CSA UNIT-9 Comp
CSA UNIT-9 Comp
2020
Data communication
The meanings of source and receiver are very simple. The device that transmits
the data is known as source and the device that receives the transmitted data is
known as receiver. Data communication aims at the transfer of data and
maintenance of the data during the process but not the actual generation of
the information at the source and receiver.
Datum mean the facts information statistics or the like derived by calculation or
experimentation. The facts and information so gathered are processed in
accordance with defined systems of procedure. Data can exist in a variety of
forms such as numbers, text, bits and bytes. The Figure is an illustration of a
simple data communication system.
The term data used to describe information, under whatever form of words you
will be using.
A data communication system may collect data from remote locations through
data transmission circuits, and then outputs processed results to remote
locations. Figure provides a broader view of data communication networks. The
different data communication techniques which are presently in widespread use
evolved gradually either to improve the data communication techniques already
existing or to replace the same with better options and features. Then, there are
2
Data Communication and Computer Networks Unit – 9
data communication jargons to contend with such as baud rate, modems, routers,
LAN, WAN, TCP/IP, ISDN, during the selection of communication systems. Hence,
it becomes necessary to review and understand these terms and gradual
development of data communication methods.
This is most useful asset of a data communication system. The message simply
refers to data or piece of information which is to be communicated. A message
could be in any form, it may be in form of a text file, an audio file, a video file, etc.
To transfer message from source to destination, someone must be there who will
play role of a source. Sender plays part of a source in data communication system.
It is simple a device that sends data message. The device could be in form of a
computer, mobile, telephone, laptop, video camera, or a workstation, etc.
3
Data Communication and Computer Networks Unit – 9
3. Receiver: It is the device or computer that receives the message. The location
of receiver computer is generally different from the sender computer. The
distance between sender and receiver depends upon the types of network used in
between.
To govern data communications, various sets of rules had been already designed
by the designers of the communication systems, which represent a kind of
agreement between communicating devices. These are defined as protocol. In
simple terms, the protocol is a set of rules that govern data communication. If
two different devices are connected but there is no protocol among them, there
would not be any kind of communication between those two devices. Thus the
protocol is necessary for data communication to take place.
4
Data Communication and Computer Networks Unit – 9
2. Data routing. Data routing defines the most efficient path between the source
and destination.
3. Data formatting. Data formatting rules define which group of bits or characters
within packet constitute data, control, addressing, or other information.
5. Error control. These rules are designed to detect errors in messages and to
ensure transmission of correct messages. The most common method is to
retransmit erroneous message block. In such a case, a block having error is
discarded by the receiver and is retransmitted by the sender.
6. Precedence and order of transmission. These rules ensure that all the nodes
get a chance to use the communication lines and other resources of the network
based on the priorities assigned to them.
5
Data Communication and Computer Networks Unit – 9
8. Data security. Providing data security and privacy is also built into most
communication software packages. It prevents access of data by unauthorized
users.
1. Delivery: The data must be deliver in correct order with correct destination.
2. Accuracy: The data must be deliver accurately.
3. Timeliness: The data must be deliver in a timely manner.late delivered Data
useless.
4. Jitter: It is the uneven delay in the packet arrival time that cause uneven
quality.
6
Data Communication and Computer Networks Unit – 9
1. Simplex Mode
2. Half-Duplex Mode
3. Full-Duplex Mode
Simplex Mode
In Simplex mode, the communication is unidirectional, as on a one-way street.
Only one of the two devices on a link can transmit, the other can only receive. The
simplex mode can use the entire capacity of the channel to send data in one
direction.
Example: Keyboard and traditional monitors. The keyboard can only introduce
input, the monitor can only give the output.
7
Data Communication and Computer Networks Unit – 9
Half-Duplex Mode
In half-duplex mode, each station can both transmit and receive, but not at the
same time. When one device is sending, the other can only receive, and vice
versa. The half-duplex mode is used in cases where there is no need for
communication in both direction at the same time. The entire capacity of the
channel can be utilized for each direction.
Example: Walkie- talkie in which message is sent one at a time and messages are
sent in both the directions.
Full-Duplex Mode
In full-duplex mode, both stations can transmit and receive simultaneously. In
full_duplex mode, signals going in one direction share the capacity of the link with
signals going in other direction, this sharing can occur in two ways:
Either the link must contain two physically separate transmission paths,
one for sending and other for receiving.
Or the capacity is divided between signals travelling in both directions.
8
Data Communication and Computer Networks Unit – 9
(1) Analog
9
Data Communication and Computer Networks Unit – 9
(2) Digital
In digital technology, the data are generated and processed in two states: High
(represented as 1) and Low (represented as 0). Digital technology stores and
transmits data in the form of 1s and 0s.
Skywave communication
10
Data Communication and Computer Networks Unit – 9
Satellite communication
1. Internet
4. Television
The definitions of the terms used in the communication system are discussed
below.
Information
Signal
The single-valued function of time that carries the information. The information is
converted into an electrical form for transmission.
Transducer
Amplifier
11
Data Communication and Computer Networks Unit – 9
The electronic circuit or device that increases the amplitude or the strength of the
transmitted signal is called an amplifier. When the signal strength becomes less
than the required value, amplification can be done anywhere in between
transmitter and receiver. A DC power source will provide for the amplification.
Modulator
The phase of the carrier wave changes the phase of the signal wave. The phase
shift after modulation is dependent on the frequency of the carrier wave as well.
Phase modulated waves are immune to noise to a greater extent.
Transmitter
It is the arrangement that processes the message signal into a suitable form for
transmission and subsequently reception.
12
Data Communication and Computer Networks Unit – 9
Antenna
Channel
A channel refers to a physical medium such as wire, cables, space through which
the signal is passed from transmitter to the receiver. There are many channel
impairments that affect the channel performance to a pronounced level. Noise,
Attenuation and distortion to mention the major impairments.
Noise
Internal sources include noise due to random motion and collision of electrons in
the conductors, thermal noise due to diffusion and recombination of charge
carriers in other electronic devices. Internal noise can be minimised by cooling
and using digital technology for transmission.
Attenuation
13
Data Communication and Computer Networks Unit – 9
Distortion
It is also another type of channel problem. When the signal is distorted, the
distorted signal may have frequency and bandwidth different from the
transmitted signal. The variation in the signal frequency can be linear or non-
linear.
Receiver
Demodulator
14
Data Communication and Computer Networks Unit – 9
Repeaters
The block diagram given below represents the flow of the signal from the source
to the destination. The role of every device and arrangement discussed above is
better understood.
15
Data Communication and Computer Networks Unit – 9
Analog signals are difficult to get Digital signals are easy to analyse.
analysed at first.
Analog signals are more accurate than Digital signals are less accurate.
digital signals.
Analog signals take time to be stored. It Digital signals can be easily stored.
has infinite memory.
16
Data Communication and Computer Networks Unit – 9
signals.
Analog signals produce too much noise. Digital signals do not produce noise.
Most of the image sensors are in the analog signal, and digital processing cannot
be applied on it, as it requires infinite memory to store because signals have an
infinite value that is why we cannot store it.
1. Sampling
2. Quantization
To convert an analog signal into a digital signal, both its axis(x,y) are converted
into digital format.
17
Data Communication and Computer Networks Unit – 9
Sampling
In analog signals, there are continuous electrical signals that vary with time. With
the help of subsystem, a sampler extracts continuous signals for the sampling of
signals.
(Sampling of signals)
Sampling is done along the x-axis of signals that continuously differs with time. It
is divided into two category one is sampling and other is downsampling.
Quantization
Sampling and quantization are opposite to each other. Sampling is done along the
x-axis but quantization is done along the y-axis.
18
Data Communication and Computer Networks Unit – 9
In the image processing, the sampled image is considered as a digital value. When
there is a transition of states between time-varying values of image function and
its digital equivalent signifies quantization.
The main problem in the image is the continuous occurrence of false contours
which can be quantized later with inadequate brightness levels. The fine shading
of the image depends on the level of quantization.
Noiseless Channel
Simplest Protocol
19
Data Communication and Computer Networks Unit – 9
Also, the receiver can immediately handle any received frame with a
processing time that is small enough to be negligible.
Now, the transmitter starts to send the next frame. If frame is received at
station B with errors, then a negative acknowledgement(NAK) is sent to
station A. In this case, station 'A' must retransmit the old packet in a new
frame.
There is also a possibility that the information frames or ACKs may get lost.
The sender which sends one frame and then waits for an acknowledgement
before process is known as stop and wait.
20
Data Communication and Computer Networks Unit – 9
Noisy Channels
If the acknowledgement frame gets lost and data link layer on 'A' eventually
times out. Not having received an ACK, it assumes that its data frame was
lost or damaged and sends the frame containing packet 1 again. This
duplicate frame also arrives at data link layer on 'B', thus part of file will be
duplicated and protocol is said to be failed.
21
Data Communication and Computer Networks Unit – 9
The receiver can then check the sequence number determine if the
message is a duplicate since only message is transmitted at any time.
The sending and receiving station needs only 1-bit alternating sequence of
'0' or '1' to maintain the relationship of the transmitted message and its
ACK/ NAK.
2. Sequence numbers
Stop-and-wait ARQ is the simplest mechanism for error and flow control.
Bandwidth
22
Data Communication and Computer Networks Unit – 9
The smaller frequencies are used for long-distance communication and can travel
unaffected over large distances, ie, less attenuation. Larger frequencies have
greater energy and can carry more information but they are very inefficient and
cannot be transmitted over long distances. One such set of frequencies are used
for a very different purpose than others, ie the microwaves. For transmitting
sounds or speech, the frequency range of 300 Hz to 3100 Hz is sufficient and
hence the current telephones operate at a bandwidth of 2800 Hz. Transmission of
music requires a bandwidth of the signal of 20 kHz because of the various
instruments with a variety of pitches.
The audible range of a human is from 20 Hz to 20 kHz whereas a dog can hear
from 50 Hz to 46 kHz. The key characteristic of bandwidth is that any band of a
given width can carry the same amount of information, regardless of where the
band is located in the frequency spectrum. For example, a 4kHz signal bandwidth
can transmit a telephone conversation whether it is through lower frequency, like
a wired telephone or modulated to a higher frequency, ie cell phone.
What we discussed till now was with respect to analog signals. Digital signals are
in rectangular form, either on or off, ie 1 or 0. The sine wave is the fundamental
waveform and every other kind of waveform (triangular, rectangular as in digital)
23
Data Communication and Computer Networks Unit – 9
There are various methods of transmission, yes lots of them. From smoke signals
and beating drums to the current fiber optics. The amount of data these various
methods can transfer differ hugely. During the 1990’s and the early 2000’s, India
had dial-up internet which was really slow but now with infrastructure changes
we have faster internet. Wires are the most commonly used transmission media.
A wire offers a bandwidth of approximately 750 MHz. The transmission over the
air and free space range from a few hundred kHz to a few GHz. An optical
fiber can offer a signal bandwidth of over 100 GHz. The bandwidths are allocated
to radios, televisions and cellular communication companies by the government
of the country.
24
Data Communication and Computer Networks Unit – 9
Latency
Latency is the time it takes for a packet to get across the network, from source to
destination. It is measured in units of time — ms (millisecond, or 1/1,000 of a
second).
The time taken for a packet to be transferred across a network. We can measure
this as one-way to its destination or as a round trip.
Network latency can be caused by a range of issues but generally, it comes down
to the state of routers and the distance between our network devices. The more
routers a packet has to travel through the more latency there is because each
router has to process the packet. In most cases, this latency isn’t noticeable but
when traffic travels across the internet it can be more pronounced (because the
number of routers the packet passes through increases).
The distance that a packet travels can also have a significant influence on the
amount of latency within a network. A packet that travels around the world
would have at least 250 ms of latency. In enterprise-level networks, latency is
present to a lesser extent. When packets travel across a network to their
destination, they rarely travel to the node in a straight line. As such the amount of
latency is dependent on the route that the packet takes.
25
Data Communication and Computer Networks Unit – 9
Throughput
The quantity of data being sent and received within a unit of time.
Throughput is the actual speed with which data gets transferred over the
network. Besides transmitting the actual data, network bandwidth is used for
transmitting error messages, acknowledgement frames, etc.
Poor network throughput can be caused by several factors. One of the main
culprits is poor hardware performance. If devices like routers are experiencing
performance degradation, faults, or are simply outdated then our can end up with
low throughput. Likewise, if computer networks are congested with lots of traffic
then packet loss will occur. Packet loss is where data packets are lost in transit.
Low network throughput is often caused when packets are lost in transit.
Both network latency and throughput are important because they have an effect
on how well our network is performing. If latency is too high then packets will
take a longer amount of time to reach their destination. The more time it takes
for packets to reach their destination, the slower devices, services, and
applications will operate within the network. Likewise, the lower the amount of
26
Data Communication and Computer Networks Unit – 9
throughput, the lower the number of packets being processed in a specific time
period.
The moment latency gets too high or throughput falls, then our network is going
to grind to a halt. This is the point at which services will start to perform sluggishly
as packets fail to reach their destination at a speed that can sustain the full
operation of our network.
Protocol
Protocol is a set of rules and regulations used by devices to communicate over the
network. Just like humans, computers also need rules to ensure successful
communication. If two people start speaking at the same time or in different
languages when no interpreter is present, no meaningful exchange of information
can occur.
27
Data Communication and Computer Networks Unit – 9
Unipolar
28
Data Communication and Computer Networks Unit – 9
Digital transmission system sends the voltage pulses over the medium
link such as wire or cable.
In most types of encoding, one voltage level represents 0, and another
voltage level represents 1.
The polarity of each pulse determines whether it is positive or negative.
This type of encoding is known as Unipolar encoding as it uses only one
polarity.
In Unipolar encoding, the polarity is assigned to the 1 binary state.
In this, 1s are represented as a positive value and 0s are represented as
a zero value.
In Unipolar Encoding, '1' is considered as a high voltage and '0' is
considered as a zero voltage.
Unipolar encoding is simpler and inexpensive to implement.
Unipolar encoding has two problems that make this scheme less desirable:
o DC Component
o Synchronization
Polar
o Polar encoding is an encoding scheme that uses two voltage levels: one is
positive, and another is negative.
o By using two voltage levels, an average voltage level is reduced, and the DC
component problem of unipolar encoding scheme is alleviated.
29
Data Communication and Computer Networks Unit – 9
NRZ
o NRZ stands for Non-return zero.
o In NRZ encoding, the level of the signal can be represented either positive
or negative.
The two most common methods used in NRZ are:
NRZ-L: In NRZ-L encoding, the level of the signal depends on the type of the bit
that it represents. If a bit is 0 or 1, then their voltages will be positive and negative
respectively. Therefore, we can say that the level of the signal is dependent on
the state of the bit.
NRZ-I: NRZ-I is an inversion of the voltage level that represents 1 bit. In the NRZ-I
encoding scheme, a transition occurs between the positive and negative voltage
that represents 1 bit. In this scheme, 0 bit represents no change and 1 bit
represents a change in voltage level.
30
Data Communication and Computer Networks Unit – 9
RZ
o RZ stands for Return to zero.
o There must be a signal change for each bit to achieve synchronization.
However, to change with every bit, we need to have three values: positive,
negative and zero.
o RZ is an encoding scheme that provides three values, positive voltage
represents 1, the negative voltage represents 0, and zero voltage
represents none.
o In the RZ scheme, halfway through each interval, the signal returns to zero.
o In RZ scheme, 1 bit is represented by positive-to-zero and 0 bit is
represented by negative-to-zero.
31
Data Communication and Computer Networks Unit – 9
Disadvantage of RZ:
It performs two signal changes to encode one bit that acquires more bandwidth.
Biphase
Biphase is an encoding scheme in which signal changes at the middle of
the bit interval but does not return to zero.
Biphase encoding is implemented in two different ways:
Manchester
It changes the signal at the middle of the bit interval but does not return
to zero for synchronization.
In Manchester encoding, a negative-to-positive transition represents
binary 1, and positive-to-negative transition represents 0.
Manchester has the same level of synchronization as RZ scheme except
that it has two levels of amplitude.
Differential Manchester
It changes the signal at the middle of the bit interval for synchronization,
but the presence or absence of the transition at the beginning of the
32
Data Communication and Computer Networks Unit – 9
Bipolar
Bipolar encoding scheme represents three voltage levels: positive,
negative, and zero.
In Bipolar encoding scheme, zero level represents binary 0, and binary 1
is represented by alternating positive and negative voltages.
If the first 1 bit is represented by positive amplitude, then the second 1
bit is represented by negative voltage, third 1 bit is represented by the
positive amplitude and so on. This alternation can also occur even when
the 1bits are not consecutive.
33
Data Communication and Computer Networks Unit – 9
AMI
AMI stands for alternate mark inversion where mark work comes from
telegraphy which means 1. So, it can be redefined as alternate 1
inversion.
In Bipolar AMI encoding scheme, 0 bit is represented by zero level and 1
bit is represented by alternating positive and negative voltages.
Advantage:
DC component is zero.
Sequence of 1s bits are synchronized.
Disadvantage:
This encoding scheme does not ensure the synchronization of a long
string of 0s bits.
B8ZS
B8ZS stands for Bipolar 8-Zero Substitution.
This technique is adopted in North America to provide synchronization
of a long sequence of 0s bits.
In most of the cases, the functionality of B8ZS is similar to the bipolar
AMI, but the only difference is that it provides the synchronization when
a long sequence of 0s bits occur.
B8ZS ensures synchronization of a long string of 0s by providing force
artificial signal changes called violations, within 0 string pattern.
34
Data Communication and Computer Networks Unit – 9
35
Data Communication and Computer Networks Unit – 9
If the number of 1s bits is even, then the violation is made on the place of the first
and fourth consecutive 0s. If the polarity of the previous bit is positive, then
violations are negative, and if the polarity of the previous bit is negative, then
violations are positive.
If the number of 1s bits since the last substitution is even.
ANALOG-TO-DIGITAL CONVERSION
When an analog signal is digitalized, this is called an analog-to-digital
conversion.
Suppose human sends a voice in the form of an analog signal, we need
to digitalize the analog signal which is less prone to noise. It requires a
36
Data Communication and Computer Networks Unit – 9
37
Data Communication and Computer Networks Unit – 9
PCM
o PCM stands for Pulse Code Modulation.
o PCM technique is used to modify the pulses created by PAM to form a
digital signal. To achieve this, PCM quantizes PAM pulses. Quantization is a
process of assigning integral values in a specific range to sampled instances.
o PCM is made of four separate processes: PAM, quantization, binary
encoding, and digital-to-digital encoding.
38
Data Communication and Computer Networks Unit – 9
PCM
Analog Transmission
To send the digital data over an analog media, it needs to be converted into
analog signal.There can be two cases according to data formatting.
Bandpass:The filters are used to filter and pass frequencies of interest. A
bandpass is a band of frequencies which can pass the filter.
Low-pass: Low-pass is a filter that passes low frequencies signals.
39
Data Communication and Computer Networks Unit – 9
When digital data is converted into a bandpass analog signal, it is called digital-to-
analog conversion. When low-pass analog signal is converted into bandpass
analog signal, it is called analog-to-analog conversion.
Digital-to-Analog Conversion
When data from one computer is sent to another via some analog carrier, it is
first converted into analog signals. Analog signals are modified to reflect digital
data.
An analog signal is characterized by its amplitude, frequency, and phase. There
are three kinds of digital-to-analog conversions:
Amplitude Shift Keying
In this conversion technique, the amplitude of analog carrier signal is modified to
reflect binary data.
When binary data represents digit 1, the amplitude is held; otherwise it is set to 0.
Both frequency and phase remain same as in the original carrier signal.
Frequency Shift Keying
In this conversion technique, the frequency of the analog carrier signal is modified
to reflect binary data.
40
Data Communication and Computer Networks Unit – 9
This technique uses two frequencies, f1 and f2. One of them, for example f1, is
chosen to represent binary digit 1 and the other one is used to represent binary
digit 0. Both amplitude and phase of the carrier wave are kept intact.
Phase Shift Keying
In this conversion scheme, the phase of the original carrier signal is altered to
reflect the binary data.
When a new binary symbol is encountered, the phase of the signal is altered.
Amplitude and frequency of the original carrier signal is kept intact.
Quadrature Phase Shift Keying
41
Data Communication and Computer Networks Unit – 9
QPSK alters the phase to reflect two binary digits at once. This is done in two
different phases. The main stream of binary data is divided equally into two sub-
streams. The serial data is converted in to parallel in both sub-streams and then
each stream is converted to digital signal using NRZ technique. Later, both the
digital signals are merged together.
Analog-to-Analog Conversion
Analog signals are modified to represent analog data. This conversion is also
known as Analog Modulation. Analog modulation is required when bandpass is
used. Analog to analog conversion can be done in three ways:
Amplitude Modulation
In this modulation, the amplitude of the carrier signal is modified to reflect the
analog data.
42
Data Communication and Computer Networks Unit – 9
43
Data Communication and Computer Networks Unit – 9
The amplitude and phase of the carrier signal are not altered.
Phase Modulation
In the modulation technique, the phase of carrier signal is modulated in order to
reflect the change in voltage (amplitude) of analog data signal.
44
Data Communication and Computer Networks Unit – 9
45
Data Communication and Computer Networks Unit – 9
The common types of line encoding are Unipolar, Polar, Bipolar, and Manchester.
Encoding Techniques
The data encoding technique is divided into the following types, depending upon
the type of data conversion.
Analog data to Analog signals − The modulation techniques such as
Amplitude Modulation, Frequency Modulation and Phase Modulation of
analog signals, fall under this category.
Analog data to Digital signals − This process can be termed as digitization,
which is done by Pulse Code Modulation PCMPCM. Hence, it is nothing but
digital modulation. As we have already discussed, sampling and
quantization are the important factors in this. Delta Modulation gives a
better output than PCM.
Digital data to Analog signals − The modulation techniques such as
Amplitude Shift Keying ASKASK, Frequency Shift Keying FSKFSK, Phase Shift
Keying PSKPSK, etc., fall under this category. These will be discussed in
subsequent chapters.
Digital data to Digital signals − These are in this section. There are several
ways to map digital data to digital signals. Some of them are −
Non Return to Zero NRZNRZ
NRZ Codes has 1 for High voltage level and 0 for Low voltage level. The main
behavior of NRZ codes is that the voltage level remains constant during bit
interval. The end or start of a bit will not be indicated and it will maintain the
same voltage state, if the value of the previous bit and the value of the present bit
are same.
The following figure explains the concept of NRZ coding.
46
Data Communication and Computer Networks Unit – 9
47
Data Communication and Computer Networks Unit – 9
modulation rate is also doubled. The clock is taken from the signal itself. The
bandwidth required for this coding is greater.
There are two types of Bi-phase Encoding.
Bi-phase Manchester
Differential Manchester
Bi-phase Manchester
In this type of coding, the transition is done at the middle of the bit-interval. The
transition for the resultant pulse is from High to Low in the middle of the interval,
for the input bit 1. While the transition is from Low to High for the input bit 0.
Differential Manchester
In this type of coding, there always occurs a transition in the middle of the bit
interval. If there occurs a transition at the beginning of the bit interval, then the
input bit is 0. If no transition occurs at the beginning of the bit interval, then the
input bit is 1.
The following figure illustrates the waveforms of NRZ-L, NRZ-I, Bi-phase
Manchester and Differential Manchester coding for different digital inputs.
48
Data Communication and Computer Networks Unit – 9
Block Coding
Among the types of block coding, the famous ones are 4B/5B encoding and 8B/6T
encoding. The number of bits are processed in different manners, in both of these
processes.
4B/5B Encoding
In Manchester encoding, to send the data, the clocks with double speed is
required rather than NRZ coding. Here, as the name implies, 4 bits of code is
mapped with 5 bits, with a minimum number of 1 bits in the group.
The clock synchronization problem in NRZ-I encoding is avoided by assigning an
equivalent word of 5 bits in the place of each block of 4 consecutive bits. These 5-
bit words are predetermined in a dictionary.
The basic idea of selecting a 5-bit code is that, it should have one leading 0 and it
should have no more than two trailing 0s. Hence, these words are chosen such
that two transactions take place per block of bits.
8B/6T Encoding
We have used two voltage levels to send a single bit over a single signal. But if we
use more than 3 voltage levels, we can send more bits per signal.
For example, if 6 voltage levels are used to represent 8 bits on a single signal, then
such encoding is termed as 8B/6T encoding. Hence in this method, we have as
many as 729 3636 combinations for signal and 256 2828 combinations for bits.
These are the techniques mostly used for converting digital data into digital
signals by compressing or coding them for reliable transmission of data.
Modulation Techniques
49
Data Communication and Computer Networks Unit – 9
50
Data Communication and Computer Networks Unit – 9
Communication System
A transmitter is a group of electronic circuits designed to convert the information
into a signal for transmission over a given communication medium.
A receiver is a group of electronic circuits designed to convert the signal back to
the original information.
The communication channel is the medium which is designed to transmit the
electronic signal from one place to another.
What is Modulation?
Modulation is nothing but, a carrier signal that varies in accordance with the
message signal. Modulation technique is used to change the signal characteristics.
Basically, the modulation is of following two types:
Modulation Techniques
51
Data Communication and Computer Networks Unit – 9
Analog Modulation
Digital Modulation
Analog Modulation
In analog modulation, analog signal (sinusoidal signal) is used as a carrier signal
that modulates the message signal or data signal. The general function Sinusoidal
wave’s is shown in the figure below, in which, three parameters can be altered to
get modulation – they are amplitude, frequency and phase; so, the types of
analog modulation are:
Analog Modulation
Amplitude Modulation (AM)
Frequency Modulation (FM)
Phase Modulation (PM)
Amplitude Modulation
Amplitude modulation was developed in the beginning of the 20th century. It was
the earliest modulation technique used to transmit voice by radio. This type of
modulation technique is used in electronic communication. In this modulation,
the amplitude of the carrier signal varies in accordance with the message signal,
and other factors like phase and frequency remain constant.
The modulated signal is shown in the below figure, and its spectrum consists of
the lower frequency band, upper frequency band and carrier frequency
components. This type of modulation requires more power and greater
52
Data Communication and Computer Networks Unit – 9
53
Data Communication and Computer Networks Unit – 9
54
Data Communication and Computer Networks Unit – 9
Digital Modulation
The carrier wave is switched on and off to create pulses such that the signal is
modulated. Similar to the analog, in this system, the type of the digital
modulation is decided by the variation of the carrier wave parameters like
amplitude, phase and frequency.
The most important digital modulation techniques are based on keying such as
Amplitude Shift Keying, Frequency Shift Keying, Phase Shift Keying, Differential
Phase Shift Keying, Quadrature Phase Shift Keying, Minimum Shift Keying,
Gaussian Minimum Shift Keying, Orthogonal Frequency Division Multiplexing, etc.,
as shown in the figure.
In an Amplitude shift keying, the amplitude of the carrier wave changes based on
the message signal or on the base-band signal, which is in digital format. It is
sensitive to noise and used for low-band requirements.
In frequency shift keying, the frequency of the carrier wave is varied for each
symbol in the digital data. It needs larger bandwidths as shown in the figure.
Similarly, the phase shift keying changes the phase of the carrier for each symbol
and it is less sensitive to noise.
55
Data Communication and Computer Networks Unit – 9
56
Data Communication and Computer Networks Unit – 9
If there are multiple signals to share one medium, then the medium
must be divided in such a way that each signal is given some portion of
the available bandwidth. For example: If there are 10 signals and
bandwidth of medium is100 units, then the 10 unit is shared by each
signal.
When multiple signals share the common medium, there is a possibility
of collision. Multiplexing concept is used to avoid such collision.
Transmission services are very expensive.
History of Multiplexing
Multiplexing technique is widely used in telecommunications in which
several telephone calls are carried through a single wire.
Multiplexing originated in telegraphy in the early 1870s and is now
widely used in communication.
George Owen Squier developed the telephone carrier multiplexing in
1910.
Concept of Multiplexing
The 'n' input lines are transmitted through a multiplexer and multiplexer
combines the signals to form a composite signal.
The composite signal is passed through a Demultiplexer and
demultiplexer separates a signal to component signals and transfers
them to their respective destinations.
Advantages of Multiplexing:
More than one signal can be sent over a single medium.
The bandwidth of a medium can be utilized effectively.
Multiplexing Techniques
57
Data Communication and Computer Networks Unit – 9
58
Data Communication and Computer Networks Unit – 9
The carriers which are used for modulating the signals are known
as sub-carriers. They are represented as f1,f2..fn.
FDM is mainly used in radio broadcasts and TV networks.
Advantages Of FDM:
FDM is used for analog signals.
FDM process is very simple and easy modulation.
A Large number of signals can be sent through an FDM simultaneously.
It does not require any synchronization between sender and receiver.
Disadvantages Of FDM:
FDM technique is used only when low-speed channels are required.
It suffers the problem of crosstalk.
A Large number of modulators are required.
It requires a high bandwidth channel.
Applications Of FDM:
FDM is commonly used in TV networks.
It is used in FM and AM broadcasting. Each FM radio station has
different frequencies, and they are multiplexed to form a composite
signal. The multiplexed signal is transmitted in the air.
Wavelength Division Multiplexing (WDM)
59
Data Communication and Computer Networks Unit – 9
60
Data Communication and Computer Networks Unit – 9
61
Data Communication and Computer Networks Unit – 9
In the above figure, the Synchronous TDM technique is implemented. Each device
is allocated with some time slot. The time slots are transmitted irrespective of
whether the sender has data to send or not.
Disadvantages Of Synchronous TDM:
o The capacity of the channel is not fully utilized as the empty slots are also
transmitted which is having no data. In the above figure, the first frame is
completely filled, but in the last two frames, some slots are empty.
Therefore, we can say that the capacity of the channel is not utilized
efficiently.
62
Data Communication and Computer Networks Unit – 9
o The speed of the transmission medium should be greater than the total
speed of the input lines. An alternative approach to the Synchronous TDM
is Asynchronous Time Division Multiplexing.
Asynchronous TDM
An asynchronous TDM is also known as Statistical TDM.
An asynchronous TDM is a technique in which time slots are not fixed as in
the case of Synchronous TDM. Time slots are allocated to only those
devices which have the data to send. Therefore, we can say that
Asynchronous Time Division multiplexor transmits only the data from active
workstations.
An asynchronous TDM technique dynamically allocates the time slots to the
devices.
In Asynchronous TDM, total speed of the input lines can be greater than
the capacity of the channel.
Asynchronous Time Division multiplexor accepts the incoming data streams
and creates a frame that contains only data with no empty slots.
In Asynchronous TDM, each slot contains an address part that identifies the
source of the data.
63
Data Communication and Computer Networks Unit – 9
In the above diagram, there are 4 devices, but only two devices are sending the
data, i.e., A and C. Therefore, the data of A and C are only transmitted through
the transmission line.
Frame of above diagram can be represented as:
The above figure shows that the data part contains the address to determine the
source of the data.
What is Transmission media?
o Transmission media is a communication channel that carries the
information from the sender to the receiver. Data is transmitted through
the electromagnetic signals.
o The main functionality of the transmission media is to carry the information
in the form of bits through LAN(Local Area Network).
64
Data Communication and Computer Networks Unit – 9
65
Data Communication and Computer Networks Unit – 9
o Attenuation: Attenuation means the loss of energy, i.e., the strength of the
signal decreases with increasing the distance which causes the loss of
energy.
o Distortion: Distortion occurs when there is a change in the shape of the
signal. This type of distortion is examined from different signals having
different frequencies. Each frequency component has its own propagation
speed, so they reach at a different time which leads to the delay distortion.
o Noise: When data is travelled over a transmission medium, some unwanted
signal is added to it which creates the noise.
Classification Of Transmission Media:
66
Data Communication and Computer Networks Unit – 9
Guided Media
It is defined as the physical medium through which the signals are transmitted. It
is also known as Bounded media.
Types Of Guided media:
Twisted pair:
Twisted pair is a physical media made up of a pair of cables twisted with each
other. A twisted pair cable is cheap as compared to other transmission media.
Installation of the twisted pair cable is easy, and it is a lightweight cable. The
frequency range for twisted pair cable is from 0 to 3.5KHz.
A twisted pair consists of two insulated copper wires arranged in a regular spiral
pattern.
The degree of reduction in noise interference is determined by the number of
turns per foot. Increasing the number of turns per foot decreases noise
interference.
67
Data Communication and Computer Networks Unit – 9
68
Data Communication and Computer Networks Unit – 9
69
Data Communication and Computer Networks Unit – 9
70
Data Communication and Computer Networks Unit – 9
Faster speed: Fibre optic cable carries the data in the form of light. This
allows the fibre optic cable to carry the signals at a higher speed.
Longer distances: The fibre optic cable carries the data at a longer
distance as compared to copper cable.
Better reliability: The fibre optic cable is more reliable than the copper
cable as it is immune to any temperature changes while it can cause
obstruct in the connectivity of copper cable.
Thinner and Sturdier: Fibre optic cable is thinner and lighter in weight
so it can withstand more pull pressure than copper cable.
UnGuided Transmission
An unguided transmission transmits the electromagnetic waves without
using any physical medium. Therefore it is also known as wireless
transmission.
In unguided media, air is the media through which the electromagnetic
energy can flow easily.
Unguided transmission is broadly classified into three categories:
Radio waves
Radio waves are the electromagnetic waves that are transmitted in all
the directions of free space.
Radio waves are omnidirectional, i.e., the signals are propagated in all
the directions.
The range in frequencies of radio waves is from 3Khz to 1 khz.
In the case of radio waves, the sending and receiving antenna are not
aligned, i.e., the wave sent by the sending antenna can be received by
any receiving antenna.
An example of the radio wave is FM radio.
71
Data Communication and Computer Networks Unit – 9
72
Data Communication and Computer Networks Unit – 9
73
Data Communication and Computer Networks Unit – 9
74
Data Communication and Computer Networks Unit – 9
75
Data Communication and Computer Networks Unit – 9
The baseband and broadband are the types of signalling techniques. These
terminologies were developed to categorise different types of signals depending
on particular kind of signal formats or modulation technique.
The prior difference between baseband transmission and broadband transmission
is that in the baseband transmission the whole bandwidth of the cable is utilized
by a single signal. Conversely, in the broadband transmission, multiple signals are
sent on multiple frequencies simultaneously using a single channel.
Comparison Chart
used
Application Work well with bus Used with a bus as well as tree
topology. topology.
Differential Manchester
encoding.
76
Data Communication and Computer Networks Unit – 9
attenuated.
Broadband
Broadband system use modulation techniques to reduce the effect of noise in the
environment. Broadband transmission employs multiple channel unidirectional
transmission using combination of phase and amplitude modulation.
The Broadband transmission employs analog signals which include optical or
electromagnetic wave form of signal. The signals are sent into multiple
frequencies permitting multiple signals to be sent simultaneously. Frequency
division multiplexing is possible in which the frequency spectrum is divided into
multiple sections of bandwidth. The distinct channels can support different types
of signals of varying frequency ranges to travel simultaneously (at the same
instance).
The signals propagated at any point are unidirectional in nature, in simple words
the signal can be travelled at only one direction, unlike baseband transmission. It
requires two data path that are connected at a point in the network refer to as
headend. The first path is used for signal transmission from the station to the
headend. And the other path is used for receiving propagated signals.
77
Data Communication and Computer Networks Unit – 9
Baseband
Baseband is a digital signal is transmitted on the medium using one of the signal
codes like NRZ, RZ Manchester biphase-M code etc. is called baseband
transmission.
Baseband transmission uses whole frequency spectrum of the medium for the
transmission. That is the reason frequency division multiplexing cannot be used in
the transmission but time division multiplexing is used in this transmission as in
TDM the link is not divided into multiple channels instead it provides each input
signal with a time slot, in which the signal utilize whole bandwidth for a given
time slot. The signals are carried by wires in the form of electrical pulse.
Signals transmitted at point propagated in both the directions hence it is
bidirectional. The expansion of baseband signal is limited to shorter distances
because at high frequency the attenuation of the signal is most strong and the
pulse blur out, causing the large distance communication completely impractical.
These are following differences between Broadband and Baseband transmission.
Baseband transmission –
1. Digital signalling.
2. Frequency division multiplexing is not pssible.
3. Baseband is bi-directional transmission.
4. Short distance signal travelling.
5. Entire bandwidth is for single signal transmission.
6. Example: Ethernet is using Basebands for LAN.
Broadband transmission –
1. Analog signalling.
2. Transmission of data is unidirectional.
3. Signal travelling distance is long.
4. Frequency division multiplexing possible.
78
Data Communication and Computer Networks Unit – 9
79
Data Communication and Computer Networks Unit – 9
80
Data Communication and Computer Networks Unit – 9
The sender while creating a frame counts the number of 1s in it. For example, if
even parity is used and number of 1s is even then one bit with value 0 is added.
This way number of 1s remains even.If the number of 1s is odd, to make it even a
bit with value 1 is added.
The receiver simply counts the number of 1s in a frame. If the count of 1s is even
and even parity is used, the frame is considered to be not-corrupted and is
accepted. If the count of 1s is odd and odd parity is used, the frame is still not
corrupted.
