Unit 1
Unit 1
Prepared By:
Mr. Shaktisinh S. Parmar (Lecturer)
Department of Computer Engineering, C.U.S.P., Surendranagar
1
LEARNING OUTCOMES (LOs) OF THIS UNIT
Students are able to:
• List the applications of Computer Networks.
• Differentiate various line configurations.
• Design a computer network considering particular topology.
• Categories computer network based on scope and connection
• Explain use of various types of servers.
2
Definition : Network
• Computer Network is a set of computers and
peripherals connected together for the purpose of
sharing resources (data, files, hardware etc.).
3
Advantages and Disadvantages of Network
Advantages: Disadvantages:
• Enhancement of Communication • Computer Network lacks
and Information Availability Independence.
• Convenient Sharing of Resources • Poses Security difficulties
• Easy File/Data Sharing • Lacks Robustness
• Highly Flexible • Presence of Computer Viruses
• Affordable and Malware
• Increases Cost Efficiency • Easy-going Policies and Light
Policing of Computer Networks
• Networking Boosts Storage allow Negative Activities
Capacity
Goal Of Networking:
• Programs do not have to execute on a single system because of resource
and load sharing.
• Reduced costs – Multiple machines can share printers, tape drives, and
other peripherals.
• Provide better Reliability – If one machine fails, another can take its place.
• Provide Scalability (it’s simple to add more processors or computers)
• Provide better Communication (people living apart can work together)
• Information Access (remote information access, access to the internet, e-
mail, video conferencing, and online shopping)
• Entertainment that is interactive (online games, videos, etc.)
• Easily adapt to Social Networking and Internet.
4
Network criteria
• There are mainly three criteria Performance, Reliability and Security
3. Security: Network security issues include protecting data from unauthorized access, damage and
viruses, and implementing policies and procedures for recovery.
Applications of Network
• Financial services
• Marketing and sales
• Electronic messaging
• Manufacturing
• Directory services and infarction services
• Cellular telephone and cable TV services
• Teleconferencing
• Electronic data exchange
5
Categories of network
• Based on Functionality
• Based on Ownership
• Based on Connection
• Based on Scope
6
Categories of network based on Ownership
• Private Network: A private
network is a network in
which various restrictions
are imposed to secure the
network, to restrict
unauthorized access. This
type of network is privately
owned by a single or group
of people for their personal
use. Local Area
Network(LAN) can be used
as a private network.
7
Categories of network based on Connection /
Transmission Media:
• Bound/Guided Media / Wired Network:
Bounded/Guided media can also be referred
to as wired media. This kind of networks
provides a physical link between two nodes
connected in a network. The physical links
are directed towards a particular direction
in the network. Co-axial, twisted pair, optical
fiber cable, etc. can be used in such
networks for connectivity. Local Area
Network(LAN) and Metropolitan Area
Network(MAN) can be used as a
Bound/Guided media network.
8
Categories of network based on Scope
• A computer network can be divided into the following types,
based on the geographical area/ Scope that they cover, they are:
• LAN(Local Area Network)
• MAN(Metropolitan Area Network)
• WAN(Wide Area Network)
18
9
Characteristics o LAN
• It allows users to share devices like printers, application data, resources etc.
• It transfers data at very high speed (up to 1 gbps).
• It exists in limited geographical area (up to few kilometers).
• Multiple access can be allowed in LAN.
Advantages of LAN
• Cost effective technology (Less costly).
• Resource sharing and multiple access.
• High data transfer rate.
• It provides data integrity.
• Any number of users can be accommodated.
• It is flexible and can fit in any site requirement.
• Low error rate.
Disadvantages of LAN
• Equipment and support may be costly
• Some hardware devices may not inter-operate properly
19
20
10
Advantages of MAN
• It provides good backbone for a large network.
• The Dual bus used in MAN helps in transmission of data in both direction.
• It provides large and controllable network.
• It required fewer resources compare to WAN.
• It can be used in sharing of regional resources.
Disadvantages of MAN
• More cables required in connection from one place to another.
• It is difficult to make system secure.
21
22
11
Advantages of WAN
• It covers almost unlimited geographical area.
• It shares software and resources worldwide.
• WAN supports global market and global business.
Disadvantages of WAN
• This technology is very expensive.
• Due to longer distance, error rates are high.
