Computer Networks (Modified)
Computer Networks (Modified)
Computer Networks (Modified)
Network equipment
PC network parts are the significant parts which are expected to introduce
the
parts can likewise be taken out. For instance, the remote organization
doesn't need
a link..
Components Of Computer Network:
NIC
Wired NIC: The Wired NIC is present inside the motherboard. Cables and
connectors are used with wired NIC to transfer data.
Wireless NIC: The wireless NIC contains the antenna to obtain the connection
over the wireless network. For example, laptop computer contains the wireless NIC.
Hub
A Hub Center is an equipment gadget that splits the organization association between
numerous gadgets. At the point when PC demands for some data from an
organization, it initially sends the solicitation to the Center through link. Center point
will communicate this solicitation to the whole organization. Every one of the gadgets
will check regardless of whether the solicitation has a place with them. In the event
that not, the solicitation will be dropped.
The interaction utilized by the Center point consumes more transfer speed and
restricts how much correspondence. These days, the utilization of center point is out
of date, and it is supplanted by further developed PC network parts like Switches, Sw
Switch
the organization.
Router
the packet..
Advantages Of Router:
Modem
A modem is a hardware device that allows the computer to connect to the
internet over the existing telephone line.
A modem is not integrated with the motherboard rather than it is installed on
the PCI slot found on the motherboard.
It stands for Modulator/Demodulator. It converts the digital data into an
analog signal over the telephone lines.
Based on the differences in speed and transmission rate, a modem can be classified in
the following categories:
Bridges
A bridge connects two separate Ethernet network segments. It forwards packets from
the source network to the destined network.
Gateways
A gateway connects entirely different networks that work upon different protocols. It
is the entry and the exit point of a network and controls access to other networks.
Network Interface Cards
Network Software
File management lets administrators decide the location of data storage and
control user access to that data.
Communication speed
File sharing
Back up and Roll back is easy
Software and Hardware sharing
Security
Scalability
Reliability
Communication speed
Network provides us to communicate over the network in a fast and efficient manner.
For example, we can do video conferencing, email messaging, etc. over the internet.
Therefore, the computer network is a great way to share our knowledge and ideas.
File sharing
File sharing is one of the major advantages of the computer network. Computer
network provides us to share the files with each other.
Since the files are stored in the main server which is centrally located. Therefore, it is
easy to take the back up from the main server.
We can install the applications on the main servertherefore, the user can access the
applications centrally. So, we do not need to install the software on every machine.
Similarly, hardware can also be shared.
Security
Network allows the security by ensuring that the user has the right to access the
certain files and applications.
Scalability
Scalability means that we can add the new components on the network. Network must
be scalable so that we can extend the network by adding new devices. But, it
decreases the speed of the connection and data of the transmission speed also
decreases, this increases the chances of error occurring. This problem can be
overcome by using the routing or switching devices.
Reliability
Computer network can use the alternative source for the data communication in case
of any hardware failure.
Computer Network Architecture is defined as the physical and logical design of the
software, hardware, protocols, and media of the transmission of data. Simply we can
say that how computers are organized and how tasks are allocated to the computer.
Peer-To-Peer network
In the case of Peer-To-Peer network, it does not contain the centralized system
. Therefore, it cannot back up the data as the data is different in different
locations.
It has a security issue as the device is managed itself.
OSI Model
OSI comprises of seven layers, and each layer plays out a specific
organization capability.
OSI model was created by the Global Association for Normalization (ISO) in
1984, and it is presently viewed as a building model for the between PC
correspondences.
OSI model partitions the entire errand into seven more modest and sensible
assignments. Each layer is relegated a specific undertaking.
The OSI model is partitioned into two layers: upper layers and lower layers.
The upper layer of the OSI model basically manages the application related
issues, and they are executed exclusively in the product. The application layer
is nearest to the end client. Both the end client and the application layer
interface with the product applications. An upper layer alludes to the layer
simply over another layer.
The lower layer of the OSI model arrangements with the information transport
issues. The information connect layer and the actual layer are carried out in
equipment and programming. The actual layer is the most minimal layer of the
OSI model and is nearest to the actual medium. The actual layer is mostly
answerable for putting the data on the actual medium.
There are the seven OSI layers. Each layer has different functions. A list of seven
layers is given below:
1. Physical Layer
2. Data-Link Layer
3. Network Layer
4. Transport Layer
5. Session Layer
6. Presentation Layer
7. Application Layer
1) Physical layer
The main functionality of the physical layer is to transmit the individual bits
from one node to another node.
It is the lowest layer of the OSI model.
It establishes, maintains and deactivates the physical connection.
It specifies the mechanical, electrical and procedural network interface
specifications.
2) Data-Link Layer
Framing: The data link layer translates the physical's raw bit stream into
packets known as Frames. The Data link layer adds the header and trailer
to the frame. The header which is added to the frame contains the
hardware destination and source address.
Physical Addressing: The Data link layer adds a header to the frame that
contains a destination address. The frame is transmitted to the destination
address mentioned in the header.
Flow Control: Flow control is the main functionality of the Data-link layer. It
is the technique through which the constant data rate is maintained on both the
sides so that no data get corrupted. It ensures that the transmitting station such
as a server with higher processing speed does not exceed the receiving station,
with lower processing speed.
Error Control: Error control is achieved by adding a calculated value CRC
(Cyclic Redundancy Check) that is placed to the Data link layer's trailer which
is added to the message frame before it is sent to the physical layer. If any
error seems to occurr, then the receiver sends the acknowledgment for the
retransmission of the corrupted frames.
Access Control: When two or more devices are connected to the same
communication channel, then the data link layer protocols are used to
determine which device has control over the link at a given time.
3) Network Layer
4) Transport Layer
The Transport layer is a Layer 4 ensures that messages are transmitted in the
order in which they are sent and there is no duplication of data.
The main responsibility of the transport layer is to transfer the data
completely.
It receives the data from the upper layer and converts them into smaller units
known as segments.
This layer can be termed as an end-to-end layer as it provides a point-to-point
connection between source and destination to deliver the data reliably.
Service-point tending to: PCs run a few projects all the while because of
this explanation, the transmission of information from source to the
objective starting with one PC then onto the next PC as well as starting
with one interaction then onto the next cycle. The vehicle layer adds the
header that contains the location known as a help point address or port
location. The obligation of the organization layer is to send the
information starting with one PC then onto the next PC and the
obligation of the vehicle layer is to communicate the message to the right
cycle.
Segmentation and reassembly: When the vehicle layer gets the message
from the upper layer, it partitions the message into various sections, and
each fragment is doled out with a grouping number that extraordinarily
distinguishes each portion. At the point when the message has shown up
at the objective, then the vehicle layer reassembles the message in light of
their grouping numbers.
Connection control: Transport layer offers two types of assistance
Association situated help and connectionless help. A connectionless help
regards each fragment as a singular bundle, and they all movement in
various courses to arrive at the objective. An association situated help
makes an association with the vehicle layer at the objective machine prior
to conveying the parcels. In association arranged assistance, every one of
the parcels travel in the single course.
Flow control: The vehicle layer likewise liable for stream control however
it is performed start to finish as opposed to across a solitary connection.
5) Session Layer
6) Presentation Layer
A Presentation layer is mainly concerned with the syntax and semantics of the
information exchanged between the two systems.
It acts as a data translator for a network.
This layer is a part of the operating system that converts the data from one
presentation format to another format.
The Presentation layer is also known as the syntax layer.
7) Application Layer
Here, hierarchical means that each upper-layer protocol is supported by two or more
lower-level protocols.
Functions of TCP/IP layers:
o A network layer is the mix of the Actual layer and Information Connection
layer characterized in the OSI reference model.
o The capabilities completed by this layer are embodying the IP datagram into
outlines communicated by the organization and planning of IP addresses into actual
addresses.
o The conventions utilized by this layer are ethernet, token ring, FDDI, X.25,
outline hand-off.
Internet Layer
o The principal obligation of the web layer is to send the parcels from any
organization, and they show up at the objective regardless of the course they take.
IP Convention: IP convention is utilized in this layer, and it is the main piece of the
whole TCP/IP suite.
ARP Protocol
ICMP Protocol
Transport Layer
The transport layer is responsible for the reliability, flow control, and correction of
data which is being sent over the network.