If a single bit flips in transit, the receiver can detect it by counting the number of
1s. But when more than one bits are erro neous, then it is very hard for the
receiver to detect the error.
Cyclic Redundancy Check (CRC)
CRC is a different approach to detect if the received frame contains valid data.
This technique involves binary division of the data bits being sent. The divisor is
generated using polynomials. The sender performs a division operation on the
bits being sent and calculates the remainder. Before sending the actual bits, the
sender adds the remainder at the end of the actual bits. Actual data bits plus the
remainder is called a codeword. The sender transmits data bits as codewords.
81
Data Communication and Computer Networks Unit – 9
At the other end, the receiver performs division operation on codewords using
the same CRC divisor. If the remainder contains all zeros the data bits are
accepted, otherwise it is considered as there some data corruption occurred in
transit.
Error Correction
In the digital world, error correction can be done in two ways:
Backward Error Correction When the receiver detects an error in the data
received, it requests back the sender to retransmit the data unit.
Feedback or (backward) error control Along with each character, little additional
information is added only for error detection. The receiver performs no error
correction. If the received data contains error, then the entire data is
retransmitted. Hence, the feedback techniques perform error detection and
retransmission.
Forward Error Correction When the receiver detects some error in the data
received, it executes error-correcting code, which helps it to auto-recover and to
correct some kinds of errors.
82
Data Communication and Computer Networks Unit – 9
Computer Network
A computer network is a set of devices connected through links. A node can be
computer, printer, or any other device capable of sending or receiving the data.
The links connecting the nodes are known as communication channels.
Computer Network is a group of computers connected with each other
through wires, optical fibres or optical links so that various devices can
interact with each other through a network.
The aim of the computer network is the sharing of resources among various
devices.
In the case of computer network technology, there are several types of
networks that vary from simple to complex level.
Computer Network uses distributed processing in which task is divided among
several computers. Instead, a single computer handles an entire task, each
separate computer handles a subset.
83
Data Communication and Computer Networks Unit – 9
84
Data Communication and Computer Networks Unit – 9
Wireless NIC: All the modern laptops use the wireless NIC. In Wireless NIC,
a connection is made using the antenna that employs the radio wave
technology.
Wired NIC: Cables use the wired NIC to transfer the data over the medium.
Hub
Hub is a central device that splits the network connection into multiple devices.
When computer requests for information from a computer, it sends the request
to the Hub. Hub distributes this request to all the interconnected computers.
Switches
Switch is a networking device that groups all the devices over the network to
transfer the data to another device. A switch is better than Hub as it does not
broadcast the message over the network, i.e., it sends the message to the device
for which it belongs to. Therefore, we can say that switch sends the message
directly from source to the destination.
Cables and connectors
Cable is a transmission media that transmits the communication signals. There
are three types of cables:
Twisted pair cable: It is a high-speed cable that transmits the data
over 1Gbps or more.
Coaxial cable: Coaxial cable resembles like a TV installation cable. Coaxial
cable is more expensive than twisted pair cable, but it provides the high
data transmission speed.
Fibre optic cable: Fibre optic cable is a high-speed cable that transmits the
data using light beams. It provides high data transmission speed as
compared to other cables. It is more expensive as compared to other
cables, so it is installed at the government level.
Router
Router is a device that connects the LAN to the internet. The router is mainly used
to connect the distinct networks or connect the internet to multiple computers.
Modem
85
Data Communication and Computer Networks Unit – 9
Modem connects the computer to the internet over the existing telephone line. A
modem is not integrated with the computer motherboard. A modem is a separate
part on the PC slot found on the motherboard.
Uses Of Computer Network
Resource sharing: Resource sharing is the sharing of resources such as
programs, printers, and data among the users on the network without the
requirement of the physical location of the resource and user.
Server-Client model: Computer networking is used in the server-client
model. A server is a central computer used to store the information and
maintained by the system administrator. Clients are the machines used to
access the information stored in the server remotely.
Communication medium: Computer network behaves as a communication
medium among the users. For example, a company contains more than one
computer has an email system which the employees use for daily
communication.
E-commerce: Computer network is also important in businesses. We can do
the business over the internet. For example, amazon.com is doing their
business over the internet, i.e., they are doing their business over the
internet.
Topology
Topology defines the structure of the network of how all the components are
interconnected to each other. There are two types of topology: physical and
logical topology.
Physical topology is the geometric representation of all the nodes in a network.
86
Data Communication and Computer Networks Unit – 9
Bus Topology
The bus topology is designed in such a way that all the stations are
connected through a single cable known as a backbone cable.
Each node is either connected to the backbone cable by drop cable or
directly connected to the backbone cable.
When a node wants to send a message over the network, it puts a message
over the network. All the stations available in the network will receive the
message whether it has been addressed or not.
The bus topology is mainly used in 802.3 (ethernet) and 802.4 standard
networks.
The configuration of a bus topology is quite simpler as compared to other
topologies.
The backbone cable is considered as a "single lane" through which the
message is broadcast to all the stations.
87
Data Communication and Computer Networks Unit – 9
The most common access method of the bus topologies is CSMA (Carrier
Sense Multiple Access).
CSMA: It is a media access control used to control the data flow so that data
integrity is maintained, i.e., the packets do not get lost. There are two alternative
ways of handling the problems that occur when two nodes send the messages
simultaneously.
o CSMA CD: CSMA CD (Collision detection) is an access method used to
detect the collision. Once the collision is detected, the sender will stop
transmitting the data. Therefore, it works on "recovery after the collision".
o CSMA CA: CSMA CA (Collision Avoidance) is an access method used to
avoid the collision by checking whether the transmission media is busy or
not. If busy, then the sender waits until the media becomes idle. This
technique effectively reduces the possibility of the collision. It does not
work on "recovery after the collision".
Advantages of Bus topology:
o Low-cost cable: In bus topology, nodes are directly connected to the cable
without passing through a hub. Therefore, the initial cost of installation is
low.
o Moderate data speeds: Coaxial or twisted pair cables are mainly used in
bus-based networks that support upto 10 Mbps.
o Familiar technology: Bus topology is a familiar technology as the
installation and troubleshooting techniques are well known, and hardware
components are easily available.
o Limited failure: A failure in one node will not have any effect on other
nodes.
Disadvantages of Bus topology:
o Extensive cabling: A bus topology is quite simpler, but still it requires a lot
of cabling.
88
Data Communication and Computer Networks Unit – 9
89
Data Communication and Computer Networks Unit – 9
o The most common access method of the ring topology is token passing.
o Token passing: It is a network access method in which token is
passed from one node to another node.
o Token: It is a frame that circulates around the network.
Working of Token passing
o A token moves around the network, and it is passed from computer to
computer until it reaches the destination.
o The sender modifies the token by putting the address along with the data.
o The data is passed from one device to another device until the destination
address matches. Once the token received by the destination device, then
it sends the acknowledgment to the sender.
o In a ring topology, a token is used as a carrier.
Advantages of Ring topology:
o Network Management: Faulty devices can be removed from the network
without bringing the network down.
o Product availability: Many hardware and software tools for network
operation and monitoring are available.
o Cost: Twisted pair cabling is inexpensive and easily available. Therefore, the
installation cost is very low.
o Reliable: It is a more reliable network because the communication system
is not dependent on the single host computer.
Disadvantages of Ring topology:
o Difficult troubleshooting: It requires specialized test equipment to
determine the cable faults. If any fault occurs in the cable, then it would
disrupt the communication for all the nodes.
o Failure: The breakdown in one station leads to the failure of the overall
network.
90
Data Communication and Computer Networks Unit – 9
91
Data Communication and Computer Networks Unit – 9
92
Data Communication and Computer Networks Unit – 9
93
Data Communication and Computer Networks Unit – 9
94
Data Communication and Computer Networks Unit – 9
Full Mesh Topology: In a full mesh topology, each computer is connected
to all the computers available in the network.
Partial Mesh Topology: In a partial mesh topology, not all but certain
computers are connected to those computers with which they
communicate frequently.
Advantages of Mesh topology:
Reliable: The mesh topology networks are very reliable as if any link breakdown
will not affect the communication between connected computers.
Fast Communication: Communication is very fast between the nodes.
Easier Reconfiguration: Adding new devices would not disrupt the
communication between other devices.
Disadvantages of Mesh topology
Cost: A mesh topology contains a large number of connected devices
such as a router and more transmission media than other topologies.
Management: Mesh topology networks are very large and very difficult
to maintain and manage. If the network is not monitored carefully, then
the communication link failure goes undetected.
Efficiency: In this topology, redundant connections are high that reduces
the efficiency of the network.
Hybrid Topology
95
Data Communication and Computer Networks Unit – 9
96
Data Communication and Computer Networks Unit – 9
97
Data Communication and Computer Networks Unit – 9
98
Data Communication and Computer Networks Unit – 9
A Local Area Network (LAN) is a group of computer and peripheral devices which
are connected in a limited area such as school, laboratory, home, and office
building. It is a widely useful network for sharing resources like files, printers,
games, and other application. The simplest type of LAN network is to connect
computers and a printer in someone's home or office. In general, LAN will be used
as one type of transmission medium.
It is a network which consists of less than 5000 interconnected devices across
several buildings.
Characteristics of LAN
Here are important characteristics of a LAN network:
It is a private network, so an outside regulatory body never controls it.
LAN operates at a relatively higher speed compared to other WAN systems.
There are various kinds of media access control methods like token ring and
ethernet.
99
Data Communication and Computer Networks Unit – 9
Advantages of LAN
Here are pros/benefits of using LAN:
Computer resources like hard-disks, DVD-ROM, and printers can share local
area networks. This significantly reduces the cost of hardware purchases.
You can use the same software over the network instead of purchasing the
licensed software for each client in the network.
Data of all network users can be stored on a single hard disk of the server
computer.
You can easily transfer data and messages over networked computers.
It will be easy to manage data at only one place, which makes data more
secure.
Local Area Network offers the facility to share a single internet connection
among all the LAN users.
Disadvantages of LAN
Here are the important cons/ drawbacks of LAN:
LAN will indeed save cost because of shared computer resources, but the
initial cost of installing Local Area Networks is quite high.
The LAN admin can check personal data files of every LAN user, so it does
not offer good privacy.
Unauthorized users can access critical data of an organization in case LAN
admin is not able to secure centralized data repository.
Local Area Network requires a constant LAN administration as there are
issues related to software setup and hardware failures
WAN(Wide Area Network)
100
Data Communication and Computer Networks Unit – 9
WAN (Wide Area Network) is another important computer network that which is
spread across a large geographical area. WAN network system could be a
connection of a LAN which connects with other LAN's using telephone lines and
radio waves. It is mostly limited to an enterprise or an organization.
Characteristics of LAN:
The software files will be shared among all the users; therefore, all can
access to the latest files.
101
Data Communication and Computer Networks Unit – 9
Any organization can form its global integrated network using WAN.
Advantages of WAN
Here are the benefits/ pros of using WAN:
WAN helps you to cover a larger geographical area. Therefore business
offices situated at longer distances can easily communicate.
Contains devices like mobile phones, laptop, tablet, computers, gaming
consoles, etc.
WLAN connections work using radio transmitters and receivers built into
client devices.
Disadvantage of WAN
Here are drawbacks/cons of using WAN:
The initial setup cost of investment is very high.
It is difficult to maintain the WAN network. You need skilled technicians
and network administrators.
There are more errors and issues because of the wide coverage and the use
of different technologies.
It requires more time to resolve issues because of the involvement of
multiple wired and wireless technologies.
Offers lower security compared to other types of networks.
MAN(Metropolitan Area Network)
102
Data Communication and Computer Networks Unit – 9
The dual bus in MAN network provides support to transmit data in both
directions concurrently.
A MAN network mostly includes some areas of a city or an entire city.
Disadvantages of MAN
Here are drawbacks/ cons of using the MAN network:
You need more cable to establish MAN connection from one place to
another.
In MAN network it is tough to make the system secure from hackers
Other Types of Networks
Apart from above mentioned here, are some other important types of networks:
WLAN (Wireless Local Area Network)
Storage Area Network
System Area Network
Home Area Network
POLAN- Passive Optical LAN
Enterprise private network
Campus Area Network
Virtual Area Network
1) WLAN
WLAN (Wireless Local Area Network) helps you to link single or multiple devices
using wireless communication within a limited area like home, school, or office
building. It gives users an ability to move around within a local coverage area
which may be connected to the network. Today most modern day's WLAN
systems are based on IEEE 802.11 standards.
2) Storage-Area Network (SAN)
104
Data Communication and Computer Networks Unit – 9
105
Data Communication and Computer Networks Unit – 9
106
Data Communication and Computer Networks Unit – 9
o Each lower layer adds its services to the higher layer to provide a full set of
services to manage communications and run the applications.
o It provides modularity and clear interfaces, i.e., provides interaction
between subsystems.
o It ensures the independence between layers by providing the services from
lower to higher layer without defining how the services are implemented.
Therefore, any modification in a layer will not affect the other layers.
o The number of layers, functions, contents of each layer will vary from
network to network. However, the purpose of each layer is to provide the
service from lower to a higher layer and hiding the details from the layers
of how the services are implemented.
o The basic elements of layered architecture are services, protocols, and
interfaces.
o Service: It is a set of actions that a layer provides to the higher layer.
o Protocol: It defines a set of rules that a layer uses to exchange the
information with peer entity. These rules mainly concern about both
the contents and order of the messages used.
o Interface: It is a way through which the message is transferred from
one layer to another layer.
o In a layer n architecture, layer n on one machine will have a communication
with the layer n on another machine and the rules used in a conversation
are known as a layer-n protocol.
An example of the five-layered architecture.
107
Data Communication and Computer Networks Unit – 9
108
Data Communication and Computer Networks Unit – 9
small and manageable tasks. In short, we can say that this approach
reduces the complexity of the design.
o Modularity: Layered architecture is more modular. Modularity provides the
independence of layers, which is easier to understand and implement.
o Easy to modify: It ensures the independence of layers so that
implementation in one layer can be changed without affecting other layers.
o Easy to test: Each layer of the layered architecture can be analyzed and
tested individually.
For data communication to take place and two or more users can
transmit data from one to other, a systematic approach is required. This
approach enables users to communicate and transmit data through
efficient and ordered path. It is implemented using models in computer
networks and are known as computer network models.
Computer network models are responsible for establishing a connection
among the sender and receiver and transmitting the data in a smooth
manner respectively.
There are two computer network models i.e. OSI Model and TCP/IP
Model on which the whole data communication process relies.
109
Data Communication and Computer Networks Unit – 9
o The OSI model is divided into two layers: upper layers and lower layers.
o The upper layer of the OSI model mainly deals with the application related
issues, and they are implemented only in the software. The application
layer is closest to the end user. Both the end user and the application layer
interact with the software applications. An upper layer refers to the layer
just above another layer.
110
Data Communication and Computer Networks Unit – 9
o The lower layer of the OSI model deals with the data transport issues. The
data link layer and the physical layer are implemented in hardware and
software. The physical layer is the lowest layer of the OSI model and is
closest to the physical medium. The physical layer is mainly responsible for
placing the information on the physical medium.
Functions of the OSI Layers
There are the seven OSI layers. Each layer has different functions. A list of seven
layers are given below:
1. Physical Layer
2. Data-Link Layer
3. Network Layer
4. Transport Layer
5. Session Layer
6. Presentation Layer
7. Application Layer
111
Data Communication and Computer Networks Unit – 9
Physical layer
o The main functionality of the physical layer is to transmit the individual bits
from one node to another node.
o It is the lowest layer of the OSI model.
o It establishes, maintains and deactivates the physical connection.
o It specifies the mechanical, electrical and procedural network interface
specifications.
Functions of a Physical layer:
o Line Configuration: It defines the way how two or more devices can be
connected physically.
o Data Transmission: It defines the transmission mode whether it is simplex,
half-duplex or full-duplex mode between the two devices on the network.
o Topology: It defines the way how network devices are arranged.
o Signals: It determines the type of the signal used for transmitting the
information.
Data-Link Layer
112
Data Communication and Computer Networks Unit – 9
113
Data Communication and Computer Networks Unit – 9
o Physical Addressing: The Data link layer adds a header to the frame that
contains a destination address. The frame is transmitted to the destination
address mentioned in the header.
o Flow Control: Flow control is the main functionality of the Data-link layer. It
is the technique through which the constant data rate is maintained on
both the sides so that no data get corrupted. It ensures that the
transmitting station such as a server with higher processing speed does not
exceed the receiving station, with lower processing speed.
o Error Control: Error control is achieved by adding a calculated value CRC
(Cyclic Redundancy Check) that is placed to the Data link layer's trailer
which is added to the message frame before it is sent to the physical layer.
If any error seems to occurr, then the receiver sends the acknowledgment
for the retransmission of the corrupted frames.
o Access Control: When two or more devices are connected to the same
communication channel, then the data link layer protocols are used to
determine which device has control over the link at a given time.
Network Layer
114
Data Communication and Computer Networks Unit – 9
115
Data Communication and Computer Networks Unit – 9
116
Data Communication and Computer Networks Unit – 9
117
Data Communication and Computer Networks Unit – 9
o Dialog control: Session layer acts as a dialog controller that creates a dialog
between two processes or we can say that it allows the communication
between two processes which can be either half-duplex or full-duplex.
o Synchronization: Session layer adds some checkpoints when transmitting
the data in a sequence. If some error occurs in the middle of the
transmission of data, then the transmission will take place again from the
checkpoint. This process is known as Synchronization and recovery.
Presentation Layer
121
Data Communication and Computer Networks Unit – 9
The following are the OSI protocols used in the seven layers of the OSI Model:
Layer 1, the Physical Layer
This layer deals with the hardware of networks such as cabling. It defines the
mechanical and electrical standards of interface devices and the types of cables
used to transmit digital signals (e.g. optical fiber, coaxial cable, wireless, etc.).
The major protocols used by this layer include Bluetooth, PON, OTN,
DSL, IEEE.802.11, IEEE.802.3, L431 and TIA 449.
Layer 2, the Data Link Layer
This layer receives data from the physical layer and compiles it into a transform
form called framing or frame. The principal purpose of this layer is to detect
transfer errors by adding headers to data packets.
The protocols are used by the Data Link Layer include: ARP, CSLIP,
HDLC, IEEE.802.3, PPP, X-25, SLIP, ATM, SDLS and PLIP.
Layer 3, the Network Layer
This is the most important layer of the OSI model, which performs real time
processing and transfers data from nodes to nodes. Routers and switches are the
devices used for this layer that connects the notes in the network to transmit and
control data flow.
The network layer assists the following protocols: Internet Protocol (IPv4),
Internet Protocol (IPv6), IPX, AppleTalk, ICMP, IPSec and IGMP.
Layer 4, the Transport Layer
The transport layer works on two determined communication modes: Connection
oriented and connectionless. This layer transmits data from source to destination
node.
It uses the most important protocols of OSI protocol family, which are:
Transmission Control Protocol (TCP), UDP, SPX, DCCP and SCTP.
Layer 5, the Session Layer
122
Data Communication and Computer Networks Unit – 9
The session layer creates a session between the source and the destination nodes
and terminates sessions on completion of the communication process.
The protocols used are: PPTP, SAP, L2TP and NetBIOS.
Layer 6, the Presentation Layer
The functions of encryption and decryption are defined on this layer. It ensures
that data is transferred in standardized formats by converting data formats into a
format readable by the application layer.
The following are the presentation layer protocols: XDR, TLS, SSL and MIME.
Layer 7, the Application Layer
This layer works at the user end to interact with user applications. QoS (quality of
service), file transfer and email are the major popular services of the application
layer.
This layer uses following protocols: HTTP, SMTP, DHCP, FTP, Telnet, SNMP and
SMPP.
TCP/IP model
o The TCP/IP model was developed prior to the OSI model.
o The TCP/IP model is not exactly similar to the OSI model.
o The TCP/IP model consists of five layers: the application layer, transport
layer, network layer, data link layer and physical layer.
o The first four layers provide physical standards, network interface,
internetworking, and transport functions that correspond to the first four
layers of the OSI model and these four layers are represented in TCP/IP
model by a single layer called the application layer.
o TCP/IP is a hierarchical protocol made up of interactive modules, and each
of them provides specific functionality.
Here, hierarchical means that each upper-layer protocol is supported by two or
more lower-level protocols.
Functions of TCP/IP layers:
123
Data Communication and Computer Networks Unit – 9
124
Data Communication and Computer Networks Unit – 9
125
Data Communication and Computer Networks Unit – 9
126
Data Communication and Computer Networks Unit – 9
Transport Layer
The transport layer is responsible for the reliability, flow control, and correction of
data which is being sent over the network.
The two protocols used in the transport layer are User Datagram protocol and
Transmission control protocol.
User Datagram Protocol (UDP)
o It provides connectionless service and end-to-end delivery of
transmission.
o It is an unreliable protocol as it discovers the errors but not specify
the error.
o User Datagram Protocol discovers the error, and ICMP protocol
reports the error to the sender that user datagram has been
damaged.
o UDP consists of the following fields:
Source port address: The source port address is the address of the
application program that has created the message.
Destination port address: The destination port address is the address
of the application program that receives the message.
Total length: It defines the total number of bytes of the user
datagram in bytes.
Checksum: The checksum is a 16-bit field used in error detection.
o UDP does not specify which packet is lost. UDP contains only
checksum; it does not contain any ID of a data segment.
127
Data Communication and Computer Networks Unit – 9
128
Data Communication and Computer Networks Unit – 9
129
Data Communication and Computer Networks Unit – 9
Four levels of addresses are used in an internet employing the TCP/IP protocols:
physical address, logical address, port address, and application-specific address.
Each address is related to a one layer in the TCP/IP architecture, as shown in the
following Figure.
Physical Addresses
The physical address, also known as the link address, is the address of a node as
defined by its LAN or WAN. It is included in the frame used by the data link layer.
It is the lowest-level address. The size and format of these addresses vary
depending on the network. For example, Ethernet uses a 6-byte (48-bit) physical
address that is imprinted on the network interface card (NIC).
Most local area networks use a 48-bit (6-byte) physical address written as 12
hexadecimal digits; every byte (2 hexadecimal digits) is separated by a colon, as
shown below.
Example (1)
In Figure below a node with physical address 10 sends a frame to a node with
physical address
130
Data Communication and Computer Networks Unit – 9
The two nodes are connected by a link (a LAN). At the data link layer, this frame
contains physical (link) addresses in the header. These are the only addresses
needed. The rest of the header contains other information needed at this level.
The trailer usually contains extra bits needed for error detection. The data link
layer at the sender receives data from an upper layer. It encapsulates the data in
a frame, adding a header and a trailer. The header, among other pieces of
information, carries the receiver and the sender physical (link) addresses.
Note that in most data link protocols, the destination address 87 in this case,
comes before the source address (10 in this case). The frame is propagated
through the LAN. Each station with a physical address other than 87 drops the
frame because the destination address in the frame does not match its own
physical address. The intended destination computer, however, finds a match
between the destination address in the frame and its own physical address. The
frame is checked, the header and trailer are dropped, and the data part is
decapsulated and delivered to the upper layer.
131
Data Communication and Computer Networks Unit – 9
132
Data Communication and Computer Networks Unit – 9
next hop before the packet can be delivered. The network layer consults its
routing table and finds the logical address of the next hop (router 1) to be F.
Another protocol, Address Resolution Protocol (ARP) finds the physical address of
router 1 that corresponds to its logical address (20). Now the network layer
passes this address to the data link layer, which in turn, encapsulates the packet
with physical destination address 20 and physical source address 10. The router
decapsulates the packet from the frame to read the logical destination address P.
Since the logical destination address does not match the router’s logical address,
the router knows that the packet needs to be forwarded. The router consults its
routing table and ARP to find the physical destination address of the next hop
(router 2), creates a new frame, encapsulates the packet, and sends it to router 2.
Note the physical addresses in the frame. The source physical address changes
from 10 to 99. The destination physical address changes from 20 (router 1
physical address) to 33 (router 2 physical address). The logical source and
destination addresses must remain the same; otherwise the packet will be lost. At
router 2 we have a similar scenario. The physical addresses are changed, and a
new frame is sent to the destination computer. When the frame reaches the
destination, the packet is decapsulated. The destination logical address P matches
the logical address of the computer. The data are decapsulated from the packet
and delivered to the upper layer. Note that although physical addresses will
change from hop to hop, logical addresses remain the same from the source to
destination.
133
Data Communication and Computer Networks Unit – 9
134
Data Communication and Computer Networks Unit – 9
The following Figure shows two computers communicating via the Internet. The
sending computer is running three processes at this time with port addresses a, b,
and c. The receiving computer is running two processes at this time with port
addresses j and k. Process a in the sending computer needs to communicate with
process j in the receiving computer. Note that although both computers are using
the same application, FTP, for example, the port addresses are different because
one is a client program and the other is a server program.
To show that data from process a need to be delivered to process j, and not k, the
transport layer encapsulates data from the application layer in a packet and adds
two port addresses (a and j), source and destination. The packet from the
transport layer is then encapsulated in another packet at the network layer with
logical source and destination addresses (A and P). Finally, this packet is
encapsulated in a frame with the physical source and destination addresses of the
next hop. We have not shown the physical addresses because they change from
hop to hop inside the cloud designated as the Internet. Note that although
physical addresses change from hop to hop, logical and port addresses remain the
same from the source to destination.
135
Data Communication and Computer Networks Unit – 9
In the TCP/IP protocol suite, the port numbers are integers between 0 and
65,535.
The client program defines itself with a port number, called the ephemeral
port number (chosen randomly). The word ephemeral means short lived.
The server process must also define itself with a port number (called well-
known port numbers). This port number, however, cannot be chosen
randomly.
ICANN Ranges (Internet Corporation for Assigned Names and Numbers)
ICANN has divided the port numbers into three ranges: well-known, registered,
and dynamic (or private)
Well-known ports: The ports ranging from 0 to 1,023 are assigned and
controlled by ICANN..
136
Data Communication and Computer Networks Unit – 9
Registered ports: The ports ranging from 1,024 to 49,151 are not assigned
or controlled by ICANN. They can only be registered with ICANN to prevent
duplication.
Dynamic ports: The ports ranging from 49,152 to 65,535 are neither
controlled nor registered. They can be used as temporary or private port
numbers. The original recommendation was that the ephemeral port
numbers for clients be chosen from this range. However, most systems do
not follow this recommendation.
Application-Specific Addresses
Some applications have user-friendly addresses that are designed for that specific
application. Examples include the e-mail address (for example,
[email protected]) and the Universal Resource Locator (URL) (for example,
www.mhhe.com). The first defines the recipient of an e-mail; the second is used
to find a document on the World Wide Web. These addresses, however, get
changed to the corresponding port and logical addresses by the sending
computer.
Switching
o When a user accesses the internet or another computer network outside
their immediate location, messages are sent through the network of
transmission media. This technique of transferring the information from
one computer network to another network is known as switching.
o Switching in a computer network is achieved by using switches. A switch is
a small hardware device which is used to join multiple computers together
with one local area network (LAN).
o Network switches operate at layer 2 (Data link layer) in the OSI model.
o Switching is transparent to the user and does not require any configuration
in the home network.
o Switches are used to forward the packets based on MAC addresses.
o A Switch is used to transfer the data only to the device that has been
addressed. It verifies the destination address to route the packet
appropriately.
137
Data Communication and Computer Networks Unit – 9
138
Data Communication and Computer Networks Unit – 9
o The layer 2 switches are used for transmitting the data on the data link
layer, and it also performs error checking on transmitted and received
frames.
o The layer 2 switches forward the packets with the help of MAC address.
o Different modes are used for forwarding the packets known as Switching
modes.
o In switching mode, Different parts of a frame are recognized. The frame
consists of several parts such as preamble, destination MAC address, source
MAC address, user's data, FCS.
139
Data Communication and Computer Networks Unit – 9
Store-and-forward
140
Data Communication and Computer Networks Unit – 9
141
Data Communication and Computer Networks Unit – 9
o This technique checks the 64 bytes of the ethernet frame where addressing
information is available.
o A collision is detected within 64 bytes of the frame, the frames which are
collided will not be forwarded further.
Differences b/w Store-and-forward and Cut-through Switching.
It has high latency rate as it waits for the It has low latency rate as it checks
entire frame to be received before only six bytes of the frame to
forwarding to the next node. determine the destination address.
It has a high wait time as it waits for the It has low wait time as cut-through
entire frame to be received before taking switches do not store the whole
any forwarding decisions. frame or packets.
Switching techniques
142
Data Communication and Computer Networks Unit – 9
In large networks, there can be multiple paths from sender to receiver. The
switching technique will decide the best route for data transmission.
Switching technique is used to connect the systems for making one-to-one
communication.
Classification Of Switching Techniques
Circuit Switching
o Circuit switching is a switching technique that establishes a dedicated path
between sender and receiver.
o In the Circuit Switching Technique, once the connection is established then
the dedicated path will remain to exist until the connection is terminated.
o Circuit switching in a network operates in a similar way as the telephone
works.
o A complete end-to-end path must exist before the communication takes
place.
o In case of circuit switching technique, when any user wants to send the
data, voice, video, a request signal is sent to the receiver then the receiver
sends back the acknowledgment to ensure the availability of the dedicated
143
Data Communication and Computer Networks Unit – 9
144
Data Communication and Computer Networks Unit – 9
145
Data Communication and Computer Networks Unit – 9
146
Data Communication and Computer Networks Unit – 9
147
Data Communication and Computer Networks Unit – 9
148
Data Communication and Computer Networks Unit – 9
o In the above diagram, A and B are the sender and receiver respectively. 1
and 2 are the nodes.
o Call request and call accept packets are used to establish a connection
between the sender and receiver.
o When a route is established, data will be transferred.
o After transmission of data, an acknowledgment signal is sent by the
receiver that the message has been received.
o If the user wants to terminate the connection, a clear signal is sent for the
termination.
Differences b/w Datagram approach and Virtual Circuit approach
Node takes routing decisions to Node does not take any routing decision.
forward the packets.
149
Data Communication and Computer Networks Unit – 9
Congestion cannot occur as all the Congestion can occur when the node is
packets travel in different busy, and it does not allow other packets to
directions. pass through.
150
Data Communication and Computer Networks Unit – 9
Parts of a Frame
A frame has the following parts −
Frame Header − It contains the source and the destination addresses of the
frame.
Payload field − It contains the message to be delivered.
Trailer − It contains the error detection and error correction bits.
Flag − It marks the beginning and end of the frame.
151
Data Communication and Computer Networks Unit – 9
Types of Framing
Framing can be of two types, fixed sized framing and variable sized framing.
Fixed-sized Framing
Here the size of the frame is fixed and so the frame length acts as delimiter of the
frame. Consequently, it does not require additional boundary bits to identify the
start and end of the frame.
Example − ATM cells.
Variable – Sized Framing
Here, the size of each frame to be transmitted may be different. So additional
mechanisms are kept to mark the end of one frame and the beginning of the next
frame.
It is used in local area networks.
Two ways to define frame delimiters in variable sized framing are −
Length Field − Here, a length field is used that determines the size of the
frame. It is used in Ethernet (IEEE 802.3).
End Delimiter − Here, a pattern is used as a delimiter to determine the size
of frame. It is used in Token Rings. If the pattern occurs in the message,
then two approaches are used to avoid the situation −
o Byte – Stuffing − A byte is stuffed in the message to differentiate
from the delimiter. This is also called character-oriented framing.
o Bit – Stuffing − A pattern of bits of arbitrary length is stuffed in the
message to differentiate from the delimiter. This is also called bit –
oriented framing.
152
Data Communication and Computer Networks Unit – 9
Error Detection
When data is transmitted from one device to another device, the system does not
guarantee whether the data received by the device is identical to the data
transmitted by another device. An Error is a situation when the message received
at the receiver end is not identical to the message transmitted.
Types Of Errors
In the above figure, the message which is sent is corrupted as single-bit, i.e., 0 bit
is changed to 1.
Single-Bit Error does not appear more likely in Serial Data Transmission. For
example, Sender sends the data at 10 Mbps, this means that the bit lasts only for
1 ?s and for a single-bit error to occurred, a noise must be more than 1 ?s.
153
Data Communication and Computer Networks Unit – 9
Single-Bit Error mainly occurs in Parallel Data Transmission. For example, if eight
wires are used to send the eight bits of a byte, if one of the wire is noisy, then
single-bit is corrupted per byte.
Burst Error:
The two or more bits are changed from 0 to 1 or from 1 to 0 is known as Burst
Error.
The Burst Error is determined from the first corrupted bit to the last corrupted
bit.
The duration of noise in Burst Error is more than the duration of noise in Single-
Bit.
Burst Errors are most likely to occurr in Serial Data Transmission.
The number of affected bits depends on the duration of the noise and data rate.
Error Detecting Techniques:
The most popular Error Detecting Techniques are:
o Single parity check
o Two-dimensional parity check
o Checksum
o Cyclic redundancy check
Single Parity Check
154
Data Communication and Computer Networks Unit – 9
155
Data Communication and Computer Networks Unit – 9
156
Data Communication and Computer Networks Unit – 9
Checksum
A Checksum is an error detection technique based on the concept of redundancy.
It is divided into two parts:
Checksum Generator
A Checksum is generated at the sending side. Checksum generator subdivides the
data into equal segments of n bits each, and all these segments are added
together by using one's complement arithmetic. The sum is complemented and
appended to the original data, known as checksum field. The extended data is
transmitted across the network.
Suppose L is the total sum of the data segments, then the checksum would be ?L
157
Data Communication and Computer Networks Unit – 9
If the resultant of this division is zero which means that it has no error, and the
data is accepted.
If the resultant of this division is not zero which means that the data consists of an
error. Therefore, the data is discarded.
159
Data Communication and Computer Networks Unit – 9
CRC Checker
o The functionality of the CRC checker is similar to the CRC generator.
o When the string 11100111 is received at the receiving end, then CRC
checker performs the modulo-2 division.
o A string is divided by the same divisor, i.e., 1001.
o In this case, CRC checker generates the remainder of zero. Therefore, the
data is accepted.
160
Data Communication and Computer Networks Unit – 9
Error Correction
Error Correction codes are used to detect and correct the errors when data is
transmitted from the sender to the receiver.
Error Correction can be handled in two ways:
o Backward error correction: Once the error is discovered, the receiver
requests the sender to retransmit the entire data unit.
o Forward error correction: In this case, the receiver uses the error-
correcting code which automatically corrects the errors.
A single additional bit can detect the error, but cannot correct it.
For correcting the errors, one has to know the exact position of the error. For
example, If we want to calculate a single-bit error, the error correction code will
determine which one of seven bits is in error. To achieve this, we have to add
some additional redundant bits.
Suppose r is the number of redundant bits and d is the total number of the data
bits. The number of redundant bits r can be calculated by using the formula:
2r>=d+r+1
The value of r is calculated by using the above formula. For example, if the value
of d is 4, then the possible smallest value that satisfies the above relation would
be 3.
To determine the position of the bit which is in error, a technique developed by
R.W Hamming is Hamming code which can be applied to any length of the data
unit and uses the relationship between data units and redundant units.
Hamming Code
Parity bits: The bit which is appended to the original data of binary bits so that
the total number of 1s is even or odd.
Even parity: To check for even parity, if the total number of 1s is even, then the
value of the parity bit is 0. If the total number of 1s occurrences is odd, then the
value of the parity bit is 1.
161
Data Communication and Computer Networks Unit – 9
Odd Parity: To check for odd parity, if the total number of 1s is even, then the
value of parity bit is 1. If the total number of 1s is odd, then the value of parity bit
is 0.
Algorithm of Hamming code:
o An information of 'd' bits are added to the redundant bits 'r' to form d+r.
o The location of each of the (d+r) digits is assigned a decimal value.
o The 'r' bits are placed in the positions 1,2,.....2k-1.
o At the receiving end, the parity bits are recalculated. The decimal value of
the parity bits determines the position of an error.
Relationship b/w Error position & binary number.
162
Data Communication and Computer Networks Unit – 9
The number of redundant bits is 3. The three bits are represented by r1, r2, r4.
The position of the redundant bits is calculated with corresponds to the raised
power of 2. Therefore, their corresponding positions are 1, 21, 22.
1. The position of r1 = 1
2. The position of r2 = 2
3. The position of r4 = 4
Representation of Data on the addition of parity bits:
We observe from the above figure that the bit positions that includes 1 in the first
position are 1, 3, 5, 7. Now, we perform the even-parity check at these bit
positions. The total number of 1 at these bit positions corresponding to r1 is even,
therefore, the value of the r1 bit is 0.
Determining r2 bit
The r2 bit is calculated by performing a parity check on the bit positions whose
binary representation includes 1 in the second position.
163
Data Communication and Computer Networks Unit – 9
We observe from the above figure that the bit positions that includes 1 in the
second position are 2, 3, 6, 7. Now, we perform the even-parity check at these bit
positions. The total number of 1 at these bit positions corresponding to r2 is odd,
therefore, the value of the r2 bit is 1.
