Akriit45@gmail.com..................................................1
CONTENTS
Data Communications...........................................................................................................................................3
1.1. Data ...................................................................................................................................................................3
1.2. Communication..................................................................................................................................................3
1.3. Network.............................................................................................................................................................3
1.4. Signal .................................................................................................................................................................3
1.5. Circuit.................................................................................................................................................................3
1.6. Channel..............................................................................................................................................................3
1.7. Multi-Channeling................................................................................................................................................3
1.8. Transmission Modes...........................................................................................................................................4
1.9. Taxonomy of Transmission..................................................................................................................................4
1.10. Parity Check (Asynchronous Data Error Detection).............................................................................................6
1.11. Cyclic Redundancy Check (Synchronous Data Error Detection) ...........................................................................6
1.12. Checksum Error Detection.................................................................................................................................7
1.13. Hamming Coding Technique for Error Correction ...............................................................................................7
1.14. Flow Control .....................................................................................................................................................8
1.15. Piggybacking.....................................................................................................................................................9
1.16. Congestion control............................................................................................................................................9
1.17. Multiplexing.....................................................................................................................................................9
1.18. Baseband v/s Broadband ................................................................................................................................11
1.19. Spread Spectrum ............................................................................................................................................12
1.20. Modulation.....................................................................................................................................................12
1.21. Encoding Techniques.......................................................................................................................................14
1.22. Digital data to Digital Signals Encoding ............................................................................................................14
1.23. Classification of Modems ................................................................................................................................15
1.24. Modem Protocols ...........................................................................................................................................16
1.25. Digital Subscriber Loop (DSL)...........................................................................................................................17
Communication Network Fundamentals............................................................................................................19
2.1. Switching Techniques........................................................................................................................................19
2.2. Open Systems Interconnection (OSI) Model.......................................................................................................21
2.3. Internet Protocol Suite (TCP/IP Model)..............................................................................................................23
Akriit45@gmail.com..................................................2
2.4. LAN topologies.................................................................................................................................................23
Media access Control ..........................................................................................................................................26
3.1. MAC Layer – Media Access Control Layer Protocols ...........................................................................................26
3.2. ALOHA..............................................................................................................................................................26
3.3. Carrier Sensed Multiple Access (CSMA) .............................................................................................................27
3.4. Multiple Access Techniques ..............................................................................................................................27
Network Components..........................................................................................................................................29
4.1. Transmission media......................................................................................................................................29
4.2. Guided Media..............................................................................................................................................29
4.3. Unguided Media...........................................................................................................................................31
4.4. Networking Components and Devices...........................................................................................................33
Link Control and MAC Protocols .........................................................................................................................35
5.1. Data link control (DLC)..................................................................................................................................35
5.2. Framing: ......................................................................................................................................................35
5.3. Flow and Error Control .................................................................................................................................35
5.4. HDLC............................................................................................................................................................37
LAN.......................................................................................................................................................................38
6.1. Ethernet.......................................................................................................................................................38
6.2. Token Ring...................................................................................................................................................39
6.3. FDDI.............................................................................................................................................................41
6.4. Types of computer networks ........................................................................................................................42
WAN.....................................................................................................................................................................45
7.1. Network Routing..........................................................................................................................................45
7.2. Routing Methods................................................................................................Error! Bookmarknot defined.
7.3. IP - The Internet Protocol..............................................................................................................................45
7.4. Network layer protocols..............................................................................................................................47
7.5. Transport layer.............................................................................................................................................48
7.6. USER DATAGRAM PROTOCOL.......................................................................................................................49
Application Protocol............................................................................................................................................50
8.1. CLIENT- SERVER MODEL................................................................................................................................50
8.2. APPLICATION PROTOCOLS............................................................................................................................50
Akriit45@gmail.com..................................................3
CHAPTER1
Data Communications
1.1.Data
 Data is raw material that contains the collection of facts.
 Data refers to information presented in whatever form is agreed upon by the parties creating and
using the data.
o Digital Data: Digital data is stored ones and zeros, which may represent number of way.
 A charged portion 1
 An Uncharged portion 0
o Analog Data: Analog data is that is represented in physical way.
 Records and cassette tapes are forms of analog data storage.
 Printed documents are constructed analog as well.
1.2.Communication
 Communication is the exchange of data between two devices via some form of transmission medium
such as a wire cable.
1.3.Network
 A Network is a set of devise (often referred to as nodes) connected by communication links.
o Node: A node can be a computer, printer, or any other device capable of sending and / or
receiving data generated by other nodes on the network.
o Link: A link can be a cable, air, optical fiber, or any medium which can transport a signal carrying
information
1.4.Signal
 A signal is an electronic current or electromagnetic fields used to convey data from one place to
another.
1.5.Circuit
 A Circuit is path over which data, voice or other signal can pass, between two computers or a terminal
and a computer.
1.6.Channel
 A portion of a bandwidth used for transmitting data
o Bandwidth: A range of frequencies within a given band.
 A band of frequencies used in radio and television transmission, especially used by a particular
station.
 A separate path through which signal can flow
1.7.Multi-Channeling
 Total media capacity or bandwidth can be divided into multiple channels.
 The Passes of multiple signal over a single media
Akriit45@gmail.com..................................................4
 Multi-channeling used mainly in broadband transmission.
1.8.Transmission Modes
Item Simplex Half Duplex Full Duplex
Direction of
Transmission of
Message
Communication in
one directional only
(Uni-Directional)
Both ways but transmission of
communication is only in one
direction at time(Bi-
Directional)
Communication in both
direction simultaneously
( Omni-Directional)
Confirmation Not Possible Possible but slow Possible
Number of
wires
Two Two Four
Cost Cheapest Average Costliest
Example T.V and Radio Hard Disk to Memory Telephonic
Communication
Efficiency Low Medium High
1.9. Taxonomy of Transmission
 A transmission mode is the manner in which data is sent to over the underlying medium
Transmission modes can be divided into two Fundamental categories:
 Serial Transmission
o Serial Transmission sends one bit at a time.
o Serials networks can be extended over long distanced at less cost,
Akriit45@gmail.com..................................................5
o using only one physical wire means that there is never a timing problem caused by one wire being
slightly longer than another
 Parallel Transmission
o Parallel transmission allows transfers of multiple data bits at the same time over separate media.
o It is used with a wired medium
o The signals on all wires are synchronized so that a bit travels across each of the wires at precisely
the same time
o a parallel interface usually contains other wires that allow the sender and receiver to coordinate
o to make installation and troubleshooting easy, the wires are placed in a single physical cable
A parallel mode of transmission has two chief advantages:
 High speed--it can send N bits at the same time.
 It can match the speed of the underlying hardware
Asynchronous Transmission Synchronous Transmission
The senders and receivers clocks are not
Synchronized.
The senders and the receiver’s clocks are synchronized.
The sender sends only one character at a time The sender sends a packet of data at a time.
Each character needs a start bit and a stop bit. Synchronization is achieved by sending a ‘start’ frame
and a ‘stop’ frames that required with up to 8Kb of data
in the packet of data.
There can be idle time between each character. There can be idle time between each frame.
It is a slow and inefficient method of data
transmission.
It is a more efficient method of transmission.
It is an inexpensive method for low speed
transmission.
Asynchronous has a much higher overhead.
Isochronous Transmission
 Combines features of an asynchronous and synchronous data transfer system.
 Isochronous transmission is designed to provide steady bit flow for multimedia applications.
o Steady flow: when flow do not change with time.
 Isochronous networks are designed to accept and send data at a fixed rate, R.
Akriit45@gmail.com..................................................6
 This is ideal when delivering such data at a steady rate is essential (jitter is minimized).
o Jitter: unwanted variation in an electronic or optical signal.
 Network interface is set to transmit/receive exactly R bits per second
Example: An isochronous mechanism designed to transfer voice operates at a rate of 64,000 bps:
o A sender must generate digitized audio continuously.
o A receiver must be able to accept and play the stream at 64,000 bps
1.10.Parity Check (Asynchronous Data Error Detection)
 Used in Asynchronous transmission.
 Detects any errors in each character being sent.
 A bit in each byte is set aside as the parity bit.
o In even parity, the bit is set to 1 or 0 to ensure an even number of 1’s.
o In odd parity, the bit is set to 1 or 0 to ensure and odd number of 1’s.
 The receiving system checks the system being used and the number of 1’s
 Both Telex and Teletype networks employ this method.
 An error-correction process used with asynchronous data stream called Longitudinal Redundancy
Check (LRC) makes use of the Parity process.
For Example: Sender Sent word Help!
0000100
0010100
0010000-->Comparison results because a 1 indicate
the bad bit position.
The detection of a bad parity bit in the ‘l’ character
designated the location of an error in that character. As
a result of comparison of the LRC, bit 3 of that
character is detected as incorrectand wouldbe
inverted to yield the correctedcharacter.
1.11.Cyclic Redundancy Check (Synchronous Data Error Detection)
 The difference here is that the block of data is treated as one (very large) binary number.
 This is then divided by an Integer agreed between the sender and receiver.
 The Remainder only from the calculation is sent along with the data.
 The receiver can perform the same calculation and request re-transmission if there is a discrepancy.
 CRC-16 detects all single and double-bit errors, all errors in bit streams with an odd number of bits in
errors, all errors bursts longer than 16 bits, and 99.9% of error bursts longer than 16 bits.
 CRC-32 detects essentially all errors, which is the primary reason for IEEE selecting this technique for
all LAN standards.
Example 1. The Message frame 110011001011 for which the divisor is 10001.
Answer: Add 0000 (4- bits) with frame 1100110010110000 and divide by 10001.
Sender Receiver
0001001 H  H 0001001
1010011 e e 1010011
0011011 l h 0001011
0000111 p p 0000111
1000010 ! ! 1000010
0000100 Sender’s
LRC
Receiver’s
LRC
0010100
1010011011
10001 1100110010110000
10001
______01011
______00000
_10001
_10001
_______10110
_______10001
Akriit45@gmail.com..................................................7
Exclusive OR
A B Result
0 0 0+0=0
0 1 0+1=1
1 0 1+0=1
1 1 1+1=0
1.12.Checksum Error Detection
 Used in Asynchronous Transmission.
 Checks errors in each packet of Data being sent.
 The checksum is generated by treating all the bytes in the transmission as a number.
 It adds up all the bytes in the block.
 The checksum is attached to the block and transmitted along with the data.
 The receiver does the same calculation and if the checksums are the same the data was transmitted
correctly, if not it’s re-sent.
 Checksums are simple validation mechanism. They cannot detect all errors and they cannot be used to
correct errors.
 Its ability to detect multiple errors within any length of massage.
 It is simple to implement.
1.13.Hamming Coding Technique for Error Correction
 Hamming codes provide a method for error correction. Error bits called Hamming bits are inserted
into message at random locations.
 Hamming coding technique is used in satellite transmitting visual data as binary streams of
information around another planet say Jupiter.
 The Hamming distance is the number of bits that have to be changed to get from one bit pattern to
another. Example: 10010101 & 10011001 have a hamming distance of 2
 If we compare the read K bits compared with the write K bits, using an EXOR function, the result is
called the “syndrome”.
 If the syndrome is all zeros, there were no errors.
 If there is a 1 bit somewhere, we know it represents an error.
 To store an M bit word with detection/correction takes M+K bit words
 If K =1, we can detect single bit errors but not correct them
 If 2K - 1 >= M + K , we can detect, identify, and correct all single bit errors, i.e. the syndrome contains the
information to correct any single bit error
Example: For M = 8:
And K = 3: 23 – 1 = 7 < 8 + 3 (doesn’t work)
And K = 4: 24 – 1 = 15 > 8 + 4 (works!)
Therefore, we must choose K =4,
i.e., the minimum size of the syndrome is 4
__00000
__00000
________01110
________00000
___00000
___00000
_________11100
_________10001
____00001
____00000
__________11010
__________10001
_____00010
_____00000
1011
______00101
______00000
Akriit45@gmail.com..................................................8
 For convenience, we would like to generate a 4-bit syndrome for an 8-bit data word with the
following characteristics:
o If the syndrome contains all 0s, no error has been detected.
o If the syndrome contains one and only one bit set to 1, then an error has occurred in one of the 4
check bits. No correction needed.
o If the Syndrome contains more than one bit set to 1, then the numerical value of the syndrome
indicates the position of the data bit in error. This data bit is inverted for correction.
1.14.Flow Control
 When the sender is running on a fast computer and receiver is running on a slow machine, the
receiver will not be able to handle the frames as they arrive. It will start losing some. The solution
to this problem introduces flow control.
 Flow Control is a technique so that transmitter and receiver with different speed characteristics can
communicate with each other.
 Flow control ensures that a transmitting station, such as a server with higher processing capability,
does not overwhelm a receiving station, such as a desktop system, with lesser processing
capability.
 Flow control refers to the set of procedures used to restrict the amount of data the transmitter can
send before waiting for acknowledgment.
-: There are two methods developed for flow control namely Stop-and-wait and Sliding-window.
o Stop and wait:
 This is half-duplex protocol. In this protocol, the sender sends one frame and then waits for an
acknowledgement before proceeding.
 Stop-and-wait is also known as Request/reply sometimes. Request/reply (Stop-and-wait) flow
control requires each data packet to be acknowledged by the remote host before the next
packet is sent back an ACK frame acknowledging the frame just received.
 This is sometimes referred to as Ping-Pong behavior, request/reply is simple to understand and
easy to implement, but not very efficient.
 Major drawback of Stop-and-Wait Flow Control is that only one frame can be in transmission at a
time, this leads to inefficiency if propagation delay is much longer than the transmission delay.
o Sliding Window:
 With the use of multiple frames for a single message, the stop-and-wait protocol does not perform
well.
 This also explicitly announces that it is prepared to receive the next N frames, beginning with the
number specified. This scheme can be used to acknowledge multiple frames
 The range of sequence numbers is 0 to 2n-1 and frames are number module 2n.
 After sequence number 2n-1, the next sequence number is 0.
 3-bit sliding window 0-7---frames module number 0,1,2,3,4,5,6,7,0,1,2,3,4,5,6,7,0,1,2……..
 Sliding window algorithm is a method of flow control for network data transfers. TCP, the
Internet's stream transfer protocol, uses a sliding window algorithm.
 Sender sliding Window: At any instant, the sender is permitted to send frames with sequence
numbers in a certain range (the sending window).
 Receiver sliding Window: The receiver always maintains a window of size 1.
 It looks for a specific frame (frame 4 as shown in the figure) to arrive in a specific order. If it
receives any other frame (out of order), it is discarded and it needs to be resent.
Figure: Sender's Frame Figure: Receiver’s frame
Akriit45@gmail.com..................................................9
1.15.Piggybacking
 Combining data to be sent with control information is called piggybacking.
 Combining data to be sent and acknowledgment of frame received in one frame.
 If two stations exchange data simultaneously, each needs to maintain two windows, one for transmit and
one for receive, and each side needs to send data and acknowledge to other. To provide efficient
support for this requirement, a technique called piggybacking.
 Each data frame includes a field that holds the frames and acknowledgment.
Three cases in order
o Both frames send together for saving communication capacity.
o If a station has acknowledgement but not data to send, it sends separate acknowledgement frame.
o If a station has data to send but no new acknowledgement to send, it must repeat the last
acknowledgement that it sent because the data frame includes field for the acknowledgement
number and some value must be put into that field. When a station receives a duplicate
acknowledgement, it simply ignores it.
1.16.Congestion control
 Problem: When too many packets are transmitted through a network, congestion occurs at very high
traffic, performance collapses completely, and almost no packets are delivered.
 Congestion in a network may occur when users send data at a rate greater than that are acceptable by
network resources.
 For example: Congestion may occur because the switches in a network have a limited buffer size of
memory to store packets for processing.
 Causes: burst nature of traffic is the root cause, when part of the network no longer can cope a sudden
increase of traffic, congestion builds upon.
 Other factors, such as lack of bandwidth, ill-configuration and slow router scan also bring up congestion.
 Solution: congestion control, and two basic approaches:
o Open-loop: try to prevent congestion occurring by good design.
o Closed-loop: monitor the system to detect congestion, pass this information to where action can be
taken, and adjust system operation to correct the problem (detect feedback and correct).
 The router determines the order of packet transmission by controlling which packets are placed in which
queue and how queues are serviced with respect to each other. There are four types of queuing
protocols. These are:
o First-In, First-out Queuing(FIFOQ)
 Transmission of packets occurs in the order the packets arrive.
o Priority Queuing(PQ)
 With PQ packets belonging to one priority class of traffic are transmitted before all lower priority
traffic.
o Custom Queuing (CQ)
 Bandwidth is allocated proportionally to each class of traffic. CQ allows you to specify the number
of bytes or packets to be drawn from the queue, which is especially useful on slow interfaces.
o Weighted Fair Queuing (WFQ)
 WFQ offers dynamic, fair queuing divides bandwidth across queues of traffic based on the packet’s
weights. Because of its fair handling of bandwidth, WFQ ensures satisfactory response time to
critical applications that are intolerant of performance degradation.
1.17.Multiplexing
 The set of techniques that allows the simultaneous transmission of multiple signals across a single data
link.
 Multiplexing allows multiple users sharing the capacity of a transmission link.
Akriit45@gmail.com..................................................10
 Components
o Multiplexer: When multiple senders try to send over a single medium, a device called multiplexer
device. It combines data from the n input lines.
o Link: with n separate channels ,example: optical fiber or microwave link
o De-multiplexer: separates the data according to channel delivers them to the appropriate output
lines.
There are four methods to multiplex channels.
 Frequency-Division Multiplexing (FDM)
o When the carrier is frequency, FDM is used. FDM is an analog technology.
o FDM divides the spectrum or carrier bandwidth in logical channels and allocates one user to each
channel.
o Each channel frequency independently and has exclusive access of it.
o All channels are divided in such a way that does not overlap with each other.
o Channels are separated by guard bands.
 Guard band is a frequency which is not used by either channel.
o Filters separate the multiplexed signal back into its constituent component signals
o Example: radio and television signal transmission
 Wavelength-Division Multiplexing (WDM)
o Light has different wavelength (colors).
o In Fiber optic mode, multiple optical carrier signals are multiplexed into an optical fiber by using
different wavelengths.
o This is an analog multiplexing technique and is done conceptually in the same manner as FDM but
uses light as signal
o Theoretically identical to Frequency Division Multiplexing.
o Used in optical systems while FDM is used in electrical systems.
o Requires more spacing between channels
 Time-Division Multiplexing (TDM)
o TDM is applied primarily on digital signal but can be applied on analog signals as well.
o In TDM the shared channel is divided among its user by means of time slot.
o Each user can transmit data within the provided time slot only.
o Digital signals are divided in frames, equivalent to time slot
o Frame of an optimal size which can be transmitted in given time slot.
o We refer to TDM as a “round robin” use of a frequency
o Example: multiplexing digitalized voice signals and data streams
Akriit45@gmail.com..................................................11
o Synchronous TDM
 time slot are assigned to each channel in a regular sequence
 The multiplexer allocates exactly the same time slot to each device at all times, whether or not a
device has anything to transmit
 A frame consists of one complete cycle of time slots. Thus the number of slots in frame is equal to
the number of inputs.
o Statistical TDM (Asynchronous)
 Improve the efficiency of synchronous TDM by adding complexity to the multiplexer.
 Time slots are assigned to signals as they arrive at the multiplexer.
 Each slot in a frame is not dedicated to the fix device.
 The number of slots in a frame is not necessary to be equal to the number of input devices.
 Allows maximum utilization of the link. It allows a number of lower speed input lines to be
multiplexed to a single higher speed line
 Code-Division Multiplexing (CDM)
o CDM produces a wideband, noise like signal, and it occupies the entire range of frequencies allocated
to the system.
o Discrimination between the signals is achieved through the assignment of unique spreading codes (all
codes are orthogonal)
o The receivers of the transmissions have their respective transmitter’s code word.
o At the receiving end, these data codes are removed (using the code word) form the desired signal.
o Mainly used for mobile communications (wireless systems).
1.18.Baseband v/s Broadband
 Baseband
o Baseband system uses direct digital signaling. The digital signal fully occupies the cable, which
constitutes a single channel. On a typical baseband network, each device transmits bi-directionally.
o Baseband networks have a limited range, due to attenuation, and noise. Repeaters may be used to
extend the length of a baseband system, and must use 50-ohm cable.
 Broadband
o Broadband systems use analog signaling with the use of high frequency carrier, which is modulated
with the digital signals, video and sound. The transmitting device uses different carrier frequency
than the receiving device. The transmission is unidirectional with 75-ohm coaxial cable.
Akriit45@gmail.com..................................................12
o Frequency-Division Multiplexing (FDM) is used in Broadband transmission. Each channel centers on a
different carrier frequency. For example, on a Cable TV, with a bandwidth of 500 MHz can carry
more than 80 television channels (of 6-MHz bandwidth each).
o Further multiplexed within each 6-MHz band are the channel's own audio subcarrier, video subcarrier
and color subcarrier.
1.19.Spread Spectrum
 Spreading techniques make use of a range electromagnetic spectrum (or frequency range) to transmit
messages.
 The narrowband signal is turned into a broadband signal with the same total energy.
o Narrowband: Both narrowband and broadband frequencies are expressed in term of band size.
Kilohertz, or kHz, Megahertz, or MHz, and Gigahertz, or kHz, are common terms of bandwidth
measurement.
o Dial-up connections are example of narrowband connection, as data is transferred at less than 56
kb/s. Broadband connection can accommodate bandwidth greater than 50 Mb/s.
 The power of the broadband signal is much lower  as low as the background noise.
 Appealing for military application: stay undetected! & no interference.
 It is implemented using any of the following two methods:
o Direct Sequence Technology (DS)
 A single bit from a message is converted into a binary string (multiple bits).
 This String is then transmitted as a wideband signal over an adjacent set of frequencies.
 For example “1” can be assigned a string “10011101” and bit “0” can be assigned its inverse
“01100010”.
 Therefore ,if sender wishes to send the message “11001”, it will be sent as:
“1001110110011101011000100110001010011101”
 Wireless LANs (IEEE 802.11) use “10110111000”, called Barker code.
o Frequency Hopping Technology (FH)
 The frequency of the carrier wave is continually changed.
 Total bandwidth is split into many channels of smaller bandwidths.
 Transmitters and receivers stay on one of these channels for a certain time and then hop to
another channel.
 Implements FDM and TDM.
 The pattern of channel usage is called hopping sequence.
 The time spend on a channel with a certain frequency is called dwell time.
 Bluetooth uses FHSS.
 Advantages
 frequency selective fading and interference limited to short period
 simple implementation
 uses only small portion of spectrum at any time
 Disadvantages
 not as robust as DSSS
 simpler to detect
1.20.Modulation
 The process of varying one or more properties of a periodic waveform, called the carrier signal, with a
modulating signal that typically contains information to be transmitted.
 Modulation is the process of conveying message signal inside another signal that can be physically
transmitted.
Akriit45@gmail.com..................................................13
 Modulation of sine waveform transforms a baseband message signal
into a pass band signal.
 The basic sine wave :V(t) = Vo sin (2 p f t + )
o V (t) ->the voltage of the signal as a function of time.
o Vo-> the amplitude of the signal (represents the maximum value
achieved each cycle)
o f-> frequency of oscillation, the number of cycles per second
o -> phase of the signal, representing the starting point of the
cycle.
The data can be modulating by various methods;
 Amplitude Modulation (AM)
o When the amplitude of high frequency carrier wave is changed in
accordance with the intensity of the signal, it is called
amplitude modulation.
o In amplitude modulation, only the amplitude of the carrier wave
is changed in accordance with the intensity of the signal.
However, the frequency of the modulated wave remains the
same i.e. carrier frequency.
o The amplitudes of both positive and negative half-cycles of carrier
wave are changed in accordance with the signal.
o Amplitude modulation is done by an electronic circuit called
modulator.
 Frequency Modulation (FM)
o When the frequency of carrier wave is changed in accordance with
the intensity of the signal, it is called frequency modulation
(FM).
o In frequency modulation, only the frequency of the carrier wave
is changed in accordance with the signal. However, the
amplitude of the modulated wave remains the same i.e. carrier
wave amplitude.
o When the signal voltage is zero as at A, C, E and G, the carrier
frequency is unchanged. When the signal approaches its
positive peaks as at B and F, the carrier frequency is increased
to maximum as shown by the closely spaced cycles. However,
during the negative peaks of signal as at D, the carrier
frequency is reduced to minimum as shown by the widely
spaced cycles.
Advantages: The following are the advantages of FM over AM:
 It gives noiseless reception. As discussed before, noise is a form
of amplitude variations and a FM receiver will reject such
signals.
 The operating range is quite large.
 It gives high-fidelity reception.
 The efficiency of transmission is very high.
S.NO FM AM
1 The amplitude of carrier remains constant
with modulation.
The amplitude of carrier changes with modulation.
2 The carrier frequency changes with
modulation.
The carrier frequency remains constant with modulation.
Akriit45@gmail.com..................................................14
3 The carrier frequency changes according
to the strength of the modulating signal.
The carrier amplitude changes accordingto the strength of
the modulating signal.
4 The value of modulation index (mf)can be
more than 1.
The value of modulation factor(m) cannot be more than 1
for distortion less AM signal.
 Pulse code Modulation
o PCM is a digitizing process in which an analog o continuous signal is represented in digital or discrete
form
o The varying sound of human speech must first be transformed into discrete pulses to be sent by digital
means.
o The device for making this transformation is called a codec, a name derived from its function of coding
an analog signal into digital signal form at the sending end then decoding it back to analog form at
the receiving end.
o A codec accomplishes its tasks in three stages:
 Stage 1 – codec does the sampling of the amplitude of the signal at very short intervals. The voltage
of the signal is measured at small discrete intervals of time.
 Stage 2 – This is stage of quantizing or assigning decimal values to the amplitude samples. Which is
then converted to a digital number expressed in the 1s and 0s?
 Stage 3 – Binary Number transmit through communication links.
 Stage 4 – At receiving end, the original analog-to-digital conversion is reversed.
1.21.Encoding Techniques
 Encoding is the process of converting the data or a given sequence of characters, symbols, alphabets
etc., into a specified format, for the secured transmission of data.
 Decoding is the reverse process of encoding which is to extract the information from the converted
format.
o There are 4 type of data conversion
 Analog data to analog signals – The modulation techniques such as Amplitude Modulation,
Frequency Modulation and Phase Modulation of analog signals, fall under this category.
 Analog data to Digital signals – This process can be termed as digitization, which is done by
Pulse code modulation (PCM). Hence, it is nothing but digital modulation. As we nothing
but digital modulation.
 Digital data to Analog signals – The modulation techniques such as Amplitude shift keying
(ASK), Frequency shift keying (FSK), Phase Shift keying (FSK), etc., fall under the
category.
 Digital data to Digital Signals – There are several ways to map digital data to digital signals
such as Current-state Encoding, State transition encoding, Bi-phase coding.
1.22.Digital data to Digital Signals Encoding
 Current-state Encoding - In this coding method, data are encoding by the presence and absence of a
signal state.
o Unipolar Signal – When all the signal elements have the same algebraic sign.
o Polar signal – In Polar, one logic state is represented by a positive voltage level and the other by a
negative voltage level.
 State Transition Encoding – it use transitions in the signal to represent data, as opposed to encoding
data by means of a particular voltage level or state. A transition occurring from high to low voltage
could represent a 1, while a transition occurring from high to low voltage could represent a 0.
o Non return to Zero (NRZ) – It is used two different voltage levels for the two binary digits. There is
no Transition.
Akriit45@gmail.com..................................................15
o Non return to Zero Level (NRZL) – There is a change in the polarity of the signal, only when the
incoming signal changes from 1 to 0 or from 0 to 1. It is the same as NRZ; however, the first bit
of the input signal should have a change of polarity.
o Non Return to Zero-Invert (NRZI) – A variation of NRZ is known as NRZI. If a 1 occurs at the
incoming signal, then there occurs a transition at the beginning of the bit interval. For a 0 at the
incoming signal, there is no transition at the beginning of the bit interval.
NRZ codes has a disadvantage that the synchronization of the transmitter clock with the
receiver clock gets completely disturbed, when there is a string of 1s and 0s. Hence, a separate
clock line to be provided.
 Bi-phase Encoding – The signal level is checked twice for every bit time, both initially and in the
middle. Hence, the clock rate is double the data transfer rate and thus the modulation rate is also
doubled. The bandwidth required for this coding is greater.
o Bi-phase Manchester – the transition is done at middle of bit-interval. The transition is done at the
middle of the bit-interval. The transition for the resultant pulse is from High to Low in the
middle of the interval, for the input bit 1. While the transition is from Low  High for input bit
0.
o Differential Manchester – There always occurs a transition in the middle of the interval if there a
transition at the beginning of the bit interval, and then the input bit is 0. If no transition occurs
at the beginning of the bit interval, then the input bit is 1.
1.23.Classification of Modems
 Landline Modems – These are connected to Public switched Telephone Network. These are plugged
in RJ-11 jack port. These are classified into following types:
o Internal modems – These are installed within the computer, as interface cards. They use the
computer’s CPU power for encoding and decoding.
o External Modems – External Modems are installed as a separate hardware device, outside the
computer. They are more expensive than internal modems. They connect to the serial port on
the computer using a DB9 or DB25 connector. These are useful when several users need to
share a single modem.
o PCMCIA Modems – These are credit-card sized modems used in laptop computers. PCMCIA
stands for Personal Computer Memory Card International Association.
o Voice/data/fax Modems – These are used for transferring files, sending and receiving faxes and
voice mail using associated software.
Akriit45@gmail.com..................................................16
 Wireless Modems – These are radio transmitters computing devices used in mobile, laptop etc. they
are used private radio transmission network (such as RAM mobile Data and Ardis).
 LAN Modems – LAN modems allow shared remote access to Local Area Network resources. LAN
modem comes fully preconfigured for single particular network architecture such as Ethernet or
Token Ring. These are Network architecture supported, network protocol supported, client
platforms supported, memory requirements security etc.
1.24.Modem Protocols
 First packet switching interface.
 Issued in 1976 and revised in 1980, 1984, 1988, and 1992.
 X.25 Protocol – X.25 is an end to end protocol. It is as an interface between data terminal equipment
(DTE) and data circuit terminating equipment (DCE).
o X.25 is commonly used in wide area communications with multiple communicating devices.
o X.25 is a packet-switching protocol that defines the interface between a synchronous packet-
switching host computer and analog dedicated circuits or dial-up switched virtual circuit in the
voice-grade public data network.
o X.25 protocol specifies three layers. These are
 Layer 1 (Physical Layer) – It deals with the electrical, Mechanical, procedural and functional
connection between DTE and DCE.
 Layer 2 (LAPB) – The second level of X.25 deals with ensuring reliable communication DTE
and DCE, even though they may be connected by a noisy telephone line. The protocols
used are LAP (Link access Procedure) and LAPB (Link Access Procedure Balance). Thus,
this layer manages the link between the DTE and DCE.
X.25 uses subset of HDLC.
 Layer 3 (X.21 and others) – Layer 3 manages connections
between a pair of DTEs. Two forms of connections are
provided. These are:
 Virtual Calls – It is like an ordinary telephone call;
 Permanent Virtual Circuit – It is like leased line in the
sense that is always present.
 Triple-X Protocol – X.3, X.28 and X.29 protocols are collectively known as Triple-X protocols.
o Triple-X protocols are used to connect a dumb terminal to an X.25 network.
 A dumb terminal is any terminal that does not understand X.25 protocol.
o X.3 defines a Packet Assembler/Disassembler (PAD).
 PAD is required for connecting a dumb terminal to an X.25 network.
 PAD buffers the characters and assembles them into X.25 packets.
 When the packet arrives, PAD disassembles the packets into the original characters.
o X.28 defines the rules for communication between a dumb terminal and a PAD.
o X.29 defines relationship between a PAD and a remote terminal.
 Protocols used by Modem for Transferring Files
o XMODEM – XMODEM is a file transfer protocol used in telephone-line communication between
PCs. XMODEM protocol requires that one terminal or computer be set up as the sender and
other be set up as the receiver.
 XMODEM sends ASCII or binary data as 128 byte blocks with checksum block checking.
 Additional variations supported include XMODEMCRC (128 byte blocks with CRC block
checking), Xmomdem1K (1024 byte blocks with CRC block checking) and Xmodem1KG
(streaming Xmodem1K).
Akriit45@gmail.com..................................................17
 XMODEM sends no file name or file size information, simply the data. So it is up to each end to
know what file name to work with.
o YMODEM - YMODEM sends ASCII or binary data as 1024 byte blocks (similar to Xmodem1K) with
batch file support (multiple file and wildcarding). A variation of YMODEM supported includes
YMODEMG (streaming YMODEM).
 YMODEM does support simple file name and file size information sharing, unlike XMODEM.
o ZMODEM - ZMODEM sends ASCII or binary data as 1024 byte blocks with batch and streaming
capabilities, as well as the ability to restart a file transfer (available in most implementations).
Full file name and size and file management options exist.
 ZMODEM combines the features of both XMODEM and YMODEM.
o Kermit - Kermit sends ASCII or binary data as 80 byte blocks with several types of block
checking available. Kermit also supports batch, long blocks and windowing (this last improves
transfer times dramatically).
 The sender waits for a NAK before it starts transmission. It allows the transmission of control
characters as text.
1.25.Digital Subscriber Loop (DSL)
 The Digital Subscriber Line (DSL) technology was designed to provide high-speed data and video-on-demand
services to subscribers at speeds much faster than Integrated Services Digital Network (ISDN)
 DSL is not a specific digital line technology but rather a form of digital modem technology that defines the
signaling processes for high-speed, end to end digital transmission over the existing copper twisted-pair
wiring of the local loop.
 xDSL is the term for the Broadband Access technologies based on Digital Subscriber Line (DSL) technology
o “X” signifies that there are various flavors of DSL.
Types of DSL
 AsymmetricDigital Subscriber Line (ADSL) – It allocates
line bandwidth asymmetrically with downstream data
rate up to 9 Mbps and upstream rates of up to 640 Kbps,
depending on the implementation.
o There is a much higher bitrate made available for
downstream transmission – at the expense of the
upstream transmission rate.
 SymmetricDigital Subscriber Line (SDSL) - An SDSL line
provides for transport of digital data simultaneously in
both directions across the line – the same bitrate being
available in both directions (thus ‘symmetric’).
o SDSL connections typically allow transmission of up to
6 Mbit/s in both directions, but usually require a 4-
wire connection (equivalent to two standard
telephone lines).
 High Speed Digital Subscriber Line (HDSL) – It is a
particular type of SDSL – usually providing 2 Mbit/s
transmissions in both downstream and upstream
directions.
 Very High Speed Digital Subscriber Line (VHSDL) - It is able to operate at very high speed (e.g. up to 50
Mbit/s) over copper cable – but only over short distances. Typically VDSL is used in ‘hybrid’ networks,
comprising short copper cable connections from VDSL customer premises to locally placed street cabinets
and then by means of glass fiber to the network operator’s exchange building site (this type of hybrid
network is sometimes referred to as ‘fiber-to-the-curb’ (FTTC)).
Akriit45@gmail.com..................................................18
 XDSL is sometimes used as a generic term to mean ‘any type of DSL’. The ‘X’ stands in place of a letter making
up a recognized DSL abbreviation. Thus XDSL may be used as a short form to mean ‘any of: ADSL, HDSL,
SDSL, VDSL etc.)
Akriit45@gmail.com..................................................19
CHAPTER2
CommunicationNetworkFundamentals
2.1.Switching Techniques
 Switching is the technology allowing to get a message between the nodes of a network
 In this Technology nodes which are connected to one or more point-to-point links and work as switches. These
switches run software that forwards data received from one link to another PC.
 They have the responsibility to choose best path on which to send the data, so that it can reach its destination
in minimum amount of time. Such nodes form switched networks.
 There are five typical switching techniques available for digital traffic.
o Circuit Switching
o Message Switching
o Packet Switching
o Cell Switching
o Hybrid Switching
1. Circuit Switching
 Circuit switching is a technique that directly connects the sender and the receiver in an unbroken path.
 Telephone switching equipment, for example, establishes a path that connects the caller's telephone to the
receiver's telephone by making a physical connection.
 With this type of switching technique, once a connection is established, a dedicated path exists between both
ends until the connection is terminated.
 Routing decisions must be made when the circuit is first established, but there are no decisions made after that
time.
 Advantages:
o The communication channel (once established) is dedicated.
 Disadvantages:
o Possible long wait to establish a connection, (10 seconds, more on long- distance or international calls.)
during which no data can be transmitted.
o More expensive than any other switching techniques, because a dedicated path is required for each
connection.
o Inefficient use of the communication channel, because the channel is not used when the connected systems
are not using it.
2. Message Switching
 With message switching there is no need to establish a
dedicated path between two stations.
 When a station sends a message, the destination address
is appended to the message.
 The message is then transmitted through the network, in
its entirety, from node to node.
 Each node receives the entire message, stores it in its
entirety on disk, and then transmits the message to the
next node.
 This type of network is called a store-and-forward
network.
 A message-switching node is typically a general-purpose
computer. The device needs sufficient secondary-
storage capacity to store the incoming messages, which
could be long. A time delay is introduced using this type
Akriit45@gmail.com..................................................20
of scheme due to store- and-forward time, plus the time required to find the next node in the transmission
path.
 Advantages:
o Channel efficiency can be greater compared to circuit-switched systems, because more devices are
sharing the channel.
o Traffic congestion can be reduced, because messages may be temporarily stored in route.
o Message priorities can be established due to store-and-forward technique.
o Message broadcasting can be achieved with the use of broadcast address appended in the message.
 Disadvantages
o Message switching is not compatible with interactive applications.
o Store-and-forward devices are expensive, because they must have large disks to hold potentially long
messages
3. Packet Switching
 Packet switching can be seen as a solution that tries to combine the advantages of message and circuit
switching and to minimize the disadvantages of both.
 There are two methods of packet switching: Datagram and virtual circuit.
 In both packet switching methods, a message is broken into small parts, called packets.
 Each packet is tagged with appropriate source and destination addresses.
 Since packets have a strictly defined maximum length, they can be stored in main memory instead of disk;
therefore access delay and cost are minimized.
 Also the transmission speeds, between nodes, are optimized.
 With current technology, packets are generally accepted onto the network on a first-come, first-served
basis. If the network becomes overloaded, packets are delayed or discarded (``dropped'').
Datagram Packet Switching
o Datagram packet switching is similar to message switching in that each packet is a self-contained unit
with complete addressing information attached.
o This fact allows packets to take a variety of possible paths through the network.
o So the packets, each with the same destination address, do not follow the same route, and they may arrive
out of sequence at the exit point node (or the destination).
o Reordering is done at the destination point based on the sequence number of the packets.
o It is possible for a packet to be destroyed if one of the nodes on its way is crashed momentarily. Thus all its
queued packets may be lost.
Virtual Circuit Packet Switching
o In the virtual circuit approach, a preplanned route is established before any data packets are sent.
o A logical connection is established when a sender send a "call request packet" to the receiver and the
receiver send back an acknowledge packet "call accepted packet" to the sender if the receiver agrees on
conversational parameters.
o The conversational parameters can be maximum packet sizes, path to be taken, and other variables
necessary to establish and maintain the conversation.
o Virtual circuits imply acknowledgements, flow control, and error control, so virtual circuits are reliable.
o That is, they have the capability to inform upper-protocol layers if a transmission problem occurs.
 Advantages:
o Packet switching is cost effective, because switching devices do not need massive amount of secondary
storage.
o Packet switching offers improved delay characteristics; because there are no long messages in the queue
(maximum packet size is fixed).
o Packet can be rerouted if there is any problem, such as, busy or disabled links.
o The advantage of packet switching is that many network users can share the same channel at the same
time. Packet switching can maximize link efficiency by making optimal use of link bandwidth.
 Disadvantages:
o Protocols for packet switching are typically more complex.
Akriit45@gmail.com..................................................21
o It can add some initial costs in implementation.
o If packet is lost, sender needs to retransmit the data.
o Another disadvantage is that packet-switched systems still can’t deliver the same quality as dedicated
circuits in applications requiring very little delay - like voice conversations or moving images.
4. Cell Switching (Asynchronous Transfer Mode)
o Many of the problems associated with packet switching are solved by adopting a concept called Cell
Switching.
 A Cell is a small data unit of fixed size unlike packets which have variable sizes.
o A cell switching technology that allows voice, data, image, and video traffic to be combined into evenly
sized cells for high-speed transmission over one access circuit.
o This means that all the information sent over an ATM network is broken down into discrete packets.
o Each 53 byte cell contains 48 bytes of payload and 5 bytes of control information.
o Because the cells are all the same size, cell delay at ATM switches is more predictable and manageable.
o The aim of ATM switch design is to increase speed, capacity and overall performance.
o ATM switching differs from conventional switching because of the high-speed interfaces (50 Mbps to 2.4
Gbps) to the switch, with switching rates up to 80 Gbps in the backplane.
o ATM was designed specifically to handle broadband applications efficiently and at the same time let users
give certain types of traffic priority treatment on the network.
 Cell Format
o User-Network Interface (UNI)
– host-to-switch format
– GFC: Generic Flow Control (still being defined)
– VCI: Virtual Circuit Identifier
– VPI: Virtual Path Identifier
– Type: management, congestion control, AAL5 (later)
– CLPL Cell Loss Priority
– HEC: Header Error Check (CRC-8)
2.2. Open Systems Interconnection (OSI) Model
 International standard organization (ISO) established a committee in 1977 to develop architecture for
computer communication.
 In 1984, the Open Systems Interconnection (OSI) reference model was approved as an international standard
for communications architecture.
 Term “open” denotes the ability to connect any two systems which conform to the reference model and
associated standards.
 The OSI model describes how information or data makes its way from application programmes (such as
spreadsheets) through a network medium (such as wire) to another application programmer located on
another network.
 The OSI reference model divides the problem of moving information between computers over a network
medium into SEVEN smaller and more manageable problems.
 This separation into smaller more manageable functions is known as layering.
Akriit45@gmail.com..................................................22
1. Physical Layer
o Provides physical interface for transmission of information.
o Defines rules by which bits are passed from one system to another on a physical communication medium.
o Covers all - mechanical, electrical, functional and procedural - aspects for physical communication.
o Such characteristics as voltage levels, timing of voltage changes, physical data rates, maximum
transmission distances, physical connectors, and other similar attributes are defined by physical layer
specifications.
2. Data Link Layer
o Data link layer attempts to provide reliable communication over the physical layer interface.
o Breaks the outgoing data into frames and reassemble the received frames.
o Create and detect frame boundaries.
o Handle errors by implementing an acknowledgement and retransmission scheme.
o Implement flow control.
o Supports points-to-point as well as broadcast communication.
o Supports simplex, half-duplex or full-duplex communication.
3. Network Layer
o Implements routing of frames (packets) through the network.
o Defines the most optimum path the packet should take from the source to the destination
o Defines logical addressing so that any endpoint can be identified.
o Handles congestion in the network.
o Facilitates interconnection between heterogeneous networks (Internetworking).
o The network layer also defines how to fragment a packet into smaller packets to accommodate different
media.
4. Transport Layer
o Purpose of this layer is to provide a reliable mechanism for the exchange of data between two processes in
different computers.
o Ensures that the data units are delivered error free.
o Ensures that data units are delivered in sequence.
o Ensures that there is no loss or duplication of data units.
o Provides connectionless or connection oriented service.
Akriit45@gmail.com..................................................23
o Provides for the connection management.
o Multiplex multiple connections over a single channel.
5. Session Layer
o Session layer provides mechanism for controlling the dialogue between the two end systems. It defines
how to start, control and end conversations (called sessions) between applications.
o This layer requests for a logical connection to be established on an end-user’s request.
o Any necessary log-on or password validation is also handled by this layer.
o Session layer is also responsible for terminating the connection.
o This layer provides services like dialogue discipline which can be full duplex or half duplex.
o Session layer can also provide check-pointing mechanism such that if a failure of some sort occurs between
checkpoints, all data can be retransmitted from the last checkpoint.
6. Presentation Layer
o Presentation layer defines the format in which the data is to be exchanged between the two communicating
entities.
o Also handles data compression and data encryption (cryptography).
7. Application Layer
o Application layer interacts with application programs and is the highest level of OSI model.
o Application layer contains management functions to support distributed applications.
o Examples of application layer are applications such as file transfer, electronic mail, remote login etc.
2.3.Internet Protocol Suite (TCP/IP Model)
o Internet uses TCP/IP protocol suite, also known as Internet suite. This defines Internet Model which
contains four layered architecture. OSI Model is general communication model but Internet Model
is what the internet uses for all its communication. The internet is independent of its underlying
network architecture so is its Model.
o This model has the following layers:
1. Application Layer: This layer defines the protocol which
enables user to interact with the network. For example,
FTP, HTTP etc.
2. Transport Layer: This layer defines how data should flow
between hosts. Major protocol at this layer is Transmission
Control Protocol (TCP). This layer ensures data delivered
between hosts is in-order and is responsible for end-to-end
delivery.
3. Internet Layer: Internet Protocol (IP) works on this layer.
This layer facilitates host addressing and recognition. This
layer defines routing.
4. Link Layer: This layer provides mechanism of sending and receiving actual data. Unlike its OSI
Model counterpart, this layer is independent of underlying network architecture and hardware.
2.4. LAN topologies
 Logical
o Describes the possible connections between pairs of networked end-points that can communicate
 Physical
o The physical topology of a network refers to the configuration of cables, computers and other peripherals.
o The main types of network topologies are:
1. Bus topology
o A linear bus topology consists of a main run of cable with a terminator at each end. All servers’
workstations and peripherals are connected to the linear cable.
o Advantages of Bus topology
 Easy to implement and extend
Akriit45@gmail.com..................................................24
 Well suited for temporary networks that must be set up in a hurry
 Typically the least cheapest topology to implement
 Failure of one station does not affect others
o Disadvantages of Bus topology
 Difficult to administer/troubleshoot
 Limited cable length and number of stations
 A cable break can disable the entire network; no
redundancy
 Maintenance costs may be higher in the long run
 Performance degrades as additional computers are added
2. Ring Topology
o started out as a simple peer-to-peer LAN topology
o Each networked workstation had two connections: one to each of its nearest
neighbors
o Data was transmitted unidirectional around the ring
o Sending and receiving of data takes place by the help of TOKEN
o Advantages of Ring topology
 This type of network topology is very organized
 Performance is better than that of Bus topology
 No need for network server to control the connectivity between workstations
 Additional components do not affect the performance of network
 Each computer has equal access to resources
o Disadvantages of Ring topology
 Each packet of data must pass through all the computers between source and destination, slower than
star topology
 If one workstation or port goes down, the entire network gets affected
 Network is highly dependent on the wire which connects different components
3. Star Topology
o A star network is designed with each node (file server, workstation,
peripheral) connected directly to a central network hub or server
o Have connections to networked devices that “radiate” out form a
common point
o Each networked device in star topology can access the media
independently
o Have become the dominant topology type in contemporary LANs
o Stars have made buses and rings obsolete in LAN topologies
o Advantages of star topology
 Compared to Bus topology it gives far much better performance
 Easy to connect new nodes or devices
 Centralized management. It helps in monitoring the network
 Failure of one node or link doesn’t affect the rest of network
o Disadvantages of star topology
 If central device fails whole network goes down
 The use of hub, a router or a switch as central device increases the overall cost of the network
 Performance and as well number of nodes which can be added in such topology is depended on
capacity of central device.
4. Tree Topology
o Also known as Hierarchical Topology, this is the most common form of network topology in use
presently.
Akriit45@gmail.com..................................................25
o This topology imitates as extended Star topology and inherits properties of Bus topology.
o This topology divides the network into multiple levels/layers of network. Mainly in LANs, a network is
bifurcated into three types of network devices.
o The lowermost is access-layer where computers are attached.
o The middle layer is known as distribution layer, which works as mediator between upper layer and
lower layer.
o The highest layer is known as core layer, and is central point of the network, i.e. root of the tree from which
all nodes fork.
o All neighboring hosts have point-to-point connection between them. Similar to the Bus topology, if the root
goes down, then the entire network suffers even though it is not the single point of failure.
o Every connection serves as point of failure, failing of which divides the network into unreachable segment.
5. Mesh Topology
o In this type of topology, a host is connected to one or multiple hosts.
o This topology has hosts in point-to-point connection with every other host or may also have hosts which
are in point-to-point connection with few hosts only.
o Hosts in Mesh topology also work as relay for other hosts which do not have direct point-to-point links.
Mesh technology comes into two types:
o Full Mesh: All hosts have a point-to-point connection to every other host in the network. Thus for every
new host n(n-1)/2 connections are required. It provides the most reliable network structure among
all network topologies.
o Partially Mesh: Not all hosts have point-to-point connection to every other host. Hosts connect to each
other in some arbitrarily fashion. This topology exists where we need to provide reliability to some
hosts out of all.
6. Daisy Chain
o This topology connects all the hosts in a linear fashion. Similar to Ring topology, all hosts are connected to
two hosts only, except the end hosts. Means, if the end hosts in daisy chain are connected then it
represents Ring topology.
o Each link in daisy chain topology represents single point of failure. Every link failure splits the network into
two segments. Every intermediate host works as relay for its immediate hosts.
7. Hybrid Topology
o A network structure whose design contains more than one
topology is said to be hybrid topology. Hybrid topology
inherits merits and demerits of all the incorporating
topologies.
o The combining topologies may contain attributes of Star,
Ring, Bus, and Daisy-chain topologies. Most WANs are
connected by means of Dual-Ring topology and networks connected to them are mostly Star topology
networks. Internet is the best example of largest Hybrid topology.
Akriit45@gmail.com..................................................26
CHAPTER3
Media access Control
3.1. MAC Layer – Media Access Control Layer Protocols
 The Media Access Control (MAC) data communication Networks protocol sub-layer, also known as the Medium
Access Control, is a sub-layer of the data link layer specified in the seven-layer OSI model.
 The medium access layer was made necessary by systems that share a common communications medium.
 Typically these are local area networks.
 The MAC layer is the "low" part of the second OSI layer, the layer of the "data link".
 In fact, the IEEE divided this layer into two layers "above" is the control layer the logical connection (Logical
Link Control, LLC) and "down" the control layer the medium access (MAC).
3.2. ALOHA
 ALOHA is a system for coordinating and arbitrating access to a shared communication Networks channel.
 It was developed in the 1970s by Norman Abramson and his colleagues at the University of Hawaii.
 The original system used for ground based radio broadcasting, but the system has been implemented in
satellite communication systems.
 ALOHA requires a method of handling collisions that occur when two or more systems attempt to transmit on
the channel at the same time.
 Aloha means "Hello". Aloha is a multiple access protocol at the data link layer and proposes how multiple
terminals access the medium without interference or collision.
 There are two different types of ALOHA:
 Pure ALOHA
o In pure ALOHA, the stations transmit frames whenever they have data to send.
o When two or more stations transmit simultaneously, there is collision and the frames are destroyed.
o In pure ALOHA, whenever any station transmits a frame, it expects the acknowledgement from the
receiver.
o If acknowledgement is not received within specified time, the station assumes that the frame (or
acknowledgement) has been destroyed.
o If the frame is destroyed because of collision the station waits for a random amount of time and sends it
again. This waiting time must be random otherwise same frames will collide again and again.
o Therefore pure ALOHA dictates that when time-out period passes, each station must wait for a random
amount of time before resending its frame. This randomness will help avoid more collisions.
o Slotted ALOHA
Akriit45@gmail.com..................................................27
o Slotted ALOHA was invented to improve the efficiency of pure ALOHA as chances of collision in pure
ALOHA are very high.
o In slotted ALOHA, the time of the shared channel is divided into discrete intervals called slots.
o The stations can send a frame only at the beginning of the slot and only one frame is sent in each slot.
o In slotted ALOHA, if any station is not able to place the frame onto the channel at the beginning of the slot
i.e. it misses the time slot then the station has to wait until the beginning of the next time slot.
o In slotted ALOHA, there is still a possibility of collision if two stations try to send at the beginning of the
same time slot as shown in fig.
o Slotted ALOHA still has an edge over pure ALOHA as chances of collision are reduced to one-half.
3.3. Carrier Sensed Multiple Access (CSMA)
o CSMA is a network access method used on shared network topologies such as Ethernet to control access to
the network.
o Devices attached to the network cable listen (carrier sense) before transmitting. If the channel is in use,
devices wait before transmitting.
o MA (Multiple Access) indicates that many devices can connect to and share the same network. All devices
have equal access to use the network when it is clear.
o Even though devices attempt to sense whether the network is in use, there is a good chance that two
stations will attempt to access it at the same time.
o On large networks, the transmission time between one end of the cable and another is enough that one
station may access the cable even though another has already just accessed it.
There are two methods for avoiding these so-called collisions, listed here:
o CSMA/CD (Carrier Sense Multiple Access/Collision Detection)
 CD (collision detection) defines what happens when two devices sense a clear channel, then attempt
to transmit at the same time.
 A collision occurs, and both devices stop transmission, wait for a random amount of time, and then
retransmit.
 This is the technique used to access the 802.3 Ethernet network channel.
 This method handles collisions as they occur, but if the bus is constantly busy, collisions can occur so
often that performance drops drastically.
 It is estimated that network traffic must be less than 40 percent of the bus capacity for the network to
operate efficiently.
 If distances are long, time lags occur that may result in inappropriate carrier sensing, and hence
collisions.
o CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance)
 In CA (collision avoidance), collisions are avoided because each node signals its intent to transmit
before actually doing so.
 In CSMA/CA, once the channel is clear, stations not to transmit, and then sends its packet.
 This method is not popular because it requires excessive overhead that reduces performance.
3.4. Multiple Access Techniques
 Multiple access techniques are used to allow a large number of mobile users to share the allocated spectrum in
the most efficient manner.
 As the spectrum is limited, so the sharing is required to increase the capacity of cell or over a geographical area
by allowing the available bandwidth to be used at the same time by different users.
 And this must be done in a way such that the quality of service doesn’t degrade within the existing users.
Multiple Access Techniques for Wireless Communication
 A cellular system divides any given area into cells where a mobile unit in each cell communicates with a base
station. The main aim in the cellular system design is to be able to increase the capacity of the channel i.e. to
handle as many calls as possible in a given bandwidth with a sufficient level of quality of service.
 There are several different ways to allow access to the channel. These includes mainly the following:
Frequency division multiple-access (FDMA)
Akriit45@gmail.com..................................................28
o This was the initial multiple-access technique for cellular systems in which each individual user is assigned
a pair of frequencies while making or receiving a call.
o One frequency is used for downlink and one pair for uplink.
o This is called frequency division duplexing (FDD). That allocated frequency pair is not used in the same cell
or adjacent cells during the call so as to reduce the co channel interference.
o The FDMA channel carries only one phone circuit at a time. If an FDMA channel is not in use, then it sits idle
and it cannot be used by other users to increase share capacity.
Time division multiple-access (TDMA)
o In digital systems, continuous transmission is not required because users do not use the allotted
bandwidth all the time.
o In such cases, TDMA is a complimentary access technique to FDMA. Global Systems for Mobile
communications (GSM) uses the TDMA technique.
o In TDMA, the entire bandwidth is available to the user but only for a finite period of time. In most cases the
available bandwidth is divided into fewer channels compared to FDMA and the users are allotted time
slots during which they have the entire channel bandwidth at their disposal.
o TDMA requires careful time synchronization since users share the bandwidth in the frequency domain. The
number of channels are less, inter channel interference is almost negligible. TDMA uses different time
slots for transmission and reception.
o This type of duplexing is referred to as Time division duplexing (TDD).
o TDMA shares a single carrier frequency with several users where each user makes use of non-overlapping
time slots.
o The number of time slots per frame depends on several factors such as modulation technique, available
bandwidth etc.
Code division multiple-access (CDMA)
o In CDMA, the same bandwidth is occupied by all the users, however they are all assigned separate codes,
which differentiates them from each other.
o CDMA utilize a spread spectrum technique in which a spreading signal (which is uncorrelated to the signal
and has a large bandwidth) is used to spread the narrow band message signal.
o all terminals send on same frequency at the same time using ALL the bandwidth of transmission channel
o Each sender has a unique random number, sender XORs the signal with this random number the receiver
can “tune” into this signal if it knows the pseudo random number.
Akriit45@gmail.com..................................................29
CHAPTER4
NetworkComponents
4.1. Transmission media
o Transmission media is a pathway that carries the information from sender to receiver. We use different
types of cables or waves to transmit data. Data is transmitted normally through electrical or
electromagnetic signals.
o The data transmission capabilities of various Medias vary differently depending upon the various factors.
These factors are
o Bandwidth. It refers to the data carrying capacity of a channel or medium. Higher bandwidth
communication channels support higher data rates.
o Radiation. It refers to the leakage of signal from the medium due to undesirable electrical characteristics
of the medium.
o Noise Absorption. It refers to the susceptibility of the media to external electrical noise that can cause
distortion of data signal.
o Attenuation. It refers to loss of
energy as signal propagates
outwards. The amount of energy
lost depends on frequency.
Radiations and physical
characteristics of media
contribute to attenuation.
4.2. Guided Media
Twisted pair
o The pair of twisted is the simplest transmission medium. It consists of one or more pairs of electrical son
arranged spiral.
o This type of support is suitable for transmission both analog and digital.
o A twisted pair consists of two copper wires about 1 mm thick.
o These two wires are individually contained in a plastic insulation and are twisted together in a helical form.
o Polyethylene, polyvinyl chloride, flour polymer resin and Teflon(r) are some of the substances that are
used for insulation purposes
o The most common application of twisted pair cable IS m telephone system.
o Twisted pair is distance limited. As distance between network element increases, attenuation increases
and quality decreases at a given frequency.
Why to twistthe wires?
o Twisting of wires will reduce the effect of noise or external interference.
o Number of twists per unit length will determine the quality of cable. More twists means better quality.
The two types of twisted pairs are:
 Unshieldedtwistedpair(UTP)
o It consists of color-coded copper
wires, but does not include any foil
or braiding as insulator to protect
against interference.
o Wire pairs within each cable have
varied amounts of twists per foot to
produce cancellation.
 Shieldedtwistedpair(STP)
o TP is made up of pairs of copper wires that are twisted together.
o The pairs are covered in a foil or braided mesh, as well as outer PVC jacket.
Akriit45@gmail.com..................................................30
o This foil or mesh prevents the penetration of electromagnetic noise and eliminate cross talk.
o This shielding must be grounded to prevent the foil or braided mesh from becoming a magnet for
electricity.
Advantages ofTwisted paircable
o It can be used to carry both analog and digital data.
o It is relatively easy to implement and terminate.
o It is the least expensive media of transmission for short distances.
o If portion of a twisted pair cable is damaged it does not affect the entire network.
Disadvantages ofTwisted paircable
o It offers poor noise immunity as a result signal distortion is more?
o Attenuation is very high.
o It supports lower bandwidth as compared to other Medias. It supports 10 mbps up to a distance of 100
meters on a 10BASE-T.
o It offers very poor security and is relatively easy to tap.
o Being thin in size, they are likely to break easily.
Co-axial Cable
o Coaxial cables are the guided media that cranes the signal of higher frequency range compared to twisted
pair cable.
o Coaxial cables are also called coax. (Short form).
o Two types of coaxial cables are widely used: 50 ohm cable and 75 ohm cable.
o 50 ohm cable is used for digital transmission and 75 ohm cable is used for analog transmission.
o Due to the shield provided, this cable has excellent noise immunity.
o It has a large bandwidth and low losses.
o Co-axial cables are easy to install.
o They are often installed either in a device to device daisy chain (Ethernet) or a star (ARC net).
Advantages ofCoaxialCables
o It can be used for both analog and digital transmission.
o It offers higher bandwidth as compared to twisted pair cable and
can span longer distances.
o Because of better shielding in coaxial cable, loss of signal or
attenuation is less.
o Better shielding also offers good noise immunity.
o It is relatively inexpensive as compared to optical fibers.
o It has lower error rates as compared to twisted pair.
o It is not as easy to tap as twisted pair because copper wire is
contained in plastic jacket.
Disadvantages of Coaxial Cables
o It is usually more expensive than twisted pair.
Optical Fibers
o Optical fiber consists of thin glass fibers or plastic that can carry information at frequencies in the visible
light spectrum and beyond.
o The typical optical fiber consists of a very narrow strand of glass called the core.
o The core is a concentric layer of glass called the cladding.
o An optical transmission system has three basic components
 Light source: In such a system a pulse of light indicates bit 1 and the absence of light indicates bit Light
source can be an LED or a laser beam.
 Transmission medium: Transmission medium is the ultra-thin fiber of glass.
 Detector: A detector generates an electrical pulse when the light falls on it.
o The loss in signal power as light travels down the fiber is called attenuation.
o An important characteristic of fiber optics is refraction. Refraction is the characteristic of a material to
either pass or reflect light.
Akriit45@gmail.com..................................................31
Advantages of Optical Fiber
o They are not affected by electrical and magnetic interference as the data travel in form of light.
o Optical fiber offers higher bandwidth than twisted pair or coaxial cable.
o Optical fibers are thin, lighter in weight and small in size as compared to other wired Medias. It is easier to
group several optical fibers in one bundle.
o Glass is more resistant to corrosive materials as compared to copper. Hence can be laid in different
environments.
o In optical fibers, attenuation (loss of signal) is very low. Therefore these fibers can run several kilometers
without amplification.
o Fibers do not leak light and are quite difficult to tap. So they provide security against potential wire
tappers.
o There is no cross-talk problem in optical fibers.
o They are highly suitable for environments where speed is needed with full accuracy.
Disadvantages of Optical Fiber
o Fiber optics cables are fragile i.e. more easily broken than wires.
o Being fragile, optical fibers need to be put deep into the land. This causes a lot of installation cost. Also the
interface used for these fibers are expensive.
o Optical fibers are unidirectional for two-way communication, two fibers are required.
o It is a newer technology and requires skilled people to administer and maintain them.
Characteristics of Optical Fiber Cables:
o Fiber optic cabling can provide extremely high bandwidths in the range from 100 mbps to 2 gigabits
because light has a much higher frequency than electricity.
o The number of nodes which a fiber optic can support does not depend on its length but on the hub or hubs
that connect cables together.
o Fiber optic cable has much lower attenuation and can carry signal to longer distances without using
amplifiers and repeaters in between.
o Fiber optic cable is not elected by EMI effects and can be used in areas where high voltages are passing by.
o The cost of fiber optic cable is more compared to twisted pair and co-axial.
o The installation of fiber optic cables is difficult and tedious.
Applications:
o Optical fiber transmission systems are widely used in the backbone of networks. Current optical fiber
systems provide transmission rates from 45 Mb/s to 9.6 GB/s using the single wavelength transmission.
o The installation cost of optical fibers is higher than that for the co-axial or twisted wire cables.
o Optical fibers are now used in the telephone systems.
4.3. Unguided Media
o Wireless or Unguided Media or Unbound Transmission Media: Unbound transmission media are the ways
of transmitting data without using any cables.
o These media are not bounded by physical geography. This type of transmission is called Wireless
communication.
o Nowadays wireless communication is becoming popular. Wireless LANs are being installed in office and
college campuses.
o This transmission uses Microwave, Radio wave, Infra-red are some of popular unbound transmission
media.
o When an antenna is attached to electrical circuit of a computer or wireless device, it converts the digital
data into wireless signals and spread all over within its frequency range.
o The receptor on the other end receives these signals and converts them back to digital data.
Radio Transmission
o Radio frequency is easier to generate and because of its large wavelength it can penetrate through walls
and structures alike.
o Radio waves can have wavelength from 1km – 100,000km and have frequency ranging from 3Hz
(Extremely Low Frequency) to 300 GHz (Extremely High Frequency).
o Radio frequencies are sub-divided into six bands.
Akriit45@gmail.com..................................................32
o Radio waves at lower frequencies can travel through walls whereas higher RF can travel in straight line
and bounce back.
o The power of low frequency waves decreases sharply as they cover long distance. High frequency radio
waves have more power.
o Lower frequencies such as VLF, LF, MF bands can travel on the ground up to 1000 kilometers, over the
earth’s surface.
o Radio waves of high frequencies are prone to be absorbed by rain and other obstacles.
o They use Ionosphere of earth atmosphere. High frequency radio waves such as HF and VHF bands are
spread upwards. When they reach Ionosphere, they are refracted back to the earth.
Very High Frequency (VHF)
o It is the ITU designation for the range of radio frequency electromagnetic waves (radio waves) from 30
MHz to 300 MHz with corresponding wavelengths of ten to one meters.
o Common uses for VHF are FM radio broadcasting. TV broadcasting, to way land mobile radio systems
(emergency, business, private use and military), long range data communication up to several tens of
kilometers with radio modems, amateur radio, and marine communication, Air Traffic Control.
Ultra High frequency (UHF)
o It is the ITU designation for radio frequencies in the range between 300 MHz and 3 GHz, also known as the
decimeter band as the wavelengths range from one meter to one decimeter.
o Radio waves with frequencies above the UHF radio waves propagate mainly by line of sight; they are
blocked by hills and large building although the transmission through buildings walls is strong enough
for indoor reception.
o They are used TV broadcasting, cell phones, satellite communication including GPS, personal radio services
including Wi-Fi and Bluetooth, walkie-talkies, cordless phones.
Microwave Transmission
 Electromagnetic waves above 100MHz tend to travel in a straight line and signals over them can be sent by
beaming those waves towards one particular station. Because Microwaves travels in straight lines, both
sender and receiver must be aligned to be strictly in line-of-sight.
 Microwaves can have wavelength ranging from 1mm – 1meter and frequency ranging from 300MHz to 300GHz.
 Microwave antennas concentrate the waves making a beam of it. As shown in picture above, multiple antennas
can be aligned to reach farther. Microwaves have higher frequencies and do not penetrate wall like
obstacles.
 Microwave transmission depends highly upon the weather conditions and the frequency it is using.
Infrared Transmission
 Infrared wave lies in between visible light spectrum and microwaves. It has wavelength of 700nm to 1mm and
frequency ranges from 300GHz to 430THz.
 Infrared wave is used for very short range communication purposes such as television and it’s remote. Infrared
travels in a straight line hence it is directional by nature. Because of high frequency range, Infrared cannot
cross wall-like obstacles.
Light Transmission
 Highest most electromagnetic spectrum which can be used for data transmission is light or optical signaling.
This is achieved by means of LASER.
 Because of frequency light uses, it tends to travel strictly in straight line. Hence the sender and receiver must be
in the line-of-sight. Because laser transmission is unidirectional, at both ends of communication the laser
and the photo-detector need to be installed. Laser beam is generally 1mm wide hence it is a work of
precision to align two far receptors each pointing to lasers source.
 Laser works as TX (transmitter) and photo-detectors works as Rx (receiver).
 Lasers cannot penetrate obstacles such as walls, rain, and thick fog. Additionally, laser beam is distorted by
wind, atmosphere temperature, or variation in temperature in the path.
 Laser is safe for data transmission as it is very difficult to tap 1mm wide laser without interrupting the
communication channel.
Akriit45@gmail.com..................................................33
4.4. Networking Components and Devices
Hubs
o Hubs receive signals through one port and send them through all other ports.
o Hubs generally have 4 – 24 Rj-45 ports for twisted-pair cabling.
o Hub has indicator lights to indicate the status of the port link status, collisions, and so on.
o That is, a LAN configures with hubs physically falls under the category of star type topology.
o However, logically, it falls under the category of a bus type topology.
o Commercially available hubs normally have eight or sixteen ports.
o Passive hub simply forwards any data packets they receive over one port from one workstation to all their
remaining ports.
o Active hubs, also sometimes referred to as "multiport repeaters", regenerate the data bits in order to
maintain a strong signal.
Bridges:
o The bridge function is to connect separate homogeneous networks.
o Bridges map the Ethernet address of the nodes residing on each network segment and allow only
necessary traffic to pass through the bridge.
o When a packet is received by the bridge, the bridge determines the destination and source segments.
o If the segments are different, then the packet is "forwarded" to the correct segment.
o Bridges are also called "store-and-forward" device because they look at the whole Ethernet packet before
making filtering or forwarding decisions.
Router:
o Routing achieved commercially popularity in the mid – 1980s – at a time when large-scale Internetworking
began to replace the fairly simple, homogeneous environments.
o Routing is the act of moving information across an Internetwork from a source to a destination.
o It is often contrasted with bridging, which perform a similar function.
o Routers use information within each packet to route it from one LAN to another, and communicate with
each other and share information that allows them to determine the best route through a complex
network of many LANs.
Switches:
o LAN switches are an expansion of the concept in LAN bridging, which controls data flow, handles
transmission errors, provides physical addressing, and manages access to the physical medium.
o Switches provide these functions by using various link-layer protocols.
o LAN switches can link four, six, ten or more networks together.
o A store-and-forward switch, on the other hand, accepts and analyses the entire packet before forwarding it
to its destination.
Transceivers:
o Transceivers are used to connect nodes to the various Ethernet media.
o Most computers and network interface cards contain a built-in 10BaseT or 10Base2 transceiver, allowing
them to be connected directly to Ethernet without requiring an external transceiver.
o Many Ethernet devices provide an AUI connector to allow the user to connect to any media type via an
external transceiver.
Gateway:
o A computer that a control the traffic of your LAN or your ISP receives is a Gateway. A server serves as a
Gateway, the gateway also works as a firewall and a proxy server.
o A Gateway is a device such as a mini or microcomputer capable of operating on a stand-alone basis but
which also provides connection for communication with the other computers and access to shared
resources.
o Normally a gateway is associated with a router. A router is a device that lets you know the next network
data should be sent to next. A router can be connected to more than one network at a time.
Akriit45@gmail.com..................................................34
o A gateway is associated with a router because a router which uses headers and forwarding tables to figure
out where packets or data is sent provides the path through which information is sent in and out a
gateway.
Akriit45@gmail.com..................................................35
CHAPTER5
Link Control and MAC Protocols
5.1. Data link control (DLC)
o The two main functions of the data link layer are :-
1- Data link control (deals with the design and procedures for communication between two adjacent
nodes: node-to-node communication).
2- Media access control (deals how share the link).
o Data link control functions include framing, flow and error control, and software implemented protocols
that provide smooth and reliable transmission of frames between nodes.
5.2. Framing:
The data link layer needs to pack bits into frames, so that each frame is distinguishable from another.
o Our postal system practices a type of framing. The simple act of inserting a letter into an envelope
separates one piece of information from another; the envelope serves as the delimiter.
o Framing in the data link layer separates a message from one source to a destination, or from other
messages to other destinations, by adding a sender address and a destination address.
o The destination address defines where the packet is to go; the sender address helps the recipient
acknowledge the receipt.
Frames can be of fixed or variable size.
 Fixed-SizeFraming
o There is no need for defining the boundaries of the frames; the size itself can be used as a delimiter.
o An example of this type of framing is the ATM wide-area network, which uses frames of fixed size called
cells.
 Variable-SizeFraming
o We need a way to define the end of the frame and the beginning of the next.
Two approaches were used for this purpose:
I. Character-oriented approach
o Data to be carried are 8-bit characters from a coding system such as ASCII. The header, which normally
carries the source and destination addresses and other control information, and the trailer, which
carries error detection or error correction redundant bits, are also multiples of 8 bits.
o
o To separate one frame from the next, an 8-bit (1-byte) flag is added at the beginning and the end of a frame.
The flag, composed of protocol-dependent special characters, signals the start or end of a frame.
II. Bit-oriented approach
o The data section of a frame is a sequence of bits to be interpreted by the upper layer as text, graphic, audio,
video, and so on. However, in addition to headers (and possible trailers), we still need a delimiter to
separate one frame from the other.
o Most protocols use a special 8-bit pattern flag 01111110 as the delimiter to define the beginning and the
end of the frame
o
5.3. Flow and Error Control
o The most important responsibilities of the data link layer are flow control and error control. Collectively,
these functions are known as data link control.
Akriit45@gmail.com..................................................36
o Flow control refers to a set of procedures used to restrict the amount of data that the sender can send
before waiting for acknowledgment.
o Error control is both error detection and error correction. It allows the receiver to tell the sender of any
frames lost or damaged in transmission and coordinates the retransmission of those frames by the
sender.
o The protocols are normally implemented in software by using one of the common programming
languages.
 Noiseless channels
o Simplest Protocol
o It is a unidirectional protocol in which data frames are traveling in only one direction-from the sender to
receiver.
o The receiver can immediately handle any frame it receives with a processing time that is small enough to
be negligible.
o The data link layer of the receiver immediately removes the header from the frame and hands the data
packet to network layer, which can also accept the packet immediately.
o Stop-and-Wait Protocol
o If data frames arrive at the receiver site faster than they can be processed, the frames must be stored until
their use. Normally, the receiver does not have enough storage space, especially if it is receiving data
from many sources.
o We need to tell the sender to slow down. There must be feedback from the receiver to the sender.
o The sender sends one frame, stops until it receives agreement the receiver (okay to go ahead), and then
sends the next frame. We still have unidirectional communication for data frames, but auxiliary ACK
frames (simple tokens of acknowledgment) travel from the other direction. We add flow control to our
previous protocol.
 Noisy channels
o Stop-and-Wait Automatic Repeat Request(ARQ)
o Error correction in Stop-and-Wait ARQ is done by keeping a copy of the sent frame and retransmitting of
the frame when the timer expires.
o In Stop-and-Wait ARQ, we use sequence numbers to number the frames.
o The sequence numbers are based on modulo-2 arithmetic.
o In Stop-and-Wait ARQ, the acknowledgment number always announces in modulo-2 arithmetic the
sequence number of the next frame expected.
o Go-Back-N Automatic Repeat Request
o To improve the efficiency of transmission (filling the pipe), multiple frames must be in transition while
waiting for acknowledgment. In other words, we need to let more than one frame be outstanding to
keep the channel busy while the sender is waiting for acknowledgment.
o In this protocol we can send several frames before receiving acknowledgments; we keep a copy of these
frames until the acknowledgments arrive, thus need sequence number for frames.
o In the Go-Back-N Protocol, the sequence numbers are modulo 2m, where m is the size of the sequence
number field in bits.
o Selective Repeat Automatic Repeat Request
Akriit45@gmail.com..................................................37
o Only the damaged frame is resent. This mechanism is called Selective Repeat ARQ. It is more efficient for
noisy links, but the processing at the receiver is more complex.
o This Protocol also uses two windows: a send window and a receive window.
o There are differences between the windows in this protocol and the ones in Go-Back-N.
o First, the size of the send window is much smaller; it is 2m-1. The reason for this will be discussed later.
o Second, the receive window is the same size as the send window.
5.4. HDLC
o High-level Data Link Control (HDLC) is a bit-oriented protocol for communication over point-to-point and
multipoint links.
o It implements the ARQ mechanisms. HDLC provides two common transfer modes that can be used in
different configurations:
 Normal response mode (NRM)
 The station configuration is unbalanced. We have one primary station and multiple secondary stations.
A primary station can send commands; a secondary station can only respond. The NRM is used for
both point-to-point and multiple-point links
 Asynchronous balanced mode (ABM)
 In ABM, the configuration is balanced. The link is point-to-point, and each station can function as a
primary and a secondary (acting as peers)
 Asynchronous Response Mode (ARM)
 It is used with unbalanced configuration and secondary may transmit without permission from
primary.
 HDLC Frame Structure
 A Beginning Flag (F1) Field.
 An Address (A) Field. It is used to identify one of the terminals. It is of 8 bits.
 A Control (C) Field. It is used for sequence numbers and acknowledgements. It is of 8 bits.
 An Information Field (I) or data field containing information.
 A Frame checks Sequences (FCS) fields. It is similar to CRC.
 A Final Flag Fields
 I-Frame: It Perform information transfer and independently carry message acknowledgements, and
Poll of final bits.
 S-Frame: It performs link Supervisory control such as message acknowledgements, retransmit
requests, and request for temporary holds on I-frame transmissions.
 U-Frame: It provides format for additional link control data by omitting the frame sequence numbers
and thus providing a place for an additional command and response functions.
Akriit45@gmail.com..................................................38
CHAPTER6
LAN
6.1. Ethernet
o Ethernet topology, which is based on bus and bus-star physical configurations, is currently the most
frequently configured LAN network architecture. A bus is a common pathway (usually copper wire or
fiber cable) between multiple devices such as computers. A bus is often used as a backbone between
devices.
o Digital Equipment Corporation and Xerox (DIX) worked together to develop the first Ethernet standards.
These standards are the DIX Ethernet standards and are still in use today.
o In 1985, the IEEE adopted the current Ethernet standards. These standards are called the IEEE 802.2 and
802.3 standards. They differ slightly from the DIX standards, but both define the protocols for the
physical and data link layers of the OSI Model. These standards include cabling specifications, frame
format, and network access conventions.
o Ethernet is a passive, contention-based broadcast technology that uses baseband signaling. Baseband
signaling uses the entire bandwidth of a cable for a single transmission. Only one signal can be
transmitted at a time and every device on the shared network hears broadcast transmissions. Passive
technology means that there is no one device controlling the network. Contention -based means that
every device must compete with every o there device for access to the shared network.
 Ethernet Configuration: Ethernet is a broadcast topology that may be structured as a physical bus or
physical star with a logical bus.

 Ethernet Communication: Communication protocols for Ethernet networks encompass both the data
link and physical layers of the OSI model.
 Ethernet uses Carrier Sense Multiple Access/Collision Detection (CSMA/CD) when transmitting data.
Carrier Sense allows a computer device to “sense” whether or not another transmission is being
“carried” over the network.
 Multiple Accesses means that all devices have equal access to the network. Since Ethernet is contention-
based, equal access to the network for all is ensured.
 Collision Detection means that a sending device can “detect” simultaneous transmission attempts.
When two or more devices try to send data at the same time, the signals collide.
 Frame Format
There are two frame formats in Ethernet
1. DIX format frame
2. IEEE 802.2 Frame
 It should be noted that if one device uses an 802.3 NIC and the other device uses a DIX Ethernet NIC,
they would not be able to communicate with one another.
DIX Frame (Ethernet II)
Akriit45@gmail.com..................................................39
 The Preamble of the frame (the first 7 bytes) indicates the start of a new frame and establishes
synchronization conditions between devices. The last byte, or start frame delimiter, always has a
10101011-bit pattern. This byte indicates the start of a frame.
 The Destination Address is the hardware (MAC) address of the receiving device, and the source address
specifies the hardware (MAC) address of the sending device.
 The Type field specifies the network layer protocol used to send the frame, for example TCP/IP.
 The Data field is for the actual data being transmitted from device to device. It also contains information
used by the network layer and indicates the type of connection.
 The Cyclic Redundancy Check (CRC) checks that the frame is received free from corruption.
IEEE 802.3 Frame Format
 The IEEE standard was adopted in 1985.
 Fields one and two perform the same function as the DIX preamble; however, the fields are separate.
The Start Frame Delimiter (SFD) has the same 10101011-bit sequence found at the end of the DIX
preamble. Both formats use the same number of bytes to perform the synchronization of the
signals.
 The Destination and Source Addresses can be either 2 or 6 bytes. Whether 2 or 6 bytes are used, all
devices within the same network must use the same format. IEEE protocols specify that a 10Mbs
network must use 6 bytes. The 2 byte length is obsolete.
 The Length field indicates the number of bytes in the data field. If the data field is less than the required
46 bytes, a pad field is added to the data frame. The bytes added for padding purposes are usually
zeros.
 The data field contains the data to be transmitted from device to device.
 The Frame Check Sequence (FCS) field is used as an error detection function. The error detection
function is a calculation completed by both the source and destination devices. If the calculations
do not match, an error is then generated.
Three data rates are currently defined for operation over optical fiber and twisted-pair cables:
1. 10 Mbps—10Base-T Ethernet
2. 100 Mbps—Fast Ethernet
3. 1000 Mbps—Gigabit Ethernet
10Base-T: This standard supports 10 Mbps baseband transmission and uses 24 AWG unshielded Twisted Pair (UTP)
cable of both Cat-3 and Cat-5 categorycables.A HUB functionsasa multi-portrepeaterwith stations connected to it with
RJ45 connector. Maximumlengthof a cable segmentis100 meters.Itusesstar topology.Thisallowseasytomaintenance
and diagnosis of faults. As a consequence, this is the most preferred approach used for setting up of a LAN.
Fast Ethernet: It isan improvedversionof the Ethernetthatprovidescustomerswithaflexible andaffordable waytoscale
network performance and interoperate with a wide range of other networking technologies. Fast Ethernet operates at
100Mbps ten times increase in speed than that of the originals IEEE 802.3 specification.
GigabitEthernet:GigabitEthernetreferencesthe 1000-Mbps LAN technologiesspecified in IEEE 802.3z. It offers a speed
increase 100 times that of the original IEEE 802.3 specification.
6.2. Token Ring
o The Token Ring network was originally developed by IBM in the 1970s IEEE 802.5 was modeled after IBM
Token Ring, and it continues to shadow IBM’s Token Ring development
Akriit45@gmail.com..................................................40
o The IEEE 802.5 specification is almost identical to and completely compatible with IBM’s Token Ring
network So, The term Token Ring generally is used to refer to both IBM’ s Token Ring network and IEEE
802.5 networks Classical Token Rings operate at 4 Mbps and 16 Mbps
o The original 4 Mbps version ran on STP cable, support for UTP telephone wire was added later A 100 Mbps
version called High Speed Token Ring (HSTR) was debut in 1998, it useful to customers who wish to
improve the performance of their existing Token Ring networks, however, the interfaces are expensive.
Token Ring Operation
 When a station wishes to transmit, it must wait for token to pass by and seize the token.
 – One approach: change one bit in token which transforms it into a “start-of-frame sequence” and
appends frame for transmission.
 – Second approach: station claims token by removing it from the ring.
 Frame circles the ring and is removed by the transmitting station.
 Each station interrogates passing frame, if destined for station, it copies the frame into local buffer.
 Normally, there is a one bit delay as the frame passes through a station.
Token Ring
 Under light load – delay is added due to waiting for the token {on average delay is one half ring
propagation time}.
 Under heavy load – ring is “round-robin”.
 – Performance is fairer and better than Ethernet!! Performance is fairer and better than Ethernet!!
 The ring must be long enough to hold the complete token.
 Advantages – fair access
 Disadvantages – ring is single point of failure, ring maintenance is complex due to token malfunctions
Token Ring Maintenance
Designated monitor
 Any station can become a monitor defined procedures for becoming a monitor. Healthy monitor
announces that it is a monitor at periodic interval. If a station does not see that packet for some
time then it sends a “claim token”. If claim token comes back to station then it is monitor. If
another wants to claim see other stations claim first some arbitration rule.
Frame Fields
Akriit45@gmail.com..................................................41
 Start delimiter—Alerts each station of the arrival of a token (or data/command frame). This field
includes signals that distinguish the byte from the rest of the frame by violating the encoding
scheme used elsewhere in the frame.
 Access-control byte—Contains the Priority field (the most significant 3 bits) and the Reservation field
(the least significant 3 bits), as well as a token bit (used to differentiate a token from a
data/command frame) and a monitor bit (used by the active monitor to determine whether a
frame is circling the ring endlessly).
 Frame-control bytes—Indicates whether the frame contains data or control information. In control
frames, this byte specifies the type of control information.
 Destinationandsource addresses—Consists of two 6-byte address fields that identify the destination
and source station addresses.
 Data—indicates that the length of field is limited by the ring token holding time, which defines the
maximum time a station, can hold the token.
 Frame-check sequence (FCS)—is filed by the source station with a calculated value dependent on the
frame contents. The destination station recalculates the value to determine whether the frame was
damaged in transit. If so, the frame is discarded.
 End Delimiter—Signals the end of the token or data/command frame. The end delimiter also contains
bits to indicate a damaged frame and identify the frame that is the last in a logical sequence. •
Frame Status—is a 1-byte field terminating a command/data frame. The Frame Status field
includes the address-recognized indicator and frame-copied indicator
6.3. FDDI
o The Fiber Distributed Data Interface (FDDI) standard was produced by the ANSI X3T9.5 standards
committee in the mid-1980s. During this period, high-speed engineering workstations were beginning
to tax the capabilities of existing local-area networks (LANs) (primarily Ethernet and Token Ring).
o Fiber distributed data interface (FDDI) is a high-performance fiber optic token ring LAN running at 100
Mbps over distances up to 200 km with up to 1000 stations connected.
o FDDI uses a multimode fiber because the cost of single mode fiber is not justified for networks running at
only 100 Mbps. It also uses LEDs instead of Lasers not only because of the lower cost but also because
FDDI may sometimes be used to connect directly to user workstations, and safety against exposure to
LASER radiation is difficult to maintain in that case.
o FDDI defines two classes of stations A and B. Class A stations connect to both rings. The cheaper class B
stations only connect to one of the rings. Depending on how important fault tolerance is, an installation
can chose class A or class B stations.
o The FDDI cabling consists of two fiber rings, one transmitting clockwise and the other transmitting
counterclockwise. If either one breaks the other acts as backup. If both the rings break at the same
points, the two rings can be joined to form a new approximately twice as long. This new ring is formed
by relays at the two nodes adjoining the broken link.
o The physical layer in FDDI uses 4 out of 5 schemes. Each group of 4 MAC symbols is encoded as a group of 5
bits on the medium. 16 of the 32 combinations are for data, 3 are for delimiters, 2 are for control, 3 are
for hardware signaling, and 8 are unused. This scheme saves bandwidth but the self-clocking property
available with Manchester coding is lost. To compensate a long preamble is used to synchronize the
receiver to the sender’s clock.
Akriit45@gmail.com..................................................42
o The basic FDDI protocols are modeled on the 802.5 protocols. The station must first capture a token,
transmit a frame and remove it when it comes around. In FDDI the time spent in waiting for a frame to
circumnavigate is reduced by allowing the station to put a new token back onto the ring as soon as it
has finished transmitting its frames. In a large ring, several frames may be on the ring at the same time.
The fields of an FDDI frame are as follows:
• Preamble—prepares each station for the upcoming frame.
• Start delimiter—indicates the beginning of the frame. It consists of signaling patterns that
differentiate it from the rest of the frame.
• Frame control—Indicates the size of the address fields, whether the frame contains asynchronous or
synchronous data, and other control information.
• Destination address—Contains a unicast (singular), multicast (group), or broadcast (every station)
address. As with Ethernet and Token Ring, FDDI destination addresses are 6 bytes.
• Source address—identifies the single station that sent the frame. As with Ethernet and Token Ring,
FDDI source addresses are 6bytes.
• Data—contains either information destined for an upper-layer protocol or control information.
• Frame check sequence (FCS)—Filled by the source station with a calculated cyclic redundancy check
(CRC) value dependent on the frame contents (as with Token Ring and Ethernet). The destination
station recalculates the value to determine whether the frame may have been damaged in transit. If so,
the frame is discarded.
• End delimiter—Contains non data symbols that indicate the end of the frame.
• Frame status—allows the source station to determine if an error occurred and if the frame was
recognized and copied by a receiving station.
6.4. Types of computer networks
1. Personal Area Network
o A Personal Area Network (PAN) is smallest network which is very personal to a user. This may include
Bluetooth enabled devices or infra-red enabled devices. PAN has connectivity range up to 10 meters.
PAN may include wireless computer keyboard and mouse, Bluetooth enabled headphones, wireless
printers, and TV remotes.
2. Local Area Network
o A computer network spanned inside a building and operated under single administrative system is
generally termed as Local Area Network (LAN). Usually, LAN covers an organization offices, schools,
colleges or universities. Number of systems connected in LAN may vary from as least as two to as much
as 16 million.
o LAN provides a useful way of sharing the resources between end users. The resources such as printers,
file servers, scanners, and internet are easily sharable among computers.
o LANs are composed of inexpensive networking and routing equipment. It may contains local servers
serving file storage and other locally shared applications. It mostly operates on private IP
addresses and does not involve heavy routing. LAN works under its own local domain and
controlled centrally.
o LAN uses either Ethernet or Token-ring technology. Ethernet is most widely employed LAN technology and
uses Star topology, while Token-ring is rarely seen.
o LAN can be wired, wireless, or in both forms at once.
Akriit45@gmail.com..................................................43
3. MetropolitanArea Network
o The Metropolitan Area Network (MAN) generally expands throughout a city such as cable TV network. It
can be in the form of Ethernet, Token-ring, ATM, or Fiber Distributed Data Interface (FDDI).
o Metro Ethernet is a service which is provided by ISPs. This service enables its users to expand their Local
Area Networks. For example, MAN can help an organization to connect all of its offices in a city.
o Backbone of MAN is high-capacity and high-speed fiber optics. MAN works in between Local Area Network
and Wide Area Network. MAN provides uplink for LANs to WANs or internet.
4. Wide Area Network
o As the name suggests, the Wide Area Network (WAN) covers a wide area which may span across provinces
and even a whole country.
o Generally, telecommunication networks are Wide Area Network. These networks provide connectivity to
MANs and LANs.
o Since they are equipped with very high speed backbone, WANs use very expensive network
equipment.
o WAN may use advanced technologies such as Asynchronous Transfer Mode (ATM), Frame Relay, and
Synchronous Optical Network (SONET). WAN may be managed by multiple administrations.
5. Internetwork
o A network of networks is called an internetwork, or simply the internet. It is the largest network in
existence on this planet.
o The internet hugely connects all WANs and it can have connection to LANs and Home networks. Internet
uses TCP/IP protocol suite and uses IP as its addressing protocol.
o Present day, Internet is widely implemented using IPv4. Because of shortage of address spaces, it is
gradually migrating from IPv4 to IPv6.
o Internet enables its users to share and access enormous amount of information worldwide. It uses
WWW, FTP, email services, audio, and video streaming etc. At huge level, internet works on Client-
Server model.
o Internet uses very high speed backbone of fiber optics. To inter-connect various continents, fibers are laid
under sea known to us as submarine communication cable.
o Internet is widely deployed on World Wide Web services using HTML linked pages and is accessible
by client software known as Web Browsers. When a user requests a page using some web browser
Akriit45@gmail.com..................................................44
located on some Web Server anywhere in the world, the Web Server responds with the proper HTML
page. The communication delay is very low.
Websites
E-mail
Instant Messaging
Blogging
Social Media
Marketing
Networking
Resource Sharing
Audioand VideoStreaming
Akriit45@gmail.com..................................................45
CHAPTER7
WAN
7.1. Network Routing
o When a device has multiple paths to reach a destination, it always selects one path by preferring it over
others. This selection process is termed as Routing.
o Routing is done by special network devices called routers or it can be done by means of software processes.
The software based routers have limited functionality and limited scope.
o A router is always configured with some default route. A default route tells the router where to forward a
packet if there is no route found for specific destination. In case there are multiple path existing to
reach the same destination, router can make decision based on the following information:
 Hop Count
 Bandwidth
 Metric
 Prefix-length
 Delay
o Routes can be statically configured or dynamically learnt. One route can be configured to be preferred over
others
7.2. Routing Methods
1. Distance VectorRouting Protocol
o Distance Vector is simple routing protocol which takes routing decision on the number of hops between
source and destination.
o A route with less number of hops is considered as the best route.
o Every router advertises its set best routes to other routers. Ultimately, all routers build up their
network topology based on the advertisements of their peer routers, for example, Routing
Information Protocol (RIP).
2. Link State Routing Protocol
o Link State protocol is slightly complicated protocol than Distance Vector.
o It takes into account the states of links of all the routers in a network.
o This technique helps routes build a common graph of the entire network.
o All routers then calculate their best path for routing purposes, for example, Open Shortest Path First
(OSPF) and Intermediate System to Intermediate System (ISIS).
o In link state, router knows entire network topology, and computes shortest path by itself.
7.3. IP - The Internet Protocol
o IP (Internet Protocol) is a Network Layer Protocol.
o IP is Higher layer protocols have to deal with losses or with duplicate packets
o IP is the highest layer protocol which is implemented at BOTH routers and hosts.
o IP provide provides an unreliable connectionless best effort service (also called: “datagram service”).
o   Unreliable: IP does not make an attempt to recover lost packets
o Connectionless: Each packet (“datagram”) is handled independently. IP is not aware that packets between
hosts may be sent in a logical sequence
o Best effort: IP does not make guarantees on the service (no throughput guarantee, no delay guarantee,)
IP supports the following services:
 one-to-one (unicast)
 one-to-all (broadcast)
 one-to-several (multicast)
o IP multicast also supports a many-to-many service.
o IP multicast requires support of other protocols (IGMP, multicast routing)
Akriit45@gmail.com..................................................46
IP Address
o IP addresses are the numbers assigned to computer network interfaces.
o Although we use names to refer to the things we seek on the Internet, such as www.example.org,
computers translate these names into numerical addresses so they can send data to the right location.
o So when you send an email, visit a web site, or participate in a video conference, your computer sends data
packets to the IP address of the other end of the connection and receives packets destined for its own IP
address.
 IP Address Classes
 Class A Address
o The first bit of the first octet is always set to 0 (zero). Thus the first octet ranges from 1 – 127, i.e.
o Class A addresses only include IP starting from 1.x.x.x to 126.x.x.x only. The IP range 127.x.x.x is reserved
for loopback IP addresses.
o The default subnet mask for Class A IP address is 255.0.0.0 which implies that Class A addressing
can have 126 networks (27-2) and 16777214 hosts (224-2).
o Class A IP address format is thus: 0NNNNNNN.HHHHHHHH.HHHHHHHH.HHHHHHHH
 Class B Address
o An IP address which belongs to class B has the first two bits in the first octet set to 10, i.e.
o Class B IP Addresses range from 128.0.x.x to 191.255.x.x. The default subnet mask for Class B is
255.255.x.x.
o Class B has 16384 (214) Network addresses and 65534 (216-2) Host addresses.
o Class B IP address format is: 10NNNNNN.NNNNNNNN.HHHHHHHH.HHHHHHHH
 Class C Address
o The first octet of Class C IP address has its first 3 bits set to 110, that is:
o Class C IP addresses range from 192.0.0.x to 192.255.255.x. The default subnet mask for Class C is
255.255.255.x.
o Class C gives 2097152 (221) Network addresses and 254 (28-2) Host addresses.
o Class C IP address format is: 110NNNNN.NNNNNNNN.NNNNNNNN.HHHHHHHH
 Class D Address
o Very first four bits of the first octet in Class D IP addresses are set to 1110, giving a range of:
o Class D has IP address rage from 224.0.0.0 to 239.255.255.255. Class D is reserved for Multicasting. In
multicasting data is not destined for a particular host, that is why there is no need to extract host
address from the IP address, and Class D does not have any subnet mask.
 Class E Address
o This IP Class is reserved for experimental purposes only for R&D or Study. IP addresses in this class
ranges from 240.0.0.0 to 255.255.255.254. Like Class D, this class too is not equipped with any subnet
mask.
Akriit45@gmail.com..................................................47
o What i s the difference between a Private IP address and a unique IP Address?
 Private addresses are the addresses people use on private networks, such as many home and office
 Networks.
 At a protocol level there is no difference between the addresses, but organizationally, private addresses
are distinct because they can only be used within a single administration and not on the wider
Internet.
 This is because private addresses are set aside for use by anyone without any global coordination. You
can know an address is from a block of private addresses if it:
 Class A : 10.0.0.0-10.255.255.255
 Class B : 172.0.0.0-172.255.255.255
 Class C : 192.0.0.0-192.255.255.255
7.4. Network layer protocols
1. AddressResolutionProtocol (ARP)
o While communicating, a host needs Layer-2 (MAC) address of the destination machine which belongs
to the same broadcast domain or network. A MAC address is physically burnt into the Network
Interface Card (NIC) of a machine and it never changes.
o On the other hand, IP address on the public domain is rarely changed. If the NIC is changed in case of some
fault, the MAC address also changes. This way, for Layer-2 communication to take place, a mapping
between the two is required.
o To know the MAC address of remote host on a broadcast domain, a computer wishing to initiate
communication sends out an ARP broadcast message asking, “Who has this IP address?” Because it is a
broadcast, all hosts on the network segment (broadcast domain) receive this packet and process it. ARP
packet contains the IP address of destination host, the sending host wishes to talk to. When a
host receives an ARP packet destined to it, it replies back with its own MAC address.
o Once the host gets destination MAC address, it can communicate with remote host using Layer-2 link
protocol. This MAC to IP mapping is saved into ARP cache of both sending and receiving hosts. Next
time, if they require to communicate, they can directly refer to their respective ARP cache.
o Reverse ARP is a mechanism where host knows the MAC address of remote host but requires to know IP
address to communicate.
2. InternetControl Message Protocol (ICMP)
o ICMP is network diagnostic and error reporting protocol. ICMP belongs to IP protocol suite and uses IP as
carrier protocol. After constructing ICMP packet, it is encapsulated in IP packet. Because IP itself is a
best-effort non-reliable protocol, so is ICMP.
o Any feedback about network is sent back to the originating host. If some error in the network occurs, it is
reported by means of ICMP. ICMP contains dozens of diagnostic and error reporting messages.
o ICMP-echo and ICMP-echo-reply are the most commonly used ICMP messages to check the
reachability of end-to-end hosts. When a host receives an ICMP-echo request, it is bound to send back
an ICMP-echo-reply. If there is any problem in the transit network, the ICMP will report that problem.
3. InternetProtocol Version4 (IPv4)
o IPv4 is 32-bit addressing scheme used as TCP/IP host addressing mechanism. IP addressing enables
every host on the TCP/IP network to be uniquely identifiable.
o IPv4 provides hierarchical addressing scheme which enables it to divide the network into sub-networks,
each with well-defined number of hosts.
o IPv4 also has well-defined address spaces to be used as private addresses (not routable on
internet), and public addresses (provided by ISPs and are routable on internet).
o Though IP is not reliable one; it provides ‘Best-Effort-Delivery’ mechanism.
4. InternetProtocol Version6 (IPv6)
o Exhaustion of IPv4 addresses gave birth to a next generation Internet Protocol version 6. IPv6
addresses its nodes with 128-bit wide address providing plenty of address space for future to be
used on entire planet or beyond.
Akriit45@gmail.com..................................................48
o IPv6 has introduced Anycast addressing but has removed the concept of broadcasting. IPv6 enables
devices to self-acquire an IPv6 address and communicate within that subnet. This auto-configuration
removes the dependability of Dynamic Host Configuration Protocol (DHCP) servers. This way,
even if the DHCP server on
o That subnet is down; the hosts can communicate with each other.
o IPv6 provides new feature of IPv6 mobility. Mobile IPv6-equipped machines can roam around without the
need of changing their IP addresses.
o IPv6 is still in transition phase and is expected to replace IPv4 completely in coming years. At present,
there are few networks which are running on IPv6. There are some transition mechanisms available for
IPv6-enabled networks to speak and roam around different networks easily on IPv4.
o These are:
 Dual stack implementation
 Tunneling
 NAT-PT
Tunneling
o If they are two geographically separate networks, which want to communicate with each other, they may
deploy a dedicated line between or they have to pass their data through intermediate networks.
o Tunneling is a mechanism by which two or more same networks communicate with each other, by passing
intermediate networking complexities. Tunneling is configured at both ends.
o When the data enters from one end of Tunnel, it is tagged. This tagged data is then routed inside the
intermediate or transit network to reach the other end of Tunnel.
o When data exists the Tunnel its tag is removed and delivered to the other part of the network.
o Both ends seem as if they are directly connected and tagging makes data travel through transit
network without any modifications.
7.5. Transport layer
o Transport layer offers peer-to-peer and end-to-end connection between two processes on remote
hosts. Transport layer takes data from upper layer (i.e. Application layer) and then breaks it into
smaller size segments, numbers each byte, and hands over to lower layer (Network Layer) for delivery.
o Functions
 This Layer is the first one which breaks the information data, supplied by Application layer in to
smaller units called segments. It numbers every byte in the segment and maintains their
accounting.
 This layer ensures that data must be received in the same sequence in which it was sent.
 This layer provides end-to-end delivery of data between hosts which may or may not belong to the
same subnet.
 All server processes intend to communicate over the network are equipped with well-known
Transport Service Access Points (TSAPs) also known as port numbers.
o End - to - End Communication
o A process on one host identifies its peer host on remote network by means of TSAPs, also known as Port
numbers. TSAPs are very well defined and a process which is trying to communicate with its peer
knows this in advance.
o TRANSMISSION CONTROL PROTOCOL
o The transmission Control Protocol (TCP) is one of the most important protocols of Internet
Protocols suite. It is most widely used protocol for data transmission in communication network such
as internet.
o Features
 TCP is reliable protocol. That is, the receiver always sends either positive or negative
acknowledgement about the data packet to the sender, so that the sender always has bright clue
about whether the data packet is reached the destination or it needs to resend it.
 TCP ensures that the data reaches intended destination in the same order it was sent.
 TCP is connection oriented. TCP requires that connection between two remote points be established
before sending actual data.
Akriit45@gmail.com..................................................49
 TCP provides error-checking and recovery mechanism.
 TCP provides end-to-end communication.
 TCP provides flow control and quality of service.
 TCP operates in Client/Server point-to-point mode.
 TCP provides full duplex server, i.e. it can perform roles of both receiver and sender.
7.6. USER DATAGRAM PROTOCOL
 The User Datagram Protocol (UDP) is simplest Transport Layer communication protocol available of the
TCP/IP protocol suite. It involves minimum amount of communication mechanism.
 UDP is said to be an unreliable transport protocol but it uses IP services which provides best effort delivery
mechanism.
 In UDP, the receiver does not generate an acknowledgement of packet received and in turn, the sender does
not wait for any acknowledgement of packet sent. This shortcoming makes this protocol unreliable as
well as easier on processing.
o Features
 UDP is used when acknowledgement of data does not hold any significance.
 UDP is good protocol for data flowing in one direction.
 UDP is simple and suitable for query based communications.
 UDP is not connection oriented.
 UDP does not provide congestion control mechanism.
 UDP does not guarantee ordered delivery of data.
 UDP is stateless.
 UDP is suitable protocol for streaming applications such as VoIP, multimedia streaming.
o UDP application
 Here are few applications where UDP is used to transmit data:
 Domain Name Services
 Simple Network Management Protocol
 Trivial File Transfer Protocol
 Routing Information Protocol
Akriit45@gmail.com..................................................50
CHAPTER8
Application Protocol
 Application layer is the topmost layer in OSI and TCP/IP layered model. This layer exists in both layered
Models because of its significance, of interacting with user and user applications. This layer is for
applications which are involved in communication system.
 A user may or may not directly interacts with the applications. Application layer is where the actual
communication is initiated and reflects. Because this layer is on the top of the layer stack, it does not serve
any other layers.
 Application layer takes the help of Transport and all layers below it to communicate or transfer its data to the
remote host.
8.1. CLIENT- SERVER MODEL
 Two remote application processes can communicate mainly in two different fashions:
 Peer-to-peer: Both remote processes are executing at same level and they exchange data using some shared
resource.
 Client-Server: One remote process acts as a Client and requests some resource from another application
process acting as Server.
 In client-server model, any process can act as Server or Client. It is not the type of machine, size of the machine,
or its computing power which makes it server; it is the ability of serving request that makes a machine a
server.
 A system can act as Server and Client simultaneously. That is, one process is acting as Server and another is
acting as a client. This may also happen that both client and server processes reside on the same machine.
8.2. APPLICATION PROTOCOLS
1. File Transfer Protocol
 The File Transfer Protocol (FTP) is the most widely used protocol for file transfer over the network.
 FTP uses TCP/IP for communication and it works on TCP port 21.
 FTP works on Client/Server Model where a client requests file from Server and server sends requested
resource back to the client.
 FTP uses out-of-band controlling i.e. FTP uses TCP port 20 for exchanging controlling information and the
actual data is sent over TCP port 21.
 The client requests the server for a file. When the server receives a request for a file, it opens a TCP connection
for the client and transfers the file. After the transfer is complete, the server closes the connection. For a
second file, client requests again and the server reopens a new TCP connection.
2. Trivial File Transfer Protocol (TFTP)
 TFTP is an unauthenticated protocol used to transfer files. TFTP depends on UDP and often is used to boot
diskless workstations.
3. Hyper Text Transfer Protocol (HTTP)
 The Hyper Text Transfer Protocol (HTTP) is the foundation of World Wide Web.
 Hypertext is well organized documentation system which uses hyperlinks to link the pages in the text
documents.
 HTTP works on client server model. When a user wants to access any HTTP page on the internet, the client
machine at user end initiates a TCP connection to server on port 80. When the server accepts the client
request, the client is authorized to access web pages.
 To access the web pages, a client normally uses web browsers, who are responsible for initiating, maintaining,
and closing TCP connections.
 HTTP is a stateless protocol, which means the Server maintains no information about earlier requests by
clients.
Akriit45@gmail.com..................................................51
 HTTP versions:
o HTTP 1.0 uses non persistent HTTP. At most one object can be sent over a single TCP connection.
o HTTP 1.1 uses persistent HTTP. In this version, multiple objects can be sent over a single TCP connection.
8.3. Email Protocol
Email
Electronic mail is a communication method and something a computer user cannot work without. This is the basis of
today’s internet features. Email system has one or more email servers. All its users are provided with unique IDs.
When a user sends email to other user, it is actually transferred between users with help of email server.
E-mail Protocols are set of rules that help the client to properly transmit the information to or from the mail
server.
SMPT
o SMTP stands for Simple Mail Transfer Protocol. It was first proposed in 1982. It is a standard protocol
used for sending e-mail efficiently and reliably over the internet.
o SMTP is application level protocol.
o SMTP is connection oriented protocol.
o SMTP is text based protocol.
o It handles exchange of messages between e-mail servers over TCP/IP network.
o Apart from transferring e-mail, SMPT also provides notification regarding incoming mail.
o When you send e-mail, your e-mail client sends it to your e-mail server which further contacts the recipient
mail server using SMTP client.
o These SMTP commands specify the sender’s and receiver’s e-mail address, along with the message to be
send.
o The exchange of commands between servers is carried out without intervention of any user.
o In case, message cannot be delivered, an error report is sent to the sender which makes
o SMTP a reliable protocol.
SMTP Commands
Command Description
HELLO This command initiates the SMTP conversation.
EHELLO This is an alternative command to initiate the conversation. ESMTP indicates that the
sender server wants to use extended SMTP protocol
MAIL FROM This indicates the sender’s address
RCPT TO This indicates the sender’s address
SIZE This command let the server know the size of attached message in bytes.
DATA The DATA command signifies that a stream of data will follow. Here stream of data refers to the body
of the message.
QUIT This command is used to terminate the SMTP connection.
VERFY This command is used by the receiving server in order to verify whether the given username is valid
or not.
EXPN It is same as VRFY, except it will list the entire users name when it used with a distribution list.
POP vs. IMAP
S.N. POP IMAP
1 Generally used to support single client Designed to handle multiple clients
2 Messages are accessed offline. Messages are accessed online although it also supports
offline mode.
3 POP does not allow search facility. It offers ability to search emails.
4 All the messages have to be downloaded. It allows selective transfer of messages to the client.
5 Only one mailbox can be created on the server. Multiple mailboxes can be created on the server.
6 Not suitable for accessing non-mail data. Suitable for accessing non-mail data i.e. attachment.
7 POP commands are generally abbreviated into codes
of three or four letters. e.g. STAT.
IMAP commands are not abbreviated, they are full. e.g.
STATUS.
Akriit45@gmail.com..................................................52
8 It requires minimum use of server resources Clients are totally dependent on server.
9 Mails once downloaded cannot be accessed from
some other location.
Allows mails to be accessed from multiple locations.
10 The e-mails are not downloaded automatically. Users can view the headings and sender of e-mails and
then decide to download.
11 POP requires less internet usage time. IMAP requires more internet usage time.

Data communications

  • 2.
    Akriit45@gmail.com..................................................1 CONTENTS Data Communications...........................................................................................................................................3 1.1. Data...................................................................................................................................................................3 1.2. Communication..................................................................................................................................................3 1.3. Network.............................................................................................................................................................3 1.4. Signal .................................................................................................................................................................3 1.5. Circuit.................................................................................................................................................................3 1.6. Channel..............................................................................................................................................................3 1.7. Multi-Channeling................................................................................................................................................3 1.8. Transmission Modes...........................................................................................................................................4 1.9. Taxonomy of Transmission..................................................................................................................................4 1.10. Parity Check (Asynchronous Data Error Detection).............................................................................................6 1.11. Cyclic Redundancy Check (Synchronous Data Error Detection) ...........................................................................6 1.12. Checksum Error Detection.................................................................................................................................7 1.13. Hamming Coding Technique for Error Correction ...............................................................................................7 1.14. Flow Control .....................................................................................................................................................8 1.15. Piggybacking.....................................................................................................................................................9 1.16. Congestion control............................................................................................................................................9 1.17. Multiplexing.....................................................................................................................................................9 1.18. Baseband v/s Broadband ................................................................................................................................11 1.19. Spread Spectrum ............................................................................................................................................12 1.20. Modulation.....................................................................................................................................................12 1.21. Encoding Techniques.......................................................................................................................................14 1.22. Digital data to Digital Signals Encoding ............................................................................................................14 1.23. Classification of Modems ................................................................................................................................15 1.24. Modem Protocols ...........................................................................................................................................16 1.25. Digital Subscriber Loop (DSL)...........................................................................................................................17 Communication Network Fundamentals............................................................................................................19 2.1. Switching Techniques........................................................................................................................................19 2.2. Open Systems Interconnection (OSI) Model.......................................................................................................21 2.3. Internet Protocol Suite (TCP/IP Model)..............................................................................................................23
  • 3.
    Akriit45@gmail.com..................................................2 2.4. LAN topologies.................................................................................................................................................23 Mediaaccess Control ..........................................................................................................................................26 3.1. MAC Layer – Media Access Control Layer Protocols ...........................................................................................26 3.2. ALOHA..............................................................................................................................................................26 3.3. Carrier Sensed Multiple Access (CSMA) .............................................................................................................27 3.4. Multiple Access Techniques ..............................................................................................................................27 Network Components..........................................................................................................................................29 4.1. Transmission media......................................................................................................................................29 4.2. Guided Media..............................................................................................................................................29 4.3. Unguided Media...........................................................................................................................................31 4.4. Networking Components and Devices...........................................................................................................33 Link Control and MAC Protocols .........................................................................................................................35 5.1. Data link control (DLC)..................................................................................................................................35 5.2. Framing: ......................................................................................................................................................35 5.3. Flow and Error Control .................................................................................................................................35 5.4. HDLC............................................................................................................................................................37 LAN.......................................................................................................................................................................38 6.1. Ethernet.......................................................................................................................................................38 6.2. Token Ring...................................................................................................................................................39 6.3. FDDI.............................................................................................................................................................41 6.4. Types of computer networks ........................................................................................................................42 WAN.....................................................................................................................................................................45 7.1. Network Routing..........................................................................................................................................45 7.2. Routing Methods................................................................................................Error! Bookmarknot defined. 7.3. IP - The Internet Protocol..............................................................................................................................45 7.4. Network layer protocols..............................................................................................................................47 7.5. Transport layer.............................................................................................................................................48 7.6. USER DATAGRAM PROTOCOL.......................................................................................................................49 Application Protocol............................................................................................................................................50 8.1. CLIENT- SERVER MODEL................................................................................................................................50 8.2. APPLICATION PROTOCOLS............................................................................................................................50
  • 4.
    Akriit45@gmail.com..................................................3 CHAPTER1 Data Communications 1.1.Data  Datais raw material that contains the collection of facts.  Data refers to information presented in whatever form is agreed upon by the parties creating and using the data. o Digital Data: Digital data is stored ones and zeros, which may represent number of way.  A charged portion 1  An Uncharged portion 0 o Analog Data: Analog data is that is represented in physical way.  Records and cassette tapes are forms of analog data storage.  Printed documents are constructed analog as well. 1.2.Communication  Communication is the exchange of data between two devices via some form of transmission medium such as a wire cable. 1.3.Network  A Network is a set of devise (often referred to as nodes) connected by communication links. o Node: A node can be a computer, printer, or any other device capable of sending and / or receiving data generated by other nodes on the network. o Link: A link can be a cable, air, optical fiber, or any medium which can transport a signal carrying information 1.4.Signal  A signal is an electronic current or electromagnetic fields used to convey data from one place to another. 1.5.Circuit  A Circuit is path over which data, voice or other signal can pass, between two computers or a terminal and a computer. 1.6.Channel  A portion of a bandwidth used for transmitting data o Bandwidth: A range of frequencies within a given band.  A band of frequencies used in radio and television transmission, especially used by a particular station.  A separate path through which signal can flow 1.7.Multi-Channeling  Total media capacity or bandwidth can be divided into multiple channels.  The Passes of multiple signal over a single media
  • 5.
    Akriit45@gmail.com..................................................4  Multi-channeling usedmainly in broadband transmission. 1.8.Transmission Modes Item Simplex Half Duplex Full Duplex Direction of Transmission of Message Communication in one directional only (Uni-Directional) Both ways but transmission of communication is only in one direction at time(Bi- Directional) Communication in both direction simultaneously ( Omni-Directional) Confirmation Not Possible Possible but slow Possible Number of wires Two Two Four Cost Cheapest Average Costliest Example T.V and Radio Hard Disk to Memory Telephonic Communication Efficiency Low Medium High 1.9. Taxonomy of Transmission  A transmission mode is the manner in which data is sent to over the underlying medium Transmission modes can be divided into two Fundamental categories:  Serial Transmission o Serial Transmission sends one bit at a time. o Serials networks can be extended over long distanced at less cost,
  • 6.
    Akriit45@gmail.com..................................................5 o using onlyone physical wire means that there is never a timing problem caused by one wire being slightly longer than another  Parallel Transmission o Parallel transmission allows transfers of multiple data bits at the same time over separate media. o It is used with a wired medium o The signals on all wires are synchronized so that a bit travels across each of the wires at precisely the same time o a parallel interface usually contains other wires that allow the sender and receiver to coordinate o to make installation and troubleshooting easy, the wires are placed in a single physical cable A parallel mode of transmission has two chief advantages:  High speed--it can send N bits at the same time.  It can match the speed of the underlying hardware Asynchronous Transmission Synchronous Transmission The senders and receivers clocks are not Synchronized. The senders and the receiver’s clocks are synchronized. The sender sends only one character at a time The sender sends a packet of data at a time. Each character needs a start bit and a stop bit. Synchronization is achieved by sending a ‘start’ frame and a ‘stop’ frames that required with up to 8Kb of data in the packet of data. There can be idle time between each character. There can be idle time between each frame. It is a slow and inefficient method of data transmission. It is a more efficient method of transmission. It is an inexpensive method for low speed transmission. Asynchronous has a much higher overhead. Isochronous Transmission  Combines features of an asynchronous and synchronous data transfer system.  Isochronous transmission is designed to provide steady bit flow for multimedia applications. o Steady flow: when flow do not change with time.  Isochronous networks are designed to accept and send data at a fixed rate, R.
  • 7.
    Akriit45@gmail.com..................................................6  This isideal when delivering such data at a steady rate is essential (jitter is minimized). o Jitter: unwanted variation in an electronic or optical signal.  Network interface is set to transmit/receive exactly R bits per second Example: An isochronous mechanism designed to transfer voice operates at a rate of 64,000 bps: o A sender must generate digitized audio continuously. o A receiver must be able to accept and play the stream at 64,000 bps 1.10.Parity Check (Asynchronous Data Error Detection)  Used in Asynchronous transmission.  Detects any errors in each character being sent.  A bit in each byte is set aside as the parity bit. o In even parity, the bit is set to 1 or 0 to ensure an even number of 1’s. o In odd parity, the bit is set to 1 or 0 to ensure and odd number of 1’s.  The receiving system checks the system being used and the number of 1’s  Both Telex and Teletype networks employ this method.  An error-correction process used with asynchronous data stream called Longitudinal Redundancy Check (LRC) makes use of the Parity process. For Example: Sender Sent word Help! 0000100 0010100 0010000-->Comparison results because a 1 indicate the bad bit position. The detection of a bad parity bit in the ‘l’ character designated the location of an error in that character. As a result of comparison of the LRC, bit 3 of that character is detected as incorrectand wouldbe inverted to yield the correctedcharacter. 1.11.Cyclic Redundancy Check (Synchronous Data Error Detection)  The difference here is that the block of data is treated as one (very large) binary number.  This is then divided by an Integer agreed between the sender and receiver.  The Remainder only from the calculation is sent along with the data.  The receiver can perform the same calculation and request re-transmission if there is a discrepancy.  CRC-16 detects all single and double-bit errors, all errors in bit streams with an odd number of bits in errors, all errors bursts longer than 16 bits, and 99.9% of error bursts longer than 16 bits.  CRC-32 detects essentially all errors, which is the primary reason for IEEE selecting this technique for all LAN standards. Example 1. The Message frame 110011001011 for which the divisor is 10001. Answer: Add 0000 (4- bits) with frame 1100110010110000 and divide by 10001. Sender Receiver 0001001 H  H 0001001 1010011 e e 1010011 0011011 l h 0001011 0000111 p p 0000111 1000010 ! ! 1000010 0000100 Sender’s LRC Receiver’s LRC 0010100 1010011011 10001 1100110010110000 10001 ______01011 ______00000 _10001 _10001 _______10110 _______10001
  • 8.
    Akriit45@gmail.com..................................................7 Exclusive OR A BResult 0 0 0+0=0 0 1 0+1=1 1 0 1+0=1 1 1 1+1=0 1.12.Checksum Error Detection  Used in Asynchronous Transmission.  Checks errors in each packet of Data being sent.  The checksum is generated by treating all the bytes in the transmission as a number.  It adds up all the bytes in the block.  The checksum is attached to the block and transmitted along with the data.  The receiver does the same calculation and if the checksums are the same the data was transmitted correctly, if not it’s re-sent.  Checksums are simple validation mechanism. They cannot detect all errors and they cannot be used to correct errors.  Its ability to detect multiple errors within any length of massage.  It is simple to implement. 1.13.Hamming Coding Technique for Error Correction  Hamming codes provide a method for error correction. Error bits called Hamming bits are inserted into message at random locations.  Hamming coding technique is used in satellite transmitting visual data as binary streams of information around another planet say Jupiter.  The Hamming distance is the number of bits that have to be changed to get from one bit pattern to another. Example: 10010101 & 10011001 have a hamming distance of 2  If we compare the read K bits compared with the write K bits, using an EXOR function, the result is called the “syndrome”.  If the syndrome is all zeros, there were no errors.  If there is a 1 bit somewhere, we know it represents an error.  To store an M bit word with detection/correction takes M+K bit words  If K =1, we can detect single bit errors but not correct them  If 2K - 1 >= M + K , we can detect, identify, and correct all single bit errors, i.e. the syndrome contains the information to correct any single bit error Example: For M = 8: And K = 3: 23 – 1 = 7 < 8 + 3 (doesn’t work) And K = 4: 24 – 1 = 15 > 8 + 4 (works!) Therefore, we must choose K =4, i.e., the minimum size of the syndrome is 4 __00000 __00000 ________01110 ________00000 ___00000 ___00000 _________11100 _________10001 ____00001 ____00000 __________11010 __________10001 _____00010 _____00000 1011 ______00101 ______00000
  • 9.
    Akriit45@gmail.com..................................................8  For convenience,we would like to generate a 4-bit syndrome for an 8-bit data word with the following characteristics: o If the syndrome contains all 0s, no error has been detected. o If the syndrome contains one and only one bit set to 1, then an error has occurred in one of the 4 check bits. No correction needed. o If the Syndrome contains more than one bit set to 1, then the numerical value of the syndrome indicates the position of the data bit in error. This data bit is inverted for correction. 1.14.Flow Control  When the sender is running on a fast computer and receiver is running on a slow machine, the receiver will not be able to handle the frames as they arrive. It will start losing some. The solution to this problem introduces flow control.  Flow Control is a technique so that transmitter and receiver with different speed characteristics can communicate with each other.  Flow control ensures that a transmitting station, such as a server with higher processing capability, does not overwhelm a receiving station, such as a desktop system, with lesser processing capability.  Flow control refers to the set of procedures used to restrict the amount of data the transmitter can send before waiting for acknowledgment. -: There are two methods developed for flow control namely Stop-and-wait and Sliding-window. o Stop and wait:  This is half-duplex protocol. In this protocol, the sender sends one frame and then waits for an acknowledgement before proceeding.  Stop-and-wait is also known as Request/reply sometimes. Request/reply (Stop-and-wait) flow control requires each data packet to be acknowledged by the remote host before the next packet is sent back an ACK frame acknowledging the frame just received.  This is sometimes referred to as Ping-Pong behavior, request/reply is simple to understand and easy to implement, but not very efficient.  Major drawback of Stop-and-Wait Flow Control is that only one frame can be in transmission at a time, this leads to inefficiency if propagation delay is much longer than the transmission delay. o Sliding Window:  With the use of multiple frames for a single message, the stop-and-wait protocol does not perform well.  This also explicitly announces that it is prepared to receive the next N frames, beginning with the number specified. This scheme can be used to acknowledge multiple frames  The range of sequence numbers is 0 to 2n-1 and frames are number module 2n.  After sequence number 2n-1, the next sequence number is 0.  3-bit sliding window 0-7---frames module number 0,1,2,3,4,5,6,7,0,1,2,3,4,5,6,7,0,1,2……..  Sliding window algorithm is a method of flow control for network data transfers. TCP, the Internet's stream transfer protocol, uses a sliding window algorithm.  Sender sliding Window: At any instant, the sender is permitted to send frames with sequence numbers in a certain range (the sending window).  Receiver sliding Window: The receiver always maintains a window of size 1.  It looks for a specific frame (frame 4 as shown in the figure) to arrive in a specific order. If it receives any other frame (out of order), it is discarded and it needs to be resent. Figure: Sender's Frame Figure: Receiver’s frame
  • 10.
    Akriit45@gmail.com..................................................9 1.15.Piggybacking  Combining datato be sent with control information is called piggybacking.  Combining data to be sent and acknowledgment of frame received in one frame.  If two stations exchange data simultaneously, each needs to maintain two windows, one for transmit and one for receive, and each side needs to send data and acknowledge to other. To provide efficient support for this requirement, a technique called piggybacking.  Each data frame includes a field that holds the frames and acknowledgment. Three cases in order o Both frames send together for saving communication capacity. o If a station has acknowledgement but not data to send, it sends separate acknowledgement frame. o If a station has data to send but no new acknowledgement to send, it must repeat the last acknowledgement that it sent because the data frame includes field for the acknowledgement number and some value must be put into that field. When a station receives a duplicate acknowledgement, it simply ignores it. 1.16.Congestion control  Problem: When too many packets are transmitted through a network, congestion occurs at very high traffic, performance collapses completely, and almost no packets are delivered.  Congestion in a network may occur when users send data at a rate greater than that are acceptable by network resources.  For example: Congestion may occur because the switches in a network have a limited buffer size of memory to store packets for processing.  Causes: burst nature of traffic is the root cause, when part of the network no longer can cope a sudden increase of traffic, congestion builds upon.  Other factors, such as lack of bandwidth, ill-configuration and slow router scan also bring up congestion.  Solution: congestion control, and two basic approaches: o Open-loop: try to prevent congestion occurring by good design. o Closed-loop: monitor the system to detect congestion, pass this information to where action can be taken, and adjust system operation to correct the problem (detect feedback and correct).  The router determines the order of packet transmission by controlling which packets are placed in which queue and how queues are serviced with respect to each other. There are four types of queuing protocols. These are: o First-In, First-out Queuing(FIFOQ)  Transmission of packets occurs in the order the packets arrive. o Priority Queuing(PQ)  With PQ packets belonging to one priority class of traffic are transmitted before all lower priority traffic. o Custom Queuing (CQ)  Bandwidth is allocated proportionally to each class of traffic. CQ allows you to specify the number of bytes or packets to be drawn from the queue, which is especially useful on slow interfaces. o Weighted Fair Queuing (WFQ)  WFQ offers dynamic, fair queuing divides bandwidth across queues of traffic based on the packet’s weights. Because of its fair handling of bandwidth, WFQ ensures satisfactory response time to critical applications that are intolerant of performance degradation. 1.17.Multiplexing  The set of techniques that allows the simultaneous transmission of multiple signals across a single data link.  Multiplexing allows multiple users sharing the capacity of a transmission link.
  • 11.
    Akriit45@gmail.com..................................................10  Components o Multiplexer:When multiple senders try to send over a single medium, a device called multiplexer device. It combines data from the n input lines. o Link: with n separate channels ,example: optical fiber or microwave link o De-multiplexer: separates the data according to channel delivers them to the appropriate output lines. There are four methods to multiplex channels.  Frequency-Division Multiplexing (FDM) o When the carrier is frequency, FDM is used. FDM is an analog technology. o FDM divides the spectrum or carrier bandwidth in logical channels and allocates one user to each channel. o Each channel frequency independently and has exclusive access of it. o All channels are divided in such a way that does not overlap with each other. o Channels are separated by guard bands.  Guard band is a frequency which is not used by either channel. o Filters separate the multiplexed signal back into its constituent component signals o Example: radio and television signal transmission  Wavelength-Division Multiplexing (WDM) o Light has different wavelength (colors). o In Fiber optic mode, multiple optical carrier signals are multiplexed into an optical fiber by using different wavelengths. o This is an analog multiplexing technique and is done conceptually in the same manner as FDM but uses light as signal o Theoretically identical to Frequency Division Multiplexing. o Used in optical systems while FDM is used in electrical systems. o Requires more spacing between channels  Time-Division Multiplexing (TDM) o TDM is applied primarily on digital signal but can be applied on analog signals as well. o In TDM the shared channel is divided among its user by means of time slot. o Each user can transmit data within the provided time slot only. o Digital signals are divided in frames, equivalent to time slot o Frame of an optimal size which can be transmitted in given time slot. o We refer to TDM as a “round robin” use of a frequency o Example: multiplexing digitalized voice signals and data streams
  • 12.
    Akriit45@gmail.com..................................................11 o Synchronous TDM time slot are assigned to each channel in a regular sequence  The multiplexer allocates exactly the same time slot to each device at all times, whether or not a device has anything to transmit  A frame consists of one complete cycle of time slots. Thus the number of slots in frame is equal to the number of inputs. o Statistical TDM (Asynchronous)  Improve the efficiency of synchronous TDM by adding complexity to the multiplexer.  Time slots are assigned to signals as they arrive at the multiplexer.  Each slot in a frame is not dedicated to the fix device.  The number of slots in a frame is not necessary to be equal to the number of input devices.  Allows maximum utilization of the link. It allows a number of lower speed input lines to be multiplexed to a single higher speed line  Code-Division Multiplexing (CDM) o CDM produces a wideband, noise like signal, and it occupies the entire range of frequencies allocated to the system. o Discrimination between the signals is achieved through the assignment of unique spreading codes (all codes are orthogonal) o The receivers of the transmissions have their respective transmitter’s code word. o At the receiving end, these data codes are removed (using the code word) form the desired signal. o Mainly used for mobile communications (wireless systems). 1.18.Baseband v/s Broadband  Baseband o Baseband system uses direct digital signaling. The digital signal fully occupies the cable, which constitutes a single channel. On a typical baseband network, each device transmits bi-directionally. o Baseband networks have a limited range, due to attenuation, and noise. Repeaters may be used to extend the length of a baseband system, and must use 50-ohm cable.  Broadband o Broadband systems use analog signaling with the use of high frequency carrier, which is modulated with the digital signals, video and sound. The transmitting device uses different carrier frequency than the receiving device. The transmission is unidirectional with 75-ohm coaxial cable.
  • 13.
    Akriit45@gmail.com..................................................12 o Frequency-Division Multiplexing(FDM) is used in Broadband transmission. Each channel centers on a different carrier frequency. For example, on a Cable TV, with a bandwidth of 500 MHz can carry more than 80 television channels (of 6-MHz bandwidth each). o Further multiplexed within each 6-MHz band are the channel's own audio subcarrier, video subcarrier and color subcarrier. 1.19.Spread Spectrum  Spreading techniques make use of a range electromagnetic spectrum (or frequency range) to transmit messages.  The narrowband signal is turned into a broadband signal with the same total energy. o Narrowband: Both narrowband and broadband frequencies are expressed in term of band size. Kilohertz, or kHz, Megahertz, or MHz, and Gigahertz, or kHz, are common terms of bandwidth measurement. o Dial-up connections are example of narrowband connection, as data is transferred at less than 56 kb/s. Broadband connection can accommodate bandwidth greater than 50 Mb/s.  The power of the broadband signal is much lower  as low as the background noise.  Appealing for military application: stay undetected! & no interference.  It is implemented using any of the following two methods: o Direct Sequence Technology (DS)  A single bit from a message is converted into a binary string (multiple bits).  This String is then transmitted as a wideband signal over an adjacent set of frequencies.  For example “1” can be assigned a string “10011101” and bit “0” can be assigned its inverse “01100010”.  Therefore ,if sender wishes to send the message “11001”, it will be sent as: “1001110110011101011000100110001010011101”  Wireless LANs (IEEE 802.11) use “10110111000”, called Barker code. o Frequency Hopping Technology (FH)  The frequency of the carrier wave is continually changed.  Total bandwidth is split into many channels of smaller bandwidths.  Transmitters and receivers stay on one of these channels for a certain time and then hop to another channel.  Implements FDM and TDM.  The pattern of channel usage is called hopping sequence.  The time spend on a channel with a certain frequency is called dwell time.  Bluetooth uses FHSS.  Advantages  frequency selective fading and interference limited to short period  simple implementation  uses only small portion of spectrum at any time  Disadvantages  not as robust as DSSS  simpler to detect 1.20.Modulation  The process of varying one or more properties of a periodic waveform, called the carrier signal, with a modulating signal that typically contains information to be transmitted.  Modulation is the process of conveying message signal inside another signal that can be physically transmitted.
  • 14.
    Akriit45@gmail.com..................................................13  Modulation ofsine waveform transforms a baseband message signal into a pass band signal.  The basic sine wave :V(t) = Vo sin (2 p f t + ) o V (t) ->the voltage of the signal as a function of time. o Vo-> the amplitude of the signal (represents the maximum value achieved each cycle) o f-> frequency of oscillation, the number of cycles per second o -> phase of the signal, representing the starting point of the cycle. The data can be modulating by various methods;  Amplitude Modulation (AM) o When the amplitude of high frequency carrier wave is changed in accordance with the intensity of the signal, it is called amplitude modulation. o In amplitude modulation, only the amplitude of the carrier wave is changed in accordance with the intensity of the signal. However, the frequency of the modulated wave remains the same i.e. carrier frequency. o The amplitudes of both positive and negative half-cycles of carrier wave are changed in accordance with the signal. o Amplitude modulation is done by an electronic circuit called modulator.  Frequency Modulation (FM) o When the frequency of carrier wave is changed in accordance with the intensity of the signal, it is called frequency modulation (FM). o In frequency modulation, only the frequency of the carrier wave is changed in accordance with the signal. However, the amplitude of the modulated wave remains the same i.e. carrier wave amplitude. o When the signal voltage is zero as at A, C, E and G, the carrier frequency is unchanged. When the signal approaches its positive peaks as at B and F, the carrier frequency is increased to maximum as shown by the closely spaced cycles. However, during the negative peaks of signal as at D, the carrier frequency is reduced to minimum as shown by the widely spaced cycles. Advantages: The following are the advantages of FM over AM:  It gives noiseless reception. As discussed before, noise is a form of amplitude variations and a FM receiver will reject such signals.  The operating range is quite large.  It gives high-fidelity reception.  The efficiency of transmission is very high. S.NO FM AM 1 The amplitude of carrier remains constant with modulation. The amplitude of carrier changes with modulation. 2 The carrier frequency changes with modulation. The carrier frequency remains constant with modulation.
  • 15.
    Akriit45@gmail.com..................................................14 3 The carrierfrequency changes according to the strength of the modulating signal. The carrier amplitude changes accordingto the strength of the modulating signal. 4 The value of modulation index (mf)can be more than 1. The value of modulation factor(m) cannot be more than 1 for distortion less AM signal.  Pulse code Modulation o PCM is a digitizing process in which an analog o continuous signal is represented in digital or discrete form o The varying sound of human speech must first be transformed into discrete pulses to be sent by digital means. o The device for making this transformation is called a codec, a name derived from its function of coding an analog signal into digital signal form at the sending end then decoding it back to analog form at the receiving end. o A codec accomplishes its tasks in three stages:  Stage 1 – codec does the sampling of the amplitude of the signal at very short intervals. The voltage of the signal is measured at small discrete intervals of time.  Stage 2 – This is stage of quantizing or assigning decimal values to the amplitude samples. Which is then converted to a digital number expressed in the 1s and 0s?  Stage 3 – Binary Number transmit through communication links.  Stage 4 – At receiving end, the original analog-to-digital conversion is reversed. 1.21.Encoding Techniques  Encoding is the process of converting the data or a given sequence of characters, symbols, alphabets etc., into a specified format, for the secured transmission of data.  Decoding is the reverse process of encoding which is to extract the information from the converted format. o There are 4 type of data conversion  Analog data to analog signals – The modulation techniques such as Amplitude Modulation, Frequency Modulation and Phase Modulation of analog signals, fall under this category.  Analog data to Digital signals – This process can be termed as digitization, which is done by Pulse code modulation (PCM). Hence, it is nothing but digital modulation. As we nothing but digital modulation.  Digital data to Analog signals – The modulation techniques such as Amplitude shift keying (ASK), Frequency shift keying (FSK), Phase Shift keying (FSK), etc., fall under the category.  Digital data to Digital Signals – There are several ways to map digital data to digital signals such as Current-state Encoding, State transition encoding, Bi-phase coding. 1.22.Digital data to Digital Signals Encoding  Current-state Encoding - In this coding method, data are encoding by the presence and absence of a signal state. o Unipolar Signal – When all the signal elements have the same algebraic sign. o Polar signal – In Polar, one logic state is represented by a positive voltage level and the other by a negative voltage level.  State Transition Encoding – it use transitions in the signal to represent data, as opposed to encoding data by means of a particular voltage level or state. A transition occurring from high to low voltage could represent a 1, while a transition occurring from high to low voltage could represent a 0. o Non return to Zero (NRZ) – It is used two different voltage levels for the two binary digits. There is no Transition.
  • 16.
    Akriit45@gmail.com..................................................15 o Non returnto Zero Level (NRZL) – There is a change in the polarity of the signal, only when the incoming signal changes from 1 to 0 or from 0 to 1. It is the same as NRZ; however, the first bit of the input signal should have a change of polarity. o Non Return to Zero-Invert (NRZI) – A variation of NRZ is known as NRZI. If a 1 occurs at the incoming signal, then there occurs a transition at the beginning of the bit interval. For a 0 at the incoming signal, there is no transition at the beginning of the bit interval. NRZ codes has a disadvantage that the synchronization of the transmitter clock with the receiver clock gets completely disturbed, when there is a string of 1s and 0s. Hence, a separate clock line to be provided.  Bi-phase Encoding – The signal level is checked twice for every bit time, both initially and in the middle. Hence, the clock rate is double the data transfer rate and thus the modulation rate is also doubled. The bandwidth required for this coding is greater. o Bi-phase Manchester – the transition is done at middle of bit-interval. The transition is done at the middle of the bit-interval. The transition for the resultant pulse is from High to Low in the middle of the interval, for the input bit 1. While the transition is from Low  High for input bit 0. o Differential Manchester – There always occurs a transition in the middle of the interval if there a transition at the beginning of the bit interval, and then the input bit is 0. If no transition occurs at the beginning of the bit interval, then the input bit is 1. 1.23.Classification of Modems  Landline Modems – These are connected to Public switched Telephone Network. These are plugged in RJ-11 jack port. These are classified into following types: o Internal modems – These are installed within the computer, as interface cards. They use the computer’s CPU power for encoding and decoding. o External Modems – External Modems are installed as a separate hardware device, outside the computer. They are more expensive than internal modems. They connect to the serial port on the computer using a DB9 or DB25 connector. These are useful when several users need to share a single modem. o PCMCIA Modems – These are credit-card sized modems used in laptop computers. PCMCIA stands for Personal Computer Memory Card International Association. o Voice/data/fax Modems – These are used for transferring files, sending and receiving faxes and voice mail using associated software.
  • 17.
    Akriit45@gmail.com..................................................16  Wireless Modems– These are radio transmitters computing devices used in mobile, laptop etc. they are used private radio transmission network (such as RAM mobile Data and Ardis).  LAN Modems – LAN modems allow shared remote access to Local Area Network resources. LAN modem comes fully preconfigured for single particular network architecture such as Ethernet or Token Ring. These are Network architecture supported, network protocol supported, client platforms supported, memory requirements security etc. 1.24.Modem Protocols  First packet switching interface.  Issued in 1976 and revised in 1980, 1984, 1988, and 1992.  X.25 Protocol – X.25 is an end to end protocol. It is as an interface between data terminal equipment (DTE) and data circuit terminating equipment (DCE). o X.25 is commonly used in wide area communications with multiple communicating devices. o X.25 is a packet-switching protocol that defines the interface between a synchronous packet- switching host computer and analog dedicated circuits or dial-up switched virtual circuit in the voice-grade public data network. o X.25 protocol specifies three layers. These are  Layer 1 (Physical Layer) – It deals with the electrical, Mechanical, procedural and functional connection between DTE and DCE.  Layer 2 (LAPB) – The second level of X.25 deals with ensuring reliable communication DTE and DCE, even though they may be connected by a noisy telephone line. The protocols used are LAP (Link access Procedure) and LAPB (Link Access Procedure Balance). Thus, this layer manages the link between the DTE and DCE. X.25 uses subset of HDLC.  Layer 3 (X.21 and others) – Layer 3 manages connections between a pair of DTEs. Two forms of connections are provided. These are:  Virtual Calls – It is like an ordinary telephone call;  Permanent Virtual Circuit – It is like leased line in the sense that is always present.  Triple-X Protocol – X.3, X.28 and X.29 protocols are collectively known as Triple-X protocols. o Triple-X protocols are used to connect a dumb terminal to an X.25 network.  A dumb terminal is any terminal that does not understand X.25 protocol. o X.3 defines a Packet Assembler/Disassembler (PAD).  PAD is required for connecting a dumb terminal to an X.25 network.  PAD buffers the characters and assembles them into X.25 packets.  When the packet arrives, PAD disassembles the packets into the original characters. o X.28 defines the rules for communication between a dumb terminal and a PAD. o X.29 defines relationship between a PAD and a remote terminal.  Protocols used by Modem for Transferring Files o XMODEM – XMODEM is a file transfer protocol used in telephone-line communication between PCs. XMODEM protocol requires that one terminal or computer be set up as the sender and other be set up as the receiver.  XMODEM sends ASCII or binary data as 128 byte blocks with checksum block checking.  Additional variations supported include XMODEMCRC (128 byte blocks with CRC block checking), Xmomdem1K (1024 byte blocks with CRC block checking) and Xmodem1KG (streaming Xmodem1K).
  • 18.
    Akriit45@gmail.com..................................................17  XMODEM sendsno file name or file size information, simply the data. So it is up to each end to know what file name to work with. o YMODEM - YMODEM sends ASCII or binary data as 1024 byte blocks (similar to Xmodem1K) with batch file support (multiple file and wildcarding). A variation of YMODEM supported includes YMODEMG (streaming YMODEM).  YMODEM does support simple file name and file size information sharing, unlike XMODEM. o ZMODEM - ZMODEM sends ASCII or binary data as 1024 byte blocks with batch and streaming capabilities, as well as the ability to restart a file transfer (available in most implementations). Full file name and size and file management options exist.  ZMODEM combines the features of both XMODEM and YMODEM. o Kermit - Kermit sends ASCII or binary data as 80 byte blocks with several types of block checking available. Kermit also supports batch, long blocks and windowing (this last improves transfer times dramatically).  The sender waits for a NAK before it starts transmission. It allows the transmission of control characters as text. 1.25.Digital Subscriber Loop (DSL)  The Digital Subscriber Line (DSL) technology was designed to provide high-speed data and video-on-demand services to subscribers at speeds much faster than Integrated Services Digital Network (ISDN)  DSL is not a specific digital line technology but rather a form of digital modem technology that defines the signaling processes for high-speed, end to end digital transmission over the existing copper twisted-pair wiring of the local loop.  xDSL is the term for the Broadband Access technologies based on Digital Subscriber Line (DSL) technology o “X” signifies that there are various flavors of DSL. Types of DSL  AsymmetricDigital Subscriber Line (ADSL) – It allocates line bandwidth asymmetrically with downstream data rate up to 9 Mbps and upstream rates of up to 640 Kbps, depending on the implementation. o There is a much higher bitrate made available for downstream transmission – at the expense of the upstream transmission rate.  SymmetricDigital Subscriber Line (SDSL) - An SDSL line provides for transport of digital data simultaneously in both directions across the line – the same bitrate being available in both directions (thus ‘symmetric’). o SDSL connections typically allow transmission of up to 6 Mbit/s in both directions, but usually require a 4- wire connection (equivalent to two standard telephone lines).  High Speed Digital Subscriber Line (HDSL) – It is a particular type of SDSL – usually providing 2 Mbit/s transmissions in both downstream and upstream directions.  Very High Speed Digital Subscriber Line (VHSDL) - It is able to operate at very high speed (e.g. up to 50 Mbit/s) over copper cable – but only over short distances. Typically VDSL is used in ‘hybrid’ networks, comprising short copper cable connections from VDSL customer premises to locally placed street cabinets and then by means of glass fiber to the network operator’s exchange building site (this type of hybrid network is sometimes referred to as ‘fiber-to-the-curb’ (FTTC)).
  • 19.
    Akriit45@gmail.com..................................................18  XDSL issometimes used as a generic term to mean ‘any type of DSL’. The ‘X’ stands in place of a letter making up a recognized DSL abbreviation. Thus XDSL may be used as a short form to mean ‘any of: ADSL, HDSL, SDSL, VDSL etc.)
  • 20.
    Akriit45@gmail.com..................................................19 CHAPTER2 CommunicationNetworkFundamentals 2.1.Switching Techniques  Switchingis the technology allowing to get a message between the nodes of a network  In this Technology nodes which are connected to one or more point-to-point links and work as switches. These switches run software that forwards data received from one link to another PC.  They have the responsibility to choose best path on which to send the data, so that it can reach its destination in minimum amount of time. Such nodes form switched networks.  There are five typical switching techniques available for digital traffic. o Circuit Switching o Message Switching o Packet Switching o Cell Switching o Hybrid Switching 1. Circuit Switching  Circuit switching is a technique that directly connects the sender and the receiver in an unbroken path.  Telephone switching equipment, for example, establishes a path that connects the caller's telephone to the receiver's telephone by making a physical connection.  With this type of switching technique, once a connection is established, a dedicated path exists between both ends until the connection is terminated.  Routing decisions must be made when the circuit is first established, but there are no decisions made after that time.  Advantages: o The communication channel (once established) is dedicated.  Disadvantages: o Possible long wait to establish a connection, (10 seconds, more on long- distance or international calls.) during which no data can be transmitted. o More expensive than any other switching techniques, because a dedicated path is required for each connection. o Inefficient use of the communication channel, because the channel is not used when the connected systems are not using it. 2. Message Switching  With message switching there is no need to establish a dedicated path between two stations.  When a station sends a message, the destination address is appended to the message.  The message is then transmitted through the network, in its entirety, from node to node.  Each node receives the entire message, stores it in its entirety on disk, and then transmits the message to the next node.  This type of network is called a store-and-forward network.  A message-switching node is typically a general-purpose computer. The device needs sufficient secondary- storage capacity to store the incoming messages, which could be long. A time delay is introduced using this type
  • 21.
    Akriit45@gmail.com..................................................20 of scheme dueto store- and-forward time, plus the time required to find the next node in the transmission path.  Advantages: o Channel efficiency can be greater compared to circuit-switched systems, because more devices are sharing the channel. o Traffic congestion can be reduced, because messages may be temporarily stored in route. o Message priorities can be established due to store-and-forward technique. o Message broadcasting can be achieved with the use of broadcast address appended in the message.  Disadvantages o Message switching is not compatible with interactive applications. o Store-and-forward devices are expensive, because they must have large disks to hold potentially long messages 3. Packet Switching  Packet switching can be seen as a solution that tries to combine the advantages of message and circuit switching and to minimize the disadvantages of both.  There are two methods of packet switching: Datagram and virtual circuit.  In both packet switching methods, a message is broken into small parts, called packets.  Each packet is tagged with appropriate source and destination addresses.  Since packets have a strictly defined maximum length, they can be stored in main memory instead of disk; therefore access delay and cost are minimized.  Also the transmission speeds, between nodes, are optimized.  With current technology, packets are generally accepted onto the network on a first-come, first-served basis. If the network becomes overloaded, packets are delayed or discarded (``dropped''). Datagram Packet Switching o Datagram packet switching is similar to message switching in that each packet is a self-contained unit with complete addressing information attached. o This fact allows packets to take a variety of possible paths through the network. o So the packets, each with the same destination address, do not follow the same route, and they may arrive out of sequence at the exit point node (or the destination). o Reordering is done at the destination point based on the sequence number of the packets. o It is possible for a packet to be destroyed if one of the nodes on its way is crashed momentarily. Thus all its queued packets may be lost. Virtual Circuit Packet Switching o In the virtual circuit approach, a preplanned route is established before any data packets are sent. o A logical connection is established when a sender send a "call request packet" to the receiver and the receiver send back an acknowledge packet "call accepted packet" to the sender if the receiver agrees on conversational parameters. o The conversational parameters can be maximum packet sizes, path to be taken, and other variables necessary to establish and maintain the conversation. o Virtual circuits imply acknowledgements, flow control, and error control, so virtual circuits are reliable. o That is, they have the capability to inform upper-protocol layers if a transmission problem occurs.  Advantages: o Packet switching is cost effective, because switching devices do not need massive amount of secondary storage. o Packet switching offers improved delay characteristics; because there are no long messages in the queue (maximum packet size is fixed). o Packet can be rerouted if there is any problem, such as, busy or disabled links. o The advantage of packet switching is that many network users can share the same channel at the same time. Packet switching can maximize link efficiency by making optimal use of link bandwidth.  Disadvantages: o Protocols for packet switching are typically more complex.
  • 22.
    Akriit45@gmail.com..................................................21 o It canadd some initial costs in implementation. o If packet is lost, sender needs to retransmit the data. o Another disadvantage is that packet-switched systems still can’t deliver the same quality as dedicated circuits in applications requiring very little delay - like voice conversations or moving images. 4. Cell Switching (Asynchronous Transfer Mode) o Many of the problems associated with packet switching are solved by adopting a concept called Cell Switching.  A Cell is a small data unit of fixed size unlike packets which have variable sizes. o A cell switching technology that allows voice, data, image, and video traffic to be combined into evenly sized cells for high-speed transmission over one access circuit. o This means that all the information sent over an ATM network is broken down into discrete packets. o Each 53 byte cell contains 48 bytes of payload and 5 bytes of control information. o Because the cells are all the same size, cell delay at ATM switches is more predictable and manageable. o The aim of ATM switch design is to increase speed, capacity and overall performance. o ATM switching differs from conventional switching because of the high-speed interfaces (50 Mbps to 2.4 Gbps) to the switch, with switching rates up to 80 Gbps in the backplane. o ATM was designed specifically to handle broadband applications efficiently and at the same time let users give certain types of traffic priority treatment on the network.  Cell Format o User-Network Interface (UNI) – host-to-switch format – GFC: Generic Flow Control (still being defined) – VCI: Virtual Circuit Identifier – VPI: Virtual Path Identifier – Type: management, congestion control, AAL5 (later) – CLPL Cell Loss Priority – HEC: Header Error Check (CRC-8) 2.2. Open Systems Interconnection (OSI) Model  International standard organization (ISO) established a committee in 1977 to develop architecture for computer communication.  In 1984, the Open Systems Interconnection (OSI) reference model was approved as an international standard for communications architecture.  Term “open” denotes the ability to connect any two systems which conform to the reference model and associated standards.  The OSI model describes how information or data makes its way from application programmes (such as spreadsheets) through a network medium (such as wire) to another application programmer located on another network.  The OSI reference model divides the problem of moving information between computers over a network medium into SEVEN smaller and more manageable problems.  This separation into smaller more manageable functions is known as layering.
  • 23.
    Akriit45@gmail.com..................................................22 1. Physical Layer oProvides physical interface for transmission of information. o Defines rules by which bits are passed from one system to another on a physical communication medium. o Covers all - mechanical, electrical, functional and procedural - aspects for physical communication. o Such characteristics as voltage levels, timing of voltage changes, physical data rates, maximum transmission distances, physical connectors, and other similar attributes are defined by physical layer specifications. 2. Data Link Layer o Data link layer attempts to provide reliable communication over the physical layer interface. o Breaks the outgoing data into frames and reassemble the received frames. o Create and detect frame boundaries. o Handle errors by implementing an acknowledgement and retransmission scheme. o Implement flow control. o Supports points-to-point as well as broadcast communication. o Supports simplex, half-duplex or full-duplex communication. 3. Network Layer o Implements routing of frames (packets) through the network. o Defines the most optimum path the packet should take from the source to the destination o Defines logical addressing so that any endpoint can be identified. o Handles congestion in the network. o Facilitates interconnection between heterogeneous networks (Internetworking). o The network layer also defines how to fragment a packet into smaller packets to accommodate different media. 4. Transport Layer o Purpose of this layer is to provide a reliable mechanism for the exchange of data between two processes in different computers. o Ensures that the data units are delivered error free. o Ensures that data units are delivered in sequence. o Ensures that there is no loss or duplication of data units. o Provides connectionless or connection oriented service.
  • 24.
    Akriit45@gmail.com..................................................23 o Provides forthe connection management. o Multiplex multiple connections over a single channel. 5. Session Layer o Session layer provides mechanism for controlling the dialogue between the two end systems. It defines how to start, control and end conversations (called sessions) between applications. o This layer requests for a logical connection to be established on an end-user’s request. o Any necessary log-on or password validation is also handled by this layer. o Session layer is also responsible for terminating the connection. o This layer provides services like dialogue discipline which can be full duplex or half duplex. o Session layer can also provide check-pointing mechanism such that if a failure of some sort occurs between checkpoints, all data can be retransmitted from the last checkpoint. 6. Presentation Layer o Presentation layer defines the format in which the data is to be exchanged between the two communicating entities. o Also handles data compression and data encryption (cryptography). 7. Application Layer o Application layer interacts with application programs and is the highest level of OSI model. o Application layer contains management functions to support distributed applications. o Examples of application layer are applications such as file transfer, electronic mail, remote login etc. 2.3.Internet Protocol Suite (TCP/IP Model) o Internet uses TCP/IP protocol suite, also known as Internet suite. This defines Internet Model which contains four layered architecture. OSI Model is general communication model but Internet Model is what the internet uses for all its communication. The internet is independent of its underlying network architecture so is its Model. o This model has the following layers: 1. Application Layer: This layer defines the protocol which enables user to interact with the network. For example, FTP, HTTP etc. 2. Transport Layer: This layer defines how data should flow between hosts. Major protocol at this layer is Transmission Control Protocol (TCP). This layer ensures data delivered between hosts is in-order and is responsible for end-to-end delivery. 3. Internet Layer: Internet Protocol (IP) works on this layer. This layer facilitates host addressing and recognition. This layer defines routing. 4. Link Layer: This layer provides mechanism of sending and receiving actual data. Unlike its OSI Model counterpart, this layer is independent of underlying network architecture and hardware. 2.4. LAN topologies  Logical o Describes the possible connections between pairs of networked end-points that can communicate  Physical o The physical topology of a network refers to the configuration of cables, computers and other peripherals. o The main types of network topologies are: 1. Bus topology o A linear bus topology consists of a main run of cable with a terminator at each end. All servers’ workstations and peripherals are connected to the linear cable. o Advantages of Bus topology  Easy to implement and extend
  • 25.
    Akriit45@gmail.com..................................................24  Well suitedfor temporary networks that must be set up in a hurry  Typically the least cheapest topology to implement  Failure of one station does not affect others o Disadvantages of Bus topology  Difficult to administer/troubleshoot  Limited cable length and number of stations  A cable break can disable the entire network; no redundancy  Maintenance costs may be higher in the long run  Performance degrades as additional computers are added 2. Ring Topology o started out as a simple peer-to-peer LAN topology o Each networked workstation had two connections: one to each of its nearest neighbors o Data was transmitted unidirectional around the ring o Sending and receiving of data takes place by the help of TOKEN o Advantages of Ring topology  This type of network topology is very organized  Performance is better than that of Bus topology  No need for network server to control the connectivity between workstations  Additional components do not affect the performance of network  Each computer has equal access to resources o Disadvantages of Ring topology  Each packet of data must pass through all the computers between source and destination, slower than star topology  If one workstation or port goes down, the entire network gets affected  Network is highly dependent on the wire which connects different components 3. Star Topology o A star network is designed with each node (file server, workstation, peripheral) connected directly to a central network hub or server o Have connections to networked devices that “radiate” out form a common point o Each networked device in star topology can access the media independently o Have become the dominant topology type in contemporary LANs o Stars have made buses and rings obsolete in LAN topologies o Advantages of star topology  Compared to Bus topology it gives far much better performance  Easy to connect new nodes or devices  Centralized management. It helps in monitoring the network  Failure of one node or link doesn’t affect the rest of network o Disadvantages of star topology  If central device fails whole network goes down  The use of hub, a router or a switch as central device increases the overall cost of the network  Performance and as well number of nodes which can be added in such topology is depended on capacity of central device. 4. Tree Topology o Also known as Hierarchical Topology, this is the most common form of network topology in use presently.
  • 26.
    Akriit45@gmail.com..................................................25 o This topologyimitates as extended Star topology and inherits properties of Bus topology. o This topology divides the network into multiple levels/layers of network. Mainly in LANs, a network is bifurcated into three types of network devices. o The lowermost is access-layer where computers are attached. o The middle layer is known as distribution layer, which works as mediator between upper layer and lower layer. o The highest layer is known as core layer, and is central point of the network, i.e. root of the tree from which all nodes fork. o All neighboring hosts have point-to-point connection between them. Similar to the Bus topology, if the root goes down, then the entire network suffers even though it is not the single point of failure. o Every connection serves as point of failure, failing of which divides the network into unreachable segment. 5. Mesh Topology o In this type of topology, a host is connected to one or multiple hosts. o This topology has hosts in point-to-point connection with every other host or may also have hosts which are in point-to-point connection with few hosts only. o Hosts in Mesh topology also work as relay for other hosts which do not have direct point-to-point links. Mesh technology comes into two types: o Full Mesh: All hosts have a point-to-point connection to every other host in the network. Thus for every new host n(n-1)/2 connections are required. It provides the most reliable network structure among all network topologies. o Partially Mesh: Not all hosts have point-to-point connection to every other host. Hosts connect to each other in some arbitrarily fashion. This topology exists where we need to provide reliability to some hosts out of all. 6. Daisy Chain o This topology connects all the hosts in a linear fashion. Similar to Ring topology, all hosts are connected to two hosts only, except the end hosts. Means, if the end hosts in daisy chain are connected then it represents Ring topology. o Each link in daisy chain topology represents single point of failure. Every link failure splits the network into two segments. Every intermediate host works as relay for its immediate hosts. 7. Hybrid Topology o A network structure whose design contains more than one topology is said to be hybrid topology. Hybrid topology inherits merits and demerits of all the incorporating topologies. o The combining topologies may contain attributes of Star, Ring, Bus, and Daisy-chain topologies. Most WANs are connected by means of Dual-Ring topology and networks connected to them are mostly Star topology networks. Internet is the best example of largest Hybrid topology.
  • 27.
    Akriit45@gmail.com..................................................26 CHAPTER3 Media access Control 3.1.MAC Layer – Media Access Control Layer Protocols  The Media Access Control (MAC) data communication Networks protocol sub-layer, also known as the Medium Access Control, is a sub-layer of the data link layer specified in the seven-layer OSI model.  The medium access layer was made necessary by systems that share a common communications medium.  Typically these are local area networks.  The MAC layer is the "low" part of the second OSI layer, the layer of the "data link".  In fact, the IEEE divided this layer into two layers "above" is the control layer the logical connection (Logical Link Control, LLC) and "down" the control layer the medium access (MAC). 3.2. ALOHA  ALOHA is a system for coordinating and arbitrating access to a shared communication Networks channel.  It was developed in the 1970s by Norman Abramson and his colleagues at the University of Hawaii.  The original system used for ground based radio broadcasting, but the system has been implemented in satellite communication systems.  ALOHA requires a method of handling collisions that occur when two or more systems attempt to transmit on the channel at the same time.  Aloha means "Hello". Aloha is a multiple access protocol at the data link layer and proposes how multiple terminals access the medium without interference or collision.  There are two different types of ALOHA:  Pure ALOHA o In pure ALOHA, the stations transmit frames whenever they have data to send. o When two or more stations transmit simultaneously, there is collision and the frames are destroyed. o In pure ALOHA, whenever any station transmits a frame, it expects the acknowledgement from the receiver. o If acknowledgement is not received within specified time, the station assumes that the frame (or acknowledgement) has been destroyed. o If the frame is destroyed because of collision the station waits for a random amount of time and sends it again. This waiting time must be random otherwise same frames will collide again and again. o Therefore pure ALOHA dictates that when time-out period passes, each station must wait for a random amount of time before resending its frame. This randomness will help avoid more collisions. o Slotted ALOHA
  • 28.
    Akriit45@gmail.com..................................................27 o Slotted ALOHAwas invented to improve the efficiency of pure ALOHA as chances of collision in pure ALOHA are very high. o In slotted ALOHA, the time of the shared channel is divided into discrete intervals called slots. o The stations can send a frame only at the beginning of the slot and only one frame is sent in each slot. o In slotted ALOHA, if any station is not able to place the frame onto the channel at the beginning of the slot i.e. it misses the time slot then the station has to wait until the beginning of the next time slot. o In slotted ALOHA, there is still a possibility of collision if two stations try to send at the beginning of the same time slot as shown in fig. o Slotted ALOHA still has an edge over pure ALOHA as chances of collision are reduced to one-half. 3.3. Carrier Sensed Multiple Access (CSMA) o CSMA is a network access method used on shared network topologies such as Ethernet to control access to the network. o Devices attached to the network cable listen (carrier sense) before transmitting. If the channel is in use, devices wait before transmitting. o MA (Multiple Access) indicates that many devices can connect to and share the same network. All devices have equal access to use the network when it is clear. o Even though devices attempt to sense whether the network is in use, there is a good chance that two stations will attempt to access it at the same time. o On large networks, the transmission time between one end of the cable and another is enough that one station may access the cable even though another has already just accessed it. There are two methods for avoiding these so-called collisions, listed here: o CSMA/CD (Carrier Sense Multiple Access/Collision Detection)  CD (collision detection) defines what happens when two devices sense a clear channel, then attempt to transmit at the same time.  A collision occurs, and both devices stop transmission, wait for a random amount of time, and then retransmit.  This is the technique used to access the 802.3 Ethernet network channel.  This method handles collisions as they occur, but if the bus is constantly busy, collisions can occur so often that performance drops drastically.  It is estimated that network traffic must be less than 40 percent of the bus capacity for the network to operate efficiently.  If distances are long, time lags occur that may result in inappropriate carrier sensing, and hence collisions. o CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance)  In CA (collision avoidance), collisions are avoided because each node signals its intent to transmit before actually doing so.  In CSMA/CA, once the channel is clear, stations not to transmit, and then sends its packet.  This method is not popular because it requires excessive overhead that reduces performance. 3.4. Multiple Access Techniques  Multiple access techniques are used to allow a large number of mobile users to share the allocated spectrum in the most efficient manner.  As the spectrum is limited, so the sharing is required to increase the capacity of cell or over a geographical area by allowing the available bandwidth to be used at the same time by different users.  And this must be done in a way such that the quality of service doesn’t degrade within the existing users. Multiple Access Techniques for Wireless Communication  A cellular system divides any given area into cells where a mobile unit in each cell communicates with a base station. The main aim in the cellular system design is to be able to increase the capacity of the channel i.e. to handle as many calls as possible in a given bandwidth with a sufficient level of quality of service.  There are several different ways to allow access to the channel. These includes mainly the following: Frequency division multiple-access (FDMA)
  • 29.
    Akriit45@gmail.com..................................................28 o This wasthe initial multiple-access technique for cellular systems in which each individual user is assigned a pair of frequencies while making or receiving a call. o One frequency is used for downlink and one pair for uplink. o This is called frequency division duplexing (FDD). That allocated frequency pair is not used in the same cell or adjacent cells during the call so as to reduce the co channel interference. o The FDMA channel carries only one phone circuit at a time. If an FDMA channel is not in use, then it sits idle and it cannot be used by other users to increase share capacity. Time division multiple-access (TDMA) o In digital systems, continuous transmission is not required because users do not use the allotted bandwidth all the time. o In such cases, TDMA is a complimentary access technique to FDMA. Global Systems for Mobile communications (GSM) uses the TDMA technique. o In TDMA, the entire bandwidth is available to the user but only for a finite period of time. In most cases the available bandwidth is divided into fewer channels compared to FDMA and the users are allotted time slots during which they have the entire channel bandwidth at their disposal. o TDMA requires careful time synchronization since users share the bandwidth in the frequency domain. The number of channels are less, inter channel interference is almost negligible. TDMA uses different time slots for transmission and reception. o This type of duplexing is referred to as Time division duplexing (TDD). o TDMA shares a single carrier frequency with several users where each user makes use of non-overlapping time slots. o The number of time slots per frame depends on several factors such as modulation technique, available bandwidth etc. Code division multiple-access (CDMA) o In CDMA, the same bandwidth is occupied by all the users, however they are all assigned separate codes, which differentiates them from each other. o CDMA utilize a spread spectrum technique in which a spreading signal (which is uncorrelated to the signal and has a large bandwidth) is used to spread the narrow band message signal. o all terminals send on same frequency at the same time using ALL the bandwidth of transmission channel o Each sender has a unique random number, sender XORs the signal with this random number the receiver can “tune” into this signal if it knows the pseudo random number.
  • 30.
    Akriit45@gmail.com..................................................29 CHAPTER4 NetworkComponents 4.1. Transmission media oTransmission media is a pathway that carries the information from sender to receiver. We use different types of cables or waves to transmit data. Data is transmitted normally through electrical or electromagnetic signals. o The data transmission capabilities of various Medias vary differently depending upon the various factors. These factors are o Bandwidth. It refers to the data carrying capacity of a channel or medium. Higher bandwidth communication channels support higher data rates. o Radiation. It refers to the leakage of signal from the medium due to undesirable electrical characteristics of the medium. o Noise Absorption. It refers to the susceptibility of the media to external electrical noise that can cause distortion of data signal. o Attenuation. It refers to loss of energy as signal propagates outwards. The amount of energy lost depends on frequency. Radiations and physical characteristics of media contribute to attenuation. 4.2. Guided Media Twisted pair o The pair of twisted is the simplest transmission medium. It consists of one or more pairs of electrical son arranged spiral. o This type of support is suitable for transmission both analog and digital. o A twisted pair consists of two copper wires about 1 mm thick. o These two wires are individually contained in a plastic insulation and are twisted together in a helical form. o Polyethylene, polyvinyl chloride, flour polymer resin and Teflon(r) are some of the substances that are used for insulation purposes o The most common application of twisted pair cable IS m telephone system. o Twisted pair is distance limited. As distance between network element increases, attenuation increases and quality decreases at a given frequency. Why to twistthe wires? o Twisting of wires will reduce the effect of noise or external interference. o Number of twists per unit length will determine the quality of cable. More twists means better quality. The two types of twisted pairs are:  Unshieldedtwistedpair(UTP) o It consists of color-coded copper wires, but does not include any foil or braiding as insulator to protect against interference. o Wire pairs within each cable have varied amounts of twists per foot to produce cancellation.  Shieldedtwistedpair(STP) o TP is made up of pairs of copper wires that are twisted together. o The pairs are covered in a foil or braided mesh, as well as outer PVC jacket.
  • 31.
    Akriit45@gmail.com..................................................30 o This foilor mesh prevents the penetration of electromagnetic noise and eliminate cross talk. o This shielding must be grounded to prevent the foil or braided mesh from becoming a magnet for electricity. Advantages ofTwisted paircable o It can be used to carry both analog and digital data. o It is relatively easy to implement and terminate. o It is the least expensive media of transmission for short distances. o If portion of a twisted pair cable is damaged it does not affect the entire network. Disadvantages ofTwisted paircable o It offers poor noise immunity as a result signal distortion is more? o Attenuation is very high. o It supports lower bandwidth as compared to other Medias. It supports 10 mbps up to a distance of 100 meters on a 10BASE-T. o It offers very poor security and is relatively easy to tap. o Being thin in size, they are likely to break easily. Co-axial Cable o Coaxial cables are the guided media that cranes the signal of higher frequency range compared to twisted pair cable. o Coaxial cables are also called coax. (Short form). o Two types of coaxial cables are widely used: 50 ohm cable and 75 ohm cable. o 50 ohm cable is used for digital transmission and 75 ohm cable is used for analog transmission. o Due to the shield provided, this cable has excellent noise immunity. o It has a large bandwidth and low losses. o Co-axial cables are easy to install. o They are often installed either in a device to device daisy chain (Ethernet) or a star (ARC net). Advantages ofCoaxialCables o It can be used for both analog and digital transmission. o It offers higher bandwidth as compared to twisted pair cable and can span longer distances. o Because of better shielding in coaxial cable, loss of signal or attenuation is less. o Better shielding also offers good noise immunity. o It is relatively inexpensive as compared to optical fibers. o It has lower error rates as compared to twisted pair. o It is not as easy to tap as twisted pair because copper wire is contained in plastic jacket. Disadvantages of Coaxial Cables o It is usually more expensive than twisted pair. Optical Fibers o Optical fiber consists of thin glass fibers or plastic that can carry information at frequencies in the visible light spectrum and beyond. o The typical optical fiber consists of a very narrow strand of glass called the core. o The core is a concentric layer of glass called the cladding. o An optical transmission system has three basic components  Light source: In such a system a pulse of light indicates bit 1 and the absence of light indicates bit Light source can be an LED or a laser beam.  Transmission medium: Transmission medium is the ultra-thin fiber of glass.  Detector: A detector generates an electrical pulse when the light falls on it. o The loss in signal power as light travels down the fiber is called attenuation. o An important characteristic of fiber optics is refraction. Refraction is the characteristic of a material to either pass or reflect light.
  • 32.
    Akriit45@gmail.com..................................................31 Advantages of OpticalFiber o They are not affected by electrical and magnetic interference as the data travel in form of light. o Optical fiber offers higher bandwidth than twisted pair or coaxial cable. o Optical fibers are thin, lighter in weight and small in size as compared to other wired Medias. It is easier to group several optical fibers in one bundle. o Glass is more resistant to corrosive materials as compared to copper. Hence can be laid in different environments. o In optical fibers, attenuation (loss of signal) is very low. Therefore these fibers can run several kilometers without amplification. o Fibers do not leak light and are quite difficult to tap. So they provide security against potential wire tappers. o There is no cross-talk problem in optical fibers. o They are highly suitable for environments where speed is needed with full accuracy. Disadvantages of Optical Fiber o Fiber optics cables are fragile i.e. more easily broken than wires. o Being fragile, optical fibers need to be put deep into the land. This causes a lot of installation cost. Also the interface used for these fibers are expensive. o Optical fibers are unidirectional for two-way communication, two fibers are required. o It is a newer technology and requires skilled people to administer and maintain them. Characteristics of Optical Fiber Cables: o Fiber optic cabling can provide extremely high bandwidths in the range from 100 mbps to 2 gigabits because light has a much higher frequency than electricity. o The number of nodes which a fiber optic can support does not depend on its length but on the hub or hubs that connect cables together. o Fiber optic cable has much lower attenuation and can carry signal to longer distances without using amplifiers and repeaters in between. o Fiber optic cable is not elected by EMI effects and can be used in areas where high voltages are passing by. o The cost of fiber optic cable is more compared to twisted pair and co-axial. o The installation of fiber optic cables is difficult and tedious. Applications: o Optical fiber transmission systems are widely used in the backbone of networks. Current optical fiber systems provide transmission rates from 45 Mb/s to 9.6 GB/s using the single wavelength transmission. o The installation cost of optical fibers is higher than that for the co-axial or twisted wire cables. o Optical fibers are now used in the telephone systems. 4.3. Unguided Media o Wireless or Unguided Media or Unbound Transmission Media: Unbound transmission media are the ways of transmitting data without using any cables. o These media are not bounded by physical geography. This type of transmission is called Wireless communication. o Nowadays wireless communication is becoming popular. Wireless LANs are being installed in office and college campuses. o This transmission uses Microwave, Radio wave, Infra-red are some of popular unbound transmission media. o When an antenna is attached to electrical circuit of a computer or wireless device, it converts the digital data into wireless signals and spread all over within its frequency range. o The receptor on the other end receives these signals and converts them back to digital data. Radio Transmission o Radio frequency is easier to generate and because of its large wavelength it can penetrate through walls and structures alike. o Radio waves can have wavelength from 1km – 100,000km and have frequency ranging from 3Hz (Extremely Low Frequency) to 300 GHz (Extremely High Frequency). o Radio frequencies are sub-divided into six bands.
  • 33.
    Akriit45@gmail.com..................................................32 o Radio wavesat lower frequencies can travel through walls whereas higher RF can travel in straight line and bounce back. o The power of low frequency waves decreases sharply as they cover long distance. High frequency radio waves have more power. o Lower frequencies such as VLF, LF, MF bands can travel on the ground up to 1000 kilometers, over the earth’s surface. o Radio waves of high frequencies are prone to be absorbed by rain and other obstacles. o They use Ionosphere of earth atmosphere. High frequency radio waves such as HF and VHF bands are spread upwards. When they reach Ionosphere, they are refracted back to the earth. Very High Frequency (VHF) o It is the ITU designation for the range of radio frequency electromagnetic waves (radio waves) from 30 MHz to 300 MHz with corresponding wavelengths of ten to one meters. o Common uses for VHF are FM radio broadcasting. TV broadcasting, to way land mobile radio systems (emergency, business, private use and military), long range data communication up to several tens of kilometers with radio modems, amateur radio, and marine communication, Air Traffic Control. Ultra High frequency (UHF) o It is the ITU designation for radio frequencies in the range between 300 MHz and 3 GHz, also known as the decimeter band as the wavelengths range from one meter to one decimeter. o Radio waves with frequencies above the UHF radio waves propagate mainly by line of sight; they are blocked by hills and large building although the transmission through buildings walls is strong enough for indoor reception. o They are used TV broadcasting, cell phones, satellite communication including GPS, personal radio services including Wi-Fi and Bluetooth, walkie-talkies, cordless phones. Microwave Transmission  Electromagnetic waves above 100MHz tend to travel in a straight line and signals over them can be sent by beaming those waves towards one particular station. Because Microwaves travels in straight lines, both sender and receiver must be aligned to be strictly in line-of-sight.  Microwaves can have wavelength ranging from 1mm – 1meter and frequency ranging from 300MHz to 300GHz.  Microwave antennas concentrate the waves making a beam of it. As shown in picture above, multiple antennas can be aligned to reach farther. Microwaves have higher frequencies and do not penetrate wall like obstacles.  Microwave transmission depends highly upon the weather conditions and the frequency it is using. Infrared Transmission  Infrared wave lies in between visible light spectrum and microwaves. It has wavelength of 700nm to 1mm and frequency ranges from 300GHz to 430THz.  Infrared wave is used for very short range communication purposes such as television and it’s remote. Infrared travels in a straight line hence it is directional by nature. Because of high frequency range, Infrared cannot cross wall-like obstacles. Light Transmission  Highest most electromagnetic spectrum which can be used for data transmission is light or optical signaling. This is achieved by means of LASER.  Because of frequency light uses, it tends to travel strictly in straight line. Hence the sender and receiver must be in the line-of-sight. Because laser transmission is unidirectional, at both ends of communication the laser and the photo-detector need to be installed. Laser beam is generally 1mm wide hence it is a work of precision to align two far receptors each pointing to lasers source.  Laser works as TX (transmitter) and photo-detectors works as Rx (receiver).  Lasers cannot penetrate obstacles such as walls, rain, and thick fog. Additionally, laser beam is distorted by wind, atmosphere temperature, or variation in temperature in the path.  Laser is safe for data transmission as it is very difficult to tap 1mm wide laser without interrupting the communication channel.
  • 34.
    Akriit45@gmail.com..................................................33 4.4. Networking Componentsand Devices Hubs o Hubs receive signals through one port and send them through all other ports. o Hubs generally have 4 – 24 Rj-45 ports for twisted-pair cabling. o Hub has indicator lights to indicate the status of the port link status, collisions, and so on. o That is, a LAN configures with hubs physically falls under the category of star type topology. o However, logically, it falls under the category of a bus type topology. o Commercially available hubs normally have eight or sixteen ports. o Passive hub simply forwards any data packets they receive over one port from one workstation to all their remaining ports. o Active hubs, also sometimes referred to as "multiport repeaters", regenerate the data bits in order to maintain a strong signal. Bridges: o The bridge function is to connect separate homogeneous networks. o Bridges map the Ethernet address of the nodes residing on each network segment and allow only necessary traffic to pass through the bridge. o When a packet is received by the bridge, the bridge determines the destination and source segments. o If the segments are different, then the packet is "forwarded" to the correct segment. o Bridges are also called "store-and-forward" device because they look at the whole Ethernet packet before making filtering or forwarding decisions. Router: o Routing achieved commercially popularity in the mid – 1980s – at a time when large-scale Internetworking began to replace the fairly simple, homogeneous environments. o Routing is the act of moving information across an Internetwork from a source to a destination. o It is often contrasted with bridging, which perform a similar function. o Routers use information within each packet to route it from one LAN to another, and communicate with each other and share information that allows them to determine the best route through a complex network of many LANs. Switches: o LAN switches are an expansion of the concept in LAN bridging, which controls data flow, handles transmission errors, provides physical addressing, and manages access to the physical medium. o Switches provide these functions by using various link-layer protocols. o LAN switches can link four, six, ten or more networks together. o A store-and-forward switch, on the other hand, accepts and analyses the entire packet before forwarding it to its destination. Transceivers: o Transceivers are used to connect nodes to the various Ethernet media. o Most computers and network interface cards contain a built-in 10BaseT or 10Base2 transceiver, allowing them to be connected directly to Ethernet without requiring an external transceiver. o Many Ethernet devices provide an AUI connector to allow the user to connect to any media type via an external transceiver. Gateway: o A computer that a control the traffic of your LAN or your ISP receives is a Gateway. A server serves as a Gateway, the gateway also works as a firewall and a proxy server. o A Gateway is a device such as a mini or microcomputer capable of operating on a stand-alone basis but which also provides connection for communication with the other computers and access to shared resources. o Normally a gateway is associated with a router. A router is a device that lets you know the next network data should be sent to next. A router can be connected to more than one network at a time.
  • 35.
    Akriit45@gmail.com..................................................34 o A gatewayis associated with a router because a router which uses headers and forwarding tables to figure out where packets or data is sent provides the path through which information is sent in and out a gateway.
  • 36.
    Akriit45@gmail.com..................................................35 CHAPTER5 Link Control andMAC Protocols 5.1. Data link control (DLC) o The two main functions of the data link layer are :- 1- Data link control (deals with the design and procedures for communication between two adjacent nodes: node-to-node communication). 2- Media access control (deals how share the link). o Data link control functions include framing, flow and error control, and software implemented protocols that provide smooth and reliable transmission of frames between nodes. 5.2. Framing: The data link layer needs to pack bits into frames, so that each frame is distinguishable from another. o Our postal system practices a type of framing. The simple act of inserting a letter into an envelope separates one piece of information from another; the envelope serves as the delimiter. o Framing in the data link layer separates a message from one source to a destination, or from other messages to other destinations, by adding a sender address and a destination address. o The destination address defines where the packet is to go; the sender address helps the recipient acknowledge the receipt. Frames can be of fixed or variable size.  Fixed-SizeFraming o There is no need for defining the boundaries of the frames; the size itself can be used as a delimiter. o An example of this type of framing is the ATM wide-area network, which uses frames of fixed size called cells.  Variable-SizeFraming o We need a way to define the end of the frame and the beginning of the next. Two approaches were used for this purpose: I. Character-oriented approach o Data to be carried are 8-bit characters from a coding system such as ASCII. The header, which normally carries the source and destination addresses and other control information, and the trailer, which carries error detection or error correction redundant bits, are also multiples of 8 bits. o o To separate one frame from the next, an 8-bit (1-byte) flag is added at the beginning and the end of a frame. The flag, composed of protocol-dependent special characters, signals the start or end of a frame. II. Bit-oriented approach o The data section of a frame is a sequence of bits to be interpreted by the upper layer as text, graphic, audio, video, and so on. However, in addition to headers (and possible trailers), we still need a delimiter to separate one frame from the other. o Most protocols use a special 8-bit pattern flag 01111110 as the delimiter to define the beginning and the end of the frame o 5.3. Flow and Error Control o The most important responsibilities of the data link layer are flow control and error control. Collectively, these functions are known as data link control.
  • 37.
    Akriit45@gmail.com..................................................36 o Flow controlrefers to a set of procedures used to restrict the amount of data that the sender can send before waiting for acknowledgment. o Error control is both error detection and error correction. It allows the receiver to tell the sender of any frames lost or damaged in transmission and coordinates the retransmission of those frames by the sender. o The protocols are normally implemented in software by using one of the common programming languages.  Noiseless channels o Simplest Protocol o It is a unidirectional protocol in which data frames are traveling in only one direction-from the sender to receiver. o The receiver can immediately handle any frame it receives with a processing time that is small enough to be negligible. o The data link layer of the receiver immediately removes the header from the frame and hands the data packet to network layer, which can also accept the packet immediately. o Stop-and-Wait Protocol o If data frames arrive at the receiver site faster than they can be processed, the frames must be stored until their use. Normally, the receiver does not have enough storage space, especially if it is receiving data from many sources. o We need to tell the sender to slow down. There must be feedback from the receiver to the sender. o The sender sends one frame, stops until it receives agreement the receiver (okay to go ahead), and then sends the next frame. We still have unidirectional communication for data frames, but auxiliary ACK frames (simple tokens of acknowledgment) travel from the other direction. We add flow control to our previous protocol.  Noisy channels o Stop-and-Wait Automatic Repeat Request(ARQ) o Error correction in Stop-and-Wait ARQ is done by keeping a copy of the sent frame and retransmitting of the frame when the timer expires. o In Stop-and-Wait ARQ, we use sequence numbers to number the frames. o The sequence numbers are based on modulo-2 arithmetic. o In Stop-and-Wait ARQ, the acknowledgment number always announces in modulo-2 arithmetic the sequence number of the next frame expected. o Go-Back-N Automatic Repeat Request o To improve the efficiency of transmission (filling the pipe), multiple frames must be in transition while waiting for acknowledgment. In other words, we need to let more than one frame be outstanding to keep the channel busy while the sender is waiting for acknowledgment. o In this protocol we can send several frames before receiving acknowledgments; we keep a copy of these frames until the acknowledgments arrive, thus need sequence number for frames. o In the Go-Back-N Protocol, the sequence numbers are modulo 2m, where m is the size of the sequence number field in bits. o Selective Repeat Automatic Repeat Request
  • 38.
    Akriit45@gmail.com..................................................37 o Only thedamaged frame is resent. This mechanism is called Selective Repeat ARQ. It is more efficient for noisy links, but the processing at the receiver is more complex. o This Protocol also uses two windows: a send window and a receive window. o There are differences between the windows in this protocol and the ones in Go-Back-N. o First, the size of the send window is much smaller; it is 2m-1. The reason for this will be discussed later. o Second, the receive window is the same size as the send window. 5.4. HDLC o High-level Data Link Control (HDLC) is a bit-oriented protocol for communication over point-to-point and multipoint links. o It implements the ARQ mechanisms. HDLC provides two common transfer modes that can be used in different configurations:  Normal response mode (NRM)  The station configuration is unbalanced. We have one primary station and multiple secondary stations. A primary station can send commands; a secondary station can only respond. The NRM is used for both point-to-point and multiple-point links  Asynchronous balanced mode (ABM)  In ABM, the configuration is balanced. The link is point-to-point, and each station can function as a primary and a secondary (acting as peers)  Asynchronous Response Mode (ARM)  It is used with unbalanced configuration and secondary may transmit without permission from primary.  HDLC Frame Structure  A Beginning Flag (F1) Field.  An Address (A) Field. It is used to identify one of the terminals. It is of 8 bits.  A Control (C) Field. It is used for sequence numbers and acknowledgements. It is of 8 bits.  An Information Field (I) or data field containing information.  A Frame checks Sequences (FCS) fields. It is similar to CRC.  A Final Flag Fields  I-Frame: It Perform information transfer and independently carry message acknowledgements, and Poll of final bits.  S-Frame: It performs link Supervisory control such as message acknowledgements, retransmit requests, and request for temporary holds on I-frame transmissions.  U-Frame: It provides format for additional link control data by omitting the frame sequence numbers and thus providing a place for an additional command and response functions.
  • 39.
    Akriit45@gmail.com..................................................38 CHAPTER6 LAN 6.1. Ethernet o Ethernettopology, which is based on bus and bus-star physical configurations, is currently the most frequently configured LAN network architecture. A bus is a common pathway (usually copper wire or fiber cable) between multiple devices such as computers. A bus is often used as a backbone between devices. o Digital Equipment Corporation and Xerox (DIX) worked together to develop the first Ethernet standards. These standards are the DIX Ethernet standards and are still in use today. o In 1985, the IEEE adopted the current Ethernet standards. These standards are called the IEEE 802.2 and 802.3 standards. They differ slightly from the DIX standards, but both define the protocols for the physical and data link layers of the OSI Model. These standards include cabling specifications, frame format, and network access conventions. o Ethernet is a passive, contention-based broadcast technology that uses baseband signaling. Baseband signaling uses the entire bandwidth of a cable for a single transmission. Only one signal can be transmitted at a time and every device on the shared network hears broadcast transmissions. Passive technology means that there is no one device controlling the network. Contention -based means that every device must compete with every o there device for access to the shared network.  Ethernet Configuration: Ethernet is a broadcast topology that may be structured as a physical bus or physical star with a logical bus.   Ethernet Communication: Communication protocols for Ethernet networks encompass both the data link and physical layers of the OSI model.  Ethernet uses Carrier Sense Multiple Access/Collision Detection (CSMA/CD) when transmitting data. Carrier Sense allows a computer device to “sense” whether or not another transmission is being “carried” over the network.  Multiple Accesses means that all devices have equal access to the network. Since Ethernet is contention- based, equal access to the network for all is ensured.  Collision Detection means that a sending device can “detect” simultaneous transmission attempts. When two or more devices try to send data at the same time, the signals collide.  Frame Format There are two frame formats in Ethernet 1. DIX format frame 2. IEEE 802.2 Frame  It should be noted that if one device uses an 802.3 NIC and the other device uses a DIX Ethernet NIC, they would not be able to communicate with one another. DIX Frame (Ethernet II)
  • 40.
    Akriit45@gmail.com..................................................39  The Preambleof the frame (the first 7 bytes) indicates the start of a new frame and establishes synchronization conditions between devices. The last byte, or start frame delimiter, always has a 10101011-bit pattern. This byte indicates the start of a frame.  The Destination Address is the hardware (MAC) address of the receiving device, and the source address specifies the hardware (MAC) address of the sending device.  The Type field specifies the network layer protocol used to send the frame, for example TCP/IP.  The Data field is for the actual data being transmitted from device to device. It also contains information used by the network layer and indicates the type of connection.  The Cyclic Redundancy Check (CRC) checks that the frame is received free from corruption. IEEE 802.3 Frame Format  The IEEE standard was adopted in 1985.  Fields one and two perform the same function as the DIX preamble; however, the fields are separate. The Start Frame Delimiter (SFD) has the same 10101011-bit sequence found at the end of the DIX preamble. Both formats use the same number of bytes to perform the synchronization of the signals.  The Destination and Source Addresses can be either 2 or 6 bytes. Whether 2 or 6 bytes are used, all devices within the same network must use the same format. IEEE protocols specify that a 10Mbs network must use 6 bytes. The 2 byte length is obsolete.  The Length field indicates the number of bytes in the data field. If the data field is less than the required 46 bytes, a pad field is added to the data frame. The bytes added for padding purposes are usually zeros.  The data field contains the data to be transmitted from device to device.  The Frame Check Sequence (FCS) field is used as an error detection function. The error detection function is a calculation completed by both the source and destination devices. If the calculations do not match, an error is then generated. Three data rates are currently defined for operation over optical fiber and twisted-pair cables: 1. 10 Mbps—10Base-T Ethernet 2. 100 Mbps—Fast Ethernet 3. 1000 Mbps—Gigabit Ethernet 10Base-T: This standard supports 10 Mbps baseband transmission and uses 24 AWG unshielded Twisted Pair (UTP) cable of both Cat-3 and Cat-5 categorycables.A HUB functionsasa multi-portrepeaterwith stations connected to it with RJ45 connector. Maximumlengthof a cable segmentis100 meters.Itusesstar topology.Thisallowseasytomaintenance and diagnosis of faults. As a consequence, this is the most preferred approach used for setting up of a LAN. Fast Ethernet: It isan improvedversionof the Ethernetthatprovidescustomerswithaflexible andaffordable waytoscale network performance and interoperate with a wide range of other networking technologies. Fast Ethernet operates at 100Mbps ten times increase in speed than that of the originals IEEE 802.3 specification. GigabitEthernet:GigabitEthernetreferencesthe 1000-Mbps LAN technologiesspecified in IEEE 802.3z. It offers a speed increase 100 times that of the original IEEE 802.3 specification. 6.2. Token Ring o The Token Ring network was originally developed by IBM in the 1970s IEEE 802.5 was modeled after IBM Token Ring, and it continues to shadow IBM’s Token Ring development
  • 41.
    Akriit45@gmail.com..................................................40 o The IEEE802.5 specification is almost identical to and completely compatible with IBM’s Token Ring network So, The term Token Ring generally is used to refer to both IBM’ s Token Ring network and IEEE 802.5 networks Classical Token Rings operate at 4 Mbps and 16 Mbps o The original 4 Mbps version ran on STP cable, support for UTP telephone wire was added later A 100 Mbps version called High Speed Token Ring (HSTR) was debut in 1998, it useful to customers who wish to improve the performance of their existing Token Ring networks, however, the interfaces are expensive. Token Ring Operation  When a station wishes to transmit, it must wait for token to pass by and seize the token.  – One approach: change one bit in token which transforms it into a “start-of-frame sequence” and appends frame for transmission.  – Second approach: station claims token by removing it from the ring.  Frame circles the ring and is removed by the transmitting station.  Each station interrogates passing frame, if destined for station, it copies the frame into local buffer.  Normally, there is a one bit delay as the frame passes through a station. Token Ring  Under light load – delay is added due to waiting for the token {on average delay is one half ring propagation time}.  Under heavy load – ring is “round-robin”.  – Performance is fairer and better than Ethernet!! Performance is fairer and better than Ethernet!!  The ring must be long enough to hold the complete token.  Advantages – fair access  Disadvantages – ring is single point of failure, ring maintenance is complex due to token malfunctions Token Ring Maintenance Designated monitor  Any station can become a monitor defined procedures for becoming a monitor. Healthy monitor announces that it is a monitor at periodic interval. If a station does not see that packet for some time then it sends a “claim token”. If claim token comes back to station then it is monitor. If another wants to claim see other stations claim first some arbitration rule. Frame Fields
  • 42.
    Akriit45@gmail.com..................................................41  Start delimiter—Alertseach station of the arrival of a token (or data/command frame). This field includes signals that distinguish the byte from the rest of the frame by violating the encoding scheme used elsewhere in the frame.  Access-control byte—Contains the Priority field (the most significant 3 bits) and the Reservation field (the least significant 3 bits), as well as a token bit (used to differentiate a token from a data/command frame) and a monitor bit (used by the active monitor to determine whether a frame is circling the ring endlessly).  Frame-control bytes—Indicates whether the frame contains data or control information. In control frames, this byte specifies the type of control information.  Destinationandsource addresses—Consists of two 6-byte address fields that identify the destination and source station addresses.  Data—indicates that the length of field is limited by the ring token holding time, which defines the maximum time a station, can hold the token.  Frame-check sequence (FCS)—is filed by the source station with a calculated value dependent on the frame contents. The destination station recalculates the value to determine whether the frame was damaged in transit. If so, the frame is discarded.  End Delimiter—Signals the end of the token or data/command frame. The end delimiter also contains bits to indicate a damaged frame and identify the frame that is the last in a logical sequence. • Frame Status—is a 1-byte field terminating a command/data frame. The Frame Status field includes the address-recognized indicator and frame-copied indicator 6.3. FDDI o The Fiber Distributed Data Interface (FDDI) standard was produced by the ANSI X3T9.5 standards committee in the mid-1980s. During this period, high-speed engineering workstations were beginning to tax the capabilities of existing local-area networks (LANs) (primarily Ethernet and Token Ring). o Fiber distributed data interface (FDDI) is a high-performance fiber optic token ring LAN running at 100 Mbps over distances up to 200 km with up to 1000 stations connected. o FDDI uses a multimode fiber because the cost of single mode fiber is not justified for networks running at only 100 Mbps. It also uses LEDs instead of Lasers not only because of the lower cost but also because FDDI may sometimes be used to connect directly to user workstations, and safety against exposure to LASER radiation is difficult to maintain in that case. o FDDI defines two classes of stations A and B. Class A stations connect to both rings. The cheaper class B stations only connect to one of the rings. Depending on how important fault tolerance is, an installation can chose class A or class B stations. o The FDDI cabling consists of two fiber rings, one transmitting clockwise and the other transmitting counterclockwise. If either one breaks the other acts as backup. If both the rings break at the same points, the two rings can be joined to form a new approximately twice as long. This new ring is formed by relays at the two nodes adjoining the broken link. o The physical layer in FDDI uses 4 out of 5 schemes. Each group of 4 MAC symbols is encoded as a group of 5 bits on the medium. 16 of the 32 combinations are for data, 3 are for delimiters, 2 are for control, 3 are for hardware signaling, and 8 are unused. This scheme saves bandwidth but the self-clocking property available with Manchester coding is lost. To compensate a long preamble is used to synchronize the receiver to the sender’s clock.
  • 43.
    Akriit45@gmail.com..................................................42 o The basicFDDI protocols are modeled on the 802.5 protocols. The station must first capture a token, transmit a frame and remove it when it comes around. In FDDI the time spent in waiting for a frame to circumnavigate is reduced by allowing the station to put a new token back onto the ring as soon as it has finished transmitting its frames. In a large ring, several frames may be on the ring at the same time. The fields of an FDDI frame are as follows: • Preamble—prepares each station for the upcoming frame. • Start delimiter—indicates the beginning of the frame. It consists of signaling patterns that differentiate it from the rest of the frame. • Frame control—Indicates the size of the address fields, whether the frame contains asynchronous or synchronous data, and other control information. • Destination address—Contains a unicast (singular), multicast (group), or broadcast (every station) address. As with Ethernet and Token Ring, FDDI destination addresses are 6 bytes. • Source address—identifies the single station that sent the frame. As with Ethernet and Token Ring, FDDI source addresses are 6bytes. • Data—contains either information destined for an upper-layer protocol or control information. • Frame check sequence (FCS)—Filled by the source station with a calculated cyclic redundancy check (CRC) value dependent on the frame contents (as with Token Ring and Ethernet). The destination station recalculates the value to determine whether the frame may have been damaged in transit. If so, the frame is discarded. • End delimiter—Contains non data symbols that indicate the end of the frame. • Frame status—allows the source station to determine if an error occurred and if the frame was recognized and copied by a receiving station. 6.4. Types of computer networks 1. Personal Area Network o A Personal Area Network (PAN) is smallest network which is very personal to a user. This may include Bluetooth enabled devices or infra-red enabled devices. PAN has connectivity range up to 10 meters. PAN may include wireless computer keyboard and mouse, Bluetooth enabled headphones, wireless printers, and TV remotes. 2. Local Area Network o A computer network spanned inside a building and operated under single administrative system is generally termed as Local Area Network (LAN). Usually, LAN covers an organization offices, schools, colleges or universities. Number of systems connected in LAN may vary from as least as two to as much as 16 million. o LAN provides a useful way of sharing the resources between end users. The resources such as printers, file servers, scanners, and internet are easily sharable among computers. o LANs are composed of inexpensive networking and routing equipment. It may contains local servers serving file storage and other locally shared applications. It mostly operates on private IP addresses and does not involve heavy routing. LAN works under its own local domain and controlled centrally. o LAN uses either Ethernet or Token-ring technology. Ethernet is most widely employed LAN technology and uses Star topology, while Token-ring is rarely seen. o LAN can be wired, wireless, or in both forms at once.
  • 44.
    Akriit45@gmail.com..................................................43 3. MetropolitanArea Network oThe Metropolitan Area Network (MAN) generally expands throughout a city such as cable TV network. It can be in the form of Ethernet, Token-ring, ATM, or Fiber Distributed Data Interface (FDDI). o Metro Ethernet is a service which is provided by ISPs. This service enables its users to expand their Local Area Networks. For example, MAN can help an organization to connect all of its offices in a city. o Backbone of MAN is high-capacity and high-speed fiber optics. MAN works in between Local Area Network and Wide Area Network. MAN provides uplink for LANs to WANs or internet. 4. Wide Area Network o As the name suggests, the Wide Area Network (WAN) covers a wide area which may span across provinces and even a whole country. o Generally, telecommunication networks are Wide Area Network. These networks provide connectivity to MANs and LANs. o Since they are equipped with very high speed backbone, WANs use very expensive network equipment. o WAN may use advanced technologies such as Asynchronous Transfer Mode (ATM), Frame Relay, and Synchronous Optical Network (SONET). WAN may be managed by multiple administrations. 5. Internetwork o A network of networks is called an internetwork, or simply the internet. It is the largest network in existence on this planet. o The internet hugely connects all WANs and it can have connection to LANs and Home networks. Internet uses TCP/IP protocol suite and uses IP as its addressing protocol. o Present day, Internet is widely implemented using IPv4. Because of shortage of address spaces, it is gradually migrating from IPv4 to IPv6. o Internet enables its users to share and access enormous amount of information worldwide. It uses WWW, FTP, email services, audio, and video streaming etc. At huge level, internet works on Client- Server model. o Internet uses very high speed backbone of fiber optics. To inter-connect various continents, fibers are laid under sea known to us as submarine communication cable. o Internet is widely deployed on World Wide Web services using HTML linked pages and is accessible by client software known as Web Browsers. When a user requests a page using some web browser
  • 45.
    Akriit45@gmail.com..................................................44 located on someWeb Server anywhere in the world, the Web Server responds with the proper HTML page. The communication delay is very low. Websites E-mail Instant Messaging Blogging Social Media Marketing Networking Resource Sharing Audioand VideoStreaming
  • 46.
    Akriit45@gmail.com..................................................45 CHAPTER7 WAN 7.1. Network Routing oWhen a device has multiple paths to reach a destination, it always selects one path by preferring it over others. This selection process is termed as Routing. o Routing is done by special network devices called routers or it can be done by means of software processes. The software based routers have limited functionality and limited scope. o A router is always configured with some default route. A default route tells the router where to forward a packet if there is no route found for specific destination. In case there are multiple path existing to reach the same destination, router can make decision based on the following information:  Hop Count  Bandwidth  Metric  Prefix-length  Delay o Routes can be statically configured or dynamically learnt. One route can be configured to be preferred over others 7.2. Routing Methods 1. Distance VectorRouting Protocol o Distance Vector is simple routing protocol which takes routing decision on the number of hops between source and destination. o A route with less number of hops is considered as the best route. o Every router advertises its set best routes to other routers. Ultimately, all routers build up their network topology based on the advertisements of their peer routers, for example, Routing Information Protocol (RIP). 2. Link State Routing Protocol o Link State protocol is slightly complicated protocol than Distance Vector. o It takes into account the states of links of all the routers in a network. o This technique helps routes build a common graph of the entire network. o All routers then calculate their best path for routing purposes, for example, Open Shortest Path First (OSPF) and Intermediate System to Intermediate System (ISIS). o In link state, router knows entire network topology, and computes shortest path by itself. 7.3. IP - The Internet Protocol o IP (Internet Protocol) is a Network Layer Protocol. o IP is Higher layer protocols have to deal with losses or with duplicate packets o IP is the highest layer protocol which is implemented at BOTH routers and hosts. o IP provide provides an unreliable connectionless best effort service (also called: “datagram service”). o   Unreliable: IP does not make an attempt to recover lost packets o Connectionless: Each packet (“datagram”) is handled independently. IP is not aware that packets between hosts may be sent in a logical sequence o Best effort: IP does not make guarantees on the service (no throughput guarantee, no delay guarantee,) IP supports the following services:  one-to-one (unicast)  one-to-all (broadcast)  one-to-several (multicast) o IP multicast also supports a many-to-many service. o IP multicast requires support of other protocols (IGMP, multicast routing)
  • 47.
    Akriit45@gmail.com..................................................46 IP Address o IPaddresses are the numbers assigned to computer network interfaces. o Although we use names to refer to the things we seek on the Internet, such as www.example.org, computers translate these names into numerical addresses so they can send data to the right location. o So when you send an email, visit a web site, or participate in a video conference, your computer sends data packets to the IP address of the other end of the connection and receives packets destined for its own IP address.  IP Address Classes  Class A Address o The first bit of the first octet is always set to 0 (zero). Thus the first octet ranges from 1 – 127, i.e. o Class A addresses only include IP starting from 1.x.x.x to 126.x.x.x only. The IP range 127.x.x.x is reserved for loopback IP addresses. o The default subnet mask for Class A IP address is 255.0.0.0 which implies that Class A addressing can have 126 networks (27-2) and 16777214 hosts (224-2). o Class A IP address format is thus: 0NNNNNNN.HHHHHHHH.HHHHHHHH.HHHHHHHH  Class B Address o An IP address which belongs to class B has the first two bits in the first octet set to 10, i.e. o Class B IP Addresses range from 128.0.x.x to 191.255.x.x. The default subnet mask for Class B is 255.255.x.x. o Class B has 16384 (214) Network addresses and 65534 (216-2) Host addresses. o Class B IP address format is: 10NNNNNN.NNNNNNNN.HHHHHHHH.HHHHHHHH  Class C Address o The first octet of Class C IP address has its first 3 bits set to 110, that is: o Class C IP addresses range from 192.0.0.x to 192.255.255.x. The default subnet mask for Class C is 255.255.255.x. o Class C gives 2097152 (221) Network addresses and 254 (28-2) Host addresses. o Class C IP address format is: 110NNNNN.NNNNNNNN.NNNNNNNN.HHHHHHHH  Class D Address o Very first four bits of the first octet in Class D IP addresses are set to 1110, giving a range of: o Class D has IP address rage from 224.0.0.0 to 239.255.255.255. Class D is reserved for Multicasting. In multicasting data is not destined for a particular host, that is why there is no need to extract host address from the IP address, and Class D does not have any subnet mask.  Class E Address o This IP Class is reserved for experimental purposes only for R&D or Study. IP addresses in this class ranges from 240.0.0.0 to 255.255.255.254. Like Class D, this class too is not equipped with any subnet mask.
  • 48.
    Akriit45@gmail.com..................................................47 o What is the difference between a Private IP address and a unique IP Address?  Private addresses are the addresses people use on private networks, such as many home and office  Networks.  At a protocol level there is no difference between the addresses, but organizationally, private addresses are distinct because they can only be used within a single administration and not on the wider Internet.  This is because private addresses are set aside for use by anyone without any global coordination. You can know an address is from a block of private addresses if it:  Class A : 10.0.0.0-10.255.255.255  Class B : 172.0.0.0-172.255.255.255  Class C : 192.0.0.0-192.255.255.255 7.4. Network layer protocols 1. AddressResolutionProtocol (ARP) o While communicating, a host needs Layer-2 (MAC) address of the destination machine which belongs to the same broadcast domain or network. A MAC address is physically burnt into the Network Interface Card (NIC) of a machine and it never changes. o On the other hand, IP address on the public domain is rarely changed. If the NIC is changed in case of some fault, the MAC address also changes. This way, for Layer-2 communication to take place, a mapping between the two is required. o To know the MAC address of remote host on a broadcast domain, a computer wishing to initiate communication sends out an ARP broadcast message asking, “Who has this IP address?” Because it is a broadcast, all hosts on the network segment (broadcast domain) receive this packet and process it. ARP packet contains the IP address of destination host, the sending host wishes to talk to. When a host receives an ARP packet destined to it, it replies back with its own MAC address. o Once the host gets destination MAC address, it can communicate with remote host using Layer-2 link protocol. This MAC to IP mapping is saved into ARP cache of both sending and receiving hosts. Next time, if they require to communicate, they can directly refer to their respective ARP cache. o Reverse ARP is a mechanism where host knows the MAC address of remote host but requires to know IP address to communicate. 2. InternetControl Message Protocol (ICMP) o ICMP is network diagnostic and error reporting protocol. ICMP belongs to IP protocol suite and uses IP as carrier protocol. After constructing ICMP packet, it is encapsulated in IP packet. Because IP itself is a best-effort non-reliable protocol, so is ICMP. o Any feedback about network is sent back to the originating host. If some error in the network occurs, it is reported by means of ICMP. ICMP contains dozens of diagnostic and error reporting messages. o ICMP-echo and ICMP-echo-reply are the most commonly used ICMP messages to check the reachability of end-to-end hosts. When a host receives an ICMP-echo request, it is bound to send back an ICMP-echo-reply. If there is any problem in the transit network, the ICMP will report that problem. 3. InternetProtocol Version4 (IPv4) o IPv4 is 32-bit addressing scheme used as TCP/IP host addressing mechanism. IP addressing enables every host on the TCP/IP network to be uniquely identifiable. o IPv4 provides hierarchical addressing scheme which enables it to divide the network into sub-networks, each with well-defined number of hosts. o IPv4 also has well-defined address spaces to be used as private addresses (not routable on internet), and public addresses (provided by ISPs and are routable on internet). o Though IP is not reliable one; it provides ‘Best-Effort-Delivery’ mechanism. 4. InternetProtocol Version6 (IPv6) o Exhaustion of IPv4 addresses gave birth to a next generation Internet Protocol version 6. IPv6 addresses its nodes with 128-bit wide address providing plenty of address space for future to be used on entire planet or beyond.
  • 49.
    Akriit45@gmail.com..................................................48 o IPv6 hasintroduced Anycast addressing but has removed the concept of broadcasting. IPv6 enables devices to self-acquire an IPv6 address and communicate within that subnet. This auto-configuration removes the dependability of Dynamic Host Configuration Protocol (DHCP) servers. This way, even if the DHCP server on o That subnet is down; the hosts can communicate with each other. o IPv6 provides new feature of IPv6 mobility. Mobile IPv6-equipped machines can roam around without the need of changing their IP addresses. o IPv6 is still in transition phase and is expected to replace IPv4 completely in coming years. At present, there are few networks which are running on IPv6. There are some transition mechanisms available for IPv6-enabled networks to speak and roam around different networks easily on IPv4. o These are:  Dual stack implementation  Tunneling  NAT-PT Tunneling o If they are two geographically separate networks, which want to communicate with each other, they may deploy a dedicated line between or they have to pass their data through intermediate networks. o Tunneling is a mechanism by which two or more same networks communicate with each other, by passing intermediate networking complexities. Tunneling is configured at both ends. o When the data enters from one end of Tunnel, it is tagged. This tagged data is then routed inside the intermediate or transit network to reach the other end of Tunnel. o When data exists the Tunnel its tag is removed and delivered to the other part of the network. o Both ends seem as if they are directly connected and tagging makes data travel through transit network without any modifications. 7.5. Transport layer o Transport layer offers peer-to-peer and end-to-end connection between two processes on remote hosts. Transport layer takes data from upper layer (i.e. Application layer) and then breaks it into smaller size segments, numbers each byte, and hands over to lower layer (Network Layer) for delivery. o Functions  This Layer is the first one which breaks the information data, supplied by Application layer in to smaller units called segments. It numbers every byte in the segment and maintains their accounting.  This layer ensures that data must be received in the same sequence in which it was sent.  This layer provides end-to-end delivery of data between hosts which may or may not belong to the same subnet.  All server processes intend to communicate over the network are equipped with well-known Transport Service Access Points (TSAPs) also known as port numbers. o End - to - End Communication o A process on one host identifies its peer host on remote network by means of TSAPs, also known as Port numbers. TSAPs are very well defined and a process which is trying to communicate with its peer knows this in advance. o TRANSMISSION CONTROL PROTOCOL o The transmission Control Protocol (TCP) is one of the most important protocols of Internet Protocols suite. It is most widely used protocol for data transmission in communication network such as internet. o Features  TCP is reliable protocol. That is, the receiver always sends either positive or negative acknowledgement about the data packet to the sender, so that the sender always has bright clue about whether the data packet is reached the destination or it needs to resend it.  TCP ensures that the data reaches intended destination in the same order it was sent.  TCP is connection oriented. TCP requires that connection between two remote points be established before sending actual data.
  • 50.
    Akriit45@gmail.com..................................................49  TCP provideserror-checking and recovery mechanism.  TCP provides end-to-end communication.  TCP provides flow control and quality of service.  TCP operates in Client/Server point-to-point mode.  TCP provides full duplex server, i.e. it can perform roles of both receiver and sender. 7.6. USER DATAGRAM PROTOCOL  The User Datagram Protocol (UDP) is simplest Transport Layer communication protocol available of the TCP/IP protocol suite. It involves minimum amount of communication mechanism.  UDP is said to be an unreliable transport protocol but it uses IP services which provides best effort delivery mechanism.  In UDP, the receiver does not generate an acknowledgement of packet received and in turn, the sender does not wait for any acknowledgement of packet sent. This shortcoming makes this protocol unreliable as well as easier on processing. o Features  UDP is used when acknowledgement of data does not hold any significance.  UDP is good protocol for data flowing in one direction.  UDP is simple and suitable for query based communications.  UDP is not connection oriented.  UDP does not provide congestion control mechanism.  UDP does not guarantee ordered delivery of data.  UDP is stateless.  UDP is suitable protocol for streaming applications such as VoIP, multimedia streaming. o UDP application  Here are few applications where UDP is used to transmit data:  Domain Name Services  Simple Network Management Protocol  Trivial File Transfer Protocol  Routing Information Protocol
  • 51.
    Akriit45@gmail.com..................................................50 CHAPTER8 Application Protocol  Applicationlayer is the topmost layer in OSI and TCP/IP layered model. This layer exists in both layered Models because of its significance, of interacting with user and user applications. This layer is for applications which are involved in communication system.  A user may or may not directly interacts with the applications. Application layer is where the actual communication is initiated and reflects. Because this layer is on the top of the layer stack, it does not serve any other layers.  Application layer takes the help of Transport and all layers below it to communicate or transfer its data to the remote host. 8.1. CLIENT- SERVER MODEL  Two remote application processes can communicate mainly in two different fashions:  Peer-to-peer: Both remote processes are executing at same level and they exchange data using some shared resource.  Client-Server: One remote process acts as a Client and requests some resource from another application process acting as Server.  In client-server model, any process can act as Server or Client. It is not the type of machine, size of the machine, or its computing power which makes it server; it is the ability of serving request that makes a machine a server.  A system can act as Server and Client simultaneously. That is, one process is acting as Server and another is acting as a client. This may also happen that both client and server processes reside on the same machine. 8.2. APPLICATION PROTOCOLS 1. File Transfer Protocol  The File Transfer Protocol (FTP) is the most widely used protocol for file transfer over the network.  FTP uses TCP/IP for communication and it works on TCP port 21.  FTP works on Client/Server Model where a client requests file from Server and server sends requested resource back to the client.  FTP uses out-of-band controlling i.e. FTP uses TCP port 20 for exchanging controlling information and the actual data is sent over TCP port 21.  The client requests the server for a file. When the server receives a request for a file, it opens a TCP connection for the client and transfers the file. After the transfer is complete, the server closes the connection. For a second file, client requests again and the server reopens a new TCP connection. 2. Trivial File Transfer Protocol (TFTP)  TFTP is an unauthenticated protocol used to transfer files. TFTP depends on UDP and often is used to boot diskless workstations. 3. Hyper Text Transfer Protocol (HTTP)  The Hyper Text Transfer Protocol (HTTP) is the foundation of World Wide Web.  Hypertext is well organized documentation system which uses hyperlinks to link the pages in the text documents.  HTTP works on client server model. When a user wants to access any HTTP page on the internet, the client machine at user end initiates a TCP connection to server on port 80. When the server accepts the client request, the client is authorized to access web pages.  To access the web pages, a client normally uses web browsers, who are responsible for initiating, maintaining, and closing TCP connections.  HTTP is a stateless protocol, which means the Server maintains no information about earlier requests by clients.
  • 52.
    Akriit45@gmail.com..................................................51  HTTP versions: oHTTP 1.0 uses non persistent HTTP. At most one object can be sent over a single TCP connection. o HTTP 1.1 uses persistent HTTP. In this version, multiple objects can be sent over a single TCP connection. 8.3. Email Protocol Email Electronic mail is a communication method and something a computer user cannot work without. This is the basis of today’s internet features. Email system has one or more email servers. All its users are provided with unique IDs. When a user sends email to other user, it is actually transferred between users with help of email server. E-mail Protocols are set of rules that help the client to properly transmit the information to or from the mail server. SMPT o SMTP stands for Simple Mail Transfer Protocol. It was first proposed in 1982. It is a standard protocol used for sending e-mail efficiently and reliably over the internet. o SMTP is application level protocol. o SMTP is connection oriented protocol. o SMTP is text based protocol. o It handles exchange of messages between e-mail servers over TCP/IP network. o Apart from transferring e-mail, SMPT also provides notification regarding incoming mail. o When you send e-mail, your e-mail client sends it to your e-mail server which further contacts the recipient mail server using SMTP client. o These SMTP commands specify the sender’s and receiver’s e-mail address, along with the message to be send. o The exchange of commands between servers is carried out without intervention of any user. o In case, message cannot be delivered, an error report is sent to the sender which makes o SMTP a reliable protocol. SMTP Commands Command Description HELLO This command initiates the SMTP conversation. EHELLO This is an alternative command to initiate the conversation. ESMTP indicates that the sender server wants to use extended SMTP protocol MAIL FROM This indicates the sender’s address RCPT TO This indicates the sender’s address SIZE This command let the server know the size of attached message in bytes. DATA The DATA command signifies that a stream of data will follow. Here stream of data refers to the body of the message. QUIT This command is used to terminate the SMTP connection. VERFY This command is used by the receiving server in order to verify whether the given username is valid or not. EXPN It is same as VRFY, except it will list the entire users name when it used with a distribution list. POP vs. IMAP S.N. POP IMAP 1 Generally used to support single client Designed to handle multiple clients 2 Messages are accessed offline. Messages are accessed online although it also supports offline mode. 3 POP does not allow search facility. It offers ability to search emails. 4 All the messages have to be downloaded. It allows selective transfer of messages to the client. 5 Only one mailbox can be created on the server. Multiple mailboxes can be created on the server. 6 Not suitable for accessing non-mail data. Suitable for accessing non-mail data i.e. attachment. 7 POP commands are generally abbreviated into codes of three or four letters. e.g. STAT. IMAP commands are not abbreviated, they are full. e.g. STATUS.
  • 53.
    Akriit45@gmail.com..................................................52 8 It requiresminimum use of server resources Clients are totally dependent on server. 9 Mails once downloaded cannot be accessed from some other location. Allows mails to be accessed from multiple locations. 10 The e-mails are not downloaded automatically. Users can view the headings and sender of e-mails and then decide to download. 11 POP requires less internet usage time. IMAP requires more internet usage time.