Chapter 1
Introduction to Networking
Dr. Nilesh M. Patil
Associate Professor, DJSCE
Unit Description Duration CO
1 Introduction to Networking 05 CO1
Introduction to computer network, network applications, network
software and hardware components (Interconnection networking
devices), Network topology,
protocol hierarchies, design issues for the layers, connection-oriented and
connectionless services,
Reference models: Layer details of OSI, TCP/IP models.
Introduction to 5G Networks: Overview of 5G technology and its
evolution from previous generations (3G, 4G), Core network architecture
in 5G.
01-08-2024 Dr. Nilesh M. Patil 2
Basics of Communication
• The term telecommunication means communication at a distance.
• The word data refers to information presented in whatever form is
agreed upon by the parties creating and using the data.
• Data communications are the exchange of data between two devices
via some form of transmission medium such as a wire cable.
01-08-2024 Dr. Nilesh M. Patil 3
Effective Characteristics of Data Communication
• Delivery. The system must deliver data to the correct destination. Data must be
received by the intended device or user and only by that device or user.
• Accuracy. The system must deliver the data accurately. Data that have been
altered in transmission and left uncorrected are unusable.
• Timeliness. The system must deliver data in a timely manner. Data delivered late
are useless. In the case of video and audio, timely delivery means delivering data
as they are produced, in the same order that they are produced, and without
significant delay. This kind of delivery is called real-time transmission.
• Jitter. Jitter refers to the variation in the packet arrival time. It is the uneven delay
in the delivery of audio or video packets. For example, let us assume that video
packets are sent every 30 ms. If some of the packets arrive with 30-ms delay and
others with 40-ms delay, an uneven quality in the video is the result.
01-08-2024 Dr. Nilesh M. Patil 4
Components of a data communication system
01-08-2024 Dr. Nilesh M. Patil 5
Components of a data communication system
1. Message. The message is the information (data) to be communicated. Popular forms of information include text,
numbers, pictures, audio, and video.
2. Sender. The sender is the device that sends the data message. It can be a computer, workstation, telephone handset,
video camera, and so on.
3. Receiver. The receiver is the device that receives the message. It can be a computer, workstation, telephone handset,
television, and so on.
4. Transmission medium. The transmission medium is the physical path by which a message travels from sender to receiver.
Some examples of transmission media include twisted-pair wire, coaxial cable, fiber-optic cable, and radio waves.
5. Protocol. A protocol is a set of rules that govern data communications. It represents an agreement between the
communicating devices. Without a protocol, two devices may be connected but not communicating, just as a person
speaking French cannot be understood by a person who speaks only Japanese. The key elements of a protocol are syntax,
semantics and timing.
a) Syntax : Refers to the structure or format of the data, means the order in which they are presented.
b) Semantics : Refers to the meaning of each section of bits, means how a particular pattern is to be
interpreted, and what action is to be taken based on that interpretation.
c) Timing : Means that data should be sent and how fast they can be sent.
01-08-2024 Dr. Nilesh M. Patil 6
Data flow (simplex, half-duplex, and full-duplex)
Example of simplex mode are: Keyboard and monitor.
Example of half duplex mode is: Walkie-Talkies.
Example of full duplex mode is: Telephone.
01-08-2024 Dr. Nilesh M. Patil 7
Network
• A network is a set of devices (often referred
to as nodes) connected by communication
links.
• A node can be a computer, printer, or any
other device capable of sending and/or
receiving data generated by other nodes on
the network.
• A link can be a cable, air, optical fiber, or
any medium which can transport a signal
carrying information.
01-08-2024 Dr. Nilesh M. Patil 8
Network Criteria
• Performance
• Depends on Network Elements
• Measured in terms of Delay and Throughput
• Reliability
• Failure rate of network components
• Measured in terms of availability/robustness
• Security
• Data protection against corruption/loss of data due to:
• Errors
• Malicious users
01-08-2024 Dr. Nilesh M. Patil 9
Type of Connection
• Point to Point - single transmitter and receiver
• Multipoint - multiple recipients of single transmission
01-08-2024 Dr. Nilesh M. Patil 10
Topology
• Network topology refers to the way different
computers, devices or nodes connect to each other in
a communication network.
• It describes their physical arrangement and explains
the logical flow of information throughout the
network.
• A computer network topology can consist of one
physical topology and several logical topologies.
