Chapter1 Introduction of computer network
Chapter1 Introduction of computer network
Agenda:
Network as an infrastructure for data communication
Application of Computer Network
Network Architecture
Types of computer Networks
Protocols and Standards
The OSI Reference Model
The TCP/IP Protocol suite
The comparison between OSI and TCP/IP Reference Model
Critiques of OSI and TCP/IP Reference Model
Source: It is the transmitter of data. Examples are Terminal, Computer, Mainframe, etc.
Medium: The communications stream through which the data is being transmitted. Examples are Cabling,
Microwave, Fiber optics, Radio Frequencies (RF), Infrared Wireless, etc.
Receiver: The receiver of the data transmitted. Examples are Printer, Terminal, Mainframe, and Computer.
Protocols are specific to the characteristics of the source, channel and destination of the message. The rules
used to communicate over one medium, like a telephone call, are not necessarily the same as communication
using another medium, such as a letter.
Protocols define the details of how the message is transmitted, and delivered.
1. Source
The source generates the information or data that will be transmitted to the destination. Popular forms of
information include text, numbers, pictures, audio, video, or a combination of any of these.
Information is put together in analog or digital form and broken into a group or segment of data called
packets. Each packet consists of the following:
2. Transmitter
The transmitter a device used to convert the data as per the destination requirement.
For example, a modem converts the analog (telephonic) signal to digital (computer) signals and
alternatively digital to analog.
3. Transmission medium
The transmission medium is the physical path by which data travels from the transmitter to the receiver.
For Example of such channels are copper wires, optical fibers, and wireless communication channels,
etc.
4. Receiver
This receives the signals from the transmission medium and converts it into a form that is suitable to the
destination device.
For example, a modem accepts an analog signal from a transmission channel and transforms it into digital
bit stream which is acceptable by the computer system.
5. Destination
Network is the collection of computer, software and hardware that are all connected to each other to help
their work together and share resources. A network connects computers by means of cabling system (or
wireless media), specialized software and devices that manage data traffic. A network enables users to
share files and resources such as printer as well as send message electrically to each other.
2. Cost.
The network version of most software programs are available at considerable savings when compared
to buying individually licensed copies. Besides monetary savings, sharing a program on a network
allows for easier upgrading of the program. The changes have to be done only once, on the file
server, instead of on all the individual workstations.
4. Resource Sharing.
Sharing resources is another area in which a network exceeds stand-alone computers. Most
students cannot afford enough laser printers, fax machines, modems, scanners, and CD-ROM players for
each computer. However, if these or similar peripherals are added to a network, they can be shared by
many users.
5. Flexible Access.
School networks allow students to access their files from computers throughout the school. Students can
begin an assignment in their classroom, save part of it on a public access area of the network, then go to
6. Security.
Files and programs on a network can be designated as "copy inhibit," so that you do not have to worry
about illegal copying of programs. Also, passwords can be established for specific directories to restrict
access to authorized users.
7. Configuration Management
Sometimes (such as in medical equipment) it is important for a computer's software configuration to be
predictable and stable. If a computer is connected to a network, it's easier to download and install software
from the network onto the computer. This includes automatic software updates, so this can happen without
any human intervention. If the new software hasn't been tested, it could cause unpredictable behavior and
possibly endanger lives.
File Services: This includes file transfer, storage, data migration, file update, synchronization and
achieving.
Printing Services: This service produces shared access to valuable printing devices.
Message Services: This service facilitates email, voice mails and coordinate object oriented applications.
Application Services: This services allows to centralize high profile applications to increase performance
and scalability
Database Services: This involves coordination of distributed data and replication.
Network Architecture:
The following are the three types of Network Architecture:
1. Peer-to-Peer Model
2. Client-server Model
3. Hybrid Model
Workgroup: It is the network environment name where the shared resources and the user accounts
are decentralized on computer networks.
Since individual users make these decisions, there is no central point of control or administration in the
network.
In addition, individual users must back up their own systems to be able to recover from data loss in
case of failures. When a computer acts as a server, the user of that machine may experience reduced
performance as the machine serves the requests made by other systems.
A peer-to-peer network works well with ten or fewer computers. Since peer-to-peer networks do not scale
well, their efficiency decreases rapidly as the number of computers on the network increases.
Also, individual users control access to the resources on their computers, which means security may be
difficult to maintain. The client/server model of networking can be used to overcome the limitations of the
peer-to-peer network.
Advantages:
No need for a network administrator,
Network is fast
Inexpensive to setup & maintain
Each PC can make backup copies of its data to other PCs for security,
Easiest type of network to build,
Peer-to-peer is perfect for both home and office use.
Disadvantages
Less secure.
Doesn‘t scale well to large networks, and administration becomes unmanageable.
Each must be trained to perform administrative tasks.
All machines sharing resources negatively impact the performance.
Domain: There is an existence of Dedicated server with installed any Windows server OS and must run
ADC (Active Directory Controller) service on it. It is the network environment name where the shared
resources and the user accounts are centralized on the server in the computer networks.
The concentration of network resources such as files, printers and applications on servers also makes it
easier to backup and maintain the data. Resource can be located on specialized dedicated servers for
easier access.
Advantages
Computer resources like hard-disks, DVD-ROM, and printers can share local area networks. This significantly
reduces the cost of hardware purchases.
You can use the same software over the network instead of purchasing the licensed software for each client in
the network.
Data of all network users can be stored on a single hard disk of the server computer.
You can easily transfer data and messages over networked computers.
It will be easy to manage data at only one place, which makes data more secure.
Local Area Network offers the facility to share a single internet connection among all the LAN users.
Disadvantages of LAN
LAN will indeed save cost because of shared computer resources, but the initial cost of installing Local Area
Networks is quite high.
The LAN admin can check personal data files of every LAN user, so it does not offer good privacy.
Unauthorized users can access critical data of an organization in case LAN admin is not able to secure
centralized data repository.
Local Area Network requires a constant LAN administration as there are issues related to software setup and
hardware failures.
Fig MAN
Compiled By Er. Jeet Narayan Yadav
Depending upon the type of configuration, this type of network allows you to cover an area from several miles
to tens of miles.
It mostly covers towns and cities in a maximum 50 km range
Mostly used medium is optical fibers, cables
Advantages of MAN
It offers fast communication using high-speed carriers, like fiber optic cables.
It provides excellent support for an extensive size network and greater access to WANs.
The dual bus in MAN network provides support to transmit data in both directions concurrently.
A MAN network mostly includes some areas of a city or an entire city.
Disadvantages of MAN
You need more cable to establish MAN connection from one place to another.
In MAN network it is tough to make the system secure from hackers
Need a very good network administrator.
Network design is complex.
Data access speed is slower than LAN.
WAN is another important computer network that which is spread across a large and geographical separated
area.
Example: internet.
Allow users to have real-time communication capabilities with other users
Provide full-time remote resources connected to local services
Advantages of WAN
WAN helps you to cover a larger geographical area. Therefore business offices situated at longer distances
can easily communicate.
Contains devices like mobile phones, laptop, tablet, computers, gaming consoles, etc.
WLAN connections work using radio transmitters and receivers built into client devices.
Disadvantage of WAN
LAN Vs WAN
LAN WAN
Connects host within a relatively small geographical Hosts may be widely dispersed.
area. • Across Campuses
• Same Building • Acorss Cities/countries/continent
• Same room
• Same Campus
Faster Slower
Cheaper Expensive
Under a control of single ownership. Not under a control of a single person.
Typical Speeds: Typical Speed:
10 Mbps to 10Gbps 64 Kbps to 8 Mbps
- In above diagrams Protocols are shown as set of rules. Such that Communication between Sender
and Receiver is not possible without Protocol.
Standards:
- Common set of rules.
- Standards are the set of rules for data communication that are needed for exchange of information
among devices. It is important to follow Standards which are created by various Standard
Organization like IEEE, ISO, ANSI etc.
1. De Facto Standard:
The meaning of the work” De Facto” is” By Fact” or “By Convention”.
These are the standards that have not been approved by any Organization , but have been adopted as
Standards because of its widespread use. Also, sometimes these standards are often established by
Manufacturers.
For example: Apple and Google are two companies which established their own rules on their products
which are different. Also they use some same standard rules for manufacturing for their products.
2. De Jure Standard:
The meaning of the word “De Jure” is “By Law” or “By Regulations”.
Thus, these are the standards that have been approved by officially recognized body like ANSI, ISO, IEEE
etc. These are the standard which are important to follow if it is required or needed.
For example : All the data communication standard protocols like SMTP , TCP , IP , UDP etc. are
important to follow the same when we needed them.
IEEE performs its standards making and maintaining functions through the IEEE Standards Association
(IEEE-SA).
IEEE standards affect a wide range of industries including: power and energy, biomedical and health care,
Information Technology (IT), telecommunications, transportation, nanotechnology, information assurance,
and many more. In 2005, IEEE had close to 900 active standards, with 500 standards under development.
One of the more notable IEEE standards is the IEEE 802 LAN/MAN group of standards which includes the
IEEE 802.3 Ethernet standard and the IEEE 802.11 Wireless Networking standard.
ANSI also designates specific standards as American National Standards, or ANS, when the Institute
determines that the standards were developed in an environment that is equitable, accessible and responsive
to the requirements of various stakeholders.
The International Telecommunication Union is the specialized agency of the United Nations which is
responsible for information and communication technologies.
ITU coordinates the shared global use of the radio spectrum, promotes international cooperation in assigning
satellite orbits, works to improve telecommunication infrastructure in the developing world and establishes
worldwide standards.
ITU coordinates the shared global use of the radio spectrum, promotes international cooperation in assigning
satellite orbits, works to improve telecommunication infrastructure in the developing world and establishes
worldwide standards.
ITU also organizes worldwide and regional exhibitions and forums, such as ITU TELECOM WORLD,
bringing together representatives of government and the telecommunications and ICT industry to exchange
ideas, knowledge and technology.
The ITU is active in areas including broadband Internet, latest-generation wireless technologies, aeronautical
and maritime navigation, radio astronomy, satellite-based meteorology, convergence in fixed-mobile phone,
Internet access, data, voice, TV broadcasting, and next-generation networks.
ISO (International Organization for Standards)
The International Organization for Standardization widely known as ISO, is an international standard-
setting body composed of representatives from various national standards organizations. Founded on
February 23, 1947, the organization promulgates worldwide proprietary industrial and commercial standards.
It has its headquarters in Geneva, Switzerland.
While ISO defines itself as a non-governmental organization, its ability to set standards that often become
law, either through treaties or national standards, makes it more powerful than most non-governmental
organizations. In practice, ISO acts as a consortium with strong links to governments
ISO, is an international standard-setting body composed of representatives from various national standards
organizations the organization promulgates worldwide proprietary industrial and commercial standards.
ISO's main products are the International Standards. ISO also publishes Technical Reports, Technical
Specifications, Publicly Available Specifications, Technical Corrigenda, and Guides.
Electronic Industries Alliance (EIA) defining serial communication between computers and modems e. g.
was originally drafted by the radio sector as RS-232. Later it was taken over by the EIA as EIA-232. Later
this standard was managed by the TIA and the name was changed to the current TIA-232. Because the EIA
was accredited by ANSI to help develop standards in its areas, the standards are often described as e. g. ANSI
TIA-232 (or formerly as ANSI EIA/TIA-232').
There are two major Unshielded Twisted Pair Cable wiring standards used widely in networking industry.
Telecommunications Industry Association (TIA)/Electronic Industries Alliance (EIA) developed the
TIA/EIA 568A & TIA/EIA 568B standards for Unshielded Twisted Pair wiring.
TIA/EIA 568A and TIA/EIA-568B standards determine the order of the wires placed in the RJ45 connector.
Layer Architecture
Layer architecture simplifies the network design.
It is easy to debug network applications in a layered architecture network.
The network management is easier due to the layered architecture.
Network layers follow a set of rules, called protocol.
The protocol defines the format of the data being exchanged, and the control and timing for
the handshake between layers.
Open Systems Interconnection (OSI) Model
International standard organization (ISO) established a committee in 1977 to develop an
architecture for computer communication.
Open Systems Interconnection (OSI) reference model is the result of this effort.
In 1984, the Open Systems Interconnection (OSI) reference model was approved as an
international standard for communications architecture.
Term “open” denotes the ability to connect any two systems which conform to the reference
model and associated standards.
The OSI model is now considered the primary Architectural model for inter-computer
communications.
The process of breaking up the functions or tasks of networking into layers reduces
complexity.
Each layer provides a service to the layer above it in the protocol specification.
Each layer communicates with the same layer’s software or hardware on other computers.
The lower 4 layers (transport, network, data link and physical —Layers 4, 3, 2, and 1) are
concerned with the flow of data from end to end through the network.
The upper 3 layers of the OSI model (application, presentation and session—Layers 7, 6 and
5) are orientated more toward services to the applications.
Data is encapsulated with the necessary protocol information as it moves down the layers
before network transit.
How Data flows in OSI Model
When two devices communicate with each other information flows from application layer of
one network device (computer) down to physical layer and moving through physical medium
and enter into physical layer of other device and move upward to application layer.
OSI Layer Data present in Form of
Transport layer Segments
Network Layer Data is called packets
Data link Layer Frame
Physical Layer Bits
1. Physical Layer
The physical layer is responsible for movements of individual bits from one hop (node) to the
next.
The physical layer is also concerned with the following:
o Physical characteristics of interfaces and medium.
o Representation of bits (sequence of Os or 1s).
o Define data rate or transmission rate: - the number of bits sent each second.
o Synchronization of bits.
o Line configuration: - Point-to-point or multipoint configuration.
o Define the physical topology that indicates how devices are connected to make a
network.
o Transmission mode (simplex, half-duplex, or full-duplex).
The data link layer is responsible for moving frames from one hop (node) to the next over link,
called node to node delivery.
It has two sub-layers:
o MAC(Media Access Control)
o LLC(Logical Link Control)
The network layer is responsible for the delivery of individual packets or datagram from the
source host (physical device) to the destination host (physical device), called host to host
delivery. Other responsibilities of the network layer include the following:
o Logical addressing (IP): - IP is host to host delivery.
o Routing: - Determine how the packets are routed from source to destination.
o It controls the operation of subnet.
4. Transport Layer
The transport layer is responsible for the delivery of a message from one process to another.
Other responsibilities of the transport layer include the following:
o Service-point addressing (Port addressing) from one process or running program to
another.
16-bits port address (hence 216 = 65536 network service can be provided)
Ports 0-1023 (i.e. total =1024) ports are dedicated that cannot be used by user.
E.g., port 80 - HTTP service
o Segmentation and reassembly: - A message is divided into transmittable segments
(packets), with each segment containing a sequence number. These numbers enable
the transport layer to reassemble the message correctly upon arriving at the destination
and to identify and replace packets that were lost in transmission.
o Connection control: - Connectionless or connection-oriented.
o Flow control at this layer is performed end to end rather than across a single link.
◦ Error control at this layer is performed process-to process rather than across a single
link.
5. Session Layer
The session layer is the network dialog controller. It establishes, maintains, and synchronizes
the interaction among communicating systems. Thus, it establish the timing interval for request
as the PHP session.
Specific responsibilities of the session layer include the following:
o Dialog control: - The session layer allows two systems (or processes) to enter into a
dialog with various communication modes such as half-duplex or full-duplex modes.
o Synchronization: - The session layer allows a process to add checkpoints (or
synchronization points) to a stream of data.
6. Presentation Layer
The presentation layer is concerned with the syntax and semantics of the information
exchanged between two systems. The presentation layer is responsible for translation,
compression, and encryption. Specific responsibilities of the presentation layer include the
following:
o Translation: - Convert the information into bit stream before being transmitted using
different encoding methods. It changes the information into common from
sender/receiver dependent format or vice-versa.
o Encryption: - Message in its original form is converted into another form before
passed out to network at sender side & decryption is done at receiver.
The application layer is responsible for providing services to the user. It enables the user,
whether human or software, to access the network. It provides user interfaces and support for
services such as electronic mail, remote file access and transfer, shared database management,
and other types of distributed information services. Specific services provided by the
application layer include the following:
o Network virtual terminal: - It is a software version of a physical terminal, and it
allows a user to log on to a remote host.
o File transfer, access, and management.
o Mail services: - Provides the basis for e-mail forwarding and storage.
o Directory services: - This application provides distributed database sources and
access for global information about various objects and services.
Devices and Protocols on each Layer:
Layer Protocols Devices
Physical Hub, Repeater, Cables
Data-link LLC,MAC,Ethernet Switch
Network IP,Routing protocol(RIP, OSPF) Router
Transport TCP,UDP
Session
Presentation ASCII,Encryption, Decryption
Application DNS,NFS,TELNET,NFS
TCP/IP model:
The TCP/IP model was developed prior to the OSI model.
The TCP/IP model is not exactly similar to the OSI model.
The TCP/IP model consists of five layers: the application layer, transport layer, network layer,
data link layer and physical layer.
The first four layers provide physical standards, network interface, internetworking, and
transport functions that correspond to the first four layers of the OSI model and these four
layers are represented in TCP/IP model by a single layer called the application layer.
TCP/IP is a hierarchical protocol made up of interactive modules, and each of them provides
specific functionality.
Internet Layer
An internet layer is the second layer of the TCP/IP model.
An internet layer is also known as the network layer.
The main responsibility of the internet layer is to send the packets from any network, and they
arrive at the destination irrespective of the route they take.
Following are the protocols used in this layer are: IP Protocol, ARP Protocol, ICMP
Protocol
IP Protocol: IP protocol is used in this layer, and it is the most significant part of the entire TCP/IP
suite.
ARP Protocol
ICMP Protocol
The transport layer is responsible for the reliability, flow control, and correction of data which
is being sent over the network.
The two protocols used in the transport layer are User Datagram protocol and Transmission
control protocol.
User Datagram Protocol (UDP)
o It provides connectionless service and end-to-end delivery of transmission.
o It is an unreliable protocol as it discovers the errors but not specify the error.
o User Datagram Protocol discovers the error, and ICMP protocol reports the error to
the sender that user datagram has been damaged.
o UDP does not specify which packet is lost. UDP contains only checksum; it does not
contain any ID of a data segment.
Transmission Control Protocol (TCP)
o It provides a full transport layer services to applications.
o It creates a virtual circuit between the sender and receiver, and it is active for the
duration of the transmission.
o TCP is a reliable protocol as it detects the error and retransmits the damaged frames.
Therefore, it ensures all the segments must be received and acknowledged before the
transmission is considered to be completed and a virtual circuit is discarded.
o At the sending end, TCP divides the whole message into smaller units known as
segment, and each segment contains a sequence number which is required for
reordering the frames to form an original message.
o At the receiving end, TCP collects all the segments and reorders them based on
sequence numbers.
Application Layer
3. Bad Implementations
Given the enormous complexity of the model and the protocols, it will come as no surprise
that the initial implementations were huge, unwieldy, and slow. It did not take long for people
to associate "OSI" with "poor quality".
4. Bad Politics
On account of the initial implementation, many people, especially in academia, thought of
TCP/IP as part of UNIX, and UNIX in the 1980s in academia was not unlike parenthood and
apple pie.