0% found this document useful (0 votes)
9 views

Computer Network-Notes

Uploaded by

tp307999
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views

Computer Network-Notes

Uploaded by

tp307999
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

OSI stands for Open Systems The packet received from the Network The network layer protocols

network layer protocols determine


Interconnection. It has been developed layer is further divided into frames which route is suitable from source to
by ISO – ‘International Organization for depending on the frame size of destination. This function of the
Standardization‘, in the year 1984. It is NIC(Network Interface Card). DLL also network layer is known as routing.
a 7 layer architecture with each layer encapsulates Sender and Receiver’s Logical Addressing: In order to identify
having specific functionality to perform. MAC address in the header. each device on inter-network uniquely,
All these 7 layers work collaboratively the network layer defines an
to transmit the data from one person The Receiver’s MAC address is addressing scheme. The sender &
to another across the globe. obtained by placing an ARP(Address receiver’s IP addresses are placed in
1. Physical Layer (Layer 1) : Resolution Protocol) request onto the the header by the network layer. Such
The lowest layer of the OSI reference wire asking “Who has that IP address?” an address distinguishes each device
model is the physical layer. It is and the destination host will reply with uniquely and universally.
responsible for the actual physical its MAC address. Segment in Network layer is referred
connection between the devices. The FUNCTION: to as Packet.
physical layer contains information in V. Framing: Framing is a function of It is implemented by networking
the form of bits. It is responsible for the data link layer. It provides a devices such as routers.
transmitting individual bits from one way for a sender to transmit a set
node to the next. When receiving data, of bits that are meaningful to the 4.Transport layer is a Layer 4 ensures
this layer will get the signal received receiver. This can be that messages are transmitted in the
and convert it into 0s and 1s and send accomplished by attaching special order in which they are sent and there
them to the Data Link layer, which will bit patterns to the beginning and is no duplication of data.
put the frame back together. end of the frame. The main responsibility of the
FUNCTIONS- VI. Physical addressing: After transport layer is to transfer the data
I. Bit synchronization: The physical creating frames, the Data link completely.
layer provides the layer adds physical addresses It receives the data from the upper
synchronization of the bits by (MAC address) of the sender layer and converts them into smaller
providing a clock. This clock and/or receiver in the header of units known as segments.
controls both sender and receiver each frame. This layer can be termed as an end-to-
thus providing synchronization at VII. Error control: Data link layer end layer as it provides a point-to-
bit level. provides the mechanism of error point connection between source and
II. Bit rate control: The Physical control in which it detects and destination to deliver the data reliably.
layer also defines the retransmits damaged or lost The two protocols used in this layer are:
transmission rate i.e. the number frames. Transmission Control Protocol
of bits sent per second. VIII. Flow Control: The data rate must It is a standard protocol that allows the
III. Physical topologies: Physical be constant on both sides else the systems to communicate over the
layer specifies the way in which data may get corrupted thus, flow internet.
the different, devices/nodes are control coordinates the amount It establishes and maintains a
arranged in a network i.e. bus, of data that can be sent before connection between hosts.
star, or mesh topology. receiving acknowledgement. When data is sent over the TCP
IV. Transmission mode: Physical IX. Access control: When a single connection, then the TCP protocol
layer also defines the way in communication channel is shared divides the data into smaller units
which the data flows between the by multiple devices, the MAC sub- known as segments. Each segment
two connected devices. The layer of the data link layer helps travels over the internet using multiple
various transmission modes to determine which device has routes, and they arrive in different
possible are Simplex, half-duplex control over the channel at a orders at the destination. The
and full-duplex. given time. transmission control protocol reorders
EXAMPLES-Hub, Repeater, Modem, Packet in Data Link layer is referred to the packets in the correct order at the
Cables are Physical Layer devices. as Frame. receiving end.
Data Link layer is handled by the NIC User Datagram Protocol
2. Data Link Layer (DLL) (Layer 2) : (Network Interface Card) and device User Datagram Protocol is a transport
The data link layer is responsible for drivers of host machines. layer protocol.
the node-to-node delivery of the EXAMPLE-Switch & Bridge. It is an unreliable transport protocol as
message. The main function of this in this case receiver does not send any
layer is to make sure data transfer is 3. Network Layer:The network layer acknowledgment when the packet is
error-free from one node to another, works for the transmission of data received, the sender does not wait for
over the physical layer. When a packet from one host to the other located in any acknowledgment. Therefore, this
arrives in a network, it is the different networks. It also takes care of makes a protocol unreliable.
responsibility of DLL to transmit it to packet routing i.e. selection of the
the Host using its MAC address. shortest path to transmit the packet, FUNCTION:
Data Link Layer is divided into two from the number of routes available. Service-point addressing: Computers
sublayers: The sender & receiver’s IP addresses run several programs simultaneously
Logical Link Control (LLC) are placed in the header by the due to this reason, the transmission of
Media Access Control (MAC) network layer. FUNCTION:Routing: data from source to the destination
not only from one computer to transmission of data, then the
another computer but also from one transmission will take place again from
process to another process. The the checkpoint. This process is known
transport layer adds the header that as Synchronization and recovery.
contains the address known as a
service-point address or port address. 6.Presentation Layer: The
The responsibility of the network layer presentation layer is also called the
is to transmit the data from one Translation layer. The data from the
computer to another computer and application layer is extracted here and
the responsibility of the transport layer manipulated as per the required
is to transmit the message to the format to transmit over the network.
correct process. FUNCTION:
Segmentation and reassembly: When Translation: For example, ASCII to
the transport layer receives the EBCDIC.
message from the upper layer, it Encryption/ Decryption: Data
divides the message into multiple encryption translates the data into
segments, and each segment is another form or code. The encrypted
assigned with a sequence number that data is known as the cipher-text and
uniquely identifies each segment. the decrypted data is known as plain
When the message has arrived at the text. A key value is used for encrypting
destination, then the transport layer as well as decrypting data.
reassembles the message based on Compression: Reduces the number of
their sequence numbers. bits that need to be transmitted on the
Connection control: Transport layer network.
provides two services Connection-
oriented service and connectionless 7.Application Layer: At the very top of
service. A connectionless service treats the OSI Reference Model stack of
each segment as an individual packet, layers, we find the Application layer
and they all travel in different routes to which is implemented by the network
reach the destination. A connection- applications. These applications
oriented service makes a connection produce the data, which has to be
with the transport layer at the transferred over the network. This What is Topology?
destination machine before delivering layer also serves as a window for the Topology defines the structure of the
the packets. In connection-oriented application services to access the network of how all the components
service, all the packets travel in the network and for displaying the are interconnected to each other.
single route. received information to the user. There are two types of topology:
Flow control: The transport layer also physical and logical topology.
responsible for flow control but it is FUNCTION: File transfer, access, and Physical topology is the geometric
performed end-to-end rather than management (FTAM): An application representation of all the nodes in a
across a single link. layer allows a user to access the files in network.
Error control: The transport layer is a remote computer, to retrieve the Bus Topology:The bus topology is
also responsible for Error control. Error files from a computer and to manage designed in such a way that all the
control is performed end-to-end rather the files in a remote computer. stations are connected through a
than across the single link. The sender Mail services: An application layer single cable known as a backbone
transport layer ensures that message provides the facility for email cable.
reach at the destination without any forwarding and storage. Each node is either connected to the
error. Directory services: An application backbone cable by drop cable or
provides the distributed database directly connected to the backbone
5.Session Layer: The Session layer is sources and is used to provide that cable.
used to establish, maintain and global information about various When a node wants to send a message
synchronizes the interaction between objects. over the network, it puts a message
communicating devices. over the network. All the stations
Functions Dialog control: Session layer Example: Application – Browsers, available in the network will receive
acts as a dialog controller that creates Skype Messenger, etc. the message whether it has been
a dialog between two processes or we addressed or not.
can say that it allows the The bus topology is mainly used in
communication between two 802.3 (ethernet) and 802.4 standard
processes which can be either half- networks.
duplex or full-duplex. The configuration of a bus topology is
Synchronization: Session layer adds quite simpler as compared to other
some checkpoints when transmitting topologies.
the data in a sequence. If some error
occurs in the middle of the
The backbone cable is considered as a Token passing: It is a network access centralized network. Therefore, the
"single lane" through which the method in which token is passed from network administrator has to go to the
message is broadcast to all the stations. one node to another node. single station to troubleshoot the
The most common access method of Token: It is a frame that circulates problem.
the bus topologies is CSMA (Carrier around the network. Network control: Complex network
Sense Multiple Access). control features can be easily
Advantages of Ring topology: implemented in the star topology. Any
