Computer networking
Computer networking
communication protocols over digital interconnections for the purpose of sharing resources
located on or provided by the network nodes. The interconnections between nodes are formed
from a broad spectrum of telecommunication network technologies, based on physically wired,
optical, and wireless radio-frequency methods that may be arranged in a variety of network
topologies.
The nodes of a computer network may include personal computers, servers, networking
hardware, or other specialised or general-purpose hosts. They are identified by hostnames and
network addresses. Hostnames serve as memorable labels for the nodes, rarely changed after
initial assignment. Network addresses serve for locating and identifying the nodes by
communication protocols such as the internet protocol.
Hence, at a point it was decided to connect the computers in various departments to extract the
information and correlate information about the entire company. The following are the objectives
of the computer networks.
1. Resource sharing is the main objective of the computer network. The goal is to provide all the
program, date and hardware is available to everyone on the network without regard to the
physical location of the resource and the users.
2. The second objective is to provide the high Reliability. It is achieved by replicating the files on
two or more machines, so in case of unavailability (due to fail of hardware) the other copies can
be used.
3. Computer organization has helped organization in saving money. This is due to the fact that
the small computer has much better price to the performance ratio comparison than the large
computer like mainframe. Mainframe computer are approximately ten times faster that the
microcomputers, but they cost thousands times more. As a result of this imbalance, organization
has preferred to install interconnected microcomputer connected to the mainframe computer.
4. Computer network have provided means to increase system performance as the work load
increases (load balancing). In the days of mainframe when the system was full it was to replace
with the other large mainframe computer, usually at and expensive rate not convenience for
user.
5. Computer network help people who live or work apart to report together. So, when one user
prepared some documentation, he can make the document online enabling other to read and
convey their opinions. Thus computer network is a powerful communication medium.
6. Only authorized user can access resource in a computer network. Users are authenticated by
their user name and password. Hence it is not possible to access the data without proper
account. This increases security.
Application of Networks: Some of the network applications of the different fields are the
following.
1. Marketing and sales: Marketing professional uses them to collect exchange and analyze data
relating to customer needs and product development cycles.
Sales application includes Teleshopping, which uses order entry computers or telephone
connected to an order processing network, and online reservation services for railways, hotels,
airlines, restaurants theatre etc.
2. Financial services: It include credit history searches, foreign exchange and investment
services and electronic fund transfer (EFT), which allow a user to transfer money without going
to bank.
4. Electronic Messaging: E-mails transfer the messages between two and more users in a
network. With this application user can transfer the information in the form of text, picture and
voice.
5. Directory Services: It allows list of files to be stored in central location to speed up the world
wide search operation. E.g. search engines like Google, Britannia, and Yahoo etc.
6. Information Services: It includes Bulletin Boards and data bank. A ‗www‘ site offering the
technical specification for a new product in a information services.
7. Electronic Data Exchange (EDI): EDI allows business information (including documents such
as purchase orders and services) to be transferred without using paper.
8. Teleconferencing: It allows conference to occur without the participant being in the same
location. It includes:
Text Conferencing: Participant communicates through their keywords and computer monitors.
Voice Conferencing: Participant at a number of locations communicates simultaneously through
phone (talk).
9. Cellular Telephone: Wireless phone communication even while travelling through long
distance.
10. Cable TV: This is widest usable thing today throughout the world.
A computer network can be categorized by their size. A computer network is mainly of four
types:
Personal Area Network is a network arranged within an individual person, typically within a
range of 10 meters.
Personal Area Network is used for connecting the computer devices of personal use is known
as Personal Area Network.
Thomas Zimmerman was the first research scientist to bring the idea of the Personal Area
Network.
Personal Area Network covers an area of 30 feet.
Personal computer devices that are used to develop the personal area network are the laptop,
mobile phones, media player and play stations.
Computer Network Types
There are two types of Personal Area Network:
Wired Personal Area Network: Wired Personal Area Network is created by using the USB.
Geographical area: A Wide Area Network provides a large geographical area. Suppose if the
branch of our office is in a different city then we can connect with them through WAN. The
internet provides a leased line through which we can connect with another branch.
Centralized data: In case of WAN network, data is centralized. Therefore, we do not need to buy
the emails, files or back up servers.
Get updated files: Software companies work on the live server. Therefore, the programmers get
the updated files within seconds.
Exchange messages: In a WAN network, messages are transmitted fast. The web application
like Facebook, Whatsapp, Skype allows you to communicate with friends.
Sharing of software and resources: In WAN network, we can share the software and other
resources like a hard drive, RAM.
Global business: We can do the business over the internet globally.
High bandwidth: If we use the leased lines for our company then this gives the high bandwidth.
The high bandwidth increases the data transfer rate which in turn increases the productivity of
our company.
Disadvantages of Wide Area Network:
The following are the disadvantages of the Wide Area Network:
Security issue: A WAN network has more security issues as compared to LAN and MAN
network as all the technologies are combined together that creates the security problem.
Needs Firewall & antivirus software: The data is transferred on the internet which can be
changed or hacked by the hackers, so the firewall needs to be used. Some people can inject the
virus in our system so antivirus is needed to protect from such a virus.
High Setup cost: An installation cost of the WAN network is high as it involves the purchasing of
routers, switches.
Troubleshooting problems: It covers a large area so fixing the problem is difficult.
Internetwork
An internetwork is defined as two or more computer network LANs or WAN or computer network
segments are connected using devices, and they are configured by a local addressing scheme.
This process is known as internetworking.
An interconnection between public, private, commercial, industrial, or government computer
networks can also be defined as internetworking.
An internetworking uses the internet protocol.
The reference model used for internetworking is Open System Interconnection(OSI).
Types Of Internetwork:
1. Extranet: An extranet is a communication network based on the internet protocol such as
Transmission Control protocol and internet protocol. It is used for information sharing. The
access to the extranet is restricted to only those users who have login credentials. An extranet
is the lowest level of internetworking. It can be categorized as MAN, WAN or other computer
networks. An extranet cannot have a single LAN, atleast it must have one connection to the
external network.
Intranet advantages:
Communication: It provides a cheap and easy communication. An employee of the organization
can communicate with another employee through email, chat.
Time-saving: Information on the intranet is shared in real time, so it is time-saving.
Collaboration: Collaboration is one of the most important advantage of the intranet. The
information is distributed among the employees of the organization and can only be accessed
by the authorized user.
Platform independency: It is a neutral architecture as the computer can be connected to another
device with different architecture.
Cost effective: People can see the data and documents by using the browser and distributes the
duplicate copies over the intranet. This leads to a reduction in the cost.
There are two approaches to network topology: physical and logical. Physical network topology,
as the name suggests, refers to the physical connections and interconnections between nodes
and the network—the wires, cables, and so forth. Logical network topology is a little more
abstract and strategic, referring to the conceptual understanding of how and why the network is
arranged the way it is, and how data moves through it.
The design and structure of a network are usually shown and manipulated in a software-created
network topology diagram. These diagrams are essential for a few reasons, but especially for
how they can provide visual representations of both physical and logical layouts, allowing
administrators to see the connections between devices when troubleshooting.
The way a network is arranged can make or break network functionality, connectivity, and
protection from downtime. The question of, ―What is network topology?‖ can be answered with
an explanation of the two categories in the network topology.
Physical – The physical network topology refers to the actual connections (wires, cables, etc.)
of how the network is arranged. Setup, maintenance, and provisioning tasks require insight into
the physical network.
Logical – The logical network topology is a higher-level idea of how the network is set up,
including which nodes connect to each other and in which ways, as well as how data is
transmitted through the network. Logical network topology includes any virtual and cloud
resources.
Effective network management and monitoring require a strong grasp of both the physical and
logical topology of a network to ensure your network is efficient and healthy.
As with most things, there‘s no ―right‖ or one-size-fits-all option. With this in mind, I‘ll walk you
through the most common network topology definitions to give you a feel for the advantages
and disadvantages of each.
Additionally, devices can be added, removed, and modified without taking the entire network
offline.
On the physical side of things, the structure of the star topology uses relatively little cabling to
fully connect the network, which allows for both straightforward setup and management over
time as the network expands or contracts. The simplicity of the network design makes life easier
for administrators, too, because it‘s easy to identify where errors or performance issues are
occurring.
The overall bandwidth and performance of the network are also limited by the central node‘s
configurations and technical specifications, making star topologies expensive to set up and
operate.
Bus Topology
Bus topologies are best suited for small networks because there‘s only so much bandwidth, and
every additional node will slow transmission speeds.
Furthermore, data is ―half-duplex,‖ which means it can‘t be sent in two opposite directions at the
same time, so this layout is not the ideal choice for networks with huge amounts of traffic.
Ring Topology
Only one station on the network is permitted to send data at a time, which greatly reduces the
risk of packet collisions, making ring topologies efficient at transmitting data without errors.
By and large, ring topologies are cost-effective and inexpensive to install, and the intricate point-
to-point connectivity of the nodes makes it relatively easy to identify issues or misconfigurations
on the network.
The question of scalability should also be taken into consideration. In a ring topology, all the
devices on the network share bandwidth, so the addition of more devices can contribute to
overall communication delays. Network administrators need to be mindful of the devices added
to the topology to avoid overburdening the network‘s resources and capacity.
Additionally, the entire network must be taken offline to reconfigure, add, or remove nodes. And
while that‘s not the end of the world, scheduling downtime for the network can be inconvenient
and costly.
Dual-Ring Topology
Tree Topology
Mesh topology
The web-like structure of mesh topologies offers two different methods of data transmission:
routing and flooding. When data is routed, the nodes use logic to determine the shortest
distance from the source to destination, and when data is flooded, the information is sent to all
nodes within the network without the need for routing logic.
Generally, the more cable involved in network topology, the more work it‘ll require to set up. The
bus and star topologies are on the simpler side of things, both being fairly lightweight, while
mesh networks are much more cable- and labor-intensive.
Cable Type
The second point to consider is the type of cable you‘ll install. Coaxial and twisted-pair cables
both use insulated copper or copper-based wiring, while fiber-optic cables are made from thin
and pliable plastic or glass tubes. Twisted-pair cables are cost-effective but have less bandwidth
than coaxial cables. Fiber-optic cables are high performing and can transmit data far faster than
twisted-pair or coaxial cables, but they also tend to be far more expensive to install, because
they require additional components like optical receivers. So, as with your choice of network
topology, the wiring you select depends on the needs of your network, including which
applications you‘ll be running, the transmission distance, and desired performance.
Cost
As I‘ve mentioned, the installation cost is important to account for, as the more complex network
topologies will require more time and funding to set up. This can be compounded if you‘re
combining different elements, such as connecting a more complex network structure via more
expensive cables (though using fiber-optic cables in a mesh network is overdoing it, if you ask
me, because of how interconnected the topology is). Determining the right topology for your
needs, then, is a matter of striking the right balance between installation and operating costs
and the level of performance you require from the network.
Scalability
The last element to consider is scalability. If you anticipate your company and network
expanding—or if you‘d like it to be able to—it‘ll save you time and hassle down the line to use
an easily modifiable network topology. Star topologies are so common because they allow you
to add, remove, and alter nodes with minimal disruption to the rest of the network. Ring
networks, on the other hand, have to be taken entirely offline for any changes to be made to any
of the nodes.
Hardware Components
Servers −Servers are high-configuration computers that manage the resources of the network.
The network operating system is typically installed in the server and so they give user accesses
to the network resources. Servers can be of various kinds: file servers, database servers, print
servers etc.
Clients − Clients are computers that request and receive service from the servers to access and
from one device to another in a network. Transmission media may be guided media like coaxial
cable, fibre optic cables etc; or maybe unguided media like microwaves, infra-red waves etc.
by binding the network media together. Some of the common connecting devices are:
a. Routers
b. Bridges
c. Hubs
d. Repeaters
e. Gateways
f. Switches
Software Components
Networking Operating System − Network Operating Systems is typically installed in the server
and facilitate workstations in a network to share files, database, applications, printers etc.
Protocol Suite − A protocol is a rule or guideline followed by each computer for data
communication. Protocol suite is a set of related protocols that are laid down for computer
1. Guided Media:
It is also referred to as Wired or Bounded transmission media. Signals being transmitted are
directed and confined in a narrow pathway by using physical links.
Features:
High Speed
Secure
Used for comparatively shorter distances
There are 3 major types of Guided Media:
Least expensive
Easy to install
High-speed capacity
Susceptible to external interference
Lower capacity and performance in comparison to STP
Short distance transmission due to attenuation
Shielded Twisted Pair (STP):
This type of cable consists of a special jacket to block external interference. It is used in fast-
data-rate Ethernet and in voice and data channels of telephone lines.
Advantages:
Advantages:
High Bandwidth
Better noise Immunity
Easy to install and expand
Inexpensive
Disadvantages:
The cable can be unidirectional or bidirectional. The WDM (Wavelength Division Multiplexer)
supports two modes, namely unidirectional and bidirectional mode.
Advantages:
2. Unguided Media:
It is also referred to as Wireless or Unbounded transmission media.No physical medium is
required for the transmission of electromagnetic signals.
Features:
(i) Radiowaves –
These are easy to generate and can penetrate through buildings. The sending and receiving
antennas need not be aligned. Frequency Range:3KHz – 1GHz. AM and FM radios and
cordless phones use Radiowaves for transmission.
(ii) Microwaves –
It is a line of sight transmission i.e. the sending and receiving antennas need to be properly
aligned with each other. The distance covered by the signal is directly proportional to the height
of the antenna. Frequency Range:1GHz – 300GHz. These are majorly used for mobile phone
communication and television distribution.
(iii) Infrared –
Infrared waves are used for very short distance communication. They cannot penetrate through
obstacles. This prevents interference between systems. Frequency Range:300GHz – 400THz. It
is used in TV remotes, wireless mouse, keyboard, printer, etc.
Transmission Modes in Computer Networks (Simplex, Half-Duplex and Full-Duplex)
Transmission mode means transferring of data between two devices. It is also known as
communication mode. Buses and networks are designed to allow communication to occur
between individual devices that are interconnected. There are three types of transmission
mode:-
These are explained as following below.
1. Simplex Mode –
In Simplex mode, the communication is unidirectional, as on a one-way street. Only one of the
two devices on a link can transmit, the other can only receive. The simplex mode can use the
entire capacity of the channel to send data in one direction.
Example: Keyboard and traditional monitors. The keyboard can only introduce input, the monitor
can only give the output.
2. Half-Duplex Mode –
In half-duplex mode, each station can both transmit and receive, but not at the same time.
When one device is sending, the other can only receive, and vice versa. The half-duplex mode
is used in cases where there is no need for communication in both direction at the same time.
The entire capacity of the channel can be utilized for each direction.
Example: Walkie- talkie in which message is sent one at a time and messages are sent in both
the directions.
3. Full-Duplex Mode –
In full-duplex mode, both stations can transmit and receive simultaneously. In full_duplex mode,
signals going in one direction share the capacity of the link with signals going in other direction,
this sharing can occur in two ways:
Either the link must contain two physically separate transmission paths, one for sending and
other for receiving.
Or the capacity is divided between signals travelling in both directions.
Full-duplex mode is used when communication in both direction is required all the time. The
capacity of the channel, however must be divided between the two directions.
Example: Telephone Network in which there is communication between two persons by a
telephone line, through which both can talk and listen at the same time.
Parallel Transmission
In parallel transmission, multiple bits (usually 8 bits or a byte/character) are sent simultaneously
on different channels (wires, frequency channels) within the same cable, or radio path, and
synchronized to a clock. Parallel devices have a wider data bus than serial devices and can
therefore transfer data in words of one or more bytes at a time. As a result, there is a speedup in
parallel transmission bit rate over serial transmission bit rate. However, this speedup is a tradeoff
versus cost since multiple wires cost more than a single wire, and as a parallel cable gets longer,
the synchronization timing between multiple channels becomes more sensitive to distance. The
timing for parallel transmission is provided by a constant clocking signal sent over a separate
wire within the parallel cable; thus parallel transmission is considered synchronous .
