Computer-Network
Computer-Network
Computer-Network
ENGINEERING
[R20]
B.TECH ECE
(III YEAR – II SEM)
(2023-24)
Course
Code:J32O FUNDAMENTALS OF COMPUTER L T P D
I NETWORKS
(Open Elective-II)
Credits: 3 3 0 0 0
Pre-Requisites:
1. Knowledge on “Digital Logic Design”.
2. Knowledge on “Computer Organization”.
Course objectives:
The Student will:
1. Recognize various layering approaches for networking and understand the functionalities
of physical layer.
2. Identify the data link layer protocols, multi access protocols and various internetworking
devices.
3. Examine design issues of network layer, services provided to above layer and routing,
and congestion control protocols.
4. Examine IP protocol, addressing, various protocols like CIDR, ICMP, ARP and RARP of
internet Layer and examination of transport layer services.
5. Examine Transport layer protocols like TCP, UDP and various congestion controlling
mechanisms, including application layer services, protocols like HTTP, FTP, E-Mail etc.
Module 1:
Overview of the Internet: Protocol, Layering Scenario, TCP/IP Protocol Suite: The OSI Model,
Comparison of the OSI and TCP/IP reference model.
Physical Layer: Guided transmission media, wireless transmission media.
Connecting Devices: Repeaters, Hubs, Switches, Gateways and Bridges.
Module 2:
Data Link Layer: Design issues, Framing, Error Detection and Error Correction, Hamming
Distance, CRC, Flow control and error Control.
Protocols: Noiseless Channels, Noisy Channels,
Multi Access protocols- Random access - ALOHA, CSMA, CSMA/CD and CSMA/CA,
Controlled access, Channelization.
360
Module 3:
Network Layer: Network layer design issues, Store and forward packet switching, connection
less and connection oriented network services.
Internetworking: Protocols-IPV4 and IPV6, Logical Addressing-IPV4, IPV6, Tunneling and
Packet Fragmentation.
Address Mapping: ARP, RARP, DHCP, ICMP and IGMP.
Routing Algorithms: Shortest Path Finding and Distance Vector Routing Algorithms.
Module 4:
Transport Layer: Process to Process Communication, User Datagram Protocol (UDP),
Transmission Control Protocol (TCP), The TCP Connection Establishment, The TCP Connection
Release, The TCP sliding window, The TCP congestion control
Module 5:
Application Layer: Introduction, services, Application layer paradigms.
Applications: DNS, WWW, HTTP, FTP, E-MAIL, TELNET, SNMP, SSH.
Text Books:
1. ComputerNetworks,5E,Peterson,Davie,Elsevier
2. Introduction to Computer Networks and CyberSecurity, Chawan -HwaWu, Irwin, CRC
Publications.
3. Computer Networks and Internets with Internet Applications, Comer .
Reference Books:
1. Data Communications and Networking - Behrouz A. Forouzan, Fifth Edition TMH,
2013.
2. Computer Networks - Andrew S Tanenbaum, 4th Edition, Pearson Education
E - Resources:
1. https://lecturenotes.in/subject/2234/Computer_Network
2. http://nptel.ac.in/courses/106102234/
3. https://www.iitg.ernet.in/dgoswami/CN-Notes.pdf
4. http://www.coursera.org/http://ocw.mit.edu/index.htm.
Course outcomes:
The Student will be able to
1. Demonstrate the networking concepts, various Layering approaches and their
functionalities.
2. Understand the protocols of Data Link layer, how a medium can be shared among
multiple devices and internetworking devices used.
3. Work on fragmentation, assigning of logical address and judge on routing, congestion.
361
4. Demonstrate the working of IP Protocol, other protocols of internet layer and services of
transport layer.
5. Explain the transport layer and application layer protocols, their working
362
Computer Networking
Mrs. K. Snehalatha
Assoc., Prof.
ECE Dept
Course Content
Networks: Basic concepts
Uses of networks in sharing of resources, Backups
Common types of networks; LAN/WAN/Internet,
Server based networks, client server model, P2P
Network media
Wireless networks.
