CS Computer Networks 1
CS Computer Networks 1
8.1 INTRODUCTION
The greatest breakthrough in technology and communication over the past 20 years has been the
development and advancement of the computer network. From emailing a friend, to online bill
payment, to downloading data from the internet, to e-commerce, networking has made our world
much smaller and forever changed the way we communicate.
Network provides salient features which have made our life easy and comfortable, be it sending an
email, withdrawing money from an ATM machine, online railway or airline reservation, or sharing
audio and video files. Apart from these, the most extensively-used feature is the Print command
sent from a computer to get a printout from a printer attached to some other computer. All this
involves a network.
It is the network that connects various computers to each other and handles a large volume of data.
CTM: A computer network is a collection of interconnected computers and other devices to share data and
other resources (hardware and software resources).
8.2.1 Advantages of Computer Networks
Internet
Domain
DNS & Data Storage
Firewall
Wi-Fi
Router
Server
User PC
Printer
Printer
other system. This allows printing of documents by several users and, hence, the printer is
shared by multiple users on the network. Other resources like hard disk, DVD drive, scanner,
etc., can also be shared on a computer network. For example, sharing database, audio and
video files, antivirus software, application software, printers and scanners, etc.
(b) Improved Communication: A computer network enables fast, reliable and secure
communication between users. It saves time and offers easy communication methods.
For example, in an organization, managers work at different locations to make financial reports.
While working on a network, any change made by one manager on his/her computer can easily
be seen by other managers and employees. Thus, a network allows managers to easily update
information. This increases their efficiency and allows them to complete their work quickly.
(c) Reduced Communication Cost: Sharing resources also reduces communication cost. Using
public networks, we can send a large quantity of data at a low cost. Internet and mobile
networks are playing a very important role in sending and receiving text, image, audio and
video data at a low cost.
(d) Reliability of Data: Reliability means backing up of data, i.e., data can be copied and
stored on multiple computers. In a network system, all computers are connected to each
8.2
other. Thus, the information or message which is shared by each device is stored on their
respective workstations (computers). If, due to some reason (hardware crash, etc.), the data
gets corrupted and, thus, becomes unavailable on one computer, a copy of the same data can
be accessed from another workstation for future use. This leads to smooth functioning and
further processing without disruption.
(e) Central Storage of Data: Files can be stored on a central node (the file server) that can
be shared and made available to each and every user in an organization. With centralized
processing, data is stored and retrieved from a single central location. Thus, there is no
duplication of data and almost no data redundancy.
Before we learn about the basic underlying structure of the internet, e.g., domain name servers,
network access points and backbones, we first need to understand how our computer connects
to others.
8.4
Every computer that is connected to the internet is part of a network, even the one in our home.
For example, we may use a modem and dial a local number to connect to an Internet Service
Provider (ISP). At work, a computer may be part of a Local Area Network (LAN), but it most
likely still connects to the internet using an ISP that the company has contracted with. When
it connects to the ISP, it becomes part of their network. The ISP may then connect to a larger
network and become part of their network. The internet is simply a network of networks.
Most large communication companies have their own dedicated backbones connecting various
regions. In each region, the company has a Point of Presence (POP). The POP is a place for
local users to access the company’s network, often through a local phone number or dedicated
line. The amazing thing here is that there is no overall controlling network. Instead, there are
several high-level networks connecting to each other through Network Access Points or NAPs.
Backbone
Internet
T3 Line
ISP NAP
LAN
Home Business
Computer
Printer
iPad
Supplement – Computer Science with Python–XII
8.6
(c) Parallel Communication
• When data is transmitted through multiple wires, with each wire carrying each bit, it
is called parallel communication.
(d) Serial Communication
• When bits are sent one after another in a series along a wire, it is called serial
communication.
10001----------------10001
(e) Synchronous or Asynchronous Transmission
• When sender and receiver synchronize their checks before transmission, i.e., the
sender first sends control characters to the receiver and then sends the actual data,
it is called synchronous transmission.
Advantage—Faster than asynchronous mode.
Disadvantage—Costly and complex set-up required.
• In asynchronous transmission, data is preceded and succeeded by a start bit and stop
bit respectively. No synchronization is required.
Advantage—Hardware required is simple and cheap.
Disadvantage—Slower than synchronous mode.
CTM: The technique of sending data across the network is known as Switching technique. The three types
of techniques used are circuit switching, packet switching and message switching.
