Chapter 1
Chapter 1
Chapter 1
Network Design
By - Sneha Nandanwar
Von-Neumann computer architecture
❏ Fixed Program Computers – Their function is very specific and they couldn’t be
reprogrammed, e.g. Calculators.
❏ Stored Program Computers – These can be programmed to carry out many different
tasks, applications are stored on them, hence the name.
● It is also known as ISA (Instruction set architecture) computer and is having
three basic units:
● The central processing unit is defined as the it is an electric circuit used for the executing the
instruction of computer program.
1.Control Unit(CU)
3.Variety of Registers
Variety of Registers
● Memory Address Register (MAR): It stores the memory locations of instructions that need to
be fetched from memory or stored in memory.
● Memory Data Register (MDR): It stores instructions fetched from memory or any data that is
to be transferred to, and stored in, memory.
● Current Instruction Register (CIR): It stores the most recently fetched instructions while it is
waiting to be coded and executed.
● Instruction Buffer Register (IBR): The instruction that is not to be executed immediately is
placed in the instruction buffer register IBR.
What is Modulation ?
● Encoding and decoding are used in many forms of communications, including computing, data
communications, programming, digital electronics and human communications.
● These two processes involve changing the format of content for optimal transmission or storage.
● Decoding is the opposite process -- the conversion of an encoded format back into the original
sequence of characters.It is used in Microprocessors, memory chips etc.
WHAT IS A NETWORK?
● A computer network refers to a group of two or more computing devices that are
connected by a communication medium allowing the computers to communicate
electronically.
● The links can be established either over cable media such as wires or via a wireless
media such as Wi-Fi.
Types of area networks
● LAN covers the smallest area, MAN covers an area larger than LAN and WAN comprises
the largest of all.
● LAN or Local Area Network connects network devices in such a way that personal
computers and workstations can share data, tools, and programs.
● MAN or Metropolitan area Network covers a larger area than that covered by a LAN and a
smaller area as compared to WAN.
● WAN or Wide Area Network is a computer network that extends over a large geographical
area, although it might be confined within the bounds of a state or country.
What Is Network Hardware?
● Network hardware is defined as a set of physical or network devices that are essential for
interaction and communication between hardware units operational on a computer
network.
● Network equipment is part of advancements of the Ethernet network protocol and utilizes
a twisted pair or fiber cable as a connection medium. Routers, hubs, switches, and bridges
are some examples of network hardware.
What is a network switch?
● A network switch connects devices within a network (often a local area network, or LAN
*) and forwards data packets to and from those devices.
● Switch only sends data to the single device it is intended for (which may be another switch
or a user's computer), not to networks of multiple devices.
Types of Switching
● Message Switching
● Circuit Switching
● Packet Switching
○ Datagram Packet Switching
○ Virtual Circuit Packet Switching
Message Switching
● Also, the sender and receiver are not directly connected. There are a number of
intermediate nodes that transfer data and ensure that the message reaches its
destination.
● Data can be transmitted without any delays once the circuit is established.
Routers: A router connects two or more networks. One common use of the router is to connect
a home or office network (LAN) to the internet (WAN).
Hubs, bridges, and switches: Hubs, bridges, and switches are connecting units that allow
multiple devices to connect to the router and enable data transfer to all devices on a network.
Network cables: Cables connect different devices on a network. Today, most networks have
cables over a wireless connection.
Firewall: A firewall is a hardware or software device between a computer and the rest of the
network open to attackers or hackers.
What Is Network Software?
Network software is defined as a wide range of software that streamlines the operations, design, monitoring, and
implementation of computer networks.
● User management allows administrators to add or remove users from the network. This is particularly
useful when hiring or relieving.
● File management lets administrators decide the location of data storage and control user access to that data.
● Network security systems assist administrators in looking after security and preventing data breaches.
Components of Network Software
● Mesh Topology
● Star Topology
● Bus Topology
● Ring Topology
● Hybrid Topology
Mesh Topology
● In a mesh topology, every device is connected to another device via a particular channel.
● Connection of telephone regional offices.
links
● A common example of mesh topology is the internet backbone, where
various internet service providers are connected to each other via dedicated
channels.
cable
● If the concentrator (hub) on which the whole topology relies fails, the whole system
will crash down.
● The cost of installation is high.
● Performance is based on the single concentrator i.e. hub.
● A common example of star topology is a local area network (LAN) in an office where
all computers are connected to a central hub.
● This topology is also used in wireless networks where all devices are connected to a
wireless access point.
Bus Topology
● Bus Topology is a network type in which every computer and network device is connected to
a single cable. It is bi-directional.
● Early Ethernet
● If N devices are connected to each other in a bus topology, then the number of cables
required to connect them is 1, known as backbone cable, and N drop lines are required.
● If the network traffic is heavy, it increases collisions in the network. To avoid this,
various protocols are used in the MAC layer known as Pure Aloha, Slotted Aloha,
CSMA/CD, etc.
● Adding new devices to the network would slow down networks.
● Security is very low.
● A common example of bus topology is the Ethernet LAN, where all devices are
connected to a single coaxial cable or twisted pair cable.
● This topology is also used in cable television networks.
Ring Topology
● In a Ring Topology, it forms a ring connecting devices with exactly two neighboring devices.
● The data flows in one direction, i.e. it is unidirectional, but it can be made bidirectional by having 2
connections between each Network Node, it is called Dual Ring Topology.
● In-Ring Topology, the Token Ring Passing protocol is used by the workstations to transmit the
data.
● The most common access method of ring topology is token passing.
○ Token passing: It is a network access method in which a token is passed from one node to
another node.
○ Token: It is a frame that circulates around the network.
● There are two types of token release techniques: Early token release releases the token just
after transmitting the data and Delayed token release releases the token after the
acknowledgment is received from the receiver.
Hybrid Topology
● Combination of two or more network topology
● A common example of a hybrid topology is a university campus network. The
network may have a backbone of a star topology, with each building connected to
the backbone through a switch or router.
● Within each building, there may be a bus or ring topology connecting the different
rooms and offices.
● The wireless access points also create a mesh topology for wireless devices.
OSI stands for Open Systems Interconnection. It was developed by ISO – ‘International
Organization for Standardization’.
Physical Layer – Layer 1
● The lowest layer of the OSI reference model is the physical layer.
● When receiving data, this layer will get the signal received and convert it into 0s and 1s and send
them to the Data Link layer, which will put the frame back together.
Data Link Layer (DLL) – Layer 2
The data link layer is responsible for the node-to-node delivery of the message.
The Data Link Layer is divided into two sublayers:
● The network layer works for the transmission of data from one host to the other located in
different networks. It also takes care of packet routing.
● The sender & receiver’s IP addresses are placed in the header by the network layer.
● The transport layer provides services to the application layer and takes services from the
network layer.
● This layer is responsible for the establishment of connection, maintenance of sessions, and
authentication, and also ensures security.
for Example:-
Let us consider a scenario where a user wants to send a message through some Messenger application
running in his browser. The “Messenger” here acts as the application layer which provides the user with an
interface to create the data. This message or so-called Data is compressed, encrypted (if any secure data), and
converted into bits (0’s and 1’s) so that it can be transmitted.
Presentation Layer – Layer 6
● The presentation layer is also called the Translation layer. The data from the
application layer is extracted here and manipulated as per the required format to
transmit over the network.
● At the very top of the OSI Reference Model stack of layers, we find the Application layer
which is implemented by the network applications.
● These applications produce the data, which has to be transferred over the network.
• The network layer controls the operation of the subnet, e.g. routing, flow control,
internetworking.
• The transport layer performs assembling and disassembling, isolates the upper layers
from the changes in the network hardware, and determines the type of services
• The session layer establishes sessions (dialog control, …)
• The presentation layer is concerned with the syntax and semantics
• The application layer contains a variety of commonly used protocols (e.g.
HyperText Transfer Protocol for WWW, file transfer, e-mail)
The OCI-TCP/IP Reference Model
● The OSI Model is a logical and conceptual model that defines network
communication used by systems open to interconnection and communication
with other systems. On the other hand, TCP/IP helps you to determine how a
specific computer should be connected to the internet and how you can be
transmitted between them.
● OSI model, the transport layer, is only connection-oriented whereas the TCP/IP
model is both connection-oriented and connectionless.
● OSI model helps you to standardize router, switch, motherboard, and other
hardware whereas TCP/IP helps you to establish a connection between different
types of computers.
Connection-oriented
● Both Connection-oriented service and Connection-less service are used for the
connection establishment between two or more two devices.
● There are a lot of criteria that make a network better than others, but; there are three
basic yet important criteria to be fulfilled for a network:
○ Performance
○ Reliability
○ Security
Performance
● Transit time:
● Response time:
● Throughput:
● Bandwidth:
● Delay/ Latency:
Reliability
● It measures how the Network secures the data amid failures and attacks and
the policies and procedures it implements to protect itself from damages and
unauthorized access.
● In Reliability, the frequency of failures is checked.
● In Security, network attacks and data breaches are checked.
Socket address with an example.
● A transport-layer protocol in the TCP suite needs both the IP address and the
port number, at each end, to make a connection.
● The client socket address defines the client process uniquely just as the
server socket address defines the server process uniquely
● To use the services of transport layer in the Internet, we need a pair of socket
addresses: the client socket address and the server socket address.
● The first header contains the IP addresses; the second header contains
the port numbers.
Process to process delivery
● Process to process delivery (transport layer communication) needs two
identifiers, one is IP address and the other is port number at each end to
make a connection.
● Socket address is the combinations of IP address and port number as shown
in the figure.
● The client socket address defines the client process uniquely whereas the
server socket address defines the server process uniquely.
● A transport layer protocol requires the client socket address as well as the
server socket address. These two addresses contain four pieces.
● These four pieces go into the IP header and the transport layer protocol
header.
● The IP header contains the IP addresses while the UDP and TCP headers
contain the port numbers.