Advantages of Bus topology: Network Management: Faulty devices changes made in the star topology are
Low-cost cable: In bus topology, nodes can be removed from the network automatically accommodated.
are directly connected to the cable without bringing the network down. Limited failure: As each station is
without passing through a hub. Product availability: Many hardware connected to the central hub with its
Therefore, the initial cost of and software tools for network own cable, therefore failure in one
installation is low. operation and monitoring are available. cable will not affect the entire network.
Moderate data speeds: Coaxial or Cost: Twisted pair cabling is Familiar technology: Star topology is a
twisted pair cables are mainly used in inexpensive and easily available. familiar technology as its tools are
bus-based networks that support upto Therefore, the installation cost is very cost-effective.
10 Mbps. low. Easily expandable: It is easily
Familiar technology: Bus topology is a Reliable: It is a more reliable network expandable as new stations can be
familiar technology as the installation because the communication system is added to the open ports on the hub.
and troubleshooting techniques are not dependent on the single host Cost effective: Star topology networks
well known, and hardware computer. are cost-effective as it uses inexpensive
components are easily available. Disadvantages: coaxial cable.
Limited failure: A failure in one node Difficult troubleshooting: It requires High data speeds: It supports a
will not have any effect on other nodes. specialized test equipment to bandwidth of approx 100Mbps.
Disadvantages : determine the cable faults. If any fault Ethernet 100BaseT is one of the most
Extensive cabling: A bus topology is occurs in the cable, then it would popular Star topology networks.
quite simpler, but still it requires a lot disrupt the communication for all the Disadvantages:
of cabling. nodes. A Central point of failure: If the central
Difficult troubleshooting: It requires Failure: The breakdown in one station hub or switch goes down, then all the
specialized test equipment to leads to the failure of the overall connected nodes will not be able to
determine the cable faults. If any fault network. communicate with each other.
occurs in the cable, then it would Reconfiguration difficult: Adding new Cable: Sometimes cable routing
disrupt the communication for all the devices to the network would slow becomes difficult when a significant
nodes. down the network. amount of routing is required.
Signal interference: If two nodes send Delay: Communication delay is directly
the messages simultaneously, then the proportional to the number of nodes. Tree topology:
signals of both the nodes collide with Adding new devices increases the Tree topology combines the
each other. communication delay. characteristics of bus topology and star
Reconfiguration difficult: Adding new topology.
devices to the network would slow Star Topology: A tree topology is a type of structure in
down the network. Star topology is an arrangement of the which all the computers are connected
Attenuation: Attenuation is a loss of network in which every node is with each other in hierarchical fashion.
signal leads to communication issues. connected to the central hub, switch or The top-most node in tree topology is
Repeaters are used to regenerate the a central computer. known as a root node, and all other
signal. The central computer is known as a nodes are the descendants of the root
Ring Topology: server, and the peripheral devices node.
Ring topology is like a bus topology, attached to the server are known as There is only one path exists between
but with connected ends. clients. two nodes for the data transmission.
The node that receives the message Coaxial cable or RJ-45 cables are used Thus, it forms a parent-child hierarchy.
from the previous computer will to connect the computers. Advantages of Tree topology
retransmit to the next node. Hubs or Switches are mainly used as Support for broadband transmission:
The data flows in one direction, i.e., it connection devices in a physical star Tree topology is mainly used to
is unidirectional. topology. provide broadband transmission, i.e.,
The data flows in a single loop Star topology is the most popular signals are sent over long distances
continuously known as an endless loop. topology in network implementation. without being attenuated.
It has no terminated ends, i.e., each Advantages of Star topology: Easily expandable: We can add the
node is connected to other node and Efficient troubleshooting: new device to the existing network.
having no termination point. Troubleshooting is quite efficient in a Therefore, we can say that tree
The data in a ring topology flow in a star topology as compared to bus topology is easily expandable.
clockwise direction. topology. In a bus topology, the Easily manageable: In tree topology,
The most common access method of manager has to inspect the kilometers the whole network is divided into
the ring topology is token passing. of cable. In a star topology, all the segments known as star networks
stations are connected to the
which can be easily managed and Reliable: The mesh topology networks to design the architecture of the
maintained. are very reliable as if any link Hybrid network.
Error detection: Error detection and breakdown will not affect the Costly Hub: The Hubs used in the
error correction are very easy in a tree communication between connected Hybrid topology are very expensive as
topology. computers. these hubs are different from usual
Limited failure: The breakdown in one Fast Communication: Communication Hubs used in other topologies.
