Computer Net
Computer Net
Message: It is the data or information which needs to be transferred from one device
to another device over a computer network.
Sender: Sender is the device that has the data and needs to send the data to other
device connected to the network.
Receiver: A receiver is the device which is expecting the data from other device on
the network.
Transmission medium: In order to transfer data from one device to another device
we need a transmission media such as wires, cables, radio waves etc.
Protocol: A protocol is a set of rules that are agreed by both sender and receiver,
without a protocol two devices can be connected to each other but they cannot
communicate. In order to establish a reliable communication or data sharing between
two different devices we need set of rules that are called protocol.
Transmission modes/Data Flow
The way in which data is transmitted from one device to another device is
known as transmission mode.
• The transmission mode is also known as the communication mode.
• Each communication channel has a direction associated with it, and
transmission media provide the direction. Therefore, the transmission mode is
also known as a directional mode.
• The transmission mode is defined in the physical layer.
• The Transmission mode is divided into three categories:
1. Simplex mode
2. Half-duplex mode
3. Full-duplex mode
1. Simplex mode
• In Simplex mode, the communication is unidirectional, i.e., the data flow in
one direction.
• A device can only send the data but cannot receive it or it can receive the data
but cannot send the data.
2. Half-duplex mode
• In a Half-duplex channel, direction can be reversed, i.e., the station can
transmit and receive the data as well.
• Messages flow in both the directions, but not at the same time.
3. Full-duplex mode
• In Full duplex mode, the communication is bi-directional, i.e., the data flow in
both the directions.
• Both the stations can send and receive the message simultaneously.
4. Communication medium
A computer network can provide a powerful communication medium
among employees.
1.Email-Virtually every company that has two or more computers now has
email (electronic mail), which employees generally use for a great deal of
daily communication
2.IP telephony or Voice over IP (VoIP)- Telephone calls between
employees may be carried by the computer network instead of by the phone
company when Internet technology is used.
3. Desktop sharing- lets remote workers see and interact with a graphical
computer screen. This makes it easy for two or more people who work far
apart to read and write a shared blackboard or write a report together. When
one worker makes a change to an online document, the others can see the
change immediately, instead of waiting several days for a letter.
4.E-commerce (electronic commerce)- many companies is doing business
electronically, especially with customers and suppliers Airlines, bookstores,
and other retailers have discovered that many customers like the
convenience of shopping from home. Consequently, many companies
provide catalogs of their goods and services online and take orders online.
Manufacturers of automobiles, aircraft, and computers, among others, buy
subsystems from a variety of suppliers and then assemble the parts
Home applications
• Access to internet- Internet access provides home users with connectivity to
remote computers. As with companies, home users can access information,
communicate with other people, and buy products and services with e-
commerce. The main benefit now comes from connecting outside of the home.
• News papers- Many newspapers have gone online and can be personalized.
For example, it is sometimes possible to tell a newspaper that you want
everything about corrupt politicians, big fires, scandals involving celebrities,
and epidemics, but no football, thank you.
• Online digital library- Many professional organizations, such as the ACM
(www.acm.org) and the IEEE Computer Society (www.computer.org), already
have all their journals and conference proceedings online. Electronic book
readers and online libraries may make printed books obsolete.
• Peer to Peer communication-In this form, individuals who form a loose group
can communicate with others in the group, as shown in Fig. 1-3. Peer-to-peer
communication is often used to share music and ideos.Every person can, in
principle, communicate with one or more other people; there is no fixed
division into clients and servers
• Person to person communication-It allows the interactions between a person
to person.
• Gmail-Allows people to communicate with each other by sending emails.
Instant messaging- Allows two people to type messages at each other in real
time.
Twitter- Service that lets people send short text messages called ‘‘tweets’’ to
their circle of friends or other willing audiences
Facebook- It lets people update their personal profiles and shares the updates
with other people who they have declared to be their friends
Wikipedia-Groups of people can work together to create content. A wiki, for
example, is a collaborative Web site that the members of a community edit.
• Home shopping- It is popular and enables users to inspect the online catalogs
of thousands of companies. Some of these catalogs are interactive, showing
products from different viewpoints and in configurations that can be
personalize.
