Computer Networking
Computer Networking
Computer Network is a group of computers connected with each other through wires, optical
fibres or optical links so that various devices can interact with each other through a network.
The aim of the computer network is the sharing of resources among various devices.
Computer Network uses distributed processing in which task is divided among several
computers. Instead, a single computer handles an entire task, each separate computer
handles a subset.
NIC(National interface card): NIC is a device that helps the computer to communicate with
another device. The network interface card contains the hardware addresses, the data-link
layer protocol use this address to identify the system on the network so that it transfers the
data to the correct destination. It can support a transfer rate of 10,100 to 1000 Mb/s.
There are two types of NIC: wireless NIC and wired NIC.
o Wireless NIC: All the modern laptops use the wireless NIC. In Wireless NIC, a
connection is made using the antenna that employs the radio wave technology.
o Wired NIC: Cables use the wired NIC to transfer the data over the medium.
Hub : Hub is a central device that splits the network connection into multiple devices. When
computer requests for information from a computer, it sends the request to the Hub through
cable. Hub distributes this request to all the interconnected computers.
Switches: Switch is a networking device that groups all the devices over the network to
transfer the data to another device. A switch is better than Hub as it does not broadcast the
message over the network, i.e., it sends the message to the device for which it belongs to.
Therefore, we can say that switch sends the message directly from source to the destination.
Router: Router is a device that connects the LAN to the internet. The router is mainly used to
connect the distinct networks or connect the internet to multiple computers.
Modem: Modem connects the computer to the internet over the existing telephone line. A
modem is not integrated with the computer motherboard. A modem is a separate part on the
PC slot found on the motherboard.
Cables and Connectors: Cable is a transmission media used for transmitting a signal.
Reliability: Computer network can use the alternative source for the data communication in
case of any hardware failure.
Scalability: Scalability means that we can add the new components on the network. Network
must be scalable so that we can extend the network by adding new devices. But, it decreases
the speed of the connection and data of the transmission speed also decreases, this increases
the chances of error occurring. This problem can be overcome by using the routing or
switching devices.
Computer Network Architecture: Computer Network Architecture is defined as the physical
and logical design of the software, hardware, protocols, and media of the transmission of
data. Simply we can say that how computers are organized and how tasks are allocated to the
computer.
The two types of network architectures are used:
1. Peer-To-Peer network: Peer-To-Peer network is a network in which all the computers are
linked together with equal privilege and responsibilities for processing the data.
2. Client/Server Network: Client/Server network is a network model designed for the end
users called clients, to access the resources such as songs, video, etc. from a central computer
known as Server.
o The central controller is known as a server while all other computers in the network
are called clients.
o A server performs all the major operations such as security and network management.
o A server is responsible for managing all the resources such as files, directories, printer,
etc.
o All the clients communicate with each other through a server. For example, if client1
wants to send some data to client 2, then it first sends the request to the server for
the permission. The server sends the response to the client 1 to initiate its
communication with the client 2.
Advantages Of Client/Server network:
o A Client/Server network contains the centralized system. Therefore we can back up
the data easily.
o A Client/Server network has a dedicated server that improves the overall performance
of the whole system.
o Security is better in Client/Server network as a single server administers the shared
resources.
o It also increases the speed of the sharing resources.
Computer Network Types: A computer network can be categorized by their size. A computer
network is mainly of four types:
1. LAN(Local Area Network): Local Area Network is a group of computers connected to each
other in a small area such as building, office.
o LAN is used for connecting two or more personal computers through a communication
medium such as twisted pair, coaxial cable, etc.
o It is less costly as it is built with inexpensive hardware such as hubs, network adapters,
and ethernet cables.
o The data is transferred at an extremely faster rate in Local Area Network.
o Local Area Network provides higher security.
o Personal Area Network is used for connecting the computer devices of personal use is
known as Personal Area Network.
o Thomas Zimmerman was the first research scientist to bring the idea of the Personal
Area Network.
o Personal Area Network covers an area of 30 feet.
o Personal computer devices that are used to develop the personal area network are
the laptop, mobile phones, media player and play stations.
