CSC 405 Data Communication and Computer Networks
CSC 405 Data Communication and Computer Networks
INTRODUCTION
Network: a collection of independent entities that are arranged in such a way to exchange data, information, or
resources. eg road network, telephone network, computer network.
Data Communication: This is a process of transmitting data signals from one point to the other through a
network. It is also the transfer of data and information between a source and a receiver. It involves the transfer
of data, the methods of transfer, and the preservation of the data during the transfer process. The fundamental
purpose of data communication is to exchange information between user’s computers, terminals, and application
programs.
COMPONENTS OF DATA COMMUNICATION
TRANSMISSION MODES
Transmission modes also known as communication modes, are methods of transferring data between devices on
buses and networks designed to facilitate communication. They are classified into three types: Simplex Mode,
Half-Duplex Mode, and Full-Duplex Mode
1. Simplex Mode
In Simplex mode, the communication is unidirectional, as on a one-way street. Only one of the two devices on a
link can transmit, the other can only receive. The simplex mode can use the entire capacity of the channel to send
data in one direction.
Example: Keyboard and traditional monitors. The keyboard can only introduce input, the monitor can only give
the output.
Advantages of Simplex Mode
Usage of one channel for Usage of one channel for Usage of two channels for
Channel usage
the transmission of data. the transmission of data. the transmission of data.
Suitable for It is suitable for those It is suitable for those It is suitable for those
transmissions when there transmissions when there is transmissions when there is
Parameters Simplex Half Duplex Full Duplex
Example of simplex
Example of half duplex Example of full duplex
Examples mode are: Keyboard and
mode is: Walkie-Talkies. mode is: Telephone.
monitor.
TRANSMISSION MEDIA
A transmission medium can be anything that can carry signals or data between the source (transmitter)and
destination (receiver). For example, as we switch on a ceiling fan or a light bulb, the electric wire is the medium
that carries electric current from the switch to the fan or bulb.
In data communication, transmission media are the links that carry messages between two or
more communicating devices. Transmission can be classified as guided or unguided. Figure 11.7 shows the
classification of communication media. In guided transmission, there is a physical link
made of wire/cable through which data in terms of signals are propagated between the nodes. These are usually
metallic cables, fiber-optic cables, etc. They are also known as wired media.
In unguided transmission, data travels in the air in terms of electromagnetic waves using an antenna. They are
also known as wireless media.
classification of communication media
Dish-shaped antennas are used for sending and receiving data at longer distances. These antennas are mounted
on taller buildings so that they would be in line of sight. Waves gradually become weaker and weaker after
traveling a certain distance through the air. Therefore, repeaters are installed to regenerate the signals of the same
energy.
1. Wired Transmission Media (Guided Media)
Any physical link that can carry data in the form of signals belong to the category of wired transmission media.
Three commonly used guided/wired media for data transmission are, twisted pair, coaxial cable, and fiber optic
cable. Twisted-pair and coaxial cable carry the electric signals whereas the optical fiber cable carries the light
signals.
Features:
High Speed
Secure
Used for comparatively shorter distances
Coaxial cable is another type of data transmission medium. It is better shielded and has more bandwidth
than a twisted pair. As shown in Figure 11.10, it has a copper wire at the core of the cable which is surrounded
with insulating material. The insulator is further surrounded with an outer conductor (usually a copper
mesh). This outer conductor is wrapped in a plastic cover. The key to the success of coaxial cable is its shielded
design that allows the cable's copper core to transmit data quickly, without interference of environmental
factors. These types of cables are used to carry signals of higher frequencies to a longer distance.
Coaxial Cable
Radio Waves
2. Infrared
These waves are useful for only very short-distance communication. Unlike radio waves, they do not have the
ability to penetrate barriers. Their range varies between 300GHz – 400THz. Since they have larger bandwidth,
the data rate is very high for infrared waves. These have less interference and are more secure. It is used in TV
remotes, wireless mouse, keyboard, printer, etc.
Infrared Transmission
3. Microwaves
For these waves, it is important for the transmitter and receiver antenna to be aligned. This is why it is known as
line-of-sight transmission. Due to this, they are suitable for shorter distances. They comprise of electromagnetic
waves with frequencies ranging between 1-400 GHz. Microwaves provide bandwidth between the range of 1 to
10 Mbps. The distance covered by the signal is proportional to the height of the antenna. For traveling to longer
distances, the height of the tower should be increased. Microwaves are majorly used for mobile phone
communication and television distribution.
COMPUTER NETWORKS
A computer network consists of two or more computers that are linked in order to share resources (such as
printers and CDs), exchange files, or allow electronic communications.
