Professional Documents
Culture Documents
Unit-1
Computer Network:
Computer networking refers to interconnected computing devices that
can exchange data and share resources with each other.
1 | Page Giridhar CP
girxdhar@gmail.com
Computer and communication Networks
What is an Internet?
Interconnection of two or more networks together is called an internet.
It's a network of networks.
The Internet is a global network of billions of computers and other
electronic devices. With the Internet, it's possible to access almost any
information, communicate with anyone else in the world, and do much
more.
Data is information that has been translated into a form that is efficient
for movement or processing.
Analog data:
Analog data is a type of data that can represented physically. It takes
continues values
Example for analog data are video and voice. Systems such as
microphones, sensors, headphones collect analog data. This is the data
that’s collected in the real world.
Digital data:
3 | Page Giridhar CP
girxdhar@gmail.com
Computer and communication Networks
Digital Signals:
Digital signal consists of patterns of bits of information.
Digital signal is used to represent discrete values.
Computers store and process data in this pattern.
The data is encoded in discrete values represented in 0s and 1s.
A system of transmitting digital signals is ball baseband system.
They are called binary signal or logical signal.
4 | Page Giridhar CP
girxdhar@gmail.com
Computer and communication Networks
Data codes:
The set of all textual characters or symbols and their corresponding
binary patterns is called a data code.
Computer are represented in form of 0s and 1s.
It’s important to have a universal standard to represent the textual
and numerical and other symbols in binary format.
There are various defined standards to data codes.
Important data codes:
EBCDIC, ASCII and UNICODE
eg.,
ASCII
Character - A
Binary value - 0100 0001
Decimal equivalent – 65
Frequency:
5 | Page Giridhar CP
girxdhar@gmail.com
Computer and communication Networks
Bit Rate:
The number of bits per second that can be transmitted along a digital
network. It’s the rate at which bits is transmitted in the network.
The speed of the data is expressed in
bits per second.
The data R is a function of the
duration of the bit or bit time
R=1/Bit time.
Baud Rate:
The baud rate of a data communications system is the number of
symbols per second transferred.
This can be used to translate baud into a bit rate using the following
formula:
Baud rate refers to the number of signal or symbol changes that occur
per second.
6 | Page Giridhar CP
girxdhar@gmail.com
Computer and communication Networks
Attenuation:
Attenuation is the reduction or loss in the strength of the signal.
It may occur in any type of signal. It may be Analog or digital.
It occurs when transmitting data over large distances.
Network Topologies:
Protocol: The devices in the network use a system of rules and
procedures called communication protocols to transmit information over
physical or wireless technologies.
Network Topology is how computers can connect and relate to one
another in a computer network.
A network topology is the physical and logical arrangement of nodes
and connections in a network.
7 | Page Giridhar CP
girxdhar@gmail.com
Computer and communication Networks
8 | Page Giridhar CP
girxdhar@gmail.com
Computer and communication Networks
2. Star Topology
9 | Page Giridhar CP
girxdhar@gmail.com
Computer and communication Networks
3. Ring Topology.
4. Mesh Topology.
11 | P a g e Giridhar CP
girxdhar@gmail.com
Computer and communication Networks
6.Hybrid Topology
12 | P a g e Giridhar CP
girxdhar@gmail.com
Computer and communication Networks
5. Tree Topology
7. Unconstrained Topology
It refers to the topology in which the connection between the nodes is
established arbitrarily or in simple words in random manner by
establishing point to point links
13 | P a g e Giridhar CP
girxdhar@gmail.com
Computer and communication Networks
Peer-to-Peer(P2P) Networks:
Peer-to-peer network operating systems allow users to share
resources and files located on their computers and to access
shared resources found on other computers.
14 | P a g e Giridhar CP
girxdhar@gmail.com
Computer and communication Networks
Client/Server networks.
Client-server networks are computer networks that use a dedicated
computer (server) to store data, manage/provide resources and control
user access.
The server acts as a central point on the network upon which the other
computers connect to.
A computer that connects to the server is called a client.
15 | P a g e Giridhar CP
girxdhar@gmail.com
Computer and communication Networks
Disadvantages
It requires professional administration.
It is more hardware and software intensive.
It requires expensive dedicated software.
