CN Unit 1
CN Unit 1
Network Hardware
The computer networks can be discussed in two dimensions
i) Transmission technology ii) Scale
There are two types of transmission technology that are in widespread use:
Broadcast links
Point-to-point links.
Point-to-point links connect individual pairs of machines. To go from the source to the destination
on a network made up of point-to-point links, short messages, called packets in certain contexts,
may have to first visit one or more intermediate machines. Often multiple routes, of different
lengths, are possible, so finding good ones is important in point-to-point networks. Point-to-point
transmission with exactly one sender and exactly one receiver is sometimes called unicasting.
On a broadcast network, the communication channel is shared by all the machines on the network;
packets sent by any machine are received by all the others. An address field within each packet
specifies the intended recipient. Upon receiving a packet, a machine checks the address field. If the
packet is intended for the receiving machine, that machine processes the packet; if the packet is
intended for some other machine, it is just ignored. A wireless network is a common example of a
broadcast link, with communication shared over a coverage region that depends on the wireless
channel and the transmitting machine.
When a packet with this code is transmitted, it is received and processed by every machine on the
network. This mode of operation is called broadcasting. Some broadcast systems also support
transmission to a subset of the machines, which known as multicasting.
Scale
An alternative criterion for classifying networks is by scale. Distance is important as a
classification metric because different technologies are used at different scales.
Personal Area Network
PANs (Personal Area Networks) let devices communicate over the range of a person. A common
example is a wireless network that connects a computer with its peripherals. Almost every
computer has an attached monitor, keyboard, mouse, and printer. Without using wireless, this
connection must be done with cables. some companies have designed a short-range wireless
network called Bluetooth to connect these components without wires. The idea is that if our
devices have Bluetooth, then we need no cables. You just put them down, turn them on, and they
work together.
In the simplest form, Bluetooth networks use the master-slave paradigm. The system unit (the PC)
is normally the master, talking to the mouse, keyboard, etc., as slaves. The master tells the slaves
what addresses to use, when they can broadcast, how long they can transmit, what frequencies they
can use, and so on.
Network Software
Protocol Hierarchies
To reduce their design complexity, most networks are organized as a stack of layers or levels, each
one built upon the one below it. The number of layers, the name of each layer, the contents of each
layer, and the function of each layer differ from network to network. The purpose of each layer is
to offer certain services to the higher layers while shielding those layers from the details of how
the offered services are actually implemented. In a sense, each layer is a kind of virtual machine,
offering certain services to the layer above it. When layer n on one machine carries on a
conversation with layer n on another machine, the rules and conventions used in this conversation
are collectively known as the layer n protocol. Basically, a protocol is an agreement between the
communicating parties on how communication is to proceed. Between each pair of adjacent layers
is an interface. The interface defines which primitive operations and services the lower layer
makes available to the upper one.
A set of layers and protocols is called a network architecture. A list of the protocols used by a
certain system, one protocol per layer, is called a protocol stack.
Design Issues for the Layers
Reliability is the design issue of making a network that operates correctly even though it is made
up of a collection of components that are themselves unreliable.
Mechanism for finding errors in received information uses codes for error detection. Information
that is incorrectly received can then be retransmitted until it is received correctly. More powerful
codes allow for error correction, where the correct message is recovered from the possibly
incorrect bits that were originally received.
Another issue is finding a working path through a network. Often there are multiple paths between
a source and destination, and in a large network, there may be some links or routers that are
broken. The network should automatically make this decision. This topic is called routing.
Since there are many computers on the network, every layer needs a mechanism for identifying the
senders and receivers that are involved in a particular message. This mechanism is called
addressing or naming, in the low and high layers.
The network should continue to work well even when the network gets large. It is said to be
scalable. Another design issue is resource allocation. Networks provide a service to hosts from
their underlying resources, such as the capacity of transmission lines. To do this well, they need
mechanisms that divide their resources so that one host does not interfere with another too much.
A service is formally specified by a set of primitives (operations) available to user processes to
access the service. These primitives tell the service to perform some action or report on an action
taken by a peer entity.
Protocol Layering
In networking, a protocol defines the rules that both the sender and receiver and
all intermediate devices need to follow to be able to communicate effectively.
A protocol provides a communication service that the process use to exchange
messages.
When communication is simple, we may need only one simple protocol.
When the communication is complex, we may need to divide the task between
different layers, in which case we need a protocol at each layer, or protocol
layering.
Protocol layering is that it allows us to separate the services from the
implementation.
A layer needs to be able to receive a set of services from the lower layer and to
give the services to the upper layer.
Any modification in one layer will not affect the other layers.
It is responsible for transmitting frames from one node to the next node.
The other responsibilities of this layer are
Framing - Divides the stream of bits received into data units called frames.
Physical addressing – If frames are to be distributed to different systems on the
network , data link layer adds a header to the frame to define the sender and
receiver.
Flow control- If the rate at which the data are absorbed by the receiver is less
than the rate produced in the sender, t h e Data link layer imposes a flow
ctrl mechanism.
Error control- Used for detecting and retransmitting damaged or lost frames and
to prevent duplication of frames. This is achieved through a trailer added at the
end of the frame.
Medium Access control -Used to determine which device has control over the
link at any given time.
3.NETWORK LAYER
This layer is responsible for the delivery of packets from source to destination.
It determines the best path to move data from source to the destination based on the
network conditions, the priority of service, and other factors.
The other responsibilities of this layer are
Logical addressing - If a packet passes the network boundary, we need another
addressing system for source and destination called logical address. This
addressing is used to identify the device on the internet.
Routing – Routing is the major component of the network layer, and it
determines the best optimal path out of the multiple paths from source to the
destination.
4.TRANSPORT LAYER
5.SESSION LAYER
6.PRESENTATION LAYER
It is concerned with the syntax and semantics of information exchanged between two
systems.
The other responsibilities of this layer are
Translation – Different computers use different encoding system, this layer is
responsible for interoperability between these different encoding methods. It will
change the message into some common format.
Encryption and decryption-It means that sender transforms the original
information to another form and sends the resulting message over the n/w. and
vice versa.
Compression and expansion-Compression reduces the number of bits contained
in the information particularly in text, audio and video.
7.APPLICATION LAYER
This layer enables the user to access the network. It handles issues such as network
transparency, resource allocation, etc. This allows the user to log on to remote user.
The other responsibilities of this layer are
FTAM (File Transfer, Access, Management) - Allows user to access files in a
remote host.
Mail services - Provides email forwarding and storage.
Directory services - Provides database sources to access information about
various sources and objects.
TCP / IP Protocol
The TCP/IP architecture is also called as Internet architecture.
It is developed by the US Defense Advanced Research Project Agency (DARPA)
for its packet switched network (ARPANET).
TCP/IP is a protocol suite used in the Internet today.
It is a 4-layer model. The layers of TCP/IP are
1. Application layer
2. Transport Layer (TCP/UDP)
3. Internet Layer
4. The Host - to - Network Layer
APPLICATION LAYER
An application layer incorporates the function of top three OSI layers. An
application layer is the topmost layer in the TCP/IP model.
It is responsible for handling high-level protocols, issues of representation.
This layer allows the user to interact with the application.
When one application layer protocol wants to communicate with another
application layer, it forwards its data to the transport layer.
Protocols such as FTP, HTTP, SMTP, POP3, etc running in the application layer
provides service to other program running on top of application layer
TRANSPORT LAYER
The transport layer is responsible for the reliability, flow control, and correction
of data which is being sent over the network.
The two protocols used in the transport layer are User Datagram protocol and
Transmission control protocol.
o UDP – UDP provides connectionless service and end-to-end delivery of
transmission. It is an unreliable protocol as it discovers the errors but not
specify the error.
o TCP – TCP provides a full transport layer services to applications. TCP is
a reliable protocol as it detects the error and retransmits the damaged
frames.
INTERNET LAYER
The internet layer is the second layer of the TCP/IP model.
An internet layer is also known as the network layer.
The main responsibility of the internet layer is to send the packets from any
network, and they arrive at the destination irrespective of the route they take.
Internet layer handle the transfer of information across multiple networks through
router and gateway .
IP protocol is used in this layer, and it is the most significant part of the entire
TCP/IP suite.
Here the black dots represent telephone switching offices, each of which was connected to
thousands of telephones. These switching offices were, in turn, connected to higher-level
switching offices (toll offices), to form a national hierarchy with only a small amount of
redundancy. The vulnerability of the system was that the destruction of a few key toll offices
could fragment it into many isolated islands.
In 1957, a single defense research organization, ARPA, the Advanced Research Projects Agency
was created. ARPA had no scientists or laboratories; in fact, it had nothing more than an office and
a small (by Pentagon standards) budget. It did its work by issuing grants and contracts to
universities and companies whose ideas looked promising to it. Later, suggested building a packet-
switched subnet, connecting each host to its own router.
The subnet would consist of minicomputers called IMPs (Interface Message Processors)
connected by 56-kbps transmission lines. For high reliability, each IMP would be connected to at
least two other IMPs. The subnet was to be a datagram subnet, so if some lines and IMPs were
destroyed, messages could be automatically rerouted along alternative paths. Each node of the
network was to consist of an IMP and a host, in the same room, connected by a short wire. A host
could send messages of up to 8063 bits to its IMP, which would then break these up into packets of
at most 1008 bits and forward them independently toward the destination. Each packet was
received in its entirety before being forwarded, so the subnet was the first electronic store and-
forward packet-switching network.
During the 1980s, additional networks, especially LANs, were connected to the ARPANET. As
the scale increased, finding hosts became increasingly expensive, so DNS (Domain Name
System) was created to organize machines into domains and map host names onto IP addresses.
Transmission Media
o Transmission media is a communication channel that carries the information from
the sender to the receiver.
o Data is transmitted through the electromagnetic signals.
o The main functionality of the transmission media is to carry the information in
the form of bits (Either as Electrical signals or Light pulses).
o It is a physical path between transmitter and receiver in data communication.
o The characteristics and quality of data transmission are determined by the
characteristics of medium and signal.
o Transmission media is of two types : Guided Media (Wired) and UnGuided
Media (wireless).
o In guided (wired) media, medium characteristics are more important whereas, in
transmitted one due to the transmission impairment. The quality of the signals
will get destroyed due to transmission impairment.
o Interference: An interference is defined as the process of disrupting a signal
GUIDED MEDIA
It is defined as the physical medium through which the signals are transmitted.
It is also known as Bounded media.
Types of Guided media: Twisted Pair Cable, Coaxial Cable, Fibre Optic Cable
Twisted pair is a physical media made up of a pair of cables twisted with each
other.
A twisted pair cable is cheap as compared to other transmission media.
Installation of the twisted pair cable is easy, and it is a lightweight cable.
The frequency ranges for twisted pair cable is from 0 to 3.5KHz.
A twisted pair consists of two insulated copper wires arranged in a regular spiral
pattern.
Advantages :
o It is cheap.
o Installation of the unshielded twisted pair is easy.
o It can be used for high-speed LAN.
Disadvantage:
o This cable can only be used for shorter distances because of attenuation.
A shielded twisted pair is a cable that contains the mesh surrounding the wire that allows
the higher transmission rate.
Advantages :
o The cost of the shielded twisted pair cable is not very high and not very low.
o Installation of STP is easy.
o It has higher capacity as compared to unshielded twisted pair cable.
o It has a higher attenuation.
o It is shielded that provides the higher data transmission rate.
Disadvantages:
o It is more expensive as compared to UTP and coaxial cable.
o It has a higher attenuation rate.
COAXIAL CABLE
o The name of the cable is coaxial as it contains two conductors parallel to each
other.
o It has a higher frequency as compared to Twisted pair cable.
o The inner conductor of the coaxial cable is made up of copper, and the outer
conductor is made up of copper mesh.
o The middle core is made up of non-conductive cover that separates the inner
conductor from the outer conductor.
o The middle core is responsible for the data transferring whereas the copper mesh
prevents from the EMI(Electromagnetic interference).
o Common applications of coaxial cable are Cable TV networks and traditional
Ethernet LANs.
Coaxial Cable Standards
Coaxial cables are categorized by their Radio Government (RG) ratings.
Each RG number denotes a unique set of physical specifications, including the
wire gauge of the inner conductor, the thickness and type of the inner insulator,
the construction of the shield, and the size and type of the outer casing.
Each cable defined by an RG rating is adapted for a specialized function.
o Fibre optic cable is a cable that uses electrical signals for communication.
o Fibre optic is a cable that holds the optical fibres coated in plastic that are used to
send the data by pulses of light.
o The plastic coating protects the optical fibres from heat, cold, electromagnetic
interference from other types of wiring.
o Fibre optics provide faster data transmission than copper wires.
Advantages:
o Greater Bandwidth
o Less signal attenuation
o Immunity to electromagnetic interference
o Resistance to corrosive materials
o Light weight
o Greater immunity to tapping
Disadvantages :
o Requires Expertise for Installation and maintenance
o Unidirectional light propagation.
o Higher Cost.
Multimode Propagation
Multimode is so named because multiple beams from a light source move through
the core in different paths.
How these beams move within the cable depends on the structure of the core.
Single-Mode Propagation
Single-mode uses step-index fiber and a highly focused source of light that limits
beams to a small range of angles, all close to the horizontal.
The single-mode fiber itself is manufactured with a much smaller diameter than
that of multimode fiber, and with substantially lower density (index of refraction).
The decrease in density results in a critical angle that is close enough to 90° to
make the propagation of beams almost horizontal.
In this case, propagation of different beams is almost identical, and delays are
negligible. All the beams arrive at the destination “together” and can be
recombined with little distortion to the signal.
UNGUIDED MEDIA
o An unguided transmission transmits the electromagnetic waves without using any
physical medium. Therefore it is also known as wireless transmission.
o In unguided media, air is the media through which the electromagnetic energy
can flow easily.
Unguided transmission is broadly classified into three categories : Radio Waves, Microwaves ,
Infrared
RADIO WAVES
o Radio waves are the electromagnetic waves that are transmitted in all the
directions of free space.
o Radio waves are omnidirectional, i.e., the signals are propagated in all the
directions.
o The range in frequencies of radio waves is from 3Khz to 1Ghz.
o In the case of radio waves, the sending and receiving antenna are not aligned, i.e.,
the wave sent by the sending antenna can be received by any receiving antenna.
o An example of the radio wave is FM radio.
Terrestrial Microwave
o Terrestrial Microwave transmission is a technology that transmits the focused
beam of a radio signal from one ground-based microwave transmission antenna to
another.
o Microwaves are the electromagnetic waves having the frequency in the range
from 1GHz to 1000 GHz.
o Microwaves are unidirectional as the sending and receiving antenna is to be
aligned, i.e., the waves sent by the sending antenna are narrowly focused.
o In this case, antennas are mounted on the towers to send a beam to another
antenna which is km away.
o It works on the line of sight transmission, i.e., the antennas mounted on the
towers are at the direct sight of each other.
Satellite Microwave
o A satellite is a physical object that revolves around the earth at a known height.
o Satellite communication is more reliable nowadays as it offers more flexibility
than cable and fibre optic systems.
o We can communicate with any point on the globe by using satellite
communication.
o The satellite accepts the signal that is transmitted from the earth station, and it
amplifies the signal. The amplified signal is retransmitted to another earth station.
Advantages of Satellite Microwave:
o The coverage area of a satellite microwave is more than the terrestrial microwave.
o The transmission cost of the satellite is independent of the distance from the
centre of the coverage area.
o Satellite communication is used in mobile and wireless
communication applications.
o It is easy to install.
o It is used in a wide variety of applications such as weather forecasting, radio/TV
signal broadcasting, mobile communication, etc.
INFRARED WAVES
o An infrared transmission is a wireless technology used for communication over
short ranges.
o The frequency of the infrared in the range from 300 GHz to 400 THz.
o It is used for short-range communication such as data transfer between two cell
phones, TV remote operation, data transfer between a computer and cell phone
and devices that resides in the same closed area.
Characteristics of Infrared:
o It supports high bandwidth, and hence the data rate will be very high.
o Infrared waves cannot penetrate the walls. Therefore, the infrared communication
in one room cannot be interrupted by the nearby rooms.
o An infrared communication provides better security with minimum interference.
o Infrared communication is unreliable outside the building because the sun rays
will interfere with the infrared waves.