CN Notes
CN Notes
Introduction: Network Types, LAN, MAN, WAN, Network Topologies Reference models- The OSI
Reference Model- the TCP/IP Reference Model - A Comparison of the OSI and TCP/IP Reference
Models, OSI Vs TCP/IP, Lack of OSI models success, Internet History.
Physical Layer –Introduction to Guided Media- Twisted-pair cable, Coaxial cable and Fiber optic
cable and unguided media: Wireless-Radio waves, microwaves, infrared.
COMPUTER NETWORK:
Computer network is a set of computers connected together for the purpose of sharing
resources.
PROTOCAL:
A protocol is the set of rules that govern data communication. The term data communication
refers to the exchange of information (a message) between two or more devices. A protocol defines
what is communicated, how it is communicated and when it is communicated.
Computer network uses:
The following are the important uses and benefits of a computer network.
File sharing: Networking of computers helps the network users to share data files. Not only
can you share photos, music files, and documents, you can also use a home network to save
copies of all of your important data on a different computer.
Hardware sharing: Users can share devices such as printers, scanners, CD-ROM drives,
hard drives etc. Without computer networks, device sharing is not possible. It‟s easy to set up
all of the computers to share a single printer. No longer will you need to bounce from one
system or another just to print
User communication: Networks allow users to communicate using e-mail, newsgroups,
and video conferencing etc.
Network gaming: A lot of network games are available, which allow multi-users to play
from different locations.
Internet telephone service: Voice over IP (VoIP) services allows you to make and receive
phone calls through your home network across the Internet. With an Internet connection, it is
entirely possible to make free calls, but only to other people who are using the same free
Internet calls software as you. For example, calls between 2 Skype users are entirely free (all
you need is an internet connection and the Skype app). However, if one person has Skype and
wishes to call a „normal‟ phone number, the call will be charged.
Types of networks:
Computer networks can be classified into different types based on their scale of operation.
PAN: A personal area network (PAN) is a computer network used for data transmission amongst
devices such as computers, telephones, tablets, personal digital assistants, fax machines and
LAN: A local-area network (LAN) is a computer network that spans a relatively small area. Most
often, a LAN is confined to a single room, building or group of buildings; however, one LAN can
be connected to other LANs over any distance via telephone lines and radio waves. Local Area
Networks cover a small physical area, like a home, office, or a small group of buildings, such as a
school or airport.
CAN: Controller Area Network (CAN) are larger than LANs, but smaller than metropolitan area
networks (MANs, explained below), these types of networks are typically seen in universities,
large K-12 school districts or small businesses. They can be spread across several buildings that
WAN: Wide Area Network (WAN) is a computer network that extends over a large geographical area,
although it might be confined within the bounds of a state or country. The Internet is the most basic
example of a WAN, connecting all computers together around the world. Because of a WAN‟s vast
reach,it is typically owned and maintained by multiple administrators or the public. The technology is
high speed and relatively expensive.
Network Topology: The arrangement of the nodes (devices) and links for communication in a network
is called Network Topology.
1) BUS Topology
Bus topology is a network type in which every computer and network device is connected to
single cable through a dropline.A dropline is connection between the main cable and the
device.
It transmits data only in one direction. This topology is used in small networks.
2) RING Topology:
It is called ring topology because it forms a ring as each computer is connected to
anothercomputer, with the last one connected to the first. Exactly two neighbors for each
device.
Data is transferred in a sequential manner that is bit by bit. Data transmitted, has to pass
througheach node of the network, till the destination node.
A number of repeaters(rearranges the signal) are used for Ring topology with large number of
nodes, because if node 1 wants to send some data to the last node in the ring topology with 100
nodes, then the data will have to pass through 99 nodes to reach the 100th node. Hence to prevent
data loss repeaters are used in the network.
The transmission is unidirectional, but it can be made bidirectional by having 2
connectionsbetween each Network Node, it is called Dual Ring Topology.
In Dual Ring Topology, two ring networks are formed, and data flow is in opposite direction
inthem. Also, if one ring fails, the second ring can act as a backup, to keep the network up.
1. Easy to install
2. A signal can travel long distance because there are repeaters in network.
3) STAR Topology
In this type of topology all the computers are connected to a single hub through a cable.