Serial Transmission
In serial transmission, bits are sent sequentially on the same channel (wire) which reduces costs
for wire but also slows the speed of transmission. Also, for serial transmission, some overhead
time is needed since bits must be assembled and sent as a unit and then disassembled at the
receiver.
Applications
Serial transmission is between two computers or from a computer to an external device located
some distance away. Parallel transmission either takes place within a computer system (on a
computer bus) or to an external device located a close distance away.
A special computer chip known as a universal asynchronous receiver transmitter (UART) acts as
the interface between the parallel transmission of the computer bus and the serial transmission of
the serial port. UARTs differ in performance capabilities based on the amount of on-chip
memory they possess.
The term synchronous is used to describe a continuous and consistent timed transfer of data
blocks.
Synchronous data transmission is a data transfer method in which a continuous stream of data
signals is accompanied by timing signals (generated by an electronic clock) to ensure that the
transmitter and the receiver are in step (synchronized) with one another. The data is sent in
blocks (called frames or packets) spaced by fixed time intervals.
Synchronous transmission modes are used when large amounts of data must be transferred very
quickly from one location to the other. The speed of the synchronous connection is attained by
transferring data in large blocks instead of individual characters.
Synchronous transmission synchronizes transmission speeds at both the receiving and sending
end of the transmission using clock signals built into each component. A continual stream of data
is then sent between the two nodes.
The data blocks are grouped and spaced in regular intervals and are preceded by special
characters called syn or synchronous idle characters. See the following illustration.
After the syn characters are received by the remote device, they are decoded and used to
synchronize the connection. After the connection is correctly synchronized, data transmission
may begin.
The timing needed for synchronous connections is obtained from the devices located on the
communication link. All devices on the synchronous link must be set to the same clocking.
Due to there being no start and stop bits the data transfer rate is quicker although more errors will
occur, as the clocks will eventually get out of sync, and the receiving device would have the
wrong time that had been agreed in the protocol for sending/receiving data, so some bytes could
become corrupted (by losing bits).
Ways to get around this problem include re-synchronization of the clocks and use of check digits
to ensure the bytes is correctly interpreted and received.
Most network protocols (such as Ethernet, SONET, Token Ring) use synchronous transmission.
In contrast, asynchronous transmission works in spurts and must insert a start bit before each
data character and a stop bit at its termination to inform the receiver where it begins and ends.
The term asynchronous is used to describe the process where transmitted data is encoded with
start and stop bits, specifying the beginning and end of each character.
An example of synchronous transmission is shown in the following figure.
These additional bits provide the timing or synchronization for the connection by indicating
when a complete character has been sent or received; thus, timing for each character begins with
the start bit and ends with the stop bit.
When gaps appear between character transmissions, the asynchronous line is said to be in a mark
state. A mark is a binary 1 (or negative voltage) that is sent during periods of inactivity on the
line as shown in the following figure.
When the mark state is interrupted by a positive voltage (a binary 0), the receiving system knows
that data characters are going to follow. It is for this reason that the start bit, which precedes the
data character, is always a space bit (binary 0) and that the stop bit, which signals the end of a
character, is always a mark bit (binary 1).
Each character is preceded by a start bit and followed by one or more stop bits.
Gaps or spaces between characters may exist.
With asynchronous transmission, a large text document is organized into long strings of letters
(or characters) that make up the words within the sentences and paragraphs. These characters are
sent over the communication link one at a time and reassembled at the remote location.
In asynchronous transmission, ASCII character would actually be transmitted using 10 bits. For
example, "0100 0001" would become "1 0100 0001 0". The extra one (or zero, depending on
parity bit) at the start and end of the transmission tells the receiver first that a character is coming
and secondly that the character has ended. This method of transmission is used when data are
sent intermittently as opposed to in a solid stream. In the previous example the start and stop bits
are in bold.
The start and stop bits must be of opposite polarity. This allows the receiver to recognize when
the second packet of information is being sent.