Unit 1
Introduction to computer network
T1 -Overview of computer network
IT45103
NETWORKING
Definition of Computer
Network
•A computer network is an interconnection of
computers and computing equipment using either
wires or radio waves and can share data and
computing resources.
•Computer networks that use radio waves are termed
wireless and can involve broadcast radio, microwaves
or satellite transmissions.
Networking
2
Networking
3
Types of computer
networks
•Networks spanning an area of several meters around
an individual are called personal area networks
(PANs). Most common is Bluetooth for headphones etc
•Networks a little larger in geographic size such as
spanning a room, a floor within a building, a building
or a campus are called Local Area Networks (LANs).
Networking
4
Types of computer
networks (cont..)
•Networks that serve an area up to roughly 50
kilometers approximately the area of a typical city are
called metropolitan area networks (MANs).
•high-speed networks that interconnect businesses with
other businesses and the Internet.
•Usually is a business service offered by telcos/ISPs
•Large networks encompassing parts of states, multiple
states, countries and the world are wide area
networks (WANs). e.g. Internet
Networking
5
Networking
6
Advantages of
computer network
•Sharing of peripheral devices: Laser printer, disk
drives and scanner are examples of peripheral devices
– that is, hardware that is connected to a computer.
•Sharing of program and data: In most organizations,
people use the same software and need access to the
same information.
•Better communications: One of the greatest features of
networks is electronic mail. Also instant messaging
and calling apps such as WhatsApp are becoming
critical.
Networking
7
Advantages of
computer network
(cont..)
•Security of information: data would be backed up or
duplicated on a networked storage device secured by
password.
•Access to databases: enable users to tap into
numerous databases, whether the private databases of
a company or the public databases of online services.
Networking
8
The big picture of
networks
•The most important in LANs include the following
hardware:
•Workstations, which are personal
computers/microcomputers (desktops, laptops, net
books, hand helds, etc) where users reside.
•Servers which are the computers that store network
software and shared public or private user files.
•Switches, which are the collection points for the wires
that interconnect the workstations.
•Routers, which are the connecting devices between local
area networks and wide area networks.
Networking
9
The big picture of
networks
•Wide area networks include the following
components:
•Nodes, which are the computing devices that allow
workstations to connect to the network and make
decisions about where to route a data.
•Some type of high-speed transmission line, which runs
from one node to another.
•A subnetwork or cloud which contains the nodes and
transmission lines, considered as a cohesive unit.
Networking
10
•Capacity of a medium to carry
data.
•Measured in kilobits per
second (kbps) or megabits
per second (Mbps).
Bandwidth
•The measure of the transfer of
bits across the media over a
given period of time.
•Many factors influence
throughput ; amount and type of
traffic, number of network
devices encountered on network
Throughput
•Is the measure of usable data
transferred over a given period of
time
Goodput
Data transfer can
be measured in
three ways:
Networking
11
Units of bandwidth,
throughput and
goodput
Networking
12
Example
•Consider two hosts on a LAN transferring a
file.
•The bandwidth of the LAN is 100 Mbps.
•Due to the sharing and media overhead the through
put between the computers may be only 60 Mbps.
•With the overhead of the encapsulation process of
the TCP/IP stack, the actual rate of the data
received by the destination computer, goodput, may
be only 40Mbps.
Networking
13
Data throughput and
goodput
Networking
14
Unit 1
Introduction to computer network
T2 - Network Models
IT45103
NETWORKING
Networking
Network Models
•A network model defines how and where resources
are shared and how access to these resources is
regulated
•Fall into two major types
•Peer-to-peer network: Most computers function
as clients or servers (no centralized control over
who has access to network resources)
•Server-based network: Certain computers take on
specialized roles and function mainly as servers,
and ordinary users’ machines tend to function
mainly as clients
16
Networking
Peer-to-Peer/Workgroup
Model
•Computers on a peer-to-peer network can take both a
client and a server role
•Any user can share resources on his/her computer
with any other user’s computer
•Every user must act as the administrator of his/her
computer
•Can give everyone else unlimited access to their
resources or grant restricted access to other users
•Usernames and passwords (credentials) are used to
control that access
17
Networking
Peer-to-Peer/Workgroup
Model
•Problems with Peer-to-peer networks:
•Must remember multiple sets of identifications to access
resources spread out over several computers
•Desktop PCs and the OSs installed on them aren’t made to
provide network services as efficiently as dedicated
network servers
•Data organization: If every machine can be a server, how
can users keep track of what information is stored on which
machine?
