Professional Documents
Culture Documents
As mentioned, Ethernet network is used to create local area network and connect multiple computers or
other devices such as printers, scanners, and so on. In a wired network, this is done with the help of
fiber optic cables, while in a wireless network, it is done through wireless network technology. An
Ethernet network uses various topologies such as star, bus, ring, and more.
WiredEthernet
Initially, ethernet can be designed to run over coaxial cables, twisted pair
cables,fiber optic cable.
Wired Ethernet network, devices are connected with the help of a fiber optic cable which connects the
devices within a distance of 10km. For this, we have to install a computer network interface card (NIC) in
each computer. A unique address is given to each computer that is connected. So, for sharing data and
resources like printers, computers, and other machines, Ethernet networking is used as it establishes a
communication system.
Ethernet is a shared medium network technology, where all the workstations are connected to the same
cable and must connect with one another to send signals over it. The algorithm used to resolve collisions
– that is, when two workstations try to speak at the same time – is called CSMA/CD, and works by
forcing both workstations to back off for random (and hence probably different) intervals before trying
again.
• It is very reliable.
• Ethernet network makes use of firewalls for the security of the data.
Computer Notes
Library
Menu
Header Right
Next →
← Prev
• History of Ethernet
• Wired Ethernet
• Wireless Ethernet
• Types of Ethernet network
• Features of Ethernet
History of Ethernet
Ethernet was developed over several years in the early 1970s by group researchers
within the company Xerox Palo Alto Research Center (Xerox PARC) including, in
particular, Robert Metcalfe (who founded later 3Com company). The goal the
research project was to connect networked computers and laser printers. Xerox
Corporation filed a patent on this technology late 1977. In 1979, companies Digital
Equipment Corporation (DEC), Intel and Xerox combined to improve Ethernet and
together published the first standard in 1980: Ethernet Blue Book sometimes called
TEN (after the initials of the three companies). Finally, the IEEE this technology
became standard in 1983: 802.3 was born … well before the 802.11! A little abuse of
language, it is called Ethernet 802.3 standard. The format of DIX Ethernet packets is
slightly different from the 802.3 Ethernet packets, but the two can coexist on the same
network. The invention of single-chip Ethernet controllers has made Ethernet cards
very cheap, and many modern PCs have it built-in on the MOTHERBOARD.
Wired Ethernet
Initially, ethernet can be designed to run over coaxial cables, twisted pair cables,fiber
optic cable.
Wired Ethernet network, devices are connected with the help of a fiber optic cable
which connects the devices within a distance of 10km. For this, we have to install
a computer network interface card (NIC) in each computer. A unique address is given
to each computer that is connected. So, for sharing data and resources like printers,
computers, and other machines, Ethernet networking is used as it establishes a
communication system.
Ethernet is a shared medium network technology, where all the workstations are
connected to the same cable and must connect with one another to send signals over
it. The algorithm used to resolve collisions – that is, when two workstations try to
speak at the same time – is called CSMA/CD, and works by forcing both workstations
to back off for random (and hence probably different) intervals before trying again.
Advantages of using wired Ethernet network
• It is very reliable.
• Ethernet network makes use of firewalls for the security of the data.
• Data is transmitted and received at very high speed.
• It is very easy to use the wired network.
Disadvantages of using wired Ethernet network
In this, wireless NICs are used for connecting the computer instead of a cable and
these wireless NICs make use of radio waves for communicating between the
systems and furthers these NICs are connected with a wireless switch or hub.
This technology requires maintenance, but it is more easy to use.
• The speed of wireless Ethernet is slower than the wired Ethernet network.
• Wireless networks are less secure as compare to the wired Ethernet network.
• Wireless network connections get obstructed by the structure of the building like
walls, ceilings etc.
• Setting up of a wireless Ethernet network is difficult for the non-experienced users.
Types of Ethernet network
The maximum data rate of the original Ethernet technology is 10 megabits per second
(Mbps), but a second generation fast ethernet carries 100 Mbps, and the latest version
called gigabit ethernet works at 1000 Mbps. Ethernet network can be classified into 3
types:
Fast Ethernet
This type of Ethernet can transfer data at a rate of 100 Mbps. Fast Ethernet makes
use of twisted pair cable or fiber optic cable for communication.
