Computer Network
Computer Network
Computer Network
Computer network
Introduction
Purpose
• Facilitating communications
• Sharing hardware.
• Sharing files, data, and information.
• Sharing software.
Network classification
Connection method
Computer networks can be classified according to the hardware and software technology
that is used to interconnect the individual devices in the network, such as optical fiber,
Ethernet, Wireless LAN, HomePNA, Power line communication or G.hn.
Ethernet uses physical wiring to connect devices. Frequently deployed devices include
hubs, switches, bridges and/or routers. Wireless LAN technology is designed to connect
devices without wiring. These devices use radio waves or infrared signals as a
transmission medium. ITU-T G.hn technology uses existing home wiring (coaxial cable,
phone lines and power lines) to create a high-speed (up to 1 Gigabit/s) local area network.
Wired technologies
• Twisted pair wire is the most widely used medium for telecommunication.
Twisted-pair wires are ordinary telephone wires which consist of two insulated
copper wires twisted into pairs and are used for both voice and data transmission.
The use of two wires twisted together helps to reduce crosstalk and
2
electromagnetic induction. The transmission speed ranges from 2 million bits per
second to 100 million bits per second.
• Coaxial cable is widely used for cable television systems, office buildings, and
other worksites for local area networks. The cables consist of copper or aluminum
wire wrapped with insulating layer typically of a flexible material with a high
dielectric constant, all of which are surrounded by a conductive layer. The layers
of insulation help minimize interference and distortion. Transmission speed range
from 200 million to more than 500 million bits per second.
• Optical fiber cable consists of one or more filaments of glass fiber wrapped in
protective layers. It transmits light which can travel over extended distances
without signal loss. Fiber-optic cables are not affected by electromagnetic
radiation. Transmission speed may reach trillions of bits per second. The
transmission speed of fiber optics is hundreds of times faster than for coaxial
cables and thousands of times faster than for twisted-pair wire.
Wireless technologies
• Cellular and PCS Systems – Use several radio communications technologies. The
systems are divided to different geographic area. Each area has low-power
transmitter or radio relay antenna device to relay calls from one area to the next
area.
• The Wireless Web – The wireless web refers to the use of the World Wide Web
through equipments like cellular phones, pagers,PDAs, and other portable
communications devices. The wireless web service offers anytime/anywhere
connection.
Types of networks
A personal area network (PAN) is a computer network used for communication among
computer and different information technological devices close to one person. Some
examples of devices that are used in a PAN are personal computers, printers, fax
machines, telephones, PDAs, scanners, and even video game consoles. A PAN may
include wired and wireless connections between devices. The reach of a PAN typically
extends to 10 meters.[2] Wired PAN network is usually constructed with USB and
Firewire while wireless with Bluetooth and Infrared.[3]
A local area network (LAN) is a network that connects computers and devices in a
limited geographical area such as home, school, computer laboratory, office building, or
closely positioned group of buildings.
A home area network is a residential LAN which is used for communication between
digital devices typically deployed in the home, usually a small number of personal
computers and accessories, such as printers and mobile computing devices. An important
function is the sharing of Internet access, often a broadband service through a CATV or
Digital Subscriber Line (DSL) provider.
residence halls. A campus area network is larger than a local area network but smaller
than a wide area network (WAN) (in some cases).
A metropolitan area network (MAN) is a network that connects two or more local area
networks or campus area networks together but does not extend beyond the boundaries of
the immediate town/city. Routers, switches and hubs are connected to create a
metropolitan area network.
A wide area network (WAN) is a computer network that covers a large geographic area
such as a city, country, or spans even intercontinental distances, using a communications
channel that combines many types of media such as telephone lines, cables, and air
waves. A WAN often uses transmission facilities provided by common carriers, such as
telephone companies. WAN technologies generally function at the lower three layers of
the OSI reference model: the physical layer, the data link layer, and the network layer.
A global area network (GAN) is a network used for supporting mobile communications
across an arbitrary number of wireless LANs, satellite coverage areas, etc. The key
challenge in mobile communications is handing off the user communications from one
local coverage area to the next. In IEEE Project 802, this involves a succession of
terrestrial WIRELESS local area networks (WLAN).[6]
A virtual private network (VPN) is a computer network in which some of the links
between nodes are carried by open connections or virtual circuits in some larger network
(e.g., the Internet) instead of by physical wires.
Internetwork
All networks are made up of basic hardware building blocks to interconnect network
nodes, such as Network Interface Cards (NICs), Bridges, Hubs, Switches, and Routers. In
addition, some method of connecting these building blocks is required, usually in the
form of galvanic cable (most commonly Category 5 cable). Less common are microwave
links (as in IEEE 802.12) or optical cable ("optical fiber"). An Ethernet card may also be
required.
A network card, network adapter, or NIC (network interface card) is a piece of computer
hardware designed to allow computers to communicate over a computer network. It
provides physical access to a networking medium and often provides a low-level
addressing system through the use of MAC addresses.
Repeaters
A repeater is an electronic device that receives a signal, cleans it from the unnecessary
noise, regenerates it and retransmits it at a higher power level, or to the other side of an
obstruction, so that the signal can cover longer distances without degradation. In most
twisted pair Ethernet configurations, repeaters are required for cable which runs longer
than 100 meters. Repeaters work on the Physical Layer of the OSI model.
Hubs
A network hub contains multiple ports. When a packet arrives at one port, it is copied
unmodified to all ports of the hub for transmission. The destination address in the frame
is not changed to a broadcast address.[7] It works on the Physical Layer of the OSI model.
Bridges
A network bridge connects multiple network segments at the data link layer (layer 2) of
the OSI model. Bridges do send broadcasts to all ports except the one on which the
broadcast was received. However, bridges do not promiscuously copy traffic to all ports,
as hubs do, but learn which MAC addresses are reachable through specific ports. Once
the bridge associates a port and an address, it will send traffic for that address to that port
only.
Bridges learn the association of ports and addresses by examining the source address of
frames that it sees on various ports. Once a frame arrives through a port, its source
address is stored and the bridge assumes that MAC address is associated with that port.
The first time that a previously unknown destination address is seen, the bridge will
forward the frame to all ports other than the one on which the frame arrived.
Switches
A network switch is a device that forwards and filters OSI layer 2 datagrams (chunk of
data communication) between ports (connected cables) based on the MAC addresses in
the packets.[8] This is distinct from a hub in that it only forwards the frames to the ports
involved in the communication rather than all ports connected
Routers
Exceptions
Hierarchy: Object-->Throwable(Serializable)-->Exception--
>java.io.IOException-->java.net.UnknownHostException
Hierarchy: Object-->Throwable(Serializable)-->Exception--
>java.io.IOException-->UnknownServiceExceptio
Signals that a socket cannot be bound to a local address and port. This often means that
the port is already in use.
Hierarchy: Object-->Throwable(Serializable)-->Exception--
>java.io.IOException-->SocketException-->BindException
Signals that a socket cannot be connected to a remote address and port. This means that
the remote host can be reached, but is not responding, perhaps because there is no process
on that host that is listening on the specified port.
Hierarchy: Object-->Throwable(Serializable)-->Exception--
>java.io.IOException-->SocketException-->java.net.ConnectException
This exception signals that a socket cannot be connected to a remote host because the
host cannot be contacted. Typically, this means that some link in the network between the
local machine and the remote host is down or that the host is behind a firewall.
Hierarchy: Object-->Throwable(Serializable)-->Exception--
>java.io.IOException-->SocketException-->NoRouteToHostException
Hierarchy: Object-->Throwable(Serializable)-->Exception--
>java.io.IOException-->ProtocolException
Hierarchy: Object-->Throwable(Serializable)-->Exception--
>java.io.IOException-->SocketException
The Internet Assigned Numbers Authority (IANA) is responsible for the global
coordination of the DNS Root, IP addressing, and other Internet protocol resources. This
includes the registration of commonly used port numbers for well-known Internet
services.