• It is difficult to design and maintain.
• Setting up of a network is very expensive and slow.
23
12
Line Configuration
• Line configuration defines the attachment of communication
devices to a link.
• A link is a physical communication pathway that transfers data from
one device to another device
• For communication to occur, two devices must be connected in
some way to the same link at the same time.
• There are two possible line configurations:-
• Point to Point
• Multipoint/ Multidrop
Point to Point
• A point-to-point connection provides a dedicated link
between two devices.
• The entire capacity of the link is reserved for
transmission between those two devices.
• Most point-to-point connections use an actual length
of wire or cable to connect the two ends, but other
options such as microwave or satellite links are also
possible.
• Point to point network topology is considered to be
one of the easiest and most conventional networks
topologies.
• It is also the simplest to establish and understand.
• Example: Point-to-Point connection between the
remote control and Television for changing the
channels.
13
Advantages of Point-to-Point Connection:
• Provide High Bandwidth
• Provide Good Security
• Provide Good Reliability
Multipoint/ Multidrop
• It is also called Multidrop configuration. In this
connection, two or more devices share a single
link.
• If more than two devices share the link then
the channel is considered as a ‘shared channel’.
With shared capacity, there can be two
possibilities in a Multipoint Line configuration:
14
Advantages of Multipoint Connection:
• It is Cost-Effective.
• It support Scalability.
• It support Flexibility.
In case of Point-to-point communication only two In case of Multi-point communication, there could be
Parties parties get involved, one as the Sender and the other multiple parties, however the role of parties could either
involved as the Receiver. be sender or receiver and some parties may behave like
both.
Point-to-point communication involves only two Due to the involvement of multiple parties, the chances
parties and the chances for information modulation is for information modulation is more and hence Multi-
Reliability very less, hence this type of communication is more point communication is comparatively less reliable as
reliable as compared to Multi-point communication. compared to Point-to-Point communication.
Point-to-point communication is more error prone as Multi-point communication is less error prone as
Error Prone compared to Multi-point communication. compared to Point-to-point communication.
Point-to-point communication is more secure and Multi-point communication is less secure and private as
Security and private as compared to Multi-point communication. compared to Point-to-Point communication.
Privacy
15
Transmission Modes in Computer Networks
• Transmission mode means transferring data between two devices. It is
also known as a communication mode. Buses and networks are designed
to allow communication to occur between individual devices that are
interconnected. There are three types of transmission mode:
Simplex Mode
16
Simplex Mode
Advantages:
• Simplex mode is the easiest and most reliable mode of communication.
• It is the most cost-effective mode, as it only requires one communication
channel.
• There is no need for coordination between the transmitting and receiving
devices, which simplifies the communication process.
Disadvantages:
• Only one-way communication is possible.
• There is no way to verify if the transmitted data has been received
correctly.
• Simplex mode is not suitable for applications that require bidirectional
communication.
Half-Duplex Mode
• In half-duplex mode, each station can both transmit and receive, but not at the
same time. When one device is sending, the other can only receive, and vice versa.
The half-duplex mode is used in cases where there is no need for communication
in both directions at the same time. The entire capacity of the channel can be
utilized for each direction.
• Example: Walkie-talkie in which message is sent one at a time and messages are
sent in both directions.
17
Half-Duplex Mode
Advantages:
• Half-duplex mode allows for bidirectional communication, which is useful in
situations where devices need to send and receive data.
• It is a more efficient mode of communication than simplex mode, as the channel
can be used for both transmission and reception.
• Half-duplex mode is less expensive than full-duplex mode, as it only requires one
communication channel.
Disadvantages:
• Half-duplex mode is less reliable than simplex mode, as both devices cannot
transmit at the same time.
• There is a delay between transmission and reception, which can cause problems
in some applications.
• There is a need for coordination between the transmitting and receiving devices,
which can complicate the communication process.
Full-Duplex Mode
• In full-duplex mode, both stations can transmit and
receive simultaneously. In full duplex mode, signals going
in one direction share the capacity of the link with signals
going in another direction, this sharing can occur in two
ways:
• Either the link must contain two physically separate
transmission paths, one for sending and the other for
receiving.
• Or the capacity is divided between signals traveling in
both directions.
• Full-duplex mode is used when communication in both
directions is required all the time. The capacity of the
channel, however, must be divided between the two
directions.
• Example: Telephone Network in which there is
communication between two persons by a telephone line,
through which both can talk and listen at the same time.
18
Full-Duplex Mode
Advantages:
• Full-duplex mode allows for simultaneous bidirectional communication, which is
ideal for real-time applications such as video conferencing or online gaming.
• It is the most efficient mode of communication, as both devices can transmit and
receive data simultaneously.
• Full-duplex mode provides a high level of reliability and accuracy, as there is no
need for error correction mechanisms.
Disadvantages:
• Full-duplex mode is the most expensive mode, as it requires two communication
channels.
• It is more complex than simplex and half-duplex modes, as it requires two
physically separate transmission paths or a division of channel capacity.
• Full-duplex mode may not be suitable for all applications, as it requires a high
level of bandwidth and may not be necessary for some types of communication.
Topology
• Topology describes the actual layout of network transmission media.
• Physical topology: it refers to the configuration of cables, computers and other
peripherals.
• Logical topology: it is the method used to pass information between workstations.
• Some general types of network topologies are:
BUS topology
STAR topology
RING topology
MESH topology
TREE topology
19
BUS topology :
• It is also known as linear bus topology.
• It is a king of multi point structure.
• In bus topology all device share single communication line or cable. All devices
are connected to this shared cable (backbone cable).
• Bus topology is a passive topology in which the computers on the network are not
responsible for moving the data.
20
STAR topology:
• In it, each device has a dedicated point-to-point link only to a central controller,
usually called a hub shown in figure. The devices are not directly linked to one
another.
• A star topology does not allow direct traffic between devices.
• The controller acts as an exchange: If one device wants to send data to another, it
sends the data to the controller, which then transfer the data to the other connected
device.
• If the central controller fails, the whole network got crashed.
STAR topology
21
RING topology :
• In ring topology, computers are connected on single circle cable shown in figure.
• In it, each device has a dedicated point-to-point connection with only the two devices
on either side of it.
• There are no terminal ends.
• A signal is passed along the ring in one direction, from device to device, until it reaches
its destination.
• Each device in the ring incorporates a repeater.
• When a device receives a signal intended for another device, its repeater regenerates
the bits and passes them along the network.
RING topology
22
DAISY CHAIN topology :
• This topology connects all the hosts in a linear fashion.
• Similar to Ring topology, all hosts are connected to two hosts only, except the end hosts.
• Means, if the end hosts in daisy chain are connected then it represents Ring topology.
• Each link in daisy chain topology represents single point of failure. Every link failure splits the
network into two segments.
• Every intermediate host works as relay for its immediate hosts.
MESH topology :
• In a mesh topology, every device has a dedicated point-to-point link to every other
device.
• Every node in the network has point to point connection with ever other node.
• The term dedicated means that the link carries traffic only between the two devices it
connects.
• Full Mesh Topology: In a full mesh topology, each computer is connected to all the
computers available in the network.
• Partial Mesh Topology: In a partial mesh topology, not all but certain computers are
connected to those computers with which they communicate frequently.
MESH topology
23
Advantages of MESH topology
• Less traffic problems due to dedicated lines.
• Provide security of data through dedicated lines.
• It is robust as if one link becomes unusable, it does not crash the entire system.
TREE topology :
• Tree topology is also known as Hierarchical Topology. It a variation of star topology
(multiple star topology). It is also a combination of bus and star topology (Hybrid
Topology).
• It involves a variety of single nodes connected to a central node.
• This type of topology mainly used in WAN.
• The good example of tree topology is Cable TV.
TREE topology
24
Advantages of TREE topology
• It is easy to add more number of nodes in the network.
• It is easy to manage the network.
• Error detection is easy.
HYBRID topology :
• A network structure whose design contains more than one topology is said to be
hybrid topology. Hybrid topology inherits merits and demerits of all the
incorporating topologies.
• The combining topologies may contain attributes of Star, Ring, Bus, and Daisy-
chain topologies.
• Most WANs are connected by means of Dual-Ring topology and networks
connected to them are mostly Star topology networks. Internet is the best example
of largest Hybrid topology
• The BELOW picture represents an arbitrarily hybrid topology.