There are three types of fast Ethernet, which are as follows:
• 100BASE-TX
• 100BASE-FX
• 100BASE-T4
Gigabit Ethernet
This type of Ethernet network can transfer data at a rate of 1000 Mbps. Gigabit
Ethernet also makes use of twisted pair cable or fiber optic cable. 48 bits used for
addressing in Gigabit Ethernet.
Nowadays gigabit Ethernet is very popular. The latest Gigabit Ethernet is a 10 Gigabit
Ethernet, which can transfer data at a rate of 10 Gbps.
Gigabit Ethernet was developed so that it can meet the needs of the user like faster
communication network, faster transfer of data etc.
Switch Ethernet
Switched Ethernet involves adding switches so that each workstation can have its
own dedicated 10 Mbps connection rather than sharing the medium, which can
improve network throughput – it has the advantage over rival switched technologies
such as asynchronous transfer mode that it employs the same low-level protocols,
cheap cabling, and network interface cards as ordinary Ethernet.
When we use a switch in a network, then we use a regular network cable rather than
using a crossover cable. The crossover cable is made up of a transmission pair at
one end and a receiving pair at the other end.
The main task of the switch in a network is to transfer the data from one device to
another device in the same network without affecting the other devices.
It supports different data transfer rates like 10Mbps to 100Mbps for fast Ethernet and
1000Mbps to 10 Gbps for the latest Ethernet.
This type of Ethernet makes use of star topology.
Features of Ethernet
Fibre Channel is a high-speed network technology used to connect server to data storage area network.
It handles high performance of disk storage for applications on many corporate networks. It supports
data backup and replication.
Fibre Channel is needed, as it is very flexible and enables the transfer of data at a faster speed.
The topologies, that bring about the flexibility in the fibre channel are –
NOTE –
Here devices are connected in a one-way ring. So, when ports/hubs in a loop topology have information
to transmit, they must send out an arbitration signal to decide, which port/hub can use the channel. The
port in control of the channel then sends an ‘open’ arbitrated signal to the destination port and
transmits its information. Since all the ports in the loop are connected, every port will see and pass
along the data, but ignore the data unless it is addressed to that particular port.
It is still used internally in many fibre channel switches but rarely to connect hosts to storage these days.
FC- hubs provide bypass circuits that prevent the loop from breaking if one device fails or is removed.
NOTE –
A bypass circuit bypasses high-frequency components of power
supply.
Introduction
Class of Service (CoS) or Quality of Service (QoS) is a way to manage multiple traffic
profiles over a network by giving certain types of traffic priority over others. For example
you can give Voice traffic priority over email or http traffic. CoS is offered by service
providers normally within an MPLS (Multi Protocol Label Switching) offering.
Description:
CoS is the classification of specific traffic (at layer 2) by manipulating the class of service
bits (in the frame header). It effectively 'marks' the traffic so that QoS can use this
identification/classification as a means to actually manipulate the traffic according to your
policy. It is one way to identify traffic (along with ToS, ACLs, etc) so that QoS knows what to
manipulate and how to manipulate.
Unlike QoS (Quality of Service) CoS does not offer guarantees with bandwidth or delivery
time its based on a best effort basis.
Frame Relay (frame relay) is a packet switching technology that fragmented into transmission units
called frames and sent in high-speed bursts through a digital network. Establishes an exclusive
connection during the transmission period called virtual connection.
It uses a technology called fast packet in which error checking does not occur in any intermediate node
of the transmission but done at the ends. It makes it more efficient than X.25, and a higher process
speed achieved (it can transmit over 2,044 Mbps).
1. The call control packets are used for setting up and clearing virtual circuits
2. In band signaling is used.
3. Multiplexing of virtual circuits takes place at layer 3.
4. Layer 2 and 3 include flow control and error control
• • 1 is set in the DE (Discard Eligibility) for the part that can be discarded first when
congestion occurs
• • The data size may vary up to 4096 bytes.
Frame relay layers
• Frame relay has only two layers i.e. physical layer and data link layer.
Physical layer
• A simplified version of HDLC is employed by the frame relay at the data link layer.
• A simpler version is used because flow control and error correction is not needed in
frame relay.
Frame relay architecture:
1. DLCI field:
The first part of DLCI is of 6 bits and the second part is of 4 bits. They together form a
10 bit data link connection identifier.
