Professional Documents
Culture Documents
Computer Networks Module 1
Computer Networks Module 1
A computer network refers to a group of two or more computing devices that are
connected by a communication medium allowing the computers to communicate
electronically.
Point-to-Point
Multipoint
■ A multipoint (also called multi-drop) connection is one in which more than two specific
devices share a single link
■ In a multipoint environment, the capacity of the channel is shared, either spatially or
temporally.
■ If several devices can use the link simultaneously, it is a spatially shared connection. If
users must take turns, it is a timeshared connection.
Data Flow
Networking Software
Networking Devices
Hardware devices that are used to connect computers, printers, fax machines and other
electronic devices to a network are called network devices. These devices transfer data in a
fast, secure and correct way over the same or different networks. Network devices may be
inter-network or intra-network.
Modem
Modem is a device that enables a computer to send or receive data over telephone or cable
lines. The data stored on the computer is digital whereas a telephone line or cable wire can
transmit only analog data. The main function of the modem is to convert digital signal into
analog and vice versa. Modem is a combination of two devices modulator and demodulator.
The modulator converts digital data into analog data when the data is being sent by the
computer. The demodulator converts analog data signals into digital data when it is being
received by the computer
.
• Types of Modems
• Simplex
• Half Duplex
• Full duplex
RJ 45 connector
Ethernet card
Ethernet card, also known as network interface card (NIC), is a hardware component used
by computers to connect to Ethernet LAN and communicate with other devices on the LAN.
The NIC has RJ45 socket where network cable is physically plugged in. The MAC address
or physical address is encoded on the network card chip which is assigned by the IEEE to
identify a network card uniquely. The MAC address is stored in the PROM (Programmable
read-only memory).
HUB
A hub is basically a multiport repeater. A hub connects multiple wires coming from different
branches, Hubs cannot filter data, so data packets are sent to all connected devices. Also,
they do not have the intelligence to find out the best path for data packets which leads to
inefficiencies and wastage.
Switch
A switch is a hardware device that connects multiple devices on a computer network. The
Switch contains the updated table that decides where the data should be transmitted. Switch
delivers the message to the correct destination based on the physical address present in the
incoming message. A Switch does not broadcast the message to the entire network like the
Hub. It determines the device to whom the message is to be transmitted. Switch provides a
direct connection between the source and destination. It increases the speed of the network.
Router
A router is a network layer hardware device that transmits data from one LAN to another if
both networks support the same set of protocols. A router is typically connected to at least
two LANs and the internet service provider (ISP). It receives its data in the form of packets,
which are data frames with their destination address added.A router reads its routing table to
decide the best available route the packet can take to reach its destination quickly and
accurately. Router also strengthens the signals before transmitting them. That is why it is
also called a repeater.
Gateway
A gateway is a passage to connect two networks together that may work upon different
networking models. They work as the messenger agents that take data from one system,
interpret it, and transfer it to another system. Gateways are also called protocol converters
and can operate at any network layer. Gateways are more complex than switches or routers.
Gateway is also called a protocol converter.
Wi-Fi card
A Wi-Fi card is a card used to connect any device to the local network wirelessly. The
physical area of the network which provides internet access through Wi-Fi is called Wi-Fi
hotspot. Hotspots themselves are connected to the network through wires. A Wi-Fi card is
used to add capabilities like teleconferencing, downloading digital camera images, video
chat, etc. to old devices. Modern devices come with their in-built wireless network adapter.
Network Topologies
Network topology refers to how various nodes, devices, and connections on your network
are physically or logically arranged in relation to each other.
Point-to-point Topology
Point-to-Point topology is the simplest topology that connects two nodes directly alongside a
standard link.
The full bandwidth of the shared link is reserved for transmission between those two nodes.
The transfer of knowledge during a point-to-point topology is often in multiple directions
across the network: during a simplex, full-duplex, or half-duplex.
Eg, When you change TV channels by remote, you’re establishing a point-to-point
connection between the remote and, therefore, the TV system.
Bus Topology
The bus topology is designed in such a way that all the stations are connected through a
single cable known as a backbone cable.
Each node is either connected to the backbone cable by drop cable or taps.
When a node wants to send a message, it puts a message over the network. All the stations
available in the network will receive the message whether it has been addressed or not. As
signal travels along the backbone,some of the energy is transmitted into heat so it becomes
weaker and weaker as it travels so there is a limit on the number of taps a bus can support
and distance between those taps.
The bus topology is mainly used in 802.3 (ethernet) and 802.4 standard networks.
The configuration of a bus topology is quite simpler as compared to other topologies.
In star topology each device in the network is connected to a central device called
hub. Star topology doesn’t allow direct communication between devices. If one device wants
to send data to another device, it has to first send the data to the hub and then the hub
transmits that data to the designated device.
Mesh Topology
Tree topology
Various secondary hubs are connected to the central hub which contains the repeater. This
data flows from top to bottom i.e. from the central hub to the secondary and then to the
devices or from bottom to top i.e. devices to the secondary hub and then to the central hub.
The top-most node in tree topology is known as a root node, and all other nodes are the
descendants of the root node. It is a multi-point connection and a non-robust topology
because if the backbone fails the topology crashes.
Hybrid Topology
A combination of two or more topologies is known as hybrid topology
Addressing in Networks
Four levels of addresses are used in the TCP/IP protocol: physical address, logical address,
port address, and application-specific address
IP address
The physical address is the address of a node as defined by its LAN or WAN.
The size and format of these addresses vary depending on the network. For example,
Ethernet uses a 6-byte (48-bit) physical address that is imprinted on the network interface
card (NIC). Most local area networks use a 48-bit (6-byte) physical address written as 12
hexadecimal digits, every byte (2 hexadecimal digits) is separated by a colon.
It is assigned by manufacturer and cannot be changed
MAC IP
In the TCP/IP architecture, the label assigned to a process is called a port address. A port
address in TCP/IP is 16 bits in length.
• ICANN has divided the port numbers into three ranges: well-known, registered, and
dynamic (or private)
• Well-known ports: The ports ranging from 0 to 1,023 are assigned and controlled by
ICANN..
• Registered ports: The ports ranging from 1,024 to 49,151 are not assigned or controlled by
ICANN. They can only be registered with ICANN to prevent duplication.
• Dynamic ports: The ports ranging from 49,152 to 65,535 are neither controlled nor
registered. They can be used as temporary or private port numbers.
Layered Architecture
The purpose of the OSI model is to show how to facilitate communication between different
systems without requiring change to the logic of the underlying hardware and software.
It is not a protocol; it is a model for understanding and designing a network architecture that
is flexible, robust and interoperable.
Application layer
• A Presentation layer is mainly concerned with the syntax and semantics of the information
exchanged between the two systems.
Syntax :Structure or format of the data
Semantics : Interprets the meaning of the bits, Knows which fields define what action
• Translation: Different computers use different encoding methods, the presentation layer
handles the interoperability between the different encoding methods. It converts the data
from sender-dependent format into a common format and changes the common format into
receiver-dependent format at the receiving end.
• Encryption: Encryption is a process of converting the sender-transmitted information into a
secure form and sending the resulting message over the network.
• Compression: Data compression reduces the number of bits to be transmitted.
Session layer
• Dialog control: It allows the communication between two processes which can be either
half-duplex or full-duplex.
• Synchronisation and recovery: Session layer adds some checkpoints when transmitting
the data in a sequence. If some error occurs in the middle of the transmission of data, then
the transmission will take place again from the checkpoint. This process is known as
Synchronisation and recovery
Transport layer
•Service-point/port addressing: The transport layer adds the header that contains the
address known as a service-point address or port address. The responsibility of the network
layer is to transmit the data from one computer to another computer and the responsibility of
the transport layer is to transmit the message to the correct process.
•Segmentation and reassembly: When the transport layer receives the message from the
upper layer, it divides the message into multiple segments, and each segment is assigned
with a sequence number that uniquely identifies each segment. When the message has
arrived at the destination, then the transport layer reassembles the message based on their
sequence numbers.
•Connection control: Transport layer provides two services Connection-oriented service
and connectionless service. A connectionless service treats each segment as an individual
packet, and they all travel in different routes to reach the destination. A connection-oriented
service makes a connection with the transport layer at the destination machine before
delivering the packets. In connection-oriented service, all the packets travel in the single
route.
•Flow control: The transport layer is also responsible for flow control but it is performed
end-to-end rather than across a single link.
•Error control: The sender transport layer ensures that message reach at the
destination without any error.
Network layer
The network layer is responsible for the delivery of individual packets from the source host to
the destination host
• Addressing: A Network layer adds the source and destination address to the header of the
frame. Addressing is used to identify the device on the internet.
• Routing: It determines the best optimal path out of the multiple paths from source to the
destination.
• Packetizing: A Network Layer receives segments from the upper layer and converts them
into packets. This process is known as Packetizing. It is achieved by internet protocol (IP).
Framing : DLL translates physical raw bit streams into packets known as frames .
Physical Addressing : DLL adds header to the frame, header contains hardware
destination and source address. The frame is transmitted to the destination address
mentioned in the header.
Flow Control : It is a technique through which the constant data rate is maintained on both
sides so that no data gets corrupted . It ensures that the fast transmitter does not exceed the
rate of the receiver with low processing speed .
Error Control : It is achieved by adding CRC bits placed in the trailer which is added to the
message before sending it to the physical layer. In case of error, the receiver sends an
acknowledgement for retransmission of corrupted frames.
Access Control: When two or more devices are connected to the same communication
channel, then the data link layer protocols are used to determine which device has control
over the link at a given time.
Physical Layer
Coordinates the functions required to carry a bit stream over a physical medium.
Deals with the mechanical and electrical specifications of the interface and transmission
medium.
Defines the procedures and functions that physical devices and interfaces have to perform
for transmission
Originally four layers.: network interface, internet, transport and application layer
Internet Layer
• An internet layer is the second layer of the TCP/IP model.
• An internet layer is also known as the network layer.
• The main responsibility of the internet layer is to send the packets from any network, and
they arrive at the destination irrespective of the route they take.
IP Protocol: IP protocol is used in this layer, and it is the most significant part of the entire
TCP/IP suite.
IP Addressing: The IP addresses are used by the internet and higher layers to identify the
device and to provide internetwork routing.
Data Encapsulation and Formatting: An IP protocol ensures that the data is sent and
received securely, it encapsulates the data into a message known as IP datagram.
Fragmentation and Reassembly: The limit imposed on the size of the IP datagram by data
link layer protocol is known as Maximum Transmission unit (MTU). If the size of the IP
datagram is greater than the MTU unit, then the IP protocol splits the datagram into smaller
units so that they can travel over the local network. Fragmentation can be done by the
sender or intermediate router. At the receiver side, all the fragments are reassembled to form
an original message.
Routing: When IP datagram is sent over the same local network such as LAN, MAN, WAN, it
is known as direct delivery. When source and destination are on the distant network, then
the IP datagram is sent indirectly. This can be accomplished by routing the IP datagram
through various devices such as routers.
ARP protocol:
ICMP Protocol
• The transport layer is responsible for the reliability, flow control, and
correction of data which is being sent over the network.
• The two protocols used in the transport layer are User Datagram
protocol and Transmission control protocol.
Application Layer
• An application layer is the topmost layer in the TCP/IP model.
• It is responsible for handling high-level protocols, issues of
representation.
• This layer allows the user to interact with the application.
• When one application layer protocol wants to communicate with
another application layer, it forwards its data to the transport layer.
•HTTP: HTTP stands for Hypertext transfer protocol. This protocol allows us to access
the data over the world wide web. It transfers the data in the form of plain text,
audio, video. It is known as a Hypertext transfer protocol as it has the efficiency to
use in a hypertext environment where there are rapid jumps from one document to
another.
•SNMP: SNMP stands for Simple Network Management Protocol. It is a framework
used for managing the devices on the internet by using the TCP/IP protocol suite.
•SMTP: SMTP stands for Simple mail transfer protocol. The TCP/IP protocol that
supports the e-mail is known as a Simple mail transfer protocol. This protocol is used
to send the data to another email address.
•DNS: DNS stands for Domain Name System. An IP address is used to identify the
connection of a host to the internet uniquely. But, people prefer to use the names
instead of addresses. Therefore, the system that maps the name to the address is
known as Domain Name System.
•TELNET: It is an abbreviation for Terminal Network. It establishes the connection
between the local computer and remote computer in such a way that the local
terminal appears to be a terminal at the remote system.
•FTP: FTP stands for File Transfer Protocol. FTP is a standard internet protocol used
for transmitting the files from one computer to another computer.
Connection-Oriented Service
Connectionless service is used in the network system to transfer data from one end to
another end without creating any connection. So it does not require establishing a
connection before sending the data from the sender to the receiver. It is not a reliable
network service because it does not guarantee the transfer of data packets to the receiver,
and data packets can be received in any order to the receiver. Therefore we can say that
the data packet does not follow a defined path. In connectionless service, if the transmitted
data packet is not received by the receiver due to network congestion, the data may be lost.