0% found this document useful (0 votes)
135 views

Cse 3003: Computer Networks: Dr. Sanket Mishra Scope

This document outlines the course plan for CSE 3003: Computer Networks. The course covers topics such as network architecture, protocols, physical and data link layers, IP addressing, routing, and transport layer protocols. It will help students understand basic computer network technology and components. The course outcomes include explaining the OSI model layers, analyzing packet formats, identifying network devices, understanding subnetting and routing, and familiarizing with common computer network protocols.

Uploaded by

POTNURU RAM SAI
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
135 views

Cse 3003: Computer Networks: Dr. Sanket Mishra Scope

This document outlines the course plan for CSE 3003: Computer Networks. The course covers topics such as network architecture, protocols, physical and data link layers, IP addressing, routing, and transport layer protocols. It will help students understand basic computer network technology and components. The course outcomes include explaining the OSI model layers, analyzing packet formats, identifying network devices, understanding subnetting and routing, and familiarizing with common computer network protocols.

Uploaded by

POTNURU RAM SAI
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 56

CSE 3003 : COMPUTER NETWORKS

Dr. Sanket Mishra


SCOPE
SCRC, IIIT-H
COMMUNICATION MEDIUMS

• Ethernet
• WiFi
• NFC
• Bluetooth
• LoRA
• ZigBee
• Zwave
• SigFox
INTERNET IS EVERYWHERE : FUTURE OR
PRESENT

https://www.starlink.com/technology
ENVISIONING THE FUTURE OF NETWORKS
FIBER TO
HOME :
FTTH
• Computer network and its history,
progress and application
Module I • Internet, Network architecture,
• Networking devices. OSI Model
INTRODUCTION • TCP/IP Protocol stack, Networking in
different OS.
• Guided media, Unguided media

• Network Topologies
Module – II
PHYSICAL • Analog and digital communication.
Encoding mechanisms
LAYER
• Packet Switching, Circuit Switching.
• Framing, HDLC, PPP

Module – III • Error detection, Error Correction


DATALINK
LAYER • MAC Protocols, Reliable Transmission,
Ethernet, 802.3, 802.5, 802.11.
• IP addressing schemes, IPV4

Module – IV • Subnetting, IPV6, shift from IPV4


NETWORK to IPV6, ICMP, DHCP, ARP.
LAYER
• Routing Protocols: Distance-vector
and link-state routing. RIP, OSPF,
BGP.
• Connection Oriented and
connection less service
Module – V
• TCP and UDP, Port Addressing
TRANSPORT
LAYER
• Remote Procedure Call, Flow
Control vs Congestion Control,
Quality of Service.
• Application Layer Protocols: World
wide web and HTTP, HTTPS

• Domain names: DNS, File


Transfer: FTP
Module – VI
• Electronic mail: SMTP

• Peer to peer networking, Torrent,


VPN. Session management, Data
compression techniques.
COURSE OUTCOMES

Course Outcomes Course Outcome Statement

Independently understand basic computer network technology and Data Communications System and its components.
CO1

Enumerate the layers of the OSI model and TCP/IP. Explain the function(s) of each layer.
CO2

CO3 Analyzing packet formats of TCP, UDP, IP, MAC etc.

Identify the different types of network devices and their functions within a network
CO4

Understand and build the skills of subnetting and routing mechanisms.


CO5

Familiarize with the basic protocols of computer networks, and how they can be used and implement
CO6
DEFINING NETWORKS

• Two or more systems connected together through a communication

medium that is governed by certain protocol form a network.

• Networks allow to share files, programs and I/O resources.

• Different types of connection media maybe utilized for connecting

computers to one another.


TYPES OF NETWORKS

• LOCAL AREA NETWORK [LAN]

• METROPOLITAN AREA NETWORKS [MAN]

• WIDE AREA NETWORK [WAN]


LAN, MAN,
WAN and
PAN
Types of
Computer
Networks
Internet

• A network of networks is called an internetwork, or simply the internet. It is


the largest network in existence on this planet.

• The internet hugely connects all WANs and it can have connection to LANs and
Home networks. Internet uses TCP/IP protocol suite and uses IP as its
addressing protocol.
NETWORKING DEVICES

• Repeater

• Hub

• Bridge

• Switch

• Router

• Gateway
Repeater

• Repeaters are network devices operating at physical layer of


the OSI model that amplify or regenerate an incoming signal
before retransmitting it.

• They are incorporated in networks to expand its coverage


area.

• They are also known as signal boosters.

