Computer Network 1
Computer Network 1
Goals of Networks
Different goals of networks
A network is a connection between two or multiple devices to transfer
data or information with utmost security. To achieve this security, the
following goals of the network can be considered –
Enable Communication
The primary goal of a network is to establish communication between
the sender and the receiver. This communication can be in the form of
audio, video, or text. The network ensures that communication is
established efficiently between the sender and receiver.
Ensure Security
With the rise in data requirements, there is a need to secure this data.
Networks provide security of data from unethical and unauthorized
access. It uses various security measures like encryption, firewalls, data
access points, etc. to safeguard the data from cyber-attacks.
Sharing resources
Networking helps in sharing resources with more than one device. Like a
printer can be shared by 4 or more computers. This makes it more
economical.
Performance
The performance of a network is very important for an organization. A
properly designed network gives high performance and increases
productivity. Let’s discuss a few ways in which networking improves
performance.
Remote access
By networking, people can access and work remotely using the same
applications and information. Thus increasing the productivity of the
workforce by giving them flexibility in their work routine.
Bandwidth Optimization
Networking manages the bandwidth effectively so that the most needed
applications receive priority in network traffic. This minimizes the
congestion in a network.
Security
Networking improves the performance of an organization by providing it
with security. It ensures that the network is protected from
unauthorized access and cyber threats.
Reliability
Networks ensure reliability so that users can depend on systems for any
data loss and critical services.
Advantages of MAN
MAN offers high-speed connectivity in which the speed ranges from 10-
100 Mbps.
The security level in MAN is high and strict as compared to WAN.
It support to transmit data in both directions concurrently because of
dual bus architecture.
MAN can serve multiple users at a time with the same high-speed
internet to all the users.
MAN allows for centralized management and control of the network,
making it easier to monitor and manage network resources and security.
Disadvantages of MAN
The architecture of MAN is quite complicated hence, it is hard to design
and maintain.
This network is highly expensive because it required the high cost to set
up fiber optics.
It provides less fault tolerance.
The Data transfer rate in MAN is low when compare to LANs.
Advantages of WAN
It covers large geographical area which enhances the reach of
organisation to transmit data quickly and cheaply.
The data can be stored in centralised manner because of remote access
to data provided by WAN.
The travel charges that are needed to cover the geographical area of
work can be minimised.
WAN enables a user or organisation to connect with the world very
easily and allows to exchange data and do business at global level.
Disadvantages of WAN
Traffic congestion in Wide Area Network is very high.
The fault tolerance ability of WAN is very less.
Noise and error are present in large amount due to multiple connection
point.
The data transfer rate is slow in comparison to LAN because of large
distances and high number of connected system within the network.
Transmission Technology
Transmission is actually the process of sending and propagating analog or
signals of digital information. Transmission technology generally refers to
physical layer protocol duties like modulation, demodulation, line coding, and
many more. It might also include higher-level protocol duties such as digitizing
analog signals, data compression, etc.
Types of Transmission Technology :
Transmission media is basically divided into two categories: Broadcast
Networks, Point-to-Point Networks. These are explained as following below.
1. Broadcast Networks :
Broadcast networks are also known as terrestrial networks. It is basically a
group of radio stations, television stations, or any other electronic media
outlets that simply generate agreement to air, or broadcast, content generally
from a centralized source. Broadcasting is simply a method of transferring
messages to all the recipients simultaneously.
In this network, a message that is sent by a node is received by all the other
nodes connected to the network and share a common medium of
communication. Broadcast networks also avoid procedures of complex routing
of switched network by simply confirming and ensuring that each transmission
of nodes is basically received by all the other nodes in the network. This is the
reason why the broadcast network has single communications channel.
In this network, each receiving station just receives all signals that are sent by
transmitters. Even routing of signals is highly affected passively. These
networks generally have single communication that is shared by all machines
present on the network. Short messages also are known as packets that are
sent by any of the machines present are received by all of the others present
over there. Some of the systems of broadcast also support transmission to
subset of machines also known as multicasting. It just links, in contrast,
communication channel that is basically shared by all of machines in network.
Network Architecture
Network architecture generally refers to the design of a computer network or
communications network. It simply describes the allocation task between all of
the computers in the network. It is simply a way in which all network devices
and services are organized and managed to connect clients like laptops,
tablets, servers, etc., and also how tasks are allocated to computers.
It is defined as the physical and logical design of software, hardware, protocols,
and media of data transmission. In this article, we are going to discuss Network
Architecture in detail along with its type, the skills required to become a
network architect, and many more.
What is a Computer Network Architect?
A computer network architect sets up the computer and communication
systems for a company. “Network architecture” means the rules, tools, and
software that help people in the company stay connected without any
problems.
Network Architect vs Network Administrator vs Network Engineer
Network Administrator: They take care of a network that’s already set
up. They handle day-to-day tasks like fixing problems, adding users, and
making sure everything runs smoothly.
Network Engineer: They’re like the builders and fixers. They create
networks based on designs, make changes when needed,
and troubleshoot any issues that pop up.
Network Architect: They’re the big planners. They design how a network
should look and work. They create the blueprint that the engineers
follow to build the network
Types of Network Architecture
Computer networks can be classified based on architecture into two primary
types:
Peer-to-Peer Architecture
Client/Server Architecture
OSI Model
The OSI (Open Systems Interconnection) Model is a set of rules that explains
how different computer systems communicate over a network. OSI Model was
developed by the International Organization for Standardization (ISO). The OSI
Model consists of 7 layers and each layer has specific functions and
responsibilities. This layered approach makes it easier for different devices and
technologies to work together. OSI Model provides a clear structure for data
transmission and managing network issues. The OSI Model is widely used as a
reference to understand how network systems function.
How Data Flows in the OSI Model?
When we transfer information from one device to another, it travels through 7
layers of OSI model. First data travels down through 7 layers from the sender’s
end and then climbs back 7 layers on the receiver’s end.
Data flows through the OSI model in a step-by-step process:
Application Layer: Applications create the data.
Presentation Layer: Data is formatted and encrypted.
Session Layer: Connections are established and managed.
Transport Layer: Data is broken into segments for reliable delivery.
Network Layer: Segments are packaged into packets and routed.
Data Link Layer: Packets are framed and sent to the next device.
Physical Layer: Frames are converted into bits and transmitted physica
The physical Layer defines the types of encoding (that is how the 0’s and 1’s
are encoded in a signal). It is responsible for the communication of the
unstructured raw data streams over a physical medium.
Functions Performed by Physical Layer
The Physical Layer is responsible for sending raw data as bits over a physical
medium. It converts data into signals that can travel through wires, fiber
optics, or wireless channels (encoding) and turns these signals back into data
at the receiver (decoding). It ensures signals are transmitted correctly and uses
techniques like modulation to prepare the data for transmission
and demodulation to retrieve it at the other end. This layer also decides how
data flows (one-way, two-way alternately, or simultaneously)
through transmission modes and controls the speed and timing of data
transmission to keep everything running smoothly.
Modes of Transmission Medium
Simplex mode: In this mode, out of two devices, only one device can
transmit the data, and the other device can only receive the data.
o Example- Input from keyboards, monitors, TV broadcasting, Radio
broadcasting, etc.
Half Duplex mode: In this mode, out of two devices, both devices can
send and receive the data but only one at a time not simultaneously.
o Examples- Walkie-Talkie, Railway Track, etc.
Full-Duplex mode: In this mode, both devices can send and receive the
data simultaneously.
o Examples- Telephone Systems, Chatting applications, etc.
Advantages of the Physical Layer
It ensures devices can transmit and receive raw data over physical
mediums.
It provides universal standards for cables, connectors, and signaling,
ensuring compatibility.
Support for Various Media: Works with wired (e.g., Ethernet) and
wireless (e.g., Wi-Fi) technologies.
Limitations of the Physical Layer
No Error Handling: Cannot detect or correct errors in data transmission.
Susceptible to Physical Damage: Cables, connectors, and hardware
failures can disrupt communication.
No Data Interpretation: It only transmits bits and doesn’t understand or
process the actual data.
Layer 2 – Data Link Layer (DLL)
The data link layer is the second layer from the bottom in the OSI (Open
System Interconnection) network architecture model. It is responsible for the
node-to-node delivery of data within the same local network. Its major role is
to ensure error-free transmission of information. DLL is also responsible for
encoding, decoding, and organizing the outgoing and incoming data.
