0% found this document useful (0 votes)
12 views25 pages

Chapter -1

The document provides an overview of computer networks and communication, highlighting their significance in modern life and work. It covers the basics of data communication, types of networks (LAN, MAN, WAN), and various network topologies (Bus, Star, Ring, Mesh, Tree). Additionally, it explains the differences between Internet, Intranet, and Extranet, along with their applications and components.

Uploaded by

Rohit
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views25 pages

Chapter -1

The document provides an overview of computer networks and communication, highlighting their significance in modern life and work. It covers the basics of data communication, types of networks (LAN, MAN, WAN), and various network topologies (Bus, Star, Ring, Mesh, Tree). Additionally, it explains the differences between Internet, Intranet, and Extranet, along with their applications and components.

Uploaded by

Rohit
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 25

a

BASICS OF COMPUTER
NETWORK AND
COMMUNICATION

1.1 INTRODUCTION

The Computer Network and Communication technology, has made the life of
every human being in the world easy and fast. Sitting at home, one can; book the
ticket, buy a product and services, get an academic degree, get and share
information on any topic of your interest (on-line) on some mouse clicks. Not only
that, it has brought the concept of WORK from ANYWHERE ANYTIME; Now
a person can do all official or personal works sitting remotely anywhere and
anytime. Really, it has brought a revolutionary change in the way of work and life
of every human being on the earth.

A Computer Network is an interconnection of various computer systems located


at different places. In computer network, two or more computers are linked together
with a medium (wire or wireless) and communication devices for the purpose of
sharing information and resources (Printer, Scanner, Hard drive etc).

In this lesson you will learn the basics of computer communication, types of network

- and Network topology.


2 :: Certificate in Web Designing and Development

1.2 OBJECTIVES

After going through this lesson, you will be able to:

• describe computer communication and network and its advantages

• explain the different types of networks

• identify different network topologies and their features

• identify the network devices and their uses

• define Network Protocol and OSI Model

• define Internet address and Domain name Service

1.3 DATA COMMUNICATION

Data communication concerns with the transmission (sending and receiving) of


information between two parties. This means sending information between machines,
which are connected together by physical wires orradio lines (wireless). Physical
wire can be twisted copper wire pair, coaxial cables or even fiber optics.

1.4 COMMUNICATION SYSTEM


There are FOUR basic elements involved in a Communication System.

- The four basic elements are i) Sender, ii) Medium, iii) Message & iv) Receiver.

I Sender I Receiver I

- Fig. 1.1: Data Communication System


4 :: Certificate in Web Designing and Development

• Communicating with the students, professors, doctors, scientists


and experts in other fields through live audio and video chat across the
global.

1.7 COMPONENTS OF A COMPUTER NETWORK

Computer networks have the following fundamental components:

• Server: It is a powerful computer that provides services to the other


computers on the network

• Client: Computer that uses the services that a server provides. The client
is usually less powerful than the server

• Peer: A computer that acts as both client and server.


• Media: Physical and non-physical connection between the devices on a
network

• Resources: Anything available to a client on a network is considered to


be a resource. Printers, Scanners, Fax devices, and other networked
devices and information are resources.

• User: Any person that uses a computer to access resources on the


network.

• Protocol: Protocols are rules, methods, procedures used for


communication. These are the language that computers use to talk to
each other over a network.

1.8 TYPES OF COMPUTER NETWORK

A network is no longer just a group of computers in one office or even one


large building. These computers are constantly being connected to each other
to form larger networks. An internet is a large network made up of connected
smaller networks. In other words, Internet is network of Networks.

Depending on the size and coverage area of the network, it can be classified
into following groups:

• Local Area Network (LAN)


A network that connects a group of computers in a small geographical
area such as in a single room, rooms within a building or nearby buildings
is called Local Area Network (LAN). LANs, the most common type of
network used in an organization, are typically high speed networks that
connect computers, printers and other network devices together for
Basics of Computer Network and Communication :: 5

sharing information and resources. For example: Office LAN, Hospital LAN,
Campus Wide LAN, etc.

LAN Characteristics:

• High speed, data transmission rate at least several Mbps( 1-100 Mega Bits!
See)

• Inexpensive medium of data transmission

• High degree of interconnection between computers

• Low error rates

Metropolitan Area Network (MAN)

A Metropo litan Area Network (MAN) is a connection ofLANs located


in a city. For example: if a college had campus with networks at each
spread over majority of a city, they could be connected to create MAN.
MAN s are slower than LAN s but usually have few errors on the network.

MAN typically covers an area of between 5 and 50 km diameter.

MAN characteristics:

• Larger than aLAN, usually a large campus or organization spread over a


city-size area

• Slower than LAN


/
• Expensive equipment

• Moderate error rates

Wide Area Network (WAN)

The term Wide Area Network (WAN) usually refers to a network which
covers a large geographical area. WANs can interconnect any number
of LANs and WANs. They can connect networks across cities, states,
countries, or even the world. For example, for a large company, might
have the head quarter at Delhi and regional branches at Mumbai, Kolkata
and Chennai. In this case the regional branches are connected to head
office through W.<\,N. The largest and most well-known example of a
WAN is Internet. In WAN, the data and information delivery is made via
telephone lines, microwaves or satellites.
6 :: Certificate in Web Designing and Development

Wide area networks are usually slower than MAN sand LANs, and more prone
to errors. Transmission rates are typically 2 Mbps, 34 Mbps, 45 Mbps, 155
Mbps, 625 Mbps (or sometimes considerably more).

Fig: 1.3 Network diagram shows LAN, MAN, and WAN

Difference between LAN and WAN

• LAN is restricted to limited geographic area offew kilometers, but WAN


covers long distance and operates nationwide or even worldwide.

• In LAN, the computer systems usually connected with cables. In WAN


there mayor may not be physical connection. Communication is done
through telephone lines, microwaves or satellites links.

• Cost of data transmission in LAN is less because the transmission


medium is owned by a single organization. In the case of WAN the cost
of data transmission is very high because the transmission medium' is
hired either telephone lines or satellite links.

• The speed of data transmission is much higher in LAN than in WAN.

• Data transmission error in LAN is very less compared to WAN as the


distance covered in LAN is negligible in comparison to WAN

1.9 INTERNET, INTRANET AND EXTRANET

Internet is a worldwide network of computer networks, accessible to anyone.


It includes millions of private and public, academic, business, and government
networks (local or global), linked by copper wire or fiber optic cables or'
wireless devices, and other technology used for global information and
resource sharing.
Basics of Computer Network and Communication :: 7

The information and services available in Internet domain is public in nature and
accessible by everyone.

It is not controlled by any organization and therefore relies on network devices


and accepted conventions and protocols to relay the data traffic until it gets
to its destinations.

Applications of Internet

• Download programs and files


• E-Mail
• Voice and Video Conferencing
• E-Commerce
• File Sharing
• Information browsing
• Search the web addresses for access through search engine
• Chatting

An intranet(intra means within) is an internal private network that is setup


and controlled by an organization, accessed only by authorized persons,
especially members or employees of the organization, to encourage
interaction among its members, to improve efficiency and to share
information, among other things.

Applications of Intranet

• Sharing of company policies/rules/emails & regulations

• Access employee database

• Distribution of circulars/Office Orders

• Access product & customer data

• Sharing of information of common interest

• Launching of personal/departmental home pages

• Submission of reports

- • Corporate telephone directories

The difference between an intranet and the Internet is defined in terms of


accessibility, size and control. Unless content filters are being used or the
government is censoring some content, the entire Internet's content is
8 :: Certificate in Web Designing and Development

accessible to everyone. On the other hand an intranet is owned and controlled by


a single organization that decides which members are allowed to
access complete or partial content as per access write policy. In general, an
intranet is usually very small and is restricted to the premises of a single
organization. In addition Intranet is a logical concept while Internet is a
physical concept.

An extranet is an extended intranet. In addition to allowing access to members


of an organization, an extranet uses firewalls, access profiles, and privacy
protocols to allow access to users from outside the organization. Extranet is
an Intranet for outside authorized users. It enables outsiders to work together
with the internal employees of an organization. Examples: Dealers/
distributors have access to product files such as product specification, pictures,
images, etc., to answer the queries of the customer.

Both intranets and extranets are owned, operated and controlled by one
organization. However, the difference between intranet and extranet is defined
in terms of who has access to the private network and the geographical reach
of that network. Intranet allow only members of the organization to access
the network, while an extranet allows persons from outside the organization
(i.e. business partners and customers) to access the network. Usually, network
access is managed through the administration of us ernames and passwords,
which are also used to determine which parts of the extranet a particular user
can access.

Internet Intranet Extranet

What is it? Worldwide Internal private Extended Intranet


network of network of an for outside
computer organization authorized users of
networks an organization

Owner NoOne Organization Organization


Access Open Private Restricted , By
agreement only
Users Public Members of the Outside users such
Organization as business partners
of the organization

Information General Proprietary selective

Similarities and differences between the Internet,


Intranet and Extranet
Basics of Computer Network and Communication :: 9

1.10 NETWORK TOPOLOGY

In the context of communication network the computers may be arranged and


connected indifferentways. The term topology descnbes the physicalconfiguration
of cables, computer and network devices.

The choice oftopology is dependent upon:

• Type and number of equipment being used


• Planned applications and rate of data transfers
• Required response times
• Cost
Network topologies are categorized into the following three basic types:

• Bus topology

• Star Topology

• Ring Topology

Other variants of Network Topologies are:

• Mesh Topology

• Tree Topology

• Hybrid Topology

1.10.1 Bus Topology


.

T-connector

/
Terminator

Fig: 1.4 Bus Topology


10 :: Certificate in Web Designing and Development

In this, all devices are connected to a central cable, called the bus or
backbone. Bus networks are relatively inexpensive and easy to install for
small networks. It has a single cable with terminators at each end.

Advantages of a Linear Bus Topology

• Easy to connect a computer or peripheral to a linear bus.

• Requires less cable length than a star topology.

Disadvantages of a Linear Bus Topology

• Entire network shuts down if there is a break in the main cable.

• Terminators are required at both ends of the backbone cable.

• Difficult to identify the problem if the entire network shuts down.

• Not. meant to be used as a stand-alone solution in a large building.

1.10.2 Star Topology

This is a network topology in which the components are connected by


individual cables to a central point called a "bub" that may be a hub, switch
or router. When a computer or other networking components transmits a
signal to the network, the signal travels to the hub which forwards the signal
simultaneously to all other components connected to the hub.

Computer

Computer

-
Fig: 1.5 Star Topology
Basics of Computer Network and Communication :: 11

Star topology is the most popular way to connect computers in a workgroup or


departmental LAN.

Compared to the bus topology, a star network generally requires more cable, but
a failure in any star network cable will only take down network access of that
computer that is attached to this cable only and remaining LAN remained contected.
(Ifthe hub/switch fails, however, the entire network also fails.)

Advantages ofa Star Topology

• Easy to install and wire.

• No disruptions to the network then connecting or removing devices.

• Easy to detect faults and to remove parts.

Disadvantages of a Star Topology


• Requires more cable length than a linear bus topology.
• Ifthe hub fails, computers attached are disabled.
• More expensive than linear bus topologies because ofthe cost ofthe hub.

1.10.3 Ring Topology

This is a network topology in which network stations are connected along a single
path whose ends are joined to form a circle. In a ring network, every device has
exactly two neighbors for communication purposes.

Fig: 1.6 Ring Topology


Comp.", /

Data flow on a ring network travels from computer to computer in one direction,
12 :: Certificate in Web Designing and Development

as shown in Fig. 1.6. The signal is actually retransmitted by each system when
passed on to its neighbor. This provides a reliable signal that can travel a large
network. Token passing is frequently used on the ring topology all messages travel
through a ring in the same direction (either "clockwise" or "counterclockwise"). A
failure in any cable or device breaks the loop and with this system, a token is
passed around the network. The workstation that has control of the token can
transmit data. The data travels the ring to its destination. The destination device
returns an acknowledgement to the sender. The token is then given to another
device, giving its ability to transmit.

Ring topologies are found in some office buildings or school campuses.

Advantages of ring Topology

• It provides an orderly network in which every device has access to the token
and can transmit.

• It performs well under a heavy load.

Disadvantages of ring topology

• Malfunctioning workstations and cables create problems for the entire


network.

• Changes made when adding or removing a device affect the network.

1.10.4 Mesh Topology

This is a networking topology in which additional networking components are


used to provide redundant data paths. Mesh topologies involve the concept of
routes. Unlike the previous topologies, messages sent on a mesh network can
take any of several possible paths from source to destination. A true mesh network
uses separate cables to connect each device to every other device on the network,
providing a straight communication path, as shown in figure 1.7.
Basics of Computer Network and Communication :: 13

Computer

Fig: 1.7 Mesh Topology

This topology provides the highest level offault tolerance. If a wire, hub, switch,
router, or other component fails, data can still travel along an alternate path.

A diagram of a mesh network might resemble a portion of a fishing net. A mesh


topology is often used in large backbone networks in which failure of a single
switch or router can result in a large portion ofthe network going down.

Some WANs, most notably the Internet, employ mesh routing.

Advantages of Mesh topology:

• Enhanced fault tolerance provided by redundant links

• Easy to troubleshoot

Disadvantages of Mesh topology

• Difficult to install and maintain

• Costly to provide redundant links

1.10.5 Tree Topology

A tree topology combines characteristicsoflinear bus and star topologies. It consists


of groups of star-configured workstations connected to a linear bus backbone
14 :: Certificate in Web Designing and Development

cable as shown in the Figure 1.8. Tree topologies allow for the expansion of an
existing network.

Fig: 1.8 A Tree Topology

1.10.6 Hybrid Topology

AHybridTopologyisacombinationoftwo or more above topologies. For example,


a tree network connected to a tree network is still a tree network, but tWQ star
networks connected together exhibit hybrid network topologies.

Fig: 1.9 Hybrid Topology


Basics of Computer Ne~ork and Communication :: 15

INTEXT QUESTION 1.1


1. A network that connects a group of computers in a small geographical
area is called
----------------
2. In a ring network every device has exactly number of
neighbours for communication purposes.

1.11 NETWORK DEVICES


The capacity of LAN may reach its limit on distance or number of nodes on
a segment. This may happen when the network segment is too long, causing
client connection errors or abundant collisions on Ethernet network. When
this happens, there is a need to have hardware devices such as Bridges or
Repeaters to allow expansion of network.

Repeater
One ofthe easiest devices you can use to extend the distance of a network by
boosting the signals is called a repeater.

Repeaters are used between a pair of segments to provide signal amplification


and regeneration to restore a good signal level before sending it from one
cable segment to another. By allowing two or more LAN segments to be
connected, they allow the network to span a larger distance ..Repeaters are
used in LANs, MAN and WANs.

Repeaters are very inexpensive and easy way to extend a network. Repeaters do
not have a lot ofbuilt-in intelligence, for this reason they cannot connect dissimilar
network types.

Fig: 1.10 Repeater

Advantages of Repeaters
<

• Repeaters easily extend the length of a network.


• They require no processing overheads, so very little, if any, performance
degradation occurs.
16 :: Certificate in Web Designing and Development

• You can connect segments from the same network type that use different
types of cable.
Disadvantages of Repeaters
• Repeaters cannot be used to connect segments of different network types.
• Many types of networks have limits on the number of repeaters that can
be used at once.

Hub

A hub is a network device that is used for connecting computers on a Local


Area Network (LAN). Its main function is to forward the data it receives to
all its ports. Hubs are a form of repeater which has multiple ports (they are
sometimes also known as "multi-port repeaters"). Hubs range in size from
four ports up to several hundred and are specific to the network types. The
hubs have been replaced by switches and are no longer used.

Ethernet hub

LAN

Fig: 1.11 Hub

Advantages of hub:

• Hubs need almost no configuration

• No processing is done at the hub to slow down performance.

Disadvantages of hub:

• Hubs have no intelligence to filtertraffic, so all data is sent to allports weather


it is needed or not.

• Since hubs can act as repeaters, networks using them must follow the
same rule as repeaters.
-
Basics of Computer Network and Communication :: 17

Switch
A switch is smarter device than a hub. Although it performs similar function like
hub, it makes network operate faster because it filters and forwards data between
LAN segments.

Game Console Computer 3


Computer 2

Fig: 1.12 Switch

1.12 INTERNETWORKING DEVICES

Now you know how to extend and expand the capacity of a LAN, look at the
devices you use to connect LANs. Several pieces of hardware that enables
you to connect LANs include:

• Bridges

• Routers

• Gateways

Bridges

Where repeaters do not do any type of filtering of traffic that they pass, bridges
do. Consider an example:· you are in a large conference room where two
meetings going on. People are talking and discussing ideas at each meeting, and
they are doing it loudly. Eventually each party has trouble hearing the people in
their group. A good solution would be to put some sort of barrier between the
groups to block the noise. Now suppose they occasionally needed to pass
information between the two groups. The perfect solution would be something
that blocked the noise but did allow needed information to flow through.
18 :: Certificate in Web Designing and Development

Bridge
LAN A / LAN B

-""-[5
-[5~II-~O
Computer X Computer Y Computer Z

Fig: 1.13 A bridge connecting two LAN segments (A and B).

Bridges are more intelligent than repeaters and have certain advantage over them.

Advantages of Bridges:

• Bridges extend network segment by connecting them together to make


one logical network.

• It reduces traffic flow over a LAN.

• Like repeaters, they can connect similar network types with different cabling.

• Special translation bridges can connect different network types together.

Disadvantages of Bridges;

• It is not able to handle multiple paths.

• They cost more than repeaters due to extra intelligence.

There are two main types ofbridges, transparent and source-route. A translational
bridge is used to connect dissimilar network types.

Routers

Routers are used to extend or segments networks by forwarding packets from


one logical network to another. Routers are most often used in large inter-networks
that use the TCP/IP protocol suite and for connecting TCPIIP hosts and Local
Area Networks (LANs) to the Internet using dedicated leased lines.

They do more than just filter traffic; they make intelligent decisions on the path for
forwarding 0 fthe data.

Advantage of Routers

- • They use highest level of intelligence to route data accordingly.


Basics of Computer Network and Communication :: 19

Disadvantages of Routers

• Higher level of intelligence takes more processing time, which can affect
performance.

• Routers are very complicated which makes installation and maintenance.


difficult.

Gateway

The function of Gateway is to do all necessary conversation of protocols between


similar and dissimilar networks. Gateways are customized and designed to perform
a specific function and are used on a case-by-case basis.

One example of a gateway is for e-mail. Most large companies upgrade their e-
mail system at one time or another. During the upgrade process, there will normally
be two e-mail systems, the original system and the new system, running at once.
Users will still need to mail others on the old system after they are upgraded. To
accomplish this, you can install an e-mail gateway between two systems until the
migration to the new system is finished. This gateway would be written just to
connect the two specific mail systems together.

1.13 NETWORK PROTOCOL

A network protocol is a standard set of rules, procedures, and message formats


that computer systems use and understand when exchanging data with each other.
It defines how messages are sent and received, i.e. the format and order of them,
what happens when messages are transmitted and received.

In order for two computers to talk to each other, they must speak in the same
language. Many different types ofnetwork protocols and standards are required
to ensure that your computer (no matter which operating system, network card,
or application you are using) can communicate with another computer located on
the next desk or anywhere around the world.

Some of the commonly used network protocols are:

TCPIIP(Transmission Control ProtocollIntemet Protocol) is the most popular


Internet protocol suite used for information transfer on the Internet (and other
networks). TCPIIP is a platform-independent standard that bridges the gap between
dissimilar computers (it doesn't matter whether: they are part ofthe same network
or are attached to separate networks), operating systems, and networks.
20 :: Certificate in Web Designing and Development

When two or more networks are involved they are physically connected by devices
called IP routers. A router is a computer that transfers packets of data from one
network to another.

The IP, the Internet Protocol, is responsible for exchanging information between
routers so that the routers can select the proper path for network traffic, while IP
provides the method of distributing data in packets. Thus it can distribute packets
to a destination via different routes, and can handle congestion.

TCP provides virtual circuits, error detection and correction, automatic repeat
requests, and other reliable end-to-end communications using the IP for
transmission. TCP is responsible for ensuring the data packets are transmitted
across the network reliably and error free. The packets may arrive in different
order as path of packet may be different because different routing scheme are
adopted to avo id congestion. Hence these packets need to be reassembled at the
destination. TCPIIP together provide for the most commonly used protocol on the
internet, applications namely e-mail, file transfer, and the basis ofthe HITP protocol
for web page documents.

UDP: User Datagram Protocol (UDP) is a communications protocol that offers a


limited amount of services when messages are exchanged between computers in a
network that uses the Internet Protocol (IP). UDP is an alternative to the TCP and
together with IP, is sometimes referred to as UDPIIP. Like the TCP, UDP uses the
Internet Protocol to actually get a data unit (called a datagram) from one computer
to another. Unlike TCP, UDP does not provide the service of dividing a message
into packets (datagram) and reassembling it at the other end. This protocol provides
a procedure for application programs to send messages to other programs with a
minimum of protoco Imechanism.

UDP is used in Domain Name System, streaming media applications, voice over .
IP, and etc.

HTTP: Hypertext Transfer Protocol(HTTP), used to transfer files on the World


Wide Web.

FTP: File Transfer Protocol (FTP) is the file-sharing protocol most commonly
used in a TCP/IP environment. This protocol allows user to remotely log on to
other computers on a network and browse, download and upload files. FIP is still
very popular because it is platform independent.
Basics of Computer Network and Communication :: 21

SMTP: Simple Mail TransferProtocol(SMTP).anInternet protocol used to


transfer e-mail between computers.

POP: Post Office Protocol (POP), used bye-mail programs (like Microsoft
Outlook) to retrieve e-mails from an e-mail server. If your e-mail program uses
POP, all your e-mails are downloaded to your e-mail program (also called e-mail
client), each time it connects to your e-mail server.

1.14 OSI MODEL: UNDER-STANDING SEVEN LAYERS OF


COMPUTER NETWORKS

The Open Systems Interconnection (OSI)


Appllcltlon LllJer
model, developed by the ISO ~ TlP"docmmui<:>eti"":
~ E~-m:all,tlletransrer,
(International Organization of cliertiSe''Jer.

Standardization) in 1984, is a reference PresentBtltll1U"er lQ


~~rWa(lEnB~~,ocnver~on: w
tool for understanding data ______ B_C_Dt_o_bi=_'_y,_~Q_. ~ j
communications between any two g ••• ian Ltrylilr ~
networked systems. The OSI Model is a strls. stops sessi
M:iiri;.i n~ ordQf',
on.
~
way of thinking about how network ------------------~
Tran"'pad l..eyer
~
'works', it isjust a theoretical model. En:;:urQ~
iilea-
dlIOlli VQry
me~9'=.
01 QrdirQ

The OSI model defines the


communications process into 7 layers,
which divides the tasks involved with
moving information between networked
computers into seven smaller, more
manageable task groups. A task or group
of tasks is then assigned to each ofthe
Fig: 1.14 : OSI 7 layers
seven OSI layers. Each layer is
reasonably self-contained so that the tasks
assigned to each layer can be implemented independently.This enablesthe solutions
offered by one layer to be updated without adversely affecting the other layers.

The OSI 7 layers model has clear characteristics. Layers 7 through 4 deals with
end to end communications between data source and destinations. Layers 3 to 1
deal with communications between network devices.

On the other hand, the seven layers ofthe OSI model can be divided into two
groups: upper layers (layers 7, 6 & 5) and lower layers (layers 4,3,2, 1). The
upper layers of the OSI model deal with application issues and generally are
implemented only in software. The highest layer, the application layer, is closest to
the end user. The lower layers ofthe OSI model handle data transport issues. The
physical layer and the data link layer are implemented in hardware and software.
The lowest layer, the physical layer, is closest to the physical network medium (the
wires, for example) and is responsible for placing data on the medium.
22, :: Certificate in Web Designing and Development

1.14.1 Physical Layer

The OSI Model's layer 1, the Physical Layer, outlines the characteristics of the
physical medium between networked devices=cabling, wiring, fiber strands and
the air. Transmission and receipt of data from the physical medium (copper wire,
fiber, radio frequencies, barbed wire, string etc.) is managed at this layer.

The Physical Layer receives data from the Data Link Layer, and transmits it to the
wire. The physical layer controls the electrical and mechanical functions related to
the transmission and receipt of a communications signal It also manages the encoding
and decoding of data contained within the modulated signal.

The physical layer is responsible for:

1. Communication with the data link layer above it.

2. Fragmentation of data into frames

3. Reassembly offrames into Data Units.

4. Transmission to the physical media

5. Receiving from the physical media

1.14.2 Data Link Layer

The Data Link Layer is the second layer of the OSI model. The Data Link layer
performs four primary functions:

1. Communication with the Network layer above.

2. Segmentation of upper layer datagrarns (also called packets) into frames in


sizes that can be handled by the communications hardware.

3. Bit Ordering. The data link layer organizes the pattern of data bits into frames
before transmission. The frame formatting issues such as stop and start bits,
bit order, parity and other functions are handled here.

4. Communication with the Physical layer below

This layer provides reliable transit of data across a physical link. The data link
layer is concerned with physical addressing, network topology, physical link
management, error notification, ordered delivery of frames, and flow control.
Basics of Computer Network and Communication :: 23

1.14.3 Network Layer

It is the network layer's job to figure out the network topology, handle routing and
to prepare data for transmission. The network layer is concerned with the following
primary functions:

1. Communication with the transport layer above.

2. Encapsulation of transport gata into network layer protocol data units.

3. Management of connectivity and routing between hosts or networks.

4. Communication with the data link layer below.

Examples of network layer protocols include:

• Internet Protocol

• Internet Control Message Protocol (ICMP or "ping")

• Internet Gateway Management Protocol (IGMP)

1.14.4 Transport Layer

This layer is respossible for reliable data transfer functions, the detection of errors,
and retransmission of data to recover those errors or lost data. The transport
layer may use a variety of techniques such as a Cyclic Redundancy Check,
windowing and acknowledgements. If data is lost or damaged it is the transport
layer's responsibility to recover from that error.

1. Communicate with the Session layer above.

2. Reassemble transport protocol data units into data streams

3. Reliable protocols operating at this layer will


• Detect errors and lost data
• Recover lost data
• Manage retransmission of data.

4. Segmentation of data streams into transport protocol data units.

5. Communicate with the Network Layer below.

Examples oftransport layer protocols include:

• Transmission Control Protocol (Reliable)

• User Datagram Protocol (Unreliable)


24 :: Certificate in Web Designing and Development

1.14.5 Session Layer

The session layer tracks connections, also called sessions. The session layer should
keep track of multiple file downloads requested by a particular YIP application,
or multiple telnet connections from a single terminal client, and etc.

The session layer performs the following functions:

1. Communication with the Presentation layer above.

2. Organize and manage one or more connections per application, between


hosts.

3. Communication with the Transport layer below.

1.14.6 Presentation Layer

The Presentation Layer handles the conversion of data between a standards-


based or platform independent formats to a format understood by the local machine.
This allows for data to be transported between devices and still be understood.

The Presentation Layer performs the following functions:

1. Communication with the Application Layer above.

2. Translation of data conforming to cross-platform standards into formats


understood by the local machine.

3. Communication with the Session Layer below.

1.14.7 Application Layer

The OS! model defines the Application Layer as being the user interface.' The
OSI Application Layer is responsible for displaying data and images to the user in
a human-recognizable format and to interface with the Presentation Layer below
it.

1.15 IP (INTERNETPROTOCOL)ADDRESS

By now, you are aware that computers do not understand letters or symbols that
humans use to communicate effectively. All computers understand binary numbers-
i.e., 1s and Os. Thus every host (a computer linked to the Internet) on the Internet
has a unique host number. This number is called the Internet Proto co I address, or
IP address.
Basics of Computer Network and Communication :: 25

1.16 DNS (DOMAIN NAME SYSTEM)

Every host (computer linked to Internet) has a unique host number called as IP
address. You can connect to any host through IP address only, but it is difficult to
remember the 128 bit address number ofhosts. To resolve this, domain-name is
the only solution. Domain name, a unique name of the individualhost computer on
the Internet. With this every computer on the Internet now have a both a domain
name and IP address. To connect to any host through domain name requires some
mechanism that will convert your domain name into IP address.

DNS server, is a server which translates domain names into IP addresses.

As the Internet based on IP addresses, every time you use a domain name, the
DNS server must translate the name into the corresponding IP address. For
example, the domain name www.nios.ac.in might translate to 220.156.188.131.

INTEXT QUESTION 1.2


3. HTTPstandsfor
----------------
4. Which layer is responsible for reliable data transfer functions?

1.17 WHAT YOU HAVE LEARNT

In this lesson you have learnt about communication system, computer network,
various types of network and usage of different network devices like Bridge,
Router, Switch, Gateway, hub etc. in computer network. Also you have learnt
about the Internet protocol address and domain name system.

1.18 TERMINAL QUESTIONS


, ,
1. Explain Comput-er network and its main advantage.

2. Differentiate between LAN, MAN and WAN.

3. What are the different network topologies used in computer network?

4. Explain TCPIIP protocol.

5. How switch is different form hub?

6. Define OSI model.


26 :: Certificate in Web Designing and Development

ANSWER TO INTEXT QUESTIONS

[IT]
1. LAN or Local Area Network.

2. Twoor2

[IT]
1. Hyper Text Transfer Protocol

2. Transport Layer

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy