0% found this document useful (0 votes)
35 views25 pages

5 GOAT Computer Awareness PDF - Data Communication and Networking

as

Uploaded by

sukutrao
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
35 views25 pages

5 GOAT Computer Awareness PDF - Data Communication and Networking

as

Uploaded by

sukutrao
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 25

.

GOAT Computer Awareness PDF - Data Communication and Networking

Click Here for GOAT (The Complete Mentorship Program for Bank Exams)

In case of any queries contact us via this email: [email protected] 1


.

GOAT Computer Awareness PDF - Data Communication and Networking

DATA COMMUNICATION AND NETWORKING

When we communicate, we are sharing information. This sharing can be local or remote. Between

individuals, local communication usually occurs face to face, while remote communication takes place
over distance. The word data refers to information presented in whatever form is agreed upon by the

parties creating and using the data.

Data communication means the exchange of data between two devices via some form of transmission

medium such as a wire cable. For data communications to occur, the communicating devices must be
part of a communication system made up of a combination of hardware (physical equipment) and
software (programs). The effectiveness of a data communications system depends on four fundamental

characteristics: delivery, accuracy, timeliness, and jitter.

 Delivery: -The system must deliver data to the correct destination. Data must be received by the

intended device or user and only by that device or user.

 Accuracy: -The system must deliver the data accurately. Data that have been altered in
transmission and left uncorrected are unusable.

 Timeliness: -The system must deliver data in a timely manner. Data delivered late are useless. In
the case of video and audio, timely delivery means delivering data as they are produced, in the
same order that they are produced, and without significant delay. This kind of delivery is called

real-time transmission.

 Jitter: -Jitter refers to the variation in the packet arrival time. It is the uneven delay in the delivery

of audio or video packets.

Components in a data communication system

Click Here for GOAT (The Complete Mentorship Program for Bank Exams)

In case of any queries contact us via this email: [email protected] 2


.

GOAT Computer Awareness PDF - Data Communication and Networking

 Message: - The message is the information (data) to be communicated. Popular forms of

information include text, numbers, pictures, audio, and video.

 Sender: - The sender is the device that sends the data message. It can be a computer,

workstation, telephone handset, video camera, and so on.


 Receiver: - The receiver is the device that receives the message. It can be a computer,
workstation, telephone handset, television, and so on.
 Transmission medium: - The transmission medium is the physical path by which a message
travels from sender to receiver. Some examples of transmission media Include twisted-pair wire,

coaxial cable, fibre-optic cable, and radio waves.


 Protocol: - A protocol is a set of rules that govern data communications. It represents an

agreement between the communicating devices. Without a protocol, two devices may be
connected but not communicating.

Networking Topologies

 Mesh: -In a mesh topology, every device has a dedicated point-to-point link to every other device

Click Here for GOAT (The Complete Mentorship Program for Bank Exams)

In case of any queries contact us via this email: [email protected] 3


.

GOAT Computer Awareness PDF - Data Communication and Networking

 Star: - In a star topology, each device has a dedicated point-to-point link only to a central
controller, usually called a hub. The devices are not directly linked to one another. Unlike a mesh
topology, a star topology does not allow direct traffic between devices.

 Bus: - A bus topology is a multipoint connection. One long cable acts as a backbone to link all the
devices in a network.

Nodes are connected to the bus cable by drop lines and taps. A drop line is a connection running
between the device and the main cable. A tap is a connector that either splices into the main cable or
punctures the sheathing of a cable to create a contact with the metallic core.

 Ring: - In a ring topology, each device has a dedicated point-to-point connection with only the two
devices on either side of it. A signal is passed along the ring in one direction, from device to
device, until it reaches its destination.
Click Here for GOAT (The Complete Mentorship Program for Bank Exams)

In case of any queries contact us via this email: [email protected] 4


.

GOAT Computer Awareness PDF - Data Communication and Networking

 Hybrid Topology A Hybrid topology is a connection between different links and nodes to transfer
the data. It is the combination of various different topologies

What is a Computer Network?


