Computer Network Complete Notes
Computer Network Complete Notes
Chapter 1
COMPONENT OF A COMMUNICATION MODEL
Telecommunications Networks:
The electronic transmission of information over distances, called telecommunications, has become virtually inseparable
from computers: Computers and telecommunications create value together.
OR
Telecommunications are the means of electronic transmission of information over distances. The information may be in
the form of voice telephone calls, data, text, images, or video. Today, telecommunications are used to organize more or
less remote computer systems into telecommunications networks. These networks themselves are run by computers.
1. Twisted pair
2. Coaxial cable
4. Terrestrial Microwave
5. Satellite Transmission
6. Radio Transmission
Components of Communication:
A data communications system has five components.
1. Message.
The message is the information (data) to be communicated. Popular forms of information include text, numbers,
pictures, audio, and video.
2. Sender.
The sender is the device that sends the data message. It can be a computer, workstation, telephone handset, video
camera, and so on.
3. Receiver.
The receiver is the device that receives the message. It can be a computer, workstation, telephone handset,
television, and so on.
1|Page
Compiled by: Sir Touqeer
MS Computer Science
Computer Network DIT Part-1
4. Transmission medium.
The transmission medium is the physical path by which a message travels from sender to receiver. Some examples
of transmission media include twisted-pair wire, coaxial cable, fiber-optic cable, and radio waves
5. Protocol.
A protocol is a set of rules that govern data communications. It represents an agreement between the
communicating devices. Without a protocol, two devices may be connected but not communicating, just as a
person speaking French cannot be understood by a person who speaks only Japanese.
2|Page
Compiled by: Sir Touqeer
MS Computer Science
Computer Network DIT Part-1
What Is a Computer Network?
A computer network is a system that connects two or more computing devices for transmitting and sharing information.
Computing devices include everything from a mobile phone to a server. These devices are connected using physical wires
such as fiber optics, but they can also be wireless.
The first working network, called ARPANET, was created in the late 1960s and was funded by the U.S. Department of
Defense. Government researchers used to share information at a time when computers were large and difficult to move.
We have come a long way today from that basic kind of network. Today’s world revolves around the internet, which is a
network of networks that connects billions of devices across the world. Organizations of all sizes use networks to connect
their employees’ devices and shared resources such as printers.
What is LAN?
LAN represents Local Area Network. LANs are tiny networks within a single construction or colleges of up to a few
kilometers. When two or more computers are attached in a limited area, i.e., the inside diameter of not more than a few
kilometers, then such a network is called a local area network. Local area network connects various computers in a small
geographical area such a building so that they can share data, resources, programs, tools, etc.
LAN has very high data transmission rate because it connects a very limited number of computers in a single network. The
hardware components like network adapters, hubs, network cables, etc. required to design LAN are relatively less
expensive.
The most common examples of LAN include private computer networks for home, office, schools, hospitals, colleges, etc.
3|Page
Compiled by: Sir Touqeer
MS Computer Science
Computer Network DIT Part-1
What is MAN?
MAN represents Metropolitan Area Network. MAN is a huge version of LAN and uses similar technology. It uses one or
two cables but does not include switching components. It covers an entire city and can be associated with the local cable
TV network.
A typical MAN connects two or more computing devices that reside apart but in the same or different cities. MAN convers
comparatively larger geographical area as compared to a LAN. But, it is very costly as compared to a LAN. The speed of
data transmission in MAN is of the order of Mbps (Mega Bytes per Second). The most common examples of MAN are
networks of telephone companies that provide high speed digital subscriber line to cable TV customers.
4|Page
Compiled by: Sir Touqeer
MS Computer Science
Computer Network DIT Part-1
What is WAN?
WAN represents Wide Area Network. WAN supports no limit of distance. A WAN offers long-distance communication of
data, voice, pictures and video data over a large geographical area consisting of a country, a continent or even a planet.
A WAN is basically large connection of various LANs and MANs. A WAN makes use of telephone lines or radio waves to
connect LANs together. A WAN uses a relatively very expensive and high-speed technology for data communication.
Based on network structure, WANs are of two types, namely Point-to-Point WAN and Switched WAN. In WANs, satellite
links and public switched telephone networks are used as the communication mediums.
The rate of data transmission in a WAN is comparatively less than a LAN or MAN due to larger distances and the greater
number of computing devices connected in a single network. The speed of data transmission in WANs typically ranges
from a few kbps (kilo bytes per second) to Mbps (Megabytes per second). One of the major issues that WANs face is the
propagation delay. The most common examples of WANs include the Internet, the network of bank cash dispensers, etc.
5|Page
Compiled by: Sir Touqeer
MS Computer Science
Computer Network DIT Part-1
Difference between LAN, MAN, and WAN
The following table highlights all the key differences between LAN, MAN, and WAN −
Basis of
LAN MAN WAN
Comparison
LAN is under the complete The ownership of the The ownership of the
Ownership of
control of the owner, i.e., network can be private or network can be private or
Network
Private. public. public.
There is higher fault tolerance There is smaller fault There is smaller fault
Fault Tolerance
in LAN. tolerance. tolerance.
6|Page
Compiled by: Sir Touqeer
MS Computer Science
Computer Network DIT Part-1
In LANs, the network
In MANs, the network In WANs, the network is very
Congestion congestion is very low due to
congestion is high. high.
less number of computers
Propagation In LANs, the propagation In MANs, the propagation In WANs, the propagation
Delay delay is very less. delay is moderate. delay is very high.
7|Page
Compiled by: Sir Touqeer
MS Computer Science
Computer Network DIT Part-1
WLANs are the wireless LANs, which covers a small area to provide a wireless connection to laptops, smartphones or any
network devices. It is used by wireless capable devices and provide a small network in a limited area.
Wireless networks in your homes, in your company or in Starbucks are all WLAN examples.
8|Page
Compiled by: Sir Touqeer
MS Computer Science
Computer Network DIT Part-1
9|Page
Compiled by: Sir Touqeer
MS Computer Science
Computer Network DIT Part-1
CHAPTER - 2
TOPOLOGY:
Physical Network Topology refers to the actual structure of the physical medium for the transmission of
data.
Logical network Topology refers to the transmission of data between devices present in the network
irrespective of the way devices are connected. The structure of the network is important for the proper
functioning of the network. one must choose the most suitable topology as per their requirement.
• Mesh Topology
• Star Topology
• Bus Topology
• Ring Topology
• Tree Topology
• Hybrid Topology
10 | P a g e
Compiled by: Sir Touqeer
MS Computer Science
Computer Network DIT Part-1
Mesh Topology
In a mesh topology, every device is connected to another device via a particular channel. Every
device is connected to another via dedicated channels. These channels are known as links. In
Mesh Topology, the protocols used are AHCP (Ad Hoc Configuration Protocols), DHCP (Dynamic
Host Configuration Protocol), etc.
11 | P a g e
Compiled by: Sir Touqeer
MS Computer Science
Computer Network DIT Part-1
13 | P a g e
Compiled by: Sir Touqeer
MS Computer Science
Computer Network DIT Part-1
A common example of star topology is a local area network (LAN) in an office where all
computers are connected to a central hub. This topology is also used in wireless networks where
all devices are connected to a wireless access point.
Bus Topology
Bus Topology is a network type in which every computer and network device is connected to a
single cable. It is bi-directional. It is a multi-point connection and a non-robust topology because
if the backbone fails the topology crashes. In Bus Topology, various MAC (Media Access Control)
protocols are followed by LAN ethernet connections like TDMA, Pure Aloha, CDMA, Slotted
Aloha, etc.
Ring Topology
In a Ring Topology, it forms a ring connecting devices with exactly two neighboring devices. A
number of repeaters are used for Ring topology with a large number of nodes, because if
someone wants to send some data to the last node in the ring topology with 100 nodes, then
the data will have to pass through 99 nodes to reach the 100th node. Hence to prevent data loss
repeaters are used in the network.
The data flows in one direction, i.e. it is unidirectional, but it can be made bidirectional by having
2 connections between each Network Node, it is called Dual Ring Topology. In-Ring Topology, the
Token Ring Passing protocol is used by the workstations to transmit the data.
Advantages of Ring Topology
• The data transmission is high-speed.
• The possibility of collision is minimum in this type of topology.
• Cheap to install and expand.
15 | P a g e
Compiled by: Sir Touqeer
MS Computer Science
Computer Network DIT Part-1
• It is less costly than a star topology.
Disadvantages of Ring Topology
• The failure of a single node in the network can cause the entire network to fail.
• Troubleshooting is difficult in this topology.
• The addition of stations in between or the removal of stations can disturb the whole
topology.
• Less secure.
Hybrid Topology
Hybrid Topology is the combination of all the various types of topologies we have studied above.
Hybrid Topology is used when the nodes are free to take any form. It means these can be
individuals such as Ring or Star topology or can be a combination of various types of topologies
seen above. Each individual topology uses the protocol that has been discussed earlier.
16 | P a g e
Compiled by: Sir Touqeer
MS Computer Science
Computer Network DIT Part-1
The above figure shows the structure of the Hybrid topology. As seen it contains a combination
of all different types of networks.
Advantages of Hybrid Topology
• This topology is very flexible.
• The size of the network can be easily expanded by adding new devices.
Disadvantages of Hybrid Topology
• It is challenging to design the architecture of the Hybrid Network.
• Hubs used in this topology are very expensive.
• The infrastructure cost is very high as a hybrid network requires a lot of cabling and
network devices.
17 | P a g e
Compiled by: Sir Touqeer
MS Computer Science
Computer Network DIT Part-1
18 | P a g e
Compiled by: Sir Touqeer
MS Computer Science
Computer Network DIT Part-1
Or
A satellite network typically consists of a transmitting Earth Station with a hub equipment at one end that amplifies and
processes the received signal and transmits it back for reception by one or more ground stations commonly referred to as
Very Small Aperture Terminal (VSAT).
19 | P a g e
Compiled by: Sir Touqeer
MS Computer Science
Computer Network DIT Part-1
RADIO WAVES TOPOLOGY COMPUTER NETWORK
Radio waves are used in wireless local area networks (WLANs) to enable
communication between multiple devices in a limited area. WLANs use high-
frequency radio technology similar to digital cellular and low-frequency radio
technology. Wi-Fi is a common type of wireless radio-wave technology that uses
open standards
What is Bluetooth?
Bluetooth is used for short-range wireless voice and data communication. It is a Wireless Personal Area Network
(WPAN) technology and is used for data communications over smaller distances.
Bluetooth stages up to 10 meters.
Bluetooth is a wireless technology that lets devices like phones, tablets, and headphones connect to each other
and share information without needing cables. Bluetooth simply follows the principle of transmitting and
receiving data using radio waves.
20 | P a g e
Compiled by: Sir Touqeer
MS Computer Science
Computer Network DIT Part-1
Chapter-3
NETWORK DEVICES
Network devices are physical devices that allow hardware on a computer network to communicate and interact
with each other. Network devices like hubs, repeaters, bridges, switches, routers, gateways, and routers help
manage and direct data flow in a network. They ensure efficient communication between connected devices by
controlling data transfer, boosting signals, and linking different networks. Each device serves a specific role, from
simple data forwarding to complex routing between networks. we are going to discuss different types of network
devices in detail.
• Network devices allow devices to connect to the network efficiently and securely.
• Network devices Improve network speed and manage data flow better.
21 | P a g e
Compiled by: Sir Touqeer
MS Computer Science
Computer Network DIT Part-1
What is Node in Computer Networks?
In Computer Networks, a Node is any device that is capable of sending or receiving data, to and from other nodes at
definite and desired flow rates securely and reliably. In simple words, you can say that Nodes are the connection point
among network devices that results in the transfer of data from one point to another. In a Network, more than one
node can be used at one time.
On the basis of functionality and usage, the node devices can be broadly classified into the following types:
1. End Devices
2. Intermediary Devices
22 | P a g e
Compiled by: Sir Touqeer
MS Computer Science
Computer Network DIT Part-1
Modems:
Modems is also known as modulator/demodulator is a network device that is used to convert digital
signal into analog signal of different frequencies and transmits these signal to a modem at the receiving location.
These converted signals can be transmitted over the cable systems, telephone lines, and other communication
mediums. A modem is also used to convert analog signal back into digital signal. Modems are generally used to
access internet by customers of an Internet Service Provider (ISP).
Types of Modems
There are four main types of modems:
• DSL Modem: Uses regular phone lines to connect to the internet but it is slower compared to other types.
• Cable Modem: Sends data through TV cables, providing faster internet than DSL.
• Wireless Modem: Connects devices to the internet using Wi-Fi relying on nearby Wi-Fi signals.
• Cellular Modem: Connects to the internet using mobile data from a cellular network not Wi-Fi or fixed cables.
23 | P a g e
Compiled by: Sir Touqeer
MS Computer Science
Computer Network DIT Part-1
Hub
A hub is a multiport repeater. A hub connects multiple wires coming from different branches, for example, the
connector in star topology which connects different stations. Hubs cannot filter data, so data packets are sent to all
connected devices. In other words, the collision domain of all hosts connected through Hub remains one. Also, they
do not have the intelligence to find out the best path for data packets which leads to inefficiencies and wastage.
Types of Hubs
• Active Hub: These are the hubs that have their power supply and can clean, boost, and relay the signal along with
the network. It serves both as a repeater as well as a wiring center. These are used to extend the maximum distance
between nodes.
Note: A repeater is a network device that amplifies and retransmits signals to extend the range of communication
in a network.
• Passive Hub: These are the hubs that collect wiring from nodes and power supply from the active hub. These hubs
relay signals onto the network without cleaning and boosting them and can’t be used to extend the distance
between nodes.
• Intelligent Hub: It works like an active hub and includes remote management capabilities. They also provide
flexible data rates to network devices. It also enables an administrator to monitor the traffic passing through the
hub and to configure each port in the hub.
24 | P a g e
Compiled by: Sir Touqeer
MS Computer Science
Computer Network DIT Part-1
Switch
A switch is a multiport bridge with a buffer and a design that can boost its efficiency(a large
number of ports imply less traffic) and performance. A switch is a data link layer device. The
switch can perform error checking before forwarding data, which makes it very efficient as it
does not forward packets that have errors and forward good packets selectively to the correct
port only. In other words, the switch divides the collision domain of hosts, but the broadcast
domain remains the same.
• It transfers the data only to the device that has been addressed.
• It uses Unicast (one-to-one), multicast (one-to-many), and broadcast (one-to-all) transmission modes.
• Packet-switching techniques are used to transfer data packets from source to destination.
A Wireless Access Point (WAP) is a networking device that allows connecting the devices with the wired network. A
Wireless Access Point (WAP) is used to create the WLAN (Wireless Local Area Network), it is commonly used in large offices
and buildings which have expanded businesses.
25 | P a g e
Compiled by: Sir Touqeer
MS Computer Science
Computer Network DIT Part-1
Advantages of Wireless Access Point (WAP)
Wireless modems work by converting digital data from an internet service provider (ISP) into a Wi-Fi signal
that can be used by multiple devices within range. Some wireless modems also have built-in routers that allow
multiple devices to connect simultaneously.
26 | P a g e
Compiled by: Sir Touqeer
MS Computer Science
Computer Network DIT Part-1
WHAT IS WIRELESS USB ANTENA
A USB WiFi antenna or USB wireless adapter converts data into high frequency radio waves, encrypts the radio
transmission, and transmits it to a WiFi access point or network router. It also receives radio waves, decrypts
the information, and converts it back into digital data.
A USB WiFi antenna or USB wireless adapter converts data into high frequency radio waves, encrypts the radio
transmission, and transmits it to a WiFi access point or network router. It also receives radio waves, decrypts
the information, and converts it back into digital data. USB WiFi antennas differ from other types of wireless
adapters because they are external devices and only connect to the computer in question via a USB port, while
wireless adapters are often built into a computer, especially laptops.
Wireless USB (WUSB) is a technology that allows devices to connect to a computer without cables using radio
frequency waves. It's based on the Universal Serial Bus (USB) standard, but it's different from Wi-Fi.
What is a Router?
A Router is a networking device that forwards data packets between computer networks. One or more packet-
switched networks or subnetworks can be connected using a router. By sending data packets to their
intended IP addresses, it manages traffic between different networks and permits several devices to share
an Internet connection.
27 | P a g e
Compiled by: Sir Touqeer
MS Computer Science
Computer Network DIT Part-1
• A router determines a packet’s future path by examining the destination IP address of the header and comparing
it to the routing database. The list of routing tables outlines how to send the data to a specific network location.
They use a set of rules to determine the most effective way to transmit the data to the specified IP address.
• To enable communication between other devices and the internet, routers utilize a modem, such as a cable, fiber,
or DSL modem. Most routers include many ports that can connect a variety of devices to
the internet simultaneously. In order to decide where to deliver data and where traffic is coming from, it needs
routing tables.
• A routing table primarily specifies the router’s default path. As a result, it might not determine the optimum path
to forward the data for a particular packet. For instance, the office router directs all networks to its internet service
provider through a single default channel.
• Static and dynamic tables come in two varieties in the router. The dynamic routing tables are automatically
updated by dynamic routers based on network activity, whereas the static routing tables are configured manually.
28 | P a g e
Compiled by: Sir Touqeer
MS Computer Science
Computer Network DIT Part-1
Chapter-4
TRANSMISSION MEDIA
What is Transmission Media in Computer Networks?
A transmission medium is a physical path between the transmitter and the receiver i.e. it is the channel
through which data is sent from one device to another. Transmission Media is broadly classified into the
following types:
1. Guided Media
Guided Media is also referred to as Wired or Bounded transmission media. Signals being transmitted are
directed and confined in a narrow pathway by using physical links.
Features:
• High Speed
• Secure
• Used for comparatively shorter distances
29 | P a g e
Compiled by: Sir Touqeer
MS Computer Science
Computer Network DIT Part-1
Coaxial Cable
Coaxial cable has an outer plastic covering containing an insulation layer made of PVC
or Teflon and 2 parallel conductors each having a separate insulated protection cover.
The coaxial cable transmits information in two modes: Baseband mode (dedicated cable
bandwidth) and Broadband mode (cable bandwidth is split into separate ranges). Cable TVs
and analog television networks widely use Coaxial cables.
• It is easy to install.
30 | P a g e
Compiled by: Sir Touqeer
MS Computer Science
Computer Network DIT Part-1
Disadvantages of Coaxial Cable
• There is a chance of breaking the coaxial cable and attaching a “t-joint” by hackers, this compromises the security
of the data.
10Base5 refers to a standard for Ethernet network technologies that use a thicker version of coaxial cables. It has the
capability to transmit data at speed of 10Mbps up to 500 meters using baseband transmission.
10Base2 is among the family of Ethernet network standards for local area networks (LAN) that uses a thinner version of
coaxial cable to establish a network path or medium and operates at a speed of 10 Mbps to carry out baseband
transmission.
What is 10BASE-T?
10BASE-T is an Ethernet standard for local area networks and one of several physical media. 10BASE-T supports 10
megabits per second (Mbps) transmission speed over twisted-pair cabling with a maximum length of 100 meters (m). The
twisted-pair cables connect with an RJ45 connector.
What is 10BASE-X?
10Base-X refers to a family of Ethernet standards that operate at a speed of 10 Mbps (megabits per second). 100BASE-TX
was quite fast.
Bayonet Neill–Concelman (BNC) is a type of coaxial cable connector commonly used in video and networking applications.
A BNC connector works by using a rotating ring to securely connect two coaxial cables together.
31 | P a g e
Compiled by: Sir Touqeer
MS Computer Science
Computer Network DIT Part-1
• Networking:
• Television and Video:
• Radio and RF Applications:
• Audio Applications:
These are a type of guided media. It was invented by Alexander Graham Bell. Twisted pair cables have two
conductors that are generally made up of copper and each conductor has insulation. These two conductors are twisted
together, thus giving the name twisted pair cables.
One of the conductors is used to carry the signal and the other is used as a ground reference only. The receiver uses the
difference of signals between these two conductors.
32 | P a g e
Compiled by: Sir Touqeer
MS Computer Science
Computer Network DIT Part-1
These are a pair of two insulated copper wires twisted together without any other insulation or shielding and hence are
called unshielded twisted pair cables. They reduce the external interference due to the presence of insulation. Unshielded
twisted pair cables are arranged in pairs so that we can add a new connection whenever required. The DSL or telephone
lines in our houses have one extra pair in them. When UTP are arranged in pairs, each pair is coded with a different color.
The Electronic Industries Association divides UTP into 7 categories based on some standards. Categories are based upon
cable quality where 1 is the highest quality and 7 is the lowest quality. Each cable in a category is put to a different use as
needed.
Advantages –
1. These cables are cost-effective and easy to install owing to their compact size.
2. They are generally used for short-distance transmission of both voice and data.
Disadvantages –
These types of cables have extra insulation or protective covering over the conductors in the form of a
copper braid covering. This covering provides strength to the overall structure of the cable. It also reduces noise and signal
interference in the cable. The shielding ensures that the induced signal can be returned to the source via ground and only
circulate around the shield without affecting the main propagating signal. The STP cables are also color-coded like the UTP
cables as different color pairs are required for analog and digital transmission. These cables are costly and difficult to
install.
Advantages –
1. They are generally used for long-distance communication and transmission and are installed underground.
2. The protective shield prevents external electromagnetic noise penetration into the cable.
Disadvantages –
34 | P a g e
Compiled by: Sir Touqeer
MS Computer Science
Computer Network DIT Part-1
The categories of Unshielded Twisted Pair (UTP) cables, such as Cat 2, Cat 3, Cat 4, Cat 5, and Cat 6, define their
performance specifications, particularly for data transmission speeds and bandwidth. Here's an overview:
• Bandwidth: Up to 4 Mbps.
• Frequency: 1 MHz.
• Usage: Primarily used for token ring networks and early telephone systems.
• Obsolete: Rarely used today, as it cannot support modern data speeds.
Category 3 (Cat 3):
• Bandwidth: Up to 10 Mbps.
• Frequency: 16 MHz.
• Usage: Designed for 10Base-T Ethernet and telephone networks.
• Obsolete: Superseded by higher categories but may still be found in older installations.
Category 4 (Cat 4):
• Bandwidth: Up to 16 Mbps.
• Frequency: 20 MHz.
• Usage: Used in 16 Mbps token ring networks.
• Obsolete: Rarely used today due to limitations in speed and bandwidth.
Category 5 (Cat 5):
35 | P a g e
Compiled by: Sir Touqeer
MS Computer Science
Computer Network DIT Part-1
Category 6 (Cat 6):
RJ45 Connector
RJ45 stands for Registered Jack 45 and is the most commonly used connector in wired networks. The jacks are mainly used
to connect to the Local Area Network (LAN). It was earlier devised for telephones but is now widely used
in Ethernet Networking. The 45 in RJ45 basically stands for the listing number. The jacks the bandwidth provided by these
is high and the range is usually 10 Gbps. RJ45 has a transparent plastic structure and is an 8-pin connector. It is an 8P8C
connector and the number of wires that can be connected is 8.
The colors of RJ45 wiring include White/Green, Green, White/Orange, Blue, White/Blue, Orange, White/Brown, and
Brown.
36 | P a g e
Compiled by: Sir Touqeer
MS Computer Science
Computer Network DIT Part-1
Pin T568B T568A
2 orange green
4 blue blue
6 green orange
8 brown brown
Optical fiber is a technology used to transmit data by sending short light pulses along a long fiber, which is typically made
of glass or plastic. In optical fiber communication, metal wires are preferred for transmission because the signals travel
more safely.
37 | P a g e
Compiled by: Sir Touqeer
MS Computer Science
Computer Network DIT Part-1
Single-Mode Fibres: These fibers are used to transmit signals over long distances.
Multimode Fibres: These fibers are used to transmit signals over short distances.
Unguided media transport electromagnetic waves without using a physical conductor. It is also known as
unbounded or wireless media, and does not rely on physical pathways to transmit signals. Instead, they use wireless
communication methods to propagate signals through the air or free space.
A satellite is an object that revolve around the earth. A satellite microwave is a type of communication technology
that uses microwave radio waves to transmit data between a ground-based station and an orbiting satellite.
A satellite get signal from ground-based station, enhance that signal and transfer back to another ground-based
station that is situated at different location on the earth. They orbit high above the planet, allowing them to cover large
areas. This process enables long-distance communication, GPS navigation, and weather monitoring.
These are:
• Uplink
• Transponders
• Downlink
39 | P a g e
Compiled by: Sir Touqeer
MS Computer Science
Computer Network DIT Part-1
There are two categories in which satellite communication services can be classified:
In one-way satellite communication, the communication usually takes place between either one or multiple earth stations
through the help of a satellite.
The communication takes place between the transmitter on the first earth satellite to the receiver which is the second
earth satellite. The transmission of the signal is unidirectional. Some common one-way satellite communication is:
40 | P a g e
Compiled by: Sir Touqeer
MS Computer Science
Computer Network DIT Part-1
In two-way satellite communication, the information is exchanged between any two earth stations. It can be said that there
is a point to point connectivity.
The signal is transmitted from the first earth station to the second earth station such that there are two uplinks and two
downlinks between the earth stations and the satellite.
41 | P a g e
Compiled by: Sir Touqeer
MS Computer Science
Computer Network DIT Part-1
What is Wi-Fi?
WiFi is a wireless technology that allows electronic devices to connect to the internet and communicate with each other
without a physical cable. This uses radio waves to transmit the data between a WiFi router and compatible devices like
smartphones, computers, and smart home gadgets. These WiFi networks are common in homes, offices, and public spaces
providing convenient internet access and local connectivity.
Wi-Fi is a wireless technology for networking, so it uses Electromagnetic waves to transmit networks. We know that there
are many divisions of Electromagnetic waves according to their frequency such as X-ray, Gamma-ray, radio wave,
microwave, etc, in Wi-Fi, the radio frequency is used. For transmitting Wi-Fi signal
What is Bluetooth?
Bluetooth is a wireless communication technology that enables the exchange of data over short distances between devices
using radio frequency (RF) waves. It operates in the 2.4 GHz ISM (Industrial, Scientific, and Medical) band and is widely
used for connecting devices such as smartphones, headphones, speakers, keyboards, mice, and other electronic gadgets
without the need for cables.
42 | P a g e
Compiled by: Sir Touqeer
MS Computer Science
Computer Network DIT Part-1
Advantages of Bluetooth:
• Wireless Communication
• Low Power Consumption
• Ease of Use:
• Cost-Effective
• Multi-Device Connectivity
• Widely Used
Disadvantages of Bluetooth:
• Limited Range
• Data Transfer Speed is low
• Security Concerns
• Limited Bandwidth
What is Microwave Transmission?
Sending and receiving information using a microwave is known as microwave transmission. It is the
Transmission of information (voice, data, television, telephony, radio signals) by microwave signals.
Microwaves are widely used for point-to-point communications.
• They have a better implementation in bad weather conditions than radio waves.
• It is expensive.
• Electromagnetic waves cannot bend or move through obstacles like mountains etc.
• Microwave signals are vulnerable to electromagnetic interference . Microwave systems are also affected by
atmospheric conditions.
44 | P a g e
Compiled by: Sir Touqeer
MS Computer Science
Computer Network DIT Part-1
• Radio waves offer mobility at a lower price.
• It has a very low setup price as it does not need digging and laying the cables.
• Radio waves can penetrate well; therefore, we can also receive signals within a building.
Wireless LANs (WLANs) are wireless computer networks that use high-frequency radio waves instead of cables for
connecting the devices within a limited area forming LAN (Local Area Network). Users connected by wireless LANs can
move around within this limited area such as home, school, campus, office building, railway platform, etc.
45 | P a g e
Compiled by: Sir Touqeer
MS Computer Science
Computer Network DIT Part-1
Advantages of WLANs
• The LANs are scalable in nature, i.e. devices may be added or removed from the network at greater ease than
wired LANs.
• The system is portable within the network coverage. Access to the network is not bounded by the length of the
cables.
Hub is a physical layer Switch is a data link layer Router is a network layer
device i.e. layer 1. device i.e. layer 2. device i.e. layer 3.
A Hub works on the basis Switch works on the basis A router works on the basis of
of broadcasting. of MAC address. IP address.
A Switch is a tele-
A Hub is a multiport communication device A router reads the header of
repeater in which a signal which receives a message incoming packet and forward it
introduced at the input of from any device connected to the port for which it is
any port appears at the to it and then transmits the intended there by determines
output of the all-available message only to the device the route. It can also perform
ports. for which the message is filtering and encapsulation.
intended.
46 | P a g e
Compiled by: Sir Touqeer
MS Computer Science
Computer Network DIT Part-1
At least single network is At least single network is Router needs at least two
required to connect. required to connect. networks to connect.
A wireless card, a wireless network card, or a Wi-Fi card is a hardware component that enables a device, such as a computer
or a smartphone, to connect to a wireless network. It allows the device to communicate and exchange data with other
devices or access points over radio frequency signals without physical cables.
Wireless network cards come in various types, each catering to specific technologies such as Wi-Fi, 4G, and the game-
47 | P a g e
Compiled by: Sir Touqeer
MS Computer Science
Computer Network DIT Part-1
changing 5G. These cards are designed to seamlessly integrate with different communication standards, allowing devices
to connect and communicate effortlessly.
Wireless cards offer numerous advantages contributing to their widespread adoption and use in various devices. Here are
some of the key benefits of wireless cards:
The most significant advantage of wireless cards is their freedom of movement. Users can connect to networks and access
the internet without being tethered to a specific location by cables. This mobility is especially beneficial for laptops,
smartphones, tablets, and other portable devices.
Wireless cards eliminate the need for physical cables and connectors, simplifying setup and configuration. Users can
connect to Wi-Fi networks with a few clicks or taps without plugging and unplugging cables.
Cost Efficiency
Installing and maintaining wired networks can be expensive and labor-intensive, especially in complex environments.
Wireless cards reduce the need for extensive cabling and infrastructure, resulting in potential cost savings.
Scalability
Wireless networks can accommodate multiple devices simultaneously, making them highly scalable. This is particularly
important in environments where many devices must connect to the same network, such as crowded public spaces or
enterprise settings.
48 | P a g e
Compiled by: Sir Touqeer
MS Computer Science
Computer Network DIT Part-1
Chapter 5
NETWORK MODEL
OSI Model
o OSI stands for Open System Interconnection is a reference model that describes how information from
a software application in one computer moves through a physical medium to the software application in another
computer.
o OSI consists of seven layers, and each layer performs a particular network function.
o OSI model was developed by the International Organization for Standardization (ISO) in 1984, and it is now
considered as an architectural model for the inter-computer communications.
o OSI model divides the whole task into seven smaller and manageable tasks. Each layer is assigned a particular task.
o Each layer is self-contained, so that task assigned to each layer can be performed independently.
49 | P a g e
Compiled by: Sir Touqeer
MS Computer Science
Computer Network DIT Part-1
Characteristics of OSI Model:
o The OSI model is divided into two layers: upper layers and lower layers.
o The upper layer of the OSI model mainly deals with the application related issues, and they are implemented
only in the software. The application layer is closest to the end user. Both the end user and the application layer
interact with the software applications. An upper layer refers to the layer just above another layer.
o The lower layer of the OSI model deals with the data transport issues. The data link layer and the physical layer
are implemented in hardware and software. The physical layer is the lowest layer of the OSI model and is closest
to the physical medium. The physical layer is mainly responsible for placing the information on the physical
medium.
1. Physical Layer
2. Data-Link Layer
50 | P a g e
Compiled by: Sir Touqeer
MS Computer Science
Computer Network DIT Part-1
3. Network Layer
4. Transport Layer
5. Session Layer
6. Presentation Layer
7. Application Layer
1. Application Layer
o An application layer serves as a window for users and application processes to access network service.
o An application layer is not an application, but it performs the application layer functions.
2) Presentation Layer
o A Presentation layer is mainly concerned with the syntax and semantics of the information exchanged between
the two systems.
o It acts as a data translator for a network.
o This layer is a part of the operating system that converts the data from one presentation format to another
format.
o The Presentation layer is also known as the syntax layer.
Functions of Presentation layer:
o Translation: The processes in two systems exchange the information in the form of character strings, numbers
Encryption: Encryption is needed to maintain privacy. Encryption is a process of converting the sender-
transmitted information into another form and sends the resulting message over the network.
o Compression: Data compression is a process of compressing the data, i.e., it reduces the number of bits to be
transmitted. Data compression is very important in multimedia such as text, audio, video.
52 | P a g e
Compiled by: Sir Touqeer
MS Computer Science
Computer Network DIT Part-1
3) Session Layer
4) Transport Layer
53 | P a g e
Compiled by: Sir Touqeer
MS Computer Science
Computer Network DIT Part-1
o The Transport layer is a Layer 4 ensures that messages are transmitted in the order in which they are sent and
there is no duplication of data.
o The main responsibility of the transport layer is to transfer the data completely.
o It receives the data from the upper layer and converts them into smaller units known as segments.
o This layer can be termed as an end-to-end layer as it provides a point-to-point connection between source and
destination to deliver the data reliably.
The two protocols used in this layer are:
o Transmission Control Protocol (TCP)
o It is a standard protocol that allows the systems to communicate over the internet.
o User Datagram Protocol (UDP)
o User Datagram Protocol is a transport layer protocol.
Functions of Transport Layer:
o Service-point addressing: the responsibility of the transport layer is to transmit the message to the correct
process.
o Segmentation and reassembly: When the transport layer receives the message from the upper layer, it divides
the message into multiple segments, and each segment is assigned with a sequence number that uniquely
identifies each segment.
o Connection control: Transport layer provides two services Connection-oriented service and connectionless
service
o Flow control: The transport layer also responsible for flow control
o Error control: The sender transport layer ensures that message reach at the destination without any error.
5) Network Layer
o It is a layer 5 that manages device addressing, tracks the location of devices on the network.
o It determines the best path to move data from source to the destination based on the network conditions, the
priority of service, and other factors.
54 | P a g e
Compiled by: Sir Touqeer
MS Computer Science
Computer Network DIT Part-1
o The Data link layer is responsible for routing and forwarding the packets.
o Routers are the layer 5 devices, they are specified in this layer and used to provide the routing services within an
internetwork.
o The protocols used to route the network traffic are known as Network layer protocols. Examples of protocols are
IP and Ipv6.
Functions of Network Layer:
o Internetworking: It provides a logical connection between different devices.
o Addressing: Addressing is used to identify the device on the internet.
o Routing: it determines the best optimal path out of the multiple paths from source to the destination.
o Packetizing: A Network Layer receives the packets from the upper layer and converts them into packets.
6) Data-Link Layer
55 | P a g e
Compiled by: Sir Touqeer
MS Computer Science
Computer Network DIT Part-1
Functions of the Data-link layer
o Framing: The data link layer translates the physical's raw bit stream into packets known as Frames.
o Physical Addressing: The Data link layer adds a header to the frame that contains a destination address.
o Flow Control: is the technique through which the constant data rate is maintained on both the sides so that no
data get corrupted
o Error Control: Error control is achieved by adding a calculated value CRC (Cyclic Redundancy Check).
o Access Control: the data link layer protocols are used to determine which device has control over the link at a
given time.
7) Physical layer
o The main functionality of the physical layer is to transmit the individual bits from one node to another node.
o It is the lowest layer of the OSI model.
o It establishes, maintains and deactivates the physical connection.
o It specifies the mechanical, electrical and procedural network interface specifications.
Functions of a Physical layer:
o Line Configuration: It defines the way how two or more devices can be connected physically.
o Data Transmission: It defines the transmission mode whether it is simplex, half-duplex or full-duplex mode
between the two devices on the network.
o Topology: It defines the way how network devices are arranged.
o Signals: It determines the type of the signal used for transmitting the information.
56 | P a g e
Compiled by: Sir Touqeer
MS Computer Science
Computer Network DIT Part-1
57 | P a g e
Compiled by: Sir Touqeer
MS Computer Science
Computer Network DIT Part-1
The diagrammatic comparison of the TCP/IP and OSI model is as follows:
Application Layer:
58 | P a g e
Compiled by: Sir Touqeer
MS Computer Science
Computer Network DIT Part-1
1. The topic three layers of the OSI Model: Application, Presentation and Sessions, when combined together, they
perform similar functions as the Application Layer of the TCP/IP model
2. node-to-node communication based on the user-interface occurs here
3. Multiple protocols are present in this layer, a few common ones have been mentioned below in brief
• HTTP: Hypertext transfer protocol is used for accessing the information available on the internet.
• SMTP: Simple mail transfer protocol, assigned the task of handling e-mail-related steps and issues.
• FTP: This is the standard protocol that responsible for the transfer of files over the network channel.
Transport Layer
1. This Transport layer is responsible for establishing the connection between the sender and the receiver device
(end-to-end)
2. It also performs the task of maintaining the data, i.e. to be transmitted without error.
3. It controls the data flow rate over the communication channel for smooth transmission of data.
The protocols used in this layer are:
• TCP: Transmission Control Protocol is responsible for the proper transmission of segments over the communication
channel. It also establishes a network connection between the source and destination system.
• UDP: User Datagram Protocol is responsible for identifying errors, and other tasks during the transmission of
information. UDP maintains various fields for data transmission.
This layer performs many important functions in the TCP/IP model, some of which are:
1. It is responsible for specifying the path that the data packets will use for transmission.
2. The Internet layer performs the task of controlling the transmission of the data over the network modes
3. This layer is responsible for providing IP addresses to the system for the identification matters over the network
channel.
59 | P a g e
Compiled by: Sir Touqeer
MS Computer Science
Computer Network DIT Part-1
• Network Access Layer
The full form of TCP/IP is Transmission Control Protocol/ The full form of OSI is Open Systems
Internet Protocol. Interconnection.
It is a communication protocol that is based on standard It is a structured model which deals which the
protocols and allows the connection of hosts over a functioning of a network.
network.
In 1982, the TCP/IP model became the standard In 1984, the OSI model was introduced by the
language of ARPANET. International Organization of Standardization
ARPANET stands for Advanced Research Projects Agency (ISO).
Network.
60 | P a g e
Compiled by: Sir Touqeer
MS Computer Science
Computer Network DIT Part-1
The TCP/IP is the implementation of the OSI Model. An OSI Model is a reference model, based on
which a network is created.
It is protocol-dependent. It is protocol-independent.
The above points of comparison display the difference between the TCP/IP and OSI models efficiently.
CHAPTET-6
IP ADRESS
What is an IP Address?
• An IP address represents an Internet Protocol address.
• A unique address that identifies the device over the network.
• It is almost like a set of rules governing the structure of data sent over the Internet or through a local network.
• An IP address helps the Internet to distinguish between different routers, computers, and websites.
• It serves as a specific machine identifier in a specific network and helps to improve visual communication
between source and destination.
• IP addresses play a crucial role in the transfer of data across networks, such as the Internet.
• They function as unique identifiers that enable devices to locate and communicate with each other in a network.
EXAMPLE
IP address is divided into two parts: X1. X2. X3. X4
1. [X1. X2. X3] is the Network ID
2. [X4] is the Host ID
Example IP Address: 192.168.1.15
Here’s how the parts are divided based on your format:
1. Network ID: 192.168.1 (This corresponds to [X1.X2.X3])
2. Host ID: 15 (This corresponds to [X4])
3. In this version, Internet Protocol Security (IPSec) for network security is optional.
4. It has 4.9 *10 7addresses, but we are still seeing a shortage in network addresses as the use of network and
virtual devices is increasing rapidly.
61 | P a g e
Compiled by: Sir Touqeer
MS Computer Science
Computer Network DIT Part-1
The following table outlines the details between IP address classes.
First octet - Defines the network class and part of the network ID. The range of decimal numbers in each octet is
between 0 and 255.
subnet: A subnet is a logical division of an IP network into smaller, more manageable networks
62 | P a g e
Compiled by: Sir Touqeer
MS Computer Science
Computer Network DIT Part-1
IPv6 addresses
An IPv6 address uses 128 bits, four times more than the IPv4 address, which uses only 32 bits.
IPv6 addresses are written using hexadecimal rather than dotted decimal, as in IPv4.
An IPv6 address consists of 32 hexadecimal numbers since a hexadecimal number uses 4 bits.
These numbers are grouped into eight groups of 4’s and are written with a colon (:) as a separator. For
instance, group6: group7: group8: etc.
63 | P a g e
Compiled by: Sir Touqeer
MS Computer Science
Computer Network DIT Part-1
CHAPTET-7
These set of rules specify the data's transmission, reception, and processing steps and make sure that devices can
understand and analyze the data they share.
It makes it possible for connected devices to interact with one another despite internal and structural differences.
Routing Protocol
• Routing protocols running in different routers exchange information between each other and most
efficient routes to a destination.
• Routing Protocols have capacity to learn about a network when a new network is added and detect when
a network is unavailable.
Examples of Routing Protocols are:
65 | P a g e
Compiled by: Sir Touqeer
MS Computer Science
Computer Network DIT Part-1
Here’s a tabular difference between routing protocols and routed protocols in computer networking:
1. TCP (Transmission Control Protocol) is one of the main protocols of the TCP/IP suite.
2. It lies between the Application and Network Layers which are used in providing reliable delivery
services.
3. Transmission Control Protocol (TCP) ensures reliable and efficient data transmission over the internet.
4. Transmission Control Protocol (TCP) is a connection-oriented protocol for communications that helps in
the exchange of messages between different devices over a network.
5. The position of TCP is at the transport layer of the OSI model.
6. TCP also helps in ensuring that information is transmitted accurately by establishing a virtual connection
between the sender and receiver.
66 | P a g e
Compiled by: Sir Touqeer
MS Computer Science
Computer Network DIT Part-1
What is Internet Protocol (IP)?
1. Internet Protocol (IP) is a method that is useful for sending data from one device to another from all over the
internet.
2. It is a set of rules governing how data is sent and received over the internet.
3. It is responsible for addressing and routing packets of data so they can travel from the sender to the correct
destination across multiple networks.
4. Every device contains a unique IP Address that helps it communicate and exchange data across other devices
present on the internet.
Difference Between TCP and IP
Feature TCP (Transmission Control Protocol) IP (Internet Protocol)
Manages data transmission between Routes packets of data from the source to
Function
devices, ensuring data integrity and order. the destination based on IP addresses.
Error Yes, includes error checking and recovery No, IP itself does not handle errors; relies
Handling mechanisms. on upper-layer protocols like TCP.
67 | P a g e
Compiled by: Sir Touqeer
MS Computer Science
Computer Network DIT Part-1
• It is mainly used for transferring the web page files from their creator to the computer that acts as a
server for other computers on the internet.
• It is also used for downloading the files to computer from other servers.
Objectives of FTP
Mechanism of FTP
68 | P a g e
Compiled by: Sir Touqeer
MS Computer Science
Computer Network DIT Part-1
End chapter 7
69 | P a g e
Compiled by: Sir Touqeer
MS Computer Science