Documente Academic
Documente Profesional
Documente Cultură
Goals of Network:
1. Sharing information.
2. Sharing resources.
3. To facilitate centralized management of resources, software, data backup and network security.
4. To increase the speed of communication.
5. To reduce the cost.
6. To improve security.
7. To provide access to remote information.
8. To felicitate person to person communication. (e-mail)
9. To provide inter-active communication (gaming, videos on demand).
Types of Transmission :
1. Broadcast Network. -
Has single communication channel, that is shared and used by all the m/c’s on the
network.
Messages (called Packets) is sent by any m/c , and are received by all the others.
On receiving a packet, it is checked for the address field; if the packet is addressed to it;
then it would be processed, otherwise ignored.
2. Point to Point N/w –
It consists of many connections between individual pairs of machine.
Packet has to follow multiple routes of different length. Hence Routing algorithm are very
important in point to point N/w.
NETWORK DEVICES.
CONNECTING DEVICES :
We divide connecting devices into five different categories based
on the layer in which they operate in a network.
Passive Hubs
Repeaters :
Is a device that operates only in the physical
layer. A repeater receives a signal and, before it
becomes too weak or corrupted, regenerates
the original bit pattern. The repeater then sends
the refreshed signal. It extend the physical
length of a LAN. It does not actually connect two
LANs; it connects two segments of the same LAN. A
repeater can overcome the 10Base5 Ethernet length
restriction. In this standard, the length of the cable is
limited to 500 m. To extend this length we install
repeaters between segments. The repeater operates
only in the physical layer. A repeater forwards every
frame; it has no filtering capability. Don’t compare a
repeater to an amplifier. An amplifier cannot
distinguish between the signal and noise; it amplifies
both. A repeater does not amplify the signal; it
regenerates the signal, when it receives a weakened or
corrupted signal, it creates a copy, of the original strength. Thus repeater is a regenerator, not an
amplifier.
Active Hubs :
An active hub is actually a multipart repeater. It is normally
used to create connections between stations in a physical
star topology.
Bridges :
It operates in both physical and the data link layer. As a
physical layer device, it regenerates the signal it receives. As a
data link layer device, the bridge can check the physical (MAC)
addresses (source and destination) contained in the frame.
Routers :
It is a three-layer
device that routes
packets based on
their logical addresses
(host-to-host
addressing). A router normally connects LANs and WANs in the Internet and has a routing table that is
used for making decisions about the route. The routing tables are normally dynamic and are updated
using routing protocols.
Gateway :
A gateway is normally a computer that operates in all five layers of the Internet or seven layers of OSI .
It takes an application message, reads it, and interprets it. This means that it can be used as a
connecting device between two internetworks
that use different models. Eg., a network
designed to use the OSI model can be connected
to another network using the Internet model.
Gateways can provide security.
Protocols:
Rules and procedures set up to send and receive digital data. (serial). Such rules and procedures are
called Protocols. Messages are made of characters. n no. of characters forms a block. Huge message is
broken into blocks. To identify a block one or more special characters are added before and after the
block. Some characters are added at the beginning and end for “handshaking”.
Eg. Transmitter sends Ready signal to Receiver, indicating that it is ready to send the data. If Receiver
sends Busy signal, it indicates, its busy. The Transmitter will send the data, when the Receiver is Ready.
Types of Communication :
Based on whether the system communicates only in one direction or otherwise.
DQDB:
It consists of two unidirectional cables (buses) to which all the computers are connected.
Each bus has a device which initiates the transmission activity called on the head end.
Traffic that is designated for a computer to the right of the sender uses the upper bus, and
to the left uses the lower Bus.
N/w TOPOLOGY : How the N/w is physically laid out. Two or more devices connect to a link. Two or
more links form a Topology. Each station in communication N/w is called as Node. The nodes are
connected in different ways.
BUS TOPOLOGY :
Advantage :
Extend by repeaters.
Disadvantages :
Slow speed. (only one computer at a time)
Small N/w's. ( less than 10 no. of computers)
RING TOPOLOGY :
Each computer is connected to next computer. Each computer retransmits what it receives from the
previous computer. Flow in one direction, no termination or no end. A small message called token is
passed around the ring. If a computer wants to transmit a data, puts address and data on token and it
passes in the ring. Each computer receives the token, and passes it to other if it is not for itself. The
receiving computer returns a message to the originating, that the message has been reached. The
sending computer then creates another token and passes it on the ring, so that others can use. Faster
N/w can circulate several tokens at once.
Advantage :
No computer can monopolize the N/w because every computer gets equal time to the token.
Disadvantage :
Failure of the ring affects the whole N/w.
Difficult to troubleshoot the ring.
Adding and removing a comp becomes
difficult.
STAR TOPOLOGY :
All computers are connected to central hub.
Advantages :
Fault finding easy.
Disadvantages :
Cable cost.
MESH TOPOLOGY :
Every device has a dedicated point to point link to very other device. Dedicated means link carries
traffic only between two devices it connects. It has n(n-1)/2 channels t link n devices.
=5 ( 5 – 1) / 2 = 10 no. of links.
To accommodate that many links the device should have (n-1) ports.
Advantages :
Dedicated links, so no traffic. N/w robust, as failure of one m/c doesn’t bring down the N/w. Easy fault
diagnosis.
Disadvantage :
More cable cost. More hardware cost. Installation and reconfiguration difficult. ( every computer must
be connected to all other).
Tree topology :
It is a variation of star.
Advantages :
Adding computer easy. ( HUB to hub increases the length).
Disadvantages :
Central HUB fails, entire N/w down. Cabling cost high.
HYBRID TOPOLOGY :
It’s the combination of various other topologies.
Protocol hierarchies :
Most n/w's are organized as a series of layers. (series of
layers or levels, one above the other). No, name, contents
and function of each layer vary for n/w. The purpose of each layer is to provide services to higher layer.
Layer ‘n’ on one m/c (source) carries on a conversation with layer ‘n’ on another m/c. (destination).
The rules and conversations used in this conversation, are collectively known as the layer ‘n’ protocol.
Basically “Protocol” is an agreement between two m/c's, as how communication link should be
established, maintained and released.
N/w Architecture :
A set of layers and protocols is called N/w Architecture. Protocol stack is defined as a list of protocols
used for a certain system, one protocol per layer.
5 – message to be sent.
H2 & T2.
Direction of Transmission : - the direction of Data transfer. Whether it communicates in only one
direction or otherwise.
Error control : - as physical communication circuits are not perfect. Error detection and correction are
more essential. The receiver should be able to tell the sender by some means, that it has received
correct message or wrong message.
Avoid loss of sequencing: - All communication channels cannot preserve the order in which the
messages are sent on it. So there is possibility of loss of sequencing. To avoid this, all the pieces should
be numbered, so that they can be put back together at the receiver in appreciate order.
Connection Oriented and Connectionless Services : Layers can offer two types of services to layers
above them.
Characteristic :
A dedicated connection is established. Data transfer takes place over the established connection. The
connection is released after the data transfer. These services are generally reliable, because the data
loss is minimum, or it is possible to retransmit the lost bits. It uses circuit switching techniques or virtual
circuit switching. For packet connection oriented services the packets are delivered sequentially
because the packets for connection oriented services follow the same path. Also packets do not carry
the full address of the destination. Hence the packet header is of small size, and the per packet
overhead is reduced. These scheme is suitable for long and steady communication.
Disadvantages :
Due to reservation of resources, the N/w resources are not utilized optimally. Sometimes call set up and
call clearing delays can be time consuming and may take more time than the time taken by the actual
data transfer.
Advantages :
Due to reserved resources the user is quite likelyl to get his share of band width. The N/w provides
adequate resources to satisfy the needs of user applications. It can give some form of service
guarantees.
Connectionless services :-
It doesn’t require a connection to be established, in order to exchange data. Instead, information is
transferred by using independent data units. Each data unit contains the complete destination address.
Eg. Same as postal mailing service. It can exchange data without setting an explicit communication path
or connection.
