Computer Network Unit-1
Computer Network Unit-1
M Purnachandrarao
Assistant Professor
Department of
CSE(Data Science)
Course Name
Computer Network
Topic Name
Course Objectives & Course Outcomes
POs
Engineering knowledge: Apply the knowledge of mathematics, science, engineering fundamentals, and an
engineering specialization to the solution of complex engineering problems.
2. Problem analysis: Identify, formulate, review research literature, and analyze complex engineering
problems reaching substantiated conclusions using first principles of mathematics, natural sciences, and
engineering sciences.
3. Design/development of solutions: Design solutions for complex engineering problems and design system
components or processes that meet the specified needs with appropriate consideration for the public health
and safety, and the cultural, societal, and environmental considerations
4. Conduct investigations of complex problems: Use research-based knowledge and research methods
including design of experiments, analysis and interpretation of data, and synthesis of the information to
provide valid conclusions.
5. Modern tool usage: Create, select, and apply appropriate techniques, resources, and modern engineering
and IT tools including prediction and modeling to complex engineering activities with an understanding of the
limitations.
6. The engineer and society: Apply reasoning informed by the contextual knowledge to assess societal, health,
safety, legal and cultural issues and the
consequent responsibilities relevant to the professional engineering practice.
7. Environment and sustainability: Understand the impact of the professionalengineering solutions in societal
and environmental contexts, and demonstrate
the knowledge of, and need for sustainable development.
8. Ethics: Apply ethical principles and commit to professional ethics and responsibilities and norms of the
engineering practice.
9. Individual and team work: Function effectively as an individual, and as a member or leader in diverse
teams, and in multidisciplinary settings.
10. Communication: Communicate effectively on complex engineering activities with the engineering
community and with society at large, such as, being able
to comprehend and write effective reports and design documentation, make effective presentations, and give
and receive clear instructions.
11. Project management and finance: Demonstrate knowledge and understanding of the engineering and
management principles and apply these to one’s own work, as a member and leader in a team, to manage
projects and
in multidisciplinary environments.
12. Life-long learning: Recognize the need for, and have the preparation and ability to engage in independent
and lifelong learning in the broadest context of technological change.
PSO
Course Objectives
2. Identify the different perspectives from which software can be modelled.
1. Illustrate the importance of layering and the functionality of various layers
2. Analyse the data detection and correction methods.
3. Make use of the various routing algorithms in the Internetwork.
4. Analyse the Transport protocols in the data transmission.
5. Utilize the different applications of Application Layer
Course Outcomes
2.1.
Identify the various
List out different Network
perspectives from which
Reference software
models cantransmission
and be modelled. media
2. Illustrate Data Link Layer design issues and protocols
3. Model the routing algorithms in various types of networks
4. Make use of suitable protocols for ensuring QoS in data transportation
5. Dissect and utilize the user defined applications in real time scenarios
2. Identify the different perspectives from which software can be modelled.
Thank You
Mr. M Purnachandrarao
Assistant Professor
Department of
CSE(Data Science)
Course Name
Computer Network
Topic Name
UNIT – I
Data communication Components
Topic
• Representation of data,
• Data Flow,
• Network Topologies,
• Protocols,
• OSI Reference Model,
• TCP/IP Reference Model.
Representation of data
• Data in computer networks is represented and transmitted in binary form, which means it consists of
sequences of 0s and 1s. However, these binary sequences are typically grouped into larger units for
more efficient processing and transmission.
• Bits: The smallest unit of data in a computer network is a bit, which can have a value of either 0 or 1.
Bits are transmitted sequentially over communication channels.
• Bytes: A byte is a group of 8 bits. Bytes are often used as the basic unit for data transmission and
storage. They can represent characters, numbers, or other types of information.
• Packets: Data is typically transmitted in discrete units called packets. Each packet consists of a header
and a payload. The header contains information about the packet, such as the source and destination
addresses, while the payload contains the actual data being transmitted.
Representation of data
•Frames: In some network protocols, such as Ethernet, data is further encapsulated into
frames. Frames contain additional information for network communication, such as error
detection and correction codes.
•Data Structures: Within software applications, data may be organized into more
complex structures such as arrays, lists, trees, or graphs. These data structures are used
to represent and manipulate information in a meaningful way.