•Peer-to-peer networks are best suited for small organizations
that have small networks and small operating budgets
18
Networking
19
Server/Domain-Based
Model
•Server-based networks provide centralized
control over network resources
•Users log on to the network with a single set
of identifications maintained by one or more
servers running a server OS
•In most cases, servers are dedicated to
running network services and should not be
used to run user applications
Networking
20
Server/Domain-Based
Model
•A domain is a collection of users and computers whose
accounts are managed by Windows servers called
domain controllers
•Users and computers in a domain are subject to network
access and security policies defined by a network
administrator
•The software that manages this security is referred to as a
directory service
•On Windows servers, the directory service software is
Active Directory
Networking
21
A client/server network keeps resources centralized
Networking
22
Peer-to-Peer Networks
Networking
23
Advantages
•Use less expensive
computer
hardware.
•Easy to administer.
•No network
operating system
required.
•More built-in
redundancy.
Disadvantages
•Might impact
user’s
performance
•Not very secure
•Difficult to back up
•Hard to maintain
version control
Quiz:
1) Computer networks that use _________ as transmission
signal is known as wireless. (1 mark)
2) i. Device that connect between Local Area
Network(LAN) and Wide Area Network (WAN) is
__________. (1 mark)
ii. Computer that share public or private users files is
called a ___________. (1 mark)
3) What are the differences between PAN and MAN?
(2 marks)
4) There are TWO(2) types of network model? Briefly
describe them with the aid of diagram. (8 marks)
5) Define goodput and throughput. (2 marks)
Networking
25
Unit 1
Introduction to computer network
T3 -Network Topologies
IT45103
NETWORKING
•Topology basically means shape.
•Network topology refers how a network is physically
laid out and how signals travel from one device to
another.
•Broken down into TWO topologies.
•The arrangement of cabling and how cables connect one
device to another in a network is considered the
network’s physical topology.
•The path data travel between computers on a network is
considered the network’s logical topology.
Networking
2
Bus Topology
•The first topology used in local area networking was
the bus topology
•A bus topology, more completely called a common bus
multipoint topology, is a network where, basically, a
single network cable is used from one end of the
network to the other, with different network devices
(called nodes) connected to the cable at different
locations.
•This topology is seldom used in modern networks
Networking
3
Bus Topology
•Bus topology networks use coaxial cable.
•Each end of each segment of the network had a special
cable terminator on it, without which the network will
not function.
Networking
4
Bus Topology
•From a device's viewpoint, all other systems
communicate through the same, shared path.
•Because it is a shared media technology, mechanisms
must be put into place to determine network traffic
over the cable.
•Typically, collision detection (CD) or collision
avoidance (CA) algorithms are used in bus topologies
to determine network access along with concepts such
as "broadcasts" to reach every device on the cable.
•The biggest issue was that any cable break or issue
put the whole network offline
Networking
5
Star Topology
•Every node on the LAN has a dedicated cable that is
pulled back to a centralized point, typically a wiring
closet.
•All cables are terminated in a network component
such as a switch or hub.
•The network switch (or hub) is a single point of failure
•Each device has a dedicated wire to the switch to
implement the star.
•This is the topology used in all current LANs
Networking
6
A star topology
network
Networking
7
Switch
Star Topology
•If you use wireless Ethernet (Wi-Fi) for part or your
entire network, the infrastructure for a wireless
network also uses a star topology but with these
differences:
•A wireless access point (AP) replaces the switch.
•Radio waves, rather than network cables, connect clients
to the wireless access point.
•In some ways this is similar
to the bus topology as the
medium (air) is shared
Networking
8
Ring Topology
•A ring topology may actually be a physical
arrangement of a network cable
•The network behaves like a ring, where the
network signals travel around the ring to each
node in turn.
