CN Unit 1
CN Unit 1
CN Unit 1
NETWORKS
A network is a set of devices (often referred to as nodes) connected by
communication links. A node can be a computer, printer, or any other device
capable of sending and/or receiving data generated by other nodes on the
network.
“Computer network’’ to mean a collection of autonomous computers
interconnected by a single technology. Two computers are said to be
interconnected if they are able to exchange information.
The connection need not be via a copper wire; fiber optics, microwaves,
infrared, and communication satellites can also be used.
Networks come in many sizes, shapes and forms, as we will see later.
They are usually connected together to make larger networks, with the
Internet being the most well-known example of a network of networks.
There is considerable confusion in the literature between a computer
network and a distributed system. The key distinction is that in a distributed
system, a collection of independent computers appears to its users as a single
coherent system. Usually, it has a single model or paradigm that it presents to
the users. Often a layer of software on top of the operating system, called
middleware, is responsible for implementing this model. A well-known
example of a distributed system is the World Wide Web. It runs on top of the
Internet and presents a model in which everything looks like a document (Web
page).
3 Mobile Users
Text messaging or texting
Smart phones,
GPS (Global Positioning System)
m-commerce
NFC (Near Field Communication)
4 Social Issues
With the good comes the bad, as this new-found freedom brings with it many
unsolved social, political, and ethical issues.
Social networks, message boards, content sharing sites, and a host of
other applications allow people to share their views with like-minded
individuals. As long as the subjects are restricted to technical topics or hobbies
like gardening, not too many problems will arise.
The trouble comes with topics that people actually care about, like politics,
religion, or sex. Views that are publicly posted may be deeply offensive to some
people. Worse yet, they may not be politically correct. Furthermore, opinions
need not be limited to text; high-resolution color photographs and video clips
are easily shared over computer networks. Some people take a live-and-let-live
view, but others feel that posting certain material (e.g., verbal attacks on
particular countries or religions, pornography, etc.) is simply unacceptable and
that such content must be censored. Different countries have different and
conflicting laws in this area. Thus, the debate rages.
Computer networks make it very easy to communicate. They also make it
easy for the people who run the network to snoop on the traffic. This sets up
conflicts over issues such as employee rights versus employer rights.
Many people read and write email at work. Many employers have claimed the
right to read and possibly censor employee messages, including messages sent
from a home computer outside working hours. Not all employees agree with
this, especially the latter part.
Another conflict is centered around government versus citizen’s rights.
A new twist with mobile devices is location privacy. As part of the process of
providing service to your mobile device the network operators learn where you
are at different times of day. This allows them to track your movements. They
may know which nightclub you frequent and which medical center you visit.
Data Representation
Text
Numbers
Images
Audio
Video
Data Flow
Communication between two devices can be simplex, half-duplex, or full-duplex
as shown in Figure.
MESH:
A mesh topology is the one where every node is connected to every other node
in the network.
A star network, star topology is one of the most common network setups. In
this configuration, every node connects to a central network device, like
a hub, switch, or computer. The central network device acts as a server and the
peripheral devices act as clients. Depending on the type of network card used
in each computer of the star topology, a coaxial cable or a RJ-45 network cable
is used to connect computers together.
Advantages of star topology
Centralized management of the network, through the use of the central
computer, hub, or switch.
Easy to add another computer to the network.
If one computer on the network fails, the rest of the network continues to
function normally.
The star topology is used in local-area networks (LANs), High-speed LANs
often use a star topology with a central hub.
Disadvantages of star topology
Can have a higher cost to implement, especially when using a switch or
router as the central network device.
The central network device determines the performance and number of
nodes the network can handle.
If the central computer, hub, or switch fails, the entire network goes down
and all computers are disconnected from the network
BUS:
RING:
A ring topology is a network configuration in which device connections create
a circular data path. In a ring network, packets of data travel from one device to
the next until they reach their destination. Most ring topologies allow packets to
travel only in one direction, called a unidirectional ring network. Others
permit data to move in either direction, called bidirectional.
The major disadvantage of a ring topology is that if any individual connection in
the ring is broken, the entire network is affected.
Ring topologies may be used in either local area networks (LANs) or wide area
networks (WANs).
Advantages of ring topology
All data flows in one direction, reducing the chance of packet collisions.
