DCN NOTES For COURSE FILE
DCN NOTES For COURSE FILE
1. Performance: It can be measured in many ways, including transmit time and response
time. Transit time is the amount of time required for a message to travel from one device to
another. Response time is the elapsed time between an inquiry and a response. The
performance of the network depends on a number of factors, including the number of users,
the type of medium & hardware
2. Reliability: In the addition to accuracy is measured by frequency of failure, the time it
takes a link to recover from failure, and the network’s robustness in catastrophe.
3. Security: Network security issues include protecting data from unauthorized access,
protecting data from damage and development, and implementing policies and procedures
for recovery from breaches and data loss.
Goal Of Networking:
Programs do not have to execute on a single system because of resource and load sharing.
Reduced costs – Multiple machines can share printers, tape drives, and other peripherals.
Reliability – If one machine fails, another can take its place.
Scalability (it’s simple to add more processors or computers)
Communication and mail (people living apart can work together)
Information Access (remote information access, access to the internet, e-mail, video
conferencing, and online shopping)
Entertainment that is interactive (online games, videos, etc.)
Social Networking
Types of Networks
Wired Network: As we all know, “wired” refers to any physical medium made up of
cables. Copper wire, twisted pair, or fiber optic cables are all options. A wired network
employs wires to link devices to the Internet or another network, such as laptops or desktop
PCs.
Local Area Network (LAN): A LAN is a network that covers an area of around 10
kilometres. For example, a college network or an office network. Depending upon the
needs of the organization, a LAN can be a single office, building, or Campus. We can have
two PCs and one printer in-home office, or it can extend throughout a company and include
audio and video devices. Each host in LAN has an identifier, an address that defines hists in
LAN. A packet sent by the host to another host carries both the source host’s and the
destination host’s address.
Metropolitan Area Network (MAN): MAN refers to a network that covers an entire city.
For example: consider the cable television network.
Hybrid Networks: The hybrid model refers to a network that uses a combination of client-
server and peer-to-peer architecture. E.g.: Torrent.
Network Topology
5. Tree Topology: The topology of a tree is similar to that of a star. Nodes in a tree, like
those in a star, are connected to a central hub that manages network traffic. It has a root
node, which is connected to all other nodes, producing a hierarchy. Hierarchical topology is
another name for it. The number of Star networks is connected via Bus in Tree Topology.
Advantages
Network expansion is both possible and simple.
We partition the entire network into pieces (star networks) that are easier to manage and
maintain.
Other segments are unaffected if one segment is damaged.
Disadvantages
Tree topology relies largely on the main bus cable because of its basic structure, and if it
fails, the entire network is handicapped.
Maintenance becomes more challenging when more nodes and segments are added.
Networking Devices
Basic hardware interconnecting network nodes, such as Network Interface Cards (NICs),
Bridges, Hubs, Switches, and Routers, are used in all networks. In addition, a mechanism
for connecting these building parts is necessary, which is usually galvanic cable and optical
cable are less popular (“optical fiber”) The following are the network devices:
NIC (Network Interface Card): A network card, often known as a network adapter or
NIC (network interface card), is computer hardware that enables computers to communicate
via a network. It offers physical access to networking media, and, in many cases, MAC
addresses serve as a low-level addressing scheme. Each network interface card has a
distinct identifier. This is stored on a chip that is attached to the card.
Repeater: A repeater is an electrical device that receives a signal, cleans it of unwanted
noise, regenerates it, and retransmits it at a higher power level or to the opposite side of an
obstruction, allowing the signal to travel greater distances without degradation. In the
majority of twisted pair Ethernet networks, Repeaters are necessary for cable lengths longer
than 100 meters in some systems. Repeaters are based on physics.
Hub: A hub is a device that joins together many twisted pairs or fiber optic Ethernet
devices to give the illusion as a formation of a single network segment. The device can be
visualized as a multiport repeater. A network hub is a relatively simple broadcast device.
Any packet entering any port is regenerated and broadcast out on all other ports, and hubs
do not control any of the traffic that passes through them. Packet collisions occur as a result
of every packet being sent out through all other ports, substantially impeding the smooth
flow of communication.
Bridges: Bridges broadcast data to all the ports but not on the one that received the
transmission. Bridges, on the other hand, learn which MAC addresses are reachable through
specific ports rather than copying messages to all ports as hubs do. Once a port and an
address are associated, the bridge will only transport traffic for that address to that port.
Switches: A switch differs from a hub in that it only forwards frames to the ports that are
participating in the communication, rather than all of the ports that are connected. The
collision domain is broken by a switch, yet the switch depicts itself as a broadcast domain.
Frame forwarding decisions are made by switches based on MAC addresses.
Routers: Routers are networking devices that use headers and forwarding tables to find the
optimal way to forward data packets between networks. A router is a computer networking
device that links two or more computer networks and selectively exchanges data packets
between them. A router can use address information in each data packet to determine if the
source and destination are on the same network or if the data packet has to be transported
between networks. When numerous routers are deployed in a wide collection of
interconnected networks, the routers share target system addresses so that each router can
develop a table displaying the preferred pathways between any two systems on the
associated networks.
Gateways: To provide system compatibility, a gateway may contain devices such as
protocol translators, impedance matching devices, rate converters, fault isolators, or signal
translators. It also necessitates the development of administrative procedures that are
acceptable to both networks. By completing the necessary protocol conversions, a protocol
translation/mapping gateway joins networks that use distinct network protocol
technologies.
Internet:
The internet is a larger network that allows computer networks controlled by enterprises,
governments, colleges, and other organizations all over the world to communicate with one
another. As a result, there are a tangle of cables, computers, data centers, routers, servers,
repeaters, satellites, and wi-fi towers that allow digital data to go around the world.
The Internet is a vast network of networks that functions as a networking infrastructure. It
links millions of computers throughout the world, creating a network in which any
computer can talk with any other computer as long as they are both linked to the Internet.
The Internet is a global network of interconnected computers that communicate and share
information using a standardized Internet Protocol Suite.
Network Devices (Hub, Repeater, Bridge, Switch, Router, Gateways and Brouter):
1. Repeater – A repeater operates at the physical layer. Its job is to regenerate the signal
over the same network before the signal becomes too weak or corrupted so as to extend the
length to which the signal can be transmitted over the same network. An important point to
be noted about repeaters is that they do not amplify the signal. When the signal becomes
weak, they copy the signal bit by bit and regenerate it at the original strength. It is a 2 port
device.
2. Hub – A hub is basically a multiport repeater. A hub connects multiple wires coming
from different branches, for example, the connector in star topology which connects
different stations. Hubs cannot filter data, so data packets are sent to all connected devices.
In other words, the collision domain of all hosts connected through Hub remains one.
Also, they do not have the intelligence to find out the best path for data packets which leads
to inefficiencies and wastage.
Types of Hub
Active Hub:- These are the hubs that have their own power supply and can clean, boost,
and relay the signal along with the network. It serves both as a repeater as well as a wiring
center. These are used to extend the maximum distance between nodes.
Passive Hub :- These are the hubs that collect wiring from nodes and power supply from
the active hub. These hubs relay signals onto the network without cleaning and boosting
them and can’t be used to extend the distance between nodes.
Intelligent Hub :- It works like active hubs and includes remote management capabilities.
They also provide flexible data rates to network devices. It also enables an administrator to
monitor the traffic passing through the hub and to configure each port in the hub.
3. Bridge – A bridge operates at the data link layer. A bridge is a repeater, with add on the
functionality of filtering content by reading the MAC addresses of source and destination. It
is also used for interconnecting two LANs working on the same protocol. It has a single
input and single output port, thus making it a 2 port device.
Types of Bridges
Transparent Bridges:- These are the bridge in which the stations are completely unaware
of the bridge’s existence i.e. whether or not a bridge is added or deleted from the network,
reconfiguration of the stations is unnecessary. These bridges make use of two processes i.e.
bridge forwarding and bridge learning.
Source Routing Bridges:- In these bridges, routing operation is performed by the source
station and the frame specifies which route to follow. The host can discover the frame by
sending a special frame called the discovery frame, which spreads through the entire
network using all possible paths to the destination.
4. Switch – A switch is a multiport bridge with a buffer and a design that can boost its
efficiency (a large number of ports imply less traffic) and performance. A switch is a data
link layer device. The switch can perform error checking before forwarding data, which
makes it very efficient as it does not forward packets that have errors and forward good
packets selectively to the correct port only. In other words, the switch divides the collision
domain of hosts, but broadcast domain remains the same.
5. Routers – A router is a device like a switch that routes data packets based on their IP
addresses. The router is mainly a Network Layer device. Routers normally connect LANs
and WANs together and have a dynamically updating routing table based on which they
make decisions on routing the data packets. Router divide broadcast domains of hosts
connected through it.
6. Gateway – A gateway, as the name suggests, is a passage to connect two networks
together that may work upon different networking models. They basically work as the
messenger agents that take data from one system, interpret it, and transfer it to another
system. Gateways are also called protocol converters and can operate at any network layer.
Gateways are generally more complex than switches or routers. Gateway is also called a
protocol converter.
7. Brouter – It is also known as the bridging router is a device that combines features of
both bridge and router. It can work either at the data link layer or a network layer. Working
as a router, it is capable of routing packets across networks, and working as the bridge, it is
capable of filtering local area network traffic.
8. NIC – NIC or network interface card is a network adapter that is used to connect the
computer to the network. It is installed in the computer to establish a LAN. It has a unique
id that is written on the chip, and it has a connector to connect the cable to it. The cable acts
as an interface between the computer and router or modem. NIC card is a layer 2 device
which means that it works on both physical and data link layer of the network model.
Node is a device or application that works as a connection point for a network connection.
Moreover, it can transmit the information, receive, send, and store the given information.
Nodes are used in almost every field where devices or computers need to connect with the
internet.
The function of the nodes in a computer network can occur in two types, as mentioned below.
As a node that works like a router so that the information can transmit easily. With the help
of safe commissioning services, the devices can securely connect with the network. Then it
can keep the required device connected with the network of all the types.
It can also work as the end device that has the endpoints for the network transmission. Here it
interacts with the router when it transfers the data. And it does not transfer any data to other
network devices. Also, its primary device can be disabled to minimize the power.
What Is a Host?
A host (or network host) is a device that links with other hosts on a network. It can either
be a client or a server that sends and receives applications, services, or data. Hosts have their
unique IP address on a TCP/IP network, consisting of the device’s local number and the
network number it belongs to.
Types of IT hosts
The term host is used in several other areas within information technology (IT), carrying a
slightly different meaning depending on the context.
Web host. For companies or individuals with a website, a host is a web server that stores and
transmits the data for one or more websites. Host can also refer to the service provider that
leases this infrastructure, which is known as hosting.
Cloud host. A cloud host is based on cloud computing technologies that allow a number of
servers to act as one system in which website performance can be guaranteed by multiple
machines. It often includes a network of servers pulling from different data centers in
different locations. Cloud hosts operate as a service that allows clients to buy as much of the
service as they need
Virtual host. The term virtual host has two uses. One refers to the technology used to run
multiple domains or applications on a single physical server, and the second refers to
companies that sell virtual infrastructure services.
Remote host. In this context, a remote host is in a different physical location than the user
accessed using a private network or the internet, which provides users with remote access.
Examples include servers that can be logged into remotely or a host computer for a remote
desktop.
Network software:
Network software is an umbrella term used to describe a wide range of software that
streamlines the operations, design, monitoring, and implementation of computer networks.
Network software is a fundamental element for any networking system. It helps
administrators and security personnel reduce network complexities, and manage, monitor,
and better control network traffic. Network software plays a crucial role in managing a
network infrastructure and simplifying IT operations by facilitating communication, security,
content, and data sharing.
Network software offers useful benefits to organizations. It has become an important tool in
facilitating round-the-clock communication and allowing an uninterrupted exchange of
information. One of the most significant advantages of network software is its direct
correlation with productivity. The centralized nature of network software increases the
productivity of the complete system. This helps reduce end-user technical support problems.
For example, if an end user accidentally damages their computer, the chances of losing data
are reduced substantially as all its data is already shared on the network. Another key benefit
of network software is its ability to enable programmatic management of network resources.
This eliminates the need for manual processes, thereby providing a dynamic and efficient
network configuration to work with.
User management allows administrators to add or remove users from the network. This is
particularly useful when hiring or relieving
File management lets administrators decide the location of data storage and control user
access to that data.
Access enables users to enjoy uninterrupted access to network resources.
Network security systems assist administrators in looking after security and preventing data
breaches.
Network Protocol:
A network protocol is an accepted set of rules that govern data communication between
different devices in the network. It determines what is being communicated, how it is being
communicated, and when it is being communicated. It permits connected devices to
communicate with each other, irrespective of internal and structural differences.