CN Final Unit-1
CN Final Unit-1
Components:
A data communications system has five components.
5
Local Area Network (LAN) :
Local Area Network is a group of computers connected to each other in a small area
such as building, office.
LAN is used for connecting two or more personal computers through a communication
medium such as twisted pair, coaxial cable, etc.
It is less costly as it is built with inexpensive hardware such as hubs, network adapters,
and Ethernet cables.
The data is transferred at an extremely faster rate in Local Area Network.
Local Area Network provides higher security.
Metropolitan Area Network(MAN) : A metropolitan area network, or MAN, covers a city. The best-
known example of a MAN is the cable television network available in many cities. This system
grew from earlier community antenna systems used in areas with poor over-the-air television
reception. In these early systems,
A large antenna was placed on top of a nearby hill and signal was then piped to the subscribers'
houses.
A wide area network, or WAN, spans a large geographical area, often a country or continent. It contains
a collection of machines intended for running user (i.e., application) programs. These machines are
called as hosts. In most WANs, the network contains numerous transmission lines, each one connecting
a pair of routers. If two routers that do not
share a transmission line wish to communicate, they must do this indirectly, via other routers. When a
packet is sent from one route to another via one or more intermediate routers, the packet is received at each
intermediate router in its entirety, stored there until the required output line is free, and then forwarded. A
subnet organized according to this principle is called a store-and-forward or packet-switched subnet.
* A Wide Area Network is a network that extends over a large geographical area such as states or
countries.
* A Wide Area Network is quite bigger network than the LAN.
* A Wide Area Network is not limited to a single location, but it spans over a large
geographical area through a telephone line, fibre optic cable or satellite links.
* The internet is one of the biggest WAN in the world.
* A Wide Area Network is widely used in the field of Business, government, and education.
• Personal Area Network is a network arranged within an individual person, typically within a range of
10 meters.
• Personal Area Network is used for connecting the computer devices of personal use is known as
Personal Area Network.
• Thomas Zimmerman was the first research scientist to bring the idea of the Personal Area Network.
• Personal Area Network covers an area of 30 feet.
Personal computer devices that are used to develop the personal area network are the
aptop, mobile phones, media player and play stations.
Topologies
What is Topology? :
• Topology defines the structure of the network of how all the components are interconnected to
each other.
• There are two types of topology: physical and logical topology.
• Physical topology is the geometric representation of all the nodes in a network.
1. Bus Topology:
• The bus topology is designed in such a way that all the stations are connected through a single
cable known as a backbone cable.
• Each node is either connected to the backbone cable by drop cable or directly connected to the
backbone cable.
• When a node wants to send a message over the network, it puts a message over the network.
All the stations available in the network will receive the message whether it has been addressed
or not.
• The bus topology is mainly used in 802.3 (Ethernet) and 802.4 standard networks.
• The configuration of a bus topology is quite simpler as compared to other topologies.
• The backbone cable is considered as a "single lane" through which the message is broadcast to all
the stations.
• The most common access method of the bus topologies is CSMA (Carrier Sense Multiple Access).
2. Ring Topology :
• Ring topology is like a bus topology, but with connected ends.
• The node that receives the message from the previous computer will retransmit to the next node.
• The data flows in one direction, i.e., it is unidirectional.
• The data flows in a single loop continuously known as an endless loop.
• It has no terminated ends, i.e., each node is connected to other node and having no termination
point.
• The data in a ring topology flow in a clockwise direction.
• The most common access method of the ring topology is token passing.
Token passing: It is a network access method in which token is passed from one node to
another node.
Token: It is a frame that circulates around the network
Product availability: Many hardware and software tools for network operation and
monitoring are available.
Cost: Twisted pair cabling is inexpensive and easily available. Therefore, the installation cost is
very low.
Reliable: It is a more reliable network because the communication system is not dependent
on the single host computer.
Failure: The breakdown in one station leads to the failure of the overall network.
Reconfiguration difficult: Adding new devices to the network would slow down the network.
3. Star Topology:
• Star topology is an arrangement of the network in which every node is connected to the central
hub, switch or a central computer.