•Ring topology LANs are based on Token Ring
•Like bus topology, ring topology is seldom
used in modern networks
Networking
9
A sample ring topology network
Networking
10
Point-to-Point Topology
•Direct link between two devices
•Mostly used in WANs
•Wireless bridge
•Used to connect two computers
•In mobile networks it is often used to connect base
stations back to the core network
Networking
11
Mesh Topology
•Connects each device to every other device in a
network
•Multiple point-to-point connections for the purposes of
redundancy and fault tolerance
•Purpose of creating a mesh topology is to ensure that
if one or more connections fail, there’s another path
for reaching all devices on the network
•Expensive due to multiple interfaces and cabling
•Found in large WANs and internetworks
•Internet is a large mesh network but every point is not
connected directly to every other point
•This is often called a partial mesh network
Networking
12
Networking
Mesh Topology 13
Unit 1
Introduction to computer network
T4 - Network Media
IT45103
NETWORKING
Network cable
•Cable is the medium through which information
usually moves from one network device to another.
Three major groups of cabling connect the major
networks:
•Coaxial Cable
•no longer common
•Twisted-pair
•unshielded and
shielded cable
•Fiber-optic cable
•Becoming common for
connections to ISP
Networking
15
Coaxial Cable
•Is a single wire wrapped in foam insulation, surrounded by a braided
metal shield, and then covered in a plastic jacket.
•The braided metal shield is very good at blocking electromagnetic
signals from entering the cable and producing noise.
•Coaxial cable is good at carrying analog signals with a wide range of
frequencies.
•For example, it can transmit large numbers of video channels, such as
those found on the cable television services that are delivered into
homes and businesses.
•Now used mostly for satellite services like Astro and for connections to
antennas
Networking
16
Networking
17
Coaxial Cable (cont..)
•Two major coaxial cable technologies exist and are distinguished
by the type of signal each carries; baseband and broadband.
•Baseband coaxial technology uses digital signaling in which the
cable carries only one channel of digital data. The common
application for baseband used to be the interconnection of
switches within a local area network. It carry one 10 to 100mbps
signal and require repeaters every few hundred kilometers.
Currently, replaced by fiber optic cable as the preferred method
for interconnecting LAN hubs.
•Broadband coaxial technology typically transmits analog
signals and is capable of supporting multiple channels of data
simultaneously. For example; coaxial cable that transmits cable
or satellite television. Most broadband coax systems have now
switched to digital baseband
Networking
18
Coaxial Cable (cont..)
•Coaxial cable also is available in a variety of thicknesses with two
primary types; thick coaxial cable and thin coaxial cable.
•Thick coaxial cable ranges in size from approximately 6 to 10mm in
diameter. It typically carries broadband signals and better noise
protection. Generally used for the transmission of analog data, such as
single or multiple video channels.
•Seldom used in modern systems
•Thin coaxial cable is approximately 4 mm in diameter. It typically
carries baseband signals. It also has limited noise isolation.
•Most commonly seen in Malaysia for Astro satellite dish connections
Networking
19
Coaxial Cable (cont..)
Networking
20
Twisted-pair (unshielded
and shielded) cable
•Currently the most commonly used data
transmission medium.
•Used for most LANs and telephone
connections
•Consists of pairs of copper wires twisted
together to create magnetic field and thus
reduce interference.
•Two types of twisted pair are Shielded Twisted
Pair (STP) and Unshielded Twisted Pair (UTP).
Networking
21
Shielded Twisted-Pair (STP)
Cable
•Consists of twisted wire pairs that are individually insulated and
surrounded by shielding made of metallic substance.
•Provides better noise protection than UTP cabling, however at a
significantly higher price.
•More expensive, heavier, and difficult to bend when installing
(compared to UTP).
•For many years, STP was the cabling structure specified for use
in Token Ring network installations.
•Seldom used in modern networks
Networking
22
Networking
23
Unshielded Twisted Pair (UTP)
•Unshielded
Twisted Pair
(UTP) consists
one or more
insulated wire
pairs encased in
a plastic sheath.
It does not
contain
additional
shielding.
Networking
24
Unshielded Twisted Pair (UTP)
•The UTP cable used in LANs consists of four
pairs of insulated wires, other UTP types
contain fewer pairs.
•Also used for telphone wire, with only 2 pairs,
because voice applications are much less
demanding than networking in bandwidth and
signal quality.
•There are many different categories of UTP as
shown in the next slide
Networking
25
UTP Category Typical useMaximum Data
Transfer Rate
Maximum
Transmission
Range
Advantages Disadvantages
Category 1 Telephone
wire
<100 kbps 5-6 kilometers (3-
4 miles)
Inexpensive, easy to
install and interface
Security noise,
obsolete
Category 2 T-1, ISDN < 2Mbps 5-6 kilometers (3-
4 miles)
Same as category 1Security noise,
obsolete
Category 3 Telephone
circuits
10 Mbps 100 m (328 ft) Same as category 1,
with less noise
Security noise,
obsolete
Category 4 LANs 20 Mbps 100 m (328 ft) Same as category 1,
with less noise
Security noise,
obsolete
Category 5 LANs 100 Mbps
(100 MHz)
100 m (328 ft) Same as category 1,
with less noise
Security, noise
Category 5e LANs 250 Mbps per pair
(125MHz)
100 m (328 ft) Same as Category 5.
Also includes
specifications for
connectors, patch
cords, and other
components.
Security, noise
Category 6 LANs 250 Mbps per pair
(250 MHz)
100 m (328 ft) Higher rates than
Category 5e, less
noise
Security, noise,
cost
Category 7 LANs 600MHz 100 m (328 ft) High data rates Security, noise,
cost
Networking
26
UTP connectors
•UTP uses a connection called the RJ-45 connector. It
looks similar to a common telephone connector (RJ-
11) except it is slightly larger.
•The RJ-45 has 8 pins while the RJ-11 has only 4.
•The RJ-11 connector can
plug into the RJ-45
socket and connect the
4 wires correctly
Networking
27
TIA/EIA Cable Pinouts
Networking
28
TIA/EIA 568B is the most
commonly used
Straight-Through Vs Crossover
Cable
•The following are main cable types that are obtained by
using specific wiring conventions:
•Straight-through
•Crossover
Networking
29
Use straight-through cables for the following
connections:
•Switch to a router Ethernet port
•Computer to switch
Crossover cables directly connect the following
devices on a LAN:
•Switch to switch
•Router to router Ethernet port connection
•Computer to computer
•Computer to a router Ethernet port
Modern equipment can usually use either type of
cable
•The electronics automatically detects transmitter and receiver using
a technology called Auto-MDIX
Networking
30
Fiber-Optic Cable
•Consists of an extremely thin cylinder of glass,
called the core surrounded by a concentric layer
of glass, known as cladding. Diameter is
0.125mm
•The fibers are sometimes made of plastic.
•Plastic is easier to install, but cannot carry the
light pulses for long distances like glass.
Networking 31
Fiber-Optic Cable
•Fiber-optic cable is capable of
supporting millions of bits per
second for 1000s of meters.
•Fiber optic cable can carry the
highest data rate for the longest
distances.
•The cost is more expensive than
twisted pair and coaxial cable.
Networking
32
33
Networking
Summary of characteristics of network cables.
Networking
34
Quiz:
1)Compare Shielded Twisted-Pair (STP) and Unshielded Twisted-Pair
(UTP) cable. (6 marks)
2)List the color of cable pinouts for T568A and T568B. (8 marks)
3)Define cladding for Fiber-Optic cable. (1 mark)
Networking
35
Unit 1
Introduction to computer network
T5 -Wireless Media
IT45103
NETWORKING
Wireless Media
•Radio, satellite transmissions, and infrared light are all
different forms of electromagnetic waves that are used to
transmit data
•In wireless transmissions, space is the medium
•Note in the following figure how each source occupies a
different set of frequencies
Networking
2
These radio bands are defined by the ITU (International
Telecommunications Union) on a world-wide basis.
