Computer Network
Computer Network
Human beings are the only creatures on the earth who are able to communicate with each
other through the medium of language. But humans take this gift to another extent.
Distance, time, and physical existence of the person don’t matter in communication these
days because they build a communication system through which they can communicate or
share data like images, videos, text, files, etc with their loved ones anytime anywhere.
Communication is defined as a process in which more than one computer transfers
information, instructions to each other and for sharing resources. Or in other words,
communication is a process or act in which we can send or receive data. A network of
computers is defined as an interconnected collection of autonomous computers.
Autonomous means no computer can start, stop or control another computer.
Data communications refers to the transmission of this digital data between two or more
computers and a computer network or data network is a telecommunications network that
allows computers to exchange data. The physical connection between networked computing
devices is established using either cable media or wireless media. The best-known computer
network is the Internet.
2. Sender: It is simply a device that sends data messages. It can be a computer, mobile,
telephone, laptop, video camera, or workstation, etc.
5. Set of rules (Protocol): When someone sends the data (The sender), it should be
understandable to the receiver also otherwise it is meaningless. For example, Sonali
sends a message to Chetan. If Sonali writes in Hindi and Chetan cannot understand
Hindi, it is a meaningless conversation.
Therefore, there are some set of rules (protocols) that is followed by every computer
connected to the internet and they are:
TCP(Transmission Control Protocol): It is responsible for dividing messages into
packets on the source computer and reassembling the received packet at the destination
or recipient computer. It also makes sure that the packets have the information about the
source of the message data, the destination of the message data, the sequence in which
the message data should be re-assembled, and checks if the message has been sent
correctly to the specific destination.
IP(Internet Protocol): Do You ever wonder how does computer determine which
packet belongs to which device. What happens if the message you sent to your friend is
received by your father? Scary Right. Well! IP is responsible for handling the address of
the destination computer so that each packet is sent to its proper destination.
4. Jitter:
Jitter refers to the variation in the packet arrival time. It is the uneven delay in the delivery of
audio or video packets. For example, let us assume that video packets are sent every 3D ms.
If some of the packets arrive with 3D-ms delay and others with 4D-ms delay, an uneven
quality in the video is the result.
Communication Channels
Communication channels are the medium that connects two or more workstations.
Workstations can be connected by either wired media or wireless media. It is also known as
a transmission medium. The transmission medium or channel is a link that carries messages
between two or more devices. We can group the communication media into two categories:
Guided media transmission
Unguided media transmission
1. Guided Media: In this transmission medium, the physical link is created using
wires or cables between two or more computers or devices, and then the data is
transmitted using these cables in terms of signals. Guided media transmission of the
following types:
1. Twisted pair cable: It is the most common form of wire used in communication. In a
twisted-pair cable, two identical wires are wrapped together in a double helix. The twisting
of the wire reduces the crosstalk. It is known as the leaking of a signal from one wire to
another due to which signal can corrupt and can cause network errors. The twisting protects
the wire from internal crosstalk as well as external forms of signal interference. Types of
Twisted Pair Cable :
Unshielded Twisted Pair (UTP): It is used in computers and telephones widely. As the
name suggests, there is no external shielding so it does not protects from external
interference. It is cheaper than STP.
Shielded Twisted Pair (STP): It offers greater protection from crosstalk due to shield.
Due to shielding, it protects from external interference. It is heavier and costlier as
compare to UTP.
2. Coaxial Cable: It consists of a solid wire core that is surrounded by one or more foil or
wire shields. The inner core of the coaxial cable carries the signal and the outer shield
provides the ground. It is widely used for television signals and also used by large
corporations in building security systems. Data transmission of this cable is better but
expensive as compared to twisted pair.
2. Unguided Media: The unguided transmission media is a transmission mode in which the
signals are propagated from one device to another device wirelessly. Signals can wave
through the air, water, or vacuum. It is generally used to transmit signals in all directions.
Unguided Media is further divided into various parts :
2. Radio wave: When communication is carried out by radio frequencies, then it is termed
radio waves transmission. It offers mobility. It is consists of the transmitter and the
receiver. Both use antennas to radiate and capture the radio signal.
Images: They are also represented by bit patterns. In its simplest form, an image is
composed of a matrix of pixels, where each pixel is a small dot. Resolution determines
the size of the pixel.
2. Baud :
It’s actually a common measurement unit of data transfer. Baud rate measures the
rate at which the data is transferred from the sender to the receiver in the data
channel. It can be expressed in terms of bps (bits per second). It simply determines
the speed of data transfer.
Type of the
S.No.Signal Range of Frequency in HertzBandwidth in Hertz
1 Voice signal 300-3400 3, 100
2 TV signal 0-5 MHz 5 MHz
3 Digital Data 300-3400 3, 100
4 Music Signal 20-15000 14, 980
Dataflow is often defined using a model or diagram in which the entire process of data
movement is mapped as it passes from one component to the next within a program or a
system, taking into consideration how it changes form during the process.
Types of Networks
Technology made a huge breakthrough in 1936 when the first computer was invented.
However, it wasn’t until years later in 1969 that the first-ever computer-to-computer link was
established. This development was what ultimately paved the way for the Internet-driven
world we live in today.
So, what is a network? It’s the connection of two or more computers that are linked in order
to share files, resources, and allow communication. The type of network depends on the
number of devices, as well as the location and distance between each.
Do you know what network your home or business utilizes? If not, find out by checking out 7
different types of commonly utilized networks in the list below.
The arrangement of a network that comprises nodes and connecting lines via sender and
receiver is referred to as network topology. The various network topologies are:
Mesh Topology:
In a mesh topology, every device is connected to another device via a particular channel. In
Mesh Topology, the protocols used are AHCP (Ad Hoc Configuration Protocols), DHCP
(Dynamic Host Configuration Protocol), etc.
Figure 1: Every device is connected with another via dedicated channels. These channels
are known as links.
Suppose, the N number of devices are connected with each other in a mesh topology,
the total number of ports that are required by each device is N-1. In Figure 1, there are 5
devices connected to each other, hence the total number of ports required by each
device is 4. Total number of ports required=N*(N-1).
Suppose, N number of devices are connected with each other in a mesh topology, then
the total number of dedicated links required to connect them is NC2 i.e. N(N-1)/2. In
Figure 1, there are 5 devices connected to each other, hence the total number of links
required is 5*4/2 = 10.
Advantages of this topology:
Communication is very fast between at the nodes.
It is robust.
The fault is diagnosed easily. Data is reliable because data is transferred among the
devices through dedicated channels or links.
Provides security and privacy.
Problems with this topology:
Installation and configuration are difficult.
The cost of cables is high as bulk wiring is required, hence suitable for less number of
devices.
The cost of maintenance is high.
Star Topology:
In star topology, all the devices are connected to a single hub through a cable. This hub is
the central node and all other nodes are connected to the central node. The hub can be
passive in nature i.e., not an intelligent hub such as broadcasting devices, at the same time
the hub can be intelligent known as an active hub. Active hubs have repeaters in them.
Coaxial cable or RJ-45 cables are used to connect the computers. In Star Topology, many
popular Ethernet LAN protocols are used as CD(Collision Detection), CSMA (Carrier
Sense Multiple Access), etc.
Figure 2: A star topology having four systems connected to a single point of connection i.e.
hub.
Advantages of this topology:
If N devices are connected to each other in a star topology, then the number of cables
required to connect them is N. So, it is easy to set up.
Each device requires only 1 port i.e. to connect to the hub, therefore the total number of
ports required is N.
It is Robust. If one link fails only that link will affect and not other than that.
Easy to fault identification and fault isolation.
Star topology are cost-effective as it uses inexpensive coaxial cable.
Problems with this topology:
If the concentrator (hub) on which the whole topology relies fails, the whole system will
crash down.
The cost of installation is high.
Performance is based on the single concentrator i.e. hub.
Bus Topology:
Bus topology is a network type in which every computer and network device is connected
to a single cable. It transmits the data from one end to another in a single direction. No bi-
directional feature is in bus topology. It is a multi-point connection and a non-robust
topology because if the backbone fails the topology crashes. In Bus Topology, various
MAC (Media Access Control) protocols are followed by LAN ethernet connections like
TDMA, Pure Aloha, CDMA, Slotted Aloha, etc.
Figure 3: A bus topology with shared backbone cable. The nodes are connected to the
channel via drop lines.
Advantages of this topology:
If N devices are connected to each other in a bus topology, then the number of cables
required to connect them is 1, which is known as backbone cable, and N drop lines are
required.
Coaxial or twisted pair cables are mainly used in bus based networks that support up to
10 Mbps.
The cost of the cable is less compared to other topologies, but it is used to build small
networks.
Bus topology is familiar technology as installation and troubleshooting techniques are
well known.
Problems with this topology:
A bus topology is quite simpler , but still it requires a lot of cabling.
If the common cable fails, then the whole system will crash down.
If the network traffic is heavy, it increases collisions in the network. To avoid this,
various protocols are used in the MAC layer known as Pure Aloha, Slotted Aloha,
CSMA/CD, etc.
Adding new devices to network would slow down networks.
Security is very low.
Ring Topology:
In this topology, it forms a ring connecting devices with exactly two neighboring devices.
A number of repeaters are used for Ring topology with a large number of nodes, because if
someone wants to send some data to the last node in the ring topology with 100 nodes, then
the data will have to pass through 99 nodes to reach the 100th node. Hence to prevent data
loss repeaters are used in the network.
The data flows in one direction, i.e.., it is unidirectional, but it can be made bidirectional by
having 2 connections between each Network Node, it is called Dual Ring Topology. In-
Ring Topology, the Token Ring Passing protocol is used by the workstations to transmit the
data.
Figure 4: A ring topology comprises 4 stations connected with each forming a ring.
The most common access method of ring topology is token passing.
Token passing : It is network access method in which token is passed from one node
ton another node.
Token : It is a frame that circulates around network.
The following operations take place in ring topology are :
1. One station is known as a monitor station which takes all the responsibility to perform
the operations.
2. To transmit the data, the station has to hold the token. After the transmission is done,
the token is to be released for other stations to use.
3. When no station is transmitting the data, then the token will circulate in the ring.
4. There are two types of token release techniques: Early token release releases the token
just after transmitting the data and Delay token release releases the token after the
acknowledgment is received from the receiver.
Advantages of this topology:
The data transmission is high-speed.
The possibility of collision is minimum in this type of topology.
Cheap to install and expand.
It is less costly than a star topology.
Problems with this topology:
The failure of a single node in the network can cause the entire network to fail.
Troubleshooting is difficult in this topology.
The addition of stations in between or removal of stations can disturb the whole
topology.
Less secure.
Tree Topology :
This topology is the variation of the Star topology. This topology has a hierarchical flow of
data. In Tree Topology, SAC (Standard Automatic Configuration ) protocols like DHCP
and SAC are used.
Figure 5: In this, the various secondary hubs are connected to the central hub which
contains the repeater. This data flow from top to bottom i.e. from the central hub to the
secondary and then to the devices or from bottom to top i.e. devices to the secondary hub
and then to the central hub. It is a multi-point connection and a non-robust topology
because if the backbone fails the topology crashes.
Advantages of this topology :
It allows more devices to be attached to a single central hub thus it decreases the
distance that is traveled by the signal to come to the devices.
It allows the network to get isolated and also prioritize from different computers.
We can add new device to existing network.
The Error detection and error correction is very easy in tree topology.
Problems with this topology :
If the central hub gets fails the entire system fails.
The cost is high because of cabling.
If new devices are added, it becomes difficult to reconfigure.
Hybrid Topology :
This topology technology is the combination of all the various types of topologies we have
studied above. It is used when the nodes are free to take any form. It means these can be
individuals such as Ring or Star topology or can be a combination of various types of
topologies seen above. Each individual topology uses the protocol that has been discussed
earlier.
Figure 6: The above figure shows the structure of the Hybrid topology. As seen it contains
a combination of all different types of networks.
Advantages of this topology :
This topology is very flexible.
the size of network can be easily expanded by adding new device.
Problems with this topology :
It is very difficult to design the architecture of the Hybrid Network.
Hubs used in this topology are very expensive.
The infrastructure cost is very high as hybrid network requires a lot of cabling,
network devices.
OSI stands for Open Systems Interconnection. It has been developed by ISO –
‘International Organization for Standardization‘, in the year 1984. It is a Seven
layer architecture with each layer having specific functionality to perform. All these 7
layers work collaboratively to transmit the data from one person to another across the
globe.
Scenario:
Let us consider a scenario where a user wants to send a message through some Messenger
application running in his browser. The “Messenger” here acts as the application layer
which provides the user with an interface to create the data. This message or so-called Data
is compressed, encrypted (if any secure data), and converted into bits (0’s and 1’s) so that it
can be transmitted.
6. Presentation Layer (Layer 6):
The presentation layer is also called the Translation layer. The data from the application
layer is extracted here and manipulated as per the required format to transmit over the
network.
The functions of the presentation layer are :
Translation: For example, ASCII to EBCDIC.
Encryption/ Decryption: Data encryption translates the data into another form or code.
The encrypted data is known as the ciphertext and the decrypted data is known as plain
text. A key value is used for encrypting as well as decrypting data.
Compression: Reduces the number of bits that need to be transmitted on the network.
7. Application Layer (Layer 7) :
At the very top of the OSI Reference Model stack of layers, we find the Application layer
which is implemented by the network applications. These applications produce the data,
which has to be transferred over the network. This layer also serves as a window for the
application services to access the network and for displaying the received information to
the user.
Example: Application – Browsers, Skype Messenger, etc.
**Application Layer is also called Desktop Layer.
This layer corresponds to the combination of Data Link Layer and Physical Layer of the OSI
model. It looks out for hardware addressing and the protocols present in this layer allows for
the physical transmission of data.
We just talked about ARP being a protocol of Internet layer, but there is a conflict about
declaring it as a protocol of Internet Layer or Network access layer. It is described as residing
in layer 3, being encapsulated by layer 2 protocols.
2. Internet Layer –
This layer parallels the functions of OSI’s Network layer. It defines the protocols which are
responsible for logical transmission of data over the entire network. The main protocols
residing at this layer are :
1. IP – stands for Internet Protocol and it is responsible for delivering packets from the
source host to the destination host by looking at the IP addresses in the packet headers. IP
has 2 versions:
IPv4 and IPv6. IPv4 is the one that most of the websites are using currently. But IPv6 is
growing as the number of IPv4 addresses are limited in number when compared to the
number of users.
2. ICMP – stands for Internet Control Message Protocol. It is encapsulated within IP
datagrams and is responsible for providing hosts with information about network
problems.
3. ARP – stands for Address Resolution Protocol. Its job is to find the hardware address of a
host from a known IP address. ARP has several types: Reverse ARP, Proxy ARP,
Gratuitous ARP and Inverse ARP.
3. Host-to-Host Layer –
This layer is analogous to the transport layer of the OSI model. It is responsible for end-to-
end communication and error-free delivery of data. It shields the upper-layer applications
from the complexities of data. The two main protocols present in this layer are :
1. Transmission Control Protocol (TCP) – It is known to provide reliable and error-free
communication between end systems. It performs sequencing and segmentation of data. It
also has acknowledgment feature and controls the flow of the data through flow control
mechanism. It is a very effective protocol but has a lot of overhead due to such features.
Increased overhead leads to increased cost.
2. User Datagram Protocol (UDP) – On the other hand does not provide any such features.
It is the go-to protocol if your application does not require reliable transport as it is very
cost-effective. Unlike TCP, which is connection-oriented protocol, UDP is
connectionless.
4. Application Layer –
This layer performs the functions of top three layers of the OSI model: Application,
Presentation and Session Layer. It is responsible for node-to-node communication and
controls user-interface specifications. Some of the protocols present in this layer are: HTTP,
HTTPS, FTP, TFTP, Telnet, SSH, SMTP, SNMP, NTP, DNS, DHCP, NFS, X Window,
LPD. Have a look at Protocols in Application Layer for some information about these
protocols. Protocols other than those present in the linked article are :
1. HTTP and HTTPS – HTTP stands for Hypertext transfer protocol. It is used by the
World Wide Web to manage communications between web browsers and servers. HTTPS
stands for HTTP-Secure. It is a combination of HTTP with SSL(Secure Socket Layer). It
is efficient in cases where the browser need to fill out forms, sign in, authenticate and
carry out bank transactions.
2. SSH – SSH stands for Secure Shell. It is a terminal emulations software similar to Telnet.
The reason SSH is more preferred is because of its ability to maintain the encrypted
connection. It sets up a secure session over a TCP/IP connection.
3. NTP – NTP stands for Network Time Protocol. It is used to synchronize the clocks on
our computer to one standard time source. It is very useful in situations like bank
transactions. Assume the following situation without the presence of NTP. Suppose you
carry out a transaction, where your computer reads the time at 2:30 PM while the server
records it at 2:28 PM. The server can crash very badly if it’s out of sync.
Network Devices (Hub, Repeater, Bridge, Switch, Router, Gateways and Brouter)
1. Repeater – A repeater operates at the physical layer. Its job is to regenerate the signal
over the same network before the signal becomes too weak or corrupted so as to extend the
length to which the signal can be transmitted over the same network. An important point to
be noted about repeaters is that they do not amplify the signal. When the signal becomes
weak, they copy the signal bit by bit and regenerate it at the original strength. It is a 2 port
device.
2. Hub – A hub is basically a multiport repeater. A hub connects multiple wires coming
from different branches, for example, the connector in star topology which connects
different stations. Hubs cannot filter data, so data packets are sent to all connected devices.
In other words, the collision domain of all hosts connected through Hub remains one.
Also, they do not have the intelligence to find out the best path for data packets which leads
to inefficiencies and wastage.
Types of Hub
Active Hub:- These are the hubs that have their own power supply and can clean,
boost, and relay the signal along with the network. It serves both as a repeater as well as
a wiring center. These are used to extend the maximum distance between nodes.
Passive Hub :- These are the hubs that collect wiring from nodes and power supply
from the active hub. These hubs relay signals onto the network without cleaning and
boosting them and can’t be used to extend the distance between nodes.
Intelligent Hub :- It works like active hubs and includes remote management
capabilities. They also provide flexible data rates to network devices. It also enables an
administrator to monitor the traffic passing through the hub and to configure each port
in the hub.
3. Bridge – A bridge operates at the data link layer. A bridge is a repeater, with add on the
functionality of filtering content by reading the MAC addresses of source and destination. It
is also used for interconnecting two LANs working on the same protocol. It has a single
input and single output port, thus making it a 2 port device.
Types of Bridges
Transparent Bridges:- These are the bridge in which the stations are completely
unaware of the bridge’s existence i.e. whether or not a bridge is added or deleted from
the network, reconfiguration of the stations is unnecessary. These bridges make use of
two processes i.e. bridge forwarding and bridge learning.
Source Routing Bridges:- In these bridges, routing operation is performed by the
source station and the frame specifies which route to follow. The host can discover the
frame by sending a special frame called the discovery frame, which spreads through the
entire network using all possible paths to the destination.
4. Switch – A switch is a multiport bridge with a buffer and a design that can boost its
efficiency(a large number of ports imply less traffic) and performance. A switch is a data
link layer device. The switch can perform error checking before forwarding data, which
makes it very efficient as it does not forward packets that have errors and forward good
packets selectively to the correct port only. In other words, the switch divides the collision
domain of hosts, but broadcast domain remains the same.
5. Routers – A router is a device like a switch that routes data packets based on their IP
addresses. The router is mainly a Network Layer device. Routers normally connect LANs
and WANs together and have a dynamically updating routing table based on which they
make decisions on routing the data packets. Router divide broadcast domains of hosts
connected through it.
7. Brouter – It is also known as the bridging router is a device that combines features of
both bridge and router. It can work either at the data link layer or a network layer. Working
as a router, it is capable of routing packets across networks, and working as the bridge, it is
capable of filtering local area network traffic.
8. NIC – NIC or network interface card is a network adapter that is used to connect the
computer to the network. It is installed in the computer to establish a LAN. It has a unique
id that is written on the chip, and it has a connector to connect the cable to it. The cable acts
as an interface between the computer and router or modem. NIC card is a layer 2 device
which means that it works on both physical and data link layer of the network model.
A network consists of two or more computers that are linked in order to share all form of
resources including communication. Both LAN and WLAN networks are interrelated and
share moreover common characteristics.
Let’s discuss about LAN and WLAN:
LAN WLAN
Nyquist's theorem specifies the maximum data rate for noiseless condition,
whereas the Shannon theorem specifies the maximum data rate under a noise
condition. The Nyquist theorem states that a signal with the bandwidth B can be
completely reconstructed if 2B samples per second are used.