Computer Network (CEC408) Ms. Neelam Joshi Asst. Professor Dept. of Computer Engineering, FCRIT Neelam.joshi151907@gmail.com Cell. +91 7987130543 1 Module 1: Introduction to Networking 1.1 Basic concepts and fundamentals of data communication and computer network, Basic Networking Devices: Repeater, Hub, Switch, Router, NIC, Modem, Network Topologies, Type of networks (LAN, WAN, MAN) 1.2 Layers of OSI and TCP/IP Design Issues of Layers. Guided and Unguided media. Switching– Circuit-switched Networks – Packet Switching, Message switching Text Books : • • • 1. Computer Networks, A.S.Tanenbaum,4th edition, 2018 Pearson Education. 2. Data Communications and Networking, B.A. Forouzan, 5th edition, 2017,TMH. 3. A Top-Down Approach Featuring the Internet, James F. Kurose, Keith W. Ross, Computer Networking, 6th edition, 2017, AddisonWesley. Reference Books : 1. An Engineering Approach to Computer Networking, S. Keshav,1 Edition, 2007, Pearson 2. Computer Networks: Principles, Technologies & Protocols for Network Design, Natalia Olifer & Victor Olifer, 1 Edition, 2006 Wiley India. 3. Computer Networks: A Systems Approach, Larry L.Peterson, Bruce S.Davie, , Second Edition, 2011, The Morgan Kaufmann Series in Networking 2 Introduction of Data Communication & Computer Network Transferring data over a transmission medium between two or more devices, systems, or places is known as data communication. A network is a group of connected communicating devices such as computers and printers. An internet is two or more networks that can communicate with each other. 3 Introduction of Computer Network Introduction based on: A computer network is a group of devices connected with each other through a transmission medium such as wires, cables etc. These devices can be computers, printers, scanners, Fax machines etc. The purpose of having computer network is to send and receive data stored in other devices over the network. 4 Network Criteria Performance Reliability Security 5 Fundamental Characteristics of effective DC Delivery Accuracy timeliness Jitter 6 Components of Data Communication/CN Message Sender Receiver Transmis sion media Protocols 7 Components of a data communication system Key Elements of Protocols Syntax Semantics Timing 9 Uses of Computer Networks 10 Business Applications:A network with two clients and one server. The client-server model involves requests and replies. Mrs. Neelam Joshi • • • • • • Payroll calculations Budgeting Sales analysis Financial forecasting Managing employee database Maintenance of stocks, etc. 2/19/2025 Uses of Computer Networks 11 Banking Marketing Education Healthcare Mrs. Neelam Joshi 2/19/2025 Uses of Computer Networks 12 Military Government Communication Engineering Design Mrs. Neelam Joshi 2/19/2025 Transmission Modes The way in which data is transmitted from one device to another device is known as transmission mode. The transmission mode is also known as the communication mode. Each communication channel has a direction associated with it, and transmission media provide the direction. Therefore, the transmission mode is also known as a directional mode. The transmission mode is defined in the physical layer. The Transmission mode is divided into three categories 13 Mrs. Neelam Joshi 2/19/2025 Data Flow/Transmission Mode 14 Data Flow/Transmission Mode 1. Simplex- A simplex communication channel only sends information in one direction. For example, a radio station usually sends signals to the audience but never receives signals from them, thus a radio station is a simplex channel. 2. Half Duplex- In half duplex mode, data can be transmitted in both directions on a signal carrier except not at the same time. At a certain point, it is actually a simplex channel whose transmission direction can be switched. 3. Full Duplex- A full duplex communication channel is able to transmit data in both directions on a signal carrier at the same time. It is constructed as a pair of simplex links that allows bidirectional simultaneous transmission. 15 Transmission Technology of Computer Network Point to Point Broadcasting Multicasting 16 Classification / Types of Network Personal Area Network Local Area Network Metropolitan Area Network Wide Area Network Internet 17 Classification / Types of Network 18 Classification / Types of Network(PAN) 2. 1. 19 Classification / Types of Network(LAN) 1. 20 2. Classification / Types of Network(MAN) 1. 2. 21 Classification / Types of Network(WAN) 22 Comparison between LAN, MAN and WAN What is Network Topology Introduction based on: Network topology is the arrangement of the elements of a communication network. Network topology can be used to define or describe the arrangement of various types of telecommunication networks, including command and control radio networks, industrial fieldbusses and computer networks. 19 Network Topology Topology defines the structure of the network of how all the components are interconnected to each other. 25 Mrs. Neelam Joshi 2/19/2025 BUS Topology Bus topology is a network type in which every computer and network device is connected to single cable. When it has exactly two endpoints, then it is called Linear Bus topology. 20 Bus Topology: Stations are connected through a single backbone cable. Used in 802.3 (Ethernet) and 802.4 standard networks. The most common access method of the bus topologies CSMA (Carrier Sense Multiple Access):CSMA/CD,CSMA/CA Advantages: Low-cost cable and simple to implement A failure in one node will not have any effect on other nodes. Disadvantages: 27 Extensive cabling, Difficult troubleshooting and Reconfiguration Mrs. Neelam Joshi 2/19/2025 RING Topology It is called ring topology because it forms a ring as each computer is connected to another computer, with the last one connected to the first. Exactly two neighbors for each device 21 Ring Topology: Similar to bus topology, but with connected ends. The node that receives the message from the previous computer will retransmit to the next node. The data flows in one direction, i.e., it is unidirectional. Access method of the ring topology is token passing. Advantages: Low-cost and simple to implement. Network Management is easy. Disadvantages: Difficult troubleshooting and Reconfiguration. Communication delay is directly proportional to the number of nodes. 29 Mrs. Neelam Joshi 2/19/2025 Star Topology In this type of topology all the computer connected via single hub through cable. 22 Star Topology Coaxial cable or RJ-45 cables are used Every node is connected to the central hub, or a switch. Most popular topology in network implementation. Advantages: Efficient troubleshooting Network Management is easy and easily expandable Limited failure. Cost effective Disadvantages: A Central point of failure. Cable requirement is more. 31 Mrs. Neelam Joshi 2/19/2025 TREE Topology 25 Tree Topology Combines the characteristics of bus topology and star topology All the computers are connected with each other in hierarchical fashion. There is only one path exists between two nodes for the data transmission. Thus, it forms a parent-child hierarchy. Advantages: Support for broadband transmission Easily expandable and manageable. The breakdown in one station does not affect the entire network. Error detection and error correction are very easy. Disadvantages: Difficult troubleshooting and reconfiguration High cost due to backbone devices. 33 Mrs. Neelam Joshi 2/19/2025 MESH Topology It is a point-to-point connection to other nodes or devices. All the network nodes are connected to each other. 23 Types of Mesh Topology Partial Mesh Topology : In this topology some of the systems are connected in the same fashion as mesh topology but some devices are only connected to two or three devices. Full Mesh Topology : Each and every nodes or devices are connected to each other. 24 Mesh Topology Computers are interconnected with each other through various redundant connections. Used for WAN implementations where communication failures are a critical concern. Mesh topology is mainly used for wireless networks. Mesh topology can be formed by using the formula: Number of cables = (n*(n-1))/2; Advantages: Reliable, fast communication and Easier Reconfiguration Disadvantages: 36 Costly Mrs. Neelam Joshi 2/19/2025 HYBRID Topology It is two different types of topologies which is a mixture of two or more topologies. For example if in an office in one department ring topology is used and in another star topology is used, connecting these topologies 26 Hybrid Topology : Combination of various different topologies. Advantages: Reliable, Scalable, Flexible and Effective Disadvantages: Complex design and Costly infrastructure 38 Mrs. Neelam Joshi 2/19/2025 Network Hardware/Devices Networking hardware, also known as network equipment or computer networking devices, are electronic devices which are required for communication and interaction between devices on a computer network 37 Network Hardware/Devices Network devices are physical devices that allow hardware on a computer network to communicate and interact with each other. Network devices like hubs, repeaters, bridges, switches, routers, gateways, and brouters help manage and direct data flow in a network. They ensure efficient communication between connected devices by controlling data transfer, boosting signals, and linking different networks. Each device serves a specific role, from simple data forwarding to complex routing between networks. 