CN CH 1 p1 Introduction To Computer Networks
CN CH 1 p1 Introduction To Computer Networks
1.8.5 Berkley Socket • A network is the interconnection of a set of computin devices ca able of
1.8.6 The Relationship of Services lo Protocols , communication.
❖ Summary • A network is a set of devices often referred to as nodes like computer, printer, or any
❖ Practice Questions other device capable of fending and receiving dat~onnected by media links as shown
in Fig. 1.1.
Objectives... C~omputer1
~~
After reading this chapter you will be able:
• To understand Con•.:epls of Computer Network ,0,
Ill INTRODUCTil:>N ~-
_. Computer 2
th
• Last three centuries was known for a particular technology. The 18 Century was
th
known for Mechankal Industrial Revolution. The 19 Century was known for the '·-<:-.,
Steam Engine. Fig. 1.1 : Network Nodes and Links
• During 20 th century the most important technology has been the
information gathering, its processing and distribution. To gather, process and • Computer network is a set or collection of computing devices that are linked to each
other in order to communicate and share their resources with each other.
distribute the information we requires computers.
1.2 1.3
rntrodudion to ~ PMtWorb
Computer N.tworb • I Computer Networb • I lntloduction to Computar Networks
uting devices.
. . f interconnecte d comP 2. High Reliability:
• In simple words, a computer network is a group O h' h )led networking.
The interconnected computers can share resource_s, w ic ca k A wired network is • Network provides high reliability by having alternative sources of data.
• Computer net:Hork is divided in to wired and wireless networ ~axial etg A wireless • For example, all files could be replicated on more than one machines, so if one of them
simply a collection of node1connected by cables like Eth em~t. c b tween nodes. is unavailable due to hardware failure or any other reason, the other copies can be
network, which uses hJgh-frequency ra di o ~s to communicate e used.
3. Minimize Cost
IfJi Definition of Computer Network
. ·zanon's computaUonal
. • Small computers have a much better price to performance ratio as compared to large
• The old model of a single computer seJVJng all of the orgaru b f separate but ones. So it is always minimizing the co5' to set up a network of large small number of
need has heen replaced by one in which a large num er O N k computers than the large ones.
interconnect;d compute;s do the job. These systems are called Computer etwor · • As well as by sharing the resources like printer, we can save the cost.While designing
Definition: cost of a network is an important factor.
• A computer network ca n be d~fined as "an interconnected collection of autonomous
4. High Performance :
computers and computing devices·.
• Computer networl_< provides the network user with maximum performance at
OR minimum cost. The network performance can be measured by its transit time and
• Aromputer network is an interconnection of com uters and computing equipments response time. ·
like printers etc. using either wires or radio waves {wireless) made to s are hardwa~ (i) Transit time is the amount of time required for a message to travel from one
and softwa re resources·. \ ~ Ccmf~ r,Jt.;c'Yk.. 1 5 CJJ"I jl'l+t..,..c.."nt2.-ti~ device to another device in network.
or
• fig 1.2 shows a typical computer network. ft.A Cf'r tr:r,-<.., <'..01'Yl~'r) ~ ~ (ii) Response time is the time elapsed between an inquiry and a response.
W obk to -{~CN1AjL 1'n ~"-,.. • Network performance depends on a number of factors including, network
transmission medium, network hardware, network software and traffic load.
~ Sot/t,J,.f ~ OY
Computer network have provided means to increase system performance as the work
• • ,-....----i~J Server hutde,.,"'r-
load increases.
Network
5. Scalability :
Users (clle~ ~ • We can easily extend computer network just by adding more computers, printers or
any other devices without disturbing others and affecting overall performance.
5}:;J 6. Powerful Communication Medium :
Fig. 1.2: Typical Computer Network • A computer network provides a powerful communication medium.
-..
Database file&
Spreadsheet
• Some of the applicatfons of a compute di ed below Word
. .
applications, Home apphcauons, Mobile user etc· as scuss . processing
(1ocumen!s
Ifill Business. Applications
. th
.
uirements from the business users.
(b} Sharing of Software
Fig. 1.3: Sharing resources
• Business applicauons are built based 0~ e req . ki d f Business transactions
Also, these business applications are built to use certain n ° • For sharing resources computer network uses client-server network as shown 1n
Fig. 1.4.
or data items. . .
• Network allows users to share both hardware and software resources, m~reasmg
efficiency and facilltating workplace collaboration. Computer networks are bemg used
In almost all business processes.
• The most important business application of computer networks is file sharing
hardware, files, data and other resources. In a networked environment, each
computer on a network may access and use hardware resources on the network, such Clients
as printing a document on a shared network printer.
• The capablllty of providing access to data and information on shared storage devices is
an Important feature of many networks. Users connected to a network may run ~~
! ,
,,,11
appllcation programs on remote computers. ~- 1
,-. >
responds IO this requi sends the signal accordingly to =~enLT
~ J Laser printer
Clients
(a) Shattng of Prlnttr CHa-rdware) Fig. 1.5: Communication Between Client and Server
1.7
1.11
Computer Networks • I
Comput.r Networks • I Introduction to Computer Networks
data files. Fig. 1.6 shows • Using network it is easy for two or more employees, who are separated by
File Sharing:
share
etwork users to geographical locations to work on a report, document or R and D simultaneously
• Networking of computers h elps t.'le n i.e. on -line.
·-~~"·": I
FIie server
file sharing using file server. N·etwork user 2
• Fig. 1.7 shows network allow Employees to communicate using e-mail, newsgroups,
and video conferencing ~tc.
