Introduction to Networking Notes
Introduction to Networking Notes
Lecture Notes
Computer Network
A computer network is a group of devices connected with each other through a transmission media
(link) such as wires, cables etc. for the purpose of sharing data or information and resources. These
devices can be computers, printers, scanners, Fax machines or any other device that is capable to send and
receive data. These devices are often referred as nodes.
Link
A link is a communication pathway that transfer data from one device to another.
For communication to occur, two devices must be connected in some way to the same link at the same
time. This referred to as Data Communication. When we communicate, we are sharing information.
This sharing can be:
Local Communication or
Remote Communication
Local Communication
Local communication usually occurs face to face between individuals.
Remote Communication
Remote communication takes place over distance.
i. Sender
Sender is the device that has the data and needs to send the data to other device connected to the network.
It can be a computer, workstation, telephone handset, video camera and so on.
ii. Receiver
A receiver is the device which is expecting the data from other device on the network. Receiver can be a
computer, workstation, telephone handset, television and so on.
iii. Message
The message is the data or information which needs to be transferred from one device to another device
over a computer network. Popular forms of data or information include text, numbers, pictures, audio, and
video.
v. Protocol
A protocol is a set of rules that govern data communications. Without a protocol, two devices may be
connected but not communicating, just as a person speaking French cannot be understood by a person
who speaks only Swahili. It represents an agreement between the communicating devices.
Simplex Mode
In simplex mode, the communication is unidirectional, as on a one-way street. Only one of the two
devices on a link can transmit; the other can only receive. It is mainly used in the business field as in
sales that do not require any corresponding reply.
Simplex transmission can be thought of as a one-way road in which the traffic travels only in one
direction; no vehicle coming from the opposite direction is allowed to drive through. Example of
simplex devices are:
o Keyboards - can only send the input to the CPU. It cannot receive any feedback from the
CPU.
o Monitors - can only receive the input and display it on the screen. The monitor cannot reply
or send any feedback to the CPU.
o Mouse - can only send the instructions to the CPU. It cannot receive any feedback from the
CPU.
o Loudspeakers - can only receive the input from the music system. The loudspeakers cannot
reply or send any feedback, to the music system.
o Radio - can only introduce input.
o TV- can only introduce input.
The simplex mode can use the entire capacity of the channel to send data in one direction.
Half-Duplex Mode
The sender and receiver can both send and receive the information, but not at the same time. When
one device is sending, the other can only receive, and vice versa. The half-duplex mode is like a
one-lane road with traffic allowed in both directions. When cars are traveling in one direction,
cars going the other way must wait.
In a half-duplex transmission, the entire capacity of a channel is taken over by whichever of the
two devices is transmitting at the time. For example, in walkie-talkies, the speakers at both ends can
speak, but they have to speak one by one. They cannot speak simultaneously.
Full-Duplex Mode
Full-Duplex is the data transmission mode in which the data can flow in both directions at the same time.
It is bi-directional in nature. It is two-way communication in which both the stations can transmit and
receive the data simultaneously. The capacity of the channel is divided between the two directions of
communication. This mode is used when communication in both directions is required simultaneously.
Full duplex transmission mode is like a two-way road in which traffic can flow in both directions at the
same time.
For example, in a telephone conversation, two people communicate, and both are free to speak and listen
at the same time.
Comparison Chart
Basis for Comparison Simplex Half Duplex Full Duplex
Direction of Two-directional, one at Two-directional,
Unidirectional
Communication a time simultaneously
Both devices can Both devices can
Only one device can
Send / Receive transmit the signal, but transmit the signal at the
transmit the signal
one at a time same time
Worst performing mode Best performing mode
Performance Better than Simplex
of transmission of transmission
Example Television, Keyboard Walkie-talkie Telephone
Transmission Media
Transmission media is a physical communication channel (path) that carries the information from the
sender to the receiver. Data is transmitted through the electromagnetic signals. For instance, in a copper
cable network the bits in the form of electrical signals whereas in a fiber network, the bits are available in
the form of light pulses.
