Professional Documents
Culture Documents
Computer Network
Computer Network
Computer networking
A computer network is a set of computers connected together for the purpose of sharing resources. The most common
resource shared today is connection to the Internet. Other shared resources can include a printer or a file server. The
Internet itself can be considered a computer network.
Types of casting :
1. Unicast
• Transmitting data from one source host to one destination host is called as unicast.
• It is a one to one transmission.
Eg. Host A having IP Address 11.1.2.3 sends data to the host B having IP Address 20.12.4.2.
2. Broadcast
• Transmitting data from one source host to all the other hosts residing in the same or other network is called as
broadcast.
• It is a one to all transmission.
Based on recipient’s network, it is classified as-
1. Limited Broadcast
2. Direct Broadcast
A. Limited Broadcast
• Transmitting data from one source host to all the other hosts residing in the same network is called as limited
broadcast.
Eg . Host A having IP Address 11.1.2.3 sends data to all the other hosts residing in the same network.
B. Direct Broadcast
• Transmitting data from one source host to all the other hosts residing in some other network is called as direct
broadcast.
Eg. Host A having IP Address 11.1.2.3 sends data to all the other hosts residing in the network having IP Address
20.0.0.0
3. Multicast
• Transmitting data from one source host to a particular group of hosts having interest in receiving the data is called
as multicast.
• It is a one to many transmission.
Eg.
• Sending a group message to a particular group of people through whatsapp
• Sending an email to a particular group of people
• Video conference or teleconference
1. BUS Topology:
Bus topology is a network type in which every computer and network device is connected to single cable. When it has
exactly two endpoints, then it is called Linear Bus topology.
1. It is cost effective.
4. It is easy to understand.
1. A number of repeaters are used for Ring topology with large number of nodes, because if someone wants to send
some data to the last node in the ring topology with 100 nodes, then the data will have to pass through 99 nodes to
reach the 100th node. Hence to prevent data loss repeaters are used in the network.
2. The transmission is unidirectional, but it can be made bidirectional by having 2 connections between each
3. In Dual Ring Topology, two ring networks are formed, and data flow is in opposite direction in them. Also, if one
ring fails, the second ring can act as a backup, to keep the network up.
4. Data is transferred in a sequential manner that is bit by bit. Data transmitted, has to pass through each node of the
1. Transmitting network is not affected by high traffic or by adding more nodes, as only the nodes having tokens can
transmit data.
EXETENDED-STAR Topology :
In this type of topology all the computers are connected to a single hub through a cable. This hub is the
central node and all others nodes are connected to the central node.
3. Easy to troubleshoot.
5. Only that node is affected which has failed, rest of the nodes can work smoothly.
3. If the hub fails then the whole network is stopped because all the nodes depend on the hub.
MESH Topology
It is a point-to-point connection to other nodes or devices. All the network nodes are connected to each other. Mesh
has n(n-1)/2 physical channels to link n devices.
There are two techniques to transmit data over the Mesh topology, they are :
1. Routing
2. Flooding
1. Partial Mesh Topology : In this topology some of the systems are connected in the same fashion as mesh
topology but some devices are only connected to two or three devices.
2. Full Mesh Topology : Each and every nodes or devices are connected to each other.
1. Fully connected.
2. Robust.
3. Not flexible.
1. Heavily cabled.
2. Costly.
HYBRID Topology :
It is two different types of topologies which is a mixture of two or more topologies. For example if in an office in one
department ring topology is used and in another star topology is used, connecting these topologies will result in
Hybrid Topology (ring topology and star topology).
4. Flexible.
1. Complex in design.
2. Costly.
1. Simplex Mode
SIMPLEX Mode :
In this type of transmission mode, data can be sent only in one direction i.e. communication is unidirectional. We
cannot send a message back to the sender. Unidirectional communication is done in Simplex Systems where we just
need to send a command/signal, and do not expect any response back.
Examples of simplex Mode are loudspeakers, television broadcasting, television and remote, keyboard and monitor
etc.
In full duplex system there can be two lines one for sending the data and the other for receiving data.
Characteristics of LAN :
• LAN's are private networks, not subject to tariffs or other regulatory controls.
• LAN's operate at relatively high speed when compared to the typical WAN.
• There are different types of Media Access Control methods in a LAN, the prominent ones are Ethernet, Token
ring.
• It connects computers in a single building, block or campus, i.e. they work in a restricted geographical area.
Applications of LAN :
• One of the computer in a network can become a server serving all the remaining computers called clients.
Software can be stored on the server and it can be used by the remaining clients.
• Connecting Locally all the workstations in a building to let them communicate with each other locally without
• Sharing common resources like printers etc are some common applications of LAN.
Advantages of LAN :
• Resource Sharing: Computer resources like printers, modems, DVD-ROM drives and hard disks can be shared
with the help of local area networks. This reduces cost and hardware purchases.
• Software Applications Sharing: It is cheaper to use same software over network instead of purchasing separate
• Easy and Cheap Communication: Data and messages can easily be transferred over networked computers.
• Centralized Data: The data of all network users can be saved on hard disk of the server computer. This will help
users to use any workstation in a network to access their data. Because data is not stored on workstations locally.
• Data Security: Since, data is stored on server computer centrally, it will be easy to manage data at only one place
• Internet Sharing: Local Area Network provides the facility to share a single internet connection among all the
LAN users. In Net Cafes, single internet connection sharing system keeps the internet expenses cheaper.
Disadvantages of LAN :
• High Setup Cost: Although the LAN will save cost over time due to shared computer resources, but the initial
• Privacy Violations: The LAN administrator has the rights to check personal data files of each and every LAN
user. Moreover he can check the internet history and computer use history of the LAN user.
• Data Security Threat: Unauthorised users can access important data of an organization if centralized data
• LAN Maintenance Job: Local Area Network requires a LAN Administrator because, there are problems of
software installations or hardware failures or cable disturbances in Local Area Network. A LAN Administrator is
• Covers Limited Area: Local Area Network covers a small area like one office, one building or a group of nearby
buildings.
Characteristics of MAN :
• Communication medium used for MAN are optical fibers, cables etc.
Advantages of MAN :
• Extremely efficient and provide fast communication via high-speed carriers, such as fibre optic cables.
• It provides a good back bone for large network and provides greater access to WANs.
• The dual bus used in MAN helps the transmission of data in both directions simultaneously.
Disadvantages of MAN :
• More cable required for a MAN connection from one place to another.
• It is difficult to make the system secure from hackers and industrial espionage(spying) graphical regions.
Characteristics of WAN:
• Communication medium used are satellite, public telephone networks which are connected by routers .
Advantages of WAN :
• Covers a large geographical area so long distance business can connect on the one network.
• Messages can be sent very quickly to anyone else on the network. These messages can have picture, sounds or
• Expensive things(such as printers or phone lines to the internet) can be shared by all the computers on the network
• Everyone on the network can use the same data. This avoids problems where some users may have older
Disadvantages of WAN :
• Need a good firewall to restrict outsiders from entering and disrupting the network.
• Setting up a network can be an expensive, slow and complicated. The bigger the network the more expensive it is.
• Once set up, maintaining a network is a full-time job which requires network supervisors and technicians to be
employed.
• Security is a real issue when many different people have the ability to use information from other computers.
Protection against hackers and viruses adds more complexity and expense.
Advantages of CAN :
• Cost-effective
• Wireless, versus cable
• Multidepartmental network access
• Single shared data transfer rate (DTR)
Disadvantages of CAN:
1) Though maximum number of nodes are not specified for the network. It supports upto 64 nodes due to electrical
loading.
Cost effective:
No extra wires are needed in this type of network. Also, no extra data charges are involved so PAN is an inexpensive
way of communication.
Easy to use:
It is easy to use. No advanced setup is required.
Reliable:
If you use this type of data connection within 10 meters then your network is stable and reliable.
Secure:
This network is secured because all the devices are authorized before data sharing. Third party injection and data
hacking are not possible in PAN.
Portable:
A person can move devices as it is a wireless network and data exchange is not affected. That mean PAN is portable
as well.
Health problem:
In some cases, PAN uses microwave signals in some digital devices which have a bad effect on the human body like
brain and heart problems may occur.
Network Devices:
1. Hub – A hub is basically a multiport repeater. A hub connects multiple wires coming from different branches,
for example, the connector in star topology which connects different stations. Hubs cannot filter data, so data packets
are sent to all connected devices. In other words, collision domain of all hosts connected through Hub remains one.
Also, they do not have intelligence to find out best path for data packets which leads to inefficiencies and wastage.
Types of Hub
• Active Hub :- These are the hubs which have their own power supply and can clean , boost and relay the
signal along the network. It serves both as a repeater as well as wiring center. These are used to extend
maximum distance between nodes.
• Passive Hub :- These are the hubs which collect wiring from nodes and power supply from active hub.
These hubs relay signals onto the network without cleaning and boosting them and can’t be used to extend
distance between nodes.
2. Routers – A router is a device like a switch that routes data packets based on their IP addresses. Router is
mainly a Network Layer device. Routers normally connect LANs and WANs together and have a dynamically
updating routing table based on which they make decisions on routing the data packets. Router divide broadcast
domains of hosts connected through it.
3. Switch – A switch is a multi port bridge with a buffer and a design that can boost its efficiency (large
number of ports imply less traffic) and performance. Switch is data link layer device. Switch can
perform error checking before forwarding data, that makes it very efficient as it does not forward
packets that have errors and forward good packets selectively to correct port only. In other words,
switch divides collision domain of hosts, but broadcast domain remains same.
IP ADDRESS :
Internet Protocol hierarchy contains several classes of IP Addresses to be used efficiently in various situations as per
the requirement of hosts per network. Broadly, the IPv4 Addressing system is divided into five classes of IP
Addresses. All the five classes are identified by the first octet of IP Address.
Internet Corporation for Assigned Names and Numbers is responsible for assigning IP addresses.
The first octet referred here is the left most of all. The octets numbered as follows depicting dotted decimal notation
of IP Address:
The number of networks and the number of hosts per class can be derived by this formula:
When calculating hosts' IP addresses, 2 IP addresses are decreased because they cannot be assigned to hosts, i.e. the
first IP of a network is network number and the last IP is reserved for Broadcast IP.
Class A Address :
The first bit of the first octet is always set to 0 (zero). Thus the first octet ranges from 1 – 127, i.e.
Class A addresses only include IP starting from 1.x.x.x to 126.x.x.x only. The IP range 127.x.x.x is reserved for
loopback IP addresses.
The default subnet mask for Class A IP address is 255.0.0.0 which implies that Class A addressing can have 126
networks (27-2) and 16777214 hosts (224-2).
Class B Address :
An IP address which belongs to class B has the first two bits in the first octet set to 10, i.e.
Class B IP Addresses range from 128.0.x.x to 191.255.x.x. The default subnet mask for Class B is 255.255.x.x.
Class B has 16384 (214) Network addresses and 65534 (216-2) Host addresses.
Class C Address :
The first octet of Class C IP address has its first 3 bits set to 110, that is:
Class C IP addresses range from 192.0.0.x to 223.255.255.x. The default subnet mask for Class C is 255.255.255.x.
Class C gives 2097152 (221) Network addresses and 254 (28-2) Host addresses.
Class D Address :
Very first four bits of the first octet in Class D IP addresses are set to 1110, giving a range of:
Class D has IP address range from 224.0.0.0 to 239.255.255.255. Class D is reserved for Multicasting. In
multicasting data is not destined for a particular host, that is why there is no need to extract host address from the IP
address, and Class D does not have any subnet mask.
Class E Address :
This IP Class is reserved for experimental purposes only for R&D or Study. IP addresses in this class ranges from
240.0.0.0 to 255.255.255.254. Like Class D, this class too is not equipped with any subnet mask.
OSI LAYERS :
OSI stands for Open Systems Interconnection. It has been developed by ISO – ‘International Organization of
Standardization‘, in the year 1974. It is a 7 layer architecture with each layer having specific functionality to
perform. All these 7 layers work collaboratively to transmit the data from one person to another across the globe.
The lowest layer of the OSI reference model is the physical layer. It is responsible for the actual physical connection
between the devices. The physical layer contains information in the form of bits. It is responsible for the actual
physical connection between the devices. When receiving data, this layer will get the signal received and convert it
into 0s and 1s and send them to the Data Link layer, which will put the frame back together.
1. Bit synchronization: The physical layer provides the synchronization of the bits by providing a clock. This
clock controls both sender and receiver thus providing synchronization at bit level.
2. Bit rate control: The Physical layer also defines the transmission rate i.e. the number of bits sent per second.
3. Physical topologies: Physical layer specifies the way in which the different, devices/nodes are arranged in a
network i.e. bus, star or mesh topolgy.
4. Transmission mode: Physical layer also defines the way in which the data flows between the two connected
devices. The various transmission modes possible are: Simplex, half-duplex and full-duplex.
* Hub, Repeater, Modem, Cables are Physical Layer devices.
** Network Layer, Data Link Layer and Physical Layer are also known as Lower Layersor Hardware Layers.
Subnet Mask
A subnet mask is a number that defines a range of IP addresses that can be used in a network. (It is not something you
wear on your head to keep subnets out.) Subnet masks are used to designate subnetworks, or subnets, which are
typically local networks LANs that are connected to the Internet. Systems within the same subnet can communicate
directly with each other, while systems on different subnets must communicate through a router. Therefore,
subnetworks can be used to partition multiple networks and limit the traffic between them.
A subnet mask hides, or "masks," the network part of a system's IP address and leaves only the host part as the
machine identifier. A common subnet mask for a Class C IP address is 255.255.255.0. Each section of the subnet
mask can contain a number from 0 to 256, just like an IP address. Therefore, in the example above, the first three
sections are full, meaning the IP addresses of computers within the subnet mask must be identical in the first three
sections. The last section of each computer's IP address can be anything from 0 to 255. For example, the IP addresses
10.0.1.201 and 10.0.1.202 would be in the same subnet, while 10.0.2.201 would not. Therefore, a subnet mask of
255.255.255.0 allows for close to 256 unique hosts within the network (since not all 256 IP addresses can be used).
If your system is connected to a network, you can typically view the network's subnet mask number in the
Network control panel (Windows) or System Preference (Mac OS X). Most home networks use the default subnet
mask of 255.255.255.0. However, some office networks may use a different subnet mask such as 255.255.255.128,
which can be used to split a network into two subnets. Large networks with several thousand machines may use a
subnet mask of 255.255.0.0. This is the default subnet mask used by Class B networks. The largest Class A networks
use a default subnet mask of 255.0.0.0.
MAC Address
Stands for "Media Access Control Address," and no, it is not related Apple Macintosh computers. A MAC address is a
hardware identification number that uniquely identifies each device on a network. The MAC address is manufactured
into every network card, such as an Ethernet card or Wi-Fi card, and therefore cannot be changed.
Because there are millions of networkable devices in existence, and each device needs to have a unique MAC address,
there must be a very wide range of possible addresses. For this reason, MAC addresses are made up of six two-
digit hexadecimal numbers, separated by colons. For example, an Ethernet card may have a MAC address of
00:0d:83:b1:c0:8e. Fortunately, you do not need to know this address, since it is automatically recognized by most
networks.