Academic course on Computer Network Chapter -1 for BCA, Tribhuwan University
** Applicable for other courses as well
Includes the Basic of Computer Network, Topologies, Types of Network
1. Unit 1 : Introduction to
Computer Network
Chandan Gupta Bhagat
2. Computer Network Definition
A computer network is a digital telecommunications network which allows
nodes to share resources (such as printers and CDs), exchange files, or
allow electronic communications.
In computer networks, computing devices exchange data with each other
using connections (data links) between nodes.
These data links are established over cable media such as wires or optic
cables, or wireless media such as Wi-Fi. Computer network connects two or
more autonomous
computers.
The computers can be geographically located anywhere.
4. What is Computer Network
• A computer network is a set of devices (often referred to as nodes)
connected by communication links.
• A node can be a computer, printer, or any other device capable of sending
or receiving data from the other node/device through the network.
5. Computer Network Criteria
1. Performance
It can be measured in many ways and depends on the number of factors
• No of users
• Type of transmission medium
• Response time
• Transit time
• Hardware
• Software
1. Reliability
This is measured by the following factors
• Frequency of failure
• The recovery time of a network after a failure.
• Damage
1. Security
Network security issues include protecting data from the following
• Unauthorized access
• Viruses
6. Advantages of CN
File Sharing: Networks offer a quick and easy way to share files directly.
Resource Sharing: All computers in the network can share resources such as
printers, fax machines, modems and scanners.
Communication: Those on the network can communicate with each other via e-
mail, messages etc.
7. Advantages of CN
File Sharing: Networks offer a quick and easy way to share files directly.
Resource Sharing: All computers in the network can share resources such as
printers, fax machines, modems and scanners.
Communication: Those on the network can communicate with each other via e-
mail, messages etc.
Flexible Access: Networks allow their users to access files from computers
throughout the network.
Sharing of Information: Computer networks enable us to share data and
information with the computers that are located geographically large distance apart.
8. 1.2 Network Topology
The network topology defines the way in which computers, printers, and other
devices are connected.
A network topology describes the layout of the wire and devices as well as the
paths used by data transmissions.
Network Topology refers to the logical arrangement or layout of a network and a
description of how various nodes(sender/receiver) are connected and communicate
with each other.
9. Bus Topology
Bus topology is a network, in which all the computer nodes and network system are
connected to a single transmission channel.
Linear Bus topology: when it has exactly two endpoints.
Distributed Bus topology: when it has more than two endpoints.
Features of Bus topology
– It transfers the data in a single direction.
– There is a single connection between the node/system and the channel.
10. Bus Topology (Contd.)
Advantages of Bus topology
1. It is easy to connect a device and handle
2. Take less time to set up
3. It is best-suited for small networks.
4. Easy to expand.
Disadvantages of Bus topology
1. If the backbone cable fails, then the whole network will be down.
2. No bi-directional communication.
3. Not suitable for heavy traffic data transmission as it increases the chance of
collision.
11. Star & Tree Topology
The star topology is the most commonly used architecture in Ethernet LANs.
When installed, the star topology resembles spokes in a bicycle wheel.
Larger networks use extended star topology also called tree topology. When used
with network devices that filter frames or packets, like bridges, switches, and routers,
this topology significantly reduces the traffic on the wires by sending packets only to
the wires of the destination host.
12. Ring Topology
A frame travels around the ring, stopping at each node. If a node wants to transmit
data, it adds the data as well as the destination address to the frame.
The frame then continues around the ring until it finds the destination
node, which takes the data out of the frame.
Single ring – All the devices on the network share a single cable
Dual ring – The dual ring topology allows data to be sent in both directions.
13. Mesh Topology
The mesh topology connects all devices (nodes) to each other for redundancy and
fault tolerance.
It is used in the WANs to interconnect LANs and for mission critical networks like
those used by Banks and financial institutions
Implementing the Mesh topology is expensive and difficult
14. 1.3 Overview of Network Types
Types of Computer Networks (by their size / area/ geographical area)
A computer network is a group of computers linked to each other that enables the
computer to communicate with another computer and share their resources, data, and
applications.
A computer network can be categorized by their size.
Local Area Network (LAN)
Metropolitan Area Network (MAN)
Wide area network (WAN)
16. Local Area Network (LAN)
Network in small geographical Area (Room, Building or a Campus) is called LAN
(Local Area Network)
Connecting two or more personal computers
Less costly
Data is transferred at an extremely faster rate
Provides higher security
17. Metropolitan Area Network (MAN)
Network in a City is call MAN (Metropolitan Area Network)
MAN network covers larger area by connections LANs to a larger network of
computers.
The size of the MAN is larger than LANs and smaller than WANs (wide area
networks), a MANs covers the larger area of a city or town.
18. Campus Area Network (CAN)
Campus Area Network (CAN) is a group of interconnected Local Area
Networks (LAN) within a limited geographical area like school campus,
university campus, military bases, or organizational campuses and corporate
buildings etc.
This Campus Area Network also called as Corporate Area Network.
Sometimes this network is also referred as Residential Network or ResNet as
it is only used by residents of specific campus only.
19. Personal Area Network (PAN)
Personal area network (PAN) is an interconnection
between different devices like smartphone, tablet, computer
and other digital devices.
PAN is used for a personal purpose like data sharing
among devices and it has a range of 10 meters. Some type
of personal area networks is wired like USB while others
are wireless like Bluetooth.
Wireless personal area network is also known as WPAN.
20. Wide Area Network (WAN)
A Wide Area Network is a network that extends over a large
geographical area such as states or countries.
A WAN is quite bigger network than the MAN.
A WAN is not limited to a single location, but it spans over a large
geographical area through a telephone line, fiber optic cable or satellite
links.
The internet is one of the biggest WAN in the world.
A WAN is widely used in the field of Business, government, and
education.
22. Client-Server
Centralized Computing
Network Computing Models (Client-Server Network)
A client-server network is where every client is connected to the
server .
Server or mainframe computer has huge storage and processing
capabilities.
23. Peer to Peer [P2P]
In peer to peer architecture all the computers in a computer network
are connected with every computer in the network.
Every computer in the network uses the same resources as other
computers.
There is no central computer that acts as a server rather all
computers acts as a server for the data that is stored in them.
24. Peer to Peer [P2P]
Advantages of a Peer to Peer Architecture
Less costly is no central server that has to take the backup.
In case of a computer failure all other computers in the network are not affected and they will
continue to work as same as before the failure.
Installation of peer to peer architecture is quite easy as each computer manages itself.
Disadvantages of a Peer to Peer Architecture
Each computer has to take the backup rather than a central computer and the security
measures are to be taken by all the computers separately.
Scalability is an issue in a Peer to Peer Architecture as connecting each computer to every
computer is a headache on a very large network.
25. Overview of Protocols and Standards
Protocols:
A protocol is a set of rules that governs(control) data communications.
A protocol defines what is communicated, how is communicated, and when it is communicated.
The key elements of a protocol are :
Syntax
Semantics
Timing
26. Overview of Protocols and Standards
Elements of PROTOCOLS:
Syntax
Structure or format of the data.
Indicates how to read the bits - field border or boundary.
Syntax should be same in sender and receiver for to communicate.
Semantics
Interprets the meaning of the bits
Knows which fields define what action
Interpretation of the syntax should be same
Timing
When data should be sent and what
Speed at which data should be sent or speed at which it is being received
27. Overview of Protocols and Standards
Standards:
Standards provide guidelines to manufacturers, vendors, government agencies,
and other service providers to ensure the kind of interconnectivity necessary in
today's marketplace and in international communications.
Standards are essential in creating and maintaining an open and competitive
market for equipment manufacturers and in guaranteeing.
Data communication standards fall into two categories:
de facto (meaning "by fact" or "by convention")
de jure (meaning "by law" or "by regulation").
28. Overview of Protocols and Standards
Standards:
Two Categories of Standards
De facto: Standards that have not been approved by an organized body but
have been adopted as standards through widespread use are de facto standards.
De facto standards are often established originally by manufacturers who seek to
define the functionality of a new product or technology.
De jure: Those standards by law or by regulation. These are the standards
recognized officially by an Organization.
29. Overview of Protocols and Standards
Standards Organizations
• Standards are developed through the cooperation of standards creation
committees, forums, and government regulatory agencies.
Standards Creation Committees :
• While many organizations are dedicated to the establishment of standards, data
telecommunications in North America rely primarily on those published by the
following:
• International Organization for Standardization (ISO): The ISO is a multinational
body whose membership is drawn mainly from the standards creation committees
of various governments throughout the world. The ISO is active in developing
cooperation in the fields of scientific, technological, and economic activity.
• International Telecommunication Union-Telecommunication Standards
Sector (ITU-T): This committee was devoted to the research and establishment of
standards for telecommunications in general and for phone and data systems in
particular.
30. Overview of Protocols and Standards
Standards Creation Committees :
American National Standards Institute (ANSI): Despite its name, the American National
Standards Institute is a completely private, nonprofit corporation not affiliated with the U.S.
federal government.
Institute of Electrical and Electronics Engineers (IEEE): It is the largest professional
engineering society in the world. International in scope, it aims to advance theory, creativity,
and product quality in the fields of electrical engineering, electronics, and radio as well as in all
related branches of engineering.
Electronic Industries Association (EIA): Aligned with ANSI, It isa nonprofit organization
devoted to the promotion of electronics manufacturing concerns. Its activities include public
awareness education and efforts in addition to standards development. In the field of
information technology, the EIA has made significant contributions by defining physical
connection interfaces and electronic signaling specifications for data communication.
31. OSI Reference Model
ISO- International Organizations for Standard
OSI- Opens System Interconnections
Stats developing in late 1970s
Approved by 1984
The term “Open” in Open System Interconnections denotes “to communicate with any 2 systems”
There are 7 layers in OSI Reference model
It is also called OSI layered architecture / OSI Protocol architecture
The process of breaking up the functions or tasks of networking into layers reduces
complexity.
Each layer provides a service to the layer above it in the protocol specification.
Each layer communicates with the same layer’s software or hardware on other computers.
32. OSI Reference Model
The lower 4 layers are concerned with the flow of data
from end to end through the network an also knows as
lower layers.
The upper Three layers of the OSI model are orientated
more toward services to the applications an also known
upper layers.
33. OSI Reference Model
Layer 7, Application: The Application layer provides services to the software
through which the user requests network services. Your computer application
software is not on the Application layer. This layer isn’t about applications and
doesn’t contain any applications. In other words, programs such as Microsoft Word
or Corel are not at this layer, but browsers, FTP clients, and mail clients are.
Layer 6, Presentation: This layer is concerned with data representation and code
formatting.
Layer 5, Session: The Session layer establishes, maintains, and manages the
communication session between computers.
Layer 4, Transport: The functions defined in this layer provide for the reliable
transmission of data segments, as well as the disassembly and assembly of the
data before and after transmission.
34. OSI Reference Model
• Layer 3, Network: This is the layer on which routing takes place, and, as a result,
is perhaps the most important OSI layer. The Network layer defines the processes
used to route data across the network and the structure and use of logical
addressing.
• Layer 2, Data Link: As its name suggests, this layer is concerned with the linkages
and mechanisms used to move data about the network, including the topology,
such as Ethernet or Token Ring, and deals with the ways in which data is reliably
transmitted.
• Layer 1, Physical: The Physical layer’s name says it all. This layer defines the
electrical and physical specifications for the networking media that carry the data
bits across a network.
36. OSI Reference Model
Packaging the data:
Each layer of the OSI model formats the data it receives to suit the functions to
be performed on that layer.
In general, the package of data that moves through the layers is called a
Protocol Data Unit (PDU).
However, as the data is reformatted and repackaged, it takes on unique names
on certain layers. Table 1 lists the name each layer uses to refer to a message
OSI Layer PDU Name
Application Data
Presentation Data
Session Data
Transport Segment
Network Packet
Data Link Frame
Physical Bits
39. OSI Reference Model
At a transmitting side, the data encapsulation method works like this:
User information is converted to data for transmission on the network.
Data is converted to segments and a reliable connection is set up between the transmitting and
receiving hosts.
Segments are converted to packets or data grams, and a logical address is placed in the header so
each packet can be routed through the internetwork.
Packets or datagram are converted to frames for transmission on the local network. Hardware
(Ethernet) addresses are used to uniquely identify hosts on a local network segment.
Frames are converted to bits, and a digital encoding and clocking scheme is used.
40. TCP/IP Models and its comparison with OSI
A reference model (OSI and TCP/IP)
is a conceptual rule of how
communications should take place. It
addresses all the processes required
for effective communication and
divides these processes into logical
groupings called layers. When a
communication system is designed in
this manner, it is known as layered
architecture.
41. TCP/IP Models and its comparison with OSI
Need of layered architecture
It divides the network communication process into smaller and simpler
components, thus aiding component development, design and troubleshooting.
It allows multi-vendor development through standardization of network
components.
It allows various types of network software and hardware to communicate.
42. TCP/IP Models and its comparison with OSI
OSI Model (Open System Inter Connection)
Layer 7 Application · Provides a user interface
Layer 6 Presentation · Presents data
· Handles processing such as encryption/decryption
Layer 5 Session · Keeps different applications data separate
Layer 4 Transport · Provides reliable or unreliable delivery
· Performs error correction before retransmit
Layer 3 Network
·Provides logical addressing, which routes use for path determination
Layer 2 Data Link
·Combines packets into bytes provides access to media using MAC
address performs error detection, not correction.
Layer 1 Physical · Specifies voltage wire speed and pin-out of cables.
43. TCP/IP Models and its comparison with OSI
TCP/IP (Transmission Control Protocol/IP) Model
Application Process (FTP, SMTP)
Transport Transport
Internet Internet
Network Access Network Access
44. TCP/IP Models and its comparison with OSI
TCP/IP Layer
Layer 4: Application Layer
This layer defines TCP/IP application protocols and how host programs interface with Transport layer services
use the network.
Layer 3: Transport Layer
The purpose of this device is to permit devices on the source and destination hosts to carry on a conversation. It
defines the level of service and status of the connection used when transporting data.
Layer 2: Internet Layer
This layer packs data into data packets known as IP datagram, which contain source and destination address (IP
address) information that is used to forward the datagram between hosts and across networks.
Layer 1: Network Access Layer
This layer defines details of how data is physically sent or optically signaled by hardware devices that interface
directly with a network medium, such as co-axial cable, optical fiber or twisted pair, copper wire.
45. TCP/IP Models and its comparison with OSI
PROTOCOL
TCP (Transmission Control Protocol)
UDP (User Datagram Protocol)
Virtual terminal (TELNET)
File transfer(FTP), and
Simple Mail Transfer Protocol/ electronic mail (SMTP)
Domain Name System (DNS),
HTTP (HyperText TransferProtocol)
Stream Control Transmission Protocol (SCTP)
Address Resolution Protocol (ARP)
Reverse Address Resolution Protocol(RARP)
Internet Group Message Protocol (IGMP)
ICMP (Internet Control Message Protocol)
48. Connection and Connection-Oriented Network
Services
A connection-oriented service is one that establishes a dedicated connection between the communicating
entities before data communication formed.
It is modeled after the telephone system.
To use a connection-oriented service, the user first establishes a connection, uses it and then releases it.
In connection-oriented services, the data streams/packets are delivered to the receiver in the same order in
which they have been sent by the sender.
Connection-oriented services may be done in either of the following ways −
Circuit-switched connection: In circuit switching, a dedicated physical path or a circuit is established
between the communicating nodes and then data stream is transferred.
Virtual circuit-switched connection: Here, the data stream is transferred over a packet switched network,
in such a way that it seems to the user that there is a dedicated path from the sender to the receiver. A virtual
path is established here. However, other connections may also be using this path.
49. Connection and Connection-Oriented Network
Services
Network Core
It means the approach to moving data through a network of links and switches.
There are two types:
Circuit Switching
Packet
Switching
50. Connection and Connection-Oriented Network
Services
In circuit switched network, the resources needed along a path (buffer, link transmission rate) to provide for
communication between the end systems are reserved for the duration of the communication session between the
end systems.
It reserves a constant transmission rate in the network‘s links for the duration of the communication. Since
bandwidth has been reserved for this sender-to- receiver. Connection, the sender can transfer the data to the receiver
at the guaranteed constant rate.
In packed switched network, the resources are not reserved for a sessions message use the resources on
demand, and as a consequence may have to wait (i.e. queue) for access to a communication link.
The packet is sent into the network without reserving and bandwidth if one of the links is busy because other
packets need to be transmitted over the link at the same time, our packet will have to wait in a buffer at the sending
side of the transmission link, and suffer a delay
51. Connection and Connection-Oriented Network
Services
There are two approaches in packet switched network
Datagram Network
Any network that forwards the packets according to the destination address is called a datagram
network.
The routers in the internet forwards packets according to the destination address. Hence, internet is datagram
network.
Virtual Circuit Network
Any network that forwards the packets according to virtual circuit identifier (fixed route) is called a virtual circuit
network.
Preplanned route established before packets sent.
52. ISPs, Backbone Network Overview
ISP:
An Internet Service Provider (ISP) is a company such as AT&T, Verizon,
Comcast, or BrightHouse that provides Internet access to companies, families,
and even mobile users. ISPs use fiber-optics, satellite, copper wire, and other forms
to provide Internet access to its customers.
Internet Service Provider (ISP) is a company which provides internet connection
to end user, but there are basically three levels of ISP. Such that Tier-1 ISP, Tier-2 ISP,
and Tier-3 ISP.
54. ISPs, Backbone Network Overview
Tier-1 ISP:
These ISPs are at the top of the hierarchy and they have a global reach they do not pay for any internet traffic through
there network instead lower-tier ISPs have to pay a cost for passing there traffic from one geolocation to another which
is not under the reach of that ISPs. Generally, ISPs at the same level connect to each other and make allow free traffic
passes for each other these ISPs are called peers. Due to this cost is saved. They build infrastructure, such as the
Atlantic Internet sea cables, to provide traffic to all other Internet providers, not end users.
Some examples of tier 1 Internet providers:
Cogent Communications,
Hibernia Networks,
AT&T
55. ISPs, Backbone Network Overview
Tier-2 ISP:
These ISPs is a service provider who connects between tier 1 and tier 3 ISPs. They have regional or country reach and
behave just like Tier-1 ISP for Tier-3 ISP.
Examples of tier 2 ISPs:
Vodafone,
Easynet,
British Telekom
56. ISPs, Backbone Network Overview
Tier-3 ISP:
These ISPs are closest to the end users and helps them to connect to the internet by charging some amount. These ISPs
work on purchasing model. These ISPs have to pay some cost to Tier-2 ISPs based on traffic generated.
Examples of Tier-3 ISPs:
Comcast.
Deutsche Telekom.
Verizon Communications
57. Backbone Network Overview
Backbone is most important part of a system which provides the central support to the rest system, for example
backbone of a human body that balance and hold all the body parts.
Similarly in Computer Networks a Backbone Network is as a Network containing a high capacity connectivity
infrastructure that backbone to the different part of the network.
Actually a backbone network allows multiple LANs to get connected in a backbone network, not a single station is
directly connected to the backbone but the stations are part of LAN, and backbone connect those LANs.
58. Backbone Network Overview
Backbone LANs:
Because of increasing use of distributed applications and PCs, a new flexible strategy for LANs has been introduced. if a
premises wide data communication system is to be supported then we need a networking system which can span over the
required distance and which capable of interconnecting all the equipment in a single building or in a group of buildings.
It is possible to develop a single LAN for this purpose but practically this scheme faces the following drawbacks:
Poor Reliability:
With a single LAN, the reliability will be poor since a service interruption even for a short duration can cause major
problem to the user.
59. Backbone Network Overview
Capacity:
There is a possibility that a single LAN may be saturated due to increase in number of devices beyond a certain
number
Cost:
A single LAN can not give its optimum performance for the diverse requirements of communication and interconnection.
So the alternative for using a single LAN is to use low cost, low capacity, LANs in each building or department and then
interconnection all these LANs with high capacity LAN. such a network is called as Backbone LAN.
The backbone itself is a LAN, it uses a LAN protocol such as ethernet, Hence each connection in the backbone is itself
another LAN. The two very common used architectures are: Bus backbone, Star backbone.
60. Backbone Network Overview
Bus Backbone:
In Bus backbone the topology used for the backbone is bus topology.
In Below figure the Bus backbone structure is used as a distribution backbone for connecting
different buildings in an organization.
The structure is a bridge based (bridge is the connecting device) backbone with four LANs.
61. Backbone Network Overview
Working:
In Figure, structure if a station in LAN 2 wants to send
a frame to some other station in Same LAN then
Bridge 2 will not allow the frame to pass to any other
LAN, hence this frame will not reach the backbone. If
a station from LAN 1 wants to send a frame to a
station in LAN 4 then Bridge 1 passes this frame to
the backbone. This frame is then received by Bridge
4 and delivered to the destination.
62. Backbone Network Overview
Star Backbone:
The topology of this backbone is star topology.
Figure shows the Star backbone in this
configuration, the backbone is simply a switch
which is used to connect various LANs. The switch
does the job of backbone and connect the LANs
as well. This type of backbone are basically used
as distribution backbone inside a building.
63. Backbone Network Overview
There is one more category of backbone network
is Interconnecting of Remote LANs:
Interconnection of Remote control:
In this type of backbone network the connection are
done through the bridge called remote bridges which
acts as connecting devices in connect LANs as point
to point network link.
Example of point to point networks are leased
telephone lines or ADSL lines. Such a point to point
network can be considered as equivalent LAN without
stations.