Chapter -1
Chapter -1
BASICS OF COMPUTER
NETWORK AND
COMMUNICATION
1.1 INTRODUCTION
The Computer Network and Communication technology, has made the life of
every human being in the world easy and fast. Sitting at home, one can; book the
ticket, buy a product and services, get an academic degree, get and share
information on any topic of your interest (on-line) on some mouse clicks. Not only
that, it has brought the concept of WORK from ANYWHERE ANYTIME; Now
a person can do all official or personal works sitting remotely anywhere and
anytime. Really, it has brought a revolutionary change in the way of work and life
of every human being on the earth.
In this lesson you will learn the basics of computer communication, types of network
1.2 OBJECTIVES
- The four basic elements are i) Sender, ii) Medium, iii) Message & iv) Receiver.
I Sender I Receiver I
• Client: Computer that uses the services that a server provides. The client
is usually less powerful than the server
Depending on the size and coverage area of the network, it can be classified
into following groups:
sharing information and resources. For example: Office LAN, Hospital LAN,
Campus Wide LAN, etc.
LAN Characteristics:
• High speed, data transmission rate at least several Mbps( 1-100 Mega Bits!
See)
MAN characteristics:
The term Wide Area Network (WAN) usually refers to a network which
covers a large geographical area. WANs can interconnect any number
of LANs and WANs. They can connect networks across cities, states,
countries, or even the world. For example, for a large company, might
have the head quarter at Delhi and regional branches at Mumbai, Kolkata
and Chennai. In this case the regional branches are connected to head
office through W.<\,N. The largest and most well-known example of a
WAN is Internet. In WAN, the data and information delivery is made via
telephone lines, microwaves or satellites.
6 :: Certificate in Web Designing and Development
Wide area networks are usually slower than MAN sand LANs, and more prone
to errors. Transmission rates are typically 2 Mbps, 34 Mbps, 45 Mbps, 155
Mbps, 625 Mbps (or sometimes considerably more).
The information and services available in Internet domain is public in nature and
accessible by everyone.
Applications of Internet
Applications of Intranet
• Submission of reports
Both intranets and extranets are owned, operated and controlled by one
organization. However, the difference between intranet and extranet is defined
in terms of who has access to the private network and the geographical reach
of that network. Intranet allow only members of the organization to access
the network, while an extranet allows persons from outside the organization
(i.e. business partners and customers) to access the network. Usually, network
access is managed through the administration of us ernames and passwords,
which are also used to determine which parts of the extranet a particular user
can access.
• Bus topology
• Star Topology
• Ring Topology
• Mesh Topology
• Tree Topology
• Hybrid Topology
T-connector
/
Terminator
In this, all devices are connected to a central cable, called the bus or
backbone. Bus networks are relatively inexpensive and easy to install for
small networks. It has a single cable with terminators at each end.
Computer
Computer
-
Fig: 1.5 Star Topology
Basics of Computer Network and Communication :: 11
Compared to the bus topology, a star network generally requires more cable, but
a failure in any star network cable will only take down network access of that
computer that is attached to this cable only and remaining LAN remained contected.
(Ifthe hub/switch fails, however, the entire network also fails.)
This is a network topology in which network stations are connected along a single
path whose ends are joined to form a circle. In a ring network, every device has
exactly two neighbors for communication purposes.
•
Comp.", /
Data flow on a ring network travels from computer to computer in one direction,
12 :: Certificate in Web Designing and Development
as shown in Fig. 1.6. The signal is actually retransmitted by each system when
passed on to its neighbor. This provides a reliable signal that can travel a large
network. Token passing is frequently used on the ring topology all messages travel
through a ring in the same direction (either "clockwise" or "counterclockwise"). A
failure in any cable or device breaks the loop and with this system, a token is
passed around the network. The workstation that has control of the token can
transmit data. The data travels the ring to its destination. The destination device
returns an acknowledgement to the sender. The token is then given to another
device, giving its ability to transmit.
• It provides an orderly network in which every device has access to the token
and can transmit.
Computer
This topology provides the highest level offault tolerance. If a wire, hub, switch,
router, or other component fails, data can still travel along an alternate path.
• Easy to troubleshoot
cable as shown in the Figure 1.8. Tree topologies allow for the expansion of an
existing network.
Repeater
One ofthe easiest devices you can use to extend the distance of a network by
boosting the signals is called a repeater.
Repeaters are very inexpensive and easy way to extend a network. Repeaters do
not have a lot ofbuilt-in intelligence, for this reason they cannot connect dissimilar
network types.
Advantages of Repeaters
<
• You can connect segments from the same network type that use different
types of cable.
Disadvantages of Repeaters
• Repeaters cannot be used to connect segments of different network types.
• Many types of networks have limits on the number of repeaters that can
be used at once.
Hub
Ethernet hub
LAN
Advantages of hub:
Disadvantages of hub:
• Since hubs can act as repeaters, networks using them must follow the
same rule as repeaters.
-
Basics of Computer Network and Communication :: 17
Switch
A switch is smarter device than a hub. Although it performs similar function like
hub, it makes network operate faster because it filters and forwards data between
LAN segments.
Now you know how to extend and expand the capacity of a LAN, look at the
devices you use to connect LANs. Several pieces of hardware that enables
you to connect LANs include:
• Bridges
• Routers
• Gateways
Bridges
Where repeaters do not do any type of filtering of traffic that they pass, bridges
do. Consider an example:· you are in a large conference room where two
meetings going on. People are talking and discussing ideas at each meeting, and
they are doing it loudly. Eventually each party has trouble hearing the people in
their group. A good solution would be to put some sort of barrier between the
groups to block the noise. Now suppose they occasionally needed to pass
information between the two groups. The perfect solution would be something
that blocked the noise but did allow needed information to flow through.
18 :: Certificate in Web Designing and Development
Bridge
LAN A / LAN B
-""-[5
-[5~II-~O
Computer X Computer Y Computer Z
Bridges are more intelligent than repeaters and have certain advantage over them.
Advantages of Bridges:
• Like repeaters, they can connect similar network types with different cabling.
Disadvantages of Bridges;
There are two main types ofbridges, transparent and source-route. A translational
bridge is used to connect dissimilar network types.
Routers
They do more than just filter traffic; they make intelligent decisions on the path for
forwarding 0 fthe data.
Advantage of Routers
Disadvantages of Routers
• Higher level of intelligence takes more processing time, which can affect
performance.
Gateway
One example of a gateway is for e-mail. Most large companies upgrade their e-
mail system at one time or another. During the upgrade process, there will normally
be two e-mail systems, the original system and the new system, running at once.
Users will still need to mail others on the old system after they are upgraded. To
accomplish this, you can install an e-mail gateway between two systems until the
migration to the new system is finished. This gateway would be written just to
connect the two specific mail systems together.
In order for two computers to talk to each other, they must speak in the same
language. Many different types ofnetwork protocols and standards are required
to ensure that your computer (no matter which operating system, network card,
or application you are using) can communicate with another computer located on
the next desk or anywhere around the world.
When two or more networks are involved they are physically connected by devices
called IP routers. A router is a computer that transfers packets of data from one
network to another.
The IP, the Internet Protocol, is responsible for exchanging information between
routers so that the routers can select the proper path for network traffic, while IP
provides the method of distributing data in packets. Thus it can distribute packets
to a destination via different routes, and can handle congestion.
TCP provides virtual circuits, error detection and correction, automatic repeat
requests, and other reliable end-to-end communications using the IP for
transmission. TCP is responsible for ensuring the data packets are transmitted
across the network reliably and error free. The packets may arrive in different
order as path of packet may be different because different routing scheme are
adopted to avo id congestion. Hence these packets need to be reassembled at the
destination. TCPIIP together provide for the most commonly used protocol on the
internet, applications namely e-mail, file transfer, and the basis ofthe HITP protocol
for web page documents.
UDP is used in Domain Name System, streaming media applications, voice over .
IP, and etc.
FTP: File Transfer Protocol (FTP) is the file-sharing protocol most commonly
used in a TCP/IP environment. This protocol allows user to remotely log on to
other computers on a network and browse, download and upload files. FIP is still
very popular because it is platform independent.
Basics of Computer Network and Communication :: 21
POP: Post Office Protocol (POP), used bye-mail programs (like Microsoft
Outlook) to retrieve e-mails from an e-mail server. If your e-mail program uses
POP, all your e-mails are downloaded to your e-mail program (also called e-mail
client), each time it connects to your e-mail server.
The OSI 7 layers model has clear characteristics. Layers 7 through 4 deals with
end to end communications between data source and destinations. Layers 3 to 1
deal with communications between network devices.
On the other hand, the seven layers ofthe OSI model can be divided into two
groups: upper layers (layers 7, 6 & 5) and lower layers (layers 4,3,2, 1). The
upper layers of the OSI model deal with application issues and generally are
implemented only in software. The highest layer, the application layer, is closest to
the end user. The lower layers ofthe OSI model handle data transport issues. The
physical layer and the data link layer are implemented in hardware and software.
The lowest layer, the physical layer, is closest to the physical network medium (the
wires, for example) and is responsible for placing data on the medium.
22, :: Certificate in Web Designing and Development
The OSI Model's layer 1, the Physical Layer, outlines the characteristics of the
physical medium between networked devices=cabling, wiring, fiber strands and
the air. Transmission and receipt of data from the physical medium (copper wire,
fiber, radio frequencies, barbed wire, string etc.) is managed at this layer.
The Physical Layer receives data from the Data Link Layer, and transmits it to the
wire. The physical layer controls the electrical and mechanical functions related to
the transmission and receipt of a communications signal It also manages the encoding
and decoding of data contained within the modulated signal.
The Data Link Layer is the second layer of the OSI model. The Data Link layer
performs four primary functions:
3. Bit Ordering. The data link layer organizes the pattern of data bits into frames
before transmission. The frame formatting issues such as stop and start bits,
bit order, parity and other functions are handled here.
This layer provides reliable transit of data across a physical link. The data link
layer is concerned with physical addressing, network topology, physical link
management, error notification, ordered delivery of frames, and flow control.
Basics of Computer Network and Communication :: 23
It is the network layer's job to figure out the network topology, handle routing and
to prepare data for transmission. The network layer is concerned with the following
primary functions:
• Internet Protocol
This layer is respossible for reliable data transfer functions, the detection of errors,
and retransmission of data to recover those errors or lost data. The transport
layer may use a variety of techniques such as a Cyclic Redundancy Check,
windowing and acknowledgements. If data is lost or damaged it is the transport
layer's responsibility to recover from that error.
The session layer tracks connections, also called sessions. The session layer should
keep track of multiple file downloads requested by a particular YIP application,
or multiple telnet connections from a single terminal client, and etc.
The OS! model defines the Application Layer as being the user interface.' The
OSI Application Layer is responsible for displaying data and images to the user in
a human-recognizable format and to interface with the Presentation Layer below
it.
1.15 IP (INTERNETPROTOCOL)ADDRESS
By now, you are aware that computers do not understand letters or symbols that
humans use to communicate effectively. All computers understand binary numbers-
i.e., 1s and Os. Thus every host (a computer linked to the Internet) on the Internet
has a unique host number. This number is called the Internet Proto co I address, or
IP address.
Basics of Computer Network and Communication :: 25
Every host (computer linked to Internet) has a unique host number called as IP
address. You can connect to any host through IP address only, but it is difficult to
remember the 128 bit address number ofhosts. To resolve this, domain-name is
the only solution. Domain name, a unique name of the individualhost computer on
the Internet. With this every computer on the Internet now have a both a domain
name and IP address. To connect to any host through domain name requires some
mechanism that will convert your domain name into IP address.
As the Internet based on IP addresses, every time you use a domain name, the
DNS server must translate the name into the corresponding IP address. For
example, the domain name www.nios.ac.in might translate to 220.156.188.131.
In this lesson you have learnt about communication system, computer network,
various types of network and usage of different network devices like Bridge,
Router, Switch, Gateway, hub etc. in computer network. Also you have learnt
about the Internet protocol address and domain name system.
[IT]
1. LAN or Local Area Network.
2. Twoor2
[IT]
1. Hyper Text Transfer Protocol
2. Transport Layer