Computer Networks_unit1
Computer Networks_unit1
Data communications refers to the transmission of this digital data between two or more
computers and a computer network or data network is a telecommunications network
that allows computers to exchange data. The physical connection between networked
computing devices is established using either cable media or wireless media. The best-
known computer network is the Internet.
This tutorial should teach you basics of Data Communication and Computer Network
(DCN) and will also take you through various advance concepts related to Data
Communication and Computer Network.
Half-Duplex mode
Full-duplex mode
o Both the stations can send and receive the data at the same time.
o Security: It provides limited interaction that a user can have with the
entire system. For example, a bank allows the users to access their
own accounts through an ATM without allowing them to access the
bank's entire database.
o Faster problem solving: Multiple computers can solve the problem
faster than a single machine working alone.
o Security through redundancy: Multiple computers running the
same program at the same time can provide the security through
redundancy. For example, if four computers run the same program and
any computer has a hardware error, then other computers can override
it.
o Computer Network is a group of computers connected with each
other through wires, optical fibres or optical links so that various
devices can interact with each o
o ther through a network.
o The aim of the computer network is the sharing of resources among
various devices.
o In the case of computer network technology, there are several types of
networks that vary from simple to complex level.
There are two types of NIC: wireless NIC and wired NIC.
o Wireless NIC: All the modern laptops use the wireless NIC. In Wireless
NIC, a connection is made using the antenna that employs the radio
wave technology.
o Wired NIC: Cables use the wired NIC to transfer the data over the
medium.
Hub
Hub is a central device that splits the network connection into multiple
devices. When computer requests for information from a computer, it sends
the request to the Hub. Hub distributes this request to all the interconnected
computers.
Switches
Switch is a networking device that groups all the devices over the network to
transfer the data to another device. A switch is better than Hub as it does not
broadcast the message over the network, i.e., it sends the message to the
device for which it belongs to. Therefore, we can say that switch sends the
message directly from source to the destination.
Router
Router is a device that connects the LAN to the internet. The router is mainly
used to connect the distinct networks or connect the internet to multiple
computers.
Modem
Modem connects the computer to the internet over the existing telephone
line. A modem is not integrated with the computer motherboard. A modem is
a separate part on the PC slot found on the motherboard.
Uses Of Computer Network
o Resource sharing: Resource sharing is the sharing of resources such
as programs, printers, and data among the users on the network
without the requirement of the physical location of the resource and
user.
o Server-Client model: Computer networking is used in the server-
client model. A server is a central computer used to store the
information and maintained by the system administrator. Clients are
the machines used to access the information stored in the server
remotely.
o Communication medium: Computer network behaves as a
communication medium among the users. For example, a company
contains more than one computer has an email system which the
employees use for daily communication.
o Communication speed
o File sharing
o Back up and Roll back is easy
o Software and Hardware sharing
o Security
o Scalability
o Reliability
o Communication speed
o Network provides us to communicate over the network in a fast and
efficient manner. For example, we can do video conferencing, email
messaging, etc. over the internet. Therefore, the computer network is
a great way to share our knowledge and ideas.
o File sharing
o File sharing is one of the major advantage of the computer network.
Computer network provides us to share the files with each other.
o Security
o Network allows the security by ensuring that the user has the right to
access the certain files and applications.
o Scalability
o Scalability means that we can add the new components on the
network. Network must be scalable so that we can extend the network
by adding new devices. But, it decreases the speed of the connection
and data of the transmission speed also decreases, this increases the
chances of error occurring. This problem can be overcome by using the
routing or switching devices.
o
o Reliability
o Computer network can use the alternative source for the data
communication in case of any hardware failure.
o Peer-To-Peer network
o Client/Server network
Peer-To-Peer network
o Peer-To-Peer network is a network in which all the computers are
linked together with equal privilege and responsibilities for processing
the data.
o Peer-To-Peer network is useful for small environments, usually up to 10
computers.
o Peer-To-Peer network has no dedicated server.
o Special permissions are assigned to each computer for sharing the
resources, but this can lead to a problem if the computer with the
resource is down.
