What is Computer Network
What is Computer Network
There are two types of NIC: wireless NIC and wired NIC.
o Wireless NIC: All the modern laptops use the wireless NIC. In Wireless NIC, a
connection is made using the antenna that employs the radio wave
technology.
o Wired NIC: Cables use the wired NIC to transfer the data over the medium.
Hub
Hub is a central device that splits the network connection into multiple
devices. When computer requests for information from a computer, it sends
the request to the Hub. Hub distributes this request to all the interconnected
computers.
Switches
Switch is a networking device that groups all the devices over the network to
transfer the data to another device. A switch is better than Hub as it does not
broadcast the message over the network, i.e., it sends the message to the
device for which it belongs to. Therefore, we can say that switch sends the
message directly from source to the destination.
Router
Router is a device that connects the LAN to the internet. The router is mainly
used to connect the distinct networks or connect the internet to multiple
computers.
Modem
Modem connects the computer to the internet over the existing telephone
line. A modem is not integrated with the computer motherboard. A modem is
a separate part on the PC slot found on the motherboard.
Uses Of Computer Network
o Resource sharing: Resource sharing is the sharing of resources such as
programs, printers, and data among the users on the network without the
requirement of the physical location of the resource and user.
o Server-Client model: Computer networking is used in the server-client
model. A server is a central computer used to store the information and
maintained by the system administrator. Clients are the machines used to
access the information stored in the server remotely.
o Communication medium: Computer network behaves as a communication
medium among the users. For example, a company contains more than one
computer has an email system which the employees use for daily
communication.
o E-commerce: Computer network is also important in businesses. We can do
the business over the internet. For example, amazon.com is doing their
business over the internet, i.e., they are doing their business over the
internet.
o Communication speed
o File sharing
o Back up and Roll back is easy
o Software and Hardware sharing
o Security
o Scalability
o Reliability
Communication speed
Network provides us to communicate over the network in a fast and efficient
manner. For example, we can do video conferencing, email messaging, etc.
over the internet. Therefore, the computer network is a great way to share
our knowledge and ideas.
File sharing
File sharing is one of the major advantage of the computer network.
Computer network provides us to share the files with each other.
o Peer-To-Peer network
o Client/Server network
Peer-To-Peer network
o Peer-To-Peer network is a network in which all the computers are linked
together with equal privilege and responsibilities for processing the data.
o Peer-To-Peer network is useful for small environments, usually up to 10
computers.
o Peer-To-Peer network has no dedicated server.
o Special permissions are assigned to each computer for sharing the resources,
but this can lead to a problem if the computer with the resource is down.
ADVERTISEMENT
Wired Personal Area Network: Wired Personal Area Network is created by
using the USB.
Internetwork
o An internetwork is defined as two or more computer network LANs or WAN or
computer network segments are connected using devices, and they are
configured by a local addressing scheme. This process is known
as internetworking.
o An interconnection between public, private, commercial, industrial, or
government computer networks can also be defined as internetworking.
o An internetworking uses the internet protocol.
o The reference model used for internetworking is Open System
Interconnection(OSI).
Types Of Internetwork:
1. Extranet: An extranet is a communication network based on the internet
protocol such as Transmission Control protocol and internet protocol. It
is used for information sharing. The access to the extranet is restricted to
only those users who have login credentials. An extranet is the lowest level
of internetworking. It can be categorized as MAN, WAN or other computer
networks. An extranet cannot have a single LAN, atleast it must have one
connection to the external network.
2. Intranet: An intranet is a private network based on the internet protocol
such as Transmission Control protocol and internet protocol. An
intranet belongs to an organization which is only accessible by
the organization's employee or members. The main aim of the intranet is
to share the information and resources among the organization employees.
An intranet provides the facility to work in groups and for teleconferences.
Intranet advantages:
o Communication: It provides a cheap and easy communication. An employee
of the organization can communicate with another employee through email,
chat.
o Time-saving: Information on the intranet is shared in real time, so it is time-
saving.
o Collaboration: Collaboration is one of the most important advantage of the
intranet. The information is distributed among the employees of the
organization and can only be accessed by the authorized user.
o Platform independency: It is a neutral architecture as the computer can be
connected to another device with different architecture.
o Cost effective: People can see the data and documents by using the
browser and distributes the duplicate copies over the intranet. This leads to a
reduction in the cost.
o The bus topology is designed in such a way that all the stations are
connected through a single cable known as a backbone cable.
o Each node is either connected to the backbone cable by drop cable or directly
connected to the backbone cable.
o When a node wants to send a message over the network, it puts a message
over the network. All the stations available in the network will receive the
message whether it has been addressed or not.
o The bus topology is mainly used in 802.3 (ethernet) and 802.4 standard
networks.
o The configuration of a bus topology is quite simpler as compared to other
topologies.
o The backbone cable is considered as a "single lane" through which the
message is broadcast to all the stations.
o The most common access method of the bus topologies is CSMA (Carrier
Sense Multiple Access).
CSMA: It is a media access control used to control the data flow so that data
integrity is maintained, i.e., the packets do not get lost. There are two
alternative ways of handling the problems that occur when two nodes send
the messages simultaneously.
2) Ring Topology
3) Star Topology
o Star topology is an arrangement of the network in which every node is
connected to the central hub, switch or a central computer.
o The central computer is known as a server, and the peripheral devices
attached to the server are known as clients.
o Coaxial cable or RJ-45 cables are used to connect the computers.
o Hubs or Switches are mainly used as connection devices in a physical star
topology.
o Star topology is the most popular topology in network implementation.
Advantages of Star topology
o Efficient troubleshooting: Troubleshooting is quite efficient in a star
topology as compared to bus topology. In a bus topology, the manager has to
inspect the kilometers of cable. In a star topology, all the stations are
connected to the centralized network. Therefore, the network administrator
has to go to the single station to troubleshoot the problem.
o Network control: Complex network control features can be easily
implemented in the star topology. Any changes made in the star topology are
automatically accommodated.
o Limited failure: As each station is connected to the central hub with its own
cable, therefore failure in one cable will not affect the entire network.
o Familiar technology: Star topology is a familiar technology as its tools are
cost-effective.
o Easily expandable: It is easily expandable as new stations can be added to
the open ports on the hub.
o Cost effective: Star topology networks are cost-effective as it uses
inexpensive coaxial cable.
o High data speeds: It supports a bandwidth of approx 100Mbps. Ethernet
100BaseT is one of the most popular Star topology networks.
4) Tree topology
o Tree topology combines the characteristics of bus topology and star topology.
o A tree topology is a type of structure in which all the computers are
connected with each other in hierarchical fashion.
o The top-most node in tree topology is known as a root node, and all other
nodes are the descendants of the root node.
o There is only one path exists between two nodes for the data transmission.
Thus, it forms a parent-child hierarchy.
5) Mesh topology
ADVERTISEMENT
Reliable: The mesh topology networks are very reliable as if any link
breakdown will not affect the communication between connected computers.
Fast Communication: Communication is very fast between the nodes.
6) Hybrid Topology
o The combination of various different topologies is known as Hybrid
topology.
o A Hybrid topology is a connection between different links and nodes to
transfer the data.
o When two or more different topologies are combined together is termed as
Hybrid topology and if similar topologies are connected with each other will
not result in Hybrid topology. For example, if there exist a ring topology in
one branch of ICICI bank and bus topology in another branch of ICICI bank,
connecting these two topologies will result in Hybrid topology.
o Simplex mode
o Half-duplex mode
o Full-duplex mode
Simplex mode
Half-Duplex mode
Full-duplex mode
o In Full duplex mode, the communication is bi-directional, i.e., the data flow in
both the directions.
o Both the stations can send and receive the message simultaneously.
o Full-duplex mode has two simplex channels. One channel has traffic moving
in one direction, and another channel has traffic flowing in the opposite
direction.
o The Full-duplex mode is the fastest mode of communication between devices.
o The most common example of the full-duplex mode is a telephone network.
When two people are communicating with each other by a telephone line,
both can talk and listen at the same time.
Send/Receive A device can only Both the devices Both the devices can
send the data but can send and send and receive the
cannot receive it receive the data simultaneously.
or it can only data, but one at
receive the data a time.
but cannot send
it.
SDN Framework
The Software Defined Networking framework has three layers as depicted in the
following diagram −
APPLICATION LAYER − SDN applications reside in the Application Layer.
The applications convey their needs for resources and services to the
control layer through APIs.