• Repeaters cannot connect dissimilar networks.

• They cannot reduce network traffic or congestion.


Hub

Hub is a centralized device that connects


multiple devices in a single LAN network.
Properties of Hub
• Multiport repeater (6 or 8)
• Half duplex
• Forwarding
• No filtering
• Collision domain
• Uses at physical layer
Hub

There are two types of the Hub.


• Passive Hub: It forwards data signals in the same format
in which it receives them. It does not change the data
signal in any manner.

• Active Hub: It also works same as the passive Hub works.


But before forwarding the data signals, it amplifies them.
Due to this added feature, the active Hub is also known as
the repeater.

Note: Hubs are no longer used in the computer networks.


Hub
Bridge

Bridge is used to connects two


different networks or LANs. Basic
functions of the Bridge are the
following: -
• Connecting different network
architectures.
• Forwarding
• Filtering
• Collision domain
• Bridge data unit protocol (Makes
spanning tree to avoid loops)
Switch

• Like a hub, a switch also works at the layer of LAN (Local Area Network)
but you can say that a switch is more intelligent than a hub.

• On receiving a packet, it checks the destination address and transmits


the packet to the correct port. Before forwarding, the packets are
checked for collision and other network errors. The data is transmitted
in full duplex mode.

• Each switch has a dynamic table (called the MAC address table) that
maps MAC addresses to ports.
Switch
Router

• A router is a physical or virtual application that passes information between two or more
packet switched computer networks.
• A router inspects a given data packet's destination Internet Protocol address (IP address),
calculates the best way for it to reach its destination and then forwards it accordingly.

• Hundreds of routers might forward a single packet as it moves from one network to the
next on the way to its final destination.

• Routers are associated with the network layer (Layer 3).

• Static and Dynamic routers are mainly use in CN.


Gateway

• A gateway, as the name suggests, is a passage to connect two networks together that may
work upon different networking models.

• They basically work as the messenger agents that take data from one system, interpret it,
and transfer it to another system.

• Gateways are also called protocol converters and can operate at any network layer.

• Gateways are generally more complex than switch or router.

• For basic Internet connections at home, the gateway is the Internet Service Provider that
gives you access to the entire Internet.

• Note: A gateway always has to be a router, but a router does not have to be a gateway.
Modem

• A modem (modulator/demodulator) is a hardware device


that allows a computer to send and receive information
over telephone lines, cable, or satellite connection.

• The modem converts data between analog and digital


formats in real time for two-way network
communication.

• For example, a cable Modem and DSL modem are two


examples of these types of Modems.
• Modem speed is measured in bps and Kbps, which is the
speed the modem can send and receive data.
• Modems are referred to as 56 Kbps (56,000 bps) modem
is the fastest solution.
Network Interface Card (NIC)

• A NIC or Ethernet card is a computer expansion


card for connecting to a network (e.g., home network
or Internet) using an Ethernet cable with an RJ-
45 connector.

• A NIC converts parallel data stream into the serial


data stream and the serial data stream into the
parallel data stream.

• Typically all modern PCs have the integrated NICs in


the motherboards. If additional NICs are required,
they are also available as add-on devices separately.
Network Topology

The arrangement of a network which comprises of


nodes and connecting lines via sender and receiver is
referred as network topology.
Types of Network Topology
1. Bus Topology
2. Star Topology
3. Ring Topology
4. Mesh Topology
5. Tree Topology
6. Hybrid Topology
Bus Topology

Bus topology is a network type in which every computer and network device is
connected to single cable. When it has exactly two endpoints, then it is called
Linear Bus topology.

Features of Bus Topology


• It transmits data only in one direction.
• Every device is connected to a single cable

Advantages of Bus Topology


• It is cost effective.
• Cable required is least compared to other network topology.
• Used in small networks.
• It is easy to understand.
• Easy to expand joining two cables together.
Bus Topology

Disadvantages of Bus Topology


• Cables fails then whole network fails.
• If network traffic is heavy or nodes are more the performance of the network
decreases.
• Cable has a limited length.
• It is slower than the ring topology.
Star Topology

All the computers are connected to a single hub through a cable. This hub is
the central node and all others nodes are connected to the central node.
Features of Star Topology
• Every node has its own dedicated connection to the hub.
• Hub acts as a repeater for data flow.
• Can be used with twisted pair, Optical Fibre or coaxial cable.