The two protocols used in the transport layer are User Datagram protocol and
Transmission control protocol.
Application Layer
o HTTP: HTTP stands for Hypertext transfer protocol. This protocol allows us
to access the data over the world wide web. It transfers the data in the form of
plain text, audio, video. It is known as a Hypertext transfer protocol as it has
the efficiency to use in a hypertext environment where there are rapid jumps
from one document to another.
o SNMP: SNMP stands for Simple Network Management Protocol. It is a
framework used for managing the devices on the internet by using the TCP/IP
protocol suite.
o SMTP: SMTP stands for Simple mail transfer protocol. The TCP/IP protocol
that supports the e-mail is known as a Simple mail transfer protocol. This
protocol is used to send the data to another e-mail address.
o DNS: DNS stands for Domain Name System. An IP address is used to identify
the connection of a host to the internet uniquely. But, people prefer to use the
names instead of addresses. Therefore, the system that maps the name to the
address is known as Domain Name System.
o TELNET: It is an abbreviation for Terminal Network. It establishes the
connection between the local computer and remote computer in such a way
that the local terminal appears to be a terminal at the remote system.
o FTP: FTP stands for File Transfer Protocol. FTP is a standard internet
protocol used for transmitting the files from one computer to another
computer.
ARPANET
The full form of ARPANET is Advanced Research Projects Agency NET was
developed under the direction of the US Advanced Research Projects Agency and
was based on a concept first published in 1967. With the interconnection of four
university computers in 1969, the concept became a modest reality.
It was the first network to implement the TCP/IP protocol. It was a very early packet
switch network. This network became the foundation for the modern day internet.
The protocols used in Arpanet were later developed for joining multiple networks,
which gave rise to the modern day internet. It helps in grouping the data in digital
communication to packets. It helps by introducing the protocol suit. Now it is the
foundation for the internet we are using now.
Characteristics
The characteristics of ARPANET are as follows −
Risk-taking
Experimental
Dynamic
A head of industry at time
Part of changing the way computing was done
Building a new discipline.
Advantages
The advantages of ARPANET are as follows −
ARPANET allowed remote login and was given the name Tenet.
Transfer of files becomes a part of FTP.
It uses host-to-host protocol called as NCP (network control protocol)
It uses packet switching to send data.
Disadvantages
The disadvantages of ARPANET are as follows −
It is defined as the physical medium through which the signals are transmitted. It is
also known as Bounded media.
Twisted pairs:
Twisted pair is a physical media made up of a pair of cables twisted with each other.
A twisted pair cable is cheap as compared to other transmission media. Installation of
the twisted pair cable is easy, and it is a lightweight cable. The frequency range for
twisted pair cable is from 0 to 3.5KHz.
A twisted pair consists of two insulated copper wires arranged in a regular spiral
pattern.
The degree of reduction in noise interference is determined by the number of turns per
foot. Increasing the number of turns per foot decreases noise interference.
o Category 1: Category 1 is used for telephone lines that have low-speed data.
o Category 2: It can support upto 4Mbps.
o Category 3: It can support upto 16Mbps.
o Category 4: It can support upto 20Mbps. Therefore, it can be used for long-
distance communication.
o Category 5: It can support upto 200Mbps.
o It is cheap.
o Installation of the unshielded twisted pair is easy.
o It can be used for high-speed LAN.
Disadvantage:
o This cable can only be used for shorter distances because of attenuation.
A shielded twisted pair is a cable that contains the mesh surrounding the wire that
allows the higher transmission rate.
o The cost of the protected turned pair link isn't exceptionally high and not
extremely low.
o It has higher limit when contrasted with unshielded contorted pair link.
Disadvantages
Coaxial Cable
Fibre Optic
o Fibre optic cable is a cable that uses electrical signals for communication.
o Fibre optic is a cable that holds the optical fibres coated in plastic that are used
to send the data by pulses of light.
o The plastic coating protects the optical fibres from heat, cold, electromagnetic
interference from other types of wiring.
o Fibre optics provide faster data transmission than copper wires.
o Core: The optical fibre consists of a narrow strand of glass or plastic known
as a core. A core is a light transmission area of the fibre. The more the area of
the core, the lighter will be transmitted into the fibre.
o Cladding: The concentric layer of glass is known as cladding. The main
functionality of the cladding is to provide the lower refractive index at the core
interface as to cause the reflection within the core so that the light waves are
transmitted through the fibre.
o Jacket: The protective coating consisting of plastic is known as a jacket. The
main purpose of a jacket is to preserve the fibre strength, absorb shock and
extra fibre protection.
o Greater Transmission capacity: The fiber optic link gives more transfer
speed as thought about copper. Subsequently, the fiber optic conveys more
information when contrasted with copper link.
o Faster speed: Fiber optic link conveys the information as light. This
permits the fiber optic link to convey the signs at a higher speed.
o Longer distances: The fiber optic link conveys the information at a more
drawn out distance when contrasted with copper link.
o Better unwavering quality: The fiber optic link is more dependable than
the copper link as it is resistant to any temperature changes while it can cause
impede in the network of copper link.
o Thinner and Sturdier: Fiber optic link is more slender and lighter in
weight so it can endure more draw strain than copper link.
Unguided Transmission
o Radio waves are the electromagnetic waves that are transmitted in all the
directions of free space.
o Radio waves are omnidirectional, i.e., the signals are propagated in all the
directions.
o The range in frequencies of radio waves is from 3Khz to 1 khz.
o In the case of radio waves, the sending and receiving antenna are not aligned,
i.e., the wave sent by the sending antenna can be received by any receiving
antenna.
o An example of the radio wave is FM radio.
o A Radio wave is useful for multicasting when there is one sender and many
receivers.
o An FM radio, television, cordless phones are examples of a radio wave.
o Radio transmission is mainly used for wide area networks and mobile cellular
phones.
o Radio waves cover a large area, and they can penetrate the walls.
o Radio transmission provides a higher transmission rate.
Microwaves
o Microwaves are the electromagnetic waves having the recurrence in the reach
from 1GHz to 1000 GHz.
o In this case, recieving wires are mounted on the pinnacles to send a pillar to
another radio wire which is km away.
o It chips away at the view transmission, i.e., the radio wires mounted on the
pinnacles are the immediate sight of one another.Characteristics of Microwave:
Advantages Of Microwave:
o The transmission cost of the satellite is free of the separation from the focal
point of the inclusion region.
o Satellite designing and development requires more time and higher cost.
o The Satellite needs to be monitored and controlled on regular periods so that it
remains in orbit.
o The life of the satellite is about 12-15 years. Due to this reason, another launch
of the satellite has to be planned before it becomes non-functional.
Characteristics Of Infrared:
o It supports high bandwidth, and hence the data rate will be very high.
o Infrared waves cannot penetrate the walls. Therefore, the infrared
communication in one room cannot be interrupted by the nearby rooms.
o An infrared communication provides better security with minimum
interference.
o Infrared communication is unreliable outside the building because the sun rays
will interfere with the infrared waves.
The PSTN has been broadly utilized for quite a long time and has given solid voice
correspondence administrations to billions of individuals all over the planet.
Notwithstanding, with the approach of computerized advancements and the
developing fame of web based correspondence benefits, the PSTN is slowly being
eliminated in certain locales for fresher and further developed correspondence
organizations. In any case, the PSTN keeps on assuming a critical part in many
regions of the planet, particularly in far off regions where web network might be
restricted or problematic.
Cell phone frameworks utilize a blend of cell innovation and radio waves to lay out
correspondence joins between cell phones and cell pinnacles or base stations. These
phone towers are decisively situated inside an inclusion region, and as a cell phone
moves, it naturally interfaces and changes between various cell pinnacles to keep a
consistent association.
There are a few ages of cell phone frameworks, each with its own mechanical
headways and guidelines. These include:
Error Detection
When data is transmitted from one device to another device, the system
does not guarantee whether the data received by the device is identical to the data
transmitted by another device. An Error is a situation when the message received at
the receiver end is not identical to the message transmitted.
Types Of Errors
o Single-Bit Error
o Burst Error
Single-Bit Error:
The only one bit of a given data unit is changed from 1 to 0 or from 0 to 1.
In the above figure, the message which is sent is corrupted as single-bit, i.e., 0 bit is
changed to 1.
Single-Bit Error does not appear more likely in Serial Data Transmission. For
example, Sender sends the data at 10 Mbps, this means that the bit lasts only for 1 ?s
and for a single-bit error to occurred, a noise must be more than 1 ?s.
Single-Bit Error mainly occurs in Parallel Data Transmission. For example, if eight
wires are used to send the eight bits of a byte, if one of the wire is noisy, then single-
bit is corrupted per byte.
Burst Error:
The two or more bits are changed from 0 to 1 or from 1 to 0 is known as Burst Error.
The Burst Error is determined from the first corrupted bit to the last corrupted bit.
The duration of noise in Burst Error is more than the duration of noise in Single-Bit.
Burst Errors are most likely to occur in Serial Data Transmission.
The number of affected bits depends on the duration of the noise and data rate.
o Checksum
o Single Equality checking is the basic component and cheap to distinguish the
blunders.
o If the quantity of 1s pieces is odd, then equality bit 1 is affixed and on the off
chance that the quantity of 1s pieces is even, equality bit 0 is annexed toward the
finish of the information unit.
o At the less than desirable end, the equality bit is determined from the got
information bits and contrasted and the got equality bit.
o This method creates the all out number of 1s even, so it is known as even-
equality checking.
o If two bits in one data unit are corrupted and two bits exactly the same
position in another data unit are also corrupted, then 2D Parity checker will
not be able to detect the error.
o This technique cannot be used to detect the 4-bit errors or more in some cases.
Checksum
Checksum Generator
A Checksum is generated at the sending side. Checksum generator
subdivides the data into equal segments of n bits each, and all these segments are
added together by using one's complement arithmetic. The sum is complemented and
appended to the original data, known as checksum field. The extended data is
transmitted across the network.
Suppose L is the total sum of the data segments, then the checksum would be
Checksum Checker
o Thirdly, the CRC remaining piece replaces the joined 0s close to the
completion of the principal data. This as of late made unit is sent off the
recipient.
o The authority gets the data followed by the CRC extra piece. The
beneficiary will see this whole unit as a singular unit, and separated by a
similar divisor was utilized to find the CRC remaining portion.
Error Correction
Error Correction codes are used to detect and correct the errors when data
is transmitted from the sender to the receiver.
Protocols in the data link layer are designed so that this layer can perform
its basic functions: Framing, Error control and Flow control.
Elementary Data Link protocols are classified into three categories, as given below −
Step1 − The beneficiary send the affirmation outline back to the source let the
shipper know that the last gotten outline has been handled and passed to the host.
Stage 3 − The source in the wake of sending the sent casing needs to sit tight for a
recognize outline from the recipient prior to sending another edge.
This convention is called Simplex Pause and stand by convention, the shipper sends
one edge and sits tight for input from the recipient. At the point when the ACK shows
up, the shipper sends the following edge.The Simplex Stop and Wait Protocol is
diagrammatically represented as follows –
Sliding window protocols are data link layer protocols for reliable and sequential
delivery of data frames. The sliding window is also used in Transmission Control
Protocol.
In this protocol, multiple frames can be sent by a sender at a time before receiving an
acknowledgment from the receiver. The term sliding window refers to the imaginary
boxes to hold frames. Sliding window method is also known as windowing.
In one – bit sliding window protocol, the size of the window is 1. So the sender
transmits a frame, waits for its acknowledgment, then transmits the next frame. Thus
it uses the concept of stop and waits for the protocol. This protocol provides for full –
duplex communications. Hence, the acknowledgment is attached along with the next
data frame to be sent by piggybacking.
It is a data-link layer protocol which is used for transmitting the data over the
noiseless channels. It provides unidirectional data transmission which means that
either sending or receiving of data will take place at a time. It provides flow-control
mechanism but does not provide any error control mechanism.
The idea behind the usage of this frame is that when the sender sends the frame then
he waits for the acknowledgment before sending the next frame.
Stop and wait ARQ mechanism does not utilize the resources at their best.
When the acknowledgement is received, the sender sits idle and does nothing. In Go-
Back-N ARQ method, both sender and receiver maintain a window.
The sending-window size empowers the shipper to send various casings
without getting the affirmation of the past ones. The getting window empowers the
collector to get various edges and recognize them. The beneficiary monitors
approaching casing's arrangement number.
At the point when the shipper sends every one of the casings in window, it
looks up to what grouping number it has gotten positive affirmation. In the event that
all edges are emphatically recognized, the source sends next set of casings. Assuming
source finds that it has gotten NACK or has not get any ACK for a specific edge, it
retransmits every one of the casings after which it gets no sure ACK.
In Go-back-N ARQ, it is assumed that the receiver does not have any
buffer space for its window size and has to process each frame as it comes. This
enforces the sender to retransmit all the frames which are not acknowledged.
In Selective-Repeat ARQ, the receiver while keeping track of sequence
numbers, buffers the frames in memory and sends NACK for only frame which is
missing or damaged.
The sender in this case, sends only packet for which NACK is received.
This plan is additionally alluded as fixed channel designation or fixed channel task.
In this designation conspire, there is no impedance between the clients since every
client is relegated a decent channel. Be that as it may, it isn't reasonable in the event
of countless clients with variable transmission capacity prerequisites.Dynamic
Channel Allocation
In unique channel designation plot, recurrence groups are not forever doled out to the
clients. Rather channels are designated to clients powerfully depending on the
situation, from a focal pool. The portion is finished considering various boundaries so
transmission impedance is limited.
This designation plot improves transfer speed use and results is quicker
transmissions.
Dynamic channel allotment is additionally partitioned into incorporated and
appropriated portion.
In this convention, all the station has the equivalent need to send the information over
a channel. In irregular access convention, at least one stations can't rely upon another
station nor any station control another station. Contingent upon the channel's state
(inactive or occupied), each station communicates the information outline.
Notwithstanding, in the event that more than one station sends the information over a
channel, there might be a crash or information struggle. Because of the crash, the
information outline parcels might be lost or changed. What's more, subsequently, it
doesn't get by the recipient end. Following are the different methods of random-access
protocols for broadcasting frames on the channel.
o Aloha
o CSMA
o CSMA/CD
o CSMA/CA
It is designed for wireless LAN (Local Area Network) but can also be used
in a shared medium to transmit data. Using this method, any station can transmit data
across a network simultaneously when a data frameset is available for transmission.
Aloha Rules
Pure Aloha
Whenever data is available for sending over a channel at stations, we use Pure Aloha.
In pure Aloha, when each station transmits data to a channel without checking
whether the channel is idle or not, the chances of collision may occur, and the data
frame can be lost. When any station transmits the data frame to a channel, the pure
Aloha waits for the receiver's acknowledgment. If it does not acknowledge the
receiver end within the specified time, the station waits for a random amount of time,
called the backoff time (Tb). And the station may assume the frame has been lost or
destroyed. Therefore, it retransmits the frame until all the data are successfully
transmitted to the receiver.
Slotted Aloha
It is a carrier sense multiple access based on media access protocol to sense the
traffic on a channel (idle or busy) before transmitting the data. It means that if the
channel is idle, the station can send data to the channel. Otherwise, it must wait until
the channel becomes idle. Hence, it reduces the chances of a collision on a
transmission medium.
1-Persistent: In the 1-Persistent mode of CSMA that defines each node, first sense
the shared channel and if the channel is idle, it immediately sends the data. Else it
must wait and keep track of the status of the channel to be idle and broadcast the
frame unconditionally as soon as the channel is idle.
Non-Persistent: It is the access mode of CSMA that defines before transmitting the
data, each node must sense the channel, and if the channel is inactive, it immediately
sends the data. Otherwise, the station must wait for a random time (not continuously),
and when the channel is found to be idle, it transmits the frames.
CSMA/ CA
Ethernet
Advantages of Ethernet
o The most recent form of gigabit ethernet and remote ethernet can possibly
communicate information at the speed of 1-100Gbps.
Disadvantages of Ethernet
o o It needs deterministic help; hence, it isn't viewed as the best for
constant applications.
o o The wired Ethernet network limits you concerning distances, and it is
best for involving in brief distances.
o o If you make a wired ethernet network that necessities links, centers,
switches, switches, they increment the expense of establishment.
o o Data needs speedy exchange in an intuitive application, as well as
information is tiny.
o o In ethernet organization, any recognize isn't sent by collector
subsequent to tolerating a parcel.
o o If you are wanting to set up a remote Ethernet organization, it tends to
be troublesome in the event that you have no involvement with the
organization field.
o o Comparing with the wired Ethernet organization, remote organization
isn't safer.
o o The full-duplex information correspondence mode isn't upheld by the
100Base-T4 adaptation.
o o Additionally, finding an issue is undeniably challenging in an Ethernet
organization (if has), as it isn't not difficult to figure out which hub or link is
causing the issue.
Collision-Free Protocols:
In PC organizations, when more than one station attempts to send all the while by
means of a common channel, the sent information is jumbled. This occasion is called
impact. The Medium Access Control (Macintosh) layer of the OSI model is
answerable for dealing with impact of casings. Crash - free conventions are conceived
with the goal that impacts don't happen. Conventions like CSMA/Disc and
CSMA/CA invalidates the chance of crashes once the transmission channel is gained
by any station. Be that as it may, impact can in any case happen during the conflict
time frame in the event that more than one stations begins to communicate
simultaneously. Crash - free conventions settle impact in the dispute period thus the
potential outcomes of impacts are killed.Types of Collision – free Protocols
In bit map protocol, the contention period is divided into N slots, where N is the total
number of stations sharing the channel. If a station has a frame to send, it sets the
corresponding bit in the slot. So, before transmission, each station knows whether the
other stations want to transmit. Collisions are avoided by mutual agreement among
the contending stations on who gets the channel.
Binary Countdown
This protocol overcomes the overhead of 1 bit per station of the bit – map protocol.
Here, binary addresses of equal lengths are assigned to each station. For example, if
there are 6 stations, they may be assigned the binary addresses 001, 010, 011, 100,
101 and 110. All stations wanting to communicate broadcast their addresses. The
station with higher address gets the higher priority for transmitting.
In adaptive tree walk protocol, the stations or nodes are arranged in the form of a
binary tree as follows -
Initially all nodes (A, B ……. G, H) are permitted to compete for the channel. If a
node is successful in acquiring the channel, it transmits its frame. In case of collision,
the nodes are divided into two groups (A, B, C, D in one group and E, F, G, H in
another group). Nodes belonging to only one of them is permitted for competing. This
process continues until successful transmission occurs.
Wireless LAN
Wireless LAN stands for Wireless Local Area Network. It is also called LAWN
(Local Area Wireless Network). WLAN is one in which a mobile user can connect
to a Local Area Network (LAN) through a wireless connection.
The IEEE 802.11 group of standards defines the technologies for wireless LANs. For
path sharing, 802.11 standard uses the Ethernet protocol and CSMA/CA (carrier sense
multiple access with collision avoidance). It also uses an encryption method i.e. wired
equivalent privacy algorithm.
Wireless LANs provide high speed data communication in small areas such as
building or an office. WLANs allow users to move around in a confined area while
they are still connected to the network.
In some instance wireless LAN technology is used to save costs and avoid laying
cable, while in other cases, it is the only option for providing high-speed internet
access to the public. Whatever the reason, wireless solutions are popping up
everywhere.
Advantages of WLANs
Disadvantages of WLANs
Switching
o When a user accesses the internet or another computer network outside their
immediate location, messages are sent through the network of transmission
media. This technique of transferring the information from one computer
network to another network is known as switching.
o Switching in a computer network is achieved by using switches. A switch is a
small hardware device which is used to join multiple computers together with
one local area network (LAN).
o Network switches operate at layer 2 (Data link layer) in the OSI model.
o Switching is transparent to the user and does not require any configuration in
the home network.
o Switches are used to forward the packets based on MAC addresses.
o A Switch is used to transfer the data only to the device that has been
addressed. It verifies the destination address to route the packet appropriately.
o It is operated in full duplex mode.
Advantages of Switching:
o There will be less edge impact as switch makes the crash area for every
association.
.Disadvantages of Switching:
o A Switch can't decide the organization network issues without any problem.
o Proper planning and design of the switch are expected to deal with multicast
parcels.
Similar to other wireless services, wireless broadband can be either fixed or mobile.
Features of WiBB
Types of WiBB
Fixed WiBB provides wireless Internet services for devices located in more or less
fixed locations, like homes and offices. The services are comparable to those
provided through digital subscriber line (DSL) or cable modem, with the difference
that it has wireless mode of transmission.
Mobile WiBB, also called mobile broadband, provides high – speed broadband the
connection from mobile phone service providers which is accessible from random
locations. The locations are within the coverage area of the phone towers of mobile
service provider and the connections are subject to monthly service plan subscribed
by the user. Mobile broadband can be costlier due to its portability. Also, they
generally have varying or limited speed except in urban areas.
Bluetooth:
Bluetooth wireless technology is a short-range communications technology intended
to replace the cables connecting portable unit and maintaining high levels of security.
Bluetooth technology is based on Ad-hoc technology also known as Ad-hoc Pico
nets, which is a local area network with a very limited coverage.
WLAN technology enables device connectivity to infrastructure-based services
through a wireless carrier provider. The need for personal devices to communicate
wirelessly with one another without an established infrastructure has led to the
emergence of Personal Area Networks (PANs).
Bluetooth specification details the entire protocol stack. Bluetooth employs Radio
Frequency (RF) for communication. It makes use of frequency modulation to
generate radio waves in the ISM band.
The usage of Bluetooth has widely increased for its special features.
• Bluetooth offers a uniform design for a great many gadgets to interface and
speak with one another.
• Bluetooth innovation has accomplished worldwide acknowledgment to such
an extent that any Bluetooth empowered gadget, wherever on the planet, can be
associated with Bluetooth empowered gadgets.
• Low power utilization of Bluetooth innovation and an offered scope of up to
ten meters has made ready for a few use models.
• Bluetooth offers intelligent gathering by laying out an adhoc organization of
PCs.
• Bluetooth use model incorporates cordless PC, radio, cordless telephone, and
cell phones.
UNIT-III
Network Layer
o It handles the assistance demands from the vehicle layer and further advances
the help solicitation to the information interface layer.
o It decides the course from the source to the objective and furthermore deals
with the traffic issues like exchanging, directing and controls the blockage of
information parcels.
o The principal job of the organization layer is to move the parcels from sending
host to the getting host.
Design Issues in Network Layer
Network layer is majorly focused on getting packets from the source to the
destination, routing error handling and congestion control.
Before learning about design issues in the network layer, let’s learn about it’s
various functions.
Addressing:
Maintains the address at the frame header of both source and destination and
performs addressing to detect various devices in network.
Packeting:
This is performed by Internet Protocol. The network layer converts the packets
from its upper layer.
Routing:
It is the most important functionality. The network layer chooses the most
relevant and best path for the data transmission from source to destination.
Inter-networking:
It works to deliver a logical connection across multiple devices.
Network layer design issues:
The network layer comes with some design issues they are described as follows:
Routing algorithm
o To move the bundles from source to the objective, the organization layer
should decide the best course through which parcels can be communicated.
o The directing convention is a steering calculation that gives the best way from
the source to the objective. The best way is the way that has the "smallest expense
way" from source to the objective.
o Routing is the most common way of sending the parcels from source to the
objective however the best course to send the not entirely settled by the directing
calculation.Classification of a Routing algorithm
Flooding: In case of flooding, every incoming packet is sent to all the outgoing links
except the one from it has been reached. The disadvantage of flooding is that node
may contain several copies of a particular packet.
Random walks: In case of random walks, a packet sent by the node to one of its
neighbors randomly. An advantage of using random walks is that it uses the
alternative routes very efficiently.
Multicast:
Multicast refers to a type of network communication where data is sent from one
source to multiple recipients simultaneously. In a multicast communication, the
sender sends a single copy of data, and the data is then replicated and forwarded by
the network infrastructure to multiple recipients who are interested in receiving the
data. This contrasts with unicast communication, where data is sent from one source
to a single recipient.
o Knowledge about the whole network: Each router shares its knowledge
through the entire network. The Router sends its collected knowledge about
the network to its neighbors.
o Routing only to neighbors: The router sends its knowledge about the network
to only those routers which have direct links. The router sends whatever it has
about the network through the ports. The information is received by the router
and uses the information to update its own routing table.
o Information sharing at regular intervals: Within 30 seconds, the router sends
the information to the neighboring routers.
Let dx(y) be the cost of the least-cost path from node x to node y. The least costs are
related by Bellman-Ford equation,
Where the minv is the equation taken for all x neighbors. After traveling from x to v,
if we consider the least-cost path from v to y, the path cost will be c(x,v)+dv(y). The
least cost from x to y is the minimum of c(x,v)+dv(y) taken over all neighbors.
With the Distance Vector Routing algorithm, the node x contains the following
routing information:
o For each neighbor v, the cost c(x,v) is the path cost from x to directly attached
neighbor, v.
o The distance vector x, i.e., Dx = [ Dx(y) : y in N ], containing its cost to all
destinations, y, in N.
o The distance vector of each of its neighbors, i.e., Dv = [ Dv(y) : y in N ] for
each neighbor v of x.
Distance vector routing is an asynchronous algorithm in which node x sends the copy
of its distance vector to all its neighbors. When node x receives the new distance
vector from one of its neighboring vector, v, it saves the distance vector of v and uses
the Bellman-Ford equation to update its own distance vector. The equation is given
below:
The node x has updated its own distance vector table by using the above equation and
sends its updated table to all its neighbors so that they can update their own distance
vectors.
Algorithm
At each node x,
Initialization
for each y in N:
Dx(y) = minv{c(x,v)+Dv(y)}
NOTE: In Distance vector algorithm, node x update its table when it either see any
cost change in one directly linked nodes orreceives any vector update from some
neighbor.
Sharing Information
o In the above figure, each cloud represents the network, and the number inside
the cloud represents the network ID.
o All the LANs are connected by routers, and they are represented in boxes
labeled as A, B, C, D, E, F.
o Distance vector routing algorithm simplifies the routing process by assuming
the cost of every link is one unit. Therefore, the efficiency of transmission can
be measured by the number of links to reach the destination.
o In Distance vector routing, the cost is based on hop count.
In the above figure, we observe that the router sends the knowledge to the immediate
neighbors. The neighbors add this knowledge to their own knowledge and sends the
updated table to their own neighbors. In this way, routers get its own information plus
the new information about the neighbors.
Routing Table
Initially, the routing table is created for each router that contains atleast three types of
information such as Network ID, the cost and the next hop.
o NET ID: The Network ID defines the final destination of the packet.
o Cost: The cost is the number of hops that packet must take to get there.
o Next hop: It is the router to which the packet must be delivered.
o In the above figure, the original routing tables are shown of all the routers. In a
routing table, the first column represents the network ID, the second column
represents the cost of the link, and the third column is empty.
o These routing tables are sent to all the neighbors.
For Example:
o When A receives a routing table from B, then it uses its information to update
the table.
o The routing table of B shows how the packets can move to the networks 1 and
4.
o The B is a neighbor to the A router, the packets from A to B can reach in one
hop. So, 1 is added to all the costs given in the B's table and the sum will be
the cost to reach a particular network.
o After adjustment, A then combines this table with its own table to create a
combined table.
o The combined table may contain some duplicate data. In the above figure, the
combined table of router A contains the duplicate data, so it keeps only those
data which has the lowest cost. For example, A can send the data to network 1
in two ways. The first, which uses no next router, so it costs one hop. The
second requires two hops (A to B, then B to Network 1). The first option has
the lowest cost, therefore it is kept and the second one is dropped.
o The process of creating the routing table continues for all routers. Every router
receives the information from the neighbors, and update the routing table.
Link state routing is a technique in which each router shares the knowledge of its
neighborhood with every other router in the internetwork.
The three keys to understand the Link State Routing algorithm:
Reliable Flooding
Route Calculation
Each node uses Dijkstra's algorithm on the graph to calculate the optimal routes to all
nodes.
o The Link state routing algorithm is also known as Dijkstra's algorithm which
is used to find the shortest path from one node to every other node in the
network.
o The Dijkstra's algorithm is an iterative, and it has the property that after
kth iteration of the algorithm, the least cost paths are well known for k
destination nodes.
o c( i , j): Link cost from node i to node j. If i and j nodes are not directly linked,
then c(i , j) = ∞.
o D(v): It defines the cost of the path from source code to destination v that has
the least cost currently.
o P(v): It defines the previous node (neighbor of v) along with current least cost
path from source to v.
o N: It is the total number of nodes available in the network.
Algorithm
Initialization
if v adjacent to A
Add w to N
In the above algorithm, an initialization step is followed by the loop. The number of
times the loop is executed is equal to the total number of nodes available in the
network.
EXAMPLE:
In the above figure, source vertex is A.
Step 1:
The first step is an initialization step. The currently known least cost path from A to
its directly attached neighbors, B, C, D are 2,5,1 respectively. The cost from A to B is
set to 2, from A to D is set to 1 and from A to C is set to 5. The cost from A to E and
F are set to infinity as they are not directly linked to A.
Step 2:
In the above table, we observe that vertex D contains the least cost path in step 1.
Therefore, it is added in N. Now, we need to determine a least-cost path through D
vertex.
1. v = B, w = D
2. D(B) = min( D(B) , D(D) + c(D,B) )
3. = min( 2, 1+2)>
4. = min( 2, 3)
5. The minimum value is 2. Therefore, the currently shortest path from A to B is 2.
1. v = C, w = D
2. D(B) = min( D(C) , D(D) + c(D,C) )
3. = min( 5, 1+3)
4. = min( 5, 4)
5. The minimum value is 4. Therefore, the currently shortest path from A to C is 4.</p>
1. v = E, w = D
2. D(B) = min( D(E) , D(D) + c(D,E) )
3. = min( ∞, 1+1)
4. = min(∞, 2)
5. The minimum value is 2. Therefore, the currently shortest path from A to E is 2.
Step 3:
In the above table, we observe that both E and B have the least cost path in step 2.
Let's consider the E vertex. Now, we determine the least cost path of remaining
vertices through E.
a) Calculating the shortest path from A to B.
1. v = B, w = E
2. D(B) = min( D(B) , D(E) + c(E,B) )
3. = min( 2 , 2+ ∞ )
4. = min( 2, ∞)
5. The minimum value is 2. Therefore, the currently shortest path from A to B is 2.
1. v = C, w = E
2. D(B) = min( D(C) , D(E) + c(E,C) )
3. = min( 4 , 2+1 )
4. = min( 4,3)
5. The minimum value is 3. Therefore, the currently shortest path from A to C is 3.
1. v = F, w = E
2. D(B) = min( D(F) , D(E) + c(E,F) )
3. = min( ∞ , 2+2 )
4. = min(∞ ,4)
5. The minimum value is 4. Therefore, the currently shortest path from A to F is 4.
Step 4:
In the above table, we observe that B vertex has the least cost path in step 3.
Therefore, it is added in N. Now, we determine the least cost path of remaining
vertices through B.
1. v = C, w = B
2. D(B) = min( D(C) , D(B) + c(B,C) )
3. = min( 3 , 2+3 )
4. = min( 3,5)
5. The minimum value is 3. Therefore, the currently shortest path from A to C is 3.
1. v = F, w = B
2. D(B) = min( D(F) , D(B) + c(B,F) )
3. = min( 4, ∞)
4. = min(4, ∞)
5. The minimum value is 4. Therefore, the currently shortest path from A to F is 4.
Step 5:
In the above table, we observe that C vertex has the least cost path in step 4.
Therefore, it is added in N. Now, we determine the least cost path of remaining
vertices through C.
1. v = F, w = C
2. D(B) = min( D(F) , D(C) + c(C,F) )
3. = min( 4, 3+5)
4. = min(4,8)
5. The minimum value is 4. Therefore, the currently shortest path from A to F is 4.
5 ADEB 4,E
C
Final table:
5 ADEB 4,E
C
6 ADEB
CF
Disadvantage:
Heavy traffic is created in Line state routing due to Flooding. Flooding can cause an
infinite looping, this problem can be solved by using Time-to-leave field
FLOODING:
For example, let us consider the network in the figure, having six routers that are
connected through transmission lines.
Types of Flooding
Advantages of Flooding
Limitations of Flooding
It is wasteful if a single destination needs the packet, since it delivers the data
packet to all nodes irrespective of the destination.
The network may be clogged with unwanted and duplicate data packets. This
may hamper delivery of other data packets.
Hierarchical routing
In progressive directing, the switches are separated into districts. Every switch has
total insights regarding how to course bundles to objections inside its own district. Be
that as it may, it has no clue about the interior construction of different locales.
As we probably are aware, in both LS and DV calculations, each switch needs to save
some data about different switches. At the point when organization size is developing,
the quantity of switches in the organization will increment. Accordingly, the size of
steering table increments, then, at that point, switches can't deal with network traffic
as effectively. To beat this issue we are utilizing progressive directing.
In progressive directing, switches are ordered in bunches called districts. Every switch
has data about the switches in its own district and it has no data about switches in
different areas. Along these lines, switches save one record in their table for each and
every other locale.
For gigantic organizations, a two-level order might be inadequate subsequently, it
could be important to bunch the locales into bunches, the groups into zones, the zones
into gatherings, etc.Example
Let see the full routing table for router 1A which has 17 entries, as shown below −
1A - -
1B 1B 1
1C 1C 1
2A 1B 2
2B 1B 3
2C 1B 3
2D 1B 4
3A 1C 3
3B 1C 2
4A 1C 3
4B 1C 4
Dest. Line Hops
4C 1C 4
5A 1C 4
5B 1C 5
5C 1B 5
5D 1C 6
5E 1C 5
When routing is done hierarchically then there will be only 7 entries as shown below
−
1A - -
1B 1B 1
1C 1C 1
2 1B 2
3 1C 2
4 1C 3
5 1C 4
Unfortunately, this reduction in table space comes with the increased path length.
Explanation
Step 1 − For example, the best path from 1A to 5C is via region 2, but hierarchical
routing of all traffic to region 5 goes via region 3 as it is better for most of the other
destinations of region 5.
Step 2 − Consider a subnet of 720 routers. If no hierarchy is used, each router will
have 720 entries in its routing table.
Step 3 − Now if the subnet is partitioned into 24 regions of 30 routers each, then each
router will require 30 local entries and 23 remote entries for a total of 53 entries.
Example
If the same subnet of 720 routers is partitioned into 8 clusters, each containing 9
regions and each region containing 10 routers. Then what will be the total number of
table entries in each router.
Solution
Broadcast
Leaky Bucket
The leaky bucket algorithm discovers its use in the context of network traffic shaping
or rate-limiting. The algorithm allows controlling the rate at which a record is
injected into a network and managing burstiness in the data rate.
A leaky bucket execution and a token bucket execution are predominantly used for
traffic shaping algorithms. This algorithm is used to control the rate at which traffic is
sent to the network and shape the burst traffic to a steady traffic stream.
In this calculation, a can with a volume of, say, b bytes and an opening in the Notes
base is thought of. In the event that the can is invalid, it implies b bytes are accessible
as stockpiling. A parcel with a size more modest than b bytes shows up at the
container and will advance it. On the off chance that the parcel's size increments by
more than b bytes, it will either be disposed of or lined. It is likewise viewed as that
the container spills through the opening in its base at a steady pace of r bytes each
second.
The surge is viewed as consistent when there is any parcel in the container and zero
when it is vacant. This characterizes that assuming information streams into the can
quicker than information streams out through the opening, the pail spills over.
The inconveniences contrasted and the cracked can calculation are the wasteful
utilization of accessible organization assets. The break rate is a decent boundary. On
account of the traffic, volume is inadequate, the enormous area of organization assets,
for example, transmission capacity isn't being utilized successfully. The cracked
container calculation doesn't permit individual streams to burst up to port speed to
successfully consume network assets when there wouldn't be asset dispute in the
organization.
The flawed container calculation has an inflexible result plan at the typical rate free of
the burst traffic. In certain applications, when enormous blasts show up, the result is
permitted to accelerate. This requires a more adaptable calculation, ideally one that
never loses data. Hence, a symbolic can calculation finds its purposes in network
traffic forming or rate-restricting.
A control calculation shows when traffic ought to be sent. This request comes in view
of the presentation of tokens in the container. The container contains tokens. Every
one of the tokens characterizes a bundle of foreordained size. Tokens in the can are
erased for the capacity to share a parcel.
At the point when tokens are shown, a stream to communicate traffic shows up in the
showcase of tokens. No symbolic means no stream sends its parcels. Thus, a stream
moves traffic up to its pinnacle burst rate in great tokens in the pail.
Hence, the symbolic container calculation adds a token to the can every 1/r seconds.
The volume of the pail is b tokens. At the point when a token shows up, and the pail is
finished, the token is disposed of. In the event that a parcel of n bytes shows up and n
tokens are erased from the container, the bundle is sent to the organization.
At the point when a parcel of n bytes shows up however less than n tokens are
accessible. No tokens are taken out from the can in such a case, and the parcel is
considered non-conformant. The non-conformant bundles can either be dropped or
lined for ensuing transmission when adequate tokens have aggregated in the pail.
They can likewise be communicated yet set apart as being non-conformant. The
chance is that they might be dropped thusly assuming the organization is over-burden.
Internetworking
In real world scenario, networks under same administration are generally scattered
geographically. There may exist requirement of connecting two different networks of
same kind as well as of different kinds. Routing between two networks is called
internetworking.
Networks can be considered different based on various parameters such as, Protocol,
topology, Layer-2 network and addressing scheme.
Routing protocols which are used within an organization or administration are called
Interior Gateway Protocols or IGP. RIP, OSPF are examples of IGP. Routing between
different organizations or administrations may have Exterior Gateway Protocol, and
there is only one EGP i.e. Border Gateway Protocol.
Tunneling
If they are two geographically separate networks, which want to communicate with
each other, they may deploy a dedicated line between or they have to pass their data
through intermediate networks.
Both ends seem as if they are directly connected and tagging makes data travel
through transit network without any modifications.
Packet Fragmentation
Most Ethernet sections have their greatest transmission unit (MTU) fixed to 1500
bytes. An information bundle can have pretty much parcel length relying on the
application. Gadgets in the travel way additionally have their equipment and
programming abilities which determine what measure of information that gadget can
deal with and what size of bundle it can process.
Assuming the information bundle size is not exactly or equivalent to the size of parcel
the travel organization can deal with, it is handled impartially. In the event that the
parcel is bigger, it is broken into more modest pieces and sent. This is called bundle
fracture. Each piece contains a similar objective and source address and steered
through travel way without any problem. At the less than desirable end it is gathered
once more.
If a bundle with DF (don't piece) bit set to 1 comes to a switch which can not deal
with the parcel due to its length, the bundle is dropped.When a packet is received by a
router has its MF (more fragments) bit set to 1, the router then knows that it is a
fragmented packet and parts of the original packet is on the way.
On the other hand, IP address on the public domain is rarely changed. If the NIC is
changed in case of some fault, the MAC address also changes. This way, for Layer-2
communication to take place, a mapping between the two is required.
To know the MAC address of remote host on a broadcast domain, a computer wishing
to initiate communication sends out an ARP broadcast message asking, “Who has this
IP address?” Because it is a broadcast, all hosts on the network segment (broadcast
domain) receive this packet and process it. ARP packet contains the IP address of
destination host, the sending host wishes to talk to. When a host receives an ARP
packet destined to it, it replies back with its own MAC address.
Once the host gets destination MAC address, it can communicate with remote host
using Layer-2 link protocol. This MAC to IP mapping is saved into ARP cache of
both sending and receiving hosts. Next time, if they require to communicate, they can
directly refer to their respective ARP cache.
Reverse ARP is a mechanism where host knows the MAC address of remote host but
requires to know IP address to communicate.
Any feedback about network is sent back to the originating host. If some error in the
network occurs, it is reported by means of ICMP. ICMP contains dozens of diagnostic
and error reporting messages.
ICMP-echo and ICMP-echo-reply are the most commonly used ICMP messages to
check the reachability of end-to-end hosts. When a host receives an ICMP-echo
request, it is bound to send back an ICMP-echo-reply. If there is any problem in the
transit network, the ICMP will report that problem.
IPv4 provides hierarchical addressing scheme which enables it to divide the network
into sub-networks, each with well-defined number of hosts. IP addresses are divided
into many categories:
Class A - it uses first octet for network addresses and last three octets for host
addressing
Class B - it uses first two octets for network addresses and last two for host
addressing
Class C - it uses first three octets for network addresses and last one for host
addressing
Class D - it provides flat IP addressing scheme in contrast to hierarchical
structure for above three.
Class E - It is used as experimental.
IPv4 also has well-defined address spaces to be used as private addresses (not
routable on internet), and public addresses (provided by ISPs and are routable on
internet).
Depletion of IPv4 addresses brought forth a cutting edge Web Convention form 6.
IPv6 tends to its hubs with 128-digit wide location giving a lot of address space to
future to be utilized on whole planet or past.
IPv6 has presented Anycast tending to however has eliminated the idea of
broadcasting. IPv6 empowers gadgets to self-gain an IPv6 address and convey inside
that subnet. This auto-design eliminates the trustworthiness of Dynamic Host
Arrangement Convention (DHCP) servers. Along these lines, regardless of whether
the DHCP server on that subnet is down, the hosts can speak with one another.
IPv6 gives new element of IPv6 portability. Versatile IPv6 prepared machines can
meander around without the need of changing their IP addresses.
IPv6 is still experiencing significant change stage and is supposed to supplant IPv4
totally before very long. As of now, there are not many organizations which are
running on IPv6. There are some change components accessible for IPv6 empowered
organizations to talk and meander around various organizations effectively on IPv4.
These are:
The QOS also provides that while supporting priority for one or more flows does not
create other flows fail. A flow can be a combination of source and destination
addresses, source and destination socket numbers, session identifier, or packet from a
specific application or an incoming interface.
The QOS is primarily used to control resources like bandwidth, equipment, wide-area
facilities etc. It can get more efficient use of network resources, provide tailored
services, provide coexistence of mission-critical applications, etc.
QOS Concepts
Congestion Management
The burst feature of data traffic sometimes bounds to increase traffic more than a
connection speed. QoS allows a router to put packets into different queues. Service
specific queues more often depend on priority than buffer traffic in an individual
queue and let the first packet by the first packet out.
Queue Management
The queues in a buffer can fill and overflow. A packet would be dropped if a queue is
complete, and the router cannot prevent it from being dropped if it is a high priority
packet. This is referred to as tail drop.
Link Efficiency
The low-speed links are bottlenecks for lower packets. The serialization delay caused
by the high packets forces the lower packets to wait longer. The serialization delay is
the time created to put a packet on the connection.
Therefore, shaping is used to provide the traffic flow from the high bandwidth link
closer to the low bandwidth link to avoid the low bandwidth link's overflow. Policing
can discard the traffic that exceeds the configured rate, but it is buffered in the case of
shaping.
UNIT-IV
Transport Layer
The services provided by the transport layer are similar to those of the data link layer.
The data link layer provides the services within a single network while the transport
layer provides the services across an internetwork made up of many networks. The
data link layer controls the physical layer while the transport layer controls all the
lower layers.
The services provided by the transport layer protocols can be divided into five
categories:
o End-to-end delivery
o Addressing
o Reliable delivery
o Flow control
o Multiplexing
End-to-end delivery:
The transport layer transmits the entire message to the destination. Therefore, it
ensures the end-to-end delivery of an entire message from a source to the destination.
Reliable delivery:
The transport layer provides reliability services by retransmitting the lost and
damaged packets.
o Error control
o Sequence control
o Loss control
o Duplication control
Error Control
Loss Control
Loss Control is a third aspect of reliability. The transport layer ensures that all the
fragments of a transmission arrive at the destination, not some of them. On the
sending end, all the fragments of transmission are given sequence numbers by a
transport layer. These sequence numbers allow the receiver? transport layer to identify
the missing segment.
Duplication Control
Duplication Control is the fourth aspect of reliability. The transport layer guarantees
that no duplicate data arrive at the destination. Sequence numbers are used to identify
the lost packets; similarly, it allows the receiver to identify and discard duplicate
segments.
Flow Control
Flow control is used to prevent the sender from overwhelming the receiver. If the
receiver is overloaded with too much data, then the receiver discards the packets and
asking for the retransmission of packets. This increases network congestion and thus,
reducing the system performance. The transport layer is responsible for flow control.
It uses the sliding window protocol that makes the data transmission more efficient as
well as it controls the flow of data so that the receiver does not become overwhelmed.
Sliding window protocol is byte oriented rather than frame oriented.
Multiplexing
o According to the layered model, the transport layer interacts with the functions
of the session layer. Many protocols combine session, presentation, and
application layer protocols into a single layer known as the application layer.
In these cases, delivery to the session layer means the delivery to the
application layer. Data generated by an application on one machine must be
transmitted to the correct application on another machine. In this case,
addressing is provided by the transport layer.
o The transport layer provides the user address which is specified as a station or
port. The port variable represents a particular TS user of a specified station
known as a Transport Service access point (TSAP). Each station has only one
transport entity.
o The transport layer protocols need to know which upper-layer protocols are
communicating.
TCP Connection Management
The other side performs a connect primitive specifying the I/O port to which it wants
to join. The maximum TCP segment size available, other options are optionally like
some private data (example password).
The CONNECT primitive transmits a TCP segment with the SYN bit on and the
ACK bit off and waits for a response.
The sequence of TCP segments sent in the typical case, as shown in the figure below
−
When the segment sent by Host-1 reaches the destination, i.e., host -2, the receiving
server checks to see if there is a process that has done a LISTEN on the port given in
the destination port field. If not, it sends a response with the RST bit on to refuse the
connection. Otherwise, it governs the TCP segment to the listing process, which can
accept or decline (for example, if it does not look similar to the client) the connection.
Call Collision
On the off chance that two hosts attempt to lay out an association all the while
between similar two attachments, then the occasions grouping is shown in the figure
under such conditions. Just a single association is laid out. It can't choose both the
connections on the grounds that their endpoints recognize associations.
Assume the principal set up brings about an association recognized by (x, y) and the
subsequent association are likewise delivered up. All things considered, just tail enter
will be made, i.e., for (x, y) for the underlying grouping number, a clock-based
conspire is utilized, with a clock heartbeat coming after each 4 microseconds. For
guaranteeing extra wellbeing when a host crashes, it may not reboot for sec, which is
the most extreme bundle lifetime. This is to ensure that no parcels from past
associations are wandering near.
UDP
o Source port address: It defines the address of the application process that has
delivered a message. The source port address is of 16 bits address.
o Destination port address: It defines the address of the application process that
will receive the message. The destination port address is of a 16-bit address.
o Total length: It defines the total length of the user datagram in bytes. It is a 16-
bit field.
o Checksum: The checksum is a 16-bit field which is used in error detection.
o UDP can find that a blunder has happened, yet it doesn't indicate which bundle
has been lost as it doesn't contain an ID or sequencing number of a specific
information portion.
TCP
The getting TCP utilizes the succession number to reassemble the sections
assuming they show up mixed up or to dispose of the copy portions.
o Full Duplex: TCP offers Full Duplex assistance, i.e., the information
stream in both the bearings simultaneously. To accomplish Full Duplex help,
every TCP ought to have sent and getting cushions with the goal that the
portions can stream in both the headings. TCP is an association situated
convention. Assume the cycle A needs to send and get the information from
process B. The accompanying advances happen:
Where,
o Source port address: It is used to define the address of the application program
in a source computer. It is a 16-bit field.
o Destination port address: It is used to define the address of the application
program in a destination computer. It is a 16-bit field.
o Sequence number: A stream of data is divided into two or more TCP
segments. The 32-bit sequence number field represents the position of the data
in an original data stream.
o Acknowledgement number: A 32-field acknowledgement number
acknowledge the data from other communicating devices. If ACK field is set
to 1, then it specifies the sequence number that the receiver is expecting to
receive.
o Header Length (HLEN): It specifies the size of the TCP header in 32-bit
words. The minimum size of the header is 5 words, and the maximum size of
the header is 15 words. Therefore, the maximum size of the TCP header is 60
bytes, and the minimum size of the TCP header is 20 bytes.
o Reserved: It is a six-bit field which is reserved for future use.
o Control bits: Each bit of a control field functions individually and
independently. A control bit defines the use of a segment or serves as a
validity check for other fields.
o URG: The URG field indicates that the data in a segment is urgent.
o ACK: When ACK field is set, then it validates the acknowledgement number.
o PSH: The PSH field is used to inform the sender that higher throughput is
needed so if possible, data must be pushed with higher throughput.
o RST: The reset bit is used to reset the TCP connection when there is any
confusion occurs in the sequence numbers.
o SYN: The SYN field is used to synchronize the sequence numbers in three
types of segments: connection request, connection confirmation ( with the
ACK bit set ), and confirmation acknowledgement.
o FIN: The FIN field is used to inform the receiving TCP module that the sender
has finished sending data. It is used in connection termination in three types of
segments: termination request, termination confirmation, and
acknowledgement of termination confirmation.
o Window Size: The window is a 16-bit field that defines the size of the
window.
o Checksum: The checksum is a 16-bit field used in error detection.
o Urgent pointer: If URG flag is set to 1, then this 16-bit field is an offset
from the sequence number indicating that it is a last urgent data byte.
o Options and padding: It defines the optional fields that convey the
additional information to the receiver.
APPLICATION LAYER
Application layer:
The application layer in the OSI model is the closest layer to the end user which
means that the application layer and end user can interact directly with the software
application. The application layer programs are based on client and servers.
DNS:
o DNS is a directory service that provides a mapping between the name of a host
on the network and its numerical address.
o DNS is required for the functioning of the internet.
o Each node in a tree has a domain name, and a full domain name is a sequence
of symbols specified by dots.
o DNS is a service that translates the domain name into IP addresses. This
allows the users of networks to utilize user-friendly names when looking for
other hosts instead of remembering the IP addresses.
o For example, suppose the FTP site at Edu Soft had an IP address of
132.147.165.50, most people would reach this site by specifying
ftp.EduSoft.com. Therefore, the domain name is more reliable than IP address.
DNS is a TCP/IP protocol used on different platforms. The domain name space is
divided into three different sections: generic domains, country domains, and inverse
domain.
Generic Domains -
o Each node in a tree defines the domain name, which is an index to the DNS
database.
o It uses three-character labels, and these labels describe the organization type.
Country Domain -
The format of country domain is same as a generic domain, but it uses two-character
country abbreviations (e.g., us for the United States) in place of three-character
organizational abbreviations.
Inverse Domain -
The inverse domain is used for mapping an address to a name. When the server has
received a request from the client, and the server contains the files of only authorized
clients. To determine whether the client is on the authorized list or not, it sends a
query to the DNS server and ask for mapping an address to the name.
Working of DNS
SNMP:
SNMP types:
E-mail:
The email was created to help rich message with custom organizing, and the first
email standard is just equipped for supporting plain instant messages. In current
times, email upholds HTML (Hypertext markup language), which makes it fit for
messages to help similar arranging as sites. The email that upholds HTML can
contain joins, pictures, CSS formats, and furthermore can send records or "email
connections" alongside messages. The majority of the mail servers empower
clients to send a few connections with each message. The connections were
ordinarily restricted to one megabyte in the beginning of email. All things
considered, these days, many mail servers can uphold email connections of 20
megabytes or more in size.
Basic Functions:
The E-mail system supports five basic systems, which are as follows:
Composition -
The process of generating messages and answering them is called composition. The
system can also support assistance with addressing and several header fields attached
to each message.
Transfer -
It is the process of moving messages from the sender to the recipient. This includes
establishing a connection from the sender to a destination or some intermediate
machine, outputting the message and releasing the connection.
Reporting -
This is to tell the sender whether the message was delivered or rejected, or lost.
Displaying -
Disposition -
This is concerned with what the recipient does with the messages after receiving
them. Some of the possibilities are as follows −
Advantages of Email -
So, the web provides a communication platform for users to retrieve and exchange
information over the internet. Unlike a book, where we move from one page to
another in a sequence, on World Wide Web we follow a web of hypertext links to
visit a web page and from that web page to move to other web pages. You need a
browser, which is installed on your computer, to access the Web.
Every one of the sites are put away in web servers. Similarly as somebody lives on
lease in a house, a site consumes a space in a server and remains put away in it. The
server has the site at whatever point a client demands its Pages, and the site proprietor
needs to follow through on the facilitating cost for something similar.
The second you open the program and type a URL in the location bar or search
something on Google, the WWW begins working. There are three fundamental
advancements engaged with moving data (pages) from servers to clients (PCs of
clients). These advancements incorporate Hypertext Markup Language (HTML),
Hypertext Move Convention (HTTP) and Internet browsers.
HTTP:
o HTTP is like SMTP as the information is moved among client and server. The
HTTP contrasts from the SMTP in the manner the messages are sent from the
client to the server and from server to the client. SMTP messages are put away
and sent while HTTP messages are conveyed right away.
Features of HTTP:
o The above figure shows the HTTP transaction between client and server. The
client initiates a transaction by sending a request message to the server. The
server replies to the request message by sending a response message.
Messages
HTTP messages are of two types: request and response. Both the message types
follow the same message format.
Request Message: The request message is sent by the client that consists of a request
line, headers, and sometimes a body.
Response Message: The response message is sent by the server to the client that
consists of a status line, headers, and sometimes a body.
SMTP:
o It gives a mail trade between clients on the equivalent or various PCs, and it
likewise upholds:
o First, we will break the SMTP client and SMTP server into two components
such as user agent (UA) and mail transfer agent (MTA). The user agent (UA)
prepares the message, creates the envelope and then puts the message in the
envelope. The mail transfer agent (MTA) transfers this mail across the
internet.
o SMTP allows a more complex system by adding a relaying system. Instead of
just having one MTA at sending side and one at receiving side, more MTAs
can be added, acting either as a client or server to relay the email.
o The relaying system without TCP/IP protocol can also be used to send the
emails to users, and this is achieved using the mail gateway. The mail gateway
is a relay MTA that can be used to receive an email.
Working of SMTP -
On the off chance that the space name of the beneficiary's email address is not quite
the same as the shipper's area name, then MSA will send the mail to the Mail Move
Specialist (MTA). To hand-off the email, the MTA will track down the objective area.
It checks the MX record from Area Name Framework to acquire the objective space.
The MX record contains the area name and IP address of the beneficiary's space.
When the record is found, MTA associates with the trade server to transfer the
message.
4. Receipt and Handling of Mail: When the approaching message is gotten, the
trade server conveys it to the approaching server (Mail Conveyance Specialist) which
stores the email where it trusts that the client will recover it.
5. Access and Recovery of Mail: The put away email in MDA can be recovered
by utilizing MUA (Mail Client Specialist). MUA can be gotten to by utilizing login
and secret key.
.FTP:
Objectives of FTP -
Mechanism of FTP -
o The above figure shows the basic model of the FTP. The FTP client has three
components: the user interface, control process, and data transfer process. The
server has two components: the server control process and the server data
transfer process.
o Control Connection: The control connection uses very simple rules for
communication. Through control connection, we can transfer a line of
command or line of response at a time. The control connection is made
between the control processes. The control connection remains connected
during the entire interactive FTP session.
o Data Connection: The Data Connection uses very complex rules as data types
may vary. The data connection is made between data transfer processes. The
data connection opens when a command comes for transferring the files and
closes when the file is transferred.
FTP Clients -
o It permits a client to interface with a remote host and transfer or download the
records.
o It has a bunch of orders that we can use to interface with a host, move the
records among you and your host and close the association.
.Advantages of FTP -
o Speed: One of the best advantages of FTP is speed. The FTP is one of the
speediest technique for moving the records beginning with one PC then onto the
following PC.
o Security: To get to the FTP server, we truly need to login with the username
and secret expression. Thusly, we can say that FTP is more secure.
o Back and forward improvement: FTP licenses us to move the reports back and
forth. Expect you are an overseer of the association, you send an information to all of
the specialists, and they all send information back on a comparative server.
.
.Disadvantages of FTP -