Computer Networks
Computer Networks
Basics
This E-Book contains basics of Computer Networks for
the preparation of IBPS CWE (Common Written
Examination) for Specialist Officers.
Topics Covered:
1. Intr
tro
odu
ductctio
ion
n
2. Ty
Type
pess of Comp
Comput uterer Netw
Networ
orks
ks
3. Ne
Netw
twor
orkk Top
Topololog
ogy y
4. Protocols
Engistan.com 5. Ne
Netw
twor
orkk Ha
Hard
rdwa
ware re
6. Ne
Netw
twor
orkk Ca
Cabl
blin
ingg
Engineer’s Community
7. Wi
Wire
rele
less
ss LAN
AN’s ’s..
8. Ne
Netw
twor
orkk Opera
Operatinting g Softw
Softwar
aree
9. The OSI Mo Mod del
10. The TCP/IP
TCP/IP Model
Engistan.com [COMPUTER NETWORKS BASICS ]
Computer Networks: A network consists of two or more computers that are linked in order to:
exchange files, or
cables,
telephone lines,
wireless technologies
• Hard Ware : It includes physical connection (using adapter, cable, router, bridge etc)
• Soft Ware : It includes set of protocols (nothing but a set of rules)
1. Local Area Networks (LANs) : These are the simple networks. A set of computers (2 or more)
connected within a single building or college campus (a few kilometres range).
2. Metropolitan Area Networks (MANs): These are the larger networks than LANs, t hese are
limited to city or group of Nearby O ffices. Simply we can say that a group of LA Ns are called a
MAN (but guys, this is not a standard definition, its just for your understanding purpose).
3. Wide Area Networks (WANs): These type of networks provides long distance transmission of
data and voice. (A city, state, country and of co urse the world). It contains HOST
and collection of machines.
Comparison chart:
Data transfer LANs have a high data transfer WANs have a lower data transfer rate as
rates rate. compared to LANs.
Data
Experiences fewer data Experiences more data transmission errors as
Transmission
transmission errors compared to LAN
Error
Network Topology: A network Topology is the method or process which tells us about
how to connect the Systems.
• The physical topology of a network refers to the configuration of c ables, computers and
other peripherals.
Types of Topologies:
Line Topology: If we connect several computers in a line then it is called as the LINE
TOPOLOGY
Bus Topology: If we connect several computers to a back bone (A wire) then it is called
as the BUS TOPOLOGY.
Ring Topology: In line topology if we connected the last system to the starting system,
then it is called as the Ring topology.
Mesh Topology: If we connect several systems with each other (There is no necessity
that one system should connect with all the remaining systems in the n etwork, see the
diagram) then it is called as the Mesh Topology.
Fully Connected: In a Network if every system is connected with all the remaining
systems then it is called as the Fully Connected topology.
Protocol:
• These rules include guidelines that regulate the met hod of access, types of cabling and
speed of data transfer
• ATM
1. Ethernet:
• Most widely used
• Uses an access method called CSMA/CD (Carrier Sense Multiple Access/Collision
Detection.
• Each computer in the network ‘listens’ to the cable before sending anything through
the network. If the network is clear, the computer will transmit.
• If another computer is already transmitting on the cable, the computer will wait and
try again when the line is clear
• Sometimes, two computers attempt to transmit at the same instant. When this
happens, a collision occurs. Each computer then backs off and waits a random
amount of time before attempting to retransmit. It is normal to have collisions using
this method, but the delays caused by collisions and transmissions is small, and does
not affect speed of transmission on the network
5
CSMA/CD =Carrier Sense Multiple Access /Collision
Detection
2. Fast Ethernet: To allow for faster transmission, the Ethernet protocol has developed a
new standard that supports 100 Mbps
• Fast Ethernet requires the use of more expensive e quipment and network cards.
3. Gigabit Ethernet: The Ethernet protocol has also developed a new standard that
allows transmission of 1 Gbps (gigabit per second).
One gigabit per second =
one thousand megabits per
second.
• TCP/IP is the protocol that is used for the transmission of information over the
Internet.
• IP (Internet Protocol) - the main delivery system for information over the
Internet.
• TCP (Transport Control Protocol) - used to break apart and rebuild information
that travels over the Internet.
Network Hardware: 6
2. Switches: While hubs provide an easy way to scale up and shorten the distance that
the packets must travel to get from one node to another, they do not break up the
actual network into discrete segments. That is where switches come in.
• A vital difference between a hub and a switch is that all the nodes connected
to a hub share the bandwidth among themselves, while a device connected
to a switch port has the full bandwidth all to itself.
• Think of a switch as a ‘clever’ hub.
4. Bridges: A bridge is a device that allows you to segment a large network into two
smaller, more efficient networks.
Network Cabling: Cable is the medium through which information usually moves from
one network device to another.
1. Unshielded Twisted Pair (UTP) Cable : UTP cable is also the most common
cable used in computer networking.
UTP is susceptible to radio and electrical frequency interference (it should not be too
close to electric motors, fluorescent lights, etc.)
2. Shielded Twisted Pair (STP) Cable: STP is similar to UTP but with each pair covered by an
additional copper braid jacket or foil wrapping. This shielding helps protect the signals
on the cables from external interference.
4. Fiber Optic Cable: Fiber optic cabling consists of a center glass core surrounded by
Several layers of protective materials
It transmits light rather than electronic signals
It is the standard for connecting networks between buildings, due to its immunity to
the effects of moisture and light
Fiber optic cable has the ability to transmit signals over much longer distances than
coaxial or twisted pair
It can also carry information at vastly greater speeds
Fiber optic cable is more difficult to install than other cabling
Wireless LANS: Wireless networks use high frequency radio signals to communicate
between the workstations and the fileserver or hubs.
Peer-to-peer
Client/server
1. Peer to peer network OS: In peer to peer network OS, there is no file server or
central management source; all computers are considered equal.
Peer to peer networks are design primarily for small to medium LANS.
AppleShare and Windows for Workgroups are examples of programs that can
function as peer to peer.
1. Physical Layer
2. Data link Layer
3. Network Layer
4. Transport Layer
5. Session Layer
6. Presentation Layer
7. Application Layer
Each layer helps it's above layer to establish an error free communication, in other words, each
layer depends on its below layer to establish an error free communication.
P D N T S P A
Or
I. Physical Layer : This is the First or Lowest layer of the OSI model. It takes care about
the Physical Connections.
II. Data Link Layer : This layer Encodes the data packets and provides error free node to
node transmission. It is divided into two sub layers. Those are
Media Access Control Layer (MAC Sublayer in short)
It helps the computer to get the access of data transmission
Logical Link Control Layer (LLC Sublayer in short)
It controls the order, flow and errors of the frames (Frame synchronization)
IV. Transport Layer : This layer helps in providing Transparent data transmission. Its also
checks whether the data completely transmitted or not.
V. Session Layer : This layer is responsible for the Transmission Sessions. I mean
Starting, Maintaining and Terminating the Communication.
VI. Presentation Layer : This layer provides the data Independence ( simply you can
remember that this layer is responsible for the data Presentation :) I mean, how you
are presenting data (without any leakage)
VII. Application Layer : This is the topmost layer, this layer directly interacts with the end
user. This layer is responsible for checking whether the claimed user is genuine or
not.
11
12