UCI 102 Lesson Notes
UCI 102 Lesson Notes
-Key Components:
Resource Sharing: Allowing devices to access and utilize shared resources such as files,
printers, and applications.
Services Delivery: Ensuring that network services (e.g., email, web services) are available
and accessible to users as needed.
Importance: The network should not only enable connectivity and communication but also
provide the necessary resources and services to support the activities and requirements of
users and applications.
The term Internet was coined by Vinton Cerf, Yogen Dalal and Carl Sunshine of Stanford
University to describe this network of networks. Together they also developed protocols to
facilitate information exchange over the Internet. Transmission Control Protocol (TCP) still
forms the backbone of networking.
Telenet
Telenet was the first commercial adaptation of ARPANET introduced in 1974. With this the
concept of Internet Service Provider (ISP) was also introduced. The main function of an ISP is
to provide uninterrupted Internet connection to its customers at affordable rates.
World Wide Web
With commercialization of internet, more and more networks were developed in different
part of the world. Each network used different protocols for communicating over the
network. This prevented different networks from connecting together seamlessly. In the
1980s, Tim Berners-Lee led a group of Computer scientists at CERN, Switzerland, to create a
seamless network of varied networks, called the World Wide Web (WWW).
World Wide Web is a complex web of websites and web pages connected together through
hypertexts. Hypertext is a word or group of words linking to another web page of the same or
different website. When the hypertext is clicked, another web page opens.
4
The evolution from ARPANET to WWW was possible due to many new achievements by
researchers and computer scientists all over the world. Here are some of those developments
–
Year Milestone
1957
Advanced Research Project Agency formed by US
1969
ARPANET became functional
1970
ARPANET connected to BBNs
1972
Roy Tomlinson develops network messaging or E-
mail. Symbol @ comes to mean "at"
1973 APRANET connected to Royal Radar Network of
Norway
1974 Term Internet coined
First commercial use of ARPANET, Telenet, is
approved
1982 TCP/IP introduced as standard protocol on ARPANET
1983 Domain Name System introduced
1986 National Science Foundation brings connectivity to
more people with its NSFNET program
1990 ARPANET decommissioned
First web browser Nexus developed
HTML developed
2002-2004 Web 2.0 is born
Advantages of LAN
• Computer resources like hard-disks, and printers can share local area networks.
• You can use the same software over the network instead of purchasing a licensed
software for each client on the network.
• Data of all network users can be stored on a single hard disk of the server computer.
• You can easily transfer data over networked computers.
• It will be easy to manage data at only one place, which makes the data more secure.
• Local Area Network offers the facility to share a single internet connection among all
the LAN users.
Disadvantages of LAN
• The initial setup cost of Local Area Networks is quite high.
• The LAN admin can check personal data files of every LAN user, so it does not offer
good privacy.
• Unauthorized users can access critical data of an organization in case LAN admin is not
able to secure centralized data repository.
2. Wide Area Network (WAN):
Scope: Spans a large geographic area, often connecting LANs across cities, countries, or
continents.
Purpose: Enables long-distance communication and connectivity for organizations with
multiple locations.
6
Advantages of WAN
• It covers a large geographical area. Therefore business offices far apart can easily
communicate.
• WLAN connections work using radio transmitters and receivers built into client
devices.
Disadvantage of WAN
• The initial setup cost of investment is very high.
• There are more errors and issues because of the wide coverage and the use of
different technologies.
• It requires more time to resolve issues because of the involvement of multiple wired
and wireless technologies.
• Offers lower security compared to other types of networks.
3. Metropolitan Area Network (MAN):
Scope: Covers a larger geographical area than a LAN but is smaller than a WAN, typically
serving a city or metropolitan region.
Purpose: Connects multiple LANs within a city to provide high-speed data transfer.
Advantages of MAN
• It offers fast communication using high-speed carriers, like fiber optic cables.
• It provides excellent support for an extensive big network and greater access .
Disadvantages of MAN
• You need more cable to establish MAN connection from one place to another.
• In MAN network it is tough to make the system secure from hackers
7
Network components can be classified into Hardware, Software protocols and network
operating systems; and Transmission media.
a) Hardware Components
1. Server
1. Definition of a Server:
- A server is a computer or a software system
that provides services or resources to other
computers, known as clients, over a network.
2. Server Hardware:
- Servers are typically equipped with higher processing power, memory, and storage
capacity compared to regular desktop computers.
- Common server types include web servers, file servers, database servers, and application
servers.
3. Server Operating Systems:
- Servers often run specialized operating systems optimized for stability and performance.
Examples include Windows Server, Linux distributions (e.g., Ubuntu Server, CentOS), and
Unix-based systems (e.g., FreeBSD).
4. Server Roles and Functions:
- Web Server: Serves web content to users' browsers (e.g., Apache, Nginx, Microsoft IIS).
- File Server: Stores and manages files and documents for client access.
- Database Server: Stores and manages databases and provides data access services.
- Mail Server: Handles email communication (e.g., Microsoft Exchange, Postfix, Sendmail).
- DNS Server: Resolves domain names to IP addresses (e.g., BIND, Windows DNS).
- Application Server: Hosts and manages applications for client access (e.g., Java EE, .NET).
2. Router
10
3. Firewall
A Firewall is a network security device that
monitors and filters incoming and outgoing
network traffic based on an organization's
previously established security policies. At its
most basic, a firewall is essentially the barrier
that sits between a private internal network
and the public Internet.
