Computer Network 1 ST Notes
Computer Network 1 ST Notes
The aim of the computer network is the sharing of resources among various devices.
In the case of computer network technology, there are several types of networks that vary
from simple to complex level.
Server: Servers are computers that runs operating system and hold data that can be shared
over acomputer network
Client: A client is a computer that is connected to other computers in the network and can
receive data sent by other computers.
Transmission Media: All computers in a computer network are connected with each other
through a transmission media such as wires, optical fibre cables, coaxial cables etc
1
Network Interface card: Each system or computer in a computer network must have a card
called network interface card (NIC). The main purpose of NIC is to format the data, send the
dataand receive the data at the receiving node.
Hub: Hub acts as a device that connects all the computer in a network to each other. Any
request that comes from a client computer first received by Hub and then hub transmit this
request over a network so that the correct server receives and respond to it.
Switch: Switch is similar to hub however instead of broadcasting a incoming data request it
uses the physical device address in the incoming request to transfer the request to correct
server computer.
Router: Router joins multiple computer networks to each other. For example lets say a
company runs 100 computers over a local area network(LAN) and another company runs
another LAN of 150 computers. These both LANs can be connected with each other through
a internet connection which is provided by the router.
LAN cable: A wire that is used to connect more than one computers or other devices such as
printers and scanner to each other.
NIC is a device that helps the computer to communicate with another device. The network
interface card contains the hardware addresses, the data-link layer protocol use this address
to identify the system on the network so that it transfers the data to the correct destination
.There are two types of NIC: wireless NIC and wired NIC.
Wireless NIC: All the modern laptops use the wireless NIC. In Wireless NIC, a
connection is made using the antenna that employs the radio wave technology.
Wired NIC: Cables use the wired NIC to transfer the data over the medium
Resource sharing is an application of a computer network. Resource sharing means you can
share one Hardware and Software among multiple users. Hardware includes printers, Disks,
Fax Machines, etc. Computing devices. And Software includes Atom, Oracle VM Virtual Box,
Postman, Android Studio, etc.
2. Information Sharing
Using a Computer network, we can share Information over the network, and it provides
Search capabilities such as WWW. Over the network, a single information can be shared
among the many users over the internet.
3. Communication
Communication includes email, calls, message broadcast, electronic funds transfer system
etc.
4. Entertainment Industry
2
In Entertainment industry also uses computer networks widely. Some of the Entertainment
industries are Video on demand, Multi person real-time simulation games, movie/TV
programs, etc.
6. Home applications
There are many common uses of the computer network are as home applications. For
example, you can consider user-to-user communication, access to remote instruction,
electronic commerce, and entertainment. Another way is managing bank accounts,
transferring money to some other banks, paying bills electronically. A computer network
arranges a robust connection mechanism between users.
7. Business applications
The result of business application here is resource sharing. And the purpose of resource
sharing is that without moving to the physical location of the resource, all the data, plans, and
tools can be shared to any network user. Most of the companies are doing business
electronically with other companies and with other clients worldwide with the help of a
computer network.
8. Mobile users
The rapidly growing sectors in computer applications are mobile devices like notebook
computers and PDAs (personal digital assistants). Here mobile users/device means portable
device. The computer network is widely used in new-age technology like smartwatches,
wearable devices, tablets, online transactions, purchasing or selling products online, etc.
9. Social media
Social media is also a great example of a computer network application. It helps people to
share and receive any information related to political, ethical, and social issues.
Network topologies are classified into two types: physical and logical. While logical topology
emphasizes the pattern of data transfer between network nodes, physical topology
emphasizes the physical layout of the connected devices and nodes
3
In computer networks, there are primarily six types of physical topology. They are as follows:
Bus Topology
Ring Topology
Star Topology
Mesh Topology
Tree Topology
Hybrid Topology
Bus Topology: The simplest type of topology is called a bus topology, in which network
communication takes place over a single bus or channel. There are numerous taps and drop
lines connected to the bus. Drop Lines are cables that connect the bus to the computer, and
taps are connectors. In other words, each node is connected to a single transmission line.
The bus's limited length means that only a certain number of nodes can connect to it.
As messages are broadcast to all nodes, there are more security concerns and risks.
4
Ring Topology: When two computers are connected to form a ring, the topology is known as
a ring topology. The message passing is circular and unidirectional. A fixed amount of time is
allotted for each computer to access the network for transmission in this deterministic
network topology. Each node is a part of a closed loop.
Simple installation
Slow data transfer rate as each message has to go through the ring path.
Getting more difficult to reconfigure.
Star Topology: A computer network topology known as a star topology connects each node
to a central hub. The hub or switch acts as a bridge between the nodes. Any node making a
service request or offering a service must first get in touch with the hub. The other connected
devices function as clients in a star topology, while the hub and switch serve as a server.
