DCN final notes
DCN final notes
Data refers to the raw facts that are collected while information refers to processed data
that enables us to take decisions.
Ex. When result of a particular test is declared it contains data of all students, when you find
the marks you have scored you have the information that lets you know whether you have
passed or failed.
The word data refers to any information which is presented in a form that is agreed and
accepted upon by is creators and users.
DATA COMMUNICATION: Data Communication is a process of exchanging digital data or
information
In case of computer networks this exchange is done between two devices over a
transmission medium. This process involves a communication system which is made up of
hardware and software. The hardware part involves the sender and receiver devices and the
intermediate devices through which the data passes.
The software part involves certain rules which specify what is to be communicated, how it is
to be communicated and when. It is also called as a Protocol. Protocol is a set of rule for
transmitting information from one device to another device.
The effectiveness of any data communications system depends upon the following four fundamental
characteristics:
Delivery: The data should be delivered to the correct destination and correct user.
Accuracy: The communication system should deliver the data accurately, without
introducing any errors. The data may get corrupted during transmission affecting the
accuracy of the delivered data.
Timeliness: Audio and Video data has to be delivered in a timely manner without any delay;
such a data delivery is called real time transmission of data.
Jitter: It is the variation in the packet arrival time. Uneven Jitter may affect the timeliness of
data being transmitted.
1.1 Process of data communication and its components:
A Data Communication system has five components as shown in the diagram below:
1. Message : Message is the information to be communicated by the sender to the receiver.
2. Sender : The sender is any device that is capable of sending the data (message).
3. Receiver: The receiver is a device that the sender wants to communicate the data (message).
4. Transmission Medium : It is the path by which the message travels from sender to receiver. It
can be wired or wireless and many subtypes in both.
5. Protocol : It is an agreed upon set or rules used by the sender and receiver to communicate
data. A protocol is a set of rules that governs data communication. A protocol is a necessity in
data communications without which the communicating entities are like two persons trying to
talk to each other in a different language without know the other language.
In order to send a message it is broken up into smaller blocks and each block is separately
identified by transmitting one or more special characters before or after each block.
Some the characters at the beginning and end of each block are used for handshaking purpose.
Basic handshaking process :
1. The transmitted starts by sending a “Ready signal to the receiver to indicate to the receiver
that it wants to send a character.
2. The receiver identifies this signal and communicates its status (busy or ready to accept) on
the busy line to the transmitter.
3. If the receiver is busy then it is indicated by the receiver by sending a character on the busy
line.
4. The transmitter will wait if the receiver is busy and will send the data only when the receiver
is not busy and the transmitter becomes ready.
Ready signal
Transmitter Busy Signal Receiver
Data Line
1.2 Protocols:
Definition. : A protocol is defined as the set of rules agreed upon by sending and receiving
computer systems to facilitate proper communication between them.
Elements of a protocol:
1. Syntax: Generally the data is presented in a particular structure or format or order. The
structure or format or order in which the data is presented is known as is syntax.
2. Semantics: A protocol defined the meaning of each section of data bit, or interprets a
particular pattern of data bits. This known as semantics of a protocol. It also tells us about what
action is to be taken based on interpretation.
3. Timing: Then it takes into consideration the instant of sending the data and the speed at
which the data is to be sent.
Standards:
Data communication standards are defined as the guidelines to the product manufacturers and
vendors to ensure national and international connectivity.
Standards are needed for ensuring the interconnectivity and interoperability among various
hardware and software components. Without standards, it is not possible to ensure connectivity
and interoperability worldwide.
There are two types of standards:
1. De facto standards 2. De Jure standards
1. De facto standards:
1. These are the standards that have been traditionally used and mean by fact or by
convention.
2. These standards are not approved by any organized body but are adopted by
widespread use.
2. De Jure standards:
1. It means by law or by regulation.
2. These standards are legislated and approved by an body that is officially recognized.
Standard organizations:
Standards organizations needed to create and maintain an open and competitive market for
manufacturers. They provide guidelines to manufacturers so to ensure national and nternational
interoperability of data and telecommunication technology and processes.
A) Standard creation committees are :
1. Institute of Electrical and Electronics Engineers (IEEE)
2. Electronic Industries Association (EIA)
3. American National Standards Institute(ANSI)
4. International Standards for organisation (ISO)
B) Regulatory agencies:
Regulatory agencies play a crucial role in ensuring the responsible and ethical operation of
networking and telecommunications, setting standards, enforcing regulations, and addressing
emerging issues in the digital landscape.
Federal Communications Commission (FCC) is government regular body in U.S. for all
communication technology. Telecom Regulatory Authority of India (TRAI)
C) FORUM :
In networking, a forum is an online discussion platform where users can share information, ask
questions, and engage in conversations related to networking technologies, troubleshooting,
and best practices.
Examples of Forums
ATM Forum, MPLS Forum, Frame Relay Forum
Bandwidth:
Bandwidth of medium: Bandwidth in the context of a transmission medium refers to the range
of frequencies it can effectively carry, measured as the difference between the highest and
owest frequencies. Higher bandwidth means a medium can transmit more data faster. Wires
are the most commonly used transmission media. A wire offers a bandwidth of approximately
750 MHz. The transmission over the air and free space range from a few hundred kHz to a few
GHz. An optical fiber can offer a signal bandwidth of over 100 GHz.
Bandwidth of signal :
The bandwidth of a signal refers to the range of frequencies it occupies, measured as the
difference between the highest and lowest significant frequencies. It's a crucial factor in
determining the amount of information a signal can carry.
Data Transmission Rate:
The data transmission rate is the volume of data transmitted over a transmission channel or via
a data interface within a specified unit of time. The units used for this are baud or bits/s.
Baud Rate and Bits per second:
In data transmission, baud rate refers to the number of signal changes or symbols transmitted
per second in a communication channel, measured in bauds (Bd). While bit rate measures the
number of bits transmitted per second, baud rate focuses on the frequency of signal changes .
Bits per second (bps), or bit/s, is a fundamental unit of measurement in data
transmission, representing the number of bits transferred or processed in one second, used to
quantify the speed or bandwidth of various data transmission methods.
1.3 1.3 Modes of Communication (Simplex, Half duplex, Full Duplex)
Mode of Communication:
Two devices communicate with each other by sending and receiving data. The data can flow
between the two devices in the following ways.
1. Simplex mode 2. Half Duplex mode 3. Full Duplex mode
1. Simplex Mode:
In Simplex, communication is unidirectional. Only one of the devices sends the data and the
other one only receives the data. Example: in the above diagram: a cpu send data while a
monitor only receives data
In half duplex both the stations can transmit as well as receive but not at the same time. These
are bi-directional systems. When one device is sending other can only receive and vice- versa (as
shown in figure above.) Example: A walkie-talkie.
In Full duplex mode, both stations can transmit and receive at the same time. These are true bi-
directional systems. In full-duplex communication, both sender and receiver can transmit and
receive data simultaneously, like a two-way street where traffic flows in both directions at the
same time. Example: mobile phones
1.4 Analog Signal and Digital Signal:
Signal:
In the long distance communications, the computer data cannot be transmitted as it is. We
have to first convert it into electrical signals (wired communication) or electromagnetic signals
(wireless Communication.) Both data and the signals which represent them can be of analog
form or digital form.
Analog and digital data:
Analog data: The human voice is the best example of analog data. When a person
speaks, an analog wave is created in air.
Digital data: The data is stored in computer memory in the form of 0s and 1s is digital
data.
Analog Signals:
These are the signals which can have infinite number of different magnitudes or values.
They vary continuously with time Sine wave, triangular wave etc. are the examples of
analog signals.
Digital signals:
A signal is called as digital signal if it has only a finite number of predetermined distinct
magnitudes. The digital signals are discrete time signals, i.e. they are not continuous
with time as shown in figure
Analog Transmission:
Analog signal transmission involves conveying information using continuous signals that vary
in amplitude, phase, or frequency, often used for audio, video, or certain types of data
transmission.
Analog signals are often modulated, meaning the characteristics of a carrier wave (like
frequency or amplitude) are changed to encode the information being transmitted.
Examples:
Radio Transmission: Radio signals modulate a carrier wave to transmit audio or data.
Telephone Networks: Analog signals were traditionally used for telephone conversations,
though digital technologies are now more common.
Audio and Video: Analog signals are still used for transmitting audio and video signals in
some contexts.
Carrier Signal: A high-frequency signal used to carry the information.
Modulation Techniques:
1. Amplitude Modulation (AM): The amplitude of the carrier wave is varied to represent the
information.
2. Frequency Modulation (FM): The frequency of the carrier wave is varied to represent the
information.
3. Phase Modulation (PM): The phase of the carrier wave is varied to represent the
information.
Noise: Unwanted signals that can interfere with the transmission of the analog signal.
When data in either digital or analog forms needs to be sent over an analog media it must first be
converted into analog signals for long distance.
Digital Transmission:
Digital signal transmission involves encoding information as discrete binary values (0s and
1s) and transmitting them over a network medium, like cables or wireless signals, for reliable
data transfer.
Digital signals are preferred in networking because they are more robust to noise and
distortion compared to analog signals, leading to more reliable data transmission.
How Digital Signals are transmitted?
Encoding: Digital data is converted into electrical or electromagnetic signals, which can be
transmitted over various mediums like copper cables, fiber optic cables, or wireless signals.
Transmission Medium: The network medium (e.g., Ethernet cable, Wi-Fi) carries these
digital signals.
Decoding: At the receiving end, the signals are decoded back into digital data.
1. Sampling :
The analog signal is sampled every T interval. Most important factor in sampling is the rate
at which analog signal sampled.
According to Nyquist theorem, the sampling rate must be at least two times of the highest
frequency of the signal.
2. Quantisation:
Sampling yields discrete form of continuous analog signal. Every discrete patter shows the
amplitude of the analog signal at that instance.
Quantisation is done between the maximum amplitude value and the minimum amplitude
value. Quantisation is approximation of the instantaneous analog value.
3. Encoding:
In encoding, each approximated value is then converted into binary format.
Digital to Analog Conversion:
The process of changing one or more the attributes of analog signal based on information in
digital data is called as digital to analog conversion. It is called as the modulation of the
digital signal.
Depending on whether the amplitude, frequency or phase of the carrier signal is modified.
Digital to analog conversion is the process of changing one of the characteristics of an analog
signal based on the information in digital data.
Following figure shows the relationship between the digital information, the digital to analog
modulating process and the resultant analog signal This conversion is done by modem
(Modulator/Demodulator) . Modulator uses some coding scheme or technique and converts
a digital signal into an analog signal and demodulator converts the analog signal back into
the digital signal.
There are three schemes or techniques of digital to analog conversions possible as given below:
Disadvantages:
Advantages:
1. FSK is better noise immunity than ASK
2. FSK is simple implementation and efficient bandwidth utilisation
Disadvantages:
1. FSK requires high bandwidth
2. FSK is preferred only for the low speed modems.
3. Phase Shift Keying:
In this technique, the phase of the original carrier signal is altered to reflect the
binary data.
When a new binary symbol is encountered, the phase of the signal is altered.
Amplitude and frequency of the original carrier signal is kept intact.
Advantages:
1. PSK can achieve higher data rates than FSK.
2. Efficient modulation technique as compared to ASK and FSK
Disadvantages:
1. It has lower bandwidth efficiency.
2. Multi-level PSK modulation schemes (QPSK, 16QAM etc.) are more
sensitive to phase variations.
Applications:
1. Resource sharing such as printers and storage devices
2. Exchange of information by means of e-Mails and FTP
3. Information sharing by using Web or Internet
4. Interaction with other users using dynamic web pages
5. Video conferences
6. Parallel computing
7. Instant messaging
8. IP phones, E-commerce, Electronic Mail, Directory service, Manufacturing, financial services,
marketing and sales
Network Benefits:
Computer networking can help your business grow.
Cost-effective resource sharing.
Improving storage efficiency and volume.
Freedom to choose the best computer networking method.
Access flexibility.
Cut costs on software.
Utilize a Centralized Database.
Securing valuable information.
Computer networks can be classified by their geographic scope (LAN, MAN, WAN, PAN) and by their
purpose (e.g., WLAN, VPN), with LANs being common in small areas, MANs spanning cities, WANs
connecting large areas, and PANs being personal networks.
Classification of LAN, MAN, WAN :
Characteristics of LAN:
It is a private network, so an outside regulatory body never controls it.
LAN operates at a relatively higher speed compared to other WAN systems.
There are various kinds of media access control methods like token ring and ethernet.
Advantages of LAN
Computer resources like hard-disks, DVD-ROM, and printers can share local area networks.
This significantly reduces the cost of hardware purchases.
You can use the same software over the network instead of purchasing the licensed software
for each client in the network.
Data of all network users can be stored on a single hard disk of the server computer.
You can easily transfer data and messages over networked computers.
It will be easy to manage data at only one place, which makes data more secure.
Local Area Network offers the facility to share a single internet connection among all the LAN
users.
Disadvantages of LAN
• LAN will indeed save cost because of shared computer resources, but the initial cost of
installing Local Area Networks is quite high.
• The LAN admin can check personal data files of every LAN user, so it does not offer good
privacy.
• Unauthorized users can access critical data of an organization in case LAN admin is not able
to secure centralized data repository.
• Local Area Network requires a constant LAN administration as there are issues related to
software setup and hardware failures
Characteristics of WAN :
WANs have a large capacity, connecting a large number of computers over a large area, and
are inherently scalable.
They facilitate the sharing of regional resources.
They provide uplinks for connecting LANs and MANs to the Internet.
Communication links are provided by public carriers like telephone networks, network
providers, cable systems, satellites etc.
Typically, they have low data transfer rate and high propagation delay, i.e.they have low
communication speed.
They generally have a higher bit error rate.
Example of WAN : The Internet, 4G Mobile Broadband Systems, A network of bank cash
dispensers.
Features of STP:
1. Low noise/electromagnetic interference
2. Low cost medium
3. Supports data up to few Mbps
4. Low or moderate bandwidth
2. Coaxial cable:
The construction of coaxial cable consist of two concentric conductors namely an inner
conductor and braided outer conductor separated by a dielectric material.
The external conductor is in the form of a metallic braid and used for the purpose of
shielding. The coaxial cable may contain one or more coaxial pairs.
The wire mesh (braided conductor) protects the inner conductor from electromagnetic
interference (EMI). It is often called as shield.
A tough plastic jacket forms covering of cable provides insulation and protection.
Co-axial cable was initially developed for analog telephone networks. The digital
transmission systems using the coaxial cable were developed in 1970s the most popular
application of cable is in the cable TV system having range from 54Mhz to 500 Mhz.
Features:
Increased bandwidth and speed: The bandwidth and speed that optical fiber cable can offer
are exceptionally high. Its most important benefit is the high amount of information that can
be carried per unit of optical fiber cable.
Cheap: Optical fiber cable may be produced in long, continuous miles for less money than
copper wire of comparable lengths. The cost of optical cable would undoubtedly decrease as
more manufacturers swarmed to compete for market share lightweight.
Light and thin: Optical fiber is lighter and thinner than copper wire, and it may be drawn to
smaller diameters. They offer a better match for locations where space is an issue because
they are lighter and smaller than comparable copper wire cables.
Greater carrying capacity—Optical fibers may be grouped into cables of a given diameter
since they are significantly thinner than copper wires. This enables extra phone lines to use
the same cable or more channels to enter your cable TV box through the cable.
Less signal degradation: Optical fiber experiences less signal loss than copper wire.
Light signals: Unlike electrical messages sent through copper wires, light signals from one
fiber inside a fiber cable do not interfere with one another. This translates to clearer phone
calls or TV reception.
Long life: Optical fibers typically have a lifespan of more than 100 years.
1. Radio waves:
Radio waves have frequencies between 10 Khz and 1 Ghz. The range of electromagnetic
spectrum between 10Khz and 1Ghz is called radio waves.
Applications:
Cellular communication 2. Wireless LAN 3. Point to point to multipoint radio systems 4.
Satellite communication
Advantages:
Radio waves are used for communication such as television and radio.
Radio waves are transmitted easily through air. They do not cause damage if
absorbed by the human body, and they can be reflected and refracted to change
their direction.
Disadvantages:
Radio transmission can be interfered with other senders, or electrical devices can
destroy data transmitted via radio.
Bluetooth is simple than infrared. Radio is only permitted in certain frequency
bands. Shielding is not so simple.
2. Microwave :
Microwave frequencies range between 109 Hz (1 GHz) to 1000 GHz with respective
wavelengths of 30 to 0.03 cm. Within this spectral domain are a number of communication
systems applications that are important in both the military and civilian sectors.
Cell phone signals are carried through the air as microwaves. You can see how this works in
the Figure below. A cell phone encodes the sounds of the caller's voice in microwaves by
changing the frequency of the waves. This is called frequency modulation. Micro-oven uses
2.45Ghz frequency band of microwaves.
There are two types of microwave data communication systems
1. Terrestrial 2. Satellite
1. Terrestrial Microwave system: These systems use parabolic antennas. The signals are highly
focused and the physical path must be line of sight. Relay towers are used to extend the range.
Smaller terrestrial microwave systems can be used even within a building.
Advantages of Microwaves
Supports larger bandwidth and hence more information is transmitted.
More antenna gain is possible.
Higher data rates are transmitted as the bandwidth is more.
Antenna size gets reduced, as the frequencies are higher.
Low power consumption as the signals are of higher frequencies.
Disadvantages of Microwaves
Cost of equipment or installation cost is high.
They are bulky and occupy more space.
Electromagnetic interference may occur.
Variations in dielectric properties with temperatures may occur.
Inherent inefficiency of electric power.
Signal strength at the receiving antenna reduces due to multipath reception.
3. Infrared Wave:
The electromagnetic waves having frequencies from 300 GHz to 400Thz (wave length) are
known as infrared waves.
IR waves uses line-of sight propagation.
Infrared light wave is a communication medium whose properties are significantly different
from those of the radio frequencies.
Infrared light is that it cannot penetrate walls. That means it can be easily contained within a
room.
The sun generates radiation in infrared band. This can cause a lot of interference with the IR
communication
The infrared band can be used in development of very high speed wireless LANs in future.
Advantages:
1. Very large bandwidth
2. No electromagnetic interference.
3. It does not penetrate walls.
Disadvantages:
1. It can be used only for short range applications
2. Sun interfere with IR communication
3. Poor performance
4. Less speed of operation.
Applications :
Satellite communication:
Satellites are classified into following categories:
1. Communication satellites 2. Remote sensing satellites 3. Weather satellites
4. Scientific satellites
Artificial satellite orbits or revolves around the earth in exactly the same manner as
electrons revolve around the nucleus of an atom.
Geostationary satellite works basically as a relay station in space.
It receives signal from one earth station, amplifies it, improves the signal quality and radiates
the signal back to other earth stations.
Such a relay system allows us to communicate with any corner of the world.
As each station transmits information signal to the satellite using a highly directional
antenna.
The satellite receives this signal, processes it and transmits it back at a a reduced frequency.
The receiving earth stations will receive this signal using parabolic dish antennas pointed
towards the satellite.
The signal which is being transmitted upwards to the satellite as the uplink and it is normally
as frequency of 6Ghz.
The signal which is transmitted back to the receiving earth station is called down link and is
of frequency 4Ghz
The typical band of signal frequencies used for the communication satellites are as follows.
o C band – 4/6 Ghz
o Ku band – 11/14 Ghz
o Ka Band – 20/30 Ghz
C-band frequency used to reduce the size of antenna.
Multiple access methods such as FDMA(Frequency Division Multiple Access), TDMA(Time
Division Multiple Access), and CDMA (Code Division Multiple Access) are used to allow the
access of satellite to the maximum number of earth stations.
Characteristics:
1. Uses frequency range between 11 to 14Ghz and 4 to 6Ghz which cover the entire earth.
2. It supports a bandwidth upto 10Mbps
3. Attenuation depends on frequency, power, antenna size and atmospheric condition.
4. The signals are affected by EMI effect, jamming, and other reason
5. Installation is difficult and is very expensive.
Applications:
1. For relay of TV channels
2. For long distance telephony
3. Satellite phones used in military
4. For the transmission and reception
5. For the GPS(Global Positioning System) system
Point-to-Point:
The point to point communication take place over link between a single transmitter and
receiver.
Point to point wireless links are usually deployed between two locations that are in clear line
of sight with each other in order to maximise the performance of the wireless link.
Microwave is a LOS wireless communication technology that use high frequency beams of
radio waves to provide high speed wireless connections that can send and receive voice,
video and data information.
Microwave links are widely used for point to point communications.
Broadcast :
Today radio is used for many forms of communication from long distance satellite
communications to the personal cell phones that are widely used. Broadcasting is a method
of transferring a message to all recipients simultaneously over a network.
Space wave propagation of electromagnetic energy includes radiated energy that travels in
lower few miles of earth’s atmosphere. Space waves include both direct and ground
reflected waves shown in figure above
2.4 Multiplexing:
Multiplexing is the process of simultaneously transmitting two or more individual
signals over a single communication channel.
Due to multiplexing it is possible to increase the number of communication channels
so that more information can be transmitted.
Typical applications of multiplexing are in telemetry and telephony or in the satellite
communication.
Concept:
The multiplexer receives a large number of different input signals.
Multiplexer has only one output which is connected to the single communication
channel.
The multiplexer combines all input signals into a single composite signal and
transmits it over the common communication medium.
Sometimes the composite signal is used for modulating a carrier signals before
transmission.
Types of multiplexing:
1. Frequency Division multiplexing(FDM)
2. Time Division Multiplexing(TDM)
3. Wavelength Division Multiplexing(WDM)
The multiplexing techniques can be broadly classified into two categories namely
analog and digital
Analog multiplexing can be either FDM or WDM and digital multiplexing is TDM and
used to handle the digital information
In FDM many signals are transmitted simultaneously where each signal occupies a
different frequency slot within a common bandwidth.
In TDM the signals are not transmitted at a time, instead they are transmitted in
different time slots.
De-multiplexing:
At the receiving end of communication links, a de-multiplexer is used to separate
out the signals into their original form.
1. Frequency-Division Multiplexing:
FDM is a type of multiplexing in which all the signals or channels to be multiplexed
are transmitted at the same time with each channel occupying a distinct non-
overlapping frequency band.
The operations of FDM is based on sharing the available bandwidth of a
communication channel among the signals to be transmitted.
This means many signals are transmitted simultaneously with each signal occupying
a different frequency slot within the total available bandwidth.
Each signal to be transmitted modulates a different carrier. The modulation can be
AM, FM or PM.
The modulated signals are then added together to form a composite signal which is
transmitted over a single channel.
Generally the FDM systems are used for multiplexing the analog signals.
FDM Transmitter
Advantages:
1. In FDM a large number of signals(channels) can be transmitted simultaneously.
2. FDM does not need synchronisation between its transmitter and receiver for proper
operation.
3. Demodulation of FDM is easy
4. FDM is inexpensive
Disadvantages:
1. FDM requires large bandwidth
2. Large number of modulators and filter are required in FDM
3. FDM suffers from cross-talk
4. All the FDM channels get affected due to wideband fading.
Time division multiplexing (TDM) is a communications process that transmits two or more
streaming digital signals over a common channel.
In TDM, incoming signals are divided into equal fixed-length time slots. After multiplexing,
these signals are transmitted over a shared medium and reassembled into their original
format after de-multiplexing.
Time slot selection is directly proportional to overall system efficiency.
Time division multiplexing (TDM) is also known as a digital circuit switched.
There are two types of TDM synchronous and asynchronous.
Examples of utilizing TDM include digitally transmitting several telephone conversations over the
same four-wire copper cable or fiber optical cable in a TDM telephone network; these systems may
be pulse code modulation (PCM)
Advantages:
1. TDM systems are more flexible than FDM
2. Time vision multiplexing circuitry is not complex.
3. Problem of crosstalk is not severe
4. In TDM, the user gets full bandwidth of the channel in a particular time slot.
Disadvantages:
1. Synchronisation is required in time division multiplexing.
2. It is not much suitable for continuous signals
3. In TDM extra guard time are necessary
1.3 Switching:
Definition of switch:
Switch is device that creates temporary connections between two or more devices.
Switching: Switching is process to forward packets coming in from one port to a port
leading towards the destination. When data comes on a port it is called ingress, and when
data leaves a port or goes out it is called egress
Need of Switching:
A network consists of many switching devices. In order to connect multiple devices,
one solution could be to have a point to point connection between pair of devices.
But this increases the number of connections.
The other solution could be to have star topology which has one central device and
connected by many devices.
Both these methods are wasteful and impractical for very large networks. Hence a
better solution is switching. A switched network is made of a series of
interconnected nodes called switch.
1. Circuit-switched network:
Advantages:
1. The main advantage of circuit switching is that a committed transmission channel is
established between the computers which give a guaranteed data rate.
2. In-circuit switching, there is no delay in data flow because of the dedicated transmission
path.
Disadvantages:
1. It takes a long time to establish a connection.
2. More bandwidth is required in setting up dedicated channels.
3. It cannot be used to transmit any other data even if the channel is free as the connection is
dedicated to circuit switching.
