Introduction To Computer Networks
Introduction To Computer Networks
Modern world scenario is ever changing. Data Communication and network have changed
the way business and other daily affair works. Now, they highly rely on computer networks
and internetwork.
A set of devices often mentioned as nodes connected by media link is called a Network.
A node can be a device which is capable of sending or receiving data generated by other
nodes on the network like a computer, printer etc. These links connecting the devices are
called Communication channels.
Computer network is a telecommunication channel using which we can share data with
other coomputers or devices, connected to the same network. It is also called Data
Network. The best example of computer network is Internet.
Computer network does not mean a system with one Control Unit connected to multiple
other systems as its slave. That is Distributed system, not Computer Network.
A network must be able to meet certain criterias, these are mentioned below:
1. Performance
2. Reliability
3. Scalability
Transit time : It is the time taken to travel a message from one device to another.
Response time : It is defined as the time elapsed between enquiry and response.
1. Efficiency of software
2. Number of users
3. Capability of connected hardwar
Computer Networks: Reliability
It decides the frequency at which network failure take place. More the failures are, less is
the network's reliability.
Data Communication
The exchange of data between two devices through a transmission medium is called Data
Communication. The data is exchanged in the form of 0's and 1's. The transmission
medium used is wire cable. For data communication to occur, the communication device
must be a part of a communication system. Data Communication has two types -
Local and Remote which are discussed below:
Data Communication: Local
Local communication takes place when the communicating devices are in the same
geographical area, same building, or face-to-face etc.
1. Point-to-Point connection
2. Multipoint connection
Point-To-Point Connection
It is a protocol which is used as a communication link between two devices. It is simple to
establish. The most common example for Point-to-Point connection (PPP) is a computer
connected by telephone line. We can connect the two devices by means of a pair of wires or
using a microwave or satellite link.
Example: Point-to-Point connection between remote control and Television for changing
the channels.
MultiPoint Connection
It is also called Multidrop configuration. In this connection two or more devices share a
single link.
There are two kinds of Multipoint Connections :
If the links are used simultaneously between many devices, then it is spatially shared
line configuration.
If user takes turns while using the link, then it is time shared (temporal) line
configuration.
1. It is cost effective.
2. Cable required is least compared to other network topology.
4. It is easy to understand.
1. A number of repeaters are used for Ring topology with large number of nodes, because if
someone wants to send some data to the last node in the ring topology with 100 nodes, then
the data will have to pass through 99 nodes to reach the 100th node. Hence to prevent data
3. In Dual Ring Topology, two ring networks are formed, and data flow is in opposite
direction in them. Also, if one ring fails, the second ring can act as a backup, to keep the
network up.
4. Data is transferred in a sequential manner that is bit by bit. Data transmitted, has to pass
1. Transmitting network is not affected by high traffic or by adding more nodes, as only the
nodes having tokens can transmit data.
STAR Topology
In this type of topology all the computers are connected to a single hub through a cable.
This hub is the central node and all others nodes are connected to the central node.
Features of Star Topology
3. Easy to troubleshoot.
5. Only that node is affected which has failed, rest of the nodes can work smoothly.
3. If the hub fails then the whole network is stopped because all the nodes depend on the hub.
MESH Topology
It is a point-to-point connection to other nodes or devices. All the network nodes are
connected to each other. Mesh has n(n-1)/2 physical channels to link n devices.
There are two techniques to transmit data over the Mesh topology, they are :
1. Routing
2. Flooding
MESH Topology: Routing
In routing, the nodes have a routing logic, as per the network requirements. Like routing
logic to direct the data to reach the destination using the shortest distance. Or, routing logic
which has information about the broken links, and it avoids those node etc. We can even
have routing logic, to re-configure the failed nodes.
1. Partial Mesh Topology : In this topology some of the systems are connected in the same
fashion as mesh topology but some devices are only connected to two or three devices.
2. Full Mesh Topology : Each and every nodes or devices are connected to each other.
1. Fully connected.
2. Robust.
3. Not flexible.
Advantages of Mesh Topology
TREE Topology
It has a root node and all other nodes are connected to it forming a hierarchy. It is also
called hierarchical topology. It should at least have three levels to the hierarchy.
1. Heavily cabled.
2. Costly.
HYBRID Topology
It is two different types of topologies which is a mixture of two or more topologies. For
example if in an office in one department ring topology is used and in another star topology
is used, connecting these topologies will result in Hybrid Topology (ring topology and star
topology).
