CN Unit 1
CN Unit 1
Internet:
The internet is a global network of interconnected computers, servers, phones, and smart
appliances that communicate with each other using the transmission control protocol (TCP)
standard to enable a fast exchange of information and files, along with other types of
services.
computer network
A computer network is a system that connects multiple computers and other electronic
devices to facilitate communication and resource sharing. This network allows devices to
transmit, exchange, and access data and information efficiently.
Nodes: These are the devices like computers, servers, printers, and other equipment that are
connected in the network.
Communication Media: Networks use various media for communication, such as wired
connections (Ethernet cables, coaxial cables) and wireless connections (Wi-Fi, Bluetooth).
Data Transmission: Data is transferred in the form of packets and signals. Protocols like TCP/IP
govern how data is transmitted and received.
Network Topologies: The arrangement of a network can vary. Common topologies include bus,
star, ring, mesh, and tree, each with its unique layout and communication style.
Network Types: Depending on the scale and range, networks can be categorized as Local Area
Networks (LAN), Wide Area Networks (WAN), Metropolitan Area Networks (MAN), and
Personal Area Networks (PAN).
Internet: The largest and most well-known computer network, connecting millions of computers
globally.
Security: Networks implement various security measures to protect data and maintain privacy.
Firewalls, encryption, and access control are some common security practices.
Protocols: Set of rules and conventions for communication. Protocols like HTTP, FTP, and SMTP
are used for specific types of data transmission.
Network Hardware: Includes routers, switches, hubs, and bridges that help in directing and
controlling network traffic.
Applications: Networks enable numerous applications, such as email, file sharing, online gaming,
and video conferencing.
There are different categories in which various networks can be classified, according to their size,
capabilities, and the geographical distance they cover. A network is normally a group of multiple
computer systems linked together in some manner so that they can share information and data
between them.
D. S. R 1
CN UNIT-1
Edge Network
An edge network contains fewer hops to its adjacent network than a core network. In other
words, the edge network has few or no layer 3 devices. According to the OSI model, layer
3 represents the network layer. Hence, the devices used in the network layer are known as
layer 3 devices. Example of level 3 devices includes routers and switches.
Additionally, we place the edge network close to the end users. A typical example of an
edge network would be a data center network. Another example of an edge network is a
branch office network that connects to the core network via IP routing protocols such
as Virtual Router Redundancy Protocol (VRRP) and policy-based routing (PBR).
An edge network is ideal for connecting devices near the end users, such as a branch office
or remote site.
Core Network
A core network contains more hops to its adjacent network than an edge network. In other
words, the core network has more layer 2 and 3 devices and is the center of the enterprise
network. It’s also known as the backbone network. Furthermore, we design core networks
to transfer network traffic at high speeds. A core network uses both wide-area networks
(WAN) and local area networks (LAN).
A typical example of a core network would be a central office network connecting to the
edges via Multiprotocol Label Switching (MPLS) such as Open Shortest Path First
(OSPF) and Border Gateway Protocol (BGP).
A core network generally has a larger number of layer 2 and 3 devices
A core network is better suited to connect devices away from the end users, such as a
central office or data center.
The delays, here, means the time for which the processing of a particular packet takes place. We
have the following types of delays in computer networks:
1.TransmissionDelay:
The time taken to transmit a packet from the host to the transmission medium is called
Transmission delay.
D. S. R 2
CN UNIT-1
For example, if bandwidth is 1 bps (every second 1 bit can be transmitted onto the transmission
medium) and data size is 20 bits then what is the transmission delay? If in one second, 1 bit can
be transmitted. To transmit 20 bits, 20 seconds would be required.
Let B bps is the bandwidth and L bit is the size of the data then transmission delay is,
Tt = L/B
This delay depends upon the following factors:
If there are multiple active sessions, the delay will become significant.
Increasing bandwidth decreases transmission delay.
MAC protocol largely influences the delay if the link is shared among multiple devices.
Sending and receiving a packet involves a context switch in the operating system, which takes a
finite time.
