0% found this document useful (0 votes)
22 views42 pages

Computer Network 1 Unit

The document provides an introduction to computer networks, detailing their definition, components, uses, and transmission modes. It explains the features of computer networks, including sharing, speed, scalability, integration, security, and cost-effectiveness, while also describing hardware and software components such as servers, clients, and networking operating systems. Additionally, it covers transmission modes (simplex, half-duplex, full-duplex) and various network devices like hubs, repeaters, and bridges, highlighting their functions and advantages.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views42 pages

Computer Network 1 Unit

The document provides an introduction to computer networks, detailing their definition, components, uses, and transmission modes. It explains the features of computer networks, including sharing, speed, scalability, integration, security, and cost-effectiveness, while also describing hardware and software components such as servers, clients, and networking operating systems. Additionally, it covers transmission modes (simplex, half-duplex, full-duplex) and various network devices like hubs, repeaters, and bridges, highlighting their functions and advantages.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 42

Introduction to Computer

Network
Neha Chavan
Objective :
Definition of Computer Network

Components of Computer Network

Uses of Computer Network

Transmission Mode

Classification of Computer Network


Computer Network:
A computer network is a collection of computing devices that are connected with each other for the
purpose of information and resource sharing among a wide variety of users.
Each device in the network is called a node which is connected to other nodes through wired or wireless
media.
The features of a computer network are −

∙ Sharing − Computer networks enable sharing of files, software, hardware resources


and computing capabilities.
∙ Speed: The communication speed among the components is fast enough to be
comparable with a centralized system.
∙ Scalability − Sizes of computer networks dynamically increase with time. The
networks have to be scalable so that they can evolve adequately for future
deployments.
∙ Integration − All the components of the network work in a coordinated manner for a
seamless user experience.
∙ Security − Networks allow security and access rights to the users for restricted
sharing of resources and information.
∙ Cost Effectiveness − Networking reduces the deployment cost of hardware and
software of a centralized system.
Components of Computer Network
1.Hardware Components

•Servers −Servers are high-configuration computers that manage the resources of the network. The
network operating system is typically installed in the server and so they give user accesses to the network
resources. Servers can be of various kinds: file servers, database servers, print servers etc.

•Clients − Clients are computers that request and receive service from the servers to access and use the
network resources.

•Peers − Peers are computers that provide as well as receive services from other peers in a workgroup
network.

•Transmission Media − Transmission media are the channels through which data is transferred from one
device to another in a network. Transmission media may be guided media like coaxial cable, fibre optic
cables etc; or maybe unguided media like microwaves, infra-red waves etc.
•Connecting Devices − Connecting devices act as middleware between networks or computers, by binding
the network media together. Some of the common connecting devices are:

a. Routers

b. Bridges

c. Hubs

d. Repeaters

e. Gateways
Software Components

•Networking Operating System − Network Operating Systems is typically installed in the server and
facilitate workstations in a network to share files, database, applications, printers etc.

•Protocol Suite − A protocol is a rule or guideline followed by each computer for data communication.
Protocol suite is a set of related protocols that are laid down for computer networks. The two popular
protocol suites are −
• a. OSI Model ( Open System Interconnections)
• b. TCP / IP Model
Uses of Computer network:
Computer networks have become invaluable to organizations as well as individuals.
Some of its main uses are as follows −
∙ Information and Resource Sharing − Computer networks allow organizations
having units which are placed apart from each other, to share information in a very
effective manner. Programs and software in any computer can be accessed by other
computers linked to the network. It also allows sharing of hardware equipment, like
printers and scanners among varied users.
∙ Retrieving Remote Information − Through computer networks, users can retrieve
remote information on a variety of topics. The information is stored in remote
databases to which the user gains access through information systems like the World
Wide Web.
∙ Speedy Interpersonal Communication − Computer networks have
increased the speed and volume of communication like never before.
Electronic Mail (email) is extensively used for sending texts, documents,
images, and videos across the globe. Online communications have
increased by manifold times through social networking services.
∙ E-Commerce − Computer networks have paved way for a variety of business and
commercial transactions online, popularly called e-commerce. Users and organizations
can pool funds, buy or sell items, pay bills, manage bank accounts, pay taxes, transfer
funds and handle investments electronically.
∙ Highly Reliable Systems − Computer networks allow systems to be distributed in
nature, by the virtue of which data is stored in multiple sources. This makes the system
highly reliable. If a failure occurs in one source, then the system will still continue to
function and data will still be available from the other sources.

