Final Unit 1
Final Unit 1
AY 2025-2026 SEM-II
Syllabus: Unit 1
Course Outcomes
• Main Topic-3: OSI Model, TCP/IP Protocol Suite, Comparison of the OSI
and TCP/IP reference model, Analog & Digital Signals, Transmission
Impairments.
What is Computer Network?
• Computer Network:- Computer network can be defined as two or more
nodes or devices connected to each other for sharing data and resources.
Applications of computer networks
1. Resource Sharing
A. H/W sharing- printers, Disks, Fax Machines, etc
B. S/W sharing- Oracle VM Virtual Box, Android Studio etc.
[Link] Sharing- WWW, pdf, video, audio
[Link]- Email, calls, message etc.
[Link]- Video, TV/movies , Games.
[Link] Access- Reservation for Hotels, Airplane Booking,
Home Banking, Automated Newspaper, Automated Library etc
6. Home applications
7. Social media -
5
Introduction to data communication
6
Components of Data Communication
1. Message
2. Sender
3. Receiver
4. Medium
5. Protocol
7
Components of Data Communication
1. Message
The message is the information (data) to be communicated.
Popular forms of information include text, numbers, pictures, audio,
and video.
2. Sender
The sender is the device that sends the data message.
It can be a computer, workstation, telephone, video camera.
3. Receiver
The receiver is the device that receives the message.
It can be a computer, workstation, telephone, television,& so on.
8
Components of Data Communication
4. Medium
The transmission medium is the physical path by which a message
travels from sender to receiver.
Examples of transmission media include twisted-pair, coaxial,
fiber-optic, and radio waves.
5. Protocol
A protocol is a set of rules that govern data communications.
It represents an agreement between the communicating devices.
Without a protocol, two devices may be connected but not
communicating, just as a person speaking French cannot be understood
by a person who speaks only Japanese.
9
Modes of Communication(Data Flow)
10
Modes of Communication(Data Flow)
1. Simplex
In simplex mode, the communication is unidirectional.
Only one of the devices on a link can transmit, the other can only
receive.
e.g. keyboards, monitorsRadio broadcasting, Television
broadcasting, Computer to printer etc.
11
Modes of Communication(Data Flow)
2. Half-Duplex
In this mode, each station can both transmit and receive, but not at the
same time.
When one device is sending, the other can only receive, and vice-versa.
e.g. walkie-talkies, Browsing the internet, Universal Serial Bus (USB) etc.
12
Modes of Communication(Data Flow)
3. Full-Duplex
In full duplex mode, both stations can transmit and receive
simultaneously.
One common example of full duplex is the Telephone network.
When two people are communicating by a telephone line, both can talk and
listen at the same time.
Ex- Video calls/video conferencing, Audio calls, Live chats
• Network hardware is a set of physical or network devices that are essential for
interaction and communication between hardware units operational on a
computer network.
• The network hardware are the server, client, peer, transmission medium, and
connecting devices.
15
Network Hardware
1. Servers
• High-configuration computers that manage the resources of the network.
• Network operating system
• Ex-file servers, database servers, print servers etc.
2. Clients
• Clients are computers that request and receive service from server.
3. Transmission Media
• It’s a channels through which data is transferred from one device to another
in a network.
• Transmission media may be guided media like coaxial cable, fibre optic
cables etc; or maybe unguided media like microwaves, infra-red waves etc.
4. Connecting Devices
16
Network Devices
• What is a network device?
Components used to connect computers as well as other electrical devices
together in order to share resources such as printers and fax machines.
• Hubs
• Switches
• Routers
• Network bridges
• Gateways
• Firewalls
• Wireless AP (Access Points)
17
HUB
• Hub is a networking device that operates on the physical layer.
18
HUB
19
Types of HUB
1. Passive hub
• It is used for just creating a connection between various devices.
2. Active hubs or Multiport repeaters-
• Active Hub is a hub which can amplify or regenerate the information signal.
3. Intelligent Hub
• It can perform tasks of both Active and Passive hubs.
• Also, it can perform some other tasks like Bridging and routing.
• It increases the speed and effectiveness of total network thus makes the performance of
whole network fast and efficient.
