Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
2 views

computer networks notes

The document outlines various types of networks including Personal Area Network (PAN), Local Area Network (LAN), Metropolitan Area Network (MAN), and Wide Area Network (WAN), each with distinct advantages and disadvantages. It also describes the OSI model, detailing its seven layers and their functions, as well as comparing it to the TCP/IP model. Additionally, the document covers transmission media types, including guided and unguided media, and introduces the concept of switching in networking.

Uploaded by

abhijitjha1901
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views

computer networks notes

The document outlines various types of networks including Personal Area Network (PAN), Local Area Network (LAN), Metropolitan Area Network (MAN), and Wide Area Network (WAN), each with distinct advantages and disadvantages. It also describes the OSI model, detailing its seven layers and their functions, as well as comparing it to the TCP/IP model. Additionally, the document covers transmission media types, including guided and unguided media, and introduces the concept of switching in networking.

Uploaded by

abhijitjha1901
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 29

TYPES OF NETWORK

Personal Area Network (PAN)-

PAN is a personal area network having an interconnection of personal technology devices to


communicate over a short distance. It covers only less than 10 meters or 33 feet of area. PAN has
fewer users as compared to other networks such as LAN, WAN, etc. PAN typically uses some form
of wireless technology. PAN involves the transmission of data between information devices such
as smartphones, personal computers, tablet computers, etc.

Advantages:
 Allows for easy communication between personal devices in close proximity.
 Can be set up easily and quickly.
 Uses wireless technology, which eliminates the need for wires and cables.
Disadvantages:
 Limited coverage area.
 May not be suitable for large-scale data transfer

Local Area Network (LAN) –

LAN or Local Area Network connects network devices in such a way that personal computers
and workstations can share data, tools, and programs. The group of computers and devices are
connected together by a switch, or stack of switches, using a private addressing scheme as
defined by the TCP/IP protocol. Private addresses are unique in relation to other computers on
the local network. Routers are found at the boundary of a LAN, connecting them to the larger
WAN.

Advantages:
 Provides fast data transfer rates and high-speed communication.
 Easy to set up and manage.
 Can be used to share peripheral devices such as printers and scanners.
 Provides increased security and fault tolerance compared to WANs.
Disadvantages:
 Limited geographical coverage.
 Limited scalability and may require significant infrastructure upgrades to accommodate
growth.
 May experience congestion and network performance issues with increased usage.

Metropolitan Area Network (MAN) –

MAN or Metropolitan area Network covers a larger area than that covered by a LAN and a smaller
area as compared to WAN. MAN has a range of 5-50km. It connects two or more computers that
are apart but reside in the same or different cities. It covers a large geographical area and may serve
as an ISP (Internet Service Provider). MAN is designed for customers who need high-speed
connectivity. Speeds of MAN range in terms of Mbps. It’s hard to design and maintain a Metropolitan
Area Network.
Advantages:
 Provides high-speed connectivity over a larger geographical area than LAN.
 Can be used as an ISP for multiple customers.
 Offers higher data transfer rates than WAN in some cases.
Disadvantages:
 Can be expensive to set up and maintain.
 May experience congestion and network performance issues with increased usage.
 May have limited fault tolerance and security compared to LANs.

Wide Area Network (WAN) –

WAN or Wide Area Network is a computer network that extends over a large geographical area,
although it might be confined within the bounds of a state or country. WAN has a range of above
50 km. A WAN could be a connection of LAN connecting to other LANs via telephone lines and
radio waves. The technology is high-speed and relatively expensive.

Advantages:
 Covers large geographical areas and can connect remote locations.
 Provides connectivity to the internet.
Disadvantages:
 Can be expensive to set up and maintain.
 Offers slower data transfer rates than LAN or MAN.

OSI MODEL

The OSI model, created in 1984 by ISO, is a reference framework that explains the process of
transmitting data between computers. The OSI model consists of seven abstraction layers arranged
in a top-down order:
1. Physical Layer
2. Data Link Layer
3. Network Layer
4. Transport Layer
5. Session Layer
6. Presentation Layer
7. Application Layer
Physical Layer – Layer 1
The lowest layer of the OSI reference model is the physical layer. It is responsible for the actual
physical connection between the devices. The physical layer contains information in the form
of bits. It is responsible for transmitting individual bits from one node to the next. When receiving
data, this layer will get the signal received and convert it into 0s and 1s and send them to the Data
Link layer, which will put the frame back together.

Functions of the Physical Layer


 Bit synchronization: The physical layer provides the synchronization of the bits by
providing a clock. This clock controls both sender and receiver thus providing
synchronization at the bit level.
 Bit rate control: The Physical layer also defines the transmission rate i.e. the number
of bits sent per second.
 Physical topologies: Physical layer specifies how the different, devices/nodes are
arranged in a network i.e. bus, star, or mesh topology.
 Transmission mode: Physical layer also defines how the data flows between the two
connected devices. The various transmission modes possible are Simplex, half-duplex
and full-duplex.
Note:
1. Hub, Repeater, Modem, and Cables are Physical Layer devices.
2. Network Layer, Data Link Layer, and Physical Layer are also known as Lower
Layers or Hardware Layers.
Data Link Layer (DLL) – Layer 2
The data link layer is responsible for the node-to-node delivery of the message. The main function
of this layer is to make sure data transfer is error-free from one node to another, over the physical
layer. When a packet arrives in a network, it is the responsibility of the DLL to transmit it to the Host
usingits MACaddress.
The Data Link Layer is divided into two sublayers:
1. Logical Link Control (LLC)
2. Media Access Control (MAC)
The packet received from the Network layer is further divided into frames depending on the frame
size of the NIC(Network Interface Card). DLL also encapsulates Sender and Receiver’s MAC address
in the header.

Functions of the Data Link Layer


 Framing: Framing is a function of the data link layer. It provides a way for a sender to
transmit a set of bits that are meaningful to the receiver. This can be accomplished by
attaching special bit patterns to the beginning and end of the frame.
 Physical addressing: After creating frames, the Data link layer adds physical
addresses (MAC addresses) of the sender and/or receiver in the header of each frame.
 Error control: The data link layer provides the mechanism of error control in which it
detects and retransmits damaged or lost frames.
 Flow Control: The data rate must be constant on both sides else the data may get
corrupted
 Access control: When a single communication channel is shared by multiple devices,
the MAC sub-layer of the data link layer helps to determine which device has control
over the channel at a given time’

Note:
1. Packet in the Data Link layer is referred to as Frame.
2. Data Link layer is handled by the NIC (Network Interface Card) and device drivers of
host machines.
3. Switch & Bridge are Data Link Layer devices.

Network Layer – Layer 3


The network layer works for the transmission of data from one host to the other located in different
networks. It also takes care of packet routing i.e. selection of the shortest path to transmit the packet,
from the number of routes available. The sender & receiver’s IP addresses are placed in the header
by the network layer.
Functions of the Network Layer
 Routing: The network layer protocols determine which route is suitable from source to
destination. This function of the network layer is known as routing.
 Logical Addressing: To identify each device inter-network uniquely, the network layer
defines an addressing scheme. The sender & receiver’s IP addresses are placed in the
header by the network layer
Note:
1. Segment in the Network layer is referred to as Packet.
2. Network layer is implemented by networking devices such as routers and switches.

Transport Layer – Layer 4


The transport layer provides services to the application layer and takes services from the network
layer. The data in the transport layer is referred to as Segments. It is responsible for the end-to-end
delivery of the complete message. The transport layer also provides the acknowledgment of the
successful data transmission and re-transmits the data if an error is found.
Functions of the Transport Layer
 Segmentation and Reassembly: This layer accepts the message from the (session)
layer, and breaks the message into smaller units.
 Service Point Addressing: To deliver the message to the correct process, the transport
layer header includes a type of address called service point address or port address
Note:
1. Data in the Transport Layer is called Segments.
2. Transport layer is operated by the Operating System. It is a part of the OS and
communicates with the Application Layer by making system calls.
3. The transport layer is called as Heart of the OSI model.
4. Device or Protocol Use : TCP, UDP NetBIOS, PPTP
Session Layer – Layer 5
This layer is responsible for the establishment of connection, maintenance of sessions, and
authentication, and also ensures security.
Functions of the Session Layer
 Session establishment, maintenance, and termination: The layer allows the two
processes to establish, use, and terminate a connection.
 Synchronization: This layer allows a process to add checkpoints that are considered
synchronization points in the data. These synchronization points help to identify the error
so that the data is re-synchronized properly.
 Dialog Controller: The session layer allows two systems to start communication with
each other in half-duplex or full-duplex.

Note:
1. All the below 3 layers(including Session Layer) are integrated as a single layer in
the TCP/IP model as the “Application Layer”.
Presentation Layer – Layer 6
The presentation layer is also called the Translation layer. The data from the application layer is
extracted here and manipulated as per the required format to transmit over the network.
Functions of the Presentation Layer
 Translation: For example, ASCII to EBCDIC.
 Encryption/ Decryption: Data encryption translates the data into another form or
code. The encrypted data is known as the ciphertext and the decrypted data is known
as plain text.
 Compression: Reduces the number of bits that need to be transmitted on the network.
Application Layer – Layer 7
At the very top of the OSI Reference Model stack of layers, we find the
Application layer which is implemented by the network applications.
These applications produce the data to be transferred over the network.
This layer also serves as a window for the application services
Note: 1. The application Layer is also called Desktop Layer.
2. Device or Protocol Use : SMTP
Functions of the Application Layer
The main functions of the application layer are given below.
 Network Virtual Terminal(NVT): It allows a user to log on to a
remote host.
 File transfer access and management(FTAM): This application
allows a user to
access files in a remote host, retrieve files in a remote host,
 Mail Services: Provide email service.
 Directory Services: This application provides distributed
database sources.
Advantages of OSI Model
 It divides network communication into 7 layers which makes it
easier to understand and troubleshoot.
 It standardizes network communications, as each layer has fixed
functions and protocols.
 Diagnosing network problems is easier with the OSI model.
 It is easier to improve with advancements as each layer can get
updates separately.
Differences between OSI Model and TCP/IP Model

Parameters OSI Model TCP/IP Model

TCP/IP stands for Transmission


OSI stands for Open
Full Form Control Protocol/Internet
Systems Interconnection.
Protocol.

Layers It has 7 layers. It has 4 layers.

Usage It is low in usage. It is mostly used.

Approach It is vertically approached. It is horizontally approached.

Delivery of the package is Delivery of the package is not


Delivery
guaranteed in OSI Model. guaranteed in TCP/IP Model.

