Computer Network Withtlinks Compressed
Computer Network Withtlinks Compressed
Computer Network Withtlinks Compressed
Computer
Networks
Connect with Alumni
Computer Networks
02 Computer Network
2 Network Topologies
Nodes connected to the single central cable. Nodes connected in a circular fashion.
Consistent performance.
HUB
Nodes connected central hub. Every node connects to every other node.
03 Computer Network
Hybrid Topology
HUB
04 Computer Network
3 Network Components and Devices
Devices
It is a Two port device used to connect multiple LANs. It also filters the
Bridges
incoming signals.
05 Computer Network
Media
Wired Wireless
Ethernet Cables (Twisted Pair): Wireless media refers to the transmission of data
over a network without the use of physical cables,
Cat5e: Common for basic networking.
utilizing radio waves or infrared signals for
Cat6/Cat6a: Higher bandwidth and faster communication.
data transfer.
Cat7/Cat8: Enhanced shielding for even
higher speeds.
Coaxial Cables:
Used for cable television (RG-6) and some
broadband connections. Provides high
bandwidth but less than fiber optics.
4 OSI Model
The OSI (Open Systems Interconnection) model is a conceptual framework that
standardizes the functions of a telecommunication or computing system into seven
abstraction layers.
06 Computer Network
This layer provides network services and
interfaces for end-users and applications.
Application Layer It provides services such as file transfers,
email communications, and web
browsing.
Sender
07 Computer Network
Data Units of different layers OSI vs TCI/IP
Segment(TCP),
Transport Layer Transport Layer Transport Layer
Datagram(UDP)
5 Switching techniques
08 Computer Network
Message Switching Connection Less Service.
No dedicated path, needs storage at each switch.
Store & Forward Entire message is sent together.
One header for the entire message.
Message Message Reduces Traffic Congestion.
Data Transmission Delay.
No loss of information.
Source
Cost Efficient + Easy
Message Switching Node
Message Message
Destination
Packet Switching
09 Computer Network
06 Networking Protocols
Flow control protocols are mechanisms used to regulate the flow of data between
sender and receiver to ensure efficient and reliable communication.
Stop and Wait ARQ is a flow control protocol Go-Back-N ARQ is a flow control protocol that
that ensures reliable data transmission. The allows the sender to transmit a number of frames
sender sends one data frame at a time and waits without waiting for individual acknowledgments.
for an acknowledgment from the receiver before If an acknowledgment is not received, the sender
sending the next frame. resends all the frames from the last acknowledged
one.
10 Computer Network
Selective Repeat
Aloha
Start
Abort
SUCCESS
NO
11 Computer Network
Aloha is a random access protocol used in wireless Pure ALOHA allows stations to transmit data at any
networks. Devices can transmit data at any time, time, with collisions resolved after detection, while
but collisions can occur if multiple devices transmit Slotted ALOHA introduces synchronized time slots
simultaneously. It has variants like pure Aloha and for more efficient collision management.
slotted Aloha.
Carrier Sense Multiple Access (CSMA) is a multiple Carrier Sense Multiple Access with Collision
access protocol that allows devices to sense the Detection (CSMA/CD) is used in Ethernet networks.
network before transmitting. Transmissions are It adds collision detection to CSMA, and if a collision
deferred if the channel is busy. occurs during transmission, devices stop
transmitting and wait for a random time before
retrying.
Polling
Polling is a communication protocol where a central device (e.g., a server) systematically queries or polls
other devices (e.g., clients) to check for their status or to request information. This protocol is used to
manage and control the flow of data in a network by actively seeking updates from connected devices.
12 Computer Network
Token Passing
Token passing is a network access control method
where a special data packet, known as a "token,"
Station 1 is passed sequentially among nodes in a network.
Only the node possessing the token is granted
To
ke
n
permission to transmit data.
Station 3
Channelization Protocol
FDMA TDMA
Power f
Time
FDMA
Common Channel
Each user allocated
a different subband/
channel.
Frequency t
Data
TDMA stands for Time Division Multiple Access. It is a communication technology used in wireless networks
to allow multiple users to share the same frequency channel by dividing the signal into different time slots.
In TDMA, each user is assigned a specific time slot during which they can transmit or receive data.
13 Computer Network
Routing Algorithm
Routing Protocols are used by routers to determine the best path for data packets to
reach their destination.
TCP vs UDP
14 Computer Network
ARP
Address Resolution Protocol (ARP) maps an IP address to the corresponding MAC
address on a local network. It is used to discover and associate IP and MAC
addresses of devices within a LAN.
A X
B Y
C Z
Network 1 Network 2
NAT
Network Address Translation (NAT) is a technique used to translate private IP addresses used within a local
network into a public IP address assigned by the ISP when accessing the internet.
