1. Computer Networks
Department of Computer Science and
Engineering
1
Scholar
Name : K Spandana
Admission No:24EG305A13
Supervisor
Name : Dr.HimaBindu Priyanka
Designation : Asst.Professor
Course1 : Seminar Review 1
2. Introduction to Computer Networks
•What is a Computer Network?
–A system of interconnected devices
–Allow communication and sharing of resources
•Types of Networks:
–LAN
–MAN
–WAN
•Components of Networks:
–Devices (Nodes)
–Transmission Media
–Protocols
3. Benefits of Computer Networks:
• Resource Sharing
• Communication
• Remote Access
4. History of Computer Networks
•1950s-1960s: Early Beginnings
•1960s: ARPANET
•1970s: Ethernet and TCP/IP
•1980s: Growth of the Internet
•2000s-Present: Modern Networking
8. Application Layer Services:
HTTP and FTP
HTTP - Hypertext Transfer Protocol
How HTTP Works:
–Client-Server Model:
–Stateless Protocol:
HTTP Methods:
–GET: Retrieves data from the server.
–POST: Sends data to the server (e.g., submitting form data).
–PUT: Replaces existing resources on the server.
–DELETE: Deletes specified resources on the server.
Example Use:
–Browsing websites (e.g., accessing a webpage or submitting a search query).
9. FTP - File Transfer Protocol
How FTP Works:
Client-Server Model
Authentication
FTP Modes:
Active Mode
Passive Mode
Example Use:
10. Internet Mail Transfer
What is Internet Mail Transfer?
.
Key Protocols Involved:
SMTP (Simple Mail Transfer Protocol)
IMAP (Internet Message Access Protocol):
POP3 (Post Office Protocol):
How It Works
11. Domain Name System (DNS)
What is DNS?
How DNS Works:
User Requests
DNS Resolver
DNS Lookup
IPAddress Returned
Key Components
Domain Names
DNS Records
A record
MX record
Example Use: Accessing websites, sending emails, etc.
12. Transport Layer Primitives
What Are Transport Layer Primitives?
CONNECT
DISCONNECT
SEND
RECEIVE
ACKNOWLEDGE (ACK)
ERROR
Example Use
TCP (Transmission Control Protocol
13. Connection Establishment and Closure
What is Connection Establishment and Closure?
Connection Establishment: 3-Way Handshake (TCP)
Step 1: SYN (Synchronize)
Step 2: SYN-ACK
Step 3: ACK (Acknowledge)
14. Connection Closure: 4-Way Handshake (TCP)
•Step 1: FIN (Finish)
–The device (usually the sender) sends a FIN (finish) message to indicate that it has finished sending
data.
•Step 2: ACK
–The receiver acknowledges the FIN by sending an ACK back to the sender.
•Step 3: FIN
–The receiver sends its own FIN to the sender, indicating it’s done sending data.
•Step 4: ACK
–The sender acknowledges the receiver's FIN, completing the termination of the connection.
•Key Point:
The 4-way handshake ensures both parties confirm the closure of the connection in an orderly
manner.
15. Flow Control and Congestion Control at the Transport Layer
What are Flow Control and Congestion Control?
Flow Control
Purpose
How It Works:
17. Transmission Control Protocol (TCP)
• What is TCP?
• Key Features of TCP:
• Connection-Oriented:
• Reliability
• Flow Control
• Error Detection and Correction
• Congestion Control
20. Basic Features of TCP
What is TCP?
• Key Features of TCP
• Connection-Oriented Communication
• Reliable Data Delivery
• Flow Control
• Error Detection and Correction
• Congestion Control
• Ordered Data Transfer
• Key Point
21. TCP Congestion Control Protocol
•What is TCP Congestion Control?
•Key Mechanisms of TCP Congestion Control
•Slow Start
•Congestion Avoidance
•Fast Retransmit and Fast Recovery
•Threshold Adjustment
•Key Point
22. Introduction to Network Layer Primitives
•What Are Network Layer Primitives?
•Definition
•Purpose of the Network Layer
•Key Role of Primitives
•Examples of Network Layer Functions
23. Key Network Layer Primitives
•1. SEND
•2. RECEIVE
•3. ROUTE
•4. FORWARD
5. DROP
Key Point
24. IPAddressing (IPv4) Overview
• What is IPv4?
• Key Features of IPv4
32-bit Addressing:
Format
An IPv4 address is written in dotted decimal format:
xxx.xxx.xxx.xxx (e.g., 192.168.1.1)
25. Classful Addressing in IPv4
•What is Classful Addressing?
•IPv4 Address Classes:
•Class A:
–Range: 1.0.0.0 to 127.255.255.255
–Network Bits: 8 bits
–Hosts per Network: 16,777,214
–Usage: Large networks (e.g., multinational corporations).
•Class B:
–Range: 128.0.0.0 to 191.255.255.255
–Network Bits: 16 bits
–Hosts per Network: 65,534
–Usage: Medium-sized networks (e.g., universities, ISPs).
26. •Class C:
–Range: 192.0.0.0 to 223.255.255.255
–Network Bits: 24 bits
–Hosts per Network: 254
–Usage: Small networks (e.g., small businesses).
•Class D (Multicast):
–Range: 224.0.0.0 to 239.255.255.255
–Usage: Reserved for multicast communication (sending data to multiple recipients).
•Class E (Reserved):
–Range: 240.0.0.0 to 255.255.255.255
–Usage: Reserved for future use, experimental purposes.
•Key Points:
•Class A, B, and C are used for addressing devices in networks, while Class D is for multicast and Class E is
reserved.
•Classful addressing has been largely replaced by CIDR for more efficient IP address allocation.
27. Introduction to Network Address Translation (NAT)
•What is Network Address Translation (NAT)?
•Definition
•Purpose of NAT
•How NAT Works
•Private IP to Public IP
28. • Overview:
In the early 2000s, internet usage began to surge, especially in the United States. With dial-up
connections gradually being phased out, the shift to broadband and fiber-optic networks played a pivotal
role in increasing speed and availability of internet access.
• Key Challenges:
Scalability
Performance
Competition
• Solution:
ISPs invested in fiber-optic and DSL technologies to provide faster internet connections.
Technologies like Wi-Fi and 4G/5G enabled mobile internet access, complementing fixed
broadband infrastructure.
• Outcome:
Enhanced broadband speeds and the widespread adoption of mobile internet.
Creation of more competitive and diversified market landscapes.
Case Study-1
The Rise of Internet Service Providers (ISPs) and Broadband Adoption
29. • Overview: Facebook’s operations rely on highly complex network infrastructure, managing billions of
active users daily.
The company needs to handle vast amounts of data for services such as news feed, messaging,
video, and other real-time communications.
• Key Challenges:
Data Volume
Latency
Security
• Solution:
Facebook developed its own networking hardware and data centers designed for scalability
and reliability.
The use of open-source software like FBOSS (Facebook Open Switching System) for data
center networking and
Wedge 100 switches for higher network performance.
A robust global content delivery network (CDN) was set up, reducing latency and accelerating
data delivery to
Case Study-2:
Facebook’s Data Center and Network Traffic
Management
30. • Overview:
Google has built one of the largest and most efficient global data center networks. Google’s
network architecture enables fast data retrieval, reliability, and high scalability for services like search,
YouTube, Gmail, and more.
• Key Challenges:
Network Latency
Data Center Efficiency
Scalability
• Solution:
Global Network:
Custom Infrastructure
Load Balancing
• Outcome:
Google achieved high network reliability, with 99.99% uptime for services.
Significantly reduced network latency for users worldwide.
Energy-efficient data centers with environmentally-friendly designs.
Case Study-3
Google’s Data Center and Global Network Infrastructure