B SC - III, Networking, Unit-I
B SC - III, Networking, Unit-I
B SC - III, Networking, Unit-I
1
Courses Title: Data Communication and
Networking
B.Sc (Entire Computer Science)- III, Semester–V
Course Objectives:
Course Outcomes: Upon successful completion of this course, students will be able to-
1. Familiarize with contemporary issues in network technologies.
2. Know the layered model approach explained in OSI and CP/IP network models
3. Identify different types of network devices and their functions within a network.
4. Know the Basic routing mechanisms, IP addressing scheme and Internetworking concepts.
5. Familiarize with IP and TCP Internet protocols.
6. Understand major concepts involved in design of WAN, LAN and wireless networks.
7. Know the basics of network configuration and maintenance.
8. Know the fundamentals of network security issues.
➢ Network Definition:
Computer networking refers to interconnected computer devices that can exchange data and share resources
with each other. These networked devices use a system of rules, called communications protocols, to transmit
information by using physical or wireless technologies.
➢ Network Topologies:
Topology defines the structure of the network of how all the components are interconnected to each other. Two
or more devices connect to a link, two or more links form a topology. The topology of a network is the
geometric representation of the relationship of all the links and linking devices (usually called nodes) to one
another. There are four basic topologies are mesh, star, bus, and ring.
Mesh topology: In a mesh topology, every device has a dedicated point-to-point link to every other device.
The term dedicated means that the link carries data only between the two devices it connects. To find the
number of physical links in a fully connected mesh network with n nodes, we first consider that each node must
be connected to every other node. Node 1 must be connected to n - 1 nodes, node 2 must be connected to n - 1
nodes, and finally node n must be connected to n - 1 nodes. We need n(n - 1) physical links. However, if each
physical link allows communication in both directions (duplex mode), we can divide the number of links by 2.
In other words, we can say that in a mesh topology, we need n(n -1) /2 duplex-mode links.
3
Advantages:
1) The use of dedicated links guarantees that each connection can carry its own data load.
2) Mesh topology is robust.
3) Guaranty of privacy or security.
4) Point-to-point links make fault identification and fault isolation easy
Disadvantages:
1) Mesh are related to the amount of cabling and the number of I/O ports required.
2) Every device must be connected to every other device, installation and reconnection are difficult.
3) Wiring can be greater than the available space.
4) Hardware required to connect each link (I/O ports and cable) can be prohibitively expensive.
Star Topology: In a star topology, each device has a dedicated point-to-point link only to a central controller,
usually called a hub. The devices are not directly linked to one another. Unlike a mesh topology, a star topology
does not allow direct traffic between devices. The controller acts as an exchange: If one device wants to send
data to another, it sends the data to the controller, which then relays the data to the other connected device.
Advantages:
1) A star topology is less expensive than a mesh topology. In a star, each device needs only one link and one I/O
port to connect it to any number of others
2) This factor also makes it easy to install and reconfigure.
3) Less cabling.
4) If one link fails, only that link is affected. All other links remain active,
5) Easy fault identification and isolation.
4
Disadvantage:
1) Star topology is the dependency of the whole topology on one single point, the hub. If the hub goes down, the
whole system is dead.
2) More cabling is required in a star than in some other topologies (such as ring or bus).
Bus Topology: A bus topology, on the other hand, is multipoint. One long cable acts as a backbone to link all
the devices in a network. Nodes are connected to the bus cable by drop lines and taps. A drop line is a
connection running between the device and the main cable. A tap is a connector into the main cable to create a
contact with the metallic core. As a signal travels along the backbone, some of its energy is transformed into
heat. Therefore, it becomes weaker and weaker as it travels farther and farther. For this reason there is a limit on
the number of taps a bus can support and on the distance between those taps.
Advantages:
1) Bus topology include ease of installation.
2) Bus uses less cabling than mesh or star topologies.
Disadvantages:
1) Difficult to add new devices.
2) Difficult reconnection and fault isolation.
3) A fault or break in the bus cable stops all transmission.
Ring Topology: Ring Topology may be a network configuration where device connections create a circular
data path. In this each device is connected to with its exactly two neighboring devices, like points on a circle
which forms like a ring structure. A number of repeaters are used for Ring topology.
The topology is named ring topology because one computer is connected to another, with the final one being
connected to the first. Exactly two neighbors for each device. A signal is passed along the ring in one direction.
Each ring incorporates a repeater.
5
Advantages
1) Data transmission is relatively straightforward because packets only move in one direction.
2) There is no requirement for a central controller to manage communication between nodes.
3) Easy installation & Reconfiguration
4) Simplified Faulty connections
Disadvantages
1) In a Unidirectional Ring, a data packet must traverse through all nodes.
2) All computers must be turned on in order for them to connect with one another.
Hybrid topology: The combination of various different topologies is known as Hybrid topology.
A Hybrid topology is a connection between different links and nodes to transfer the data. When two or more
different topologies are combined together is termed as Hybrid topology and if similar topologies are connected
with each other will not result in Hybrid topology.
Advantages:
1) Reliable: If a fault occurs in any part of the network will not affect the functioning of the rest of the
network.
2) Scalable: Size of the network can be easily expanded by adding new devices without affecting the
functionality of the existing network.
3) Flexible: This topology is very flexible as it can be designed according to the requirements of the
organization.
4) Effective: Hybrid topology is very effective as it can be designed in such a way that the strength of the
network is maximized and weakness of the network is minimized.
Disadvantages:
1) Complex design: The major drawback of the Hybrid topology is the design of the Hybrid network. It is
very difficult to design the architecture of the Hybrid network.
6
2) Costly Hub: The Hubs used in the Hybrid topology are very expensive as these hubs are different from
usual Hubs used in other topologies.
3) Costly infrastructure: The infrastructure cost is very high as a hybrid network requires a lot of cabling,
network devices, etc.
➢ Network Classifications:
Today when we speak of networks, we are generally referring to two primary categories: local-area networks
and wide-area networks and Metropolitan area networks. The category into which a network is determined by
its size. A LAN normally covers an area less than 2 miles; a WAN can be worldwide. Networks of a size in
between are normally referred to as metropolitan area networks and span tens of miles.
A
aaaaaaaaaa
1] Personal Area Network (PAN) is the computer network that connects computers/devices within the range
of an individual person. As PAN provides a network range within a person’s range typically within a range of
10 meters(33 feet) it is called a Personal Area Network. A Personal Area Network typically involves a
computer, phone, tablet, printer, PDA (Personal Digital Assistant) and other and other entertainment devices
like speakers, video game consoles, etc.
Thomas Zimmerman and other researchers at M.I.T.’s Media Lab first developed the concept of PAN. It is
very useful in the home, offices, and small network areas due to its high performance in terms of flexibility
and efficiency.
Types of Personal Area Network (PAN): There are 2 types depending upon its connection.
Wireless PAN, and 2. Wired PAN.
Data transmits at a very fast rate as the number of computers linked is limited. By definition, the connections
range in km
privately-owned networks within a single building or campus
types on basis of SIZE, TRANSMISSION,TOPOLOGY
must be high speed and relatively inexpensive hardware (Such as hubs, network adapters, and Ethernet
cables). LANs cover a smaller geographical area (Size is limited to a few kilometers) and are privately
7
owned. One can use it for an office building, home, hospital, schools, etc. LAN is easy to design and
maintain. A Communication medium used for LAN has twisted-pair cables and coaxial cables. It covers a
short distance, and so the error and noise are minimized.
range 1000 km
long distance transmission
A wide area network (WAN) provides long-distance transmission of data, image, audio and video information
over large geographic areas that may comprise a country, a continent, or even the whole world. The primary
purpose of WAN is computer networking. The networks are linked to communicate with one another. WAN is
also inter connection devices that are capable of communication. The deference between LAN and MAN is
normally limited inside at office, building or campus. WAN is large geographic areas. WAN interconnect
switches, router or modem.
WAN is not associated with a particular location. It helps in communication and sharing the required information
among the connections. WAN is the largest network as compared to MAN and LAN. A WAN may cover a
country, continent, etc. Examples of WAN include broadband services, 3G or 4G connections, etc. Some of the
advantages of WAN are that it covers a larger geographical area, the software, resources, and other information
is shared, has a high bandwidth.
8
Example of WAN
The Internet
4G Mobile Broadband Systems
A network of bank cash dispensers.
A metropolitan area network (MAN) is a network with a size between a LAN and a WAN. It normally covers
the area inside a town or a city. It is designed for customers who need a high-speed connectivity, normally to
the Internet, and have endpoints spread over a city or part of city. A good example of a MAN is the part of the
telephone company network that can provide a high-speed DSL line to the customer. Another example is the
cable TV network that originally was designed for cable TV, but today can also be used for high-speed data
connection to the Internet.
➢ Network Protocol:
In computer networks, communication occurs between entities in different systems. An entity is anything
capable of sending or receiving information. However, two entities cannot simply send bit streams to each other
and expect to be understood. For communication to occur, the entities must agree on a protocol.
“A protocol is a set of rules that govern data communications”. A protocol defines what is communicated,
how it is communicated, and when it is communicated.
“A protocol is a set of rules that govern data communications”. A protocol defines what is communicated,
how it is communicated, and when it is communicated
Syntax=format/structure of data
semanticcs=meaning of each section 9
timing=when data should send and how fast it should be sent
Syntax: The term syntax refers to the structure or format of the data, meaning the order in which they are
presented.
Semantics: The word semantics refers to the meaning of each section of bits. How is a particular pattern to be
interpreted, and what action is to be taken based on that interpretation?
Timing: The term timing refers to two characteristics: when data should be sent and how fast they can be sent.
Types of protocols: The protocols can be broadly classified into three major categories-
1. Communication
2. Management
3. Security
1. Communication: Communication protocols are really important for the functioning of a network. They are
so crucial that it is not possible to have computer networks without them. These protocols formally set out the
rules and formats through which data is transferred. These protocols handle syntax, semantics, error
detection, synchronization, and authentication.
Examples: HTTP, TCP, UDP, IP
2. Management: These protocols assist in describing the procedures and policies that are used in monitoring,
maintaining, and managing the computer network. These protocols also help in communicating these
requirements across the network to ensure stable communication. Network management protocols can also be
used for troubleshooting connections between a host and a client.
Examples: ICMP, SNMP, FTP, POP3
3. Security: These protocols secure the data in passage over a network. These protocols also determine how
the network secures data from any unauthorized attempts to extract or review data. These protocols make sure
that no unauthorized devices, users, services can access the network data. Primarily, these protocols depend
on encryption to secure data.
Examples: SSL, HTTPS, TSL
The basic elements of layered architecture are services, protocols, and interfaces.
Protocol: It defines a set of rules that a layer uses to exchange the information with peer entity. These rules
mainly concern about both the contents and order of the messages used.
Interface: It is a way through which the message is transferred from one layer to another layer.
ummanagable task
divided
||
small managable task
In case of layered architecture, no data are directly transferred from layer n on one machine to layer n on
another machine. Instead, each layer passes data and control information to the layer immediately below it, until
the lowest layer is reached. Below layer 1 is the physical medium through which actual communication takes
place.
In a layered architecture, unmanageable tasks are divided into several small and manageable tasks.
The data is passed from the upper layer to lower layer through an interface. A Layered architecture provides a
clean-cut interface so that minimum information is shared among different layers. It also ensures that the
implementation of one layer can be easily replaced by another implementation. A set of layers and protocols is
known as network architecture.
Note: The sender needs to know the port number associated with the receiver’s application.
✓ All the below 3 layers (including Session Layer) are integrated as a single layer in the TCP/IP model
as “Application Layer”.
✓ Implementation of these 3 layers is done by the network application itself. These are also known
as Upper Layers or Software Layers.
However, when TCP/IP is compared to OSI, we can say that the Link Layer is equivalent to the
combination of the physical and data link layers. The internet layer is equivalent to the network layer, and the
application layer is approximately doing the job of the session, presentation, and application layers with the
transport layer in TCP/IP taking care of part of the duties of the session layer.
1. Link Layer: A network layer is the lowest layer of the TCP/IP model. A network layer is the combination
of the Physical layer and Data Link layer defined in the OSI reference model. It defines how the data should be
sent physically through the network. This layer is mainly responsible for the transmission of the data between
two devices on the same network. The functions carried out by this layer are encapsulating the IP datagram into
frames transmitted by the network and mapping of IP addresses into physical addresses. The protocols used by
this layer are Ethernet, token ring, FDDI, X.25, frame relay.
2. Internet Layer: This layer parallels the functions of OSI’s Network layer. It defines the protocols which are
responsible for logical transmission of data over the entire network. The main protocols residing at this layer
are:
IP – stands for Internet Protocol and it is responsible for delivering packets from the source host to the
destination host by looking at the IP addresses in the packet headers. IP has 2 versions: IPv4 and IPv6.
IPv4 is the one that most of the websites are using currently. But IPv6 is growing as the number of IPv4
addresses are limited in number when compared to the number of users.
15
ICMP – stands for Internet Control Message Protocol. It is encapsulated within IP datagrams and is responsible
for providing hosts with information about network problems.
ARP – stands for Address Resolution Protocol. Its job is to find the hardware address of a host from a known IP
address. ARP has several types: Reverse ARP, Proxy ARP, Gratuitous ARP and Inverse ARP.
3. Transport layer: Provides communication session management between host computer and Defines the
level of services. It is responsible for end-to-end communication and error-free delivery of data. The two
main protocols present in this layer are:
1. Transmission Control Protocol (TCP) – TCP is connection-oriented protocol. TCP is comparatively
slower than UDP. It is known to provide reliable and error-free communication between end systems. It
performs sequencing and segmentation of data. It also has acknowledgment feature and controls the flow of
the data through flow control mechanism.
2. User Datagram Protocol (UDP) – UDP is connectionless protocol. UDP is a much faster, simpler, and
efficient protocol. The delivery of data to the destination cannot be guaranteed in UDP. UDP has only the basic
error checking mechanism using checksums. No acknowledgment segment.
4. Application Layer: An application layer is the topmost layer in the TCP/IP model. It is responsible for
handling high-level protocols, issues of representation. This layer allows the user to interact with the
application. When one application layer protocol wants to communicate with another application layer, it
forwards its data to the transport layer.
Following are the main protocols used in the application layer:
HTTP: HTTP stands for Hypertext transfer protocol. This protocol allows us to access the data over the
World Wide Web.
SNMP: SNMP stands for Simple Network Management Protocol. It is a framework used for managing the
devices on the internet by using the TCP/IP protocol suite.
SMTP: SMTP stands for Simple mail transfer protocol. The TCP/IP protocol that supports the e-mail is
known as a Simple mail transfer protocol.
DNS: DNS stands for Domain Name System. An IP address is used to identify the connection of a host to the
internet uniquely. But, people prefer to use the names instead of addresses. Therefore, the system that maps the
name to the address is known as Domain Name System.
TELNET: It is Terminal Network. It establishes the connection between the local computer and remote
computer in such a way that the local terminal appears to be a terminal at the remote system.
FTP: FTP stands for File Transfer Protocol. FTP is a standard internet protocol used for transmitting the files
from one computer to another computer.