• The central computer is known as a server, and the peripheral devices attached to the
server are known as clients.
• Coaxial cable or RJ-45 cables are used to connect the computers.
• Hubs or Switches are mainly used as connection devices in a physical star topology.
• Star topology is the most popular topology in network implementation.
Cost effective: Star topology networks are cost-effective as it uses inexpensive coaxial cable.
High data speeds: It supports a bandwidth of approx 100Mbps. Ethernet 100BaseT is
one of the most popular Star topology networks.
4. Tree topology
• Tree topology combines the characteristics of bus topology and star topology.
• A tree topology is a type of structure in which all the computers are connected with each other in
hierarchical fashion.
• The top-most node in tree topology is known as a root node, and all other nodes are the
descendants of the root node.
• There is only one path exists between two nodes for the data transmission. Thus, it forms a
parent -child hierarch
5. Mesh topology
• Mesh technology is an arrangement of the network in which computers are interconnected
with each other through various redundant connections.
• There are multiple paths from one computer to another computer.
• It does not contain the switch, hub or any central computer which acts as a central point of
communication.
• The Internet is an example of the mesh topology.
• Mesh topology is mainly used for WAN implementations where communication failures are a
critical concern.
• Mesh topology is mainly used for wireless networks.
• Mesh topology can be formed by using the formula:
Mesh topology:
Reliable: The mesh topology networks are very reliable as if any link breakdown will
not affect the communication between connected computers.
Fast Communication: Communication is very fast between the nodes.
Easier Reconfiguration: Adding new devices would not disrupt the communication
between other Devices Disadvantages of Mesh topology
Cost: A mesh topology contains a large number of connected devices such as a
router and more transmission media than other topologies.
Management: Mesh topology networks are very large and very difficult to maintain and
manage. If the network is not monitored carefully, then the communication link failure
goes undetected.
Efficiency: In this topology, redundant connections are high that reduces the efficiency of the
network.
6. Hybrid Topology
The combination of various different topologies is known as Hybrid topology.
A Hybrid topology is a connection between different links and nodes to transfer the data.
When two or more different topologies are combined together is termed as Hybrid topology and if
similar topologies are connected with each other will not result in Hybrid topology. For example,
if there exist a ring topology in one branch of ICICI bank and bus topology in another branch of
ICICI bank, connecting these
two topologies will result in Hybrid topology.
NETWORK SOFTWARE
1. Protocol hierarchy
2. Design issues for layers
3. Connection oriented services
4. Connection less services
5. Relationship to services to protocols
6. Services primitives
LAYERED TASKS
We use the concept of layers in our daily life. As an example, let us consider
two friends who communicate through postal maiL The process of sending a letter to a
friend would be complex if there were no services available from the post office. Below
Figure shows the steps in this task.
Sender, Receiver, and Carrier
In Figure we have a sender, a receiver, and a carrier that transports the letter. There is a
hierarchy of tasks.
At the Sender Site
Let us first describe, in order, the activities that take place at the sender site.
Higher layer. The sender writes the letter, inserts the letter in an envelope, writes
the sender and receiver addresses, and drops the letter in a mailbox.
Middle layer. The letter is picked up by a letter carrier and delivered to the post office.
Lower layer. The letter is sorted at the post office; a carrier transports the letter.
0n the Way: The letter is then on its way to the recipient. On the way to the recipient's local post
office, the letter may actually go through a central office. In addition, it may be transported by
truck, train, airplane, boat, or a combination of these.
Lower layer. The carrier transports the letter to the post office.
Middle layer. The letter is sorted and delivered to the recipient's mailbox.
Higher layer. The receiver picks up the letter, opens the envelope, and reads it.
Physical Layer
The physical layer is concerned with transmitting raw bits over a communication
channel. The design issues have to do with making sure that when one side sends a 1
bit, it is received by the other side as a 1 bit, not as a 0 bit.