20
HUB
Advantages of Hubs:
1. Less expensive. less cost
2. Does not impact network performance.
3. Support different network media.
4. Easily connects with different media.
Disadvantages of Hubs:
2. It cannot find the best/ shortest path of the network.
3. No mechanism for traffic detection.
4. No mechanism for data filtration.
5. Not capable of connecting topologies like token, ring, ethernet, etc.
21
Switch
• Switches are a special type of hub.
• Switch is used as a central device to connect different nodes in
star topology.
• Switch is an intelligent device.
• When switch receives a data packet it reads destination address
stored in the packet.
• It send it to only that node whose destination address matches
with the address contained in the data packet.
• Switches operate at the data link layer of the OSI Model.
22
Switch
23
Switch
Advantages of Switch in Computer Network
1. Increased Network Performance by Reducing network congestion and
improving data transfer rates.
2. Improved Security create VLAN, prevent unauthorised access, data
protection.
3. Easy Network Management allowing administrators to configure and
monitor network settings from a single location.
4. Scalability Switches can easily be added or removed from a network,
Disadvantages of Switch in Computer Network
5. Cost more than hub and repeater
6. Complexity to configure and manage.
7. Single Point of Failure If switch fails all NW collapse.
8. Limited Compatibility.
24
Router
• Routers are used to create larger networks by
joining two or more network segments.
• A router derives its name from the fact that it can route data it
receives from one network onto another.
• When a router receives a packet of data, it determines the
destination address.
• And then, it looks in its routing table to determine, how to reach
the destination.
• Routers work at the OSI layer 3 (network layer)
25
Router
26
Function of Router
27
Advantage and Disadvantage of Routers
Advantage of Routers
1. Network Connectivity connect devices and network.
2. Increased Security use of Firewall, data encryption.
3. Quality of Service (QoS)
4. Easy to Set Up and Manage
Disadvantage of Routers
1. Limited Bandwidth
2. Vulnerability to Cyberattacks
3. Limited Range
4. Cost
28
Difference between Switch, Hub and Routers
29
Bridge
30
Bridge
31
Function of Bridge
32
Bridge
• Advantages of using a bridge
– Extend physical network
– Reduce network traffic with minor segmentation
– Reduce collisions
– Connect different architecture
• Disadvantages of using bridges
– Slower than repeaters due to filtering
– Do not filter broadcasts
– More expensive than repeaters
33
Gateway
34
Gateway
•A gateway is used to connects two networks using different
protocols together.
• It also acts as a “gate” between two networks.
• The gateway node acts like a proxy server and firewall.
35
Gateway
Advantages of Gateway
• Connectivity Expand the network.
• Security Authentication process
• Filtering Process Inspection of each packet
• Domain Control Avoid data collision.
• Protocol Conversion convert data as platform change.
Disadvantages of Gateway
• Implementation Complex to install and configure.
• Configuration Require special administrator for install.
• Time Delay because of protocol coversion.
• Connection Failure
• Troubleshooting
36
Gateway
Advantages of Gateway
• Connectivity Expand the network.
• Security Authentication process
• Filtering Process Inspection of each packet
• Domain Control Avoid data collision.
• Protocol Conversion convert data as platform change.
Disadvantages of Gateway
• Implementation Complex to install and configure.
• Configuration Require special administrator for install.
• Time Delay because of protocol coversion.
• Connection Failure
• Troubleshooting
37
Network Software
• For networking there is software.
• Further software there is set of rules and protocols that we have to
follow
• Network software having some design issues like
1. Communication Protocol Hierarchies
2. Design issues of layers.
3. Connection-Oriented and Connectionless Services
4. Service Primitives
5. The Relationship of Services to Protocols
38
Network Software: Protocol Hierarchies
• Layers, protocols, and interfaces
• Conversation between layer n
on one machine with layer n on
another machine: the rules and
conventions used in this conversation
are collectively known as the
layer n protocol
• A set of layers and protocols is
called a network architecture
• A list of the protocols used by a certain
system, one protocol per layer, is called a
protocol stack
39
Design Issues for the Layers
A number of design issues exist for the layer to layer approach of
computer networks
• Reliability Notification of data transmission.
• Scalability congestion, platform support,
• Addressing Large size nw difficult to find dedicated user
• Error Control
• Flow Control
• Resource Allocation
• Routing Multiple path
• Security proper tools use of tools for security.
40
Network Software: Protocol Hierarchies
• Communication Flow
• Definition 1: A protocol is an
agreement between the
communicating parties on
how communication is to
proceed
• Definition 2: A protocol is a set
of communication "rules"
between two processes
41
Network Software: Connection-Oriented
• Connection is established, the sender, receiver, and subnet conduct a negotiation
about the parameters to be used, such as
• Maximum message size
• Quality of service required, and other issues
• Typically, one side makes a proposal and the other side can accept it, reject it, or
make a counter proposal.
• A circuit is another name for a connection with associated resources (after the
telephone model …)
• Reliability: do not lose data – e.g., the receiver acknowledge the receipt of each
message
• so the sender is sure that it arrived
• TCP – Transmission Control Protocol is connection oriented
• Text documents, email, image attachments
42
Network Software: Connectionless Services
• In contrast to connection-oriented service, connectionless service is modeled
after the postal system
• Each message (letter/package) carries the full destination address and each
one is routed through the intermediate nodes inside the system independent of
all the subsequent messages
• UDP – User Datagram Protocol – unreliable
• Unreliable (meaning not acknowledged) connectionless service is often called
datagram service, in analogy with telegram (service, which also does not
return an acknowledgement to the sender)
• Video streaming, Video conference, VOIP, Digital TV transmission (Idan+)
43
Difference between Connection-Oriented Connectionless Services
[Link] Connection-oriented Service Connectionless Service
1 Connection-oriented service is related to the telephone system. Connection-less service is related to the postal system.
Connection-oriented service is preferred by long and steady Connection-less Service is preferred by bursty
2.
communication. communication.
8. Connection-oriented services require a bandwidth of a high range. Connection-less Service requires a bandwidth of low range.
9. Ex: TCP (Transmission Control Protocol) Ex: UDP (User Datagram Protocol)
10. Connection-oriented requires authentication. Connection-less Service does not require authentication.
Connection-Oriented and Connectionless Services
45
Connection-oriented Service Primitives
• Minimal example of service primitives that provide a reliable byte stream
• A service is formally specified by a set of primitives (operations) available
to user processes to access the service
• These primitives tell the service to perform some action or report on an
action taken by a peer entity (usually as operating system calls)
• Modeled after the Berkeley socket interface
46
The Relationship of Services to Protocols
• A service is a set of primitives (operations) that a layer provides to the layer
above it.
• The service defines what operations the layer is prepared to perform or behalf
of its users, but it says nothing at all about how these operations are
implemented.
• A service relates to an interface between two layers, with the lower layer
being the service provider and the upper layer being the service user.
• A service is like an abstract data type or an object in an object-oriented
language.
• It defines operations that can be performed on an object but does not specify
how these operations are implemented.
47
The Relationship of Services to Protocols
48
Internet: Internet history
Internet :
• Started as DARPNET – scientist and researchers used to communicate and share
file.
• 1965 –MIT developed packet switching network
• 1969 – ARPANET started node to node communication
• 1970 – Robert E Khann and Vinton Cerf invented TCP and IP
• 1980 – Scientist and researcher used network to share files between different
universities and labs
• 1991 –Tim- Berners Lee introduced the WWW : an Internet. He created the first
browser and the Internet
• 1992 – a group of student and researcher developed a browser called Mosaic.
Which was later called Netscape
49
Internet standard and Administration
50
Internet standard and Administration
51
Internet standard and Administration
1. Internet Society (ISOC) :
• An international, non-profit organization.
• It maintaining and supporting other Internet administrative bodies such as IAB,
IETF, IRTF, and IANA.
2. Internet Architecture Board (IAB) :
• The technical advisor to the ISOC.
• The main purpose is to oversee the continuing development of TCP/IP Protocol Suite.
3. Internet Engineering Task Force (IETF) :
• The IETF is a forum of working groups responsible for identifying operational
problems, proposing solutions to them, and developing and reviewing specifications
intended as Internet Standards.
4. Internet Research Task Force (IRTF) :
• The IRTF is a forum of working groups focusing on long-term research topics related
to Internet protocol, technology, applications, and architecture.
