Chap-1-Intro
Chap-1-Intro
NETWORKS 1
Dr.K.SURESH BABU
M.TECH.,
PH.D.
Professor of
CSE
CISCOCertified Academy
Instructor(CCAI)
JNTUniversity
SYLLABUS
•Business
Applications
•Home Applications
•Mobile Users
•Social Issues
Business Applications
to distribute information throughout the company (resource
sharing). sharing physical resources such as printers, and tape
backup systems, is sharing information
client-server model. It is widely used and
network usage.
forms the basis of much
communication medium among
employees.email
which employees (electronic
generally use mail),
for a great deal of daily
Telephone calls betweenemployees
communication. may be carried by
network instead of by the phone company. This technology is
telephonythe computer
or Voice over IP (VoIP) when Internet technology is
called IP
used.
Desktop sharing lets remote workers see and interact with a
graphical
doing business electronically, especially with customers and
This new model is called e-commerce (electronic commerce)
suppliers.
grown rapidly
computer in recent
screen
and it has
years.
Home Applications
peer-to-peer communication
person-to-person communication
electronic commerce
entertainment.(game playing,)
Mobile Users
With the good comes the bad, as this new-found freedom brings with
it many
unsolved social, political, and ethical issues.
Social networks, message boards, content sharing sites, and a host
of other applications allow people to share their views with like-
minded individuals. As long as the subjects are restricted to
technical topics or hobbies like gardening, not too many problems
will arise.
The trouble comes with topics that people actually care about, like
politics, religion, or sex. Views that are publicly posted may be
deeply offensive to some people. Worse yet, they may not be
politically correct. Furthermore, opinions need not be limited to
text; high-resolution color photographs and video clips are easily
shared over computer networks. Some people take a live-and-let-
live view, but others feel that posting certain material (e.g.,
verbal attacks on particular countries or religions, pornography,
etc.) is simply unacceptable and that such content must be
Social Issues
•Network neutrality
•Digital Millennium
Copyright Act
•Profiling users
•Phishing
Network Hardware
•Protocol hierarchies
•Design issues for the layers
•Connection-oriented versus connectionless
service
•Service primitives
•Relationship of services to protocols
Protocol Hierarchies
Protocol Hierarchies
Protocol Hierarchies
Connection-Oriented Versus
Connectionless Service
Service Primitives
OSI
MODEL
THE OSI MODEL
⚫
Principles on which OSI model was
designed: 3
3
Physical Layer
8
10
Note
13
Functions of Data Link
Layer 14
15
Note
⚫ If
two systems are attached to different
networks with devices like routers, then N/W
layer is used.
⚫ At
the source side, TL receives message from
upper layer into packets and reassembles
Transport
20
Layer
⚫ Transport Layer provides two types of
services:
Takes data from higher levels of OSI Model and breaks it into
segments that
can
Conversely, reassembles
be sent to lower-leveldata segments
layers for data into data that higher-level
transmission
and applications
protocols can use
Also puts segments in correct order (called sequencing ) so they
can be
reassembled in correct order at destination
Concerned with the reliability of the transport of sent data
May use a connection-oriented protocol such as TCP to ensure
destination received segments
May use a connectionless protocol such as UDP to send
segments without assurance of delivery
Uses port addressing
Session Layer
22
Note
Layer
⚫ Session layer is the fifth layer of OSI Model
⚫ It
also provides for orderly communication
between devices by regulating the flow of
data.
Functions of Session 24
Layer
⚫Establishing, Maintaining and ending a
session: When sending device first contact with
receiving device, it sends syn (synchronization)
packet to establish a connection & determines the
order in which information will be sent. Receiver
sends ack (acknowledgement). So the session can be
set & end.
■ It uses checksums,
acknowledgements, and timeouts to
control transmissions and end to end
verification.
■
Unlike the OSI model, TCP/IP
treats reliability as an end-to-end
problem
Transport Layer
The network layer, also called the internet layer, deals with packets
and connects independent networks to transport the packets across
network boundaries.
The network layer protocols are the IP and the Internet Control
Message Protocol (ICMP), which is used for error reporting
INTERNET LAYER
07:01:02:01:2C:4B
753
• ARPANET
• INTERNE
T
ARPANET
Early ARPAnet
• 1971
• Email implemented
• 1973
• Email was 75% of the ARPAnet traffic
• File Transfer Protocol (FTP) was developed
ARPAnet to Internet
• Transition Period 1971-1983
• Packet Switching developed and perfected
• Robust, fault-tolerant, efficient, survivable
• TCP/IP: Network of Networks realized on a large
scale
• The ability to connect different types of
networks
INTERNET
Tim Berners-Lee
• A graduate of Oxford University
• wrote the first web client and server in 1990.
•His specifications of URIs, HTTP and HTML
implement the backbone of the WWW
WWW improved Internet
• On the Internet, you had to
• Know numeric IP addresses to locate servers
• Login anonymously or with a user account
• Know the folder hierarchy and file name of the
document/data.
• Location information shared via email
• If you didn’t have friends, you had no idea what
was on the