• A physical topology explains how computers, devices
or nodes connect with each other in a network based
on their location. It involves assessing the physical
layout of network cables and workstations.
• Conversely, a logical topology explains how data flows
from one device to another based on network
protocols. It assesses the way devices communicate
with each other internally.
• Therefore, network topology defines the virtual shape,
layout and structure of a network from both a physical
and logical viewpoint.
01-08-2024 Dr. Nilesh M. Patil 11
Bus Topology
• The bus topology is designed in such a way Advantages of Bus Topology:
that all the stations are connected through a • Bus topology is easy to install.
single cable known as a backbone cable. • Because of backbone, less cable is required.
• Each node is either connected to the • Number of I/O port required is less. Also, the hardware is reduced.
backbone cable by drop line or directly • The backbone can be extended by using repeater.
connected to the backbone cable. • Cost of the network is low.
• When a node wants to send a message over Disadvantages of Bus Topology:
the network, it puts a message over the • Heavy network traffic can slow a bus considerably.
network. • Difficult for reconnection, fault isolation or troubleshooting.
• All the stations available in the network will • Difficult to add new node/device.
receive the message whether it has been • Failure of backbone affects failure of all devices on the network.
addressed or not.
01-08-2024 Dr. Nilesh M. Patil 12
Ring Topology
• Ring Topology is a topology in which Advantages:
each computer is linked to another on • A ring is relatively easy to install and reconfigure.
both sides. • Link failure can be easily found as each device is
• The last computer is linked to the first, connected to its immediate neighbors only.
forming a ring. • Because every node is given equal access to the token
no one node can monopolize the network.
• This topology enables each computer Disadvantages:
to have exactly two neighbors. • Maximum ring length and number of devices is limited.
• The most common access method of • Failure of one node on the ring can affect the entire
network.
the ring topology is token passing. • Adding or removing node disrupts the network.
Token is a frame that circulates around
the network.
01-08-2024 Dr. Nilesh M. Patil 13
Mesh Topology
• Mesh Topology is an arrangement of the network in Advantages:
which computers are interconnected with each other • No traffic because of dedicated link.
through various redundant connections.
• Robust because if one link fails, it does not affect the entire
• There are multiple paths from one computer to
another computer. network.
• Mesh topology can be formed by using the formula: • Privacy and security of data is achieved due to dedicated
Number of cables = (n*(n − 1))/2; where n is the link.
number of nodes that represents the network. • Fault identification is easy.
• This indicates that each node must have (n − 1) I/O Disadvantages:
ports. • Difficulty of installation and reconfiguration as every node is
• The Internet is an example of the mesh topology. connected to every other node.
• Costly because of maintaining redundant links.
• The amount of cabling required is large
01-08-2024 Dr. Nilesh M. Patil 14
Star Topology
• Star topology is an arrangement of the network in Advantages:
which every node is connected to the central hub, • Each device needs only one link and one I/O port, which makes star
switch or a central computer. topology less expensive, easy to install and easy to configure.
• The central computer is known as a server, and the • Robust topology. If any link fails, it does not affect entire network.
peripheral devices attached to the server are known as • Easy fault identification and fault isolation.
clients.
• It is easy to modify and add new nodes to star network without
• Coaxial cable or RJ-45 cables are used to connect the disturbing the rest of the network.
computers. Disadvantages:
• Hubs or Switches are mainly used as connection • If the central hub fails, the entire network fails to operate.
devices in a physical star topology. • Each device requires its own cable segment.
• Star topology is the most popular topology in network • In hierarchical network, installation and configuration is difficult.
implementation.
01-08-2024 Dr. Nilesh M. Patil 15
Tree Topology
Advantages:
• Tree topologies are also known as hierarchical • Support for broadband transmission, i.e., signals are sent over long
topology, as the root node connects all other distances without being attenuated.
nodes to form a hierarchy. • We can add the new device to the existing network. Therefore, we
• This topology is known as a Star Bus topology can say that tree topology is easily expandable.
because it combines several star topologies into • Error detection and error correction are very easy in a tree
a single bus. topology.
• Data flows from top to bottom in this network • The breakdown in one station does not affect the entire network.
topology, from the central hub to the secondary Disadvantages:
hub and then to the devices, or from bottom to • If any fault occurs in the node, then it becomes difficult to
top, from the devices to the secondary hub, troubleshoot the problem.
which then connects to the central hub. • Devices required for broadband transmission are very costly.
• A tree topology mainly relies on main bus cable and failure in main
bus cable will damage the overall network.
01-08-2024 Dr. Nilesh M. Patil 16
Hybrid Topology
Advantages:
• Reliable: If a fault occurs in any part of the network, it will not affect the
functioning of the rest of the network.
• When two or more different topologies • Scalable: Size of the network can be easily expanded by adding new devices
are combined together is termed as without affecting the functionality of the existing network.
Hybrid topology and if similar topologies • Flexible: This topology is very flexible as it can be designed according to the
requirements of the organization.
are connected with each other will not • Effective: Hybrid topology is very effective as it can be designed in such a way
result in Hybrid topology. that the strength of the network is maximized and weakness of the network is
• For example, if there exist a ring minimized.
Disadvantages:
topology in one branch of HDFC bank • Complex Design: The major drawback of the Hybrid topology is the design of
and bus topology in another branch of the Hybrid network. It is very difficult to design the architecture of the Hybrid
HDFC bank, connecting these two network.
topologies will result in Hybrid topology. • Costly Hub: The Hubs used in the Hybrid topology are very expensive as these
hubs are different from usual Hubs used in other topologies.
• Costly Infrastructure: The infrastructure cost is very high as a hybrid network
requires a lot of cabling, network devices, etc.
01-08-2024 Dr. Nilesh M. Patil 17
Type of Transmission
• Unicast
• Multicast
• Broadcast
• Anycast
01-08-2024 Dr. Nilesh M. Patil 18
Categories of Networks
• Personal Area Network (PAN)
• Local Area Network (LAN)
• Metropolitan Area Network (MAN)
• Wide Area Network (WAN)
01-08-2024 Dr. Nilesh M. Patil 19
Personal Area Network (PAN)
• It is an interconnection of personal technology devices to
communicate over a short distance, which is less than 33 feet or 10
meters or within the range of an individual person, typically using
some form of wireless technologies.
• Examples of PAN:
1. Body Area Network
2. Home Network
01-08-2024 Dr. Nilesh M. Patil 20
Local Area Network (LAN)
• Local Area Network is a group of computers connected
to each other in a small area such as building, office.
• LAN is used for connecting two or more personal
computers through a communication medium such as
twisted pair, coaxial cable, etc.
• It is less costly as it is built with inexpensive hardware
such as hubs, network adapters, and Ethernet cables.
• The data is transferred at an extremely faster rate in
Local Area Network.
• Traditional LANs run at speeds of 10 Mbps to 100 Mbps.
Newer LANs operate at upto 10 Gbps.
• Local Area Network provides higher security.
01-08-2024 Dr. Nilesh M. Patil 21
Metropolitan Area Network (MAN)
• A metropolitan area network is a network that
covers a larger geographic area by interconnecting a
different LAN to form a larger network.
• Government agencies use MAN to connect to the
citizens and private industries.
• In MAN, various LANs are connected to each other
through a telephone exchange line.
• The most widely used protocols in MAN are RS-232,
Frame Relay, ATM, ISDN, ADSL, etc.
• It has a higher range than Local Area Network (LAN).
• Supports both data and voice.
• Speed: 34 to 150 Mbps
01-08-2024 Dr. Nilesh M. Patil 22
Wide Area Network (WAN)
• A Wide Area Network is a network that
extends over a large geographical area such
as states or countries.
• A Wide Area Network is quite bigger
network than the LAN.
• It spans over a large geographical area
through a telephone line, fiber optic cable
or satellite links.
• The Internet is one of the biggest WAN in
the world.
• A Wide Area Network is widely used in the
field of Business, government, and
education.
01-08-2024 Dr. Nilesh M. Patil 23
Comparison of LAN, MAN and WAN
Basis of Comparison LAN MAN WAN
1. Expands to Local Area Network Metropolitan Area Network Wide Area Network
2. Meaning A network that connects a group of It covers relatively large region It spans large locality and connects countries
computers in a small geographical such as cities, towns. together. Example Internet.
area.
3. Ownership of Network Private Private or Public Private or Public
4. Design and maintenance Easy Difficult Difficult
5. Propagation Delay Short Moderate Long
6. Speed High Moderate Low
7. Fault Tolerance More Tolerant Less Tolerant Less Tolerant
8. Congestion Less More More
9. Used for College, School, Hospital. Small towns, City. Country/Continent.
10. Allows Single pair of devices to Multiple computers can A huge group of computers communicate at
communicate. simultaneously interact. the same time.