Device A
Device B
Private IP to Public IP Public IP to Private IP
Device C
NAT
Device D Device www
Device E
Device F
Device G
Local Network
15 Computer Network
DNS
Domain Name System (DNS) translates human-readable domain names into IP addresses. It allows users
to access websites using domain names instead of remembering the IP addresses.
www.example.com 12.34.56.78
12.34.56.78
Hypertext Transfer Protocol File Transfer Protocol (FTP) is Dynamic Host Configuration Post Office Protocol (POP3)
(HTTP) is a protocol used for a protocol used for Protocol (DHCP) automatically is an email protocol used for
transmitting web pages and transferring files between a assigns IP addresses and retrieving emails from a mail
resources over the internet. client and a server on a network configuration details server. It allows users to access
HTTPs is a secure version that network. It provides to devices in a network, and download their emails to
uses encryption to protect functions for file upload, eliminating the need for their devices.
data transmission. download, and management. manual configuration.
IMAP
IMAP, or Internet Message Access Protocol, is a standard email protocol used to retrieve messages from a
mail server. Unlike the older POP (Post Office Protocol), which primarily downloads emails to a local device
and removes them from the server, IMAP allows users to view and manipulate their emails directly on the
mail server
16 Computer Network
07 IP Addressing and Subnetting
IP vs MAC
Type of
Version IHL Service Total Length
Version Traffic Class Flow Label
Fragment
Identification Flags Next Hop
Offset Payload Length
Header Limit
TTL Protocol Header Checksum
Source Address
Source Address
Destination Address
Destination Address
Options Padding
17 Computer Network
Version - 4 bits Version - 4 bits
IHL - 4 bits Traffic Class - 8 bits
Type of Service - 8 bits Flow Label - 20 bits
Total Length - 16 bits Payload Length - 16 bits
Identification - 16 bits Next Header - 8 bits
Flags - 3 bits Hop Limit - 8 bits
Fragment Offset - 13 bits Source address - 128 bits
TTL - 8 bits Destination address - 128 bits
Protocol - 8 bits
Header Checksum - 16 bits
Source Address - 32 bits
Destination Address - 32 bits
Options - variable
Padding - variable
IP address classes
Network ID Host ID
Class A
Network ID Host ID
Class B
1 0
Network ID Host ID
Class C
1 1 0
Class D
1 1 1 0
Class E
1 1 1 1
18 Computer Network
Public IP Private IP
A Public IP (Internet Protocol) address is a unique A private IP address is an address reserved for
address assigned to a device connected to a use within a private network and is not routable
network that is accessible from the internet. on the public internet. Private IP addresses are
It allows the device to communicate with other commonly used in local networks, such as homes
devices and services on the internet and is used or businesses, and are typically assigned to
for identifying and routing data packets to the devices like computers, printers, or routers
correct destination. within that network.
Subnetting
Subnetting refers to the practice of dividing a larger network into smaller, more
manageable sub-networks or subnets. Subnetting is commonly done to improve
network performance, enhance security, and efficiently allocate IP addresses.
Subnet Mask
172.16.128.0
Subnet 1 Subnet 2
172.16.00000000.00000000 172.16.10000000.00000000
Network A
172.16.0.0
19 Computer Network
A subnet mask is a 32-bit numerical value that divides an IP (Internet Protocol) address into network and host
portions. It is used in conjunction with IP addresses to create subnets within a larger network. The subnet
mask contains a series of contiguous 1-bits followed by contiguous 0-bits, with the 1-bits indicating the
network portion and the 0-bits representing the host portion of the address. Subnet masks are essential for
subnetting and help in organizing and managing IP addresses within a network.
8 Network Security
Common network security threats
Original Connection
Sniff
Communication MITM Replay
Traffic
User C Hacker
20 Computer Network
Man-In-The-Middle Session Hijacking
Session ID=ACF3D35F216AAEFC
Perpetrator
Man in the middle Attacker
Intrusion Detection Systems are Virtual Private Networks are SSL and TLS are cryptographic
security tools designed to secure, encrypted connections protocols that ensure secure
monitor and analyze network or established over the internet, communication over a computer
system activities for signs of enabling users to access a private network, such as the internet.
unauthorized access, misuse, network from a remote location They establish a secure
or security policy violations. They securely. VPNs protect data connection by encrypting data
generate alerts or take predefined during transmission and provide a during transmission between a
actions when suspicious activities secure communication channel client and a server.
are detected. over the public internet.
09 Points to remember
Remember the helpful acronym "Please Do Not Throw Sausage Pizza Away" to
remember the layers: Physical, Data Link, Network, Transport, Session,
Presentation, and Application.
21 Computer Network
Important Ports in Transport layer
25 TCP SMTP
69 UDP TFTP
80 TCP HTTP
SYN = 1 FIN = 1
ACK = 1 ACK = 1
SYN = 1 FIN = 1
ACK = 1 ACK = 1
22 Computer Network
Miscellaneous
The OSI Model is not commonly used for practical network design and it is widely taught
and serves as an educational tool to understand network communication principles and
concepts.
Devices like routers operate at the Network Layer, switches and bridges at the Data Link
Layer, and hubs, repeaters and modems at the physical Layer.
The bottom layers (1-4) deal with the physical and logical aspects of data transmission,
while the upper layers (5-7) focus on the application and user interface.
Wi-Fi: A widely used wireless technology that allows devices to connect to a local area
network (LAN) or the internet without the need for physical cables. Wi-Fi is commonly
used in homes, businesses, and public spaces.
23 Computer Network