Chapter 1 Computer Networks
Chapter 1 Computer Networks
3. Concept of IP Address:
Definition:
o An IP (Internet Protocol) address is a unique numerical label assigned to each
device connected to a computer network that uses the Internet Protocol for
communication. It serves two primary functions: identifying the host or
network interface and providing the location of the device in the network.
Format:
o IP addresses can be classified into two versions:
IPv4: Uses a 32-bit address format (e.g., 192.168.1.1), providing about
4.3 billion unique addresses.
IPv6: Uses a 128-bit address format (e.g.,
2001:0db8:85a3:0000:0000:8a2e:0370:7334), allowing for a vastly
larger number of unique addresses, necessary for the growing number
of internet-connected devices.
4. Classes of IP Addresses:
IP addresses are categorized into classes based on the leading bits of the address, determining
the size of the network and the number of hosts it can support. The classes include:
1. Class A:
o Range: 1.0.0.0 to 126.0.0.0
o Leading Bits: 0xxxxxxx
o Subnet Mask: 255.0.0.0
o Hosts per Network: Approximately 16 million
o Use Case: Large networks (e.g., multinational corporations).
2. Class B:
o Range: 128.0.0.0 to 191.255.0.0
o Leading Bits: 10xxxxxx
o Subnet Mask: 255.255.0.0
o Hosts per Network: Approximately 65,000
o Use Case: Medium-sized networks (e.g., universities).
3. Class C:
o Range: 192.0.0.0 to 223.255.255.0
o Leading Bits: 110xxxxx
o Subnet Mask: 255.255.255.0
o Hosts per Network: Approximately 254
o Use Case: Small networks (e.g., small businesses).
4. Class D:
o Range: 224.0.0.0 to 239.255.255.255
o Leading Bits: 1110xxxx
o Use Case: Multicast addresses used for sending data to multiple destinations.
5. Class E:
o Range: 240.0.0.0 to 255.255.255.255
o Leading Bits: 1111xxxx
o Use Case: Reserved for experimental purposes and research.
The internet has evolved from a military project to a global network that is essential for
communication, information access, commerce, and innovation. Understanding the concept
of IP addresses and their classes is crucial for managing and configuring networks effectively.
IP addresses serve as unique identifiers for devices, allowing them to communicate and share
information seamlessly across the vast landscape of the internet.
1.Communication System
A communication system is a mechanism used to transmit information from one point to
another. It plays a critical role in facilitating communication across various types of
technologies and platforms, enabling the sharing of data, ideas, and resources between
devices or systems. Let’s dive deeper into the components and working of a communication
system:
3. Transmission Medium:
o The transmission medium is the physical or wireless path over which the
data travels from the transmitter to the receiver. The choice of medium affects
the speed, range, and quality of data transmission.
o Types of Transmission Media:
1. Wired Transmission:
Copper Cables: Traditional cables used for transmitting data in
electrical signals. They are cost-effective but have limitations in
terms of bandwidth and signal degradation over long distances.
Example: Ethernet cables used in LAN networks.
Fiber Optics: Transmit data in the form of light pulses. Fiber
optics are widely used for long-distance and high-speed data
transmission as they offer higher bandwidth and are less prone
to electromagnetic interference.
Example: Internet backbone connections.
2. Wireless Transmission:
Radio Waves: Used in various communication systems like
Wi-Fi, radio broadcasting, and mobile networks. They allow for
wireless transmission over long distances.
Example: Wi-Fi networks in homes and offices.
Microwaves: Used for point-to-point communication links,
such as in satellite communication or cellular networks.
Example: Satellite communication and cellular base
stations.
Infrared: Used in short-range communication like remote
controls and certain wireless communication systems.
Example: Infrared communication between TV remotes
and television sets.
4. Data:
o Data refers to the information that is being transmitted from the source to the
destination. It could be in any form—text, audio, video, or image data.
o Types of Data:
Analog Data: Continuous signals that vary over time. Analog data
must be converted into a suitable form (like digital signals) for
processing and transmission in most modern systems.
Example: Sound waves in traditional telephones.
Digital Data: Discrete signals, typically in binary form (0s and 1s).
Digital data is prevalent in modern communication systems due to its
resilience to noise and ability to be compressed for more efficient
transmission.
Example: Text messages, emails, digital video files.
1.Simplex Communication:
Overview:
In simplex communication, data flows unidirectionally, meaning only the sender
transmits data while the receiver passively receives it without the ability to respond.
This method is used where feedback from the receiver is unnecessary or where the
information flow is consistently in one direction.
Advantages:
1. Simple and Cost-Effective: The absence of two-way communication
mechanisms reduces complexity, making simplex systems inexpensive and
easy to implement.
2. Sufficient for One-Way Communication: Ideal for scenarios where the
receiver only needs to gather data without providing any input or feedback.
Disadvantages:
1. No Feedback Mechanism: The receiver cannot send error correction or
acknowledgment, increasing the risk of undetected data loss or corruption.
2. Limited Use Cases: It is impractical for applications requiring two-way
communication or real-time feedback.
Examples:
1. Radio Broadcasts: The radio station continuously sends signals, but listeners
cannot transmit signals back.
2. Keyboard to Computer Transmission: Data is sent from the keyboard to the
computer, with no data being sent back to the keyboard.
Use Case:
Simplex systems are commonly used in broadcast applications where data flows in a
singular, predictable direction without the need for input or feedback, such as
transmitting data from sensors or one-way multimedia broadcasts.
2. Half-Duplex Communication:
Overview:
Half-duplex communication allows two-way data flow but restricts it to one direction
at a time. The system alternates between sending and receiving, so communication is
sequential rather than simultaneous.
Advantages:
1. Two-Way Communication: Enables bidirectional data transmission, making
it more versatile than simplex systems.
2. Less Complex than Full-Duplex: The system is simpler and less costly than
full-duplex, as only one direction is active at a time.
Disadvantages:
1. One Direction at a Time: Communication cannot occur simultaneously in
both directions, which introduces delays when switching between sending and
receiving.
2. Potential for Collision: If both parties attempt to send data at the same time,
it may cause data collisions or require protocols to manage this.
Examples:
1. Walkie-Talkies: Only one person can speak at a time, and the system
alternates between sending and receiving when a push-to-talk button is
pressed.
2. CB Radios: Transmission alternates between sending and receiving, meaning
both parties cannot communicate simultaneously.
Use Case:
Half-duplex communication is well-suited for systems where real-time, two-way
communication is needed but simultaneous transmission isn’t essential, such as
emergency communication devices (walkie-talkies) or two-way radios.
3.Full-Duplex Communication:
Overview:
In full-duplex communication, data flows in both directions simultaneously, allowing
continuous two-way communication without interruption. This system is used in
scenarios where real-time, bidirectional communication is critical.
Advantages:
1. Efficient Communication: Both sender and receiver can transmit data
simultaneously, reducing delays and making interactions more fluid.
2. Faster Data Exchange: Since there’s no need to alternate between sending
and receiving, communication happens more swiftly and smoothly.
Disadvantages:
1. Complex and Expensive: Full-duplex systems require more advanced
hardware and software to manage simultaneous data flow, making them
costlier to implement.
2. Resource-Intensive: Managing simultaneous data streams requires more
sophisticated protocols and error-handling mechanisms.
Examples:
1. Telephone Systems: Both parties can talk and listen simultaneously, enabling
real-time, two-way conversations without interruption.
2. VoIP (Voice over IP): Internet-based voice communication systems allow
users to speak and hear each other at the same time, similar to traditional
telephony.
Use Case:
Full-duplex communication is ideal for systems requiring uninterrupted, real-time
interaction, such as telecommunication networks, internet-based voice and video
communication, and modern networking systems that rely on high-speed data
exchange.