01-08-2024 Dr. Nilesh M. Patil 24
Intranet and Extranet
S.NO Intranet Extranet
Extranet is a tool for sharing information between the internal members and external
1. Intranet is a tool for sharing information throughout the organization.
members.
2. Intranet is owned and managed by a single organization. Extranet is owned and managed by either a single or a many organization.
3. In intranet, security is implemented through a firewall. In extranet, security is implemented through a VPN.
4. Intranet has a limited number of connected devices. In extranet, connected devices are more as compared with the intranet.
Extranet is also a private network in which public network is used in order to share the
5. Intranet is a private network type for an organization.
information to the suppliers and customers.
Intranet is used in order to get employee information, telephone
6. Extranet is used to check status, access data, send mail, place order etc.
directory etc.
7. Intranet is the limited and compromised version of Extranet. Extranet is the limited and compromised version of Internet.
8. A particular organization is the regulating authority for intranet. Extranet is regulated by multiple organizations.
Extranet is accessible to members of organization as well as external members with
9. Intranet is accessible to only the members of organization.
logins.
10. Intranet’s restricted area is up to an organization. Extranet’s restricted area is up to an organization and some of its stakeholders.
11. Example: WIPRO using internal network for its business operations. Example: DELL and Intel using network for business related operations.
01-08-2024 Dr. Nilesh M. Patil 25
Client-Server Network Vs Peer-to-Peer Network
S.NO Client-Server Network Peer-to-Peer Network
In Client-Server Network, Clients and server
In Peer-to-Peer Network, Clients and server are not
1. are differentiated, Specific server and clients
differentiated.
are present.
Client-Server Network focuses on
2. Peer-to-Peer Network focuses on connectivity.
information sharing.
In Client-Server Network, Centralized server
3. In Peer-to-Peer Network, each peer has its own data.
is used to store the data.
In Client-Server Network, Server respond the In Peer-to-Peer Network, each and every node can do
4.
services which is request by Client. both request and respond for the services.
Client-Server Network are costlier than Peer- Peer-to-Peer Network are less costlier than Client-
5.
to-Peer Network. Server Network.
Client-Server Network are more stable than Peer-to-Peer Network are less stable if number of peer
6.
Peer-to-Peer Network. is increased.
Client-Server Network is used for both small Peer-to-Peer Network is generally suited for small
7.
and large networks. networks with fewer than 10 computers.
01-08-2024 Dr. Nilesh M. Patil 26
Network Application
• Resource sharing: Resource sharing is the sharing of resources such as programs,
printers, and data among the users on the network without the requirement of
the physical location of the resource and user.
• Server-Client model: Computer networking is used in the server-client model. A
server is a central computer used to store the information and maintained by the
system administrator. Clients are the machines used to access the information
stored in the server remotely.
• Communication medium: Computer network behaves as a communication
medium among the users. For example, a company contains more than one
computer having an email system which the employees use for daily
communication.
• E-commerce: Computer network is also important in businesses. We can do the
business over the internet. For example, amazon.com is doing their business over
the internet, i.e., they are doing their business over the internet.
01-08-2024 Dr. Nilesh M. Patil 27
Networking Devices
• Repeater
• Hub
• Switch
• Bridge
• Router
• Gateway
01-08-2024 Dr. Nilesh M. Patil 28
Repeater
• Also called a regenerator.
• Operates only in the physical layer of the ISO-OSI model.
• Simply regenerates the weak signal and transmit the regenerated
signal.
• Provides signal amplification.
01-08-2024 Dr. Nilesh M. Patil 29
Hub
• Also called the central concentrator or controller.
• Operates in the physical layer of the ISO-OSI model.
• It simply transmits the incoming signals to the other media segments.
• Provides central management.
• Do not amplify the incoming signal.
01-08-2024 Dr. Nilesh M. Patil 30
Switch
• Operates in the data link layer of the ISO-OSI model.
• Buffer the incoming packet.
• Check the address and decide the outgoing line.
• Retransmit the packet only if the line is idle.
01-08-2024 Dr. Nilesh M. Patil 31
Bridge
• Operates in the data link layer of the ISO-OSI
model.
