BCA TY, Computer Network
BCA TY, Computer Network
VISHWABHARATI MAHAVIDYLAYA
Department of Computer Application
Academic Year (2024-25) Class/Semester: BCA TY SEM-V
Name of Subject: Computer Network Prepared by: Mr. S. M. Mokale
Ans:
2. Information Sharing: Using a Computer network, we can share Information over the
network, and it provides Search capabilities such as WWW. Over the network, single
information can be shared among the many users over the internet.
4. Online Education: In lockdown period of pandemic we use zoom, Google meet etc.
applications to continue our study this is make possible only with computer and mobile
networks.
8. Business work: The cloud computing manages all resource sharing. And the purpose of
resource sharing is that without moving to the physical location of the resource, all the
data, plans, and tools can be shared to any network user. Most of the companies are
doing business electronically with other companies and with other clients worldwide with
the help of a computer network. Even most of the IT companies are allocating and
submitting their work online to employees with work from home concept.
9. Mobile users: The rapidly growing sectors in computer applications are mobile devices
like notebook computers and PDAs (personal digital assistants). Here mobile users/device
means portable device. The computer network is widely used in new-age technology like
smart watches, wearable devices, tablets to make online transactions, purchasing or selling
products online, etc.
10. Social media: Social media is also a great example of a computer network application.
It helps people to share and receive any information related to political, ethical, and social
issues.
Ans:
Communication Media:
There are a many communication media that are used to interconnect computers and
form a computer network.
1) Coaxial cable:
This cable widely used in digital cable TV network. The outer black hard plastic known as
outer jacket, The jacket covers braided outer conductor shield (twisted mesh of wires),
Insulating material made up with dielectric material (which is white in colour covered with
foil paper), then appears thick copper core wire which carries actual data.
Coaxial cabling is extremely high resistant to EMI.
It is complex to install because of its hard to bend capacity.
It can handle much longer distance in lengths between network devices than the
twisted pair cable.
Types: 1) thin coaxial 2) thick coaxial.
No extra shied used, only having 4 twisted pair wires with four colors.
The most popular widely used type is UTP.
UTP cable include eight copper wires covered by an insulating material.
The cable size is small, and easy to bend and install.
The price is less than other type of network cable.
UTP cable is install using the Registered Jack (RJ 45) connector.
Speed: CAT5 support up to 100Mbps. Where CAT7 supports 10Gbps.
This cable consists of core, cladding and jacket. The core is made from the thin strands of
glass or plastic that can carry data over the long distance. The core is wrapped in the
cladding; and the cladding is wrapped in the jacket.
Fiber optic cable has no current so that no EMI impact happened. This cable can transmit
data over a long distance at the highest speed. It can transmit data up to 40 km at the
speed of 100Gbps.
4) Magnetic Media :
One of the most convenient way to transfer data from one computer to another, even before the
birth of networking, was to save it on some storage media and transfer physical from one station
to another. Though it may seem old-fashion way in today’s world of high speed internet, but
when the size of data is huge, the magnetic media comes into play.
For example, a bank has to handle and transfer huge data of its customer, which stores a backup
of it at some geographically far-away place for security reasons and to keep it from uncertain
calamities. If the bank needs to store its huge backup data then its,transfer through internet is
not feasible.The WAN links may not support such high speed.Even if they do; the cost too high to
afford.
In these cases, data backup is stored onto magnetic tapes or magnetic discs, and then shifted
physically at remote places.
C) Wireless Transmission media – The Electromagnetic Spectrum, Radio
Transmission,Microwave Transmission,Infrared.
We are living in a world, where we can connect with friends within seconds no matter how far
they are. But this was not possible in earlier days. We all have heard and read that earlier
communication is very tough as sending a letter will require many days and sometimes months.
Today is not a case we have different types of medium which can transmit our message very
quickly. In this article, we will learn about transmission medium and after wireless
communication. Now, what is a transmission medium? Basically, it transmits signals or
messages from one computer to another computer. The transmission medium is further
divided into two types: Wired or Guided transmission media ( e.g.: Twisted pair cable, Ethernet
cable, Coaxial cable, and Optical fiber) and other is wireless or unguided transmission medium
(e.g.: Infrared, Radio link, Microwave link, Satellite link, Bluetooth, WIFI ).
