What Is A Computer Network?
What Is A Computer Network?
What Is A Computer Network?
1
Scalability − Sizes of computer networks dynamically increase
with time. The networks have to be scalable so that they can
evolve adequately for future deployments.
Integration − All the components of the network work in a
coordinated manner for a seamless user experience.
Security − Networks allow security and access rights to the users
for restricted sharing of resources and information.
Cost Effectiveness − Networking reduces the deployment cost of
hardware and software of a centralized system.
Computer Network Types
2
For example, Piconet is Bluetooth-enabled Personal Area Network
which may contain up to 8 devices connected together in a master-
slave fashion.
3
LANs are composed of inexpensive networking and routing
equipment. It may contains local servers serving file storage and other
locally shared applications. It mostly operates on private IP addresses
and does not involve heavy routing. LAN works under its own local
domain and controlled centrally.
4
Metro Ethernet is a service which is provided by ISPs. This service
enables its users to expand their Local Area Networks. For example,
MAN can help an organization to connect all of its offices in a city.
5
WAN may use advanced technologies such as Asynchronous Transfer
Mode (ATM), Frame Relay, and Synchronous Optical Network (SONET).
WAN may be managed by multiple administration.
Internetwork
6
video streaming etc. At huge level, internet works on Client-Server
model.
Web sites
E-mail
Instant Messaging
Blogging
Social Media
Marketing
Networking
Resource Sharing
7
Audio and Video Streaming
8
o It is less costly as it is built with inexpensive hardware such as
hubs, network adapters, and ethernet cables.
o The data is transferred at an extremely faster rate in Local Area
Network.
o Local Area Network provides higher security.
9
o Personal computer devices that are used to develop the personal
area network are the laptop, mobile phones, media player and
play stations.
10
Wireless Personal Area Network: Wireless Personal Area Network is
developed by simply using wireless technologies such as WiFi,
Bluetooth. It is a low range network.
11
o In MAN, various LANs are connected to each other through a
telephone exchange line.
o The most widely used protocols in MAN are RS-232, Frame Relay,
ATM, ISDN, OC-3, ADSL, etc.
o It has a higher range than Local Area Network(LAN).
12
WAN(Wide Area Network)
o A Wide Area Network is a network that extends over a large
geographical area such as states or countries.
o A Wide Area Network is quite bigger network than the LAN.
o A Wide Area Network is not limited to a single location, but it
spans over a large geographical area through a telephone line,
fibre optic cable or satellite links.
o The internet is one of the biggest WAN in the world.
o A Wide Area Network is widely used in the field of Business,
government, and education.
13
Examples Of Wide Area Network:
o Mobile Broadband: A 4G network is widely used across a region
or country.
o Last mile: A telecom company is used to provide the internet
services to the customers in hundreds of cities by connecting
their home with fiber.
o Private network: A bank provides a private network that
connects the 44 offices. This network is made by using the
telephone leased line provided by the telecom company.
15
Internetwork
o An internetwork is defined as two or more computer network
LANs or WAN or computer network segments are connected
using devices, and they are configured by a local addressing
scheme. This process is known as internetworking.
o An interconnection between public, private, commercial,
industrial, or government computer networks can also be
defined as internetworking.
o An internetworking uses the internet protocol.
o The reference model used for internetworking is Open System
Interconnection(OSI).
Types Of Internetwork:
1. Extranet: An extranet is a communication network based on the
internet protocol such as Transmission Control
protocol and internet protocol. It is used for information sharing.
The access to the extranet is restricted to only those users who have
login credentials. An extranet is the lowest level of internetworking. It
can be categorized as MAN, WAN or other computer networks. An
extranet cannot have a single LAN, atleast it must have one
connection to the external network.
A number of design issues exist for the layer to layer approach of computer networks.
Some of the main design issues are as follows −
Reliability
Network channels and components may be unreliable, resulting in loss of bits while data
transfer. So, an important design issue is to make sure that the information transferred
is not distorted.
Scalability
17
Networks are continuously evolving. The sizes are continually increasing leading to
congestion. Also, when new technologies are applied to the added components, it may
lead to incompatibility issues. Hence, the design should be done so that the networks
are scalable and can accommodate such additions and alterations.
Addressing
Error Control
Unreliable channels introduce a number of errors in the data streams that are
communicated. So, the layers need to agree upon common error detection and error
correction methods so as to protect data packets while they are transferred.
Flow Control
If the rate at which data is produced by the sender is higher than the rate at which data
is received by the receiver, there are chances of overflowing the receiver. So, a proper
flow control mechanism needs to be implemented.
Resource Allocation
Computer networks provide services in the form of network resources to the end users.
The main design issue is to allocate and deallocate resources to processes. The
allocation/deallocation should occur so that minimal interference among the hosts
occurs and there is optimal usage of the resources.
Statistical Multiplexing
It is not feasible to allocate a dedicated path for each message while it is being
transferred from the source to the destination. So, the data channel needs to be
multiplexed, so as to allocate a fraction of the bandwidth or time to each host.
Routing
There may be multiple paths from the source to the destination. Routing involves
choosing an optimal path among all possible paths, in terms of cost and time. There are
several routing algorithms that are used in network systems.
18
Security
OSI Model
o OSI consists of seven layers, and each layer performs a particular network
function.
o OSI model divides the whole task into seven smaller and manageable tasks. Each
layer is assigned a particular task.
o Each layer is self-contained, so that task assigned to each layer can be performed
independently.
19
o The OSI model is divided into two layers: upper layers and lower layers.
o The upper layer of the OSI model mainly deals with the application related issues,
and they are implemented only in the software. The application layer is closest to
the end user. Both the end user and the application layer interact with the
software applications. An upper layer refers to the layer just above another layer.
o The lower layer of the OSI model deals with the data transport issues. The data
link layer and the physical layer are implemented in hardware and software. The
physical layer is the lowest layer of the OSI model and is closest to the physical
medium. The physical layer is mainly responsible for placing the information on
the physical medium.
There are the seven OSI layers. Each layer has different functions. A list of seven layers
are given below:
1. Physical Layer
2. Data-Link Layer
3. Network Layer
20
4. Transport Layer
5. Session Layer
6. Presentation Layer
7. Application Layer
Physical layer
21
o The main functionality of the physical layer is to transmit the individual bits from
one node to another node.
o Line Configuration: It defines the way how two or more devices can be
connected physically.
o Signals: It determines the type of the signal used for transmitting the
information.
Data-Link Layer
22
o This layer is responsible for the error-free transfer of data frames.
o It is mainly responsible for the unique identification of each device that resides
on a local network.
23
o It is used for transferring the packets over the network.
o Framing: The data link layer translates the physical's raw bit stream into packets
known as Frames. The Data link layer adds the header and trailer to the frame.
The header which is added to the frame contains the hardware destination and
source address.
o Physical Addressing: The Data link layer adds a header to the frame that
contains a destination address. The frame is transmitted to the destination
address mentioned in the header.
Network Layer
24
o It is a layer 3 that manages device addressing, tracks the location of devices on
the network.
o It determines the best path to move data from source to the destination based
on the network conditions, the priority of service, and other factors.
o The Data link layer is responsible for routing and forwarding the packets.
o Routers are the layer 3 devices, they are specified in this layer and used to
provide the routing services within an internetwork.
o The protocols used to route the network traffic are known as Network layer
protocols. Examples of protocols are IP and Ipv6.
o Addressing: A Network layer adds the source and destination address to the
header of the frame. Addressing is used to identify the device on the internet.
25
o Routing: Routing is the major component of the network layer, and it determines
the best optimal path out of the multiple paths from source to the destination.
o Packetizing: A Network Layer receives the packets from the upper layer and
converts them into packets. This process is known as Packetizing. It is achieved by
internet protocol (IP).
Transport Layer
o The Transport layer is a Layer 4 ensures that messages are transmitted in the
order in which they are sent and there is no duplication of data.
o The main responsibility of the transport layer is to transfer the data completely.
o It receives the data from the upper layer and converts them into smaller units
known as segments.
26
o Transmission Control Protocol
o When data is sent over the TCP connection, then the TCP protocol divides
the data into smaller units known as segments. Each segment travels over
the internet using multiple routes, and they arrive in different orders at the
destination. The transmission control protocol reorders the packets in the
correct order at the receiving end.
27
segment is assigned with a sequence number that uniquely identifies each
segment. When the message has arrived at the destination, then the transport
layer reassembles the message based on their sequence numbers.
o Flow control: The transport layer also responsible for flow control but it is
performed end-to-end rather than across a single link.
o Error control: The transport layer is also responsible for Error control. Error
control is performed end-to-end rather than across the single link. The sender
transport layer ensures that message reach at the destination without any error.
Session Layer
28
o It is a layer 3 in the OSI model.
o The Session layer is used to establish, maintain and synchronizes the interaction
between communicating devices.
Presentation Layer
29
o A Presentation layer is mainly concerned with the syntax and semantics of the
information exchanged between the two systems.
o This layer is a part of the operating system that converts the data from one
presentation format to another format.
30
o Encryption: Encryption is needed to maintain privacy. Encryption is a process of
converting the sender-transmitted information into another form and sends the
resulting message over the network.
Application Layer
31
Functions of Application layer:
o Mail services: An application layer provides the facility for email forwarding and
storage.
TCP/IP model
o The TCP/IP model was developed prior to the OSI model.
o The TCP/IP model is not exactly similar to the OSI model.
o The TCP/IP model consists of five layers: the application layer, transport layer, network
layer, data link layer and physical layer.
o The first four layers provide physical standards, network interface, internetworking, and
transport functions that correspond to the first four layers of the OSI model and these
four layers are represented in TCP/IP model by a single layer called the application layer.
o TCP/IP is a hierarchical protocol made up of interactive modules, and each of them
provides specific functionality.
Here, hierarchical means that each upper-layer protocol is supported by two or more lower-level
protocols.
32
Network Access Layer
Internet Layer
33
Following are the protocols used in this layer are:
IP Protocol: IP protocol is used in this layer, and it is the most significant part of the entire
TCP/IP suite.
ARP Protocol
34
its physical address in the form of ARP reply. The recipient adds the physical
address both to its cache memory and to the datagram header
ICMP Protocol
Transport Layer
The transport layer is responsible for the reliability, flow control, and correction of data which is
being sent over the network.
The two protocols used in the transport layer are User Datagram protocol and Transmission
control protocol.
35
o UDP consists of the following fields:
Source port address: The source port address is the address of the application
program that has created the message.
Destination port address: The destination port address is the address of the
application program that receives the message.
Total length: It defines the total number of bytes of the user datagram in bytes.
Checksum: The checksum is a 16-bit field used in error detection.
o UDP does not specify which packet is lost. UDP contains only checksum; it does
not contain any ID of a data segment.
36
Application Layer
o HTTP: HTTP stands for Hypertext transfer protocol. This protocol allows us to access the
data over the world wide web. It transfers the data in the form of plain text, audio, video.
It is known as a Hypertext transfer protocol as it has the efficiency to use in a hypertext
environment where there are rapid jumps from one document to another.
o SNMP: SNMP stands for Simple Network Management Protocol. It is a framework used
for managing the devices on the internet by using the TCP/IP protocol suite.
o SMTP: SMTP stands for Simple mail transfer protocol. The TCP/IP protocol that supports
the e-mail is known as a Simple mail transfer protocol. This protocol is used to send the
data to another e-mail address.
o DNS: DNS stands for Domain Name System. An IP address is used to identify the
connection of a host to the internet uniquely. But, people prefer to use the names
instead of addresses. Therefore, the system that maps the name to the address is known
as Domain Name System.
o TELNET: It is an abbreviation for Terminal Network. It establishes the connection
between the local computer and remote computer in such a way that the local terminal
appears to be a terminal at the remote system.
o FTP: FTP stands for File Transfer Protocol. FTP is a standard internet protocol used for
transmitting the files from one computer to another computer.
37
What is Transmission Media in
Computer Networks & Its Types
The representation of data can be done through computers as well as other types of
telecommunication devices with the help of signals. These are broadcasted from one
device to another in the shape of electromagnetic energy. The signals like
electromagnetic can travel throughout vacuum, air otherwise other transmission
mediums to travel from one sender to another receiver. Electromagnetic energy mainly
includes voice, power, radio waves, visible light, UV light, & gamma rays. In the OSI
model, the first layer is the physical layer which is dedicated to the transmission media.
In data communication, a transmission media is a physical lane between the Tx& the Rx
and it is the channel where data can be transmitted from one area to another.
38
These transmission media may be of two types −
Guided − In guided media, transmitted data travels through cabling system that has a
fixed path. For example, copper wires, fibre optic wires, etc.
Unguided − In unguided media, transmitted data travels through free space in form of
electromagnetic signal. For example, radio waves, lasers, etc.
Each transmission media has its own advantages and disadvantages in terms of
bandwidth, speed, delay, cost per bit, ease of installation and maintenance, etc. Let’s
discuss some of the most commonly used media in detail.
39
Up to 25 twisted pair are put together in a protective covering to form twisted pair cables
that are the backbone of telephone systems and Ethernet networks.
Twisted pair cable are the oldest and most popular cables all over the world. This is due
to the many advantages that they offer −
With its many advantages, twisted pair cables offer some disadvantages too −
40
Shielding twisted pair cable
To counter the tendency of twisted pair cables to pick up noise signals, wires are
shielded in the following three ways −
Shielding makes the cable bulky, so UTP are more popular than STP. UTP cables are
used as the last mile network connection in homes and offices.
Coaxial Cable
Coaxial cables are copper cables with better shielding than twisted pair cables, so
that transmitted signals may travel longer distances at higher speeds. A coaxial cable
consists of these layers, starting from the innermost −
41
Advantages of Coaxial Cables
Optical Fibre
Thin glass or plastic threads used to transmit data using light waves are called optical
fibre. Light Emitting Diodes (LEDs) or Laser Diodes (LDs) emit light waves at
the source, which is read by a detector at the other end. Optical fibre cable has a
bundle of such threads or fibres bundled together in a protective covering. Each fibre is
made up of these three layers, starting with the innermost layer −
42
Cladding made of high quality silica glass or plastic, with a lower refractive
index than the core
Note that both core and cladding are made of similar material. However, as refractive
index of the cladding is lower, any stray light wave trying to escape the core is
reflected back due to total internal reflection.
Optical fiber is fast replacing copper wires because of these advantages that it offers −
High bandwidth
43
Signals carrying data can travel long distances without weakening
Despite long segment lengths and high bandwidth, using optical fibre may not be a
viable option for every one due to these disadvantages −
Light waves are unidirectional, so two frequencies are required for full duplex
transmission
Infrared
Low frequency infrared waves are used for very short distance communication like TV
remote, wireless speakers, automatic doors, hand held devices etc. Infrared signals
can propagate within a room but cannot penetrate walls. However, due to such short
range, it is considered to be one of the most secure transmission modes.
Radio Wave
Transmission of data using radio frequencies is called radio-wave transmission. We
all are familiar with radio channels that broadcast entertainment programs. Radio
44
stations transmit radio waves using transmitters, which are received by the receiver
installed in our devices.
Both transmitters and receivers use antennas to radiate or capture radio signals. These
radio frequencies can also be used for direct voice communication within
the allocated range. This range is usually 10 miles.
45
What is Topology?
Network topologies describe the methods in which all the elements of a network are
mapped. The topology term refers to both the physical and logical layout of a network.
Physical topology:
This type of network is an actual layout of the computer cables and other network
devices
Logical topology:
P2P Topology
Bus Topology
Ring Topology
Star Topology
Tree Topology
Mesh Topology
Hybrid Topology
Point to Point
Point-to-point topology is the easiest of all the network topologies. In this method, the
network consists of a direct link between two computers.
46
P2P Topology Diagram
Advantages:
This is faster and highly reliable than other types of connections since there is a
direct connection.
No need for a network operating system
Does not need an expensive server as individual workstations are used to
access the files
No need for any dedicated network technicians because each user sets their
permissions
Disadvantages:
The biggest drawback is that it only be used for small areas where computers are
in close proximity.
You can't back up files and folders centrally
There is no security besides the permissions. Users often do not require to log
onto their workstations.
Bus Topology
47
Bus Topology Diagram
Bus topology uses a single cable which connects all the included nodes. The main
cable acts as a spine for the entire network. One of the computers in the network acts
as the computer server. When it has two endpoints, it is known as a linear bus topology.
Advantages:
Cost of the cable is very less as compared to other topology, so it is widely used
to build small networks.
Famous for LAN network because they are inexpensive and easy to install.
It is widely used when a network installation is small, simple, or temporary.
It is one of the passive topologies. So computers on the bus only listen for data
being sent, that are not responsible for moving the data from one computer to
others.
Disadvantages:
In case if the common cable fails, then the entire system will crash down.
48
When network traffic is heavy, it develops collisions in the network.
Whenever network traffic is heavy, or nodes are too many, the performance time
of the network significantly decreases.
Cables are always of a limited length.
Ring Topology
In a ring network, every device has exactly two neighboring devices for communication
purpose. It is called a ring topology as its formation is like a ring. In this topology, every
computer is connected to another computer. Here, the last node is combined with a first
one.
This topology uses token to pass the information from one computer to another. In this
topology, all the messages travel through a ring in the same direction.
Advantages:
49
The troubleshooting process is difficult in a ring topology.
Failure of one computer can disturb the whole network.
Offers equal access to all the computers of the networks
Faster error checking and acknowledgment.
Disadvantages:
Unidirectional traffic.
Break in a single ring can risk the breaking of the entire network
Modern days high-speed LANs made this topology less popular.
In the ring, topology signals are circulating at all times, which develops unwanted
power consumption.
It is very difficult to troubleshoot the ring network.
Adding or removing the computers can disturb the network activity.
Star Topology
In the star topology, all the computers connect with the help of a hub. This cable is
called a central node, and all other nodes are connected using this central node. It is
most popular on LAN networks as they are inexpensive and easy to install.
50
Advantages:
Disadvantages:
Mesh Topology
The mesh topology has a unique network design in which each computer on the
network connects to every other. It is develops a P2P (point-to-point) connection
between all the devices of the network. It offers a high level of redundancy, so even if
one network cable fails, still data has an alternative path to reach its destination.
Partial Mesh Topology: In this type of topology, most of the devices are
connected almost similarly as full topology. The only difference is that few
devices are connected with just two or three devices.
Full Mesh Topology: In this topology, every nodes or device are directly
connected with each other.
51
Advantages:
Disadvantages:
52
Because of the amount of cabling and the number of input-outputs, it is
expensive to implement.
It requires a large space to run the cables.
Tree Topology
Tree topologies have a root node, and all other nodes are connected which form a
hierarchy. So it is also known as hierarchical topology. This topology integrates various
star topologies together in a single bus, so it is known as a Star Bus topology. Tree
topology is a very common network which is similar to a bus and star topology.
Advantages:
Disadvantages:
53
If more nodes are added, then its maintenance is difficult
If the hub or concentrator fails, attached nodes are also disabled.
Hybrid Topology
Hybrid topology combines two or more topologies. You can see in the above
architecture in such a manner that the resulting network does not exhibit one of the
standard topologies.
For example, as you can see in the above image that in an office in one department,
Star and P2P topology is used. A hybrid topology is always produced when two different
basic network topologies are connected.
Advantages:
54
Disadvantages:
Here are some important considerations for selecting the best topology to create a
network in your organization:
55