Unit 1 CN
Unit 1 CN
Unit 1 CN
Computer Network is a group of computers connected with each other through wires, so
that various devices can interact with each other through a network.
The aim of the computer network is the sharing of resources among various devices.
1. Performance:
It can be measured in many ways, including transmit time and response time.
Transit time is the amount of time required for a message to travel from one device
to another.
Response time is the elapsed time between an inquiry and a response.
The performance of the network depends on a number of factors, including the
number of users, the type of medium & Hardware
2. Reliability:
In addition to accuracy is measured by frequency of failure, the time it takes a link
to recover from failure, and the network’s robustness in catastrophe.
3. Security:
Network security issues include protecting data from unauthorized access,
protecting data from damage and development, and implementing policies and
procedures for recovery from breaches and data loss.
1.Hardware Components
1.Peers :
Peers are computers that provide as well as receive services from other peers in a
workgroup network.
2. Transmission Media :
Transmission media are the channels through which data is transferred from one device
to another in a network.
Transmission media may be guided media like coaxial cable, fibre optic cables etc; or
maybe unguided media like microwaves, infra-red waves etc.
3. Connecting Devices:
Connecting devices act as middleware between networks or computers, by binding the
network media together. Some of the common connecting devices are:
a) Routers
b) Bridges
c) Hubs
d) Repeaters
e) Gateways
f) Switches
2. Software Components
Networking Operating System − Network Operating Systems is typically installed in
the server and facilitate workstations in a network to share files, database, applications,
printers etc.
Protocol Suite − A protocol is a rule or guideline followed by each computer for data
communication. The two popular protocol suites are −
a. OSI Model ( Open System Interconnections)
b. TCP / IP Model
Features Of Computer network
1. Communication speed:
Network provides us to communicate over the network in a fast and efficient manner. For
example, we can do video conferencing, email messaging, etc. over the internet. Therefore, the
computer network is a great way to share our knowledge and ideas.
2 File sharing
File sharing is one of the major advantages of the computer network. Computer network
provides us to share the files with each other.
3. Back up and Roll back is easy:
Since the files are stored in the main server which is centrally located. Therefore, it is easy to
take the back up from the main server.
We can install the applications on the main server, therefore, the user can access the applications
centrally. So, we do not need to install the software on every machine. Similarly, hardware can
also be shared.
5. Security
Network allows the security by ensuring that the user has the right to access the certain files and
applications.
6. Scalability
Scalability means that we can add the new components on the network. Network must be
scalable so that we can extend the network by adding new devices. But, it decreases the speed of
the connection and data of the transmission speed also decreases, this increases the chances of
error occurring. This problem can be overcome by using the routing or switching devices.
7.Reliability
Computer network can use the alternative source for the data communication in case of any
hardware failure.
Computer Network Architecture is defined as the physical and logical design of the
software, hardware, protocols, and media of the transmission of data.
Simply we can say that how computers are organized and how tasks are allocated to the
computer.
1. Peer-To-Peer network
2. Client/Server network
1.Peer-To-Peer network
Peer-To-Peer network is a network in which all the computers are linked together with
equal privilege and responsibilities for processing the data.
Peer-To-Peer network is useful for small environments, usually up to 10 computers.
Peer-To-Peer network has no dedicated server.
2.Client/Server Network
Client/Server network is a network model designed for the end users called clients, to
access the resources from a central computer known as Server.
The central controller is known as a server while all other computers in the network are
called clients.
A server performs all the major operations such as security and network management.
A server is responsible for managing all the resources such as files, directories, printer,
etc.
All the clients communicate with each other through a server. For example, if client1
wants to send some data to client 2, then it first sends the request to the server for the
permission. The server sends the response to the client 1 to initiate its communication
with the client 2.
Advantages of Client/Server network:
A Client/Server network contains the centralized system. Therefore we can back up the
data easily.
A Client/Server network has a dedicated server that improves the overall performance of
the whole system.
Security is better in Client/Server network as a single server administers the shared
resources.
It also increases the speed of the sharing resources.
1.Wired Network:
wired” refers to any physical medium made up of cables.
Copper wire, twisted pair, or fiber optic cables are all options. A wired network
employs wires to link devices to the Internet or another network, such as laptops or
desktop PCs.
2.Wireless Network:
“Wireless” means without wire, media that is made up of electromagnetic waves (EM
Waves) or infrared waves.
Antennas or sensors will be present on all wireless devices.
Cellular phones, wireless sensors, TV remotes, satellite dish receivers, and laptops with
WLAN cards are all examples of wireless devices.