In this article, we are more concerned about wireless communication. So, let’s begin
understanding wireless communication.
Wireless Communication
Infrared
Radio Waves
Microwaves
Microwaves are a line of sight transmission, meaning both the antennas sending and
receiving should be properly aligned. Also, the distance covered by the signal is
directly proportional to the height of the antenna. Microwaves have a frequency
Range between 1GHz – 300GHz. Basically, we used Microwaves in mobile phones
communication and television distribution.
Unlike radio waves, they are unidirectional, as they can move in only one direction,
and therefore it is used in point-to-point communication or unicast communication
such as radar and satellite.
Uses:
Microwaves are used in mobile phones communication and television distribution.
Advantage and Disadvantage:
If we talk about the advantages of microwaves then we say that it is a very fast way
of communication, that can carry 25000 voice channels at the same time. Also, it is a
wireless communication medium so there is no need of digging and spreading wires.
Now demerits of microwaves are the first expense, their installation and maintenance
are very expensive. that turns this into a very expensive mode of communication.
Moreover, Microwaves are also not very effective in bad weather conditions.
Electromagnetic Spectrum
The electromagnetic spectrum is a collection of frequencies, wavelengths, and
photon energies of electromagnetic waves spanning from 1Hz to 1025Hz,
equivalent to wavelengths ranging from a few hundred kilometres to a size
smaller than the size of an atomic nucleus.
The electromagnetic spectrum can thus be described as the range of all types of
electromagnetic radiation in basic terms. In a vacuum, all electromagnetic waves
travel at the same speed as light. For different forms of electromagnetic waves,
however, the wavelengths, frequencies, and photon energy will vary.
Electromagnetic Spectrum Diagram
Network Topology: “Network topology is the physical and logical arrangement of nodes and
connections in a network” and also called as structure or map of network.
Note: A node is any physical device within a network that can send, receive, or forward
information. Example- switches, routers, printers, computers, servers, etc.
BUS Topology:
• First: This topology is the first topology among all, the bus topology is
designed in such a way that all the stations are connected through a single
cable known as a backbone cable.
• Simple: The configuration of a bus
topology is quite simpler as
compared to other topologies.
• The backbone cable is considered
as a "single lane" through which the
message is broadcast to all the
stations. Start and end point of cable
terminator devices are used.
• Problem: The main problem faced in
implementing this topology is the fact
that only one communication
channel (cable)
exists to serve the entire network. As a result, if this channel fails, then the whole
network will go out of operation.
STAR Topology:
• Star topology is an arrangement of
the network in which every node is
connected to the central hub or
switch networking device.
• Simple: It is simple and easy to maintenance
• Cables: Coaxial cable or UTP cables
are used to connect the computers.
• Star topology is the most popular
topology in network
implementation.
• Problem: The main disadvantage of
this is if central device failed
suddenly complete network collapse.
Mesh Topology
• Mesh: It is an arrangement of the
network in which computers are
interconnected with each other
through various redundant
connections. There are multiple
paths from one computer to another
computer.
• It does not contain the switch, hub
or any central computer which acts
as a central point of communication.
• Wireless: Mesh topology is mainly
used for wireless networks like
satellite network.
1. RING Topology:
Ring: Ring topology is like a bus topology, but with circle shape. The node that receives
the message from the previous computer will retransmit to the next node. It has no
termination (end) point like bus topology.
Types: The data flows in one direction on one cable, i.e., it is single Ring
architecture. The data flows in both direction in two cable, it is dual Ring
architecture.
Token: The data in a ring topology flow in a clockwise direction. The most common
access method of the ring topology is token passing. Token is a signal which
rotates across the ring, ‘Who has token only those computer can send or receive data.’
A tree topology is a sort of structure in which each node is related to the others in a hierarchy. In a
topological hierarchy, there are at least three distinct levels. Sometimes it is also called hierarchical
topology as in this topology, all elements are arranged like the branches of a tree. It is a lot like the star
and bus topologies. Tree topologies are commonly used to arrange data in databases and workstations
in corporate networks. In a tree topology, any two linked nodes can only have one mutual connection,
hence there can only be one link between them.
o A tree topology combines several star topologies by connecting several components to the
centre node.
o It may define by experts as tree topology is a combination of bus and star topologies in
which all nodes are attached with the help of a single central node.
o Every node in this architecture is connected one to one in a hierarchy level, with each
neighbouring node on its lower level. Each secondary node has a point-to-point link to the
parent node, and all secondary nodes under its jurisdiction have point-to-point connections
to the tertiary nodes. When examined in a visual sense, these systems resemble a tree
structure.
The disadvantage of a tree topology is that if the primary node is damaged, the entire system can be
crippled, because all other nodes are connected to the primary node.
detail. Ans:
detail. Ans:
Protocol Hierarchies:
A Protocol is simply defined as a set of rules and regulations for data communication.
Rules are basically defined for each and every step and process at time of communication
among two or more computers. In a network there are multiple protocols are used to
make data communication successfully in between all nodes or computers of a network.
To reduce their design complexity, most networks are organized as a stack of layers or
levels, each one built upon the one below it. The number of layers, the name of each
layer, the contents of each layer, and the function of each layer differ from network to
network. The purpose of each layer is to offer certain services to the higher layers while
shielding those layers from the details of how the offered services are actually
implemented. In a sense, each layer is a kind of virtual machine, offering certain services to
the layer above it.
This concept is actually a familiar one and is used throughout computer science, where it
is variously known as information hiding, abstract data types, data encapsulation, and
object-oriented programming. The fundamental idea is that a particular piece of software
(or hardware) provides a service to its users but keeps the details of its internal state and
algorithms hidden from them. When layer n on one machine carries on a conversation
with layer n on another machine, the rules and conventions used in this conversation are
collectively known as the layer n protocol.
A set of layers and protocols is called a network architecture. The diagram shows
communication between Host 1 and Host 2. The data is passed through a number of
layers from one host to other. Virtual communication is represented using dotted lines
between layers. Physical communication is represented using solid arrows between
adjacent layers. Through physical medium, actual communication occurs. The layers at
same level are commonly known as peers.
Figure-A five-layer network.
The peers may be software processes, hardware devices, or even human beings. In other
words, it is the peers that communicate by using the protocol to talk to each other. The
peer basically has a set of communication protocols.
An interface is present between each of layers that are used to explain operations and
services provided by lower layer to higher layer.
Instead, each layer passes data and control information to the layer immediately below it,
until the lowest layer is reached. Below layer 1 is the physical medium through which
actual communication occurs. In above Figure, virtual communication is shown by dotted
lines and physical communication by solid lines.
Advantages:
The layers generally reduce complexity of communication between networks
It increases network lifetime.
It also uses energy efficiently.
It does not require overall knowledge and understanding of network.
detail. Ans:
detail. Ans:
The OSI Model we just looked at is just a reference/logical model. It was designed to
describe the functions of the communication system by dividing the communication
procedure into smaller and simpler components.
The TCP/IP model, it was designed and developed by Department of Defense (DoD)
in 1960s
It stands for Transmission Control Protocol/Internet Protocol.
It is based on standard protocols.
The TCP/IP model is older than the OSI model.
It contains four layers, unlike seven layers in the OSI model.
3. Transport Layer –
This layer is analogous to the transport layer of the OSI model. It is responsible for end-to-
end communication and error-free delivery of data. It shields the upper-layer applications
from the complexities of data. The two main protocols present in this layer are:
1. Transmission Control Protocol (TCP) – It is known to provide reliable and error-free
communication between end systems. It performs sequencing and segmentation of
data. It also has acknowledgment feature and controls the flow of the data through flow
control mechanism. It is a very effective protocol but has a lot of overhead due to such
features. Increased overhead leads to increased cost.
2. User Datagram Protocol (UDP) – On the other hand does not provide any such
features. It is the go-to protocol if your application does not require reliable transport as
it is very cost-effective. Unlike TCP, which is connection-oriented protocol, UDP is
connectionless.
4. Application Layer –
This layer performs the functions of top three layers of the OSI model: Application,
Presentation and Session Layer. It is responsible for node-to-node communication and
controls user-interface specifications. Some of the protocols present in this layer are: HTTP,
HTTPS, FTP, TFTP, Telnet, SSH, SMTP, SNMP, NTP, DNS, DHCP, NFS, X Window, and LPD.
Have a look at Protocols in Application Layer for some information about these protocols.
Protocols other than those present in the linked article are:
1. HTTP and HTTPS – HTTP stands for Hypertext transfer protocol. It is used by the World
Wide Web to manage communications between web browsers and servers. HTTPS
stands for HTTP-Secure. It is a combination of HTTP with SSL (Secure Socket Layer). It is
efficient in cases where the browser need to fill out forms, sign in, authenticate and carry
out bank transactions.
2. SSH – SSH stands for Secure Shell. It is a terminal emulations software similar to Telnet.
The reason SSH is more preferred is because of its ability to maintain the encrypted
connection. It sets up a secure session over a TCP/IP connection.
3. NTP – NTP stands for Network Time Protocol. It is used to synchronize the clocks on our
computer to one standard time source. It is very useful in situations like bank
transactions. Assume the following situation without the presence of NTP. Suppose you
carry out a transaction, where your computer reads the time at 2:30 PM while the server
records it at 2:28 PM. The server can crash very badly if it’s out of sync.
i) Explain Ethernet, Fast Ethernet, and Gigabit Ethernet in
detail. Ans:
Network Standards:
A) Ethernet:
Types of Ethernet:
10Base2:
10Base2 is sometimes referred to as ThinNet (or “thin coax”) because it uses thin
coaxial cabling for connecting stations to form a network.
10Base2 supports a maximum bandwidth of 10 Mbps.
10Base5:
10Base5 is sometimes referred to as ThickNet because it uses thick coaxial cabling
for connecting stations to form a network. Another name for 10Base5 is Standard
Ethernet because it was the first type of Ethernet to be implemented.
10Base5 supports a maximum bandwidth of 10 Mbps.
10BaseT:
10BaseT is the most popular form of 10-Mbps Ethernet, using unshielded twisted-
pair (UTP) cabling for connecting stations, and using hubs to form a network.
10BaseT supports a maximum bandwidth of 10 Mbps. 10BaseF
10BaseF:
10BaseF is different from other 10-Mbps Ethernet technologies because it uses
fiber- optic cabling instead of copper unshielded twisted-pair (UTP) cabling.
B) Fast Ethernet:
Fast Ethernet is a version of Ethernet standards, initiated in 1995 as IEEE 802.3u.
Fast Ethernet focused on increased network and network appliance speed over standard
Ethernet and Ethernet devices.
Fast Ethernet provided uniform operability for data transmission at over 100 megabits
per second.
It is designed for 100 Base T networks and is also compatible with 10 Base T networks,
allowing users to benefit from faster Ethernet speeds (with the use of compatible
switches) without having to completely upgrade their network systems.
Unshielded Twisted Pair (UTP) cabling such as Category 5 and higher rated cables can
run on Fast Ethernet devices. However, the maximum length and effectiveness of UTP
cabling is 100 meters and bandwidth can be limited.
o 100BaseTX: This is a twisted pair cable and offer a speed of 100 Mbps.
Fiber optic transmission allows for longer distance and greater bandwidth capacity over
UTP cabling, permitting Fast Ethernet network appliances and devices to deliver at full
potential.
o 100Base FX: Fiber optic protocol which offers a speed of 100 Mbps.
C) Gigabit Ethernet
Gigabit Ethernet is the latest version of Ethernet standards, initiated in 1999 as IEEE
802.3ab and in 2004 as IEEE 802.3ah. Gigabit Ethernet provided uniform standards for
1000 megabits per second, or 1 gigabit per second, network transmission.
