Computer Networks Course Overview BCS502
Computer Networks Course Overview BCS502
1
14-08- Module I: Computer
• Module I:
• Introduction: Data Communications, Networks, Network Types, Networks Models: Protocol Layering, TCP/IP Protocol suite, The OSI model,
Introduction to Physical Layer: Transmission media, Guided Media, Unguided Media: Wireless. Switching: Packet Switching and its types.
• [Textbook: Ch. 1.1 - 1.3, 2.1 - 2.3, 7.1 – 7.3, 8.3.]
• Module II:
• Data Link Layer: Error Detection and Correction: Introduction, Block Coding, Cyclic Codes. Data link control: DLC Services: Framing, Flow Control,
Error Control, Connectionless and Connection Oriented, Data link layer protocols, High Level Data Link Control. Media Access Control: Random
Access, Controlled Access. Check Sum and Point to Point Protocol
• [Textbook: Ch. 10.1-10.4, 11.1 -11.4, 12.1 - 12.2]
• Module III:
• Network Layer: Network layer Services, Packet Switching, IPv4 Address, IPv4 Datagram, IPv6 Datagram, Introduction to Routing Algorithms,
Unicast Routing Protocols: DVR, LSR, PVR, Unicast Routing protocols: RIP, OSPF, BGP, Multicasting Routing-MOSPF
• [Textbook: Ch. 18.1, 18.2, 18.4, 22.2,20.1-20.3, 21.3.2]
• Module IV:
• Introduction to Transport Layer: Introduction, Transport-Layer Protocols: Introduction, User Datagram Protocol, Transmission Control Protocol:
services, features, segments, TCP connections, flow control, Error control, Congestion control.
• Textbook: Ch. 23.1- 23.2, 24.1-24.3.4, 24.3.6-24.3.9
• Module V:
• Introduction to Application Layer: Introduction, Client-Server Programming, Standard ClientServer Protocols: World Wide Web and HTTP, FTP,
Electronic Mail, Domain Name System (DNS), TELNET, Secure Shell (SSH)
• Textbook: Ch. 25.1-25.2, 26.1-26.6
Reference Books :
1. Larry L. Peterson and Bruce S. Davie: Computer Networks – A Systems Approach, 4th Edition, Elsevier,
2019.
2. Nader F. Mir: Computer and Communication Networks, 2nd Edition, Pearson Education, 2015.
3. William Stallings, Data and Computer Communication 10th Edition, Pearson Education, Inc., 2014.
Data communications are the exchange of data between two devices via some form of
transmission medium such as a wire cable.
[Link]:
[Link]:
[Link]:
[Link]:
A network must be able to meet a certain number of criteria. The most important of
these are performance, reliability, and security.
Type of Connection:
1
2
Physical Topology:
•Pros: Predictable
performance
• Cons: If one device fails,
the loop breaks (unless
dual ring is used)
Based on the size, geographical coverage, and ownership , two types of networks, LANs
and WANs, we define switching, which is used to connect networks to form an
internetwork (a network of networks)
A local area network (LAN) is usually privately owned and connects some hosts
in a single office, building, or campus
A LAN is normally limited in size, spanning an office, a building, or a campus; a WAN has
a wider geographical span, spanning a town, a state, a country, or even the world.
A LAN is normally privately owned by the organization that uses it. A WAN is normally
created and run by communication companies and leased by an organization that uses
it.
Examples
14-08- of WANs today: point-to-point WANs and switched WANs.
Module I: Computer 16
2025 Networks(BCS502)
Point-to-Point WAN
A point-to-point WAN is a network that connectstwo
communicating devices through a transmission media (cable or air).
1
7
Switched
WAN
A switched WAN is a network with more than two ends.
A switched WAN, is used in the backbone of global communication.
Switched WAN is a combination of several point-to-point WANs that are connected
by switches.
18
LAN WAN
LAN stands for Local Area Network. Whereas WAN stands for Wide Area
Network.
The speed of LAN is high(more than While the speed of WAN is slower than
WAN). LAN.
Whereas the propagation delay in
The propagation delay is short in LAN.
WAN is long(longer than
LAN).
