Network
Network
Data communication is the process of transferring data between two locations using components
like:
Computer Network
A computer network connects multiple devices to share information and resources. Components
include:
Transmission Media
Enables data sharing, online transactions, and efficient communication (e.g., email, video
conferencing).
Supports distributed computing and enhances data security.
Easy addition/removal of users.
Vulnerabilities include equipment malfunctions, system failures, hacker threats, and virus
attacks, often exacerbated by natural disasters.
Computer Network Architecture
1. Bus Topology:
o Single backbone cable connects all nodes.
o Advantages: Low cost, simple setup.
o Disadvantages: Cable faults disrupt communication, signal interference.
2. Ring Topology:
o Nodes form a loop; data flows in one direction.
o Advantages: Network management is easier.
o Disadvantages: Fault in one node disrupts entire network.
3. Star Topology:
o Central hub connects all nodes.
o Advantages: Easy troubleshooting, scalability, minimal failure impact.
o Disadvantages: Central hub failure affects the entire network.
4. Tree Topology:
o Hierarchical layout combining bus and star.
o Advantages: Expandable, easy error detection.
o Disadvantages: High cost, main bus cable failure disrupts the network.
5. Mesh Topology:
o Nodes interconnected with multiple paths.
o Advantages: Reliable, fast communication, easy reconfiguration.
o Disadvantages: High cost, complex management, redundancy reduces efficiency.
6. Hybrid Topology:
o Combination of various topologies.
o Advantages: Flexible, scalable.
o Disadvantages: Complex design, costly to implement.
OSI Model
Purpose:
Key Functions:
Protocols:
Purpose:
Key Functions:
Examples:
Purpose:
Key Functions:
Examples:
Purpose:
Key Functions:
Examples:
DNS:
First and lowest layer, responsible for physical connectivity and hardware interaction. It converts
data into electromagnetic signals for transmission and ensures quality and synchronization
during data transfer.
Key Features
1. Transmission Media
o Guided: Includes twisted pairs, coaxial cables, and fiber optics.
o Unguided: Uses airwaves, including communication satellites and radio signals (FM,
UHF, VHF).
o Fiber Optics:
Multimode: LED-based, slower, shorter range.
Single-mode: Laser-based, faster, longer range.
2. Signals
o Analog Signals: Continuous waveforms (e.g., AM, FM, Phase Modulation).
o Digital Signals: Discrete voltage pulses (e.g., line/block coding).
3. Transmission Modes
o Simplex: One-way (e.g., keyboard).
o Half-duplex: Alternating two-way (e.g., walkie-talkie).
o Full-duplex: Simultaneous two-way (e.g., mobile phones).
4. Standards
o RS-232: Serial communication standard for peripherals.
o RS-449: Advanced standard for higher data rates and longer distances.
Functions
The physical layer plays a vital role in enabling reliable data transmission across networks.
Modulation:
Modulation is the process of altering a carrier signal (amplitude, frequency, or phase) to encode
data for transmission over a medium.
Demodulation:
Demodulation is the reverse process, extracting the original message signal from the modulated
carrier wave.
Modulation and demodulation together enable efficient, reliable communication across diverse
systems.
Data Encoding:
The process of converting data (characters, symbols, alphabets) into a specific format for secure
transmission.
Decoding:
The reverse of encoding, extracting information from the converted format.
Digtal-to-Digital Conversion:
Definition: Converting digital data into digital signals via line coding and block coding.
1. Uni-Polar Encoding
o Single voltage level (e.g., High for 1, No voltage for 0).
o No rest condition (Unipolar Non-Return-to-Zero).
2. Polar Encoding
o Multiple voltage levels (positive and negative).
o Types:
Polar NRZ:
NRZ-L: Changes voltage with different bits.
NRZ-I: Changes voltage when 1 is encountered.
RZ: Uses three voltages (positive, negative, zero).
Manchester: Combines RZ and NRZ-L; mid-bit transitions.
Differential Manchester: Combines RZ and NRZ-I; transitions mid-bit
for 1.
3. Bipolar Encoding
o Uses three voltage levels: positive, negative, and zero.
o Binary 0 = Zero voltage; Binary 1 = Alternating positive and negative voltages.
Data Link Layer (OSI Model)
2nd layer from the bottom, 6th from the top in the OSI model.
Interacts with the Physical layer and Network layer.
Role:
Sublayers:
1. Logical Link Control (LLC): Manages error detection, flow control, and frame
synchronization.
2. Media Access Control (MAC): Handles framing, addressing, and medium access.
1. Framing:
o Divides data into frames with a fixed or variable size.
o Frame = Header + Data + Trailer.
o Example: HDLC uses bit stuffing for variable-size framing.
2. Physical Addressing:
o Uses hardware addresses (MAC) to ensure correct delivery of frames within a
local network.
3. Flow Control:
o Regulates data transmission to prevent the sender from overwhelming the
receiver.
o Ensures smooth data flow and prevents congestion.
4. Access Control:
o Manages how devices share the communication medium.
o Prevents collisions using protocols like CSMA/CD (Ethernet) or CSMA/CA
(Wi-Fi).
5. Error Control:
o Ensures reliable data transmission through error detection and correction.
o Implements mechanisms like parity checks and bit stuffing to handle errors.
key Services:
Primary Functions:
1. Logical Addressing:
o Uses IP addresses to identify devices.
o IPv4: 32-bit address (e.g., 192.168.1.1).
o IPv6: 128-bit address (e.g., 2001:db8::8a2e:0370:7334).
o Enables routing across networks.
2. Subnetting and Supernetting:
o Subnetting: Divides a large network into smaller sub-networks for better
management.
o Supernetting: Combines smaller networks into a larger one to optimize routing.
3. Routing:
o Routers use logical addresses to determine the best path for data.
o Ensures efficient delivery of packets between networks.
4. Fragmentation:
o Splits large packets into smaller fragments for networks with size limitations.
o Each fragment is independently transmitted with its own IP header.
Example:
What is Routing?
Routing is the process performed by network devices, primarily routers, to deliver data packets
from one network to another by selecting the optimal path. It involves the following steps:
1. Packet Reception: The router receives a packet and examines its destination IP address.
2. Routing Decision: The router checks its routing table to find the most efficient path based on
metrics like hop count, bandwidth, or delay.
3. Forwarding the Packet: After choosing the best path, the packet is forwarded to the next hop,
which could be another router or the destination device.
4. Updating the Path: If network conditions change (e.g., a path becomes unavailable), routers
update their routing tables to reflect new routes.
What is a Router?
A router is a networking device that forwards data packets between computer networks. Routers
direct traffic on the internet and ensure data reaches the correct destination by making routing
decisions.
A routing table is a database stored in a router that contains a list of paths (routes) to network
destinations. It helps the router decide how to forward packets based on the destination address.
Types of Routing
1. Static Routing:
o Routes are manually configured by the network administrator.
o Simple, secure, and doesn’t require overhead from routing protocols.
o Not scalable and requires manual updates for network changes.
o Suitable for small or stable networks where paths rarely change.
2. Dynamic Routing:
o Routers automatically calculate and update routes using algorithms and protocols based
on network conditions.
o Adapts to changes in the network.
o Scalable, but consumes bandwidth and CPU resources for routing calculations and
updates.
3. Default Routing:
o A default route directs packets with unknown destination addresses to a specific router
or gateway.
o Reduces routing table size and simplifies configuration.
o Not suitable for complex networks; typically used in smaller or branch networks to route
traffic to a main router.
Routing Protocols
Routing protocols determine how routers communicate with each other to distribute route
information and select paths.
Summary Table:
Routing
Description Pros Cons
Type
Static Routes manually configured Simple, secure, no protocol Not scalable, requires
Routing by admin. overhead. manual updates.
Default Directs unknown packets to a Simplifies configuration, Not suitable for complex
Routing default router. reduces routing table size. networks.
This provides a basic understanding of routing, routers, routing tables, and routing protocols used
in networking.