Unit-1 Computer Network
Unit-1 Computer Network
Computer Network:
Computer network is a group of computers that are connected and communicated together for the
purpose of message passing, sharing the resources, data and applications.
1. Resource Sharing: The main goal of a computer network is the resource sharing, means that
any computer can access the resources such as printers, disk or application software on the
network without considering its geographical location on the network.
2. Information Sharing: On the network, any computer can receive and transmit the information;
therefore it provides easy accessibility of files or database. And it also improves the search
capability of the network.
3. Remote Computing: A remote computer is a computer that a user has no access to physically, but
may be able to access it remotely via a network link from another computer. Remote connections are
made through the use of a network which connects the computer and the device that is used to access
it.
4. High Reliability: Computer Network provides the high reliability of the shared information. E.g.
all files can be recreated on a few machines, and thus if one of them is non-existent, the
additional copies could be available.
5. Communication: The main application of a computer network is the message passing
between different computer systems via e mail or broadcasting the messages.
www.Citizenchoice.in
performance of the system. A system’s performance can be improved by inserting one or more
processors into it as its workload grows. For example, if the system is full, replacing it with a
larger one at a large expense, it is better to add more processors to it at less cost and less
disruption to the user. This improves both accessibilities as well as the performance of a system.
7. Communication Medium:
Computer network provides a powerful communication medium so that any user on the network
can immediately identify a file or document that has been updated on a network.it allows inter
process communication.
8. Cost Saving:
Computer network provides resource sharing with high reliability, therefore it saves money
also.
9. Distributed processing (GRID Computing): Computer network provides Grid computing .It
is define as multiple computers geographically apart from each other but connected by the
network and work together as a single computer system with resource sharing.
10. Easy Accessibility: Files can be accessed from any computer in the network. The project
can be begun on one computer and finished on another.
RESOURCE SHARING
COMPUTER NETWORK
GOALS
COMMUNICATION PERFORMANCE
MEDIUM ENHANCEMENTS
www.Citizenchoice.in
CHAPTER 2: APPLICATIONS OF COMPUTER
NETWORK
Now a days computer network uses in each and every field such as banking transactions, hospital
management, hotel management, Agriculture etc. some of the applications of computer network is as
follows:
1. Marketing and sales: In marketing and sales, it provides security so only authenticates user can buy
or sell the products. Market analyst analyses the data and scales products on demand.
These applications include online reservation system such as hotels, railways, airlines and restaurants
etc.
2. Chat Groups: computer network allows chat groups between the users without considering their
geographical locations or which system they are using to connect over a network such as mobile phone
or computer system.
3. Searchable Data (Web Sites): Any authentic user can access and search desirable content or data
on computer network.
5. Access to remote programs : it allows to access and use the computer programs which is reside
on the remote computers (long distant from the user computer ).
6. Access to remote databases: computer network also allows the remote database reliable and
authentic access to the users.
8. Financial services: It include Banking services , investment services and fund transfer (EFT), which
allow a user to transfer money without going to bank.
9. Manufacturing: computer networks are used today in many aspects of manufacturing, including the
manufacturing processes itself. Two aspects that uses network to provide essential services are
computer Assisted design (CAD) and computer Assisted manufacturing (CAM), both of which allow
multiple user to work on a project simultaneously.
10. Electronic Messaging: E-mails transfer the messages between two and more users in a network.
With this application user can transfer the information in the form of text, picture and voice.
11. Directory Services: It allows list of files to be stored in central location to speed up the world wide
search operation. E.g. search engines like Google, Britannia, and Yahoo etc.
www.Citizenchoice.in
12. Information Services: It includes Bulletin Boards and data bank. A ‘www’ site offering the technical
specification for a new product in a information services.
13. Electronic Data Exchange (EDI): EDI allows business information (including documents such as
purchase orders and services) to be transferred without using paper.
14. Teleconferencing: It allows conference to occur without the participant being in the same location.
It includes:
15. Text Conferencing: Participant communicates through their keywords and computer monitors.
18. Cellular Telephone and Cable TV : Wireless phone communication even while travelling through
long distance. Cable TV is widest usable thing today throughout the world.
TELECONFERENCING, TEXT
DIRECTORY SERVICES, CONFERENCING, VOICE
FINANCIAL SERVICES, CONFERENCING, VIDEO
INFORMATION SERVICES CONFERENCING
ACCESS TO REMOTE
DATABSE ACCESS TO REMOTE
PROGRAMS
www.Citizenchoice.in
CCCCC
A computer network can be categorized by their size. A computer network is mainly of four types:
www.Citizenchoice.in
1.1 LAN (LOCAL AREA NETWORK)
Local Area Network is a group of computers connected to each other in a small area such as
building, office.LAN is used for connecting two or more personal computers through a
communication medium such as twisted pair, coaxial cable, etc.It is less costly as it is built with
inexpensive hardware such as hubs, network adapters, and ethernet cables.
The data is transferred at an extremely faster rate in Local Area Network.
Local Area Network provides higher security.
1.2 PAN(PERSONAL AREA NETWORK)
Personal Area Network is a network arranged within an individual person, typically within a
range of 10 meters.Personal Area Network is used for connecting the computer devices of
personal use is known as Personal Area Network.Thomas Zimmerman was the first research
scientist to bring the idea of the Personal Area Network.Personal Area Network covers an area
of 30 feet.Personal computer devices that are used to develop the personal area network are
the laptop, mobile phones, media player and play stations.
TYPES OF PAN
1.2.1 Wireless Personal Area Network: Wireless Personal Area Network is developed by simply
using wireless technologies such as WiFi, Bluetooth. It is a low range network.
1.2.2 Wired Personal Area Network: Wired Personal Area Network is created by using the USB.
LAN 2
LAN 1
HOSPITAL
FACTORY
LAN
LAN
LAN 2 LAN 2
COLLEGE SCHOOL
LAN LAN
www.Citizenchoice.in
Applications
• MAN is used in communication between the banks in a city.
• It can be used in an Airline Reservation.
• It can be used in a college within a city.
• It can also be used for communication in the military.
www.Citizenchoice.in
Differences between LAN, MAN and WAN
LAN MAN WAN
ABBERVATIONS LAN stands for MAN stands for WAN stands for
local area metropolitan area wide area
network. network network.
SPEED Early Lan had data Moderate speed Few kbps to mbps, less
speed 4 to 16 mbps but speed than LAN
today’s LAN speed is
100 to 1000 mbps.
www.Citizenchoice.in
this architecture, system is generally decomposed into various computational nodes that
contain the same and equivalent capabilities, abilities, and responsibilities. In this network,
tasks are allocated at each and every device available on network. This network is very
essential and important for small environments, usually up to at least 10 computers. There is
also no separate division as clients and servers. Each and every computer in this network are
treated same and equally and might send even receive message directly. This P2P network is
generally useful in various fields such as business, education, military, etc.
Advantages :
• Dedicated server or centralized is not very essential, so P2P network is less costly and is very
cheaper. It is affordable.
• P2P is very simple and not complex. This is because all computers that are connected in
network communication in an efficient and well-mannered with each other.
• It is very easy and simple to set up and manage as installation and setup is less painless and
computer manages itself. This is because of built-in support in modern operating systems.
Disadvantages :
• Security is one of major issues in this type of network. This is because message that
is sent flows freely among connected computers.
• If computer working with some of resources is down and sharing of resources might
become major problem.
• Performance, security, and access can also become major problem and headache
with an increase in number of computers on this network.
www.Citizenchoice.in
• Advantages :
• It is also very easy and simple to set up and manage data updates. This is because data is
generally stored in centralized manner on server.
• Disadvantages :
• It is very expensive as compared to P2P. This is due to need for server with greater memory
as well as need for many networking devices such as hubs, routers, switches, etc.
www.Citizenchoice.in
CHAPTER 4 : INTERNETWORK
INTERNETWORK:
An internetwork is defined as two or more computer network LANs or WAN or computer network
segments are connected using devices, and they are configured by a local addressing scheme. This
process is known as internetworking.An interconnection between public, private, commercial,
industrial, or government computer networks can also be defined as internetworking.An
internetworking uses the internet protocol.
Types of Internetwork:
1. Extranet
2. Intranet
1. Extranet: An extranet is a communication network based on the internet protocol such
as Transmission Control protocol and internet protocol. It is used for information sharing.
The access to the extranet is restricted to only those users who have login credentials. An
extranet is the lowest level of internetworking. It can be categorized as MAN, WAN or other
computer networks. An extranet cannot have a single LAN, atleast it must have one connection
to the external network.
Extranet refers to network within an organization, using internet to connect to the outsiders in
controlled manner. It helps to connect businesses with their customers and suppliers and
therefore allows working in a collaborative manner.
www.Citizenchoice.in
2. Intranet: An intranet is a private network based on the internet protocol such as Transmission
Control protocol and internet protocol. An intranet belongs to an organization which is only
accessible by the organization's employee or members. The main aim of the intranet is to share the
information and resources among the organization employees. An intranet provides the facility to work
in groups and for teleconferences.
Characteristics of Intranet
• Intranet is defined as private network of computers within an organization with its own server
and firewall. Moreover we can define Intranet as:
• Intranet is system in which multiple PCs are networked to be connected to each other. PCs in
intranet are not available to the world outside of the intranet.
• Usually each company or organization has their own Intranet network and members/employees
of that company can access the computers in their intranet.
• Each computer in Intranet is also identified by a IP Address, which is unique among the
computers in that Intranet.
