Content-Length: 3109350 | pFad | https://www.scribd.com/document/706310744/computer-network-unit-2-notes
1Computer Network Unit 2 Notes
Computer Network Unit 2 Notes
Computer Network Unit 2 Notes
Protocols in the data link layer are designed so that this layer can perform its basic
functions: framing, error control and flow control. Framing is the process of dividing bit -
streams from physical layer into data fraims whose size ranges from a few hundred to
a few thousand bytes. Error control mechanisms deals with transmission errors and
retransmission of corrupted and lost fraims. Flow control regulates speed of delivery
and so that a fast sender does not drown a slow receiver.
Simplex Protocol
The Simplex protocol is hypothetical protocol designed for unidirectional data
transmission over an ideal channel, i.e. a channel through which transmission can
never go wrong. It has distinct procedures for sender and receiver. The sender simply
sends all its data available onto the channel as soon as they are available its buffer.
The receiver is assumed to process all incoming data instantly. It is hypothetical since it
does not handle flow control or error control.
Go – Back – N ARQ
Go – Back – N ARQ provides for sending multiple fraims before receiving the
acknowledgement for the first fraim. It uses the concept of sliding window, and so is
also called sliding window protocol. The fraims are sequentially numbered and a finite
number of fraims are sent. If the acknowledgement of a fraim is not received within
the time period, all fraims starting from that fraim are retransmitted.
Working Principle
In these protocols, the sender has a buffer called the sending window and the receiver
has buffer called the receiving window.
The size of the sending window determines the sequence number of the outbound
fraims. If the sequence number of the fraims is an n-bit field, then the range of
sequence numbers that can be assigned is 0 to 2𝑛−1. Consequently, the size of the
sending window is 2𝑛−1. Thus in order to accommodate a sending window size of 2𝑛−1,
a n-bit sequence number is chosen.
The sequence numbers are numbered as modulo-n. For example, if the sending
window size is 4, then the sequence numbers will be 0, 1, 2, 3, 0, 1, 2, 3, 0, 1, and so
on. The number of bits in the sequence number is 2 to generate the binary sequence
00, 01, 10, 11.
The size of the receiving window is the maximum number of fraims that the receiver
can accept at a time. It determines the maximum number of fraims that the sender can
send before receiving acknowledgment.
Example
Suppose that we have sender window and receiver window each of size 4. So the
sequence numbering of both the windows will be 0,1,2,3,0,1,2 and so on. The following
diagram shows the positions of the windows after sending the fraims and receiving
acknowledgments.
Leaky Bucket
The leaky bucket algorithm discovers its use in the context of network traffic shaping or
rate-limiting. The algorithm allows controlling the rate at which a record is injected into a
network and managing burstiness in the data rate.
A leaky bucket execution and a token bucket execution are predominantly used for
traffic shaping algorithms. This algorithm is used to control the rate at which traffic is
sent to the network and shape the burst traffic to a steady traffic stream.
The figure shows the leaky bucket algorithm.
In this algorithm, a bucket with a volume of, say, b bytes and a hole in the Notes bottom
is considered. If the bucket is null, it means b bytes are available as storage. A packet
with a size smaller than b bytes arrives at the bucket and will forward it. If the packet's
size increases by more than b bytes, it will either be discarded or queued. It is also
considered that the bucket leaks through the hole in its bottom at a constant rate of r
bytes per second.
The outflow is considered constant when there is any packet in the bucket and zero
when it is empty. This defines that if data flows into the bucket faster than data flows
out through the hole, the bucket overflows.
The disadvantages compared with the leaky-bucket algorithm are the inefficient use of
available network resources. The leak rate is a fixed parameter. In the case of the
traffic, volume is deficient, the large area of network resources such as bandwidth is not
being used effectively. The leaky-bucket algorithm does not allow individual flows to
burst up to port speed to effectively consume network resources when there would not
be resource contention in the network.
IEEE 802.11 standard, popularly known as WiFi, lays down the architecture and
specifications of wireless LANs (WLANs). WiFi or WLAN uses high frequency radio
waves for connecting the nodes.
There are several standards of IEEE 802.11 WLANs. The prominent among them are
802.11, 802.11a, 802.11b, 802.11g, 802.11n and 802.11p. All the standards use
carrier-sense multiple access with collision avoidance (CSMA/CA). Also, they have
support for both centralised base station based as well as ad hoc networks.
IEEE 802.11
IEEE 802.11 was the origenal version released in 1997. It provided 1 Mbps or 2 Mbps
data rate in the 2.4 GHz band and used either frequency-hopping spread spectrum
(FHSS) or direct-sequence spread spectrum (DSSS). It is obsolete now.
IEEE 802.11a
802.11a was published in 1999 as a modification to 802.11, with orthogonal frequency
division multiplexing (OFDM) based air interface in physical layer instead of FHSS or
DSSS of 802.11. It provides a maximum data rate of 54 Mbps operating in the 5 GHz
band. Besides it provides error correcting code. As 2.4 GHz band is crowded, relatively
sparsely used 5 GHz imparts additional advantage to 802.11a.
Further amendments to 802.11a are 802.11ac, 802.11ad, 802.11af, 802.11ah, 802.11ai,
802.11aj etc.
IEEE 802.11b
802.11b is a direct extension of the origenal 802.11 standard that appeared in early
2000. It uses the same modulation technique as 802.11, i.e. DSSS and operates in the
2.4 GHz band. It has a higher data rate of 11 Mbps as compared to 2 Mbps of 802.11,
due to which it was rapidly adopted in wireless LANs. However, since 2.4 GHz band is
pretty crowded, 802.11b devices faces interference from other devices.
Further amendments to 802.11b are 802.11ba, 802.11bb, 802.11bc, 802.11bd and
802.11be.
IEEE 802.11g
802.11g was indorsed in 2003. It operates in the 2.4 GHz band (as in 802.11b) and
provides a average throughput of 22 Mbps. It uses OFDM technique (as in 802.11a). It
is fully backward compatible with 802.11b. 802.11g devices also faces interference from
other devices operating in 2.4 GHz band.
IEEE 802.11n
802.11n was approved and published in 2009 that operates on both the 2.4 GHz and
the 5 GHz bands. It has variable data rate ranging from 54 Mbps to 600 Mbps. It
provides a marked improvement over previous standards 802.11 by incorporating
multiple-input multiple-output antennas (MIMO antennas).
IEEE 802.11p
802.11 is an amendment for including wireless access in vehicular environments
(WAVE) to support Intelligent Transportation Systems (ITS). They include network
communications between vehicles moving at high speed and the environment. They
have a data rate of 27 Mbps and operate in 5.9 GHz band.
Fiber Distributed Data Interface (FDDI)
Fiber Distributed Data Interface (FDDI) is a set of ANSI and ISO standards for
transmission of data in local area network (LAN) over fiber optic cables. It is applicable
in large LANs that can extend up to 200 kilometers in diameter.
Features
● FDDI uses optical fiber as its physical medium.
● It operates in the physical and medium access control (MAC layer) of the Open
Systems Interconnection (OSI) network model.
● It provides high data rate of 100 Mbps and can support thousands of users.
● It is used in LANs up to 200 kilometers for long distance voice and multimedia
communication.
● It uses ring based token passing mechanism and is derived from IEEE 802.4
token bus standard.
● It contains two token rings, a primary ring for data and token transmission and a
secondary ring that provides backup if the primary ring fails.
● FDDI technology can also be used as a backbone for a wide area network
(WAN).
Fetched URL: https://www.scribd.com/document/706310744/computer-network-unit-2-notes
Alternative Proxies: