Unit 3
Unit 3
Gaurav Sahu – ECE Department 6EC4-01: Computer Network Unit 3: Introduction to Computer Network
Page |2
Data Communication
The exchange of data between two devices through a transmission medium is called Data
Communication. The data is exchanged in the form of 0's and 1's. The transmission
Gaurav Sahu – ECE Department 6EC4-01: Computer Network Unit 3: Introduction to Computer Network
Page |3
medium used is wire cable. For data communication to occur, the communication device
must be a part of a communication system. Data Communication has two types
- Local and Remote which are discussed below:
Data Communication: Local
Local communication takes place when the communicating devices are in the same
geographical area, same building, or face-to-face etc.
Data Communication: Remote
Remote communication takes place over a distance i.e. the devices are farther. The
effectiveness of a data communication can be measured through the following features:
1. Delivery: Delivery should be done to the correct destination.
2. Timeliness: Delivery should be on time.
3. Accuracy: Data delivered should be accurate.
Gaurav Sahu – ECE Department 6EC4-01: Computer Network Unit 3: Introduction to Computer Network
Page |1
Gaurav Sahu – ECE Department 6EC4-01: Computer Network Unit 3: Applications of Computer Network
Page |2
Gaurav Sahu – ECE Department 6EC4-01: Computer Network Unit 3: Applications of Computer Network
Page |1
SIMPLEX Mode
In this type of transmission mode, data can be sent only in one direction i.e. communication
is unidirectional. We cannot send a message back to the sender. Unidirectional
communication is done in Simplex Systems where we just need to send a command/signal,
and do not expect any response back.
Examples of simplex Mode are loudspeakers, television broadcasting, television and remote,
keyboard and monitor etc.
Gaurav Sahu – ECE Department 6EC4-01: Computer Network Unit 3: Transmission Modes
Page |2
In full duplex system there can be two lines one for sending the data and the other for
receiving data.
Gaurav Sahu – ECE Department 6EC4-01: Computer Network Unit 3: Transmission Modes
Page |1
Characteristics of LAN
LAN's are private networks, not subject to tariffs or other regulatory controls.
LAN's operate at relatively high speed when compared to the typical WAN.
There are different types of Media Access Control methods in a LAN, the prominent
ones are Ethernet, Token ring.
It connects computers in a single building, block or campus, i.e. they work in a
restricted geographical area.
Gaurav Sahu – ECE Department 6EC4-01: Computer Network Unit 3: Types of Communication Network
Page |2
Applications of LAN
One of the computer in a network can become a server serving all the remaining
computers called clients. Software can be stored on the server and it can be used by
the remaining clients.
Connecting Locally all the workstations in a building to let them communicate with
each other locally without any internet access.
Sharing common resources like printers etc are some common applications of LAN.
Advantages of LAN
Resource Sharing: Computer resources like printers, modems, DVD-ROM drives and
hard disks can be shared with the help of local area networks. This reduces cost and
hardware purchases.
Software Applications Sharing: It is cheaper to use same software over network
instead of purchasing separate licensed software for each client a network.
Easy and Cheap Communication: Data and messages can easily be transferred over
networked computers.
Centralized Data: The data of all network users can be saved on hard disk of the
server computer. This will help users to use any workstation in a network to access
their data. Because data is not stored on workstations locally.
Data Security: Since, data is stored on server computer centrally, it will be easy to
manage data at only one place and the data will be more secure too.
Internet Sharing: Local Area Network provides the facility to share a single internet
connection among all the LAN users. In Net Cafes, single internet connection sharing
system keeps the internet expenses cheaper.
Disadvantages of LAN
High Setup Cost: Although the LAN will save cost over time due to shared computer
resources, but the initial setup costs of installing Local Area Networks is high.
Privacy Violations: The LAN administrator has the rights to check personal data files
of each and every LAN user. Moreover he can check the internet history and computer
use history of the LAN user.
Data Security Threat: Unauthorised users can access important data of an
organization if centralized data repository is not secured properly by the LAN
administrator.
LAN Maintenance Job: Local Area Network requires a LAN Administrator because,
there are problems of software installations or hardware failures or cable
disturbances in Local Area Network. A LAN Administrator is needed at this full time
job.
Covers Limited Area: Local Area Network covers a small area like one office, one
building or a group of nearby buildings.
Gaurav Sahu – ECE Department 6EC4-01: Computer Network Unit 3: Types of Communication Network
Page |3
Characteristics of MAN
It generally covers towns and cities (50 km)
Communication medium used for MAN are optical fibers, cables etc.
Data rates adequate for distributed computing applications.
Advantages of MAN
Extremely efficient and provide fast communication via high-speed carriers, such as
fiber optic cables.
It provides a good back bone for large network and provides greater access to WANs.
The dual bus used in MAN helps the transmission of data in both directions
simultaneously.
A MAN usually encompasses several blocks of a city or an entire city.
Disadvantages of MAN
More cable required for a MAN connection from one place to another.
It is difficult to make the system secure from hackers and industrial espionage
(spying) graphical regions.
Gaurav Sahu – ECE Department 6EC4-01: Computer Network Unit 3: Types of Communication Network
Page |4
Characteristics of WAN
It generally covers large distances (states, countries, continents).
Communication medium used are satellite, public telephone networks which are
connected by routers.
Advantages of WAN
Covers a large geographical area so long distance business can connect on the one
network.
Shares software and resources with connecting workstations.
Messages can be sent very quickly to anyone else on the network. These messages can
have picture, sounds or data included with them (called attachments).
Expensive things (such as printers or phone lines to the internet) can be shared by all
the computers on the network without having to buy a different peripheral for each
computer.
Everyone on the network can use the same data. This avoids problems where some
users may have older information than others.
Disadvantages of WAN
Need a good firewall to restrict outsiders from entering and disrupting the network.
Setting up a network can be an expensive, slow and complicated. The bigger the
network the more expensive it is.
Once set up, maintaining a network is a full-time job which requires network
supervisors and technicians to be employed.
Security is a real issue when many different people have the ability to use information
from other computers. Protection against hackers and viruses adds more complexity
and expense.
Gaurav Sahu – ECE Department 6EC4-01: Computer Network Unit 3: Types of Communication Network
Page |5
Wireless Network
Digital wireless communication is not a new idea. Earlier, Morse code was used to
implement wireless networks. Modern digital wireless systems have better performance,
but the basic idea is the same.
Wireless Networks can be divided into three main categories:
1. System interconnection
2. Wireless LANs
3. Wireless WANs
System Interconnection
System interconnection is all about interconnecting the components of a computer
using short-range radio. Some companies got together to design a short-range wireless
network called Bluetooth to connect various components such as monitor, keyboard, mouse
and printer, to the main unit, without wires. Bluetooth also allows digital cameras, headsets,
scanners and other devices to connect to a computer by merely being brought within range.
In simplest form, system interconnection networks use the master-slave concept. The
system unit is normally the master, talking to the mouse, keyboard, etc. as slaves.
Wireless LANs
These are the systems in which every computer has a radio modem and antenna with
which it can communicate with other systems. Wireless LANs are becoming increasingly
common in small offices and homes, where installing Ethernet is considered too much
trouble. There is a standard for wireless LANs called IEEE 802.11, which most systems
implement and which is becoming very widespread.
Wireless WANs
The radio network used for cellular telephones is an example of a low-bandwidth wireless
WAN. This system has already gone through three generations.
The first generation was analog and for voice only.
The second generation was digital and for voice only.
The third generation is digital and is for both voice and data.
Gaurav Sahu – ECE Department 6EC4-01: Computer Network Unit 3: Types of Communication Network
Page |6
Inter Network
Inter Network or Internet is a combination of two or more networks. Inter network can be
formed by joining two or more individual networks by means of various devices such as
routers, gateways and bridges.
Gaurav Sahu – ECE Department 6EC4-01: Computer Network Unit 3: Types of Communication Network
Page |1
Point-To-Point Connection
It is a protocol which is used as a communication link between two devices. It is simple to
establish. The most common example for Point-to-Point connection (PPP) is a computer
connected by telephone line. We can connect the two devices by means of a pair of wires or
using a microwave or satellite link.
Example: Point-to-Point connection between remote control and Television for changing
the channels.
MultiPoint Connection
It is also called Multidrop configuration. In this connection two or more devices share a single
link.
There are two kinds of Multipoint Connections:
If the links are used simultaneously between many devices, then it is spatially shared
line configuration.
If user takes turns while using the link, then it is time shared (temporal) line
configuration.
Gaurav Sahu – ECE Department 6EC4-01: Computer Network Unit 3: Line Configuration & Network
Topology
Page |2
BUS Topology
Bus topology is a network type in which every computer and network device is connected to
single cable. When it has exactly two endpoints, then it is called Linear Bus topology.
Gaurav Sahu – ECE Department 6EC4-01: Computer Network Unit 3: Line Configuration & Network
Topology
Page |3
RING Topology
It is called ring topology because it forms a ring as each computer is connected to another
computer, with the last one connected to the first. Exactly two neighbors for each device.
Gaurav Sahu – ECE Department 6EC4-01: Computer Network Unit 3: Line Configuration & Network
Topology
Page |4
STAR Topology
In this type of topology all the computers are connected to a single hub through a cable. This
hub is the central node and all others nodes are connected to the central node.
Gaurav Sahu – ECE Department 6EC4-01: Computer Network Unit 3: Line Configuration & Network
Topology
Page |5
3. If the hub fails then the whole network is stopped because all the nodes depend on
the hub.
4. Performance is based on the hub that is it depends on its capacity
MESH Topology
It is a point-to-point connection to other nodes or devices. All the network nodes are
connected to each other. Mesh has n(n-1)/2 physical channels to link n devices.
There are two techniques to transmit data over the Mesh topology, they are:
1. Routing
2. Flooding
MESH Topology: Routing
In routing, the nodes have a routing logic, as per the network requirements. Like routing
logic to direct the data to reach the destination using the shortest distance. Or, routing logic
which has information about the broken links, and it avoids those node etc. We can even have
routing logic, to re-configure the failed nodes.
MESH Topology: Flooding
In flooding, the same data is transmitted to all the network nodes, hence no routing logic is
required. The network is robust, and it’s very unlikely to lose the data. But it leads to
unwanted load over the network.
Gaurav Sahu – ECE Department 6EC4-01: Computer Network Unit 3: Line Configuration & Network
Topology
Page |6
TREE Topology
It has a root node and all other nodes are connected to it forming a hierarchy. It is also called
hierarchical topology. It should at least have three levels to the hierarchy.
Gaurav Sahu – ECE Department 6EC4-01: Computer Network Unit 3: Line Configuration & Network
Topology
Page |7
HYBRID Topology
It is two different types of topologies which is a mixture of two or more topologies. For
example if in an office in one department ring topology is used and in another star topology
is used, connecting these topologies will result in Hybrid Topology (ring topology and star
topology).
Gaurav Sahu – ECE Department 6EC4-01: Computer Network Unit 3: Internet & WEB
Page |2
URI:
URI stands for ‘Uniform Resource Identifier’, it’s like an address providing a unique global
identifier to a resource on the Web. Uniform Resource Locator (URL) is the most commonly
used form of a URI.
The URL consists mainly of two parts:
1. The protocol used in transfer, e.g., HTTP.
2. The domain name.
Gaurav Sahu – ECE Department 6EC4-01: Computer Network Unit 3: Internet & WEB
1|Page
Objectives of FTP
It provides the sharing of files.
It is used to encourage the use of remote computers.
It transfers the data more reliably and efficiently.
Why FTP?
Although transferring files from one system to another is very simple and straightforward,
but sometimes it can cause problems. For example, two systems may have different file
conventions. Two systems may have different ways to represent text and data. Two systems
may have different directory structures. FTP protocol overcomes these problems by
establishing two connections between hosts. One connection is used for data transfer, and
another connection is used for the control connection.
Mechanism of FTP
Gaurav Sahu – ECE Department 6EC4-01: Computer Network Unit 3: File Transfer Protocol
Page |2
The above figure shows the basic model of the FTP. The FTP client has three components:
the user interface, control process, and data transfer process. The server has two
components: the server control process and the server data transfer process.
Control Connection: The control connection uses very simple rules for
communication. Through control connection, we can transfer a line of command or
line of response at a time. The control connection is made between the control
processes. The control connection remains connected during the entire interactive
FTP session.
Data Connection: The Data Connection uses very complex rules as data types may
vary. The data connection is made between data transfer processes. The data
connection opens when a command comes for transferring the files and closes when
the file is transferred.
FTP Clients
FTP client is a program that implements a file transfer protocol which allows you to
transfer files between two hosts on the internet.
It allows a user to connect to a remote host and upload or download the files.
It has a set of commands that we can use to connect to a host, transfer the files
between you and your host and close the connection.
The FTP program is also available as a built-in component in a Web browser. This GUI
based FTP client makes the file transfer very easy and also does not require to
remember the FTP commands.
Advantages of FTP:
Speed: One of the biggest advantages of FTP is speed. The FTP is one of the fastest
way to transfer the files from one computer to another computer.
Efficient: It is more efficient as we do not need to complete all the operations to get
the entire file.
Gaurav Sahu – ECE Department 6EC4-01: Computer Network Unit 3: File Transfer Protocol
Page |3
Security: To access the FTP server, we need to login with the username and
password. Therefore, we can say that FTP is more secure.
Back & forth movement: FTP allows us to transfer the files back and forth. Suppose
you are a manager of the company, you send some information to all the employees,
and they all send information back on the same server.
Disadvantages of FTP:
The standard requirement of the industry is that all the FTP transmissions should be
encrypted. However, not all the FTP providers are equal and not all the providers
offer encryption. So, we will have to look out for the FTP providers that provides
encryption.
FTP serves two operations, i.e., to send and receive large files on a network. However,
the size limit of the file is 2GB that can be sent. It also doesn't allow you to run
simultaneous transfers to multiple receivers.
Passwords and file contents are sent in clear text that allows unwanted
eavesdropping. So, it is quite possible that attackers can carry out the brute force
attack by trying to guess the FTP password.
It is not compatible with every system.
Gaurav Sahu – ECE Department 6EC4-01: Computer Network Unit 3: File Transfer Protocol
Page |1
Electronic Mail
Email is a service which allows us to send the message in electronic mode over the internet.
It offers an efficient, inexpensive and real time mean of distributing information among
people.
E-Mail Address
Each user of email is assigned a unique name for his email account. This name is known as
E-mail address. Different users can send and receive messages according to the e-mail
address.
E-mail is generally of the form username@domainname. For example,
webmaster@tutorialspoint.com is an e-mail address where webmaster is username and
tutorialspoint.com is domain name.
The username and the domain name are separated by @ (at) symbol.
E-mail addresses are not case sensitive.
Spaces are not allowed in e-mail address.
E-mail Header
The first five lines of an E-mail message is called E-mail header. The header part comprises
of following fields:
From: The From field indicates the sender’s address i.e. who sent the e-mail.
Date: The Date field indicates the date when the e-mail was sent.
Gaurav Sahu – ECE Department 6EC4-01: Computer Network Unit 3: Electronic Mail
Page |2
To: The To field indicates the recipient’s address i.e. to whom the e-mail is sent.
Subject: The Subject field indicates the purpose of e-mail. It should be precise and
to the point.
CC: CC stands for Carbon copy. It includes those recipient addresses whom we want
to keep informed but not exactly the intended recipient.
BCC: BCC stands for Black Carbon Copy. It is used when we do not want one or more
of the recipients to know that someone else was copied on the message.
Greeting: Greeting is the opening of the actual message. Eg. Hi Sir or Hi Guys etc.
Text: It represents the actual content of the message.
Signature: This is the final part of an e-mail message. It includes Name of Sender, Address,
and Contact Number.
Advantages
E-mail has proved to be powerful and reliable medium of communication. Here are the
benefits of E-mail:
Reliable: Many of the mail systems notify the sender if e-mail message was
undeliverable.
Convenience: There is no requirement of stationary and stamps. One does not have
to go to post office. But all these things are not required for sending or receiving an
mail.
Speed: E-mail is very fast. However, the speed also depends upon the underlying
network.
Inexpensive: The cost of sending e-mail is very low.
Printable: It is easy to obtain a hardcopy of an e-mail. Also an electronic copy of an
e-mail can also be saved for records.
Global: E-mail can be sent and received by a person sitting across the globe.
Generality: It is also possible to send graphics, programs and sounds with an e-mail.
Disadvantages
Apart from several benefits of E-mail, there also exists some disadvantages as discussed
below:
Forgery: E-mail doesn’t prevent from forgery, that is, someone impersonating the sender,
since sender is usually not authenticated in any way.
Overload: Convenience of E-mail may result in a flood of mail.
Misdirection: It is possible that you may send e-mail to an unintended recipient.
Junk: Junk emails are undesirable and inappropriate emails. Junk emails are sometimes
referred to as spam.
Gaurav Sahu – ECE Department 6EC4-01: Computer Network Unit 3: Electronic Mail
Page |3
No Response: It may be frustrating when the recipient does not read the e-mail and
respond on a regular basis.
E-mail Protocols are set of rules that help the client to properly transmit the information to
or from the mail server. Here in this tutorial, we will discuss various protocols such as SMTP,
POP, and IMAP.
SMTP Fundamentals
SMTP is an application layer protocol. The client who wants to send the mail opens a TCP
connection to the SMTP server and then sends the mail across the connection. The SMTP
server is always on listening mode. As soon as it listens for a TCP connection from any client,
the SMTP process initiates a connection on that port (25). After successfully establishing the
TCP connection the client process sends the mail instantly.
SMTP Protocol
The SMTP model is of two type :
1. End-to- end method
2. Store-and- forward method
The end to end model is used to communicate between different organizations whereas the
store and forward method are used within an organization. A SMTP client who wants to send
the mail will contact the destination’s host SMTP directly in order to send the mail to the
destination. The SMTP server will keep the mail to itself until it is successfully copied to the
receiver’s SMTP.
The client SMTP is the one which initiates the session let us call it as the client- SMTP and the
server SMTP is the one which responds to the session request and let us call it as receiver-
SMTP. The client- SMTP will start the session and the receiver-SMTP will respond to the
request.
Gaurav Sahu – ECE Department 6EC4-01: Computer Network Unit 3: Electronic Mail
Page |4
repeat delivery of mail in case the receiver is not available. The MTA delivers the mail to the
mailboxes and the information can later be downloaded by the user agents.
Communication between sender and the receiver: The senders, user agent prepare the
message and send it to the MTA. The MTA functioning is to transfer the mail across the
network to the receivers MTA. To send mail, a system must have the client MTA, and to
receive mail, a system must have a server MTA.
Sending Email: Mail is sent by a series of request and response messages between the client
and a server. The message which is sent across consists of a header and the body. A null line
is used to terminate the mail header. Everything which is after the null line is considered as
the body of the message which is a sequence of ASCII characters. The message body contains
the actual information read by the receipt.
Receiving Email:
The user agent at the server side checks the mailboxes at a particular time of intervals. If any
information is received it informs the user about the mail. When the user tries to read the
mail it displays a list of mails with a short description of each mail in the mailbox. By selecting
any of the mail user can view its contents on the terminal.
Gaurav Sahu – ECE Department 6EC4-01: Computer Network Unit 3: Electronic Mail
Page |5
POP
POP stands for Post Office Protocol. It is generally used to support a single client. There are
several versions of POP but the POP 3 is the current standard.
Key Points
POP is an application layer internet standard protocol.
Since POP supports offline access to the messages, thus requires less internet usage
time.
POP does not allow search facility.
In order to access the messaged, it is necessary to download them.
It allows only one mailbox to be created on server.
It is not suitable for accessing non mail data.
POP commands are generally abbreviated into codes of three or four letters. Eg.
STAT.
IMAP
IMAP stands for Internet Mail Access Protocol. It was first proposed in 1986. There exist
five versions of IMAP as follows:
1. Original IMAP
2. IMAP2
3. IMAP3
4. IMAP2bis
5. IMAP4
Key Points:
IMAP allows the client program to manipulate the e-mail message on the server
without downloading them on the local computer.
The e-mail is hold and maintained by the remote server.
It enables us to take any action such as downloading, delete the mail without reading
the mail. It enables us to create, manipulate and delete remote message folders called
mail boxes.
IMAP enables the users to search the e-mails.
It allows concurrent access to multiple mailboxes on multiple mail servers.
Gaurav Sahu – ECE Department 6EC4-01: Computer Network Unit 3: Electronic Mail
Page |1
DNS is a TCP/IP protocol used on different platforms. The domain name space is divided into
three different sections: generic domains, country domains, and inverse domain.
Generic Domains
It defines the registered hosts according to their generic behavior.
Each node in a tree defines the domain name, which is an index to the DNS database.
It uses three-character labels, and these labels describe the organization type.
Label Description
Gaurav Sahu – ECE Department 6EC4-01: Computer Network Unit 3: Domain Name System
Page |2
Country Domain
The format of country domain is same as a generic domain, but it uses two-character country
abbreviations (e.g., us for the United States) in place of three character organizational
abbreviations.
Gaurav Sahu – ECE Department 6EC4-01: Computer Network Unit 3: Domain Name System
Page |3
Inverse Domain
The inverse domain is used for mapping an address to a name. When the server has received
a request from the client, and the server contains the files of only authorized clients. To
determine whether the client is on the authorized list or not, it sends a query to the DNS
server and ask for mapping an address to the name.
Working of DNS
DNS is a client/server network communication protocol. DNS clients send requests
to the server while DNS servers send responses to the client.
Client requests contain a name which is converted into an IP address known as a
forward DNS lookups while requests containing an IP address which is converted into
a name known as reverse DNS lookups.
DNS implements a distributed database to store the name of all the hosts available on
the internet.
If a client like a web browser sends a request containing a hostname, then a piece of
software such as DNS resolver sends a request to the DNS server to obtain the IP
address of a hostname. If DNS server does not contain the IP address associated with
a hostname, then it forwards the request to another DNS server. If IP address has
arrived at the resolver, which in turn completes the request over the internet
protocol.
Gaurav Sahu – ECE Department 6EC4-01: Computer Network Unit 3: Domain Name System
1|Page
How P2P works (Overview): A peer-to-peer network allows computer hardware and
software to communicate without the need for a server. Unlike client-server architecture,
there is no central server for processing requests in a P2P architecture. The peers directly
interact with one another without the requirement of a central server.
Now, when one peer makes a request, it is possible that multiple peers have the copy of that
requested object. Now the problem is how to get the IP addresses of all those peers. This is
decided by the underlying architecture supported by the P2P systems. By means of one of
these methods, the client peer can get to know about all the peers which have the requested
object/file and the file transfer takes place directly between these two peers.
1. Centralized Directory
It is somewhat similar to client server architecture in the sense that it maintains a huge
central server to provide directory service.
All the peers inform this central server of their IP address and the files they are making
available for sharing.
The server queries the peers at regular intervals to make sure if the peers are still
connected or not.
So basically this server maintains a huge database regarding which file is present at
which IP addresses.
Working
Now whenever a requesting peer comes in, it sends its query to the server.
Since the server has all the information of its peers, so it returns the IP addresses of all
the peers having the requested file to the peer.
Now the file transfer takes place between these two peers.
Gaurav Sahu – ECE Department 6EC4-02 Computer Network Unit 3: P2P File sharing
2|Page
The first system which made use of this method was Napster, for the purpose of Mp3
distribution.
The major problem with such an architecture is that there is a single point of failure. If the
server crashes, the whole P2P network crashes. Also, since all of the processing is to be done
by a single server so a huge amount of database has to be maintained and regularly updated.
2. Query Flooding
Unlike the centralized approach, this method makes use of distributed systems.
In this, the peers are supposed to be connected into an overlay network. It means if a
connection/path exists from one peer to other, it is a part of this overlay network.
In this overlay network, peers are called as nodes and the connection between peers is
called an edge between the nodes, thus resulting in a graph-like structure.
Working
Now when one peer requests for some file, this request is sent to all its neighboring
nodes i.e. to all nodes which are connected to this node. If those nodes don’t have the
required file, they pass on the query to their neighbors and so on. This is called as query
flooding.
When the peer with requested file is found (referred to as query hit), the query flooding
stops and it sends back the file name and file size to the client, thus following the
reverse path.
If there are multiple query hits, the client selects from one of these peers.
Gaurav Sahu – ECE Department 6EC4-02 Computer Network Unit 3: P2P File sharing
3|Page
This method also has some disadvantages like, the query has to be sent to all the neighboring
peers unless a match is found. This increases traffic in the network.
3. Exploiting heterogeneity
This P2P architecture makes use of both the above discussed systems.
It resembles a distributed system like Gnutella because there is no central server for
query processing.
But unlike Gnutella, it does not treat all its peers equally. The peers with higher
bandwidth and network connectivity are at a higher priority and are called as group
leaders/super nodes. The rest of the peers are assigned to these super nodes.
These super nodes are interconnected and the peers under these super nodes inform
their respective leaders about their connectivity, IP address and the files available for
sharing.
KaZaA technology is such an example which makes use of Napster and Gnutella both.
Thus, the individual group leaders along with their child peers form a Napster-like structure.
These group leaders then interconnect among themselves to resemble a Gnutella-like
structure.
Gaurav Sahu – ECE Department 6EC4-02 Computer Network Unit 3: P2P File sharing
4|Page
Working
This structure can process the queries in two ways.
The first one is that the super nodes could contact other super nodes and merge their
databases with its own database. Thus, this super node now has information of a large
number of peers.
Another approach is that when a query comes in, it is forwarded to the neighboring
super nodes until a match is found, just like in Gnutella. Thus query flooding exists but
with limited scope as each super node has many child peers. Hence, such a system
exploits the heterogeneity of the peers by designating some of them as group
leaders/super nodes and others as their child peers.
Gaurav Sahu – ECE Department 6EC4-02 Computer Network Unit 3: P2P File sharing
1|Page
1. Unicast – This type of information transfer is useful when there is a participation of single
sender and single recipient. So, in short you can term it as a one-to-one transmission. For
example, a device having IP address 10.1.2.0 in a network wants to send the traffic stream
(data packets) to the device with IP address 20.12.4.2 in the other network, then unicast
comes into picture. This is the most common form of data transfer over the networks.
2. Broadcast – Broadcasting transfer (one-to-all) techniques can be classified into two types:
Limited Broadcasting – Suppose you have to send stream of packets to all the devices
over the network that you reside, this broadcasting comes handy. For this to achieve, it
will append 255.255.255.255 (all the 32 bits of IP address set to 1) called as Limited
Broadcast Address in the destination address of the datagram (packet) header which
is reserved for information transfer to all the recipients from a single client (sender)
over the network.
Direct Broadcasting – This is useful when a device in one network wants to transfer
packet stream to all the devices over the other network. This is achieved by translating
Gaurav Sahu – ECE Department 6EC4-02 Computer Network Unit III: Multicasting
2|Page
all the Host ID part bits of the destination address to 1, referred as Direct Broadcast
Address in the datagram header for information transfer.
This mode is mainly utilized by television networks for video and audio distribution.
One important protocol of this class in Computer Networks is Address Resolution Protocol
(ARP) that is used for resolving IP address into physical address which is necessary for
underlying communication.
Gaurav Sahu – ECE Department 6EC4-02 Computer Network Unit III: Multicasting
1|Page
Types of Multiplexers:
2. Time Division Multiplexing (TDM) – Each user periodically gets the entire
bandwidth for a small burst of time, i.e. entire channel is dedicated to one user but
only for a short period of time. It is very extensively used in computer communication
and tele-communication. Sharing of the channel is accomplished by dividing available
transmission time on a medium among users. It exclusively uses the Digital
Signaling instead of dividing the cable into frequency bands. TDM splits cable usage
into time slots. Data rate of transmission media exceeds data rate of signals. Uses a
Gaurav Sahu – ECE Department 6EC4-02 Computer Network Unit III: Multiplexing
2|Page
frame and one slot for each slice of time and the time slots are transmitted whether
source has data or not.
Gaurav Sahu – ECE Department 6EC4-02 Computer Network Unit III: Multiplexing