The port numbers are divided into three ranges: the well-known ports, the registered
ports, and the dynamic or private ports. The well-known ports are those from 0 through
1023. Examples include:
• 23: Telnet
• 53: Domain Name System
• 80: World Wide Web HTTP
• 119: Network News Transfer Protocol
• 443: HTTP over Transport Layer Security/Secure Sockets Layer
• 445: microsoft-ds, Server Message Block over TCP
The registered ports are those from 1024 through 49151. A list of registered ports may be
found on the IANA Website.[1] The dynamic or private ports are those from 49152
through 65535.
TELNET (TErminaL NETwork) is a network protocol used on the Internet or local area
networks to provide a bidirectional interactive text-oriented communications facility via a
virtual terminal connection. User data is interspersed in-band with TELNET control
information in an 8-bit byte oriented data connection over the Transmission Control
Protocol (TCP).
The Domain Name System (DNS) is a hierarchical naming system for computers,
services, or any resource connected to the Internet or a private network. It associates
various information with domain names assigned to each of the participants.
The World Wide Web, abbreviated as WWW and commonly known as The Web, is a
system of interlinked hypertext documents contained on the Internet. With a web
9
browser, one can view web pages that may contain text, images, videos, and other
multimedia and navigate between them by using hyperlinks.
The Network News Transfer Protocol (NNTP) is an Internet application protocol used
for transporting Usenet news articles (netnews) between news servers and for reading and
posting articles by end user client applications.
Transport Layer Security (TLS) and its predecessor, Secure Sockets Layer (SSL), are
cryptographic protocols that provide security for communications over networks such as
the Internet. TLS and SSL encrypt the segments of network connections at the Transport
Layer end-to-end.
Port:
What is DNS?
What does actually stand behind that almighty 3-letter abbreviation - DNS? DNS refers
to Domain Name System and represents a powerful Internet technology for converting
domain names to IP addresses. Its special mission is to be a mediator between the IP
addresses, the system-side names of the websites and their respective domains, and their
user-side alpha-numeric titles. Another important function of the DNS is to control the
delivery of email messages.
A DNS program works like this - every time a domain name is typed in a browser it is
automatically passed on to a DNS server, which translates the name into its
corresponding IP address (e.g. the domain name NTC Hosting.com is translated to
66.40.65.49). Thanks to the DNS, we do not need to bother to remember complicated
numeric combinations to reach a certain website - we can use its meaningful and much
easier to remember domain name instead.
and Secure Shell (OpenSSH port 22) etc. (VoIP), Trivial File Transfer Protocol
(TFTP) and online multiplayer games etc
Flow control:
In computer networking, flow control is the process of managing the rate of data
transmission between two nodes to prevent a fast sender from outrunning a slow receiver.
It provides a mechanism for the receiver to control the transmission speed, so that the
receiving node is not overwhelmed with data from transmitting node. Flow control
should be distinguished from congestion control, which is used for controlling the flow of
data when congestion has actually occurred [1]. Flow control mechanisms can be
classified by whether or not the receiving node sends feedback to the sending node.
Hamming code:
In telecommunication, a Hamming code is a linear error-correcting code named after its
inventor, Richard Hamming. Hamming codes can detect up to two simultaneous bit
errors, and correct single-bit errors; thus, reliable communication is possible when the
Hamming distance between the transmitted and received bit patterns is less than or equal
to one. By contrast, the simple parity code cannot correct errors, and can only detect an
odd number of errors.
.