Standard IEEE 802.3ab: It defined Gigabit Ethernet’s applicability for 1000 Base T
networks and allowed use of existing UTP cabling. The IEEE 802.3ab standard certified
Gigabit Ethernet applicability for both industry and desktop users working with the
existing Category 5 cables.
Standard IEEE 802.3ah: It certified for fiber optic transmissions.
o 1000Base SX: Fiber optic protocol which used for multimode networks.
o 1000Base LX: Fiber optic protocol which used for singlemode networks.
Gigabit Ethernet network appliances and devices can transfer data packets at rates
much faster than Fast Ethernet. A Fast Ethernet switch can transfer data packets at a
rate of 10 to 100 megabits per second where a Gigabit Ethernet switch can transfers
data packets at relatively higher speeds of one gigabit per second.
In comparison, a Gigabit Ethernet switch can transfer data packets at around 100 times
faster than a Fast Ethernet switch. Gigabit Ethernet can meet increasingly complex
network demands such as connecting multiple bandwidth-intensive devices and
broadband internet connections for video streaming.
Gigabit Ethernet applications include gigabit switches that can manage data transfer
between multiple IP security cameras and network appliances, and gigabit switches that
support video and other high-quality signal transfer between home servers and high-
definition televisions and monitors.
A Wireless Local Area Network (WLAN), also known as a Wireless LAN, is a network comprising
two or more computing devices that communicate through radio waves without the need for
physical connections. This stands in contrast to a local area network (LAN) that employs wired
connectivity, whereby every computer within the network is physically linked to the network
switch or hub via an Ethernet cable
Wireless LANs are further classified into two categories, these are:
Ad hoc networks are formed by a group of wireless nodes that establish peer-to-peer
communication. The ad-hoc mode has been designed to allow communication only among
clients within the transmission range, i.e., within the same cell.
If a client wants to communicate outside the cell, then it’s a must that one of the cells acts as the
gateway and performs routing.
Wireless LANs with infrastructure are equipped with a backbone that operates at high speeds
and can be wired or wireless. Access points serve as the intermediary between wireless nodes
and the wired backbone. The utilization of access points allows the proficient transfer of network
resources among wireless nodes.
Before transmitting information, wireless devices such as clients and access points are required to
establish a relationship or association. Data exchange between two wireless stations can only
occur once an association has been established.
K) Explain Bluetooth :
History of Bluetooth
WLAN technology enables device connectivity to infrastructure based services through a wireless
carrier provider. The need for personal devices to communicate wirelessly with one another
without an established infrastructure has led to the emergence of Personal Area Networks
(PANs).
Ericsson's Bluetooth project in 1994 defines the standard for PANs to enable
communication between mobile phones using low power and low cost radio interfaces.
In May 1988, Companies such as IBM, Intel, Nokia and Toshiba joined Ericsson to form the
Bluetooth Special Interest Group (SIG) whose aim was to develop a defacto standard for
PANs.
IEEE has approved a Bluetooth based standard named IEEE 802.15.1 for Wireless Personal
Area Networks (WPANs). IEEE standard covers MAC and Physical layer applications.
Bluetooth specification details the entire protocol stack. Bluetooth employs Radio Frequency
(RF) for communication. It makes use of frequency modulation to generate radio waves in
the ISM band.
The usage of Bluetooth has widely increased for its special features.
Bluetooth offers a uniform structure for a wide range of devices to connect and
communicate with each other.
Bluetooth technology has achieved global acceptance such that any Bluetooth enabled
device, almost everywhere in the world, can be connected with Bluetooth enabled devices.
Low power consumption of Bluetooth technology and an offered range of up to ten
meters has paved the way for several usage models.
Bluetooth offers interactive conference by establishing an adhoc network of laptops.
Bluetooth usage model includes cordless computer, intercom, cordless phone and mobile
phones.
The Internet is a global network of billions of computers and other electronic devices. With the
Internet, it's possible to access almost any information, communicate with anyone else in the
world, and do much more.
You can do all of this by connecting a computer to the Internet, which is also
called going online. When someone says a computer is online, it's just another way of saying it's
connected to the Internet.