access by the host machine. POP is an application layer protocol in the OSI model that provides end users the ability to fetch and receive email. – POP send mail from sender to receiver and have no backup
  • 12. Network Protocols 8.IMAP(internet mail access protocol) – Internet Message Access Protocol (IMAP) is a better version of POP. – By using IMAP the main advantage is user can retrieve our deleted email from the server. 9. User Datagram Protocol – (UDP) is a communications protocol that is primarily used to establish low-latency and loss-tolerating connections between applications on the internet. – It is connection less and unreliable protocol. – It transfer data without establishing connection. – It transfer data in a short distance. – Use ip service to send data. – UDP speeds up transmissions by enabling the transfer of data before an agreement is provided by the receiving party.
  • 13. Network Protocols 10. TELNET – Telnet is an application protocol used on the Internet or local area network to provide a bidirectional interactive text-oriented communication facility using a virtual terminal connection. User data is interspersed in-band with Telnet control information in an 8-bit byte oriented data connection over the Transmission Control Protocol(TCP). 11. DHCP – DHCP is a network management protocol used to dynamically assign an IP address to many devices/node on a network so they can communicate using IP(Internet Protocol). – DHCP is also used to configure the proper subnet mask, default gateway, and DNS server information on the device. It uses port 68.
  • 14. Networking Model • The two most important network models are the Open Systems Interconnection Reference (OSI) and the Internet Model. • OSI Model – The OSI Model (Open Systems Interconnection Model) is a conceptual framework used to describe the functions of a networking system.
  • 16. OSI Layer a. Application Layer This layer is responsible for providing an interface to the application user. It provides protocols that allow software to send and receive information and present meaningful data to users. A few examples of application layer protocols are the (HTTP), (FTP), (POP), (SMTP). b. Presentation Layer The presentation layer prepares data for the application layer. c. Session layer The session layer creates communication channels, called sessions, between devices.
  • 17. OSI Layer d. Transport Layer – The transport layer takes data transferred in the session layer and breaks it into “segments” on the transmitting end. It is responsible for reassembling the segments on the receiving end, turning it back into data that can be used by the session layer. e. Network Layer – The network layer has two main functions. One is breaking up segments into network packets, and reassembling the packets on the receiving end. The other is routing packets by discovering the best path across a physical network. The network layer uses network addresses (typically Internet Protocol addresses) to route packets to a destination node.
  • 18. OSI Layer f. Data Link Layer – The data link layer establishes and terminates a connection between two physically-connected nodes on a network. It breaks up packets into frames and sends them from source to destination. g. Physical Layer – The physical layer is responsible for the physical cable or wireless connection between network nodes.
  • 21. Internet Model • Application Layer • Transport Layer • Internet Layer • Link Layer
  • 22. Internet Model • The four layers in the TCP/IP protocol suite are − • Network Access Layer −It is the lowest layer that is concerned with the physical transmission of data. TCP/IP does not specifically define any protocol here but supports all the standard protocols. • Internet Layer −It defines the protocols for logical transmission of data over the network. The main protocol in this layer is Internet Protocol (IP) and it is supported by the protocols ICMP, IGMP, RARP, and ARP. • Transport Layer − It is responsible for error-free end-to-end delivery of data. The protocols defined here are Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). • Application Layer − This is the topmost layer and defines the interface of host programs with the transport layer services. This layer includes all high-level protocols like Telnet, DNS, HTTP, FTP, SMTP, etc.
  • 23. Application and use of networks 1. Communication It is used for sending and receiving a message from one and other through network by using electronic mail. 2. Accessing Resources Networks allow computers to share and access resources with other computing devices connected to it. 3. Centralization of data Data can be stored on one server instead of several devices. For example, on a small home network, all the data can be centralized by using a server. By doing this, anyone with access to the network can work with the data stored on the central server without needing to connect several external hard drives or flash drives to a computer.
  • 24. Application and use of networks 5. Transfer of files One way in which data and information can be shared on a network is by sharing files. By sharing files, you allow users connected to the same network (whether that is a local network or the internet) to gain access to specific files. 6. Increase Productivity The use of networks allow most people to work and study more productively. 7. Entertainment Access to the internet provides access to an almost unlimited amount of entertainment. Examples include: games , multimedia, books, movies.