Computer Network Class-1
Computer Network Class-1
Communication:
Communication is the process of sharing information, ideas, knowledge, and
feelings between two or more people using a medium.
When we communicate, we share information (data).
Local Communication: Happens face-to-face.
Remote Communication: Happens over a distance (using wired/wireless media).
Data refers to information presented in an agreed format between sender and receiver.
It can happen through spoken words, written text, pictures, or symbols.
We also communicate using body language, gestures, looks, and facial expressions, which
show how we feel and what we think.
Message: The actual information or data that needs to be communicated. Example: A text
message, audio, video, or file.
Sender: The device that creates and sends the message. Example: Computer, mobile phone, or
sensor.
Receiver: The device that receives the message. Example: Another computer, mobile phone, or
printer.
Transmission Medium: The path through which the message travels from sender to receiver.
Example: Cables (coaxial, fiber optic), wireless signals (radio waves, Bluetooth, Wi-Fi).
Protocol: A set of rules that both sender and receiver must follow to communicate properly.
Example: HTTP (for web), SMTP (for email), TCP/IP (for internet).
1.1.2 Message
A message is the actual information that needs to be communicated between devices.
It can take different forms such as text, numbers, images, audio, or video.
Text: Text is stored as a sequence of bits (0s and 1s). Each character (letter, number, or symbol)
is represented by a code. The most common system is Unicode, which uses 32 bits to represent
characters from almost any language in the world.
Numbers: Numbers are also stored as bit patterns. Unlike text, numbers are directly converted
into binary (0s and 1s). This makes it easy for computers to perform mathematical
calculations.
Images: Images are made up of pixels (tiny picture elements). Each pixel is represented by a bit
pattern. The resolution (number of pixels) determines the quality of the image.
Example:
1,000 pixels → lower quality
10,000 pixels → higher quality but requires more memory
Gray Scale Images
Images are not just black and white. images can also have shades of gray.
To represent gray levels, we use more bits per pixel (Using more bits per pixel allows
representation of different shades of gray.)
Example with 2 bits (4 shades):
00 → Black
01 → Dark Gray
10 → Light Gray
11 → White
More bits = more shades = better image quality.
Color Images
Colors are represented by combining primary colors.
Two common methods:
a) RGB (Red, Green, Blue)
Colors are formed by mixing Red, Green, and Blue in different intensities.
Examples:
o Red + Green = Yellow
o Red + Blue = Magenta
o Green + Blue = Cyan
o All three (Red + Green + Blue) = White
b) YCM (Yellow, Cyan, Magenta)
Another way to represent colors formed by combining Yellow, Cyan, and Magenta.
Commonly used in printing systems.
Audio
Audio refers to sound or music (like speech, songs, or noise).
It is naturally continuous, not broken into separate parts like text or numbers.
Example: When we speak into a microphone, our voice becomes an electric signal
(continuous form).
In data communication, audio can be converted into digital signals (bits) so that
computers and devices can store or transmit it.
Video
Video refers to the recording or broadcasting of moving pictures (movies, online
classes, TV shows).
A video can be:
1. A continuous signal (like live TV recording).
2. A series of images (frames) shown one after another very quickly to create the
effect of motion.
Example: A movie is made up of thousands of images played with sound to give us a
smooth motion effect.
1.1.3 Data Flow
A transmission mode (also called communication mode or data flow mode) is the
mechanism that defines the direction of data flow between two communication devices. In
simple words, it specifies how information travels between a sender and a receiver.
There are three types of transmission modes:
Simplex mode
Duplex mode
o Half duplex Mode
o Full duplex Mode
Key Characteristics
1. Unidirectional: Data moves in one direction only.
2. No feedback: Receiver cannot acknowledge or respond.
3. Full channel utilization: The entire bandwidth is dedicated to transmission in one
direction.
4. Simple & low cost: Hardware is cheaper since no return channel is needed.
5. Limitation: No error correction through feedback; reliability depends entirely on the
sender.
Example: Computer Keyboard to Computer: When you press a key on a keyboard, it sends
signals to the computer, but the keyboard does not receive any data back. This is a classic
example of simplex communication.
Television Broadcasting: TV stations transmit signals to viewers without receiving any data
back from the television sets. This one-way broadcast is a typical simplex transmission.
Loudspeaker Systems: An announcer speaks into a microphone, and their voice is amplified
and sent through speakers to the audience. The speakers only receive the audio signal and do
not send any information back.
Other Real-life examples of this communication mode include:
Radio broadcasting
Computer to printer
Fire alarm system
Advantages of Simplex Mode
1. Simplicity: Easy to implement since data travels only one way.
2. Cost-effective: Requires only one channel, reducing hardware cost.
3. No data collision: Since data flows in a single direction, collisions cannot occur.
4. Efficient for one-way communication: Ideal where only sending is needed (e.g.,
broadcasting, input devices).
5. No coordination needed: Transmitter and receiver don’t need to synchronize responses.
Disadvantages of Simplex Mode
1. No bidirectional communication: Receiver cannot send data back.
2. No error-checking or acknowledgment: Cannot confirm if data was received correctly.
3. Limited flexibility: Not suitable for tasks requiring feedback or interaction.
4. Outdated for modern networks: Modern systems require two-way data flow (e.g.,
internet, video calls).
Duplex mode:
Duplex communication is a data transmission mode in which the flow of
information is bidirectional, meaning both devices can act as sender and receiver. Unlike simplex
communication (which is one-way only), duplex allows interactive communication.
Duplex can be further divided into two categories:
1. Half-Duplex Mode – two-way, but only one direction at a time.
2. Full-Duplex Mode – two-way, both directions simultaneously.
Half-Duplex Mode:
Half-duplex mode is a type of duplex communication where data can flow in both directions, but
only one direction at a time.
At a given moment, one device acts as the sender while the other acts as the receiver.
To reply, the devices must take turns.