• Videoconferencing also very helpful in business which enables employees from
different locations to do virtual meetings, seeing and hea ring each other and even
~~ ~
Network User 5
• The last application is starting to become more important is doing business with
Networ user 5 consumers over the Internet i.e. E-commerce.
Network User 4
• E-commer.ce is trading in products or services using computer networks, such as the
Fig. 1.6 : File Sharing Using File Server
Internet.
2. Powerful Communication Medium: • E-commerce businesses may employ on Online shopping, Online banks, Electronic
ication medium among widely
·des a powerful commuru Data Interchange (EDI), online Business-to-business buying and selling and so on.
• A computer network provi .. business can use e-mail for daily
separated employees in Business. Empl?yees m a
Qfij Home Applications
8j "~'
communication.
• Starting in 1990s, the computer networks began to start delivering services to the
Network User 1 private individuals at home.
• Some of the most popular uses of the network for home users are Access to remote
information are Person to Person Communication, Interactive entertainment and
Electronic Commerce etc., as discussed below.
1. Access to Remote Information :
/ :.t
~-
~ Emai• / • Remote access refer to connection to a data-processing system from a remote location.
Network User 4 • Remote access is the ability to get access to a computer or a network from a remote
} Network distance. For examples, Home users get access to the Internet through remote access to
L switch an Internet Service Provider (ISP).
Network User 2 • Access to remote information involves interaction· between a person and a remote
i0>
~
' Printer
database.
l-,'"'
~-~"9- • Access to remote information occurs in many forms like:
Network User 3 (i) Home shopping, paying telephone, electricity bills, e-banking, on line shar e
market etc.
Fig. 1.7: Communication Using Computer Network
1.8
1.9
Introduction to Computer Networks
Computer Networks · l Computer Networks • l Introduction to Computer Networks
-line and is personalized, digital library consisting of books, • Another application may be game playing. If games are played with goggles and three
(ii) Newspaper is, On
magazines, scientific journals etc. . dimensional real-time, photographic quality moving images, we have a kind of
ilt _ _ _ . m" ,
(iii) G2C (Government-to-Consumer)
electronically.
Government distributing tax forms
-
Computer~ -1
Disadvantages :
. .
. .
ork is a senous
business in many occasions
. ,
li•i• Point-to-Point Network
1. 't'Tnensive to Build: Building a netw , d other hardware are very pricey • Communication between two directly interconnected devices is referred to a~ point-to-
._,1:1 • ti s cables an
especially for large scale orgaruza on · point communication.
to buy and replace. bl with large networks. There • - A point-to-point connection provides a dedicated link between two devices as shown
· thr ats are always pro em5 . in Fig. 1.9.
2. Security Threats: seron~ e aluable data of large companies for their own
are hackers who are trying to steal v to facilitate the required security • Point-to-point networks consist of many connections between individual pairs or
benefit. so it is necessary to take utmoSt care . machines. On such type of network, when any packet is send from source to
measures. 1t destination, it may have to first visit one or more intermediate machines.
there are users who consume a o ore • In such type of networks often multiple routes of different lengths are pos~ible.
3. Bandwidth Issues: In a network
m.
s some other people may expenence • Smaller networks tends to use broadcasting, whereas larger networks usually are
bandwidth than others. Because Of thi
difficulties. point to point.
4. Ladt of Robustness: If the main file server of a computer network breaks down, • A point to point network with one sender and one receiver is sometimes called
the entire system becomes down and useless. unicasting.
s. Needs an Efficient Handler: The technical skills and knowledge required to operate • Examples of point-to-point networks are LAN (Local Area Networks), MAN
(Metropolitan Area Network), WAN (Wide Area Network), Internet, etc.
and administer a computer network. Link
6. Breakdowns and Possible Loss of Resources: One major disadvantage of
networking is the breakdown of the whole network due to an issue of the server.
m NETWORK HARDWARE
Workstation
• Network hardware/structure is design required for developing any computer network. Fig. 1.9 : Point-to-point connection
• For classification of computer network, there is no generally accepted taxonomy into Advantages:
which all computer networks fit, but two dimensions stand out as imp,ortant : 1. Simple: A point-to-point network is one of the simplest networks because it only
1. Transmission technology, and involves two nodes.
2. Scale. 2. Cheapest and effective: This is one of the cheapest and most effective network
architectures because it doesn't involve the cost of redundancies.
•if• Transmission Technology 3. Less Complex:.It does not add the complexity of needing several nodes functioning
to make a connection.
• Transmission technology refers how two devices are connected and how they are
Disadvantages:
communicating.
1. More expensive : As it requires lots of transmission lines and switching elements
• In transmission technology a Link is the physical communication pathway that
to connect remote hosts.
transfers data from one device to another.
2. Impractical from : The point-point network is impractical from a networking
• For communication to occur, two devices must be connected in same way to the same standpoint because rarely is only one connection between two nodes adequate.
link at the same time.
• The transmission technology can be categorized broadly into two type's i.e. : •iffj Broadcast Network
1. Point-to-point networks, and • The networks having multipoint configuration are called as Broadcast Network.
2. Broadcast networks (multipoint). • A broadcast network have a single communication channel that is shared by all the
machines on the network.
1.14 1 1 1
Introduction to Computer Networ~ Introduction to Computer Networks
Computer Networks - [
Computer Networks • I
•
.
Packets sent by any machine are received Y a
b ll the others· The address field within
. .
iftJ Scale
the packet specifies the intended recipient. • An alternativ e criteria for classifying networks is their scale as shown in Fig.
1.11.
- . a packet, a mach"me checks the address field. If packet .1s .mtended for
• After rece1vmg
• • machme, • th at machine Processes the packet, if packet 1s mtended for ,·' ,, ·,,, WAN ·: ;
the rece1vmg '!"1001(111, 100.0km,, .
some other machine, it is just discarded. (Country, Continent)
Link Fig. 1.11 ·shows classification of multiple processo r systems by their physical size. At
•
the top are the personal area networks that are meant for one person.
• · Personal Area Network (PAN) is the intercon nection of devices within the range
of an
-~~aii
s::_;a,_
,_
I r··1 individu al person, typically within a range of 1 meter. For example, a wireless
Workstation 3 • Beyond th-e personal area networks come longer range networks . They can be divided
Fig. 1.10 : Broadcast Network into local, metropol itan area network and wide area networks .
ic
• It is cheaper in cost but can not large number of senders (crosstalk). • Local Area Network (LAN) is a privately -owned networks covering a small geograph
(For example :
Comparison of Point-to-Point and Broadcast Networks · area (10 m to 1 km), like a home, office, building or group of buildings
Sr.No. Building).
Point-to-Point Network Broadcast Network. '
Metropolitan Area Network (MAN) covers a larger geograph ical area than is
a LAN
1. Point-to-point network has more Broadcast network has single •
than one communication channel. communication channel. (1 km to 10 km), ranging from several blocks of buildings to entire cities.
2. Point-to-point network is a Wide Area Network s (WAN) covers a large geograph ical area (100 km to 1000
km),
Broadcast network is a connectio n of •
connection of routers host and repeaters often·a country.
3. Limited number of concurren t Unlimited number of concurre nt • Finally, the connecti on of two or more networks is called Intemetw orks or Internet.
connection connection
• The Internet is a global network connecti ng millions of compute rs. More than 190
4. No extra ·cost to setup peer to peer
network
It requires extra cast to set up network countries are linked into exchange s of data, news, informat ion, commun ication etc.
5. For example : WAN, Internet etc. • Following table summari zes classification of compute r network by scale:
For example : LAN.
1.17
1.16
Introduction to Comput., Net,,y
!!!pu~ter
iC~om ~~•:_!I_ _ _ _ _ _ _ _ _ _ _ _ _-:~:::-- - - ~ -- : . ~
~ N~etworb Introduction to Comput• N.-lls
Example Computer Networks · I
Interprocessor Processors
distance
1m
located in same
Square meter
Personal area network lifJj Bus Topology
10m Room • In bus topology, all nodes are connected to a central cable which is called a bus. This
100 m
1 km
Building
Campus
}'"'' ... ""'°" •
bus is also called as a Trunk or sometimes it was also referred to as Backbone cable.
Trunk cable was then connected to the branch cables which were further connected to
City Metropolitan area network the PCs. Every network device communicates with the other device through this Bus.
10km
100km Country • Nodes are connected to the bus cable by drop lines and taps. A drop line is a
} Wide area network connection running between the device and the main cable.
1,000 km Continent
10,000 km Planet The internet
• A tap is a connector that either splices into the main cable or punctures the sheathing
of a cable to create a contact with the metallic core.
m NETWORK TOPOLOGIES
• '.fhe word "topology" comes from topos, which is Greek word for "place." The terrn
• A node (computer) that wants to send data, it puts the data on the bus which carries it
to the destination node.
topology refers to the way in which a network is laid out physically. • When one computer sends a signal up the wire, all the computers on the network
• Two or more devices connect to link, two or more links form a topology. receive the information, but only one accepts the information. The rest regrets the
• Ne~ork topology defines the geographic arrangement of computer networking message. One computer can send a message at a time. A computer must wait until the
devices. bus is free before it can transmit.
• Topology describes the actual layout of the computer network hardware. • Fig. 1.13 shows a bus topology or network.
~
• Topology defines the physical or logical arrangement of links in a network. Laser Printer .
1. Physical Top~logy: A phy~ical topology describes the placement of network nodes
and ~e physical connections between them. This includes the arrangement and
location of network nodes and how they are connected.
2· Logical Topology: lt refers to the paths that messages take to get from one place on
.T~ onnector I
Bus/Trunk/Backbone
lifJj Ring
.
Topology
. the network are c
onnected in a circular fashion Disadvantages:
1. If one node goes down, it takes down the whole network.
• In ring topology, the computers m . .
which form of a ring. d the· next computer, with the last one 2. Slow in speed.
• In ring topology each computer is· connecte . to. onnected to other two devi·ces With 3. Reconfiguration is needed to add one node, whole network must be down first.
. h deVICe JS C .
connected to the first ,or we can say eac . device. Each computer m the ring 4. Traffic is unidirectional.
dedicated link in one direction, from deVIce to 5. Network is highly dependent on the wire which connects different components.
incorporates a repeater. d f r another computer, its repeater
• When a computer receives a sign
· al intende 0
th m The messa
ge flow around the ring in one llfii Star Topology
regenerates the bits and passes e · . topology Jess popular. • In star topology each device has a dedicated point-to-point link on it to a central
direction. Today higher speed LANs has made th15 . controller, usually called hub or switch. The devices are not directly connected to one
• Fig. 1.14 shows a ring topology. another.
.• Each computer on a star network first communicates with a central hub/switch that
forwards the message either to all the computers or only to the destination
computers.
• Communication is controlled by central controller (Hub/Switch) only.
• Star topology is generally used in LANs. ·
• Fig. (15 shows a star topology or network.
rsi:af i
~ L;;i - - - - .
"
·..
Switch/Hub
1.20 1.21
Computer Nttworb • I Computer Networks -1 Introduction to Computer Networks
tire network goes down.
. . then en . Advantages:
Disadvantages. . hl goes down ore expensive
1 If central node (hub
or switc av so rn ·
ring topo10o,' 1. Easy to install and wire.
. . d than bus or .ce
2. More cabling is require aci·ty of central deVl · 2. Fast as compare to other topologies.
d don cap 3. Multiple devices can transfer data without collision.
3. Performance is depen e
4. It eliminates traffic problem.
!•!!!l!,f!!!l.!!!!!'l!..T.::.::re::e:...T:..:o:!p_o_lo....;g~y-:-::l
.
devices mal<e a tree strUcture. It is also caued a 5. No disruptions to the network then connecting or removing devices.
• As its name implies In this topo o'5'! 6. Easy to detect faults and to remove parts.
hierarchicaltopology. . . f star and bus topology. In tree topolo"', Disadvantages:
th haractensncs o a,,
• Tree topology integrates e c t dusing Bus. · · 1. It relies heavily on the main bus cable, ifit breaks whole network is crippled.
ks are connec e
the numbers of star networ f tree and other star networks. as fl.. 2. More-expensive than other topologies.
· stern o a ' -.,e
• This main cable seems like a mam 3. The cabling cost is more. .
branches. . f topology. 4. Scalability of the network depends on the type of cable used.
0
• Ethernet protocol is commonly-us ed in this type 5. As more and more nodes and segments are added, the maintenance becomes
• Fig. 1.16 shows tree topology. difficult.
llfJj Mesh Topology @4ii4J
• In a mesh network topology, each of the network node, computer and other devices,
are interconnected with one another with dedicated point to point link.
• Dedicated means that link carries traffic only between the two devices it connects. So
for Nnumber of nodes, there will be total n(n-1)/2 links require.
• Mesh topology is usually implemented in a limited fashion, as a backbone connecting
the main computers of a hybrid network that can include several other topologies.
• Fig. 1.17 shows a mesh topology. It is used in WAN.
--.I.'7
:_1
.,.
t' J
<>
<:,
Advantages: Advantages :
1. Each connection can carry its own data load due to dedicated link. 1. Fault detection and troubleshooting is easy in this type of topology. .
2. Eliminates u·affic problem. 2. It is easy to increase the size of network by adding new components, without
0ther disturbing existing architecture.
3. Mesh topology is robust. If one link becomes unusable, it does not affect
3. Flexible because this topology can be designed according to the requirements of
systems.
the organization and by optimizing the available resources.
4. Privacy or security .because of dedicated line. Disadvantages :
5. Point-to-point link make fault identification easy and simple. 1. Hybrid topology is complex in design.
Disadvantages: 2. The hubs used to connect two distinct networks are very expensive.
1. More cables are required than other topologies. 3. As hybrid architectures are usually larger in scale, and so it is time consuming and
difficult to install. It also require a lot of cables, cooling systems, sophisticate
2. Overall cosc of this network is very high.
necwork devices, etc.
3. Installation and reconfiguration is very difficult. 4. Cost is high.
4. Set-up and maintenance of this topology is very difficult. comparison between Bus, Ring and Star Topologies:
5. Expensive due to hardware requirements such as cables. Terms ~
Bus Topology Ring Topology Star Topology
There is a single All computers and There is a central
Dfjj Hybrid Topology Structure
central cable other devices are host (hub/switch)
• Hybrid, as the name suggests, is mixture of two different things. (backbone) and all connected in a circle and all node
• A network structure whose design contains more than one topology is said to be computers and other or ring. connect to it.
Hybrid Topology. devise connect to it.
• In short a hybrid topology is combination of two or more network topologies. Host existence Depends on network Depends on network Yes.
• Hybrid topology inherits merits and demerits of all the incorporating topologies. needs. needs.
It has no connection Yes. No.
• Two common examples for hybrid network are star ring network and star bus Connection
network. between nodes between the nodes.
• Fig. 1.18 shows an example of star-bus hybrid topology. Host failure Network can still run. Network will fail. Network will fail.
m Ease of trouble-
shooting
Difficult, need to
search for-the
problemati c node one
Depends on
backbone.
backbone,
If there
trouble-
is
Depends on the
host.
repair
It is easier to
the
l Bus
!
by one. shooting
If there is
is
not
difficult.
1.24 1.25
c~~~~~~!.__ _ _ _ _ _ _ _ _ _ _ _ _~ln:::.tr::.:od:.::u.;..ct_lo_n_to_C_o_m.,_pu_t_er_N.:..:•::.::,:tw
_ o,1cs
_ Introduction to Computer Networks
£omputer Networks - I computer Networks • I
m NETWORK TYPES
Computer networks fall into three classes regarding the size, diS ance and ~
t
• LANs are widely used to connect personal computers and workstations to share
resources like printers and exchange information.
•
• LANs are distinguished from other kind of networks by three characteristics i.e., their
structure namely LAN (Local Area Network), MAN (Metropolitan Area Network), WAN
size, their transmission technology and their topology.
(Wide Area Network), as shown in Fig. 1.19.
• Generally, LAN will use only one type of transmission medium wired or wireless. The
Types of Network most common LAN topologies are bus, ring or star. .
• Early LAN had data rates in the 4 to 16 mbps ra~ge. _Today, speeds are normally 100 to
lOOO mbps. Wireless LANs are the newest evolution m LAN technology.
• Now-a-days LANs are being installed using wireless technologies. Such a system makes
LAN MAN use of access point or APs to transmit and receive data. One of the computers in a
network can become a server serving all the remaining computers called clients.
Fig. 1.19 : Types of Computer Network • For example, a library will have a wired or wireless LAN Network for users to
• Fig. 1.20 shows geographical arrangement of LAN, WAN and MAN. interconnect local networking devices. For examples, printers and servers to connect
to the Internet.
• Fig. 1.21 (a) shows a typical LAN while Fig. 1.21 (b) shows a building LAN.
WAN
(Overall World
/Globe) /
11j
•. .O~
-'i~-
,-~
'• -
MAN "
(Cities, states, etc.)
-----
LAN
IDffli m (Building, (a) typical LAN Cb) Building LAN
cyber cafe etc.) Fig. 1.21
i Characteristics of LAN:
1. Every computer has the potential to communicate with any other computers of the
network.
Fig. 1.20: Geographical Arrangement of LAN, WAN and MAN
2. High degree of interconnection between computers.
•if• Local Area Network (LAN) . 3. Easy physical connection of computers in a network.
4. Inexpensive medium of data transmission.
• Local area networks are privately-owned networks covering a small geographical
5. High data transmission rate.
ar~a. (less than 1 km) like a home, office, or groups of buildings.
Advantages of LAN:
• Depending on the needs of the organization and the type of technology used, a LAN
can be as simple as two PCs and a printer or it can extend throughout a organization. 1. The reiiability of LAN is high because the failure of one computer in the network
does not effect the functioning for other computers.
1.26
1.27
Introduction to Computer Networks
Comput er Networlls • 1
computer Netw0rks • I
company such as
2. Addition of new computer to network is easy and simple. ~ MAN can be owned by one private organization or public service
. . . .
3. High rate of data transmission is possible. local telephone or cable television company.
• Iler networks within a large geographic area, mformauon. 1s
shared by other
4. Peripheral devices like magnetic disk, printer etc. can be •
By interconnecungd sma
. - t throughout the network. Local libraries and government agenci
es
computers. ct to citizens and private industries. ATM (Asynchronou s
easily disserrunaNe . .
often use a MA to conne
5. Less expensive to install. Fiber Distributed Data Interface) etc. are the technologies 1s
Transfer Modes) FDDI (
Limitations (Disadvantages) of LAN:
used in MAN.
1. Used for small geographical areas Oess than 1 km).
Advantages: .
2. Limited computers are connected in LAN. 1. MAN spans large geographical area than LAN.
re, increases the efficiency of
3. Special security measures are needed to stop users from using programs and data AN falls in between the LAN and WAN therefo
· 2. M
that they should not have access to network. handling data.
k.
4. LAN need to be maintained by skilled technicians. AN saves the cost and time attached to establish a wide area networ
3. M
.
5. In LAN if the file server develops a serious fault, all the users are affected 4. MAN offers centralized management of data.
s. MAN enables us to connect many fast LANs together.
•ifJ Metropolitan Area Networks (MAN) Disadvantages:
a WAN, such
• If a n~twork spanning a physical area larger than a LAN but smaller than 1. Cost is high.
. .
as a city then this network is called Metropolitan Area Network (MAN)
over a city are 2. Speed is slow.
• MAN is an extended face of LAN, in which computing devices spread
interconnected with communication mediums to form a network .
ly covers towns and
1111 Wide Area Network (WAN) . from remote areas.
• ~ographi~al area for MAN lies between 16 km to SO km general • WAN is a computer network used to connect different equipments
cities. In this type of networks data is transmitted over one or two cables. voice image and
• . A WAN provides long distance transmission of data,
~J
1•J l~
1 r 11;:i
n~
!J
- video information over large geographical areas that
continent or even the whole world.
may compri se a country, a
1.31
Computer Networks - I Introduction to Computer Networks
z. Wireless LANs:
9. Diagram • The next step in wireless networkin g are the wireless LANs. WLANs are systems in
which every computer has a radio modem and antenna with which it can
MAN
communic ate with other system.
WAN
LAN • Wireless LANs are becoming increasing ly common in small offices and homes.
• IEEE 802.11 is a standard for wireless LANs.
IJJ■ Wireless Network s _
• A Wireless Local Area Network (WLAN) links two or more devices over a short
• Wireless communic ation is one of the fastest growing technologies. The demand for distance using a wireless distributio n method, usually providing a connection through
connecting devices without the use of cables is increasing everywher e. an access point for Internet access.
• The word wireless is dictionary defin~d as "having no wires"•
• In networking terminology, wireless is the term used to describe any
computer network where there is no physical wired connection between sender and
receiver, but rather the network is connected by radio waves and/or microwave s t~
maintain communications.
• The basis of wireless systems is radio waves, an implementation that takes place at the
physical level of network structure.
main categories as listed below:
• Wireless networks can be divided into three
~
m
1. System interconne ction,
2 . Wireless LANs, and Printer
3. Wireless WANs.
1. System Interconnection:
• System interconnection means connecting the componen~s af computer using short
Computer 1
range radio. Desktop PC / Laptop
• All components can also be connected by a short range wireless network called
Bluerooth. Bluetooth also allows digital cameras, headsets, scanners and other devices ·~--.::i.
to connect to a computer. Computer2
• The system interconnection networks use the master-slave paradigm as shown in Desktop PC / Laptop
Fig.1.25. Fig. 1.26: Wireless LAN
3. Wireless WANs:
Printer ,Mobile
• The third kind of wireless network is used in wide area system.