16 | P a g e Giridhar CP
girxdhar@gmail.com
Computer and communication Networks
Transmission Medium
In data communication, a transmission medium is a physical path
between the transmitter (sender) and the receiver
It is the channel through which data is sent from one device to another.
Transmission Media is broadly classified into the following types:
1. Two wire open lines
2. Twisted-pair cable
3. Co-axial cable
4. Fiber-optic cables
Twisted-pair cable
17 | P a g e Giridhar CP
girxdhar@gmail.com
Computer and communication Networks
Co-axial Cable:
18 | P a g e Giridhar CP
girxdhar@gmail.com
Computer and communication Networks
Types of Networks
Different types of Networks include:
1. Local Area Network(LAN):
20 | P a g e Giridhar CP
girxdhar@gmail.com
Computer and communication Networks
21 | P a g e Giridhar CP
girxdhar@gmail.com
Computer and communication Networks
22 | P a g e Giridhar CP
girxdhar@gmail.com
Computer and communication Networks
Note:
Full Form LAN is an acronym for MAN is an acronym WAN is an acronym for
Local Area Network. for Metropolitan Area Wide Area Network.
Network.
Definition and LAN is a network that MAN is a The WAN network spans
Meaning usually connects a small comparatively wider to an even larger locality.
group of computers in a network that covers It has the capacity to
given geographical area. large regions- like connect various countries
towns, cities, etc. together. For example,
the Internet is a WAN.
Network The LAN is private. The MAN can be both The WAN can also be
Ownership Hospitals, homes, private or public. both private or public.
schools, offices, etc., may Many organizations
own it. and telecom operators
may own them.
Maintenance Very easy to design and Comparatively difficult Very difficult to design
and Designing maintain. to design and and maintain.
maintain.
Speed LAN offers a very high MAN offers a WAN offers a low
Internet speed. moderate Internet Internet speed.
speed.
Faulty Tolerance The LAN exhibits a better The MAN exhibits a The WAN also exhibits a
fault tolerance than the lesser fault tolerance. lesser fault tolerance.
rest of the networks.
23 | P a g e Giridhar CP
girxdhar@gmail.com
Computer and communication Networks
Wireless Networks
It refers to the networks that use wireless network connection such as
WiFi, Bluetooth, infrared, etc.
In wireless networks we have the following types:
Wireless LANs − Connects two or more network devices using
wireless distribution techniques.
Wireless MANs − Connects two or more wireless LANs spreading
over a metropolitan area.
Wireless WANs − Connects large areas comprising LANs, MANs
and personal networks.
Wireless PANs – Connects Personal devices of a person to
integrate and facilitating information sharing between them.
24 | P a g e Giridhar CP
girxdhar@gmail.com
Computer and communication Networks
Connectionless service:
In connectionless the data is transferred in one direction from
source to destination without establishing a session connection.
It does not check if destination exists or not or if it prepared to
accept the message and doesn’t receive acknowledgement.
The sender simply starts sending packets called datagrams to the
destination.
This method is not reliable and not suitable to securely transfer
data.
Authentication is not needed in connectionless service.
It is used in video conferencing.
25 | P a g e Giridhar CP
girxdhar@gmail.com
Computer and communication Networks
Advantages of Segmentation:
Many different conversations can be happen at a time on the
network.
Segmentation can increase the reliability of network
communications.
The separate pieces of each message need not travel the same
pathway across the network from source to destination.
If a particular path becomes congested with data traffic or fails, the
data can still be directed towards destination using alternate
pathways.
If a message fails to make it to the destination, only the missing
parts needs to be retransmitted.
26 | P a g e Giridhar CP
girxdhar@gmail.com
Computer and communication Networks
Multiplexing:
Multiplexing is the process of combining multiple signals into one signal,
over a shared medium. If Analog signals are multiplexed, it is Analog
Multiplexing and if digital signals are multiplexed, that process is Digital
Multiplexing.
Multiplexing is a technique by which different streams of transmission
can be simultaneously processed over a shared link.
Multiplexing divides the high capacity medium into low-capacity logical
medium which is then shared by different streams.
Communication is possible over the air (radio frequency), using a
physical media (cable), and light (optical fiber). All mediums are capable
of multiplexing.
When multiple senders try to send over a single medium, a device called
Multiplexer divides the physical channel and allocates one to each.
On the other end of communication, a De-multiplexer receives data from
a single medium, identifies each, and sends to different receivers.
Queueing Delay
The delay that occurs when frames or cells wait in a device before being
forwarded, and often a major component of latency.
After a data packet is received by the destination, the packet will not be
processed by the destination immediately. It has to wait in a queue in
something called a buffer. So, the amount of time it waits in queue
before being processed is called queueing delay.
Throughput vs Bandwidth
Bandwidth and throughput both indicate network performance. The
terms are often used together, but bandwidth refers to capacity, while
throughput details how much data actually transmits. Bandwidth and
throughput are two terms related to network performance.
Bandwidth:
Bandwidth can be defined as the amount of information that can flow
through a network at a given period of time.
It gives the maximum amount of data that can be transmitted.
Insufficient bandwidth can lead to network congestion, which slows
connectivity.
When we say a networks speed is 100Mbps it’s the maximum amount
of data that can be transmitted per second.
We measure bandwidth in bit rate, i.e., bits per second and its units
like mega-bits, giga-bits, etc.
Throughput:
28 | P a g e Giridhar CP
girxdhar@gmail.com
Computer and communication Networks
Network Switching:
Note:
The purpose of communication is to exchange information
between two or more devices.
The simplest form of communication can be achieved by
establishing direct connection between two systems.
This is very impractical and inefficient to establish path solely for
each pair of devices
We could practically establish dynamic connection among different
nodes at various times.
In a communication network each communicating device or node
is connected to a centralized network node.
The interconnected nodes are capable of transmitting data
between stations.
29 | P a g e Giridhar CP
girxdhar@gmail.com
Computer and communication Networks
1. Broadcast network:
In network broadcasting is a group communication method in
which a single node/device transmits the data or information to all
the other nodes.
All the other nodes/stations will receive the data.
This is 1 to many or 1 to all communication method.
Example: Radio system.
The two conventional topologies that are used for broadcasting
are star topology and bus topology.
2. Switched Networks:
When there is a large network, and a new device is added to it’s
impractical to add point-to-point connection to all the devices that are
present within the network.
Communication of data can be facilitated by interlinking devices.
Some types of inter-connectivity include
1. Point-to-point connection like in mesh topology.
2. Centralized connection as in star topology.
3. Bus topology is impractical when stretched to longer distances.
30 | P a g e Giridhar CP
girxdhar@gmail.com
Computer and communication Networks
31 | P a g e Giridhar CP
girxdhar@gmail.com
Computer and communication Networks
2. Data Transfer:
Once the circuit has been established, data and voice are
transferred from the source to the destination.
The dedicated connection remains as long as the end parties
communicate.
3. Circuit Disconnection: When data transfer is complete, the
connection is relinquished. The disconnection is initiated by any
one of the user. Disconnection involves removal of all intermediate
links from the sender to the receiver.
32 | P a g e Giridhar CP
girxdhar@gmail.com
Computer and communication Networks
All the nodes that are dedicated to establish the connection should
solely be available for transmission of data among them not for any
other purpose.
33 | P a g e Giridhar CP
girxdhar@gmail.com
Computer and communication Networks
34 | P a g e Giridhar CP
girxdhar@gmail.com
Computer and communication Networks
Reference Notes:
Round Trip time: RTT is the length time it takes for a data packet to be
sent to a destination plus the time it takes for an acknowledgment of
that packet to be received back at the origin or sender.
Latency: In computer networking, latency is an expression of how much
time it takes for a data packet to travel from one designated point to
another.
Latency=Propagation delay + Serialization delay + Queueing delay +
Processing delay.
Transmission delay is the time from when the first bit of a file reaches a
link to when the last bit reaches the link. The transmission delay is
calculated as the size of the file divided by the data rate of the link.
35 | P a g e Giridhar CP
girxdhar@gmail.com
Computer and communication Networks
36 | P a g e Giridhar CP
girxdhar@gmail.com
Computer and communication Networks
Protocol:
Protocol stack:
A protocol stack refers to a group of protocols that are running
concurrently that are employed for the implementation of network
protocol suite.
It’s a complete set of network protocol layers that work together to
provide networking capabilities. It is called a stack because it is typically
designed as a hierarchy of layers, each supporting the one above it and
using those below it.
The protocols in a stack determine the interconnectivity rules for a
layered network model such as in the OSI or TCP/IP models.
The number of layers can vary between models.