8.7
1. Circuit Switching
Circuit switching provides end-to-end connection between two computers. It is established
usually in a telephone network where one person is making a call and another is receiving a call.
In a telephone system, the communication must be established between the two participants,
i.e., the sender and the receiver. The circuit is established between these two participants
before the transfer of data takes place.
Receiver Caller
Fig. 8.6: Circuit Switching
In this technique, the entire link remains dedicated and no other user can use it even if the
path remains idle. The following actions take place during circuit switching:
(a) A request signal is sent by the sender to set up the connection with the receiver. It establishes
a physical connection between the two participants.
(b) All intermediate nodes are identified. These nodes are also called switching nodes.
(c) If the destination node is available, it sends back the acknowledgement of receiving a signal.
Hence, data transmission begins.
(d) When the data transmission is complete, the call can be terminated.
CTM: Circuit switching is a connection-oriented service. In this technique, there is a dedicated link between
the sender and the receiver and no other call can be made during this link, even if the link remains idle.
2. Packet Switching
In packet switching technique, the entire data is divided into small fragments called packets.
Each packet is of a fixed size, usually 128 bytes or 512 bytes. Packet switching is similar to post
Supplement – Computer Science with Python–XII
office operation. Each packet has a source address as well as destination address (IP address)
for being transmitted, in the same way as a postman delivers a letter to a specific destination
address.
As there is no direct connection established between the sender and the receiver, each
packet follows different routes and, therefore, the packets are delivered in a random order
at the destination address. It is the TCP protocol which then arranges all received packets in
a sequential order. During the transfer of packets, each packet has to pass through several
intermediate nodes, so each intermediate node checks for destination IP address. If the packet
matches with the node address, it is received; otherwise, it is passed on to the next node until
it reaches the destination IP address.
8.8
Mainframe
Caller
Receiver
CTM: Packet switching offers a connectionless service. Data is fragmented into small packets and each
packet is of fixed size in packet switching technology.
3. Message Switching
In message switching, the sender sends the data to a switching office first, which is then stored
in its buffer. It then checks the available link and, if it is free, the data is relayed to another
switching office. This process goes on until the data is sent to the destination (receiver). As the
data is first stored in a buffer and then sent to the next switching office, it is also called store
and forward switching technique.
CTM: Message switching is a store and forward switching technique where there is no direct connection
between the sender and the receiver.
the same order as it is originally sent. In packet switching, the message is broken into
small packets which are randomly sent from source and received in random order at
destination, which is then sequentially arranged.
8.9
8.8 DATA COMMUNICATION TERMINOLOGIES
1. Channel: A channel is a communication path through which the data is transmitted from
the sender device to the receiver device.
2. Baud: The number of changes in a signal per second is known as baud. It is the measuring
unit of the data transfer rate. Technically, baud refers to a number of discrete signal
elements transmitted per second. 1 baud represents only 1 signal change per second and
is equivalent to 1 bit per second.
3. Bandwidth: The amount of data that can be passed along a communication channel in a
given period of time (1 second) is termed as bandwidth. The measuring unit is hertz (Hz),
where 103 Hz = 1 Kilo Hertz (KHz), 103 KHz = 1 Mega Hertz (MHz).
4. Data and Signals: Information that is stored within computer systems and transferred
over a computer network can be divided into two categories—data and signals. Data are
entities that are stored in the form of 0’s and 1’s, which convey some special meaning
to the computer system. When this data is transmitted from one place to another, it is
converted into signal. Signals are the electric or electromagnetic encoding of data and are
used to transmit data.
5. Communication/Transmission Media: It is a means of communication or access (lines
of communication) set up between two organizations to exchange data/information.
Communication media is the way of transmitting the signal from one place to another.
Communication media is also known as transmission media. It plays an important role in
sending and receiving of data to and from the sender and receiver.
6. Data Transfer Rate: It is the amount of data transferred in one direction over a link divided
by the time taken to transfer it in bits per second (bps). The various measuring units are
bits per second (bps) and bytes per second (Bps) or baud, kilobits per second (kbps),
megabits per second (mbps), gigabits per second (gbps), terabits per second (tbps.)
CTM: RJ-45 is a short term for Registered Jack-45. It is an eight-wire connector used to connect computers
on LANs, especially Ethernets.
3. Ethernet Card: It is a hardware device that helps in the connection of nodes within a network.
Ethernet card is also known as a network card, network adapter or NIC (network interface
card). It is a card that allows computers to communicate over a computer network. On
Ethernet card, a physical address of each communicating computer is mentioned. Physical
address is known as MAC address.
8.10
4. Hub: It is multi-port and unintelligent network device which simply transfers data from
one port of the network to another. A hub is a hardware device used to connect several
computers together with different ports. When the packet reaches one port, it is copied to
all other ports of the hub without changing the destination address in the frame. Rather,
it simply copies the data to all of the nodes connected to the hub.
Hubs can be either active or passive. Hubs can usually support 8, 12 or 24 RJ-45 ports.
But the problem with hub is that it is not an intelligent device. It shares bandwidth with
all the attached devices and broadcasts the data, i.e., sends the data frames to all the
connected nodes, as it does not remember devices/computers connected to it. Also, it
cannot filter the data and causes unnecessary traffic jams.
A hub can both send as well as receive information, but only one task at a time. However, a
hub is an inexpensive way to connect multiple nodes/devices to network.
CTM: Hub is a device used to connect several computers with each other.
5. Switch: A switch (switching hub) is a network device which is used to interconnect computers
or devices on a network. It filters and forwards data packets across a network. It is also a
multi-port device but with some intelligence and so the data packets received from one port
of network are refreshed and delivered to the other port of the network. The main difference
between hub and switch is that hub replicates what it receives on one port onto all the other
ports, while switch keeps a record of the MAC addresses of the devices attached to it.
6. Bridge: A bridge is a device that works on the physical layer as well as on data link layer. A
network bridge connects multiple network segments at the data link layer (layer 2) of the
OSI model. Bridges relay frames between two originally separate segments. When a frame
enters a bridge, the bridge not only regenerates the signal but also checks the physical
address of the destination and forwards the new copy only to that port.
8.11
An important advantage of using a bridge is that it is a smarter hub as it can filter network
traffic on the basis of the MAC addresses.
PC 4 PC 5 PC 4 PC 5
PC 1 PC 2 PC 3 PC 1 PC 2 PC 3
Fig. 8.10: Ethernet Bridge
CTM: A bridge is a device that links two segments together of the original network.
7. Gateway: A gateway is a device that connects dissimilar networks. In internet, several networks
are communicating with each other and each network has a different configuration. In
order to make reliable communication, there must be a device that helps in communicating.
Gateway is a device which establishes an intelligent connection between a local area network
and external networks with completely different structures.
******** Workstation
Supplement – Computer Science with Python–XII
Gateway
8. Repeater: A repeater is a device that operates only on the physical layer of the OSI model. As
a signal travels a fixed distance, before attenuation of the signal, a repeater is used which
amplifies and restores signals for long-distance transmission. A repeater is an electronic
device that receives a signal before it becomes too weak and regenerates the original
signal. Also, it is a two-port network device that strengthens the signal intensity and
connects two identical networks. In most twisted pair Ethernet configurations, repeaters
are required for cable runs longer than 100 metres. A repeater does not change the
functionality of the network; instead, it makes the signal strong before it degrades.
Repeaters are also extensively used in broadcasting where they are termed as translators
8.12 or boosters.
Weakened Signal Regenerated Signal
Repeater
Repeater
No signal
through the hill
CTM: Repeater is a device that amplifies a signal that is transmitted across the network so that the signal is
received in the same way as it is sent.
9. Router: A router is a networking device that forwards data packets from the source
machine to the destination machine by using the shortest path. Routers are used at the
network layer, which is the third layer of the OSI model.
INTERNET EXTENDING A NETWORK USING
A LAN CABLE CONNECTION AND A SECOND ROUTER
Secondary
Main Router Router
LAPTOP LAPTOP
MOBILE TAB TAB MOBILE
CTM: A router is a networking device that helps in forwarding packets from one machine to another.
10. Wi-Fi Card: A Wi-Fi card is either an internal or external Local Area Network adapter with a
Computer Networks
built-in wireless radio and antenna. A Wi-Fi card is used in a desktop computer that enables
a user to establish an internet connection. Wi-Fi cards are known as wireless fidelity cards
as they allow the user to set up connection without any wire. Wireless Fidelity (Wi-Fi)
cards are widely used in notebook computers due to their highly portable nature. The most
common Wi-Fi cards used in desktop computers are PCI-Express Wi-Fi cards made to fit
the PCI-Express card slots on the motherboard. 8.13