There is less congestion in LAN(local While there is more congestion in
area network). WAN(Wide Area Network).
There is more fault tolerance in LAN. While there is less fault tolerance in
WAN.
While it’s design and maintenance is
LAN’s design and maintenance is easy.
difficult than 1
WAN.
9
LAN covers small area i.e. within the building. While WAN covers large geographical area.
LAN operates on the principle of While WAN works on the principle of point to
broadcasting. point.
Transmission medium used in LAN is co- Whereas WAN uses PSTN or satellite link
axial or UTP cable. as a transmission or communication
medium.
WAN has a lower data transfer rate as
LAN has a higher data transfer rate.
compared to
LAN.
WANs technologies used like Frame Relay
LANs technologies used like ethernet and
and X.25 for connectivity for longer
token.
distances.
LANs technologies is data transfer rate is WANs technologies data transfer rate
10mbps. 150mbps
LANs is cheaply compared to WAN WAN is costly compared to LAN.
In LAN Co-axial cables are generally used to
In WAN links are established using microwave
connect the
or satellite. 20
computer and other devices.
Internetwork
Circuit-Switched Network
In a circuit-switched network, a dedicated connection, called a circuit, is always
available between the two end systems; the switch can only make it active or inactive
23
1.3.3 Switching
The thick line connecting two switches is a high-capacity communication line that
can handle four voice communications at the same time;
14-08-2025 Module I: Computer Networks(BCS502) 24
Packet-Switched Network
In a computer network, the communication between the two ends is done
in blocks of data called packets.
25
Serial Number Circuit – Switching Packet – Switching
It is a connection oriented network It is a connectionless network
1
switching technique. switching technique.
4 It was initially designed for voice It was initially designed for data
transfer. transfer.
26
The individual packets of the message are
5 The entire message is received in the received out of order and so need to be
order sent by the source. reassembled at the destination.
Data is processed and transmitted at the Data is processed and transmitted, not only
9
source only. at the source but at each switching station.
27
1.3.4 The Internet
An internet (note the lowercase i) is two or more networks that can communicate with
each other. Internet composed of thousands of interconnected networks.
28
1.3.4 The Internet
Figure 1.15 shows a conceptual (not geographical) view of the Internet.
The figure shows the Internet as several backbones, provider networks, and customer networks. At the top
level, the backbones are large networks owned by some communication companies such as Sprint, Verizon
(MCI), AT&T, and NTT.
The backbone networks are connected through some complex switching systems, called peering points. At
the second level, there are smaller networks, called provider networks, that use the services of the backbones
for a fee.
The provider networks are connected to backbones and sometimes to other provider networks. The
customer networks are networks at the edge of the Internet that actually use the services provided by
the Internet. They pay fees to provider networks for receiving services.
Backbones and provider networks are also called Internet Service Providers (ISPs). The backbones are
often referred to as international ISPs; the provider networks are often referred to as national or
regional ISPs.
For example, the third layer task is to listen (in one direction) and talk (in the other
direction). The second layer needs to be able to encrypt and decrypt. The first layer
needs to send and receive mail.
Second Principle : Two objects under each layer at both sides should be identical.
For example, the object under layer 3 at both sites should be a plaintext letter. The
object under layer 2 at both sites should be a ciphertext letter. The object under layer
1 at both sites should be a piece of mail.
Step 4: Email data is broken into smaller segments. It adds sequence number and error-
checking information to maintain the reliability of the information. (This happens in
Layer 4: Transport Layer )
38
Step 5: Addressing of packets is done in order to find the best route for transfer. (This
happens in Layer 3: Network Layer )
Step 6: Data packets are encapsulated into frames, then MAC address is added for
local devices and then it checks for error using error detection. (This happens in Layer
2: Data Link Layer )
Step 7: Lastly Frames are transmitted in the form of electrical/ optical signals over a
physical network medium like ethernet cable or WiFi.
After the email reaches the receiver i.e. Sitha, the process will reverse and decrypt the
e-mail content. At last, the email will be shown on Sitha’s email client.
39
2.2 TCP/IP PROTOCOL SUITE
The term hierarchical means that each upper level protocol is supported by the
services provided by one or more lower level protocols.
