A computer network is a network of computer devices like computers
A computer network is a network of computer devices like computers
switches, or other related hardware’s that are interlinked with one another to
communicate and share resources, exchange data, and shared services.
Resource Sharing
The main goal of the computer network is Resource Sharing. It is to create all the programs,
data and hardware accessible to anyone on the network without considering the resource’s
physical area and the client.
Saving Money
The second goal of a computer network is saving money. Small computers have a much
excellent value proportion than higher ones. Mainframes are approximately a method ten
times quicker than the quickest single-chip microprocessors, but they cost a huge number of
times more.
This imbalance has made numerous system designers build systems, including dynamic
personal computers, one per customer, with data kept on at least one shared document server
machines. This objective prompts networks for specific computers situated in a similar
building, including a network is known as LAN (Local Area Network).
High Reliability
The third goal is to support high reliability by acquiring a different authority of supply. For
example, all files can be recreated on a few machines, and thus if one of them is nonexistent,
the additional copies could be available.
Improve Performance
The fourth goal of a computer network is to improve accessibility and the performance of the
system. A system’s performance can be improved by inserting one or more processors into it
as its workload grows.
For example, if the system is full, replacing it with a larger one at a large expense, it is better
to add more processors to it at less cost and less disruption to the user. This improves both
accessibilities as well as the performance of a system.
Communication Medium
The fifth goal of the computer network offers a powerful communication medium. The
different user on the network can immediately identify a document that has been refreshed on
a network.
1. Message
2. Sender
3. Receiver
4. Transmission Medium
5. Set of rules (Protocol)
2. Sender
To transfer message from source to destination, someone must be there who will play
role of a source. Sender plays part of a source in data communication system. It is
simple a device that sends data message. The device could be in form of a computer,
mobile, telephone, laptop, video camera, or a workstation, etc.
3. Receiver
It is destination where finally message sent by source has arrived. It is a device that
receives message. Same as sender, receiver can also be in form of a computer, telephone
mobile, workstation, etc.
4. Transmission Medium
In entire process of data communication, there must be something which could act as
a bridge between sender and receiver, Transmission medium plays that part. It is physical
path by which data or message travels from sender to receiver. Transmission medium could
be guided (with wires) or unguided (without wires), for example, twisted pair cable, fiber
optic cable, radio waves, microwaves, etc.
To govern data communications, various sets of rules had been already designed by the
designers of the communication systems, which represent a kind of agreement between
communicating devices. These are defined as protocol. In simple terms, the protocol is a
set of rules that govern data communication. If two different devices are connected but
there is no protocol among them, there would not be any kind of communication
between those two devices. Thus the protocol is necessary for data communication to
take place.
A typical example of a data communication system is sending an e-mail. The user which
send email act as sender, message is data which user wants to send, receiver is one whom
user wants to send message, there are many protocols involved in this entire process, one of
them is Simple Mail Transfer Protocol (SMTP) , both sender and receiver must have an
internet connection which uses a wireless medium to send and receive email.
These networks can be built using geographical scope and the medium of connection (wired
or wireless). A computer network allows to access network, file sharing, printing and
collaboration between users at a time. Computer networks can be designed using network
topologies (star, bus, ring, mesh) and protocols (TCP/IP, Ethernet, Wi-Fi) depending on the
specific requirements and constraints of the environment they serve.
As its name implies, A LAN is a network which is limited to local area only for example
home, office building, school, or campus. Hence, any network that exists within a single
building, or even a group of adjacent buildings, is considered as LAN. It is often used to
connect separate LANs together so they can communicate and exchange data. In a LAN,
limited computer and networking devices are connected because its geographical area is
small; it is specifically design for shorter distance and used for sharing resources like files,
printers, and internet connections among connected devices; the devices are physically
connected with cables in wired LAN while in wireless LAN; devices are connected using
wireless media.
Overall, LANs are essential for communication, sharing of resources and communication
between devices within a given area and facilitate its users for file sharing, printing,
multimedia and streaming, which are common tasks for commercial and home networks.
Characteristics of LANs
Limited Geographic Area − A LAN network is dedicated for small area like a single
building, campus, school, hospital.
High Data Transfer Rates − A LAN network covers a short distance so the data transmits
with high speed as compare to MANs and WANs.
Ownership and Control − Because of its local network and small size; they are owned,
controlled, and managed by individuals or organizations with full control over the network,
access and security policies.
Connectivity − Generally, A LAN connects using Ethernet cables, Wi-Fi, or both.
Topology − It’s a method to making a LAN; some common topologies are bus, star, ring, or
mesh.
Characteristics of MANs
Scalability − MANs are scalable networks, whenever network needs to span, MANs can be
expanded or upgraded.
Reliability and Redundancy − MANs use redundant network components and backup
solutions to reduce network failure and down network. In case of equipment failure or
network disturbances, alternate network paths, backup power sources, and failover processes
preserve network availability.
Support for Various Technologies − MANs support network technologies like Ethernet,
fiber optics, wireless communication, and microwave links.
Service Provisioning − A MAN provides services to its users like network access, data
transfer, voice communication, video conferencing, and cloud services.
Security Measures − MANs implement security measures to protect network resources, data
and communications from unauthorized access, cyber threats, and other security risks.
Overall, MANs are well-suited to providing fast, reliable, and scalable connectivity to users
and organisations in metropolitan regions, allowing for efficient communication,
collaboration, and access to network resources.
A network which combines multiple MANs and LANs is known as Wide Area Network; a
WAN network covers wide geographical area typically covering multiple cities, regions,
countries, or even continents.
Example
A company may have its corporate headquarters and manufacturing plant located in one city
and marketing office in another city. Each site needs resources, data and programs locally,
but it also needs to share data with other sites. To accomplish this, the company can attach
devices that connect over public utilities to create a WAN.
Characteristics of WANs
Large Geographical Coverage − WANs includes cities, regions, and countries network and
span it over the time as per the requirements increases. This covers worldwide geographical
coverage.
Interconnection of LANs − WANs interconnect geographically dispersed LANs. Users in
one area can communicate with another whose location is different as well as access
resources located in other locations.
Use of Public and Private Telecommunication Infrastructure − WANs use leased lines,
fibre optic cables, satellite links, and microwave links. The WAN's infrastructure allows
long-distance data transfer.
High Bandwidth and Long-Distance Communication − WANs provide quick data transfer
and communication across vast distances with high-bandwidth connectivity. WAN bandwidth
and speed depend on transmission medium and network technology.
Multiprotocol Support − To fulfil communication needs, WANs enable multiple
networking protocols and technologies. It includes TCP/IP, MPLS, Frame Relay, ATM etc.
Centralized Management and Control − WANs use centralised administration and control
to optimise performance, manage network resources, and enforce security regulations across
different locations. Centralised management ensures network efficiency and consistency.
Security Considerations − Encryption, virtual private networks (VPNs), firewalls, intrusion
detection/prevention systems (IDS/IPS), and access control mechanisms are the security
measures used by WANs to protect data and network resources against cyber threats and
unauthorised access.
Scalability and Flexibility − WANs are flexible and scalable, allows network growth, traffic
volume, and new locations or users. WAN technologies can meet changing business needs
and technology development.
Computer networks can be classified based on architecture into two primary types:
Peer-to-Peer Architecture
Client/Server Architecture
Types of
Network Architecture
What is Peer-to-Peer Architecture?
In the P2P (Peer-to-Peer) network, “peers” generally represent computer system. These
peers are connected to each other with help of Internet. Files might be shared directly
without requirement of central server among these systems on the network. It can be said
that each of computers on P2P network usually becomes file server even as client also.
In this architecture, system is generally decomposed into various computational nodes that
contain the same and equivalent capabilities, abilities, and responsibilities. In this network,
tasks are allocated at each and every device available on network. This network is very
essential and important for small environments, usually up to at least 10 computers. There
is also no separate division as clients and servers. Each and every computer in this network
are treated same and equally and might send even receive message directly. This P2P
network is generally useful in various fields such as business, education, military, etc.
Peer-to-Peer Architecture
Advantages of Peer-to-Peer Architecture
Client/
Server Architecture
What is Protocol?
A protocol is simply defined as a set of rules and regulations for data communication. Rules
are defined for every step and process at the time of communication among two or more
computers. Networks are needed to follow these protocols to transmit the data successfully.
All protocols might be implemented using hardware, software, or a combination of both of
them. There are three aspects of protocols given below:
Syntax – It is used to explain the data format that is needed to be sent or received.
Semantics – It is used to explain the exact meaning of each of the sections of bits that
are usually transferred.
Timings – This is used to explain the exact time at which data is generally transferred
along with the speed at which it is transferred.
Protocol Hierarchies
Generally, Computer networks are comprised of or contain a large number of hardware and
software. For network design, various networks are organized and arranged as a stack of
layers of hardware and software, one on top of another. The number, name, content, and
function of each layer might vary and can be different from one network to another. The
main purpose of each layer is to provide services to higher layers that are present. Every
layer has some particular task or function. The networks are organized and arranged as
different layers or levels simply to reduce and minimize the complexity of the design of
network software.
The OSI (Open Systems Interconnection) Model is a set of rules that explains how
different computer systems communicate over a network. OSI Model was developed by
the International Organization for Standardization (ISO). The OSI Model consists of 7
layers and each layer has specific functions and responsibilities. This layered approach
makes it easier for different devices and technologies to work together. OSI Model provides
a clear structure for data transmission and managing network issues. The OSI Model is
widely used as a reference to understand how network systems function.
Physical Layer
The data link layer is responsible for the node-to-node delivery of the message. The main
function of this layer is to make sure data transfer is error-free from one node to another,
over the physical layer. When a packet arrives in a network, it is the responsibility of the
DLL to transmit it to the Host using its MAC address. Packet in the Data Link layer is
referred to as Frame. Switches and Bridges are common Data Link Layer devices.
The packet received from the Network layer is further divided into frames depending on the
frame size of the NIC Network Interface Card DLL also encapsulates Sender and
Receiver’s MAC address in the header.
The Receiver’s MAC address is obtained by placing an ARP (Address Resolution Protocol)
request onto the wire asking, “Who has that IP address?” and the destination host will reply
with its MAC address.
Framing: Framing is a function of the data link layer. It provides a way for a sender to
transmit a set of bits that are meaningful to the receiver. This can be accomplished by
attaching special bit patterns to the beginning and end of the frame.
Physical Addressing: After creating frames, the Data link layer adds physical addresses
(MAC addresses) of the sender and/or receiver in the header of each frame.
Error Control: The data link layer provides the mechanism of error control in which it
detects and retransmits damaged or lost frames.
Flow Control: The data rate must be constant on both sides else the data may get
corrupted thus; flow control coordinates the amount of data that can be sent before
receiving an acknowledgment
The network layer works for the transmission of data from one host to the other located in
different networks. It also takes care of packet routing i.e. selection of the shortest path to
transmit the packet, from the number of routes available. The sender and receiver’s
IP address are placed in the header by the network layer. Segment in the Network layer is
referred to as Packet. Network layer is implemented by networking devices such as routers
and switches
Routing: The network layer protocols determine which route is suitable from source to
destination. This function of the network layer is known as routing.
Logical Addressing: To identify each device inter-network uniquely, the network layer
defines an addressing scheme. The sender and receiver’s IP addresses are placed in the
header by the network layer. Such an address distinguishes each device uniquely and
universally.
At the sender’s side, the transport layer receives the formatted data from the upper layers,
performs Segmentation, and also implements Flow and error control to ensure proper
data transmission. It also adds Source and Destination port number in its header and
forwards the segmented data to the Network Layer.
Generally, this destination port number is configured, either by default or manually. For
example, when a web application requests a web server, it typically uses port number 80,
because this is the default port assigned to web applications. Many applications have
default ports assigned.
At the Receiver’s side, Transport Layer reads the port number from its header and
forwards the Data which it has received to the respective application. It also performs
sequencing and reassembling of the segmented data.
Segmentation and Reassembly: This layer accepts the message from the (session) layer
and breaks the message into smaller units. Each of the segments produced has a header
associated with it. The transport layer at the destination station reassembles the message.
Service Point Addressing: To deliver the message to the correct process, the transport
layer header includes a type of address called service point address or port address.
Thus, by specifying this address, the transport layer makes sure that the message is
delivered to the correct process.
Connection-Oriented Service
Connectionless Service
Layer 5 – Session Layer
Session Layer in the OSI Model is responsible for the establishment of connections,
management of connections, terminations of sessions between two devices. It also provides
authentication and security. Protocols used in the Session Layer are NetBIOS, PPTP.
Session Establishment, Maintenance, and Termination: The layer allows the two
processes to establish, use, and terminate a connection.
Synchronization: This layer allows a process to add checkpoints that are considered
synchronization points in the data. These synchronization points help to identify the
error so that the data is re-synchronized properly, and ends of the messages are not cut
prematurely, and data loss is avoided.
Dialog Controller: The session layer allows two systems to start communication with
each other in half-duplex or full duplex.
Example
Let us consider a scenario where a user wants to send a message through some Messenger
application running in their browser. The “Messenger” here acts as the application layer
which provides the user with an interface to create the data. This message or so-
called Data is compressed, optionally encrypted (if the data is sensitive), and converted
into bits (0’s and 1’s) so that it can be transmitted.
The presentation layer is also called the Translation layer. The data from the application
layer is extracted here and manipulated as per the required format to transmit over the
network. Protocols used in the Presentation Layer are JPEG, MPEG, GIF, TLS/SSL, etc.
Functions of the Presentation Layer
At the very top of the OSI Reference Model stack of layers, we find the Application layer
which is implemented by the network applications. These applications produce the data to
be transferred over the network. This layer also serves as a window for the application
services to access the network and for displaying the received information to the user.
Protocols used in the Application layer are SMTP, FTP, DNS, etc.
Application Layer
When we transfer information from one device to another, it travels through 7 layers of OSI
model. First data travels down through 7 layers from the sender’s end and then climbs back
7 layers on the receiver’s end.
Data Link Layer: Packets are framed and sent to the next device.
Physical Layer: Frames are converted into bits and transmitted physically.
Each layer adds specific information to ensure the data reaches its destination correctly, and
these steps are reversed upon arrival.
We can understand how data flows through OSI Model with the help of an example
mentioned below.
Step 1: Person A interacts with e-mail application like Gmail, outlook, etc. Writes his
email to send. (This happens at Application Layer).
Step 2: At Presentation Layer, Mail application prepares for data transmission like
encrypting data and formatting it for transmission.
Step 3: At Session Layer, there is a connection established between the sender and
receiver on the internet.
Step 4: At Transport Layer, Email data is broken into smaller segments. It adds sequence
number and error-checking information to maintain the reliability of the information.
Step 5: At Network Layer, addressing of packets is done in order to find the best route for
transfer.
Step 6: At Data Link Layer, data packets are encapsulated into frames, then MAC address
is added for local devices and then it checks for error using error detection.
Step 7: At Physical Layer, Frames are transmitted in the form of electrical/ optical signals
over a physical network medium like ethernet cable or WiFi.
After the email reaches the receiver i.e. Person B, the process will reverse and decrypt the
e-mail content. At last, the email will be shown on Person B email client.
Please refer the below animation for detailed flow.
Protocols Used in the OSI Layers
Protocol Data
Layer Working Unit Protocols
Establishing Physical
1 – Physical
Connections between Bits USB, SONET/SDH, etc.
Layer
Devices.
Transmission of data
3 – Network from one host to another, IP, ICMP, IGMP, OSPF,
Packets
Layer located in different etc.
networks.
Authentication and
Ensures security.
The OSI Model matters because it provides the user a clear structure of “how the data
moves in the network?”. As the OSI Model consists of 7 layers, each layer has its specific
role, and due to which it helps in understanding, identifying and solving the complex
network problems easily by focusing on one of the layers not the entire network.
As the modern Internet does not prefer the OSI Model, but still, the OSI Model is still very
helpful for solving network problems. It helps people understanding network concepts very
easily.
OSI stands for Open Systems TCP/IP stands for Transmission Control
Interconnection. Protocol/Internet Protocol.
In the OSI model, only layers 1, 2 and 3 All layers of the TCP/IP model are needed
are necessary for data transmission. for data transmission.
Protocols at each layer are independent of Layers are integrated; some layers are
the other layer. required by other layers of TCP/IP model.
OSI Model is a conceptual framework, less Widely used in actual networks like Internet
OSI Model TCP/IP Model
OSI vs TCP/IP
The OSI Model defines the communication of a computing system into 7 different layers.
Its advantages include:
It divides network communication into 7 layers which makes it easier to understand and
troubleshoot.
It standardizes network communications, as each layer has fixed functions and protocols.
Diagnosing network problems is easier with the OSI model.
It is easier to improve with advancements as each layer can get updates separately.
The OSI Model has seven layers, which can be complicated and hard to understand for
beginners.
In real-life networking, most systems use a simpler model called the Internet protocol
suite (TCP/IP), so the OSI Model is not always directly applicable.
Each layer in the OSI Model adds its own set of rules and operations, which can make
the process more time-consuming and less efficient.
The OSI Model is more of a theoretical framework, meaning it’s great for understanding
concepts but not always practical for implementation.
Connection-oriented services involve setting up a dedicated path between the source and
destination before data transfer begins. These services ensure that data is delivered in the
correct sequence and without errors. In a connection-oriented service,
the Handshake method is used to establish the connection between sender and
receiver. Before data transmission starts, connection-oriented services create a dedicated
communication channel between the sender and the recipient. As the connection is kept
open until all data is successfully transferred, this guarantees dependable data delivery. One
example is TCP (Transmission Control Protocol), which ensures error-free and accurate
data packet delivery.
Higher Latency: Establishing a connection adds latency before data transfer begins.
More Overhead: Requires more resources for maintaining the connection,
acknowledgments, and retransmissions.
Less Efficient for Small Transfers: For short messages, the overhead of connection
setup can outweigh the benefits.
Connectionless services send data without establishing a dedicated connection between the
source and destination. Each data packet is treated independently, and there is no guarantee
of delivery or sequencing. Connection-less Service does not give a guarantee of reliability.
In this, Packets do not follow the same path to reach their destination. Connectionless
Services deliver individual data packets without first making a connection. Since each
packet is sent separately, delivery, order, and mistake correction cannot be guaranteed. As a
result, the service is quicker but less dependable. UDP (User Datagram Protocol) is one
example, which is frequently used for streaming where dependability is not as important as
speed.
Connection-oriented services, like TCP, ensure reliable data transfer, while connection-less
services, like UDP, offer faster, less secure communication.
Includes error detection, correction, and No error handling; errors are not
retransmission. corrected.
Ensures data is delivered in the correct order. Data may arrive out of order or not at all.
Less scalable due to the need for maintaining Highly scalable for large networks with
connections. many users.
Connection-oriented Service Connection-less Service
Ex: TCP (Transmission Control Protocol) Ex: UDP (User Datagram Protocol)
Conclusion
Both connection-oriented and connectionless services are essential for modern networking,
each suited to different applications:
Protocol Hierarchies
TCP/IP Model
Last Updated : 05 Feb, 2025
Whenever we want to send something over the internet using the TCP/IP
Model, the TCP/IP Model divides the data into packets at the sender’s end and
the same packets have to be recombined at the receiver’s end to form the
same data, and this thing happens to maintain the accuracy of the data.
TCP/IP model divides the data into a 4-layer procedure, where the data first
go into this layer in one order and again in reverse order to get organized in
the same way at the receiver’s end.
For more, you can refer to TCP/IP in Computer Networking.
Layers of TCP/IP Model
Application Layer
Transport Layer(TCP/UDP)
Network/Internet Layer(IP)
Network Access Layer
The diagrammatic comparison of the TCP/IP and OSI model is as follows:
This layer parallels the functions of OSI’s Network layer. It defines the
protocols which are responsible for the logical transmission of data over the
entire network. The main protocols residing at this layer are as follows:
IP:IP stands for Internet Protocol and it is responsible for delivering
packets from the source host to the destination host by looking at the IP
addresses in the packet headers. IP has 2 versions: IPv4 and IPv6. IPv4 is
the one that most websites are using currently. But IPv6 is growing as the
number of IPv4 addresses is limited in number when compared to the
number of users.
ICMP:ICMP stands for Internet Control Message Protocol. It is encapsulated
within IP datagrams and is responsible for providing hosts with information
about network problems.]
ARP:ARP stands for Address Resolution Protocol. Its job is to find the
hardware address of a host from a known IP address. ARP has several
types: Reverse ARP, Proxy ARP, Gratuitous ARP, and Inverse ARP.
The Internet Layer is a layer in the Internet Protocol (IP) suite, which is the
set of protocols that define the Internet. The Internet Layer is responsible for
routing packets of data from one device to another across a network. It does
this by assigning each device a unique IP address, which is used to identify
the device and determine the route that packets should take to reach it.
Example: Imagine that you are using a computer to send an email to a
friend. When you click “send,” the email is broken down into smaller packets
of data, which are then sent to the Internet Layer for routing. The Internet
Layer assigns an IP address to each packet and uses routing tables to
determine the best route for the packet to take to reach its destination. The
packet is then forwarded to the next hop on its route until it reaches its
destination. When all of the packets have been delivered, your friend’s
computer can reassemble them into the original email message.
In this example, the Internet Layer plays a crucial role in delivering the email
from your computer to your friend’s computer. It uses IP addresses and
routing tables to determine the best route for the packets to take, and it
ensures that the packets are delivered to the correct destination. Without the
Internet Layer, it would not be possible to send data across the Internet.
3. Transport Layer
The Transport layer in TCP/IP does not In the OSI model, the transport layer
provide assurance delivery of packets. provides assurance delivery of packets.
Conclusion
In conclusion, the TCP/IP model is the backbone of modern internet
communication, allowing different devices and networks to connect and
share information reliably. Despite some complexity and security concerns,
its flexibility, scalability, and widespread adoption make it essential for both
small and large networks. Overall, the TCP/IP model is crucial for ensuring
efficient and effective network communication.