•Encoding Schemes: Data may be encoded using various schemes to facilitate
transmission and storage. For example, ASCII (American Standard Code for Information
Interchange) and Unicode are encoding schemes used to represent characters as binary
data.
•Compression: Data compression techniques may be applied to reduce the size of data
for more efficient transmission and storage. Compression algorithms such as ZIP, gzip,
and JPEG are commonly used to compress text, images, and other types of data.
•Encryption: In secure communication, data may be encrypted to protect it from
unauthorized access. Encryption algorithms such as AES (Advanced Encryption
Standard) and RSA are used to scramble data so that only authorized parties can decrypt
and access it.
Data Flow
• In a computer network, data flows through a series of steps from its source to its
destination. The process involves several layers of abstraction and various protocols
to ensure that data is transmitted accurately and efficiently. Here's a general
overview of the data flow in a computer network:
• Data Generation: The process begins with the generation of data by a user or an
application. This data can be in the form of text, images, video, audio, or any other
type of digital information.
• Data Encapsulation: Before transmission, the data is encapsulated into packets or
frames depending on the network protocol being used. Each packet/frame typically
contains a header and a payload. The header includes information such as source and
destination addresses, sequence numbers, error detection codes, and other control
information.
• Routing: Once encapsulated, the packets/frames are transmitted over the network.
Routing algorithms are used to determine the best path for the data to travel from the
source to the destination. Routers and switches play a key role in forwarding packets
based on the destination address.
Data Flow
• Transmission: The data is transmitted over physical or wireless communication
channels such as Ethernet cables, fiber-optic cables, or radio waves. At this stage, the
data is converted into electrical signals (in wired networks) or electromagnetic
waves (in wireless networks) for transmission over the medium.
• Reception and Decapsulation: Upon reaching the destination, the received data
packets/frames are processed by the receiving device. The header information is
used to determine the appropriate protocol processing for the payload data. The data
is then decapsulated to extract the original information.
• Data Processing: After decapsulation, the received data is processed by the
destination device or application. This may involve tasks such as error checking and
correction, reordering of packets, and assembling fragmented data.
• Delivery to Application: Finally, the processed data is delivered to the intended
application or user for further processing or display. For example, in the case of a
web browser, the received data may be rendered as a webpage for the user to interact
with.
Network Topologies
• Star Topology: In a star topology, each network device is connected to a central hub
or switch. All communication between devices passes through the central hub. This
topology is easy to set up and manage, and it provides centralized control. However,
if the central hub fails, the entire network may become inaccessible.
• Bus Topology: In a bus topology, all devices are connected to a single
communication line or bus. Data transmitted by one device travels along the bus and
is received by all other devices. This topology is simple and inexpensive but can
suffer from performance degradation and network collisions as the number of
devices increases.
• Ring Topology: In a ring topology, each device is connected to exactly two other
devices, forming a closed loop or ring. Data travels around the ring in one direction,
passing through each device until it reaches its destination. Ring topologies offer
better performance than bus topologies but can be less fault-tolerant as a single
device failure can disrupt the entire network.
• .
Network Topologies
• Mesh Topology: In a mesh topology, each device is connected to every other device
in the network, forming a fully interconnected mesh. Mesh topologies offer high
redundancy and fault tolerance, as multiple paths exist between any pair of devices.
However, they require a large number of connections and can be costly to implement
and manage.
• Tree Topology: A tree topology combines characteristics of both star and bus
topologies. Devices are arranged in a hierarchical tree structure, with multiple levels
of interconnected hubs or switches. This topology is scalable and provides
centralized control, but it can suffer from network congestion and single points of
failure at higher levels of the hierarchy.
• Hybrid Topology: A hybrid topology combines two or more different topologies to
form a larger network. For example, a network might use a combination of star and
mesh topologies to achieve both centralized control and high redundancy. Hybrid
topologies offer flexibility and can be tailored to meet specific requirements.
Network Topologies
Department of
CSE(Data Science)
Course Name
Computer Network
Topic Name
UNIT – I
OSI REFERENCE MODEL
OSI REFERENCE MODEL
The OSI(Open Systems Interconnection) model, created in 1984 by ISO, is a reference framework that
explains the process of transmitting data between computers.
It is divided into seven layers that work together to carry out specialized network functions, allowing for a
more systematic approach to networking.
1. Physical Layer
2. Data Link Layer
3. Network Layer
4. Transport Layer
5. Session Layer
6. Presentation Layer
7. Application Layer
OSI REFERENCE MODEL
OSI REFERENCE MODEL
1.Physical Layer: This is the lowest layer of the OSI model. It deals with the physical
transmission of data over the communication medium, such as cables, wires, or air. It
defines characteristics such as voltage levels, data rates, and the physical connectors
used.
data rate : how many bits a sender can send per second.
Ex: Ethernet cables, fiber optic cables, and wireless signals.
2.Data Link Layer: The data link layer provides error-free data transfer over the
physical layer. It breaks down the data into frames, adds necessary header and trailer
information, performs error detection, and handles flow control.
Examples : Ethernet switches, Wi-Fi access points, and MAC addresses.
3.Network Layer: The network layer is responsible for routing and forwarding data
packets between different networks. It determines the optimal path for data
transmission, based on factors like network congestion, traffic load, and the
destination address. IP (Internet Protocol) is the primary protocol at this layer.
Examples : routers, IP addresses, and the Internet Protocol (IP).
OSI REFERENCE MODEL
4.Transport Layer: The transport layer ensures reliable end-to-end communication
between the sender and receiver. It segments and reassembles data into manageable
units and provides mechanisms for error detection, flow control, and congestion
control. TCP (Transmission Control Protocol) and UDP (User Datagram Protocol)
operate at this layer.
5.Session Layer: The session layer establishes, maintains, and terminates
communication sessions between applications. It handles tasks such as session
initialization, synchronization, and session management. This layer ensures that data
exchange between applications is organized and synchronized.
Examples : NetBIOS, Remote Procedure Call (RPC), and session management potocols
i6.Presentation Layer: The presentation layer is responsible for data translation,
encryption, and compression to ensure that information sent by the application layer of
one system can be properly interpreted by the application layer of another system. It
deals with data formatting, character encoding, and encryption/decryption.
Examples : ASCII, JPEG, and SSL/TLS.
7.Application Layer: The application layer provides an interface between the network
and the user's software. It enables user-level services such as email, web browsing, file
transfer, and remote access. Protocols like HTTP, FTP, SMTP, and DNS operate at this
layer.
OSI REFERENCE MODEL
Thank you
Mr. M Purnachandrarao
Assistant Professor
Department of
CSE(Data Science)
Course Name
Computer Network
Topic Name
UNIT – I
TCP/IP REFERENCE MODEL
TCP/IP REFERENCE MODEL
TCP/IP REFERENCE MODEL
Department of
CSE(Data Science)
Course Name
Computer Network
Topic Name
UNIT – I
Protocols
Protocol
• Transmission Control Protocol/Internet Protocol
(TCP/IP)
• Hypertext Transfer Protocol (HTTP)
• Simple Mail Transfer Protocol (SMTP)
Transmission Control Protocol/Internet Protocol (TCP/IP)
• Purpose: SMTP is a protocol for sending email messages between servers. It defines how email
clients and servers interact to transmit messages.
• Example: When you send an email from your email client (e.g., Gmail), it connects to an SMTP
server and sends the email using SMTP commands.
HELO example.com
MAIL FROM: [email protected]
RCPT TO: [email protected]
DATA
Subject: Example SubjectThis is the body of the email..
QUIT
Mr. M Purnachandrarao
Assistant Professor
Department of
CSE(Data Science)
Course Name
Computer Network
Topic Name
UNIT – I
Physical Layer
Topic
• Transmission Media –
Guided
Unguided
Guided Transmission Media
• Guided media, also referred to as bounded or wired media,
use physical cables or wires to transmit data signals.
Examples include:
• Twisted Pair Cable: Consists of two insulated copper
wires twisted together to reduce electromagnetic
interference. Used in telephone lines and Ethernet
networks.
Infrared
S.no Infrared Radio Waves Microwaves
Radio waves are the type Microwaves are a line of
Infrared is used for short-range communication of wireless communication sight transmission,
1 like TV remotes, mobile phones, personal that can travel large meaning both the antennas
computers, etc. In science, the Infrared is part of distances as well as can sending and receiving
a spectrum that is not visible to the human eye penetrate any wall should be properly
aligned.
The frequency range of Microwaves have a
2 The frequency range of infrared rays 300GHz – radio waves:3KHz – frequency Range between
400THz 1GHz. 1GHz – 300GHz.