0 ratings0% found this document useful (0 votes) 51 views60 pageschp-6 Computer Networks Scan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here.
Available Formats
Download as PDF or read online on Scribd
Computer Networks
g.1 INTRODUCTION
the greatest breakthrough in technology and communication over the past 30 years has been
. From emailing a friend to online bill
payment to downloading data from the internet to e-commerce, networking has made our world
much smaller and forever changed the way we communicate
ihe development and advancement of computer networ
salient featur
Nerwork provides which have made our life easy and comfortable, be it sending
gn email, withdrawing money from an ATM, online railway or
zudio and video files, Apart from these, the most extensivel
irline reservation or sharing
ised feature is the Print command
cent from a computer to get a printout from a printer attached to some other computer. All this
involves a network. It is the network that connects various computers to each other and handles
2large volume of data.
Some of the examples of network in our eve
yday life include:
+ Social network
+ Mobile network
+ Network of computers
+ Airlines, railways, banks, hospital networks
5.2 COMPUTER NETWORK—A BRIEF OVERVIEW
Several devices connected to each other for reliable communication/transfer of data constitute
network. A network can consist of a computer, fax machine, printer, camera, cell phone, etc.
eaie i ec il
A collection of interconnected computers is called a Computer Network. Two compute,
or
devices are said to be interconnected if they are capable of sharing and exchanging informa
: ion
by following a protocol (set of rules).
j =
CTM: A computer network is a collection of interconnected computers and other devices to share data and
other resources (hardware and software resources),
A basic network may connect a few computers placed in a room. The network size Tay van
from small to large, depending on the number of computers it connects. A computer network ae
include different types of hosts (also called nodes) like server, desktop, laptop, cellular phonge
Domain
DNS & Data Storage
WiFi
Router
Server
Printer
Fig, 6.2: The Network Diagram
6.2.1 Advantages of Computer Networks
Let us now discuss why networks are essential. Are there any advantages of networked computers
over stand-alone machines? Yes, networked systems are far better. A network uses a distributed
processing system in which a task is divided among several devices which are interconnected.
‘Therefore, instead of a single computer being responsible for completing the entire task, all the
interconnected computers are responsible for completing the task assigned to them. This leads to
better performance with high processing speed.
Networks have several advantages which are described below:
(a) Resource Sharing: The primary use of a network is to share among users programs/
applications, data and peripheral devices connected to the network, irrespective of their
physical location. You must have noticed in your networked computer labs that when a print
command is given on one computer, the document is printed by a printer attached to some
other system. This allows printing of documents by several users and, hence, the printer is
shared by multiple users on the network. Other resources like hard disk, DVD drive, scannet,
etc., can also be shared on a computer network. For example, sharing database, audio and
video files, antivirus software, application software, printers and scanners, etc.
Computer Science with Python_— oOo EO
xi Communications Aco
improved A computer network enables fast, reliable and secure
nication between users. 88
commu saves time and offers easy communication methods. For
example, it. an organization, managers work at diffe
e working on a network, any change
White working of Kany change made by one manager on his/her computer can easily
pe seen by other managers and employees, Thus
information, This increases their efficiency and
cod aring n abate
) Redue ans haring resources also reduces communication cost. Using
public networks, we can send a large quantity of di
networks are playing a very important role in s
video data at a low cost
rent locations to make financial reports.
a network allows managers to easily update
allows them to complete their work quickly.
mmunication Cost; S|
lata at a low cost. Internet and mobile
ending and receiving text, image, audio and
@ Reliability of Data: Reliability means: backing up of data, ie, data can be copied and
stored on multiple computers. In a network
BNR. intacmset tem, all computers are connected to each
other: Thus, the information or message which is shared by each device is stored on their
respective workstations (computers). If, due to some reason (hardware crash, etc.), the data
gets corrupted and, thus, becomes unavailable on one computer, a copy of the same data can
be accessed from another workstation for future use. This leads to smooth functioning and
further processing without disruption,
Central Storage of Data: Files can be stored on a central node (the file server) that can be sha
and made available to each and every user in an organization. With centralized proc
‘iles
@
data is stored and retrieved from a single central location. Thus, there is no duplication of data I
and almost no data redundancy.
i
§.2.2 Disadvantages of Computer Networks ij
These are the main disadvantages of computer network: 1
(a) Cost of set-up and maintenance: It is difficult to set up larger networks as the systems on ih
a network are sophisticated and complex to run. Even cabling and equipment cost can be i
expensive. In addition to this, maintenance cost may be very high for large networks.
(0) Threat to data security: Unauthorized access to data leading to data theft or data corruption,
computer viruses, worms, malware, phishing, etc,, are some of the threats to network security.
6.3 EVOLUTION OF NETWORK
The network did not evolve in a single day; rather, it took decades to become more powerful,
efficient and reliable. The network has passed through several stages which are described below:
* ARPANET (Advanced Research Project Agency Network): ARPANET, which was jointly
designed and named by the Advanced Research Projects Agency (ARPA) and US Department
of Defence (DoD), was the first network and came into existence in 1969. It was a project
that connected a handful of computers at different universities and US DoD for sharing of data
and messages and playing long-distance games, and socializing with people to share their
views. The development of ARPANET led to the development of today’s internet.
+ NSENET (National Science Federation Network): In the mid-80's, another federal agency,
NSFNET, created a new network which was more capable than ARPANET. Its main aim was
to use network only for academic research and not for any private business activity. Later,
many private companies combined their own private networks with ARPANET and NSFNET.
to make a more capable and broad network—the Internet, It is the internet that links two or
more networks to make a large network for sharing information and messages.
2| ARPANET + NSFNET + PRIVATE NETWORKS = INTERNET
Fig. 6.3: Evolution of internet
+ Internet: In the 1990's, internet, which is a network of networks, came into existence. The
internet has evolved from ARPANET. The computers are connected through World Wide Web
that comprises a large network and shares a common communication Protocol (Transmission
Control Protocol-Internet Protocol, TCP/IP). It allows computers of different types to exchange
information and is known as internet. Millions of domestic, business and government networks
are connected with each other for the purpose of sharing files, data, email, etc. Most of the
computers are not connected directly to the internet. Instead, they are connected to smaller
networks which are further connected to a backbone network through gateways.
CTM: Network of networks makes the internet. ]
+ Interspace: Interspace is a software that allows multiple users in a client-server environment
to communicate with each other by sending and receiving data of various types such as data
files, video, audio and textual data in a 3-D environment. It facilitates online real-time exchange
of data. Interspace is the most advanced term of communication available on the internet today.
6.4 HOW DOES INTERNET WORK
One of the greatest things about the internet is that nobody really owns it. It is a global collection
of networks, both big and small. These networks connect together in many different ways to
form the single entity that we know as internet. In fact, the very name comes from this idea of
interconnected networks.
Since its beginning in 1969, the internet has grown from four host computer systems to tens of
millions. However, just because nobody owns the internet does not mean that it is not monitored and
maintained in different ways. The Internet Society, a non-profit group established in 1992, oversees
the formation of the policies and protocols that define how we use and interact with the internet.
eT cases ue RN LU aoogle
alin
| eoogie Bonich fh Feehing Lueky
ennj ofred nF sent ene wee) ahh etl wp ayy,
i
Fig. 6.4(a): Working of the Internet
spabout the basic underlying structure of the internet, eq., domain name servers,
we lear
fe ecess pnts and backbones, We frst nied to tinderstand how our computer connects '
nk access
potter |
computer that is connected to |
t of a network, even taco
speintermet iS Par
ein out home. For example,
sea asea modem and dial a Tocal sep Ps
vy to connect to an Internet
ber
foie Provider (182). At work, Govier? C27
y be part of a Local Area | cable Modem
cout a)
Aetork (LAN), but it most likely stil
crapects to the internet using an ISP
that the company has contra ted with,
‘When t connects to the ISP, it becomes: ce
putoftheitnetwork. The ISP may then
cuaecttoalarger networkand become | __ Wome asian
part of their network. The internet is Fig. 6.4(b): POP and NAP
sinply a network of networks.
\kstlarge communication companies have their own dedicated backbones connecting various
‘gions, In each region, the company has a Point of Presence (POP). The POP is a place for local
seis to access the company's network, often through a local phone number or dedicated line,
Theamazing thing here is that there is no overall controlling network. Instead, there are several
Sighevel networks connecting to each other through Network Access Points or NAPs
Gateway;
teway: Gateway is a device that connects dissimilar networks. A backbone is a central
interco Sr
; necting structure that connects one or more networks just like the trunk of a tree,
tthe source
BN pata eo he message to be sent is broken down into small parts called packets
ee! ph a serial number, eg., 1, 2, 3. All these packets are sent to the destination
Dee. : a computer receives the packets in random order (10 may come before 1)
assembled in the order of their number and message is restored.
Hoy
- itfunetions smoothly:
communicatioy
Every computer connected to the internet uses the same set of rules
Nn. A set of rules is called protocol. Communication protocol used by internet
seis TCP/IP. The TCP (Transmission Control Protocol) part is responsible for divid)
ing the mo
into packets on the source computer and reassembling them at the destination compuger 3%
Unternet Protocol) is responsible for handling the address of the destination Computer sy.
the packet is sent to its proper destination. thar
{na communication network, each device that is part of a network and can receive, Create
or send data to different network routes is called a node. In the context of data communicgn”
a node can be a device such as a modem, hub, bridge, switch, router, digital tele, oh,
Phone handgor
a printer, a computer or a server. s
6.4.1 Elementary Terminology of Networks
1. Nodes (Workstations): The term node refers to computers that are attache
dtoa Networ,
and are seeking to share resources, e,g., PC, smartphones, laptops, ete,
Server: A computer that facilitates sharing of data, software and hardware resources
network, Servers tend to have more memory, processing power and storage than a
workstation,
3. Network Interface Unit (NIU) (MAC Address): A network interface unit is an interpreter
that helps in establishing communication between the server and the client. It is also called
network adapter, LAN adapter or network interface controller: A Media Access Control (Ac)
address is a unique identifier assigned by the manufacturer to NIC for use as a network
address in communications. MAC address is a 12-digit hexadecimal number. MAC address is
usually written in any one of the following formats:
MM:MM:MM:SS:SS:SS
MM-MM-MM-SS-SS-SS
The first half of MAC address contains the ID number of the adapter manufacturer and
second half represents the serial number assigned to the adapter by the manufacturer
For example,
00: AO: C9: 18: CS: 38
ey,
On the
Norma}
Manufacturer Id 1D number
4. IP Address: Every machine on a TCP/IP Network has a unique identifying number called an
IP Address, It is provided by ISP.
5. Domain Name: It is a way to identify and locate the computers connected to the internet. It
must be unique.
6.5 COMPONENTS OF DATA COMMUNICATION
A network comprises several components along with their functionalities that contribute to its
smooth functioning. To form a network, a lot of hardware devices are required which are described
as follows
> Sender: A device or a computer that sends the data.
» Receiver: A device or a computer that receives the data.
* Message: Message is the information to be communicated. It may be text, image, audio or video.
* Transmission Medium: A transmission medium is a physical path through which the data
flows from sender to receiver. A cable or wire or radio waves can be the medium
oN clesta ure UN UCx vot of HUleS that ge
hae VEEN Hata Lhanstision, IE represents the communtoation
y ee ig which ave Wo be FolLoWed by the sending and receiving devices
we
= a.
ren e>, | te Fol
| EF mo ten ne
— cate
— > SS
FQ. 6S: Components ofa Computer Network
i i
g.6 MODES OF DATA TRANSMISSION I
a arog oF Broadband Transmission (hy
ya
« Thesignal isa radio frequency signal oranatog, Ke, it can consist of continuous electrical |
waves that are of varying amplitudes, i
«Telephone networks use this type of transmission, Wa
| © Requires modem for transmitting data over baseband mediun, Wh iy
iy bigtal or Baseband Transmission Wo
Wi
+ No special device for conversion of signal to be transmitted over baseband medium, va i
‘The signal is.a group of discrete electrical units which is transmitted in rapid success |
(0) Parallel Communication
+ When data is transmitted through multiple wires, with each wire carrying each bit itis
called parallel communication,
{@) Serial Communication
+ When bits are sent one after another in a series along a wire, it is called serial
communication,
10001--
nehronous Transm
soos 0001
(@) Synchronous or ion
+ When sender and receiver synchronize their checks before transmission, £e, the sender
first sends control characters to the receiver and then sends the actual data, itis called
synchronous transmission, There is no space between data, hence it is efficient for
sending large amounts of data,
Advantage—Faster than asynchronow
Data Flow
11110000 Becuyer
Synchronous Transmission
mode.
Disadvantage—Costly and complex set-up required
mputer Networks* In asynchronous transmission, data is preceded and succeeded by a start bit ang
toy
bit respectively. No synchronization is required.
Sender 1110001117 0 | 1 ae Q | Receiver
y
/
Endbit Data _ Start bit
Asynchronous Transmission
simple and cheap
Advantage—Hardware required is
Disadvantage—Slower than synchronous mode.
6.7 DIFFERENT WAYS OF SENDING DATA ACROSS NETWORK
There are several ways of sending data from one node to another through network. It can be jn
the form of calls, messages, etc. By using various types of switching techniques, we can establish
the connection/communication.
6.7.1 Network Switching
A network is made up of several interconnected nodes. There can be a point-to-point connection
or star topology between pairs of devices, but both are not relevant for a large network. Hence,
various switching techniques are used to transfer packets of data from one port of a node to another
till they reach the destination. A switched network is made up of a series of interconnected Nodes
called switches,
6.7.2 Switching Techniques
The main goal of networking is the reliable exchange of data or information among several
interconnected nodes. For the delivery of data with accuracy, various types of Switching
techniques are used, namely:
1. Circuit Switching 2. Packet Switching 3. Message Switching
TMi: The technique of sending data across the network is known as Switching technique. The three types
of techniques used are circuit switching, packet switching and message switching.
1. Circuit Switching ‘
Circuit switching provides end-to-end connection between two computers. It is established
usually in a telephone network where one person is making a call and another is receiving a call,
Im a telephone system, the communication must be established between the two participants,
ie, the sender and the receiver. The circuit is established between these two participants before
the transfer of data takes place.
zea
ae
PR
Receiver Caller
Fig. 6.6: Circuit Switching
Momsen aniahe entire link remains dedicated which guarantees the full bandwidth of the
or can use it eve : ; qT
suser cant n if the path remains idle. The following actions take place
sent by the sender to set
is sent by the sender to set up the connection with the receiver. It establishes
tion between the two participants '
est signal
cal connec
@ snysie*
ap os are identifies
odiate nodes are identified, These nodes are also called switching nodes.
er
tint sis av f
ation node is available, it sends back the acknowledgement of receiving a signal
» destina
ne dest ransmission begins.
ata
ence» da
data transmission is. complete, the call can be terminated.
when the
aan crit Saitching is @ connection-oriented service, In this technique, there is a dedicated link
cer’ sender and the receiver and no other call can be made during this link, even ifthe link
ans
packet witching
+ e @, ee] e i it
ig technique, the entire data is divided into small fragments called packets
ayer is of a fixed size, usually 128 bytes or 12 bytes. Packet switching is similar to
operation. Each packet has a source address as well as destination address (IP address)
mitted, in the same way as a postman delivers a letter to a specific destination
uapocret swei
8
gach Pi
st offic
jor being trans!
| address
jsthere f
allows al
destination a
order During th
soeach interme
address, itis receive’
ipaddress.
«no direct connection established between the sender and the receiver, each packet
fferent routes and, therefore, the packets are delivered in a random ‘order at the
dress. Itis the TCP protocol which then arranges all received packets in a sequential
transfer of packets, each packet has to pass through several intermediate nodes,
diate node checks for destination IP address. If the packet matches with the node
.d; otherwise, it is passed on to the next node until it reaches the destination
Mainframe
Receiver
Fig.6.7: Packet Switching
(TW: Packet switching offers a connectionless service. Datais fragmented into ‘small packets and each packet
isoffixed size in packet switching technology.
a. Fs~@5 ux tucles, '>
are bor hoon iver nucly, 2 oe wr» she
aes BER predect Nall wells ie
Ab
ca3, Messape Switching
In message switching, the sender sends the data to a switching office first, which iS then,
'ts buffer: t then checks the available link and, Ifit is free, the data is relayed to another tty
office. This process goes on until the data is sent to the destination (receiver), AS the da ing
stored in a buffer and then sent to the next switching office, it is also called Store ang ¢. thy
switching technique,
CTM: Message switching Is a store and forward switching technique where there is no direct
| between the sender and the receiver. a
6.7.3 Difference between Circuit Switching and Packet Switching
1. Circuit switching reserves the required bandwidth in advance, whereas Packet Switching
bandwidth as and when required by the packets to be transmitted.
