Computer Network Types & Components
Computer Network Types & Components
                                         1
     Examples:
         o   Home Wi-Fi networks: Connecting laptops, smartphones, and smart
             TVs to the internet.
         o   Public Wi-Fi hotspots: Available in cafes, airports, and hotels.
4. Metropolitan Area Network (MAN)
     Definition: A MAN is a network that connects users within a geographic area
      or region larger than that covered by a LAN but smaller than a WAN, such as
      a city.
     Examples:
         o   Citywide Wi-Fi networks: Provided by municipal governments.
         o   Cable TV networks: Often cover entire cities.
5. Wide Area Network (WAN)
     Definition: A WAN is a network that covers a broad area (e.g., any network
      whose communications links cross metropolitan, regional, or national
      boundaries).
     Examples:
         o   The Internet: The largest and most well-known example of a WAN.
         o   Banking networks: Connecting ATMs across a country or globally.
6. Virtual Private Network (VPN)
     Definition: A VPN extends a private network across a public network,
      allowing users to send and receive data as if their devices were connected to
      the private network.
     Examples:
         o   Corporate VPNs: Allow employees to securely connect to the
             company’s network from remote locations.
         o   Personal VPNs: Used by individuals to secure their internet connection
             and protect their online privacy.
                                         2
COMPONENTS OF DATA COMMUNICATION
Data communication refers to the exchange of data between devices through a
transmission medium. It involves several key components that ensure the successful
transmission and reception of data. Here are the main components of data
communication:
1. Message
      Definition: The message is the actual data or information that needs to be
       communicated from the sender to the receiver.
      Examples: Text, images, audio, video, or any combination of these formats.
2. Sender (Transmitter)
      Definition: The sender is the device or entity that initiates the data
       communication by sending the message to the receiver.
      Examples: Computers, smartphones, sensors, or any other digital device
       capable of transmitting data.
3. Receiver
      Definition: The receiver is the device or entity that receives the message sent
       by the sender.
      Examples: Computers, printers, smartphones, servers, or any other device
       capable of receiving data.
4. Transmission Medium
      Definition: The transmission medium is the physical or logical path through
       which the message travels from the sender to the receiver.
      Examples:
          o   Wired Media: Ethernet cables, fiber optic cables, coaxial cables.
          o   Wireless Media: Radio waves, microwaves, infrared, satellite signals.
5. Protocol
      Definition: A protocol is a set of rules and conventions that define how data
       is transmitted, received, and interpreted between devices. It ensures proper
                                          3
      synchronization, error detection, and communication between the sender and
      receiver.
     Examples:
         o    Internet Protocol (IP): Defines how data packets are sent across
              networks.
         o    Transmission Control Protocol (TCP): Ensures reliable transmission
              of data.
         o    Hypertext Transfer Protocol (HTTP): Used for transferring web
              pages.
6. Encoder
     Definition: The encoder converts the message into a form that can be
      transmitted over the chosen medium, typically from human-readable data into
      digital signals.
     Examples: Converting text into binary code, modulating an audio signal for
      transmission.
7. Decoder
     Definition: The decoder converts the received signal back into a format that
      can be understood by the receiver, such as converting digital signals back into
      human-readable data.
     Examples: Decoding a digital signal into text, demodulating a received
      signal.
8. Modem (Modulator-Demodulator)
     Definition: A modem is a device that modulates an analog carrier signal to
      encode digital information for transmission and demodulates it on the
      receiving end.
     Examples: DSL modems, cable modems, dial-up modems.
9. Topology
     Definition: Network topology refers to the arrangement of different elements
      (links, nodes, etc.) in a communication network.
                                         4
     Examples:
         o   Star Topology: All nodes are connected to a central hub.
         o   Ring Topology: Nodes are connected in a circular fashion.
         o   Bus Topology: All nodes are connected to a single communication line.
10. Error Detection and Correction
     Definition: These are techniques used to ensure data integrity during
      transmission. Error detection identifies errors in the transmitted data, while
      error correction attempts to fix them.
     Examples:
         o   Parity Check: A simple error detection method.
         o   Cyclic Redundancy Check (CRC): A more complex error detection
             method.
         o   Forward Error Correction (FEC): A method that corrects errors
             without retransmission.
11. Synchronization
     Definition: Synchronization refers to the coordination of timing between the
      sender and receiver to ensure that data is transmitted and received in the
      correct sequence and timing.
     Examples:
         o   Asynchronous Communication: Data is sent one byte at a time with
             start and stop bits.
         o   Synchronous Communication: Data is sent in a continuous stream
             with timing signals.
12. Network Interface Card (NIC)
     Definition: A NIC is a hardware component that connects a computer to a
      network and allows it to communicate with other devices.
     Examples: Ethernet cards, Wi-Fi adapters, Bluetooth adapters.
                                         5
13. Switches and Routers
         Switches: Devices that connect multiple devices on the same network and
          manage the data flow between them.
         ROUTERS: Devices that direct data packets between different networks,
          often connecting a local network to the internet.
          Here are the basic functions of a router in points:
  I.      Packet Forwarding: Directs packets between different networks based on
          their destination IP addresses.
 II.      Routing: Determines the best path for data to travel across networks using
          routing tables and protocols.
III.      Traffic Management: Manages and controls network traffic to optimize
          performance and reduce congestion.
IV.       Path Selection: Chooses the most efficient route for data based on current
          network conditions.
 V.       Segmentation: Divides larger networks into smaller segments to improve
          performance and security.
VI.       Error Reporting: Detects and reports errors or issues with network
          connections and routing.
VII.      Security: Implements security features such as firewalls and access control
          lists (ACLs) to protect the network from unauthorized access.
                                           6
Types of Distributed Processing:
  1. Client-Server Model:
        o   Description: The client-server model is a common form of distributed
            processing where clients request services or resources from a central
            server.
        o   Examples: Web applications, email systems, online banking.
  2. Peer-to-Peer (P2P) Model:
        o   Description: In P2P networks, all nodes are equal, and each node can
            act as both a client and a server. This model distributes tasks among
            peers without a central server.
        o   Examples:     File-sharing   networks   like   BitTorrent,   blockchain
            networks.
  3. Cloud Computing:
        o   Description: Cloud computing provides distributed processing through
            the internet. Resources like processing power, storage, and applications
            are provided as services over the cloud.
        o   Examples: Amazon Web Services (AWS), Microsoft Azure, Google
            Cloud Platform.
Examples of Distributed Processing Systems:
     Google’s MapReduce: A programming model for processing large data sets
      with a distributed algorithm on a cluster
         LINE CONFIGURATION
                                         7
In computer networks, "line configuration" refers to how the connections between
devices are established and organized. There are several types of line configurations,
each with its own characteristics and use cases:
   1. Point-to-Point Configuration:
         o   Description: In this setup, a direct connection exists between two
             devices. This is a simple, dedicated connection between two nodes,
             which can be either physical or logical.
         o   Examples: A direct cable between two computers or a dedicated leased
             line.
   2. Point-to-Multipoint Configuration:
         o   Description: In this arrangement, one central device (the hub)
             communicates with multiple devices (the spokes). The central device
             manages communication with all the connected devices.
         o   Examples: A wireless access point connecting to multiple devices or a
             satellite link where one satellite communicates with multiple ground
             stations.
   3. Multipoint Configuration:
         o   Description: Multiple devices share a common communication
             channel. Each device can potentially communicate with any other
             device on the same channel.
         o   Examples: A bus network topology in which multiple computers are
             connected to a single communication line.
   4. Mesh Configuration:
         o   Description: Each device is connected to every other device in the
             network, providing multiple paths for data to travel.
         o   Examples: A full mesh network where every node is interconnected,
             often used in high-availability systems.
   5. Hybrid Configuration:
         o   Description: Combines elements of different line configurations to
             meet specific needs. For example, a star-bus network combines a star
             topology with a bus topology.
                                          8
     o   Examples: A large office network that uses a star topology for internal
         connections and a bus topology for connecting multiple star networks.
             TOPOLOGY IN COMPUTER NETWORK IN BRIEF
         Network topology refers to the physical or logical arrangement of
         devices and connections in a network. Here’s a brief overview of
         common topologies:
1. Bus Topology:
     o   Description: All devices are connected to a single central cable (the
         bus). Data sent by any device travels along the bus and is received by
         all other devices.
     o   Advantages: Simple and cost-effective for small networks.
     o   Disadvantages: A failure in the central bus can disrupt the entire
         network; performance degrades with increased traffic.
2. Star Topology:
     o   Description: All devices are connected to a central hub or switch. Data
         is sent from one device to the hub, which then distributes it to the
         intended recipient.
     o   Advantages: Easy to manage and troubleshoot; failure of one device
         does not affect the others.
     o   Disadvantages: Requires more cabling; failure of the central hub
         affects the entire network.
                                     9
3. Ring Topology:
     o   Description: Devices are connected in a circular fashion, with each
         device connected to two others, forming a ring. Data travels in one or
         both directions around the ring.
     o   Advantages: Data packet collisions are minimized; predictable
         performance with consistent delays.
     o   Disadvantages: A failure in any single connection can disrupt the entire
         network; more complex to install and manage.
4. Mesh Topology:
     o   Description: Each device is connected to every other device in the
         network. Can be fully or partially meshed.
     o   Advantages: High reliability and redundancy; multiple paths for data
         transmission.
     o   Disadvantages: Expensive and complex due to the large number of
         connections required.
                                     10
     o
5. Tree Topology:
     o   Description: A hybrid topology that combines characteristics of star
         and bus topologies. Groups of star-configured networks are connected
         to a central bus.
     o   Advantages: Scalable and hierarchical; easy to manage and expand.
     o   Disadvantages: Dependency on the central bus; failure in the bus can
         impact the entire network.
6. Hybrid Topology:
     o   Description: Combines two or more different topologies to leverage
         their strengths and meet specific needs.
     o   Advantages: Flexible and adaptable to various requirements; can
         balance cost and performance.
     o   Disadvantages: Can be complex to design and manage; may require
         careful planning and maintenance.
                                   11
             TRANSMISSION MODE
         Transmission mode in computer networks refers to the method by
         which data is sent over a network. It can be categorized based on the
         direction of data flow and the nature of the communication. Here are
         the main types:
         Based on Direction of Data Flow:
1. Simplex Mode:
     o   Description: Data flows in only one direction from sender to receiver.
         There is no feedback from the receiver to the sender.
     o   Examples: Keyboard to computer, or broadcast TV signals.
     o   Advantages: Simple and efficient for one-way communication.
2. Half-Duplex Mode:
     o   Description: Data can flow in both directions, but not simultaneously.
         Devices take turns sending and receiving data.
     o   Examples: Walkie-talkies, CB radios.
     o   Advantages: Allows two-way communication, although not at the
         same time.
     o   Disadvantages: Only one device can transmit at a time, which may
         cause delays.
3. Full-Duplex Mode:
     o   Description: Data can flow in both directions simultaneously. Both
         devices can send and receive data at the same time.
     o   Examples: Telephones, modern network connections (like Ethernet).
                                    12
     o   Advantages: Efficient two-way communication without delays.
     o   Disadvantages: Requires more complex signaling and management.
         Based on Nature of Communication:
1. Serial Transmission:
     o   Description: Data is transmitted one bit at a time over a single channel
         or wire.
     o   Examples: RS-232 serial ports, USB.
     o   Advantages: Simple wiring, and effective            for long-distance
         communication.
     o   Disadvantages: Slower compared to parallel transmission for high data
         rates.
2. Parallel Transmission:
     o   Description: Multiple bits are transmitted simultaneously over
         multiple channels or wires.
     o   Examples: Computer buses, printer connections.
     o   Advantages: Faster data transfer rates over short distances.
     o   Disadvantages: More complex wiring, and less effective over long
         distances due to signal degradation.
             OSI AND TCP/IP MODELS: LAYERS AND THEIR
              FUNCTIONS, IN BRIEF
         The OSI (Open Systems Interconnection) model and the TCP/IP
         (Transmission Control Protocol/Internet Protocol) model are two
         fundamental frameworks for understanding network communication.
         Here’s a brief overview of their layers and functions:
                                     13
         OSI Model (7 Layers):
                                     14
2. Data Link Layer (Layer 2):
     o   Function: Provides node-to-node data transfer and handles error
         correction and detection from the Physical layer. Manages MAC
         addresses and frames.
     o   Here are the basic functions of the Data Link Layer in points:
     o   Physical Addressing: Assigns and handles MAC addresses for devices
         on the network.
     o   Flow Control: Manages data flow between sender and receiver to
         prevent congestion.
     o   Media Access Control (MAC): Manages how data is placed on and
         received from the physical medium.
     o   Frame Sequencing: Ensures that frames are delivered in the correct
         order.
     o   Link Management: Establishes,            maintains,   and      terminates
         connections between devices.
     o   Examples: Ethernet, Wi-Fi, switches, and bridges.
3. Network Layer (Layer 3):
     o   Function: Determines the best path for data to travel across the network
         and handles logical addressing (IP addresses). Responsible for routing
         and forwarding packets.
     o   Here are the basic functions of the Network Layer in points:
     o   Routing: Determines the best path for data to travel across networks.
     o   Packet Forwarding: Moves packets from source to destination
         through routers.
     o   Path Determination: Chooses the optimal route for data transmission.
     o   Fragmentation and Reassembly: Breaks down large packets into
         smaller ones for transmission and reassembles them at the destination.
     o   Error Handling and Diagnostics: Provides error reporting and
         diagnostic information for network issues.
                                     15
     o   Traffic Control: Manages network traffic to prevent congestion and
         ensure efficient data flow.
     o   Examples: IP (Internet Protocol), routers. Brouters (A bridge router or
         brouter is a network device that works as a bridge and as a router).
     o
                                     16
     o   Session Termination: Gracefully closes sessions once communication
         is complete, ensuring that all data is properly transmitted.
     o   Examples: support devices Firewalls and Gateways. Login and logout
         for Email in Google, Mobile to mobile call.
6. Presentation Layer (Layer 6):
     o   Function: Translates data between the application layer and the
         network. Ensures data is in a readable format and handles encryption,
         compression, and translation.
         Here are the basic functions of the Presentation Layer in points:
     o   Data Translation: Converts data between the application layer format
         and the network format.
     o   Data Encryption and Decryption: Secures data by encrypting it
         before transmission and decrypting it upon reception.
     o   Data Compression: Reduces the size of data to optimize network
         usage and speed up transmission.
     o   Character Encoding: Converts data into a standard character encoding
         (e.g., ASCII, Unicode) for consistency.
     o   Data Serialization: Converts complex data structures into a byte
         stream for transmission, and deserializes it back at the destination.
                                     17
     o   User Interface: Provides an interface for users to interact with network
         services and applications or Login to remote and log out to remote
         computer.
     o   Application Services: Offers network services such as email, file
         transfer, and web browsing.
     o   Resource Sharing: Facilitates access to and sharing of resources over
         the network, such as printers and files.
     o   Examples: HTTP, FTP, SMTP, DNS, Gateways and Firewalls.
1. Application Layer:
     o   Purpose: This layer handles high-level protocols and interacts with
         software applications to implement a communicating component.
     o   Functions: Protocols like HTTP, FTP, SMTP, and DNS operate here. It
         deals with application-specific functionalities, like web browsing,
         email, and file transfer.
2. Transport Layer:
                                     18
       o   Purpose: This layer ensures reliable data transfer between two devices
           in a network.
       o   Functions: The main protocols are TCP (Transmission Control
           Protocol) and UDP (User Datagram Protocol). TCP provides reliable,
           ordered, and error-checked delivery of a stream of data between
           applications, while UDP is faster but less reliable.
3. Internet Layer:
       o   Purpose: This layer is responsible for logical addressing and routing of
           data packets across networks.
       o   Functions: The IP (Internet Protocol) is the primary protocol in this
           layer, responsible for addressing and routing packets so they can travel
           across networks and reach their correct destinations. ICMP (Internet
           Control Message Protocol) and ARP (Address Resolution Protocol) are
           also part of this layer.
4. Network Access Layer (also known as the Link Layer or Data Link Layer):
       o   Purpose: This layer handles the physical transmission of data on the
           network.
       o   Functions: It manages the protocols for communication on the physical
           network, including how data is formatted for transmission over the
           hardware, error detection, and frame synchronization. Examples
           include Ethernet and Wi-Fi.
           Summary:
   Application Layer: High-level protocols (e.g., HTTP, FTP)
   Transport Layer: Data transfer (TCP, UDP)
   Internet Layer: Addressing and routing (IP)
   Network Access Layer: Physical transmission (Ethernet, Wi-Fi)
           The TCP/IP model is widely used because it forms the foundation of
           the internet and most modern networks.
                                       19
 MODEMS (MODULATOR-DEMODULATOR)
                                      20
         wave—such as its amplitude, frequency, or phase. This analog signal
         can then be transmitted over telephone lines, radio waves, or other
         analog mediums.
2. Demodulation:
      o Purpose: Converts the received analog signal back into digital data that
         can be understood by the receiving device.
      o How It Works: Upon receiving the analog signal, the modem
         demodulates it, extracting the original binary data from the modulated
         signal. This data is then passed to the computer or other digital devices.
                TYPES OF MODEMS:
1. Dial-up Modems:
      o Function: These were widely used in the early days of the internet.
         Dial-up modems connect to the internet via standard telephone lines.
      o Speed: Typically provides data transfer rates up to 56 Kbps.
      o Process: The modem dials a telephone number to establish a connection
         with an Internet Service Provider (ISP), and the connection is
         temporary.
 DTE-DCE Interface
  The DTE-DCE interface is a crucial concept in data communication, particularly
  in the context of serial communication. DTE stands for Data Terminal
  Equipment, and DCE stands for Data Circuit-terminating Equipment. This
  interface defines how data is transmitted between a computer or terminal (DTE)
  and a modem or another communication device (DCE).
                                       22
DTE-DCE Communication Process:
1. Connection Setup:
     o The DTE initiates a connection by sending a signal to the DCE.
     o The DCE responds, indicating its readiness to establish a
        communication link.
2. Data Transmission:
     o Once the connection is established, data is transmitted from the DTE to
        the DCE, which then relays it to the network or another device.
3. Connection Termination:
     o When the communication is complete, the DTE or DCE can terminate
        the connection, ending the data transmission session.
23