This is the most frequently used type of transmission media and it is available in two types:
Characteristics of UTP
Least expensive
Easy to install
High-speed capacity
Susceptible to external interference
Lower capacity and performance in comparison to STP
Short distance transmission due to attenuation
Characteristics of STP
Better performance at a higher data rate in comparison to UTP
Eliminates crosstalk
Comparatively faster
Comparatively difficult to install and manufacture
More expensive
Coaxial Cable
Fiber optic cables are used to transfer large volumes of digital data signals in the form of light up to
distances of hundreds of miles with higher throughput rates than other communication cables.
In unguided media, air is the media through which the electromagnetic signals can flow easily. Signals
are normally broadcast through free space and thus are available to anyone who has a device capable of
receiving them.
A sending antenna send waves that can be received by any receiving antenna. The radio waves
transmitted by one antenna are susceptible to interference by another antenna that may send signal using
the same frequency or band. Radiowaves, particularly with those of low and medium frequencies can
penetrate walls. Radiowaves examples are FM radio and Television.
Radiowaves Transmission media are further Categorized as (i) Terrestrial Transmission and (ii) Satellite
Transmission.
The distance covered by the signal is directly proportional to the height of the antenna. Cellular phones,
satellite networks, and wireless LANs are using Micro Waves.
Characteristics of Microwaves Transmission media
Microwaves are unidirectional (sending and receiving antennas need to be properly aligned).
The signal is unicasted through free space (air).
At low frequency microwaves can penetrate walls and very high-frequency cannot penetrate
walls.
Their electromagnetic spectrum ranges from 1GHz to 300GHz
It is inexpensive for short distance and expensive for long distance as it requires a higher tower
for a longer distance.
It is affected by environmental conditions and antenna size.
2.3 Infrared Transmission media
Electromagnetic waves from frequencies between 300GHz and 400THz are called Infrared which can be
used for very short distance communication purposes such as TV remotes, wireless mouse, keyboard,
printer, data transfer between two cell phones, data transfer between a computer and cell phone resides in
the same closed area etc. Infrared travels in a straight line hence it is directional by nature. Because of
high frequency range, Infrared cannot penetrate walls (obstacles).
Comparison Chart
Basis for
Radiowave Microwave Infrared
Comparison
Omnidirectional in
1 Direction Unidirectional in nature Unidirectional in nature
nature
At low frequency, can
At low frequency, penetrate through walls They cannot penetrate
2 Penetration can penetrate through (obstacles), At high through walls
walls (obstacles) frequency cannot (obstacles)
penetrate
Frequency range: Frequency range: 1GHz Frequency range:
3 Frequency range
3KHz to 1GHz to 300GHz 300GHz to 400THz
4 Security Offers poor security Offers medium security Offers high security
Used in long distance Used in long distance Used in very short
5 Communication
communication communication distance communication
6 Attenuation Attenuation is high Attenuation is variable Attenuation is low
Setup and usage cost Setup and usage cost is
7 Usage Cost Usage cost is very less
is moderate high
It is a 'one-to-one' type of data transmission between the sender and receiver. In other words, we
can say that a single station is sending information to another station on the network. The below-
mentioned diagram best describes unicasting:
The packets sent by PC1 are received by PC6 only through switch, all other PCs in the network
are left. The majority of data traffic on the internet works via the unicast principle. For example,
every time a website is visited by the user, there is a direct connection between the client and
server.
The packets sent by PC1 are received by PC6, PC7, PC8, PC9, PC10 only through switch,
remaining PCs in the network are left.
iii. Broadcasting
Broadcasting is a transmission type in which the data traffic flows from a single source (sender)
to all the devices (receivers) on the network simultaneously i.e., it sends the information to every
device at once.
