TYBCom CH 2
TYBCom CH 2
K Chapter - 2
Module - 1
COMPUTER NETWORK
A computer network is an interconnection of tWo or more computers such that they
can share resources and information. These computers can be linked
together using a
wide variety of cables, telephone lines, or through satellites. The computers in a network
communicate with each other using a set of rules known as protocol.
All networks must have the following:
1. Aresource to share such as printer, modem, database, etc.
2. A medium for transmission of data ( i.e., a communications link),
3. A set of rules governing how to communicate (protocols).
File Server
Workstation Workstation
oo0000o o0
Networking Hub
80 km 60 km
Branch Office
Factory
Fig. 2: Metropolitan Area Network (MAN)
Features of MAN
The main features of ametropolitan area network (MAN) are:
1. Ametropolitan area network is spread out over a bigger area compared to a LAN.
E.g., it may occupy an entire metropolis area (i.e. a city)or a large campus.
2. A MAN is owned by a single organization or may be shared by marny organizations
within a city.
3. A MAN is used to provide interlinking between various LANs. E.g., a company can
use a MAN to interconnect all its local area networks in various parts of a city.
4. A metropolitan area network may span a distance of about 50-70 kms.
S. MAN supports real-time transaction backup system.
6. The data transfer speed is very high in a MAN.
7. These are usually based on ring topology, but star topology is not used.
8. The medium used for transmission of data is fibre optic cable.
Thus, one diference between a LAN and a MAN that a LAN is a small nerwork of
connected computersin which computers are connected to each other physically with the
help of cables. But a MAN is a bigger network of interconnected computers in which
computers are connected to each other through fibre optic cable.
Wide Area Network (WAN)
A wide area network covers many cities, states,countries or even continents.
NETWORK STRUCTURES
The way in which individual computers (called nodes) on a network interact with
other computers depends on how they are organized. The two basic types of network
structures (or architectures) are: server-based (client-server model), and peer-to-peer
network.
1. Client-Server model (Server-based)
Hub
Shared printer
Server
Client 1
Client 2 Client 3
In this type of network, certain computers called servers, are dedicated to provide
various services to the other computers, called clients.The client and server are connected
through a central hub.
12
Computer Systems ond Applications (T.Y. B.Com.) (Sem.
Features of Client-Server Network
1 All resources are controlled through the server.
2 This is a distributed application structure that divides tasks between the providers
of a resource or service (called servers), and service requesters (called clients).
3 The client is the requesting machine and the server is the supplying machihe.
4. Different types of servers are file-server, print server, e-mail server, fax server,
database server, etc.
S. The most common type of client-server arrangemnent is a local area network
(LAN)consisting of PCs connected to a network server.
6. The network server serves all the clients on the LAN.
7. A client program running on a computer can request a specific data rom the
server. The server program will fetch the data and return it to the client.
3. In this way, a LAN permits all the clients to share the hardware and software
resources.
9. The most commonly shared resources are disk storage devices and printers.
Advantages of Client-server architecture
1. Centralized resources and data security : These aspects are controlled directly
from the server.
2. Flexibility :New technology can easily be integrated into the system. Additional
workstations (clients) may be added or non-working clients can be removed
without disturbing the entire network.
3. Interoperability : All components, i.e., client, server and network work together.
4. Scalability : Additional workstations (clients) may be added or non-working
clients can be removed without disturbing the entire network.
Disadvantages of client-server architecture
1. Expensive : The cost of server and network operating system can be quite high
for asmall organization.
2. Maintenance : Large networks require skilled manpower for network
administration and maintenance.
3. Server not utilized fully : Usually the server will not be used for routine tasks
but will be dedicated only for network-related activities. Hence one computer is
not being utilized fully.
4. Dependence on server :If the sever fails, the whole network will stop working.
2. Peer-to-Peer Network
In a peer-to-peer network (also called P2P
network), there are no dedicated servers. No
single computer is assigned the role of providing
services to all other computers. Each machine
works as both a server as wellas a client. The word
"peer" means "equal", and therefore in this type of
network, all computers are equal.
Features of Peer-to-Peer Network
1. All computers have equal capabilities and
all computers are equal no single
Fig. 5 : Peer-to-Peer Network
computer is assigned the responsibility for
the entire network.
Network Basics and lnfrastructure 13
NETWORK TOPOLOGIES
Network topology is the geometric and physical arrangement of a computer network.
A computer network consists of nodes and links. A node
may be, for example, a computer, while a link is the
communication path between the nodes. The word Server
"channel" is also used for the link.
There are four main topologies : (a) star, (b) bus,
(c) ring, and (d) mesh topology. We discuss the first Clhent Hub Chent
three topologies here. Mesh topology is outside the
Scope of the syllabus.
1, Star Topology
Chent
This is the most common arrangement of computer Chent Server
systems and links between them. All devices are
connected to central hub. The function of the hub is to Fig. 6: Star Topology
deliver the data to-and from the computers. The hub
may be a server computer.
Features of Star Topology
1. All nodes (clients) are connected directly to a central system (the hub).
2. Each node can communicate only with the central hub and not directly with
another computer.
3. If it is desired to send data from one node to another, it can be done only by
sending data to the central hub, which in turn will deliver it to the destination
computer.
B.Com.) (Sem.
14
Computer Systems and Applications (T.Y.
4Tns topology is useful if it is required to keep a centralized database.
Terminator
Terminator
Drop line
Bus
2. If new nodes are added, the data transfer rate on the network may reduce.
3. This topology is not suitable for large networks.
4. Signal reflection at the nodes can cause deterioration in the quality of signal.
5. If there is a fault or a break in the cable, all transmission on the network will stop.
3. Ring Topology
Clhent
Chent
Chent
Server
Clhent
Chent
Ring topology is also used for local area networks. In this arrangement, a network
cable passes from one node to another until all nodes are connected in the form of a ring
or loop. There is a direct point-to-point link between neighbouring nodes.
Features of Ring Topology
1. Each device is connected to the two adjacent devices on either side, thus forming
a ring or a loop like structure.
2. A "token" is circulating in the network. Any device that wants to transmit data
must first capture the free token and replace the data with its own message.
3. The signal is passed along the ring in one direction, from device to device,until it
reaches its destination.
4, The address of the sending device and the receiving device are sent along with
the message to be transmitted. The message travels along the ring till it reaches the
destination computer.
5. Each device handles every mesage that flows in the network.
6. The links between computers are unidirectional. Any data transmitted by a node
comes back to the same node.
Advantages of Ring Topology
1. Ring networks can extend over longer distances than other types of networks.
2. Ring topology ofers high performance forasmallnetwork.
3. Since each device is connected only to its two neighbours, adding or removing
nodes in the network is easy.
Disadvantages of Ring Topology
1. Ifany one computer fails, then the entire network will stop working.
2. It is relatively expensive and difficult to install.
3. Troubleshooting is difficult in this type of network.
16 (Sem.
Computer Systems and Applications (T.Y. B.Com.)
NETWORK MEDIA : WIRED AND WIRELESS
Nework media refers to the medium used in computer networks for transrnission of
data. It is the actual path over which an electrical signal travels as it moves from one
computer/device to another, This data transmission can take place either through wired
media or wireless.
Wired Media : Examples of wired media include twisted pair and coaxial cable. Copper
wire is very commonly used. Copper media can be used in following ways :
Copper Medla
Coaxial Twisted-Pair
Twisted-pair cable
Twisted-pair cable is a type of cabling that is used for telephone communications and
most networks. It consists of two copper conductors twisted together. Each conductor is
inside a plastic insulation.
The wires are twisted to provide protection against crosstalk, the noise generated by
adjacent pairs. When two wires in an electrical circuit are placed close together, there may
be interference due to electrical signals in them. Twisting the wires cancels this
interference.
Two basic types of twisted-pair cable are used: unshielded twisted pair (UTP) and
shielded twisted pair (STP).
Twisted Pair
Outer Jacket
COAXIAL CABLE
Coaxial cable consists of a solid copper conductor surrounded by a flexible plastic
insulation, braided copper shielding, and an outer jacket. It is a high frequency
transmission cable.
NETWORK HARDWARE
To establish a computer network we require hardware and
hardware includes computers, software. Network
peripheral devices, network interface cards
hub, bridge, etc. (NIC). rOuter.