Computer networks can be physical or logical. A physical computer network is a real network comprised of
cables and devices that send data back and forth. Logical networks are software representations of a physical
network, they are built on top of a physical network.
Computer networks aim to share information and resources among multiple digital devices. The Internet is an
example of a computer network, made up of many smaller computer networks. Computer networks make
video streaming, social networks, and cloud networks possible.
TYPES OF COMPUTER NETWORKS
Depending upon the geographical area covered by a network, it is classified as:
1. Personal Area Network (PAN)
A PAN is a network that is used for communicating among computers and computer devices (including
telephones) in close proximity of around a few meters within a room. It can be used for communicating
between the devices themselves, or for connecting to a larger network such as the internet. PANs can be
wired or wireless
Advantages of WAN
Here are the benefits/ pros of using WAN:
• WAN helps you to cover a larger geographical area. Therefore, business offices situated at longer distances
can easily communicate.
• Contains devices like mobile phones, laptops, tablets, computers, gaming consoles, etc.
• WLAN connections work using radio transmitters and receivers built into client devices.
Disadvantage of WAN
Here are the drawbacks/cons of using WAN:
• The initial setup cost of investment is very high.
• It is difficult to maintain the WAN network. You need skilled technicians and network administrators.
• There are more errors and issues because of the wide coverage and the use of different technologies.
• It requires more time to resolve issues because of the involvement of multiple wired and wireless
technologies.
• Offers lower security compared to other types of networks.
5. VPN (Virtual Private Network)
A network which is constructed by using public wires to connect to a private network
There are a number of systems which enable you to create networks using the Internet as a medium for
transporting data
These systems use encryptions and other security mechanisms to ensure only authorized users can access
NETWORK TOPOLOGY
Network topology is the physical and logical arrangement of nodes and connections in a network. Nodes
usually include devices such as switches, routers, and software with switch and router features. Network
topologies are often represented as a graph.
A node is anything that has a NIC (Network Interface Card) in it. That is, anything that can send and receive
data via the TCP/IP internet protocol. A node can be a computer, printer, scanner, smartphone, or any device
that can communicate with other devices. Types of Computer Networks
Types of Network Topology
1. Bus Topology
Bus Topology
The bus topology is designed in such a way that all the stations are connected through a single cable
known as a backbone cable. Each node is either connected to the backbone cable by drop cable or
directly connected to the backbone cable. When a node wants to send a message over the network, it puts
a message over the network. All the stations available in the network will receive the message whether it
has been addressed or not. The bus topology is mainly used in 802.3 (ethernet) and 802.4 standard
networks. The configuration of a bus topology is quite simple compared to other topologies.
The backbone cable is considered a "single lane" through which the message is broadcast to all the
stations.
The most common access method of the bus topologies is CSMA (Carrier Sense Multiple Access).
CSMA It is a media access control used to control the data flow so that data integrity is maintained, i.e.,
the packets do not get lost.
Advantages of Bus topology
i. Low-cost cable: In bus topology, nodes are directly connected to the cable without passing through a
hub. Therefore, the initial cost of installation is low.
ii. Moderate data speeds: Coaxial or twisted pair cables are mainly used in bus-based networks that
support upto 10 Mbps.
iii. Familiar technology: Bus topology is a familiar technology as the installation and troubleshooting
techniques are well known, and hardware components are easily available.
iv. Limited failure: A failure in one node will not have any effect on other nodes.
Disadvantages of Bus topology
i. Extensive cabling: A bus topology is quite simpler, but still it requires a lot of cabling.
ii. Difficult troubleshooting: It requires specialized test equipment to determine the cable faults. If any
fault occurs in the cable, then it would disrupt the communication for all the nodes.
iii. Signal interference: If two nodes send the messages simultaneously, then the signals of both the
nodes collide with each other.
iv. Reconfiguration difficult: Adding new devices to the network would slow down the network.
v. Attenuation: Attenuation is a loss of signal leads to communication issues. Repeaters are used to
regenerate the signal.
2. Ring Topology
Ring Topology
Ring topology is like a bus topology, but with connected ends.
o The node that receives the message from the previous computer will retransmit to the next node.
o The data flows in one direction, i.e., it is unidirectional.
o The data flows in a single loop continuously known as an endless loop.
o It has no terminated ends, i.e., each node is connected to other node and having no termination point.
o The data in a ring topology flow in a clockwise direction.
o The most common access method of the ring topology is token passing.
Token passing: It is a network access method in which token is passed from one node to another node.
Token: It is a frame that circulates around the network.
Working of Token passing
o A token moves around the network, and it is passed from computer to computer until it reaches the
destination.
o The sender modifies the token by putting the address along with the data.
o The data is passed from one device to another device until the destination address matches. Once the
token received by the destination device, then it sends the acknowledgment to the sender.
o In a ring topology, a token is used as a carrier.
Advantages of Ring topology:
i. Network Management: Faulty devices can be removed from the network without bringing the network
down.
ii. Product availability: Many hardware and software tools for network operation and monitoring are
available.
iii. Cost: Twisted pair cabling is inexpensive and easily available. Therefore, the installation cost is very low.
iv. Reliable: It is a more reliable network because the communication system is not dependent on the single
host computer.
Disadvantages of Ring topology:
i. Difficult troubleshooting: It requires specialized test equipment to determine the cable faults. If any fault
occurs in the cable, then it would disrupt the communication for all the nodes.
ii. Failure: The breakdown in one station leads to the failure of the overall network.
iii. Reconfiguration difficult: Adding new devices to the network would slow down the network.
iv. Delay: Communication delay is directly proportional to the number of nodes. Adding new devices
increases the communication delay.
3. Star Topology
o Star topology is an arrangement of the network in which every node is connected to the central hub,
switch or a central computer.
o The central computer is known as a server, and the peripheral devices attached to the server are known
as clients.
o Coaxial cable or RJ-45 cables are used to connect the computers.
o Hubs or Switches are mainly used as connection devices in a physical star topology.
o Star topology is the most popular topology in network implementation.
Advantages of Star topology
o Efficient troubleshooting: Troubleshooting is quite efficient in a star topology as compared to bus
topology. In a bus topology, the manager has to inspect the kilometers of cable. In a star topology, all the
stations are connected to the centralized network. Therefore, the network administrator has to go to the
single station to troubleshoot the problem.
o Network control: Complex network control features can be easily implemented in the star topology. Any
changes made in the star topology are automatically accommodated.
o Limited failure: As each station is connected to the central hub with its own cable, therefore failure in
one cable will not affect the entire network.
o Familiar technology: Star topology is a familiar technology as its tools are cost-effective.
o Easily expandable: It is easily expandable as new stations can be added to the open ports on the hub.
o Cost effective: Star topology networks are cost-effective as it uses inexpensive coaxial cable.
o High data speeds: It supports a bandwidth of approx 100Mbps. Ethernet 100BaseT is one of the most
popular Star topology networks.
Disadvantages of Star topology
o A Central point of failure: If the central hub or switch goes down, then all the connected nodes will not
be able to communicate with each other.
o Cable: Sometimes cable routing becomes difficult when a significant amount of routing is required.
4. Tree topology
o Tree topology combines the characteristics of bus topology and star topology.
o A tree topology is a type of structure in which all the computers are connected with each other in
hierarchical fashion.
o The top-most node in tree topology is known as a root node, and all other nodes are the descendants of
the root node.
o There is only one path exists between two nodes for the data transmission. Thus, it forms a parent-child
hierarchy.
Advantages of Tree topology
o Support for broadband transmission: Tree topology is mainly used to provide broadband transmission,
i.e., signals are sent over long distances without being attenuated.
o Easily expandable: We can add the new device to the existing network. Therefore, we can say that tree
topology is easily expandable.
o Easily manageable: In tree topology, the whole network is divided into segments known as star
networks which can be easily managed and maintained.
o Error detection: Error detection and error correction are very easy in a tree topology.
o Limited failure: The breakdown in one station does not affect the entire network.
o Point-to-point wiring: It has point-to-point wiring for individual segments.
Disadvantages of Tree topology
o Difficult troubleshooting: If any fault occurs in the node, then it becomes difficult to troubleshoot the
problem.
o High cost: Devices required for broadband transmission are very costly.
o Failure: A tree topology mainly relies on main bus cable and failure in main bus cable will damage the
overall network.
o Reconfiguration difficult: If new devices are added, then it becomes difficult to reconfigure.
5. Mesh topology
o Mesh technology is an arrangement of the network in which computers are interconnected with each
other through various redundant connections.
o There are multiple paths from one computer to another computer.
o It does not contain the switch, hub or any central computer which acts as a central point of
communication.
o The Internet is an example of the mesh topology.
o Mesh topology is mainly used for WAN implementations where communication failures are a critical
concern.
o Mesh topology is mainly used for wireless networks.
Mesh topology is divided into two categories:
o Fully connected mesh topology
o Partially connected mesh topology
o Full Mesh Topology: In a full mesh topology, each computer is connected to all the computers available
in the network.
o Partial Mesh Topology: In a partial mesh topology, not all but certain computers are connected to those
computers with which they communicate frequently.
Advantages of Mesh topology:
o Reliable: The mesh topology networks are very reliable as if any link breakdown will not affect the
communication between connected computers.
o Fast Communication: Communication is very fast between the nodes.
o Easier Reconfiguration: Adding new devices would not disrupt the communication between other
devices.
Disadvantages of Mesh topology
o Cost: A mesh topology contains a large number of connected devices such as a router and more
transmission media than other topologies.
o Management: Mesh topology networks are very large and very difficult to maintain and manage. If the
network is not monitored carefully, then the communication link failure goes undetected.
o Efficiency: In this topology, redundant connections are high that reduces the efficiency of the network.
6. Hybrid Topology
TCP/IP MODEL
TCP/IP was designed and developed by the Department of Defense (DoD) in the 1960s and is based on standard protocols.
The TCP/IP model is a concise version of the OSI model. It contains four layers, unlike the seven layers in the OSI model.
The TCP/IP model is a fundamental framework for computer networking. It stands for Transmission Control
Protocol/Internet Protocol, which are the core protocols of the Internet. This model defines how data is transmitted over
networks, ensuring reliable communication between devices. It consists of four layers: the Link Layer, the Internet Layer,
the Transport Layer, and the Application Layer. Each layer has specific functions that help manage different aspects of
network communication, making it essential for understanding and working with modern networks.
TCP/IP model was developed alongside the creation of the ARPANET, which later became the foundation of the modern
internet. It was designed with a focus on the practical aspects of networking at the time. The lower-level hardware details
and physical transmission medium were largely abstracted away in favor of higher-level networking protocols.
What Does TCP/IP Do?
The main work of TCP/IP is to transfer the data of a computer from one device to another. The main condition of this
process is to make data reliable and accurate so that the receiver will receive the same information which is sent by the
sender. To ensure that, each message reaches its final destination accurately, the TCP/IP model divides its data into packets
and combines them at the other end, which helps in maintaining the accuracy of the data while transferring from one end to
another end. The TCP/IP model is used in the context of the real-world internet, where a wide range of physical media and
network technologies are in use. Rather than specifying a particular Physical Layer, the TCP/IP model allows for flexibility
in adapting to different physical implementations.
The usage of this model is very low. This model is highly used.
1. Repeater
A digital signal can only travel so far down a cable until it degrades. This gradual weakening is referred to as attenuation
rate. A repeater operating at the OSI model’s physical layer (Layer 1) is a powered device that reenergizes the signal to
keep traveling further, repeaters help overcome distance-related limitations by strengthening the strength and quality of the
signal. They are instrumental in LANs and WANs as they minimize errors, reduce data loss, and ensure reliable delivery to
specific locations. One of the primary benefits of repeaters is the error-free transfer of data over longer distances. This will
ensure efficient and safe communication. Dedicated repeaters are rarely used today, as powered hubs, switches, and routers
do the job of a repeater. However, repeaters are occasionally employed to extend the range of remote wireless access
points.
Features of Repeaters
Repeater can regenerate the signal without modifying it.
Repeaters can be used in analog signals and digital signals.
Repeaters can extend the range of networks.
A repeater supports dynamic networking.
The use of Repeaters reduces error and loss of data.
Power is required for the working of repeaters.
Using a repeater can add complexity to the network.
Working of Repeaters
Initially the source system transmits the signals. This source systems can be a mobile phone, laptop or radio.
This transmitted signal from the source system travels in the air if it’s a wireless network or through the cable if it is a
wired network. As the signal goes away from the source it’s strength gets weak.
The signal received by the repeater is not the actual signal sent by the source system but a weak signal. Therefore repeater
amplifies this weak signal to get it strengthened.
The strengthened signal is now being sent from the repeater to its destination. This signal is stronger and can travel at
longer distances. In short, it extends the network without losing the quality of the signal.
Repeaters are therefore used in various wireless technologies such as Wi-Fi and wired technologies such as Ethernet.
2. Hub
A network hub is an essential multiport device that connects multiple Ethernet devices into a single broadcast network
segment, which makes them prone to traffic congestion. A Network Hub is one of the most commonly used networking
devices and can be easily found on any small network such as a home or office network. Hub operates at the physical layer
of the OSI model. It is the simplest networking device and hence has a low cost. A hub is a repeater with multiple ports.
The function of a hub in networking is similar to the repeater. It transfers data in the form of binary bits and is used for
broadcasting data. There are three types of Hubs:
Passive hub
Active hub
Intelligent hub
Let’s look at each of these:
Passive Hub: Passive hubs are simply used to connect signals from different network cables as they do not have any
computerized element. They simply connect the wires of different devices in the star topology. Passive hubs do not do any
processing or signal regeneration and that’s why do not require electricity the most they can do is they can copy or repeat
the signal. It can’t clean the message, and it can’t amplify or strengthen the signal.
Active Hub: They have a power supply for regenerating, and amplifying the signals. When a port sends weak signaled
data, the hub regenerates the signal and strengthens it, then send it further to all other ports. Active hubs are expensive in
costs as compared to passive hubs.
Intelligent Hub: Provides additional features to the active hub. Also known as a manageable hub, as each port on the hub
can be configured by the network operator according to the network requirement. All the ports of the hub can be
configured, monitored, enabled or disabled.
The function of a Network Hub
When a Hub receives data from one of the connected devices, it passes data to all the other ports without checking for the
destination device except the port through which it receives the data.
3. Bridge
A bridge is a hardware used in computer networking that joins two or more network segments and routes data between
them according to MAC addresses. In short, a bridge improves network performance and connection by functioning at the
data link layer (Layer 2) of the OSI model.
Types of Bridges
There are three types of bridges in computer networks, which are as follows:
Transparent Bridge: Transparent bridges are invisible to other devices on the network. This bridge doesn’t reconfigure
the network on the addition or deletion of any station. The prime function of the transparent bridge is to block or forward
the data according to the MAC address.
Source Routing Bridge: Source routing bridges were developed and designed by IBM specifically for token ring
networks. The frame’s entire route is embedded with the data frames by the source station to perform the routing operation
so that once the frame is forwarded it must follow a specific defined path/route.
Translational Bridge: Translational bridges convert the received data from one networking system to another. Or it is used
to communicate or transmit data between two different types of networking systems. Like if we are sending data from a
token ring to an Ethernet cable, the translational cable will be used to connect both the networking system and transmit
data.
Features of Bridge
Works at the data link layer, managing data more intelligently.
Supports full-duplex, allowing data to be sent and received at the same time.
Segments the network, reducing data traffic.
Working of Bridges
Let’s see the step-by-step working of the bridge in computer networks:
Receiving Data: The bridge gets data packets (or frames) from both network segments A and B.
Building a Table: It creates a table of MAC addresses by looking at where the data is coming from to know which device
is on which segment.
Filtering Data: If the data from network A is meant for a device also on network A, the bridge stops it from going further.
Forwarding Data: If the data from network A is meant for a device on network B, the bridge sends it to the correct place
on network B.
Repeating for Both Sides: The bridge does the same thing for data coming from network B.
Use Cases of Bridge
Below are the use cases of Bridge:
Used in larger networks to reduce traffic and improve efficiency.
Can be used to connect two different types of networks.
Difference between Hub and Bridge
Hub Bridge
Hub is a network device that is used for Bridge is also a network device that is used to connect two different
connecting a number of devices. LANs working on the same protocol.
Types of hubs are: Active and Passive. Types of bridges are: Source route, Transparent, and Translation.
Hub does not perform data filtration. While bridge performs data filtration.
But in bridge, one port is for incoming and another port for
Multiple ports are used in Hub.
outgoing.
Wired Router
Wireless (Wi-Fi) router
A wireless router, also known as a Wi-Fi router or WLAN device, converts wired broadband data into radio signals,
establishing Wi-Fi networks for internet access, commonly used in homes and offices. Operating on the IEEE 802.11ac
Wave 2 standard, these routers integrate wireless access point functions with routers, transmitting data wirelessly via
antennas across various frequency bands. To ensure security, routers require login IDs and passwords, with additional
measures like MAC address filtering and Wi-Fi Protected Access (WPA).
Wireless Router
Brouter
Short for bridge router, a brouter is a networking device that serves as both a bridge and a router.
Core router
A core router is a router in a computer network that routes data within a network, but not between networks.
Functions of a Router
Three main functions of a router include data packet routing, network address filtering, and acting as an intermediary
between networks.
1. Packet Forwarding: The primary function of a router is to forward data packets between networks. When a router
receives a packet, it examines the destination IP address and consults its routing table to determine the best path for
the packet to reach its destination. The router then forwards the packet to the appropriate next-hop router or
directly to the destination host.
2. Routing: Routers use routing protocols and algorithms to build and maintain a routing table. This table contains
information about the available paths to different networks and their associated metrics (e.g., hop count,
bandwidth, delay). The router uses this information to make decisions about the best route for each data packet.
3. Network Address Translation (NAT): NAT is a technique used by routers to allow multiple devices in a private
local area network (LAN) to share a single public IP address. When data packets are sent from the LAN to the
internet, the router replaces the private IP addresses with its public IP address. This helps conserve IPv4 addresses
and adds a layer of security as the internal IP addresses are hidden from the external network.
4. Packet Filtering and Firewalling: Routers can implement access control lists (ACLs) to filter incoming and
outgoing packets based on specific criteria, such as source IP address, destination IP address, port numbers, or
protocol types. This filtering capability is often used for security purposes to prevent unauthorized access and
protect the internal network from potential threats.
5. Interconnecting Different Network Technologies: Routers can interconnect networks that use different
technologies, such as Ethernet, Wi-Fi, and wide-area network (WAN) technologies like T1, DSL, or fiber-optic
connections. They perform the necessary protocol conversions to ensure seamless data transfer between dissimilar
networks.
6. Path Selection: Routers use various metrics and algorithms to determine the best path for forwarding data. These
metrics can be based on factors like the speed, reliability, and cost of the available paths. The goal is to optimize
data transmission and reduce latency.
7. Dynamic Routing: Routers can adapt to changes in the network topology and automatically update their routing
tables by using dynamic routing protocols. These protocols exchange information with other routers, allowing
them to learn about new routes or failures in the network. Examples of dynamic routing protocols include OSPF
(Open Shortest Path First) and BGP (Border Gateway Protocol).
8. Quality of Service (QoS): Routers can prioritize certain types of traffic over others, ensuring that critical
applications (e.g., voice and video) receive preferential treatment and guaranteed bandwidth, while less important
traffic experiences limited bandwidth. QoS helps to manage network congestion and provide a better user
experience for time-sensitive applications.
9. Virtual LAN (VLAN) Support: Many modern routers support VLANs, which allow network administrators to
logically segment a physical network into multiple virtual networks. This segmentation enhances network security,
management, and efficiency.
10. DHCP (Dynamic Host Configuration Protocol) Server: Routers can act as DHCP servers, assigning IP
addresses dynamically to devices within the network, simplifying network configuration for end-users.
How Does a Router Work?
Routers function as advanced post offices for the Internet. When you send or request data, the router reads the "address" of
the destination machine and shoots it off into the World Wide Web. The data is sent as a series of small packets, each
bearing the address of where it’s heading.
Data Packet Breakdown
Whenever online activity is initiated - be it sending an email or streaming a video - the information involved is broken
down into 'packets.' Each packet, carrying a specific chunk of data, is tagged with a header. This header holds critical
information, including the source IP address (where it came from), the destination IP address (where it's going), and the
packet's sequence number, among other details.
Packet Direction (Routing)
Having received the data packets, a router then consults its routing table - an efficient data structure that holds details about
paths to other networks. The router studies the destination IP address from the packet header, cross-checks it with the
routing table, and decides where to send the packets. If the router doesn't recognize the address, it may send the packets to
a default pathway. It's worth noting that different packets of data can take separate routes before
reaching the same destination.
Data Packet Transmission and Reassembly
Following the guidance derived from the routing table, the router transmits packets onward towards their destinations.
Upon reaching the destination device, these packets undergo reassembly to reconstruct the original data. The sequence
numbers in the packet headers ensure accurateness in this rebuilding process, facilitating the deliverance of coherent
information to the user.
Collectively, these three mechanisms allow for the smooth and efficient operation of a router, providing internet users with
a seamless online communication experience.
Advantages of Router
Routers offer an array of significant advantages, making them indispensable for networking:
1. Routing and Delivery of Packets: Routers efficiently deliver packets of data between different networks, making
data sharing easier and faster.
2. Optimized Network Performance: Routers often select the best route for packet transmission, improving overall
network performance and reducing congestion.
3. Increased Network Security: Routers can provide an additional layer of security by managing access to a
network and blocking specific types of data.
4. Connectivity Between Different Network Architectures: Routers can bridge network architectures, for example,
Ethernet and Token Ring, which other networking devices cannot do.
Disadvantages of a Router
Despite its numerous benefits, a router has a few setbacks:
1. Complexity: Routers are complex to set up and maintain, especially in large networks.
2. Cost: Routers are generally more expensive than other network devices like switches and bridges.
3. Performance Issues: In some cases, a router may create bottlenecks if it cannot handle the volume of data from a
network, slowing down the network speed.
An Internet Protocol (IP) address is the unique identifying number assigned to every device connected to the Internet. An
IP address definition is a numeric label assigned to devices that use the internet to communicate.
IP ADDRESS VERSIONS
There are two versions of IP that currently coexist in the global Internet: IP version 4 (IPv4) and IP version 6 (IPv6).
1. IPv4
IPv4 version addresses are the most common. These IP addresses consist of a 32-bit number, which is made up of four 8-bit
groups separated by dots. Each of the four groups contains a number between 0 and 255. With this structure, IPv4 provides
approximately 4.3 billion unique IP addresses.
Example address: 104.124.145.85
IPv4 still routes the majority of internet traffic today. However, as the internet grows, IPv4 is running out of possible
addresses due to its limited address space and number combinations.
2. IPv6
IPv6 is a newer internet protocol version, standardized in 1998, and its deployment began in the mid-2000s. IPv6 addresses
are made of eight groups of four hexadecimal digits separated by colons, resulting in 128 bits. This allows for the creation
of 2^128 unique IP addresses, 1000 times more than IPv4.
Example address: 2001:0db8:0000:0000:0000:8a2e:0370:7334
Apart from many IP address combinations and high scalability, IPv6 provides other advantages. For example, IPv6
enhances security by natively supporting IPSec. It also simplifies routing and reduces network complexity.
TYPES OF IP ADDRESSES
Several factors define the IP address type, including IP version, usage, availability, and the IP address assignment’s
purpose. Generally, IP addresses are divided into private and public, while public IP addresses are subdivided
into static and dynamic IP addresses.
1. Private IP address
Private IP addresses can only be used by devices within the same local network. This allows secure communication
between them and enables data packets to travel without external interference.
A device with a private IP address can’t directly connect to the internet, just like other devices outside the local network
won’t be able to connect to a device with a private IP address. Being limited to a single private network, private IP
addresses are protected from the threats of the public internet.
A private IP address, or internal-facing IP address, is assigned by an office or home intranet (or local area network) to
devices, or by the internet service provider (ISP). The home/office router manages the private IP addresses to the devices
that connect to it from within that local network. Network devices are thus mapped from their private IP addresses to public
IP addresses by the router.
2. Public IP address
Public IP addresses provide global identification for hardware like computers, routers, and servers, allowing them
to communicate directly with other devices and services over the internet.
As public IP addresses are the foundation of online communication, you need one for all online activities, such
as browsing the web, streaming media, accessing online services, etc.
Your ISP (Internet Service Provider) assigns a public IP address to your router. All devices that connect to a router
communicate with other IP addresses using the router’s IP address. That’s why all devices you connect to the same
network will have the same public IP address.
3. Dynamic IP address
A dynamic IP address is a temporary, ISP-assigned address that changes every time you connect to the internet.
Dynamic IP addresses are commonly used by small businesses and most users at home for computers and mobile
devices.
ISPs have a pool of IP addresses and usually employ Dynamic Host Configuration Protocol (DHCP) to assign IP
addresses to devices automatically. This client-server protocol ensures smooth IP management and prevents address
conflicts.
Because of their ever-changing nature, dynamic IP addresses make tracking a specific device or user more difficult,
providing better anonymity and security. On the other hand, because of the same reason, you may experience
temporary connectivity disruptions when the address changes.
4. Static IP address
Opposite to dynamic IPs, static IP addresses are fixed and never change. They are usually used for activities that
need a consistent IP address — hosting servers and websites, running VPNs (Virtual Private Networks) or FTP
(File Transfer Protocol) servers, port forwarding, or remote access to networks and devices. Static IPs ensure
stability, but because they never change, they are more open to security threats and make it easier for your identity
to get disclosed.
Typically, ISPs assign static IP addresses at an additional cost.
Other IP address types
In addition to the main types of IP addresses, there are other types that have specific purposes in network
communications and make gaming, streaming, and data-sharing processes easier.
Loopback IP address
Loopback IP addresses range from 127.0.0.0 to 127.255.255.255, with 127.0.0.1 used the most. This type of IP
address routes outgoing IP packets back to the same device for testing and diagnostic purposes.
When used in testing and development, loopback addresses help verify that a device’s network stack is operating
properly and isolate issues within the device. Loopback IP addresses also help during software testing, as they can
simulate network communication within the same device.
Automatic Private IP Addressing (APIPA)
APIPA is a feature available on Microsoft Windows operating systems. In case the DHCP server isn’t available,
APIPA acts as a failover and automatically assigns a private IP address (169.254.0.0 to 169.254.255.255) to a
device.
Automatic private IP addressing ensures communication between devices on the same network, even without a
DHCP server. APIPA also doesn’t require manual configuration, making it very convenient for small networks.
Multicast IP address
Multicast IP addresses (ranging from 224.0.0.0 to 239.255.255.255) are used to simultaneously send the same
data to a group of devices, thus reducing network traffic. This type of IP address is perfect for online gaming, live
video streaming, and other real-time applications.
Broadcast IP address
Broadcast IP addresses are special IP addresses used when data has to be sent to all devices on a network.
Usually, this type of IP address is used for network management purposes, like service discovery (e.g., locating
network printers) or sending out configuration updates.
Default gateway IP address
A default gateway IP address is your router’s (or other gateway device’s) IP address. This is the IP address
that connects your network to the internet.
Default gateway IP addresses are essential for network communications — when a device on your network wants to
communicate with a device or a service on an external network (such as the internet), it will send the data to the
default gateway, which will forward it to the appropriate destination.
IP ADDRESS CLASSES
In the IPv4 IP address space, there are five classes: A, B, C, D and E. Each class has a specific range of IP addresses
(and ultimately dictates the number of devices you can have on your network). Primarily, class A, B, and C are used
by the majority of devices on the Internet. Class D and class E are for special uses.
The list below shows the five available IP classes, along with the number of networks each can support and the
maximum number of hosts (devices) that can be on each of those networks. The four octets that make up an IPv4
address are conventionally represented by a.b.c.d - such as 127.10.20.30.
1. Class A
Class A addresses are for networks with large number of total hosts. Class A allows for 126 networks by using the
first octet for the network ID. The first bit in this octet, is always zero. The remaining seven bits in this octet
complete the network ID. The 24 bits in the remaining three octets represent the hosts ID and allows for
approximately 17 million hosts per network. Class A network number values begin at 1 and end at 127.
Public IP Range: 1.0.0.0 to 127.0.0.0
o First octet value ranges from 1 to 127
Private IP Range: 10.0.0.0 to 10.255.255.255
Subnet Mask: 255.0.0.0 (8 bits)
Number of Networks: 126
Number of Hosts per Network: 16,777,214
Class B
Class B addresses are for medium to large sized networks. Class B allows for 16,384 networks by using the first
two octets for the network ID. The first two bits in the first octet are always 1 0. The remaining six bits, together
with the second octet, complete the network ID. The 16 bits in the third and fourth octet represent host ID and
allows for approximately 65,000 hosts per network. Class B network number values begin at 128 and end at 191.
Public IP Range: 128.0.0.0 to 191.255.0.0
o First octet value range from 128 to 191
Private IP Range: 172.16.0.0 to 172.31.255.255
Subnet Mask: 255.255.0.0 (16 bits)
Number of Networks: 16,382
Number of Hosts per Network: 65,534
Class C
Class C addresses are used in small local area networks (LANs). Class C allows for approximately 2 million
networks by using the first three octets for the network ID. In a class C IP address, the first three bits of the first
octet are always 1 1 0. And the remaining 21 bits of first three octets complete the network ID. The last octet (8
bits) represent the host ID and allows for 254 hosts per network. Class C network number values begins at 192
and end at 223.
Public IP Range: 192.0.0.0 to 223.255.255.0
o First octet value range from 192 to 223
Private IP Range: 192.168.0.0 to 192.168.255.255
Special IP Range: 127.0.0.1 to 127.255.255.255
Subnet Mask: 255.255.255.0 (24 bits)
Number of Networks: 2,097,150
Number of Hosts per Network: 254
Class D
Class D IP addresses are not allocated to hosts and are used for multicasting. Multicasting allows a single host to
send a single stream of data to thousands of hosts across the Internet at the same time. It is often used for audio
and video streaming, such as IP-based cable TV networks. Another example is the delivery of real-time stock
market data from one source to many brokerage companies.
Range: 224.0.0.0 to 239.255.255.255
o First octet value range from 224 to 239
Number of Networks: N/A
Number of Hosts per Network: Multicasting
Class E
Class E IP addresses are not allocated to hosts and are not available for general use. These are reserved for
research purposes.
Range: 240.0.0.0 to 255.255.255.255
o First octet value range from 240 to 255
Number of Networks: N/A
Number of Hosts per Network: Research/Reserved/Experimental
Special IP Addresses
IP Range: 127.0.0.1 to 127.255.255.255 are network testing addresses (also referred to as loop-back addresses).
These are virtual IP address, in that they cannot be assigned to a device. Specifically, the IP 127.0.0.1 is often
used to troubleshoot network connectivity issues using the ping command. Specifically, it tests a computer's
TCP/IP network software driver to ensure it is working properly.