CN Unit - 1
CN Unit - 1
VijayaKumar ACEEC
UNIT-1
Network hardware, Network Software, OSI, TCP/IP Reference models, Example
Networks: ARPANET, Internet.
Physical Layer: Guided Transmission media: twisted pairs, coaxial cable, fiber optics,
wireless transmission.
Technology Revolution:
• 18th Century Mechanical systems
• 19th Century Steam Engine
• 20th Century Information
- gathering
- distribution
- processing
- creating
• 21st Century Networks
Human-to-Human,
Machine-to-Machine
Computer Networks:
A collection of autonomous computers interconnected by a single technology.
Two computers are said to be interconnected if they are able to exchange information.
The connection can be via a copper wire; fiber optics, microwaves, infrared, and communication
satellites.
o Internet being the most well-known example of a network of networks.
Distributed systems:
A collection of independent computers appears to its users as a single coherent system.
It has a single model or paradigm that it presents to the users.
A layer of software on top of the operating system, called middleware, is responsible for
implementing this model.
o A well-known example of a distributed system is the World Wide Web. It runs on top of the
Internet and presents a model in which everything looks like a document (Web page).
1
Computer Networks Ch.VijayaKumar ACEEC
2
Computer Networks Ch.VijayaKumar ACEEC
b. Person-to-person communication
Eg: social network applications – facebook, wiki
c. Interactive entertainment
Eg: VOD, interactive movies or TVs, game playing
d. Electronic commerce
Devices such as televisions that plug into the wall can use power-line networks to send
information throughout the house over the wires that carry electricity.
RFID (Radio Frequency Identification) readers locate and communicate with the
items over a distance of up to several meters, depending on the kind of RFID.
3
Computer Networks Ch.VijayaKumar ACEEC
Social Issues
a. Network neutrality: communications that are not differentiated by their content or
source or who is providing the content is known as network neutrality
b. Digital Millennium Copyright Act
c. Profiling users
d. Phishing
Network Hardware:
All Computer Networks can be classified based on
Point-to-point links
Point-to-point links connect individual pairs of machines.
To go from the source to the destination on a network made up of point-to-point links, short
messages, called packets in certain contexts, may have to first visit one or more intermediate
machines.
Often multiple routes, of different lengths, are possible, so finding good ones is important in point-
to-point networks.
Point-to-point transmission with exactly one sender and exactly one receiver is sometimes called
unicasting.
Broadcast links
On a broadcast network, the communication channel is shared by all the machines on the network;
packets sent by any machine are received by all the others.
An address field within each packet specifies the intended recipient.
Upon receiving a packet, a machine checks the address field.
If the packet is intended for the receiving machine, that machine processes the packet; if the packet
is intended for some other machine, it is just ignored.
A wireless network is a common example of a broadcast link.
Broadcast systems usually also allow the possibility of addressing a packet to all destinations by
using a special code in the address field. When a packet with this code is transmitted, it is received
and processed by every machine on the network. This mode of operation is called broadcasting.
Some broadcast systems also support transmission to a subset of the machines, which known as
multicasting.
4
Computer Networks Ch.VijayaKumar ACEEC
5
Computer Networks Ch.VijayaKumar ACEEC
Wired LANs
The wired LANs standard is called IEEE 802.3, popularly known as Ethernet.
Each computer speaks the Ethernet protocol and connects to a box called a switch with a
point-to-point link
Wireless LANs
It use an AP (Access Point), wireless router, or base station to relays packets between the
wireless computers and the Internet.
The wireless LANs standard is called IEEE 802.11, popularly known as Wi-Fi.
Characteristics of LANs:
(a) privately-owned,
(b) small size,
(c) transmission technology,
(d) topology
6
Computer Networks Ch.VijayaKumar ACEEC
7
Computer Networks Ch.VijayaKumar ACEEC
The Internet
A collection of interconnected networks is called an internetwork or internet.