This is considered the most complex layer of the OSI model as it hides all the
underlying complexities of the hardware from the other above layers. In this
article, we will discuss Data Link Layer in Detail along with its functions, and
sub-layers.
Sub-Layers of The Data Link Layer
The data link layer is further divided into two sub-layers, which are as follows:
Logical Link Control (LLC)
This sublayer of the data link layer deals with multiplexing, the flow of data
among applications and other services, and LLC is responsible for providing
error messages and acknowledgments as well.
Media Access Control (MAC)
MAC sublayer manages the device’s interaction, responsible for addressing
frames, and also controls physical media access. The data link layer receives
the information in the form of packets from the Network layer, it divides
packets into frames and sends those frames bit-by-bit to the underlying
physical layer.
Devices Operating at the Data Link Layer
1.Switch
A switch is a key device in the Data Link Layer.
It uses MAC addresses to forward data frames to the correct device
within a network.
Works in local area networks (LANs) to connect multiple devices.
2. Bridge
A bridge connects two or more LANs, creating a single, unified network.
Operates at the Data Link Layer by forwarding frames based on MAC
addresses.
Used to reduce network traffic and segment a network.
3. Network Interface Card (NIC)
A NIC is a hardware component in devices like computers and printers.
Responsible for adding the MAC address to frames and ensuring proper
communication with the network.
Operates at the Data Link Layer by preparing and sending frames over
the physical medium.
4. Wireless Access Point (WAP)
A WAP allows wireless devices to connect to a wired network.
Operates at the Data Link Layer by managing wireless MAC addresses.
Uses protocols like Wi-Fi (IEEE 802.11) to communicate with devices.
5. Layer 2 Switches
These are specialized switches that only operate at Layer 2, unlike multi-
layer switches.
Responsible for frame forwarding using MAC address tables.
Limitations of Data Link Layer
Limited Scope: It operates only within a local network and cannot handle
end-to-end communication across different networks.
Increased Overhead: Adding headers, trailers, and redundant data (for
error correction) increases the size of transmitted data.
Error Handling Dependency: While it can detect and correct some errors,
it relies on upper layers for handling more complex issues.
No Routing Capability: The Data Link Layer cannot make routing
decisions. It only ensures delivery within the same network segment.
Resource Usage: Flow control and error correction mechanisms may
consume extra processing power and memory
Applications of Data Link Layer
Local Area Networks (LANs): Enables reliable communication between
devices within a local network using protocols like Ethernet (IEEE 802.3).
Wireless Networks (Wi-Fi): Manages communication between devices in
wireless networks via protocols like IEEE 802.11 hence, handling media
access and error control.
Switches and MAC Addressing: Facilitates the operation of switches by
using MAC addresses to forward data frames to the correct device
within the network.
Point-to-Point Connections: Used in protocols like PPP (Point-to-Point
Protocol) to establish and manage direct communication between two
nodes.
The network layer works for the transmission of data from one host to the
other located in different networks. It also takes care of packet routing i.e.
selection of the shortest path to transmit the packet, from the number of
routes available. The sender and receiver’s IP address are placed in the header
by the network layer. Segment in the Network layer is referred to as
Packet. Network layer is implemented by networking devices such as routers
and switches.
Functions of the Network Layer
Routing: The network layer protocols determine which route is suitable
from source to destination. This function of the network layer is known
as routing.
Logical Addressing: To identify each device inter-network uniquely, the
network layer defines an addressing scheme. The sender and receiver’s
IP addresses are placed in the header by the network layer. Such an
address distinguishes each device uniquely and universally.
Layer 4 – Transport Layer
The transport layer provides services to the application layer and takes services
from the network layer. The data in the transport layer is referred to
as Segments. It is responsible for the end-to-end delivery of the complete
message. The transport layer also provides the acknowledgment of the
successful data transmission and re-transmits the data if an error is found.
Protocols used in Transport Layer are TCP, UDP NetBIOS, PPTP.
At the sender’s side, the transport layer receives the formatted data from the
upper layers, performs Segmentation, and also implements Flow and error
control to ensure proper data transmission. It also adds Source and
Destination port number in its header and forwards the segmented data to the
Network Layer.
Generally, this destination port number is configured, either by default
or manually. For example, when a web application requests a web
server, it typically uses port number 80, because this is the default port
assigned to web applications. Many applications have default ports
assigned.
