Intro to Computer Networks Guide
Intro to Computer Networks Guide
SUBJECT CODE:3150710
SEMESTER: 5TH
FACULTY NAME: Prof. Bhaumik Gelani
SUBJECT NAME: Computer Networks
Email id: [email protected]
DEPARETMENT: CSE & IT
Mobile : +91 99092 49440
Subject Overview
1
8/19/2023
Reference Books
Sr. No. Book Name Author Publication
1 Computer Networking- A Top-Down approach, Kurose and Pearson
5th edition Ross
2 Computer Networks- A Top-Down approach, Behrouz Mc Graw Hill
Forouzan
3 Computer Networks (4th edition) Andrew Prentice Hall
Tanenbaum
Unit: 1
Introduction to Computer Networks and Internet
1. Data Communications
2. Networking & Internet
3. Topologies & Transmission Media (The Network Edge )
4. Switched Networks- Circuit & Packet Switching (The Network Core)
5. OSI Model & TCP/IP Protocol Architecture (Protocols Layers and Their Service Model)
6. Different types of Networking Connecting Devices
7. Delay, Loss & Throughput
8. History of The Computer Network
2
8/19/2023
1. Data Communications
• Communications:
• Means sharing information
• Local (face to face) or remote (over distance)
• Telecommunication:
• Telephone, telegraph and television
• Means communication at a distance
• Data:
• Refers to information
• Presented in any form Such as Text, Numbers, Images, Audio and Video.
Cont..
• Data communication :
• It is the exchange of data between two devices via some form of transmission
medium (wire cable OR wire less).
3
8/19/2023
Cont..
Transmission Modes
OR
Data Flow
4
8/19/2023
Cont..
• Only one device on a link can transmit; the other can only receive
Data
Cont..
• Each station can both transmit and receive, but not at the same time.
• When one device is sending, the other can only receive, and vice versa.
• Example: Walkie-talkies
Data
Data
5
8/19/2023
Cont..
Data
Data
6
8/19/2023
Physical Structures
• Type of connection:
• Network: Two or more devices connected through links
• Link: Communication pathway that transfers data from one device two another
• Two devices must be connected in some way to the same link at the same time. Two
possible types:
• Point-to-Point
• Multipoint
Cont..
• Point-to-Point:
• Entire capacity of the link is reserved for transmission between those two devices
• Use an actual length of wire or cable
• Other options, such as microwave or satellite is possible
• Example: Television remote control
7
8/19/2023
Cont..
• Multipoint (multidrop):
• Capacity is shared
Cont..
• Client –Server Network:
• Client:
• Request servers for a task.
• Generally called desktop PCs or workstations.
• Server:
• Receive requests from the clients.
• Process and response them.
• E.g. Web Browser / Server, Email Server.
8
8/19/2023
• Computer Network is a system in which multiple computers are connected to each other
to share information and resources.
Cont..
9
8/19/2023
Cont..
Ownership of Private
Network
Design and Easy
maintenance
Cost Low
Network Size Small
Speed Fastest
Range 1 to 10 km
Cont..
10
8/19/2023
Cont..
BASIS OF
COMPARISON LAN MAN WAN
Stands form Local Area Network Metropolitan Area Network Wide Area Network
A network that connects a It covers relatively large It spans large locality and
Meaning group of computers in a region such as cities, towns. connects countries
small geographical area. together. Example
Internet.
11
8/19/2023
12
8/19/2023
• Internet:
• The full form of the internet is an interconnected network.
• The internet is a type of world-wide computer network.
• The internet is the collection of infinite numbers of connected computers that are
spread across the world.
13
8/19/2023
Cont..
• The different ways in which one can connect to the Internet are discussed below in
brief:
• Dial-Up:
• In such connections, users are required to link their phone line to a computer to
access the Internet.
• Under this connection, the user cannot make or receive phone calls through tier
home phone service
• Broadband:
• Provided either through cable or phone companies, Broadband is a high-speed
internet connection which is widely used today
Cont..
• Wireless Connection:
• Wi-fi and Mobile service providers fall under this category.
• Internet connectivity is made via radio waves and the Internet can be connected
anywhere, irrespective of the location.
• Given below are a few examples of wireless connection:
• Wi-fi: Wireless Fidelity or wi-fi allows high-speed internet connectivity without
the use of wires
• Mobile Phones: All smartphones are now equipped with an option for Internet
connectivity which can be availed using Internet vouchers and packs. No external
connection or wire is required for these
• Satellite: Where broadband connections are unavailable, satellites are used for
wireless Internet connectivity
• Integrated Services Digital Network: ISDN allows users to sent audio or video
data using telephone lines
14
8/19/2023
Cont..
15
8/19/2023
Cont..
2. Ring Topology
3. Tree Topology
4. Star Topology
5. Mesh Topology
6. Hybrid Topology
Cont..
• Bus Topology:
• The bus topology is designed in such a way that all the stations are connected through a
single cable known as a backbone cable.
• Each node is either connected to the backbone cable by drop cable or directly connected
to the backbone cable.
16
8/19/2023
Cont..
• When a node wants to send a message over the network, it puts a message over the
network.
• All the stations available in the network will receive the message whether it has been
addressed or not.
• The bus topology is mainly used in 802.3 (ethernet) and 802.4 standard networks.
• The backbone cable is considered as a "single lane" through which the message is
broadcast to all the stations.
Cont..
• Limited failure:
• A failure in one node will not have any effect on other nodes.
17
8/19/2023
Cont..
• Ring Topology:
• Ring topology is like a bus topology, but with connected ends.
• The node that receives the message from the previous computer will retransmit to the
next node.
• The data flows in one direction, i.e., it is unidirectional.
18
8/19/2023
Cont..
• The data flows in a single loop continuously known as an endless loop.
• It has no terminated ends, i.e., each node is connected to other node and having no
termination point.
• The data in a ring topology flow in a clockwise direction.
• The most common access method of the ring topology is token passing.
• Token passing:
• It is a network access method in which token is passed from one node to another
node.
• Token:
• It is a frame that circulates around the network.
Cont..
19
8/19/2023
Cont..
• Failure:
• The breakdown in one station leads to the failure of the overall network.
• Delay:
• Star Topology:
20
8/19/2023
Cont..
• Star topology is an arrangement of the network in which every node is connected to the
central hub, switch or a central computer.
• The central computer is known as a server, and the peripheral devices attached to the
server are known as clients.
• Hubs or Switches are mainly used as connection devices in a physical star topology.
Cont..
21
8/19/2023
Cont..
If the central hub or switch goes down, then all the connected nodes will not be
able to communicate with each other.
Cable:
• Mesh Topology:
• Mesh technology is an arrangement of the network in which computers are
interconnected with each other through various redundant connections.
22
8/19/2023
Cont..
• It does not contain the switch, hub or any central computer which acts as a central point
of communication.
• Mesh topology is mainly used for WAN implementations where communication failures
are a critical concern.
Cont..
• Fast Communication:
• Communication is very fast between the nodes.
• Easier Reconfiguration:
• Adding new devices would not disrupt the communication between other
devices.
23
8/19/2023
Cont..
• Cost:
• Management:
• Mesh topology networks are very large and very difficult to maintain and
manage.
• Tree Topology:
• Tree topology combines the characteristics of bus topology and star topology.
24
8/19/2023
Cont..
• A tree topology is a type of structure in which all the computers are connected with each
other in hierarchical fashion.
• The top-most node in tree topology is known as a root node, and all other nodes are the
descendants of the root node.
• There is only one path exists between two nodes for the data transmission. Thus, it forms
a parent-child hierarchy.
Cont..
25
8/19/2023
Cont..
• If any fault occurs in the node, then it becomes difficult to troubleshoot the problem.
