Computer Network Notes Unit-1-1
Computer Network Notes Unit-1-1
Goal Of Networking:
Programs do not have to execute on a single system because of
resource and load sharing.
Reduced costs – Multiple machines can share printers, tape drives,
and other peripherals.
Reliability – If one machine fails, another can take its place.
Scalability (it’s simple to add more processors or computers)
Communication and mail (people living apart can work together)
Entertainment that is interactive (online games, videos, etc.)
Social Networking
Resource sharing-the main goal of the computer is resource
sharing.it is to create all the programs,data and hardware
accessible to anyone on the network.
Security
Security is one of the most essential characteristics of a computer network.
Most businesses nowadays rely on computers, which are accessed through
networking. As a result, if computer network technology is not robust and
secure, unauthorized access to the company's critical data might be possible.
However, nowadays, computer networking tools primarily provide the highest
level of security and prevent any unauthorized access.
Reliability
Computer networks are very reliable tools, and users can easily interconnect
their devices with their help. Computer networks have alternative sources of
supply to provide high reliability. Their networking experience remains
consistent even if users need to print, check messages, attend a meeting, or
access data from another computer.
Scalability
Scalability refers to the ability to scale up in response to changing needs
while maintaining high performance. The internet is the best example of
scalability; many new users connect via the internet and communicate with
other devices, but our network still works properly.
Flow of Data
Users can access and transmit data such as files, documents, and other types
of information with the help of computer networking. It is a crucial feature of a
computer network as it allows data to flow from one device to another.
High performance
The performance is evaluated using the time required by a command. If it
requires less time to transfer the data and the response is quick, it is a
significant advantage for the users to transfer data and use multiple
resources. The performance can be increased using multiple processors.
Fault tolerance
Fault tolerance is also a great feature offered by computer networks. Let’s
suppose two devices are connected with both wired and wireless mediums. If
the sender’s device sends the information, and the receiver’s device has a
blockage at its wireless medium. It will find the other best alternative medium
to send the information to the receiver’s device, which is a wired medium in
this case. Using this, they can continue to work even if the networking is down
or damaged. This is how fault tolerance works.
.
Easy sharing of files: The data you store on other devices can be shared with
other users easily.
Faster resources sharing: You can also save money by using networked
resources like printers, scanners, copiers, etc. or by sharing software among
multiple users.
Enhanced data reliability: There is no question that the information contained
in the central server is more reliable. It is also possible to access similar kinds
of data by using another computer if the information on one PC happens to be
lost for any reason. Thus, there are no disruptions in the office environment,
leading to a smooth operation.
Improved communication: Customers, suppliers and the staff can easily share
information and contact one another via email, chat or calls made over the
network.
Issues with Independent Usage: Because everything is centralized, the network lacks
independence. As a result, individual users cannot use the computer as they wish.
Malware Infection: Viruses or Malware can propagate easily between the connected
computers in a network. It is quite likely that malware will spread to the remaining computers if
one of the systems gets infected. However, this can be prevented by running regular malware
scans.
Health Issues: Since computer networks provide access to a variety of content such as
entertainment, games, and movies, this leads to an addictive dependence on the services and
overuse. The excessive amount of screen time can cause fatigue, eye strain, and body pain as
well as make you feel lethargic.
Poor Internet Accessibility: Despite the fact that most computers nowadays offer free access,
some countries still have connectivity issues. Connectivity challenges are particularly severe in
countries that are developing. It is impossible to guarantee a truly global network until these
challenges are overcome.
Not robust enough: In case a systems’ central linking server or bridging device fails, or if its
principal server detaches, the whole network is affected. However, you can use a large system as
a document server to resolve this issue.
Types of Networks
1. This is faster and highly reliable than other types of connections since
there is a direct connection.
1. The biggest drawback is that it only be used for small area where
computers are in close proximity.
o The bus topology is designed in such a way that all the stations are
connected through a single cable known as a backbone cable.
o Each node is either connected to the backbone cable by drop cable or
directly connected to the backbone cable.
o When a node wants to send a message over the network, it puts a
message over the network. All the stations available in the network will
receive the message whether it has been addressed or not.
o The bus topology is mainly used in 802.3 (ethernet) and 802.4 standard
networks.
o The configuration of a bus topology is quite simpler as compared to
other topologies.
o The backbone cable is considered as a "single lane" through which the
message is broadcast to all the stations.
Star Topology
o Star topology is an arrangement of the network in which every node is
connected to the central hub, switch or a central computer.
o The central computer is known as a server, and the peripheral devices
attached to the server are known as clients.
o Coaxial cable or RJ-45 cables are used to connect the computers.
o Hubs or Switches are mainly used as connection devices in a physical
star topology.
o Star topology is the most popular topology in network implementation.
o A Central point of failure: If the central hub or switch goes down, then
all the connected nodes will not be able to communicate with each
other.
o Cable: Sometimes cable routing becomes difficult when a significant
amount of routing is required.
Tree topology
Reliable: The mesh topology networks are very reliable as if any link
breakdown will not affect the communication between connected computers.
Disadvantages of PAN
Here are the cons/drawbacks of using PAN network:
Advantages of LAN
Here are the pros/benefits of LAN:
Disadvantages of LAN
Here are the cons/drawbacks of LAN:
The software files will be shared among all the users; therefore,
all can access to the latest files.
Any organization can form its global integrated network using
WAN.
Advantages of WAN
Here are the benefits/pros of WAN:
Disadvantages of WAN
Here are the drawbacks/cons of WAN network:
Advantages of MAN
Here are the pros/benefits of MAN network:
Disadvantages of MAN
Here are drawbacks/cons of using the MAN network:
OSI MODEL-
OSI stands for Open Systems Interconnection. It has been
developed by ISO – ‘International Organization for Standardization‘,
in the year 1984. It is a 7 layer architecture with each layer having
specific functionality to perform. All these 7 layers work collaboratively
to transmit the data from one person to another across the globe.
TCP/IP Model
the TCP/IP model, it was designed and developed by Department of
Defense (DoD) in 1960s and is based on standard protocols. It stands
for Transmission Control Protocol/Internet Protocol. The TCP/IP
model is a concise version of the OSI model. It contains four layers,
unlike seven layers in the OSI model. The layers are:
1. Process/Application Layer
2. Host-to-Host/Transport Layer
3. Internet Layer
4. Network Access/Link Layer
The diagrammatic comparison of the TCP/IP and OSI model is as
follows :
2. Internet Layer –
This layer parallels the functions of OSI’s Network layer. It defines the
protocols which are responsible for logical transmission of data over
the entire network. The main protocols residing at this layer are :
1. IP – stands for Internet Protocol and it is responsible for delivering
packets from the source host to the destination host by looking at
the IP addresses in the packet headers. IP has 2 versions:
IPv4 and IPv6. IPv4 is the one that most of the websites are using
currently. But IPv6 is growing as the number of IPv4 addresses are
limited in number when compared to the number of users.
2. ICMP – stands for Internet Control Message Protocol. It is
encapsulated within IP datagrams and is responsible for providing
hosts with information about network problems.
3. ARP – stands for Address Resolution Protocol. Its job is to find the
hardware address of a host from a known IP address. ARP has
several types: Reverse ARP, Proxy ARP, Gratuitous ARP and
Inverse ARP.
At the receiving end, TCP collects all the segments and reorders them
based on sequence numbers.
This layer performs the functions of top three layers of the OSI model:
Application, Presentation and Session Layer. It is responsible for node-
to-node communication and controls user-interface specifications.
o An application layer is the topmost layer in the TCP/IP model.
o It is responsible for handling high-level protocols, issues of
representation.
o This layer allows the user to interact with the application.
o When one application layer protocol wants to communicate with
another application layer, it forwards its data to the transport layer.
Some of the protocols present in this layer are: HTTP, HTTPS, FTP,
TFTP, Telnet, SSH, SMTP, SNMP, NTP, DNS, DHCP, NFS, X
Window, LPD. Have a look at Protocols in Application Layer for some
information about these protocols. Protocols other than those present
in the linked article are :
1. HTTP and HTTPS – HTTP stands for Hypertext transfer protocol. It
is used by the World Wide Web to manage communications
between web browsers and servers. HTTPS stands for HTTP-
Secure. It is a combination of HTTP with SSL(Secure Socket
Layer). It is efficient in cases where the browser need to fill out
forms, sign in, authenticate and carry out bank transactions.
2. SSH – SSH stands for Secure Shell. It is a terminal emulations
software similar to Telnet. The reason SSH is more preferred is
because of its ability to maintain the encrypted connection. It sets
up a secure session over a TCP/IP connection.
3. NTP – NTP stands for Network Time Protocol. It is used to
synchronize the clocks on our computer to one standard time
source. It is very useful in situations like bank transactions. Assume
the following situation without the presence of NTP. Suppose you
carry out a transaction, where your computer reads the time at 2:30
PM while the server records it at 2:28 PM. The server can crash
very badly if it’s out of sync.
o DNS: DNS stands for Domain Name System. An IP address is used to
identify the connection of a host to the internet uniquely. But, people
prefer to use the names instead of addresses. Therefore, the system that
maps the name to the address is known as Domain Name System.
o TELNET: It is an abbreviation for Terminal Network. It establishes the
connection between the local computer and remote computer in such a
way that the local terminal appears to be a terminal at the remote
system.
o FTP: FTP stands for File Transfer Protocol. FTP is a standard internet
protocol used for transmitting the files from one computer to another
computer.
network transmission.
There is no sequencing
Sequencing of data is a feature of of data in UDP. If the
Transmission Control Protocol order is required, it has
(TCP). this means that packets to be managed by the
Sequence arrive in order at the receiver. application layer.
(UDP).
It’s a connectionless
Handshaking Uses handshakes such as SYN, protocol i.e. No
Techniques ACK, SYN-ACK handshake
UDP supports
Broadcasting TCP doesn’t support Broadcasting. Broadcasting.
UDP is used
by DNS, DHCP,
TCP is used by HTTP, TFTP, SNMP, RIP,
Protocols HTTPs, FTP, SMTP and Telnet. and VoIP.