Chapter 1 - Intro To Computer Networks
Chapter 1 - Intro To Computer Networks
Introduction to
Computer Networks
Communication
Source Transmitter Receiver Destination
link
❑ Source
▪ It is the device that generates the data to be transmitted to the user destination.
▪ This source can be analog or digital.
▪ If the source is analog, the information source is first converted into discrete form for
digital communication.
❑ Transmitter
▪ The data generated by the source is not transmitted directly in the form in which it is
generated.
▪ Different modulation techniques are used for providing efficient transmission of the
signal over the channel.
❑ Communication Link
▪ The transmission of the signal can be done either in guided or unguided form
depending on the requirements of the system.
❑ Receiver
▪ The receiver accepts the signal from the transmission system and converts it in the
suitable form, which can be handled by the user destination.
❑ Destination
▪ The user destination takes the data from the receiver and performs the task for which it
is send from the source.
Ref:
http://www.differencebetween.ne
t/technology/difference-between-
lan-wan-and-man/
© Dr. Ashish V. Vanmali 10
Types of Computer Communication Networks
Parameter LAN MAN WAN
Full Form LAN is an acronym for Local MAN is an acronym for WAN is an acronym for Wide
Area Network. Metropolitan Area Network. Area Network.
Definition and LAN is a network that usually MAN is a comparatively wider The WAN network spans to
Meaning connects a small group of network that covers large an even larger locality. It has
computers in a given regions- like towns, cities, etc.
the capacity to connect
geographical area. various countries together.
For example, the Internet is a
WAN.
Network The LAN is private. Hospitals, The MAN can be both private The WAN can also be both
Ownership homes, schools, offices, etc., or public. Many organizations private or public.
may own it. and telecom operators may
own them.
Maintenance and Very easy to design and Comparatively difficult to Very difficult to design and
Designing maintain. design and maintain. maintain.
Speed LAN offers a very high MAN offers a moderate WAN offers a low Internet
Internet speed. Internet speed. speed.
© Dr. Ashish V. Vanmali Ref: https://byjus.com/gate/difference-between-lan-man-and-wan/ 11
Types of Computer Communication Networks
Parameter LAN MAN WAN
Delay in It faces a very short It faces a moderate It faces a high propagation
Propagation propagation delay. propagation delay. delay.
Faulty Tolerance The LAN exhibits a better The MAN exhibits a lesser The WAN also exhibits a
fault tolerance than the rest fault tolerance. lesser fault tolerance.
of the networks.
Congestion The congestion in the It exhibits a higher network It exhibits a higher congestion
network is very low. congestion. in the network.
Communication LAN typically allows a single MAN allows multiple A huge group of computers
Allotment pair of devices to establish a computers to interact can easily interact with each
communication. But it may simultaneously with each other using the WAN.
also support more other.
computers.
Uses Schools, homes, colleges, It basically covers a city, a It covers an entire country, a
hospitals, offices, etc., can small town, or any given area subcontinent, or an
privately use it. with a bigger radius than the equivalent area.
LAN.
© Dr. Ashish V. Vanmali Ref: https://byjus.com/gate/difference-between-lan-man-and-wan/ 12
Network Topology
▪ The physical structure by which computers are connected represents the topology of the
network.
▪ The following parameters are to be considered in selecting a physical topology of the
network:
• Ease of installation
• Ease of reconfiguration
• Ease of troubleshooting
• The number of units attached in case a media failure
▪ Two ways of connecting relationships are possible:
a) Peer-to-peer, where devices share link equally.
b) Primary-Secondary, where one device controls the traffic and other must transmit
through it.
© Dr. Ashish V. Vanmali 13
Network Topology
❑ Mesh Topology
▪ Mesh type of connectivity has a dedicated point-to-point link between devices.
▪ The term dedicated means that the link carries traffic between the two devices it
connects.
▪ A fully connected mesh therefore has n(n-1)/2 physical channels to link 'n' devices. To
accommodate these, every device on the network must have (n-1) input/output ports.
Advantages:
• Use of dedicated links eliminate the traffic problem.
• It is robust i.e. if one link becomes unusable it does not incapacitate the entire
network.
• Privacy is maintained since the message travels along the dedicated line.
• Point-to-point link makes faults identification and faulty isolation easy.
© Dr. Ashish V. Vanmali 15
Network Topology
❑ Mesh Topology
Disadvantages:
• The amount of cabling required is high.