For data or voice communication, a wireless network uses radio frequency waves rather
than wires.
A direct link between two devices, such as a computer and a printer, is known as a
point-to-point connection.
2.Multipoint:
It is the one in which more than two specific devices share links.
In the multipoint environment, the capacity of the channel is shared, either spatially
or temporally. If several devices can use the link simultaneously, it is a spatially shared
connection.
3.Broadcast networks:
In broadcast networks, a signal method in which numerous parties can hear a single
sender.
Radio stations are an excellent illustration of the “Broadcast Network” in everyday life.
The radio station is a sender of data/signal in this scenario, and data is only intended to
travel in one direction.
1. BUS Topology
Bus topology is a network type in which every computer and network device is connected
to single cable. When it has exactly two endpoints, then it is called Linear Bus topology.
Features of Bus Topology:
1. It is cost effective.
2. Cable required is least compared to other network topology.
3. Used in small networks.
4. Easy to expand joining two cables together.
2. RING Topology
It is called ring topology because it forms a ring as each computer is connected to another
computer, with the last one connected to the first. Exactly two neighbors for each device.
Features of Ring Topology:
1. A number of repeaters are used for Ring topology with large number of nodes, because if
someone wants to send some data to the last node in the ring topology with 100 nodes,
then the data will have to pass through 99 nodes to reach the 100th node. Hence to
prevent data loss repeaters are used in the network.
3. In Dual Ring Topology, two ring networks are formed, and data flow is in opposite
direction in them. Also, if one ring fails, the second ring can act as a backup, to keep the
network up.
4. Data is transferred in a sequential manner that is bit by bit. Data transmitted, has to pass
through each node of the network, till the destination node.
1. Transmitting network is not affected by high traffic or by adding more nodes, as only the
nodes having tokens can transmit data.
In this type of topology all the computers are connected to a single hub through a cable. This hub
is the central node and all others nodes are connected to the central node.
3. Easy to troubleshoot.
5. Only that node is affected which has failed, rest of the nodes can work smoothly.
1. If the hub fails then the whole network is stopped because all the nodes depend on the
hub.
It is a point-to-point connection to other nodes or devices. All the network nodes are connected
to each other. Mesh has n(n-1)/2 physical channels to link n devices.
1. Partial Mesh Topology : In this topology some of the systems are connected in the same
fashion as mesh topology but some devices are only connected to two or three devices.
2. Full Mesh Topology : Each and every nodes or devices are connected to each other.
1. Fully connected.
2. Robust.
1. It is robust.
It has a root node and all other nodes are connected to it forming a hierarchy.
It is also called hierarchical topology. It should at least have three levels to the hierarchy.
1. Heavily cabled.
2. Costly.
It is two different types of topologies which is a mixture of two or more topologies. For
example if in an office in one department ring topology is used and in another star
topology is used, connecting these topologies will result in Hybrid Topology (ring
topology and star topology).
2. Effective.
1. Complex in design.
2. Costly.
Transmission mode refers to the mechanism of transferring of data between two devices
connected over a network.
It is also called Communication Mode. These modes direct the direction of flow of
information.
There are three types of transmission modes. They are:
1. Simplex Mode
2. Half duplex Mode
3. Full duplex Mode
1. SIMPLEX Mode
In this type of transmission mode, data can be sent only in one direction i.e.
communication is unidirectional. We cannot send a message back to the sender.
Unidirectional communication is done in Simplex Systems where we just need to send a
command/signal, and do not expect any response back.
Examples of simplex Mode are loudspeakers, television broadcasting, television and
remote, keyboard and monitor etc.
Half-duplex data transmission means that data can be transmitted in both directions on a
signal carrier, but not at the same time.
Example of half duplex is a walkie- talkie in which message is sent one at a time but
messages are sent in both the directions.
3. FULL DUPLEX Mode
In full duplex system we can send data in both the directions as it is bidirectional at the
same time in other words, data can be sent in both directions simultaneously.
Example of Full Duplex is a Telephone Network in which there is communication
between two persons by a telephone line, using which both can talk and listen at the same
time.
In full duplex system there can be two lines one for sending the data and the other for receiving
data.
............................................................................................................................
As shown in the above diagram, there are five different layers. Therefore, it is a five-layered
architecture. Each layer performs a dedicated task. The lower-level data for example from
layer 1 data is transferred to layer 2. Below all the layers Physical Medium is present. The
physical medium is responsible for the actual communication to take place. For the transfer of
data and communication layered architecture provides with a clean cut interface.