It is similar to a one-lane road where vehicles from opposite directions must wait and pass
one after another.
Key Characteristics
1. Bidirectional communication – both devices can send and receive.
2. Not simultaneous – only one device can transmit at a time.
3. Turn-taking system – sender transmits, then waits, while the receiver responds.
4. More efficient than simplex since two-way communication is possible.
5. Slower than full-duplex because devices must wait for their turn.
6. Collision avoidance required (e.g., “push-to-talk” in radios).
Examples
Walkie-Talkies: a walkie-talkie is a device that can be used to send message in both the
directions, but both the persons cannot exchange the message simultaneously. One can
only speak and the other can only listen (They cannot speak simultaneously).
Two-Way Radios (with push-to-talk buttons): Common in security or military
communication.
Web Browsing: A computer sends a request, waits, and then receives a response
from the server.
Universal Serial Bus (USB): Data can flow in both directions but not at the same
instant.
Real world example: a one-way road, in which a vehicle traveling in the opposite direction of
the traffic has to wait till the road is empty before it can pass through.
Advantages of Half-Duplex Mode
1. Efficient use of channel: Enables two-way communication on a single channel.
2. Cost-effective: Requires less complex hardware compared to full-duplex systems.
3. Simplified collision handling: Since only one device transmits at a time, chances of
collisions are reduced.
4. Ideal for periodic communication: Suitable for cases where continuous simultaneous
communication isn’t needed.
Disadvantages of Half-Duplex Mode
1. Slower Data Transmission: Since data can only run in one direction at a time,
communication is naturally delayed compared to full-duplex systems where data can be
delivered and received simultaneously.
2. Increased Latency: The need to exchange between sending and receiving modes introduces
delay, which can affect performance in congestion applications.
3. Not Ideal for High-Traffic Networks: In networks with congestion or applications requiring
constant communication, half-duplex mode can become a restriction.
4. Inefficient for Complex Communications: For tasks that require frequent two way
communication, half-duplex can be less effective as it forces devices to wait their turn, which can
lead to pauses.
Full Duplex Mode:
In Full Duplex Mode, data transmission occurs simultaneously in both
directions. The sender can send data and receive data at the same time. It is a dual-way
communication system, where both devices act as sender and receiver simultaneously.
Key Characteristics
1. Bidirectional Communication – Both devices can send and receive at the same time.
2. No Waiting Required – Unlike half-duplex, no turn-taking is needed.
3. Most Efficient Mode – Maximizes the use of communication channels.
4. Requires Two Channels / Advanced Techniques – Achieved using separate paths or
techniques like echo cancellation.
5. High-Performance Use – Common in modern, high-speed communication systems.
Examples
Video calls / video conferencing
Audio calls (telephone systems)
Live chats
Example: A telephone is a full-duplex device, where both people can talk and listen
simultaneously without waiting.
Advantages of Full-Duplex
Enables simultaneous two-way communication, ideal for real-time applications (video
calls, online gaming).
Highly efficient, as no time is wasted in waiting.
Provides greater reliability and accuracy (no need for feedback/error correction due to
immediate communication).
Disadvantages of Full-Duplex
Expensive – Requires two communication channels or complex technology.
Complex design compared to simplex and half-duplex.
High bandwidth demand – Not always necessary for simple applications.
1.2 NETWORKS:
Imagine you’re sending a WhatsApp message to your friend. You type ‘Hi’, press send, and
within seconds it appears on their phone, even if they are miles away. How does this happen?
What hidden system makes two devices share information so quickly? The answer is computer
networks.
What is computer network?
A network is a collection of two or more interconnected devices (such as computers,
servers, switches, and routers) that communicate with each other to share resources, exchange
data, and provide services.
In data communication, a network enables the transfer of information between devices using
hardware components (like cables, routers, Wi-Fi) and software protocols (like TCP/IP).
Key Components of a Network:
There are three main components in network. They are,
1. Nodes (Devices): These are the endpoints in a network.
o Examples: Computers, laptops, smartphones, printers, servers.
o Nodes are the ones that generate, receive, or process data.
2. Links (Medium): The pathways that connect devices.
o Can be wired (Ethernet cables, fiber optics) or wireless (Wi-Fi, Bluetooth,
satellite).
o Without links, devices would exist but could never communicate.
3. Protocols (Rules): A set of rules and standards that define how data is transmitted and
understood.
o Common protocols: TCP/IP, HTTP, FTP.
o Think of protocols as the language devices use to “talk” to each other.
Analogy for Easier Understanding
Think of a classroom as a simple model of a network:
Students = Devices/Nodes: (Each student is like a computer or phone that can send or
receive information.)
Spoken Language = Protocols: (For communication to happen, everyone must speak
and understand the same language—like English in the classroom, TCP/IP in a network.)
Classroom Air = Medium/Link: (The medium through which communication happens;
without air, no sound can travel. Similarly, without a medium, no data can travel.)
1.2.1 Network Criteria
Just connecting devices is not enough (sufficient) to make a network useful. The network
must also work well, be dependable, and keep data safe. In other words, a good network needs
three key qualities:
1. Performance (speed),
2. Reliability (stability),
3. Security (safety)
Performance
Definition: How well a network carries out communication.
Measures:
o Transit time: The time taken for a message (or packet) to travel from source to
destination.
o Response time: The delay between a request and the corresponding response.
Factors affecting performance:
o Number of users: Too many users can slow down the network.
o Transmission medium: Fiber optic cable is faster than copper; 5G is faster than
3G.
o Hardware capability: A powerful router can handle more traffic efficiently.
o Software efficiency: Poorly written applications may increase delays.
Example for students:
o When you stream a movie on Netflix, if the buffering is low and video is smooth →
network performance is high.
o If it keeps pausing → network performance is poor.
Analogy: Think of a highway. Transit time = how long it takes a car to travel between two cities.