Determining r4 bit
The r4 bit is calculated by performing a parity check on the bit positions whose
binary representation includes 1 in the third position.
We observe from the above figure that the bit positions that includes 1 in the
third position are 4, 5, 6, 7. Now, we perform the even-parity check at these bit
positions. The total number of 1 at these bit positions corresponding to r4 is even,
therefore, the value of the r4 bit is 0.
Data transferred is given below:
164
Data Communication and Computer Networks Unit – 9
Suppose the 4th bit is changed from 0 to 1 at the receiving end, then parity bits are
recalculated.
R1 bit
The bit positions of the r1 bit are 1,3,5,7
We observe from the above figure that the binary representation of r1 is 1100.
Now, we perform the even-parity check, the total number of 1s appearing in the
r1 bit is an even number. Therefore, the value of r1 is 0.
R2 bit
The bit positions of r2 bit are 2,3,6,7.
We observe from the above figure that the binary representation of r2 is 1001.
Now, we perform the even-parity check, the total number of 1s appearing in the
r2 bit is an even number. Therefore, the value of r2 is 0.
R4 bit
The bit positions of r4 bit are 4,5,6,7.
165
Data Communication and Computer Networks Unit – 9
We observe from the above figure that the binary representation of r4 is 1011.
Now, we perform the even-parity check, the total number of 1s appearing in the
r4 bit is an odd number. Therefore, the value of r4 is 1.
o The binary representation of redundant bits, i.e., r4r2r1 is 100, and its
corresponding decimal value is 4. Therefore, the error occurs in a 4th bit
position. The bit value must be changed from 1 to 0 to correct the error.
Data Link Controls
Data Link Control is the service provided by the Data Link Layer to provide reliable
data transfer over the physical medium. For example, In the half-duplex
transmission mode, one device can only transmit the data at a time. If both the
devices at the end of the links transmit the data simultaneously, they will collide
and leads to the loss of the information. The Data link layer provides the
coordination among the devices so that no collision occurs.
The Data link layer provides three functions:
o Line discipline
o Flow Control
o Error Control
166
Data Communication and Computer Networks Unit – 9
Line Discipline
o Line Discipline is a functionality of the Data link layer that provides the
coordination among the link systems. It determines which device can send,
and when it can send the data.
Line Discipline can be achieved in two ways:
o ENQ/ACK
o Poll/select
END/ACK
END/ACK stands for Enquiry/Acknowledgement is used when there is no wrong
receiver available on the link and having a dedicated path between the two
devices so that the device capable of receiving the transmission is the intended
one.
END/ACK coordinates which device will start the transmission and whether the
recipient is ready or not.
Working of END/ACK
The transmitter transmits the frame called an Enquiry (ENQ) asking whether the
receiver is available to receive the data or not.
The receiver responses either with the positive acknowledgement(ACK) or with
the negative acknowledgement(NACK) where positive acknowledgement means
167
Data Communication and Computer Networks Unit – 9
Poll/Select
The Poll/Select method of line discipline works with those topologies where one
device is designated as a primary station, and other devices are secondary
stations.
Working of Poll/Select
168
Data Communication and Computer Networks Unit – 9
169
Data Communication and Computer Networks Unit – 9
Poll
o The Poll mode is used when the primary device wants to receive some data
from the secondary device.
o When a primary device wants to receive the data, then it asks each device
whether it has anything to send.
o Firstly, the primary asks (poll) the first secondary device, if it responds with
the NACK (Negative Acknowledgement) means that it has nothing to send.
Now, it approaches the second secondary device, it responds with the ACK
means that it has the data to send. The secondary device can send more
than one frame one after another or sometimes it may be required to send
ACK before sending each one, depending on the type of the protocol being
used.
170
Data Communication and Computer Networks Unit – 9
Flow Control
o It is a set of procedures that tells the sender how much data it can transmit
before the data overwhelms the receiver.
o The receiving device has limited speed and limited memory to store the
data. Therefore, the receiving device must be able to inform the sending
device to stop the transmission temporarily before the limits are reached.
o It requires a buffer, a block of memory for storing the information until
they are processed.
Two methods have been developed to control the flow of data:
o Stop-and-wait
171
Data Communication and Computer Networks Unit – 9
o Sliding window
Stop-and-wait
o In the Stop-and-wait method, the sender waits for an acknowledgement
after every frame it sends.
o When acknowledgement is received, then only next frame is sent. The
process of alternately sending and waiting of a frame continues until the
sender transmits the EOT (End of transmission) frame.
Advantage of Stop-and-wait
The Stop-and-wait method is simple as each frame is checked and acknowledged
before the next frame is sent.
Disadvantage of Stop-and-wait
Stop-and-wait technique is inefficient to use as each frame must travel across all
the way to the receiver, and an acknowledgement travels all the way before the
next frame is sent. Each frame sent and received uses the entire time needed to
traverse the link.
Sliding Window
o The Sliding Window is a method of flow control in which a sender can
transmit the several frames before getting an acknowledgement.
o In Sliding Window Control, multiple frames can be sent one after the
another due to which capacity of the communication channel can be
utilized efficiently.
o A single ACK acknowledge multiple frames.
o Sliding Window refers to imaginary boxes at both the sender and receiver
end.
o The window can hold the frames at either end, and it provides the upper
limit on the number of frames that can be transmitted before the
acknowledgement.
172
Data Communication and Computer Networks Unit – 9
173
Data Communication and Computer Networks Unit – 9
Receiver Window
o At the beginning of transmission, the receiver window does not contain n
frames, but it contains n-1 spaces for frames.
o When the new frame arrives, the size of the window shrinks.
o The receiver window does not represent the number of frames received,
but it represents the number of frames that can be received before an ACK
is sent. For example, the size of the window is w, if three frames are
received then the number of spaces available in the window is (w-3).
o Once the acknowledgement is sent, the receiver window expands by the
number equal to the number of frames acknowledged.
o Suppose the size of the window is 7 means that the receiver window
contains seven spaces for seven frames. If the one frame is received, then
the receiver window shrinks and moving the boundary from 0 to 1. In this
way, window shrinks one by one, so window now contains the six spaces. If
frames from 0 through 4 have sent, then the window contains two spaces
before an acknowledgement is sent.
174
Data Communication and Computer Networks Unit – 9
Error Control
Error Control is a technique of error detection and retransmission.
Categories of Error Control:
Stop-and-wait ARQ
Stop-and-wait ARQ is a technique used to retransmit the data in case of damaged
or lost frames.
This technique works on the principle that the sender will not transmit the next
frame until it receives the acknowledgement of the last transmitted frame.
Four features are required for the retransmission:
o The sending device keeps a copy of the last transmitted frame until the
acknowledgement is received. Keeping the copy allows the sender to
retransmit the data if the frame is not received correctly.
o Both the data frames and the ACK frames are numbered alternately 0 and 1
so that they can be identified individually. Suppose data 1 frame
175
Data Communication and Computer Networks Unit – 9
acknowledges the data 0 frame means that the data 0 frame has been
arrived correctly and expects to receive data 1 frame.
o If an error occurs in the last transmitted frame, then the receiver sends the
NAK frame which is not numbered. On receiving the NAK frame, sender
retransmits the data.
o It works with the timer. If the acknowledgement is not received within the
allotted time, then the sender assumes that the frame is lost during the
transmission, so it will retransmit the frame.
Two possibilities of the retransmission:
o Damaged Frame: When the receiver receives a damaged frame, i.e., the
frame contains an error, then it returns the NAK frame. For example, when
the data 0 frame is sent, and then the receiver sends the ACK 1 frame
means that the data 0 has arrived correctly, and transmits the data 1 frame.
The sender transmits the next frame: data 1. It reaches undamaged, and
the receiver returns ACK 0. The sender transmits the next frame: data 0.
The receiver reports an error and returns the NAK frame. The sender
retransmits the data 0 frame.
o Lost Frame: Sender is equipped with the timer and starts when the frame is
transmitted. Sometimes the frame has not arrived at the receiving end so
that it can be acknowledged neither positively nor negatively. The sender
waits for acknowledgement until the timer goes off. If the timer goes off, it
retransmits the last transmitted frame.
Sliding Window ARQ
SlidingWindow ARQ is a technique used for continuous transmission error control.
Three Features used for retransmission:
o In this case, the sender keeps the copies of all the transmitted frames until
they have been acknowledged. Suppose the frames from 0 through 4 have
been transmitted, and the last acknowledgement was for frame 2, the
sender has to keep the copies of frames 3 and 4 until they receive correctly.
o The receiver can send either NAK or ACK depending on the conditions. The
NAK frame tells the sender that the data have been received damaged.
176
Data Communication and Computer Networks Unit – 9
In the above figure, three frames have been transmitted before an error
discovered in the third frame. In this case, ACK 2 has been returned telling that
the frames 0,1 have been received successfully without any error. The receiver
177
Data Communication and Computer Networks Unit – 9
discovers the error in data 2 frame, so it returns the NAK 2 frame. The frame 3 is
also discarded as it is transmitted after the damaged frame. Therefore, the sender
retransmits the frames 2,3.
o Lost Data Frame: In Sliding window protocols, data frames are sent
sequentially. If any of the frames is lost, then the next frame arrive at the
receiver is out of sequence. The receiver checks the sequence number of
each of the frame, discovers the frame that has been skipped, and returns
the NAK for the missing frame. The sending device retransmits the frame
indicated by NAK as well as the frames transmitted after the lost frame.
o Lost Acknowledgement: The sender can send as many frames as the
windows allow before waiting for any acknowledgement. Once the limit of
the window is reached, the sender has no more frames to send; it must
wait for the acknowledgement. If the acknowledgement is lost, then the
sender could wait forever. To avoid such situation, the sender is equipped
with the timer that starts counting whenever the window capacity is
reached. If the acknowledgement has not been received within the time
limit, then the sender retransmits the frame since the last ACK.
Selective-Reject ARQ
o Selective-Reject ARQ technique is more efficient than Go-Back-n ARQ.
o In this technique, only those frames are retransmitted for which negative
acknowledgement (NAK) has been received.
o The receiver storage buffer keeps all the damaged frames on hold until the
frame in error is correctly received.
o The receiver must have an appropriate logic for reinserting the frames in a
correct order.
o The sender must consist of a searching mechanism that selects only the
requested frame for retransmission.
178
Data Communication and Computer Networks Unit – 9
179
Data Communication and Computer Networks Unit – 9
The size of the receiving window is the maximum number of frames that the
receiver can accept at a time. It determines the maximum number of frames that
the sender can send before receiving acknowledgment.
Example
Suppose that we have sender window and receiver window each of size 4. So the
sequence numbering of both the windows will be 0,1,2,3,0,1,2 and so on. The
following diagram shows the positions of the windows after sending the frames
and receiving acknowledgments.
180
Data Communication and Computer Networks Unit – 9
Go – Back – N ARQ
Go – Back – N ARQ provides for sending multiple frames before receiving the
acknowledgment for the first frame. It uses the concept of sliding window, and so
is also called sliding window protocol. The frames are sequentially numbered and
a finite number of frames are sent. If the acknowledgment of a frame is not
received within the time period, all frames starting from that frame are
retransmitted.
Selective Repeat ARQ
This protocol also provides for sending multiple frames before receiving the
acknowledgment for the first frame. However, here only the erroneous or lost
frames are retransmitted, while the good frames are received and buffered.
High-level Data Link Control (HDLC)
High-level Data Link Control (HDLC) is a group of communication protocols of the
data link layer for transmitting data between network points or nodes. Since it is a
data link protocol, data is organized into frames. A frame is transmitted via the
network to the destination that verifies its successful arrival. It is a bit - oriented
protocol that is applicable for both point - to - point and multipoint
communications.
Transfer Modes
HDLC supports two types of transfer modes, normal response mode and
asynchronous balanced mode.
Normal Response Mode (NRM) − Here, two types of stations are there,
a primary station that send commands and secondary station that can
respond to received commands. It is used for both point - to - point and
multipoint communications.
181
Data Communication and Computer Networks Unit – 9
HDLC Frame
HDLC is a bit - oriented protocol where each frame contains up to six fields. The
structure varies according to the type of frame. The fields of a HDLC frame are −
182
Data Communication and Computer Networks Unit – 9
Flag − It is an 8-bit sequence that marks the beginning and the end of the
frame. The bit pattern of the flag is 01111110.
Address − It contains the address of the receiver. If the frame is sent by the
primary station, it contains the address(es) of the secondary station(s). If it
is sent by the secondary station, it contains the address of the primary
station. The address field may be from 1 byte to several bytes.
Control − It is 1 or 2 bytes containing flow and error control information.
Payload − This carries the data from the network layer. Its length may vary
from one network to another.
FCS − It is a 2 byte or 4 bytes frame check sequence for error detection. The
standard code used is CRC (cyclic redundancy code)
183
Data Communication and Computer Networks Unit – 9
information field, if required. The first two bits of control field of U-frame is
11.
Multiple Access
Multiple access schemes are used to allow many mobile users to share
simultaneously a finite amount of radio spectrum.
Multiple Access Techniques
In wireless communication systems, it is often desirable to allow the subscriber to
send information simultaneously from the mobile station to the base station
while receiving information from the base station to the mobile station.
A cellular system divides any given area into cells where a mobile unit in each cell
communicates with a base station. The main aim in the cellular system design is
to be able to increase the capacity of the channel, i.e., to handle as many calls as
possible in a given bandwidth with a sufficient level of quality of service.
There are several different ways to allow access to the channel. These includes
mainly the following −
Frequency division multiple-access (FDMA)
184
Data Communication and Computer Networks Unit – 9
In the cases where continuous transmission is not required, there TDMA is used
instead of FDMA. The features of TDMA include the following.
TDMA shares a single carrier frequency with several users where each users
makes use of non-overlapping time slots.
Data transmission in TDMA is not continuous, but occurs in bursts. Hence
handsoff process is simpler.
TDMA uses different time slots for transmission and reception thus
duplexers are not required.
TDMA has an advantage that is possible to allocate different numbers of
time slots per frame to different users.
Bandwidth can be supplied on demand to different users by concatenating
or reassigning time slot based on priority.
Code Division Multiple Access (CDMA)
Code division multiple access technique is an example of multiple access where
several transmitters use a single channel to send information simultaneously. Its
features are as follows.
In CDMA every user uses the full available spectrum instead of getting
allotted by separate frequency.
CDMA is much recommended for voice and data communications.
While multiple codes occupy the same channel in CDMA, the users having
same code can communicate with each other.
CDMA offers more air-space capacity than TDMA.
The hands-off between base stations is very well handled by CDMA.
Space Division Multiple Access (SDMA)
Space division multiple access or spatial division multiple access is a technique
which is MIMO (multiple-input multiple-output) architecture and used mostly in
wireless and satellite communication. It has the following features.
All users can communicate at the same time using the same channel.
186
Data Communication and Computer Networks Unit – 9
187
Data Communication and Computer Networks Unit – 9
The persistence methods can be applied to help the station take action when the
channel is busy/idle.
1. Carrier Sense Multiple Access with Collision Detection (CSMA/CD) –
In this method, a station monitors the medium after it sends a frame to see if the
transmission was successful. If successful, the station is finished, if not, the frame
is sent again.
188
Data Communication and Computer Networks Unit – 9
In the diagram, A starts send the first bit of its frame at t1 and since C sees the
channel idle at t2, starts sending its frame at t2. C detects A’s frame at t3 and
aborts transmission. A detects C’s frame at t4 and aborts its transmission.
Transmission time for C’s frame is therefore and for A’s frame
is .
So, the frame transmission time (Tfr) should be at least twice the maximum
propagation time (Tp). This can be deduced when the two stations involved in
collision are maximum distance apart.
Process –
The entire process of collision detection can be explained as follows:
189
Data Communication and Computer Networks Unit – 9
190
Data Communication and Computer Networks Unit – 9
191
Data Communication and Computer Networks Unit – 9
192
Data Communication and Computer Networks Unit – 9
One key benefit of the PRMA protocol is that it can be used in combination with
existing CDMA or TDMA-based systems. It can also be incorporated with the next-
gen WCDMA systems. PRMA-centered protocol is ideal for multimedia traffic due
to its dynamic and flexible bandwidth-allocation process.
PRMA facts:
TDMA with slotted ALOHA reservation system
Source rates are 32 kbit/sec
Frame Duration is 16 msec ( 62.5 frames/sec)
20 slots per frame
Channel bit rate is 720 kbit/sec and bandwidth is 720 khz
576 bits per slot (contains 64 bit overhead)
193
Data Communication and Computer Networks Unit – 9
Polling-
In this access control method,
A polling is conducted in which all the stations willing to send data
participates.
The polling algorithm chooses one of the stations to send the data.
The chosen station sends the data to the destination.
After the chosen station has sent the data, the cycle repeats.
Example-
194
Data Communication and Computer Networks Unit – 9
Here-
Tpoll = Time taken for polling
Tsend = Time taken for sending the data = Transmission delay + Propagation
delay = Tt + Tp
Efficiency-
195
Data Communication and Computer Networks Unit – 9
Advantages-
Unlike in Time Division Multiplexing, no slot is ever wasted.
It leads to maximum efficiency and bandwidth utilization.
Disadvantages-
Time is wasted during polling.
Link sharing is not fair since each station has the equal probability of
winning in each round.
Few stations might starve for sending the data.
Important Formulas-
Efficiency (η) = Tt / (Tpoll + Tt + Tp)
Effective Bandwidth / Bandwidth Utilization / Throughput = Efficiency(η) x
Bandwidth
Maximum Available Effective Bandwidth = Total number of stations x
Bandwidth requirement of 1 station
Token Passing
Time Conversions-
In token passing,
Time may be expressed in seconds, bits or meters.
To convert the time from one unit to another, we use the following conversion
chart-
196
Data Communication and Computer Networks Unit – 9
Conversion Chart
1. Token-
2. Ring Latency-
197
Data Communication and Computer Networks Unit – 9
Then-
198
Data Communication and Computer Networks Unit – 9
Notes-
3. Cycle Time-
199
Data Communication and Computer Networks Unit – 9
If-
(Token Holding Time is the time for which a station holds the token before
transmitting to the other side)
Then-
Token Passing-
All the stations are logically connected to each other in the form of a ring.
The access of stations to the transmission link is governed by a token.
A station is allowed to transmit a data packet if and only if it possess the
token otherwise not.
Each station passes the token to its neighboring station either clockwise or
anti-clockwise.
200
Data Communication and Computer Networks Unit – 9
Assumptions-
Efficiency-
In one cycle,
Thus,
201
Data Communication and Computer Networks Unit – 9
In this strategy,
Station keeps holding the token until the last bit of the data packet
transmitted by it takes the complete revolution of the ring and comes back
to it.
Working-
The following diagram illustrates these steps for station-1. Same procedure is
repeated at every station.
202
Data Communication and Computer Networks Unit – 9
We know,
Efficiency-
203
Data Communication and Computer Networks Unit – 9
In this strategy,
Station releases the token immediately after putting its data packet to be
transmitted on the ring.
Working-
204
Data Communication and Computer Networks Unit – 9
Step-01: At Station-1:
Station-1
Step-02: At Station-2:
Station-2
Receives packet-1
Transmits packet-1
Acquires the token
Transmits packet-2
Releases the token
Step-03: At Station-3:
Station-3
Receives packet-1
Transmits packet-1
205
Data Communication and Computer Networks Unit – 9
Receives packet-2
Transmits packet-2
Acquires the token
Transmits packet-3
Releases the token
Step-04: At Station-4:
Station-4
Receives packet-1
Transmits packet-1
Receives packet-2
Transmits packet-2
Receives packet-3
Transmits packet-3
Acquires the token
Transmits packet-4
Releases the token
Step-05: At Station-1:
Receives packet-1
Discards packet-1 (as its journey is completed)
Receives packet-2
Transmits packet-2
Receives packet-3
Transmits packet-3
Receives packet-4
Transmits packet-4
Acquires the token
Transmits packet-1 (new)
Releases the token
206
Data Communication and Computer Networks Unit – 9
Efficiency-
207
Data Communication and Computer Networks Unit – 9
Important Notes-
Note-01:
In token passing,
Note-02:
Multi-Access Networks
208
Data Communication and Computer Networks Unit – 9
distinguish between an idle and a busy link, and “collision detect” means that a
node listens as it transmits and can therefore detect when a frame it is
transmitting has interfered (collided) with a frame transmitted by another node.
The Ethernet has its roots in an early packet radio network, called Aloha,
developed at the University of Hawaii to support computer communication across
the Hawaiian Islands. Like the Aloha network, the fundamental problem faced by
the Ethernet is how to mediate access to a shared medium fairly and efficiently
(in Aloha, the medium was the atmosphere, while in the Ethernet the medium
was originally a coax cable). The core idea in both Aloha and the Ethernet is an
algorithm that controls when each node can transmit.
Modern Ethernet links are now largely point to point; that is, they connect one
host to an Ethernet switch, or they interconnect switches. As a consequence, the
“multiple access” algorithm is not used much in today’s wired Ethernets, but a
variant is now used in wireless networks, such as 802.11 networks (also known as
Wi-Fi). Due to the enormous influence of Ethernet, we chose to describe its classic
algorithm here, and then explain how it has been adapted to Wi-Fi in the next
section. We will also discuss Ethernet switches elsewhere. For now, we’ll focus on
how a single Ethernet link works.
Digital Equipment Corporation and Intel Corporation joined Xerox to define a 10-
Mbps Ethernet standard in 1978. This standard then formed the basis for IEEE
standard 802.3, which additionally defines a much wider collection of physical
media over which an Ethernet can operate, including 100-Mbps, 1-Gbps, 10-Gbps,
40-Gbps, and 100-Gbps versions.
Physical Properties
209
Data Communication and Computer Networks Unit – 9
in turn, connected to an Ethernet adaptor, which was plugged into the host. This
configuration is shown in Figure 39.
210
Data Communication and Computer Networks Unit – 9
Any signal placed on the Ethernet by a host is broadcast over the entire network;
that is, the signal is propagated in both directions, and repeaters and hubs
forward the signal on all outgoing segments. Terminators attached to the end of
each segment absorb the signal and keep it from bouncing back and interfering
with trailing signals. The original Ethernet specifications used the Manchester
encoding scheme described in an earlier section, while 4B/5B encoding (or the
similar 8B/10B) scheme is used today on higher speed Ethernets.
Access Protocol
We now turn our attention to the algorithm that controls access to a shared
Ethernet link. This algorithm is commonly called the Ethernet’s media access
control (MAC). It is typically implemented in hardware on the network adaptor.
We will not describe the hardware per se, but instead focus on the algorithm it
implements. First, however, we describe the Ethernet’s frame format and
addresses.
Frame Format
Each Ethernet frame is defined by the format given in Figure 41. The 64-bit
preamble allows the receiver to synchronize with the signal; it is a sequence of
alternating 0s and 1s. Both the source and destination hosts are identified with a
48-bit address. The packet type field serves as the demultiplexing key; it identifies
to which of possibly many higher-level protocols this frame should be delivered.
Each frame contains up to 1500 bytes of data. Minimally, a frame must contain at
least 46 bytes of data, even if this means the host has to pad the frame before
transmitting it. The reason for this minimum frame size is that the frame must be
long enough to detect a collision; we discuss this more below. Finally, each frame
211
Data Communication and Computer Networks Unit – 9
includes a 32-bit CRC. Like the HDLC protocol described in an earlier section, the
Ethernet is a bit-oriented framing protocol. Note that from the host’s perspective,
an Ethernet frame has a 14-byte header: two 6-byte addresses and a 2-byte type
field. The sending adaptor attaches the preamble and CRC before transmitting,
and the receiving adaptor removes them.
Addresses
Each host on an Ethernet—in fact, every Ethernet host in the world—has a unique
Ethernet address. Technically, the address belongs to the adaptor, not the host; it
is usually burned into ROM. Ethernet addresses are typically printed in a form
humans can read as a sequence of six numbers separated by colons. Each number
corresponds to 1 byte of the 6-byte address and is given by a pair of hexadecimal
digits, one for each of the 4-bit nibbles in the byte; leading 0s are dropped. For
example, 8:0:2b:e4:b1:2 is the human-readable representation of Ethernet
address
212
Data Communication and Computer Networks Unit – 9
but this is not the normal mode.) In addition to these unicast addresses, an
Ethernet address consisting of all 1s is treated as a broadcast address; all adaptors
pass frames addressed to the broadcast address up to the host. Similarly, an
address that has the first bit set to 1 but is not the broadcast address is called
a multicast address. A given host can program its adaptor to accept some set of
multicast addresses. Multicast addresses are used to send messages to some
subset of the hosts on an Ethernet (e.g., all file servers). To summarize, an
Ethernet adaptor receives all frames and accepts
Transmitter Algorithm
As we have just seen, the receiver side of the Ethernet protocol is simple; the real
smarts are implemented at the sender’s side. The transmitter algorithm is defined
as follows.
When the adaptor has a frame to send and the line is idle, it transmits the frame
immediately; there is no negotiation with the other adaptors. The upper bound of
1500 bytes in the message means that the adaptor can occupy the line for only a
fixed length of time.
When an adaptor has a frame to send and the line is busy, it waits for the line to
go idle and then transmits immediately. (To be more precise, all adaptors wait
9.6 μs after the end of one frame before beginning to transmit the next frame.
This is true for both the sender of the first frame as well as those nodes listening
for the line to become idle.) The Ethernet is said to be a 1-persistent protocol
because an adaptor with a frame to send transmits with probability 1 whenever a
busy line goes idle. In general, a p-persistent algorithm transmits with
probability 0≤p≤10≤p≤1 after a line becomes idle and defers with probability q = 1
213
Data Communication and Computer Networks Unit – 9
- p. The reasoning behind choosing a p<1 is that there might be multiple adaptors
waiting for the busy line to become idle, and we don’t want all of them to begin
transmitting at the same time. If each adaptor transmits immediately with a
probability of, say, 33%, then up to three adaptors can be waiting to transmit and
the odds are that only one will begin transmitting when the line becomes idle.
Despite this reasoning, an Ethernet adaptor always transmits immediately after
noticing that the network has become idle and has been very effective in
doing so.
To complete the story about p-persistent protocols for the case when p<1, you
might wonder how long a sender that loses the coin flip (i.e., decides to defer) has
to wait before it can transmit. The answer for the Aloha network, which originally
developed this style of protocol, was to divide time into discrete slots, with each
slot corresponding to the length of time it takes to transmit a full frame.
Whenever a node has a frame to send and it senses an empty (idle) slot, it
transmits with probability p and defers until the next slot with probability q = 1 -
p. If that next slot is also empty, the node again decides to transmit or defer, with
probabilities p and q, respectively. If that next slot is not empty—that is, some
other station has decided to transmit—then the node simply waits for the next
idle slot and the algorithm repeats.
One way that an adaptor will send only 96 bits—which is sometimes called a runt
frame—is if the two hosts are close to each other. Had the two hosts been farther
apart, they would have had to transmit longer, and thus send more bits, before
detecting the collision. In fact, the worst-case scenario happens when the two
hosts are at opposite ends of the Ethernet. To know for sure that the frame it just
214
Data Communication and Computer Networks Unit – 9
sent did not collide with another frame, the transmitter may need to send as
many as 512 bits. Not coincidentally, every Ethernet frame must be at least
512 bits (64 bytes) long: 14 bytes of header plus 46 bytes of data plus 4 bytes of
CRC.
Why 512 bits? The answer is related to another question you might ask about an
Ethernet: Why is its length limited to only 2500 m? Why not 10 or 1000 km? The
answer to both questions has to do with the fact that the farther apart two nodes
are, the longer it takes for a frame sent by one to reach the other, and the
network is vulnerable to a collision during this time.
Figure 42. Worst-case scenario: (a) A sends a frame at time t; (b) A’s frame arrives
at B at time t+d; (c) B begins transmitting at time t+d and collides with A’s frame;
(d) B’s runt (32-bit) frame arrives at A at time t+2×d.
Figure 42 illustrates the worst-case scenario, where hosts A and B are at opposite
ends of the network. Suppose host A begins transmitting a frame at time t, as
215
Data Communication and Computer Networks Unit – 9
shown in (a). It takes it one link latency (let’s denote the latency as d) for the
frame to reach host B. Thus, the first bit of A’s frame arrives at B at time t+d, as
shown in (b). Suppose an instant before host A’s frame arrives (i.e., B still sees an
idle line), host B begins to transmit its own frame. B’s frame will immediately
collide with A’s frame, and this collision will be detected by host B (c). Host B will
send the 32-bit jamming sequence, as described above. (B’s frame will be a runt.)
Unfortunately, host A will not know that the collision occurred until B’s frame
reaches it, which will happen one link latency later, at time t+2×d, as shown in (d).
Host A must continue to transmit until this time in order to detect the collision. In
other words, host A must transmit for 2×d to be sure that it detects all possible
collisions. Considering that a maximally configured Ethernet is 2500 m long, and
that there may be up to four repeaters between any two hosts, the round-trip
delay has been determined to be 51.2 μs, which on a 10-Mbps Ethernet
corresponds to 512 bits. The other way to look at this situation is that we need to
limit the Ethernet’s maximum latency to a fairly small value (e.g., 51.2 μs) for the
access algorithm to work; hence, an Ethernet’s maximum length must be
something on the order of 2500 m.
Once an adaptor has detected a collision and stopped its transmission, it waits a
certain amount of time and tries again. Each time it tries to transmit but fails, the
adaptor doubles the amount of time it waits before trying again. This strategy of
doubling the delay interval between each retransmission attempt is a general
technique known as exponential backoff. More precisely, the adaptor first delays
either 0 or 51.2 μs, selected at random. If this effort fails, it then waits 0, 51.2,
102.4, or 153.6 μs (selected randomly) before trying again; this is k × 51.2 for
k=0..3. After the third collision, it waits k × 51.2 for k = 0.23 - 1, again selected at
random. In general, the algorithm randomly selects a k between 0 and 2n - 1 and
waits k × 51.2 μs, where n is the number of collisions experienced so far. The
adaptor gives up after a given number of tries and reports a transmit error to the
host. Adaptors typically retry up to 16 times, although the backoff algorithm
caps n in the above formula at 10.
Longevity of Ethernet
Ethernet has been the dominant local area network technology for over 30 years.
Today it is typically deployed point-to-point rather than tapping into a coax cable,
it often runs at speeds of 1 or 10 Gbps rather than 10 Mbps, and it allows jumbo
216
Data Communication and Computer Networks Unit – 9
packets with up to 9000 bytes of data rather than 1500 bytes. But, it remains
backwards compatible with the original standard. This makes it worth saying a
few words about why Ethernets have been so successful, so that we can
understand the properties we should emulate with any technology that tries to
replace it.
Backbone
Backbone is most important part of a system which provides the central support
to the rest system, for example backbone of a human body that balance and hold
all the body parts. Similarly in Computer Networks a Backbone Network is as a
Network containing a high capacity connectivity infrastructure that backbone to
the different part of the network.
Backbone LANs:
Because of increasing use of distributed applications and PCs, a new flexible
strategy for LANs has been introduced. if a premises wide data communication
system is to be supported then we need a networking system which can span
over the required distance and which capable of interconnecting all the
equipment in a single building or in a group of buildings.
217
Data Communication and Computer Networks Unit – 9
It is possible to develop a single LAN for this purpose but practically this scheme
faces the following drawbacks:
1. Poor Reliability:
With a single LAN, the reliability will be poor since a service interruption
even for a short duration can cause major problem to the user.
2. Capacity:
There is a possibility that a single LAN may be saturated due to increase in
number of devices beyond a certain number
3. Cost:
A single LAN can not give its optimum performance for the diverse
requirements of communication and interconnection.
So the alternative for using a single LAN is to use low cost low capacity LANs in
each building or department and then interconnection all these LANs with high
capacity LAN. such a network is called as Backbone LAN. the backbone network
allows several LANs to be connected. in the backbone network, no station is
directly connected with backbone, instead each station is a part a LAN, and the
LANs are connected to the backbone.
The backbone itself is a LAN, it uses a LAN protocol such as ethernet, Hence each
connection in the backbone is itself another LAN. The two very common used
architectures are: Bus backbone, Star backbone. These are explained as following
below.
1. Bus Backbone:
In Bus backbone the topology used for the backbone is bus topology.
218
Data Communication and Computer Networks Unit – 9
Working:
In above structure if a station in LAN 2 wants to send a frame to some other
station in Same LAN then Bridge 2 will not allow the frame to pass to any other
LAN, hence this frame will not reach the backbone. If a station from LAN 1 wants
to send a frame to a station in LAN 4 then Bridge 1 passes this frame to the
backbone. This frame is then received by Bridge 4 and delivered to the
destination.
2. Star Backbone:
The topology of this backbone is star topology.
Above figure shows the Star backbone in this configuration, the backbone is
simply a switch which is used to connect various LANs. The switch does the job of
backbone and connect the LANs as well. This type of backbone are basically used
as distribution backbone inside a building.
219
Data Communication and Computer Networks Unit – 9
Example of point to point networks are leased telephone lines or ADLS lines. Such
a point to point network can be considered as being equivalent ta a LAN without
stations.
Virtual LAN (VLAN) is a concept in which we can divide the devices logically on
layer 2 (data link layer). Generally, layer 3 devices divides broadcast domain but
broadcast domain can be divided by switches using the concept of VLAN.
VLAN ranges –
220
Data Communication and Computer Networks Unit – 9
VLAN 1:It is the default VLAN of switches. By default, all switch ports are in
VLAN. This VLAN can’t be deleted or edit but can be used.
VLAN 2-1001: This is a normal VLAN range. We can create, edit and delete
these VLAN.
VLAN 1002-1005: These are CISCO defaults for fddi and token rings. These
VLAN can’t be deleted.
Vlan 1006-4094: This is the extended range of Vlan.
Configuration –
We can simply create VLANs by simply assigning the vlan-id and Vlan name.
#switch1(config)#vlan 2
#switch1(config-vlan)#vlan accounts
Here, 2 is the Vlan I’d and accounts is the Vlan name. Now, we assign Vlan to the
switch ports.e.g-
Switch(config)#int fa0/0
Switch(config-if)#switchport mode access
Switch(config-if)#switchport access Vlan 2
221
Data Communication and Computer Networks Unit – 9
Switch(config)#vlan 2
Switch(config)#vlan 3
We have made VLANs but the most important part is to assign switch ports to the
VLANs .
Switch(config)#int fa0/0
Switch(config-if)#switchport mode access
Switch(config-if) #switchport access Vlan 2
Switch(config)#int fa0/1
Switch(config-if)#switchport mode access
Switch(config-if) #switchport access Vlan 3
Switch(config)#int fa0/2
Switch(config-if)#switchport mode access
Switch(config-if) #switchport access Vlan 2
222
Data Communication and Computer Networks Unit – 9
Advantages –
There are 5 main types of VLANs depending on the type of the network they
carry:
1. Default VLAN –
When the switch initially starts up, all switch ports become a member of
the default VLAN (generally all switches have default VLAN named as VLAN
1), which makes them all part of the same broadcast domain. Using default
VLAN allows any network device connected to any of the switch port to
connect with other devices on other switch ports. One unique feature of
Default VLAN is that it can’t be rename or delete.
2. Data VLAN –
Data VLAN is used to divide the whole network into 2 groups. One group of
223
Data Communication and Computer Networks Unit – 9
users and other group of devices. This VLAN also known as a user VLAN, the
data VLAN is used only for user-generated data. This VLAN carrying data
only. It is not used for carrying management traffic or voice.
3. Voice VLAN –
Voice VLAN is configured to carry voice traffic. Voice VLANs are mostly
given high transmission priority over other types of network traffic. To
ensure voice over IP (VoIP) quality (delay of less than 150 milliseconds (ms)
across the network), we must have separate voice VLAN as this will
preserve bandwidth for other applications.
4. Management VLAN –
A management VLAN is configured to access the management capabilities
of a switch (traffic like system logging, monitoring). VLAN 1 is the
management VLAN by default (VLAN 1 would be a bad choice for the
management VLAN). Any of a switch VLAN could be define as the
management VLAN if admin as not configured a unique VLAN to serve as
the management VLAN. This VLAN ensures that bandwidth for
management will be available even when user traffic is high.
5. Native VLAN –
This VLAN identifies traffic coming from each end of a trunk link. A native
VLAN is allocated only to an 802.1Q trunk port. The 802.1Q trunk port
places untagged traffic (traffic that does not come from any VLAN) on the
native VLAN. It is a best to configure the native VLAN as an unused VLAN.
IPv4 vs IPv6
What is IP?
224
Data Communication and Computer Networks Unit – 9
An IP address consists of two parts, i.e., the first one is a network address, and the
other one is a host address.
IPv4
IPv6
IPv4
IPv4 is a version 4 of IP. It is a current version and the most commonly used IP
address. It is a 32-bit address written in four numbers separated by 'dot', i.e.,
periods. This address is unique for each device.
The above example represents the IP address in which each group of numbers
separated by periods is called an Octet. Each number in an octet is in the range
from 0-255. This address can produce 4,294,967,296 possible unique addresses.
Each bit in an octet can be either 1 or 0. If the bit the 1, then the number it
represents will count, and if the bit is 0, then the number it represents does not
count.
225
Data Communication and Computer Networks Unit – 9
Now, we will see how to obtain the binary representation of the above IP address,
i.e., 66.94.29.13
To obtain 94, we put 1 under 64, 16, 8, 4, and 2 as the sum of these numbers is
equal to 94, and the remaining bits will be zero. Therefore, the binary bit version
of 94 is 01011110.
To obtain 29, we put 1 under 16, 8, 4, and 1 as the sum of these numbers is equal
to 29, and the remaining bits will be zero. Therefore, the binary bit version of 29 is
00011101.
226
Data Communication and Computer Networks Unit – 9
To obtain 13, we put 1 under 8, 4, and 1 as the sum of these numbers is equal to
13, and the remaining bits will be zero. Therefore, the binary bit version of 13 is
00001101.
Drawback of IPv4
Currently, the population of the world is 7.6 billion. Every user is having more
than one device connected with the internet, and private companies also rely on
the internet. As we know that IPv4 produces 4 billion addresses, which are not
enough for each device connected to the internet on a planet. Although the
various techniques were invented, such as variable- length mask, network address
translation, port address translation, classes, inter-domain translation, to
conserve the bandwidth of IP address and slow down the depletion of an IP
address. In these techniques, public IP is converted into a private IP due to which
the user having public IP can also use the internet. But still, this was not so
efficient, so it gave rise to the development of the next generation of IP
addresses, i.e., IPv6.
IPv6
IPv4 produces 4 billion addresses, and the developers think that these addresses
are enough, but they were wrong. IPv6 is the next generation of IP addresses. The
main difference between IPv4 and IPv6 is the address size of IP addresses. The
IPv4 is a 32-bit address, whereas IPv6 is a 128-bit hexadecimal address. IPv6
provides a large address space, and it contains a simple header as compared to
IPv4.
It provides transition strategies that convert IPv4 into IPv6, and these strategies
are as follows:
o Dual stacking: It allows us to have both the versions, i.e., IPv4 and IPv6, on
the same device.
227
Data Communication and Computer Networks Unit – 9
o Tunneling: In this approach, all the users have IPv6 communicates with an
IPv4 network to reach IPv6.
o Network Address Translation: The translation allows the communication
between the hosts having a different version of IP.
This hexadecimal address contains both numbers and alphabets. Due to the usage
of both the numbers and alphabets, IPv6 is capable of producing over 340
undecillion (3.4*1038) addresses.
IPv6 is a 128-bit hexadecimal address made up of 8 sets of 16 bits each, and these
8 sets are separated by a colon. In IPv6, each hexadecimal character represents 4
bits. So, we need to convert 4 bits to a hexadecimal number at a time
Address format
The above diagram shows the address format of IPv4 and IPv6. An IPv4 is a 32-bit
decimal address. It contains 4 octets or fields separated by 'dot', and each field is
8-bit in size. The number that each field contains should be in the range of 0-255.
Whereas an IPv6 is a 128-bit hexadecimal address. It contains 8 fields separated
by a colon, and each field is 16-bit in size.
228
Data Communication and Computer Networks Unit – 9
Ipv4 Ipv6
229
Data Communication and Computer Networks Unit – 9
Packet flow It does not provide any It uses flow label field in
identification mechanism for packet flow the header for the packet
identification. flow identification.
Checksum field The checksum field is available The checksum field is not
in IPv4. available in IPv6.
230
Data Communication and Computer Networks Unit – 9
Classful Addressing
Hexadecimal Notation:
1. The value of any segment (byte) is between 0 and 255 (both included).
2. There are no zeroes preceding the value in any segment (054 is wrong, 54 is
correct).
Classful Addressing
The 32 bit IP address is divided into five sub-classes. These are:
Class A
Class B
Class C
231
Data Communication and Computer Networks Unit – 9
Class D
Class E
Each of these classes has a valid range of IP addresses. Classes D and E are
reserved for multicast and experimental purposes respectively. The order of bits
in the first octet determine the classes of IP address.
IPv4 address is divided into two parts:
Network ID
Host ID
The class of IP address is used to determine the bits used for network ID and host
ID and the number of total networks and hosts possible in that particular class.
Each ISP or network administrator assigns IP address to each device that is
connected to its network.
Note: While finding the total number of host IP addresses, 2 IP addresses are not
counted and are therefore, decreased from the total count because the first IP
address of any network is the network number and whereas the last IP address is
reserved for broadcast IP.
Class A:
IP address belonging to class A are assigned to the networks that contain a large
number of hosts.
232
Data Communication and Computer Networks Unit – 9
The higher order bit of the first octet in class A is always set to 0. The remaining 7
bits in first octet are used to determine network ID. The 24 bits of host ID are
used to determine the host in any network. The default subnet mask for class A is
255.x.x.x. Therefore, class A has a total of:
Class B:
IP address belonging to class B are assigned to the networks that ranges from
medium-sized to large-sized networks.
The higher order bits of the first octet of IP addresses of class B are always set to
10. The remaining 14 bits are used to determine network ID. The 16 bits of host ID
is used to determine the host in any network. The default sub-net mask for class B
is 255.255.x.x. Class B has a total of:
233
Data Communication and Computer Networks Unit – 9
Class C:
The higher order bits of the first octet of IP addresses of class C are always set to
110. The remaining 21 bits are used to determine network ID. The 8 bits of host ID
is used to determine the host in any network. The default sub-net mask for class C
is 255.255.255.x. Class C has a total of:
2^21 = 2097152 network address
2^8 – 2 = 254 host address
Class D:
IP address belonging to class D are reserved for multi-casting. The higher order
bits of the first octet of IP addresses belonging to class D are always set to 1110.
The remaining bits are for the address that interested hosts recognize.
234
Data Communication and Computer Networks Unit – 9
Class D does not posses any sub-net mask. IP addresses belonging to class D
ranges from 224.0.0.0 – 239.255.255.255.
Class E:
Host ID’s are used to identify a host within a network. The host ID are assigned
based on the following rules:
Within any network, the host ID must be unique to that network.
Host ID in which all bits are set to 0 cannot be assigned because this
host ID is used to represent the network ID of the IP address.
235
Data Communication and Computer Networks Unit – 9
Host ID in which all bits are set to 1 cannot be assigned because this
host ID is reserved as a broadcast address to send packets to all the
hosts present on that particular network.
Hosts that are located on the same physical network are identified by the network
ID, as all host on the same physical network is assigned the same network ID. The
network ID is assigned based on the following rules:
The network ID cannot start with 127 because 127 belongs to class A
address and is reserved for internal loop-back functions.
All bits of network ID set to 1 are reserved for use as an IP broadcast
address and therefore, cannot be used.
All bits of network ID set to 0 are used to denote a specific host on
the local network and are not routed and therefore, aren’t used.
The problem with this classful addressing method is that millions of class A
address are wasted, many of the class B address are wasted, whereas, number of
addresses available in class C is so small that it cannot cater the needs of
organizations. Class D addresses are used for multicast routing and are therefore
available as a single block only. Class E addresses are reserved.
Classless Addressing
Mask – It is a 32-bit binary number that gives the network address in the address
block when AND operation is bitwise applied on the mask and any IP address of
the block.
236
Data Communication and Computer Networks Unit – 9
Class A – 255.0.0.0
Class B – 255.255.0.0
Class C – 255.255.255.0
Example : Given IP address 132.6.17.85 and default class B mask, find the
beginning address (network address).
Solution : The default mask is 255.255.0.0, which means that the only the first 2
bytes are preserved and the other 2 bytes are set to 0. Therefore, the network
address is 132.6.0.0.
Classless Addressing
1. Number of subnets : Given bits for mask – No. of bits in default mask
2. Subnet address : AND result of subnet mask and the given IP address
3. Broadcast address : By putting the host bits as 1 and retaining the network bits
as in the IP address
237
Data Communication and Computer Networks Unit – 9
Example : Given IP Address – 172.16.0.0/25, find the number of subnets and the
number of hosts per subnet. Also, for the first subnet block, find the subnet
address, first host ID, last host ID and broadcast address.
For the first subnet block, we have subnet address = 0.0, first host id = 0.1, last
host id = 0.126 and broadcast address = 0.127
IPv4 is a connectionless protocol for a packet- switching network that uses the
datagram approach. This means that each datagram is handled independently,
and each datagram can follow a different route to the destination.
238
Data Communication and Computer Networks Unit – 9
Version (VER): This 4-bit field defines the version of the IPv4 protocol.
Currently, the version is 4. However, version 6 (or IPng) may totally replace
version 4 in the future.
Header length (HLEN): This 4-bit field defines the total length of the
datagram header in 4-byte words. This field is needed because the length
of the header is variable (between 20 and 60 bytes).
Services: IETF has changed the interpretation and name of this 8-bit field.
This field, previously called service type, is now called differentiated
services.
Total Length: Length of header + Data (16 bits), which has a minimum value
20 Bytes and the maximum is 65,535 bytes
Flags: 3 flags of 1 bit each: reserved bit (must be zero), do not fragment
flag, more fragments flag (same order)
Fragmentation
Fragmentation is done by the network layer when the maximum size of datagram
is greater than maximum size of data that can be held a frame i.e., its Maximum
Transmission Unit (MTU). The network layer divides the datagram received from
transport layer into fragments so that data flow is not disrupted.
Since there are 16 bits for total length in IP header so, maximum size of IP
datagram = 216 – 1 = 65, 535 bytes.
240
Data Communication and Computer Networks Unit – 9
Receiver identifies the frame with the identification (16 bits) field in IP
header. Each fragment of a frame has same identification number.
Receiver identifies sequence of frames using the fragment offset(13
bits) field in IP header
An overhead at network layer is present due to extra header introduced
due to fragmentation.
241
Data Communication and Computer Networks Unit – 9
Reassembly of Fragments –
It takes place only at destination and not at routers since packets take
independent path(datagram packet switching), so all may not meet at a router
and hence a need of fragmentation may arise again. The fragments may arrive out
of order also.
Algorithm –
242
Data Communication and Computer Networks Unit – 9
Efficiency –
Explanation – Since MTU is 200 bytes and 20 bytes is header size so, maximum
length of data = 180 bytes but it can be represented in fragment offset since not
divisible by 8 so, maximum length of data feasible = 176 bytes.
Number of fragments = (520/200) = 3.
Header length = 5 (since scaling factor is 4 therefore, 20/4 = 5)
Efficiency, e = (Data without header)/(Data with header) = 500/560 = 89.2 %
So, as far as the algorithm goes, IP header checksum is : 16 bit one’s complement
of the one’s complement sum of all 16 bit words in the header
243
Data Communication and Computer Networks Unit – 9
This means that if we divide the IP header is 16 bit words and sum each of them
up and then finally do a one’s compliment of the sum then the value generated
out of this operation would be the checksum.
Now, the above is done at the source side which is sending the data packet. At
the destination side which receives the data packet replaces the checksum value
in the header with all zeros and then calculates the checksum based on the same
algorithm as mentioned above. After a checksum value is obtained then this value
is compared with the value that came in the header. This comparison decides
whether the IP header is fine or corrupted.
The IPv6 protocol defines a set of headers, including the basic IPv6 header and
the IPv6 extension headers. The following figure shows the fields that appear in
the IPv6 header and the order in which the fields appear.
244
Data Communication and Computer Networks Unit – 9
Payload length – 16-bit unsigned integer, which is the rest of the packet
that follows the IPv6 header, in octets.
Next header – 8-bit selector. Identifies the type of header that immediately
follows the IPv6 header. Uses the same values as the IPv4 protocol field.
Hop limit – 8-bit unsigned integer. Decremented by one by each node that
forwards the packet. The packet is discarded if the hop limit is decremented
to zero.
Source address – 128 bits. The address of the initial sender of the packet.
Destination address – 128 bits. The address of the intended recipient of the
packet. The intended recipient is not necessarily the recipient if an optional
routing header is present.
IPv6 options are placed in separate extension headers that are located between
the IPv6 header and the transport-layer header in a packet. Most IPv6 extension
headers are not examined or processed by any router along a packet's delivery
path until the packet arrives at its final destination. This feature provides a major
improvement in router performance for packets that contain options. In IPv4, the
presence of any options requires the router to examine all options.
Unlike IPv4 options, IPv6 extension headers can be of arbitrary length. Also, the
number of options that a packet carries is not limited to 40 bytes. This feature, in
addition to the manner in which IPv6 options are processed, permits IPv6 options
to be used for functions that are not practical in IPv4.
1. Cache Memory
246
Data Communication and Computer Networks Unit – 9
Using ARP is inefficient if system A needs to broadcast an ARP request for each IP
packet it needs to send to system B. It could have broadcast the IP packet itself.
ARP can be useful if the ARP reply is cached because a system normally sends
several packets to the same destination. A system that receives an ARP reply
stores the mapping in the cache memory and
keeps it for 20 to 30 minutes unless the space in the cache is exhausted. Before
sending an ARP request, the system first checks its cache to see if it can find the
mapping.
2. Packet Format
Hardware type: This is a 16-bit field defining the type of the network on which
ARP isrunning. Each LAN has been assigned an integer based on its type. For
example, Ethernet is given type 1. ARP can be used on any physical network
Protocol type: This is a 16-bit field defining the protocol. For example, the value
of thisfield for the IPv4 protocol is 080016, ARP can be used with any higher-level
protocol.
247
Data Communication and Computer Networks Unit – 9
Hardware length: This is an 8-bit field defining the length of the physical address
inbytes. For example, for Ethernet the value is 6.
Protocol length: This is an 8-bit field defining the length of the logical address in
bytes.For example, for the IPv4 protocol the value is 4.
Operation: This is a 16-bit field defining the type of packet. Two packet types
aredefined: ARP request (1) and ARP reply (2).
3. Encapsulation
An ARP packet is encapsulated directly into a data link frame. For example, an
ARP packet is encapsulated in an Ethernet frame. Note that the type field
indicates that the data carried by the frame are an ARP packet
248
Data Communication and Computer Networks Unit – 9
Operation
2. IP asks ARP to create an ARP request message, filling in the sender physical
address, the sender IP address, and the target IP address. The target physical
address field is filled with 0s.
3. The message is passed to the data link layer where it is encapsulated in a frame
by using the physical address of the sender as the source address and the physical
broadcast address as the destination address.
4. Every host or router receives the frame. Because the frame contains a
broadcast destination address, all stations remove the message and pass it to
ARP. All machines except the one targeted drop the packet. The target machine
recognizes its IP address.
5. The target machine replies with an ARP reply message that contains its physical
address. The message is unicast.
6. The sender receives the reply message. It now knows the physical address of
the target machine.
7. The IP datagram, which carries data for the target machine, is now
encapsulated in a frame and is unicast to the destination.
249
Data Communication and Computer Networks Unit – 9
The following are four different cases in which the services of ARP can be used
1. The sender is a host and wants to send a packet to another host on the same
network. In this case, the logical address that must be mapped to a physical
address is the destination IP address in the datagram header.
2. The sender is a host and wants to send a packet to another host on another
network. In this case, the host looks at its routing table and finds the IP address of
the next hop (router) for this destination. If it does not have a routing table, it
looks for the IP address of the default router. The IP address of the router
becomes the logical address that must be mapped to a physical address.
3. The sender is a router that has received a datagram destined for a host on
another network. It checks its routing table and finds the IP address of the next
250
Data Communication and Computer Networks Unit – 9
router. The IP address of the next router becomes the logical address that must
be mapped to a physical address.
4. The sender is a router that has received a datagram destined for a host on the
same network. The destination IP address of the datagram becomes the logical
address that must be mapped to a physical address.
Example 3.17
Solution
The ARP request and reply packets. Note that the ARP data field in this case is 28
bytes, and that the individual addresses do not fit in the 4-byte boundary. That is
why we do not show the regular 4-byte boundaries for these addresses.
251
Data Communication and Computer Networks Unit – 9
5. Proxy ARP
A technique called proxy ARP is used to create a subnetting effect. A proxy ARP is
an ARP that acts on behalf of a set of hosts. Whenever a router running a proxy
ARP receives an ARP request looking for the IP address of one of these hosts, the
router sends an ARP reply announcing its own hardware (physical) address. After
the router receives the actual IP packet, it sends the packet to the appropriate
host or router. Let us give an example.
However, the administrator may need to create a subnet without changing the
whole system to recognize subnetted addresses. One solution is to add a router
running a proxy ARP. In this case, the router acts on behalf of all the hosts
installed on the subnet. When it receives an ARP request with a target IP address
that matches the address of one of its proteges (141.23.56.21, 141.23.56.22, or
141.23.56.23), it sends an ARP reply and announces its hardware address as the
target hardware address. When the router receives the IP packet, it sends the
packet to the appropriate host. This may happen in two cases:
1. A diskless station is just booted. The station can find its physical address by
checking its interface, but it does not know its IP address.
252
Data Communication and Computer Networks Unit – 9
Delivery
The network layer supervises the handling of the packets by the underlying
physical networks. We define this handling as the delivery of a packet.
Direct Delivery
In a direct delivery, the final destination of the packet is a host connected to the
same physical network as the deliverer. Direct delivery occurs when the source
and destination of the packet are located on the same physical network or when
the delivery is between the last router and the destination host. The sender can
easily determine if the delivery is direct. It can extract the network address of the
253
Data Communication and Computer Networks Unit – 9
destination (using the mask) and compare this address with the addresses of the
networks to which it is connected. If a match is found, the delivery is direct.
Indirect Delivery
If the destination host is not on the same network as the deliverer, the packet is
delivered indirectly. In an indirect delivery, the packet goes from router to router
until it reaches the one connected to the same physical network as its final
destination.
Routing
Routing metrics and costs are used for determining the best route to the
destination. The factors used by the protocols to determine the shortest path,
these factors are known as a metric.
Metrics are the network variables used to determine the best route to the
destination. For some protocols use the static metrics means that their value
254
Data Communication and Computer Networks Unit – 9
cannot be changed and for some other routing protocols use the dynamic metrics
means that their value can be assigned by the system administrator.
o Hop count: Hop count is defined as a metric that specifies the number of
passes through internetworking devices such as a router, a packet must
travel in a route to move from source to the destination. If the routing
protocol considers the hop as a primary metric value, then the path with
the least hop count will be considered as the best path to move from
source to the destination.
o Delay: It is a time taken by the router to process, queue and transmit a
datagram to an interface. The protocols use this metric to determine the
delay values for all the links along the path end-to-end. The path having the
lowest delay value will be considered as the best path.
o Bandwidth: The capacity of the link is known as a bandwidth of the link.
The bandwidth is measured in terms of bits per second. The link that has a
higher transfer rate like gigabit is preferred over the link that has the lower
capacity like 56 kb. The protocol will determine the bandwidth capacity for
all the links along the path, and the overall higher bandwidth will be
considered as the best route.
o Load: Load refers to the degree to which the network resource such as a
router or network link is busy. A Load can be calculated in a variety of ways
such as CPU utilization, packets processed per second. If the traffic
increases, then the load value will also be increased. The load value
changes with respect to the change in the traffic.
o Reliability: Reliability is a metric factor may be composed of a fixed value. It
depends on the network links, and its value is measured dynamically. Some
networks go down more often than others. After network failure, some
network links repaired more easily than other network links. Any reliability
factor can be considered for the assignment of reliability ratings, which are
generally numeric values assigned by the system administrator.
Types of Routing
255
Data Communication and Computer Networks Unit – 9
o Static Routing
o Default Routing
o Dynamic Routing
Static Routing
256
Data Communication and Computer Networks Unit – 9
o For a large network, it becomes a very difficult task to add each route
manually to the routing table.
o The system administrator should have a good knowledge of a topology as
he has to add each route manually.
Default Routing
Dynamic Routing
o All the routers must have the same dynamic routing protocol in order to
exchange the routes.
o If the router discovers any change in the condition or topology, then router
broadcast this information to all other routers.
257
Data Communication and Computer Networks Unit – 9
o It is easier to configure.
o It is more effective in selecting the best route in response to the changes in
the condition or topology.
Routing algorithm
o In order to transfer the packets from source to the destination, the network
layer must determine the best route through which packets can be
transmitted.
o Whether the network layer provides datagram service or virtual circuit
service, the main job of the network layer is to provide the best route. The
routing protocol provides this job.
o The routing protocol is a routing algorithm that provides the best path from
the source to the destination. The best path is the path that has the "least-
cost path" from source to the destination.
o Routing is the process of forwarding the packets from source to the
destination but the best route to send the packets is determined by the
routing algorithm.
258
Data Communication and Computer Networks Unit – 9
259
Data Communication and Computer Networks Unit – 9
Flooding: In case of flooding, every incoming packet is sent to all the outgoing
links except the one from it has been reached. The disadvantage of flooding is
that node may contain several copies of a particular packet.
Random walks: In case of random walks, a packet sent by the node to one of its
neighbors randomly. An advantage of using random walks is that it uses the
alternative routes very efficiently.
260
Data Communication and Computer Networks Unit – 9
Routing Routing decisions are made Routing decisions are the static
decision based on topology and tables.
network traffic.
TCP
TCP stands for Transmission Control Protocol. It is a transport layer protocol that
facilitates the transmission of packets from source to destination. It is a
connection-oriented protocol that means it establishes the connection prior to
the communication that occurs between the computing devices in a network. This
protocol is used with an IP protocol, so together, they are referred to as a TCP/IP.
The main functionality of the TCP is to take the data from the application layer.
Then it divides the data into a several packets, provides numbering to these
packets, and finally transmits these packets to the destination. The TCP, on the
other side, will reassemble the packets and transmits them to the application
layer. As we know that TCP is a connection-oriented protocol, so the connection
will remain established until the communication is not completed between the
sender and the receiver.
TCP is a transport layer protocol as it is used in transmitting the data from the
sender to the receiver.
261
Data Communication and Computer Networks Unit – 9
o Reliable
TCP is a reliable protocol as it follows the flow and error control mechanism. It
also supports the acknowledgment mechanism, which checks the state and sound
arrival of the data. In the acknowledgment mechanism, the receiver sends either
positive or negative acknowledgment to the sender so that the sender can get to
know whether the data packet has been received or needs to resend.
This protocol ensures that the data reaches the intended receiver in the same
order in which it is sent. It orders and numbers each segment so that the TCP
layer on the destination side can reassemble them based on their ordering.
o Connection-oriented
It is a connection-oriented service that means the data exchange occurs only after
the connection establishment. When the data transfer is completed, then the
connection will get terminated.
o Full duplex
It is a full-duplex means that the data can transfer in both directions at the same
time.
o Stream-oriented
TCP is a stream-oriented protocol as it allows the sender to send the data in the
form of a stream of bytes and also allows the receiver to accept the data in the
form of a stream of bytes. TCP creates an environment in which both the sender
and receiver are connected by an imaginary tube known as a virtual circuit. This
virtual circuit carries the stream of bytes across the internet.
In the layered architecture of a network model, the whole task is divided into
smaller tasks. Each task is assigned to a particular layer that processes the task. In
the TCP/IP model, five layers are application layer, transport layer, network
262
Data Communication and Computer Networks Unit – 9
layer, data link layer, and physical layer. The transport layer has a critical role in
providing end-to-end communication to the directly application processes. It
creates 65,000 ports so that the multiple applications can be accessed at the
same time. It takes the data from the upper layer, and it divides the data into
smaller packets and then transmits them to the network layer.
Working of TCP
263
Data Communication and Computer Networks Unit – 9
Advantages of TCP
Disadvantage of TCP
It increases a large amount of overhead as each segment gets its own TCP header,
so fragmentation by the router increases the overhead.
264
Data Communication and Computer Networks Unit – 9
o Source port: It defines the port of the application, which is sending the
data. So, this field contains the source port address, which is 16 bits.
o Destination port: It defines the port of the application on the receiving
side. So, this field contains the destination port address, which is 16 bits.
o Sequence number: This field contains the sequence number of data bytes
in a particular session.
o Acknowledgment number: When the ACK flag is set, then this contains the
next sequence number of the data byte and works as an acknowledgment
for the previous data received. For example, if the receiver receives the
segment number 'x', then it responds 'x+1' as an acknowledgment number.
o HLEN: It specifies the length of the header indicated by the 4-byte words in
the header. The size of the header lies between 20 and 60 bytes. Therefore,
the value of this field would lie between 5 and 15.
o Reserved: It is a 4-bit field reserved for future use, and by default, all are
set to zero.
o Flags
There are six control bits or flags:
1. URG: It represents an urgent pointer. If it is set, then the data is
processed urgently.
265
Data Communication and Computer Networks Unit – 9
2. ACK: If the ACK is set to 0, then it means that the data packet does
not contain an acknowledgment.
3. PSH: If this field is set, then it requests the receiving device to push
the data to the receiving application without buffering it.
4. RST: If it is set, then it requests to restart a connection.
5. SYN: It is used to establish a connection between the hosts.
6. FIN: It is used to release a connection, and no further data exchange
will happen.
o Window size
It is a 16-bit field. It contains the size of data that the receiver can accept.
This field is used for the flow control between the sender and receiver and
also determines the amount of buffer allocated by the receiver for a
segment. The value of this field is determined by the receiver.
o Checksum
It is a 16-bit field. This field is optional in UDP, but in the case of TCP/IP, this
field is mandatory.
o Urgent pointer
It is a pointer that points to the urgent data byte if the URG flag is set to 1.
It defines a value that will be added to the sequence number to get the
sequence number of the last urgent byte.
o Options
It provides additional options. The optional field is represented in 32-bits. If
this field contains the data less than 32-bit, then padding is required to
obtain the remaining bits.
UDP Protocol
In computer networking, the UDP stands for User Datagram Protocol. The David
P. Reed developed the UDP protocol in 1980. It is defined in RFC 768, and it is a
part of the TCP/IP protocol, so it is a standard protocol over the internet. The UDP
protocol allows the computer applications to send the messages in the form of
datagrams from one machine to another machine over the Internet Protocol
(IP) network. The UDP is an alternative communication protocol to the TCP
protocol (transmission control protocol). Like TCP, UDP provides a set of rules that
governs how the data should be exchanged over the internet. The UDP works by
encapsulating the data into the packet and providing its own header information
266
Data Communication and Computer Networks Unit – 9
to the packet. Then, this UDP packet is encapsulated to the IP packet and sent off
to its destination. Both the TCP and UDP protocols send the data over the internet
protocol network, so it is also known as TCP/IP and UDP/IP. There are many
differences between these two protocols. UDP enables the process to process
communication, whereas the TCP provides host to host communication. Since
UDP sends the messages in the form of datagrams, it is considered the best-effort
mode of communication. TCP sends the individual packets, so it is a reliable
transport medium. Another difference is that the TCP is a connection-oriented
protocol whereas, the UDP is a connectionless protocol as it does not require any
virtual circuit to transfer the data.
UDP also provides a different port number to distinguish different user requests
and also provides the checksum capability to verify whether the complete data
has arrived or not; the IP layer does not provide these two services.
o Connectionless
267
Data Communication and Computer Networks Unit – 9
In the case of UDP, the datagrams are sent in some order will be received in the
same order is not guaranteed as the datagrams are not numbered.
o Ports
The UDP protocol uses different port numbers so that the data can be sent to the
correct destination. The port numbers are defined between 0 and 1023.
o Faster transmission
o Acknowledgment mechanism
o Stateless
It is a stateless protocol that means that the sender does not get the
acknowledgement for the packet which has been sent.
268
Data Communication and Computer Networks Unit – 9
As we know that the UDP is an unreliable protocol, but we still require a UDP
protocol in some cases. The UDP is deployed where the packets require a large
amount of bandwidth along with the actual data. For example, in video streaming,
acknowledging thousands of packets is troublesome and wastes a lot of
bandwidth. In the case of video streaming, the loss of some packets couldn't
create a problem, and it can also be ignored.
In UDP, the header size is 8 bytes, and the packet size is upto 65,535 bytes. But
this packet size is not possible as the data needs to be encapsulated in the IP
datagram, and an IP packet, the header size can be 20 bytes; therefore, the
maximum of UDP would be 65,535 minus 20. The size of the data that the UDP
packet can carry would be 65,535 minus 28 as 8 bytes for the header of the UDP
packet and 20 bytes for IP header.
269
Data Communication and Computer Networks Unit – 9
270
Data Communication and Computer Networks Unit – 9
server generates the processes that provide services. The queues are available for
both the processes, i.e., two queues for each process. The first queue is the
incoming queue that receives the messages, and the second one is the outgoing
queue that sends the messages. The queue functions when the process is
running. If the process is terminated then the queue will also get destroyed.
UDP handles the sending and receiving of the UDP packets with the help of the
following components:
o Input queue: The UDP packets uses a set of queues for each process.
o Input module: This module takes the user datagram from the IP, and then
it finds the information from the control block table of the same port. If it
finds the entry in the control block table with the same port as the user
datagram, it enqueues the data.
o Control Block Module: It manages the control block table.
o Control Block Table: The control block table contains the entry of open
ports.
o Output module: The output module creates and sends the user datagram.
Several processes want to use the services of UDP. The UDP multiplexes and
demultiplexes the processes so that the multiple processes can run on a single
host.
Limitations
Advantages
271
Data Communication and Computer Networks Unit – 9
SCTP Services
Step1: The two SCTPs establish the connection with each other.
Step2: Once the connection is established, the data gets exchanged in both the
directions.
Step3: Finally, the association is terminated.
5. Reliability
SCTP uses an acknowledgement mechanism to check the arrival of data.
272
Data Communication and Computer Networks Unit – 9
Features of SCTP
3. Packets
In SCTP, the data is carried out in the form of data chunks and control
information is carried as control chunks. Data chunks and control chunks are
packed together in the packet.
4. Multihoming
Multihoming allows both ends (sender and receiver) to define multiple IP
addresses for communication. But, only one of these can be defined as primary
address and the remaining can be used as alternative addresses.
TCP protocol has methods for finding out corrupted segments, missing segments,
out-of-order segments and duplicated segments.
Error control in TCP is mainly done through use of three simple techniques :
273
Data Communication and Computer Networks Unit – 9
274
Data Communication and Computer Networks Unit – 9
Slow Start Phase : exponential increment – In this phase after every RTT the
congestion window size increments exponentially.
Initially cwnd = 1
Congestion Avoidance Phase : additive increment – This phase starts after the
threshold value also denoted as ssthresh. The size of cwnd(congestion window)
increases additive. After each RTT cwnd = cwnd + 1.
Initially cwnd = i
After 1 RTT, cwnd = i+1
275
Data Communication and Computer Networks Unit – 9
276
Data Communication and Computer Networks Unit – 9
Flow Control basically means that TCP will ensure that a sender is not
overwhelming a receiver by sending packets faster than it can consume. It’s pretty
similar to what’s normally called Back pressure in the Distributed Systems
literature. The idea is that a node receiving data will send some kind of feedback
to the node sending the data to let it know about its current condition.
It’s important to understand that this is not the same as Congestion Control.
Although there’s some overlap between the mechanisms TCP uses to provide
both services, they are distinct features. Congestion control is about preventing a
node from overwhelming the network (i.e. the links between two nodes), while
Flow Control is about the end-node.
How it works
When we need to send data over a network, this is normally what happens.
The sender application writes data to a socket, the transport layer (in our
case, TCP) will wrap this data in a segment and hand it to the network layer
(e.g. IP), that will somehow route this packet to the receiving node.
On the other side of this communication, the network layer will deliver this piece
of data to TCP, that will make it available to the receiver application as an exact
277
Data Communication and Computer Networks Unit – 9
copy of the data sent, meaning if will not deliver packets out of order, and will
wait for a retransmission in case it notices a gap in the byte stream.
TCP stores the data it needs to send in the send buffer, and the data it receives in
the receive buffer. When the application is ready, it will then read data from the
receive buffer.
Flow Control is all about making sure we don’t send more packets when the
receive buffer is already full, as the receiver wouldn’t be able to handle them and
would need to drop these packets.
To control the amount of data that TCP can send, the receiver will advertise
its Receive Window (rwnd), that is, the spare room in the receive buffer.
278
Data Communication and Computer Networks Unit – 9
Every time TCP receives a packet, it needs to send an ack message to the sender,
acknowledging it received that packet correctly, and with this ack message it
sends the value of the current receive window, so the sender knows if it can keep
sending data.
Flow control in SCTP is similar to that in TCP. In SCTP, we need to handle two units
of data, the byte and the chunk. The values of rwnd and cwnd are expressed in
bytes; the values of TSN and acknowledgments are expressed in chunks. Current
SCTP implementations still use a byte-oriented window for flow control.
Receiver Site:
The receiver has one buffer (queue) and three variables. The queue holds the
received data chunks that have not yet been read by the process. The first
variable holds the last TSN received, cumTSN. The second variable holds the
available buffer size; winsize. The third variable holds the last accumulative
acknowledgment, lastACK. The following figure shows the queue and variables at
the receiver site.
279
Data Communication and Computer Networks Unit – 9
1. When the site receives a data chunk, it stores it at the end of the buffer (queue)
and subtracts the size of the chunk from winSize. The TSN number of the chunk is
stored in the cumTSN variable.
2. When the process reads a chunk, it removes it from the queue and adds the
size of the removed chunk to winSize (recycling).
3. When the receiver decides to send a SACK, it checks the value of lastAck; if it is
less than cumTSN, it sends a SACK with a cumulative TSN number equal to the
cumTSN. It also includes the value of winSize as the advertised window size.
Sender Site:
The sender has one buffer (queue) and three variables: curTSN, rwnd, and
inTransit, as shown in the following figure. We assume each chunk is 100 bytes
long.
The buffer holds the chunks produced by the process that either have been sent
or are ready to be sent. The first variable, curTSN, refers to the next chunk to be
sent. All chunks in the queue with a TSN less than this value have been sent, but
not acknowledged; they are outstanding. The second variable, rwnd, holds the
last value advertised by the receiver (in bytes). The third variable, inTransit, holds
the number of bytes in transit, bytes sent but not yet acknowledged. The
following is the procedure used by the sender.
1. A chunk pointed to by curTSN can be sent if the size of the data is less than or
equal to the quantity rwnd - inTransit. After sending the chunk, the value of
280
Data Communication and Computer Networks Unit – 9
curTSN is incremented by 1 and now points to the next chunk to be sent. The
value of inTransit is incremented by the size of the data in the transmitted chunk.
2. When a SACK is received, the chunks with a TSN less than or equal to the
cumulative TSN in the SACK are removed from the queue and discarded. The
sender does not have to worry about them anymore. The value of inTransit is
reduced by the total size of the discarded chunks. The value of rwnd is updated
with the value of the advertised window in the SACK.
SCTP, like TCP, is a reliable transport layer protocol. It uses a SACK chunk to report
the state of the receiver buffer to the sender. Each implementation uses a
different set of entities and timers for the receiver and sender sites.
Receiver Site:
The receiver stores all chunks that have arrived in its queue including the out-of-
order ones. However, it leaves spaces for any missing chunks. It discards duplicate
messages, but keeps track of them for reports to the sender. The following figure
shows a typical design for the receiver site and the state of the receiving queue at
a particular point in time.
281
Data Communication and Computer Networks Unit – 9
The last acknowledgment sent was for data chunk 20. The available window size is
1000 bytes. Chunks 21 to 23 have been received in order. The first out-of-order
block contains chunks 26 to 28. The second out-of-order block contains chunks 31
to 34. A variable holds the value of cumTSN. An array of variables keeps track of
the beginning and the end of each block that is out of order. An array of variables
holds the duplicate chunks received. Note that there is no need for storing
duplicate chunks in the queue and they will be discarded.
The figure also shows the SACK chunk that will be sent to report the state of the
receiver to the sender. The TSN numbers for out-of-order chunks are relative
(offsets) to the cumulative TSN.
Sender Site
At the sender site, it needs two buffers (queues): a sending queue and a
retransmission queue. We also use the three variables rwnd, inTransit, and
curTSN as described in the previous section. The following figure shows a typical
design.
282
Data Communication and Computer Networks Unit – 9
The sending queue holds chunks 23 to 40. The chunks 23 to 36 have already been
sent, but not acknowledged; they are outstanding chunks. The curTSN points to
the next chunk to be sent (37). We assume that each chunk is 100 bytes, which
means that 1400 bytes of data (chunks 23 to 36) is in transit.
The sender at this moment has a retransmission queue. When a packet is sent, a
retransmission timer starts for that packet (all data chunks in that packet). Some
implementations use one single timer for the entire association, but we continue
with our tradition of one timer for each packet for simplification.
When the retransmission timer for a packet expires, or four duplicate SACKs
arrive that declare a packet as missing the chunks in that packet are moved to the
retransmission queue to be resent. These chunks are considered lost, rather than
outstanding. The chunks in the retransmission queue have priority.
283
Data Communication and Computer Networks Unit – 9
•SCTP maintains a separate cwnd parameter for each peer destination address in
multihomed scenarios.