There are three basic types of firewalls that are
used by companies to protect their data &
devices to keep destructive elements out of network, viz. Packet Filters, Stateful Inspection
and Proxy Server Firewalls. Let us give you a brief introduction about each of these.
• Packet Filters
Packet Filter Firewall controls the network access by analyzing the outgoing and incoming
packets. It lets a packet pass or block its way by comparing it with pre-established criteria like
allowed IP addresses, packet type, port number, etc. Packet filtering technique is suitable for
small networks but gets complex when implemented to larger networks. It is to be noted that
these types of firewalls cannot prevent all types of attacks. They can neither tackle the attacks
that use application layers vulnerabilities nor can fight against spoofing attacks.
• Stateful Inspection
Stateful Packet Inspection (SPI), which is also sometimes called dynamic packet filtering, is a
powerful firewall architecture which examines traffic streams from end to end. These smart
and fast firewalls use an intelligent way to ward off the unauthorized traffic by analyzing the
packet headers and inspecting the state of the packets along with providing proxy services.
These firewalls works at the network layer in the OSI model and are more secured than the
basic packet filtering firewalls.
• Proxy Server Firewalls
Also called the application level gateways, Proxy Server Firewalls are the most secured type of
firewalls that effectively protect the network resources by filtering messages at the
application layer. Proxy firewalls mask your IP address and limit traffic types. They provide a
complete and protocol-aware security analysis for the protocols they support. Proxy Servers
offers the best Internet experience and results in the network performance improvements.
4. Switch
Switches are networking devices operating at layer 2 or a data link layer of the OSI model.
They connect devices in a network and use packet switching to send, receive or forward data
packets or data frames over the network.
A switch has many ports, to which several network devices can be plugged in including
i. Computers (desktops, laptops)
12
Features of Switches
• A switch operates in the layer 2, i.e. data link layer of the OSI model.
• It is an intelligent network device that can be conceived as a multiport network bridge.
• It uses MAC addresses (addresses of medium access control sublayer) to send data
packets to selected destination ports.
• It uses packet switching technique to receive and forward data packets from the
source to the destination device.
• It is supports unicast (one-to-one), multicast (one-to-many) and broadcast (one-to-all)
communications.
• Transmission mode is full duplex, i.e. communication in the channel occurs in both the
directions at the same time. Due to this, collisions do not occur.
• Switches are active devices, equipped with network software and network
management capabilities.
13
• Switches can perform some error checking before forwarding data to the destined
port.
• The number of ports is higher – 24/48.
Types of Switches
There are variety of switches that can be broadly categorised into 4 types –
devices connected to it can receive both electricity as well as data over the same line.
PoE switches offer greater flexibility and simplifies the cabling connections
5. Network Interface card (NIC)
A network interface card (NIC) is a hardware component without which a computer cannot be
connected over a network. It is a circuit board installed in a computer that provides a
dedicated network connection to the computer. It is also called network interface controller,
network adapter or LAN adapter.
Purpose
NIC allows both wired and wireless communications.
NIC allows communications between computers connected via local area network (LAN) as
well as communications over large-scale network through Internet Protocol (IP).
NIC is both a physical layer and a data link layer device, i.e. it provides the necessary hardware
circuitry so that the physical layer processes and some data link layer processes can run on it.
11. Faceplate
Faceplate is a cabling fixture attached to a wall in a work area for
connecting computers to the network. Also called a faceplate. They are the
ideal solution wherever back-box depth is a problem. Face plates present
outlet modules where PCs, phones & other devices will be connected.
12. Pattress box
17
Patress box is the container for the space behind electrical fittings
such as power outlet sockets, light switches, or fixed light fixtures.
Pattresses may be designed for either surface mounting (with cabling
running along the wall surface) or for embedding in the wall or
skirting board.
13. Cable Trunking
Cable trunking is an enclosure used to keep your cabling tidy and hidden way. The tough
white plastic hollow casing of the cable trunk is used in cable management, organizing all the
cabling you have running about the workplace. Two types of Trunking are metttalic ie
Aluminium, Stainless Steel, galvanised steel and other metals and plastic i.e. PVC and other
plastic trunking.
14. Media converter
A media converter is a networking device that
connects two different media, like Ethernet copper and
Ethernet fiber.
DHCP assigns IP addresses to network endpoints so they can communicate with other
network endpoints over IP. Whenever a device joins a network with a DHCP server for the
first time, DHCP automatically assigns it a new IP address and continues to do so each time a
device moves locations on the network. When a device connects to a network, a DHCP
handshake takes place. In this handshake process, the device and DHCP server communicate
using the following steps:
The device establishes a connection.
The server receives the connection and provides available IP addresses.
The device requests an IP address.
The server confirms the address to complete the process.
Another form of HTTP is HTTPS, which stands for HTTP over Secure Sockets Layer or HTTP
Secure. HTTPS can encrypt a user's HTTP requests and webpages. This provides more security
to users and can prevent common cybersecurity threats, such as man-in-the-middle attacks.
7. Internet Protocol (IP)
IP functions similarly to a postal service. When users send and receive data from their device,
the data gets spliced into packets. Packets are like letters with two IP addresses: one for the
sender and one for the recipient. After the packet leaves the sender, it goes to a gateway, like
a post office, that directs it in the proper direction. Packets continue to travel through
gateways until they reach their destinations. IP is commonly paired with TCP to form TCP/IP,
the overall internet protocol suite. Together, IP sends packets to their destinations, and TCP
arranges the packets in the correct order, as IP sometimes sends packets out of order to
ensure the packets travel the fastest ways.
8. Open Shortest Path First (OSPF)
OSPF works with IP to send packets to their destinations. IP aims to send packets on the
quickest route possible, which OSPF is designed to accomplish. OSPF opens the shortest, or
quickest, path first for packets. It also updates routing tables -- a set of rules that control
where packets travel -- and alerts routers of changes to the routing table or network when a
change occurs. OSPF is similar to and supports Routing Information Protocol, which directs
traffic based on the number of hops it must take along a route, and it has also replaced RIP in
many networks. OSPF was developed as a more streamlined and scalable alternative to RIP.
For example, RIP sends updated routing tables out every 30 seconds, while OSPF sends
updates only when necessary and makes updates to the particular part of the table where the
change occurred
9. Simple Mail Transfer Protocol (SMTP)
SMTP is the most popular email protocol, is part of the TCP/IP suite and controls how email
clients send users' email messages. Email servers use SMTP to send email messages from the
client to the email server to the receiving email server. However, SMTP doesn't control how
email clients receive messages -- just how clients send messages. That said, SMTP requires
other protocols to ensure email messages are sent and received properly. SMTP can work
with Post Office Protocol 3 or Internet Message Access Protocol, which control how an email
server receives email messages.
10. Telnet
Telnet is designed for remote connectivity, and it establishes connections between a remote
endpoint and a host machine to enable a remote session. Telnet prompts the user at the
remote endpoint to log on. Once the user is authenticated, Telnet gives the endpoint access
to network resources and data at the host computer. Telnet has existed since the 1960s and
was arguably the first draft of the modern internet. However, Telnet lacks sophisticated
security protections required for modern communications and technology, so it isn't
commonly used anymore.
22
- User Authentication: It provides mechanisms to authenticate users and control their access
to network resources.
3. Characteristics:
- Distributed Processing: NOS enables distributed processing, allowing multiple computers
to work together seamlessly.
- Concurrency: It supports concurrent access to resources, allowing multiple users to use the
network simultaneously.
- Scalability: NOS is designed to scale with the growth of the network, accommodating an
increasing number of users and devices.
4. Examples of NOS:
- Novell NetWare: A pioneering NOS known for its early dominance in the market, providing
file and print services.
- Microsoft Windows Server: Windows Server editions act as network operating systems,
offering a range of networking services.
- Linux/Unix: These operating systems can function as network operating systems, providing
robust networking capabilities.
5. Services Provided:
- File and Print Services: NOS facilitates the sharing of files and printers across the network.
- Security Services: Authentication, authorization, and encryption services help secure
network resources.
- Directory Services: Many NOS include directory services for centralized management of
user accounts and network resources.
c) Transmission Media
There are three types of transmission media namely Copper media, optical media and
wireless media.
i) Copper media
a) Coaxial cable
Coaxial cable is used to transmit electrical signals, such as radio frequency (RF) signals, video
signals, and data signals.
A coaxial cable consists of four main parts:
- A central/copper conductor, which is typically a solid or stranded copper wire.
-A plastic insulator, which is a dielectric material that separates the central conductor from
the outer shield.
24
- Braided copper shielding, which is a braided or foil conductor that surrounds the insulator.
- Outer jacket, which is a non-conducting outer layer that protects the cable from damage.
- Coaxial cable can be more expensive than some other types of cables.
Applications:
Coaxial cable is used in a variety of applications, including:
-Cable television, Satellite television, Broadband internet, Radio communications, Computer
networks and Medical imaging.
b) Twisted Pair cables
Twisted pair cables are the workhorses of the networking world, carrying everything from
phone calls to internet data.
They are insulated copper wires twisted together in pairs.
Each pair acts as a single circuit, reducing interference from other pairs and external sources.
Advantages of Twisted pairs:
Affordable and easy to install.
Durable and reliable.
Supports high data rates with higher categories.
Disadvantages
Susceptible to interference in high-noise environments (UTP).
Limited range compared to fiber optic cables.
Come in two main types:
i) Unshielded Twisted Pair (UTP): More affordable, suitable for most home and office
networks. (e.g., Cat5e, Cat6)
• The transmit pin of the source needs to ultimately connect to the receiving pin of the
destination.
ii) Shielded Twisted Pair (STP): Offers extra protection against interference, used in industrial
or high-noise environments.
• The cable that connects from the switch port to the computer NIC port is called a
straight-through cable.
• The cable that connects from one switch port to another switch port is called a
crossover cable.
• The cable that connects the RJ-45 adapter on the com port of the computer to the
console port of the router or switch is called a rollover cable.
ii Optical Media
The electromagnetic spectrum
The electromagnetic spectrum is the incredible range of all types of electromagnetic
radiation, encompassing everything from radio waves to gamma rays. Imagine it as a giant
rainbow, but instead of colors, it has different types of energy based on wavelength and
frequency. Here's a quick overview:
What it is:
All forms of electromagnetic radiation, which carries energy through space without needing
matter.
Organized by wavelength (distance between peaks) or frequency (number of peaks passing a
point per second).
Spans a vast range, from extremely long radio waves (kilometers) to tiny gamma rays (smaller
than atoms).
Key regions:
Radio waves: Longest wavelengths, used for radio, TV, cell phones.
Microwaves: Heat food, Wi-Fi, satellite communication.
Infrared (IR): Night-vision goggles, remote controls, thermal imaging.
Visible light: The rainbow we see, essential for vision and plants.
Ultraviolet (UV): Sunburns, tanning beds, sterilizing equipment.
X-rays: Medical imaging, security scanners, astronomy.
Gamma rays: Highly energetic, used in cancer treatment, astronomy.
Applications:
Communication: Radio, TV, internet, cell phones.
Medicine: X-rays, radiation therapy, medical imaging.
Science: Studying objects in space, understanding the universe.
Security: Airport scanners, baggage checks.
Heating: Microwaves, ovens.
28
• The core is the light transmission element at the center of the optical fiber. All the
light signals travel through the core.
• Cladding is also made of silica but with a lower index of refraction than the core. Light
rays traveling through the fiber core reflect off this core-to-cladding interface as they move
through the fiber by total internal reflection.
• Surrounding the cladding is a buffer material that is usually plastic. The buffer material
helps shield the core and cladding from damage.
• The strength material surrounds the buffer, preventing the fiber cable from being
stretched when installers pull it. The material used is often Kevlar, the same material used to
produce bulletproof vests.
• The outer jacket surrounds the cable to protect the fiber against abrasion, solvents,
and other contaminants.
29
There are 2 types of fiber optic cables: Single mode and multimode.
Higher
•
bandwidth.
If the diameter of the core of the fiber is large enough so that there are many paths
that light can take through the fiber, the fiber is called “multimode” fiber.
• Single-mode fiber has a much smaller core that only allows light rays to travel along
one mode inside the fiber.
• Every fiber-optic cable used for networking consists of two glass fibers encased in
separate sheaths.
• One fiber carries transmitted data from device A to device B.
• The second fiber carries data from device B to device A.
• This provides a full-duplex communication link.
• Typically, these two fiber cables will be in a single outer jacket until they reach the
point at which connectors are attached.
30
Advantages:
Mobility and flexibility: Devices can connect without cables, enabling movement and diverse
setups.
Easy installation: No need for complex cabling infrastructure.
Scalability: Networks can easily expand without physical wiring limitations.
Disadvantages:
Security: Signals can be intercepted more easily than wired connections.
Interference: Other devices or environmental factors can disrupt signal quality.
Range limitations: Signal strength degrades with distance, impacting coverage.
Latency: Data transfer can be slower compared to wired connections.
Applications:
Home and office networks: Wi-Fi for internet access, device connectivity.
Mobile communication: Cell phones, tablets, laptops.
Wireless sensors: Industrial automation, environmental monitoring.
Satellite communication: Global connectivity for remote areas.
Wireless devices:
• Access point (AP) is commonly installed to act as a central hub for the WLAN
"infrastructure mode".
• The AP is hard wired to the cabled LAN to provide Internet access and connectivity to
the wired network. APs are equipped with antennae and provide wireless connectivity over a
specified area referred to as a cell.
• Depending on the structural composition of the location in which the AP is installed
and the size and gain of the antennae, the size of the cell could greatly vary.
• Most commonly, the range will be from 91.44 to 152.4 meters (300 to 500 feet).
31
• When a client is activated within the WLAN, it will start "listening" for a compatible
device with which to "associate".
• This is referred to as "scanning" and may be active or passive.
• Active scanning causes a probe request to be sent from the wireless node seeking to
join the network.
• The probe request will contain the Service Set Identifier (SSID) of the network it wishes
to join.
• When an AP with the same SSID is found, the AP will issue a probe response.
• The authentication and association steps are completed.
If the hosts are connected point-to-point logically, then may have multiple intermediate
devices. But the end hosts are unaware of underlying network and see each other as if they
are connected directly.
B) Bus Topology
In case of Bus topology, all devices share single communication line or cable.Bus topology
may have problem while multiple hosts sending data at the same time. Therefore, Bus
topology either uses CSMA/CD technology or recognizes one host as Bus Master to solve the
issue. It is one of the simple forms of networking where a failure of a device does not affect
the other devices. But failure of the shared communication line can make all other devices
32
stop functioning.
Both ends of the shared channel have line terminator. The data is sent in only one direction
and as soon as it reaches the extreme end, the terminator removes the data from the line.
Advantages and disadvantages of Bus Topology
Advantages Disadvantages
It is very simple to install. It is very difficult to troubleshoot.
It uses less cable than other topologies. It provides slow data transfer speed.
It is relatively inexpensive. A single fault can bring the entire network down.
C) Star Topology
All hosts in Star topology are connected to a central device, known as hub device, using a
point-to-point connection. That is, there exists a point to point connection between hosts and
hub. The hub device can be a hub, switch, router or a repeater.
As in Bus topology, hub acts as single point of failure. If hub fails, connectivity of all hosts to all
other hosts fails. Every communication between hosts, takes place through only the hub. Star
topology is not expensive as to connect one more host, only one cable is required and
configuration is simple
33
Advantages Disadvantages
It is easy to install. It uses more cables than other
topologies.
Relocating of computers is easier than other If the centralized device fails, it
topologies. brings the entire network down.
Since each computer uses its own separate cable, a The total installation cost is higher
fault in cable does affect other computers of the than the other topologies.
network.
Troubleshooting is relatively easy. Use the twisted pair cable which is
prone to break.
It provides higher data transfer speed. Too many cables make the
network messy.
D) Ring Topology
In ring topology, each host machine connects to exactly two other machines, creating a
circular network structure. When one host tries to communicate or send message to a host
which is not adjacent to it, the data travels through all intermediate hosts. To connect one
more host in the existing structure, the administrator may need only one more extra cable.
Failure of any host results in failure of the whole ring. Thus, every connection in the ring is a
point of failure. There are methods which employ one more backup ring.
Advantages Disadvantages
It does not uses terminators. It uses more cables.
It is relatively easy to troubleshoot. It is too expensive.
Since data flows only in one direction, there is A single break in the cable can bring the
no collision in the network. entire network down.
E) Mesh Topology
In this type of topology, a host is connected to one or multiple hosts.This topology has hosts
in point-to-point connection with every other host or may also have hosts which are in point-
to-point connection to few hosts only.
34
Hosts in Mesh topology also work as relay for other hosts which do not have direct point-to-
point links. Mesh technology comes into two types:
Full Mesh: All hosts have a point-to-point connection to every other host in the network. Thus
for every new host n(n-1)/2 connections are required. It provides the most reliable network
structure among all network topologies.
Partially Mesh: Not all hosts have point-to-point connection to every other host. Hosts
connect to each other in some arbitrarily fashion. This topology exists where we need to
provide reliability to some hosts out of all.
F) Tree Topology
Also known as Hierarchical Topology, this is the most common form of network topology in
use presently. This topology imitates as extended Star topology and inherits properties of bus
topology. This topology divides the network in to multiple levels/layers of network. Mainly in
LANs, a network is bifurcated into three types of network devices. The lowermost is access-
layer where computers are attached. The middle layer is known as distribution layer, which
works as mediator between upper layer and lower layer. The highest layer is known as core
layer, and is central point of the network, i.e. root of the tree from which all nodes fork.
All neighbouring hosts have point-to-point connection between them. Similar to the Bus
topology, if the root goes down, then the entire network suffers even though it is not the
single point of failure. Every connection serves as point of failure, failing of which divides the
network into unreachable segment.
35
G) Daisy Chain
This topology connects all the hosts in a linear fashion. Similar to Ring topology, all hosts are
connected to two hosts only, except the end hosts.Means, if the end hosts in daisy chain are
connected then it represents Ring topology.
Each link in daisy chain topology represents single point of failure. Every link failure splits the
network into two segments. Every intermediate host works as relay for its immediate hosts.
H) Hybrid Topology
A network structure whose design contains more than one topology is said to be hybrid
topology. Hybrid topology inherits merits and demerits of all the incorporating topologies.
The above picture represents an arbitrarily hybrid topology. The combining topologies may
contain attributes of Star, Ring, Bus, and Daisy-chain topologies. Most WANs are connected
by means of Dual-Ring topology and networks connected to them are mostly Star topology
networks. Internet is the best example of largest Hybrid topology
1. Physical layer
The first layer is the physical layer. It uses the bits and signals to communicate.
This is the only layer that is truly connected to the network in the sense that it is
the only layer concerned with how to interpret the voltage on the wire- the 1s and
Os. This layer is responsible for understanding the electrical rules associated
with devices and for determining what kind of medium is actually being used
(cables, wires, connectors, and other mechanical distinctions.)
It is important to note that while the OSI model doesn't define the media used,
the physical layer is concerned with all aspects with all aspects of transmitting
and receiving bits on the network.
2. Data link Layer
The second layer is data link layer. It is responsible for the creation and
interpretation of different frame types based on the actual physical network being
used. This layer is also responsible for interpreting what it receives from the
physical layer. Using low – level error detection and correction algorithms to
determine when information needs to be re-sent. Network protocols including the
TCP /IP protocol suite, don't define physical standards at the physical or datalink
layer, but instead are written to make use of any standards that may
currently be in use.
3. The Network layer
The third layer of OSI model is the Network layer. It is mostly associated with the
movement of data by moans of addressing and routing. It directs the flow of data
from a source to a destination, despite the fact that the machine might not be
connected to the same physical wire or segment, by finding a path or route from
a machine to another. It is necessary; this layer can break data into smaller
chunks for transmission. This is sometimes necessary while transferring data
from one type of physical network to another network. This layer is also
37
responsible for reassembling those smaller into the original data after the data
has reach edits destination.
To restate : The network layer involves communication with devices on logically
separate networks connected to form internet works can be large and can be
constructed of different types of networks, the network layer utilizes routing
algorithms that can be used to guide packets from their source to their
destination network.
Network Connectivity Devices / 47
A key element of the network layer is that each network in the internetwork is
assigned a network address and they are used to route packets constitute the
topics of address and switching.
4. The Transport layer
The fourth layer is the transport layer. It is primarily responsible for guaranteeing
delivery of packets transmitted by the network layer, although it doesn't always
have to do so. Depending on the protocol being used, delivery of the packets
may or may not be guaranteed. When the transport layer is responsible for
guaranteeing the delivery of packets, it does so through various means of error
control, including verification of sequence members for packets and otherprotocol-
dependant mechanism.
5. The session layer
The fifth layer is session layer-it is responsible for managing connections
between two machines during the course of communication between- them. This
layer determines whether it has received all information for the session and
whether it can stop receiving or transmitting data packets. This layer also has
built-in error correction and recovery methods.
6. The presentation layer
The sixth layer Is the Presentation layer. it is primarily concerned with the
conversion of data formats, in the form of packets, from one, machine to
another. One common example is the sending of data from a machine that uses
the ASCII format for characters to a, machine that uses the, EBCDIC format for
characters, typically of IBM mainframes.
The presentation layer is responsible for picking up differences such as these
and translating them to compatible formats. Both EBCDIC and ASCII are
standards for translating characters to hexadecimal code. Letters, numbers; and
symbols in one format which must be translated when communicating with
machines using a different format. This is the responsibility of the presentation
layer.
7. The Application layer
The seventh layer of the QSI model is the application layer. It acts as the arbiter
or translator between user's application and the network. Applications that want
to utilise the network to transfer messages must be written to conform to
networking APIs supported by machine’s networking components, such as
windows sockets and NetBIOS. After the application makes an API call, the
application layer determines which machine it wants to communicate with,
38
Network Standards:
A networking standard is a document that's been developed to provide technical
requirements, specifications, and guidelines that must be employed consistently to ensure
devices, equipment, and software which govern networking are fit for their intended purpose.
➢ Standards ensure quality, safety, and efficiency.
➢ Define how network devices communicate and interact.
Developed by organizations like IEEE (Institute of Electrical and Electronics Engineers) and
IETF (Internet Engineering Task Force).
Examples: Wi-Fi standards (802.11x), Ethernet standards, IP addressing (IPv4, IPv6).
Benefits of Standards:
1. Ensures compatibility between devices from different vendors.
2. Simplifies network design and management.
3. Promotes innovation and competition in the industry.
40
4. Noise
Random disturbance or fluctuation in analog or digital signal is said to be Noise in signal,
which may distort the actual information being carried. Noise can be characterized in one of
the following class:
a) Thermal Noise
Heat agitates the electronic conductors of a medium which may introduce noise in the media.
Up to a certain level, thermal noise is unavoidable.
b) Intermodulation
When multiple frequencies share a medium, their interference can cause noise in the
medium. Intermodulation noise occurs if two different frequencies are sharing a medium and
one of them has excessive strength or the component itself is not functioning properly, then
the resultant frequency may not be delivered as expected.
c) Crosstalk
This sort of noise happens when a foreign signal enters into the media. This is because signal
in one medium affects the signal of second medium.
d) Impulse
This noise is introduced because of irregular disturbances such as lightening, electricity, short-
circuit, or faulty components. Digital data is mostly affected by this sort of noise.
Channel Capacity
The speed of transmission of information is said to be the channel capacity. We count it as
data rate in digital world. It depends on numerous factors such as:
Circuit Switching:
➢ Imagine a dedicated phone line - a specific pathway kept open for the entire duration
of a call. This is circuit switching.
➢ A dedicated path is established between sender and receiver before data
transmission.
➢ Entire message is sent as one chunk.
➢ Offers guaranteed bandwidth but inefficient for short bursts of data.
➢ Used in traditional phone networks and sometimes for leased lines.
Message Switching:
➢ Think of email servers - messages are stored and forwarded instead of a direct
connection.
➢ No dedicated path, messages are queued and sent individually.
➢ More efficient for bursty data, but adds delay due to storage and forwarding.
➢ Used in early email systems and some specialized applications.
Packet Switching:
➢ Like sending a letter with multiple pages - the message is broken into smaller packets,
sent independently, and reassembled at the receiver.
➢ No dedicated path, packets take the most efficient route.
➢ Very efficient for bursty data and diverse traffic types.
➢ Used in the internet, most modern networks, and wireless communication.
2.3 Multiplexing Techniques:
Multiplexing is a technique by which different analog and digital streams of transmission can
be simultaneously processed over a shared link. Multiplexing divides the high capacity
medium into low capacity logical medium which is then shared by different streams.
Communication is possible over the air (radio frequency), using a physical media (cable), and
light (optical fiber). All mediums are capable of multiplexing.
a) Frequency Division Multiplexing
44
When the carrier is frequency, FDM is used. FDM is an analog technology. FDM divides the
spectrum or carrier bandwidth in logical channels and allocates one user to each channel.
Each user can use the channel frequency independently and has exclusive access of it. All
channels are divided in such a way that they do not overlap with each other. Channels are
separated by guard bands. Guard band is a frequency which is not used by either channel.
TDM works in synchronized mode. Both ends, i.e. Multiplexer and De-multiplexer are timely
synchronized and both switch to next channel simultaneously.
When channel A transmits its frame at one end,the De-multiplexer provides media to channel
A on the other end.As soon as the channel A’s time slot expires, this side switches to channel
B. On the other end, the De-multiplexer works in a synchronized manner and provides media
to channel B. Signals from different channels travel the path in interleaved manner.
45
Each station is assigned with a unique code, called chip. Signals travel with these codes
independently, inside the whole bandwidth. The receiver knows in advance the chip code
signal it has to receive.
TOPIC 3. DATA LINK LAYER
Data Link Layer is second layer of OSI Layered Model. This layer is one of the most
complicated layers and has complex functionalities and liabilities. Data link layer hides the
details of underlying hardware and represents itself to upper layer as the medium to
communicate.
Data link layer works between two hosts which are directly connected in some sense. This
direct connection could be point to point or broadcast. Systems on broadcast network are
said to be on same link. The work of data link layer tends to get more complex when it is
dealing with multiple hosts on single collision domain.
Data link layer is responsible for converting data stream to signals bit by bit and to send that
over the underlying hardware. At the receiving end, Data link layer picks up data from
hardware which are in the form of electrical signals, assembles them in a recognizable frame
format, and hands over to upper layer.
Data link layer has two sub-layers:
46
➢ Logical Link Control: It deals with protocols, flow-control, and error control
➢ Media Access Control: It deals with actual control of media
Functionality of Data-link Layer
Data link layer does many tasks on behalf of upper layer. These are:
1. Framing
Data-link layer takes packets from Network Layer and encapsulates them into Frames.Then, it
sends each frame bit-by-bit on the hardware. At receiver’ end, data link layer picks up signals
from hardware and assembles them into frames.
2. Addressing
Data-link layer provides layer-2 hardware addressing mechanism. Hardware address is
assumed to be unique on the link. It is encoded into hardware at the time of manufacturing.
3. Synchronization
When data frames are sent on the link, both machines must be synchronized in order to
transfer to take place.
4. Error Control
Sometimes signals may have encountered problem in transition and the bits are flipped.These
errors are detected and attempted to recover actual data bits. It also provides error reporting
mechanism to the sender.
5. Flow Control
Stations on same link may have different speed or capacity. Data-link layer ensures flow
control that enables both machine to exchange data on same speed.
6. Multi-Access
When host on the shared link tries to transfer the data, it has a high probability of collision.
Data-link layer provides mechanism such as CSMA/CD to equip capability of accessing a
shared media among multiple Systems.
47
represent a whole network. Network address is always configured on network interface card
and is generally mapped by system with the MAC address (hardware address or layer-2
address) of the machine for Layer-2 communication.
• IP: The dominant network protocol globally, used for the internet, most local
networks, and various devices.
• IPX: A legacy protocol primarily used in older Novell NetWare networks and some
niche applications.
• AppleTalk: A nearly obsolete protocol mainly associated with older Macintosh
networks.
IP addressing provides mechanism to differentiate between hosts and network. Because IP
addresses are assigned in hierarchical manner, a host always resides under a specific
network.The host which needs to communicate outside its subnet, needs to know destination
network address, where the packet/data is to be sent.
Hosts in different subnet need a mechanism to locate each other. This task can be done by
DNS. DNS is a server which provides Layer-3 address of remote host mapped with its domain
name or FQDN. When a host acquires the Layer-3 Address (IP Address) of the remote host, it
forwards all its packet to its gateway. A gateway is a router equipped with all the information
which leads to route packets to the destination host.
4.1: Logical Addressing:
Every computer in a network has an IP address by which it can be uniquely identified and
addressed. An IP address is Layer-3 (Network Layer) logical address. This address may change
every time a computer restarts. A computer can have one IP at one instance of time and
another IP at some different time.
i) Address Resolution Protocol(ARP)
49
While communicating, a host needs Layer-2 (MAC) address of the destination machine which
belongs to the same broadcast domain or network. A MAC address is physically burnt into the
Network Interface Card (NIC) of a machine and it never changes.
On the other hand, IP address on the public domain is rarely changed. If the NIC is changed in
case of some fault, the MAC address also changes. This way, for Layer-2 communication to
take place, a mapping between the two is required. To know the MAC address of remote host
on a broadcast domain, a computer wishing to initiate communication sends out an ARP
broadcast message asking, “Who has this IP address?” Because it is a broadcast, all hosts on
the network segment (broadcast domain) receive this packet and process it. ARP packet
contains the IP address of destination host, the sending host wishes to talk to. When a host
receives an ARP packet destined to it, it replies back with its own MAC address.
Once the host gets destination MAC address, it can communicate with remote host using
Layer-2 link protocol. This MAC to IP mapping is saved into ARP cache of both sending and
receiving hosts. Next time, if they require to communicate, they can directly refer to their
respective ARP cache.
Reverse ARP is a mechanism where host knows the MAC address of remote host but requires
to know IP address to communicate.
ii) Internet Control Message Protocol (ICMP)
50
ICMP is network diagnostic and error reporting protocol. ICMP belongs to IP protocol suite
and uses IP as carrier protocol. After constructing ICMP packet, it is encapsulated in IP packet.
Because IP itself is a best-effort non-reliable protocol, so is ICMP.
Any feedback about network is sent back to the originating host. If some error in the network
occurs, it is reported by means of ICMP. ICMP contains dozens of diagnostic and error
reporting messages.
ICMP-echo and ICMP-echo-reply are the most commonly used ICMP messages to check the
reachability of end-to-end hosts. When a host receives an ICMP-echo request, it is bound to
send back an ICMP-echo-reply. If there is any problem in the transit network, the ICMP will
report that problem.
iii) Internet Protocol Version 4 (IPv4)
IPv4 is 32-bit addressing scheme used as TCP/IP host addressing mechanism. IP addressing
enables every host on the TCP/IP network to be uniquely identifiable.
IPv4 provides hierarchical addressing scheme which enables it to divide the network into sub-
networks, each with well-defined number of hosts. IP addresses are divided into many
categories:
Class A - it uses first octet for network addresses and last three octets for host addressing
Class B - it uses first two octets for network addresses and last two for host addressing
Class C - it uses first three octets for network addresses and last one for host addressing
Class D - it provides flat IP addressing scheme in contrast to hierarchical structure for above
three.
Class E - It is used as experimental.
IPv4 also has well-defined address spaces to be used as private addresses (not routable on
internet), and public addresses (provided by ISPs and are routable on internet).
Though IP is not reliable one; it provides ‘Best-Effort-Delivery’ mechanism.
51
• This Layer is the first one which breaks the information data, supplied by Application
layer in to smaller units called segments. It numbers every byte in the segment and
maintains their accounting.
• This layer ensures that data must be received in the same sequence in which it was
sent.
• This layer provides end-to-end delivery of data between hosts which may or may not
belong to the same subnet.
• All server processes intend to communicate over the network are equipped with well-
known Transport Service Access Points (TSAPs) also known as port numbers.
End-to-End Communication
A process on one host identifies its peer host on remote network by means of TSAPs, also
known as Port numbers. TSAPs are very well defined and a process which is trying to
communicate with its peer knows this in advance.
Transmission Control Protocol
The transmission Control Protocol (TCP) is one of the most important protocols of Internet
Protocols suite. It is most widely used protocol for data transmission in communication
network such as internet.
Features
TCP is reliable protocol. That is, the receiver always sends either positive or negative
acknowledgement about the data packet to the sender, so that the sender always has bright
clue about whether the data packet is reached the destination or it needs to resend it.
• TCP ensures that the data reaches intended destination in the same order it was sent.
• TCP is connection oriented. TCP requires that connection between two remote points
be established before sending actual data.
• TCP provides error-checking and recovery mechanism.
• TCP provides end-to-end communication.
• TCP provides flow control and quality of service.
• TCP operates in Client/Server point-to-point mode.
53
• TCP provides full duplex server, i.e. it can perform roles of both receiver and sender.
TCP Header
The length of TCP header is minimum 20 bytes long and maximum 60 bytes.
Source Port (16-bits) - It identifies source port of the application process on the sending
device.
Destination Port (16-bits) - It identifies destination port of the application process on the
receiving device.
Sequence Number (32-bits) - Sequence number of data bytes of a segment in a session.
Acknowledgement Number (32-bits) - When ACK flag is set, this number contains the next
sequence number of the data byte expected and works as acknowledgement of the previous
data received.
Data Offset (4-bits) - This field implies both, the size of TCP header (32-bit words) and the
offset of data in current packet in the whole TCP segment.
Reserved (3-bits) - Reserved for future use and all are set zero by default.
Flags (1-bit each)
NS - Nonce Sum bit is used by Explicit Congestion Notification signaling process.
CWR - When a host receives packet with ECE bit set, it sets Congestion Windows Reduced to
acknowledge that ECE received.
ECE -It has two meanings:
If SYN bit is clear to 0, then ECE means that the IP packet has its CE (congestion experience)
bit set.
If SYN bit is set to 1, ECE means that the device is ECT capable.
URG - It indicates that Urgent Pointer field has significant data and should be processed.
54
Simple: Smaller header size compared to TCP, offering better efficiency for small data
transmissions.
Applications:
Real-time streaming: Video conferencing, online gaming, live audio/video.
DNS lookups: Quick responses for website address translations.
Simple data transfers: Small data packets without high reliability requirements.
Broadcast and multicast applications: Sending data to multiple recipients efficiently.
Connection establishment, data transfer, and termination
Flow control and error recovery mechanisms
TCP Vs UDP
56
There’is an ambiguity in understanding Application Layer and its protocol. Not every user
application can be put into Application Layer. except those applications which interact with
the communication system. For example, designing software or text-editor cannot be
considered as application layer programs.
On the other hand, when we use a Web Browser, which is actually using Hyper Text Transfer
Protocol (HTTP) to interact with the network. HTTP is Application Layer protocol.
Another example is File Transfer Protocol, which helps a user to transfer text based or binary
files across the network. A user can use this protocol in either GUI based software like FileZilla
or CuteFTP and the same user can use FTP in Command Line mode.
Hence, irrespective of which software you use, it is the protocol which is considered at
Application Layer used by that software. DNS is a protocol which helps user application
protocols such as HTTP to accomplish its work.
Error Detection & Correction
57
There are many reasons such as noise, cross-talk etc., which may help data to get corrupted
during transmission. The upper layers work on some generalized view of network architecture
and are not aware of actual hardware data processing. Hence, the upper layers expect error-
free transmission between the systems. Most of the applications would not function
expectedly if they receive erroneous data. Applications such as voice and video may not be
that affected and with some errors they may still function well.
Data-link layer uses some error control mechanism to ensure that frames (data bit streams)
are transmitted with certain level of accuracy. But to understand how errors is controlled, it is
essential to know what types of errors may occur.
Types of Errors
There may be three types of errors
• Parity Check: Uses extra bits to ensure even or odd number of 1s in a data unit. Simple
but detects only single-bit errors.
• Checksum: Combines data bits into a single value recalculated at the receiver and
compared to the transmitted value. Detects various error patterns.
• Cyclic Redundancy Check (CRC) More complex mathematical calculation for high
detection accuracy, even for multiple-bit errors.
Error Correction:
Definition: Not only identifies but also corrects detected errors.
Importance: Recovers original data, crucial for sensitive information or critical applications.
Methods:
Hamming Code: Adds extra bits for error detection and correction of single-bit errors.
Reed-Solomon Code: More complex, corrects multiple-bit errors within a limited range.
Automatic Repeat Request (ARQ): Receiver requests retransmission of corrupted data
packets. Suitable for reliable but slower communication.
Key Differences:
Focus: Error detection identifies, while error correction both identifies and fixes.
Complexity: Error detection is generally simpler and less computationally expensive.
Applications: Error detection is used in wider scenarios, while error correction is mainly
applied when data integrity is critical.
END
Additional Resources:
Textbooks: "Computer Networks" by Andrew Tanenbaum, "Computer Networking: A Top-
Down Approach" by James F. Kurose and K.W. Ross
Online tutorials and courses: Coursera, Udemy, edX
Network simulation tools: GNS3, Packet Tracer