52
Protocols and Standards
Protocols are rules and regulations.
• It defines what is communicated, how it is communicated, and when
it is communicated.
• Key elements of protocol are,
• Syntax: Format of data
• Semantics: Meaning of each section of bits
• Timing: When data should sent and how fast?
Standards are agreed rules.
• Essential for creating and maintaining an open and competitive
market for equipment manufactures.
• For national and international interoperability.
• De facto standards: Not been approved by an organized body but
have been adopted as standards through widespread use.
53
Protocols and Standards
• Standard Organizations
▪ Standard Creation Committees
• ISO (International Standard Organization)
• International Telecommunication Union-Telecommunication Standards Sector (ITU-T)
• American National Standards Institute (ANSI)
• Institute of Electrical and Electronics Engineers (IEEE)
• Electronic Industries Association (EIA)
▪ Forums
▪ Regulatory Agencies: FCC (Federal Communications Commissions)
• Internet Standards
▪ Internet draft: Lifetime of only 6 month
▪ RFC (Request for Comment): After recommendation from internet authorities, draft will be
converted to RFC.
54
RFCs
• A Request for Comments (RFC) is a formal document from the Internet
Engineering Task Force (IETF) that contains specifications and organizational
notes about topics related to the internet and computer networking, such
as routing, addressing and transport technologies
• An IETF RFC begins with an initial draft, referred to as the Internet-Draft
(I-D). This draft is typically created by an individual or small group. The I-D
is then adopted by a working group that reviews, improves and revises the
document's content.
• RFCs are produced primarily by the Internet Architecture
Board (IAB), Internet Research Task Force (IRTF) and IETF
• After an RFC has gone through the review and revision process, it receives a
final review for errors, as well as for style and editorial issues. Once a
satisfactory document is produced, the RFC Production Center (RPC) assigns
a unique number to the RFC and publishes it through the RFC Editor.
55
OSI Model
• Open Systems Interconnection (OSI) model developed by ISO in 1986.
• It is framework not practically implemented like TCP/IP model.
• It contain 7 layers.
• Upper3 layer is Software layer, below 3 layer is Hardware layer and
middle 1 is heart of OSI model.
• The
modern Internet is not based on OSI, but on the simpler TCP/IP
model.
• Ithelps visualize and communicate how networks operate, and helps
isolate and troubleshoot networking problems.
56
Seven Layers of OSI
57
Interaction between Layers
58
Physical Layer
60
Data Link Layer
• In the OSI model, the data link layer is a 4th layer from the top
and 2nd layer from the bottom.
• The main work of the data link layer is to convert the data into
the form of frames.
62
Function of Data Link Layer
• The data link layer is responsible for moving frames from one
hop (node) to the next
• Framing
• Physical addressing
63
Network Layer
• Network Layer is layer 3 of the OSI reference model.
• Thenetwork layer is responsible for the delivery of individual
packets from the source host to the destination host.
• The network layer breaks the larger packets into small packets.
64
Function of Network Layer
• Logical addressing
• Routing
• Source-to-destination delivery
65
Network Layer
66
Transport Layer
• In OSI suite, there are 7 layers and all layers provide different services.
• The main role of the transport layer is to provide the communication services
directly to the application processes running on different hosts.
• It provides with end to end connection between the source and the destination
and reliable delivery of the services.
• It provides services as error correction as well as segmenting and
desegmenting data before and after it's sent on the network.
• It also provides the flow control functionality and ensures that segmented
data is delivered across the network in the right sequence.
67
Function of Transport Layer
• The Process to Process Delivery
• End-to-End Connection between Hosts
• Multiplexing and Demultiplexing
• Congestion Control
• Data integrity and Error correction
• Flow control
68
Session Layer
71
Presentation Layer
• Translation
• Compression
• Encryption.
72
Presentation Layer
• The presentation layer prepares data for the application layer.
• It
takes care that the data is sent in such a way that the receiver
will understand the information(data) and will be able to use the
data.
• It
defines how two devices should encode, encrypt, and compress
data so it is received correctly on the other end.
• Example of Protocols SSL, HTTP/ HTML (agent), FTP (server),
AppleTalk Filing Protocol,Telnet, and so on.
73
Functions of Presentation Layer
1. Translation It translates data between the formats the network
requires and the format the computer.
2. Encryption encryption at the transmitter and decryption at the
receiver.
3. Compression data compression to reduce the bandwidth.
74
Application Layer
75
Application Layer
• Provides a user interface for the users to interact with
application services or network services.
• This layer allows users to send data, access data and use
networks.
• Some service of Application layer web browsing, transferring
files, logging in remotely and emailing clients.
• Users interact with programs and communicate with each
other at the application layer.
• People use the application layer to fill out website forms, use
email services or engage in live chat sessions online.
• Examples of application layer protocols are HTTP, FTP, POP,
SMTP, and DNS.
76
Function of Application Layer
• Synchronizing communication:
77
Summary of OSI Model
78
TCP/IP Protocol Suite
• TCP stands for "Transmission Control Protocol" and IP stands for
"Internet Protocol".
• TCP/IP Reference Model is a four-layered suite of communication
protocols.
• It was developed by the DoD (Department of Defence) in the
1960s.
• It is named after the two main protocols that are used in the model,
namely, TCP and IP.
• Practically implemented and used in network.
79
TCP/IP Protocol Suite
• The layers in the TCP/IP protocol
suite do not exactly match those in
the OSI model.
• The original TCP/IP protocol suite
was defined as having four layers:
host-to-network, internet, transport,
and application.
• However, when TCP/IP is compared
to OSI, the TCP/IP protocol suite is
made of five layers:
• physical, data link, network,
transport, and application.
80
TCP/IP Protocol Suite
81
Application Layer
• Application layer interacts with an application program.
82
Transport Layer
• Transport layer helps you to control the reliability of a link through
flow control, error control, and segmentation or de-segmentation.
• It also makes sure that the entire message arrives without any error
else it should be retransmitted.
83
Internet Layer
• It is also known as a network layer.
• It is responsible for selecting the path that the data packets will use for
transmission.
• The main work of this layer is to send the packets from any network.
84
Host-to-network layer
• It is also called a network interface layer or link layer.
• It
can be considered as the combination of physical layer and
data link layer of the OSI model.
85
Comparison of OSI and TCP/IP reference model
Sr. OSI reference Model TCP/IP reference model
No
1 TCP/IP model represents the Transmission
OSI represents Open System Interconnection
Control Protocol / Internet Protocol.
2 It contains 7 layers It contains 4 layers
3 It is vertically approached. It is horizontally approached.
4
Delivery of the package is not guaranteed in
Delivery of the package is guaranteed in OSI Model.
TCP/IP Model.
5 It distinguishes between Service, Interface and Does not clearly distinguishes between Service,
Protocol Interface and Protocol
6 OSI model has been developed by ISO (International It was developed by ARPANET i.e. Department
Standard Organization). of defense in USA.
7 Presentation and session layers are present in OSI Presentation and session layers are not present in
model. OSI model.
86
Comparison of OSI and TCP/IP reference model
Sr.
OSI reference Model TCP/IP reference model
No
The smallest size of the OSI header is 5 The smallest size of the TCP/IP header is
10
bytes. 20 bytes.
87
Analog & Digital Signals
Signal
• When data is send over physical media it needs to first convert
into electromagnetic signal.
• Signal types
1. Analog signal Example is Human Voice
2. Digital signal Example is document, video, pdf etc
88
Analog & Digital Signals
Analog Signal
• Analog signals were used in many systems to produce signals
to carry information.
• These signals are continuous in both values and time.
89
Analog & Digital Signals
Digital Signal
• Digital signals were used in many systems to produce
signals to carry information.
• These signals are non-continuous in both values and time.
• But signals are discrete in value and time.
90
Difference between Analog and Digital Signal
Human voice, natural sound, analog Computers, optical drives, and other
electronic devices are a few examples electronic devices
92
Attenuation
Attenuation means the loss of energy, i.e., the strength of the signal
decreases with increasing the distance which causes the loss of
energy.
93
Distortion
94
Noise
• When data is travelled over a transmission medium, some unwanted signal is
added to it which creates the noise.
• Thermal noise, induced noise, crosstalk, and impulse noise
95
References
96