MCA Computer Network 1 PDF
MCA Computer Network 1 PDF
(CBCS)
SEMESTER - II
COMPUTER NETWORKS
SUBJECT CODE : MCA203
© UNIVERSITY OF MUMBAI
3. Networking Devices 44
5. Transport L ayer 84
I
Syllabus
M.CA.
Semester - II
Computer Networks
Pre-requisites:
Digital Computer Fundamentals and computer architecture
Course Outcomes : At the end of the course, the students should be able
to :
Reference Books:
1. Computer Networking: A Top-Down Approach Featuring the Internet,
J. F. Kurose and K. W. Ross, Seventh Edition, Addison-Wesley.
2. Computer Networks: Principles, Technologies and Protocols for
Network design, N. Olifer and V. Olifer, Wiley India
III
Assessment:
Internal:
Assessment consists of two tests (T1 and T2). The final marks should be
the average of the two tests.
1
Unit-1
BASICS OF DIGITAL COMMUNICATION
Unit Structure:
1.0 Objective
1.1 Introduction
1.2 Basic Elements of Digital Communication System:
1.3 Signal Propagation
1.3.1 Mechanism of Signal Propagation
1.3.2 Propagation Modelling
1.4 Signal Types
1.4.1 Analog Signal
1.4.2 Digital Signal
1.5 Signal Parameters
1.6 Switching and Forwarding
1.6.1 Switching
1.6.2 Forwarding
1.7 Transmission Impairments
1.7.1 Consequences
1.7.2 Causes of Impairment
1.8 Effects of Limited Bandwidth
1.8.1 Types of Bandwidth
1.8.2 Common Issues
1.9 Data Rate Limit
1.9.1 Data Rate Limit Factors
1.9.2 Nyquist’s Theorem
1.9.3 Shannon’s Capacity
1.10 Summary
1.11 References
1.12 Exercise
1.0 OBJECTIVE
1.1 INTRODUCTION:
FEATURES:
Digital Communication is Expanding at a Rapid Rate.
Creative Expression were Encourages by digital communication.
Digital Communication Can Reach New Audiences.
Digital Communication Uses Web Code as a Tool.
The medium of digital communications is infinitely growing.
Enhanced employee engagement and empowerment
Employees are able to work better and faster
It spare a lot of efforts, money and time.
Raises important economic, public policy and societal questions.
3
1) SOURCE:
In this data input, is generally given in analog form, which is
convert digital form means to a binary numbers order, named as
information sequence. The originator can be an analog signal.
2) INPUT TRANSDUCER:
This are existent at the entry point of the system so it is
known as input transducer.
3) SOURCE ENCODER:
The waves created with cause is altered to digital signal
which contains 1’s and 0’s. The medium who convert the data is
compress the data to a least number of bits. It is a process which
helpful in effective use of the bandwidth. This process eliminates the
unnecessary excess bits or redundant bits.
4
4) CHANNEL ENCODER:
The information sequence is passed through the channel
encoder. It does the coding for error correction. At the time of
transferring of signal, for the reason that the noise in the signal, the
signal might be become reformed and therefore to change this, the
network encoder enhances approximately dismissed bits to the
transmitted information. It is known as the error correcting bits. This
might be utilize for the receiver to defeat the effects of noise.
5) DIGITAL MODULATOR:
In this the signal which to be transferred is modified here by a
carrier. Signal is correspondingly changed to analog from the digital
system, in direction to create it travel over the medium or channel.
6) CHANNEL:
This is the term which represents the transmission of the
signals from the sender to respective receiver over the physical
medium is known as communication channel.
7) DIGITAL DEMODULATOR:
It is known as initial step towards the receiver side. The sign
is transformed into analog to digital and it is also demodulated again.
8) CHANNEL DECODER:
This sequence of numbers then passed through the channel
decoder. The channel translator, after spotting the order, does some
in accuracy improvements. The misrepresentations which may
betake place at the time of transmission, are fixed by adding several
redundant bits. Addition of bits benefits in the widespread retrieval
of the new signal.
9) SOURCE DECODER:
This decoder attempt to decode the order from the knowledge
of the encoding set of rules. The subsequent signal is one time again
digitized by selection and quantizing thus, the clean output is
achieved without the information loss.
a) Reflection
b) Scattering
c) Diffraction
a) Reflection:
This happens when a signals effect on an article that is plane,
which means that any protrusions have dimensions much greater as
compare to wavelength.
b) Scattering:
It is what follows once a wave imposes on an object that is
uneven or has misdeeds with boundaries on the direction of the
wavelength. Scattering is effect that occurs on course or has
misdeeds with wavelength dimensions order.
c) Diffraction:
The significant example of diffraction are include waves
which is bending through the street corners, buildings top, and over a
doorways.
1.6.1 SWITCHING:
Switching is the mechanism in computer networks that helps
in deciding the finest direction for data broadcast. Information
Technology is procedure to forward packets upcoming from a port
towards a destination port. It is called ingress when statistics
originates on a port, and egress means when information leaves a
haven or drives out. A communication system may include number
of switches and nodes.
Circuit switching:
In this type of switching the source and terminator may
connected during communication session and one dedicated channel
is made for single connection.
Message switching:
In message switching, there is no devoted track recognised
between the source and destination, as in circuit switching. Here,
when the source knob shows the message, the terminus address is
added to the message.
11
Packet switching:
Packet is called as small pieces of data or small amount of
data. When we are sending a message over network that text or
message is distributed to a minor quantity of smithereens it is known
as packets. Packets takes a shortest way as possible to travel over the
communication network.
1.6.2 Forwarding:
Forward error correction works by addition of terminated bits
to a bit stream to aid the cryptographer notice and rectify some
broadcast errors deprived of the essential for retransmission. The
term forward stems from the truths that the movement of data is
constantly in the forward way.
12
1.7.1 Consequences:
For a digital signal, there may take place bit errors.
B) Distortion:
Distortion is a variations in the form of the signal. It is usually
realised in complex signals prepared up with dissimilar frequencies.
Every frequency unit has its separate broadcast speed going through
a medium so, it delays in arriving to end point. Each module reaches
at diverse time which result to distortion. For that reason, they have
various phases at receiver point from what they had at source’s end.
b) Harmonic distortion:
This adds overtones that are whole number multiples of a
complete signal frequencies. The nonlinearities is help to
enlargement amplitude alteration in audio systems are maximum
frequently calculate in relation of the harmonics (overtones) added to
a pure sine wave fed to the system.
d) Phase distortion:
It is away of alteration where number of time distortion
happens because of electrical reactance. In this, every modules of the
contribution signal aren’t amplified using the similar phase shift,
therefore building several parts of the result sign out of point through
the remaining of the output result.
C) Noise:
In original signal the unwanted signal mixes is known as
Noise.
There are various noise which corrupt the signal are there like
crosstalk noise, induced noise, impulse noise and thermal noise.
What is bandwidth?
The extreme quantity of information transferred through an
internet link in a stated time quantity.
16
It is known as how much data is transferring through the
internet in a specified number of time.
Symmetric Bandwidth
Symmetric bandwidth mentions to the similar size and hurries
the quantity of statistics is interconnected or voyages amongst two
given station. Downloading and uploading and of data will consume
the similar capacity – symmetrical. This category of message has
seen in the various countries throughout the world through using of
cable internet and fibre optic. Video conferencing is best example
for symmetric bandwidth. We enjoy ease transmission of video files
by using symmetric bandwidth.