Advantages Of Peer-To-Peer Network:
196 This is the year in which the internet started to share information s a way fo
0 government researchers. And, the first known MODEM and dataphone wer
introduced by AT&T.
196 On May 31, 1961, Leonard Kleinrock released his first paper, "Information Flow i
1 Large Communication Nets."
196 A paper talking about packetization was released by Leonard Kleinrock. Also, thi
2 year, a suggestion was given by Paul Baran for the transmission of data with th
help of using fixed-size message blocks
196 Baran produced a study on distributed communications in 1964. In the same year
4 Leonard Kleinrock released Communication Nets Stochastic Message Flow an
Design, the first book on packet nets.
196 The first long-distance dial-up link was established between a TX-2 computer and
5 Q-32 at SDC in California by Lawrence G. Roberts of MIT and Tom Marill of SDC i
California with a Q-32. Also, the word "Packet" was coined by Donald in this year.
196 After getting success at connecting over dial-up, a paper about this was publishe
6 by Tom Marill and Lawrence G. Roberts
In the same year, Robert Taylor brought Larry Roberts and joined ARPA to develo
ARPANET.
196 In 1967, 1-node NPL packet net was created by Donald Davies. For packet switch
7 the use of a minicomputer was suggested by Wes Clark.
197 This is the year in which NCP was released by the UCLA team and Steve Crocker.
0
197 In 1971, Ray Tomlinson sent the first e-mail via a network to other users.
1
197 In 1972, the ARPANET was initially demonstrated to the general public.
2
197 TCP was created by Vinton Cerf in 1973, and it was released in December 197
3 with the help of Yogen Dalal and Carl Sunshine. ARPA also launched the firs
international link, SATNET, this year. And, the Ethernet was created by Rober
Metcalfe at the Xerox Palo Alto Research Center.
197 In 1974, the Telenet, a commercial version of ARPANET, was introduced. Man
4 consider it to be the first Internet service provider.
197 In 1978, to support real-time traffic, TCP split into TCP/IP, which was driven by Joh
8 Shoch, David Reed, and Danny Cohen. Later on, on 1 January 1983, the creation o
TCP/IP was standardized into ARPANET and helped create UDP. Also, in the sam
year, the first worm was developed by Jon Hupp and John Shoch at Xerox PARC.
198 BITNET was established in 1981. It is a time network that was formerly a networ
1 of IBM mainframe computers in the United States.
198 In 1983, the TCP/IP was standardized by ARPANET, and the IAB, short for Interne
3 Activities Board was also founded in the same year.
198 The DNS was introduced by Jon Postel and Paul Mockapetris.
4
198 The first Listserv was developed by Eric Thomas, and NSFNET was also created i
6 1986. Additionally, BITNET II was created in the same year 1986.
198 The First T1 backbone was included in ARPANET, and CSNET and CSNET merged t
8 create CREN.
198 A proposal for a distributed system was submitted by Tim Berners-Lee at CERN o
9 12 March 1989 that would later become the WWW.
199 This year, NSFNET replaced the ARPANET. On 10 September 1990, Mike Parker, Bi
0 Heelan, and Alan Emtage released the first search engine Archie at McGi
University in Montreal, Canada.
199 Tim Berners-Lee introduced the WWW (World Wide Web) on August 6, 1991. O
1 August 6, 1991, he also unveiled the first web page and website to the genera
public. Also, this year, the internet started to be available to the public by NSF
Outside of Europe, the first web server came on 1 December 1991.
199 The main revolution came in the field of the internet that the internet Society wa
2 formed, and NSFNET upgraded to a T3 backbone.
199 CERN submitted the Web source code to the public domain on April 30, 1993. Thi
3 caused the Web to experience massive growth. Also, this year, the United Nation
and the White House came, which helped to begin top-level domains, such as .go
and .org. On 22 April 1993, the first widely-used graphical World Wide We
browser, Mosaic, was released by the NCSA with the help of Eric Bina and Mar
Andreessen.
199 On April 4, 1994, James H. Clark and Marc Andreessen found the Mosai
4 Communications Corporation, Netscape. On 13 October 1994, the first Netscap
browser, Mosaic Netscape 0.9, was released, which also introduced the Internet t
cookies. On 7 November 1994, a radio station, WXYC, announced broadcasting o
the Internet, and it became the first traditional radio station for this. Also, in th
same year, the W3C was established by Tim Berners-Lee.
199 In February 1995, Netscape introduced the SSL (Secure sockets layer), and th
5 dot-com boom began. Also, the Opera web browser was introduced to browsin
web pages on 1 April 1995, and to make voice calls over the Internet, the Vocaltec
the first VoIP software, was introduced
Later, the Internet Explorer web browser was introduced by Microsoft on 16 Augus
1995. In RFC 1866, the next version of HTML 2.0 was released on 24 Novembe
1995.
In 1995, JavaScript, originally known as LiveScript, was created by Brendan Eich. A
that time, he was an employee at Netscape Communications Corporation. Late
LiveScript was renamed to JavaScript with Netscape 2.0B3 on December 4, 1995
In the same year, they also introduced Java.
199 This year, Telecom Act took a big Decision and deregulated data networks. Also
6 Macromedia Flash that is now known as Adobe Flash was released in 1996
In December 1996, the W3C published CSS 1, the first CSS specification. A
compared to postal mail, more e-mail was sent in the USA. This is the year i
which the network has ceased to exist as CREN ended its support.
199 In 1997, the 802.11 (Wi-Fi) standard was introduced by IEEE, and the internet
7 consortium was also established.
199 The first Internet weblogs arose in this year, and on February 10, 1998, XM
8 became a W3C recommendation.
199 In September 1999, Napster began sharing files, and Marc Ostrofsky, th
9 business.com, the most expensive Internet domain name for $7.5 million on
December 1999. Later on, on 26 July 2007, this domain was sold for $345 millio
to R.H. Donnelley.
200 The members of CERN took the decision to dissolve the organization on 7 Januar
3 2003. Also, this year, the Safari web browser came into the market on 30 Jun
2003.
200 The Mozilla Firefox web browser was released by Mozilla on 9 November 2004.
4
200 On 1 March 2008, the support b AOL for the Netscape Internet browser was ended
8 Then, the Google Chrome web browser was introduced by Google on 11 Decembe
2008, and gradually it became a popular web browser.
200 A person using the fictitious name Satoshi Nakamoto published the internet mone
9 Bitcoin on 3 January 2009.
201 On 28 October 2014, W3C recommended and released the HTML5 programmin
4 language to the public.
Reasons
The reasons for using layered protocols are explained below −
Layering of protocols provides well-defined interfaces between the layers, so that
a change in one layer does not affect an adjacent layer.
The protocols of a network are extremely complicated and designing them in
layers makes their implementation more feasible.
Advantages
The advantages of layered protocols are as follows −
Assists in protocol style, as a result of protocols that operate at a particular layer
have outlined information that they work and a defined interface to the layers on
top of and below.
Foster’s competition because products from completely different vendors will
work along.
Prevents technology or capability changes in one layer from touching different
layers above and below.
Provides a typical language to explain networking functions and capabilities.
Disadvantages
The disadvantages of layered protocols are as follows −
The main disadvantages of layered systems consist primarily of overhead each in
computation and in message headers caused by the abstraction barriers between
layers. Because a message typically should pass through several (10 or more)
protocol layers the overhead of those boundaries is commonly more than the
computation being done.
The upper-level layers cannot see what is within the lower layers, implying that an
application cannot correct where in an exceedingly connection a problem is or
precisely what the matter is.
The higher-level layers cannot control all aspects of the lower layers, so that they
cannot modify the transfer system if helpful (like controlling windowing, header
compression, CRC/parity checking, et cetera), nor specify routing, and should
rely on the lower protocols operating, and cannot specify alternatives when there
are issues.
Network Standardization
Network Standards
Networking standards define the rules for data communications that are needed for
interoperability of networking technologies and processes. Standards help in creating
and maintaining open markets and allow different vendors to compete on the basis of
the quality of their products while being compatible with existing market products.
During data communication, a number of standards may be used simultaneously at the
different layers. The commonly used standards at each layer are −
Types of Standards
Standards are of two types
De facto − These are the standards that are followed without any formal plan or
approval by any organization. They have come into existence due to traditions or
facts. For example, the HTTP had started as a de facto standard.