For example, TCP/IP has 5 layers. OSI has 7 layers.
In order for 2 devices to communicate they need to have the same
protocol stack.
It allows computers running different OS to communicate easily.
(Brief info)
38 | P a g e Giridhar CP
girxdhar@gmail.com
Computer and communication Networks
(Complete structure)
39 | P a g e Giridhar CP
girxdhar@gmail.com
Computer and communication Networks
40 | P a g e Giridhar CP
girxdhar@gmail.com
Computer and communication Networks
(description)
The Layers in the OSI reference model are
1. Physical Layer
2. Data link layer
3. Network layer
4. Transport layer
5. Session layer
6. Presentation layer
7. Application layer.
To remember the order(All People Should Try New Dominos Pizza)
(APSTNDP) bottom-to-top layers.
This order works from bottom-to-top when sending the message and
it works top-to-bottom while receiving the message.
Application, Presentation and Session are software layers and they
reside in software application level.
Transport layer is an interface between software and hardware layers. So
it’s heart of OSI.
Rest are hardware layers.
7 Application Layer:
Application layer protocols are rules and services used by end
networking applications such as browsers to get the task done to the
user.
Application layer is used by the network applications. It means computer
applications that use the internet.
Chrome, Firefox, Outlook, skype, etc.
These apps are dependent on ALP (Application layer protocols) for their
functioning.
41 | P a g e Giridhar CP
girxdhar@gmail.com
Computer and communication Networks
For example, Protocols include HTTP, HTTPs, FTP, NFS, FMTP, DHCP,
SNMP, TELNET, POP3, IMAP, IRC, NNTP.
6. Presentation Layer:
It performs the following operations:
1. Translation:
The data received will be mostly in the form of textual data.
Presentation layer will convert this alpha numeric data into its equivalent
binary representation. i.e, ASCII, EBCDIC,UNICODE, etc.
5. Session Layer:
Following are the operations performed by the Session layer.
Setting up and managing the connections
Enabling sending and receiving the data followed by termination or
connection or sessions.
Session Management:
Session layer keeps the track of file that is being downloaded.
The type of data, speed of transfer, error rate and other information
regarding the data and transaction will be recorded.
Session layer keeps track of which data packet belongs to which file. Text
or image file and tracks where the received packet goes, etc.
Imp: Web browser performs all functions of Session, Presentation and
Application layer.
Protocols of Session Layer:
Remote Procedure Call Protocol (RPCP)
Password Authentication Protocol (PAP)
Real-time Transport Control Protocol (RTCP)
Note: All the images, HTML, CSS, JS are all stored as separate files on the
web server. When I request for a web page to web server it. Web server
opens a session to the web server to download each of the text and
image files separately. These are received in the form of data packets.
And then later combine it.
Note: NETBIOS (Network Basic Input Output System) is an example for
API which allows applications on different computers to communicate
with each other.
44 | P a g e Giridhar CP
girxdhar@gmail.com
Computer and communication Networks
4. Transport layer:
It controls the reliability of end to end connection and communication
through Segmentation, flow control and error control.
1. Segmentation:
Data received from session layer is divided into small manageable data
units called segments.
Each segment will contain source and destination port number and a
sequence number.
Port number helps to direct data to correct application.
Sequence number helps to re-assemble segments in correct order to
form correct message at receivers end.
45 | P a g e Giridhar CP
girxdhar@gmail.com
Computer and communication Networks
3. Network layer:
Data segments are transferred to Network layer.
It works for transmission of
It works for the transmission of the received data segments from sender
to the receiver located in different networks.
Data units in NL are called packets. It’s the layer where routers reside.
The functions of Network layer are
Logical addressing
Routing
Path determination
IP addresses are assigned to ensure that each packet can reach the
correct destination.
Routing: Routing is the method of moving the data packets from source
to destination. It is based on logical address format of IPv4 or IPv6
FB will have attach source and destination to Data packet.
225.225.225.0 ->Subnet (It tells first 3 combinations represent network,
last combination represents host or computer B)
46 | P a g e Giridhar CP
girxdhar@gmail.com
Computer and communication Networks
192.168.3.2 ->
192.168.2.1 ->
47 | P a g e Giridhar CP
girxdhar@gmail.com
Computer and communication Networks
Physical addressing:
DLL takes care of physical addressing
MAC addresses of sender and receiver are assigned to each packet to
form a data frame. .