Hub
Ahub joins multiple
computers (or other network
network segment. All computers can
Ahub includes a series of ports
devices) together
communicate directly with each to form a single
in which we other.
contain many ports. For example, a five ports hub can insert a network
fifth port is reserved for "uplink" will cable. Hubs can
connections to another connect four
Contain eight, 12, 16, and even 24 ports. hub or similar computers,
device.
and the
hubs
Ahub simply receives
incoming packets, may
Larger
electrical signal, and broadcasts these packets amplifyout
the
devices the network -including the one
on to all
the packet! that originally sent
Bridge Fig. 15: Hub
Abridge is a
device using
more efficient networks. Abridgewhich we can segment a large
can be used to
connect two network into two smaller,
networks together.
Netw "sics and Infrastructure
A bridge monitors the intomation traflic on both sides of the network so that it can
pass packets of information to the cotrect location. A bridge manages the traffic to
maintain optimum pertormance on both sides of the network. A bridge is like atraffic cop
at abusy intersection during rush hour. It keeps information flowing on both sides of the
network, but it does not allow unnecessary traffic through.
Bridges can be used to connect different types of cabling, or physical topologies.
Bridge
NETWORK PROTOCOLS
Internet. Some of these
Millions of computers of different types are connected on the
others may be running under
Computers may be running UNIX operating systems whilecommunicate with each other.
WindowS operating systems. For all these computers to
rules.
they must speak a common language and follow some common
The set of rules, which enables different types of computers to communicate with
each other, is called a protocol.
Transmission Control Protocol / Internet Protocol (TCP / IP)
The protocol used by the Internet for transferring messages from one computer to
another is called the Transmission Control Protocol / Internet Protocol (TCP /IP
This term actually refers to two parts :
1. The Transmission Control Protocol (TCP):The job of the TCP is to break
down every piece of data into small parts called packets. Each such packet also
contains the address of the sender and the receiver.
2. Internet Protocol : The job of the Internet Protocol (IP) is to find out how the
data will go from point A to point B passing through a series of routers. These
packets of data are sent over different paths until they reach their final destination.
This is somewhat similar to the way regular mail passes through several post offices
before it reaches its final destination. As the packets arrive at the destination, TCP
takes over again, identifying each packet and checking to see if it is intact. Once it
has received all the packets, TCP reassembles them into the original.
Features of the TCP/IP Protocol
TCP is a reliable connection-oriented protocol with the following features:
-1. Its allows error-free transmission.
2. Incoming byte stream is fragmented (broken down) into a number of shorter
messages and these are passed on to the next layer.
3. At the receiving end the TCP reassembles the messages into an output stream
4. TCP also handles flowcontrol- to control data transfer rate so that a slow receiver
is not flooded with data from a fast sender.
S. A connection must be established between the sernder and the receiver before
transmission begins.
6. TCP creates a virtua circuit between sender and receiver for the duration of the
transmission.
7. TCP begins each transmission by alerting the receiver that segments are on
their
way (connection establishment).
8. Each transmission is ended with connection
termination.
Network Basics and Infrastructure
21
Layers of TCP/IP Model
Application
Transport
Internet
Data Link
Physical
The functionality of each layer of the TCP model is as follows
The Application layer :
This is equivalent to the combined OSI Session, Presentation, and
(discussed below). All the functions handled by these 3 layers in theApplication
OSI modellayers
are
handled by the Application layer. This layer contains the higher level protocols :
a) FTP- File Transfer Protocol - basic file transfer between hosts (computers)
b) SMTP - Simple Mail Transfer Protocol (for email)
c) HTTP-Hyper Text Transfer Protocol (for web browsing)
A data unit created at the application layer is called a message.
Encapsulation of Data:TCP/P protocol suite encapsulates data units at various
layers of the model.
a) At the Application layer, the data unit created is called a message.
b) The Transport layer adds a header to form either a segment with TCP or a user
datagram with UDP.
c) Each segment created by TCP includes:
) Asequencing number for re-ordering after receipt.
ii) An acknowledgement ID number
ii) Source address and destination address
iv) Checksum - for error detection
v) Data
vi) And other fields
d) The Network (or Internet) layer adds another header to form a datagram. A
datagram is a self-contained message unit which contains sufficient information to
allow to be routed from the source to the destination. The protocol used at the
data link layer encapsulates the datagram into a frame and this is transmitted
across the transmission medium.
Transport Layer
This layer is represented by two protocols - TCP (Transmission Control Protocol)
and UDP (User Datagram Protocol).
UDP is simpler but is used when reliability and security are less important than size
and speed - such as speech and video where a loss of few data is not significant.
but speed is important.
Network Layer or Internetwork Layer
Internetwork Protocol (P) is an unreliable and connectionless datagram protocol.
It offers abest-effort delivery service. There is no error checking. IP does its best to
get a transmission through to its destination but with no guarantees. Noise can cause bit
errors during transmission, and datagrams maybe discarded due to timeouterrors.
B.Com.)(Sem. - V)
Computer Systems and Applications (T.Y.
22
" It contains protocols that allow the users to access the network: FTP, HTTP.
SMTP, etc.
It does not include application programs such as email, browsers, word processing
applications, etc.
Protocols contain utilities and network-based services that support email via
SMTP, Internet access via HTTP, file transfer via FTP, etc.
Presentation Layer
The functions of this layer are as follows:
This layer is concerned with questions like: What does the data look like? The
Presentation layer provides services that affect how data passed between
applications will look, such as character set conversion, or encryption/decryption.
It provides services for translation :
Different computers use different encoding systems (bit order translation)
Convert data into a common format before transmitting.
Syntax represents info such as character codes, data types, and file formats (how
many bits to represent data - 8 or 7 bits
The Presentation layer is responsible for data compression - reduce number of bits
to be transmitted
It is also concerned with : How can more than one resource talk to only one of
me? - The session layer answers the need for individual hosts to support more
than one active connection at a tÉme.
Transport Layer
Main functions of this layer are:
OResponsible for source-to-destination delivery of the entire message
O Segmentation and reassembly - divide message into smaller segments, number
them and transmit. Reassemble these messages at the receiving end.
Error control - make sure that the entire mnessage arrives without errors - else
retransmit.
What if data arrives garbled or out of order or too fast?- The Transport Layer
provides end-to-end communication integrity. If a packet is missing or garbled, or
arrives out-of-order, or too soon, the protocol at this layer will attempt to correct.
Network Layer
Main functions of this layer are :
Responsible for delivery of packets across multiple networks.
Routing, that is provide mechanisms to transmit data over independent networks
that are linked together.
24 Computer Systerms and Applications (T.Y. B.Com.) (Sem. - )
Network layer is responsible only for delivery of individual packets and it does not
recognize any relationship between those packets.
Data Link Layer
Responsible for delivery of data between twO systems on the same network
Main functions of this layer are :
Framing - divides the stream of bits received into manageable data units
called frames.
Physical Addressing - Add a header to the frame to define the physical address
of the source and the destination machines.
Flow control Impose a flow control control rate at which data is
transmitted so as not to flood the receiver
Error Control Adds mechanisms to detect and retransmit damaged or lost
frames; also prevents duplication of frames. This is achieved by adding a trailer
to the end of a frame.
Physical layer
Functions of Physical Layer:
Bit representation - encode bits into electrical or optical signals.
Transmission rate - The number of bits sent each second.
Physical characteristics of transmission media.
Synchronizing the sender and receiver clocks.
Transmission mode -simplex, half-duplex,full duplex.
Physical Topology - how devices are connected - ring, star, mesh, bus topology.
Transmit raw bit-stream over physical cable.
Define physical aspects of media, network cards, etc.
QUESTIONS
1. What is a computer network? What are the advantages of using a computer network?
2. What are the disadvantages of a computer r .twork?
3. What is a local area network (LAN)? What are the main features of a LAN?
4. What is a metropolitan area network (MAN)? What are the main features of a MAN?
5. What is a wide area network (WAN)? What are the main features of a WAN?
6 What are some of the factors that determine whether a communication system is
LAN, MAN or WAN?
7 Give the main features of the client-server architecture.
8 State the advantages and disadvantages of client-server model.
9 What are the salient features of the peer-to-peer network?
10. What are the advantages and disadvantages of a peer-to-peer network?
11. Define the term topology. State three main topologies commonly used in computer
networks.
12. Describe the star topology. What are its advantages and disadvantages?
13. Describe the bus topology. State its advantages and disadvantages.
14. Describe ring topology. State the pros (advantages) and cons (disadvantages) of this
topology.
15. Give one advantage of each type of topology.