HYBRID topology
25
Advantages of HYBRID topology
• If a fault occurs in any part of the network will not affect the functioning of the rest of
the network.
• Size of the network can be easily expanded by adding new devices without affecting the
functionality of the existing network.
• This topology is very flexible as it can be designed according to the requirements of the
organization.
• Hybrid topology is very effective as it can be designed in such a way that the strength of
the network is maximized and weakness of the network is minimized.
Disadvantages of HYBRID topology
• The major drawback of the Hybrid topology is the design of the Hybrid network. It is
very difficult to design the architecture of the Hybrid network.
• he Hubs used in the Hybrid topology are very expensive as these hubs are different
from usual Hubs used in other topologies.
• The infrastructure cost is very high as a hybrid network requires a lot of cabling,
network devices, etc.
Standard Organizations
Data communication standards are of two
categories:
De Facto (By Fact or By Convention):
Standards that have not been approved by
an organized body but have been adopted
as standards are de facto standards.
De Jure (By Law or By Regulations):
Those standards that have been approved
by an officially recognized body.
are de jure standards.
26
ISO : International StandardsOrganizations
27
ANSI-American National Standards Institute
•ANSI was formed in 1998 by five engineering societies and three government
agencies.
•It has the most members of any technical professional organization in the
world, with more than 365000 members in around 150 countries.
•It was formed in1963 by the merger of the Institute of Radio Engineers (IRE,
founded 1992) and the American Institute of Electrical Engineers (AIEE,
founded 1884).
28
ITU —International Telecommunications Union
• ISOC is an international, non-profit organization founded during 1992 to provide direction in Internet
related standards, education and policy.
• It states that its mission is “to assure the open development, evolution and use of the internet for the
benefit of all people throughout the world”.
• Internet Society has offices near Washington D.C., USA and in Geneva, Switzerland.
• It has a membership base comprising more than 80 organizational and more than 28,000 individual
Members APPROX.
• The society will be a non-profit organization and will be operated for international educational,
charitable and scientific purposes among which are:
• To facilitate and support the technical evolution of the Internet as a research and education infrastructure and to stimulate
involvement of the academic, scientific and engineering communities in the evolution of the internet.
• To educate the academic and scientific communities and the public concerning the technology, use and application of internet.
• To promote scientific and educational applications of internet technology for the benefit of educational institutions at all grade
levels, industry and the public at large.
• To provide a forum for exploration of new internet applications and to foster collaboration among organizations in their
operation and use of the internet.
29
IETF — Internet Engineering Task Force
• IETF develops and promotes internet standards, operating closely with the W3C (World Wide Web
Consortium) and ISO/IEC (International Electro Technical Commission) standard bodies and dealing in
particular with standards of the TCP/IP and internet protocol suite.
• The IETF is organized into large number of working groups and informal discussion groups, each dealing
with a specific topic.
• Current areas include Applications, General, Internet, Operations and Management, Real-time
applications and Infrastructure, Routing, Security and Transport.
Protocols
• A protocol is a set of rules that govern data communications. It defines what is communicated, how it is
communicated, and when it is communicated. The key elements of a protocol are syntax, semantics, and
timing.
• Key Elements of Protocol
• Syntax
• Semantics
• Timing
• Syntax: The term syntax refers to the structure or format of the data, meaning the order in which they are
presented. For example, a simple protocol might expect the first 8 bits of data to be the address of the
sender, the second 8 bits to be the address of the receiver, and the rest of the stream to be the message
itself.
• Semantics: The word semantics refers to the meaning of each section of bits. How is a particular pattern
to be interpreted, and what action is to be taken based on that interpretation? For example, does an
address identify the route to be taken or the final destination of the message?
• Timing : The term timing refers to two characteristics: when data should be sent and how fast they can be
sent. For example, if a sender produces data at 100 Mbps but the receiver can process data at only 1 Mbps,
the transmission will overload the receiver and some data will be lost.
30
Levels of a Protocol
• There are mainly three levels of a protocol, they are as follows:
• Hardware Level: In this level, the protocol enables the hardware devices to
connect and communicate with each other for various purposes.
Types of a Protocol
• There are mainly two types of a protocol, they are as follows:
• Standard Protocols
• Proprietary Protocols
31
Standard Protocols
• A standard protocol is a mandated protocol for all devices. It supports
multiple devices and acts as a standard.