A network server is not needed to control network connectivity between
each workstation.
Data can transfer between workstations at high speeds.
Additional workstations can be added without impacting performance of
the network.
Disadvantages of ring topology
All data being transferred over the network must pass through each
workstation on the network, which can make it slower than a star topology.
The entire network will be impacted if one workstation shuts down.
The hardware needed to connect each workstation to the network is more
expensive than Ethernet cards and hubs/switches.
Hybrid Topology A network can be hybrid. For example, we can have a main
star topology with each branch connecting several stations in a bus topology as
shown in Figure
Other types
WLAN (Wireless LAN)
A LAN that uses high frequency radio waves for communication.
Provides short range connectivity with high speed data transmission.
PAN (Personal Area Network)
Network organized by the individual user for its personal use.
SAN (Storage Area Network)
Connects servers to data storage devices via fiber-optic cables.
E.g.: Used for daily backup of organization or a mirror copy
Guided Media: Guided media, which are those that provide a medium from
one device to another, include twisted-pair cable, coaxial cable, and fiber-optic
cable.
The most common UTP connector is RJ45 (RJ stands for registered jack)
Applications
Twisted-pair cables are used in telephone lines to provide voice and data
channels.
Local-area networks, such as l0Base-T and l00Base-T, also use twisted-pair
cables.
Coaxial Cable
Coaxial cable (or coax) carries signals of higher frequency ranges than those in
twisted pair cable. coax has a central core conductor of solid or stranded wire
(usuallycopper) enclosed in an insulating sheath, which is, in turn, encased in
an outer conductor of metal foil, braid, or a combination of the two. The outer
metallic wrapping serves both as a shield against noise and as the second
conductor, which completes the circuit.This outer conductor is also enclosed in
an insulating sheath, and the whole cable is protected by a plastic cover.
Fiber-Optic Cable
A fiber-optic cable is made of glass or plastic and transmits signals in the form
of light. Light travels in a straight line as long as it is moving through a single
uniform substance.
If a ray of light traveling through one substance suddenly enters another
substance(of a different density), the ray changes direction.
Bending of light ray
Optical fibers use reflection to guide light through a channel. A glass or plastic
core is surrounded by a cladding of less dense glass or plastic.
Propagation Modes
In multimode step-index fiber, the density of the core remains constant from
the center to the edges. A beam of light moves through this constant density in
a straight line until it reaches the interface of the core and the cladding. The
term step index refers to the suddenness of this change, which contributes to
the distortion of the signal as it passes through the fiber.
A second type of fiber, called multimode graded-index fiber, decreases this
distortion of the signal through the cable. The word index here refers to the
index of refraction.
Single-Mode: Single-mode uses step-index fiber and a highly focused source
of light that limits beams to a small range of angles, all close to the horizontal.
Fiber Construction
Unguided signals can travel from the source to destination in several ways:
ground propagation, sky propagation, and line-of-sight propagation, as shown in
Figure
Radio Waves
Electromagnetic waves ranging in frequencies between 3 kHz and 1 GHz are
normally called radio waves. Radio waves are omni directional. When an
antenna transmits radio waves, they are propagated in all directions. This
means that the sending and receiving antennas do not have to be aligned. A
sending antenna sends waves that can be received by any receiving antenna.
The omni directional property has a disadvantage, too. The radio waves
transmitted by one antenna are susceptible to interference by another antenna
that may send signals using the same frequency or band.
Omni directional Antenna
Radio waves use omnidirectional antennas that send out signals in all
directions. Based on the wavelength, strength, and the purpose of transmission,
we can have several types of antennas. Figure shows an omnidirectional
antenna.
Applications
The Omni directional characteristics of radio waves make them useful for
multicasting, in which there is one sender but many receivers. AM and FM radio,
television, maritime radio, cordless phones, and paging are examples of
multicasting.
Microwaves
Electromagnetic waves having frequencies between 1 and 300 GHz are called
microwaves. Microwaves are unidirectional. The sending and receiving antennas
need to be aligned. The unidirectional property has an obvious advantage. A
pair of antennas can be aligned without interfering with another pair of aligned
antennas
Unidirectional Antenna
Microwaves need unidirectional antennas that send out signals in one direction.
