Computer Networks Unit 1
Computer Networks Unit 1
IQAC/ASU/F/2023-24/2.1 Page 1 of 51
2. Reliability: In addition to accuracy is measured by frequency of
failure, the time it takes a link to recover from failure, and the
network’s robustness in catastrophe.
3. Security: Network security issues include protecting data from
unauthorized access, protecting data from damage and
development, and implementing policies and procedures for
recovery from breaches and data loss.
IQAC/ASU/F/2023-24/2.1 Page 2 of 51
What is Data Communication?
Data communication refers to the process of transmitting and receiving data
between two or more devices over a communication channel. It involves the
conversion of data into signals that can be transmitted and then decoding
those signals at the receiving end. Effective data communication requires
the use of appropriate protocols, encoding techniques, and hardware
devices.
IQAC/ASU/F/2023-24/2.1 Page 3 of 51
Types of Data Transmission
Data transmission can occur in two primary ways:
• Serial Transmission: In serial transmission, data is transmitted bit
by bit over a single communication channel. It is commonly used
for long-distance communication and is more reliable but slower
compared to parallel transmission.
• Parallel Transmission: In parallel transmission, multiple bits are
transmitted simultaneously over separate communication
channels. It allows for faster data transfer but is more susceptible
to errors in long-distance transmissions.
IQAC/ASU/F/2023-24/2.1 Page 4 of 51
1. Simplex Mode –
In Simplex mode, the communication is unidirectional, as on a one-way
street. Only one of the two devices on a link can transmit, the other can only
receive. The simplex mode can use the entire capacity of the channel to
send data in one direction.
Example: Keyboard and traditional monitors. The keyboard can only
introduce input, the monitor can only give the output.
Advantages:
• Simplex mode is the easiest and most reliable mode of
communication.
• It is the most cost-effective mode, as it only requires one
communication channel.
• There is no need for coordination between the transmitting and
receiving devices, which simplifies the communication process.
• Simplex mode is particularly useful in situations where feedback or
response is not required, such as broadcasting or surveillance.
Disadvantages:
• Only one-way communication is possible.
• There is no way to verify if the transmitted data has been received
correctly.
• Simplex mode is not suitable for applications that require
bidirectional communication.
2. Half-Duplex Mode –
In half-duplex mode, each station can both transmit and receive, but not at
the same time. When one device is sending, the other can only receive, and
IQAC/ASU/F/2023-24/2.1 Page 5 of 51
vice versa. The half-duplex mode is used in cases where there is no need for
communication in both directions at the same time. The entire capacity of
the channel can be utilized for each direction.
Example: Walkie-talkie in which message is sent one at a time and
messages are sent in both directions.
Channel capacity=Bandwidth * Propagation Delay
Advantages:
• Half-duplex mode allows for bidirectional communication, which is
useful in situations where devices need to send and receive data.
• It is a more efficient mode of communication than simplex mode,
as the channel can be used for both transmission and reception.
• Half-duplex mode is less expensive than full-duplex mode, as it
only requires one communication channel.
Disadvantages:
• Half-duplex mode is less reliable than Full-Duplex mode, as both
devices cannot transmit at the same time.
• There is a delay between transmission and reception, which can
cause problems in some applications.
• There is a need for coordination between the transmitting and
receiving devices, which can complicate the communication
process.
IQAC/ASU/F/2023-24/2.1 Page 6 of 51
3. Full-Duplex Mode –
In full-duplex mode, both stations can transmit and receive simultaneously.
In full_duplex mode, signals going in one direction share the capacity of the
link with signals going in another direction, this sharing can occur in two
ways:
• Either the link must contain two physically separate transmission
paths, one for sending and the other for receiving.
• Or the capacity is divided between signals traveling in both
directions.
Advantages:
• Full-duplex mode allows for simultaneous bidirectional
communication, which is ideal for real-time applications such as
video conferencing or online gaming.
• It is the most efficient mode of communication, as both devices can
transmit and receive data simultaneously.
• Full-duplex mode provides a high level of reliability and accuracy,
as there is no need for error correction mechanisms.
Disadvantages:
IQAC/ASU/F/2023-24/2.1 Page 7 of 51
• Full-duplex mode is the most expensive mode, as it requires two
communication channels.
