UNIT1Computer Network
UNIT1Computer Network
Unit-I
Unit 1 Introduction to Computer Networking, Network
Topologies, Types of area networks – LAN, MAN and
WAN, Transmission Modes in Computer Networks
(Simplex, Half-Duplex and Full-Duplex), Layers of OSI
Model, TCP/IP Model,Network Devices (Hub, Repeater,
Bridge, Switch, Router), IEEE 802.3;
ETHERNET, Fast ETHERNET, Gigabit ETHERNET
Text Books:
[T1] Andrew S. Tanenbaum, David J Wetherall, “Computer
Networks”, Pearson
Education.
[T2] Alberto Leon Garcia and Indra Widjaja, “Communication
Networks:
Fundamental Concepts and Key Architectures”, Tata McGraw
Hill
[T3] James Kurose, Keith Ross, “Computer Networks: A Top -
Down Approach”,
Pearson Education.
Reference Books:
[R1] Larry L Peterson, Bruce S Davis, “Computer Networks”,
Introduction
Hosts/Nodes
Servers
Client
Network hardware(NIC,Router,Switch ,Hub)
Communication channel
Software(such as protocol,network operating system etc)
Network Services
Wired Network PC Firewall The Internet
Router
Switch
Wireless Network
Network Topologies
Advantages: Disadvantages:
1. There is no central controller. 1. It is possible that more than one station may
attempt transmission simultaneously (collision or
2. Control resides in each station
contention).
3. The less interconnecting wire is
2. Difficult reconfiguration and fault isolation.
required.
3. A fault or break in the bus cable stops all
4. Ease of installation.
transmission, even between devices on the same
5. Backbone cable can be laid along the side of the problem.
most efficient path, and then
4. The damaged area reflects signals in the direction
connected to the nodes by drop lines
of origin, creating noise in both directions
of various lengths
Ring Topology
• All devices are connected to one another in the shape
of a closed loop.
• Each device is connected directly to two other devices,
one on either side of it.
•Data is accepted from one of the neighbouring nodes and is
transmitted to another
Advantages:
1. Avoids the collisions that are possible in the bus topology.
2. Each pair of stations has a point-to-point connection.
3. A signal is passed along the ring in one direction, from device to
another, until it reaches its destination.
4. Each device incorporates a repeater.
5. Relatively easy to install and reconfigure.
6. Fault isolation is simplified.
Disadvantages:
1. A break in the ring (such as station disabled) can disable the entire
Star Topology
• All devices are connected to a central hub.
• Nodes communicate across the network by passing data
through the hub or switch.
Advantages:
1. Easy to install and reconfigure.
2. Robustness, if one link fails; only that link is affected. All other
links remain active.
3. Easy fault identification and isolation. As long as the hub is
working, it can be used to monitor link problems and bypass
defective links.
Disadvantages:
1. The devices are not linked to each other.
2. If one device wants to send data to another, it sends it to the
controller, which then relays the data to the other connected device.
Tree Topology
Advantages:
1. It allows more devices to be attached to a
single central hub and can therefore increase
the distance a signal can travel between
devices.
2. It allows the network to isolate and prioritize
communications from different computers.
Disadvantages:
1. The devices are not linked to each other.
2. If one device wants to send data to another,
it sends it to the controller, which then relays
the data to the other connected device.
3. The addition of secondary hubs brings two
further advantages.
Mesh Topology
Each host has its connections to all other hosts.
Mesh topology is implemented to provide as much
protection as possible from interruption of service.
1. A nuclear power plant might use a mesh
topology in the networked control systems.
2. Although the Internet has multiple paths to any
one location, it does not adopt the full mesh
topology.
Advantages: Disadvantages:
1. The use of dedicated links guarantees that each 1. A large amount of cabling required.
connection can carry its data load, thus eliminating 2. A large amount of I/O ports required.
the traffic problems that can occur when links must 3. Installation and reconfiguration are difficult.
be shared by multiple devices. 4. The sheer bulk of the wiring can be greater
2. It is robust, if one link becomes unusable, it does than the available space (in the walls, ceiling,
not incapacitate (affect) the entire system. or floors) can accommodate.
3. Privacy and Security (every message sent travels 5. The hardware required to connect each
along a dedicated line; only the intended recipient link (I/O ports and cables) can be
sees it). prohibitively expensive.
4. Point-to-point links make fault identification and
fault isolation easy.
Types of Area Network
Simplex
Half–duplex
Full-duplex
Simplex
Half-Duplex
In half-duplex mode, each station can both transmit and receive, but not at
the same time.
When one device is sending, the other can only receive, and vice versa.
The half-duplex mode is used in cases where there is no need for
communication in both directions at the same time.
The entire capacity of the channel can be utilized for each direction.
Example: Walkie-talkie in which message is sent one at a time and messages
are sent in both directions.
Full-Duplex
In full-duplex mode, both stations can transmit and receive simultaneously.
In full duplex mode, signals going in one direction share the capacity of the link
with signals going in another direction, this sharing can occur in two ways:
Either the link must contain two physically separate transmission paths, one for sending
and the other for receiving.
Or the capacity is divided between signals traveling in both directions.
Application Application
Layer 7
Presentation Presentation
Layer 6
Session Session
Layer 5
Transport Transport
Layer 4
Network Network
Layer 3
Physical Physical
Layer 1
medium
1. PHYSICAL LAYER
Physical layer in the OSI model is the lowest layer of the OSI reference model.
It is responsible for sending raw bits from one computer to another computer over a
network.
defines the relationship between a device and a transmission medium, such as a copper
or optical cable.
It plays the role of interacting with actual hardware and signaling mechanisms.
2. DATA LINK LAYER
This layer takes the data frames or messages from the Network Layer and provides for
their actual transmission flow control
At the receiving computer, this layer receives the incoming data and sends it to the
network layer for handling
It does this by packaging the data from the Network Layer into a frame, which includes error
detection information
At the receiving computer, the Data-Link Layer reads the incoming frame, and
generates its own error detection information based on the received frames data. After
receiving the entire frame, it then compares its error detection value with that of the
incoming frames, and if they match, the frame has been received correctly.
Hop to Hop Delivery
Error Control
Flow control
.
3.Network layer
to provide an end-to-end communication capability in contrast to
machine-to-machine communication provided by the data link layer.
This end-to-end is performed using two basic approaches known as
connection oriented or connectionless network-layer servicesprovides
the transparent transfer of data between transport entities.
Responsible for establishing, maintaining, and terminating connections
(between networks). Use globally unique node address.
This is responsible for addressing messages and data so they are sent to
the correct destination, and for translating logical addresses and names
(like a machine name FLAME) into physical addresses. This layer is also
responsible for finding a path through the network to the destination
computer
4.TRANSPORT LAYER
Ensures that data units are delivered error-free, in sequence, without no
losses or duplications.
This layer also repackages data by assembling long messages into lots of
smaller messages for sending and repackaging the smaller messages into the
original larger messages at the receiving end
5.Session layer
Session Establishment: The session layer's main function is to establish a
connection between the session users, known as a session. It can select a session
between two computers for communication, file transfer, remote login or other
purposes.
Normal Data Transfer: It is an essential function of the session layer. The data
network between the customer entities may either be a two-way alternate (half-
duplex) or two way concurrent (full-duplex).
Dialogue Management: In this term, the session relationship is full-duplex, but the
upper layer sometimes communicates in half-duplex nodes. In such methods, the
session layer has to manage the track of those to speak and is referred to as the
dialogue management.
Session Release: For releasing the session connection, one of the following four
variations are used, which are namely, User abort, Provider abort, Orderly release,
Negotiated Release.
Synchronization: The session layer enables a phase to insert checkpoint, i.e.,
synchronization points, into a data stream. If a crash occurs during the data
transmission, it can be retransmitted from the checkpoint despite retransmitting it
from the start.
6.Presentation layer
Interface with IP
Each packet forwarded to IP for delivery
Error Control is done by TCP
Function of UDP
UDP provides a connectionless unreliable service for sending
datagrams(packets)
Message small enough to fit in a packet(e.g DNS (domain name Query)
Simpler and faster than TCP
Never splits data into multiple packets
Does not care about error control
Interface with IP
Each UDP packet forward it to IP
Addresses in TCP/IP
Network Devices
Hub
Repeater
Bridge
Switch
Router
Hubs
Hubs is a networking device having multiple ports
that are used for connecting multiple computers
or segments of a LAN together.
Hubs can be either passive or Active
Active hubs electrically amplify the signals as it
moves from one connected device to other
Passive hubs allow the signal to pass from one
computer to another without any change.
Hubs does not remember devices/computers
connected to it,hence broadcast all information
to all connected computers,including the one that
sent it
A hub can send or receive information but it cant
do both at a time
Repeater
Hub Switch
Repeats the incoming traffic to all Sends traffic only to appropriate
connections connections
Offers Single lane connection,hence Establish two lane
either send or receive at a time connection,Facilitating send and
receives at the same time
Shares Bandwidth among its Does Not share bandwidth,Each
Connections connection gets full bandwidth
Router is a network device that forward data from one network to another.
Routers can regenerate signals, concentrate multiple connections, convert
data transmission formats, and manage data transfers.
They can also connect to a WAN, which allows them to connect LANs that are
separated by great distances.
IEEE 802.3
The MAC parameters are same as described for ethernet above. There are
three physical layers for fast ethernet.
• 100BASE-TX: Needs 2 pairs of cat.5 UTP/Type1 STP cables
• 100BASE-FX: Needs 2 strands of multimode fiber
• 100BASE-T4: Needs 4 pairs of cat.3 or any better cables
Gigabit ETHERNET
The ethernet working at the speed of 1000Mbps (i.e. 1Gbps) and above is
referred as Gigabit ethernet.
Gigabit Ethernet uses 802.3 frame format same as 10Mbps ethernet and
100Mbps fast Ethernet It also operates in half duplex and full duplex modes.
There are various Gigabit ethernet versions which operates at 1 Gigabit, 10
Gigabit, 40 Gigabit and 100 Gigabit per second speeds.
There are various versions for 10 Gbps ethernet such as 10GBASE-T, 10GBASE-
R, 10GBASE-X and 10GBASE-W.
MAC parameters for gigabit ethernet are same as mentioned above in
ethernet. Except slot time which is 512 byte times.