Characteristics :
No need to establish connection for data exchange. Hence no need to reserve any resources. The lost
and dropped packet cannot be retransmitted. Hence it is known as unreliable service. Hence it is
known as unreliable service. It uses routing as its transfer mode. At the destination, the packets may or
may not arrive sequentially. This is because, the data packets may or may not follow the same path.
The packet carries full destination address in order to felicitate the routing. But this increases the
header size and hence increases the per packet overhads to a great extent. It is suitable for busty
transmissions..
Advantages :
No resources reserved, hence it is possible to utilize them optimally. No delay associated with call set
up and no connection is established. As there are no connection, there is no need to maintain any
connection state information. However routing tables are required to be maintained.
Disadvantages :
Cannot provide any service guarantee. The routing infrastructure can face bottleneck due to
overloading. With increased no. of hosts, the size of routing tables will go on increasing.
An open system is a set of protocols that allows any two different systems to communicate
regardless of their underlying architecture. The OSI model is not a protocol; it is a model for
understanding and designing a network architecture that is flexible, robust, and interoperable.
The OSI model is a layered framework for the design of network systems that allows
communication between all types of computer systems. It consists of seven separate but
related layers, each of which defines a part of the process of moving information across a
network.
When a message is sent from device A to device B, it may pass through many intermediate
nodes. The intermediate nodes usually involve only the first three layers of the OSI model.
Within a single machine, each layer calls upon the services of the layer just below it. Layer 3,
for example, uses the services provided by layer 2 and provides services for layer 4.
Between machines, layer x on one machine logically communicates with layer x on another
machine.
1. PHYSICAL LAYER : It is the lowest layer of OSI model. It transmits bit stream
over communication channel. It deals with Electrical / Mechanical specifications of
interface and transmission media. It deals with function and procedures required for
transmission.
Functions :
Bit stream: Encodes the bit stream into electrical or optical signal.
Data rate: Defines the duration of bits called as Data rate / Transmission rate.
Synchronization of bits : The transmission rate and receiving rate must be same. It is done by
synchronizing the clocks at sender and receiver.
2. DATA LINK LAYER : It is responsible for transmitting frames from one node to the
next. It transforms Physical layer to a reliable link making it an error free link to upper
layer.
Functions:
Framing : The data received from network layer is divided into manageable data units called
frames.
Physical addressing : When frames are to be sent to different LAN’s , the data link layer adds a
header to the frame to define sender or receiver.
Flow control : When data transmitted rate and data received is not same; some data may be
lost. The Data link layer imposes a flow control mechanism to prevent overwhelming the
receiver.
Error control : It helps to detect the error and retransmit the damaged frame or the lost frame.
Access control : When multiple devices are connected to same link, the DLL determines which
device has control over link.
3. NETWORK LAYER : The network layer is responsible for the delivery of Packets
from Source to Destination.
Functions :
Logical addressing : When Packet passes network boundary; an addressing system is needed to
distinguish Source and Destination the network layer adds a header to the packet of upper
layer; which includes the logical address of sender and receiver. ( it’s the function of network
layer.)
Functions:
Segmentation and reassembly: A message is divided into segments. Each segment contains a
sequence number, which enables transport layer to reassemble at destination.
Connection control : It performs connectionless and connection oriented services with the
destination.
Flow control : It performs end-to-end flow control. (while DLL performs it, across the link )
Error control : It is performed on end-to-end basis; rather than across the link. It ensures error
free transmissions.
Dialog control: Communication between two processes takes place in either half duplex or full
duplex mode. The session layer manages dialog control for this communication.
Functions :
Translation : Different computer use different encoding systems. The presentation layer
maintains interoperability between the two encoding systems.
Functions:
Network virtual terminal : It is a software version of Physical terminal; that allows a user
to log onto a remote host.
Mail service: Email forwarding, storage are the services.
Directory services: it includes access for global information and distributed database.
File, transfer, Access and management: It allows to access files in remote hosts, to
retrieve files and to manage files in remote computer.
TCP/IP ARCHITECTURE :
A brief description of the main TCP/IP protocols follows:
• Ethernet: The most popular LAN standard for framing and
preparing data for transmission onto the media
• Frame Relay: Also a framing standard; one of the most
cost-effective WAN technologies used to connect