This is in contrast to the worldwide Internet (which is one specific internet), which we will always
capitalize.
The Internet uses ISP networks to connect enterprise networks, home networks, and many other
networks.
Internetworks are created
o if different organizations have paid to construct different parts of the network and each
maintains its part.
o if the underlying technology is different in different parts (e.g., broadcast versus point-to-
point and wired versus wireless).
A machine that makes a connection between two or more networks and provides the necessary
translation, both in terms of hardware and software, is called a gateway.
Network Topologies:
The term physical topology refers to the way in which a network is laid out physically.
Two or more devices connect to a link; two or more links form a topology.
The topology of a network is the geometric representation of the relationship of all the links and
linking devices (usually called nodes) to one another.
There are four basic topologies possible:
i. Mesh
ii. Star
iii. Bus
iv. Ring
8
Computer Networks Ch.VijayaKumar ACEEC
Mesh Topology
In a mesh topology, every device has a dedicated point-to-point link to every other device.
Advantages
Eliminating the traffic problems
A mesh topology is robust.
Privacy or security.
Fault identification and fault isolation easy
Disadvantages
Bulk of the wiring
More number of i/o ports
Use:
For the connection of telephone regional offices.
The number of duplex-mode physical links in a fully connected mesh network with n nodes is
__________.
Star Topology:
In a star topology, each device has a dedicated point-to-point link only to a central controller,
usually called a hub.
Advantages
Less expensive than a mesh topology.
Each device needs only one link and one I/O port to connect
Easy to install and reconfigure.
Far less cabling
Deletions involve only one connection
Robustness. If one link fails, only that link is affected
Easy fault identification and fault isolation.
Disadvantages
The dependency of the whole topology on one single point, the hub. If the hub goes down,
the whole system is dead.
Use:
The star topology is used in local-area networks (LANs).
9
Computer Networks Ch.VijayaKumar ACEEC
The number of duplex-mode physical links in a fully connected star network with n nodes is _______.
Bus Topology:
A bus topology, on the other hand, is multipoint. One long cable acts as a backbone to link all the
devices in a network.
Advantages
Ease of installation
Less cabling than mesh or star topologies
Disadvantages
Difficult reconnection and fault isolation
Degradation in quality
Adding new devices may therefore require modification or replacement of the backbone.
Use:
Ethernet LANs can use a bus topology
The number of duplex-mode physical links in a fully connected bus network with n nodes is________.
Ring Topology:
In a ring topology, each device has a dedicated point-to-point connection with only the two devices
on either side of it.
Advantages
Easy to install and reconfigure.
fault isolation is simplified
10
Computer Networks Ch.VijayaKumar ACEEC
Disadvantages
Unidirectional traffic
A break in the ring can disable the entire network
Use:
local-area network Token Ring
higher-speed LANs
The number of duplex-mode physical links in a fully connected ring network with n nodes is _______.
Network Software:
The number of layers, the name of each layer, the contents of each layer, and the
function of each layer differ from network to network.
The purpose of each layer is to offer certain services to the higher layers while
shielding those layers from the details of how the offered services are actually
implemented.
In a sense, each layer is a kind of virtual machine, offering certain services to the
layer above it.
11
Computer Networks Ch.VijayaKumar ACEEC
The entities comprising the corresponding layers on different machines are called peers.
A list of the protocols used by a certain system, one protocol per layer, is called a protocol
stack.
Technical example: how to provide communication to the top layer of the five-layer network is shown in
below figure
12
Computer Networks Ch.VijayaKumar ACEEC
Typical flow:
A message, M, is produced by an application process running in layer 5 and given to layer 4 for
transmission.