' • The radio network used for cellular telephones is an example of a low-bandw idth
wireless system.
~
PDA
• Cellular wireless networks are like wireless LANs, except that the distances involved
are much greater and the bit rates are much lower.
• In addition to low-speed networks, high bandwidth wide area wireless networks are
also being developed. The initial use is high speed wireless internet access from homes
and business bypassing the telephone system.
Flg. 1.25: Bluetooth Configuration
1.33
1.32
Introduction to Computer Networ~
computer Netwarks • 1 •
Computer Networks • I Introduction to Computer Networks
. less networks that typically cover
• Wireless Wide Area Networks (WWANs) are wired cities or city and suburb. These s. It is inexpensive network because of It is expensive network.
large areas, such as between neighboring towns anf business
'
or as a public internet Ethernet cables, hubs, switches etc.
networks can be used to connect branch offices o are very inexpensive.
access system. 6. Wired network utilizing hubs can Wireless networking performance is
Satellite suffer performance slowdown if distance sensitive, meaning that
1111r ·
··••·· . ·•
computers heavily utilize the
network simultaneously.
maximum performance will degrade on
computers farther away from the
access point or other communication
endpoint.
~
...:;,,,·===
'~ '------
.---- -
··•··· ·-:·---
······
communication etc.
~ ~ E•""'"'
·•···· 8. Ethernet cables, switches, are used The reliability of wireless network is
in wired network are reliable. less as compared to wired network.
9. Wired-networks are easy to set up Wireless networks are comparatively di
Emergency response and troubleshoot. fficult
to set up, maintain, and troubleshoot.
10. The communication between two Wireless networks the communication
devices via cables. between two devices without cables.
,, ,, ,, Fax
,, ,, 11. Not support wireless mobility. The major advantage of having a
,,
wireless device is the mobility and
freedom that comes with it.
Central office
Client server
Fig. 1_27: WWAN (Wireless Wide Area Networks) 11\j Home Networks
Comparison of Wired and Wireless Networks: • The fundamental idea behind home networks is that in the future most homes will be
setup for networking. Every device in the home will be capable of communicating
Wired necworlc Wireless Network
with every other device and all of them will be accessible over the Internet.
Wired network uses network cables Wireless Network uses radio • For example, with a PDA or mobile phone, a user can communicate with his
to be connected co each and every frequencies.
microwave, refrigerator or babycam even though he/she is not at home.
computer in the network.
·• A Home Area Network (HAN) is a network that is deployed and operated within a
A wired network anows for a faster A wireless network is a lot less secure
small boundary, typically a House or Small Office/Home Office (SOHO).
and more secure connection. and slow transmission speeds.
• It enables the communication and sharing of resources (like the Internet) between
3. covers shorter This network covers larger . computers, mobile and other devices over a network connei:;tion.
geographical distances (1 - 4 km) geographical distances like state, city or
like building, offices etc. world. • A HAN is a dedicated network connecting devices in the home such as:
1. Computers (PC, notebook, PDA etc.)
High cost than wired network.
2. Entertainment (TV, DVD, VCR, Camera, MP3 etc.)
Contd. .. 3. Telecommunications (telephone, mobile phone, fax, etc.)
1.34 1.35
Introduction to Computer Networks
~:o:!!m~p~ut~•'!.r~N~etw~o~rk~s:..:•_!_I_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
_ Computer Networks • I Introduction to Computer N8tworks
a
•
technology.
• Computer network term is used to describe two or more computers that are linked to
rt
Wireless connection each other. When two or more com·puter networks or computer network segments
~i ,.
Notebook Wireles~ Cable I
acess point I Switch
I
Plug link HDAV I
Plug link HDAV ECO I
ECO adapter I
Game ~ adapter Work group
console
-~
ication system has five components as shown m Fig. 1. .
ml Data Flow
-~
, A data com mun
--- Step 1:
Step 1: Step 2: • The way in which data is transmitted from one place to another is called data
Step 3: .. ......... . communication mode.
........... ·siii"n"
"Ste .. n.. • Communication between two devices can be simplex, half-duplex or full duplex.
Protocol
1. Simplex : In simplex mode, the communication is unidirectional. One device on the
I~
.l! 8
;•~as•~
Medium
-ilD
~
_
-
" ' link transmits and other can only receive.
In computer system, the keyboard, monitor and• printer are examples of simplex
~~ Receiver
communication. The keyboard can only be used to enter data into computer, while
sender . . s t m components monitor and printer can only accept (display/print) output.
Fig. 1.30: Data Commun1canon ys e . . • fig. 1.31 shows simplex mode in data communication.
f data commurucaoon.
• Fig. 1.30 shows the following co~ponents o e data message. It can be a computer,
1. Sender: The sender is the device that sends th
workstation, telephone handset, and so on. b communicated. It can consist ..!
1 - - - - - - -D
-ir_e_c1_io_n_of_d_a_1a_ _ _ _-1 111'i ·:;
c(),
. th . f mation (data) to e
2. Message:The message is ~ m or y combination of these.
of text, pictures, sound, or video- or an. h . al path by which a message Mainframe Monitor
· · dium 1s the P ysic · 1 bl
3· Me<lium: The transmission ·me b twi ·sted-paired wire, coaxia ca e, Fig. 1.31: Simplex mode
travels from sender to receiver. It could e a
. Advantages:
fiber-optic cable, or radio waves. th overns data communications. It (i) Very simple and easy communication method.
Protocol: . r of rules at g .
4. A protocol 1s a se . ting devices. Without a protoco1, (ii) Cheaper in cost.
t between the commuruca
represents an agreemen b t could not communicate. Disadvantages:
two devices may be connected u . the message It can be computer,
. . the device that receives · (i) Only allows for communication in one direction.
5. Receiver: The receiver is .. d so on
workstation, telephone handset, telev1S1on, an (ii) Simplex transmission are not often used because it is not possible to send back
.
error to the transmit end.
IIIJ Data Represen
.
tation
th thods used imernally to represent mformauon
. . 2. Half-Duplex : In half-duplex mode, the communication can tak,e place in both
directions, but only in one direction at a time. For example, two-way communication
) • Data represencaoon refers to e me
between computers and other computers that may be connected to a hub. In this
stored in a computer. . . f like text numbers, images, audio, and mode, data is sent and received alternatively.
• Information today comes in various arms , • In simpie words, in half-duplex mode, at a time only one end transmits data while
video. b
1. Text: In data communication , text is represented as a i•t pa ttern, a, sequence of Os other end receives.
• Fig. 1.32 shows half-duplex communication mode.
or ls. ASCII codes are used to represent text. . not used to
2. Numbers: Numbers are also represented by bit p~ttern: ASCII is
represent numbers, the number is directly converted mto bmary. ! ~1 - -- -
Di-
re_c_tio_n_o_fd
- a-ta_a_t_tim_e_1- --;
.
3. Images: Images are also represented by bit pat tern. An image is composed of a
marrix of pixels. , · "' Direction of data at time 2
4. Audio : Audio refers to the recording or broadcasting of sound or music. 1t is
Workstation
co11tinuous, not discrete.
Fig. 1.32: Half-duplex Mode
5. Video : Video refers to the recording or broadcasting of a picture or movie.
1.40 1.41
Introduction to Computer Networks
Computer Networks · I Introduction to Computer Networks
:omputer Networks • I
.. 18;,
for each step and process during communication between two or more computers.
mode.
• Fig 1 33 shows full.duplex communication mode. . Networks have to follow these rules to successfully transmit data.
1 • Aprotocol can be defined as "a set of rules that govern data com~unication".
Diradloo of data all lho ,mo
• A protocol defines what is communicated, how it is communicated and when
it is
communicated.
• The key elements of a protocol are :
workstation
Wot¥tation • · M d 1. Syntax : Syntax refers to the structure or format of the data, meaning the
=:.. Fig. 1_33: Full-duplex commurucation o e order in
which they are presenteJ..
Advantages: 2. 'semantics : Semantics refers to the meaning of each section of bits. How is
(i) Enables two-way communication simultaneously. a
particular pattern to be interpreted and what action is to be taken based on that
(ii) Fastest method of data communication.
interpretation ?
Disadvantages: 3. Timing : Timing refers to two characteristics : when data should be sent and how
(i) More expensive and complex method.
fast they can be sent.
(ii) Two bandwidth channels is required for data transmission.
Functions of Protocols:
m
•
PROTOCOLS AND STANDARDS
During the past several decades, the data communications industry_ha~ grown at an
1. Protocol defines data sequencing rules.
2. Protocol defines data routing rules ~hich the most efficient path between the
astronomical rate. Consequently, the need to provide commumcauons between source and destination.
dissimilar computer equipment and systems has also increased. 3. Protocol defines data formatting rules which group of bits or characters within
• A major issue facing the data communications industry today i~ world-wide packet constitute data, control, addressing, or other information.
compatibility. Major areas of interest are software and programmmg language, 4. Protocol defines flow control of information or data.
electrical and cable interface, transmission media, communications signal, and format 5. Protocol defines error control rules are designed to detect errors in messages and
compatibility. to ensure transmission of correct messages.
• Thus, to ensure an orderly transfer of information, it has been necessary to establish
6. Protocol defines precedence and order of transmission rules ensure that all the
standard means of governing the physical, electrical and procedural arrangements of
nodes get a chance to use the communication lines and other resources of the
a data communications system.
network based on the priorities assigned to them.
1.42 1.43
Introduction to Computet' Networ~ computer Networks - I Introduction to Computer Networks
Computer Networks · l
ti
7. Protocol defines connec on
·nation rules that define how
establishment an d ternu
. t d when two nodes of a
1111 Standards Organizations
connections are established, maintained and termma e • Many organizations are dedicated to the establishment of standards. These are :
network want to communicate with each other. 1. International Organization for Standardization (ISO) : The ISO is a multinational
. that built into most communication body whose membership is drawn mainly from the standards creation committees
rotocol defines data security and privacy .
8. P of various governments through the world. ISO developing standards in scientific,
software packages.
lift Standards .
mm
.
technological and economical activity.
2. International Telecommunication Union - Telecommunication Standard Sector
. . thin that we use in our daily hfe has (ITU - T) : In 1970s, United nations form a committee named, Consultative
• Standards are necessary in our daily life. Every g Committee for International Telegraphy and Telephony (CCITT) for research and
some standards. . ensure interconnectivity and standards in telecommunication. On March 1, 1993 the name of this committee is
ary in networking to changed to ITU-T.
