Professional Documents
Culture Documents
UNIT-1
Data communications are the exchange of data between two devices via some form of
transmission medium such as a wire cable. For data communications to occur, the
communicating devices must be part of a communication system made up of a combination
of hardware (physical equipment) and software (programs).
Concept of Layering
1. Physical Layer
1. Representation of bits
2. Data Rate
3.Synchronization of bits
4.Line configuration
5.Physical Toplogy
6.Transmission mode
- Framing
- Physical addressing
- Flow control
Noisy Channel
Stop and Wait
Go Back N ARQ
Selective Repeat ARQ
Noiseless Channel
Simplest protocol
Stop and Wait
- Error control
o Parity
o VRC [vertical Redundancy Check]
o LRC [Longitudinal Redundancy Check]
o CRC [Cyclic Redundancy Check\
o Checksum
o Hamming code
- Access control
Network Layer
o Logical addressing
o Routing
Transport Layer
o Service-point addressing
o Segmentation and reassembly
o Connection control
o Flow control
o Error control
Session Layer
o Dialog control
o Synchronization
Presentation Layer
o Translation
o Encryption
o Compression
Application Layer
OSI reference model further divided into 4 Layer. These layer are nothing but merging
Some layers which have quite similar functions.
Layer1: Application, Presentation & Session Layer
Layer2: Transport Layer
Layer3: Network Layer
Layer4: Data Link Layer & Physical Layer
UNIT-2
Physical Layer
Calculation of Cycles:
2. Wavelength:
One wave must have one crust and one trough.
Wavelength is the length of between two crust or two trough.
3. Amplitude:
Height of the signal is called amplitude.
4. Bandwidth:
Lower and upper limit of frequency band is called Bandwidth.
5. Attenuation:
Gradually lose of intensity/energy of any waves is called attenuation.
6. Phase:
Difference between two waves is called phase.
Network Devices:
HUB
• An unintelligent network device that sends one signal to all of the stations
connected to it.
• All computers/devices are competing for attention because it takes the data that
comes into a port and sends it out all the other ports in the hub.
Switch
• Split large networks into small segments, decreasing the number of users sharing
the same network resources and bandwidth.
• Understands when two devices want to talk to each other, and gives them a
switched connection
• Helps prevent data collisions and reduces network congestion, increasing network
performance
Bridge
• Connects two LANs and forwards or filters data packets between them.
• Forward data depending on the Hardware (MAC) address, not the Network address
(IP).
Repeater
• Used to boost the signal between two cable segments or wireless access
points.
• Does not simply amplify the signal, it regenerates the packets and resends
them.
Router
• Forwards data depending on the Network address (IP), not the Hardware (MAC)
address.
• Routers are the only one of these four devices that will allow you to share a single IP
address among multiple network clients.
Gateway
• Connects networks with different protocols like TCP/IP network
• Routers and Gateways often refer to the same device.
Proxy server
• Isolates internal network computers from the internet.
• The user first access the proxy server and the proxy server accesses the internet and
retrieves the requested web page or document. The user
• then gets a copy of that page from the proxy server.
Modems
• A modem (modulator-demodulator) is a device that modulates an analog carrier
signal to encode digital information and demodulates the signal to decode the
transmitted information.
• The goal is to produce a signal that can be transmitted easily and decoded to
reproduce the original digital data.
• voice These signals can be transmitted over telephone lines and demodulated by
another modem at the receiver side to recover the digital data.
Guided − In guided media, transmitted data travels through cabling system that has a
fixed path. For example, copper wires, fibre optic wires, etc.
Unguided − In unguided media, transmitted data travels through free space in form of
electromagnetic signal. For example, radio waves, lasers, etc.
Coaxial Cable:
- Coaxial Cable consists of two conductors. Inner conductor is held inside a insulator
with the other moven around it providing a shield.
- An insulating protective coating called a Jacket cover the outer conductor.
- The outer shield protect the inner conductor from outside electrical signals.
- Impedance for coaxial cables are 75 ohm for cable TV.
Design by: Prof. Vikas Katariya +918980936828 Page 10
I-MCA4 Computer Networking-2648603 PGI MBA MCA Motidau, Mehsana North Gujarat
a. Radio waves
b. Micro waves
c. Infrared waves
a) Radio Waves
Radio waves are electromagnetic waves and are omnidirectional. When an antenna
transports radio waves they are propagated in all directions in free space which means the
sending and receiving antennas do not have to be aligned that is any receiving antenna can
receive that transmitted wave.
The frequency of radio waves about 30 hertz (Hz) to 300 gigahertz (GHz) and like all
other electromagnetic waves radio waves travel at the speed of light in vacuum.