Wired Personal Area Network: Wired Personal Area Network is created by using the USB.
o Government agencies use MAN to connect to the citizens and private industries.
o In MAN, various LANs are connected to each other through a telephone exchange line.
o The most widely used protocols in MAN are RS-232, Frame Relay, ATM, ISDN, OC-3,
ADSL, etc.
o It has a higher range than Local Area Network(LAN).
4. WAN(Wide Area Network): A Wide Area Network is a network that extends over a large
geographical area such as states or countries.
Transmission modes: The way in which data is transmitted from one device to another device
is known as transmission mode.
o The transmission mode is also known as the communication mode.
o Each communication channel has a direction associated with it, and transmission
media provide the direction. Therefore, the transmission mode is also known as a
directional mode.
o The transmission mode is defined in the physical layer.
o A device can only send the data but cannot receive it or it can receive the data but
cannot send the data.
o This transmission mode is not very popular as mainly communications require the
two-way exchange of data.
o The radio station is a simplex channel as it transmits the signal to the listeners but
never allows them to transmit back.
o Keyboard and Monitor are the examples of the simplex mode as a keyboard can only
accept the data from the user and monitor can only be used to display the data on the
screen.
o The main advantage of the simplex mode is that the full capacity of the
communication channel can be utilized during transmission.
2. Half-Duplex mode: In a Half-duplex channel, direction can be reversed, i.e., the station can
transmit and receive the data as well.
o Messages flow in both the directions, but not at the same time.
o The entire bandwidth of the communication channel is utilized in one direction at a
time.
o In half-duplex mode, it is possible to perform the error detection, and if any error
occurs, then the receiver requests the sender to retransmit the data.
o A Walkie-talkie is an example of the Half-duplex mode.
o In half-duplex mode, when one device is sending the data, then another has to wait,
this causes the delay in sending the data at the right time.
3. Full-duplex mode: In Full duplex mode, the communication is bi-directional, i.e., the data
flow in both the directions.
o Both the stations can send and receive the message simultaneously.
o Full-duplex mode has two simplex channels. One channel has traffic moving in one
direction, and another channel has traffic flowing in the opposite direction.
o The Full-duplex mode is the fastest mode of communication between devices.
o The most common example of the full-duplex mode is a telephone network. When
two people are communicating with each other by a telephone line, both can talk and
listen at the same time.
Network Topology: Topology defines the structure of the network of how all the components
are interconnected to each other. There are two types of topology: physical and logical
topology.
Types of Network Topology: Physical topology is the geometric representation of all the
nodes in a network. There are six types of network topology which are Bus Topology, Ring
Topology, Tree Topology, Star Topology, Mesh Topology, and Hybrid Topology.
1) Bus Topology: Bus Topology is a network type in which every computer and network
device is connected through a single cable known as a backbone cable.
o Each node is either connected to the backbone cable by drop cable or directly
connected to the backbone cable.
o It is bi-directional.
o It is a multi-point connection and a non-robust topology because if the backbone
fails the topology crashes.
o In Bus Topology, various MAC (Media Access Control) protocols are followed by LAN
ethernet connections like TDMA, Pure Aloha, CDMA, Slotted Aloha, etc.
o The most common access method of the bus topologies is CSMA (Carrier Sense
Multiple Access).
CSMA: It is a media access control used to control the data flow so that data integrity is
maintained, i.e., the packets do not get lost. There are two alternative ways of handling the
problems that occur when two nodes send the messages simultaneously.
o CSMA CD: CSMA CD (Collision detection) is an access method used to detect the
collision. Once the collision is detected, the sender will stop transmitting the data.