Mobile users
Mobile computers, such as laptop and handheld computers are one of the fastest-
growing segments of the computer industry. Their sales have already overtaken those
of desktop computers. People on the go often want to use their mobile devices to read
and send email, tweet, watch movies, download music, play games, or simply to surf
the Web for information. They want to do all of the things they do at home and in the
office.
1. Connectivity to the Internet- enables many of these mobile uses. Since
having a wired connection is impossible in cars, boats, and airplanes, there is a
lot of interest in wireless networks
2. Wireless hotspot-It allows used to share internet
3. Text messaging- It lets a mobile phone user type a short message that is then
delivered by the cellular network to another mobile subscriber.
4. GPS (Global Positioning System) -Mobile maps and directions are an obvious
candidate as your GPS-enabled phone and car probably have a better idea of
where you are than you do. So, too, are searches for a nearby bookstore or
Chinese restaurant, or a local weather forecast
5. Geo-tagging-It records location, such as annotating photos and videos with the
place at which they were made.
6. M-commerce (mobile-commerce)- Short text messages from the mobile are
used to authorize payments for food in vending machines, movie tickets, and
other small items instead of cash and credit cards.
7. Wearable computers- Smart watches with radios have been part of our mental
space since their appearance in the Dick Tracy comic strip in 1946; now you
can buy them. Other such devices may be implanted, such as pacemakers and
insulin pumps. Some of these can be controlled over a wireless network. This
lets doctors test and reconfigure them more easily
Line Configuration in Computer Networks
A Network is nothing but a connection made through connection links between two or
more devices. Devices can be a computer, printer or any other device that is capable to
send and receive data. There are two ways to connect the devices :
1. Point-to-Point connection
2. Multipoint connection
Point-To-Point Connection
It is also called Multi-drop configuration. In this connection two or more devices share
a single link.
If the links are used simultaneously between many devices, then it is spatially
shared line configuration.
If user takes turns while using the link, then it is time shared (temporal) line
configuration
Network topology
• Topology defines the structure of the network of how all the components are
interconnected to each other.
• Geometric representation of how the computers are connected to each other is
known as topology.
• It can be viewed as
1. Physical topology-It deals with Placement of various nodes.
2. Logical topology-It Deals with the data flow in the network.
Advantages
• Easy to install and connect a new device to the network
• Requires less cable length, so inexpensive
• Failure of a single node does not affect the network
Disadvantages
• Failure in the cable shuts the entire network
• In case of network shutdown, difficult to identify problem
• As the number of nodes increases, speed slows down
• No security.
Ring topology
• In a ring topology, the nodes are connected to each other in the shape of a
closed loop.
• All nodes are connected to each other, so that every node is connected directly
to nodes on either side of it.
• In this, a message travel through the ring in a circular fashion in the same
direction.
• In this, each device acts as a repeater to keep the signal strong as it travels.
• A node receives the data or message from any of its adjacent nodes, then it
checks the destination address.
• If the message address is attached to any of the node then it accepts the data
otherwise it just regenerates the signal and passes it to next node in sequence.
Advantages
• Performance better than bus topology
• Best suited for networks that do not have a hub.
• More reliable, easy to install, can span over larger distances
Disadvantages
• Causes delay in communication
• Unidirectional- if one node fails, the entire network is shut down
• Difficult to add or remove nodes from the network
• No security.
Star topology
• In star topology each device in the network is connected to a central device
called hub.
• Unlike Mesh topology, star topology doesn’t allow direct communication
between devices, a device must have to communicate through hub.
• If o ne device wants to send data to other device, it has to first send the data to
hub and then the hub transmit that data to the designated device.
Advantages
• No data traffic issues as there is a dedicated link between two devices which
means the link is only available for those two devices.
• Mesh topology is reliable and robust as failure of one link doesn’t affect other
links and the communication between other devices on the network.
• Mesh topology is secure because there is a point to point link thus unauthorized
access is not possible.
• Fault detection is easy.
Disadvantages
• Amount of wires required to connected each system is tedious and headache.
• Since each device needs to be connected with other devices, number of I/O
ports required must be huge.
• Scalability issues because a device cannot be connected with large number of
devices with a dedicated point to point link.
Hybrid topology
• A hybrid topology is a type of network topology that uses two or more
differing network topologies.
• These topologies can include a mix of bus topology, mesh topology, ring
topology, star topology, and tree topology.
• A Hybrid topology is a connection between different links and nodes to transfer
the data.
Eg: Hybrid Ring and Star topology
LAN DEVICES
• Wired LAN-Ethernet-HUB,SWITCH
• Wireless LAN-WIFI
3. MAN(Metropolitan Area Network)
• A metropolitan area network is a network that covers a larger geographic area
by interconnecting a different LAN to form a larger network.
• Government agencies use MAN to connect to the citizens and private
industries.
• In MAN, various LANs are connected to each other through a telephone
exchange line.
• The most widely used protocols in MAN are RS-232, Frame Relay, ATM,
ISDN, OC-3, ADSL, etc.
• It has a higher range than Local Area Network(LAN).
MAN Devices
• Switch/hub
• Routers/bridges
Uses of Metropolitan Area Network:
Layering
• Layer-it mean decomposing the problem into more manageable
components(layers)
ISO-OSI REFERENCE MODEL
• OSI stands for Open Systems Interconnection.
• It has been developed by ISO – ‘International Organization of
Standardization‘, in the year 1984.
• OSI is a reference model that describes how information from
a software application in one computer moves through a physical medium to
the software application in another computer.
• It is a 7 layer architecture with each layer having specific functionality to
perform.
• All these 7 layers work collaboratively to transmit the data from one person to
another across the globe.
Example
• Application-animal-aditya@123
• Presentation-pet -sdahjertyi
• Session-sasi’s-sdahjertyi
• Transport-touch-TL sdahjertyi
• Network-not-NL TL sdahjertyi
• Datalink-do-DL NL TL sdahjertyi
• Physical-please-010010010010100010….
Physical layer
o The main functionality of the physical layer is to transmit the individual bits
from one node to another node.
o It is the lowest layer of the OSI model.
o It establishes, maintains and deactivates the physical connection.
o It specifies the mechanical, electrical and procedural network interface
specifications.
Data-link layer
o This layer is responsible for the error-free transfer of data frames.
o It defines the format of the data on the network.
o It provides a reliable and efficient communication between two or more
devices.
o It is mainly responsible for the unique identification of each device that resides
on a local network.
o Packet in Data Link layer is referred as Frame.
o Devices of data link layer: switch & Bridge are Data Link Layer devices.
o Physical Addressing: The Data link layer adds a header to the frame that
contains a destination address. The frame is transmitted to the destination
address mentioned in the header.
o Flow Control: Flow control is the main functionality of the Data-link layer. It
is the technique through which the constant data rate is maintained on both the
sides so that no data get corrupted. It ensures that the transmitting station such
as a server with higher processing speed does not exceed the receiving station,
with lower processing speed.
o Error Control: Error control is achieved by adding a calculated value CRC
(Cyclic Redundancy Check) that is placed to the Data link layer's trailer which
is added to the message frame before it is sent to the physical layer. If any error
seems to occurr, then the receiver sends the acknowledgment for the
retransmission of the corrupted frames.
o Access Control: When two or more devices are connected to the same
communication channel, then the data link layer protocols are used to
determine which device has control over the link at a given time.
Network Layer
o The Transport layer is a Layer 4 ensures that messages are transmitted in the
order in which they are sent and there is no duplication of data.
o The main responsibility of the transport layer is to transfer the data completely.
o It receives the data from the upper layer and converts them into smaller units
known as segments.
o This layer can be termed as an end-to-end layer as it provides a point-to-point
connection between source and destination to deliver the data reliably.
o The transport layer also provides the acknowledgement of the successful data
transmission and re-transmits the data if an error is found.
Session layer
Presentation layer:
o It is concerned with the syntax and semantics of the information exchanged
between two systems.
o This layer is a part of the operating system that converts the data from one
presentation format to another format.
o The Presentation layer is also known as the syntax layer.
Syntax- It refers the structure or format of the message that is being sent.
Application layer
TCP/IP model
o The TCP/IP model was developed prior to the OSI model.
o The TCP/IP model is not exactly similar to the OSI model.
o The TCP/IP model consists of five layers: the application layer, transport layer,
network layer, data link layer and physical layer.
o The first four layers provide physical standards, network interface,
internetworking, and transport functions that correspond to the first four layers
of the OSI model and these four layers are represented in TCP/IP model by a
single layer called the application layer.
o TCP/IP is a hierarchical protocol made up of interactive modules, and each of
them provides specific functionality.
Here, hierarchical means that each upper-layer protocol is supported by two or more
lower-level protocols.
Internet Layer
o An internet layer is the second layer of the TCP/IP model.
o An internet layer is also known as the network layer.
o The main responsibility of the internet layer is to send the packets from any
network, and they arrive at the destination irrespective of the route they take.
Following are the protocols used in this layer are:
2. ARP Protocol
Transport Layer
The transport layer is responsible for the reliability, flow control, and
correction of data which is being sent over the network.
The two protocols used in the transport layer are User Datagram protocol and
Transmission control protocol.
Application Layer
o An application layer is the topmost layer in the TCP/IP model.
o It is responsible for handling high-level protocols, issues of representation.
o This layer allows the user to interact with the application.
o When one application layer protocol wants to communicate with another
application layer, it forwards its data to the transport layer.
o There is an ambiguity occurs in the application layer. Every application cannot
be placed inside the application layer except those who interact with the
communication system. For example: text editor cannot be considered in
application layer while web browser using HTTP protocol to interact with the
network where HTTP protocol is an application layer protocol.
o HTTP: HTTP stands for Hypertext transfer protocol. This protocol allows us
to access the data over the world wide web. It transfers the data in the form of
plain text, audio, video. It is known as a Hypertext transfer protocol as it has
the efficiency to use in a hypertext environment where there are rapid jumps
from one document to another.
o SNMP: SNMP stands for Simple Network Management Protocol. It is a
framework used for managing the devices on the internet by using the TCP/IP
protocol suite.
o SMTP: SMTP stands for Simple mail transfer protocol. The TCP/IP protocol
that supports the e-mail is known as a Simple mail transfer protocol. This
protocol is used to send the data to another e-mail address.
o DNS: DNS stands for Domain Name System. An IP address is used to identify
the connection of a host to the internet uniquely. But, people prefer to use the
names instead of addresses. Therefore, the system that maps the name to the
address is known as Domain Name System.
o TELNET: It is an abbreviation for Terminal Network. It establishes the
connection between the local computer and remote computer in such a way that
the local terminal appears to be a terminal at the remote system.
o FTP: FTP stands for File Transfer Protocol. FTP is a standard internet protocol
used for transmitting the files from one computer to another computer.
Hub
Hub works at physical layer of the OSI model.
It is a networking device used to setup a LAN.
It has multiple ports.
It is used to star topology.
When a packet arrives at one port, it is copied to the other ports so that all
segments of the LAN can sell all packets.
It does broadcasting.
Switch
A switch is a networking hardware that connects devices on a computer
network to establish a local area network.
Switch has memory i.e., used to store the MAC address table.
It is used in layer 2 of the OSI reference model.
It does unicasting,broadcasting,multicasting.
Routers
A router is a networking device that forwards data packet between computer
networks.
A router is connected to at least two networks commonly between two LAN’s
or WAN’s or a LAN and its ISP’s network.
It identifies the devices with IP address.
It is a layer 3 device.
Stores routing table.
Bridge
It is a repeater and having additional functionality of reading MAC address.
It is a layer 2 device.
It is also used for interconnecting two LAN’s on same protocol.
It is having only two ports.
RJ45 Connector
RJ45 is the acronym for Registered Jack 45. RJ45 connector is an 8-pin jack
used by devices to physically connect to Ethernet based local area networks
(LANs).
Ethernet is a technology that defines protocols for establishing a LAN.
The cable used for Ethernet LANs are twisted pair ones and have RJ45
connector pins at both ends.
These pins go into the corresponding socket on devices and connect the device
to the network.
Sky propagation
In sky propagation, higher frequency radio waves radiate upward into the
ionosphere (the layer of atmosphere where the particles exist as ions) where
they are reflected back to the earth.
This type of transmission allows for greater distances with lower output power.
It is sometimes called double hop propagation.
It operates in the frequency range of 30 – 85 MHz. Because it depends on the
earth’s ionosphere, it changes with the weather and time of day.
The signal bounces off of the ionosphere and back to the earth. Ham radios
operate in this range. Other books called this Ionospheric propagation
Line of Sight Propagation
In line-of-sight propagation, very high-frequency signals are transmitted in
straight lines directly from antenna to antenna.
Antennas must be directional, facing each other and either tall enough or close
enough together not to be affected by the curvature the earth.
Line-ofsight propagation is tricky because radio transmission cannot be
completely focussed.
It is sometimes called space waves or tropospheric propagation.
It is limited by the curvature of the earth for ground-based stations (100 km,
from horizon to horizon). Reflected waves can cause promlems. Axamples are:
FM radio, microwave and satellite.
Radio Waves
Electromagnetic waves ranging in frequencies between 3 kHz and 1 GHz are
normally called radio waves. Radio waves are omnidirectional.
When antenna transmits radio waves, they are propagated in all directions. This
means that the sending and receiving antennas do not have to be aligned.
A sending antenna sends waves that can be received by any receiving antenna.
The omnidirectional property has a disadvantage too.
The radio waves transmitted by one antenna are susceptible to interference by
another antenna that may send signals using the same frequency or band.
Radio waves, particularly those of low and medium frequencies, can penetrate
walls.
Applications Of Radio waves
• A Radio wave is useful for multicasting when there is one sender and many
receivers.
• An FM radio, television, cordless phones are examples of a radio wave.
Advantages Of Radio transmission
• Radio transmission is mainly used for wide area networks and mobile cellular
phones.
• Radio waves cover a large area, and they can penetrate the walls.
• Radio transmission provides a higher transmission rate.
Disadvantages Of Radio transmission
It is a disadvantage because we cannot isolate a communication to just inside or
outside a building.
Microwaves
Electromagnetic waves having frequencies between 1 and 300 GHz are called
microwaves.
Microwaves are unidirectional. When an antenna transmits microwave waves,
they can be narrowly focused. This means that the sending and receiving
antennas need to be aligned.
The unidirectional property has an obvious advantage.
A pair of antennas can be aligned without interfering with another pair of
aligned antennas. The following describes some characteristics of microwave
propagation:
Microwave propagation is line-of-sight. Since towers with the mounted
antennas need to be in direct sight of each other.
Characteristics of Microwave:
• Frequency range: The frequency range of terrestrial microwave is from 4-6
GHz to 21-23 GHz.
• Bandwidth: It supports the bandwidth from 1 to 10 Mbps.
• Short distance: It is inexpensive for short distance.
• Long distance: It is expensive as it requires a higher tower for a longer
distance.
• Attenuation: Attenuation means loss of signal. It is affected by environmental
conditions and antenna size.
Infrared Waves
Infrared waves, with frequencies from 300 GHz to 400 THz (wavelengths from
1 mm to 770 mm), can be used for short-range communication. Infrared waves,
having high frequencies, cannot penetrate walls.
This advantageous characteristic prevents interference between one system and
another; a short-range communication system in one room cannot be affected
by another system in the next room.
When we use our infrared remote control, we do notinterfere with the use of
the remote of our neighbors. However, this same characteristic makes infrared
signals useless for long-range communication.
In addition, we cannot use infrared waves outside a building because the sun’s
rays contain infrared waves that can interfere with the communication.
Satellite
Satellites are transponders (units that receive on one frequency and retransmit
on another) that are set in geostationary orbits directly over the equator.
These geostationary orbits are 36, 000 km from the Earths’s surface.
At this point, the gravitational pull of the Earth and the centrifugal force of
Earth’s rotation are balanced and cancel each other out.
Centrifugal force is the rotational force placed on the satellite that wants to
fling it out into the space.
How Does Satellite work?
The satellite accepts the signal that is transmitted from the earth station, and it
amplifies the signal. The amplified signal is retransmitted to another earth
station.
Advantages Of Satellite Microwave Communication:
The coverage area of a satellite microwave is more than the terrestrial
microwave.
The transmission cost of the satellite is independent of the distance from the
centre of the coverage area.
Satellite communication is used in mobile and wireless communication
applications.
It is easy to install.
It is used in a wide variety of applications such as weather forecasting,
radio/TV signal broadcasting, mobile communication, etc.
Disadvantages Of Satellite Microwave Communication:
Satellite designing and development requires more time and higher cost.
The Satellite needs to be monitored and controlled on regular periods so that it
remains in orbit.
The life of the satellite is about 12-15 years. Due to this reason, another launch
of the satellite has to be planned before it becomes non-functional.