station does not affect the entire is very fast between the nodes. Costly infrastructure: The
network. Easier Reconfiguration: Adding new infrastructure cost is very high as a
Point-to-point wiring: It has point-to- devices would not disrupt the hybrid network requires a lot of cabling,
point wiring for individual segments. communication between other devices. network devices, etc.
Disadvantages of Tree:
Difficult troubleshooting: If any fault Disadvantages of Mesh topology
occurs in the node, then it becomes Cost: A mesh topology contains a large Network Devices: Network devices,
difficult to troubleshoot the problem. number of connected devices such as a also known as networking hardware,
High cost: Devices required for router and more transmission media are physical devices that allow
broadband transmission are very costly. than other topologies. hardware on a computer network to
Failure: A tree topology mainly relies Management: Mesh topology communicate and interact with one
on main bus cable and failure in main networks are very large and very another. For example Repeater, Hub,
bus cable will damage the overall difficult to maintain and manage. If the Bridge, Switch, Routers, Gateway,
network. network is not monitored carefully, Brouter, and NIC, etc.
Reconfiguration difficult: If new then the communication link failure
devices are added, then it becomes goes undetected. 1. Repeater – A repeater operates at
difficult to reconfigure. Efficiency: In this topology, redundant the physical layer. Its job is to
connections are high that reduces the regenerate the signal over the same
Mesh topology: efficiency of the network. network before the signal becomes too
Mesh technology is an arrangement of weak or corrupted to extend the
the network in which computers are Hybrid Topology: length to which the signal can be
interconnected with each other The combination of various different transmitted over the same network.
through various redundant topologies is known as Hybrid topology. An important point to be noted about
connections. A Hybrid topology is a connection repeaters is that they do not amplify
There are multiple paths from one between different links and nodes to the signal. When the signal becomes
computer to another computer. transfer the data. weak, they copy it bit by bit and
It does not contain the switch, hub or When two or more different topologies regenerate it at its star topology
any central computer which acts as a are combined together is termed as connectors connecting if original
central point of communication. Hybrid topology and if similar strength. It is a 2-port device.
The Internet is an example of the mesh topologies are connected with each
topology. other will not result in Hybrid topology. 2. Hub – A hub is a basically multi-port
Mesh topology is mainly used for WAN For example, if there exist a ring repeater. A hub connects multiple
implementations where topology in one branch of ICICI bank wires coming from different branches,
communication failures are a critical and bus topology in another branch of for example, the connector in star
concern. ICICI bank, connecting these two topology which connects different
Mesh topology is mainly used for topologies will result in Hybrid stations. Hubs cannot filter data, so
wireless networks. topology. data packets are sent to all connected
Mesh topology can be formed by using Advantages of Hybrid Topology devices. In other words, the collision
the formula: Reliable: If a fault occurs in any part of domain of all hosts connected through
Number of cables = (n*(n-1))/2;Where the network will not affect the Hub remains one. Also, they do not
n is the number of nodes that functioning of the rest of the network. have the intelligence to find out the
represents the network. Scalable: Size of the network can be best path for data packets which leads
easily expanded by adding new devices to inefficiencies and wastage.
Mesh topology is divided into two without affecting the functionality of
categories: the existing network. Active Hub:- These are the hubs that
Flexible: This topology is very flexible have their power supply and can clean,
Full Mesh Topology: In a full mesh as it can be designed according to the boost, and relay the signal along with
topology, each computer is connected requirements of the organization. the network. It serves both as a
to all the computers available in the Effective: Hybrid topology is very repeater as well as a wiring center.
network. effective as it can be designed in such a These are used to extend the
Partial Mesh Topology: In a partial way that the strength of the network is maximum distance between nodes.
mesh topology, not all but certain maximized and weakness of the Passive Hub:- These are the hubs that
computers are connected to those network is minimized. collect wiring from nodes and power
computers with which they Disadvantages of Hybrid topology supply from the active hub. These hubs
communicate frequently. Complex design: The major drawback relay signals onto the network without
of the Hybrid topology is the design of cleaning and boosting them and can’t
Advantages of Mesh topology: the Hybrid network. It is very difficult
be used to extend the distance they make decisions on routing the addresses are 48 bits long and these
between nodes. data packets. The router divides the addresses could not be routed
Intelligent Hub:- It works like an active broadcast domains of hosts connected between networks. MAC Address is a
hub and includes remote management through it. 12 digit hexadecimal numeral which is
capabilities. They also provide flexible 6. Gateway – A gateway, as the name most typically expressed with a colon
data rates to network devices. It also suggests, is a passage to connect two or hyphen separating every two digits
enables an administrator to monitor networks that may work upon (an octet), making reading easier. MAC
the traffic passing through the hub and different networking models. They Addresses are used at the Data Link
to configure each port in the hub. work as messenger agents that take Layer.
data from one system, interpret it, and
3. Bridge – A bridge operates at the transfer it to another system.
data link layer. A bridge is a repeater, Gateways are also called protocol Example –
with add on the functionality of converters and can operate at any A MAC address of 2c549188c9e3 is
filtering content by reading the MAC network layer. Gateways are generally represented as 2C:54:91:88:C9:E3 or
addresses of the source and more complex than switches or routers. 2c-54-91-88-c9-e3.
destination. It is also used for A gateway is also called a protocol
interconnecting two LANs working on converter. Reason for IP address called a “logical”
the same protocol. It has a single input INTERNETWORKING address, and the MAC address is
and single output port, thus making it a IP Address : called a “physical” address :
2 port device. An Internet Protocol address is an IP
address. It is a unique address that An IP address is also known as a logical
Types of Bridges identifies the device on the network. address and it can change over time as
Transparent Bridges:- These are the The Internet Service Provider (ISP) well as from one network to another.
bridge in which the stations are assigns IP addresses to all devices on The Internet Service Provider will be in
completely unaware of the bridge’s its network. IP addresses are not charge of assigning it. When a device
existence i.e. whether or not a bridge generated at random. The Internet connects to a different network, it
is added or deleted from the network, Assigned Numbers Authority (IANA), a receives a different IP address as a
reconfiguration of the stations is part of the Internet Corporation for result of a change in Internet Service
unnecessary. These bridges make use Assigned Names and Numbers (ICANN), Provider.
of two processes i.e. bridge forwarding generates and assigns them With the help of Dynamic Host
and bridge learning. mathematically . IP addresses are used Configuration Protocol (DHCP), even in
Source Routing Bridges:- In these at the network layer. IP Addresses are the same network, when a device
bridges, routing operation is routable in nature. wants to connect to the internet, it will
performed by the source station and acquire different addresses from the
the frame specifies which route to IP Version Types : pool. There is no assurance that the
follow. The host can discover the There are 2 different versions of IP as device always has the same IP address.
frame by sending a special frame called follows. The IP address is not directly linked to
the discovery frame, which spreads any devices. As a result, it is referred to
through the entire network using all IPv4 (IP version 4) – as a logical address.
possible paths to the destination. IPv4 employs a 32-bit address. It is However, there is a MAC address
composed of four numbers separated provided by the hardware interface
4. Switch – A switch is a multiport by a ‘dot’ i.e., periods called an octet vendor. It never changes when a
bridge with a buffer and a design that (byte). Each number in the octet can device is attached to any network. As a
can boost its efficiency(a large number range from 0 to 255. result, it is referred to as a physical
of ports imply less traffic) and Example – 172.166.3.28 address.
performance. A switch is a data link IPv6 (IP version 6) – IP address is, for example, like school
layer device. The switch can perform IPv6 is the next generation of Internet register no, university register no and
error checking before forwarding data, Protocol addresses. In comparison to corporate employee id. When a person
which makes it very efficient as it does IPV4, IPv6 has a larger address space. transfers from school to college and
not forward packets that have errors IPv6 has a length of 128 bits and is then to the workplace, he or she is
and forward good packets selectively written in hexadecimal. It is composed assigned a new Identification Number,
to the correct port only. In other of eight fields, each of which contains which is used to uniquely identify the
words, the switch divides the collision two octets. As a result, IPv6 has 16 individual inside that organization. At
domain of hosts, but the broadcast octets in total. different periods, the same individual
domain remains the same. Example – was recognized with a different
3221:1cd7:74b6:6da7:0000:0000:7349: identification number. Similarly, when
5. Routers – A router is a device like a 6472 one machine connects to a different
switch that routes data packets based MAC Address : network, it receives a new IP address
on their IP addresses. The router is A MAC address is a one-of-a-kind each time. Thus it is called a logical
mainly a Network Layer device. identification assigned to a NIC address.
Routers normally connect LANs and (Network Interface Controller/Card). However, that address is unique inside
WANs and have a dynamically The full form of MAC address is Media that network. But MAC address is like
updating routing table based on which Access Control address. MAC an Aadhaar number, it never changes
to any business. It’s like an original
identity.
In the same way, the MAC address will
be the same for the device’s (NIC), for
any network on which the device is
associated. Thus it is called a physical
address. A MAC address is also a
unique address. There won’t be the
same address for two devices.

You might also like