A Computer Network is a group of computers connected with each other through wires, optical fibres,

wireless or optical links so that various devices can interact with each other through a network. The aim

of the computer network is the sharing of resources among various devices.


Uses of Computer Networking

 Resource sharing: - Resource sharing is the sharing of resources such as programs, printers, and
data among the users on the network without the requirement of the physical location of the
resource and user.

Click Here for GOAT (The Complete Mentorship Program for Bank Exams)

In case of any queries contact us via this email: [email protected] 5


.

GOAT Computer Awareness PDF - Data Communication and Networking

 E-commerce: -Computer network is also important in businesses. We can do the business over

the internet. For example, amazon.com is doing their business over the internet, i.e., they are
doing their business over the internet.
 Communication medium: - Computer network behaves as a communication medium among the

users. For example, a company contains more than one computer has an email system which the
employees use for daily communication.
 File sharing: - Files can be transferred on a network faster than any other medium.

 Cost Reduction: -Sharing of resources enables considerable cost reduction of resources.

Categories of network: -

 LAN (Local Area Network): - A LAN connects network devices over a relatively short distance. A
networked office building, school, or home usually contains a single LAN, though sometimes one

building will contain a few small LANs (perhaps one per room), and occasionally a LAN will span
a group of nearby buildings. A LAN is very useful for sharing resources, such as data storage and

printers. LANs can be built with relatively inexpensive hardware, such as hubs, network adapters
and Ethernet cables.
 MAN (Metropolitan Area Network): - MAN consists of a computer network across an entire city,

college campus or small region. A MAN is larger than a LAN, which is typically limited to a single
building or site. Depending on the configuration, this type of network can cover an area from
several miles to tens of miles. A MAN is often used to connect several LANs together to form a

bigger network.
 WAN (Wide Area Network): -A WAN provides long distance transmission of data, image, audio,

and video information over large geographic areas that may comprise a country, a continent, or

even the whole world.


 SAN (Storage Area Network): SAN is a high-speed network of storage devices that also connects
those storage devices with servers.

Click Here for GOAT (The Complete Mentorship Program for Bank Exams)

In case of any queries contact us via this email: [email protected] 6


.

GOAT Computer Awareness PDF - Data Communication and Networking

 CAN (Campus Area Network): - A campus area networks (CANs) is a computer network

interconnecting a few local area networks (LANs) within a university campus or corporate campus
Network.
 PAN (Personal Area Network): -A personal area network is a computer network organized around

an individual person. Personal area networks typically involve a mobile computer, Personal area
networks can be constructed with cables or wireless.

What are Protocols?

A protocol is a set of rules that govern data communication. A protocol defines what is communicated,

how it is communicated and when it is communicated.

The key elements of protocol are: -

 Syntax: - syntax refers to the structure or format of the data, meaning the order in which they are
presented.

 Semantics: -Semantics refer to the meaning of each section of bits.


 Timing: - Timing refers two characteristics: When data should be sent and how fast they can be

sent

Modes Of Transmission

The way in which data is transmitted from one device to another device is known as transmission mode.
Each communication channel has a direction associated with it, and transmission media provide the

direction. Therefore, the transmission mode is also known as a directional mode.

The transmission mode is defined in the physical layer.

 Simplex mode: -In Simplex mode, the communication is unidirectional, i.e., the data flow in one
direction. Example, a radio station is an example of Simplex mode communication.

Click Here for GOAT (The Complete Mentorship Program for Bank Exams)

In case of any queries contact us via this email: [email protected] 7


.

GOAT Computer Awareness PDF - Data Communication and Networking

 Half-Duplex mode: - In a Half-duplex channel, direction can be reversed, i.e., the station can

transmit and receive the data as well. Messages flow in both the directions, but not at the same
time.

 Full-duplex mode: - In Full duplex mode, the communication is bi-directional, i.e., the data flow in
both the directions. Both the stations can send and receive the message simultaneously.

TRANSMISSION MEDIUM

Different transmission medium

The two broad categories are Guided and Unguided media.

