CN 1
CN 1
Computer Network
A computer network is a system in which multiple computers are connected to each other to
share information and resources.
The physical connection between networked computing devices is established using either cable
media or wireless media.
The best-known computer network is the Internet.
Inexpensive system
Shared resources mean reduction in hardware costs. Shared files mean reduction in memory
requirement, which indirectly means a reduction in file storage expenses. A particular software
can be installed only once on the server and made available across all connected computers at
once. This saves the expense of buying and installing the same software as many times for as
many users.
Flexible access
A user can log on to a computer anywhere on the network and access his files. This offers
flexibility to the user as to where he should be during the course of his routine.
Instant and multiple access
Computer networks are multiple processes. Many users can access the same information at the
same time. Immediate commands such as printing commands can be made with the help of
computer networks.
Disadvantages of Computer Networks
Lack of data security and privacy
Because there would be a huge number of people who would be using a computer network to
get and share some of their files and resources, a certain user’s security would be always at risk.
There might even be illegal activities that would occur, which you need to be careful about and
aware of.
Presence of computer viruses and malware
If even one computer on a network gets affected by a virus, there is a possible threat for the
other systems getting affected too. Viruses can spread on a network easily, because of the inter-
connectivity of workstations. Moreover, multiple systems with common resources are the
perfect breeding ground for viruses that multiply.
Lack of Independence
Since most networks have a centralized server and dependent clients, the client users lack any
freedom whatsoever. Centralized decision making can sometimes hinder how a client user
wants to use his own computer.
Lack of Robustness
As previously stated, if a computer network’s main server breaks down, the entire system would
become useless. Also, if it has a bridging device or a central linking server that fails, the entire
network would also come to a standstill.
Need an efficient handler
For a computer network to work efficiently and optimally, it requires high technical skills and
know-how of its operations and administration. A person just having basic skills cannot do this
job. Take note that the responsibility to handle such a system is high, as allotting permissions
and passwords can be daunting. Similarly, network configuration and connection is very tedious
and cannot be done by an average technician who does not have advanced knowledge.
Use (Applications) of Computer Networks
Financial services
Nowadays, almost all the financial services depend on the computer network. You can access
the financial services across the world. For example, a user can transfer money from one place
to another by using the electronic fund transfer feature. You can use networking in various
financial areas such as ATM, foreign exchange and credit history search.
Business
Nowadays, most of the works of businesses are done over the computers. To exchange the data
and ideas, you need effective data and resources sharing features. To do this, you need to
connect the computer with each other through a network. For example, a person of one
department of an organization can share or access the electronic data of other departments
through a network.
Email services
A computer network provides you the facility to send or receive emails across the globe in few
seconds.
Mobile applications
By using mobile applications, such as cellular or wireless phones, you can communicate
(exchange your views and ideas) with one other.
Directory services
It provides you the facility to store files on a centralized location to increase the speed of search
operation worldwide.
Teleconferencing
It contains voice conferencing and video conferencing which are based on networking. In
teleconferencing, the participants need not be presented at the same location.
Types of Computer Networks interconnect computers within a limited area
ex : residence, school, university, office building etc.
LAN (Local Area Network)
It is privately-owned networks within a single building or campus of up to a few kilometers in
size.
They are widely used to connect personal computers and workstations in company offices and
factories to share resources (e.g., printers) and exchange information. provide common physical medium to
LANs are easy to design and troubleshoot transfer data.
provide easy access to data
In LAN, all the machines are connected to a single cable.
Different types of topologies such as Bus, Ring, Star, and Tree are used.
The data transfer rates for LAN is up to 10 Gbits/s.
They transfer data at high speeds. The high transmission rate is possible in LAN because of the
short distance between various computer networks.
They exist in a limited geographical area.
Advantages
LAN transfers data at high speed.
LAN technology is generally less expensive. low delay
low error rate
broadcast capability
transmitting data at very fast rate
area is limited
limited number of device is connected
Internet
The internet is a type of world-wide computer network.