• It is more complex than simplex and half-duplex modes, as it
requires two physically separate transmission paths or a division of
channel capacity.
• Full-duplex mode may not be suitable for all applications, as it
requires a high level of bandwidth and may not be necessary for
some types of communication.
IQAC/ASU/F/2023-24/2.1 Page 8 of 51
• Wide Area Network (WAN): WAN refers to a network that
connects countries or continents. For example, the Internet allows
users to access a distributed system called www from anywhere
around the globe.WAN interconnects connecting devices such as
switches, routers, or modems. A LAN is normally privately owned
by an organization that uses it. We see two distinct examples of
WANs today: point-to-point WANs and Switched WANs
• Point To Point: Connects two connecting devices through
transmission media.
• Switched: A switched WAN is a network with more than
two ends.
Based on Types of Communication
• Point To Point networks: Point-to-Point networking is a type of
data networking that establishes a direct link between two
networking nodes.
A direct link between two devices, such as a computer and a
printer, is known as a point-to-point connection.
• Multipoint: is the one in which more than two specific devices
share links. In the multipoint environment, the capacity of the
channel is shared, either spatially or temporally. If several devices
can use the link simultaneously, it is a spatially shared connection.
• Broadcast networks: In broadcast networks, a signal method in
which numerous parties can hear a single sender. Radio stations
are an excellent illustration of the “Broadcast Network” in
everyday life. The radio station is a sender of data/signal in this
scenario, and data is only intended to travel in one direction. Away
from the radio transmission tower, to be precise.
IQAC/ASU/F/2023-24/2.1 Page 9 of 51
• Client-Server Networks: Each computer or process on the
network is either a client or a server in a client-server architecture
(client/server). The client asks for services from the server, which
the server provides. Servers are high-performance computers or
processes that manage disc drives (file servers), printers (print
servers), or network traffic (network servers)
• Hybrid Networks: The hybrid model uses a combination of client-
server and peer-to-peer architecture. Eg: Torrent.
Types of Computer Network Architecture
Computer Network Architecture is of two types. These types are
mentioned below.
1. Client-Server Architecture: It is basically the architecture where the
clients and the server are connected as two clients can communicate with
each other and the devices present work as servers in the network.
2. Peer-to-Peer Architecture: computers are connected to each other and
each computer is equally capable of working as there is no central server
here. Each device present here can be used as a client or server.
Network Topology
The arrangement of a network that comprises nodes and connecting lines
via sender and receiver is referred to as Network Topology
There are two types of Network topology
1) Physical topology
2) Logical Topology
What is Physical Topology?
Physical topology indicates the arrangement of different elements of a
network. It reflects the physical layout of devices and cables to form a
connected network. It is concerned with the essentials of the network
ignoring minute details like transfer of data and device type. The pattern of
arrangement of nodes (computers) and network cables depends on the ease
of installation and setup of the network. It affects cost and bandwidth
capacity based on a solution of devices. It takes into account the placement
IQAC/ASU/F/2023-24/2.1 Page 10 of 51
of nodes and the distance between them. Devices can be arranged to form a
ring (Ring Topology) or linearly connected in a line called Bus Topology.
Types of Physical Topology
The arrangement of a network that comprises nodes and connecting lines
via sender and receiver is referred to as Network Topology. On the basis of
arrangements, Physical Topology has several types:
1. Mesh Topology
2. Star Topology
3. Bus Topology
4. Ring Topology
5. Hybrid Topology
Bus Topology
Every computer and network device is connected to a single cable in a bus
topology network. Linear Bus topology is defined as having exactly two
terminals.
Advantages
• Installation is simple.
• Compared to mesh, star, and tree topologies, the bus utilizes less
cabling.
Disadvantages
• Difficulty in reconfiguring and isolating faults.
• A bus cable malfunction or break interrupts all communication.
IQAC/ASU/F/2023-24/2.1 Page 11 of 51
Ring Topology
Advantages
• Data transmission is relatively straightforward because packets
only move in one direction.
• There is no requirement for a central controller to manage
communication between nodes.
• Easy installation & Reconfiguration
• Simplified Faulty connections
Disadvantages
• In a Unidirectional Ring, a data packet must traverse through all
nodes.