De jure − These standards are the ones which have been adopted through
legislation by any officially recognized standards organization. Most of the
communication standards that are used today are de jure standards.
Standards Organizations
Some of the noted standards organizations are
International Standards Organization (ISO)
International Telecommunication Union (ITU)
Institute of Electronics and Electrical Engineers (IEEE)
American National Standards Institute (ANSI)
Internet Research Task Force (IETF)
Electronic Industries Association (EIA)
Protocol and Standard in Computer Networks
Protocols and standards are important in computer networks. They are like
the rules and guidelines that allow different devices and systems to
communicate and work together smoothly. Protocols define how data is sent,
received, and processed, while standards ensure that various technologies
are compatible with each other. This coordination is critical for the Internet
and other networks to function constantly and efficiently.
Network protocol ensures that different technologies and components of the
network are compatible with one another, reliable, and able to function
together.
What is Protocol?
A protocol is a set of rules that determines how data is sent and received
over a network. The protocol is just like a language that computers use to
talk to each other, ensuring they understand and can respond to each other’s
messages correctly. Protocols help make sure that data moves smoothly and
securely between devices on a network.
To make communication successful between devices, some rules and
procedures should be agreed upon at the sending and receiving ends of the
system. Such rules and procedures are called Protocols. Different types of
protocols are used for different types of communication.
Computer Network Models
A communication subsystem is a complex piece of Hardware and software.
Early attempts for implementing the software for such subsystems were
based on a single, complex, unstructured program with many interacting
components. The resultant software was very difficult to test and modify. To
overcome such problem, the ISO has developed a layered approach. In a
layered approach, networking concept is divided into several layers, and
each layer is assigned a particular task. Therefore, we can say that
networking tasks depend upon the layers.
Layered Architecture
o The main aim of the layered architecture is to divide the design into
small pieces.
o Each lower layer adds its services to the higher layer to provide a full
set of services to manage communications and run the applications.
o It provides modularity and clear interfaces, i.e., provides interaction
between subsystems.
o It ensures the independence between layers by providing the services
from lower to higher layer without defining how the services are
implemented. Therefore, any modification in a layer will not affect the
other layers.
o The number of layers, functions, contents of each layer will vary from
network to network. However, the purpose of each layer is to provide
the service from lower to a higher layer and hiding the details from the
layers of how the services are implemented.
o The basic elements of layered architecture are services, protocols, and
interfaces.
o Service: It is a set of actions that a layer provides to the higher
layer.
o Protocol: It defines a set of rules that a layer uses to exchange
the information with peer entity. These rules mainly concern
about both the contents and order of the messages used.
o Interface: It is a way through which the message is transferred
from one layer to another layer.
o In a layer n architecture, layer n on one machine will have a
communication with the layer n on another machine and the rules used
in a conversation are known as a layer-n protocol.
OSI Model
o OSI stands for Open System Interconnection is a reference model
that describes how information from a software application in
one computer moves through a physical medium to the software
application in another computer.
o OSI consists of seven layers, and each layer performs a particular
network function.
o OSI model was developed by the International Organization for
Standardization (ISO) in 1984, and it is now considered as an
architectural model for the inter-computer communications.
o OSI model divides the whole task into seven smaller and manageable
tasks. Each layer is assigned a particular task.
o Each layer is self-contained, so that task assigned to each layer can be
performed independently.
1) Physical layer
o The main functionality of the physical layer is to transmit the individual
bits from one node to another node.
o It is the lowest layer of the OSI model.
o It establishes, maintains and deactivates the physical connection.
o It specifies the mechanical, electrical and procedural network interface
specifications.
o Line Configuration: It defines the way how two or more devices can
be connected physically.
o Data Transmission: It defines the transmission mode whether it is
simplex, half-duplex or full-duplex mode between the two devices on
the network.
o Topology: It defines the way how network devices are arranged.
o Signals: It determines the type of the signal used for transmitting the
information.