• Standards are al so necess k' g hardware and software
ill b tw en various networ m 3. American National Standards Institute (ANSI) : This organization is completely
interoperab ty . e _e would have proprietary products creating
components/devices. Without standards we private, non-profit corporation, not affiliated to US government.
is~lated islands of users which cannot interconnect. d .t 4. Institute of Electrical and Electronics Engineers (IEEE) : The IEEE is the largest
ufacturers and ven ors o ensure
. .d .d lines to product man professional engineering society in the world. IEEE oversees the development and
• Standards provi •
e g\ll e
·
. . D ta communications standards can be
1 interconnecnvity. a adoption of international standards for computing and communications.
national and mtemauona . "b fact" or" by convention")and de jure
classified into two types de facto (mearung y ' s. Electronic Industries .t'.:;::!.lciation (EIA) : EIA i~ a non-profit organization devoted to
the promotion of electronics manufacturing concerns.
(meaning "by law" or "by regulation"). ..
••=I•
•
Protocol Hierarchies
In a computer network, many devices are connected to each other. Every computer i;
_9>mputer Networlcs - I
•
A list of protocols used by a
stack.
. Introduction to Computer Networks
certain system, one protocol per layer, is• called a protocol
working as a source or destination or intermediate machine.
•
It is also possible that a computer is simultaneously performing all these jobs. As a
source, destination or intermediate machine certain predefined jobs a computer has to
~
Host 1 "'
[1117
~~ 2
Host
__t,_ayer 5 protocol
perform. The entire structure of computer network is complex. ----------► Layer 5
To reduce their design complexity, networks are organized as a stack of layers or
• __1:_a_i'!r 4 protocol
levels, each one built upon the one below it. • -- -- - ---- -►
The number of layers, the name of each layer, the contents• of each layer and the
• function of each layer differ from network to network. Each layer offers certain __1:_ay~r-3_protocol
-------►
predefined services to higher layers and taking services from lower layers. Layer 2/3 interface
r------''--
__1:_ayer 2 protocol
The basic concept of layering network responsibilities is that each layer adds value to Layer 2
----------►
• Layer 1/2 interface
services provided by sets of lower layers. r---"'--
__t,_ayel"'1 protocol
In this way, the highest level is offered the full set of services needed to run a Layer 1
----------►
•
distributed data application.
Fig. 1.34 shows a layered architecture where layer n at the source logically (but not Physical Medium
• necessarily physically) communicates with layer n at the destination and layer n of
Fig. 1.34 : Layers Prot ls
any intermediate nodes. • To understand the idea of ul . ' oco and II!-terfaces
office. m tllayer communication consider the example of post
Layer n on one machine carries on a conversation with layer n on another machine.
• The rules and conventions used in this conversation are collectively known as the Sender Receiver
•
layer n protocol.
A protocol is an agreement between the communicating parties on how
~
communication is to proceed.
• A five layer network is shown in Fig. 1.34. The entities comprising the corresponding The letter is written The letter is picked up,
layers on different machines are called peers. put in an envelope & Higher removed from the
dropped In a mailbox layers envelope,& read
• The peers m~y be proc~sses, hardware devices or even human beings. It is the peers
that communicate by usmg the protocol. ·
• In reality, no data are directly transferred from layer n on one machine to layer n on
The letter Is carried The letter is carried
_anothe~ machine. ~ach !ayer passes data and control information to the layer from the mailbox Middle from the post office
unm_ediately below 1_t, until the lowest layer is reached. Below layer 1 is the physical to a post office layers to the mail box.
medium through which actual communication occurs.
• In Fig. 1.34 virtual communication is shown by dotted lines and physical
communication by solid lines. The letter is delivered
to the carrier Lower
The letter is delivered
from the camer
:r::~en each ~air of adjacent layers is an interface. The interface defines which by the post otf1C8 layers to the post office
ve operaaons and services the lower layer gives to the upper layer.
A set of layers and protocols is called a network architecture
The details of implementation d th . . .
architecture because they ar ~dd e ~pe~cation of ~e interfaces is not part of
outside. e en ms1de the machines and not visible from
The letter Is carried from the
source to the destination
~ computer Networks • I
7. Routing : When there are multiple paths between source and d
available, a route must be chosen depending upon certain criteria . Criterttion. .,_
Illa~~
ji:flJ Connection-less Services
current traffic or situation of subnet. Criteria is called as routing protocoi" • connection-less service is modeled after the postal system. In this type of
services, no
process is called routing.
an~ II\
connection is established between source and destination.
8. Order of Messages : Not all communication channels preserve the 0 rd Here, there is no fixed path. Therefore, the messages must carry full
destination
er ~ •
messages sent on them. To deal with possible loss of sequencing, the prot address and each one of these messages are sent independent of each other.
to allow the pieces. to be rea ocol lll1tit
make explicit provision for the receiver order. Thus,
properly. • . sselllb~ • Messages sent will not be delivered at the destination in the same
s are not
grouping and ordering is required at the receiver end, and the service
DJI Connection-Oriented and Connection-less Services •
reliable.
There is no acknowledgement confirmation from the receive
r. Unreliable
~
• La_yers can offer two types of services to the layers above them namely con not return an
ection, connectionless service is often called datagram service, which does
oriented service and connection-less service.
acknowledgement to the sender.
ll:J91 Connect·ion-oriente
--- · · es
d Servic
•
In some cases, establishing a connection to send one short messages is
needed . But
be used for
In connection oriented se'"'"ce,
• ., . 1 connection is established b --.....
l ogica reliability is required, and then acknowledgement datagram service can
• etween
communicating parties. these applications.
. is
tion oriented service . modeled after the telephone system. Advantages of Connectionless Services :
•• Connec
1n telephone system when we w dial th 1. Does not required any connection.
number, after that c~nnectio . ant to _make a call, we have to pickup phone,
the telephone. n is established, use that connection and then disconn e~ 2. This services is very simple and easy for data transfer.