Asymmetric Bandwidth
It is not same as the symmetrical, in this both ways won’t
have the equal quantity of information transfer per next. The upload
information transfer is inferior to the download information stream.
This the good example of this form of bandwidth and this is
similarly identified as Irregular Digital Subscriber Line
Remove all that can chunk the sign from your wireless router
– sugard is plays, steel folder cupboards, and ramparts. In obtaining
a battery phone or any sign broadcasting apparatus, choose
approximately that works on a incidence excluding 2.4GHz.
It formularizes as:
Formula for the maximum bit rate is:
Bandwidth:
The determined quantity of information conveyed over an
internet assembly in a stated amount of time.
1.10 SUMMARY
1.11 REFERENCES
1.12 EXERCISE
22
Unit–2
NETWORK ORGANIZATION AND
MODELS
Unit Structure
2.0 Objectives
2.1 Basics of Computer Network
2.2 Topology & Types of Topologies
2.2.1 Bus Topology
2.2.2 Ring Topology
2.2.3 Star Topology
2.2.4 Mesh Topology
2.3 Types of Networks
2.3.1 LAN
2.3.2 MAN
2.3.3 WAN
2.4 Concept of Intranet & Extranet
2.5 Ad-Hoc Networks
2.6 Types of Communications
2.6.1 Asynchronous
2.6.2 Synchronous
2.7 Modes of communications
2.7.1 Simplex, Half duplex,
2.7.2 Full duplex
2.8 Protocols
2.9 Networking models,
2.9.1 ISO-OSI
2.9.2. Reference Model,
2.9.3 Design Issues of the layer, Internet
2.9.4. Model (TCP/IP),
2.9.5 Comparison of ISO-OSI & TCP/IP Model
2.10 References
23
2.0 OBJECTIVES
Disadvantage –
1. Cables are always of a limited length.
2. In case if the common cable fails, then the entire system will
crash down.
3. Whenever network traffic is heavy, or nodes are too many, the
performance of the network goes down.
Advantages: -
1. The network can be expanded without disrupting current users.
2. Need extra capable compare with other LAN topologies.
3. Complicated implementation.
4. No traffic problem as nodes has dedicated links.
5. P2P links make the fault identification isolation process easy.
6. It helps you to avoid the chances of network failure by
connecting all the systems to a central node.
Disadvantages: -
1. Installation is complex because every node is connected to every
node.
2. Dedicated links help you to eliminate the traffic problem.
27
3. A mesh topology is robust.
4. Every system has its privacy and security
5. It is expensive due to the use of more cables.
6. No proper utilization of systems.
7. It requires more space for dedicated links.
Intranet:
Intranet is owned by a single organization and is a tool for sharing
information throughout the organization.
It is the type of Internet that is used privately.
Since, intranet is a private network so no one can use the intranet
whose have not valid username and password.
In intranet, there are a limited number of connected devices as
compared to internet. Intranet is highly secure and has a small
number of visitors.
It is used in order to get employee information, telephone
directory etc.
Extranet:
Either a single or a many organization owns Extranet.
It is managed on a contractual basis between organizations and is a
tool for sharing information between the internal members and
external members.
Like intranet, it is also a private network so only those who have a
valid username and password can use the extranet.
Extranet is used to check status, access data, send mail, place order
etc.
Synchronous Transmission:
Data is sent in the form of blocks or frames in synchronous
transmission.
It is the full duplex type of transmission where both sender and
receiver are to be synchronized.
There is no gap present between data, in the synchronous
transmission
It is more efficient and more reliable than asynchronous
transmission.
It is responsible to transfer the large amount of data.
Asynchronous Transmission:
In this asynchronous transmission, data is sent in form of byte or
character.
This transmission is the half duplex type transmission.
In this transmission start bits and stop bits are added with data. It
does not require synchronization.
32
The sender and receiver can both transmit and receive at the
same time.
2.8 PROTOCOL
TCP/IP model
The TCP/IP model stands for Transmission Control
Protocol/Internet Protocol models.
It has five layers: the application layer, transport layer, network
layer, data link layer and physical layer.
TCP/IP is a hierarchical protocol made up of interactive modules,
and each of them provides specific functionality.
Here, hierarchical means that each upper-layer protocol is
supported by two or more lower-level protocols.
38
Internet Layer
It is the second layer of the TCP/IP model.
It is also known as the network layer.
It is also responsible for send the packets from any network, and
they arrive at the destination irrespective of the route they take
ARP Protocol
o ARP stands for Address Resolution Protocol.
o ARP is a network layer protocol which is used to find the
physical address from the IP address.
o The two terms are mainly associated with the ARP Protocol:
o ARP request: When a sender wants to know the physical
address of the device, it broadcasts the ARP request to the
network.
o ARP reply: Every device attached to the network will accept the
ARP request and process the request, but only recipient
recognize the IP address and sends back its physical address in
the form of ARP reply. The recipient adds the physical address
both to its cache memory and to the datagram header
ICMP Protocol
o It stands for Internet Control Message Protocol.
o It is a mechanism used by the hosts or routers to send
notifications regarding datagram problems back to the sender.
40
o A datagram travels from router-to-router until it reaches its
destination. If a router is unable to route the data because of some
unusual conditions such as disabled links, a device is on fire or
network congestion, then the ICMP protocol is used to inform the
sender that the datagram is undeliverable.
o An ICMP protocol mainly uses two terms:
o ICMP Test: ICMP Test is used to test whether the destination is
reachable or not.
o ICMP Reply: ICMP Reply is used to check whether the
destination device is responding or not.
o The core responsibility of the ICMP protocol is to report the
problems, not correct them. The responsibility of the correction
lies with the sender.
o ICMP can send the messages only to the source, but not to the
intermediate routers because the IP datagram carries the
addresses of the source and destination but not of the router that
it is passed to.
Transport Layer
This layer is responsible for the reliability, flow control, and
correction of data which is being sent over the network.
Source port address: The source port address is the address of the
application program that has created the message.
Application Layer
It is the topmost layer in the TCP/IP model.
It is responsible for handling high-level protocols, issues of
representation.
This layer allows the user to interact with the application.
When one application layer protocol wants to communicate with
another application layer, it forwards its data to the transport
layer.
There is an ambiguity occurs in the application layer. Not every
application can be placed inside the application layer except
those who interact with the communication system. For example:
text editor cannot be considered in application layer while web
browser using HTTP protocol to interact with the network
where HTTP protocol is an application layer protocol.
OSI TCP
It is reference Model It is implemented from OSI
model
It has seven layers It has four layers
Considered to be reference tool Considered to be more reliable
Has separate session and Has Combined session and
presentation layer Presentation layer
Support only connectionless and Support only connectionless
connection oriented communication in the network
communication in the network layer
layer
Vertical Approach Horizontal approach
Model was developed before the Protocol was developed first
development of protocols then the model was developed
Protocol depend standard Protocol independant
43
2.10 REFERENCES :
1. Computer Networks : Andrew Tanenbaum
2. www.geeksforgeeks.org
3. www.javatpoint.com
4. vibdoc.com
5. www.iare.ac.in
6. www.tutorialspoint.com
7. docs.com
44
Unit-3
NETWORKING DEVICES
To understand what connecting/networking devices are, it is
important to know about Backbone Networks. Backbone Network is
a means of connecting to the LAN’s. It provides a transmission
channel for packets from being transmitted from one LAN to the
other. The individual LANs are connected to the Backbone Network
by using some types of devices such as Hubs, Repeaters, Switches,
Bridges, Routers and Gateways.
Hub
A hub works in the physical layer of the OSI model. It is a non-
intelligent device, and has no decision-making capability. What a
Hub basically does is take the input data from one of the ports and
broadcast the information to all the other ports connected to the
network
Switch
A switch is an intelligent device that works in the data link layer.
The term intelligent refers to the decision making capacity of the
Switch. Since it works in the Data link layer, it has knowledge of the
MAC addresses of the ports in the network.
Bridge
A bridge is also a device which works in the Data Link Layer,
but is more primitive when compared to a switch. Initial bridges
were used to connect only two LAN‟s, but the most recent ones
perform similar operation as the switches. It also works on the
principle of transfer of information using the MAC addresses of the
ports.
Router
Any computer can be connected to the internet via MODEM,
which performs the Modulation and the Demodulation operations.
But, when there are more than one computer at home or in an
organization, and you have a single internet connection, you need a
Router. Router is a device which is used when multiple devices need
to connect to the Internet using the same IP.
IEEE 802.11
IEEE 802.11 is a standard for Wi-Fi. There are several
different technologies/ generations that have been implemented. As
mentioned, the recent modems are IEEE 802.11 b/g modems. The
word b/g has the meaning as follows:
Brouter
Brouter (Bridging Router) is a device which has two
functions. Brouter acts as a router for known protocols (known by
the router and those on the network) and hence works in the network
layer. For data packets with unknown protocols, it acts as a bridge
by connecting two different networks which is the function of a
bridge - and this works in the data-link layer.
48
Gateway
The Gateway devices work in the Transport layer and above, where
the different network technologies are implemented. A gateway is
necessary when there are different technologies implemented by the
different LANs which are to be connected together.
Connecting Cables
While connecting different networks, we come across
different connecting cables, which are as follows:
REFERENCES
1. Computer Networks : Andrew Tanenbaum
2. www.geeksforgeeks.org
3. www.javatpoint.com
4. vibdoc.com
5. https://www.guru99.com/type-of-network-topology.html
6. https://minigranth.in/computer-networks-tutorial/computer-network-
models
7. https://www.coursehero.com/file/56309017/tcp-ip-modeldocx/
50
Unit-4
APPLICATION, PRESENTATION &
SESSION LAYER (Part 1)
Unit Structure:
4.1 Objectives
4.2 Introduction
4.3 Principles of Application Layer Protocols
4.4 The Web and HTTP
4.5 FTP
4.6 Telnet
4.7 Summary
4.1 OBJECTIVES
4.2 INTRODUCTION
Electronic Mail.
The Web and HTTP
52
Electronic Mail in the Internet such as SMTP, MIME, POP3,
IMAP
Instant Messaging.
Login into a Remote Computer Such as Telnet Login.
P2P File Sharing
Multiuser Networked Games.
Streaming stored video Clips.
Internet Phone.
Real Time video Conferencing.
HTTP is connectionless:
The HTTP client, i.e., a browser starts an HTTP request and
the client waits for the answer after a request is made. The server
handles the request and sends a reply to the client, then client
disconnects the link. Thus, during current request and response, the
client and server know each other. New connections are made with
new requests.
HTTP is stateless:
HTTP is a stateless protocol as both the client and server
know each other only during the current request. Due to this nature
of the protocol, both the client and server do not retain the
information between various requests of the web pages.
Basic Architecture
The following diagram shows a very basic architecture of a
web application and depicts where HTTP sits:
54
4.5 FTP
Mechanism of FTP
The above figure shows the basic model of the FTP. The FTP
client has three components: the user interface, control process, and
data transfer process. The server has two components: the server
control process and the server data transfer process.
If, during the same session, the user wants to transfer another
file, FTP opens another data connection. Thus, with FTP, the control
connection remains open throughout the duration of the user session,
but a new data connection is created for each file transferred within a
session (that is, the data connections are non-persistent).
Advantages of FTP:
Speed: The FTP is one of the fastest ways to transfer the files
from one computer to another computer directly.
Efficient: It is more efficient as we do not need to complete all
the operations to get the entire file.
Security: To access the FTP server, we need to login with the
username and password. Therefore, we can say that FTP is
secure.
Back & forth movement: FTP allows us to transfer the files
back and forth.
Security of FTP
FTP does not encrypt traffic, and individuals can capture
packets to read usernames, passwords and other data.
4.6 TELNET
4.6.3 NVT
NVT uses two sets of characters, one for data and one for
control. Both are 8-bit bytes. Telnet uses only one TCP connection.
The same connection is used for sending both data and control
characters. Telnet accomplishes this by embedding the control
characters (Table 5.1) in the data stream. To distinguish data from
control characters, each sequence of control characters is preceded
by a special control character called interpret as control (IAC).
Table 5.1: Some NVT control characters
62
Options (Table 5.2) are extra features available to a user with a more
sophisticated terminal. Telnet lets the client and server negotiate
options before or during the use of the service.
4.7 SUMMARY
64
Unit-4A
APPLICATION, PRESENTATION &
SESSION LAYER (Part 2)
Unit Structure:
4A.1 Objectives
4A.2 Introduction
4A.3 Electronic Mail in the Internet
4A.3.1 SMTP
4A.3.2 MIME
4A.3.3 POP3
4A.3.4 IMAP
4A.4 DNS
4A.5 Introduction to SNMP
4A.6 Summary
4A.1 OBJECTIVES
4A.2 INTRODUCTION
4A.3.1 SMTP
Components of SMTP
First, we split down the SMTP client and the SMTP server
into two elements such as User Agent (UA) and Message Teansfer
Agent (MTA). The User Agent (UA) plans the message and
produces the box. The message is then inserted in the envelope. This
mail is transferred over the internet through the mail transfer agent
(MTA).
Working of MIME
SMTP moves the email from the senders' side to the reception
mailbox and saves it and adds a MIME header to the original
header and gives additional detail. As a message access agent,
POP organizes messages to the mail recipients' machine from the
mail server. POP enables the user agent to bind to a transmitting
agent.
70
MIME Header:
It is added to the original e-mail header section to define
transformation. There are five headers which we add to the
original header:
Content-transfer-encoding : <type>
The various encoding methods used are given in the table
below:
The POP3 server asks for the POP3 client user name in order
to create a connection between the server POP3 and the POP3 client.
If the POP3 server identifies the user name, the ok message is sent.
Then it asks the POP3 client's password and then transfers the POP3
client to the POP3 server. The POP3 server sends an OK message if
the password fits, and the link is established. The client will see the
POP3 mail server mail list after establishing a connection. In the
mail list, the customer gets the server email numbers and sizes. The
user will launch mail recovery from this collection. Once the client
receives all of the user addresses, all the server emails will be
removed. We may also assume that emails are only contained on a
certain computer, so that the same mails cannot be read on another
machine. The emailed settings can be modified to leave an email
copy on the email server to resolve this condition.
4A.3.4 IMAP
Features of IMAP :
It is able to manage and organize many mailboxes into
different categories.
Provides the inclusion of message flags to track messages.
It will decide to get emails before uploading from a mail
server.
Download multimedia quickly as you connect many files.
POP Vs IMAP:
The following table lists the differences between POP and IMAP-
Table 4A.3: Differences between POP and IMAP
Post Office Protocol Internet Message Access
Protocol
You can only read the mail after Before uploading, you can
POP has been downloaded. review your email content via
IMAP.
You should upload the email The email is saved on the mail
address to local machine and server.
remove the copy on the server.
76
In the mail box of the mail server The customer is able to organize
the recipient cannot organise server mails.
mails.
Only from a single computer can The customer is able to organize
mails be read. server mails.
The main benefit is that mails
can be read from different
computers.
The POP does not synchronize The mail and the mail account of
mail server and mail account the recipient are synced in
recipient. IMAP.
Therefore, no modifications to Thus, modifications to the mail
the client's mail account on the account of the customer are
online mail mailbox can be immediately seen on the online
found. mailbox.
Example- Example-
If you are using POP and marks a If you are using IMAP and
mail as read, it does not get marks a mail as read, it gets
marked as read in the web mail marked as read in the web mail
inbox because the mails are inbox too because the changes
downloaded to the computer and are taking place on the server.
so the changes won’t be visible
on the server.
POP is a stateful protocol before IMAP is a stateful protocol and
all e-mail and stateless sessions for each device, the IMAP server
are downloaded. needs to keep a folder hierarchy.
For those who don't search their For people who routinely search
mail on other machines, POP is a their mails on other machines,
great option. IMAP is a safer option.
4A.4 DNS
Label Description
aero Airlines and aerospace companies
biz Businesses or firms
com Commercial Organizations
coop Cooperative business Organizations
edu Educational institutions
gov Government institutions
info Information service providers
int International Organizations
mil Military groups
museum Museum & other nonprofit organizations
name Personal names
net Network Support centers
org Nonprofit Organizations
pro Professional individual Organizations
78
Country Domain
The country domain format is the same as the generic
domains, but instead of three organizational abbreviations, it uses
two-character country abbreviations (for example, for us in the
United States).
Inverse Domain
For mapping an address to a name, the inverse domain is used.
When a client requested the server and only approved client’s files
are in the server. To see if the client is included or not, a question is
sent to the DNS server and a request is made for an address to be
mapped to the name.
Working of DNS:
DNS is a networking protocol client/server network. DNS
clients submit server questions while DNS servers send the client
answers. The requests for the Client include a name transformed in a
DNS-lookup IP address, with requests that contain an IP-address
translated into a DNS-lookup name. DNS implements the
hierarchical directory to store online the names of all hosts. While a
client such as a Web browser sends an application with a hostname,
the DNS resolver will submit a request for the IP address of a
hostname to the DNS server. When a DNS server does not have a
79
hostname IP address, it transfers the message to a different DNS
server. If the IP address has entered the resolver, the response will be
completed by the Internet protocol.
Case Study
Management Components
Management is not only accomplished through the SNMP
protocol but also by using other SNMP protocols. The other two
81
protocols, SMI (Management knowledge structure), and MIB,
accomplish management (management information base).
MIB
The second aspect of network management is the MIB
(Management Knowledge Base).Each agent has a MIB, a list of all
items managed by the manager. MIB is divided into eight classes, ip,
ip, tcp, udp, egp, etc. MIB is the following. These classes are the
object of the mib.
4A.6 SUMMARY
84
Unit-5
TRANSPORT LAYER
Unit Structure :
5.1 Objectives
5.2 Introduction
5.3 Transport-Layer Services
5.4 Port addressing
5.5 Multiplexing and Demultiplexing
5.6 Principles of Reliable Data Transfer
5.7 Congestion Control
5.8 TCP’s Congestion Control
5.9 Summary
5.1 OBJECTIVES
5.2 INTRODUCTION
Let's look at a case in point. Consider the figure 5.5. Two web
host clients, Yajat and Kkomal are connecting to same HTTP web-
server at Port 80. Yajat runs two tabs to connect to web server. Two
ephemeral port numbers 7533 and 7530 are assigned to each.
Transport layer at his system, multiplex the two segments and sends
to network layer. At server side, transport layer de-multiplexes the
90
segments received from Yajat’s process and Kkomal’s process and
delivers to the appropriate processes. A socket pair, consisting of the
source and destination IP addresses and port numbers, is also unique
and identifies the conversation between the two hosts. Therefore, the
communication with socket address1: Yajat m/c IP + 7533 and with
socket address2 Yajat m/c IP +7530 is different and there is no clash
of information while processing received response at Yajat’s
machine by transport layer.
Total Length: This is the total length of the user datagram and it is
16 bit (0 to 65535 bytes) long. A UDP user datagram can be stored
in an IP datagram with a length of 65535 bytes.
UDP segment total length = IP length – IP header’s length.
Checksum: Checksum is used to detect the errors in the whole user
datagram (Data + header).
Some of the well known ports are given in table 5.2.
TCP Segment
ACK: If the ACK is set to 0, then it means that the data packet does
not contain an acknowledgment.
PSH: If this field is set, then it requests the receiving device to push
the data to the receiving application without buffering it.
5.9 SUMMARY
103
Unit-6
QUALITY OF SERVICE
Unit Structure :
6.1 Objectives,
6.2 Introduction,
6.2.1 Flow Characteristics
6.2.2 Flow Classes
6.3 Queue Analysis
6.4 QoS Mechanisms
6.5 Queue management Algorithms
6.6 Feedback,
6.7 Resource
6.8 Reservation
6.9 Summary
6.10 Reference for further reading
6.11 Unit End Exercises
6.1 OBJECTIVES
6.2 INTRODUCTION
Scheduling techniques:
1. FIFO queuing,
2. priority queuing, and
3. Weighted fair queuing.
1. FIFO Queuing
In FIFO queuing, packets reside in a buffer or queue until the
node (router or switch) is ready to process them. If the arrival rate of
a packet is more than the processing rate, the queue will fill up and
new packets will be thrown away. A FIFO queue is close to those,
for example who have had to wait for a bus at a bus stop. Figure 2
shows a conceptual view of a FIFO queue.
2. Priority Queuing
In priority queuing, first packets are allocated to a priority
class. Every priority class has its own queue system. The packets
belonging to the highest priority queue are processed first. Packets in
the lowest-priority queue are processed last. the system continues to
serve a queue until it is empty. Figure 3 shows priority queuing with
two priority levels. Priority queuing is non-preemptive. This
technique lead to complete starvation of low-priority traffic, but only
if the high-priority traffic consumes 100% of the outbound
bandwidth.
106
The system removes one token at a time for every cell of data
sent to the network. For example, if n is 50 and the host is idle
for 50 ticks, the bucket collects 2500 tokens. Now the host can
consume all these tokens in one tick with 2500 cells.
The host can send bursty data as long as the bucket is not empty.
110
Reservations
Using reservation congestion is avoided and also to provide
confident service to applications is called a reservation scheme.
This scheme is an integral part of ATM networks. When a logical
connection is established between user and network, the network
and the user comes inside a traffic contract, which states a data
rate and other characteristics of the traffic flow.
The network agrees to give a defined QoS so long as the traffic
flow is within contract parameters; surplus traffic is either
discarded or managed on a best-effort basis, subject to discard.
If the current outstanding reservations are such that the network
resources are insufficient to meet the new reservation, then the
new reservation is contradictory.
One feature of a reservation scheme is traffic policing. A
node in the network, generally the node to which the end
system attaches, monitors the traffic flow and compares it to the
traffic contract.
111
Resource Reservation
A flow of data needs resources such as a buffer, bandwidth, CPU
time, and so on.
The quality of service is improved if these resources are reserved
in advance.
Admission Control
Admission control refers to the equipment used by a router, or a
switch, to accept or reject a flow based on pre-decided
parameters called flow specifications.
1. Integrated Services,
Flow Specification
When a source makes a reservation, it is required to explain a
flow specification. A flow specification has two parts:
Admission
When a router receives the flow specification from an
application, the router decides to acknowledge or deny the service.
The decision is based on the previous dedication of the router and
the current availability of the resource.