• Standard protocols are not vendor-specific i.e. they are not specific to a
particular company or organization. They are developed by a group of
experts from different organizations .
• These protocols are publicly available, and we need not pay for them.
• Some of the examples of Standard Protocols are FTP, DNS, DHCP, SMTP,
TELNET, etc.
Proprietary Protocols
• Proprietary protocols are developed by an individual organization for
their specific devices. We have to take permission from the organization if
we want to use their protocols.
• It is not a standard protocol and it supports only specific devices. We may
have to pay for these protocols.
• Some of the examples of Proprietary Protocols are IMessage, Apple Talk,
etc.
32
Functions of protocols
• Data Sequencing
• Data Flow
• Data Routing
• Encapsulation
• Segmentation & Reassembly
• Connection Control
• Multiplexing
• Ordered Delivery
• Transmission Services
• Addressing.
• Flow Control
• Error Control
33
Advantages of dedicated server
• Its response time is very fast.
• It can't be used as node.
• It is more reliable, more efficient and more secure.
Disadvantages of dedicated server
• All data is stored on a single server, if the server fails all data becomes unavailable.
• Installation and configuration is difficult.
Non-Dedicated server
• Non-dedicated servers do double duty by requesting and providing services.
• It is the microcomputer, which is made as a server and can act as an individual
workstation even while it controls the network.
• Its response time is slow.
Different Servers
File server
Print Server
Mail server
Proxy server
Web server
Database server
Application server
34
File server
• File server is a computer responsible for the central storage and management of
data files so that other computers on the same network can access the files..
• It allows users to share information over a network without having to physically
transfer files by floppy diskette or some other external storage device.
• Any user on the network can store files on the network.
File server
• In file server FTP (File Transfer Protocol) is installed. FTP is making possible to
move one or more files securely between computers.
• File server is generally not performing any computational tasks, and does not run
programs on behalf of its clients.
• It is designed primarily to enable the storage and retrieval of data while the
computation is carried out by the workstations.
Print server
35
• A print server, or printer server, is a device that connects printers to client
computers over a network.
• A print server is a computer that manages one or more printers.
• It can accept print jobs from the computers and send the jobs to the appropriate
printers.
• Print servers allow printers to be shared by other users on the network.
• There is no restriction regarding the number of client systems in a network while
using print server.
• It is easy to add new clients as well as new printers in a network.
• Main disadvantage is most of features of multi functions printers are not
supported.
Mail server
• Mail Server is usually a storage area where E-mail is stored for local users.
• Mail server moves and stores mails over corporate network and across the
internet
• Specially designed software are installed in server to manage exchange of mails.
Mail server
36
Proxy server
• A proxy server is a server which services the requests of its clients by forwarding
requests to other servers. It may be a computer system or an application program.
• It sits between a client application (like web browser) and a real server.
• A client connects to the proxy server, requesting some service such as file
connection, web page or other resource available from a different server.
• A proxy server provides the resource by connecting to the specified server and
requesting the service on behalf of the client.
• It may alter the client’s request or server response and sometime it may serve the
requests without contacting the real server using ‘cache’.
• A proxy server that passes all requests and replies unmodified is usually called a
gateway or tunnelling proxy.
• A proxy server can be placed in the user's local computer or at specific key
points between the user and the destination servers or the internet.
Proxy server
37
Web server
• It is also known as ‘internet server’.
• It is a server that store, process and deliver web pages to clients.
• The communication between client and server takes place using the Hypertext
Transfer Protocol (HTTP).
• Pages delivered to clients are most frequently HTML documents, which may
include images, multimedia, scripts with text content.
Web server
Database server
• A database server is a computer program that provides database services to other
computer programs or to computers, as defined by the client–server model.
• It should be hardware or software program.
• It may be the back-end portion of a database application (software) or physical
computer used to host the database (hardware).
• Many companies utilize a database server for storage. Users can access the data by
executing a query using a query language (SQL) specific to the database.
Database server
38
Application server
• The application server is a framework, an environment where applications can run,
no matter what they are or what functions they perform.
• It is also called an ‘app server’.
• It can be used to develop and run web-based applications.
• It is typically used in complex transaction based applications and in tree-tier GUI
applications.
• It allows data and code integrity.
• It also provides security to the applications.
Application server
39