Professional Documents
Culture Documents
UNIT 1 Networking Fundamentals
UNIT 1 Networking Fundamentals
UNIT 1 Networking Fundamentals
area networks , ISO-OSI reference model, TCP/IP model , interfaces and services, Protocol data unit, connection
oriented and connectionless services, service primitives, Binding Protocol Address- ARP & RARP, packet format,
Encapsulation.
Data Communication: When we communicate, we are sharing information. This sharing can be local or remote.
Between individuals, local communication usually occurs face to face, while remote communication takes place
over distance.
Components:
A data communications system has five components.
1. Message. The message is the information (data) to be communicated. Popular forms of information include
text, numbers, pictures, audio, and video.
2. Sender. The sender is the device that sends the data message. It can be a computer, workstation, telephone
handset, video camera, and so on.
3. Receiver. The receiver is the device that receives the message. It can be a computer, workstation, telephone
handset, television, and so on.
4. Transmission medium. The transmission medium is the physical path by which a message travels from sender
to receiver. Some examples of transmission media include twisted-pair wire, coaxial cable, fiber-optic cable,
and radio waves
5. Protocol. A protocol is a set of rules that govern data communications. It represents an agreement between the
communicating devices. Without a protocol, two devices may be connected but not communicating, just as a
person speaking French cannot be understood by a person who speaks only Japanese.
Data Representation:
Information today comes in different forms such as text, numbers, images, audio, and video.
Text:
In data communications, text is represented as a bit pattern, a sequence of bits (Os or Is). Different sets of
bit patterns have been designed to represent text symbols. Each set is called a code, and the process of
representing symbols is called coding.
Images:
Images are also represented by bit patterns. In its simplest form, an image is composed of a matrix of
pixels (picture elements), where each pixel is a small dot. The size of the pixel depends on the resolution. For
example, an image can be divided into 1000 pixels or 10,000 pixels
Audio
: Audio refers to the recording or broadcasting of sound or music. Audio is by nature different from text, numbers,
or images. It is continuous, not discrete. Even when we use a microphone to change voice or music to an electric
signal, we create a continuous signal.
Video:
Video refers to the recording or broadcasting of a picture or movie. Video can either be produced as a continuous
entity (e.g., by a TV camera), or it can be a combination of images, each a discrete entity, arranged to convey the
idea of motion. Again we can change video to a digital or an analog signal.
Data Flow
Communication between two devices can be simplex, half-duplex, or full-duplex as shown in Figure
Simplex:
In simplex mode, the communication is unidirectional, as on a one-way street. Only one of the two devices
on a link can transmit; the other can only receive (see Figure a). Keyboards and traditional monitors are
examples of simplex devices
Half-Duplex:
In half-duplex mode, each station can both transmit and receive, but not at the same time. When one
device is sending, the other can only receive, and vice versa the half-duplex mode is like a one-lane road with
traffic allowed in both directions.
Full-Duplex:
In full-duplex both stations can transmit and receive simultaneously (see Figure c). The full-duplex mode
is like a two way street with traffic flowing in both directions at the same time. In full-duplex mode,
NETWORKS
A network is a set of devices (often referred to as nodes) connected by communication links. A node can be a
computer, printer, or any other device capable of sending and/or receiving data generated by other nodes on the
network.
Distributed Processing
Most networks use distributed processing, in which a task is divided among multiple computers. Instead of one
single large machine being responsible for all aspects of a process, separate computers (usually a personal
computer or workstation) handle a subset.
Network Criteria
A network must be able to meet a certain number of criteria. The most important of these are performance,
reliability, and security.
Performance:
Performance can be measured in many ways, including transit time and response time. Transit time is the
amount of time required for a message to travel from one device to another. Response time is the elapsed time
between an inquiry and a response. The performance of a network depends on a number of factors, including the
number of users, the type of transmission medium, the capabilities of the connected hardware, and the efficiency
of the software. Performance is often evaluated by two networking metrics: throughput and delay.
Reliability:
In addition to accuracy of delivery, network reliability is measured by the frequency of failure, the time it
takes a link to recover from a failure, and the network's robustness in a catastrophe.
Security:
Network security issues include protecting data from unauthorized access, protecting data from damage
and development, and implementing policies and procedures for recovery from breaches and data losses.
Physical Structures:
Type of Connection
A network is two or more devices connected through links. A link is a communications pathway that
transfers data from one device to another. There are two possible types of connections: point-to-point and
multipoint.
Point-to-Point
A point-to-point connection provides a dedicated link between two devices. The entire capacity of the link
is reserved for transmission between those two devices.