2.Propagationdelay:
After the packet is transmitted to the transmission medium, it has to go through the medium to
reach the destination. Hence the time taken by the last bit of the packet to reach the destination
is called propagation delay.
3.Queueingdelay:
Let the packet is received by the destination, the packet will not be processed by the destination
immediately. It has to wait in a queue in something called a buffer. So, the amount of time it
waits in queue before being processed is called queueing delay.
In general, we can’t calculate queueing delay because we don’t have any formula for that.
This delay depends upon the following factors:
If the size of the queue is large, the queuing delay will be huge. If the queue is empty there will
be less or no delay.
If more packets are arriving in a short or no time interval, queuing delay will be large.
The less the number of servers/links, the greater is the queuing delay.
4.Processingdelay:
Now the packet will be taken for the processing which is called processing delay.
Time is taken to process the data packet by the processor that is the time required by intermediate
routers to decide where to forward the packet, update TTL, perform header checksum
calculations.
D. S. R 3
CN UNIT-1
It also doesn’t have any formula since it depends upon the speed of the processor and the speed
of the processor varies from computer to computer.
LOSS:
Packet loss describes lost pieces of data traveling through a network, but failing to reach
its destination. Packet loss occurs when network congestion, hardware issues, software
bugs, and a number of other factors cause dropped packets during data transmission.
Packet loss sits alongside the trio of two other major network performance
complications: latency, and jitter.
In any network environment, data is sent and received via different devices across the
network in small units called packets. This applies to everything you do on the internet,
from emailing, uploading or downloading images or files, browsing, streaming, gaming –
to voice and video communication.
Your network's Transmission Control Protocol (TCP) divides data files into efficiently
sized pieces for routing, then each piece is separately numbered and identified with the
destination’s internet address. Each individual packet may travel a different route, and
when they have arrived, they are restored to the original file by the TCP at the receiving
end.
Data communication comprises two words: Data and Communication. Data can be anything text,
images, audio, videos and multimedia whereas communication is an act of sending and receiving
data. Data communication refers to the exchange of data between two or more networked or
connected devices.
D. S. R 4
CN UNIT-1
When your network's traffic hits its maximum limit, packets are discarded, and those packets lost
have to queue and wait to be delivered. Fortunately, most software is designed to either
automatically retrieve and resend those discarded packets or slow down transfer speed.
Network hardware problems - The speed with which hardware becomes outdated or redundant
these days is another major problem for your network. Hardware such as firewalls, routers, and
network switches consume a lot of power, and can considerably weaken network signals.
Sometimes organizations overlook the need to update hardware during expansions or mergers and
this can contribute to packet loss or connectivity outages.
Software bugs - Closely related to faulty hardware is a buggy software running on the network
device. Bugs or glitches in your system can sometimes be responsible for disrupting network
performance and preventing the delivery of packets. Hardware reboots and patches may fix bugs.
Overtaxed devices - When a network is operating at a higher capacity than it was designed to
handle, it weakens and becomes unable to process packets, and drops them. Most devices have
built-in buffers to assign packets to holding patterns until they can be sent.
Wi-fi packet loss vs wireless packet loss - Your internet connection has a significant effect on
packet loss. As a rule, wireless networks experience more issues with packet loss than wired
networks. Radio frequency interference, weaker signals, distance and physical barriers like walls
can all cause wireless networks to drop packets. With wired networks, faulty cables can be the
culprit, impeding signal flow through the cable.
Security threats - If you’re noticing unusually high rates of packet drop, the problem could be a
security breach. Cybercriminal’s hack into your router and instruct it to drop packets. They can
also execute a denial-of-service attack (DoS), preventing legitimate users from accessing files,
emails, or online accounts by flooding the network with too much traffic to handle. Packet loss
can be difficult to fix during a full-blown security.
Deficient infrastructure - This highlights the importance of a comprehensive network monitoring
solution. Some out-of-packet monitoring tools were not engineered for the job they’ve been
assigned to do and have limited functionality.
It is important to note that there is no options for 100% prevention of packet loss, meaning there can only
be a reduction of packet loss stemming from preventative measures, but zero packet loss is impossible. This
is because the causes of packet loss, such as an overloaded system, can never be completely eliminated.
Systems and networks keep growing larger and larger, so engineers and IT staff can only do their best to
address the increasing problem.
D. S. R 5
CN UNIT-1
Updating your operating system (OS) and your most used programs will also help. The most recent version
of an OS is less likely to have bugs, which means there is a lower likelihood of packet loss. Lean on the
hard work of the dozens, if not hundreds, of engineers working for software vendors such as Apple,
Microsoft, and Mozilla, who fix errors on an ongoing basis to improve your computing experience.
5. Replace old hardware
Sometimes older hardware can be an issue. This goes for employee endpoints as well as the firewalls,
network switches, and routers that make up your network infrastructure. Determine whether an older and
possibly faulty piece of hardware on the network is causing packet loss and replace it with a new one.
6. Use QoS settings
Quality of service (QoS) settings help manage packet loss by organizing network resources. QoS
settings will assign more network traffic to the places that can best accommodate more resource-intensive
data, such as voice and video.
Switch:
A switch is a hardware device in a network that connects other devices, like computers
and servers. It helps multiple devices share a network without their data interfering with
each other.
A switch works like a traffic cop at a busy intersection.
When a data packet arrives, the switch decides where it needs to go and sends it through
the right port.
Some data packets come from devices directly connected to the switch, like computers
or VoIP phones. Other packets come from devices connected through hubs or routers.
switching is the process of transferring data packets from one device to another in a
network, or from one network to another, using specific devices called switches.
Switching takes place at the Data Link layer of the OSI Model. This means that after the
generation of data packets in the Physical Layer, switching is the immediate next process
in data communication
Message Switching: This is an older switching technique that has become obsolete. In message
switching technique, the entire data block/message is forwarded across the entire network thus,
making it highly inefficient.
Circuit Switching: In this type of switching, a connection is established between the source and
destination beforehand. This connection receives the complete bandwidth of the network until
the data is transferred completely.
This approach is better than message switching as it does not involve sending data to the entire
network, instead of its destination only.
Packet Switching
Packet switching is a method of transferring data over a network in the form of packets. For better
efficiency and for a faster transfer of information we break the data into small pieces, or small
“packets” of variable length using store and forward operations.
Each time when a device sends a file to another device, the information is broken down into packets
to determine the most efficient route for sending the data across the required network over a time
period.
D. S. R 6
CN UNIT-1
Example: 5 MB file is divided into small packets with a packet header which has an origin IP
address and a destination IP address with the entire data file and sequence number.
This is one of the most basic types of packets switching where multiple packets are individually
routed. Here, each packet does carry complete routing information but has different paths of
transmission. Packets belonging to one flow can take different routes to arrive at different
destinations, which can result in the packets arriving at the destination being out of order. It has
no connection set up hence reliable delivery has to be provided by end systems with additional
protocols. Connectionless packet switching is also known as Datagram switching.
D. S. R 7
CN UNIT-1
D. S. R 8
CN UNIT-1
Often they do not contain more than one subnet and are generally controlled by a single
administrator. The communication medium used for LAN is twisted pair, coaxial cable, etc, and
is build with less costly or inexpensive hardware such as hubs, network adapters, and ethernet
cables.
The data is carried at an extremely accelerated rate in the Local Area Network with added higher
security. It principally works on private IP addresses and does not include heavy routing. LAN can
be wired, wireless, or in both styles at once.
D. S. R 9
CN UNIT-1
1
D. S. R
0
CN UNIT-1
need to be dependent on physical cables and wires as much and can organize their spaces more
effectively.
Reference models
OSI Model
OSI or Open System Interconnection model was developed by International Standards
Organization (ISO). It gives a layered networking framework that conceptualizes how
communication should be done between heterogeneous systems. It has seven
interconnected layers.
The seven layers of the OSI Model are a physical layer, data link layer, network layer,
transport layer, session layer, presentation layer, and application layer.
The hierarchy is depicted in the following figure −
1
D. S. R
1
CN UNIT-1
TCP / IP MODEL
TCP stands for Transmission Control Protocol, while IP stands for Internet Protocol. It is a suite
of protocols for communication structured in four layers. It can be used for communication over
the internet as well as for private networks.
The four layers are application layer, transport layer, internet layer and network access layer, as
depicted in the following diagram −
defining the protocols for successful user interaction. An excellent example of this layer is
that of web browsers.
Application layer protocols allow the software to direct data flow and present it to the user.
Some of the known protocols include Hypertext Transfer Protocol (HTTP), Simple Mail
Transfer Protocol (SMTP), and File Transfer Protocol (FTP).
Key functions:
The application layer provides user interfaces (UI) that are key to user interaction
Supports a variety of applications such as e-mail and remote file transfer
In summary, layer 7 ensures effective communication between applications on different computing
systems and networks.
6. Presentation layer
The presentation layer is often referred to as a syntax or translation layer as it translates the
application data into a network format. This layer also encrypts and decrypts data before
transmitting it over the network.
For instance, layer 6 encrypts data from the application and decrypts it at the recipient’s
end, ensuring secure data transmission. Moreover, this layer is known to compress data
received from layer 7 to reduce the overall size of the data transferred.
Key functions:
Performs data translation based on the application’s data semantics
Encrypts and decrypts sensitive data transferred over communication channels
Performs data compression to reduce the number of bits in exchanged data
In summary, layer 6 ensures that the communicated information is in the desired format as
required by the receiving application.
5. Session layer
The session layer establishes a communication session between communicating entities.
The session is maintained at a sufficient time interval to ensure efficient data transmission
and avoid wasting computing resources.
This OSI layer is also responsible for data synchronization to maintain smooth data flow.
This implies that in situations where large volumes of data are sent at once, layer 5 can
break down the data into smaller chunks by adding checkpoints.
For example, let’s say you want to send a 500-page document to another person. In this
case, this layer can add checkpoints at 50 or 100 pages. This is in case a document transfer
is interrupted due to network or system failure. Once the system failure issue is resolved,
the document transfer resumes from the last checkpoint. Such a system saves time by not
restarting the file transfer from the beginning.
Key functions:
Opens maintains, and closes communication sessions
Enables data synchronization by adding checkpoints to data streams
In summary, layer 5 establishes, maintains, synchronizes, and terminates sessions between
end-user applications.
1
D. S. R
3
CN UNIT-1
4. Transport layer
The transport layer allows safe message transfer between the sender and the receiver. It
divides the data received from the layer above into smaller segments. It also reassembles
the data at the receiver side to allow the session layer to read it.
Layer 4 performs two critical functions: flow control and error control. Flow control
implies regulating data transfer speeds. It ensures that the communicating device with a
good network connection does not send data at higher rates, which is difficult for devices
with slower connections to handle.
Error control refers to the error-checking functionality to ensure the completeness of data.
In incomplete data cases, this layer requests the system to resend the incomplete data.
Examples of transport layer protocols include transmission control protocol (TCP) and user
datagram protocol (UDP).
Key functions:
Ensures completeness of each message exchanged between source and destination
Maintains proper data transmission through flow control and error control
Performs data segmentation and reassembling of data
In summary, layer 4 is responsible for transmitting an entire message from a sender
application to a receiver application.
3. Network layer
The network layer enables the communication between multiple networks. It receives data
segments from the layer above, further broken down into smaller packets at the sender side.
On the receiver side, this layer reassembles the data together.
The network layer also handles routing functionality, wherein the data transmission is
accomplished by choosing the best possible route or path that connects different networks
and ensures efficient data transfer. This network layer uses internet protocol (IP) for data
delivery.
Key functions:
Handles routing to recognize suitable routes from sender to receiver
Performs logical addressing that assigns unique names to each device operating over the
network
In summary, layer 3 is responsible for dividing segmented data into network packets,
reassembling them at the recipient’s side, and identifying the shortest yet most suitable and
secure path for transmitting data packets.
2. Data link layer
The data link layer transmits data between two nodes that are directly connected or are
operating over the same network architecture. Typically, this layer takes data packets from
layer 3 and breaks them down into frames before sending them to the destination.
Layer 2 is divided into two sub-layers: media access control (MAC) and logical link control
(LLC). The MAC layer encapsulates data frames transmitted through the network
1
D. S. R
4
CN UNIT-1
connecting media such as wires or cables. In situations where such data transmission fails,
LLC helps manage packet retransmission.
The well-known data link layer protocol includes the Address Resolution Protocol (ARP)
that translates IP addresses to MAC addresses to establish communication between systems
whose addresses vary in bit length (32 bits vs. 48 bits).
Key functions:
Detects damaged or lost frames and retransmits them
Performs framing where data received from layer 3 is further subdivided into smaller units
called frames
In summary, layer 2 is responsible for setting up and terminating physical connections
between participating network nodes.
1. Physical layer
The last OSI layer is the physical layer that manages physical hardware and network components
such as cables, switches, or routers that transmit data.
In the context of data, layer 1 transmits data in the form of ones and zeros. Technically, this layer
picks up bits from the sender end, encodes them into a signal, sends the signal over the network,
and decodes the signal at the receiver end. Thus, without layer 1, communicating data bits across
network devices through physical media is not possible.
Key functions:
Synchronizes data bits
Enables modulation (conversion of a signal from one form to another for data transmission)
Defines data transmission rate (bits/sec)
1
D. S. R
5
CN UNIT-1
medium depends on factors like distance, speed, and interference. In this article, we will discuss
the transmission media.
Transmission Media is broadly classified into the following types:
1. Guided Media
Guided Media is also referred to as Wired or Bounded transmission media. Signals being
transmitted are directed and confined in a narrow pathway by using physical links.
Features:
High Speed
Secure
Used for comparatively shorter distances
1
D. S. R
6
CN UNIT-1
Shielded Twisted Pair (STP): This type of cable consists of a special jacket (a copper braid
covering or a foil shield) to block external interference. It is used in fast-data-rate Ethernet and
in voice and data channels of telephone lines.
Advantages of Shielded Twisted Pair
Better performance at a higher data rate in comparison to UTP
Eliminates crosstalk
Comparatively faster
Disadvantages of Shielded Twisted Pair
Comparatively difficult to install and manufacture
More expensive
Bulky
Coaxial Cable
It has an outer plastic covering containing an insulation layer made of PVC or Teflon and 2
parallel conductors each having a separate insulated protection cover. The coaxial
cable transmits information in two modes: Baseband mode (dedicated cable bandwidth) and
Broadband mode (cable bandwidth is split into separate ranges). Cable TVs and analog television
networks widely use Coaxial cables.
1
D. S. R
7
CN UNIT-1
1
D. S. R
8
CN UNIT-1
It is a line-of-sight transmission i.e., the sending and receiving antennas need to be properly
aligned with each other. The distance covered by the signal is directly proportional to the height
of the antenna. Frequency Range:1GHz – 300GHz. Micro waves are majorly used for mobile
phone communication and television distribution.
Infrared
Infrared waves are used for very short distance communication. They cannot penetrate through
obstacles. This prevents interference between systems. Frequency Range:300GHz – 400THz. It
is used in TV remotes, wireless mouse, keyboard, printer, etc.
1
D. S. R
9
CN UNIT-1
Frequency range:
Frequency range: 3 Frequency range: 1
Frequency range 300 GHz to 400
KHz to 1GHz. GHz to 300 GHz.
GHz.
Attenuation is
Attenuation Attenuation is high. Attenuation is low.
variable.
Setup and usage Cost Setup and usage Cost Usage Cost is very
Usage Cost
is moderate. is high. less.
These are used in long These are used in long These are not used
Communication distance distance in long distance
communication. communication. communication.
2
D. S. R
0
CN UNIT-1
When we look at a fire, we can feel the heat from it and see it because it emits visible light
and Infrared energy. The human body also emits heat but only in the form of Infrared light.
Instruments such as night-vision goggles and Infrared cameras can capture Infrared light.
Sun is the biggest source of Infrared radiation. Hence, it causes a lot of interference in
Infrared communication. One most important point about Infrared rays is that these rays
cannot penetrate through walls. Hence, the applications of Infrared rays lie within a
contained space.
So, how does the data transfer take place use this Infrared light?
Let us apply for Infrared data transfer and see how it is happening. The most used
application is the "TV Remote control". When we press a button on the remote, how is it
changing the channel on the TV?
An Infrared Light emitting diode is embedded into the TV remote and an IR detector is
inserted into the TV. This detector converts the Infrared light signal from the remote
and converts it into an electrical signal. Hence, the remote acts as a transmitter and the TV
as a receiver.
All the buttons on a TV remote are connected to a microprocessor which generates a unique
binary code for each button pressed. All these codes will be of the same length. The LED flashes
on and off according to the generated pattern of the pressed button.
The detector on the TV will be pre-programmed to interpret the binary codes and perform the
requested actions. These binary codes vary from company to company and device to device, which
is why we can't control a TV with a remote that doesn't belong to it. Although, a universal remote
has all the codes programmed into it, which is why it can control any TV.
If there is some object between your remote and the TV, the detector on the TV might not be able
to get the Infrared rays from the remote as these rays can't penetrate through objects. New
technology led to various changes in Remote control, like using Radio waves instead of Infrared,
mobile apps, voice control, etc.
2
D. S. R
1
CN UNIT-1
2. Radio waves
Like Infrared radiation, Radio waves are also a part of electromagnetic radiation. These waves
have the longest wavelengths, from 1mm to 100km in the spectrum. The name itself has Radio.
A Radio is one of the thousands of wireless technologies that use Radio waves for communication.
A Radio is the simplest example of Radio wave communication. Other examples Bluetooth
headsets, TV Broadcasts. Frequency range: 300GHz to 3kHz.
Like in Infrared communication, there will be a Radio wave transmitter and a receiver. The
information can be from audio, video, sound, and textual data. Suppose a person is using Radio,
sine waves are transmitted from it, and if another person uses a TV, it also broadcasts sine waves.
Every single Radio signal will have a different frequency for the sine waves.
This is the flow:
Transmitter (Sender's side):
Information -> Sine waves -> Radio waves -> Antenna
The information in any form is encoded into sine waves and is transmitted into the air by radiating
the waves through an Antenna.
Receiver (Destination):
Antenna -> Radio waves -> Sine waves
The Antenna on the receiver's side captures the Radio waves and decodes the information from
the sine waves.
To transmit Radio signals, there is a need for a transmitting antenna on the transmitter's side and a
receiving antenna at the receiver's side.
Advantages:
Radio waves are the best choice for large-distance communications.
These waves can also penetrate through obstacles.
These waves are Omnidirectional which means they can be transmitted in all directions.
Low cost.
Disadvantages:
Not very secure due to the large distances
Interference with other Radio signals
2
D. S. R
2
CN UNIT-1
3. Microwaves
These waves are also a part of electromagnetic radiation. The micro indicates that these waves
have short wavelengths from 1 meter to 1 millimeter. These are high-frequency waves->
Frequency range: 300MHz to 300GHz. These waves fall between Radio waves and Infrared
waves.
These waves are used for point-to-point communication as it only transmits data in one direction.
These can transmit all kinds of data, from audio to video. These waves can be used to transmit
thermal energy too.
Applications:
Cooking food in Microwave ovens, Popcorn machines.
TV distributions
Capturing the speed of the vehicle
Phone channels to a mobile phone
RADAR, Satellite communications
Advantages:
The speed of transmission is very fast
We can reduce antenna size due to high frequency
Lower power consumption
Supports larger bandwidth
Can easily pass through the Ionosphere.
Disadvantages:
Expensive
Not effective in bad weather conditions
Occupies more space
Interference
Harmful radiation
2
D. S. R
3