The same data is received by everyone, making it efficient for wide-spreading the message with
all nodes. The below-mentioned diagram best describes broadcasting.
The packets sent by PC1 are received by all PCs over the network through switch.
2. Client-server Network
In a Client-Server Network, one central computer act as a hub that is known as a server and all other
computers are known as a client. A Client-Server network has a dedicated service providers. All shared
data is stored in the server which is shared with the client computers when the client computers make a
request. The server is responsible for managing all data, such as files, directories, printers, etc.
Sometimes a server is described in terms of the specific service it provides such as e-mail server, print
server or storage server. Some servers however can provide all these services.
Servers
Servers are typically computers with more processing speed, memory and hard disk space than a
regular desktop computer. The network servers run their own operating system that manages the
various network tasks as well as services that run on the network. Depending on the need for network
storage and services, a single network may only use one or a large number of servers.
Clients
Clients are hardware devices (computers) which provide end users with access to data and services
on the server.
Network Devices
Network devices or network hardware are hardware devices that are used to connect computers, printers,
fax machines and other electronic devices to a network. These devices transfer data in a fast, secure and
correct way over same or different networks.
1. RJ45 Connector
RJ45 is the acronym for Registered Jack 45. RJ45 connector is an 8-pin jack used by devices to
physically connect to Ethernet based local area networks (LANs). The cable used for Ethernet LANs are
twisted pair cables and have RJ45 connector pins at both ends. These pins go into the corresponding
socket on devices and connect the device to the network.
2. Ethernet Card
Ethernet card, also known as Network Interface Card (NIC), is a network hardware device used by
computers to connect to Ethernet LAN in order to communicate with other devices on the LAN. The
earliest Ethernet cards were external to the system and needed to be installed manually. In modern
computer systems, it is an internal hardware component. The NIC has RJ45 socket where network cable
is physically plugged in.
3. Hub
Hub is a centralized device that connects multiple devices together through a twisted pair or fiber optic
cables in a single ethernet LAN network. The transferring of data in a computer network can be done in
the form of packets. A hub connects multiple wires coming from different branches. Hubs do not filter
data; they just send data packets to all connected devices.
When Hub receives the data signals from a connected device on any of its port, except that port, it
forwards those signals to all other connected devices from the remaining ports. Hubs do not have the
intelligence to find out best path for data packets which leads to inefficiencies and wastage.
Advantages of Hubs
It can extend total distance of the network.
It does not affect performance of the network
It is cheaper
It can connect different media types
Disadvantages of Hubs
Hubs cannot filter information i.e. it passes packets to all the connected devices.
It does not have mechanisms such as collision detection and retransmission of packets.
It does not operate in full duplex mode
It does not have mechanism to reduce the network traffic.
4. Bridge
A bridge is a network device that connects two or more local area networks (LANs) or two segments of
the same LAN that use the same protocol. The process of gathering networks is called Network
Bridging. Bridges connects two networks that use the same protocol to communicate e.g., Ethernet to
Ethernet, FDDI to FDDI, Token Ring to Token Ring.
Basic functions of the Bridge are the following:
Bridges connects two or more different LANs that has a similar protocol and provides
communication between the devices (nodes) in them.
By joining multiple LANs, bridges help in multiplying the network capacity of a single LAN.
Bridges also connect virtual LANs (VLANs) to make a larger VLAN.
A wireless bridge is used to connect wireless networks or networks having a wireless segment.
5. Switch
Switch is a network device that connects other devices to Ethernet networks through twisted pair or fiber
optic cables. It uses packet switching technique to receive, store and forward data packets on the
network. The switch maintains a list of network addresses of all the devices connected to it. A switch
does what a hub does, but more efficiently. By paying attention to the traffic that comes across it, it learns
which computers are connected to which port.
On receiving a packet, it checks the destination address and transmits the packet to the correct port.
Before forwarding, the packets are checked for collision and other network errors. After that, the data is
transmitted in full duplex mode.
Data transmission speed in switches can be double that of other network devices like hubs used for
networking. This is because switch shares its maximum speed with all the devices connected to it. This
helps in maintaining network speed even during high traffic.
6. Router
A router is a hardware device which is used to connect a LAN with an internet connection. It is used to
receive, analyze and forward the incoming packets to another network based on the information available
in the routing table.
Router can transmit data from one LAN to another if both networks support the same set of protocols. So,
a router is typically connected to at least two LANs and the Internet Service Provider (ISP). It determines
the best path from the available paths for the transmission of the packet.
Routers are also used to divide internal networks into two or more subnetworks and are connected
internally to other routers creating zones that operate independently.
Difference Between Hub, Switch and Router
Sn Hub Switch Router
Router is a routing device
1 Hub is a broadcast device Switch is multicast device i.e. creates route for
transmitting data packets
Router is used to connect
Hub is use to connect device in Switch is used to connect
2 two or more different
the same network devices in the same network
network.
Hub sends data in the form of Switch sends data in the form of Router sends data in the
3
binary bits frames form packets
4 Hub only works in half duplex Switch works in full duplex Router works in full duplex
Only one device can send data Multiple devices can send data Multiple devices can send
5
at a time at the same time data at the same time
Hub does not store any IP
6 Switch store IP Address Router stores IP address
address
Assignment
7. Gateway
8. Modem
9. Repeater
10. Access Point
Network Topologies
The term Network Topology defines the geographic physical or logical arrangement of computer
networking devices. The physical arrangement describes the physical layout of a network while the
logical arrangement describes how the data flows in that network. Both, physical and logical
arrangements are also known as the physical topology and the logical topology.
Topology describes the actual layout of the computer network hardware. Two or more devices connect to
a link; two or more links form a topology.
a) Bus topology
The physical Bus Network Topology is the simplest and most widely used of the network designs. It
consists of one continuous length of cable (trunk) known as the backbone cable that is shared by all
the nodes in the network and both ends of the backbone cable are terminated through the terminating
resistor known as terminators at each end that absorbs the signal when it reaches the end of line.
Without a terminator the electrical signal would reach the end of copper wire and bounce back
causing errors on the network. To connect a computer to the backbone cable, a drop cable is used.
Bus networks usually use coaxial cables that connect to each of the computers through T-shaped
connectors. A terminator specific to the type of cable used placed on each end node of the network.
Since the bus network is nothing more than a set of cables, connectors, and terminators, the signal is
not amplified when traveling through the wiring.
b) Star topology
In local area networks with a star topology, each network node is connected to a central hub, router or
switch with a point-to-point connection. So, it can be said that every node is indirectly connected to
every other node with the help of the hub, router or switch. In Star topology every node (computer
workstation or any other peripheral) is connected to a central node called hub, router or switch.
Each node in the network uses its own separate twisted pair cable to connect to the central hub, router
or switch. The network does not necessarily have to resemble a star to be classified as a star network,
but all of the nodes on the network must be connected to one central device.
c) Ring topology
In ring topology, each host machine (node) connects to exactly two other machines (nodes), creating
a circular network structure. When one host tries to communicate or send message to a host which is
not adjacent to it, the data travels through all intermediate hosts. To connect one more host in the
existing structure, the administrator may need only one more extra cable. The data flows in one
direction, i.e., in a clockwise direction.
Each device incorporates a receiver for the incoming signal and a transmitter to send the data on to
the next device in the ring. When a device sends data, it must travel through each device on the ring
until it reaches its destination. Every node is a critical link. In a ring topology, there is no server
computer present; all nodes work as a server and repeat the signal. The disadvantage of this topology
is that if one node stops working, the entire network is affected or stops working.
d) Mesh topology
The mesh topology has a unique network design in which each node on the network connects to every
other. It develops a point-to-point connection between all the devices of the network. It offers a high
level of redundancy, so even if one network cable fails, still data has an alternative path to reach its
destination.
In this topology, multiple paths exist between end devices. Based on paths, a mesh topology can be
divided into two types; Full Mesh Topology and Partial Mesh Topology.
If each and every nodes or devices are connected to each other in the network, it is a Full mesh
topology. If some of the nodes or devices are connected in the same fashion as mesh topology but
some nodes or devices are only connected to two or three devices in the network, it is a Partial mesh
topology.
e) Tree topology
Tree topologies has a root node and all other nodes are connected to it forming a hierarchy. So, it is
also known as hierarchical topology. Tree topology combines the characteristics of bus topology and
star topology, so it is known as a Star Bus topology. Tree topology is the most common form of
network topology in use presently.
Tree topology has a group of star and bus networks connected to a linear bus backbone cable. The
top-most node in tree topology is known as a root node, and all other nodes are the descendants of
the root node. There is only one path exists between two nodes for the data transmission. Thus, it
forms a parent-child hierarchy.
In modern network implementations, the hybrid topology is mostly used to mix the wired network
with the wireless network.
LANs are used widely as it is easy to design and to troubleshoot. We can use different types of topology
through LAN. LANs are not limited to wire connection, can also work on a wireless connection. The
various devices in LAN are connected to central devices called Hub or Switch using a cable or
wirelessly.
Advantages of LAN
Computer resources like hard-disks, software and printers can be shared easily. This significantly
reduces the cost of hardware purchases.
Data of all network users can be stored on a single hard disk of the server computer.
Transfer of data and messages over networked computers is easy.
Easy to manage data at only one place, which makes data more secure.
Without internet access, it is possible to connect all the workstations in a building with each
other locally.
Disadvantages of LAN
LAN saves cost because of shared computer resources, but the initial cost of installing Local
Area Networks is quite high.
The LAN admin can check personal data files of every LAN user, so it does not offer good
privacy.
Unauthorized users can access critical data of an organization in case LAN admin is not able to
secure centralized data repository.
Local Area Network requires a constant LAN administration as there are issues related to
software setup and hardware failures
Wide Area Networks are usually provided by ISPs which are interconnected to offer communication to
wider areas. A WAN link is usually referring to a network interface that provides connection of the
smaller network towards the bigger WAN network.
Advantages of WAN
Covers a large geographical area so long distance business can connect on the one network.
Shares software and resources with connecting workstations.
Messages can be sent very quickly to anyone else on the network.
Everyone on the network can use the same data. This avoids problems where some users may
have older information than others.
Disadvantages of WAN
Need a good firewall to restrict outsiders from entering and disrupting the network.
Setting up a network can be an expensive, slow and complicated. The bigger the network the
more expensive it is.
Maintaining a network is a full-time job which requires network supervisors and technicians to
be employed.
Security is a real issue when many different people have the ability to use information from other
computers. Protection against hackers and viruses adds more complexity and expense.
A Personal Area Network handles data transmission within devices such as tablets, personal digital
assistants, smartphones, and computers. Single users in most cases basically use this type of network.
People make use of these types of networks commonly in situations where they need to connect wearable
or mobile devices. PANs can be wired, such as USB or FireWire or they can be wireless such as infrared
and Bluetooth.
Advantages of PAN
PAN networks are relatively secure and safe
It offers only short-range solution up to ten meters
They are restricted to a small area
Disadvantages of PAN
It may establish a bad connection to other networks at the same radio bands.
Distance limits.
Advantages of MAN
MANs are extremely efficient and provide fast communication via high-speed carriers, such as
fibre optic cables.
MANs provides a good back bone for large network and provides greater access to WANs.
A MAN usually encompasses several blocks of a city or an entire city.
Disadvantages of MAN
More cable required for a MAN connection from one place to another.
It is difficult to make the system secure from hackers.