You are on page 1of 49

CHAPTER 1

Introduction to Computer Network

Prepared by:
Asst. Prof. Sanjivan Satyal
Prepared by: Asst. Prof. Sanjivan Satyal 1
Computer Network
• A network is a set of devices (often referred to as nodes)
connected by communication links. A node can be a
computer, printer, or any other device capable of sending
and/or receiving data generated by other nodes on the
network

Prepared by: Asst. Prof. Sanjivan Satyal 2


1.1 Why Computer Network

• To enable multiple users to share a single


hardware device like a printer or scanner
• To enable file sharing across the network
• To facilitate communication via email, video
conferencing, instant messaging, etc.
• To allow for the sharing of software or operating
programs on remote systems
• To make information easier to access and
maintain among network users.

Prepared by: Asst. Prof. Sanjivan Satyal 3


Network as an Infrastructure for Data Communication

• Data communication refers to the exchange of data between a


source and a receiver via form of transmission media such as a
wire cable.

• For data communications to occur, the communicating devices


must be part of a communication system made up of a
combination of hardware (physical equipment) and software
(programs).

Prepared by: Asst. Prof. Sanjivan Satyal 4


Data Communication Networking:
• Data communications refers to the transmission of digital data
between two or more computers and a computer network or data
network is a telecommunications network that allows computers
to exchange
data.
• The physical connection between networked computing devices
is established using either cable media or wireless media. The
best-known computer network is the Internet.
• The communication system that consists of the interconnection
between two or more devices is referred to as a Network.
• A network is a set of devices (often referred to as nodes)
connected by communication links.
• A node can be a computer, printer, or any other device capable
of sending and/or receiving data
generated by other nodes on the network.

Prepared by: Asst. Prof. Sanjivan Satyal 5


Data Communication Components

1. Message. The message is the information (data) to be


communicated. Popular forms of information include text,
numbers, pictures, audio, and video.

2. Sender. The sender is the device that sends the data


message. It can be a computer, workstation, telephone
handset, video camera, and so on.

Prepared by: Asst. Prof. Sanjivan Satyal 6


3. Receiver. The receiver is the device that receives the
message. It can be a computer, workstation, telephone handset,
television, and so on.

4. Transmission medium. The transmission medium is the physical


path by which a message travels from sender to receiver. Some
examples of transmission media include twisted-pair wire,
coaxial cable, fiber optic cable, and radio waves.

5. Protocol. A protocol is a set of rules that govern data


communications. It represents an agreement
between the communicating devices

Prepared by: Asst. Prof. Sanjivan Satyal 7


Characteristics of Data Communication System:

The effectiveness of a data communications system depends on four


fundamental characteristics:

1. Delivery. The system must deliver data to the correct destination.


Data must be received by the intended device or user and only by that
device or user.

2. Accuracy. The system must deliver the data accurately. Data that
have been altered in transmission and left uncorrected are unusable.

3. Timeliness. The system must deliver data in a timely manner. Data


delivered late are useless. In the case of video and audio, timely
delivery means delivering data as they are produced, in the same order
that they are produced, and without significant delay. This kind of
delivery is called real-time transmission.

4. Jitter. Jitter refers to the variation in the packet arrival time. It is


the uneven delay in the delivery of
audio or video packets. Prepared by: Asst. Prof. Sanjivan Satyal 8
DataTransmission Mode

1. Simplex Communication
2. Half Duplex
3. Full Duplex

9
10
• Simplex: In simplex mode, the communication is unidirectional, as on a one-way
street. Only one of the two devices on a link can transmit; the other can only
receive. Keyboards and traditional monitors are examples of simplex devices. The
keyboard can only introduce input; the monitor can only accept output. The
simplex mode can use the entire capacity of the channel to send data in one
direction.

• Half-Duplex: In half-duplex mode, each station can both transmit and receive, but
not at the same time. When one device is sending, the other can only receive, and
vice versa. In a half-duplex transmission, the entire capacity of a channel is taken
over by whichever of the two devices is transmitting at the time. Walkie-talkies
and CB (citizens band) radios are both half-duplex systems. The half-duplex mode
is used in cases where there is no need for communication in both directions at
the same time; the entire capacity of the channel can be utilized for each
direction.

• Full-Duplex: In full-duplex both stations can transmit and receive simultaneously.


The full-duplex mode is like a two-way street with traffic flowing in both directions
at the same time. In full-duplex mode, signals going in one direction share the
capacity of the link: with signals going in the other direction. One common
example of full-duplex communication is the telephone network. When two
people are communicating by a telephone line, both can talk and listen at the
same time. The full-duplex mode is used when communication in both directions
is required all the time. The capacity of the channel, however, must be
divided between the two directions.

Prepared by: Asst. Prof. Sanjivan Satyal 11


Application of Computer Network

Prepared by: Asst. Prof. Sanjivan Satyal 12


Network Models

Prepared by: Asst. Prof. Sanjivan Satyal 13


Network Models(Based on Scale)

Prepared by: Asst. Prof. Sanjivan Satyal 14


1. Personal Area Network (PAN)

Prepared by: Asst. Prof. Sanjivan Satyal 15


2.Local Area Network (LAN)

Prepared by: Asst. Prof. Sanjivan Satyal 16


3. Campus Area Network (CAN)

Prepared by: Asst. Prof. Sanjivan Satyal 17


4.Metropolitan Area Network(MAN)

Prepared by: Asst. Prof. Sanjivan Satyal 18


5.Country Area Network(CAN)

Prepared by: Asst. Prof. Sanjivan Satyal 19


6.Wide Area Network (WAN)

Prepared by: Asst. Prof. Sanjivan Satyal 20


7. Global Area Network (GAN)

Prepared by: Asst. Prof. Sanjivan Satyal 21


Network Models Based on Topology

Prepared by: Asst. Prof. Sanjivan Satyal 22


1.BUS Topology

• Features of Bus Topology


– It transmits data only in one direction.
– Every device is connected to a single cable
• Advantages of Bus Topology
– It is cost effective.
– Cable required is least compared to other network topology.
– Used in small networks.

• Disadvantages of Bus Topology


– Cables fails then whole network fails.
– If network traffic is heavy or nodes are more the performance of the
network decreases.

Prepared by: Asst. Prof. Sanjivan Satyal 23


2.RING Topology
• Features of Ring Topology
– A number of repeaters are used for Ring topology with large
number of nodes, because if someone wants to send some data to
the last node in the ring topology with 100 nodes, then the data will
have to pass through 99 nodes to reach the 100th node. Hence to
prevent data loss repeaters are used in the network.
– The transmission is unidirectional, but it can be made bidirectional
by having 2 connections between each Network Node, it is
called Dual Ring Topology.

• Advantages of Ring Topology


– Transmitting network is not affected by high traffic or by adding
more nodes, as only the nodes having tokens can transmit data.
– Cheap to install and expand
• Disadvantages of Ring Topology
– Troubleshooting is difficult in ring topology.
– Adding or deleting the computers disturbs the network activity.
– Failure of one computer
Prepareddisturbs the whole
by: Asst. Prof. Sanjivan Satyal network. 24
3.STAR Topology
• Features of Star Topology
– Every node has its own dedicated connection to the hub.
– Hub acts as a repeater for data flow.

• Advantages of Star Topology


– Fast performance with few nodes and low network traffic.
– Easy to troubleshoot, setup and modify.
– Only that node is affected which has failed, rest of the nodes can
work smoothly.
• Disadvantages of Star Topology
– Cost of installation is high.
– Expensive to use.
– If the hub fails then the whole network is stopped because all the
nodes depend on the hub.
– Performance is based on the hub that is it depends on its capacity

Prepared by: Asst. Prof. Sanjivan Satyal 25


5.TREE Topology
• Features of Tree Topology
• Ideal if workstations are located in groups.
• Used in Wide Area Network.

• Advantages of Tree Topology


– Extension of bus and star topologies.
– Expansion of nodes is possible and easy.
– Easily managed and maintained.
– Error detection is easily done.

• Disadvantages of Tree Topology


– Heavily cabled.
– Costly.
– If more nodes are added maintenance is difficult.
– Central hub fails, Prepared
network by: Asst.fails
Prof. Sanjivan Satyal 26
6.HYBRID Topology
• Features of Hybrid Topology
– It is a combination of two or topologies
– Inherits the advantages and disadvantages of the topologies
included

• Advantages of Hybrid Topology


– Reliable as Error detecting and trouble shooting is easy.
– Effective.
– Scalable as size can be increased easily.
– Flexible.
• Disadvantages of Hybrid Topology
– Complex in design.
– Costly.

Prepared by: Asst. Prof. Sanjivan Satyal 27


Network Model Based on Architecture
or
Networking Types

Prepared by: Asst. Prof. Sanjivan Satyal 28


1. Peer to Peer (P2P)

Prepared by: Asst. Prof. Sanjivan Satyal 29


Prepared by: Asst. Prof. Sanjivan Satyal 30
2. Client/Sever

Prepared by: Asst. Prof. Sanjivan Satyal 31


Prepared by: Asst. Prof. Sanjivan Satyal 32
Protocol
● Protocols define format, order of msgs sent and received among
network entities, and actions taken on msg transmission, receipt

33
Protocol

34
Standards

 Standards are essential in creating and maintaining an open and


competitive market for equipment manufacturers and in
guaranteeing national and international interoperability of data and
telecommunications technology and processes.

 Standards provide guidelines to manufacturers, vendors,


government agencies, and other service providers to ensure the
kind of interconnectivity necessary in today's marketplace and in
international communications.

 Data communication standards fall into two categories: de facto


(meaning "by fact" or "by convention") and de jure (meaning "by
law" or "by regulation").

35
Reference Model

● 2 important model
○ OSI Reference Model
○ TCP/IP Reference Model

○ Also called protocol architecture or layered


architecture

36
ISO-OSI Reference Model

37
38
39
Group Layer Number Layer Name Description

Top 7 Application Provide user interface to send and


Layers receive the data
6 Presentation Encrypt, format and compress the data
for transmission
5 Session Initiate and terminate session with
remote system
Bottom 4 Transport Break data stream in smaller segments
Layers and provide
reliable and unreliable data delivery
3 Network Provide logical addressing
2 Data Link Prepare data for transmission
1 Physical Move data between devices

Prepared by: Asst. Prof. Sanjivan Satyal 40


• The Application Layer
Top layer of OSI model is application layer. It provides the protocols and services
that are required by the network-aware applications to connect with the
network. FTP, TFTP, POP3, SMTP and HTTP are the few examples of standards
and protocols used in this layer.
• The Presentation Layer
The sixth layer of OSI model is the Presentation layer. Applications running in
local system may or may not understand the format that is used to transmit the
data across the network. The presentation layer works as the translator in OSI
model
Convert, compress and encrypt are the main functions which presentation layer
performs in sending computer while in receiving computer there are reconvert,
decompress and decrypt. ASCII, BMP, GIF, JPEG, WAV, AVI, and MPEG are the
few examples of standards and protocols which work in this layer.
• The Session Layer
The session layer is the fifth layer of OSI model. The session layer is
responsible establishing, managing, and terminating communications between two
computers. RPCs and NFS are the examples of the session layer.
If network connection is available, it establishes a session with remote system.
For each individual request, it uses a separate session. This allows multiple
applications to send or receive data simultaneously. When data transmission is
completed, it terminates the session.

Prepared by: Asst. Prof. Sanjivan Satyal 41


• The Transport Layer
The transport layer is the fourth layer of OSI model. Main functionalities of
transport layer are segmentation, data transportation and connection
multiplexing. For data transportation, it uses TCP and UDP protocols. TCP is a
connection-oriented protocol. It provides reliable data delivery.
Main difference between a connection-less and connection-oriented protocol is
that a connection-oriented protocol provides reliable data delivery. For reliable
data delivery, it uses several mechanisms such as, three way handshake process,
acknowledgments, sequencing and flow control

• The Network Layer


The third layer of OSI model is the Network Layer. This layer takes data
segment from transport layer and adds logical address to it. A logical address
has two components; network partition and host partition. Network partition is
used to group networking components together while host partition is used to
uniquely identity a system on a network. Logical address is known as IP
address. Once logical address and other related information are added in
segment, it becomes packet.
Defining logical addresses and finding the best path to reach the destination are
the main functions of this layer. Router works in this layer. Routing also takes
place in this layer. IP, IPX and AppleTalk are the examples of this layer.

Prepared by: Asst. Prof. Sanjivan Satyal 42


• The Data Link Layer
The Data Link Layer is the second layer of OSI model. This layer defines how
networking components access the media and what transmission methods they
use. This layer has two sub-layers; MAC and LLC.
Defining physical addresses, finding host in local network, specifying standards
and methods to access the media are the primary functions of this layer.
Switching takes place in this layer. Switch and Bridge work in this layer. HDLC,
PPP and Frame Relay are the examples of this layer.

MAC (Media Access Control)


This sub layer defines how the data packets are placed in media. It also provides
physical addressing. Physical address is known as MAC address. Unlike logical
addresses which need to be configured, physical addresses are pre-configured in
NIC. MAC address is used to uniquely identify a host in local network.

LLC (Logical Link Control)


This sub layer identifies the network layer protocol. On sending computer, it
encapsulates the information of the Network Layer protocol in LLC header from
which the Data Link layer receives the data packet. On receiving computer, it
checks the LLC header to get the information about the network layer protocol.
This way a data packet is always delivered to the same network layer protocol
from which it was sent.

Prepared by: Asst. Prof. Sanjivan Satyal 43


• The Physical Layer
The Physical Layer is the first layer of OSI model. This
layer specifies the standards for devices, media and
technologies which are used in moving the data across the
network such as:-

– Type of cable used in connecting the devices


– Patterns of pin used in both sides of cable
– Type of interface card used in networking device
– Type of connector used to connect the cable with
network interface
– Encoding of digital signals received from the Data Link
layer based on the attached media type such as
electrical for copper, light for fiber, or a radio wave
for wireless.

Prepared by: Asst. Prof. Sanjivan Satyal 44


TCP/IP Protocol Architecture
• The Internet is built on the foundation of the TCPIIP suite. The dramatic
growth of the Internet, and especially the World Wide Web, has cemented
the victory of TCPIIP over OSI.
• It is useful to characterize the protocol suite as involving four layers

Prepared by: Asst. Prof. Sanjivan Satyal 45


TCP FOUR LAYERS

Prepared by: Asst. Prof. Sanjivan Satyal 46


Prepared by: Asst. Prof. Sanjivan Satyal 47
Prepared by: Asst. Prof. Sanjivan Satyal 48
Prepared by: Asst. Prof. Sanjivan Satyal 49

You might also like