Data-Link Layer
o Framing: The data link layer translates the physical's raw bit stream
into packets known as Frames. The Data link layer adds the header
and trailer to the frame. The header which is added to the frame
contains the hardware destination and source address.
o Physical Addressing: The Data link layer adds a header to the frame
that contains a destination address. The frame is transmitted to the
destination address mentioned in the header.
o Flow Control: Flow control is the main functionality of the Data-link
layer. It is the technique through which the constant data rate is
maintained on both the sides so that no data get corrupted. It ensures
that the transmitting station such as a server with higher processing
speed does not exceed the receiving station, with lower processing
speed.
o Error Control: Error control is achieved by adding a calculated value
CRC (Cyclic Redundancy Check) that is placed to the Data link layer's
trailer which is added to the message frame before it is sent to the
physical layer. If any error seems to occurr, then the receiver sends the
acknowledgment for the retransmission of the corrupted frames.
o Access Control: When two or more devices are connected to the
same communication channel, then the data link layer protocols are
used to determine which device has control over the link at a given
time.
3) Network Layer
4) Transport Layer
o The Transport layer is a Layer 4 ensures that messages are
transmitted in the order in which they are sent and there is no
duplication of data.
o The main responsibility of the transport layer is to transfer the data
completely.
o It receives the data from the upper layer and converts them into
smaller units known as segments.
o This layer can be termed as an end-to-end layer as it provides a point-
to-point connection between source and destination to deliver the data
reliably.
5) Session Layer
o
6) Presentation Layer
o A Presentation layer is mainly concerned with the syntax and
semantics of the information exchanged between the two systems.
o It acts as a data translator for a network.
o This layer is a part of the operating system that converts the data from
one presentation format to another format.
o The Presentation layer is also known as the syntax layer.
7) Application Layer
TCP/IP model
o The TCP/IP model was developed prior to the OSI model.
o The TCP/IP model is not exactly similar to the OSI model.
o The TCP/IP model consists of five layers: the application layer,
transport layer, network layer, data link layer and physical layer.
o The first four layers provide physical standards, network interface,
internetworking, and transport functions that correspond to the first
four layers of the OSI model and these four layers are represented in
TCP/IP model by a single layer called the application layer.
o TCP/IP is a hierarchical protocol made up of interactive modules, and
each of them provides specific functionality.
Internet Layer
ARP Protocol
o ARP stands for Address Resolution Protocol.
o ARP is a network layer protocol which is used to find the physical
address from the IP address.
o The two terms are mainly associated with the ARP Protocol:
o ARP request: When a sender wants to know the physical
address of the device, it broadcasts the ARP request to the
network.
o ARP reply: Every device attached to the network will accept the
ARP request and process the request, but only recipient
recognize the IP address and sends back its physical address in
the form of ARP reply. The recipient adds the physical address
both to its cache memory and to the datagram header
ICMP Protocol
Transport Layer
The transport layer is responsible for the reliability, flow control, and
correction of data which is being sent over the network.
The two protocols used in the transport layer are User Datagram protocol
and Transmission control protocol.
Application Layer
OSI model has been developed by ISO It was developed by ARPANET (Advance
(International Standard Organization). Research Project Agency Network).
In the OSI model, the transport layer provides The transport layer does not provide th
a guarantee for the delivery of the packets. surety for the delivery of packets. Bu
still, we can say that it is a reliabl
model.
In this model, the session and presentation In this model, the session an
layers are separated, i.e., both the layers are presentation layer are not differen
different. layers. Both layers are included in th
application layer.
In this model, the network layer provides both The network layer provides onl
connection-oriented and connectionless connectionless service.
service.
Protocols in the OSI model are hidden and In this model, the protocol cannot b
can be easily replaced when the technology easily replaced.
changes.
OSI model defines the services, protocols, In the TCP/IP model, services, protocols
and interfaces as well as provides a proper and interfaces are not properl
distinction between them. It is protocol separated. It is protocol dependent.
independent.
The usage of this model is very low. This model is highly used.
It provides standardization to the devices like It does not provide the standardization t
router, motherboard, switches, and other the devices. It provides a connectio
hardware devices. between various computers.
Signals
When data is sent over physical medium, it needs to be first converted into
electromagnetic signals. Data itself can be analog such as human voice, or digital such
as file on the disk.Both analog and digital data can be represented in digital or analog
signals.
Digital Signals
Digital signals are discrete in nature and represent sequence of voltage pulses.
Digital signals are used within the circuitry of a computer system.
Analog Signals
Analog signals are in continuous wave form in nature and represented by
continuous electromagnetic waves.
Transmission Impairment
When signals travel through the medium they tend to deteriorate. This may have many
reasons as given:
Attenuation
For the receiver to interpret the data accurately, the signal must be sufficiently
strong.When the signal passes through the medium, it tends to get weaker.As it
covers distance, it loses strength.
Dispersion
As signal travels through the media, it tends to spread and overlaps. The amount
of dispersion depends upon the frequency used.
Delay distortion
Signals are sent over media with pre-defined speed and frequency. If the signal
speed and frequency do not match, there are possibilities that signal reaches
destination in arbitrary fashion. In digital media, this is very critical that some bits
reach earlier than the previously sent ones.
Noise
Random disturbance or fluctuation in analog or digital signal is said to be Noise in
signal, which may distort the actual information being carried. Noise can be
characterized in one of the following class:
o Thermal Noise
Heat agitates the electronic conductors of a medium which may introduce
noise in the media. Up to a certain level, thermal noise is unavoidable.
o Intermodulation
When multiple frequencies share a medium, their interference can cause
noise in the medium. Intermodulation noise occurs if two different
frequencies are sharing a medium and one of them has excessive strength
or the component itself is not functioning properly, then the resultant
frequency may not be delivered as expected.
o Crosstalk
This sort of noise happens when a foreign signal enters into the media.
This is because signal in one medium affects the signal of second medium.
o Impulse
This noise is introduced because of irregular disturbances such as
lightening, electricity, short-circuit, or faulty components. Digital data is
mostly affected by this sort of noise.
Transmission Media
The media over which the information between two computer systems is sent, called
transmission media. Transmission media comes in two forms.
Guided Media
All communication wires/cables are guided media, such as UTP, coaxial cables,
and fiber Optics. In this media, the sender and receiver are directly connected
and the information is send (guided) through it.
Unguided Media
Wireless or open air space is said to be unguided media, because there is no
connectivity between the sender and receiver. Information is spread over the air,
and anyone including the actual recipient may collect the information.
Channel Capacity
The speed of transmission of information is said to be the channel capacity. We count it
as data rate in digital world. It depends on numerous factors such as:
Bandwidth: The physical limitation of underlying media.
Error-rate: Incorrect reception of information because of noise.
Encoding: The number of levels used for signaling.
Multiplexing
Multiplexing is a technique to mix and send multiple data streams over a single medium.
This technique requires system hardware called multiplexer (MUX) for multiplexing the
streams and sending them on a medium, and de-multiplexer (DMUX) which takes
information from the medium and distributes to different destinations.
Internet
A network of networks is called an internetwork, or simply the internet. It is the largest
network in existence on this planet.The internet hugely connects all WANs and it can
have connection to LANs and Home networks. Internet uses TCP/IP protocol suite and
uses IP as its addressing protocol. Present day, Internet is widely implemented using
IPv4. Because of shortage of address spaces, it is gradually migrating from IPv4 to
IPv6.
Internet enables its users to share and access enormous amount of information
worldwide. It uses WWW, FTP, email services, audio and video streaming etc. At huge
level, internet works on Client-Server model.
Internet uses very high speed backbone of fiber optics. To inter-connect various
continents, fibers are laid under sea known to us as submarine communication cable.
o Bandwidth: All the factors are remaining constant, the greater the
bandwidth of a medium, the higher the data transmission rate of a
signal.
o Transmission impairment: When the received signal is not identical
to the transmitted one due to the transmission impairment. The quality
of the signals will get destroyed due to transmission impairment.
o Interference: An interference is defined as the process of disrupting a
signal when it travels over a communication medium on the addition of
some unwanted signal.
Guided Media
It is defined as the physical medium through which the signals are
transmitted. It is also known as Bounded media.
Twisted pair:
Twisted pair is a physical media made up of a pair of cables twisted with
each other. A twisted pair cable is cheap as compared to other transmission
media. Installation of the twisted pair cable is easy, and it is a lightweight
cable. The frequency range for twisted pair cable is from 0 to 3.5KHz.
o It is cheap.
o Installation of the unshielded twisted pair is easy.
o It can be used for high-speed LAN.
Disadvantage:
o The cost of the shielded twisted pair cable is not very high and not very low.
o An installation of STP is easy.
o It has higher capacity as compared to unshielded twisted pair cable.
o It has a higher attenuation.
o It is shielded that provides the higher data transmission rate.
Disadvantages
Coaxial Cable
o Coaxial cable is very commonly used transmission media, for example,
TV wire is usually a coaxial cable.
o The name of the cable is coaxial as it contains two conductors parallel
to each other.
o It has a higher frequency as compared to Twisted pair cable.
o The inner conductor of the coaxial cable is made up of copper, and the
outer conductor is made up of copper mesh. The middle core is made
up of non-conductive cover that separates the inner conductor from
the outer conductor.
o The middle core is responsible for the data transferring whereas the
copper mesh prevents from the EMI(Electromagnetic interference).
Fibre Optic
o Fibre optic cable is a cable that uses electrical signals for
communication.
o Fibre optic is a cable that holds the optical fibres coated in plastic that
are used to send the data by pulses of light.
o The plastic coating protects the optical fibres from heat, cold,
electromagnetic interference from other types of wiring.
o Fibre optics provide faster data transmission than copper wires.
Learn more
o The bus topology is designed in such a way that all the stations are
connected through a single cable known as a backbone cable.
o Each node is either connected to the backbone cable by drop cable or
directly connected to the backbone cable.
o When a node wants to send a message over the network, it puts a
message over the network. All the stations available in the network will
receive the message whether it has been addressed or not.
o The bus topology is mainly used in 802.3 (ethernet) and 802.4
standard networks.
o The configuration of a bus topology is quite simpler as compared to
other topologies.
o The backbone cable is considered as a "single lane" through which
the message is broadcast to all the stations.
o The most common access method of the bus topologies
is CSMA (Carrier Sense Multiple Access).
CSMA: It is a media access control used to control the data flow so that data
integrity is maintained, i.e., the packets do not get lost. There are two
alternative ways of handling the problems that occur when two nodes send
the messages simultaneously.
Ring Topology
3) Star Topology
4) Tree topology
o Tree topology combines the characteristics of bus topology and star
topology.
o A tree topology is a type of structure in which all the computers are
connected with each other in hierarchical fashion.
o The top-most node in tree topology is known as a root node, and all
other nodes are the descendants of the root node.
o There is only one path exists between two nodes for the data
transmission. Thus, it forms a parent-child hierarchy.
5) Mesh topology
Reliable: The mesh topology networks are very reliable as if any link
breakdown will not affect the communication between connected computers.
Hybrid Topology
o Reliable: If a fault occurs in any part of the network will not affect the
functioning of the rest of the network.
o Scalable: Size of the network can be easily expanded by adding new
devices without affecting the functionality of the existing network.
o Flexible: This topology is very flexible as it can be designed according
to the requirements of the organization.
o Effective: Hybrid topology is very effective as it can be designed in
such a way that the strength of the network is maximized and
weakness of the network is minimized.
Error Detection
When data is transmitted from one device to another device, the system
does not guarantee whether the data received by the device is identical to
the data transmitted by another device. An Error is a situation when the
message received at the receiver end is not identical to the message
transmitted.
Types Of Errors
Switching techniques
In large networks, there can be multiple paths from sender to receiver. The
switching technique will decide the best route for data transmission.
Message Switching
o Message Switching is a switching technique in which a message is
transferred as a complete unit and routed through intermediate nodes
at which it is stored and forwarded.
o In Message Switching technique, there is no establishment of a
dedicated path between the sender and receiver.
o The destination address is appended to the message. Message
Switching provides a dynamic routing as the message is routed
through the intermediate nodes based on the information available in
the message.
o Message switches are programmed in such a way so that they can
provide the most efficient routes.
o Each and every node stores the entire message and then forward it to
the next node. This type of network is known as store and forward
network.
o Message switching treats each message as an independent entity.
