CCN Module 1 Ver3
CCN Module 1 Ver3
Syllabus:
Message: A message is a piece of information that is to be transmitted from one person to another.
It could be a text file, an audio file, a video file, etc.
Sender: It is simply a device that sends data messages. It can be a computer, mobile, telephone,
laptop, video camera, or workstation, etc.
Receiver: It is a device that receives messages. It can be a computer, telephone mobile, workstation,
etc.
Transmission Medium / Communication Channels: Communication channels are the medium that
connect two or more workstations. Workstations can be connected by either wired media or wireless
media.
Set of rules (Protocol): When someone sends the data (The sender), it should be understandable to
the receiver also otherwise it is meaningless. For example, Sonali sends a message to Chetan. If
Sonali writes in Hindi and Chetan cannot understand Hindi, it is a meaningless conversation.
Therefore, there are some set of rules (protocols) that is followed by every computer connected to
the internet and they are:
TCP(Transmission Control Protocol): It is responsible for dividing messages into packets on the
source computer and reassembling the received packet at the destination or recipient computer. It
also makes sure that the packets have the information about the source of the message data, the
destination of the message data, the sequence in which the message data should be re-assembled,
and checks if the message has been sent correctly to the specific destination.
IP(Internet Protocol): Do You ever wonder how does computer determine which packet belongs to
which device. What happens if the message you sent to your friend is received by your father? IP is
responsible for handling the address of the destination computer so that each packet is sent to its
proper destination.
Leased
Bluetooth, Ethernet FDDI, CDDi.
Technology Ethernet Line,
IrDA,Zigbee & Wifi ATM
Dial-Up
Upto Above 50
Range 1-100 m 1 – 5 km 5-50 km
2km km
Transmission
Very High Very High High Average Low
Speed
Private or Private
Ownership Private Private Private
Public or Public
Very
Maintenance Very Easy Easy Moderate Difficult
Difficult
In the figure, Every device is connected to another via dedicated channels. These channels are
known as links.
Suppose, the N number of devices are connected with each other in a mesh topology, the total
number of ports that are required by each device is N-1. In Figure 1, there are 5 devices connected
to each other, hence the total number of ports required by each device is 4. The total number of
ports required = N * (N-1).
Suppose, N number of devices are connected with each other in a mesh topology, then the total
number of dedicated links required to connect them is NC2 i.e. N(N-1)/2. In Figure 1, there are 5
devices connected to each other, hence the total number of links required is 5*4/2 = 10.
Advantages of Mesh Topology
Communication is very fast between the nodes.
Mesh Topology is robust.
The fault is diagnosed easily. Data is reliable because data is transferred among the devices through
dedicated channels or links.
Provides security and privacy.
Drawbacks of Mesh Topology
Installation and configuration are difficult.
The cost of cables is high as bulk wiring is required, hence suitable for less number of devices.
The cost of maintenance is high.
A common example of mesh topology is the internet backbone, where various internet service
providers are connected to each other via dedicated channels. This topology is also used in military
communication systems and aircraft navigation systems.
Star Topology
In Star Topology, all the devices are connected to a single hub through a cable. This hub is the
central node and all other nodes are connected to the central node. The hub can be passive in
nature i.e., not an intelligent hub such as broadcasting devices, at the same time the hub can be
intelligent known as an active hub. Active hubs have repeaters in them. Coaxial cables or RJ-45
cables are used to connect the computers. In Star Topology, many popular Ethernet LAN protocols
are used as CD(Collision Detection), CSMA (Carrier Sense Multiple Access), etc.
Figure shows A star topology having four systems connected to a single point of connection i.e. hub.
Bus Topology
Bus Topology is a network type in which every computer and network device is connected to a single
cable. It is bi-directional. It is a multi-point connection and a non-robust topology because if the
backbone fails the topology crashes. In Bus Topology, various MAC (Media Access Control) protocols
are followed by LAN ethernet connections like TDMA, Pure Aloha, CDMA, Slotted Aloha, etc.
Figure shows A bus topology with shared backbone cable. The nodes are connected to the channel
via drop lines.
Advantages of Bus Topology
If N devices are connected to each other in a bus topology, then the number of cables required to
connect them is 1, known as backbone cable, and N drop lines are required.
Coaxial or twisted pair cables are mainly used in bus-based networks that support up to 10 Mbps.
The cost of the cable is less compared to other topologies, but it is used to build small networks.
Bus topology is familiar technology as installation and troubleshooting techniques are well known.
CSMA is the most common method for this type of topology.
Drawbacks of Bus Topology
A bus topology is quite simpler, but still, it requires a lot of cabling.
If the common cable fails, then the whole system will crash down.
If the network traffic is heavy, it increases collisions in the network. To avoid this, various protocols
are used in the MAC layer known as Pure Aloha, Slotted Aloha, CSMA/CD, etc.
Adding new devices to the network would slow down networks.
Security is very low.
A common example of bus topology is the Ethernet LAN, where all devices are connected to a single
coaxial cable or twisted pair cable. This topology is also used in cable television networks. For more,
refer to the Advantages and Disadvantages of Bus Topology.
Ring Topology
In a Ring Topology, it forms a ring connecting devices with exactly two neighbouring devices. A
number of repeaters are used for Ring topology with a large number of nodes, because if someone
wants to send some data to the last node in the ring topology with 100 nodes, then the data will
have to pass through 99 nodes to reach the 100th node. Hence to prevent data loss repeaters are
used in the network.The data flows in one direction, i.e. it is unidirectional, but it can be made
bidirectional by having 2 connections between each Network Node, it is called Dual Ring Topology.
In-Ring Topology, the Token Ring Passing protocol is used by the workstations to transmit the data.
Figure shows A ring topology comprises 4 stations connected with each forming a ring.
The most common access method of ring topology is token passing.Token passing: It is a network
access method in which a token is passed from one node to another node.
Token: It is a frame that circulates around the network.
Operations of Ring Topology
One station is known as a monitor station which takes all the responsibility for performing the
operations.
To transmit the data, the station has to hold the token. After the transmission is done, the token is
to be released for other stations to use.
When no station is transmitting the data, then the token will circulate in the ring.
There are two types of token release techniques: Early token release releases the token just after
transmitting the data and Delayed token release releases the token after the acknowledgment is
received from the receiver.
Advantages of Ring Topology
The data transmission is high-speed.
The possibility of collision is minimum in this type of topology.
Cheap to install and expand.
It is less costly than a star topology.
Drawbacks of Ring Topology
The failure of a single node in the network can cause the entire network to fail.
Troubleshooting is difficult in this topology.
The addition of stations in between or the removal of stations can disturb the whole topology.
Less secure.
For more, refer to the Advantages and Disadvantages of Ring Topology.
Tree Topology
This topology is the variation of the Star topology. This topology has a hierarchical flow of data. In
Tree Topology, protocols like DHCP and SAC (Standard Automatic Configuration ) are used.
Figure 5: In this, the various secondary hubs are connected to the central hub which contains the
repeater. This data flow from top to bottom i.e. from the central hub to the secondary and then to
the devices or from bottom to top i.e. devices to the secondary hub and then to the central hub. It is
a multi-point connection and a non-robust topology because if the backbone fails the topology
crashes.
Advantages of Tree Topology
It allows more devices to be attached to a single central hub thus it decreases the distance that is
travelled by the signal to come to the devices.
It allows the network to get isolated and also prioritize from different computers.
We can add new devices to the existing network.
Error detection and error correction are very easy in a tree topology.
Drawbacks of Tree Topology
If the central hub gets fails the entire system fails.
The cost is high because of the cabling.
If new devices are added, it becomes difficult to reconfigure.