This hub is the central node and all others nodes are connected to the central node.
The devices are not linked to each other directly. If one device wants to send data then it sends
toHub which delivers it to destination device.
Advantages of Star Topology
4)MESH Topology
It is a point-to-point connection to other nodes or devices. All the network nodes are connected
to each other..
There are two techniques to transmit data over the Mesh topology, they are :
1. Routing
2. Flooding
Routing
In routing, the nodes have a routing logic, as per the network requirements. Like routing logic
to direct the data to reach the destination using the shortest distance. Or, routing logic which has
information about the broken links, and it avoid those nodes etc. We can even have routing logic, to re-
configure the failed nodes.
Flooding
In flooding, the same data is transmitted to all the network nodes, hence no routing logic is
required. The network is robust, and the its very unlikely to lose the data. But it leads to unwanted load
over the network.
Types of Mesh Topology
1. Partial Mesh Topology: In this topology some of the systems are connected in the same
fashion as mesh topology but some devices are only connected to two or three devices.
2. Full Mesh Topology: Each and every nodes or devices are connected to each other.
5)TREE Topology
It has a root node and all other nodes are connected to it forming a hierarchy. It is also
called hierarchical topology. It should at least have three levels to the hierarchy.
Ideal if workstations are located in groups.
1. Heavily cabled.
2. Costly.
3. If more nodes are added maintenance is difficult.
4. Central hub fails, network fails.
6) HYBRID Topology:
It is two different types of topologies which is a mixture of two or more topologies.
For example if in an office in one department ring topology is used and in another star topology
is used, connecting these topologies will result in Hybrid Topology (ring topology and star
topology).
Inherits the advantages and disadvantages of the topologies included
1. Complex in design.
2. Costly.
Communication model:
OSI MODEL:
1. Physical layer
2. Data link layer
3. Network layer
4. Transport layer
5. Session layer
6. Presentation layer
7. Application layer
Each layer provides a service to the layer above it in the protocol specification. Each layer
communicates with the same layer’s software or hard ware on other computers. The lower four layers
are concerned with the flow of data from end to end through the network. The upper fourlayers of OSI
model are oriented towards services to applications.
The functionalities of different layers are:
1) Physical layer:
This layer is responsible for transmitting individual bits from one node to next node.
It converts the individual bits into electrical signals(0.s and 1‟s are changed to signals)
It defines the data rates i.e. the number of bits set each second. In other words it defines the
duration of bits, which is how long it lasts
It is also responsible for activation and deactivation of physical connection
The sender and receiver not only must use the same bit rate but also their clocks must be
synchronized.
2) Data link layer
It is responsible for arranging the bits into frames and transmits these frames from onenode
to next node. It creates and detects the frame boundaries.
Error control: it uses a mechanism to prevent the duplication of frames. It detects and
retransmits the lost frames.
Access control: when two or more devices are connected to same link, data link layer protocols
are necessary to determine which device has control over the link at any given time.
Flow control: if the rate at which the data absorbed by receiver is less than the rate produced by
the sender, the data link layer imposes a flow control mechanism to prevent overwhelming the
receiver.
Physical layer: this layer adds header to frame to define the sender and receiver of the frame.
3. Network layer:
This layer delivers the packets from source and destination. It divides the outgoing messages
into packets and assembles the incoming packets into messages for higher levels.
Fragmentation: Fragmentation means dividing the larger packets into small fragments. For this,
network layer divides the large packets into fragments so that they can be easily sent on the
physical medium
Routing: When independent networks or links are combined together to create internet works,
multiple routes are possible from source machine to destination machine. The network layer
protocols determine which route or path is best from source to destination. This function of
network layer is known as routing.
Packetizing The network layer receives the data from the upper layers and creates itsown
packets by encapsulating these packets. The process is known as packetizing.This packetizing in
done by Internet Protocol (IP) that defines its own packet format.
Logical Addressing Large number of different networks can be combined together to from
bigger networks or internetwork. In order to identify each device on internetwork uniquely,
network layer defines an addressing scheme. Such an address distinguishes each device uniquely
and universally.