Network topology
Computer networks may be classified according to the network topology upon which the
network is based, such as bus network, star network, ring network, mesh network, star-
bus network, tree or hierarchical topology network. Network topology is the coordination
by which devices in the network are arrange in their logical relations to one another,
independent of physical arrangement. Even if networked computers are physically placed
in a linear arrangement and are connected to a hub, the network has a star topology,
rather than a bus topology. In this regard the visual and operational characteristics of a
network are distinct. Networks may be classified based on the method of data used to
convey the data, these include digital and analog networks.
Bus Topology
Ring Topology
Mesh Topology
Star Topology
OSI MODEL
OSI Model
13
Media
Frame 2. Data Link Physical addressing
layers
A dialup service connects to the Internet through a phone line with a maximum
speed of 56kbps.
Broadband refers to a connection that has capacity to transmit large amount of data
at high speed. Presently a connection having download speeds of 256kbps or more is
classified as broadband.
Broadband comes in a number of forms - depending how the data is delivered - for
example via cable, satellite and most commonly using a telephone line where as a
dialup service always connects to the Internet through a phone line.
PROTOCAL:
The protocol defines a common set of rules and signals that computers on the
network use to communicate. One of the most popular protocols for LANs is
called Ethernet. Another popular LAN protocol for PCs is the IBM token-ring
network .
• IP (Internet Protocol)
• UDP (User Datagram Protocol)
• TCP (Transmission Control Protocol)
• DHCP (Dynamic Host Configuration Protocol)
• HTTP (Hypertext Transfer Protocol)
14
UDP:
The User Datagram Protocol (UDP) is one of the core members of the Internet Protocol
Suite, the set of network protocols used for the Internet. With UDP, computer
applications can send messages, in this case referred to as datagrams, to other hosts on an
Internet Protocol (IP) network without requiring prior communications to set up special
transmission channels or data paths. UDP is sometimes called the Universal Datagram
Protocol.
TCP:
The Transmission Control Protocol (TCP) is one of the core protocols of the Internet
Protocol Suite. TCP is one of the two original components of the suite (the other
being Internet Protocol, or IP), so the entire suite is commonly referred to as
TCP/IP. Whereas IP handles lower-level transmissions from computer to
computer as a message makes its way across the Internet, TCP operates at a
higher level, concerned only with the two end systems, for example a Web
browser and a Web server. In particular, TCP provides reliable, ordered delivery
of a stream of bytes from a program on one computer to another program on
another computer. Besides the Web, other common applications of TCP include
e-mail and file transfer. Among its other management tasks, TCP controls
segment size, flow control, the rate at which data is exchanged, and network
traffic congestion.
DHCP uses a client-server architecture. The client sends a broadcast request for
configuration information. The DHCP server receives the request and responds with
configuration information from its configuration database.
15
(FTP) is a standard network protocol used to exchange and manipulate files over a
TCP/IP-based network, such as the Internet. FTP is built on a client-server
architecture and utilizes separate control and data connections between the client
and server applications. FTP is used with user-based password authentication or
with anonymous user access.
TELNET
(TErminaL NETwork) is a network protocol used on the Internet or local area networks
to provide a bidirectional interactive text-oriented communications facility via a
virtual terminal connection. User data is interspersed in-band with TELNET
control information in an 8-bit byte oriented data connection over the
Transmission Control Protocol (TCP).
INTERNET:
The Internet is a global system of interconnected computer networks that use the
standard Internet Protocol Suite (TCP/IP) to serve billions of users worldwide. It is a
network of networks that consists of millions of private, public, academic, business, and
government networks of local to global scope that are linked by a broad array of
electronic and optical networking technologies. The Internet carries a vast array of
information resources and services, most notably the inter-linked hypertext documents of
the World Wide Web (WWW) and the infrastructure to support electronic mail.
EXTRANET:
An extranet is a private network that uses Internet protocols, network connectivity. An
extranet can be viewed as part of a company's intranet that is extended to users outside
the company, usually via the Internet. It has also been described as a "state of mind" in
which the Internet is perceived as a way to do business with a selected set of other
companies (business-to-business, B2B), in isolation from all other Internet users. In
16
IP Address: