Computer Network Unit-1 New
Computer Network Unit-1 New
I. Message.
The message is the information (data) to be communicated. Popular forms of
information include text, numbers, pictures, audio, and video.
2. Sender.
The sender is the device that sends the data message. It can be a computer,
workstation, telephone handset, video camera, and so on.
3. Receiver.
The receiver is the device that receives the message. It can be a computer,
workstation, telephone handset, television, and so on
4. Transmission medium.
The transmission medium is the physical path by which a message travels from
sender to receiver. Some examples of transmission media include twisted-pair
wire, coaxial cable, fiber-optic cable, and radio waves.
5. Protocol.
In half-duplex mode, each station can both transmit and receive, but not at the same
time. When one device is sending, the other can only receive, and vice versa (Figure
b). Walkie- talkies and CB (citizens band) radios are both half- duplex systems.
Full-Duplex
In full-duplex, both stations can transmit and receive simultaneously (Figure c).
One common example of full-duplex communication is the telephone network.
When two people are communicating by a telephone line, both can talk and listen
at the same time. The full-duplex mode is used when communication in both
directions is required all the time.
Network Criteria
A network must be able to meet a certain number of criteria. The most important of
these are
performance,
reliability,
Security.
Performance
Performance can be measured in many ways, including transit time and response
time. Transit time is the amount of time required for a message to travel from one
device to another. Response time is the elapsed time between an inquiry and a
response. The performance of a network depends on a number of factors, including
the number of users, the type of transmission medium, the capabilities of the
connected hardware, and the efficiency of the software
Performance is often evaluated by two networking metrics:
throughput and delay.
Often we need more throughput and less delay.
However, these two criteria are often contradictory. If we try to send more data to the
network, we may increase throughput but we increase the delay because of traffic
congestion in the network.
Reliability: In addition to accuracy of delivery, network reliability is measured
by the frequency of failure, the time it takes a link to recover from a failure, and
the network's Robustness in a catastrophe.
Security: Network security issues include protecting data from unauthorized
access, protecting data from damage and development, and implementing policies
and procedures for recovery from breaches and data losses.
USES OF NETWORKS:
A computer network refers to a group of two or more computing devices that are connected by a
communication medium allowing the computers to communicate electronically. A computing
device on a network is usually referred to as a node, being connected to one another, it allows
nodes to exchange data with one another using a connection media between them. The links can
be established either over cable media such as wires or via a wireless media such as Wi-Fi.
The following are reasons for using networks:
1. COMMUNICATION
Everything, from the World Wide Web to online banking to multiplayer computer games,
depends on the ability of computers to communicate. However, it is not just computers that
communicate with each other; computer and telecommunication networks also connect people.
Whether this is through video calls on a smartphone, emails from your computer, instant
messaging services or social networks, computer networks allow people from across the world to
easily communicate with one another.
2. ACCESSING RESOURCES
Networks allow computers to share and access resources with other computing devices
connected to it.
Data and information: Networks allow computers to share data and information. This
can most easily be seen on the internet, where websites like Wikipedia share
information on millions of different topics, but is also true for smaller home and
business networks.
Printers and scanners: Hardware devices like printers and scanners are not used that
frequently by any single computer. A network allows several people to be connected to
one printer or scanner, thus making optimal use of these resources.
Software: Networks also allow people and computers to share software. Online
applications like Office 365 and Google docs are examples of applications installed on
only a few servers and shared by people around the world.
Labour and money: Resources are not just restricted to computer resources but can
also extend to real world resources like people and money. By seeking advice on the
internet, you can gain access to experts from all over the world who can help you to
resolve an issue you may be experiencing..
Other hardware resources: Equipment such as portable disk drives, portable DVD
drives, and plotters can be shared amongst many users on a network.
3. CENTRALISATION OF DATA
Data can be stored on one server instead of several devices. For example, on a small home
network, all the data can be centralized by using a server. By doing this, anyone with access to
the network can work with the data stored on the central server without needing to connect
several external hard drives or flash drives to a computer.