Click Here for GOAT (The Complete Mentorship Program for Bank Exams)

In case of any queries contact us via this email: [email protected] 8


.

GOAT Computer Awareness PDF - Data Communication and Networking

Guided media: -Guided media, which are those that provide a conduit from one device to another,

include Twisted-Pair Cable, Coaxial Cable, and Fibre-Optic Cable. A signal travelling along any of these
media is directed and contained by the physical limits of the medium.

 Twisted Pair Cable: - This cable is the most commonly used and is cheaper than others. It is
lightweight, cheap, can be installed easily, and they support many different types of network. Its

frequency range is 0 to 3.5 kHz. A twisted pair consists of two conductors (normally copper), each

with its own plastic insulation, twisted together.


Twisted Pair are two types: Shielded and Unshielded.
 Fibre Optics: -It transmits signals in the form of light and is made up of an inner core of glass or

plastic. The core is surrounded by a cladding that reflects light back into the core. Each fibre is

surrounded by a plastic casing. It is very efficient medium because it provides maximum


bandwidth, lower attenuation and is immune to Electromagnetic Interference.

 Coaxial Cable: - These contain two conductors that are parallel to each other. Copper is used in
this as centre conductor which can be a solid wire or a standard one. It is surrounded by PVC

installation, a sheath which is encased in an outer conductor of metal foil, braid or both.

Click Here for GOAT (The Complete Mentorship Program for Bank Exams)

In case of any queries contact us via this email: [email protected] 9


.

GOAT Computer Awareness PDF - Data Communication and Networking

Unguided Transmission: - Unguided transmission is used when running a physical cable (either fibre or

copper) between two end points is not possible.

 Radio waves: - These are the electromagnetic waves having a frequency range of 3KHz-1GHz.

These are omnidirectional i.e. the senders and receivers do not have to be in line of sight with
each other. These can penetrate walls and are prone to interference.

 Microwaves: - These are the electromagnetic waves having frequencies ranging from 1 to
300GHz. They are unidirectional and incorporates two antennas (sending & receiving) which

should be aligned or in line of sight with each other. They provide higher data rate but Very high
frequency microwaves are unable to penetrate the walls.

Networking Devices & Network Components

Click Here for GOAT (The Complete Mentorship Program for Bank Exams)

In case of any queries contact us via this email: [email protected] 10


.

GOAT Computer Awareness PDF - Data Communication and Networking

Modem: Modem stands for Modulator-Demodulator. It is used to connect computers for communication

via telephone lines.

Hub: It works at the Physical layer. It just acts like a connector of several computers i.e it simply

connects all the devices on its ports together .It broadcasts all the data packets arriving at it with no
filtering capacity.

Switch: Switch is data link layer device. A network switch connects computers to each other, like a hub.

Where the switch differs from a hub is in the way it handles packets of data. When a switch receives a
packet of data, it determines what computer or device the packet is intended for and sends it to that

computer only. It does not broadcast the packet to all computers as a hub does which means bandwidth
is not shared and makes the network much more efficient.

Repeater: It operates at the physical layer. It is used to amplify a signal that has lost its original strength
so as to enable them to travel long distances. It can only join the networks that transmit similar data
packets. It does not have filtering capacity i.e. all data including noise is amplified and passed on in the

network so don’t help in reducing network traffic.

Router: It works at the network layer and is used to connect different networks that have different
architectures and protocols. It sends the data packets to desired destination by choosing the best path
available thus reducing network traffic. It routes the data packets using the routing table that contains all

the Information regarding all known network addresses, possible paths and cost of transmission over
them.

Gateway: It operates in all the layers of the network architecture. It can be used to connect two different
networks having different architectures, environment and even models. It converts the data packets in
form that is suitable to the destination application. The two different networks may differ in types of

communication protocols they use, language, data formats etc.

Bridge: They are used two connect two LANs with the same standard but using different types of cables.