Layer 4 puts a header in front of the message to identify the message and passes the result to layer 3
The header includes control information, such as address/port, to allow layer 4 on the destination
machine to deliver the message
Other examples of control information used in some layers are sequence numbers, sizes, and times
Layer 3 must break up the incoming messages into smaller units, packets, prepending a layer 3
header to each packet
Layer 3 decides which lines to use and passes the packets to layer 2
Layer 2 adds to each piece not only a header but also a trailer, and gives the resulting unit to
layer 1 for physical transmission
At the receiving machine the message moves upward, from layer to layer, with headers being
stripped off as it progresses
13
Computer Networks Ch.VijayaKumar ACEEC
Solution:
o Error detection and correction using redundant information added to the data sent.
Solution:
o Protocol layering: reflecting on the change by customizing the protocols.
Every layer needs a mechanism for identifying the senders and receivers that are involved in a
particular message.
Solution:
o Addressing or naming (i.e. IP addresses and port numbers.)
Coping with different types of inter-connected networks or internetworking
Solution:
o Fragmentation and re-assembly
Resource allocation:
Networks provide a service to hosts from their underlying resources, such as the capacity of
transmission lines.
To do this well, they need mechanisms that divide their resources so that one host does not interfere
with another too much.
14
Computer Networks Ch.VijayaKumar ACEEC
Solution:
o Multiplexing
An allocation problem that occurs at every level is how to keep a fast sender from swamping a slow
receiver with data.
Solution:
o Flow control
The network is oversubscribed because too many computers want to send too much traffic, and the
network cannot deliver it all. This overloading of the network is called congestion.
Solution:
o Congestion control
o Regulating QoS parameters
Network security:
To secure the network by defending it against different kinds of threats.
Solution:
o Mechanisms that provide confidentiality defend against this threat, and they are used in
multiple layers.
o Mechanisms for authentication prevent someone from impersonating someone else.
o Mechanisms for integrity prevent surreptitious changes to messages, such as altering the
content.
15
Computer Networks Ch.VijayaKumar ACEEC
Service Primitives:
A service is formally specified by a set of primitives (operations).
These primitives tell the service to perform some action or report on an action taken by a peer
entity.
16
Computer Networks Ch.VijayaKumar ACEEC
If the protocol stack is located in the operating system, as it often is, the primitives are normally
system calls.
These calls cause a trap to kernel mode, which then turns control of the machine over to the
operating system to send the necessary packets.
The primitives for connection-oriented service are different from those of connection-less service.
17
Computer Networks Ch.VijayaKumar ACEEC
The service defines what operations the layer is prepared to perform on behalf of its users, but
it says nothing at all about how these operations are implemented.
A service relates to an interface between two layers, with the lower layer being the service
provider and the upper layer being the service user.
Protocol
A protocol, in contrast, is a set of rules governing the format and meaning of the packets, or
messages that are exchanged by the peer entities within a layer.
Entities use protocols to implement their service definitions.
They are free to change their protocols at will, provided they do not change the service visible
to their users.
In this way, the service and the protocol are completely decoupled.
18
Computer Networks Ch.VijayaKumar ACEEC
Reference Models
The OSI
reference
model.
PHYSICAL LAYER:
19
Computer Networks Ch.VijayaKumar ACEEC
2. Representation of bits:
The physical layer data consists of a stream of bits (sequence of 0’s or 1’s) with no
interpretation.
To be transmitted, bits must be encoded into signals electrical or optical. The
physical layer defines the type of encoding.
3. Data rate:
The transmission rate the number of bits sent each second is also defined by the
physical layer.
4. Synchronization of bits:
The sender and receiver not only must use the same bit rate but also must be
synchronized at the bit level.
5. Line configuration:
The Physical layer is concerned with the connection devices to the media.
In a point-to-point configuration, two devices are connected through a dedicated
link. In a multipoint configuration, a link is shared among several devices.
6. Physical topology:
The physical topology defines how devices are connected to make a network.
Devices can be connected by using a mesh topology, a star topology, a ring
topology, or a hybrid topology.
7. Transmission mode:
The physical layer also defines the direction of transmission between two devices:
simplex, half-duplex. Full-duplex.
In simplex mode, only one device can send, the other receives. The simplex mode is
a one-way communication.
In the half-duplex mode, two devices can send and receive, but not at same time.
In full-duplex mode, two devices can send and receive at the same time.
1. Framing:
The data received from network layer are divided into manageable data units called
frames.
20
Computer Networks Ch.VijayaKumar ACEEC
2. Physical addressing:
When frames are to be distributed to different systems on the network, the data
link layer adds a header to the frame to define the sender and receiver of the frame.
If the frame is intended for a system outside the sender’s to the next one.
3. Flow control:
If the rate at which the data are absorbed by the receiver is less than the rate at
which data are produced in the sender, the data link layer imposes a flow control
mechanism to avoid overwhelming the receiver.
4. Error control:
The data link layer adds reliability to the physical layer by adding mechanisms to
detect and retransmit damaged or lost frames. It also uses a mechanism to recognize
duplication frames.
Error control is normally achieved through a trailer added to the end of the frame.
5. Access control:
When two or more devices are connected to the same link, data link layer protocols
are necessary to determine which device has control over the link at any given time.
NETWORK LAYER:
The network layer is responsible for the delivery of packets from the source to destination across
multiple networks.
1. Logical addressing:
The physical addressing implemented by the data link layer handles the addressing problem
locally.
If a packet passes the network boundary, we need another addressing system to help
distinguish the source and destination systems.
2. Routing:
When independent networks or links are connected to create internet works or a large
network, the connecting devices called routers or switches route or switch the packets to
their final destination.
One of the functions of the network, layer is to provide this mechanism
21
Computer Networks Ch.VijayaKumar ACEEC
TRANSPORT LAYER:
The transport layer is responsible for process-to-process delivery of the entire message. A process is an
application program running on a host.
1. Service-point addressing:
Computer performs several operations simultaneously. Process-to-process delivery
means specific process of one computer must be delivered to specific process on
other computer. The transport layer header therefore includes port address.
Network layer delivers packet to the desired computer and transport layer, gets
message to the correct process on that computer.
3. Connection control:
Transport layer performs connectionless or connection oriented services with the
destination machine.
4. Flow control:
Transport layer performs end-to-end flow control while data link layer performs it
across the link.
5. Error control:
Error control at this layer is performed on end-to-end basis rather than across the
link. The transport layer ensures error free transmission.
SESSION LAYER:
The session layer is network dialog controller that is it establishes and synchronizes the
interaction between communication systems.
1. Dialog control:
Communication between two processes takes place in either half duplex or full
duplex mode. The session layer manages dialog control for this communication.
2. Synchronization :
Session layer adds synchronization points into stream of data.
22
Computer Networks Ch.VijayaKumar ACEEC
PRESENTATION LAYER:
The presentation layer deals with syntax and semantics of the information being
exchanged.
1. Translation:
Different computers use different encoding systems. The presentation layer
maintains interoperability between the two encoding systems.
2. Encryption:
Encryption is transforming sender information to other form to ensure privacy
while transmission. Decryption is a reverse process.
3. Compression:
Compression is a technique of reducing number of bits required to represent the
data.
APPLICATION LAYER:
Application layer is responsible for accessing the network by user. It provides user interfaces
and other supporting services such as e-mail, remote, file access, file transfer, sharing
database, message handling, and directory services.
3. Mail Services:
E-mail forwarding, storage are the services under this category.
4. Directory Services:
Directory services include access for global information and distributed database.
23
Computer Networks Ch.VijayaKumar ACEEC
24
Computer Networks Ch.VijayaKumar ACEEC
1. Application layer:
Application layer includes all process and services that use the transport layer to deliver data.
The most widely known application protocols are: TELNET, File Transfer Protocol (FTP),
Simple Mail Transfer Protocol (SMTP) and Simple Network Management Protocol (SNMP).
TELNET is the Network Terminal Protocol, which provides remote login over the network.
FTP is used for interactive file transfer.
SMTP delivers the electronic mail.
2. Transport layer:
Application programs send data to the transport layer protocols TCP and UDP.
An application is designed to choose either TCP or UDP based on the services it needs.
The transport layer provides per entities on the source and destination hosts to carry on a
conversation. Both end’s protocol is defined in this layer.
TCP is reliable connection oriented protocol that allows a byte stream originating on one
computer to be delivered without error to any other computer in the internet.
It converts the incoming byte stream into discrete message and passes each one onto the
Internet layer.
At the destination side, the receiving TCP reassembles the received data or messages into the
output format.
TCP also handles flow control. It synchronizes between fast sender and slow receiver.
UDP is a connectionless protocol. Sometimes this type of protocol is used for prompt
delivery.
3. Internet layer :
The Internet network level protocol (IP, ARP, ICMP) handle machine to machine
communications.
These protocols provide for transmission and reception of transport requests and handle
network level control.
The TCP/IP Internet layer moves data from one host to another even if the hosts are on
different networks.
The primary protocol used to move data is the Internet Protocol (IP), which provides the
following services:
a. Addressing:
Determining the route to deliver data to the destination host.
b. Fragmentation:
Breaking the messages into pieces if an intervening network cannot handle a
large message.
It provides a connectionless method of delivering data from one host to another. It does not
guarantee delivery and does not provide sequencing of data grams.
It attaches a header to datagram that includes source address and the destination address, both
of which are unique internet addresses.
25
Computer Networks Ch.VijayaKumar ACEEC
Web servers implement this protocol. Short for Hyper Text Transfer Protocol, the underlying
protocol used by the World Wide Web. HTTP defines how messages are formatted and
transmitted, and what actions Web servers and browsers should take in response to various
commands. For example, when you enter a URL in your browser, this actually sends an
HTTP command to the Web server directing it to fetch and transmit the requested Web page.
Used by e-mail servers (and sometimes Web servers) to send e-mail. Short for Simple Mail
Transfer Protocol, a protocol for sending e-mail messages between servers. Most e-mail systems
that send mail over the Internet use SMTP to send messages from one server to another; the
messages can then be retrieved with an e-mail client using either POP or IMAP. In addition,
SMTP is generally used to send messages from a mail client to a mail server. This is why you
need to specify both the POP or IMAP server and the SMTP server when you configure your e-
mail application.
Short for Internet Message Access Protocol, a protocol for retrieving e-mail messages. The
latest version, IMAP4, is similar to POP3 but supports some additional features. For
example, with IMAP4, you can search through your e-mail messages for keywords while the
messages are still on mail server. You can then choose which messages to download to your
machine.
The protocol for exchanging files over the Internet. FTP works in the same way as HTTP for
transferring Web pages from a server to a user's browser and SMTP for transferring
electronic mail across the Internet in that, like these technologies, FTP uses the Internet's
TCP/IP protocols to enable data transfer.
FTP is most commonly used to download a file from a server using the Internet or to upload
a file to a server (e.g., uploading a Web page file to a server).
26
Computer Networks Ch.VijayaKumar ACEEC
Short for Domain Name System (or Service or Server), an Internet service that translates
domain names into IP addresses. Because domain names are alphabetic, they're easier to
remember. The Internet however, is really based on IP addresses. Every time you use a
domain name, therefore, a DNS service must translate the name into the corresponding IP
address. For example, the domain name www.example.com might translate to
198.105.232.4.
Creates a reliable connection between two computers. TCP is one of the main protocols in
TCP/IP networks. Whereas the IP protocol deals only with packets, TCP enables two hosts to
establish a connection and exchange streams of data. TCP guarantees delivery of data and
also guarantees that packets will be delivered in the same order in which they were sent.
Provides addressing scheme. IP specifies the format of packets, also called datagrams, and
the addressing scheme. Most networks combine IP with a higher-level protocol called
Transmission Control Protocol (TCP), which establishes a virtual connection between a
destination and a source.
IP by itself is something like the postal system. It allows you to address a package and drop it
in the system, but there's no direct link between you and the recipient. The current version of
IP is IPv4. A new version, called IPv6 is under development.
Provides error messages. An extension to the Internet Protocol (IP) defined by RFC 792.
ICMP supports packets containing error, control, and informational messages. The PING
command, for example, uses ICMP to test an Internet connection.
A connectionless protocol that, like TCP, runs on top of IP networks. Unlike TCP/IP,
UDP/IP provides very few error recovery services, offering instead a direct way to send and
receive datagrams over an IP network. It's used primarily for broadcasting messages over a
network
27
Computer Networks Ch.VijayaKumar ACEEC
Following are the differences between OSI and TCP/IP Reference Model:
OSI TCP/IP
OSI represents Open System TCP/IP model represents the Transmission Control
Interconnection. Protocol / Internet Protocol.
OSI is a generic, protocol independent TCP/IP model depends on standard protocols about
standard. It is acting as an interaction which the computer network has created. It is a
gateway between the network and the connection protocol that assigns the network of
final-user. hosts over the internet.
The OSI model was developed first, and The protocols were created first and then built the
then protocols were created to fit the TCP/IP model.
network architecture’s needs.
The protocols of the OSI model are better The TCP/IP model protocols are not hidden, and
unseen and can be returned with another we cannot fit a new protocol stack in it.
appropriate protocol quickly.
The smallest size of the OSI header is 5 The smallest size of the TCP/IP header is 20 bytes.
bytes.
28
Computer Networks Ch.VijayaKumar ACEEC
TRANSMISSION MEDIA:
Transmission media are located below the physical layer.
The transmission medium is the physical path by which a message travels from sender to
receiver.
Anything that can carry information from a source to a destination.
Transmission media is also called as LAYER ZERO.
29
Computer Networks Ch.VijayaKumar ACEEC
GUIDED MEDIA
Guided media, which are those that provide a physical connection from one device to another
A signal traveling along any of these media is directed and contained by the physical limits of the
medium.
Twisted-pair and coaxial cable use metallic (copper) conductors that accept and transport signals
in the form of electric current.
Optical fiber is a cable that accepts and transports signals in the form of light.
1.Twisted-pair cable
Twisted pair consists of two conductors (normally copper), each with its own plastic insulation,
twisted together.
One of the wires carries signal, the other is used only as a ground reference.
The receiver uses the difference b/w the two levels.
Twisting increases the probability that both wires are affected by the noise in the same manner,
thus the difference at the receiver remains same.
Therefore, number of twists per unit length determines the quality of the cable.
The twisting helps to reduce the interference (noise) and crosstalk.
Twisted-pair cable comes in two forms: unshielded and shielded.
30
Computer Networks Ch.VijayaKumar ACEEC
UTP connectors
RJ: registered jack key connector: inserted in only one way. RJ-45 Male and RJ-45 Female.
2. Coaxial cable
Coaxial cable carries signals of higher frequency ranges than twisted-pair cable.
31
Computer Networks Ch.VijayaKumar ACEEC
3.Fiber-Optic Cable
Optical fiber is made of glass or plastic and transmits signals in the form of light.
Optical fibers use reflection to guide light through a channel.
A glass or plastic core is surrounded by a cladding of less dense glass or plastic.
The difference in density of the two materials must be such that a beam of light moving
through the core is reflected off the cladding instead of being refracted into it.
Information is encoded onto a beam of light as a series of on-off flashes that represent 1 and 0
bits.
Multimode: In this case multiple beams from a light source move through the core in different
paths.
In a multimode step-index fiber, the density of the core remains constant from the center to the
edges. A beam of light moves through this constant density in a straight line until it reaches the
32
Computer Networks Ch.VijayaKumar ACEEC
interface of the core and cladding. At the interface there is an abrupt change to a lower density that
alters the angle of the beam’s motion.
In a multimode graded-index fiber the density is highest at the center of the core and decreases
gradually to its lowest at the edge.
Single mode uses step-index fiber and a highly focused source of light that limits beams to a small
range of angles, all close to the horizontal. Is manufactured with a smaller diameter than that of
multimode fiber, and with lower density.
The propagation of different beams is almost identical, and delays are negligible.
The subscriber channel (SC) connector is used in cable TV. It uses a push/pull locking system.
The straight-tip (ST) connector is used for connecting cable to networking devices. It uses
bayonet locking system and is more reliable than SC.
MT-RJ(Mechanical Transfer Registered Jack) is a new connector with the same size as RJ45.
Applications:
Advantages
Higher Bandwidth: high band with depends on signal generation and reception technology
available.
Less Signal Attenuation: transmission distance is greater, for 50km need a regeneration of
signal where as in coax and twisted-pair cable for each 5km need a regeneration.
Immunity To Electromagnetic Interference: not affected by noise.
Resistance To Corrosive Materials: glass is more resistant to corrosive materials than copper.
Light Weight: much lighter
Greater Immunity To Tapping: more immune to tapping than copper cables.
Disadvantages
33
Computer Networks Ch.VijayaKumar ACEEC
Unguided signals can travel from the source to destination in several ways:
Ground propagation. In ground propagation, radio waves travel through the lowest portion of the
atmosphere, hugging the earth. These low-frequency signals emanate in all directions from the
transmitting antenna and follow the curvature of the planet. The distance depends on the power in
the signal.
In Sky propagation, higher-frequency radio waves radiate upward into the ionosphere where they
are reflected back to earth. This type of transmission allows for greater distances with lower power
output.
In Line-of-Sight Propagation, very high frequency signals are transmitted in straight lines directly
from antenna to antenna.
Antennas must be directional, facing each other, tall enough or close enough.
Bands
The section of the electromagnetic spectrum defined as radio communication is divided into eight
ranges, called bands, each regulated by government authorities.
34
Computer Networks Ch.VijayaKumar ACEEC
35
Computer Networks Ch.VijayaKumar ACEEC
1.Radio Waves
Electromagnetic waves ranging in frequencies between 3 kHz and 1 GHz.
Radio waves, for the most part, are omnidirectional. When an antenna transmits radio waves, they
are propagated in all directions.
Radio waves, particularly those waves that propagate in the sky mode, can travel long distances.
Radio waves, particularly those of low and medium frequencies, can penetrate walls.
Radio waves use omnidirectional antennas that send out signals in all directions. Based on the
wavelength, strength, and the purpose of transmission, we can have several types of antennas.
The radio wave band is relatively narrow, just under 1 GHz.
A low data rate for digital communications.
Radio waves are used for multicast communications, such as radio and television, and paging
systems.
2 .Microwaves
Electromagnetic waves having frequencies between 1GHz and 300 GHz.
Microwaves are unidirectional.
Microwave propagation is line-of-sight.
Very high-frequency microwaves cannot penetrate walls.
The microwave band is relatively wide, almost 299 GHz.
A high data rate is possible.
Microwaves use unidirectional antennas Dish Antenna and Horn Antenna that send out signals in
line of sight.
Microwaves are used for unicast (one-to-one) communication such as cellular telephones,
satellite networks, and wireless LANs.
3.Infrared
Infrared waves, with frequencies from 300 GHz to 400 THz (wavelengths from 1 mm to 770
nm), can be used for short-range communication.
Infrared waves, having high frequencies, cannot penetrate walls.
In addition, we cannot use infrared waves outside a building because the sun's rays contain
infrared waves that can interfere with the communication.
The infrared band, almost 400 THz, has an excellent potential for data transmission.
Such a wide bandwidth can be used to transmit digital data with a very high data rate.
a data rate of 4 Mbps.
The Infrared Data Association (IrDA), an association for sponsoring the use of infrared waves.
Infrared signals can be used for short-range communication in a closed area using line-of-
sight propagation.
36
Computer Networks Ch.VijayaKumar ACEEC
Example Networks:
•Internet
•ARPANET
o The Department of Defense’s Advanced Research Projects Agency founded, or ARPA (later
referred to as DARPA.)
1962:
o An ARPA affiliated scientist proposed an “intergalactic network” of linked computers.
1968:
o ARPA put out a request for proposals to actually build a network of computers.
o The first two computers were connected in 1969.
o One computer was located at UCLA, and a second at Stanford.
1970:
o The Network Working Group finished the initial ARPAnet protocol called the Network
Control Protocol.
1972:
o A new application of electronic mail, allowing messages to be sent and received was
developed.
1973:
o ARPAnet expanded to Europe.
1976:
o The first known use of the word “internet”, Specification of Internet Transmission Control
Program.
1979:
o The Usenet bulletin board system allows the users on the ARPAnet network to easily
engage in “non-work” activities like message posts.
1983:
o ARPAnet began using the TCP/IP protocol
o The Domain Name System (DNS) was established
1985:
37
Computer Networks Ch.VijayaKumar ACEEC
o The First Domain Symbolics.com becomes the first ever registered domain.
1990:
o University of Illinois develops Mosaic, an internet browser that allows users to display web
pages and images.
1994:
o Netscape, the first commercial browser.
ADDRESSING:
Four levels of addresses are used in an internet employing the TCP/IP protocols: physical, logical, port, and
specific.
38
Computer Networks Ch.VijayaKumar ACEEC
Physical Addresses
The physical address, also known as the link address, is the address of a node as defined by its LAN or
WAN.
It is included in the frame used by the data link layer. It is the lowest-level address.
The physical addresses have authority over the network (LAN or WAN).
The size and format of these addresses vary depending on the network. For example, Ethernet uses
a 6-byte (48-bit) physical address that is imprinted on the network interface card (NIC).
Most local-area networks use a 48-bit (6-byte) physical address written as 12 hexadecimal digits; every
byte (2 hexadecimal digits) is separated by a colon, as shown below:
Physical addresses are not adequate in an internetwork environment where different networks can
have different address formats.
A universal addressing system is needed in which each host can be identified uniquely, regardless
of the underlying physical network. The logical addresses are designed for this purpose.
A logical address in the Internet is currently a 32-bit address that can uniquely define a host
connected to the Internet.
No two publicly addressed and visible hosts on the Internet can have the same IP address.
Port Addresses
The IP address and the physical address are necessary for a quantity of data to travel from a source
to the destination host. However, arrival at the destination host is not the final objective of data
communications on the Internet.
Today, computers are devices that can run multiple processes at the same time. The end objective
of Internet communication is a process communicating with another process.
39
Computer Networks Ch.VijayaKumar ACEEC
For example, computer A can communicate with computer C by using TELNET. At the same time,
computer A communicates with computer B by using the File Transfer Protocol (FTP). For these
processes to receive data simultaneously, we need a method to label the different processes.
In other words, they need addresses. In the TCP/IP architecture, the label assigned to a process is
called a port address.
A port address in TCP/IP is 16 bits in length.
Specific Addresses
Some applications have user-friendly addresses that are designed for that specific address.
Examples include the e-mail address (for example, forouzan@fhda.edu) and the Universal
Resource Locator (URL) (for example, www.mhhe.com).
The first defines the recipient of an e-mail; the second is used to find a document on the World
Wide Web.
These addresses, however, get changed to the corresponding port and logical addresses by the
sending computer.
40