SlideShare a Scribd company logo
1 of 39
COMPUTER NETWORKS
UNIT I
1.1
1.2
UNIT- I INTRODUCTION & NETWORK PERFORMANCE 9
Building a Network- Applications- Requirements– Classes of Applications-Requirements-Cost Effective Resource Sharing- Support for common
Services-Topology-Network Architecture-Layering and Protocol–TCP/IP Architecture–OSI Model–Performance – Bandwidth and Latency- Delay
x Bandwidth Product- High Speed Networks- Switching- Datagrams- Virtual Circuit Switching- Source Routing.
UNIT-II LINK LAYER SERVICES & MEDIA ACCESS CONTROL 9
Link layer Services – Framing- Bit Oriented: HDLC - Byte Oriented: PPP – Error Detection –Two Dimensional Parity-Internet Checksum
Algorithm- Cyclic Redundancy Check- Flow control: Stop and Wait and Sliding-Window- Media access control –Wired LANs: Ethernet (802.3) –
Wireless LANs : 802.11 – Bluetooth.
UNIT-III INTERNETWORKING & ROUTING 9
Basic Internetworking –IP- What Is an Internetwork? - Service Model - Global Addresses - Datagram Forwarding in IP - Subnetting and Classless
Addressing- ARP- DHCP-ICMP- Routing – RIP- OSPF- Global Routing-Interdomain Routing(BGP)- IPV6-Multicast Routing- DVMRP.
UNIT-IV TRANSPORT LAYER 9
Overview of Transport layer – UDP – Reliable byte stream (TCP) –End-to-End Issues-Segment Format- Connection Establishment and
Termination –TCP Congestion control – Additive Increase
/Multiplicative Decrease- Slow Start- Fast Retransmit and Fast Recovery-Congestion avoidance - DEC bit-RED.
UNIT-V APPLICATION LAYER 9
Traditional Applications- Electronic Mail –SMTP -IMAP-MIME-WWW-HTTP –Infrastructure Services-DNS - SNMP-FTP.
TEXT BOOKS
Larry L. Peterson, Bruce S. Davie, “Computer Networks: A Systems Approach”, Fifth Edition,Morgan Kaufmann
Publishers, 2011.
Behrouz A. Forouzan, “Data communication and Networking”, Fourth Edition, Tata McGraw
– Hill, 2011.
REFERENCES
William Stallings, Data and Computer Communications,TenthEdition,PearsonEducation,2013.
Nader. F. Mir, “Computer and Communication Networks”, Pearson Prentice Hall Publishers, 2010.
DATA COMMUNICATIONS:
1. Telecommunication means communication at a distance
2. Data refers to information presented in whatever form is agreed upon by the parties creating
and using the data.
3. Data communications are the exchange of data between two devices via some form of
transmission medium such as a wire cable.
Figure 1.1 Components of a data communication system
1.5
Components of data communication:
Message: The information (data) to be communicated.
Popular : text, numbers, pictures, audio, and video.
□Sender: The sender is the device that sends the data message.
◦ It can be a computer, workstation, telephone handset, video camera, etc.
□Receiver: The receiver is the device that receives the message.
◦ It can be a computer, workstation, telephone handset, television, etc.
□Transmission medium: The physical path by which a message travels from sender to
receiver.
◦ Some examples : twisted-pair wire, coaxial cable, fiber-optic cable, and radio waves.
□Protocol: A protocol is a set of rules that govern data communications.
◦ It represents an agreement between the communicating devices.
Dept of CSE, VEC 1.6
Data Flow:
□ Communication between two devices can be
◦ Simplex
◦ Half-duplex
◦ Full-duplex
1.9
Dept of CSE, VEC
Figure 1.2 Data flow (simplex, half-duplex, and full-duplex)
1.1
0
Dept of CSE, VEC
Simplex mode:
The communication is unidirectional, as on a one-way street.
□ Only one of the two devices on a link can transmit; the other can only receive
□Examples : Keyboards and traditional monitors
□The keyboard can only introduce input; The monitor can only accept output.
□The simplex mode can use the entire capacity of the channel to send data in one direction.
1.1
1
Dept of CSE, VEC
Half-duplex mode:
□Each station can both transmit and receive, but not at the same time
□When one device is sending, the other can only receive, and vice versa
□The entire capacity of a channel is taken over by whichever of the two devices is
transmitting at the time
□Examples : Walkie-talkies and radios
1.1
2
Dept of CSE, VEC
Full duplex mode:
□ Both stations can transmit and receive simultaneously
□ It is like a two-way street with traffic flowing in both directions at the same time.
□ The link capacity can be shared in two ways:
◦ Either the link must contain two physically separate transmission paths, one for sending and the other for
receiving
◦ Or the capacity of the channel is divided between signals traveling in both directions.
□ Example: The telephone network
◦ When two people are communicating by a telephone line, both can talk and listen at the same time.
1.1
3
Dept of CSE, VEC
14
Effectiveness of Data Communications
□ Depends on 3 fundamental characteristics:
◦ Delivery :
● The system must deliver data to the correct destination
● Data must be received by the intended device or user and only by that device or user
◦ Accuracy:
● The system must deliver the data accurately.
● Data that have been altered in transmission and left uncorrected are
unusable
◦ Timeliness:
● The system must deliver data in a timely manner
● Data delivered. late are useless
● Delivering the data in the same order that they are produced and without significant delay (real time
transmission)
1-2 NETWORKS
A network
•A set of nodes (often referred to as devices) connected by
communication links.
•A node can be a computer, printer, or any other device capable of sending and/or receiving
data generated by the devices in the network.
•A link can be a cable, air, optical fiber, or any medium which can transport a signal
carrying information.
Topics
:
▪ Network Criteria
▪ Physical Structures
▪ Categories ofDN
ept e
oft
Cw
SE,o
VE
r
Cks
1.1
5
Network Criteria
□ Performance
◦ Depends on Network Elements
◦ Measured in terms of Delay and Throughput
□ Reliability
◦ Failure rate of network components
◦ Measured in terms of availability/robustness
□ Security
◦ Data protection against corruption/loss of data due to:
● Errors
Dept of CSE, VEC 6
1.1
Performance
□ Performance can be measured by the following metrics:
◦ Transit time: Amount of time required for a message to travel
from one device to another
◦ Response time: The elapsed time between an inquiry and a response
□ The performance of a network depends on the factors such as:
◦ number of users
◦ type of transmission medium
◦ capabilities of the connected hardware
◦ efficiency of the software.
17
Dept of CSE, VEC
Performance Contd.,
□Performance is often evaluated by two networking metrics:
◦ Throughput
◦ Delay.
□We often need more throughput and less delay.
□Two criteria are often contradictory.
□If we try to send more data to the network, we may
increase throughput
□But we increase the delay because of traffic congestion
in the network Dept of CSE, VEC 18
Reliability
□ Network reliability is measured by
◦ the frequency of failure,
◦ the time it takes a link to recover from a failure
◦ the network's robustness in a catastrophe.
19
Dept of CSE, VEC
Security
□Network security issues include
◦ protecting data from unauthorized access
◦ protecting data from damage and development
◦ implementing policies and procedures for recovery from breaches and data
losses
Dept of CSE, VEC 20
Physical Structures
□ Type of Connection
◦ Point to Point - single transmitter and receiver
◦ Multipoint - multiple recipients of single transmission
□ Physical Topology
◦ Connection of devices
◦ Type of transmission –
● Unicast,
● Mulitcast,
● Broadcast
1.2
1
Dept of CSE, VEC
Figure 1.3 Types of connections: point-to-point and multipoint
Dept of CSE, VEC 2
1.2
Point-to-point:
□ A point-to-point connection provides a dedicated link between two devices
□ The entire capacity of the link is reserved for transmission between those two devices
□ Most point-to-point connections use an actual length of wire or cable to connect the two ends, but
other options, such as microwave or satellite links, are also possible
□ Example :
change television channels by infrared remote control, between the remote control and the television's
control system.
23
Dept of CSE, VEC
Multipoint :
□ A multipoint also called multidrop connection
□ More than two specific devices share a single link
□ The capacity of the channel is shared, either spatially or temporally
□ If several devices can use the link simultaneously, it is a spatially shared
connection
□ If users must take turns, it is a timeshared connection.
Dept of CSE, VEC 24
Physical Topology
□ The geometric representation of the relationship of all the links and
linking devices (nodes) to one another
□ Two or more devices connect to a link; Two or more links form a
topology
25
Dept of CSE, VEC
Figure 1.4 Categories of topology
1.2
Dept of CSE, VEC 6
Figure 1.5 A fully connected mesh topology (five devices)
1.2
7
Dept of CSE, VEC
Mesh Topology
Dept of CSE, VEC 28
□ In a mesh topology, every device has a dedicated point-to-point link to every other
device.
□ The term dedicated means that the link carries traffic only between
the two devices it connects
□ To find the number of physical links in a fully connected mesh network with n nodes, we
first consider that each node must be connected to every other node.
□ So we need n(n - 1) physical links.
□ However, if each physical link allows communication in both directions (duplex mode),
we can divide the number of links by 2
□ In other words, we can say that in a mesh topology, we need n(n-1)/2 duplex mode links
Advantages of mesh topology
□ Dedicated links guarantees that each connection can carry its own data load, thus
eliminating the traffic problems that can occur when links must be shared by
multiple devices
□ Mesh topology is robust. If one link becomes unusable, it does not incapacitate the
entire system
□ Privacy or security – as message travels along a dedicated line, only the intended
recipient sees it
□ Point-to-point links make fault identification and
fault isolation easy
29
Dept of CSE, VEC
Disadvantages of mesh topology
Dept of CSE, VEC 30
□ Every device must be connected to every other device so installation and reconnection are difficult
□ The sheer bulk of the wiring can be greater than the available space (in walls, ceilings, or floors) can
accommodate
□ The hardware required to connect each link (I/O ports and cable) can be prohibitively expensive
□ For these reasons a mesh topology is usually implemented in a limited fashion, for example, as a
backbone connecting the main computers of a hybrid network that can include several other
topologies
□ Example: Connection of telephone regional offices in which each regional office needs to be
connected to every other regional office.
Figure 1.6 A star topology connecting four stations
1.3
1
Dept of CSE, VEC
Star Topology
□ Each device has a dedicated point-to-point link only to a
central controller, usually called a hub.
□ The devices are not directly linked to one another.
□ Unlike a mesh topology, a star topology does not allow
direct traffic between devices.
□ The controller acts as an exchange:
◦ If one device wants to send data to another,
● it sends the data to the controller,
● which then relays the data to the other connected device
Dept of CSE, VEC 32
Advantages of star topology
□ Less expensive than a mesh topology: each device needs only one link and
one I/O port to connect it to any number of others.
□ Far less cabling needs to be housed, only one connection: between that
device and the hub
□ Robustness: If one link fails, only that link is affected. All other links
remain active. This factor also lends itself to easy fault identification and
isolation
33
Dept of CSE, VEC
Disadvantages of star topology
□Dependency of the whole topology on one single point, the hub. If the hub
goes down, the whole system is dead
□Although a star requires far less cable than a mesh, each node must be
linked to a central hub. For this reason, often more cabling is required in a
star than in some other topologies (such as ring or bus).
Example:
□The star topologyis used in local-area
networks
(LANs)
Dept of CSE, VEC 34
Figure 1.7 A bus topology connecting three stations
1.3
5
Dept of CSE, VEC
Bus Topology
□It follows a multipoint connection
□One long cable acts as a backbone to link all the devices in a network
□Nodes are connected to the bus cable by drop lines and taps.
□A drop line is a connection running between the device and the main cable.
□A tap is a connector that either splices into the main cable or punctures the sheathing
of a cable to create a contact with the metallic core.
Dept of CSE, VEC 36
□ Ease of installation
□ Bus uses less cabling than mesh or star topologies, as backbone cable can
be laid along the most efficient path, then connected to the nodes by drop
lines of various lengths
Advantages of bus topology
37
Dept of CSE, VEC
Disadvantages of bus topology
□ Difficult reconnection and fault isolation
□Signal reflection at the taps can cause degradation in quality. This can be
controlled by limiting the number and spacing of devices connected to a given
length of cable
□A fault or break in the bus cable stops all transmission, even between
devices on the same side of the problem
Example:
□ Ethernet LANs can use a bus topology
Dept of CSE, VEC 38
Figure 1.8 A ring topology connecting six stations
1.3
9
Dept of CSE, VEC
Ring Topology
Dept of CSE, VEC 40
□ In a ring topology, each device has a dedicated point-to-point connection
with only the two devices on either side of it.
□ A signal is passed in one direction along the ring, until it
reaches its destination from device to device.
□ Each device in the ring incorporates a repeater.
□ When a device receives a signal intended for another device, its repeater
regenerates the bits and passes them along
Advantages of Ring Topology
□ Easy to install and reconfigure: Each device is linked to only its
immediate neighbor. To add or delete a device requires changing only two
connections
□ Fault isolation is simplified: In a ring, a signal is circulating at all times. If
one device does not receive a signal within a specified period, it can issue
an alarm. The alarm alerts the network operator to the problem and its
location.
41
Dept of CSE, VEC
Disadvantages of Ring Topology
□ Unidirectional traffic: In a simple ring, a break in the ring (such as a
disabled station) can disable the entire network.
□This weakness can be solved by using a dual ring or a switch capable of
closing off the break.
Example:
□Ring topology was prevalent when IBM introduced its local-area network
Token Ring. Today, the need for higher-speed LANs has made this topology
less popular.
Dept of CSE, VEC 42
Figure 1.9 A hybrid topology: a star backbone with three bus networks
1.4
3
Dept of CSE, VEC
Hybrid Topology
Dept of CSE, VEC 44
□ A network can be hybrid.
Example:
□ a main star topologywith
each several stations in a bus topology
branch connecting
Categories of Networks
□ Local Area Networks (LANs)
◦ Short distances
◦ Designed to provide local interconnectivity
□ Wide Area Networks (WANs)
◦ Long distances
◦ Provide connectivity over large areas
□ Metropolitan Area Networks (MANs)
◦ Provide connectivity over areas such as a city, a campus 1.4
5
Dept of CSE, VEC
Local Area Network (LAN)
□A local area network (LAN) is usually privately owned and links the devices in a single
office, building, or campus
□Depending on the needs of an organization and the type of technology used, a LAN can be
as simple as two PCs and a printer in someone's home office; or it can extend throughout a
company and include audio and video peripherals.
□Currently, LAN size is limited to a few kilometers.
Dept of CSE, VEC 46
Figure 1.10 An isolated LAN connecting 12 computers to a hub in a closet
1.4
7
Dept of CSE, VEC
□ LANs are designed to allow resources to be shared between personal computers or
workstations.
□ The resources to be shared can include hardware (e.g., a printer), software (e.g., an application
program), or data.
□ A common example of a LAN, found in many business environments, links a workgroup of
task-related computers, for example, engineering workstations or accounting PCs.
□ One of the computers may be given a large capacity disk drive and may become a server to
clients.
□ Software can be stored on this central server and used as needed by the whole group.
Dept of CSE, VEC 48
Local Area Network (LAN)
□ In addition to size, LANs are distinguished from other types of networks by their
transmission media and topology.
□ In general, a given LAN will use only one type of transmission medium.
□ The most common LAN topologies are bus, ring, and star.
□ Early LANs had data rates in the 4 to 16 megabits per second (Mbps) range.
□ Today, however, speeds are normally 100 or 1000 Mbps.
□ Wireless LANs are the newest evolution in LAN technology.
Local Area Network (LAN)
49
Dept of CSE, VEC
Metropolitan Area Network
□A metropolitan area network (MAN) is a network with a size between a LAN and a WAN.
□It normally covers the area inside a town or a city.
□It is designed for customers who need a high-speed connectivity, normally to the Internet, and have
endpoints spread over a city or part of city.
□A good example of a MAN is the part of the telephone company network
that can provide a high-speed DSL line to the customer.
□ Another example is the cable TV network that originally was designed for cable TV, but
today can also be used for high-speed data connection to the Internet
Dept of CSE, VEC 50
51
MAN
Designed to extend over an entire city – May be a single network such as cable
television network – may be a means of connecting a number of LANS into a
larger network
Metropolitan Area Network (MAN)
hom
e
cable
headend
cable distribution
network
(simplified)
A Cable TV Network is an example of a MAN
Typically 500 to 5,000 homes
52
53
Cable Network Architecture: Overview
hom
e
cable
headend
cable distribution
network
(simplified)
Cable Network Architecture: Overview
hom
e
cable
headend
cable
distribution
network
server(s
54
□ A wide area network (WAN) provides long-distance transmission of data, image, audio, and video
information over large geographic areas that may comprise a country, a continent, or even the whole
world.
□ A WAN can be as complex as the backbones that connect the Internet (Switched WAN) or as simple as
a dial-up line that connects a home computer to the Internet (a point-to-point WAN )
□ The switched WAN connects the end systems, which usually comprise a router (internetworking
connecting device) that connects to another LAN or WAN.
□ The point-to-point WAN is normally a line leased from a telephone or cable TV provider that
connects a home computer or a small LAN to an Internet service provider (lSP).
□ This type of WAN is often used to provide Internet access.
Wide Area Network (WAN)
55
Dept of CSE, VEC
WAN
Provides long distance transmission of data, voice, image and video
information over large geographic areas – a country/continent/world
56
Figure 1.11 WANs: a switched WAN and a point-to-point WAN
1.5
7
Dept of CSE, VEC
Figure 1.12 A heterogeneous network made of four WANs and two LANs
1.5
8
Dept of CSE, VEC
□ An early example of a switched WAN is X.25, a network designed to provide
connectivity between end users
□ A good example of a switched WAN is the
Asynchronous
network with
Transfer Mode (ATM) network, which is a fixed-size data
unit packets called cells
□ Another example of WANs is the wireless WAN
Wide Area Network (WAN)
59
Dept of CSE, VEC
nners and
Uses of Computer Networks
□Communicating using email, video, instant messaging and
other methods
□Sharing devices such as printers, sca photocopiers
□Sharing files
□Sharing software and operating programs on remote systems
□Allowing network users to easily access and maintain
information
1.6
8
Dept of CSE, VEC
Applications (1)
end systems (hosts):
run application programs
e.g. Web, email
at “edge of network”
client/server model
client host requests, receives service from
always-on server
e.g. Web browser/server; email client/server
Client/server model is applicable in an
intranet.
61
Client/server model is applicable in an
intranet
62
Applications (2)
□ Peer-Peer model:
◦ No fixed clients or servers
◦ Each host can act as both client & server
□ Examples: Napster, Gnutella, KaZaA
63
Applications (3)
□ WWW
□ Instant Messaging (Internet chat, text messaging on cellular phones)
□ Peer-to-Peer
□ Internet Phone
□ Video-on-demand
□ Distributed Games
□ Remote Login (Telnet)
□ File Transfer
1-4 PROTOCOLS
A protocol is
•synonymous with rule.
•It consists of a set
of rules that govern data
communications.
•It determines
•what is communicated,
•how it is communicated and
•when it is communicated.
•The key elements of a protocol are syntax, semantics and timing
1.6
4
Dept of CSE, VEC
Elements of a Protocol
□ Syntax
◦ Structure or format of the data
◦ Indicates how to read the bits - field delineation
□ Semantics
◦ Interprets the meaning of the bits
◦ Knows which fields define what action
□ Timing
◦ When data should be sent and what
◦ Speed at which data should be sent or speed at which it is being received. 1.6
5
Dept of CSE, VEC
Protocols and Standards
□Standards
◦ Essential in creating and maintaining an open and competitive market for equipment
manufacturers and in guaranteeing national and international interoperability of data
and telecommunications technology and processes
◦ De facto: Standards that have not been approved by an organised body but have been
adopted as standards through widespread use
◦ De jure: legislated by an officially recognised body
66
67
Protocols and Standards
□ Standards Organisations
◦ International organisation for Standardisation (ISO)
◦ International Telecommunication Union –Telecommunication Standards Sector
(ITU-T)
◦ American National Standards Institute (ANSI)
◦ Institute of Electrical and Electronics Engineers (IEEE)
◦ Electronic Industries Assoctiation (EIA)
Protocols and Standards
□ Regulatory Agencies
◦ Federal Communication Commission (FCC)
□ Internet Standards
◦ Internet Draft
◦ Request for Comment (RFC)
68
Protocol Layering
□ In data communication and networking, a protocol defines the rules that both the
sender and receiver and all intermediate devices need to follow to be able to
communicate effectively.
□ When communication is simple, we may need only one simple protocol
□ When the communication is complex, we may need to divide the task between
different layers, in which case we need a protocol at each layer or protocol
layering.
69
Dept of CSE, VEC
□ In the first scenario, communication is so simple that it can occur in only one layer.
Assume Maria and Ann are neighbors with a lot of common ideas. Communication
between Maria and Ann takes place in one layer, face to face, in the same language
Dept of CSE, VEC 70
Protocol Layering
A single-layer protocol
□ In the second scenario, we assume that Ann is offered a higher-level position in her
company, but needs to move to another branch located in a city very far from Maria.
□ The two friends still want to continue their communication and exchange ideas
because they have come up with an innovative project to start a new business when
they both retire.
□ They decide to continue their conversation using regular mail through the post
office. However, they do not want their ideas to be revealed by other people if the
letters are intercepted. They agree on an encryption/decryption technique.
Protocol Layering
71
Dept of CSE, VEC
Protocol Layering
Dept of CSE, VEC 72
A three-layer protocol
□ Protocol layering enables us to divide a complex task into several smaller and simpler tasks
□ One of the advantages of protocol layering is that it allows us to separate the services from the
implementation
□ A layer needs to be able to receive a set of services from the lower layer and to give the services to the
upper layer
□ Protocol layering in the Internet, is that communication does not always use only two end systems
□ There are intermediate systems that need only some layers, but not all layers
□ If we did not use protocol layering, we would have to make each intermediate system as complex as the
end systems, which makes the whole system more expensive
Protocol Layering
73
Dept of CSE, VEC
Principles of Protocol Layering
First Principle
□The first principle dictates that if we want bidirectional communication, we need to make each layer so
that it is able to perform two opposite tasks, one in each direction
Second Principle
□The second principle that we need to follow in protocol layering is that the two objects under each layer
at both sites should be identical
Dept of CSE, VEC 74
Logical Connections
□Layer-to-layer communication
□Logical (imaginary) connection at each layer through which they can send the object created from that
layer
Principles of Protocol Layering
75
Dept of CSE, VEC
76
Overview

More Related Content

What's hot

transport layer
transport layer transport layer
transport layer usman19
 
Computer networks unit i
Computer networks    unit iComputer networks    unit i
Computer networks unit iJAIGANESH SEKAR
 
Network Fundamentals: Ch4 - Transport Layer
Network Fundamentals: Ch4 - Transport LayerNetwork Fundamentals: Ch4 - Transport Layer
Network Fundamentals: Ch4 - Transport LayerAbdelkhalik Mosa
 
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSComputer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSDr. SELVAGANESAN S
 
Computer Network - Network Layer
Computer Network - Network LayerComputer Network - Network Layer
Computer Network - Network LayerManoj Kumar
 
Computer network switches & their structures
Computer network switches & their structuresComputer network switches & their structures
Computer network switches & their structuresSweta Kumari Barnwal
 
Transport layer services (cn)
Transport layer services (cn)Transport layer services (cn)
Transport layer services (cn)Jay Limbachiya
 
Computer Network Fundamentals
Computer Network FundamentalsComputer Network Fundamentals
Computer Network FundamentalsN.Jagadish Kumar
 
CS8591 Computer Networks - Unit III
CS8591 Computer Networks - Unit IIICS8591 Computer Networks - Unit III
CS8591 Computer Networks - Unit IIIpkaviya
 
The Data Link Layer
The Data Link LayerThe Data Link Layer
The Data Link Layeradil raja
 
INTRODUCTION TO NETWORK LAYER
INTRODUCTION TO NETWORK LAYER INTRODUCTION TO NETWORK LAYER
INTRODUCTION TO NETWORK LAYER Pramudya Maulana
 

What's hot (20)

transport layer
transport layer transport layer
transport layer
 
Unit 6 : Application Layer
Unit 6 : Application LayerUnit 6 : Application Layer
Unit 6 : Application Layer
 
Computer networks unit i
Computer networks    unit iComputer networks    unit i
Computer networks unit i
 
Network Fundamentals: Ch4 - Transport Layer
Network Fundamentals: Ch4 - Transport LayerNetwork Fundamentals: Ch4 - Transport Layer
Network Fundamentals: Ch4 - Transport Layer
 
Unit 5 : Transport Layer
Unit 5 : Transport LayerUnit 5 : Transport Layer
Unit 5 : Transport Layer
 
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSComputer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
 
Computer Network - Network Layer
Computer Network - Network LayerComputer Network - Network Layer
Computer Network - Network Layer
 
Transport layer
Transport layer Transport layer
Transport layer
 
Cs8591 Computer Networks
Cs8591 Computer NetworksCs8591 Computer Networks
Cs8591 Computer Networks
 
Transport layer
Transport layerTransport layer
Transport layer
 
Cs8591 Computer Networks
Cs8591 Computer NetworksCs8591 Computer Networks
Cs8591 Computer Networks
 
Computer network switches & their structures
Computer network switches & their structuresComputer network switches & their structures
Computer network switches & their structures
 
Transport layer services (cn)
Transport layer services (cn)Transport layer services (cn)
Transport layer services (cn)
 
Computer Network Fundamentals
Computer Network FundamentalsComputer Network Fundamentals
Computer Network Fundamentals
 
CS8591 Computer Networks - Unit III
CS8591 Computer Networks - Unit IIICS8591 Computer Networks - Unit III
CS8591 Computer Networks - Unit III
 
Transport Layer
Transport LayerTransport Layer
Transport Layer
 
Network layer tanenbaum
Network layer tanenbaumNetwork layer tanenbaum
Network layer tanenbaum
 
TCP/ IP
TCP/ IP TCP/ IP
TCP/ IP
 
The Data Link Layer
The Data Link LayerThe Data Link Layer
The Data Link Layer
 
INTRODUCTION TO NETWORK LAYER
INTRODUCTION TO NETWORK LAYER INTRODUCTION TO NETWORK LAYER
INTRODUCTION TO NETWORK LAYER
 

Similar to Unit 1

INTRODUCTION TO PHYSICAL LAYER
INTRODUCTION TO PHYSICAL LAYERINTRODUCTION TO PHYSICAL LAYER
INTRODUCTION TO PHYSICAL LAYERAPARNA P
 
Computer Networks Unit 1 Introduction and Physical Layer
Computer Networks Unit 1 Introduction and Physical Layer Computer Networks Unit 1 Introduction and Physical Layer
Computer Networks Unit 1 Introduction and Physical Layer Dr. SELVAGANESAN S
 
Unit1-INTRODUCTION AND PHYSICAL LAYER.pptx
Unit1-INTRODUCTION AND PHYSICAL LAYER.pptxUnit1-INTRODUCTION AND PHYSICAL LAYER.pptx
Unit1-INTRODUCTION AND PHYSICAL LAYER.pptxLAVANYAsrietacin
 
Networking notes
Networking notesNetworking notes
Networking notes0718928964
 
Data Communication VTU Unit 1 chapter 1
Data Communication VTU Unit 1 chapter 1Data Communication VTU Unit 1 chapter 1
Data Communication VTU Unit 1 chapter 1Rajesh I S
 
Unit_1.pdf computer networks and computer topology
Unit_1.pdf computer networks and computer topologyUnit_1.pdf computer networks and computer topology
Unit_1.pdf computer networks and computer topology22i261
 
Dc lec-02 (networks)
Dc lec-02 (networks)Dc lec-02 (networks)
Dc lec-02 (networks)diaryinc
 
1-Lect_1.pptxLecture 5 array in PHP.pptx
1-Lect_1.pptxLecture 5 array in PHP.pptx1-Lect_1.pptxLecture 5 array in PHP.pptx
1-Lect_1.pptxLecture 5 array in PHP.pptxZahouAmel1
 
Data communications and Networking
Data communications and Networking Data communications and Networking
Data communications and Networking awais qarni
 
data communication and networking
data communication and networkingdata communication and networking
data communication and networkingprashanna13
 
Class Note
Class NoteClass Note
Class NoteAK IJ
 

Similar to Unit 1 (20)

INTRODUCTION TO PHYSICAL LAYER
INTRODUCTION TO PHYSICAL LAYERINTRODUCTION TO PHYSICAL LAYER
INTRODUCTION TO PHYSICAL LAYER
 
Physical Layer.pdf
Physical Layer.pdfPhysical Layer.pdf
Physical Layer.pdf
 
#1 Physical Layer.pdf
#1 Physical Layer.pdf#1 Physical Layer.pdf
#1 Physical Layer.pdf
 
Computer Networks Unit 1 Introduction and Physical Layer
Computer Networks Unit 1 Introduction and Physical Layer Computer Networks Unit 1 Introduction and Physical Layer
Computer Networks Unit 1 Introduction and Physical Layer
 
Unit1-INTRODUCTION AND PHYSICAL LAYER.pptx
Unit1-INTRODUCTION AND PHYSICAL LAYER.pptxUnit1-INTRODUCTION AND PHYSICAL LAYER.pptx
Unit1-INTRODUCTION AND PHYSICAL LAYER.pptx
 
Networking notes
Networking notesNetworking notes
Networking notes
 
Data Communication VTU Unit 1 chapter 1
Data Communication VTU Unit 1 chapter 1Data Communication VTU Unit 1 chapter 1
Data Communication VTU Unit 1 chapter 1
 
Unit_1.pdf computer networks and computer topology
Unit_1.pdf computer networks and computer topologyUnit_1.pdf computer networks and computer topology
Unit_1.pdf computer networks and computer topology
 
ch01.ppt
ch01.pptch01.ppt
ch01.ppt
 
Data communication q and a
Data communication q and aData communication q and a
Data communication q and a
 
Dc lec-02 (networks)
Dc lec-02 (networks)Dc lec-02 (networks)
Dc lec-02 (networks)
 
Dc1 t1
Dc1 t1Dc1 t1
Dc1 t1
 
Ch 1 network
Ch 1  networkCh 1  network
Ch 1 network
 
Computer network
Computer networkComputer network
Computer network
 
Computer network
Computer networkComputer network
Computer network
 
1-Lect_1.pptxLecture 5 array in PHP.pptx
1-Lect_1.pptxLecture 5 array in PHP.pptx1-Lect_1.pptxLecture 5 array in PHP.pptx
1-Lect_1.pptxLecture 5 array in PHP.pptx
 
Data communications and Networking
Data communications and Networking Data communications and Networking
Data communications and Networking
 
data communication and networking
data communication and networkingdata communication and networking
data communication and networking
 
Networks
Networks   Networks
Networks
 
Class Note
Class NoteClass Note
Class Note
 

Recently uploaded

Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxAmanpreet Kaur
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxAmita Gupta
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxdhanalakshmis0310
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxcallscotland1987
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 

Recently uploaded (20)

Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 

Unit 1

  • 1. COMPUTER NETWORKS UNIT I 1.1 1.2 UNIT- I INTRODUCTION & NETWORK PERFORMANCE 9 Building a Network- Applications- Requirements– Classes of Applications-Requirements-Cost Effective Resource Sharing- Support for common Services-Topology-Network Architecture-Layering and Protocol–TCP/IP Architecture–OSI Model–Performance – Bandwidth and Latency- Delay x Bandwidth Product- High Speed Networks- Switching- Datagrams- Virtual Circuit Switching- Source Routing. UNIT-II LINK LAYER SERVICES & MEDIA ACCESS CONTROL 9 Link layer Services – Framing- Bit Oriented: HDLC - Byte Oriented: PPP – Error Detection –Two Dimensional Parity-Internet Checksum Algorithm- Cyclic Redundancy Check- Flow control: Stop and Wait and Sliding-Window- Media access control –Wired LANs: Ethernet (802.3) – Wireless LANs : 802.11 – Bluetooth. UNIT-III INTERNETWORKING & ROUTING 9 Basic Internetworking –IP- What Is an Internetwork? - Service Model - Global Addresses - Datagram Forwarding in IP - Subnetting and Classless Addressing- ARP- DHCP-ICMP- Routing – RIP- OSPF- Global Routing-Interdomain Routing(BGP)- IPV6-Multicast Routing- DVMRP. UNIT-IV TRANSPORT LAYER 9 Overview of Transport layer – UDP – Reliable byte stream (TCP) –End-to-End Issues-Segment Format- Connection Establishment and Termination –TCP Congestion control – Additive Increase /Multiplicative Decrease- Slow Start- Fast Retransmit and Fast Recovery-Congestion avoidance - DEC bit-RED. UNIT-V APPLICATION LAYER 9 Traditional Applications- Electronic Mail –SMTP -IMAP-MIME-WWW-HTTP –Infrastructure Services-DNS - SNMP-FTP.
  • 2. TEXT BOOKS Larry L. Peterson, Bruce S. Davie, “Computer Networks: A Systems Approach”, Fifth Edition,Morgan Kaufmann Publishers, 2011. Behrouz A. Forouzan, “Data communication and Networking”, Fourth Edition, Tata McGraw – Hill, 2011. REFERENCES William Stallings, Data and Computer Communications,TenthEdition,PearsonEducation,2013. Nader. F. Mir, “Computer and Communication Networks”, Pearson Prentice Hall Publishers, 2010. DATA COMMUNICATIONS: 1. Telecommunication means communication at a distance 2. Data refers to information presented in whatever form is agreed upon by the parties creating and using the data. 3. Data communications are the exchange of data between two devices via some form of transmission medium such as a wire cable.
  • 3. Figure 1.1 Components of a data communication system 1.5 Components of data communication: Message: The information (data) to be communicated. Popular : text, numbers, pictures, audio, and video. □Sender: The sender is the device that sends the data message. ◦ It can be a computer, workstation, telephone handset, video camera, etc. □Receiver: The receiver is the device that receives the message. ◦ It can be a computer, workstation, telephone handset, television, etc. □Transmission medium: The physical path by which a message travels from sender to receiver. ◦ Some examples : twisted-pair wire, coaxial cable, fiber-optic cable, and radio waves. □Protocol: A protocol is a set of rules that govern data communications. ◦ It represents an agreement between the communicating devices. Dept of CSE, VEC 1.6
  • 4.
  • 5.
  • 6. Data Flow: □ Communication between two devices can be ◦ Simplex ◦ Half-duplex ◦ Full-duplex 1.9 Dept of CSE, VEC Figure 1.2 Data flow (simplex, half-duplex, and full-duplex) 1.1 0 Dept of CSE, VEC
  • 7. Simplex mode: The communication is unidirectional, as on a one-way street. □ Only one of the two devices on a link can transmit; the other can only receive □Examples : Keyboards and traditional monitors □The keyboard can only introduce input; The monitor can only accept output. □The simplex mode can use the entire capacity of the channel to send data in one direction. 1.1 1 Dept of CSE, VEC Half-duplex mode: □Each station can both transmit and receive, but not at the same time □When one device is sending, the other can only receive, and vice versa □The entire capacity of a channel is taken over by whichever of the two devices is transmitting at the time □Examples : Walkie-talkies and radios 1.1 2 Dept of CSE, VEC
  • 8. Full duplex mode: □ Both stations can transmit and receive simultaneously □ It is like a two-way street with traffic flowing in both directions at the same time. □ The link capacity can be shared in two ways: ◦ Either the link must contain two physically separate transmission paths, one for sending and the other for receiving ◦ Or the capacity of the channel is divided between signals traveling in both directions. □ Example: The telephone network ◦ When two people are communicating by a telephone line, both can talk and listen at the same time. 1.1 3 Dept of CSE, VEC 14 Effectiveness of Data Communications □ Depends on 3 fundamental characteristics: ◦ Delivery : ● The system must deliver data to the correct destination ● Data must be received by the intended device or user and only by that device or user ◦ Accuracy: ● The system must deliver the data accurately. ● Data that have been altered in transmission and left uncorrected are unusable ◦ Timeliness: ● The system must deliver data in a timely manner ● Data delivered. late are useless ● Delivering the data in the same order that they are produced and without significant delay (real time transmission)
  • 9. 1-2 NETWORKS A network •A set of nodes (often referred to as devices) connected by communication links. •A node can be a computer, printer, or any other device capable of sending and/or receiving data generated by the devices in the network. •A link can be a cable, air, optical fiber, or any medium which can transport a signal carrying information. Topics : ▪ Network Criteria ▪ Physical Structures ▪ Categories ofDN ept e oft Cw SE,o VE r Cks 1.1 5 Network Criteria □ Performance ◦ Depends on Network Elements ◦ Measured in terms of Delay and Throughput □ Reliability ◦ Failure rate of network components ◦ Measured in terms of availability/robustness □ Security ◦ Data protection against corruption/loss of data due to: ● Errors Dept of CSE, VEC 6 1.1
  • 10. Performance □ Performance can be measured by the following metrics: ◦ Transit time: Amount of time required for a message to travel from one device to another ◦ Response time: The elapsed time between an inquiry and a response □ The performance of a network depends on the factors such as: ◦ number of users ◦ type of transmission medium ◦ capabilities of the connected hardware ◦ efficiency of the software. 17 Dept of CSE, VEC Performance Contd., □Performance is often evaluated by two networking metrics: ◦ Throughput ◦ Delay. □We often need more throughput and less delay. □Two criteria are often contradictory. □If we try to send more data to the network, we may increase throughput □But we increase the delay because of traffic congestion in the network Dept of CSE, VEC 18
  • 11. Reliability □ Network reliability is measured by ◦ the frequency of failure, ◦ the time it takes a link to recover from a failure ◦ the network's robustness in a catastrophe. 19 Dept of CSE, VEC Security □Network security issues include ◦ protecting data from unauthorized access ◦ protecting data from damage and development ◦ implementing policies and procedures for recovery from breaches and data losses Dept of CSE, VEC 20
  • 12. Physical Structures □ Type of Connection ◦ Point to Point - single transmitter and receiver ◦ Multipoint - multiple recipients of single transmission □ Physical Topology ◦ Connection of devices ◦ Type of transmission – ● Unicast, ● Mulitcast, ● Broadcast 1.2 1 Dept of CSE, VEC Figure 1.3 Types of connections: point-to-point and multipoint Dept of CSE, VEC 2 1.2
  • 13. Point-to-point: □ A point-to-point connection provides a dedicated link between two devices □ The entire capacity of the link is reserved for transmission between those two devices □ Most point-to-point connections use an actual length of wire or cable to connect the two ends, but other options, such as microwave or satellite links, are also possible □ Example : change television channels by infrared remote control, between the remote control and the television's control system. 23 Dept of CSE, VEC Multipoint : □ A multipoint also called multidrop connection □ More than two specific devices share a single link □ The capacity of the channel is shared, either spatially or temporally □ If several devices can use the link simultaneously, it is a spatially shared connection □ If users must take turns, it is a timeshared connection. Dept of CSE, VEC 24
  • 14. Physical Topology □ The geometric representation of the relationship of all the links and linking devices (nodes) to one another □ Two or more devices connect to a link; Two or more links form a topology 25 Dept of CSE, VEC Figure 1.4 Categories of topology 1.2 Dept of CSE, VEC 6
  • 15. Figure 1.5 A fully connected mesh topology (five devices) 1.2 7 Dept of CSE, VEC Mesh Topology Dept of CSE, VEC 28 □ In a mesh topology, every device has a dedicated point-to-point link to every other device. □ The term dedicated means that the link carries traffic only between the two devices it connects □ To find the number of physical links in a fully connected mesh network with n nodes, we first consider that each node must be connected to every other node. □ So we need n(n - 1) physical links. □ However, if each physical link allows communication in both directions (duplex mode), we can divide the number of links by 2 □ In other words, we can say that in a mesh topology, we need n(n-1)/2 duplex mode links
  • 16. Advantages of mesh topology □ Dedicated links guarantees that each connection can carry its own data load, thus eliminating the traffic problems that can occur when links must be shared by multiple devices □ Mesh topology is robust. If one link becomes unusable, it does not incapacitate the entire system □ Privacy or security – as message travels along a dedicated line, only the intended recipient sees it □ Point-to-point links make fault identification and fault isolation easy 29 Dept of CSE, VEC Disadvantages of mesh topology Dept of CSE, VEC 30 □ Every device must be connected to every other device so installation and reconnection are difficult □ The sheer bulk of the wiring can be greater than the available space (in walls, ceilings, or floors) can accommodate □ The hardware required to connect each link (I/O ports and cable) can be prohibitively expensive □ For these reasons a mesh topology is usually implemented in a limited fashion, for example, as a backbone connecting the main computers of a hybrid network that can include several other topologies □ Example: Connection of telephone regional offices in which each regional office needs to be connected to every other regional office.
  • 17. Figure 1.6 A star topology connecting four stations 1.3 1 Dept of CSE, VEC Star Topology □ Each device has a dedicated point-to-point link only to a central controller, usually called a hub. □ The devices are not directly linked to one another. □ Unlike a mesh topology, a star topology does not allow direct traffic between devices. □ The controller acts as an exchange: ◦ If one device wants to send data to another, ● it sends the data to the controller, ● which then relays the data to the other connected device Dept of CSE, VEC 32
  • 18. Advantages of star topology □ Less expensive than a mesh topology: each device needs only one link and one I/O port to connect it to any number of others. □ Far less cabling needs to be housed, only one connection: between that device and the hub □ Robustness: If one link fails, only that link is affected. All other links remain active. This factor also lends itself to easy fault identification and isolation 33 Dept of CSE, VEC Disadvantages of star topology □Dependency of the whole topology on one single point, the hub. If the hub goes down, the whole system is dead □Although a star requires far less cable than a mesh, each node must be linked to a central hub. For this reason, often more cabling is required in a star than in some other topologies (such as ring or bus). Example: □The star topologyis used in local-area networks (LANs) Dept of CSE, VEC 34
  • 19. Figure 1.7 A bus topology connecting three stations 1.3 5 Dept of CSE, VEC Bus Topology □It follows a multipoint connection □One long cable acts as a backbone to link all the devices in a network □Nodes are connected to the bus cable by drop lines and taps. □A drop line is a connection running between the device and the main cable. □A tap is a connector that either splices into the main cable or punctures the sheathing of a cable to create a contact with the metallic core. Dept of CSE, VEC 36
  • 20. □ Ease of installation □ Bus uses less cabling than mesh or star topologies, as backbone cable can be laid along the most efficient path, then connected to the nodes by drop lines of various lengths Advantages of bus topology 37 Dept of CSE, VEC Disadvantages of bus topology □ Difficult reconnection and fault isolation □Signal reflection at the taps can cause degradation in quality. This can be controlled by limiting the number and spacing of devices connected to a given length of cable □A fault or break in the bus cable stops all transmission, even between devices on the same side of the problem Example: □ Ethernet LANs can use a bus topology Dept of CSE, VEC 38
  • 21. Figure 1.8 A ring topology connecting six stations 1.3 9 Dept of CSE, VEC Ring Topology Dept of CSE, VEC 40 □ In a ring topology, each device has a dedicated point-to-point connection with only the two devices on either side of it. □ A signal is passed in one direction along the ring, until it reaches its destination from device to device. □ Each device in the ring incorporates a repeater. □ When a device receives a signal intended for another device, its repeater regenerates the bits and passes them along
  • 22. Advantages of Ring Topology □ Easy to install and reconfigure: Each device is linked to only its immediate neighbor. To add or delete a device requires changing only two connections □ Fault isolation is simplified: In a ring, a signal is circulating at all times. If one device does not receive a signal within a specified period, it can issue an alarm. The alarm alerts the network operator to the problem and its location. 41 Dept of CSE, VEC Disadvantages of Ring Topology □ Unidirectional traffic: In a simple ring, a break in the ring (such as a disabled station) can disable the entire network. □This weakness can be solved by using a dual ring or a switch capable of closing off the break. Example: □Ring topology was prevalent when IBM introduced its local-area network Token Ring. Today, the need for higher-speed LANs has made this topology less popular. Dept of CSE, VEC 42
  • 23. Figure 1.9 A hybrid topology: a star backbone with three bus networks 1.4 3 Dept of CSE, VEC Hybrid Topology Dept of CSE, VEC 44 □ A network can be hybrid. Example: □ a main star topologywith each several stations in a bus topology branch connecting
  • 24. Categories of Networks □ Local Area Networks (LANs) ◦ Short distances ◦ Designed to provide local interconnectivity □ Wide Area Networks (WANs) ◦ Long distances ◦ Provide connectivity over large areas □ Metropolitan Area Networks (MANs) ◦ Provide connectivity over areas such as a city, a campus 1.4 5 Dept of CSE, VEC Local Area Network (LAN) □A local area network (LAN) is usually privately owned and links the devices in a single office, building, or campus □Depending on the needs of an organization and the type of technology used, a LAN can be as simple as two PCs and a printer in someone's home office; or it can extend throughout a company and include audio and video peripherals. □Currently, LAN size is limited to a few kilometers. Dept of CSE, VEC 46
  • 25. Figure 1.10 An isolated LAN connecting 12 computers to a hub in a closet 1.4 7 Dept of CSE, VEC □ LANs are designed to allow resources to be shared between personal computers or workstations. □ The resources to be shared can include hardware (e.g., a printer), software (e.g., an application program), or data. □ A common example of a LAN, found in many business environments, links a workgroup of task-related computers, for example, engineering workstations or accounting PCs. □ One of the computers may be given a large capacity disk drive and may become a server to clients. □ Software can be stored on this central server and used as needed by the whole group. Dept of CSE, VEC 48 Local Area Network (LAN)
  • 26. □ In addition to size, LANs are distinguished from other types of networks by their transmission media and topology. □ In general, a given LAN will use only one type of transmission medium. □ The most common LAN topologies are bus, ring, and star. □ Early LANs had data rates in the 4 to 16 megabits per second (Mbps) range. □ Today, however, speeds are normally 100 or 1000 Mbps. □ Wireless LANs are the newest evolution in LAN technology. Local Area Network (LAN) 49 Dept of CSE, VEC Metropolitan Area Network □A metropolitan area network (MAN) is a network with a size between a LAN and a WAN. □It normally covers the area inside a town or a city. □It is designed for customers who need a high-speed connectivity, normally to the Internet, and have endpoints spread over a city or part of city. □A good example of a MAN is the part of the telephone company network that can provide a high-speed DSL line to the customer. □ Another example is the cable TV network that originally was designed for cable TV, but today can also be used for high-speed data connection to the Internet Dept of CSE, VEC 50
  • 27. 51 MAN Designed to extend over an entire city – May be a single network such as cable television network – may be a means of connecting a number of LANS into a larger network Metropolitan Area Network (MAN) hom e cable headend cable distribution network (simplified) A Cable TV Network is an example of a MAN Typically 500 to 5,000 homes 52
  • 28. 53 Cable Network Architecture: Overview hom e cable headend cable distribution network (simplified) Cable Network Architecture: Overview hom e cable headend cable distribution network server(s 54
  • 29. □ A wide area network (WAN) provides long-distance transmission of data, image, audio, and video information over large geographic areas that may comprise a country, a continent, or even the whole world. □ A WAN can be as complex as the backbones that connect the Internet (Switched WAN) or as simple as a dial-up line that connects a home computer to the Internet (a point-to-point WAN ) □ The switched WAN connects the end systems, which usually comprise a router (internetworking connecting device) that connects to another LAN or WAN. □ The point-to-point WAN is normally a line leased from a telephone or cable TV provider that connects a home computer or a small LAN to an Internet service provider (lSP). □ This type of WAN is often used to provide Internet access. Wide Area Network (WAN) 55 Dept of CSE, VEC WAN Provides long distance transmission of data, voice, image and video information over large geographic areas – a country/continent/world 56
  • 30. Figure 1.11 WANs: a switched WAN and a point-to-point WAN 1.5 7 Dept of CSE, VEC Figure 1.12 A heterogeneous network made of four WANs and two LANs 1.5 8 Dept of CSE, VEC
  • 31. □ An early example of a switched WAN is X.25, a network designed to provide connectivity between end users □ A good example of a switched WAN is the Asynchronous network with Transfer Mode (ATM) network, which is a fixed-size data unit packets called cells □ Another example of WANs is the wireless WAN Wide Area Network (WAN) 59 Dept of CSE, VEC nners and Uses of Computer Networks □Communicating using email, video, instant messaging and other methods □Sharing devices such as printers, sca photocopiers □Sharing files □Sharing software and operating programs on remote systems □Allowing network users to easily access and maintain information 1.6 8 Dept of CSE, VEC
  • 32. Applications (1) end systems (hosts): run application programs e.g. Web, email at “edge of network” client/server model client host requests, receives service from always-on server e.g. Web browser/server; email client/server Client/server model is applicable in an intranet. 61 Client/server model is applicable in an intranet 62 Applications (2) □ Peer-Peer model: ◦ No fixed clients or servers ◦ Each host can act as both client & server □ Examples: Napster, Gnutella, KaZaA
  • 33. 63 Applications (3) □ WWW □ Instant Messaging (Internet chat, text messaging on cellular phones) □ Peer-to-Peer □ Internet Phone □ Video-on-demand □ Distributed Games □ Remote Login (Telnet) □ File Transfer 1-4 PROTOCOLS A protocol is •synonymous with rule. •It consists of a set of rules that govern data communications. •It determines •what is communicated, •how it is communicated and •when it is communicated. •The key elements of a protocol are syntax, semantics and timing 1.6 4 Dept of CSE, VEC
  • 34. Elements of a Protocol □ Syntax ◦ Structure or format of the data ◦ Indicates how to read the bits - field delineation □ Semantics ◦ Interprets the meaning of the bits ◦ Knows which fields define what action □ Timing ◦ When data should be sent and what ◦ Speed at which data should be sent or speed at which it is being received. 1.6 5 Dept of CSE, VEC Protocols and Standards □Standards ◦ Essential in creating and maintaining an open and competitive market for equipment manufacturers and in guaranteeing national and international interoperability of data and telecommunications technology and processes ◦ De facto: Standards that have not been approved by an organised body but have been adopted as standards through widespread use ◦ De jure: legislated by an officially recognised body 66
  • 35. 67 Protocols and Standards □ Standards Organisations ◦ International organisation for Standardisation (ISO) ◦ International Telecommunication Union –Telecommunication Standards Sector (ITU-T) ◦ American National Standards Institute (ANSI) ◦ Institute of Electrical and Electronics Engineers (IEEE) ◦ Electronic Industries Assoctiation (EIA) Protocols and Standards □ Regulatory Agencies ◦ Federal Communication Commission (FCC) □ Internet Standards ◦ Internet Draft ◦ Request for Comment (RFC) 68
  • 36. Protocol Layering □ In data communication and networking, a protocol defines the rules that both the sender and receiver and all intermediate devices need to follow to be able to communicate effectively. □ When communication is simple, we may need only one simple protocol □ When the communication is complex, we may need to divide the task between different layers, in which case we need a protocol at each layer or protocol layering. 69 Dept of CSE, VEC □ In the first scenario, communication is so simple that it can occur in only one layer. Assume Maria and Ann are neighbors with a lot of common ideas. Communication between Maria and Ann takes place in one layer, face to face, in the same language Dept of CSE, VEC 70 Protocol Layering A single-layer protocol
  • 37. □ In the second scenario, we assume that Ann is offered a higher-level position in her company, but needs to move to another branch located in a city very far from Maria. □ The two friends still want to continue their communication and exchange ideas because they have come up with an innovative project to start a new business when they both retire. □ They decide to continue their conversation using regular mail through the post office. However, they do not want their ideas to be revealed by other people if the letters are intercepted. They agree on an encryption/decryption technique. Protocol Layering 71 Dept of CSE, VEC Protocol Layering Dept of CSE, VEC 72 A three-layer protocol
  • 38. □ Protocol layering enables us to divide a complex task into several smaller and simpler tasks □ One of the advantages of protocol layering is that it allows us to separate the services from the implementation □ A layer needs to be able to receive a set of services from the lower layer and to give the services to the upper layer □ Protocol layering in the Internet, is that communication does not always use only two end systems □ There are intermediate systems that need only some layers, but not all layers □ If we did not use protocol layering, we would have to make each intermediate system as complex as the end systems, which makes the whole system more expensive Protocol Layering 73 Dept of CSE, VEC Principles of Protocol Layering First Principle □The first principle dictates that if we want bidirectional communication, we need to make each layer so that it is able to perform two opposite tasks, one in each direction Second Principle □The second principle that we need to follow in protocol layering is that the two objects under each layer at both sites should be identical Dept of CSE, VEC 74
  • 39. Logical Connections □Layer-to-layer communication □Logical (imaginary) connection at each layer through which they can send the object created from that layer Principles of Protocol Layering 75 Dept of CSE, VEC 76 Overview