CN Unit-1 Material
CN Unit-1 Material
CN Unit-1 Material
UNIT-1
INTRODUCTION
Syllabus:
Introduction: OSI overview, TCP/IP and other networks models, Examples of Networks: Novell Networks, Arpanet,
Internet, Network Topologies WAN, LAN, MAN.
Introduction:
A network is a set of devices (often referred to as nodes) connected by communication links. A node
can be a computer, printer, or any other device capable of sending and/or receiving data generated
by other nodes on the network.
Components of Data-communication:
The five components that make up a data communication are the message, sender, receiver,
medium, and protocol.
1|Page
COMPUTER NETWORKS INTRODUCTION
1. Message: The message is the information (data) to be communicated. The Popular forms of
information include text, numbers, pictures, audio, and video.
2. Sender: The sender is the device that sends the data message. It can be a computer, workstation,
telephone handset, video camera, and so on.
3. Receiver: The receiver is the device that receives the message. It can be a computer, workstation,
telephone handset, television, and so on.
4. Transmission medium. The transmission medium is the physical path by which a message travels
from sender to receiver. Some examples of transmission media include twisted-pair wire, coaxial
cable, fiber-optic cable, and radio waves.
5. Protocol. A protocol is a set of rules that maintain data communications. It represents an agreement
between the communicating devices. Without a protocol, two devices may be connected but not
communicating, just like a person speaking French cannot be understood by a person who speaks
only Japanese.
Simplex :
In simplex mode, the communication is unidirectional, as on a one-way road. Only one of
the two devices on a link can transmit; the other can only receive (see Figure a).
Keyboards and traditional monitors are examples of simplex devices. The keyboard can only
give input; the monitor can only accept output.
The simplex mode can use the entire capacity of the communication channel to send data in
one direction only.
2|Page
COMPUTER NETWORKS INTRODUCTION
Half-Duplex :
In half-duplex mode, each system can both transmit and receive, but not at the same time.
When one device is sending, the other can only receive, and vice versa (see Figure b).
The half-duplex mode is like a one-lane street with traffic allowed in both directions. When
cars are traveling in one direction, cars going the other way must wait. Walkie-talkies are
half-duplex system.
The half-duplex mode is used in cases where there is no need for communication in both
directions at the same time.
Full-Duplex :
In full-duplex mode (also called duplex), both systems can transmit and receive
simultaneously (see Figure c).
The full-duplex mode is like a two-way street with traffic flowing in both directions at the
same time.
In full-duplex mode, signals going in one direction share the capacity of the link: with signals
going in the other direction.
This sharing can occur in two ways: Either the link must contain two physically separate
transmission paths, one for sending and the other for receiving; or the capacity of the channel
is divided between signals traveling in both directions.
One common example of full-duplex communication is the telephone network. When two
people are communicating by a telephone line, both can talk and listen at the same time.
The full-duplex mode is used when communication in both directions is required all the time.
Type of Connection:
There are two possible types of connections: point-to-point and multipoint.
Point-to-Point: A point-to-point connection provides a dedicated link between two devices. The entire
capacity of the link is reserved for transmission between those two devices. Most point-to-point connections
use an actual length of wire or cable to connect the two ends, (see Figure a). When you change television
channels by infrared remote control, you are establishing a point-to-point connection between the remote
control and the television's control system.
Multipoint: A multipoint (also called multidrop) connection is one in which more than two specific devices
share a single link (see Figure b). In a multipoint environment, the capacity of the channel is shared, either spatially
or temporally. If several devices can use the link simultaneously, it is a spatially shared connection. If users must
take turns, it is a timeshared connection.
3|Page
COMPUTER NETWORKS INTRODUCTION
Basic Networking-Devices:
NIC(Network Interface Card:
Connecting Cables:
Hub:
A hub, also called a network hub, is a
common connection point
for devices in a network.
Hubs are devices commonly used to
connect segments of a LAN. Hub
contains multiple ports.
When a packet arrives at one port, it
is copied to the other ports so that all
segments of the LAN can see all
packets.
Switch
A network switch is a computer
networking device that connects
devices together on a computer
network by using packet switching to
receive, process, and forward data to
the destination device.
A network switch forwards data only
to the devices that need to receive it,
rather than broadcasting the same
data out of each of its ports.
4|Page
COMPUTER NETWORKS INTRODUCTION
Routers
Routers are small electronic devices that join
multiple computer networks together via
either wired or wireless connections.
