You are on page 1of 45

COMPUTER NETWORK

29 2019 16:27

NETWORKING Page 1
OSI LAYER
24 2019 12:11

NETWORKING Page 2
PHYSICAL LAYER
29 2019 21:41

NETWORKING Page 3
DATA LINK LAYER
24 2019 12:16

NETWORKING Page 4
NETWROK LAYER
24 2019 12:16

NETWORKING Page 5
TRANSPORATION LAYER
24 2019 12:16

NETWORKING Page 6
SESSION LAYER
24 2019 12:17

NETWORKING Page 7
PRESENTATION LAYER
24 2019 12:17

NETWORKING Page 8
APPLICATION LAYER
29 2019 23:59

NETWORKING Page 9
LAN, MAN, WAN
24 2019 12:30

NETWORKING Page 10
TCP
24 2019 12:15

NETWORKING Page 11
IP
30 2019 00:40

NETWORKING Page 12
CLASSFULL CLASS: A, B, C, D, E
24 2019 12:18

NETWORKING Page 13
CLASSLESS ADDRESS CIDR
24 2019 12:19

NETWORKING Page 14
UDP
24 2019 12:15

NETWORKING Page 15
MAC ADDRESS
24 2019 12:31

NETWORKING Page 16
Internetworking & Networking devices
24 2019 12:20

NETWORKING Page 17
CABLE TYPES
24 2019 12:21

NETWORKING Page 18
REPEATERS
24 2019 12:22

NETWORKING Page 19
HUBS
24 2019 12:22

NETWORKING Page 20
ROUTERS
24 2019 12:22

NETWORKING Page 21
BRIDGES
24 2019 12:24

NETWORKING Page 22
SWITCHING
24 2019 12:23

Circuit swithcing = physical layer


Packet swithcing = data link ( virtual circuits) and network layer ( datagram)

NETWORKING Page 23
GATEWAY
29 2019 13:25

NETWORKING Page 24
IDS
29 2019 13:26

NETWORKING Page 25
FIREWALL
29 2019 13:26

NETWORKING Page 26
MODEM
29 2019 13:26

NETWORKING Page 27
TOPOLOGY
24 2019 12:23

NETWORKING Page 28
MESH
29 2019 12:27

In this type of topology, a host is


connected to one or multiple hosts.
This topology has hosts in point-to-
point connection with every other host
or may also have hosts which are in
point-to-point connection to few hosts
only.

Mesh technology comes into two types:


• Full Mesh: All hosts have a point-
to-point connection to every other
host in the network. Thus for every
new host n(n-1)/2 connections are
required. It provides the most
reliable network structure among all
network topologies.

• Partially Mesh: Not all hosts have


point-to-point connection to every
other host. Hosts connect to each
other in some arbitrarily fashion.
This topology exists where we need
to provide reliability to some hosts
out of all.

NETWORKING Page 29
STAR OR HUB
29 2019 12:33

All hosts in Star topology are connected to a


central device, known as hub device, using a
point-to-point connection. That is, there exists
a point to point connection between hosts and
hub. The hub device can be any of the following:
• Layer-1 device such as hub or repeater

• Layer-2 device such as switch or bridge

• Layer-3 device such as router or gateway


Hub acts as single point of failure. If hub fails,
connectivity of all hosts to all other hosts
fails. Every communication between hosts, takes
place through only the hub.
Star topology is not expensive as to connect one
more host, only one cable is required and
configuration is simple.

NETWORKING Page 30
BUS
29 2019 13:03

In case of Bus topology, all


devices share single
communication line or cable.
Collison: Bus topology may have
problem while multiple hosts
sending data at the same time.
Therefore, Bus topology either
uses CSMA/CD technology or
recognizes one host as Bus Master
to solve the issue.
It is one of the simple forms of
networking where a failure of a
device does not affect the other
devices. But failure of the
shared communication line can
make all other devices stop
functioning.
Both ends of the shared channel
have line terminator. The data is
sent in only one direction and as
soon as it reaches the extreme
end, the terminator removes the
data from the line.

NETWORKING Page 31
RING
29 2019 13:08

In ring topology, each host machine


connects to exactly two other machines,
creating a circular network structure.
When one host tries to communicate or send
message to a host which is not adjacent to
it, the data travels through all
intermediate hosts.
To connect one more host in the existing
structure, the administrator may need only
one more extra cable.
Failure of any host results in failure of
the whole ring. Thus, every connection in
the ring is a point of failure. There are
methods which employ one more backup ring.
NUMBER OF CABLES = N+1
NUMBER OF PORTS = 1 * N

NETWORKING Page 32
ERROR DETECTION AND CORRECTION
24 2019 12:24

NETWORKING Page 33
SINGLE BIT PARITY
29 2019 16:07

NETWORKING Page 34
NETWORKING Page 35
Two-dimensional Parity check
30 2019 00:48

NETWORKING Page 36
HAMMING
29 2019 16:07

For hamming distance = perform XOR on


two data bits. THE NUMBER OF 1s =
hamming distance.
d= hamming distance. And it can detect
d-1 error.
Hamming distance for 4 bit data will be
minimum 2 and max 4

NETWORKING Page 37
CHECKSUM
29 2019 16:29

This is a block code method where a checksum is created based on the data values in the
data blocks to be transmitted using some algorithm and appended to the data. When the
receiver gets this data, a new checksum is calculated and compared with the existing
checksum. A non-match indicates an error.

Error Detection by Checksums


For error detection by checksums, data is divided into fixed sized frames or segments.
• Sender’s End − The sender adds the segments using 1’s complement arithmetic to get
the sum. It then complements the sum to get the checksum and sends it along with the
data frames.
• Receiver’s End − The receiver adds the incoming segments along with the checksum
using 1’s complement arithmetic to get the sum and then complements it.
If the result is zero, the received frames are accepted; otherwise they are discarded.

Example
Suppose that the sender wants to send 4 frames each of 8 bits, where the frames are
11001100, 10101010, 11110000 and 11000011.
The sender adds the bits using 1s complement arithmetic. While adding two numbers
using 1s complement arithmetic, if there is a carry over, it is added to the sum.
After adding all the 4 frames, the sender complements the sum to get the checksum,
11010011, and sends it along with the data frames.
The receiver performs 1s complement arithmetic sum of all the frames including the
checksum. The result is complemented and found to be 0. Hence, the receiver assumes
that no error has occurred.

NETWORKING Page 38
NETWORKING Page 39
CRC
29 2019 16:06

NETWORKING Page 40
NETWORKING Page 41
NETWORKING Page 42
FLOW CONTROL PROTOCOL
24 2019 12:26

NETWORKING Page 43
PORT NUMBERS
24 2019 12:26

protocol port Transport reason


protocol
ECHO 7 TCP/ UDP To check connectivity, just like ping.
FTP 20 / TCP FOR FILE TRANSFER. Use TCP bcoz we need complete
21 data i.e reliability. Always use TCP for
reliability
20 = Data transfer
21 = Control
SSH 22 TCP USED FOR SECURITY. CRYPTOGRAPHIC FUNCTIONS.
TUNNELING IS USED FOR SECURE CONNECTION.
TELNET 23 TCP LOCAL CONNECTIVITY
SMTP 25 TCP SIMPLE MAIL TRANFER PROTOCOL.
DNS 53 UDP UDP BCOZ WE NEED SPEED CONSISTENTLY.

DHCP 67/68 UDP IF NEED DYNAMIC IP. NOT NEEDED FOR STATIC IP.
67 = DATA
68 = CONTROL
TFTP 69 UDP TRIVIAL FILE TRANFER PROTOCOL = WHEN CLIENT WANT
TO SEND DATA TO SERVER WITHOUT MAKING A DATA
CONNECTION - NO HAND SHARING.
HTTP 80 TCP ALL WEBPAGES.
POP 110 TCP POST OFFICE PROTOCOL. FOR POPPING OR WITHDRWAING
MAILS FROM SERVER TO OUR PC.
NTP 123 UDP NETWORK TIME PROTOCOL. FOR TIME SYNC OF SERVER AND
CLIENT MACHINE. NOT NEEDED A CONNECTION HENCE UDP.

HTTPS 443 TCP SECURED. WORKS ON SSL. CRYTOGRAPHY IS USED - CYPHER


TEXT CONVERSION. USED IN PAYEMNT PORTAL
RIP 520 UDP ROUTING INFO PROTOCOL
NO CONNECTION IS MADE. JUST BROADCASTS.
DISTANCE VECTOR ROUTING.

NETWORKING Page 44
IP4 VS IP6
24 2019 12:27

IP4

FLOW LABEL = CONVERT DATAGRAM IN IP6 INTO VIRTUAL CIRCUITS FOR REAL TIME DATA
TRANSMISSION

JUMBOGRAMS = UPTO 4GB IN IP6

HOP LIMIT = TTL

NETWORKING Page 45

You might also like