Professional Documents
Culture Documents
Module-01
Syllabus
Chapter-01: Introduction to networks: Network hardware, Network software, Reference
models,
Chapter-01
Introduction to networks
• “A computer network is a group of computers linked to each other that enables the
computer to communicate with another computer and share their resources, data, and
applications... “
• The aim of the computer network is the sharing of resources among various devices.
• In the case of computer network technology, there are several types of networks that vary
from simple to complex level.
• NIC is a device that helps the computer to communicate with another device.
• The network interface card contains the hardware addresses, the data-link layer protocol
uses this address to identify the system on the network so that it transfers the data to the
correct destination.
There are two types of NIC: wireless NIC and wired NIC.
• Wireless NIC: All the modern laptops use the wireless NIC. In Wireless NIC, a connection
is made using the antenna that employs the radio wave technology.
• Wired NIC: Cables use the wired NIC to transfer the data over the medium.
Hub
• Hub is a central device that splits the network connection into multiple devices. When
computer requests for information from a computer, it sends the request to the Hub. Hub
distributes this request to all the interconnected computers.
Switches
• Switch is a networking device that groups all the devices over the network to transfer the
data to another device.
• A switch is better than Hub as it does not broadcast the message over the network, i.e., it
sends the message to the device for which it belongs to.
• Therefore, we can say that switch sends the message directly from source to the destination.
Cable is a transmission media that transmits the communication signals. There are three types of
cables:
• Twisted pair cable: It is a high-speed cable that transmits the data over 1Gbps or more.
• Coaxial cable: Coaxial cable resembles like a TV installation cable. Coaxial cable is more
expensive than twisted pair cable, but it provides the high data transmission speed.
• Fibre optic cable: Fibre optic cable is a high-speed cable that transmits the data using light
beams. It provides high data transmission speed as compared to other cables. It is more
expensive as compared to other cables, so it is installed at the government level.
Router
Modem
• Modem connects the computer to the internet over the existing telephone line. A modem
is not integrated with the computer motherboard.
• A modem is a separate part on the PC slot found on the motherboard.
Network Hardware
• Local Area Network is a group of computers connected to each other in a small area such
as building, office.
• LAN is used for connecting two or more personal computers through a communication
medium such as twisted pair, coaxial cable, etc.
• It is less costly as it is built with inexpensive hardware such as hubs, network adapters, and
ethernet cables.
• The data is transferred at an extremely faster rate in Local Area Network.
• Local Area Network provides higher security.
• Body Area Network: Body Area Network is a network that moves with a person. For
example, a mobile network moves with a person. Suppose a person establishes a network
connection and then creates a connection with another device to share the information.
• Offline Network: An offline network can be created inside the home, so it is also known
as a home network. A home network is designed to integrate the devices such as printers,
computer, television but they are not connected to the internet.
• Small Home Office: It is used to connect a variety of devices to the internet and to a
corporate network using a VPN.
• A Wide Area Network is a network that extends over a large geographical area such as
states or countries.
• A Wide Area Network is quite bigger network than the LAN.
• A Wide Area Network is not limited to a single location, but it spans over a large
geographical area through a telephone line, fibre optic cable or satellite links.
• The internet is one of the biggest WAN in the world.
• A Wide Area Network is widely used in the field of Business, government, and education.
Internetwork
NETWORK SOFTWARE
Protocol Hierarchies
• To reduce their design complexity, most networks are organized as a stack of layers or
levels, each one built upon the one below it.
• The number of layers, the name of each layer, the contents of each layer, and the function
of each layer differ from network to network.
• The purpose of each layer is to offer certain services to the higher layers while shielding
those layers from the details of how the offered services are actually implemented.
• When layer n on one machine carries on a conversation with layer n on another machine,
the rules and conventions used in this conversation are collectively known as the layer n
protocol.
• Basically, a protocol is an agreement between the communicating parties on how
communication is to proceed.
• A five-layer network is illustrated in Fig
• the entities comprising the corresponding layers on different machines are called peers.
• The peers may be software processes, hardware devices, or even human being.
• Below layer 1 is the physical medium through which actual communication occurs.
• virtual communication is shown by dotted lines and physical communication by solid
lines.
• Between each pair of adjacent layers is an interface.
• A set of layers and protocols is called a network architecture.
• A list of the protocols used by a certain system, one protocol per layer, is called a
protocol stack.
• In this example, M is split into two parts, M 1 and M 2 , that will be transmitted
separately.
• Layer 3 decides which of the outgoing lines to use and passes the packets to layer 2.
• Layer 2 adds to each piece not only a header but also a trailer, and gives the resulting
Reliability
• Network channels and components may be unreliable, resulting in loss of bits while data
transfer.
Scalability
• Networks are continuously evolving. The sizes are continually increasing leading to
congestion.
Addressing
• At a particular time, innumerable messages are being transferred between large numbers
of computers.
Error Control
• Unreliable channels introduce a number of errors in the data streams that are
communicated.
Flow Control
• If the rate at which data is produced by the sender is higher than the rate at which data is
Resource Allocation
• Computer networks provide services in the form of network resources to the end users.
• The allocation/deallocation should occur so that minimal interference among the hosts
Statistical Multiplexing
• It is not feasible to allocate a dedicated path for each message while it is being transferred
• So, the data channel needs to be multiplexed, so as to allocate a fraction of the bandwidth
Routing
• There may be multiple paths from the source to the destination. Routing involves choosing
an optimal path among all possible paths, in terms of cost and time.
• There are several routing algorithms that are used in network systems.
Security
• So, there should be adequate mechanisms to prevent unauthorized access to data through
Service Primitives
• A protocol, in contrast, is a set of rules governing the format and meaning of the packets,
REFERENCE MODELS
• The model is called the ISO OSI (Open Systems Interconnection) Reference Model
because it deals with connecting open system that is, systems that are open for
• OSI stands for Open System Interconnection is a reference model that describes how
• OSI consists of seven layers, and each layer performs a particular network function.
• OSI model was developed by the International Organization for Standardization (ISO) in
communications.
There are the seven OSI layers. Each layer has different functions. A list of seven layers are
given below
1. Physical Layer
2. Data-Link Layer
3. Network Layer
4. Transport Layer
5. Session Layer
6. Presentation Layer
7. Application Layer
1. Physical layer
• The physical layer is concerned with transmitting raw bits over a communication channel.
The main functionality of the physical layer is to transmit the individual bits from one node
to another node.
• It is the lowest layer of the OSI model.
• It establishes, maintains and deactivates the physical connection.
• It specifies the mechanical, electrical and procedural network interface specifications.
• The lowest layer in the model, the link layer describes what links such as serial lines and
classic Ethernet must do to meet the needs of this connectionless internet layer.
• It is not really a layer at all, in the normal sense of the term, but rather an interface between
hosts and transmission links.
Internet Layer
Transport Layer
The transport layer is responsible for the reliability, flow control, and correction of data which is
being sent over the network.
The two protocols used in the transport layer are User Datagram protocol and Transmission control
protocol.
• Source port address: The source port address is the address of the application program
that has created the message.
• Destination port address: The destination port address is the address of the application
program that receives the message.
• Total length: It defines the total number of bytes of the user datagram in bytes.
• Checksum: The checksum is a 16-bit field used in error detection.
• UDP does not specify which packet is lost. UDP contains only checksum; it does not
contain any ID of a data segment.
Application Layer
1. Bad timing.
2. Bad technology.
3. Bad implementations.
4. Bad politics.
1. Bad Timing
• it is essential that the standards be written in the trough in between the two
‘‘elephants.’’
• they are written too late, so many companies may have already made major
investments in different ways of doing things that the standards are effectively
ignored.
2. Bad technology.
• The second reason that OSI never caught on is that both the model and the protocols
are flawed.
• The choice of seven layers was more political than technical, and two of the layers
(session and presentation) are nearly empty, whereas two other ones (data link and
network) are overfull.
3. Bad Implementations
• In contrast, one of the first implementations of TCP/IP was part of Berkeley UNIX
and was quite good (not to mention, free).
• People began using it quickly, which led to a large user community, which led to
improvements, which led to an even larger community.
4. Bad Politics
• OSI, on the other hand, was widely thought to be the creature of the European
telecommunication ministries, the European Community, and later the U.S.
Government.
Chapter-02
Physical Layer
• The physical layer is the first and lowest layer from the bottom of the 7-layered OSI
model and delivers security to hardware.
• This layer is in charge of data transmission over the physical medium. It is the most
complex layer in the OSI model.
• The physical layer converts the data frame received from the data link layer into bits, i.e.,
in terms of ones and zeros.
• It maintains the data quality by implementing the required protocols on different network
modes and maintaining the bit rate through data transfer using a wired or wireless
medium.
Fourier Analysis
where f = 1/T is the fundamental frequency, an and bn are the sine and cosine amplitudes of the
nth harmonics (terms), and c is a constant. Such a decomposition is called a Fourier series.
Bandwidth-Limited Signals
• The width of the frequency range transmitted without being strongly attenuated is called
the bandwidth.
• Signals that run from 0 up to a maximum frequency are called baseband signals.
• Signals that are shifted to occupy a higher range of frequencies, as is the case for all
wireless transmissions, are called passband signals.
One of the main objectives of data communications is to increase the data rate.
There are three factors that determine the data rate of a channel:
Nyquist bit rate was developed by Henry Nyquist who proved that the transmission capacity of
even a perfect channel with no noise has a maximum limit.
For example, if there is a noiseless channel with a bandwidth of 4 KHz that is transmitting a
signal with 4 discrete levels, then the maximum bit rate will be computed as, maximum bit rate
= 2 × 4000 × log24 = 16,000 bps = 16 kbps
Shannon's Capacity
Claude Shannon extended Nyquist's work for actual channels that are subject to noise.
Since SNR is the ratio of two powers that varies over a very large range, it is often expressed in
decibels, called SNRdb and calculated as: SNRdb = 10log10SNR.
Shannon's Capacity gives the theoretical maximum data rate or capacity of a noisy channel. It is
expressed as:
For example, if the bandwidth of a noisy channel is 4 KHz, and the signal to noise ratio is 100,
then the maximum bit rate can be computed as:
Media are roughly grouped into guided media, such as copper wire and fiber optics, and
unguided media, such as terrestrial wireless, satellite, and lasers through the air.
Magnetic Media
• One of the most convenient ways to transfer data from one computer to another, even
before the birth of networking, was to save it on some storage media and transfer physical
from one station to another.
• Though it may seem old-fashion way in today’s world of high-speed internet, but when
the size of data is huge, the magnetic media comes into play.
• For example, a bank has to handle and transfer huge data of its customer, which stores a
backup of it at some geographically far-away place for security reasons and to keep it
from uncertain calamities.
Twisted Pairs
• Twisted pair is a physical media made up of a pair of cables twisted with each other. A
twisted pair cable is cheap as compared to other transmission media.
• Installation of the twisted pair cable is easy, and it is a lightweight cable. The frequency
range for twisted pair cable is from 0 to 3.5KHz.
• A twisted pair consists of two insulated copper wires arranged in a regular spiral pattern.
A shielded twisted pair is a cable that contains the mesh surrounding the wire that allows the
higher transmission rate.
• The cost of the shielded twisted pair cable is not very high and not very low.
• An installation of STP is easy.
• It has higher capacity as compared to unshielded twisted pair cable.
• It has a higher attenuation.
• It is shielded that provides the higher data transmission rate.
Disadvantages
Coaxial Cable
• Coaxial cable is very commonly used transmission media, for example, TV wire is
usually a coaxial cable.
• The name of the cable is coaxial as it contains two conductors parallel to each other.
• It has a higher frequency as compared to Twisted pair cable.
• The inner conductor of the coaxial cable is made up of copper, and the outer conductor is
made up of copper mesh. The middle core is made up of non-conductive cover that
separates the inner conductor from the outer conductor.
• The middle core is responsible for the data transferring whereas the copper mesh prevents
from the EMI (Electromagnetic interference).
Power Lines
• Power line communications (PLC) allows data communications over conductors that are
simultaneously used for transmission of electrical power.
• PLCs work by adding a modulated carrier signal, formed by superimposing data signal
over low frequency power signal. Electrical signals transmit at 50 – 60 Hz, while the data
signals transmit in the order of MHz.
• PLCs are also known as power line carrier, power line digital subscriber line (PDSL), or
power line networking (PLN).
Fibre Optic
• Fibre optic cable is a cable that uses electrical signals for communication.
• Fibre optic is a cable that holds the optical fibres coated in plastic that are used to send
the data by pulses of light.
• The plastic coating protects the optical fibres from heat, cold, electromagnetic
interference from other types of wiring.
• Fibre optics provide faster data transmission than copper wires.
• Core: The optical fibre consists of a narrow strand of glass or plastic known as a core. A
core is a light transmission area of the fibre. The more the area of the core, the more light
will be transmitted into the fibre.
• Cladding: The concentric layer of glass is known as cladding. The main functionality of
the cladding is to provide the lower refractive index at the core interface as to cause the
reflection within the core so that the light waves are transmitted through the fibre.
• Jacket: The protective coating consisting of plastic is known as a jacket. The main
purpose of a jacket is to preserve the fibre strength, absorb shock and extra fibre
protection.
Fiber Cables
• Fiber optic cables are similar to coax, except without the braid.
• Figure shows a single fiber viewed from the side.
• At the center is the glass core through which the light propagates. In multimode fibers,
the core is typically 50 microns in diameter, about the thickness of a human hair.
• In single-mode fibers, the core is 8 to 10 microns.
WIRELESS TRANSMISSION
• A second form of spread spectrum, direct sequence spread spectrum, uses a code
sequence to spread the data signal over a wider frequency band.
• These signals can be given different codes, a method called CDMA (Code Division
Multiple Access)
Radio Transmission
• Low and medium frequency radio waves can pass through obstacles and have ground
propagation. However, the power diminishes rapidly depending upon the distance from
the source. This attenuation in power is called the path loss. AM radio uses LF and MF
bands.
• High frequency radio waves travel in straight lines and have sky propagation. However,
they are affected by interferences and are affected by rains. The military communicates in
the HF and VHF bands. They are also used for long distance broadcasting and FM radio.
Microwave Transmission
• In the electromagnetic spectrum, waves within the frequencies 1GHz to 300GHz are called
microwaves.
• Microwaves travel in straight lines, and so the transmitter and receiver stations should be
accurately aligned to each other.
• Microwave propagation is line – of – sight propagation. So, towers hoisting the stations
should be placed so that the curvature of the earth or any other obstacle does not interfere
with the communication.
• Since it is unidirectional, it allows multiple receivers in a row to receive the signals without
interference.
• Microwaves do not pass through buildings. So, indoor receivers cannot be used effectively.
• Microwaves are often refracted by the atmospheric layers. The refracted rays take longer
time to reach the destination than the direct rays. This causes out of phase transmission,
called multipath fading.
• To prevent total chaos, there are national and international agreements about who gets
to use which frequencies.
• Since everyone wants a higher data rate, everyone wants more spectrum.
Infrared Transmission
• The electromagnetic waves having frequencies from 300 GHz to 400 THz (wavelengths
from 1mm to 770 nm) are referred to as infrared (IR) waves. IR uses line-of-sight
propagation.
• Infrared light is a transmission channel whose features are necessarily different from those
of the radio frequencies. A fundamental property of infrared light is that it cannot penetrate
the walls. This represents that it can easily include it within a room.
• Another advantage of infrared communication is massive bandwidth which is available for
use, but has not been exploited to its full extent.
Light Transmission
Electromagnetic waves within the frequency range of 400 THz – 790 THz are detected by the
human eye. Light transmission is line of sight propagation and is blocked by obstacles.
Laser Signals
• Optical signalling can be obtained by laser signals. For example, the LANs in two buildings
can be connected by installing laser signalling system on the rooftops.
• Laser rays are unidirectional. So, both the transmitter and the receiver need perfectly
aligned photo-emitter and photo-detector.
• A more used variant of light transmission is visual light communication (VLC). VLC refers
to data communication using visible spectrum of the light.
• It is part of optical wireless communication, which refers to data communication using
infrared, visible and ultraviolet lights.
• VLC uses florescent lamps or LEDs to generate optical signals. The signals are received
by photodiodes.
Application
• Communication using light signals is safe for eyes and cost effective. Also, it does not
require any license for usage.
• So, it is increasingly being used for ubiquitous computing and IoT systems.