New CN
New CN
1-Resource Sharing
3-High Reliability
4-Improve Performance
Computer networks must provide high performance and low latency /high
throughput to ensure that applications and services are responsive and
available when needed. This requires optimizing network infrastructure,
bandwidth utilization, and traffic management, congestion control, inserting
one or more processors into it as its workload grows
5-Communication Medium
6-Security
Ensuring the security and integrity of data transmitted over the network is
a critical goal. This includes encryption, authentication, access control, and
other security measures to protect against unauthorized access, data
breaches, and cyberattacks.
7-Flexibility
Networks should be flexible enough to support different types of
applications and devices. This includes accommodating diverse
communication protocols, network architectures, and emerging
technologies.
1. Message :
The message simply refers to data or piece of information which is to
be communicated. A message could be in any form, it may be in form of a
text file, an audio file, a video file, etc.
2. Sender :
Sender plays part of a source in data communication system. It is
simple a device that sends data message. The device could be in form of a
computer, mobile, telephone, laptop, video camera, or a workstation, etc.
3. Receiver :
It is destination where finally message sent by source has arrived. It
is a device that receives message. Same as sender, receiver can also be in
form of a computer, telephone mobile, workstation, etc.
4. Transmission Medium :
Act as a bridge between sender and receiver. It is physical path by
which data or message travels from sender to receiver. Transmission
medium could be guided (with wires) or unguided (without wires), for
example, twisted pair cable, fiber optic cable, radio waves, microwaves, etc.
5. Set of rules (Protocol) :
Protocol is a set of rules that govern data communication. If two
different devices are connected but there is no protocol among them, there
would not be any kind of communication between those two devices. Thus
the protocol is necessary for data communication to take place.
NIC
o NIC stands for network interface card.
o NIC is a hardware component used to connect a computer with
another computer onto a network
o It can support a transfer rate of 10,100 to 1000 Mb/s.
o The MAC address or physical address is encoded on the
network card chip used to identify a network card uniquely.
o There are two types of NIC:
1 Wired NIC: The Wired NIC is present inside the motherboard. Cables
and connectors are used with wired NIC to transfer data.
2 Wireless NIC: The wireless NIC contains the antenna to obtain the
connection over the wireless network. For example, laptop computer
contains the wireless NIC.
Hub
. A Hub is a hardware device that divides the network
connection among multiple devices.
. When computer requests for some information from a
network, it first sends the request to the Hub through cable. .
Hub will broadcast this request to the entire network.
Switch
. A switch is a hardware device that connects multiple devices
on a computer network.
. A Switch contains more advanced features than Hub.
. Switch delivers the message to the correct destination based
on the physical address present in the incoming message.
. A Switch does not broadcast the message to the entire network
like the Hub.
. Switch provides a direct connection between the source and
destination. It increases the speed of the network.
Router
. A router is a hardware device which is used to connect a LAN
with an internet connection.
. It is used to receive, analyze and forward the incoming
packets to another network.
. A router works in a Layer 3 (Network layer) of the OSI
Reference model.
. It determines the best path from the available paths for the
transmission of the packet.
Modem
.A modem is a hardware device that allows the computer to
connect to the internet over the existing telephone line.
. It stands for Modulator/Demodulator.
. It converts the digital data into an analog signal over the
telephone lines.
. Classified in the following categories:
1. Wired Media
2. Wireless Media
Examples of Wired media are as follows:
Coaxial Cable
4 USB Cable: USB Stands for Universal Serial Bus. Mainly used to connect
PCs and smartphones.
Examples of Wireless media are as follows:
• Infrared (E.g. short-range communication – TV remote control).
• Radio (E.g. Bluetooth, Wi-Fi).
• Microwaves (E.g. Cellular system).
• Satellite (E.g. Long range communications – GPS).
• Repeater
It is used to regenerate and amplify signal in the computer networks.
Repeaters are used to improve the quality of the networks and they are
operated on the Physical Layer of the OSI Model.
* Server
The server plays a vital role in facilitating communication, data storage,
etc. Servers have more data storage as compared to normal computers.
• Firewall:
Firewalls are security devices that control and monitor incoming and
outgoing network traffic. Firewalls can be hardware-based or software-
based and are essential for network security.
--Transmission Media-
A physical path between the transmitter and the receiver i.e. it is the
channel through which data is sent from one place to another.
Transmission Media is broadly classified into the following types:
Applications:
Used in telephone connections and LAN networks
•Shielded Twisted Pair (STP):
This type of cable consists of a special jacket (a copper braid covering or a
foil shield) to block external interference. It is used in fast-data-rate
Ethernet and in voice and data channels of telephone lines.
Applications:
The shielded twisted pair type of cable is most frequently used in extremely
cold climates, where the additional layer of outer covering makes it perfect
for withstanding such temperatures or for shielding the interior
components.
(ii) Coaxial Cable –
It has an outer plastic covering containing an insulation layer made of PVC
or Teflon and 2 parallel conductors each having a separate insulated
protection cover. The coaxial cable transmits information in two modes:
Baseband mode(dedicated cable bandwidth) and Broadband mode(cable
bandwidth is split into separate ranges). Cable TVs and analog television
networks widely use Coaxial cables.
Features:
• The signal is broadcasted through air
• Less Secure
• Used for larger distances
There are 3 types of Signals transmitted through unguided media:
--Types of Switching
* Message Switching:
This is an older switching technique that has become
obsolete. In message switching technique, the entire data block/message is
forwarded across the entire network thus, making it highly inefficient.
* Circuit Switching:
In this type of switching, a connection is established
between the source and destination beforehand. This connection receives
the complete bandwidth of the network until the data is transferred
completely.
This approach is better than message switching as it does not involve
sending data to the entire network, instead of its destination only.
* Packet Switching:
This technique requires the data to be broken down into
smaller components, data frames, or packets. These data frames are then
transferred to their destinations according to the available resources in the
network at a particular time.
This switching type is used in modern computers and even the Internet.
Here, each data frame contains additional information about the
destination and other information required for proper transfer through
network components.
--Framing
Parts of a Frame
*Byte Stuffing
Most protocols have used the same byte called a flag byte, as
both the starting and ending delimiter. In this way, if the receiver ever loss
synchronization, it can just search for the flag byte to find the end of
current frame. Two consecutive flag bytes indicate the end of one frame
and start of the next one. An escape byte is stuffed into the outgoing
character stream before a flag byte in the data.
Drawback : It is closely tied to the use of 8-bit character. Not all character
codes use 8-bit characters. For example, UNICODE is 16-bit characters.
Byte Stuffing
*Bit Stuffing
Each frame begins and ends with a special bit pattern,
01111110. Whenever the sender’s data link layer encounters five
consecutive 1s in the data it automatically stuffs a 0 bit into the outgoing bit
stream. The bit stuffing is equivalent to byte stuffing. Receiver
automatically dyestuffs (delete) the 0 bits.
Disadvantages
• Single Parity check is not able to detect even no. of bit error.
• For example, the Data to be transmitted is 101010.
Two-dimensional Parity Check--Two-dimensional Parity check bits are
calculated for each row, which is equivalent to a simple parity check bit. Parity
check bits are also calculated for all columns, then both are sent along with the
data. At the receiving end, these are compared with the parity bits calculated on
the received data.
Checksum
Checksum error detection is a method used to identify errors in
transmitted data. The process involves dividing the data into equally sized
segments and using a 1’s complement to calculate the sum of these
segments. The calculated sum is then sent along with the data to the
receiver. At the receiver’s end, the same process is repeated and if all zeroes
are obtained in the sum, it means that the data is correct.
Checksum – Operation at Sender’s Side
• Firstly, the data is divided into k segments each of m bits.
• On the sender’s end, the segments are added using 1’s complement
arithmetic to get the sum. The sum is complemented to get the checksum.
• The checksum segment is sent along with the data segments.
Checksum – Operation at Receiver’s Side
• At the receiver’s end, all received segments are added using 1’s
complement arithmetic to get the sum. The sum is complemented.
• If the result is zero, the received data is accepted; otherwise
discarded.
Disadvantages
• If one or more bits of a segment are damaged and the
corresponding bit or bits of opposite value in a second segment are also
damaged.
Cyclic Redundancy Check (CRC)
• CRC is based on binary division.
• In CRC, a sequence of redundant bits, called cyclic
redundancy check bits, are appended to the end of the data unit so that
the resulting data unit becomes exactly divisible by a second,
predetermined binary number.
• At the destination, the incoming data unit is divided by the
same number. If at this step there is no remainder, the data unit is
assumed to be correct and is therefore accepted.
• A remainder indicates that the data unit has been damaged in
transit and therefore must be rejected.
--Multiple Access (MA) Protocols
1. Random Access Protocol: In this, all stations have same superiority that
is no station has more priority than another station. Any station can send
data depending on medium’s state( idle or busy). It has two features:
1. There is no fixed time for sending data
2. There is no fixed sequence of stations sending data
The Random access protocols are further subdivided as:
(a) ALOHA – It was designed for wireless LAN but is also applicable for
shared medium. In this, multiple stations can transmit data at the same
time and can hence lead to collision and data being garbled.
• Pure Aloha:
When a station sends data it waits for an acknowledgement. If the
acknowledgement doesn’t come within the allotted time then the station
waits for a random amount of time called back-off time (Tb) and re-sends
the data. Since different stations wait for different amount of time, the
probability of further collision decreases.
Vulnerable Time = 2* Frame transmission time
Throughput = G exp{-2*G}
Maximum throughput = 0.184 for G=0.5
• Slotted Aloha:
It is similar to pure aloha, except that we divide time into slots and
sending of data is allowed only at the beginning of these slots. If a station
misses out the allowed time, it must wait for the next slot. This reduces the
probability of collision.
Vulnerable Time = Frame transmission time
Throughput = G exp{-*G}, Maximum throughput = 0.368 for G=1
(b) CSMA – Carrier Sense Multiple Access ensures fewer collisions as the
station is required to first sense the medium (for idle or busy) before
transmitting data. If it is idle then it sends data, otherwise it waits till the
channel becomes idle. However there is still chance of collision in CSMA
due to propagation delay.
--MAC Address
* MAC address is the physical address, which uniquely identifies each
device on a given network.
* To make communication between two networked devices, we need two
addresses: IP address and MAC address.
* A physical address that operates at the Data Link Layer is called a Media
Access Control Address.
*It is assigned to the NIC (Network Interface card) of each device that can
be connected to the internet.I
*t is globally unique; it means two devices cannot have the same MAC
address.
* It is represented in a hexadecimal format on each device
2. A switch can have a lot of ports. A bridge can have 2 or 4 ports only.
The switching method in case of a switch can thus be store, The switching method in case of a
4.
forward, fragment free or cut through. bridge is store and forward.