Cse 3003: Computer Networks: Dr. Sanket Mishra Scope
Cse 3003: Computer Networks: Dr. Sanket Mishra Scope
• Ethernet
• WiFi
• NFC
• Bluetooth
• LoRA
• ZigBee
• Zwave
• SigFox
INTERNET IS EVERYWHERE : FUTURE OR
PRESENT
https://www.starlink.com/technology
ENVISIONING THE FUTURE OF NETWORKS
FIBER TO
HOME :
FTTH
• Computer network and its history,
progress and application
Module I • Internet, Network architecture,
• Networking devices. OSI Model
INTRODUCTION • TCP/IP Protocol stack, Networking in
different OS.
• Guided media, Unguided media
• Network Topologies
Module – II
PHYSICAL • Analog and digital communication.
Encoding mechanisms
LAYER
• Packet Switching, Circuit Switching.
• Framing, HDLC, PPP
Independently understand basic computer network technology and Data Communications System and its components.
CO1
Enumerate the layers of the OSI model and TCP/IP. Explain the function(s) of each layer.
CO2
Identify the different types of network devices and their functions within a network
CO4
Familiarize with the basic protocols of computer networks, and how they can be used and implement
CO6
DEFINING NETWORKS
• The internet hugely connects all WANs and it can have connection to LANs and
Home networks. Internet uses TCP/IP protocol suite and uses IP as its
addressing protocol.
NETWORKING DEVICES
• Repeater
• Hub
• Bridge
• Switch
• Router
• Gateway
Repeater
• Like a hub, a switch also works at the layer of LAN (Local Area Network)
but you can say that a switch is more intelligent than a hub.
• Each switch has a dynamic table (called the MAC address table) that
maps MAC addresses to ports.
Switch
Router
• A router is a physical or virtual application that passes information between two or more
packet switched computer networks.
• A router inspects a given data packet's destination Internet Protocol address (IP address),
calculates the best way for it to reach its destination and then forwards it accordingly.
• Hundreds of routers might forward a single packet as it moves from one network to the
next on the way to its final destination.
• A gateway, as the name suggests, is a passage to connect two networks together that may
work upon different networking models.
• They basically work as the messenger agents that take data from one system, interpret it,
and transfer it to another system.
• Gateways are also called protocol converters and can operate at any network layer.
• For basic Internet connections at home, the gateway is the Internet Service Provider that
gives you access to the entire Internet.
• Note: A gateway always has to be a router, but a router does not have to be a gateway.
Modem
Bus topology is a network type in which every computer and network device is
connected to single cable. When it has exactly two endpoints, then it is called
Linear Bus topology.
All the computers are connected to a single hub through a cable. This hub is
the central node and all others nodes are connected to the central node.
Features of Star Topology
• Every node has its own dedicated connection to the hub.
• Hub acts as a repeater for data flow.
• Can be used with twisted pair, Optical Fibre or coaxial cable.
• In Dual Ring Topology, two ring networks are formed, and data
flow is in opposite direction in them. Also, if one ring fails, the
second ring can act as a backup, to keep the network up.
Uni-directional Bi-directional
Mesh Topology
It is a point-to-point connection to other nodes or devices. All the network nodes are
connected to each other. Mesh has n(n-1)/2 physical channels to link n devices.
There are two techniques to transmit data over the Mesh topology, they are :
• Routing
In routing, the nodes have a routing logic, as per the network requirements. Like
routing logic to direct the data to reach the destination using the shortest distance.
We can even have routing logic, to re-configure the failed nodes.
• Flooding
In flooding, the same data is transmitted to all the network nodes, hence no routing
logic is required. The network is robust, and the its very unlikely to lose the data. But
it leads to unwanted load over the network.
Mesh Topology
• The modern Internet is not based on OSI, but on the simpler TCP/IP
model. However, the OSI 7-layer model is still widely used, as it helps
visualize and communicate how networks operate, and helps isolate and
troubleshoot networking problems.
PHYSICAL LAYER
• The physical layer is where data moves across network interfaces as digital
signals. Additionally, this is where the transmitting and receiving of
network communication occurs.
• Starting with the Application Layer the message moves down the OSI
model, and it eventually reaches the Physical Layer for transmission.
• When the message is received by the physical layer, the message will then
move up the OSI layers until it reaches the final application layer.
DATALINK LAYER
• Electrical signals received (or transmitted) to the physical layer are linked
and translated to digital logic in the data-Link layer.
• Computer devices may be networked at the Data-Link layer, but only as a
Local Area Network (LAN). Connecting a LAN to another LAN occurs at
Layer 3.
• The session layer starts, manages, and terminates sessions between end-user
application processes. Sessions are considered the persistent connection
between devices. A session is application-focused; sessions are not concerned
with layers 1-4. Instead, the session layer controls dialog between two
networked devices. It is considered to facilitate host-to-host communication.
Sessions dialog may be controlled through synchronization checkpoints, and
through management of communication modes. There are two modes of
communication permitted at Layer 5:
• Half-Duplex: Communication travels in both directions between sender and
receiver, but only one device may transmit a message at a time.
• Full-Duplex: Communication travels in both directions between sender and
receiver, and messages may be sent simultaneously in either direction.
PRESENTATION LAYER
• The presentation layer is primarily responsible for presenting data so that the
recipient will understand the data. Data formatting and encoding protocols apply
at Layer 6 to ensure data is legible and presented properly in the application
receiving it. Data compression is also a function of Layer 6. If necessary, data may
be compressed to improve data throughput over network communication.
• Some common Layer 6 protocols are ASCII, JPEG, GIF, MPEG, and PNG.
• Another main function of the presentation layer is the encryption and
decryption of data sent across a network. Most encryption communication
protocols straddle multiple layers of the OSI model, but the actual encryption
function is Layer 6.
• Two of the most common secure communication protocols are:
• Transport Layer Security (TLS)
• Secure Socket Layer (SSL)
APPLICATION LAYER Protocol Port Number(s) Description
Translates internet names to their globally
registered IP addresses. For example,
Domain Name System (DNS) 53
“google.com” is registered in global DNS
as IP address 8.8.8.8.
• Mail me queries at :