• All computers must be turned on in order for them to connect with
one another.
IQAC/ASU/F/2023-24/2.1 Page 12 of 51
Star Topology
Each device in a star topology has a dedicated point-to-point link to a
central controller, which is commonly referred to as the HUB. There is no
direct connection between the devices. Traffic between the devices is not
allowed in this topology. As an exchange, the controller is used.
Advantages
• When attaching or disconnecting devices, there are no network
interruptions.
• It’s simple to set up and configure.
• Identifying and isolating faults is simple.
• Less Expensive than mesh
• Easy to install & configure
Disadvantages
• Nodes attached to the hub, switch, or concentrator is failed if they
fail.
• Because of the expense of the hubs, it is more expensive than
linear bus topologies.
• More cable is required compared to a bus or ring
• Too much dependency on Hub
Mesh Topology
Every device in a mesh topology has dedicated point-to-point connectivity
to every other device. The term “dedicated” refers to the fact that the link
IQAC/ASU/F/2023-24/2.1 Page 13 of 51
exclusively transports data between the two devices it links. To connect n
devices, a fully connected mesh network contains n *(n-1)/2 physical
channels.
Advantages
• Data can be sent from multiple devices at the same time. This
topology can handle a lot of traffic.
IQAC/ASU/F/2023-24/2.1 Page 14 of 51
• Even if one of the connections fails, a backup is always available.
As a result, data transit is unaffected.
• Physical boundaries prevent other users from gaining access to
messages
• Point to Point links make fault transmission & fault isolation easy
Disadvantages
• The amount of cabling and the number of I/O ports that are
necessary.
• The sheer bulk of wiring can be greater than the available space
can accommodate.
• It is difficult to install and reconfigure.
Tree Topology
The topology of a tree is similar to that of a star. Nodes in a tree, like those
in a star, are connected to a central hub that manages network traffic. It has
a root node, which is connected to all other nodes, producing a hierarchy.
Hierarchical topology is another name for it. The number of Star networks is
connected via Bus in Tree Topology.
Advantages
• Network expansion is both possible and simple.
• We partition the entire network into pieces (star networks) that are
easier to manage and maintain.
• Other segments are unaffected if one segment is damaged.
Disadvantages
• Tree topology relies largely on the main bus cable because of its
basic structure, and if it fails, the entire network is handicapped.
• Maintenance becomes more challenging when more nodes and
segments are added.
Internet
The Internet is a larger network that allows computer networks controlled
by enterprises, governments, colleges, and other organizations all over the
world to communicate with one another. As a result, there is a tangle of
IQAC/ASU/F/2023-24/2.1 Page 15 of 51
cables, computers, data centers, routers, servers, repeaters, satellites, and
Wi-Fi towers that allow digital data to go around the world.
The Internet is a vast network of networks that functions as a networking
infrastructure. It links millions of computers throughout the world, creating
a network in which any computer can talk with any other computer as long
as they are both linked to the Internet.
The Internet is a global network of interconnected computers that
communicate and share information using a standardized Internet Protocol
Suite.
The advantages of the Internet are,
• Source of entertainment – Online gaming, talking, browsing, music,
movies, dramas, and TV series are quickly becoming the most
popular ways to pass the time.
• Source of information – There is no better place to conduct
research than the internet. We can learn about the latest trends,
communicate with experts without having to physically visit them,
and seek professional advice over the Internet.
• E-Commerce – With the advancement of internet technology, large
online E-commerce enterprises such as Amazon, Ali Baba, myntra,
etc. have emerged.
• Working from home, collaborating with others, and having access
to a global workforce are all advantages.
• Keeps Updated – Because there are hundreds of thousands of
newsgroups and services that keep you updated with every tick of
the clock, the Internet is a source of the most recent news.
IQAC/ASU/F/2023-24/2.1 Page 16 of 51
• Exposure to private data – It is now quite easy to decipher
someone’s chat or email communication thanks to the hacking
community. As we all know, data is transmitted in packets, which
hackers can simply detect and reconstruct.
• Harassment & threatening – Bullies exist online, just as they do in
real life, and they can lower your self-esteem by harassing and
threatening you. Some of these individuals may be persons who
are aware of some of your personal details and dislike you and
may use this information to harass you.
IQAC/ASU/F/2023-24/2.1 Page 17 of 51
What are the 7 layers of the OSI Model?
The OSI model consists of seven abstraction layers arranged in a top-down
order:
1. Physical Layer
2. Data Link Layer
3. Network Layer
4. Transport Layer
5. Session Layer
6. Presentation Layer
7. Application Layer
IQAC/ASU/F/2023-24/2.1 Page 18 of 51
physical layer contains information in the form of bits. It is responsible for
transmitting individual bits from one node to the next. When receiving data,
this layer will get the signal received and convert it into 0s and 1s and send
them to the Data Link layer, which will put the frame back together.
IQAC/ASU/F/2023-24/2.1 Page 19 of 51
The packet received from the Network layer is further divided into frames
depending on the frame size of the NIC(Network Interface Card). DLL also
encapsulates Sender and Receiver’s MAC address in the header.
The Receiver’s MAC address is obtained by placing an ARP(Address
Resolution Protocol) request onto the wire asking “Who has that IP
address?” and the destination host will reply with its MAC address.
Functions of the Data Link Layer
IQAC/ASU/F/2023-24/2.1 Page 20 of 51
Note:
1. Packet in the Data Link layer is referred to as Frame.
2. Data Link layer is handled by the NIC (Network Interface Card) and
device drivers of host machines.
3. Switch & Bridge are Data Link Layer devices.
IQAC/ASU/F/2023-24/2.1 Page 21 of 51
sender & receiver’s IP addresses are placed in the header by the
network layer. Such an address distinguishes each device uniquely
and universally.
Note:
1. Segment in the Network layer is referred to as Packet.
2. Network layer is implemented by networking devices such as
routers and switches.
IQAC/ASU/F/2023-24/2.1 Page 22 of 51
it. The transport layer at the destination station reassembles the
message.
• Service Point Addressing: To deliver the message to the correct
process, the transport layer header includes a type of address
called service point address or port address. Thus by specifying
this address, the transport layer makes sure that the message is
delivered to the correct process.
Services Provided by Transport Layer
1. Connection-Oriented Service: It is a three-phase process that includes
• Connection Establishment
• Data Transfer
• Termination/disconnection
In this type of transmission, the receiving device sends an acknowledgment,
back to the source after a packet or group of packets is received. This type
of transmission is reliable and secure.
2. Connectionless service: It is a one-phase process and includes Data
Transfer. In this type of transmission, the receiver does not acknowledge
receipt of a packet. This approach allows for much faster communication
between devices. Connection-oriented service is more reliable than
connectionless Service.
Note:
1. Data in the Transport Layer is called Segments.
2. Transport layer is operated by the Operating System. It is a part of
the OS and communicates with the Application Layer by making
system calls.
3. The transport layer is called as Heart of the OSI model.
4. Device or Protocol Use : TCP, UDP NetBIOS, PPTP
Session Layer – Layer 5
This layer is responsible for the establishment of connection, maintenance
of sessions, and authentication, and also ensures security.
Functions of the Session Layer
• Session establishment, maintenance, and termination: The layer
allows the two processes to establish, use, and terminate a
connection.
IQAC/ASU/F/2023-24/2.1 Page 23 of 51
• Synchronization: This layer allows a process to add checkpoints
that are considered synchronization points in the data. These
synchronization points help to identify the error so that the data is
re-synchronized properly, and ends of the messages are not cut
prematurely and data loss is avoided.
• Dialog Controller: The session layer allows two systems to start
communication with each other in half-duplex or full-duplex.
Note:
1. All the below 3 layers(including Session Layer) are integrated as a
single layer in the TCP/IP model as the ???? Application Layer”.
2. Implementation of these 3 layers is done by the network
application itself. These are also known as Upper Layers
or Software Layers.
3. Device or Protocol Use : NetBIOS, PPTP.
For example:-
Let us consider a scenario where a user wants to send a message through
some Messenger application running in his browser. The “Messenger” here
acts as the application layer which provides the user with an interface to
create the data. This message or so-called Data is compressed, encrypted (if
any secure data), and converted into bits (0’s and 1’s) so that it can be
transmitted.
IQAC/ASU/F/2023-24/2.1 Page 24 of 51
• Translation: For example, ASCII to EBCDIC.