Advantages Of Message Switching
Packet Switching
o The packet switching is a switching technique in which the message is
sent in one go, but it is divided into smaller pieces, and they are sent
individually.
o The message splits into smaller pieces known as packets and packets
are given a unique number to identify their order at the receiving end.
o Every packet contains some information in its headers such as source
address, destination address and sequence number.
o Packets will travel across the network, taking the shortest path as
possible.
o All the packets are reassembled at the receiving end in correct order.
o If any packet is missing or corrupted, then the message will be sent to
resend the message.
o If the correct order of the packets is reached, then the
acknowledgment message will be sent.
o n the above diagram, A and B are the sender and receiver respectively.
1 and 2 are the nodes.
o Call request and call accept packets are used to establish a connection
between the sender and receiver.
o When a route is established, data will be transferred.
o After transmission of data, an acknowledgment signal is sent by the
receiver that the message has been received.
o If the user wants to terminate the connection, a clear signal is sent for
the termination.
Congestion cannot occur as all the Congestion can occur when the node is busy, and
packets travel in different directions. does not allow other packets to pass through.
Why Multiplexing?
o The transmission medium is used to send the signal from sender to
receiver. The medium can only have one signal at a time.
o If there are multiple signals to share one medium, then the medium
must be divided in such a way that each signal is given some portion of
the available bandwidth. For example: If there are 10 signals and
bandwidth of medium is100 units, then the 10 unit is shared by each
signal.
o When multiple signals share the common medium, there is a possibility
of collision. Multiplexing concept is used to avoid such collision.
o Transmission services are very expensive.
History of Multiplexing
o Multiplexing technique is widely used in telecommunications in which
several telephone calls are carried through a single wire.
o Multiplexing originated in telegraphy in the early 1870s and is now
widely used in communication.
o George Owen Squier developed the telephone carrier
multiplexing in 1910.
Concept of Multiplexing
Advantages of Multiplexing:
o More than one signal can be sent over a single medium.
o The bandwidth of a medium can be utilized effectively.
Multiplexing Techniques
Multiplexing techniques can be classified as:
Frequency-division Multiplexing (FDM)
o It is an analog technique.
o Frequency Division Multiplexing is a technique in which the
available bandwidth of a single transmission medium is subdivided into
several channels.
Disadvantages Of FDM:
Applications Of FDM:
o Synchronous TDM
o Asynchronous TDM
Synchronous TDM
o The capacity of the channel is not fully utilized as the empty slots are
also transmitted which is having no data. In the above figure, the first
frame is completely filled, but in the last two frames, some slots are
empty. Therefore, we can say that the capacity of the channel is not
utilized efficiently.
o The speed of the transmission medium should be greater than the total
speed of the input lines. An alternative approach to the Synchronous
TDM is Asynchronous Time Division Multiplexing.
Asynchronous TDM
In the above diagram, there are 4 devices, but only two devices are sending
the data, i.e., A and C. Therefore, the data of A and C are only transmitted
through the transmission line.
Introduction:
ISDN is a set of protocols that is based on high-speed fully digitized
telephone service. The main aim of ISDN is to provide a fully integrated
digital service to the users.
Tele Services:
In these types of services, the network may change the contents of the data.
It belongs to the last 4 layers of the OSI reference model. It includes
telephony, tele box, fax, and teleconferencing etc.
Supplementary Services:
Principles of ISDN:
Following are the principles of ISDN are:
Client/Server Network
o Client/Server network is a network model designed for the end users
called clients, to access the resources such as songs, video, etc. from a
central computer known as Server.
o The central controller is known as a server while all other computers
in the network are called clients.
o A server performs all the major operations such as security and
network management.
o A server is responsible for managing all the resources such as files,
directories, printer, etc.
o All the clients communicate with each other through a server. For
example, if client1 wants to send some data to client 2, then it first
sends the request to the server for the permission. The server sends
the response to the client 1 to initiate its communication with the client
2.
Advantages Of Client/Server network: