UNIT1 (2)

Download as pdf or txt
Download as pdf or txt
You are on page 1of 22

Unit-1: Introduction to Network

1.1 Basics of network


1.1.1 Types of networks

1.1.2 Different topologies (Bus, ring, star, mesh, tree)


1.2 Types of networks (LAN, MAN, WAN)
1.3 Terminologies (Intranet, Internet, Unicast, Broadcast, Multicast)
Introduction to Network/ Basics of network

o A computer network is a set of devices (often referred to as nodes) connected by


communication links. A node can be a computer, printer, or any other device capable
of sending or receiving data from the other node/device through the network.
o Computer Network is a group of computers connected with each other through wires,
optical fibres or optical links so that various devices can interact with each other
through a network.
o A network set up by connecting two or more computers and other supporting
hardware devices through communication channels is called a computer network. It
enables computers to communicate with each other and to share commands, data,
etc., including the hardware and software resources.
o Each computing device in a network is called a node or station. The nodes can be
routers, personal computers, and servers. Data transformation is done via the network
using rules known as protocols. The protocols are the set of rules which every node of
the network should follow for transferring information over the wired or wireless
network.
o The aim of the computer network is the sharing of resources among various devices.
o In the case of computer network technology, there are several types of networks that
vary from simple to complex level.

URVASHI NIRAV PATEL 1


How Does a Computer Network Work?
Computer Networks simply work using nodes and links. Data Communication Equipment is
simply termed as Nodes. For example, Modems, Hubs, Switches, etc. whereas links in
Computer networks can be referred to as a connection between two nodes. We have
several types of links like cable wires, optical fibers, etc.
Whenever a Computer Network is working, nodes have the work of sending and receiving
data via the links. Computer Network provides some set of protocols that helps in following
the rules and protocols.

Computer Network Criteria


1. Performance
2. Reliability
3. Security
Performance
It can be measured in many ways and depends on the number of factors

 No of users
 Type of transmission medium
 Response time
 Transit time
 Hardware
 Software
Reliability
This is measured by the following factors

 Frequency of failure
 The recovery time of a network after a failure.
 Catastrophe
Security
As data is being travelled from node to node through the network to reach its final
destination, during that time it can be tampered or can be stolen so the security of
information is the top priority.

Network security issues include protecting data from the following


 Unauthorized access
 Viruses
Applications OF COMPUTER NETWORKS

1. Resource sharing: Resource sharing is the sharing of resources such as programs,


printers, and data among the users on the network without the requirement of the
physical location of the resource and user.
2. Server-Client model: Computer networking is used in the server-client model. A
server is a central computer used to store the information and maintained by the

URVASHI NIRAV PATEL 2


system administrator. Clients are the machines used to access the information stored
in the server remotely.
3. Communication medium: Computer network behaves as a communication medium
among the users. For example, a company contains more than one computer has an
email system which the employees use for daily communication.
4. E-commerce: Computer network is also important in businesses. We can do the
business over the internet. For example, amazon.com is doing their business over the
internet, i.e., they are doing their business over the internet.

Uses of Computer Network:


o It allows you to share resources such as printers, scanners, etc.
o You can share expensive software and database among network users.
o It facilitates communications from one computer to another computer.
o It allows the exchange of data and information among users through a network.

Need of computer network


1. Internet access: We can easily access information all because of the internet which
provides a variety of information and communication facilities, using standardized
communication protocols.
2. eCommerce: also known as electronic commerce, refers to buying or selling product,
service etc through the internet. It has been one of the world most profitable
business in the world which is only possible of a computer network.
3. Entertainment: It includes games, online video streaming and many other which is
only possible because of the computer network.
4. VoIP: Through Voice over Internet protocol, telephone calls are made digitally using
Internet Protocols instead of the regular analog phone lines.
Advantages of Computer Network
1. File sharing: Fundamental goals of a computer network is to allow file sharing and
remote file access.
2. Server-Client model: Client-server model is a distributed application framework. The
server is a master system which stores the data and provides the processing service.
A client is a user system which accesses the data from the server and can perform
processing in its system or in a server system.
3. Resource sharing: All the resources such as printers, modems, scanners and fax
machines etc can be shared by all the system in a computer network.
4. Better connectivity and communications: A computer network allows all the user or
computers at a different location to communicate easily, widely used example is
email, video conference etc.
Disadvantages of Computer Network
1. Lack of data security and privacy due to the huge number of the user accessing the
internet from every corner of the earth, handling data is a challenging task and data
can be stolen which violate the privacy of the user.

URVASHI NIRAV PATEL 3


2. Presence of computer viruses and the malware: A virus can easily spread through an
interconnected workstation or over the internet which can damage or steal the data
from the computer system in a computer network.
3. Lack of Independence: In most cases, the client is dependent on the centralized
server and client user lack any freedom whatsoever. the centralized server can make
hinder in the decision making of the user system.
4. Lack of Robustness: As a client is dependent on the centralized server, if the
centralized server breaks down, the entire system of networks would be useless and
also if any of the links between the end system fail then the network will standstill.
5. Need an efficient handler: As a computer network consisting of many devices and
software, so to handle the smooth functioning of the transmission of information, it
requires high technical skills and knows- how its administration and its operations.

TYPES OF CONNECTIONS: A network is two or more devices connected through links. A link
is a communications pathway that transfers data from one device to another. There are two
possible types of connections: point-to-point and multipoint.
(1) Point-to-Point: A point-to-point connection provides a dedicated link between two
devices. The entire capacity of the link is reserved for transmission between those two
devices. Most point-to-point connections. use an actual length of wire or cable to
connect the two ends, but other options, such as microwave or satellite links, are also
possible. When you change television channels by infrared remote control, you are
establishing a point-to-point connection between the remote control and the television's
control system.
(2) Multipoint: A multipoint (also called multidrop) connection is one in which more than
two specific devices share a single link. In a multipoint environment, the capacity of the
channel is shared, either spatially or temporally. If several devices can use the link
simultaneously, it is a spatially shared connection. If users must take turns, it is a
timeshared connection.

URVASHI NIRAV PATEL 4


Network Architecture

Network architecture is the design of a computer network. It is a framework for the


specification of a network's physical components and their functional organization and
configuration, its operational principles and procedures, as well as communication
protocols used.
There are two major types of network architectures:
 Peer-To-Peer Architecture
 Client/Server Architecture

Peer-To-Peer Architecture
 In a peer-to-peer network, tasks are allocated to every device on the network.
 Furthermore, there is no real hierarchy in this network, all computers are
considered equal andall have the same abilities to use the resources available on
this network.
 Instead of having a central server which would act as the shared drive, each
computer that’s
connected to this network would act as the server

Advantages of Peer-To-Peer Network:


 It is less costly as it does not contain any dedicated server.
 If one computer stops working but, other computers will continue working.
 It is easy to set up and maintain as each computer manages itself.
Disadvantages of Peer-To-Peer Network:

 In the case of Peer-To-Peer network, it does not contain the centralized


system. Therefore, it cannot back up the whole data as the data is different in
different locations.
 Security and data backups are to be done to each individual computer.
 As the numbers of computers increases on a P2P network; performance,

URVASHI NIRAV PATEL 5


security, and access become a major headache.
Client/Server Architecture
 Client-server architecture, architecture of a computer network in which many
clients (remote processors) request and receive service from a centralized server
(host computer).
 In a client/server network, a centralized, really powerful computer(server) act as a
hub in which other computers or workstations(clients) can connect to. This server
is the heart of the system, which manages and provides resources to any client that
requests them.
 A server performs all the major operations such as security and network
management.
 A server is responsible for managing all the resources such as files, directories,
printer, etc.
 All the clients communicate with each other through a server. For example, if
client1 wants to send some data to client 2, then it first sends the request to the
server for the permission. The server sends the response to the client 1 to initiate

its communication with the client 2.

Advantages of a client/server network


 Resources and data security are controlled through the server.
 Not restricted to a small number of computers.
 Server can be accessed anywhere and across multiple platforms.
Disadvantages of a client/server network
 Can become very costly due to the need of a server as well as networking devices
such as hubs, routers, and switches.
 If and when the server goes down, the entire network will be affected.
 Technical staff needed to maintain and ensure network functions efficiently.

URVASHI NIRAV PATEL 6


1.1.1/1.2 Types of Computer Networks
There are two primary types of computer networking: wired networking and wireless
networking.
1. Wired Network: As we all know, “wired” refers to any physical medium made up of
cables. Copper wire, twisted pair, or fiber optic cables are all options. A wired
network employs wires to link devices to the Internet or another network, such as
laptops or desktop PCs.
2. Wireless Network: “Wireless” means without wire, media that is made up of
electromagnetic waves (EM Waves) or infrared waves. Antennas or sensors will be
present on all wireless devices. Cellular phones, wireless sensors, TV remotes,
satellite dish receivers, and laptops with WLAN cards are all examples of wireless
devices. For data or voice communication, a wireless network uses radio
frequency waves rather than wires.
As a general rule, wired networking offers greater speed, reliability and security
compared to wireless networks; wireless networking tends to provide more flexibility,
mobility and scalability.
Some of the different networks based on size are:
 Local area network, or LAN
 Metropolitan area network, or MAN
 Wide area network, or WAN
Local Area Networks (LAN):
 Local area networks, generally called LANs, are privately-owned networks within a
single building orcampus of up to a few kilometers in size.
 They are widely used to connect personal computers and workstations in company
offices and organizations to share resources (e.g., printers) and exchange
information.
 LANs are distinguished from other kinds of networks by three characteristics:
(1) Their size,
(2) Their transmission technology
(3) Their topology.
 A LAN can also be formed with two computers connected over a network. Hub, Switches,
Cables, and Optical fibers are used to connect various computers and devices to a network.
 Early LANs had data rates in the 4 to 16 megabits per second (Mbps) range. Today,
however, speeds are normally 100 or 1000 Mbps.
 The most common LAN topologies are bus, ring, and star
 Examples of LAN are networking in a home, school, college, office, etc.
 Group of interconnected computers within a small area. (room, building, campus)
 Two or more pc's can from a LAN to share files, folders, printers, applications and other
devices. Coaxial or CAT 5 cables are normally used for connections.
 Due to short distances, errors and noise are minimum.
 Data transfer rate is 10 to 100 mbps. Example: A computer lab in a school.
 LANs are restricted in size, which means that the worst-case transmission time is bounded
and known in advance.
 Knowing this bound makes it possible to use certain kinds of designs that would not
URVASHI NIRAV PATEL 7
otherwise be possible. It also simplifies network management.
 Traditional LANs run at speeds of 10 Mbps to 100 Mbps, have low delay (microseconds or
nanoseconds), and make very few errors. Newer LANs operate atup to 10 Gbps.

Characteristics of LAN:
 LANs are private networks, not subject to external control
 Simple and better performance
 Work in a restricted geographical area
Advantages:
 Resource sharing
 Software applications sharing
 Easy and Cheap communication
 Data Security
 Internet sharing
 High data transfer rate
 Ease of setup
 Centralized Data
 Low Cost
Disadvantages

 Restricted to local area


 Covers small area
 The cables and connectors get damaged easily
 Requires administrative time

Metropolitan Area Network (MAN):


 A metropolitan area network, or MAN, covers a city.
 A MAN is a computer network that interconnects users with computer resources in a
geographical area or region larger than that covered by a LAN.
 It canbe an interconnection between several LANs by bridging them with backbone lines.
 This type of network is created by linking existing LAN networks to cover a large
geographical area. MAN is smaller than LAN but larger than WAN.
 A MAN is larger than a LAN but smaller than a WAN. This is the type of computer network
that connects computers over a geographical distance through a shared communication
path over a city, town, or metropolitan area.
 Design to extend over a large area.
 Connecting number of LAN's to form larger network, so that resources can be shared.

URVASHI NIRAV PATEL 8


 Networks can be up to 5 to 50 km. Owned by organization or individual.
 Data transfer rate is low compare to LAN. Example: Organization with different branches
located in the city.
 Examples of MAN are networking in government agencies, airports, libraries, etc.

Fig: Metropolitan Area


Network

Characteristics:
 Generally, covers towns and cities (up to 50km)
 Transmission medium used for MAN is optical fiber, coaxial cable etc.
 Data rates adequate for distributed computing
applications
 The size of the MAN is in the range of 5km to 50km.
 The MAN ranges from the campus to the entire city.
 The MAN is maintained and managed by either the user group or the Network provider.
 Users can achieve the sharing of regional resources by using MAN.
 The data transmission rates can be medium to high

Uses Of Metropolitan Area Network:


 MAN is used in communication between the banks in a city.
 It can be used in an Airline Reservation.
 It can be used in a college within a city.
 It can also be used for communication in the military.
Advantages
o Less Expensive: It is less expensive to set up a MAN and to connect it to a WAN.
o High Speed: The speed of data transfer is more than WAN.
o Local Emails: It can send local emails fast.
o Access to the Internet: It allows you to share your internet connection, and thus multiple users
can have access to high-speed internet.
o Easy to set up: You can easily set up a MAN by connecting multiple LANs.
o High Security: It is more secure than WAN.

Disadvantages

URVASHI NIRAV PATEL 9


 Complex, more cabling required and expensive
 Difficult to handle due to large network size
 Risk of hacking
 High installation cost as it requires fiber optics
Wide Area Network (WAN)
 A WAN is a type of computer network that covers a large geographical area. WAN is
also defined as the connection of several LANs linked together to cover an entire city
or country. The WAN network is provided via several methods such as telephone
lines, fiber optics cable, and also through satellite links.
 Are country and worldwide network.
 Contains multiple LAN's and MAN's.
 Distinguished in terms of geographical range.
 Uses satellites and microwave relays.
 Data transfer rate depends upon the ISP provider and varies over the location.
 Best example is the internet
 A Wide Area Network is a network that extends over a large geographical area such
as states or countries.
 A Wide Area Network is quite bigger network than the LAN.
 A Wide Area Network is not limited to a single location, but it spans over a large
geographical area through a telephone line, fibre optic cable or satellite links.
 The internet is one of the biggest WAN in the world.
 A Wide Area Network is widely used in the field of Business, government, and
education.

Characteristics
• Covers large distances (states, countries, continents)

1
URVASHI NIRAV PATEL
0
• Communication medium used are satellite, public telephone networks which are
connected by routers

Advantages Of WAN are-


 Covers vast area
 Multiple users can share and access the internet at the same time
 High Bandwidth
 Covers large geographical area
 Shared software and resources with connecting workstations
 Information can be exchanged to anyone else worldwide in the network
Disadvantages Of WAN are-
 High initial investment cost
 Hard to handle as the network is vast and complex.
 Less secure
 Data security
 Network is very complex and management is difficult
 As size increases, the networks become more expensive
1.1.2 Different topologies (Bus, ring, star, mesh, tree)
Physical Topology
 The term physical topology refers to the way in which a network is laid out
physically.
 Two or more devices connect to a link; two or more links form a topology. The
topology of a network is the geometric representation of the relationship of all
the links and linking devices (usually called nodes) to one another.
 The physical arrangement of the computer system/node, which is connected to each other
via communication medium is called topologies.

Types of topology:
(1) Mesh topology.
(2) Star topology.
(3) Tree (Hierarchical) topology.
(4) Bus topology.
(5) Ring topology.

1
URVASHI NIRAV PATEL
1
MESH:
 In a mesh topology, every device has a dedicated point-to-point link to every other device.
The term dedicated means that the link carries traffic only between the two devices it
connects.
 A mesh topology is the one where every node is connected to every other node
in the network.
 A mesh topology can be a full mesh topology or a partially connected
mesh topology.

 In a full mesh topology, every computer in the network has a connection to


each of the other computers in that network. The number of connections in this
network can be calculated using the following formula (n is the number
ofcomputers in the network): n(n-1)/2

 To find the number of physical links in a fully connected mesh network with n nodes, we
first consider that each node must be connected to every other node. Node 1 must be
connected to n - I nodes, node 2 must be connected to n – 1 node, and finally node n must
be connected to n - 1 nodes. We need n(n - 1) physical links. However, if each physical link
allows communication in both directions (duplex mode), we can divide the number of links
by 2. In other words, we can say that in a mesh topology, we need n(n -1) /2 duplex-mode
links. To accommodate that many links, every device on the network must have n – 1
input/output ports to be connected to the other n - 1 stations.
 In a partially connected mesh topology, at least two of the computers in the
network have connections to multiple other computers in that network. It is an
inexpensive way to implement redundancy in a network. In the event that one
of the primary computers or connections in the network fails, the rest of the
network continues to operate normally.
Following are the advantages of Mesh topology:
o Easy to transmit data.
o We can send data from many devices simultaneously. Mesh topology will handle much
traffic as compared to other topologies.

1
URVASHI NIRAV PATEL
2
o If one link is broken or remains faulty, data transfer can occur between nodes using
other links. Hence data transmission is uninterrupted and reliable.
o The physical margins will not allow other persons to enter and access the messages.
o Fault detection and isolation are easy.
Following are the disadvantages of Mesh topology:
1. Very high cabling required.
2. Cost in efficient to implement.
3. Complex to implement and takes large space to install the network.
4. Installation and maintenance are very difficult.

STAR:

 In a star topology, each device has a dedicated point-to-point link only to a central
controller, usually called a hub.
 The devices are not directly linked to one another.
 Unlike a mesh topology, a star topology does not allow direct traffic between devices. The
controller acts as an exchange: If one device wants to send data to another, it sends the
data to the controller, which then relays the data to the other connected device.
 The star topology is used in local-area networks (LANs).
 High-speed LANs often use a star topology with a central hub
Advantages of star topology
 Centralized management of the network, through the use of the central
computer, hub, or switch.
 Easy to add another computer to the network.
 If one computer on the network fails, the rest of the network continues to
function normally.
 The star topology is used in local-area networks (LANs), High-speed LANs
often use a star topology with a central hub.
 A star topology is less expensive than a mesh topology.
 Easy to install
 If a node fails, it will not affect other nodes.
 Easy to reconfigure and upgrade(configured using a central device).
Disadvantages of star topology

1
URVASHI NIRAV PATEL
3
 The star topology ,we must required a network device like Hub, Switch etc.
 If two nodes want to share the data ,sharing is only possible through HUB.
 If HUB is failed the entire network will be failed.
 We can’t send private data.

BUS:

 A bus topology is multipoint


 Every computer and network device is connected to a single cable in a bus
topology network.
a line topology, a bus topology is a network setup in which each computer
and network device are connected to a single cable or backbone.
 Nodes are connected to the bus cable by drop lines and taps.
 A drop line is a connection running between the device and the main cable.
 A tap is a connector that either splices into the main cable or punctures the sheathing of a
cable to create a contact with the metallic core.
 As a signal travels along the backbone, some of its energy is transformed into heat.
Therefore, it becomes weaker and weaker as it travels farther and farther. For this reason,
there is a limit on the number of taps a bus can support and on the distance between those
taps.
Following are the advantages of Bus topology:

1. Simple to use and install.


2. If a node fails, it will not affect other nodes.
3. Less cabling is required.
4. Cost-efficient to implement.

Following are the disadvantages of Bus topology:

1. Efficiency is less when nodes are more(strength of signal decreases).


2. If the bus fails, the network will fail.
3. A limited number of nodes can connect to the bus due to limited bus length.
4. Security issues and risks are more as messages are broadcasted to all nodes.
5. Congestion and traffic on the bus as it is the only source of communication.

1
URVASHI NIRAV PATEL
4
RING:

 A ring topology is a network configuration in which device connections createa


circular data path. In a ring network, packets of data travel from one device tothe next
until they reach their destination. Most ring topologies allow packets to travel only in
one direction, called a unidirectional ring network. Others permit data to move in
either direction, called bidirectional.
 The major disadvantage of a ring topology is that if any individual connection in the ring
is broken, the entire network is affected.
 Ring topologies may be used in either local area networks (LANs) or wide area
networks (WANs).
Advantages
 Data transmission is relatively straightforward because packets only move in one
direction.
 There is no requirement for a central controller to manage communication
between nodes.
 Easy installation & Reconfiguration
 Simplified Faulty connections
Disadvantages
 In a Unidirectional Ring, a data packet must traverse through all nodes.
 All computers must be turned on in order for them to connect with one another.
Tree Topology:
Tree topology is a computer network topology in which all the nodes are directly or
indirectly connected to the main bus cable. Tree topology is a combination of Bus and
Star topology.

1
URVASHI NIRAV PATEL
5
In a tree topology, the whole network is divided into segments, which can be easily
managed and maintained. There is a main hub and all the other sub-hubs are connected to
each other in this topology.
Following are the advantages of Tree topology:
 Large distance network coverage.
 Fault finding is easy by checking each hierarchy.
 Least or no data loss.
 A Large number of nodes can be connected directly or indirectly.
 Other hierarchical networks are not affected if one of them fails.
Following are the disadvantages of Tree topology:
 Cabling and hardware cost is high.
 Complex to implement.

1.3 Terminologies (Intranet, Internet, Unicast, Broadcast, Multicast)


Internet:
 Internet is used to connect the different networks of computers simultaneously.
 It is a public network therefore anyone can access the internet. On the internet,
there are multiple users and it provides an unlimited of information to the users.
Intranet:
Intranet is the type of internet that is used privately.
 It is a private network therefore anyone can’t access the intranet.
 On the intranet, there is a limited number of users and it provides a piece of
limited information to its users.

1
URVASHI NIRAV PATEL
6
The difference between the internet and intranet:

S.NO Internet Intranet

Internet is used to connect


Intranet is owned by private
1. different networks of
firms.
computers simultaneously.

On the internet, there are On an intranet, there are


2.
multiple users. limited users.

3. Internet is unsafe. Intranet is safe.

On the internet, there is more In the intranet, there is less


4.
number of visitors. number of visitors.

5. Internet is a public network. Intranet is a private network.

Anyone can access the In this, anyone can’t access


6.
Internet. the Intranet.

The Internet provides unlimited Intranet provides limited


7.
information. information.

1
URVASHI NIRAV PATEL
7
S.NO Internet Intranet

A company used to
Using Social media on your
communicate internally with
8. phone or researching resources
its employees and share
via Google.
information

The Internet is a global An intranet is a private


network that connects millions network that connects
9.
of devices and computers devices and computers
worldwide. within an organization.

It is open to everyone and


An intranet is only accessible
allows access to public
10. to authorized users within
information, such as websites
the organization.
and online services.

It is used for communication, An intranet is primarily used


sharing of information, e- for internal communication,
11. commerce, education, collaboration, and
entertainment, and other information sharing within an
purposes. organization.

Access to an intranet is
Users can access the Internet
restricted to authorized users
from any location with an
12. within the organization and is
Internet connection and a
typically limited to specific
compatible device.
devices and locations.

Security measures, such as


Intranets employ similar
firewalls, encryption, and
security measures to protect
secure sockets layer (SSL)
13. against unauthorized access
protocols, are used to protect
and ensure the privacy and
against threats like hacking,
integrity of shared data.
viruses, and malware.

1
URVASHI NIRAV PATEL
8
S.NO Internet Intranet

The Internet is a public Intranets are private


network that is not owned by networks that are owned and
14.
any particular organization or managed by the organization
group. that uses them.

Examples of intranet-based
Examples of Internet-based
services include internal
services include email, social
15. communications, knowledge
media, search engines, and
management systems, and
online shopping sites.
collaboration tools

Unicast-
 Transmitting data from one source host to one destination host is called as unicast.
 It is a one to one transmission.

Example-
Host A having IP Address 11.1.2.3 sending data to host B having IP Address 20.12.4.2.
Here,
 Source Address = IP Address of host A = 11.1.2.3
 Destination Address = IP Address of host B = 20.12.4.2
2. Broadcast-
 Transmitting data from one source host to all other hosts residing in the same or other
network is called as broadcast.
 It is a one to all transmission.
Based on recipient’s network, it is classified as-

1. Limited Broadcast
2. Direct Broadcast
A. Limited Broadcast-
 Transmitting data from one source host to all other hosts residing in the same network is
called as limited broadcast.

1
URVASHI NIRAV PATEL
9
NOTE
Limited Broadcast Address for any network

= All 32 bits set to 1

= 11111111.11111111.11111111.11111111

= 255.255.255.255

Example-
Host A having IP Address 11.1.2.3 sending data to all other hosts residing in the same network.

Here,
 Source Address = IP Address of host A = 11.1.2.3
 Destination Address = 255.255.255.255

B. Direct Broadcast-
 Transmitting data from one source host to all other hosts residing in some other network
is called as direct broadcast.

NOTE
Direct Broadcast Address for any network is the IP Address where-

 Network ID is the IP Address of the network where all the destination hosts are present.
 Host ID bits are all set to 1.
Example-
Host A having IP Address 11.1.2.3 sending data to all other hosts residing in the network having
IP Address 20.0.0.0

Here,

 Source Address = IP Address of host A = 11.1.2.3


 Destination Address = 20.255.255.255

2
URVASHI NIRAV PATEL
0
Multicast-
 Transmitting data from one source host to a particular group of hosts having interest in
receiving the data is called as multicast.
 It is a one to many transmission.

Examples-
 Sending a message to a particular group of people on whatsapp
 Sending an email to a particular group of people
 Video conference or teleconference

Difference Between Unicast, Broadcast, and Multicast in Computer Network

Here is a list of the differences between Unicast, Broadcast, and Multicast in Computer
Network.

2
URVASHI NIRAV PATEL
1
Parameters Unicast Broadcast Multicast

Basics There is only one receiver There are multiple There are multiple
and one sender. receivers and one sender. receivers and multiple
senders.

Meaning and Unicast information transfer Broadcast data transfer Multiple senders and
Definition is helpful for transferring occurs when one sender recipients participate in
data from a single client to all transmits data to multiple the process of data
the recipients over the same recipients at any given transfer in Multicasting.
network. time.

Mapping It is a one-to-one type of It is a one-to-many type of It is a many-to-many


data transfer. data transfer. type of data transfer.

Uses It is very helpful when a Broadcasting is mainly These are helpful in the
single sender transmits data helpful for audio and video stock exchange,
to a single recipient. distribution by television multimedia delivery, etc.
networks.

2
URVASHI NIRAV PATEL
2

You might also like