Computer Networks
Computer Networks
Computer Networks
COMPUTER NETWORKS
MODULE-1
USES OF COMPUTER NETWORKS
i)Bussiness Applications
Resource sharing:-The goal is to make all programs,equipments
and data available to anyone on the network without regarding to
the physical location of the resources or the user.
Eg:A group of workers having a common printer.
VPNS:-helps to join individual networks at different sites in to one
extended network.So computers and employess at far places may
easily communicate with each other.
Client-server architecture:-Server may provide all the services
needed by the clients.
Communication medium:-computer network act as a powerful
communication medium through services like email.
VoIP(Voice Over IP):-Telephone calls between employees can be
carried out with computer networks which helps to control large
telephone bills.
Desktop Sharing:-allows remote workers to see and interact on a
single screen,ie, to work together.
e-commerce:-including shopping,ticket booking etc through
online.
ii)Home Applications
iii)Mobile users
Connectivity:-It includes celluler connectivity,wireless hotspots etc.
Messaging services:-Text messaging is used,it allows the user to send some
short messages throgh cellular networks to another mobile user.
Smart phones:Provides large and fast connectivity,supports hotspot etc.
GPS:-Are integrated with mobile phones to know the location also
provides all map services.
Wearable computers:-devices like smartwatches,implanted pacemakers
etc.
3. Bridge –
A bridge operates at the data link layer.
A bridge is a repeater, with add on the functionality
of filtering content by reading the MAC addresses
of source and destination.
It is also used for interconnecting two LANs working
on the same protocol.
2 port device.
Types of Bridges:-Transparent Bridges,Source Routing Bridges.
4. Switch –
A switch is a multiport bridge with a buffer and a
design that can boost its efficiency(a large number
of ports imply less traffic) and performance.
A switch is a data link layer device.
The switch can perform error checking before
forwarding data, which makes it very efficient as it
does not forward packets that have errors and
forward good packets selectively to the correct port
only.
5. Routers –
A router is a device like a switch that routes data
packets based on their IP addresses.
The router is mainly a Network Layer device.
Routers normally connect LANs and WANs together
and have a dynamically updating routing table
6. Gateway –
It is a passage to connect two networks together
that may work upon different networking models.
They basically work as the messenger agents that
take data from one system, interpret it, and
transfer it to another system.
Gateways are also called protocol converters and
can operate at any network layer.
Gateway is also called a protocol converter.
7. NIC –
NETWORKING SOFTWARE
Protocol hierarchies
To reduce the design complexity,most networks are
organized as layers each bulit upon the top of other.
Each layer is a kind of virtual machine offering certain
services to the layer above it.
A prortocol is an agreement between the communicating
parties on how communication is to proceed.
It includes the entities as peers,between each peer of
adjascent layers there is an interface.
The set of layersand protocols are called a network
architecture.
A list of protocols used by a certain system one protocol
per layer is called a protocol stack.
Advantages:-
Reduce complexity of communication b/w networks.
Increases network lifetime.
Uses energy efficiently.
Doesn’t require overall knowledge of network.
DESIGN ISSUES
A number of design issues exist for the layer to layer approach of
computer networks.
Some of the main design issues are as follows,
Reliability
Network channels and components may be unreliable, resulting in
loss of bits while data transfer. So, an important design issue is to
make sure that the information transferred is not distorted.
Mode of Communication:
SERVICE PRIMITIVES
A service is formally specified by a set of primitives (operations)
available to a user process to access the service.
These primitives tell the service to perform some action or report
on an action taken by a peer entity.
If the protocol stack is located in the operating system, as it often
is, the primitives are normally system calls.
These calls cause a trap to kernel mode, which then turns control
of the machine over the operating system to send the necessary
packets.
Reference Model
In computer networks, reference models give a conceptual framework that
standardizes communication between heterogeneous networks.
The two popular reference models are −
OSI Model
TCP/IP Protocol Suite
TCP/IP Model
It stands for Transmission Control Protocol/Internet Protocol
It contains four layers, unlike seven layers in the OSI model
Process/Application Layer
Host-to-Host/Transport Layer
Internet Layer
Network Access/Link Layer
10
TCP/IP
11
2. Internet Layer –
12
versions:
IPv4 and IPv6.
2. ICMP – stands for Internet Control Message Protocol. It
is encapsulated within IP datagrams and is responsible for
providing hosts with information about network problems.
3. ARP – stands for Address Resolution Protocol. Its job is
to find the hardware address of a host from a known IP
address. ARP has several types: Reverse ARP, Proxy ARP,
Gratuitous ARP and Inverse ARP.
3. Host-to-Host Layer –
4. Application Layer –
13
This layer performs the functions of top three layers of the OSI
model: Application, Presentation and Session Layer. It is
responsible for node-to-node communication and controls
user-interface specifications
1. HTTP and HTTPS – HTTP stands for
Hypertext transfer protocol. It is used by the World Wide Web
to manage communications between web browsers and
servers. HTTPS stands for HTTP-Secure. It is a combination of
HTTP with SSL(Secure Socket Layer).
2. SSH – SSH stands for Secure Shell. It is a
terminal emulations software similar to Telnet. The reason SSH
is more preferred is because of its ability to maintain the
encrypted connection.
3. NTP – NTP stands for Network Time
Protocol. It is used to synchronize the clocks on our computer
to one standard time source.
Topology
14
Bus Topology
15
16
17
Ring Topology
18
19
Star Topology
20
o Efficient
troubleshooting: Troubleshooting is quite
efficient in a star topology as compared to bus
topology. In a bus topology, the manager has to
inspect the kilometers of cable. In a star
topology, all the stations are connected to the
centralized network. Therefore, the network
administrator has to go to the single station to
troubleshoot the problem.
o Network control: Complex network
control features can be easily implemented in the
star topology. Any changes made in the star
topology are automatically accommodated.
o Limited failure: As each station is
connected to the central hub with its own cable,
therefore failure in one cable will not affect the
entire network.
o Easily expandable: It is easily
expandable as new stations can be added to the
open ports on the hub.
o High data speeds: It supports a
bandwidth of approx 100Mbps. Ethernet
21
Tree topology
22
23
Mesh topology
24
25
26
Hybrid Topology
27
28
29
30
31
TRANMISSION MEDIA
Guided Media
Twisted pair:
32
33
o It is cheap.
o Installation of the unshielded twisted pair is easy.
o It can be used for high-speed LAN.
Disadvantage:
34
Disadvantages
Coaxial Cable
35
36
Fibre Optic
o Fibre optic cable is a cable that uses electrical
signals for communication.
o Fibre optic is a cable that holds the optical fibres
coated in plastic that are used to send the data by pulses
of light.
37
38
UnGuided Transmission
o An unguided transmission transmits the
electromagnetic waves without using any
physical medium. Therefore it is also known
as wireless transmission.
o In unguided media, air is the media through
which the electromagnetic energy can flow
easily.
39
Radio waves
o Radio waves are the electromagnetic waves that
are transmitted in all the directions of free space.
o Radio waves are omnidirectional, i.e., the signals
are propagated in all the directions.
o The range in frequencies of radio waves is from
3Khz to 1 khz.
o In the case of radio waves, the sending and
receiving antenna are not aligned, i.e., the wave
sent by the sending antenna can be received by
any receiving antenna.
o example:FM radio.
40
Microwaves
o Terrestrial microwave
o Satellite microwave communication.
41
Advantages Of Microwave:
42
Disadvantages of Microwave
transmission:
o Eavesdropping: An eavesdropping
creates insecure communication. Any
malicious user can catch the signal in the
air by using its own antenna.
o Out of phase signal: A signal can be
moved out of phase by using microwave
transmission.
o Susceptible to weather condition: A
microwave transmission is susceptible to
weather condition. This means that any
environmental change such as rain, wind
can distort the signal.
43
44
Infrared
o An infrared transmission is a wireless
technology used for communication over
short ranges.
o The frequency of the infrared in the range
from 300 GHz to 400 THz.
o It is used for short-range communication
such as data transfer between two cell
phones, TV remote operation, data transfer
between a computer and cell phone
resides in the same closed area.
Characteristics Of Infrared:
45
PERFORMANCE OF A NETWORK
BANDWIDTH
o Bandwidth is characterized as the measure of
data or information that can be transmitted in a
fixed measure of time.
46
THROUGHPUT
Throughput is the number of messages successfully transmitted
per unit time.
o It is controlled by available bandwidth, the
available signal-to-noise ratio and hardware limitations.
o Bandwidth is the potential measurement of a
link, whereas throughput is an actual measurement of how
fast we can send data.
o Throughput as unit of bits per second(bps),
which has evolved to bytes per second(Bps), kilobytes per
second(KBps), megabytes per second(MBps) and gigabytes
per second(GBps).
o Throughput may be affected by numerous
factors:- analogue physical medium
-available processing
power of the system
components,
-end-user
behaviour.
Example:
47
48
49
50
51