Lesson 09
Lesson 09
Notes
9
NETWORK BASICS
In the 21st century, worldwide telephonic networks, growth of computer industry and
launching of communication satellites, are integrating together. The merging of the
computer technology with the communication system has given birth to a whole array of
networking technologies. The use of a computer to serve a business need is rapidly being
replaced by a network of computers, catering to various needs of a business organisation.
In this lesson you will learn about various types of networks, their topologies,
communication media, addressing concepts, and network protocols.
Notes OBJECTIVES
After reading this lesson, you will be able to
z Communication from one system to another can be done only by using portable
storage devices.
To address these above mentioned problems, networks came into existence. It is a group
of computers connected to each other physically or logically for data communication.
z Lower cost: Another benefit is saving money. Small computers have a much better
price/performance ratio than larger ones. Mainframes are roughly ten times faster
than the fastest single chip microprocessors, but mainframes cost thousand times
more. This imbalance has caused many system designers to build systems consisting
of powerful personal computers, one per user, with data kept on one or more shared
file server machines. This benefit leads to networks with many computers located in Notes
the same building. Such a network is called a LAN (local area network).
Computer networks provide a powerful communication medium. A file that was updated/
modified on a network can be seen by the other users on the network immediately.
These networks have to follow certain rules and regulations to communicate among
themselves. The set of rules that governs the communication between the computers in a
network is called protocol. The ruling protocol standard followed by internet is TCP/IP
(Transmission Control Protocol/Internet Protocol).
Other than the public networks, one can build up a private network which can be accessed
if the user has access rights to it. There are business organisations which have their own
networks where the users are authenticated using valid User Ids and passwords.
Therefore, the benefits and applications of these networks can be enjoyed by only their
employees who have access to these privileges.
software. Such computers are called dumb terminals. They get operated directly with the
help of server. On the other hand the computers that can work independently on the
Notes network are called intelligent terminals.
Server: A server is a computer that provides data, software and hardware resources that
are to be shared on the network. A network can have more than one server. Each server has
a unique name in the network. All network users identify the server by its name. It is of
two types: (1) Non dedicated server - It acts as a server and workstation (2) Dedicated
server - It can be used as a server only.
Intranet: Intranet is a private network.
Inter space: It is client-server software that allows computers in a network to share online
audio, video and text through dynamic 3D environment. It provides a real time
communication platform on the Internet today.
Metropolition Area Network (MAN): It covers an area larger than a LAN. Generally,
when the network is spread across a city, then it is called a MAN. For example, a school
having branches in different parts of the city are connected to form a network. The
computers in each of these branches get connected to form separate LANs. These LANs
get connected to each other to form a MAN as shown in Fig. 9.3. It usually uses
microwave link for communication. It covers an area larger than LAN but smallar than
WAN. e.g. cable television network available in many cities.
Notes
Wide Area Network (WAN): It covers an area larger than a MAN. Various computer
networks located in different countries can be connected with each other to share
information through WAN. It usually uses satellite for communication. For example the
computer network of a multi national organisation with the head office at California
connects to a network of its branches in London. This forms a WAN as shown in fig 9.4
Peer to peer: Every computer on the network acts as a workstation as well as a server.
Any computer on the network can access the shared resources. These networks provide
low level security. Fig 9.5 shows an example of a peer to peer network.
Notes
Client Server: It consists of client computers and server computers as shown in fig 9.6.
A workstation is generally known as a client. A server computer provides services for the
client requests. It also handles the security and administrative responds to the tasks of the
network. These networks provide high level security. The client computers are dependent
on the server computer.
z Wired media
z Wireless media
Wired media talks of the physical connectivity that takes place using cables while wireless
media uses waves through air, water or vacuum. Now let us know about wired media.
Although UTP cable is the least expensive cable, it may be susceptible to radio and
electrical frequency interference (it should not be used too close to electric motors,
fluorescent lights, etc.).
Shielded Twisted Cables (STP) is a better option than UTP. Each pair of wires in
STP is individually shielded with foil. There is a shield around each individual pair,
as well as around the entire group of wires. They have 16-155 Mbps of speed and
can be extended up to maximum 100 meters. Cables require special connectors for
grounding but this cabling method resists electrical interference and is less susceptible
Notes to overhear.
2. Coaxial cable: It has a single copper conductor at its centre. A plastic layer provides
insulation between the centre conductor and a braided metal shield. The metal shield
helps to block any outside interference from
fluorescent lights, motors, and other
computers. An image of coaxial cable is
shown in fig. 9.8. Although coaxial cabling
is difficult to install, it is highly resistant to
signal interference.
Thick coaxial cable is also referred to as thicknet. 10Base5 refers to the specifications
for thick coaxial cable carrying ethernet signals. The 5 refers to the maximum segment
length being 500 meters. Thick coaxial cable has an extra protective plastic cover
that helps to keep moisture away from the centre conductor. This makes thick coaxial
a great choice when running longer lengths in a linear bus network. One disadvantage
of thick coaxial is that it is difficult to install.
3. Fiber optic cable: Fiber optic cabling consists of a central glass core surrounded by
several layers of protective materials as
shown in Fig. 9.9. It transmits light rather
than electronic signals eliminating the
problem of electrical interference. This makes
it ideal for certain environments that contain
a large amount of electrical interference. It
has also been made the standard for
connecting networks between buildings, due
to its immunity to the effects of moisture and
lighting. It has the ability to transmit signals
over much longer distances than coaxial and
Fig. 9.9 Fibre optics cable
twisted pair cables. It also has the capability
to carry information at vastly greater speeds.
This capacity broadens communication possibilities to include services such as video
conferencing and interactive services.
processes and routes data at the data link layer (layer 2) of the OSI model. A switch is a
telecommunication device that receives a
Notes message from any device connected to it
and then transmits the message only to
the device for which the message was
meant. Do you think switch is more Fig. 9.10 Switch
intelligent than a hub? Yes. It is more
intelligent than hub because hub simply
broadcasts the message to all computers which are connected to it. An eights port switch
is shown in Fig 9.10.
Repeater: Repeaters are used in a network to regenerate digital signals distorted by
transmission loss. It has the ability to reconstruct a signal to near its original quality. In
a network, a repeater, can relay messages between sub networks that use different protocols
or cable types. It works similar to amplifier in an analog network. When two computers
are connected in a network using cables and the distance is greater than the specification,
then to avoid data loss repeaters should be used in between.
Router: It is a device that forwards data packets between computer networks. A router is
connected to two or more data lines from different networks. When a data packet comes in
one of the lines, the router reads the
address information in the packet to
determine its ultimate destination.
Then, using information in its routing
table it directs the packet to the next Fig. 9.12 Router
network elements on its journey. It
works with IP addresses. A router's image is shown in Fig. 9.12.
z Packet switching: With message switching there is no limit on block size. In contrast,
packet switching places a tight limit on the block size. Data is divided in the form of
packets stored in the main memory. The packet size is fixed and there is no limit on
data. Communication medium is wireless. This type of system was originally designed
to provide reliable transmission through a communications network where switches
or lines may suddenly become unavailable or alternative routes may have to be chosen.
A packet consists of a "header" section which contains information such as the network
address of the destination terminal, a data section containing the information to be
transferred and a "tail" section containing checking information. A stream of data is
therefore split into a number of packets when these techniques are employed. Packets
may vary in length from a few bytes up to several thousand. Once a message has
been transmitted, the packets which comprise it may take different routes through
the communications system and arrive at the receiver at different times. In this scenario
it is up to the receiver to reassemble the packets into the correct order, to obtain the
complete message. This is done based on pre-defined identifiers/ headers and rules.
A network topology is the physical layout of computers, cables and other components of
a network. There are number of network topologies, and a computer network may be built
using multiple topologies. Various topologies of networks are given below:
z Bus topology
z Star topology
z Ring topology
z Mesh topology
z Hybrid topology
z Wireless topology
Bus topology: This topology uses one cable as the main trunk to connect all the
computers together as shown in Fig. 9.14. It is very easy to set up and requires no
additional hardware like hub. The cable is also called the trunk, a backbone, or a segment.
With bus topology, when a computer sends
out a signal, the signal travels the cable length
in both directions from the source computer.
When the signal reaches the end of the cable
length, it bounces back and returns in the
direction it came from. This is known as
signal bounce. If another signal is sent from
the opposite direction at the same time, the
two signals collide and get destroyed. In such
a situation, the signals get retransmitted. It Fig. 9.14 Bus topology
happens till the signals get transmitted to the destination system. For this reason,
terminators are placed at both the ends of the trunk.
The terminators are used to absorb the signal when it reaches the end of the trunk. This
prevents signal bounce. There are two situations when the network collapses, first when
there is no termination, due to signal bounce it happens and second when the cable breaks,
even then the network goes down. A bus is a passive topology, which means the signal
travels visiting each of the computers one by one without getting regenerated in any way
by them. These have no role in functioning of the bus.
3. Installation is difficult.
Mesh topology: It is not very common in computer networking today. In a mesh topology,
every computer has a connection to every other computer of the network.
Notes
Advantages of mesh topology
1. Provides multiple paths between computers. So even if one cable link breaks,
communication takes place using the other links.
2. Installation is difficult.
Hybrid topology: It is a mixture of the topologies discussed so far. A very popular hybrid
topology is a star-bus topology, in which a number of star topologies are connected by a
central bus. Another very popular topology is a star-ring topology. It looks like a star that
acts like a ring.
Wireless topology : A wireless topology is one in which few cables are used to connect
the computers. The network is made up of transmitters that broadcast the packets using
radio frequencies. The
network contains special
transmitters called cells or
access points which extend a
radio sphere in the shape of a
bubble around the transmitter.
It can extend to multiple rooms
and possibly floors in a
building. The computers and
network devices have a special
transmitter-receiver, which
allows them to receive
Fig. 9.17 Wireless topology
broadcasts and transmit
requested data back to the access point as shown in fig 9.17. The access point is connected
to the physical network by a cable, which allows communicating with systems on the
wired network.
in the reverse order i.e. from layer 1 to layer 7. Finally layer 7 will be responsible to get
back the message into its original form to be read at the destination computer.
Notes
A summary of the function of each layer is given in the Fig. 9.18.
Link layer (layer 1): Deals with all physical components of network connectivity
between the network and the IP protocol.
Internet layer (layer 2): The work in this layer is managed by IP. It contains all
functionality that manage the movement of data between two network devices over a
routed network.
Transport layer (layer 3): The work in this layer is managed by TCP. It manages the flow
of traffic between two hosts or devices, ensuring that data arrives at the application on the
host for which it is targeted.
Application layer (layer 4): Acts as final endpoint at either end of a communication
session between two network hosts.
TCP provides:
1. End to end reliability.
2. Data packet re-sequencing.
3. Flow control.
IP provides for:
1. Addressing.
2. Type of service specification.
3. Fragmentation and re-assembly.
4. Security.
TERMINAL EXERCISE
1. State the benefits of a computer network.
2. What is internet? Discuss the origin of internet.
3. Differentiate between peer to peer and client server network.
4. State the difference between LAN and MAN.
5. What is STP? How does it differ from UTP?
6. State any two differences between star topology and ring topology.
7. What are the seven layers of OSI network architecture?
8. Explain TCP/IP network architecture.
9.1
1. (i) real time communication platform
2. (ii) node
9.2
3. (i) regenerates a signal