CST303 M1 Ktunotes - in
CST303 M1 Ktunotes - in
.
Computer network/data network: A network can be defined as a group of computers and
other devices connected in some way so as to be able to exchange data. A network allows nodes
to share resources. In computer networks, computing devices exchange data with each other
using connections between nodes (data links). These data links are established over cable media
such as wires or optic cables, or wireless media such as Wi-Fi. Each of the devices on the
network can be thought of as a node, each node has a unique address.
Advantages of computer network:
• It allows for more convenient resource sharing: This benefit is very important,
particularly for larger companies that really need to produce huge numbers of resources
to be shared to all the people. Since the technology involves computer-based work, it is
assured that the resources they wanted to get across would be completely shared by
connecting to a computer network which their audienceis also using.
• It makes file sharing easier : Computer networking allows easier accessibility for
people to share their files, which greatly helps them with saving more time and
effort, since they could do filesharing more accordingly and effectively.
• It is highly flexible. This technology is known to be very flexible, as it gives users the
opportunity to explore everything about essential things, such as software without
affecting their functionality. Plus, people will have the accessibility to all information
they need to get and share.
• It increases cost efficiency. With computer networking, you can use a lot of software
products available on the market which can just be stored or installed in your system or
server and can then be used by various workstations.
• It boosts storage capacity. Since you are going to share information, files and resources
to other people, you have to ensure all data and content are properly stored in the
• It allows for more presence of computer viruses and malware. There would be
instances that stored files are corrupt due to computer viruses. Thus, network
administrators should conduct regular check-ups on the system, and the stored files at
the same time.
• Its light policing usage promotes negative acts. It has been observed that providing
users with internet connectivity has fostered undesirable behaviour among them.
Considering that the web is a minefield of distractions—online games, humor sites. The
huge network of machines could also encourage them to engage in illicit practices, such
as instant messaging and file sharing, instead of working on work-related matters.
While many organizations draw up certain policies on this, they have proven difficult
to enforce and even engendered resentment from employees.
• It requires an efficient handler. A computer network to work efficiently and
optimally, it requires high technical skills and know-how of its operations and
administration. A person just having basic skills cannot do this job. Take note that the
responsibility to handle such a system is high, as allotting permissions and passwords
can be daunting. Similarly, network configuration and connection is very tedious and
cannot be doneby an average technician who does not have advanced knowledge.
• It requires an expensive set-up. Though computer networks are said to be an
inexpensive system when it is already running, its initial set up cost can still be high
depending on the number of computers to be connected. Expensive devices, such as
routers, switches, hubs, etc., can add up to the cost. Aside from these, it would also
need network interface cards (NICs) for workstations in case they are not built in.
• It lacks robustness. If a computer network’s main server breaks down, the entire
system would become useless. Also, if it has a bridging device or a central linking
server that fails, the entire network would also come to a standstill. To deal with these
problems, huge networks should have a powerful computer to serve as file server to
make setting up and maintaining the network easier.
Home Applications
Some of the more popular uses of the Internet for home users are as follows:
• Access to remote information.
• Person-to-person communication.
• Interactive entertainment.
• Electronic commerce.
NETWORK HARDWARE
Mobile computers, such as notebook computers and personal digital assistants (PDAs), are one
of the fastest growing segments of the computer industry.
There are two types of transmission technology that are in widespread use. They are as
follows:
Broadcast links.
Point to point links.
Broadcast networks have a single communication channel that is shared by all the machines on
the network.packets sent by any machine are received by all the others.Address filed within
the packet specifies intended recipient. upon receiving machine checks address fields.If the
packet is intended for receiving machine it processses the packet else ignore it.
Broadcasting
Possibility of addressing the packet to all destinations by using special code in address field.It
is received and processsed by every machine on the network.
Multicasting
source node wants to send messages to some subset of other nodes, but not all of them. An
example of wireless network WIFI point-point network consists of many connections between
LAN (Local Area Network) links the devices in local areas such as in your campus, building
etc. It provides useful way of sharing resourcessuch as printer &scanner, sharing of file server.
NETWORK SOFTWARE
PROTOCOL
In computer networks, communication occurs between entities in different systems. An entity
is anything capable of sending or receiving information. However, two entities cannot simply
send bit streams to each other and expect to be understood. For communication to occur, the
entities must agree on a protocol. A protocol is a set of rules that govern data communications.
