COMPUTER NETWORKING_2024123
COMPUTER NETWORKING_2024123
COMPUTER NETWORKING_2024123
Evolution of Network:
(I) ARPANET (Advanced Research Project Agency Network)
It came into existence in 1960s
ARPANET was designed to survive any nuclear threat. It was the first system to implement the
TCP/IP protocol suite and was based on Client-Server architecture.
II) NSFNET (National Science Foundation Networks)
National Science Foundation Network, was started in 1980 with a view to enhance Academic
and Scientific Research. It connected its server with the ARPANET in year 1986. In the year 1990,
the NSFNet, ARPANET and other smaller networks clubbed together to form the INTERNET
(Interconnected Networks) and hence the foundation of modern INTERNET was laid down.
(III) INTRANET
The word Intra means inside or within. Therefore, Intranet means the network within an
organization. It is created using the protocols of LANs and PANs. Example: Wipro uses internal
network for business development
It is a local or restricted communication system
It is managed by a person or organization.
Intranet users can avail services from internet but Internet user cannot access intranet directly.
(III) INTERNET
It came into existence in 1960s
It is known as Network of Networks.
It is the global network of interconnected devices that may/may not follow same set of rules,
and connect together for sharing information and establishing communication.
SWITCHING TECHNIQUES
In large networks, there may be more than one paths for transmitting data from sender to
receiver. The process of selecting a path of data out of the available paths is called switching.
There are two popular switching techniques – circuit switching and packet switching.
1. Circuit Switching
In circuit switching, whenever a source end node wants to send a message to the destination end
node a dedicated physical link is first established between the source and the destination. Then
only the data transmission takes place. After the complete transmission of data this physical link
is terminated.
Advantages:
1. Since a dedicated communication channel is set up before communicating the message,
the data transmission is reliable and is suitable for long and continuous communication.
2 Circuit switching uses fixed bandwidth as well as data rates.
3. As the data is communicated continuously, no need of sequencing or re-ordering it at the
receiving end.
Disadvantages:
1. Time required to setup a physical connection between the sender and the receiver makes
delay in communication.
2. Since a communication channel is dedicated for a particular transmission, it cannot be
utilized for other communication, even if the channel is free.
2. Packet Switching
In the packet switching technique, the whole message is split into small packets. Now, these
packets are transmitted one by one from sender to the receiver through the intermediary
switches in the network. The packets will take shortest path as possible.
Every packet will have a sequence number in order to identify their order at the receiving end.
The packets will also contain information like source address, intermediate node address,
destination address etc.
Advantages:
1. Packet switching is effective type of data transmission technique as it effectively utilizes
the communication channel. Multiple users can share the channel simultaneously utilizing
the bandwidth effectively.
2. It is cost effective and easy to implement compared to circuit switching.
3. As the messages are sent as small sized packets, the data transmission is quick and easy.
Disadvantages:
1. Unorganized movement of packets makes it necessary to implement proper sequencing and
reordering techniques.
2. As the packets flow through multiple paths from the source to the destination, complex
security protocols are required to ensure reliable communication.
TRANSMISSION MEDIA
● A transmission medium can be anything that can carry signals or data between the source
(transmitter) and destination (receiver). In data communication, transmission media are the links
that carry messages between two or more communicating devices.
● Transmission can be classified as guided or unguided.
● In guided transmission, there is a physical link made of wire/cable through which data in terms
of signals are propagated between the nodes. These are usually metallic cable, fiber-optic cable,
etc. They are also known as wired media.
● In unguided transmission, data travels in air in terms of electromagnetic waves using an
antenna. They are also known as wireless media.
Wired Transmission Media
● Any physical link that can carry data in the form of signals belongs to the category of wired
transmission media.
● Three commonly used guided/wired media for data transmission are, twisted pair, coaxial
cable, and fiber optic cable.
● Twisted-pair and coaxial cable carry the electric signals whereas the optical fiber cable carries
the light signals.
The use of twisted configuration minimises the effect of electrical interference from similar pairs
close by.
These cables are of two types: Unshielded twisted-pair (UTP) and Shielded twisted-pair (STP).
Advantages:
It is low-cost, low-weight and flexible cables.
It is easy to install and maintain and requires RJ-45 Connector.
Disadvantages:
Suitable for short distance (up to 100 mt.). For long distance Repeater is required.
It supports low bandwidth and offers up to 100 Mbps speed.
Advantages:
It offers high bandwidth and carry data for a long distance (185-500 m)
Suitable for Broadband transmission (cable TV) and can be used in shared cable network.
Disadvantages:
It is less flexible and expensive compared to Twisted Pair cable.
Not compatible with modern cables like Twisted pair cable.
(C) Optical Fibre
The optical fiber cable carries data as light, which travels inside a thin fiber of glass.
Optic fiber uses refraction to direct the light through the media.
A thin transparent strand of glass at the center is covered with a layer of less dense glass called
cladding. This whole arrangement is covered with an outer jacket made of PVC or Teflon.
These cables are of light weight and have higher bandwidth which means higher data transfer rate.
Advantages:
It is free from Electro-Magnetic Interference (EMI), since no Electrical signal are carried.
Offers secure and high speed transmission up to a long distance.
Disadvantages:
Expensive and quite fragile (breakable).
They are unidirectional
Complicated Installation procedure and difficult to join two broken fiber.
Not suitable for domestic purposes due to high maintenance cost.
The electromagnetic spectrum range (3KHz to 900THz) can be divided into 4 categories (Radio
waves, Microwaves, Infrared waves and Visible or Light waves) according to their frequency
ranges.
Classification of transmission waves and their properties
Transmission
Properties
Waves
1. Waves of frequency range 3 KHz - 1 GHz
2. Omni-directional, these waves can move in all directions
3. Radio waves of frequency 300KHz-30MHz can travel long distance
Radio Waves 4. Susceptible to interference
5. Radio waves of frequency 3-300KHz can penetrate walls
6. These waves are used in AM and FM radio, television, cordless
phones.
1. Electromagnetic waves of frequency range 1GHz - 300GHz.
2. Unidirectional, can move in only one direction.
3. Cannot penetrate solid objects such as walls, hills or mountains.
4. Needs line-of-sight propagation i.e. both communicating antenna
Microwaves
must be in the direction of each other.
5. Used in point-to-point communication or unicast communication
such as radar and satellite.
6. Provide very large information-carrying capacity.
1. Electromagnetic waves of frequency range 300GHz - 400THz.
2. Very high frequency waves.
Infrared 3. Cannot penetrate solid objects such as walls.
waves 4. Used for short-distance point-to-point communication such as
mobile-to-mobile, mobile-to-printer, remote-control-to-TV, and
Bluetooth-enabled devices to other devices like mouse, keyboards etc.
Bluetooth:
Bluetooth is a short-range wireless technology commonly used for connecting devices like
smartphones, laptops, and peripherals (e.g., wireless keyboards, mice, and headphones). It
operates in the 2.4 GHz frequency band and supports relatively low data transfer rates compared
to Wi-Fi.
Satellite Communication:
Satellite communication involves transmitting data to and from Earth through communication
satellites. It is used for long-distance communication in remote areas or where traditional wired
communication is not feasible.
Network Devices
To communicate data through different transmission media and to configure networks with
different functionality, we require different devices like Modem, Hub, Switch, Repeater, Router,
Gateway, etc.
Modem
Modem stands for ‘MOdulator DEModulator’.
It refers to a device used for conversion between analog signals and digital bits.
It is used to transmit data from a sender to a receiver, or while browsing the internet,
digital data are converted to an analog signal and the medium (be it free-space or a physical
media) carries the signal to the receiver.
There are modems connected to both the source and destination nodes.
The modem at the sender’s end acts as a modulator that converts the digital data into analog
signals.
The modem at the receiver’s end acts as a demodulator that converts the analog signals into
digital data for the destination node to understand.
NIC
Network Interface Card (NIC) is a device used to connect the network with the Internet. It is
sometimes called ad the TAP (Terminal Access Point). Since different manufacturers give
different names to this device, hence, it is sometimes referred to as NIU (Network Interface
Unit).
The NIC has a unique physical address to each card, and it is known as MAC (Media Access
Control) Address.
MAC Address:
It is a b-byte address assigned to each NIC card and is separated by a colon. Example:
10 : E8 : 05 : 67 : 2A : AF
Ethernet Card
It is a LAN architecture developed by Xerox Corp along with the DEC and Intel. It uses a bus or
star topology for data transfer and can attain a speed of up to 10 Gbps. It can connect devices in
both wired and wireless LAN or WAN.
RJ45
RJ 45 or Registered Jack-45 is an eight-pin connector
It is used exclusively with Ethernet cables for networking (LAN).
It is a standard networking interface that can be seen at the end of
all network cables.
It is a small plastic plug that fits into RJ-45 jacks of the Ethernet
cards present in various computing devices.
Repeater
Hub
An Ethernet hub is a network device used
to connect different devices through wires.
Data arriving on any of the lines are sent out
on all the others.
The limitation of Hub is that if data from
two devices come at the same time, they
will collide.
There are two types of HUB :
Active hubs: these electrically amplify the
signal as it moves from one connected
device to another.
Passive hubs: these allow the signals to pass from one device to another without any change.
Switch
Like a hub, a network switch is used to connect multiple computers or communicating devices in
a network.
When data arrives, the switch extracts the destination address from the data packet and looks
it up in a table to see where to send the packet.
It sends signals to only selected devices instead of sending to all.
It can forward multiple packets at the same time.
A switch does not forward the
signals which are noisy or
corrupted. It drops such signals
and asks the sender to resend it.
Ethernet switches are common
in homes/offices to connect
multiple devices thus creating
LANs or to access the Internet.
It is a device that is used to divide network into smaller networks called subnets or LAN
segments. This helps to avoid network traffic as it divides the traffic into smaller parts. It is
responsible for filtering of data packets and then transmission over the network.
Router
It is responsible for forwarding data from one network to another. The main purpose of router is
sorting and distribution of the data packets to their destination based on the IP address. The
router uses the Logical address scheme.
Gateway –
Gateway serves as the entry and exit point of a network, as all data coming in or going out of a
network must first pass through the gateway in order to use routing paths.
A networking device capable to convert protocols so that two different network architecture
based system can communicate with each other. It works as protocol convertor.
A gateway can be implemented completely in software, hardware, or a combination of both.
Gateways act as a network point that acts as an entrance to another network.
network.
Gateway regulates traffic between two dissimilar networks, while router regulates
traffic between similar networks.
A router is a networking device that forwards data packets between computer
networks, while switch forwards data packets between computers in a LAN.
Routers perform the traffic directing functions on the Internet.
Bridge:
It is a device that links two networks. It is smart system that knows which system lies on which
side and in which network. These can handle the networks that follow different protocols.
WiFi card
A Wi-Fi card connects to your laptop either in your USB port or a wider card slot.
The Wi-Fi card acts as both a receiver and transmitter.
It receives the wireless signal and communicates with the wireless network, enabling you to
access the Web with your laptop.
Advantages of WAN
• Long distance business can connect on the one network.
• Shares software and resources
• Messages can be sent very quickly to wide range of nodes
• Hardware devices can be shared.
Disadvantages of WAN
• Need a good firewall to restrict unauthorized access
• Setting up a network can be an expensive, slow and complicated.
• Maintaining a network is a full-time job
• Security is a major issue when many different people have the ability to use information.
In this type of network, data transmitted from source first reaches the centralized device and
from there the data passes through every branch where each branch can have links for more
nodes.
ADVANTAGES OF TREE TOPOLOGY
a) When one of the node stops working, it does not impact other nodes.
b) Fault identification is easy.
c) Failing of one segment does not affect the rest of the network.
d) It works well for small network.
DISADVANTAGES OF TREE TOPOLOGY
a) If the backbone line breaks, the entire segment goes down.
b) There is a need for huge cabling.
c) A lot of maintenance is needed even if it is easier.
Mesh Topology
In mesh topology , separate cable is used to connect each device to every other device on the
network, providing a straight communication path.
Advantages of a Mesh topology
• Avoid traffic since each link can carry its own data
and none are being shared
• If one link breaks, the rest of the network is still
functional
• It provides high privacy and security.
• Fault detection is easy
Disadvantages of a Mesh topology
• A lot of cables are needed
• Too many cables means too much cost
• Too many cables means complex network, i.e., difficult to install
NETWORK PROTOCOL:
A protocol means the rules that are applicable for a network. Protocols defines
standardized formats for data packets, techniques for detecting and correcting errors etc.
Point-to-Point Protocol (PPP) is protocol that is used to connect one computer system to
another. Computers use PPP to communicate over the telephone network or the Internet.
A PPP connection exists when two systems physically connect through a telephone line.
You can use PPP to connect one system to another. For example, an established PPP
connection between a branch office and a central office allows either office to transfer
data to the other through the network.
POP3 Protocol
Post Office Protocol version 3 (POP3) is a standard mail protocol used to receive emails
from a remote server to a local email client. POP3 allows you to download email messages
on your local computer and read them even when you are offline.
Telnet
Telnet is an abbreviation for Terminal Network and used for Remote Login.
Telnet provides a connection to the remote computer in such a way that a local terminal
appears to be at the remote side.
VoIP :
Voice over Internet Protocol (VoIP), also called IP telephony, is a method and group of
technologies for the delivery of voice communications and multimedia sessions over Internet
Protocol (IP) networks, such as the Internet.
VoIP services convert our voice into a digital signal that travels over the Internet.
Advantages: Disadvantages:
• Less Cost • Reliable Internet Connection Required
• Accessibility • Power Outages/Emergencies
• Flexibility • Latency
• Voice Quality
• Extra/Less Expensive Features
Web Server : A web server is a computer that runs websites. The main function of web server
is to when it receives a request from web browser, it finds the document generate the
information needed and sends it back to the browser.
For eg., Apache HTTP Server, Apache Tomcat, IIS (Internet Information Server) etc.
Web Browser : Web browser is software program to navigate the web pages on the internet.
When a user requests a particular website, the web browser retrieves the necessary content
from a web server and then displays the resulting web page on the user's device.
For eg., Mozilla Firefox, Google Chrome, Internet Explorer, Microsoft Edge etc.
HTML XML
HTML stands for Hyper Text Mark-up XML stands for eXtensible Mark-up
Language Language
HTML is a case insensitive. XML is case sensitive.
Predefined tags (commands). User defined tags (commands).
It is used for presentation of the Data. It is used for transportation of the Data.
Closing tags are optional. Compulsory to use closing tags.
Web Hosting
This refers to the service of providing storage space, server resources, and internet connectivity
to make websites and web applications accessible to users over the internet. It allows
individuals, businesses, and organizations to publish their websites on the World Wide Web,
making them available to visitors and users worldwide.
• Web hosting companies maintain powerful servers designed to store website files, databases,
and other contents required for website operations.
• These typically handle the maintenance tasks of the registered websites.
• These ensure proper backup and recovery of the lost data (if any) while accessing it, and cope
up with potential threats that can destroy data.