Individual countries have a more detailed breakdown for
each band
Band NumberSymbol Frequency Common Use
4 VLF (very low frequency)3- 30 kHz Radio navigation
systems
5 LF (low frequency) 30-300 kHz Radio beacons
6 MF (medium frequency)300 kHz-3 MHzAM radio
7 HF (high frequency) 3-30 MHz CB radio, Short Wave
radio
8 VHF (very high frequency)3-300 MHz VHF TV, FM radio
9 UHF(ultra high frequency)300 MHz-3 GHzUHF TV, cell phones,
pagers
10 SHF (superhigh frequency)3-30 GHz Satellite
11 EHF (extremely high freq)30-300 GHz Satellite, radar systems
Networking
3
Terrestrial Microwave Transmission
•Land-based, line-of-sight transmission
•Approximately 30-50kms between
towers
•Transmits data at hundreds of
millions of bits per second
•Signals will not pass through solid
objects
•Popular with telephone companies
and business to business
transmissions
Networking
4
Satellite Microwave Transmission
•Similar to terrestrial microwave except the signal
travels from a ground station on earth to a satellite
and back to another ground station
•Can also transmit signals from one satellite to another
•Satellites can be classified by how far out into orbit
each one is (LEO, MEO, GEO, and HEO)
•Adds some delay due to length of transmission path
Networking
5
Satellite Microwave Transmission (continued)
•LEO (Low-Earth-Orbit) – 100 to 1000 miles out
•Used for wireless e-mail, special mobile telephones, pagers, spying,
videoconferencing
•MEO (Middle-Earth-Orbit) – 1000 to 22,300 miles
•Used for GPS (global positioning systems) and government
•GEO (Geosynchronous-Earth-Orbit) – 22,300 miles
•Always over the same position on earth (and always over the
equator)
•Used for weather, television, government operations
•HEO (Highly Elliptical Earth orbit) – satellite follows an
elliptical orbit
•Used by the military for spying and by scientific organizations for
photographing celestial bodies
Networking
7
Cellular Telephones
•Wireless telephone service, also called mobile telephone,
cell phone, and Personal Communications Services (PCS)
•To support multiple users in a metropolitan area is broken
into cells (honeycomb-like pattern)
•Each cell has its own transmission tower and set of
assignable channels
Networking
8
Cellular Telephones (continued)
Mobile Exchange
Mobile Exchange
Mobile Backhaul
Microwave or Fibre
Mobile Exchange
Mobile Exchange
Networking
9
Cellular Telephones (cont..)
•Four basic generations of cellular telephone systems
currently exist:
•first generation (analog cellular telephone),
•second generation – 2G (GSM, Digital personal
communications services (PCS),
•third generation – 3G (Convergence of data signals with
voice signals)
•fourth generation – 4G (LTE technology).
•fifth generation – 5G (Coming to Malaysia soon)
Networking
10
Infrared Transmissions
•Transmissions that use a focused ray of light in the infrared
frequency range
•Very common with remote control devices, but was also
used for device-to-device transfers, such as mobile phone to
computer
Networking
11
WiMax - Broadband Wireless
Systems
•Mostly now replaced by 4G technology
•Delivered Internet services into homes, businesses and
mobile devices
•Designed to bypass the local loop telephone line
•Transmits voice, data, and video over high frequency radio
signals
•Maximum range of 20-30 miles and transmission speeds in
Mbps
•IEEE 802.16 set of standards
Networking
12
Bluetooth
•Bluetooth is a specification for short-range, point-to-point
or point-to-multipoint voice and data transfer
•Bluetooth can transmit through solid, non-metal objects
•Its typical link range is from 10 cm to 10 m, but can be
extended to 100 m by increasing the power
•Bluetooth enables users to connect to a wide range of
computing and telecommunication devices without the
need of connecting cables
•Typical uses include phones, headsets, notebooks and some
desktop computers
Networking
13
Wireless Local Area Networks
(IEEE 802.11)
•This technology transmits data between workstations and local
area networks using high-speed radio frequencies
•Current technologies allow up to 100 Mbps (theoretical) data
transfer at distances up to hundreds of feet
•Five popular standards: IEEE 802.11b, a, g, n, ac and ax)
Wi - Fi standard Release
Date
Frequency
range
Data Transfer rate -
bandwidth (Max)
Transmission range
(Indoor)
802.11a 1999 5.0GHz 54Mbps 25M
802.11b 1999 2.4GHz 11Mbps 40M
802.11g 2003 2.4GHz 54Mbps 100 feet
802.11n (WiFi4)2007 2.4GHz 450Mbps 325 feet
802.11ac (WiFi5)2014 2.4 & 5.0GHz1000 Mbps 325 feet
802.11ax (WiFi6)2020 2.4 & 5.0GHz2000 Mbps 325 feet
Networking
14
Unit 1
Introduction to computer network
T6 - Network Devices
IT45103
NETWORKING
An Overview
•Network devices are responsible for moving data from
one network cable to another.