2. Command / Response (C / R):
The C/R bit allows the upper layers to identify a frame as either a command or response.
It is not used by the frame relay protocol.
3. Extended Address (EA):
• This bit indicates whether the current byte is the final byte of the address.
• If EA = 1 it indicates that the current byte is the final one but if EA = 0, then it tells that
another address byte is going to follow.
4. Forward Explicit Congestion Notification (FECN):
• This bit can be set by any switch to indicate that traffic is congested in the direction of
travel of the frame.
• The destination is informed about the congestion via this bit.
5. Backward Explicit Congestion Notification (BECN):
• This bit indicates the congestion in the direction opposite to the direction of frame travel.
• It informs the sender about the congestion.
6. Discard Eligibility (DE):
• The DE bit indicates the priority level of the frame. In the overload situations a frame
may have to be discarded.
• If DE = 1 then that frame can be discarded in the event of congestion.
• DE bit can be set by the sender or by any switch in the network.
Extended address (Frame Relay Assembler I Disassembler) :
The frame relay address has been extended from the original 2 byte address to 3 or 4
byte address, in order to increase the range of DLCIs.
ISDN Interfaces:
The following are the interfaces of ISDN
3. Broadband-ISDN (B-ISDN) –
Narrowband ISDN has been designed to operate over the
current communications infrastructure, which is heavily
dependent on the copper cable however B-ISDN relies mainly
on the evolution of fiber optics. According to CCITT B-ISDN is
best described as ‘a service requiring transmission channels
capable of supporting rates greater than the primary rate.
ISDN Services:
ISDN provides a fully integrated digital service to users. These services
fall into 3 categories- bearer services, teleservices, and
supplementary services.
1. Bearer Services –
Transfer of information (voice, data, and video) between users
without the network manipulating the content of that
information is provided by the bearer network. There is no
need for the network to process the information and therefore
does not change the content. Bearer services belong to the first
three layers of the OSI model. They are well defined in the ISDN
standard. They can be provided using circuit-switched,
packet-switched, frame-switched, or cell-switched networks.
2. Teleservices –
In this, the network may change or process the contents of the
data. These services correspond to layers 4-7 of the OSI model.
Teleservices rely on the facilities of the bearer services and are
designed to accommodate complex user needs. The user need
not be aware of the details of the process. Teleservices include
telephony, teletex, telefax, videotex, telex, and
teleconferencing. Though the ISDN defines these services by
name yet they have not yet become standards.
3. Supplementary Service –
Additional functionality to the bearer services and teleservices
are provided by supplementary services. Reverse charging, call
waiting, and message handling are examples of supplementary
services which are all familiar with today’s telephone company
services
Principle of ISDN:
The ISDN works based on the standards defined by ITU-T (formerly
CCITT). The Telecommunication Standardization Sector (ITU-T)
coordinates standards for telecommunications on behalf of the
International Telecommunication Union (ITU) and is based in Geneva,
Switzerland. The various principles of ISDN as per ITU-T
recommendation are:
• Variety of configurations
Advantages of ISDN:
Disadvantages of ISDN:
What is BISDN
The B-ISDN (broadband integrated services digital network) is a virtual circuit-switched network that can
use high-speed packet switching services. The B-ISDN will use a flexible multiplexing format called ATM
(asynchronous transfer mode).
B-ISDN services are classified into interactive and distribution services. Interactive services contain the
bidirectional flow of user information between two subscribers or between a subscriber and a service
provider.
Interactive services
The interactive services are further divided into three sub-categories which are as follows−
Conversational
Conversational service involves the real-time exchange of information such as sound, video, data or
entire documents. Examples include video-telephony, video-conference, and high-speed data transfer.
Video-telephony is like the normal video telephony service but also has video capture, transmission and
display capabilities. Video-conference supports voice and video communication between two
conference rooms or between several individuals.
Messaging
Messaging service involves the non-real-time exchange of information between subscribers in a store-
and-forward fashion.
Retrieval
Retrieval services provide subscribers with retrieval access to centrally-stored public information.
Examples include broadband videotext (retrieval of video images/sequences with sound, text and
graphics), video retrieval (subscriber create to video libraries of movies) and return of high-resolution
pictures and records from multiple archives and data centers.