• These waves are omnidirectional so they are useful for multicasting in which one
sender but many receivers.
• Examples of radio waves are television, AM and FM radio, cordless phones, and
paging.
• Radio waves are easy to generate and penetrate buildings also can travel long
distances.
• Radio waves cover a large area and can penetrate the buildings. By this, an AM radio
can receive signals inside a building.
b) Micro Waves
Micro Waves includes a line of sight transmission that is the sending and receiving
antennas that need to be properly aligned with each other. The distance is directly
proportional to the height of the antenna which is covered by the signal. In mobile phone
communication and television distribution, these are majorly used.
Due to the unidirectional properties of Micro Waves, they are very useful when unicast
(one-to-one) communication is needed between the sender and the receiver. Cellular
phones, satellite networks, and wireless LANs are using Micro Waves.
i. Terrestrial Microwave
ii. Satellite Microwave
c) Infrared Waves
• The frequency of Infrared waves is about 300 GHz to 430 THz, which can be used
for short-range communication.
• Infrared waves of high frequencies cannot penetrate walls.
• This type of wide bandwidth can be used to transmit digital data with a very high
data rate.
• The Infrared Data Association (IrDA) has established standards for using these
signals for communication between devices such as keyboards, mouse, PCs, and
printers and it is also responsible for sponsoring the use of infrared waves.
• This type of communication provides better security with minimum interference.
Multiplexing:
• Under the simplest conditions, a medium can carry only one signal at any moment in
time.
• For multiple signals to share one medium, the medium must somehow be divided,
giving each signal a portion of the total bandwidth.
• Each signal carried on the fiber can be transmitted at a different rate from the other
signals.
The Mechanism for moving information between different computer network and network
segment is called switching.
Switching is done in computer network by switches.
Network switches is a small hardware device that joins multiple computers together
within one LAN.
Types of Switching:
• Circuit Switching
• Message Switching
• Packet Switching
• Circuit Switching:
Circuit establishment:
To establish an end-to-end connection before any transfer of data.
Some segments of the circuit may be a dedicated link, while some other segments may be
shared.
Data Transfer:
Transfer Data is from the source to the destination.
The data may be analog or digital, depending on the nature of the network.
Circuit disconnect
Terminate connection at the end of data transfer.
Advantages:
o Fixed bandwidth, guaranteed capacity ( no congestion )
Disadvantages:
• Circuit establishment and circuit disconnect introduces extra overhead and delay.
• Channel capacity is dedicated for the duration of the connection, even if no data is
being transferred.
• Originally developed for the analog environment and has been carried over the
digital domain.
• In a space division switch the signal paths are physically separate from one another
(divided in space ).
• The basic building block of the switch is a metallic crosspoint or semiconductor gate
that can be enable or disabled by a control unit.
• Sizes varying from 64X64 to 1024X1024 with data rate of 200 Mbps.
• The failure of a crosspoint prevents connection between the two devices whose
lines intersect at that crosspoint.
Message Switching:
Advantages:
➢ Line efficiency is greater ( sharing of links ).
➢ Even under heavy traffic, packets are accepted, possibly with a greater delivery delay.
Packet Switching
➢ New form of architecture for long-distance data communication ( 1970 ).
➢ Packet switching remains one of the few effective technologies for long distance data
communication.
Basic Idea:
➢ Every packet contains some control information in its header ( required for routing and
other purposes.
o Datagram
➢ Call request and call accept packets are used to establish the connection.
➢ Route is fixed for the duration of the logical connection ( like circuit switching ).
• Each packet contains a virtual circuit identifier as well as data.
Main characteristics:
• Route between stations is set up prior to data transfer.
• A packet is buffered at each node, and queue for output over a line.
• A data packet needs to carry only the virtual circuit identifier for effecting routing
decisions.
Datagram Approach
• Each packet is treated independently, with no reference to packets that have gone
before.
Advantages:
• Call setup phase is avoided (for transmission of a few packets, datagram will be faster).
Problems:
• Packets may be delivered out of order.
In Datagram service
• Each packet is treated independently
Unit-3
Error:
Types of Error:
Single-Bit Error is when only one bit in the data unit has changed.
Burst Error:
Error detection
1. Parity Method:
e.g.
Sender
10010110
Parity Bit: 0
DataFrame: 10010110 0
Receiver: 10010110 0
Parity Bit: 0
If parity bit receives 0 means there is no error in data frame In that case accept data
frame and reject parity bit.
CRC Reciever :
If all zero receives at receiver side it indicates there is no error in origional data
frame otherwise error in data frame.
In case of No error , crc bits are discarded and accept only origional frame.
In case of Error, complete frame will be destroy and retransmission will be required
for the same number of frame.
