SlideShare a Scribd company logo
1 of 84
Slides Prepared by Aneeb.A Assiatant Professor HM College of Science and Technology Manjeri
Slides Prepared by Aneeb.A Assiatant Professor HM College of Science and Technology Manjeri
 FILE SHARING
–
Networks offer a quick and
easy way to share files directly.
 RESOURCE SHARING – All computers in the
as
and
network
printers,
modems.
can
fax
share resources such
machines, scanners,
 COMMUNICATION –Those on the network can
communicate with each other via e-mail,
instant messages, etc.
 Flexible Access - Networks allow their users
to access files from computers throughout
the network.
-
share
 Sharing of Information Computer
networks enable us
the
to data
that
and
areinformation with computers
located geographically large distance apart.
P2P
Stands for "Peer to Peer." In a P2P network, the "peers" are computer systems
which are connected to each other via the Internet. Files can be shared directly
between systems on the network without the need of a central server. In other
words, each computer on a P2P network becomes a file server as well as a
client.
DifferentTypes of Networks
• Depending upon the geographical
by a network, it is classified as:
area covered
– Local Area Network (LAN)
– Metropolitan Area Network (MAN)
– Wide Area Network (WAN)
– Personal Area Network (PAN)
Local Area Network (LAN)
A LAN is a network that is used for communicating among
computer devices, usually within an office building or home.
•
• LAN’s enable the sharing of resources such as files or
hardware devices that may be needed by multiple users
•
• Is limited in size, typically spanning a few hundred meters,
and no more than a mile
• Is fast, with speeds from 10 Mbps to 10 Gbps
• Requires little wiring, typically a single cable connecting to
each device
• Has lower cost compared to MAN’s or WAN’s
Local Area Network (LAN)
LAN’s can be either wired or wireless.Twisted pair,
coax or fibre optic cable can be used in wired LAN’s.
•
• Every LAN uses a protocol – a set of rules that governs
how packets are configured and transmitted.
• Nodes in a LAN are linked together with a certain
topology.These topologies include:
–
–
–
Bus
Ring
Star
• LANs are capable of very high transmission rates (100s
Mb/s to G b/s).
Local Area Network (LAN)
Advantages of LAN
• Speed
• Cost
• Security
• E-mail
• Resource Sharing
Disadvantages
ExpensiveTo Install
of LAN
•
• Requires Administrative Time
• File Server May Fail
• Cables May Break
Metropolitan Area Network (MAN)
A metropolitan area network (MAN) is a large
computer network that usually spans a city or a
large campus.
•
• A MAN is optimized for a larger geographical
area than a LAN, ranging from several blocks
buildings to entire cities.
of
• A MAN might be owned and operated by a
single organization, but it usually will be used
by many individuals and organizations.
Metropolitan Area Network (MAN)
A MAN often acts as a high speed network to
allow sharing of regional resources.
•
• A MAN typically covers an area of between
and 50 km diameter.
5
• Examples of MAN:Telephone company
network that provides a high speed DSL to
customers and cable TV
network,Networks of Banks like
institution which cover a district
Metropolitan Area Network (MAN)
Wide Area Network (WAN)
WAN covers a large geographic area such as
country, continent or even whole of the world.
•
• AWAN is two or more LANs connected
together.The LANs can be many miles apart.
• To cover great distances,WANs may transmit
data over leased high-speed phone lines or
wireless links such as satellites.
Wide Area Network (WAN)
Multiple LANs can be connected together
using devices such as bridges, routers, or
gateways, which enable them to share data.
•
• The world's most popularWAN is the Internet.
Slides Prepared by Aneeb.A Assiatant Professor HM College of Science and Technology Manjeri
Wide Area Network (WAN)
Personal Area Network (PAN)
Personal Area Network (PAN)
A PAN is a network that is used for
communicating among computers and computer
devices (including telephones) in close
proximity of around a few meters within a room
•
•
It can be used for communicating between the
devices themselves, or for connecting to a larger
network such as the internet.
• PAN’s can be wired or wireless
Personal Area Network (PAN)
A personal area network (PAN) is a computer
network used for communication among
computer devices, including telephones and
personal digital assistants, in proximity to an
individual's body.
•
• The devices may or may not belong to the
person in question.The reach of a PAN is
typically a few meters.
Personal Area Network (PAN)
 It is the physical way in which computers
are interconnected.
 Five basic network structures are :
 Devices are connected to a central computer
called HUB.
 A Star network is particularly appropriate for
organizations that require a centralized data
base or a centralized processing facility.
 For example, a star network may be used in
banking for centralized record keeping in an
on-line branch office environment.
 It is easy to add new and remove nodes.
 A node failure does not bring let down
the entire network.
 It is easier to diagnose network
through a central hub.
problems
 If the central hub fails, the whole network
ceases to function.
 It costs more to cable a star configuration
than other topologies because more cable is
required than other topologies.
 In Bus topology a single network cable runs in
the building or campus and all nodes are
line
or
linked along with this communication
with two endpoints called the bus
backbone.
 This structure is very popular for local area
networks
Slides Prepared by Aneeb.A Assiatant Professor HM College of Science and Technology Manjeri
 Reliable in very small networks as well as
easy to use and understand.
 Requires the least amount of cable to connect
the computers together and therefore is less
expensive than other cabling arrangements.
 Heavy network traffic can slow a bus
considerably.
 Each connection between cables weakens the
electrical signal.
If the common cable fails, then the whole
system will crash down
 In Ring topology the network cable passes
from one node to another until all nodes are
connected in the form of a “loop or ring”.
 Transmits in only one direction.
 Used in LAN’S and WAN’S.
1.One station is known as monitor station which takes all the
responsibility to perform the operations.
2.To transmit the data, station has to hold the token. After the
transmission is done, the token is to be released for other stations to
use.
3.When no station is transmitting the data, then the token will circulate
in the ring.
 Ring networks can span longer distances
than other types of networks.
 Ring networks are easily extendable.
 Relatively expensive and difficult to install.
 Failure of one computer on the network
can affect the whole network.
 Adding or removing computers can disrupt
the network.
 In mesh network, there is random connection
of nodes using communication links.
 Mesh topology is the general topology for
wide area network.
 In mesh topology, every device is connected
to another device via particular channel.
In mesh topology, every device is connected to another
device via particular channel.
Slides Prepared by Aneeb.A Assiatant Professor HM College of Science and Technology Manjeri
Figure 1 : Every device is connected with another via dedicated channels. These channels are known
as links.
•If suppose, N number of devices are connected with each other in mesh topology, then total number of
ports that is required by each device is ? N-1. In the Figure 1, there are 5 devices connected to each
other, hence total number of ports required is 4.
•If suppose, N number of devices are connected with each other in mesh topology, then total number of
dedicated links required to connect them is NC2 i.e. N(N-1)/2. In the Figure 1, there are 5 devices
connected to each other, hence total number of links required is 5*4/2 = 10
 The reliability is very high
alternate paths available if
as there are always
direct link between
two nodes is down.
 Yields the greatest amount
of the
of redundancy in
the event that one
can
nodes fails where
network
node.
traffic be redirected to another
 The cost of installation and maintenance is
high ( more cable is required than any other
configuration).
 A tree topology connects one star network
the other star network.
to
 It is an extension of star topology.
 Here, we divided the whole network into
segment which can be easily managed and
maintained.
In this the various secondary hubs are connected to the central hub which contains the repeater.
 Each segment is provided with dedicated
point-to-point wiring to central hub.
 Error detection and correction is easy.
 If one segment is damaged, other segment
are not affected.
 Expansion of network is possible and easy.
 As multiple segments are connected to a
central hub, the networks depend heavily on
the hub. Its failure affects the entire network.
 Maintenance is not easy and cost are high.
 With increase in size beyond a point, the
management becomes difficult.
Hybrid Topology :
This topology is a collection of two or more topologies which are described above. This is a scalable topology
which can be expanded easily. It is reliable one but at the same it is a costly topology
INTERNETWORK/Internet
Today, it is very rare to see a LAN, a MAN, or a LAN in isolation; they are connected to
one another. When two or more networks are connected, they become an internetwork,
or internet.
As an example, assume that an organization has two offices, one on the east coast and the
other on the west coast. The established office on the west coast has a bus topology
LAN; the newly opened office on the east coast has a star topology LAN. The president of
the company lives somewhere in the middle and needs to have control over the company
from her horne. We can make communicate them using internet via switches and routers
like network devices
NETWORK MODELS
Computer Network Models : Introduction
 For data communication to take place and two or more users can transmit data from one to other, a systematic approach
is required. This approach enables users to communicate and transmit data through efficient and ordered path. It is
implemented using models in computer networks and are known as computer network models.
 Computer network models are responsible for establishing a connection among the sender and receiver and transmitting
the data in a smooth manner respectively.
 There are two computer network models i.e. OSI Model and TCP/IP Model on which the whole data communication
process relies.
Computer Network Models : The OSI Reference Model
 The OSI Model is one of the general purpose networking or communication model among computer network models,
which is responsible for establishing connection in an open manner between all the communicable devices present
across the globe.
 OSI stands for “Open System Interconnection” and the name of this reference model was given by an organization
known as “International Organization for Standardization”. The ISO is responsible for generating and promoting
industrial and commercial standards applicable for all the users or universally.
 Apart from OSI Model, another computer network models which is widely used is TCP/IP Model.
 OSI model having a layered architecture, allows easy data communication as each layer has
predefined structured and functionalities.
The functionalities are different for each layer and thus when combined together forms the OSI Model. There
are in total seven layers in general purpose OSI model
Physical Layer
The lowest layer of the OSI reference model is the physical layer. It is responsible for the actual
physical connection between the devices. The physical layer contains information in the form
of bits. It is responsible for transmitting individual bits from one node to the next. When receiving
data, this layer will get the signal received and convert it into 0s and 1s and send them to the Data
Link layer, which will put the frame back together.
Slides Prepared by Aneeb.A Assiatant Professor HM College of Science and Technology Manjeri
The functions of the physical layer are :
1. Bit rate control: The Physical layer also defines the transmission rate i.e. the
number of bits sent per second.
2. Physical topologies: Physical layer specifies the way in which the different,
devices/nodes are arranged in a network i.e. bus, star or mesh topolgy.
3. Transmission mode: Physical layer also defines the way in which the data flows
between the two connected devices. The various transmission modes possible
are:
Simplex-One direction only communication Eg:Radio
half-duplex -At a time one direction only-Eg:Walkie Talkie
and full-duplex.-Two way communication Eg:Telephone
* Hub, Repeater, Modem, Cables are Physical Layer devices.
** Network Layer, Data Link Layer and Physical Layer are also known as Lower
Layers or Hardware Layers.
Data Link Layer
 Data Link Layer provides or acts as an intermediate, ensuring delivery of data message to
its respective destination in the network by using the physical address of the device known
as MAC (Media Access Control) Address.
 This layer translates the data received in the form of bits from physical layer into respective
format and forwards it to network layer.
 The data link layer is responsible for the node to node delivery of the message.
 The main function of this layer is to make sure data transfer is error-free from one node to
another, over the physical layer.
 Data Link Layer is divided into two sub layers :
o Logical Link Control (LLC)
o Media Access Control (MAC)
The packet received from Network layer is further divided into frames depending on the frame
size of NIC(Network Interface Card). DLL also encapsulates Sender and Receiver’s MAC
address in the header
The functions of the data Link layer are :
Framing: Framing is a function of the data link layer. It provides a way for a sender to transmit a set of bits(frame) that
are meaningful to the receiver. This can be accomplished by attaching special bit patterns to the beginning and end of
the frame.
Physical addressing: After creating frames, Data link layer adds physical addresses (MAC address) of sender and/or
receiver in the header of each frame.
Error control: Data link layer provides the mechanism of error control in which it detects and retransmits damaged or
lost frames.
Flow Control: The data rate must be constant on both sides else the data may get corrupted thus , flow control
coordinates that amount of data that can be sent before receiving acknowledgement.
Access control: When a single communication channel is shared by multiple devices, MAC sub-layer of data link layer
helps to determine which device has control over the channel at a given time.
* Packet in Data Link layer is referred as Frame.
** Data Link layer is handled by the NIC (Network Interface Card) and device drivers of host machines.
*** Switch & Bridge are Data Link Layer devices
Network Layer
 The network layer is responsible for facilitating data transfer between two different networks. If the two devices
communicating are on the same network, then the network layer is unnecessary.
 Ie Network layer works for the transmission of data from one host to the other located in different networks
 Ie it enable source to destination transfer of packets
 The network layer breaks up segments from the transport layer into smaller units, called packets, on the sender ’s device,
and reassembling these packets on the receiving device.
 The network layer also finds the best physical path for the data to reach its destination; this is known as routing.
Functions
 Logical addressing. The physical addressing implemented by the data link layer handles the addressing problem
locally. If a packet passes the network boundary, we need another addressing system to help distinguish the source
and destination systems Called IP Address. The network layer adds a header to the packet coming from the upper
layer that, among other things, includes the logical addresses of the sender and receiver.
 Routing. When independent networks or links are connected to create intemetworks (network of networks) or a
large network, the connecting devices (called routers or switches) route or switch the packets to their final
destination.
Segment in Network layer is referred as Packet.
Network layer is implemented by networking devices such as routers.
Transport Layer
 The transport layer is responsible for process-to-process delivery of the entire message. A process is an application
program running on a host..
 Layer 4 is responsible for end-to-end communication between the two devices. This includes taking data from the
session layer and breaking it up into chunks called segments before sending it to layer 3. The transport layer on the
receiving device is responsible for reassembling the segments into data the session layer can consume.
 The transport layer also provides the acknowledgement of the successful data transmission and re-transmits the data
if an error is found
 Functions of Transport Layers
1. Segmentation and Reassembly: This layer accepts the message from the (session) layer , breaks the message
into smaller units(Segments) . Each of the segment produced has a header associated with it. The transport layer at
the destination station reassembles the message.
2. Service Point Addressing: In order to deliver the message to correct process, transport layer header includes a
type of address called service point address or port address. Thus by specifying this address, transport layer makes
sure that the message is delivered to the correct process.
The services provided by the transport layer :
Connection Oriented Service: It is a three-phase process which include
– Connection Establishment
– Data Transfer
– Termination / disconnection
In this type of transmission, the receiving device sends an acknowledgement, back to the source after a packet or group of
packet is received. This type of transmission is reliable and secure.
Connection less service: It is a one-phase process and includes Data Transfer. In this type of transmission, the receiver does
not acknowledge receipt of a packet. This approach allows for much faster communication between devices. Connection-
oriented service is more reliable than connectionless Service.
* Data in the Transport Layer is called as Segments.
** Transport layer is operated by the Operating System. It is a part of the OS and communicates with the Application Layer
by making system calls.
Transport Layer is called as Heart of OSI model.
Session Layer
The session layer (layer 5) is responsible for establishing, managing, synchronizing and terminating sessions between
end-user application processes.
The main functions of the session layer are as follows −
 It works as a dialog controller. It allows the systems to communicate in either half-duplex or full-duplex mode of
communication.
 It is responsible for token management. Through this, it prevents the two users to simultaneously attempt the same
critical operation.
 It synchronizes communication. It adds synchronization points or checkpoints in data streams for long
communications. This ensures that data streams up to the checkpoints are successfully received and acknowledged. In
case of any failures, only the streams after the checkpoints have to be re-transmitted.
Presentation Layer (Layer 6) :
Presentation layer is also called the Translation layer.The data from the application layer is extracted here and
manipulated as per the required format to transmit over the network.
The functions of the presentation layer are :
1.Translation : For example, ASCII to EBCDIC.
2.Encryption/ Decryption : Data encryption translates the data into another form or code. The encrypted data is
known as the cipher text and the decrypted data is known as plain text. A key value is used for encrypting as well as
decrypting data.
3.Compression: Reduces the number of bits that need to be transmitted on the network.
Application Layer
The application layer enables the user, whether human or software, to access the network. It provides user
interfaces and support for services such as electronic mail, remote file access and transfer, shared database
management, and other types of distributed information services.
It is the user interface layer.
Ex: Application – Browsers, Skype Messenger etc.
TCP/IP PROTOCOL MODEL
The OSI Model we just looked at is just a reference/logical model. It was designed to describe the functions of the
communication system by dividing the communication procedure into smaller and simpler components. But when we
talk about the TCP/IP model, it was designed and developed by Department of Defense (DoD) in 1960s and is based on
standard protocols. It stands for Transmission Control Protocol/Internet Protocol. The TCP/IP model is a concise
version of the OSI model. It contains four layers, unlike seven layers in the OSI model.
Network Access Layer/Link layer
internet Layer
host-to-host or Transport Layer,
and application Layer
1. Network Access Layer –
This layer corresponds to the combination of Data Link Layer and Physical Layer of the OSI model. It looks out
for hardware addressing and the protocols present in this layer allows for the physical transmission of data.
2. Internet Layer –
This layer parallels the functions of OSI’s Network layer. It defines the protocols which are responsible for
logical transmission of data over the entire network. The main protocols residing at this layer are :
1. IP – stands for Internet Protocol and it is responsible for delivering packets from the source host to the destination host
by looking at the IP addresses in the packet headers. IP has 2 versions:
IPv4 and IPv6. IPv4 is the one that most of the websites are using currently. But IPv6 is growing as the number of IPv4
addresses are limited in number when compared to the number of users.
2. ICMP – stands for Internet Control Message Protocol. It is encapsulated within IP datagrams and is responsible for
providing hosts with information about network problems.
3. ARP – stands for Address Resolution Protocol. Its job is to find the hardware address of a host(MAC Addres) from a
known IP address. On a typical physical network, such as a LAN, each device on a link is identified by a physical or
station address called MAC Address, usually imprinted on the network interface card (NIC). ARP is used to find the
physical address of the node when its Internet address is known.
ARP has several types: Reverse ARP, Proxy ARP, Gratuitous ARP and Inverse ARP
3. Host-to-Host Layer –
This layer is analogous to the transport layer of the OSI model. It is responsible for end-to-
end communication and error-free delivery of data. It shields the upper-layer applications
from the complexities of data. The two main protocols present in this layer are :
1. Transmission Control Protocol (TCP) – It is known to provide reliable and error-free
communication between end systems. It performs sequencing and segmentation of data. It
also has acknowledgment feature and controls the flow of the data through flow control
mechanism. It is a very effective protocol but has a lot of overhead due to such features.
Increased overhead leads to increased cost.
User Datagram Protocol (UDP) – Is also provide unrealiable communication between end
systems.On the other hand does not provide any such features error free,flow control..
Unlike TCP, which is connection-oriented protocol, UDP is connectionless
Application Layer –
This layer performs the functions of top three layers of the OSI model: Application,
Presentation and Session Layer. It is responsible for node-to-node communication and
controls user-interface specifications. Some of the protocols present in this layer are:
HTTP, HTTPS, FTP, TFTP, Telnet, SSH, SMTP, SNMP, NTP, DNS, DHCP, NFS, X
Window, LPD. Have a look at Protocols in Application Layer for some information
about these protocols. Protocols other than those present in the linked article are :
1.HTTP and HTTPS – HTTP stands for Hypertext transfer protocol. It is used
by the World Wide Web to manage communications between web browsers and
servers. HTTPS stands for HTTP-Secure. It is a combination of HTTP with
SSL(Secure Socket Layer). It is efficient in cases where the browser need to fill
out forms, sign in, authenticate and carry out bank transactions.
2.Telnet-Enable remote logging
PHYSICAL LAYER
Physical layer in the OSI model plays the role of interacting with actual hardware and signaling mechanism. Physical layer is
the only layer of OSI network model which actually deals with the physical connectivity of two different stations. This layer
defines the hardware equipment, cabling, wiring, frequencies, pulses used to represent binary signals etc.
Physical layer provides its services to Data-link layer. Data-link layer hands over frames to physical layer. Physical layer
converts them to electrical pulses, which represent binary data.The binary data is then sent over the wired or wireless media.
DATA TERMINAL EQUIPMENT (DTE)
Data Terminal Equipment is equipment which acts as source or destinations in digital communication and
which is capable of converting information to signals and also reconverting received signals.The data terminal
equipment may be a single piece of equipment or an interconnected subsystem of multiple pieces of equipment that
perform all the required functions necessary to permit users to communicate. A user interacts with the DTE (e.g.
through a human-machine interface), or the DTE may be the user. Usually, the DTE device is the terminal (or a
computer emulating a terminal), and the DCE is a modem
DATA CIRCUIT-TERMINATING EQUIPMENT (DCE)
Data Communications Equipment, or DCE, is any device that supports data transmission over a serial
telecommunications link. Typically, data communications equipment (DCE) refers to modems, Channel
Service Unit/Data Service Units (CSU/DSUs), multiplexers, and similar devices. The purpose of a DCE is to
provide termination for the telecommunications link and an interface for connecting data terminal
equipment (DTE) to the link.
A data circuit-terminating equipment (DCE) is a device that sits between the data terminal equipment (DTE)
and a data transmission circuit. It is also called data communication(s) equipment and data carrier
equipment. Usually, the DTE device is the terminal (or computer), and the DCE is a modem
Slides Prepared by
Aneeb.A
Assiatant Professor
HM College of Science and Technology Manjeri

More Related Content

What's hot

Computer network and its topologies
Computer network and its topologiesComputer network and its topologies
Computer network and its topologiesAyush0734
 
Basic concepts of computer Networking
Basic concepts of computer NetworkingBasic concepts of computer Networking
Basic concepts of computer NetworkingHj Habib
 
( Network topology) )final
( Network topology) )final( Network topology) )final
( Network topology) )finalJai Kumar
 
Basic networking in power point by suprabha
Basic networking in power point by suprabhaBasic networking in power point by suprabha
Basic networking in power point by suprabhaSuprabha Sahoo
 
Computer network ppt communication
Computer network ppt communicationComputer network ppt communication
Computer network ppt communicationKajal Sharma
 
Computer networks and its components by narender singh sandhu
Computer networks and its components by narender singh sandhuComputer networks and its components by narender singh sandhu
Computer networks and its components by narender singh sandhuNarenderSinghSandhu2
 
fundamental of information technology(1)
fundamental of information technology(1)fundamental of information technology(1)
fundamental of information technology(1)Sorath Peetamber
 
Computer Network and Topology
Computer Network and Topology Computer Network and Topology
Computer Network and Topology Mehrabudin Wakman
 
Network topoligies
Network topoligiesNetwork topoligies
Network topoligiesAli Kamran
 
Networking concepts
Networking conceptsNetworking concepts
Networking conceptsritajindal2
 
Data com chapter 1 introduction
Data com chapter 1   introductionData com chapter 1   introduction
Data com chapter 1 introductionAbdul-Hamid Donde
 
Introduction to Computer Networks
 Introduction to Computer Networks Introduction to Computer Networks
Introduction to Computer NetworksGhaffar Khan
 
Computer network basic concepts
Computer network   basic conceptsComputer network   basic concepts
Computer network basic conceptsrahul kapoliya
 
20372748 case-study-on-computer-networking-kotak-mahindra-bank
20372748 case-study-on-computer-networking-kotak-mahindra-bank20372748 case-study-on-computer-networking-kotak-mahindra-bank
20372748 case-study-on-computer-networking-kotak-mahindra-bankShivani Joshi
 
Networking ppt by swapi
Networking ppt by swapi Networking ppt by swapi
Networking ppt by swapi Swapi Pawar
 
computer networks presentation
computer networks presentationcomputer networks presentation
computer networks presentationKrishi Agrawal
 

What's hot (20)

Computer network ppt
Computer network pptComputer network ppt
Computer network ppt
 
Computer Network
Computer NetworkComputer Network
Computer Network
 
Computer network and its topologies
Computer network and its topologiesComputer network and its topologies
Computer network and its topologies
 
Basic concepts of computer Networking
Basic concepts of computer NetworkingBasic concepts of computer Networking
Basic concepts of computer Networking
 
Network And Topology
Network And TopologyNetwork And Topology
Network And Topology
 
( Network topology) )final
( Network topology) )final( Network topology) )final
( Network topology) )final
 
Basic networking in power point by suprabha
Basic networking in power point by suprabhaBasic networking in power point by suprabha
Basic networking in power point by suprabha
 
Computer network ppt communication
Computer network ppt communicationComputer network ppt communication
Computer network ppt communication
 
Computer networks and its components by narender singh sandhu
Computer networks and its components by narender singh sandhuComputer networks and its components by narender singh sandhu
Computer networks and its components by narender singh sandhu
 
fundamental of information technology(1)
fundamental of information technology(1)fundamental of information technology(1)
fundamental of information technology(1)
 
Computer Network and Topology
Computer Network and Topology Computer Network and Topology
Computer Network and Topology
 
Unit2
Unit2Unit2
Unit2
 
Network topoligies
Network topoligiesNetwork topoligies
Network topoligies
 
Networking concepts
Networking conceptsNetworking concepts
Networking concepts
 
Data com chapter 1 introduction
Data com chapter 1   introductionData com chapter 1   introduction
Data com chapter 1 introduction
 
Introduction to Computer Networks
 Introduction to Computer Networks Introduction to Computer Networks
Introduction to Computer Networks
 
Computer network basic concepts
Computer network   basic conceptsComputer network   basic concepts
Computer network basic concepts
 
20372748 case-study-on-computer-networking-kotak-mahindra-bank
20372748 case-study-on-computer-networking-kotak-mahindra-bank20372748 case-study-on-computer-networking-kotak-mahindra-bank
20372748 case-study-on-computer-networking-kotak-mahindra-bank
 
Networking ppt by swapi
Networking ppt by swapi Networking ppt by swapi
Networking ppt by swapi
 
computer networks presentation
computer networks presentationcomputer networks presentation
computer networks presentation
 

Similar to Computer Network Introduction full

Computer Network ssss ppt.pptx
Computer Network ssss ppt.pptxComputer Network ssss ppt.pptx
Computer Network ssss ppt.pptxRamNivas42
 
CN Unit 1 part 1 2023.ppt
CN Unit 1 part 1 2023.pptCN Unit 1 part 1 2023.ppt
CN Unit 1 part 1 2023.pptmohanravi1986
 
Networking Concepts.pdf
Networking Concepts.pdfNetworking Concepts.pdf
Networking Concepts.pdfODINARARCH
 
Presentation for slideshare
Presentation for slidesharePresentation for slideshare
Presentation for slideshareBSITstudents
 
Cf presentation by muhammad saad salman
Cf presentation by muhammad saad salmanCf presentation by muhammad saad salman
Cf presentation by muhammad saad salmanMuhammad Saad Salman
 
COMPUTER NETWORK seminar.pptx
COMPUTER NETWORK seminar.pptxCOMPUTER NETWORK seminar.pptx
COMPUTER NETWORK seminar.pptxnihareddy0302
 
Network ppt
Network pptNetwork ppt
Network ppthlalu861
 
Computer Networking.
Computer Networking.Computer Networking.
Computer Networking.mvenkat2016
 
6.Computer Networks (1).pptx
6.Computer Networks (1).pptx6.Computer Networks (1).pptx
6.Computer Networks (1).pptxKamran Waghani
 
COMPUTER FUNDAMENTAL PART 3.pptx
COMPUTER FUNDAMENTAL PART 3.pptxCOMPUTER FUNDAMENTAL PART 3.pptx
COMPUTER FUNDAMENTAL PART 3.pptxSURBHI SAROHA
 
Ccna(routing &and switching)
Ccna(routing &and switching)Ccna(routing &and switching)
Ccna(routing &and switching)Shweta Kumari
 
Classification of Computer
Classification of ComputerClassification of Computer
Classification of ComputerAfsanaAkterRubi
 
Ae2da alvarado_cos4
Ae2da alvarado_cos4Ae2da alvarado_cos4
Ae2da alvarado_cos4jashleyfaye
 

Similar to Computer Network Introduction full (20)

Computer Network ssss ppt.pptx
Computer Network ssss ppt.pptxComputer Network ssss ppt.pptx
Computer Network ssss ppt.pptx
 
CN Unit 1 part 1 2023.ppt
CN Unit 1 part 1 2023.pptCN Unit 1 part 1 2023.ppt
CN Unit 1 part 1 2023.ppt
 
networkin g.pptx
networkin g.pptxnetworkin g.pptx
networkin g.pptx
 
Networks
NetworksNetworks
Networks
 
Networking Concepts.pdf
Networking Concepts.pdfNetworking Concepts.pdf
Networking Concepts.pdf
 
Networking concepts
Networking conceptsNetworking concepts
Networking concepts
 
NETWORKING
NETWORKINGNETWORKING
NETWORKING
 
Presentation for slideshare
Presentation for slidesharePresentation for slideshare
Presentation for slideshare
 
Cf presentation by muhammad saad salman
Cf presentation by muhammad saad salmanCf presentation by muhammad saad salman
Cf presentation by muhammad saad salman
 
COMPUTER NETWORK seminar.pptx
COMPUTER NETWORK seminar.pptxCOMPUTER NETWORK seminar.pptx
COMPUTER NETWORK seminar.pptx
 
Network ppt
Network pptNetwork ppt
Network ppt
 
Network -Lecture Notes
Network -Lecture NotesNetwork -Lecture Notes
Network -Lecture Notes
 
Computer Networks .ppt
Computer Networks .pptComputer Networks .ppt
Computer Networks .ppt
 
Computer Networks 1 .ppt
Computer Networks 1 .pptComputer Networks 1 .ppt
Computer Networks 1 .ppt
 
Computer Networking.
Computer Networking.Computer Networking.
Computer Networking.
 
6.Computer Networks (1).pptx
6.Computer Networks (1).pptx6.Computer Networks (1).pptx
6.Computer Networks (1).pptx
 
COMPUTER FUNDAMENTAL PART 3.pptx
COMPUTER FUNDAMENTAL PART 3.pptxCOMPUTER FUNDAMENTAL PART 3.pptx
COMPUTER FUNDAMENTAL PART 3.pptx
 
Ccna(routing &and switching)
Ccna(routing &and switching)Ccna(routing &and switching)
Ccna(routing &and switching)
 
Classification of Computer
Classification of ComputerClassification of Computer
Classification of Computer
 
Ae2da alvarado_cos4
Ae2da alvarado_cos4Ae2da alvarado_cos4
Ae2da alvarado_cos4
 

More from aneebkmct

Functions torage class and array and strings-
Functions torage class and array and strings-Functions torage class and array and strings-
Functions torage class and array and strings-aneebkmct
 
(ഈമാന്‍ കുറയാനുള്ള കാരണങ്ങള്‍) Eman Kurayanulla karanangal
(ഈമാന്‍ കുറയാനുള്ള കാരണങ്ങള്‍)   Eman Kurayanulla karanangal(ഈമാന്‍ കുറയാനുള്ള കാരണങ്ങള്‍)   Eman Kurayanulla karanangal
(ഈമാന്‍ കുറയാനുള്ള കാരണങ്ങള്‍) Eman Kurayanulla karanangalaneebkmct
 
Quran and Atheism ഖുര്‍ആനും യുക്തിവാദിയും
Quran and Atheism ഖുര്‍ആനും യുക്തിവാദിയുംQuran and Atheism ഖുര്‍ആനും യുക്തിവാദിയും
Quran and Atheism ഖുര്‍ആനും യുക്തിവാദിയുംaneebkmct
 
Miracle of quran
Miracle of quranMiracle of quran
Miracle of qurananeebkmct
 
independence day Quiz from Aneeb
independence day Quiz from Aneebindependence day Quiz from Aneeb
independence day Quiz from Aneebaneebkmct
 
islamic quiz
islamic quizislamic quiz
islamic quizaneebkmct
 

More from aneebkmct (7)

HTML.pdf
HTML.pdfHTML.pdf
HTML.pdf
 
Functions torage class and array and strings-
Functions torage class and array and strings-Functions torage class and array and strings-
Functions torage class and array and strings-
 
(ഈമാന്‍ കുറയാനുള്ള കാരണങ്ങള്‍) Eman Kurayanulla karanangal
(ഈമാന്‍ കുറയാനുള്ള കാരണങ്ങള്‍)   Eman Kurayanulla karanangal(ഈമാന്‍ കുറയാനുള്ള കാരണങ്ങള്‍)   Eman Kurayanulla karanangal
(ഈമാന്‍ കുറയാനുള്ള കാരണങ്ങള്‍) Eman Kurayanulla karanangal
 
Quran and Atheism ഖുര്‍ആനും യുക്തിവാദിയും
Quran and Atheism ഖുര്‍ആനും യുക്തിവാദിയുംQuran and Atheism ഖുര്‍ആനും യുക്തിവാദിയും
Quran and Atheism ഖുര്‍ആനും യുക്തിവാദിയും
 
Miracle of quran
Miracle of quranMiracle of quran
Miracle of quran
 
independence day Quiz from Aneeb
independence day Quiz from Aneebindependence day Quiz from Aneeb
independence day Quiz from Aneeb
 
islamic quiz
islamic quizislamic quiz
islamic quiz
 

Recently uploaded

Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 

Recently uploaded (20)

Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 

Computer Network Introduction full

  • 1. Slides Prepared by Aneeb.A Assiatant Professor HM College of Science and Technology Manjeri
  • 2.
  • 3.
  • 4. Slides Prepared by Aneeb.A Assiatant Professor HM College of Science and Technology Manjeri
  • 5.  FILE SHARING – Networks offer a quick and easy way to share files directly.  RESOURCE SHARING – All computers in the as and network printers, modems. can fax share resources such machines, scanners,  COMMUNICATION –Those on the network can communicate with each other via e-mail, instant messages, etc.
  • 6.  Flexible Access - Networks allow their users to access files from computers throughout the network. - share  Sharing of Information Computer networks enable us the to data that and areinformation with computers located geographically large distance apart.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11. P2P Stands for "Peer to Peer." In a P2P network, the "peers" are computer systems which are connected to each other via the Internet. Files can be shared directly between systems on the network without the need of a central server. In other words, each computer on a P2P network becomes a file server as well as a client.
  • 12.
  • 13.
  • 14. DifferentTypes of Networks • Depending upon the geographical by a network, it is classified as: area covered – Local Area Network (LAN) – Metropolitan Area Network (MAN) – Wide Area Network (WAN) – Personal Area Network (PAN)
  • 15. Local Area Network (LAN) A LAN is a network that is used for communicating among computer devices, usually within an office building or home. • • LAN’s enable the sharing of resources such as files or hardware devices that may be needed by multiple users • • Is limited in size, typically spanning a few hundred meters, and no more than a mile • Is fast, with speeds from 10 Mbps to 10 Gbps • Requires little wiring, typically a single cable connecting to each device • Has lower cost compared to MAN’s or WAN’s
  • 16. Local Area Network (LAN) LAN’s can be either wired or wireless.Twisted pair, coax or fibre optic cable can be used in wired LAN’s. • • Every LAN uses a protocol – a set of rules that governs how packets are configured and transmitted. • Nodes in a LAN are linked together with a certain topology.These topologies include: – – – Bus Ring Star • LANs are capable of very high transmission rates (100s Mb/s to G b/s).
  • 18. Advantages of LAN • Speed • Cost • Security • E-mail • Resource Sharing
  • 19. Disadvantages ExpensiveTo Install of LAN • • Requires Administrative Time • File Server May Fail • Cables May Break
  • 20. Metropolitan Area Network (MAN) A metropolitan area network (MAN) is a large computer network that usually spans a city or a large campus. • • A MAN is optimized for a larger geographical area than a LAN, ranging from several blocks buildings to entire cities. of • A MAN might be owned and operated by a single organization, but it usually will be used by many individuals and organizations.
  • 21. Metropolitan Area Network (MAN) A MAN often acts as a high speed network to allow sharing of regional resources. • • A MAN typically covers an area of between and 50 km diameter. 5 • Examples of MAN:Telephone company network that provides a high speed DSL to customers and cable TV network,Networks of Banks like institution which cover a district
  • 23. Wide Area Network (WAN) WAN covers a large geographic area such as country, continent or even whole of the world. • • AWAN is two or more LANs connected together.The LANs can be many miles apart. • To cover great distances,WANs may transmit data over leased high-speed phone lines or wireless links such as satellites.
  • 24. Wide Area Network (WAN) Multiple LANs can be connected together using devices such as bridges, routers, or gateways, which enable them to share data. • • The world's most popularWAN is the Internet. Slides Prepared by Aneeb.A Assiatant Professor HM College of Science and Technology Manjeri
  • 26.
  • 28. Personal Area Network (PAN) A PAN is a network that is used for communicating among computers and computer devices (including telephones) in close proximity of around a few meters within a room • • It can be used for communicating between the devices themselves, or for connecting to a larger network such as the internet. • PAN’s can be wired or wireless
  • 29. Personal Area Network (PAN) A personal area network (PAN) is a computer network used for communication among computer devices, including telephones and personal digital assistants, in proximity to an individual's body. • • The devices may or may not belong to the person in question.The reach of a PAN is typically a few meters.
  • 31.  It is the physical way in which computers are interconnected.  Five basic network structures are :
  • 32.  Devices are connected to a central computer called HUB.  A Star network is particularly appropriate for organizations that require a centralized data base or a centralized processing facility.  For example, a star network may be used in banking for centralized record keeping in an on-line branch office environment.
  • 33.
  • 34.  It is easy to add new and remove nodes.  A node failure does not bring let down the entire network.  It is easier to diagnose network through a central hub. problems
  • 35.  If the central hub fails, the whole network ceases to function.  It costs more to cable a star configuration than other topologies because more cable is required than other topologies.
  • 36.  In Bus topology a single network cable runs in the building or campus and all nodes are line or linked along with this communication with two endpoints called the bus backbone.  This structure is very popular for local area networks
  • 37.
  • 38. Slides Prepared by Aneeb.A Assiatant Professor HM College of Science and Technology Manjeri
  • 39.  Reliable in very small networks as well as easy to use and understand.  Requires the least amount of cable to connect the computers together and therefore is less expensive than other cabling arrangements.
  • 40.  Heavy network traffic can slow a bus considerably.  Each connection between cables weakens the electrical signal. If the common cable fails, then the whole system will crash down
  • 41.  In Ring topology the network cable passes from one node to another until all nodes are connected in the form of a “loop or ring”.  Transmits in only one direction.  Used in LAN’S and WAN’S.
  • 42.
  • 43. 1.One station is known as monitor station which takes all the responsibility to perform the operations. 2.To transmit the data, station has to hold the token. After the transmission is done, the token is to be released for other stations to use. 3.When no station is transmitting the data, then the token will circulate in the ring.
  • 44.  Ring networks can span longer distances than other types of networks.  Ring networks are easily extendable.
  • 45.  Relatively expensive and difficult to install.  Failure of one computer on the network can affect the whole network.  Adding or removing computers can disrupt the network.
  • 46.  In mesh network, there is random connection of nodes using communication links.  Mesh topology is the general topology for wide area network.  In mesh topology, every device is connected to another device via particular channel. In mesh topology, every device is connected to another device via particular channel.
  • 47. Slides Prepared by Aneeb.A Assiatant Professor HM College of Science and Technology Manjeri
  • 48. Figure 1 : Every device is connected with another via dedicated channels. These channels are known as links. •If suppose, N number of devices are connected with each other in mesh topology, then total number of ports that is required by each device is ? N-1. In the Figure 1, there are 5 devices connected to each other, hence total number of ports required is 4. •If suppose, N number of devices are connected with each other in mesh topology, then total number of dedicated links required to connect them is NC2 i.e. N(N-1)/2. In the Figure 1, there are 5 devices connected to each other, hence total number of links required is 5*4/2 = 10
  • 49.  The reliability is very high alternate paths available if as there are always direct link between two nodes is down.  Yields the greatest amount of the of redundancy in the event that one can nodes fails where network node. traffic be redirected to another
  • 50.  The cost of installation and maintenance is high ( more cable is required than any other configuration).
  • 51.  A tree topology connects one star network the other star network. to  It is an extension of star topology.  Here, we divided the whole network into segment which can be easily managed and maintained.
  • 52.
  • 53. In this the various secondary hubs are connected to the central hub which contains the repeater.
  • 54.  Each segment is provided with dedicated point-to-point wiring to central hub.  Error detection and correction is easy.  If one segment is damaged, other segment are not affected.  Expansion of network is possible and easy.
  • 55.  As multiple segments are connected to a central hub, the networks depend heavily on the hub. Its failure affects the entire network.  Maintenance is not easy and cost are high.  With increase in size beyond a point, the management becomes difficult.
  • 56. Hybrid Topology : This topology is a collection of two or more topologies which are described above. This is a scalable topology which can be expanded easily. It is reliable one but at the same it is a costly topology
  • 57. INTERNETWORK/Internet Today, it is very rare to see a LAN, a MAN, or a LAN in isolation; they are connected to one another. When two or more networks are connected, they become an internetwork, or internet. As an example, assume that an organization has two offices, one on the east coast and the other on the west coast. The established office on the west coast has a bus topology LAN; the newly opened office on the east coast has a star topology LAN. The president of the company lives somewhere in the middle and needs to have control over the company from her horne. We can make communicate them using internet via switches and routers like network devices
  • 58.
  • 59.
  • 60. NETWORK MODELS Computer Network Models : Introduction  For data communication to take place and two or more users can transmit data from one to other, a systematic approach is required. This approach enables users to communicate and transmit data through efficient and ordered path. It is implemented using models in computer networks and are known as computer network models.  Computer network models are responsible for establishing a connection among the sender and receiver and transmitting the data in a smooth manner respectively.  There are two computer network models i.e. OSI Model and TCP/IP Model on which the whole data communication process relies.
  • 61. Computer Network Models : The OSI Reference Model  The OSI Model is one of the general purpose networking or communication model among computer network models, which is responsible for establishing connection in an open manner between all the communicable devices present across the globe.  OSI stands for “Open System Interconnection” and the name of this reference model was given by an organization known as “International Organization for Standardization”. The ISO is responsible for generating and promoting industrial and commercial standards applicable for all the users or universally.  Apart from OSI Model, another computer network models which is widely used is TCP/IP Model.  OSI model having a layered architecture, allows easy data communication as each layer has predefined structured and functionalities. The functionalities are different for each layer and thus when combined together forms the OSI Model. There are in total seven layers in general purpose OSI model
  • 62.
  • 63.
  • 64. Physical Layer The lowest layer of the OSI reference model is the physical layer. It is responsible for the actual physical connection between the devices. The physical layer contains information in the form of bits. It is responsible for transmitting individual bits from one node to the next. When receiving data, this layer will get the signal received and convert it into 0s and 1s and send them to the Data Link layer, which will put the frame back together. Slides Prepared by Aneeb.A Assiatant Professor HM College of Science and Technology Manjeri
  • 65. The functions of the physical layer are : 1. Bit rate control: The Physical layer also defines the transmission rate i.e. the number of bits sent per second. 2. Physical topologies: Physical layer specifies the way in which the different, devices/nodes are arranged in a network i.e. bus, star or mesh topolgy. 3. Transmission mode: Physical layer also defines the way in which the data flows between the two connected devices. The various transmission modes possible are: Simplex-One direction only communication Eg:Radio half-duplex -At a time one direction only-Eg:Walkie Talkie and full-duplex.-Two way communication Eg:Telephone * Hub, Repeater, Modem, Cables are Physical Layer devices. ** Network Layer, Data Link Layer and Physical Layer are also known as Lower Layers or Hardware Layers.
  • 66.
  • 67. Data Link Layer  Data Link Layer provides or acts as an intermediate, ensuring delivery of data message to its respective destination in the network by using the physical address of the device known as MAC (Media Access Control) Address.  This layer translates the data received in the form of bits from physical layer into respective format and forwards it to network layer.  The data link layer is responsible for the node to node delivery of the message.  The main function of this layer is to make sure data transfer is error-free from one node to another, over the physical layer.  Data Link Layer is divided into two sub layers : o Logical Link Control (LLC) o Media Access Control (MAC) The packet received from Network layer is further divided into frames depending on the frame size of NIC(Network Interface Card). DLL also encapsulates Sender and Receiver’s MAC address in the header
  • 68. The functions of the data Link layer are : Framing: Framing is a function of the data link layer. It provides a way for a sender to transmit a set of bits(frame) that are meaningful to the receiver. This can be accomplished by attaching special bit patterns to the beginning and end of the frame. Physical addressing: After creating frames, Data link layer adds physical addresses (MAC address) of sender and/or receiver in the header of each frame. Error control: Data link layer provides the mechanism of error control in which it detects and retransmits damaged or lost frames. Flow Control: The data rate must be constant on both sides else the data may get corrupted thus , flow control coordinates that amount of data that can be sent before receiving acknowledgement. Access control: When a single communication channel is shared by multiple devices, MAC sub-layer of data link layer helps to determine which device has control over the channel at a given time. * Packet in Data Link layer is referred as Frame. ** Data Link layer is handled by the NIC (Network Interface Card) and device drivers of host machines. *** Switch & Bridge are Data Link Layer devices
  • 69.
  • 70. Network Layer  The network layer is responsible for facilitating data transfer between two different networks. If the two devices communicating are on the same network, then the network layer is unnecessary.  Ie Network layer works for the transmission of data from one host to the other located in different networks  Ie it enable source to destination transfer of packets  The network layer breaks up segments from the transport layer into smaller units, called packets, on the sender ’s device, and reassembling these packets on the receiving device.  The network layer also finds the best physical path for the data to reach its destination; this is known as routing.
  • 71. Functions  Logical addressing. The physical addressing implemented by the data link layer handles the addressing problem locally. If a packet passes the network boundary, we need another addressing system to help distinguish the source and destination systems Called IP Address. The network layer adds a header to the packet coming from the upper layer that, among other things, includes the logical addresses of the sender and receiver.  Routing. When independent networks or links are connected to create intemetworks (network of networks) or a large network, the connecting devices (called routers or switches) route or switch the packets to their final destination. Segment in Network layer is referred as Packet. Network layer is implemented by networking devices such as routers.
  • 72. Transport Layer  The transport layer is responsible for process-to-process delivery of the entire message. A process is an application program running on a host..  Layer 4 is responsible for end-to-end communication between the two devices. This includes taking data from the session layer and breaking it up into chunks called segments before sending it to layer 3. The transport layer on the receiving device is responsible for reassembling the segments into data the session layer can consume.  The transport layer also provides the acknowledgement of the successful data transmission and re-transmits the data if an error is found  Functions of Transport Layers 1. Segmentation and Reassembly: This layer accepts the message from the (session) layer , breaks the message into smaller units(Segments) . Each of the segment produced has a header associated with it. The transport layer at the destination station reassembles the message. 2. Service Point Addressing: In order to deliver the message to correct process, transport layer header includes a type of address called service point address or port address. Thus by specifying this address, transport layer makes sure that the message is delivered to the correct process.
  • 73. The services provided by the transport layer : Connection Oriented Service: It is a three-phase process which include – Connection Establishment – Data Transfer – Termination / disconnection In this type of transmission, the receiving device sends an acknowledgement, back to the source after a packet or group of packet is received. This type of transmission is reliable and secure. Connection less service: It is a one-phase process and includes Data Transfer. In this type of transmission, the receiver does not acknowledge receipt of a packet. This approach allows for much faster communication between devices. Connection- oriented service is more reliable than connectionless Service. * Data in the Transport Layer is called as Segments. ** Transport layer is operated by the Operating System. It is a part of the OS and communicates with the Application Layer by making system calls. Transport Layer is called as Heart of OSI model.
  • 74. Session Layer The session layer (layer 5) is responsible for establishing, managing, synchronizing and terminating sessions between end-user application processes. The main functions of the session layer are as follows −  It works as a dialog controller. It allows the systems to communicate in either half-duplex or full-duplex mode of communication.  It is responsible for token management. Through this, it prevents the two users to simultaneously attempt the same critical operation.  It synchronizes communication. It adds synchronization points or checkpoints in data streams for long communications. This ensures that data streams up to the checkpoints are successfully received and acknowledged. In case of any failures, only the streams after the checkpoints have to be re-transmitted.
  • 75. Presentation Layer (Layer 6) : Presentation layer is also called the Translation layer.The data from the application layer is extracted here and manipulated as per the required format to transmit over the network. The functions of the presentation layer are : 1.Translation : For example, ASCII to EBCDIC. 2.Encryption/ Decryption : Data encryption translates the data into another form or code. The encrypted data is known as the cipher text and the decrypted data is known as plain text. A key value is used for encrypting as well as decrypting data. 3.Compression: Reduces the number of bits that need to be transmitted on the network.
  • 76. Application Layer The application layer enables the user, whether human or software, to access the network. It provides user interfaces and support for services such as electronic mail, remote file access and transfer, shared database management, and other types of distributed information services. It is the user interface layer. Ex: Application – Browsers, Skype Messenger etc.
  • 77. TCP/IP PROTOCOL MODEL The OSI Model we just looked at is just a reference/logical model. It was designed to describe the functions of the communication system by dividing the communication procedure into smaller and simpler components. But when we talk about the TCP/IP model, it was designed and developed by Department of Defense (DoD) in 1960s and is based on standard protocols. It stands for Transmission Control Protocol/Internet Protocol. The TCP/IP model is a concise version of the OSI model. It contains four layers, unlike seven layers in the OSI model. Network Access Layer/Link layer internet Layer host-to-host or Transport Layer, and application Layer
  • 78.
  • 79. 1. Network Access Layer – This layer corresponds to the combination of Data Link Layer and Physical Layer of the OSI model. It looks out for hardware addressing and the protocols present in this layer allows for the physical transmission of data. 2. Internet Layer – This layer parallels the functions of OSI’s Network layer. It defines the protocols which are responsible for logical transmission of data over the entire network. The main protocols residing at this layer are : 1. IP – stands for Internet Protocol and it is responsible for delivering packets from the source host to the destination host by looking at the IP addresses in the packet headers. IP has 2 versions: IPv4 and IPv6. IPv4 is the one that most of the websites are using currently. But IPv6 is growing as the number of IPv4 addresses are limited in number when compared to the number of users. 2. ICMP – stands for Internet Control Message Protocol. It is encapsulated within IP datagrams and is responsible for providing hosts with information about network problems. 3. ARP – stands for Address Resolution Protocol. Its job is to find the hardware address of a host(MAC Addres) from a known IP address. On a typical physical network, such as a LAN, each device on a link is identified by a physical or station address called MAC Address, usually imprinted on the network interface card (NIC). ARP is used to find the physical address of the node when its Internet address is known. ARP has several types: Reverse ARP, Proxy ARP, Gratuitous ARP and Inverse ARP
  • 80. 3. Host-to-Host Layer – This layer is analogous to the transport layer of the OSI model. It is responsible for end-to- end communication and error-free delivery of data. It shields the upper-layer applications from the complexities of data. The two main protocols present in this layer are : 1. Transmission Control Protocol (TCP) – It is known to provide reliable and error-free communication between end systems. It performs sequencing and segmentation of data. It also has acknowledgment feature and controls the flow of the data through flow control mechanism. It is a very effective protocol but has a lot of overhead due to such features. Increased overhead leads to increased cost. User Datagram Protocol (UDP) – Is also provide unrealiable communication between end systems.On the other hand does not provide any such features error free,flow control.. Unlike TCP, which is connection-oriented protocol, UDP is connectionless
  • 81. Application Layer – This layer performs the functions of top three layers of the OSI model: Application, Presentation and Session Layer. It is responsible for node-to-node communication and controls user-interface specifications. Some of the protocols present in this layer are: HTTP, HTTPS, FTP, TFTP, Telnet, SSH, SMTP, SNMP, NTP, DNS, DHCP, NFS, X Window, LPD. Have a look at Protocols in Application Layer for some information about these protocols. Protocols other than those present in the linked article are : 1.HTTP and HTTPS – HTTP stands for Hypertext transfer protocol. It is used by the World Wide Web to manage communications between web browsers and servers. HTTPS stands for HTTP-Secure. It is a combination of HTTP with SSL(Secure Socket Layer). It is efficient in cases where the browser need to fill out forms, sign in, authenticate and carry out bank transactions. 2.Telnet-Enable remote logging
  • 82. PHYSICAL LAYER Physical layer in the OSI model plays the role of interacting with actual hardware and signaling mechanism. Physical layer is the only layer of OSI network model which actually deals with the physical connectivity of two different stations. This layer defines the hardware equipment, cabling, wiring, frequencies, pulses used to represent binary signals etc. Physical layer provides its services to Data-link layer. Data-link layer hands over frames to physical layer. Physical layer converts them to electrical pulses, which represent binary data.The binary data is then sent over the wired or wireless media. DATA TERMINAL EQUIPMENT (DTE) Data Terminal Equipment is equipment which acts as source or destinations in digital communication and which is capable of converting information to signals and also reconverting received signals.The data terminal equipment may be a single piece of equipment or an interconnected subsystem of multiple pieces of equipment that perform all the required functions necessary to permit users to communicate. A user interacts with the DTE (e.g. through a human-machine interface), or the DTE may be the user. Usually, the DTE device is the terminal (or a computer emulating a terminal), and the DCE is a modem
  • 83. DATA CIRCUIT-TERMINATING EQUIPMENT (DCE) Data Communications Equipment, or DCE, is any device that supports data transmission over a serial telecommunications link. Typically, data communications equipment (DCE) refers to modems, Channel Service Unit/Data Service Units (CSU/DSUs), multiplexers, and similar devices. The purpose of a DCE is to provide termination for the telecommunications link and an interface for connecting data terminal equipment (DTE) to the link. A data circuit-terminating equipment (DCE) is a device that sits between the data terminal equipment (DTE) and a data transmission circuit. It is also called data communication(s) equipment and data carrier equipment. Usually, the DTE device is the terminal (or computer), and the DCE is a modem
  • 84. Slides Prepared by Aneeb.A Assiatant Professor HM College of Science and Technology Manjeri