SlideShare a Scribd company logo
1 of 101
Computer Networks 06.01.2016- 1
Computer Engineering and Applications
CSE4003: CN
Computer Networks:
Introduction
Dr. Manas Kumar Mishra
manas.mishra@gla.ac.in
Computer Networks 06.01.2016- 2
CSE4003 Computer Networks: Course Overview
UNIT I
Introduction Concepts: Goals and Applications of Networks, Network structure and
architecture, The OSI reference model, services, Network Topology Design, connecting
devices,
Physical Layer: Transmission Media, Line coding scheme, Basic idea of modulation and
multiplexing, Switching methods.
Medium Access sub layer: Medium Access sub layer - Channel Allocations, LAN protocols -
ALOHA protocols, CSMA, CSMA/CD, Overview of IEEE standards
UNIT II
Data Link Layer: HDLC and point to point protocol, Error detection and correction, Flow
control (sliding window protocol)
Network Layer: Network Layer –IP addressing, Internetworking, Address mapping,
introduction to IPv6, transition from IPv4 to IPv6, routing.
UNIT III
Transport Layer: Transport Layer - Design issues, connection management, Flow control, TCP
window management, congestion control-slow start algorithm
Session Layer: Design issues, remote procedure call.
Presentation Layer: Design issues, Data compression techniques, cryptography
Application Layer: Application Layer: File Transfer, Access and Management, Electronic mail,
Virtual Terminals
Computer Networks 06.01.2016- 3
Literature I
This is a good textbook for
introductory courses to
networking.
The chapters include
detailed yet easy to grasp
explanations of the topics
covered, often with figures
and demonstrations.
Computer Networks 06.01.2016- 4
Literature II
This is a good book both as
an introduction to networking
and as a reference for
graduate coursework.
Good end-of-chapter
questions, with text depth
appropriate for a smart child
or an average 2nd year CS
undergrad.
Computer Networks 06.01.2016- 5
Literature III
This is a book with an early
emphasis on application-layer
paradigms and application
programming interfaces (the
top layer), encouraging a
hands-on experience with
protocols and networking
concepts, before working
down the protocol stack to
more abstract layers.
Computer Networks 06.01.2016- 6
Literature IV
The book takes a structured
approach to explaining how
networks work from the inside out.
It starts with an explanation of the
physical layer of networking,
computer hardware and
transmission systems; then works its
way up to network applications.
It presents key principles, then
illustrates them utilizing real-world
example networks that run through
the entire book.
Computer Networks 06.01.2016- 7
Literature V
This new networking text
follows a top-down approach.
The presentation begins with
an explanation of the
application layer, which makes
it easier for students to
understand how network
devices work, and then, with
the students fully engaged, the
authors move on to discuss
the other layers, ending with
the physical layer.
Computer Networks 06.01.2016- 8
Computer Networks
A network consists of two or more computers that are linked in order to share
resources (such as printers and CDs), exchange files, or allow electronic
communications.
The computers on a network may be linked through cables, telephone lines, radio
waves, satellites etc.
A popular example of a computer network is the Internet, which allows millions of
users to share information.
Computer Networks 06.01.2016- 9
1st goal: Resource Sharing
The goal is to make all programs, equipment, and especially data available to anyone
on the network without regard to the physical location of the resource and the user.
Equipment:
Printers, Scanner, CD-Burners…
Information:
Customer records, Product information ,inventories, financial statements, tax
information
Computer Networks 06.01.2016- 10
2nd goal: A Computer network to do
with people
A second goal of setting up a computer network has to do with people rather than
information or even computers. A computer network can provide a powerful
communication medium among employees.
Email
Cooperate with other to work
VoIP
Videoconferencing
Computer Networks 06.01.2016- 11
3rd goal: e-Commerce
A third goal for many companies is doing business electronically with other
companies, especially suppliers and customers.
e-Commerce
B2B: Manufacturers and its suppliers.
B2C: companies and its customers.
Computer Networks 06.01.2016- 12
Advantages of Computer Networks
File Sharing: Networks offer a quick and easy way to share files directly.
Resource Sharing: All computers in the network can share resources such as printers,
fax machines, modems and scanners.
Communication: Those on the network can communicate with each other via e-mail,
instant messages etc.
Flexible Access: Networks allow their users to access files from computers
throughout the network.
Sharing of Information: Computer networks enable us to share data and information
with the computers that are located geographically large distance apart.
Computer Networks 06.01.2016- 13
Evolution of computer networks
Computer Networks 06.01.2016- 14
Network Technologies
Classification Based on Transmission Technology
Broadcast networks
Broadcast network have a single
communication channel that is shared by
all the machines on the network
Point-to-point networks
There may exist multiple paths between a
source-destination pair and the switching nodes are
to provide a switching facility that will move data from
node to node until they reach the destination.
Computer Networks 06.01.2016- 15
Network Technologies
Classification Based on Scale
Local Area Network (LAN)
Metropolitan Area Network (MAN)
Wide Area Networks (WAN)
Computer Networks 06.01.2016- 16
Local Area Network (LAN)
LAN is usually privately owned and links the devices in a single office, building or
campus of up to few kilometers in size.
LANs are distinguished from other kinds of networks by three categories: their size,
transmission technology and topology.
LANs are restricted in size
which means that their worst-case transmission time is bounded and known in
advance. Hence is more reliable as compared to MAN and WAN. Knowing this
bound makes it possible to use certain kinds of design that would not otherwise be
possible. It also simplifies network management.
LAN typically uses transmission technology consisting of single cable to which all
machines are connected.
Traditional LANs run at speeds of 10 to 100 Mbps (but now much higher speeds
can be achieved).
The most common LAN topologies are bus, ring and star.
Computer Networks 06.01.2016- 17
Local Area Network (LAN)
Computer Networks 06.01.2016- 18
Metropolitan Area Networks (MAN)
MAN is designed to extend over the entire city.
It may be a single network as a cable TV network or it may be means of connecting a
number of LANs into a larger network so that resources may be shared.
MAN is wholly owned and operated by a private company or may be a service
provided by a public company.
The main reason for distinguishing MANs as a special category is that a standard has
been adopted for them. It is DQDB (Distributed Queue Dual Bus) or IEEE 802.6.
Computer Networks 06.01.2016- 19
Metropolitan Area Networks (MAN)
Computer Networks 06.01.2016- 20
Wide Area Network (WAN)
WAN provides long-distance transmission of data, voice, image and information over
large geographical areas that may comprise a country, continent or even the whole
world.
WANs may utilize public, leased or private communication devices, usually in
combinations, and can therefore span an unlimited number of miles.
A WAN that is wholly owned and used by a single company is often referred to as
enterprise network.
Computer Networks 06.01.2016- 21
Wide Area Network (WAN)
Computer Networks 06.01.2016- 22
Internet – network of networks
Internet is a collection of networks or network of networks.
The basic difference between WAN and Internet is that WAN is owned by a single
organization while internet is not so.
Computer Networks 06.01.2016- 23
Personal Area Network (PAN)
PAN is a computer network used for communication among computer
devices, including telephones and personal digital assistants, in proximity to
an individual's body.
 The devices may or may not belong to the person in question.
The reach of a PAN is typically a few meters.
Computer Networks 06.01.2016- 24
Personal Area Network (PAN)
Computer Networks 06.01.2016- 25
Classification by scale
Computer Networks 06.01.2016- 26
Network Computing Models
Centralized Computing
(Client-Server Network)
A client-server network is where every client is connected to the server .
Server or mainframe computer has huge storage and processing capabilities.
Computer Networks 06.01.2016- 27
Network Computing Models
Distributed Computing
(Peer-to-Peer Network)
All devices have same power.
It interconnects one or more computers.
Centralized backup is not possible.
Computer Networks 06.01.2016- 28
Simultaneous Access
 Shared Peripheral Devices
 Personal Communication
 Easier Backup
Uses of Computer Network
Computer Networks 06.01.2016- 29
Home Applications
Access to remote information
Web
Person-to-person communication
Email, VoIP
e-commerce
Interactive entertainment
IPTV, Gaming E-mail
P2P - Peer to Peer
Other applications
Ubiquitous computing
IoT ( Internet of Things)
Sensor Networks
RFID (Radio Frequency IDentification)
Mobile Users
SoLoMo
Applications of networks
Computer Networks 06.01.2016- 30
Every Network Includes:
1.At least two computers that have something to share.
1.A cable or wireless pathway, called Transmission Media, for computers to signal each
other.
1.Rules, called Protocols, so that computers can use the unified principle of data
communication.
1.Networking Interface Cards (NIC)
Computer Networks 06.01.2016- 31
Protocol Stack
Why Layered architecture?
1.To make the design process easy by breaking unmanageable tasks into several
smaller and manageable tasks (by divide-and-conquer approach).
1.Modularity and clear interfaces, so as to provide comparability between the
different providers' components.
1.Ensure independence of layers, so that implementation of each layer can be changed
or modified without affecting other layers.
1.Each layer can be analyzed and tested independently of all other layers.
Computer Networks 06.01.2016- 32
Open System Interconnection (OSI)
Reference Model
Developed by International Organization for Standardization (ISO) in 1984
Computer Networks 06.01.2016- 33
Terminologies
A protocol
is a formal set of rules and conventions that governs how computers exchange
information over a network medium.
the service user, the service provider, and the service access point (SAP)
Computer Networks 06.01.2016- 34
Interaction between OSI Model Layers
Computer Networks 06.01.2016- 35
Analogy of Protocol Hierarchies:
The philosopher-translator-secretary architecture
Computer Networks 06.01.2016- 36
Virtual Communication: Sino-US Talk
Computer Networks 06.01.2016- 37
OSI Layers
Computer Networks 06.01.2016- 38
Terminologies
Header:
Upper layer puts a header in front of the message to identify the message and
passes the result to lower layer
The header includes control information such as sequence numbers to keep the
right order.
Size of messages
There is always a limit to the size of messages imposed by certain layer protocol.
So incoming messages must be broken into smaller units (packets) in this layer.
Computer Networks 06.01.2016- 39
Information Flow
Computer Networks 06.01.2016- 40
Example: Path of a Web page request &
Encapsulation
Computer Networks 06.01.2016- 41
An Exchange Using the OSI Model
Computer Networks 06.01.2016- 42
Physical Layer
Computer Networks 06.01.2016- 43
Physical Layer
Purpose
Transmits raw bits across a medium.
Concerns are
Voltage: how many volts for 1 / 0
Timing: how many ns a bit lasts
Duplexing: transmission in both directions?
Connectors: how many pins? What is each pin?
etc.
Computer Networks 06.01.2016- 44
Data Link Layer
Computer Networks 06.01.2016- 45
Data Link Layer
Purpose:
Transform a raw transmission line into a line that appears free of undetected
transmission errors to the networks layer
Concerns:
Framing - Breaks apart input data into frames and transmit the frames
sequentially.
Error handling – if the service is reliable, the receiver confirms correct receipt of
each frame by sending back an acknowledgement frame.
Flow control - keeps a fast transmitter from drowning a slow receiver in data.
Medium Access Control – how to control access to the shared channel for
broadcast networks.
Computer Networks 06.01.2016- 46
Data Link Layer Example
Computer Networks 06.01.2016- 47
Network Layer
Computer Networks 06.01.2016- 48
Network Layer
Purpose
Route packets from source to destination
Concerns
Routing - What path is followed by packets from source to destination. Can be
based on a static table, can be determined when the connection is created, or can
be highly dynamic, being determined anew for each packet, to reflect the current
network load.
Congestion - Controls the number packets in the subnet.
QoS – Quality of Service provided (delay, transit time, jitter…)
Heterogeneity - Interfacing so that one type of network can talk to another.
Addressing, packet size, protocols…
Computer Networks 06.01.2016- 49
12 Jan
Computer Networks 06.01.2016- 50
Transport Layer
Computer Networks 06.01.2016- 51
Transport Layer
Purpose
Accept data from above it, split it up into smaller units if need be, pass them to
network layer, and ensure that the pieces all arrive correctly at the other end.
Concerns
Service Decisions - What type of service to provide; error-free point to point,
datagram, etc.
End-to-end: it carries data all the way from the source to the destination.
Reliability - Ensures that packets arrive at their destination. Reassembles out of
order messages.
Hides network - Allows details of the network to be hidden from higher level
layers.
Mapping - Determines which messages belong to which connections.
Flow control - keeps a fast transmitter from flooding a slow receiver.
Computer Networks 06.01.2016- 52
Session Layer
Computer Networks 06.01.2016- 53
Session Layer
Purpose
Allow users on different machines to establish sessions between them
Concerns
Dialog control - keep track of whose turn it is to transmit
Token Management – prevent two parties from attempting the same critical
operation at the same time
Synchronization – checkpointing long transmissions to allow them to pick up
from where they left off in the event of a crash and subsequent recovery.
Computer Networks 06.01.2016- 54
Presentation Layer
Computer Networks 06.01.2016- 55
Presentation Layer
Purpose
Make it possible for computers with different data representations to
communicate
Concerns
Syntax and semantics of information transmitted.
Understands the nature of the data being transmitted. Converts ASCII/EBCDIC,
big endian/little endian
Computer Networks 06.01.2016- 56
Application Layer
Computer Networks 06.01.2016- 57
Application Layer
contains a variety of protocols that are commonly needed by users.
HTTP
FTP
SMTP
Computer Networks 06.01.2016- 58
The TCP/IP Reference Models
Link layer
Internet layer
Transport layer
Application layer
the key
a packet-switching network based on a connectionless layer that runs across different networks.
Computer Networks 06.01.2016- 59
The TCP/IP Reference Models
Computer Networks 06.01.2016- 60
Comparing OSI and TCP/IP Models
Concepts central to the OSI model
Services
Interfaces
Protocols
OSI has good definition of service, interface, and protocol as discussed before. Fits
well with object oriented programming concepts. Protocols are better hidden.
The TCP/IP model did not originally distinguish between service, interface, and
protocol.
With TCP/IP, the protocols came first; model was just a description of the protocols.
But then the model isn't good for any other protocols.
Computer Networks 06.01.2016- 61
Different philosophy
Which is first?
Reference Model
vs
Corresponding
protocols
Specific differences
Number of layers: 7 vs. 4
Connectionless vs. connection-oriented
OSI supports both in the network layer, but only Connection-oriented
communication in the transport layer
TCP/IP supports only connectionless mode in the network layer but supports
both in the transport layer, giving the users a choice.
Computer Networks 06.01.2016- 62
What is a Topology?
Network topologies describe the ways in which the elements of a network are
mapped. They describe the physical and logical arrangement of the network nodes.
The physical topology of a network refers to the configuration of cables, computers,
and other peripherals
Computer Networks 06.01.2016- 63
Different Types of Topologies
Bus Topology
Star Topology
Ring Topology
Mesh Topology
Tree Topology
Hybrid Topology
Computer Networks 06.01.2016- 64
Bus Topology
All the nodes (file server, workstations, and peripherals) on a bus topology are
connected by one single cable.
A bus topology consists of a main run of cable with a terminator at each end. All
nodes (file server, workstations, and peripherals) are connected to the linear cable.
Popular on LANs because they are inexpensive and easy to install.
Computer Networks 06.01.2016- 65
Bus Topology
Computer Networks 06.01.2016- 66
Bus Topology
Advantages of Bus Topology
It is Cheap, easy to handle and implement.
Require less cable
It is best suited for small networks.
Disadvantages of Bus Topology
The cable length is limited. This limits the number of stations that can be connected.
This network topology can perform well only for a limited number of nodes.

Computer Networks 06.01.2016- 67
Ring Topology
In a ring network, every device has exactly two neighbours for communication
purposes.
All messages travel through a ring in the same direction.
A failure in any cable or device breaks the loop and can take down the entire
network.
 To implement a ring network we use the Token Ring technology
A token, or small data packet, is continuously passed around the network. When a
device needs to transmit, it reserves the token for the next trip around, then attaches
its data packet to it.
Computer Networks 06.01.2016- 68
Ring Topology
Computer Networks 06.01.2016- 69
Ring Topology
Advantage of Ring Topology
Very orderly network where every device has access to the token and the
opportunity to transmit.
Easier to Manage than a Bus Network
Good Communication over long distances
Handles high volume of traffic
Disadvantages of Ring Topology
The failure of a single node of the network can cause the entire network to fail.
The movement or changes made to network nodes affects the performance of the
entire network.
Computer Networks 06.01.2016- 70
Star Topology
In a star network, each node (file server, workstations, and peripherals) is connected
to a central device called a hub.
The hub takes a signal that comes from any node and passes it along to all the other
nodes in the network.
Data on a star network passes through the hub, switch, or concentrator before
continuing to its destination.
The hub, switch, or concentrator manages and controls all functions of the network.
The star topology reduces the chance of network failure by connecting all of the
systems to a central node.
Computer Networks 06.01.2016- 71
Star Topology
Computer Networks 06.01.2016- 72
Star Topology
Advantages of Star Topology
Easy to manage
Easy to locate problems (cable/workstations)
Easier to expand than a bus or ring topology.
Easy to install and wire.
Easy to detect faults and to remove parts.
Disadvantages of Star Topology
Requires more cable length than a linear topology.
If the hub or concentrator fails, nodes attached are disabled.
More expensive because of the cost of the concentrators.
Computer Networks 06.01.2016- 73
Tree Topology
A tree topology (hierarchical topology) can be viewed as a collection of star
networks arranged in a hierarchy.
 This tree has individual peripheral nodes which are required to transmit to and
receive from one other only and are not required to act as repeaters or regenerators.
The tree topology arranges links and nodes into distinct hierarchies in order to allow
greater control and easier troubleshooting.
This is particularly helpful for colleges, universities and schools so that each of the
connect to the big network in some way.
Computer Networks 06.01.2016- 74
Tree Topology
Computer Networks 06.01.2016- 75
Tree Topology
Advantages of a Tree Topology
Point-to-point wiring for individual segments.
Supported by several hardware and software vendors.
All the computers have access to the larger and their immediate networks.
Disadvantages of a Tree Topology
Overall length of each segment is limited by the type of cabling used.
If the backbone line breaks, the entire segment goes down.
More difficult to configure and wire than other topologies.
Computer Networks 06.01.2016- 76
Mesh Topology
In this topology, each node is connected to every other node in the network.
Implementing the mesh topology is expensive and difficult.
In this type of network, each node may send message to destination through
multiple paths.
While the data is travelling on the Mesh Network it is automatically configured to
reach the destination by taking the shortest route which means the least number of
hops.
Computer Networks 06.01.2016- 77
Mesh Topology
Computer Networks 06.01.2016- 78
Mesh Topology
Advantage of Mesh Topology
No traffic problem as there are dedicated links.
It has multiple links, so if one route is blocked then other routes can be used for data
communication.
Points to point links make fault identification easy.

Disadvantage of Mesh Topology
There is mesh of wiring which can be difficult to manage.
Installation is complex as each node is connected to every node.
Cabling cost is high.
Computer Networks 06.01.2016- 79
Hybrid Topology
A combination of any two or more network topologies.
A hybrid topology always accrues when two different basic network topologies are
connected.
It is a mixture of above mentioned topologies. Usually, a central computer is
attached with sub-controllers which in turn participate in a variety of topologies
Computer Networks 06.01.2016- 80
Hybrid Topology
Computer Networks 06.01.2016- 81
Hybrid Topology
Advantages of a Hybrid Topology
It is extremely flexible.
It is very reliable.
Disadvantages of a Hybrid Topology
Expensive
Computer Networks 06.01.2016- 82
Networking hardware includes all computers, peripherals, interface
cards and other equipment needed to perform data-processing and
communications within the network.
What is Networking Hardware?
Computer Networks 06.01.2016- 83
Networking Hardware
Network Interface Card
Hub
Repeater
Bridge
Switch
Gateway
Computer Networks 06.01.2016- 84
Network Interface Cards
Network interface cards, commonly referred to as NICs, are used to connect a PC to
a network.
 The NIC provides a physical connection between the networking cable and the
computer's internal bus.
Different computers have different bus architectures; PCI bus master slots are most
commonly found on 486/Pentium PCs and ISA expansion slots are commonly found
on 386 and older PCs.
NICs come in three basic varieties: 8-bit, 16-bit, and 32-bit. The larger the number
of bits that can be transferred to the NIC, the faster the NIC can transfer data to the
network cable.
Computer Networks 06.01.2016- 85
Network Interface Cards
Computer Networks 06.01.2016- 86
Hubs
A hub joins multiple computers (or other network devices) together to form a
single network.
On this network, all computers can communicate directly with each other.
The networking hub is a junction box with several ports in the back for receiving
the Ethernet cables that are plugged into each computer on the LAN.
Computer Networks 06.01.2016- 87
Types of Hubs
A passive hub serves simply as a passage for the data, enabling it to go from one
device to another.
Intelligent hub include additional features that enables an administrator to
monitor the traffic passing through the hub and to configure each port in the hub.
Switching hub, actually reads the destination address of each packet and then
forwards the packet to the correct port.
Computer Networks 06.01.2016- 88
Hubs
Computer Networks 06.01.2016- 89
Repeater
Since a signal loses strength as it passes along a cable, it is often necessary to boost
the signal with a device called a repeater.
A repeater is an electronic device that receives a signal, cleans it of unnecessary
noise, regenerates it, and retransmits it at a higher power level so that the signal can
cover longer distances without degradation.
A good example of the use of repeaters would be in a local area network using a
star topology with unshielded twisted-pair cabling.
Computer Networks 06.01.2016- 90
Repeaters
Computer Networks 06.01.2016- 91
Switch
A network switch is a small hardware device that joins multiple computers
together within one local area network (LAN).
Network switches appear nearly identical to network hubs, but a switch generally
contains more intelligence than a hub.
Unlike hubs, network switches are capable of inspecting data packets as they are
received, determining the source and destination device of each packet, and
forwarding them appropriately.
Allow several users to send information over a network at the same time without
slowing each other down.
Computer Networks 06.01.2016- 92
Switch
Computer Networks 06.01.2016- 93
Router
A device to interconnect SIMILAR networks, e.g. similar protocols and workstations
and servers.
A router is an electronic device that interconnects two or more computer
networks, and selectively interchanges packets of data between them.
Each data packet contains address information that a router can use to determine
if the source and destination are on the same network, or if the data packet must be
transferred from one network to another.
Computer Networks 06.01.2016- 94
Router
Computer Networks 06.01.2016- 95
Bridge
A bridge is a device that connects a local area network (LAN) to another local area
network that uses the same protocol (for example, Ethernet or token ring).
The function of a bridge is to connect separate networks together. Bridges connect
different networks types (such as Ethernet and Fast Ethernet) or networks of the
same type.
Bridges map the Ethernet addresses of the nodes residing on each network
segment and allow only necessary traffic to pass through the bridge. When a packet
is received by the bridge, the bridge determines the destination and source
segments.
Computer Networks 06.01.2016- 96
Types of Bridges
Bridges come in three basic types:
Local bridges: Directly connect local area networks (LANs)
Remote bridges: Can be used to create a wide area network (WAN) link between
LANs. Remote bridges have been replaced with routers.
Wireless bridges: Can be used to join LANs or connect remote stations to LANs.
Computer Networks 06.01.2016- 97
Bridges
Computer Networks 06.01.2016- 98
Gateway
Gateways are used to interconnect two different networks having different
protocols.
Networks using different protocols use different addressing formats.
A gateway is a network point that acts as an entrance to another network.
Gateways are also called protocol converters.
Computer Networks 06.01.2016- 99
Gateway
Computer Networks 06.01.2016- 100
What is the difference?
Bridge: device to interconnect two LANs that use the SAME logical link control
protocol but may use different medium access control protocols.
Router: device to interconnect SIMILAR networks, e.g. similar protocols and
workstations and servers.
Gateway: device to interconnect DISSIMILAR protocols and servers, and Macintosh
and IBM LANs and equipment
Computer Networks 06.01.2016- 101
Computer Engineering and Applications
Thank you.
Computer Networks
Dr. Manas Kumar Mishra
manas.mishra@gla.ac.in
06.01.2016

More Related Content

What's hot

Ppt for tranmission media
Ppt for tranmission mediaPpt for tranmission media
Ppt for tranmission mediaManish8976
 
wireless network IEEE 802.11
 wireless network IEEE 802.11 wireless network IEEE 802.11
wireless network IEEE 802.11Shreejan Acharya
 
Networking concepts
Networking conceptsNetworking concepts
Networking conceptsritajindal2
 
Unit 1 introduction to computer networks
Unit 1  introduction to computer networksUnit 1  introduction to computer networks
Unit 1 introduction to computer networkspavan kumar Thatikonda
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networkingMayank Jain
 
Basics Of Networking (Overview)
Basics Of Networking (Overview)Basics Of Networking (Overview)
Basics Of Networking (Overview)ashiesh0007
 
Topic: ISDN (Integrated Services Digital Network)
Topic: ISDN (Integrated Services Digital Network)Topic: ISDN (Integrated Services Digital Network)
Topic: ISDN (Integrated Services Digital Network)Dr Rajiv Srivastava
 
Networking Fundamentals
Networking  FundamentalsNetworking  Fundamentals
Networking FundamentalsManjit Chavda
 
Types of Network
Types of NetworkTypes of Network
Types of NetworkAvishek Kar
 
Guided and unguided media
Guided and unguided mediaGuided and unguided media
Guided and unguided mediaHassan Osama
 
Transmission Medium
Transmission MediumTransmission Medium
Transmission Mediumsabari Giri
 
Computer networking devices
Computer networking devicesComputer networking devices
Computer networking devicesRajesh Sadhukha
 
MEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROLMEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROLjunnubabu
 
Wireless network ppt
Wireless network pptWireless network ppt
Wireless network pptBasil John
 
Three types of wireless technology
Three types of wireless technologyThree types of wireless technology
Three types of wireless technologyRashmi Joaa
 
W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)Parvesh Taneja
 

What's hot (20)

Ppt for tranmission media
Ppt for tranmission mediaPpt for tranmission media
Ppt for tranmission media
 
Networking Devices
Networking DevicesNetworking Devices
Networking Devices
 
wireless network IEEE 802.11
 wireless network IEEE 802.11 wireless network IEEE 802.11
wireless network IEEE 802.11
 
Networking concepts
Networking conceptsNetworking concepts
Networking concepts
 
Unit 1 introduction to computer networks
Unit 1  introduction to computer networksUnit 1  introduction to computer networks
Unit 1 introduction to computer networks
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networking
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
Basics Of Networking (Overview)
Basics Of Networking (Overview)Basics Of Networking (Overview)
Basics Of Networking (Overview)
 
Topic: ISDN (Integrated Services Digital Network)
Topic: ISDN (Integrated Services Digital Network)Topic: ISDN (Integrated Services Digital Network)
Topic: ISDN (Integrated Services Digital Network)
 
Networking Fundamentals
Networking  FundamentalsNetworking  Fundamentals
Networking Fundamentals
 
Types of Network
Types of NetworkTypes of Network
Types of Network
 
Guided and unguided media
Guided and unguided mediaGuided and unguided media
Guided and unguided media
 
Transmission Medium
Transmission MediumTransmission Medium
Transmission Medium
 
Computer networking devices
Computer networking devicesComputer networking devices
Computer networking devices
 
MEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROLMEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROL
 
Wireless network ppt
Wireless network pptWireless network ppt
Wireless network ppt
 
Three types of wireless technology
Three types of wireless technologyThree types of wireless technology
Three types of wireless technology
 
WIRELES NETWORK
WIRELES NETWORKWIRELES NETWORK
WIRELES NETWORK
 
W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)
 
Lan network
Lan networkLan network
Lan network
 

Similar to Computer Network Complete Introduction

Types of Networks,Network Design Issues,Design Tools
Types of Networks,Network Design Issues,Design ToolsTypes of Networks,Network Design Issues,Design Tools
Types of Networks,Network Design Issues,Design ToolsSurabhi Gosavi
 
Computer Networks By NADEEM AHMED
Computer Networks By NADEEM AHMED Computer Networks By NADEEM AHMED
Computer Networks By NADEEM AHMED NA000000
 
Computer networking project
Computer networking projectComputer networking project
Computer networking projectAshifimrankhan1
 
Presentation for slideshare
Presentation for slidesharePresentation for slideshare
Presentation for slideshareBSITstudents
 
Computer network
Computer networkComputer network
Computer networkAnupan Jain
 
Katie & toms_computer_network_project
Katie & toms_computer_network_projectKatie & toms_computer_network_project
Katie & toms_computer_network_projectkatiettoml
 
Summarize the purpose of a WAN and define what makes up a WAN connec.pdf
Summarize the purpose of a WAN and define what makes up a WAN connec.pdfSummarize the purpose of a WAN and define what makes up a WAN connec.pdf
Summarize the purpose of a WAN and define what makes up a WAN connec.pdfFOREVERPRODUCTCHD
 
Fundamentals of Computer Networking - Shift Education of Technology
Fundamentals of Computer Networking - Shift Education of TechnologyFundamentals of Computer Networking - Shift Education of Technology
Fundamentals of Computer Networking - Shift Education of TechnologyRaphaff
 
Basic networking tutorial
Basic networking tutorialBasic networking tutorial
Basic networking tutorialreddydivakara
 
Seminar report-networking
Seminar report-networkingSeminar report-networking
Seminar report-networkingJyoti Kumari
 
Networking tutorial
Networking tutorialNetworking tutorial
Networking tutorialajaymane22
 

Similar to Computer Network Complete Introduction (20)

Types of Networks,Network Design Issues,Design Tools
Types of Networks,Network Design Issues,Design ToolsTypes of Networks,Network Design Issues,Design Tools
Types of Networks,Network Design Issues,Design Tools
 
Computer Networks By NADEEM AHMED
Computer Networks By NADEEM AHMED Computer Networks By NADEEM AHMED
Computer Networks By NADEEM AHMED
 
Computer networking project
Computer networking projectComputer networking project
Computer networking project
 
Presentation for slideshare
Presentation for slidesharePresentation for slideshare
Presentation for slideshare
 
Computer network
Computer networkComputer network
Computer network
 
Internet
InternetInternet
Internet
 
Katie & toms_computer_network_project
Katie & toms_computer_network_projectKatie & toms_computer_network_project
Katie & toms_computer_network_project
 
Summarize the purpose of a WAN and define what makes up a WAN connec.pdf
Summarize the purpose of a WAN and define what makes up a WAN connec.pdfSummarize the purpose of a WAN and define what makes up a WAN connec.pdf
Summarize the purpose of a WAN and define what makes up a WAN connec.pdf
 
Afeche nettech
Afeche nettechAfeche nettech
Afeche nettech
 
Lesson 1 introduction
Lesson 1 introductionLesson 1 introduction
Lesson 1 introduction
 
Fundamentals of Computer Networking - Shift Education of Technology
Fundamentals of Computer Networking - Shift Education of TechnologyFundamentals of Computer Networking - Shift Education of Technology
Fundamentals of Computer Networking - Shift Education of Technology
 
Introduction to computer_lec_05
Introduction to computer_lec_05Introduction to computer_lec_05
Introduction to computer_lec_05
 
Computer network 1
Computer network 1Computer network 1
Computer network 1
 
jaringan.pptx
jaringan.pptxjaringan.pptx
jaringan.pptx
 
Internet
InternetInternet
Internet
 
Computer network
Computer networkComputer network
Computer network
 
Basic networking tutorial
Basic networking tutorialBasic networking tutorial
Basic networking tutorial
 
