SlideShare a Scribd company logo
2
Most read
3
Most read
6
Most read
NAME:-SHIVANGI
DEPT:- COMPUTER SCIENCE & ENGINEERING
ROLL NO:- ‘9’
GROUP:- ”X”
TOPIC NAME:- “Computer
Networking”
SUBMITTED TO:-
Communication between applications on
different computers.
Must understand application needs/demands.
Traffic data rate.
Traffic pattern (bursty or constant bit rate).
Traffic target (multipoint or single destination,
mobile or fixed).
Delay sensitivity.
Loss sensitivity.
What is the Objective of
Networking
Four Steps to Networking
Communicating across a link.
Connecting together multiple links
(internetworking).
Finding and routing data to nodes on
internetwork.
Matching application requirements.
A First Step
Creating a link between nodes.
Link: path followed by bits.
•Wired or wireless.
•Broadcast or point-to-point (or
both).
Node: any device connected to a
link.
5
Types of Links
Point-to-Point Multiple Access
…
6
Switched Network
What are Switched Networks
 Switch: moves bits
between links
 Packet switching
 Circuit switching
7
Packet Switching (Internet)
Packets
8
Packet Switching
 Interleave packets from different sources.
 Efficient: resources used on demand.
 Statistical multiplexing
 General
 Multiple types of applications.
 Accommodates bursty traffic.
 Addition of queues.
1-9
Circuit Switching: FDM and TDM
FDM
frequency
time
TDM
frequency
time
4 users
Example:
10
What if Network is Overloaded
Problem: Network Overload
 Short bursts: buffer
 What if buffer overflows?
 Packets dropped
 Sender adjusts rate until load = resources
 Called “congestion control”
Solution: Buffering and Congestion Control
1-11
Why layering
Dealing with complex systems:
 explicit structure allows identification, relationship of
complex system’s pieces
 layered reference model for discussion
 modularization eases maintenance, updating of
system
 change of implementation of layer’s service
transparent to rest of system
 e.g., change in gate procedure doesn’t affect
rest of system
 layering considered harmful
1-12
Internet protocol stack
 application: supporting network
applications
 FTP, SMTP, HTTP
 transport: process-process data
transfer
 TCP, UDP
 network: routing of datagrams from
source to destination
 IP, routing protocols
 link: data transfer between
neighboring network elements
 PPP, Ethernet
 physical: bits “on the wire”
application
transport
network
link
physical
1-13
Network Security
 The field of network security is about:
 how bad guys can attack computer networks
 how we can defend networks against attacks
 how to design architectures that are immune to
attacks
 Internet not originally designed with (much)
security in mind
 original vision: “a group of mutually trusting
users attached to a transparent network” 
 Internet protocol designers playing “catch-up”
 Security considerations in all layers!
Computer networking

More Related Content

PPTX
Cloud computing
PPTX
Cloud computing
PPTX
Social and professional issuesin it
PDF
Evolution of Cloud Computing
PPTX
Data Privacy and Protection Presentation
PPTX
Employee Security Awareness Training
PDF
Introduction to information technology lecture 1
PPT
Linux basics
Cloud computing
Cloud computing
Social and professional issuesin it
Evolution of Cloud Computing
Data Privacy and Protection Presentation
Employee Security Awareness Training
Introduction to information technology lecture 1
Linux basics

What's hot (20)

PPT
Big data ppt
PPTX
Basics of Denial of Service Attacks
PPT
Windows V/S Linux OS - Comparison
PPTX
Computer crime
DOC
Cloud Computing Documentation Report
PDF
Applying machine learning to Laravel applications
PPTX
Introduction to security
PPTX
Introduction to Information Security
PPTX
PPT
Internet And How It Works
PPTX
Cyber Security 101: Training, awareness, strategies for small to medium sized...
PDF
GRID COMPUTING PRESENTATION
PPT
18 cse366t human computer interaction - hci - unit i
PPTX
System hardening - OS and Application
PPTX
Artificial Intelligence and Cybersecurity
PPT
Benefits of Cloud Computing
PPTX
Computer misuse and criminal law
PPTX
Ppt on cloud service
PDF
Social Media Safety
Big data ppt
Basics of Denial of Service Attacks
Windows V/S Linux OS - Comparison
Computer crime
Cloud Computing Documentation Report
Applying machine learning to Laravel applications
Introduction to security
Introduction to Information Security
Internet And How It Works
Cyber Security 101: Training, awareness, strategies for small to medium sized...
GRID COMPUTING PRESENTATION
18 cse366t human computer interaction - hci - unit i
System hardening - OS and Application
Artificial Intelligence and Cybersecurity
Benefits of Cloud Computing
Computer misuse and criminal law
Ppt on cloud service
Social Media Safety
Ad

Similar to Computer networking (20)

PPT
Introduction to computer networks lecture
PDF
DCN-chapter1.pdf
PPTX
unit-1fon (1).pptx
PPT
Internet (i mcom)
PPT
ip-basics.ppt
PPT
ip net basic understanding slide show ppt
PPTX
Networking fundamentals
PPTX
OSI TCP.pptx
PDF
networking in cyber security basics of data communication
PPT
CN unit 1 part 2 2023.ppt
PPT
internet protocol and networking basic bachelor of science in informATION TEE...
PPTX
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
PPT
Introduction to Computer Networks
PPTX
7. Lecture_OSI Model.pptx ssdddsdsssssss
PDF
Unit_I_Computer Networks 4.pdf
PPTX
1 introduction
PPTX
Network essentials chapter 3
PPTX
Reference models in Networks: OSI & TCP/IP
PPT
Skr+3200+chapter+2+(kweh)
PDF
What is network architecture
Introduction to computer networks lecture
DCN-chapter1.pdf
unit-1fon (1).pptx
Internet (i mcom)
ip-basics.ppt
ip net basic understanding slide show ppt
Networking fundamentals
OSI TCP.pptx
networking in cyber security basics of data communication
CN unit 1 part 2 2023.ppt
internet protocol and networking basic bachelor of science in informATION TEE...
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
Introduction to Computer Networks
7. Lecture_OSI Model.pptx ssdddsdsssssss
Unit_I_Computer Networks 4.pdf
1 introduction
Network essentials chapter 3
Reference models in Networks: OSI & TCP/IP
Skr+3200+chapter+2+(kweh)
What is network architecture
Ad

Recently uploaded (20)

PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PPT
Mechanical Engineering MATERIALS Selection
PDF
Structs to JSON How Go Powers REST APIs.pdf
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PDF
Well-logging-methods_new................
PDF
composite construction of structures.pdf
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PPTX
Geodesy 1.pptx...............................................
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PPTX
Sustainable Sites - Green Building Construction
PPTX
CH1 Production IntroductoryConcepts.pptx
PPT
Project quality management in manufacturing
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
UNIT-1 - COAL BASED THERMAL POWER PLANTS
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
CYBER-CRIMES AND SECURITY A guide to understanding
Mechanical Engineering MATERIALS Selection
Structs to JSON How Go Powers REST APIs.pdf
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
Well-logging-methods_new................
composite construction of structures.pdf
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
Geodesy 1.pptx...............................................
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
Embodied AI: Ushering in the Next Era of Intelligent Systems
Sustainable Sites - Green Building Construction
CH1 Production IntroductoryConcepts.pptx
Project quality management in manufacturing

Computer networking

  • 1. NAME:-SHIVANGI DEPT:- COMPUTER SCIENCE & ENGINEERING ROLL NO:- ‘9’ GROUP:- ”X” TOPIC NAME:- “Computer Networking” SUBMITTED TO:-
  • 2. Communication between applications on different computers. Must understand application needs/demands. Traffic data rate. Traffic pattern (bursty or constant bit rate). Traffic target (multipoint or single destination, mobile or fixed). Delay sensitivity. Loss sensitivity. What is the Objective of Networking
  • 3. Four Steps to Networking Communicating across a link. Connecting together multiple links (internetworking). Finding and routing data to nodes on internetwork. Matching application requirements.
  • 4. A First Step Creating a link between nodes. Link: path followed by bits. •Wired or wireless. •Broadcast or point-to-point (or both). Node: any device connected to a link.
  • 5. 5 Types of Links Point-to-Point Multiple Access …
  • 6. 6 Switched Network What are Switched Networks  Switch: moves bits between links  Packet switching  Circuit switching
  • 8. 8 Packet Switching  Interleave packets from different sources.  Efficient: resources used on demand.  Statistical multiplexing  General  Multiple types of applications.  Accommodates bursty traffic.  Addition of queues.
  • 9. 1-9 Circuit Switching: FDM and TDM FDM frequency time TDM frequency time 4 users Example:
  • 10. 10 What if Network is Overloaded Problem: Network Overload  Short bursts: buffer  What if buffer overflows?  Packets dropped  Sender adjusts rate until load = resources  Called “congestion control” Solution: Buffering and Congestion Control
  • 11. 1-11 Why layering Dealing with complex systems:  explicit structure allows identification, relationship of complex system’s pieces  layered reference model for discussion  modularization eases maintenance, updating of system  change of implementation of layer’s service transparent to rest of system  e.g., change in gate procedure doesn’t affect rest of system  layering considered harmful
  • 12. 1-12 Internet protocol stack  application: supporting network applications  FTP, SMTP, HTTP  transport: process-process data transfer  TCP, UDP  network: routing of datagrams from source to destination  IP, routing protocols  link: data transfer between neighboring network elements  PPP, Ethernet  physical: bits “on the wire” application transport network link physical
  • 13. 1-13 Network Security  The field of network security is about:  how bad guys can attack computer networks  how we can defend networks against attacks  how to design architectures that are immune to attacks  Internet not originally designed with (much) security in mind  original vision: “a group of mutually trusting users attached to a transparent network”   Internet protocol designers playing “catch-up”  Security considerations in all layers!