2, Circuit switching is a fast technology as compared to packet switching which jg =
mechanism of transferring packets from sender to receiver, ley
3, Circuit switching requires a dedicated path. Once the connection js ¢stablisheg
communication path is entirely dedicated to it until the data is completely transferred f,
sender to receiver, whereas in packet switching, packets can use any dynamic path,
4. Incircuit switching, ifthe path is overloaded, the call is blocked and communication is delayeg.
But in packet switching, packets are allocated to different paths,
5. Circuit-switched networks are used for phone calls and packet-switched networks handle
data
© Packet switching is more efficient because the cost of the link is shared by many users
7. In circuit switching, the telephone message is sent unbroken. The message is Teceived in the
Same order as it is originally sent. In packet switching, the message is broken into smaj
Packets which are randomly sent from source and received in random order at destination,
which is then sequentially arranged,
6.8 DATA COMMUNICATION TERMINOLOGIES
1. Channel: A channel is a communication path through which the data is transmitted from the
sender device to the receiver device.
2, Baud: The number of changes in a signal per second is known as baud. It is the measuring unit
of the data transfer rate, Technically, baud refers to the number of discrete signal elements
transmitted per second, 1 baud represents only 1 signal change per second and is equivalent
to 1 bit per second,
3. Bits per second: It is the measuring unit of speed at which data transfer takes place.
4. Bandwidth: The amount of data that can be passed along a communication channel ina
given period of time (1 second) is termed as bandwidth, ie, it measures the information-
carrying capacity of a line or a network. It is the difference between the highest and lowest
frequencies allowed on a transmission media.
B=fh-fl
where fh and fl are the highest and lowest frequencies. The measuring unit is hertz (Hz),
where 10? Hz = 1 Kilo Hertz (KHz), 10? KHz = 1 Mega Hertz (MHz).
ase eae1
frequency is 80 Hz and lowest frequency is 50 Hz, what is the
and Sif! Infor mation: that is stored within computer systems and transferred over
paper network can be divided into two categories—data and signals. Data are entities 1
oo ire stored in the form of 0's and 1's, which convey some special meaning to the computer
that? When this data is transmitted from one place to another, it is converted into signal,
Beare the electric or electromagnetic encoding of data and are used to transmit data.
‘nmunication/ Transmission Media; It is a means of communication or access (lines
§ SMcommunication) set up between two organizations to exchange data/information.
fommunicatlo” media is the way of transmitting the signal from one place to another.
fommunication media js also known as transmission media, It plays an important role in
fending and receiving of data to and from the sender and receiver.
pata ‘transfer Rate: It is the amount of data transferred in one direction over a link divided
| 1 Aft time taken to transfer tin bits per second (bps) The various measuring units are bits
persecond (bps) and bytes per second (Bps) or baud, kilobits per second (kbps), megabits
per second (mbps), gigabits per second (gbps), terabits per second (tbps.)
1 Kbps=2" bps=1024 bps
1 Mbps=2” bps=1024 Kbps
1 Gbps=2" bps=1024 Mbps
1 Tbps=2" bps=1024 Gbps
Example: A user wants to upload a text document at the rate of 10 pages per 20 seconds.
what will be the required data rate of the channel? (Assume that 1 page contains
{600 characters and each character is of 8 bits).
squire data rate = (10260088)
20
= 6400/1024 bps = 6.25 Kbps
6.9 NETWORK DEVICES
1, Modem: A MODEM (Modulator DEModulator) is an electronic device that enables a computer
totransmit data over telephone lines. It is a device used to convert digital signals into analog
signals and vice versa. There are two types of modems, namely internal modem and external
modem.
Modulation ere decr! Demodulation = PLL
————— > _ Disital signal
ae Sa Demodulation Modulation A
‘Modem Modem
Fig. 6.8(a): Working of Modem
4We know computers store and process data in terms of 0s and 1s. However, to tra
Hy Nsmit d,
from a sender to a receiver, or while browsing the internet, digital data is converteq j.°
analog signal and the medium (be it free-space or a physical media) carries the digta
the receiver. There are modems connected to both the source and destination node, ae
modem at the sender's end acts as a Modulator that converts the digital data into ante
signals while the modem at the receiver's end acts as a Demodulator th,
‘at converts th
analog signals into digital data for the destination node to understand e
RJ-45 Connector: RJ-45 is a standard type of connector for network
cables. The RJ-45 (Registered Jack) connectors are the plug-
in devices used in networking and telecommunications _
applications. They are used primarily for connecting LANs,
particularly Ethernet. Fig 6.8(b): 81-45 Connect
‘CTM:RJ-45 sa short term for Registered Jack-45. itis an eight-wire connector used to connect computenso
LANs, especially Ethernets.
3. Ethernet Card: itis a hardware device that helps inthe connection jp
of nodes within a network. Ethernet card is also known as
a network card, network adapter or NIC (network interface
card). It is a card that allows computers to communicate over “
a computer network. On Ethernet card, a physical address of
each communicating computer is mentioned. Physical address
Fig. 6.8(c): Ethernet Carg
is known as MAC address.
Hub: It is multi-port and unintelligent network device which simply transfers data from
‘one port of the network to another. A hub is a hardware device used to connect several
computers together with different ports. When the packet reaches one port, it is copied to
all other ports of the hub without changing the destination address in the frame. Rather, it
simply copies the data to all of the nodes connected to the hub.
Hubs can be either active or passive. Hubs can usually support 8, 12 or 24 RJ-45 ports.
Fig. 6.9: Hub
But the problem with hub is that it is not an intelligent device. It shares bandwidth with all
the attached devices and broadcasts the data, ie. sends the data frames to all the connected
nodes as it does not remember devices/computers connected to it. Also, it cannot filter the
data and causes unnecessary traffic jams.
A hub can both send as well as receive information, but only one task at a time, However, a
hub is an inexpensive way to connect multiple nodes/devices to network.
TM: Hub is a device used to connect several computers with each other.
Ue e Muna TUT a|
a switch (switching hub) is
gwitel gs on a network. It filters and for,
5. jevie mititendé
ort he packet is Intended across a networy a
‘ ; also
we ence and 0 the data packets receive from o
one
ote to the other port of the networ}
deliv’ replicates what it rece
that Et the MAC addresses of
reo!
ce which is used to interconnect
comp
ards data packe
ts only to one or more de
a multi-port device but
wices for
with some
Port of network are refreshed and
ference between hub and sv
witch is
he other ports, while switch
kee;
rE eps a
Fig. 6.10: Switch
hiss vice that wanes da the conpRES ATLA
copy only to that port.
An important advantage of using a bridge is that it
iS a smarter hub as it can filter network
traffic on the basis of the MAC addresses.
Fig. 6.11: Ethemet Bridge
[[EIMEA ridge is a device that links two segments of the original network together. |
7. Gateway: A gateway is a device that connects dissimilar networks. In internet, several networ
are communicating with each other and each network has a different configuration. In
order to make reliable communication, there must be a device that helps in communicating
Gateway provides the necessary translation of data received from network into a format or
protocol recognized by devices within the internal network.
PTL
STE,Gateway is a device which establishes an intelligent connection between a loc
and external networks with completely different structures.
ase
Web Server
Workstation
-12: Gateway
CTM: Gateway is a device that connects dissimilar networks. : aa
8. Repeater: A repeater is a device that operates only on the physical layer of the OSI model 4.
a signal travels a fixed distance, before attenuation of the signal, a repeater is useq Which
amplifies and restores signals for long-distance transmission. A repeater is an electron, |
device that receives a signal before it becomes too weak and regenerates the original Signal.
Also, it is a two-port network device that strengthens the signal intensity and connects two
identical networks. In most twisted pair Ethernet configurations, repeaters are require
for cable runs longer than 100 metres. A repeater does not change the functionality o¢
the network; instead, it makes the signal strong before it degrades. Repeaters are also
extensively used in broadcasting where they are termed as translators or boosters,
Weakened Signal Regenerated Signal
Repeater
No signal
through the hill
‘Communication only possible by Bouncing the
signal through the repeater
Fig. 6.13: Working of a Repeater
CTM: Repeater is a device that amplifies a signal that is transmitted across the network so that the signal is
received in the same way as it is sent.
Cetera_ A router is a networking device
: out tothe destination rahi wale that forwards data packets from the source
chine ver ani
ret he network layer, Which is the letwork by using the shortest path. Routers are
weed? third layer of the OSI model.
er Us local are
route Re ak hi 2 “' area network to the internet. Compared to
Mitch, a router has advanced capabilities ‘ ate
as er how itis
or yor decide/alter how itis Packaged,
re
ain :
co pried over a different type of networ
sgaaseo be repackaged
the
es IP address to connect a |
as it can analyze the data being carried over a
Land send j i
re sun ose data has been divided nts sles : ae network of a different type. For
3 tk which cannot
assmaller packets and ther
certain size and these packets are to
thandle bigger packets. In such a case,
n sent over the network by a router.
Secondary
Router
LAN CABLE CONNECTION,
—@ urtor
TAB
MOBILE TAB MOBILE
Fig. 6.14: Router
fs is a networking device that helps in forwarding packets from one machine to another,
10, Wi-Fi Card: A Wi-Fi card is either an internal or external Local Area Network adapter with a
built-in wireless radio and antenna. A Wi-Fi card is used in a desktop computer that enables
auser to establish an internet connection. Wi-Fi cards are known as wireless fidelity cards
as they allow the user to set up connection without any wire. Wi-Fi cards are widely used in
notebook computers due to their highly portable nature. The most common Wi-Fi card used
indesktop computers is PCI-Express Wi-Fi card made to fit the PCI-Express card slot on the
motherboard.
6.10 TYPES OF NETWORKS
Acomputer network may be small or big depending upon the number of computers and other
retwork devices linked together: Thus, networks vary in size, complexity and geographical spread
A computer network can be on a table, in a room, building, city, country, across continents or
zround the world. Computer networks can logically be divided into two types:
1. Client-Server network
2. Peer-to-Peer network
Gient-Server network: In Client-Server network, multiple clients or workstations are connected
toatleast one central server. A server is a powerful computer with all applications and hardware
installed in it and a client is a computer which seeks any resource from another So When
clients need access to these resources, they access them from the server. This network is used for
larger networks.
Cuanjes in the network have equivalent,
peer hetwork all nod ;
Peer-to-Peer network: In Peer-to-Peer network, co hi
cet to-Peer network: Ih Pe | server: In this network, all workstations are connected oye bly
and function as both client and serv e Asidall akon GHEE ci
havin Meee ronordata, This networks idea! for small here tereisnana
Sha ‘es, informa ata
of dedicated servers. ae
iy classified as:
On the basis of geographical spread, networks may be cla
Personal Area Network (PAN)
Local Area Network (LAN)
Metropolitan Area Network (MAN)
Wide Area Network (WAN)
1
a
6.10.1 Personal Area Network (PAN)
rks establish communic ad
PANs are small networks used to es| cas P e
handheld devices in the proximity of up to 10 metres using wired USB rey) OF wireen
stems like Bluetooth or Infrared. PANs are used to connect computers, laptops, mobiles ang
other !Tenabled devices to transfer files including emails, digital photos, audio and video rt
PAN may include wireless computer keyboard sy
ion between a computer and
The Bluetooth technology implements PAN. [
mouse, Bluetooth-enabled headphones, wireless printers and TV remotes.
10 Metres
Fig. 6.15: Personal Area Network (PAN)
TM: The network that belongs to a single person or user is known as PAN.
6.10.2 Local Area Network (LAN)
LAN is a privately owned computer network covering a small geographical area (small physical
area), like a home, office or a building such as a school. It can cover an area spread over a few
metres to a radius of a few kilometres.
Occasionally, a LAN can span a group of nearby buildings. In addition to operating in a limited space,
a LAN is owned, controlled and managed by a single person or organization. The geographical area
covered by a LAN can range from a single room, a floor, an office having one or more buildings in
the same premise, a laboratory, school, college or a university campus. The connectivity is done by
means of wires, Ethernet cables, fibre optics or Wi-Fi.
