Lec 01
Lec 01
CSE-3101
Computer Networking
1
Books
Computer Networks (7th Edition)
Andrew S. Tanenbaum
2
Computer Networks
3
Components of Computer Network
Optical fibre
OLTE
Modem
Wired Network Wireless Network
Hybrid Network
The network topology defines the way in which computers, printers,
and other devices are connected.
10
Example-1
We use the concept of layers in our daily life. As an
example, let us consider two friends who communicate
through postal mail. The process of sending a letter to a
friend would be complex if there were no services
available from the post office.
11
Fig.1 Tasks involved in sending a letter 12
A five-layer network is illustrated in fig.2. The entities comprising the
corresponding layers on different machines are called peers. The peer may be
process, hardware devices, or even human beings. In other words, it is the peers
that communicate by using the protocol. A set of layers and protocols called
network architecture.
13
Fig.2 Layers, protocols, and interfaces
Example-2
An analogy may help explain the idea of multilayer communication.
14
Fig.2 The philosopher-translator-secretary architecture
Imagine two philosophers (peer processes in layer 3), one of
whom speaks Urdu and English and one of whom speaks Chinese
and French.
15
The translator then gives the message to a secretary for
transmission, by, for example, fax (the layer 1 protocol). When the
message arrives, it is translated into French and passed across the
2/3 interface to philosopher 2.
17
Layers of networks deals with:
Addressing
Error control
Flow control
Multiplexing/De-multiplexing
Routing
18
The OSI Reference Model
It was revised in 1995 and the model become OSI (Open System
interconnection) Reference Model because it deals with connecting
open systems-that, systems that are open for communication with
other systems.
19
Seven layers of the OSI model
20
An exchange using the OSI model
21
The interaction between layers in the OSI model
22
Physical Layer
Starting at the bottom and working up, the physical layer
handles the transmission of raw bits over a communications link.
23
Physical layer
24
Data link layer
Frames are constructed from data string by adding special bit
patterns to the beginning and end of each segment of data called
frame. This allows the receiving end to detect where each frame
begins and where it ends.
26
Data link layer
27
Hop-to-hop delivery of Data Link Layer
28
The Network Layer
The network layer handles routing among nodes within a packet-
switched network. At this layer, the unit of data exchanged among
nodes is typically called a packet rather than a frame, although they
are fundamentally the same thing.
29
Logical addressing: The physical addressing implemented by the
data link layer handles the addressing problem locally. If a packet
passes the network boundary, we need another addressing system to
help distinguish the source and destination systems. The network
layer adds a header to the packet coming from the upper layer that,
among other things, includes the logical addresses of the sender and
receiver.
30
Network layer
31
Source-to-destination delivery
32
The Transport Layer
Efficient and cost-effective delivery of data across the network
from one host to another. The transport layer and higher layers
typically run only on the end hosts and not on the intermediate
switches or routers.
34
The transport layer is responsible for the delivery of a message from
one process to another
35
The Session Layer
The session layer controls the dialogues (connections) between
end terminals.
It provides for full duplex, half duplex or simplex operation, and
establishes checkpointing, adjournment, termination, and restart
procedures.
36
The session layer provides: checkpoints or synchronization points to a stream of
data, which is not usually used in the Internet Protocol Suite. During long
transmissions sometimes a host becomes disconnected in the midst of
communication then checkpointing allow them to continue from where they were
crashed.
You can use your computer to open a browser window to your favorite Web
site, then open a second window to the same server and follow different links in
each browser. The window can act independently because the Web server and
your computer have two independent sessions. 37
The Presentation Layer
The presentation layer is concerned with the format of data exchanged
between peers, for example, whether an integer is 16, 32, or 64 bits long
and whether the most significant byte is transmitted first or last, or how a
video stream is formatted.
More explicitly, this layer is responsible for data translation into a
standard format. Examples are ASCII (American Standard Code for
Information Interchange, 7-bit character encoding) text, EBCDIC
(Extended Binary Coded Decimal Interchange Code, 8-bit character
encoding), JPEG pictures and MP3 music formats. Conversion between
the binary representation of application data and a common format for
transmission between peer applications.
For example, the Presentation Layer can apply sophisticated
compression techniques so fewer bytes of data are required to represent
the information when it's sent over the network.
38
This layer is also responsible for encryption and decryption for
security purposes, as well as data compression. It is sometimes
called the syntax layer.
Application layer
This layer provides a consistent interface to the network for all
computer software i.e. provides OSI environment.
File transfer, web browser, e-mail etc are applications and
implemented using some application layer protocols. Application
layer protocols for above applications are File Transfer Protocol
(FTP) to transfer file between two hosts, HTTP to fetch web page
from a server, SMTP for e-mail.
This layer also provides security like cryptography, Digital
signature, Firewall etc.
40
Summary of layers
41
Hosts, routers, and link-layer switches; each contains a different set
of layers, reflecting their differences in functionality. 42