Module 1 Notes
Module 1 Notes
Module 1
Syllabus
Introduction to Networks:
Network and uses of Networks, Types and topologies of Networks, TCP/IP Model, The
OSI vs TCP/IP reference model, Architecture of Internet, Guided and wireless
transmission media, Switching.
Data Communication:
The term “Data Communication” comprises two words: Data and Communication. Data can
be any text, image, audio, video, or multimedia files. Communication is an act of sending or
receiving data. Thus, data communication refers to the exchange of data between two or
more networked or connected devices. These devices must be capable of sending and
receiving data over a communication medium. Examples of such devices include personal
computers, mobile phones, laptops, etc. As we can see in Figure, four different types of
devices — computer, printer, server, and switch are connected to form the network. These
devices are connected through a media to the network, carrying information from one end to
another.
Whenever we talk about communication between two computing devices using a network,
five most important aspects come to our mind. These are sender, receiver, communication
medium, the message to be communicated, and certain rules called protocols to be
followed during communication. The communication media is also called transmission
media. Figure 1.1 shows the role of these five components in data communication.
1
S@M
Jain (Deemed-to-be) University
Sender: A sender is a computer or any such device which is capable of sending data over a
network. It can be a computer, mobile phone, smartwatch, walkie-talkie, video recording
device, etc.
Receiver: A receiver is a computer or any such device which is capable of receiving data
from the network. It can be any computer, printer, laptop, mobile phone, television, etc. In
computer communication, the sender and receiver are known as nodes in a network.
Message: It is the data or information that needs to be exchanged between the sender and
the receiver. Messages can be in the form of text, number, image, audio, video, multimedia,
etc.
Communication media: It is the path through which the message travels between source
and destination. It is also called medium or link which is either wired or wireless. For
example, a television cable, telephone cable, ethernet cable, satellite link, microwaves, etc.
Protocols: It is a set of rules that need to be followed by the communicating parties in order
to have successful and reliable data communication. You have already come across
protocols such as Ethernet and HTTP.
Simplex communication
2
S@M
Jain (Deemed-to-be) University
For example, data entered through a keyboard or audio sent to a speaker are one-way
communications. With the advent of IoT, controlling home appliances is another example of
simplex communication as shown in Figure 1.3. One can control fans, lights, fridge, oven,
etc. while sitting in the office or driving a car.
Half-duplex Communication
It is two way or bidirectional communication between two devices in which both the devices
can send and receive data or control signals in both directions, but not at the same time, as
shown in Figure 1.4. While one device is sending data, the other one will receive and vice-
versa. It is like sharing a one-way narrow bridge among vehicles moving in both directions.
Vehicles cannot pass the bridge simultaneously. Basically, it is a simplex channel where the
direction of transmission can be switched. Application of such type of communication can
be found in walkie-talkie where one can press the push-to-talk button and talk. This enables
the transmitter and turns off the receiver in that device and others can only listen.
Full-duplex Communication
It is two way or bidirectional communication in which both devices can send and receive
data simultaneously, as shown in Figure 1.5. It is like a two way road where vehicles can go
in both directions at the same time. This type of communication channel is employed to
allow simultaneous communication, for example, in our mobile phones and landline
telephones. The capacity of the transmission link is shared between the signals going in
3
S@M
Jain (Deemed-to-be) University
both directions. This can be done either by using two physically separate simplex lines —
one for sending and other for receiving, or the capacity of the single channel is shared
between the signals travelling in different directions.
Transmission Medium
A twisted-pair consists of two copper wires twisted like a DNA helical structure. Both the
copper wires are insulated with plastic covers. Usually, a number of such pairs are
combined together and covered with a protective outer wrapping, as shown in Figure 1.6.
4
S@M
Jain (Deemed-to-be) University
Each of the twisted pairs act as a single communication link. The use of twisted
configuration minimises the effect of electrical interference from similar pairs close by.
Twisted pairs are less expensive and most commonly used in telephone lines and LANs.
These cables are of two types: Unshielded twisted-pair (UTP) and Shielded twisted-pair
(STP), as shown in Figure 1.7.
5
S@M
Jain (Deemed-to-be) University
cable's copper core to transmit data quickly, without interference of environmental factors.
These types of cables are used to carry signals of higher frequencies to a longer distance.
6
S@M
Jain (Deemed-to-be) University
7
S@M
Jain (Deemed-to-be) University
Transmission Properties
Waves
Radio Waves
1. Waves of frequency range 3 KHz - 1 GHz
2. Omni-directional, these waves can move in all directions
3. Radio waves of frequency 300KHz-30MHz can travel long distance
4. Susceptible to interference
5. Radio waves of frequency 3-300KHz can penetrate walls
6. These waves are used in AM and FM radio, television, cordless phones.
Microwaves
1. Electromagnetic waves of frequency range 1GHz - 300GHz.
2. Unidirectional, can move in only one direction.
3. Cannot penetrate solid objects such as walls, hills or mountains.
4. Needs line-of-sight propagation i.e. both communicating antenna must be in the
direction of each other.
5. Used in point-to-point communication or unicast communication such as radar
and satellite.
6. Provide very large information-carrying capacity.
Infrared waves
1. Electromagnetic waves of frequency range 300GHz - 400THz.
2. Very high frequency waves.
3. Cannot penetrate solid objects such as walls.
4. Used for short-distance point-to-point communication such as mobile-to-mobile,
mobile-to-printer, remote-control-to-TV, and Bluetooth-enabled devices to other devices
like mouse, keyboards etc.
Wireless Technologies
(A) Bluetooth
8
S@M
Jain (Deemed-to-be) University
Bluetooth technology allows up to 255 devices to build a network. Out of them, 8 devices
can communicate at the same time and remaining devices can be inactive, waiting for a
response command from the master device.
Topology defines the structure of the network of how all the components are interconnected
to each other. There are two types of topology: physical and logical topology.
Physical topology is the geometric representation of all the nodes in a network. There are
six types of network topology which are Bus Topology, Ring Topology, Tree Topology, Star
Topology, Mesh Topology, and Hybrid Topology.
9
S@M
Jain (Deemed-to-be) University
Bus Topology
The bus topology is designed in such a way that all the stations are connected
through a single cable known as a backbone cable.
Each node is either connected to the backbone cable by drop cable or directly
connected to the backbone cable.
When a node wants to send a message over the network, it puts a message over the
network. All the stations available in the network will receive the message whether it
has been addressed or not.
The bus topology is mainly used in 802.3 (ethernet) and 802.4 standard networks.
The configuration of a bus topology is quite simpler as compared to other topologies.
Low-cost cable: In bus topology, nodes are directly connected to the cable without
passing through a hub. Therefore, the initial cost of installation is low.
Moderate data speeds: Coaxial or twisted pair cables are mainly used in bus-based
networks that support upto 10 Mbps.
Familiar technology: Bus topology is a familiar technology as the installation and
troubleshooting techniques are well known, and hardware components are easily
available.
Limited failure: A failure in one node will not have any effect on other nodes.
Extensive cabling: A bus topology is quite simpler, but still it requires a lot of
cabling.
Difficult troubleshooting: It requires specialized test equipment to determine the
cable faults. If any fault occurs in the cable, then it would disrupt the communication
for all the nodes.
Signal interference: If two nodes send the messages simultaneously, then the
signals of both the nodes collide with each other.
Reconfiguration difficult: Adding new devices to the network would slow down the
network.
10
S@M
Jain (Deemed-to-be) University
Ring Topology
A token moves around the network, and it is passed from computer to computer until
it reaches the destination.
The sender modifies the token by putting the address along with the data.
The data is passed from one device to another device until the destination address
matches. Once the token received by the destination device, then it sends the
acknowledgment to the sender.
In a ring topology, a token is used as a carrier.
Network Management: Faulty devices can be removed from the network without
bringing the network down.
11
S@M
Jain (Deemed-to-be) University
Product availability: Many hardware and software tools for network operation and
monitoring are available.
Cost: Twisted pair cabling is inexpensive and easily available. Therefore, the
installation cost is very low.
Reliable: It is a more reliable network because the communication system is not
dependent on the single host computer.
Star Topology
12
S@M
Jain (Deemed-to-be) University
A Central point of failure: If the central hub or switch goes down, then all the
connected nodes will not be able to communicate with each other.
Cable: Sometimes cable routing becomes difficult when a significant amount of
routing is required.
13
S@M
Jain (Deemed-to-be) University
Tree topology
Tree topology combines the characteristics of bus topology and star topology.
A tree topology is a type of structure in which all the computers are connected with
each other in hierarchical fashion.
The top-most node in tree topology is known as a root node, and all other nodes are
the descendants of the root node.
There is only one path exists between two nodes for the data transmission. Thus, it
forms a parent-child hierarchy.
Difficult troubleshooting: If any fault occurs in the node, then it becomes difficult to
troubleshoot the problem.
High cost: Devices required for broadband transmission are very costly.
14
S@M
Jain (Deemed-to-be) University
Failure: A tree topology mainly relies on main bus cable and failure in main bus
cable will damage the overall network.
Reconfiguration difficult: If new devices are added, then it becomes difficult to
reconfigure.
Mesh topology
Hybrid Topology
15
S@M
Jain (Deemed-to-be) University
Reliable: If a fault occurs in any part of the network will not affect the functioning of
the rest of the network.
Scalable: Size of the network can be easily expanded by adding new devices
without affecting the functionality of the existing network.
Flexible: This topology is very flexible as it can be designed according to the
requirements of the organization.
Effective: Hybrid topology is very effective as it can be designed in such a way that
the strength of the network is maximized and weakness of the network is minimized.
Complex design: The major drawback of the Hybrid topology is the design of the
Hybrid network. It is very difficult to design the architecture of the Hybrid network.
Costly Hub: The Hubs used in the Hybrid topology are very expensive as these hubs
are different from usual Hubs used in other topologies.
Costly infrastructure: The infrastructure cost is very high as a hybrid network
requires a lot of cabling, network devices, etc.
TCP/IP Model
16
S@M
Jain (Deemed-to-be) University
The TCP/IP model, also known as the Internet Protocol Suite, is a conceptual framework
that describes the protocols and standards used for communication on the Internet. It
consists of four layers, each responsible for specific functions. Let's explore each layer and
its duties:
1. Application Layer:
The Application layer is the topmost layer in the TCP/IP model and is closest to the end-
user. It provides network services and protocols that enable user applications to access
network resources. Some of the protocols and services at this layer include:
- Hypertext Transfer Protocol (HTTP): Used for web browsing and accessing websites.
- Simple Mail Transfer Protocol (SMTP): Responsible for sending and receiving email.
- File Transfer Protocol (FTP): Used for transferring files between systems.
- Simple Network Management Protocol (SNMP): Used for network management and
monitoring.
The Application layer handles application-specific data and encapsulates it into protocols
that can be transmitted over the network.
2. Transport Layer:
The Transport layer is responsible for reliable and efficient data transfer between end
systems. It ensures that data is transmitted accurately, in the correct order, and without
errors. The primary protocols at this layer are:
The Transport layer also handles port addressing to ensure that data reaches the correct
application on the destination system.
3. Internet Layer:
The Internet layer is responsible for addressing, routing, and fragmenting data packets
across different networks. It handles logical addressing using IP (Internet Protocol)
addresses and performs routing functions to direct packets from the source to the
destination. Key protocols at this layer include:
17
S@M
Jain (Deemed-to-be) University
- Internet Protocol (IP): Provides the addressing and routing mechanisms for data
packets.
- Internet Control Message Protocol (ICMP): Used for error reporting and diagnostic
functions.
The Internet layer encapsulates data received from the Transport layer into IP packets
and adds the necessary addressing information for delivery.
The Network Interface layer is responsible for the physical transmission of data packets
over the network medium. It deals with the protocols and hardware required to transmit data
over specific types of networks, such as Ethernet, Wi-Fi, or DSL. This layer includes
protocols like Ethernet, Wi-Fi, and Point-to-Point Protocol (PPP).
The Network Interface layer converts the IP packets received from the Internet layer into a
format suitable for transmission over the physical network medium.
It's important to note that the TCP/IP model does not strictly adhere to the layered approach
of the OSI model. The TCP/IP model combines certain functions of the OSI model into
fewer layers to better reflect the protocols and architecture used on the Internet.
OSI Model
18
S@M
Jain (Deemed-to-be) University
1. Physical Layer:
The Physical layer is the lowest layer in the OSI model and deals with the physical
transmission of data. It defines the electrical, mechanical, and physical specifications for
transmitting raw data over a communication medium. Key functions include:
- Transmission of bits over a communication medium (e.g., copper wires, optical fibers,
wireless signals).
The Physical layer ensures the reliable transmission of individual bits without concern for
the meaning or structure of the data.
The Data Link layer provides reliable point-to-point or point-to-multipoint data transmission
within a local network. It is responsible for organizing bits into frames, detecting and
correcting transmission errors, and managing access to the physical medium. Key functions
include:
- Framing: Dividing the raw data into logical frames for transmission.
- Physical addressing: Assigning unique addresses to devices on the local network (MAC
addresses).
19
S@M
Jain (Deemed-to-be) University
- Error detection and correction: Verifying the integrity of transmitted data and
retransmitting corrupted frames if necessary.
- Media access control: Regulating access to the shared network medium to prevent
collisions (e.g., using protocols like Ethernet).
The Data Link layer establishes a reliable link between directly connected devices and
ensures error-free transmission within the local network.
3. Network Layer:
The Network layer provides the functionality to route data across multiple networks or
subnets. It is responsible for logical addressing, routing packets, and managing network
congestion. Key functions include:
- Routing: Determining the optimal path for data packets to reach their destination.
- Fragmentation and reassembly: Breaking large packets into smaller ones for
transmission and reassembling them at the destination.
- Network congestion control: Managing network traffic to prevent congestion and ensure
efficient data delivery.
