1 - Introduction to Computer Networks with key
1 - Introduction to Computer Networks with key
• Data communications are the exchange of data between to two devices via some
transmission medium. A data communication system has five components
o Message- information (data) to be communicated e.g. text, audio, video.
o Sender- device how sends the message (computer, phone, camera etc.)
o Receiver- device how receives the message (computer, phone, television etc.)
o Transmission medium – is the physical path by which a message travels from
sender to receiver.
o Protocol – the set of rules that governs the data communication.
• Half duplex – each station can both transmit and receive, but not at the same time. E.g.
like a one lane road, walkie-talkie etc.
o When one device is sending, the other can only receive, and vice versa.
o In a half-duplex transmission, the entire capacity of a channel is taken over by
whichever of the two devices is transmitting at the time.
o Walkie-talkies are both half-duplex systems.
• Full duplex – both stations can transmit and receive at the same time. Actually, it is two
half duplex connections.
o Telephone network is an example of full-duplex mode, when two people are
communicating by a telephone line, both can talk and listen at the same time.
o The capacity of the channel, must be divided between the two directions.
• Network criteria- a network must be able to meet a certain number of criteria. The most
important of these are performance, reliability and security.
o Performance – can be measured in many ways including transit time, response
time, number of users, type of transmission medium, capabilities of connected
hardware’s and efficiency of software.
o Reliability – is a measure of frequency of failure and the time taken to resolve
from the failure.
o Security – includes protecting data from unauthorised access, protecting data
from damage and development.
• Physical structure
• Types of connection-
o Point to point- A point-to-point connection provides a dedicated link between
two devices. Most point-to-point connections use an actual length of wire or cable
to connect the two ends, but other options, such as microwave or satellite links,
are also possible.
Mesh Topology
• In a mesh topology, every device has a dedicated point-to-point link to every other
device.
• In mesh topology, we need
n (n -1) /2, duplex-mode links, where n is number of nodes.
Advantages
• The use of dedicated links guarantees that each connection can carry its own data load,
thus eliminating the traffic problems that can occur when links must be shared by
multiple devices.
• A mesh topology is robust. If one link becomes unusable, it does not incapacitate the
entire system.
• There is the advantage of privacy or security. When every message travel along a
dedicated line, only the intended recipient sees it. Physical boundaries prevent other
users from gaining access to messages.
• Point-to-point links make fault identification and fault isolation easy. Traffic can be
routed to avoid links with suspected problems.
Disadvantage
• Since every device must be connected to every other device, installation and
reconnection are difficult.
• The sheer bulk of the wiring can be greater than the available space (in walls, ceilings, or
floors) can accommodate.
• The hardware required to connect each link (I/O ports and cable) can be prohibitively
expensive.
Star Topology
• In a star topology, each device has a dedicated point-to-point link only to a central
controller, usually called a hub. The devices are not directly linked to one another.
• The controller acts as an exchange: If one device wants to send data to another, it sends
the data to the controller, which then relays the data to the other connected device.
Advantages
Disadvantage
• Dependency of the whole topology on one single point, the hub. If the hub goes down,
the whole system is dead.
• Often more cabling is required in a star than in some other topologies.
Bus Topology
• A bus topology, is multipoint. One long cable acts as a backbone to link all the devices in
a network.
• Nodes are connected to the bus cable by drop lines and taps.
• A drop line is a connection running between the device and the main cable.
• A tap is a connector that either splices into the main cable or punctures the sheathing of
a cable to create a contact with the metallic core.
Advantages
Ring Topology
• In a ring topology, each device has a dedicated point-to-point connection with only the
two devices on either side of it.
• A signal is passed along the ring in one direction, from device to device, until it reaches
its destination. Each device in the ring incorporates a repeater.
• When a device receives a signal intended for another device, its repeater regenerates
the bits and passes them along.
Advantages
• A break in the ring (such as a disabled station) can disable the entire network.
• Categories of networks-
o LAN
o WAN
o MAN
o The physical layer defines the characteristics of the interface between the devices
and the transmission medium.
o Representation of bits. The physical layer data consists of a stream of bits (sequence
of 0s or 1s) with no interpretation. To be transmitted, bits must be encoded into
signals- electrical or optical.
o Data rate. The transmission rate-the number of bits sent each second-is also defined
by the physical layer.
o Line configuration. The physical layer is concerned with the connection of devices to
the media.
o Physical topology. The physical topology defines how devices are connected to make
a network.
o Transmission mode. The physical layer also defines the direction of transmission
between two devices: simplex, half-duplex, or full-duplex.
Data link layer
• The data link layer transforms the physical layer, a raw transmission facility, to a reliable
link.
• It makes the physical layer appear error-free to the upper layer (network layer)
Main Responsibilities
• Framing. The data link layer divides the stream of bits received from the network layer
into manageable data units called frames.
• Physical addressing. If frames are to be distributed to different systems on the network,
the data link layer adds a header to the frame to define the sender and/or receiver of
the frame.
• Flow control. If the rate at which the data are absorbed by the receiver is less than the
rate at which data are produced in the sender, the data link layer imposes a flow control
mechanism to avoid overwhelming the receiver.
• Error control. The data link layer adds reliability to the physical layer by adding
mechanisms to detect and retransmit damaged or lost frames. It also uses a mechanism
to recognize duplicate frames. Error control is normally achieved through a trailer added
to the end of the frame.
• Access control. When two or more devices are connected to the same link, data link
layer protocols are necessary to determine which device has control over the link at any
given time.
Network layer
• The network layer is responsible for the source-to-destination delivery of a packet,
possibly across multiple networks (links).
• Logical addressing. If a packet passes the network boundary, we need another
addressing system to help distinguish the source and destination systems. The network
layer adds a header to the packet coming from the upper layer that, among other things,
includes the logical addresses of the sender and receiver.
• Routing. When independent networks or links are connected to create internetworks
(network of networks) or a large network, the connecting devices (called routers or
switches) route or switch the packets to their final destination. One of the functions of
the network layer is to provide this mechanism.
Transport layer
• The transport layer is responsible for process-to-process delivery of the entire message.
• A process is an application program running on a host. Whereas the network layer
oversees source-to-destination delivery of individual packets, it does not recognize any
relationship between those packets.
Other Responsibilities
• Service-point addressing. The transport layer header must include a type of address
called a service-point address (or port address). The network layer gets each packet to
the correct computer; the transport layer gets the entire message to the correct process
on that computer.
• Segmentation and reassembly. A message is divided into transmittable segments, with
each segment containing a sequence number. These numbers enable the transport layer
to reassemble the message correctly upon arriving at the destination and to identify and
replace packets that were lost in transmission.
• Connection control. The transport layer can be either connectionless or connection
oriented. A connectionless transport layer treats each segment as an independent
packet and delivers it to the transport layer at the destination machine. A connection-
oriented transport layer makes a connection with the transport layer at the destination
machine first before delivering the packets. After all the data are transferred, the
connection is terminated.
• Flow control. Like the data link layer, the transport layer is responsible for flow control.
However, flow control at this layer is performed end to end rather than across a single
link.
• Error control. Like the data link layer, the transport layer is responsible for error control.
However, error control at this layer is performed process-to process rather than across a
single link. The sending transport layer makes sure that the entire message arrives at the
receiving transport layer without error (damage, loss, or duplication). Error correction is
usually achieved through retransmission.
Session layer
• The session layer is the network dialog controller. It establishes, maintains, and
synchronizes the interaction among communicating systems.
• The session layer is responsible for dialog control and synchronization.
• Dialog control. The session layer allows two systems to enter into a dialog. It allows the
communication between two processes to take place in either half duplex (one way at a
time) or full-duplex (two ways at a time) mode.
• Synchronization. The session layer allows a process to add checkpoints, or
synchronization points, to a stream of data.
Presentation layer
• The presentation layer is concerned with the syntax and semantics of the information
exchanged between two systems.
• Translation. The processes (running programs) in two systems are usually exchanging
information in the form of character strings, numbers, and so on. The information must
be changed to bit streams before being transmitted. Because different computers use
different encoding systems, the presentation layer is responsible for interoperability
between these different encoding methods. The presentation layer at the sender
changes the information from its sender-dependent format into a common format. The
presentation layer at the receiving machine changes the common format into its
receiver-dependent format.
• Encryption. To carry sensitive information, a system must be able to ensure privacy.
Encryption means that the sender transforms the original information to another form
and sends the resulting message out over the network. Decryption reverses the original
process to transform the message back to its original form.
• Compression. Data compression reduces the number of bits contained in the
information. Data compression becomes particularly important in the transmission of
multimedia such as text, audio, and video.
Application layer
• The application layer enables the user, whether human or software, to access the
network.
• It provides user interfaces and support for services such as electronic mail, remote file
access and transfer, shared database management, and other types of distributed
information services.
Services
Q In the following pairs of OSI protocol layer/sub-layer and its functionality, the INCORRECT
pair is (Gate-2014) (1 Marks)
(a) Network layer and Routing
(b) Data Link Layer and Bit synchronization
(c) Transport layer and End-to-end process communication
(d) Medium Access Control sub-layer and Channel sharing
ANSWER B
Q A multiplexer combines four 100-Kbps channels using a time slot of 2 bits. What is the bit
rate? (NET-JULY-2016)
(a) 100 Kbps (b) 200 Kbps (c) 400 Kbps (d) 1000 Kbps
Ans: c