Internetworking One of the main responsibilities of network layer is to provide internetworking
between different networks. It provides logical connection between different types of network.
It is because of this layer, we can combine various different networks to form a bigger network.
4. Transport layer
It is responsible for process to process delivery of messages. it manages the end to end
delivery of packets
Segmentation: A message is divided into transmittable segments; each segment consists of a
sequence number. These numbers enables the transport layer to reassemble the messages
correctly upon arrival at destination. It identifies the duplication of data units. It checks that
thedata units are error free.
Connection control:
2. Connectionless Transmission
(a) In this type of transmission the receiver does not acknowledge receipt of
a packet.
(b) Sending device assumes that packet arrive just fine.
(c) This approach allows for much faster communication between devices.
(d) The trade-off is that connectionless transmission is less
reliable than connection oriented.
5. Session layer:
Session establishment, maintenance and termination: allows two application processes on
different machines to establish, use and terminate a connection, called a session.
Session support: performs the functions that allow these processes to communicate over
thenetwork, performing security, name recognition, logging and so on.
Dialog control: Dialog control is the function of session layer that determines which
device will communicate first and the amount of data that will be sent.
6. Presentation layer
Presentation Layer is also called Translation layer.
It prepares the data and takes data from application layer and marks it with formatting code such
as .doc, .jpg, .txt, .avi etc. These file extensions make it easy to realize that particular file is
formatted with particular type of application.
Presentation layer takes care that the data is sent in such a way that the receiver will understand
data, presentation layer transforms the data to be ready for the application layer. Languages
(syntax) can be different of the two communicating systems. Under this condition presentation
layer plays a role of translator.
It performs Data compression, Data encryption, Data conversion etc
7. Application layer
It is the topmost layer. Application layer provides platform to send and receive data over the
network. All applications and utilities that communicate with network fall in this layer.
For examples
Transferring of files and distributing the results to the user is also done in this layer. Mail services,
directory services, network resource etc are services provided by application layer.
This layer mainly holds application programs to act upon the received and to be sent data.
Many applications do not require/need the data integrity, which is provided by OSI-
model.
In order to fast set up OSI requires agreement b/w three-parties: users & service provider.
This model is Complex.
This model is not adapted at all to telecommunication applications on computer
TCP/IP is based on a four-layer reference model. All protocols that belong to the TCP/IP protocol suite are
located in the top three layers of this model.
1. TCP/IP Model is a communication protocols suite using which network devices can be
connected to the Internet. On the other hand, the OSI Model is a conceptual framework, using
which the functioning of a network can be described.
8. Lack of OSI model success: One is TCP/IP model (Transmission Control Protocol / Internet
Protocol) and other is OSI model (Open Systems Interconnection). The OSI model was
developed by the International Organization of Standardization (ISO) and the TCP/IP model was
with the US Defense Advanced Research Projects Agency (DARPA).
Development of TCP/IP model and OSI model were started during early 1970s. TCP/IP
model and OSI model were evolved during 1980s.
TCP/IP is the protocol suite on which almost all of the world’s computer networks run. OSI
model couldn’t compete with TCP/IP model, and failed in getting wider acceptance. One of the
main reasons behind the failure of OSI model and wider acceptance of TCP/IP model was
because big global networks like internet started running on TCP/IP protocol suite.
All leading vendors discarded their proprietary networking protocols in favor of TCP/IP protocol
suite. Even now we refer OSI model terminologies while discussing about networking related
topics.
OSI model clearly explained, how different functions of computer networking should work
together. The functions of different layers are clearly defined in OSI model. Universities,
colleges and networking training institutes explained the concepts of computer networking based
on the terminologies from OSI model for many decades. For example, while discussing about IP
addresses, we also call IP addresses as layer 3 addresses. IP addresses are also called as layer 3
addresses, because IP addresses are linked with the function of layer 3 of OSI model.
As a networking student, we need to understand that OSI model is not being implemented as a
software product or as a service these days. But, OSI model explains about the functions of
different components of computer networking in a simpler and easier way. The terminologies
of OSI model are still used to teach and explain computer networking. you may never ever work
on an implementation of OSI model in future, but the legacy of OSI model still continues.