2. Packet Switching:
Packet switching is a method of transmitting data across a network where data is broken
down into smaller units called packets, each containing routing information. These packets
travel independently across the network and are reassembled at the destination.
This method is connectionless, meaning a dedicated path isn't established before
transmission. Each time one device sends a file to another, it breaks the file down into
packets so that it can determine the most efficient route for sending the data across the
network at that time.
The network devices can then route the packets to the destination where the receiving
device reassembles them for use.
Packet switching is the transfer of small pieces of data across various networks. These data
chunks or “packets” allow for faster, more efficient data transfer.
Often, when a user sends a file across a network, it gets transferred in smaller data packets,
not in one piece.
For example, a 3MB file will be divided into packets, each with a packet header that includes
the origin IP address, the destination IP address, the number of packets in the entire data
file, and the sequence number
Advantages:
Scalability: Datagram switching is highly scalable and can handle large amounts
of traffic on a network.
Flexibility: Datagram switching is flexible and can support variable packet sizes
and data rates.
Simple routing: Datagram switching does not require a pre-established path for
each packet, allowing packets to be routed dynamically.
Lower latency: Datagram switching typically has lower latency than virtual circuit
switching, as packets are sent immediately without any delay for setup.
Disadvantages
Higher error rates: Datagram switching is more susceptible to errors than virtual
circuit switching, as there is no guaranteed delivery or error correction.
Lack of QoS: Datagram switching does not provide any Quality of Service
guarantees, meaning that different types of traffic may be treated equally.
Increased network congestion: Without a pre-established path for each packet,
datagram switching can lead to increased network congestion and potential
delays.
In data transmission, an "error" refers to a discrepancy or mismatch between the data sent
by the transmitter and the data received by the receiver, often caused by noise or
interference during transmission.
Error is a condition when the output information does not match with the input information.
During transmission, digital signals suffer from noise that can introduce errors in the binary
bits travelling from one system to other. That means a 0 bit may change to 1 or a 1 bit may
change to 0.
1. Content error:
The contents errors are nothing but errors in the contents of a message. E.g. a ‘0’ may be received
as ‘1’ or vice versa. Such errors are introduced due to noise added into the data signal during its
transmission.
2. Flow Integrity Error:
Flow Integrity error means missing blocks of data. It is possible that data block may be lost in the
network possibly because it has been delivered to a wrong destination. Depending on the number of
bits in error we can classify the errors into two types as single bit errors and burst errors.
3. Single Bit error :
The term single bit error suggests that only one bit in the given data unit such as byte in error.
That means only one bit in a transmitted byte will change from 1 to 0 or 0 to 1.
4. Burst errors:
If two or more bits from the data unit such as a byte change from 1 to 0 or from 0 to 1 then burst
errors are said to have occurred.
In FEC the receiver searches for the most likely correct code word.
When an error is detected, the distance between the received invalid code word and all the
possible valid code word is obtained.
The nearest valid code word (the one having minimum distance) is the most likely the
correct version of the received code word as shown below.
In figure above the valid code 1 has the minimum distance(1), hence it is the most likely correct code
word.
Retransmission:
Retransmission methods in data transmission are used to re-send data packets that were lost,
corrupted, or not acknowledged during transmission. Here are some common retransmission
methods
.
3.2 Framing:
Framing in data transmission is the process of dividing a stream of data into smaller, manageable
units called frames. Each frame typically consists of a header, payload, and trailer.
Purpose of Framing:
1. Error Detection and Correction: Framing allows for error detection and correction by
adding checksums or cyclic redundancy checks (CRCs) to each frame.
2. Flow Control: Framing helps regulate the flow of data between devices by allowing the
receiver to acknowledge or reject frames.
3. Synchronization: Framing helps synchronize the transmission and reception of data by
providing a clear beginning and end to each frame.
Components of a Frame:
1. Header: Contains control information, such as source and destination addresses, frame
length, and sequencing information.
2. Payload: Carries the actual data being transmitted.
3. Trailer: Contains error-checking information, such as checksums or CRCs.
Types of Framing
1. Fixed-Length Framing: Each frame has a fixed length, making it easier to implement but
less efficient.
2. Variable-Length Framing: Each frame has a variable length, making it more efficient but
more complex to implement.
3. Bit-Oriented Framing: Frames are defined by specific bit patterns rather than byte
boundaries.
Fixed-length framing is a method of framing data in transmission systems where each frame has a
fixed length.
Advantages:
1. Easy Synchronization: Fixed-length framing makes it easy for the receiver to synchronize
with the transmitter.
2. Simple Error Detection: Errors can be easily detected by checking the frame length.
3. Efficient Use of Bandwidth: Fixed-length framing can make efficient use of bandwidth, as
the transmitter and receiver can agree on a fixed frame length.
Disadvantages:
1. Inefficient for Variable-Length Data: Fixed-length framing can be inefficient when
transmitting variable-length data, as padding may be required to fill the fixed-length frame.
2. Limited Flexibility: Fixed-length framing has limited flexibility, as changes to the frame
length can be difficult to implement.
Example:
Suppose we want to transmit a message using fixed-length framing with a frame length of 8
bytes.
Message: "HelloWorld"
Frames:
Frame 1: "HelloWo"
Frame 2: "rld"
In this example, the message is divided into two frames, each with a fixed length of 8 bytes.
2. Variable-length framing:
Variable-length framing is a method of framing data in transmission systems where each frame can
have a different length.
Advantages:
1. Efficient Use of Bandwidth: Variable-length framing can make efficient use of bandwidth,
as frames can be tailored to fit the size of the data being transmitted.
2. Flexibility: Variable-length framing offers flexibility, as frame lengths can be adjusted to
accommodate different types of data.
3. Reduced Padding: Variable-length framing reduces the need for padding, which can waste
bandwidth.
Disadvantages:
1. Complex Synchronization: Variable-length framing can make synchronization between the
transmitter and receiver more complex.
2. Error Detection Challenges: Error detection can be more challenging with variable-length
framing, as the receiver may not know the expected frame length.
3. Increased Overhead: Variable-length framing may require additional overhead, such as
frame length indicators, to facilitate frame identification.
Example:
Message: "Hi" "HelloWorld"
Frames:
Frame 1: "Hi" (2 bytes)
Frame 2: "HelloWorld" (10 bytes)
In this example, the two frames have different lengths: 2 bytes and 10 bytes.
1. Parity checking:
In this technique, a redundant bit called a parity bit is added to every data unit so that the
total number of 1‘s in the unit (including the parity bit) becomes even (or odd). Figure shows
this concept when transmit the binary data unit 100101.
Simple parity check can detect all single-bit errors. It can also detect burst errors as long as
the total number of bits changed is odd. This method cannot detect errors where the total
number of bits changed is even.
Redundancy:
Redundancy involves transmission of extra bits along with the data bits. These extra bits
actually do not contain any data or information but they ensure that the detection and
correction of errors introduced during the data travel from sender to receiver.
As these extra bits do not contain any information, they are known as redundant bits.
The redundant bits are also called parity check bits. They are produced from the data bits
using some pre-decided rules(protocol).
The data bits and redundant bits together form a code word as shown below
As shown in figure the VRC bits are parity bit associated with the ASCII code of each
character. Each VRC bit will make the parity of its corresponding column “an even parity”
For example consider column 1 corresponding to the character “C”. The ASCII code for the
character is as follows:
Therefore, the 8th bit which is a VRC bit is made “1” to make the parity even.
The Longitudinal Redundant Check(LRC) bit :
The LRC bits are parity bits associated with the rows of the data block. Each LRC bit will make the
parity of the corresponding row, an even parity… For example, consider following
Even a single error in any bit will result in non-correct LRC in one of the rows and an
incorrect VRC in one of the columns. The bit which is common to the row and
column is the erroneous bit.
Figure shows the received data block along with LRC and VRC bits. Note the parity bits
corresponding to row 1 column 5 indicate wrong parity. Therefore the fifth bit in the first
row (encircled bit) is incorrect. Thus, using VRC and LRC, it is possible to locate and correct
the bits in error.
CRC code is an error detection code which is included in each transmitted codeword as
shown in figure and used by the receiver to detect the errors in the received codeword.
This is a type of polynomial code in which a bit string is represented in the form of
polynomials with coefficients of 0 and 1 only.
Polynomial arithmetic uses a modulo-2 arithmetic or XOR operation.
For CRC code the sender and receiver should agree upon a generator polynomial G(x). A
codeword can be generated for a given dataword (message) polynomial(M(x) with the help
of long division.
This technique is more powerful than the parity check and checksum error detection.
Example 1 : Generate the CRC code for the data word of 110010101. The Divisor is 10101
Soln.
Divisor : 10101
The number of data bits = m =9
The number of bits in the divisor =n=5
Divident =Dataword + (n-1) zeros (5-1=4)
So, Divident = 110010101 0000
(4 additional zeros)
XOR table
Division :
Carry out the division as follows:
If the received code word is divided by divisor and the if remainder is zero then received
code word is error free and if it is non-zero then it has error.
Example 2 : The code word is received as 1100 1001 01011. Check whether there are errors in the
received code word, if the divisor is 10101.
Soln.
3,4 Error correction:
In the error correction techniques, codes are generated at the transmitter (sender) by
adding a group of parity bits or check bits as shown in figure
The encoder adds the check bits to the data bits according to a prescribed rule. This rule will
be dependent on the type of code being used (either odd parity or even parity)
The decoder separates out the data and check bits. It uses the parity bits to detect and
correct errors if they are present in the received code words. The data bits are then passed
on to the destination.
Retransmission Protocols
1. Transmission Control Protocol (TCP): A connection-oriented protocol that uses ARQ and other
retransmission methods.
2. User Datagram Protocol (UDP): A connectionless protocol that does not guarantee delivery, but
can use FEC and other retransmission methods.
Hamming Code:
Hamming code is a type of error-correcting code used in data transmission to detect and correct
single-bit errors.
A bit word 1011 is to be transmitted. Construct with even parity using seven-bit Hamming code for
this data
For 4 data bits (1011), we need 3 parity bits (p1, p2, p3) according to R. W. Hamming.
Step 2: Calculate the parity bits
The bits (1,3,5,7), (2,3,6,7), (4,5,6,7) are checked for even parity.
1 0 1 1
D7 D6 D5 P4 D3 P2 P1
P1 depends upon data bits (D3 D5 D7) (1 1 1). Set P1 =1 in order to have even parity
P2 depends upon data bits (D3 D6 D7) (1 0 1). Set P2 =0 in order to have even parity
P4 depends upon data bits (D5 D6 D7) (1 0 1). Set P3 =1 in order to have even parity
1 0 1 1 1 0 1
D7 D6 D5 P4 D3 P2 P1
Step 4: Hamming coded data is now transmitted. At the receiver it is decoded to get the data back. If
all the bit groups mentioned above possess the even parity then the received code word is correct
i.e. it does not contain errors. But if the parity bits is not even (i.e. it is odd) then error exists. Such
an error can be located by forming a tree bit number out of the three parity checks. This process
becomes clear by solving the example given below.
Error Correction:
1 0 1 1 1 0 1
D7 D6 D5 P4 D3 P2 P1
1 1 1 1 1 0 1
D7 D6 D5 P4 D3 P2 P1
P1 depends upon data bits (P1 D3 D5 D7) (1 1 1 1). Hence P1=0 Even parity occurs no error.
P2 depends upon data bits (P2 D3 D6 D7) ( 0 1 1 1). Hence P2=1 Odd parity error occurs.
P4 depends upon data bits (P4 D5 D6 D7) (1 1 0 1). Hence P4= 1 Odd parity error occurs.
Standard Architecture:
802.11a: IEEE 802.11a, published in 1999, is a wireless networking standard that operates in the 5
GHz band using OFDM (Orthogonal Frequency Division Multiplexing) and offers a theoretical
maximum data rate of 54 Mbps.
802.11b: IEEE 802.11b, also known as Wi-Fi 1, is a wireless networking standard that operates in the
2.4 GHz band, providing a maximum data rate of 11 Mbps and uses Direct-Sequence Spread
Spectrum/Complementary Code Keying (DSSS/CCK) modulation.
802.11g: IEEE 802.11g, also known as Wi-Fi 3, is a wireless networking standard that operates in the
2.4 GHz band and offers data rates of up to 54 Mbps, using OFDM modulation and backward
compatibility with 802.11b.
802.11n: IEEE 802.11n, also known as Wi-Fi 4, is a wireless networking standard that uses multiple
antennas and MIMO technology to increase data rates, dependability, and range in wireless local
area networks (WLANs).
802.11p: IEEE 802.11p is an approved amendment to the IEEE 802.11 standard to add wireless
access in vehicular environments (WAVE), a vehicular communication system.
IEEE 802.11p standard typically uses channels of 10 MHz bandwidth in the 5.9 GHz band (5.850–
5.925 GHz). This is half the bandwidth as used in 802.11a, or double the transmission time per data
symbol.
Advantages of WLAN:
1. WLAN is cheaper than wired LAN, because wires are not required.
2. WLAN can be laid down where it is difficult to run cables e.g. historical buildings.
3. It is possible to for WLAN using Laptops.
4. An standard WiFi device can work anywhere in the world.
5. WPA2 protocol used for WiFi is secure protocol so WLANs are safe
Limitations:
1. Spectrum assignment and operational conditions are not same world wide.
2. Radiated power is limited to 100mw. So the range will be limited
3. WiFi networks have a limited range typically 35m for indoor and 100m for outdoor
4. There are data security risks. WiFi networks are not protected thoroughly.
5. WiFi connections can be easily disrupted.
3.6 Bluetooth Architecture:
Bluetooth is the name given to a new technology using short range radio links which could
replace cables connecting portable or fixed electronic devices.
Bluetooth radio modules operate in the unlicensed ISM band at 2.4Ghz. And avoid
interference from other signals by hopping to a new frequency after transmitting or
receiving a packet.
Thus, bluetooth is a wireless LAN technology which can connect devices such as telephones,
computers, printers, cameras etc. without using wires. A bluetooth LAN is an Ad hoc
Network.
Bluetooth defines two types of networks:
1. Piconet 2. Scatternet
1. Piconet :
It is a small network which can have at most eight devices or stations. One of them is
called master and all others are called slaves.
Communication between a master and slaves can be one to one or one to many.
No communication between two slaves is occurred. Current data rate is 1Mbps and
used for short range up to 10 meters
2. Scatternet:
Figure shows a scatternet consisting of two piconets. A slave in the first piconet can act as a
master in the second piconet.
It will receive the messages from the master in the first piconet by acting as a slave and then
delivers the message to the slaves in the second piconet
Layered Architecture:
OSI model is a layered server architecture system in which each layer is defined according to a
specific function to perform. All these seven layers work collaboratively to transmit the data from
one layer to another. The Upper Layers: It deals with application issues and mostly implemented
only in software. Middle layer is transport layer and is heart of layered structure. Lower layers deals
with only hardware
OSI Reference Model
1. Application Layer:
The Application Layer in the OSI model acts as the interface between user applications and the
network, enabling communication and providing services like file transfer, email, and web
browsing. It's the top layer, closest to the end-user, and responsible for presenting data to
applications and allowing users to access network resources.
Functions:
Data Exchange: Facilitates the exchange of data between applications on different devices, ensuring
compatibility and proper data transmission.
Protocol and Syntax Definition: Determines the specific protocols and data formats used for
communication between applications.
Remote Hosting: Enables remote access to systems, allowing users to log in and interact with a
remote host.
Data Presentation: Handles the presentation of data to the user, including tasks like displaying web
content or formatting documents.
Security and Authentication: Implements security measures like user authentication and data
encryption to protect network data and access.
Resource Sharing: Allows users to access and share resources like files, databases, and other
network services.
Network Management: Provides tools for managing and configuring network devices and services.
Mail Services: Facilitates email communication between users.
Directory Services: Enables access to global information and databases.
Error Recovery: Ensures agreement on error recovery procedures at both ends of the
communication.
The Application layer of the OSI model uses protocols like HTTP, FTP, SMTP, DNS, Telnet, IMAP,
RARP, SNMP and DHCP to provide services to applications. These protocols enable functionalities
like web browsing, file transfer, email, domain name resolution, and dynamic IP address
assignment,
2. Presentation Layer:
The Presentation Layer in the OSI model focuses on data representation, translation, and security. It
ensures data is formatted correctly for transmission and interpretation, handles encryption and
decryption, and may also compress data to reduce transmission size.
Functions:
Data Translation:
The Presentation Layer translates data between different formats and character sets used by
different systems. For example, it might convert ASCII characters to EBCDIC.
Encryption/Decryption:
This layer is responsible for encrypting data before transmission and decrypting it upon receipt,
ensuring confidentiality.
Compression:
The Presentation Layer can compress data to reduce the amount of data transmitted over the
network, saving bandwidth and improving transmission speed.
Data Formatting:
It ensures data is formatted correctly for the receiving application, making it readable and
understandable.
Security:
By providing encryption and decryption services, the Presentation Layer contributes to the overall
security of network communication.
Protocols used are MIME(Multi Purpose Internet Mail Extensions), News Transfer Protocol(NNTP),
TLS(Transport layer Security, SSL Secure Socket layer, SSH Secure shell etc.
3. Session Layer:
The Session Layer in the OSI model primarily manages and controls connections between
applications, establishing, maintaining, and terminating dialogues. It also handles authentication and
authorization, ensuring secure communication. Additionally, the layer supports session check
pointing and recovery, allowing for interrupted sessions to be resumed.
Functions:
Dialogue Control:
Dialogue control function manages the flow of communication between two devices or processes,
determining which can transmit data and when. This ensures that data exchange is organized and
avoids conflicts, particularly important in half-duplex and full-duplex communication modes.
Establishing and Managing Connections:
The session layer sets up a session by coordinating and negotiating parameters, such as protocols
and port numbers, to ensure compatibility between devices.
Authentication and Authorization:
It verifies the identity of users and grants or denies access to resources, enhancing security.
Session Termination:
The layer ensures that connections are gracefully closed when communication is no longer needed.
Synchronization:
It maintains the synchronization of data streams, ensuring that different parts of a message arrive in
the correct order, especially in media streaming.
Check pointing and Recovery:
The session layer can create checkpoints within a session, allowing for the restoration of the
connection in case of interruptions or failures.
Full-duplex, Half-duplex, and Simplex Operation:
It supports different types of communication, including full-duplex (two-way simultaneously), half-
duplex (two-way but not simultaneously), and simplex (one-way) communication.
Session Checkpoint and Recovery:
It allows for sessions to be paused and resumed at a later point, enabling applications to recover
from interruptions.
Managing Interruptible Dialogues:
The layer can handle multiple dialogues within a session, allowing applications to switch between
different activities.
Protocols uses are L2TP(Layer 2 tunnelling protocol), PPTP(Point to point tunnelling protocol,
NetBIOS(Network Basic Input Output system, PAP(Password Authentication Protocol, SDP (Socket
Direct Protocol) etc.