DLL is embedded as software in NIC of computer and provides means to
transfer data between computers via., local media. It includes Copper
wire, optical fibre, Air for radio signals.
It controls how data is placed and received from the media. (Media
Access Control and error detection, error control, flow control, access
control)
Physical Layer:
Physical layer will convert data in binary form into signals and transmit
over local media.
It can be electromagnetic signal in case of copper cable.
Light signal in case of optical fibre cable and radio signal in case of air.
Signal generated by physical generated by physical layer depends on the
type of media used to connect two devices.
At receivers end It receives the signal convert it to bits. And pass it to
data LL as frames. makes the senders message visible in the application
in the receiver’s computer screen.
Physical layer protocols and devices:
Cables, hubs, repeaters, etc.
48 | P a g e Giridhar CP
girxdhar@gmail.com
Computer and communication Networks
TCP/IP sounds like it’s comprised of 2 protocols only TCP and IP,
however numerous protocols bundled at different layers.
49 | P a g e Giridhar CP
girxdhar@gmail.com
Computer and communication Networks
Application layer:
It is the top most layer. It includes protocols which which help in
communication between host program interface and transport level
services to use the network.
It generates a message which is passed to the lower layers
This layer is comparable to Application, presentation and session layers
of the OSI model all combined into one.
This layer is used by user applications to pass messages from one
computer to another in a network. Browsers, etc.
Example,
50 | P a g e Giridhar CP
girxdhar@gmail.com
Computer and communication Networks
Transport Layer;
At sending node the transport layer receives messages from the
application layer. When message reaches one of the protocols i.e., TCP
or UDP is selected.
TCP supports segmentation if message is large TCP divides it into
segments or smaller pieces and adds a
UDP facilitates these protocols. DNS DHCP SNMP RIP protocols.
TCP. Connection establishment is 3-way connection handshake.
Data Transfer Features
Error Free data transfer - Checksum Calculates the checksum value.
If checksum value doesn’t match then TCP segment is cancelled and no
acknowledgement is sent. When it doesn’t receive acknowledgment.
Ordered data transfer - TCP adds sequence number in a TCP segment
at the receiving end TCP modules use the sequence number to construct
the application message in the correct order.
It’s a 4 way handshake process. This is how TCP handles data transfer.
Main protocols
TCP and UDP
Internet Layer:
It’s same as network layer in OSI reference model.
Their purpose is to route the packets to the destination through the best
possible path.
Routing and delivery of the data is responsibility of this layer.
It allows communication across networks with same or different
protocols.
As the path in which the data is transferred is not predetermined, the
packets may be received out in random fashion without any order. The
upper layer will reorder the data.
Main protocols:
IP(Internet Protocol)
ICMP(Internet Control Message Protocol)
ARP(Address Resolution Protocol)
52 | P a g e Giridhar CP
girxdhar@gmail.com
Computer and communication Networks
53 | P a g e Giridhar CP
girxdhar@gmail.com
Computer and communication Networks
Reference:
The data in different layers of TCP/IP protocol are called
Application – Application message
Transport – TCP segment /UDP datagram
Network – IP packet
Data Link – Ethernet frame
Physical – Signals(It can be electrical, light signal, radio signal)
TCP vs UDP
Error checking
Extensive error checking and Basic error checking mechanism
54 | P a g e Giridhar CP
girxdhar@gmail.com
Computer and communication Networks
55 | P a g e Giridhar CP
girxdhar@gmail.com
Computer and communication Networks
56 | P a g e Giridhar CP
girxdhar@gmail.com
Computer and communication Networks
Understanding Ports.
Every computer has a single physical connection to the network. All the
data destined will arrives through that connection.
A port number is used to uniquely identify an application among several
others running on the computer.
Ports are identified by a 16-bit number. They range from 0-65,535
Ports from 0-1023 are reserved.
Examples.
Port Protocols
21 File Transfer Protocol
23 Telnet Protocol
25 Simple Mail Transfer Protocol
80 Hyper Text Transfer Protocol.
57 | P a g e Giridhar CP
girxdhar@gmail.com
Computer and communication Networks
Networking Devices:
Network devices are physical devices that enable communication and
interaction between hardware on a computer network.
End devices:
End devices refers to those devices which sit on edge of network
connection. A source or destination device in a networked system. For
example, a user's PC is an end device, and so is a server.