40 Network Devices 41 Network Hardware Components NIC(Network interface card): NIC helps the computer to communicate with another device. The network interface card contains the hardware addresses, the data-link layer protocol use this address to identify the system on the network so that it transfers the data to the correct destination. There are two types of NIC: wireless NIC and wired NIC. Wireless NIC: All the modern laptops use the wireless NIC. In Wireless NIC, a connection is made using the antenna that employs the radio wave technology. Wired NIC: Cables use the wired NIC to transfer the data over the medium. 42 Mrs. Neelam Joshi 2/19/2025 Network Hardware Components Hub: Hub is a central device that splits the network connection into multiple devices. When computer requests for information from a computer, it sends the request to the Hub. Hub distributes this request to all the interconnected computers. Switches : Switch is a networking device that groups all the devices over the network to transfer the data to another device. Switch is better than Hub as it does not broadcast the message over the network, i.e. it sends the message to the device for which it belongs to. Therefore, we can say that switch sends the message directly from source to the destination. 43 Mrs. Neelam Joshi 2/19/2025 Network Hardware Components Cables and connectors : Cable is a transmission media that transmits the communication signal Router : Connects the LAN to the internet. The router is mainly used to connect the distinct networks or connect the internet to multiple computers. Modems: A modem acts as converter or translator. It allows digital data or information to be transmitted over analog lines of transmission such as a telephone line. 44 Mrs. Neelam Joshi 2/19/2025 Cable Types 45 Mrs. Neelam Joshi Specification CableType 10BaseT UnshieldedTwisted Pair 10Base2 Thin Coaxial 10Base5 Thick Coaxial 100BaseT UnshieldedTwisted Pair 100BaseFX Fiber Optic 100BaseBX Single mode Fiber 100BaseSX Multimode Fiber 1000BaseT UnshieldedTwisted Pair 1000BaseFX Fiber Optic 1000BaseBX Single mode Fiber 1000BaseSX Multimode Fiber 2/19/2025 Network Hardware 40 Connection-Oriented Versus Connectionless Service Connection-oriented service involves the creation and termination of the connection for sending the data between two or more devices. Connectionless service does not require establishing any connection and termination process for transferring the data over a network. 47 Mrs. Neelam Joshi 2/19/2025 Parameter Related System Virtual path Authentication Data Packets Path Bandwidth Requirement Data Reliability Congestion Examples 48 Connection-Oriented Service Connection Less Service It is designed and developed based It is service based on the postal on the telephone system. system. It creates a virtual path between the Not sender and the receiver. It requires authentication before transmitting the It does not require authentication. data packets to the receiver. All data packets are received in the same order as Data packets are received in any those sent by the sender. order. It requires a higher bandwidth to transfer the data It requires low bandwidth to transfer packets. the data packets. It is a more reliable connection service because it It is not a reliable connection service guarantees data packets transfer from one end to the other end with a connection (ack). There is no congestion as it provides an end-to- There may be congestion due to not end connection between sender and receiver. providing an end-to-end connection. Transmission Control Protocol (TCP) User Datagram Protocol (UDP), Internet Protocol (IP), Internet Control Message Protocol (ICMP) Mrs. Neelam Joshi 2/19/2025 Design Issues for the layers Addressing Direction of transmission Error control Avoid loss of sequencing Ability of receiving long messages Multiplex and Demux 50 Design Issues for the Layers Reliability: Damaged or inverted bits can be identified (error detection) and corrected (error correction) Scalability Addressing Error Control Flow Control Resource Allocation Multiplexing Routing Security 50 Mrs. Neelam Joshi 2/19/2025 Layered Architecture CS -602 SELO: 1,5,8,9 Reference Models: OSI& TCP/IP 52 OSI (Open System Interconnection) Reference Model: It describes how information from a software application in one computer moves through a physical medium to the software application in another computer. OSI consists of seven layers, and each layer performs a particular network function. Was developed by the International Organization for Standardization (ISO) in Each layer is self-contained, so that task assigned to each layer can be performed independently. OSI model divides the whole task into seven smaller and manageable tasks. Each layer is assigned a particular task. Mrs. Neelam Joshi 2/19/2025 OSI Reference Model 53 Mrs. Neelam Joshi 2/19/2025 OSI Reference Model 54 The seven layers can be thought of as belonging to three subgroups. Layers I, 2, and 3 - physical, data link, and network - are the network support layers; they deal with the physical aspects of moving data from one device to another (such as electrical specifications, physical connections, physical addressing, and transport timing and reliability). Layers 5, 6, and 7 - session, presentation, and application - can be thought of as the user support layers; they allow interoperability among unrelated software systems. Layer 4- the transport layer, links the two subgroups and ensures that what the lower layers have transmitted is in a form that the upper layers can use. The upper OSI layers are almost always implemented in software; lower layers are a combination of hardware and software, except for the physical layer, which is mostly hardware. Mrs. Neelam Joshi 2/19/2025 An exchange using the OSI model Name of unit exchang ed APDU PPDU SPDU Segments Packet Frame Bit 55 Mrs. Neelam Joshi 2/19/2025 Functions of OSI Layers 56 Mrs. Neelam Joshi 2/19/2025 Functions of OSI Layers: Physical Layer 57 It is responsible for movements of individual bits from one hop (node) to the next. Representation of bits: Bits are encoded into signals--electrical or optical. Data transmission rate and mode of transmission: Number of bits sent per second; simplex, half duplex or full duplex. Line configuration: point-to-point or multipoint. Physical topology Synchronization of bits: sender and receiver must be synchronized at the bit level Mrs. Neelam Joshi 2/19/2025 Functions of OSI Layers: Data Link Layer Responsible for the error-free transfer of data frames Framing: Divides the stream of bits received from the network layer into manageable data units. Physical addressing: Destination MAC address . Flow control: This is used to avoid overwhelming the receiver if it is slower than the sender. Error control: Trailer added to the end of the frame to detect errors. Access control: More devices are connected to the same communication channel, determine which device has control over the link at a given time. 58 Mrs. Neelam Joshi 2/19/2025 Functions of OSI Layers: Data Link Layer 59 Hop to hop delivery Mrs. Neelam Joshi 2/19/2025 Functions of OSI Layers: Data Link Layer Hop to hop delivery 60 60 Mrs. Neelam Joshi 2/19/2025 Functions of OSI Layers: Network Layer 61 Responsible for the source-to-destination delivery of a packet, possibly across multiple networks (links). Internetworking: It provides a logical connection between different devices. Logical Addressing: Adds the source and destination address to the header of the frame. Addressing is used to identify the device on the internet. Routing: Determines the best optimal path out of the multiple paths from source to the destination Mrs. Neelam Joshi 2/19/2025 Functions of OSI Layers: Transport Layer ⦁ Responsible for the delivery of a message from one process to another. Service-point addressing: Port Address / Socket. Segmentation and reassembly: A message is divided into transmittable segments by providing sequence numbers. Connection control: Connection oriented and connectionless. Flow control: Flow control at this layer is performed end to end. Error control: performed process-to process rather than across a single link. 62 Mrs. Neelam Joshi 2/19/2025 Process to process delivery 63 Mrs. Neelam Joshi 2/19/2025 Functions of OSI Layers: Session Layer Responsible for dialog control and synchronization It establishes, maintains, and synchronizes the interaction among communicating systems. 64 Dialog control: Creates a dialog between two processes Synchronization: Adds some checkpoints when transmitting the data in a sequence. If some error occurs in the middle of the transmission of data, then the transmission will take place again from the checkpoint.This process is known as Synchronization and recovery. Mrs. Neelam Joshi 2/19/2025 Functions of OSI Layers: Presentation Layer Responsible for translation, compression, and encryption It is concerned with the syntax and semantics of the information exchanged between two systems. Translation: The sender changes the information from its sender-dependent format into a common encoded format and vise versa at receiver side. Compression: Data compression reduces the number of bits contained in the information. Encryption: To ensure privacy. 