Module 1_CN
Module 1_CN
Networks
Module 1
Networks
• A network is a set of devices (often referred to as nodes)
connected by communication links.
• A node can be a computer, printer, or any other device
capable of sending and/or receiving data generated by
other nodes on the network.
Computer Networks
• Computer Network is a group of computers connected
with each other through wires, optical fibres or optical
links so that various devices can interact with each other
through a network.
• The aim of the computer network is the sharing of
resources among various devices.
• In the case of computer network technology, there are
several types of networks that vary from simple to
complex level.
How does a Computer Network works?
Router
• A router is a device that connects two or more
packet-switched networks or subnetworks.
• It serves two primary functions: managing traffic
between these networks by forwarding data
packets to their intended IP addresses and
allowing multiple devices to use the same
Internet connection.
Components of
Computer Network
Modem
• A modem (modulator-demodulator) is a
hardware device that enables a computer or
network to send and receive data over
telephone lines, cable systems, or satellite
connections.
• It converts digital data from a computer into
analog signals that can be transmitted over
these mediums and then converts incoming
analog signals back into digital data.
Types of Computer
Networks
• A computer network can be categorized by
their size.
• A computer network is mainly of four types:
LAN(Local Area
Network)
• Local Area Network is a group of
computers connected to each other in a
small area such as building, office.
• LAN is used for connecting two or more
personal computers through a
communication medium such as twisted
pair, coaxial cable, etc.
• It is less costly as it is built with
inexpensive hardware such as hubs,
network adapters, and ethernet cables.
• The data is transferred at an extremely
faster rate in Local Area Network.
• Local Area Network provides higher
security.
• Egs: office Networks, School Networks
PAN(Personal Area
Networks)
• Personal Area Network is a network arranged
within an individual person, typically within a
range of 10 meters.
• Personal Area Network is used for connecting
the computer devices of personal use is
known as Personal Area Network.
• Thomas Zimmerman was the first research
scientist to bring the idea of the Personal
Area Network.
• Personal Area Network covers an area of 30
feet.
• Personal computer devices that are used to
develop the personal area network are the
laptop, mobile phones, media player and
play stations.
Egs: Bluetooth-enabled devices, personal
hotspots.
Types of
PAN
• Wireless Personal
Area Network: Wireless
Personal Area Network is
developed by simply using
wireless technologies such
as WiFi, Bluetooth. It is a
low range network.
• Wired Personal Area
Network: Wired Personal
Area Network is created
by using the physical
cables typically ethernet,
firewire, USB etc.
MAN(Metropolitan Area Network)
Token Passing
• A common method of data transmission in
ring topology is token passing.
• A token, a small data packet, circulates
around the ring, and only the node possessing
the token can send data.
• This helps in avoiding data collisions and
managing network traffic efficiently.
Advantages of Ring
Topology
o Network Management: Faulty devices can
be removed from the network without
bringing the network down.
o Product availability: Many hardware and
software tools for network operation and
monitoring are available.
o Cost: Twisted pair cabling is inexpensive and
easily available. Therefore, the installation
cost is very low.
o Reliable: It is a more reliable network
because the communication system is not
dependent on the single host computer.
Disadvantages of Ring
Topology
o Difficult troubleshooting: It requires
specialized test equipment to determine the
cable faults. If any fault occurs in the cable, then
it would disrupt the communication for all the
nodes.
o Failure: The breakdown in one station leads to
the failure of the overall network.
o Reconfiguration difficult: Adding new devices
to the network would slow down the network.
o Delay: Communication delay is directly
proportional to the number of nodes. Adding
new devices increases the communication
delay.
Star Topology
• All hosts in Star topology are connected to a central
device, known as hub device, using a point-to-point
connection.
• Star topology is an arrangement of the network in
which every node is connected to the central hub,
switch or a central computer.
• The central computer is known as a server, and the
peripheral devices attached to the server are known
as clients.
• Coaxial cable or RJ-45 cables are used to connect the
computers.
• Hubs or Switches are mainly used as connection
devices in a physical star topology.
• Star topology is the most popular topology in network
implementation.
Advantages of star topology
Efficient troubleshooting: Troubleshooting is quite efficient in a star topology as compared to
bus topology. In a bus topology, the manager has to inspect the kilometers of cable. In a star
topology, all the stations are connected to the centralized network. Therefore, the network
administrator has to go to the single station to troubleshoot the problem.
Network control: Complex network control features can be easily implemented in the star
topology. Any changes made in the star topology are automatically accommodated.
Limited failure: As each station is connected to the central hub with its own cable, therefore
failure in one cable will not affect the entire network.
Advantages of star topology
Familiar technology: Star topology is a familiar technology as its tools are
cost-effective.
• Reliable: The mesh topology networks are very reliable as if any link breakdown will not
affect the communication between connected computers.
• Fast Communication: Communication is very fast between the nodes.
• Easier Reconfiguration: Adding new devices would not disrupt the communication
between other devices.
Disadvantages of Mesh Topology
• Cost: A mesh topology contains a large number of connected devices such as a router and more
transmission media than other topologies.
• Management: Mesh topology networks are very large and very difficult to maintain and manage.
If the network is not monitored carefully, then the communication link failure goes undetected.
• Efficiency: In this topology, redundant connections are high that reduces the efficiency of the
network.
Hybrid Topology
• The combination of various different
topologies is known as Hybrid topology.
• A Hybrid topology is a connection
between different links and nodes to
transfer the data.
• When two or more different topologies
are combined together is termed as
Hybrid topology and if similar topologies
are connected with each other will not
result in Hybrid topology.
• For example, if there exist a ring topology
in one branch of ICICI bank and bus
topology in another branch of ICICI bank,
connecting these two topologies will
result in Hybrid topology.