•A good network design uses the correct device for
each of the various jobs the network must fulfill.
Networking
16
Network Interface Card
•Network interface cards (also called NICs, network
adapters or network cards)
•Connectivity devices that enable a workstation, server,
printer or other node to receive and transmit data
over the network media.
•All NICs contain a data transceiver, the device that
transmits and receives data signals.
Networking
17
NICs
•Modern Desktops and laptops usually have NICs built
in to motherboard
•USB NICs are also available
Networking
18
Repeater
•Device that extends the distance of a particular
network run.
•It takes a weak network signal in on one side, boosts
the signal, and then sends it out its other side.
•A good example of the use of repeaters would be in a
local area network using a star topology with
unshielded twisted-pair cabling.
•Not commonly used in modern network practice
Networking
19
A repeater extends the distance a network can cover
Networking
20
Hub
•Non-intelligent device that simply and immediately
retransmits the data it receives from any workstation
out to all other workstations.
•Could be considered as a multi-port repeater.
•It does not filter out any data frames, and it does not
perform any routing.
•Each hub is a separate collision domain
•All packets are transmitted immediately when received
and so there can be collisions
Networking
21
Hub (cont..)
•Total network bandwidth is limited to the speed of the
hub.
•A 10Base-T hub provides 10Mb bandwidth maximum,
no matter how many ports it has.
•Supports half duplex only
•The devices can both transmit and receive on the media
but cannot do so simultaneously.
•Seldom used in modern networks
Networking
22
Networking
23
Switches
•Switches, can be considered as intelligent hubs.
•Can be used to interconnect multiple workstations on
a single LAN or to interconnect multiple LANs.
•The primary function to direct the data frame to only
the addressed receiver.
•Thus, the switch needs to know where all the devices
are so that it can send the data out on the appropriate
link.
•It learns this by watching incoming traffic
Networking
24
Switches (cont..)
•Acts as a filter.
•Reduces traffic and collisions over the network.
•Total network bandwidth is determined by the
number of ports on the switch.
•For example, an 8 port 100Mb switch can support up to
800 Mbps bandwidth.
•Supports full duplex communications. This allows
devices to both transmit and receive data at the same
time.
•Can buffer frames if output port is busy.
•Switch have, in practice, replaced hubs.
Networking
25
Networking
26
Router
•Connects local area networks to wide area network and
between transmission links within a wide area network.
•Performs security functions and must be properly
programmed to accept or reject certain types of incoming
and outgoing data packets.
•Also determines the shortest route to a destination and use
it.
•Has the ability to break up broadcast domains and collision
domains.
Networking
27
Differences between router and
switch
•Routers connect LANs; switches connect
computers
•Routers work with logical (IP) addresses; switches
work with physical (MAC) addresses
•Routers work with packets; switches with frames
•Routers don’t forward broadcasts; switches do
•Routers use routing tables; switches use switching
tables
Networking
28
Routers interconnect LANs
to from the Internet
Each router interface
creates a broadcast domain
Networking
30
Routers
Switches
Networking
31
Unit 1
Introduction to Computer Network
T7 -TCP/IP Model
IT45103
NETWORKING
TCP/IP model
The goal was to create an open architecture that would allow virtually all
networks to inter-communicate.
The Internet model is commonly referred to as the TCP/IP model
Four layers;
Application
Transport
Internet
Network
Access
Networking2
Not commonly used in
modern networks
Networking3
Application Layer
Supports the network applications.
Common network applications include web browsing, e-
mail, file transfers, remote logins and network
management.
Protocols involved;
Hypertext Transfer Protocol (HTTP) to allow Web browsers and
servers to send and receive World Wide Web pages.
Simple Mail Transfer Protocol (SMTP) to allow users to send
and receive electronic mail.
File Transfer Protocol (FTP) to transfer files from one computer
system to another.
Telnet to allow a remote user to log in to another computer system
Simple Network Management Protocol (SNMP) to allow the numerous
elements within a computer network to be managed from a single point.
Networking4
Commonly uses the Transmission Control
Protocol (TCP) to maintain an error-free end-to-end
connection.
TCP implements
packet sequencing control so that the packets stay in the proper
order
error control in case one packet from a sequence of packets does
not arrive at the final destination or is received damaged
User Datagram Protocol (UDP) is an alternative
used for voice and other real time applications
It forwards packets quickly without sequence or error management.
The application layer protocol will implement any control necessary
Transport Layer
Networking5
Protocol used at this layer is the Internet Protocol (IP).
Internet Protocol is the software that prepares a packet
of data so that it can move from one network to another
on the Internet or within a set of corporate networks.
Most important is the addition of source and destination
information
Internet Layer
Network Access Layer
Prepares a data packet (called a frame at this layer) for
transmission from the user workstation to a router
connecting the local area network to the Internet or
another LAN
Networking6
The complete communication process includes these
steps:
Creation of data at the application layer of the originating source
end device.
Segmentation and encapsulation of data as it passes down the
protocol stack in the source end device.
Generation of the data onto the media at the network access layer
of the stack
Transportation of the data through the internetwork, which
consists of media and any intermediary devices
Reception of the data at the network access layer of the destination
end device
Decapsulation and reassembly of the data as it passes up the
stack in the destination device.
Passing this data to the destination application at the Application
layer of the destination end device
Networking7
During encapsulation
Each succeeding layer encapsulates the PDU (Protocol Data Unit)
that it receives from the layer above in accordance with the protocol
being used.
Networking8
During decapsulation
Decapsulation
Networking9
Unit 1
Introduction to Computer Network
T8 - OSI Model
IT45103
NETWORKING
Open Systems Interconnection (OSI) model
Where the application using the network resides
Performs a series of various functions necessary for
presenting the data package to the sender or receiver.
Responsible for establishing sessions between source and
destination applications.
Ensures that the data packet that arrives at the final destination is
identical to the data packet that left the originating station.
Provides services to exchange the individual pieces of data over
the network between identified end devices.
Prepares Network layer packets for transmission and to control
access to the physical media.
Handles the transmission of bits over a communications channel.
Networking11
X
X
X
Seldom used
in modern
networks
X
X
X
Networking12
Layer 7 : Application Layer
Provides the interface between the applications.
Exchanges data between programs running on the
source and destination hosts.
Covers applications such as electronic mail, file
transfer systems, remote login systems and Web
browsing.
Networking13
The Presentation layer has three primary functions:
Coding and conversion of Application layer data to ensure
that data from the source device can be interpreted by the
appropriate application on the destination device.
Compression of the data in a manner that can be
decompressed by the destination device.
Encryption of the data for transmission and the decryption of
data upon receipt by the destination.
The standards for video, audio and graphics are examples.
Video – Motion Picture Experts Group (MP4).
Audio – MP3, AC3 etc
Graphic image -Graphics Interchange Format (GIF), Joint
Photographic Experts Group (JPEG).
Layer 6 : Presentation Layer
Networking14
Session layer handles the exchange of information
to initiate dialogs, keep them active, and to restart
sessions that are disrupted.
For example, while transmitting a large document
such as an electronic book, the session layer may
insert a synchronization point at the end of each
chapter. If any error occurs during transmission, both
sender and receiver can back up to the last
synchronization point and start retransmission from
there.
Layer 5 : Session Layer
Networking15
To ensure no transmission errors, the data arrives in
the same order as it was transmitted, and there is no
duplication of data.
Includes these functions:
Enables multiple applications to communicate over the
network at the same time on a single device
Ensures that, if required, all the data is received reliably
and in order by the correct application
Employs error handling mechanisms
Layer 4 : Transport Layer
Networking16
To accomplish this end-to-end transport, Layer 3
uses four basic processes:
Addressing
Identifies source and destination addresses
Encapsulation
Splits data into packets as necessary
Routing
Finds a route from source to destination
Decapsulation
Re-assembles data as necessary
Layer 3 : Network Layer
Networking17
The Data Link layer performs two basic services:
Allows the upper layers to access the media using
techniques such as framing.
Controls how data is placed onto the media and is
received from the media using techniques such as media
access control and error detection.
Usually implemented in a physical device, such as a
NIC with associated driver software.
This performs the functions of preparing data for
transmission and encoding the data as signals to be
sent on the associated media.
Layer 2 : Data Link Layer
Networking18
Data Link layer is often divided into two sublayers:
Logical Link Control (LLC) places information in the
frame that identifies which Network layer protocol is
being used for the frame.
