Documente Academic
Documente Profesional
Documente Cultură
in
Code&name of the sub: CS2302& computer networks
Unit:I
R/TP/02
ISSUE C REV:0.0
Lecture plan
.in
-prepared by
S.Revathy,lect/cse
LTPC
3003
be
UNIT I
tu
9
Network architecture layers Physical links Channel access on links Hybrid
multiple access techniques - Issues in the data link layer - Framing Error correction
and detection Link-level Flow Control
UNIT II
se
9
Medium access CSMA Ethernet Token ring FDDI - Wireless LAN Bridges and
Switches
UNIT III
.c
9
Circuit switching vs. packet switching / Packet switched networks IP ARP RARP
DHCP ICMP Queueing discipline Routing algorithms RIP OSPF Subnetting
CIDR Interdomain routing BGP Ipv6 Multicasting Congestion avoidance in
network layer
UNIT IV
9
UDP TCP Adaptive Flow Control Adaptive Retransmission - Congestion control
Congestion avoidance QoS
UNIT V
9
Email (SMTP, MIME, IMAP, POP3) HTTP DNS- SNMP Telnet FTP Security
PGP SSH
TOTAL= 45 PERIODS
TEXT BOOK:
1. Larry L. Peterson, Bruce S. Davie, Computer Networks: A Systems Approach,
www.csetube.in
www.csetube.in
Code&name of the sub: CS2302& computer networks
Unit:I
R/TP/02
ISSUE C REV:0.0
INTRODUCTION
.c
se
tu
be
.in
network
can consist of two or more computers directly connected by some physical
medium,
such as a coaxial cable or an optical fiber. We call such a physical medium a link,
and
www.csetube.in
www.csetube.in
Code&name of the sub: CS2302& computer networks
Unit:I
R/TP/02
ISSUE C REV:0.0
.in
.c
se
tu
be
www.csetube.in
www.csetube.in
Code&name of the sub: CS2302& computer networks
ISSUE C REV:0.0
.c
se
tu
be
.in
Unit:I
R/TP/02
A set of nodes, each of which is attached to one or more point to-point links.
Those nodes that are attached to at least two links run software that forwards data
networks,of which the two most common are circuit switched and packet switched.
www.csetube.in
www.csetube.in
Code&name of the sub: CS2302& computer networks
Unit:I
R/TP/02
ISSUE C REV:0.0
tu
be
.in
Network Architecture
se
.c
building
monolithic
several
piece of software that does everything you will ever want, you can implement
layers, each of which solves one part of the problem. Second, it provides a more
modular
design.
www.csetube.in
www.csetube.in
Code&name of the sub: CS2302& computer networks
ISSUE C REV:0.0
be
.in
Unit:I
R/TP/02
The abstract objects that make up the layers of a network system are called
tu
se
.c
face to the other objects on the same computer that want to use its communication
services. This service interface defines the operations that local objects can
perform
on the protocol. Second, a protocol defines a peer interface to its counterpart (peer)
on another machine. This second interface defines the form and meaning of
www.csetube.in
www.csetube.in
Code&name of the sub: CS2302& computer networks
ISSUE C REV:0.0
se
tu
be
.in
Unit:I
R/TP/02
OSI Architecture
architecture.
.c
The ISO was one of the first organizations to formally define a common way to
connect
computers. Their architecture, called the Open Systems Interconnection (OSI)
www.csetube.in
www.csetube.in
Code&name of the sub: CS2302& computer networks
ISSUE C REV:0.0
.c
se
tu
be
.in
Unit:I
R/TP/02
Starting at the bottom and working up, the physical layer handles the
The data link layer then collects a stream of bits into a larger aggregate called a
frame. Network adaptors, along with device drivers running in the nodes OS,
typically implement the data link level. This means that frames, not raw bits, are
actually delivered to hosts.
The network layer handles routing among nodes within a packet-switched
network. At this layer, the unit of data exchanged among nodes is typically called a
packet rather than a frame, although
they are fundamentally the same thing.
www.csetube.in
www.csetube.in
Code&name of the sub: CS2302& computer networks
Unit:I
R/TP/02
ISSUE C REV:0.0
The lower three layers are implemented on all network nodes, including
switches within the network and hosts connected along the exterior of the network.
The transport layer then implements what we have up to this point been calling
a process-to-process channel. Here, the unit of data exchanged is commonly called
.in
a message rather than a packet or a frame. The transport layer and higher layers
typically run only on the end hosts and not on the intermediate switches or routers.
be
Communications Media
coaxial cables
tu
twisted pairs
se
radio
satellite links
.c
fiber optics
Power line
Network Structures
Point-to-Point Networks
www.csetube.in
www.csetube.in
Code&name of the sub: CS2302& computer networks
Unit:I
R/TP/02
ISSUE C REV:0.0
Broadcast Networks
have a single communication line shared by all computers on the
.in
network
packets sent by a host are received by all computers
tu
be
< a few km
se
.c
up to 50 km
www.csetube.in
www.csetube.in
Code&name of the sub: CS2302& computer networks
Unit:I
R/TP/02
ISSUE C REV:0.0
.in
be
tu
se
.c
layer.
Data transfer data rate and error correction are the major
www.csetube.in
www.csetube.in
Code&name of the sub: CS2302& computer networks
Unit:I
R/TP/02
ISSUE C REV:0.0
be
.in
layer
tu
se
.c
The network layer hands some bits to the data link layer for
transmission to the destination, the job of the data link layer is to transmit
the bits to the destination machine, so they can be handed over to the
www.csetube.in
www.csetube.in
Code&name of the sub: CS2302& computer networks
Unit:I
R/TP/02
ISSUE C REV:0.0
.in
be
tu
se
transferred. Each frame sent over the connection is numbered, and the
data link layer guarantees that each frame sent is received. Furthermore, it
.c
guarantees that each frame is received exactly once and that all frames are
received in the right order.
distinct phases.
both sides initialize variable and counter need to keep track of which
frames have been received and which ones have not.
2. In the second phase, one or more frames are actually
transmitted.
3. In the third phase, the connection is released, freeing up
the variables, buffers, and other resources used to maintain the
connection.
www.csetube.in
www.csetube.in
Code&name of the sub: CS2302& computer networks
Unit:I
R/TP/02
ISSUE C REV:0.0
Framing
In order to provide service to the network layer, the data link
layer must use the service provided to it by the physical layer.
What the physical layer does is accept raw bit stream and
.in
be
tu
The usual approach is for the data link layer to break the bit
stream up into discrete frames and compute the checksum for each frame.
se
.c
1. Character count.
header to specify the number of characters in the frame. when the data
link layer at the destination sees the character count, it knows how many
characters follow. Problem: count can possible be misrepresented by a
transmission error. This method is rarely used anymore.
The second framing method, Starting and ending character
stuffing, gets around the problem of resynchronization after an error by
having each frame start with the ASCII character sequence DLE STX and
www.csetube.in
www.csetube.in
Code&name of the sub: CS2302& computer networks
Unit:I
R/TP/02
ISSUE C REV:0.0
end with the sequence DLE ETX. (DLE is Data Link Escape, STX is Start of
Text, and ETX is End of Text). Problem: a serious problem occurs with
this method when binary data, such as object programs or floating-point
numbers, are being transmitted it is possible that the DLE, STX, and ETX
.in
characters can occur, which will interfere with the framing. One way to
solve this problem is to have the sender's data link layer insert and DLE
character just before each "accidental" DLE and the data link layer on the
be
other machine removes them before it gives the data to the network layer,
this is called Character stuffing.
tu
The third method, Starting and ending flags with bit stuffing,
allows data frames to contain and arbitrary number of bits and allows
se
character codes with an arbitrary number of bits per character. Each frame
begins and ends with a special bit pattern, 01111110, called a flag byte.
.c
Whenever the sender's data link layer encounters five consecutive ones in
the data, it automatically stuffs a 0 bit into the outgoing bit stream, which
contains some redundancy. For example, some LANs encode 1 bit of data
by using 2 physical bits.
Error Control
The next problem to deal with is, who to make sure all frames
are eventually delivered to the network layer at the destination, and in
proper order.
The usual way to ensure reliable delivery is to provide the
www.csetube.in
www.csetube.in
Code&name of the sub: CS2302& computer networks
Unit:I
R/TP/02
ISSUE C REV:0.0
sender with some feedback about what is happening at he other end of the
line.
One complication with this is that the frame may vanish
completely, in which case, the receiver will not react at all, since it has no
.in
reason to react.
This possibility is dealt with by introducing timers into the data
be
link layer. When the sender transmits a frame, it generally also starts a
timer. The timer is set to go off after an interval long enough for the frame
tu
se
.c
www.csetube.in
www.csetube.in
Code&name of the sub: CS2302& computer networks
Unit:I
R/TP/02
ISSUE C REV:0.0
.in
be
tu
Layer 2 of the OSI model is the data link layer. One of the most common
layer 2 protocols is the HDLC protocol. In fact, many other common layer 2
se
.c
stuffing) to ensure that the bit pattern of the delimiter flag does not occur
in the fields between flags. The HDLC frame is synchronous and therefore
relies on the physical layer to provide method of clocking and synchronizing
www.csetube.in
www.csetube.in
Code&name of the sub: CS2302& computer networks
Unit:I
R/TP/02
ISSUE C REV:0.0
.in
The standard frame of the HDLC protocol handles both data and control
messages. It has the following format:
be
For instance the SDLC use only 8 bit address, while SS#7 has no address
tu
The 8 or 16 bit control field provides a flow control number and defines the
se
frame type (control or data). The exact use and structure of this field
depends upon the protocol using the frame.
.c
Data is transmitted in the data field , which can vary in length depending
upon the protocol using the frame. Layer 3 frames are carried in the data
field.
Frame Classes:
www.csetube.in
www.csetube.in
Code&name of the sub: CS2302& computer networks
Unit:I
R/TP/02
ISSUE C REV:0.0
.in
Supervisory frames are use for error and flow control. They contain, send
be
Frame types: Three classes of frames are used in HDLC. Some of the
tu
Unnumbered frames are used for link management. SNRM and SABM
se
frames , for example, are used both to set up logical link between the
primary and the secondary station and to inform the secondary station of
.c
There are four types of supervisory frames but only RR and RNR are used
in both NRM and ABM These frames are used both to indicate the
www.csetube.in
www.csetube.in
Code&name of the sub: CS2302& computer networks
Unit:I
R/TP/02
ISSUE C REV:0.0
.in
Link management
. Prior to any kind of transmission (either between two stations connected
by a point to point link or between a primary and secondary station a
be
tu
Data transfer
se
the primary station. The unnumbered poll frame with the P bit set to 1 is
normally used by the primary to poll a secondary. If the secondary has no
.c
data to transmit, it returns an RNR frame with the F bit set. If data is
waiting, it transmits the data, typically as a sequence of information
frames.
The two most important aspects associated with the data transfer phase
are error control and flow control. Essentially, error control uses a
www.csetube.in
www.csetube.in
Code&name of the sub: CS2302& computer networks
Unit:I
R/TP/02
ISSUE C REV:0.0
.in
be
were limited to 2400 bps, it was designed for simple communication over
serial lines. SLIP can be used on RS-232 serial ports and supports
tu
asynchronous links.
PPP(Point-to-Point Protocol)
se
.c
to the Internet. PPP is more stable than the older SLIP protocol and
provides error checking features. Working in the data link layer of the OSI
model, PPP sends the computer's TCP/IP packets to a server that puts
www.csetube.in