• High cost:
• Failure:
• A tree topology mainly relies on main bus cable and failure in main bus cable will
damage the overall network.
• Hybrid Topology:
• A hybrid topology is a kind of network topology that is a combination of two or more
network topologies, such as mesh topology, bus topology, and ring topology.
26
8/19/2023
Cont..
• Its usage and choice are dependent on its deployments and requirements like the
performance of the desired network, and the number of computers, their location.
• However, a variety of technologies are needed for its physical implementation, and it
offers a complex structure.
• Also, it includes an advantage as increasing flexibility; it can increase fault tolerance, and
allows new basic topologies to be added or removed easily.
• The hybrid topology is more useful when you need to fulfill diversity in Computer
Network.
• In this topology, all network sections can include the configuration of different Network
Topology.
• These computers are known as hosts or end systems. Router is known as edge router.
• Search results, e-mail, Web pages, and videos reside in large data centers.
1) Access Networks
2) Physical Media
27
8/19/2023
Cont..
1. Access Networks:
• example, Google has
30–50 data centers,
with many having more
than one hundred
thousand servers.
2. Transmission Media
(Physical Media )
• Transmission Media:
• Transmission media is a communication channel that carries the information from
the sender to the receiver.
• Data is transmitted through the electromagnetic signals.
28
8/19/2023
Cont..
Cont..
• Guided media:
• Guided media, the waves are guided along a solid medium.
• Guided media are those that provide a wired-channel from one device to another.
29
8/19/2023
Cont..
Cont..
30
8/19/2023
Cont..
Cont..
• It is cheap.
• This cable can only be used for shorter distances because of attenuation.
31
8/19/2023
Cont..
Cont..
32
8/19/2023
Cont..
• Coaxial Cable:
• Coaxial cable is very commonly used transmission media.
• Outer conductor is braided shield.
• Inner conductor is solid metal.
• Separated by insulating material.
• Used in television, long distance telephone transmission.
• High bandwidth and excellent noise immunity.
Cont..
• If any fault occurs in the cable causes the failure in the entire network.
33
8/19/2023
Cont..
• Fibre optic is a cable that holds the optical fibers coated in plastic that are used to send
the data by pulses of light.
Cont..
34
8/19/2023
Cont..
• Unguided media:
• Unguided media, the waves propagate in the atmosphere and in outer space.
Cont..
• Radio wave
• Highly regulated
• Omnidirectional antennas
• Radio waves are used for multicast communications, such as radio and television,
and paging systems
35
8/19/2023
Cont..
• Micro Wave:
• Use directional antennas-point to point line of sight communications
Cont..
• Infrared Wave:
• Infrared signals can be used for short-range
communication in a closed area using line-of-sight
propagation
• Relatively directional
36
8/19/2023
BASIS FOR
GUIDED MEDIA UNGUIDED MEDIA
COMPARISON
Basic The signal requires a physical The signal is broadcasted through
path for transmission. air or sometimes water.
Alternative name It is called wired communication It is called wireless
or bounded transmission media. communication or unbounded
transmission media.
Direction It provides direction to signal for It does not provide any direction.
travelling.
Types Twisted pair cable, coaxial cable Radio wave, microwave and
and fibre optic cable. infrared.
• Defines the connection of different network segments together and process to transmit
data packets across the network.
• There are two fundamental approaches to moving data through a network of links and
switches: Switched
Networks
• Circuit switching.
37
8/19/2023
Cont..
• Circuit switching:
• Circuit switching is a switching technique that establishes a dedicated path between sender
and receiver.
• In the Circuit Switching Technique, once the connection is established then the dedicated path
will remain to exist until the connection is terminated.
• A complete end-to-end path must exist before the communication takes place.
• In case of circuit switching technique, when any user wants to send the data, voice, video, a
request signal is sent to the receiver then the receiver sends back the acknowledgment to
ensure the availability of the dedicated path.
Cont..
• Circuit switching is used in public telephone network. It is used for voice transmission.
• Circuit-Switched Networks
38
8/19/2023
Cont..
Cont..
• Frequency division
• Time division
39
8/19/2023
Cont..
• The message splits into smaller pieces known as packets and packets are given a unique
number to identify their order at the receiving end.
• Every packet contains some information in its headers such as source address, destination
address and sequence number.
• Packets will travel across the network, taking the shortest path as possible.
• All the packets are reassembled at the receiving end in correct order.
Cont..
• If any packet is missing or corrupted, then the message will be sent to resend the
message.
• If the correct order of the packets is reached, then the acknowledgment message will be
sent.
• Packet Switching:
40
8/19/2023
Cont..
• Datagram Packet switching:
• It is a packet switching technology in which packet is known as a datagram.
• Datagram Packet Switching is also known as connectionless switching.
• The packets are reassembled at the receiving end in correct order.
• In Datagram Packet Switching technique, the path is not fixed.
• Intermediate nodes take the routing decisions to forward the packets.
Cont..
41
8/19/2023
BASIS FOR
CIRCUIT SWITCHING PACKET SWITCHING
COMPARISON
Orientation Connection oriented. Connectionless.
Purpose Initially designed for Voice Initially designed for Data Transmission.
communication.
Inflexible, because once a path is set Flexible, because a route is created for
Flexibility all parts of a transmission follows the each packet to travel to the destination.
same path.
Order Message is received in the order, sent Packets of a message are received out of
from the source. order and assembled at the destination.
Circuit switching can be achieved Packet Switching has two approaches
Technology using two technologies, either Space Datagram Approach and Virtual
/Approach Division Switching or Time-Division Circuit Approach.
Switching.
Layers Circuit Switching is implemented at Packet Switching is implemented at
Physical Layer. Network Layer.
• Example:
42
8/19/2023
5. OSI Model
• Protocols Layers
• A protocol is a set of rules and formats that manages all aspects of data communication.
• Without a protocol, two devices may be connected but not communicating.
• A protocol is necessary for any function that requires cooperation between peers
• A simple protocol
• send file as a series of packets
• send a checksum
• receiver sends OK or not-OK message
• sender waits for OK message
Cont..
• OSI Model
• International Organization for Standards (ISO) prescribes a standard to connect open
systems
• Open System Interconnect (OSI)
• A system that implements open protocols is called an open system
• A set of protocols is open if protocol details are publicly available.
• Layering
• There is a information-hiding (abstraction) and achieving good performance.
• We have broken a complex problem into smaller, simpler pieces.
• Each layer provides a clean abstraction to the layer above.
43
8/19/2023
Cont..
Cont..
44
8/19/2023
Cont..
• Physical layer
• The physical layer is responsible for movements of individual bits from one hop (node)
to the next.
Cont..
45
8/19/2023
Cont..
• Network layer
• The network layer is responsible for the delivery of individual packets from the source
host to the destination host.
Cont..
• Transport layer
• The transport layer is responsible for the delivery of a message from one process to
another.
46
8/19/2023
Cont..
• Session layer
• The session layer is responsible for dialog control and synchronization.
Cont..
• Presentation layer
• The presentation layer is responsible for translation, compression, and encryption.
• Data translation ,compression and encryption.
• Encrypt data to hide it.
• Compress data from last message to small no of messages.
47
8/19/2023
Cont..
• Application layer
• The application layer is responsible for providing services to the user.
• Login password checking, file transfer are some of the application.
• Provide direct access to network device.
• Interface between user and system.
• Examples: File transfer, Emails, www
48
8/19/2023
Cont..
Cont..
1&2. Host – to – Network Layer
• Lowest Layer in model.
• The host has to connect to the network using some protocol, so it can send IP packets
over it.
49
8/19/2023
Cont..
3. Network layer
• The network layer is responsible for the delivery of individual packets from the source
host to the destination host.
Cont..
• IP ( Internetwork Protocol):
• IP is transmission mechanism used. It is connectionless and unreliable protocol.
packets in the IP layer called datagram.
• ARP is used to find the physical address of the node when the IP address is known
• RARP ( Reverse Address Resolution Protocol ):
• RARP is used to find the IP Address of the node when its physical address is known.
50
8/19/2023
Cont..
4. Transport layer
• The transport layer is responsible for the delivery of a message from one process to
another.
• TCP
• UDP
Cont..
51
8/19/2023
Cont..
5. Application layer
• The application layer is responsible for providing services to the user.
• Login password checking, file transfer are some of the application.
• Interface between user and system.
• Examples: File transfer, Emails, www
• Application layer protocols :
• SMTP
• FTP
• SNMP
• TELNET
Cont..
52
8/19/2023
53
8/19/2023
54
8/19/2023
Cont..
55
8/19/2023
Repeater:
• A repeater operates at the physical layer.
• Its job is to regenerate the signal over the same network before the signal becomes too
weak or corrupted so as to extend the length to which the signal can be transmitted over
the same network.
• An important point to be noted about repeaters is that they do not amplify the signal.
• When the signal becomes weak, they copy the signal bit by bit and regenerate it at the
original strength.
• It is a 2 port device.
Cont..
56
8/19/2023
Cont..
Hub:
• A hub is basically a multiport repeater.
• A hub works at the physical layer (layer 1) of the OSI model.
• A hub connects multiple wires coming from different branches.
• Types of Hub
• Active Hub :-
• These are the hubs which have their own power supply and can clean , boost and
relay the signal along the network.
• These are used to extend maximum distance between nodes.
• Passive Hub :-
• These are the hubs which collect wiring from nodes and power supply from
active hub.
Cont..
57
8/19/2023
Cont..
Bridge:
• A bridge is a repeater, with add on functionality of filtering content by reading the MAC
addresses of source and destination.
• It is also used for interconnecting two LANs working on the same protocol.
• It has a single input and single output port, thus making it a 2 port device.
Cont..
58
8/19/2023
Cont..
Switch :
• Switch can perform error checking before forwarding data, that makes it very efficient as
it does not forward packets that have errors and forward good packets selectively to
correct port only.
• In other words, switch divides collision domain of hosts, but broadcast domain remains
same.
Cont..
59
8/19/2023
Cont..
Routers:
• A router is a device like a switch that routes data packets based on their IP addresses.
• Routers normally connect LANs and WANs together and have a dynamically updating
routing table based on which they make decisions on routing the data packets.
Cont..
60
8/19/2023
Cont..
Gateway:
• Gateway is mainly used All seven Layer in OSI Model.
• A gateway, as the name suggests, is a passage to connect two networks together that may
work upon different networking models.
• They basically works as the messenger agents that take data from one system, interpret it,
and transfer it to another system.
• Gateways are also called protocol converters and can operate at any network layer.
Gateways are generally more complex than switch or router.
Cont..
61
8/19/2023
• Delay:
• As a packet travels from one node (host or router) to the sub sequent
node (host or router) along this path, the packet suffers from several
types of delays at each node along the path.
Cont..
• Loss:
• Packet loss describes lost packets of data not reaching their destination after
being transmitted across a network.
• Packet loss occurs when network congestion, hardware issues, software bugs,
and a number of other factors cause dropped packets during data
transmission.
• Throughput:
• The instantaneous throughput at any instant of time is the rate (in bits/sec) at
which Host B is receiving the file.
• The average throughput of the file is F/T bits/sec, where the file consists of F
bits and the transfer time is T (in seconds).
62
8/19/2023
Cont..
Cont..
• Processing Delay
• The time required to examine the packet sheared and determine where
to direct the packet.
• To check bit level error.
• Determine output link.
• Delay in terms of microseconds.
63
8/19/2023
Cont..
• Queuing Delay
• A time to waits at output link for transmission.
• Depends on congestion level of router.
• If queue empty then delay will be zero.
• If queue full–heavy traffic then delay will be long.
• Delay in terms of microsecond to millisecond.
Cont..
• Transmission Delay
• An amount of time required for the router to transmit the packet.
• Its depends on packet length(L) and transmission rate(R) of link.
64
8/19/2023
Cont..
• Propagation Delay
• A time required to propagate from the beginning of the link to router
B.
• Depends on the length of physical medium(d) link and propagation
speed(s) of link.
• Delay in terms of millisecond.
65
8/19/2023
Cont..
Botnet
• The words "robot" and "network" together give rise to the term Botnet.
• Botnet refers to a network of hijacked internet-connected devices that are
installed with malicious codes known as malware.
Cont..
• Botnet:
66
8/19/2023
Cont..
• Botnet Work:
Cont..
• The vulnerability hunting takes place in the website, human behavior, and
application. By doing so, the hacker prepares a set-up to lure the target to get
exposed to malware, knowingly or unknowingly.
• Most commonly, hackers figure out the vulnerabilities in websites and the
software.
67
8/19/2023
Cont..
• The process of infecting the device usually takes place via the Trojan virus or
social engineering method.
• Using all these methods, attackers corrupt the targeted device with botnet
malware.
Cont..
• Hackers systematize the involved infected machines in the botnet and design
a methodology to manage them remotely.
• Once the stage is successfully completed, the bad actor is able to gain admin-
like access to the targeted devices or computers.
68
8/19/2023
Cont..
• Denial of Service (DoS):
Cont..
• It’s a type of attack that Web servers cannot respond – meaning they won’t
be able to serve HTTP requests.
69
8/19/2023
Cont..
Cont..
• For example, a fake banking website may be used to capture financial login
information. The fake site is “in the middle” between the user and the actual
bank website.
• Attackers have many different reasons and methods for using a MITM attack.
• Typically, they’re trying to steal something, like credit card numbers or user
login credentials.
70
8/19/2023
Cont..
Cont..
• This type of attack takes advantage of the specific capacity limits that apply to any
network resources – such as the infrastructure that enables a company’s website.
• The DDoS attack will send multiple requests to the attacked web resource – with the aim
of exceeding the website’s capacity to handle multiple requests… and prevent the website
from functioning correctly.
• Typical targets for DDoS attacks include:
• Internet shopping sites and Online casinos
• Any business or organization that depends on providing online services
71
8/19/2023
Cont..
QUESTIONS
1. What is Computer Network? Write Applications , Advantages & Disadvantages of
Computer Network.
2. What is Topology? List out and Explain various network topology.
3. Explain Types of Computer Network. OR Q. Explain LAN, MAN and WAN.
4. List hardware required for server.
5. Explain Transmission modes (Simplex, half-duplex, Full-duplex).
6. Explain Wired media. OR Q. Explain Twisted -pair, Coaxial and Fiber Optics cable.
7. Explain Unguided media. OR Q. Explain Radio waves, Micro waves and Infrared.
8. Explain Switched Networks. OR Q. Explain Circuit & Packet Switching
9. Explain OSI Reference Model with Diagram. (Brief Description of Each Layer).
10.Explain TCP/IP Reference Model with Diagram. (Brief Description of Each Layer).
Cont..
11. Explain TCP/IP Reference Model with Diagram. (Brief Description of Each Layer).
12. Explain Physical Structures. OR Q. Explain Type of connection.
13. List and explain Different types of Networking Connecting Devices.
14. Explain Delay, Loss & Throughput.
15. Write a short note: Botnet.
16. Difference Between:
1. Simplex, Half Duplex, and Full Duplex
2. Synchronous Transmission and Asynchronous Transmission
3. Serial Transmission and Parallel Transmission
4. LAN, MAN and WAN
5. Wired Media and Wireless Media. (Guided and Unguided Media)
6. Circuit & Packet Switching
7. OSI and TCP/IP
8. TCP and UDP
72
8/19/2023
Subject Overview
73