Computer Network Notes
Computer Network Notes
UNIT – 1
*Network Topology
1. Message
2. Sender
3. Receiver
4. Transmission Medium
1. Message :
This is most useful asset of a data communication system. The
message simply refers to data or piece of information which is to be
communicated. A message could be in any form, it may be in form
of a text file, an audio file, a video file, etc.
2. Sender :
To transfer message from source to destination, someone must be
there who will play role of a source. Sender plays part of a source in
data communication system. It is simple a device that sends data
message. The device could be in form of a computer, mobile,
telephone, laptop, video camera, or a workstation, etc.
3. Receiver :
It is destination where finally message sent by source has arrived. It
is a device that receives message. Same as sender, receiver can
also be in form of a computer, telephone mobile, workstation, etc.
4. Transmission Medium :
In entire process of data communication, there must be something
which could act as a bridge between sender and receiver,
Transmission medium plays that part. It is physical path by which
data or message travels from sender to receiver. Transmission
medium could be guided (with wires) or unguided (without wires),
for example, twisted pair cable, fiber optic cable, radio waves,
microwaves, etc.
# Representation of data
At present Information comes in different forms such as follows.
1. Numbers
2. Text
3. Images
4. Audio
5. Video
*Numbers –
Numbers are not represented as ASCII but by bit patterns. Numbers are
directly converted into binary representation to specify mathematical
operations. The 0s and 1s used to represent digital data. The number
system that humans normally use is in base 10.
Number File Formats –
Integer, Fixed point, Date, Boolean, Decimal, etc.
Example :
if we want to write the number 60338 in expanded form you might have
written it as 60338=60000+300+30+8.
*Text –
Text is also represented as bit pattern or sequence of bits(such as
0001111). Various types of bits are assigned to represent text symbols. A
code where each number represents a character can be used to convert
text into binary.
Text File Formats –
.doc,.docx, .pdf, .rtf, .txt, etc.
Example :
The letter ‘a’ has the binary number 0110 0001.
*Audio –
Audio signal is a representation of sound or music. Audio differs from all
i.e. from text, number and images. Audio is a series of binary numbers for
digital signals. It is continuous but not discrete.
Audio File Formats –
MP3, M4A audio file type, FLAC, WAV, WMA, AAC, etc.
*Video –
Video refers to the recording, broadcasting, copying or playback. Video
can either be produced or it is continuous and sometimes it is a
combination of multiple images produced in motion.
Video File Formats –
MP4, MOV, AVI, FLV, etc.
*Images –
Images are also represented as bit patterns. An image is composed of
matrix of pixels with different values of pixels each where each pixel is
represented as dots. Size of the picture is dependent on its resolution.
Consider a simple black and white image. If 1 is black (or on) and 0 is
white (or off), then a simple black and white picture can be created using
binary.
Image File Formats –
Image can be in the format of jpeg, PNG, TIFF, GIF, etc.
4. Source and sink: a flow network has two special nodes called
source and sink (or destination). A source node is where resources
come from, and a sink node is where resources should be delivered.
The goal is to find a viable flow from source to sink by optimizing
certain criteria such as maximizing flow or minimizing cost.
5. Capacity limits: Each edge has capacity limits that limit the
amount of current it can carry. The flow through the edge must not
exceed its capacity. This limit ensures that the network operates
within physical or logistical limits.
7. Max flow and min cut:- The minimum cut represents the smallest
set of edges whose removal would cut off the source of the sink and
is closely related to the maximum flow problem.
*Advantages:-
*Disadvantages :-
Topology defines the structure of the network of how all the components
are interconnected to each other. There are two types of topology:
physical and logical topology.
1) Bus Topology:-
o The bus topology is designed in such a way that all the stations are
connected through a single cable known as a backbone cable.
o Each node is either connected to the backbone cable by drop cable
or directly connected to the backbone cable.
o When a node wants to send a message over the network, it puts a
message over the network. All the stations available in the network
will receive the message whether it has been addressed or not.
o The bus topology is mainly used in 802.3 (ethernet) and 802.4
standard networks.
o The configuration of a bus topology is quite simpler as compared to
other topologies.
o The most common access method of the bus topologies
is CSMA (Carrier Sense Multiple Access).
o Limited failure: A failure in one node will not have any effect on
other nodes.
2) Ring Topology :-
o The node that receives the message from the previous computer
will retransmit to the next node.
3) Star Topology:-
o Star topology is an arrangement of the network in which every node
is connected to the central hub, switch or a central computer.
Each device requires only 1 port i.e. to connect to the hub, therefore
the total number of ports required is N.
It is Robust. If one link fails only that link will affect and not other
than that.
4) Tree Topology:-
o The top-most node in tree topology is known as a root node, and all
other nodes are the descendants of the root node.
o There is only one path exists between two nodes for the data
transmission. Thus, it forms a parent-child hierarchy.
It allows the network to get isolated and also prioritize from different
computers.
team members (leaf nodes) are at the bottom of the hierarchy, connected
to their respective managers and departments.
5) Mesh Topology:-
o It does not contain the switch, hub or any central computer which
acts as a central point of communication.
6) Hybrid Topology:-
o The combination of various different topologies is known as Hybrid
topology.
o Reliable: If a fault occurs in any part of the network will not affect
the functioning of the rest of the network.
There are 7 layers in the OSI Model and each layer has its specific role in
handling data
Physical Layer
Data Link Layer
Network Layer
Transport Layer
Session Layer
Presentation Layer
Application Layer
Bit Rate Control: The Physical layer also defines the transmission
rate i.e. the number of bits sent per second.
Error Control: The data link layer provides the mechanism of error
control in which it detects and retransmits damaged or lost frames.
Flow Control: The data rate must be constant on both sides else
the data may get corrupted thus, flow control coordinates the
amount of data that can be sent before receiving an
acknowledgment.
-At the sender’s side, the transport layer receives the formatted
data from the upper layers, performs Segmentation, and also
implements Flow and error control to ensure proper data
transmission. It also adds Source and Destination port number in its
header and forwards the segmented data to the Network Layer.
At the Receiver’s side, Transport Layer reads the port number from
its header and forwards the Data which it has received to the
respective application. It also performs sequencing and reassembling of
the segmented data.
The presentation layer is also called the Translation layer. The data
from the application layer is extracted here and manipulated as per the
required format to transmit over the network. Protocols used in the
Presentation Layer are JPEG, MPEG, GIF, TLS/SSL, etc.
At the very top of the OSI Reference Model stack of layers, we find the
Application layer which is implemented by the network applications.
These applications produce the data to be transferred over the network.
This layer also serves as a window for the application services to access
the network and for displaying the received information to the user.
Protocols used in the Application layer are SMTP, FTP, DNS, etc.
Establishing
1 –
Physical
Physical Bits USB, SONET/SDH, etc.
Connections
Layer
between Devices.
to another, located
Layer in different
networks.
Segments
Take Service from
4 – (for TCP)
Network Layer and
Transpor or TCP, UDP, SCTP, etc.
provide it to the
t Layer Datagrams
Application Layer.
(for UDP)
Establishes
Connection,
5 –
Maintenance, NetBIOS, RPC, PPTP,
Session Data
Ensures etc.
Layer
Authentication and
Ensures security.
Helps in identifying
7 –
the client and FTP, SMTP, DNS, DHC
Applicati Data
synchronizing P, etc.
on Layer
communication.
The OSI Model has seven layers, which can be complicated and
hard to understand for beginners.
In real-life networking, most systems use a simpler model called
the Internet protocol suite (TCP/IP), so the OSI Model is not always
directly applicable.
Each layer in the OSI Model adds its own set of rules and
operations, which can make the process more time-consuming and
less efficient.
--Protocol:-
A protocol is a set of rules that determines how data is sent and received
over a network. The protocol is just like a language that computers use
to talk to each other, ensuring they understand and can respond to each
other’s messages correctly.
Protocols help make sure that data
moves smoothly and securely
between devices on a network.
*Types of Protocol
* Here are some key protocols that are widely used in computer
networks:
*Standards:-
Standards are the set of rules for data communication that are needed
for the exchange of information among devices. It is important to follow
Standards which are created by various Standard Organizations like
IEEE, ISO, ANSI, etc.
Types of Standards
--IP Addressing:-
Dividing Data into Packets: When you send information over the
internet, IP split it into small parts called packets. Each packet
contains a piece of the data and the address of where it needs to
go.
This process helps data move efficiently across the internet, no matter
how far it needs to travel or how many networks it passes through.
Internet Protocols are of different types having different uses. These are
mentioned below:
3. PPP(Point-to-Point Protocol)
8. TELNET(Terminal Network)
9. IPv4
10. IPv6
*PPP(Point-to-Point Protocol):-
SFTP which is also known as SSH FTP refers to File Transfer Protocol (FTP)
over Secure Shell (SSH) as it encrypts both commands and data while in
transmission. SFTP acts as an extension to SSH and encrypts files and
data then sends them over a secure shell data stream. This protocol is
used to remotely connect to other systems while executing commands
from the command line.
*TELNET(Terminal Network):-
*IPv4:-
The fourth and initially widely used version of the Internet Protocol is
called IPv4 (Internet Protocol version 4). It is the most popular version of
the Internet Protocol and is in charge of distributing data packets
throughout the network. Maximum unique addresses for IPv4 are
4,294,967,296 (232), which are possible due to the use of 32-bit
addresses. The network address and the host address are the two
components of each address. The host address identifies a particular
device within the network, whereas the network address identifies the
network to which the host belongs. In the “dotted decimal” notation,
which is the standard for IPv4 addresses, each octet (8 bits) of the
address is represented by its decimal value and separated by a dot (e.g.
192.168.1.1).
*IPv6:-
The most recent version of the Internet Protocol, IPv6, was created to
address the IPv4 protocol’s drawbacks. A maximum of 4.3 billion unique
addresses are possible with IPv4’s 32-bit addresses. Contrarily, IPv6 uses
128-bit addresses, which enable a significantly greater number of unique
addresses. This is significant because IPv4 addresses were running out
and there are an increasing number of devices that require internet
access. Additionally, IPv6 offers enhanced security features like
integrated authentication and encryption as well as better support for
mobile devices. IPv6 support has spread among websites and internet
service providers, and it is anticipated to gradually displace IPv4 as the
main internet protocol.
The 32-bit IP address is divided into five sub-classes. These are given
below:
Class E (240-255 )
# Transmission Media:-
o Bandwidth: All the factors are remaining constant, the greater the
bandwidth of a medium, the higher the data transmission rate of a
signal.
o Transmission impairment: When the received signal is not
identical to the transmitted one due to the transmission
impairment. The quality of the signals will get destroyed due to
transmission impairment.
o Interference: An interference is defined as the process of
disrupting a signal when it travels over a communication medium
on the addition of some unwanted signal.
Least expensive
Easy to install
High-speed capacity
Eliminates crosstalk
Comparatively faster
More expensive
Bulky
---Coaxial Cable:-
It is easy to install.
Lightweight
Less signal attenuation
High cost
--Stripline
Stripline is a transverse electromagnetic (TEM) transmission line medium
invented by Robert M. Barrett of the Air Force Cambridge Research
Centre in the 1950s. Stripline is the earliest form of the planar
transmission line. It uses a conducting material to transmit high-
frequency waves it is also called a waveguide. This conducting material
is sandwiched between two layers of the ground plane which are usually
shorted to provide EMI immunity.
--Stripline
Less Secure
*Radio Waves:-
*Microwaves:-
*Infrared:-
Frequency
Frequency range: Frequency range: range: 300
Frequency 3 KHz to 1GHz. 1 GHz to 300 GHz. GHz to 400
range GHz.
Unshielded Twisted
Local Area Networks (LAN), telephones
Pair (UTP)
Advantages of MAN
MAN can serve multiple users at a time with the same high-speed
internet to all the users.
Disadvantages of MAN
The architecture of MAN is quite complicated hence, it is hard to
design and maintain.
Advantages of WAN
The travel charges that are needed to cover the geographical area
of work can be minimised.
Disadvantages of WAN
# WWAN:-
WLAN (Wireless Local Area Network) differs from WWAN (Wireless Wide
Area Network) technology wise for example when WLAN uses WiFi to
connect and transfer data, WWAN uses telecommunication cellular
network technologies such as 2G, 3G, 4G LTE, and 5G to transfer data.
WWAN not only always refers to a wide area rather a closed area with
large geographic coverage is also considered as WWAN.
Characteristics of WWAN :
Advantages of WWAN :
Disadvantages of WWAN :
**Types of LAN
Token ring: Token ring is a type of local area network (LAN) setup
that was once widely used but is now less common. It manages
network access through the use of tokens and has an operating
speed of 100 megabits per second.
Cloud-managed: A cloud-managed LAN depend on a centralized
cloud service to handle tasks such as access control, policy
enforcement, network setup, and various security and performance
issues. This approach simplifies management in diverse network
environments, making it ideal for businesses.
LAN administrator can see and check personal data files as well
as Internet history of each and every LAN user. Hence, the privacy
of the users are violated
Higher (cables,
Installatio Lower (just routers and access
switches,
n Cost points)
infrastructure)
Harder to expand
Easy to expand (add more
Scalability (new cables and ports
access points)
needed)
VLANs are used by network engineers for many purposes, such as the
following:
o To increase security.
o Enhance output.
VLANs may reduce the amount of traffic that a particular endpoint sees
and processes, which can enhance performance for devices on them. By
dividing broadcast domains, VLANs lower the total number of hosts that a
particular device may receive broadcasts from. For instance, phones won't
receive any workstation-generated broadcast traffic if all desktop voice
over IP phones are connected to one VLAN and all workstations are
connected to another. Each may restrict the network traffic to only what is
relevant.
**VLAN ranges:
VLAN 0, 4095: These are reserved VLAN which cannot be seen or
used.
VLAN 1: It is the default VLAN of switches. By default, all switch
ports are in VLAN. This VLAN can’t be deleted or edit but can be
used.
VLAN 2-1001: This is a normal VLAN range. We can create, edit
and delete these VLAN.
VLAN 1002-1005: These are CISCO defaults for fddi and token
rings. These VLAN can’t be deleted.
Vlan 1006-4094: This is the extended range of Vlan.
**VLAN types
VLANs may be use-based (often referred to as dynamic) or port-based
(sometimes referred to as static).
1. Trunk Link –
All connected devices to a trunk link must be VLAN-aware. All
frames on this should have a special header attached to it called
tagged frames.
2. Access link –
It connects VLAN-unaware devices to a VLAN-aware bridge. All
frames on the access link must be untagged.
3. Hybrid link –
It is a combination of the Trunk link and Access link. Here both
VLAN-unaware and VLAN-aware devices are attached and it can
have both tagged and untagged frames.
**Advantages –
Performance –
The network traffic is full of broadcast and multicast. VLAN reduces
the need to send such traffic to unnecessary destinations.
Formation of virtual groups –
As there are different departments in every organization namely
sales, finance etc., VLANs can be very useful in order to group the
devices logically according to their departments.
Security –
In the same network, sensitive data can be broadcast which can be
accessed by the outsider but by creating VLAN, we can control
broadcast domains, set up firewalls, restrict access. Also, VLANs
can be used to inform the network manager of an intrusion. Hence,
VLANs greatly enhance network security.
Flexibility –
VLAN provide flexibility to add, remove the number of host we
want.
Cost reduction –
VLANs can be used to create broadcast domains which eliminate
the need for expensive routers.
By using Vlan, the number of small size broadcast domain can be
increased which are easy to handle as compared to a bigger
broadcast domain.
Disadvantages of VLAN
Why Multiplexing?
o If there are multiple signals to share one medium, then the medium
must be divided in such a way that each signal is given some
portion of the available bandwidth. For example: If there are 10
signals and bandwidth of medium is100 units, then the 10 unit is
shared by each signal.
**Concept of Multiplexing
Advantages of Multiplexing:
o It is an analog technique.
Advantages Of FDM:
Disadvantages Of FDM:
Applications Of FDM:
o Wavelength Division
Multiplexing is same
as FDM except that
the optical signals are
transmitted through
the fibre optic cable.
o WDM is used on fibre optics to increase the capacity of a single
fibre.
o It is used to utilize the high data rate capability of fibre optic cable.
o It is an analog multiplexing technique.
o Optical signals from different source are combined to form a wider
band of light with the help of multiplexer.
o At the receiving end, demultiplexer separates the signals to transmit
them to their respective destinations.
o Multiplexing and Demultiplexing can be achieved by using a prism.
o Prism can perform a role of multiplexer by combining the various
optical signals to form a composite signal, and the composite signal
is transmitted through a fibre optical cable.
o Prism also performs a reverse operation, i.e., demultiplexing the
signal.
o It is a digital technique.
o Synchronous TDM
o Asynchronous TDM
--Synchronous TDM:-
o The capacity of the channel is not fully utilized as the empty slots
are also transmitted which is having no data. In the above figure,
the first frame is completely filled, but in the last two frames, some
slots are empty. Therefore, we can say that the capacity of the
channel is not utilized efficiently.
o The speed of the transmission medium should be greater than the
total speed of the input lines. An alternative approach to the
Synchronous TDM is Asynchronous Time Division Multiplexing.
-- Asynchronous TDM :-
Advantages of FHSS
Disadvantages of FHSS
Military Communications
Walkie-Talkies
Remote Controls
Advantages of DSSS
Disadvantages of DSSS
Applications of DSSS
Satellite Communication