Chapter-1 Introduction To CN
Chapter-1 Introduction To CN
Computer Network
1.1
Course Objective
Course Outcome
Syllabus
Text Books
2.1
2.2
2.3
To explore the issues and challenges of protocols design while delving into TCP/IP
protocol suite.
CSC503.3 Design the network using the concept of subnetting / supernetting schemes.
Introduction to Networking
1.1
1.1
2.2
2.3
1.2
Education Healthcare
Mobile Users:
Notebook computers
Personal digital assistants
Wireless networks
Adhoc Networks
There are two types of NIC: wireless NIC and wired NIC.
Wireless NIC: All the modern laptops use the wireless NIC. In
Wireless NIC, a connection is made using the antenna that
employs the radio wave technology.
Wired NIC: Cables use the wired NIC to transfer the data over
the medium.
Wireless Networks
Home Networks
Internetworks
The breakdown in one station does not affect the entire network.
Disadvantages:
Difficult troubleshooting and reconfiguration
High cost due to backbone devices.
Advantages:
Reliable, fast communication and Easier Reconfiguration
Disadvantages:
Costly
Hybrid Topology :
Combination of various different topologies.
Advantages:
Reliable, Scalable, Flexible and Effective
Disadvantages:
Complex design and Costly infrastructure
In simplex mode, the station can utilize the entire bandwidth of the
communication channel, so that more data can be transmitted at a
time.
Disadvantage :
In half-duplex mode, both the devices can send and receive the data and also
can utilize the entire bandwidth of the communication channel during the
transmission of data.
In half-duplex mode, when one device is sending the data, then another has to
wait, this causes the delay in sending the data at the right time.
Full-Duplex Mode
In Full duplex mode, the communication is bi-directional, i.e., the data flow in
both the directions.
Both the stations can send and receive the message simultaneously.
Signals going in one direction share the capacity of the link with signals going in
other direction.
The Full-duplex mode is the fastest mode of communication between devices.
Example
Telephone Network in which there is communication between two persons by a
telephone line, through which both can talk and listen at the same time.
Comparison between Simplex ,Half and Full-Duplex Modes
Basis for Simplex mode Half-duplex mode Full-duplex mode
comparison
Direction of The communication is The communication is The communication is bidirectional.
communication unidirectional. bidirectional, but one at a
time.
Send/Receive A device can only send the Both the devices can Both the devices can send and
data but cannot receive it or it send and receive the data, receive the data simultaneously.
can only receive the data but but one at a time.
cannot send it.
Performance The performance of half- The performance of full- The Full-duplex mode has better
duplex mode is better than the duplex mode is better performance among simplex and
simplex mode. than the half-duplex half-duplex mode as it doubles the
mode. utilization of the capacity of the
communication channel.
Example Examples of Simplex mode Example of half-duplex Example of the Full-duplex mode is a
are radio, keyboard, and is Walkie-Talkies. telephone network.
monitor.
Protocol Hierarchies
A protocol is an agreement between the communicating parties on how communication is to
proceed.
Each layer is a kind of virtual machine, offering certain services to the layer
above it.
Easy to test: Each layer of the layered architecture can be analyzed and
tested individually.
Data Reliability It is a more reliable connection service because it It is not a reliable connection
guarantees data packets transfer from one end to service
the other end with a connection (ack).
Congestion There is no congestion as it provides an end-to- There may be congestion due to not
end connection between sender and receiver. providing an end-to-end connection.
Examples Transmission Control Protocol (TCP) User Datagram Protocol (UDP),
Internet Protocol (IP), Internet Control
Message Protocol (ICMP)
7/22/2022 MRS. RAKHI KALANTRI 53
Reference Models: OSI& TCP/IP
Name of unit
exchanged
APDU
PPDU
SPDU
Segments
Packet
Frame
Bit
Framing: Divides the stream of bits received from the network layer into manageable data units.
Physical addressing: Destination MAC address .
Flow control: This is used to avoid overwhelming the receiver if it is slower than the sender.
Error control: Trailer added to the end of the frame to detect errors.
Access control: More devices are connected to the same communication channel, determine which
device has control over the link at a given time.
7/22/2022 MRS. RAKHI KALANTRI 60
Functions of OSI Layers: Data Link Layer
Hop to hop delivery
62
7/22/2022 MRS. RAKHI KALANTRI 62
Functions of OSI Layers: Network Layer
Responsible for the source-to-destination delivery of a packet, possibly across multiple
networks (links).
Logical Addressing: Adds the source and destination address to the header of the frame.
Addressing is used to identify the device on the internet.
Routing: Determines the best optimal path out of the multiple paths from source to the
destination
7/22/2022 MRS. RAKHI KALANTRI 63
Functions of OSI Layers: Transport Layer
⦁ Responsible for the delivery of a message from one process to another.
Translation: The sender changes the information from its sender-dependent format into a common
encoded format and vise versa at receiver side.
Compression: Data compression reduces the number of bits contained in the information.
Encryption: To ensure privacy.
7/22/2022 MRS. RAKHI KALANTRI 67
Functions of OSI Layers: Application Layer
Responsible for providing services to the user.
The original TCP/IP protocol suite was defined as having four layers: host-to-network,
internet, transport, and application.
When TCP/IP is compared to OSI, we can say that the TCP/IP protocol suite is made of five
layers: physical, data link, network, transport, and application.
Contain relatively independent protocols that can be mixed and matched depending
on the needs of the system.
At the physical and data link layers, TCP/IP does not define any specific protocol. It
supports all the standard and proprietary protocols.
Supports the Internetworking Protocol (IP), in turn, uses four supporting protocols:
ARP, RARP, ICMP, and IGMP.
IP assumes the unreliability of the underlying layers and does its best to get a
transmission through to its destination, but with no guarantees.
Address Resolution Protocol (ARP): used to find the physical address of the node
when its Internet address is known.
Reverse Address Resolution Protocol (RARP): Allows a host to discover its Internet
address when it knows only its physical address.
It is used when a computer is connected to a network for the first time or when a
diskless computer is booted.
Internet Control Message Protocol (ICMP): used by hosts and gateways to send
error messages to the sender.
UDP and TCP are transport level protocols responsible for delivery of a message from
a process (running program) to another process.
User Datagram Protocol (UDP): It is simpler and unreliable. It adds only port
addresses, checksum error control, and length information to the data from the upper
layer.
Application Layer:
It is equivalent to the combined session, presentation, and application layers in the OSI
model.
Many protocols are defined at this layer: SMTP, FTP, HTTP, DNS, SNMP,TELNET etc.
7/22/2022 MRS. RAKHI KALANTRI 78
Relationship of layers and addresses in TCP/IP
0 to 1023 are restricted port numbers are as they are used by well- known protocol
services.
1024 to 49151 are registered port numbers means it can be registered to specific
protocols by software corporations 49152 to 65536 are used as private ports means
they can be used by anybody.
Examples include the e-mail address and the Universal Resource Locator (URL)
(for example, www.mhhe.com).
The first defines the recipient of an e-mail second is used to find a document on
the World Wide Web
These addresses, however, get changed to the corresponding port and logical
addresses by the sending computer.