Computer Network
Computer Network
Rajat Saxena
1 Introduction
Computer Network
Importance of Computer Networks
Why Build a Computer Network
2 Data Communication
Definition of Data Communication
Fundamental Characteristics of Data Communication
Computer Network
A computer network is a set of data processing nodes that are
interconnected for the purpose of data communication. It is a group of
computer joined with each other to share data and information to perform
a particular predefined task.
Computer Networking
Computer networking is the scientific and engineering discipline concerned
with communication and sharing of resources between computers.
Data Sharing
Sharing of data files stored in local disk of one computer. This data can
be accessed from other computer present on either same network or
different network.
Resource Sharing
Resource sharing to one computer from other computer present on either
same network or different network is very important issue. This features
reduces the cost of making the resource physical available on every
computer.
Network Security
Main feature of network is to restrict the unauthorized access of the
resources on the computer.
Performance
Performance can be measured by transit time and response time. Transit
time is the amount of time required for a message to travel from one
device to another. Response time is the elapsed time between an inquiry
and a response. The performance of a network depends on number of
users, the type of transmission medium, the capabilities of the concerned
hardware, and the efficiency of the software. Performance can also
evaluated by throughput and delay. For a good system, we need high
throughput with less delay.
Network Reliability
Network reliability can be observed by accuracy of delivery, frequency of
failure, time required for recovery from a failure, robustness of network in
a disaster.
Network Security
Network security includes protecting data from unauthorized access,
damage, data losses. It also measured from implementing policies and
procedures for recovery from breaches.
1. Delivery
The system must deliver data to the correct destination. Data must be
received by the intended device or user and only by that device or user.
2. Accuracy
The system must deliver the data accurately. Data that have been altered
in transmission and left uncorrected are unusable.
3. Jitter
Jitter refers to the variation in the packet arrival time. It is the uneven
delay in the delivery of audio or video packets.
4. Timeliness
The system must deliver data in a timely manner. Data delivered late are
useless. In the case of video and audio, timely delivery means delivering
data as they are produced, in the same order that they are produced, and
without significant delay. This kind of delivery is called real-time
transmission.
1. Message
The message is the information (data) to be communicated. Popular
forms of information include text, numbers, pictures, audio, and video.
2. Sender
The sender is the device that sends the data message. It can be a
computer, workstation, telephone handset, video camera, and so on.
Rajat Saxena (SUAS, Indore) CN July 31, 2019 13 / 34
A Data Communication system has Five Components.
3. Receiver
The receiver is the device that receives the message. It can be a computer,
workstation, telephone handset, television, and so on.
4. Transmission medium
The transmission medium is the physical path by which a message travels
from sender to receiver. Some examples of transmission media include
twisted-pair wire, coaxial cable, fiber-optic cable, and radio waves.
5. Protocol
A protocol is a set of rules that govern data communications. It represents
an agreement between the communicating devices. Without a protocol,
two devices may be connected but not communicating, just as a person
speaking French cannot be understood by a person who speaks only
Japanese.
Rajat Saxena (SUAS, Indore) CN July 31, 2019 14 / 34
Data Flow
2. Half-Duplex
In half-duplex mode, each station can both transmit and receive, but not
at the same time. When one device is sending, the other can only receive,
and vice versa. The half-duplex mode is like a one-lane road with traffic
allowed in both directions. When cars are traveling in one direction, cars
going the other way must wait. In a half-duplex transmission, the entire
capacity of a channel is taken over by whichever of the two devices is
transmitting at the time. The half-duplex mode is used in cases where
there is no need for communication in both directions at the same time;
the entire capacity of the channel can be utilized for each direction.
Walkie-talkies and CB (citizens band) radios are both half-duplex systems.
Rajat Saxena (SUAS, Indore) CN July 31, 2019 16 / 34
3. Full-Duplex
In full-duplex mode (also called duplex), both stations can transmit and
receive simultaneously. The full-duplex mode is like a two-way street with
traffic flowing in both directions at the same time. In full-duplex mode,
signals going in one direction share the capacity of the link with signals
going in the other direction. This sharing can occur in two ways: Either
the link must contain two physically separate transmission paths, one for
sending and the other for receiving; or the capacity of the channel is
divided between signals traveling in both directions. One common example
of full-duplex communication is the telephone network. When two people
are communicating by a telephone line, both can talk and listen at the
same time. The full-duplex mode is used when communication in both
directions is required all the time. The capacity of the channel, however,
must be divided between the two directions.
2. Multi-Point
A multipoint (also called multidrop) connection is one in which more than
two specific devices share a single link.
The term physical topology refers to the way in which a network is laid out
physically. Two or more devices connect to a link; two or more links form
a topology. The topology of a network is the geometric representation of
the relationship of all the links and linking devices (usually called nodes) to
one another. There are four basic topologies possible: mesh, star, bus, and
ring.
1 The use of dedicated links guarantees that each connection can carry
its own data load, thus eliminating the traffic problems that can occur
when links must be shared by multiple devices.
2 A mesh topology is robust. If one link becomes unusable, it does not
incapacitate the entire system.
3 There is the advantage of privacy or security. When every message
travels along a dedicated line, only the intended recipient sees it.
Physical boundaries prevent other users from gaining access to
messages.
4 Point-to-point links make fault identification and fault isolation easy.
Traffic can be routed to avoid links with suspected problems. This
facility enables the network manager to discover the precise location
of the fault and aids in finding its cause and solution.