Summary:
Simplex: One-way communication where the receiver cannot respond. Ideal for
simple, broadcast-type applications, such as radio or TV.
Half-Duplex: Two-way communication, but data flows in one direction at a time.
Suitable for walkie-talkies and CB radios where alternating communication is
acceptable.
Full-Duplex: Simultaneous two-way communication, perfect for real-time interactive
systems like telephones or VoIP, where uninterrupted communication is critical.
5.Computer Networks
Summary:
Uses of Computer Networks: Networks provide critical services like resource
sharing, communication, remote access, data sharing, and Internet access, which
collectively improve efficiency, reduce costs, and facilitate collaboration.
Categories of Computer Networks:
o LAN: Ideal for small geographic areas with high-speed communication and
centralized control.
o MAN: Covers larger areas, like cities, providing moderate-speed connectivity
across multiple LANs.
o WAN: Enables long-distance or global communication, with the Internet being
the largest WAN example.
Protocols:
Definition:
A protocol is a set of formal rules that dictate how data is transmitted and received
over a network. Protocols establish guidelines for communication, ensuring that
devices from different manufacturers can exchange information reliably and
effectively. They are crucial for the interoperability of networked systems.
Importance:
o Interoperability: Protocols allow different devices, regardless of manufacturer,
to communicate and function together seamlessly.
o Data Integrity: By following a defined set of rules, protocols help maintain the
integrity and security of data during transmission.
o Error Handling: Protocols include mechanisms for error detection and
correction, which help ensure that data is transmitted accurately.
Examples of Protocols:
1. TCP/IP (Transmission Control Protocol/Internet Protocol):
Overview: The foundational protocol suite for the Internet, TCP/IP governs how data
is sent and received over networks. It divides messages into packets, routes them, and
ensures they arrive correctly.
Key Features:
Layered Architecture: TCP/IP operates on a layered model, which separates
functionalities for easier management and troubleshooting.
End-to-End Communication: TCP ensures reliable delivery of packets, while IP is
responsible for addressing and routing.
1. HTTP (Hypertext Transfer Protocol):
Overview: The protocol used for transmitting web pages on the Internet. It defines
how messages are formatted and transmitted, and how web servers and browsers
should respond to various commands.
Key Features:
Request-Response Model: HTTP operates using a request-response model, where a
client (browser) requests resources, and a server responds with the requested data.
Stateless Protocol: Each request is independent, meaning no state is stored between
requests.
1. SMTP (Simple Mail Transfer Protocol):
Overview: A protocol for sending emails across networks. It defines the rules for how
email messages are sent from a client to a server and between servers.
Key Features:
Text-Based Protocol: SMTP uses a simple text format for sending messages, which is
easy to implement.
Mail Transfer: Primarily used for sending emails, while other protocols like POP3 or
IMAP are used for retrieving emails.
Standards:
Definition:
Standards are established guidelines created by recognized organizations that provide
specifications to ensure compatibility and interoperability among devices and
systems. They play a vital role in the development and deployment of technology in a
uniform manner.
Importance:
o Consistency: Standards ensure that products and services function consistently
across different manufacturers and environments.
o Interoperability: They promote the ability of different systems and devices to
work together, facilitating communication and data exchange.
o Quality Assurance: Standards often include performance and safety
requirements, ensuring that technologies meet certain quality benchmarks.
Examples of Standards:
1. IEEE 802.11 (Wi-Fi Standard):
Overview: A set of standards for wireless local area networks (WLANs) that defines the
protocols for implementing wireless communication in devices.
Key Features:
Compatibility: Ensures that different manufacturers’ wireless devices can
communicate over the same wireless networks.
Multiple Variants: Includes different standards like 802.11a, 802.11b, 802.11g,
802.11n, and 802.11ac, each with varying speeds and frequencies.
2. ISO/IEC 27001:
Overview: A standard for information security management systems (ISMS), outlining how
to manage and protect sensitive company information.
Key Features:
Risk Management: Provides a systematic approach to managing sensitive company
information, ensuring its confidentiality, integrity, and availability.
Continuous Improvement: Encourages organizations to continually improve their
information security practices.
Summary:
Protocols: Define the rules for data transmission between devices, ensuring
interoperability and data integrity. Key examples include TCP/IP for Internet
communication, HTTP for web page access, and SMTP for email transmission.
Standards: Provide guidelines to ensure consistency, compatibility, and quality across
devices and systems. Examples include IEEE 802.11 for wireless networking and
ISO/IEC 27001 for information security management.
Reference Models
Summary:
OSI Model: A theoretical framework that standardizes network communication into
seven layers, focusing on specific functions and interoperability. It is ideal for
understanding concepts but not practical for implementation.
TCP/IP Model: The de facto standard for internet communication with four layers,
emphasizing practicality and flexibility. While it is efficient, it lacks the clear structure
provided by the OSI model.
Network Topologies
1. Bus Topology:
Definition:
In bus topology, all devices share a common communication medium, usually a single
cable (the bus). Data is transmitted in both directions along this cable, but only one
device can send data at any given time.
Advantages:
o Simplicity: Easy to understand and implement.
o Cost-Effective: Requires less cable than other topologies, making it
economical for small networks.
Disadvantages:
o Single Point of Failure: If the central cable fails, the entire network goes
down.
o Scalability Issues: Not suitable for large networks due to limited bandwidth
and performance degradation with more devices.
Use Cases:
o Small networks and temporary setups (e.g., LAN setups in homes).
2. Star Topology:
Definition:
In star topology, all devices are connected to a central hub or switch. The hub controls
data transmission and acts as a repeater for the data flow.
Advantages:
o Easy to Manage: Adding or removing devices is straightforward.
o Isolation of Devices: Failure of one device does not impact the others,
enhancing reliability.
Disadvantages:
o Central Point of Failure: If the central hub fails, the entire network becomes
inoperable.
o Higher Cost: Requires more cable than bus topology and the cost of the
hub/switch.
Use Cases:
o Commonly used in home networks and corporate LANs.
3. Ring Topology:
Definition:
In ring topology, devices are connected in a circular manner, forming a closed loop.
Data travels in one direction, passing through each device in the ring.
Advantages:
o Efficient Data Transmission: Each device has the same opportunity to
transmit data, reducing collisions.
o Predictable Performance: Data packets have a predictable travel path,
enhancing performance.
Disadvantages:
o Single Point of Failure: A failure in any single device can disrupt the entire
network.
o Difficult Troubleshooting: Identifying issues in a ring can be challenging.
Use Cases:
o Less common in modern networks but used in certain LAN applications.
4. Mesh Topology:
Definition:
In mesh topology, every device is interconnected to every other device, providing
multiple paths for data to travel between nodes.
Advantages:
o High Reliability: Failure of one connection does not affect the network's
functionality, ensuring robustness.
o Enhanced Performance: Multiple paths reduce congestion and allow for
simultaneous data transmissions.
Disadvantages:
o Costly and Complex: Requires extensive cabling and configuration, making
it expensive and complicated to implement.
o Difficult Maintenance: More connections mean more points of failure,
complicating maintenance.
Use Cases:
o Used in mission-critical networks where reliability is paramount (e.g.,
military, aviation).
5. Hybrid Topology:
Definition:
Hybrid topology combines two or more different types of topologies to meet specific
network requirements. For example, a star-bus topology might integrate the
advantages of both bus and star topologies.
Advantages:
o Flexibility: Can be designed to suit a variety of networking needs.
o Scalability: Supports growth and change in network design.
Disadvantages:
o Complex Design and Management: The integration of different topologies
can lead to a complicated network layout, making management challenging.
Use Cases:
o Suitable for large organizations with diverse networking requirements,
allowing tailored solutions.