At the Receiver’s side, Transport Layer reads the port number from its header
and forwards the Data which it has received to the respective application. It
also performs sequencing and reassembling of the segmented data.
Functions of the Transport Layer
Segmentation and Reassembly: This layer accepts the message from the
(session) layer and breaks the message into smaller units. Each of the
segments produced has a header associated with it. The transport layer
at the destination station reassembles the message.
Service Point Addressing: To deliver the message to the correct process,
the transport layer header includes a type of address called service point
address or port address. Thus, by specifying this address, the transport
layer makes sure that the message is delivered to the correct process.
Services Provided by Transport Layer
Connection-Oriented Service
Connectionless Service
Layer 5 – Session Layer
The Session Layer is the 5th layer in the Open System Interconnection (OSI)
model which plays an important role in controlling the dialogues (connections)
between computers. This layer is responsible for setting up, coordinating, and
terminating conversations, exchanges, and dialogues between the applications
at each end. It establishes, manages, and terminates the connections between
the local and remote applications.
The Session Layer is responsible for establishing active communication
sessions between two devices.
In the OSI model, the transport layer is not responsible for releasing a
connection. Instead, the session layer is responsible for that. However,
in modern TCP/IP networks, TCP already provides orderly closing of
connections at the transport layer.
Dialogue Control is also implemented in the Session Layer of the OSI
model but in TCP/IP the dialogue control is implemented in the
Application Layer.
Functions of the Session Layer
1. Session Establishment : It establishes and manages sessions between
communicating parties that cab be connection-oriented or
connectionless. It also maps sessions to transport connections.
2. Communication Synchronization : It ensures reliable connectivity and
recovery by using synchronization bits and checkpoints in data stream.
3. Activity Management : It allow the user to divide data into logical units
called activities. An activity can be processed on its own and each
activity is independent of activities that come before and after it.
4. Dialog Management : It refers to deciding whose turn it is to talk. Some
applications uses a token mechanism for half-duplex mode, where only
one party holds the token to transmit data while other supports full-
duplex mode for simultaneous data transmission.
5. Data Transfer : It manages data exchange between systems.
6. Resynchronization : In this, all the tokens are restored to the positions
that were set during synchronization. The various options for
resynchronization includes set, abandon and restart.
Example
Let us consider a scenario where a user wants to send a message through
some Messenger application running in their browser. The “Messenger” here
acts as the application layer which provides the user with an interface to
create the data. This message or so-called Data is compressed, optionally
encrypted (if the data is sensitive), and converted into bits (0’s and 1’s) so that
it can be transmitted.
Layer 6 – Presentation Layer
The presentation layer is also called the Translation layer. The data from the
application layer is extracted here and manipulated as per the required format
to transmit over the network. Protocols used in the Presentation Layer
are JPEG, MPEG, GIF, TLS/SSL, etc.
Functions of the Presentation Layer
Translation: For example, ASCII to EBCDIC.
Encryption/ Decryption: Data encryption translates the data into another
form or code. The encrypted data is known as the ciphertext, and the
decrypted data is known as plain text. A key value is used for encrypting
as well as decrypting data.
Compression: Reduces the number of bits that need to be transmitted
on the network.
Services Provided by Presentation Layer
Presentation layer plays an important role while communication is taking place
between two devices in a network.
List of services which are provided by the presentation layer are:
Presentation layer could apply certain sophisticated compression
techniques, so fewer bytes of data are required to represent the
information when it is sent over the network.
If two or more devices are communicating over an encrypted
connection, then this presentation layer is responsible for adding
encryption on the sender’s end as well as the decoding the encryption
on the receiver’s end so that it can represent the application layer with
unencrypted, readable data.
This layer formats and encrypts data to be sent over a network,
providing freedom from compatibility problems.
This presentation layer is also responsible for compressing data it
receives from the application layer before delivering it to the session
layer (which is the 5th layer in the OSI model) and thus improves the
speed as well as the efficiency of communication by minimizing the
amount of the data to be transferred.
This presentation layer also negotiates the Transfer Syntax.
Layer 7 – Application Layer
At the very top of the OSI Reference Model stack of layers, we find the
Application layer which is implemented by the network applications. These
applications produce the data to be transferred over the network. This layer
also serves as a window for the application services to access the network and
for displaying the received information to the user. Protocols used in the
Application layer are SMTP, FTP, DNS, etc.
1. Application
2. Presentation
1. Application
3. Session
2. Transport
Layers 4. Transport
3. Internet
5. Network
4. Network Access (Link Layer)
6. Data Link
7. Physical
TCP/IP Model (Transmission
OSI Model (Open Systems
Aspect Control Protocol/Internet
Interconnection)
Protocol)
Protocol
Protocol-independent (descriptive) Protocol-specific (prescriptive)
Dependency
Delivery
Ensures delivery of data packets Delivery is not always guaranteed
Guarantee
OSI itself does not define security TCP/IP includes security protocols
Security
protocols like IPSec
Decentralized Systems
Decentralized systems are computing architectures where multiple nodes,
often spread across different locations, share control and processing power
without a single central authority. Each node in a decentralized system
operates independently but collaborates with others to achieve common
goals. This structure enhances fault tolerance, scalability, and resilience
compared to centralized systems.
Distributed Systems
Distributed systems are computing architectures where multiple independent
nodes or computers work together to achieve a common goal. These nodes
communicate and coordinate with each other over a network, appearing as a
single coherent system to the end user. Distributed systems aim to improve
performance, reliability, scalability, and resource sharing by leveraging the
collective power of interconnected devices.
Key Characteristics of Distributed Systems
1. Geographical Distribution:
Nodes are spread across different physical locations.
They communicate via a network, such as a local area network
(LAN) or the internet.
2. Resource Sharing:
Nodes share resources such as processing power, storage, and
data.
This enables more efficient utilization of resources.
3. Concurrency:
Multiple nodes operate concurrently, performing tasks
simultaneously.
This parallelism enhances the system’s overall performance and
throughput.
4. Scalability:
Easy to scale by adding more nodes to the system.
System capacity and performance improve with the addition of
resources.
5. Fault Tolerance:
Designed to handle failures gracefully.
Redundancy and replication ensure the system remains
operational even if some nodes fail.
6. Transparency:
The complexity of the distributed system is hidden from users.
Users interact with the system as if it were a single entity.
Complex, requires
More complex,
Easier to manage coordination and
Management requires managing
centrally. management of many
multiple nodes.
nodes.
Potentially higher
Lower latency, as Can vary, depends
latency due to
Latency operations are on the distance
network
managed centrally. between nodes.
communication.
Web-Based Networking
Introduction
Web-based networking refers to the use of internet technologies to establish,
manage, and communicate over networks without relying on traditional
physical infrastructure. It enables file sharing, communication, remote access,
and cloud-based services through web applications and protocols.
2) Internet Services
The Internet provides various services that enable communication, data
transfer, and media access. Some of the key services include:
Email Services
Allows users to send and receive messages via email clients (Gmail,
Yahoo, Outlook).
Uses protocols like SMTP (Simple Mail Transfer Protocol), POP3, and
IMAP.
World Wide Web (WWW)
A collection of web pages accessible via the Internet using a web
browser.
Uses HTTP (Hypertext Transfer Protocol) and HTTPS (Secure HTTP) for
communication.
File Transfer Protocol (FTP)
A protocol for transferring files between computers on a network.
Used for website maintenance, software downloads, and file sharing.
Remote Access Services
Allows users to connect to networks remotely.
Includes VPN (Virtual Private Network) for secure access and SSH
(Secure Shell) for command-line access to remote servers.
Streaming Services
Delivers audio and video content in real time.
Examples: YouTube, Netflix, Spotify.
3) Connection-Oriented Networks
Connection-oriented networks establish a dedicated communication path
before data transfer, ensuring reliable and ordered delivery.
X.25 Network
An early packet-switched network used in banking and financial
services.
Ensures error control and flow control before delivering packets.
Operates at the network layer of the OSI model.
Frame Relay
A high-speed packet-switched technology used for Wide Area Networks
(WANs).
Faster than X.25 but does not provide error correction.
Used in corporate networks for connecting remote offices.
Asynchronous Transfer Mode (ATM)
A cell-switched network that uses fixed-size 53-byte cells.
Supports voice, video, and data transmission, making it ideal for
telecommunications.
Used in broadband networks and ISDN (Integrated Services Digital
Network).