Seminar report-networking
Seminar report-networkingSeminar report-networking
Seminar report-networking
 
1658897215230.pdf
1658897215230.pdf1658897215230.pdf
1658897215230.pdf
 
Networking tutorial
Networking tutorialNetworking tutorial
Networking tutorial
 

More from Ahmar Hashmi

32 Security in_Internet_IP_SEC_SSL/TLS_PGN_VPN_and_Firewalls
32 Security in_Internet_IP_SEC_SSL/TLS_PGN_VPN_and_Firewalls32 Security in_Internet_IP_SEC_SSL/TLS_PGN_VPN_and_Firewalls
32 Security in_Internet_IP_SEC_SSL/TLS_PGN_VPN_and_FirewallsAhmar Hashmi
 
31 Network Security
31 Network Security31 Network Security
31 Network SecurityAhmar Hashmi
 
28 Network Management_SNMP
28 Network Management_SNMP28 Network Management_SNMP
28 Network Management_SNMPAhmar Hashmi
 
26 Remote Logging_Electronic_Mail_and_File_Transfer
26 Remote Logging_Electronic_Mail_and_File_Transfer26 Remote Logging_Electronic_Mail_and_File_Transfer
26 Remote Logging_Electronic_Mail_and_File_TransferAhmar Hashmi
 
24 Congestion Control_and_Quality_of_Service
24 Congestion Control_and_Quality_of_Service24 Congestion Control_and_Quality_of_Service
24 Congestion Control_and_Quality_of_ServiceAhmar Hashmi
 
23 Process to_Process_Delivery_UDP_TCP_and_SCTP
23 Process to_Process_Delivery_UDP_TCP_and_SCTP23 Process to_Process_Delivery_UDP_TCP_and_SCTP
23 Process to_Process_Delivery_UDP_TCP_and_SCTPAhmar Hashmi
 
22 Network Layer_Delivery_forwarding_and_Routing
22 Network Layer_Delivery_forwarding_and_Routing22 Network Layer_Delivery_forwarding_and_Routing
22 Network Layer_Delivery_forwarding_and_RoutingAhmar Hashmi
 
21 Network Layer_Address_Mapping_Error_Reporting_and_Multicasting
21 Network Layer_Address_Mapping_Error_Reporting_and_Multicasting21 Network Layer_Address_Mapping_Error_Reporting_and_Multicasting
21 Network Layer_Address_Mapping_Error_Reporting_and_MulticastingAhmar Hashmi
 
20 Network Layer_Internet_Protocol
20 Network Layer_Internet_Protocol20 Network Layer_Internet_Protocol
20 Network Layer_Internet_ProtocolAhmar Hashmi
 
19 Network Layer_Logical_Addressing
19 Network Layer_Logical_Addressing19 Network Layer_Logical_Addressing
19 Network Layer_Logical_AddressingAhmar Hashmi
 
18 Virtual Circuit_Networks_Frame_Relay_and_ATM
18 Virtual Circuit_Networks_Frame_Relay_and_ATM18 Virtual Circuit_Networks_Frame_Relay_and_ATM
18 Virtual Circuit_Networks_Frame_Relay_and_ATMAhmar Hashmi
 
16 Wireless WANs_Cellular_Telephone_and_Satellite_Networks
16 Wireless WANs_Cellular_Telephone_and_Satellite_Networks16 Wireless WANs_Cellular_Telephone_and_Satellite_Networks
16 Wireless WANs_Cellular_Telephone_and_Satellite_NetworksAhmar Hashmi
 
15 Connecting LANs_Backbone_Networks_and_Virtual_LAN
15 Connecting LANs_Backbone_Networks_and_Virtual_LAN15 Connecting LANs_Backbone_Networks_and_Virtual_LAN
15 Connecting LANs_Backbone_Networks_and_Virtual_LANAhmar Hashmi
 
13 Wired Lans_Ethernet
13 Wired Lans_Ethernet13 Wired Lans_Ethernet
13 Wired Lans_EthernetAhmar Hashmi
 

More from Ahmar Hashmi (20)

32 Security in_Internet_IP_SEC_SSL/TLS_PGN_VPN_and_Firewalls
32 Security in_Internet_IP_SEC_SSL/TLS_PGN_VPN_and_Firewalls32 Security in_Internet_IP_SEC_SSL/TLS_PGN_VPN_and_Firewalls
32 Security in_Internet_IP_SEC_SSL/TLS_PGN_VPN_and_Firewalls
 
31 Network Security
31 Network Security31 Network Security
31 Network Security
 
30 Cryptography
30 Cryptography30 Cryptography
30 Cryptography
 
29 Multimedia
29 Multimedia29 Multimedia
29 Multimedia
 
28 Network Management_SNMP
28 Network Management_SNMP28 Network Management_SNMP
28 Network Management_SNMP
 
27 WWW and_HTTP
27 WWW and_HTTP27 WWW and_HTTP
27 WWW and_HTTP
 
26 Remote Logging_Electronic_Mail_and_File_Transfer
26 Remote Logging_Electronic_Mail_and_File_Transfer26 Remote Logging_Electronic_Mail_and_File_Transfer
26 Remote Logging_Electronic_Mail_and_File_Transfer
 
25 DNS
25 DNS25 DNS
25 DNS
 
24 Congestion Control_and_Quality_of_Service
24 Congestion Control_and_Quality_of_Service24 Congestion Control_and_Quality_of_Service
24 Congestion Control_and_Quality_of_Service
 
23 Process to_Process_Delivery_UDP_TCP_and_SCTP
23 Process to_Process_Delivery_UDP_TCP_and_SCTP23 Process to_Process_Delivery_UDP_TCP_and_SCTP
23 Process to_Process_Delivery_UDP_TCP_and_SCTP
 
22 Network Layer_Delivery_forwarding_and_Routing
22 Network Layer_Delivery_forwarding_and_Routing22 Network Layer_Delivery_forwarding_and_Routing
22 Network Layer_Delivery_forwarding_and_Routing
 
21 Network Layer_Address_Mapping_Error_Reporting_and_Multicasting
21 Network Layer_Address_Mapping_Error_Reporting_and_Multicasting21 Network Layer_Address_Mapping_Error_Reporting_and_Multicasting
21 Network Layer_Address_Mapping_Error_Reporting_and_Multicasting
 
20 Network Layer_Internet_Protocol
20 Network Layer_Internet_Protocol20 Network Layer_Internet_Protocol
20 Network Layer_Internet_Protocol
 
19 Network Layer_Logical_Addressing
19 Network Layer_Logical_Addressing19 Network Layer_Logical_Addressing
19 Network Layer_Logical_Addressing
 
18 Virtual Circuit_Networks_Frame_Relay_and_ATM
18 Virtual Circuit_Networks_Frame_Relay_and_ATM18 Virtual Circuit_Networks_Frame_Relay_and_ATM
18 Virtual Circuit_Networks_Frame_Relay_and_ATM
 
17 SONET/SDH
17 SONET/SDH17 SONET/SDH
17 SONET/SDH
 
16 Wireless WANs_Cellular_Telephone_and_Satellite_Networks
16 Wireless WANs_Cellular_Telephone_and_Satellite_Networks16 Wireless WANs_Cellular_Telephone_and_Satellite_Networks
16 Wireless WANs_Cellular_Telephone_and_Satellite_Networks
 
15 Connecting LANs_Backbone_Networks_and_Virtual_LAN
15 Connecting LANs_Backbone_Networks_and_Virtual_LAN15 Connecting LANs_Backbone_Networks_and_Virtual_LAN
15 Connecting LANs_Backbone_Networks_and_Virtual_LAN
 
14 Wireless LAN
14 Wireless LAN14 Wireless LAN
14 Wireless LAN
 
13 Wired Lans_Ethernet
13 Wired Lans_Ethernet13 Wired Lans_Ethernet
13 Wired Lans_Ethernet
 

Recently uploaded

Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxleah joy valeriano
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 

Recently uploaded (20)

Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 

Computer Network Complete Introduction

  • 1. Computer Networks 06.01.2016- 1 Computer Engineering and Applications CSE4003: CN Computer Networks: Introduction Dr. Manas Kumar Mishra manas.mishra@gla.ac.in
  • 2. Computer Networks 06.01.2016- 2 CSE4003 Computer Networks: Course Overview UNIT I Introduction Concepts: Goals and Applications of Networks, Network structure and architecture, The OSI reference model, services, Network Topology Design, connecting devices, Physical Layer: Transmission Media, Line coding scheme, Basic idea of modulation and multiplexing, Switching methods. Medium Access sub layer: Medium Access sub layer - Channel Allocations, LAN protocols - ALOHA protocols, CSMA, CSMA/CD, Overview of IEEE standards UNIT II Data Link Layer: HDLC and point to point protocol, Error detection and correction, Flow control (sliding window protocol) Network Layer: Network Layer –IP addressing, Internetworking, Address mapping, introduction to IPv6, transition from IPv4 to IPv6, routing. UNIT III Transport Layer: Transport Layer - Design issues, connection management, Flow control, TCP window management, congestion control-slow start algorithm Session Layer: Design issues, remote procedure call. Presentation Layer: Design issues, Data compression techniques, cryptography Application Layer: Application Layer: File Transfer, Access and Management, Electronic mail, Virtual Terminals
  • 3. Computer Networks 06.01.2016- 3 Literature I This is a good textbook for introductory courses to networking. The chapters include detailed yet easy to grasp explanations of the topics covered, often with figures and demonstrations.
  • 4. Computer Networks 06.01.2016- 4 Literature II This is a good book both as an introduction to networking and as a reference for graduate coursework. Good end-of-chapter questions, with text depth appropriate for a smart child or an average 2nd year CS undergrad.
  • 5. Computer Networks 06.01.2016- 5 Literature III This is a book with an early emphasis on application-layer paradigms and application programming interfaces (the top layer), encouraging a hands-on experience with protocols and networking concepts, before working down the protocol stack to more abstract layers.
  • 6. Computer Networks 06.01.2016- 6 Literature IV The book takes a structured approach to explaining how networks work from the inside out. It starts with an explanation of the physical layer of networking, computer hardware and transmission systems; then works its way up to network applications. It presents key principles, then illustrates them utilizing real-world example networks that run through the entire book.
  • 7. Computer Networks 06.01.2016- 7 Literature V This new networking text follows a top-down approach. The presentation begins with an explanation of the application layer, which makes it easier for students to understand how network devices work, and then, with the students fully engaged, the authors move on to discuss the other layers, ending with the physical layer.
  • 8. Computer Networks 06.01.2016- 8 Computer Networks A network consists of two or more computers that are linked in order to share resources (such as printers and CDs), exchange files, or allow electronic communications. The computers on a network may be linked through cables, telephone lines, radio waves, satellites etc. A popular example of a computer network is the Internet, which allows millions of users to share information.
  • 9. Computer Networks 06.01.2016- 9 1st goal: Resource Sharing The goal is to make all programs, equipment, and especially data available to anyone on the network without regard to the physical location of the resource and the user. Equipment: Printers, Scanner, CD-Burners… Information: Customer records, Product information ,inventories, financial statements, tax information
  • 10. Computer Networks 06.01.2016- 10 2nd goal: A Computer network to do with people A second goal of setting up a computer network has to do with people rather than information or even computers. A computer network can provide a powerful communication medium among employees. Email Cooperate with other to work VoIP Videoconferencing
  • 11. Computer Networks 06.01.2016- 11 3rd goal: e-Commerce A third goal for many companies is doing business electronically with other companies, especially suppliers and customers. e-Commerce B2B: Manufacturers and its suppliers. B2C: companies and its customers.
  • 12. Computer Networks 06.01.2016- 12 Advantages of Computer Networks File Sharing: Networks offer a quick and easy way to share files directly. Resource Sharing: All computers in the network can share resources such as printers, fax machines, modems and scanners. Communication: Those on the network can communicate with each other via e-mail, instant messages etc. Flexible Access: Networks allow their users to access files from computers throughout the network. Sharing of Information: Computer networks enable us to share data and information with the computers that are located geographically large distance apart.
  • 13. Computer Networks 06.01.2016- 13 Evolution of computer networks
  • 14. Computer Networks 06.01.2016- 14 Network Technologies Classification Based on Transmission Technology Broadcast networks Broadcast network have a single communication channel that is shared by all the machines on the network Point-to-point networks There may exist multiple paths between a source-destination pair and the switching nodes are to provide a switching facility that will move data from node to node until they reach the destination.
  • 15. Computer Networks 06.01.2016- 15 Network Technologies Classification Based on Scale Local Area Network (LAN) Metropolitan Area Network (MAN) Wide Area Networks (WAN)
  • 16. Computer Networks 06.01.2016- 16 Local Area Network (LAN) LAN is usually privately owned and links the devices in a single office, building or campus of up to few kilometers in size. LANs are distinguished from other kinds of networks by three categories: their size, transmission technology and topology. LANs are restricted in size which means that their worst-case transmission time is bounded and known in advance. Hence is more reliable as compared to MAN and WAN. Knowing this bound makes it possible to use certain kinds of design that would not otherwise be possible. It also simplifies network management. LAN typically uses transmission technology consisting of single cable to which all machines are connected. Traditional LANs run at speeds of 10 to 100 Mbps (but now much higher speeds can be achieved). The most common LAN topologies are bus, ring and star.
  • 17. Computer Networks 06.01.2016- 17 Local Area Network (LAN)
  • 18. Computer Networks 06.01.2016- 18 Metropolitan Area Networks (MAN) MAN is designed to extend over the entire city. It may be a single network as a cable TV network or it may be means of connecting a number of LANs into a larger network so that resources may be shared. MAN is wholly owned and operated by a private company or may be a service provided by a public company. The main reason for distinguishing MANs as a special category is that a standard has been adopted for them. It is DQDB (Distributed Queue Dual Bus) or IEEE 802.6.
  • 19. Computer Networks 06.01.2016- 19 Metropolitan Area Networks (MAN)
  • 20. Computer Networks 06.01.2016- 20 Wide Area Network (WAN) WAN provides long-distance transmission of data, voice, image and information over large geographical areas that may comprise a country, continent or even the whole world. WANs may utilize public, leased or private communication devices, usually in combinations, and can therefore span an unlimited number of miles. A WAN that is wholly owned and used by a single company is often referred to as enterprise network.
  • 21. Computer Networks 06.01.2016- 21 Wide Area Network (WAN)
  • 22. Computer Networks 06.01.2016- 22 Internet – network of networks Internet is a collection of networks or network of networks. The basic difference between WAN and Internet is that WAN is owned by a single organization while internet is not so.
  • 23. Computer Networks 06.01.2016- 23 Personal Area Network (PAN) PAN is a computer network used for communication among computer devices, including telephones and personal digital assistants, in proximity to an individual's body.  The devices may or may not belong to the person in question. The reach of a PAN is typically a few meters.
  • 24. Computer Networks 06.01.2016- 24 Personal Area Network (PAN)
  • 25. Computer Networks 06.01.2016- 25 Classification by scale
  • 26. Computer Networks 06.01.2016- 26 Network Computing Models Centralized Computing (Client-Server Network) A client-server network is where every client is connected to the server . Server or mainframe computer has huge storage and processing capabilities.
  • 27. Computer Networks 06.01.2016- 27 Network Computing Models Distributed Computing (Peer-to-Peer Network) All devices have same power. It interconnects one or more computers. Centralized backup is not possible.
  • 28. Computer Networks 06.01.2016- 28 Simultaneous Access  Shared Peripheral Devices  Personal Communication  Easier Backup Uses of Computer Network