A LAN can be set up using wired media (UTP cables, coaxial cables, etc.) or wireless media
(infrared, Radio waves). Ifa LAN is set up using unguided media, itis known as WLAN (wireless
LAN), The key purpose of a LAN is to share resources. LAN users can share data, programs, printer,
disk, modem, etc.
Computer Science with Python-Xilf i
| jl Py Lae nN is 7)
deisel wy’
TAN in your Home LAN in Office
cauee Cost: Cost signifies that the network should be cost-effective. For this, it is required to
minimize the installation cost. This can be done by selecting an economical transmission
; medium (that is, wires) for data exchange between the network nodes. The network cost
can also be minimized by reducing the distances between the nodes.
‘ > Flexibility: Flexibility signifies that the network must be flexible enough, ic, it should be easy
to reconfigure. Reconfiguring a network means to rearrange the existing nodes or add new
ones on the network.
> Reliability: It refers to the degree of trust that can be placed on a network. Like any other
r system, a network can also encounter failure. A network failure can occur due to the
j following causes:
_ 1. When an individual node stops working.
2. When the entire network fails. This is caused by a more serious fault that stops the
; working of an individual node.
: What is Point-to-Point (P-P) Link
: A P-P link, also known as a dedicated link, is used to connect two nodes in a network. The
function of P-P link is to send and receive data over a network. In a P-P network, each workstation
receives data from only one transmitter and each transmitter transmits data only to one receiver,
Fig. 6.25 shows a P-P link in a network.
Transmit Receive
A |. B
Receive Transmit
Fig. 6.25: A Point-to-Point Link
For better performance, the transmit and receive operations can occur over separate cables or
wires, or they can occur in turns over the same wire by using different transmission techniques.
AP-P link can be established in several ways. The simplest way is to install a P-P link between
each pair of computers over a network.
Computer Science with Python-XIltit LOR Hh
pigisits BTN Ei
wie
ya ¥ PL ines 10M IRAN RY erie ’! 7 jo " 7
re ee Ht ITE, Ae Rd Hed mute
re ws
cnn” SS AMIN: AG Al i iba Rhy hak 10 se we Mek MAD
apnnnieeliorn | Vi aheHesN Dadtiy
mn
won Lath | I AER CON) i ABTA Sait bony dayton
j a 1
taps Mating heynten Meni
st "Ree essere
Sol ee shewnwne wrertiong TOO atone
a“
Dg he Hh ipseeipis are ihy
, wines Media (WINE aM AY: WAKA tation wre Bary racer n wh Pye 0 Lo te CAO
tune media wwe Wits Lor Li aneHMinY, dake, Varicnwe WiTKd Commactione we AE Ot
syne, contd eae 200 Nbr ype cab
> Unguided nadia (Wirehens Madlay: b tranenurien muttia Chant Give wan waite Ge HA
if canes Nor anembvion of date te arin 14 wogpeled matin, Wittens UC airnnvn®
jo sn Verein 96 NHydKe matin on nem—pnysiea miele am the trannnnaniern Ate Pee
dioronugpy varies types Oh wlactromagpatie A164, CR HG ROO WRIE4 ATCA WHA OM ATE
transTivhons, AU aNTNtdOns, OMA AIS GRE, IAI URIDINE, CL
47 Gla Windia or Wired Wotwiniciny Verrweonpen
1 Twiieted Vair Cathe
hiwisted pair cable is the duet, snphect and the mint
enomon type 8 conducted media, it is mats A tw0 pashie
insulated copper wires Wich ate United taypther to tort &
siunpe wire, Vach wire ve 1 min thick, Out A these two Wires,
only one carries the actual gga Wille the het Vs wae
for ground relerence, The wires so twisted are neigh tn
suhding \orerterence from the nearty stenllar pairs, Wich is
Sawn as crommals. Vurioted pair can be species as Caegpry
1-5 and is abbreniated as Cat 1, Catagpnry 6 telished yar can wig yoTt Gata trancnnes
#8 290 mbps Sor 100 metres while Category 7 twisted yar can sugyort AM Wwigger Gate ¢
Fig GEV Whcted tat ROE
e