It provides an intelligent connection by allowing only desired messages to cross the bridge thus

Click Here for GOAT (The Complete Mentorship Program for Bank Exams)

In case of any queries contact us via this email: [email protected] 11


.

GOAT Computer Awareness PDF - Data Communication and Networking

improving performance. It uses physical addresses of the packets for this decision. It works on data link

layer of the OSI model.

Brouter: A brouter is a device that functions as both a bridge and a router. It can forward data between

networks (serving as a bridge), but can also route data to individual systems within a network (serving
as a router). The brouters functions at the network and data link layer of the OSI model.

Bridge Router

A bridge is a networking device that is A router is also a networking device that


used to connect two local area sends the data from one network to
networks (LANs) by using media another network with the help of their IP

access control addresses and transmit addresses


the data between them

A bridge is able to connect only two A router is capable of connecting the

different LAN segments. LAN and WAN

A bridge transfers the data in the form of A router transfers the data in the form of
frames. packets

The bridge does not use any table to The router uses a routing table to send
forward the data the data.

NIC (network interface card): - NIC is a hardware component used to connect a computer with another
computer onto a network. The MAC address or physical address is encoded on the network card chip

which is assigned by the IEEE to identify a network card uniquely. The MAC address is stored in the
PROM (Programmable read-only memory). It is also called network interface controller, network adapter
or LAN adapter. There are two types of NIC: Wired NIC &Wireless NIC.

Click Here for GOAT (The Complete Mentorship Program for Bank Exams)

In case of any queries contact us via this email: [email protected] 12


.

GOAT Computer Awareness PDF - Data Communication and Networking

Computer Network Architecture

Computer Network Architecture is defined as the physical and logical design of the software, hardware,
protocols, and media of the transmission of data. Simply we can say that how computers are organized
and how tasks are allocated to the computer.

The two types of network architectures are used:

 Peer-To-Peer network: - It is a network in which all the computers are linked together with equal
privilege and responsibilities for processing the data. Peer-To-Peer network is useful for small

environments, usually up to 10 computers. Peer-To-Peer network has no dedicated server.

Special permissions are assigned to each computer for sharing the resources, but this can lead to
a problem if the computer with the resource is down
 Client/Server network: - It is a network model designed for the end users called clients, to access

the resources such as songs, video, etc. from a central computer known as Server. The central
controller is known as a server while all other computers in the network are called clients. A

server performs all the major operations such as security and network management. A server is
responsible for managing all the resources such as files, directories, printer, etc.

Network Models

OSI Model

OSI (Open System Interconnection) Model was developed by International Standards Organisation

(ISO) to standardize the network architecture internationally. The purpose of the OSI Model is to show

how facilitate communication between different system without requiring changes to the logic of the
underlying hardware and software. It is a layered framework having seven layers.

Click Here for GOAT (The Complete Mentorship Program for Bank Exams)

In case of any queries contact us via this email: [email protected] 13


.

GOAT Computer Awareness PDF - Data Communication and Networking

Layers in the OSI Model

Layer 1-The Physical layer: - Physical layer coordinates the function required to carry a bit stream over a

physical medium. It defines the mechanical, electrical & physical specifications of the interface & the
transmission medium used for communication. It determines how a cable is attached with LAN card & is
responsible for transmitting bit stream from one computer to another.

Functions of Physical Layer

1. It defines the characteristics of the interface between the device and the transmission medium.
2. Data in this layer consists of stream of bits. The bits must be encoded into signals for
transmission. It defines the type of encoding i.e. how 0's and 1's are changed to signal.

3. This layer defines the rate of transmission which is the number of bits per second.
4. It deals with the synchronization of the transmitter and receiver. The sender and receiver are
synchronized at bit level.

Click Here for GOAT (The Complete Mentorship Program for Bank Exams)

In case of any queries contact us via this email: [email protected] 14


.

GOAT Computer Awareness PDF - Data Communication and Networking

5. The Physical layer is concerned with the connection of devices to the media. It connects the

device in Point-to-Point and Multipoint configuration.