Threats to networks
The internet world
Cloud and Cloud Computing
The Computer Network
A computer network is a group of computers/devices(Nodes)
that use a set of common communication protocols over digital
interconnections for the purpose of sharing resources located on
or provided by the network nodes.
The nodes of a computer network may include personal
computers, servers, networking hardware, or other specialised or
general-purpose hosts.
A communication protocol is a set of rules for exchanging
information over a network.
The interconnections between nodes are formed from a broad
spectrum of telecommunication network technologies, based on
physically wired, optical, and wireless technologies.
wired, optical, and wireless
The Network Diagram
(Click on the Words Below and Learn More About Each Component)
Router
Switch
Wireless Network
The Advantages/Uses of Network
Simultaneous Access
There are moments in any business when several workers
may need to use the same data at the same time.
Shared Peripheral Devices
Personal Communications
Videoconferencing
Voice over Internet Protocol (VoIP):-VoIP transmits the sound
of voice over a computer network using the Internet Protocol
(IP ) rather than sending the signal over traditional phone
wires
Easier Data Backup
The Networking Devices(Nodes)
1. NIC Card
2. Repeater
3. Hub
4. Switch
5. Bridge
6. Router
7. Gateway
8. Firewall
1. Network Interface Card
NIC is used to physically
connect host devices to the
network media.
A NIC is a printed circuit board
that fits into the expansion slot
of a bus on a computer
motherboard.
It can also be a peripheral
device. NICs are sometimes
called network adapters.
Each NIC is identified by a
unique code called a Media
Access Control (MAC) address.
This address is used to control
data communication for the host
on the network.
2. Repeaters
A repeater is a network device used to
regenerate a signal.
Repeaters regenerate analog or digital
signals that are distorted by transmission
loss due to attenuation.
A repeater does not make an intelligent
decision concerning forwarding packets
3. Hubs
Hubs concentrate on connections.
In other words, they take a group
of hosts and allow the network to
see them as a single unit. This is
done passively, without any other
effect on the data transmission.
Active hubs concentrate hosts and
also regenerate signals.
4. Bridges
Bridges convert network data
formats and perform basic data
transmission management.
Bridges provide connections
between LANs.
They also check data to
determine if it should cross the
bridge. This makes each part of
the network more efficient
5. Switches
Switches add more intelligence to data transfer management.
They can determine if data should remain on a LAN and
transfer data only to the connection that needs it.
Another difference between a bridge and switch is that a
switch does not convert data transmission formats
6. Routers
Routers have all the capabilities listed
above.
Routers can regenerate signals,
concentrate multiple connections,
convert data transmission formats, and
manage data transfers.
They can also connect to a WAN, which
allows them to connect LANs that are
separated by great distances.
7. Gateway
A gateway is a piece of networking
hardware used in
telecommunications for
telecommunications networks that
allows data to flow from one discrete
network to another.
Gateways are distinct from routers
or switches in that they
communicate using more than one
protocol to connect a bunch of
networks
8. Firewall
A firewall is a network device or
software for controlling network
security and access rules.
Firewalls are inserted in connections
between secure internal networks
and potentially insecure external
networks such as the Internet.
Firewalls are typically configured to
reject access requests from
unrecognized sources while allowing
actions from recognized ones.
The vital role firewalls play in network
security grows in parallel with the
constant increase in cyber attacks.
Network Media
The function of the media is to carry a flow of information through a LAN.
