SlideShare a Scribd company logo
Computer Networks
Department of Computer Science and
Engineering
1
Scholar
Name : K Spandana
Admission No:24EG305A13
Supervisor
Name : Dr.HimaBindu Priyanka
Designation : Asst.Professor
Course1 : Seminar Review 1
Introduction to Computer Networks
•What is a Computer Network?
–A system of interconnected devices
–Allow communication and sharing of resources
•Types of Networks:
–LAN
–MAN
–WAN
•Components of Networks:
–Devices (Nodes)
–Transmission Media
–Protocols
Benefits of Computer Networks:
• Resource Sharing
• Communication
• Remote Access
History of Computer Networks
•1950s-1960s: Early Beginnings
•1960s: ARPANET
•1970s: Ethernet and TCP/IP
•1980s: Growth of the Internet
•2000s-Present: Modern Networking
Circuit Switching
• Definition
•How It Works
•Key Characteristics
•Examples
•Advantages
•Disadvantages:
Packet Switching
•Definition
•How It Works
•Key Characteristics
•Examples
•Advantages
•Disadvantages
TCP/IP Protocol Stack
Application Layer Services:
HTTP and FTP
HTTP - Hypertext Transfer Protocol
How HTTP Works:
–Client-Server Model:
–Stateless Protocol:
HTTP Methods:
–GET: Retrieves data from the server.
–POST: Sends data to the server (e.g., submitting form data).
–PUT: Replaces existing resources on the server.
–DELETE: Deletes specified resources on the server.
Example Use:
–Browsing websites (e.g., accessing a webpage or submitting a search query).
FTP - File Transfer Protocol
How FTP Works:
Client-Server Model
Authentication
FTP Modes:
Active Mode
Passive Mode
Example Use:
Internet Mail Transfer
What is Internet Mail Transfer?
.
Key Protocols Involved:
SMTP (Simple Mail Transfer Protocol)
IMAP (Internet Message Access Protocol):
POP3 (Post Office Protocol):
How It Works
Domain Name System (DNS)
What is DNS?
How DNS Works:
User Requests
DNS Resolver
DNS Lookup
IPAddress Returned
Key Components
Domain Names
DNS Records
A record
MX record
Example Use: Accessing websites, sending emails, etc.
Transport Layer Primitives
What Are Transport Layer Primitives?
CONNECT
DISCONNECT
SEND
RECEIVE
ACKNOWLEDGE (ACK)
ERROR
Example Use
TCP (Transmission Control Protocol
Connection Establishment and Closure
What is Connection Establishment and Closure?
Connection Establishment: 3-Way Handshake (TCP)
Step 1: SYN (Synchronize)
Step 2: SYN-ACK
Step 3: ACK (Acknowledge)
Connection Closure: 4-Way Handshake (TCP)
•Step 1: FIN (Finish)
–The device (usually the sender) sends a FIN (finish) message to indicate that it has finished sending
data.
•Step 2: ACK
–The receiver acknowledges the FIN by sending an ACK back to the sender.
•Step 3: FIN
–The receiver sends its own FIN to the sender, indicating it’s done sending data.
•Step 4: ACK
–The sender acknowledges the receiver's FIN, completing the termination of the connection.
•Key Point:
The 4-way handshake ensures both parties confirm the closure of the connection in an orderly
manner.
Flow Control and Congestion Control at the Transport Layer
What are Flow Control and Congestion Control?
Flow Control
Purpose
How It Works:
What are Congestion Control?
Purpose
How It Works
Key Concept
Transmission Control Protocol (TCP)
• What is TCP?
• Key Features of TCP:
• Connection-Oriented:
• Reliability
• Flow Control
• Error Detection and Correction
• Congestion Control
How TCP Works:
Connection Establishment
Data Transmission
Connection Termination
Key Point
How TCP Works
Connection Establishment:
Data Transmission:
Connection Termination:
Key Point:
Basic Features of TCP
What is TCP?
• Key Features of TCP
• Connection-Oriented Communication
• Reliable Data Delivery
• Flow Control
• Error Detection and Correction
• Congestion Control
• Ordered Data Transfer
• Key Point
TCP Congestion Control Protocol
•What is TCP Congestion Control?
•Key Mechanisms of TCP Congestion Control
•Slow Start
•Congestion Avoidance
•Fast Retransmit and Fast Recovery
•Threshold Adjustment
•Key Point
Introduction to Network Layer Primitives
•What Are Network Layer Primitives?
•Definition
•Purpose of the Network Layer
•Key Role of Primitives
•Examples of Network Layer Functions
Key Network Layer Primitives
•1. SEND
•2. RECEIVE
•3. ROUTE
•4. FORWARD
5. DROP
Key Point
IPAddressing (IPv4) Overview
• What is IPv4?
• Key Features of IPv4
32-bit Addressing:
Format
An IPv4 address is written in dotted decimal format:
xxx.xxx.xxx.xxx (e.g., 192.168.1.1)
Classful Addressing in IPv4
•What is Classful Addressing?
•IPv4 Address Classes:
•Class A:
–Range: 1.0.0.0 to 127.255.255.255
–Network Bits: 8 bits
–Hosts per Network: 16,777,214
–Usage: Large networks (e.g., multinational corporations).
•Class B:
–Range: 128.0.0.0 to 191.255.255.255
–Network Bits: 16 bits
–Hosts per Network: 65,534
–Usage: Medium-sized networks (e.g., universities, ISPs).
•Class C:
–Range: 192.0.0.0 to 223.255.255.255
–Network Bits: 24 bits
–Hosts per Network: 254
–Usage: Small networks (e.g., small businesses).
•Class D (Multicast):
–Range: 224.0.0.0 to 239.255.255.255
–Usage: Reserved for multicast communication (sending data to multiple recipients).
•Class E (Reserved):
–Range: 240.0.0.0 to 255.255.255.255
–Usage: Reserved for future use, experimental purposes.
•Key Points:
•Class A, B, and C are used for addressing devices in networks, while Class D is for multicast and Class E is
reserved.
•Classful addressing has been largely replaced by CIDR for more efficient IP address allocation.
Introduction to Network Address Translation (NAT)
•What is Network Address Translation (NAT)?
•Definition
•Purpose of NAT
•How NAT Works
•Private IP to Public IP
• Overview:
In the early 2000s, internet usage began to surge, especially in the United States. With dial-up
connections gradually being phased out, the shift to broadband and fiber-optic networks played a pivotal
role in increasing speed and availability of internet access.
• Key Challenges:
Scalability
Performance
Competition
• Solution:
ISPs invested in fiber-optic and DSL technologies to provide faster internet connections.
Technologies like Wi-Fi and 4G/5G enabled mobile internet access, complementing fixed
broadband infrastructure.
• Outcome:
Enhanced broadband speeds and the widespread adoption of mobile internet.
Creation of more competitive and diversified market landscapes.
Case Study-1
The Rise of Internet Service Providers (ISPs) and Broadband Adoption
• Overview: Facebook’s operations rely on highly complex network infrastructure, managing billions of
active users daily.
The company needs to handle vast amounts of data for services such as news feed, messaging,
video, and other real-time communications.
• Key Challenges:
Data Volume
Latency
Security
• Solution:
Facebook developed its own networking hardware and data centers designed for scalability
and reliability.
The use of open-source software like FBOSS (Facebook Open Switching System) for data
center networking and
Wedge 100 switches for higher network performance.
A robust global content delivery network (CDN) was set up, reducing latency and accelerating
data delivery to
Case Study-2:
Facebook’s Data Center and Network Traffic
Management
• Overview:
Google has built one of the largest and most efficient global data center networks. Google’s
network architecture enables fast data retrieval, reliability, and high scalability for services like search,
YouTube, Gmail, and more.
• Key Challenges:
Network Latency
Data Center Efficiency
Scalability
• Solution:
Global Network:
Custom Infrastructure
Load Balancing
• Outcome:
Google achieved high network reliability, with 99.99% uptime for services.
Significantly reduced network latency for users worldwide.
Energy-efficient data centers with environmentally-friendly designs.
Case Study-3
Google’s Data Center and Global Network Infrastructure
vnd_ms.ppt important ppt for engineering

More Related Content

PDF
4. Communication and Network Security
PDF
CISSP Prep: Ch 5. Communication and Network Security (Part 1)
PDF
4. Communication and Network Security
PPT
Network-Internet and network topology.ppt
PPT
Network-Internet.ppt
PPT
Network-Internet.ppt
PPT
hdfgdrhhghdhsdfgdfzhghxgvnxfgnxfnhgf.ppt
PPT
Network-Internet
4. Communication and Network Security
CISSP Prep: Ch 5. Communication and Network Security (Part 1)
4. Communication and Network Security
Network-Internet and network topology.ppt
Network-Internet.ppt
Network-Internet.ppt
hdfgdrhhghdhsdfgdfzhghxgvnxfgnxfnhgf.ppt
Network-Internet

Similar to vnd_ms.ppt important ppt for engineering (20)

PPT
Network-Internet.ppt
PPT
Network-Internet.ppt
PPT
TelecommunicationsThe Internet Basic Telecom Model
PPT
Network-Internet.ppt
PPT
Lecture 01
PPT
Network-Internett description about internet and its facilities.ppt
PPT
Network-Internet introduction to cmputer and its architecture.ppt
PPT
how_internet_works.ppt
PPT
CS1308 - 02/08/10
PDF
Introduction to TCP/IP
PPT
Fundamentals of Networking
PPTX
Introduction to Computer Networking
PPT
1. Introduction.ppt Data Communication slide
PDF
Computer Networking A Top Down Approach 8th Edition Keith W Ross
PDF
Complete Download Special Edition Using TCP IP Niit (Usa) Inc. PDF All Chapters
PPTX
Computer Networks.pptx
PPT
introdution to networking concepts Ch_01.ppt
PPTX
Computer networks - module-1 presentation
PPT
1. introduction data comm
PPTX
Lecture 12
Network-Internet.ppt
Network-Internet.ppt
TelecommunicationsThe Internet Basic Telecom Model
Network-Internet.ppt
Lecture 01
Network-Internett description about internet and its facilities.ppt
Network-Internet introduction to cmputer and its architecture.ppt
how_internet_works.ppt
CS1308 - 02/08/10
Introduction to TCP/IP
Fundamentals of Networking
Introduction to Computer Networking
1. Introduction.ppt Data Communication slide
Computer Networking A Top Down Approach 8th Edition Keith W Ross
Complete Download Special Edition Using TCP IP Niit (Usa) Inc. PDF All Chapters
Computer Networks.pptx
introdution to networking concepts Ch_01.ppt
Computer networks - module-1 presentation
1. introduction data comm
Lecture 12
Ad

Recently uploaded (20)

PDF
Anesthesia in Laparoscopic Surgery in India
PPTX
Week 4 Term 3 Study Techniques revisited.pptx
PPTX
Cell Structure & Organelles in detailed.
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PPTX
PPH.pptx obstetrics and gynecology in nursing
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PDF
TR - Agricultural Crops Production NC III.pdf
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PPTX
Cell Types and Its function , kingdom of life
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PDF
Business Ethics Teaching Materials for college
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PPTX
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
PPTX
Institutional Correction lecture only . . .
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
Insiders guide to clinical Medicine.pdf
PDF
Complications of Minimal Access Surgery at WLH
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
Anesthesia in Laparoscopic Surgery in India
Week 4 Term 3 Study Techniques revisited.pptx
Cell Structure & Organelles in detailed.
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PPH.pptx obstetrics and gynecology in nursing
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
TR - Agricultural Crops Production NC III.pdf
Renaissance Architecture: A Journey from Faith to Humanism
Cell Types and Its function , kingdom of life
102 student loan defaulters named and shamed – Is someone you know on the list?
Business Ethics Teaching Materials for college
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
Institutional Correction lecture only . . .