5
Less costly.
Centralized management.
Simple to scale.
Mesh Topology: Mesh technology is a network configuration in which computers are linked
to one another by numerous redundant connections. There are numerous methods for
transferring from one computer to another. It lacks a switch, hub, or any other central
computer that acts as a communication hub.
Mesh topology has the benefits listed below:
Due to each node having its own dedicated path, fault tolerance is good.
Quick communication.
6
Extremely high cabling is required.
Implementation is expensive.
Tree Topology: A computer network topology known as a "tree topology" is one in which all
nodes are either directly or indirectly connected to the main bus cable. Bus and Star
topologies are combined to create tree topology. With a tree topology, the network is split
up into manageablesegments that can be easily maintained.
7
The network will fail if the main bus fails.
Implementation is costly.
8
Layered network architecture
Every network consists of a specific number of functions, layers, and tasks to perform. Layered
Architecture in a computer network is defined as a model where a whole network process is
divided into various smaller sub-tasks. These divided sub-tasks are then assigned to a specific
layer to perform only the dedicated tasks. A single layer performs only s specific type of task.
To run the application and provide all types of services to clients a lower layer adds its services
to the higher layer present above it. Therefore layered architecture provides interactions
between the sub-systems. If any type of modification is done in one layer it does not affect
the next layer.
As shown in the above diagram, there are five different layers. Therefore it is a five-layered
architecture. Each layer performs a dedicated task. The lower level data for example from
layer 1 data is transferred to layer 2. Below all the layers Physical Medium is present. The
physical medium is responsible for the actual communication to take place. For the transfer
of data and communication layered architecture provides with a clean cut interface.
Features of Layered Architecture
Use of Layered architecture in computer network provides with the feature of modularity and
distinct interfaces.
9
Layered architecture ensures independence between layers, by offering services to higher
layers from the lower layers and without specifying how this services are implemented.
Layered architecture segments as larger and unmanageable design into small sub tasks.
In layer architecture every network has different number of functions, layers and content.
In layered architecture, the physical route provides with communication which is available
under the layer 1.
In layered architecture, the implementation done by one layer can be modified by the another
layer.
Elements of Layered Architecture
There are three different types of elements of a layered architecture. They are described
below:
Service: Service is defined as a set of functions and tasks being provided by a lower layer to a
higher layer. Each layer performs a different type of task. Therefore, actions provided by each
layer are different.
Protocol: Protocol is defined as a set rules used by the layer for exchanging and transmission
of data with its peer entities. This rules can consists details regarding a type of content and
their order passed from one layer to another.
Interface: Interface is defined as a channel that allows to transmit the messages from one
layer to the another.
Introduction :
The OSI (Open Systems Interconnection) model is a conceptual framework that defines how
computers communicate with each other over a network. It consists of seven layers, each
with its own specific function and set of protocols.
Starting from the bottom, the first layer is the physical layer, which deals with the physical
aspects of transmitting data such as cables, connectors, and signaling. The second layer is the
data link layer, which is responsible for establishing and maintaining communication between
two devices on the same network.
The third layer is the network layer, which handles the routing of data between networks.
The fourth layer is the transport layer, which ensures reliable transmission of data between
two devices.The fifth layer is the session layer, which establishes and manages sessions
between applications. The sixth layer is the presentation layer, which deals with the syntax
and semantics of the data being transmitted .Finally, the seventh layer is the application layer,
which provides services to applications for network communication.
The OSI model is important because it helps network designers and administrators
understand how different protocols and technologies work together to provide network
10
communication. It also helps in troubleshooting network issues by isolating problems to
specific layers.
OSI stands for Open Systems Interconnection. The OSI model was developed by the
International Organization for Standardization(ISO). It is a reference model for how
applications communicate over a network. The OSI model characterizes computing functions
into a universal set of rules and requirements to support interoperability between different
products and software.
Advantages:
It is a layered model and each layer is independent. Thus, changes in one layer don’t affect
the other layers.
11
It is a generic model as it has the flexibility to adapt to many protocols.
It supports both connection-oriented as well as connectionless services.
It is more secure and adaptable than having all services bundled in a single layer.
Disadvantages:
It is purely a theoretical model and ignores the availability of resources and technologies.
Hence, its practical implementation is somewhat restricted.
It is very complex. The initial implementation was cumbersome, slow, and costly.
The layers are interdependent, they can’t operate parallelly as they have to wait for the data/
packets from the predecessor layer.
Physical Layer – Layer 1
The lowest layer of the OSI reference model is the physical layer. It is responsible for the actual
physical connection between the devices. The physical layer contains information in the form
of bits. It is responsible for transmitting individual bits from one node to the next. When
receiving data, this layer will get the signal received and convert it into 0s and 1s and send
them to the Data Link layer, which will put the frame back together.
Physical topologies: Physical layer specifies how the different, devices/nodes are arranged in
a network i.e. bus, star, or mesh topology.
Transmission mode: Physical layer also defines how the data flows between the two
connected devices. The various transmission modes possible are Simplex, half-duplex and full-
duplex.
Data Link Layer (DLL) – Layer 2
The data link layer is responsible for the node-to-node delivery of the message. The main
function of this layer is to make sure data transfer is error-free from one node to another,
over the physical layer. When a packet arrives in a network, it is the responsibility of the DLL
to transmit it to the Host using its MAC address.
12
The Data Link Layer is divided into two sublayers:
Logical Link Control (LLC)
The packet received from the Network layer is further divided into frames depending on the
frame size of the NIC(Network Interface Card). DLL also encapsulates Sender and Receiver’s
MAC address in the header.
Physical addressing: After creating frames, the Data link layer adds physical addresses (MAC
addresses) of the sender and/or receiver in the header of each frame.
Error control: The data link layer provides the mechanism of error control in which it detects
and retransmits damaged or lost frames.
Flow Control: The data rate must be constant on both sides else the data may get corrupted
thus, flow control coordinates the amount of data that can be sent before receiving an
acknowledgment.
Access control: When a single communication channel is shared by multiple devices, the MAC
sub-layer of the data link layer helps to determine which device has control over the channel
at a given time.
13
transmit the packet, from the number of routes available. The sender & receiver’s IP
addresses are placed in the header by the network layer.
Functions of the Network Layer
Routing: The network layer protocols determine which route is suitable from source to
destination. This function of the network layer is known as routing.
Logical Addressing: To identify each device on Internetwork uniquely, the network layer
defines an addressing scheme. The sender & receiver’s IP addresses are placed in the header
by the network layer. Such an address distinguishes each device uniquely and universally.
The transport layer provides services to the application layer and takes services from the
network layer. The data in the transport layer is referred to as Segments. It is responsible for
the End to End Delivery of the complete message. The transport layer also provides the
acknowledgment of the successful data transmission and re-transmits the data if an error is
found.
At the sender’s side: The transport layer receives the formatted data from the upper layers,
performs Segmentation, and also implements Flow & Error control to ensure proper data
transmission. It also adds Source and Destination port numbers in its header and forwards
the segmented data to the Network Layer.
Connection-Oriented Service
Connectionless Service
Data Transfer
Termination/disconnection
14
In this type of transmission, the receiving device sends an acknowledgment, back to the
source after a packet or group of packets is received. This type of transmission is reliable a nd
secure.
2. Connectionless service: It is a one-phase process and includes Data Transfer. In this type
of transmission, the receiver does not acknowledge receipt of a packet. This approach allows
for much faster communication between devices. Connection-oriented service is more
reliable than connectionless Service.
This layer is responsible for the establishment of connection, maintenance of sessions, and
authentication, and also ensures security.
Synchronization: This layer allows a process to add checkpoints that are considered
synchronization points in the data. These synchronization points help to identify the error so
that the data is re-synchronized properly, and ends of the messages are not cut prematurely
and data loss is avoided.
Dialog Controller: The session layer allows two systems to start communication with each
other in half-duplex or full-duplex.
for Example:-
Let us consider a scenario where a user wants to send a message through some Messenger
application running in his browser. The “Messenger” here acts as the application layer which
provides the user with an interface to create the data. This message or so-called Data is
compressed, encrypted (if any secure data), and converted into bits (0’s and 1’s) so that it can
be transmitted.
15
The presentation layer is also called the Translation layer. The data from the application layer
is extracted here and manipulated as per the required format to transmit over the network.
Functions of the Presentation Layer
Encryption/ Decryption: Data encryption translates the data into another form or code. The
encrypted data is known as the ciphertext and the decrypted data is known as plain text. A
key value is used for encrypting as well as decrypting data.
Compression: Reduces the number of bits that need to be transmitted on the network.
Application Layer – Layer 7
At the very top of the OSI Reference Model stack of layers, we find the Application layer which
is implemented by the network applications. These applications produce the data, which has
to be transferred over the network. This layer also serves as a window for the application
services to access the network and for displaying the received information to the user.
FTAM- File transfer access and management : This application allows a user to
access file in a remote host, retrieve files in remote host and manage or
and access for global information about various objects and services.
Network Protocols Definition
Network protocols are a set of rules outlining how connected devices communicate across a
network to exchange information easily and safely. Protocols serve as a common language
for devices to enable communication irrespective of differences in software, hardware, or
internal processes.
Types of network protocols
Different protocols serve different functions to ensure efficient, quick, and secure network
communication. Various types of network protocols can be categorized into the following
three broad categories to help organizations operate seamlessly across different business
scenarios:
16
1. Network Communication Protocols: These protocols determine the rules and formats to
transfer data across networks. Communication protocols govern various aspects of analog
and digital communications, such as syntax, authentication, semantics, and error detection,
among others. Some key network communication protocols include:
Hyper-Text Transfer Protocol (HTTP): Commonly referred to as the protocol of the internet
that allows communication between a server and browser.
Transmission Control Protocol (TCP): A reliable, connection-oriented protocol that helps in
the sequential transmission of data packets to ensure data reaches the destination on time
without duplication.
Internet Protocol (IP): Facilitates routing the data packets across networks. IP contains
addressing and control information to deliver packets across a network. It works along with
TCP. While it ensures delivering the packets to the right address, TCP aligns them in the right
order.
User Datagram Protocol (UDP): Unlike TCP, UDP is a connectionless protocol that doesn’t
ensure a connection between the application and server before transmitting a message. It’s
effective for use cases such as broadcasts or multicast connections.
File Transfer Protocol (FTP): Allows file sharing between servers by establishing two TCP
connections, one for data transfer and the other for control. The data transfer connection
transfers the actual files while the control connection transfers control information such as
passwords to ensure data retrieval in case of data loss.
2. Network Security Protocols: These protocols ensure safe data transmission over the
network connections. Network security protocols define the procedures to secure data from
any unauthorized access. These protocols leverage encryption and cryptography to
safeguard. Here are the most widely used network security protocols:
Secure File Transfer Protocol (SFTP): Helps securely transfer files across a network by using
public-key encryption and authenticating the client and server.
Hyper-Text Transfer Protocol Secure (HTTPS): Overcomes the limitation of HTTP by ensuring
the security of data transmitted between the browser and server through data encryption.
HTTPS is a secure version of HTTP.
Secure Socket Layer (SSL): Primarily helps secure internet connections and safeguard
sensitive data using encryption. SSL protocol enables both server-client communication and
server-server communication.
3. Network Management Protocols: Network managers require standard policies and
procedures to manage and monitor the network for maintaining smooth communication.
Network management protocols ensure quick troubleshooting and optimal performance
across the network. The following are essential network protocols management:
17
Simple Network Management Protocol (SNMP): Helps administrators manage network
devices by monitoring endpoint information to proactively track network performance and
pinpoint network glitches for quick troubleshooting.
Internet Control Message Protocol (ICMP): Helps diagnose network connectivity issues.
Network devices employ ICMP for sending error messages, highlighting congestion and
timeouts, and transmitting other operational information to assist in network
troubleshooting.
Network Services
Computer systems and computerized systems help human beings to work efficiently and
explore the unthinkable. When these devices are connected together to form a network, the
capabilities are enhanced multiple-times. Some basic services computer network can offer
are.
Directory Services
These services are mapping between name and its value, which can be variable value or fixed.
This software system helps to store the information, organize it, and provides various means
of accessing it
Accounting
In an organization, a number of users have their user names and passwords mapped to them.
Directory Services provide means of storing this information in cryptic form and make
available when requested.
File Sharing
One of the reason which gave birth to networking was file sharing. File sharing enables its
users to share their data with other users. User can upload the file to a specific server, which
is accessible by all intended users. As an alternative, user can make its file shared on its own
computer and provides access to intended users.
File Transfer
This is an activity to copy or move file from one computer to another computer or to multiple
computers, with help of underlying network. Network enables its user to locate other users
in the network and transfers files.
18
Communication Services
Email
Electronic mail is a communication method and something a computer user cannot work
without. This is the basis of today’s internet features. Email system has one or more email
servers. All its users are provided with unique IDs. When a user sends email to other user, it
is actually transferred between users with help of email server.
Social Networking
Recent technologies have made technical life social. The computer savvy peoples, can find
other known peoples or friends, can connect with them, and can share thoughts, pictures,
and videos.
Internet Chat
Internet chat provides instant text transfer services between two hosts. Two or more people
can communicate with each other using text based Internet Relay Chat services. These days,
voice chat and video chat are very common.
Discussion Boards
Discussion boards provide a mechanism to connect multiple peoples with same interests.It
enables the users to put queries, questions, suggestions etc. which can be seen by all other
users. Other may respond as well.
Remote Access
This service enables user to access the data residing on the remote computer. This feature is
known as Remote desktop. This can be done via some remote device, e.g. mobile phone or
home computer.
Application Services
These are nothing but providing network based services to the users such as web services,
database managing, and resource sharing.
Resource Sharing
To use resources efficiently and economically, network provides a mean to share them. This
may include Servers, Printers, and Storage Media etc.
Databases
This application service is one of the most important services. It stores data and information,
processes it, and enables the users to retrieve it efficiently by using queries. Databases help
organizations to make decisions based on statistics.
Web Services
World Wide Web has become the synonym for internet .It is used to connect to the internet,
and access files and information services provided by the internet servers.
19