CN Unit 1
CN Unit 1
DS)
Course:B.Tech Sem-VI
Subject: CN Subject Code: BCS603
[Computer Network Notes-Unit-1]
Marketing and sales: – Computer networks services include bulletin boards and data banks.
are widely used in both marketing sales firms. A World Wide Web site offering the technical
going into bank. ISP is a company which provides internet connection to end
Teleconferencing: – With The help of user, but there are basically three levels of ISP. There are
3 levels of Internet Service Provider (ISP): Tier-1 ISP,
teleconferencing conferences are possible to
Tier-2 ISP, and Tier-3 ISP.
occur without the participants being in the same
place. Applications include simple text
conferencing, voice conferencing, and video
conferencing.
Cable Television:-Future Services provided by
cable television network can include video on
request, as well as the same information,
Tier-1 ISP:
OSI Model
o OSI stands for Open System Interconnection is a
reference model that describes how information from
a software application in one computer moves through a
physical medium to the software application in another
computer.
o OSI consists of seven layers, and each layer performs a
particular network function.
o OSI model was developed by the International
Organization for Standardization (ISO) in 1984, and it is
now considered as an architectural model for the inter-
computer communications.
o OSI model divides the whole task into seven smaller and
manageable tasks. Each layer is assigned a particular task.
Physical layer
o It establishes, maintains and deactivates the physical o It also provides flow control.
connection. o Media Access Control Layer
o It specifies the mechanical, electrical and procedural o A Media access control layer is a link
network interface specifications. between the Logical Link Control layer
and the network's physical layer.
o It is used for transferring the packets over
the network.
Functions of a Physical layer: o Physical Addressing: The Data link layer adds a header
o Line Configuration: It defines the way how two or more to the frame that contains a destination address. The frame
devices can be connected physically. is transmitted to the destination address mentioned in the
o Data Transmission: It defines the transmission mode header.
whether it is simplex, half-duplex or full-duplex mode o Flow Control: Flow control is the main functionality of
between the two devices on the network. the Data-link layer. It is the technique through which the
o Topology: It defines the way how network devices are constant data rate is maintained on both the sides so that
arranged. no data get corrupted. It ensures that the transmitting
o Signals: It determines the type of the signal used for station such as a server with higher processing speed does
transmitting the information. not exceed the receiving station, with lower processing
speed.
o Error Control: Error control is achieved by adding a
Data-Link Layer calculated value CRC (Cyclic Redundancy Check) that is
placed to the Data link layer's trailer which is added to the
message frame before it is sent to the physical layer. If any
error seems to occur, then the receiver sends the
acknowledgment for the retransmission of the corrupted
frames.
o Access Control: When two or more devices are connected
to the same communication channel, then the data link
layer protocols are used to determine which device has
control over the link at a given time.
Network Layer
Transport Layer
o It receives the data from the upper layer and converts them
into smaller units known as segments.
o This layer can be termed as an end-to-end layer as it
provides a point-to-point connection between source and
destination to deliver the data reliably.
The two protocols used in this layer are:
o Transmission Control Protocol
o It is a standard protocol that allows the systems to
communicate over the internet.
o It establishes and maintains a connection between
hosts.
o When data is sent over the TCP connection, then
the TCP protocol divides the data into smaller
units known as segments. Each segment travels
over the internet using multiple routes, and they arrive in different
orders at the destination.
o User Datagram Protocol
o User Datagram Protocol is a transport layer
protocol.
o It is an unreliable transport protocol as in this case
receiver does not send any acknowledgment when
the packet is received, the sender does not wait for
any acknowledgment.
Functions of Transport Layer:
o Service-point addressing: Computers run several
programs simultaneously due to this reason, the
transmission of data from source to the destination not only
from one computer to another computer but also from one
process to another process.
o Segmentation and reassembly: When the transport layer
receives the message from the upper layer, it divides the
message into multiple segments, and each segment is
assigned with a sequence number that uniquely identifies
each segment.
o Connection control: Transport layer provides two services
Connection-oriented service and connectionless service. A
connectionless service treats each segment as an individual
packet, and they all travel in different routes to reach the
destination.
o Flow control: The transport layer also responsible for
flow control but it is performed end-to-end rather than
across a single link.
o Error control: The transport layer is also responsible for
Error control. Error control is performed end-to-end rather
than across the single link. The sender transport layer
ensures that message reach at the destination without any
error.
Session Layer
o It is a layer 3 in the OSI model.
o The Session layer is used to establish, maintain and
synchronizes the interaction between communicating
devices.
o Dialog control: Session layer acts as a dialog controller o An application layer serves as a window for users and
that creates a dialog between two processes or we can say application processes to access network service.
that it allows the communication between two processes o It handles issues such as network transparency, resource
which can be either half-duplex or full-duplex. allocation, etc.
o Synchronization: Session layer adds some checkpoints o An application layer is not an application, but it performs
when transmitting the data in a sequence. the application layer functions.
o This layer provides the network services to the end-users.
Presentation Layer Functions of Application layer:
o File transfer, access, and management (FTAM): An
application layer allows a user to access the files in a
remote computer, to retrieve the files from a computer and
to manage the files in a remote computer.
o Mail services: An application layer provides the facility
for email forwarding and storage.
o Directory services: An application provides the distributed
database sources and is used to provide that global
information about various objects.
TCP/IP model
o The TCP/IP model was developed prior to the OSI
model.
o The TCP/IP model is not exactly similar to the OSI
model.
o The TCP/IP model consists of five layers: the
application layer, transport layer, network layer,
data link layer and physical layer.
ARP Protocol
Network Access Layer o ARP stands for Address Resolution Protocol.
o A network layer is the lowest layer of the TCP/IP o ARP is a network layer protocol which is used to find the
physical address from the IP address.
model.
o The two terms are mainly associated with the ARP
o A network layer is the combination of the Physical Protocol:
layer and Data Link layer defined in the OSI o ARP request: When a sender wants to know the
reference model. physical address of the device, it broadcasts the
o It defines how the data should be sent physically ARP request to the network.
through the network. o ARP reply: Every device attached to the network
o This layer is mainly responsible for the will accept the ARP request and process the
request, but only recipient recognize the IP
transmission of the data between two devices on
address and send back its physical address in the
the same network. form of ARP reply.
o The protocols used by this layer are Ethernet,ICMP Protocol
token ring, FDDI, X.25, frame relay. o ICMP stands for Internet Control Message Protocol.
o It is a mechanism used by the hosts or routers to send
Internet Layer notifications regarding datagram problems back to the
sender.
o A datagram travels from router-to-router until it reaches
o An internet layer is the second layer of the TCP/IP its destination.
model. o An ICMP protocol mainly uses two terms:
o An internet layer is also known as the network o ICMP Test: ICMP Test is used to test whether
layer. the destination is reachable or not.
o The main responsibility of the internet layer is to o ICMP Reply: ICMP Reply is used to check
send the packets from any network, and they arrive whether the destination device is responding or
not.
at the destination irrespective of the route they
o The core responsibility of the ICMP protocol is to report
take. the problems, not correct them. The responsibility of the
correction lies with the sender.
o ICMP can send the messages only to the source, but not to
Following are the protocols used in this layer are: the intermediate routers because the IP datagram carries
the addresses of the source and destination but not of the
router that it is passed to.
[ By- Prof. Sushree Sasmita Dash] Page 9
[Computer Network Notes-Unit-1]
Moderate data speeds: Coaxial or twisted pair cables are mainly used
in bus-based networks that support upto 10 Mbps.
o Familiar technology: Bus topology is a familiar
What is Topology? technology as the installation and troubleshooting
techniques are well known, and hardware components are
Topology defines the structure of the network of how all the easily available.
components are interconnected to each other. There are two types o Limited failure: A failure in one node will not have any
of topology: physical and logical topology. effect on other nodes.
Physical topology is the geometric representation of all the nodesDisadvantages of Bus topology:
in a network. o Extensive cabling: A bus topology is quite simpler, but
still it requires a lot of cabling.
o Difficult troubleshooting: It requires specialized test
equipment to determine the cable faults. If any fault
occurs in the cable, then it would disrupt the
communication for all the nodes.
o Signal interference: If two nodes send the messages
simultaneously, then the signals of both the nodes collide
with each other.
o Reconfiguration difficult: Adding new devices to the
network would slow down the network.
o Attenuation: Attenuation is a loss of signal leads to
communication issues. Repeaters are used to regenerate
the signal.
o When two or more different topologies are combined o Transmission impairment: When the received signal is
together is termed as Hybrid topology and if similar not identical to the transmitted one due to the transmission
topologies are connected with each other will not result in impairment. The quality of the signals will get destroyed
Hybrid topology. due to transmission impairment.
Advantages of Hybrid Topology o Interference: Interference is defined as the process of
o Reliable: If a fault occurs in any part of the network will disrupting a signal when it travels over a communication
not affect the functioning of the rest of the network. medium on the addition of some unwanted signal.
o Scalable: Size of the network can be easily expanded by
adding new devices without affecting the functionality of Causes of Transmission Impairment:
the existing network.
o Flexible: This topology is very flexible as it can be
designed according to the requirements of the
organization.
o Effective: Hybrid topology is very effective as it can be
designed in such a way that the strength of the network is
maximized and weakness of the network is minimized. o Attenuation: Attenuation means the loss of energy, i.e.,
Disadvantages of Hybrid topology the strength of the signal decreases with increasing the
distance which causes the loss of energy.
o Complex design: The major drawback of the Hybrid
topology is the design of the Hybrid network. It is very o Distortion: Distortion occurs when there is a change in
difficult to design the architecture of the Hybrid network. the shape of the signal. This type of distortion is examined
o Costly Hub: The Hubs used in the Hybrid topology are from different signals having different frequencies. Each
very expensive as these hubs are different from usual frequency component has its own propagation speed, so
Hubs used in other topologies. they reach at a different time which leads to the delay
o Costly infrastructure: The infrastructure cost is very distortion.
high as a hybrid network requires a lot of cabling, network o Noise: When data is travelled over a transmission
devices, etc. medium, some unwanted signal is added to it which
creates the noise.
Classification of Transmission
What is Transmission media? Media:
o Transmission media is a communication channel that
carries the information from the sender to the receiver.
Data is transmitted through the electromagnetic signals.
o The main functionality of the transmission media is to
carry the information in the form of bits through LAN
(Local Area Network).
o It is a physical path between transmitter and receiver in
data communication.
o In a copper-based network, the bits in the form of
electrical signals.
o In a fiber based network, the bits in the form of light
pulses.
o The electrical signals can be sent through the copper wire,
fiber optics, atmosphere, water, and vacuum.
o Transmission media is of two types is wired media and
wireless media. In wired media, medium characteristics
are more important whereas, in wireless media, signal
characteristics are more important.
o Different transmission media have different properties o Guided Transmission Media
such as bandwidth, delay, cost and ease of installation and o UnGuided Transmission Media
maintenance.
o The transmission media is available in the lowest layer of
the OSI reference model, i.e., Physical layer.
Guided Media
Some Effecting factors: It is defined as the physical medium through which the signals are
o Bandwidth: All the factors are remaining constant, the transmitted. It is also known as Bounded media.
greater the bandwidth of a medium, the higher the data
transmission rate of a signal.
Twisted pair:
Twisted pair is a physical media made up of a pair of cables
twisted with each other. A twisted pair cable is cheap as compared
to other transmission media. The frequency range for twisted pair
cable is from 0 to 3.5KHz.
A twisted pair consists of two insulated copper wires arranged in a
regular spiral pattern.
.
Coaxial Cable
o Coaxial cable is very commonly used transmission media,
for example, TV wire is usually a coaxial cable.
o The name of the cable is coaxial as it contains two
conductors parallel to each other.
o It has a higher frequency as compared to twisted pair
cable.
o The inner conductor of the coaxial cable is made up of
copper, and the outer conductor is made up of copper
mesh. The middle core is made up of non-conductive
cover that separates the inner conductor from the outer
conductor.
o The middle core is responsible for the data transferring
whereas the copper mesh prevents from the EMI
(Electromagnetic interference).
Un-Guided Transmission
o An unguided transmission transmits the electromagnetic
waves without using any physical medium. Therefore it
is also known as wireless transmission.
o In unguided media, air is the media through which the
electromagnetic energy can flow easily.
Unguided transmission is broadly classified into three categories:
Radio waves
o Radio waves are the electromagnetic waves that are
transmitted in all the directions of free space.
o Radio waves are omnidirectional, i.e., the signals are
propagated in all the directions.
o The range in frequencies of radio waves is from 3Khz to
1 khz.
o In the case of radio waves, the sending and receiving
antenna are not aligned, i.e., the wave sent by the sending
antenna can be received by any receiving antenna.
Data Encoding
Encoding is the process of using various patterns of voltage
or current levels to represent 1s and 0s of the digital
signals on the transmission link.
The common types of line encoding are Unipolar, Polar,
Bipolar, and Manchester.
Encoding Techniques
The data encoding technique is divided into the following
types, depending upon the type of data conversion.
Analog data to Analog signals − The modulation
techniques such as Amplitude Modulation,
Frequency Modulation and Phase Modulation of
analog signals, fall under this category.
Analog data to Digital signals − This process can
be termed as digitization, which is done by Pulse
Code Modulation PCMPCM. Hence, it is
nothing but digital modulation. As we have
already discussed, sampling and quantization are
the important factors in this. Delta Modulation
gives a better output than PCM.
Digital data to Analog signals − The modulation
techniques such as Amplitude Shift
Keying ASKASK, Frequency Shift
Keying FSKFSK, Phase Shift Keying PSKPSK,
[ By- Prof. Sushree Sasmita Dash] Page 19
[Computer Network Notes-Unit-1]
Bi-phase Encoding
The signal level is checked twice for every bit time, both
initially and in the middle. Hence, the clock rate is
double the data transfer rate and thus the modulation rate
is also doubled. The clock is taken from the signal itself.
The bandwidth required for this coding is greater.
There are two types of Bi-phase Encoding.
Bi-phase Manchester
Differential Manchester
Bi-phase Manchester
In this type of coding, the transition is done at the middle of
the bit-interval. The transition for the resultant pulse is
Differential Manchester
In this type of coding, there always occurs a transition in
the middle of the bit interval. If there occurs a transition
at the beginning of the bit interval, then the input bit is 0.
If no transition occurs at the beginning of the bit interval,
then the input bit is 1. Unipolar
o Digital transmission system sends the voltage pulses over
the medium link such as wire or cable.
Digital Transmission
Data can be represented either in analog or digital form. The
computers used the digital form to store the information.
Therefore, the data needs to be converted in digital form so that it
can be used by a computer.
DIGITAL-TO-DIGITAL
CONVERSION Unipolar encoding has two problems that make this scheme less
desirable:
Digital-to-digital encoding is the representation of digital
information by a digital signal. When binary 1s and 0s generated o DC Component
by the computer are translated into a sequence of voltage pulses
o Synchronization
that can be propagated over a wire, this process is known as
digital-to-digital encoding.
Polar
o Polar encoding is an encoding scheme that uses two
voltage levels: one is positive, and another is negative.
o Polar Encoding
o Bipolar Encoding
o NRZ stands for Non-return zero. It performs two signal changes to encode one bit that acquires
more bandwidth.
o In NRZ encoding, the level of the signal can be
represented either positive or negative. Biphase
The two most common methods used in NRZ are: o Biphase is an encoding scheme in which signal changes at
the middle of the bit interval but does not return to zero.
NRZ-L: In NRZ-L encoding, the level of the signal depends on the
type of the bit that it represents. If a bit is 0 or 1, then their Biphase encoding is implemented in two different ways:
voltages will be positive and negative respectively. Therefore, we
can say that the level of the signal is dependent on the state of the Manchester
bit.
o It changes the signal at the middle of the bit interval but
NRZ-I: NRZ-I is an inversion of the voltage level that represents 1 does not return to zero for synchronization.
bit. In the NRZ-I encoding scheme, a transition occurs between the
positive and negative voltage that represents 1 bit. In this scheme, o In Manchester encoding, a negative-to-positive transition
0 bit represents no change and 1 bit represents a change in voltage represents binary 1, and positive-to-negative transition
level. represents 0.
Differential Manchester
RZ
o RZ stands for Return to zero.
HDB3
o HDB3 stands for High-Density Bipolar 3.
Advantage:
o DC component is zero.
Disadvantage:
B8ZS
o B8ZS stands for Bipolar 8-Zero Substitution.
ANALOG-TO-DIGITAL
CONVERSION
o When an analog signal is digitalized, this is called anPCM
analog-to-digital conversion.
o PCM stands for Pulse Code Modulation.
o Suppose human sends a voice in the form of an analog
signal, we need to digitalize the analog signal which is o PCM technique is used to modify the pulses created by
less prone to noise. It requires a reduction in the number PAM to form a digital signal. To achieve this, PCM
of values in an analog message so that they can be quantizes PAM pulses. Quantization is a process of
represented in the digital stream. assigning integral values in a specific range to sampled
instances.
o In analog-to-digital conversion, the information contained
in a continuous wave form is converted in digital pulses. o PCM is made of four separate processes: PAM,
quantization, binary encoding, and digital-to-digital
encoding.
Techniques for Analog-To-Digital
Conversion
PAM
o PAM stands for pulse amplitude modulation.
What is Multiplexing?
Multiplexing is a technique used to combine and send the multiple
data streams over a single medium. The process of combining the
data streams is known as multiplexing and hardware used for
Frequency-division Multiplexing
multiplexing is known as a multiplexer. (FDM)
Multiplexing is achieved by using a device called Multiplexer
o It is an analog technique.
(MUX) that combines n input lines to generate a single output line.
Multiplexing follows many-to-one, i.e., n input lines and one o Frequency Division Multiplexing is a technique in which
output line. the available bandwidth of a single transmission medium
is subdivided into several channels.
De-multiplexing is achieved by using a device called De-
multiplexer (DEMUX) available at the receiving end. DEMUX
separates a signal into its component signals (one input and n
outputs). Therefore, we can say that de-multiplexing follows the
one-to-many approach.
Concept of Multiplexing
o The carriers which are used for modulating the signals are
known as sub-carriers. They are represented as f1,f2..fn.
o FDM is mainly used in radio broadcasts and TV networks.
Advantages of Multiplexing:
o More than one signal can be sent over a single medium. Advantages Of FDM:
o The bandwidth of a medium can be utilized effectively.
o FDM is used for analog signals.
o It is a digital technique.
o In Frequency Division Multiplexing Technique, all signals
operate at the same time with different frequency, but in o The difference between Asynchronous TDM and
case of Time Division Multiplexing technique, all signals Synchronous TDM is that many slots in Synchronous
operate at the same frequency with different time. TDM are unutilized, but in Asynchronous TDM, slots are
o In Time Division Multiplexing technique, the total time fully utilized. This leads to the smaller transmission time
available in the channel is distributed among different and efficient utilization of the capacity of the channel.
users. Therefore, each user is allocated with different time o In Synchronous TDM, if there are n sending devices, then
interval known as a Time slot at which data is to be there are n time slots. In Asynchronous TDM, if there are
transmitted by the sender. n sending devices, then there are m time slots where m is
o A user takes control of the channel for a fixed amount of less than n (m<n).
time. o The number of slots in a frame depends on the statistical
o In Time Division Multiplexing technique, data is not analysis of the number of input lines.
transmitted simultaneously rather the data is transmitted
one-by-one. Concept Of Asynchronous TDM
Advantages of Switching:
o When the frame is stored, then the frame is checked for It combines the speed of Cut-through Switching with the error checking
the errors. If any error found, the message is discarded functionality.
otherwise the message is forwarded to the next node. This o This technique checks the 64 bytes of the ethernet frame
process is known as forwarding the frame. where addressing information is available.
o CRC (Cyclic Redundancy Check) technique is o A collision is detected within 64 bytes of the frame, the
implemented that uses a number of bits to check for the frames which are collided will not be forwarded further.
errors on the received frame.
o The store-and-forward technique ensures a high level of
security as the destination network will not be affected byDifferences b/w Store-and-forward and Cut-
the corrupted frames. through Switching.
o Store-and-forward switches are highly reliable as it does
not forward the collided frames.
Store-and-forward Cut-through Switching
Cut-through Switching Switching
Switching techniques
In large networks, there can be multiple paths from sender to
receiver. The switching technique will decide the best route for
data transmission.
Message Switching
o Message Switching is a switching technique in which a
message is transferred as a complete unit and routed
through intermediate nodes at which it is stored and
forwarded.
o In Message Switching technique, there is no establishment
of a dedicated path between the sender and receiver.
o The destination address is appended to the message.
Message Switching provides a dynamic routing as the
message is routed through the intermediate nodes based on
the information available in the message.
o Message switches are programmed in such a way so that
they can provide the most efficient routes.
o Each and every node stores the entire message and then
forward it to the next node. This type of network is known
as store and forward network.
o Message switching treats each message as an independent
entity.
Packet Switching
o In the case of Virtual circuit switching, a preplanned route o Cost-effective: In packet switching technique, switching
is established before the messages are sent. devices do not require massive secondary storage to store
o Call request and call accept packets are used to establish the packets, so cost is minimized to some extent.
the connection between sender and receiver. Therefore, we can say that the packet switching technique
o In this case, the path is fixed for the duration of a logical is a cost-effective technique.
connection. o Reliable: If any node is busy, then the packets can be
rerouted. This ensures that the Packet Switching technique
Let's understand the concept of virtual circuit switching provides reliable communication.
through a diagram: o Efficient: Packet Switching is an efficient technique. It
does not require any established path prior to the
transmission, and many users can use the same
communication channel simultaneously, hence makes use
of available bandwidth very efficiently.
Congestion cannot occur as all the Congestion can occur when the
packets travel in different node is busy, and it does
directions. not allow other packets to
pass through.