The internet is the collection of infinite numbers of connected computers that are spread across
the world.
We can also say that the Internet is a computer network that interconnects hundreds of millions
of computing devices throughout the world.
It is established as the largest network and sometimes called a network of a network that
consists of numerous academic, business and government networks, which together carry
various information.
The Internet is a global computer network providing a variety of information and
communication facilities, consisting of interconnected networks using standardized
communication protocols.
When two computers are connected over the Internet, they can send and receive all kinds of
information such as text, graphics, voice, video, and computer programs.
Protocol
A protocol is a set of rules that govern (manages) data communications.
Protocols define methods of communication, how to communicate when to communicate etc.
A protocol is an agreement between the communicating parties on how communication is to
proceed.
Important elements of protocols are
1. Syntax 2. Semantics 3. Timing
Syntax:- Syntax means format of data or the structure how it is presented e.g. first eight bits are
for sender address, next eight bits are for receiver address and rest of the bits for message data.
Semantics:- Semantics is the meaning of each section of bits e.g. the address bit means the
route of transmission or final destination of a message.
Timing:- Timing means, at what time data can be sent and how fast data can be sent.
Some protocols also support message acknowledgment and data compression designed for
reliable and/or high-performance network communication.
Example: HTTP, IP, FTP etc…
standers:
provide guidelines to the
manufacturers, Venders, and
service provider.
The concept of clients and servers is essential in the network design. The various networks
design models are as follows:
1. Peer to Peer network 2. Client-Server network
Peer to Peer network
In this network group of computers is connected together so that users can share resources and
information.
There is no central location (server) for authenticating users, storing files, or accessing resources
and each of them works as both client and server.
This means that users must remember which computers in the workgroup have the shared
resource or information that they want to access.
Advantage:
It is easy to set up.
There is no need for any committed server as each peer acts as both server and client.
The network implementation is quite cheap.
The resources of a peer can be shared with other peers very easily in the network.
Disadvantage:
The speed of the network decreases due to heavy usage.
It is not easy to keep track of information on each computer.
There is no central backup of files and folders.
Network and data security are weak.
Advantage:
The server system holds the shared files.
The server system can be scheduled to take the file backups automatically.
Prof. Maulik Trivedi, CE Department | 2140709 – Computer Networks (CN) 7
1 – Introduction to Computer Networks & Internet
Network access is provided only to authorized users through user security at the
server.
The server system is a kind of central repository for sharing a printer with clients.
Internet access, e-mail routing, and such other networking tasks are quite easily
managed by the server.
The software applications shared by the server are accessible to the clients.
Disadvantage:
The implementation of the network is quite expensive.
An NOS (Network Operating System) is essential.
If a server fails, the entire network crashes.
There may be congestion if more than one client requests for a service at the same
time.
Techniques used in data communications to transfer data
1. Connection-oriented method 2. Connectionless method
Connection-oriented method
Connection-oriented communication includes the steps of setting up a call from one computer
to another, transmitting/receiving data, and then releasing the call, just like a voice phone call.
However, the network connecting the computers is a packet switched network, unlike the
phone system's circuit switched network.
Connection-oriented communication is done in one of two ways over a packet switched
network:
1. Without virtual circuits
It involves setting up a connection, transmitting data, and
2. With virtual circuits. then releasing the connection.
Without virtual circuits:
This is what TCP does on the Internet.
The only two machines on the Internet are aware of the connection which is established
between the two computers at the endpoints.
The Internet itself, its routers and links have no information about the presence of a connection
between the two computers.
This means that all of the packets flowing between the two computers can follow different
routes.
One benefit of establishing the connection is that the flow of packets from the source to the
destination can be slowed down if the Internet is congested and speeded up when congestion
disappears.
Another benefit is that the endpoints can anticipate traffic between them, and agree to
cooperate to ensure the integrity and continuity of the data transfers. This allows the network
to be treated as a "stream" of data.