65 Mrs. Neelam Joshi 2/19/2025 Functions of OSI Layers: Application Layer Responsible for providing services to the user. Network Virtual Terminal: Log on to a remote host. File transfer, access, and management (FTAM): Access, retrieve and manage file from a remote system / host. Mail services: This application provides the basis for e-mail forwarding and storage. Directory services: This application provides distributed database sources and access for global information about various objects and services. 66 Mrs. Neelam Joshi 2/19/2025 Reference Models: TCP/IP TCP/IP Protocol Suite: TCP/IP protocol suite was developed prior to the OSI model and the layers in TCP/IP do not exactly match those in the OSI model. The original TCP/IP protocol suite was defined as having four layers: host-to-network, internet, transport, and application. When TCP/IP is compared to OSI, we can say that the TCP/IP protocol suite is made of five layers: physical, data link, network, transport, and application. 67 Mrs. Neelam Joshi 2/19/2025 Reference Models: OSI and TCP/IP (Network Access Layer) 68 Mrs. Neelam Joshi 2/19/2025 Protocol Hierarchy CS -602 SELO: 1,5,8,9 Information Flow in layered architecture 70 71 Mrs. Neelam Joshi 2/19/2025 TCP/IP Protocol Suite 72 Mrs. Neelam Joshi 2/19/2025 Functions of TCP/IP Layer 73 Mrs. Neelam Joshi 2/19/2025 TCP/IP Protocol Suite TCP/IP is a hierarchical protocol (each upper-level protocol is supported by one or more lower-level Protocols) made up of interactive modules, each of which provides a specific functionality. Contain relatively independent protocols that can be mixed and matched depending on the needs of the system. Physical and Data Link Layers (Network Access Layer) At the physical and data link layers, TCP/IP does not define any specific protocol. It supports all the standard and proprietary protocols. 74 Mrs. Neelam Joshi 2/19/2025 TCP/IP Protocol Suite Network Layer Supports the Internetworking Protocol (IP), in turn, uses four supporting protocols: ARP, RARP, ICMP, and IGMP. The IP is the transmission mechanism used by the TCP/IP protocols. It is an unreliable and connectionless protocol-a best-effort delivery service (that means no error checking or tracking). IP assumes the unreliability of the underlying layers and does its best to get a transmission through to its destination, but with no guarantees. IP transports data in packets called datagrams, each of which is transported separately along different routes and can arrive out of sequence or be duplicated. 75 Mrs. Neelam Joshi 2/19/2025 Network Layer TCP/IP Protocol Suite Address Resolution Protocol (ARP): used to find the physical address of the node when its Internet address is known. Reverse Address Resolution Protocol (RARP): Allows a host to discover its Internet address when it knows only its physical address. It is used when a computer is connected to a network for the first time or when a diskless computer is booted. Internet Control Message Protocol (ICMP): used by hosts and gateways to send error messages to the sender. Internet Group Message Protocol (IGMP): Used to facilitate the transmission of a message to a group of recipients. 76 Mrs. Neelam Joshi simultaneous 2/19/2025 TCP/IP Protocol Suite Transport Layer : IP delivers a packet from one physical device to another (host-to-host). UDP and TCP are transport level protocols responsible for delivery of a message from a process (running program) to another process. Stream Control Transmission Protocol (SCTP): provides support for newer applications such as voice over the Internet. It combines the best features of UDP and TCP. User Datagram Protocol (UDP): It is simpler and unreliable. It adds only port addresses, checksum error control, and length information to the data from the upper layer. 77 Mrs. Neelam Joshi 2/19/2025 TCP/IP Protocol Suite Transmission Control Protocol (TCP): provides full transport-layer services to applications. TCP is a reliable stream (connection-oriented) transport protocol. At the sending end of each transmission,TCP divides a stream of data into smaller units called segments. Each segment includes a sequence number for reordering after receipt, together with an acknowledgment number for the segments received. At the receiving end,TCP collects each datagram as it comes in and reorders the transmission based on sequence numbers. Application Layer: It is equivalent to the combined session, presentation, and application layers in the OSI model. Many protocols are defined at this layer: SMTP, FTP, HTTP, DNS, SNMP,TELNET etc. 78 Mrs. Neelam Joshi 2/19/2025 Transmit Data Using Network Layers TCP/IP Five Layer Software Model Terminology Reference Relationship of layers and addresses in TCP/IP 81 Mrs. Neelam Joshi 2/19/2025 Transmission Media The purpose of the physical layer is to Various physical media can be used for transport bits from one the actual transmission. machine to another. Transmission media is a communication channel that carries the information from the sender to the receiver. 27 Transmission Media Types 28 Guided Transmission Media 1. Transmission capacity depends critically on the medium 2.Medium is point-to-point or multipoint (e.g. LAN). Examples are coaxial cable, twisted pair, and optical fiber. 29 Unguided Transmission Media 1. It provides a means for transmitting electro-magnetic signals but do not guide them. 2. Example wireless transmission. 30 Twisted Pair Although the bandwidth characteristics of magnetic tape are excellent, the delay characteristics are poor. 31 Coaxial Cable It has better shielding and greater bandwidth than unshielded twisted pairs, so it can span longer distances at higher speeds is commonly used for analog transmission and cable television. CS -602 SELO: 1,5,8,9 32 Coaxial Cable 33 Fiber Optics Cable 34 Unguided Media RadioTransmission Radio frequency is easier to generate and because of its large wavelength it can penetrate through walls and structures alike. Radio waves can have wavelength from 1 mm – 100,000 km and have frequency ranging from 3 Hz (Extremely Low Frequency) to 300 GHz (Extremely High Frequency) 35 Microwave Transmission Electromagnetic waves above 100 MHz tend to travel in a straight line and signals over them can be sent by beaming those waves towards one particular station. Because Microwaves travels in straight lines, both sender and receiver must be aligned to be strictly in line-of-sight. 36 Infrared signals Infrared signals can be used for short-range communication in a closed area using line-of-sight propagation. Used in short-range communications such as those between a PC and a peripheral device. It can also be used for indoor LAN, remote controls, security systems and thermal imaging cameras which detect people in the dark. They are relatively directional, cheap, and easy to build but have a major drawback: they do not pass through solid objects. Advantage: Against eavesdropping is better that means no one sitting at next room or your neighbor can not interfere/control your devices. 16 Switching Switching is the process of transferring data packets from one device to another in a network, or from one network to another, using specific devices called switches. Switching takes place at the Data Link layer of the OSI Model. This means that after the generation of data packets in the Physical Layer, switching is the immediate next process in data communication. 94 Switching 95 Types Of Switching There are three types of switching methods: Message Switching Circuit Switching Packet Switching Datagram Packet Switching Virtual Circuit Packet Switching 96 Types Of Switching Message Switching: This is an older switching technique that has become obsolete. In message switching technique, the entire data block/message is forwarded across the entire network thus, making it highly inefficient. Circuit Switching: In this type of switching, a connection is established between the source and destination beforehand. This connection receives the complete bandwidth of the network until the data is transferred completely. Packet Switching: This technique requires the data to be broken down into smaller components, data frames, or packets. These data frames are then transferred to their destinations according to the available resources in the network at a particular time. This switching type is used in modern computers and even the Internet. Datagram Packet Switching: In Datagram Packet switching, each data frame is taken as an individual entity and thus, they are processed separately. Here, no connection is established before data transmission occurs. Virtual-Circuit Packet Switching: In Virtual-Circuit Packet switching, a logical connection between the source and destination is made before 97 transmitting any data. These logical connections are called virtual circuits. Types Of Switching Message Switching 98 Types Of Switching 99 66