STATICS OF THE RIGID BODIES Hibbelers.pdf
VCE English Exam - Section C Student Revision Booklet
Insiders guide to clinical Medicine.pdf
Complications of Minimal Access Surgery at WLH
Abdominal Access Techniques with Prof. Dr. R K Mishra
Ad

vnd_ms.ppt important ppt for engineering

  • 1. Computer Networks Department of Computer Science and Engineering 1 Scholar Name : K Spandana Admission No:24EG305A13 Supervisor Name : Dr.HimaBindu Priyanka Designation : Asst.Professor Course1 : Seminar Review 1
  • 2. Introduction to Computer Networks •What is a Computer Network? –A system of interconnected devices –Allow communication and sharing of resources •Types of Networks: –LAN –MAN –WAN •Components of Networks: –Devices (Nodes) –Transmission Media –Protocols
  • 3. Benefits of Computer Networks: • Resource Sharing • Communication • Remote Access
  • 4. History of Computer Networks •1950s-1960s: Early Beginnings •1960s: ARPANET •1970s: Ethernet and TCP/IP •1980s: Growth of the Internet •2000s-Present: Modern Networking
  • 5. Circuit Switching • Definition •How It Works •Key Characteristics •Examples •Advantages •Disadvantages:
  • 6. Packet Switching •Definition •How It Works •Key Characteristics •Examples •Advantages •Disadvantages
  • 8. Application Layer Services: HTTP and FTP HTTP - Hypertext Transfer Protocol How HTTP Works: –Client-Server Model: –Stateless Protocol: HTTP Methods: –GET: Retrieves data from the server. –POST: Sends data to the server (e.g., submitting form data). –PUT: Replaces existing resources on the server. –DELETE: Deletes specified resources on the server. Example Use: –Browsing websites (e.g., accessing a webpage or submitting a search query).
  • 9. FTP - File Transfer Protocol How FTP Works: Client-Server Model Authentication FTP Modes: Active Mode Passive Mode Example Use:
  • 10. Internet Mail Transfer What is Internet Mail Transfer? . Key Protocols Involved: SMTP (Simple Mail Transfer Protocol) IMAP (Internet Message Access Protocol): POP3 (Post Office Protocol): How It Works
  • 11. Domain Name System (DNS) What is DNS? How DNS Works: User Requests DNS Resolver DNS Lookup IPAddress Returned Key Components Domain Names DNS Records A record MX record Example Use: Accessing websites, sending emails, etc.
  • 12. Transport Layer Primitives What Are Transport Layer Primitives? CONNECT DISCONNECT SEND RECEIVE ACKNOWLEDGE (ACK) ERROR Example Use TCP (Transmission Control Protocol
  • 13. Connection Establishment and Closure What is Connection Establishment and Closure? Connection Establishment: 3-Way Handshake (TCP) Step 1: SYN (Synchronize) Step 2: SYN-ACK Step 3: ACK (Acknowledge)
  • 14. Connection Closure: 4-Way Handshake (TCP) •Step 1: FIN (Finish) –The device (usually the sender) sends a FIN (finish) message to indicate that it has finished sending data. •Step 2: ACK –The receiver acknowledges the FIN by sending an ACK back to the sender. •Step 3: FIN –The receiver sends its own FIN to the sender, indicating it’s done sending data. •Step 4: ACK –The sender acknowledges the receiver's FIN, completing the termination of the connection. •Key Point: The 4-way handshake ensures both parties confirm the closure of the connection in an orderly manner.
  • 15. Flow Control and Congestion Control at the Transport Layer What are Flow Control and Congestion Control? Flow Control Purpose How It Works:
  • 16. What are Congestion Control? Purpose How It Works Key Concept
  • 17. Transmission Control Protocol (TCP) • What is TCP? • Key Features of TCP: • Connection-Oriented: • Reliability • Flow Control • Error Detection and Correction • Congestion Control
  • 18. How TCP Works: Connection Establishment Data Transmission Connection Termination Key Point
  • 19. How TCP Works Connection Establishment: Data Transmission: Connection Termination: Key Point:
  • 20. Basic Features of TCP What is TCP? • Key Features of TCP • Connection-Oriented Communication • Reliable Data Delivery • Flow Control • Error Detection and Correction • Congestion Control • Ordered Data Transfer • Key Point
  • 21. TCP Congestion Control Protocol •What is TCP Congestion Control? •Key Mechanisms of TCP Congestion Control •Slow Start •Congestion Avoidance •Fast Retransmit and Fast Recovery •Threshold Adjustment •Key Point
  • 22. Introduction to Network Layer Primitives •What Are Network Layer Primitives? •Definition •Purpose of the Network Layer •Key Role of Primitives •Examples of Network Layer Functions
  • 23. Key Network Layer Primitives •1. SEND •2. RECEIVE •3. ROUTE •4. FORWARD 5. DROP Key Point
  • 24. IPAddressing (IPv4) Overview • What is IPv4? • Key Features of IPv4 32-bit Addressing: Format An IPv4 address is written in dotted decimal format: xxx.xxx.xxx.xxx (e.g., 192.168.1.1)
  • 25. Classful Addressing in IPv4 •What is Classful Addressing? •IPv4 Address Classes: •Class A: –Range: 1.0.0.0 to 127.255.255.255 –Network Bits: 8 bits –Hosts per Network: 16,777,214 –Usage: Large networks (e.g., multinational corporations). •Class B: –Range: 128.0.0.0 to 191.255.255.255 –Network Bits: 16 bits –Hosts per Network: 65,534 –Usage: Medium-sized networks (e.g., universities, ISPs).
  • 26. •Class C: –Range: 192.0.0.0 to 223.255.255.255 –Network Bits: 24 bits –Hosts per Network: 254 –Usage: Small networks (e.g., small businesses). •Class D (Multicast): –Range: 224.0.0.0 to 239.255.255.255 –Usage: Reserved for multicast communication (sending data to multiple recipients). •Class E (Reserved): –Range: 240.0.0.0 to 255.255.255.255 –Usage: Reserved for future use, experimental purposes. •Key Points: •Class A, B, and C are used for addressing devices in networks, while Class D is for multicast and Class E is reserved. •Classful addressing has been largely replaced by CIDR for more efficient IP address allocation.
  • 27. Introduction to Network Address Translation (NAT) •What is Network Address Translation (NAT)? •Definition •Purpose of NAT •How NAT Works •Private IP to Public IP
  • 28. • Overview: In the early 2000s, internet usage began to surge, especially in the United States. With dial-up connections gradually being phased out, the shift to broadband and fiber-optic networks played a pivotal role in increasing speed and availability of internet access. • Key Challenges: Scalability Performance Competition • Solution: ISPs invested in fiber-optic and DSL technologies to provide faster internet connections. Technologies like Wi-Fi and 4G/5G enabled mobile internet access, complementing fixed broadband infrastructure. • Outcome: Enhanced broadband speeds and the widespread adoption of mobile internet. Creation of more competitive and diversified market landscapes. Case Study-1 The Rise of Internet Service Providers (ISPs) and Broadband Adoption
  • 29. • Overview: Facebook’s operations rely on highly complex network infrastructure, managing billions of active users daily. The company needs to handle vast amounts of data for services such as news feed, messaging, video, and other real-time communications. • Key Challenges: Data Volume Latency Security • Solution: Facebook developed its own networking hardware and data centers designed for scalability and reliability. The use of open-source software like FBOSS (Facebook Open Switching System) for data center networking and Wedge 100 switches for higher network performance. A robust global content delivery network (CDN) was set up, reducing latency and accelerating data delivery to Case Study-2: Facebook’s Data Center and Network Traffic Management
  • 30. • Overview: Google has built one of the largest and most efficient global data center networks. Google’s network architecture enables fast data retrieval, reliability, and high scalability for services like search, YouTube, Gmail, and more. • Key Challenges: Network Latency Data Center Efficiency Scalability • Solution: Global Network: Custom Infrastructure Load Balancing • Outcome: Google achieved high network reliability, with 99.99% uptime for services. Significantly reduced network latency for users worldwide. Energy-efficient data centers with environmentally-friendly designs. Case Study-3 Google’s Data Center and Global Network Infrastructure