• A bridge connects two or more LANs.
• When a frame arrives, software in the bridge
extracts the destination address from the frame
header and looks it up in the bridge table to see
where to send the frame.
• Can divide the busy network into segments and
reduce the network traffic.
01-08-2024 Dr. Nilesh M. Patil 32
Router
• Operates at the network layer of the ISO-OSI model.
• Interconnects two or more networks which can be heterogeneous.
• They decide on the most efficient path that the packets should take
while flowing from one network to another.
01-08-2024 Dr. Nilesh M. Patil 33
Gateway
• Operates at all the seven layers of the ISO-OSI
model.
• It is a protocol converter.
• A gateway can accept a packet formatted for
one protocol and can convert it into a packet
formatted for another protocol before
forwarding it.
• Gateway must adjust data rate, size, and data
format.
• Gateway is generally a software installed
within a router.
01-08-2024 Dr. Nilesh M. Patil 34
Network Software
• Software components are the programs or applications that run on these
networking devices.
• Software includes things like operating systems, antivirus software, and
networking tools.
• Functions of network software
1. User management allows administrators to add or remove users from
the network. This is particularly useful when hiring or relieving users.
2. File management lets administrators decide the location of data
storage and control user access to that data.
3. Access enables users to enjoy uninterrupted access to network
resources.
4. Network security systems assist administrators in looking after
security and preventing data breaches.
01-08-2024 Dr. Nilesh M. Patil 35
Protocol Hierarchies
• Most networks are organized as a series of layers or levels.
• To reduce the design complexity, networks are organized as a
series of layers or levels, one above the other.
• The number of layers, the name of each layer, the contents of
each layer and the function of each layer differ from network
to network.
• The purpose of each layer is to offer certain services to the
higher layers.
• Layer n on one machine (sender) carries a conversation with
layer n on another machine (receiver).
• The rules and conventions used in this conversation are
collectively known as the layer n protocol.
• If the protocol is violated, communication will be difficult.
• The entities comprising the corresponding layers on different
machines are called as peers.
• The communication actually takes place between the peers
using the protocol.
• The dotted lines show the virtual communication and the
physical communication is shown by solid lines.
• Between each pair of adjacent layers is interface. The interface
defines which primitive operations and services the lower layer
offers to the upper layer.
• A set of layers and protocols is called a network architecture.
01-08-2024 Dr. Nilesh M. Patil 36
Design Issues for the Layers
1. Mechanism for identifying senders and Receivers (addressing).
2. Rule for data transfer: Simplex, Half-Duplex, and Full-Duplex.
3. Error control (Detection and Correction ).
4. Preserving order of messages (Sequencing).
5. How to keep a fast sender from swamping a slow receiver (flow control).
6. Inability of all processes to accept arbitrarily long messages. (Dismantling
– Transmit – Reassembling)
7. Multiplexing and demultiplexing is to be used to share the same channel
by multiple sources simultaneously.
8. In the case of multiple paths, Routing Algorithms are required to choose
the optimal path.
9. Connection Establishment, maintenance, and termination once the
session is over.
01-08-2024 Dr. Nilesh M. Patil 37
Connection-Oriented and Connectionless Service
Parameter Connection-oriented Connectionless
It is based on the telephone system in its architecture
Related System It is a postal system-based service.
and development.
It is used to establish an end-to-end connection
It is used to transport data packets from senders to receivers
Definition between senders and receivers prior to transferring
without establishing a connection.
data across the same or a separate network.
It establishes a virtual connection between the sender It does not establish a virtual link between the sender and the
Virtual Path
and the recipient. recipient.
Before transferring data packets to the recipient, it
Authentication Before sending data packets, it does not require authentication.
requires authentication.
Data Packets All data packets are received in the same sequence as
Same sequence of data packets is not guaranteed.
Path they were transmitted.
Bandwidth
It takes more bandwidth to send data packets. The data packets are sent using very low bandwidth.
requirement
It is a more reliable connection service since it assures It is not a reliable connection service since it does not ensure the
Data Reliability data packets travel from one end of a connection to passage of data packets from one end to the other in order to
the other. establish a connection.
There is no congestion since it establishes an end-to- Congestion may occur as a result of not establishing an end-to-end
Congestion end link between sender and recipient during data connection between the source and receiver for data packet
transfer. transmission.
Connectionless services include User Datagram Protocol (UDP),
A connection-oriented service is the Transmission
Examples Internet Protocol (IP), and Internet Control Message Protocol
Control Protocol (TCP).
(ICMP).
01-08-2024 Dr. Nilesh M. Patil 38
Service Primitives
• A service is formally specified by a set of primitives (operations) available to a user process to access the
service.
• There are five types of service primitives:
1. LISTEN: When a server is ready to accept an incoming connection, it executes the LISTEN primitive. It blocks
waiting for an incoming connection.
2. CONNECT: It connects the server by establishing a connection. The response is awaited.
3. RECEIVE: Then the RECEIVE call blocks the server.
4. SEND: Then the client executes SEND primitive to transmit its request followed by the execution of RECIEVE
to get the reply. Send the message.
5. DISCONNECT: This primitive is used for terminating the connection. After this primitive one can't send any
message. When the client sends DISCONNECT packet then the server also sends the DISCONNECT packet to
acknowledge the client. When the server package is received by client then the process is terminated.
01-08-2024 Dr. Nilesh M. Patil 39
Communication Between Layers
01-08-2024 Dr. Nilesh M. Patil 40
ISO-OSI Model
01-08-2024 Dr. Nilesh M. Patil 41
1. Physical Layer:
• It deals with the physical layout of the network.
• It deals with transmitting raw bits (0’s and 1’s) over the communication channel.
• The design issues here deal with the mechanical, electrical and timing interfaces
and the physical transmission medium which lies below the physical layer.
2. Data Link Layer:
• It breaks the data into frames and passes it to the network layer.
• It deals with error control mechanism during transmission.
• It deals with the flow control mechanism to prevent the drowning of the slow
receiver by the fast transmitter.
• It controls access to the shared medium.
01-08-2024 Dr. Nilesh M. Patil 42
3. Network Layer:
• It determines the network path on which to route the packet.
• Helps to reduce network congestion.
• Establishes virtual circuits.
• Routes frames to other network, resequencing packet transmission when needed.
4. Transport Layer
• Ensures reliability of packet transmission from node to node.
• Ensures data is sent and received in the same order.
• Provides acknowledgment when a packet is received.
• Monitors for packet transmission errors, and resends the damaged packets.
5. Session Layer
• It deals with dialogue control and synchronization to keep track of whose turn is it to transmit.
• It deals with token management to prevent two parties from attempting the same critical operation at
the same time.
• It deals with check-pointing long transactions to allow them to continue from where they were after a
crash.
01-08-2024 Dr. Nilesh M. Patil 43
6. Presentation Layer
• It deals with syntax of information.
• It deals with semantics of information.
• It deals with compression of information.
• It also deals with encoding of information.
7. Application Layer
• Provides user interfaces.
• Support for services like Email, File transfer, Database Management, Remote
File access.
01-08-2024 Dr. Nilesh M. Patil 44
01-08-2024 Dr. Nilesh M. Patil 45
TCP/IP Model
01-08-2024 Dr. Nilesh M. Patil 46
1. Network Access Layer (Host-to-Network Layer):
• A network access layer is the lowest layer of the TCP/IP model.
• A network access layer is the combination of the Physical layer and Data Link layer defined in the OSI
reference model.
• It defines how the data should be sent physically through the network.
• This layer is mainly responsible for the transmission of data between two devices on the same network.
• The functions carried out by this layer are encapsulating the IP datagram into frames transmitted by the
network and mapping IP addresses into physical addresses.
• The protocols used by this layer are Ethernet, Token ring, FDDI, X.25, and Frame relay.
2. Internet Layer:
• It permits hosts to inject packets into the network and make these packets reach their destination.
• It defines the packet format and protocol called the Internet Protocol (IP).
• Main focus is on packet routing.
01-08-2024 Dr. Nilesh M. Patil 47
3. Transport Layer:
• The transport layer is responsible for the reliability, flow control, and correction of data which is
being sent over the network.
• It has two main protocols: Transmission Control Protocol (TCP) and User Datagram Protocol (UDP).
• TCP:
(i) Reliable, connection-oriented.
(ii) Allows byte stream from one machine to be delivered to any other machine on the network.
(iii) Handles error control and flow control.
• UDP:
(i) Unreliable, connectionless.
(ii) Used for client-server type queries, where prompt delivery is more than reliability.
(iii) Does not implement flow or error control.
01-08-2024 Dr. Nilesh M. Patil 48
4. Application Layer
• An application layer is the topmost layer in the TCP/IP model.
• It is responsible for handling high-level protocols, issues of
representation.
• This layer allows the user to interact with the application.
• When one application layer protocol wants to communicate with
another application layer, it forwards its data to the transport layer.
• Contains protocols like FTP, SMTP, HTTP, DNS, Telnet.
01-08-2024 Dr. Nilesh M. Patil 49
ISO-OSI Model Vs TCP/IP Model
OSI Model TCP/IP Model
It is developed by ARPANET (Advanced Research Project
It is developed by ISO (International Standard Organization)
Agency Network).
OSI model provides a clear distinction between interfaces, TCP/IP doesn’t have any clear distinguishing points
services, and protocols. between services, interfaces, and protocols.
OSI refers to Open Systems Interconnection. TCP refers to Transmission Control Protocol.
OSI uses the network layer to define routing standards and
TCP/IP uses only the Internet layer.
protocols.
OSI follows a vertical approach. TCP/IP follows a horizontal approach.
OSI layers have seven layers. TCP/IP has four layers.
In the OSI model, the transport layer is only connection- A layer of the TCP/IP model is both connection-oriented
oriented. and connectionless.
In the OSI model, the data link layer and physical are separate In TCP, physical and data link are both combined as a single
layers. host-to-network layer.
There is no session and presentation layer in the TCP
Session and presentation layers are a part of the OSI model.
model.
It is defined after the advent of the Internet. It is defined before the advent of the internet.
01-08-2024 Dr. Nilesh M. Patil 50
01-08-2024 Dr. Nilesh M. Patil 51
Overview of 5G Technology
• 5G is the fifth generation of cellular network technology, designed to
provide faster speeds, lower latency, and greater capacity than previous
generations.
• Key aspects include:
1. Speed: Up to 20 Gbps peak data rates
2. Latency: As low as 1 millisecond
3. Capacity: Supports more connected devices per square kilometer
4. Frequency bands: Uses low, mid, and high (mmWave) bands
5. Network slicing: Allows customized virtual networks for specific uses
6. Applications: Enables IoT, autonomous vehicles, smart cities, AR/VR
01-08-2024 Dr. Nilesh M. Patil 52
Limitations
1.Limited coverage:
•High-frequency signals (mmWave) have short range and poor penetration
•Requires dense network of small cells for full coverage
2.Infrastructure costs:
•Significant investment needed for new equipment and cell sites
•May lead to higher costs for consumers
3.Device compatibility:
•Requires new 5G-capable devices
•Slow adoption may limit initial benefits
4.Potential security concerns:
•Increased number of connected devices expands attack surface
•New security measures needed to protect against vulnerabilities
5.Regulatory challenges:
•Spectrum allocation and regulations vary by country
•May slow down deployment in some areas
6.Power consumption:
•5G devices may consume more power, affecting battery life
7.Potential interference:
•Some 5G frequencies may interfere with weather satellites
01-08-2024 Dr. Nilesh M. Patil 53
Evolution of
5G
Technology
Core network
architecture in
5G
Dr. Nilesh M. Patil 8/1/2024 55
• NSSF (Network Slice Selection Function): Selects the appropriate network slice for a UE
• NEF (Network Exposure Function): Exposes capabilities and events from the 5G core network to
external applications
• NRF (Network Repository Function): Maintains a database of available network function services
• PCF (Policy Control Function): Defines and updates network policies for QoS, charging, etc.
• UDM (Unified Data Management): Stores and manages subscriber data and profiles
• AF (Application Function): Interacts with the 5G core network to influence traffic routing
• AUSF (Authentication Server Function): Stores authentication data and performs authentication
for UEs
• AMF (Access and Mobility Management Function): Handles registration, connection, and
reachability of user equipment (UE)
• SMF (Session Management Function): Establishes, modifies, and releases user sessions by
allocating IP addresses to UE.
• UE (User Equipment): The end-user device (e.g., smartphone, IoT device, vehicle modem)
• RAN (Radio Access Network): Consists of base stations and handles functions like radio
transmission, reception, and handovers.
• DN (Data Network): Represents external networks or services (e.g., internet, private corporate
networks)
01-08-2024 Dr. Nilesh M. Patil 56