Network module 1
Network module 1
MODULE 1
1. What is intranet?
An intranet is a private network that can only be accessed by authorized users. The prefix
"intra" means "internal" and therefore implies an intranet is designed for internal
communications. ... For example, a business may create an intranet to allow employees to
securely share messages and files with each other.
2. What are the criteria necessary for an effective and efficient network?
Network criteria: A network must be able to meet certain number of criteria. The most
important are Performance, Reliability and Security.
Performance: Can be measured by transit time and response time. Transit time is the
amountof time required for a message to travel from one device to another. Response
time is theelapsed time between an inquiry and a response. The performance of a network
depends onthe number of users, the type of transmission medium, the capacities of the
connectedhardware and the efficiency of the software.
Reliability: Is measured by the frequency of failures, the time it takes a link to recover
fromfailure and the network robustness in a catastrophe.
Security: This refers to the ability to protect data from unauthorized access.
3. What are the key design issues of a computer network?
Connectivity, Cost-effective Resource Sharing, Support for common Services,and
Performance
4. Explain the different transmission medium used in networks.
Transmission media is classified into two types namely wired media & wireless media.
The medium characteristics of wired media are more significant but, in wireless media
the signal characteristics are important.
Guided Media This kind of transmission media is also known as wired otherwise
bounded media. In this type, the signals can be transmitted directly & restricted in a thin
path through physical links.The main features of guided media mainly include secure,
high-speed, and used in small distances. This kind of media is classified into three types
which are discussed below.
Twisted Pair Cable It includes two separately protected conductor wires. Normally, some
pairs of cables are packaged jointly in a protective cover. This is the most frequently used
type of transmission media and it is available in two types.
UTP (Unshielded Twisted Pair)This UTP cable has the capacity to block interference. It
doesn’t depend on a physical guard and used in telephonic applications. The advantage of
UTP is a low cost, very simple to install, and high speed. The disadvantages of UTP is
liable to exterior interference, transmits in fewer distances, and less capacity.
STP (Shielded Twisted Pair) STP cables includes a particular jacket for blocking outside
interference. It is used in rapid data rate Ethernet, in voice & data channels of telephone
lines.The main advantages of STP cable mainly include good speed, removes crosstalk.
The main disadvantages are hard to manufacture as well as install, It is expensive and
bulky also
Coaxial Cable This cable contains an external plastic cover and it includes two parallel
conductors where each conductor includes a separate protection cover. This cable is used
to transmit data in two modes like baseband mode as well as broadband mode. This cable
is widely used in cable TVs & analog TV networks.The advantages of the coaxial cable
include high bandwidth, noise immunity is good, low cost and simple to install. The
disadvantage of this cable is, the failure of cable can disturb the whole network
Optical Fibre CableThis cable uses the notion of light reflected through a core that is
made with plastic or glass. The core is enclosed with less thick plastic or glass and it is
known as the cladding, used for large volume data transmission.The main advantages of
this cable include lightweight, capacity & bandwidth will be increased, signal attenuation
is less, etc. The disadvantages are high cost, fragile, installation & maintenance is
difficult and unidirectional.
Radio waves These waves are very easy to produce as well as penetrate through
buildings. In this, the transmitting & receiving antennas no need to align. The frequency
range of these waves ranges from 3 kHz to 1GHz. These waves are used in AM &FM
radios for transmission. These waves are classified into two types namely Terrestrial &
Satellite.
Infrared WavesInfrared (IR) waves are used in extremely small distance communication
as they cannot go through obstacles. So it stops intrusion between systems. The range of
frequency of these waves is 300GHz to 400THz. These waves are used in TV remotes,
keyboards, wireless mouse, printer, etc.
5. Briefly explain the channel access methods that have been used on local area bus
network.
In telecommunications and computer networks, a channel access method or multiple
access method allows more than two terminals connected to the same transmission
medium to transmit over it and to share its capacity.
Examples of shared physical media are wireless networks, bus networks, ring networks
and point-to-point links operating in half-duplex mode.
A bus network is a network topology in which nodes are directly connected to a common
half-duplex link called a bus. A host on a bus network is called a station. In a bus
network, every station will receive all network traffic, and the traffic generated by each
station has equal transmission priority. A bus network forms a single network segment
and collision domain. In order for nodes to share the bus, they use a medium access
control technology such as carrier-sense multiple access (CSMA) or a bus master.
Bus topology is the simplest kind of topology in which a common bus or channel is used
for communication in the network. The bus is connected to various taps and droplines.
Taps are the connectors, while drop lines are the cables connecting the bus with the
computer. In other words, there is only a single transmission line for all nodes.
When a sender sends a message, all other computers can hear it, but only the receiver
accepts it(verifying the mac address attached with the data frame) and others reject it.
Bus technology is mainly suited for small networks like LAN, etc.
In this topology, the bus acts as the backbone of the network, this joins every computer
and peripherals in the network. Both ends of the shared channel have line terminators.
The data is sent only in one direction and as soon as it reaches the end, the terminator
removes the data from the communication line(to prevent signal bounce and data flow
disruption).
Features of Bus Topology
• It transmits data only in one direction.
• Every device is connected to a single cable
Advantages of Bus Topology
• It is cost effective.
• Cable required is least compared to other network topology.
• Used in small networks.
• It is easy to understand.
• Easy to expand joining two cables together.
Disadvantages of Bus Topology
• Cables fails then whole network fails.
• If network traffic is heavy or nodes are more the performance of the network
decreases.
• Cable has a limited length.
• It is slower than the ring topology.
Ring topology is a topology in which each computer is connected to exactly two other computers
to form the ring. The message passing is unidirectional and circular in nature.
This network topology is deterministic in nature, i.e., each computer is given access for
transmission at a fixed time interval. All the nodes are connected in a closed-loop. This topology
mainly works on a token-based system and the token travels in a loop in one specific direction.
In a ring topology, if a token is free then the node can capture the token and attach the data and
destination address to the token, and then leaves the token for communication. When this token
reaches the destination node, the data is removed by the receiver and the token is made free to
A number of repeaters are used for Ring topology with large number of nodes, because if
someone wants to send some data to the last node in the ring topology with 100 nodes, then the
data will have to pass through 99 nodes to reach the 100th node. Hence to prevent data loss
repeaters are used in the network.
Data is transferred in a sequential manner that is bit by bit. Data transmitted, has to pass through
each node of the network, till the destination node.
• Easy Installation.
• Less Cabling Required.
• Reduces chances of data collision(unidirectional).
• Easy to troubleshoot(the faulty node does not pass the token).
• Each node gets the same access time.
Star topology is a computer network topology in which all the nodes are connected to a
centralized hub. The hub or switch acts as a middleware between the nodes. Any node requesting
for service or providing service, first contact the hub for communication.
The central device(hub or switch) has point to point communication link(the dedicated link
between the devices which cannot be accessed by some other computer) with the devices.In a
star topology, hub and switch act as a server, and the other connected devices act as clients. Only
one input-output port and one cable are required to connect a node to the central device. This
topology is better in terms of security because the data does not pass through every
node.Example High-Speed LAN
Features of Star Topology
Mesh topology is a computer network topology in which nodes are interconnected with each
other. In other words, direct communication takes place between the nodes in the network.
• Full Mesh: In which each node is connected to every other node in the network.
• Partial Mesh: In which, some nodes are not connected to every node in the network.
In a fully connected mesh topology, each device has a point to point link with every other device
in the network. If there are 'n' devices in the network, then each device has exactly '(n-1)' input-
output ports and communication links. These links are simplex links, i.e., the data moves only in
one direction. A duplex link(in which data can travel in both the directions simultaneously) can
replace two simplex links.Example, the Internet(WAN).
Features of Mesh Topology
• Fully connected.
• Robust.
• Not flexible.
• Complex in design.
• Costly.
Disadvantages of LAN
• LAN will indeed save cost because of shared computer resources, but the initial
cost of installing Local Area Networks is quite high.
• The LAN admin can check personal data files of every LAN user, so it does not
offer good privacy.
• Unauthorized users can access critical data of an organization in case LAN admin
is not able to secure centralized data repository.
• Local Area Network requires a constant LAN administration as there are issues
related to software setup and hardware failures
Personal Area Network(PAN)PAN is a computer network formed around a person. It
generally consists of a computer, mobile, or personal digital assistant. PAN can be used
for establishing communication among these personal devices for connecting to a digital
network and the internet.
Characteristics of PAN
• It is mostly personal devices network equipped within a limited area.
• Allows you to handle the interconnection of IT devices at the surrounding of a single
user.
• PAN includes mobile devices, tablet, and laptop.
• It can be wirelessly connected to the internet called WPAN.
• Appliances use for PAN: cordless mice, keyboards, and Bluetooth systems.
Advantages of PAN
• PAN networks are relatively secure and safe
• It offers only short-range solution up to ten meters
• Strictly restricted to a small area
Disadvantages of PAN
• It may establish a bad connection to other networks at the same radio bands.
• Distance limits.
Metropolitan Area Network (MAN)MAN network covers larger area by connections LANs to a
larger network of computers. In Metropolitan area network various Local area networks are
connected with each other through telephone lines. The size of the Metropolitan area network is
larger than LANs and smaller than WANs(wide area networks), a MANs covers the larger area
of a city or town.
Characteristics of MAN
• It mostly covers towns and cities in a maximum 50 km range
• Mostly used medium is optical fibers, cables
• Data rates adequate for distributed computing applications.
Advantages of MAN
• It offers fast communication using high-speed carriers, like fiber optic cables.
• It provides excellent support for an extensive size network and greater access to WANs.
• The dual bus in MAN network provides support to transmit data in both directions
concurrently.
• A MAN network mostly includes some areas of a city or an entire city.
Disadvantages of MAN
• You need more cable to establish MAN connection from one place to another.
• In MAN network it is tough to make the system secure from hackers
WAN (Wide Area Network) Wide area network provides long distance transmission of data.
The size of the WAN is larger than LAN and MAN. A WAN can cover country, continent or
even a whole world. Internet connection is an example of WAN. Other examples of WAN are
mobile broadband connections such as 3G, 4G etc.
Characteristics of WAN:
• The software files will be shared among all the users; therefore, all can access to the
latest files.
• Any organization can form its global integrated network using WAN.
Advantages of WAN:
• Centralized infrastructure: One of the main advantage of WAN is the that we do not need
to maintain the backup and store data on local system as everything is stored online on a
data centre, from where we can access the data through WAN.
• Privacy: We can setup the WAN in such a way that it encrypts the data that we share
online that way the data is secure and minimises the risk of unauthorized access.
• Increased Bandwidth: With the WAN we get to choose the bandwidth based on the need,
a large organization can have larger bandwidth that can carry large amount of data faster
and efficiently.
• Area: A WAN can cover a large area or even a whole world though internet connection
thus we can connect with the person in another country through WAN which is not
possible is other type of computer networks.
Disadvantages of WAN:
• Antivirus: Since our systems are connected with the large amount of systems, there is
possibility that we may unknowingly download the virus that can affect our system
and become threat to our privacy and may lead to data loss.
• Expensive: Cost of installation is very high.
• Issue resolution: Issue resolution takes time as the WAN covers large area, it is really
difficult to pin point the exact location where the issues raised and causing the
problem.
Some other important types of networks:
WLAN (Wireless Local Area Network):WLAN (Wireless Local Area Network) helps you to
link single or multiple devices using wireless communication within a limited area like home,
school, or office building. It gives users an ability to move around within a local coverage
area which may be connected to the network.
Storage Area Network:A Storage Area Network is a type of network which allows
consolidated, block-level data storage. It is mainly used to make storage devices, like disk
arrays, optical jukeboxes, and tape libraries.
Enterprise private network:Enterprise private network (EPN) networks are build and owned
by businesses that want to securely connect numerous locations in order to share various
computer resources.
Campus Area Network:A Campus Area Network is made up of an interconnection of LANs
within a specific geographical area. For example, a university campus can be linked with a
variety of campus buildings to connect all the academic departments.
Virtual Area Network:A VPN is a private network which uses a public network to connect
remote sites or users together. The VPN network uses "virtual" connections routed through
the internet from the enterprise's private network or a third-party VPN service to the remote
site.It is a free or paid service that keeps your web browsing secure and private over public
Wi-Fi hotspots.
10. What are the features provided by layering?
The main aim of the layered architecture is to divide the design into small pieces.
• Each lower layer adds its services to the higher layer to provide a full set of
services to manage communications and run the applications.
• It provides modularity and clear interfaces, i.e., provides interaction between
subsystems.
• It ensures the independence between layers by providing the services from lower
to higher layer without defining how the services are implemented. Therefore,
any modification in a layer will not affect the other layers.
• The number of layers, functions, contents of each layer will vary from network to
network. However, the purpose of each layer is to provide the service from lower
to a higher layer and hiding the details from the layers of how the services are
implemented.
11. Specify the function of transport layer, network layer and data link layer in OSI reference
model. Discuss the types of address related with these layers and their functions.
OR
Describe the functions of physical layer and data link layer.
OR
Explain the OSI reference model with the help of a neat diagram.
OSI Model
OSI stands for Open System Interconnection is a reference model that describes how
information from a software application in one computer moves through a physical
medium to the software application in another computer.
OSI consists of seven layers, and each layer performs a particular network function.
OSI model was developed by the International Organization for Standardization (ISO) in
1984, and it is now considered as an architectural model for the inter-computer
communications.
OSI model divides the whole task into seven smaller and manageable tasks. Each layer is
assigned a particular task.
Each layer is self-contained, so that task assigned to each layer can be performed
independently.
The seven layers of the OSI Model are a physical layer, data link layer, network layer,
transport layer, session layer, presentation layer, and application layer, as shown in the
following diagram −
The physical layer, data link layer and the network layer are the network support layers.
The layers manage a physical transfer of data from one device to another. Session layer,
presentation layer, and application layer are the user support layers. These layers allow
communication among unrelated software in dissimilar environments. Transport layer
links the two groups.
Physical Layer − Its function is to transmit individual bits from one node to another over
a physical medium.
It is the lowest layer of the OSI model.
It establishes, maintains and deactivates the physical connection.
It specifies the mechanical, electrical and procedural network interface specifications.
Functions of a Physical layer:
Line Configuration: It defines the way how two or more devices can be connected
physically.
Signals: It determines the type of the signal used for transmitting the information.
Data Link Layer− It is responsible for the reliable transfer of data frames from one node to
another connected by the physical layer.
• It is responsible for transferring the packets to the Network layer of the receiver that
is receiving.
• It identifies the address of the network layer protocol from the header.
• It also provides flow control.
• A Media access control layer is a link between the Logical Link Control layer and the
network's physical layer.
• It is used for transferring the packets over the network.
Framing: The data link layer translates the physical's raw bit stream into packets known
as Frames. The Data link layer adds the header and trailer to the frame. The header which
is added to the frame contains the hardware destination and source address.
Physical Addressing: The Data link layer adds a header to the frame that contains a
destination address. The frame is transmitted to the destination address mentioned in the
header.
Flow Control: Flow control is the main functionality of the Data-link layer. It is the
technique through which the constant data rate is maintained on both the sides so that no
data get corrupted. It ensures that the transmitting station such as a server with higher
processing speed does not exceed the receiving station, with lower processing speed.
Error Control: Error control is achieved by adding a calculated value CRC (Cyclic
Redundancy Check) that is placed to the Data link layer's trailer which is added to the
message frame before it is sent to the physical layer. If any error seems to occurr, then the
receiver sends the acknowledgment for the retransmission of the corrupted frames.
Access Control: When two or more devices are connected to the same communication
channel, then the data link layer protocols are used to determine which device has control
over the link at a given time.
Network Layer − It manages the delivery of individual data packets from source to
destination through appropriate addressing and routing.
• It is a layer 3 that manages device addressing, tracks the location of devices on the
network.
• It determines the best path to move data from source to the destination based on
the network conditions, the priority of service, and other factors.
• The Data link layer is responsible for routing and forwarding the packets.
• Routers are the layer 3 devices, they are specified in this layer and used to provide
the routing services within an internetwork.
• The protocols used to route the network traffic are known as Network layer
protocols. Examples of protocols are IP and Ipv6.
Addressing: A Network layer adds the source and destination address to the header of the
frame. Addressing is used to identify the device on the internet.
Routing: Routing is the major component of the network layer, and it determines the best
optimal path out of the multiple paths from source to the destination.
Packetizing: A Network Layer receives the packets from the upper layer and converts
them into packets. This process is known as Packetizing. It is achieved by internet
protocol (IP).
Transport Layer −It is responsible for delivery of the entire message from the source host
to destination host.
• The Transport layer is a Layer 4 ensures that messages are transmitted in the order
in which they are sent and there is no duplication of data.
• The main responsibility of the transport layer is to transfer the data completely.
• It receives the data from the upper layer and converts them into smaller units
known as segments.
• This layer can be termed as an end-to-end layer as it provides a point-to-point
connection between source and destination to deliver the data reliably.
The two protocols used in this layer are: Transmission Control Protocol
• It is a standard protocol that allows the systems to communicate over the internet.
• It establishes and maintains a connection between hosts.
• When data is sent over the TCP connection, then the TCP protocol divides the
data into smaller units known as segments. Each segment travels over the internet
using multiple routes, and they arrive in different orders at the destination. The
transmission control protocol reorders the packets in the correct order at the
receiving end.
Segmentation and reassembly: When the transport layer receives the message from
the upper layer, it divides the message into multiple segments, and each segment is
assigned with a sequence number that uniquely identifies each segment. When the
message has arrived at the destination, then the transport layer reassembles the
message based on their sequence numbers.
Flow control: The transport layer also responsible for flow control but it is performed
end-to-end rather than across a single link.
Error control: The transport layer is also responsible for Error control. Error control is
performed end-to-end rather than across the single link. The sender transport layer
ensures that message reach at the destination without any error.
Session Layer − It establishes sessions between users and offers services like dialog
control and synchronization.
Dialog control: Session layer acts as a dialog controller that creates a dialog between
two processes or we can say that it allows the communication between two processes
which can be either half-duplex or full-duplex.
Synchronization: Session layer adds some checkpoints when transmitting the data in a
sequence. If some error occurs in the middle of the transmission of data, then the
transmission will take place again from the checkpoint. This process is known as
Synchronization and recovery.
Translation: The processes in two systems exchange the information in the form of
character strings, numbers and so on. Different computers use different encoding
methods, the presentation layer handles the interoperability between the different
encoding methods. It converts the data from sender-dependent format into a common
format and changes the common format into receiver-dependent format at the
receiving end.
File transfer, access, and management (FTAM): An application layer allows a user to
access the files in a remote computer, to retrieve the files from a computer and to
manage the files in a remote computer.
Mail services: An application layer provides the facility for email forwarding and
storage.
15. What are the two types of switches used in circuit switching?
OR
What is circuit switching?
OR
What is message switching?
OR
Explain packet switching.
OR
What is switching? Explain about different switching techniques in detail.
Switching techniques
In large networks, there can be multiple paths from sender to receiver. The switching
technique will decide the best route for data transmission.
Switching technique is used to connect the systems for making one-to-one
communication.
Classification Of Switching Techniques
1. Circuit Switching
2. Message Switching
3. Packet Switching
Circuit Switching
• Circuit switching is a switching technique that establishes a dedicated path between
sender and receiver.
• In the Circuit Switching Technique, once the connection is established then the
dedicated path will remain to exist until the connection is terminated.
• Circuit switching in a network operates in a similar way as the telephone works.
• A complete end-to-end path must exist before the communication takes place.
• In case of circuit switching technique, when any user wants to send the data, voice,
video, a request signal is sent to the receiver then the receiver sends back the
acknowledgment to ensure the availability of the dedicated path. After receiving the
acknowledgment, dedicated path transfers the data.
• Circuit switching is used in public telephone network. It is used for voice
transmission.
• Fixed data can be transferred at a time in circuit switching technology.
Communication through circuit switching has 3 phases:
o Circuit establishment
o Data transfer
o Circuit Disconnect
Advantages Of Circuit Switching:
In the case of Circuit Switching technique, the communication channel is dedicated.
It has fixed bandwidth.
Disadvantages Of Circuit Switching:
• Once the dedicated path is established, the only delay occurs in the speed of data
transmission.
• It takes a long time to establish a connection approx 10 seconds during which no
data can be transmitted.
• It is more expensive than other switching techniques as a dedicated path is
required for each connection.
• It is inefficient to use because once the path is established and no data is
transferred, then the capacity of the path is wasted.
• In this case, the connection is dedicated therefore no other data can be transferred
even if the channel is free.
Message Switching
• Message Switching is a switching technique in which a message is transferred as
a complete unit and routed through intermediate nodes at which it is stored and
forwarded.
• In Message Switching technique, there is no establishment of a dedicated path
between the sender and receiver.
• The destination address is appended to the message. Message Switching provides
a dynamic routing as the message is routed through the intermediate nodes based
on the information available in the message.
• Message switches are programmed in such a way so that they can provide the
most efficient routes.
• They have 2 important characteristics:
Store & forward: since the users aren't directly connected, the intermediate nodes
are then responsible for transferring the entire message to the next node in the
path. To do so, each node must have a storage capacity, because a message will
only be delivered if the next node and the link between them are available to
connect otherwise it will be stored indefinitely. A store-and-forward switch thus
forwards a message only if sufficient resources are available and the next node is
ready to accept the data. Hence, it's called store-&-forward property. The store-
and-forward was earlier used in telegraph message switching centers.
Message delivery: here the entire information is compiled into a single message
and then that message is transmitted from source to destination. To successfully
reach its destination each message must contain the routing information in its
header section.
You need to establish a You do not need to Message switching does not need
dedicated path between the establish a dedicated path dedicated physical path.In Message
source and the destination from the source to the switching, the source and destination
before the transfer of data destination. nodes are not connected with each
commences. other. The data transfer is done by the
intermediate nodes.
In-Circuit switching, data In packet switching, data Each message is treated as a separate
is processed and is processed and entity. Each message contains
transmitted at the source transmitted, not only at addressing information, and at each
only. the source but also at the switch this information is read and the
destination. transfer path to the next switch is
decided.
Its initial cost is low. Packet switching demands The cost of message switching is less
high installation costs. than circuit switching.
Each packet follows the Each packet does not Depending on network conditions a
same route. follow the same route. conversation of several messages may
not be transferred over the same path
It does not store and It does store and forward It store and forward transmission.
forward transmission. transmission.
The message is received in In, packet switching The message is received in the order,
the order, which is sent message are received out which is sent from the source.
from the source. of order, which is
assembled at the
destination.
Reserve the entire Never reserves the Message Switching does not reserve
Bandwidth in advance. Bandwidth. the entire bandwidth in advance.