4. Transport Layer:
The Transport layer provides reliable, end-to-end data transfer between applications on
different hosts. It ensures that data is delivered accurately, in the correct order, and without
errors. Key functions include:
- Segmentation and reassembly: Breaking data into smaller segments for transmission
and reassembling them at the destination.
- Flow control: Regulating the amount of data sent to prevent overwhelming the receiving
device.
- Error detection and recovery: Verifying data integrity and retransmitting lost or corrupted
segments.
20
S@M
Jain (Deemed-to-be) University
5. Session Layer:
The Session layer provides the mechanisms for establishing and managing
communication sessions between applications.
6. Presentation Layer:
The Presentation layer handles the syntax and semantics of the information exchanged
between applications. It is responsible for data formatting, compression, encryption, and
decryption. Key functions include:
- Data translation and formatting (e.g., converting between different data formats or
character encodings).
The Presentation layer ensures that data sent by one application is understood by another
application.
7. Application Layer:
The Application layer is the topmost layer in the OSI model and represents the actual
applications and services used by end-users. It provides a platform for applications to
access network services and interact with the underlying layers. Key functions include:
- Network services such as email, file transfer, remote login, and web browsing.
The Application layer is where end-user applications and services directly interact with the
network.
21
S@M
Jain (Deemed-to-be) University
It's important to note that while the OSI model provides a standardized framework, most
modern networking implementations, such as the TCP/IP model, do not strictly adhere to its
exact layering. However, the OSI model remains a valuable reference for understanding the
various functions involved in network communication.
The OSI (Open Systems Interconnection) model and the TCP/IP (Transmission Control
Protocol/Internet Protocol) model are two different conceptual models that describe network
protocols and their interactions. Here are some key points of comparison between the two:
TCP/IP VS OSI
Development - TCP/IP Model: The TCP/IP - OSI Model: The OSI model was
and Standards model predates the OSI model developed in the late 1970s and
and was developed by the U.S. early 1980s by the International
Department of Defense in the Organization for Standardization
1970s for their ARPANET (ISO). It was an attempt to
project, which eventually standardize network protocols and
became the foundation for the facilitate interoperability between
modern Internet. TCP/IP has different vendor systems.
become the de facto standard
for networking protocols on the
Internet.
Layer - TCP/IP Model: The TCP/IP - OSI Model: The OSI model
Functionality model has less strict layering defines a clear separation of
and some overlapping functions into distinct layers, with
functionality. It combines each layer responsible for specific
multiple functions of the OSI tasks. It emphasizes modularity
model into fewer layers, often and encapsulation, enabling easier
with less well-defined implementation of new protocols.
boundaries.
Adoption and - TCP/IP Model: The TCP/IP - OSI Model: Despite its initial
Practicality model has been widely adopted intentions, the OSI model has not
and is the basis for the Internet. been widely implemented in
Most modern networks, including practice. It remains more of a
the Internet itself, are built on theoretical framework and is
22
S@M
Jain (Deemed-to-be) University
Compatibility - TCP/IP Model: The TCP/IP - OSI Model: The OSI model is
model is specifically designed to not directly compatible with TCP/IP
work with TCP/IP protocols and protocols. However, it serves as a
aligns with the protocols used on conceptual model that helps in
the Internet. understanding and designing
network protocols and
architectures.
Layer Names While there are similarities between the layers of the two models, the
and Functions mapping is not one-to-one. Here's a rough mapping of layers between
the two models:
- TCP/IP Network Interface layer corresponds to the Physical and
Data Link layers of the OSI model.
- TCP/IP Internet layer corresponds to the Network layer of the OSI
model.
- TCP/IP Transport layer corresponds to the Transport layer of the
OSI model.
- TCP/IP Application layer corresponds to the Session, Presentation,
and Application layers of the OSI model.
23
S@M
Jain (Deemed-to-be) University
Switching Technique
24
S@M
Jain (Deemed-to-be) University
Switching techniques refer to the methods used to establish connections and forward data
packets within a network. There are several switching techniques commonly used in
computer networks. Let's explore them in detail:
1. Circuit Switching:
Circuit switching is a switching technique that establishes a dedicated communication
path between two endpoints for the duration of a connection. The path remains allocated
exclusively to the connection, regardless of whether data is being transmitted or not. Key
features of circuit switching include:
2. Packet Switching:
Packet switching is a switching technique that breaks data into smaller packets and
transmits them independently over the network. Each packet is treated as an independent
unit and can take different paths to reach the destination. Key features of packet switching
include:
- Packetization: Data is divided into smaller packets, typically with a fixed maximum size.
25
S@M
Jain (Deemed-to-be) University
3. Message Switching:
Message switching is a switching technique where data is transmitted in the form of
complete messages or blocks. The entire message is stored and forwarded through the
network, potentially taking different routes to reach the destination. Key features of
message switching include:
26
S@M