Cna Unit I
Cna Unit I
PHYSICAL LAYER
PHYSICAL LAYER: Uses of Computer Networks: Networks for Companies –Networks for People-Network
Hardware(LAN,MAN,WAN,CAN,SAN) - Network Software: Protocol Hierarchies-Design issues for the layers-Interfaces and
Services-Connection –oriented and Connectionless Services- Reference Mode l:OSI – TCP/IP- Example Networks- Network
Standardization-Metric Units-Guided Transmission Media :Twisted pair-Baseband and Broad Band Coaxial Cable- Wireless
transmission: Electromagnetic Spectrum-Radio, Microwave, Infrared, light wave Transmission – Mobile Telephone system
DATA COMMUNICATION
When we communicate, we are sharing information. This sharing can be local or remote.
Between individuals, local communication usually occurs face to face, while remote
communication takes place over distance.
COMPONENTS
A data communications system has five components.
Information today comes in different forms such as text, numbers, images, audio, and video.
Text:
Numbers are also represented by bit patterns. However, a code such as ASCII is not used
to represent numbers; the number is directly converted to a binary number to simplify
mathematical operations. Appendix B discusses several different numbering systems.
Images:
Images are also represented by bit patterns. In its simplest form, an image is composed
of a matrix of pixels (picture elements), where each pixel is a small dot. The size of the pixel
depends on the resolution. For example, an image can be divided into 1000 pixels or 10,000
pixels. In the second case, there is a better representation of the image (better resolution), but
more memory is needed to store the image. After an image is divided into pixels, each pixel is
assigned a bit pattern. The size and the value of the pattern depend on the image. For an image
made of only blackand- white dots (e.g., a chessboard), a I-bit pattern is enough to represent a
pixel. If an image is not made of pure white and pure black pixels, you can increase the size of
the bit pattern to include gray scale. For example, to show four levels of gray scale, you can use
2-bit patterns. A black pixel can be represented by 00, a dark gray pixel by 01, a light gray pixel
by 10, and a white pixel by 11. There are several methods to represent color images. One
method is called RGB, so called because each color is made of a combination of three primary
colors: red, green, and blue. The intensity of each color is measured, and a bit pattern is
assigned to it. Another method is called YCM, in which a color is made of a combination of
three other primary colors: yellow, cyan, and magenta.
Audio:
Video refers to the recording or broadcasting of a picture or movie. Video can either be
produced as a continuous entity (e.g., by a TV camera), or it can be a combination of images,
each a discrete entity, arranged to convey the idea of motion. Again we can change video to a
digital or an analog signal.
DATA FLOW
Communication between two devices can be simplex, half-duplex, or full-duplex as shown in the
figure
Simplex:
In half-duplex mode, each station can both transmit and receive, but not at the same
time. When one device is sending, the other can only receive, and vice versa The half-duplex
mode is like a one-lane road with traffic allowed in both directions.
When cars are traveling in one direction, cars going the other way must wait. In a half-duplex
transmission, the entire capacity of a channel is taken over by whichever of the two devices is
transmitting at the time. Walkie-talkies and CB (citizens band) radios are both half-duplex
systems.
The half-duplex mode is used in cases where there is no need for communication in both
directions at the same time; the entire capacity of the channel can be utilized for each
direction.
Full-Duplex:
In full-duplex both stations can transmit and receive simultaneously (see Figure c). The
full-duplex mode is like a tW<D-way street with traffic flowing in both directions at the same
time. In full-duplex mode, si~nals going in one direction share the capacity of the link: with
signals going in the other din~c~on. This sharing can occur in two ways: Either the link must
contain two physically separate t:nmsmissiIDn paths, one for sending and the other for
receiving; or the capacity of the ch:arillilel is divided between signals traveling in both
directions. One common example of full-duplex communication is the telephone network.
When two people are communicating by a telephone line, both can talk and listen at the same
time. The full-duplex mode is used when communication in both directions is required all the
time. The capacity of the channel, however, must be divided between the two directions.
NETWORKS
A network is a set of devices (often referred to as nodes) connected by communication links. A
node can be a computer, printer, or any other device capable of sending and/or receiving data
generated by other nodes on the network.
DISTRIBUTED PROCESSING
Most networks use distributed processing, in which a task is divided among multiple computers.
Instead of one single large machine being responsible for all aspects of a process, separate
computers (usually a personal computer or workstation) handle a subset.
NETWORK CRITERIA
A network must be able to meet a certain number of criteria. The most important of these
are performance, reliability, and security.
Performance:
Performance can be measured in many ways, including transit time and response
time.Transit time is the amount of time required for a message to travel from one device to
another. Response time is the elapsed time between an inquiry and a response. The
performance of a network depends on a number of factors, including the number of
users, the type of transmission medium, the capabilities of the connected hardware, and the
efficiency of the software. Performance is often evaluated by two networking metrics:
throughput and delay. We often need more throughput and less delay. However, these two
criteria are often contradictory. If we try to send more data to the network, we may increase
throughput but we increase the delay because of traffic congestion in the network.
Reliability:
Network security issues include protecting data from unauthorized access, protecting
data from damage and development, and implementing policies and procedures for recovery
from breaches and data losses.
PHYSICAL STRUCTURES:
Type of Connection
Features:
It transmits data only in one direction.
Every device is connected to a single cable.
Advantages:
It is cost effective (cheaper).
Cable required is least compared to other network topology.
Used in small networks.
It is easy to understand.
Easy to expand joining two cables together.
Disadvantages:
Cables fails then whole network fails.
If network traffic is heavy or nodes are more the performance of the network
decreases.
Cable has a limited length.
RING TOPOLOGY
It is called ring topology because it forms a ring as each computer is connected to
another computer, with the last one connected to the first. Exactly two neighbours
for each device.
Features:
A number of repeaters are used and the transmission is unidirectional.
Date is transferred in a sequential manner that is bit by bit.
Advantages:
Transmitting network is not affected by high traffic or by adding more nodes, as only the
nodes having tokens can transmit data.
Cheap to install and expand.
Disadvantages:
Troubleshooting is difficult in ring topology.
Adding or deleting the computers disturbs the network activity.
Failure of one computer disturbs the whole network.
STAR TOPOLOGY
In this type of topology all the computers are connected to a single hub through a cable.
This hub is the central node and all others nodes are connected to the central node.
Features:
Every node has its own dedicated connection to the hub.
Acts as a repeater for data flow.
Can be used with twisted pair, Optical Fibre or coaxial cable.
Advantages:
Fast performance with few nodes and low network traffic.
Hub can be upgraded easily.
Easy to troubleshoot.
Easy to setup and modify.
Only that node is affected which has failed rest of the nodes can work smoothly.
Disadvantages:
Cost of installation is high.
Expensive to use.
If the hub is affected then the whole network is stopped because all the nodes
depend on the hub.
Performance is based on the .
MESH TOPOLOGY
It is a point-to-point connection to other nodes or devices.
Traffic is carried only between two devices or nodes to which it is connected.
Features:
Fully connected.
Robust.
Not flexible.
Advantages:
Each connection can carry its own data load.
It is robust.
Fault is diagnosed easily.
Provides security and privacy.
Disadvantages:
Installation and configuration is difficult.
Cabling cost is more.
Bulk wiring is required.
TREE TOPOLOGY
It has a root node and all other nodes are connected to it forming a hierarchy.
It is also called hierarchical topology.
It should at least have three levels to the hierarchy.
Features:
Ideal if workstations are located in groups.
Used in Wide Area Network.
Advantages:
Extension of bus and star topologies.
Expansion of nodes is possible and easy.
Easily managed and maintained.
Error detection is easily done.
Disadvantages:
Heavily cabled.
Costly.
If more nodes are added maintenance is difficult.
Central hub fails then network fails.
HYBRID TOPOLOGY
A network structure whose design contains more than one topology is said to be hybrid
topology.
For example if in an office in one department ring topology is used and in another star
topology is used, connecting these topologies will result in Hybrid Topology (ring topology and
star topology).
Features:
It is a combination of two or more topologies
Inherits the advantages and disadvantages of the topologies included
Advantages:
Reliable as error detecting and trouble shooting is easy.
Scalable as size can be increased easily.
Flexible.
Disadvantages:
Complex in design.
Costly.
TYPES OF COMPUTER NETWORKS
Advantages
LAN transfers data at high speed.
LAN technology is generally less expensive.
INTERNET
o Syntax. The term syntax refers to the structure or format of the data, meaning the order in
which they are presented. For example, a simple protocol might expect the first 8 bits of data to be
the address of the sender, the second 8 bits to be the address of the receiver, and the rest of the
stream to be the message itself.
o Semantics. The word semantics refers to the meaning of each section of bits. How is a
particular pattern to be interpreted, and what action is to be taken based on that interpretation? For
example, does an address identify the route to be taken or the final destination of the message?
o Timing. The term timing refers to two characteristics: when data should be sent and how fast
they can be sent. For example, if a sender produces data at 100 Mbps but the receiver can process data
at only 1 Mbps, the transmission will overload the receiver and some data will be lost.
STANDARDS
Standards are essential in creating and maintaining an open and competitive market for
equipment manufacturers and in guaranteeing national and international interoperability of data and
telecommunications technology and processes. Standards provide guidelines to manufacturers,
vendors, government agencies, and other service providers to ensure the kind of interconnectivity
necessary in today's marketplace and in international communications.
Data communication standards fall into two categories: de facto (meaning "by fact" or "by convention")
and de jure (meaning "by law" or "by regulation").
o De facto. Standards that have not been approved by an organized body but have been
adopted as standards through widespread use are de facto standards. De facto standards are often
established originally by manufacturers who seek to define the functionality of a new product or
technology.
o De jure. Those standards that have been legislated by an officially recognized body are de jure
standards.
LAYERED TASKS
We use the concept of layers in our daily life. As an example, let us consider two friends who
communicate through postal mail. The process of sending a letter to a friend would be complex if there
were no services available from the post office. Below Figure shows the steps in this task.
Let us first describe, in order, the activities that take place at the sender site.
o Higher layer. The sender writes the letter, inserts the letter in an envelope, writes the
sender and receiver addresses, and drops the letter in a mailbox.
o Middle layer. The letter is picked up by a letter carrier and delivered to the post office.
o Lower layer. The letter is sorted at the post office; a carrier transports the letter.
0n the Way: The letter is then on its way to the recipient. On the way to the recipient's local post office,
the letter may actually go through a central office. In addition, it may be transported by truck, train,
airplane, boat, or a combination of these.
o Lower layer. The carrier transports the letter to the post office.
o Middle layer. The letter is sorted and delivered to the recipient's mailbox.
o Higher layer. The receiver picks up the letter, opens the envelope, and reads it.
PROTOCOLS LAYERS AND THEIR SERVICE MODEL
1. Physical Layer
2. Data Link Layer
3. Network Layer
4. Transport Layer
5. Session Layer
6. Presentation Layer
7. Application Layer
Figure 15: OSI Reference Model
Physical Layer
The physical layer, the lowest layer of the OSI model, is concerned with the transmission
and reception of the unstructured raw bit stream over a physical medium.
It describes the electrical/optical, mechanical, and functional interfaces to the physical
medium, and carries the signals for all of the higher layers. It provides:
Data encoding: modifies the simple digital signal pattern (1s and 0s) used by the PC to
better accommodate the characteristics of the physical medium, and to aid in bit and
frame synchronization.
Transmission technique: determines whether the encoded bits will be transmitted by
baseband (digital) or broadband (analog) signalling.
Physical medium transmission: transmits bits as electrical or optical signals appropriate
for the physical medium.
3. Internet Layer
4. Data Link Layer
5. Physical Network
Figure 16: TCP/IP Reference Model
As we can see from the above figure, presentation and session layers are not there in
TCP/IP model. Also note that the Network Access Layer in TCP/IP model combines the
functions of Data link Layer and Physical Layer.
Application Layer
Application layer is the top most layer of four layer TCP/IP model.
Application layer is present on the top of the Transport layer.
Application layer defines TCP/IP application protocols and how host programs interface
with Transport layer services to use the network.
Application layer includes all the higher-level protocols like DNS (Domain Naming
System), HTTP (Hypertext Transfer Protocol), Telnet, SSH, FTP (File Transfer Protocol),
TFTP (Trivial File Transfer Protocol), SNMP (Simple Network Management Protocol),
SMTP (Simple Mail Transfer Protocol), DHCP (Dynamic Host Configuration Protocol), X
Windows, RDP (Remote Desktop Protocol) etc.
Transport Layer
The purpose of Transport layer is to permit devices on the source and destination hosts
to carry on a conversation.
Transport layer defines the level of service and status of the connection used when
transporting data.
The transport layer provides the end-to-end data transfer by delivering data from an
application to its remote peer.
The most-used transport layer protocol is the Transmission Control Protocol (TCP),
which provides:
Reliable delivery data Congestion control
Duplicate data Flow control
suppression
Another transport layer protocol is the User Datagram Protocol (UDP), which provides:
Connectionles Best-effort services
Unreliable
UDP is used by applications that need a fast transport mechanism and can tolerate the
loss of some data.
Network Layer (Internet Layer)
The internet layer also called the network layer.
Internet layer pack data into data packets known as IP datagrams, which contain source
and destination address (logical address or IP address) information that is used to
forward the datagrams between hosts and across networks.
The Internet layer is also responsible for routing of IP datagrams.
Internet Protocol (IP) is the most important protocol in this layer.
It is a connectionless protocol that does not assume reliability from lower layers. IP does
not provide reliability, flow control or error recovery.
IP provides a routing function that attempts to deliver transmitted messages to their
destination.
These message units in an IP network are called an IP datagram.
Example: IP, ICMP, IGMP, ARP, and RARP.
Network Interface Layer (Network Access Layer)
Network Access Layer defines details of how data is physically sent through the network,
including how bits are electrically or optically signalled by hardware devices that
interface directly with a network medium, such as coaxial cable, optical fiber, or twisted
pair copper wire.
The protocols included in Network Access Layer are Ethernet, Token Ring, FDDI, X.25,
Frame Relay etc.
The Physical Layer is concerned with transmitting raw bits over a communication
channel.
The design issue has to do with making sure that when one side sends a 1 bit, it is
received by the other side as a 1 bit and not as a 0 bit.
How many volts should be used to represent a 1 bit and how many for a 0?
How many pins the network connector has and what each pin is used for?
The design issues here largely deal with mechanical, electrical and timing interfaces, and
the physical transmission medium, which lies below the physical layer.
CONNECTIONLESS METHOD
Connectionless communication is just packet switching where no call establishment and
release occur.
A message is broken into packets, and each packet is transferred separately. Moreover,
the packets can travel different route to the destination since there is no connection.
Connectionless service is typically provided by the UDP (User Datagram Protocol). The
packets transferred using UDP are also called datagrams.
Transmission Media
If the two wires are parallel, the effect of these unwanted signals is not the same in both
wires because they are at different locations relatives to the noise or crosstalk sources.
This results in a difference at the receiver.
By twisting the pair, a balance is maintained.
computer networks.
Category 3 twisted pairs consist of two insulated wires gently twisted together.
Most office buildings had one category 3 cable running from a central wiring closet on
each floor into each office.
Category 5 is the more advanced twisted pairs were introduced.
They are similar to category 3 pairs, but with more twists per centimetre, which results
in less crosstalk and a better-quality signal over longer distances, making them more
suitable for high- speed computer communication.
Up-and-coming categories are 6 and 7, which are capable of handling signals with
bandwidths of 250 MHz and 600 MHz, respectively (versus a mere 16 MHz and 100 MHz
for categories 3 and 5 respectively).
Figure 10: Unshielded twisted-pair
2) Shielded twisted-pair
(STP).
STP cable has a metal foil or braided mesh covering that encases each pair of insulated
conductors.
Metal casing improves the quality of cable by preventing the penetration of noise or crosstalk.
It is bulkier and more expensive.
Applications:
of UTP cables.
LANs, such as 10Base-T, 100Base-T also uses twisted-pair cables.
2. Coaxial Cable
It has better shielding than twisted pairs, so it can span longer distances at higher
speeds.
Two kinds of coaxial cable are widely used. One kind is 50-ohm cable which is
commonly used when it is intended for digital transmission from the start.
The other kind is 75-ohm cable which is commonly used for analog transmission
and cable television but is becoming more important with the advent of Internet
over cable.
A coaxial cable consists of a stiff copper wire as the core surrounded by an
insulating material.
The insulator is encased by a cylindrical conductor, often as a closely-woven
braided mesh.
The outer conductor is covered in a protective plastic sheath.
The construction and shielding of the coaxial cable give it a good combination of
high bandwidth and excellent noise immunity.
The bandwidth possible depends on the cable quality, length and signal-to-noise
ratio of the data signal. Modern cables have a bandwidth of close to 1 GHz.
Coaxial cables used is widely used within the telephone system for long-distance
lines but have now largely been replaced by fiber optics on long-haul routes
A fiber-optic cable is made of glass or plastic and transmits signals in the form of
light.
Optical fibers use reflection to guide light through a channel.
moving through a core is reflected off the cladding instead of being refracted into
it.
3. Fiber Optics
directions from the source, so the transmitter and receiver do not have
to be carefully aligned physically.
The properties of radio waves are frequency dependent.
At low frequencies, radio waves pass through obstacles well, but the
power falls off sharply with distance from the source, roughly as 1/r2 in
air.
At high frequencies, radio waves tend to travel in straight lines and
bounce off obstacles. They are also absorbed by rain.
At all frequencies, radio waves are subject to interference from motors
and other electrical equipment.
In the VLF, LF, and MF bands, radio waves follow the curvature of the
earth.
In the HF they bounce off the ionosphere
2. Microwave Transmission
Since the microwaves travel in a straight line, if the towers are too far
apart, the earth will get in the way. Consequently, repeaters are needed
periodically.
Unlike radio waves at lower frequencies, microwaves do not pass
through buildings well. In addition, even though the beam may be well
focused at the transmitter, there is still some divergence in space.
Above 100 MHz, the waves travel in straight lines and can therefore be
narrowly focused. Concentrating all the energy into a small beam using
a parabolic antenna gives a much higher signal to noise ratio.
Advantages:
No right way is needed (compared to wired media).
Relatively inexpensive.
Simple to install.
Disadvantages:
Do not pass through buildings well.
communication.
The remote controls used on televisions, VCRs, and stereos all use infrared
communication.
They are relatively directional, cheap, and easy to build but have a major
drawback: they do not pass through solid objects (try standing between your
remote control and your television and see if it still works).
In general, as we go from long-wave radio toward visible light, the waves
behave more and more like light and less and less like radio.
On the other hand, the fact that infrared waves do not pass through solid walls
well is also a plus.
It means that an infrared system in one room of a building will not interfere
with a similar system in adjacent rooms or buildings.
Furthermore, security of infrared systems against eavesdropping is better than
that of radio systems precisely for this reason.
Let’s have a look at each of the top companies you can aim for individually.
1. Cisco
Locations:
Bangalore Hyderabad Gurugram Chennai
IBM on Networking:
Network services at IBM support your company in terms of agility, scalability, and security.
It provides guidance and knowledge using a life cycle approach which plans, designs,
implements, assess and manages strategy.
Locations:
Vishakhapatnam Coimbatore Bhubaneshwar Hyderabad Ahmedabad
TCS on Networking:
TCS helps their clients to embrace new technologies and optimize transformation
expenditure.
They offer end to end network services like network engineering, orchestration, network
transformation, assurance, operation centers, etc.
They help clients maximize ROI and improve the quality of services delivered.
TCS also manages network infrastructure while providing the quality end-user experience
Locations:
Thiruvananthapuram Jamshedpur Lucknow Mumbai Delhi
Locations:
Bhubaneshwar Chandigarh Ahmedabad Lucknow Nagpur
Kochi
5. Infosys
Website: https://www.infosys.com/
Infosys on Networking:
Infosys focuses on AI to build automated roots for the enterprises that provide insights for
executing change.
Digital transformation to provide business performance and customer delight.
Drive improvement by learning digital skills and knowledge.
Locations:
Thiruvananthapuram Chandigarh Gurgaon Nagpur Indore