6. The Physical topology defines how devices are connected to make a network.
7. The physical layer also defines the direction of transmission between two device: simplex, half

duplex or full duplex.

Layer 2- The Data Link Layer: - The data link layer is most reliable node to node delivery of data. It

forms frames from the packets that are received from network layer and gives it to physical layer. It also
synchronizes the information which is to be transmitted over the data. Error controlling is easily done.
The encoded data are then passed to physical.

Data link layer has two sub-layers:

 Logical Link Control: It deals with protocols, flow-control, and error control.
 Media Access Control: It deals with actual control of media

Responsibility of the data link layer:

 Framing: - The datalink layer divides the stream of bits received from the network layer into
manageable data units called frames.

 Physical addressing: - The Data Link layer adds a header to the frame in order to define physical

address of the sender or receiver of the frame, if the frames are to be distributed to different
systems on the network.
 Flow control: - If the rate at which the data are absorbed by the receiver is less than the rate at

which data are produced in the sender, the data link layer imposes a flow control mechanism to
avoid overwhelming the receiver.
 Error control: -The data link layer adds reliability to the physical layer by adding mechanisms to

detect and retransmit damaged or lost frames. It also uses a mechanism to recognize duplicate
frames.
 Access control: -When two or more devices are connected to the same link, data link layer

protocols are necessary to determine which device has control over the link at any given time.

Click Here for GOAT (The Complete Mentorship Program for Bank Exams)

In case of any queries contact us via this email: [email protected] 15


.

GOAT Computer Awareness PDF - Data Communication and Networking

Layer 3-The Network Layer: -The network layer is responsible for the source-to-destination delivery of a
packet, possibly across multiple networks(links). The function of network layer called routing.

Responsibility of network layer:

 Logical addressing: - It translates logical network address into physical address. It is concerned

with circuit, message or packet switching.


 Routing: - When independent networks or links are connected to create internetworks (networks

of networks) or a large networks, the connecting device (called routers or switches) routes or
switch the packets to their final destinations.

Layer 4-The Transport Layer: -The transport layer is responsible for process-to-process delivery of the
entire message. A process is an application program running on a host, whereas the network layer
oversees source-to-destination delivery of individual packets, it does not recognize any relationship

between those packets.

The transport layer on the other hand, ensures that the whole message arrives intact and in order,
overseeing both error control and flow control at the source-to-destination level.

Responsibility of the transport layer:

 Service-point addressing: -Transport Layer header includes service point address which is port

address. This layer gets the message to the correct process on the computer unlike Network

Layer, which gets each packet to the correct computer.

 Segmentation and reassembly: -A message is divided into segments; each segment contains

sequence number, which enables this layer in reassembling the message. Message is
reassembled correctly upon arrival at the destination and replaces packets which were lost in
transmission.

 Connection Control: -The transport layer can be either connectionless or connection-oriented. A


connectionless transport layer treats each segment as an independent packet and delivers it to

Click Here for GOAT (The Complete Mentorship Program for Bank Exams)

In case of any queries contact us via this email: [email protected] 16


.

GOAT Computer Awareness PDF - Data Communication and Networking

the transport layer at the destination machine. A connection-oriented transport layer makes a

connection with the transport layer at the destination machine first before delivering the packets.
After all the data are transfer, the connection is terminated.
 Flow control: -In this layer, flow control is performed end to end.

 Error control: -Error Control is performed end to end in this layer to ensure that the complete
message arrives at the receiving transport layer without any error. Error Correction is done
through retransmission.

Layer 5-The Session Layer: -The session layer is the network dialog controller. It establishes, maintains
and synchronizes the interaction among communicating system.

Responsibilities of the session layer

 Dialog Control: -The session layer allows two systems to enter into dialog. It allows the
communication between two processes to take place in either half-dulex or full duplex mode.
 Synchronization: -The session layer allows a process to add checkpoints, or synchronization

points, to a stream of data.

Layer 6-The Presentation Layer: -The presentation layer is concerned with the syntax and semantics of
the information exchange between two systems.

Responsibilities of Presentation layer:

 Translation: -Before being transmitted, information in the form of characters and numbers should

be changed to bit streams. The presentation layer is responsible for interoperability between

encoding methods as different computers use different encoding methods. It translates data
between the formats the network requires and the format the computer.

 Encryption: -To carry sensitive information, a system must be able to ensure privacy. Encryption
means that the sender transforms the original information to another form and sends the resulting
message out over the network. Decryption reverse the original process to transform the message

back to its original form.

Click Here for GOAT (The Complete Mentorship Program for Bank Exams)

In case of any queries contact us via this email: [email protected] 17


.

GOAT Computer Awareness PDF - Data Communication and Networking

 Compression: -Data compression reduces the number of bits contained in the information. Data

compression becomes particularly important in the transmission of multimedia such as text, audio
and video

Layer 7-Application Layer: The application layer enables the user, whether human or software, to
access the network. It provides user interface and support for services such as electronic mail, remote

file access and transfer, a shared database management, and other type of distributed information

services.

Services provided by application layer:

 Network Virtual terminal: -It allows a user to log on to a remote host. The application creates
software emulation of a terminal at the remote host. User's computer talks to the software

terminal which in turn talks to the host and vice versa. Then the remote host believes it is
communicating with one of its own terminals and allows user to log on.
 File transfer, access, and management: -It is a standard mechanism to access files and manages

it. Users can access files in a remote computer and manage it. They can also retrieve files from a

remote computer.

 Mail Services: -This layer provides the basis for E-mail forwarding and storage.

 Directory Services: -This layer provides access for global information about various services.

TCP/IP Model

TCP/IP means Transmission Control Protocol and Internet Protocol. The TCP/IP protocol suite was

developed prior to the OSI model. The layers of the TCP/IP protocol suite contain relatively independent
protocol that can be mixed and matched depending on the needs of the system.

TCP/IP is a layered framework having four layers

Click Here for GOAT (The Complete Mentorship Program for Bank Exams)

In case of any queries contact us via this email: [email protected] 18


.

GOAT Computer Awareness PDF - Data Communication and Networking

Layer 1- Network Interface Layer: -It is responsible for breaking down the data packets from Internet

layer into frames which are then converted into bits for transmission across the physical media. Here,
Ethernet, FDDI, Token ring etc. The Network Interface layer encompasses the Data Link and Physical

layers of the OSI model. Some features of this layer are:

Ethernet: -Ethernet is the most popular physical layer LAN technology in use today. Other LAN types

include Token Ring, Fast Ethernet, Fibre Distributed Data Interface (FDDI), Asynchronous Transfer
Mode (ATM) and LocalTalk. Ethernet is popular because it strikes a good balance between speed, cost

and ease of installation.

Fast Ethernet: -For ethernet networks that need higher transmission speeds, the Fast Ethernet standard

(IEEE 802.3u) has been established. This standard raises the Ethernet speed limit from 10 Megabits per
second (Mbps) to 100 Mbps with only minimal changes to the existing cable structure.

Token Ring: -Token Ring is another form of network configuration which differs from Ethernet in that all

messages are transferred in a unidirectional manner along the ring at all times. Data is transmitted in

tokens, which are passed along the ring and viewed by each device.

FDDI: -FDDI (Fibre-Distributed Data Interface) is a standard for data transmission on fibre optic lines in
a local area network that can extend in range up to 200 km (124 miles). The FDDI protocol is based on

the token ring protocol. In addition to being large geographically, an FDDI local area network can
support thousands of users.

Click Here for GOAT (The Complete Mentorship Program for Bank Exams)

In case of any queries contact us via this email: [email protected] 19


.

GOAT Computer Awareness PDF - Data Communication and Networking

Layer 2-The Internet Layer: -The Internet layer is responsible for addressing, packaging, and routing

functions. The core protocols of the Internet layer are IP, ARP, ICMP, and IGMP. The Internet Protocol
(IP) is a routable protocol responsible for IP addressing, routing, and the fragmentation and reassembly
of packets.