A router is connected to two or more data
lines from different networks.
When a data packet comes in on one of the
lines, the router reads the network
address information in the packet to
determine the ultimate destination.
Using information in its routing
table or routing policy, it directs the packet to
the next network.
_______________________________________________________________________
Network Topologies:
A network topology is the arrangement of a network, including its nodes and connecting lines.
Mesh Topology:
In a mesh topology, every device has a dedicated point-to-point link to every other device. The term
dedicated means that the link carries data only between the two devices it connects.
One practical example of a mesh topology is the connection of telephone regional offices in which
each regional office needs to be connected to every other regional office.
To find the number of physical links in a fully
connected mesh network with n nodes, we first
consider that each node must be connected to
every other node.
Node 1 must be connected to n - 1 nodes, node 2
must be connected to n – 1 nodes, and finally
node n must be connected to n-1 nodes.
However each physical link allows communication
in both directions (duplex mode). Fig: A fully connected mesh topology (five devices)
Advantages of mesh-topology:
Dedicated links guarantees that each connection can carry its own data load.
Mesh topology is robust. If one link becomes unusable, it does not fail the entire system.
There is the advantage of privacy or security.
Point-to-Point links make fault identification and fault correction easy.
5|Page
COMPUTER NETWORKS INTRODUCTION
Disadvantages of mesh-topology:
The amount of cabling and the number of I/O ports required are high.
Every device must be connected to every other device, installation and reconnection are difficult.
The bulk wiring can be greater than the available space (in walls, ceilings, or floors).
The hardware required to connect each link (I/O ports and cable) can be prohibitively expensive.
Star-Topology:
In a star topology, each device has a dedicated point-to-point link only to a central controller, usually
called a hub.
The devices are not directly linked to one another. Unlike a mesh topology, a star topology does not
allow direct traffic between devices.
The controller acts as an exchange: If one device wants to send data to another, it sends the data to
the controller, which then transfers the data to the other connected device.
The star topology is used in local-area networks (LANs),
Bus-Topology:
A bus topology is multipoint. One long cable acts as a backbone to link all the devices in a network
Nodes are connected to the bus cable by drop lines and taps.
A drop line is a connection running between the device and the main cable.
A tap is a connector that either splices into the main cable or punctures the sheathing of a cable to
create a contact with the metallic core.
6|Page
COMPUTER NETWORKS INTRODUCTION
As a signal travels along the backbone, some of its energy is transformed into heat. Therefore, it
becomes weaker and weaker as it travels farther and farther.
For this reason, there is a limit on the number of taps a bus can support and on the distance between
those taps.
Bus topology was the one of the first topologies used in the design of early local area networks.
Ethernet LANs can use a bus topology, but they are less popular now
Advantages of bus topology
Ease of installation.
In a bus, this redundancy is eliminated.
Disadvantages of bus topology
Difficult reconnection and fault isolation
A bus is usually designed to be optimally efficient at installation. It can therefore be difficult to add
new devices.
A fault or break in the bus cable stops all transmission. The damaged area reflects signals back in
the direction of origin, creating noise in both directions.
Ring-Topology:
In a ring topology, each device has a dedicated point-to-point connection with only the two devices
on either side of it.
A signal is passed along the ring in one direction, from device to device, until it reaches its
destination.
Each device in the ring incorporates a repeater. When a device receives a signal intended for
another device, its repeater regenerates the bits and passes them along.
7|Page
COMPUTER NETWORKS INTRODUCTION
Hybrid-Topology:
A network can be hybrid. For example, we can have a main star topology with each branch
connecting several stations in a bus topology as shown in Figure
Categories of Networks:
Based on the size (geographical area) network fall into 3 categories:
LAN (Local Area Networks)
MAN (Metropolitan Area Networks)
WAN (Wide Area Networks)
LAN (Local Area Networks):
A local area network (LAN) is usually privately owned and links the devices in a single office, building,
or campus.
Currently, LAN size is limited to a few kilometres.
LANs are designed to allow resources to be shared between personal computers or workstations.
The resources to be shared can include hardware (e.g., a printer), software (e.g., an application
program), or data.
LAN may be determined by licensing restrictions on the number of users per copy of software, or by
restrictions on the number of users licensed to access the operating system.
In general, a given LAN will use only one type of transmission medium. The most common LAN
topologies are bus, ring, and star.
9|Page
COMPUTER NETWORKS INTRODUCTION
The point-to-point WAN is normally a line leased from a telephone or cable TV provider that connects
a home computer or a small LAN to an Internet service provider (lSP).
This type of WAN is often used to provide Internet access.
OSI-Reference model:
The OSI model is based on the proposal developed by International Standards Organization (ISO) this
model is called as ISO-OSI (Open Systems Interconnection) Reference Model because it is used for
connecting the open systems.
That is the systems which are open for communication with other systems.
It was a first step towards the International standardization of the protocols used in various layers by
Day and Zimmermann in 1983.
The OSI model is a layered framework for the design of network systems that allows communication
between all types of computer systems.
It consists of seven separate but related layers, each of which defines a part of the process of moving
information across a network.
10 | P a g e
COMPUTER NETWORKS INTRODUCTION
Physical Layer(Layer-1):
The lowest layer of the OSI reference model is the physical layer. It is responsible for the actual
physical connection between the devices. The physical layer contains information in the form of bits.
It is responsible for the actual physical connection between the devices.
When receiving data, this layer will get the signal received and convert it into 0s and 1s and send
them to the Data Link layer, which will put the frame back together.
The functions of the physical layer:
Bit synchronization: The physical layer provides the synchronization of the bits by providing
a clock. This clock controls both sender and receiver thus providing synchronization at bit
level.
Bit rate control: The Physical layer also defines the transmission rate i.e. the number of bits
sent per second.
Physical topologies: Physical layer specifies the way in which the different, devices/nodes are
arranged in a network i.e. bus, star or mesh topology.
Transmission mode: Physical layer also defines the way in which the data flows between the
two connected devices. The various transmission modes possible are: Simplex, half-duplex
and full duplex.
Hub, Repeater, Modem, Cables are Physical Layer devices.
11 | P a g e
COMPUTER NETWORKS INTRODUCTION
Physical addressing: After creating frames, Data link layer adds physical addresses (MAC
address) of sender and/or receiver in the header of each frame.
Error control: Data link layer provides the mechanism of error control in which it detects
and retransmits damaged or lost frames.
Flow Control: The data rate must be constant on both sides else the data may get corrupted
thus , flow control coordinates that amount of data that can be sent before receiving
acknowledgement.
Access control: When a single communication channel is shared by multiple devices, MAC
sub-layer of data link layer helps to determine which device has control over the channel at
a given time.
Switch & Bridge are Data Link Layer devices.
Logical Addressing: In order to identify each device on internetwork uniquely, network layer
defines an addressing scheme. The sender & receiver’s IP address are placed in the header by
network layer. Such an address distinguishes each device uniquely and universally.
Network layer is implemented by networking devices such as routers.
12 | P a g e
COMPUTER NETWORKS INTRODUCTION
Transport Layer (Layer 4):
Transport layer provides services to application layer and takes services from network layer.
The data in the transport layer is referred to as Segments. It is responsible for the End to End delivery
of the complete message.
Transport layer also provides the acknowledgement of the successful data transmission and re-
transmits the data if error is found.
The functions of the transport layer are:
Segmentation and Reassembly: This layer accepts the message from the (session) layer, breaks
the message into smaller units. Each of the segment produced has a header associated with it.
The transport layer at the destination station reassembles the message.
Service Point Addressing: In order to deliver the message to correct process, transport layer
header includes a type of address called service point address or port address. Thus by
specifying this address, transport layer makes sure that the message is delivered to the correct
process.
The services provided by transport layer:
Connection Oriented Service (TCP):
In this type of transmission, the receiving device sends an acknowledgment, back to the source
after a packet or group of packets is received. This type of transmission is reliable and secure.
Connection less service(UDP):
In this type of transmission, the receiver does not acknowledge receipt of a packet. This
approach allows for much faster communication between devices. Connection oriented Service
is more reliable than connection less Service.
Data in the Transport Layer is called as Segments.
Transport layer is operated by the Operating System. It is a part of the OS and communicates with
the Application Layer by making system calls. Transport Layer is called as Heart of OSI model.
13 | P a g e
COMPUTER NETWORKS INTRODUCTION
Summary of Layers:
14 | P a g e
COMPUTER NETWORKS INTRODUCTION
TCP/IP Model:
The OSI Model we just looked at is just a reference/logical model.
It was designed to describe the functions of the communication system by dividing the
communication procedure into smaller and simpler components.