Distribution Services
Distribution services contain the unidirectional flow of user information from a service provider to a
subscriber.
Distribution services are divided into two sub-categories, which are as follows:
Distribution services without user presentation control involve the central broadcast of information to
many subscribers, where subscribers have no control over data display. Examples include the broadcast
of TV programs, electronic newspapers, and electronic publishing.
Distribution services with user presentation control are the same as the previous category. The
information is offered as cyclically repeated frames, thereby enabling the subscribers to control the start
and the order of the frames presentation. Examples include electronic newspaper and tele-advertising.
What is an ATM
ATM stands for Asynchronous Transfer Mode. It is a switching technique that uses time
division multiplexing (TDM) for data communications.
ATM networks are connection oriented networks for cell relay that supports voice, video
and data communications. It encodes data into small fixed - size cells so that they are
suitable for TDM and transmits them over a physical medium.
The size of an ATM cell is 53 bytes: 5 byte header and 48 byte payload. There are two
different cell formats - user-network interface (UNI) and network-network interface
(NNI). The below image represents the Functional Reference Model of the
Asynchronous Transfer Mode.
Benefits of ATM Networks are
• It provides the dynamic bandwidth that is particularly suited for bursty traffic.
• Since all data are encoded into identical cells, data transmission is simple,
uniform and predictable.
• Uniform packet size ensures that mixed traffic is handled efficiently.
• Small sized header reduces packet overload, thus ensuring effective
bandwidth usage.
• ATM networks are scalable both in size and speed.
ATM reference model comprises of three layers
• Physical Layer − This layer corresponds to physical layer of OSI model. At
this layer, the cells are converted into bit streams and transmitted over the
physical medium. This layer has two sub layers: PMD sub layer (Physical
Medium Dependent) and TC (Transmission Convergence) sub layer.
• ATM Layer −This layer is comparable to data link layer of OSI model. It
accepts the 48 byte segments from the upper layer, adds a 5 byte header to
each segment and converts into 53 byte cells. This layer is responsible for
routing of each cell, traffic management, multiplexing and switching.
• ATM Adaptation Layer (AAL) −This layer corresponds to network layer of
OSI model. It provides facilities to the existing packet switched networks to
connect to ATM network and use its services. It accepts the data and
converts them into fixed sized segments. The transmissions can be of fixed or
variable data rate. This layer has two sub layers − Convergence sub layer
and Segmentation and Reassembly sub layer.
• ATM endpoints − It contains ATM network interface adaptor. Examples of
endpoints are workstations, routers, CODECs, LAN switches, etc.
• ATM switch −It transmits cells through the ATM networks. It accepts the
incoming cells from ATM endpoints (UNI) or another switch (NNI), updates
cell header and retransmits cell towards destination
ATM transfers data in fixed-size units are known as cells. Each cell includes 53 octets
or bytes, as shown in the figure. The first 5 bytes contain cell-header data, and the
remaining 48 include the payload (user information).
Small, fixed-length cells are well appropriated to transfer voice and video traffic due to
such traffic is biased to delays that result from having to wait for a huge data packet to
download, among other things.
Header Payload
5 Bytes 48 Bytes
• Wireless Access Pointz (WAP) − WAPs or simply access points (AP) are
generally wireless routers that form the base stations or access.
• Client. − Clients are workstations, computers, laptops, printers, smartphones,
etc.
Each station has a wireless network interface controller.
2) Basic Service Set (BSS) −A basic service set is a group of stations communicating at
physical layer level. BSS can be of two categories depending upon mode of operation:
Advantages of WLANs
• They provide clutter free homes, offices and other networked places.
• The LANs are scalable in nature, i.e. devices may be added or removed from
the network at a greater ease than wired LANs.
• The system is portable within the network coverage and access to the
network is not bounded by the length of the cables.
• Installation and setup is much easier than wired counterparts.
• The equipment and setup costs are reduced.
Disadvantages of WLANs
• Since radio waves are used for communications, the signals are noisier with
more interference from nearby systems.
• Greater care is needed for encrypting information. Also, they are more prone
to errors. So, they require greater bandwidth than the wired LANs.
• WLANs are slower than wired LANs.
As shown in the diagram, IEEE 802.16 lays down the standards for physical layer and
data link layer.