The Data Link Layer:
The main task of the data link layer is to transform a raw transmission facility into a
line that appears free of undetected transmission errors to the network layer. It
accomplishes this task by having the sender break up the input data into data frames
(typically a few hundred or a few thousand bytes) and transmits the frames
sequentially. If the service is reliable, the receiver confirms correct receipt of each
frame by sending back an acknowledgement frame.
Another issue that arises in the data link layer (and most of the higher layers as well)
is how to keep a fast transmitter from drowning a slow receiver in data. Some traffic
regulation mechanism is often needed to let the transmitter know how much buffer
space the receiver has at the moment. Frequently, this flow regulation and the error
handling are integrated.
Host-to-Network Layer:
The TCP/IP reference model does not really say much about what happens here,
except to point out that the host has to connect to the network using some protocol
so it can send IP packets to it. This protocol is not defined and varies from host to
host and network to network.
Internet Layer:
This layer, called the internet layer, is the linchpin that holds the whole architecture
together. Its job is to permit hosts to inject packets into any network and have they
travel independently to the destination (potentially on a different network). They
may even arrive in a different order than they were sent, in which case it is the job of
higher layers to rearrange them, if in-order delivery is desired. Note that ''internet'' is
used here in a generic sense, even though this layer is present in the Internet.
The internet layer defines an official packet format and protocol called IP (Internet
Protocol). The job of the internet layer is to deliver IP packets where they are
supposed to go. Packet routing is clearly the major issue here, as is avoiding
congestion. For these reasons, it is reasonable to say that the TCP/IP internet layer is
similar in functionality to the OSI network layer. Fig. shows this correspondence.
The Transport Layer:
The layer above the internet layer in the TCP/IP model is now usually called the
transport layer. It is designed to allow peer entities on the source and destination
hosts to carry on a conversation, just as in the OSI transport layer. Two end-to-end
transport protocols have been defined here. The first one, TCP (Transmission
Control Protocol), is a reliable connection- oriented protocol that allows a byte
stream originating on one machine to be delivered without error on any other
machine in the internet. It fragments the incoming byte stream into discrete messages
and passes each one on to the internet layer. At the destination, the receiving TCP
process reassembles the received messages into the output stream. TCP also handles
flow control
to make sure a fast sender cannot swamp a slow receiver with more messages than it can handle.
ARPANET
This may be considered as the breakthrough for many of current ideas, algorithms and
Internet technologies. It started Paul Baran in 1960s funded by Advanced Research Projects
Agency (ARPA), an organization of the united States Defense Department and, therefore,
named as Advanced Research Projects Agency Network (ARPANET) predecessor of the
modern Internet. It was world’s first fully operational packet switching computer network
and the world’s first successful computer network to implement the TCP/IP reference
model that was used earlier by ARPANET, before being used in the Internet. The
ARPANET is the first network that planed the seed of interent.
THE INTERNET
The Internet has revolutionized many aspects of our daily lives. It has affected the
way we do business as well as the way we spend our leisure time. Count the ways
you've used the Internet recently. Perhaps you've sent electronic mail (e-mail) to a
business associate, paid a utility bill, read a newspaper from a distant city, or looked
up a local movie schedule-all by using the Internet. The Internet is a communication
system that has brought a wealth of information to our fingertips and organized it for
our use.
A Brief History :
A network is a group of connected communicating devices such as computers and
printers. An internet (note the lowercase letter i) is two or more networks that can
communicate with each other. The most notable internet is called the Internet
(uppercase letter I), a collaboration of more than hundreds of thousands of
interconnected networks. The Advanced Research Projects Agency (ARPA) in the
Department of Defense (DoD) was interested in finding a way to connect computers
so that the researchers they funded could share their findings, thereby reducing costs
and eliminating duplication of effort. In 1967, at an Association for Computing
Machinery (ACM) meeting, ARPA presented its ideas for ARPANET, a small
network of connected
computers.
Transmission Control Protocol (TCP) and Internetworking Protocol (lP). IP would
handle datagram routing while TCP would be responsible for higher-level functions
such as segmentation, reassembly, and error detection. The internetworking protocol
became known as TCPIIP.
