You are on page 1of 29

Department of ECE

DATA NETWORKS AND PROTOCOLS


21EC2210
Topic:

INTRODUCTORY SESSION

Session - 1

CREATED BY K. VICTOR BABU


AIM OF THE SESSION
The students are familiarized with the basic concepts of Data communications
INSTRUCTIONAL OBJECTIVES

This Session is designed to:


1. Define a network and its purpose.
2. Describe several uses for networks.
3. Understand the various characteristics of a network, such as topology, architectures, and size.
4. Understand characteristics about data and how it travels over a network.
5. Name specific types of wired and wireless networking media and explain how they transmit data.
6. Identify the most common communications protocols and networking standards used with networks today.
7. List several types of networking hardware and explain the purpose of each.

LEARNING OUTCOMES

At the end of this session, you should be able to:


1. Define a the components of data communications
2. Describe the process in which the signal is converted to digital form
3. Summarize the process of communication systems between devices
CREATED BY K. VICTOR BABU
1. Session-1: Detailed Explanation on Handout (13 Weeks plan -total 39 Hrs )

 Syllabus
 Text & Reference Books
 Massive Open Online Courses (MOOCs)
•Significant of Coursera
•Registration_ The Bits and Bytes of Computer
Networking
•Course Methodology & Completion
 Evaluation Plan :
• In Semester Formative Evaluation : 20%
• In Semester Summative Evaluation : 40%
CREATED BY K. VICTOR BABU • End Semester Summative Evaluation : 40%
2. Data Networks and Protocols 21EC2210

CO1: Introduction to Computer networks and Data Link Layer: (10Hours)


Introduction to Computer networks
Data Link Layer
• CO2: Network layer and Internetworking: (10Hours)
Internetworking Devices:
 Internetworking Technologies:
 Networking Protocols:
• C03: Transport Layer: (10Hours)
Presentation Layer:
Application Layer:
• CO4: Advanced Topics:  (09Hours)
Cryptography:
Advancements in Application layer:
Wireless LANs:
Network Security:
CREATED BY K. VICTOR BABU
3.Syllubus – Data Networks and Protocols 21EC2210
CO1: Introduction to Computer networks and Data Link Layer: (10Hours)
Introduction to Computer networks Use of Computer Networks, Network Hardware, Network software, Reference models: OSI and TCP/IP,
Example Networks, Physical Layer: The theoretical basis for Data Communication, Guided and Unguided Transmission Media, Switching, Modems,
ADSL, Trunks and Multiplexing.
Data Link Layer: DLL design issues. Error Detection and Correction, Elementary data link protocols, sliding window protocols. Medium Access
Control Sub layer: Channel allocation problem, multiple access protocols, Ethernet.

CO2: Network layer and Internetworking: (10Hours)


Internetworking Devices: Preamble to Network Layer, Distinguishing of Networking Devices and Internetworking Devices, Analysis of Router
Processing: Access, core and distribution. VLANS, Ethernet
 Internetworking Technologies: Wired Router, Wireless Router, Gateway, CSU/DSU; Addressing: IP addressing (IPV4 & IPV6), subnetting; Types
of Routing: static, default and dynamic.
 Networking Protocols: RIP, OSPF, BGP; Access Control list for IPV4, IPV6, Other Protocols: NAT, ARP, Port Address Translation (PAT), IP
Tunneling; DHCP.

C03: Transport Layer: (10Hours)Process to Process Delivery; UDP; TCP; FCP Fibre Channel Protocol; Stream Control Transmission Protocol
(SCTP); Congestion Control: Open Loop, Closed Loop Choke Packets; Quality of Service: Techniques to Improve QoS: Leaky bucket algorithm,
Token bucket algorithm.
 Session Layer: ISNS Internet Storage Name Service.
Presentation Layer: SSL, preface of Socket , Secure Socket Layer
Application Layer: Telnet, TFTP, POP3, DNS, SMTP, SNMP, FTP, NTP, SSDP.

CO4: Advanced Topics:  (09Hours)


Cryptography: Public and Private Key based) Digital Signature, Firewalls
 Advancements in Application layer: ISDN services & ATM, DSL technology, wired and wireless Modem: Architecture & Operation in brief.
Wireless LANs: IEEE 802.11; Multi-Band Routers (Tri Band Wireless Routers);
 Network
CREATED Security: Essential Steps for Configuring a New Server and firewalls, Different types of network layer attacks and IP security.
BY K. VICTOR BABU
Text & Reference Books – Data Networks and Protocols 21EC2210
Text Books
1) B. A. Frouzan – “Data Communications and Networking (3rd Ed.) “– TMH
2) A. S. Tanenbaum – “Computer Networks (4th Ed.)” – Pearson Education/PHI
3) W. Stallings – “Data and Computer Communications (5th Ed.)” – PHI/ Pearson Education
4) Zheng & Akhtar, Network for Computer Scientists & Engineers, OUP
5) Black, Data & Computer Communication, PHI
6) Miller, data Communication & Network, Vikas
7) Miller, Digital & Data Communication, Jaico
8) Shay, Understanding Data Communication & Network, Vikas
Reference Books
9) Kurose and Rose – “Computer Networking -A top down approach featuring the internet” Pearson
Education
10) Leon, Garica, Widjaja – “Communication Networks” – TMH
11) Walrand – “Communication Networks” – TMH.
12) Comer – “Internetworking with TCP/IP, vol. 1, 2, 3(4th Ed.)” – Pearson Education/PHI
CREATED BY K. VICTOR BABU
MOOCs – Data Networks and Protocols 21EC2210
Coursera : Data Networks and Protocols

Registration_ The Bits and Bytes of Computer Networking


1) The Bits and Bytes of Computer Networking (Coursera) Nov 11th 2019. Google
https://www.coursera.org/learn/computer-networking
2) Network Protocols and Architecture
https://www.coursera.org/learn/network-protocols-architecture?=
3) An Introduction to Computer Networking for Teachers (FutureLearn) Oct 7th 2019. Raspberry Pi
Foundation
4) Introduction to Computer Networking (Stanford Online) Self-Paced.
5) CompTIA A+ (Cybrary) Self Paced
6) Operating Systems (saylor.org) Self Paced
7) Network Protocols and Architecture
8) Network Protocols and Architecture
 Registration_ The Bits and Bytes of Computer Networking: Enroll 18-12-2019
 Course Methodology & Completion: 12-03-2019 with all competency
CREATED BY K. VICTOR BABU
Evaluation Plan – Data Networks and Protocols 21EC2210
Evaluation Assessment
Evaluation Type Weightage/Marks Duration CO1 CO2 CO3 CO4 CO5
Component Dates

6 6 6
End Semester Weightage 24 6  
End Semester 20.4.2020 180
Exam
Summative Max Marks 100 25 25 25 25  
Evaluation Total = 40 Lab End Sem Weightage 16         16
25.04.2020 120
Exam Max Marks 50         50
Continuous Weightage 7         7
Evaluation -- 30.3.2020 120
Lab Exercise Max Marks 300         300
In Semester Weightage 8 2 2 2 2  
Formative Evaluation ALM 3.01.2020 50
Total = 22 Max Marks 10 2.5 2.5 2.5 2.5  
Home Weightage 7 1.75 1.75 1.75 1.75  
Assignment and 3.01.2020 120
Textbook Max Marks 20 5 5 5 5  

Semester in Weightage 15 7.5 7.5      


01.02.2020 120
Test -I
Max Marks 50 25 25      
In Semester Weightage 15     7.5 7.5  
Semester in
Summative 04.04.2020 120
Test -II Max Marks 50     25 25  
Evaluation Total = 38
Lab in Semester Weightage 8         8
30.03.2020 120
Exam Max Marks 50         50
CREATED BY K. VICTOR BABU
What is a Network?

• Network: A connected system of


objects or people
• Computer network: A collection of
computers and other hardware devices
connected together so users can share
hardware, software, and data, and
electronically communicate
• Computer networks converging with
telephone and other communications
networks
• Networks range from small private
networks to the Internet (largest network
in the world)

CREATED BY K. VICTOR BABU


Fig.1.1 Application of Networks.
CO1_COI_1_Introduction to Computer networks
Introductory to Computer Networks
•A computer network consists of two or more computers or other intelligent devices linked by communication media (e.g.,
Cable or Wireless Media) to achieve successful communication.

Four elements of a network:


- Rules
- Medium
- Messages
- Devices

Fig.1.2 Elements of Computer network.


CREATED BY K. VICTOR BABU
Fig.1.3 Wired Network. Fig.1.4 Wireless network.
CO1_COI_1_Introduction to Computer networks

Fig.1.5 Common data network symbols.


CREATED BY K. VICTOR BABU
CO1_COI_1_Introduction to Computer networks

Fig.1.6 Network Connections.


CREATED BY K. VICTOR BABU
CO1_COI_1_Introduction to Computer networks

Fault Tolerance

Fig.1.7 Example of Fault tolerance.


CREATED BY K. VICTOR BABU
CO1_COI_1_Applications of Computer networks

• The Internet
• Telephone service
– POTS network
– Mobile phones (wireless phones)
• Cellular (cell) phones - must be within
range of cell tower to function
• Satellite phones - used where cell
service isn’t available
• Dual-mode phones - allow
users to make telephone calls
on more than one network
– Cellular / Wi-Fi dual-mode
phones are most popular
Fig.1.8 Applications of Computer networks in the internet and mobile networks.
CREATED BY K. VICTOR BABU
CO1_COI_1_Applications of Computer networks

• Television and radio broadcasting


• Global positioning system (GPS):
Uses satellites and a receiver to
determine the exact geographic
location of the receiver
– Commonly used by individuals
to determine their
exact location
– Used on the job by surveyors,
farmers, and fishermen
– Used to guide vehicles and
equipment
– Used by the military to guide
munitions
Fig.1.9 Applications of Computer networks in television and Broadcasting.
– Geocaching
CREATED BY K. VICTOR BABU
CO1_COI_1_Applications of Computer networks

• Monitoring systems: Monitor


status or location of individuals,
vehicles, assets, etc. --RFID-
based systems.
• Monitor the status of objects
GPS-Based monitoring systems
• Monitor the physical location of
objects
– Electronic medical monitors Fig.1.10
Applications of
and other types of home Computer networks
in monitoring
health monitoring systems.
– Sensor networks
CREATED BY K. VICTOR BABU
CO1_COI_1_Applications of Computer networks

• Multimedia networking: Distributing digital multimedia content, typically via a home


network
– Sharing content throughout the home
– Placeshifting content, such as via Slingbox

Fig.1.11 Applications of Computer networks in multimedia networks.


CREATED BY K. VICTOR BABU
CO1_COI_1_Applications of Computer networks
• Videoconferencing: Use of computers, video cameras,
microphones, and networking technologies to conduct face
to face meetings over a network.
– Online conferencing
(via the Internet)
– Telepresence
videoconferencing
• Collaborative computing
(workgroup computing)
• Telecommuting

Fig.1.12 Applications of Computer networks in Videoconferencing.

CREATED BY K. VICTOR BABU


CO1_COI_1_Applications of Computer networks

• Telemedicine: Use of networking


technology to provide medical
information and services
• Remote monitoring and
consultations – Remote diagnosis
– Telesurgery
• Robot assisted
• May be needed for space
exploration

Fig.1.13 Applications of Computer networks in Telemedicine.

CREATED BY K. VICTOR BABU


CO1_COI_1_Applications of Computer networks

Network Characteristics
• Wired vs. wireless networks
– Wired: A network in which computers and other devices are connected to the network
via physical cables

• Found in homes, schools, businesses, and


government facilities

– Wireless: A network in which computers and other devices are connected to the network
without physical cables; data is typically sent via radio waves

• Found in homes, schools, and businesses


• Wi-Fi hotspots found in coffeehouses, businesses, airports, hotels, and libraries
CREATED BY K. VICTOR BABU
CO1_COI_1_Applications of Computer networks

Network Topologies

CREATED BY K. VICTOR BABU


Fig.1.14 Basic Network Topologies.
CO1_COI_1_Applications of Computer networks

Network Architectures

• Architecture: The way networks


are designed to communicate

• Client – Server networks


- Client : Computer or other
device on the network that
requests and utilizes network
resources

- Server : Computer dedicated to


processing client requests. Fig.1.15 Network Architectures.
CREATED BY K. VICTOR BABU
CO1_COI_1_Applications of Computer networks
Network Architectures
• Peer-to-peer (P2P) networks: All computers at the same level–
• Internet P2P computing: Performed via the Internet

Fig.1.16 Peer-to-Peer networks and Internet P2P Networks.


CREATED BY K. VICTOR BABU
CO1_COI_1_Applications of Computer networks
Network Size and Coverage Area
• Personal area network (PAN): Connects an
individual’s personal devices that are
located close together.
• Local area network (LAN): Connects
devices located in a small geographic
area
• Metropolitan area network (MAN):
Serves a metropolitan area
• Wide area network (WAN)
– Large geographic area

CREATED BY K. VICTOR BABU Fig.1.17 Network Size and Coverage Area.


CO1_COI_1_Applications of Computer networks
Quick Quiz
1. Which of the following describes a group of private secure paths
set up using the Internet?
a. VPN
b. WAN
c. WSN

2. True or False: With a bus network, all devices are connected directly
to each other without the use of a central hub or cable.

3. A private network that is set up similar to the World Wide Web for
use by employees of a specific organization is called a(n) .

Answers: 1) a: 2) False 3) intranet


CREATED BY K. VICTOR BABU
SELF-ASSESSMENT QUESTIONS

1. Which of the following describes a group of private secure paths set up using the Internet?

(a) VPN
(b) WAN
(c) WSN

2. True or False: With a bus network, all devices are connected directly to each other without the use of
a central hub or cable.

(a) True
(b) False

3. A private network that is set up similar to the World Wide Web for use by
employees of a specific organization is called a(n)
Answers:
1) a; 2) False; 3) Intranet
CREATED BY K. VICTOR BABU
TERMINAL QUESTIONS

1. Describe a computer network

2. List out different network devices used in networks

3. Analyze the networks based of size and coverage area

4. Summarize the applications of computer networks

CREATED BY K. VICTOR BABU


REFERENCES FOR FURTHER LEARNING OF THE SESSION

Reference Books:
1) 1. B. A. Frouzan – “Data Communications and Networking (3rd Ed.) “–
TMH
2) A. S. Tanenbaum – “Computer Networks (4th Ed.)” – Pearson
Education/PHI
Sites and Web links:
1. Network Protocols and Architecture
https://www.coursera.org/learn/network-protocols-architecture?=

CREATED BY K. VICTOR BABU


THANK YOU

Team – Data Netowrks and Protocols

CREATED BY K. VICTOR BABU

You might also like