 The Internet Protocol (IP) is a routable protocol responsible for IP addressing, routing, and the

fragmentation and reassembly of packets.

 The Address Resolution Protocol (ARP) is responsible for the resolution of the Internet layer
address to the Network Interface layer address such as a hardware address.
 The Internet Control Message Protocol (ICMP) is responsible for providing diagnostic functions

and reporting errors due to the unsuccessful delivery of IP packets.

 The Internet Group Management Protocol (IGMP) is responsible for the management of IP
multicast groups.

IP Addressing: -Every host and router on the internet is provided with a unique standard form of network

address, which encodes its network number and host number. The combination is unique; no two nodes
have the same IP addresses. Basically, every device connected to the network has an IP Address.

 Public address: -The public address is also known as an external address as they are grouped

under the WAN. We can also define the public address as a way to communicate outside the
network. This address is used to access the internet. The public address available on our

computer provides the remote access to our computer. This address is generally assigned by the
ISP (Internet Service Provider).

 Private address: - A private address is also known as an internal address, as it is grouped under

the LAN. It is used to communicate within the network. These addresses are not routed on the
internet so that no traffic can come from the internet to this private address.

IPv4 Addressing:

The IPv4 addresses are 32-bit long. The main address formats are assigned with network addresses

(net id) and host address (host id) fields of different sizes. The Class A format allows up to 126 networks

Click Here for GOAT (The Complete Mentorship Program for Bank Exams)

In case of any queries contact us via this email: [email protected] 20


.

GOAT Computer Awareness PDF - Data Communication and Networking

with 16 million hosts each. Class B allows up to 16,382 networks with up to 64 K hosts each. Class C

allows 2 million networks with up to 254 hosts each. The Class D is used for multicasting and Class E is
reserved for future use, or R&D.

Range of Host Addresses

Class Range

Class A 1.0.0.0 to 126.255.255.255

Class B 128.0.0.0 to 191.255.255.255

Class C 192.0.0.0 to 223.255.255.255

Class D (reserved for 224.0.0.0 to 239.255.255.255


multicast groups)

Class E (reserved for 240.0.0.0 to 254.255.255.255

future use, or
Research
and Development

process.)

Click Here for GOAT (The Complete Mentorship Program for Bank Exams)

In case of any queries contact us via this email: [email protected] 21


.

GOAT Computer Awareness PDF - Data Communication and Networking

Subnetting: -Subnetting is the strategy used to partition a single physical network into more than one

smaller logical sub-network (subnets). An IP address includes a network segment and a host segment.
Subnets are designed by accepting bits from the IP address's host part and using these bits to assign a
number of smaller sub-networks inside the original network.

Subnet mask: -A Subnet mask is a 32-bit number that masks an IP address, and divides the IP address

into network address and host address.

Supernetting: -It is the process of combining several IP networks with a common network prefix.
Supernetting was introduced as a solution to the problem of increasing size in routing tables.

Supernetting also simplifies the routing process

Subnetting Supernetting

It is the process of dividing an IP network It is the process of combining several IP

in to sub divisions called subnets networks with a common network prefix

In subnetting, host ID bits (for IP In supernetting, bits from the network


addresses from a single network ID) are ID are borrowed to be used as the host

borrowed to be used as a subnet ID ID

Classless Inter-Domain Routing: - It is a method of IP address allocation and IP routing that allows for

more efficient use of IP addresses. CIDR is based on the idea that IP addresses can be allocated and
routed based on their network prefix rather than their class, which was the traditional way of IP address
allocation. CIDR addresses are represented using a slash notation, which specifies the number of bits in

the network prefix. For example, an IP address of 192.168.1.0 with a prefix length of 24 would be
represented as 192.168.1.0/24. This notation indicates that the first 24 bits of the IP address are the
network prefix and the remaining 8 bits are the host identifier.

Click Here for GOAT (The Complete Mentorship Program for Bank Exams)

In case of any queries contact us via this email: [email protected] 22


.