Service Classes
Two classes of services have been defined for Integrated
Services: guaranteed service and controlled-load service.
RSVP
Integrated Services model, an application program needs a
resource reservation scheme. The resource reservation is used for
a flow.
IntServ will be used at the IP level, for that requires creating a
flow, a kind of virtual-circuit network, out of the IP, which was
originally designed as a datagram packet-switched network.
A VC network needs a signaling system to set up the virtual
circuit before data traffic can start.
The Resource Reservation Protocol (RSVP) is a signaling
protocol to help IP create a flow and in consequence make a
resource reservation.
1. Features of RSVP
RSVP is a receiver oriented signaling protocol. The receiver
initiates and maintains resource reservation.
It is used both for sending data from one source to one
destination and sending data simultaneously to a group of
destination computers.
RSVP supports dynamic automatic adaptation to changes in
network.
It provides a number of reservation styles. It also provides
support for addition of future styles.
2. RSVP Messages
There are two types of RSVP messages
a. Path Messages: A path message is sent by the sender to all
receivers by multicasting storing the path state at each node in its
path. It stores the necessary information so that the receivers can
make the reservation.
114
b. Reservation messages: The resv message is sent by the receiver
to the sender along the reverse path of the path message. It
identifies the resources that is requires by the data flow.
2. Differentiated Services
Differentiated Services is a class-based QoS model designed for
IP.
Differentiated Services was introduced by the IETF (Internet
Engineering Task Force) to handle the shortcomings of
Integrated Services.
Two fundamental changes were made:
1. The main processing was going from the core of the network to
the edge of the network. This solves the scalability problem. The
routers do not store the information about flows. The applications, or
hosts, define the type of service they need to send a packet each
time.
DS Field
In Diffserv, each packet consists of a field called the DS field.
The value of this field is set at the perimeter of the network by
the host or the first router appointed as the boundary router.
IETF proposes to replace the existing TOS (type of service) field
in IPv4 or the class field in IPv6 by the DS field, as shown in
Figure 8.
Fig 8. DS field
Traffic Conditioner
To implement Diffserv, the DS node uses traffic conditioners
such as meters, markers, shapers, and droppers, as shown in
Figure 9.
6.9 SUMMARY
117
Unit-7
NETWORK LAYER - ROUTING
Unit Structure :
7.1 Objectives,
7.2 Introduction,
7.3 Network Service Model
7.4 Datagram & Virtual Circuit
7.5 Routing Principles
7.6 The Internet Protocol
7.7 IPv4 & IPv6
7.8 IP addressing and subnetting
7.9 Routing Algorithms
7.10 Hierarchical Routing,
7.11 Summary
7.12 Reference for further reading
7.13 Unit End Exercises
7.1 OBJECTIVES
7.2 INTRODUCTION
● Guaranteed delivery.
This service guarantees that the packet will ultimately arrive
at its destination.
119
● Guaranteed delivery with bounded delay.
This service not only guarantees delivery of the packet, but
also delivery within a specified delay bound, for example, within
100 msec.
● Security services.
Using a secret session key known only by a source and destination
end system, the network layer in the source host could encrypt the
capacity of all datagrams being sent to the destination host.
2. Data transfer.
● As shown in Figure 2, once the VC has been set up, packets can
begin to flow together with the VC.
3. VC teardown.
● This begins when the sender or receiver informs the network
layer of its desire to terminate the VC. The network layer informs
the end system on the other side of the network of the call
termination and updates the forwarding tables in each of the packet
routers on the path to specify that the VC no longer exists.
4. The messages that the end systems send into the network to begin
or end a VC, and the messages passed between the routers to set up
the VC are known as signaling messages, and the protocols.
Datagram Networks
● In a datagram network, each time an end system needs to send a
packet; it punches the packet with the address of the destination
end system and then sends the packet into the network.
● As shown in Figure 3, there is no VC setup and routers do not
maintain any VC state information.
123
● A packet is transmitted from source to destination; it passes
through a series of different routers. Packet’s destination address
is used to forward the packet to the destination.
● Each router contains a forwarding table that maps destination
addresses to link interfaces; when a packet arrives at the router,
the router uses the packet’s destination address to look up the
appropriate output link interface in the forwarding table.
● The router then purposely forwards the packet to that output link
interface.
● To get some further insight into the lookup operation, let’s look
at a specific example.
\
Version Number
These 4 bits specify the IP protocol version of the datagram.
By looking at the version number, the router can determine how to
interpret the remainder of the IP datagram. Different versions of IP
use different datagram formats. The datagram format for the current
version of IP, IPv4 is shown in the figure 4 above.
Header Length
Because an IPv4 datagram can contain a variable number of
options, these 4 bits are needed to determine where in the IP
datagram the data actually begins. Most IP datagrams do not contain
options, so the typical IP datagram has a 20-byte header.
126
Type of Service
The types of service (TOS) bits were included in the IPv4
header to allow different types of IP datagrams to be distinguished
from each other.
Datagram Length
This is the total length of the IP datagram (header plus data),
measured in bytes. Since this field is 16 bits long, the theoretical
maximum size of the IP datagram is 65,535 bytes. However,
datagrams are rarely larger than 1,500 bytes.
Time-to-live
The time-to-live (TTL) field is included to ensure that
datagrams do not circulate forever in the network. This field is
decremented by one each time the datagram is processed by a router.
If the TTL field reaches 0, the datagram must be dropped.
Protocol
This field is used only when an IP datagram reaches its final
destination. The value of this field indicates the specific transport-
layer protocol to which the data portion of this IP datagram should
be passed. For example, a value of 6 indicates that the data portion is
passed to TCP, while a value of 17 indicates that the data is passed
to UDP.
Header Checksum
The header checksum aids a router in detecting bit errors in a
received IP datagram. The header checksum is computed by treating
each 2 bytes in the header as a number and summing these numbers
using 1s and complement arithmetic.
Options
The options fields allow an IP header to be extended. Header
options were meant to be used rarely hence the decision to save
127
overhead by not including the information in options fields in every
datagram header.
Data (Payload)
The data field of the IP datagram contains the transport-layer
segment (TCP or UDP) to be delivered to the destination. However,
the data field can carry other types of data, such as ICMP messages.
IPv4
● A host contains only a single link into the network; when the IP
datagram in the host needs to send a datagram, it is done over the
link.
● The border between the host and the physical link is called an
interface. Because a router’s responsibility is to receive a
datagram on one link and forward the datagram on some other
required link over network, a router necessarily has two or more
links to which it is connected to each other.
● The boundary between the router and any one link is also called
as an interface.
Example:
IPv6
Version:
This 4-bit field identifies the IP version number. IPv6 carries
a value of 6 in this field. Note that putting a 4 in this field does not
create a valid IPv4 datagram.
Traffic class:
This 8-bit field is similar in spirit to the TOS field we saw in
IPv4.
129
Flow label:
This 20-bit field is used to identify a flow of Datagrams.
Payload length:
This 16-bit value is treated as an unsigned integer giving the
number of bytes in the IPv6 datagram following the fixed-length, 40-
byte datagram header.
Next header:
This field identifies the protocol to which the contents data
field of this datagram will be delivered (for example, to TCP or
UDP). The field uses the same values as the protocol field in the
IPv4 header.
Hop limit:
The contents of this field are decremented by one by each
router that forwards the datagram. If the hop limit count reaches
zero, the datagram is discarded.
Class B Subnets
● In Class B subnet, by default, using Classful Networking, 14 bits
are used as network bits providing (214) 16384 Networks and
(216-2) 65534 Hosts.