• Physical Layer − The two popular services of the physical layer are fixed
WiMAX and mobile WiMAX. They operate in the licensed spectrum below
11 GHz. Fixed WiMAX was released in 2003 and uses OFDM; while mobile
WiMAX was released in 2005 and uses scalable OFDM.
• Data Link Layer − The data link layer is subdivided into three sublayers −
o Security sublayer − This is the bottommost layer and is
concerned with security and privacy of the wireless network. It
deals with encryption, decryption and key management.
o MAC common sublayer − The MAC sublayer is concerned with
channel management. The channel management is connection
oriented, a feature that plays due to which quality of service
(QoS) guarantees are given to the subscriber. The base station
controls the system. It schedules the channels from base
station to the subscriber (downlink channels) and also manages
the channels from the subscriber to the base station (uplink
channels).
o Service specific convergence sublayer − This is equivalent to
logical link control layer of other systems. It provides the
required services and interface to network layer.
Bluetooth network technology connects mobile devices wirelessly over a short-range
to form a personal area network (PAN). The Bluetooth architecture has its own
independent model with a stack of protocols, instead of following the standard OSI
model or TCP/IP model.
The protocols in the Bluetooth standard can be loosely grouped into the physical layer,
data link layer, middleware layer, and application layer as shown in the following
diagram –
What is Bluetooth
Bluetooth is a network technology that connects mobile devices wirelessly over a short-
range to form a personal area network (PAN). They use short-wavelength, ultra-high
frequency (UHF) radio waves within the range 2.400 to 2.485 GHz, instead of RS-232
data cables of wired PANs.
Features of Bluetooth
• Bluetooth technology was released in 1999 as Bluetooth 1.0, by Special
Interest Group (SIG) who continues to manage it.
• It was initially standardized as IEEE 802.15.1.
• Mobile computing devices and accessories are connected wirelessly by
Bluetooth using short-range, low-power, inexpensive radios.
• UHF radio waves within the range of 2.400 to 2.485 GHz are using for data
communications.
• A PAN or a piconet can be created by Bluetooth within a 10 m radius.
• Presently, 2 to 8 devices may be connected.
• Bluetooth protocols allow devices within the range to find Bluetooth
devices and connect with them. This is called pairing. Once, the devices are
paired, they can transfer data securely.
• Bluetooth has lower power consumption and lower implementation costs
than Wi-Fi. However, the range and transmission speeds are typically
lower than Wi-Fi.
• The lower power requirements make it less susceptible to interference with
other wireless devices in the same 2.4GHz bandwidth.
• Bluetooth version 3.0 and higher versions can deliver a data rate of 24
Mbps.
• The Bluetooth version 4.0 came in 2010. It is characterized by low energy
consumption, multivendor interoperability, the economy of
implementation, and greater range.
GEEKSFORGEEKS
GSM in Wireless Communication
GSM stands for Global System for Mobile Communication. GSM is an open and digital
cellular technology used for mobile communication. It uses 4 different frequency bands of
850 MHz, 900 MHz, 1800 MHz and 1900 MHz . It uses the combination of FDMA and
TDMA. This article includes all the concepts of GSM architecture and how it works.
GSM is nothing but a larger system which is divided into further 3 subsystems.
1. BSS : BSS stands for Base Station Subsystem. BSS handles traffic and signaling between a
mobile phone and the network switching subsystem. BSS having two
components BTS and BSC.
2. NSS : NSS stands for Network and Switching Subsystem. NSS is the core network of
GSM. That carried out call and mobility management functions for mobile phone
present in network. NSS have different components like VLR, HLR and EIR.
3. OSS : OSS stands for Operating Subsystem. OSS is a functional entity which the network
operator monitor and control the system. OMC is the part of OSS. Purpose of OSS is to
offer the customer cost-effective support for all GSM related maintenance services.
Suppose there are 3 Mobile stations which are connected with the tower and that tower is
connected to BTS through TRX, then further connected to BSC and MSC. Let’s understand
the functionality of different components.
1. MS : MS stands for Mobile System. MS comprises user equipment and software needed
for communication with a mobile network. Mobile Station (MS) = Mobile
Equipment(ME) + Subscriber Identity Module (SIM). Now, these mobile stations are
connected to tower and that tower connected with BTS through TRX. TRX is a transceiver
which comprises transmitter and receiver. Transceiver has two performance of sending and
receiving.
2. BTS : BTS stands for Base Transceiver Station which facilitates wireless communication
between user equipment and a network. Every tower has BTS.
3. BSC : BSC stands for Base Station Controller. BSC has multiple BTS. You can consider
the BSC as a local exchange of your area which has multiple towers and multiple towers
have BTS.
4. MSC : MSC stands for Mobile Switching Center. MSC is associated with
communication switching functions such as call setup, call release and routing. Call tracing,
call forwarding all functions are performed at the MSC level. MSC is having further
components like VLR, HLR, AUC, EIR and PSTN.
• VLR : VLR stands for Visitor Location Register. VLR is a database which contains the exact
location of all mobile subscribers currently present in the service area of MSC. If you are
going from one state to another state then your entry is marked into the database of
VLR.
• HLR : HLR stands for Home Location Register. HLR is a database containing pertinent
data regarding subscribers authorized to use a GSM network.. If you purchase SIM card
from in the HLR. HLR is like a home which contains all data like your ID proof, which plan
you are taking, which caller tune you are using etc.
• OMC : OMC stands for Operation Maintenance Center. OMC monitor and maintain the
performance of each MS, BSC and MSC within a GSM system.
• AUC : AUC stands for Authentication Center. AUC authenticates the mobile subscriber
that wants to connect in the network.
• EIR : EIR stands for Equipment Identity Register. EIR is a database that keeps the record
of all allowed or banned in the network. If you are banned in the network them you
can’t enter the network, and you can’t make the calls.
• PSTN : PSTN stands for Public Switched Telephone Network. PSTN connects with MSC.
PSTN originally a network of fixed line analog telephone systems. Now almost entirely
digital in its core network and includes mobile and other networks as well as fixed
telephones. The earlier landline phones which places at our home is nothing but PSTN.
Three subsystem BSS, NSS and OSS are connected with each other via some interfaces.
Total three interfaces are there:
1. Air Interface : Air interface is also known as UM interface. Interface between MS and
BTS is called as UM interface because it is mobile analog to the U interface of ISDN.
2. Abis Interface : It is a BSS internal interface linking with BTS and BSC.
3. A interface : It provides communication between BSS and MSC.
Multiple access means that several transmitters can send information simultaneously over
a single communication channel. In this system, different CDMA codes are assigned to
different users, and the user can access the whole bandwidth for the entire duration. It
optimizes the use of available bandwidth as it transmits over the entire frequency range
and does not limit the user's frequency range.
Thus, CDMA allows several users to share a band of frequencies without undue
interference between the users. It is used as an access method in many mobile phone
standards.
CDMA technology was developed during World War II. It was developed by English allies to
protect their wireless transmissions from jamming. When the war ended, Qualcomm patented
this technology and made it commercially available. The first CDMA system was launched in
September 1995 in Hong Kong by Hutchison Telephone Co.
Usage
o It is used in the Global Positioning System (GPS).
o It is used by several mobile phone companies (e.g., Qualcomm standard IS-2000, also
known as CDMA2000)
o W-CDMA is used in UTMS 3G mobile phone standards.
o CDMA has been used in OmniTRACS satellite system for transportation.
Categories of CDMA
o Synchronous CDMA (orthogonal codes)
o Asynchronous CDMA (pseudorandom codes
o The differences between GSM and CDMA are as follows:
Serial No. GSM CDMA
6. Customer
Stored in a SIM card. Stored in a headset or phone.
Information
8. Secure GSM offers less secure communication. CDMS offers secure communication.
GSM signals can be detected since they CDMA transmissions are difficult to
10. Signal Detection
are focused in a narrow bandwidth. detect.
IP Address in Networking
• IP Address is short for Internet Protocol Address.
• It is a unique address assigned to each computing device in an IP network.
• ISP assigns IP Address to all the devices present on its network.
• Computing devices use IP Address to identify and communicate with other devices
in the IP network.
Types Of IP Address-
1. Static IP Address-
NOTE
• Some ISPs do not provide static IP
addresses.
• Static IP Addresses are more costly than
dynamic IP Addresses.
2. Dynamic IP Address-
IP Address Format-
We have-
• Minimum value of 1st octet = 10000000 = 128
• Maximum value of 1st octet = 10111111 = 191
Use-
• Class B is used by organizations requiring medium size networks like IRCTC, banks
etc.
