Professional Documents
Culture Documents
Introduction
“Two computers are said to be interconnected
if they interchange information. The
connection between the separate computers
can be done via a copper wire, fiber optics,
microwaves or communication satellite.”
A system with one control unit and many slaves,
or a large computer with remote printers and
terminals is not called network, it is called a
distributed system.
Features
Components
• Servers
• Clients
• Transmission Media
• Shared data
• Shared printers and other peripherals
• Network Interface Card
• Local Operating System
• Network Operating System
• Hub
• Switch
• Router
• LAN Cable
Topologies
• Bus
• Ring
• Star
• Mesh
• Tree
Bus Topology
A bus topology is a multiple data communication circuit, that
makes it relatively simple to control data flow.
A bus topology consists of a single cable with the terminator at
each end.
In a bus topology, one of the nodes acts as the server and
transmits the data from one end to the other in a single
direction.
The Backbone cable in the bus topology depends on the type of
network card used in each computer, an RJ-45 network
cable or coaxial cable is used to connect them together.
Advantages:-
• The cable cost is low.
• Easy to expand.
• Repeater can be used to boost the signal.
• Easy to connect or remove devices in a network without
affecting any other device.
Disadvantage:-
• Heavy network traffic slows down the bus speed.
• In the case of any device failure, it is difficult to find faults in a
network.
• It is slower because one computer transmits at a time.
• It provides very low security because all the computers
receive the sent signal from the source.
Ring Topology
In Ring Topology, each device/node is connected with its
neighboring node forming the shape of ring hence it is known
as Ring Topology.
There are two types of the Ring Topology based on the data
flow:
• Unidirectional and,
• Bidirectional
A Unidirectional ring topology handles data traffic in either
clockwise or anticlockwise direction. This data network, thus,
can also be called as a half-duplex network. A Unidirectional
ring topology is thus easy to maintain compared to the
bidirectional ring topology. The data flow in the ring topology
is based on the Token Passing principal, The token is passed
from one computer to the next, only the computer with the
token can transmit.
Advantages:-
• The uni-directional ring topology provides very high speed.
• It has better performance than bus topology, even when the
nodes are increased.
• Ring network can handle high volume of nodes in a network
(Robust)
• It can handle heavy traffic as compared to bus topology due
to Token passing.
• provides good communication over a long distance.
• maintenance of ring network is much easier than bus.
• no need of network server to control the flow of data.
Disadvantages:-
• Addition and removal of any node in a
network is difficult and can cause issue in
network activity.
• The entire network will be impacted if one
workstation shuts down.
• The hardware needed to connect each
workstation to the network is more expensive
than Ethernet cards and hubs/switches.
Star
A star topology is designed with each node (like workstations,
printers, laptops, servers etc.) connected directly to a central
device called as a network switch. Each workstation has a cable
that goes from its network interface card (NIC) to a network
switch.
A star network, where devices are connected to a central hub or
switch.
Characteristics of Star Topology:
• High Speed
• Very Flexible
• High Reliability
• High Maintainability
Tree
In Tree Topology, all the computer are connected like the
branches of a tree. In Computer Networking, tree topology
is known as a combination of a Bus and Start network
topology. The main advantages of this topology are better
flexibility and scalability.
Tree network topology is the simplest topology in which only
one route exists between any two nodes on the network.
The pattern of connection resembles a tree in which all
branches spring from one root hence (Tree Topology).
Characteristics of Tree Topology:-
• Ideal if nodes are located in groups.
• Used in Wide Area Network.
• Better Flexibility
• Better Scalability
Advantages:-
• It is a combination of bus and star topology
• It provides high scalability, as leaf nodes can add more
nodes in the hierarchical chain.
• Other nodes in a network are not affected, if one of
their nodes get damaged
• It provides easy maintenance and fault identification.
• Supported by several hardware and software vendors.
• Point-to-point wiring for individual segments.
Disadvantages:-
• Large cabling is required as compared to star and bus
topology.
• On the failure of a hub, the entire network fails.
• Tree network is very difficult to configure than
other network topologies.
Mesh
A network setup where each computer and network device is
interconnected with one another, allowing for most
transmissions to be distributed even if one of the connections
go down. It is a topology commonly used for wireless
networks. Below is a visual example of a simple computer
setup on a network using a mesh topology.
Partial Mesh
Partial mesh topology is a way to map multiple routers in such a
way that they are tightly coupled among themselves but not
fully inter-connected.
• Red dotted lines mean the communication is frequent but
there is no direct linkage
• Black line means the connections have frequent
communication between them
Diagram
LAN
1. Local area network is a group of computers connected with
each other in a small places such as school, hospital,
apartment etc.
2. LAN is secure because there is no outside connection with
the local area network thus the data which is shared is safe on
the local area network and can’t be accessed outside.
3. LAN due to their small size are considerably faster, their
speed can range anywhere from 100 to 100Mbps.
4. LANs are not limited to wire connection, there is a new
evolution to the LANs that allows local area network to work
on a wireless connection.
MAN
MAN network covers larger area by connections LANs
to a larger network of computers. In Metropolitan
area network various Local area networks are
connected with each other through telephone lines.
The size of the Metropolitan area network is larger
than LANs and smaller than WANs(wide area
networks), a MANs covers the larger area of a city or
town.
WAN
Wide area network provides long distance transmission of data.
The size of the WAN is larger than LAN and MAN. A WAN can
cover country, continent or even a whole world. Internet
connection is an example of WAN. Other examples of WAN
are mobile broadband connections such as 3G, 4G etc.
Advantages of WAN:
• Centralized infrastructure: One of the main advantage of WAN
is the that we do not need to maintain the backup and store
data on local system as everything is stored online on a data
centre, from where we can access the data through WAN.
• Privacy: We can setup the WAN in such a way that it encrypts
the data that we share online that way the data is secure and
minimises the risk of unauthorized access.
WAN
Intranet
An intranet is a private network that is contained within
an enterprise. Typical intranet for a business
organization consists of many interlinked local area
networks (LAN) and use any Wide Area Network
(WAN) technology for network connectivity. The main
purpose of an intranet is to share company information
and computing resources among employees. Intranet is
a private Internetwork, which is usually created and
maintained by a private organization. The content
available inside Intranet are intended only for the
members of that organization (usually employees of a
company).
Extranet
An extranet can be viewed as part of a company's
intranet that is extended to users outside the
company like suppliers, vendors, partners,
customers, or other business associates.
Extranet is required for normal day-to-day
business activities. For example, placing purchase
order to registered vendors, billing & invoices,
payments related activities, joint venture related
activities, product brochures for partners,
discounted price lists for partners etc.
Diagram
Internet(Public network)
Extranet(Vendor, business
partner)
Intranet
(Company only
inside network)
Differences between
Modes of transmission
What is data transmission?
Data transmission refers to the process of transferring
data between two or more digital devices. Data is
transmitted from one device to another in analog or
digital format. Basically, data transmission enables
devices or components within devices to speak to
each other.
There are two methods used to transmit data between
digital devices: serial transmission and parallel
transmission. Serial data transmission sends data bits
one after another over a single channel. Parallel data
transmission sends multiple data bits at the same
time over multiple channels.
Basis for
Comparison Serial Transmission Parallel Transmission
Number of bits
transferred per clock
pulse 1 bit 8 bits or 1 byte
Speed Slow Fast
Isochronous
• An isochronous data transfer system combines the features
of an asynchronous and synchronous data transfer system.
An isochronous data transfer system sends blocks of data
asynchronously, in other words the data stream can be
transferred at random intervals.
• Each transmission begins with a start packet. Once the
start packet is transmitted, the data must be delivered with
a guaranteed bandwidth. Isochronous data transfer is
commonly used for where data must be delivered within
certain time constraints, like streaming video.
• Isochronous systems do not have an error detection
mechanism (acknowledgment of receipt of packet) because
if an error were detected, time constraints would make it
impossible to resend the data.
• for example:- TV images are broadcast at the rate of
30 images per second; they must be viewed at the
same rate.
• Simplex Mode
Half-Duplex Mode
Full-Duplex Mode
Addressing
• At a particular time, innumerable messages are being
transferred between large numbers of computers. So, a
naming or addressing system should exist so that each
layer can identify the sender and receivers of each
message.
Error Control
• Unreliable channels introduce a number of errors in
the data streams that are communicated. So, the layers
need to agree upon common error detection and error
correction methods so as to protect data packets while
they are transferred.
Flow Control
• If the rate at which data is produced by the
sender is higher than the rate at which data is
received by the receiver, there are chances of
overflowing the receiver. So, a proper flow
control mechanism needs to be implemented.
Resource Allocation
• Computer networks provide services in the form
of network resources to the end users. The main
design issue is to allocate and de-allocate
resources to processes. The allocation/de-
allocation should occur so that minimal
interference among the hosts occurs and there is
optimal usage of the resources.
Statistical Multiplexing
• It is not feasible to allocate a dedicated path for each
message while it is being transferred from the source to the
destination. So, the data channel needs to be multiplexed,
so as to allocate a fraction of the bandwidth or time to each
host.
Routing
• There may be multiple paths from the source to the
destination. Routing involves choosing an optimal path
among all possible paths, in terms of cost and time. There
are several routing algorithms that are used in network
systems.
Security
• A major factor of data communication is to defend it
against threats like eavesdropping and surreptitious
alteration of messages. So, there should be adequate
mechanisms to prevent unauthorized access to data
through authentication and cryptography.
Protocol Hierarchies :
Example :
Below is diagram representing a five-layer network. The
diagram shows communication between Host 1 and Host 2.
The data stream is passed through a number of layers from
one host to other. Virtual communication is represented using
dotted lines between peer layers. Physical communication is
represented using solid arrows between adjacent layers.
Through physical medium, actual communication occurs. The
layers at same level are commonly known as peers. The peer
basically has a set of communication protocols. An interface is
present between each of layers that are used to explain
services provided by lower layer to higher layer.
Advantages :
• The layers generally reduce complexity of
communication between networks
• It increases network lifetime.
• It also uses energy efficiently.
• It does not require overall knowledge and
understanding of network.
OSI TCP/IP
Reference Model
• Reference Model offers a means of standardization which is
acceptable worldwide. Since people using the computer network
are located over a wide physical range and their network devices
might have heterogeneous architecture. In order to provide
communication among heterogeneous devices, we need a
standardized model i.e. a reference model, which would provide us
way how these devices can communicate regardless their
architecture.
We have two reference models such as OSI model
and TCP/IP reference model, however, the OSI model is a
hypothetical one but the TCP/IP is absolutely practical model.
OSI Model
• OSI is acronym of Open System Interconnection. This model is
developed by the International organization of Standardization
(ISO) and therefore also referred as ISO-OSI Model.
• The OSI model consists of seven layers as shown in the following
diagram. Each layer has a specific function, however each layer
provide services to the layer above.
Physical Layer
The Physical layer is responsible for the following activities:
• Activating, maintaining and deactivating the physical
connection.
• Defining voltages and data rates needed for transmission.
• Converting digital bits into electrical signal.
• Deciding whether the connection is simplex, half duplex or
full duplex.
Data Link Layer
The data link layer performs the following functions:
• Performs synchronization and error control for the
information which is to be transmitted over the physical
link.
• Enables error detection, and adds error detection bits to
the data which are to be transmitted.
Network Layer
Following are the functions of Network Layer:
• To route the signals through various channels to the other
end.
• To act as the network controller by deciding which route
data should take.
• To divide the outgoing messages into packets and to
assemble incoming packets into messages for higher levels.
Transport Layer
The Transport layer performs the following functions:
• It decides if the data transmission should take place on
parallel paths or single path.
• It performs multiplexing, splitting on the data.
• It breaks the data groups into smaller units so that they are
handled more efficiently by the network layer.
Session Layer
The Session layer performs the following functions:
• Manages the messages and synchronizes conversations
between two different applications.
• It controls logging on and off, user identification, billing and
session management.
Presentation Layer
The Presentation layer performs the following functions:
• This layer makes it sure that the information is delivered in
such a form that the receiving system will understand and
use it.
Application Layer
The Application layer performs the following functions:
• It provides different services such as manipulation of
information in several ways, retransferring the files of
information, distributing the results etc.
• The functions such as LOGIN or password checking are also
performed by the application layer.
TCP/IP Model
• TCP/IP model is practical model and is used in the Internet.
TCP/IP is acronym of Transmission Control Protocol and
Internet Protocol.
• The TCP/IP model combines the two layers (Physical and Data
link layer) into one layer i.e. Host-to-Network layer. The
following diagram shows the various layers of TCP/IP model:
Application Layer
• This layer is same as that of the OSI model and performs the
following functions:
• It provides different services such as manipulation of
information in several ways, retransferring the files of
information, distributing the results etc.
• The functions such as LOGIN or password checking are also
performed by the application layer.
• Protocols used: TELNET, FTP, SMTP, DN, HTTP, NNTP are the
protocols employed in this layer.
Transport Layer
• It does the same functions as that of transport layer in OSI
model. Here are the key points regarding transport layer:
• It uses TCP and UDP protocol for end to end transmission.
• TCP is reliable and connection oriented protocol.
• TCP also handles flow control.
• The UDP is not reliable and a connection less protocol also
does not perform flow control.
• Protocols used: TCP/IP and UDP protocols are employed in
this layer.
Internet Layer
• The function of this layer is to allow the host to insert
packets into network and then make them travel
independently to the destination. However, the order of
receiving the packet can be different from the sequence
they were sent.
• Protocols used: Internet Protocol (IP) is employed in
Internet layer.
Host-to-Network Layer
• This is the lowest layer in TCP/IP model. The host has to
connect to network using some protocol, so that it can
send IP packets over it. This protocol varies from host to
host and network to network.
• Protocols used: ARPANET, SATNET (Satellite network), ,
LAN, packet radio are the protocols which are used in this
layer.
Multiplexing
Multiplexing is the process of combining multiple
signals into one signal, over a shared medium. If
analog signals are multiplexed, it is Analog
Multiplexing and if digital signals are multiplexed,
that process is Digital Multiplexing.
The process of multiplexing divides a communication
channel into several number of logical channels,
allotting each one for a different message signal or a
data stream to be transferred. The device that does
multiplexing can be simply called as a MUX while the
one that reverses the process which is
demultiplexing, is called as DEMUX.
Types of Multiplexers
There are mainly two types of multiplexers, namely analog and
digital. They are further divided into FDM, WDM, and TDM.
Analog Multiplexing
The analog multiplexing techniques involve signals which are analog in
nature. The analog signals are multiplexed according to their
frequency (FDM) or wavelength (WDM).
Frequency Division Multiplexing (FDM)
In analog multiplexing, the most used technique is Frequency
Division Multiplexing FDM. This technique uses various frequencies
to combine streams of data, for sending them on a communication
medium, as a single signal.
Example: A traditional television transmitter, which sends a number
of channels through a single cable, uses FDM.
Wavelength Division Multiplexing (WDM)
Wavelength Division Multiplexing is an analog technique, in which
many data streams of different wavelengths are transmitted in the
light spectrum. If the wavelength increases, the frequency of the
signal decreases.
Example: Optical fiber Communications use the WDM technique, to
merge different wavelengths into a single light for the
communication.
Digital Multiplexing
The term digital represents the discrete bits of information.
Hence the available data is in the form of frames or packets,
which are discrete.
Time Division Multiplexing (TDM)
In TDM, the time frame is divided into slots. This technique is
used to transmit a signal over a single communication
channel, with allotting one slot for each message. Of all the
types of TDM, the main ones are Synchronous and
Asynchronous TDM.
Synchronous TDM
In Synchronous TDM, the input is connected to a frame. If
there are ‘n’ number of connections, then the frame is
divided into ‘n’ time slots. One slot is allocated for each
input line. In this technique, the sampling rate is common
to all signals and hence same clock input is given. The mux
allocates the same slot to each device at all times.
Asynchronous TDM
In Asynchronous TDM, the sampling rate is different for
each of the signals and the clock signal is also not in
common. If the allotted device, for a time-slot, transmits
nothing and sits idle, then that slot is allotted to another
device, unlike synchronous.
STDM
Sender end
Receiver end
ATDM
Circuit Switching
• Circuit switching is defined as the establishment of a
dedicated communication path between the two parties, or
nodes, within a physical network. This path (circuit) is
established and maintained for the duration of the session.
No matter the length of the communication session, the
circuit will remain and the data paths maintained. The
circuit is only terminated when the session ends. The
session consists of three phases: circuit establishment,
data transfer, and circuit termination/disconnect.
• This type of network switching is well suited for voice
communications and applications. In our illustration, the
two people communicating on the telephone lines from
across the room are using a dedicated communication
path. Their voices (data) follow a dedicated path.
Message Switching
• Message Switching is a switching technique in which a
message is transferred as a complete unit and routed
through intermediate nodes at which it is stored and
forwarded.
• In Message Switching technique, there is no
establishment of a dedicated path between the sender
and receiver.
• The destination address is appended to the message.
Message Switching provides a dynamic routing as the
message is routed through the intermediate nodes
based on the information available in the message.
Packet Switching
• The packet switching is a switching technique
in which the message is sent in one go, but it is
divided into smaller pieces, and they are sent
individually.
• The message splits into smaller pieces known
as packets and packets are given a unique
number to identify their order at the receiving
end.
• Every packet contains some information in its
headers such as source address, destination
address and sequence number.
Applications
Circuit switching
• Traditional telephone system
• Analog telephone network.
• Optical mesh network.
• Public Switched Telephone Network (PSTN)
Message switching
Email is a common application for message switching. A delay in delivering email is allowed
real-time data transfer between two computers.
Packet Switching
Internet and most local area networks
GSM, LTE
Virtual circuits are costlier in installation and maintenance. They are widely
used by ATM (Asynchronous Transfer Mode) Network, which is used for the
Telephone calls. Datagram networks are cheaper as compared to the Virtual
Circuits. They are mainly used by IP network, which is used for Data services
like Internet.