Computer Networks
Computer Networks
This tutorial should teach you basics of Data Communication and Computer
Network (DCN) and will also take you through various advance concepts
related to Data Communication and Computer Network.
Network Engineering
Networking engineering is a complicated task, which involves software,
firmware, chip level engineering, hardware, and electric pulses. To ease
network engineering, the whole networking concept is divided into multiple
layers. Each layer is involved in some particular task and is independent of
all other layers. But as a whole, almost all networking tasks depend on all of
these layers. Layers share data between them and they depend on each
other only to take input and send output.
Internet
A network of networks is called an internetwork, or simply the internet. It is
the largest network in existence on this planet.The internet hugely connects
all WANs and it can have connection to LANs and Home networks. Internet
uses TCP/IP protocol suite and uses IP as its addressing protocol. Present
day, Internet is widely implemented using IPv4. Because of shortage of
address spaces, it is gradually migrating from IPv4 to IPv6.
Audience
This tutorial has been prepared for the computer science graduates to help
them understand the basic to advanced concepts related to Data
Communication and Computer Networking. After completing this tutorial you
will find yourself at a moderate level of expertise in Data Communication and
Computer Networking from where you can take yourself to next levels.
Prerequisites
Before you start proceeding with this tutorial, I'm making an assumption that
you are already aware about basic computer concepts like what is keyboard,
mouse, monitor, input, output, primary memory and secondary memory etc.
If you are not well aware of these concepts then I will suggest to go through
our short tutorial on Computer fundementals
What is a Computer Network?
A computer network is a collection of computing devices that are connected
with each other for the purpose of information and resource sharing among a
wide variety of users.
Geographical span
Inter-connectivity
Administration
Architecture
Geographical Span
Geographically a network can be seen in one of the following categories:
Inter-Connectivity
Components of a network can be connected to each other differently in some
fashion. By connectedness we mean either logically , physically , or both
ways.
Administration
From an administrator’s point of view, a network can be private network
which belongs a single autonomous system and cannot be accessed outside
its physical or logical domain.A network can be public which is accessed by
all.
Network Architecture
Computer networks can be discriminated into various types such as
Client-Server,peer-to-peer or hybrid, depending upon its architecture.
There can be one or more systems acting as Server. Other being Client,
requests the Server to serve requests.Server takes and processes
request on behalf of Clients.
Two systems can be connected Point-to-Point, or in back-to-back
fashion. They both reside at the same level and called peers.
There can be hybrid network which involves network architecture of both
the above types.
Network Applications
Computer systems and peripherals are connected to form a network.They
provide numerous advantages:
Resource sharing such as printers and storage devices
Exchange of information by means of e-Mails and FTP
Information sharing by using Web or Internet
Interaction with other users using dynamic web pages
IP phones
Video conferences
Parallel computing
Instant messaging
Computer Network Types
Previous
Next
LAN provides a useful way of sharing the resources between end users.The
resources such as printers, file servers, scanners, and internet are easily
sharable among computers.
Internetwork
A network of networks is called an internetwork, or simply the internet. It is
the largest network in existence on this planet.The internet hugely connects
all WANs and it can have connection to LANs and Home networks. Internet
uses TCP/IP protocol suite and uses IP as its addressing protocol. Present
day, Internet is widely implemented using IPv4. Because of shortage of
address spaces, it is gradually migrating from IPv4 to IPv6.
Internet is widely deployed on World Wide Web services using HTML linked
pages and is accessible by client software known as Web Browsers. When a
user requests a page using some web browser located on some Web Server
anywhere in the world, the Web Server responds with the proper HTML page.
The communication delay is very low.
Web sites
E-mail
Instant Messaging
Blogging
Social Media
Marketing
Networking
Resource Sharing
Audio and Video Streaming
Ethernet
Ethernet is a widely deployed LAN technology.This technology was invented
by Bob Metcalfe and D.R. Boggs in the year 1970. It was standardized in
IEEE 802.3 in 1980.
Ethernet shares media. Network which uses shared media has high
probability of data collision. Ethernet uses Carrier Sense Multi
Access/Collision Detection (CSMA/CD) technology to detect collisions. On the
occurrence of collision in Ethernet, all its hosts roll back, wait for some
random amount of time, and then re-transmit the data.
Fast-Ethernet
To encompass need of fast emerging software and hardware technologies,
Ethernet extends itself as Fast-Ethernet. It can run on UTP, Optical Fiber, and
wirelessly too. It can provide speed up to 100 MBPS. This standard is named
as 100BASE-T in IEEE 803.2 using Cat-5 twisted pair cable. It uses CSMA/CD
technique for wired media sharing among the Ethernet hosts and CSMA/CA
(CA stands for Collision Avoidance) technique for wireless Ethernet LAN.
Giga-Ethernet
After being introduced in 1995, Fast-Ethernet could enjoy its high speed
status only for 3 years till Giga-Ethernet introduced. Giga-Ethernet provides
speed up to 1000 mbits/seconds. IEEE802.3ab standardize Giga-Ethernet
over UTP using Cat-5, Cat-5e and Cat-6 cables. IEEE802.3ah defines Giga-
Ethernet over Fiber.
Virtual LAN
LAN uses Ethernet which in turn works on shared media. Shared media in
Ethernet create one single Broadcast domain and one single Collision
domain. Introduction of switches to Ethernet has removed single collision
domain issue and each device connected to switch works in its separate
collision domain. But even Switches cannot divide a network into separate
Broadcast domains.
Next
If the hosts are connected point-to-point logically, then may have multiple
intermediate devices. But the end hosts are unaware of underlying network
and see each other as if they are connected directly.
Bus Topology
In case of Bus topology, all devices share single communication line or
cable.Bus topology may have problem while multiple hosts sending data at
the same time. Therefore, Bus topology either uses CSMA/CD technology or
recognizes one host as Bus Master to solve the issue. It is one of the simple
forms of networking where a failure of a device does not affect the other
devices. But failure of the shared communication line can make all other
devices stop functioning.
Both ends of the shared channel have line terminator. The data is sent in
only one direction and as soon as it reaches the extreme end, the terminator
removes the data from the line.
Star Topology
All hosts in Star topology are connected to a central device, known as hub
device, using a point-to-point connection. That is, there exists a point to
point connection between hosts and hub. The hub device can be any of the
following:
Ring Topology
In ring topology, each host machine connects to exactly two other machines,
creating a circular network structure. When one host tries to communicate or
send message to a host which is not adjacent to it, the data travels through
all intermediate hosts. To connect one more host in the existing structure,
the administrator may need only one more extra cable.
Failure of any host results in failure of the whole ring.Thus, every connection
in the ring is a point of failure. There are methods which employ one more
backup ring.
Mesh Topology
In this type of topology, a host is connected to one or multiple hosts.This
topology has hosts in point-to-point connection with every other host or may
also have hosts which are in point-to-point connection to few hosts only.
Hosts in Mesh topology also work as relay for other hosts which do not have
direct point-to-point links. Mesh technology comes into two types:
Full Mesh: All hosts have a point-to-point connection to every other host
in the network. Thus for every new host n(n-1)/2 connections are
required. It provides the most reliable network structure among all
network topologies.
Partially Mesh: Not all hosts have point-to-point connection to every other
host. Hosts connect to each other in some arbitrarily fashion. This
topology exists where we need to provide reliability to some hosts out
of all.
Tree Topology
Also known as Hierarchical Topology, this is the most common form of
network topology in use presently.This topology imitates as extended Star
topology and inherits properties of bus topology.
Daisy Chain
This topology connects all the hosts in a linear fashion. Similar to Ring
topology, all hosts are connected to two hosts only, except the end
hosts.Means, if the end hosts in daisy chain are connected then it represents
Ring topology.
Each link in daisy chain topology represents single point of failure. Every link
failure splits the network into two segments.Every intermediate host works
as relay for its immediate hosts.
Hybrid Topology
A network structure whose design contains more than one topology is said to
be hybrid topology. Hybrid topology inherits merits and demerits of all the
incorporating topologies.
The above picture represents an arbitrarily hybrid topology. The combining
topologies may contain attributes of Star, Ring, Bus, and Daisy-chain
topologies. Most WANs are connected by means of Dual-Ring topology and
networks connected to them are mostly Star topology networks. Internet is
the best example of largest Hybrid topology
Next
Layered Tasks
In layered architecture of Network Model, one whole network process is
divided into small tasks. Each small task is then assigned to a particular layer
which works dedicatedly to process the task only. Every layer does only
specific work.
In layered communication system, one layer of a host deals with the task
done by or to be done by its peer layer at the same level on the remote host.
The task is either initiated by layer at the lowest level or at the top most
level. If the task is initiated by the-top most layer, it is passed on to the
layer below it for further processing. The lower layer does the same thing, it
processes the task and passes on to lower layer. If the task is initiated by
lower most layer, then the reverse path is taken.
Every layer clubs together all procedures, protocols, and methods which it
requires to execute its piece of task. All layers identify their counterparts by
means of encapsulation header and tail.
OSI Model
Open System Interconnect is an open standard for all communication
systems. OSI model is established by International Standard Organization
(ISO). This model has seven layers:
Application Layer: This layer is responsible for providing interface to the
application user. This layer encompasses protocols which directly
interact with the user.
Presentation Layer: This layer defines how data in the native format of
remote host should be presented in the native format of host.
Session Layer: This layer maintains sessions between remote hosts. For
example, once user/password authentication is done, the remote host
maintains this session for a while and does not ask for authentication
again in that time span.
Transport Layer: This layer is responsible for end-to-end delivery between
hosts.
Network Layer: This layer is responsible for address assignment and
uniquely addressing hosts in a network.
Data Link Layer: This layer is responsible for reading and writing data
from and onto the line. Link errors are detected at this layer.
Physical Layer: This layer defines the hardware, cabling wiring, power
output, pulse rate etc.
Internet Model
Internet uses TCP/IP protocol suite, also known as Internet suite. This
defines Internet Model which contains four layered architecture. OSI Model is
general communication model but Internet Model is what the internet uses
for all its communication.The internet is independent of its underlying
network architecture so is its Model. This model has the following layers:
Application Layer: This layer defines the protocol which enables user to
interact with the network.For example, FTP, HTTP etc.
Transport Layer: This layer defines how data should flow between hosts.
Major protocol at this layer is Transmission Control Protocol (TCP). This
layer ensures data delivered between hosts is in-order and is responsible
for end-to-end delivery.
Internet Layer: Internet Protocol (IP) works on this layer. This layer
facilitates host addressing and recognition. This layer defines routing.
Link Layer: This layer provides mechanism of sending and receiving
actual data.Unlike its OSI Model counterpart, this layer is independent
of underlying network architecture and hardware.
Next
During initial days of internet, its use was limited to military and universities
for research and development purpose. Later when all networks merged
together and formed internet, the data useds to travel through public transit
network.Common people may send the data that can be highly sensitive such
as their bank credentials, username and passwords, personal documents,
online shopping details, or confidential documents.
All security threats are intentional i.e. they occur only if intentionally
triggered. Security threats can be divided into the following categories:
Interruption
Interruption is a security threat in which availability of resources is
attacked. For example, a user is unable to access its web-server or the
web-server is hijacked.
Privacy-Breach
In this threat, the privacy of a user is compromised. Someone, who is
not the authorized person is accessing or intercepting data sent or
received by the original authenticated user.
Integrity
This type of threat includes any alteration or modification in the original
context of communication. The attacker intercepts and receives the data
sent by the sender and the attacker then either modifies or generates
false data and sends to the receiver. The receiver receives the data
assuming that it is being sent by the original Sender.
Authenticity
This threat occurs when an attacker or a security violator, poses as a
genuine person and accesses the resources or communicates with other
genuine users.
No technique in the present world can provide 100% security. But steps can
be taken to secure data while it travels in unsecured network or internet. The
most widely used technique is Cryptography.
Secret Key
Public Key
Message Digest
Next
Physical layer provides its services to Data-link layer. Data-link layer hands
over frames to physical layer. Physical layer converts them to electrical
pulses, which represent binary data.The binary data is then sent over the
wired or wireless media.
Signals
When data is sent over physical medium, it needs to be first converted into
electromagnetic signals. Data itself can be analog such as human voice, or
digital such as file on the disk.Both analog and digital data can be
represented in digital or analog signals.
Digital Signals
Digital signals are discrete in nature and represent sequence of voltage
pulses. Digital signals are used within the circuitry of a computer system.
Analog Signals
Analog signals are in continuous wave form in nature and represented
by continuous electromagnetic waves.
Transmission Impairment
When signals travel through the medium they tend to deteriorate. This may
have many reasons as given:
Attenuation
For the receiver to interpret the data accurately, the signal must be
sufficiently strong.When the signal passes through the medium, it tends
to get weaker.As it covers distance, it loses strength.
Dispersion
As signal travels through the media, it tends to spread and overlaps. The
amount of dispersion depends upon the frequency used.
Delay distortion
Signals are sent over media with pre-defined speed and frequency. If
the signal speed and frequency do not match, there are possibilities that
signal reaches destination in arbitrary fashion. In digital media, this is
very critical that some bits reach earlier than the previously sent ones.
Noise
Random disturbance or fluctuation in analog or digital signal is said to
be Noise in signal, which may distort the actual information being
carried. Noise can be characterized in one of the following class:
o Thermal Noise
Heat agitates the electronic conductors of a medium which may
introduce noise in the media. Up to a certain level, thermal noise
is unavoidable.
o Intermodulation
When multiple frequencies share a medium, their interference can
cause noise in the medium. Intermodulation noise occurs if two
different frequencies are sharing a medium and one of them has
excessive strength or the component itself is not functioning
properly, then the resultant frequency may not be delivered as
expected.
o Crosstalk
This sort of noise happens when a foreign signal enters into the
media. This is because signal in one medium affects the signal of
second medium.
o Impulse
This noise is introduced because of irregular disturbances such as
lightening, electricity, short-circuit, or faulty components. Digital
data is mostly affected by this sort of noise.
Transmission Media
The media over which the information between two computer systems is
sent, called transmission media. Transmission media comes in two forms.
Guided Media
All communication wires/cables are guided media, such as UTP, coaxial
cables, and fiber Optics. In this media, the sender and receiver are
directly connected and the information is send (guided) through it.
Unguided Media
Wireless or open air space is said to be unguided media, because there
is no connectivity between the sender and receiver. Information is
spread over the air, and anyone including the actual recipient may
collect the information.
Channel Capacity
The speed of transmission of information is said to be the channel capacity.
We count it as data rate in digital world. It depends on numerous factors
such as:
Multiplexing
Multiplexing is a technique to mix and send multiple data streams over a
single medium. This technique requires system hardware called multiplexer
(MUX) for multiplexing the streams and sending them on a medium, and de-
multiplexer (DMUX) which takes information from the medium and
distributes to different destinations.
Switching
Switching is a mechanism by which data/information sent from source
towards destination which are not directly connected. Networks have
interconnecting devices, which receives data from directly connected
sources, stores data, analyze it and then forwards to the next
interconnecting device closest to the destination.
Previous
Next
Data or information can be stored in two ways, analog and digital. For a
computer to use the data, it must be in discrete digital form.Similar to data,
signals can also be in analog and digital form. To transmit data digitally, it
needs to be first converted to digital form.
Digital-to-Digital Conversion
This section explains how to convert digital data into digital signals. It can be
done in two ways, line coding and block coding. For all communications, line
coding is necessary whereas block coding is optional.
Line Coding
The process for converting digital data into digital signal is said to be Line
Coding. Digital data is found in binary format.It is represented (stored)
internally as series of 1s and 0s.
Uni-polar Encoding
Unipolar encoding schemes use single voltage level to represent data. In this
case, to represent binary 1, high voltage is transmitted and to represent 0,
no voltage is transmitted. It is also called Unipolar-Non-return-to-zero,
because there is no rest condition i.e. it either represents 1 or 0.
Polar Encoding
Polar encoding scheme uses multiple voltage levels to represent binary
values. Polar encodings is available in four types:
Bipolar Encoding
Bipolar encoding uses three voltage levels, positive, negative and zero. Zero
voltage represents binary 0 and bit 1 is represented by altering positive and
negative voltages.
Block Coding
To ensure accuracy of the received data frame redundant bits are used. For
example, in even-parity, one parity bit is added to make the count of 1s in
the frame even. This way the original number of bits is increased. It is called
Block Coding.
Division,
Substitution
Combination.
Analog-to-Digital Conversion
Microphones create analog voice and camera creates analog videos, which
are treated is analog data. To transmit this analog data over digital signals,
we need analog to digital conversion.
Analog data is a continuous stream of data in the wave form whereas digital
data is discrete. To convert analog wave into digital data, we use Pulse Code
Modulation (PCM).
PCM is one of the most commonly used method to convert analog data into
digital form. It involves three steps:
Sampling
Quantization
Encoding.
Sampling
Quantization
Encoding
Parallel Transmission
The binary bits are organized in-to groups of fixed length. Both sender and
receiver are connected in parallel with the equal number of data lines. Both
computers distinguish between high order and low order data lines. The
sender sends all the bits at once on all lines.Because the data lines are equal
to the number of bits in a group or data frame, a complete group of bits
(data frame) is sent in one go. Advantage of Parallel transmission is high
speed and disadvantage is the cost of wires, as it is equal to the number of
bits sent in parallel.
Serial Transmission
In serial transmission, bits are sent one after another in a queue manner.
Serial transmission requires only one communication channel.
Serial transmission can be either asynchronous or synchronous.
Analog Transmission
Previous
Next
To send the digital data over an analog media, it needs to be converted into
analog signal.There can be two cases according to data formatting.
Digital-to-Analog Conversion
When data from one computer is sent to another via some analog carrier, it
is first converted into analog signals. Analog signals are modified to reflect
digital data.
Analog-to-Analog Conversion
Analog signals are modified to represent analog data. This conversion is also
known as Analog Modulation. Analog modulation is required when bandpass
is used. Analog to analog conversion can be done in three ways:
Amplitude Modulation
In this modulation, the amplitude of the carrier signal is modified to
reflect the analog data.
Amplitude modulation is implemented by means of a multiplier. The
amplitude of modulating signal (analog data) is multiplied by the
amplitude of carrier frequency, which then reflects analog data.
The frequency and phase of carrier signal remain unchanged.
Frequency Modulation
In this modulation technique, the frequency of the carrier signal is
modified to reflect the change in the voltage levels of the modulating
signal (analog data).
The amplitude and phase of the carrier signal are not altered.
Phase Modulation
In the modulation technique, the phase of carrier signal is modulated in
order to reflect the change in voltage (amplitude) of analog data signal.
Phase modulation is practically similar to Frequency Modulation, but in
Phase modulation frequency of the carrier signal is not increased.
Frequency of carrier is signal is changed (made dense and sparse) to
reflect voltage change in the amplitude of modulating signal.
Previous
Next
The transmission media is nothing but the physical media over which communication takes
place in computer networks.
Magnetic Media
One of the most convenient way to transfer data from one computer to another, even before
the birth of networking, was to save it on some storage media and transfer physical from one
station to another. Though it may seem old-fashion way in today’s world of high speed
internet, but when the size of data is huge, the magnetic media comes into play.
For example, a bank has to handle and transfer huge data of its customer, which stores a
backup of it at some geographically far-away place for security reasons and to keep it from
uncertain calamities. If the bank needs to store its huge backup data then its,transfer through
internet is not feasible.The WAN links may not support such high speed.Even if they do; the
cost too high to afford.
In these cases, data backup is stored onto magnetic tapes or magnetic discs, and then shifted
physically at remote places.
STP cables comes with twisted wire pair covered in metal foil. This makes it more indifferent
to noise and crosstalk.
UTP has seven categories, each suitable for specific use. In computer networks, Cat-5, Cat-
5e, and Cat-6 cables are mostly used. UTP cables are connected by RJ45 connectors.
Explore our latest online courses and learn new skills at your own pace. Enroll and become
a certified expert to boost your career.
Coaxial Cable
Coaxial cable has two wires of copper. The core wire lies in the center and it is made of solid
conductor.The core is enclosed in an insulating sheath.The second wire is wrapped around
over the sheath and that too in turn encased by insulator sheath.This all is covered by plastic
cover.
Because of its structure,the coax cable is capable of carrying high frequency signals than that
of twisted pair cable.The wrapped structure provides it a good shield against noise and cross
talk. Coaxial cables provide high bandwidth rates of up to 450 mbps.
There are three categories of coax cables namely, RG-59 (Cable TV), RG-58 (Thin Ethernet),
and RG-11 (Thick Ethernet). RG stands for Radio Government.
Cables are connected using BNC connector and BNC-T. BNC terminator is used to terminate
the wire at the far ends.
Power Lines
Power Line communication (PLC) is Layer-1 (Physical Layer) technology which uses power
cables to transmit data signals.In PLC, modulated data is sent over the cables. The receiver on
the other end de-modulates and interprets the data.
Because power lines are widely deployed, PLC can make all powered devices controlled and
monitored. PLC works in half-duplex.
Broadband PLC provides higher data rates up to 100s of Mbps and works at higher
frequencies (1.8 – 250 MHz).They cannot be as much extended as Narrowband PLC.
Fiber Optics
Fiber Optic works on the properties of light. When light ray hits at critical angle it tends to
refracts at 90 degree. This property has been used in fiber optic. The core of fiber optic cable
is made of high quality glass or plastic. From one end of it light is emitted, it travels through
it and at the other end light detector detects light stream and converts it to electric data.
Fiber Optic provides the highest mode of speed. It comes in two modes, one is single mode
fiber and second is multimode fiber. Single mode fiber can carry a single ray of light whereas
multimode is capable of carrying multiple beams of light.
Fiber Optic also comes in unidirectional and bidirectional capabilities. To connect and access
fiber optic special type of connectors are used. These can be Subscriber Channel (SC),
Straight Tip (ST), or MT-RJ.
The signal energy is contained and guided or The signal energy propagates in the structure of
propagated inside a solid medium. unguided electromagnetic waves in the air.
It can be used for point to point communication. It can be used for radio advertising in all directions.
This capacity can be further increased by inserting In this capacity of transmission cannot be increased
more cables for transmission. beyond the limit.
Print Page
Previous
Next
Radio Transmission
Radio frequency is easier to generate and because of its large wavelength it can penetrate
through walls and structures alike.Radio waves can have wavelength from 1 mm – 100,000
km and have frequency ranging from 3 Hz (Extremely Low Frequency) to 300 GHz
(Extremely High Frequency). Radio frequencies are sub-divided into six bands.
Radio waves at lower frequencies can travel through walls whereas higher RF can travel in
straight line and bounce back.The power of low frequency waves decreases sharply as they
cover long distance. High frequency radio waves have more power.
Lower frequencies such as VLF, LF, MF bands can travel on the ground up to 1000
kilometers, over the earth’s surface.
Radio waves of high frequencies are prone to be absorbed by rain and other obstacles. They
use Ionosphere of earth atmosphere. High frequency radio waves such as HF and VHF bands
are spread upwards. When they reach Ionosphere, they are refracted back to the earth.
Microwave Transmission
Electromagnetic waves above 100 MHz tend to travel in a straight line and signals over them
can be sent by beaming those waves towards one particular station. Because Microwaves
travels in straight lines, both sender and receiver must be aligned to be strictly in line-of-
sight.
Microwaves can have wavelength ranging from 1 mm – 1 meter and frequency ranging from
300 MHz to 300 GHz.
Microwave antennas concentrate the waves making a beam of it. As shown in picture above,
multiple antennas can be aligned to reach farther. Microwaves have higher frequencies and
do not penetrate wall like obstacles.
Microwave transmission depends highly upon the weather conditions and the frequency it is
using.
Explore our latest online courses and learn new skills at your own pace. Enroll and become
a certified expert to boost your career.
Infrared Transmission
Infrared wave lies in between visible light spectrum and microwaves. It has wavelength of
700-nm to 1-mm and frequency ranges from 300-GHz to 430-THz.
Infrared wave is used for very short range communication purposes such as television and it’s
remote. Infrared travels in a straight line hence it is directional by nature. Because of high
frequency range, Infrared cannot cross wall-like obstacles.
Light Transmission
Highest most electromagnetic spectrum which can be used for data transmission is light or
optical signaling. This is achieved by means of LASER.
Because of frequency light uses, it tends to travel strictly in straight line.Hence the sender and
receiver must be in the line-of-sight. Because laser transmission is unidirectional, at both
ends of communication the laser and the photo-detector needs to be installed. Laser beam is
generally 1mm wide hence it is a work of precision to align two far receptors each pointing to
lasers source.
Lasers cannot penetrate obstacles such as walls, rain, and thick fog. Additionally, laser beam
is distorted by wind, atmosphere temperature, or variation in temperature in the path.
Laser is safe for data transmission as it is very difficult to tap 1mm wide laser without
interrupting the communication channel.
Print Page
Previous
Next
When multiple senders try to send over a single medium, a device called
Multiplexer divides the physical channel and allocates one to each. On the
other end of communication, a De-multiplexer receives data from a single
medium, identifies each, and sends to different receivers.
TDM works in synchronized mode. Both ends, i.e. Multiplexer and De-
multiplexer are timely synchronized and both switch to next channel
simultaneously.
Explore our latest online courses and learn new skills at your own pace. Enroll
and become a certified expert to boost your career.
Wavelength Division Multiplexing
Light has different wavelength (colors). In fiber optic mode, multiple optical
carrier signals are multiplexed into an optical fiber by using different
wavelengths. This is an analog multiplexing technique and is done
conceptually in the same manner as FDM but uses light as signals.
Each station is assigned with a unique code, called chip. Signals travel with
these codes independently, inside the whole bandwidth.The receiver knows in
advance the chip code signal it has to receive.
Network Switching
Previous
Next
Circuit Switching
When two nodes communicate with each other over a dedicated
communication path, it is called circuit switching.There 'is a need of pre-
specified route from which data will travels and no other data is permitted.In
circuit switching, to transfer the data, circuit must be established so that the
data transfer can take place.
Establish a circuit
Transfer the data
Disconnect the circuit
Circuit switching was designed for voice applications. Telephone is the best
suitable example of circuit switching. Before a user can make a call, a virtual
path between caller and callee is established over the network.
Message Switching
This technique was somewhere in middle of circuit switching and packet
switching. In message switching, the whole message is treated as a data unit
and is switching / transferred in its entirety.
Explore our latest online courses and learn new skills at your own pace. Enroll
and become a certified expert to boost your career.
Packet Switching
Shortcomings of message switching gave birth to an idea of packet
switching. The entire message is broken down into smaller chunks called
packets. The switching information is added in the header of each packet and
transmitted independently.
Previous
Next
Data Link Layer is second layer of OSI Layered Model. This layer is one of the
most complicated layers and has complex functionalities and liabilities. Data
link layer hides the details of underlying hardware and represents itself to
upper layer as the medium to communicate.
Data link layer works between two hosts which are directly connected in
some sense. This direct connection could be point to point or broadcast.
Systems on broadcast network are said to be on same link. The work of data
link layer tends to get more complex when it is dealing with multiple hosts on
single collision domain.
Data link layer is responsible for converting data stream to signals bit by bit
and to send that over the underlying hardware. At the receiving end, Data
link layer picks up data from hardware which are in the form of electrical
signals, assembles them in a recognizable frame format, and hands over to
upper layer.
Logical Link Control: It deals with protocols, flow-control, and error control
Media Access Control: It deals with actual control of media
Framing
Data-link layer takes packets from Network Layer and encapsulates
them into Frames.Then, it sends each frame bit-by-bit on the hardware.
At receiver’ end, data link layer picks up signals from hardware and
assembles them into frames.
Addressing
Data-link layer provides layer-2 hardware addressing mechanism.
Hardware address is assumed to be unique on the link. It is encoded
into hardware at the time of manufacturing.
Synchronization
When data frames are sent on the link, both machines must be
synchronized in order to transfer to take place.
Error Control
Sometimes signals may have encountered problem in transition and the
bits are flipped.These errors are detected and attempted to recover
actual data bits. It also provides error reporting mechanism to the
sender.
Flow Control
Stations on same link may have different speed or capacity. Data-link
layer ensures flow control that enables both machine to exchange data
on same speed.
Multi-Access
When host on the shared link tries to transfer the data, it has a high
probability of collision. Data-link layer provides mechanism such as
CSMA/CD to equip capability of accessing a shared media among
multiple Systems.
Computer Network - Error Detection & Correction
Previous
Next
There are many reasons such as noise, cross-talk etc., which may help data
to get corrupted during transmission. The upper layers work on some
generalized view of network architecture and are not aware of actual
hardware data processing.Hence, the upper layers expect error-free
transmission between the systems. Most of the applications would not
function expectedly if they receive erroneous data. Applications such as voice
and video may not be that affected and with some errors they may still
function well.
Data-link layer uses some error control mechanism to ensure that frames
(data bit streams) are transmitted with certain level of accuracy. But to
understand how errors is controlled, it is essential to know what types of
errors may occur.
Types of Errors
There may be three types of errors:
Error detection
Error correction
Error Detection
Errors in the received frames are detected by means of Parity Check and
Cyclic Redundancy Check (CRC). In both cases, few extra bits are sent along
with actual data to confirm that bits received at other end are same as they
were sent. If the counter-check at receiver’ end fails, the bits are considered
corrupted.
Parity Check
One extra bit is sent along with the original bits to make number of 1s either
even in case of even parity, or odd in case of odd parity.
The sender while creating a frame counts the number of 1s in it. For
example, if even parity is used and number of 1s is even then one bit with
value 0 is added. This way number of 1s remains even.If the number of 1s is
odd, to make it even a bit with value 1 is added.
If a single bit flips in transit, the receiver can detect it by counting the
number of 1s. But when more than one bits are erro neous, then it is very
hard for the receiver to detect the error.
Explore our latest online courses and learn new skills at your own pace. Enroll
and become a certified expert to boost your career.
Error Correction
In the digital world, error correction can be done in two ways:
Backward Error Correction When the receiver detects an error in the data
received, it requests back the sender to retransmit the data unit.
Forward Error Correction When the receiver detects some error in the data
received, it executes error-correcting code, which helps it to auto-
recover and to correct some kinds of errors.
The first one, Backward Error Correction, is simple and can only be efficiently
used where retransmitting is not expensive. For example, fiber optics. But in
case of wireless transmission retransmitting may cost too much. In the latter
case, Forward Error Correction is used.
To correct the error in data frame, the receiver must know exactly which bit
in the frame is corrupted. To locate the bit in error, redundant bits are used
as parity bits for error detection.For example, we take ASCII words (7 bits
data), then there could be 8 kind of information we need: first seven bits to
tell us which bit is error and one more bit to tell that there is no error.
For m data bits, r redundant bits are used. r bits can provide 2r combinations
of information. In m+r bit codeword, there is possibility that the r bits
themselves may get corrupted. So the number of r bits used must inform
about m+r bit locations plus no-error information, i.e. m+r+1.
Previous
Next
Flow Control
When a data frame (Layer-2 data) is sent from one host to another over a
single medium, it is required that the sender and receiver should work at the
same speed. That is, sender sends at a speed on which the receiver can
process and accept the data. What if the speed (hardware/software) of the
sender or receiver differs? If sender is sending too fast the receiver may be
overloaded, (swamped) and data may be lost.
Sliding Window
In this flow control mechanism, both sender and receiver agree on the
number of data-frames after which the acknowledgement should be
sent. As we learnt, stop and wait flow control mechanism wastes
resources, this protocol tries to make use of underlying resources as
much as possible.
Error Control
When data-frame is transmitted, there is a probability that data-frame may
be lost in the transit or it is received corrupted. In both cases, the receiver
does not receive the correct data-frame and sender does not know anything
about any loss.In such case, both sender and receiver are equipped with
some protocols which helps them to detect transit errors such as loss of
data-frame. Hence, either the sender retransmits the data-frame or the
receiver may request to resend the previous data-frame.
There are three types of techniques available which Data-link layer may
deploy to control the errors by Automatic Repeat Requests (ARQ):
Stop-and-wait ARQ
Previous
Next
Network layer takes the responsibility for routing packets from source to
destination within or outside a subnet. Two different subnet may have
different addressing schemes or non-compatible addressing types. Same with
protocols, two different subnet may be operating on different protocols which
are not compatible with each other. Network layer has the responsibility to
route the packets from source to destination, mapping different addressing
schemes and protocols.
Explore our latest online courses and learn new skills at your own pace. Enroll
and become a certified expert to boost your career.
Network Layer Features
With its standard functionalities, Layer 3 can provide various features as:
Network Addressing
Previous
Next
We are discussing IP here as it is the only one we use in practice these days.
Hosts in different subnet need a mechanism to locate each other. This task
can be done by DNS. DNS is a server which provides Layer-3 address of
remote host mapped with its domain name or FQDN. When a host acquires
the Layer-3 Address (IP Address) of the remote host, it forwards all its
packet to its gateway. A gateway is a router equipped with all the
information which leads to route packets to the destination host.
Routers take help of routing tables, which has the following information:
Routers upon receiving a forwarding request, forwards packet to its next hop
(adjacent router) towards the destination.
The next router on the path follows the same thing and eventually the data
packet reaches its destination.
Previous
Next
A router is always configured with some default route. A default route tells
the router where to forward a packet if there is no route found for specific
destination. In case there are multiple path existing to reach the same
destination, router can make decision based on the following information:
Hop Count
Bandwidth
Metric
Prefix-length
Delay
Unicast routing
Most of the traffic on the internet and intranets known as unicast data or
unicast traffic is sent with specified destination. Routing unicast data over the
internet is called unicast routing. It is the simplest form of routing because
the destination is already known. Hence the router just has to look up the
routing table and forward the packet to next hop.
Broadcast routing
By default, the broadcast packets are not routed and forwarded by the
routers on any network. Routers create broadcast domains. But it can be
configured to forward broadcasts in some special cases. A broadcast
message is destined to all network devices.
A router creates a data packet and then sends it to each host one by
one. In this case, the router creates multiple copies of single data packet
with different destination addresses. All packets are sent as unicast but
because they are sent to all, it simulates as if router is broadcasting.
This method consumes lots of bandwidth and router must destination
address of each node.
Secondly, when router receives a packet that is to be broadcasted, it
simply floods those packets out of all interfaces. All routers are
configured in the same way.
This method is easy on router's CPU but may cause the problem of
duplicate packets received from peer routers.
Reverse path forwarding is a technique, in which router knows in
advance about its predecessor from where it should receive broadcast.
This technique is used to detect and discard duplicates.
Explore our latest online courses and learn new skills at your own pace. Enroll
and become a certified expert to boost your career.
Multicast Routing
Multicast routing is special case of broadcast routing with significance
difference and challenges. In broadcast routing, packets are sent to all nodes
even if they do not want it. But in Multicast routing, the data is sent to only
nodes which wants to receive the packets.
The router must know that there are nodes, which wish to receive multicast
packets (or stream) then only it should forward. Multicast routing works
spanning tree protocol to avoid looping.
Multicast routing also uses reverse path Forwarding technique, to detect and
discard duplicates and loops.
Anycast Routing
Anycast packet forwarding is a mechanism where multiple hosts can have
same logical address. When a packet destined to this logical address is
received, it is sent to the host which is nearest in routing topology.
Anycast routing is done with help of DNS server. Whenever an Anycast
packet is received it is enquired with DNS to where to send it. DNS provides
the IP address which is the nearest IP configured on it.
Routing Algorithms
The routing algorithms are as follows:
Flooding
Flooding is simplest method packet forwarding. When a packet is received,
the routers send it to all the interfaces except the one on which it was
received. This creates too much burden on the network and lots of duplicate
packets wandering in the network.
Time to Live (TTL) can be used to avoid infinite looping of packets. There
exists another approach for flooding, which is called Selective Flooding to
reduce the overhead on the network. In this method, the router does not
flood out on all the interfaces, but selective ones.
Shortest Path
Routing decision in networks, are mostly taken on the basis of cost between
source and destination. Hop count plays major role here. Shortest path is a
technique which uses various algorithms to decide a path with minimum
number of hops.
Dijkstra's algorithm
Bellman Ford algorithm
Floyd Warshall algorithm
Previous
Next
In real world scenario, networks under same administration are generally
scattered geographically. There may exist requirement of connecting two
different networks of same kind as well as of different kinds. Routing
between two networks is called internetworking.
Tunneling
If they are two geographically separate networks, which want to
communicate with each other, they may deploy a dedicated line between or
they have to pass their data through intermediate networks.
Both ends seem as if they are directly connected and tagging makes data
travel through transit network without any modifications.
Packet Fragmentation
Most Ethernet segments have their maximum transmission unit (MTU) fixed
to 1500 bytes. A data packet can have more or less packet length depending
upon the application. Devices in the transit path also have their hardware
and software capabilities which tell what amount of data that device can
handle and what size of packet it can process.
If the data packet size is less than or equal to the size of packet the transit
network can handle, it is processed neutrally. If the packet is larger, it is
broken into smaller pieces and then forwarded. This is called packet
fragmentation. Each fragment contains the same destination and source
address and routed through transit path easily. At the receiving end it is
assembled again.
If a packet with DF (don’t fragment) bit set to 1 comes to a router which can
not handle the packet because of its length, the packet is dropped.
When a packet is received by a router has its MF (more fragments) bit set to
1, the router then knows that it is a fragmented packet and parts of the
original packet is on the way.
If packet is fragmented too small, the overhead is increases. If the packet is
fragmented too large, intermediate router may not be able to process it and
it might get dropped.
Previous
Next
On the other hand, IP address on the public domain is rarely changed. If the
NIC is changed in case of some fault, the MAC address also changes. This
way, for Layer-2 communication to take place, a mapping between the two is
required.
To know the MAC address of remote host on a broadcast domain, a computer
wishing to initiate communication sends out an ARP broadcast message
asking, “Who has this IP address?” Because it is a broadcast, all hosts on the
network segment (broadcast domain) receive this packet and process it. ARP
packet contains the IP address of destination host, the sending host wishes
to talk to. When a host receives an ARP packet destined to it, it replies back
with its own MAC address.
Once the host gets destination MAC address, it can communicate with remote
host using Layer-2 link protocol. This MAC to IP mapping is saved into ARP
cache of both sending and receiving hosts. Next time, if they require to
communicate, they can directly refer to their respective ARP cache.
Reverse ARP is a mechanism where host knows the MAC address of remote
host but requires to know IP address to communicate.
Explore our latest online courses and learn new skills at your own pace. Enroll
and become a certified expert to boost your career.
Class A - it uses first octet for network addresses and last three octets
for host addressing
Class B - it uses first two octets for network addresses and last two for
host addressing
Class C - it uses first three octets for network addresses and last one for
host addressing
Class D - it provides flat IP addressing scheme in contrast to hierarchical
structure for above three.
Class E - It is used as experimental.