Advantages of Star Topology


• Fast performance with few nodes and low network traffic.
• Only that node is affected which has failed, rest of the nodes can work
smoothly.
• Hub can be upgraded easily.
• Easy to troubleshoot.
• Easy to setup and modify.
Star Topology

Disadvantages of Star Topology


• Cost of installation is high.
• If the hub fails then the whole network is stopped because all the nodes depend
on the hub.
• Performance is based on the hub that is it depends on its capacity
Ring Topology
It forms a ring as each computer is connected to another computer,
with the last one connected to the first. Exactly two neighbours for
each device.

Features of Ring Topology


• A number of repeaters are used for Ring topology with large
number of nodes.

• The transmission is unidirectional, but it can be made


bidirectional by having 2 connections between each Network
Node, it is called Dual Ring Topology.

• In Dual Ring Topology, two ring networks are formed, and data
flow is in opposite direction in them. Also, if one ring fails, the
second ring can act as a backup, to keep the network up.

• Data is transferred in a sequential manner that is bit by bit. Data


transmitted, has to pass through each node of the network, till the
destination node.
Ring Topology

Advantages of Ring Topology


• Transmitting network is not affected by high traffic or by adding more nodes, as only the
nodes having tokens can transmit data.
• Cheap to install and expand

Disadvantages of Ring Topology


• Troubleshooting is difficult in ring topology.
• Adding or deleting the computers disturbs the network activity.
• Failure of one computer disturbs the whole network.
Ring Topology

Uni-directional Bi-directional
Mesh Topology

It is a point-to-point connection to other nodes or devices. All the network nodes are
connected to each other. Mesh has n(n-1)/2 physical channels to link n devices.
There are two techniques to transmit data over the Mesh topology, they are :
• Routing
In routing, the nodes have a routing logic, as per the network requirements. Like
routing logic to direct the data to reach the destination using the shortest distance.
We can even have routing logic, to re-configure the failed nodes.

• Flooding
In flooding, the same data is transmitted to all the network nodes, hence no routing
logic is required. The network is robust, and the its very unlikely to lose the data. But
it leads to unwanted load over the network.
Mesh Topology

Types of Mesh Topology


• Partial Mesh Topology : In this topology some of the systems are connected in the same
fashion as mesh topology but some devices are only connected to two or three devices.
• Full Mesh Topology : Each and every nodes or devices are connected to each other.

Features of Mesh Topology


• Fully connected.
• Robust.
• Not flexible.
Mesh Topology

Advantages of Mesh Topology


• Each connection can carry its own data load.
• It is robust.
• Fault is diagnosed easily.
• Provides security and privacy.

Disadvantages of Mesh Topology


• Installation and configuration is difficult.
• Cabling cost is more.
• Bulk wiring is required.
Mesh Topology

Full Mesh Topology Partial Mesh Topology


Tree Topology
It has a root node and all other nodes are connected to it forming
a hierarchy. It is also called hierarchical topology. It should at
least have three levels to the hierarchy.
Features of Tree Topology
• Ideal if workstations are located in groups.
• Used in Wide Area Network.

Advantages of Tree Topology


• Extension of bus and star topologies.
• Expansion of nodes is possible and easy.
• Easily managed and maintained.
• Error detection is easily done.
Tree Topology
Disadvantages of Tree Topology
• Heavily cabled.
• Costly.
• If more nodes are added maintenance is difficult.
• Central hub fails, network fails.
Hybrid Topology
Hybrid topology combines two or more topologies.
• For example if in an office in one department ring topology is used and in
another star topology is used, connecting these topologies will result in
Hybrid Topology (ring topology and star topology).

Features of Hybrid Topology


• It is a combination of two or topologies
• Inherits the advantages and disadvantages of the topologies included

Advantages of Hybrid Topology


• Reliable as Error detecting and trouble shooting is easy.
• Effective.
• Scalable as size can be increased easily.
• Flexible.
Hybrid Topology
Disadvantages of Hybrid Topology
• Complex in design.
• Costly.
OSI LAYER

• The Open Systems Interconnection (OSI) model describes seven layers


that computer systems use to communicate over a network. It was the
first standard model for network communications, adopted by all major
computer and telecommunication companies in the early 1980s

• The modern Internet is not based on OSI, but on the simpler TCP/IP
model. However, the OSI 7-layer model is still widely used, as it helps
visualize and communicate how networks operate, and helps isolate and
troubleshoot networking problems.
PHYSICAL LAYER

• The physical layer is where data moves across network interfaces as digital
signals. Additionally, this is where the transmitting and receiving of
network communication occurs.

• Starting with the Application Layer the message moves down the OSI
model, and it eventually reaches the Physical Layer for transmission.