Advantages of Hybrid
Topology
o Reliable: If a fault occurs in any part of the
network will not affect the functioning of the
rest of the network.
o Scalable: Size of the network can be easily
expanded by adding new devices without
affecting the functionality of the existing
network.
o Flexible: This topology is very flexible as it
can be designed according to the
requirements of the organization.
o Effective: Hybrid topology is very effective
as it can be designed in such a way that the
strength of the network is maximized, and
weakness of the network is minimized.
Disadvantages of Hybrid Topology
Complex design: The major drawback of Hybrid topology is the design of the
Hybrid network. It is very difficult to design the architecture of the Hybrid
network.
Costly Hub: The Hubs used in the Hybrid topology are very expensive as
these hubs are different from usual Hubs used in other topologies.
• The main functionality of the physical layer is to transmit the individual bits from one node to
another node.
• It is the lowest layer of the OSI model.
• Deals with all aspects of physically moving data from one computer to the next
• Converts data from the upper layers into 1s and 0s for transmission over media
• Defines how data is encoded onto the media to transmit the data
• Defined on this layer: Cable standards, wireless standards, and fiber optic standards, Copper
wiring, fiber optic cable, radio frequencies, anything that can be used to transmit data is defined
on the Physical layer of the OSI Model.
Functions of Physical Layer
• Bit Synchronization: The physical layer provides the synchronization of
the bits by providing a clock. This clock controls both sender and
receiver thus providing synchronization at the bit level.
• Bit Rate Control: The Physical layer also defines the transmission rate
i.e. the number of bits sent per second.
• Physical Topologies: Physical layer specifies how the different,
devices/nodes are arranged in a network i.e. bus, star, or mesh topology.
• Transmission Mode: Physical layer also defines how the data flows
between the two connected devices. The various transmission modes
possible are Simplex, half-duplex and full-duplex.
DataLink Layer
• The Data Link Layer is the second layer in the OSI (Open Systems Interconnection)
model.
• It is responsible for node-to-node data transfer and error detection and correction,
ensuring reliable communication between devices on the same network segment.
Functions of Data Link Layer
• Framing: Framing is a function of the data link layer. It provides a way for a sender to transmit a set of bits
that are meaningful to the receiver. This can be accomplished by attaching special bit patterns to the
beginning and end of the frame.
• Physical Addressing: After creating frames, the Data link layer adds physical addresses (MAC addresses)
of the sender and/or receiver in the header of each frame.
• Error Control: The data link layer provides the mechanism of error control in which it detects and
retransmits damaged or lost frames.
• Flow Control: The data rate must be constant on both sides else the data may get corrupted thus, flow
control coordinates the amount of data that can be sent before receiving an acknowledgment.
• Access Control: When a single communication channel is shared by multiple devices, the MAC sub-layer of
the data link layer helps to determine which device has control over the channel at a given time.
Network Layer
Segmentation and Reassembly: This layer accepts the message from the
(session) layer, and breaks the message into smaller units. Each of the
segments produced has a header associated with it. The transport layer at
the destination station reassembles the message.
7 Primarily used as a teaching tool and The foundation of the modern Internet
reference model to understand and most contemporary networks.
network architecture.
Critiques of OSI Model and
Protocols
1. Bad Timing
• The OSI model suffered from bad timing because
its standards were often written too early, before
thorough research was completed, leading to
misunderstandings.
• By the time the OSI model was fully developed,
significant research time had passed, and
companies had already heavily invested in the
TCP/IP model.
• As a result, manufacturers were reluctant to
switch to or invest in the OSI model.
• No company wanted to be the first to adopt it,
which led to its lack of initial adoption and
ultimately, its failure to gain traction.
Critiques of OSI Model and
Protocols
2. Bad technology
• The OSI model was not widely adopted because it
faced competition from the already popular TCP/IP
protocols and had several fundamental flaws.
• These flaws included overly complex service
definitions, protocols, and documentation, making
it difficult to implement and inefficient in operation.
• Additionally, the design of the OSI model was
influenced more by political considerations than
technical ones, leading to duplicated error and flow
control mechanisms across multiple layers.
• Furthermore, the model was dominated by a
communications mentality, further hindering its
practicality and adoption.
Critiques of OSI Model and
Protocols
3. Bad Implementation
• The OSI model's complexity led to slow, bulky, and
inefficient initial implementations, making it
synonymous with poor quality early on.
• It became clear that not all seven layers needed to
be designed together to function effectively.
• In contrast, TCP/IP implementations were more
reliable and quickly gained a large user community.
• Simply put, the complexity of the OSI model
resulted in poor implementation, making it difficult
to use effectively.
Critiques of OSI Model and
Protocols
4. Bad Politics
• The OSI model suffered from bad politics, as it
wasn't associated with UNIX, unlike TCP/IP, which
gained popularity in academia through this
connection.
• Instead, OSI was linked with European
telecommunications, the European community,
and the U.S. government, and was seen as
technically inferior to TCP/IP.
• This led to negative reactions and widespread
support for TCP/IP.
• Despite these challenges, the OSI model remains
a general standard reference for networking
documentation, with organizations still interested
in it. Efforts to update it resulted in a revised model
published in 1994.
Critiques of TCP/IP Model and
Protocols
• It does not distinguish between the data link
and the physical layers, which has very different
functionalities. The data link layer should
concern with the transmission of frames. On the
other hand, the physical layer should lay down
the physical characteristics of transmission. A
proper model should segregate the two layers.
• It was originally designed and implemented for
wide area networks. It is not optimized for small
networks like LAN (local area network) and PAN
(personal area network).
• The model doesnot clearly distinguish the
concepts of services, interfaces and
protocols.
END