• Encryption/ Decryption: Data encryption translates the data into
another form or code. The encrypted data is known as the
ciphertext and the decrypted data is known as plain text. A key
value is used for encrypting as well as decrypting data.
• Compression: Reduces the number of bits that need to be
transmitted on the network.
Note: Device or Protocol Use: JPEG, MPEG, GIF
Application Layer – Layer 7
At the very top of the OSI Reference Model stack of layers, we find the
Application layer which is implemented by the network applications. These
applications produce the data, which has to be transferred over the
network. This layer also serves as a window for the application services to
access the network and for displaying the received information to the user.
Example: Application – Browsers, Skype Messenger, etc.
Note: 1. The application Layer is also called Desktop Layer.
3. Device or Protocol Use : SMTP
IQAC/ASU/F/2023-24/2.1 Page 25 of 51
Advantages of OSI Model
OSI Model defines the communication of a computing system into 7
different layers. Advantages of OSI Model include:
• It divides network communication into 7 layers which makes it
easier to understand and troubleshoot.
• It standardizes network communications, as each layer has fixed
functions and protocols.
• Diagnosing network problems is easier with the OSI model.
• It is easier to improve with advancements as each layer can get
updates separately.
Helps in
identifying the
Application
client and Message SMTP
Layer
synchronizing
7 communication.
Establishes
Session Layer Message Gateway
5 Connection,
IQAC/ASU/F/2023-24/2.1 Page 26 of 51
Information
Form(Data Device or
Layer No Layer Name Responsibility Unit) Protocol
Maintenance,
Ensures
Authentication
and Ensures
security.
Take Service
from Network
Transport Layer and
Segment Firewall
Layer provide it to the
Application
4 Layer.
Transmission of
data from one
Network host to another,
Packet Router
Layer located in
different
3 networks.
Node to Node
Data Link Switch,
Delivery of Frame
Layer Bridge
2 Message.
Establishing
Hub,
Physical
Physical Repeater,
Connections Bits
Layer Modem,
between
Cables
1 Devices.
IQAC/ASU/F/2023-24/2.1 Page 27 of 51
OSI vs TCP/IP Model
Some key differences between the OSI model and the TCP/IP Model are:
1. TCP/IP model consists of 4 layers but OSI model has 7
layers. Layers 5,6,7 of the OSI model are combined into the
Application Layer of TCP/IP model and OSI layers 1 and 2 are
combined into Network Access Layers of TCP/IP protocol.
2. The TCP/IP model is older than the OSI model, hence it is a
foundational protocol that defines how should data be transferred
online.
3. Compared to the OSI model, the TCP/IP model has less strict layer
boundaries.
4. All layers of the TCP/IP model are needed for data transmission
but in the OSI model, some applications can skip certain layers.
Only layers 1,2 and 3 of the OSI model are necessary for data
transmission.
TCP/IP Model
IQAC/ASU/F/2023-24/2.1 Page 28 of 51
TCP/IP stands for Transmission Control Protocol/Internet Protocol. It has 4
layers named as Physical layer, Network layer, Transport layer, and
Application layer. It also can be used as a communications protocol in a
private computer network. It was designed by Vint Cerf and Bob Kahn in the
1970s.
Advantages
• Many Routing protocols are supported.
• It is highly scalable and uses a client-server architecture.
• It is lightweight.
Disadvantages
• Little difficult to set up.
• Delivery of packets is not guaranteed by the transport layer.
• Vulnerable to a synchronization attack.
IQAC/ASU/F/2023-24/2.1 Page 29 of 51
Differences between OSI Model and TCP/IP Model
Parameters OSI Model TCP/IP Model
o Transmission media is a communication channel that carries the information from the
sender to the receiver. Data is transmitted through the electromagnetic signals.
o The main functionality of the transmission media is to carry the information in the
form of bits through LAN(Local Area Network).
IQAC/ASU/F/2023-24/2.1 Page 30 of 51
o It is a physical path between transmitter and receiver in data communication.
o In a copper-based network, the bits in the form of electrical signals.
o In a fibre based network, the bits in the form of light pulses.
o In OSI(Open System Interconnection) phase, transmission media supports the Layer
1. Therefore, it is considered to be as a Layer 1 component.
o The electrical signals can be sent through the copper wire, fibre optics, atmosphere,
water, and vacuum.
o The characteristics and quality of data transmission are determined by the
characteristics of medium and signal.
o Transmission media is of two types are wired media and wireless media. In wired
media, medium characteristics are more important whereas, in wireless media, signal
characteristics are more important.
o Different transmission media have different properties such as bandwidth, delay, cost
and ease of installation and maintenance.
o The transmission media is available in the lowest layer of the OSI reference model,
i.e., Physical layer.
o Bandwidth: All the factors are remaining constant, the greater the bandwidth of a
medium, the higher the data transmission rate of a signal.
o Transmission impairment: When the received signal is not identical to the
transmitted one due to the transmission impairment. The quality of the signals will
get destroyed due to transmission impairment.
o Interference: An interference is defined as the process of disrupting a signal when it
travels over a communication medium on the addition of some unwanted signal.
IQAC/ASU/F/2023-24/2.1 Page 31 of 51
o Attenuation: Attenuation means the loss of energy, i.e., the strength of the signal
decreases with increasing the distance which causes the loss of energy.
o Distortion: Distortion occurs when there is a change in the shape of the signal. This
type of distortion is examined from different signals having different frequencies.
Each frequency component has its own propagation speed, so they reach at a
different time which leads to the delay distortion.
o Noise: When data is travelled over a transmission medium, some unwanted signal is
added to it which creates the noise.
IQAC/ASU/F/2023-24/2.1 Page 32 of 51
Guided Media
It is defined as the physical medium through which the signals are transmitted. It is
also known as Bounded media.
Twisted pair:
Twisted pair is a physical media made up of a pair of cables twisted with each other.
A twisted pair cable is cheap as compared to other transmission media. Installation of
the twisted pair cable is easy, and it is a lightweight cable. The frequency range for
twisted pair cable is from 0 to 3.5KHz.
A twisted pair consists of two insulated copper wires arranged in a regular spiral
pattern
IQAC/ASU/F/2023-24/2.1 Page 33 of 51
• Unshielded Twisted Pair (UTP):
UTP consists of two insulated copper wires twisted around one
another. This type of cable has the ability to block interference and
does not depend on a physical shield for this purpose. It is used for
telephonic applications.
Advantages:
⇢ Least expensive
⇢ Easy to install
⇢ High-speed capacity
Disadvantages:
⇢ Susceptible to external interference
⇢ Lower capacity and performance in comparison to STP
⇢ Short distance transmission due to attenuation
Applications:
Used in telephone connections and LAN networks
• Shielded Twisted Pair (STP):
This type of cable consists of a special jacket (a copper braid
covering or a foil shield) to block external interference. It is used in
fast-data-rate Ethernet and in voice and data channels of
telephone lines.
IQAC/ASU/F/2023-24/2.1 Page 34 of 51
Advantages:
⇢ Better performance at a higher data rate in comparison to UTP
⇢ Eliminates crosstalk
⇢ Comparatively faster
Disadvantages:
⇢ Comparatively difficult to install and manufacture
⇢ More expensive
⇢ Bulky
Applications:
The shielded twisted pair type of cable is most frequently used in extremely
cold climates, where the additional layer of outer covering makes it perfect
for withstanding such temperatures or for shielding the interior
components.
(ii) Coaxial Cable –
It has an outer plastic covering containing an insulation layer made of PVC
or Teflon and 2 parallel conductors each having a separate insulated
protection cover. The coaxial cable transmits information in two modes:
Baseband mode(dedicated cable bandwidth) and Broadband mode(cable
bandwidth is split into separate ranges). Cable TVs and analog television
networks widely use Coaxial cables.
IQAC/ASU/F/2023-24/2.1 Page 35 of 51
Advantages:
• High Bandwidth
• Better noise Immunity
• Easy to install and expand
• Inexpensive
Disadvantages:
• Single cable failure can disrupt the entire network
Applications:
Radio frequency signals are sent over coaxial wire. It can be used for cable
television signal distribution, digital audio (S/PDIF), computer network
connections (like Ethernet), and feedlines that connect radio transmitters
and receivers to their antennas.