Response time = how long before you get a reply after honking (horning) at another car.
2. Reliability
Definition: The ability of a network to consistently deliver data accurately and without
failure.
Measures:
o Frequency of failure: How often does the network crash or drop connections?
o Recovery time: How quickly does it recover after a failure?
o Robustness: Can it handle unexpected problems like power failures or cable
cuts?
Example for students:
o During an online exam, if the Wi-Fi disconnects often, the network is unreliable.
o If it stays connected without interruption, it is reliable.
Analogy: Like electricity supply—if power keeps going off, it’s unreliable; if it stays on
consistently, it’s reliable.
3. Security
Definition: Protecting the network and data from unauthorized access, misuse, or
damage.
Concerns:
o Unauthorized access (hackers stealing passwords).
o Data damage (corruption during transfer).
o Data loss (accidental deletion, hardware crash).
o Recovery policies (backups, disaster recovery plans).
Example for students:
o When you log in to your college portal, you use a username and password →
that’s basic security.
o If data is encrypted while transferring marksheets online, hackers can’t read it →
that’s advanced security.
Analogy: Think of a bank. Security guards = firewalls, CCTV = monitoring systems, vault =
encryption.
1.2.2 Physical Structures
Before we start learning (dive into) about networks, we first need to understand some
basic features, called network attributes, that describe how a network is built and how it works.
Types of connection:
Before we discuss the types of connections, let’s understand what a
connection actually means in a network.
A connection is simply a communication path that allows two or more devices to
exchange data.
This path can be wired (like copper cable, fiber optic) or wireless (like Wi-Fi, Bluetooth,
or satellite).
Without a connection, devices cannot share information, even if they are part of the same
network.
Why are Connection Types Important?
The way devices share this path decides the efficiency, speed, and reliability of the
network.
Some connections are exclusive (like a private road), while others are shared (like a
highway used by many vehicles).
Two Main Types of Connections
1. Multipoint (Multidrop): A single link shared by several devices. Like a public highway
where many vehicles travel together.
Point-to-Point Connection:
A point-to-point connection is a direct (dedicated) communication
link between exactly two devices (nodes: Sender Receiver). The entire capacity of the
link is dedicated to just those two devices. No other device can use or interfere with the link.
Example-1: A telephone call between two people is point-to-point → only those two can hear
each other.
For example, a private road from your house to your friend’s house.
Key features of Point-to-point connection:
1. Dedicated Path: Only connected two devices use the connection.
2. Direct Communication: Data travels directly from sender to receiver without competing
(challenging) with others.
3. Reliable & Fast: Since no sharing, less chance of collision or delay.
4. Simple Protocols: Since there are only two devices, communication rules are simpler.
5. Stable Performance: No collisions or interference from outside devices.
6. Can be Physical or Logical:
1. Physical point-to-point: A direct cable or wire between two devices.
2. Logical point-to-point: A virtual tunnel or logical channel over a shared medium.
Examples in Real Life
A cable connecting your computer directly to a printer.
Laptop connected to a switch/router port with an Ethernet cable.
Two routers connected with a leased line or fiber optic cable.
USB connection between your phone and a computer.
Advantages
High performance (dedicated bandwidth).
Secure (harder for others to tap in).
Easier to troubleshoot.
Disadvantages
Expensive if many devices need to be connected (requires separate links).
Not scalable for large networks.
Multipoint (Multidrop) Connection:
A multipoint connection is a communication link that is shared by (connecting)
more than two devices. In this connection, all devices are connected to the same medium, and
they take turns using it and the capacity of the link is shared among all the connected devices. In
multipoint connection, at a given time, only one device may be allowed to send, while others
must listen.
There are two types of methods to transmit data via the Mesh topology, they are:
1. Routing
2. Flooding
Routing:
In a mesh topology, every device (node) is connected to every other device, providing
multiple paths for data transmission. To manage these multiple paths efficiently, routing logic is
applied.
Flooding:
Flooding is a data transmission technique in which the same data packet is sent to all
nodes in the network, regardless of the destination.
How it works: Each node receiving the packet forwards it to all its neighbors (except the one it
came from). This continues until the packet reaches every node in the network.
Types of MESH Topology
1. Partial Mesh Topology: In this type of topology few of the systems are linked similarly
to mesh topology but few nodes are only linked to two or three devices.
2. Full Mesh Topology: Every node or device is linked to each other.
Features of Mesh Topology
1. Fully Connected (Fully Linked):
o Every device is directly connected to every other device.
o Provides multiple dedicated paths for communication.
2. Robust and Reliable:
o Failure of one link or node does not affect the entire network, since data can be
rerouted through alternate paths.
o No single point of failure.
3. Not Flexible (Complex Setup):
o Adding a new device requires a direct link with all existing devices, which makes
expansion difficult.
o The cabling and configuration become complex as the number of nodes increases.
4. High Cost of Cabling:
o Requires a large number of cables and ports.
o Becomes expensive for large networks.
5. Efficient Data Transmission:
o Since dedicated links exist, data can be transmitted simultaneously between different
pairs of nodes without collisions.
6. High Fault Tolerance:
o Even if multiple links fail, the network can still function using other available paths.
Advantage of MESH Topology
1. Each connection may carry its unique data load.
2. It is robust.
3. Fault can be diagnosed easily.
4. Facilitates security and privacy.
The Disadvantage of MESH Topology
1. Installation and configuration are not simple.
2. Cabling cost is higher.
STAR Topology:
In Star Topology all the nodes are linked to a common device called as hub via
a cable. This hub is the central node and all other nodes are linked to the central node.
Unlike Mesh topology, star topology does not permit straightforward communication between
the devices, a device needs to communicate through the hub. If a device requires sending data to
another device, it has to first transfer the data to the hub, and then the hub forwards that data to
the selected device.
Example: A small office where many connected computers with a central router for files and
printing is exemplified by a LAN. The devices are interconnected through
preferably Ethernet cables or wirelessly through wireless networks.
Advantages Disadvantages
Transmission of data and services is relatively Need constant administration of
higher than other network connections. experienced engineers for functioning.
The Network Server acts as a central unit for the Probability of leak of sensitive data by
whole network. LAN administration.
Metropolitan Area Network (MAN):
A Metropolitan Area Network (MAN) spans a city or large
campus, linking multiple LANs for unified communication. Commonly used by universities,
governments, or large enterprises, MANs support high-bandwidth applications like video
conferencing across a metropolitan region.
Example: A city’s municipal network connects various public departments.
Example: A university, for instance, has many buildings linked with each other using a high-
speed fiber-optic cable, known as a MAN. The network enables students and faculty to use
resources and communicate in the space across buildings on campus.
Advantages Disadvantages
Provides Full-Duplex data transmission in the High probability of attack from hackers and
network channel for devices. cybercriminals due to large networks.
The network connection area covers an entire The need for good quality hardware and the
city or some parts using the optic cables. installation cost is very high.
Wide Area Network (WAN):
A Wide Area Network (WAN) covers large geographic areas, from
cities to countries and continents. WANs often use leased lines, satellite links, or the Internet for
connectivity. They allow remote offices or data centers to stay connected. SD-WAN improves
WAN efficiency through centralized, software-based management.
Example: A global corporation’s network linking offices in different countries.
Advantages Disadvantages
This network covers a high geographical High cost to set up the network and the Support of
area and is used for large-distance experienced technicians is needed to maintain the
connections. network.
They also use radio towers and connect It is difficult to prevent hacking and debug a large
channels for users. network.
Based on Transmission Medium:
Computer networks can also be classified based on the transmission
medium they use for sending and receiving data. There are two types of computer networks in
this category:
1. Wired Networks
In a wired network, devices are physically connected using cables, such as
copper wires (Ethernet, twisted pair, coaxial) or fiber optic cables for higher speeds and longer
distances. Wired networks are generally more stable and secure than wireless alternatives
because they are less susceptible to interference and eavesdropping.
The choice of cabling depends on network size, required bandwidth, and installation budget.
Wired connections are common in enterprise offices, data centers, and anywhere a reliable, high-
speed link is essential.
2. Wireless Networks
Wireless networks eliminate the need for physical cables by transmitting
data through electromagnetic signals such as radio waves or infrared light. Devices communicate
using built-in antennas and sensors.
Popular wireless network types include Wi-Fi for local connectivity, Bluetooth for short-range
device pairing, and cellular networks for wide-area wireless access.
Wireless networks offer flexibility and convenience, making it easy to connect mobile devices
and expand coverage without running new cables, but they may face signal interference and
require robust security measures.
Based on Communication
This category looks at the way devices share information over the
network. There are three types of computer networks based on how they communicate:
Point-to-Point Networks
A point-to-point network establishes a direct connection between
exactly two devices or nodes. This simple setup creates a dedicated communication path that
ensures reliable and secure data transfer between the two endpoints.
Point-to-point connections are used in many scenarios, such as connecting a computer to a
printer with a cable or setting up a dedicated leased line between two branch offices. Because no
other devices share the link, data collisions are eliminated and privacy is enhanced.
Multipoint Networks
In a multipoint network, multiple devices share a single communication
channel or link. Instead of creating a separate connection for each pair of devices, all nodes use
the same medium to send and receive data. This setup reduces the amount of cabling needed and
is cost-effective for networks where devices don’t need constant dedicated bandwidth.
However, since bandwidth is shared, performance can drop if many devices transmit data at the
same time. Multipoint configurations are suitable for environments like classrooms or small
office networks where users can share network resources efficiently.
Broadcast Networks:
Broadcast networks operate on a one-to-many principle. A single device
(the broadcaster) sends data to all other devices on the network simultaneously. Every receiving
device checks the broadcast data and processes it if it is relevant.
This method is ideal for distributing the same information to multiple recipients quickly and
efficiently. Examples include traditional TV and radio broadcasts, as well as some types of local
network protocols where data packets are sent to all nodes within a segment.
4. Virtual Private Networks (VPNs):
A Virtual Private Network (VPN) is not a physical
network but a secure method to create a private, encrypted connection over a public network,
such as the internet. VPNs establish a protected tunnel between a user’s device and a VPN
server, masking the user’s identity and encrypting all transmitted data.
This prevents hackers and unauthorized parties from accessing sensitive information. VPNs are
widely used by organizations to allow employees secure remote access to internal systems and
by individuals to protect their online privacy and bypass geographic restrictions.
Example: An example of this type of network is an employee who is working from home via
a Virtual Private Network, VPN, to access their employer’s secure network. The VPN makes sure
that the particular company resource the employee needs to access is available and can be
accessed safely as if the employee is still within the company’s LAN.
Based on Ownership
Computer networks can also be categorized by the types of ownership.
There are three types of computer networks based on ownership:
1. Private Network: A private network can be used by a specific organization or group. It
ensures secure and controlled access to data and resources, often through the use
of firewalls, encryption, and other security measures. Private networks are commonly used in
businesses, schools, and government agencies to protect sensitive information and maintain
internal communications.
2. Public Network: A public network is accessible to anyone and is typically exemplified by the
Internet. It allows widespread connectivity and information sharing but lacks security features
compared to private networks. Public networks are ideal for general communication, accessing
public information, and connecting with a broad audience.
3. Hybrid Network: A hybrid network combines elements of both private and public networks,
offering a balance of security and accessibility. This type of network allows organizations to
maintain secure, internal communications while also leveraging the benefits of public networks
for broader connectivity. Hybrid networks are flexible and can be tailored to meet specific needs,
such as using a private network for sensitive data and a public network for less critical
operations.
Applications of Computer Networks
Some of the main applications of computer networks are:
Communication: Send emails in a flash. Make video calls to anyone, anywhere. Chat
with ten people at once—no more waiting for letters.
Resource Sharing: Use one printer for the whole office. Share expensive software
among many users: access scanners and storage from any desk.
Data Sharing: Share files between computers instantly. Work on the same document
together. Keep everyone updated with the latest version.
Information Access: Search millions of websites in seconds. Read the news as it
happens. Find answers to any question right away.
Remote Work: Do your job from home or a beach. Connect to office computers from
anywhere. Attend meetings without driving there.
Education: Take classes from top teachers worldwide. Submit homework online. Learn
new skills through video lessons.
Advantages of Computer Networks
Some of the main advantages of computer networks are:
Resource Sharing Capabilities: You can send files to anyone on the network—no need
for USB drives or emails. Just drag and drop.
Hardware Cost Reduction: One printer works for everyone. The same goes for scanners
and storage drives. Why buy ten when one does the job?
Remote Access Flexibility: Connect to your office computer from home. Access your
files from the coffee shop. Pretty handy, right?
Enhanced Collaboration: Many people can work on the same project together. Changes
show up instantly for everyone.
Data Backup Solutions: Store essential files in one secure place. Set up automatic
backups so nothing gets lost.
Real-time Communication: Send messages instantly. Video chat with teammates. Share
screens to solve problems quickly.
Centralized Management: IT personnel can update all computers simultaneously. They
can fix issues remotely, too. Saves tons of time.
Internet Connectivity Sharing: One internet line serves the whole office. Everyone gets
online without separate connections.
Disadvantages of Computer Networks
Here are the main disadvantages of computer networks:
Security risks: Hackers can attack from anywhere. One weak password puts everyone at
risk. Viruses spread fast through connected computers.
Infrastructure Expenses: Setting up networks isn’t cheap. You need cables, routers, and
switches. Plus, you’ll pay experts to install everything.
System Downtime Impact: If the main server crashes, nobody can work. One bad cable
can bring the whole office to a standstill.
Regular Maintenance: Someone must watch the network all day. Updates, backups, and
fixes never end. That means hiring IT staff.
Technical Complexity: More computers mean more problems. Finding issues becomes
like solving puzzles. Training people takes forever.
Bandwidth Limitations: Too many people online? Everything crawls—videos buffer.
Files take ages to download.
Compatibility Issues: Not all machines play nice together. Different systems create
compatibility nightmares.
Legend (Symbols in the diagram)
Host (PC) → Any type of device (computer, laptop, printer).
Switch → Central device used in modern LANs.
Cable Tap → Connection point used in the old common cable LAN.
Cable End → Terminator at both ends of the common cable (to prevent signal
reflection).
Common Cable → Shared cable (used in past LANs).
Connection → Dedicated links between switch and hosts (used today).
LAN with a common cable (Past)
In the early days, all computers (hosts) in a LAN were connected to one common cable
(like a bus topology).
This cable acted as the main communication line.
Every device was "tapped" into the same cable.
Drawback:
o If the cable failed, the entire network would stop working.
o Data collisions were common (when two computers tried to send data at the same
time).
o Limited scalability (only a small number of computers could be connected).
b. LAN with a switch (Today)
In modern LANs, a switch is used.
Each computer is connected to the switch with its own dedicated link.
The switch acts as the central device that manages communication between hosts.
Advantages:
o No collisions (switch sends data directly to the destination).
o More reliable (failure of one cable affects only one computer, not the whole
LAN).
o Easier to expand by adding more devices to the switch.
o Much faster and efficient than the old common cable method.
Internetwork:
An internetwork is formed when two or more computer networks (such as LANs or WANs) are
connected together so that devices in one network can communicate with devices in another.
It is not just one single network but a combination of multiple networks linked by
networking devices (mainly routers).
The purpose of an internetwork is to enable communication, resource sharing, and data
exchange between different networks.
Examples
1. A company with offices in two cities connects their LANs using a leased WAN line →
private internetwork.
2. Two universities interconnect their campus networks through high-speed fiber →
internetwork.
3. The Internet (uppercase I) is the largest internetwork in the world, made up of thousands of
interconnected smaller networks.
Figure 1.11: An internetwork made of two LANs and one point-to-point WAN
Explanation
On the left side, we see a LAN (Local Area Network) in the West Coast office.
On the right side, there’s another LAN in the East Coast office.
Each LAN allows employees in the same office to communicate with each other.
To connect these two distant offices:
1. Routers (R1 & R2) are placed at each office.
o R1 connects the West Coast LAN to the WAN.
o R2 connects the East Coast LAN to the WAN.
2. The company leases a point-to-point WAN link (e.g., from a telephone company).
3. This WAN acts as a bridge between the two LANs.
Key Idea
After interconnecting the two LANs using a WAN, the company now has an
internetwork (or private internet with lowercase “i”).
This allows communication between employees at both offices, even though they are far
apart geographically.
Explanation of Figure 1.12
This figure shows a heterogeneous internetwork — meaning it is built using a mix of different
network types (LANs and WANs).
Disadvantage:
o Speed depends on the number of users sharing the same cable in the
neighbourhood.
3. Using Wireless Networks
Wireless networks have become increasingly popular for Internet access in both homes
and businesses because of their convenience and flexibility.
Technology Used:
Wi-Fi (Wireless LAN): Provides local wireless connectivity within a limited area such as
homes, offices, or campuses.
Wireless WAN: Extends Internet access over a wider geographical area using cellular
technologies.
Flexibility:
Supports a combination of wired and wireless connections, allowing multiple devices to
access the Internet simultaneously without physical cables.
Examples:
Mobile broadband, 4G, and 5G networks are widely used forms of wireless WAN that
provide high-speed Internet access on the go.
Direct Connection to the Internet:
Large organizations, such as universities, research institutions,
and corporations, often require high-speed, reliable, and continuous Internet access to
support their large number of users and services. Instead of relying on standard residential
connections, they establish a direct connection to the Internet.
Method:
o The organization leases a high-speed Wide Area Network (WAN) line from a carrier
(such as a telecom provider).
o This line connects the organization’s internal network directly to a regional Internet
Service Provider (ISP).
Advantages:
o Provides dedicated bandwidth and high reliability.
o Supports large-scale networking requirements, such as multiple servers, databases, and
communication systems.
o Ensures faster and more secure Internet access for thousands of users simultaneously.
Example:
o A large university with several campuses can create its own private internetwork and
then connect it directly to the Internet through a leased high-speed line.
Figure 1.16: Logical connections between peer layers. Let’s carefully explain what’s happening
in this diagram step by step.
The OSI model has seven layers, while the TCP/IP model is organized into four layers, making it
a more practical and simplified approach to network communication
Historically, the origins of TCP/IP date back to the early 1970s (in 1960s), when the U.S.
Department of Defense’s Advanced Research Projects Agency (DARPA) initiated research to
design a robust and fault-tolerant networking protocol for ARPANET, the precursor to the
Internet. In 1983, ARPANET officially adopted TCP/IP as its standard protocol, marking the
first successful large-scale implementation and the beginning of the Internet era. Since then,
TCP/IP has developed into the universal networking standard, serving as the backbone of global
communication and enabling a wide variety of applications such as web browsing, email, file
transfer, cloud computing, and multimedia streaming.
Layered Architecture in TCP/IP
In TCP/IP, communication between two computers is
organized into layers, with each layer performing a specific role. The five layers are
Application, Transport, Network, Data Link, and Physical. This layered structure makes
communication easier to design, manage, and troubleshoot.
Application Layer:
The Application Layer is the topmost layer of the OSI model and is the
closest to the end user. It acts as the interface between user applications and the underlying
network services, enabling tasks such as web browsing, email communication, file transfers,
and remote access. While the software applications (e.g., browsers, email clients) themselves do
not reside in this layer, the protocols and services that allow them to communicate across
networks operate here.
This layer ensures that data is properly formatted, transmitted, and displayed in a meaningful
way to the user. It also manages application-specific networking requirements such as
authentication, privacy, quality of service, data syntax, and network resource availability.
By coordinating with the lower layers, it allows seamless communication between applications
across different systems and networks.
Key Functions of the Application Layer:
Identifying communication partners – Determines and verifies the availability of parties
involved in the communication process.
Determining resource availability – Ensures required network resources are accessible
before initiating communication.
Synchronizing communication – Manages and coordinates data exchange between
applications to maintain smooth interaction.
Supporting application services – Provides essential services such as authentication, data
formatting, error handling, and session management.
Common Application Layer Protocols:
HTTP/HTTPS (Hypertext Transfer Protocol / Secure) – Used for web browsing and
secure communication.
FTP (File Transfer Protocol) – Supports file transfers between systems.
SMTP/POP/IMAP (Simple Mail Transfer Protocol / Post Office Protocol / Internet
Message Access Protocol) – Enable email communication.
DNS (Domain Name System) – Resolves domain names into IP addresses.
Telnet – Provides remote login and command execution.
DHCP (Dynamic Host Configuration Protocol) – Assigns IP addresses dynamically to
devices.
SNMP (Simple Network Management Protocol) – Used for monitoring and managing
network devices.
Examples:
HTTP/HTTPS → Accessing websites via browsers (Chrome, Firefox, Safari).
FTP → Uploading/downloading files from a server.
SMTP/POP → Sending and receiving emails.
DNS → Converting www.example.com into its corresponding IP address.
Telnet/SSH → Logging into a remote machine for administrative tasks.
Presentation Layer:
The Presentation Layer, also known as the syntax layer, is the sixth layer
of the OSI model. Its primary role is to act as a translator between the Application Layer
(Layer 7) and the lower layers, ensuring that data from one system can be understood by
another, regardless of differences in data formats, encoding methods, or syntax.
This layer prepares data for the application layer by handling translation, compression, and
encryption. It ensures that information is presented in a usable format at the receiving end, much
like converting one language into another.
Key Functions of the Presentation Layer:
Data Translation – Converts data into a standard, compatible format for communication.
For example, converting between ASCII and EBCDIC character codes.
Data Compression – Reduces the size of data before transmission, saving bandwidth and
speeding up communication.
Data Encryption & Decryption – Provides security by encrypting data before transmission
and decrypting it upon reception. For example, HTTPS encryption and decryption processes
occur here.
Data Formatting – Ensures that multimedia elements such as images, text, and videos are
properly formatted so that the receiving system can interpret them correctly.
Examples in Action:
Encryption/Decryption – HTTPS secures web traffic by encrypting data at the sender side
and decrypting it at the receiver side.
Character Code Translation – Text encoded in ASCII on one machine may need to be
converted to EBCDIC for another system.
Compression – Video streaming services compress data before transmission to reduce
buffering and improve efficiency.
Session Layer:
The Session Layer is the fifth layer of the OSI model and is responsible for
establishing, managing, and terminating communication sessions (links) between devices or
applications. A session refers to the period of interaction that begins when a connection is
opened and ends when it is closed.
This layer acts like a coordinator or manager of communication, ensuring that communication
between applications is continuous, organized, and reliable. It also supports recovery by allowing
interrupted sessions to resume from the last checkpoint rather than starting over.
Key Functions of the Session Layer:
1. Session Establishment
o Creates and initializes communication sessions by exchanging control information (such
as usernames, passwords, and session IDs).
o Ensures both parties are authenticated and authorized before data transfer begins.
2. Session Maintenance
o Keeps communication active for the required duration, avoiding premature
disconnections (active for as long as required)
o manages acknowledgements, timeouts, and checkpoints to monitor progress. (e.g.,
deciding who sends data at what time).
o Uses checkpoints to divide long transmissions into smaller units, allowing recovery in
case of interruptions.
3. Session Termination – Closes the session after communication is complete, releasing
network resources to avoid waste.
4. Synchronization and Recovery – Inserts checkpoints (synchronization points) in large data
transfers. If a transmission fails, it can resume from the last checkpoint instead of restarting.
Example: If a 100 MB file transfer is interrupted at 52 MB, the session layer ensures
resumption from the last checkpoint (e.g., 50 MB) instead of restarting from zero.
Common Session Layer Protocols:
Remote Procedure Call (RPC) – Allows programs to request services from software on
another device.
NetBIOS (Network Basic Input/Output System) – Manages communication between
applications on a LAN.
PPTP (Point-to-Point Tunneling Protocol) – Used in VPNs to establish secure sessions.
SCP (Session Control Protocol) – Manages multimedia sessions.
SDP (Session Description Protocol) – Defines multimedia communication sessions such as
video calls.
SQL Session Management – Maintains database sessions.
Real-World Examples:
Web browsing session → When you log in to a website, the session keeps track of your
authentication and activity until you log out or close the browser.
File transfer → Ensuring that only missing portions of a file are retransmitted after an
interruption. During a 100 MB file transfer, checkpoints (e.g., every 5 MB) ensure that if the
transfer is interrupted at 52 MB, only the remaining 48 MB needs to be resent.
Video conferencing → Maintaining synchronization of audio and video streams during a
call.
Database Sessions – SQL session management ensures that queries and transactions between
a client and a server run smoothly within a defined session.
Transport Layer:
The Transport Layer is the fourth layer of the OSI model and is responsible
for end-to-end communication between applications running on different devices. It ensures
that data is delivered reliably, in sequence, and without errors, providing a bridge between the
upper layers (Session, Presentation, Application) and the lower layers (Network, Data Link,
Physical).
This layer divides large data from the session layer into smaller segments for efficient
transmission and reassembles them at the destination. It also manages flow control, error
detection and recovery, and congestion control, ensuring smooth and accurate data transfer
across networks.
Key Functions of the Transport Layer:
1. Segmentation and Reassembly – Breaks large messages into smaller segments for
transmission and reassembles them at the receiving end.
2. Error Control – Detects transmission errors using checksums, acknowledgements, and
retransmissions to ensure data integrity.
3. Flow Control – Regulates the rate of data transmission to prevent overwhelming slower
devices, using techniques like windowing and buffering.
4. End-to-End Communication – Provides a reliable connection between source and
destination applications, ensuring complete delivery of messages.
5. Service-Point Addressing – Directs data to the correct application using port numbers,
distinguishing multiple simultaneous data streams on a device.
Key Protocols:
Protocol Type Characteristics Common Use
Reliable, error-checked,
TCP (Transmission Connection- Web browsing,
sequenced delivery, flow
Control Protocol) oriented email, file transfers
control
UDP (User Datagram Faster, minimal overhead, less Video streaming,
Connectionless
Protocol) reliable online gaming, VoIP
Examples in Action:
File Transfer – TCP divides a large file into segments, sends them, and ensures all segments
arrive intact; missing segments are retransmitted.
Video Streaming – UDP allows continuous, fast delivery of video/audio data with minimal
delay, tolerating some packet loss.
Multiple Application Streams – TCP/UDP port numbers distinguish streams from different
applications (e.g., browser, music, chat) on the same device.
Network Layer:
The Network Layer is the third layer of the OSI model, responsible for
routing and forwarding data packets between devices across multiple networks. It
determines the best path for data to travel from the source to the destination, even when multiple
intermediate networks or routers are involved.
This layer provides logical addressing using IP addresses, allowing devices on different
networks to identify each other, and it ensures that data is delivered efficiently and accurately
across complex network topologies.
Key Functions of the Network Layer
1. Logical Addressing – Assigns logical addresses (e.g., IPv4 or IPv6) to devices and maps
them to physical addresses (MAC) using protocols such as ARP (Address Resolution
Protocol) and RARP (Reverse ARP).
2. Routing – Determines the optimal path for data packets to travel across networks using
routing algorithms such as Dijkstra’s and Bellman-Ford.
3. Packet Forwarding & Switching – Moves packets from one network segment to
another via routers, gateways, or layer-3 switches.
4. Fragmentation and Reassembly – Splits large packets into smaller fragments to fit the
Maximum Transmission Unit (MTU) of the underlying network and reassembles them at
the destination.
5. Traffic Management & Optimization – Works around network congestion, broken
links, and service priority to ensure efficient data delivery.
Common Protocols
Protocol Function / Use
Provides logical addressing and end-to-end packet
IP (Internet Protocol)
delivery (IPv4, IPv6)
Reports errors and diagnostic functions (e.g., ping,
ICMP (Internet Control Message Protocol)
traceroute)
ARP / RARP (Address Resolution Protocol Maps IP addresses to MAC addresses and vice
/ Reverse ARP) versa
Determine optimal paths and maintain routing
Routing Protocols (RIP, OSPF, BGP)
tables
IGMP (Internet Group Management
Manages multicast group memberships
Protocol)
Examples in Action
Packet Routing Across Networks – When a device in Boston sends data to a server in
California, routers determine the best path for the packets across multiple networks.
Fragmentation – A large file is broken into smaller packets to fit the network’s MTU and
reassembled at the destination.
Error Reporting – ICMP can notify the sender if a packet could not reach its destination.
Address Mapping – ARP resolves the IP address of a device to its physical MAC address for
local delivery.
Data Link Layer:
The Data Link Layer is the second layer of the OSI model and is
responsible for node-to-node communication within a local network.
It ensures that data is reliably delivered from one device to another on the same network
segment, handling framing, addressing, error detection and correction, and flow control.
This layer is divided into two sublayers:
1. Logical Link Control (LLC) – Manages error detection, flow control, and multiplexing
services for upper layers.
2. Media Access Control (MAC) – Controls how devices access and share the physical
medium (e.g., Ethernet, Wi-Fi, Bluetooth).
Key Functions of the Data Link Layer
Framing – Divides network layer packets into frames containing a header (with source
and destination MAC addresses, frame type, sequence number), payload, and trailer
(with checksum for error detection).
Error Detection – Detects errors in frames using methods such as parity check, cyclic
redundancy check (CRC), or checksum.
Error Correction – Corrects errors using techniques like stop-and-wait, go-back-N, or
selective repeat.
Flow Control – Ensures that data is sent at a rate the receiving device can handle,
preventing overflow.
Access Control – Manages which device can use the physical medium at a given time
using protocols such as CSMA/CD, CSMA/CA, or token passing.
Common Technologies and Protocols
Sublayer Function / Use Examples
LLC (Logical Link Provides flow control, error control, and
IEEE 802.2
Control) services to upper layers
MAC (Media Access Controls access to the shared medium, Ethernet, Wi-Fi (IEEE
Control) encapsulates frames 802.11), PPP
Resolves logical addresses to physical ARP (Address Resolution
Address Mapping
addresses Protocol), RARP
Examples in Action
Ethernet Communication – MAC layer controls which device can transmit data over
the shared cable.
Wi-Fi Networks – CSMA/CA prevents collisions and manages medium access.
Error Handling – If a frame is corrupted during transmission, LLC can request a
retransmission.
Switch Operation – Most switches operate at Layer 2, using MAC addresses to forward
frames to the correct port.
Physical Layer:
The Physical Layer is the first and lowest layer of the OSI (Open Systems
Interconnection) model. It is responsible for the transmission and reception of raw bits (0s
and 1s) between networked devices (physical medium). Unlike the upper layers, this layer does
not interpret the meaning of the data. Instead, it ensures that the binary data is properly converted
into signals and transmitted across a physical medium.
Role and Purpose: The Physical Layer defines the hardware components, transmission media,
and electrical/optical characteristics required for communication. It provides the foundation for
all higher networking layers, since without a medium to carry signals, no communication can
occur.
Its primary role is to convert digital bits into electrical signals, light pulses, or radio waves,
which can travel across copper wires, fiber optic cables, or wireless channels. At the receiving
end, it reconverts these signals back into bits for processing by higher layers.
Importance:
The Physical Layer is essential because it forms the base of the networking
hierarchy. Without this layer, higher-level functions such as addressing, error detection, and data
flow control would not be possible. By standardizing physical characteristics and ensuring
reliable signal transmission, it guarantees smooth communication across diverse devices and
technologies.
Functions of the Physical Layer
o Transmission of Bits: Converts binary data into physical signals (electrical pulses, light
waves, or radio frequencies) suitable for the transmission medium. Receives signals and
converts them back into bits for higher layers.
o Bit Synchronization: Provides synchronization between sender and receiver using clock
signals and ensures that each bit is correctly identified at the receiving end.
o Bit Rate Control: Defines the rate (bits per second) at which data is transmitted and
manages bandwidth utilization efficiently.
o Physical Topology: Determines how devices are physically connected in a network.
Examples: Bus, Star, Ring, Mesh.
o Transmission Modes: supports Simplex: One-way communication (e.g., keyboard →
computer), Half-Duplex: Two-way communication, but only one direction at a time (e.g.,
walkie-talkies) and Full-Duplex: Two-way simultaneous communication (e.g., modern
Ethernet).
o Physical Specifications: Defines voltage levels, timing, connector types, cable lengths, pin
layouts, and frequencies and ensures device compatibility across different hardware vendors.
Components of the Physical Layer
Transmission Media:
o Wired: Twisted pair cables (Ethernet), coaxial cables, fiber optics.
o Wireless: Wi-Fi, Bluetooth, infrared, satellite links, radio frequencies.
Networking Devices (Layer 1 devices):
o Hubs – Distribute signals to multiple devices.
o Repeaters – Strengthen weak signals.
o Modems – Convert digital to analog signals and vice versa.
o Antennas – Used in wireless communication.
o Cables & Connectors – Provide the physical pathways.
Standards & Protocols:
o Ethernet (IEEE 802.3)
o Wi-Fi (IEEE 802.11)
o Bluetooth (IEEE 802.15)
o DSL, ISDN, USB
Examples of the Physical Layer in Action
Plugging in an Ethernet cable (cat5.cat6) between two computers to establish a connection.
Using fiber optic cables to transmit large amounts of data over long distances.
Wireless devices communicating via radio frequencies in a Wi-Fi network.
A repeater boosting a weak signal to extend network coverage, hubs for data distribution,
antennas for wireless transmission.
How Does Communication Happen in OSI Model?
Let's understand the process of communication in the OSI model, with the help of easy steps.
Step 1: The application layer interacts with software applications to create data that needs to be
sent. For example, when you send an email, the email application generates the data.
Step 2: Presentation layer formats or translates the data for the application layer based on the
syntax or semantics that the application accepts. It also handles encryption and compression.
Step 3: The Session layer establishes, manages, and terminates connections between
applications. It ensures that the data sessions are maintained and synchronized.
Step 4: The Transport Layer is responsible for ensuring complete data transfer. It breaks down
the data into smaller packets, manages error detection and correction, and ensures that packets
are delivered in the correct order.
Step 5: The Network Layer determines the best physical path for the data to travel. It handles
logical addressing and routing, ensuring that data packets reach their destination.
Step 6: The Data Link Layer is responsible for node-to-node data transfer and error detection. It
packages data into frames and adds physical addresses (MAC addresses) to these frames.
Step 7: The Physical Layer deals with the physical connection between devices. It converts data
into electrical, radio, or optical signals and transmits them over the transmission medium (like
cables or wireless).