0% found this document useful (0 votes)
3 views

Computer Networks

The document outlines comprehensive notes on computer networks, covering key concepts such as resource sharing, reliability, scalability, and various network architectures like client-server and peer-to-peer. It details the OSI reference model, network topologies, transmission media, and protocols for data link, network, transport, and application layers, along with security measures. Additionally, it discusses congestion control, routing methods, and the importance of data compression and cryptography in network communications.

Uploaded by

buttysaylee7
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views

Computer Networks

The document outlines comprehensive notes on computer networks, covering key concepts such as resource sharing, reliability, scalability, and various network architectures like client-server and peer-to-peer. It details the OSI reference model, network topologies, transmission media, and protocols for data link, network, transport, and application layers, along with security measures. Additionally, it discusses congestion control, routing methods, and the importance of data compression and cryptography in network communications.

Uploaded by

buttysaylee7
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

Comprehensive Notes on Computer Networks (Based on S.

Tanenbaum)

UNIT I: Introduction Concepts


Goals and Applications of Networks
Goals:
1. Resource Sharing:
o Networks allow multiple devices to share hardware resources like
printers and servers, software applications, and data.
2. Reliability:
o By providing redundancy, networks ensure data remains
accessible even if some nodes fail.
3. Scalability:
o Networks are designed to grow in size (adding users, devices, or
data) without significant performance degradation.
4. Cost Efficiency:
o Shared resources and centralized management reduce overall
costs.
5. Communication:
o Enable real-time and asynchronous communication through
emails, video conferencing, and instant messaging.
Applications:
• Business: Secure financial transactions and communication between
branches.
• Education: Access to online libraries, remote learning, and collaborative
tools.
• Healthcare: Telemedicine, sharing medical data, and remote
monitoring.
• Entertainment: Streaming platforms like Netflix and gaming networks.

Network Structure and Architecture


Definition: A network connects multiple devices (nodes) using communication
links to share data and resources.
Types of Architectures:
1. Client-Server Architecture:
o Centralized servers provide resources and services to client
devices.
o Example: Websites hosted on servers accessed by user devices.
2. Peer-to-Peer Architecture (P2P):
o All devices have equal roles, acting as both servers and clients.
o Example: File-sharing systems like BitTorrent.
Network Structures:
• LAN (Local Area Network): Small geographic area.
• WAN (Wide Area Network): Large geographic area.
• MAN (Metropolitan Area Network): City-wide networks.

The OSI Reference Model


Purpose:
• Provides a standardized framework for understanding and designing
network protocols.
Seven Layers:
1. Physical Layer:
o Deals with the physical transmission of raw bits over a medium.
o Examples: Cables (Ethernet, fiber optics), wireless signals.
2. Data Link Layer:
o Provides reliable data transfer by handling framing, error
detection/correction, and flow control.
o Examples: MAC addresses, ARP.
3. Network Layer:
o Handles routing, addressing, and packet forwarding.
o Examples: IP (IPv4, IPv6), ICMP.
4. Transport Layer:
o Ensures reliable end-to-end communication.
o Protocols: TCP (reliable) and UDP (unreliable).
5. Session Layer:
o Establishes, maintains, and terminates sessions between devices.
o Example: Video conferencing sessions.
6. Presentation Layer:
o Translates data formats, encrypts data, and compresses it for
efficient transmission.
o Examples: JPEG, MP3, SSL.
7. Application Layer:
o Interfaces directly with the end user.
o Examples: HTTP, SMTP, FTP.

Network Topology Design and Delay Analysis


Topologies:
1. Bus Topology:
o All devices share a single communication line.
o Advantage: Cost-effective.
o Disadvantage: A failure in the backbone affects all devices.
2. Star Topology:
o Devices connect to a central hub.
o Advantage: Fault isolation.
o Disadvantage: Hub failure impacts the entire network.
3. Ring Topology:
o Devices are connected in a circular fashion.
o Advantage: Predictable data flow.
o Disadvantage: A single point of failure can disrupt the network.
4. Mesh Topology:
o Every device connects to every other device.
o Advantage: High redundancy.
o Disadvantage: Expensive and complex.
Delay Analysis:
• Propagation Delay:
o Time taken for a signal to travel through the medium.
o Depends on distance and signal speed.
• Transmission Delay:
o Time required to push all data bits onto the medium.
o Formula: Packet size / Bandwidth.
• Processing Delay:
o Time routers take to analyze headers and determine the route.
• Queuing Delay:
o Time spent waiting in queues at routers or switches.