Therefore, it works on "recovery after the collision".
o CSMA CA: CSMA CA (Collision Avoidance) is an access method used to avoid the
collision by checking whether the transmission media is busy or not. If busy, then the
sender waits until the media becomes idle. This technique effectively reduces the
possibility of the collision. It does not work on "recovery after the collision".
o Low-cost cable: In bus topology, nodes are directly connected to the cable without
passing through a hub. Therefore, the initial cost of installation is low.
o Moderate data speeds: Coaxial or twisted pair cables are mainly used in bus-based
networks that support upto 10 Mbps.
o Familiar technology: Bus topology is a familiar technology as the installation and
troubleshooting techniques are well known.
2) Ring Topology: In a Ring Topology, it forms a ring connecting devices with exactly two
neighboring devices. A number of repeaters are used for Ring topology with a large number
of nodes, because if someone wants to send some data to the last node in the ring topology
with 100 nodes, then the data will have to pass through 99 nodes to reach the 100th node.
Hence to prevent data loss repeaters are used in the network.
The data flows in one direction, i.e. it is unidirectional, but it can be made bidirectional by
having 2 connections between each Network Node, it is called Dual Ring Topology. In-Ring
Topology, the Token Ring Passing protocol is used by the workstations to transmit the data.
3) Star Topology: In Star Topology, all the devices are connected to a single hub through a
cable. This hub is the central node and all other nodes are connected to the central node.
The hub can be passive in nature i.e., not an intelligent hub such as broadcasting devices,
at the same time the hub can be intelligent known as an active hub. Active hubs have
repeaters in them. Coaxial cables or RJ-45 cables are used to connect the computers. In Star
Topology, many popular Ethernet LAN protocols are used as CD(Collision Detection), CSMA
(Carrier Sense Multiple Access), etc.
4) Tree topology: This topology is the variation of the Star topology. A tree topology is a type
of structure in which all the computers are connected with each other in hierarchical fashion.
In Tree Topology, protocols like DHCP and SAC (Standard Automatic Configuration ) are
used.
5) Mesh topology: In a mesh topology, every device is connected to another device via a
particular channel. In Mesh Topology, the protocols used are AHCP (Ad Hoc Configuration
Protocols), DHCP (Dynamic Host Configuration Protocol), etc. It does not contain the switch,
hub or any central computer which acts as a central point of communication. Mesh topology
is mainly used for WAN implementations where communication failures are a critical concern.
The Internet is an example of the mesh topology.
Point-to-Point Topology is a type of topology that works on the functionality of the sender
and receiver. It is the simplest communication between two nodes, in which one is the
sender and the other one is the receiver. Point-to-Point provides high bandwidth.
Computer Network Models
Layered Architecture: The main aim of the layered architecture is to divide the design into
small pieces.
o Each lower layer adds its services to the higher layer to provide a full set of services to
manage communications and run the applications.
o The basic elements of layered architecture are services, protocols, and interfaces.
o Service: It is a set of actions that a layer provides to the higher layer.
o Protocol: It defines a set of rules that a layer uses to exchange the information
with peer entity. These rules mainly concern about both the contents and
order of the messages used.
o Interface: It is a way through which the message is transferred from one layer
to another layer.
OSI Model: OSI stands for Open Systems Interconnection. It is a reference framework that
explains the process of transmitting data between computers. It is divided into seven layers
that work together to carry out specialised network functions, allowing for a more
systematic approach to networking. It is a 7-layer architecture with each layer having
specific functionality to perform.. OSI model was developed by ISO – ‘International
Organization for Standardization‘, in the year 1984.
1) Physical Layer
o It is the lowest layer of the OSI model.
o The main functionality of the physical layer is to transmit the individual bits from one
node to another node.
o It establishes, maintains and deactivates the physical connection.
o When receiving data, this layer will get the signal received and convert it into 0s and
1s and send them to the Data Link layer, which will put the frame back together.