GOAT Computer Awareness PDF - Data Communication and Networking

IPv6 Addressing: -IPv6 is of 128 bits represented in 8 combinations of 4 hexadecimal numbers each,
separated by a colon. An example of an IPv6 address is: 2001:0db8:85a3:0000:0000:8a2e:0370:7334.

Categories of IPv6 address:

 Unicast: It represents a single interface. A packet sent to a unicast address is delivered to the

interface identified by that address.


 Multicast: It represents a group of interfaces. A packet sent to a multicast address is delivered to

all interfaces identified by that address.


 Anycast: It identifies one or more interface. A packet sent to an anycast address is delivered to
the closest member of a group, according to the routing protocols' measure of distance.

Routing: -It is the act of moving information across a network from a source to a destination. Routing is

performed on the data which describes the path that data follows to reach from source to destination in

the network. The primary difference between the two is that bridging
occurs at Layer 2 (the data link layer) of the OSI reference model, whereas routing occurs at Layer 3
(the network layer).

IPsec: -IPsec short for IP security, a set of protocol developed by the Internet Engineering Task Force
(IETF) to support secure exchange of packets at the IP layer. IPsec has been deployed widely to

implement Virtual Private Networks (VPNs).

Layer 3 – Transport Layer: -It encapsulates raw data received from application layer into data segments
and performs error control and flow control. It is represented by the two protocols i.e. TCP & UDP.

TCP (Transmission Control Protocol): -It is a connection oriented protocol. First a connection is
established between the sender and the receiver and then data is sent across the network. It gives the

Click Here for GOAT (The Complete Mentorship Program for Bank Exams)

In case of any queries contact us via this email: [email protected] 23


.

GOAT Computer Awareness PDF - Data Communication and Networking

data segments proper sequence numbers for reordering at the destination side and also the

acknowledgment numbers are given for the data packets received. So it is a reliable protocol.

UDP(User Datagram Protocol): -It is an unreliable, connectionless protocol i.e. no reliable connection is

established between sender & receiver before data transmission. It is used for client- server type
requests where prompt delivery of requests-replies is more important than accurate delivery.

Layer 4- Application Layer: -It enables network access to the user. Following are some of the protocols

defined here:-

 File Transfer Protocol (FTP) is a TCP/IP client-server application for transfer files between two
remote machines through internet. A TCP connection is set up before file transfer and it persists
throughout the session. It is possible to send more than one file before disconnecting the link. A

control connection is established first with a remote host before any file can be transferred
 HTTP (Hyper Text Transfer Protocol) provides a standard between a web browser and a web
server to establish communication. It is a set of rules for transferring data from one computer to

another. Data such as text, images, and other multimedia files are shared on the World Wide

Web.

 Telnet is a simple remote terminal protocol that provides a remote log-on capability, which

enables a user to log on to a remote computer and behaves as if it is directly connected to it.
 Simple Network Management Protocol (SNMP) is an application layer protocol that uses UDP

port number 161/162.SNMP is used to monitor the network, detect network faults, and sometimes
even used to configure remote devices. There are 3 components of SNMP;

SNMP Manager, SNMP agent, Management Information Base

 Simple Network Management Protocol (SMTP) provides a systematic way for managing network
resources. It uses transport layer protocol for communication. It allows them to monitor switches,
routers and hosts.

Click Here for GOAT (The Complete Mentorship Program for Bank Exams)

In case of any queries contact us via this email: [email protected] 24


.

GOAT Computer Awareness PDF - Data Communication and Networking

HTTP HTTPS

In HTTP, URL begins with “http://”. In HTTPs, URL starts with “https://”.

HTTP uses port number 80 for HTTPs uses 443 port number for
communication communication.

HTTP works at Application Layer. HTTPS works at Transport Layer.

Encryption is absent. Encryption is present.

In HTTP Data is transfer in plaintext. In HTTPS Data transfer in cipher text.

Click Here for GOAT (The Complete Mentorship Program for Bank Exams)

In case of any queries contact us via this email: [email protected] 25

You might also like