Media Access Control (MAC) provides Data Link layer
addressing and delimiting of data according to the
physical signaling requirements of the medium and the
type of Data Link layer protocol in use.
Layer 2 : Data Link Layer
Networking19
Networking20
Networking21
To perform this transmission of bits, the physical
layer handles voltage levels, plug and connector
dimensions, pin configurations and other electrical
and mechanical issues.
There are currently three basic forms of network
media on which data is represented: Copper cable,
Fiber, Wireless.
These all, of course, use very different forms of
electromagnetic signals, voltage levels, plugs etc.
Layer 1 : Physical Layer
Networking22
Networking23
Networking24
Comparing OSI model and TCP/IP model
Note that the TCP/IP
Transport layer
includes some of the
OSI Session layer
functions
Networking25
Unit 1
Introduction to computer network
T9 -IP Addresses
IT45103
NETWORKING
Networking1
Introduction
Each device on a network must be uniquely defined.
At the Network layer, the packets of the communication
need to be identified with the source and destination
addresses of the two end systems.
These addresses are used in the data network as binary
patterns.
For us humans, a string of 32 bits is difficult to interpret
and even more difficult to remember.
01011010110011000110100110100101
Therefore, IPv4 addresses are written using dotted
decimal format.
202.23.12.42
Networking2
Dotted decimal
3
Binary patterns representing IPv4 addresses are
expressed as dotted decimals by separating each byte of
the binary pattern, called an octet, with a dot. It is called
an octet because each decimal number represents one
byte or 8 bits.
For example, the address:
Networking
Dotted decimal
The logical 32-bit IPv4 address is classified and is made up of two parts.
The first part identifies the network and the second part identifies a host
on that network.
Networking4
Keep these steps in mind:
➢Divide the 32 bits into 4 octets.
➢Convert each octet to decimal.
➢Add a "dot" between each
decimal.
Convert Binary to Decimal number
5
In the example, the binary number:
10101100000100000000010000010100
converts to:
172.16.4.20
Networking
Convert Decimal to Binary
Networking6
IP ADDRESS CLASSES
There were five basic classes of an IP address:
Class A, B, C, D and E
In practice these classes are no longer used,
network addresses are set to different sizes as
necessary
Addres
s Type
Beginning
Bit
Pattern
First
Decimal
Value
Network Address
(net ID)
Host Address
(host ID)
Class A0 0 - 127 128 addresses (7 bits)16,777,216
addresses (24 bits)
Class B10 128 - 191 16,384 addresses (14
bits)
65,536 addresses
(16 bits)
Class C110 192 – 223 2,097,152 addresses
(21 bits)
256 addresses (8
bits)
Class D1110 224 – 239 Multicast address
Class E1111 240 - 255 Reserved address
Networking7
IPv6
8
IP addresses are 32 bits which is a total of about 4 billion
addresses
The world population is now almost 8 billion
We are in the process of moving to a new system called
IPv6
This has 128 bits which gives a total of
340,282,366,920,938,463,463,374,607,431,768,211,456
addresses
These addresses are written in HEX notation
www.google.com is 2404:6800:4001:80f::2004
www.facebook.com is 2a03:2880:f12a:183:face:b00c:0:25de
Networking
IPv6
Address is 128 bits written as 32 hex digits in groups
of 4 separated by colon :
2001:0045:0000:0000:ef01:2345:0000:0abc
Addresses should be written with lower case letters
Leading zeros should be omitted
2001:45:0000:0000:ef01:2345:0000:abc
Groups of all zeros should be omitted
2001:45:0:0:ef01:2345:0:abc
Consecutive all zero groups should be omitted but
only once per address
2001:45::ef01:2345:0:abc
Networking9
Exercise
Shorten the following addresses per the
recommendations
2001:00fe:0000:1224:5600:0078:0001:0001
2001:00e0:0000:2345:6700:0055:0000:0003
2001:0123:0045:6789:0000:0000:0000:0000
Examples
2001:0000:839f:1234:0045:0000:abcd:0ace
2001:0:839f:1234:45:0:abcd:ace
2001:0000:0000:1234:0045:0000:0000:0ace
2001::1234:45:0:0:ace
Networking