● Class B IP Addresses can be subnetted the same way as Class A
addresses, by borrowing bits from Host bits.
Class C Subnets
● Class C IP addresses are normally assigned to a very small size
network because it can only have 254 hosts in a network.
1. Scale.
As the number of routers becomes large, the overhead involved
in computing, storing, and communicating routing information (for
example, LS updates or least-cost path changes) becomes
prohibitive.
2. Administrative autonomy.
Although researchers tend to ignore issues such as a company’s
desire to run its routers as it please (for example, to run whatever
routing algorithm it chooses) or to hide aspects of its network’s
internal organization from the outside, these are important
considerations. Ideally, an organization should be able to run and
administer its network as it wishes, while still being able to connect
its network to other outside networks.
7.11 SUMMARY
● Learned that the network layer involves each and every host and
router in the network. Because of this, network-layer protocols
are among the most challenging in the protocol stack.
136
● Learned that a router may need to process millions of flows of
packets between different source-destination pairs at the same
time.
● To permit a router to process such a large number of flows,
network designers have learned over the years that the router’s
tasks should be as simple as possible. Many measures can be
taken to make the router’s job easier, including using a datagram
network layer rather than a virtual-circuit network layer, using a
streamlined and fixed-sized header, eliminating fragmentation,
and providing the one and only best-effort service.
● Understand the underlying principles of routing algorithms.
● Learned how routing algorithms abstract the computer network
to a graph with nodes and links.
● Understand how hierarchy is used to deal with the problem of
scale by partitioning large networks into independent
administrative domains called autonomous systems (ASs).
137
Unit-8
NETWORK LAYER ROUTING & UNICAST
ROUTING PROTOCOLS
Unit Structure :
8.1 Objectives,
8.2 Introduction,
8.3 Routing in the Internet
8.4 Intra and inter domain routing
8.5 Unicast Routing Protocols RIP, OSPF, BGP
8.6 Summary
8.7 Reference for further reading
8.8 Unit End Exercises
8.1 OBJECTIVES
8.2 INTRODUCTION
Cost or Metric
To assign a cost for a packet passing through a network is
called a cost metric. Higher the cost results in delay packets. Lower
the cost can be thought of as something good. For example, if
maximizing the throughput in a network, the high throughput means
low cost and the low throughput means high cost.
● Load: This refers to the degree to which the network assets like
router or network link are busy. A Load can be calculated as CPU
utilization, packets processed per second. If the traffic increases in
the network, then the load value will also be increased. The load
value changes as regards the change in the traffic.
2. Default Routing
❏ Default Routing is a technique in which a router is arranged
such that to send all the packets to the same hop device. A
Packet is transmitted to the particular device for which it is
configured in default routing.
❏ Default Routing is used for the deal with the single exit point.
❏ It is useful when the mass transmission networks have to
transmit the data to the same hop device.
❏ The router will choose the specific route rather than the
default route.
❏ When a specific route is not mentioned the default route is
selected in the routing table.
3. Dynamic Routing
❏ It is also called Adaptive Routing.
❏ In this technique a router adds a new route in the routing table
for each packet after the changes in the topology of the
network.
❏ Dynamic protocols are used to find the new routes to reach
the destination.
❏ In Dynamic Routing, RIP and OSPF are the protocols used to
locate the new routes.
❏ If any route goes down or not available, then the automatic
adjustment will be made to reach the destination.
Inter-domain routing
Routing between two or more autonomous systems is referred
to as inter-domain routing. Each autonomous system can choose one
or more intradomain routing protocols to handle routing inside the
autonomous system.
1. Initialization of DV table
This state is stable, each node knows how to reach any other
node and the cost of that node. At the beginning, anyhow this is not
the case. Each node can know only the distance between itself and
its immediate neighbors, those directly connected to it through
proper link. Let us assume that each node can send a message to the
immediate neighbors and find the distance between itself and these
neighbors’ nodes. Figure 3 shows the initial vector tables for each
node. The distance for any entry that is not a neighbor is marked as
an infinite loop.
Figure 8.5 shows how node A updates its routing table after
receiving the partial table from node C.
RIP
The Routing Information Protocol is an intradomain routing
protocol used inside an autonomous system. It is a very
straightforward protocol based on distance vector routing. RIP used
distance vector routing directly with considerations:
1. Design of the states of the links by each node, called the link
state packet (LSP).
2. Circulation of LSPs to every other router, called flooding, in an
efficient and reliable way.
3. Origin of a shortest path tree for each node.
4. Computation of a routing table based on the shortest path tree.
OSPF
The Open Shortest Path First OSPF protocol is an
intradomain routing protocol, its based on the concept of link state
routing protocol. Its domain is also called an autonomous system.
OSPF protocol divides an autonomous system into areas and
subsections. An area is a group of networks, hosts, and routers all
contained within an autonomous system. An autonomous system can
be split into many different areas. All networks inside an area must
be connected to each other through a link. Routers inside an area
flood the area with the help of routing information. At the border or
boundary of an area, special routers called area border routers. the
areas inside an autonomous system is a special area called the
148
backbone AS. All the areas inside an AS must be connected to the
backbone of the system. The area identification of the backbone is
zero. Figure 8.8 shows an autonomous system and its areas.
BGP
Border Gateway Protocol is an interdomain routing protocol,
It uses path vector routing. For example, a large business that
manages its own network and has full control over it is an
autonomous system. A local ISP that provides services to local
customers is called an autonomous system. This divides autonomous
systems into three categories: stub, multihomed, and transit.
150
Stub AS. A stub AS has only one connection to another AS. The
interdomain data traffic in a stub AS can be either created or
terminated in the AS.
AS-PATH:
This attribute contains the ASs through which the
advertisement for the prefix has passed. When a prefix is passed into
an AS, the AS adds its ASN to the ASPATH attribute.
NEXT-HOP:
Providing the critical link between the inter-AS and intra-AS
routing protocols, the NEXT-HOP attribute has a subtle but
important use. The NEXT-HOP is the router interface that begins the
AS-PATH.
8.6 SUMMARY
153
Unit-9
ATM NETWORKS
Unit Structure
9.1 Objectives,
9.2 Introduction,
9.3 ATM Networks:
9.3.1 Need for ATM,
9.3.2 ATM Layers,
9.3.3 ATM adaptation Layers,
9.3.4 IP over ATM,
9.4 Multi-protocol Label switching (MPLS),
9.5 Drawbacks of traditional routing methods,
9.6 Idea of TE, TE and Different Traffic classes
9.7 Summary
9.8 Reference for further reading
9.9 Unit End Exercises
9.1 OBJECTIVES
9.2 INTRODUCTION
Design Goals
2. The system must interact with existing systems and provide wide
area interconnectivity between them without lowering their
effectiveness or requiring their replacement.
1. Frame Networks
● Prior to ATM, data communications at the data link layer had
been based on frame switching and frame networks.
● Different protocols use frames of varying size and intricacy. As
networks are more complex, the information that must be carried
in the header becomes more extensive.
● The result is huge and larger headers relative to the size of the
data unit. Protocols have bigger the size of the data unit to make
header use more efficient (sending more data with the same size
header).
● regrettably, large data fields create waste. If there is no
information to transmit, the field goes unused. To improve
utilization, some protocols provide different frame sizes to users.
3. Cell Networks
● Numerous problems associated with frame internetworking are
solved by adopting a concept called cell networking.
● A cell is a small data unit of fixed size length.
● In a cell network, which uses the cell as the basic unit of data
exchange, all data are loaded into same size cells that can be
transmitted with complete monotony and uniformity.
● As frames with different sizes and formats reach the cell network
from a side stream network, they are split into multiple small
data units of equal length and are loaded into cells.
● The cells are then multiplexed with other cells networks and
routed through the cell network. Because each cell is the same
size and all are small, the problems correlate with multiplexing
different-sized frames are avoided.
4. Asynchronous TDM
● ATM uses asynchronous time-division multiplexing to multiplex
cells corning from different channels.
● It uses fixed-size slots or the size of a cell. ATM multiplexers
pack a slot with a cell from any input channel that has a cell. If
the slot is empty then none of the channels has a cell to send.
● Figure 4 shows how cells from three inputs are multiplexed. At
the first mark of the clock: channel 2 has no cell (empty input
slot), so the multiplexer fills the slot with a cell from the third
channel.
● When all the cells from all the channels are multiplexed, the
output slots are empty.
Virtual Connection
● Connection between two endpoints is fulfilled through
transmission paths (TPs), virtual paths (YPs), and virtual circuits
(YCs).
● A transmission path (TP) is the physical connection (wire, cable,
satellite, and so on) between two endpoints and a switch or
between two switches.
● Example, two switches as two cities. A transmission path is the
set of all roads that directly connect the two cities. A
transmission path is divided into a number of virtual paths. A
virtual path (VP) provides a connection between two switches on
the network. Think of a virtual path as a road that connects two
cities. Each road is a virtual path; the set of all roads is the
transmission path. Cell networks are based on virtual circuits
(VCs). All cells belonging to a single message follow the same
virtual circuit and remain in their original order until they reach
their destination. Think of a virtual circuit as the lanes of a road
(virtual path).
● Figure 6 shows the relationship between a transmission path (a
physical connection), virtual paths (a combination of virtual
circuits that are bundled together because parts of their paths are
the same), and virtual circuits that logically connect two points.
● The end systems use all three layers while the switches use only
the two bottom layers
● Ethernet and wireless LANs & ATM cells can be carried by any
physical layer carrier.
● Header Format ATM uses two formats for this header, one for
user-to-network interface (UNI) cells and another for network-to-
network interface (NNI) cells. Figure 10 shows these headers in
the byte-by-byte format preferred by the ITU-T.
AAL1 ATM
Figure 11 shows the process of encapsulating a short frame
from the same source (the same user of a mobile phone) or from
several sources (several users of mobile telephones) into one cell.
164
Fig. 12 AAL2
ATM WANs
ATM, a cell-switched network, can be a highway for an IP
datagram. Figure 13 shows how an ATM network can be used in the
Internet.
165
Addresses
● Routing the cells from one distinct entering-point router to one
distinct exiting-point router requires three types of addressing: IP
addresses, physical addresses, and virtual circuit identifiers.
166
● IP Addresses Each router is connected to the ATM network
containing an IP address.
● Physical Addresses Each router (or any other device) is
connected to the ATM network has a physical address. The
physical address is correlate with the ATM network and does not
have anything to do with the Internet.
● Virtual Circuit Identifiers The switches inside the ATM
network route the cells based on the virtual circuit identifiers
(VPIs and VCIs), This virtual circuit identifiers are used during
data transfer.
Address Binding
1. The entering-point router receives an IP datagram. It uses the
destination address and its routing table to find the IP address of
the next router, the exciting-point router. This is absolutely the
same step followed when a datagram passes through a LAN.
2. The entering-point router uses the services of a protocol called
ATMARP to find the physical address of the existing-point
router. ATMARP is similar to ARP.
3. The virtual circuit identifiers are bound to the physical addresses.
9.7 SUMMARY
172
Unit-10
DATA LINK LAYER
Unit Structure
10.1 Objectives
10.2 Introduction
10.3 Data Link Layer
10.4 Error Detection and Correction Techniques
10.5 Multiple Access Protocols
10.6 LAN Addresses and ARP & RARP
10.7 PPP: The Point-to-Point Protocol
10.8 Ethernet standards – IEEE 802.3, 802.5
10.9 FDDI,
10.10 802.6.
10.11 Summary
10.12 Reference for further reading
10.13 Unit End Exercises
10.1 OBJECTIVES
10.2 INTRODUCTION:
Fig. 10.1 Six link-layer hops between wireless host and server
2. Link access.
Medium access control protocol describes the rules by which
a frame is transmitted onto the link. For point-to-point links that
have a single sender at one end of the link and a single receiver at
the other end of the link, the MAC protocol is simple the sender can
send a frame whenever the link is idle.
3. Reliable delivery.
When a link-layer protocol gives reliable delivery service, it
guarantees to move each network-layer datagram all over the link
without error. Transport-layer protocols also provide a reliable
delivery service. Similar to a transport-layer reliable delivery
service, a link-layer reliable delivery service can be achieved with
acknowledgments and retransmissions.
● Example
Consider the d-bit piece of data, D, that the sending node wants to
send to the receiving node. The sender and receiver must first agree
on an r + 1 bit pattern, known as a generator, which we will denote
as G. It requires that the most significant (leftmost) bit of G be a 1.
The key ideas behind CRC codes are shown in Figure 5. For a given
178
piece of data, D, the sender will choose r additional bits, R, and
append them to D such that the resulting d + r bit pattern (interpreted
as a binary number) is exactly divisible by G using modulo-2
arithmetic. The process of error checking with CRCs is thus simple:
The receiver divides the d + r received bits by G. If the remainder is
nonzero, the receiver knows that an error has occurred; otherwise the
data is accepted as being correct.
Aloha
● The slotted ALOHA protocol required that all nodes to be
synchronize their transmissions to start.
● At the beginning ALOHA protocol was aunslotted, and fully
decentralized protocol.
● In pure ALOHA, when a frame first arrives, that is, a network-
layer datagram is passed down from the network layer at the
sending node, the node immediately transmits the frame in its
entirety into the broadcast channel.
● If a transmitted frame got a collision with one or more other
transmissions, the node will then instantly retransmit the frame
with probability of p. If not the node waits for a frame
transmission time.
● After this waiting time, it then transmits the frame with
probability of p, or waits for another frame time with probability
1 – p.
Example:
Switched local network connecting three departments, two
servers and a router with four switches. Because these switches
operate at the link layer, they switch link-layer frames Instead of
using IP addresses.
185
Hosts and routers uses ARP While RARP is used by small users
for knowing the MAC having less facilities.
address of other hosts and
routers in the networks.
1. IEEE 802.3
The IEEE 802.3 standard determines the CSMA/CD access
control protocol. The best known scheme for controlling a local area
network on a bus structure is carrier sense multiple action with
collision detection (CSMA/CD).
2. IEEE 802.5
IEEE 802.5 describes the token ring standards. In a token ring
a special bit pattern, called the token, circulates around the ring
whenever all stations are idle. The sequence of token is determined
by the physical locations of the stations on the ring.
10.9 FDDI
10.10 802.6.
Working:
● The head of bus A i.e. station 1 generates an empty slot for use of
bus A.
● Similarly, the head of bus B i.e. station 5 generates an empty slot
for use of bus B.
● The empty slot travels down its bus until the transmission station
drops data into it and the intended destination reads the data.