A common example of a tree topology is the hierarchy in a large organization. At the top of the tree
is the CEO, who is connected to the different departments or divisions (child nodes) of the company.
Each department has its own hierarchy, with managers overseeing different teams (grandchild
nodes). The team members (leaf nodes) are at the bottom of the hierarchy, connected to their
respective managers and departments.
For more, refer to the Advantages and Disadvantages of Tree Topology.
Hybrid Topology
This topological technology is the combination of all the various types of topologies we have studied
above. Hybrid Topology is used when the nodes are free to take any form. It means these can be
individuals such as Ring or Star topology or can be a combination of various types of topologies seen
above. Each individual topology uses the protocol that has been discussed earlier.
The above figure shows the structure of the Hybrid topology. As seen it contains a combination of all
different types of networks.
Advantages of Hybrid Topology
This topology is very flexible.
The size of the network can be easily expanded by adding new devices.
Drawbacks of Hybrid Topology
It is challenging to design the architecture of the Hybrid Network.
Hubs used in this topology are very expensive.
The infrastructure cost is very high as a hybrid network requires a lot of cabling and network devices.
A common example of a hybrid topology is a university campus network. The network may have a
backbone of a star topology, with each building connected to the backbone through a switch or
router. Within each building, there may be a bus or ring topology connecting the different rooms
and offices. The wireless access points also create a mesh topology for wireless devices. This hybrid
topology allows for efficient communication between different buildings while providing flexibility
and redundancy within each building.
M1.03 Explain the layered concept of TCP/IP and OSI models
The layered concept in communication models is the idea of breaking down communication between
computing systems into multiple abstraction layers. The TCP/IP and ISO-OSI model is an example of a
communication model that uses this concept. Layered concept handles and reduces the network
complexity.
TCP/IP
TCP/IP was designed and developed by the Department of Defense (DoD) in the 1960s and is based
on standard protocols. It stands for Transmission Control Protocol/Internet Protocol. The TCP/IP
model is a concise version of the OSI model. It contains four layers, unlike the seven layers in the OSI
model.
What is the Difference between TCP and IP?
TCP and IP are different protocols of Computer Networks. The basic difference between TCP
(Transmission Control Protocol) and IP (Internet Protocol) is in the transmission of data. In simple
words, IP finds the destination of the mail and TCP has the work to send and receive the mail.
UDP is another protocol, which does not require IP to communicate with another computer. IP is
required by only TCP. This is the basic difference between TCP and IP.
How Does the TCP/IP Model Work?
Whenever we want to send something over the internet using the TCP/IP Model, the TCP/IP Model
divides the data into packets at the sender’s end and the same packets have to be recombined at
the receiver’s end to form the same data, and this thing happens to maintain the accuracy of the
data. TCP/IP model divides the data into a 4-layer procedure, where the data first go into this layer
in one order and again in reverse order to get organized in the same way at the receiver’s end.
Layers of TCP/IP Model
Application Layer
Transport Layer
Internet Layer
Host to network layer
M1.04 Summarize protocols in TCP/IP protocol suite
Protocols in TCP/IP
ISO-OSIModel
OSI stands for Open Systems Interconnection. It was developed by ISO – ‘International
Organization for Standardization’, in the year 1984. It is a 7-layer architecture with each layer
having specific functionality to perform. All these 7 layers work collaboratively to transmit the data
from one person to another across the globe.The OSI modelis a reference framework that explains
the process oftransmitting data between computers. It is divided into seven layers that work
together to carry out specialised network functions, allowing for a more systematic approach to
networking.
The OSI model consists of seven abstraction layers arranged in a top-down order:
1.Physical Layer
2. Data Link Layer
3.Network Layer
4.Transport Layer
5.Session Layer
6.Presentation Layer
7. Application Layer
OSI Model in a Nutshell
Laye Information Form
Layer Name Responsibility Device or Protocol
r No (Data Unit)
Reliability It is less reliable than TCP/IP Model. It is more reliable than OSI Model.