The original TCP/IP protocol suite was defined as four software layers built
upon the hardware.
Today, however, TCP/IP is thought of as a five-layer model. Figure 2.4 shows both
configurations
14-08- Module I: Computer 40
2025 Networks(BCS502)
2.2.1 Layered Architecture
To show how the layers in the TCP/IP protocol suite are involved in communication between two
hosts, we assume that we want to use the suite in a small internet made up of three LANs (links), each
with a link-layer switch.
We also assume that the links are connected by one router, as shown in Figure 2.5.
• Physical layer is responsible for carrying individual bits in a frame across the link.
• We need to know that the transmission medium does not carry bits; it carries
electrical or optical signals.
• So the bits received in a frame from the data-link layer are transformed and sent
through the transmission media, but we can think that the logical unit between two
physical layers in two devices is a bit.
•
• There are several protocols that transform a bit to a signal. We discuss them in
Part II when we discuss the physical layer and the transmission media.
a frame.
14-08-2025 Module I: Computer 46
Networks(BCS502)
Network Layer
• The network layer is responsible for creating a connection between the source
computer and the destination computer. The communication at the network layer is
host-to-host.
•
• Network layer is responsible for host-to-host communication and routing the
packet through possible [Link] could have added the routing duty to the transport
layer and dropped this layer.
• The network layer in the Internet includes the main protocol, Internet Protocol
(IP), that defines the format of the packet, called a datagram at the network layer. IP
also defines the format and the structure of addresses used in this layer.
• IP is also responsible for routing a packet from its source to its destination, which is
achieved by each router forwarding the datagram to the next router in its path. IP is
a connectionless protocol that provides no flow control, no
It is responsible for giving services to the application layer: to get a message from an application
program running on the source host and deliver it to the corresponding application program on the
destination host.
The transport layer should be independent of the application layer. In addition, we will see that we have
more than one protocol in the transport layer, which means that each application program can use the
protocol that best matches its requirement.
The main protocol, Transmission Control Protocol (TCP), is a connection-oriented protocol that first
establishes a logical connection between transport layers at two hosts before transferring data.
The two application layers exchange messages between each other as though there were a bridge between the two
layers. However, we should know that the communication is done through all the layers. Communication at the
application layer is between two processes (two programs running at this layer).
To communicate, a process sends a request to the other process and receives a response. Process-to- process
communication is the duty of the application layer. The application layer in the Internet includes many predefined
protocol a user can also create a pair of processes to be run at the two hosts.
The Hypertext Transfer Protocol (HTTP) is a vehicle for accessing the World Wide Web (WWW).
The Simple Mail Transfer Protocol (SMTP) is the main protocol used in electronic mail (e-mail) service. The File
Transfer Protocol (FTP) is used for transferring files from one host to another.
The Terminal Network (TELNET) and Secure Shell (SSH) are used for accessing a site remotely.
The Simple Network Management Protocol (SNMP) is used by an administrator to manage the Internet at
global and local levels.
The Domain Name System (DNS) is used by other protocols to find the network-layer address of a computer.
The Internet Group Management Protocol (IGMP) is used to collect membership in a group.
Figure 2.9 shows the addressing at each layer. There is a relationship between the layer, the address used in that layer, and the
packet name at that layer.
Two reasons were mentioned for this decision. First, TCP/IP has more than one transport-layer
protocol.
Some of the functionalities of the session layer are available in some of the transport-layer
protocols.
Second, the application layer is not only one piece of software. Many applications can be developed at
this layer.
Guided media, which are those that provide a conduit from one device to another,
include twisted-pair cable, coaxial cable, and fiber-optic cable.
A signal traveling along any of these media is directed and contained by the
physical limits of the medium.
Twisted-pair and coaxial cable use metallic (copper) conductors that accept and
transport signals in the form of electric current. Optical fiber is a cable that accepts
and transports signals in the form of light.
Performance
One way to measure the performance of twisted- pair
cable is to compare attenuation versus frequency and
distance.
A twisted-pair cable can pass a wide range of
frequencies. However,
Figure 7.6 shows that with increasing frequency, the
attenuation, measured in decibels per kilometer
(dB/km), sharply increases with frequencies above
100 kHz.
Note that gauge is a measure of the thickness of the wire.
14-08- Module I: Computer 63
2025 Networks(BCS502)
Applications
Twisted-pair cables are used in telephone lines to provide voice and data channels.
The local loop—the line that connects subscribers to the central telephone office—
commonly consists of unshielded twisted-pair cables.
The DSL lines that are used by the telephone companies to provide high-data- rate
connections also use the high-bandwidth capability of unshielded twisted-pair cables.
Local-area networks, such as 10Base-T and 100Base-T, also use twisted-pair cables.
• Critical angle :The critical angle is the angle at which light bends so much that
it's directed along the surface of a material.
• Reflection: When light hits a surface at an angle greater than the critical
angle, it reflects back into the material instead of passing through. This is
called total internal reflection.
If the angle of incidence is equal to the critical angle, the light bends along the interface.
If the angle is greater than the critical angle, the ray reflects (makes a turn) and travels
again in the denser substance.
70
Propagation Modes
Current technology supports two modes (multimode and single mode) for propagating light along
optical channels, each requiring fiber with different physical characteristics. Multimode can be
implemented in two forms: step-index or graded-index (see Figure 7.12)
71
Step-index
• A step-index fiber has a constant refractive index in the core
and a lower refractive index in the cladding. Light rays travel in
straight lines inside the core and are reflected at the core-
cladding boundary.
Graded-index
• A graded-index fiber has a varying density, with the density
highest at the center of the core and decreasing gradually to its
lowest at the edge. This type of fiber decreases distortion through
the cable.
72
Multimode
Multimode is so named because multiple beams from a light source move through the core in different
paths. How these beams move within the cable depends on the structure of the core, as shown in
Figure 7.13.
❑Less signal attenuation. Fiber-optic transmission distance is significantly greater than that of
other guided media. A signal can run for 50 km without requiring regeneration. We need repeaters
every 5 km for coaxial or twisted-pair cable.
❑Resistance to corrosive materials: Glass is more resistant to corrosive materials than copper.
❑Light weight: Fiber-optic cables are much lighter than copper cables.
❑Greater immunity to tapping: Fiber-optic cables are more immune to tapping than
copper cables. Copper cables create antenna effects that can easily be tapped.
❑Cost: The cable and the interfaces are relatively more expensive than those of
other guided media. If the demand for bandwidth is not high, often the use of
optical fiber cannot be justified.
waves ranging in frequencies between 1 and 300 GHz are called microwaves.
The omnidirectional property has a disadvantage, too. The radio waves transmitted
by one antenna are susceptible to interference by another antenna that may send signals
using the same frequency or band.
14-08- Module I: Computer 78
2025 Networks(BCS502)
Radio waves, particularly those waves that propagate in the sky mode, can
travel long distances. This makes radio waves a good candidate for long-
distance broadcasting such as AM radio.
The radio wave band is relatively narrow, just under 1 GHz, compared
to the microwave band. When this band is divided into subbands, the
subbands are also narrow, leading to a low data rate for digital
communications.
Almost the entire band is regulated by authorities (e.g., the FCC in the
United States). Using any part of the band requires permissio7n9 from the
Omnidirectional Antenna
Radio waves use omnidirectional antennas that send out signals in all directions.
Based on the wavelength, strength, and the purpose of transmission, we can have
several types of antennas. Figure 7.19 shows an omnidirectional antenna.
Applications
The omnidirectional characteristics of radio waves make them useful for
multicasting, in which there is one sender but many receivers. AM and FM
This means that the sending and receiving antennas need to be aligned.
• Infrared waves, with frequencies from 300 GHz to 400 THz (wavelengths from 1 mm
to 770 nm), can be used for short-range communication. Infrared waves, having
high frequencies, cannot penetrate walls.
• When we use our infrared remote control, we do not interfere with the use of the
remote by our neighbors. However, this same characteristic makes infrared
signals useless for long-range communication.
• Infrared signals defined by IrDA transmit through line of sight; the IrDA
port on the keyboard needs to point to the PC for transmission to occur.
87
Routing
Table
88
Delay
89
90
91
92
93
94
95
96
Thank you