2) Data-Link Layer
o The data link layer is responsible for the node-to-node delivery of the message.
o The main function of this layer is to make sure data transfer is error-free from one
node to another, over the physical layer.
o When a packet arrives in a network, it is the responsibility of the DLL to transmit it
to the Host using its MAC address.
o It contains two sub-layers: Logical Link Control Layer and Media Access Control Layer
o A Media access control layer is a link between the Logical Link Control layer
and the network's physical layer.
o It is used for transferring the packets over the network.
4) Transport Layer: The transport layer is called as Heart of the OSI model. The transport
layer provides services to the application layer and takes services from the network layer.
The data in the transport layer is referred to as Segments. It is responsible for the end-to-
end delivery of the complete message. The transport layer also provides the
acknowledgment of the successful data transmission and re-transmits the data if an error is
found.
At the sender’s side: The transport layer receives the formatted data from the upper
layers, performs Segmentation, and also implements Flow and error control to ensure
proper data transmission. It also adds Source and Destination port numbers in its header
and forwards the segmented data to the Network Layer.
At the receiver’s side: Transport Layer reads the port number from its header and forwards
the Data which it has received to the respective application. It also performs sequencing and
reassembling of the segmented data.
7) Application Layer: At the very top of the OSI Reference Model stack of layers, we find the
Application layer which is implemented by the network applications. These applications
produce the data, which has to be transferred over the network. It serves as a window for
users and application processes to access network service. It handles issues such as network
transparency, resource allocation, etc. The application Layer is also called Desktop Layer.
o File transfer, access, and management (FTAM): An application layer allows a user to
access the files in a remote computer, to retrieve the files from a computer and to
manage the files in a remote computer.
o Mail services: An application layer provides the facility for email forwarding and
storage.
o Directory services: An application provides the distributed database sources and is
used to provide that global information about various objects.
TCP/IP model: TCP/IP was designed and developed by the Department of Defense (DoD) in
the 1960s and is based on standard protocols. It stands for Transmission Control
Protocol/Internet Protocol.
The TCP/IP model consists of five layers: the application layer, transport layer, network layer,
data link layer and physical layer.
The main work of TCP/IP is to transfer the data of a computer from one device to another.
The main condition of this process is to make data reliable and accurate so that the receiver
will receive the same information which is sent by the sender. To ensure that, each message
reaches its final destination accurately, the TCP/IP model divides its data into packets and
combines them at the other end, which helps in maintaining the accuracy of the data while
transferring from one end to another end.
Internet Layer:
Transport Layer: It is also known as host-to-host layer. The TCP/IP transport layer protocols
exchange data receipt acknowledgments and retransmit missing packets to ensure that
packets arrive in order and without error. End-to-end communication is referred to as such.
Transmission Control Protocol (TCP) and User Datagram Protocol are transport layer
protocols at this level (UDP).
• TCP: Applications can interact with one another using TCP as though they were
physically connected by a circuit. TCP transmits data in a way that resembles
character-by-character transmission rather than separate packets. A starting
point that establishes the connection, the whole transmission in byte order,
and an ending point that closes the connection make up this transmission.
• UDP: The datagram delivery service is provided by UDP, the other transport
layer protocol. Connections between receiving and sending hosts are not
verified by UDP. Applications that transport little amounts of data use UDP
rather than TCP because it eliminates the processes of establishing and
validating connections.
Application Layer: An application layer is the topmost layer in the TCP/IP model. It is
responsible for end-to-end communication and error-free delivery of data. It shields the
upper-layer applications from the complexities of data. The three main protocols present in
this layer are:
HTTP and HTTPS: HTTP stands for Hypertext transfer protocol. It is used by the World Wide
Web to manage communications between web browsers and servers. HTTPS stands for
HTTP-Secure. It is a combination of HTTP with SSL(Secure Socket Layer). It is efficient in
cases where the browser needs to fill out forms, sign in, authenticate, and carry out bank
transactions.