• Cost–Effective Systems − Computer networks have reduced the cost of


establishment of computer systems in organizations. Previously, it was imperative
for organizations to set up expensive mainframes for computation and storage. With the
advent of networks, it is sufficient to set up interconnected personal computers (PCs)
for the same purpose

• VoIP − VoIP or Voice over Internet protocol has revolutionized telecommunication


systems. Through this, telephone calls are made digitally using Internet Protocols
Transmission Mode : Simplex, Half Duplex, Full duplex
The way in which data is transmitted from one device to another device is known
as transmission mode.
The transmission mode is also known as the communication mode.
Each communication channel has a direction associated with it, and transmission media
provide the direction. Therefore, the transmission mode is also known as a directional
mode.
The transmission mode is defined in the physical layer.
∙ Simplex Mode
∙ Half-Duplex Mode
∙ Full-Duplex Mode
1.Simplex Mode

•In Simplex mode, the communication is unidirectional, i.e., the data flow in one
direction.

•A device can only send the data but cannot receive it or it can receive the data but cannot
send the data.
•This transmission mode is not very popular as mainly communications require the
two-way exchange of data. The simplex mode is used in the business field as in sales that
do not require any corresponding reply.
•The radio station is a simplex channel as it transmits the signal to the listeners but never
allows them to transmit back.

•Keyboard and Monitor are the examples of the simplex mode as a keyboard can only
accept the data from the user and monitor can only be used to display the data on the
screen.

•The main advantage of the simplex mode is that the full capacity of the communication
channel can be utilized during transmission.

Advantage of Simplex mode:


In simplex mode, the station can utilize the entire bandwidth of the communication
channel, so that more data can be transmitted at a time.
Disadvantage of Simplex mode:
Communication is unidirectional, so it has no inter-communication between devices.

2.Half-Duplex mode
•In a Half-duplex channel, direction can be reversed, i.e., the station can transmit and
receive the data as well.

•Messages flow in both the directions, but not at the same time.

•The entire bandwidth of the communication channel is utilized in one direction at a time.

•In half-duplex mode, it is possible to perform the error detection, and if any error occurs,
then the receiver requests the sender to retransmit the data.

•A Walkie-talkie is an example of the Half-duplex mode. In Walkie-talkie, one party


speaks, and another party listens. After a pause, the other speaks and first party listens.
Speaking simultaneously will create the distorted sound which cannot be understood.
Advantage of Half-duplex mode:

•In half-duplex mode, both the devices can send and receive the data and also can utilize
the entire bandwidth of the communication channel during the transmission of data.

Disadvantage of Half-Duplex mode:

•In half-duplex mode, when one device is sending the data, then another has to wait, this
causes the delay in sending the data at the right time.
3.Full-duplex mode
•In Full duplex mode, the communication is bi-directional, i.e., the data flow in both the
directions.

•Both the stations can send and receive the message simultaneously.

•Full-duplex mode has two simplex channels. One channel has traffic moving in one
direction, and another channel has traffic flowing in the opposite direction.

•The Full-duplex mode is the fastest mode of communication between devices.

•The most common example of the full-duplex mode is a telephone network. When two
people are communicating with each other by a telephone line, both can talk and listen at
the same time.
Advantage of Full-duplex mode:
•Both the stations can send and receive the data at the same time.

Disadvantage of Full-duplex mode:


•If there is no dedicated path exists between the devices, then the capacity of the
communication channel is divided into two parts.
Basis for comparison Simplex mode Half-duplex mode Full-duplex mode
Direction of communication In simplex mode, the In half-duplex mode, the In full-duplex mode, the
communication is communication is communication is
unidirectional. bidirectional, but one at a time. bidirectional.

Send/Receive A device can only send the Both the devices can send Both the devices can send
data but cannot receive it or and receive the data, but and receive the data
it can only receive the data one at a time. simultaneously.
but cannot send it.
Performance The performance of The performance of The Full-duplex mode has
half-duplex mode is better than full-duplex mode is better than better performance among
the simplex mode. the half-duplex mode. simplex and half-duplex mode
as it doubles the utilization of
the capacity of the
communication channel.

Example Examples of Simplex mode are Example of half-duplex is Example of the Full-duplex
radio, keyboard, and monitor. Walkie-Talkies. mode is a telephone network.
Computer Network Devices

Hardware devices that are used to connect computers, printers, fax machines and other electronic
devices to a network are called network devices. These devices transfer data in a fast, secure and
correct way over same or different networks. Network devices may be inter-network or intra-network.
Some devices are installed on the device, like NIC card or RJ45 connector, whereas some are part of the
network, like router, switch, etc. Let us explore some of these devices in greater detail.

1. Hub
2. Repeater
3. Bridge
4. Router
5. Gateway
6. File Server
7. Workstation
Hub – A hub is basically a multiport repeater. A hub connects multiple wires coming from different
branches, for example, the connector in star topology which connects different stations. Hubs cannot filter
data, so data packets are sent to all connected devices. In other words, the collision domain of all hosts
connected through Hub remains one. Also, they do not have the intelligence to find out the best path for
data packets which leads to inefficiencies and wastage.

Types Of Hub:
Active Hub: They have a power supply for regenerating, and amplifying the signals. When a port sends
weak signalled data, the hub regenerates the signal and strengthens it, then send it further to all other ports.
Active hubs are expensive in costs as compared to passive hubs.

Passive Hub: Passive hubs are simply used to connect signals from different network cables as they do not
have any computerised element. They simply connect the wires of different devices in the star topology.
Passive hubs do not do any processing or signal regeneration and that’s why do not require electricity the
most they can do is they can copy or repeat the signal. It can’t clean the message, and it can’t amplify or
strengthen the signal.

Intelligent Hub: Intelligent hubs as the name suggests are smarter than active and passive hubs. The
intelligent hub comprises a special monitoring unit named a Management Information Base (MIB). This is
software that helps in analysing and troubleshooting network problems. Intelligent hubs work similarly to
active hubs but with some management features. Like it can monitor the traffic of the network and the
configuration of a port.
Repeater – Repeaters are defined as a networking device that is used to amplify and generate the incoming
signal. Repeaters work at the physical layer of the OSI model. The main aim of using a repeater is to
increase the networking distance by increasing the strength and quality of signals.
Using repeaters helps to reduce error, and loss of data and provides with delivery of data at specified
locations only. The major advantage of using a repeater is that it provides with transfer of data with more
security and over a long distance.

Working of Repeaters
Initially the source system transmits the signals. This source systems can be a mobile phone, laptop or
radio.
This transmitted signal from the source system travels in air if it’s wireless network or through the cable if it
is wired network. As the signal goes away from the source it’s strength gets weak.

The signal received to the repeater is not the actual signal sent by source system but a weak signal.
Therefore repeater amplifies this weak signal to get it strengthen
.
The strengthen signal is now being sent from the repeater to its destination. This signal is more stronger and
can travel at longer distance. In short, it extends the network without losing the quality of signal.

Repeaters are therefore used in various wireless technologies such as Wi-Fi and wired technologies such as
ethernet.
Types of Repeaters
1. According to the type of Signals
According to the type of signal being generated by the Repeater they are classified as:

Analog Repeater: Analog repeaters are used to amplify only the analog signals. Analog repeaters receives the analog signal,
amplifies it and then regenerates it as the output. Analog repeaters were mostly used in the older network technologies
where analog signal was used.
Digital Repeater: Digital repeaters are the type of repeaters that does not amplify digital signal but regenerates it directly.
Digital repeaters are mostly used in the modern technologies where digital signal is being used. Digital repeaters are also
capable to reconstruct a distorted signal.

2. According to the type of Connected Network


Based on the type of network the repeaters can connect they are categorized as below:

Wired Repeaters: Wired repeaters are used in wired Local Area Networks(LANs). Wired repeater receives the signal and
repeats it. This helps to extend the network travel data without loosing it’s strength and data.
Wireless Repeaters: Wireless repeaters are used in wireless Local Area Networks(LANs) and Cellular networks. A router
connected in the network sends wireless signal to the repeater. Once received, repeater broadcast the signal to increase the
coverage of network.
Advantages of Repeater
1.Better Performance of Network: Repeaters provide with better performance of network because they do not always
depend on processing overheads at the time.
2.Cost Effective: Repeaters are more cost effective as compared to other network devices therefore they are cost effective.
3.Extends the network: Repeaters provides with an advantage to extend the available network for transmission of data.
4.No Physical barriers: Using physical devices can led to some barrier while transmission of signals. With the help of
wireless repeaters such issues are resolved.
5.Enhanced Signals: When computer devices and routers are connected in a network over long distance it weakens the
strength of signals. While using repeaters it improves the strength of signals even over long distances.
Disadvantages of Repeater
1.Network Traffic: Repeaters do not have features to segment the network traffic. Therefore repeaters do lack with the
property to congestion.
2.Network Segmentation: As repeaters do not have feature to segment the network traffic repeaters cannot create a separate
traffic from one cable to another.
3.Limited number of repeaters: Use of limited number of repeaters is supported by the network. If more number of
repeaters are used that the specified one, it can even create collision of packets and increase the noise.
4.Collision Domain: The information is passed from various domains repeater is not able to separate the devices.
Bridge – A bridge operates at the data link layer. A bridge is a repeater, with add on the functionality of filtering
content by reading the MAC addresses of source and destination. It is also used for interconnecting two LANs
working on the same protocol. It has a single input and single output port, thus making it a 2 port device.
Types of Bridges
Transparent Bridges:- These are the bridge in which the stations are completely unaware of the bridge’s
existence i.e. whether or not a bridge is added or deleted from the network, reconfiguration of the stations is
unnecessary. These bridges make use of two processes i.e. bridge forwarding and bridge learning.

It is also known as the “Learning Bridges“. Transparent bridge has not visibility to other installed stations or
terminals over the computer network. It does not need to reconfigure the station because it is either added or
deleted from the entire network. Main aim of the transparent bridge is getting to block or forwarding the data
packets depend on the MAC address. It is getting more popularity while using in the networking.

Main Functions of a Transparent Bridge:


Learning Bridges:The bridge "learns" where devices are located by looking at the source address of incoming
data packets. It creates a table (called a MAC address table) that maps MAC addresses to the network segment
they're on.
Forwarding and Filtering:When a data packet arrives, the bridge looks at the destination MAC address.If the destination address
is on a different network segment, the bridge forwards the packet to that segment.If the destination address is on the same
segment as the source, the bridge filters (blocks) the packet, preventing unnecessary traffic on that segment.

Plug and Play:You don't need to reconfigure the network when adding or removing a device. The bridge automatically updates it
MAC address table

2.Static Bridge in a Computer Network : static bridge is a type of network bridge where the routing table, which determines
how data is transmitted between different segments, is manually configured by a network administrator. This means that the
bridge does not learn and update the routing table automatically.
*Manual Configuration:In a static bridge, the routing table is created and maintained manually. The network administrator inputs
the addresses and the corresponding ports.
*Routing Table:The routing table contains information about which port to use to reach a specific device or network segment
*Transmitting Data:When data arrives at the bridge, it looks up the destination address in the manually created routing table and
forwards the data to the appropriate port.
Advantages:
1. Bridges can be used as a network extension like they can connect two network topologies together.
2.It has a separate collision domain, which results in increased bandwidth.
3.It can create a buffer when different MAC protocols are there for different segments.
4.Highly reliable and maintainable. The network can be divided into multiple LAN segments.
5.Simple installation, no requirement of any extra hardware or software except the bridge itself.
6.Protocol transparency is higher as compared to other protocols.

Disadvantages:
1.Expensive as compared to hubs and repeaters.
2.Slow in speed.
3.Poor performance as additional processing is required to view the MAC address of the device on the network.
3.As the traffic received is in bulk or is broadcasted traffic, individual filtering of data is not possible.
4.During the broadcasting of data, the network has high broadcast traffic and broadcast storms can be formed.
Router
o A router is a hardware device which is used to connect a LAN with an internet connection. It is used
to receive, analyze and forward the incoming packets to another network.
o The router is a physical or virtual internetworking device that is designed to receive, analyze, and
forward data packets between computer networks. A router examines a destination IP address of a
given data packet, and it uses the headers and forwarding tables to decide the best way to transfer the
packets.
o A router works in a Layer 3 (Network layer) of the OSI Reference model.
o A router forwards the packet based on the information available in the routing table.
o It determines the best path from the available paths for the transmission of the packet.
Types of Router:

Broadband Routers: These are one of the important kinds of routers. It is used to do different types of things. it is used to connect
computers or it is also used to connect to the internet.
Wireless routers: These routers are used to create a wireless signal in your office or home.
Wired Routers: Wired Router is used to connects multiple wired devices using a Ethernet cable, It takes the transmission data
from the modem and distribute it to a further network, it is widely used in schools and small offices.

Functions of Router :
The router performs below major functions:

Forwarding: The router receives the packets from its input ports, checks its header, performs some basic functions like
checking checksum, and then looks up to the routing table to find the appropriate output port to dump the packets onto, and
forwards the packets onto that output port.
Routing: Routing is the process by which the router ascertains what is the best path for the packet to reach the destination, It
maintains a routing table that is made using different algorithms by the router only.
Security: Routers can be configured with firewalls and other security features to protect the network from unauthorized access,
malware, and other threats.
Advantages Of Router:
Easier Connection: Sharing a single network connection among numerous machines is the main advantage of
router. This enables numerous people to connect to the internet, boosting total productivity. In addition, routers
have connections between various media and network designs.

Security: Undoubtedly, installing a router is the first step in securing a network connection. Because using a
modem to connect directly to the internet exposes your computer to several security risks. So that the
environment is somewhat secure, routers can be utilized as an intermediary between two networks. While not a
firewall or antivirus replacement.

Filtering of Packets: Switching between packets and filtering packets are two more router services. A collection
of filtering rules are used by routers to filter the network. The packets are either allowed or passed through
Disadvantages of Router
Slower: Routers analyze multiple layers of information, from the physical layer to the network layer, which slows down
connections. The same issue can also be encountered when multiple devices are connected to these network devices,
causing “connection waiting”.

High Cost: They are more expensive than some other tools for systems administration. This includes security,
extension, and the focal point. As a result, routers are typically not the greatest option for issues.

Need for configuration: The router must be properly configured to work properly. In general, the more complex the
intended use, the more configuration is required. This requires professional installation, which can add to the cost of
buying a router.
Gateway

Gateways normally work at the Transport and Session layers of the OSI model.

At the Transport layer and above, there are numerous protocols and standards from different vendors; gateways
are used to deal with them.

Gateways provide translation between networking technologies such as Open System Interconnection (OSI) and
Transmission Control Protocol/Internet Protocol (TCP/IP).

Because of this, gateways connect two or more autonomous networks, each with its own routing algorithms,
protocols, topology, domain name service, and network administration procedures and policies.
Gateways perform all of the functions of routers and more.

In fact, a router with added translation functionality is a gateway. The function that does the translation between
different network technologies is called a protocol converter.
Types of Gateways
These below are the types of Gateway on the basis of direction of flow of data:

Unidirectional Gateways: Data can only pass through unidirectional gateways in one direction. The destination node replicates
changes made in the source node but not the other way around. They are tools for archiving the packets.

Bidirectional Gateway: Data can pass through bidirectional gateways in both directions. They are tools for synchronisation.

Functionality of Gateways
There are various functionalities that are supported by any gateway:
LAN to WAN connections- It can connect a group of personal computers i.e. LAN(Local Area Network) to the Internet
i.e. WAN(Wide Area Network).

Controls incoming and outgoing data– It is located on the boundary of any network, so it controls incoming and outgoing data
packets from/to any network.