• When the message is received by the physical layer, the message will then
move up the OSI layers until it reaches the final application layer.
DATALINK LAYER

• Electrical signals received (or transmitted) to the physical layer are linked
and translated to digital logic in the data-Link layer.
• Computer devices may be networked at the Data-Link layer, but only as a
Local Area Network (LAN). Connecting a LAN to another LAN occurs at
Layer 3.

• Additionally, Layer 2 is split into two sublayers:


• Logical Link Control (LLC): Responsible for establishing the logical link
between devices on a local network.
• Media Access Control (MAC): Responsible for the procedures used by
devices across a network medium.
NETWORK LAYER

• When we think of the internet, we are thinking of interconnected


networks. Interconnecting networks refer to a Local Area Network (LAN)
connection to neighbouring or remote networks.
• Layer 3 of the OSI model, the network layer, is where internetworking
takes place and is where logical addresses are assigned to networked
devices.
• A primary function of this layer is to route network packets from one LAN
to another. Routing requires IP addresses and logical mapping of other
networks across the internet to properly deliver messages.
• Another important function of Layer 3 is its ability to fragment and
reassemble large communication. When Layer 3 passes a message down
to Layer 2 for transmission, message length limits may be encountered in
some cases.
TRANSPORT LAYER

• Depending on the type of application, the transportation of that


application’s communication will need to be handled in a specific way. For
example, basic web browsing communication uses Hypertext Transfer
Protocol (HTTP). HTTP communicates via a specific connection service
type and port. The transport layer is responsible for delivering/receiving
the HTTP communication and maintaining the connection throughout the
HTTP communication.

• The Protocol Data Unit (PDU) at Layer 4 is known as a data segment.


Segmentation is the process of dividing raw data into smaller pieces. Once
the raw data is packaged from the higher application layers it is
segmented at the transport layer before being passed to the Network
Layer.
SESSION LAYER

• The session layer starts, manages, and terminates sessions between end-user
application processes. Sessions are considered the persistent connection
between devices. A session is application-focused; sessions are not concerned
with layers 1-4. Instead, the session layer controls dialog between two
networked devices. It is considered to facilitate host-to-host communication.
Sessions dialog may be controlled through synchronization checkpoints, and
through management of communication modes. There are two modes of
communication permitted at Layer 5:
• Half-Duplex: Communication travels in both directions between sender and
receiver, but only one device may transmit a message at a time.
• Full-Duplex: Communication travels in both directions between sender and
receiver, and messages may be sent simultaneously in either direction.
PRESENTATION LAYER

• The presentation layer is primarily responsible for presenting data so that the
recipient will understand the data. Data formatting and encoding protocols apply
at Layer 6 to ensure data is legible and presented properly in the application
receiving it. Data compression is also a function of Layer 6. If necessary, data may
be compressed to improve data throughput over network communication.
• Some common Layer 6 protocols are ASCII, JPEG, GIF, MPEG, and PNG.
• Another main function of the presentation layer is the encryption and
decryption of data sent across a network. Most encryption communication
protocols straddle multiple layers of the OSI model, but the actual encryption
function is Layer 6.
• Two of the most common secure communication protocols are:
• Transport Layer Security (TLS)
• Secure Socket Layer (SSL)
APPLICATION LAYER Protocol Port Number(s) Description
Translates internet names to their globally
registered IP addresses. For example,
Domain Name System (DNS) 53
“google.com” is registered in global DNS
as IP address 8.8.8.8.

Sends data to and from web browsers and


Hypertext Transfer Protocol
443 web servers, but securely with the Secure
Secure (HTTPS)
Socket Layer (SSL) protocol.

Transfers files from a client to a server


File Transfer Protocol FTP 20, 21
and vice versa.

Connects to computers remotely and in a


Secure Shell (SSH) 22
• The topmost layer of the OSI model is secure, encrypted way.
the application layer. On computer Simple Mail Transfer
25 Sends and receives email.
systems, applications display Protocol (SMTP)

information to the user via the UI. Dynamic Host Configuration


67
Automatically assigns IP addresses to
Protocol (DHCP) devices on a network.
Used in a client/server method. IRC
Internet Relay Chat (IRC) 194 clients communicate through an IRC
server.
Used for email where the client receives
110 (unsecured), 995
Post Office Protocol 3 (POP3) mail by downloading it locally to a
(secured)
computer from a server mailbox.
TEXTBOOKS AND REFERENCE BOOKS
THANK YOU

• Mail me queries at :

[email protected]

You might also like