Features of Hybrid Topology
4. Flexible.
1. Complex in design.
2. Costly.
1. Simplex Mode
2. Half duplex Mode
3. Full duplex Mode
SIMPLEX Mode
In this type of transmission mode, data can be sent only in one direction i.e. communication
is unidirectional. We cannot send a message back to the sender. Unidirectional
communication is done in Simplex Systems where we just need to send a command/signal,
and do not expect any response back.
Examples of simplex Mode are loudspeakers, television broadcasting, television and
remote, keyboard and monitor etc.
In full duplex system there can be two lines one for sending the data and the other for
receiving data.
LAN's are private networks, not subject to tariffs or other regulatory controls.
LAN's operate at relatively high speed when compared to the typical WAN.
There are different types of Media Access Control methods in a LAN, the prominent
ones are Ethernet, Token ring.
It connects computers in a single building, block or campus, i.e. they work in a
restricted geographical area.
Applications of LAN
One of the computer in a network can become a server serving all the remaining
computers called clients. Software can be stored on the server and it can be used by
the remaining clients.
Connecting Locally all the workstations in a building to let them communicate with
each other locally without any internet access.
Sharing common resources like printers etc are some common applications of LAN.
Advantages of LAN
Disadvantages of LAN
High Setup Cost: Although the LAN will save cost over time due to shared computer
resources, but the initial setup costs of installing Local Area Networks is high.
Privacy Violations: The LAN administrator has the rights to check personal data
files of each and every LAN user. Moreover he can check the internet history and
computer use history of the LAN user.
Data Security Threat: Unauthorised users can access important data of an
organization if centralized data repository is not secured properly by the LAN
administrator.
LAN Maintenance Job: Local Area Network requires a LAN Administrator
because, there are problems of software installations or hardware failures or cable
disturbances in Local Area Network. A LAN Administrator is needed at this full
time job.
Covers Limited Area: Local Area Network covers a small area like one office, one
building or a group of nearby buildings.
Metropolitan Area Network (MAN)
It was developed in 1980s.It is basically a bigger version of LAN. It is also called MAN and
uses the similar technology as LAN. It is designed to extend over the entire city. It can be
means to connecting a number of LANs into a larger network or it can be a single cable. It
is mainly hold and operated by single private company or a public company.
Characteristics of MAN
Advantages of MAN
Extremely efficient and provide fast communication via high-speed carriers, such as
fibre optic cables.
It provides a good back bone for large network and provides greater access to
WANs.
The dual bus used in MAN helps the transmission of data in both directions
simultaneously.
A MAN usually encompasses several blocks of a city or an entire city.
Disadvantages of MAN
More cable required for a MAN connection from one place to another.
It is difficult to make the system secure from hackers and industrial
espionage(spying) graphical regions.
Advantages of WAN
Covers a large geographical area so long distance business can connect on the one
network.
Shares software and resources with connecting workstations.
Messages can be sent very quickly to anyone else on the network. These messages
can have picture, sounds or data included with them(called attachments).
Expensive things(such as printers or phone lines to the internet) can be shared by all
the computers on the network without having to buy a different peripheral for each
computer.
Everyone on the network can use the same data. This avoids problems where some
users may have older information than others.
Disadvantages of WAN
Need a good firewall to restrict outsiders from entering and disrupting the network.
Setting up a network can be an expensive, slow and complicated. The bigger the
network the more expensive it is.
Once set up, maintaining a network is a full-time job which requires network
supervisors and technicians to be employed.
Security is a real issue when many different people have the ability to use
information from other computers. Protection against hackers and viruses adds
more complexity and expense.
Wireless Network
Digital wireless communication is not a new idea. Earlier, Morse code was used to
implement wireless networks. Modern digital wireless systems have better performance,
but the basic idea is the same.
Wireless Networks can be divided into three main categories:
1. System interconnection
2. Wireless LANs
3. Wireless WANs
System Interconnection
System interconnection is all about interconnecting the components of a computer
using short-range radio. Some companies got together to design a short-range wireless
network called Bluetooth to connect various components such as monitor, keyboard, mouse
and printer, to the main unit, without wires. Bluetooth also allows digital cameras,
headsets, scanners and other devices to connect to a computer by merely being brought
within range.
In simplest form, system interconnection networks use the master-slave concept. The
system unit is normally the master, talking to the mouse, keyboard, etc. as slaves.
Wireless LANs
These are the systems in which every computer has a radio modem and antenna with which
it can communicate with other systems. Wireless LANs are becoming increasingly common
in small offices and homes, where installing Ethernet is considered too much trouble. There
is a standard for wireless LANs called IEEE 802.11, which most systems implement and
which is becoming very widespread.
Wireless WANs
The radio network used for cellular telephones is an example of a low-bandwidth wireless
WAN. This system has already gone through three generations.
2. Connectionless Services
1. Connection is established.
2. Information is sent.
3. Connection is released.
2. Connection oriented protocol makes a connection and checks whether message is received
or not and sends again if an error occurs, while connectionless service protocol does not
4. Connection oriented service interface is stream based and connectionless is message based.
1. LISTEN : When a server is ready to accept an incoming connection it executes the LISTEN
4. SEND : Then the client executes SEND primitive to transmit its request followed by the
5. DISCONNECT : This primitive is used for terminating the connection. After this primitive
one can't send any message. When the client sends DISCONNECT packet then the server
also sends the DISCONNECT packet to acknowledge the client. When the server package is
FACILITY, Primitive for enquiring about the performance of the network, like
REPORT delivery statistics.
Relationship of Services to Protocol
In this section we will learn about how services and protocols are related and why they are
so important for each other.
1. Application Layer
2. Presentation Layer
3. Session Layer
4. Transport Layer
5. Network Layer
6. Datalink Layer
7. Physical Layer
Below we have the complete representation of the OSI model, showcasing all the layers and
how they communicate with each other.
In the table below, we have specified the protocols used and the data unit exchanged by
each layer of the OSI Model.
Feature of OSI Model
1. Big picture of communication over network is understandable through this OSI
model.
2. We see how hardware and software work together.
3. We can understand new technologies as they are developed.
4. Troubleshooting is easier by separate networks.
5. Can be used to compare basic functional relationships on different networks.
1. Data link layer synchronizes the information which is to be transmitted over the
physical layer.
2. The main function of this layer is to make sure data transfer is error free from one
node to another, over the physical layer.
3. Transmitting and receiving data frames sequentially is managed by this layer.
4. This layer sends and expects acknowledgements for frames received and sent
respectively. Resending of non-acknowledgement received frames is also handled by
this layer.
5. This layer establishes a logical layer between two nodes and also manages the Frame
traffic control over the network. It signals the transmitting node to stop, when the
frame buffers are full.
1. Network Layer routes the signal through different channels from one node to other.
2. It acts as a network controller. It manages the Subnet traffic.
3. It decides by which route data should take.
4. It divides the outgoing messages into packets and assembles the incoming packets
into messages for higher levels.
Transport layer breaks the message (data) into small units so that they are handled more
efficiently by the network layer.
OSI Model Layer 5: The Session Layer
1. Session Layer manages and synchronize the conversation between two different
applications.
2. Transfer of data from source to destination session layer streams of data are
marked and are resynchronized properly, so that the ends of the messages are not
cut prematurely and data loss is avoided.
1. Presentation Layer takes care that the data is sent in such a way that the receiver
will understand the information (data) and will be able to use the data.
2. While receiving the data, presentation layer transforms the data to be ready for the
application layer.
3. Languages(syntax) can be different of the two communicating systems. Under this
condition presentation layer plays a role of translator.
4. It perfroms Data compression, Data encryption, Data conversion etc.
← Prev
Next →
Introduction to TCP/IP Reference Model
TCP/IP is transmission control protocol and internet protocol. Protocols are set of rules
which govern every possible communication over the internet. These protocols describe the
movement of data between the host computers or internet and offers simple naming and
addressing schemes.
TCP/IP Reference model is explained in details other chapter.
Support for a flexible architecture. Adding more machines to a network was easy.
The network was robust, and connections remained intact untill the source and
destination machines were functioning.
The overall idea was to allow one application on one computer to talk to(send data packets)
another application running on different computer.
Demerits of TCP/IP
1. In this, the transport layer does not guarantee delivery of packets.
2. The model cannot be used in any other application.
3. Replacing protocol is not easy.
4. It has not clearly separated its services, interfaces and protocols.
Comparison of OSI and TCP/IP
Reference Model
Now it's time to compare both the reference model that we have learned till now. Let's start
by addressing the similarities that both of these models have.
Following are some similarities between OSI Reference Model and TCP/IP Reference
Model.
2. In OSI model the transport layer 2. In TCP/IP model the transport layer does not
guarantees the delivery of packets. guarantees delivery of packets. Still the TCP/IP
model is more reliable.
8. Network layer of OSI model 8. The Network layer in TCP/IP model provides
provides both connection oriented and connectionless service.
connectionless service.
9. OSI model has a problem of fitting 9. TCP/IP model does not fit any protocol
the protocols into the model.
10. Protocols are hidden in OSI model 10. In TCP/IP replacing protocol is not easy.
and are easily replaced as the
technology changes.
11. OSI model defines services, 11. In TCP/IP, services, interfaces and protocols
interfaces and protocols very clearly are not clearly separated. It is also protocol
and makes clear distinction between dependent.
them. It is protocol independent.