CONTROL LAYER − The Network Control Software, bundled into the
Network Operating System, lies in this layer. It provides an abstract view
of the underlying network infrastructure. It receives the requirements of
the SDN applications and relays them to the network components.
INFRASTRUCTURE LAYER − Also called the Data Plane Layer, this layer
contains the actual network components. The network devices reside in
this layer that shows their network capabilities through the Control to
data-Plane Interface.
A number of design issues exist for the layer to layer approach of computer
networks. Some of the main design issues are as follows −
Reliability
Network channels and components may be unreliable, resulting in loss of bits
while data transfer. So, an important design issue is to make sure that the
information transferred is not distorted.
Scalability
Networks are continuously evolving. The sizes are continually increasing leading
to congestion. Also, when new technologies are applied to the added
components, it may lead to incompatibility issues. Hence, the design should be
done so that the networks are scalable and can accommodate such additions
and alterations.
Addressing
At a particular time, innumerable messages are being transferred between large
numbers of computers. So, a naming or addressing system should exist so that
each layer can identify the sender and receivers of each message.
Error Control
Unreliable channels introduce a number of errors in the data streams that are
communicated. So, the layers need to agree upon common error detection and
error correction methods so as to protect data packets while they are
transferred.
Flow Control
If the rate at which data is produced by the sender is higher than the rate at
which data is received by the receiver, there are chances of overflowing the
receiver. So, a proper flow control mechanism needs to be implemented.
Resource Allocation
Computer networks provide services in the form of network resources to the
end users. The main design issue is to allocate and deallocate resources to
processes. The allocation/deallocation should occur so that minimal interference
among the hosts occurs and there is optimal usage of the resources.
Statistical Multiplexing
It is not feasible to allocate a dedicated path for each message while it is being
transferred from the source to the destination. So, the data channel needs to be
multiplexed, so as to allocate a fraction of the bandwidth or time to each host.
Routing
There may be multiple paths from the source to the destination. Routing
involves choosing an optimal path among all possible paths, in terms of cost and
time. There are several routing algorithms that are used in network systems.
Security
A major factor of data communication is to defend it against threats like
eavesdropping and surreptitious alteration of messages. So, there should be
adequate mechanisms to prevent unauthorized access to data through
authentication and cryptography.
Difference between Connection-Oriented
and Connectionless Service
Data communication is a telecommunication network to send and
receive data between two or more computers over the same or
different network. There are two ways to establish a connection before
sending data from one device to another, that are Connection-
Oriented and Connectionless Service. Connection-oriented service
involves the creation and termination of the connection for sending the
data between two or more devices. In contrast, connectionless service
does not require establishing any connection and termination process
for transferring the data over a network.
Connection-Oriented Service
A connection-oriented service is a network service that was designed
and developed after the telephone system. A connection-oriented
service is used to create an end to end connection between the sender
and the receiver before transmitting the data over the same or different
networks. In connection-oriented service, packets are transmitted to
the receiver in the same order the sender has sent them. It uses a
handshake method that creates a connection between the user and
sender for transmitting the data over the network. Hence it is also
known as a reliable network service.
Suppose, a sender wants to send data to the receiver. Then, first, the
sender sends a request packet to a receiver in the form of
an SYN packet. After that, the receiver responds to the sender's
request with an (SYN-ACK) signal/packets. That represents the
confirmation is received by the receiver to start the communication
between the sender and the receiver. Now a sender can send the
message or data to the receiver.
Similarly, a receiver can respond or send the data to the sender in the
form of packets. After successfully exchanging or transmitting data, a
sender can terminate the connection by sending a signal to the
receiver. In this way, we can say that it is a reliable network service.
What is a TCP?
TCP (Transmission Control Protocol) is a connection-oriented protocol
that allows communication between two or more computer devices by
establishing connections in the same or different networks. It is the
most important protocol that uses internet protocol to transfer the
data from one end to another. Hence, it is sometimes referred to as
TCP/IP. It ensures that the connection is established and maintained
until the data packet is transferring between the sender and receiver is
complete.
Connectionless Service
A connection is similar to a postal system, in which each letter takes
along different route paths from the source to the destination address.
Connectionless service is used in the network system to transfer data
from one end to another end without creating any connection. So it
does not require establishing a connection before sending the data
from the sender to the receiver. It is not a reliable network service
because it does not guarantee the transfer of data packets to the
receiver, and data packets can be received in any order to the receiver.
Therefore we can say that the data packet does not follow
a defined path. In connectionless service, the transmitted data packet
is not received by the receiver due to network congestion, and the data
may be lost.
For example, a sender can directly send any data to the receiver
without establishing any connection because it is a connectionless
service. Data sent by the sender will be in the packet or data streams
containing the receiver's address. In connectionless service, the data
can be travelled and received in any order. However, it does not
guarantee to transfer of the packets to the right destination.
What is UDP?
The UDP (User Datagram Protocol) is a connectionless protocol that
allows communication between two or more devices without
establishing any connection. In this protocol, a sender sends the data
packets to the receiver that holds the destination address. A UDP does
not ensure to deliver the data packets to the correct destination, and it
does not generate any acknowledgment about the sender's data.
Similarly, it does not acknowledge the receiver about the data. Hence,
it is an unreliable protocol.
Connection-Oriented vs Connectionless Service
5. Data Packets All data packets are Not all data packets are
Path received in the same received in the same
order as those sent by order as those sent by
the sender. the sender.
4. Entertainment Industry
In Entertainment industry also uses computer networks widely.
Some of the Entertainment industries are Video on demand,
Multiperson real-time simulation games, movie/TV programs, etc.
5. Access to Remote Databases
Computer networks allow us to access the Remote Database of the
various applications by the end-users. Some applications are
Reservation for Hotels, Airplane Booking, Home Banking, Automated
Newspaper, Automated Library etc.
6. Home applications
There are many common uses of the computer network are as
home applications. For example, you can consider user-to-user
communication, access to remote instruction, electronic commerce,
and entertainment. Another way is managing bank accounts,
transferring money to some other banks, paying bills electronically.
A computer network arranges a robust connection mechanism
between users.
7. Business applications
The result of business application here is resource sharing. And the
purpose of resource sharing is that without moving to the physical
location of the resource, all the data, plans, and tools can be shared
to any network user. Most of the companies are doing business
electronically with other companies and with other clients worldwide
with the help of a computer network.
8. Mobile users
The rapidly growing sectors in computer applications are mobile
devices like notebook computers and PDAs (personal digital
assistants). Here mobile users/device means portable device. The
computer network is widely used in new-age technology like
smartwatches, wearable devices, tablets, online transactions,
purchasing or selling products online, etc.
9. Social media
Social media is also a great example of a computer network
application. It helps people to share and receive any information
related to political, ethical, and social issues.
Overview of Protocol
In Order to make communication successful between devices , some rules and
procedures should be agreed upon at the sending and receiving ends of the
system. Such rules and procedures are called as Protocols . Different types of
protocols are used for different types of communication.
In above diagrams Protocols are shown as set of rules . Such that
Communication between Sender and Receiver is not possible without Protocol.
Conclusion
OSI Model
o OSI stands for Open System Interconnection is a reference model that
describes how information from a software application in
one computer moves through a physical medium to the software application
in another computer.
o OSI consists of seven layers, and each layer performs a particular network
function.
o OSI model was developed by the International Organization for
Standardization (ISO) in 1984, and it is now considered as an architectural
model for the inter-computer communications.
o OSI model divides the whole task into seven smaller and manageable tasks.
Each layer is assigned a particular task.
o Each layer is self-contained, so that task assigned to each layer can be
performed independently.
1. Physical Layer
2. Data-Link Layer
3. Network Layer
4. Transport Layer
5. Session Layer
6. Presentation Layer
7. Application Layer
1) Physical layer
o The main functionality of the physical layer is to transmit the individual bits
from one node to another node.
o It is the lowest layer of the OSI model.
o It establishes, maintains and deactivates the physical connection.
o It specifies the mechanical, electrical and procedural network interface
specifications.
o Line Configuration: It defines the way how two or more devices can be
connected physically.
o Data Transmission: It defines the transmission mode whether it is simplex,
half-duplex or full-duplex mode between the two devices on the network.
o Topology: It defines the way how network devices are arranged.
o Signals: It determines the type of the signal used for transmitting the
information.