The Internet Today
The Internet has come a long way since the 1960s. The Internet today is not a simple
hierarchical structure. It is made up of many wide- and local-area networks joined by
connecting devices and switching stations. It is difficult to give an accurate
representation of the Internet because it is continually changing-new networks are
being added, existing networks are adding addresses, and networks of defunct
companies are being removed.
Internet service provider (ISP), company that provides Internet connections and
services to individuals and organizations. In addition to providing access to the
Internet, ISPs may also provide software packages (such as browsers), e-mail
accounts, and a personal Web site or home page.
POP protocol is used in the application layer protocol, and it delivers best ability to
fetch and receive all email by users.
International Internet Service Providers:
At the top of the hierarchy are the international service providers that
connect nations together.
National Internet Service Providers:
The national Internet service providers are backbone networks created and
maintained by specialized companies. There are many national ISPs operating in
North America; some of the most well known are SprintLink, PSINet, UUNet
Technology, AGIS, and internet Mel. To provide connectivity between the end
users, these backbone networks are connected by complex switching stations
(normally run by a third party) called network access points (NAPs). Some national
ISP networks are also connected to one another by private switching stations called
peering points. These normally operate at a high data rate (up to 600 Mbps).
Regional Internet Service Providers:
Regional internet service providers or regional ISPs are smaller ISPs that are
connected to one or more national ISPs. They are at the third level of the hierarchy
with a smaller data rate.
1. Twisted Pair Cable : Twisted pair is a physical media made up of a pair of cables
twisted with each other. A twisted pair cable is cheap as compared to other
transmission media. Installation of the twisted pair cable is easy, and it is a
lightweight cable. The frequency range for twisted pair cable is from 0 to 3.5KHz.
Twisted pair cabling comes in two varieties: shielded and unshielded. Unshielded twisted pair (UTP) is the most
popular and is generally the best option for school networks.
Figure 2.1 Unshielded Twisted Pair
The quality of UTP may vary from telephone-grade wire to extremely high-speed cable. The cable has four
pairs of wires inside the jacket. Each pair is twisted with a different number of twists per inch to help
eliminate interference from adjacent pairs and other electrical devices. The tighter the twisting, the higher the
supported transmission rate and the greater the cost per foot. The EIA/TIA (Electronic Industry Association /
Telecommunication Industry Association) has established standards of UTP and rated five categories of wire.
Type Use
Category 1 Voice Only (Telephone Wire)
Category 2 Data to 4 Mbps (LocalTalk)
A disadvantage of UTP is that it may be susceptible to radio and electrical frequency interference.
Shielded twisted pair |(STP) is suitable for environments with electrical interference; however, the
extra shielding can make the cables quite bulky. Shielded twisted pair is often used on networks
using Token Ring topology.
Disadvantages
• It is more expensive as compared to UTP and coaxial cable.
1. Coaxial Cable
Coaxial cable is very commonly used transmission media, for example, TV wire is usually a coaxial
cable.
Coaxial cabling has a single copper conductor at its center. A plastic layer provides insulation
between the center conductor and the braided metal shield (See fig. 3). The metal shield helps to
block any outside interference from fluorescent lights, motors, and other computers.
Fig. 2.3 Coaxial cable
• The name of the cable is coaxial as it contains two conductors parallel to each other.
• It has a higher frequency as compared to Twisted pair cable.
• The inner conductor of the coaxial cable is made up of copper, and the outer conductor is
made up of copper mesh. The middle core is made up of non-conductive cover that separates
the inner conductor from the outer conductor.
• Thin coaxial cable is also referred to as thinnet. 10base2 refers to the specifications for thin coaxial cable
carrying Ethernet signals. The 2 refers to the approximate maximum segment length being 200 meters. In
actual fact the maximum segment length is 185 meters. Thin coaxial cable is popular in school networks,
especially linear bus networks.
• Thick coaxial cable is also referred to as thicknet. 10base refers to the specifications for thick coaxial
cable carrying Ethernet signals. The 5 refers to the maximum segment length being 500 meters. Thick
coaxial cable has an extra protective plastic cover that helps keep moisture away from the center
conductor. This makes thick coaxial a great choice when running longer lengths in a linear bus network.
