Unit 1 Notes - Computer Communication
Unit 1 Notes - Computer Communication
UNIT I
Networks categories:
The Network allows computers to connect and communicate with different computers via
any medium. LAN, MAN and WAN are the three major types of the network designed to
operate over the area they cover. There are some similarities and dissimilarities between
them. One of the major differences is the geographical area they cover, i.e. LAN covers the
smallest area; MAN covers an area larger than LAN and WAN comprises the largest of all.
There are other types of Computer Networks also, like :
PAN (Personal Area Network)
SAN (Storage Area Network)
EPN (Enterprise Private Network)
VPN (Virtual Private Network)
If suppose, N number of devices are connected with each other in mesh topology, then total
number of ports that is required by each device is N-1. In the Figure 1, there are 5 devices
connected to each other, hence total number of ports required is 4.
If suppose, N number of devices are connected with each other in mesh topology, then total
number of dedicated links required to connect them is NC2 i.e. N(N-1)/2. In the Figure 1,
there are 5 devices connected to each other, hence total number of links required is 5*4/2
= 10.
It is robust.
Fault is diagnosed easily. Data is reliable because data is transferred among the
devices through dedicated channels or links.
Provides security and privacy.
Problems with this topology :
Installation and configuration is difficult.
Cost of cables are high as bulk wiring is required, hence suitable for less number of
devices.
Cost of maintenance is high.
b) Star Topology :
In star topology, all the devices are connected to a single hub through a cable. This hub is
the central node and all others nodes are connected to the central node. The hub can be
passive in nature i.e. not intelligent hub such as broadcasting devices, at the same time the
hub can be intelligent known as active hubs. Active hubs have repeaters in them.
If the concentrator (hub) on which the whole topology relies fails, the whole system
will crash down.
Cost of installation is high.
Performance is based on the single concentrator i.e. hub.
c) Bus Topology :
Bus topology is a network type in which every computer and network device is connected
to single cable. It transmits the data from one end to another in single direction. No bi-
directional feature is in bus topology.
If N devices are connected to each other in bus topology, then the number of cables
required to connect them is 1 which is known as backbone cable and N drop lines are
required.
Cost of the cable is less as compared to other topology, but it is used to built small
networks.
Problems with this topology :
If the common cable fails, then the whole system will crash down.
If the network traffic is heavy, it increases collisions in the network. To avoid this,
various protocols are used in MAC layer known as Pure Aloha, Slotted Aloha,
CSMA/CD etc.
d) Ring Topology :
In this topology, it forms a ring connecting a devices with its exactly two neighbouring
devices.
The following operations takes place in ring topology are :
One station is known as monitor station which takes all the responsibility to perform the
operations.
To transmit the data, station has to hold the token. After the transmission is done, the
token is to be released for other stations to use.
When no station is transmitting the data, then the token will circulate in the ring.
There are two types of token release techniques : Early token release releases the token
just after the transmitting the data and Delay token release releases the token after the
acknowledgement is received from the receiver.
Advantages of this topology :
The possibility of collision is minimum in this type of topology.
Cheap to install and expand.
Problems with this topology :
Troubleshooting is difficult in this topology.
Addition of stations in between or removal of stations can disturb the whole topology.
e) Hybrid Topology :
This topology is a collection of two or more topologies which are described above. This is a
scalable topology which can be expanded easily. It is reliable one but at the same it is a
costly topology.
Circuit Switching VS Packet Switching
Circuit switching is referred to as the technology of data transfer that utilises sending
messages from one point to another. This involves sending messages from the receiver to
the sender and back simultaneously. A physical connection gets established during this
process along with the receiver; a dedicated circuit is always present to handle data
transmissions, through which data is sent. Packet switching can be used as an alternative to
circuit switching. In the packet-switched networks, data is sent in discrete units that have
variable length.
https://www.geeksforgeeks.org/difference-between-circuit-switching-and-packet-switching/
Communicating systems use well-defined formats (protocol) for exchanging messages. Each
message has an exact meaning intended to elicit a response from a range of possible
responses pre-determined for that particular situation.
Standards are guidelines, these are more abstract. You can have products that meet the
standard, exceed the standard or below a certain standard.
Protocols are rules. They define exactly how data is exchanged and the expected behavior.
These are rules you must follow exactly or your device will not be able to communicate at
all with other devices. You cannot exceed the protocol but it’s possible that you do not
implement all the features of the protocols or you may implement the protocol completely.
OSI Model
o OSI stands for Open System Interconnection is a reference model that describes
how information from a software application in one computer moves through a
physical medium to the software application in another computer.
o OSI consists of seven layers, and each layer performs a particular network function.
o OSI model was developed by the International Organization for Standardization
(ISO) in 1984, and it is now considered as an architectural model for the inter-
computer communications.
o OSI model divides the whole task into seven smaller and manageable tasks. Each
layer is assigned a particular task.
o Each layer is self-contained, so that task assigned to each layer can be performed
independently
o The main functionality of the physical layer is to transmit the individual bits from one
node to another node.
o It is the lowest layer of the OSI model.
o It establishes, maintains and deactivates the physical connection.
o It specifies the mechanical, electrical and procedural network interface specifications.
Network Layer
o It is a layer 3 that manages device addressing, tracks the location of devices on the
network.
o It determines the best path to move data from source to the destination based on
the network conditions, the priority of service, and other factors.
o The Data link layer is responsible for routing and forwarding the packets.
o Routers are the layer 3 devices, they are specified in this layer and used to provide
the routing services within an internetwork.
o The protocols used to route the network traffic are known as Network layer
protocols. Examples of protocols are IP and Ipv6.
Transport Layer
o The Transport layer is a Layer 4 ensures that messages are transmitted in the order
in which they are sent and there is no duplication of data.
o The main responsibility of the transport layer is to transfer the data completely.
o It receives the data from the upper layer and converts them into smaller units known
as segments.
o This layer can be termed as an end-to-end layer as it provides a point-to-point
connection between source and destination to deliver the data reliably.
Session Layer
o A Presentation layer is mainly concerned with the syntax and semantics of the
information exchanged between the two systems.
o It acts as a data translator for a network.
o This layer is a part of the operating system that converts the data from one
presentation format to another format.
o The Presentation layer is also known as the syntax layer.
o An application layer serves as a window for users and application processes to access
network service.
o It handles issues such as network transparency, resource allocation, etc.
o An application layer is not an application, but it performs the application layer
functions.
o This layer provides the network services to the end-users.
network interface:
It include the function of physical layer and data link layer. TCP/IP protocol suite includes Host-to-
network layer protocols such as Serial Line internet protocol and point to point protocol
Internet Layer: - The internet layer is exactly same to the network layer of OSI model. IP is the primary
protocol operating at this layer and it provides data encapsulation routing, addressing and
fragmentation services to the protocols at the transport layer above it.
Transport Layer: - TCP/IP Suite includes two protocol at this layer, the transmission control protocol and
the user datagram protocol These protocol provides connection or connectionless data transfer services.
Application layer: - The TCP/IP protocol at the application layer can take different forms of Protocols,
such as the File Transfer Protocol, Hypertext Transfer Protocol.
Network Interface Layer
It is the bottom layer of TCP/IP Model lies below the Internet Layer. • It is also known as Host To
Network Layer • Function of this layer is to connect the Host To Network & inform the upper layers so
that they could start sending the data packets. • This layer varies from network to network. • Host To
Network Layer protocols • SLIP(Serial Line IP ) • PPP( Point To Point Protocol )
Serial line Internet protocol is very simple and used to connect the workstation to internet over dial-up
line using a modem. SLIP(Serial line Internet protocol ) is not a standard protocol for carrying IP
Packets over the a serial line between a home user and The ISP server. But , it has become popular
because of its simplicity . The role of SLIP begins only when there is a proper connection between the
two modem
It is not an approved internet standard. • It does not provide any authentication. • SLIP provides no way
for the two devices to communicate control information between them to manage the link. • SLIP
doesn't provide any way of detecting or correcting errors in transmissions
Point to Point Protocol is a data link layer Protocol. PPP is another examples of the evolving the nature
of internet. It has become standard internet protocol for remote access, using dial-up connection.
The basic Functionality of PPP is similar to the SLIP. It passes the and other packets in the form of
frames between a client and ISP Server. PPP is more complex than SLIP.
Line control Protocol(LCP): - The Line control protocol is responsible for establishing , maintaining the
connection between the Two end ( Home User and the ISP ) • Password Authentication Protocol( PAP ) :
- password authentication protocol is used. • Here the user must establish a proof of identity , so that he
can connect to ISP. • Network Control protocol ( NCP ): - Once the Authentication is done, PPP on the
client side sends out a NCP packet. This packet tells the ISP server what kind of traffic is to be passed
over this PPP link. • IP Control Protocol ( IPCP ) : - the IP Control Protocol takes over. Here , actual IP
packet are now exchanged. IPCP establishes the connection between the Host user and ISP.
Internet Layer
The fives network layer protocol are as follows:1. ARP 2. RARP 3. IP 4. ICMP 5. IGMP IP is an Important
protocol in this layer. ARP ( Address resolution protocol ) Every machine on internet has one address,
these address cannot actually be used for sending packets data because data link layer does not
understand the internet address. ARP Provides an essential services when TCP/IP is running in LAN.
The Reverse Address Resolution Protocol is used to obtain the IP address of a Host based on Its physical
address. That is , it preform a job that is exactly opposite to that of ARP. RARP works in a very similar
way to ARP. but in the exactly opposite direction , as shown in the side figure.
Internet Protocol ( IP )
• Internet Protocol is very important protocol present in this network layer. • IP is the protocol
responsible for carrying data, generated by nearly all the other TCP/IP protocol, from the source system
to its destination .
Application Layer
The TCP/IP Model Does Not have Session or presentation layer on the top of the transport layer. It is
just has the application layer. It contains all higher level protocols. Higher Level Protocols Used in
application layer are as Follows:
TELNET: - the virtual terminal protocol allows a user on one machine to log onto a distant
machine and work there.
FTP: - File Transfer protocol provides a way to move data efficiently from one machine to
another.
SMTP: - Simple mail transfer protocol developed for email transfer.
DNS: -Domain Name System Protocol is used for mapping the host names onto their network
address.
HTTP: -hyper Text transfer Protocol is used for fetching pages on the world wide web (WWW)
and many others.
Serial and Parallel Transmission
When data is sent or received using serial data transmission, the data bits are organized in a specific
order, since they can only be sent one after another. The order of the data bits is important as it dictates
how the transmission is organized when it is received. It is viewed as a reliable data transmission
method because a data bit is only sent if the previous data bit has already been received.
Data bits can be sent at any point in time. Stop bits and start bits are used between data bytes to
synchronize the transmitter and receiver and to ensure that the data is transmitted correctly. The time
between sending and receiving data bits is not constant, so gaps are used to provide time between
transmissions.
The advantage of using the asynchronous method is that no synchronization is required between the
transmitter and receiver devices. It is also a more cost effective method. A disadvantage is that data
transmission can be slower, but this is not always the case.
Data bits are transmitted as a continuous stream in time with a master clock. The data
transmitter and receiver both operate using a synchronized clock frequency; therefore, start bits, stop
bits, and gaps are not used. This means that data moves faster and timing errors are less frequent
because the transmitter and receiver time is synced. However, data accuracy is highly dependent on
timing being synced correctly between devices. In comparison with asynchronous serial transmission,
this method is usually more expensive.
parallel transmission
When data is sent using parallel data transmission, multiple data bits are transmitted over multiple
channels at the same time. This means that data can be sent much faster than using serial transmission
methods.
Given that multiple bits are sent over multiple channels at the same time, the order in which a bit string
is received can depend on various conditions, such as proximity to the data source, user location, and
bandwidth availability. Two examples of parallel interfaces can be seen below. In the first parallel
interface, the data is sent and received in the correct order. In the second parallel interface, the data is
sent in the correct order, but some bits were received faster than others .
it is easier to program;
and data is sent faster.
Although parallel transmission can transfer data faster, it requires more transmission channels than
serial transmission. This means that data bits can be out of sync, depending on transfer distance and
how fast each bit loads. A simple of example of where this can be seen is with a voice over IP (VOIP) call
when distortion or interference is noticeable. It can also be seen when there is skipping or interference
on a video stream.
Addressing
It is worth mentioning another concept related to protocol layering in the Internet, addressing. As we
discussed before, we have logical communication between pairs of layers in this model. Any
communication that involves two parties needs two addresses: source address and destination address.
Although it looks as if we need five pairs of addresses, one pair per layer, we normally have only four
because the physical layer does not need addresses; the unit of data exchange at the physical layer is a
bit, which definitely cannot have an address. Figure 2.9 shows the addressing at each layer. As the
figure shows, there is a relationship between the layer, the address used in that layer, and the packet
name at that layer. At the application layer, we normally use names to define the site that provides
services, such as someorg.com, or the e-mail
address, such as [email protected]. At the transport layer, addresses are called port numbers,
and these define the application-layer programs at the source and destination. Port numbers are local
addresses that distinguish between several programs running at the same time. At the network-layer,
the addresses are global, with the whole Internet as the scope. A network-layer address uniquely
defines the connection of a device to the Internet. The link-layer addresses, sometimes called MAC
addresses, are locally defined addresses, each of which defines a specific host or router in a network
(LAN or WAN