It is less reliable than It is more reliable than OSI


Reliability
TCP/IP Model. Model

Note: The OSI model acts as a reference model and is not implemented on
the Internet because of its late invention. The current model being used is
the TCP/IP model.
TCP/IP MODEL
TCP/IP was designed and developed by the Department of Defense (DoD) in the 1960s and is based
on standard protocols. It stands for Transmission Control Protocol/Internet Protocol. The TCP/IP
model is a concise version of the OSI model. It contains four layers, unlike the seven layers in the
OSI model.

TRANSMISSION MEDIA
a transmission medium is a physical path between the transmitter and the receiver i.e. it is the
channel through which data is sent from one place to another. Transmission Media is broadly
classified into the following types:

1. Guided Media: It is also referred to as Wired or Bounded transmission media. Signals being
transmitted are directed and confined in a narrow pathway by using physical links.
Features:
 High Speed
 Secure
 Used for comparatively shorter distances
There are 3 major types of Guided Media:

(i) Twisted Pair Cable –


It consists of 2 separately insulated conductor wires wound about each other. Generally, several
such pairs are bundled together in a protective sheath. They are the most widely used
Transmission Media. Twisted Pair is of two types:
 Unshielded Twisted Pair (UTP):
UTP consists of two insulated copper wires twisted around one another.
 Advantages:
 ⇢ Least expensive

 ⇢ Easy to install

 ⇢ High-speed capacity
 Disadvantages:
 ⇢ Susceptible to external interference

 ⇢ Lower capacity and performance in comparison to STP

Applications:
Used in telephone connections and LAN networks

 Shielded Twisted Pair (STP):


This type of cable consists of a special jacket (a copper braid covering or a foil shield)
to block external interference. It is used in fast-data-rate Ethernet and in voice and
data channels of telephone lines.
 Advantages:
 ⇢ Better performance at a higher data rate in comparison to UTP

 ⇢ Eliminates crosstalk

 ⇢ Comparatively faster

 Disadvantages:
 ⇢ Comparatively difficult to install and manufacture

 ⇢ More expensive

 ⇢ Bulky

(ii) Coaxial Cable –


It has an outer plastic covering containing an insulation layer made of PVC or Teflon and 2 parallel
conductors each having a separate insulated protection cover. The coaxial cable transmits
information in two modes: Baseband mode(dedicated cable bandwidth) and Broadband
mode(cable bandwidth is split into separate ranges). Cable TVs and analog television networks
widely use Coaxial cables.

Advantages:
 High Bandwidth
 Better noise Immunity
 Easy to install and expand
 Inexpensive
Disadvantages:
 Single cable failure can disrupt the entire network
(iii) Optical Fiber Cable –
It uses the concept of refraction of light through a core made up of glass or plastic. The core is
surrounded by a less dense glass or plastic covering called the cladding. It is used for the
transmission of large volumes of data.
The cable can be unidirectional or bidirectional. The WDM (Wavelength Division Multiplexer)
supports two modes, namely unidirectional and bidirectional mode.
Advantages:
 Increased capacity and bandwidth
 Lightweight
 Resistance to corrosive materials
Disadvantages:
 Difficult to install and maintain
 High cost
 Fragile
2. Unguided Media:
It is also referred to as Wireless or Unbounded transmission media. No physical medium is
required for the transmission of electromagnetic signals.
Features:
 The signal is broadcasted through air
 Less Secure
 Used for larger distances
There are 3 types of Signals transmitted through unguided media:

(i) Radio waves –


These are easy to generate and can penetrate through buildings. The sending and receiving
antennas need not be aligned. Frequency Range:3KHz – 1GHz. AM and FM radios and cordless
phones use Radio waves for transmission.

Further Categorized as (i) Terrestrial and (ii) Satellite.

(ii) Microwaves –
It is a line of sight transmission i.e. the sending and receiving antennas need to be properly aligned
with each other. The distance covered by the signal is directly proportional to the height of the
antenna. Frequency Range:1GHz – 300GHz. These are majorly used for mobile phone
communication and television distribution.
(iii) Infrared –
Infrared waves are used for very short distance communication. They cannot penetrate
through obstacles. This prevents interference between systems. Frequency Range:300GHz
– 400THz. It is used in TV remotes, wireless mouse, keyboard, printer, etc.

SWITCHING
In computer networking, Switching is the process of transferring data packets from one device to
another in a network, or from one network to another, using specific devices called switches.
Switching takes place at the Data Link layer of the OSI Model
Types of Switching
There are three types of switching methods:
 Message Switching
 Circuit Switching
 Packet Switching
 Datagram Packet Switching
 Virtual Circuit Packet Switching
 Message Switching: This is an older switching technique that has become obsolete. In
message switching technique, the entire data block/message is forwarded across the
entire network thus, making it highly inefficient.
 Circuit Switching: In this type of switching, a connection is established between the
source and destination beforehand. This connection receives the complete bandwidth of
the network until the data is transferred completely.
This approach is better than message switching as it does not involve sending data to the
entire network, instead of its destination only.
 Packet Switching: This technique requires the data to be broken down into smaller
components, data frames, or packets. These data frames are then transferred to their
destinations according to the available resources in the network at a particular time.
This switching type is used in modern computers and even the Internet.
Datagram Packet Switching: In Datagram Packet switching, each data frame is taken as an
individual entity and thus, they are processed separately.

Virtual-Circuit Packet Switching: In Virtual-Circuit Packet switching, a logical connection


between the source and destination is made before transmitting any data. These logical
connections are called virtual circuits. Each data frame follows these logical paths

What is Multiplexing?
Multiplexing is the sharing of a medium or bandwidth. It is the process in which multiple signals
coming from multiple sources are combined and transmitted over a single communication/physical
line.
1. Frequency Division Multiplexing :
Frequency division multiplexing is defined as a type of multiplexing where the bandwidth of a
single physical medium is divided into a number of smaller, independent frequency channels.

Frequency Division Multiplexing is used in radio and television transmission.

2. Time Division Multiplexing :


Time-division multiplexing is defined as a type of multiplexing wherein FDM, instead of sharing a
portion of the bandwidth in the form of channels, in TDM, time is shared.

There are two types of Time Division Multiplexing :

1. Synchronous Time Division Multiplexing


2. Statistical (or Asynchronous) Time Division Multiplexing

3. Wavelength Division Multiplexing :


Wavelength Division Multiplexing (WDM) is a multiplexing technology used to increase the
capacity of optical fiber by transmitting multiple optical signals simultaneously over a single
optical fiber, each with a different wavelength

UNIT 2

DATA LINK LAYER


The IEEE has subdivided the data-link layer into two sublayers: logical link control (LLC) (TOP) and
media access control (MAC) (BOTTOM).

Media Access Control (MAC): It defines the specific access method for each LAN, Ethernet and Take
care of Addressing at the level (Lan technology).

-Flow control, error control, and part of the framing du es are collected into one sublayer called the
logical link control (LLC).

- Framing is handled in both the LLC sublayer and the MAC sublayer.
What is Go-Back-N ARQ?
In Go-Back-N ARQ, N is the sender's window size. Suppose we say that Go-Back-3, which means that
the three frames can be sent at a time before expecting the acknowledgment from the receiver.

If we have five frames and the concept is Go-Back-3, which means that the three frames can be sent,
i.e., frame no 1, frame no 2, frame no 3 can be sent before expecting the acknowledgment of frame no
1.

In Go-Back-N ARQ, the frames are numbered sequentially as Go-Back-N ARQ sends the multiple
frames at a time that requires the numbering approach to distinguish the frame from another frame,
and these numbers are known as the sequential numbers.

The number of frames that can be sent at a time totally depends on the size of the sender's window. If
the acknowledgment of a frame is not received within an agreed-upon time period, then all the
frames available in the current window will be retransmitted. Suppose we have sent the frame no 5,
but we didn't receive the acknowledgment of frame no 5, and the current window is holding three
frames, then these three frames will be retransmitted.

What is Stop and Wait protocol?

Here stop and wait means, whatever the data that sender wants to send, he sends the data to the
receiver. After sending the data, he stops and waits until he receives the acknowledgment from the
receiver. The stop and wait protocol is a flow control protocol where flow control is one of the services
of the data link layer.

It is a data-link layer protocol which is used for transmitting the data over the noiseless channels. It
provides unidirectional data transmission which means that either sending or receiving of data will take
place at a time. It provides flow-control mechanism but does not provide any error control mechanism.

The idea behind the usage of this frame is that when the sender sends the frame then he waits for the
acknowledgment before sending the next frame.

Primitives of Stop and Wait Protocol

The primitives of stop and wait protocol are:

Sender side

Rule 1: Sender sends one data packet at a time.

Rule 2: Sender sends the next packet only when it receives the acknowledgment of the previous packet.

Receiver side

Rule 1: Receive and then consume the data packet.

Rule 2: When the data packet is consumed, receiver sends the acknowledgment to the sender.
Disadvantages of Stop and Wait protocol

The following are the problems associated with a stop and wait protocol:

1. Problems occur due to lost data

o Sender waits for an infinite amount of time for an acknowledgment.

o Receiver waits for an infinite amount of time for a data.

2.Problems occur due to lost acknowledgment

-Sender waits for an infinite amount of time for an acknowledgment.

3.Problem due to the delayed data or acknowledgment

As the acknowledgment is received late, so acknowledgment can be wrongly considered as the


acknowledgment of some other data packet.

Selective Repeat Protocol (SRP) : This protocol(SRP) is mostly identical to GBN protocol, except
that buffers are used and the receiver, and the sender, each maintains a window of equal size. SRP
also requires full-duplex link.

 Sender’s Windows ( Ws) = Receiver’s Windows ( Wr).


 Window size should be less than or equal to half the sequence number in SR protocol.
This is to avoid packets being recognized incorrectly. If the size of the window is
greater than half the sequence number space, then if an ACK(acknowlegement) is lost,
the sender may send new packets that the receiver believes are retransmissions.
 Sender can transmit new packets as long as their number is with W of all unACKed
packets.
 Sender retransmit un-ACKed packets after a timeout – Or upon a NAK if NAK is
employed.
 Receiver ACKs all correct packets.
Multiple Access Control –
If there is a dedicated link between the sender and the receiver then data link control layer is
sufficient, however if there is no dedicated link present then multiple stations can access the
channel simultaneously. Hence multiple access protocols are required to decrease collision and
avoid crosstalk. For example, in a classroom full of students, when a teacher asks a question and
all the students (or stations) start answering simultaneously (send data at same time) then a lot of
chaos is created( data overlap or data lost) then it is the job of the teacher (multiple access
protocols) to manage the students and make them answer one at a time.
Thus, protocols are required for sharing data on non dedicated channels. Multiple access protocols
can be subdivided further as –

1. Random Access Protocol: In this, all stations have same superiority that is no station has more
priority than another station. Any station can send data depending on medium’s state( idle or
busy). It has two features:
1. There is no fixed time for sending data
2. There is no fixed sequence of stations sending data
The Random access protocols are further subdivided as:

(a) ALOHA – It was designed for wireless LAN but is also applicable for shared medium. In this,
multiple stations can transmit data at the same time and can hence lead to collision and data
being garbled.
 Pure Aloha:
When a station sends data it waits for an acknowledgement. If the acknowledgement
doesn’t come within the allotted time then the station waits for a random amount of
time called back-off time (Tb) and re-sends the data. Since different stations wait for
different amount of time, the probability of further collision decreases.
Vulnerable Time = 2* Frame transmission time
Throughput = G exp{-2*G}
Maximum throughput = 0.184 for G=0.5

 Slotted Aloha:
It is similar to pure aloha, except that we divide time into slots and sending of data is
allowed only at the beginning of these slots. If a station misses out the allowed time, it
must wait for the next slot. This reduces the probability of collision.
Vulnerable Time = Frame transmission time
Throughput = G exp{-*G}
Maximum throughput = 0.368 for G=1

Pure Aloha Slotted Aloha

In this Aloha, any station can transmit In this, any station can transmit the data at the
the data at any time. beginning of any time slot.

In this, The time is continuous and not In this, The time is discrete and globally
globally synchronized. synchronized.

Vulnerable time for Pure Aloha = 2 x Tt Vulnerable time for Slotted Aloha = Tt

In Pure Aloha, the Probability of


In Slotted Aloha, the Probability of successful
successful transmission of the data
transmission of the data packet
packet
= G x e-G
= G x e-2G

In Pure Aloha, Maximum efficiency In Slotted Aloha, Maximum efficiency

= 18.4% = 36.8%

Pure Aloha doesn’t reduce the number of Slotted Aloha reduces the number of collisions to
collisions to half. half and doubles the efficiency of Pure Aloha.

CSMA CD

The Carrier Sense Multiple Access/ Collision Detection protocol is used to detect a collision in the
media access control (MAC) layer. Once the collision was detected, the CSMA CD immediately stopped
the transmission by sending the signal so that the sender does not waste all the time to send the data
packet. Suppose a collision is detected from each station while broadcasting the packets. In that case,
the CSMA CD immediately sends a jam signal to stop transmission and waits for a random time context
before transmitting another data packet. If the channel is found free, it immediately sends the data and
returns it.
Advantages of CSMA CD:

1. It is used for collision detection on a shared channel within a very short time.

2. CSMA CD is better than CSMA for collision detection.

3. CSMA CD is used to avoid any form of waste transmission.

Disadvantage of CSMA CD

1. It is not suitable for long-distance networks because as the distance increases, CSMA CD'
efficiency decreases.

2. It can detect collision only up to 2500 meters, and beyond this range, it cannot detect collisions.

3. When multiple devices are added to a CSMA CD, collision detection performance is reduced.

CSMA/CA

CSMA stands for Carrier Sense Multiple Access with Collision Avoidance. It means that it is a network
protocol that uses to avoid a collision rather than allowing it to occur, and it does not deal with the
recovery of packets after a collision. It is similar to the CSMA CD protocol that operates in the media
access control layer. In CSMA CA, whenever a station sends a data frame to a channel, it checks whether
the channel is ideal or not. If the shared channel is busy, the station waits until the channel enters idle
mode. Hence, we can say that it reduces the chances of collisions and makes better use of the medium
to send data packets more efficiently.

Advantage of CSMA CA

1. When the size of data packets is large, the chances of collision in CSMA CA is less.

2. It controls the data packets and sends the data when the receiver wants to send them.

3. It is used to prevent collision rather than collision detection on the shared channel.

The disadvantage of CSMA CA

1. Sometime CSMA/CA takes much waiting time as usual to transmit the data packet.

2. It consumes more bandwidth by each station.

3. Its efficiency is less than a CSMA CD.

CSMA/CD CSMA/CA

CSMA / CD is effective after a Whereas CSMA / CA is effective before a


1.
collision. collision.

CSMA / CD is used in wired Whereas CSMA / CA is commonly used


2.
networks. in wireless networks.
CSMA/CD CSMA/CA

Whereas CSMA/ CA minimizes the


3. It only reduces the recovery time.
possibility of collision.

CSMA / CD resends the data frame Whereas CSMA / CA will first transmit
4.
whenever a conflict occurs. the intent to send for data transmission.

CSMA / CD is used in 802.3 While CSMA / CA is used in 802.11


5.
standard. standard.

It is more efficient than simple


While it is similar to simple
6. CSMA(Carrier Sense Multiple
CSMA(Carrier Sense Multiple Access).
Access).

It is the type of CSMA to detect the It is the type of CSMA to avoid collision
7
collision on a shared channel. on a shared channel.

Vpn

VPN stands for Virtual Private Network. It allows you to connect your computer to a
private network, creating an encrypted connection that masks your IP address to securely
share data and surf the web, protecting your identity online.

Types of VPNs

Router VPN

The first type uses a router with added VPN capabilities.

Firewall VPN

The second type of VPN is one built into a firewall device.

High-Level Data Link Control (HDLC)


basically provides reliable delivery of data frames over a network or communication link. HDLC
provides various operations such as framing, data transparency, error detection, and correction,
and even flow control. Primary stations simply transmit commands that contain address of
secondary stations. The secondary station then simply transmits responses that contain the
primary address.
Introduction of Classful IP Addressing

An IP address is an address having information about how to reach a specific host, especially outside
the LAN. An IP address is a 32-bit unique address having an address space of 2 POWER32.
Generally, there are two notations in which the IP address is written, dotted decimal notation and
hexadecimal notation.

Classful Addressing
The 32-bit IP address is divided into five sub-classes. These are given below:
 Class A
 Class B
 Class C
 Class D
 Class E
The IPv4 address is divided into two parts:
 Network ID
 Host ID
Class A
IP addresses belonging to class A are assigned to the networks that contain a large number of
hosts.
 The network ID is 8 bits long.
 The host ID is 24 bits long.
 IP addresses belonging to class A ranges from 0.0.0.0 – 127.255.255.255.


Class B
IP address belonging to class B is assigned to networks that range from medium-sized to large-
sized networks.
 The network ID is 16 bits long.
 The host ID is 16 bits long.
 IP addresses belonging to class B ranges from 128.0.0.0 – 191.255.255.255.


Class C
IP addresses belonging to class C are assigned to small-sized networks.
 The network ID is 24 bits long.
 The host ID is 8 bits long.
 IP addresses belonging to class C range from 192.0.0.0 – 223.255.255.255.


Class D
IP address belonging to class D is reserved for multi-casting. The higher-order bits of the first octet
of IP addresses belonging to class D is always set to 1110
Class E
IP addresses belonging to class E are reserved for experimental and research purposes. IP
addresses of class E range from 240.0.0.0 – 255.255.255.254.

MAC
Address IP Address

MAC Address stands for Media Access IP Address stands for Internet
1.
Control Address. Protocol Address.

IP Address is either a four-byte


MAC Address is a six byte hexadecimal
2. (IPv4) or a sixteen-byte (IPv6)
address.
address.

A device attached with IP


A device attached with MAC Address
3. Address can retrieve by RARP
can retrieve by ARP protocol.
protocol.

NIC Card’s Manufacturer provides the Internet Service Provider


4.
MAC Address. provides IP Address.

MAC Address is used to ensure the IP Address is the logical address


5.
physical address of a computer. of the computer.

MAC Address operates in the data link IP Address operates in the


6.
layer. network layer.

IP Address identifies the


MAC Address helps in simply identifying
7. connection of the device on the
the device.
network.

MAC Address of computer cannot be IP Address modifies with the


8.
changed with time and environment. time and environment.
MAC
Address IP Address

MAC Addresses can’t be found easily by IP Addresses can be found by a


9.
a third party. third party.

10. It is a 48-bit address IPv4 uses 32-bit addresses

IPv4 uses A, B, C, D, and E


11. No classes are used for MAC addressing.
classes for IP addressing.

Ipv4 Ipv6

Address length IPv4 is a 32-bit address. IPv6 is a 128-bit address.

Fields IPv4 is a numeric address that IPv6 is an alphanumeric address that consists of 8 fields,
consists of 4 fields which are which are separated by colon.
separated by dot (.).

Classes IPv4 has 5 different classes of IP IPv6 does not contain classes of IP addresses.
address that includes Class A, Class B,
Class C, Class D, and Class E.

Number of IP IPv4 has a limited number of IP IPv6 has a large number of IP addresses.
address addresses.

VLSM It supports VLSM It does not support VLSM.

Address It supports manual and DHCP It supports manual, DHCP, auto-configuration, and
configuration configuration. renumbering

Checksum field The checksum field is available in IPv4. The checksum field is not available in IPv6.

Transmission scheme IPv4 is broadcasting. On the other hand, IPv6 is multicasting,

Classful
Parameter Classless Addressing
Addressing
Classless addressing
In Classful addressing IP came to replace the
addresses are allocated classful addressing and
1. Basics
according to the classes- to handle the issue of
A to E. rapid exhaustion of IP
addresses.

2. Practical It is less practical. It is more practical.

The changes in the There is no such


Network ID
3. Network ID and Host ID restriction of class in
and Host ID
depend on the class. classless addressing.

It does not support the It supports the Variable


4. VLSM Variable Length Subnet Length Subnet Mask
Mask (VLSM). (VLSM).

Classful addressing
It requires less
requires more bandwidth.
bandwidth. Thus, fast
As a result, it becomes
5. Bandwidth and less expensive as
slower and more
compared to classful
expensive as compared
addressing.
to classless addressing.

It does not support It supports Classless


6. CIDR Classless Inter-Domain Inter-Domain Routing
Routing (CIDR). (CIDR).

Regular or periodic
7. Updates Triggered Updates
updates

ClasslessInter-DomainRouting(CIDR):
CIDR or Class Inter-Domain Routing was introduced in 1993 to replace classful addressing.

CIDR notation:
In CIDR subnet masks are denoted by /X. For example a subnet of 255.255.255.0 would be
denoted by /24. To work a subnet mask in CIDR, we have to first convert each octet into its
respective binary value. For example, if the subnet is of 255.255.255.0. then :
First Octet –
255 has 8 binary 1's when converted to binary

Second Octet –
255 has 8 binary 1's when converted to binary

Third Octet –
255 has 8 binary 1's when converted to binary
Fourth Octet –
0 has 0 binary 1's when converted to binary

Therefore, in total there are 24 binary 1’s, so the subnet mask is /24.

Classful Classless
Addressing Addressing

Classless addressing came to


In Classful addressing IP
replace the classful addressing
1. Basics addresses are allocated according
and to handle the issue of rapid
to the classes- A to E.
exhaustion of IP addresses.

2. Practical It is less practical. It is more practical.

Network ID The changes in the Network ID There is no such restriction of


3.
and Host ID and Host ID depend on the class. class in classless addressing.

It does not support the Variable It supports the Variable Length


4. VLSM
Length Subnet Mask (VLSM). Subnet Mask (VLSM).

Classful addressing requires more It requires less bandwidth.


bandwidth. As a result, it becomes Thus, fast and less expensive
5. Bandwidth
slower and more expensive as as compared to classful
compared to classless addressing. addressing.

It does not support Classless It supports Classless Inter-


6. CIDR
Inter-Domain Routing (CIDR). Domain Routing (CIDR)

Routing

o The rou ng protocol is a process where the router connects with other routers in order to share
informa on about the most cost-effec ve path and status of the network. The rou ng process selects
the best path on the basis of the reachability informa on and stores it in a router table.

o A Router works at the network layer in the OSI model and internet layer in TCP/IP model

Types of Routing

Routing can be classified into three categories:

o Static Routing:

o Default Routing

o Dynamic Routing
Distant Vector Protocol

Distant vector protocol, also called as Bellman-Ford algorithm or Ford Fulkerson algorithm used to calculate a
path. A distance-vector protocol calculates the distance and direction of the vector of the next hop from the
information obtained by the neighboring router. It is necessary to keep track of the topology and inform
neighboring devices if any changes occur in topology.

Let's consider a scenario where all the routers are set and run the distant routing protocol. Each router in the
network will share the distance information with the neighboring router. All the information is gathered from the
neighbor routers. With each router information, an optimal distance is calculated and stored in the routing table.
This way, the process of calculating the optimal path is done using the distant vector routing protocol.

Link-State Routing

Link-State Routing protocols build a complete topology of the entire network and then calculate the best path
from the topology of all interconnected networks. In link-state routing, the distance is calculated based on
multiple metrics from source to destination, one hop at a time.

The link-state routing protocol maintains three different tables that are neighbor table, the topology table, and
the routing table. The neighbor table stores the information of the neighbor table. The topology table stores the
information on network topology, and the routing table keeps track of all the paths to the different networks. It
requires more memory and processing power as it has the complete picture of the network.

Link state routing protocol follows the following steps:

 Discovering The Neighbour: When routes are boosted, the first task is to learn about the neighbors.
Routers send a hello message to neighbors.

Measuring Delay: According to the link-state rou ng protocol, each router must know or have a
reasonable es mate of the delay to each of its neighbors.

 Construct packets and distribute them to routers Once the information is collected, the packets
containing all the data of neighbors are built. The packet has the identity of the sender, followed by a
sequence number and age, and a list of neighbors. After this, packets are forwarded to the network.
 Computing new route. A router is used to compute the shortest distance to a destination.

Border Gateway
Protocol Routing Information Protocol

RIP Stands for Routing


1. BGP stands for Border Gateway Protocol. Information Protocol.

2. It initially came in the year 1989. It was defined in the year 1988.

RIP works on Bellman Ford


3. It works on Best path algorithm. algorithm.
It is basically used for very larger size It is basically used for smaller size
4. organizations as compared to RIP. organizations.

It is an industry standard dynamic


5. It is an external gateway protocol. routing protocol.

There is no such restriction on the hop


count. It allows a maximum of 15 hops.

Distance
Vector Routing Link State Routing

1. Bandwidth required is less Bandwidth required is more

Based on local knowledge, since it updates Based on global knowledge, it have


2.
table based on information from neighbours. knowledge about entire network.

3. Make use of Bellman Ford Algorithm. Make use of Dijakstra’s algorithm.

4. Traffic is less. Traffic is more.

5. Converges slowly Converges faster.

6. Count of infinity problem. No count of infinity problem.

ARP RARP

A protocol used to map an IP


A protocol used to map a physical
address to a physical (MAC)
(MAC) address to an IP address
address

To obtain the MAC address of a To obtain the IP address of a network


network device when only its IP device when only its MAC address is
address is known known
ARP RARP

Client broadcasts its IP address Client broadcasts its MAC address and
and requests a MAC address, requests an IP address,

IP addresses MAC addresses

Widely used in modern


Rarely used in modern networks as most
networks to resolve IP addresses
devices have a pre-assigned IP address
to MAC addresses

ARP stands for Address Whereas RARP stands for Reverse


Resolution Protocol. Address Resolution Protocol.

It is used in sender side it is used in receiver side

TCP Segment structure –


A TCP segment consists of data bytes to be sent and a header that is added to the data by TCP as
shown:

The header of a TCP segment can range from 20-60 bytes. 40 bytes are for options. If there are no
options, a header is 20 bytes else it can be of upmost 60 bytes.
Header fields:

 Source Port Address –


A 16-bit field that holds the port address of the application that is sending the data
segment.

 Destination Port Address –


A 16-bit field that holds the port address of the application in the host that is receiving
the data segment.

 Sequence Number –
A 32-bit field that holds the sequence number.

 Acknowledgement Number –
A 32-bit field that holds the acknowledgement number
 Header Length (HLEN) –
This is a 4-bit field that indicates the length of the TCP header by a number of 4-byte
words in the header,

 Control flags –
These are 6 1-bit control bits that control connection establishment, connection
termination, connection abortion, flow control, mode of transfer etc. Their function is:
 URG: Urgent pointer is valid
 ACK: Acknowledgement number is valid( used in case of cumulative
acknowledgement)
 PSH: Request for push
 RST: Reset the connection
 SYN: Synchronize sequence numbers
 FIN: Terminate the connection
 Window size –
This field tells the window size of the sending TCP in bytes.

 Checksum –
This field holds the checksum for error control. It is mandatory in TCP as opposed to
UDP.
What is Cryptography?
Cryptography is a technique of securing information and communications through the use of codes
so that only those persons for whom the information is intended can understand and process it.
Thus preventing unauthorized access to information. The prefix “crypt” means “hidden” and the
suffix “graphy” means “writing”. In Cryptography, the techniques that are used to protect
information are obtained from mathematical concepts and a set of rule-based calculations
Features Of Cryptography
 Confidentiality: Information can only be accessed by the person for whom it is
intended and no other person except him can access it.
 Integrity: Information cannot be modified in storage or transition between sender and
intended receiver
 Authentication: The identities of the sender and receiver are confirmed. As well
destination/origin of the information is confirmed.
 Adaptability: Cryptography continuously evolves to stay ahead of security threats
Types Of Cryptography
1. Symmetric Key Cryptography
It is an encryption system where the sender and receiver of a message use a single common key to
encrypt and decrypt messages. Symmetric Key cryptography is faster and simpler but the problem
is that the sender and receiver have to somehow exchange keys securely.
2. Hash Functions
There is no usage of any key in this algorithm. A hash value with a fixed length is calculated as per
the plain text
3. Asymmetric Key Cryptography
In Asymmetric Key Cryptography, a pair of keys is used to encrypt and decrypt information. A
receiver’s public key is used for encryption and a receiver’s private key is used for decryption. Public
keys and Private keys are different. Even if the public key is known by everyone the intended receiver
can only decode it because he alone knows his private key. The most popular asymmetric key
cryptography algorithm is the RSA algorithm.

What is the Need of DNS?


Every host is identified by the IP address but remembering numbers is very difficult for people also
the IP addresses are not static therefore a mapping is required to change the domain name to the IP
address. So DNS is used to convert the domain name of the websites to their numerical IP address.
Types of Domain
There are various kinds of domain:
1. Generic domains: .com(commercial), .edu(educational), .mil(military), .org(nonprofit
organization), .net(similar to commercial) all these are generic domains.
2. Country domain: .in (India) .us .uk
3. Inverse domain: if we want to know what is the domain name of the website. Ip to
domain name mapping.
What is Firewall?
A firewall is a network security device, either hardware or software-based, which monitors all
incoming and outgoing traffic and based on a defined set of security rules accepts, rejects, or
drops that specific traffic.
 Accept: allow the traffic
 Reject: block the traffic but reply with an “unreachable error”
 Drop : block the traffic with no reply
Advantages of using Firewall
 Protection from unauthorized access: Firewalls can be set up to restrict incoming
traffic from particular IP addresses or networks, preventing hackers or other malicious
actors from easily accessing a network or system. Protection from unwanted access.
 Prevention of malware and other threats: Malware and other threat prevention:
 Control of network access: By limiting access to specified individuals or groups for
particular servers or applications, firewalls can be used to restrict access to particular
network resources or services.
 Monitoring of network activity: Firewalls can be set up to record and keep track of all
network activity.

Disadvantages of using Firewall


 Complexity: Setting up and keeping up a firewall can be time-consuming and difficult,
especially for bigger networks or companies
 Limited Visibility: Firewalls may not be able to identify or stop security risks that
operate at other levels
 False sense of security: Some businesses may place an excessive amount of reliance
on their firewall and disregard other crucial security
 Limited adaptability: Because firewalls are frequently rule-based, they might not be
able to respond to fresh security threats.
 Performance impact: Network performance can be significantly impacted by firewalls
 Limited scalability: Because firewalls are only able to secure one network, businesses
that have several networks must deploy many firewalls, which can be expensive.

TELNET

TELNET stands for Teletype Network. It is a type of protocol that enables one computer to connect
to the local computer. he computer which starts the connection is known as the local computer. The
computer which is being connected to i.e. which accepts the connection known as the remote
computer.
During telnet operation, whatever is being performed on the remote computer will be displayed by
the local computer. Telnet operates on a client/server principle.

FILE TRANSFER PROTOCOL


o FTP stands for File transfer protocol.

o FTP is a standard internet protocol provided by TCP/IP used for transmitting the files from one
host to another.

o It is mainly used for transferring the web page files from their creator to the computer that acts
as a server for other computers on the internet.

o It is also used for downloading the files to computer from other servers.

Objectives of FTP

o It provides the sharing of files.

o It is used to encourage the use of remote computers.

o It transfers the data more reliably and efficiently.

There are two types of connections in FTP:

o Control Connection: The control connection uses very simple rules for communication.

o Data Connection: The Data Connection uses very complex rules as data types may vary.
WORLD WIDE WEB

World Wide Web, which is also known as a Web, is a collection of websites or web pages stored in
web servers and connected to local computers through the internet. These websites contain text
pages, digital images, audios, videos, etc. Users can access the content of these sites from any part of
the world over the internet using their devices such as computers, laptops, cell phones, etc. The
WWW, along with internet, enables the retrieval and display of text and media to your device.

What is DDNS?

The Dynamic Domain Name System (DDNS) is a protocol that provides DNS
extensions that allow DNS servers to accept requests to dynamically add,
update, and delete entries in the DNS database.

You might also like