CNND - Module 1 2
CNND - Module 1 2
Scalability
Scalability means that we can add the new components on the
network. Network must be scalable so that we can extend the network
by adding new devices. But, it decreases the speed of the connection
and data of the transmission speed also decreases, this increases the
chances of error occurring. This problem can be overcome by using
the routing or switching devices.
Reliability
Computer network can use the alternative source for the data
communication in case of any hardware failure.
Peer-To-Peer network
Client/Server network
Peer-To-Peer network
Peer-To-Peer network is a network in which all the
computers are linked together with equal privilege and
responsibilities for processing the data.
Peer-To-Peer network is useful for small environments,
usually up to 10 computers.
Peer-To-Peer network has no dedicated server.
Special permissions are assigned to each computer for
sharing the resources, but this can lead to a problem if
the computer with the resource is down.
Transmission
modes
The way in which data is transmitted from one device to another device is known as transmission mode.
The transmission mode is also known as the communication mode.
Each communication channel has a direction associated with it, and transmission media provide the direction.
Therefore, the transmission mode is also known as a directional mode.
The transmission mode is defined in the physical layer.
The Transmission mode is divided into three categories:
Simplex mode
Half-duplex mode
Full-duplex mode
In Full duplex mode, the communication is bi-directional, i.e., the data flow in both the directions.
Both the stations can send and receive the message simultaneously.
Full-duplex mode has two simplex channels. One channel has traffic moving in one direction, and another
channel has traffic flowing in the opposite direction.
The Full-duplex mode is the fastest mode of communication between devices.
The most common example of the full-duplex mode is a telephone network. When two people are
communicating with each other by a telephone line, both can talk and listen at the same time.
Advantage of Full-duplex mode:
Both the stations can send and receive the data at the same time.
Disadvantage of Full-duplex mode:
If there is no dedicated path exists between the devices, then the capacity of the communication channel is
divided into two parts.
Types Of Internetwork:
1. Extranet: An extranet is a communication network based on the internet protocol such
as Transmission Control protocol and internet protocol. It is used for information sharing. The
access to the extranet is restricted to only those users who have login credentials. An extranet is the lowest
level of internetworking. It can be categorized as MAN, WAN or other computer networks. An extranet cannot
have a single LAN, atleast it must have one connection to the external network.
2. Intranet: An intranet is a private network based on the internet protocol such as Transmission
Control protocol and internet protocol. An intranet belongs to an organization which is only
accessible by the organization's employee or members. The main aim of the intranet is to share the
information and resources among the organization employees. An intranet provides the facility to work in
groups and for teleconferences.
Prof. GIRISH G GALGATE MU/SE/III/CNND/IT
Computer Network Hardware/Components
Computer network components are the major parts which are needed to install the software. Some
important network components are NIC, switch, cable, hub, router, and modem.
Depending on the type of network that we need to install, some network components can also be removed. For
example, the wireless network does not require a cable.
Following are the major components required to install a network:
NIC
NIC stands for network interface card.
NIC is a hardware component used to connect a computer with
another computer onto a network
It can support a transfer rate of 10,100 to 1000 Mb/s.
The MAC address or physical address is encoded on the network card chip
which is assigned by the IEEE to identify a network card uniquely.
The MAC address is stored in the PROM (Programmable read-only memory).
Bridg
e Bridges convert network data formats and perform basic
data transmission management.
Bridges provide connections between LANs.
They also check data to determine if it should cross the
bridge. This makes each part of the network more efficient
Advantages Of Router:
Security: The information which is transmitted to the network will
traverse the entire cable, but the only specified device which has been
addressed can read the data.
Reliability: If the server has stopped functioning, the network goes
down, but no other networks are affected that are served by the router.
Performance: Router enhances the overall performance of the
network. Suppose there are 24 workstations in a network generates a
same amount of traffic. This increases the traffic load on the network.
Router splits the single network into two networks of 12 workstations each,
reduces the traffic load by half.
Network range
It generates a virtual path between the sender and the It does not make any virtual connection or path between
receiver. the sender and the receiver.
It needed a higher bandwidth to transmit the data It requires low bandwidth to share the data packets.
packets.
There is no congestion as it supports an end-to-end There can be congestion due to not providing an end-to-
connection between sender and receiver during data end connection between the source and receiver to
transmission. transmit data packets.
It is a more dependable connection service because it It is not a dependent connection service because it does
assures data packets transfer from one end to the other not ensure the share of data packets from one end to
end with a connection. another for supporting a connection.
When server is ready to accept request of incoming connection, it simply put this primitive into action. Listen
Listen
primitive simply waiting for incoming connection request.
Connect This primitive is used to connect the server simply by creating or establishing connection with waiting peer.
Accept This primitive simply accepts incoming connection from the peer.
Receive These primitive afterwards block the server. Receive primitive simply waits for incoming message.
This primitive is put into action by the client to transmit its request that is followed by putting receive primitive
Send
into action to get the reply. Send primitive simply sends or transfer the message to the peer.
Disconne This primitive is simply used to terminate or end the connection after which no one will be able to send any of
ct the message. Prof. GIRISH G GALGATE MU/SE/III/CNND/IT
Prof. GIRISH G GALGATE MU/SE/III/CNND/IT
Prof. GIRISH G GALGATE MU/SE/III/CNND/IT
OSI REFERENCE MODEL:
If every vendor uses its own stds. to interface to other system,
there requires more interfacing H/W. This is called as closed
system.
To avoid monopoly of single vendor, Open system architecture
was developed, to have communication between computer n/w
equipments.
The reference architectural Model was developed by ISO
(International Organization for Standardization) called as OSI
Model (Open System Interconnection) & also the associated
standard protocols were developed.
The overall communication process is partitioned, by OSI ref.
model, into the functions carried out by various layer.
Reliable and in-order delivery Robust but out of order, duplicate, delay,
even lost in delivery
(b Blocking Unblocking
)
n-SDU n-SDU n-SDU n-SDU n-SDU n-SDU
n-PDU n-PDU
DATA
DATA
Segment
PKTS
Frames
Bits Bits
Prof. GIRISH G GALGATE MU/SE/III/CNND/IT
Transfer of what across what in each
layer
Transport layer: transfer messa fro end (source) to end
ges m (destination).
of
Network layer:transfer packet acros multiple
of s s networks.
acros
Data link layer: transfer
of
fram
s
a transmission
es
Physical layer: transfer bi over
link.
a communication
of ts channel.
Network Network
1 2
I. Its job is to permit hosts to inject Pkts into any n/w & have them travel independently
to the destination.
II. It handles the transfer of info across multiple n/w through Gateway or Router.
III. It is corresponds to n/w layer of OSI model i.e. (a) transfer of Pkt between machine,
connected to different n/w. (b) routing and congestion control
IV. It deals with routing & congestion control.
V. “Global Unique Address” (IP address) for machines, attached to internet, is key aspect
of internet layer.
Transpo TC UD TCP/UDP
rt P P Provides
a network
independent
platform
IP provides
Intern I independence
et P from
underlying
networks
IP IP DATA
Header
Network Layer 🡺
Data-Link Layer 🡺
Physical layer 🡺
End of Module 1