•As defined in RFC2581, the transmission rate starts slowly at the beginning (slow
start phase), based on feedback provided by received SACK chunks. After the slow
start phase, SCTP enters the congestion avoidance phase. In case of congestion in
the network, SCTP immediately reverts back to the slow start phase.
cwnd and rwnd (or a_rwnd = advertised receiver window size) define 2 windows
where the smaller of the 2 determines the maximum amount of data that can be
sent.
After the slow start phase, cwnd is large so that rwnd becomes the dominant
window size.
The general mechanism applied in SCTP congestion control (as per RFC2581) is to
slowly increase the congestion window size cwnd, but to rapidly collapse the
window when there are signs of congestion.
Packet loss is deemed a sign of congestion. Note, however, that this is not always
true (e.g. on wireless links there may be packet loss due to radio signal
interferences).
285
Data Communication and Computer Networks Unit – 9
WWW
The full form of WWW is the World Wide Web. WWW is also called a Web and it
is a catalogue of an order of all websites connected to the worldwide Internet. It
is an information system in which linked hypertext data and resources are
accessed over the Internet. Using a web browser, a user can access a web page
and a user can navigate between the web pages using hyperlinks where images,
texts, and other multimedia data and content can be carried on a website page.
History of WWW
Advantages
Disadvantages
Many pages could be misleading, and may steal our data, cash
Abuse, harassment, racism etc are common nowadays.
End users use URLs by typing them directly into the address bar of a browser or
by clicking a hyperlink found on a webpage, bookmark list, in an email or from
another application.
The URL contains the name of the protocol needed to access a resource, as well
as a resource name. The first part of a URL identifies what protocol to use as the
primary access medium. The second part identifies the IP address or domain
name -- and possibly subdomain -- where the resource is located.
URL protocols include HTTP (Hypertext Transfer Protocol) and HTTPS (HTTP
Secure) for web resources, mail to for email addresses, FTP for files on a File
Transfer Protocol (FTP) server, and telnet for a session to access remote
computers. Most URL protocols are followed by a colon and two forward slashes;
“mail to” is followed only by a colon.
287
Data Communication and Computer Networks Unit – 9
The additional information about the URL is described below with the help of an
example:
http:// or https://
The http is a protocol that stands for Hypertext Transfer Protocol. It tells the
browser to which protocol will be preferred to use for accessing the information
that is specified in the domain.
www.
288
Data Communication and Computer Networks Unit – 9
o The www is used to distinguish the content, which stands for World Wide
Web. This portion of the URL can be left out many times, as it is not
required..
deh.htm
The jtp.htm is the name of the web page, and the .htm is the file extension of the
web page, which describes the file is an HTML file. There are many other file
extensions available on the internet such as .php, .html, .xml, .jpg, .gif, .asp, .cgi,
etc.
A URL is located in the address bar or search bar at the top of the browser
window. The URL is always visible in the desktop computers and laptop unless our
browser is being displayed in full screen. In most of the smartphones and tablets,
when you scroll down the page, the URL will disappear and only show the domain
when visible. To visible the address bar, you need to scroll up the page. And, if
only the domain is shown and you want to see full address, tapping on the
address bar to show the full address.
It is realized by many people that space is not allowed in a URL. The URL string can
contain only symbols ! $-_+*'(), including alphanumeric characters as it is
documented in RFC 1738. Any other characters must be encoded in the URL if
needed.
289
Data Communication and Computer Networks Unit – 9
Why URL?
o The URL is beneficial, as the written information in the URL provides users
the option to switch from one web page to another by clicking only one
mouse click.
o Every URL is unique and tells users how to access a specific resource.
o When a user types a URL into the web browser and opens any hyperlink
from search results, the browser forwards a request to a webserver to fetch
files related to thesearch query.
o A website domain or URL identifies one particular file, and it is the most
important part of your website. Usually, by using words that end with .net,
.com, or .org, you can get traffic on your website.
DNS
The Domain Name System (DNS) is the phonebook of the Internet. Humans access
information online through domain names, like nytimes.com or espn.com. Web
browsers interact through Internet Protocol (IP) addresses. DNS translates
domain names to IP addresses so browsers can load Internet resources.
The full form of DNS is the Domain Name System . DNS is linked to the internet
and focused on a system using Internet Protocol ( IP). DNS servers are required
for the working of DNS. The IP address is calculated with the aid of a lookup table.
290
Data Communication and Computer Networks Unit – 9
Each computer system or website has its own unique IP address. It’s a lengthy
digital code. DNS is an IP service that translates the name of a domain into an
individual IP address. DNS is alphabetic, and thus convenient and straightforward.
Each device connected to the Internet has a unique IP address which other
machines use to find the device. DNS servers eliminate the need for humans to
memorize IP addresses such as 192.168.1.1 (in IPv4), or more complex newer
alphanumeric IP addresses such as 2400:cb00:2048:1::c629:d7a2 (in IPv6).
DNS
DNS is a TCP/IP protocol used on different platforms. The domain name space is
divided into three different sections: generic domains, country domains, and
inverse domain.
291
Data Communication and Computer Networks Unit – 9
Generic Domains
Label Description
292
Data Communication and Computer Networks Unit – 9
293
Data Communication and Computer Networks Unit – 9
Country Domain
The format of country domain is same as a generic domain, but it uses two-
character country abbreviations (e.g., us for the United States) in place of three
character organizational abbreviations.
Inverse Domain
The inverse domain is used for mapping an address to a name. When the server
has received a request from the client, and the server contains the files of only
authorized clients. To determine whether the client is on the authorized list or
not, it sends a query to the DNS server and ask for mapping an address to the
name.
Working of DNS
294
Data Communication and Computer Networks Unit – 9
Root nameserver - The root server is the first step in translating (resolving)
human readable host names into IP addresses. It can be thought of like an
index in a library that points to different racks of books - typically it serves
as a reference to other more specific locations.
TLD nameserver - The top level domain server (TLD) can be thought of as a
specific rack of books in a library. This nameserver is the next step in the
search for a specific IP address, and it hosts the last portion of a hostname
(In example.com, the TLD server is “com”).
Authoritative nameserver - This final nameserver can be thought of as a
dictionary on a rack of books, in which a specific name can be translated
into its definition. The authoritative nameserver is the last stop in the
nameserver query. If the authoritative name server has access to the
requested record, it will return the IP address for the requested hostname
back to the DNS Recursor (the librarian) that made the initial request.
DNS is essential because, while domain names are easy to remember for people,
computers or devices, sites are accessed based on IP addresses. Working in DNS is
processed, with the help of DNS servers. Into a web browser, when a domain
name entered by the user, the supplication goes to the DNS server. The DNS
server decides the IP address by using a lookup table. Then, it transmits the
supplied information to the user’s web browser through genuine servers.
Information from all website domain servers on the internet is collected and kept
at the Central Registry. Host companies and service providers regularly interact
with the Central Registry to obtain updated DNS data. Your Internet Service
Provider will view the DNS associated with the domain name when you type in a
web address, translate it into a machine-friendly IP address and direct your
Internet connection to the correct website. Usually, it takes around 12-36 hours
for the domain name servers world-wide to be updated and able to obtain the
data after you register a new domain name or when updating the DNS servers on
your domain name. These 36 hours is called propagation.
295
Data Communication and Computer Networks Unit – 9
The number of features is responsible for the success of DNS, some of them
are
A DNS consists of a distributed database.
Additional lists of data are also reserved within the DNS database.
DNS server offers user interface and excellent features. A considerable
amount of DNS has to be managed through the user interface.
Advantages
Disadvantages
ICANN can control the DNS root registry that is a private non – profit
organization that connects to a particular country and difficulties the
abstract idea of network neutrality.
The collapse of DNS would destroy the World Wide Web(WWW), even if
there are more than one root server and backup servers, which will cause
immense harm at different locations, DNS servers have decided.
Name-to-Address Resolution
296
Data Communication and Computer Networks Unit – 9
remote machine's address, the program requests assistance from the DNS
software running on your local machine, which is considered a DNS client.
Your machine sends a request to a DNS name server, which maintains the
distributed DNS database. The files in the DNS database bear little resemblance to
the NIS+ host or ipnodes Table or even the
local /etc/hosts or /etc/inet/ipnodes file, though they maintain similar
information: the host names, the ipnode names, IPv4 and IPv6 addresses, and
other information about a particular group of computers. The name server uses
the host name our machine sent as part of its request to find or “resolve” the IP
address of the remote machine. It then returns this IP address to our local
machine if the host name is in its DNS database.
If the host name is not in that name server's DNS database, this indicates that the
machine is outside of its authority, or, to use DNS terminology, outside the local
administrative domain. Thus, each name server is spoken of as being
“authoritative” for its local administrative domain.
Fortunately, the local name server maintains a list of host names and IP addresses
of root domain name servers, to which it will forward the request from our
machine. These root name servers are authoritative for huge organizational
domains, as explained fully in DNS Hierarchy and the Internet. These hierarchies
resemble UNIX file systems, in that they are organized into an upside down tree
structure.
Each root name server maintains the host names and IP addresses of top level
domain name servers for a company, a university, or other large organizations.
297
Data Communication and Computer Networks Unit – 9
The root name server sends our request to the top-level name servers that it
knows about. If one of these servers has the IP address for the host you
requested, it will return the information to our machine. If the top-level servers
do not know about the host you requested, they pass the request to second-level
name servers for which they maintain information. Our request is then passed on
down through the vast organizational tree. Eventually, a name server that has
information about our requested host in its database will return the IP address
back to our machine.
The following figure shows name-to-address resolution outside the local domain.
298
Data Communication and Computer Networks Unit – 9
Email messages are conveyed through email servers; it uses multiple protocols
within the TCP/IP suite. For example, SMTP is a protocol, stands for simple mail
transfer protocol and used to send messages whereas other protocols IMAP or
POP are used to retrieve messages from a mail server. If we want to login to our
mail account, we just need to enter a valid email address, password, and the mail
servers used to send and receive messages.
Although most of the webmail servers automatically configure your mail account,
therefore, we only required to enter your email address and password. However,
we may need to manually configure each account if we use an email client like
Microsoft Outlook or Apple Mail. In addition, to enter the email address and
password, we may also need to enter incoming and outgoing mail servers and the
correct port numbers for each one.
The email was developed to support rich text with custom formatting, and the
original email standard is only capable of supporting plain text messages. In
modern times, email supports HTML (Hypertext markup language), which makes
it capable of emails to support the same formatting as websites. The email that
supports HTML can contain links, images, CSS layouts, and also can send files or
"email attachments" along with messages. Most of the mail servers enable users
to send several attachments with each message. The attachments were typically
limited to one megabyte in the early days of email. Still, nowadays, many mail
servers are able to support email attachments of 20 megabytes or more in size.
299
Data Communication and Computer Networks Unit – 9
In 1971, as a test e-mail message, Ray Tomlinson sent the first e-mail to himself.
This email was contained the text "something like QWERTYUIOP." However, the
e-mail message was still transmitted through ARPANET, despite sending the e-
mail to himself. Most of the electronic mail was being sent as compared to postal
mail till 1996.
The term email is commonly used to describe both browser-based electronic mail
and non-browser-based electronic mail today. The AOL and Gmail are browser-
based electronic mails, whereas Outlook for Office 365 is non-browser-based
electronic mail. However, to define email, a difference was earlier made as a non-
browser program that needed a dedicated client and email server. The non-
browser emails offered some advantages, which are enhanced security,
integration with corporate software platforms, and lack of advertisements.
Uses of email
Email can be used in different ways: it can be used to communicate either within
an organization or personally, including between two people or a large group of
people. Most people get benefit from communicating by email with colleagues or
friends or individuals or small groups. It allows you to communicate with others
around the world and send and receive images, documents, links, and other
attachments. Additionally, it offers benefit users to communicate with the
flexibility on their own schedule.
There is another benefit of using email; if you use it to communicate between two
people or small groups that will beneficial to remind participants of approaching
due dates and time-sensitive activities and send professional follow-up emails
after appointments. Users can also use the email to quickly remind all upcoming
events or inform the group of a time change. Furthermore, it can be used by
companies or organizations to convey information to large numbers of employees
or customers. Mainly, email is used for newsletters, where mailing list subscribers
are sent email marketing campaigns directly and promoted content from a
company.
Email can also be used to move a latent sale into a completed purchase or turn
leads into paying customers. For example, a company may create an email that is
300
Data Communication and Computer Networks Unit – 9
History of E-mail
As compared to ARPANet or the Internet, email is much older. The early email
was just a small advance, which is known as a file directory in nowadays. It was
used to just put a message in other user's directory in the place where they were
able to see the message by logging in. For example, the same as leaving a note on
someone's desk. Possibly MAILBOX was used at Massachusetts Institute of
Technology, which was the first email system of this type from 1965. For sending
messages on the same computer, another early program was SNDMSG.
Users were only able to send messages to several users of the same computer
through email when the internetworking was not beginning. And, the problem
became a little more complex when computers began to talk to each other over
networks, we required to put a message in an envelope and address it for the
destination.
Although the World Wide Web offers many services, email is the most widely
used facility and remains the most important application of the Internet. On the
international level, over 600 million people use email. There were hundreds of
email users by 1974, as ARPANET ultimately encouraged it. Furthermore, email
caused a radical shift in Arpa's purpose, as it became the savior of Arpanet.
301
Data Communication and Computer Networks Unit – 9
From there were rapid developments in the field of the email system. A big
enhancement was to sort emails; some email folders for his boss were invented
by Larry Roberts. To organize an email, John Vittal developed some software in
1976. By 1976 commercial packages began to appear, and email had really taken
off. The email had changed people and took them from Arpanet to the Internet.
Here was appeared some interesting features that ordinary people all over the
world wanted to use.
Some years later, Ray Tomlinson observed about email. As compared to the
previous one, any single development is stepping rapidly and nearly followed by
the next. I think that all the developments would take a big revolution.
When personal computers came on the scene, the offline reader was one of the
first new developments. Then, email users became able to store their email on
their own personal computers with the help of offline reader and read it. Also,
without actually being connected to the network, they were able to prepare
replies like Microsoft Outlook can do today. In parts of the world, this was
specifically useful for people where the telephone was expensive as compared to
the email system.
The SMTP (simple mail transfer protocol) was the first important email standard.
It was a fairly naïve protocol that is still in use. And, it was made in terms of no
attempt to find the person who sent a message that was the right or not what
they claimed to be. In the email addresses, fraudulent was very easy and is still
available. Later, these basic flaws were used in the protocol by security frauds,
worms and viruses, and spammers forging identities. From 2004, some of these
problems are still being processed for a solution.
302
Data Communication and Computer Networks Unit – 9
But as developed email system offered some important features that helped out
people to understand easily about email. In 1988, Steve Dorner developed Eudora
that was one of the first good commercial systems. But it did not appear for a
long time after Pegasus mail come. Servers began to appear as a standard when
Internet standards POP (Post office protocol) for email began to mature. Each
server was a little different before standard post office protocol (POP). POP was
an important standard that allowed users to work together.
Individual dialup users were required to charges for an email per-minute in those
days. Also, on the Internet, email and email discussion groups were the main uses
for most people. There were several issues on a wide variety of subjects; they
became USENET as a body of newsgroups.
With the World Wide Web (WWW), email became available with a simple user
interface that was offered by providers like Hotmail and Yahoo. And, users did not
require to pay any charges on these platforms. Now everyone wanted at least one
email address as it is much simple and affordable, and the medium was adopted
by millions of people.
Internet Service Providers (ISPs) started to connect people with each other all
over the world by the 1980s. Also, by 1993 the use of the Internet was becoming
widespread, and the word electronic mail was replaced by email.
Today, email has become a primary platform to communicate with people all over
the world. There are continuing updates to the system with so many people using
email for communication. Although email has some security issues, there have
been laws passed to prevent the spread of junk email over the years.
Advantages of Email
303
Data Communication and Computer Networks Unit – 9
Disadvantages of Email
304
Data Communication and Computer Networks Unit – 9
o Malicious Use: As email can be sent by anyone if they have an only email
address. Sometimes, an unauthorized person can send you mail, which can
be harmful in terms of stealing your personal information. Thus, they can
also use email to spread gossip or false information.
o Accidents Will Happen: With email, you can make fatal mistakes by clicking
the wrong button in a hurry. For instance, instead of sending it to a single
person, you can accidentally send sensitive information to a large group of
people. Thus, the information can be disclosed, when you have clicked the
wrong name in an address list. Therefore, it can be harmful and generate
big trouble in the workplace.
o Spam: Although in recent days, the features of email have been improved,
there are still big issues with unsolicited advertising arriving and spam
through email. It can easily become overwhelming and takes time and
energy to control.
o Information Overload: As it is very easy to send email to many people at a
time, which can create information overload. In many modern workplaces,
it is a major problem where it is required to move a lot of information and
impossible to tell if an email is important. And, email needs organization
and upkeep. The bad feeling is one of the other problems with email when
you returned from vacation and found hundreds of unopened emails in
your inbox.
o Viruses: Although there are many ways to travel viruses in the devices,
email is one of the common ways to enter viruses and infect devices.
Sometimes when you get a mail, it might be the virus come with an
attached document. And, the virus can infect the system when you click on
the email and open the attached link. Furthermore, an anonymous person
or a trusted friend or contact can send infected emails.
o Pressure to Respond: If you get emails and you do not answer them, the
sender can get annoyed and think you are ignoring them. Thus, this can be
a reason to make pressure on your put to keep opening emails and then
respond in some way.
o Time Consuming: When you get an email and read, write, and respond to
emails that can take up vast amounts of time and energy. Many modern
workers spend their most time with emails, which may be caused to take
more time to complete work.
305
Data Communication and Computer Networks Unit – 9
306
Data Communication and Computer Networks Unit – 9
service, reduced or omitted fees for managed services, or percentage off the
purchase price.
Standalone Emails: These emails are popular like newsletters emails, but they
contain a limitation. If you want to send an email with multiple links or blurbs,
your main call-to-action can weaken. Your subscriber may skip your email and
move on, as they may click on the first link or two in your email but may not come
back to the others.
Plain-Text Emails: It is a simple email that does not include images or graphics
and no formatting; it only contains the text. These types of emails may worth it if
you try to only ever send fancy formatted emails, text-only messages. According
to HubSpot, although people prefer fully designed emails with various images,
plain text emails with less HTML won out in every A/B test. In fact, HTML emails
contain lower open and click-through rates, and plain text emails can be great for
blog content, event invitations, and survey or feedback requests. Even if you do
not send plainer emails, but you can boost your open and click through rates by
simplifying your emails and including fewer images.
307
Data Communication and Computer Networks Unit – 9
sent buyers who got a subscription to a business's opt-in activities, such as a blog,
mailing list, or webinar. Also, these emails can help businesses to build a better
relationship between customers.
Although there are many ways to travel viruses in the devices, email is one of the
most common vectors for cyberattacks. The methods include spoofing,
spamming, spear-phishing, phishing, ransomware, and business email
compromise (BEC).
There are many organizations (around 7710) hit by a BEC attack every month, as
one out of every 412 emails contains a malware attack. According to the
Symantec Internet Threat Security Report, spear-phishing is the most widely used
infection vector. Below is given a complete description of these types of attacks:
o Phishing: A form of fraud in which the attacks are the practice of sending
fraudulent communications that appear to come from a reputable entity or
person in email or other communication channels. Usually, it is done
through the email; phishing emails are used by attackers to steal sensitive
data like credit card and login information or to install malware on the
victim's machine. Additionally, everyone should learn about a phishing
attack in order to protect themselves, as it is a common type of
cyberattack. The common features of phishing emails are Sense of urgency,
Hyperlinks, Too Good to Be True, Unusual sender, Attachments.
o Spamming: Spam email is unsolicited bulk messages sent without explicit
consent from the recipient, which is also known as junk email. Since the
1990s, spam is a problem faced by most email users and has been
increasing in popularity. Obtained by spambots, spam mail recipients have
had their email addresses (automated programs), which crawl the Internet
to find email addresses. This is the dark side of email marketing in which
spammers use spambots to create email distribution lists. Typically, an
email is sent by a spammer to millions of email addresses with the
expectation that only a few numbers of an email address will respond or
interact with the message.
o Spoofing: Email spoofing is an email message that could be obtained from
someone or somewhere other than the intended source. It is a popular
308
Data Communication and Computer Networks Unit – 9
There are some free email website examples include the following:
309
Data Communication and Computer Networks Unit – 9
o AOL
o Zoho
o Gmail
o ProtonMail
o Com
o Microsoft Outlook
o Yahoo Mail
There are many techniques that can be used by individuals, organizations, and
service providers. These techniques provide how to protect sensitive information
with email communication and accounts from unauthorized access, loss, or
destruction.
Individuals can protect their account with the help of creating strong passwords
and changing them frequently. They can use alphabetical, numerical, special
symbols to make a strong password that helps to protect your account. Users can
also install and run an antivirus and antimalware software on their computer, as
well as create spam filters and folders to separate potentially malicious emails
and junk mail.
Also, there are some techniques the helps organizations to secure email include
implementing an email security gateway, training employees on deploying
automated email encryption solutions, and proper email usage. By processing and
scanning all received emails, email gateways check emails for threats, and analyze
that should be allowed into the system or not. A multilayered gateway is a
powerful technique since attacks are increasing rapidly and becoming
complicated and sophisticated. Some emails that cannot be caught by the
gateway, training employees on how to differentiate malicious messages, and
properly use email are the best approach, which helps users avoid threatening
mails.
310
Data Communication and Computer Networks Unit – 9
before it is sent to the intended recipient. This process helps to send email
securely and prevent hackers from gaining access to the secret information, even
if they stop it. The only intended recipient can view the original information with
permission.
Email service providers can also help to enhance security with the help of
accessing control standards and mechanisms and establishing a strong password.
Additionally, providers should also offer digital signatures and encryption
solutions to secure emails in transit and in users' inboxes. Finally, to protect users
from malicious, unrecognized, and untrustworthy messages, service providers
should implement firewalls and spam-filtering software applications.
You can use any word email or e-mail according to the style guide you are
following as both are valid and have the same meaning. However, the e-mail
word has a hyphen and is a compound noun that describes "electronic" and
"mail."
E-mail program
You can use an email program to send and receive an email. An email program is
also known as an e-mail client. There are many email programs available to send
311
Data Communication and Computer Networks Unit – 9
Online e-mail
An online e-mail service or webmail is an alternative way and the popular solution
for most people in sending and receiving e-mail. Examples of online emails are
Yahoo Mail, Gmail, and Hotmail (now Outlook.com).
Today, there are different software-based e-mail clients available for users, but
these are not online. Below is given a list that contains the most popular clients.
o Microsoft Outlookv
o Mail for Windows 10
o DreamMail
o Mozilla Thunderbird
o eM Client
o Mailbird
Users need to follow the various rule that is given below to make valid email
address:
312
Data Communication and Computer Networks Unit – 9
work must be preceded with a forward slash. But these characters are not
allowed by some email providers.
o In the email, the email address and username cannot start or end with a
period.
o The two or more successive periods are not allowed in the email.
SMTP
Email is emerging as one of the most valuable services on the internet today.
Most of the internet systems use SMTP as a method to transfer mail from one
user to another. SMTP is a push protocol and is used to send the mail whereas
POP (post office protocol) or IMAP (internet message access protocol) are used to
retrieve those mails at the receiver’s side.
SMTP Fundamentals
SMTP is an application layer protocol. The client who wants to send the mail
opens a TCP connection to the SMTP server and then sends the mail across the
connection. The SMTP server is always on listening mode. As soon as it listens for
a TCP connection from any client, the SMTP process initiates a connection on that
port (25). After successfully establishing the TCP connection the client process
sends the mail instantly.
SMTP Protocol
313
Data Communication and Computer Networks Unit – 9
In the SMTP model user deals with the user agent (UA) for example Microsoft
Outlook, Netscape, Mozilla, etc. In order to exchange the mail using TCP, MTA is
used. The users sending the mail do not have to deal with the MTA it is the
responsibility of the system admin to set up the local MTA. The MTA maintains a
small queue of mails so that it can schedule repeat delivery of mail in case the
receiver is not available. The MTA delivers the mail to the mailboxes and the
information can later be downloaded by the user agents.
314
Data Communication and Computer Networks Unit – 9
SENDING EMAIL:
Mail is sent by a series of request and response messages between the client and
a server. The message which is sent across consists of a header and the body. A
null line is used to terminate the mail header. Everything which is after the null
line is considered as the body of the message which is a sequence of ASCII
characters. The message body contains the actual information read by the
receipt.
RECEIVING EMAIL:
The user agent at the server side checks the mailboxes at a particular time of
intervals. If any information is received it informs the user about the mail. When
the user tries to read the mail it displays a list of mails with a short description of
each mail in the mailbox. By selecting any of the mail user can view its contents
on the terminal.
HELO – Identifies the client to the server, fully qualified domain name, only
sent once per session
MAIL – Initiate a message transfer, fully qualified domain of originator
RCPT – Follows MAIL, identifies an addressee, typically the fully qualified
name of the addressee and for multiple addressees use one RCPT for each
addressee
DATA – send data line by line
POP
POP stands for Point of Presence (also known as Post Office Protocol).
It is a point where many devices share a connection and can communicate with
each other. We can say that it is a man-made demarcation point (a point where
the public network of a company ends and the private network of the customer
begins for eg. the point at which your broadband cable enters the house)
between communicating entities. It basically consists of high-speed
telecommunications equipment and technologies helps in bringing together
people from all over the internet.
315
Data Communication and Computer Networks Unit – 9
An example of this would be the local access point that connects customers via
their internet service provider (ISP) to the rest of the world. The size of an ISP can
be calculated by seeing the number of POPs that the service provider has. The
normal houses routers, modems, servers, switches, and other such devices that
have to share data over networks all use POPs. Internet Service Providers have
multiple POPs.
Characteristics of POP :
Post Office Protocol is an open protocol, defined by Internet RFCs.
It allows access to new mail from a spread of client platform types.
It supports download and delete functions even when offline.
It requires no mail gateways due to its native nature.
POP can handle email access only while the emails are sent by SMTP.
RFC 918 got published in 1984 which defined the Post Office Protocol (POP). The
explanation of why POP came in the picture was to supply a neater way for a
client computer to retrieve e-mail on an SMTP (Simple Mail Transfer Protocol)
server so that it can be used locally. POP Version 2 got published in 1985.
Examples:
Carrier hotels :
These buildings are extremely secure with size averaging around 54, 000
square feet. These hotels offer hardware and software installation,
updation and several other services.
Meet-me rooms :
Meet-Me Rooms (MMRs) are small space inside carrier hotels, averaging
around 5, 000 square feet. These small rooms house interconnects
networking equipment owned by many telecommunication companies.
316
Data Communication and Computer Networks Unit – 9
Working:
POP’s working is based on its five important equipment which are:
Advantages:
The latest version of Post Office Protocol (POP3) is that the most widely used
protocol and is being supported by most of the email clients.
It provides a convenient and standard way for users to access mailboxes and
download messages. An important advantage of this is that the mail messages get
delivered to the client PC and they can be read with or without accessing the web.
317
Data Communication and Computer Networks Unit – 9
Creation of latest messages impossible without being logged onto the web
All messages get stored on the disc drive of your computer
As the attachments are already on your PC, opening them may be a quicker
process
There isn’t any maximum size on your mailbox, except as determined by
the scale of your disc drive
Disadvantages:
Consumes large memory as all the messages are stored on the disc drive
Opening attachments may be a fast process unless the attachment contains
a virus
Since all attachments get downloaded on your computer, there’s a danger
of virus attack if they’re not
scanned by antivirus softwares as these scans are only 60% effective
Email folders can become corrupted and might even drift.
IMAP Protocol
It also follows the client/server model. On one side, we have an IMAP client,
which is a process running on a computer. On the other side, we have an IMAP
server, which is also a process running on another computer. Both computers are
connected through a network.
318
Data Communication and Computer Networks Unit – 9
The IMAP protocol resides on the TCP/IP transport layer which means that it
implicitly uses the reliability of the protocol. Once the TCP connection is
established between the IMAP client and IMAP server, the IMAP server listens to
the port 143 by default, but this port number can also be changed.
POP3 is becoming the most popular protocol for accessing the TCP/IP mailboxes.
It implements the offline mail access model, which means that the mails are
retrieved from the mail server on the local machine, and then deleted from the
mail server. Nowadays, millions of users use the POP3 protocol to access the
incoming mails. Due to the offline mail access model, it cannot be used as much.
The online model we would prefer in the ideal world. In the online model, we
need to be connected to the internet always. The biggest problem with the offline
access using POP3 is that the mails are permanently removed from the server, so
multiple computers cannot access the mails. The solution to this problem is to
store the mails at the remote server rather than on the local server. The POP3
also faces another issue, i.e., data security and safety. The solution to this
problem is to use the disconnected access model, which provides the benefits of
both online and offline access. In the disconnected access model, the user can
retrieve the mail for local use as in the POP3 protocol, and the user does not need
to be connected to the internet continuously. However, the changes made to the
mailboxes are synchronized between the client and the server. The mail remains
on the server so different applications in the future can access it. When
developers recognized these benefits, they made some attempts to implement
the disconnected access model. This is implemented by using the POP3
commands that provide the option to leave the mails on the server. This works,
but only to a limited extent, for example, keeping track of which messages are
new or old become an issue when both are retrieved and left on the server. So,
the POP3 lacks some features which are required for the proper disconnected
access model.
319
Data Communication and Computer Networks Unit – 9
The first version of IMAP was formally documented as an internet standard was
IMAP version 2, and in RFC 1064, and was published in July 1988. It was updated
in RFC 1176, August 1990, retaining the same version. So they created a new
document of version 3 known as IMAP3. In RFC 1203, which was published in
February 1991. However, IMAP3 was never accepted by the market place, so
people kept using IMAP2. The extension to the protocol was later created called
IMAPbis, which added support for Multipurpose Internet Mail Extensions (MIME)
to IMAP. This was a very important development due to the usefulness of MIME.
Despite this, IMAPbis was never published as an RFC. This may be due to the
problems associated with the IMAP3. In December 1994, IMAP version 4, i.e.,
IMAP4 was published in two RFCs, i.e., RFC 1730 describing the main protocol and
RFC 1731 describing the authentication mechanism for IMAP 4. IMAP 4 is the
current version of IMAP, which is widely used today. It continues to be refined,
and its latest version is actually known as IMAP4rev1 and is defined in RFC 2060.
It is most recently updated in RFC 3501.
IMAP Features
IMAP was designed for a specific purpose that provides a more flexible way of
how the user accesses the mailbox. It can operate in any of the three modes, i.e.,
online, offline, and disconnected mode. Out of these, offline and disconnected
modes are of interest to most users of the protocol.
o Access and retrieve mail from remote server: The user can access the mail
from the remote server while retaining the mails in the remote server.
o Set message flags: The message flag is set so that the user can keep track of
which message he has already seen.
320
Data Communication and Computer Networks Unit – 9
o Manage multiple mailboxes: The user can manage multiple mailboxes and
transfer messages from one mailbox to another. The user can organize
them into various categories for those who are working on various projects.
o Determine information prior to downloading: It decides whether to retrieve
or not before downloading the mail from the mail server.
o Downloads a portion of a message: It allows you to download the portion
of a message, such as one body part from the mime-multi part. This can be
useful when there are large multimedia files in a short-text element of a
message.
o Organize mails on the server: In case of POP3, the user is not allowed to
manage the mails on the server. On the other hand, the users can organize
the mails on the server according to their requirements like they can
create, delete or rename the mailbox on the server.
o Search: Users can search for the contents of the emails.
o Check email-header: Users can also check the email-header prior to
downloading.
o Create hierarchy: Users can also create the folders to organize the mails in
a hierarchy.
321
Data Communication and Computer Networks Unit – 9
1. The IMAP is a client-server protocol like POP3 and most other TCP/IP
application protocols. The IMAP4 protocol functions only when the IMAP4
must reside on the server where the user mailboxes are located. In c the
POP3 does not necessarily require the same physical server that provides
the SMTP services. Therefore, in the case of the IMAP protocol, the mailbox
must be accessible to both SMTP for incoming mails and IMAP for retrieval
and modifications.
2. The IMAP uses the Transmission Control Protocol (TCP) for communication
to ensure the delivery of data and also received in the order.
3. The IMAP4 listens on a well-known port, i.e., port number 143, for an
incoming connection request from the IMAP4 client.
The IMAP protocol synchronizes all the devices with the main server. Let's
suppose we have three devices desktop, mobile, and laptop as shown in the
above figure. If all these devices are accessing the same mailbox, then it will be
synchronized with all the devices. Here, synchronization means that when mail is
opened by one device, then it will be marked as opened in all the other devices, if
we delete the mail, then the mail will also be deleted from all the other devices.
So, we have synchronization between all the devices. In IMAP, we can see all the
folders like spam, inbox, sent, etc. We can also create our own folder known as a
custom folder that will be visible in all the other devices.
FTP
322
Data Communication and Computer Networks Unit – 9
Objectives of FTP
Why FTP?
Although transferring files from one system to another is very simple and
straightforward, but sometimes it can cause problems. For example, two systems
may have different file conventions. Two systems may have different ways to
represent text and data. Two systems may have different directory structures. FTP
protocol overcomes these problems by establishing two connections between
hosts. One connection is used for data transfer, and another connection is used
for the control connection.
Mechanism of FTP
323
Data Communication and Computer Networks Unit – 9
The above figure shows the basic model of the FTP. The FTP client has three
components: the user interface, control process, and data transfer process. The
server has two components: the server control process and the server data
transfer process.
o Control Connection: The control connection uses very simple rules for
communication. Through control connection, we can transfer a line of
command or line of response at a time. The control connection is made
between the control processes. The control connection remains connected
during the entire interactive FTP session.
o Data Connection: The Data Connection uses very complex rules as data
types may vary. The data connection is made between data transfer
processes. The data connection opens when a command comes for
transferring the files and closes when the file is transferred.
FTP Clients
Advantages of FTP:
o Speed: One of the biggest advantages of FTP is speed. The FTP is one of the
fastest way to transfer the files from one computer to another computer.
o Efficient: It is more efficient as we do not need to complete all the
operations to get the entire file.
o Security: To access the FTP server, we need to login with the username and
password. Therefore, we can say that FTP is more secure.
o Back & forth movement: FTP allows us to transfer the files back and forth.
Suppose you are a manager of the company, you send some information to
all the employees, and they all send information back on the same server.
Disadvantages of FTP:
o The standard requirement of the industry is that all the FTP transmissions
should be encrypted. However, not all the FTP providers are equal and not
all the providers offer encryption. So, we will have to look out for the FTP
providers that provides encryption.
o FTP serves two operations, i.e., to send and receive large files on a network.
However, the size limit of the file is 2GB that can be sent. It also doesn't
allow you to run simultaneous transfers to multiple receivers.
o Passwords and file contents are sent in clear text that allows unwanted
eavesdropping. So, it is quite possible that attackers can carry out the brute
force attack by trying to guess the FTP password.
o It is not compatible with every system.
Telnet
o The main task of the internet is to provide services to users. For example,
users want to run different application programs at the remote site and
transfers a result to the local site. This requires a client-server program
such as FTP, SMTP. But this would not allow us to create a specific program
for each demand.
o The better solution is to provide a general client-server program that lets
the user access any application program on a remote computer. Therefore,
a program that allows a user to log on to a remote computer. A popular
325
Data Communication and Computer Networks Unit – 9
Local Login
326
Data Communication and Computer Networks Unit – 9
Remote login
The user sends the keystrokes to the terminal driver, the characters are then sent
to the TELNET client. The TELNET client which in turn, transforms the characters
to a universal character set known as network virtual terminal characters and
delivers them to the local TCP/IP stack
327
Data Communication and Computer Networks Unit – 9
The commands in NVT forms are transmitted to the TCP/IP at the remote
machine. Here, the characters are delivered to the operating system and then
pass to the TELNET server. The TELNET server transforms the characters which
can be understandable by a remote computer. However, the characters cannot be
directly passed to the operating system as a remote operating system does not
receive the characters from the TELNET server. Therefore it requires some piece
of software that can accept the characters from the TELNET server. The operating
system then passes these characters to the appropriate application program.
328
Data Communication and Computer Networks Unit – 9
Network Administrator controls access to the data and software on the network.
A network administrator assigns the user ID and password to the authorized
person.
329
Data Communication and Computer Networks Unit – 9
o Privacy: Privacy means both the sender and the receiver expects
confidentiality. The transmitted message should be sent only to the
intended receiver while the message should be opaque for other users.
Only the sender and receiver should be able to understand the transmitted
message as eavesdroppers can intercept the message. Therefore, there is a
requirement to encrypt the message so that the message cannot be
intercepted. This aspect of confidentiality is commonly used to achieve
secure communication.
o Message Integrity: Data integrity means that the data must arrive at the
receiver exactly as it was sent. There must be no changes in the data
content during transmission, either maliciously or accident, in a transit. As
there are more and more monetary exchanges over the internet, data
integrity is more crucial. The data integrity must be preserved for secure
communication.
o End-point authentication: Authentication means that the receiver is sure of
the sender?s identity, i.e., no imposter has sent the message.
o Non-Repudiation: Non-Repudiation means that the receiver must be able
to prove that the received message has come from a specific sender. The
sender must not deny sending a message that he or she send. The burden
of proving the identity comes on the receiver. For example, if a customer
sends a request to transfer the money from one account to another
account, then the bank must have a proof that the customer has requested
for the transaction.
Malware
Types of Malware:
Viruses –
A Virus is a malicious executable code attached to another executable file.
The virus spreads when an infected file is passed from system to system.
Viruses can be harmless or they can modify or delete data. Opening a file
330
Data Communication and Computer Networks Unit – 9
can trigger a virus. Once a program virus is active, it will infect other
programs on the computer.
Worms –
Worms replicate themselves on the system, attaching themselves to
different files and looking for pathways between computers, such as
computer network that shares common file storage areas. Worms usually
slow down networks. A virus needs a host program to run but worms can
run by themselves. After a worm affects a host, it is able to spread very
quickly over the network.
Spyware –
Its purpose is to steal private information from a computer system for a
third party. Spyware collects information and sends it to the hacker.
Trojan horse –
A Trojan horse is malware that carries out malicious operations under the
appearance of a desired operation such as playing an online game. A Trojan
horse varies from a virus because the Trojan binds itself to non-executable
files, such as image files, audio files.
Logic Bombs –
A logic bomb is a malicious program that uses a trigger to activate the
malicious code. The logic bomb remains non-functioning until that trigger
event happens. Once triggered, a logic bomb implements a malicious code
that causes harm to a computer. Cybersecurity specialists recently
discovered logic bombs that attack and destroy the hardware components
in a workstation or server including the cooling fans, hard drives, and
power supplies. The logic bomb overdrives these devices until they
overheat or fail.
Ransomware –
Ransomware grasps a computer system or the data it contains until the
victim makes a payment. Ransomware encrypts data in the computer with
a key which is unknown to the user. The user has to pay a ransom (price) to
the criminals to retrieve data. Once the amount is paid the victim can
resume using his/her system.
Backdoors –
A backdoor bypasses the usual authentication used to access a system. The
purpose of the backdoor is to grant the cyber criminals future access to the
331
Data Communication and Computer Networks Unit – 9
Steganography
1. Text
2. Audio
3. Video
4. Images
5. Network or Protocol
Cryptography
332
Data Communication and Computer Networks Unit – 9
333
Data Communication and Computer Networks Unit – 9
Privacy
The concept of how to achieve privacy has not been changed for thousands of
years: the message cannot be encrypted. The message must be rendered as
opaque to all the unauthorized parties. A good encryption/decryption technique
is used to achieve privacy to some extent. This technique ensures that the
eavesdropper cannot understand the contents of the message.
Encryption/Decryption
Encryption: Encryption means that the sender converts the original information
into another form and sends the unintelligible message over the network.
The data which is to be encrypted at the sender site is known as plaintext, and the
encrypted data is known as ciphertext. The data is decrypted at the receiver site.
334
Data Communication and Computer Networks Unit – 9
335
Data Communication and Computer Networks Unit – 9
o The secret key requires that we should know which computers are talking
to each other so that we can install the key on each computer.
o The Data Encryption Standard (DES) was designed by IBM and adopted by
the U.S. government as the standard encryption method for nonmilitary
and nonclassified use.
o The Data Encryption Standard is a standard used for encryption, and it is a
form of Secret Key Cryptography.
Advantage
Efficient: The secret key algorithms are more efficient as it takes less time to
encrypt the message than to encrypt the message by using a public key
encryption algorithm. The reason for this is that the size of the key is small. Due to
this reason, Secret Key Algorithms are mainly used for encryption and decryption.
o Each pair of users must have a secret key. If the number of people wants to
use this method in the world is N, then there are N(N-1)/2 secret keys. For
example, for one million people, then there are half billion secret keys.
o The distribution of keys among different parties can be very difficult. This
problem can be resolved by combining the Secret Key
Encryption/Decryption with the Public Key Encryption/Decryption
algorithm.
o There are two keys in public key encryption: a private key and a public key.
o The private key is given to the receiver while the public key is provided to
the public.
336
Data Communication and Computer Networks Unit – 9
In the above figure, we see that A is sending the message to user B. 'A' uses the
public key to encrypt the data while 'B' uses the private key to decrypt the data.
o The main restriction of private key encryption is the sharing of a secret key.
A third party cannot use this key. In public key encryption, each entity
creates a pair of keys, and they keep the private one and distribute the
public key.
o The number of keys in public key encryption is reduced tremendously. For
example, for one million users to communicate, only two million keys are
required, not a half-billion keys as in the case of secret key encryption.
337
Data Communication and Computer Networks Unit – 9
338
Data Communication and Computer Networks Unit – 9
Speed Its speed is high as it uses a Its speed is slow as it uses two
single key for encryption and different keys, both keys are
decryption. related to each other through
the complicated mathematical
process.
Algorithms The Secret key algorithms are The Public key algorithms are
DES, 3DES, AES & RCA. Diffie-Hellman, RSA.
Digital Signature
The Digital Signature is a technique which is used to validate the authenticity and
integrity of the message. We know that there are four aspects of security: privacy,
authentication, integrity, and non-repudiation. We have already discussed the
first aspect of security and other three aspects can be achieved by using a digital
signature.
The basic idea behind the Digital Signature is to sign a document. When we send a
document electronically, we can also sign it. We can sign a document in two ways:
to sign a whole document and to sign a digest.
339
Data Communication and Computer Networks Unit – 9
Note: Digital Signature does not provide privacy. If there is a need for privacy,
then another layer of encryption/decryption is applied.
340
Data Communication and Computer Networks Unit – 9
341
Data Communication and Computer Networks Unit – 9
342
Data Communication and Computer Networks Unit – 9
A virtual private network (VPN) is a technology for using the Internet or another
intermediate network to connect computers to isolated remote computer
networks that would otherwise be inaccessible. A VPN provides varying levels of
security so that traffic sent through the VPN connection stays isolated from other
computers on the intermediate network, either through the use of a dedicated
connection from one “end” of the VPN to the other, or through encryption. VPNs
can connect individual users to a remote network or connect multiple networks
together.
For example, users may use a VPN to connect to their work computer terminal
from home and access their email, files, images, etc.
Through VPNs, users are able to access resources on remote networks, such as
files, printers, databases, or internal websites. VPN remote users get the
impression of being directly connected to the central network via a point-to-point
link.
An image of VPN
343
Data Communication and Computer Networks Unit – 9
Security mechanisms
VPNs typically require remote access to be authenticated and make use of
encryption techniques to prevent disclosure of private information.
VPNs provide security through tunneling protocols and security procedures such
as encryption. Their security model provides:
Confidentiality such that even if traffic is sniffed, an attacker would only see
encrypted data which he/she cannot understand
Allowing sender authentication to prevent unauthorized users from
accessing the VPN
Message integrity to detect any instances of transmitted messages having
been tampered with
SSL VPN can connect from locations where IPsec runs into trouble with
Network Address Translation and firewall rules.
Datagram Transport Layer Security (DTLS), is used in Cisco AnyConnect
VPN, to solve the issues SSL/TLS has with tunneling over UDP.
Microsoft Point-to-Point Encryption (MPPE) works with the Point-to-Point
Tunneling Protocol and in several compatible implementations on other
platforms.
Microsoft’s Secure Socket Tunneling Protocol (SSTP), introduced in
Windows Server 2008 and in Windows Vista Service Pack 1. SSTP tunnels
Point-to-Point Protocol (PPP) or Layer 2 Tunneling Protocol traffic through
an SSL 3.0 channel.
MPVPN (Multi Path Virtual Private Network). Ragula Systems Development
Company owns the registered trademark “MPVPN”.
Secure Shell (SSH) VPN – OpenSSH offers VPN tunneling (distinct from port
forwarding) to secure remote connections to a network or inter-network
links. OpenSSH server provides a limited number of concurrent tunnels and
the VPN feature itself does not support personal authentication.
Authentication
Tunnel endpoints must authenticate before secure VPN tunnels can be
established.
User-created remote access VPNs may use passwords, biometrics, two-factor
authentication or other cryptographic methods.
Network-to-network tunnels often use passwords or digital certificates, as they
permanently store the key to allow the tunnel to establish automatically and
without intervention from the user.
Firewalls
345
Data Communication and Computer Networks Unit – 9
An image of firewall
Evolution
First generation: packet filters
346
Data Communication and Computer Networks Unit – 9
The first paper published on firewall technology was in 1988, when engineers
from Digital Equipment Corporation (DEC) developed filter systems known as
packet filter firewalls. This fairly basic system was the first generation of what
became a highly involved and technical internet security feature. At AT&T Bell
Labs, Bill Cheswick and Steve Bellovin were continuing their research in packet
filtering and developed a working model for their own company based on their
original first generation architecture.
Packet filters act by inspecting the “packets” which transfer between computers
on the Internet. If a packet matches the packet filter’s set of rules, the packet
filter will drop (silently discard) the packet, or reject it (discard it, and send “error
responses” to the source).
TCP and UDP protocols constitute most communication over the Internet, and
because TCP and UDP traffic by convention uses well known ports for particular
types of traffic, a “stateless” packet filter can distinguish between, and thus
control, those types of traffic (such as web browsing, remote printing, email
transmission, file transfer), unless the machines on each side of the packet filter
are both using the same non-standard ports.
Packet filtering firewalls work mainly on the first three layers of the OSI reference
model, which means most of the work is done between the network and physical
layers, with a little bit of peeking into the transport layer to figure out source and
destination port numbers. When a packet originates from the sender and filters
through a firewall, the device checks for matches to any of the packet filtering
rules that are configured in the firewall and drops or rejects the packet
accordingly. When the packet passes through the firewall, it filters the packet on a
protocol/port number basis (GSS). For example, if a rule in the firewall exists to
block telnet access, then the firewall will block the TCP protocol for port number
23.
347
Data Communication and Computer Networks Unit – 9
Types
There are different types of firewalls depending on where the communication is
taking place, where the communication is intercepted and the state that is being
traced.
348
Data Communication and Computer Networks Unit – 9
Network layer firewalls generally fall into two sub-categories, stateful and
stateless. Stateful firewalls maintain context about active sessions, and use that
“state information” to speed packet processing. Any existing network connection
can be described by several properties, including source and destination IP
address, UDP or TCP ports, and the current stage of the connection’s lifetime
(including session initiation, handshaking, data transfer, or completion
connection). If a packet does not match an existing connection, it will be
evaluated according to the ruleset for new connections. If a packet matches an
existing connection based on comparison with the firewall’s state table, it will be
allowed to pass without further processing.
Stateless firewalls require less memory, and can be faster for simple filters that
require less time to filter than to look up a session. They may also be necessary
for filtering stateless network protocols that have no concept of a session.
However, they cannot make more complex decisions based on what stage
communications between hosts have reached.
Modern firewalls can filter traffic based on many packet attributes like source IP
address, source port, destination IP address or port, destination service like
WWW or FTP. They can filter based on protocols, TTL values, netblock of
originator, of the source, and many other attributes.
Commonly used packet filters on various versions of Unix are ipf (various), ipfw
(FreeBSD/Mac OS X), pf (OpenBSD, and all other BSDs), iptables/ipchains (Linux).
Application-layer
Application-layer firewalls work on the application level of the TCP/IP stack (i.e.,
all browser traffic, or all telnet or ftp traffic), and may intercept all packets
traveling to or from an application. They block other packets (usually dropping
them without acknowledgment to the sender).
349
Data Communication and Computer Networks Unit – 9
On inspecting all packets for improper content, firewalls can restrict or prevent
outright the spread of networked computer worms and trojans. The additional
inspection criteria can add extra latency to the forwarding of packets to their
destination.
Proxies
A proxy server (running either on dedicated hardware or as software on a
general-purpose machine) may act as a firewall by responding to input packets
(connection requests, for example) in the manner of an application, while
blocking other packets. A proxy server is a gateway from one network to another
for a specific network application, in the sense that it functions as a proxy on
behalf of the network user.
350
Data Communication and Computer Networks Unit – 9
Proxies make tampering with an internal system from the external network more
difficult and misuse of one internal system would not necessarily cause a security
breach exploitable from outside the firewall (as long as the application proxy
remains intact and properly configured). Conversely, intruders may hijack a
publicly reachable system and use it as a proxy for their own purposes; the proxy
then masquerades as that system to other internal machines. While use of
internal address spaces enhances security, crackers may still employ methods
such as IP spoofing to attempt to pass packets to a target network.
Packet filter: Looks at each packet entering or leaving the network and
accepts or rejects it based on user-defined rules. Packet filtering is fairly
effective and transparent to users, but it is difficult to configure. In
addition, it is susceptible to IP spoofing.
Application gateway: Applies security mechanisms to specific applications,
such as FTP and Telnet servers. This is very effective, but can impose a
performance degradation.
Circuit-level gateway: Applies security mechanisms when a TCP or UDP
connection is established. Once the connection has been made, packets can
flow between the hosts without further checking.
Proxy server: Intercepts all messages entering and leaving the network. The
proxy server effectively hides the true network addresses.
351
Data Communication and Computer Networks Unit – 9
Mobile technology has grown leaps and bounds over the last few decades. The
journey from the clunky wireless phone to sleek smartphone has been peppered
by a number of amazing innovations and discoveries.
With the 3G mobiles available today, users can do a lot more with their
smartphones than just sending a voicemail or SMS. They can browse the web,
check the weather, read a book, prepare a to-do-list, carry their favorite music
around, find their way around a new city with GPRS, and do much more.
352
Data Communication and Computer Networks Unit – 9
In such a scenario, every business person willing to practice the mobile marketing
technique has to be aware about the following top 5 ways in which mobile
technologies have changed the way users interact with mobile devices −
Unlike laptops and desktops, tablet and mobile devices are easy to carry around.
Users can access the internet in their mobile devices at anytime and anywhere
and it has decreased use of the laptops.
Companies that have an online customer base for instance e-commerce portals
have noticed that the sales and subscriptions they get from their apps are higher
in comparison to that of their websites. This means, online purchasing from the
mobile phones are easier.
Most of the users feel that the mobile are more personal device than say a laptop
or a desktop. Therefore, they expect that the content they receive on their mobile
phones must be personalized as well.
Slowly but surely technicians and developers are packing the mobile phones with
computer-like features. With bigger screens, faster performance, optimum
storage capacity, longer battery life, and a ton of productivity booster
353
Data Communication and Computer Networks Unit – 9
GSM
GSM stands for Global System for Mobile communications. GSM is one of the
most widely used digital wireless telephony system. It was developed in Europe in
1980s and is now international standard in Europe, Australia, Asia and Africa. Any
GSM handset with a SIM (Subscriber Identity Module) card can be used in any
country that uses this standard. Every SIM card has a unique identification
number. It has memory to store applications and data like phone numbers,
processor to carry out its functions and software to send and receive messages
The frequencies used by the international standard is 900 MHz to 1800 MHz
However, GSM phones used in the US use 1900 MHz frequency and hence are not
compatible with the international system.
354
Data Communication and Computer Networks Unit – 9
The concept of GSM emerged from a cell-based mobile radio system at Bell
Laboratories in the early 1970s.
GSM is the name of a standardization group established in 1982 to create a
common European mobile telephone standard.
GSM is the most widely accepted standard in telecommunications and it is
implemented globally.
GSM is a circuit-switched system that divides each 200 kHz channel into
eight 25 kHz time-slots. GSM operates on the mobile communication bands
900 MHz and 1800 MHz in most parts of the world. In the US, GSM
operates in the bands 850 MHz and 1900 MHz.
GSM owns a market share of more than 70 percent of the world's digital
cellular subscribers.
GSM makes use of narrowband Time Division Multiple Access (TDMA)
technique for transmitting signals.
GSM was developed using digital technology. It has an ability to carry 64
kbps to 120 Mbps of data rates.
Presently GSM supports more than one billion mobile subscribers in more
than 210 countries throughout the world.
GSM provides basic to advanced voice and data services including roaming
service. Roaming is the ability to use your GSM phone number in another
GSM network.
Mobile Station : The mobile station is the mobile phone, which comprises
of the mobile handset and SIM card. The mobile handset comprises of the
transceiver, the display and its processor. SIM stands for SubscriberIdentity
Module. It is a removable chip that contains account information of the
subscriber and connects the handset to the mobile network system.
Air Interface : The air interface is the interface between the mobile station
and the Base Transceiver Station. It is also called the UM interface as it is
analogous to U interface of ISDN. GSM runs on a range of frequencies
including 900, 1800 and 1900 MHz. It uses frequency division duplex (FDD)
that divides the channel into several sub-bands. Each of the sub-bands are
shared by multiple mobiles through time division multiplexing (TDM).
355
Data Communication and Computer Networks Unit – 9
356
Data Communication and Computer Networks Unit – 9
Why GSM?
Listed below are the features of GSM that account for its popularity and wide
acceptance.
User Services
GSM offers much more than just voice telephony. Contact your local GSM
network operator to the specific services that you can avail.
357
Data Communication and Computer Networks Unit – 9
Teleservices
The abilities of a Bearer Service are used by a Teleservice to transport data. These
services are further transited in the following ways:
Voice Calls
The most basic Teleservice supported by GSM is telephony. This includes full-rate
speech at 13 kbps and emergency calls, where the nearest emergency-service
provider is notified by dialing three digits.
Short Messaging Service (SMS) service is a text messaging service that allows
sending and receiving text messages on your GSM mobile phone. In addition to
simple text messages, other text data including news, sports, financial, language,
and location-based data can also be transmitted.
Bearer Services
Data services or Bearer Services are used through a GSM phone. to receive and
send data is the essential building block leading to widespread mobile Internet
access and mobile data transfer. GSM currently has a data transfer rate of 9.6k.
New developments that will push up data transfer rates for GSM users are HSCSD
(high speed circuit switched data) and GPRS (general packet radio service) are
now available.
358
Data Communication and Computer Networks Unit – 9
Supplementary Services
359
Data Communication and Computer Networks Unit – 9
CDMA
CDMA Overview
Code Division Multiple Access system is very different from time and frequency
multiplexing. In this system, a user has access to the whole bandwidth for the
entire duration. The basic principle is that different CDMA codes are used to
distinguish among the different users.
Techniques generally used are direct sequence spread spectrum modulation (DS-
CDMA), frequency hopping or mixed CDMA detection (JDCDMA). Here, a signal is
generated which extends over a wide bandwidth. A code called spreading code is
used to perform this action. Using a group of codes, which are orthogonal to each
360
Data Communication and Computer Networks Unit – 9
other, it is possible to select a signal with a given code in the presence of many
other signals with different orthogonal codes.
In fact, many different "signals" baseband with different spreading codes can be
modulated on the same carrier to allow many different users to be supported.
Using different orthogonal codes, interference between the signals is minimal.
Conversely, when signals are received from several mobile stations, the base
station is capable of isolating each as they have different orthogonal spreading
codes.
The following figure shows the technicality of the CDMA system. During the
propagation, we mixed the signals of all users, but by that you use the same code
as the code that was used at the time of sending the receiving side. You can take
out only the signal of each user.
361
Data Communication and Computer Networks Unit – 9
CDMA Capacity
Processing Gain
Signal to Noise Ratio
Voice Activity Factor
Frequency Reuse Efficiency
Capacity in CDMA is soft, CDMA has all users on each frequency and users are
separated by code. This means, CDMA operates in the presence of noise and
interference.
In addition, neighboring cells use the same frequencies, which means no re-use.
So, CDMA capacity calculations should be very simple. No code channel in a cell,
multiplied by no cell. But it is not that simple. Although not available code
channels are 64, it may not be possible to use a single time, since the CDMA
frequency is the same.
Centralized Methods
The band used in CDMA is 824 MHz to 894 MHz (50 MHz + 20 MHz
separation).
Frequency channel is divided into code channels.
1.25 MHz of FDMA channel is divided into 64 code channels.
Processing Gain
W is Spread Rate
R is Data Rate
This is a gain factor and the actual data propagation rate. On an average, a typical
transmission condition requires a signal to the noise ratio of 7 dB for the
adequate quality of voice.
Translated into a ratio, signal must be five times stronger than noise.
= 21 – 7 = 14dB
Hence, CDMA has 100% frequency reuse. Use of same frequency in surrounding
cells causes some additional interference.
Advantages of CDMA
CDMA has a soft capacity. The greater the number of codes, the more the number
of users. It has the following advantages −
Disadvantages of CDMA
The code length must be carefully selected. A large code length can induce
delay or may cause interference.
Time synchronization is required.
Gradual transfer increases the use of radio resources and may reduce
capacity.
As the sum of the power received and transmitted from a base station
needs constant tight power control. This can result in several handovers.
Usage
Categories of CDMA
The major difference between CDMA and GSM are given below.
364
Data Communication and Computer Networks Unit – 9
Global CDMA is used in usa GSM is used over 80% of the world
reach and some part of network in over 210 countries.
canada and japan.
CDMA is used only by GSM is used 76% of the users
24% of the users worldwide.
worldwide.
Data CDMA has faster data GSM has slower data transfer as
Transfer transfer as compared compared to CDMA.
Rate to GSM.
1. Mobility
2. Wireless Medium
3. Portability
1. Mobility:
It is the most important aspect of mobile computing, but it has to face the certain
challenges which are :
2. Wireless Medium:
The transmission medium in mobile computing is wireless, therefore the following
points are considered:
3. Portability:
This means that the communication device moves, for eg. mobile phones. The
following mobile constraints are to be considered as the devices are also mobile:
366
Data Communication and Computer Networks Unit – 9
Mobile IP
367
Data Communication and Computer Networks Unit – 9
The following case shows how a datagram moves from one point to another
within the Mobile IP framework.
o First of all, the internet host sends a datagram to the mobile node using the
mobile node's home address (normal IP routing process).
o If the mobile node (MN) is on its home network, the datagram is delivered
through the normal IP (Internet Protocol) process to the mobile node.
Otherwise the home agent picks up the datagram.
o If the mobile node (MN) is on foreign network, the home agent (HA)
forwards the datagram to the foreign agent.
o The foreign agent (FA) delivers the datagram to the mobile node.
o Datagrams from the MN to the Internet host are sent using normal IP
routing procedures. If the mobile node is on a foreign network, the packets
are delivered to the foreign agent. The FA forwards the datagram to the
Internet host.
In the case of wireless communications, the above illustrations depict the use of
wireless transceivers to transmit the datagrams to the mobile node. Also, all
datagrams between the Internet host and the MN use the mobile node's home
address regardless of whether the mobile node is on a home or foreign network.
The care-of address (COA) is used only for communication with mobility agents
and is never seen by the Internet host.
Components of Mobile IP
The mobile node is an end system or device such as a cell phone, PDA (Personal
Digital assistant), or laptop whose software enables network roaming capabilities.
The home agent provides several services for the mobile node and is located in
the home network. The tunnel for packets towards the mobile node starts at
home agent. The home agent maintains a location registry, i.e. it is informed of
368
Data Communication and Computer Networks Unit – 9
the mobile node's location by the current COA (care of address). Following
alternatives for the implementation of an HA exist.
The foreign agent can provide several services to the mobile node during its visit
to the foreign network. The FA can have the COA (care or address) acting as a
tunnel endpoint and forwarding packets to the MN. The foreign agent can be the
default router for the MN.
Foreign agent can also provide security services because they belong to the
foreign network as opposed to the MN which is only visiting.
In short, FA is a router that may function as the point of attachment for the
mobile node when it roams to a foreign network delivers packets from the home
agent to the mobile node.
The Care- of- address defines the current location of the mobile node from an IP
point of view. All IP packets sent to the MN are delivered to the COA, not directly
to the IP address of the MN. Packet delivery toward the mobile node is done
using a tunnel. To be more precise, the COA marks the endpoint of the tunnel, i.e.
the address where packets exit the tunnel.
There are two different possibilities for the location of the care of address:
369
Data Communication and Computer Networks Unit – 9
1. Foreign Agent COA: The COA could be located at the foreign agent, i.e. the
COA is an IP address of the foreign agent. The foreign agent is the tunnel
endpoint and forwards packets to the MN. Many MN using the FA can
share this COA as common COA.
2. Co-located COA: The COA is co-located if the MN temporarily acquired an
additional IP address which acts as a COA. This address is now topologically
correct, and the tunnel endpoint is at the mobile node. Co-located address
can be acquired using services such as DHCP. One problem associated with
this approach is need for additional addresses if MNs request a COA. This is
not always a good idea considering the scarcity of IPv4 addresses.
6. Home Network
The home network is the subset the MN belongs to with respect to its IP address.
No mobile IP support is needed within this network.
7. Foreign network
The foreign network is the current subset the MN visits and which is not the home
network.
Process of Mobile IP
The mobile IP process has following three main phases, which are:
1. Agent Discovery
During the agent discovery phase the HA and FA advertise their services on the
network by using the ICMP router discovery protocol (IROP).
Mobile IP defines two methods: agent advertisement and agent solicitation which
are in fact router discovery methods plus extensions.
370
Data Communication and Computer Networks Unit – 9
2. Registration
The main purpose of the registration is to inform the home agent of the current
location for correct forwarding of packets.
Registration can be done in two ways depending on the location of the COA.
o If the COA is at the FA, the MN sends its registration request containing the
COA to the FA which is forwarding the request to the HA. The HA now set
up a mobility binding containing the mobile node's home IP address and
the current COA.
371
Data Communication and Computer Networks Unit – 9
Additionally, the mobility biding contains the lifetime of the registration which is
negotiated during the registration process. Registration expires automatically
after the lifetime and is deleted; so a mobile node should register before
expiration. After setting up the mobility binding, the HA send a reply message
back to the FA which forwards it to the MN.
o If the COA is co-located, registration can be very simpler. The mobile node
may send the request directly to the HA and vice versa. This by the way is
also the registration procedure for MNs returning to their home network.
3. Tunneling
A tunnel is used to establish a virtual pipe for data packets between a tunnel
entry and a tunnel endpoint. Packets which are entering in a tunnel are forwarded
inside the tunnel and leave the tunnel unchanged. Tunneling, i.e., sending a
packet through a tunnel is achieved with the help of encapsulation.
Any device that does not need to remain at one place to carry out its functions is
a mobile device. So laptops, smartphones and personal digital assistants are some
examples of mobile devices. Due to their portable nature, mobile devices connect
to networks wirelessly. Mobile devices typically use radio waves to communicate
with other devices and networks. Here we will discuss the protocols used to carry
out mobile communication.
372
Data Communication and Computer Networks Unit – 9
GSM
GSM stands for Global System for Mobile communications. GSM is one of the
most widely used digital wireless telephony system. It was developed in Europe in
1980s and is now international standard in Europe, Australia, Asia and Africa. Any
373
Data Communication and Computer Networks Unit – 9
GSM handset with a SIM (Subscriber Identity Module) card can be used in any
country that uses this standard. Every SIM card has a unique identification
number. It has memory to store applications and data like phone numbers,
processor to carry out its functions and software to send and receive messages
The frequencies used by the international standard is 900 MHz to 1800 MHz
However, GSM phones used in the US use 1900 MHz frequency and hence are not
compatible with the international system.
CDMA
CDMA stands for Code Division Multiple Access. It was first used by the British
military during World War II. After the war its use spread to civilian areas due to
high service quality. As each user gets the entire spectrum all the time, voice
quality is very high. Also, it is automatically encrypted and hence provides high
security against signal interception and eavesdropping.
WLL
WLL stands for Wireless in Local Loop. It is a wireless local telephone service that
can be provided in homes or offices. The subscribers connect to their local
exchange instead of the central exchange wirelessly. Using wireless link eliminates
last mile or first mile construction of network connection, thereby reducing cost
and set up time. As data is transferred over very short range, it is more secure
than wired networks.
WLL system consists of user handsets and a base station. The base station is
connected to the central exchange as well as an antenna. The antenna transmits
to and receives calls from users through terrestrial microwave links. Each base
station can support multiple handsets depending on its capacity.
GPRS
GPRS stands for General Packet Radio Services. It is a packet based wireless
communication technology that charges users based on the volume of data they
374
Data Communication and Computer Networks Unit – 9
send rather than the time duration for which they are using the service. This is
possible because GPRS sends data over the network in packets and its throughput
depends on network traffic. As traffic increases, service quality may go down due
to congestion, hence it is logical to charge the users as per data volume
transmitted.
GPRS is the mobile communication protocol used by second (2G) and third
generation (3G) of mobile telephony. It pledges a speed of 56 kbps to 114 kbps,
however the actual speed may vary depending on network load.
Communication Satellites
Internet
Military operations
Television
Telephone
Radio
375
Data Communication and Computer Networks Unit – 9
Low Earth Orbit Satellite (LEO) − They are situated below the Lower Van
Allen belt. Their orbital altitude is 160 km to 2000 km. For global coverage,
as high as 50 LEOs are required.
A repeater is a circuit which increases the strength of the signal it receives and
retransmits it. But here this repeater works as a transponder, which changes the
frequency band of the transmitted signal, from the received one.
The frequency with which the signal is sent into the space is called Uplink
frequency, while the frequency with which it is sent by the transponder
is Downlink frequency.
376
Data Communication and Computer Networks Unit – 9
Flexibility
Ease in installing new circuits
Distances are easily covered and cost doesn’t matter
Broadcasting possibilities
Each and every corner of earth is covered
User can control the network
The initial costs such as segment and launch costs are too high.
Congestion of frequencies
377
Data Communication and Computer Networks Unit – 9
In Radio broadcasting.
In TV broadcasting such as DTH.
In Internet applications such as providing Internet connection for data
transfer, GPS applications, Internet surfing, etc.
For voice communications.
For research and development sector, in many areas.
In military applications and navigations.
The orientation of the satellite in its orbit depends upon the three laws called as
Kepler’s laws.
Kepler’s Laws
If the distance from the center of the object to a point on its elliptical path is
considered, then the farthest point of an ellipse from the center is called
as apogee and the shortest point of an ellipse from the center is called as perigee.
Kepler’s 1st law states that, “every planet revolves around the sun in an elliptical
orbit, with sun as one of its foci.” As such, a satellite moves in an elliptical path
with earth as one of its foci.
The semi major axis of the ellipse is denoted as ‘a’ and semi minor axis is denoted
as b. Therefore, the eccentricity e of this system can be written as −
$$e = \frac{\sqrt{a^{2}-b^{2}}}{a}$$
378
Data Communication and Computer Networks Unit – 9
For an elliptical path, it is always desirable that the eccentricity should lie in
between 0 and 1, i.e. 0 < e < 1 because if e becomes zero, the path will be no
more in elliptical shape rather it will be converted into a circular path.
Kepler’s 2nd law states that, “For equal intervals of time, the area covered by the
satellite is equal with respect to the center of the earth.”
379
Data Communication and Computer Networks Unit – 9
Suppose that the satellite covers p1 and p2 distances, in the same time interval,
then the areas B1 and B2 covered in both instances respectively, are equal.
Kepler’s 3rd law states that, “The square of the periodic time of the orbit is
proportional to the cube of the mean distance between the two bodies.”
$$T^{2}\:\alpha\:\:a^{3}$$
Which implies
380
Data Communication and Computer Networks Unit – 9
The orbital functioning of satellites is calculated with the help of these Kepler’s
laws.
Along with these, there is an important thing which has to be noted. A satellite,
when it revolves around the earth, undergoes a pulling force from the earth
which is the gravitational force. Also, it experiences some pulling force from the
sun and the moon. Hence, there are two forces acting on it. They are −
So, a satellite has to balance these two forces to keep itself in its orbit.
Earth Orbits
Geo-Stationary Earth Orbit Satellites are used for weather forecasting, satellite
TV, satellite radio and other types of global communications.
The following figure shows the difference between Geo-synchronous and Geo-
stationary orbits. The axis of rotation indicates the movement of Earth.
382
Data Communication and Computer Networks Unit – 9
Medium Earth Orbit (MEO) satellite networks will orbit at distances of about
8000 miles from the earth's surface. Signals transmitted from a MEO satellite
travel a shorter distance. This translates to improved signal strength at the
receiving end. This shows that smaller, more lightweight receiving terminals can
be used at the receiving end.
Since the signal is travelling a shorter distance to and from the satellite, there is
less transmission delay. Transmission delay can be defined as the time it takes for
a signal to travel up to a satellite and back down to a receiving station.
For real-time communications, the shorter the transmission delay, the better will
be the communication system. As an example, if a GEO satellite requires 0.25
seconds for a round trip, then MEO satellite requires less than 0.1 seconds to
complete the same trip. MEOs operates in the frequency range of 2 GHz and
above.
The Low Earth Orbit (LEO) satellites are mainly classified into three categories
namely, little LEOs, big LEOs, and Mega-LEOs. LEOs will orbit at a distance of 500
to 1000 miles above the earth's surface.
This relatively short distance reduces transmission delay to only 0.05 seconds.
This further reduces the need for sensitive and bulky receiving equipment. Little
LEOs will operate in the 800 MHz (0.8 GHz) range. Big LEOs will operate in the 2
GHz or above range, and Mega-LEOs operates in the 20-30 GHz range.
The following figure depicts the paths of LEO, MEO, and GEO.
383
Data Communication and Computer Networks Unit – 9
Wireless Networks
Computer networks that are not connected by cables are called wireless
networks. They generally use radio waves for communication between the
network nodes. They allow devices to be connected to the network while roaming
around within the network coverage.
384
Data Communication and Computer Networks Unit – 9
Topologies
The way in which devices are interconnected to form a network is called network
topology. Some of the factors that affect choice of topology for a network are −
385
Data Communication and Computer Networks Unit – 9
Bus Topology
Data network with bus topology has a linear transmission cable, usually coaxial,
to which many network devices and workstations are attached along the
length. Server is at one end of the bus. When a workstation has to send data, it
transmits packets with destination address in its header along the bus.
386
Data Communication and Computer Networks Unit – 9
The data travels in both the directions along the bus. When the destination
terminal sees the data, it copies it to the local disk.
Ring Topology
In ring topology each terminal is connected to exactly two nodes, giving the
network a circular shape. Data travels in only one pre-determined direction.
387
Data Communication and Computer Networks Unit – 9
When a terminal has to send data, it transmits it to the neighboring node which
transmits it to the next one. Before further transmission data may be amplified. In
this way, data raverses the network and reaches the destination node, which
removes it from the network. If the data reaches the sender, it removes the data
and resends it later.
388
Data Communication and Computer Networks Unit – 9
Star Topology
389
Data Communication and Computer Networks Unit – 9
Tree Topology
Tree topology has a group of star networks connected to a linear bus backbone
cable. It incorporates features of both star and bus topologies. Tree topology is
also called hierarchical topology.
390
Data Communication and Computer Networks Unit – 9
Ad Hoc Networks
An ad hoc network is one that is spontaneously formed when devices connect and
communicate with each other. The term ad hoc is a Latin word that literally
means "for this," implying improvised or impromptu.
Ad hoc networks are mostly wireless local area networks (LANs). The devices
communicate with each other directly instead of relying on a base station or
access points as in wireless LANs for data transfer co-ordination. Each device
participates in routing activity, by determining the route using the routing
algorithm and forwarding data to other devices via this route.
391
Data Communication and Computer Networks Unit – 9
move and each node has limiting transmitting power, restricting access to
the node only in the neighboring range.
o MANETs are basically peer-to-peer, multi-hop wireless networks in which
information packets are transmitted in a store and forward manner from a
source to an arbitrary destination, via intermediate nodes as given in the
figure:
392
Data Communication and Computer Networks Unit – 9
Characteristics of MANET
o Dynamic topologies: nodes are free to move arbitrarily; thus the network
topology may be changed randomly and unpredictably and primarily
consists of bidirectional links. In some cases where the transmission power
of two nodes is different, a unidirectional link may exist.
o Bandwidth-constrained and variable capacity links: wireless links continue
to have significantly lower capacity than infrastructure networks.
o Energy-constrained operation: some or all of the MSs in a MANET may rely
on batteries or other exhaustible means for their energy. For these nodes
or devices, the most important system design optimization criteria may be
energy conservation.
o Limited physical security: MANETs are generally more prone to physical
security threats than wire line networks. The increased possibility of
eavesdropping, spoofing, and denial of services (DoS) attacks should be
considered carefully. To reduce security threats, many existing link security
techniques are often applied within wireless networks.
Applications of MANET
393
Data Communication and Computer Networks Unit – 9
Ad hoc networks can be classified into several types depending upon the nature
of their applications. The most prominent ad hoc networks that are commonly
incorporated are illustrated in the diagram below −
394
Data Communication and Computer Networks Unit – 9
Wireless Transmission
395
Data Communication and Computer Networks Unit – 9
Ground Propagation:
Sky Propagation:
In sky propagation, high frequency radio waves (2–30 MHz) are reflected back
from the ionosphere towards the earth’s surface. They can be used to transmit
signals over a large geographical area since their distance is not bounded by the
earth’s curvature.
396
Data Communication and Computer Networks Unit – 9
In line – of – sight propagation, very high frequency waves ( > 30 MHz ) travel at
straight lines from the source antenna (transmitter) to the destination antenna
(receiver). These waves are easily disrupted by present of objects in their path. So
the antennas are placed tall enough above obstructions. They are unidirectional
facing each other.
Wireless LANs
Wireless LANs (WLANs) are wireless computer networks that use high-frequency
radio waves instead of cables for connecting the devices within a limited area
forming LAN (Local Area Network). Users connected by wireless LANs can move
around within this limited area such as home, school, campus, office building,
railway platform, etc.
Most WLANs are based upon the standard IEEE 802.11 standard or WiFi.
Components of WLANs
Stations (STA) − Stations comprises of all devices and equipment that are
connected to the wireless LAN. Each station has a wireless network
interface controller. A station can be of two types −
397
Data Communication and Computer Networks Unit – 9
Types of WLANS
Advantages of WLANs
398
Data Communication and Computer Networks Unit – 9
The system is portable within the network coverage. Access to the network
is not bounded by the length of the cables.
Installation and setup are much easier than wired counterparts.
The equipment and setup costs are reduced.
Disadvantages of WLANs
Since radio waves are used for communications, the signals are noisier with
more interference from nearby systems.
Greater care is needed for encrypting information. Also, they are more
prone to errors. So, they require greater bandwidth than the wired LANs.
WLANs are slower than wired LANs.
Global Positioning Systems, widely known as GPSs, have a great importance since
the days of World War II.
Although the initial focus was mainly on military targeting, fleet management,
and navigation, commercial usage began finding relevance as the advantages of
radiolocation were extended to (but not limited to) tracking down stolen vehicles
and guiding civilians to the nearest hospital, gas station, hotel, and so on.
399
Data Communication and Computer Networks Unit – 9
The satellite signals can be received anywhere and at any time in the world.
The spacing of the satellites is arranged such that a minimum of five satellites are
in view from every point on the globe.
Each satellite is expected to last approx 7.5 years, and replacements are
constantly being built and launched into orbit.
Each satellite is placed at an altitude of about 10,900 nautical miles and weights
about 862 kg.
The satellites extend to about 5.2m (17ft) in space including the solar panels. Each
satellite transmits on three frequencies.
The GPS is based on well known concept called the triangulation technique.
400
Data Communication and Computer Networks Unit – 9
Now the GPS receiver MS is also a point on another imaginary sphere with a
second satellite "B" at its center. We can say that the GPS receiver is somewhere
on the circle formed by the intersection of these two spheres.
Then, with a measurement of distance from a third satellite "C", the position of
the receiver is narrowed down to just two points on the circle, one of which is
imaginary and is eliminated from the calculations. As a result, the distance
measured from three satellites suffices to determine the position of the GPS
receiver on earth.
401
Data Communication and Computer Networks Unit – 9
o 1983 - U.S. announced that it will make GPS available for civilian use after
Korean Air flight 007 shot down.
o 1989 - Magellan introduced NAV 1000, the first hand-held GPS device. First
Block II satellite is launched.
o 1993 - Constellation of 24 satellite system became operational.
o 1995 - Full Operational Capability (FOC) declared.
o 2000 - Selective Availability discontinued by the U.S. Government.
o 2004 - Qualcomm successfully completed test of live assisted GPS on a
mobile phone.
o 2008 - Block II satellite launched.
o 2016 - GPS IIF satellite launched.
Beneficiaries of GPS
o At the start, more than 1000 portable commercial GPS receivers were
purchased for military use.
o They were carried by soldiers and attached to vehicles, helicopters, and
aircraft instrument panels.
o GPS receivers were used in several aircrafts, including B-2 bombers and F-
16 fighters etc. Navy ships used them for rendezvous, minesweeping, and
aircraft operations.
o GPS has become important for all military operations and weapons
systems. In additions, GPS benefits nonmilitary operations.
o GPS is used on satellites to obtain highly accurate orbit data and to control
spacecraft orientation.
o GPS has a various applications on land, at sea, and in the air.
o GPS can be used everywhere except indoors and places where a GPS signal
cannot be received because of natural or man-made obstructions.
o Both military and commercial aircraft use GPS for navigation purposes. It is
also used by commercial fisherman and boaters to aid in navigation.
o The precision timing capability provided by GPS is used by the scientific
community for research purposes. The GPS enables survey units to help
surveyors to set up their survey sites fairly quickly.
o GPS is also used for noncommercial purposes by car racers, hikers, hunters,
mountain bikers, and cross-country skiers.
402
Data Communication and Computer Networks Unit – 9
Limitations of GPS
o There are several factors that introduce error into GPS position calculations
and prevent us from achieving the best possible accuracy.
o A major source of error in GPS arises from the fact that the speed of the
radio signals is constant only in a vacuum which means that distance
measurements may vary as the values of the speed of signal vary in the
atmosphere.
o The atmosphere, as we know, is composed of the ionosphere and the
troposphere. The presence of the troposphere essentially composed of
water vapor) is known to cause errors due to variation of temperature and
pressure, and the particles in the ionosphere are known to cause significant
measurement errors (as would be the case with bad clocks!).
403
Data Communication and Computer Networks Unit – 9
GPRS
The full form of GPRS is General Packet Radio Service. The GPRS is a non-voice
high-speed packet switching system developed for GSM networks. GPRS is a
packet-aligned, wireless communication service that transmits a mobile signal on
3 G and 2 G cellular transmission networks.
GPRS works based on the technique of modulation, also called GMSK (Gaussian
Minimum Shift Keying). To allow GPRS to be deployed on a TDMA (Time Division
Multiple Access) or GSM (Global System For Mobile Communications) or network,
we must have two main modules that are named as
GPRS can be used to communicate using internet protocols that support a wide
range of companies as well as industrial applications.
History of GPRS
404
Data Communication and Computer Networks Unit – 9
extends the reach of the Fixed Internet by connecting mobile terminals all
over the world.
The CELLPAC protocol established in 1991-1993 was the primary trigger for
beginning in 1993 configuration of standard GPRS by ETSI SMG. In
particular, the CELLPAC Voice & Data functions introduced in a 1993 ETSI
Workshop dedication anticipate what later became known as GPRS roots.
The workshop input is cited in 22 GPRS-related US-Patents. Successor
systems to GSM / GPRS such as W-CDMA (UMTS) and LTE, as implemented
by CELLPAC, depend on critical GPRS operations for mobile Internet access.
As per research on the history of GPRS growth, the inventors of GPRS are
Bernhard Walke and his student Peter Decker, the first to make the system
access to mobile internet globally.
Benefits of GPRS
405
Data Communication and Computer Networks Unit – 9
You can send SMS by mobile phones, smart phones, computer systems with web,
handheld devices etc. All telecommunication companies like Idea, Vodafone,
Airtel, Aircel, BSNL etc. provide the facility of sending SMS.
SMS is the most widely used data application with an estimated 3.5 billion active
users. It was originally designed as a part of GSM, but is now available on the
CDMA phones also. The maximum length of an individual message goes up to 160
alpha-numeric 7 bits characters. (In the case of 5-bit mode, it supports 224
characters).
Initial concept of SMS came in exist in early 1980s. It was developed in the
Franco-German GSM cooperation in 1984 by Friedhelm Hillebrand and Bernard
Ghillebiert. Then, the CEPT group GSM introduced a plan to include the exchange
of text messages between mobile stations via message handling systems in use at
that time.
Advantages
Disadvantages
406
Data Communication and Computer Networks Unit – 9
It has a limited length as it provides only 160 characters per text message.
In order to send a text message one has to pay the cost for sending it as
SMS facility is not free of cost.
There is no possibility to unsend a message once sent.
Cloud Computing
The popular trend in today's technology driven world is ‘Cloud Computing’. Cloud
computing can be referred to as the storing and accessing of data over the
internet rather than your computer's hard drive. This means you don't access the
data from either your computer's hard drive or over a dedicated computer
network (home or office network). Cloud computing means data is stored at a
remote place and is synchronized with other web information.
One prominent example of cloud computing is Office 365 which allows users to
store, access, edit their MS Office documents online (in browser) without
installing the actual program on their device.
407
Data Communication and Computer Networks Unit – 9
Front-end device
Back-end platform
Cloud-based delivery
Network
Front-end Devices − These are basically the devices that are used by clients to
access the data or program using the browser or special applications.
Back-end Platform − There are various computers, servers, virtual machines, etc.
that combine to become a back-end platform.
Types of Cloud
Public
Private
Hybrid
408
Data Communication and Computer Networks Unit – 9
Public Cloud − A service provider makes the clouds available to the general public
which is termed as a public cloud. These clouds are accessed through internet by
users. These are open to public and their infrastructure is owned and operated by
service providers as in case of Google and Microsoft.
Hybrid Cloud − When two or more clouds are bound together to offer the
advantage of both public and private clouds, they are termed as Hybrid Cloud.
Organizations can use private clouds for sensitive application, while public clouds
for non-sensitive applications. The hybrid clouds provide flexible, scalable and
cost-effective solutions to the organizations.
Benefits of Cloud
There are many benefits of clouds. Some of them are listed below.
SPI
Next comes how cloud services are categorized. S stand for Software, P stands for
Platform and I for Infrastructure in SPI. SaaS is Software as a service; PaaS is
Platform as a service and IaaS is Infrastructure as a Service.
409
Data Communication and Computer Networks Unit – 9
Internet Of Things(IoT)
IoT makes virtually everything "smart," by improving aspects of our life with the
power of data collection, AI algorithm, and networks. The thing in IoT can also be
a person with a diabetes monitor implant, an animal with tracking devices, etc.
410
Data Communication and Computer Networks Unit – 9
History of IOT
411
Data Communication and Computer Networks Unit – 9
The entire IOT process starts with the devices themselves like smartphones,
smartwatches, electronic appliances like TV, Washing Machine which helps you to
communicate with the IOT platform.
3) Data Processing: Once that data is collected, and it gets to the cloud, the
software performs processing on the gathered data. This process can be just
checking the temperature, reading on devices like AC or heaters. However, it can
sometimes also be very complex like identifying objects, using computer vision on
video.
412
Data Communication and Computer Networks Unit – 9
For example, if a user detects any changes in the temperature of the refrigerator,
with the help of IOT technology the user should able to adjust the temperature
with the help of their mobile phone.
IoT Applications
IoT Applications
IoT solutions are widely used in numerous companies across industries. Some
most common IoT applications are given below:
413
Data Communication and Computer Networks Unit – 9
414
Data Communication and Computer Networks Unit – 9
Challenges of IoT
Advantages of IoT
415
Data Communication and Computer Networks Unit – 9
manufacturing plan of those engines and solves this issue with the
manufacturing belt.
Improved Customer Engagement: IoT allows you to improve customer
experience by detecting problems and improving the process.
Disadvantages IOT
416
Data Communication and Computer Networks Unit – 9
Some of the SaaS applications are not customizable such as Microsoft Office
Suite. But SaaS provides us Application Programming Interface (API), which
allows the developer to develop a customized application.
Characteristics
Benefits
417
Data Communication and Computer Networks Unit – 9
The customer can have single license for multiple computers running at different
locations which reduces the licensing cost. Also, there is no requirement for
license servers because the software runs in the provider's infrastructure.
The cloud provider stores data centrally. However, the cloud providers may store
data in a decentralized manner for the sake of redundancy and reliability.
Multitenant solutions
Issues
There are several issues associated with SaaS, some of them are listed below:
418
Data Communication and Computer Networks Unit – 9
If the customer visits malicious website and browser becomes infected, the
subsequent access to SaaS application might compromise the customer's data.
To avoid such risks, the customer can use multiple browsers and dedicate a
specific browser to access SaaS applications or can use virtual desktop while
accessing the SaaS applications.
Network dependence
Transferring workloads from one SaaS cloud to another is not so easy because
work flow, business logics, user interfaces, support scripts can be provider
specific.
Open SaaS uses those SaaS applications, which are developed using open source
programming language. These SaaS applications can run on any open source
operating system and database. Open SaaS has several benefits listed below:
No License Required
Low Deployment Cost
Less Vendor Lock-in
More portable applications
More Robust Solution
419
Data Communication and Computer Networks Unit – 9
App Engine of Google and Force.com are examples of PaaS offering vendors.
Developer may log on to these websites and use the built-in API to create web-
based applications.
But the disadvantage of using PaaS is that, the developer locks-in with a particular
vendor. For example, an application written in Python against API of Google, and
using App Engine of Google is likely to work only in that environment.
420
Data Communication and Computer Networks Unit – 9
The following diagram shows how PaaS offers an API and development tools to
the developers and how it helps the end user to access business applications.
Benefits
421
Data Communication and Computer Networks Unit – 9
Customer need not purchase expensive hardware, servers, power, and data
storage.
Scalable solutions
Issues
422
Data Communication and Computer Networks Unit – 9
Since PaaS applications are dependent on network, they must explicitly use
cryptography and manage security exposures.
Characteristics
423
Data Communication and Computer Networks Unit – 9
PaaS Types
Based on the functions, PaaS can be classified into four types as shown in the
following diagram:
424
Data Communication and Computer Networks Unit – 9
Open PaaS offers an open source software that helps a PaaS provider to run
applications.
Iaas is also known as Hardware as a Service (HaaS). It is one of the layers of the
cloud computing platform. It allows customers to outsource their IT
infrastructures such as servers, networking, processing, storage, virtual machines,
and other resources. Customers access these resources on the Internet using a
pay-as-per use model.
IaaS cloud computing platform layer eliminates the need for every organization to
maintain the IT infrastructure.
aaS is offered in three models: public, private, and hybrid cloud. The private cloud
implies that the infrastructure resides at the customer-premise. In the case of
public cloud, it is located at the cloud computing platform vendor's data center,
and the hybrid cloud is a combination of the two in which the customer selects
the best of both public cloud or private cloud.
425
Data Communication and Computer Networks Unit – 9
1. Shared infrastructure
3. Pay-as-per-use model
IaaS providers provide services based on the pay-as-per-use basis. The users are
required to pay for what they have used.
5. On-demand scalability
On-demand scalability is one of the biggest advantages of IaaS. Using IaaS, users
do not worry about to upgrade software and troubleshoot the issues related to
hardware components.
1. Security
Security is one of the biggest issues in IaaS. Most of the IaaS providers are not
able to provide 100% security.
Although IaaS service providers maintain the software, but they do not upgrade
the software for some organizations.
3. Interoperability issues
It is difficult to migrate VM from one IaaS provider to the other, so the customers
might face problem related to vendor lock-in.
IaaS cloud computing platform cannot replace the traditional hosting method, but
it provides more than that, and each resource which are used are predictable as
per the usage.
IaaS cloud computing platform may not eliminate the need for an in-house IT
department. It will be needed to monitor or control the IaaS setup. IT salary
expenditure might not reduce significantly, but other IT expenses can be reduced.
Breakdowns at the IaaS cloud computing platform vendor's can bring your
business to the halt stage. Assess the IaaS cloud computing platform vendor's
stability and finances. Make sure that SLAs (i.e., Service Level Agreement) provide
backups for data, hardware, network, and application failures. Image portability
and third-party support is a plus point.
427
Data Communication and Computer Networks Unit – 9
The IaaS cloud computing platform vendor can get access to your sensitive data.
So, engage with credible companies or organizations. Study their security policies
and precautions.
Top Iaas Providers who are providing IaaS cloud computing platform
428
Data Communication and Computer Networks Unit – 9
429
Data Communication and Computer Networks Unit – 9
Public cloud:
Public cloud are managed by third parties which provide cloud services over the
internet to public, these services are available as pay-as-you-go billing mode.
They offer solutions for minimizing IT infrastructure costs and act as a good
option for handling peak loads on the local infrastructure. They are a goto option
for small enterprises, which are able to start their businesses without large
upfront investments by completely relying on public infrastructure for their IT
needs.
A fundamental characteristic of public clouds is multitenancy. A public cloud is
meant to serve multiple users, not a single customer. A user requires a virtual
computing environment that is separated, and most likely isolated, from other
users.
430
Data Communication and Computer Networks Unit – 9
Computing in which service provider makes all resources public over the internet.
It is connected to the public Internet. Service provider serves resources such as
virtual machines, applications, storage, etc to the general public over the internet.
It may be free of cost or with minimal pay-per-usage. It is available for public
display, Google uses the cloud to run some of its applications like google docs,
google drive or YouTube, etc.
It is the most common way of implementing cloud computing. External cloud
service provider owns, operates and delivers it over the public network.
It is best for the companies which need an infrastructure to accommodate large
number of customers and working on projects which has diverse organisation i.e.
research institution and NGO etc.
Private cloud :
Private clouds are distributed systems that work on a private infrastructure and
providing the users with dynamic provisioning of computing resources. Instead of
a pay-as-you-go model as in public clouds, there could be other schemes in that
take into account the usage of the cloud and proportionally billing the different
departments or sections of an enterprise.
Computing in which service provider makes all resources public over the internet.
It only supports connectivity over the private network. It has only authentic users
and single-occupant architecture. Google back-end data of the applications like
Google Drive, Google docs or YouTube, etc is not available to the public, these
types of data and applications run on a private cloud.
The infrastructure and services are maintained and deployed over a private
network; hardware and software are dedicated only to a private company i.e.
members of the special entity .
It is best for the companies which need an infrastructure which has high
performance, high security and privacy due to it’s best adaptability and flexibility.
431
Data Communication and Computer Networks Unit – 9
Cloud Computing
infrastructure shared to
Cloud Computing infrastructure shared to private organisation by
public by service provider over the service provider over the
internet. It supports multiple customers internet. It supports one
i.e, enterprises. enterprise.
432
Data Communication and Computer Networks Unit – 9
It is hosted at Service
It is hosted at Service Provider site. Provider site or enterprise.
Cloud service provider manages cloud and Managed and used by single
customers use them. enterprise.
433
Data Communication and Computer Networks Unit – 9
Example : Amazon web service (AWS) and Example : Microsoft KVM, HP,
Google AppEngine etc. Red Hat & VMWare etc.
Hybrid cloud:
Hybrid cloud is a heterogeneous distributed system resulted by combining
facilities of public cloud and private cloud. For this reason they are also
called heterogeneous clouds.
A major drawback of private deployments is the inability to scale on demand and
to efficiently address peak loads. Here public clouds are needed. Hence, a hybrid
cloud takes advantages of both public and private cloud.
Community cloud:
business sector.
In community cloud, the infrastructure is shared between organization which
have shared concerns or tasks. The cloud may be managed by an organization or a
third party.
1. Media industry: Media companies are looking for quick, simple, low-cost
way for increasing efficiency of content generation.Most media productions
involve an extended ecosystem of partners. In particular, the creation of
digital content is the outcome of a collaborative process that includes
movement of large data, massive compute-intensive rendering tasks, and
complex workflow executions.
2. Healthcare industry: In healthcare industry community clouds are used to
share information and knowledge on the global level with sensitive data in
the private infrastructure.
3. Energy and core industry: In these sectors, the community cloud is used to
cluster set of solution which collectively addresses management,
deployment, and orchestration of services and operations.
4. Scientific research: In this organization with common interests of science
share large distributed infrastructure for scientific computing.
Virtualization
435
Data Communication and Computer Networks Unit – 9
The machine on which the virtual machine is going to create is known as Host
Machine and that virtual machine is referred as a Guest Machine
Types of Virtualization:
1. Hardware Virtualization.
2. Operating system Virtualization.
3. Server Virtualization.
4. Storage Virtualization.
1) Hardware Virtualization:
When the virtual machine software or virtual machine manager (VMM) is directly
installed on the hardware system is known as hardware virtualization.
The main job of hypervisor is to control and monitoring the processor, memory
and other hardware resources.
Usage:
436
Data Communication and Computer Networks Unit – 9
Usage:
3) Server Virtualization:
When the virtual machine software or virtual machine manager (VMM) is directly
installed on the Server system is known as server virtualization.
Usage:
Server virtualization is done because a single physical server can be divided into
multiple servers on the demand basis and for balancing the load.
4) Storage Virtualization:
Storage virtualization is the process of grouping the physical storage from multiple
network storage devices so that it looks like a single storage device.
Usage:
437
Data Communication and Computer Networks Unit – 9
application etc, but actually with the help of virtualization users shares the
Infrastructure.
Conclusion
Server Virtualization
Server Virtualization is the process of dividing a physical server into several virtual
servers, called virtual private servers. Each virtual private server can run
independently.
438
Data Communication and Computer Networks Unit – 9
1. Hypervisor
The hypervisor is mainly used to perform various tasks such as allocate physical
hardware resources (CPU, RAM, etc.) to several smaller independent virtual
machines, called "guest" on the host machine.
2. Full Virtualization
Full Virtualization uses a hypervisor to directly communicate with the CPU and
physical server. It provides the best isolation and security mechanism to the
virtual machines.
3. Para Virtualization
The difference between full and pare virtualization is that, in para virtualization
hypervisor does not need too much processing power to manage the OS.
439
Data Communication and Computer Networks Unit – 9
6. Kernel-Level Virtualization
User Mode Linux (UML) and Kernel-based virtual machine are some examples of
kernel virtualization.
1. Independent Restart
440
Data Communication and Computer Networks Unit – 9
In Server Virtualization, each server can be restart independently and does not
affect the working of other virtual servers.
2. Low Cost
Server Virtualization can divide a single server into multiple virtual private servers,
so it reduces the cost of hardware components.
3. Disaster Recovery<
Server virtualization allows us to deploy our resources in a simpler and faster way.
5. Security
It allows uses to store their sensitive data inside the data centers.
441
Data Communication and Computer Networks Unit – 9
Cloud Storage is a service that allows to save data on offsite storage system
managed by third-party and is made accessible by a web services API.
Storage Devices
The block storage devices offer raw storage to the clients. These raw storage are
partitioned to create volumes.
The file Storage Devices offer storage to clients in the form of files, maintaining
its own file system. This storage is in the form of Network Attached Storage (NAS).
442
Data Communication and Computer Networks Unit – 9
Unmanaged cloud storage means the storage is preconfigured for the customer.
The customer can neither format, nor install his own file system or change drive
properties.
Managed cloud storage offers online storage space on-demand. The managed
cloud storage system appears to the user to be a raw disk that the user can
partition and format.
The cloud storage system stores multiple copies of data on multiple servers, at
multiple locations. If one system fails, then it is required only to change the
pointer to the location, where the object is stored.
To aggregate the storage assets into cloud storage systems, the cloud provider
can use storage virtualization software known as StorageGRID. It creates a
virtualization layer that fetches storage from different storage devices into a
single management system. It can also manage data from CIFS and NFS file
systems over the Internet. The following diagram shows how StorageGRID
virtualizes the storage into storage clouds:
443
Data Communication and Computer Networks Unit – 9
Challenges
Storing the data in cloud is not that simple task. Apart from its flexibility and
convenience, it also has several challenges faced by the customers. The customers
must be able to:
444
Data Communication and Computer Networks Unit – 9
The cloud provider performs a number of tasks to ensure efficient use of cloud
resources. Here, we will discuss some of them:
445
Data Communication and Computer Networks Unit – 9
Backing up files by the company, from on-site computers to the disks that
reside within the cloud.
Backing up files by the cloud provider.
It is necessary to know if cloud provider has encrypted the data, who has access
to that data and if the backup is taken at different locations then the user must
know the details of those locations.
The managers must know the procedure to exit from services of a particular cloud
provider. The procedures must be defined to enable the cloud managers to
export data of an organization from their system to another cloud provider.
The managers should know the security plans of the provider for the following
services:
Multitenant use
E-commerce processing
Employee screening
Encryption policy
The managers must know the capacity planning in order to ensure whether the
cloud provider is meeting the future capacity requirement for his business or not.
The managers must manage the scaling capabilities in order to ensure services
can be scaled up or down as per the user need.
In order to identify errors in the system, managers must audit the logs on a
regular basis.
Customer-based SLA
Service-based SLA
Multilevel SLA
Few Service Level Agreements are enforceable as contracts, but mostly are
agreements or contracts which are more along the lines of an Operating Level
Agreement (OLA) and may not have the restriction of law. It is fine to have an
attorney review the documents before making a major agreement to the cloud
service provider. Service Level Agreements usually specify some
parameters which are mentioned below:
In any case, if a cloud service provider fails to meet the stated targets of
minimums then the provider has to pay the penalty to the cloud service consumer
447
Data Communication and Computer Networks Unit – 9
as per the agreement. So, Service Level Agreements are like insurance policies in
which the corporation has to pay as per the agreements if any casualty occurs.
Microsoft publishes the Service Level Agreements linked with the Windows Azure
Platform components, which is demonstrative of industry practice for cloud
service vendors. Each individual component has its own Service Level
Agreements. Below are two major Service Level Agreements (SLA) described:
Service Level Agreements are based on the usage model. Frequently, cloud
providers charge their pay-as-per-use resources at a premium and deploy
standards Service Level Agreements only for that purpose. Clients can also
subscribe at different levels that guarantees access to a particular amount of
purchased resources. The Service Level Agreements (SLAs) attached to a
subscription many times offer various terms and conditions. If client requires
access to a particular level of resources, then the client need to subscribe to a
service. A usage model may not deliver that level of access under peak load
condition.
Wireless Networks
448
Data Communication and Computer Networks Unit – 9
Computer networks that are not connected by cables are called wireless
networks. They generally use radio waves for communication between the
network nodes. They allow devices to be connected to the network while roaming
around within the network coverage.
449
Data Communication and Computer Networks Unit – 9
Accessing network devices from any location within the network coverage
or Wi-Fi hotspot becomes convenient since laying out cables is not needed.
Installation and setup of wireless networks are easier.
New devices can be easily connected to the existing setup since they
needn’t be wired to the present equipment. Also, the number of
equipment that can be added or removed to the system can vary
considerably since they are not limited by the cable capacity. This makes
wireless networks very scalable.
Wireless networks require very limited or no wires. Thus, it reduces the
equipment and setup costs.
Internet
450
Data Communication and Computer Networks Unit – 9
Evolution
The concept of Internet was originated in 1969 and has undergone several
technological & Infrastructural changes as discussed below:
Advantages
Internet covers almost every aspect of life, one can think of. Here, we will discuss
some of the advantages of Internet:
451
Data Communication and Computer Networks Unit – 9
452
Data Communication and Computer Networks Unit – 9
o Online Television
o Online Games
o Songs
o Videos
o Social Networking Apps
Internet allows us to use many services like:
o Internet Banking
o Matrimonial Services
o Online Shopping
o Online Ticket Booking
o Online Bill Payment
o Data Sharing
o E-mail
Internet provides concept of electronic commerce, that allows the business
deals to be conducted on electronic systems
Disadvantages
453
Data Communication and Computer Networks Unit – 9
sharing such information. One should use credit cards only through
authenticated sites.
Another disadvantage is the Spamming.Spamming corresponds to the
unwanted e-mails in bulk. These e-mails serve no purpose and lead to
obstruction of entire system.
Virus can easily be spread to the computers connected to internet. Such
virus attacks may cause your system to crash or your important data may
get deleted.
Also a biggest threat on internet is pornography. There are many
pornographic sites that can be found, letting your children to use internet
which indirectly affects the children healthy mental life.
There are various websites that do not provide the authenticated
information. This leads to misconception among many people.
454
DIWAKAR EDUCATION HUB
2020
a) Encryption of data
Explanation: The RS232C is a standard
interface for serial data transmission that b) To transmit faster
defines the protocol and physical interface c) To detect errors
for transmitting serial data fairly easily d) To identify the user
between associated appliances and
computers. Answer: (c) To detect errors
2) Which type of topology is best suited for Explanation: The parity bit is also known as
large businesses which must carefully the check bit, and has a value of 0 or 1. It is
control and coordinate the operation of used for error detection for blocks of data.
distributed branch outlets?
5) What kind of transmission medium is
a) Ring most appropriate to carry data in a
computer network that is exposed to
b) Local area
electrical interferences?
c) Hierarchical
d) Star a) Unshielded twisted pair
b) Optical fiber
Answer: (d) Star c) Coaxial cable
d) Microwave
Explanation: The star topology is the best
network topology for large businesses Answer: (b) Optical fiber
because it is simple to control and
coordinate from the central computer. Explanation: The optical fiber is made of
glass or plastic. In this cable, the
3) Which of the following transmission transmission of data occurs in the form of
directions listed is not a legitimate channel?
light rather than the electric current, so this
a) Simplex cable provides higher data transfer speed
b) Half Duplex than other cables.
c) Full Duplex 6) A collection of hyperlinked documents on
d) Double Duplex the internet forms the ?.?
2
Data Communication and Computer Networks Unit – 9 MCQs
Answer: (a) World Wide Web (WWW) Answer: (a) with external access
4
Data Communication and Computer Networks Unit – 9 MCQs
Answer: (c) 65535 22) When the mail server sends mail to
other mail servers it becomes ___ ?
Explanation: None
a) SMTP client
b) SMTP server
5
Data Communication and Computer Networks Unit – 9 MCQs
7
Data Communication and Computer Networks Unit – 9 MCQs
9
Data Communication and Computer Networks Unit – 9 MCQs
43) Which of the following is true with Answer: (c) Electronic code book algorithm
regard to the ping command?
Explanation: An electronic code book
a) Ping stands for Packet Internet algorithm is a mode of operation for a block
Generator. cipher, where each frame of text in an
b) The ping command checks the port encrypted document refers to a data field.
level connectivity between source In other terms, the same plaintext value
destinations end points. would also give the same value for
c) Ping summarizes the packet loss and ciphertext.
round-trip delay between two IP end
46) In the cryptography, the sequence of
points.
the letters is rearranged by?
d) The ping command activates the
RARP protocol of the IP layer. a) Transposition ciphers
b) Substitution ciphers
Answer: (c) Ping summarizes the packet
c) Both a and b
loss and round-trip delay between two IP
d) None of these
end points.
Answer: (a) Transposition ciphers
Explanation: None
Explanation: A predefined technique
44) The private key in asymmetric key
shuffles the sequence of letters in a
cryptography is kept by?
plaintext message in the transposition
a) Sender ciphers.
b) Receiver
47) What is the maximum efficiency of pure
c) Sender and Receiver
aloha at G = 1/2?
d) None of the these
a) 1.89
Answer: (b) Receiver
b) 17.99
Explanation: Only the receiver keeps the c) 18.999
private key. Its purpose is to ensure that the d) 18.4
message can only be decrypted by the
Answer: (d) 18.4
intended receiver.
Explanation: The maximum efficiency of
45) Which of the following algorithms is not
pure aloha formula is G * e-2G.
used in asymmetric-key cryptography?
Given, G =1/2
a) RSA algorithm
b) Diffie-Hellman algorithm =1/2 x e-2 x 1/2
c) Electronic code book algorithm
d) None of the mentioned = 1 / 2e
10
Data Communication and Computer Networks Unit – 9 MCQs
Answer: a c) Protocol
Explanation: Each layer adds its own header d) Route
to the packet from the previous layer. For
Answer: b
example, in the Internet layer, the IP header
Explanation: Messages travel from sender
is added over the TCP header on the data
to receiver via a physical path called the
packet that came from the transport layer.
medium using a set of methods/rules called
53. Communication between a computer protocol. Mediums can be guided (wired) or
and a keyboard involves ______________ unguided (wireless).
transmission.
56. When collection of various computers
a) Automatic
seems a single coherent system to its client,
b) Half-duplex
then it is called _________
c) Full-duplex
a) computer network
d) Simplex
b) distributed system
Answer: d c) networking system
Explanation: In simplex transmission, data d) mail system
flows in single direction which in this case
Answer: b
refers to the data flowing from the
Explanation: A Computer network is defined
keyboard to the computer. Another
as a collection of interconnected computers
example would be of the mouse where the
which uses a single technology for
data flows from the mouse to the computer
connection.
only.
A distributed system is also the same as
54. The first Network was called ________ computer network but the main difference
a) CNNET is that the whole collection of computers
b) NSFNET appears to its users as a single coherent
c) ASAPNET system.
d) ARPANET Example:- World wide web
12
Data Communication and Computer Networks Unit – 9 MCQs
13
Data Communication and Computer Networks Unit – 9 MCQs
14
Data Communication and Computer Networks Unit – 9 MCQs
15
Data Communication and Computer Networks Unit – 9 MCQs
Answer: b Answer: a
Explanation: The session layer provides the Explanation: In TCP/IP model, the fifth layer
mechanism for opening, closing and is application layer. When data is sent from
managing a session between end-user device A to device B, the 5th layer to
application processes. The session layer 5 is receive data at B is application layer.
responsible for establishing managing Application layer provides the interface
synchronizing and terminating sessions. In between applications and the network. The
TCP/IP protocol stack, the functions of the user interacts with only this layer.
session layer are handled by the transport
76. In the OSI model, as a data packet
layer itself and thus the session layer is
moves from the lower to the upper layers,
missing from the TCP/IP model.
headers are _______
74. In OSI model, when data is sent from a) Added
device A to device B, the 5th layer to b) Removed
receive data at B is _________ c) Rearranged
a) Application layer d) Randomized
b) Transport layer
16
Data Communication and Computer Networks Unit – 9 MCQs
17
Data Communication and Computer Networks Unit – 9 MCQs
18
Data Communication and Computer Networks Unit – 9 MCQs
examples of port numbers are port 20 88. The physical layer is concerned with
which is used for FTP data, port 22 which is ___________
used for SSH remote login ,and port 23 a) bit-by-bit delivery
which is used for TELNET. p) process to process delivery
c) application to application delivery
86. Which layer provides the services to
d) port to port delivery
user?
a) application layer Answer: a
b) session layer Explanation: Physical layer deals with bit to
c) presentation layer bit delivery in networking. The data unit in
d) physical layer the physical layer is bits. Process to process
delivery or the port to port delivery is dealt
Answer: a
in the transport layer. The various
Explanation: In networking, a user mainly
transmission mediums aid the physical layer
interacts with application layer to create
in performing its functions.
and send information to other computer or
network. Application layer provides the 89. Which transmission media provides the
interface between applications and the highest transmission speed in a network?
network. It is the top-most layer in both the a) coaxial cable
TCP/IP and the OSI model. b) twisted pair cable
c) optical fiber
87. Transmission data rate is decided by
d) electrical cable
____________
a) network layer Answer: c
b) physical layer Explanation: Fiber optics is considered to
c) data link layer have the highest transmission speed among
d) transport layer the all mentioned above. The fiber optics
transmission runs at 1000Mb/s. It is called
Answer: b
as 1000Base-Lx whereas IEEE standard for it
Explanation: Physical layer is a layer 1
is 802.3z. It is popularly used for modern
device which deals with network cables or
day network connections due to its high
the standards in use like connectors, pins,
transmission rate.
electric current used etc. Basically the
transmission speed is determined by the 90. Bits can be sent over guided and
cables and connectors used. Hence it is unguided media as analog signal by
physical layer that determines the ___________
transmission speed in network. Some of the a) digital modulation
cables used for high speed data b) amplitude modulation
transmission are optical fiber cables and c) frequency modulation
twisted pair cables. d) phase modulation
19
Data Communication and Computer Networks Unit – 9 MCQs
20
Data Communication and Computer Networks Unit – 9 MCQs
21
Data Communication and Computer Networks Unit – 9 MCQs
22
Data Communication and Computer Networks Unit – 9 MCQs
more reliable than UDP, DCCP, and SCTP, transferred in a continuous stream. In Block
and reliability of file transfer is required to mode, data is transferred after being
be as high as possible for FTP. divided into smaller blocks. In Compressed
mode, data is transferred after being
106. In Active mode FTP, the client initiates
compressed using some compression
both the control and data connections.
algorithm.
a) True
b) False 109. Expansion of FTP is __________
a) Fine Transfer Protocol
Answer: b
b) File Transfer Protocol
Explanation: In Passive mode of FTP, the
c) First Transfer Protocol
client initiates both data and control
d) Fast Transfer Protocol
connections, while in Active mode, the
client initiates the control connection and Answer: b
then the server initiates the data Explanation: File Transfer Protocol is an
connection. application layer protocol used to share
“files” between a server and a client. The
107. The File Transfer Protocol is built on
protocol uses two separate ports for data
______________
and control connections: port 20 for data
a) data centric architecture
and port 21 for control.
b) service oriented architecture
c) client server architecture 110. FTP is built on _____ architecture.
d) connection oriented architecture a) Client-server
b) P2P
Answer: c
c) Data centric
Explanation: The FTP connection includes a
d) Service oriented
Server and a Client which wish to share
files. The server can have multiple clients at Answer: a
the same time while the client Explanation: An FTP connection includes a
communicates with only one server at a Server and a Client which wish to share a
time. number of data files. The server can
transfer files with multiple clients at the
108. In File Transfer Protocol, data transfer
same time while the client communicates
cannot be done in ___________
with only one server at a time.
a) stream mode
b) block mode 111. FTP uses _________ parallel TCP
c) compressed mode connections to transfer a file.
d) message mode a) 1
b) 2
Answer: d
Explanation: In Stream mode, the data is
23
Data Communication and Computer Networks Unit – 9 MCQs
118. The underlying Transport layer 121. SMTP uses which of the following TCP
protocol used by SMTP is ________ port?
a) TCP a) 22
b) UDP b) 23
c) Either TCP or UDP c) 21
d) IMAP d) 25
Answer: a Answer: d
Explanation: TCP is a reliable protocol, and Explanation: Port 21 is used for FTP control
Reliability is a mandatory requirement in e- connection, port 22 is used by SSH, and port
mail transmission using SMTP. 23 is used by TELNET.
119. Simple mail transfer protocol (SMTP) 122. Which one of the following protocol is
utilizes _________ as the transport layer used to receive mail messages?
protocol for electronic mail transfer. a) SMTP
a) TCP b) Post Office Protocol (POP)
b) UDP c) Internet Message Access Protocol (IMAP)
c) DCCP d) FTP
d) SCTP
25
Data Communication and Computer Networks Unit – 9 MCQs
Answer: d Answer: b
Explanation: FTP is used to share files. Explanation: DNS client also known as DNS
SMTP, POP and IMAP are the protocols resolver also known as DNS lookup helps to
used to send and receive mails on the resolve DNS requests using an external DNS
internet. server.
123. What is on-demand mail relay 126. Servers handle requests for other
(ODMR)? domains _______
a) protocol for SMTP security a) directly
b) an SMTP extension b) by contacting remote DNS server
c) protocol for web pages c) it is not possible
d) protocol for faster mail transfer d) none of the mentioned
Answer: b Answer: b
Explanation: ODMR is an extension to Explanation: Whenever a request is
SMTP, in which mails are relayed to the received at server from other domains, it
receivers after they are authenticated. It handles this situation by contacting remote
allows only the authorized receivers to DNS server.
receive the mail.
127. DNS database contains _______
124. The entire hostname has a maximum a) name server records
of ___________ b) hostname-to-address records
a) 255 characters c) hostname aliases
b) 127 characters d) all of the mentioned
c) 63 characters
Answer: d
d) 31 characters
Explanation: Domain Name system not only
Answer: a deals with mapping IP addresses with the
Explanation: An entire hostname can have a hostname but also deals with exchange of
maximum of 255 characters. Although each information in the server.
label must be from 1 to 63 characters long.
128. If a server has no clue about where to
Host name is actually a label that is given to
find the address for a hostname then
a device in a network.
_______
125. A DNS client is called _________ a) server asks to the root server
a) DNS updater b) server asks to its adjcent server
b) DNS resolver c) request is not processed
c) DNS handler d) none of the mentioned
d) none of the mentioned
Answer: a
Explanation: Root name servers are actually
26
Data Communication and Computer Networks Unit – 9 MCQs
very important and critical as they are the d) internet corporation for assigned names
first step in translating human readable and numbers
hostnames into IP addresses for carrying
Answer: d
out communication.
Explanation: The ICANN (Internet
129. Which one of the following allows Corporation for Assigned Names and
client to update their DNS entry as their IP Numbers) deals with IP address space
address change? allocation, protocol identifier assignment,
a) dynamic DNS generic and country code Top Level domain
b) mail transfer agent name system management (gTLD and
c) authoritative name server ccTLD).
d) none of the mentioned
132. The domain name system is
Answer: a maintained by _______
Explanation: Dynamic DNS or in short DDNS a) distributed database system
or DynDNS helps in automatically updating b) a single server
a name server in the DNS. This does not c) a single computer
require manual editing. d) none of the mentioned
27
Data Communication and Computer Networks Unit – 9 MCQs
28
Data Communication and Computer Networks Unit – 9 MCQs
139. Traffic in a VPN is NOT ____________ Tunneling Protocol. It is used to tunnel all
a) Invisible from public networks the L2 traffic on an IP network and is able to
b) Logically separated from other traffic transmit network layer’s IP and IPX protocol
c) Accessible from unauthorized public data.
networks
142. The application layer protocol used by
d) Restricted to a single protocol in IPsec
a Telnet application is ________
Answer: c a) Telnet
Explanation: Traffic in a VPN is not b) FTP
accessible from any unauthorized public c) HTTP
networks because it is secured with the d) SMTP
masking IP address. This provides the
Answer: a
benefit of access to blocked resources to
Explanation: Telnet is an application layer
the users.
protocol that provides access to the
140. VPNs are financially speaking command-line interface on a remote host.
__________ Telnet stands for teletype network.
a) Always more expensive than leased lines
143. Which amongst the following
b) Always cheaper than leased lines
statements is correct for “character at a
c) Usually cheaper than leased lines
time” mode?
d) Usually more expensive than leased lines
a) Character processing is done on the local
Answer: c system under the control of the remote
Explanation: The services of a VPN are system
cheaper for moderate to large scale b) Most text typed is immediately sent to
institutional networks than the services of the remote host for processing
leased lines. Though for a small scale c) All text is echoed locally, only completed
network, it does not prove to be as lines are sent to the remote host
beneficial as the costs are not reduced to a d) All text is processed locally, and only
great degree as compared to leased lines. confirmed lines are sent to the remote host
29
Data Communication and Computer Networks Unit – 9 MCQs
144. _______ allows you to connect and 147. Which operating mode of telnet is full
login to a remote computer duplex?
a) Telnet a) default mode
b) FTP b) server mode
c) HTTP c) line mode
d) SMTP d) character mode
Answer: a Answer: c
Explanation: Telnet provides access to the Explanation: In line mode, terminal
command-line interface on a remote character processing is done on the client
computer. One can login to the computer side but editing is enabled on the server
from the command-line interface. side. Line mode reduces the number of
packets and is useful for long delay
145. Telnet is used for _______
networks.
a) Television on net
b) Network of Telephones 148. Telnet protocol is used to establish a
c) Remote Login connection to __________
d) Teleshopping site a) TCP port number 21
b) TCP port number 22
Answer: c
c) TCP port number 23
Explanation: Telnet is an application layer
d) TCP port number 25
protocol that provides access to the
command line interface of a remote Answer: c
computer that can be used to perform Explanation: TCP port 21 is used for FTP,
remote login. TCP port 22 is used for SSH and TCP port 25
is used for SMTP. Telnet provides access to
146. Which one of the following is not
a command line interface on a remote
correct?
computer using the TCP port number 23.
a) telnet is a general purpose client-server
program 149. Which one of the following is not true?
b) telnet lets user access an application on a a) telnet defines a network virtual terminal
remote computer (NVT) standard
c) telnet can also be used for file transfer b) client programs interact with NVT
d) telnet can be used for remote login c) server translates NVT operations
d) client can transfer files using to remote
Answer: c
server using NVT
Explanation: File Transfer Protocol is used
for file transfer. Telnet provides access to Answer: d
the command-line interface on a remote Explanation: The client can use the NVT
host. only to interact with the programs already
30
Data Communication and Computer Networks Unit – 9 MCQs
present on the remote server, not to delivery of a stream of bytes between hosts
transfer files to it. To transfer files, an FTP communicating via an IP network.
connection has to be used.
153. In TCP, sending and receiving data is
150. All telnet operations are sent as done as _______
________ a) Stream of bytes
a) 4 bits b) Sequence of characters
b) 8 bits c) Lines of data
c) 16 bits d) Packets
d) 32 bits
Answer: a
Answer: b Explanation: TCP provides stream oriented
Explanation: Telnet provides a bi- delivery between hosts communicating via
directional, 8-bit byte oriented an IP network and there are no message
communications facility through which boundaries. TCP can concatenate data from
operations are sent as 8-bit bytes for the a number of send () commands into one
server to interpret. stream of data and still transmit it reliably.
151. AbsoluteTelnet is a telnet client for 154. TCP process may not write and read
_______ Operating system. data at the same speed. So we need
a) windows __________ for storage.
b) linux a) Packets
c) mac b) Buffers
d) ubuntu c) Segments
d) Stacks
Answer: a
Explanation: AbsoluteTelnet was originally Answer: b
released in 1999. It was developed by Brian Explanation: A TCP receiver has a receive
Pence of Celestial Software. buffer that is used to store the unprocessed
incoming packets in case the sender is
152. Which of the following is false with
sending packets faster than the processing
respect to TCP?
rate of the received packets.
a) Connection-oriented
b) Process-to-process 155. TCP groups a number of bytes together
c) Transport layer protocol into a packet called _______
d) Unreliable a) Packet
b) Buffer
Answer: d
c) Segment
Explanation: TCP is a transport layer
d) Stack
protocol that provides reliable and ordered
31
Data Communication and Computer Networks Unit – 9 MCQs
32
Data Communication and Computer Networks Unit – 9 MCQs
an ISN (Initial Sequence Number) and 163. Return value of the UDP port
synchronizes (shares) it with the Server “Chargen” is _______
requesting a connection. The Server a) String of characters
acknowledges the clients ISN, and then b) String of integers
picks an ISN and synchronizes it with the c) Array of characters with integers
Client. At last, the Client acknowledges the d) Array of zero’s and one’s
servers ISN.
Answer: a
161. A client that wishes to connect to an Explanation: Using Chargen with UDP on
open server tells its TCP that it needs to be port 19, the server sends a UDP datagram
connected to that particular server. The containing a random number of characters
process is called ___________ every time it receives a datagram from the
a) Active open connecting host. The number of characters
b) Active close is between 0 and 512.
c) Passive close
164. Beyond IP, UDP provides additional
d) Passive open
services such as _______
Answer: a a) Routing and switching
Explanation: This is the second step in the b) Sending and receiving of packets
Three-Way Handshaking process and is c) Multiplexing and demultiplexing
done by the client once it finds the open d) Demultiplexing and error checking
server and picks an ISN. The Server
Answer: d
acknowledges the clients request, and then
Explanation: De-multiplexing is the
picks an ISN and synchronizes it with the
delivering of received segments to the
Client. At last, the Client acknowledges the
correct application layer processes at the
servers ISN.
recipients end using UDP. Error checking is
162. Which of the following is false with done through checksum in UDP.
respect to UDP?
165. What is the main advantage of UDP?
a) Connection-oriented
a) More overload
b) Unreliable
b) Reliable
c) Transport layer protocol
c) Low overhead
d) Low overhead
d) Fast
Answer: a
Answer: c
Explanation: UDP is an unreliable,
Explanation: As UDP does not provide
connectionless transport layer protocol that
assurance of delivery of packet, reliability
provides message-based data transmission.
and other services, the overhead taken to
TCP is an example of connection-oriented
provide these services is reduced in UDP’s
protocols.
33
Data Communication and Computer Networks Unit – 9 MCQs
operation. Thus, UDP provides low port numbers are short-lived port numbers
overhead, and higher speed. which can be used for clients in a UDP
system where there are temporary clients
166. Port number used by Network Time
all the time.
Protocol (NTP) with UDP is ________
a) 161 169. “Total length” field in UDP packet
b) 123 header is the length of _________
c) 162 a) Only UDP header
d) 124 b) Only data
c) Only checksum
Answer: b
d) UDP header plus data
Explanation: The Network Time Protocol is a
clock synchronization network protocol Answer: d
implemented by using UDP port number Explanation: Total length is the 16 bit field
123 to send and receive time stamps. which contains the length of UDP header
and the data. The maximum value of the
167. What is the header size of a UDP
Total length field and the maximum size of
packet?
a UDP datagram is 65,535 bytes (8 byte
a) 8 bytes
header + 65,527 bytes of data).
b) 8 bits
c) 16 bytes 170. Which is the correct expression for the
d) 124 bytes length of UDP datagram?
a) UDP length = IP length – IP header’s
Answer: a
length
Explanation: The fixed size of the UDP
b) UDP length = UDP length – UDP header’s
packet header is 8 bytes. It contains four
length
two-byte fields: Source port address,
c) UDP length = IP length + IP header’s
Destination port address, Length of packet,
length
and checksum.
d) UDP length = UDP length + UDP header’s
168. The port number is “ephemeral port length
number”, if the source host is _______
Answer: a
a) NTP
Explanation: A user datagram is
b) Echo
encapsulated in an IP datagram. There is a
c) Server
field in the IP header that defines the total
d) Client
length of the IP packet. There is another
Answer: d field in the IP header that defines the length
Explanation: Port numbers from 1025 to of the header. So if we subtract the length
5000 are used as ephemeral port numbers of the IP header that is encapsulated in the
in Windows Operating System. Ephemeral
34
Data Communication and Computer Networks Unit – 9 MCQs
35
Data Communication and Computer Networks Unit – 9 MCQs
36
Data Communication and Computer Networks Unit – 9 MCQs
38
Data Communication and Computer Networks Unit – 9 MCQs
39
Data Communication and Computer Networks Unit – 9 MCQs
40
Data Communication and Computer Networks Unit – 9 MCQs
41
Data Communication and Computer Networks Unit – 9 MCQs
42
Data Communication and Computer Networks Unit – 9 MCQs
43
Data Communication and Computer Networks Unit – 9 MCQs
44
Data Communication and Computer Networks Unit – 9 MCQs
45
Data Communication and Computer Networks Unit – 9 MCQs
224. Which of the following is a form of DoS and makes sure that the victim can’t use
attack? any bandwidth. In UDP flooding, too many
a) Vulnerability attack UDP packets are sent by the attacker to the
b) Bandwidth flooding victim at random ports.
c) Connection flooding
226. Which of this is not a guided media?
d) All of the mentioned
a) Fiber optical cable
Answer: d b) Coaxial cable
Explanation: In a DoS attack, the attacker c) Wireless LAN
won’t let the victims access the network by d) Copper wire
using a certain method that ensures that an
Answer: c
essential network resource is unavailable to
Explanation: Wireless LAN is unguided
the victim. In vulnerability attack, the
media.
attacker exploits any obvious vulnerable
entity in the network to deny the victim 227. UTP is commonly used in __________
access into the network. In bandwidth a) DSL
flooding, the attacker floods the victim with b) FTTP
a huge flow of packets and uses up all the c) HTTP
bandwidth. In connection flooding, the d) None of the mentioned
attacker floods the victim network with a
huge number of connections, so that, no Answer: a
other machine can connect to it. Explanation: Unshielded twisted pair(UTP)
is commonly used in home access.
225. The DoS attack, in which the attacker
establishes a large number of half-open or 228. A local telephone network is an
fully open TCP connections at the target example of a _______ network.
host is ________ a) Packet switched
a) Vulnerability attack b) Circuit switched
b) Bandwidth flooding c) Bit switched
c) Connection flooding d) Line switched
d) UDP flooding
Answer: b
Answer: c Explanation: Circuit switching is connection
Explanation: In Vulnerability attack, the oriented switching technique, whereas in
attacker exploits the vulnerable control the case of packet switching, it is
points of the network to deny access to the connectionless. Circuit switching is
victims. In Bandwidth flooding, the attacker implemented in the Physical layer, whereas
intentionally uses up all the bandwidth by packet switching is implemented in the
flooding the victim with a deluge of packets Network layer. Internet too is based on the
concept of circuit switching.
46
Data Communication and Computer Networks Unit – 9 MCQs
229. Most packet switches use this principle c) Line switching and bit switching
____________ d) Packet switching and Circuit switching
a) Stop and wait
Answer: d
b) Store and forward
Explanation: Packet switching and Circuit
c) Store and wait
switching are two different types of
d) Stop and forward
switching methods used to connect the
Answer: b multiple communicating devices with one
Explanation: The packet switch will not another. Packet switching is used in
transmit the first bit to outbound link until conventional LAN systems and circuit
it receives the entire packet. If the entire switching is used in telephonic systems.
packet is not received and the time-out
232. The required resources for
period expires, the packet switch will
communication between end systems are
inform the sender to resend the part of
reserved for the duration of the session
packet or the entire packet based on the
between end systems in ________ method.
algorithm being used.
a) Packet switching
230. If there are N routers from source to b) Circuit switching
destination, the total end to end delay in c) Line switching
sending packet P(L-> number of bits in the d) Frequency switching
packet R-> transmission rate) is equal to
Answer: b
______________
Explanation: In circuit switching, a physical
a) N
path between the sender and receiver is
b) (N*L)/R
established. This path is maintained until
c) (2N*L)/R
the connection is needed. Circuit switching
d) L/R
is implemented in the Physical layer and is
Answer: b used in telephonic systems.
Explanation: The equation to find the end to
233. As the resources are reserved between
end delay when no. of bits, transmission
two communicating end systems in circuit
rate and no. of routers is given by (N*L)/R.
switching, ___________ is achieved.
The total end to end delay, that is, nodal
a) authentication
delay is the sum of all, the processing delay,
b) guaranteed constant rate
queuing delay, transmission delay and
c) reliability
propagation delay.
d) store and forward
231. What are the Methods to move data
Answer: b
through a network of links and switches?
Explanation: Circuit switching is connection
a) Packet switching and Line switching
oriented and is always implemented in the
b) Circuit switching and Line switching
47
Data Communication and Computer Networks Unit – 9 MCQs
physical layer. Once a path is set, all 237. Application developer has permission
transmission occurs through the same path. to decide the following on transport layer
It is used since the early times in telephonic side
systems. a) Transport layer protocol
b) Maximum buffer size
234. Which is not a application layer
c) Both Transport layer protocol and
protocol?
Maximum buffer size
a) HTTP
d) None of the mentioned
b) SMTP
c) FTP Answer: c
d) TCP Explanation: Application layer provides the
interface between applications and the
Answer: d
network. So application developer can
Explanation: TCP is transport layer protocol.
decide what transport layer to use and
235. The packet of information at the what should be its maximum buffer size.
application layer is called __________
238. Application layer offers _______
a) Packet
service.
b) Message
a) End to end
c) Segment
b) Process to process
d) Frame
c) Both End to end and Process to process
Answer: b d) None of the mentioned
Explanation: For Application, Presentation
Answer: a
and Session layers there is no data format
Explanation: End to End service is provided
for message. Message is message as such in
in the application layer. Whereas process to
these three layers. But when it comes to
process service is provided at the transport
Transport, Network, Data and Physical layer
layer.
they have data in format of segments,
packets, frames and bits respectively. 239. E-mail is _________
a) Loss-tolerant application
236. Which one of the following is an
b) Bandwidth-sensitive application
architecture paradigms?
c) Elastic application
a) Peer to peer
d) None of the mentioned
b) Client-server
c) HTTP Answer: c
d) Both Peer-to-Peer & Client-Server Explanation: Because it can work with
available throughput.
Answer: d
Explanation: HTTP is a protocol. 240. The ____________ translates internet
domain and host names to IP address.
48
Data Communication and Computer Networks Unit – 9 MCQs
49
Data Communication and Computer Networks Unit – 9 MCQs
a) dynamic host configuration protocol 248. Which one of the following is not
b) simple network management protocol correct?
c) internet message access protocol a) Application layer protocols are used by
d) media gateway protocol both source and destination devices during
a communication session
Answer: b
b) HTTP is a session layer protocol
Explanation: SNMP is a set of protocols for
c) TCP is an application layer protocol
network management and monitoring. This
d) All of the mentioned
protocol is included in the application layer.
SNMP uses 7 protocol data units. Answer: d
Explanation: HTTP is an application layer
246. Which one of the following is not an
protocol. Whereas TCP is a transport layer
application layer protocol?
protocol.
a) media gateway protocol
b) dynamic host configuration protocol 249. Discarding policy is mainly done by
c) resource reservation protocol _______
d) session initiation protocol a) Sender
b) Receiver
Answer: c
c) Router
Explanation: Resource reservation protocol
d) Switch
is used in transport layer. It is designed to
reserve resources across a network for Answer: c
quality of service using the integrated Explanation: The discarding policy adopted
services model. by the routers mainly states that the
routers discard sensitive or corrupted
247. Which protocol is a signaling
packets that it receives, thus controlling the
communication protocol used for
integrity of the packet flow. The discarding
controlling multimedia communication
policy is adopted as an open loop
sessions?
congestion control technique.
a) session initiation protocol
b) session modelling protocol 250. In classful addressing, a large part of
c) session maintenance protocol available addresses are ________
d) resource reservation protocol a) Organized
b) Blocked
Answer: a
c) Wasted
Explanation: SIP is a signaling protocol in
d) Communicated
which its function includes initiating,
maintaining and terminating real time Answer: c
sessions. SIP is used for signaling and Explanation: In classful addressing, a large
controlling multimedia sessions. part of available addresses are wasted. Thus
50
Data Communication and Computer Networks Unit – 9 MCQs
to solve this classful addressing is replaced 253. The size of an IP address in IPv6 is
with classless addressing where one can _________
reserve the number of IP addresses a) 4 bytes
required by modifying the CIDR value and b) 128 bits
make sure that not many addresses are c) 8 bytes
wasted. d) 100 bits
51
Data Communication and Computer Networks Unit – 9 MCQs
52
Data Communication and Computer Networks Unit – 9 MCQs
53
Data Communication and Computer Networks Unit – 9 MCQs
54
Data Communication and Computer Networks Unit – 9 MCQs
55
Data Communication and Computer Networks Unit – 9 MCQs
packet/datagram header contains the to track packets over a period of time for
destination header for the whole journey to greater analysis and accuracy — but they
source to the destination through the require more memory and operate more
routers. slowly. Stateless firewalls do not analyze
past traffic and can be useful for systems
281. Network layer firewall works as a
where speed is more important than
__________
security, or for systems that have very
a) Frame filter
specific and limited needs. For example, a
b) Packet filter
computer that only needs to connect to a
c) Content filter
particular backup server does not need the
d) Virus filter
extra security of a stateful firewall.
Answer: b
283. A firewall is installed at the point
Explanation: As you know, firewalls are
where the secure internal network and
available as hardware appliances, as
untrusted external network meet which is
software-only, or a combination of the two.
also known as __________
In every case, the purpose of a firewall is to
a) Chock point
isolate your trusted internal network (or
b) Meeting point
your personal PC) from the dangers of
c) Firewall point
unknown resources on the Internet and
d) Secure point
other network connections that may be
harmful. The firewall prevents unauthorized Answer: a
access to your internal, trusted network Explanation: A firewall can be a PC, a
from outside threats. router, a midrange, a mainframe, a UNIX
workstation, or a combination of these that
282. Network layer firewall has two sub-
determines which information or services
categories as _________
can be accessed from the outside and who
a) State full firewall and stateless firewall
is permitted to use the information and
b) Bit oriented firewall and byte oriented
services from outside. Generally, a firewall
firewall
is installed at the point where the secure
c) Frame firewall and packet firewall
internal network and untrusted external
d) Network layer firewall and session layer
network meet, which is also known as a
firewall
chokepoint.
Answer: a
284. Which of the following is / are the
Explanation: Most network layer firewalls
types of firewall?
can operate as stateful or stateless
a) Packet Filtering Firewall
firewalls, creating two subcategories of the
b) Dual Homed Gateway Firewall
standard network layer firewall. Stateful
firewalls have the advantage of being able
57
Data Communication and Computer Networks Unit – 9 MCQs
58
Data Communication and Computer Networks Unit – 9 MCQs
the network handles faults as effectively as a) device that allows wireless devices to
it handles it’s normal functioning to achieve connect to a wired network
better performance management. b) wireless devices itself
c) both device that allows wireless devices
289. Configuration management can be
to connect to a wired network and wireless
divided into two subsystems:
devices itself
reconfiguration and __________
d) all the nodes in the network
a) Documentation
b) Information Answer: a
c) Servers Explanation: Access point in a wireless
d) Entity network is any device that will allow the
wireless devices to a wired network. A
Answer: a
router is the best example of an Access
Explanation: The documentation subsystem
Point.
of configuration management handles the
log making and reporting functions of the 292. In wireless ad-hoc network _________
configuration management. It also reports a) access point is not required
the errors in the network caused by the b) access point is must
configuration’s failure. c) nodes are not required
d) all nodes are access points
290. In Network Management System, the
term that is responsible for controlling Answer: a
access to network based on predefined Explanation: An ad-hoc wireless network is
policy is called ___________ a decentralized kind of a wireless network.
a) Fault Management An access point is usually a central device
b) Secured Management and it would go against the rules of the ad-
c) Active Management hoc network to use one. Hence it is not
d) Security Management required.
59
Data Communication and Computer Networks Unit – 9 MCQs
60
Data Communication and Computer Networks Unit – 9 MCQs
61
Data Communication and Computer Networks Unit – 9 MCQs
62
Data Communication and Computer Networks Unit – 9 MCQs
310. In public key cryptosystem which is problems of the first cellular systems in
kept as public? Europe.
a) Encryption keys
313. Previously in 1980s, GSM stands for
b) Decryption keys
____________
c) Encryption & Decryption keys
a) Global system for mobile
d) None of the mentioned
b) Groupe special mobile
Answer: a c) Global special mobile
Explanation: In public key cryptosystem, the d) Groupe system mobile
encryption keys are kept as public where as
Answer: b
decryption keys are kept as secret.
Explanation: In the mid-1980s GSM was
311. In public key cryptosystem _____ keys called by the name Groupe special mobile.
are used for encryption and decryption. In 1992, GSM changed its name to Global
a) Same System for Mobile Communication for
b) Different marketing reasons.
c) Encryption Keys
314. Who sets the standards of GSM?
d) None of the mentioned
a) ITU
View Answer
b) AT & T
Answer: b c) ETSI
Explanation: In conventional cryptosystem, d) USDC
same keys are used for encryption and
Answer: c
decryption where as in public key
Explanation: The setting of standards for
cryptosystem different keys are used.
GSM is under the aegis of the European
312. Which of the following is the world’s Technical Standards Institute (ETSI). GSM
first cellular system to specify digital task was to specify a common mobile
modulation and network level architecture? communication system for Europe in the
a) GSM 900 MHZ band.
b) AMPS
315. Which of the following does not come
c) CDMA
under the teleservices of GSM?
d) IS-54
a) Standard mobile telephony
Answer: a b) Mobile originated traffic
Explanation: GSM was the world’s first c) Base originated traffic
cellular system to specify digital modulation d) Packet switched traffic
and level architectures and services. It is the
Answer: d
world’s most popular 2G technology. It was
Explanation: GSM services follow ISDN
developed to solve the fragmentation
guidelines and are classified as either
63
Data Communication and Computer Networks Unit – 9 MCQs
64
Data Communication and Computer Networks Unit – 9 MCQs
322. What changes GPRS need to acquire 325. Which of the following protocol is
while upgrading itself from GSM? adopted for interoperability by top three IM
a) A whole new base station service providers?
b) New transceiver at base station a) SIP
c) New channel cards b) SIMPLE
d) New packet overlay including routers and c) XMPP
gateways d) IMPS
Answer: d Answer: b
Explanation: GPRS requires a GSM operator Explanation: They allow their users to
to install new routers and Internet connect with the other services’ public
gateways at the base station along with users for a fee.
new software upgrade. New base station RF
326. Which of the following systems allow
hardware is not required.
short text messages to be exchanged?
323. How many types of protocols are a) SMS
important for instant messaging? b) IMS
a) 2 c) JVS
b) 3 d) All of the mentioned
c) 4
Answer: a
d) All of the mentioned
Explanation: Twitter is described as the
Answer: b prototypical example of this type of service.
Explanation: In an effort to create an
327. Point out the correct statement.
interoperability standard between different
a) Aggregation also can be done within
IM clients, several instant messaging
software creating a custom Web page
protocols have been created.
b) The Add Stuff link in iGoogle takes you to
324. Point out the correct statement. the content management system
a) Every third-party IM clients aim to allow c) When you return to iGoogle, the feed
their users to connect to the different major appears within an Ajax frame that can be
65
Data Communication and Computer Networks Unit – 9 MCQs
moved around on the page or moved to vendors support OVF, notably VMware,
additional tabs that you can create Microsoft, Oracle, and Citrix
d) All of the mentioned d) All of the mentioned
Answer: d Answer: c
Explanation: iGoogle’s syndication Explanation: Efforts are underway to create
aggregation site is an example of a content file format standards for these types of
management system. objects that make the task easier.
328. _____ builds on the older concept of 331. Which of the following lets a Web
Internet chat to add a more immediate service advertise itself in terms of a
response to text messages between collection of endpoints?
individuals and groups. a) WSDL
a) VM b) VMc
b) IM c) SOAP
c) SM d) All of the mentioned
d) None of the mentioned
Answer: a
Answer: b Explanation: The most commonly used
Explanation: IM stands for instant model for discovery and description used
messaging. with SOAP messaging is the Web Services
Description Language (WSDL).
329. Which of the following is a virtual
machine technology now owned by Oracle 332. Which of the following is a
that can run various operating systems? specification for multicast discovery on a
a) Vmachines LAN?
b) VirtualBox a) WS-Agent
c) ThoughtPolice b) WS-Discovery
d) None of the mentioned c) WS-SOAP
d) All of the mentioned
Answer: b
Explanation: VirtualBox serves as a host for Answer: b
a variety of virtual appliances. Explanation: WS-Discovery stands for Web
Services Dynamic Discovery specification.
330. Point out the correct statement.
a) JumpIt is an open-source virtual 333. Which of the following content is
appliance installation and management allowed as per virtual appliance block
service diagram shown below?
b) Converting a virtual appliance from one
platform to another is easy proposition
c) Nearly all major virtualization platform
66
Data Communication and Computer Networks Unit – 9 MCQs
Answer: b
Explanation: SIMPLE is an open standard
protocol.
it locks the developer (and the customer) is offering a complete solution to the
into a solution that is dependent upon the customer.
platform vendor.
342. Which of the following is the most
339. _________ serves as a PaaS vendor complete cloud computing service model?
within Google App Engine system. a) PaaS
a) Google b) IaaS
b) Amazon c) CaaS
c) Microsoft d) SaaS
d) All of the mentioned
Answer: d
Answer: a Explanation: The most complete cloud
Explanation: Google offers many of its Web computing service model is one in which
service applications to customers as part of the computing hardware and software, as
this service model. well as the solution itself, are provided by a
vendor as a complete service offering.
340. Point out the wrong statement.
a) The customer takes no responsibility for 343. Point out the correct statement.
maintaining the hardware, the software, or a) Platforms can be based on specific types
the development of the applications of development languages, application
b) The vendor is responsible for all the frameworks, or other constructs
operational aspects of the service b) SaaS is the cloud-based equivalent of
c) Google’s App Engine platform is IaaS shrink-wrapped software
offering c) Software as a Service (SaaS) may be
d) None of the mentioned succinctly described as software that is
deployed on a hosted service
Answer: c
d) All of the mentioned
Explanation: The customer is responsible
only for his interaction with the platform. Answer: d
Explanation: SaaS can be accessed globally
341. Which of the following can be
over the Internet, most often in a browser.
considered PaaS offering?
a) Google Maps 344. Which of the following aspect of the
b) Gmail service is abstracted away?
c) Google Earth a) Data escrow
d) All of the mentioned b) User Interaction
c) Adoption drivers
Answer: a
d) None of the mentioned
Explanation: The vendor of the PaaS
solution is in most cases the developer, who Answer: b
Explanation: With the exception of the user
68
Data Communication and Computer Networks Unit – 9 MCQs
interaction with the software, all other needs power to reach the computer
aspects of the service are abstracted away. memory.
345. Which of the following SaaS platform is 348. Storage devices like tertiary storage,
with an exposed API? magnetic disk comes under
a) salesforce.com a) Volatile storage
b) amazon.com b) Non-volatile storage
c) flipkart.com c) Stable storage
d) all of the mentioned d) Dynamic storage
Answer: a Answer: b
Explanation: SaaS does not necessarily Explanation: Information residing in
mean that the software is static or nonvolatile storage survives system crashes.
monolithic.
349. For a transaction to be durable, its
346. Point out the wrong statement. changes need to be written to ________
a) SaaS applications come in all shapes and storage.
sizes a) Volatile storage
b) Every computer user is familiar with SaaS b) Non-volatile storage
systems c) Stable storage
c) SaaS software is not customizable d) Dynamic storage
d) None of the mentioned
Answer: c
Answer: d Explanation: Similarly, for a transaction to
Explanation: Every computer user is familiar be atomic, log records need to be written to
with SaaS systems, which are either stable storage before any changes are made
replacements or substitutes for locally to the database on disk.
installed software.
350. The unit of storage that can store one
347. The storage structure which do not are more records in a hash file organization
survive system crashes are ______ are
a) Volatile storage a) Buckets
b) Non-volatile storage b) Disk pages
c) Stable storage c) Blocks
d) Dynamic storage d) Nodes
Answer: a Answer: a
Explanation: Volatile storage, is a computer Explanation: Buckets are used to store one
memory that requires power to maintain or more records in a hash file organization.
the stored information, in other words it
69
Data Communication and Computer Networks Unit – 9 MCQs
71
Data Communication and Computer Networks Unit – 9 MCQs
Answer: a Answer: b
Explanation: Frequency division multiple Explanation: If an FDMA channel is not in
access (FDMA) assigns individual channels use, it sits idle and cannot be used by other
to individual users. Each user is allocated a users to increase or share capacity. It is
unique frequency band or channel. These essentially a wasted resource.
channels are assigned on demand to users
367. TDMA systems transmit in a
who request service.
continuous way.
364. During the period of call, other users a) True
can share the same channel in FDMA. b) False
a) True
Answer: b
b) False
Explanation: TDMA systems transmit data in
Answer: b a buffer and burst method. Thus, the
Explanation: In FDMA systems, no other transmission for any user is not continuous.
user can share the same channel during the
368. Preamble contains __________
period of call. In FDD systems, the users are
a) Address
assigned a channel as a pair of frequencies;
b) Data
one is used for the forward channel while
c) Guard bits
the other frequency is used for the reverse
d) Trail bits
channel.
72
Data Communication and Computer Networks Unit – 9 MCQs
73
Data Communication and Computer Networks Unit – 9 MCQs
75
Data Communication and Computer Networks Unit – 9 MCQs
76
Data Communication and Computer Networks Unit – 9 MCQs
c) elasticity Answer: c
d) none of the mentioned Explanation: Three types of Service model
exist.
Answer: c
Explanation: You have the ability to right- 397. The three different service models are
size resources as required. together known as the _____ model of
cloud computing.
394. _______ enables batch processing,
a) SPI
which greatly speeds up high-processing
b) SIP
applications.
c) CPI
a) Scalability
d) All of the mentioned
b) Reliability
c) Elasticity Answer: a
d) Utility Explanation: Many other service models are
also present.
Answer: a
Explanation: This feature obviates the need 398. CaaS stands for _____________ as
for planning and provisioning. service.
a) Compliance
395. _______ is a complete operating
b) Computer
environment with applications,
c) Community
management, and user interface.
d) Communication
a) IaaS
b) SaaS Answer: d
c) PaaS Explanation: Communication as a Service
d) All of the mentioned (CaaS), enables the consumer to utilize
Enterprise level VoIP, VPNs, PBX and Unified
Answer: b
Communications without the costly
Explanation: In the SaaS model, the
investment of purchasing, hosting and
application is provided to the client through
managing the infrastructure.
a thin client interface.
399. Which of the following is the IaaS
396. How many types of service model are
service provider?
mainly present in Cloud?
a) EC2
a) 1
b) EC1
b) 2
c) EC10
c) 3
d) Hybrid
d) 4
Answer: a
Explanation: On Amazon EC2, a client would
77
Data Communication and Computer Networks Unit – 9 MCQs
400. ARPANET stands for? 403. A technique that marked the beginning
a) Advanced Research Project Agency of computer communications.
Network a) Batch Environment
b) Advanced Research Programmed Auto b) Message passing
Network c) User Environment
c) Advanced Research Project Automatic d) Time Sharing
Network
Answer: d
d) Advanced Research Project Authorized
Explanation: The answer is time sharing. In
Network
time sharing, Users were able to interact
Answer: a with the computer and could share its
Explanation: ARPANET stands for Advanced information processing resources.
Research Project Agency Network. It was
404. A type of technique in which dumb
developed in late 1960s under ARPA
terminals are connected to a central
(Advanced Research Projects Agency).
computer system.
401. Internet can help you find the shortest a) Time Sharing
route. b) Message passing
a) True c) Batch environment
b) False d) User environment
Answer: a Answer: a
Explanation: The statement is true. Explanation: This happens in time sharing.
Obviously, Internet is so widespread; it can In this, users were able to interact with the
help us in all the possible ways. It can computer and could share its information
predict the weather, play music, etc. processing resources.
78
Data Communication and Computer Networks Unit – 9 MCQs
Answer: a Answer: c
Explanation: Packet switching was Explanation: IoT is a network of physical
developed in 1964. In packet switching, the objects or things embedded with
message is broken into parts and then sent electronics or softwares. Iot allows objects
over independently. to be controlled remotely across existing
network.
408. The probability of failure-free
operation of a software application in a 411. RFID is a part of IoT.
specified environment for a specified time. a) True
a) Software Reliability b) False
b) Software Quality
Answer: a
c) Software availability
Explanation: The statement is true. RFID is
d) Software Safety
Radio frequency identification. Radio
Answer: a frequency identification is a part of IoT.
Explanation: The answer is software
412. RFID stands for?
reliability. It is estimated using historical
a) Random frequency identification
and development data.
b) Radio frequency identification
409. DARPA stands for? c) Random frequency information
a) Data Advanced Research Projects Agency d) Radio frequency information
b) Defense Advanced Research Product
Answer: b
Agency
Explanation: Earlier, RFID or Radio
c) Data based Advanced Research Product
79
Data Communication and Computer Networks Unit – 9 MCQs
80
Data Communication and Computer Networks Unit – 9 MCQs
81