What Is Computer Network
What Is Computer Network
Ans: A computer network is a group of computers that share resources and communicate with
each other using common protocols. Computers in a network are connected by physical wires,
optical fibers, or radio-frequency signals.
How do computers communicate in a network?
Local Area Network (LAN): A network that connects computers in a single building or
office. LANs are used for local data transmission.
Wide Area Network (WAN): A network that connects computers over a large geographic
area, such as a city, country, or the world. WANs are used for long-distance communication. The
internet is a common example of a WAN.
Personal Area Network (PAN): A type of computer network
Metropolitan Area Network (MAN): A type of computer network
Network operating systems
Network operating systems (NOS) are special operating systems that support network
activities, file and data sharing, and network security. Examples of NOS include
Windows Server and Cisco.
Connectionless
Service Primitives: Service generally includes set of various primitives. A primitive simply
means Operations. A Service is specified by set of primitives that are available and given to user or other
various entities to access the service. All these primitives simply tell the service to perform some action
or to report on action that is taken by peer entity.
OSI Model
OSI stands for Open System Interconnection is a reference model that describes how
information from a software application in one computer moves through a physical
medium to the software application in another computer.
OSI consists of seven layers, and each layer performs a particular network function.
OSI model was developed by the International Organization for Standardization (ISO) in
1984, and it is now considered as an architectural model for the inter-computer
communications.
OSI model divides the whole task into seven smaller and manageable tasks. Each layer is
assigned a particular task.
Each layer is self-contained, so that task assigned to each layer can be performed
independently.
The OSI Model defines the communication of a computing system into 7 different layers. Its
advantages include:
It divides network communication into 7 layers which makes it easier to understand and
troubleshoot.
It standardizes network communications, as each layer has fixed functions and protocols.
It is easier to improve with advancements as each layer can get updates separately.
The OSI Model has seven layers, which can be complicated and hard to understand for
beginners.
In real-life networking, most systems use a simpler model called the Internet protocol suite
(TCP/IP), so the OSI Model is not always directly applicable.
Each layer in the OSI Model adds its own set of rules and operations, which can make the
process more time-consuming and less efficient.
The OSI Model is more of a theoretical framework, meaning it’s great for understanding
concepts but not always practical for implementation.
Difference Between OSI and TCP/IP Model
OSI Model TCP/IP Model
TCP/IP stands for Transmission Control
OSI stands for Open Systems Interconnection.
Protocol/Internet Protocol.
OSI model has 7 layers. TCP/IP model consists of 4 layers.
Package delivery is not guaranteed in the TCP/IP
Package delivery is guaranteed in OSI Model.
Model.
In the OSI model, only layers 1,2 and 3 are All layers of the TCP/IP model are needed for
necessary for data transmission. data transmission.
Protocols at each layer is independent of the Layers are integrated; some layers are required by
other layer. other layers of TCP/IP model.
OSI Model is a conceptual framework, less Widely used in actual networks like Internet and
used in practical applications. Communication Systems.
internet architecture
The internet architecture is made up of several layers, including the application layer, transport layer,
link layer, and the physical layer. It also includes different types of network architectures, such as client-
server architecture and cloud-based architecture.
The Internet architecture is based on a simple idea: ask all networks to carry a single packet
type, a specific format, the IP protocol. Besides, this IP packet must have an address defined
with sufficient generality to identify each computer and terminals scattered throughout the world.
This architecture is illustrated in Figure.
Types of Transmission Media
Last Updated : 27 Dec, 2024
Transmission media refers to the physical medium through which data is transmitted from one
device to another within a network. These medium can be wired or wireless. The choice of
medium depends on factors like distance, speed, and interference. In this article, we will discuss
the transmission media. In this article we will see types of transmission media in detail.
A transmission medium is a physical path between the transmitter and the receiver i.e. it is the
channel through which data is sent from one device to another. Transmission Media is broadly
classified into the following types:
1. Guided Media
Guided Media is also referred to as Wired or Bounded transmission media. Signals being
transmitted are directed and confined in a narrow pathway by using physical links.
Features:
High Speed
Secure
It consists of 2 separately insulated conductor wires wound about each other. Generally, several
such pairs are bundled together in a protective sheath. They are the most widely used
Transmission Media. Twisted Pair is of two types:
Unshielded Twisted Pair (UTP):UTP consists of two insulated copper wires twisted around one
another. This type of cable has the ability to block interference and does not depend on a
physical shield for this purpose. It is used for telephonic applications.
Least expensive
Easy to install
High-speed capacity
Eliminates crosstalk
Comparatively faster
More expensive
Bulky
Coaxial Cable
Coaxial cable has an outer plastic covering containing an insulation layer made of PVC or Teflon
and 2 parallel conductors each having a separate insulated protection cover. The coaxial cable
transmits information in two modes: Baseband mode(dedicated cable bandwidth) and Broadband
mode(cable bandwidth is split into separate ranges). Cable TVs and analog television networks
widely use Coaxial cables.
Advantages of Coaxial Cable
It is easy to install.
There is a chance of breaking the coaxial cable and attaching a “t-joint” by hackers, this
compromises the security of the data.
Optical Fibre Cable uses the concept total internal reflection of light through a core made up of
glass. The core is surrounded by a less dense glass or plastic covering called the coating. It is
used for the transmission of large volumes of data. The cable can be unidirectional or
bidirectional. The WDM (Wavelength Division Multiplexer) supports two modes, namely
unidirectional and bidirectional mode.
High cost
Industrial Purpose: Used for lighting purposes and safety measures in designing the interior and
exterior of automobiles.
Stripline
Microstripline
2. Unguided Media
Less Secure
Radio Waves
Radio waves are easy to generate and can penetrate through buildings. The sending and receiving
antennas need not be aligned. Frequency Range:3KHz – 1GHz. AM and FM radios and cordless
phones use Radio waves for transmission.
Radiowave
Microwaves
It is a line of sight transmission i.e. the sending and receiving antennas need to be properly
aligned with each other. The distance covered by the signal is directly proportional to the height
of the antenna. Frequency Range:1GHz – 300GHz. Micro waves are majorly used for mobile
phone communication and television distribution.
Infrared
Infrared waves are used for very short distance communication. They cannot penetrate through
obstacles. This prevents interference between systems. Frequency Range:300GHz – 400THz. It
is used in TV remotes, wireless mouse, keyboard, printer, etc.
These are
These are omni-directional in These are unidirectional in
Direction unidirectional in
nature. nature.
nature.
Frequency range: 3 KHz to Frequency range: 1 GHz to 300 Frequency range: 300
Frequency range
1GHz. GHz. GHz to 400 GHz.
Government Some frequencies in the radio- Some frequencies in the There is no need of
License waves require government microwaves require government license to
license to use these. government license to use
Basis Radiowave Microwave Infrared wave
Circuit switching is a network configuration that creates a dedicated path between two
endpoints for the duration of a connection. It's a connection-oriented technology that's used for
voice phone service and early videoconferencing systems.
How it works
Before two nodes can communicate, a dedicated circuit is established between them.
The circuit guarantees the full bandwidth of the channel for the duration of the
communication session.
Once the connection is established, the data is transmitted exclusively over the dedicated
channel.
When the connection ends, the circuit is returned to the network's pool.
Advantages
Disadvantages Expensive to set up and maintain, Susceptible to failure, Not suitable for high
traffic, and Inefficient resource utilization.
History
Packet creation
Data is divided into packets, which are made up of a header and a payload. The header
contains information about the packet, such as its destination address.
Packet transmission
Packets are sent across the network, and can take different paths to their destination.
Packet reception
Packets are received by networking hardware, such as switches and routers.
Packet reassembly
Once all the packets for a file have arrived, they are reassembled into the original file.
Benefits
Efficient routing
Packets can take different paths to their destination, allowing for efficient routing.
Resource allocation
Packet switching allocates resources as needed, using statistical multiplexing and dynamic
bandwidth allocation.
Minimized transmission latency
Packet switching minimizes transmission latency by dividing data into small, variable-length
units.
Challenges
Variable latency: Packet switching can introduce variable latency due to different
routing paths and network conditions. This can be problematic for time-sensitive services
like voice or video communications.
The data link layer in the OSI (Open System Interconnections) Model, is in between the physical
layer and the network layer. This layer converts the raw transmission facility provided by the
physical layer to a reliable and error-free link.
The main functions and the design issues of this layer are
In the OSI Model, each layer uses the services of the layer below it and provides services to the
layer above it. The data link layer uses the services offered by the physical layer.The primary
function of this layer is to provide a well defined service interface to network layer above it.