10.11 SUMMARY
195
Unit -11
PHYSICAL LAYER
Unit Structure
11.0 Objective
11.1 Introduction
11.2 OSI Physical layer
11.2.1 Physical layer functions
11.3 Signals
11.3.1 Digital Signal
11.3.2 Analog Signal
11.3.3 Signal Representation
11.3.4 Analog and Digital Data
11.4 Transmission media
11.4.1 Features
11.4.2 Causes of Transmission Media
11.4.3 Guided Media
11.4.4 Unguided Media
11.5 Summary
11.6 List of References
11.7 Exercises
11.0 OBJECTIVE
11.1 INTRODUCTION:-
Physical layer in the OSI model has the role of cooperating with
actual hardware and signaling tool. This is the individual layer of
OSI network model which in factwork with the physical connectivity
of two different devices.
196
Physical layer translates it into electrical pulses, which
characterize binary data. The binary statistics is at that point sent
over the guided or unguided media. It deals with the mechanical and
electrical specifications either we say devices.
The OSI model contains seven layers and it is known as
referenced model of computer networking. The OSI layers are
generally classified into higher layers and lower layers. The OSI
model upper layers are:
• Application
• Presentation
• Session
The Computer Science organizations who are involved in
planning and developing network operating structures and services
to applications are mainly concerned with the protocols defined at
OSI upper layers. For example, Microsoft and Novell who
established network services and associated applications are
typically organized with protocols defined at higher of the OSI
model.
The lower layers of OSl model are:
• Transport
• Network
• Data link
• Physical
The lower layers are focused more towards the flow of data
from beginning to end through the network. The devices like hubs,
bridges, switches, and the OSI model routers- are more related with
the lesser transport, network, data link, physical layer of the
company like Cisco, Intel, Nortel, 3com-who are developing lively
networking components.
Topologies: Mesh, Star, Ring and Bus this are the technologies uses
to connect the devices.
Transmission Modes:
Full Duplex, Half Duplex and Simplex are direction of
communication amongst two application defined by physical layer.
DATA:-
Information formatted in human as well as machine readable
form.
For example: vocal sound, music/audio data, image/picture, file etc.
11.3 SIGNALS
Both digital and analog data can shows in digital or analog signals.
Example:
1.0 Analog clocks gives information in a continuous form that shows
hour, minute and seconding. hands clocks, Movements of hands
are continuous.
2.0 Digital clocks that describe the hours and the minute changes
suddenly from 5:01 to 5:04
11.4 TRANSMISSIONMEDIA
Guided Media(wired)
All wires/cables which used for communication are guided
media, such as coaxial cables, UTP, and fiber Optics. In this
applications, the transmitter and the information is send (directed)
through this media when the receiver and transmitter are connected
to each other.
Unguided Media(Wireless)
Unguided media is also known as open air space or wireless,
because the sender who send the data and receiver has no
connectivity.
201
In this the data is transfer through the wave, and all who want
to collect the data they can access including recipient.
Attenuation
For the receiver to detect the data correctly, the signal
necessity is to be satisfactorily strong. When the signal transform
over the channel, it come to be weaker. As it covers distance, it
misses strength.
Dispersion
The signal will lean towards spread and intersections if as
signal goes over and done with the media. The dispersion amount
depends upon the used of frequency.
202
Delay distortion
The signals are transfer through media with determine
frequency and speed. If the signal frequency and speed don’t get
equal, then there are potentials that signal touches destination in
arbitrary manner. In digital media, this is actually serious that
approximately bits reach earlier than the previously sent ones.
Noise
Arbitrary trouble or difference in digital and analog signal is
said to be Noise in signal, which might bemisled the actual data
being passed. Noise can be considered in one of the following class:
Thermal Noise
Heat flustered the electronic conductors of a channel which
may announce noise in the media. Up to a definite level, thermal
noise is unescapable.
Intermodulation
When several frequencies share a medium, their interfering
can harm to noise in the medium. Intermodulation noise happens if
dual diverse frequencies are sharing a medium and one of them has
extreme strength or the module itself is not working properly, at that
moment the resulting rate might not be received as predictable.
Crosstalk
This kind of noise occurs when a foreign signal arrives into
the media. This is because signal in medium affects the other
medium.
Impulse
Lightening, electricity, short-circuit, or faulty components
this are the unequal turbulences which is presented in this noise.
Information which is digital is generally affect over this kind of
noise.
Twisted pair:
This pair is basically physical media and this is developed
with a couple of cables that are twisted by each other. This type of
pair cable is low-priced as related to another broadcast media.
Connection in this type of pair cable is easy, and it is a lightweight
203
cable. 0 to 3.5 KHz is the range frequency range of twisted pair
cable.
Advantages of UTP:
Cost for UTP is less.
Configuration of the UTP is simple.
For high-speed LAN, we can useunshielded twisted pair.
204
Disadvantage:
The UTP cable can just usage for shorter area because of
attenuation.
Disadvantages
The STP is extra costly asequaledto UTP.
STP cable has higher attenuation rate.
Coaxial Cable
This cable are very frequently used communication medium,
for example, TV connection is typically a coaxial cable.
Advantages:
The information can spread at higher speed.
The shielding of coaxial cable is better as equaled to twisted pair
cable.
It offers advanced bandwidth.
Disadvantages:
When we compared coaxial cable and other cables then
coaxial cable seems costly.
If any error take place in the cable causes the failure in the
whole system or network.
Fibre Optic
For communication, this cable are uses electrical signals.
This is cable which encompasses the optical fibers, this cable
are plastic shielded that are mainly work to initiate the records by
beats of light.
Optical fibres It safeguard from higher temperature, lover
temperature, electromagnetic intrusion by using plastic covering
safeguards.
Fibre optics contains quicker data communication than copper
wires.
Better reliability: The fibre optic cable has large immune in any
environment as compared to fibre optic so it is reliable also by using
copper cable in some environment it sometimes hard to do while
gives connection.
Radio waves
This are the waves which transmit in any directions of the area in
any free space
Microwaves:
There are two types of microwaves mainly
i) Terrestrial microwave
ii) Satellite microwave communication.
The towers has attached with antennas gives them direct sight
transmission as it provides sight transmission feature.
Microwave Characteristics:
Frequency range: It has 4 GHz towards23 GHz is frequency of this
microwave.
Bandwidth: It has 1Mbps towards 10 Mbps is frequency of this
bandwidth.
Short distance: It is at low costly for short distance.
Long distance: It requires a large tower to cover large distance
hence it is costly.
209
Attenuation: It said to be losing of signal. It has some amount of
chance to affected by ecological conditions.
Advantages of Microwave:
Microwave transmission is cheaper than using cables.
It doesn’t need any ground surface for its setup configuration.
So it is free from ground surface procurement.
In mountain and rough seashore it provides easy
communication, the configuration of cables is difficult task at certain
situation in this type of area.
The microwave transmission is mostly use to communicate
over the oceans.
Infrared
Mainly wireless technology is directed for communication
over diminutive ranges.
Infrared Characteristics:
The data rate in infrared is very high because it hold high
bandwidth.
211
Infrared waves cannot enter through the walls and as a result,
the communication of infrared in one chamber cannot be disturbed
by the nearby chamber or rooms.
11.5 SUMMARY:
https://www.tutorialspoint.com/data_communication_computer_
network/data_link_layer_introduction.htm
Computer Networks : Andrew Tanenbaum
https://www.computer-
networking.info/1st/html/network/network.html
https://www.researchgate.net/
https://www.javatpoint.com/
https://www.geeksforgeeks.org
212
https://www.researchgate.net/publication/287994107_WIRED_
WIRELESS_COMMUNICAT ION
https://study.com/academy/lesson/osi-model-using-open-
systems-interconnection-to-s end-and-receive-data.html
http://www.tmv.edu.in/
11.7 EXERCISES