Asdd
Asdd
Asdd
Modern world scenario is ever changing. Data Communication and network have changed the way
business and other daily affair works. Now, they highly rely on computer networks and internetwork.
A set of devices often mentioned as nodes connected by media link is called a Network.
A node can be a device which is capable of sending or receiving data generated by other nodes on the
network like a computer, printer etc. These links connecting the devices are called Communication
channels.
Computer network is a telecommunication channel using which we can share data with other coomputers
or devices, connected to the same network. It is also called Data Network. The best example of computer
network is Internet.
Computer network does not mean a system with one Control Unit connected to multiple other systems as
its slave. That is Distributed system, not Computer Network.
A network must be able to meet certain criterias, these are mentioned below:
1. Performance
2. Reliability
3. Scalability
Transit time : It is the time taken to travel a message from one device to another.
Response time : It is defined as the time elapsed between enquiry and response.
1. Efficiency of software
2. Number of users
3. Capability of connected hardware
Data Communication
The exchange of data between two devices through a transmission medium is called Data
Communication. The data is exchanged in the form of 0's and 1's. The transmission medium used is
wire cable. For data communication to occur, the communication device must be a part of a
communication system. Data Communication has two types - Local and Remote which are discussed
below:
Computer Network
A computer network is a telecommunications network that enables sharing of resources and information.
Nodes in a network are connected with each other using either cable or wireless media and use a system
of digital rules for data exchange. Data is transferred in the form of a packet, a formatted unit of data.
If you have access to the Internet at home, your devices are part of a LAN (Local Area Network). Here is
how a simple LAN looks like:
In the picture above you can see that the computer is connected to the router which is then connect to the
Internet. The computer can send and receive data on the Internet using Internet protocols such as HTTP
and DNS.
To connect two computers together, we would use a device called a switch. Switches serve as a central
point to which all computers on a network connect to:
Network computer devices that originate, route and terminate the data are called network nodes. Nodes
are generally identified by network addresses, and can include hosts such as personal
computers, phones, and servers, as well as networking hardware such as routers and switches.
Computer networks support an enormous number of applications and services such as access to
the World Wide Web, digital video, digital audio, shared use of application and storage servers, printers,
and fax machines, and use of email and instant messaging applications as well as many others.
Computer networks differ in the transmission medium used to carry their signals, communications
protocols to organize network traffic, the network's size, topology, traffic control mechanism and
organizational intent. The best-known computer network is the Internet.
Network packet
Computer communication links that do not support packets, such as traditional point-to-point
telecommunication links, simply transmit data as a bit stream. However, the overwhelming majority of
computer networks carry their data in packets. A network packet is a formatted unit of data (a list of bits or
bytes, usually a few tens of bytes to a few kilobytes long) carried by a packet-switched network. Packets
are sent through the network to their destination. Once the packets arrive they are reassembled into their
original message.
Packets consist of two kinds of data: control information, and user data (payload). The control information
provides data the network needs to deliver the user data, for example: source and destination network
addresses, error detection codes, and sequencing information. Typically, control information is found
in packet headers and trailers, with payload data in between.
With packets, the bandwidth of the transmission medium can be better shared among users than if the
network were circuit switched. When one user is not sending packets, the link can be filled with packets
from other users, and so the cost can be shared, with relatively little interference, provided the link isn't
overused. Often the route a packet needs to take through a network is not immediately available. In that
case the packet is queued and waits until a link is free.
End User Device: - It includes computer, printer, scanner and other devices that provide services
directly to the user.
Network Devices: - Network devices, or networking hardware, are physical devices that are required
for communication and interaction between hardware on a computer network.
• Hub
• Switch
• Router
• Bridge
• Gateway
• Modem
• Repeater
• Access Point
Hub
Hubs connect multiple computer networking devices together. A hub also acts as a repeater in that it
amplifies signals that deteriorate after traveling long distances over connecting cables. A hub is the
simplest in the family of network connecting devices because it connects LAN components with identical
protocols.
A hub can be used with both digital and analog data, provided its settings have been configured to
prepare for the formatting of the incoming data. For example, if the incoming data is in digital format, the
hub must pass it on as packets; however, if the incoming data is analog, then the hub passes it on in
signal form.
Hubs do not perform packet filtering or addressing functions; they just send data packets to all connected
devices. Hubs operate at the Physical layer of the Open Systems Interconnection (OSI) model. There are
two types of hubs: simple and multiple ports.
Switch
Switches generally have a more intelligent role than hubs. A switch is a multiport device that improves
network efficiency. The switch maintains limited routing information about nodes in the internal network,
and it allows connections to systems like hubs or routers. Strands of LANs are usually connected using
switches. Generally, switches can read the hardware addresses of incoming packets to transmit them to
Using switches improves network efficiency over hubs or routers because of the virtual circuit capability.
Switches also improve network security because the virtual circuits are more difficult to examine with
network monitors. You can think of a switch as a device that has some of the best capabilities of routers
and hubs combined. A switch can work at either the Data Link layer or the Network layer of the OSI
model. A multilayer switch is one that can operate at both layers, which means that it can operate as both
a switch and a router. A multilayer switch is a high-performance device that supports the same routing
protocols as routers.
Router
Routers help transmit packets to their destinations by charting a path through the sea of interconnected
networking devices using different network topologies. Routers are intelligent devices, and they store
information about the networks they’re connected to. Most routers can be configured to operate as
packet-filtering firewalls and use access control lists (ACLs). Routers, in conjunction with a channel
service unit/data service unit (CSU/DSU), are also used to translate from LAN framing to WAN framing.
This is needed because LANs and WANs use different network protocols. Such routers are known as
border routers. They serve as the outside connection of a LAN to a WAN, and they operate at the border
of your network.
Router are also used to divide internal networks into two or more subnetworks. Routers can also be
connected internally to other routers, creating zones that operate independently. Routers establish
communication by maintaining tables about destinations and local connections. A router contains
information about the systems connected to it and where to send requests if the destination isn’t known.
Routers usually communicate routing and other information using one of three standard protocols:
Routing Information Protocol (RIP), Border Gateway Protocol (BGP) or Open Shortest Path First (OSPF).
Routers are your first line of defense, and they must be configured to pass only traffic that is authorized
by network administrators. The routes themselves can be configured as static or dynamic. If they are
static, they can only be configured manually and stay that way until changed. If they are dynamic, they
learn of other routers around them and use information about those routers to build their routing tables.
Routers are general-purpose devices that interconnect two or more heterogeneous networks. They are
usually dedicated to special-purpose computers, with separate input and output network interfaces for
each connected network. Because routers and gateways are the backbone of large computer networks
like the internet, they have special features that give them the flexibility and the ability to cope with
varying network addressing schemes and frame sizes through segmentation of big packets into smaller
sizes that fit the new network components. Each router interface has its own Address Resolution Protocol
(ARP) module, its own LAN address (network card address) and its own Internet Protocol (IP) address.
The router, with the help of a routing table, has knowledge of routes a packet could take from its source to
its destination. The routing table, like in the bridge and switch, grows dynamically. Upon receipt of a
packet, the router removes the packet headers and trailers and analyzes the IP header by determining
the source and destination addresses and data type, and noting the arrival time. It also updates the router
table with new addresses not already in the table. The IP header and arrival time information is entered in
the routing table. Routers normally work at the Network layer of the OSI model.
Bridge
Bridges are used to connect two or more hosts or network segments together. The basic role of bridges in
network architecture is storing and forwarding frames between the different segments that the bridge
connects. They use hardware Media Access Control (MAC) addresses for transferring frames. By looking
at the MAC address of the devices connected to each segment, bridges can forward the data or block it
from crossing. Bridges can also be used to connect two physical LANs into a larger logical LAN.
Bridges work only at the Physical and Data Link layers of the OSI model. Bridges are used to divide
larger networks into smaller sections by sitting between two physical network segments and managing
the flow of data between the two.
Bridges are like hubs in many respects, including the fact that they connect LAN components with
identical protocols. However, bridges filter incoming data packets, known as frames, for addresses before
they are forwarded. As it filters the data packets, the bridge makes no modifications to the format or
content of the incoming data. The bridge filters and forwards frames on the network with the help of a
dynamic bridge table. The bridge table, which is initially empty, maintains the LAN addresses for each
computer in the LAN and the addresses of each bridge interface that connects the LAN to other LANs.
Bridges, like hubs, can be either simple or multiple port.
Bridges have mostly fallen out of favor in recent years and have been replaced by switches, which offer
more functionality. In fact, switches are sometimes referred to as “multiport bridges” because of how they
operate.
Modem
Modems (modulators-demodulators) are used to transmit digital signals over analog telephone lines.
Thus, digital signals are converted by the modem into analog signals of different frequencies and
transmitted to a modem at the receiving location. The receiving modem performs the reverse
transformation and provides a digital output to a device connected to a modem, usually a computer. The
digital data is usually transferred to or from the modem over a serial line through an industry standard
interface, RS-232. Many telephone companies offer DSL services, and many cable operators use
modems as end terminals for identification and recognition of home and personal users. Modems work on
both the Physical and Data Link layers.
Repeater
A repeater is an electronic device that amplifies the signal it receives. You can think of repeater as a
device which receives a signal and retransmits it at a higher level or higher power so that the signal can
cover longer distances, more than 100 meters for standard LAN cables. Repeaters work on the Physical
layer.
When an electrical signal travels along a medium it gets attenuated depending upon the medium
characteristics. That is why a LAN cannot send signal beyond a certain limit imposed by the different
types of LAN technologies. To increase the length of the LAN, repeaters are frequently used. Repeaters
in its simplest form relay analog electric signal. It means that they transmit the physical layer signals or
data and therefore correspond to the bottom layer of OSI model.
Repeater amplifies the signal, which has got attenuated during the course of transmission because of the
physical conditions imposed by the transmission media. It also restores the signal to its original shape.
The specific characteristic of repeater is that whatever it receives it transmits to the other LAN segment.
This does not understand the frame format and also physical addresses. In other words, it is a
transparent device. Therefore, multiple LANs connected by repeaters may be considered as a single
LAN.
Generally, the maximum size of an Ethernet is considered to be 500 meters. When two Ethernet with
maximum size segments are connected together using repeater will make the total length to
1000meters.In the same manner two repeaters connect three segments together and transmit signal from
one end to another. That is, signal can travel up to 3000 meters. Is it possible to extend the length of LAN
in this manner up to any arbitrary length? The answer is no. Ethernet follows CSMA/CD access
mechanism for successful transmissions of signal which is based on low delay. By extending the length of
Ethernet beyond certain limit will greatly hamper delay time of CSMA/CD mechanism.
Guided Media:
It is also referred to as Wired or Bounded transmission media. Signals being transmitted are directed and
confined in a narrow pathway by using physical links.
Features:
High Speed
Secure
Used for comparatively shorter distances
Advantages:
• Least expensive
• Easy to install
• High speed capacity
Disadvantages:
• Susceptible to external interference
• Lower capacity and performance in comparison to STP
• Short distance transmission due to attenuation
This type of cable consists of a special jacket to block external interference. It is used in fast-data-rate
Ethernet and in voice and data channels of telephone lines.
Advantages:
• Better performance at a higher data rate in comparison to UTP
• Eliminates crosstalk
• Comparitively faster
Disadvantages:
• Comparitively difficult to install and manufacture
• More expensive
• Bulky
Coaxial Cable:
It has an outer plastic covering containing 2 parallel conductors each having a separate insulated
protection cover. Coaxial cable transmits information in two modes: Baseband mode(dedicated cable
bandwidth) and Broadband mode(cable bandwidth is split into separate ranges). Cable TVs and analog
television networks widely use Coaxial cables.
Advantages:
• High Bandwidth
• Better noise Immunity
• Easy to install and expand
• Inexpensive
Disadvantages:
• Single cable failure can disrupt the entire network
It uses the concept of reflection of light through a core made up of glass or plastic. The core is
surrounded by a less dense glass or plastic covering called the cladding. It is used for transmission of
large volumes of data.
2. Unguided Media:
It is also referred to as Wireless or Unbounded transmission media. No physical medium is required for
the transmission of electromagnetic signals.
Features:
• Signal is broadcasted through air
• Less Secure
• Used for larger distances
There are 3 major types of Unguided Media:
(i) Radiowaves -
These are easy to generate and can penetrate through buildings. The sending and receiving antennas
need not be aligned. Frequency Range:3KHz – 1GHz. AM and FM radios and cordless phones use
Radiowaves for transmission.
Further Categorized as (i) Terrestrial and (ii) Satellite.
(ii) Microwaves –
It is a line of sight transmission i.e. the sending and receiving antennas need to be properly aligned with
each other. The distance covered by the signal is directly proportional to the height of the antenna.
Frequency Range:1GHz – 300GHz. These are majorly used for mobile phone communication and
television distribution.
(iii) Infrared –
Infrared waves are used for very short distance communication. They cannot penetrate through
obstacles. This prevents interference between systems. Frequency Range:300GHz – 400THz. It is used
in TV remotes, wireless mouse, keyboard, printer, etc.
ETHERNET
Ethernet is the technology that is most commonly used in wired local area networks (LANs). A LAN is a
network of computers and other electronic devices that covers a small area such as a room, office, or
building. It is used in contrast to a wide area network (WAN), which spans much larger geographical
areas. Ethernet is a network protocol that controls how data is transmitted over a LAN. Technically it is
referred to as the IEEE 802.3 protocol. The protocol has evolved and improved over time to transfer data
at the speed of a gigabit per second.
Many people have used Ethernet technology their whole lives without knowing it. It is most likely that
any wired network in your office, at the bank, and at home is an Ethernet LAN. Most desktop and laptop
computers come with an integrated Ethernet card inside so they are ready to connect to an Ethernet
LAN.
UTP Cable
UTP cable is a medium that is composed of pairs of wires. UTP cable is used in a variety of networks.
Each of the eight individual copper wires in UTP cable \is covered by an insulating material. In addition,
the wires in each pair are twisted around each other
Shielded Twisted-Pair Cable
Shielded twisted-pair (STP) cable combines the techniques of shielding, cancellation, and wire twisting.
Each pair of wires is wrapped in a metallic foil. The four pairs of wires then are wrapped in an overall
metallic braid or foil, usually 150-ohm cable. As specified for use in Ethernet network installations, STP
reduces electrical noise both within the cable (pair-to-pair coupling, or crosstalk) and from outside the
cable (EMI and RFI). STP usually is installed with STP data connector, which is created especially for the
STP cable. However, STP cabling also can use the same RJ connectors that UTP uses.
Category 2 - 4 Mbps
Category 3 – 10 Mbps
Category 4 – 16 Mbps
Category 5e – 1 Gbps
Category 6 – 10 Gbps
CRIMPING
Process to connecting cable to the jack.
A crimping tool is a device used to conjoin two pieces of metal by deforming one or both of them in a
way that causes them to hold each other. The result of the tool's work is called a crimp. A good example
of crimping is the process of affixing a connector to the end of a cable. For instance, network cables and
phone cables are created using a crimping tool (shown below) to join the RJ-45 and RJ-11 connectors to
the both ends of either phone or Cat 5 cable.
A RJ45 connector is a modular 8 position, 8 pin connector used for terminating Cat5e patch cable or Cat6
cable. A pinout is a specific arrangement of wires that dictate how the connector is terminated. There are
two standards recognized by ANSI, TIA and EIA for wiring Ethernet cables. The first is the T568A wiring
standard and the second is T568B. T568B has surpassed 568A and is seen as the default wiring scheme
for twisted pair structured cabling. If you are unsure of which to use, choose 568B.
• Switch to router
• Switch to PC or server
• Hub to PC or server
Use crossover cables for the following cabling:
• Switch to switch
• Switch to hub
• Hub to hub
• Router to router
• Router Ethernet port to PC NIC
• PC to PC
Coaxial Cable
Coaxial cables are the guided media that carnes the signal of higher frequency range compared to
twisted pair cable. Coaxial cables are also called coax. (short form). Two types of coaxial cables are
widely used: 50 ohm cable and 75 ohm cable. 50 ohm cable is used for digital transmission and 75 ohm
cable is used for analog transmission. Due to the shield provided, this cable has excellent noise immunity.
It has a large bandwidth and low losses. Co-axial cables are easy to install. They are often installed either
in a device to device daisy chain (Ethernet) or a star (ARC net).
A coaxial cable consists of many small cables in a protective cover. The cover shields the cable from
physical dangers as well as from electromagnetic interference. Within the cover, the various cables are
shielded from interference with one another. Coaxial cables are used in communication networks that
require many simultaneous communication links. Each coaxial cable can provide more than 5000 links. It
has a data rate of 10 Mbps which can be increased with the increase in diameter of the inner conductor.
The specified maximum number of nodes on a thinnet segment is 30 nodes and on a thicknet it is 100
nodes.
Coaxial cable is a two-conductor cable in which one conductor forms an electromagnetic shield around
the other. The two conductors are separated by insulation. It is a constant impedance transmission
cable. This media is used in base band and broadband transmission.
Coaxial cables do not produce external electric and magnetic fields and are not affected by them. This
makes them ideally suited, although more expensive, for transmitting signals. This cable is suitable for
point to point or point to multipoint applications. In fact this is the most widely used medium for local area
networks. These cables are costlier than twisted pair cables but they are cheaper than the optical fiber
cables.
Features: It provides better immunity than twisted pair. This cable is able to transmit data at higher rates.
Limitations: High installation cost. High maintenance cost.
Fiber optics transmit data in the form of light particles -- or photons -- that pulse through a fiber optic
cable. The glass fiber core and the cladding each have a different refractive index that bends incoming
light at a certain angle. When light signals are sent through the fiber optic cable, they reflect off the core
and cladding in a series of zig-zag bounces, adhering to a process called total internal reflection. The light
signals do not travel at the speed of light because of the denser glass layers, instead traveling about 30%
slower than the speed of light. To renew, or boost, the signal throughout its journey, fiber optics
transmission sometimes requires repeaters at distant intervals to regenerate the optical signal by
converting it to an electrical signal, processing that electrical signal and retransmitting the optical signal.
Power Over Ethernet (POE)
For example, a digital security camera normally requires two connections to be made when it is installed:
A network connection, in order to be able to communicate with video recording and display equipment
A power connection, to deliver the electrical power the camera needs to operate
However, if the camera is POE-enabled, only the network connection needs to be made, as it will receive
its electrical power from this cable as well.
• Simplex Mode
Examples of simplex Mode are loudspeakers, television broadcasting, television and remote, keyboard
and monitor etc.
For example, on a local area network using a technology that has half-duplex transmission, one
workstation can send data on the line and then immediately receive data on the line from the same
direction in which data was just transmitted. Hence half-duplex transmission implies a bidirectional line
(one that can carry data in both directions) but data can be sent in only one direction at a time.
Example of half duplex is a walkie- talkie in which message is sent one at a time but messages are sent
in both the directions.
Example of Full Duplex is a Telephone Network in which there is communication between two persons by
a telephone line, using which both can talk and listen at the same time .
In full duplex system there can be two lines one for sending the data and the other for receiving data.
The most important rule, which you’ll know from communication situations when there are several
participants (e.g. a conversation with the family at the dinner table), is: only one person may send their
information at once. If everyone speaks at the same time, it’s confusing and no-one can understand
anything. The posts can also overlap in networks, in this case in the form of data packets. This is called
a collision, when the data packets meet and alienate their contents.
CSMA/CA tries to reduce the frequency of these collisions and provide a plan at the same time on how to
proceed if a collision does occur. The protocol is also important because the transmissions in the wireless
networks cannot run in the same order (due to the technology used) as they would have done with a
cable. In a decentralized network, it is necessary for all participants to follow a set of rules and organize
the communication among themselves.
Network Topologies
The way in which devices are interconnected to form a network is called network topology. Some of the
factors that affect choice of topology for a network are −
• Cost − Installation cost is a very important factor in overall cost of setting up an infrastructure.
So cable lengths, distance between nodes, location of servers, etc. have to be considered when
designing a network.
• Reliability − Network should be designed in such a way that it has minimum down time. Failure
of one node or a segment of cabling should not render the whole network useless.
• Scalability − Network topology should be scalable, i.e. it can accommodate load of new devices
and nodes without perceptible drop in performance.
• Ease of installation − Network should be easy to install in terms of hardware, software and
technical personnel requirements.
Bus Topology
Data network with bus topology has a linear transmission cable, usually coaxial, to which
many network devices and workstations are attached along the length. Server is at one end of the bus.
When a workstation has to send data, it transmits packets with destination address in its header along
the bus.
The data travels in both the directions along the bus. When the destination terminal sees the data, it
copies it to the local disk.
Ring Topology
In ring topology each terminal is connected to exactly two nodes, giving the network a circular shape.
Data travels in only one pre-determined direction.
When a terminal has to send data, it transmits it to the neighboring node which transmits it to the next
one. Before further transmission data may be amplified. In this way, data raverses the network and
reaches the destination node, which removes it from the network. If the data reaches the sender, it
removes the data and resends it later.
• Troubleshooting is difficult as many nodes may have to be inspected before faulty one is
identified
• Difficult to remove one or more nodes while keeping the rest of the network intact
Star Topology
In star topology, server is connected to each node individually. Server is also called the central node. Any
exchange of data between two nodes must take place through the server. It is the most popular topology
for information and voice networks as central node can process data received from source node before
sending it to the destination node.
• Point-to-point wiring for individual segments means easier installation and maintenance
• Insecure network
There are two techniques to transmit data over the Mesh topology, they are :
• Routing
• Flooding
mesh topology but some devices are only connected to two or three devices.
• Full Mesh Topology : Each and every nodes or devices are connected to each other.
Features of Mesh Topology
• Fully connected.
• Robust.
• Not flexible.
• It is robust.
HYBRID Topology
It is two different types of topologies which is a mixture of two or more topologies. For example if in an
office in one department ring topology is used and in another star topology is used, connecting these
topologies will result in Hybrid Topology (ring topology and star topology).
Features of Hybrid Topology
• It is a combination of two or topologies
• Effective.
• Flexible.
Disadvantages of Hybrid Topology
• Complex in design.
• Costly.
Types of Networks
Networks can be categorized depending on size, complexity, level of security, or geographical range. We
will discuss some of the most popular topologies based on geographical spread.
PAN
PAN is the acronym for Personal Area Network. PAN is the interconnection between devices within the
range of a person’s private space, typically within a range of 10 metres. If you have transferred images
or songs from your laptop to mobile or from mobile to your friend’s mobile using Bluetooth, you have set
up and used a personal area network.
A person can connect her laptop, smart phone, personal digital assistant and portable printer in a
network at home. This network could be fully Wi-Fi or a combination of wired and wireless.
For instance, a surgery room in a hospital might have a PAN set up so that the surgeon can communicate
with the other team members in the room. It's unnecessary to have all their communication fed through a
more extensive network for people a few feet away to receive it. A PAN transmits data through short-
range communication like Bluetooth.
Wireless keyboards and mice also specialize in localized use. They don't need to operate computers in
other buildings or cities. They only need to communicate with a nearby, usually line-of-sight device like a
computer or tablet.
Since most devices that support short-range communication can block out unauthorized connections, a
WPAN is considered a secure network. However, just like with WLANs and other network types, hackers
can still access unsecured PANs.
LAN
LAN or Local Area Network is a wired network spread over a single site like an office, building or
manufacturing unit. LAN is set up to when team members need to share software and hardware
resources with each other but not with the outside world. Typical software resources include official
documents, user manuals, employee handbook, etc. Hardware resources that can be easily shared over
the network include printer, fax machines, modems, memory space, etc. This decreases infrastructure
costs for the organization drastically.
A LAN may be set up using wired or wireless connections. A LAN that is completely wireless is called
Wireless LAN or WLAN.
CAN
Stands for "Campus Area Network." A CAN is a network that covers an educational or corporate campus.
Examples include elementary schools, university campuses, and corporate buildings.
A campus area network is larger than a local area network LAN since it may span multiple buildings
within a specific area. Most CANs are comprised of several LANs connected via switches and routers that
combine to create a single network. They operate similar to LANs, in that users with access to the
network (wired or wireless) can communicate directly with other systems within the network.
Economical:
CAN is economical in the sense that it uses fewer cables, switches, hubs and routers.
Characteristics of MAN
• It generally covers towns and cities (50 km)
• Communication medium used for MAN are optical fibers, cables etc.
• Communication medium used are satellite, public telephone networks which are connected by
routers.
Types of Messaging
The cast term here signifies some data(stream of packets) is being transmitted to the recipient(s) from
client(s) side over the communication channel that help them to communicate. Let’s see some of the
“cast” concepts that are prevailing in the computer networks field
• Unicast
• Broadcast
• Multicast
Unicast Messaging-
This type of information transfer is useful when there is a participation of single sender and single
recipient. So, in short you can term it as a one-to-one transmission. For example, a device having IP
address 10.1.2.0 in a network wants to send the traffic stream(data packets) to the device with IP address
20.12.4.2 in the other network, then unicast comes into picture. This is the most common form of data
transfer over the networks.
Broadcast Messaging–
Broadcasting transfer (one-to-all) techniques can be classified into two types :
• Limited Broadcasting –
Suppose you have to send stream of packets to all the devices over the network that you reside,
this broadcasting comes handy. For this to achieve, it will append 255.255.255.255 (all the 32 bits
of IP address set to 1) called as Limited Broadcast Address in the destination address of the
datagram (packet) header which is reserved for information transfer to all the recipients from a
single client (sender) over the network.
• Direct Broadcasting –
This is useful when a device in one network wants to transfer packet stream to all the devices over
the other network. This is achieved by translating all the Host ID part bits of the destination address
to 1,referred as Direct Broadcast Address in the datagram header for information transfer.
This mode is mainly utilized by television networks for video and audio distribution. One important
protocol of this class in Computer Networks is Address Resolution Protocol (ARP) that is used for
resolving IP address into physical address which is necessary for underlying communication.
Multicast –
In multicasting, one/more senders and one/more recipients participate in data transfer traffic. In this
method traffic recline between the boundaries of unicast (one-to-one) and broadcast (one-to-all).
Multicast lets server’s direct single copies of data streams that are then simulated and routed to hosts that
request it. IP multicast requires support of some other protocols like IGMP (Internet Group Management
Protocol), Multicast routing for its working. Also in Classful IP addressing Class D is reserved for
multicast groups.
Peer-to-Peer Networks
• In the peer to peer computer network model we simply use the same Workgroup for all the computers
and a unique name for each computer in a computer network.
• There is no master or controller or central server in this computer network and computers join hands to
share files, printers and Internet access.
• It is practical for workgroups of a dozen or less computers making it common environments, where each
PC acts as an independent workstation and maintaining its own security that stores data on its own disk
but which can share it with all other PCs on the network.
• Software for peer-to-peer network is included with most modern desktop operating systems such as
Windows and Mac OS.
• Peer to peer relationship is suitable for small networks having less than 10 computers on a single LAN.
• In a peer to peer network each computer can not act as both a server and a client.
Advantages of Peer to Peer Networks
1. Such networks are easy to set up and maintain as each computer manages itself.
2. It eliminates extra cost required in setting up the server.
3. Since each device is master of its own, they are not dependent on other computers for their operations.
• A Computer networking model where one or more powerful computers (servers) provide the
different computer network services and all other user'of computer network (clients) access those
services to perform user's tasks is known as client/server computer networking model.
• In such networks, there exists a central controller called server. A server is a specialized computer
that controls the network resources and provides services to other computers in the network.
All other computers in the network are called clients. A client computer receives the requested
services from a server.
• A server performs all the major operations like security and network management.
• All the clients communicate with each other via centralized server
• If client 1 wants to send data to client 2, it first sends request to server to seek permission for it. The
server then sends a signal to client 1 allowing it to initiate the communication.
• A server is also responsible for managing all the network resources such as files, directories,
applications & shared devices like printer etc.
• If any of the clients wants to access these services, it first seeks permission from the server by
sending a request.
• Most Local Area Networks are based on client server relationship.
The ISO-OSI model is a seven layer architecture. It defines seven layers or levels in a complete
communication system. They are:
• Application Layer
• Presentation Layer
• Session Layer
• Transport Layer
• Network Layer
• Datalink Layer
• Physical Layer
In the table below, we have specified the protocols used and the data unit exchanged by each layer of
the OSI Model.
• It is responsible for transmission and reception of the unstructured raw data over network.
• Voltages and data rates needed for transmission is defined in the physical layer.
• The main function of this layer is to make sure data transfer is error free from one node to another,
• This layer sends and expects acknowledgements for frames received and sent respectively.
• This layer establishes a logical layer between two nodes and also manages the Frame traffic control
over the network. It signals the transmitting node to stop, when the frame buffers are full.
• It divides the outgoing messages into packets and assembles the incoming packets into messages
• It receives messages from the Session layer above it, convert the message into smaller units and
• Transport layer can be very complex, depending upon the network requirements.
Transport layer breaks the message (data) into small units so that they are handled more efficiently by
the network layer.
• Transfer of data from source to destination session layer streams of data are marked and are
resynchronized properly, so that the ends of the messages are not cut prematurely and data loss is
avoided.
• While receiving the data, presentation layer transforms the data to be ready for the application layer.
• Languages(syntax) can be different of the two communicating systems. Under this condition
• Transferring of files disturbing the results to the user is also done in this layer. Mail services, directory
• This layer mainly holds application programs to act upon the received and to be sent data.
Merits of OSI reference model
• OSI model distinguishes well between the services, interfaces and protocols.
TCP/IP that is Transmission Control Protocol and Internet Protocol was developed by Department
of Defence's Project Research Agency (ARPA, later DARPA) as a part of a research project of network
interconnection to connect remote machines.
The features that stood out during the research, which led to making the TCP/IP reference model were:
• Support for a flexible architecture. Adding more machines to a network was easy.
• The network was robust, and connections remained intact untill the source and destination machines
were functioning.
The overall idea was to allow one application on one computer to talk to(send data packets) another
application running on different computer.
• Protocol is used to connect to the host, so that the packets can be sent over it.
• Order in which packets are received is different from the way they are sent.
• Delivering IP packets
• Performing routing
• Avoiding congestion
• Functions such as multiplexing, segmenting or splitting on the data is done by transport layer.
• Transport layer breaks the message (data) into small units so that they are handled more efficiently
applications on it.
• FTP(File Transfer Protocol) is a protocol, that allows File transfer amongst computer users connected
• SMTP(Simple Mail Transport Protocol) is a protocol, which is used to transport electronic mail
network.
handles byte-stream from source to destination without error and flow control.
TCPs, sequencing and flow control. Eg: One-shot request-reply kind of service.
• It is scalable.
• Client/server architecture.
Demerits of TCP/IP
• In this, the transport layer does not guarantee delivery of packets.
IP address format
An IP address is 32 bits in length. These bits are divided in four parts. Each part is known as octets and
contains and 8 bits.
An IP address can be written in three notations; dotted-decimal, binary and hexadecimal. Among these
types, dotted-decimal is the most popular and frequently used method for writing an IP address.
In dotted-decimal notation, each byte (8 bits) of the 32 bits IP address is written in decimal equivalent.
The four resulting decimal numbers are separated by a dot and written in a sequence. 10.10.10.10,
172.168.10.1, 192.168.1.1 and 200.0.0.1 are some examples of IP address in dotted-decimal notation.
Subnet Mask
Subnet mask is used to separate the network address from the host address in IP address. As we
discussed earlier an IP address is the combination of network address and host address, subnet mask
helps us and programs which use IP address in identifying the network portion and the host portion.
Just like IP address, subnet mask is also 32 bits in length and uses same notations which IP address
uses to present itself.
Subnet mask assigns an individual bit for each bit of IP address. If IP bit belongs to network portion,
assigned subnet mask bit will be turned on. If IP bit belongs to host portion, assigned subnet mask bit will
be turned off.
In binary notation, 1 (one) represents a turned on bit while 0 (zero) represents a turned off bit. In dotted-
decimal notation, a value range 1 to 255 represents a turned on bit while a value 0 (zero) represents a
turned off bit.
IP address classes
There are 4,294,967,296 IP addresses. Managing all these addresses without any scheme are next
to impossible. Let’s understand it with a simple example. If you have to find out a word from a
language dictionary, how long will you take? Usually you will take less than five minutes to find
out that word. You are able to do this because words in dictionary are organized in alphabetic
order. If you have to find out the same word from the dictionary which does not use any
sequence or order to organize the words, how long will you take this time? It may take up to one
week to find out that specific word from all words. If an unorganized dictionary which roughly
contains 1 billion words can turn a five minutes task in a one-week task than suppose how nearly
4.3 billion addresses will make a search task complicated if they are unorganized.
For easier management, IP addresses are organized in numeric order and divided in following
five classes.
Class Starting Address Ending Address Subnet mask
A 0.0.0.0 127.255.255.255 255.0.0.0
B 128.0.0.0 191.255.255.255 255.255.0.0
C 192.0.0.0 223.255.255.255 255.255.255.0
D 224.0.0.0 239.255.255.255 255.255.255.255
E 240.0.0.0 255.255.255.255 255.255.255.255
As we discussed earlier, an IP address is the combination of network address and host address. In each
IP address, few bits are reserved for network address. In class A, B and C first 8, 16 and 24 bits are
reserved respectively for network addresses.
Public IP addresses
Public IP addresses are the IP addresses which are publicly accessible from any public network such as
Internet. In order to access a public IP address, we must have to use a public IP address.
Except private IP addresses, all IP addresses of class A, B and C are public IP addresses.
Special IP addresses
Special IP addresses are the IP addresses which are reserved for network testing and troubleshooting.
These IP addresses cannot be assigned to an end device or an interface. Following addresses are
reserved for special purpose: -
0.0.0.0: - This is the first IP address of IP addresses. It represents all networks.
127.0.0.0 to 127.255.255.255: - Reserved for IP protocol testing and troubleshooting. Virtual interfaces
such as loopback adaptor use this IP range for addressing.
224.0.0.0 to 239.255.255.255 (Class D): - Reserved for multicast addresses. A multicast address is an
address which has multiple recipients.
240.0.0.0 to 255.255.255.255 (Class E): - Reserved for future use. These addresses are not used
currently for any purpose.
255.255.255.255: - This is the last IP address of IP addresses. It represents all hosts.