SSH: SSH stands for Secure Shell. It is a terminal emulations software similar to Telnet. The
reason SSH is preferred is because of its ability to maintain the encrypted connection. It
sets up a secure session over a TCP/IP connection.
NTP: NTP stands for Network Time Protocol. It is used to synchronize the clocks on our
computer to one standard time source. It is very useful in situations like bank transactions.
Assume the following situation without the presence of NTP. Suppose you carry out a
transaction, where your computer reads the time at 2:30 PM while the server records it at
2:28 PM. The server can crash very badly if it’s out of sync.
TCP/IP OSI
The Transport layer in TCP/IP does not In the OSI model, the transport layer
provide assurance delivery of packets. provides assurance delivery of packets.
o Attenuation: Attenuation means the loss of energy, i.e., the strength of the signal
decreases with increasing the distance which causes the loss of energy.
o Distortion: Distortion occurs when there is a change in the shape of the signal. This
type of distortion is examined from different signals having different frequencies. Each
frequency component has its own propagation speed, so they reach at a different time
which leads to the delay distortion.
o Noise: When data is travelled over a transmission medium, some unwanted signal is
added to it which creates the noise.
Unshielded Twisted Pair (UTP): UTP consists of two insulated copper wires twisted
around one another. This type of cable has the ability to block interference and does not
depend on a physical shield for this purpose.
o It is cheap.
o Installation of the unshielded twisted pair is easy.
o It can be used for high-speed LAN.
Disadvantages:
o ⇢ Susceptible to external interference
Baseband mode: In this mode, digital signals are directly transmitted without modulation.
It's commonly used for transmitting data over short distances, such as within a local area
network (LAN).
Broadband mode: In this mode, analog signals are modulated onto a high-frequency carrier
wave. This mode is often used for transmitting television signals, internet access via cable
modems, and other long-distance communication applications.
(iii) Optical Fiber Cable – Fibre optic cable is a cable that uses electrical signals for
communication. It uses the concept of refraction of light through a core made up of glass or
plastic. The core is surrounded by a less dense glass or plastic covering called the cladding.
It is used for the transmission of large volumes of data.
Core: The optical fibre consists of a narrow strand of glass or plastic known as a core.
Cladding: The concentric layer of glass is known as cladding. The main functionality of the
cladding is to provide the lower refractive index at the core interface.
Jacket: The protective coating consisting of plastic is known as a jacket. The main purpose of
a jacket is to preserve the fibre strength, absorb shock and extra fibre protection.
o Greater Bandwidth: The fibre optic cable provides more bandwidth as compared
copper.
o Faster speed: Fibre optic cable carries the data in the form of light. This allows the
fibre optic cable to carry the signals at a higher speed.
o Longer distances: The fibre optic cable carries the data at a longer distance as
compared to copper cable.
o Better reliability: The fibre optic cable is more reliable than the copper cable as it is
immune to any temperature changes while it can cause obstruct in the connectivity of
copper cable.
o Thinner and Sturdier: Fibre optic cable is thinner and lighter in weight so it can
withstand more pull pressure than copper cable.
Disadvantages:
• Difficult to install and maintain
• High cost
• Fragile
Applications:
• Medical Purpose: Used in several types of medical instruments.
• Defence Purpose: Used in transmission of data in aerospace.
• For Communication: This is largely used in formation of internet cables.
• Industrial Purpose: Used for lighting purposes and safety measures in designing
the interior and exterior of automobiles.
2. Unguided Media:
It is also referred to as Wireless or Unbounded transmission media. No physical medium is
required for the transmission of electromagnetic signals.
Features:
• The signal is broadcasted through air
• Less Secure
• Used for larger distances
There are 3 types of Signals transmitted through unguided media:
(iii) Infrared –
Infrared waves are used for very short distance communication. They cannot penetrate
through obstacles. This prevents interference between systems. Frequency Range:300GHz
– 400THz. It is used in TV remotes, wireless mouse, keyboard, printer, etc. We can
communicate with any point on the globe by using satellite communication.