A number of design issues exist for the layer to layer approach of computer networks. Some of
the main design issues are as follows −
Reliability
Network channels and components may be unreliable, resulting in loss of bits while data transfer.
So, an important design issue is to make sure that the information transferred is not distorted.
Scalability
Networks are continuously evolving. The sizes are continually increasing leading to congestion.
Also, when new technologies are applied to the added components, it may lead to incompatibility
issues. Hence, the design should be done so that the networks are scalable and can accommodate
such additions and alterations.
Addressing
At a particular time, innumerable messages are being transferred between large numbers of
computers. So, a naming or addressing system should exist so that each layer can identify the
sender and receivers of each message.
Error Control
Unreliable channels introduce a number of errors in the data streams that are communicated. So,
the layers need to agree upon common error detection and error correction methods so as to
protect data packets while they are transferred.
Flow Control
If the rate at which data is produced by the sender is higher than the rate at which data is received
by the receiver, there are chances of overflowing the receiver. So, a proper flow control
mechanism needs to be implemented.
Resource Allocation
Computer networks provide services in the form of network resources to the end users. The main
design issue is to allocate and deallocate resources to processes. The allocation/deallocation
should occur so that minimal interference among the hosts occurs and there is optimal usage of
the resources.
Statistical Multiplexing
It is not feasible to allocate a dedicated path for each message while it is being transferred from
the source to the destination. So, the data channel needs to be multiplexed, so as to allocate a
fraction of the bandwidth or time to each host.
Routing
There may be multiple paths from the source to the destination. Routing involves choosing an
optimal path among all possible paths, in terms of cost and time. There are several routing
algorithms that are used in network systems.
Security
A major factor of data communication is to defend it against threats like eavesdropping and
surreptitious alteration of messages. So, there should be adequate mechanisms to prevent
unauthorized access to data through authentication and cryptography.
What is Protocol?
A protocol is simply defined as a set of rules and regulations for data communication. Rules
are defined for every step and process at the time of communication among two or more
computers. Networks are needed to follow these protocols to transmit the data successfully. All
protocols might be implemented using hardware, software, or a combination of both of them.
A Protocol Hierarchy is a fixed set of rules and conventions that govern the communication
between two or more computers. The hierarchical structure allows for modular design,
interoperability, and ease of implementation in computer networks.
Generally, Computer networks are comprised of or contain a large number of hardware and
software. For network design, various networks are organized and arranged as a stack of layers
of hardware and software, one on top of another. The number, name, content, and function of
each layer might vary and can be different from one network to another. The main purpose of
each layer is to provide services to higher layers that are present. Every layer has some
particular task or function. The networks are organized and arranged as different layers or
levels simply to reduce and minimize the complexity of the design of network software.
Interfaces and Services is a process that generally provides and gives a common technique for
each layer to communicate with each other. Standard terminology basically required for
layered networks to request and aim for the services are provided. Service is defined as a set of
primitive operations. Services are provided by layer to each of layers above it. Below is
diagram showing relation between layers at an interface. In diagram, layers N+1, N, and N-1
are involved and engaged in process of communication among each other.
Components Involved and their Functions:
Service Data Unit (SDU) – SDU is a piece of information or data that is generally passed
by layer just above current layer for transmission. Unit of data or information is passed
down to a lower layer from an OSI (Open System Interconnection) layer or sublayer. Data
is passed with request to transmit data. SDU basically identifies or determines information
that is been transferred among entities of peer layers that are not interpreted by supporting
entities of lower-layer
Protocol Data Unit (PDU) – PDU is a single unit of information or data that is transmitted
or transferred among entities of peer layers of a computer network. When application data
is passed down to protocol stack on its way to being transmitted all over network media,
some of protocols add information and data to it at each and every level. PDU is used to
represent and describe data is it gets transferred from one layer of OSI model to another
layer.
Advantages:
Increase in Compatibility – Layered approach to networking and communication
protocols generally provides and shows greater compatibility among all devices, systems,
and networks that they deliver.
Less expensive – Easy way of development and implementation converts to increase in an
efficiency and even effectiveness that in turn converts into larger economic rationalization
and very cheaper products while not compromising with quality.
Increase in Mobility – Whenever we use layered and segmented strategies into
architecture design, there will always be an increase in mobility.
Better Scalability – Whenever we use a layered or hierarchical approach to networking
protocol, design, and implementation scale much better than horizontal approach.
In order to establish a connection between two or more devices, there are services in Computer
Networks. There are two services that are given by the layers to layers above them. These
services are as follows:
1. Connection-Oriented Service
2. Connectionless Services
1.Connection-Oriented Services
Connection-oriented service is more reliable than connectionless service. We can send the
message in a connection-oriented service if there is an error at the receiver's end.
In the above diagram, a solid line between Device A and Device B indicates that there is a
dedicated link with which the stream of data travels between them. With the help of this link, a
receiver can send an acknowledgment to the sender about the status of the packet.
Different Ways : There are two ways in which connection-oriented services can be done.
These ways are given below :
Advantages
Connection-Oriented Services are reliable.
There is no duplication of data packets.
There are no chances of Congestion.
These are Suitable for long connections.
Sequencing of data packets is guaranteed.
Disadvantages
Drawbacks of Connection-Oriented Service are as follows:
It is similar to the postal services, as it carries the full address where the message (letter) is to be
carried. Each message is routed independently from source to destination. The order of messages
sent can be different from the order received.
In connectionless the data is transferred in one direction from source to destination without
checking the destination is still there or not or if it prepared to accept the message.
Authentication is not needed in this.
Advantages
There are usually low overheads.
Connection-Oriented services help to broadcast or multicast messages to multiple
recipients.
In this, there is no circuit setup. Thus it takes a fraction of a minute in order to
establish a connection.
In the case of Network congestion or router failures, it has an alternative path of data
transmission.
Disadvantages
Drawbacks of Connection fewer services are as follows:
Primitive Meaning
Unitdata Unitdata primitive is simply required to send packet of data or information.
Facility, This primitive is required for getting details about the performance and working
Report of the network such as delivery statistics or report.
OSI Model
OSI stands for Open System Interconnection is a reference model that describes how
information from one computer moves through a physical medium to the another
computer.
OSI consists of seven layers, and each layer performs a particular network function.
OSI model was developed by the International Organization for Standardization (ISO) in
1984, and it is now considered as an architectural model for the inter-computer
communications.
The physical layer, data link layer and the network layer are the network support layers.
The layers manage a physical transfer of data from one device to another.
Session layer, presentation layer, and application layer are the user support layers. These
layers allow communication among unrelated software in dissimilar environments
2) Data-Link Layer
This layer is responsible for the error-free transfer of data frames.
It provides a reliable and efficient communication between two or more devices.
It is mainly responsible for the unique identification of each device that resides on a local
network.
It contains two sub-layers:
o Physical Addressing: The Data link layer adds a header to the frame that contains a
destination address. The frame is transmitted to the destination address mentioned in the
header.
o Flow Control: Flow control is the main functionality of the Data-link layer. It is the
technique through which the constant data rate is maintained on both the sides so that no
data get corrupted. It ensures that the transmitting station such as a server with higher
processing speed does not exceed the receiving station, with lower processing speed.
o Error Control: Error control is achieved by adding a calculated value CRC (Cyclic
Redundancy Check) that is placed to the Data link layer's trailer which is added to the
message frame before it is sent to the physical layer. If any error seems to occur, then the
receiver sends the acknowledgment for the retransmission of the corrupted frames.
o Access Control: When two or more devices are connected to the same communication
channel, then the data link layer protocols are used to determine which device has control
over the link at a given time.
3) Network Layer
It is a layer 3 that manages device addressing, tracks the location of devices on the
network.
It determines the best path to move data from source to the destination based on the
network conditions, the priority of service, and other factors.
The Data link layer is responsible for routing and forwarding the packets.
The protocols used to route the network traffic are known as Network layer protocols.
Examples of protocols are IPv4 and Ipv6.
Functions of Network Layer:
o Internetworking: An internetworking is the main responsibility of the network layer. It
provides a logical connection between different devices.
o Addressing: A Network layer adds the source and destination address to the header of
the frame. Addressing is used to identify the device on the internet.
o Routing: Routing is the major component of the network layer, and it determines the best
optimal path out of the multiple paths from source to the destination.
o Packetizing: A Network Layer receives the packets from the upper layer and converts
them
4) Transport Layer
The Transport layer is a Layer 4 ensures that messages are transmitted in the order in
which they are sent and there is no duplication of data.
The main responsibility of the transport layer is to transfer the data completely.
It receives the data from the upper layer and converts them into smaller units known as
segments.
This layer can be termed as an end-to-end layer as it provides a point-to-point connection
between source and destination to deliver the data reliably.
5) Session Layer
The Session layer is used to establish, maintain and synchronizes the interaction between
communicating devices.
6) Presentation Layer
A Presentation layer is mainly concerned with the syntax and semantics of the information
exchanged between the two systems.
It acts as a data translator for a network.
This layer is a part of the operating system that converts the data from one presentation
format to another format.
The Presentation layer is also known as the syntax layer.
7) Application Layer
An application layer serves as a window for users and application processes to access
network service.
It handles issues such as network transparency, resource allocation, etc.
An application layer is not an application, but it performs the application layer functions.
This layer provides the network services to the end-users.
Here, hierarchical means that each upper-layer protocol is supported by two or more lower-level
protocols.
2. Internet Layer
An internet layer is the second layer of the TCP/IP model.
An internet layer is also known as the network layer.
The main responsibility of the internet layer is to send the packets from any network, and
they arrive at the destination irrespective of the route they take.
IP Protocol: IP protocol is used in this layer, and it is the most significant part of the entire
TCP/IP suite.
ARP Protocol
o ARP request: When a sender wants to know the physical address of the device, it
broadcasts the ARP request to the network.
o ARP reply: Every device attached to the network will accept the ARP request
and process the request, but only recipient recognize the IP address and sends
back its physical address in the form of ARP reply. The recipient adds the
physical address both to its cache memory and to the datagram header
ICMP Protocol
ICMP stands for Internet Control Message Protocol.
It is a mechanism used by the hosts or routers to send notifications regarding datagram
problems back to the sender.
A datagram travels from router-to-router until it reaches its destination. If a router is
unable to route the data because of some unusual conditions such as disabled links, a
device is on fire or network congestion, then the ICMP protocol is used to inform the
sender that the datagram is undeliverable.
The core responsibility of the ICMP protocol is to report the problems, not correct them.
The responsibility of the correction lies with the sender.
ICMP can send the messages only to the source, but not to the intermediate routers
because the IP datagram carries the addresses of the source and destination but not of the
router that it is passed to.
Transport Layer
The transport layer is responsible for the reliability, flow control, and correction of data which is
being sent over the network.
The two protocols used in the transport layer are User Datagram protocol and Transmission
control protocol.
Application Layer
An application layer is the topmost layer in the TCP/IP model.
It is responsible for handling high-level protocols, issues of representation.
This layer allows the user to interact with the application.
When one application layer protocol wants to communicate with another application
layer, it forwards its data to the transport layer.
There is an ambiguity occurs in the application layer. Every application cannot be placed
inside the application layer except those who interact with the communication system.
For example: text editor cannot be considered in application layer while web browser
using HTTP protocol to interact with the network where HTTP protocol is an
application layer protocol.
1.What is Bandwidth
Bandwidth or Network bandwidth is the maximum rate at which data transfer occurs
across any particular path of the network.
Bandwidth is basically a measure of the amount of data that can be sent and received at
any instance of time.
Higher the bandwidth of a network, the larger the amount of data the network can be
sending to and from across its path.
Be careful not to confuse bandwidth with closely related terms such as the data rate and
the throughput. Bandwidth is something that deals with the measurement of capacity
and not the speed of data transfer.
Units of Measurement
Bandwidth is usually measured in bits transferred per second through a path or link. The
common units of bandwidth are:
bps (Bits per second)
Mbps (Megabits per second)
Gbps (Gigabits per second)
Example: Bandwidth of 10 bps for a channel, means that maximum of 10 bits can be
transferred using that link for any given time. It has no relation with the transfer speed of the
channel.
Carrier signal: The signals which contain no information but have a certain phase, frequency,
and amplitude are called carrier signals.
Modulated signals: The signals which are the combination of the carrier signals and
modulation signals are modulated signals. The modulated signal is obtained after the
modulation of the signals.
Types of modulation:
1. Amplitude modulation: It is a type of modulation in which only the amplitude of the carrier
signal is varied to represent the data being added to the signals whereas the phase and the
frequency of the signal are kept unchanged.
Amplitude Modulation
2. Frequency modulation: It is a type of modulation in which only the frequency of the carrier
signal is varied to represent the frequency of the data whereas the phase and the amplitude of the
signals are kept unchanged.
Frequency Modulation
3. Phase modulation: It is a type of modulation in which the phase of the carrier signal is varied
to represent the data being added to the signal. Different information values are represented by
different phases. For example: ‘1’ may be represented by 0° while ‘0’ by 180°.
Advantages of modulation:
It reduces the size of the antenna.
It reduces the cost of wires.
It prohibits the mixing of signals.
It increases the range of communication.
It improves the reception quality.
It easily multiplexes the signals.
It also allows the adjustment of the bandwidth.