BCA III SEM Com NW Final Notes
BCA III SEM Com NW Final Notes
1
• Quality of service (QoS)
• Reducing single points of failure
• Capacity planning
• Network architecture
3. Security – It means protecting data from unauthorized access.
4. Network topology- it is another crucial factor to consider when designing a computer network. It refers
to the way in which computers, devices, and links are arranged in a network. Common topologies include
bus, star, ring, mesh, and hybrid, each with its own advantages and disadvantages in terms of cost,
scalability, reliability, and performance. The choice of topology depends on the specific needs and
constraints of the network. Other important criteria that must be met by a computer network include
performance, reliability, and security.
Goals of Computer Networks: The following are some important goals of computer networks:
1. Resource Sharing – Many organization has a substantial number of computers in operations, which
are located apart. Ex. A group of office workers can share a common printer, fax, modem, scanner,
etc.
2. High Reliability – If there are alternate sources of supply, all files could be replicated on two or
more machines. If one of them is not available, due to hardware failure, the other copies could be
used.
3. Inter-process Communication – Network users, located geographically apart, may converse in an
interactive session through the network. In order to permit this, the network must provide almost
error-free communications.
4. Flexible access – Files can be accessed from any computer in the network. The project can be begun
on one computer and finished on another.
5. Security– Computer networks must be secure to protect against unauthorized access, data breaches,
and other security threats. This includes implementing measures such as firewalls, antivirus software,
and encryption to ensure the confidentiality, integrity, and availability of data.
6. Performance– Computer networks must provide high performance and low latency to ensure that
applications and services are responsive and available when needed. This requires optimizing
network infrastructure, bandwidth utilization, and traffic management.
7. Scalability- Computer networks must be designed to scale up or down as needed to accommodate
changes in the number of users, devices, and data traffic. This requires careful planning and
management to ensure the network can meet current and future needs.
Other goals include Distribution of processing functions, Centralized management, and allocation of
network resources, Compatibility of dissimilar equipment and software, Good network performance,
Scalability, Saving money, Access to remote information, Person to person communication, etc.
Advantages:
Resource sharing: Networks enable the sharing of resources such as printers, scanners, storage devices, and
software applications, which can reduce costs and increase efficiency.
Communication and collaboration: Networks provide a platform for communication and collaboration
among users, allowing for easy sharing of information and ideas.
Centralized management: Networks allow for centralized management of devices, users, and resources,
making it easier to control and monitor the network.
Scalability: Networks can be scaled up or down to accommodate changes in the number of users, devices,
or data volume.
Accessibility: Networks can provide remote access to resources, enabling users to work from anywhere and
improving accessibility to information and resources.
Disadvantages:
Security vulnerabilities: Networks can be vulnerable to security threats such as hacking, viruses, and
malware, which can compromise sensitive data and disrupt network operations.
Complexity: Networks can be complex to set up, configure, and maintain, requiring specialized knowledge
and expertise.
2
Dependence on infrastructure: Networks depend on the underlying infrastructure such as cables, routers,
switches, and servers, which can be prone to failures or downtime, disrupting network operations.
Cost: Networks can be expensive to set up and maintain, requiring investments in hardware, software, and
personnel.
Performance limitations: Networks have performance limitations such as bandwidth constraints, latency,
and congestion, which can affect the speed and reliability of network operations.
Computer Network Architecture
Computer Network Architecture is defined as the physical and logical design of the software, hardware,
protocols, and media of the transmission of data. Simply we can say that how computers are organized and
how tasks are allocated to the computer.
The two types of network architectures are used:
o Peer-To-Peer network
o Client/Server network
Peer-To-Peer network
o Peer-To-Peer network is a network in which all the computers are linked together with equal
privilege and responsibilities for processing the data.
o Peer-To-Peer network is useful for small environments, usually up to 10 computers.
o Peer-To-Peer network has no dedicated server.
o Special permissions are assigned to each computer for sharing the resources, but this can lead to a
problem if the computer with the resource is down.
Client/Server Network
o Client/Server network is a network model designed for the end users called clients, to access the
resources such as songs, video, etc. from a central computer known as Server.
o The central controller is known as a server while all other computers in the network are
called clients.
3
o A server performs all the major operations such as security and network management.
o A server is responsible for managing all the resources such as files, directories, printer, etc.
o All the clients communicate with each other through a server. For example, if client1 wants to send
some data to client 2, then it first sends the request to the server for the permission. The server sends
the response to the client 1 to initiate its communication with the client 2.
5
Network Standardization
Many network vendors and suppliers exist, each with their own ideas of how things should be done. Without
coordination, there would be complete chaos, and users would be able to get nothing done. The only way out
is to agree upon some network standards.
Not only do standards allow different computers to communicate, they also increase the market for products
adhering to the standard, which leads to mass production, economies of scale in manufacturing, and other
benefits that decrease price and further increase acceptance.
We will take a quick look at the subject of international standardization.
Standards fall into two categories:
1. de facto, and
2. de jure.
De facto (Latin for "from the fact") standards are those that have just happened, without any formal plan.
The IBM PC and its successors are defacto standards for small office computers because dozens of
manufacturers have chosen to copy IBM's machines very closely. UNIX is the de facto standard for
operating systems in university computer science departments.
De jure (Latin for "by law") standards, in contrast, are formal, legal standards adopted by some authorized
standardization body.
nternational standardization authorities are generally divided into two classes:
1. Those established by treaty among national governments, and
2. Voluntary, non-treaty organizations.
In the area of computer network standards, there are several organizations of each type.
Networking models are frameworks that represent how devices and systems communicate and interact
within a network. They help organize the flow of data, ensure efficient communication, and share resources.
What are Centralized Systems?
Centralized systems are a type of computing architecture where all or most of the processing and data
storage is done on a single central server or a group of closely connected servers. This central server
manages all operations, resources, and data, acting as the hub through which all client requests are
processed. The clients, or nodes, connected to the central server typically have minimal processing power
and rely on the server for most computational tasks.
Centralized Systems
Key Characteristics of Centralized Systems
1. Single Point of Control:
• All data processing and management tasks are handled by the central server.
• Easier to manage and maintain since there is one primary location for administration.
2. Simplicity:
• Simplified architecture with a clear structure where all operations are routed through the
central node.
• Easy to deploy and manage due to centralized nature.
3. Efficiency:
• Efficient use of resources as the central server can be optimized for performance.
6
• Easier to implement security measures and updates centrally.
4. Scalability Issues:
• Limited scalability as the central server can become a bottleneck if the load increases
significantly.
• Adding more clients can strain the server’s resources, leading to performance degradation.
5. Single Point of Failure:
• If the central server fails, the entire system can become inoperative.
• High availability and redundancy measures are essential to mitigate this risk.
What are Decentralized Systems?
Decentralized systems are computing architectures where multiple nodes, often spread across different
locations, share control and processing power without a single central authority. Each node in a
decentralized system operates independently but collaborates with others to achieve common goals. This
structure enhances fault tolerance, scalability, and resilience compared to centralized systems.
Decentralized System
Key Characteristics of Decentralized Systems:
1. Distributed Control:
• No single point of control or failure.
• Each node operates independently, contributing to the overall system’s functionality.
2. Fault Tolerance:
• If one node fails, the system can continue to function with the remaining nodes.
• Enhanced resilience against failures and attacks.
3. Scalability:
• Easier to scale by adding more nodes without overwhelming a central point.
• Load distribution across multiple nodes improves performance and resource utilization.
4. Coordination and Communication:
• Nodes must communicate and coordinate to maintain system integrity and consistency.
• Complex algorithms and protocols often manage this coordination.
5. Autonomy and Redundancy:
• Each node can operate autonomously, contributing to redundancy and reducing single points
of failure.
• Data and services are often replicated across multiple nodes for reliability.
What are Distributed Systems?
Distributed systems are computing architectures where multiple independent nodes or computers work
together to achieve a common goal. These nodes communicate and coordinate with each other over a
network, appearing as a single coherent system to the end user. Distributed systems aim to improve
performance, reliability, scalability, and resource sharing by leveraging the collective power of
interconnected devices.
7
Distributed Systems
Key Characteristics of Distributed Systems
1. Geographical Distribution:
• Nodes are spread across different physical locations.
• They communicate via a network, such as a local area network (LAN) or the internet.
2. Resource Sharing:
• Nodes share resources such as processing power, storage, and data.
• This enables more efficient utilization of resources.
3. Concurrency:
• Multiple nodes operate concurrently, performing tasks simultaneously.
• This parallelism enhances the system’s overall performance and throughput.
4. Scalability:
• Easy to scale by adding more nodes to the system.
• System capacity and performance improve with the addition of resources.
5. Fault Tolerance:
• Designed to handle failures gracefully.
• Redundancy and replication ensure the system remains operational even if some nodes fail.
6. Transparency:
• The complexity of the distributed system is hidden from users.
• Users interact with the system as if it were a single entity.
Differences between Centralized, Decentralized and Distributed Systems
Aspect Centralized Systems Decentralized Systems Distributed Systems
Limited scalability,
More scalable, can add Highly scalable, can add more
can become a
nodes independently. nodes to distribute the load.
Scalability bottleneck.
8
Aspect Centralized Systems Decentralized Systems Distributed Systems
Central server
Resources are spread Efficient resource sharing across
Resource resources are heavily
across multiple nodes. nodes.
Utilization utilized.
Lower latency, as
Can vary, depends on the Potentially higher latency due to
operations are
distance between nodes. network communication
Latency managed centrally.
Network Topology
Topology: It refers to the physical arrangement and representation of all the nodes and components of the
network. In general terms, Topology defines the structure of the entire network. The network topology is
divided into five types. They are bus topology, star topology, ring topology, mesh topology, and tree
topology.
1) Bus Topology:
In this arrangement, the nodes (computers) are connected through interface connectors to a single
communication line (central cable) that carries the message in both the directions. The central cable to which
all the nodes are connected is the backbone of the network. It is called a bus. The signal in this arrangement
travels in both directions to all the machines until it finds the recipient machine. It is easy to set up than
other topologies as it uses only a single central cable to establish the network.
Advantages:
o Configuration of the network is easy.
o Less costly because a single cable is used to connect all nodes.
o The Bus topology supports a maximum of 10 Mbps speed by using the network's coaxial or twisted
pair cables.
Disadvantages
o Due to the multipoint communication model, it is difficult to identify and isolate the faulty terminals.
o The reconfiguration will affect the network and slows down the performance.
o Signal interference is another drawback of the bus topology; if two or more nodes transmit the
messages simultaneously, their signals will collide.
o A single node failure also causes the breakdown of the whole network.
o
2) Ring Topology:
9
As the name suggests, in a ring topology, the computers are connected in a circular and closed loop. The
message in this topology moves only in one direction around the ring from one node to another node and is
checked by each node for a matching destination address. So, the data keeps moving until it reaches its
destination. All nodes are equal; a client-server relationship does not exist between them. As the nodes are in
the form of a ring, if one node fails to transmit the data, the flow of communication is severed.
Advantages:
o The data transfer and Communication are easy due to easy packet movement.
o The installation of the network and reconfiguration is easy.
o The presence of errors in links and faulty nodes can be easily identified and isolated.
o The reliability of the ring topology is more.
Disadvantages:
o As the data transmission is unidirectional, the packet will travel all the nodes to reach the destination.
o One node failure incurs damage to the entire network.
o Reconfiguration (adding new nodes) is easy but gets down the performance of the network.
o The delay is more in data transmission when the network contains more stations.
3) Star Topology:
In this topology, all the computers are separately connected to a central node or connection point, which can
be a server, a hub, a router, or a switch. This topology offers an advantage that if a cable does not work, only
the respective node will suffer, the rest of the nodes will work smoothly. All data or messages that one node
sends to another passes through the central hub.
This topology is easy to design and implement as well as it is easy to add additional nodes to the central
node. The major drawback of this topology is that it is prone to bottleneck or failure at the central
connection point, i.e., failure at the central node will affect the entire communication.
Advantages:
o Easy installation and reconfiguration.
o Less expensive as compared to mess Topology because the star requires less wiring.
o Easy to identify and isolate the faulty networks and links.
o When we add a new node, there is no interruption to other nodes in the network as the node is
directly connected to the hub.
o Using star topology, we can achieve a high speed of data transfers.
Disadvantages
o If the hub fails, the whole network will not work.
o The star topology is more expensive than the bus topology because of the hub.
10
o We use more wire than that of the bus and ring topology.
o Every node completely depends on the hub for making decisions to transmit and process the data
packets.
4) Mesh Topology
In a mesh topology, every device is connected to another device in a network using a point-to-point
connection. The connection is generally known as a dedicated connection, as the link transports data
between two devices. The number of links in a mesh topology is calculated using the formula below.
Military organizations use mesh topology to avoid breaks down in communications.
Many connections = n * (n - 1) /2. Here, "n" represents the number of nodes in a network.
Advantages:
o Easy to transmit data.
o We can send data from many devices simultaneously. Mesh topology will handle much traffic as
compared to other topologies.
o If one link is broken or remains faulty, data transfer can occur between nodes using other links.
Hence data transmission is uninterrupted and reliable.
o The physical margins will not allow other persons to enter and access the messages.
o Fault detection and isolation are easy.
Disadvantages:
o The cabling used to construct the network is more.
o The installation cost is high compared to other topologies due to more wiring.
o The installation and reconfiguration are tough because of the presence of many links.
5) Tree Topology
Tree topology is the combination of star and bus topologies. The nodes are connected to a hub as in star
topology, and all the star-connected nodes are placed in a bus topology. The tree topology is a hybrid
connection.
Advantages:
o Network extension is easy.
o The network is broken into smaller star-connected topology units. The nodes connected in a tree
topology are easier to maintain.
o Fault detection and correction are easy.
o If one of the stars connected unit of nodes goes faulty, the other segments will not be affected and
network can be runed with remaining nodes.
Disadvantages:
o The main disadvantage is that if the bus cable is damaged, the entire topology will not work.
o The management of Topology becomes easier when the number of nodes and star-connected
topologies is increased in large numbers.
11
o The reconfiguration becomes difficult when new nodes are added.
Transmission modes
o The way in which data is transmitted from one device to another device is known as transmission
mode.
o The transmission mode is also known as the communication mode.
o Each communication channel has a direction associated with it, and transmission media provide the
direction. Therefore, the transmission mode is also known as a directional mode.
o The transmission mode is defined in the physical layer.
The Transmission mode is divided into three categories:
o Simplex mode
o Half-duplex mode
o Full-duplex mode
Simplex mode
o In Simplex mode, the communication is unidirectional, i.e., the data flow in one direction.
o A device can only send the data but cannot receive it or it can receive the data but cannot send the
data.
o This transmission mode is not very popular as mainly communications require the two-way
exchange of data. The simplex mode is used in the business field as in sales that do not require any
corresponding reply.
o The radio station is a simplex channel as it transmits the signal to the listeners but never allows them
to transmit back.
o Keyboard and Monitor are the examples of the simplex mode as a keyboard can only accept the data
from the user and monitor can only be used to display the data on the screen.
o The main advantage of the simplex mode is that the full capacity of the communication channel can
be utilized during transmission.
Advantage of Simplex mode:
o In simplex mode, the station can utilize the entire bandwidth of the communication channel, so that
more data can be transmitted at a time.
Disadvantage of Simplex mode:
o Communication is unidirectional, so it has no inter-communication between devices.
Half-Duplex mode
o In a Half-duplex channel, direction can be reversed, i.e., the station can transmit and receive the data
as well.
o Messages flow in both the directions, but not at the same time.
o The entire bandwidth of the communication channel is utilized in one direction at a time.
o In half-duplex mode, it is possible to perform the error detection, and if any error occurs, then the
receiver requests the sender to retransmit the data.
12
o A Walkie-talkie is an example of the Half-duplex mode. In Walkie-talkie, one party speaks, and
another party listens. After a pause, the other speaks and first party listens. Speaking simultaneously
will create the distorted sound which cannot be understood.
Advantage of Half-duplex mode:
o In half-duplex mode, both the devices can send and receive the data and also can utilize the entire
bandwidth of the communication channel during the transmission of data.
Disadvantage of Half-Duplex mode:
o In half-duplex mode, when one device is sending the data, then another has to wait, this causes the
delay in sending the data at the right time.
Full-duplex mode
o In Full duplex mode, the communication is bi-directional, i.e., the data flow in both the directions.
o Both the stations can send and receive the message simultaneously.
o Full-duplex mode has two simplex channels. One channel has traffic moving in one direction, and
another channel has traffic flowing in the opposite direction.
o The Full-duplex mode is the fastest mode of communication between devices.
o The most common example of the full-duplex mode is a telephone network. When two people are
communicating with each other by a telephone line, both can talk and listen at the same time.
Advantage of Full-duplex mode:
o Both the stations can send and receive the data at the same time.
Disadvantage of Full-duplex mode:
o If there is no dedicated path exists between the devices, then the capacity of the communication
channel is divided into two parts.
13
Unit 2- Data Communication –
Transferring data over a transmission medium between two or more devices, systems, or places is known as
data communication. Nowadays, computing and telecommunications depend heavily on this data
transmission, which makes a variety of applications conceivable, including email, video chatting, the
Internet, and many more things.
In this article, we will learn about Data communication, Definition, Components, Types, and Channels.
Components of Data Communication
A communication system is made up of the following components:
1. Message: A message is a piece of information that is to be transmitted from one person to another. It
could be a text file, an audio file, a video file, etc.
2. Sender: It is simply a device that sends data messages. It can be a computer, mobile, telephone,
laptop, video camera, or workstation, etc.
3. Receiver: It is a device that receives messages. It can be a computer, telephone mobile, workstation,
etc.
4. Transmission Medium / Communication Channels: Communication channels are the medium that
connect two or more workstations. Workstations can be connected by either wired media or wireless
media.
5. Set of rules (Protocol): When someone sends the data (The sender), it should be understandable to
the receiver also otherwise it is meaningless. For example, Sonali sends a message to Chetan. If
Sonali writes in Hindi and Chetan cannot understand Hindi, it is a meaningless conversation.
14
Some factors need to be considered for designing the transmission media:
o Bandwidth: All the factors are remaining constant, the greater the bandwidth of a medium, the
higher the data transmission rate of a signal.
o Transmission impairment: When the received signal is not identical to the transmitted one due to
the transmission impairment. The quality of the signals will get destroyed due to transmission
impairment.
o Interference: An interference is defined as the process of disrupting a signal when it travels over a
communication medium on the addition of some unwanted signal.
Causes Of Transmission Impairment:
o Attenuation: Attenuation means the loss of energy, i.e., the strength of the signal decreases with
increasing the distance which causes the loss of energy.
o Distortion: Distortion occurs when there is a change in the shape of the signal. This type of
distortion is examined from different signals having different frequencies. Each frequency
component has its own propagation speed, so they reach at a different time which leads to the delay
distortion.
o Noise: When data is travelled over a transmission medium, some unwanted signal is added to it
which creates the noise.
Classification Of Transmission Media:
16
Coaxial cable is of two types:
1. Baseband transmission: It is defined as the process of transmitting a single signal at high speed.
2. Broadband transmission: It is defined as the process of transmitting multiple signals
simultaneously.
Advantages Of Coaxial cable:
o The data can be transmitted at high speed.
o It has better shielding as compared to twisted pair cable.
o It provides higher bandwidth.
Disadvantages Of Coaxial cable:
o It is more expensive as compared to twisted pair cable.
o If any fault occurs in the cable causes the failure in the entire network.
Fibre Optic
o Fibre optic cable is a cable that uses electrical signals for communication.
o Fibre optic is a cable that holds the optical fibres coated in plastic that are used to send the data by
pulses of light.
o The plastic coating protects the optical fibres from heat, cold, electromagnetic interference from
other types of wiring.
o Fibre optics provide faster data transmission than copper wires.
Diagrammatic representation of fibre optic cable:
17
o Thinner and Sturdier: Fibre optic cable is thinner and lighter in weight so it can withstand more
pull pressure than copper cable.
4. Guided Media Connectors:
o Description: Connectors are parts that connect parts of guided media so that continuous
communication channels may be created.
o Characteristics: To be able to offer stable and efficient communication in computer networks, a
variety of connectors are important, such as BNC connectors for coaxial cables and RJ-45 connectors
for twisted pair cables.
Applications of Guided Transmission Media
1. Local Area Networks (LANs):
In local area networks (LANs), guided transmission media, particularly coaxial and twisted pair cables, are
often utilized to link computers and other devices within a specific geographic region.
2. Wide Area Networks (WANs):
Due to their high bandwidth and ability to transfer data over long distances without a significant signal loss,
optical fiber cables are the preferred choice for wide-area networks.
3. Internet Backbone Networks:
A lot of data can be easily and quickly sent across continents due to the internet core, which is made up of
high-capacity fiber connections.
4. Telecommunication Networks:
A lot of data can be easily and quickly sent across continents due to the internet core, which is made up of
high-capacity fiber connections.
Advantages of Guided Transmission Media
1. Reliability:
High levels of stability are provided by guided transmission mediums such as optical fibers and twisted pair
cables. Because these media are real, there is less chance of interference or signal loss, ensuring safe and
constant communication.
2. Security:
When compared to wireless options guided transmission methods give a more secure communication
environment. Because these media are led, it is more difficult for hackers to intercept signals, which
improves network security in general.
3. Higher Bandwidth:
Higher bandwidths are ensured by guided media, especially optical fibers, than by many wireless choices.
These are perfect for applications with high data transfer requirements since this enables the transmission of
greater amounts of data at faster speeds.
4. Less Susceptible to Interference:
Compared to wireless transmission twisted pair and coaxial cables are less sensitive to electromagnetic
interference. This feature assures signal integrity and makes them useful for high electrical noise settings.
5. Predictable Performance:
Media with guided transmission provide consistent performance properties. Because these media allow for
more accurate control and management of signal behavior, they are perfect for applications where stability is
important.
6. Suitable for Long Distances:
Optical fibers, in particular, have a low signal reduction, making them perfect for long-distance
communication. They are also important for fast data transmission over big geographical regions and core
networks.
7. Cost-Effective for Short Distances:
When compared to building wireless infrastructure, guided transmission mediums such as twisted pair
cables can be cheaper for relatively short distances. They are also preferred choices for some connections
between devices and local area networks.
Disadvantages of Guided Transmission Media
1. Limited Mobility:
18
The infrastructure physically attaches devices connected through guided media. These media are less suited
to applications that require continuous movement, like mobile communication, because of this restriction on
mobility and flexibility.
2. Vulnerability to Physical Damage:
Even cables guided transmission media are at risk of physical harm. Communication can be interrupted by
the construction of the environment or accidental cuts. These situations require maintenance and repair.
3. Cost for Long Distances:
Since optical fibers and other guided media are great for long-distance communication, the initial
installation costs of these systems can be high. For companies with small budgets, this cost may be a
problem.
4. Limited Bandwidth for Some Types:
Compared to wireless technologies, a few guided transmission media types, such as twisted pair cables, may
have lower bandwidth sizes. For applications that require high data transfer rates, this may be an issue.
5. Infrastructure Dependency:
Media that is guided mostly depends upon physical infrastructure. Any network upgrades or changes require
major adjustments to the current infrastructure that may result in delays and extra expenses.
6. Environmental Impact:
There can be environmental effects from the production and disposal of guided transmission media,
particularly cables. The creation of more environmentally friendly and sustainable alternatives is becoming
more and more important as technology develops.
UnGuided Transmission
Advertisement
o An unguided transmission transmits the electromagnetic waves without using any physical medium.
Therefore it is also known as wireless transmission.
o In unguided media, air is the media through which the electromagnetic energy can flow easily.
Unguided transmission is broadly classified into three categories:
Radio waves
o Radio waves are the electromagnetic waves that are transmitted in all the directions of free space.
o Radio waves are omnidirectional, i.e., the signals are propagated in all the directions.
o The range in frequencies of radio waves is from 3Khz to 1 khz.
o In the case of radio waves, the sending and receiving antenna are not aligned, i.e., the wave sent by
the sending antenna can be received by any receiving antenna.
o An example of the radio wave is FM radio.
Microwaves
19
Microwaves are of two types:
o Terrestrial microwave
o Satellite microwave communication.
Terrestrial Microwave Transmission
o Terrestrial Microwave transmission is a technology that transmits the focused beam of a radio signal
from one ground-based microwave transmission antenna to another.
o Microwaves are the electromagnetic waves having the frequency in the range from 1GHz to 1000
GHz.
o Microwaves are unidirectional as the sending and receiving antenna is to be aligned, i.e., the waves
sent by the sending antenna are narrowly focussed.
o In this case, antennas are mounted on the towers to send a beam to another antenna which is km
away.
o It works on the line of sight transmission, i.e., the antennas mounted on the towers are the direct sight
of each other.
Characteristics of Microwave:
o Frequency range: The frequency range of terrestrial microwave is from 4-6 GHz to 21-23 GHz.
o Bandwidth: It supports the bandwidth from 1 to 10 Mbps.
o Short distance: It is inexpensive for short distance.
o Long distance: It is expensive as it requires a higher tower for a longer distance.
o Attenuation: Attenuation means loss of signal. It is affected by environmental conditions and
antenna size.
Advantages Of Microwave:
o Microwave transmission is cheaper than using cables.
o It is free from land acquisition as it does not require any land for the installation of cables.
o Microwave transmission provides an easy communication in terrains as the installation of cable in
terrain is quite a difficult task.
o Communication over oceans can be achieved by using microwave transmission.
Disadvantages of Microwave transmission:
o Eavesdropping: An eavesdropping creates insecure communication. Any malicious user can catch
the signal in the air by using its own antenna.
o Out of phase signal: A signal can be moved out of phase by using microwave transmission.
o Susceptible to weather condition: A microwave transmission is susceptible to weather condition.
This means that any environmental change such as rain, wind can distort the signal.
o Bandwidth limited: Allocation of bandwidth is limited in the case of microwave transmission.
Satellite Microwave Communication
o A satellite is a physical object that revolves around the earth at a known height.
o Satellite communication is more reliable nowadays as it offers more flexibility than cable and fibre
optic systems.
o We can communicate with any point on the globe by using satellite communication.
How Does Satellite work?
The satellite accepts the signal that is transmitted from the earth station, and it amplifies the signal. The
amplified signal is retransmitted to another earth station.
Advantages Of Satellite Microwave Communication:
o The coverage area of a satellite microwave is more than the terrestrial microwave.
20
o The transmission cost of the satellite is independent of the distance from the centre of the coverage
area.
o Satellite communication is used in mobile and wireless communication applications.
o It is easy to install.
o It is used in a wide variety of applications such as weather forecasting, radio/TV signal broadcasting,
mobile communication, etc.
Disadvantages Of Satellite Microwave Communication:
o Satellite designing and development requires more time and higher cost.
o The Satellite needs to be monitored and controlled on regular periods so that it remains in orbit.
o The life of the satellite is about 12-15 years. Due to this reason, another launch of the satellite has to
be planned before it becomes non-functional.
Infrared
o An infrared transmission is a wireless technology used for communication over short ranges.
o The frequency of the infrared in the range from 300 GHz to 400 THz.
o It is used for short-range communication such as data transfer between two cell phones, TV remote
operation, data transfer between a computer and cell phone resides in the same closed area.
Characteristics Of Infrared:
o It supports high bandwidth, and hence the data rate will be very high.
o Infrared waves cannot penetrate the walls. Therefore, the infrared communication in one room
cannot be interrupted by the nearby rooms.
o An infrared communication provides better security with minimum interference.
o Infrared communication is unreliable outside the building because the sun rays will interfere with the
infrared waves.
Digital Communication
Digital communication is made from two words digital and communication. Digital refers to the discrete
time-varying signal. Communication refers to the exchange of information between two or more sources.
Digital refers to the discrete time-varying signal. Communication refers to the exchange of information
between two or more sources. Digital communication refers to the exchange of digital information between
the sender and receiver using different devices and methods.
The data transmission using analog methods for long-distance communication suffers from distortion,
delays, interferences, and other losses. To overcome these problems, the digitization and sampling of signals
using different techniques help in making the transmission process more efficient, clear, and accurate.
Digital communication is a popular technology used today in electronics. It allows us to access video
conferencing, digital meetings, online education, etc. The data can travel upto long distances within a
second with the help of the internet and other modes of digital communication. It not only saves money but
also saves time and effort. It has also raised the standard of an individual's social, political, and economic
life.
21
Signals
A signal is an electromagnetic wave that carries information from one place to another, using a specific
propagation medium, such as air, vacuum, water, and solid. In electronics, the signal is defined as
a current, voltage, or wave carrying information. It can travel short distances or long distances depending
on the requirements. The speed of a signal wave is equal to the speed of light.
Analog refers to the data transmission in continuous form, while digital refers to the data transmission in the
discrete form. It is also known as the transmission in the form of bits, 0 (LOW) and 1 (HIGH).
The waveforms of the analog and digital signal are shown below:
The noise in analog signals is high as compared to digital signal. It is due to the thresholding and high
bandwidth of the digital signals. Hence, electronic noise affects analog signals more than digital signals.
Filters are generally used in analog communication at transmitting and receiving ends to remove the noise.
Digital Signal
We can represent various physical quantities using digital signals, such as voltage and current. A signal
represented in the form of discrete values is known as digital signal. It is transmitted in the form of bits.
Only two bits (0 and 1) work in different combinations. A digital signal can take only one value at a time
from the set of finite possible values.
Digital signal is nothing but the representation of the analog data in the discrete form.
For example,
The above two waveforms are the analog and digital waveforms. The digital waveform depicts the
information in discrete bands of analog levels.
The binary signal is also known as the logic signal because both represent two bands, HIGH and LOW. 0
and 1 are also represented as the numbers in Boolean domain.
HIGH = 1 = TRUE
22
LOW = 0 = FALSE
A digital system represents a continuous waveform switching between the discrete values called bitstreams
in a communication system. It allows cost savings with reduced transmission time. The noise interference
during the transmission can be effectively removed using the data redundancy process or data compression,
where the data is encoded using fewer bits than the original information.
Digital vs. Analog
The digital computers were the first technologies used to store the digital record with a large size occupying
the space of a room. The later inventions created new history and today digital computers are used to store
millions of data with a size similar to rice grain.
The differences between digital communication and analog communication are listed in the below
table:
Coding Yes No
The digital communication system uses an
encoder and decoder to convert the
information into bits and vice-versa.
Flexible More flexible Less flexible
Cost High cost Low cost
Power Low High
consumption
Data transmission More accurate Less accurate
Signal The digital signals are represented by a The analog signals are represented
representation square wave. by a sine wave or cosine wave.
23
o The transmission medium is used to send the signal from sender to receiver. The medium can only
have one signal at a time.
o If there are multiple signals to share one medium, then the medium must be divided in such a way
that each signal is given some portion of the available bandwidth. For example: If there are 10
signals and bandwidth of medium is100 units, then the 10 unit is shared by each signal.
o When multiple signals share the common medium, there is a possibility of collision. Multiplexing
concept is used to avoid such collision.
o Transmission services are very expensive.
History of Multiplexing
o Multiplexing technique is widely used in telecommunications in which several telephone calls are
carried through a single wire.
o Multiplexing originated in telegraphy in the early 1870s and is now widely used in communication.
o George Owen Squier developed the telephone carrier multiplexing in 1910.
Concept of Multiplexing
o The 'n' input lines are transmitted through a multiplexer and multiplexer combines the signals to form
a composite signal.
o The composite signal is passed through a Demultiplexer and demultiplexer separates a signal to
component signals and transfers them to their respective destinations.
Advantages of Multiplexing:
o More than one signal can be sent over a single medium.
o The bandwidth of a medium can be utilized effectively.
Multiplexing Techniques
Multiplexing techniques can be classified as:
o In the above diagram, a single transmission medium is subdivided into several frequency channels,
and each frequency channel is given to different devices. Device 1 has a frequency channel of range
from 1 to 5.
24
o The input signals are translated into frequency bands by using modulation techniques, and they are
combined by a multiplexer to form a composite signal.
o The main aim of the FDM is to subdivide the available bandwidth into different frequency channels
and allocate them to different devices.
o Using the modulation technique, the input signals are transmitted into frequency bands and then
combined to form a composite signal.
o The carriers which are used for modulating the signals are known as sub-carriers. They are
represented as f1,f2..fn.
o FDM is mainly used in radio broadcasts and TV networks.
Advantages Of FDM:
o FDM is used for analog signals.
o FDM process is very simple and easy modulation.
o A Large number of signals can be sent through an FDM simultaneously.
o It does not require any synchronization between sender and receiver.
Disadvantages Of FDM:
o FDM technique is used only when low-speed channels are required.
o It suffers the problem of crosstalk.
o A Large number of modulators are required.
o It requires a high bandwidth channel.
Applications Of FDM:
o FDM is commonly used in TV networks.
o It is used in FM and AM broadcasting. Each FM radio station has different frequencies, and they are
multiplexed to form a composite signal. The multiplexed signal is transmitted in the air.
o Wavelength Division Multiplexing is same as FDM except that the optical signals are transmitted
through the fibre optic cable.
o WDM is used on fibre optics to increase the capacity of a single fibre.
o It is used to utilize the high data rate capability of fibre optic cable.
o It is an analog multiplexing technique.
o Optical signals from different source are combined to form a wider band of light with the help of
multiplexer.
o At the receiving end, demultiplexer separates the signals to transmit them to their respective
destinations.
25
o Multiplexing and Demultiplexing can be achieved by using a prism.
o Prism can perform a role of multiplexer by combining the various optical signals to form a composite
signal, and the composite signal is transmitted through a fibre optical cable.
o Prism also performs a reverse operation, i.e., demultiplexing the signal.
26
In the above figure, the Synchronous TDM technique is implemented. Each device is allocated with some
time slot. The time slots are transmitted irrespective of whether the sender has data to send or not.
Disadvantages Of Synchronous TDM:
o The capacity of the channel is not fully utilized as the empty slots are also transmitted which is
having no data. In the above figure, the first frame is completely filled, but in the last two frames,
some slots are empty. Therefore, we can say that the capacity of the channel is not utilized efficiently.
o The speed of the transmission medium should be greater than the total speed of the input lines. An
alternative approach to the Synchronous TDM is Asynchronous Time Division Multiplexing.
Asynchronous TDM
o An asynchronous TDM is also known as Statistical TDM.
o An asynchronous TDM is a technique in which time slots are not fixed as in the case of Synchronous
TDM. Time slots are allocated to only those devices which have the data to send. Therefore, we can
say that Asynchronous Time Division multiplexor transmits only the data from active workstations.
o An asynchronous TDM technique dynamically allocates the time slots to the devices.
o In Asynchronous TDM, total speed of the input lines can be greater than the capacity of the channel.
o Asynchronous Time Division multiplexor accepts the incoming data streams and creates a frame that
contains only data with no empty slots.
o In Asynchronous TDM, each slot contains an address part that identifies the source of the data.
o The difference between Asynchronous TDM and Synchronous TDM is that many slots in
Synchronous TDM are unutilized, but in Asynchronous TDM, slots are fully utilized. This leads to
the smaller transmission time and efficient utilization of the capacity of the channel.
o In Synchronous TDM, if there are n sending devices, then there are n time slots. In Asynchronous
TDM, if there are n sending devices, then there are m time slots where m is less than n (m<n).
o The number of slots in a frame depends on the statistical analysis of the number of input lines.
In the above diagram, there are 4 devices, but only two devices are sending the data, i.e., A and C. Therefore,
the data of A and C are only transmitted through the transmission line.
Frame of above diagram can be represented as:
27
The above figure shows that the data part contains the address to determine the source of the data.
Switching techniques
In large networks, there can be multiple paths from sender to receiver. The switching technique will decide
the best route for data transmission.
Switching technique is used to connect the systems for making one-to-one communication.
Classification Of Switching Techniques
Circuit Switching
o Circuit switching is a switching technique that establishes a dedicated path between sender and
receiver.
o In the Circuit Switching Technique, once the connection is established then the dedicated path will
remain to exist until the connection is terminated.
o Circuit switching in a network operates in a similar way as the telephone works.
o A complete end-to-end path must exist before the communication takes place.
o In case of circuit switching technique, when any user wants to send the data, voice, video, a request
signal is sent to the receiver then the receiver sends back the acknowledgment to ensure the
availability of the dedicated path. After receiving the acknowledgment, dedicated path transfers the
data.
o Circuit switching is used in public telephone network. It is used for voice transmission.
o Fixed data can be transferred at a time in circuit switching technology.
o
Communication through circuit switching has 3 phases:
o Circuit establishment
o Data transfer
o Circuit Disconnect
28
o The Crossbar switch is made by using the semiconductor. For example, Xilinx crossbar switch using
FPGAs.
o Space Division Switching has high speed, high capacity, and nonblocking switches.
Space Division Switches can be categorized in two ways:
o Crossbar Switch
o Multistage Switch
Crossbar Switch
The Crossbar switch is a switch that has n input lines and n output lines. The crossbar switch has
n2 intersection points known as crosspoints.
Disadvantage of Crossbar switch:
The number of crosspoints increases as the number of stations is increased. Therefore, it becomes very
expensive for a large switch. The solution to this is to use a multistage switch.
Multistage Switch
o Multistage Switch is made by splitting the crossbar switch into the smaller units and then
interconnecting them.
o It reduces the number of crosspoints.
o If one path fails, then there will be an availability of another path.
Advantages Of Circuit Switching:
o In the case of Circuit Switching technique, the communication channel is dedicated.
o It has fixed bandwidth.
Disadvantages Of Circuit Switching:
o Once the dedicated path is established, the only delay occurs in the speed of data transmission.
o It takes a long time to establish a connection approx 10 seconds during which no data can be
transmitted.
o It is more expensive than other switching techniques as a dedicated path is required for each
connection.
o It is inefficient to use because once the path is established and no data is transferred, then the
capacity of the path is wasted.
o In this case, the connection is dedicated therefore no other data can be transferred even if the channel
is free.
Message Switching
o Message Switching is a switching technique in which a message is transferred as a complete unit and
routed through intermediate nodes at which it is stored and forwarded.
o In Message Switching technique, there is no establishment of a dedicated path between the sender
and receiver.
o The destination address is appended to the message. Message Switching provides a dynamic routing
as the message is routed through the intermediate nodes based on the information available in the
message.
o Message switches are programmed in such a way so that they can provide the most efficient routes.
o Each and every node stores the entire message and then forward it to the next node. This type of
network is known as store and forward network.
o Message switching treats each message as an independent entity.
29
o Traffic congestion can be reduced because the message is temporarily stored in the nodes.
o Message priority can be used to manage the network.
o The size of the message which is sent over the network can be varied. Therefore, it supports the data
of unlimited size.
Disadvantages Of Message Switching
o The message switches must be equipped with sufficient storage to enable them to store the messages
until the message is forwarded.
o The Long delay can occur due to the storing and forwarding facility provided by the message
switching technique.
Packet Switching
o The packet switching is a switching technique in which the message is sent in one go, but it is
divided into smaller pieces, and they are sent individually.
o The message splits into smaller pieces known as packets and packets are given a unique number to
identify their order at the receiving end.
o Every packet contains some information in its headers such as source address, destination address
and sequence number.
o Packets will travel across the network, taking the shortest path as possible.
o All the packets are reassembled at the receiving end in correct order.
o If any packet is missing or corrupted, then the message will be sent to resend the message.
o If the correct order of the packets is reached, then the acknowledgment message will be sent.
30
o In the above diagram, A and B are the sender and receiver respectively. 1 and 2 are the nodes.
o Call request and call accept packets are used to establish a connection between the sender and
receiver.
o When a route is established, data will be transferred.
o After transmission of data, an acknowledgment signal is sent by the receiver that the message has
been received.
o If the user wants to terminate the connection, a clear signal is sent for the termination.
Unit 3
What is Computer Networking?
A network set up by connecting two or more computers and other supporting hardware devices through
communication channels is called a computer network. It enables computers to communicate with each
other and to share commands, data, etc., including the hardware and software resources.
Each computing device in a network is called a node or station. The nodes can be routers, personal
computers, and servers. Data transformation is done via the network using rules known as protocols. The
protocols are the set of rules which every node of the network should follow for transferring information
over the wired or wireless network.
Working of a Computer Network
The nodes (like computers, switches, and modems) are the sources of generating and transmitting data. Then
the link (a transmission media) is used to bond among the nodes.
By following the protocols, the nodes will transfer and receive data via connections. computer network
architecture defines the design associated among these physical and logical components. It provides the
definitions for the network's physical components, functional organization, protocols, and procedures.
Uses of Computer Network:
o It allows you to share resources such as printers, scanners, etc.
o You can share expensive software and database among network users.
o It facilitates communications from one computer to another computer.
o It allows the exchange of data and information among users through a network.
Popular Computer Networks:
o Local Area Network (LAN)
o Metropolitan Area Network (MAN)
o Wide Area Network (WAN)
Local Area Network (LAN):
As the name suggests, the local area network is a computer network that operates in a small area, i.e., it
connects computers in a small geographical area like within an office, company, school, or any other
organization. So, it exists within a specific area, e.g. home network, office network, school network, etc.
A local area network may be a wired or wireless network or a combination of both. The devices in a LAN
are generally connected using an Ethernet cable, which offers an interface to connect multiple devices like
router, switches, and computers. For example, using a single router, few Ethernet cables, and computers, you
can create a LAN at your home, office, etc. In this network, one computer may act as a server and other
computers, which are part of the network, may serve as clients.
31
Features of LAN
o The network size is small, which consists of only a few kilometres.
o The data transmission rate is high, ranging from 100 Mbps to 1000 Mbps.
o LAN is included in bus, ring, mesh, and star topologies.
o Some network devices connected to the LAN will be limited.
o If more devices are added than prescribed network may fail.
Benefits of LAN:
o It offers a higher operating speed than WAN and MAN.
o It is less expensive and easy to install and maintain.
o It perfectly fulfills the requirement of a specific organization, such as an office, school, etc.
o It can be wired or wireless or a combination of both.
o It is more secure than other networks as it is a small set up that can be easily taken care of.
Primary Functions of LAN:
o Sharing of files: It allows you to share or transfer files from one computer to another computer
within the LAN. For example, in a bank, it can be used to send a file with the details of transactions
of a customer from the server to clients.
o Sharing of printers: It also allows shared access to a printer, file servers, etc. For example, ten
computers that are connected through LAN can use a single printer, file server, fax machine, etc.
o Sharing of Computational capabilities: It allows the clients to access to the computational power
of a server, e.g., an application server as some applications which run on clients in a LAN may
require higher computational capabilities.
o Mail and message related services: It allows sending and receiving mails between computers of a
LAN. You are required to have a mail server for this.
o Database services: It also allows storing and retrieving data with the help of a database server.
Metropolitan Area Network (MAN):
MAN is a high-speed network that spreads over a large geographical area such as a metro city or town. It is
set up by connecting the local area networks using routers and local telephone exchange lines. It can be
operated by a private company, or it may be a service provided by a company such as a local telephone
company.
MAN is ideal for the people of a relatively large area who want to share data or information. It provides fast
communication via high-speed carriers or transmission media such as copper, fiber optics, and microwaves.
The commonly used protocols for MAN are X.25, Frame Relay, Asynchronous Transfer Mode (ATM),
xDSL (Digital Subscriber Line), ISDN (Integrated Services Digital Network), ADSL (Asymmetrical Digital
Subscriber Line), and more.
The area covered by MAN is larger than the LAN but smaller than a WAN. Its network ranges from 5 to 50
km. Furthermore, it also provides uplinks for connecting LANs to WANs and the internet. An organization
can use a MAN to connect all of its LANs located at its different offices across the city.
Examples of MAN:
o Cable TV Network
o Telephone service provides that provide high-speed DSL lines
o IEEE 802.16 or WiMAX
o Connected fire stations in a city
o Connected branches of a school in a city
32
Features of MAN
o The size of the MAN is in the range of 5km to 50km.
o The MAN ranges from the campus to the entire city.
o The MAN is maintained and managed by either the user group or the Network provider.
o Users can achieve the sharing of regional resources by using MAN.
o The data transmission rates can be medium to high
Advantages of MAN:
o Less Expensive: It is less expensive to set up a MAN and to connect it to a WAN.
o High Speed: The speed of data transfer is more than WAN.
o Local Emails: It can send local emails fast.
o Access to the Internet: It allows you to share your internet connection, and thus multiple users can
have access to high-speed internet.
o Easy to set up: You can easily set up a MAN by connecting multiple LANs.
o High Security: It is more secure than WAN.
WAN extends over a large geographical area. It is not confined within an office, school, city, or town and is
mainly set up by telephone lines, fiber optic, or satellite links. It is mostly used by big organizations like
banks and multinational companies to communicate with their branches and customers across the world.
Although it is structurally similar to MAN, it is different from MAN in terms of its range, e.g., MAN covers
up to 50 Kms, whereas WAM covers distances larger than 50 Km, e.g., 1000km or more.
A WAN works by using TCP/IP protocol in combination with networking devices such as switches, routers,
firewalls, and modems. It does not connect individual computers; rather, they are designed to link small
networks like LANs and MANs to create a large network. The internet is considered the largest WAN in the
world as it connects various LANs and MANs through ISPs.
The computers are connected to the wide area network through public networks, such as telephone systems,
leased lines or satellites. The users of a WAN do not own the network as it is a large setup connecting the
remote computer systems. However, they are required to subscribe to a service provided by a
telecommunication provider to use this network.
Features of WAN
o Has a much larger capacity.
o We can share the regional resources by using WAN.
o They have more bit-rate errors.
o The transmission delay is, and hence they need more communication speed.
Advantages of a WAN:
o Large Network Range: It spans a large geographical area of 2000 km or more, e.g., from one
country to another countries.
o Centralized data: It allows your different office branches to use your head office server for
retrieving and sharing data. Thus, you don?t need to buy email servers, files server and back up
servers, etc.
o Get updated files and data: It provides an ideal platform for companies who need a live server for
their employees to exchange updated files within seconds.
33
o High bandwidth: It offers high bandwidth than a normal broadband connection. Thus, it can
increase the productivity of your company by offering uninterrupted data transfer and
communication.
o Workload Distribution: It helps distribute your workload to other locations. You can hire
employees in different countries and assign them to work from your office.
Examples of WAN:
✓ Internet
✓ US defense department
✓ Stock exchanges network
✓ Railway reservation system
✓ Big Banks' cash dispensers' network
✓ Satellite systems
✓ Standards for Good Network
✓ Performance
The performance is measured using transmit time and response time. The network quality will be improved
if the performance of the network is high.
Transmit time: The time taken to send a message from one device to another device is called as transmit
time.
Response time: The time passed from inquiry to response is called as response time.
The total performance of the network depends on many factors, which include several users, Topology used
in the network, and software and hardware used.
Reliability
The reliability in a network state whether the data delivery to the authorized and intended users was done
correctly. The reliability of a network is one of the important factors for the delivery of data in the layers of
the OSI model (Open System Interconnection).
Differences Between LAN, MAN, and WAN
Basis LAN MAN WAN
LAN stands for local MAN stands for metropolitan WAN stands for wide area
Full-Form area network. area network. network.
The transmission
While the transmission speed Whereas the transmission
Transmission speed of a LAN is
of a MAN is average. speed of a WAN is low.
Speed high.
34
Basis LAN MAN WAN
There is more fault While there is less fault In WAN, there is also less
Fault tolerance tolerance in LAN. tolerance. fault tolerance.
terminal handling in a computer network involves processes such as interrupts and buffers, and the use of
standard interfaces:
• Terminal handlers: These processes are required along with interrupts and buffers.
• Interrupts: These get the operating system's attention to handle urgent tasks.
• Buffers: These temporarily store data during input/output to make the transfer smoother.
• Standard interfaces: These are the only fair terminal handling policy, and users and manufacturers
should adapt to them.
A terminal is a device that allows users to interact with a computer through a text-based user interface. It
allows users to execute commands, view results, and control applications. Terminals can be classified into
different types, including:
• Dumb terminals: These terminals are simple input/output devices or display monitors that send and
receive data from a network server or mainframe. They have no built-in processing capabilities.
• Smart terminals: These monitors process limited amounts of information.
• Intelligent terminals: These devices contain a CPU and main memory to perform special display
functions.
Polling
• Polling process is similar to the roll-call performed in class. Just like the teacher, a controller
sends a message to each node in turn.
• In this, one acts as a primary station(controller) and the others are secondary stations. All data
exchanges must be made through the controller.
• The message sent by the controller contains the address of the node being selected for granting
access.
• Although all nodes receive the message the addressed one responds to it and sends data if any.
If there is no data, usually a “poll reject”(NAK) message is sent back.
• Problems include high overhead of the polling messages and high dependence on the reliability
of the controller.
35
Advantages of Polling
• The maximum and minimum access time and data rates on the channel are fixed predictable.
• It has maximum efficiency.
• It has maximum bandwidth.
• No slot is wasted in polling.
• There is assignment of priority to ensure faster access from some secondary.
Disadvantages of Polling
• It consume more time.
• Since every station has an equal chance of winning in every round, link sharing is biased.
• Only some station might run out of data to send.
• An increase in the turnaround time leads to a drop in the data rates of the channel under low
loads.
Token Passing
• In token passing scheme, the stations are connected logically to each other in form of ring and
access to stations is governed by tokens.
• A token is a special bit pattern or a small message, which circulate from one station to the next
in some predefined order.
• In Token ring, token is passed from one station to another adjacent station in the ring whereas
incase of Token bus, each station uses the bus to send the token to the next station in some
predefined order.
• In both cases, token represents permission to send. If a station has a frame queued for
transmission when it receives the token, it can send that frame before it passes the token to the
next station. If it has no queued frame, it passes the token simply.
• After sending a frame, each station must wait for all N stations (including itself) to send the
token to their neighbours and the other N – 1 stations to send a frame, if they have one.
• There exists problems like duplication of token or token is lost or insertion of new station,
removal of a station, which need be tackled for correct and reliable operation of this scheme.
36
IEEE Standards in Computer Networks
IEEE stands for Institute of Electrical and Electronics Engineers. The main AIM of IEEE is to foster
technological innovation and excellence for the benefit of humanity. The IEEE standards in computer
networks ensure communication between various devices; it also helps to make sure that the network
service, i.e., the Internet and its related technologies, must follow a set of guidelines and practices so that all
the networking devices can communicate and work smoothly. Since there are various types of computer
system manufacturers, the IEEE’s Computer Society started a project in 1985 called project 802 to enable
standard communication between various devices. The standards that deal with computer networking are
called the IEEE 802 wireless standards.
What are IEEE Standards in Computer Networks?
Before learning about the IEEE standards in computer networks, let us get a brief introduction
to IEEE. IEEE, or Institute of Electrical and Electronics Engineers, is an organization that develops
standards for the electronics industry and computers. IEEE is composed of numerous scientists, engineers,
and students from all over the globe. The main AIM of IEEE is to ensure foster technological innovation and
excellence for the benefit of humanity.
The IEEE standards in computer networks ensure communication between various devices; it also helps to
make sure that the network service, i.e., the Internet and its related technologies, must follow a set of
guidelines and practices so that all the networking devices can communicate and work smoothly.
Since there are various types of computer system manufacturers, the IEEE’s computer society started a
project in 1985 called Project 802 to enable standard communication between various devices. Under this
project, the IEEE divided the data link layer into two sub-parts, namely
• LLC or Logical Link Control and
• MAC or Media Access Control.
The standards that deal with computer networking (networking in general) are called the IEEE 802 wireless
standards. The IEEE 802 is a collection of networking standards that deals with the data link layer and
physical layer technologies like ethernet and wireless communications.
There are various IEEE standards in computer networks. We will be discussing all the IEEE standards in
computer networks in the later section. Let us first learn about the three notable IEEE standards.
1. IEEE 802: The IEEE 802 deals with the standards of LAN and MAN, i.e., Local Area Network and
Metropolitan Area Network.
2. IEEE 802.1: The IEEE 802.1 deals with the standards of LAN and MAN. Along with that, it also
deals with the MAC (Media Access Control) bridging.
3. IEEE 802.2: The IEEE 802.2 deals with the LLC (Logical Link Control).
Let us take an example of IEEE standards in computer networks. The IEEE 802.11 standard in computer
networks is used in various homely devices like laptops, printers, smartphones, and various other devices
that allow them to communicate with each other using the Internet. Hence, the IEEE 802.11 standard in
computer networks is useful for devices that use wireless communication, i.e., WiFi bands.
Note: The IEEE 802.11 is a part of the IEEE 802 set of LAN technical standards.
List of IEEE Standards in Computer Networks
Let us look at the various IEEE standards in computer networks and their usage (or function):
IEEE standards in
Description
computer networks
37
IEEE standards in
Description
computer networks
It is used for token passing bus access methods and the physical
IEEE 802.4
layer specifications.
It is used for token ring access methods and the physical layer
IEEE 802.5
specifications.
Token Ring
Token ring (IEEE 802.5) is a communication protocol in a local area network (LAN) where all stations are
connected in a ring topology and pass one or more tokens for channel acquisition. A token is a special frame
of 3 bytes that circulates along the ring of stations. A station can send data frames only if it holds a token.
The tokens are released on successful receipt of the data frame.
Token Passing Mechanism in Token Ring
If a station has a frame to transmit when it receives a token, it sends the frame and then passes the token to
the next station; otherwise it simply passes the token to the next station. Passing the token means receiving
the token from the preceding station and transmitting to the successor station. The data flow is unidirectional
in the direction of the token passing. In order that tokens are not circulated infinitely, they are removed from
the network once their purpose is completed. This is shown in the following diagram −
38
Token Bus
Token Bus (IEEE 802.4) is a standard for implementing token ring over virtual ring in LANs. The physical
media has a bus or a tree topology and uses coaxial cables. A virtual ring is created with the nodes/stations
and the token is passed from one node to the next in a sequence along this virtual ring. Each node knows the
address of its preceding station and its succeeding station. A station can only transmit data when it has the
token. The working principle of token bus is similar to Token Ring.
Token Passing Mechanism in Token Bus
A token is a small message that circulates among the stations of a computer network providing permission to
the stations for transmission. If a station has data to transmit when it receives a token, it sends the data and
then passes the token to the next station; otherwise, it simply passes the token to the next station. This is
depicted in the following diagram −
39
The data link layer is used in a computer network to transmit the data between two devices or nodes. It
divides the layer into parts such as data link control and the multiple access resolution/protocol.
types of multiple access protocol that is subdivided into the different process as:
40
CSMA/ CD
It is a carrier sense multiple access/ collision detection network protocol to transmit data frames. The
CSMA/CD protocol works with a medium access control layer. Therefore, it first senses the shared channel
before broadcasting the frames, and if the channel is idle, it transmits a frame to check whether the
transmission was successful. If the frame is successfully received, the station sends another frame. If any
collision is detected in the CSMA/CD, the station sends a jam/ stop signal to the shared channel to terminate
data transmission. After that, it waits for a random time before sending a frame to a channel.
CSMA/ CA
It is a carrier sense multiple access/collision avoidance network protocol for carrier transmission of data
frames. It is a protocol that works with a medium access control layer. When a data frame is sent to a
channel, it receives an acknowledgment to check whether the channel is clear. If the station receives only a
single (own) acknowledgment, that means the data frame has been successfully transmitted to the receiver.
But if it gets two signals (its own and one more in which the collision of frames), a collision of the frame
occurs in the shared channel. Detects the collision of the frame when a sender receives an acknowledgment
signal.
Following are the methods used in the CSMA/ CA to avoid the collision:
Interframe space: In this method, the station waits for the channel to become idle, and if it gets the channel is
idle, it does not immediately send the data. Instead of this, it waits for some time, and this time period is
called the Interframe space or IFS. However, the IFS time is often used to define the priority of the station.
Contention window: In the Contention window, the total time is divided into different slots. When the
station/ sender is ready to transmit the data frame, it chooses a random slot number of slots as wait time. If
the channel is still busy, it does not restart the entire process, except that it restarts the timer only to send
data packets when the channel is inactive.
Acknowledgment: In the acknowledgment method, the sender station sends the data frame to the shared
channel if the acknowledgment is not received ahead of time.
B. Controlled Access Protocol
It is a method of reducing data frame collision on a shared channel. In the controlled access method, each
station interacts and decides to send a data frame by a particular station approved by all other stations. It
means that a single station cannot send the data frames unless all other stations are not approved. It has three
types of controlled access: Reservation, Polling, and Token Passing.
C. Channelization Protocols
It is a channelization protocol that allows the total usable bandwidth in a shared channel to be shared across
multiple stations based on their time, distance and codes. It can access all the stations at the same time to
send the data frames to the channel.
Following are the various methods to access the channel based on their time, distance and codes:
41
1. FDMA (Frequency Division Multiple Access)
2. TDMA (Time Division Multiple Access)
3. CDMA (Code Division Multiple Access)
FDMA
It is a frequency division multiple access (FDMA) method used to divide the available bandwidth into equal
bands so that multiple users can send data through a different frequency to the subchannel. Each station is
reserved with a particular band to prevent the crosstalk between the channels and interferences of stations.
TDMA
Time Division Multiple Access (TDMA) is a channel access method. It allows the same frequency
bandwidth to be shared across multiple stations. And to avoid collisions in the shared channel, it divides the
channel into different frequency slots that allocate stations to transmit the data frames.
CDMA
The code division multiple access (CDMA) is a channel access method. In CDMA, all stations can
simultaneously send the data over the same channel. It means that it allows each station to transmit the data
frames with full frequency on the shared channel at all times. It does not require the division of bandwidth
on a shared channel based on time slots. If multiple stations send data to a channel simultaneously, their data
frames are separated by a unique code sequence. Each station has a different unique code for transmitting
the data over a shared channel.
Unit 4
OSI Model Infrared communication is unreliable outside the building because the sun rays will
interfere with the infrared waves.
o OSI stands for Open System Interconnection is a reference model that describes how information
from a software application in one computer moves through a physical medium to the software
application in another computer.
o OSI consists of seven layers, and each layer performs a particular network function.
o OSI model was developed by the International Organization for Standardization (ISO) in 1984, and it
is now considered as an architectural model for the inter-computer communications.
o OSI model divides the whole task into seven smaller and manageable tasks. Each layer is assigned a
particular task.
o Each layer is self-contained, so that task assigned to each layer can be performed independently.
42
Characteristics of OSI Model:
o The OSI model is divided into two layers: upper layers and lower layers.
o The upper layer of the OSI model mainly deals with the application related issues, and they are
implemented only in the software. The application layer is closest to the end user. Both the end user
and the application layer interact with the software applications. An upper layer refers to the layer
just above another layer.
o The lower layer of the OSI model deals with the data transport issues. The data link layer and the
physical layer are implemented in hardware and software. The physical layer is the lowest layer of
the OSI model and is closest to the physical medium. The physical layer is mainly responsible for
placing the information on the physical medium.
7 Layers of OSI Model
There are the seven OSI layers. Each layer has different functions. A list of seven layers are given below:
1. Physical Layer
2. Data-Link Layer
43
3. Network Layer
4. Transport Layer
5. Session Layer
6. Presentation Layer
7. Application Layer
1) Physical layer
o The main functionality of the physical layer is to transmit the individual bits from one node to
another node.
o It is the lowest layer of the OSI model.
o It establishes, maintains and deactivates the physical connection.
o It specifies the mechanical, electrical and procedural network interface specifications.
Functions of a Physical layer:
o Line Configuration: It defines the way how two or more devices can be connected physically.
o Data Transmission: It defines the transmission mode whether it is simplex, half-duplex or full-
duplex mode between the two devices on the network.
o Topology: It defines the way how network devices are arranged.
o Signals: It determines the type of the signal used for transmitting the information.
2) Data-Link Layer
o Physical Addressing: The Data link layer adds a header to the frame that contains a destination
address. The frame is transmitted to the destination address mentioned in the header.
o Flow Control: Flow control is the main functionality of the Data-link layer. It is the technique
through which the constant data rate is maintained on both the sides so that no data get corrupted. It
ensures that the transmitting station such as a server with higher processing speed does not exceed
the receiving station, with lower processing speed.
o Error Control: Error control is achieved by adding a calculated value CRC (Cyclic Redundancy
Check) that is placed to the Data link layer's trailer which is added to the message frame before it is
sent to the physical layer. If any error seems to occurr, then the receiver sends the acknowledgment
for the retransmission of the corrupted frames.
o Access Control: When two or more devices are connected to the same communication channel, then
the data link layer protocols are used to determine which device has control over the link at a given
time.
3) Network Layer
o It is a layer 3 that manages device addressing, tracks the location of devices on the network.
o It determines the best path to move data from source to the destination based on the network
conditions, the priority of service, and other factors.
o The Data link layer is responsible for routing and forwarding the packets.
o Routers are the layer 3 devices, they are specified in this layer and used to provide the routing
services within an internetwork.
45
o The protocols used to route the network traffic are known as Network layer protocols. Examples of
protocols are IP and Ipv6.
Functions of Network Layer:
o Internetworking: An internetworking is the main responsibility of the network layer. It provides a
logical connection between different devices.
o Addressing: A Network layer adds the source and destination address to the header of the frame.
Addressing is used to identify the device on the internet.
o Routing: Routing is the major component of the network layer, and it determines the best optimal
path out of the multiple paths from source to the destination.
o Packetizing: A Network Layer receives the packets from the upper layer and converts them into
packets. This process is known as Packetizing. It is achieved by internet protocol (IP).
4) Transport Layer
o The Transport layer is a Layer 4 ensures that messages are transmitted in the order in which they are
sent and there is no duplication of data.
o The main responsibility of the transport layer is to transfer the data completely.
o It receives the data from the upper layer and converts them into smaller units known as segments.
o This layer can be termed as an end-to-end layer as it provides a point-to-point connection between
source and destination to deliver the data reliably.
The two protocols used in this layer are:
o Transmission Control Protocol
o It is a standard protocol that allows the systems to communicate over the internet.
o It establishes and maintains a connection between hosts.
o When data is sent over the TCP connection, then the TCP protocol divides the data into
smaller units known as segments. Each segment travels over the internet using multiple
routes, and they arrive in different orders at the destination. The transmission control protocol
reorders the packets in the correct order at the receiving end.
o User Datagram Protocol
o User Datagram Protocol is a transport layer protocol.
o It is an unreliable transport protocol as in this case receiver does not send any
acknowledgment when the packet is received, the sender does not wait for any
acknowledgment. Therefore, this makes a protocol unreliable.
Functions of Transport Layer:
o Service-point addressing: Computers run several programs simultaneously due to this reason, the
transmission of data from source to the destination not only from one computer to another computer
but also from one process to another process. The transport layer adds the header that contains the
address known as a service-point address or port address. The responsibility of the network layer is
to transmit the data from one computer to another computer and the responsibility of the transport
layer is to transmit the message to the correct process.
o Segmentation and reassembly: When the transport layer receives the message from the upper layer,
it divides the message into multiple segments, and each segment is assigned with a sequence number
46
that uniquely identifies each segment. When the message has arrived at the destination, then the
transport layer reassembles the message based on their sequence numbers.
o Connection control: Transport layer provides two services Connection-oriented service and
connectionless service. A connectionless service treats each segment as an individual packet, and
they all travel in different routes to reach the destination. A connection-oriented service makes a
connection with the transport layer at the destination machine before delivering the packets. In
connection-oriented service, all the packets travel in the single route.
o Flow control: The transport layer also responsible for flow control but it is performed end-to-end
rather than across a single link.
o Error control: The transport layer is also responsible for Error control. Error control is performed
end-to-end rather than across the single link. The sender transport layer ensures that message reach at
the destination without any error.
5) Session Layer
o A Presentation layer is mainly concerned with the syntax and semantics of the information
exchanged between the two systems.
o It acts as a data translator for a network.
o This layer is a part of the operating system that converts the data from one presentation format to
another format.
o The Presentation layer is also known as the syntax layer.
47
Functions of Presentation layer:
o Translation: The processes in two systems exchange the information in the form of character
strings, numbers and so on. Different computers use different encoding methods, the presentation
layer handles the interoperability between the different encoding methods. It converts the data from
sender-dependent format into a common format and changes the common format into receiver-
dependent format at the receiving end.
o Encryption: Encryption is needed to maintain privacy. Encryption is a process of converting the
sender-transmitted information into another form and sends the resulting message over the network.
o Compression: Data compression is a process of compressing the data, i.e., it reduces the number of
bits to be transmitted. Data compression is very important in multimedia such as text, audio, video.
7) Application Layer
o An application layer serves as a window for users and application processes to access network
service.
o It handles issues such as network transparency, resource allocation, etc.
o An application layer is not an application, but it performs the application layer functions.
o This layer provides the network services to the end-users.
Functions of Application layer:
o File transfer, access, and management (FTAM): An application layer allows a user to access the
files in a remote computer, to retrieve the files from a computer and to manage the files in a remote
computer.
o Mail services: An application layer provides the facility for email forwarding and storage.
o Directory services: An application provides the distributed database sources and is used to provide
that global information about various objects.
48
The physical layer is the first and lowest layer from the bottom of the 7-layered OSI model and delivers
security to hardware. This layer is in charge of data transmission over the physical medium. It is the most
complex layer in the OSI model.
The physical layer converts the data frame received from the data link layer into bits, i.e., in terms of ones
and zeros. It maintains the data quality by implementing the required protocols on different network modes
and maintaining the bit rate through data transfer using a wired or wireless medium.
o Analog Signals: These signals are continuous waveforms in nature and are represented by
continuous electromagnetic waves for the transmission of data.
o Digital Signals: These signals are discrete in nature and represent network pulses and digital
data from the upper layers.
2. Transmission media: Data is carried from source to destination with the help of transmission media.
There are two sorts of transmission media:
o Wired Media: The connection is established with the help of cables. For example, fiber optic cables,
coaxial cables, and twisted pair cables.
o Wireless Media: The connection is established using a wireless communication network. For
example, Wi-Fi, Bluetooth, etc.
3. Data Flow: It describes the rate of data flow and the transmission time frame. The factors affecting the
data flow are as follows:
o Simplex mode: This mode of communication is a one-way communication where a device can only
send data. Examples are a mouse, keyboard, etc.
o Half-duplex mode: This mode of communication supports one-way communication, i.e., either data
can be transmitted or received. An example is a walkie-talkie.
o Full-duplex mode: This mode of communication supports two-way communication, i.e., the device
can send and receive data at the same time. An example is cellular communication.
5. Noise in transmission: Transmitted data can get corrupted or damaged during data transmission due to
many reasons. Some of the reasons are mentioned below:
50
The data packet travels from the network layer to the data link layer. These data packets are further divided
into frames, and the frame size is chosen based on the NIC (Network Interface Card) used in the system.
This layer sets a logical layer between two points. It helps to manage the traffic control of frames on the
network by stopping the transmitted signal when the frame buffer is full. For the transmission of
information, the data link layer uses devices such as switches, bridges, etc.
The data link layer is classified into two sub-layers, which are given below:
1. Logical Link Control (LLC) or Data Link Control (DLC) Sublayer: LLC or DLC is the topmost
layer of the data link layer. It deals with the communication between the lower layers and upper
layers. This sublayer runs above the data link layer and provides flow control and error information.
It is responsible for assigning the frame sequence number. It specifies the mechanism that can be
used to address stations on a transmission medium and to control the data exchanged between the
sender and the receiver.
2. Media Access Control (MAC) Sublayer: The bottom sublayer of the Data Link Layer is the Media
Access Control. It is also known as Medium Access Control. It provides multiplexing and flow
control for the transmission media. The main responsibility of this sublayer is to encapsulate the
frame, check for transmission errors, and then allow the frame to be forwarded to the upper layer. It
determines who is permitted to access the media at any given time.
1. Hop to Hop or Node to Node delivery of data: The responsibility of the Data Link Layer (DLL) is to
provide hop-to-hop delivery of data. The data link layer determines the node to which the data
should be sent first, then the following node the data should be sent to, and so on, till the information
arrives at the destination system.
2. Framing: It is a process of encapsulating data packets obtained from the network layer into frames
for transmission. Each frame consists of a header, a payload field, and a trailer. The header contains
the frame start bits, the address of both the source and destination, the type of data, and quality
control bits. The payload field contains the data packet. The trailer contains error detection bits, error
correction bits, and frame stop bits.
51
3. Physical addressing: The Data Link Layer attaches the physical addresses of the receiver and sender
to the header of each frame. To send information from source to destination, you must know what we
are sending and where we are sending it.
4. Error control: During transmission, the frame can get corrupted by any cause. The error can be
controlled in the data link layer in three phases of error control as follows:
o Error detection: The error in the data frame is detected with the help of error detection bits
present in the frame trailer.
o Acknowledgment: After receiving the data frame, the receiver responds to inform the sender
about the successful delivery of the data frame. This acknowledgment can be positive or
negative. If the data frame is received successfully, it sends positive feedback to the sender;
otherwise, it sends negative feedback to the sender.
o Retransmission: If the receiver successfully receives the data frame, the sender sends the
next set of data frames, but if the data frame does not reach the receiver successfully, the
sender must resend the data frames.
5. Flow Control: The receiver should be able to receive the data frame at the same speed at which the
sender is sending the data frame, i.e., both the sender and the receiver should work at the same speed.
If the sender sends frames with high speed and the receiver receives frames with low speed, the
sender will be overloaded, resulting in loss of data.
Data loss can be handled with the help of two mechanisms:
o Stop and wait: The sender should wait until the acknowledgment is received from the receiver for
frame-1. The sender will wait for the response of the receiver, and then it will send the next data
frame.
o Sliding Window: Here, instead of sending acknowledgment after each frame, the sender sends
acknowledgment after some set of frames.
o Synchronous Data Link Protocol (SDLC): It is the first bit-oriented protocol and is widely used. It
is a subset of the High-Level Data Link Protocol. IBM developed this protocol in 1975. It manages
synchronous serially transmitted bits over a data link layer.
o High-Level Data Link Protocol (HDLC): It is a bit-oriented protocol for conveying data on point-to-
multipoint and point-to-point links. The International Organization for Standardization (ISO)
developed this protocol in 1979. It is based on Synchronous Data Link Protocol. It provides
connectionless and connection-oriented services. It provides two transmission modes: Asynchronous
Balanced Mode (ABM) and Normal Feedback Mode (NRM).
o Serial Line Internet Protocol (SLIP): It is a simple internet protocol through which the user is
allowed to access the internet with the help of a computer modem. Rick Adams developed this
protocol in 1984. It works with TCP/IP for communication over the router and serial port.
52
o Point to Point Protocol (PPP): It is a character-oriented or byte-oriented protocol. PPP is a WAN
protocol that runs over an Internet link. It is used in broadband communication. It is used to transmit
multiprotocol data between point-to-point devices. It provides transmission encryption, loop
connection authentication, and compression of data.
o Network Control Protocol (NCP): This layer was implemented by ARPANET. It allows transferring
data between two devices. It is a part of the point-to-point protocol. This network layer will carry the
data packets from the origin to the goal.
o Link Control Protocol (LCP): This layer is also a component of the point-to-point protocol. It is
mainly used for establishing and maintaining the link before sending data.
o Link Access Procedure (LAP): It is derived from the high-level data link protocol. It is used for
framing and data transmission over point-to-point links. It has several Link Access Protocols, such as
Multilink Procedure (MLP), Link Access Procedure for Modems (LAPM), Link Access Procedure
for Half-Duplex (LAPX), and Link Access Procedure for Frame Relay (LAPF).
Unit 5
Routing
o A Router is a process of selecting path along which the data can be transferred from source to the
destination. Routing is performed by a special device known as a router.
o A Router works at the network layer in the OSI model and internet layer in TCP/IP model
o A router is a networking device that forwards the packet based on the information available in the
packet header and forwarding table.
o The routing algorithms are used for routing the packets. The routing algorithm is nothing but a
software responsible for deciding the optimal path through which packet can be transmitted.
o The routing protocols use the metric to determine the best path for the packet delivery. The metric is
the standard of measurement such as hop count, bandwidth, delay, current load on the path, etc. used
by the routing algorithm to determine the optimal path to the destination.
o The routing algorithm initializes and maintains the routing table for the process of path
determination.
o Routing metrics and costs are used for determining the best route to the destination. The factors used
by the protocols to determine the shortest path, these factors are known as a metric.
Metrics are the network variables used to determine the best route to the destination. For some protocols use
the static metrics means that their value cannot be changed and for some other routing protocols use the
dynamic metrics means that their value can be assigned by the system administrator.
The most common metric values are given below:
o Hop count: Hop count is defined as a metric that specifies the number of passes through
internetworking devices such as a router, a packet must travel in a route to move from source to the
destination. If the routing protocol considers the hop as a primary metric value, then the path with the
least hop count will be considered as the best path to move from source to the destination.
o Delay: It is a time taken by the router to process, queue and transmit a datagram to an interface. The
protocols use this metric to determine the delay values for all the links along the path end-to-end.
The path having the lowest delay value will be considered as the best path.
o Bandwidth: The capacity of the link is known as a bandwidth of the link. The bandwidth is
measured in terms of bits per second. The link that has a higher transfer rate like gigabit is preferred
over the link that has the lower capacity like 56 kb. The protocol will determine the bandwidth
capacity for all the links along the path, and the overall higher bandwidth will be considered as the
best route.
o Load: Load refers to the degree to which the network resource such as a router or network link is
busy. A Load can be calculated in a variety of ways such as CPU utilization, packets processed per
53
second. If the traffic increases, then the load value will also be increased. The load value changes
with respect to the change in the traffic.
o Reliability: Reliability is a metric factor may be composed of a fixed value. It depends on the
network links, and its value is measured dynamically. Some networks go down more often than
others. After network failure, some network links repaired more easily than other network links. Any
reliability factor can be considered for the assignment of reliability ratings, which are generally
numeric values assigned by the system administrator.
Fewest hops routing is a network routing technique that minimizes the number of intermediate computers
that messages need to pass through while traveling from a source to a destination computer.
Here are some details about fewest hops routing:
• Routing schemes
A routing scheme is a mechanism that finds the path for delivering messages between a source and
destination node. It optimizes parameters like energy, congestion, delay, and jitter.
• Routing Information Protocol (RIP)
RIP uses the number of hops, or hop count, to determine the best route to a network or host. A hop count of
16 in RIP means infinity, or that the destination is unreachable.
• Hop-by-hop routing
This technique forwards packets from one node to the next based on short-term credits and long-term path
delay estimation.
• Algorithms
Algorithms like Dijkstra's algorithm and genetic algorithms are used to solve routing problems and find
efficient routes.
Types of Routing
Routing can be classified into three categories:
o Static Routing
o Default Routing
o Dynamic Routing
Static Routing
o No Overhead: It has ho overhead on the CPU usage of the router. Therefore, the cheaper router can
be used to obtain static routing.
o Bandwidth: It has not bandwidth usage between the routers.
o Security: It provides security as the system administrator is allowed only to have control over the
routing to a particular network.
54
Disadvantages of Static Routing:
Following are the disadvantages of Static Routing:
o For a large network, it becomes a very difficult task to add each route manually to the routing table.
o The system administrator should have a good knowledge of a topology as he has to add each route
manually.
Default Routing
o Default Routing is a technique in which a router is configured to send all the packets to the same hop
device, and it doesn't matter whether it belongs to a particular network or not. A Packet is transmitted
to the device for which it is configured in default routing.
o Default Routing is used when networks deal with the single exit point.
o It is also useful when the bulk of transmission networks have to transmit the data to the same hp
device.
o When a specific route is mentioned in the routing table, the router will choose the specific route
rather than the default route. The default route is chosen only when a specific route is not mentioned
in the routing table.
Dynamic Routing
o It is also known as Adaptive Routing.
o It is a technique in which a router adds a new route in the routing table for each packet in response to
the changes in the condition or topology of the network.
o Dynamic protocols are used to discover the new routes to reach the destination.
o In Dynamic Routing, RIP and OSPF are the protocols used to discover the new routes.
o If any route goes down, then the automatic adjustment will be made to reach the destination.
The Dynamic protocol should have the following features:
o All the routers must have the same dynamic routing protocol in order to exchange the routes.
o If the router discovers any change in the condition or topology, then router broadcast this information
to all other routers.
Advantages of Dynamic Routing:
o It is easier to configure.
o It is more effective in selecting the best route in response to the changes in the condition or topology.
Flooding is not practical for general kinds of applications. But in cases where high degree of
robustness is desired such as in military applications, flooding is of great help.
o Random Walk: In this method a packet is sent by the node to one of its neighbours
randomly. This algorithm is highly robust. When the network is highly interconnected, this
algorithm has the property of making excellent use of alternative routes. It is usually
implemented by sending the packet onto the least queued link.
57
Complexity Adaptive Routing Non-Adaptive Routing
algorithms are more algorithms are simple.
complex.
3. Hybrid Algorithms
As the name suggests, these algorithms are a combination of both adaptive and non-adaptive
algorithms. In this approach, the network is divided into several regions, and each region uses a
different algorithm.
Further, these are classified as follows:
Link-state: In this method, each router creates a detailed and complete map of the network which is
then shared with all other routers. This allows for more accurate and efficient routing decisions to be
made.
Distance vector: In this method, each router maintains a table that contains information about the
distance and direction to every other node in the network. This table is then shared with other routers
in the network. The disadvantage of this method is that it may lead to routing loops.
o Flooding: Each router sends the information to every other router on the internetwork except its
neighbors. This process is known as Flooding. Every router that receives the packet sends the copies
to all its neighbors. Finally, each and every router receives a copy of the same information.
o Information sharing: A router sends the information to every other router only when the change
occurs in the information.
Link State Routing has two phases:
Reliable Flooding
58
4 ADE 3,E 4,E
B
5 ADE 4,E
BC
6 ADE
BCF
• Distance vector: In this method, each router maintains a table that contains information about the
distance and direction to every other node in the network. This table is then shared with other routers
in the network. The disadvantage of this method is that it may lead to routing loops.
Distance Vector Routing Algorithm
o The Distance vector algorithm is iterative, asynchronous and distributed.
o Distributed: It is distributed in that each node receives information from one or more of its
directly attached neighbors, performs calculation and then distributes the result back to its
neighbors.
o Iterative: It is iterative in that its process continues until no more information is available to
be exchanged between neighbors.
o Asynchronous: It does not require that all of its nodes operate in the lock step with each
other.
o The Distance vector algorithm is a dynamic algorithm.
o It is mainly used in ARPANET, and RIP.
o Each router maintains a distance table known as Vector.
Example :
Consider 3-routers X, Y and Z as shown in figure. Each router have their routing table. Every routing
table will contain distance to the destination nodes.
Consider router X , X will share it routing table to neighbors and neighbors will share it routing table
to it to X and distance from node X to destination will be calculated using bellmen- ford equation.
Dx(y) = min { C(x,v) + Dv(y)} for each node y ? N
Gateway is a network node that forms a passage between two networks operating with different
transmission protocols. The most common type of gateways, the network gateway operates at layer 3,
i.e. network layer of the OSI (open systems interconnection) model. However, depending upon the
functionality, a gateway can operate at any of the seven layers of OSI model. It acts as the entry – exit point
59
for a network since all traffic that flows across the networks should pass through the gateway. Only the
internal traffic between the nodes of a LAN does not pass through the gateway.
Features of Gateways
• Gateway is located at the boundary of a network and manages all data that inflows or outflows from
that network.
• It forms a passage between two different networks operating with different transmission protocols.
• A gateway operates as a protocol converter, providing compatibility between the different protocols
used in the two different networks.
• The feature that differentiates a gateway from other network devices is that it can operate at any
layer of the OSI model.
• It also stores information about the routing paths of the communicating networks.
• When used in enterprise scenario, a gateway node may be supplemented as proxy server or firewall.
• A gateway is generally implemented as a node with multiple NICs (network interface cards)
connected to different networks. However, it can also be configured using software.
• It uses packet switching technique to transmit data across the networks.
Types of Gateways
On basis of direction of data flow, gateways are broadly divided into two categories −
• Unidirectional Gateways − They allow data to flow in only one direction. Changes made in the
source node are replicated in the destination node, but not vice versa. They can be used as archiving
tools.
• Bidirectional Gateways − They allow data to flow in both directions. They can be used as
synchronization tools.
• Router:
• It is an interconnecting device that works at the physical, data link and network layer of OSI
reference model. It may connect LAN and WAN in the network and can pass or relay the packets
among them. It has access to the network or logical address. The following figure displays the router
acts as a station in the network.
60
•
• In this the routers are a member of more than one network simultaneously. They have links with two
or more networks and contain the addresses of the stations on all these networks. It receives the
packets from one connected network and passes them to a second connected network. If a received
packet contains the address of a node that is on some other network, the Router determines which of
its connected networks the best next relay point for that packet.
Bridge
• A bridge is a networking device that works in both the physical and data link layer in a network. This
devices can divide a large network into smaller segments and pass the frames between two originally
separated LANs. A bridge maintains a MAC address of various stations attached to it. When a
frames enters a bridge, it checks the address contained in the frame and compares it with a table of
all the stations on both segments.
• For Example, A-frame is sent from station A to station C. When this frame arrives at the Bridge, the
Bridge checks its table and blocks it from crossing into the lower segment as station C is in the upper
segment only. Thus, a frame is relayed to the entire upper segment and is not allowed to move to
lower segment. If the frame is to be transmitted from station A to station F, the Bridge will allow this
frame to pass through it and relay it to the entire lower segment.
•
• Following are the point-to-point comparison between Router and Bridge.
•
61
Sr. No Points of Router Bridge
differences
1 Function The main function is to route the The main function of Bridge is
packets and to reduce the to filter the packets and to
network problems. keep the traffic for each
segment separately.
2 Layers It is a hardware device that It is a hardware device that
works at the network, data link & works at the OSI model's data
physical layer of the OSI Model. link and physical layer.
3 Address The Router has access to the The Bridge has access to a
logical address or IP address of physical address or MAC
stations. address of stations.
4 Protocols RIP, OSPF, etc. these are some In Bridge, there are no
protocols that can be configured protocols to configure.
in the Router.
5 Connection It connects two or more networks The Bridge is used to extend
and routes packets between them. the existing network or divide
or large network into smaller
segments.
6 Routing Table The Router uses a routing table The Bridge does not use a
to store information. This table is routing table for storing
dynamic and is updated using information.
routing protocols.
7 Data Structure A router used graph data Bridge used tables data
structure. structures
8 Network In Router enables network In Bridge network
Segmentation segmentation. segmentation is disable.
9 Domain It works on more than single Bridge works on a single
broadcast domains. broadcast domain.
10 Transparency It is not transparent to the end It is transparent to the end
stations. stations and do not rely on the
protocol.
11 Efficiency Routing is more efficient. The Bridge has less efficiency
than the Router.
12 Ports It has more than two ports. It has only two ports.
13 Path Router devices can accommodate Bridge devices can
multiple paths. accommodate a single path.
14 Setup Difficult Easy
15 Cost Routers are relatively expensive Bridges are relatively
devices. inexpensive devices.
protocol gateways?
Protocol gateways, also known as protocol translators, are small non-descript devices that mainly function as
translators for various protocols and physical layers (i.e., Transmission Control Protocol (TCP) and serial
lines). This allows machinery, sensors, actuators, and computers that operate industrial facilities such
as factories, dams, power plants, and water processing facilities to communicate with one another.
In an industrial facility, several devices function together in one seamless process. To do this, they must
effectively communicate or transmit information to one another. In an ideal scenario, all these devices use
the same protocol. However, such a homogeneous setup is not always possible given the variety of devices a
facility may need and the different manufacturers that provide them.
The process of creating industrial-internet-of-things (IIoT) environments and adapting for Industry 4.0
present protocol challenges because it merges operational technology (OT) and information technology (IT),
wherein traditional OT networks are connected to IT networks. These two networks do not use the same
62
protocols, with OT communicating over serial cables and IT communicating through the Ethernet, Wi-Fi,
and mobile networks.
Protocol gateways help bridge the disparity in protocols in both scenarios. The diagram in figure 1 shows the
typical position of protocol gateways.
Figure 1. The typical position of a protocol gateway, at the bottom of the control network
TCP/IP model
o The TCP/IP model was developed prior to the OSI model.
o The TCP/IP model is not exactly similar to the OSI model.
o The TCP/IP model consists of five layers: the application layer, transport layer, network layer, data
link layer and physical layer.
o The first four layers provide physical standards, network interface, internetworking, and transport
functions that correspond to the first four layers of the OSI model and these four layers are
represented in TCP/IP model by a single layer called the application layer.
o TCP/IP is a hierarchical protocol made up of interactive modules, and each of them provides specific
functionality.
Here, hierarchical means that each upper-layer protocol is supported by two or more lower-level protocols.
Functions of TCP/IP layers:
63
Network Access Layer
o A network layer is the lowest layer of the TCP/IP model.
o A network layer is the combination of the Physical layer and Data Link layer defined in the OSI
reference model.
o It defines how the data should be sent physically through the network.
o This layer is mainly responsible for the transmission of the data between two devices on the same
network.
o The functions carried out by this layer are encapsulating the IP datagram into frames transmitted by
the network and mapping of IP addresses into physical addresses.
o The protocols used by this layer are ethernet, token ring, FDDI, X.25, frame relay.
Internet Layer
o An internet layer is the second layer of the TCP/IP model.
o An internet layer is also known as the network layer.
o The main responsibility of the internet layer is to send the packets from any network, and they arrive
at the destination irrespective of the route they take.
Following are the protocols used in this layer are:
IP Protocol: IP protocol is used in this layer, and it is the most significant part of the entire TCP/IP suite.
Following are the responsibilities of this protocol:
o IP Addressing: This protocol implements logical host addresses known as IP addresses. The IP
addresses are used by the internet and higher layers to identify the device and to provide
internetwork routing.
o Host-to-host communication: It determines the path through which the data is to be transmitted.
o Data Encapsulation and Formatting: An IP protocol accepts the data from the transport layer
protocol. An IP protocol ensures that the data is sent and received securely, it encapsulates the data
into message known as IP datagram.
o Fragmentation and Reassembly: The limit imposed on the size of the IP datagram by data link
layer protocol is known as Maximum Transmission unit (MTU). If the size of IP datagram is greater
than the MTU unit, then the IP protocol splits the datagram into smaller units so that they can travel
over the local network. Fragmentation can be done by the sender or intermediate router. At the
receiver side, all the fragments are reassembled to form an original message.
o Routing: When IP datagram is sent over the same local network such as LAN, MAN, WAN, it is
known as direct delivery. When source and destination are on the distant network, then the IP
datagram is sent indirectly. This can be accomplished by routing the IP datagram through various
devices such as routers.
ARP Protocol
o ARP stands for Address Resolution Protocol.
o ARP is a network layer protocol which is used to find the physical address from the IP address.
o The two terms are mainly associated with the ARP Protocol:
o ARP request: When a sender wants to know the physical address of the device, it broadcasts
the ARP request to the network.
o ARP reply: Every device attached to the network will accept the ARP request and process
the request, but only recipient recognize the IP address and sends back its physical address in
the form of ARP reply. The recipient adds the physical address both to its cache memory and
to the datagram header
ICMP Protocol
o ICMP stands for Internet Control Message Protocol.
o It is a mechanism used by the hosts or routers to send notifications regarding datagram problems
back to the sender.
o A datagram travels from router-to-router until it reaches its destination. If a router is unable to route
the data because of some unusual conditions such as disabled links, a device is on fire or network
congestion, then the ICMP protocol is used to inform the sender that the datagram is undeliverable.
64
o An ICMP protocol mainly uses two terms:
o ICMP Test: ICMP Test is used to test whether the destination is reachable or not.
o ICMP Reply: ICMP Reply is used to check whether the destination device is responding or
not.
o The core responsibility of the ICMP protocol is to report the problems, not correct them. The
responsibility of the correction lies with the sender.
o ICMP can send the messages only to the source, but not to the intermediate routers because the IP
datagram carries the addresses of the source and destination but not of the router that it is passed to.
Transport Layer
The transport layer is responsible for the reliability, flow control, and correction of data which is being sent
over the network.
The two protocols used in the transport layer are User Datagram protocol and Transmission control
protocol.
o User Datagram Protocol (UDP)
o It provides connectionless service and end-to-end delivery of transmission.
o It is an unreliable protocol as it discovers the errors but not specify the error.
o User Datagram Protocol discovers the error, and ICMP protocol reports the error to the
sender that user datagram has been damaged.
o UDP consists of the following fields:
Source port address: The source port address is the address of the application program that
has created the message.
Destination port address: The destination port address is the address of the application
program that receives the message.
Total length: It defines the total number of bytes of the user datagram in bytes.
Checksum: The checksum is a 16-bit field used in error detection.
o UDP does not specify which packet is lost. UDP contains only checksum; it does not contain
any ID of a data segment.
Application Layer
o An application layer is the topmost layer in the TCP/IP model.
o It is responsible for handling high-level protocols, issues of representation.
o This layer allows the user to interact with the application.
o When one application layer protocol wants to communicate with another application layer, it
forwards its data to the transport layer.
o There is an ambiguity occurs in the application layer. Every application cannot be placed inside the
application layer except those who interact with the communication system. For example: text editor
cannot be considered in application layer while web browser using HTTP protocol to interact with
the network where HTTP protocol is an application layer protocol.
What is Ethernet?
Ethernet is the most widely used LAN technology and is defined under IEEE standards 802.3. The reason
behind its wide usability is that Ethernet is easy to understand, implement, and maintain, and allows low-
cost network implementation. Also, Ethernet offers flexibility in terms of the topologies that are allowed.
Ethernet generally uses a bus topology. Ethernet operates in two layers of the OSI model, the physical layer
and the data link layer. For Ethernet, the protocol data unit is a frame since we mainly deal with DLLs. In
order to handle collisions, the Access control mechanism used in Ethernet is CSMA/CD.
Although Ethernet has been largely replaced by wireless networks, wired networking still uses Ethernet
more frequently. Wi-Fi eliminates the need for cables by enabling users to connect their smartphones or
laptops to a network wirelessly. The 802.11ac Wi-Fi standard offers faster maximum data transfer rates
when compared to Gigabit Ethernet. However, wired connections are more secure and less susceptible to
interference than wireless networks. This is the main justification for why so many companies and
organizations continue to use Ethernet.
What is the Internet?
Internet is a global network that connects billions of computers across the world with each other and to the
World Wide Web. It uses standard internet protocol suite (TCP/IP) to connect billions of computer users
worldwide. It is set up by using cables such as optical fibers and other wireless and networking technologies.
At present, internet is the fastest mean of sending or exchanging information and data between computers
across the world.
It is believed that the internet was developed by "Defense Advanced Projects Agency" (DARPA)
department of the United States. And, it was first connected in 1969.
Why is the Internet Called a Network?
Internet is called a network as it creates a network by connecting computers and servers across the world
using routers, switches and telephone lines, and other communication devices and channels. So, it can be
considered a global network of physical cables such as copper telephone wires, fiber optic cables, tv cables,
etc. Furthermore, even wireless connections like 3G, 4G, or Wi-Fi make use of these cables to access the
Internet.
Internet is different from the World Wide Web as the World Wide Web is a network of computers and
servers created by connecting them through the internet. So, the internet is the backbone of the web as it
provides the technical infrastructure to establish the WWW and acts as a medium to transmit information
from one computer to another computer. It uses web browsers to display the information on the client, which
it fetches from web servers.
67
The internet is not owned by a single person or organization entirely. It is a concept based on physical
infrastructure that connects networks with other networks to create a global network of billions of
computers. As of 12 August 2016, there were more than 300 crores of internet users across the world.
Now after understanding the basics, let us see how internet works?
When you turn on your computer and type a domain name in the browser search bar, your browser sends a
request to the DNS server to get the corresponding IP address. After getting the IP address, the browser
forwards the request to the respective server.
Once the server gets the request to provide information about a particular website, the data starts flowing.
The data is transferred through the optical fiber cables in digital format or in the form of light pulses. As the
servers are placed at distant places, the data may have to travel thousands of miles through optical fiber
cable to reach your computer.
The optical fiber is connected to a router, which converts the light signals into electrical signals. These
electrical signals are transmitted to your laptop using an Ethernet cable. Thus, you receive the desired
information through the internet, which is actually a cable that connects you with the server.
Furthermore, if you are using wireless internet using wifi or mobile data, the signals from the optical cable
are first sent to a cell tower and from where it reaches to your cell phone in the form of electromagnetic
waves.
The internet is managed by ICANN (Internet Corporation for Assigned Names and Numbers) located in the
USA. It manages IP addresses assignment, domain name registration, etc.
The data transfer is very fast on the internet. The moment you press enter you get the information from a
server located thousands of miles away from you. The reason for this speed is that the data is sent in the
binary form (0, 1), and these zeros and ones are divided into small pieces called packets, which can be sent
at high speed.
68
If a client connects the computer with the internet using Internet Service Provider (ISP), the client’s system
is allocated a temporary internet protocol address till the session client is operating. However, if someone
becomes part of the internet using a local area network (LAN), the client is probably assigned to a
permanent internet protocol. At the time of connection, the system will have a unique internet protocol
address. A handy program is named “Ping” to ensure the internet connection on the system; this provision is
available on all the Microsoft Windows operating systems and sometimes on a flavour of Unix OS.
Fig. 2 briefly describes the path framework related to that message from “Your computer” to another
computer.
69
5. The hardware layer is responsible for converting alpha/numeric messages into a digital signal and
sending the message through the telephone’s path.
6. Internet services provider (ISP) is also attached to the internet, where the ISP router examines the
recipient’s address. The next stop of the packet is another router.
7. Eventually, the packets reach another computer. This time packets start from the bottom.
8. As the packets move upwards, the packets’ unnecessary data is removed that was helping to reach
the destination; this includes IP address and port number.
9. On reaching the stack’s top, all the packets are reassembled to form the original message sent by
“Your computer”.
It is clear from the discussion about how two computers at different locations interact with each other
employing the internet. How do computers send messages? How are packets transmitted and received at
both systems? How an alphanumeric message is converted into a digital signal and vice versa. Fig. 3 will
now briefly explain what resides in between all the layers?
The internet layer is a group of internetworking methods, protocols, and specifications in the Internet
protocol suite that are used to transport network packets from the originating host across network
boundaries; if necessary, to the destination host specified by an IP address. The internet layer derives its
name from its function facilitating internetworking, which is the concept of connecting multiple networks
with each other through gateways.
The internet layer does not include the protocols that fulfill the purpose of maintaining link states between
the local nodes and that usually use protocols that are based on the framing of packets specific to the link
types. Such protocols belong to the link layer. Internet-layer protocols use IP-based packets.
70
A common design aspect in the internet layer is the robustness principle: "Be liberal in what you accept, and
conservative in what you send"[1] as a misbehaving host can deny Internet service to many other users.
The internet layer is a layer in the TCP/IP model that is responsible for transporting network packets
between nodes on different networks. It's also known as the network layer or IP layer.
The internet layer uses a combination of protocols and specifications to perform the following tasks:
• Routing: The internet layer routes packets across networks.
• IP addresses: The internet layer uses IP addresses to identify and locate network hosts.
• Packet delivery: The internet layer accepts and delivers packets for the network.
The internet layer includes the following protocols:
• Internet Protocol (IP): The main component of the internet layer, IP defines addressing systems for
network hosts.
• Address Resolution Protocol (ARP): Operates at the internet layer.
• Internet Control Message Protocol (ICMP): Operates at the internet layer.
The internet layer makes internetworking possible by allowing different IP networks to interwork with each
other
Here are some common internetwork problems and how to troubleshoot them:
• Hardware failures
Malfunctioning routers, switches, or network interface cards can cause network outages. These issues can be
caused by overheating, wear and tear, or physical damage. Regular maintenance and timely replacements
can help prevent hardware failures.
• Configuration errors
Misconfigured routing tables or incorrect access control lists can cause network device issues and disrupt
network connectivity.
• Network congestion
Too many people trying to access a network at the same time can cause network congestion. This is the most
common type of internet outage and is also the easiest to prevent.
• DNS issues
DNS issues occur when you are unable to connect to an IP address. This can make your site appear online to
you but offline to visitors.
• Intermittent connectivity
An unstable network connection that frequently disconnects or drops can disrupt tasks, hinder
communication, and lead to data loss.
• Physical connections
Check that all physical network connections are in place.
• IP configurations
Verify that devices have valid IP addresses, subnet masks, and default gateways configured.
• Traceroute
Run a traceroute to identify the route taken by data packets and pinpoint where the connection is failing.
Internet Standard?
Internet standards are fundamental to the global internet, which given the complex and diverse nature of the
systems and technologies on the internet attempts to prove how these systems can interact. These are
standardization patterns that are provided by the Internet Engineering Task Force (IETF), which has worked
on its protocols for a long time and has a strict mechanism for revising and approving them.
These standards will facilitate web affinity to signal, security, and innovation. In this article, we will look
into the standardization process in Internet Standard, its importance, examples, etc.
An internet standard is a set of technical specifications, protocols, or guidelines that define how the internet
works. The Internet Engineering Task Force (IETF) creates and publishes internet standards to ensure that
the internet is stable, efficient, and interoperable.
Internet standards are important because they:
• Enable communication: They allow users and devices to communicate seamlessly.
• Enable data formatting: They help organizations format data and processes effectively.
• Enable interoperability: They ensure that systems on the internet can work together.
71
Internet standards are developed through consensus and rigorous review processes. They are achieved
through languages, schemas, message formats, and defining protocols
72