One disadvantage of thick coaxial is that it does not bend easily and is difficult to install.
Baseband transmission: It is defined as the process of transmitting a single signal at high speed.
Broadband transmission: It is defined as the process of transmitting multiple signals simultaneously.
This makes it ideal for certain environments that contain a large amount of electrical interference. It
has also made it the standard for connecting networks between buildings, due to its immunity to the
effects of moisture and lighting.
Fiber optic cable has the ability to transmit signals over much longer distances than coaxial and
twisted pair. It also has made it the standard for connecting networks between buildings, due to its
immunity to the effects of moisture and lighting.
Fiber optic cable has the ability to transmit signals over mush longer distances than coaxial and
twisted pair. It also has the capability to carry information at vastly greater speeds. This capacity
broadens communication possibilities to include services such as video conferencing and interactive
services. The cost of fiber optic cabling is comparable to copper cabling; however it is more
difficult to install and modify. 10BaseF refers to the specifications for fiber optic cable carrying
Ethernet signals.
The most common connector used with fiber optic cable is an ST connector. It is barrel shaped,
similar to a BNC connector. A newer connector, the SC, is becoming more popular. It has a
squared face and is easier to connect in a confined space.
Specification Cable Type Maximum length
Unguided media transport electromagnetic waves without using a physical conductor. This type of
communication is often referred to as wireless communication. Signals are normally broadcast
through free space and thus are available to anyone who has a device receiving them. Unguided
signals can travel from the source to destination in several ways: ground propagation, sky
propagation, and line-of-sight propagation.
In ground propagation, radio waves travel through the lowest portion of the atmosphere, hugging
the earth. These low-frequency signals emanate in all directions from the transmitting antenna and
follow the curvature of the planet. Distance depends on the amount of power in the signal: The
greater the power, the greater the distance. Ground waves have carrier frequencies up to 2 MHz.
AM radio is an example of ground wave propagation.
It is sometimes called double hop propagation. It operates in the frequency range of 30 – 85 MHz.
Because it depends on the earth’s ionosphere, it changes with the weather and time of day. The signal
bounces off of the ionosphere and back to the earth. Ham radios operate in this range. Other books called
this Ionospheric propagation.
We can divide wireless transmission into three broad groups: radio waves, microwaves, and
infrared waves.
1. Radio Waves
Electromagnetic waves ranging in frequencies between 3 kHz and 1 GHz are normally called radio
waves.
Radio waves are omnidirectional. When antenna transmits radio waves, they are propagated in all
directions. This means that the sending and receiving antennas do not have to be aligned. A
sending antenna sends waves that can be received by any receiving antenna.
Radio waves, particularly those of low and medium frequencies, can penetrate walls. This
characteristic can be both an advantage and disadvantage. It is an advantage because, for example,
an AM radio can receive signals inside a building. It is a disadvantage because we cannot isolate a
communication to just inside or outside a building.
2. Microwaves
Electromagnetic waves having frequencies between 1 and 300 GHz are called microwaves.
Microwaves are unidirectional. When an antenna transmits microwave waves, they can be narrowly
focused. This means that the sending and receiving antennas need to be aligned. The
unidirectional property has an obvious advantage. A pair of antennas can be aligned without
interfering with another pair of aligned antennas. The following describes some characteristics of
microwave propagation:
Microwave propagation is line-of-sight. Since towers with the mounted antennas need to be
in direct sight of each other. This also set a limit on the distance between stations
depending on the local geography. Towers that are far apart need to be very tall. The
curvature of the earth as well as other blocking obstacles does not allow two short towers to
communicate by using microwaves. Typically the line of sight due to the Earth’s curvature
is only 50 km to the horizon. Repeaters are often needed for long-distance communication.
Very high frequency microwaves cannot penetrate walls. This characteristic can be a
disadvantage if receivers are inside the buildings.
The microwave band is relatively wide, almost 299 GHz. Therefore wider subbands can be
assigned, and a high data rate is possible.
Use of certain portions of the band requires permission from authorities.
3. Infrared Waves
Infrared waves, with frequencies from 300 GHz to 400 THz (wavelengths from 1 mm to 770 mm),
can be used for short-range communication. Infrared waves, having high frequencies, cannot
penetrate walls. This advantageous characteristic prevents interference between one
system and another; a short-range communication system in one room cannot be affected by
another system in the next room. When we use our infrared remote control, we do not
interfere with the use of the remote of our neighbors. However, this same characteristic makes
infrared signals useless for long-range communication. In addition, we cannot use infrared waves
outside a building because the sun’s rays contain infrared waves that can interfere with the
communication.
Satellite
Satellites are transponders (units that receive on one frequency and retransmit on another) that
are set in geostationary orbits directly over the equator. These geostationary orbits are 36, 000 km
from the Earths’s surface. At this point, the gravitational pull of the Earth and the centrifugal force
of Earth’s rotation are balanced and cancel each other out. Centrifugal force is the rotational force
placed on the satellite that wants to fling it out into the space.
The uplink is the transmitter of data to the satellite. The downlink is the receiver of data. Uplinks
and downlinks are also called Earth stations because they are located on the Earth. The footprint is
the “shadow” that the satellite can transmit to, the shadow being the area that can receive the
satellite’s transmitted signal.
Fig. Uplink and Downlink
NETWORK DEVICES
Network Devices: Network devices, also known as networking hardware, are physical devices that allow hardware on a
computer network to communicate and interact with one another. For example Repeater, Hub, Bridge, Switch, Routers,
Gateway, Brouter, and NIC, etc.
1. Repeater – A repeater operates at the physical layer. Its job is to regenerate the signal over the same network before
the signal becomes too weak or corrupted to extend the length to which the signal can be transmitted over the same
network. An important point to be noted about repeaters is that they not only amplify the signal but also regenerate it.
When the signal becomes weak, they copy it bit by bit and regenerate it at its star topology connectors connecting
following the original strength. It is a 2-port device.
2. Hub – A hub is a basically multi-port repeater. A hub connects multiple wires coming from different branches,
for example, the connector in star topology which connects different stations. Hubs cannot filter data, so data
packets are sent to all connected devices. In other words, the collision domain of all hosts connected through
Hub remains one. Also, they do not have the intelligence to find out the best path for data packets which leads
to inefficiencies and wastage.
3. Bridge – A bridge operates at the data link layer. A bridge is a repeater, with add on the functionality of
filtering content by reading the MAC addresses of the source and destination. It is also used for interconnecting
two LANs working on the same protocol. It has a single input and single output port, thus making it a 2 port
device.
4. Switch – A switch is a multiport bridge with a buffer and a design that can boost its efficiency(a large number
of ports imply less traffic) and performance. A switch is a data link layer device. The switch can perform error
checking before forwarding data, which makes it very efficient as it does not forward packets that have errors
and forward good packets selectively to the correct port only. In other words, the switch divides the collision
domain of hosts, but the broadcast domain remains the same.
5. Routers – A router is a device like a switch that routes data packets based on their IP addresses. The router is
mainly a Network Layer device. Routers normally connect LANs and WANs and have a dynamically updating
routing table based on which they make decisions on routing the data packets. The router divides the broadcast
domains of hosts connected through it.
6. Gateway – A gateway, as the name suggests, is a passage to connect two networks that may work upon
different networking models. They work as messenger agents that take data from one system, interpret it, and
transfer it to another system. Gateways are also called protocol converters and can operate at any network layer.
Gateways are generally more complex than switches or routers. A gateway is also called a protocol converter .
7. NIC – NIC or network interface card is a network adapter that is used to connect the computer to the network.
It is installed in the computer to establish a LAN. It has a unique id that is written on the chip, and it has a
connector to connect the cable to it. The cable acts as an interface between the computer and the router or
modem. NIC card is a layer 2 device which means that it works on both the physical and data link layers of the
network model.