IPv6 has introduced Anycast addressing but has removed the concept of
broadcasting. IPv6 enables devices to self-acquire an IPv6 address and
communicate within that subnet. This auto-configuration removes the
dependability of Dynamic Host Configuration Protocol (DHCP) servers. This
way, even if the DHCP server on that subnet is down, the hosts can
communicate with each other.
IPv6 provides new feature of IPv6 mobility. Mobile IPv6 equipped machines
can roam around without the need of changing their IP addresses.
Previous
Next
Explore our latest online courses and learn new skills at your own pace. Enroll
and become a certified expert to boost your career.
End-to-End Communication
A process on one host identifies its peer host on remote network by means of
TSAPs, also known as Port numbers. TSAPs are very well defined and a
process which is trying to communicate with its peer knows this in advance.
For example, when a DHCP client wants to communicate with remote DHCP
server, it always requests on port number 67. When a DNS client wants to
communicate with remote DNS server, it always requests on port number 53
(UDP).
Transport Layer Protocols
The two main Transport layer protocols are:
Previous
Next
Features
TCP is reliable protocol. That is, the receiver always sends either positive
or negative acknowledgement about the data packet to the sender, so
that the sender always has bright clue about whether the data packet is
reached the destination or it needs to resend it.
TCP ensures that the data reaches intended destination in the same
order it was sent.
TCP is connection oriented. TCP requires that connection between two
remote points be established before sending actual data.
TCP provides error-checking and recovery mechanism.
TCP provides end-to-end communication.
TCP provides flow control and quality of service.
TCP operates in Client/Server point-to-point mode.
TCP provides full duplex server, i.e. it can perform roles of both receiver
and sender.
Header
The length of TCP header is minimum 20 bytes long and maximum 60 bytes.
Explore our latest online courses and learn new skills at your own pace. Enroll
and become a certified expert to boost your career.
Addressing
TCP communication between two remote hosts is done by means of port
numbers (TSAPs). Ports numbers can range from 0 – 65535 which are
divided as:
Connection Management
TCP communication works in Server/Client model. The client initiates the
connection and the server either accepts or rejects it. Three-way
handshaking is used for connection management.
Establishment
Client initiates the connection and sends the segment with a Sequence
number. Server acknowledges it back with its own Sequence number and
ACK of client’s segment which is one more than client’s Sequence number.
Client after receiving ACK of its segment sends an acknowledgement of
Server’s response.
Release
Either of server and client can send TCP segment with FIN flag set to 1.
When the receiving end responds it back by ACKnowledging FIN, that
direction of TCP communication is closed and connection is released.
Bandwidth Management
TCP uses the concept of window size to accommodate the need of Bandwidth
management. Window size tells the sender at the remote end, the number of
data byte segments the receiver at this end can receive. TCP uses slow start
phase by using window size 1 and increases the window size exponentially
after each successful communication.
For example, the client uses windows size 2 and sends 2 bytes of data. When
the acknowledgement of this segment received the windows size is doubled
to 4 and next sent the segment sent will be 4 data bytes long. When the
acknowledgement of 4-byte data segment is received, the client sets
windows size to 8 and so on.
If the sequence number of a segment recently received does not match with
the sequence number the receiver was expecting, then it is discarded and
NACK is sent back. If two segments arrive with the same sequence number,
the TCP timestamp value is compared to make a decision.
Multiplexing
The technique to combine two or more data streams in one session is called
Multiplexing. When a TCP client initializes a connection with Server, it always
refers to a well-defined port number which indicates the application process.
The client itself uses a randomly generated port number from private port
number pools.
This enables the client system to receive multiple connection over single
virtual connection. These virtual connections are not good for Servers if the
timeout is too long.
Congestion Control
When large amount of data is fed to system which is not capable of handling
it, congestion occurs. TCP controls congestion by means of Window
mechanism. TCP sets a window size telling the other end how much data
segment to send. TCP may use three algorithms for congestion control:
Timer Management
TCP uses different types of timer to control and management various tasks:
Keep-alive timer:
This timer is used to check the integrity and validity of a connection.
When keep-alive time expires, the host sends a probe to check if the
connection still exists.
Retransmission timer:
This timer maintains stateful session of data sent.
If the acknowledgement of sent data does not receive within the
Retransmission time, the data segment is sent again.
Persist timer:
TCP session can be paused by either host by sending Window Size 0.
To resume the session a host needs to send Window Size with some
larger value.
If this segment never reaches the other end, both ends may wait for
each other for infinite time.
When the Persist timer expires, the host re-sends its window size to let
the other end know.
Persist Timer helps avoid deadlocks in communication.
Timed-Wait:
After releasing a connection, either of the hosts waits for a Timed-Wait
time to terminate the connection completely.
This is in order to make sure that the other end has received the
acknowledgement of its connection termination request.
Timed-out can be a maximum of 240 seconds (4 minutes).
Crash Recovery
TCP is very reliable protocol. It provides sequence number to each of byte
sent in segment. It provides the feedback mechanism i.e. when a host
receives a packet, it is bound to ACK that packet having the next sequence
number expected (if it is not the last segment).
When a TCP Server crashes mid-way communication and re-starts its process
it sends TPDU broadcast to all its hosts. The hosts can then send the last
data segment which was never unacknowledged and carry onwards.
Previous
Next
Requirement of UDP
A question may arise, why do we need an unreliable protocol to transport the
data? We deploy UDP where the acknowledgement packets share significant
amount of bandwidth along with the actual data. For example, in case of
video streaming, thousands of packets are forwarded towards its users.
Acknowledging all the packets is troublesome and may contain huge amount
of bandwidth wastage. The best delivery mechanism of underlying IP protocol
ensures best efforts to deliver its packets, but even if some packets in video
streaming get lost, the impact is not calamitous and can be ignored easily.
Loss of few packets in video and voice traffic sometimes goes unnoticed.
Features
UDP is used when acknowledgement of data does not hold any
significance.
UDP is good protocol for data flowing in one direction.
UDP is simple and suitable for query based communications.
UDP is not connection oriented.
UDP does not provide congestion control mechanism.
UDP does not guarantee ordered delivery of data.
UDP is stateless.
UDP is suitable protocol for streaming applications such as VoIP,
multimedia streaming.
Explore our latest online courses and learn new skills at your own pace. Enroll
and become a certified expert to boost your career.
UDP Header
UDP header is as simple as its function.
Source Port - This 16 bits information is used to identify the source port
of the packet.
Destination Port - This 16 bits information, is used identify application
level service on destination machine.
Length - Length field specifies the entire length of UDP packet (including
header). It is 16-bits field and minimum value is 8-byte, i.e. the size of
UDP header itself.
Checksum - This field stores the checksum value generated by the sender
before sending. IPv4 has this field as optional so when checksum field
does not contain any value it is made 0 and all its bits are set to zero.
UDP application
Here are few applications where UDP is used to transmit data:
Previous
Next
Application Layer
Application layer is the top most layer in OSI and TCP/IP layered model. This
layer exists in both layered Models because of its significance, of interacting
with user and user applications. This layer is for applications which are
involved in communication system.
A user may or may not directly interacts with the applications. Application
layer is where the actual communication is initiated and reflects. Because
this layer is on the top of the layer stack, it does not serve any other layers.
Application layer takes the help of Transport and all layers below it to
communicate or transfer its data to the remote host.
On the other hand, when we use a Web Browser, which is actually using
Hyper Text Transfer Protocol (HTTP) to interact with the network. HTTP is
Application Layer protocol.
Another example is File Transfer Protocol, which helps a user to transfer text
based or binary files across the network. A user can use this protocol in
either GUI based software like FileZilla or CuteFTP and the same user can
use FTP in Command Line mode.
Previous
Next
Peer-to-peer: Both remote processes are executing at same level and they
exchange data using some shared resource.
Client-Server: One remote process acts as a Client and requests some
resource from another application process acting as Server.
In client-server model, any process can act as Server or Client. It is not the
type of machine, size of the machine, or its computing power which makes it
server; it is the ability of serving request that makes a machine a server.
A system can act as Server and Client simultaneously. That is, one process is
acting as Server and another is acting as a client. This may also happen that
both client and server processes reside on the same machine.
Communication
Two processes in client-server model can interact in various ways:
Sockets
Remote Procedure Calls (RPC)
Sockets
In this paradigm, the process acting as Server opens a socket using a well-
known (or known by client) port and waits until some client request comes.
The second process acting as a Client also opens a socket but instead of
waiting for an incoming request, the client processes ‘requests first’.
When the request is reached to server, it is served. It can either be an
information sharing or resource request.
The client process calls the client stub. It passes all the parameters
pertaining to program local to it.
All parameters are then packed (marshalled) and a system call is made
to send them to other side of the network.
Kernel sends the data over the network and the other end receives it.
The remote host passes data to the server stub where it is unmarshalled.
The parameters are passed to the procedure and the procedure is then
executed.
The result is sent back to the client in the same manner.
Application Protocols in Computer Network
Previous
Next
There are several protocols which work for users in Application Layer.
Application layer protocols can be broadly divided into two categories:
A DNS server is requested with FQDN and it responds back with the IP
address mapped with it. DNS uses UDP port 53.
Message Transfer Agent uses SMTP to forward the email to another Message
Transfer Agent (Server side). While SMTP is used by end user to only send
the emails, the Servers normally use SMTP to send as well as receive emails.
SMTP uses TCP port number 25 and 587.
Client software uses Internet Message Access Protocol (IMAP) or POP
protocols to receive emails.
Explore our latest online courses and learn new skills at your own pace. Enroll
and become a certified expert to boost your career.
FTP uses out-of-band controlling i.e. FTP uses TCP port 20 for exchanging
controlling information and the actual data is sent over TCP port 21.
The client requests the server for a file. When the server receives a request
for a file, it opens a TCP connection for the client and transfers the file. After
the transfer is complete, the server closes the connection. For a second file,
client requests again and the server reopens a new TCP connection.
When a client needs to retrieve mails from server, it opens a connection with
the server on TCP port 110. User can then access his mails and download
them to the local computer. POP3 works in two modes. The most common
mode the delete mode, is to delete the emails from remote server after they
are downloaded to local machines. The second mode, the keep mode, does
not delete the email from mail server and gives the user an option to access
mails later on mail server.
HTTP versions
HTTP 1.0 uses non persistent HTTP. At most one object can be sent over
a single TCP connection.
HTTP 1.1 uses persistent HTTP. In this version, multiple objects can be
sent over a single TCP connection.
Network Services
Previous
Next
Directory Services
These services are mapping between name and its value, which can be
variable value or fixed. This software system helps to store the information,
organize it, and provides various means of accessing it.
Accounting
In an organization, a number of users have their user names and
passwords mapped to them. Directory Services provide means of storing
this information in cryptic form and make available when requested.
Authentication and Authorization
User credentials are checked to authenticate a user at the time of login
and/or periodically. User accounts can be set into hierarchical structure
and their access to resources can be controlled using authorization
schemes.
Domain Name Services
DNS is widely used and one of the essential services on which internet
works. This system maps IP addresses to domain names, which are
easier to remember and recall than IP addresses. Because network
operates with the help of IP addresses and humans tend to remember
website names, the DNS provides website’s IP address which is mapped
to its name from the back-end on the request of a website name from
the user.
File Services
File services include sharing and transferring files over the network.
File Sharing
One of the reason which gave birth to networking was file sharing. File
sharing enables its users to share their data with other users. User can
upload the file to a specific server, which is accessible by all intended
users. As an alternative, user can make its file shared on its own
computer and provides access to intended users.
File Transfer
This is an activity to copy or move file from one computer to another
computer or to multiple computers, with help of underlying network.
Network enables its user to locate other users in the network and
transfers files.
Explore our latest online courses and learn new skills at your own pace. Enroll
and become a certified expert to boost your career.
Communication Services
Email
Electronic mail is a communication method and something a computer
user cannot work without. This is the basis of today’s internet features.
Email system has one or more email servers. All its users are provided
with unique IDs. When a user sends email to other user, it is actually
transferred between users with help of email server.
Social Networking
Recent technologies have made technical life social. The computer savvy
peoples, can find other known peoples or friends, can connect with them,
and can share thoughts, pictures, and videos.
Internet Chat
Internet chat provides instant text transfer services between two hosts.
Two or more people can communicate with each other using text based
Internet Relay Chat services. These days, voice chat and video chat are
very common.
Discussion Boards
Discussion boards provide a mechanism to connect multiple peoples with
same interests.It enables the users to put queries, questions,
suggestions etc. which can be seen by all other users. Other may
respond as well.
Remote Access
This service enables user to access the data residing on the remote
computer. This feature is known as Remote desktop. This can be done
via some remote device, e.g. mobile phone or home computer.
Application Services
These are nothing but providing network based services to the users such as
web services, database managing, and resource sharing.
Resource Sharing
To use resources efficiently and economically, network provides a mean
to share them. This may include Servers, Printers, and Storage Media
etc.
Databases
This application service is one of the most important services. It stores
data and information, processes it, and enables the users to retrieve it
efficiently by using queries. Databases help organizations to make
decisions based on statistics.
Web Services
World Wide Web has become the synonym for internet.It is used to
connect to the internet, and access files and information services
provided by the internet servers.