Multipoint
A multipoint (also called multidrop) connection is one in which more than two specific devices share a
single link. In a multipoint environment, the capacity of the channel is shared.
Physical Topology
The term physical topology refers to the way in which a network is laid out physically. The topology of a
network is the geometric representation of the relationship of all the links and linking devices (usually called
nodes) to one another. There are four basic topologies possible: mesh, star, bus, and ring
Mesh: In a mesh topology, every device has a dedicated point-to-point link to every other device.
Advantages:
1. The use of dedicated links guarantees that each connection can carry its own data load, thus eliminating
the traffic problems that can occur when links must be shared by multiple devices.
2. A mesh topology is robust. If one link becomes unusable, it does not incapacitate the entire system. Third,
there is the advantage of privacy or security.
Disadvantages:
1. Disadvantage of a mesh are related to the amount of cabling because every device must be connected to
every other device, installation and reconnection are difficult.
2. Second, the sheer bulk of the wiring can be greater than the available space (in walls, ceilings, or floors)
can accommodate. Finally, the hardware required to connect each link (I/O ports and cable) can be
prohibitively expensive.
For these reasons a mesh topology is usually implemented in a limited fashion, for example, as a backbone
connecting the main computers of a hybrid network that can include several other topologies.
Star Topology:
In a star topology, each device has a dedicated point-to-point link only to a central controller, usually
called a hub. The devices are not directly linked to one another.
Other advantages include robustness. If one link fails, only that link is affected.
One big disadvantage of a star topology is the dependency of the whole topology on one single point, the hub. If
the hub goes down, the whole system is dead.
Bus Topology:
The preceding examples all describe point-to-point connections. A bus topology, on the other hand, is
multipoint. One long cable acts as a backbone to link all the devices in a network
Advantages of a bus topology include ease of installation.
A bus uses less cabling than mesh or star topologies.
Ring Topology In a ring topology, each device has a dedicated point-to-point connection with only the two
devices on either side of it.
A ring is relatively easy to install and reconfigure. Each device is linked to only its immediate neighbors (either
physically or logically). To add or delete a device requires changing only two connections. The only constraints
are media and traffic considerations (maximum ring length and number of devices). Problem and its location.
Unidirectional traffic can be a disadvantage. In a simple ring, a break in the ring (such as a disabled
station) can disable the entire network. This weakness can be solved by using a dual ring or a witch capable of
closing off the break.
Tree
A computer network
It allows for the sharing of resources such as printers, files, and data storage, as well as the ability to
communicate with other computers and access the internet.
Computer networking
It refers to the practice of connecting computers and other digital devices together to share resources and
exchange information.
It involves the use of hardware and software technologies that enable communication between computers and
other devices, whether they are located in the same physical location or are geographically dispersed.
Categories of Networks
THE INTERNET
The Internet has revolutionized many aspects of our daily lives. It has affected the way we do business as well
as the way we spend our leisure time. Count the ways you've used the Internet recently.
The transmission
It is that sending a signal from one location to another. Transmission technologies refer to the physical
layer protocol such as modulation, demodulation, line coding, error control etc. The transmission technology
can be categorized broadly into two types:
Point-to-point networks
Broadcast Networks
Broadcast Networks
Transmitting data from one source host to all other hosts present in the same or other network is called
broadcast. It is called a one to all transmission.
Types of broadcast
Broadcast is classified into two types, which are as follows −
Limited Broadcast
Transmitting data from one source host to all other hosts present in the same network is called a limited
broadcast. Given below is the diagram of limited broadcast −
In Limited Broad casting if the destination address is 255.255.255.255 then the packet will be sent to all
the hosts in the network.
Limited Broadcast address of any network=255.255.255.255 = 11111111.11111111.11111111.11111111
For example: If the source IP address is 12.23.2.5 sending data to all other hosts present in the same
network, then the destination address is 255.255.255.255.
Direct Broadcast
Transmitting data from source host to all other hosts present in different networks then it is called as direct
broadcast. Given below is the diagram of direct broadcast −
In direct broadcast Host ID bits are all set to 1, Network ID is the IP address where all destination hosts
are present.
For example: Source IP address is 12.34.5.6 sending data to all other nodes present at different network
having IP address 24.0.0.0
Therefore source address= 12.34.5.6
Destination address= 24.255.255.255.
PROTOCOLS
Protocols:
In computer networks, communication occurs between entities in different systems. An entity is anything
capable of sending or receiving information. However, two entities cannot simply send bit streams to each other
and expect to be understood. For communication to occur, the entities must agree on a protocol.
Syntax. The term syntax refers to the structure or format of the data, meaning the order in which they are
presented.
Semantics. The word semantics refers to the meaning of each section of bits. How is a particular pattern to
be interpreted, and what action is to be taken based on that interpretation.
Timing. The term timing refers to two characteristics: when data should be sent and how fast they can be
sent. For example, if a sender produces data at 100 Mbps but the receiver can process data at only 1 Mbps, the
transmission will overload the receiver and some data will be lost.
The physical layer is concerned with transmitting raw bits over a communication channel. The design issues
have to do with making sure that when one side sends a 1 bit, it is received by the other side as a 1 bit, not as a 0
bit.
The Data Link Layer:
The main task of the data link layer is to transform a raw transmission facility into a line that appears free of
undetected transmission errors to the network layer.
It accomplishes this task by having the sender break up the input data into data frames (typically a few hundred
or a few thousand bytes) and transmits the frames sequentially. If the service is reliable, the receiver confirms
correct receipt of each frame by sending back an acknowledgement frame.
Another issue that arises in the data link layer (and most of the higher layers as well) is how to keep a fast
transmitter from drowning a slow receiver in data. Some traffic regulation mechanism is often needed to let the
transmitter know how much buffer space the receiver has at the moment. Frequently, this flow regulation and
the error handling are integrated.
Here, hierarchical means that each upper-layer protocol is supported by two or more lower-level protocols.
Internet Layer
o An internet layer is the second layer of the TCP/IP model.
o The main responsibility of the internet layer is to send the packets from any network, and they arrive at the
destination irrespective of the route they take.
IP Protocol: IP protocol is used in this layer, and it is the most significant part of the entire TCP/IP suite.
o IP Addressing: This protocol implements logical host addresses known as IP addresses. The IP addresses
are used by the internet and higher layers to identify the device and to provide internetwork routing.
o Host-to-host communication: It determines the path through which the data is to be transmitted.
o Data Encapsulation and Formatting: An IP protocol accepts the data from the transport layer protocol. An
IP protocol ensures that the data is sent and received securely, it encapsulates the data into message known as
IP datagram.
o Fragmentation and Reassembly: The limit imposed on the size of the IP datagram by data link layer
protocol is known as Maximum Transmission unit (MTU). If the size of IP datagram is greater than the MTU
unit, then the IP protocol splits the datagram into smaller units so that they can travel over the local network.
Fragmentation can be done by the sender or intermediate router. At the receiver side, all the fragments are
reassembled to form an original message.
o Routing: When IP datagram is sent over the same local network such as LAN, MAN, WAN, it is known as
direct delivery. When source and destination are on the distant network, then the IP datagram is sent
indirectly. This can be accomplished by routing the IP datagram through various devices such as routers.
ARP Protocol
ICMP Protocol
o ICMP Reply: ICMP Reply is used to check whether the destination device is responding or not.
o The core responsibility of the ICMP protocol is to report the problems, not correct them. The responsibility
of the correction lies with the sender.
o ICMP can send the messages only to the source, but not to the intermediate routers because the IP datagram
carries the addresses of the source and destination but not of the router that it is passed to.
Transport Layer
The transport layer is responsible for the reliability, flow control, and correction of data which is being sent over
the network.
The two protocols used in the transport layer are User Datagram protocol and Transmission control protocol.
o It is an unreliable protocol as it discovers the errors but not specify the error.
o User Datagram Protocol discovers the error, and ICMP protocol reports the error to the sender that user
datagram has been damaged.
o UDP consists of the following fields:
Source port address: The source port address is the address of the application program that has created
the message.
Destination port address: The destination port address is the address of the application program that
receives the message.
Total length: It defines the total number of bytes of the user datagram in bytes.
Checksum: The checksum is a 16-bit field used in error detection.
o UDP does not specify which packet is lost. UDP contains only checksum; it does not contain any ID of
a data segment.
o It creates a virtual circuit between the sender and receiver, and it is active for the duration of the
transmission.
o TCP is a reliable protocol as it detects the error and retransmits the damaged frames. Therefore, it
ensures all the segments must be received and acknowledged before the transmission is considered to
be completed and a virtual circuit is discarded.
o At the sending end, TCP divides the whole message into smaller units known as segment, and each
segment contains a sequence number which is required for reordering the frames to form an original
message.
o At the receiving end, TCP collects all the segments and reorders them based on sequence numbers.
Application Layer
o An application layer is the topmost layer in the TCP/IP model.
o It is responsible for handling high-level protocols, issues of representation.
o This layer allows the user to interact with the application.
o When one application layer protocol wants to communicate with another application layer, it forwards its
data to the transport layer.
o There is an ambiguity occurs in the application layer. Every application cannot be placed inside the
application layer except those who interact with the communication system. For example: text editor cannot
be considered in application layer while web browser using HTTP protocol to interact with the network
where HTTP protocol is an application layer protocol.
Interfaces and Services is a process that generally provides and gives a common technique for each layer
to communicate with each other. Standard terminology basically required for layered networks to request
and aim for the services are provided.
Connection-Oriented Services
In a connection-oriented service, each packet is related to a source/destination connection. These packets are
routed along a similar path, known as a virtual circuit. Thus, it provides an end-to-end connection to the client for
reliable data transfer.
It delivers information in order without duplication or missing information. It does not congest the communication
channel and the buffer of the receiving device. The host machine requests a connection to interact and closes the
connection after the transmission of the data.
Connectionless-Service
In connectionless service, a router treats each packet individually. The packets are routed through different paths
through the network according to the decisions made by routers. The network or communication channel does not
guarantee data delivery from the host machine to the destination machine in connectionless service.
The data to be transmitted is broken into packets. These independent packets are called datagrams in analogy with
telegrams.
The packets contain the address of the destination machine. Connectionless service is equivalent to the postal
system. In the postal system, a letter is put in an envelope that contains the address of the destination. It is then
placed in a letterbox.
The letter finally delivers to the destination through the postal network. However, it does not guarantee to appear
in the addressee's letterbox.
Differences
The major differences between connection oriented services and connectionless services in computer network are
as follows−
upporting a connection.
Service primitives
A service is specified by a set of primitives. A primitive means operation. To access the service a user process can
access these primitives. These primitives are different for connection oriented service and connectionless service.
There are five types of service primitives:
1. LISTEN : When a server is ready to accept an incoming connection it executes the LISTEN primitive. It
blocks waiting for an incoming connection.
2. CONNECT : It connects the server by establishing a connection. Response is awaited.
3. RECIEVE: Then the RECIEVE call blocks the server.
4. SEND : Then the client executes SEND primitive to transmit its request followed by the execution of
RECIEVE to get the reply. Send the message.
5. DISCONNECT : This primitive is used for terminating the connection. After this primitive one can’t send
any message. When the client sends DISCONNECT packet then the server also sends the DISCONNECT
packet to acknowledge the client. When the server package is received by client then the process is
terminated.
The service primitives for the connection oriented services are as follows −
ARP RARP
A protocol used to map an IP address to a physical A protocol used to map a physical (MAC) address to an
(MAC) address IP address
To obtain the MAC address of a network device To obtain the IP address of a network device when only
when only its IP address is known its MAC address is known
Client broadcasts its IP address and requests a MAC Client broadcasts its MAC address and requests an IP
address, and the server responds with the address, and the server responds with the corresponding
corresponding MAC address IP address
IP addresses MAC addresses
Widely used in modern networks to resolve IP Rarely used in modern networks as most devices have a
addresses to MAC addresses pre-assigned IP address
ARP stands for Address Resolution Protocol. Whereas RARP stands for Reverse Address Resolution
Protocol.
Through ARP, (32-bit) IP address mapped into (48- Whereas through RARP, (48-bit) MAC address of 48
bit) MAC address. bits mapped into (32-bit) IP address.
In ARP, broadcast MAC address is used. While in RARP, broadcast IP address is used.
In ARP, ARP table is managed or maintained While in RARP, RARP table is managed or maintained
by local host. by RARP server.
In Address Resolution Protocol, Receiver’s MAC While in RARP, IP address is fetched.
address is fetched.
In ARP, ARP table uses ARP reply for its updation. While in RARP, RARP table uses RARP reply for
configuration of IP addresses .
Hosts and routers uses ARP for knowing the MAC While RARP is used by small users having less
address of other hosts and routers in the networks. facilities.
ARP is used in sender’s side to map the receiver’s RARP is used in receiver’s side to map the sender’s IP.
MAC address.
Packet format
Encapsulation
Data Encapsulation :
Encapsulation is the process of adding additional information when data is traveling in OSI or TCP/IP model.
The additional information has been added on sender’s side, starting from Application layer to Physical layer.
working of Encapsulation :
There will be no additional information added in the user’s data in the Application layer in TCP/IP model or
Application, Presentation, Session layers in OSI model.
Then Session layer sends data to Transport layer.
In the Transport layer, the data broken up into different pieces. It adds the header in each of the broken data,
which contains information like source port, destination port, sequence number, etc. Now, everything
combined to a new form.
The encapsulated data in Transport layer is called Segments or Datagrams. If the transmission uses TCP, then
it is called Segments, or UDP is called Datagrams.