Hamming Code:
2r>=M+r+1
R1=r1 = bits 1, 3, 5, 7, 9, 11
R2= r2 = bits 2, 3, 6, 7, 10, 11
R3= r4 = bits 4, 5, 6, 7
R4= r8 = bits 8, 9, 10, 11
UNIT-4
Medium Access sub Layer
2. Protocol used to determine who goes next on a multi-access channel belongs to sub layer
of the data link layer called MAC.
3. MAC is used to provide basic functionality of data link layer of the ethernet LAN system.
4. MAC sublayer is mainly concerned with media access stratigies and is different for
different LANs.It support different type of transmission media at different data rates.
5. the MAC sublayer accepts data from the logical Link Control Layers (LLC) calculates a
CRC and then management procudure sends the serial bit stream to the physical layer.
1. Wired MAC Layer is not much different from its wireless counterparts.Many Algorithm
for allocating a multiple access channel are known as Medium Access Control Protocol
(MAC) is used to provide the data link layer of the Ethernet LAN System.
2. MAC Sublayer provides addressing andchannel access control mechanism that make it
possible for several terminals or network nodes to communicate within a multiple access
network that incorporates a shared medium ,e.g. ethernet.
MAC Protocol
1. ALOHA protocol
- Pure ALOHA
- Slotted ALOHA
2. Carrier Sense Multiple Access Protocol ( CSMA)
- 1 Persistant CSMA
- Non Persistant CSMA
- n-Persistant CSMA
3. Channalization Protocol
- FDMA ( Frequency Divison Multiple Access )
- TDMA ( Time Divison Multiple Access )
- CDMA ( Code Divison Multiple Access )
ALOHA
- if the frame successfully reaches the destination the next frame is sent. if the frame fails to
be received at the destination it is sent again.
- ALOHA protocol is mainly contention Protocol ( Access to the medium from many entry
points is called contention).
- IN a wireless broadcast system or a half duplex two way link , aloha works perfectly.but in
complex network it feels trouble.
With Pure ALOHA Protocol stations are allowed access to channel whenever they have data
to transmit.
Advantages
Advantages:
1. Doubles the efficiency of ALOHA
2. Adaptable to a changing station population
Disadvantages:
CSMA
Carrier Sense Multiple Access
Carrier Sense describes the fact that a transmitter listens for a carrier wave before trying to
send. That is it tries to detect the presence of an encoded signal from another station before
attempting to transmit.if a carrier is sensed, the station waits for the transmission in
progress to finish before initiating its own transmission.
Multiple Access describes the fact that multiple stations sends and receives on the
medium. Transmission by one node are generally received by all other stations using the
medium.
1. Non-Persistent CSMA
2. 1-Persistent CSMA
3. p-Persistent CSMA
Non-Persistent CSMA
1-persistent CSMA
P-persistent CSMA
Time is divided to slots where each Time unit (slot) typically equals maximum propagation
delay
Station wishing to transmit listens to the medium:
1. If medium idle,
transmit with probability (p), OR
wait one time unit (slot) with probability (1 – p), then repeat 1.
2. If medium busy, continuously listen until idle and repeat step 1
IEEE 802.11 is definitely the premier standard here, allowing transmission at Ethernet
speeds (10Mbps) with higher speeds planned for the future.
It alerts all the stations in the coverage area of its source indicating the
duration for which the transmission medium will remain engaged. It is also
the request to the destination station for a response confirming its readiness
to accept the frame.
Ethernet
Types of Ethernet:
- Fast Ethernet
- Gigabit Ethernet
- 10GB Ethernet
Fast Ethernet:
3. Audio Layer
4. Application Layer
- The physical radio layer corresponds to the physical layer of the OSI model.
- The radio layer moves data from master to slave or vice versa.
- It is low power system that uses 2.4Ghz ISM band in a range of 10 meter.
- This band is divided into 79 channels of 1Mhz each. Bluetooth uses the
frequency hopping spread specturm (FHSS) method in physical layer to
avoid interference from other devices of network.
- In order to change bits into a signal it uses a version of FSK called GFSK (
Gaussian bandwidth Filtering)
- The base band and link control layer enable the physical connection between
any bluetooth enable protocol.
- This layer also control the synchronization and the frequency hopping
sequence.
Audio Layer:
- Audio data does not go through the L2CAP but directly between two
bluetooth units.
- This protocol is situated over the baseband layer and beside the link
manager protocol in bluetooth protocol stack.
- Multiplexing
Working Manner :
1 simplest Protocol:
2. Stop-and-Wait Mechanism
UNIT-5
Network Layer
IP Address:
Way of representation:
1. Decimal Notation
2. Binary Notation
Decimal Notation:
e.g. 192.168.1.6
In this notation each decimal slot is called octet and it is represented in 8 bits.