4. TRANSFER OF FILES
One way in which data and information can be shared on a network is by sharing files. By
sharing files, allow users connected to the same network
5. INCREASED PRODUCTIVITY
The use of networks allows most people to work and study more productively. This is achieved
by allowing people to:
For example, as a programmer you might not be able to solve a programming problem. By using
the internet you can speak to experts live and they would be able to guide you in solving the
problem you may be experiencing. You could also look at the files of similar applications that
have been developed to see how their creators solved a problem. Or you could work through
several free, online programming courses and permanently improve your productivity. The same
is applicable for most fields of study and work.
6. LEISURE
Access to the internet provides access to an almost unlimited amount of entertainment. Examples
include:
games
multimedia
books
Type of Connection
LAN:
LAN is secure because there is no outside connection with the local area network thus the
data which is shared is safe on the local area network and can’t be accessed outside.
LAN due to their small size are considerably faster, their speed can range anywhere from
100 to 100Mbps.
. LANs are not limited to wire connection, there is a new evolution to the LANs that
allows local area network to work on a wireless connection.
ADVANTAGES:
1. Resource Sharing
Sharing of resources such as hard disk drives, DVD drives and Printers are made easy in Local
Area Network. For an example all the resources can be connected to one single computer with a
network so that whenever there is a need of resources it can be shared with the connected
computers.
2. Software Sharing
Another type of sharing made easy here is the Software sharing. A single computer with the
licensed software can be shared among other users in the network. There is no need to purchase
individual license for each and every computer in the network. All can be worked under one
single license.
3. Convenient Communication
Using LAN users can exchange messages and data in a convenient way. Since the data is placed
on the server it can be accessed anytime by the LAN users. Every single LAN user can do this
with others on the network. Hence, this not only saves lots of time, it ensures that messages get
delivered to the right people.
4. Centralized Data
As mentioned earlier data of the users are located at the centralized server. Any workstation in a
particular network can be used to access this information. Moreover users can access their own
set of data by logging into their respective accounts.
5. Improved Security
Since data is stored on a local server, it can be guaranteed to be secure. If the data on the server
is updated then simply all the LAN users can access them. In addition to that, the host has the
capability to deny or allow users in a particular network so that additional security measurements
can be imposed.
6. Internet Sharing
LAN has the capability to share internet connection among all the LAN users. One single
computer with an internet connection shares internet with all the connected computers. This type
of infrastructure can be seen in Offices and Netcafes.
7. Computer Identification
For the purpose of identification, each computers on the LAN is assigned with a MAC address.
This address will be normally used when sending and receiving data. In modern computers these
data is stored inside the network adapter that comes attached with the motherboard.
DISADVANTAGES:
1. Implementation Cost
Even though LAN saves lots of money in terms of resource sharing, the initial cost involved in
setting up the network is quite high. This is mainly due to the requirement of a special software
that is needed to make a server. In addition to that purchasing of hardware equipments such as
routers, hubs, switches and cables are required for the first time setup.
2. Policy Violations
Since all the data of the connected computers are stored inside a central server, unauthorized
users can view all the browsing history and downloads of all the connected computers.
Especially the LAN administrator has the authority to check personal data of each and every
LAN user. Therefore, this can lead to Policy violations.
3. Security
Since it is rather easy to gain access to programs and other types of data, security concerns are a
big issue in LAN. The sole responsibility to stop unauthorized access is in the hands of LAN
administrators. The LAN administrator has to make sure that the centralized data is properly
secured by implementing correct set of rules and privacy policies on the server.
4. Maintenance
LAN often faces hardware problems and system failure. Hence, it requires a special
administrator to look after these issues. The administrator needs to be well knowledgeable in the
field of networking and needed at its full time job.
5. Area Coverage
LAN is usually made to cover up a limited distance (up to 10km). Most probably it is operated in
small areas such as in offices, banks and schools. This is because its cabling system cannot be
extended more than a certain range.
6. Server Crashes
Central server which is present on the LAN architecture manages all the attached computers. If
in case the server encounters any faults all the connected computers are affected too. For an
example if the files on the server gets corrupted, no more data on the attached computers can be
accessible.
MAN:
MAN network
covers larger area by
connections LANs to a larger network of computers. In Metropolitan area network
various Local area networks are connected with each other through telephone lines.
The size of the Metropolitan area network is larger than LANs and smaller than
WANs(wide area networks), a MANs covers the larger area of a city or town.
ADVANTAGES:
Less expensive:It is less expensive to attach MAN with WAN. MAN gives the good efficiency
of data. In MAN data is easily managed in a centralized way.
Sending local emails:
On MAN you can send local emails fast and free.
High speed than WAN:
MAN uses fiber optics so the speed of data can easily reach upon 1000 Mbps. Files and
databases can be transferred fast.
Sharing of the internet:
In some installation of MANs, users can share their internet connection. So multiple users can
get the same high-speed internet.
DISADVANTAGES:
Difficult to manage:
If MAN becomes bigger then it becomes difficult to manage it. This is due to a security problem
and other extra configuration.
Internet speed difference:
MAN cannot work on traditional phone copper wires. If MAN is installed on copper wires then
there will be very low speed. So it required the high cost to set up fiber optics for the first time.
WAN:
Wide area network provides long distance transmission of data. The size of the WAN is larger
than LAN and MAN. A WAN can cover country, continent or even a whole world. Internet
connection is an example of WAN. Other examples of WAN are mobile broadband connections
such as 3G, 4G etc.
Advantages of WAN:
Centralized infrastructure: One of the main advantage of WAN is the that we do not need
to maintain the backup and store data on local system as everything is stored online on a
data centre, from where we can access the data through WAN.
Privacy: We can setup the WAN in such a way that it encrypts the data that we share
online that way the data is secure and minimizes the risk of unauthorized access.
Increased Bandwidth: With the WAN we get to choose the bandwidth based on the need,
a large organization can have larger bandwidth that can carry large amount of data faster
and efficiently.
Area: A WAN can cover a large area or even a whole world though internet connection
thus we can connect with the person in another country through WAN which is not
possible is other type of computer networks.
Disadvantages of WAN:
Antivirus: Since our systems are connected with the large amount of systems, there is
possibility that we may unknowingly download the virus that can affect our system and
becomes threat to our privacy and may lead to data loss.
MESH TOPOLGY:
STAR TOPOLGY:
In star topology each device in the network is connected to a central device called hub. Unlike
Mesh topology, star topology doesn’t allow direct communication between devices, a device
must have to communicate through hub. If one device wants to send data to other device, it has
to first send the data to hub and then the hub transmit that data to the designated device.
BUS TOPOLGY:
In bus topology there is a main cable and all the devices are connected to this main cable through
drop lines. There is a device called tap that connects the drop line to the main cable. Since all the
data is transmitted over the main cable, there is a limit of drop lines and the distance a main
cable can have.
RING TOPOLGY:
In ring topology each device is connected with the two devices on either side of it. There are two
dedicated point to point links a device has with the devices on the either side of it. This structure
forms a ring thus it is known as ring topology. If a device wants to send data to another device
then it sends the data in one direction, each device in ring topology has a repeater, if the received
data is intended for other device then repeater forwards this data until the intended device
receives it.
HYBRID TOPOLOGY:
2. These layers are connected with each other, each layer provide certain data to its immediate
higher and immediate lower layer and receives certain data from the same.
3. Dividing a model is layers make the structure quite simple that makes it easy to identify the
issue if it occurs. There are three main components of a computer network model. Sender,
receiver and carrier.
At sender Side:
Higher layer: Higher layer serves the middle layer, directs the message (or data) to middle layer
Middle layer: Middle layer picks up the data from higher layer and transfer it to the lower layer
lower layer: The data is transmitted to the lower layer of the receiver side.
At receiver Side:
lower layer: Receives the data from the lower layer of sender side and transfer it to middle
layer.
Middle layer: Middle layer picks up the data from lower layer and transfer to higher layer.
Higher layer: Higher layer transfers the data to the receiver.
Physical Layer
Data link layer is responsible for moving frames from node to node or
computer to computer
Data unit in the data link layer is called frame. A frame is transferred from one
computer to another computer and transmission is done through a transmission
media such as wire, cable etc. Both sender and receiver computer has NIC that
helps in sending and receiving frame. These NICs presents at sender and receiver
provides a physical link between sender and receiver.
Access the Media: Allows upper layers of OSI model to use the media using a
technique called framing
Media Access control: How data is placed and received from the media.
Error Detection: Tail of the each frame transferred contains certain bits to check
whether the data received on the side is corrupted or not.
NETWORK LAYER:
Responsible for moving packets (data) from one end of the network to the
other.
The main functions of network layer:
Logical Addressing: Every computer on a network has a unique IP address. Network layer
assigns the sender and receiver IP address to the data packets before transmitting them so that the
data packet reach the correct destination.
Routing: It is a method of transferring data packets from source to destination. It uses the
combination of Mask and IP address to transfer the data to correct destination. Each data packets
contains three addition components mask, sender IP, receiver IP. The Mask determines the
computer network to which the data needs to be delivered and then the IP address determines
which computer on that particular network needs to receive the data packet.
TRANSPORT LAYER:
The main role of transport layer is to check the reliability of data communication.
Segmentation: Data received from session layer is divided into small data units called
segments. Each segment contains the sender and receiver port number along with the
sequence number. Port number helps to direct the data segments to the correct application
and the sequence number helps to reassemble the data from data segments in correct
order.
Flow control: It controls the flow of data. It checks the capability of the receiver device
receiving capability before transmitting data. For example a sender server can send the
data at a rate of 200Mbps but a receiving data can only receive data at a rate of 10 Mbps
then it controls the flow of data to 10Mbps so that the data doesn’t get lost during
transmission.
Error control: Transport layer also performs error control using Automatic Repeat
Request, if a data is lost during transmission, it is send again using automatic repeat
request. Transport layer also adds a group of bits called checksum with each segment to
check whether the data received at receiver side is not corrupt.
Connection oriented transmission: Connection oriented transmission is done using
transmission control protocol (TCP). TCP is considerably slower than UDP because it
provides the feedback that the data is received or not, thus a data can be sent again if it is
not received.
Connectionless transmission: Connectionless transmission is done using User Datagram
protocol (UDP). UDP is faster than TCP because it doesn’t provide the feedback that the
data is actually received at the receiver side or not.
SESSION LAYER:
The main role of session layer is to setup and maintain the connection
between different systems.
PRESENTATION LAYER:
Presentation layer receives the data from top most layer which is application layer.
APPLICATION LAYER:
2. Network Layer
In the network layer, the TCP/IP model supports internetworking protocol in short known as IP.
The IP uses four protocols internally: ARP, RARP, ICMP & IGMP.
Internetworking protocol(IP):
It is an unreliable connectionless protocol used by TCP/IP Model.
This protocol is used for data transmission,doesn’t do error checking or tracking of data,
thus we cannot be sure that the data is actually reached its destination. This is why it is
also known as best effort delivery service which means this protocol tries it best to send
the data to its destination but doesn’t take an guarantee.
IP protocol transmits the data in form of small packets known as datagrams. Each of
these datagrams are transmitted separately, thus they can take different routes and
sometime duplicate datagrams can be reached to destination, also they are reached in no
particular order at the destination.
Address Resolution Protocol (ARP)
ARP finds the physical address by using the IP address. In a network, each device is known as
physical address usually imprinted on Network interface card (NIC).
ARP protocol is used to find the physical address of a device whose internet address (IP address)
is known.
These three protocols in transport layer are responsible for delivery of messages from one
process to another. The SCTP protocol was later introduced to meet the needs of newer
applications.
It takes the data from upper layer of TCP/IP Model and adds following information to the data:
Port Address – Source port address of 16 bits and destination port address of 16 bits
added to the data so that it reaches to correct destination and displays the correct source
of data.
checksum error control – 16 bits of checksum data is added to the data received from
upper layer, this is used for error control.
c) length of data – Length defines the total bytes of data in datagram.
Transmission control protocol (TCP)
Unlike UDP which is a connectionless protocol, the TCP is a connection oriented
protocol.
A connection must be made between sender and receiver before the transmission of data.
TCP protocol divides the data in small units called segments. Each segment contains the
sequence number which makes it possible to rearrange the segments in correct order at
the receiver side to make the complete data.
It also adds acknowledgement number to the segments to verify that the data is actually
reached its destination or not.
Unlike UDP which is unable to specify the exact error in transmission, this protocol does
error control and specifies the exact error which makes TCP a reliable protocol.
Stream Control Transmission Protocol (SCTP)
This protocol combines the best features of TCP and UDP protocols.
It was discovered later to support newer applications such as voice data transmission over
the internet.
4. Application Layer
This is the top most layer of TCP/IP model.
It is used for interaction between user and application.
There are several protocols used by the application layer for user interaction such as:
HTTP, SNMP, SMTP, DNS, TELNET, FTP etc.
HTTP: HTTP stands for Hypertext transfer protocol, it allows the user to interact with
world wide web through the browser application. HTTP can be used to transfer various
types of data such as plain text, audio, video etc.
FTP: FTP stands for File Transfer Protocol. This protocol is used for transmitting files
from one system to another system.
TELNET: TELNET is a client-server protocol. It is a reliable connection oriented
protocol. This protocol is used on internet or on LAN to provide a bidirectional (both
ways) text based communication through a virtual terminal connection.
DNS: DNS stands for Domain Name System. Each computer on a network has different
IP address, a computer is known by its IP address. DNS provides a mapping to a name to
the IP Address so a name can be used to identify a system on network rather than IP
address itself.
SNMP: SNMP stands for Simple Network Management Protocol. It managers the
devices connected to the internet using TCP/IP protocol.
SMTP: SMTP stands for Simple mail transfer protocol. It is used for email services,
using this protocol a email containing data can be sent to another email address.
DIFFERENCES BETWEEN TCP /IP AND OSI READ FROM CLASS NOTES..
TRANSMISSION MEDIA
Twisted pair Shielded Twisted pair
Guided Media: Guided media, which are those that provide a medium from one
device to another, include twisted-pair cable, coaxial cable, and fiber-optic cable.
The most common UTP connector is RJ45 (RJ stands for registered jack)
Applications
Twisted-pair cables are used in telephone lines to provide voice and data
channels. Local-area networks, such as l0Base-T and l00Base-T, also use
twisted-pair cables.
Category Twisterd pair type with data rates
type
Cat1 UTP used in telephone networks with data
rate<0.1MBPS.
Cat2 UTP used in LANs with data rate of 2Mbps.
Coaxial Cable
Coaxial cable (or coax) carries signals of higher frequency ranges than those
in twisted pair cable. coax has a central core conductor of solid or stranded
wire (usuallycopper) enclosed in an insulating sheath, which is, in turn,
encased in an outer conductor of metal foil,braid, or a combination of the two.
The outer metallic wrapping serves both as a shield against noise and as the
second conductor, which completes the circuit.This outer conductor is also
enclosed in an insulating sheath, and the whole cable is protected by a plastic
cover.
The most common type of connector used today is the Bayone-Neill-Concelman
(BNe), connector.
Applications
Coaxial cable was widely used in analog telephone networks,digital
telephone networks Cable TV networks also use coaxial cables.
Another common application of coaxial cable is in traditional Ethernet LANs
Fiber-Optic Cable
Optical fibers use reflection to guide light through a channel. A glass or plastic
core is surrounded by a cladding of less dense glass or plastic.
Propagation Modes
Multimode is so named because multiple beams from a light source move through
the core in different paths. How these beams move within the cable depends on the
structure of the core, as shown in Figure.
Fiber Construction
The subscriber channel (SC) connector, The straight-tip (ST)
connector, MT- RJ(mechanical transfer registered jack) is a
connector
Applications
Fiber-optic cable is often found in backbone networks because its wide
bandwidth is cost-effective..
Some cable TV companies use a combination of optical fiber and
coaxial cable, thus creating a hybrid network.
Advantages Fiber-optic cable has several advantages over metallic cable (twisted
pair or coaxial).
Higher bandwidth.
Less signal attenuation. Fiber-optic transmission distance is significantly
greater than that of other guided media. A signal can run for 50 km without
requiring regeneration. We need repeaters every 5 km for coaxial or twisted-
pair cable.
Immunity to electromagnetic interference. Electromagnetic noise cannot
affect fiber- optic cables.
Resistance to corrosive materials. Glass is more resistant to corrosive
materials than copper.
Light weight. Fiber-optic cables are much lighter than copper cables.
Greater immunity to tapping. Fiber-optic cables are more immune to tapping
than copper cables. Copper cables create antenna effects that can easily be
tapped.
Disadvantages :
There are some disadvantages in the use of optical fiber.
Installation and maintenance Unidirectional light propagation. Propagation of
light is unidirectional. If we need bidirectional communication, two fibers are
needed.
Cost. The cable and the interfaces are relatively more expensive than those of
other guided media. If the demand for bandwidth is not high, often the use of
optical fiber cannot be justified.
Transmission media
Radio
It is a wireless transmission medium that is used to communicate information through radio
signals in air, over long distance such as between cities and countries. In this medium, a
transmitter is required to send messages (signals) and receiver is required to receive them. To
receive the broadcast radio signal, the receiver has an antenna that is located in the range of
signal. Some networks use a special device called transceiver used to send and to receive
messages in the form of radio signals.
The frequencies falling between 3000 hertz (3 kHz) and 300,000,000,000 hertz (300
GHz) are called RADIO FREQUENCIES (abbreviated RF) since they are commonly used in
radio communications. This part of the radio frequency spectrum is divided into bands, each
band being 10 times higher in frequency than the one immediately below it. This arrangement
serves as a convenient way to remember the range of each band. - The usable radio-frequency
range is roughly 10 kilohertz to 100 gigahertz.
Microwave
Microwaves are radio waves that provide a high speed transmission. In Microwaves
transmission, data is transmitted from one station to another. Microwave station contains an
antenna, transceiver (transmitter & receiver) and other equipments that are required for
microwave communication. Microwave uses the line-of-sight transmission, which means that in
microwave transmission system the data signals travel in a straight path and cannot bend.
Microwave stations or antennas are usually installed on the high towers or buildings. Thus
microwave stations need to be placed within 20 to 30 miles of each other. Each microwave
station receives signals from the previous stations. In this way, data is transmitted from one place
to another. The data transmission speed of microwave transmission is up to 150 Mbps.
Microwave transmission is used in environments where installing physical transmission media is
impossible and where line-of-sight transmission is available. It is used in wide-open areas.
Today, it is used by telephone companies, cable television providers, universities etc.
There are two types of microwaves:
Terrestrial – Used to link networks over long distances but the two microwave towers must have
a line of sight between them. The frequency is usually 4-6GHz or 21-23GHz. Speed is often 1-
10Mbps. The signal is normally encrypted for privacy. Two nodes may exist.
Satellite – A satellite orbits at 22,300 miles above the earth which is an altitude that will cause it
to stay in a fixed position relative to the rotation of the earth. This is called a geosynchronous
orbit. A station on the ground will send and receive signals from the satellite. The signal can
have propagation delays between 0.5 to 5 seconds due to the distances involved. The
transmission frequency is normally 11-14GHz with a transmission speed in the range of 1-
10Mbps.
Infrared5
Infrared light is part of electromagnetic spectrum that is shorter than radio waves but longer than
visible light. Its frequency range is between 300 GHz and 400 GHz that corresponds to
wavelength from 1mm to 750 nm. Infrared has long been used in night vision equipment and TV
remote control. Infrared is also one of the physical media in the original wireless LAN standard,
that’s IEEE 802.11. Infrared use in communication and networking was defined by the IrDA
(Infrared Data Association). Using IrDA specifications, infrared can be used in a wide range of
applications, e.g. file transfer, synchronization, dial-up networking, and payment. However,
IrDA is limited in range (up to about 1 meter). It also requires the communicating devices to be
in LOS and within its 30-degree beam-cone. Light may interfere with the signal.