Physical Layer and Transmission Media


Transmission Media:
1. Wired Media:
o Twisted Pair: Common in LANs; susceptible to electromagnetic
interference.
o Coaxial Cable: Higher bandwidth; used in cable TV.
o Fiber Optics: Transmits data as light; high speed and long
distance.
2. Wireless Media:
o Radio Waves: Used in Wi-Fi and cellular networks.
o Microwaves: Requires line-of-sight; used in satellite
communication.
o Infrared: Used in remote controls and short-range
communication.
Switching Methods:
1. Circuit Switching:
o Dedicated communication path.
o Example: Telephone networks.
2. Packet Switching:
o Data split into packets; routed independently.
o Example: Internet.
3. Message Switching:
o Entire message stored and forwarded.
o Example: Email.
ISDN (Integrated Services Digital Network):
• Digital telecommunication standard that integrates voice, video, and
data on a single line.
• Two types: Basic Rate Interface (BRI) and Primary Rate Interface
(PRI).

UNIT II: Medium Access Sub-layer


Channel Allocation and LAN Protocols
Channel Allocation:
1. Static Allocation:
o Fixed division of resources (e.g., Frequency Division Multiple
Access - FDMA).
2. Dynamic Allocation:
o Resources are assigned as needed.
o Example: ALOHA protocols.
ALOHA Protocols:
• Pure ALOHA:
o Nodes send data anytime; prone to collisions.
o Efficiency: 18%.
• Slotted ALOHA:
o Nodes send only at defined times; reduces collisions.
o Efficiency: 37%.
IEEE Standards and FDDI
IEEE Standards for LANs:
• 802.3 (Ethernet):
o Defines wired LANs using CSMA/CD.
• 802.11 (Wi-Fi):
o Defines wireless LANs.
FDDI (Fiber Distributed Data Interface):
• High-speed network using fiber optics.
• Uses a dual-ring topology for redundancy.

Data Link Layer


Functions:
• Framing: Divides data into frames for transmission.
• Error Detection: Identifies errors using techniques like parity bits and
CRC.
• Flow Control: Prevents sender from overwhelming receiver.
Sliding Window Protocols:
• Stop-and-Wait: Sender waits for acknowledgment after each frame.
• Go-Back-N: Sender retransmits all frames after an error.
• Selective Repeat: Only erroneous frames are retransmitted.
Error Handling:
• Detection: Methods like checksum and cyclic redundancy check (CRC).
• Correction: Techniques like Hamming Code and forward error
correction (FEC).
UNIT III: Network Layer
Point-to-Point Networks
• Direct communication link between two devices.
• Example: Dedicated leased lines for WAN connections.

Routing
Static Routing:
• Routes are manually configured.
Dynamic Routing:
• Adapts to network changes using protocols like RIP and OSPF.
Algorithms:
1. Shortest Path (Dijkstra): Finds the shortest path based on link weights.
2. Distance Vector (Bellman-Ford): Routes based on distance vectors
shared among neighbors.

Congestion Control
Definition:
• Congestion occurs when the network is overloaded with data, leading to
performance degradation.
Methods:
1. Open Loop:
o Prevent congestion before it happens (e.g., admission control).
2. Closed Loop:
o Detect and alleviate congestion after it occurs (e.g., packet
discarding).
Internetworking - TCP/IP
TCP/IP Model:
• 4 layers: Application, Transport, Internet, and Network Interface.
IP Packet:
• Header fields include Source IP, Destination IP, TTL, Protocol, and
Checksum.
IP Addressing:
• IPv4: 32-bit addresses (e.g., 192.168.1.1).
• IPv6: 128-bit addresses, designed to address IPv4 exhaustion.

UNIT IV: Transport Layer


Design Issues
• Reliability: Ensure complete and error-free data transfer.
• Multiplexing: Handle multiple connections simultaneously.
• Connection Management: Establish, maintain, and terminate
connections.

Session Layer - Design Issues


• Manages sessions between applications.
• Provides synchronization and dialog control.

Remote Procedure Call (RPC)


• Allows programs to execute functions on a remote server as if they were
local.
UNIT V: Presentation Layer
Data Compression Techniques
• Reduces data size for efficient transmission.
• Examples: Lossless (Huffman coding) and Lossy (JPEG).
Cryptography
• Secures data through encryption and decryption.
• Examples: Symmetric (AES) and Asymmetric (RSA) encryption.

UNIT VI: Application Layer


File Transfer, Access, and Management
• Protocols: FTP (File Transfer Protocol).
• Functions: Uploading/downloading files, managing file directories.
Electronic Mail
• Protocols: SMTP, IMAP, and POP3.
Virtual Terminals
• Example: Telnet, used for remote access.

UNIT VII: Security


Network Security Goals
1. Confidentiality: Ensure data is accessible only to authorized users.
2. Integrity: Protect data from unauthorized modification.
3. Availability: Ensure network resources are available when needed.
Techniques
1. Firewalls: Control access to networks.
2. Encryption: Protect data in transit.
3. Authentication: Verify user identities (e.g., passwords, biometrics).

This document provides detailed explanations of all units and subtopics for
your Computer Networks course. Let me know if specific areas need further
expansion!

You might also like