Works as a Protocol Converter- It makes sure that the data packet from another network is compatible with this network. So it
converts their protocols into supported protocols and other stuff of the data packets before it enters into the network.
Features of Gateways
Gateways provide a wide variety of features. Some of these are:

A gateway is situated at a network’s edge and manages all data that enters or exits the network.
A gateway is distinct from other network devices in that it can operate at any layer of the OSI model.
Gateways made the transmission more feasible as it queued up all the data and divided it into small packets of data rather
than sending it bulk.
Gateways provide security within the network.

Limitations of Gateways
There are few limitations of gateways as well. Here are some of them:

Gateway causes time delay since the conversion of data according to the network requires time.
Failure of the gateway might lead to the failure of connection with other networks.
The implementation of Gateway is very complex and it is not cost efficient.
Gateway is hard to manage
File Server

The primary goal of a computer network is to share data among several users.
They also make their attached disk drives, printers, modems, and unique communication
links available to the various client stations.
Providing one computer with one or more hard disks facilitates this.
All client stations share these hard disks.
Clients can make their requests to access any of the shared facility to the server.
The file server is a powerful computer, which runs special software.
It provides the files and other shared resources to different users in the network.
It provides facilities like user authentication, security to various user programs, and data.
It can access through a network operating system (NOS).
Typical configurations of a server are Pentium 4 machine with 128MB or higher capacity
RAM, 40 GB or higher capacity hard disk, to serve up to 10 nodes or workstations.
Workstation

Another critical component of a network is the workstation or a client.


A workstation is an individual computer with capabilities to communicate with other machines.
It must equip with the hardware and software necessary to connect to a LAN.
Usually, a Network Interface Card (NIC) or an Ethernet card or an Arc net card use for this
purpose.
Part of the network operating system is also available in the workstation.
A workstation can communicate with other workstations or to the server.
The hardware requirement for a workstation depends on the application and the size of the
network.
In a typical LAN of a university computer center, a Pentium III system with 64MB RAM and 4 to
8GB hard disk capacity, with necessary network interface card can use for a typical workstation.
In general, c the memory and hard disk capacity of a workstation are much less than that of the
server.
Classification of computer network
Generally, networks are distinguished based on their geographical span. A network can
be as small as distance between your mobile phone and its Bluetooth headphone and as
large as the internet itself, covering the whole geographical world.

1.Local Area Network

A computer network spanned inside a building and operated under single


administrative system is generally termed as Local Area Network (LAN).
Usually,LAN covers an organization’ offices, schools, colleges or universities. Number
of systems connected in LAN may vary from as least as two to as much as 16 million.

LAN provides a useful way of sharing the resources between end users.The resources
such as printers, file servers, scanners, and internet are easily sharable among
computers
Fig. Local Area Natwork
LANs are composed of inexpensive networking and routing equipment. It may contains local servers
serving file storage and other locally shared applications. It mostly operates on private IP addresses and
does not involve heavy routing. LAN works under its own local domain and controlled centrally.
LAN uses either Ethernet or Token-ring technology. Ethernet is most widely employed LAN technology
and uses Star topology, while Token-ring is rarely seen.
LAN can be wired,wireless, or in both forms at once.

2. Metropolitan Area Network


The Metropolitan Area Network (MAN) generally expands throughout a city such as cable TV network. It
can be in the form of Ethernet,Token-ring, ATM, or Fiber Distributed Data Interface (FDDI).

Metro Ethernet is a service which is provided by ISPs.

This service enables its users to expand their Local Area Networks. For example, MAN can help an
organization to connect all of its offices in a city.
Fig. Metropolitan Area Network

Backbone of MAN is high-capacity and high-speed fiber optics. MAN works in between Local Area Network and Wide
Area Network. MAN provides uplink for LANs to WANs or internet.
3.Wide Area Network
As the name suggests,the Wide Area Network (WAN) covers a wide area which may span across provinces and
even a whole country. Generally, telecommunication networks are Wide Area Network. These networks provide
connectivity to MANs and LANs. Since they are equipped with very high speed backbone, WANs use very
expensive network equipment.
WAN may use advanced technologies such as Asynchronous Transfer Mode (ATM), Frame Relay, and
Synchronous Optical Network (SONET). WAN may be managed by multiple administration

Fig. Metropolitan Area Natwork

You might also like