Advantages of Intranet
• Collaboration: Collaboration is one of the most important advantage of the intranet. The
information is distributed among the employees of the organization and can only be accessed
by the authorized user.
• Cost effective: People can see the data and documents by using the browser and distributes
the duplicate copies over the intranet. This leads to a reduction in the cost.
www.Citizenchoice.in
Differences between Intranet and Extranet
www.Citizenchoice.in
CHAPTER 5 : ORGANIZATION OF NETWORK
The Internet is a collection of autonomous and interconnected networks that implement open protocols
and standards. No single person, government or organization owns or controls the Internet or the
World Wide Web. A non-profit organization called ISOC (Internet Society) has some control over the
future of the Internet.
The Internet is the network of networks and the network allows to exchange of the data between two or
more computers. The Web is a way to access Information through the Internet. The Web is a model
for sharing information using Internet. The Internet is a way of transporting information between
devices
Internet Organizations
• A non-profit organization called ISOC (Internet Society) has some control over the future of
the Internet. It appoints a technical advisory group callethe IAB (Internet Architecture Board)
to evaluate and set standards.
• Input on protocols and standards can come from anybody – individuals, research groups,
companies and universities. A specification is submitted as an Internet draft and made
available for review and comments. Various Internet organizations evaluate whether these
specifications should be advanced – through a process that may elevate the specification
through different levels until it potentially reaches a ‘standards’ status.
• In general, the IETF (Internet Engineering Task Force) forms working groups to develop
specifications, which are evaluated by the IESG (Internet Engineering Steering Group) in
conjunction with the IAB. ISOC then publicizes the new standards. Web standards are
promulgated by the W3C (World Wide Web Consortium) and other groups.
• W3C develops interoperable technologies (specifications, guidelines, software and tools) for
the Web. Its goal is to lead the World Wide Web to its full potential by developing protocols
and guidelines that ensure long-term growth for the Web.
• The W3C is an international industry consortium founded in October 1994 to develop common
protocols that promote the evolution of the World Wide Web and ensure its interoperability.
• Services provided by the Consortium include: a repository of information about the World Wide
Web for developers and users; reference code implementations to embody and promote
standards; and various prototype and sample applications to demonstrate use of new
technology.
www.Citizenchoice.in
1. IETF (Internet Engineering Task Force)
The IETF is a large open international community of network designers, operators, vendors and
researchers concerned with the evolution of the Internet architecture and the smooth operation
of the Internet. The actual technical work of the IETF is done in its working groups which
include Applications, Internet, Network Management, Operational Requirements, Routing,
Security, Transport and User Services. Working groups are managed by members of the
IESG. The IAB provides architectural oversight. The IETF also facilitates technology transfers
from the IRTF to the wider Internet community. It is open to any interested individual.
WAI develops guidelines which are widely regarded as the international standard for Web
accessibility and support materials to help understand and implement Web accessibility
through international collaboration.
4. ISP stands for Internet Service Provider which is a term used to refer to a company that
provides internet access to people who pay the company or subscribe to the company for the
same. For their services, the customers have to pay the internet service provider a nominal fee
which varies according to the amount of data they actually use or the data plan which they
purchase. An Internet Service Provider is also known as an Internet Access Provider or an
online service provider. An Internet Service Provider is a must if one wants to connect to the
internet.
User Support: Professionals and an increasing number of lay users prefer an ISP that can
provide them with customer support so that they have someone they can refer to if things go
awry.
Access to high-speed internet: Probably the most obvious item on this list as this feature os
an Internet Service Provider lies literally in its name. Furthermore, the higher the speed an
Internet Service Provider can offer one, the better it’s standing in the market and the more
customers it can attract.
Spam Blocker: An Internet Service Provider that hinders its customers’ productivity by way of
not blocking spam and displaying frequent ads is not something that is generally favoured in
the market today. Therefore, many of the Internet Service Providers offer spam blocking
features to their customers.
Web Hosting: Some of the ISPs offer web hosting services to their clientele as well.
www.Citizenchoice.in
4.2 Different types of ISP connections
DSL, Wi-Fi broadband, mobile broadband, fibre optic broadband, cable broadband
Vodafone Idea
Airtel
BSNL
Hathway
Many ISPs, being professional companies, provide its clientele with high-speed internet and
that is not possible if one decides to sidesteps these companies.
The ISPs are secure – they offer a tremendous deal of protection against viruses and use only
the latest software patches whilst operating and thereby, maintaining the integrity of the
browser.
If an Internet Service Provider is stretched thin because of hosting too many sites on a shared
server, it can compromise the quality of the customers’ data by way of slow download rates and
poor performance of websites.
www.Citizenchoice.in
CHAPTER 6: OSI REFERENCE MODEL
OSI MODEL
OSI Model is an OPEN SYSTEM INTERCONNECTION model. It is a reference model that defines how
information from a software application in one computer moves through a physical medium to the
software application in another computer. OSI consists of seven layers, and each layer performs a
particular network function.