A. Wired Media:- A widely adopted family that uses copper and fiber media in
local area network (LAN) technology are collectively known as Ethernet
1. Copper Cable
a. Coaxial Cables
b. Shielded Twisted Pair(STP)
c. Unshielded Twisted Pair
• Speed: 10-100Mbps
• Cost: Inexpensive
• Media and connector size: Medium
• Maximum cable length: 500m
b. Shielded Twisted Pair(STP)
• Speed: 10-100Mbps
• Cost: Moderate
• Media and connector size: Medium to large
• Maximum cable length: 100m
c. Unshielded Twisted Pair
UTP is a four-pair wire Speed: 10-100-1000 Mbps*
medium used in a variety of Cost: Least Expensive
networks. Media and connector size: Small
Each of the eight copper Maximum cable length: 100m * (Depending
wires in the UTP cable is on the quality/category of cable)
covered by insulating material
UTP Implementation
EIA (Electronics Industries Alliance)/TIA
(Telecommunications Industry
Association) and specifies an RJ-45
connector for UTP cable.
The letters RJ stand for registered jack.
Fiber Optic Cable
Glass fiber carrying light pulses, each pulse
a bit.
Based on the Total Internal Reflection of
Light.
High-speed point-to-point transmission
10-100’s Gbps
low error rate:
repeaters spaced far apart
immune to electromagnetic noise
Communication Protocols
Internet Protocol Suite
Also called TCP/IP, is the foundation of all modern networking.
It defines the addressing, identification, and routing
specifications for IPv4 and for IPv6.
It is the defining set of protocols for the Internet.
IEEE 802
It is a family of IEEE standards dealing with local area networks
and metropolitan area networks.
They operate mostly at levels 1 and 2 of the OSI model.
Ethernet
It is a family of protocols used in wired LANs, described by a set
of standards together called IEEE 802.3
TCP/IP Protocol Suite
Communication Protocols
Wireless LAN
It is standardized by IEEE 802.11 and shares many properties with wired
Ethernet.
SONET/SDH
Synchronous optical networking (SONET) and Synchronous Digital
Hierarchy (SDH) are standardized multiplexing protocols that transfer
multiple digital bit streams over optical Fibre using lasers.
An upside of a LAN is fast data transfer with data speed that can reach
up to 10Gbps.
Other significant LAN technologies are Fiber Distributed Data Interface
(FDDI) and token ring.
3. Campus Area Network
Larger than LANs, but smaller
than metropolitan area networks
these types of networks are
typically seen in universities,
large K-12 school districts or
small businesses.
They can be spread across
several buildings that are fairly
close to each other so users can
share resources
4. Metropolitan Area Network
1. A MAN is larger than a LAN but smaller than or equal in size to a WAN.
2. The size range anywhere from 5 to 50km in diameter.
3. MANs are typically owned and managed by a single entity.
4. This could be an ISP or telecommunications company that sells its services
to end-users in that metropolitan area.
5. For all intents and purposes, a MAN has the same characteristics as a WAN
with distance constraints.
5. Wide Area Network
Advantages: Disadvantages:
1. There is no central controller. 1. It is possible that more than one station may
attempt transmission simultaneously (collision or
2. Control resides in each station
contention).
3. The less interconnecting wire is
2. Difficult reconfiguration and fault isolation.
required.
3. A fault or break in the bus cable stops all
4. Ease of installation.
transmission, even between devices on the same
5. Backbone cable can be laid along the side of the problem.
most efficient path, and then
4. The damaged area reflects signals in the direction
connected to the nodes by drop lines
of origin, creating noise in both directions
of various lengths
2. Ring Topology
• All devices are connected to one another in the shape
of a closed loop.
• Each device is connected directly to two other devices,
one on either side of it.
Advantages:
1. Avoids the collisions that are possible in the bus topology.
2. Each pair of stations has a point-to-point connection.
3. A signal is passed along the ring in one direction, from device to
another, until it reaches its destination.
4. Each device incorporates a repeater.
5. Relatively easy to install and reconfigure.
6. Fault isolation is simplified.
Disadvantages:
1. A break in the ring (such as station disabled) can disable the entire
network.
2. Unidirectional traffic.
3. Star Topology
• All devices are connected to a central hub.
• Nodes communicate across the network by passing data
through the hub or switch.
Advantages:
1. Easy to install and reconfigure.
2. Robustness, if one link fails; only that link is affected. All other
links remain active.
3. Easy fault identification and isolation. As long as the hub is
working, it can be used to monitor link problems and bypass
defective links.
Disadvantages:
1. The devices are not linked to each other.
2. If one device wants to send data to another, it sends it to the
controller, which then relays the data to the other connected device.
4. Tree/Hierarchical Topology
Advantages:
1. It allows more devices to be attached to a
single central hub and can therefore increase
the distance a signal can travel between
devices.
2. It allows the network to isolate and prioritize
communications from different computers.
Disadvantages:
1. The devices are not linked to each other.
2. If one device wants to send data to another,
it sends it to the controller, which then relays
the data to the other connected device.
3. The addition of secondary hubs brings two
further advantages.
6. Mesh Topology
Each host has its connections to all other hosts.
Mesh topology is implemented to provide as much
protection as possible from interruption of service.
1. A nuclear power plant might use a mesh
topology in the networked control systems.
2. Although the Internet has multiple paths to any
one location, it does not adopt the full mesh
topology.
Advantages: Disadvantages:
1. The use of dedicated links guarantees that each 1. A large amount of cabling required.
connection can carry its data load, thus eliminating 2. A large amount of I/O ports required.
the traffic problems that can occur when links must 3. Installation and reconfiguration are
be shared by multiple devices. difficult.
2. It is robust, if one link becomes unusable, it does 4. The sheer bulk of the wiring can be
not incapacitate (affect) the entire system. greater than the available space (in the
3. Privacy and Security (every message sent travels walls, ceiling, or floors) can accommodate.
along a dedicated line; only the intended recipient 5. The hardware required to connect each
sees it). link (I/O ports and cables) can be
4. Point-to-point links make fault identification and prohibitively expensive.
fault isolation easy.
Wireless Networks
Wireless network is a type of
computer network that uses
wireless data connections for
connecting network nodes.
Example
Bluetooth
Wi-Fi
Bluetooth
Bluetooth is a short-range
wireless technology standard
used for exchanging data
between fixed and mobile
devices over short distances.
It is using UHF radio waves in
the ISM bands, from 2.402
GHz to 2.48 GHz.
The IEEE standardized
Bluetooth as IEEE 802.15.1,
but no longer maintains the
standard.
Wi-Fi
Wi-Fi Stands for Wireless Fidelity.
Wi-Fi, is a Local Area Wireless
technology.
Wi-Fi networks use radio technologies to
transmit and receive data at high speed.
It is based on the IEEE 802.11 family of
standards.
Access point: The access point is a wireless
LAN transceiver or “ base station” that can
connect one or many wireless devices
simultaneously to the internet
The Internet
The simplest How Information Travel Through the Internet
definition A page on the Internet—whether it's full of words, images or
of the both—doesn't come to you in one shipment. It's translated
into digital information, chopped into 1500 byte pieces called
Internet is PACKETS, and sent to you like a puzzle that needs to be
that it's a reassembled. Each part of the packet has a specific
function:
network of Sequence ID
ID’s where the information
computer Header
Provides the
belongs in relation to the rest
of the information
networks complete
destination
address for the End of Message
packet ID’s the end of the
packet
Data Block
The portion of the overall information
carried by the packet
The Internet
How Information Travel Through the Internet
When you connect to a Web site through an ISP and start exchanging information,
there isn't a fixed connection between your computer and the Web server computer
hosting the Web site. Instead, information is exchanged using the best possible path
at that particular time. Special computers called routers determine these paths,
avoiding slow links and favoring fast ones.
Your Web
Computer ISP Servers
Routers
Cloud Computing
Cloud computing is Internet-based
computing, whereby shared resources,
software, and information are provided to
computers and other devices on demand, like
the electricity grid.
A Cloud is a type of parallel and distributed
system consisting of a collection of
interconnected and virtualized computers
that are dynamically provisioned and
presented as one or more unified computing
resources based on service-level agreements
established through negotiation between the
service provider and consumers.