Professional Documents
Culture Documents
Unit - 2
Computer Network Switching
• Connection setup
• data transfer
• Connection teardown
• The setup phase: means creating dedicated channels between the switches.
• Data Transfer Phase: After the establishment of the dedicated circuit (channels), the two parties can
transfer data.
• Teardown Phase: When one of the parties needs to disconnect, a signal is sent to each switch to
release the resources
Example : when system A needs to connect to system M - A sends a setup request that includes the address of system M, to switch I. Switch I
finds a channel between itself and switch IV. Switch I then sends the request to switch IV, which finds a dedicated channel between itself and
switch III. Switch III informs system M of system A's intention at this time.
An acknowledgment from system M needs to be sent in the opposite direction to system A.
After system A receives this acknowledgment the connection established.
• All packets (or datagrams) belong to the same message may travel different
paths to reach their destination
• Datagram Switching is done at the network layer
• This approach can cause the datagrams of a transmission to arrive at their
destination out of order with different delays between the packets.
• Packets may also be lost or dropped because of a lack of resources.
• In most protocols, it is the responsibility of an upper- layer protocol to reorder
the datagrams or ask for lost datagrams before passing them on to the
application.
• The datagram networks are referred to connectionless networks. There are no
setup or teardown phases.
• Switching in the Internet is done by using the datagram approach to packet switching at the network layer
• Global addressing: - Source and destination needs unique addresses (used by the switches only to
create a virtual-circuit identifier ) during the set up phase
• Local addressing (virtual-circuit identifier –VCI): Actually used for data transfer
• After sending all frames, a special frame is send to end the connection
• Destination B responds with a teardown confirmation frame
Delay in Virtual Circuit switching
• Total delay = 3T+ 3t +setup delay +
teardown delay
• In datagram network, each packet may
experience a wait at a switch before it is
forwarded. In addition, the delay is not
uniform for the packets of a message.
• In a virtual-circuit network, there is a
one- time delay for setup and a one-
time delay for teardown. If resources
are allocated during the setup phase,
there is no wait time for individual
packets
Message switching
• It was a precursor of packet switching.
• Message Switching is a switching technique in which a message is transferred as a complete unit
and routed through intermediate nodes at which it is stored and forwarded.
• In Message Switching technique, there is no establishment of a dedicated path between the sender
and receiver.
• The destination address is appended to the message. Message Switching provides a dynamic routing
as the message is routed through the intermediate nodes based on the information available in the
message.
• Message switches are programmed in such a way so that they can provide the most efficient routes.
• Each and every node stores the entire message and then forward it to the next node. This type of
network is known as store and forward network.
• Message switching treats each message as an independent entity.
• Advantages Of Message Switching
• Data channels are shared among the communicating devices that improve the efficiency of using available bandwidth.
• Traffic congestion can be reduced because the message is temporarily stored in the nodes.
• The size of the message which is sent over the network can be varied. Therefore, it supports the data of unlimited size.
• The Long delay can occur due to the storing and forwarding facility provided by the message switching technique.
Multiplexing
• Multiplexing is a technique used to combine and send the multiple data
streams over a single medium.
• The process of combining the data streams is known as multiplexing and
hardware used for multiplexing is known as a multiplexer.
• The purpose of multiplexing is to enable signals to be transmitted more
efficiently over a given communication channel, thereby decreasing
transmission costs..
The 'n' input lines are transmitted through a multiplexer and multiplexer combines the signals to form a
composite signal.
The composite signal is passed through a Demultiplexer and demultiplexer separates a signal to
component signals and transfers them to their respective destinations.
Advantages of Multiplexing:
• Synchronous TDM
• Asynchronous TDM
Synchronous TDM
• A Synchronous TDM is a technique in which time slot is preassigned to every device.
• In Synchronous TDM, each device is given some time slot irrespective of the fact that the device contains
the data or not.
• If the device does not have any data, then the slot will remain empty.
• In Synchronous TDM, signals are sent in the form of frames. Time slots are organized in the form of
frames. If a device does not have data for a particular time slot, then the empty slot will be transmitted.
• The most popular Synchronous TDM are T-1 multiplexing, ISDN multiplexing, and SONET
multiplexing.
• High capacity.
• Reduced in process.
• Less transmission power.
• Reduced set up times.
• It reduced the interference which increases the total system capacity.
• It improved S/N ratio.
• Reduced the cluster size.
• More robust against the failure of single components.
Satellite Network
• Satellite Internet access is Internet access provided through communication satellites. Modern consumer
grade satellite Internet service is typically provided to individual users through geostationary satellites that
can offer relatively high data speeds
• Satellite networks are the key to staying connected, no matter where you go.
• Satellite phones and other communication solutions use one of two types of networks. The first type, low
earth orbit (LEO) networks, are made up of multiple satellites orbiting Earth at an altitude of 1,000 miles or
less. These satellites are constantly on the move. So when one moves out of range, your communication is
handed off to another satellite that is within range.
• The second type is known as a geostationary or geosynchronus orbit (GEO) network. In this configuration,
satellites are placed at a higher altitude — about 22,000 miles above Earth – along the equator. They are set
to orbit at the same speed of Earth’s rotation, essentially keeping them stationary above us.
• A satellite is basically a self-contained communications system with the
ability to receive signals from Earth and to retransmit those signals back
with the use of a transponder—an integrated receiver and transmitter of
radio signals.
• Satellites provide information about Earth's clouds, oceans, land and air.
They also can observe wildfires, volcanoes and smoke. All this
information helps scientists predict weather and climate. It helps farmers
know what crops to plant.
IEEE
• Stands for the "Institute of Electrical and Electronics Engineers" and is
produced "I triple E." The IEEE is a professional association that
develops, defines, and reviews electronics and computer
science standards. Its mission is "to foster technological innovation and
excellence for the benefit of humanity.“
• Getting involved in IEEE standards provides you with opportunities to
network with industry peers and broaden your understanding of your
industry and technology, as well as gain familiarity with the content
of standards in which you are involved—facilitating early compliance
and anticipating market requirements.
IEEE 802
• Routing is the process of selecting a path for traffic in a network or between or across
one network interface to another.
firewalls, or switches.
Routing algorithms
• In order to transfer the packets from source to the destination, the network layer must
determine the best route through which packets can be transmitted. The routing protocol
is a routing algorithm that provides the best path from the source to the destination.
•
Types of Routing Algorithms
• Static or Dynamic Routing,
• Distributed or Centralized,
• Single path or Multi-path,
• Flat or Hierarchical,
• Intra Domain or Inter-Domain,
• link State or Distance Vector.
Distance-vector routing protocol
• A distance-vector routing protocol in data networks determines the best route for data packets based on distance. ...
• Distance-vector routing protocols measure the distance by the number of routers a packet has to pass, one router
counts as one hop. Some distance-vector protocols also take into account network latency and other factors that
influence traffic on a given route. To determine the best route across a network, routers, on which a distance-vector
protocol is implemented, exchange information with one another, usually routing tables plus hop counts for
destination networks and possibly other traffic information. Distance-vector routing protocols also require that a
distances to other nodes in the network. The distance vector algorithm was the original
ARPANET routing algorithm and was implemented more widely in local area networks with the
B 3 B
C 6 B
D 10 B
E 10 B
F 7 F
Example from A to C
A,B–C =3+3=6
A,F,E - C = 7+4+4=15
A,F,B - C = 7+5+3= 15
A,F,E,D - C = 7 + 4+ 3+4 = 18
Link state routing
• Link state routing is a technique in which each router shares the knowledge of its
neighbourhood with every other router in the internetwork.
• The three keys to understand the Link State Routing algorithm:
• Knowledge about the neighbourhood: Instead of sending its routing table, a router sends
the information about its neighbourhood only. A router broadcast its identities and cost of the
directly attached links to other routers.
• Flooding: Each router sends the information to every other router on the internetwork except
its neighbours. This process is known as Flooding. Every router that receives the packet
sends the copies to all its neighbours. Finally, each and every router receives a copy of the
same information.
• Information sharing: A router sends the information to every other router only when the
change occurs in the information.
• Link State Routing has two phases:
• Reliable Flooding
• Initial state: Each node knows the cost of its neighbours.
• Route Calculation
• Each node uses Dijkstra's algorithm on the graph to calculate the optimal routes to all nodes.
• The Link state routing algorithm is also known as Dijkstra's algorithm which is used to find the shortest path from
one node to every other node in the network.
• The Dijkstra's algorithm is an iterative, and it has the property that after k th iteration of the algorithm, the least cost
paths are well known for k destination nodes.
• some notations:
• c( i , j): Link cost from node i to node j. If i and j nodes are not directly linked, then c(i , j) = ∞.
• D(v): It defines the cost of the path from source node to destination v that has the least cost currently.
• P(v): It defines the previous node (neighbour of v) along with current least cost path from source to v.
•
• Step 2:
• In the above table, we observe that vertex D contains the least cost path in step 1. Therefore, it is
added in N. Now, we need to determine a least-cost path through D vertex.
• This way find out shortest path through all nodes then get a final Table
5 ADEBC 4,E
6 ADEBCF
TCP/IP
• TCP/IP means Transmission Control Protocol and Internet Protocol.
• It is the network model used in the current Internet architecture as well.
• Protocols are set of rules which govern every possible communication over a network.
• These protocols describe the movement of data between the source and destination or the
internet.
• Communication: The overall idea was to allow one application on one computer
send data packets another application running on different computer.
Architectures
•
Functions of each layers
• Layer 1: Host-to-network Layer
• Lowest layer.
• Protocol is used to connect to the host, so that the packets can be sent over it.
• Varies from host to host and network to network.
• Layer 2: Internet layer
• Selection of a packet switching network which is based on a connectionless
internetwork layer is called a internet layer.
• It is the layer which holds the whole architecture together.
• It helps the packet to travel independently to the destination.
• Order in which packets are received is different from the way they are sent.
• IP (Internet Protocol) is used in this layer.
• Layer 3: Transport Layer
• It decides if data transmission should be on parallel path or single path.
• Functions such as multiplexing, segmenting or splitting on the data is done by transport
layer.
• The TCP/IP specifications described a lot of applications that were at the top of the
protocol stack.
• DNS(Domain Name Server) resolves an IP address into a textual address for Hosts
1 OSI model Developed after TCP/IP TCP/IP model Developed before OSI
2 OSI model has 7 layers TCP/IP has 4 layers
3 OSI model developed before protocols TCP/IP model developed after protocols
of OSI were developed of TCP/IP were developed
devices send information across a network, a process will add the Source and Destination IP Address
sent as binary numbers by the devices on the network, but they are typically displayed in human-
readable notations (decimal) such as 192.168.100.1. The decimal format makes it easier for people,
• Each of the 4 Octets are made up of 8 binary bits (one byte). The formula 28 =
256 dictates that the largest number for any octet would be 255. Counting always
starts with zero, 0 → 255 = 256 unique addresses per octet. You can address 256
things 0 → 255, but you cannot count to the decimal number 256, the count starts
with 0 not 1.
• An IP address serves two main functions: host or network interface identification and location
addressing.
• Two addresses that cannot be used in your example are 192.168.123.0 and 192.168.123.255 because
binary addresses with a host portion of all ones and all zeros are invalid. The zero address is invalid
because it is used to specify a network without specifying a host. The 255 address is used to broadcast
a message to every host on a network. Just remember that the first and last address in any network or
subnet cannot be assigned to any individual host.
IP Address
A device’s IP address actually consists of two separate parts:
Network ID: The network ID is a part of the IP address starting from the left that identifies the specific
network on which the device is located. On a typical home network, where a device has the IP address
192.168.1.34, the 192.168.1 part of the address will be the network ID. It’s custom to fill in the missing
final part with a zero, so we might say that the network ID of the device is 192.168.1.0.
Host ID: The host ID is the part of the IP address not taken up by the network ID. It identifies a specific
device on that network. Continuing our example of the IP address 192.168.1.34, the host ID would be 34
—the host’s unique ID on the 192.168.1.0 network.
subnet and subnet mask
• A subnetwork or subnet is a logical subdivision of an IP network. The practice of dividing
a network into two or more networks is called subnetting. Computers that belong to a subnet are
addressed with an identical most-significant bit-group in their IP addresses.
• Subnetting is the practice of dividing up a network into two or more networks.
Common advantages of subnetting include enhancing routing efficiency, network management
control, and improving network security.
• A subnet mask is used to divide an IP address into two parts. One part identifies the host
(computer), the other part identifies the network to which it belongs.
• The subnet mask is used by the TCP/IP protocol to determine whether a host is on the local subnet
or on a remote network.
• The first 24 bits (the number of ones in the subnet mask) are identified as the network address, with the last 8 bits
(the number of remaining zeros in the subnet mask) identified as the host address. This gives you the following:
• 11000000.10101000.01111011.00000000 -- Network address (192.168.123.0)
• 00000000.00000000.00000000.10000100 -- Host address (000.000.000.132)
• So now you know, for this example using a 255.255.255.0 subnet mask, that the network ID is 192.168.123.0, and
the host address is 0.0.0.132. When a packet arrives on the 192.168.123.0 subnet (from the local subnet or a remote
network), and it has a destination address of 192.168.123.132, your computer will receive it from the network and
process it.
• Almost all decimal subnet masks convert to binary numbers that are all ones on the left and all zeros on the right.
Some other common subnet masks are:
• Decimal Binary 255.255.255.192 1111111.11111111.1111111.11000000 255.255.255.224
1111111.11111111.1111111.11100000
• Internet RFC 1878 (available from InterNIC
-Public Information Regarding Internet Domain Name Registration Services) describes the valid subnets and
subnet masks that can be used on TCP/IP networks.
• You should now be able to give IP addresses to 254 hosts. This works fine if all 150
computers are on a single network. However, your 150 computers are on three separate
physical networks. Instead of requesting more address blocks for each network, you
divide your network into subnets that enable you to use one block of addresses on
multiple physical networks.
• Using a subnet mask of 255.255.255.192, your 192.168.123.0 network then becomes the
four networks 192.168.123.0, 192.168.123.64, 192.168.123.128 and 192.168.123.192.
These four networks would have as valid host addresses:
Class B IP addresses are used for medium and large-sized networks in enterprises and organizations. They support up to
65,000 hosts on 16,000 individual networks.
Class C addresses are most common and used in small business and home networks. These support up to 256 hosts on
each of 2 million networks.
class D for multicast and class E for experimental purposes
Class D and E addresses are least used. Class D is reserved for a not widely used, and reserved for special cases largely
for services and applications to stream audio and video to many subscribers at once. Class E addresses are reserved for
research purposes by those responsible for Internet networking and IP address research, management, and development.
IPV4
Features of IPv4
• Connectionless Protocol.
• Allow creating a simple virtual communication layer over diversified devices.
• It requires less memory, and ease of remembering addresses.
• Already supported protocol by millions of devices.
• Offers video libraries and conferences.
IPV6
• Internet Protocol version 6 is the most recent version of the Internet Protocol, the communications protocol
that provides an identification and location system for computers on networks and routes traffic across the
Internet.
Major Features of IPv6
• Expanded Addressing. IP address size increases from 32 bits in IPv4 to 128 bits in IPv6, to support
more levels of addressing hierarchy. ...
• Additional IPv6 Resources.
• https://www.guru99.com/difference-ipv4-vs-ipv6.html#:~:text=KEY%20DIFFERENCE,separated%20by%20a
%20colon(%3A).
y o u
Th an k