With virtual circuit:
This is not used on the Internet, but is used in other types of networks (eg. the "X.25" protocol,
still popular in Europe).
The routers within the network route all packets in one connection over the same route. The
advantage is that video and voice traffic is easier to carry because routers can reserve memory
space to buffer the transmission.
Connectionless method
Connectionless communication is just packet switching where no call establishment and release
occur.
A message is broken into packets, and each packet is transferred separately. Moreover, the
packets can travel a different route to the destination since there is no connection.
Connectionless service is typically provided by the UDP (User Datagram Protocol). The packets
transferred using UDP are also called datagrams.
Transmission Media
A transmission media can be defined as anything
medium that can carry information from a source to a
destination.
On the basis of transmission of data, the transmission media can be classified into two
categories:
1. Guided (Physical) transmission media
2. Unguided (Wireless) transmission media
Transmission Media
Coaxial cables used is widely used within the telephone system for long-distance lines but have
now largely been replaced by fiber optics on long-haul routes.
Fiber optic cables are similar to coax, except without the braid.
The figure shows a single fiber viewed from the side. At the center is the glass core through
which the light propagates.
The core is surrounded by a glass cladding with a lower index of refraction than the core, to keep
all the light in the core.
Next comes a thin plastic jacket to protect the cladding. Fibers are typically grouped in bundles,
protected by an outer sheath. The figure shows a sheath with three fibers.
Unguided (Wireless) transmission media
Unguided media transport electromagnetic waves without using a physical conductor. This type
of communication is often referred to as wireless communication.
1. Radio Transmission 3. Infrared
2. Microwave Transmission 4. Lightwave Transmission
1cover
– Introduction
large area to Computer Networks & Internet
mainly used for wide area networks
1. Radio Transmission
Radio waves are easy to generate, can travel long distances, and can penetrate buildings easily,
so they are widely used for communication, both indoors and outdoors.
Radio waves also are omnidirectional, meaning that they travel in all directions from the source,
so the transmitter and receiver do not have to be carefully aligned physically.
The properties of radio waves are frequency dependent.
At low frequencies, radio waves pass through obstacles well, but the power falls off sharply with
distance from the source, roughly as 1/r2 in the air.
At high frequencies, radio waves tend to travel in straight lines and bounce off obstacles. They
are also absorbed by rain.
At all frequencies, radio waves are subject to interference from motors and other electrical
equipment.
They are relatively directional, cheap, and easy to build but have a major drawback: they do not
pass through solid objects (try standing between your remote control and your television and
see if it still works).
In general, as we go from long-wave radio toward visible light, the waves behave more and more
like light and less and less like a radio.
On the other hand, the fact that infrared waves do not pass through solid walls well is also a
plus.
It means that an infrared system in one room of a building will not interfere with a similar
system in adjacent rooms or buildings.
Furthermore, security of infrared systems against eavesdropping is better than that of radio
systems precisely for this reason.
Therefore, no government license is needed to operate an infrared system, in contrast to radio
systems, which must be licensed outside the ISM bands.
Topologies (Network Topologies) the manner in which nodes are arranged. physical layout of network
Topology defines Network Topology is the schematic description of a network arrangement, connecting various
the structure of the nodes (sender and receiver) through lines of connection.
network A Network Topology is the arrangement with which computer systems or network devices are
-> how all the connected to each other. it must be flexible , cost must be minimum , should not have any single point
components are Types of network topologies : of complete failures.
interconnected to
each other. 1. Bus 3. Star 5. Tree
2. Ring 4. Mesh 6. Hybrid
Bus Topology
Bus topology is a network type in which every computer and network device is connected to a
single cable.
all network device are
connected through a single
cable known as a backbone
cable.
transmits data in only one
direction
Features:
A number of repeaters are used and the transmission is unidirectional.
A date is transferred in a sequential manner that is bitten by bit.
Advantages:
Transmitting network is not affected by high traffic or by adding more nodes, as only the nodes
having tokens can transmit data.
Cheap to install and expand.
Disadvantages:
Troubleshooting is difficult in a ring topology.
Adding or deleting the computers disturbs the network activity.
Failure of one computer disturbs the whole network.
Star Topology
In this type of topology, all the computers are connected to a single hub through a cable. This
hub is the central node and all others nodes are connected to the central node.
easy to troubleshoot
Features:
Every node has its own dedicated connection to the hub.
Acts as a repeater for data flow.
Can be used with twisted pair, Optical Fibre or coaxial cable.
Advantages:
Fast performance with few nodes and low network traffic.
Hub can be upgraded easily.
Easy to troubleshoot.
Easy to set up and modify.
Only that node is affected which has failed rest of the nodes can work smoothly.
Disadvantages:
Cost of installation is high.
Expensive to use.
If the hub is affected then the whole network is stopped because all the nodes depend on the
hub.
Performance is based on the.
Mesh Topology
It is a point-to-point connection to other nodes or devices.
Traffic is carried only between two devices or nodes to which it is connected.
each node is connected with every other
node in network
easy to troubleshoot
Features:
Fully connected.
Robust.
Not flexible.
Advantages:
Each connection can carry its own data load.
It is robust.
A fault is diagnosed easily.
Provides security and privacy.
Disadvantages:
Installation and configuration are difficult.
Cabling cost is more.
Bulk wiring is required.
Tree Topology
It has a root node and all other nodes are connected to it forming a hierarchy.
It is also called hierarchical topology.
It should at least have three levels to the hierarchy.
Features:
Ideal if workstations are located in groups.
Used in Wide Area Network.
Advantages:
Extension of bus and star topologies.
Expansion of nodes is possible and easy.
Easily managed and maintained.
Error detection is easily done.
Disadvantages:
Heavily cabled.
Costly.
If more nodes are added maintenance is difficult.
Central hub fails then network fails.
Hybrid Topology
A network structure whose design contains more than one topology is said to be hybrid
topology.
combination of two or more topology
For example, if in an office in one department ring topology is used and in another star,
topology is used, connecting these topologies will result in Hybrid Topology (ring topology and
star topology).
Features:
It is a combination of two or more topologies
Inherits the advantages and disadvantages of the topologies included
Advantages:
Reliable as error detecting and troubleshooting is easy.
Scalable as size can be increased easily.
Flexible.
Disadvantages:
Complex in design.
Costly.
The Network Core
Network core defines the connection of different network segments together and the process to
transmit the data packets across the network.
The network core is implemented through the use of switching techniques.
The classification of a switching network is shown below:
Switched
Networks
Datagram Virtual-Circuit
Networks Networks
Circuit Switching
Circuit switching is used in public telephone networks and is the basis for private networks built
on leased-lines.
Circuit switching was developed to handle voice traffic but also digital data (although inefficient)
With circuit switching a dedicated path is established between two stations for communication.
Switching and transmission resources within the network are reserved for the exclusive use of
the circuit for the duration of the connection.
The connection is transparent: once it is established, it appears to attach devices as if there
were a direct connection.
Communication via circuit switching involves three phases:
1. Circuit Establishment
2. Data Transfer
3. Circuit Disconnect
Connection path must be established before data transmission begins. Nodes must have
switching capacity and channel capacity to establish a connection.
Circuit switching is inefficient
1. Channel capacity dedicated for a duration of a connection
2. If no data, capacity wasted
Set up (connection) takes time
Once connected, a transfer is transparent to the users
1. Data is transmitted at a fixed data rate with no delay (except for the propagation delay)
Developed for voice traffic (phone)
1. May also be used for data traffic via modem
Interconnection of telephones within a building or office.
In circuit switching, a direct physical connection between two devices is created by space-
division switches, time-division switches, or both OR Circuit switching use any of below two
technologies:
Space Division Switching
In a space-division switch, the path from one device to another is spatially separate from other
paths.
Developed for the analogue environment.
A crossbar is the most common space-division switch. It connects n inputs to m outputs via n ×
m cross points.
Crossbar switch.
Packet Switching
Packet switching was designed to provide a more efficient facility than circuit-switching for burst
data traffic.
With packet switching, a station transmits data in small blocks, called packets.
At each node, packets are received, stored briefly (buffered) and passed on to the next node.
1. Store and forward mechanism
Each packet contains some portion of the user data plus control info needed for proper
functioning of the network.
A key element of packet-switching networks is whether the internal operation is datagram or
virtual circuit (VC).
1. With internal VCs, a route is defined between two endpoints and all packets for that VC
follow the same route.
2. With internal diagrams,
datagram each packet is treated independently, and packets intended for
the same destination may follow different routes.
Examples of packet switching networks are X.25, Frame Relay, ATM and IP.
Station breaks a long message into packets. Packets sent one at a time to the network.
Packets handled in two ways:
1. Datagram
Each packet treated independently
Packets can take any practical route
Packets may arrive out of order
Packets may go missing
Up to receiver to re-order packets and recover from missing packets
2. Virtual Circuit
Pre-planned route established before any packets sent.
Once the route is established, all the packets between the two communicating
parties follow the same route through the network
Call request and call accept packets to establish a connection (handshake)
Each packet contains a Virtual Circuit Identifier (VCI) instead of a destination
address
No routing decisions required for each packet
Clear request to drop circuit Less commonly used compared to circuit and packet switching.
Not a dedicated path also called store and forward network.
Message Switching no limit on block size it reduce network traffic
This technique was somewhere in the middle of circuit switching and packet switching.
In message switching, the whole message is treated as a data unit and is transferred in its
entirety.
entirely
A switch working on message switching first receives the whole message and buffers it until
there are resources available to transfer it to the next hop.
If the next hop is not having enough resource to accommodate large size message, the message
is stored and switch waits.
Protocols layers and their service model
OSI Layer Architecture
OSI model is based on a proposal developed by the International Standards Organization (ISO) as
the first step toward international standardization of the protocols used in the various layers.
It was revised in 1995.
The model is called the OSI (Open Systems Interconnection) Reference Model because it deals
with connecting open systems—that is, systems that are open for communication with other
systems.
The OSI model has seven layers.
1. Physical Layer
2. Data Link Layer
3. Network Layer
4. Transport Layer
5. Session Layer
6. Presentation Layer
7. Application Layer
Physical Layer
The physical layer, the lowest layer of the OSI model, is concerned with the transmission and
reception of the unstructured raw bit stream over a physical medium.
It describes the electrical/optical, mechanical, and functional interfaces to the physical medium,
and carries the signals for all of the higher layers. It provides:
Data encoding: modifies the simple digital signal pattern (1s and 0s) used by the PC to better
accommodate the characteristics of the physical medium, and to aid in a bit and frame
synchronization.
Transmission technique: determines whether the encoded bits will be transmitted by baseband
(digital) or broadband (analog) signalling.
Physical medium transmission: transmits bits as electrical or optical signals appropriate for the
physical medium.
Message traffic control: tells the transmitting station to "back-off" when no message buffers are
available.
Typically, the transport layer can accept relatively large messages, but there are strict message
size limits imposed by the network (or lower) layer. Consequently, the transport layer must
break up the messages into smaller units, or frames, prepending a header to each frame.
The transport layer header information must then include control information, such as message
start and message end flags, to enable the transport layer on the other end to recognize
message boundaries.
In addition, if the lower layers do not maintain sequence, the transport header must contain
sequence information to enable the transport layer on the receiving end to get the pieces back
together in the right order before handing the received message up to the layer above.
Session Layer
The session layer allows session establishment between processes running on different stations.
It provides:
Session establishment, maintenance, and termination: allows two application processes on
different machines to establish, use and terminate a connection, called a session.
Session support: performs the functions that allow these processes to communicate over the
network, performing security, name recognition, logging, and so on.
Presentation Layer
The presentation layer formats the data to be presented to the application layer. It can be
viewed as the translator for the network. This layer may translate data from a format used by
the application layer into a common format at the sending station, then translate the common
format to a format known to the application layer at the receiving station.
The presentation layer provides:
Character code translation: for example, ASCII to EBCDIC.
Data conversion: bit order, CR-CR/LF, integer-floating point, and so on.
Data compression reduces the number of bits that need to be transmitted on the network.
Data encryption: encrypt data for security purposes. For example, password encryption.
Application Layer
The application layer serves as the window for users and application processes to access
network services.
This layer contains a variety of commonly needed functions:
1. Resource sharing and device redirection
2. Remote file access
3. Remote printer access
4. Inter-process communication
5. Network management
6. Directory services
7. Electronic messaging (such as mail)
8. Network virtual terminals
TCP/IP Reference Model (Internet Protocol Stack layers)
Transmission Control Protocol/Internet Protocol (TCP/IP) protocol suite is the engine for the
Internet and networks worldwide.
TCP/IP either combines several OSI layers into a single layer or does not use certain layers at all.
TCP/IP is a set of protocols developed to allow cooperating computers to share resources across
the network.
The TCP/IP model has five layers.
1. Application Layer
2. Transport Layer
3. Internet Layer
4. Data Link Layer
5. Physical Network
As we can see from the above figure, the presentation and session layers are not there in the
TCP/IP model. Also, note that the Network Access Layer in the TCP/IP model combines the
functions of Data link Layer and Physical Layer.
Application Layer
The application layer is the topmost layer of the four-layer TCP/IP model.
The application layer is present on the top of the Transport layer.
Application layer defines TCP/IP application protocols and how host programs interface with
Transport layer services to use the network.
Application layer includes all the higher-level protocols like DNS (Domain Naming System), HTTP
(Hypertext Transfer Protocol), Telnet, SSH, FTP (File Transfer Protocol), TFTP (Trivial File Transfer
Protocol), SNMP (Simple Network Management Protocol), SMTP (Simple Mail Transfer Protocol),
DHCP (Dynamic Host Configuration Protocol), X Windows, RDP (Remote Desktop Protocol) etc.
Transport Layer
The purpose of the Transport layer is to permit devices on the source and destination hosts to
carry on a conversation.
Transport layer defines the level of service and status of the connection used when transporting
data.
The transport layer provides the end-to-end data transfer by delivering data from an application
to its remote peer.
The most-used transport layer protocol is the Transmission Control Protocol (TCP), which
provides:
Reliable delivery data Congestion control
Duplicate data suppression Flow control
Another transport layer protocol is the User Datagram Protocol (UDP), which provides:
Connectionless Best-effort service
Unreliable
UDP is used by applications that need a fast transport mechanism and can tolerate the loss of
some data.
Network Layer (Internet Layer)
The internet layer also called the network layer.
Internet layer pack data into data packets known as IP datagrams, which contain source and
destination address (logical address or IP address) information that is used to forward the
datagrams between hosts and across networks.
The Internet layer is also responsible for the routing of IP datagrams.
Internet Protocol (IP) is the most important protocol in this layer.
It is a connectionless protocol that does not assume reliability from lower layers. IP does not
provide reliability, flow control or error recovery.
IP provides a routing function that attempts to deliver transmitted messages to their
destination.
These message units in an IP network are called an IP datagram.
Example: IP, ICMP, IGMP, ARP, and RARP.
Network Interface Layer (Network Access Layer) datalink layer and physical layer
Network Access Layer defines details of how data is physically sent through the network,
including how bits are electrically or optically signalled by hardware devices that interface
directly with a network medium, such as coaxial cable, optical fiber, or twisted pair copper wire.
The protocols included in Network Access Layer are Ethernet, Token Ring, FDDI, X.25, Frame
Relay etc.
Processing Delay
The time required to examine the packet’s header and determine where to direct the packet is
part of the processing delay.
The processing delay can also include other factors, such as the time needed to check for bit-
level errors in the packet that occurred in transmitting the packet's bits from the upstream node
to the router.
It is typically on the order of microseconds or less.
Queuing Delay
At the queue, the packet experiences a queuing delay as it waits to be transmitted onto the link.
The length of the queuing delay of a specific packet will depend on the number of earlier-
arriving packets that are queued and waiting for transmission onto the link.
If the queue is empty and no other packet is currently being transmitted, then our packet’s
queuing delay will be zero.
On the other hand, if the traffic is heavy and many other packets are also waiting to be
transmitted, the queuing delay will be long.
Queuing delays can be on the order of microseconds to milliseconds in practice.
Transmission Delay Once a packet gets a chance to be transmitted, it takes time to send its data over the link.
Assuming that packets are transmitted in a first-come-first-served manner like packet-switched
networks.
Now packet can be transmitted only after all the packets that have arrived before it have been
transmitted.
Denote the length of the packet by L bits, and denote the transmission rate of the link from a
router to a router by R bits/sec.
The transmission delay is L/R.
Transmission delays are typically on the order of microseconds to milliseconds in practice.
Propagation Delay
When
Once aabit
bitis issent
pushed into
into the the
link, link, ittime
it needs needs to propagate
to physically travelto
to router B. The (e.g.,
its destination time from
required to
one router to
another).
propagate from the beginning of the link to router B is the propagation delay.
The bit propagates at the propagation speed of the link.
The propagation speed depends on the physical medium of the link.
Propagation delays are on the order of milliseconds.
Propagations delay=d (Length of Physical Link) /s (Propagation speed in medium).
Packet Loss
Packet loss is the failure of one or more transmitted packets to arrive at their destination.
This event can cause noticeable effects on all types of digital communications.
The loss of data packets depends on the switch queue. The loss of data packets increases with
the increases in the traffic intensity.
It affects the performance of the network.
Throughput
Throughput or Network Throughput is the rate of successful message delivery over a
communication channel.
The data these messages belong to may be delivered over a physical or logical link or it can pass
through a certain network node.
Throughput is usually measured in bits per second (bit/s or bps), and sometimes in data packets
per second (p/s or pps) or data packets per time slot.
Problem:
In this problem, we consider sending real-time voice from Host A to Host B over a packet-
switched network (VoIP). Host A converts analog voice to a digital 64 kbps bit stream on the
fly. Host A then groups the bits into 56-byte packets. There is one link between Hosts A and
B; its transmission rate is 2 Mbps and its propagation delay is 10 msec. As soon as Host A
gathers a packet, it sends it to Host B. As soon as Host B receives an entire packet, it converts
the packet’s bits to an analog signal. How much time elapses from the time a bit is created
(from the original analog signal at Host A) until the bit is decoded (as part of the analog
signal at Host B)?
Host A Host B
Given:
Analog to Digital conversion rate = 64 kbps
Packet size = 56 bytes (Convert into bits so 56 bytes = 56 * 8 = 448 bits).
Transmission rate = 2 Mbps
Propagation delay = 10 msec
Since this is a packet switched network, the data will be transmitted packet by packet.
A packet is 56 byte and the analog to digital conversation rate is 64 kbps, thus the preparing
time
PT for a packet is 448/(64*1000)= 0.007 sec = 7 msec
The transition delay TD for a packet is (Size or Length of packet) / (Speed or Transmission rate)
So, TD = (56*8) / (2*1000*1000) =0.000224 s = 0.224msec.
Propagation delay PD = 10msec (Given in sum)
Finally, the total time elapses from the time a bit is create until the bit is decoded is PT+TD+PD=
7+0.224+10 = 17.224 msec.
Unicasting:
Unicasting is a one-to-one communication technique in which data is sent from one
sender to one specific receiver.
Multicasting:
Multicasting is a one-to-many communication technique in which data is sent from one
sender to multiple selected recipients
Broadcasting:
Broadcasting is a one-to-all communication technique in which data is sent from one
sender to all devices within a network segment.