3. Class C-
In class C IP Address,
• The first 24 bits are used for the Network ID.
• The remaining 8 bits are used for the Host ID.
We have-
• Minimum value of 1st octet = 11000000 = 192
• Maximum value of 1st octet = 110111111 = 223
Use-
4. Class D-
We have-
• Minimum value of 1st octet = 11100000 = 224
• Maximum value of 1st octet = 11101111 = 239
Use-
5. Class E-
We have-
• Minimum value of 1st octet = 11110000 = 240
• Maximum value of 1st octet = 11111111 = 255
Use-
Classes of IP Address-
128 –
Class B 230 214 216 – 2 255.255.0.0
191
192 –
Class C 229 221 28 – 2 255.255.255.0
223
Use of CIDR
Variable-length subnet masking is the foundation of CIDR (VLSM). It can now specify
prefixes of any duration, making it much more powerful than the previous method.
Two collections of numbers make up CIDR IP addresses. The network address is written
as a prefix, similar to how an IP address is written (e.g. 192.255.255.255).
The suffix, which means how many bits are in the whole address (e.g. /12), is the second
component. A CIDR IP address will look anything like this when put together −
192.255.255.255/12
As part of the IP address, the network prefix is also defined. These changes are based
on how many bits are needed. As an illustration, in the above example, the first 12 bits
of the address are for the network, while the last 20 bits are for host addresses.
CIDR Notation
Using CIDR we can assign an IP address to host without using standard id address
classes like Class A, B, and C.
In CIDR we simply tell how many bits are used for network id. The network id bits are
provided after the '/' symbol. Like /10 means 10 bits are used for the network id part
and remaining 32-10=22 bits are used for the host id part.
The advantage of using CIDR notation is that it reduces the number of entries in the
routing table and also it manages the ip address space.
Disadvantages
The disadvantages of using CIDR Notation are as follows −
• Using CIDR it is complex to determine the route. By using classful
addresses, we are directly having separate tables for class A, Class B, Class
C.
• So we directly go to these tables by seeing the prefix of IP address. But by
using CIDR, we don't have these tables separately. All entries are placed
in a single table. So, it is difficult to find a route.
TCP/IP model
o The TCP/IP model was developed prior to the OSI model.
o The TCP/IP model is not exactly similar to the OSI model.
o The TCP/IP model consists of five layers: the application layer, transport layer, network
layer, data link layer and physical layer.
o The first four layers provide physical standards, network interface, internetworking, and
transport functions that correspond to the first four layers of the OSI model and these four
layers are represented in TCP/IP model by a single layer called the application layer.
o TCP/IP is a hierarchical protocol made up of interactive modules, and each of them
provides specific functionality.
Here, hierarchical means that each upper-layer protocol is supported by two or more
lower-level protocols.
Internet Layer
o An internet layer is the second layer of the TCP/IP model.
o An internet layer is also known as the network layer.
o The main responsibility of the internet layer is to send the packets from any network, and
they arrive at the destination irrespective of the route they take.
IP Protocol: IP protocol is used in this layer, and it is the most significant part of the entire
TCP/IP suite.
ARP Protocol
o The two terms are mainly associated with the ARP Protocol:
o ARP request: When a sender wants to know the physical address of the device, it
broadcasts the ARP request to the network.
o ARP reply: Every device attached to the network will accept the ARP request and
process the request, but only recipient recognize the IP address and sends back its
physical address in the form of ARP reply. The recipient adds the physical address
both to its cache memory and to the datagram header
ICMP Protocol
The two protocols used in the transport layer are User Datagram protocol and
Transmission control protocol.
Application Layer
o An application layer is the topmost layer in the TCP/IP model.
o It is responsible for handling high-level protocols, issues of representation.
o This layer allows the user to interact with the application.
o When one application layer protocol wants to communicate with another application layer,
it forwards its data to the transport layer.
o There is an ambiguity occurs in the application layer. Every application cannot be placed
inside the application layer except those who interact with the communication system. For
example: text editor cannot be considered in application layer while web browser
using HTTP protocol to interact with the network where HTTP protocol is an application
layer protocol.
TCP vs UDP
What is the TCP?
The TCP stands for Transmission Control Protocol. If we want the communication
between two computers and communication should be good and reliable. For example,
we want to view a web page, then we expect that nothing should be missing on the page,
or we want to download a file, then we require a complete file, i.e., nothing should be
missing either it could be a text or an image. This can only be possible due to the TCP. It
is one of the most widely used protocols over the TCP/IP network.
Features of TCP
The following are the features of the TCP:
o Data delivery
TCP protocol ensures that the data is received correctly, no data is missing and in order. If
TCP protocol is not used, then the incorrect data can be received or out of order. For
example, if we try to view the web page or download a file without using TCP, then some
data or images could be missing.
o Protocol
TCP is a connection-oriented protocol. Through the word connection-oriented, we
understand that the computers first establish a connection and then do the
communication. This is done by using a three-way handshake. In a three-way
handshake, the first sender sends the SYN message to the receiver then the receiver sends
back the SYN ACK message to confirm that the message has been received. After receiving
the SYN ACK message, the sender sends the acknowledgment message to the receiver. In
this way, the connection is established between the computers. Once the connection is
established, the data will be delivered. This protocol guarantees the data delivery means
that if the data is not received then the TCP will resend the data.
What is UDP?
The UDP stands for User Datagram Protocol. Its working is similar to the TCP as it is also
used for sending and receiving the message. The main difference is that UDP is a
connectionless protocol. Here, connectionless means that no connection establishes prior
to communication. It also does not guarantee the delivery of data packets. It does not
even care whether the data has been received on the receiver's end or not, so it is also
known as the "fire-and-forget" protocol. It is also known as the "fire-and-
forget" protocol as it sends the data and does not care whether the data is received or
not. UDP is faster than TCP as it does not provide the assurance for the delivery of the
packets.
Differences between the TCP and UDP
o Type of protocol
Both the protocols, i.e., TCP and UDP, are the transport layer protocol. TCP is a connection-
oriented protocol, whereas UDP is a connectionless protocol. It means that TCP requires
connection prior to the communication, but the UDP does not require any connection.
o Reliability
TCP is a reliable protocol as it provides assurance for the delivery of the data. It follows the
acknowledgment mechanism. In this mechanism, the sender receives the acknowledgment
from the receiver and checks whether the acknowledgment is positive or negative. If the
ACK is positive means, the data has been received successfully. If ACK is negative, then
TCP will resend the data. It also follows the flow and error control mechanism.
UDP is an unreliable protocol as it does not ensure the delivery of the data.
o Flow Control
TCP follows the flow control mechanism that ensures a large number of packets are not
sent to the receiver at the same time, while UDP does not follow the flow control
mechanism.
o Ordering
TCP uses ordering and sequencing techniques to ensure that the data packets are received
in the same order in which they are sent. On the other hand, UDP does not follow any
ordering and sequencing technique; i.e., data can be sent in any sequence.
o Speed
Since TCP establishes a connection between a sender and receiver, performs error
checking, and also guarantees the delivery of data packets while UDP neither creates a
connection nor it guarantees the delivery of data packets, so UDP is faster than TCP.
o Flow of data
In TCP, data can flow in both directions means that it provides the full-duplex service. On
the other hand, UDP is mainly suitable for the unidirectional flow of data.
o TCP UDP
Type of It is a connection- It is a
connection oriented protocol, connectionless
which means that protocol, which
the connection means that it
needs to be sends the data
established before without checking
the data is whether the
transmitted over system is ready to
the network. receive or not.
Equipments Required –
A high-speed Internet connection is required which can be
through a cable modem or high-speed services such as a local area
network. A computer, adaptor, or specialized phone is required.
Some VoIP services only work over your computer or a special
VoIP phone. Other services allow you to use a traditional phone
connected to a VoIP adapter. If you use your computer some
software and an inexpensive microphone are needed. VoIP phones
plug directly into your broadband connection and operate largely
like a traditional telephone. If you use a telephone with a VoIP
adapter, you can dial just as you always have, and the service
provider may also provide a dial tone.
Advantages of VoIP –
1. Some VoIP services offer features and services that are not
available with a traditional phone, or are available but only
for an additional fee.
2. Paying for both a broadband connection and a traditional
telephone line can be avoided.
3. Smoother connection than an analog signal can be
provided.
Disadvantages of VoIP –