Binary Notation:
If we calculate each decimal slot in binary then we get to know its binary
representation.
Classes of IP Address:
Numerical-1
Solution
205.16.37.32
The last address in the block can be found by setting the rightmost 32 − n bits to 1s.
we have 32-28=4
24 = 16
----------------------------------------------------------------------------------
Q. Explain the concept of class less IP address (CIDR-Classless inter domain Routing)
Ans:
Classless Inter-Domain Routing (CIDR) is a method for allocating IP addresses and routing
Internet Protocol packets. The Internet Engineering Task Force introduced CIDR in 1993 to
replace the previous addressing architecture of classful network design in the Internet. Its
goal was to slow the growth of routing tables on routers across the Internet, and to help
slow the rapid exhaustion of IPv4 addresses.
IP addresses are described as consisting of two groups of bits in the address: the
most significant bits are the network address, which identifies a whole network or subnet,
and the least significant set forms the host identifier, which specifies a particular interface
of a host on that network. This division is used as the basis of traffic routing between IP
networks and for address allocation policies. Classful network design for IPv4 sized the
network address as one or more 8-bit groups, resulting in the blocks of Class A, B, or C
addresses. Classless Inter-Domain Routing allocates address space to Internet service
providers and end users on any address bit boundary, instead of on 8-bit segments. In IPv6,
however, the interface identifier has a fixed size of 64 bits by convention, and smaller
subnets are never allocated to end users. CIDR notation is a syntax of specifying IP
addresses and their associated routing prefix. It appends a slash character to the address
and the decimal number of leading bits of the routing prefix, e.g., 192.168.2.0/24 for IPv4,
and 2001:db8::/32 for IPv6. In classful addressing, a large part of the available addresses
were wasted.
Routing
“Routing is a mechanism for finding the most cost effective path between sources to
destination.”
Desirable properties:
2. Robustness:
Ability of the network to deliver packets via some route even in the face of failures
3. Stability:
• The algorithm should converge (move toward destination) to equilibrium fast in the
face of changing conditions in the network.
5. Efficiency:
Minimum overhead cause of keep routing algorithm always be simple. That will give
better efficient way for moving packet from source to destination.
Performance criteria:
Number of hops, cost, delay, throughput
Number of hops- how many intermediate nodes comes in successfully packet delivery.
Cost- for less cost use high bandwidth path so that at minimum time taken by the packet to
reach at destination.
Delay: Dependent the size of queue or queue length. Size of packet queue is greater then
automatically delay time much more otherwise less.
Throughput: No of packet delivered per unit time is called throughput.
2. Decision Time:
Per packet (Datagram): each of the packet is independently decide when its moves
further.
Per-session (virtual circuit): decision of sending each of the packet is taken by session.
3. Decision Place:
• The routes are fixed, they may only change if there is a change in the topology of the
network.
The matrix shows for each source-destination pair of nodes the identity of the
next node on the route.
Dynamic Routing
Dynamic:
• Updated periodically depending on network condition.
Autonomous System
Ans:
• A set of routers and networks managed by a single organization
• The routers within the AS exchange information using a common routing protocol.
• Use exterior routing protocol to pass exchange routing information between routers
in different AS’s
•
Routing Information protocol (RIP)
Ans:
• Routers within an autonomous system exchange messages
Problems:
• Slow convergence for larger networks
• If a network becomes in accessible, it may take a long time for all other routing
tables to know this. After a number of message transfers.
Basic concept
• Computes a route that incurs the least cost
o User configurable : delay,data rate,cost,etc
• Each router maintains a database
o Topology of the autonomous system to which the router belongs
• Network Node
• Only the next hop to the destination is used in the forwarding process.
At steady state:
• All router know the same network topology
Packet Types:
• Hello ( check if neighbor is up)
• Every incoming packet to a node is sent out on every outgoing line except the one it
arrived on
•
Characteristics:
• All possible routes between source and destination are tried. A packet will always
get through if a path exists.
• As all routes are tried, at least one packet will pass through the shortest route
Limitation:
• Flooding generates vast number of duplicate packets
Ans: Since tables are not updated simultaneously there are some inconsistency at point in
time, so a packet moving around in cyclic path. So this problem is called "Counting to
Infinity".
Solution: Use hop count Technique. Assign some no in header information and decrement
this no at each hop. as soon as no. reached 0 packet gets discarded.
Definition:
Network congestion in data networking and queueing theory is the reduced quality of service
that occurs when a network node or link is carrying more data than it can handle. Typical effects
include queueing delay, packet loss or the blocking of new connections
1. Admission Control
2. Chock Packet
4. Load Shedding
5. Resource Reservation