Two types of antennas are used for microwave communications: the parabolic
dish and the horn
Applications:
Microwaves are used for unicast communication such as cellular telephones,
satellite networks, and wireless LANs
Infrared
Infrared waves, with frequencies from 300 GHz to 400 THz (wavelengths from 1
mm to 770 nm), can be used for short-range communication. Infrared waves,
having high frequencies, cannot penetrate walls. This advantageous
characteristic prevents interference between one system and another; a short-
range communication system in one room cannot be affected by another
system in the next room.
When we use our infrared remote control, we do not interfere with the use of
the remote by our neighbors. Infrared signals useless for long-range
communication. In addition, we cannot use infrared waves outside a building
because the sun's rays contain infrared waves that can interfere with the
communication.
Applications:
Infrared signals can be used for short-range communication in a closed
area using line-of-sight propagation.
Switching
A network is a set of connected devices. Whenever we have multiple
devices, we have the problem of how to connect them to make one-to-one
communication possible. One solution is to make a point-to-point connection
between each pair of devices (a mesh topology) or between a central device
and every other device (a star topology). These methods, however, are
impractical and wasteful when applied to very large networks.
The number and length of the links require too much infrastructure to be
cost-efficient, and the majority of those links would be idle most of the time.
A better solution is switching. A switched network consists of a series of
interlinked nodes, called switches. Switches are devices capable of creating
temporary connections between two or more devices linked to the switch. In a
switched network, some of these nodes are connected to the end systems
(computers or telephones, for example). Others are used only for routing. Figure
shows a switched network.
We can then divide today's networks into three broad categories: circuit-
switched networks, packet-switched networks, and message-switched. Packet-
switched networks can further be divided into two subcategories-virtual-circuit
networks and datagram networks as shown in Figure.
OSI Model
o OSI stands for Open System Interconnection is a reference model that
describes how information from a software application in one computer moves
through a physical medium to the software application in another computer.
o OSI consists of seven layers, and each layer performs a particular network
function.
o OSI model was developed by the International Organization for Standardization
(ISO) in 1984, and it is now considered as an architectural model for the inter-
computer communications.
o OSI model divides the whole task into seven smaller and manageable tasks. Each
layer is assigned a particular task.
Physical layer
o The main functionality of the physical layer is to transmit the individual bits from one
node to another node.
o It is the lowest layer of the OSI model.
o It establishes, maintains and deactivates the physical connection.
o It specifies the mechanical, electrical and procedural network interface specifications.
Data-Link Layer
o This layer is responsible for the error-free transfer of data frames.
o It defines the format of the data on the network.
o It provides a reliable and efficient communication between two or more devices.
o It is mainly responsible for the unique identification of each device that resides on a local
network.
o It contains two sub-layers:
o Logical Link Control Layer
o It is responsible for transferring the packets to the Network layer of the
receiver that is receiving.
o It identifies the address of the network layer protocol from the header.
o It also provides flow control.
o Media Access Control Layer
o A Media access control layer is a link between the Logical Link Control
layer and the network's physical layer.
o It is used for transferring the packets over the network.
o Physical Addressing: The Data link layer adds a header to the frame that contains a
destination address. The frame is transmitted to the destination address mentioned in
the header.
o Flow Control: Flow control is the main functionality of the Data-link layer. It is the
technique through which the constant data rate is maintained on both the sides so that
no data get corrupted. It ensures that the transmitting station such as a server with
higher processing speed does not exceed the receiving station, with lower processing
speed.
o Error Control: Error control is achieved by adding a calculated value CRC (Cyclic
Redundancy Check) that is placed to the Data link layer's trailer which is added to the
message frame before it is sent to the physical layer. If any error seems to occurr, then
the receiver sends the acknowledgment for the retransmission of the corrupted frames.
o Access Control: When two or more devices are connected to the same communication
channel, then the data link layer protocols are used to determine which device has
control over the link at a given time.
Network Layer
o It is a layer 3 that manages device addressing, tracks the location of devices on the
network.
o It determines the best path to move data from source to the destination based on the
network conditions, the priority of service, and other factors.
o The Data link layer is responsible for routing and forwarding the packets.
o Routers are the layer 3 devices, they are specified in this layer and used to provide the
routing services within an internetwork.
o The protocols used to route the network traffic are known as Network layer protocols.
Examples of protocols are IP and Ipv6.
Transport Layer
o The Transport layer is a Layer 4 ensures that messages are transmitted in the order in
which they are sent and there is no duplication of data.
o The main responsibility of the transport layer is to transfer the data completely.
o It receives the data from the upper layer and converts them into smaller units known as
segments.
o This layer can be termed as an end-to-end layer as it provides a point-to-point
connection between source and destination to deliver the data reliably.
Session Layer
o It is a layer 3 in the OSI model.
o The Session layer is used to establish, maintain and synchronizes the interaction between
communicating devices.
Presentation Layer
o A Presentation layer is mainly concerned with the syntax and semantics of the
information exchanged between the two systems.
o It acts as a data translator for a network.
o This layer is a part of the operating system that converts the data from one presentation
format to another format.
o The Presentation layer is also known as the syntax layer.
Application Layer
o An application layer serves as a window for users and application processes to access
network service.
o It handles issues such as network transparency, resource allocation, etc.
o An application layer is not an application, but it performs the application layer functions.
o This layer provides the network services to the end-users.
This layer corresponds to the combination of Data Link Layer and Physical Layer of the
OSI model. It looks out for hardware addressing and the protocols present in this layer
allows for the physical transmission of data.
We just talked about ARP being a protocol of Internet layer, but there is a conflict about
declaring it as a protocol of Internet Layer or Network access layer. It is described as
residing in layer 3, being encapsulated by layer 2 protocols.
2. Internet Layer –
This layer parallels the functions of OSI’s Network layer. It defines the protocols which
are responsible for logical transmission of data over the entire network. The main
protocols residing at this layer are :
1. IP – stands for Internet Protocol and it is responsible for delivering packets from the
source host to the destination host by looking at the IP addresses in the packet
headers. IP has 2 versions:
IPv4 and IPv6. IPv4 is the one that most of the websites are using currently. But IPv6
is growing as the number of IPv4 addresses are limited in number when compared to
the number of users.
2. ICMP – stands for Internet Control Message Protocol. It is encapsulated within IP
datagrams and is responsible for providing hosts with information about network
problems.
3. ARP – stands for Address Resolution Protocol. Its job is to find the hardware address
of a host from a known IP address. ARP has several types: Reverse ARP, Proxy ARP,
Gratuitous ARP and Inverse ARP.
3. Host-to-Host Layer –
This layer is analogous to the transport layer of the OSI model. It is responsible for end-
to-end communication and error-free delivery of data. It shields the upper-layer
applications from the complexities of data. The two main protocols present in this layer
are :
1. Transmission Control Protocol (TCP) – It is known to provide reliable and error-free
communication between end systems. It performs sequencing and segmentation of
data. It also has acknowledgment feature and controls the flow of the data through
flow control mechanism. It is a very effective protocol but has a lot of overhead due
to such features. Increased overhead leads to increased cost.
2. User Datagram Protocol (UDP) – On the other hand does not provide any such
features. It is the go-to protocol if your application does not require reliable
transport as it is very cost-effective. Unlike TCP, which is connection-oriented
protocol, UDP is connectionless.
4. Application Layer –
This layer performs the functions of top three layers of the OSI model: Application,
Presentation and Session Layer. It is responsible for node-to-node communication and
controls user-interface specifications. Some of the protocols present in this layer are:
HTTP, HTTPS, FTP, TFTP, Telnet, SSH, SMTP, SNMP, NTP, DNS, DHCP, NFS, X
Window, LPD. Have a look at Protocols in Application Layer for some information about
these protocols. Protocols other than those present in the linked article are :
1. HTTP and HTTPS – HTTP stands for Hypertext transfer protocol. It is used by the
World Wide Web to manage communications between web browsers and servers.
HTTPS stands for HTTP-Secure. It is a combination of HTTP with SSL(Secure Socket
Layer). It is efficient in cases where the browser need to fill out forms, sign in,
authenticate and carry out bank transactions.
2. SSH – SSH stands for Secure Shell. It is a terminal emulations software similar to
Telnet. The reason SSH is more preferred is because of its ability to maintain the
encrypted connection. It sets up a secure session over a TCP/IP connection.
3. NTP – NTP stands for Network Time Protocol. It is used to synchronize the clocks on
our computer to one standard time source. It is very useful in situations like bank
transactions. Assume the following situation without the presence of NTP. Suppose
you carry out a transaction, where your computer reads the time at 2:30 PM while
the server records it at 2:28 PM. The server can crash very badly if it’s out of sync.
Differences between OSI and TCP/IP Reference Model –
OSI TCP/IP
The OSI model was developed first, and The protocols were created first and then
then protocols were created to fit the built the TCP/IP model.
network architecture’s needs.
The OSI model represents defines It does not mention the services, interfaces,
administration, interfaces and conventions. and protocols.
It describes clearly which layer provides
services.
The protocols of the OSI model are better The TCP/IP model protocols are not hidden,
unseen and can be returned with another and we cannot fit a new protocol stack in it.
appropriate protocol quickly.
The smallest size of the OSI header is 5 The smallest size of the TCP/IP header is
bytes. 20 bytes.
Protocols are unknown in the OSI model In TCP/IP, returning protocol is not difficult.
and are returned while the technology
modifies.
THE INTERNET
The Internet has revolutionized many aspects of our daily lives. It has affected
the way we do business as well as the way we spend our leisure time. Count
the ways you've used the Internet recently. Perhaps you've sent electronic
mail (e-mail) to a business associate, paid a utility bill, read a newspaper from
a distant city, or looked up a local movie schedule-all by using the Internet. Or
maybe you researched a medical topic, booked a hotel reservation, chatted
with a fellow Trekkie, or comparison-shopped for a car. The Internet is a
communication system that has brought a wealth of information to our
fingertips and organized it for our use.
A Brief History
The Internet has come a long way since the 1960s. The Internet today is not a
simple hierarchical structure. It is made up of many wide- and local-area
networks joined by connecting devices and switching stations. It is difficult to
give an accurate representation of the Internet because it is continually
changing-new networks are being added, existing networks are adding
addresses, and networks of defunct companies are being removed. Today
most end users who want Internet connection use the services of Internet
service providers (lSPs). There are international service providers, national
service providers, regional service providers, and local service providers. The
Internet today is run by private companies, not the government. Figure 1.13
shows a conceptual (not geographic) view of the Internet.
International Internet Service Providers:
At the top of the hierarchy are the international service providers that
connect nations together.
National Internet Service Providers:
The national Internet service providers are backbone networks created
and maintained by specialized companies. There are many national ISPs
operating in North America; some of the most well known are SprintLink,
PSINet, UUNet Technology, AGIS, and internet Mel. To provide connectivity
between the end users, these backbone networks are connected by complex
switching stations (normally run by a third party) called network access points
(NAPs). Some national ISP networks are also connected to one another by
private switching stations called peering points. These normally operate at a
high data rate (up to 600 Mbps).
Regional Internet Service Providers:
Regional internet service providers or regional ISPs are smaller ISPs that
are connected to one or more national ISPs. They are at the third level of the
hierarchy with a smaller data rate. Local Internet Service Providers:
Local Internet service providers provide direct service to the end users.
The local ISPs can be connected to regional ISPs or directly to national ISPs.
Most end users are connected to the local ISPs. Note that in this sense, a local
ISP can be a company that just provides Internet services, a corporation with
a network that supplies services to its own employees, or a nonprofit
organization, such as a college or a university, that runs its own network.
Each of these local ISPs can be connected to a regional or national service
provider.
Types of area networks – LAN, MAN and WAN
The Network allows computers to connect and communicate with different computers via
any medium. LAN, MAN, and WAN are the three major types of networks designed to operate
over the area they cover. There are some similarities and dissimilarities between them. One of
the major differences is the geographical area they cover, i.e. LAN covers the smallest
area, MAN covers an area larger than LAN and WAN comprises the largest of all.
There are other types of Computer Networks also, like :
Advantages:
Allows for easy communication between personal devices in close proximity.
Can be set up easily and quickly.
Uses wireless technology, which eliminates the need for wires and cables.
PANs are designed to be energy efficient, which means that devices can communicate with
each other without draining their batteries quickly.
PANs are typically secured using encryption and authentication protocols, which helps to
prevent unauthorized access to data and resources.
Disadvantages:
Limited coverage area.
May not be suitable for large-scale data transfer or communication.PANs typically have
limited bandwidth, which means that they may not be able to handle large amounts of data
or high-speed communication.
May experience interference from other wireless devices.
Local Area Network (LAN) –
LAN or Local Area Network connects network devices in such a way that personal computers
and workstations can share data, tools, and programs. The group of computers and devices are
connected together by a switch, or stack of switches, using a private addressing scheme as
defined by the TCP/IP protocol. Private addresses are unique in relation to other computers on
the local network. Routers are found at the boundary of a LAN, connecting them to the larger
WAN.
Data transmits at a very fast rate as the number of computers linked is limited. By definition,
the connections must be high-speed and relatively inexpensive hardware (Such as hubs,
network adapters, and Ethernet cables). LANs cover a smaller geographical area (Size is
limited to a few kilometres) and are privately owned. One can use it for an office building,
home, hospital, school, etc. LAN is easy to design and maintain. A Communication medium
used for LAN has twisted-pair cables and coaxial cables. It covers a short distance, and so the
Advantages:
Provides fast data transfer rates and high-speed communication.
Easy to set up and manage.
Can be used to share peripheral devices such as printers and scanners.
Provides increased security and fault tolerance compared to WANs.
Disadvantages:
Limited geographical coverage.
Limited scalability and may require significant infrastructure upgrades to accommodate
growth.
May experience congestion and network performance issues with increased usage.
WAN or Wide Area Network is a computer network that extends over a large geographical
area, although it might be confined within the bounds of a state or country. WAN has a range
of above 50 km. A WAN could be a connection of LAN connecting to other LANs via
telephone lines and radio waves and may be limited to an enterprise (a corporation or an
organization) or accessible to the public. The technology is high-speed and relatively
expensive.
There are two types of WAN: Switched WAN and Point-to-Point WAN. WAN is difficult to
design and maintain. Similar to a MAN, the fault tolerance of a WAN is less and there is more
congestion in the network. A Communication medium used for WAN is PSTN or Satellite
Link. Due to long-distance transmission, the noise and error tend to be more in WAN.
WAN’s data rate is slow about a 10th LAN’s speed since it involves increased distance and
increased number of servers and terminals etc. The speed of WAN ranges from a few kilobits
per second (Kbps) to megabits per second (Mbps). Propagation delay is one of the biggest
problems faced here. Devices used for the transmission of data through WAN are Optic wires,
Microwaves, and Satellites.
Advantages:
Covers large geographical areas and can connect remote locations.
Provides connectivity to the internet.
Offers remote access to resources and applications.
Can be used to support multiple users and applications simultaneously.
Disadvantages:
Can be expensive to set up and maintain.
Offers slower data transfer rates than LAN or MAN.
May experience higher latency and longer propagation delays due to longer distances and
multiple network hops.
May have lower fault tolerance and security compared to LANs
ARPANET
ARPANET stands for Advanced Research Projects Agency NET. ARPANET was first
network which consisted of distributed control. It was first to implement TCP/IP protocols. It
was basically beginning of Internet with use of these technologies. It was designed with a basic
idea in mind that was to communicate with scientific users among an institute or university.
History of ARPANET :
ARPANET was introduced in the year 1969 by Advanced Research Projects Agency (ARPA)
of US Department of Defense. It was established using a bunch of PCs at various colleges and
sharing of information and messages was done. It was for playing as long separation diversions
and individuals were asked to share their perspectives. In the year 1980, ARPANET was
handed over to different military network, Defense Data Network.
Packet switching was the key concept that enabled ARPANET’s operation. Here’s how it
worked:
The data being transmitted between two computers was broken down into smaller units called
packets.
Each packet contained a portion of the data with information about its destination.
The packets were transmitted individually across the network and routed independently based on
the addressing information.
TCP/IP Protocol
TCP, which replaced the earlier NCP protocol, was vital in enabling more reliable
communication over ARPANET. The main functions of TCP/IP were:
Providing reliable data transmission between multiple computers connected to the network.
Introducing flow control mechanisms that prevented data overflow and network congestion.
Checking for errors to ensure the integrity of the received data and prevent the transmission of
corrupt data packets.
Providing more flexibility than the previously used NCP protocol, like working with different
types of networks and devices.