A protocol defines what is communicated, how it is communicated, and when it is
communicated.The key elements of a protocol are syntax, semantics, and timing.
PROTOCOL HIERARCHIES
To reduce their design complexity, most networks are organized as a stack of layers or levels,
each one built upon the one below it. The number of layers, the name of each layer, the
contents of each layer, and the function of each layer differ from network to network. The
purpose of each layer is to offer certain services to the higher layers, shielding those layers
from the details of how the offered services are actually implemented. Layer n on one machine
carries on a conversation with layer n on another machine. The rules and conventions used in
this conversation are collectively known as the layer n protocol.
Since a network has many computers, some having multiple process. A machine has to specify
with whom it has to establish connection. Because of having consequence of multiple
destination, the addressingis needed in order to specify the specific destination.
• Another set of design decisions concerns the rules for data transfer.
In some data transfer take place in one direction and in some other it travel in both direction
but not simultaneously. And there are situations were data transfer takes place simultaneously.
Protocol determines howmany logical channels are needed per connection.
• Error control: The physical communication circuits are not perfect. There are error
detecting and error correcting codes. Both ends of the connection should agree which one
Each primitive specifies the action to be performed or advises the result of a previously requested
action. A primitive may also carry the parameters needed to perform its functions. One
parameter is the packet to be sent/received to the layer above/below (or, more accurately,
includes a pointer to data structures containing a packet, often called a "buffer").
There are four types of primitive used for communicating data. The four basic types of
primitive are :
Request : A primitive sent by layer (N + 1 ) to layer N to request a service. It invokes the
service and passes any required parameters. Indication : A primitive returned to layer (N +
l) from layer N to advise of activation of a requested service or of an action initiated by the
layer N service.
Response : A primitive provided by layer (N + 1) in reply to an indication primitive. It
may acknowledge or complete an action previously invoked by an indication
primitive.
REFERENCE MODELS
• OSI MODEL 2. TCP/IP MODEL
OSI REFERENCE MODEL
OSI stands for Open Systems Interconnection. It has 7-layers and attempts to abstract
common features common to all approaches to data communications, and organize
them into layers so that each layer only worries about the one above it and the one
directlybelow it.
Although the actual data transmission is vertical, starting from the Application layer of the
clients’ computer all the way to the Application layer of the destination computer, each layer is
programmed as though the data transmission were horizontal. This can be observed by above
figure. In this figure peers are entities comprising the corresponding layers on each machine
meaning that the peers that communicate using the protocol. In reality, as I stated above, no data
are directly transferred from layer n on one machine to the corresponding layer on another
machine.
Physical Layer
Transport Layer
The Transport Layer has as a main task to accept data from the Session layer, split them up into
smaller units an passes them to the Network layer making sure that all the pieces arrive
correctly to the destination. It is the first end-to-end layer all the way from source machine to
destination machine unlike the first three layers which are chained having their protocols
between each machine. This is shown clearly in the diagram above. This layer will ensure that
the data reached to receiver without any error. And the basic function of this layer is to accept
data from the session layer, split it up to smaller units if need be, pass to the network layer and
ensure that all pieces arrive correctly at the other end. Also the transport layer creates a distinct
network connections for each transport connection required by the session layer. If the transport
connection requires high throughput the transport layer might create multiple network
Presentation Layer
It is responsible to translate different data formats from the representation used inside the
computer (ASCII) to the network standard representation and back. Computers use different
codes for representing character strings so a standard encoding must be used and is handled by
the presentation layer. Generally, in a few words this layer is concerned with the syntax and
semantics of the information transmitted. The presentation layer performs encapsulation,
description, compression and decompression. Also certain functions that are requested
sufficiently often to warrant finding a general solution for them. The presentation layer is also
concerned with the syntax and semantics of the information transmitted.
Application layer
The upper layer of this model performs common application service for the application processes
meaning that software programs are written in the application layer to handle the many
different terminal types that exist and map the virtual terminal software onto the real terminal.
It contains a variety of protocols and is concerned with file transfer as well as electronic mail,
remote job entry and various other services of general interest. This layer has a particular
application. It contains a variety of protocols that are commonly needed. Another application
of this layer is file transfer. Different file system has different file naming conventions, different
ways of representing text lines and on.
TCP/IP reference model was named after its two main protocols: TCP (Transmission Control
Protocol) and IP (Internet Protocol). This model has the ability to connect multiple networks
together in a way so that data transferred from a program in one computer are delivered safely
to a similar program on another computer.
Internet Layer
This layer is a connectionless internetwork layer and defines a connectionless protocol called
IP. Its concerned with delivering packets from source to destination. These packets travel
independently each taking a different route so may arrive in a different order than they were send.
Internet layer does not care about the order the packets arrive at the destination as this job
belongs to higher layers. This layer, called the internet layer, is the linchpin that holds the
whole architecture together. Its job is to permit hosts to inject packets into any network and
have they travel independently to the destination (potentially on a different network). They
may even arrive in a different order than they were sent, in which case it is the job of higher
layers to rearrange them, if in-order delivery is desired. Note that ''internet'' is used here in a
generic sense, even though this layer is present in the Internet.
The internet layer defines an official packet format and protocol called IP (Internet Protocol).
The job of the internet layer is to deliver IP packets where they are supposed to go. Packet
routing is clearly the major issue here, as is avoiding congestion. For these reasons, it is
reasonable to say that the TCP/IP internet layer is similar in functionality to the OSI network
layer. Fig. shows this correspondence.
Transport Layer
It contains two end-to-end protocols. TCP is a connection-oriented protocol and is responsible
for keeping track of the order in which packets are sent and reassemble arriving packets in the
Application Layer
It is the upper layer of the model and contains different kinds of protocols used for many
applications It includes virtual terminal TELNET for remote accessing on a distance machine,
File Transfer Protocol FTP and e-mail (SMTP). It also contains protocols like HTTP for fetching
pages on the www and others. The TCP/IP model does not have session or presentation layers. On
top of the transport layer is the application layer. It contains all the higher-level protocols. The
early ones included virtual terminal (TELNET), file transfer (FTP), and electronic mail (SMTP),
as shown in Fig.6.2. The virtual terminal protocol allows a user on one machine to log onto a
distant machine and work there. The file transfer protocol provides a way to move data efficiently
from one machine to another. Electronic mail was originally just a kind of file transfer, but later a
specialized protocol (SMTP) was developed for it. Many other protocols have been added to
these over the years: the Domain Name System (DNS) for mapping host names onto their
network addresses, protocols for moving USENET news articles around, and HTTP, the protocol
for fetching pages on theWorld Wide Web, and many others.
When we communicate, we are sharing information. This sharing can be local or remote.
Between individuals, local communication usually occurs face to face, while remote
communication takes place over distance. The term telecommunication, which includes
telephony, telegraphy, and television, means communication at a distance (teleis Greek for
"far").
The word data refers to information presented in whatever form is agreed upon by the parties
creating and using the data. Data communications are the exchange of data between two devices
via some form of transmission medium such as a wire cable. For data communications to occur,
the communicating devices must be part of a communication system made up of a combination
of hardware (physical equipment) and software (programs). The effectiveness of a data
communications system depends on four fundamental characteristics: delivery, accuracy,
timeliness, and jitter.
I. Delivery. The system must deliver data to the correct destination. Data must be
received by the intended device or user and only by that device or user.
2. Accuracy. The system must deliver the data accurately. Data that have been
altered in transmission and left uncorrected are unusable.
COMPONENTS
Half-Duplex
In half-duplex mode, each station can both transmit and receive, but not at the same time. When
one device is sending, the other can only receive, and vice versa The half-duplex mode is like a
one-lane road with traffic allowed in both directions. When cars are traveling in one direction,
cars going the other way must wait. In a half-duplex transmission, the entire capacity of a
channel is taken over by whichever of
the two devices is transmitting at the time. Walkie-talkies and CB (citizens band) radios are both
half-duplex systems.
The half-duplex mode is used in cases where there is no need for communication in both
direction at the same time; the entire capacity of the channel can be utilized for
each direction.
Full-Duplex
In full-duplex both stations can transmit and receive simultaneously (see Figure 1.2c).
The full-duplex mode is like a two way street with traffic flowing in both directions at the same
time. In full-duplex mode, signals s going in one direction share the capacity of the link: with
signals going in the other direction. This sharing can occur in two ways: Either the link must
contain two physically separate transmisssion paths one for sending and the other for receiving;
or the capacity of the channel is divided
Physical Topology
The term physical topology refers to the way in which a network is laid out physically.: Two or
more devices connect to a link; two or more links form a topology. The topology of a network is
the geometric representation of the relationship of all the links and linking devices (usually
called nodes) to one another. There are four basic topologies possible: mesh, star, bus, and ring
Mesh
In a mesh topology, every device has a dedicated point-to-point link to every other device. The
term dedicated means that the link carries traffic only between the devices it connects. To find
the number of physical links in a fully connected mesh network with n nodes, we first consider
that each node must be connected to every other node. Node 1 must be connected to n - I nodes,
node 2 must be connected to n - 1 nodes, and finally node n must be connected to n - 1 nodes.
We need n(n - 1) physical links. However, if each physical link allows communication in both
directions (duplex mode), we can divide the number of links by 2. In other words, we can say
that in a mesh topology, we need n(n -1) /2 duplex-mode links.
To accommodate that many links, every device on the network must have n - 1
input/output (VO) ports to be connected to the other n - 1 stations.
• First, the use of dedicated links guarantees that each connection can carry its own data
load, thus eliminating the traffic problems that can occur when links must be shared by
multiple devices.
• Second, a mesh topology is robust. If one link becomes unusable, it does not incapacitate
the entire system.
• Third, there is the advantage of privacy or security. When every message travels along a
dedicated line, only the intended recipient sees it. Physical boundaries prevent other users
from gaining access to messages.
• Finally, point-to-point links make fault identification and fault isolation easy. Traffic can
be routed to avoid links with suspected problems. This facility enables the network
manager to discover the precise location of the fault and aids in finding its cause and
solution.
The main disadvantages of a mesh are related to the amount of cabling and the number of I/O
ports required.
First, because every device must be connected to every other device, installation and
reconnection are difficult. Second, the sheer bulk of the wiring can be greater than the available
space (in walls, ceilings, or floors) can accommodate.
Finally, the hardware required to connect each link (I/O ports and cable) can be prohibitively
expensive. For these reasons a mesh topology is usually implemented in a limited fashion, for
example, as a backbone connecting the main computers of a hybrid network that can include
several other topologies.
Star Topology
• In a star topology, each device has a dedicated point-to-point link only to a central
controller, usually called a hub. The devices are not directly linked to one another. Unlike
a mesh topology, a star topology does not allow direct traffic between devices. The
controller acts as an exchange: If one device wants to send data to another, it sends the
data to the controller, which then relays the data to the other connected device .
• A star topology is less expensive than a mesh topology. In a star, each device needs only
one link and one I/O port to connect it to any number of others. This factor also makes it
easy to install and reconfigure.
• Other advantages include robustness. If one link fails, only that link is affected. All other
links remain active. This factor also lends itself to easy fault identification and fault
isolation.
• One big disadvantage of a star topology is the dependency of the whole topology on one
single point, the hub. If the hub goes down, the whole system is dead.
Bus Topology
• A bus topology, on the other hand, is multipoint. One long cable acts as a backbone to
link all the devices in a network.
• Nodes are connected to the bus cable by drop lines and taps. A drop line is a connection
running between the device and the main cable. A tap is a connector that either splices
into the main cable. As a signal travels along the backbone, some ofits energy is
transformed into heat. Therefore, it becomes weaker and weaker as it travels farther and
farther. Forthis reason there is a limit on the number of taps a bus can support and on the
distance between those taps.
• Advantages of a bus topology include ease of installation.
• Disadvantages include difficult reconnection and fault isolation. A bus is usually
designed to be optimally efficient at installation. It can therefore be difficult to add new
devices. Signal reflection at the taps can cause degradation in quality.
Ring Topology
• In a ring topology, each device has a dedicated point-to-point connection with only the
two devices on either side of it.
• Each device in the ring incorporates a repeater. When a device receives a signal intended
for another device, its repeater regenerates the bits and passes them along.