Framing
The data link layer encapsulates each data packet from the network layer into frames that are
then transmitted.
Frame Header
Payload field that contains the data packet from network layer
Trailer
Error Control
The data link layer ensures error free link for data transmission. The issues it caters to with
respect to error control are −
The data link layer regulates flow control so that a fast sender does not drown a slow receiver.
When the sender sends frames at very high speeds, a slow receiver may not be able to handle it.
There will be frame losses even if the transmission is error-free. The two common approaches
for flow control are −
Framing Methods:
Methods of Framing :
There are basically four methods of framing as given below –
1. Character Count
2. Flag Byte with Character Stuffing
3. Starting and Ending Flags, with Bit Stuffing
4. Encoding Violations
1. Character Count :
This method is rarely used and is generally required to count total number of characters
that are present in frame. This is be done by using field in header. Character count
method ensures data link layer at the receiver or destination about total number of
characters that follow, and about where the frame ends.
There is disadvantage also of using this method i.e., if anyhow character count is
disturbed or distorted by an error occurring during transmission, then destination or
receiver might lose synchronization. The destination or receiver might also be not able to
locate or identify beginning of next frame.
2. Character Stuffing :
Character stuffing is also known as byte stuffing or character-oriented framing and is
same as that of bit stuffing but byte stuffing actually operates on bytes whereas bit
stuffing operates on bits. In byte stuffing, special byte that is basically known as ESC
(Escape Character) that has predefined pattern is generally added to data section of the
data stream or frame when there is message or character that has same pattern as that of
flag byte.
But receiver removes this ESC and keeps data part that causes some problems or issues.
In simple words, we can say that character stuffing is addition of 1 additional byte if there
is presence of ESC or flag in text.
3. Bit Stuffing :
Bit stuffing is also known as bit-oriented framing or bit-oriented approach. In bit stuffing,
extra bits are being added by network protocol designers to data streams. It is generally
insertion or addition of extra bits into transmission unit or message to be transmitted as
simple way to provide and give signaling information and data to receiver and to avoid or
ignore appearance of unintended or unnecessary control sequences.
It is type of protocol management simply performed to break up bit pattern that results in
transmission to go out of synchronization. Bit stuffing is very essential part of
transmission process in network and communication protocol. It is also required in USB.
The Sliding Window Protocol is a key computer networking technique for controlling the flow of
data between two devices. It guarantees that data is sent consistently and effectively, allowing
many packets to be sent before requiring an acknowledgment for the first, maximizing the use of
available bandwidth.
Transmission Delay (Tt) – Time to transmit the packet from the host to the outgoing link. If B
is the Bandwidth of the link and D is the Data Size to transmit
Tt = D/B
Propagation Delay (Tp) – It is the time taken by the first bit transferred by the host onto the
outgoing link to reach the destination. It depends on the distance d and the wave propagation
speed s (depends on the characteristics of the medium).
Tp = d/s
Efficiency – It is defined as the ratio of total useful time to the total cycle time of a packet. For
stop and wait protocol,
Since acknowledgements are very less in size, their transmission delay can be neglected.
Efficiency: The sliding window protocol is an efficient method of transmitting data across a
network because it allows multiple packets to be transmitted at the same time. This increases
the overall throughput of the network.
Reliable: The protocol ensures reliable delivery of data, by requiring the receiver to
acknowledge receipt of each packet before the next packet can be transmitted. This helps to
avoid data loss or corruption during transmission.
Flexibility: The sliding window protocol is a flexible technique that can be used with different
types of network protocols and topologies, including wireless networks, Ethernet, and IP
networks.
Congestion Control: The sliding window protocol can also help control network congestion by
adjusting the size of the window based on the network conditions.
Complexity: The sliding window protocol can be complex to implement and can require a lot of
memory and processing power to operate efficiently.
Delay: The protocol can introduce a delay in the transmission of data, as each packet must be
acknowledged before the next packet can be transmitted. This delay can increase the overall
latency of the network.
Limited Bandwidth Utilization: The sliding window protocol may not be able to utilize the full
available bandwidth of the network, particularly in high-speed networks, due to the overhead of
the protocol.
Window Size Limitations: The maximum size of the sliding window can be limited by the size of
the receiver’s buffer or the available network resources, which can affect the overall
performance of the protocol.