Computer Network 1
Computer Network 1
INTRODUCTION:
1.USES OF COMPUTER NETWORK
Communication
1. Email: Send and receive emails to communicate with others.
2. Instant Messaging: Use platforms like Slack, Microsoft Teams, or
WhatsApp for real-time communication.
3. Video Conferencing: Conduct virtual meetings using tools like Zoom,
Google Meet, or Skype.
Resource Sharing
1. File Sharing: Share files and folders with others on the network.
2. Printer Sharing: Share printers and other peripherals with others on
the network.
3. Internet Connection Sharing: Share internet connections with others
on the network.
Information Sharing
1. Websites: Host websites on a network to share information with
others.
2. Databases: Share databases with others on the network to access and
manage data.
3. Cloud Storage: Use cloud storage services like Google Drive,
Dropbox, or OneDrive to share files and folders.
Entertainment
1. Online Gaming: Play games with others on the network or online.
2. Streaming: Stream music, videos, or movies from services like
Netflix, Hulu, or Spotify.
3. Social Media: Use social media platforms like Facebook, Twitter, or
Instagram to connect with others.
These are just a few examples of the many uses of computer networks.
Networks have become an essential part of modern life, and their uses
continue to expand and evolve.
2.NETWORK HARDWARE
Network Interface Cards (NICs)
1. Ethernet Cards: Used for wired connections to a local area network
(LAN).
2. Wireless NICs: Used for wireless connections to a LAN or wide area
network (WAN).
Network Cables
1. Twisted Pair Cables: Used for Ethernet connections.
2. Coaxial Cables: Used for broadband internet connections.
3. Fiber Optic Cables: Used for high-speed internet connections.
Network Devices
1. Hubs: Simple network devices that connect multiple devices together.
2. Switches: Intelligent network devices that connect multiple devices
together and filter traffic.
3. Routers: Network devices that connect multiple networks together and
route traffic between them.
4. Modems: Network devices that connect a network to the internet via a
broadband connection.
5. Gateways: Network devices that connect a network to another
network or the internet.
Characteristics of a LAN
1. Geographical Area: LANs cover a small geographical area.
2. High-Speed Data Transfer: LANs support high-speed data transfer
rates.
3. Low Error Rate: LANs have a low error rate due to the use of error-
checking protocols.
4. Multiple Devices: LANs can connect multiple devices, such as
computers, printers, and servers.
LAN Topologies
1. Bus Topology: A single cable connects all devices.
2. Star Topology: Devices connect to a central hub or switch.
3. Ring Topology: Devices connect in a circular configuration.
4. Mesh Topology: Each device connects to every other device.
LAN Technologies
1. Ethernet: A popular LAN technology that uses twisted-pair or fiber
optic cables.
2. Wi-Fi: A wireless LAN technology that uses radio waves to connect
devices.
3. Token Ring: A LAN technology that uses a token-passing protocol to
manage data transmission.
LAN Devices
1. Network Interface Card (NIC): A card installed in a computer to
connect to a LAN.
2. Hub: A device that connects multiple devices to a LAN.
3. Switch: A device that connects multiple devices to a LAN and
manages data transmission.
4. Router: A device that connects multiple LANs to a WAN or the
internet.
Advantages of LANs
1. High-Speed Data Transfer: LANs support high-speed data transfer
rates.
2. Reliability: LANs are reliable and have a low error rate.
3. Security: LANs can be secured using firewalls and access controls.
4. Cost-Effective: LANs are cost-effective compared to WANs.
Disadvantages of LANs
1. Limited Geographical Area: LANs cover a limited geographical area.
2. Complexity: LANs can be complex to set up and manage.
3. Dependence on Hardware: LANs rely on hardware devices, which can
fail or become outdated.
4. MAN NETWORK
What is a MAN?
A MAN is a computer network that connects devices in a metropolitan
area, such as a city or town.
Characteristics of a MAN
1. Geographical Area: MANs cover a larger geographical area than
LANs, typically a metropolitan area.
2. High-Speed Data Transfer: MANs support high-speed data transfer
rates, often using fiber optic cables.
3. Multiple Networks: MANs often connect multiple LANs and WANs.
4. Public or Private: MANs can be public, providing internet access to
the public, or private, providing network access to a specific
organization.
MAN Topologies
1. Ring Topology: A circular configuration that connects devices in a
metropolitan area.
2. Star Topology: A central hub or switch connects devices in a
metropolitan area.
3. Mesh Topology: Each device connects to every other device in a
metropolitan area.
MAN Technologies
1. Fiber Optic Cables: Used for high-speed data transfer.
2. Wireless Technologies: Such as WiMAX or LTE, used for wireless
connectivity.
3. Ethernet: Used for connecting devices in a metropolitan area.
MAN Devices
1. Routers: Connect multiple networks and manage data transmission.
2. Switches: Connect devices in a metropolitan area and manage data
transmission.
3. Network Interface Cards (NICs): Installed in devices to connect to a
MAN.
Advantages of MANs
1. High-Speed Data Transfer: MANs support high-speed data transfer
rates.
2. Reliability: MANs are reliable and have a low error rate.
3. Scalability: MANs can be easily scaled to meet growing demands.
4. Cost-Effective: MANs are cost-effective compared to WANs.
Disadvantages of MANs
1. Complexity: MANs can be complex to set up and manage.
2. Security: MANs require robust security measures to protect against
unauthorized access.
3. Interoperability: MANs may have interoperability issues with
different devices and networks.
5. WAN NETWORK
What is a WAN?
A WAN is a computer network that connects devices over a large
geographical area, such as a country, continent, or even globally.
Characteristics of a WAN
1. Geographical Area: WANs cover a large geographical area.
2. High-Speed Data Transfer: WANs support high-speed data transfer
rates.
3. Multiple Networks: WANs often connect multiple LANs, MANs, and
other WANs.
4. Public or Private: WANs can be public, providing internet access to
the public, or private, providing network access to a specific
organization.
WAN Topologies
1. Star Topology: A central hub or switch connects devices in a WAN.
2. Mesh Topology: Each device connects to every other device in a
WAN.
3. Hybrid Topology: A combination of different topologies, such as star
and mesh.
WAN Technologies
1. Leased Lines: Dedicated communication lines leased from a
telecommunications provider.
2. Frame Relay: A packet-switching technology that provides high-speed
data transfer.
3. ATM (Asynchronous Transfer Mode): A cell-switching technology
that provides high-speed data transfer.
4. MPLS (Multiprotocol Label Switching): A technology that provides
high-speed data transfer and traffic engineering.
5. Internet: A global network of interconnected computers and servers.
WAN Devices
1. Routers: Connect multiple networks and manage data transmission.
2. Switches: Connect devices in a WAN and manage data transmission.
3. Modems: Connect devices to a WAN using a dial-up or broadband
connection.
4. CSU/DSU (Channel Service Unit/Data Service Unit): Connects a
router to a WAN.
Advantages of WANs
1. Global Connectivity: WANs provide global connectivity, allowing
devices to communicate with each other regardless of location.
2. High-Speed Data Transfer: WANs support high-speed data transfer
rates.
3. Scalability: WANs can be easily scaled to meet growing demands.
4. Cost-Effective: WANs can be cost-effective compared to other
networking options.
Disadvantages of WANs
1. Complexity: WANs can be complex to set up and manage.
2. Security: WANs require robust security measures to protect against
unauthorized access.
3. Interoperability: WANs may have interoperability issues with
different devices and networks.
4. Dependence on Infrastructure: WANs rely on a robust infrastructure,
including routers, switches, and communication lines.
6. NETWORK SOFTWARE
Types of Network Software
1. Network Operating Systems (NOS): Manage and control network
resources, such as Novell NetWare and Windows Server.
2. Network Protocol Stacks: Implement network protocols, such as
TCP/IP and DNS.
3. Network Management Software: Monitor and manage network
performance, such as Nagios and SolarWinds.
4. Network Security Software: Protect networks from unauthorized
access and malicious activity, such as firewalls and antivirus software.
1. Network Access Layer: Combines the OSI physical and data link
layers.
2. Internet Layer: Corresponds to the OSI network layer.
3. Transport Layer: Corresponds to the OSI transport layer.
4. Application Layer: Combines the OSI session, presentation, and
application layers.
UNIT II
1. THE THEORETICAL BASIS FOR DATA
COMMUNICATION
Theoretical Foundations
1. Information Theory: Developed by Claude Shannon, information
theory provides the mathematical framework for understanding the
fundamental limits of data communication.
2. Communication Theory: This theory, also developed by Shannon,
describes the process of communication and the factors that affect it,
such as noise and channel capacity.
3. Signal Processing: Signal processing is the study of signals and
their transformations. It is a critical component of data
communication, as it enables the manipulation and transmission of
signals.
Key Concepts
1. Bits and Bytes: The fundamental units of digital information, bits
and bytes are the building blocks of data communication.
2. Signal-to-Noise Ratio (SNR): SNR is a measure of the strength of a
signal relative to background noise.
3. Channel Capacity: Channel capacity refers to the maximum rate at
which information can be transmitted over a communication channel.
4. Error Detection and Correction: Error detection and correction
techniques, such as checksums and forward error correction, are used
to ensure the integrity of transmitted data.
Theoretical Models
1. Shannon-Weaver Model: This model, developed by Claude
Shannon and Warren Weaver, describes the communication process
as a series of linear steps.
2. OSI Model: The OSI (Open Systems Interconnection) model is a 7-
layered framework for understanding and standardizing data
communication.
Mathematical Foundations
1. Probability Theory: Probability theory provides the mathematical
framework for understanding and analyzing random events in data
communication.
2. Stochastic Processes: Stochastic processes are mathematical
models that describe random events and their evolution over time.
3. Information-Theoretic Metrics: Metrics such as entropy, mutual
information, and channel capacity are used to quantify and analyze
data communication systems.
2. GUIDED TRANSMISSION MEDIA
Types of Guided Transmission Media
1. Twisted Pair Cable: Consists of two insulated copper wires twisted
together to reduce electromagnetic interference.
2. Coaxial Cable: Consists of a central copper wire surrounded by
insulation, a braided shield, and an outer jacket.
3. Fiber Optic Cable: Uses light to transmit data through thin glass or
plastic fibers.
1. Call Setup: When a user makes a call, the local exchange receives the
call and sends a request to the PSTN to connect the call.
2. Call Routing: The PSTN uses a complex system of routing tables and
switching centers to direct the call to the destination telephone exchange.
3. Call Connection: Once the call reaches the destination telephone
exchange, it is connected to the recipient's telephone line.
Advantages of PSTN:
Evolution of PSTN:
PSTN has evolved over the years to incorporate new technologies, such
as digital switching, fiber optic transmission, and voice over internet
protocol (VoIP). However, PSTN is being gradually replaced by VoIP
and other internet-based communication services
6. THE MOBILE TELEPHONE SYSTEMS
Types of Mobile Telephone Systems
1. 1G (First Generation): Analog systems, introduced in the 1980s,
providing basic voice services.
2. 2G (Second Generation): Digital systems, introduced in the 1990s,
providing voice, SMS, and basic data services.
3. 3G (Third Generation): Digital systems, introduced in the 2000s,
providing high-speed data services, video calling, and mobile
broadband.
4. 4G (Fourth Generation): Digital systems, introduced in the 2010s,
providing high-speed data services, HD video streaming, and mobile
broadband.
5. 5G (Fifth Generation): Digital systems, introduced in the 2020s,
providing ultra-high-speed data services, low latency, and massive
machine-type communications.
Flow Control
1. Buffering: Managing data buffers to prevent overflow and underflow.
2. Windowing: Using sliding windows to control the amount of data in
transit.
3. Acknowledgments: Sending acknowledgments to confirm receipt of
data.
Framing
1. Frame Structure: Defining the format of data frames, including
headers, trailers, and payload.
2. Frame Synchronization: Methods to synchronize frames, such as bit
stuffing and byte stuffing.
Addressing
1. MAC Addresses: Unique addresses assigned to network interfaces.
2. Address Resolution: Resolving MAC addresses to IP addresses.
Reliability
1. Error Recovery: Mechanisms to recover from errors, such as
retransmission and error correction.
2. Flow Control: Mechanisms to control data flow, such as windowing
and buffering.
Security
1. Authentication: Verifying the identity of devices and users.
2. Encryption: Protecting data confidentiality and integrity.
Scalability
1. Network Size: Designing the data link layer to support large networks.
2. Network Topology: Supporting various network topologies, such as
bus, star, and mesh.
2. ERROR DETECTION AND CORRECTION
Error Detection
Types of Errors
1. Single-bit errors: One bit is flipped (0 to 1 or 1 to 0).
2. Multi-bit errors: Multiple bits are flipped.
3. Burst errors: Consecutive bits are flipped.
Error Correction
Types of Error Correction
1. Forward Error Correction (FEC): Adds redundant data to correct
errors.
2. Automatic Repeat Request (ARQ): Requests retransmission of
erroneous data.
Disadvantages:
- Increases overhead and complexity
- Requires additional processing power
- May introduce latency in data transfer
3. ELEMENTARY DATA LINK PROTOCOLS
Stop-and-Wait Protocol
1. Sender sends a frame and waits for an acknowledgment (ACK) from
the receiver.
2. If the ACK is received, the sender sends the next frame.
3. If the ACK is not received, the sender retransmits the frame.
Go-Back-N Protocol
1. Sender sends frames and keeps track of the sequence number of the
last frame sent.
2. If an error occurs, the receiver sends a negative acknowledgment
(NAK) to the sender.
3. The sender retransmits all frames starting from the last correctly
received frame.
Disadvantages:
5. Frame Relay
- A data link protocol used for wide area networks (WANs).
- Provides error detection using checksums.
- Supports variable-length frames and multiple transmission rates.
Addressing
1. Logical Addressing: Assigning logical addresses to devices.
2. Address Mapping: Mapping logical addresses to physical addresses.
3. Address Resolution: Resolving logical addresses to physical
addresses.
Congestion Control
1. Congestion Detection: Detecting congestion in the network.
2. Congestion Avoidance: Preventing congestion by controlling traffic.
3. Congestion Recovery: Recovering from congestion by reducing
traffic.
Scalability
1. Network Size: Designing networks to accommodate large numbers of
devices.
2. Network Growth: Designing networks to accommodate growth and
expansion.
3. Network Management: Managing large and complex networks.
2. ROUTING ALGORITHMS
Types of Routing Algorithms
1. Static Routing: Routing decisions are made based on fixed routing
tables.
2. Dynamic Routing: Routing decisions are made based on real-time
network conditions.
QoS Metrics
1. Throughput: The amount of data that can be transmitted over a
network in a given time period.
2. Delay: The time it takes for a packet to travel from the source to the
destination.
3. Jitter: The variation in packet delay.
4. Packet Loss: The percentage of packets that are lost or discarded
during transmission.
5. Availability: The percentage of time that a network or service is
available and operational.
QoS Techniques
1. IntServ (Integrated Services): A QoS architecture that provides
guaranteed service for real-time applications.
2. DiffServ (Differentiated Services): A QoS architecture that provides
differentiated service for different classes of traffic.
3. MPLS (Multiprotocol Label Switching): A QoS technique that uses
label switching to provide guaranteed service for real-time applications.
Benefits of QoS
1. Improved Network Performance: QoS helps to optimize network
performance by prioritizing critical applications and services.
2. Increased Reliability: QoS helps to ensure that critical applications
and services are always available and operational.
3. Better User Experience: QoS helps to provide a better user experience
by ensuring that real-time applications, such as video and voice, are
delivered with high quality and low latency.
5. INTERNETWORKING
Definition of Internetworking
Internetworking refers to the process of connecting multiple networks
together to form a single, larger network.
Types of Internetworking
1. Intranet: A private network that connects multiple networks within an
organization.
2. Extranet: A private network that connects multiple networks between
organizations.
3. Internet: A global network that connects multiple networks using
standardized protocols.
Internetworking Devices
1. Routers: Connect multiple networks together and route traffic
between them.
2. Switches: Connect multiple devices within a network and forward
traffic between them.
3. Gateways: Connect multiple networks together and translate between
different protocols.
4. Bridges: Connect multiple networks together and forward traffic
between them.
Internetworking Protocols
1. TCP/IP (Transmission Control Protocol/Internet Protocol): A suite of
protocols used for internetworking.
2. OSPF (Open Shortest Path First): A routing protocol used for
internetworking.
3. BGP (Border Gateway Protocol): A routing protocol used for
internetworking between autonomous systems.
Internetworking Concepts
1. Autonomous Systems: A network that is under the control of a single
organization.
2. Routing Tables: A database used by routers to store routing
information.
3. Network Address Translation (NAT): A technique used to translate
between private and public IP addresses.
Benefits of Internetworking
1. Global Connectivity: Internetworking enables global connectivity
between different networks.
2. Resource Sharing: Internetworking enables resource sharing between
different networks.
3. Improved Communication: Internetworking enables improved
communication between different networks.
6. TRANSPORT SERVICES
Transport Layer Services
The transport layer provides services to the session layer and above,
ensuring reliable data transfer between devices.
1. Connection-Oriented Communication
- Establishment of Connection: A connection is established between the
sender and receiver before data transfer.
- Data Transfer: Data is transferred over the established connection.
- Termination of Connection: The connection is terminated after data
transfer is complete.
2. Connectionless Communication
- No Connection Establishment: No connection is established before
data transfer.
- Data Transfer: Data is transferred without a established connection.
- No Connection Termination: No connection termination is required.
Flow Control
1. Windowing: The receiver advertises a window size to limit the
amount of data that can be sent.
2. Buffering: Data is buffered at the sender and receiver to handle flow
control.
Reliability
1. Connection-Oriented: Connection-oriented protocols ensure reliable
data transfer through acknowledgments and retransmission.
2. Connectionless: Connectionless protocols provide best-effort delivery
without guarantees of reliability.
8. PERFORMANCE ISSUES.
Network Performance Issues
1. Bandwidth: Insufficient bandwidth can lead to slow data transfer
rates.
2. Latency: High latency can cause delays in data transfer and affect
real-time applications.
3. Packet Loss: Packet loss can lead to retransmissions, reducing
network performance.
4. Congestion: Network congestion can cause delays and packet loss.
5. Jitter: Jitter can affect real-time applications, such as video and voice.
DNS Security
1. DNSSEC: Adds digital signatures to DNS records to prevent
spoofing.
2. DNS over HTTPS (DoH): Encrypts DNS queries and responses.
3. DNS over TLS (DoT): Encrypts DNS queries and responses.
Benefits of DNS
1. Easy to Remember: Domain names are easier to remember than IP
addresses.
2. Flexible: DNS allows for easy changes to IP addresses or server
configurations.
3. Scalable: DNS can handle a large number of domain names and
queries.
4. Secure: DNSSEC and other security measures help prevent DNS
spoofing and other attacks.
2. ELECTRIC MAIL
What is Email?
Email is a store-and-forward method of sending and receiving messages
electronically over a computer network.
Email Components
1. Mail User Agent (MUA): The email client software used to compose,
send, and receive email messages.
2. Mail Transfer Agent (MTA): The email server software responsible
for routing and delivering email messages between different email
systems.
3. Mail Delivery Agent (MDA): The email server software responsible
for delivering email messages to the recipient's mailbox.
Email Protocols
1. Simple Mail Transfer Protocol (SMTP): Used for sending and
receiving email messages between email systems.
2. Post Office Protocol (POP): Used for retrieving email messages from
a mail server to a local email client.
3. Internet Message Access Protocol (IMAP): Used for accessing and
managing email messages on a mail server.
Email Address
An email address consists of:
Email Security
1. Encryption: Email messages can be encrypted to protect against
unauthorized access.
2. Authentication: Email systems can use authentication mechanisms to
verify the identity of senders and recipients.
3. Digital Signatures: Email messages can be digitally signed to ensure
authenticity and integrity.
Benefits of Email
1. Convenience: Email allows users to send and receive messages
electronically from anywhere.
2. Speed: Email messages are delivered quickly, often in a matter of
seconds.
3. Cost-Effective: Email is a cost-effective way to communicate,
especially for long-distance or international communication.
3. THE WORLD WIDE WEB
What is the World Wide Web?
The World Wide Web is a system of interlinked hypertext documents
that can be accessed via the Internet.
Key Components of the World Wide Web
1. HTTP (Hypertext Transfer Protocol): A protocol used for transferring
data over the web.
2. HTML (Hypertext Markup Language): A markup language used for
creating web pages.
3. URL (Uniform Resource Locator): A unique address used to identify
web resources.
4. Web Browsers: Software applications used to access and display web
pages.
5. Web Servers: Software applications used to host and serve web pages.
Cryptographic Techniques
1. Encryption: Converting plaintext to ciphertext to protect data.
2. Decryption: Converting ciphertext back to plaintext.
3. Hashing: Creating a digital fingerprint of data to ensure integrity.
4. Digital Signatures: Using encryption and hashing to authenticate and
verify data.
Cryptographic Algorithms
1. AES (Advanced Encryption Standard): A symmetric key algorithm
for encryption.
2. RSA (Rivest-Shamir-Adleman): An asymmetric key algorithm for
encryption and digital signatures.
3. SHA (Secure Hash Algorithm): A hashing algorithm for data
integrity.
4. MD5 (Message-Digest Algorithm 5): A hashing algorithm for data
integrity.
Cryptographic Protocols
1. SSL/TLS (Secure Sockets Layer/Transport Layer Security): A
protocol for secure communication over the internet.
2. IPSec (Internet Protocol Security): A protocol for secure
communication over IP networks.
3. PGP (Pretty Good Privacy): A protocol for secure email
communication.
Applications of Cryptography
1. Secure Communication: Protecting data in transit over the internet.
2. Data Encryption: Protecting data at rest on devices and in storage.
3. Authentication: Verifying the identity of users and devices.
4. Digital Signatures: Authenticating and verifying the integrity of data.
Benefits of Cryptography
1. Confidentiality: Protecting data from unauthorized access.
2. Integrity: Ensuring the accuracy and completeness of data.
3. Authenticity: Verifying the identity of users and devices.
4. Non-Repudiation: Preventing denial of data transmission or receipt.
5. SYMMETRIC-KEY ALGORITHMS
Types of Symmetric-Key Algorithms
1. Block Ciphers: Divide plaintext into fixed-length blocks and encrypt
each block independently. Examples: AES, DES, Blowfish.
2. Stream Ciphers: Encrypt plaintext one bit or byte at a time. Examples:
RC4, FISH.