OSI model was developed by the International Organization for Standardization (ISO) in 1984, and it is
now considered as an architectural model for the inter-computer communications.
• OSI model divides the whole task into seven smaller and manageable tasks. Each layer is
assigned a particular task.
• Each layer is self-contained, so that task assigned to each layer can be performed
independently.
• All these 7 layers work collaboratively to transmit the data from one person to another across
the globe.
• The OSI model is divided into two layers: upper layers and lower layers.
• The upper layer of the OSI model mainly deals with the application related issues, and they are
implemented only in the software. The application layer is closest to the end user. Both the end
user and the application layer interact with the software applications. An upper layer refers to
the layer just above another layer.
• The lower layer of the OSI model deals with the data transport issues. The data link layer and
the physical layer are implemented in hardware and software. The physical layer is the lowest
layer of the OSI model and is closest to the physical medium. The physical layer is mainly
responsible for placing the information on the physical medium.
www.Citizenchoice.in
Layer 7: APPLICATION LAYER APDU
www.Citizenchoice.in
1. Physical Layer (Layer 1) :
The lowest layer of the OSI reference model is the physical layer. It is responsible for the actual physical
connection between the devices. The physical layer contains information in the form of bits. It is responsible
for transmitting individual bits from one node to the next. When receiving data, this layer will get the signal
received and convert it into 0s and 1s and send them to the Data Link layer, which will put the frame back
together. Physical layer co-ordinates the functions required to transmit a bit stream over a physical
medium. It deals with the mechanical and electrical specifications of the interface and transmission
medium.
www.Citizenchoice.in
communication but not at the same time. In full duplex mode two devices can
send and receive data simultaneously.
www.Citizenchoice.in
FUNCTIONS AND RESPONSBILITIES OF DATA LINK LAYER
1 Framing Framing is a function of the data link layer. It provides a way for a sender to
transmit a set of bits that are meaningful to the receiver. This can be
accomplished by attaching special bit patterns to the beginning and end of the
frame.
2 Physical After creating frames, Data link layer adds physical addresses (MAC address) of
addressing sender and/or receiver in the header of each frame.
3 Error control Data link layer provides the mechanism of error control in which it detects and
retransmits damaged or lost frames.
4 Flow Control: The data rate must be constant on both sides else the data may get corrupted
thus , flow control coordinates that amount of data that can be sent before
receiving acknowledgement.
5 Access When a single communication channel is shared by multiple devices, MAC sub-
control layer of data link layer helps to determine which device has control over the
channel at a given time
Network layer is also called Layer 3 in OSI model. It provides source to destination delivery. Network
layer works for the transmission of data from one host to the other located in different networks. It also
takes care of packet routing i.e. selection of the shortest path to transmit the packet, from the number of
routes available. The sender & receiver’s IP address are placed in the header by the network layer.
Segment in Network layer is referred as Packet.
www.Citizenchoice.in
FUNCTIONS AND RESPONSBILITIES OF NETWORK LAYER
1 Routing The network layer protocols determine which route is suitable from source to
destination. This function of network layer is known as routing.
2 Logical In order to identify each device on internetwork uniquely, network layer defines
Addressing an addressing scheme. The sender & receiver’s IP address are placed in the
header by network layer. Such an address distinguishes each device uniquely
and universally
Transport layer provides services to application layer and takes services from network layer. The data
in the transport layer is referred to as Segments. It is responsible for the End to End Delivery of the
complete message. The transport layer also provides the acknowledgement of the successful data
transmission and re-transmits the data if an error is found. Transport layer receives the formatted data
from the upper layers, performs Segmentation and also implements Flow & Error control to ensure
proper data transmission. It also adds Source and Destination port number in its header and forwards
the segmented data to the Network Layer. Data in the Transport Layer is called as Segments.
The sender need to know the port number associated with the receiver’s application. Generally, this
destination port number is configured, either by default or manually. For example, when a web
application makes a request to a web server, it typically uses port number 80, because this is the
default port assigned to web applications. Many applications have default port assigned. At receiver’s
side: Transport Layer reads the port number from its header and forwards the Data which it has
received to the respective application. It also performs sequencing and reassembling of the segmented
data.
Note: Transport layer is operated by the Operating System. It is a part of the OS and communicates
with the Application Layer by making system calls.
Transport Layer is called as Heart of OSI model.
www.Citizenchoice.in
FUNCTIONS AND RESPONSBILITIES OF TRANSPORT LAYER
1 Segmentation This layer accepts the message from the (session) layer , breaks the message
and into smaller units . Each of the segments produced has a header associated with
Reassembly it. The transport layer at the destination station reassembles the message.
2 Service Point In order to deliver the message to correct process, transport layer header
Addressing includes a type of address called service point address or port address. Thus by
specifying this address, transport layer makes sure that the message is delivered
to the correct process.
3 Connection Connection Oriented Service: It is a three-phase process which include
Control -Connection Establishment
– Data Transfer
– Termination / disconnection
In this type of transmission, the receiving device sends an acknowledgement,
back to the source after a packet or group of packet is received. This type of
transmission is reliable and secure.
Connection less service: It is a one-phase process and includes Data
Transfer. In this type of transmission, the receiver does not acknowledge
receipt of a packet. This approach allows for much faster communication
between devices. Connection-oriented service is more reliable than
connectionless Service.
4 Flow Control Like the data link layer, the transport layer is responsible for flow control,
however, flow control at this layer is performed end to end rather than across a
single link.
5 Error Control Like the data link layer, the transport layer is responsible for flow control,
however, flow control at this layer is performed process to process rather than
across a single link.
www.Citizenchoice.in
FUNCTIONS AND RESPONSBILITIES OF SESSION LAYER
1 Synchronization This layer allows a process to add checkpoints which are considered as
synchronization points into the data. These synchronization point help to
identify the error so that the data is re-synchronized properly, and ends of the
messages are not cut prematurely and data loss is avoided.
2 Dialog The session layer allows two systems to start communication with each other
Controller in half-duplex or full-duplex.
www.Citizenchoice.in
1. Application Layer (layer 7)
At the very top of the OSI Reference Model stack of layers, we find Application layer which is
implemented by the network applications. These applications produce the data, which has to
be transferred over the network. This layer also serves as a window for the application services
to access the network and for displaying the received information to the user. The application
layer in the OSI model generally acts only like the interface which is responsible for
communicating with host-based and user-facing applications. This is in contrast with TCP/IP
protocol, wherein the layers below the application layer, which is Session Layer and
Presentation layer, are clubbed together and form a simple single layer which is responsible
for performing the functions, which includes controlling the dialogues between computers,
establishing as well as maintaining as well as ending a particular session, providing data
compression and data encryption and so on.At first, client sends a command t server and
when server receives that command, it allocates port number to client. Thereafter, the client
sends an initiation connection request to server and when server receives request, it gives
acknowledgement (ACK) to client through client has successfully established a connection
with the server and, therefore, now client has access to server through which it may either
ask server to send any types of files or other documents or it may upload some files or
documents on server itself.
Ex: Application – Browsers, Skype Messenger etc.
Application Layer is also called as Desktop Layer
DESIGN ISSUES OF APPLICATION LAYER
1 It ensures agreement at both ends on error recovery procedures.
2 It provides data integrity and privacy.
3 It determines protocols and data syntax rules at the application level and presents data on the receiving
end to the user application.
4 It facilitates users to send and receive several mails.
5. It also provides the storage facility .
www.Citizenchoice.in
CHAPTER 7 :TCP/IP MODEL
TCP/IP Model:
The TCP/IP model was developed prior to the OSI model. The TCP/IP model is not exactly similar to
the OSI model.The TCP/IP model consists of five layers: the application layer, transport layer, network
layer, data link layer and physical layer. The first four layers provide physical standards, network
interface, internetworking, and transport functions that correspond to the first four layers of the OSI
model and these four layers are represented in TCP/IP model by a single layer called the application
layer. TCP/IP is a hierarchical protocol made up of interactive modules, and each of them provides
specific functionality. Here, hierarchical means that each upper-layer protocol is supported by two or
more lower-level protocols.
www.Citizenchoice.in
by this layer are encapsulating the IP datagram into frames transmitted by the network and
mapping of IP addresses into physical addresses.The protocols used by this layer are ethernet,
token ring, FDDI, X.25, frame relay.
2. Network Layer:
IP Addressing: This protocol implements logical host addresses known as IP addresses. The
IP addresses are used by the internet and higher layers to identify the device and to provide
internetwork routing.
Host-to-host communication: It determines the path through which the data is to be
transmitted.
Data Encapsulation and Formatting: An IP protocol accepts the data from the transport layer
protocol. An IP protocol ensures that the data is sent and received securely, it encapsulates the
data into message known as IP datagram.
Fragmentation and Reassembly: The limit imposed on the size of the IP datagram by data
link layer protocol is known as Maximum Transmission unit (MTU). If the size of IP datagram is
greater than the MTU unit, then the IP protocol splits the datagram into smaller units so that
they can travel over the local network. Fragmentation can be done by the sender or
intermediate router. At the receiver side, all the fragments are reassembled to form an original
message.
Routing: When IP datagram is sent over the same local network such as LAN, MAN, WAN, it
is known as direct delivery. When source and destination are on the distant network, then the
IP datagram is sent indirectly. This can be accomplished by routing the IP datagram through
various devices such as routers.
ARP Protocol
ARP stands for Address Resolution Protocol.
ARP is a network layer protocol which is used to find the physical address from the IP address.
The two terms are mainly associated with the ARP Protocol:
a. ARP request: When a sender wants to know the physical address of the device, it
broadcasts the ARP request to the network.
b. ARP reply: Every device attached to the network will accept the ARP request and
process the request, but only recipient recognize the IP address and sends back its
physical address in the form of ARP reply. The recipient adds the physical address
both to its cache memory and to the datagram header
3. Transport Layer
• The transport layer is responsible for the reliability, flow control, and correction of data which is
being sent over the network.
• The two protocols used in the transport layer are User Datagram protocol and Transmission
control protocol.
• User Datagram Protocol (UDP)
– It provides connectionless service and end-to-end delivery of transmission.
– It is an unreliable protocol as it discovers the errors but not specify the error.
– User Datagram Protocol discovers the error, and ICMP protocol reports the error to the
sender that user datagram has been damaged.
www.Citizenchoice.in
– UDP consists of the following fields:
Source port address: The source port address is the address of the application
program that has created the message.
Destination port address: The destination port address is the address of the
application program that receives the message.
Total length: It defines the total number of bytes of the user datagram in bytes.
Checksum: The checksum is a 16-bit field used in error detection.
– UDP does not specify which packet is lost. UDP contains only checksum; it does not
contain any ID of a data segment.
• Transmission Control Protocol (TCP)It provides a full transport layer services to applications.
• It creates a virtual circuit between the sender and receiver, and it is active for the duration of
the transmission.
• TCP is a reliable protocol as it detects the error and retransmits the damaged frames.
Therefore, it ensures all the segments must be received and acknowledged before the
transmission is considered to be completed and a virtual circuit is discarded.
• At the sending end, TCP divides the whole message into smaller units known as segment, and
each segment contains a sequence number which is required for reordering the frames to form
an original message.
• At the receiving end, TCP collects all the segments and reorders them based on sequence
numbers.
4. Application Layer
An application layer is the topmost layer in the TCP/IP model. It is responsible for handling
high-level protocols, issues of representation. This layer allows the user to interact with the
application.
When one application layer protocol wants to communicate with another application layer, it
forwards its data to the transport layer. There is an ambiguity occurs in the application layer.
Every application cannot be placed inside the application layer except those who interact with
the communication system. For example: text editor cannot be considered in application layer
while web browser using HTTP protocol to interact with the network where HTTP protocol is an
application layer protocol.
Differences between TCP/IP and OSI Model
TCP/IP OSI
www.Citizenchoice.in
TCP/IP does not have very strict boundaries. OSI has strict boundaries
TCP/IP uses both session and presentation layer in OSI uses different session and
the application layer itself. presentation layers.
TCP/IP developed protocols then model. OSI developed model then protocol.
www.Citizenchoice.in
CHAPTER 8 : TRANSMISSION IMPAIRMENTS
Transmission Impairments
When the signal passes through the medium, it tends to get weaker. As it covers distance, it
loses strength. As signal travels through the media, it tends to spread and overlaps. The
amount of dispersion depends upon the frequency used.
TRANSMISSION IMAIRMENTS
INDUCED NOISE
IMPULSE NOISE
CROSSTALK
THERMAL NOISE
1. Attenuation – It means loss of energy. The strength of signal decreases with increasing
distance which causes loss of energy in overcoming resistance of medium. This is also known
as attenuated signal. Amplifiers are used to amplify the attenuated signal which gives the
original signal back and compensate for this loss.
Attenuation is measured in decibels(dB). It measures the relative strengths of two signals or
one signal at two different point.
Attenuation(dB) = 10log10(P2/P1)
www.Citizenchoice.in
P1 is the power at sending end and P2 is the power at receiving end.
Some where the decibel is also define in terms of voltage instead of power.In this case
because power is proportional to the square of the voltage the formula is
Attenuation(dB) = 20log10(V2/V1)
V1 is the voltage at sending end and V2 is the voltage at receiving end.
2. Distortion – It means changes in the form or shape of the signal. This is generally seen in
composite signals made up with different frequencies. Each frequency component has its
own propagation speed travelling through a medium. And thats why it delay in arriving at
the final destination Every component arrive at different time which leads to distortion.
Therefore, they have different phases at receiver end from what they had at senders end.
3. Noise – The random or unwanted signal that mixes up with the original signal is called noise.
There are several types of noise such as induced noise, crosstalk noise, thermal noise and
impulse noise which may corrupt the signal.
Induced noise comes from sources such as motors and appliances. These devices act
as sending antenna and transmission medium act as receiving antenna.
Thermal noise is movement of electrons in wire which creates an extra signal.
Crosstalk noise is when one wire affects the other wire.
Impulse noise is a signal with high energy that comes from lightning or power lines .
• Note: To find the theoretical bit rate limit, we need to know the ration .The signal-to-noise ratio
is defined as
• SNR = AVG SIGNAL POWER / AVG NOISE POWER
www.Citizenchoice.in
CHAPTER 9 : NETWORK PERFORMANCE
Network Performance:
Performance of a network pertains to the measure of service quality of a network as perceived by the
user. There are different ways to measure the performance of a network, depending upon the nature
and design of the network.
• Bandwidth
• Throughput
• Latency (Delay)
• Jitter
1. Bandwidth:
One of the most essential conditions of a website’s performance is the amount of bandwidth
allocated to the network. Bandwidth determines how rapidly the web server is able to upload
the requested information. While there are different factors to consider with respect to a site’s
performance, bandwidth is every now and again the restricting element.
Bandwidth is characterized as the measure of data or information that can be transmitted in a
fixed measure of time. The term can be used in two different contexts with two distinctive
estimating values. In the case of digital devices, the bandwidth is measured in bits per
second(bps) or bytes per second. In the case of analog devices, the bandwidth is measured in
cycles per second, or Hertz (Hz).
• Bandwidth in Hertz : It is the range of frequencies contained in a composite signal or the range
of frequencies a channel can pass. For example, let us consider the bandwidth of a subscriber
telephone line as 4 kHz.
• Bandwidth in Bits per Seconds : It refers to the number of bits per second that a channel, a link,
or rather a network can transmit. For example, we can say the bandwidth of a fast Ethernet
network is a maximum of 100 Mbps, which means that the network can send 100 Mbps of data.
2. Throughput
Throughput is the number of messages successfully transmitted per unit time. It is controlled by
available bandwidth, the available signal-to-noise ratio and the hardware limitations. The
maximum throughput of a network may be consequently higher than the actual throughput
achieved in everyday consumption. The terms ‘throughput’ and ‘bandwidth’ are often thought of
as the same, yet they are different. Bandwidth is the potential measurement of a link, whereas
throughput is an actual measurement of how fast we can send data.
www.Citizenchoice.in
Ques:A network with bandwidth of 10 Mbps can pass only an average of 12, 000 frames per
minute where each frame carries an average of 10, 000 bits. What will be the throughput for
this network ?
• Solution:We can calculate the throughput as- Throughput = (12, 000 x 10, 000) / 60 = 2 Mbps
The throughput is nearly equal to one-fifth of the bandwidth in this case.
3. Latency: In a network, during the process of data communication, latency(also known as
delay) is defined as the total time taken for a complete message to arrive at the destination,
starting with the time when the first bit of the message is sent out from the source and ending
with the time when the last bit of the message is delivered at the destination. The network
connections where small delays occur are called “Low-Latency-Networks” and the network
connections which suffer from long delays are known as “High-Latency-Networks.
Ques: What will be the propagation time when the distance between two points is 12, 000 km?
Assuming the propagation speed to be 2.4 * 10^8 m/s in cable.
Solution: We can calculate the propagation time as- Propagation time = (12000 * 10000) / (2.4 * 10^8)
= 50 ms
Ques.What will be the propagation time and the transmission time for a 2.5-kbyte message when the
bandwidth of the network is 1 Gbps? Assuming the distance between sender and receiver is 12, 000
km and speed of light is 2.4 * 10^8 m/s.
www.Citizenchoice.in
Sol:
We can calculate the propagation and transmission time as- Propagation time = (12000 * 10000) / (2.4
* 10^8) = 50 ms Transmission time = (2560 * 8) / 10^9 = 0.020 ms
Note: Since the message is short and the bandwidth is high, the dominant factor is the propagation
time and not the transmission time(which can be ignored).
3.3 Queuing Time: Queuing time is a time based on how long the packet has to sit around in the
router. Quite frequently the wire is busy, so we are not able to transmit a packet immediately. The
queuing time is usually not a fixed factor, hence it changes with the load thrust in the network. In cases
like these, the packet sits waiting, ready to go, in a queue. These delays are predominantly
characterized by the measure of traffic on the system. The more the traffic, the more likely a packet is
stuck in the queue, just sitting in the memory, waiting.
3.4 Processing Delay: Processing delay is the delay based on how long it takes the router to figure out
where to send the packet. As soon as the router finds it out, it will queue the packet for transmission.
These costs are predominantly based on the complexity of the protocol. The router must decipher
enough of the packet to make sense of which queue to put the packet in. Typically the lower level
layers of the stack have simpler protocols. If a router does not know which physical port to send the
packet to, it will send it to all the ports, queuing the packet in many queues immediately. Differently, at a
higher level, like in IP protocols, the processing may include making an ARP request to find out the
physical address of the destination before queuing the packet for transmission. This situation may also
be considered as a processing delay.
4. JITTER
Jitter is another performance issue related to delay. In technical terms, jitter is a “packet delay
variance”. It can simply mean that jitter is considered as a problem when different packets of data face
different delays in a network and the data at the receiver application is time-sensitive, i.e. audio or video
data. Jitter is measured in milliseconds(ms). It is defined as an interference in the normal order of
sending data packets. For example: if the delay for the first packet is 10 ms, for the second is 35 ms,
and for the third is 50 ms, then the real-time destination application that uses the packets experiences
jitter.
www.Citizenchoice.in
CHAPTER 10: SWITCHING
SWITCHING:
In large networks, there may be more than one paths for transmitting data from sender to receiver.
Selecting a path that data must take out of the available options is called switching.
Switching Techniques:
1. Circuit Switching
When a dedicated path is established for data transmission between sender and receiver, it is
called circuit switching. When any network node wants to send data, be it audio, video, text or
any other type of information, a call request signal is sent to the receiver and acknowledged
back to ensure availability of dedicated path. This dedicated path is then used to send data.
• Communication through circuit switching has 3 phases:
i) Circuit establishment
ii) Data transfer
iii) Circuit Disconnect
• Circuit switching is a switching technique that establishes a dedicated path between sender
and receiver.
www.Citizenchoice.in
• In the Circuit Switching Technique, once the connection is established then the dedicated path
will remain to exist until the connection is terminated.
• A complete end-to-end path must exist before the communication takes place.
• In case of circuit switching technique, when any user wants to send the data, voice, video, a
request signal is sent to the receiver then the receiver sends back the acknowledgment to
ensure the availability of the dedicated path. After receiving the acknowledgment, dedicated
path transfers the data.
• Circuit switching is used in public telephone network. It is used for voice transmission.
• Space Division Switching is a circuit switching technology in which a single transmission path is
accomplished in a switch by using a physically separate set of cross points.
• Space Division Switching can be achieved by using crossbar switch. A crossbar switch is a
metallic crosspoint or semiconductor gate that can be enabled or disabled by a control unit.
• The Crossbar switch is made by using the semiconductor. For example, Xilinx crossbar switch
using FPGAs.
• Space Division Switching has high speed, high capacity, and nonblocking switches.
www.Citizenchoice.in
1.1.2 Multistage Switch
Multistage Switch is made by splitting the crossbar switch into the smaller units and then
interconnecting them.It reduces the number of crosspoints. If one path fails, then there will be an
availability of another path.
www.Citizenchoice.in
Advantages of Circuit Switching
• Once path is set up, the only delay is in data transmission speed
• A request token must travel to the receiver and then acknowledged before any transmission
can happen
2. Packet switching
• the packet switching is a switching technique in which the message is sent in one go, but it is
divided into smaller pieces, and they are sent individually.
• The message splits into smaller pieces known as packets and packets are given a unique
number to identify their order at the receiving end.
• Every packet contains some information in its headers such as source address, destination
address and sequence number.
• Packets will travel across the network, taking the shortest path as possible.
• All the packets are reassembled at the receiving end in correct order.
• If any packet is missing or corrupted, then the message will be sent to resend the message.
• If the correct order of the packets is reached, then the acknowledgment message will be sent.
www.Citizenchoice.in
• In Datagram Packet Switching technique, the path is not fixed.
• In the case of Virtual circuit switching, a preplanned route is established before the messages
are sent.
• Call request and call accept packets are used to establish the connection between sender and
receiver.
• In this case, the path is fixed for the duration of a logical connection.
Node takes routing decisions to forward the Node does not take any routing decision.
packets.
Congestion cannot occur as all the packets Congestion can occur when the node is busy,
travel in different directions. and it does not allow other packets to pass
through.
It is more flexible as all the packets are treated It is not very flexible.
as an independent entity.
www.Citizenchoice.in
• Efficient: Packet Switching is an efficient technique. It does not require any established path
prior to the transmission, and many users can use the same communication channel
simultaneously, hence makes use of available bandwidth very efficiently.
Disadvantages Of Packet Switching
• Packet Switching technique cannot be implemented in those applications that require low delay
and high-quality services.
• The protocols used in a packet switching technique are very complex and requires high
implementation cost.
• If the network is overloaded or corrupted, then it requires retransmission of lost packets. It can
also lead to the loss of critical information if errors are nor recovered.
3. Message Switching
Message Switching is a switching technique in which a message is transferred as a complete
unit and routed through intermediate nodes at which it is stored and forwarded. In Message
Switching technique, there is no establishment of a dedicated path between the sender and
receiver. The destination address is appended to the message. Message Switching provides a
dynamic routing as the message is routed through the intermediate nodes based on the
information available in the message. Message switches are programmed in such a way so
that they can provide the most efficient routes. Each and every node stores the entire message
and then forward it to the next node. This type of network is known as store and forward
network. Message switching treats each message as an independent entity.
www.Citizenchoice.in