IQAC/ASU/F/2023-24/2.1 Page 36 of 51
Advantages:
• Increased capacity and bandwidth
• Lightweight
• Less signal attenuation
• Immunity to electromagnetic interference
• Resistance to corrosive materials
Disadvantages:
• Difficult to install and maintain
• High cost
• Fragile
Applications:
• Medical Purpose: Used in several types of medical instruments.
• Defence Purpose: Used in transmission of data in aerospace.
• For Communication: This is largely used in formation of internet
cables.
• Industrial Purpose: Used for lighting purposes and safety
measures in designing the interior and exterior of automobiles.
2. Unguided Media:
It is also referred to as Wireless or Unbounded transmission media. No
physical medium is required for the transmission of electromagnetic
signals.
Features:
• The signal is broadcasted through air
• Less Secure
• Used for larger distances
IQAC/ASU/F/2023-24/2.1 Page 37 of 51
There are 3 types of Signals transmitted through unguided media:
(ii) Microwaves –
It is a line of sight transmission i.e. the sending and receiving antennas need
to be properly aligned with each other. The distance covered by the signal is
directly proportional to the height of the antenna. Frequency Range:1GHz –
300GHz. These are majorly used for mobile phone communication and
television distribution.
Microwave Transmission
IQAC/ASU/F/2023-24/2.1 Page 38 of 51
(iii) Infrared –
Infrared waves are used for very short distance communication. They cannot
penetrate through obstacles. This prevents interference between systems.
Frequency Range:300GHz – 400THz. It is used in TV remotes, wireless
mouse, keyboard, printer, etc.
Requires 4
components from Bundling of very thin
Pair of insulated inner to outer- optical fibers made
copper wires • Solid up of glass or plastic
conductor in a single cable.
Consists of wire
IQAC/ASU/F/2023-24/2.1 Page 39 of 51
Characteristi Twisted pair Optical fiber
cs cable Co-axial cable cable
• Layer of
insulation
• Groundin
g
conductor
• Layer of
exterior
insulation.
Installation
and
Simple and easy Relatively difficult Difficult
Implementatio
n
Electromagnet
ic EMI is reduced to
EMI can take place. EMI is not present.
interference(E shielding.
MI
IQAC/ASU/F/2023-24/2.1 Page 40 of 51
Characteristi Twisted pair Optical fiber
cs cable Co-axial cable cable
Fairly easy
Easy installation. Difficult to install.
Installation installation.
• Unshielde
• Single
d Twisted
mode fiber
Pair (UTP)
• RG59 (SMF)
• Shielded
• RG6 • Multimod
Twisted
e fiber
Pair (STP)
(MMF)
Types
Reasons- absorption,
Reasons-conduction
scattering dispersion Reasons-conduction
and radiation
Power loss and bending
IQAC/ASU/F/2023-24/2.1 Page 41 of 51
What is Switching?
o When a user accesses the internet or another computer network outside their
immediate location, messages are sent through the network of transmission
media. This technique of transferring the information from one computer
network to another network is known as switching.
o Switching in a computer network is achieved by using switches. A switch is a
small hardware device which is used to join multiple computers together with
one local area network (LAN).
o Network switches operate at layer 2 (Data link layer) in the OSI model.
o Switching is transparent to the user and does not require any configuration in
the home network.
o Switches are used to forward the packets based on MAC addresses.
o A Switch is used to transfer the data only to the device that has been
addressed. It verifies the destination address to route the packet
appropriately.
o It is operated in full duplex mode.
o Packet collision is minimum as it directly communicates between source and
destination.
o It does not broadcast the message as it works with limited bandwidth.
IQAC/ASU/F/2023-24/2.1 Page 42 of 51
each other. To overcome this problem, switching technology is implemented
so that packets do not collide with each other.
Advantages of Switching:
Disadvantages of Switching:
Switching techniques
In large networks, there can be multiple paths from sender to receiver. The switching
technique will decide the best route for data transmission.
IQAC/ASU/F/2023-24/2.1 Page 43 of 51
Circuit Switching
o Circuit switching is a switching technique that establishes a dedicated path
between sender and receiver.
o In the Circuit Switching Technique, once the connection is established then
the dedicated path will remain to exist until the connection is terminated.
o Circuit switching in a network operates in a similar way as the telephone
works.
o A complete end-to-end path must exist before the communication takes
place.
o In case of circuit switching technique, when any user wants to send the data,
voice, video, a request signal is sent to the receiver then the receiver sends
back the acknowledgment to ensure the availability of the dedicated path.
After receiving the acknowledgment, dedicated path transfers the data.
o Circuit switching is used in public telephone network. It is used for voice
transmission.
o Fixed data can be transferred at a time in circuit switching technology.
IQAC/ASU/F/2023-24/2.1 Page 44 of 51
Communication through circuit switching has 3 phases:
o Circuit establishment
o Data transfer
o Circuit Disconnect
o Crossbar Switch
o Multistage Switch
Crossbar Switch
IQAC/ASU/F/2023-24/2.1 Page 45 of 51
The Crossbar switch is a switch that has n input lines and n output lines. The crossbar
switch has n2 intersection points known as crosspoints.
Multistage Switch
o Multistage Switch is made by splitting the crossbar switch into the smaller
units and then interconnecting them.
o It reduces the number of crosspoints.
o If one path fails, then there will be an availability of another path.
o Once the dedicated path is established, the only delay occurs in the speed of
data transmission.
o It takes a long time to establish a connection approx 10 seconds during which
no data can be transmitted.
o It is more expensive than other switching techniques as a dedicated path is
required for each connection.
o It is inefficient to use because once the path is established and no data is
transferred, then the capacity of the path is wasted.
o In this case, the connection is dedicated therefore no other data can be
transferred even if the channel is free.
IQAC/ASU/F/2023-24/2.1 Page 46 of 51
Message Switching
o Message Switching is a switching technique in which a message is transferred
as a complete unit and routed through intermediate nodes at which it is
stored and forwarded.
o In Message Switching technique, there is no establishment of a dedicated
path between the sender and receiver.
o The destination address is appended to the message. Message Switching
provides a dynamic routing as the message is routed through the
intermediate nodes based on the information available in the message.
o Message switches are programmed in such a way so that they can provide the
most efficient routes.
o Each and every node stores the entire message and then forward it to the next
node. This type of network is known as store and forward network.
o Message switching treats each message as an independent entity.
o Data channels are shared among the communicating devices that improve the
efficiency of using available bandwidth.
o Traffic congestion can be reduced because the message is temporarily stored
in the nodes.
o Message priority can be used to manage the network.
o The size of the message which is sent over the network can be varied.
Therefore, it supports the data of unlimited size.
IQAC/ASU/F/2023-24/2.1 Page 47 of 51
Disadvantages Of Message Switching
Packet Switching
o The packet switching is a switching technique in which the message is sent in
one go, but it is divided into smaller pieces, and they are sent individually.
o The message splits into smaller pieces known as packets and packets are
given a unique number to identify their order at the receiving end.
o Every packet contains some information in its headers such as source address,
destination address and sequence number.
o Packets will travel across the network, taking the shortest path as possible.
o All the packets are reassembled at the receiving end in correct order.
o If any packet is missing or corrupted, then the message will be sent to resend
the message.
o If the correct order of the packets is reached, then the acknowledgment
message will be sent.
IQAC/ASU/F/2023-24/2.1 Page 48 of 51
Approaches Of Packet Switching:
There are two approaches to Packet Switching:
IQAC/ASU/F/2023-24/2.1 Page 49 of 51
o In the above diagram, A and B are the sender and receiver respectively. 1 and
2 are the nodes.
o Call request and call accept packets are used to establish a connection
between the sender and receiver.
o When a route is established, data will be transferred.
o After transmission of data, an acknowledgment signal is sent by the receiver
that the message has been received.
o If the user wants to terminate the connection, a clear signal is sent for the
termination.
Node takes routing decisions to forward the packets. Node does not take any routing decision.
Congestion cannot occur as all the packets travel in Congestion can occur when the node is busy, and it does not a
different directions. other packets to pass through.
I It is more flexible as all the packets are treated as It is not very flexible.
an independent entity
IQAC/ASU/F/2023-24/2.1 Page 50 of 51
Advantages Of Packet Switching:
IQAC/ASU/F/2023-24/2.1 Page 51 of 51