But when we talk about the TCP/IP model, it was designed and developed by Department of Defense
(DoD) in 1960s and is based on standard protocols.
It stands for Transmission Control Protocol/Internet Protocol. The TCP/IP model is a concise version
of the OSI model.
It contains four layers, unlike seven layers in the OSI model. The layers are:
Application Layer/Process Layer
Transport Layer/Host-to-Host Layer
Network/Internet Layer
Network interface Layer
15 | P a g e
COMPUTER NETWORKS INTRODUCTION
Transport Layer:
This layer is analogous to the transport layer of the OSI model. It is responsible for end-to-end
communication and error-free delivery of data.
It shields the upper-layer applications from the complexities of data.
The two main protocols present in this layer are:
Transmission Control Protocol (TCP) – It is known to provide reliable and error-free communication
between end systems. It performs sequencing and segmentation of data. It also has acknowledgement
feature and controls the flow of the data through flow control mechanism. It is a very effective protocol
but has a lot of overhead due to such features. Increased overhead leads to increased cost.
User Datagram Protocol (UDP) – On the other hand does not provide any such features. It is the go to
protocol if your application does not require reliable transport as it is very cost-effective. Unlike TCP,
which is connection-oriented protocol, UDP is connectionless.
Application Layer:
This layer performs the functions of top three layers of the OSI model: Application, Presentation and
Session Layer.
It is responsible for node-to-node communication and controls user-interface specifications.
Some of the protocols present in this layer are: HTTP, FTP, Telnet, SMTP, NTP, DNS, DHCP.
HTTP: Hyper Text Transfer Protocol, used by the World Wide Web to manage communications
between web browsers and server.
FTP: File Transfer Protocol, the standard network protocol used for the transfer of computer files
between a client and server on a computer network.
TELNET: Used on the Internet or local area networks to provide a bidirectional interactive text-
oriented communication facility using a virtual terminal connection.
NTP: Network Time Protocol. It is used to synchronize the clocks on our computer to one standard
time source.
SMTP: Simple Mail Transfer Protocol is a TCP/IP protocol used in sending and receiving e-mail.
DNS: The domain name system (DNS) is the way that internet domain names are located and
translated into internet protocol (IP) addresses.
DHCP: The Dynamic Host Configuration Protocol (DHCP) is a network management protocol used on
TCP/IP networks whereby a DHCP server dynamically assigns an IP address and other network
configuration parameters to each device on a network so they can communicate with other IP
networks.
16 | P a g e
COMPUTER NETWORKS INTRODUCTION
Comparison:
OSI(Open System Interconnection) TCP/IP (Transmission Control Protocol / Internet
Protocol)
1. OSI is a generic, protocol independent 1. TCP/IP model is based on standard protocols around
standard, acting as a communication gateway which the Internet has developed. It is a communication
between the network and end user. protocol, which allows connection of hosts over a network.
2. In OSI model the transport layer guarantees 2. In TCP/IP model the transport layer does not guarantees
the delivery of packets. delivery of packets. Still the TCP/IP model is more reliable.
4. OSI model has a separate Presentation layer 4. TCP/IP does not have a separate Presentation layer or
and Session layer. Session layer.
5. Transport Layer is Connection Oriented. 5. Transport Layer is both Connection Oriented and
Connection less.
7. OSI is a reference model around which the 7. TCP/IP model is, in a way implementation of the OSI
networks are built. Generally it is used as a model.
guidance tool.
8. Network layer of OSI model provides both 8. The Network layer in TCP/IP model provides
connection oriented and connectionless service. connectionless service.
17 | P a g e
COMPUTER NETWORKS INTRODUCTION
9. OSI model has a problem of fitting the 9. TCP/IP model does not fit any protocol
protocols into the model.
10. Protocols are hidden in OSI model and are 10. In TCP/IP replacing protocol is not easy.
easily replaced as the technology changes.
11. OSI model defines services, interfaces and 11. In TCP/IP, services, interfaces and protocols are not
protocols very clearly and makes clear distinction clearly separated. It is also protocol dependent.
between them. It is protocol independent.
18 | P a g e
COMPUTER NETWORKS INTRODUCTION
ARPANET:
19 | P a g e
COMPUTER NETWORKS INTRODUCTION
Internet:
20 | P a g e
COMPUTER NETWORKS INTRODUCTION
****************************************
21 | P a g e