Académique Documents
Professionnel Documents
Culture Documents
Introducon
• A Computer network is a group of two or more
computer systems linked
systems linked together
device.
• The connecons (network
(network links)
links) between nodes
are established using either cable media or
media or
wireless media
• The best-known example of computer network is
the Internet
Internet..
Need and use of computer network
• The following are the important Need and use of
use of
a computer network.
• File sharing: Networking of computers helps the
users to share data les.
Shared File
Need and use of computer network
• Hardware sharing: Users can share devices such
as printers, scanners, CD-ROM drives, hard
drives etc.
Shared Printer
• Applicaton sharing: Applicaons can be shared
over the network, and this allows to implement
client/server applicaons
Server
Client
Client
• User communicaton:
communicaton: Networks allow users to
communicate
communicate using e-mail, newsgroups, and
video conferencing etc.
Server
video conferencing
Nework gaming: A lot of network games are
available, which allow mul-users to play from
dierent locaons.
Server
Advantages of CN
• High Speed:- In Network les are transfer form one
computer to another with high speed.
• Reduce cost:- Computer network allow the user to
Share devices such as printers which saves money.
• Easy to backup:-Data is easy to backup as all the data
is stored on the le server.
• Easy to communicate:- users are easily
communicate each other using e-mail and video
conferencing.
• Internet Access Sharing : Small computer networks
allow mulple users to share a single Internet
connecon.
Types of Computer Networks
Computer network is divided into three networks
1. Local area Networks (LAN).
2. Metropolitan Area Network (MAN).
3. Wide Area Networks(WAN).
Local area Networks (LAN)
• A local area nework (LAN) is a
computer network in which all the networking
devices are interconnects in a limited area such
as a home, school, computer laboratory, or
oce building.
• LANs are typically controlled and managed by a
single person or organizaon.
• Twisted pair cabling, and Wi-Fi are the two most
common technologies currently used to build
LANs.
• LAN Uses dierent networking devices like hub,
switch, router etc.
• LAN Uses dierent network topology such as
bus, star, ring mesh etc.
• LANs have a high data transfer rate(100mbps).
• LAN Covers 90 to 150 meters distance.
• One LAN can be connected to other LANs over
any distance via telephone lines and radio
waves.
Metropolitan Area Networks (MAN)
• Metropolitan Area N etwork, is a data network
that is designed for a town or city. In terms of
geographic breadth, MANs are larger than
local-area networks (LANs), but smaller than
wide-area networks (WANs).
• The larger city, the bigger the MAN, the smaller a metro city,
diameter.
architecture
•
• Intranet network architecture
• Intranet as an organizaon's private, secured computer network
peer-to-peer networks.
• Extranet architecture
network.
• You can access an extranet only if you have a valid username and
• Hybrid
Dierent Network topologies are as follows
1. Bus topology
• Bus topology uses a common backbone cable to connect all
devices.
• A single backbone cable is a shared communicaon medium.
• All the devices aach to backbone cable with an interface
connector.
network sends a broadcast message onto the wire that all other
devices see, but only the intended recipient actually accepts and
processes the message.
signals.
• Token passing :-Token contains a piece of informaon which along
with data is sent by the source computer.
• This token then passes to next node, which checks if the signal is
intended to it. If yes, it receives it and passes the empty to into the
network, otherwise passes token along with the data to next node.
• The nodes with token are the ones only allowed to send data. Other
nodes have to wait for an empty token to reach them.
point connecon.
• All the data on the star topology passes through the central device
before reaching the intended desnaon.
1. beer performance.
2. Expensive to purchase.
• This main cable seems like a main stem of a tree, and other star
Class A address
• In class A 1 Bit used for prex 7 bits used for network id and 24 bits used
for host id.
In class B 2 Bit used for prex 14 bits used for network id and 16 bits
computers .
• Class C:
• In class C 3 Bit used for prex 21 bits used for network id and 8 bits
used for host id.
• There is a total of 2,000000 Class C networks available, with each
network consisng of 255 individual IP addresses. This type of class
is generally given to small to mid-sized companies.
• Disadvantages:- There are large no of networks with small no. of
computers .
• There are several IP addresses that are used for special purpose.
• Example 192.168.1.100
• Here 8 bit is used for host id and therefore we use 2 msb bits from
•
Advantages of sub-neng
• Improve bandwidth.
• For example if we are using the class c address and there are two
192.168.2.0/23. The "23" at the end of the address says that the
rst 23 bits are the network part of the address, remaining nine bits
for specic host addresses.
• Advantages
host address.
• A subnet mask separates the IP address into the network and host
addresses (<network><host>).
seng host bits to all "0"s. Within a given network, two host
addresses are reserved for special purpose. The "0" address is
1. Cost and Time Reducon :- VLANs can reduce the migraon cost
Guided Unguided
(Wired) Wireless
Free space
retransmits it
retransmits it at a higher power onto the other side , so that the
signal can cover longer distances.
• Repeaters
Repeaters are used to boost signals in coaxial and
coaxial and twisted pair
conductor resistance
Advanages
Disadvanages
B
D
C
• A special type of network device called the hub.
packet
packet is sent out to every computer on the network, there is a
lot of wasted
wasted transmission. This means that the network can
Intelligent
Intelligent hubs are also called manageable hubs.
Bridge
A bridge device lters data trac at a network boundary. Bridges
• Bridges operate at the data link layer (Layer 2) of the OSI model.
forwarding decisions.
• A bridge goes one step up on a hub in that it looks at the
the data.
connected.
Swich
swich
• A nework swich is a small hardware device that joins mulple
computers together within one local area network (LAN).
Ethernets.
wiring system.
etc.
Advantages
• Extending the network:- If your department has a wired network
and you need to add an outlet for a new employee or a new
oce or area which requires network access.
Media Converter
• A media converer is a simple networking device that makes it
trac.
and customers generally pay a at monthly rate for the service.
Funcons of NOS
request onto the TCP/IP network. The host on the network that
has the IP address in the request then replies with its physical
hardware address.
the Internet.
to interchangeably as TCP/IP
TCP/IP..
features IP addresses four
addresses four bytes (32 bits) in length.
network links.
• several physical
physical LAN's can funcon as a single logical LAN
locaon.
• A VPLS is easy to use because subscribers do not have to connect
the same source to the same desnaon can be sent one aer
another.
• The value of the MTU diers from one physical network protocol to
another. Forexample, the value for the Ethernet LAN is 1500 bytes, for
FDDI LAN is 4352 bytes,and for PPP is 296 bytes.
• Too large an MTU size may mean retransmissions if the packet encounters
a router that can't handle that large a packet. Too small an MTU size
means relavely more header overhead and more acknowledgements
• ·
Roung Algorithm
• Routng algorithm is the process of selecng paths in a network
along which to send network trac.
ICMP Header Format
An ICMP message has an 8-byte header and a variable-size data
Code Descripon
header First, the value of the checksum eld is set to O. Then the
enre header is divided into 16-bit secons and added together.
checksum eld.
• Res of Header – Four byte eld. Will vary based on the ICMP
type and code.
informaon for nding the original packet that had the error.
UDP
error checking.
• UDP is a very simple protocol using a minimum of overhead.
using UDP takes much less Interacon between the sender and
8 Byte
long.
• Protocol eld:-
eld:- The protocol eld is added to ensure that the
• zero :-If
:-If the computed checksum is zero, it is transmied as all
generated no checksum.
Mulplexing & De-mulplexi
De-mulplexing
ng
requires mulplexing.
dierenated
dierenated by their assigned port numbers.
• Aer adding the header, the transport layer passes the packet to
the network layer.
layer.
De-mulplexing
• At the receiver site, the relaonship is one-to-many and requires
de-mulplexing.
two ag bits set:SYN and ACK. This segment has a dual purpose.
First, it is a SYN segment for com-municaon in the other
number for numbering the bytes sent from the server to the
client. The server also acknowledges the receipt of the SYN
segment from the client by seng the ACK ag and displaying
the next sequence number it expects to receive from the client.
3. The client sends the third segment. This is just an ACK segment.
It acknowledges the receipt of the second segment with the ACK
node knows the cost of the link to each of its directly connected
neighbors.
A 1
B
1
3
2
C
D
1
Inial State
A 1
B
1
3
2
C
D
1
A B C D
A 0 1 3 ?
B 1 0 1 2
C 3 1 0 1
D ? 2 1 0
State 2
A 1
B
1
3
2
C
D
1
A B C D
A 0 1 2 (vi B) 3(vi B)
B 1 0 1 2
C 2(vi B) 1 0 1
D 3 (vi B) 2 1 0
Link state roung protocol
• Link State protocols track the status and connecon type of
each link and produces a calculated metric based on these
and other factors, including some set by the network
administrator.
• Link state protocols know whether a link is up or down and
how fast it is and calculates a cost.
• Link State protocols will take a path which has more hops,
but that uses a faster medium over a path using a slower
medium with fewer hops.
• Because of their awareness of media types and other
factors, link state protocols require more processing power
and memory
2. Wireless Modem /rouer:-
• A wireless rouer is a device that performs the funcons of a
4. Wireless Repeaers