They are also called hosts because they hosts because they host the
application level programs such as web browser or electronic mail
program.
It’s also known as a node.
Every node has a unique network address, sometimes called Media
Access Control (MAC) address or Data Link Control(DLC) address.
What role a host plays is determined by the software installed in the
node. It can act as a client server or both.
Computers such as workstations, laptops, tablets, smartphones etc.
Servers such as file servers and web servers
Network devices : Printers and scanners
Eg., computer, printer, VoIP phones, mobile phone, security camera, etc.
Intermediary devices
Intermediary devices interconnect end devices.
These devices provide connectivity and work behind the scenes to
ensure that data flows across the network.
Intermediary devices connect the individual hosts to the network and
can connect multiple individual networks to form an internetwork
(internet)
58 | P a g e Giridhar CP
girxdhar@gmail.com
Computer and communication Networks
Example:
Network Access Devices(hubs, switches, etc)
Internetworking Devices(Routers)
Communication servers and modems
59 | P a g e Giridhar CP
girxdhar@gmail.com
Computer and communication Networks
Connectivity devices:
Connectivity devices are those devices that are used to make physical
network connections.
They work at physical layer of OSI model.
Connectivity devices:
1. Network Interface cards:
Functions of NIC
NIC is used to convert data into a digital signal.
60 | P a g e Giridhar CP
girxdhar@gmail.com
Computer and communication Networks
In the OSI model, NIC uses the physical layer to transmit signals
and the network layer to transmit data packets.
NIC offers both wired (using cables) and wireless (using Wi-Fi)
data communication techniques.
NIC is a middleware between a computer/server and a data
network or Internet.
NIC operates on both physical as well as the data link layer of
the OSI model.
Transceivers:
61 | P a g e Giridhar CP
girxdhar@gmail.com
Computer and communication Networks
Amplifier:
62 | P a g e Giridhar CP
girxdhar@gmail.com
Computer and communication Networks
BASIS FOR
REPEATER AMPLIFIER
COMPARISON
Basic It decodes the signal and extract It just increases the amplitude of
retransmit it.
Noise Repeater eliminates the noise by Amplifier amplifies the signal along
Properties High gain and low output Low gain and high output power.
power.
environment.
63 | P a g e Giridhar CP
girxdhar@gmail.com
Computer and communication Networks
BASIS FOR
REPEATER AMPLIFIER
COMPARISON
using the device ratio hence decreases the error levels, therefore, increases the
Thick wire can transmit upto 500 mts and then can be extended by using
repeaters.
Thin wire 185 mts and then might require repeaters.
Repeaters perform no action on the data.
Repeaters may be a separate device or a part of hub.
Hubs:
64 | P a g e Giridhar CP
girxdhar@gmail.com
Computer and communication Networks
Internetworking devices:
Bridges:
A bridge accepts all the packets and amplifies all of them to the other
side. The bridges are intelligent devices that allow the passing of only
selective packets from them.
A bridge only passes those packets addressed from a node in one
network to another node in the other network.
65 | P a g e Giridhar CP
girxdhar@gmail.com
Computer and communication Networks
66 | P a g e Giridhar CP
girxdhar@gmail.com
Computer and communication Networks
Translational Bridge:
Translational Bridges are useful to connect segments running at different
speeds or using different protocols such as token Ring and Ethernet
networks.
Depending on the direction of travel, a Translational Bridge can add or
remove information and fi elds from frame as needed.
Source-Route Bridge
It decides the route between two hosts. The entire frame route is
contained within a single frame in this bridge. As a result, the bridge will
make precise decisions about how the structure will be forwarded over
the network.
The data link layer is connected to two similar network segments using
this method. It can be done in a distributed manner wherever the
bridging algorithm combines end stations.
Switches:
A network switch is a physical device that operates at the Data Link layer
of the OSI model (Layer 2).
67 | P a g e Giridhar CP
girxdhar@gmail.com
Computer and communication Networks
Switches can also operate at the Network Layer (Layer 3) where routing
occurs.
Working of a switch:
Once a device is connected to a switch, the switch notes its media access
control (MAC) address (a code written in device’s network-interface card
(NIC).)
The NIC attaches to an Ethernet cable that connects to the switch. The
switch uses the MAC address to identify which device’s outgoing packets
are being sent, and where to deliver incoming packets.
The MAC address identifies the physical device and doesn’t change,
while the network layer (Layer 3) IP address, can be assigned dynamically
to a device and change over time. (Think of a MAC address as the VIN
number on a car, and the IP address as the license plate.)
When a packet enters the switch, the switch reads its header, then
matches the destination address or addresses and sends the packet out
through the appropriate ports that lead to the destination devices.
To reduce the chance for collisions between network traffic going to and
from a switch and a connected device at the same time, most switches
offer full-duplex functionality in which packets coming from and going
to a device have access to the full bandwidth of the switch connection.
68 | P a g e Giridhar CP
girxdhar@gmail.com
Computer and communication Networks
While it’s true that switches operate at Layer 2, they can also operate at
Layer 3, which is necessary for them to support virtual LANs (VLANs),
logical network segments that can span subnets.
In order for traffic to get from one subnet to another it must pass
between switches, and this is facilitated by routing capabilities built into
the switches.
Switching methods:
Cut-through switching:
It is a packet switching method. switching data frame or data packets,
where the switching device forwards the frames or packets as soon as
the destination address is processed without waiting for the rest of the
data to be received.
It takes into memory the destination MAC address (First 6 bytes of
frame) before making switching decision.
It may transmit bad frames.
It reduces delay.
Fragment-Free switching:
It’s an advances form of cut-through switching technique.
In this type the switch along with the MAC address will also read at least
64 bytes of ethernet frame before switching.
It is to avoid forwarding ethernet runt frames.(Ethernet frames smaller
than 64 bytes). It assumes that the frame hasn’t gone through a collision
If the checking returns a positive result.
Adaptive Switching:
This is a switching technique which is configured by the user to maximise
the efficiency of the switch.
Switching begins with the user-specified method ie. Cut through or store
and forward. Depending on the errors on the port the mode changes to
the best of two switching methods.
This optimizes the switch's performance by providing higher speed cut-
through switching if error rates are low but higher throughput store-
and-forward switching when error rates are high.
70 | P a g e Giridhar CP
girxdhar@gmail.com
Computer and communication Networks
Routers:
Types of Routers:
1. Interior networks:
Interior network works within networks.
They handle packets travelling between the nodes on the same
intra-network.
71 | P a g e Giridhar CP
girxdhar@gmail.com
Computer and communication Networks
Border routers:
Border network exists in one network and its function is to connect that
network with outside networks, including the internet.
They discover routes within interior networks and outside networks like
internet.
They handle incoming and outgoing traffic to a network.
Exterior routers:
They do not exist within a particular network but they bridge ways
between networks when data is being transmitted to its destination.
Exterior routers do not store routes to particular hosts but they store
routes to other routers.
Its role is to receive the packet and then forward it to direction of their
destination.
72 | P a g e Giridhar CP
girxdhar@gmail.com
Computer and communication Networks
Gateways:
73 | P a g e Giridhar CP
girxdhar@gmail.com
Computer and communication Networks
Types of Gateways
1. Default gateway:
It’s required for nodes that are part of an internetwork.
A default gateway is the node in a computer network using the
Internet protocol suite that serves as the forwarding host (router) to
other networks when no other route specification matches the
destination IP address of a packet.
2. Multiple gateway:
It’s used as a substitute to default gateway to transfer packets when
default packet becomes unavailable.
Principle of The routers usually work on the third layer of The gateway interprets the
Working a protocol, and they transmit data packets system of networks as
from system to system. A route functions to endpoints from packet to
choose the path of the network for packet.
transporting the data packets.
Hosting The router is available for only dedicated One can easily host a gateway
applications. on physical servers, virtual
applications, as well as
dedicated applications.
Networks A router routes various data packets via a A gateway acts as a connection
similar set of networks. between two very different
networks.
OSI Layer A router can easily operate on three and four A gateway can only operate on
layers only. five layers.
Associated You can also call a router an internet router You can also call a gateway a
74 | P a g e Giridhar CP
girxdhar@gmail.com
Computer and communication Networks
Operating For operating a router, one needs to install For working, a gateway
Process of different routes (of data) for the different distinguishes between the
Components given networks. Here, the destination structure of a network and the
address depends on the available traffic. components available outside
of it.
Firewalls:
75 | P a g e Giridhar CP
girxdhar@gmail.com