  • 29. Computer Networks 06.01.2016- 29 Home Applications Access to remote information Web Person-to-person communication Email, VoIP e-commerce Interactive entertainment IPTV, Gaming E-mail P2P - Peer to Peer Other applications Ubiquitous computing IoT ( Internet of Things) Sensor Networks RFID (Radio Frequency IDentification) Mobile Users SoLoMo Applications of networks
  • 30. Computer Networks 06.01.2016- 30 Every Network Includes: 1.At least two computers that have something to share. 1.A cable or wireless pathway, called Transmission Media, for computers to signal each other. 1.Rules, called Protocols, so that computers can use the unified principle of data communication. 1.Networking Interface Cards (NIC)
  • 31. Computer Networks 06.01.2016- 31 Protocol Stack Why Layered architecture? 1.To make the design process easy by breaking unmanageable tasks into several smaller and manageable tasks (by divide-and-conquer approach). 1.Modularity and clear interfaces, so as to provide comparability between the different providers' components. 1.Ensure independence of layers, so that implementation of each layer can be changed or modified without affecting other layers. 1.Each layer can be analyzed and tested independently of all other layers.
  • 32. Computer Networks 06.01.2016- 32 Open System Interconnection (OSI) Reference Model Developed by International Organization for Standardization (ISO) in 1984
  • 33. Computer Networks 06.01.2016- 33 Terminologies A protocol is a formal set of rules and conventions that governs how computers exchange information over a network medium. the service user, the service provider, and the service access point (SAP)
  • 34. Computer Networks 06.01.2016- 34 Interaction between OSI Model Layers
  • 35. Computer Networks 06.01.2016- 35 Analogy of Protocol Hierarchies: The philosopher-translator-secretary architecture
  • 36. Computer Networks 06.01.2016- 36 Virtual Communication: Sino-US Talk
  • 38. Computer Networks 06.01.2016- 38 Terminologies Header: Upper layer puts a header in front of the message to identify the message and passes the result to lower layer The header includes control information such as sequence numbers to keep the right order. Size of messages There is always a limit to the size of messages imposed by certain layer protocol. So incoming messages must be broken into smaller units (packets) in this layer.
  • 39. Computer Networks 06.01.2016- 39 Information Flow
  • 40. Computer Networks 06.01.2016- 40 Example: Path of a Web page request & Encapsulation
  • 41. Computer Networks 06.01.2016- 41 An Exchange Using the OSI Model
  • 42. Computer Networks 06.01.2016- 42 Physical Layer
  • 43. Computer Networks 06.01.2016- 43 Physical Layer Purpose Transmits raw bits across a medium. Concerns are Voltage: how many volts for 1 / 0 Timing: how many ns a bit lasts Duplexing: transmission in both directions? Connectors: how many pins? What is each pin? etc.
  • 44. Computer Networks 06.01.2016- 44 Data Link Layer
  • 45. Computer Networks 06.01.2016- 45 Data Link Layer Purpose: Transform a raw transmission line into a line that appears free of undetected transmission errors to the networks layer Concerns: Framing - Breaks apart input data into frames and transmit the frames sequentially. Error handling – if the service is reliable, the receiver confirms correct receipt of each frame by sending back an acknowledgement frame. Flow control - keeps a fast transmitter from drowning a slow receiver in data. Medium Access Control – how to control access to the shared channel for broadcast networks.
  • 46. Computer Networks 06.01.2016- 46 Data Link Layer Example
  • 47. Computer Networks 06.01.2016- 47 Network Layer
  • 48. Computer Networks 06.01.2016- 48 Network Layer Purpose Route packets from source to destination Concerns Routing - What path is followed by packets from source to destination. Can be based on a static table, can be determined when the connection is created, or can be highly dynamic, being determined anew for each packet, to reflect the current network load. Congestion - Controls the number packets in the subnet. QoS – Quality of Service provided (delay, transit time, jitter…) Heterogeneity - Interfacing so that one type of network can talk to another. Addressing, packet size, protocols…
  • 50. Computer Networks 06.01.2016- 50 Transport Layer
  • 51. Computer Networks 06.01.2016- 51 Transport Layer Purpose Accept data from above it, split it up into smaller units if need be, pass them to network layer, and ensure that the pieces all arrive correctly at the other end. Concerns Service Decisions - What type of service to provide; error-free point to point, datagram, etc. End-to-end: it carries data all the way from the source to the destination. Reliability - Ensures that packets arrive at their destination. Reassembles out of order messages. Hides network - Allows details of the network to be hidden from higher level layers. Mapping - Determines which messages belong to which connections. Flow control - keeps a fast transmitter from flooding a slow receiver.
  • 52. Computer Networks 06.01.2016- 52 Session Layer
  • 53. Computer Networks 06.01.2016- 53 Session Layer Purpose Allow users on different machines to establish sessions between them Concerns Dialog control - keep track of whose turn it is to transmit Token Management – prevent two parties from attempting the same critical operation at the same time Synchronization – checkpointing long transmissions to allow them to pick up from where they left off in the event of a crash and subsequent recovery.
  • 54. Computer Networks 06.01.2016- 54 Presentation Layer
  • 55. Computer Networks 06.01.2016- 55 Presentation Layer Purpose Make it possible for computers with different data representations to communicate Concerns Syntax and semantics of information transmitted. Understands the nature of the data being transmitted. Converts ASCII/EBCDIC, big endian/little endian
  • 56. Computer Networks 06.01.2016- 56 Application Layer
  • 57. Computer Networks 06.01.2016- 57 Application Layer contains a variety of protocols that are commonly needed by users. HTTP FTP SMTP
  • 58. Computer Networks 06.01.2016- 58 The TCP/IP Reference Models Link layer Internet layer Transport layer Application layer the key a packet-switching network based on a connectionless layer that runs across different networks.
  • 59. Computer Networks 06.01.2016- 59 The TCP/IP Reference Models
  • 60. Computer Networks 06.01.2016- 60 Comparing OSI and TCP/IP Models Concepts central to the OSI model Services Interfaces Protocols OSI has good definition of service, interface, and protocol as discussed before. Fits well with object oriented programming concepts. Protocols are better hidden. The TCP/IP model did not originally distinguish between service, interface, and protocol. With TCP/IP, the protocols came first; model was just a description of the protocols. But then the model isn't good for any other protocols.
  • 61. Computer Networks 06.01.2016- 61 Different philosophy Which is first? Reference Model vs Corresponding protocols Specific differences Number of layers: 7 vs. 4 Connectionless vs. connection-oriented OSI supports both in the network layer, but only Connection-oriented communication in the transport layer TCP/IP supports only connectionless mode in the network layer but supports both in the transport layer, giving the users a choice.
  • 62. Computer Networks 06.01.2016- 62 What is a Topology? Network topologies describe the ways in which the elements of a network are mapped. They describe the physical and logical arrangement of the network nodes. The physical topology of a network refers to the configuration of cables, computers, and other peripherals
  • 63. Computer Networks 06.01.2016- 63 Different Types of Topologies Bus Topology Star Topology Ring Topology Mesh Topology Tree Topology Hybrid Topology
  • 64. Computer Networks 06.01.2016- 64 Bus Topology All the nodes (file server, workstations, and peripherals) on a bus topology are connected by one single cable. A bus topology consists of a main run of cable with a terminator at each end. All nodes (file server, workstations, and peripherals) are connected to the linear cable. Popular on LANs because they are inexpensive and easy to install.
  • 65. Computer Networks 06.01.2016- 65 Bus Topology
  • 66. Computer Networks 06.01.2016- 66 Bus Topology Advantages of Bus Topology It is Cheap, easy to handle and implement. Require less cable It is best suited for small networks. Disadvantages of Bus Topology The cable length is limited. This limits the number of stations that can be connected. This network topology can perform well only for a limited number of nodes. 
  • 67. Computer Networks 06.01.2016- 67 Ring Topology In a ring network, every device has exactly two neighbours for communication purposes. All messages travel through a ring in the same direction. A failure in any cable or device breaks the loop and can take down the entire network.  To implement a ring network we use the Token Ring technology A token, or small data packet, is continuously passed around the network. When a device needs to transmit, it reserves the token for the next trip around, then attaches its data packet to it.
  • 68. Computer Networks 06.01.2016- 68 Ring Topology
  • 69. Computer Networks 06.01.2016- 69 Ring Topology Advantage of Ring Topology Very orderly network where every device has access to the token and the opportunity to transmit. Easier to Manage than a Bus Network Good Communication over long distances Handles high volume of traffic Disadvantages of Ring Topology The failure of a single node of the network can cause the entire network to fail. The movement or changes made to network nodes affects the performance of the entire network.
  • 70. Computer Networks 06.01.2016- 70 Star Topology In a star network, each node (file server, workstations, and peripherals) is connected to a central device called a hub. The hub takes a signal that comes from any node and passes it along to all the other nodes in the network. Data on a star network passes through the hub, switch, or concentrator before continuing to its destination. The hub, switch, or concentrator manages and controls all functions of the network. The star topology reduces the chance of network failure by connecting all of the systems to a central node.
  • 71. Computer Networks 06.01.2016- 71 Star Topology
  • 72. Computer Networks 06.01.2016- 72 Star Topology Advantages of Star Topology Easy to manage Easy to locate problems (cable/workstations) Easier to expand than a bus or ring topology. Easy to install and wire. Easy to detect faults and to remove parts. Disadvantages of Star Topology Requires more cable length than a linear topology. If the hub or concentrator fails, nodes attached are disabled. More expensive because of the cost of the concentrators.
  • 73. Computer Networks 06.01.2016- 73 Tree Topology A tree topology (hierarchical topology) can be viewed as a collection of star networks arranged in a hierarchy.  This tree has individual peripheral nodes which are required to transmit to and receive from one other only and are not required to act as repeaters or regenerators. The tree topology arranges links and nodes into distinct hierarchies in order to allow greater control and easier troubleshooting. This is particularly helpful for colleges, universities and schools so that each of the connect to the big network in some way.
  • 74. Computer Networks 06.01.2016- 74 Tree Topology
  • 75. Computer Networks 06.01.2016- 75 Tree Topology Advantages of a Tree Topology Point-to-point wiring for individual segments. Supported by several hardware and software vendors. All the computers have access to the larger and their immediate networks. Disadvantages of a Tree Topology Overall length of each segment is limited by the type of cabling used. If the backbone line breaks, the entire segment goes down. More difficult to configure and wire than other topologies.
  • 76. Computer Networks 06.01.2016- 76 Mesh Topology In this topology, each node is connected to every other node in the network. Implementing the mesh topology is expensive and difficult. In this type of network, each node may send message to destination through multiple paths. While the data is travelling on the Mesh Network it is automatically configured to reach the destination by taking the shortest route which means the least number of hops.
  • 77. Computer Networks 06.01.2016- 77 Mesh Topology
  • 78. Computer Networks 06.01.2016- 78 Mesh Topology Advantage of Mesh Topology No traffic problem as there are dedicated links. It has multiple links, so if one route is blocked then other routes can be used for data communication. Points to point links make fault identification easy.  Disadvantage of Mesh Topology There is mesh of wiring which can be difficult to manage. Installation is complex as each node is connected to every node. Cabling cost is high.
  • 79. Computer Networks 06.01.2016- 79 Hybrid Topology A combination of any two or more network topologies. A hybrid topology always accrues when two different basic network topologies are connected. It is a mixture of above mentioned topologies. Usually, a central computer is attached with sub-controllers which in turn participate in a variety of topologies
  • 80. Computer Networks 06.01.2016- 80 Hybrid Topology
  • 81. Computer Networks 06.01.2016- 81 Hybrid Topology Advantages of a Hybrid Topology It is extremely flexible. It is very reliable. Disadvantages of a Hybrid Topology Expensive
  • 82. Computer Networks 06.01.2016- 82 Networking hardware includes all computers, peripherals, interface cards and other equipment needed to perform data-processing and communications within the network. What is Networking Hardware?
  • 83. Computer Networks 06.01.2016- 83 Networking Hardware Network Interface Card Hub Repeater Bridge Switch Gateway
  • 84. Computer Networks 06.01.2016- 84 Network Interface Cards Network interface cards, commonly referred to as NICs, are used to connect a PC to a network.  The NIC provides a physical connection between the networking cable and the computer's internal bus. Different computers have different bus architectures; PCI bus master slots are most commonly found on 486/Pentium PCs and ISA expansion slots are commonly found on 386 and older PCs. NICs come in three basic varieties: 8-bit, 16-bit, and 32-bit. The larger the number of bits that can be transferred to the NIC, the faster the NIC can transfer data to the network cable.
  • 85. Computer Networks 06.01.2016- 85 Network Interface Cards
  • 86. Computer Networks 06.01.2016- 86 Hubs A hub joins multiple computers (or other network devices) together to form a single network. On this network, all computers can communicate directly with each other. The networking hub is a junction box with several ports in the back for receiving the Ethernet cables that are plugged into each computer on the LAN.
  • 87. Computer Networks 06.01.2016- 87 Types of Hubs A passive hub serves simply as a passage for the data, enabling it to go from one device to another. Intelligent hub include additional features that enables an administrator to monitor the traffic passing through the hub and to configure each port in the hub. Switching hub, actually reads the destination address of each packet and then forwards the packet to the correct port.
  • 89. Computer Networks 06.01.2016- 89 Repeater Since a signal loses strength as it passes along a cable, it is often necessary to boost the signal with a device called a repeater. A repeater is an electronic device that receives a signal, cleans it of unnecessary noise, regenerates it, and retransmits it at a higher power level so that the signal can cover longer distances without degradation. A good example of the use of repeaters would be in a local area network using a star topology with unshielded twisted-pair cabling.
  • 91. Computer Networks 06.01.2016- 91 Switch A network switch is a small hardware device that joins multiple computers together within one local area network (LAN). Network switches appear nearly identical to network hubs, but a switch generally contains more intelligence than a hub. Unlike hubs, network switches are capable of inspecting data packets as they are received, determining the source and destination device of each packet, and forwarding them appropriately. Allow several users to send information over a network at the same time without slowing each other down.
  • 93. Computer Networks 06.01.2016- 93 Router A device to interconnect SIMILAR networks, e.g. similar protocols and workstations and servers. A router is an electronic device that interconnects two or more computer networks, and selectively interchanges packets of data between them. Each data packet contains address information that a router can use to determine if the source and destination are on the same network, or if the data packet must be transferred from one network to another.
  • 95. Computer Networks 06.01.2016- 95 Bridge A bridge is a device that connects a local area network (LAN) to another local area network that uses the same protocol (for example, Ethernet or token ring). The function of a bridge is to connect separate networks together. Bridges connect different networks types (such as Ethernet and Fast Ethernet) or networks of the same type. Bridges map the Ethernet addresses of the nodes residing on each network segment and allow only necessary traffic to pass through the bridge. When a packet is received by the bridge, the bridge determines the destination and source segments.
  • 96. Computer Networks 06.01.2016- 96 Types of Bridges Bridges come in three basic types: Local bridges: Directly connect local area networks (LANs) Remote bridges: Can be used to create a wide area network (WAN) link between LANs. Remote bridges have been replaced with routers. Wireless bridges: Can be used to join LANs or connect remote stations to LANs.
  • 98. Computer Networks 06.01.2016- 98 Gateway Gateways are used to interconnect two different networks having different protocols. Networks using different protocols use different addressing formats. A gateway is a network point that acts as an entrance to another network. Gateways are also called protocol converters.
  • 100. Computer Networks 06.01.2016- 100 What is the difference? Bridge: device to interconnect two LANs that use the SAME logical link control protocol but may use different medium access control protocols. Router: device to interconnect SIMILAR networks, e.g. similar protocols and workstations and servers. Gateway: device to interconnect DISSIMILAR protocols and servers, and Macintosh and IBM LANs and equipment
  • 101. Computer Networks 06.01.2016- 101 Computer Engineering and Applications Thank you. Computer Networks Dr. Manas Kumar Mishra manas.mishra@gla.ac.in 06.01.2016

Editor's Notes

  1. 2