0% found this document useful (0 votes)
16 views13 pages

CSC 812 Lecture 1

The lecture covers the development of computer networks, highlighting key milestones such as ARPANET and the transition to TCP/IP. It discusses various network topologies, including star, bus, ring, and mesh, detailing their structures, advantages, and limitations. Additionally, it introduces the OSI model and TCP/IP protocol suite, comparing their layers and practical applications in modern networking.

Uploaded by

aliynumbers
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views13 pages

CSC 812 Lecture 1

The lecture covers the development of computer networks, highlighting key milestones such as ARPANET and the transition to TCP/IP. It discusses various network topologies, including star, bus, ring, and mesh, detailing their structures, advantages, and limitations. Additionally, it introduces the OSI model and TCP/IP protocol suite, comparing their layers and practical applications in modern networking.

Uploaded by

aliynumbers
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 13

CSC 812 Data Communication and Networks –

Lecture 1

This lecture aims to outline the development of computer networks. We


will also discuss various network topologies and elaborate on their
structural and functional features.

The Advancements of Computer Networks

The origin of computer networks goes as far back as 1969 with some key
moments outlined below;

ARPANET (1969): The U.S. Department of Defense developed the first


packet-switching network that enabled resource sharing between various
universities and research institutions.

The transition to TCP/IP (1983): This replaced NCP (Network Control


Protocol) standardizing communication across diverse networks, and
laying the groundwork for the modern internet.

In 1983, the network was then divided into military (MILNET) and civilian
networks (INTERNET) marking the first historical use of the term
“Internet.”

When ARPANET was decommissioned in 1990, this allowed for NSFNET


and commercial ISPs to develop, which expanded worldwide connectivity.

There are multiple architectures vital to understanding the various forms


of networks. Below are some key ones

The Development of Computer Networks

There are multiple architectures and protocols vital to understanding the


various forms of networks. Some vital ones will be discussed.

Network Topologies

A topology describes the layout of a computer network, either physically


or logically, and affects its cost, scalability, and fault tolerance.

1
Star Topology

In a star topology, all network devices (nodes) are connected to a central


hub or switch. This hub acts as a central point for data transmission, with
each node having a direct connection to it.

Structure: All nodes are connected to a central hub such as a switch.

Figure 1: An Example of Star Topology Layout

Advantages:

 Fault Isolation: The overall network remains intact since device


failure on one node does not cause a cascade effect within the
entire network.
 Ease of Management: Adding and removing nodes to the network
can be executed easily.

Limitations:

 High Cabling Costs: The costs rise with the amount of cabling
needed.
 Single Point of Failure: If the central hub fails, the entire network
goes down.

Bus Topology

In a bus topology, all network devices connect to a single, shared cable


called a "bus" or "backbone". This cable acts as a common communication
channel, allowing all devices to receive data signals simultaneously.

Structure: A single backbone cable is used as the connection point for all
nodes to attach to.

2
Figure 2: An Example of Bus Topology Layout

Advantages:

 Low Cost: The expenditure for hardware as well as cabling is


significantly lower.
 Simplicity: Suitable for small networks since installation is not time-
consuming.

Limitations:

 Core Cable Vulnerability: Damaging the backbone cable means the


entire network stops functioning.
 Security Risks: The data is received by each node leading to the
exposure of private classified data.

Ring Topology

A ring topology connects networked devices in a closed loop, where each


device is connected to exactly two others, creating a circular path for data
transmission. This configuration allows data to flow in a single direction,
from node to node, until it reaches its destination.

Structure: Nodes are interconnected in a closed loop and data is


transmitted in one direction.

3
Figure 3: An Example of Ring Topology Layout

Advantages:

 Efficient data flow: There is a smooth flow of data through the


network as traffic collisions do not occur due to the uni-directional
nature.
 Fault Tolerance: In the case of an error, automatic switching to a
backup system is available in dual-ring structures.

Limitations:

 Single link dependency: The whole system may become inoperative


due to one broken link.
 Multi-Level Problem Solving: Finding the cause of the problem is
difficult.

Mesh Topology

A mesh topology, in networking, is a network configuration where devices


(nodes) are interconnected directly to multiple other nodes, creating a
decentralized, web-like structure. This means data has multiple paths to
travel, leading to increased redundancy and resilience.

Structure: Nodes are interconnected through multiple routes.

4
Figure 4: An Example of Mesh Topology Layout

Advantages:

 Redundant paths ensure continuity, providing high fault tolerance.


 Increased tolerances: Maintain efficacy in greater network loads.
 Scalability: Responsive to more powerful, larger, and dynamic
networks.

Limitations:

 High Cost: Exceeds expenses for wiring schematics and port


allocation.
 Difficult Maintenance: Complicated to configure and maintain.
 Complex Installation: Difficult configuration and maintenance.

Topology Comparison

Topology Best Use Case Reliability Cost


Star Small office networks regions Moderate Medium
Bus For temporary setups Low Low
Ring For industrial automation High (dual-ring) High
Mesh For critical infrastructure Very high Very high

5
Data Flow:

The three modes of data flow are:

Simplex:

Figure 5: Simplex Data Flow

Half-Duplex:

Figure 6: Half-Duplex Data Flow

Full Duplex:

Figure 7: Duplex Data Flow

6
Networking Modes:

The two modes of networking are:

Peer-to-Peer:

Figure 8: Examples of Peer-to-Peer Networking

Client-Server:

Figure 9: Examples of Client-Server Networking

7
Data Transmission:

The three modes of data transmission are: Unicast, Multicast, and


Broadcast.

Figure 10: An Illustration of Unicast, Multicast and Broadcast

8
The ISO-OSI Reference Model

The OSI model standardizes network communication into seven


abstraction layers, although a simplified five-layer version is often used
for teaching clarity.

Traditional 7-Layer OSI Model

Layer Function Key


Protocols/Techniques
Application User-network interaction (e.g., HTTP, SMTP, DNS
HTTP, FTP, DNS).
Presentation Data translation, encryption, and SSL/TLS, ASCII/Unicode
compression. conversion
Session Establishes, maintains, and NetBIOS, RPC
terminates sessions between
applications.
Transport End-to-end data delivery with TCP, UDP
error recovery and flow control.
Network Logical addressing (IP) and IP, ICMP, OSPF
routing across networks.
Data Link Framing, MAC addressing, and Ethernet, CSMA/CD, ARP
error detection (CRC).
Physical Transmits raw bitstreams over RS-232, 100BASE-T
physical media (e.g., cables, Wi-
Fi).

9
Figure 11: Detailed Illustration of the Traditional 7-Layer OSI Model

Simplified 5-Layer Version

Layer Function Merged OSI


Layers
Application Combines OSI’s Application, Layers 5–7
Presentation, and Session layers.
Transport Unchanged: Ensures reliable data Layer 4
transfer (TCP/UDP).
Network Unchanged: Handles IP addressing and Layer 3
routing.
Data Link Manages MAC addressing and frame Layer 2
delivery.
Physical Transmits bits via electrical/optical Layer 1
signals.

Key Differences:

 The 5-layer model consolidates upper OSI layers (5–7) into a single
Application layer, prioritizing practicality over theoretical
separation.
 OSI’s Session and Presentation layers are omitted in the
simplified version, as their functions (e.g., encryption, session
management) are often handled directly by applications in real-
world implementations.

10
Figure 12: Traditional 7-Layer OSI Model vs. 5-Layer OSI Model

TCP/IP Protocol Suite

The TCP/IP model, a four-layer framework, supports modern internet


communication and serves as the practical implementation of OSI
principles.

TCP/IP Layers
Layer Function Key OSI
Protocols Equivalent
Applicatio User-facing services (e.g., HTTP, FTP, Layers 5–7
n web browsing, email). DNS, SMTP
Transport End-to-end data delivery TCP, UDP Layer 4
with error control (TCP) or
low latency (UDP).
Internet Logical addressing IP, ICMP Layer 3
(IPv4/IPv6) and routing
across networks.
Network Physical transmission and Ethernet, Layers 1–2
Access MAC addressing. Wi-Fi

11
Figure 13: TCP/IP Protocol Suite

TCP/IP vs. OSI


Aspect OSI Model TCP/IP Model
Layers 7 (theoretical) 4–5 (practical)
Design Focus Protocol-agnostic Real-world internet
standardization communication
Session/ Explicit layers (5–6) Integrated into
Presentation Application layer
Adoption Educational/descriptive Dominant in modern
tool networks

12
Figure 14: Traditional 7-Layer OSI Model vs. TCP/IP Protocol Suite

Practical Relevance:

 TCP/IP streamlines OSI’s upper layers into a single Application layer,


reflecting how protocols like HTTP inherently manage encryption
(TLS) and session control (cookies).

 The Network Access layer in TCP/IP integrates the Physical and Data
Link layers in OSI, reinforcing the transmission and reception of bits
as independent of the hardware used.

OSI serves as a guide for its users, offering a comprehensive scheme for
studying layered communication, unlike TCP/IP which is more practical
and focused on the actual functioning of the internet. Students proficient
in both models can more effectively design networks and resolve issues
arising from multiple layers.

13

You might also like