Internet history:
1. The Internet started off with research into what was then known as packet switching as early as
the 1960s. Packet switching was thought of as a better and faster method to transfer data than the
hardware solution to the problem, i.e., the circuitry. The packet switching technology was
essential to the development of ARPANET by the United States Military. ARPANET is
considered the first known group of interconnected computers aka the internet. This system was
used to transfer confidential data between the Military. This data-sharing technology was then
opened to educational institutes in the United States to allow them to access to government’s
supercomputer, first at 56 kbit/s, then at 1.5 Mbit/s, and then at 45 Mbit/s. Com Internet service
providers began to arise in the late 1980s and the internet was fully commercialized in the US by
1995.
2. Internet, also known as the World Wide Web (www), is a global system of interconnected
computer networks that use a protocol called the Internet Protocol Suite (TCP/IP) to link to
billions of devices all around the world. The impact of this has been so enormous that it has been
referred to as the 8th continent of the world. This carries a vast range of information, from the
top-secret military and research files to the most trending and viral video of the week. This
massive storage is shared by everyone, with everyone’s computer contributing to the ever- expanding
treasure trove of knowledge.
3. The advent of the internet is heavily influencing most traditional communication methods such
as newspapers, telephones, television, etc. They are giving rise to new services such as internet
phones and internet tv. The exchange of information has been accelerated exponentially and
consequentially the exchange of information has led to an improvement in the standard of life for
many people across the globe.
4. World Wide Web is a complex web of websites and web pages connected together through
hypertexts. Hypertext is a word or group of words linking to another web page of the same or
different website. When the hypertext is clicked, another web page opens.
The evolution from ARPANET to WWW was possible due to many new achievements by
researchers and computer scientists all over the world. Here are some of those developments –
Year Milestone
ARPANET decommissioned
1990 First web browser Nexus developed
HTML developed
1) Guided media:
It is the transmission media in which signals are confined to a specific path using wire or cable. The types of
Bounded/ Guided are discussed below.
This cable is the most commonly used and is cheaper than others. It is lightweight, cheap, can be installed
easily, and they support many different types of network. Some important points :
Physical description
Two insulated copper wires arranged in regular spiral pattern
Number of pairs are bundled together in a cable
Twisting decreases the crosstalk interference between adjacent pairs in the cable, by using different
twist length for neighboring pairs
Less expensive compared to coaxial cable or optical fiber
Limited in terms of data rate and distance
Cables are twisted to reduce the noise pickup from outside sources and crosstalk on multi pair cables
Requires amplifiers every 5-6 km for analog signals
Requires repeaters every 2-3 km for digital signals
Susceptible to interference and noise
Twisted Pair is of two types
(UTP):
This cable has a metal foil or braided-mesh covering which encases each pair of insulated conductors
Electromagnetic noise penetration is prevented by metal casing
Shielding also eliminates crosstalk
Reduces interference
Better performance at higher data rates
More expensive and difficult to work compared to UTP
It has same attenuation as unshielded twisted pair
STP is used in ring token networks
Higher capacity than unshielded twisted pair
Difficult to manufacture, it is Heavy.
Increases the signaling rate
B) Coaxial Cable:
Physical description
Consists of two conductors with construction that allows it to operate over a wider range of
frequencies compared to twisted pair
Hollow outer cylindrical conductor surrounding a single inner wire conductor
Inner conductor held in place by regularly spaced insulating rings or solid dielectrical material
Outer conductor covered with a jacket or shield
Diameter from 1 to 2.5 cm
Shielded concentric construction reduces interference and crosstalk
Can be used over longer distances and support more stations on a shared line than twisted pair
Base Band:-
This is a 50 ohm (Ω) coaxial cable which is used for digital transmission. It is mostly used for LAN’s.
Baseband transmits a single signal at a time with very high speed. The major drawback is that it
needs amplification after every 1000 feet.
Broad Band:-
This uses analog transmission on standard cable television cabling. It transmits several simultaneous signal
using different frequencies. It covers large area when compared with Baseband Coaxial Cable.
Advantages :
Bandwidth is high
Used in long distance telephone lines.
Transmits digital signals at a very high rate of 10Mbps.
Much higher noise immunity
Data transmission without distortion.
The can span to longer distance at higher speeds as they have better shielding when compared to
twistedpair cable
Disadvantages :
Applications
These are similar to coaxial cable. A thin glass fiber through which light can be transmitted.
Fiber optic cable has bandwidth more than 2 gbps (Gigabytes per Second)
Advantages :
Disadvantages :
It is expensive
Difficult to install.
Maintenance is expensive and difficult.
Do not allow complete routing of light signals.
It refers to a form of unguided media that does not require the establishment of physical links
between two or more devices. Wireless transmission is used when installing cables or using wired
transmission would be impossible, impractical or inconvenient. Wireless signals are spread over in the air
and are received and interpreted by appropriate antennas. When an antenna is attached to electrical circuit of
a computer or wireless device, it converts the digital data into wireless signals and spread all over within its
frequency range. The receptor on the other end receives these signals and converts them back to digital data.
a) RADIO transmission:
Radio frequency is easier to generate and because of its large wavelength it can penetrate through walls
and structures alike. Radio waves can have wavelength from 1 mm – 100,000 km and have frequency ranging
from 3 Hz (Extremely Low Frequency) to 300 GHz (Extremely High Frequency). Radio frequencies are sub -
divided into six bands.
Radio waves at lower frequencies can travel through walls whereas higher RF can travel in straight line and
bounce back. The power of low frequency waves decreases sharply as they cover long distance. High frequency
radio waves have more power.
Lower frequencies such as VLF, LF, MF bands can travel on the ground up to 1000 kilometers, over the earth’s
surface
Radio waves of high frequencies are prone to be absorbed by rain and other obstacles. They use Ionosphere
of earth atmosphere. High frequency radio waves such as HF and VHF bands are spread upwards. When
they reach Ionosphere, they are refracted back to the earth.
APPLICATIONS:
Radio waves have other applications, such as for military and civilian aircraft communication
Disadvantages
Radio waves cannot transmit a lot of data simultaneously because they're low frequency.
In addition, continued exposure to large amounts of radio waves can cause health disorders
like leukemia and cancer.
b) Microwave Transmission
Electromagnetic waves above 100 MHz tend to travel in a straight line and signals over them can be
sent by beaming those waves towards one particular station. Because Microwaves travels in straight lines,
both sender and receiver must be aligned to be strictly in line-of-sight. Microwaves can have wavelength
ranging from 1 mm – 1 meter and frequency ranging from 300 MHz to 300 GHz.
Microwave antennas concentrate the waves making a beam of it. As shown in picture above, multiple
antennas can be aligned to reach farther. Microwaves have higher frequencies and do not penetrate wall like
obstacles.
Microwave transmission depends highly upon the weather conditions and the frequency it is using.
Advantages:
Disadvantages:
Line-of-sight will be disrupted if any obstacle, such as new buildings, are in the way
Signal absorption by the atmosphere. Microwaves suffer from attenuation due to atmospheric
conditions.
Towers are expensive to build
Remote Sensing: Most of you may be familiar with this Application. The most common application of
Microwave is its use in RADAR and SONAR. RADAR is used to illuminate an object by using a transmitter
and receiver to detect its position and velocity. Radiometry is also one of the Remote Sensing Applications.
Heating: You all are familiar with this application. We uses Microwave Oven to bake and cook food. It is
very convenient electronic machine which performs the heating task very cleanly and in a very less time. If
you Want to know How Does a Microwave Works? then you may wonder that is based on the vibration of
electrons present in the Food Particles. That is why Microwave Oven heats the food uniformly without
heating the container.
c) Infrared Transmission
Infrared wave lies in between visible light spectrum and microwaves. It has wavelength of 700 -nm to 1-mm
and frequency ranges from 300-GHz to 430-THz.Infrared wave is used for very short range communication
purposes such as television and it’s remote. Infrared travels in a straight line hence it is directional by nature.
Because of high frequency range, Infrared cannot cross wall-like obstacles. Infrared communication is
therefore a realistic alternative for indoor wireless LANs
Disadvantage
The main disadvantage is that infrared light will not pass through solid objects.
On the plus side, an infrared system in one room of a building will not interfere with similar systems
in nearby rooms.