2) Data-Link Layer
o Framing: The data link layer translates the physical's raw bit stream into
packets known as Frames. The Data link layer adds the header and trailer to
the frame. The header which is added to the frame contains the hardware
destination and source address.
o Physical Addressing: The Data link layer adds a header to the frame that
contains a destination address. The frame is transmitted to the destination
address mentioned in the header.
o Flow Control: Flow control is the main functionality of the Data-link layer. It
is the technique through which the constant data rate is maintained on both
the sides so that no data get corrupted. It ensures that the transmitting
station such as a server with higher processing speed does not exceed the
receiving station, with lower processing speed.
o Error Control: Error control is achieved by adding a calculated value CRC
(Cyclic Redundancy Check) that is placed to the Data link layer's trailer which
is added to the message frame before it is sent to the physical layer. If any
error seems to occurr, then the receiver sends the acknowledgment for the
retransmission of the corrupted frames.
o Access Control: When two or more devices are connected to the same
communication channel, then the data link layer protocols are used to
determine which device has control over the link at a given time.
3) Network Layer
4) Transport Layer
o The Transport layer is a Layer 4 ensures that messages are transmitted in the
order in which they are sent and there is no duplication of data.
o The main responsibility of the transport layer is to transfer the data
completely.
o It receives the data from the upper layer and converts them into smaller units
known as segments.
o This layer can be termed as an end-to-end layer as it provides a point-to-
point connection between source and destination to deliver the data reliably.
5) Session Layer
o It is a layer 3 in the OSI model.
o The Session layer is used to establish, maintain and synchronizes the
interaction between communicating devices.
o Dialog control: Session layer acts as a dialog controller that creates a dialog
between two processes or we can say that it allows the communication
between two processes which can be either half-duplex or full-duplex.
o Synchronization: Session layer adds some checkpoints when transmitting
the data in a sequence. If some error occurs in the middle of the transmission
of data, then the transmission will take place again from the checkpoint. This
process is known as Synchronization and recovery.
6) Presentation Layer
o A Presentation layer is mainly concerned with the syntax and
semantics of the information exchanged between the two systems.
o It acts as a data translator for a network.
o This layer is a part of the operating system that converts the data from
one presentation format to another format.
o The Presentation layer is also known as the syntax layer.
7) Application Layer
TCP/IP model
o The TCP/IP model was developed prior to the OSI model.
o The TCP/IP model is not exactly similar to the OSI model.
o The TCP/IP model consists of five layers: the application layer, transport layer,
network layer, data link layer and physical layer.
o The first four layers provide physical standards, network interface,
internetworking, and transport functions that correspond to the first four
layers of the OSI model and these four layers are represented in TCP/IP model
by a single layer called the application layer.
o TCP/IP is a hierarchical protocol made up of interactive modules, and each of
them provides specific functionality.
Internet Layer
ARP Protocol
Backward Skip 10sPlay VideoForward Skip 10s
ICMP Protocol
The two protocols used in the transport layer are User Datagram protocol
and Transmission control protocol.
Application Layer
o An application layer is the topmost layer in the TCP/IP model.
o It is responsible for handling high-level protocols, issues of representation.
o This layer allows the user to interact with the application.
o When one application layer protocol wants to communicate with another
application layer, it forwards its data to the transport layer.
o There is an ambiguity occurs in the application layer. Every application
cannot be placed inside the application layer except those who interact with
the communication system. For example: text editor cannot be considered in
application layer while web browser using HTTP protocol to interact with the
network where HTTP protocol is an application layer protocol.
The OSI model was developed first, and then The protocols were created first and then
protocols were created to fit the network built the TCP/IP model.
architecture’s needs.
The OSI model represents defines It does not mention the services, interfaces,
administration, interfaces and conventions. and protocols.
It describes clearly which layer provides
services.
The protocols of the OSI model are better The TCP/IP model protocols are not hidden,
unseen and can be returned with another and we cannot fit a new protocol stack in it.
appropriate protocol quickly.
The smallest size of the OSI header is 5 bytes. The smallest size of the TCP/IP header is
20 bytes.
Protocols are unknown in the OSI model and In TCP/IP, returning protocol is not difficult.
are returned while the technology modifies.
Tutorials Point is a leading Ed Tech company striving to provide the best
learning material on technical and non-technical subjects.
About us