SlideShare a Scribd company logo
COMPUTER NETWORK
(18EC71)
Dr. Shivashankar
Professor
Department of Electronics & Communication
Engineering
RRIT, Bangalore
2/11/2023 1
Dr. Shivashankar, E&CE, RRIT
Course Outcomes
After Completion of the course, student will be able to
Understand the concepts of networking thoroughly.
Describe the various network architectures
Identify the protocols and services of different layers
Distinguish the basic network configurations and
standards associated with each network models.
Analyze a simple network and measurements of its
parameters.
Text Book:
Data Communications and Networking , Forouzan, 5th
Edition, McGraw Hill, 2016 ISBN: 1-25-906475-3
2/11/2023 2
Dr. Shivashankar, E&CE, RRIT
MODULE-1
DATA COMMUNICATIONS
Data communications are the exchange of data between two
devices via some form of transmission medium such as a wired or
wireless media.
For data communications to occur, the communicating devices
must be part of a communication system made up of a
combination of hardware (physical equipment) and software
(programs).
The effectiveness of a data communications system depends on
four fundamental characteristics:
delivery,
accuracy,
timeliness and
jitter.
2/11/2023 3
Dr. Shivashankar, E&CE, RRIT
COMPONENTS
Figure 1.1: Five Components of Data Communication
1. Message
2. Sender
3. Receiver
4. Transmission Media
5. Protocols
2/11/2023 4
Dr. Shivashankar, E&CE, RRIT
CONTI…
Message: Is the information (data) to be communicated.
EX: text, numbers, pictures, audio, and video.
 Sender: is the device that sends the data message.
Ex: computer, workstation, telephone handset, Mobile etc.
 Receiver: Is the device that receives the message. I
Ex: computer, workstation, telephone handset, Mobile etc.
 Transmission medium: Is the physical path by which a message
travels from sender to receiver.
Ex: twisted-pair wire, coaxial cable, fiber-optic cable, and radio waves.
 Protocol: Is a set of rules that govern data communications. It
represents an agreement between the communicating devices.
Without a protocol, two devices may be connected but not
communicating,
Ex: TCP/IP, UDP etc
2/11/2023 5
Dr. Shivashankar, E&CE, RRIT
Data Representation
Text
• In data communications, text is represented as a bit pattern, a
sequence of bits (0s or 1s).
•Different sets of bit patterns have been designed to represent text
symbols.
•Each set is called a code, and the process of representing symbols
is called coding.
•Today, the prevalent coding system is called Unicode, which uses
32 bits to represent a symbol or character used in any language in
the world.
•The American Standard Code for Information Interchange (ASCII),
developed some decades ago in the United States, now constitutes
the first 127 characters in Unicode and is also referred to as Basic
Latin.
2/11/2023 6
Dr. Shivashankar, E&CE, RRIT
CONTI…
Numbers: Numbers are also represented by bit patterns.
Number is directly converted to a binary number to
simplify mathematical operations.
Images: Images are also represented by bit patterns. In its
simplest form, an image is composed of a matrix of pixels
(picture elements), where each pixel is a small dot.
The size of the pixel depends on the resolution.
If an image is not made of pure white and pure black pixels,
we can increase the size of the bit pattern to include gray
scale.
There are several methods to represent color images. One
method is called RGB, so called because each color is made
of a combination of three primary colors: red, green, and
blue.
2/11/2023 7
Dr. Shivashankar, E&CE, RRIT
CONTI…
Audio refers to the recording or broadcasting of sound or
music. Audio is by nature different from text, numbers, or
images.
It is continuous, not discrete.
Even when we use a microphone to change voice or
music to an electric signal, we create a continuous signal.
Video refers to the recording or broadcasting of a picture
or movie.
Video can either be produced as a continuous entity
(e.g., by a TV camera), or it can be a combination of
images, each a discrete entity, arranged to convey the
idea of motion.
2/11/2023 8
Dr. Shivashankar, E&CE, RRIT
DATA FLOW
Communication between two devices can be simplex, half-duplex,
or full-duplex as shown in Figure 1.2.
Figure 1: Different data flow representation
Keyboards and traditional
monitors are examples of
simplex devices
Each station can both
transmit and receive, but not
at the same time. When one
device is sending, the other
can only receive, and vice
versa.
Walkie-talkies , Radio
Both stations can transmit
and receive simultaneously.
Mobile
2/11/2023 9
Dr. Shivashankar, E&CE, RRIT
NETWORKS
Network is a Interconnection of a set of devices
capable of communication.
A device can be a host such as a large computer,
desktop, laptop, workstation, cellular phone, or security
system.
A device: connecting device such as a router, which
connects the network to other networks, a switch,
which connects devices together, a modem (modulator-
demodulator), which changes the form of data, and so
on.
A network are connected using wired or wireless.
2/11/2023 10
Dr. Shivashankar, E&CE, RRIT
Physical Structures
Type of Connection
Point-to-point connection :
Point-to-point connections are typically used to connect two
systems together over a WAN.
The entire capacity of the link is reserved for transmission
between those two devices.
Most point-to-point connections use an actual length of wire or
cable to connect the two ends, but other options, such as
microwave or satellite links, are also possible.
When we change television channels by infrared remote control,
we are establishing a point-to-point connection between the
remote control and the television’s control system.
Example: telephone call
2/11/2023 11
Dr. Shivashankar, E&CE, RRIT
CONTI…
Multipoint:
Also called multidrop connection.
More than two specific devices share a single link.
In a multipoint environment, the capacity of the channel is
shared, either spatially or temporally.
If several devices can use the link simultaneously, it is a spatially
shared connection.
If users must take turns, it is a timeshared connection.
Figure 2: Types of Connection
2/11/2023 12
Dr. Shivashankar, E&CE, RRIT
NETWORK TYPES
local area network (LAN):
Usually privately owned and connects some hosts in a single office,
building, or campus.
Depending on the needs of an organization, a LAN can be as simple
as two PCs and a printer in someone’s home office, or it can extend
throughout a company and include audio and video devices.
Each host in a LAN has an identifier, an address, that uniquely
defines the host in the LAN.
A packet sent by a host to another host carries both the source
host’s and the destination host’s addresses.
Today, most LANs use a smart connecting switch, which is able to
recognize the destination address of the packet and guide the
packet to its destination without sending it to all other hosts.
2/11/2023 13
Dr. Shivashankar, E&CE, RRIT
CONTI…
Figure 1.8 An isolated LAN in the past and today
2/11/2023 14
Dr. Shivashankar, E&CE, RRIT
CONTI…
Wide Area Network (WAN)
Also an interconnection of devices capable of communication.
A LAN is normally limited in size, spanning an office, a building, or
a campus; a WAN has.
A wider geographical span, spanning a town, a state, a country, or
even the world.
A LAN interconnects hosts; a WAN interconnects connecting
devices such as switches, routers, or modems.
A LAN is normally privately owned by the organization that uses it;
a WAN is normally created and run by communication companies
and leased by an organization that uses it.
We see two distinct examples of WANs today: point-to-point WANs
and switched WANs.
2/11/2023 15
Dr. Shivashankar, E&CE, RRIT
CONTI…
Point-to-Point WAN
A point-to-point WAN is a network that connects
two communicating devices through a
transmission media (cable or air).
2/11/2023 16
Dr. Shivashankar, E&CE, RRIT
Figure 1.9 A point-to-point WAN
CONTI…
Switched WAN
A switched WAN is a network with more than two ends.
A switched WAN, as we will see shortly, is used in the backbone of
global communication today.
A switched WAN is a combination of several point-to-point WANs
that are connected by switches.
2/11/2023 17
Dr. Shivashankar, E&CE, RRIT
Figure 1.10 A switched WAN
CONTI…
Internetwork
When two or more networks are connected, they make
an internetwork, or internet.
To make the communication between employees at
different offices possible, the management leases a point-
to-point dedicated WAN from a service provider, such as a
telephone company, and connects the two LANs.
2/11/2023 18
Dr. Shivashankar, E&CE, RRIT
Figure 1.11 An internetwork made of two LANs and one point-to-point WAN
CONTI…
Switching
An internet is a switched network in which a switch
connects at least two links together.
A switch needs to forward data from a network to
another network when required.
The two most common types of switched networks:
 Circuit-switched and
Packet-switched networks.
2/11/2023 19
Dr. Shivashankar, E&CE, RRIT
Cont..
Circuit-Switched Network
• In a circuit-switched network, a dedicated connection, called
a circuit, is always available between the two end systems; the
switch can only make it active or inactive.
2/11/2023 Dr. Shivashankar, E&CE, RRIT 20
Figure 8: A circuit Switched Network
Cont…
2/11/2023 Dr. Shivashankar, E&CE, RRIT 21
Packet-Switched Network
• In a computer network, the communication
between the two ends is done in blocks of
data called packets.
Figure 9: A packet-switched network
The Internet
It allowed multiple computers to work on a single network that
was their biggest achievement internet.
Internet is the foremost important tool and the prominent
resource that is being used by almost every person across the globe.
 It connects millions of computers, web pages, websites, and
servers.
The internet is a widespread interconnected network of computers
and electronics devices(that support internet).
It creates a communication medium to share and get information
online.
Origin Of Internet: The internet came in the year 1960 with the
creation of the first working model called ARPANET (Advanced
Research Projects Agency).
2/11/2023 22
Dr. Shivashankar, E&CE, RRIT
Network Models
PROTOCOL LAYERING
In data communication and networking, a protocol defines
the rules that both the sender and receiver and all
intermediate devices need to follow to be able to
communicate effectively.
When communication is simple, we may need only one
simple protocol;
when the communication is complex, we may need to
divide the task between different layers, in which case we
need a protocol at each layer, or this technique we used to
call protocol layering.
This layering allows us to separate the services from the
implementation.
2/11/2023 23
Dr. Shivashankar, E&CE, RRIT
CONTI…
Scenarios
First Scenario
In the first scenario, communication is so simple that it can occur in
only one layer.
Assume Maria and Ann are neighbors with a lot of common ideas.
Communication between Maria and Ann takes place in one layer,
face to face, in the same language, as shown in Figure 4.
2/11/2023 24
Dr. Shivashankar, E&CE, RRIT
Figure 1.16 A single-layer protocol
CONTI…
. First, Maria and Ann know that they should greet each
other when they meet.
Second, they know that they should confine their
vocabulary to the level of their friendship.
Third, each party knows that she should refrain from
speaking when the other party is speaking.
Fourth, each party knows that the conversation should
be a dialog, not a monolog: both should have the
opportunity to talk about the issue.
Fifth, they should exchange some nice words when they
leave.
2/11/2023 25
Dr. Shivashankar, E&CE, RRIT
CONTI…
Second Scenario
In the second scenario, we assume that Ann is offered a higher-
level position in her company, but needs to move to another branch
located in a city very far from Maria.
The two friends still want to continue their communication and
exchange ideas because they have come up with an innovative
project to start a new business when they both retire.
They decide to continue their conversation using regular mail
through the post office.
However, they do not want their ideas to be revealed by other
people if the letters are intercepted. They agree on an
encryption/decryption technique.
2/11/2023 26
Dr. Shivashankar, E&CE, RRIT
CONTI…
Figure 1.17 A three-layer protocol
2/11/2023 27
Dr. Shivashankar, E&CE, RRIT
CONTI…
Principles of Protocol Layering
First Principle
•The first principle dictates that if we want bi-directional
communication, we need to make each layer so that it is
able to perform two opposite tasks, one in each direction.
•For example, the third layer task is to listen (in one
direction) and talk (in the other direction).
•The second layer needs to be able to encrypt and
decrypt.
•The first layer needs to send and receive mail.
2/11/2023 28
Dr. Shivashankar, E&CE, RRIT
CONTI…
Second Principle
•The second principle that we need to follow in protocol
layering is that the two objects under each layer at both
sites should be identical.
•For example, the object under layer 3 at both sites
should be a plaintext letter.
•The object under layer 2 at both sites should be a cipher
text letter.
•The object under layer 1 at both sites should be a piece
of mail.
2/11/2023 29
Dr. Shivashankar, E&CE, RRIT
CONTI…
Logical Connections
•A logical network is a virtual representation of a network that appears
to the user as an entirely separate and self-contained network
•A logical network interface or device is the software entity that is
known by an operating system.
2/11/2023 30
Dr. Shivashankar, E&CE, RRIT
Figure 7: Logical connection between peer layers
TCP/IP PROTOCOL SUITE
•Transmission Control Protocol/Internet Protocol (TCP/IP).
•TCP/IP is a protocol suite (a set of protocols organized in
different layers) used in the Internet today.
•It is a hierarchical protocol made up of interactive
modules, each of which provides a specific functionality.
•Hierarchical means that each upper level protocol is
supported by the services provided by one or more lower
level protocols.
•The original TCP/IP protocol suite was defined as four
software layers built upon the hardware.
•Today, however, TCP/IP is thought of as a five-layer
model.
2/11/2023 31
Dr. Shivashankar, E&CE, RRIT
CONTI…
2/11/2023 32
Dr. Shivashankar, E&CE, RRIT
Figure 1.19 Layers in the TCP/IP protocol suite
CONTI…
Layered Architecture
To show how the layers in the TCP/IP protocol suite are involved in
communication between two hosts, we assume that we want to use the suite in a
small internet made up of three LANs (links), each with a link-layer switch.
2/11/2023 33
Dr. Shivashankar, E&CE, RRIT
Figure 1.20 Communication through
an internet
CONTI…
Layers in the TCP/IP Protocol Suite
 The duty of the data-link and physical layers is hop-to-hop, in
which a hop is a host or router.
The duty of the top three layers is the internet, and the domain of
duty of the two lower layers is the link.
2/11/2023 34
Dr. Shivashankar, E&CE, RRIT
Figure 1.21 Logical connections between layers of the TCP/IP protocol suite
Physical layer
Physical layer is the lowest level in the TCP/IP protocol suite, the
communication between two devices.
Responsible for carrying individual bits in a frame across the link.
Two devices are connected by a transmission medium (cable or
air).
The transmission medium does not carry bits; it carries electrical
or optical signals.
The bits received in a frame from the data-link layer are trans-
formed and sent through the transmission media.
It provides an interface between devices (like PC’s or computers)
and transmission medium.
Hubs, Ethernet, etc. device is used in this layer.
2/11/2023 35
Dr. Shivashankar, E&CE, RRIT
Data Link layer
•The Data-link layer is the second layer from the bottom in the
TCP/IP suits.
•It is responsible for the node-to-node delivery of data.
•Its major role is to ensure error-free transmission of information.
•The routers are responsible for choosing the best links.
•The data-link layer is responsible for taking the datagram and
moving it across the link.
•The data-link layer takes a datagram and encapsulates it in a packet
called a frame.
•data-link layer protocols are Ethernet IEEE 802.2 framing and Point-
to-Point Protocol (PPP) framing.
•A modern computer typically has three separate data link layer for
Ethernet, wireless and Bluetooth.
2/11/2023 36
Dr. Shivashankar, E&CE, RRIT
CONTI…
Network Layer
•The network layer is responsible for creating a connection between
the source computer and the destination computer.
•The "network layer" is the part of the Internet communications
process.
•Network layer is responsible for host-to-host communication and
routing the packet through possible routes.
•The network layer in the Internet includes the main protocol,
Internet Protocol (IP), that defines the format of the packet, called a
datagram at the network layer.
•IP is a connectionless protocol that provides no flow control, no
error control, and no congestion control services.
•Handles the routing and sending of data between different
networks.
2/11/2023 37
Dr. Shivashankar, E&CE, RRIT
CONTI…
The Internet Control Message Protocol (ICMP) used to
determine whether or not data is reaching its intended
destination in a timely manner.
The Internet Group Management Protocol (IGMP)
protocol that allows several devices to share one IP
address so they can all receive the same data. To set up
multicasting on networks that use the Internet Protocol
version 4 (IPv4).
The Dynamic Host Configuration Protocol (DHCP) helps IP
to get the network-layer address for a host.
The Address Resolution Protocol (ARP) is a protocol that
helps IP to find the link- layer address of a host or a router
when its network-layer address is given.
2/11/2023 38
Dr. Shivashankar, E&CE, RRIT
Transport Layer Protocol
•The logical connection at the transport layer is also end-
to-end.
•The transport layer at the source host gets the message
from the application layer, encapsulates it, called a
segment or a user datagram, and sends it, through the
logical (imaginary) connection.
•The transport layer maintains the order of data.
•It receives the data from the upper layer and converts it
into smaller parts known as segments.
•One of the major tasks of the transport layer is to add the
port addressing .
2/11/2023 39
Dr. Shivashankar, E&CE, RRIT
CONTI…
•Transmission Control Protocol (TCP): connection-oriented protocol. It
creates a logical pipe between two TCPs for transferring a stream of bytes.
•TCP provides flow control, error control and congestion control to reduce
the loss of segments due to congestion in the network.
•User Datagram Protocol (UDP): connectionless protocol that transmits
user datagrams.
• In UDP, each user datagram is an independent entity without being
related to the previous or the next one(connectionless).
•UDP is a simple protocol that does not provide flow, error, or congestion
control.
•Stream Control Transmission Protocol (SCTP): Connection oriented: a
transport-layer protocol that ensures reliable, in-sequence transport of
data.
•SCTP provides multihoming support where one or both endpoints of a
connection can consist of more than one IP address
2/11/2023 40
Dr. Shivashankar, E&CE, RRIT
Application Layer
•The actual communication is initiated and reflects.
•Because this layer is on the top of the layer stack, it does not
serve any other layers.
•It takes the help of Transport and all layers below layers.
•Identifying communication partners: It identifies the availability
of communication partners for an application with data to
transmit.
•Determining resource availability: It determines whether
sufficient network resources are available for the requested
communication.
•Synchronizing communication: All the communications occur
between the applications requires cooperation which is managed
by an application layer.
2/11/2023 41
Dr. Shivashankar, E&CE, RRIT
CONTI…
•The Hypertext Transfer Protocol (HTTP): foundation of any data
exchange on the Web(www) and it is a client-server protocol
•The Simple Mail Transfer Protocol (SMTP): the main protocol
used in electronic mail (e-mail) service.
•The File Transfer Protocol (FTP): used for transferring files from
one host to another.
•The Terminal Network (TELNET) and Secure Shell (SSH) are used
for accessing a site remotely.
•The Simple Network Management Protocol (SNMP): used by an
administrator to manage the Internet at global and local levels.
•The Domain Name System (DNS): used by other protocols to
find the network-layer address of a computer.
2/11/2023 42
Dr. Shivashankar, E&CE, RRIT
Encapsulation and De-capsulation
•Encapsulation is the process of adding additional
information when data is traveling in OSI or TCP/IP model.
•The additional information will be added on sender’s
side, starting from Application layer to Physical layer.
•Decapsulation is the process of removing the header and
trailer information from a packet, as it moves toward its
destination.
•The destination device receives the data in its original
form.
•Decapsulation moves in the reverse order, from Layer 1
to Layer 7 in the TCP/IP suite, as the packet travels to the
receiving computer.
2/11/2023 43
Dr. Shivashankar, E&CE, RRIT
CONTI…
2/11/2023 44
Dr. Shivashankar, E&CE, RRIT
Figure 8: Encapsulation/Decapsulation
Encapsulation at the Source Host
1. At the application layer, the data to be exchanged is referred to
as a message. The message is passed to the transport layer.
2. The transport layer takes the message as the payload, It adds
the transport layer header to the payload, called the segment
(in TCP) and the user datagram (in UDP). The transport layer
then passes the packet to the network layer.
3. The network layer takes the transport-layer packet as data or
payload and adds its own header to the payload. The result is
the network- layer packet, called a datagram. The network layer
then passes the packet to the data-link layer.
4. The data-link layer takes the network-layer packet as data or
payload and adds its own header, The result is the link-layer
packet, which is called a frame. The frame is passed to the
physical layer for transmission.
2/11/2023 45
Dr. Shivashankar, E&CE, RRIT
CONTI…
Decapsulation and Encapsulation at the Router
At the router, we have both decapsulation and encapsulation because
the router is connected to two or more links.
1. After the set of bits are delivered to the data-link layer, this layer
decapsulates the datagram from the frame and passes it to the
network layer.
2. The network layer only inspects the source and destination
addresses in the datagram header and consults its forwarding
table to find the next hop to which the datagram is to be delivered.
The datagram is then passed to the data-link layer of the next link.
3. The data-link layer of the next link encapsulates the datagram in a
frame and passes it to the physical layer for transmission.
2/11/2023 46
Dr. Shivashankar, E&CE, RRIT
CONTI…
Decapsulation at the Destination Host
At the destination host, each layer only decapsulates the packet
received, removes the payload, and delivers the payload to the
next-higher layer protocol until the message reaches the application
layer.
It is necessary to say that decapsulation in the host involves error
checking.
2/11/2023 47
Dr. Shivashankar, E&CE, RRIT
Addressing
logical communication between pairs of layers in this model. Any
communication that involves two parties needs two addresses:
source address and destination address.
2/11/2023 48
Dr. Shivashankar, E&CE, RRIT
Figure 1.24 Addressing in the TCP/IP protocol suite
Multiplexing and Demultiplexing
•Multiplexing in this case means that a protocol at a layer can
encapsulate a packet from several next-higher layer protocols (one
at a time);
•Memultiplexing means that a protocol can decapsulate and deliver
a packet to several next-higher layer protocols (one at a time).
2/11/2023 49
Dr. Shivashankar, E&CE, RRIT
Figure 1.25 Multiplexing and demultiplexing
THE OSI MODEL
•Established in 1947, the International Organization for
Standardization (ISO) is a multinational body dedicated to
worldwide agreement on international standards.
•Almost three-fourths of the countries in the world are represented
in the ISO.
•An ISO standard that covers all aspects of network communications
is the Open Systems Interconnection (OSI) model. It was first
introduced in the late 1970s.
An open system is a set of protocols that allows any two different
systems to communicate.
The purpose of the OSI model is to show how to facilitate
communication between different systems without requiring
changes to the logic of the underlying hardware and software.
2/11/2023 50
Dr. Shivashankar, E&CE, RRIT
CONTI…
2/11/2023 51
Dr. Shivashankar, E&CE, RRIT
Figure 1.26 : The OSI model
OSI versus TCP/IP
•Session and presentation aare not added to the TCP/IP protocol
suite.
• The application layer in the suite is usually considered to be the
combination of three layers in the TCP/IP suite.
•OSI model is developed by ISO (International Standard
Organization), whereas TCP Model is developed by ARPANET
(Advanced Research Project Agency Network).
•OSI model helps us to standardize router, switch, motherboard,
and other hardware, whereas TCP/IP helps us to establish a
connection between different types of computers.
•In OSI model, the transport layer is only connection-oriented,
whereas the TCP/IP model is both connection-oriented and
connectionless.
2/11/2023 52
Dr. Shivashankar, E&CE, RRIT
CONTI…
2/11/2023 53
Dr. Shivashankar, E&CE, RRIT
Figure 1.27 TCP/IP and OSI model
QUIZES
1. A computer Networks permits sharing of
a. Resources
b. Information
c. Both a & b
d. None of the above
2. The first operational computer network in the world was ____in US.
a. ARPANET
b. ERNET
c. SKYNET
d. DARPANET
3. _____is the technology that connects the machine and people within small area
a. WAN
b. LAN
c. MAN
d. None of the above
4. ____ is network that covers geographical larger area, such as districts and cities
a. WAN
b. LAN
c. MAN
d. None of the above
2/11/2023 54
Dr. Shivashankar, E&CE, RRIT
CONTI…
5. _____ is network that connects sites connects in diverse locations
a. WAN
b. LAN
c. MAN
d. None of the above
6. Check sum is used for
a. Error correction
b. Error detection
c. Both a&b
d. None of these
7. Network of networks known as
a. Intranet
b. Internet
c. LAN
d. WAN
8. The commonly used protocol for web page transfer is_______
a. HTML
b. WML
c. WTTP
d. HTTP
2/11/2023 55
Dr. Shivashankar, E&CE, RRIT

More Related Content

What's hot

Lecture 6 -_presentation_layer
Lecture 6 -_presentation_layerLecture 6 -_presentation_layer
Lecture 6 -_presentation_layer
Serious_SamSoul
 
Dc ch10 : circuit switching and packet switching
Dc ch10 : circuit switching and packet switchingDc ch10 : circuit switching and packet switching
Dc ch10 : circuit switching and packet switching
Syaiful Ahdan
 
VHDL- gate level modelling
VHDL- gate level modellingVHDL- gate level modelling
VHDL- gate level modelling
VandanaPagar1
 
Generation of Computer Network
Generation of Computer NetworkGeneration of Computer Network
Generation of Computer Network
Bathshebaparimala
 
Data Link Layer
Data Link LayerData Link Layer
Data Link Layer
Rutwik Jadhav
 
Framing Protocols
Framing ProtocolsFraming Protocols
Framing Protocols
selvakumar_b1985
 
Subnetting
SubnettingSubnetting
Subnetting
selvakumar_b1985
 
I2C
I2CI2C
Computer Network Topologies (with animations)
Computer Network Topologies (with animations)Computer Network Topologies (with animations)
Computer Network Topologies (with animations)
Damian T. Gordon
 
Popular network devices
Popular network devicesPopular network devices
Popular network devices
Mahesh_Naidu
 
IPv4 Addressing
 IPv4 Addressing   IPv4 Addressing
IPv4 Addressing
TheGodfather HA
 
Modules and ports in Verilog HDL
Modules and ports in Verilog HDLModules and ports in Verilog HDL
Modules and ports in Verilog HDL
anand hd
 
Module 3
Module 3Module 3
Module 3
Gururaj H L
 
Computer networking
Computer networkingComputer networking
Computer networking
Maulik Togadiya
 
Diabetic Retinopathy detection using Machine learning
Diabetic Retinopathy detection using Machine learningDiabetic Retinopathy detection using Machine learning
Diabetic Retinopathy detection using Machine learning
IRJET Journal
 
Vlsm and supernetting
Vlsm and supernettingVlsm and supernetting
Vlsm and supernetting
Nahian Ahmed
 
Computer network switching
Computer network switchingComputer network switching
Computer network switching
Shivani Godha
 
Chapter 7 - Data Link Control Protocols 9e
Chapter 7 - Data Link Control Protocols 9eChapter 7 - Data Link Control Protocols 9e
Chapter 7 - Data Link Control Protocols 9eadpeer
 
Hub, switch, router, bridge & and repeater
Hub, switch, router, bridge & and repeaterHub, switch, router, bridge & and repeater
Hub, switch, router, bridge & and repeater
Maksudujjaman
 
Computer Network - Network Layer
Computer Network - Network LayerComputer Network - Network Layer
Computer Network - Network Layer
Manoj Kumar
 

What's hot (20)

Lecture 6 -_presentation_layer
Lecture 6 -_presentation_layerLecture 6 -_presentation_layer
Lecture 6 -_presentation_layer
 
Dc ch10 : circuit switching and packet switching
Dc ch10 : circuit switching and packet switchingDc ch10 : circuit switching and packet switching
Dc ch10 : circuit switching and packet switching
 
VHDL- gate level modelling
VHDL- gate level modellingVHDL- gate level modelling
VHDL- gate level modelling
 
Generation of Computer Network
Generation of Computer NetworkGeneration of Computer Network
Generation of Computer Network
 
Data Link Layer
Data Link LayerData Link Layer
Data Link Layer
 
Framing Protocols
Framing ProtocolsFraming Protocols
Framing Protocols
 
Subnetting
SubnettingSubnetting
Subnetting
 
I2C
I2CI2C
I2C
 
Computer Network Topologies (with animations)
Computer Network Topologies (with animations)Computer Network Topologies (with animations)
Computer Network Topologies (with animations)
 
Popular network devices
Popular network devicesPopular network devices
Popular network devices
 
IPv4 Addressing
 IPv4 Addressing   IPv4 Addressing
IPv4 Addressing
 
Modules and ports in Verilog HDL
Modules and ports in Verilog HDLModules and ports in Verilog HDL
Modules and ports in Verilog HDL
 
Module 3
Module 3Module 3
Module 3
 
Computer networking
Computer networkingComputer networking
Computer networking
 
Diabetic Retinopathy detection using Machine learning
Diabetic Retinopathy detection using Machine learningDiabetic Retinopathy detection using Machine learning
Diabetic Retinopathy detection using Machine learning
 
Vlsm and supernetting
Vlsm and supernettingVlsm and supernetting
Vlsm and supernetting
 
Computer network switching
Computer network switchingComputer network switching
Computer network switching
 
Chapter 7 - Data Link Control Protocols 9e
Chapter 7 - Data Link Control Protocols 9eChapter 7 - Data Link Control Protocols 9e
Chapter 7 - Data Link Control Protocols 9e
 
Hub, switch, router, bridge & and repeater
Hub, switch, router, bridge & and repeaterHub, switch, router, bridge & and repeater
Hub, switch, router, bridge & and repeater
 
Computer Network - Network Layer
Computer Network - Network LayerComputer Network - Network Layer
Computer Network - Network Layer
 

Similar to MODULE-1_CCN.pptx

Overview of data communication and networking
Overview of data communication and networkingOverview of data communication and networking
Overview of data communication and networkingSisir Ghosh
 
Basic Concepts of Networking.pptx
Basic Concepts of Networking.pptxBasic Concepts of Networking.pptx
Basic Concepts of Networking.pptx
AhmadAbba6
 
Network Fundamentals1.pptx
Network Fundamentals1.pptxNetwork Fundamentals1.pptx
Network Fundamentals1.pptx
sairakesh41
 
COMPUTER NETWORKING SYSTEM
COMPUTER NETWORKING SYSTEMCOMPUTER NETWORKING SYSTEM
COMPUTER NETWORKING SYSTEM
prapti borthakur
 
Unit 1.pdf
Unit 1.pdfUnit 1.pdf
Unit 1.pdf
lakshmisangeetha1
 
Computer network
Computer networkComputer network
Computer network
tanvirahmed638
 
Computer Networks-1 1st unit (10CS55) VTU
Computer Networks-1 1st unit (10CS55) VTUComputer Networks-1 1st unit (10CS55) VTU
Computer Networks-1 1st unit (10CS55) VTUSiddharaj Junnarkar
 
3.1 Network Basic
3.1 Network Basic3.1 Network Basic
3.1 Network Basic
Fizaril Amzari Omar
 
Introduction to data communication
Introduction to data communicationIntroduction to data communication
Introduction to data communication
Abir Hossain
 
Computer network and communication (107 kb)
Computer network and communication (107 kb)Computer network and communication (107 kb)
Computer network and communication (107 kb)IMRAN KHAN
 
Network Devices
Network DevicesNetwork Devices
Network Devices
SamiuR RahmaN
 
Introduction to Networking And its Types
Introduction to Networking And its TypesIntroduction to Networking And its Types
Introduction to Networking And its Types
HamzaHaji8
 
Network topology and devices
Network topology and devicesNetwork topology and devices
Network topology and devicesKunal Bhansali
 
presentation_internet.pptx
presentation_internet.pptxpresentation_internet.pptx
presentation_internet.pptx
bantisworld
 
Networks classification
Networks classificationNetworks classification
Networks classification
Mukesh Chinta
 
Computer Networks Module I
Computer Networks Module IComputer Networks Module I
Computer Networks Module I
Ajit Nayak
 
Physical Layer.pdf
Physical Layer.pdfPhysical Layer.pdf
Physical Layer.pdf
TamiratDejene1
 
#1 Physical Layer.pdf
#1 Physical Layer.pdf#1 Physical Layer.pdf
#1 Physical Layer.pdf
TamiratDejene1
 
Computer Networks Unit 1 Introduction and Physical Layer
Computer Networks Unit 1 Introduction and Physical Layer Computer Networks Unit 1 Introduction and Physical Layer
Computer Networks Unit 1 Introduction and Physical Layer
Dr. SELVAGANESAN S
 
Computer Network notes.docx
Computer Network notes.docxComputer Network notes.docx
Computer Network notes.docx
Meenalochini M
 

Similar to MODULE-1_CCN.pptx (20)

Overview of data communication and networking
Overview of data communication and networkingOverview of data communication and networking
Overview of data communication and networking
 
Basic Concepts of Networking.pptx
Basic Concepts of Networking.pptxBasic Concepts of Networking.pptx
Basic Concepts of Networking.pptx
 
Network Fundamentals1.pptx
Network Fundamentals1.pptxNetwork Fundamentals1.pptx
Network Fundamentals1.pptx
 
COMPUTER NETWORKING SYSTEM
COMPUTER NETWORKING SYSTEMCOMPUTER NETWORKING SYSTEM
COMPUTER NETWORKING SYSTEM
 
Unit 1.pdf
Unit 1.pdfUnit 1.pdf
Unit 1.pdf
 
Computer network
Computer networkComputer network
Computer network
 
Computer Networks-1 1st unit (10CS55) VTU
Computer Networks-1 1st unit (10CS55) VTUComputer Networks-1 1st unit (10CS55) VTU
Computer Networks-1 1st unit (10CS55) VTU
 
3.1 Network Basic
3.1 Network Basic3.1 Network Basic
3.1 Network Basic
 
Introduction to data communication
Introduction to data communicationIntroduction to data communication
Introduction to data communication
 
Computer network and communication (107 kb)
Computer network and communication (107 kb)Computer network and communication (107 kb)
Computer network and communication (107 kb)
 
Network Devices
Network DevicesNetwork Devices
Network Devices
 
Introduction to Networking And its Types
Introduction to Networking And its TypesIntroduction to Networking And its Types
Introduction to Networking And its Types
 
Network topology and devices
Network topology and devicesNetwork topology and devices
Network topology and devices
 
presentation_internet.pptx
presentation_internet.pptxpresentation_internet.pptx
presentation_internet.pptx
 
Networks classification
Networks classificationNetworks classification
Networks classification
 
Computer Networks Module I
Computer Networks Module IComputer Networks Module I
Computer Networks Module I
 
Physical Layer.pdf
Physical Layer.pdfPhysical Layer.pdf
Physical Layer.pdf
 
#1 Physical Layer.pdf
#1 Physical Layer.pdf#1 Physical Layer.pdf
#1 Physical Layer.pdf
 
Computer Networks Unit 1 Introduction and Physical Layer
Computer Networks Unit 1 Introduction and Physical Layer Computer Networks Unit 1 Introduction and Physical Layer
Computer Networks Unit 1 Introduction and Physical Layer
 
Computer Network notes.docx
Computer Network notes.docxComputer Network notes.docx
Computer Network notes.docx
 

More from Dr. Shivashankar

21 Scheme_21EC53_MODULE-5_CCN_Dr. ShivaS
21 Scheme_21EC53_MODULE-5_CCN_Dr. ShivaS21 Scheme_21EC53_MODULE-5_CCN_Dr. ShivaS
21 Scheme_21EC53_MODULE-5_CCN_Dr. ShivaS
Dr. Shivashankar
 
21 SCHEME_21EC53_VTU_MODULE-4_COMPUTER COMMUNCATION NETWORK.pdf
21 SCHEME_21EC53_VTU_MODULE-4_COMPUTER COMMUNCATION NETWORK.pdf21 SCHEME_21EC53_VTU_MODULE-4_COMPUTER COMMUNCATION NETWORK.pdf
21 SCHEME_21EC53_VTU_MODULE-4_COMPUTER COMMUNCATION NETWORK.pdf
Dr. Shivashankar
 
21 Scheme_MODULE-2_CCN.pdf
21 Scheme_MODULE-2_CCN.pdf21 Scheme_MODULE-2_CCN.pdf
21 Scheme_MODULE-2_CCN.pdf
Dr. Shivashankar
 
Network Security_Dr Shivashankar_Module 5.pdf
Network Security_Dr Shivashankar_Module 5.pdfNetwork Security_Dr Shivashankar_Module 5.pdf
Network Security_Dr Shivashankar_Module 5.pdf
Dr. Shivashankar
 
Wireless Cellular Communication_Module 3_Dr. Shivashankar.pdf
Wireless Cellular Communication_Module 3_Dr. Shivashankar.pdfWireless Cellular Communication_Module 3_Dr. Shivashankar.pdf
Wireless Cellular Communication_Module 3_Dr. Shivashankar.pdf
Dr. Shivashankar
 
Wireless Cellular Communication_Mudule2_Dr.Shivashankar.pdf
Wireless Cellular Communication_Mudule2_Dr.Shivashankar.pdfWireless Cellular Communication_Mudule2_Dr.Shivashankar.pdf
Wireless Cellular Communication_Mudule2_Dr.Shivashankar.pdf
Dr. Shivashankar
 
Network Security_4th Module_Dr. Shivashankar
Network Security_4th Module_Dr. ShivashankarNetwork Security_4th Module_Dr. Shivashankar
Network Security_4th Module_Dr. Shivashankar
Dr. Shivashankar
 
Network Security_3rd Module_Dr. Shivashankar
Network Security_3rd Module_Dr. ShivashankarNetwork Security_3rd Module_Dr. Shivashankar
Network Security_3rd Module_Dr. Shivashankar
Dr. Shivashankar
 
Network Security_Module_2_Dr Shivashankar
Network Security_Module_2_Dr ShivashankarNetwork Security_Module_2_Dr Shivashankar
Network Security_Module_2_Dr Shivashankar
Dr. Shivashankar
 
Network Security-Module_1.pdf
Network Security-Module_1.pdfNetwork Security-Module_1.pdf
Network Security-Module_1.pdf
Dr. Shivashankar
 
Network Security_Module_2.pdf
Network Security_Module_2.pdfNetwork Security_Module_2.pdf
Network Security_Module_2.pdf
Dr. Shivashankar
 

More from Dr. Shivashankar (11)

21 Scheme_21EC53_MODULE-5_CCN_Dr. ShivaS
21 Scheme_21EC53_MODULE-5_CCN_Dr. ShivaS21 Scheme_21EC53_MODULE-5_CCN_Dr. ShivaS
21 Scheme_21EC53_MODULE-5_CCN_Dr. ShivaS
 
21 SCHEME_21EC53_VTU_MODULE-4_COMPUTER COMMUNCATION NETWORK.pdf
21 SCHEME_21EC53_VTU_MODULE-4_COMPUTER COMMUNCATION NETWORK.pdf21 SCHEME_21EC53_VTU_MODULE-4_COMPUTER COMMUNCATION NETWORK.pdf
21 SCHEME_21EC53_VTU_MODULE-4_COMPUTER COMMUNCATION NETWORK.pdf
 
21 Scheme_MODULE-2_CCN.pdf
21 Scheme_MODULE-2_CCN.pdf21 Scheme_MODULE-2_CCN.pdf
21 Scheme_MODULE-2_CCN.pdf
 
Network Security_Dr Shivashankar_Module 5.pdf
Network Security_Dr Shivashankar_Module 5.pdfNetwork Security_Dr Shivashankar_Module 5.pdf
Network Security_Dr Shivashankar_Module 5.pdf
 
Wireless Cellular Communication_Module 3_Dr. Shivashankar.pdf
Wireless Cellular Communication_Module 3_Dr. Shivashankar.pdfWireless Cellular Communication_Module 3_Dr. Shivashankar.pdf
Wireless Cellular Communication_Module 3_Dr. Shivashankar.pdf
 
Wireless Cellular Communication_Mudule2_Dr.Shivashankar.pdf
Wireless Cellular Communication_Mudule2_Dr.Shivashankar.pdfWireless Cellular Communication_Mudule2_Dr.Shivashankar.pdf
Wireless Cellular Communication_Mudule2_Dr.Shivashankar.pdf
 
Network Security_4th Module_Dr. Shivashankar
Network Security_4th Module_Dr. ShivashankarNetwork Security_4th Module_Dr. Shivashankar
Network Security_4th Module_Dr. Shivashankar
 
Network Security_3rd Module_Dr. Shivashankar
Network Security_3rd Module_Dr. ShivashankarNetwork Security_3rd Module_Dr. Shivashankar
Network Security_3rd Module_Dr. Shivashankar
 
Network Security_Module_2_Dr Shivashankar
Network Security_Module_2_Dr ShivashankarNetwork Security_Module_2_Dr Shivashankar
Network Security_Module_2_Dr Shivashankar
 
Network Security-Module_1.pdf
Network Security-Module_1.pdfNetwork Security-Module_1.pdf
Network Security-Module_1.pdf
 
Network Security_Module_2.pdf
Network Security_Module_2.pdfNetwork Security_Module_2.pdf
Network Security_Module_2.pdf
 

Recently uploaded

Online aptitude test management system project report.pdf
Online aptitude test management system project report.pdfOnline aptitude test management system project report.pdf
Online aptitude test management system project report.pdf
Kamal Acharya
 
AIR POLLUTION lecture EnE203 updated.pdf
AIR POLLUTION lecture EnE203 updated.pdfAIR POLLUTION lecture EnE203 updated.pdf
AIR POLLUTION lecture EnE203 updated.pdf
RicletoEspinosa1
 
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
obonagu
 
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
ssuser7dcef0
 
bank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdfbank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdf
Divyam548318
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
SUTEJAS
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
Mukeshwaran Balu
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
Victor Morales
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
ClaraZara1
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
zwunae
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
Aditya Rajan Patra
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
SyedAbiiAzazi1
 
Unbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptxUnbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptx
ChristineTorrepenida1
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
camseq
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTSHeap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Soumen Santra
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 

Recently uploaded (20)

Online aptitude test management system project report.pdf
Online aptitude test management system project report.pdfOnline aptitude test management system project report.pdf
Online aptitude test management system project report.pdf
 
AIR POLLUTION lecture EnE203 updated.pdf
AIR POLLUTION lecture EnE203 updated.pdfAIR POLLUTION lecture EnE203 updated.pdf
AIR POLLUTION lecture EnE203 updated.pdf
 
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
 
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
 
bank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdfbank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdf
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
 
Unbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptxUnbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptx
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTSHeap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 

MODULE-1_CCN.pptx

  • 1. COMPUTER NETWORK (18EC71) Dr. Shivashankar Professor Department of Electronics & Communication Engineering RRIT, Bangalore 2/11/2023 1 Dr. Shivashankar, E&CE, RRIT
  • 2. Course Outcomes After Completion of the course, student will be able to Understand the concepts of networking thoroughly. Describe the various network architectures Identify the protocols and services of different layers Distinguish the basic network configurations and standards associated with each network models. Analyze a simple network and measurements of its parameters. Text Book: Data Communications and Networking , Forouzan, 5th Edition, McGraw Hill, 2016 ISBN: 1-25-906475-3 2/11/2023 2 Dr. Shivashankar, E&CE, RRIT
  • 3. MODULE-1 DATA COMMUNICATIONS Data communications are the exchange of data between two devices via some form of transmission medium such as a wired or wireless media. For data communications to occur, the communicating devices must be part of a communication system made up of a combination of hardware (physical equipment) and software (programs). The effectiveness of a data communications system depends on four fundamental characteristics: delivery, accuracy, timeliness and jitter. 2/11/2023 3 Dr. Shivashankar, E&CE, RRIT
  • 4. COMPONENTS Figure 1.1: Five Components of Data Communication 1. Message 2. Sender 3. Receiver 4. Transmission Media 5. Protocols 2/11/2023 4 Dr. Shivashankar, E&CE, RRIT
  • 5. CONTI… Message: Is the information (data) to be communicated. EX: text, numbers, pictures, audio, and video.  Sender: is the device that sends the data message. Ex: computer, workstation, telephone handset, Mobile etc.  Receiver: Is the device that receives the message. I Ex: computer, workstation, telephone handset, Mobile etc.  Transmission medium: Is the physical path by which a message travels from sender to receiver. Ex: twisted-pair wire, coaxial cable, fiber-optic cable, and radio waves.  Protocol: Is a set of rules that govern data communications. It represents an agreement between the communicating devices. Without a protocol, two devices may be connected but not communicating, Ex: TCP/IP, UDP etc 2/11/2023 5 Dr. Shivashankar, E&CE, RRIT
  • 6. Data Representation Text • In data communications, text is represented as a bit pattern, a sequence of bits (0s or 1s). •Different sets of bit patterns have been designed to represent text symbols. •Each set is called a code, and the process of representing symbols is called coding. •Today, the prevalent coding system is called Unicode, which uses 32 bits to represent a symbol or character used in any language in the world. •The American Standard Code for Information Interchange (ASCII), developed some decades ago in the United States, now constitutes the first 127 characters in Unicode and is also referred to as Basic Latin. 2/11/2023 6 Dr. Shivashankar, E&CE, RRIT
  • 7. CONTI… Numbers: Numbers are also represented by bit patterns. Number is directly converted to a binary number to simplify mathematical operations. Images: Images are also represented by bit patterns. In its simplest form, an image is composed of a matrix of pixels (picture elements), where each pixel is a small dot. The size of the pixel depends on the resolution. If an image is not made of pure white and pure black pixels, we can increase the size of the bit pattern to include gray scale. There are several methods to represent color images. One method is called RGB, so called because each color is made of a combination of three primary colors: red, green, and blue. 2/11/2023 7 Dr. Shivashankar, E&CE, RRIT
  • 8. CONTI… Audio refers to the recording or broadcasting of sound or music. Audio is by nature different from text, numbers, or images. It is continuous, not discrete. Even when we use a microphone to change voice or music to an electric signal, we create a continuous signal. Video refers to the recording or broadcasting of a picture or movie. Video can either be produced as a continuous entity (e.g., by a TV camera), or it can be a combination of images, each a discrete entity, arranged to convey the idea of motion. 2/11/2023 8 Dr. Shivashankar, E&CE, RRIT
  • 9. DATA FLOW Communication between two devices can be simplex, half-duplex, or full-duplex as shown in Figure 1.2. Figure 1: Different data flow representation Keyboards and traditional monitors are examples of simplex devices Each station can both transmit and receive, but not at the same time. When one device is sending, the other can only receive, and vice versa. Walkie-talkies , Radio Both stations can transmit and receive simultaneously. Mobile 2/11/2023 9 Dr. Shivashankar, E&CE, RRIT
  • 10. NETWORKS Network is a Interconnection of a set of devices capable of communication. A device can be a host such as a large computer, desktop, laptop, workstation, cellular phone, or security system. A device: connecting device such as a router, which connects the network to other networks, a switch, which connects devices together, a modem (modulator- demodulator), which changes the form of data, and so on. A network are connected using wired or wireless. 2/11/2023 10 Dr. Shivashankar, E&CE, RRIT
  • 11. Physical Structures Type of Connection Point-to-point connection : Point-to-point connections are typically used to connect two systems together over a WAN. The entire capacity of the link is reserved for transmission between those two devices. Most point-to-point connections use an actual length of wire or cable to connect the two ends, but other options, such as microwave or satellite links, are also possible. When we change television channels by infrared remote control, we are establishing a point-to-point connection between the remote control and the television’s control system. Example: telephone call 2/11/2023 11 Dr. Shivashankar, E&CE, RRIT
  • 12. CONTI… Multipoint: Also called multidrop connection. More than two specific devices share a single link. In a multipoint environment, the capacity of the channel is shared, either spatially or temporally. If several devices can use the link simultaneously, it is a spatially shared connection. If users must take turns, it is a timeshared connection. Figure 2: Types of Connection 2/11/2023 12 Dr. Shivashankar, E&CE, RRIT
  • 13. NETWORK TYPES local area network (LAN): Usually privately owned and connects some hosts in a single office, building, or campus. Depending on the needs of an organization, a LAN can be as simple as two PCs and a printer in someone’s home office, or it can extend throughout a company and include audio and video devices. Each host in a LAN has an identifier, an address, that uniquely defines the host in the LAN. A packet sent by a host to another host carries both the source host’s and the destination host’s addresses. Today, most LANs use a smart connecting switch, which is able to recognize the destination address of the packet and guide the packet to its destination without sending it to all other hosts. 2/11/2023 13 Dr. Shivashankar, E&CE, RRIT
  • 14. CONTI… Figure 1.8 An isolated LAN in the past and today 2/11/2023 14 Dr. Shivashankar, E&CE, RRIT
  • 15. CONTI… Wide Area Network (WAN) Also an interconnection of devices capable of communication. A LAN is normally limited in size, spanning an office, a building, or a campus; a WAN has. A wider geographical span, spanning a town, a state, a country, or even the world. A LAN interconnects hosts; a WAN interconnects connecting devices such as switches, routers, or modems. A LAN is normally privately owned by the organization that uses it; a WAN is normally created and run by communication companies and leased by an organization that uses it. We see two distinct examples of WANs today: point-to-point WANs and switched WANs. 2/11/2023 15 Dr. Shivashankar, E&CE, RRIT
  • 16. CONTI… Point-to-Point WAN A point-to-point WAN is a network that connects two communicating devices through a transmission media (cable or air). 2/11/2023 16 Dr. Shivashankar, E&CE, RRIT Figure 1.9 A point-to-point WAN
  • 17. CONTI… Switched WAN A switched WAN is a network with more than two ends. A switched WAN, as we will see shortly, is used in the backbone of global communication today. A switched WAN is a combination of several point-to-point WANs that are connected by switches. 2/11/2023 17 Dr. Shivashankar, E&CE, RRIT Figure 1.10 A switched WAN
  • 18. CONTI… Internetwork When two or more networks are connected, they make an internetwork, or internet. To make the communication between employees at different offices possible, the management leases a point- to-point dedicated WAN from a service provider, such as a telephone company, and connects the two LANs. 2/11/2023 18 Dr. Shivashankar, E&CE, RRIT Figure 1.11 An internetwork made of two LANs and one point-to-point WAN
  • 19. CONTI… Switching An internet is a switched network in which a switch connects at least two links together. A switch needs to forward data from a network to another network when required. The two most common types of switched networks:  Circuit-switched and Packet-switched networks. 2/11/2023 19 Dr. Shivashankar, E&CE, RRIT
  • 20. Cont.. Circuit-Switched Network • In a circuit-switched network, a dedicated connection, called a circuit, is always available between the two end systems; the switch can only make it active or inactive. 2/11/2023 Dr. Shivashankar, E&CE, RRIT 20 Figure 8: A circuit Switched Network
  • 21. Cont… 2/11/2023 Dr. Shivashankar, E&CE, RRIT 21 Packet-Switched Network • In a computer network, the communication between the two ends is done in blocks of data called packets. Figure 9: A packet-switched network
  • 22. The Internet It allowed multiple computers to work on a single network that was their biggest achievement internet. Internet is the foremost important tool and the prominent resource that is being used by almost every person across the globe.  It connects millions of computers, web pages, websites, and servers. The internet is a widespread interconnected network of computers and electronics devices(that support internet). It creates a communication medium to share and get information online. Origin Of Internet: The internet came in the year 1960 with the creation of the first working model called ARPANET (Advanced Research Projects Agency). 2/11/2023 22 Dr. Shivashankar, E&CE, RRIT
  • 23. Network Models PROTOCOL LAYERING In data communication and networking, a protocol defines the rules that both the sender and receiver and all intermediate devices need to follow to be able to communicate effectively. When communication is simple, we may need only one simple protocol; when the communication is complex, we may need to divide the task between different layers, in which case we need a protocol at each layer, or this technique we used to call protocol layering. This layering allows us to separate the services from the implementation. 2/11/2023 23 Dr. Shivashankar, E&CE, RRIT
  • 24. CONTI… Scenarios First Scenario In the first scenario, communication is so simple that it can occur in only one layer. Assume Maria and Ann are neighbors with a lot of common ideas. Communication between Maria and Ann takes place in one layer, face to face, in the same language, as shown in Figure 4. 2/11/2023 24 Dr. Shivashankar, E&CE, RRIT Figure 1.16 A single-layer protocol
  • 25. CONTI… . First, Maria and Ann know that they should greet each other when they meet. Second, they know that they should confine their vocabulary to the level of their friendship. Third, each party knows that she should refrain from speaking when the other party is speaking. Fourth, each party knows that the conversation should be a dialog, not a monolog: both should have the opportunity to talk about the issue. Fifth, they should exchange some nice words when they leave. 2/11/2023 25 Dr. Shivashankar, E&CE, RRIT
  • 26. CONTI… Second Scenario In the second scenario, we assume that Ann is offered a higher- level position in her company, but needs to move to another branch located in a city very far from Maria. The two friends still want to continue their communication and exchange ideas because they have come up with an innovative project to start a new business when they both retire. They decide to continue their conversation using regular mail through the post office. However, they do not want their ideas to be revealed by other people if the letters are intercepted. They agree on an encryption/decryption technique. 2/11/2023 26 Dr. Shivashankar, E&CE, RRIT
  • 27. CONTI… Figure 1.17 A three-layer protocol 2/11/2023 27 Dr. Shivashankar, E&CE, RRIT
  • 28. CONTI… Principles of Protocol Layering First Principle •The first principle dictates that if we want bi-directional communication, we need to make each layer so that it is able to perform two opposite tasks, one in each direction. •For example, the third layer task is to listen (in one direction) and talk (in the other direction). •The second layer needs to be able to encrypt and decrypt. •The first layer needs to send and receive mail. 2/11/2023 28 Dr. Shivashankar, E&CE, RRIT
  • 29. CONTI… Second Principle •The second principle that we need to follow in protocol layering is that the two objects under each layer at both sites should be identical. •For example, the object under layer 3 at both sites should be a plaintext letter. •The object under layer 2 at both sites should be a cipher text letter. •The object under layer 1 at both sites should be a piece of mail. 2/11/2023 29 Dr. Shivashankar, E&CE, RRIT
  • 30. CONTI… Logical Connections •A logical network is a virtual representation of a network that appears to the user as an entirely separate and self-contained network •A logical network interface or device is the software entity that is known by an operating system. 2/11/2023 30 Dr. Shivashankar, E&CE, RRIT Figure 7: Logical connection between peer layers
  • 31. TCP/IP PROTOCOL SUITE •Transmission Control Protocol/Internet Protocol (TCP/IP). •TCP/IP is a protocol suite (a set of protocols organized in different layers) used in the Internet today. •It is a hierarchical protocol made up of interactive modules, each of which provides a specific functionality. •Hierarchical means that each upper level protocol is supported by the services provided by one or more lower level protocols. •The original TCP/IP protocol suite was defined as four software layers built upon the hardware. •Today, however, TCP/IP is thought of as a five-layer model. 2/11/2023 31 Dr. Shivashankar, E&CE, RRIT
  • 32. CONTI… 2/11/2023 32 Dr. Shivashankar, E&CE, RRIT Figure 1.19 Layers in the TCP/IP protocol suite
  • 33. CONTI… Layered Architecture To show how the layers in the TCP/IP protocol suite are involved in communication between two hosts, we assume that we want to use the suite in a small internet made up of three LANs (links), each with a link-layer switch. 2/11/2023 33 Dr. Shivashankar, E&CE, RRIT Figure 1.20 Communication through an internet
  • 34. CONTI… Layers in the TCP/IP Protocol Suite  The duty of the data-link and physical layers is hop-to-hop, in which a hop is a host or router. The duty of the top three layers is the internet, and the domain of duty of the two lower layers is the link. 2/11/2023 34 Dr. Shivashankar, E&CE, RRIT Figure 1.21 Logical connections between layers of the TCP/IP protocol suite
  • 35. Physical layer Physical layer is the lowest level in the TCP/IP protocol suite, the communication between two devices. Responsible for carrying individual bits in a frame across the link. Two devices are connected by a transmission medium (cable or air). The transmission medium does not carry bits; it carries electrical or optical signals. The bits received in a frame from the data-link layer are trans- formed and sent through the transmission media. It provides an interface between devices (like PC’s or computers) and transmission medium. Hubs, Ethernet, etc. device is used in this layer. 2/11/2023 35 Dr. Shivashankar, E&CE, RRIT
  • 36. Data Link layer •The Data-link layer is the second layer from the bottom in the TCP/IP suits. •It is responsible for the node-to-node delivery of data. •Its major role is to ensure error-free transmission of information. •The routers are responsible for choosing the best links. •The data-link layer is responsible for taking the datagram and moving it across the link. •The data-link layer takes a datagram and encapsulates it in a packet called a frame. •data-link layer protocols are Ethernet IEEE 802.2 framing and Point- to-Point Protocol (PPP) framing. •A modern computer typically has three separate data link layer for Ethernet, wireless and Bluetooth. 2/11/2023 36 Dr. Shivashankar, E&CE, RRIT
  • 37. CONTI… Network Layer •The network layer is responsible for creating a connection between the source computer and the destination computer. •The "network layer" is the part of the Internet communications process. •Network layer is responsible for host-to-host communication and routing the packet through possible routes. •The network layer in the Internet includes the main protocol, Internet Protocol (IP), that defines the format of the packet, called a datagram at the network layer. •IP is a connectionless protocol that provides no flow control, no error control, and no congestion control services. •Handles the routing and sending of data between different networks. 2/11/2023 37 Dr. Shivashankar, E&CE, RRIT
  • 38. CONTI… The Internet Control Message Protocol (ICMP) used to determine whether or not data is reaching its intended destination in a timely manner. The Internet Group Management Protocol (IGMP) protocol that allows several devices to share one IP address so they can all receive the same data. To set up multicasting on networks that use the Internet Protocol version 4 (IPv4). The Dynamic Host Configuration Protocol (DHCP) helps IP to get the network-layer address for a host. The Address Resolution Protocol (ARP) is a protocol that helps IP to find the link- layer address of a host or a router when its network-layer address is given. 2/11/2023 38 Dr. Shivashankar, E&CE, RRIT
  • 39. Transport Layer Protocol •The logical connection at the transport layer is also end- to-end. •The transport layer at the source host gets the message from the application layer, encapsulates it, called a segment or a user datagram, and sends it, through the logical (imaginary) connection. •The transport layer maintains the order of data. •It receives the data from the upper layer and converts it into smaller parts known as segments. •One of the major tasks of the transport layer is to add the port addressing . 2/11/2023 39 Dr. Shivashankar, E&CE, RRIT
  • 40. CONTI… •Transmission Control Protocol (TCP): connection-oriented protocol. It creates a logical pipe between two TCPs for transferring a stream of bytes. •TCP provides flow control, error control and congestion control to reduce the loss of segments due to congestion in the network. •User Datagram Protocol (UDP): connectionless protocol that transmits user datagrams. • In UDP, each user datagram is an independent entity without being related to the previous or the next one(connectionless). •UDP is a simple protocol that does not provide flow, error, or congestion control. •Stream Control Transmission Protocol (SCTP): Connection oriented: a transport-layer protocol that ensures reliable, in-sequence transport of data. •SCTP provides multihoming support where one or both endpoints of a connection can consist of more than one IP address 2/11/2023 40 Dr. Shivashankar, E&CE, RRIT
  • 41. Application Layer •The actual communication is initiated and reflects. •Because this layer is on the top of the layer stack, it does not serve any other layers. •It takes the help of Transport and all layers below layers. •Identifying communication partners: It identifies the availability of communication partners for an application with data to transmit. •Determining resource availability: It determines whether sufficient network resources are available for the requested communication. •Synchronizing communication: All the communications occur between the applications requires cooperation which is managed by an application layer. 2/11/2023 41 Dr. Shivashankar, E&CE, RRIT
  • 42. CONTI… •The Hypertext Transfer Protocol (HTTP): foundation of any data exchange on the Web(www) and it is a client-server protocol •The Simple Mail Transfer Protocol (SMTP): the main protocol used in electronic mail (e-mail) service. •The File Transfer Protocol (FTP): used for transferring files from one host to another. •The Terminal Network (TELNET) and Secure Shell (SSH) are used for accessing a site remotely. •The Simple Network Management Protocol (SNMP): used by an administrator to manage the Internet at global and local levels. •The Domain Name System (DNS): used by other protocols to find the network-layer address of a computer. 2/11/2023 42 Dr. Shivashankar, E&CE, RRIT
  • 43. Encapsulation and De-capsulation •Encapsulation is the process of adding additional information when data is traveling in OSI or TCP/IP model. •The additional information will be added on sender’s side, starting from Application layer to Physical layer. •Decapsulation is the process of removing the header and trailer information from a packet, as it moves toward its destination. •The destination device receives the data in its original form. •Decapsulation moves in the reverse order, from Layer 1 to Layer 7 in the TCP/IP suite, as the packet travels to the receiving computer. 2/11/2023 43 Dr. Shivashankar, E&CE, RRIT
  • 44. CONTI… 2/11/2023 44 Dr. Shivashankar, E&CE, RRIT Figure 8: Encapsulation/Decapsulation
  • 45. Encapsulation at the Source Host 1. At the application layer, the data to be exchanged is referred to as a message. The message is passed to the transport layer. 2. The transport layer takes the message as the payload, It adds the transport layer header to the payload, called the segment (in TCP) and the user datagram (in UDP). The transport layer then passes the packet to the network layer. 3. The network layer takes the transport-layer packet as data or payload and adds its own header to the payload. The result is the network- layer packet, called a datagram. The network layer then passes the packet to the data-link layer. 4. The data-link layer takes the network-layer packet as data or payload and adds its own header, The result is the link-layer packet, which is called a frame. The frame is passed to the physical layer for transmission. 2/11/2023 45 Dr. Shivashankar, E&CE, RRIT
  • 46. CONTI… Decapsulation and Encapsulation at the Router At the router, we have both decapsulation and encapsulation because the router is connected to two or more links. 1. After the set of bits are delivered to the data-link layer, this layer decapsulates the datagram from the frame and passes it to the network layer. 2. The network layer only inspects the source and destination addresses in the datagram header and consults its forwarding table to find the next hop to which the datagram is to be delivered. The datagram is then passed to the data-link layer of the next link. 3. The data-link layer of the next link encapsulates the datagram in a frame and passes it to the physical layer for transmission. 2/11/2023 46 Dr. Shivashankar, E&CE, RRIT
  • 47. CONTI… Decapsulation at the Destination Host At the destination host, each layer only decapsulates the packet received, removes the payload, and delivers the payload to the next-higher layer protocol until the message reaches the application layer. It is necessary to say that decapsulation in the host involves error checking. 2/11/2023 47 Dr. Shivashankar, E&CE, RRIT
  • 48. Addressing logical communication between pairs of layers in this model. Any communication that involves two parties needs two addresses: source address and destination address. 2/11/2023 48 Dr. Shivashankar, E&CE, RRIT Figure 1.24 Addressing in the TCP/IP protocol suite
  • 49. Multiplexing and Demultiplexing •Multiplexing in this case means that a protocol at a layer can encapsulate a packet from several next-higher layer protocols (one at a time); •Memultiplexing means that a protocol can decapsulate and deliver a packet to several next-higher layer protocols (one at a time). 2/11/2023 49 Dr. Shivashankar, E&CE, RRIT Figure 1.25 Multiplexing and demultiplexing
  • 50. THE OSI MODEL •Established in 1947, the International Organization for Standardization (ISO) is a multinational body dedicated to worldwide agreement on international standards. •Almost three-fourths of the countries in the world are represented in the ISO. •An ISO standard that covers all aspects of network communications is the Open Systems Interconnection (OSI) model. It was first introduced in the late 1970s. An open system is a set of protocols that allows any two different systems to communicate. The purpose of the OSI model is to show how to facilitate communication between different systems without requiring changes to the logic of the underlying hardware and software. 2/11/2023 50 Dr. Shivashankar, E&CE, RRIT
  • 51. CONTI… 2/11/2023 51 Dr. Shivashankar, E&CE, RRIT Figure 1.26 : The OSI model
  • 52. OSI versus TCP/IP •Session and presentation aare not added to the TCP/IP protocol suite. • The application layer in the suite is usually considered to be the combination of three layers in the TCP/IP suite. •OSI model is developed by ISO (International Standard Organization), whereas TCP Model is developed by ARPANET (Advanced Research Project Agency Network). •OSI model helps us to standardize router, switch, motherboard, and other hardware, whereas TCP/IP helps us to establish a connection between different types of computers. •In OSI model, the transport layer is only connection-oriented, whereas the TCP/IP model is both connection-oriented and connectionless. 2/11/2023 52 Dr. Shivashankar, E&CE, RRIT
  • 53. CONTI… 2/11/2023 53 Dr. Shivashankar, E&CE, RRIT Figure 1.27 TCP/IP and OSI model
  • 54. QUIZES 1. A computer Networks permits sharing of a. Resources b. Information c. Both a & b d. None of the above 2. The first operational computer network in the world was ____in US. a. ARPANET b. ERNET c. SKYNET d. DARPANET 3. _____is the technology that connects the machine and people within small area a. WAN b. LAN c. MAN d. None of the above 4. ____ is network that covers geographical larger area, such as districts and cities a. WAN b. LAN c. MAN d. None of the above 2/11/2023 54 Dr. Shivashankar, E&CE, RRIT
  • 55. CONTI… 5. _____ is network that connects sites connects in diverse locations a. WAN b. LAN c. MAN d. None of the above 6. Check sum is used for a. Error correction b. Error detection c. Both a&b d. None of these 7. Network of networks known as a. Intranet b. Internet c. LAN d. WAN 8. The commonly used protocol for web page transfer is_______ a. HTML b. WML c. WTTP d. HTTP 2/11/2023 55 Dr. Shivashankar, E&CE, RRIT