Professional Documents
Culture Documents
UNIT 1
Introduction: Network Types, LAN, MAN, WAN, Network Topologies Reference modelsThe
OSI Reference Model- the TCP/IP Reference Model - A Comparison of the OSI and TCP/IP
Reference Models, OSI Vs TCP/IP, Lack of OSI models success, Internet History.
Physical Layer –Introduction to Guided Media- Twisted-pair cable, Coaxial cable and Fiber
optic cable and unguided media: Wireless-Radio waves, microwaves, infrared.
Introduction:
A computer network is a collection of two or more computer systems that
are linked together.
A network connection can be established using either cable or wireless
media.
A computer network is a group of devices connected with each other
through a transmission medium such as wires, cables etc. These devices can
be computers, printers, scanners, Fax machines etc.
The purpose of having computer network is to send and receive data stored
in other devices over the network. These devices are often referred as nodes.
Computer Networks are mainly used where there is a need for resource
sharing and communication.
Components:
A data communications system has five components.
PEC-CSE
R20 UNIT 1 CN
Types of Networks
Division based on the communication medium
Wired Network: As we all know, “wired” refers to any physical medium
made up of cables. Copper wire, twisted pair, or fiber optic cables are all
options. A wired network employs wires to link devices to the Internet or
another network, such as laptops or desktop PCs.
Wireless Network: “Wireless” means without wire, media that is made up
of electromagnetic waves (EM Waves) or infrared waves. Antennas or sensors
will be present on all wireless devices. Cellular phones, wireless sensors, TV
remotes, satellite disc receivers, and laptops with WLAN cards are all
examples of wireless devices.
Division based on area covered
Local Area Network (LAN): A LAN is a network that covers an area of
around 10 kilometers. For example, a college network or an office network.
Depending upon the needs of the organization, a LAN can be a single office,
building, or Campus. We can have two PCs and one printer in-home office or it
PEC-CSE
R20 UNIT 1 CN
can extend throughout a company and include audio and video devices. Each
host in LAN has an identifier, an address that defines hists in LAN. A packet
sent by the host to another host carries both the source host’s and the
destination host’s address.
Metropolitan Area Network (MAN): MAN refers to a network that
covers an entire city. For example: consider the cable television network.
Wide Area Network (WAN): WAN refers to a network that connects
countries or continents. For example, the Internet allows users to access a
distributed system called www from anywhere around the globe.WAN
interconnects connecting devices such as switches, routers, or modems. A
LAN is normally privately owned by an organization that uses it. We see two
distinct examples of WANs today: point-to-point WANs and Switched WANs
Point To Point: Connects two connecting devices through transmission
media.
Switched: A switched WAN is a network with more than two ends.
Based on types of communication
Point To Point networks: Point-to-Point networking is a type of data
networking that establishes a direct link between two networking nodes.
A direct link between two devices, such as a computer and a printer, is known
as a point-to-point connection.
Multipoint: is the one in which more than two specific devices share links.
In the multipoint environment, the capacity of the channel is shared, either
spartailly or temporally. If several devices can use the link simultaneously, it is
a spatially shared connection.
Broadcast networks: In broadcast networks, a signal method in which
numerous parties can hear a single sender. Radio stations are an excellent
illustration of the “Broadcast Network” in everyday life. The radio station is a
sender of data/signal in this scenario, and data is only intended to travel in one
direction. Away from the radio transmission tower, to be precise.
Computer Network Types:
Advantages of PAN
Here are the important pros/benefits of PAN network:
PAN networks are relatively secure and safe
It offers only short-range solution up to ten meters
Strictly restricted to a small area
Disadvantages of PAN
Here are the cons/drawbacks of using PAN network:
It may establish a bad connection to other networks at the same radio bands.
Distance limits.
PEC-CSE
R20 UNIT 1 CN
Advantages of LAN
Here are the pros/benefits of LAN:
You can easily transfer data and messages over networked computers.
It will be easy to manage data at only one place, which makes data more
secure.
Local Area Network offers the facility to share a single internet connection
among all the LAN users.
Disadvantages of LAN
Here are the cons/drawbacks of LAN:
LAN will indeed save cost because of shared computer resources, but the
initial cost of installing Local Area Networks is quite high.
The LAN admin can check personal data files of every LAN user, so it does
not offer good privacy.
PEC-CSE
R20 UNIT 1 CN
Advantages of MAN
Here are the pros/benefits of MAN network:
It offers fast communication using high-speed carriers, like fiber optic
cables.
The dual bus in MAN network provides support to transmit data in both
directions concurrently.
A MAN network mostly includes some areas of a city or an entire city.
Disadvantages of MAN
Here are drawbacks/cons of using the MAN network:
You need more cable to establish MAN connection from one place to
another.
PEC-CSE
R20 UNIT 1 CN
Advantages of WAN
Here are the benefits/pros of WAN:
WAN helps you to cover a larger geographical area. Therefore business
offices situated at longer distances can easily communicate.
Contains devices like mobile phones, laptop, tablet, computers, gaming
consoles, etc.
WLAN connections work using radio transmitters and receivers built into
client devices.
Disadvantages of WAN
Here are the drawbacks/cons of WAN network:
PEC-CSE
R20 UNIT 1 CN
Network Topology :
In computer networks, there are mainly two types of topologies, they are:
PEC-CSE
R20 UNIT 1 CN
In a computer network, there are mainly six types of physical topology, they
are:
1. Bus Topology
2. Ring Topology
3. Star Topology
4. Mesh Topology
5. Tree Topology
6. Hybrid Topology
BUS Topology
Bus topology is a network type in which every computer and network device is
connected to single cable. When it has exactly two endpoints, then it is
called Linear Bus topology
Bus topology is the simplest kind of topology in which a common bus or
channel is used for communication in the network. The bus is connected to
various taps and droplines. Taps are the connectors, while droplines are the
cables connecting the bus with the computer. In other words, there is only a
single transmission line for all nodes.
PEC-CSE
R20 UNIT 1 CN
1. It is cost effective.
2. Cable required is least compared to other network topology.
3. Used in small networks.
4. It is easy to understand.
5. Easy to expand joining two cables together.
Disadvantages of Bus Topology
RING Topology
It is called ring topology because it forms a ring as each computer is connected to
another computer, with the last one connected to the first. Exactly two neighbours
for each device.
1. A number of repeaters are used for Ring topology with large number of
nodes, because if someone wants to send some data to the last node in the
ring topology with 100 nodes, then the data will have to pass through 99
nodes to reach the 100th node. Hence to prevent data loss repeaters are used
in the network.
PEC-CSE
R20 UNIT 1 CN
STAR Topology
In this type of topology all the computers are connected to a single hub through a
cable. This hub is the central node and all others nodes are connected to the central
node.
PEC-CSE
R20 UNIT 1 CN
1.
Fast performance with few nodes and low network traffic.
2.
Hub can be upgraded easily.
3.
Easy to troubleshoot.
4.
Easy to setup and modify.
5.
Only that node is affected which has failed, rest of the nodes can work
smoothly.
Disadvantages of Star Topology
MESH Topology
o Mesh technology is an arrangement of the network in which
computers are interconnected with each other through various
redundant connections.
o There are multiple paths from one computer to another computer.
o It does not contain the switch, hub or any central computer which acts
as a central point of communication.
o Mesh has n(n-1)/2 physical channels to link n devices.
There are two techniques to transmit data over the Mesh topology, they are :
1. Routing
2. Flooding
PEC-CSE
R20 UNIT 1 CN
1. Fully connected.
2. Robust.
3. Not flexible.
Advantages of Mesh Topology
TREE Topology
It has a root node and all other nodes are connected to it forming a hierarchy. It is
also called hierarchical topology. It should at least have three levels to the
hierarchy.
PEC-CSE
R20 UNIT 1 CN
1. Heavily cabled.
2. Costly.
3. If more nodes are added maintenance is difficult.
4. Central hub fails, network fails.
HYBRID Topology
It is two different types of topologies which is a mixture of two or more topologies.
For example if in an office in one department ring topology is used and in another
star topology is used, connecting these topologies will result in Hybrid Topology
(ring topology and star topology).
PEC-CSE
R20 UNIT 1 CN
1. Complex in design.
2. Costly.
PEC-CSE
R20 UNIT 1 CN
There are the seven OSI layers. Each layer has different functions. A list of seven
layers are given below:
o Physical Layer
o Data-Link Layer
PEC-CSE
R20 UNIT 1 CN
o Network Layer
o Transport Layer
o Session Layer
o Presentation Layer
o Application Layer
1. Physical Layer
The physical layer is responsible for the physical cable or wireless
connection between network nodes. It defines the connector, the electrical
cable or wireless technology connecting the devices, and is responsible for
transmission of the raw data, which is simply a series of 0s and 1s, while
taking care of bit rate control.
PEC-CSE
R20 UNIT 1 CN
3. Network Layer
The network layer has two main functions. One is breaking up
segments into network packets, and reassembling the packets on the
receiving end. The other is routing packets by discovering the best path across
a physical network. The network layer uses network addresses (typically
Internet Protocol addresses) to route packets to a destination node.
4. Transport Layer
The transport layer takes data transferred in the session layer and
breaks it into “segments” on the transmitting end. It is responsible for
reassembling the segments on the receiving end, turning it back into data that
can be used by the session layer. The transport layer carries out flow control,
sending data at a rate that matches the connection speed of the receiving
device, and error control, checking if data was received incorrectly and if not,
requesting it again.
5. Session Layer
The session layer creates communication channels, called sessions,
between devices. It is responsible for opening sessions, ensuring they remain
open and functional while data is being transferred, and closing them when
communication ends. The session layer can also set checkpoints during a data
transfer—if the session is interrupted, devices can resume data transfer from
the last checkpoint.
6. Presentation Layer
The presentation layer prepares data for the application layer. It
defines how two devices should encode, encrypt, and compress data so it is
received correctly on the other end. The presentation layer takes any data
transmitted by the application layer and prepares it for transmission over the
session layer.
7. Application Layer
The application layer is used by end-user software such as web
browsers and email clients. It provides protocols that allow software to send
and receive information and present meaningful data to users. A few examples
of application layer protocols are the Hypertext Transfer Protocol (HTTP),
File Transfer Protocol (FTP), Post Office Protocol (POP), Simple Mail
Transfer Protocol (SMTP), and Domain Name System (DNS).
(Or )
1. Physical Layer:
o The lowest layer of the OSI reference model is the physical layer.
o It is responsible for the actual physical connection between the devices.
o The physical layer contains information in the form of bits.
o It is responsible for transmitting individual bits from one node to the next.
When receiving data, this layer will get the signal received and convert it
into 0s and 1s and send them to the Data Link layer, which will put the
PEC-CSE
R20 UNIT 1 CN
PEC-CSE
R20 UNIT 1 CN
PEC-CSE
R20 UNIT 1 CN
Ex: If we want to send 2000 pages of data.We add checkpoint for every 100
pages.If the error occurs in 523 page, then we resend from 501-523 pages.
3. Dialog Controller : The session layer allows two systems to start
communication with each other in half-duplex or full-duplex.
6. Presentation Layer (Layer 6) :
Presentation layer is also called the Translation layer.The data from the
application layer is extracted here and manipulated as per the required format to
transmit over the network.
The functions of the presentation layer are :
Translation :
The processes in two systems exchange the data in the form of character
strings, numbers & so on.
Different computers use different encoding methods.
This layer converts data from sender-dependent format into a common
format & changes the common format into a receiver-dependent format for
the receiving end.
For example, ASCII to EBCDIC.
1. Encryption/ Decryption : Data encryption translates the data into another
form or code. The encrypted data is known as the cipher text and the
decrypted data is known as plain text. A key value is used for encrypting as
well as decrypting data.
2. Compression: Reduces the number of bits that need to be transmitted on
the network.
7. Application Layer (Layer 7) :
At the very top of the OSI Reference Model stack of layers, we find Application
layer which is implemented by the network applications. These applications
produce the data, which has to be transferred over the network. This layer also
serves as a window for the application services to access the network and for
displaying the received information to the user.
Ex: Application – Browsers, Skype Messenger etc.
PEC-CSE
R20 UNIT 1 CN
PEC-CSE
R20 UNIT 1 CN
PEC-CSE
R20 UNIT 1 CN
PEC-CSE
R20 UNIT 1 CN
Application Layer
1.This is the top most layer of TCP/IP model.
2. It is used for interaction between user and application.
3. There are several protocols used by the application layer for user interaction
such as: HTTP, SNMP, SMTP, DNS, TELNET, FTP etc.
HTTP: HTTP stands for Hypertext transfer protocol, it allows the user to
interact with world wide web through the browser application. HTTP can be used
to transfer various types of data such as plain text, audio, video etc.
FTP: FTP stands for File Transfer Protocol. This protocol is used for
transmitting files from one system to another system.
TELNET: TELNET is a client-server protocol. It is a reliable connection oriented
protocol. This protocol is used on internet or on LAN to provide a bidirectional
(both ways) text based communication through a virtual terminal connection.
DNS: DNS stands for Domain Name System. Each computer on a network has
different IP address, a computer is known by its IP address. DNS provides a
mapping to a name to the IP Address so a name can be used to identify a system on
network rather than IP address itself.
SNMP: SNMP stands for Simple Network Management Protocol. It managers the
devices connected to the internet using TCP/IP protocol.
SMTP: SMTP stands for Simple mail transfer protocol. It is used for email
services, using this protocol a email containing data can be sent to another email
address.
The advantages of using the TCP/IP model include the following:
helps establish a connection between different types of computers;
works independently of the OS;
supports many routing protocols;
uses client-server architecture that is highly scalable;
can be operated independently;
supports several routing protocols
The disadvantages of TCP/IP include the following:
is complicated to set up and manage;
transport layer does not guarantee delivery of packets;
is not easy to replace protocols in TCP/IP;
It has no clear separation from its services, interfaces, and protocols.
Differences between OSI and TCP/IP models
PEC-CSE
R20 UNIT 1 CN
Difference between OSI and TCP/IP model
Here, are some important differences between the OSI and TCP/IP model:
S.No OSI / ISO TCP / IP
1 It is developed by ISO (International It is developed by ARPANET (Advanced
Standard Organization) Research Project Agency Network).
2 OSI model provides a clear distinction TCP/IP doesn’t have any clear distinguishing
between interfaces, services, and protocols. points between services, interfaces, and
protocols.
3 OSI refers to Open Systems Interconnection. TCP refers to Transmission Control Protocol.
4 OSI uses the network layer to define routing TCP/IP uses only the Internet layer.
standards and protocols.
5 OSI follows a vertical approach. TCP/IP follows a horizontal approach.
6 OSI layers have seven layers. TCP/IP has four layers.
7 In the OSI model, the transport layer is only A layer of the TCP/IP model is both connection-
connection-oriented. oriented and connectionless.
8 In the OSI model, the data link layer and In TCP, physical and data link are both
physical are separate layers. combined as a single host-to-network layer.
9 Session and presentation layers are a part of There is no session and presentation layer in the
the OSI model. TCP model.
10 It is defined after the advent of the Internet. It is defined before the advent of the internet.
11 The minimum size of the OSI header is 5 The minimum header size is 20 bytes.
bytes.
PEC-CSE
R20 UNIT 1 CN
PEC-CSE
R20 UNIT 1 CN
The Internet was developed by Bob Kahn and Vint Cerf in the 1970s. They began
the design of what we today know as the ‘internet.’
It was the result of another research experiment which was called ARPANET, which
stands for Advanced Research ProjectsAgency Network. T
his was initially supposed to be a communications system for the Defence Team of
the United States of America - a network that would also survive a nuclear attack.
The Internet has come a long way since the 1960s. The Internet today is not a simple
hierarchical structure. It is made up of many wide- and local-area networks joined by
connecting devices and switching stations.
(OR)
PEC-CSE
R20 UNIT 1 CN
ARPANET
The ARPANET created by DARPA (Defense Advanced Research Projects Agency) of the
United States Department of Defense during the Cold War, was the first operational
computer network in the world, and the predecessor of the global Internet.
The network is composed of small computers known as Interface Message Processors
(IMPs), what are now called routers. The IMPs at each site performed store-and- forward
packet switching functions and were connected to each other using modems connected to
leased lines (initially running at 50kbps). Host computers connected to the IMPs via
serial interfaces to connect to ARPANET.
The Network Control Program or NCP provided a standard method to establish reliable, flow-
controlled, bidirectional communications links between different processes on different hosts.
The NCP interface allowed application software to connect across the ARPANET
implementing higher-level communication protocols.
The initial ARPANET consisted of four IMPs. Honeywell's DDP-516 computer was chosen to
build the first-generation IMP. The first message ever sent over the ARPANET occurred at
10:30 PM on October 29, 1969. By 1981, the number of hosts had grown to 213. In 1983, the
U.S. military portion of the ARPANET was broken off as a separate network, the MILNET.
CSNET (the "Computer Science Network") was a computer network developed in
the early 1980s that linked Computer Science departments at academic institutions.
NSFNET
In 1985, the NSF (National Science Foundation, U.S.) began funding the creation of five new
supercomputer centers. The NSFNET connected these five centers and allowed access to their
supercomputers over the network. The original 56- kbps links were upgraded to
Mbps by July 1988 and again to 45 Mbps in 1991. The NSFNET was a major part of
early 1990s Internet backbone.
The National Physical Laboratory (NPL) started a commercial network in UK.
The RAND Corporation (Research ANd Development) was set up in 1946 by the
United States Army Air Forces.
NPL & RAND networks introduced the concept of packet-switching, in which the message is
split into small chunks known as packets at the source, these packets are transmitted over the
network and combined back into the at the original message at the destination.
The CYCLADES was a French research network created in the early 1970s. In CYCLADES
the focus is on connecting small networks spread all over the France into a single network.
This is how the concept of internetwork (internet) was introduced. This network also provided
remote login and file transfer services.
In the late 1980s ARPANET was interlinked with NSFNET, the term Internet was used as the
name of the network, being a large and global network. By Feb 28th, 1992 the ARPANET
hardware was completely removed and the Internet had grown to a worldwide network with
3000 networks (200000 computers) connected to it. In 1992 the millionth node was connected
to the Internet.
PEC-CSE
R20 UNIT 1 CN
Physical Layer:
Transmission media
o Transmission media is a communication channel that carries the information
from the sender to the receiver. Data is transmitted through the
electromagnetic signals.
o The main functionality of the transmission media is to carry the information
in the form of bits through LAN(Local Area Network).
o It is a physical path between transmitter and receiver in data communication.
o In a copper-based network, the bits in the form of electrical signals.
o In a fibre based network, the bits in the form of light pulses.
Classification Of Transmission Media:
PEC-CSE
R20 UNIT 1 CN
Twisted pair:
Twisted pair is a physical media made up of a pair of cables twisted with each
other. A twisted pair cable is cheap as compared to other transmission media.
Installation of the twisted pair cable is easy, and it is a lightweight cable. The
frequency range for twisted pair cable is from 0 to 3.5KHz.
A twisted pair consists of two conductors(normally copper), each with its own
plastic insulation, twisted together. One of these wires is used to carry signals to
the receiver, and the other is used only as ground reference.
PEC-CSE
R20 UNIT 1 CN
o
Disadvantages
o It is more expensive as compared to UTP and coaxial cable.
o It has a higher attenuation rate.
Coaxial Cable
o Coaxial cable is very commonly used transmission media, for example, TV
wire is usually a coaxial cable.
o The name of the cable is coaxial as it contains two conductors parallel to
each other.
o It has a higher frequency as compared to Twisted pair cable.
o The inner conductor of the coaxial cable is made up of copper, and the outer
conductor is made up of copper mesh. The middle core is made up of non-
conductive cover that separates the inner conductor from the outer
conductor.
o The middle core is responsible for the data transferring whereas the copper
mesh prevents from the EMI(Electromagnetic interference).
PEC-CSE
R20 UNIT 1 CN
Fibre Optic
o Fibre optic cable is a cable that uses electrical signals for communication.
o Fibre optic is a cable that holds the optical fibres coated in plastic that are
used to send the data by pulses of light.
o The plastic coating protects the optical fibres from heat, cold,
electromagnetic interference from other types of wiring.
o Fibre optics provide faster data transmission than copper wires.
Diagrammatic representation of fibre optic cable:
PEC-CSE
R20 UNIT 1 CN
PEC-CSE
R20 UNIT 1 CN
PEC-CSE
R20 UNIT 1 CN
PEC-CSE
R20 UNIT 1 CN
Lightwave Transmission
PEC-CSE
R20 UNIT 1 CN
***************************
PEC-CSE