• The number of I/0 ports required is high.
❑ Bus Topology
▪ A bus topology is multipoint topology.
▪ One long cable acts as a backbone to link all the devices in the network. Nodes are
connected to the bus cable by drop line and taps.
▪ A drop line is a line running between the device and main cable. A tap is the connector
that splices into the main cable.
▪ As the signal becomes weak when it travels further in the backbone, there is a limit on
the number of taps used and the distance between the taps.
❑ Bus Topology
Advantages:
• Simple, reliable and easy to use.
• Ease of installation and cheaper when compared with other topologies.
• Less cabling as each drop line has to reach the nearest point of the backbone.
Disadvantages:
• Can be used only in relatively small network.
• All computers share the same bus. Hence, an increase in number of computers
degrades the performance of the network after a certain limits.
• Reconfiguration is difficult. Adding new nodes is difficult.
• Fault identification is difficult.
• A fault in the main cable stops the complete transmission.
© Dr. Ashish V. Vanmali 18
Network Topology
❑ Ring Topology
▪ In ring topology, each device has a dedicated point-to-point line configuration only with
two devices on either side of it.
▪ A signal is passed along the ring in one direction, from device to device until it reaches
its destination.
▪ When the device receives the signal intended for the other node, it just regenerates the
bits and passes them along.
▪ Ring network passes a token. A token is a short message with the electronic address of
the node permitted to transmit data.
▪ Each network interface card is given a unique electronic address, which is used to
identify the computer on the network.
❑ Star Topology
▪ Star topology network require a central point of connection between media segments.
▪ This central point is referred to as Hub.
▪ Hubs are a special repeater that overcomes the electromechanical limitation of media.
▪ In a Star Topology, cables run from every computer to centrally located hub.
▪ Each computer on a star network communicates with the central hub that resends the
message either to all the computers (in Broadcast type star network) or only to the
destination computer (in a Switched type Star Network).
▪ A hub in a Switched type Star Network is commonly known as Switch.
❑ Tree Topology
▪ It is similar to star topology, but the nodes are connected to the secondary hub that in
turn is connected to central hub.
▪ The central hub is the active hub. The active hub contains the repeater, which
regenerates the bits pattern that it receives, before sending them out.
▪ The secondary hub can be either active or passive.
▪ A passive hub provides a simple physical connection between the attached devices.
▪ The advantages and disadvantages of tree topology are same as that of Star network.
▪ Also, the addition of the secondary hub allows more devices to be connected to the
central hub.
▪ It also allows the network to isolate and prioritize communication from different
computers.
© Dr. Ashish V. Vanmali 23
Network Topology
❑ Selection of Topology
The selection of topology is done based on the following considerations:
▪ Application software and protocols.
▪ Type of data communicating devices.
▪ Geographic scope of the network.
▪ Cost and reliability.
Physical Medium
© Dr. Ashish V. Vanmali 27
Layered Architecture of Data Network
Common Terminology:
▪ Packets: Long strings of bits for a message are broken into shorter strings of bits are called
Packets.
▪ Datagrams: The independent packets of a connectionless organization are called
Datagram.
▪ Session: The setup procedure to establish connection between two users is called Session.
Layer 7 Application
Layer 6 Presentation
Layer 5 Session
Layer 4 Transport
Layer 3 Network
Layer 1 Physical
Layer 7 Application
Layer 6 Presentation
• To transmit bits over a medium to provide
Layer 5 Session mechanical and electrical specifications.
• It consists of computer terminal, modems and
Layer 4 Transport
transmission channel such as twisted pair cable,
Layer 3 Network coaxial cable, fiber etc.
• It forms virtual bit pipe for higher layer.
Layer 2 Data Link Control • It forms incoming bits into appropriate signal, which
Layer 1 Physical can be transmitted on the channel at transmitting
end and at the receiving end it maps signal into
appropriate bits.
© Dr. Ashish V. Vanmali 31
OSI Reference Model
Layer 7 Application
Layer 6 Presentation
Layer 7 Application
Layer 6 Presentation
• To provide reliable end-to-end message delivery
Layer 5 Session and error recovery by determining network.
• It provides following three operations.
Layer 4 Transport a) Packet formation
b) Multiplexing
Layer 3 Network
c) Flow control
Layer 2 Data Link Control
Layer 1 Physical
Layer 7 Application
• It makes various services available for network.
Layer 6 Presentation
• To establish, manage and terminate sessions.
Layer 5 Session • It also deals with access rights and handles
interaction between two end points in setting up
Layer 4 Transport session.
Layer 3 Network
Layer 1 Physical
Layer 1 Physical
Layer 5 Session
Layer 4 Transport
Layer 3 Network
Layer 1 Physical
Application Application
Transport Transport
Network Network
TCP/IP Model
Application
TCP/IP Model
Application
Transport
• TCP also provides simultaneous connections. Several TCP
connections can be established at a host and data can be sent
Network
simultaneously, independent of data on other connections.
• TCP provides full duplex connections, which means that data
Data Link can be send and received on a single connection.
• The UDP protocol is not as robust as TCP and can be used by
applications that do not require the reliability of the TCP at
the Host-to-Host layer.
© Dr. Ashish V. Vanmali 49
TCP/IP Reference Model
Data Link
ARP RARP
Other Link Layer
Data Link Layer PPP Ethernet Token Ring Protocols Network
© Dr. Ashish V. Vanmali 51
TCP/IP Reference Model
IP Datagram Network
Network
Layer NH Data Layer
Bits
© Dr. Ashish V. Vanmali 52
TCP/IP Reference Model
Application Application
Presentation Presentation
Gateway
Session Session
Transport Transport
❑ Repeater
Ref: https://webeduclick.com/wp-
content/uploads/2020/02/Repeater.png
❑ Repeater
Distorted Signal Amplitude Decision Regenerated Signal
Equalizer Making Device
Timing
Circuit
▪ Three basic functions performed by the repeaters are equalization, timing and decision
making.
▪ The equalizer shapes the received pulse so as to compensate for the effect of
amplitude and phase distortions produced by the transmission characteristics of the
channel.
▪ Using the timing circuit, the equalized pulses are integrated by T sec. (pulse duration)
and is compared with predetermined threshold voltage at the end of every Tb sec.
▪ The output of decision-making device will be the regenerated signal.
© Dr. Ashish V. Vanmali 59
Internetworking and Network Devices
❑ Bridges
▪ Bride is an intermediate system used to connect two LANs that uses identical LAN
protocol.
▪ The bridge acts as an address filter, picking packets from on LAN that are intended for
destination on another LAN and passing those packets on.
▪ The bridge does not add anything to packet.
▪ The bridge operates at Data Link Layer of OSI model.
❑ Bridges
❑ Bridges
Functions of Bridge
• Read all frames transmitted on A and accepts those addressed to station B.
• Using Medium Control Protocol for B, retransmits the frames onto B.
• Does the same for B-to-A traffic.
• A bridge can be connected for more than two LANs.
❑ Bridges
❑ Routers
▪ A router intermediate system used to connect two networks that may or may not be
similar.
▪ The router employs an internet protocol present in each router and each host of the
network.
▪ The router operates on Network Layer of OSI model.
❑ Routers
❑ Routers
▪ Repeater or Bridge are simple hardware devices capable of executing specific tasks.
▪ Router are more sophisticated. They have access to network layer addresses and contain
software that enables them to determine which of the several possible path between
those addresses is the best for particular transmission.
▪ A bridge was interconnecting LANs having different media access control sub-layers but
same LLC (Logical Link Control) protocol. If there are differences in those protocols at the
data link and Network Layers of the two networks, routers are required to interconnect
them.
▪ It operates on the Network Layer of OSI model and accommodates all the differences of
the sub-network upto this layer to provide a uniform network service to transport layer
entities in the end system.
❑ Routers
▪ Since the router is operating at the Network layer, its configuration is determined by:
• The type of the network services (Connectionless Network Services (CLNS) or
Connection Oriented Network Service (CONS).
• The type of underlying sub-network service.
❑ Gateways
▪ Gateway potentially operates on all Seven Layers of OSI model.
▪ A gateway is a Protocol Converter.
▪ A gateway can accept a packet formatted for one protocol (e.g.: TCP/IP) and converts it to
a packet formatted for another protocol (e.g.: Apple Talk/SNA) before forwarding it.
❑ Gateways
▪ A gateway is generally a software installed within a router.
▪ A gateway understands the protocols used by each network linked into the router and is
therefore able to transfer from one to another.