0% found this document useful (0 votes)
21 views

Computer Network Unit-1

ffffffffffffffffffffffffffffffffffffffffffff

Uploaded by

rajeshkollu81
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views

Computer Network Unit-1

ffffffffffffffffffffffffffffffffffffffffffff

Uploaded by

rajeshkollu81
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 41

Mr.

M Purnachandrarao
Assistant Professor

Department of
CSE(Data Science)

B V Raju Institute Of Technology


Narsapur

Course Name
Computer Network

Topic Name
Course Objectives & Course Outcomes
POs
Engineering knowledge: Apply the knowledge of mathematics, science, engineering fundamentals, and an
engineering specialization to the solution of complex engineering problems.
2. Problem analysis: Identify, formulate, review research literature, and analyze complex engineering
problems reaching substantiated conclusions using first principles of mathematics, natural sciences, and
engineering sciences.
3. Design/development of solutions: Design solutions for complex engineering problems and design system
components or processes that meet the specified needs with appropriate consideration for the public health
and safety, and the cultural, societal, and environmental considerations
4. Conduct investigations of complex problems: Use research-based knowledge and research methods
including design of experiments, analysis and interpretation of data, and synthesis of the information to
provide valid conclusions.
5. Modern tool usage: Create, select, and apply appropriate techniques, resources, and modern engineering
and IT tools including prediction and modeling to complex engineering activities with an understanding of the
limitations.
6. The engineer and society: Apply reasoning informed by the contextual knowledge to assess societal, health,
safety, legal and cultural issues and the
consequent responsibilities relevant to the professional engineering practice.
7. Environment and sustainability: Understand the impact of the professionalengineering solutions in societal
and environmental contexts, and demonstrate
the knowledge of, and need for sustainable development.
8. Ethics: Apply ethical principles and commit to professional ethics and responsibilities and norms of the
engineering practice.
9. Individual and team work: Function effectively as an individual, and as a member or leader in diverse
teams, and in multidisciplinary settings.
10. Communication: Communicate effectively on complex engineering activities with the engineering
community and with society at large, such as, being able
to comprehend and write effective reports and design documentation, make effective presentations, and give
and receive clear instructions.
11. Project management and finance: Demonstrate knowledge and understanding of the engineering and
management principles and apply these to one’s own work, as a member and leader in a team, to manage
projects and
in multidisciplinary environments.
12. Life-long learning: Recognize the need for, and have the preparation and ability to engage in independent
and lifelong learning in the broadest context of technological change.
PSO
Course Objectives
2. Identify the different perspectives from which software can be modelled.
1. Illustrate the importance of layering and the functionality of various layers
2. Analyse the data detection and correction methods.
3. Make use of the various routing algorithms in the Internetwork.
4. Analyse the Transport protocols in the data transmission.
5. Utilize the different applications of Application Layer
Course Outcomes

2.1.
Identify the various
List out different Network
perspectives from which
Reference software
models cantransmission
and be modelled. media
2. Illustrate Data Link Layer design issues and protocols
3. Model the routing algorithms in various types of networks
4. Make use of suitable protocols for ensuring QoS in data transportation
5. Dissect and utilize the user defined applications in real time scenarios
2. Identify the different perspectives from which software can be modelled.

Thank You
Mr. M Purnachandrarao
Assistant Professor

Department of
CSE(Data Science)

B V Raju Institute Of Technology


Narsapur

Course Name
Computer Network

Topic Name
UNIT – I
Data communication Components
Topic

• Representation of data,
• Data Flow,
• Network Topologies,
• Protocols,
• OSI Reference Model,
• TCP/IP Reference Model.
Representation of data
• Data in computer networks is represented and transmitted in binary form, which means it consists of
sequences of 0s and 1s. However, these binary sequences are typically grouped into larger units for
more efficient processing and transmission.
• Bits: The smallest unit of data in a computer network is a bit, which can have a value of either 0 or 1.
Bits are transmitted sequentially over communication channels.
• Bytes: A byte is a group of 8 bits. Bytes are often used as the basic unit for data transmission and
storage. They can represent characters, numbers, or other types of information.
• Packets: Data is typically transmitted in discrete units called packets. Each packet consists of a header
and a payload. The header contains information about the packet, such as the source and destination
addresses, while the payload contains the actual data being transmitted.
Representation of data
•Frames: In some network protocols, such as Ethernet, data is further encapsulated into
frames. Frames contain additional information for network communication, such as error
detection and correction codes.
•Data Structures: Within software applications, data may be organized into more
complex structures such as arrays, lists, trees, or graphs. These data structures are used
to represent and manipulate information in a meaningful way.
•Encoding Schemes: Data may be encoded using various schemes to facilitate
transmission and storage. For example, ASCII (American Standard Code for Information
Interchange) and Unicode are encoding schemes used to represent characters as binary
data.
•Compression: Data compression techniques may be applied to reduce the size of data
for more efficient transmission and storage. Compression algorithms such as ZIP, gzip,
and JPEG are commonly used to compress text, images, and other types of data.
•Encryption: In secure communication, data may be encrypted to protect it from
unauthorized access. Encryption algorithms such as AES (Advanced Encryption
Standard) and RSA are used to scramble data so that only authorized parties can decrypt
and access it.
Data Flow
• In a computer network, data flows through a series of steps from its source to its
destination. The process involves several layers of abstraction and various protocols
to ensure that data is transmitted accurately and efficiently. Here's a general
overview of the data flow in a computer network:
• Data Generation: The process begins with the generation of data by a user or an
application. This data can be in the form of text, images, video, audio, or any other
type of digital information.
• Data Encapsulation: Before transmission, the data is encapsulated into packets or
frames depending on the network protocol being used. Each packet/frame typically
contains a header and a payload. The header includes information such as source and
destination addresses, sequence numbers, error detection codes, and other control
information.
• Routing: Once encapsulated, the packets/frames are transmitted over the network.
Routing algorithms are used to determine the best path for the data to travel from the
source to the destination. Routers and switches play a key role in forwarding packets
based on the destination address.
Data Flow
• Transmission: The data is transmitted over physical or wireless communication
channels such as Ethernet cables, fiber-optic cables, or radio waves. At this stage, the
data is converted into electrical signals (in wired networks) or electromagnetic
waves (in wireless networks) for transmission over the medium.
• Reception and Decapsulation: Upon reaching the destination, the received data
packets/frames are processed by the receiving device. The header information is
used to determine the appropriate protocol processing for the payload data. The data
is then decapsulated to extract the original information.
• Data Processing: After decapsulation, the received data is processed by the
destination device or application. This may involve tasks such as error checking and
correction, reordering of packets, and assembling fragmented data.
• Delivery to Application: Finally, the processed data is delivered to the intended
application or user for further processing or display. For example, in the case of a
web browser, the received data may be rendered as a webpage for the user to interact
with.
Network Topologies
• Star Topology: In a star topology, each network device is connected to a central hub
or switch. All communication between devices passes through the central hub. This
topology is easy to set up and manage, and it provides centralized control. However,
if the central hub fails, the entire network may become inaccessible.
• Bus Topology: In a bus topology, all devices are connected to a single
communication line or bus. Data transmitted by one device travels along the bus and
is received by all other devices. This topology is simple and inexpensive but can
suffer from performance degradation and network collisions as the number of
devices increases.
• Ring Topology: In a ring topology, each device is connected to exactly two other
devices, forming a closed loop or ring. Data travels around the ring in one direction,
passing through each device until it reaches its destination. Ring topologies offer
better performance than bus topologies but can be less fault-tolerant as a single
device failure can disrupt the entire network.
• .
Network Topologies
• Mesh Topology: In a mesh topology, each device is connected to every other device
in the network, forming a fully interconnected mesh. Mesh topologies offer high
redundancy and fault tolerance, as multiple paths exist between any pair of devices.
However, they require a large number of connections and can be costly to implement
and manage.
• Tree Topology: A tree topology combines characteristics of both star and bus
topologies. Devices are arranged in a hierarchical tree structure, with multiple levels
of interconnected hubs or switches. This topology is scalable and provides
centralized control, but it can suffer from network congestion and single points of
failure at higher levels of the hierarchy.
• Hybrid Topology: A hybrid topology combines two or more different topologies to
form a larger network. For example, a network might use a combination of star and
mesh topologies to achieve both centralized control and high redundancy. Hybrid
topologies offer flexibility and can be tailored to meet specific requirements.
Network Topologies

Star-Bus hybrid topology


Star-Ring hybrid topology
Thank you
Mr. M Purnachandrarao
Assistant Professor

Department of
CSE(Data Science)

B V Raju Institute Of Technology


Narsapur

Course Name
Computer Network

Topic Name
UNIT – I
OSI REFERENCE MODEL
OSI REFERENCE MODEL
 The OSI(Open Systems Interconnection) model, created in 1984 by ISO, is a reference framework that
explains the process of transmitting data between computers.
 It is divided into seven layers that work together to carry out specialized network functions, allowing for a
more systematic approach to networking.

1. Physical Layer
2. Data Link Layer
3. Network Layer
4. Transport Layer
5. Session Layer
6. Presentation Layer
7. Application Layer
OSI REFERENCE MODEL
OSI REFERENCE MODEL

1.Physical Layer: This is the lowest layer of the OSI model. It deals with the physical
transmission of data over the communication medium, such as cables, wires, or air. It
defines characteristics such as voltage levels, data rates, and the physical connectors
used.
data rate : how many bits a sender can send per second.
Ex: Ethernet cables, fiber optic cables, and wireless signals.
2.Data Link Layer: The data link layer provides error-free data transfer over the
physical layer. It breaks down the data into frames, adds necessary header and trailer
information, performs error detection, and handles flow control.
Examples : Ethernet switches, Wi-Fi access points, and MAC addresses.
3.Network Layer: The network layer is responsible for routing and forwarding data
packets between different networks. It determines the optimal path for data
transmission, based on factors like network congestion, traffic load, and the
destination address. IP (Internet Protocol) is the primary protocol at this layer.
Examples : routers, IP addresses, and the Internet Protocol (IP).
OSI REFERENCE MODEL
4.Transport Layer: The transport layer ensures reliable end-to-end communication
between the sender and receiver. It segments and reassembles data into manageable
units and provides mechanisms for error detection, flow control, and congestion
control. TCP (Transmission Control Protocol) and UDP (User Datagram Protocol)
operate at this layer.
5.Session Layer: The session layer establishes, maintains, and terminates
communication sessions between applications. It handles tasks such as session
initialization, synchronization, and session management. This layer ensures that data
exchange between applications is organized and synchronized.
Examples : NetBIOS, Remote Procedure Call (RPC), and session management potocols
i6.Presentation Layer: The presentation layer is responsible for data translation,
encryption, and compression to ensure that information sent by the application layer of
one system can be properly interpreted by the application layer of another system. It
deals with data formatting, character encoding, and encryption/decryption.
Examples : ASCII, JPEG, and SSL/TLS.
7.Application Layer: The application layer provides an interface between the network
and the user's software. It enables user-level services such as email, web browsing, file
transfer, and remote access. Protocols like HTTP, FTP, SMTP, and DNS operate at this
layer.
OSI REFERENCE MODEL
Thank you
Mr. M Purnachandrarao
Assistant Professor

Department of
CSE(Data Science)

B V Raju Institute Of Technology


Narsapur

Course Name
Computer Network

Topic Name
UNIT – I
TCP/IP REFERENCE MODEL
TCP/IP REFERENCE MODEL
TCP/IP REFERENCE MODEL

1. Network Interface Layer (Link Layer):


1. This layer corresponds roughly to the Data Link Layer and Physical Layer
of the OSI model.
2. It deals with the physical connection to the network and the transmission of
data frames between devices on the same local network.
3. Examples of protocols at this layer include Ethernet, Wi-Fi (IEEE 802.11),
and PPP (Point-to-Point Protocol).
2. Internet Layer:
1. The Internet Layer corresponds to the OSI Network Layer.
2. It is responsible for addressing, routing, and fragmentation of packets for
transmission across interconnected networks.
3. The primary protocol at this layer is the Internet Protocol (IP), which
provides the foundation for the Internet.
TCP/IP REFERENCE MODEL
3.Transport Layer:
1. The Transport Layer is similar to the OSI Transport Layer.
2. It provides end-to-end communication between applications running on different
hosts.
3. The most common protocols at this layer are TCP (Transmission Control
Protocol) and UDP (User Datagram Protocol).
4. TCP ensures reliable and ordered delivery of data, while UDP provides a
connectionless, unreliable service suitable for applications where speed is more
important than reliability.
4.Application Layer:
5. The Application Layer in the TCP/IP model corresponds to a combination of the
OSI Session Layer, Presentation Layer, and Application Layer.
6. It provides network services directly to end-users and applications.
7. A wide range of protocols and services operate at this layer, including HTTP
(Hypertext Transfer Protocol) for web browsing, SMTP (Simple Mail Transfer
Protocol) for email, FTP (File Transfer Protocol) for file transfer, and DNS
(Domain Name System) for domain name resolution.
Mr. M Purnachandrarao
Assistant Professor

Department of
CSE(Data Science)

B V Raju Institute Of Technology


Narsapur

Course Name
Computer Network

Topic Name
UNIT – I
Protocols
Protocol
• Transmission Control Protocol/Internet Protocol
(TCP/IP)
• Hypertext Transfer Protocol (HTTP)
• Simple Mail Transfer Protocol (SMTP)
Transmission Control Protocol/Internet Protocol (TCP/IP)

• Purpose: TCP/IP is the foundational protocol suite of the internet. It enables


communication between devices over a network by providing reliable, ordered, and
error-checked delivery of packets.
• Example: Suppose you're browsing a website. Your web browser (client) sends a
request to the web server using the HTTP protocol, which operates over TCP/IP. The
server then responds by sending back the requested web page data. TCP/IP ensures that
the data packets are delivered reliably and in the correct order, even if they traverse
multiple network devices.
Hypertext Transfer Protocol (HTTP):

• Purpose: HTTP is an application-layer protocol used for transmitting hypermedia


documents, such as HTML files, over the internet. It defines how clients request resources
from servers and how servers respond to those requests.
• Example: When you enter a URL into your web browser's address bar and hit Enter, your
browser sends an HTTP GET request to the server hosting the website
 GET /index.html HTTP/1.1
 Host: www.example.com
Simple Mail Transfer Protocol (SMTP)

• Purpose: SMTP is a protocol for sending email messages between servers. It defines how email
clients and servers interact to transmit messages.
• Example: When you send an email from your email client (e.g., Gmail), it connects to an SMTP
server and sends the email using SMTP commands.
 HELO example.com
 MAIL FROM: [email protected]
 RCPT TO: [email protected]
 DATA
 Subject: Example SubjectThis is the body of the email..
 QUIT
Mr. M Purnachandrarao
Assistant Professor

Department of
CSE(Data Science)

B V Raju Institute Of Technology


Narsapur

Course Name
Computer Network

Topic Name
UNIT – I
Physical Layer
Topic
• Transmission Media –
 Guided
 Unguided
Guided Transmission Media
• Guided media, also referred to as bounded or wired media,
use physical cables or wires to transmit data signals.
Examples include:
• Twisted Pair Cable: Consists of two insulated copper
wires twisted together to reduce electromagnetic
interference. Used in telephone lines and Ethernet
networks.

• Coaxial Cable: Consists of a central conductor


surrounded by an insulating layer, a metallic shield, and an
outer insulating layer. Commonly used in cable television
(CATV) and broadband internet connections.
• Optical Fiber: Uses thin strands of glass or plastic fibers
to transmit data as light pulses. Optical fiber offers high
data transmission speeds and is widely used in long-
distance telecommunications networks and high-speed
internet connections.
Unguided Transmission Media
• Unguided media, also known as unbounded or wireless
media, transmit data signals through the air or space without
the use of physical cables. Examples include:
• Wireless Transmission: Uses electromagnetic waves to
transmit data between devices.
 Examples include Wi-Fi for local wireless networking,
Bluetooth for short-range wireless communication, and
cellular networks for mobile communication.
• Satellite Communication: Utilizes communication satellites
orbiting the Earth to transmit data signals over long distances.
• Satellite communication is commonly used for broadcasting,
satellite internet services, and global positioning systems
(GPS).
Radio waves

Infrared
S.no Infrared Radio Waves Microwaves
Radio waves are the type Microwaves are a line of
Infrared is used for short-range communication of wireless communication sight transmission,
1 like TV remotes, mobile phones, personal that can travel large meaning both the antennas
computers, etc. In science, the Infrared is part of distances as well as can sending and receiving
a spectrum that is not visible to the human eye penetrate any wall should be properly
aligned.
The frequency range of Microwaves have a
2 The frequency range of infrared rays 300GHz – radio waves:3KHz – frequency Range between
400THz 1GHz. 1GHz – 300GHz.

It can travel large distances They are unidirectional, as


The limitation of infrared rays is that they as well as can penetrate they can move in only one
cannot penetrate any obstacles and can only use any wall ( Omni- direction, and therefore it
3 for short-range. Also, Infrared is used in night directional, is used in point-to-point
vision cameras as it has thermal properties. The communication or unicast
frequency range of infrared rays 300GHz – communication such as
400THz radar and satellite.
4 Infrared is one of the secure Radio waves can travel to long
Advantages of microwaves then
wireless communication mediums distances so it is used for long
we say that it is a very fast way of
as it is used for short-range. Also, distance communication andcommunication, that can carry
unlike other wireless mediums, there is no need of digging and
25000 voice channels at the same
infrared is quite inexpensive, and spreading wires. time. Also, it is a wireless
this is some reason it is used in communication medium so there
many electronic devices. is no need of digging and
spreading wires
5 Infrared waves are used in TV Radio waves are used in AM and Microwaves are used in mobile
remotes, mobile phones, personal FM radios, and cordless phones. phones communication and
computers television distribution.

You might also like