3. Transport Layer:
The transport layer in the OSI model provides reliable, end-to-end data transmission, ensuring data
arrives at the correct application on the receiving end. It handles segmentation and reassembly of
data, flow control, error recovery, and multiplexing.
Functions:
1. Segmentation and Reassembly:
The transport layer receives data from the session layer and divides it into smaller units called
segments (or datagrams for UDP) for efficient transmission. On the receiving end, it reassembles
these segments into the original data stream, ensuring they arrive in the correct order.
2. Flow Control:
This mechanism prevents the receiver from being overwhelmed by data by regulating the flow rate
between sender and receiver. It ensures the receiver has sufficient resources to process the data
before sending more.
3. Error Control:
The transport layer detects and corrects errors during transmission, ensuring data integrity. This
includes mechanisms for error detection (e.g., checksums) and retransmission of lost or corrupted
data.
4. Multiplexing/Demultiplexing:
Multiplexing allows multiple applications on a single host to use the same network connection,
according to IBM. De-multiplexing ensures that data received from the network is delivered to the
correct application on the receiving end.
5. Addressing:
The transport layer uses port numbers to distinguish between different applications running on the
same host, according to IBM.
These port numbers are included in the segment headers, allowing the receiving end to identify the
correct destination application.
6. Congestion Control:
This mechanism helps manage network congestion by throttling the transmission rate, preventing
packets from being lost or delayed.
Congestion control helps ensure reliable and efficient data transfer,
Protocols used in this layer are TCP/IP(Transmission Controlled Protocol/Internet Protocol),
IPX/SPX( Internetwork Packet Exchange/Sequence Packet Exchange) etc., UDP(User Datagram
protocol)
6. Network layer:
The Network Layer in the OSI model handles logical addressing, routing, and forwarding of data
packets between different networks, ensuring data reaches its intended destination. It uses IP
addresses to identify devices and their location, and routers to direct packets along the network.
Functions:
Logical Addressing:
Assigns unique IP addresses to each device on a network, enabling identification and communication
across diverse networks.
Routing:
Determines the best path for data packets to travel from source to destination, considering network
conditions and priorities.
Forwarding:
Transfers data packets to the next hop on the path, using the destination IP address to guide the
packet.
Fragmentation and Reassembly:
Handles cases where data packets are larger than the maximum transmission unit (MTU) of a
specific network segment, breaking them into smaller pieces for transmission and reassembling
them at the destination.
Error Handling:
Detects and handles errors that may occur during data transmission, using protocols like ICMP
(Internet Control Message Protocol) to report errors and facilitate diagnostics.
Quality of Service (QoS):
Prioritizes certain types of traffic based on their needs, ensuring that important data is delivered
promptly.
Protocols used in this layer are IPv4,IPv6, ICMP(Internet Control Message protocol), IPSec.(Internet
Protocol Security), Internetwork Packet Exchange(IPX), RIP(Routing Information protocol)
PPP(Point to point protocol, HDLC(High Level Data Link control), SLIP(Serial; line Internet protocol),
ARP(Address Resolution Protocol), IEEE 802.3
7. Physical Layer:
Functions of the Physical Layer include the modulation, bit synchronization, and transmission of raw
binary data over the physical medium. Technologies such as Fiber Optics and Wi-Fi operate at this
layer, ensuring that the data physically moves from one device to another in the network.
Functions:
Bit by bit transmission(Encoding & decoding): The Physical Layer is responsible for sending raw
data as bits over a physical medium. It converts data into signals that can travel through wires, fiber
optics, or wireless channels (encoding) and turns these signals back into data at the receiver
(decoding).
Modulation demodulation: It ensures signals are transmitted correctly and uses techniques
like modulation to prepare the data for transmission and demodulation to retrieve it at the other
end.
Transmission mode: This layer also decides how data flows (one-way, two-way alternately, or
simultaneously) through transmission modes and controls the speed and timing of data
transmission to keep everything running smoothly.
Multiplexing and physical topologies: It uses different techniques of multiplexing in order to
improve channel efficiency and specifies the way to in which different devices or nodes are arranged
in a network.
Switching: It also specifies the different switching techniques, circuit switching, packet switching and
message switching
Characteristics of physical components: It uses characteristics of cable, connectors, networking
devices etc.
Protocols used in this layer are Bluetooth, OTN(Optical Transport layer), DSL, IEEE 802.11(Wi-fi)
protocol),IEEE 802.3 (Ethernet protocol)
Encapsulation:
Data Encapsulation is the process of adding the headers and footers to the data is called data
encapsulation. The headers and footers (or trailers) contain the control information in the individual
fields. This control information is used to make the message packet reach the destination. Thus, the
header and footer form the envelope which carries the message to the desired destination. Data De-
encapsulation is the process of removing headers and footers.
4.2 Layers in OSI Model
1. Physical layer:
Functions:
It defines the physical characteristics and functions of the physical devices and
interfaces so that transmission can occur. It states the number of pins in each of the
devices as well as the purpose of each pin.
It lays out the transmission medium and type of signal for transmitting the bits, i.e.,
electrical pulses, optical pulses or radio signals.
It defines the procedure of encoding of the bits, for example, how many volts should
represent a 0 bit and 1 bit in case of electrical signals.
It states the data transmission rate, i.e., number of bits transmitted per second; and the
duration of a bit, i.e., how long a bit stays.
It defines the topology, i.e., physical layout, of the network devices.
It also states the direction of transmission, i.e., whether the transmission is in simplex
mode, half-duplex mode or full-duplex mode.
2. Data-Link Layer:
Functions:
Data link layer corrects errors which can occur at the physical layer. The layer allows
you to define the protocol to establish and terminates a connection between two
connected network devices.
It is IP address understandable layer, which helps you to define logical addressing so
that any endpoint should be identified.
The layer also helps you implement routing of packets through a network. It helps
you to define the best path, which allows you to take data from the source to the
destination.
The data link layer is subdivided into two types of sublayers:
o Media Access Control (MAC) layer- It deals with protocols, flow-control, and error
control
o Logical link control layer- It deals with actual control of media
1. Framing
Data-link layer takes packets from Network Layer and encapsulates them into
Frames. Then, it sends each frame bit-by-bit on the hardware. At receiver’ end, data
link layer picks up signals from hardware and assembles them into frames.
2. Addressing
Data-link layer provides layer-2 hardware addressing mechanism. Hardware address
is assumed to be unique on the link. It is encoded into hardware at the time of
manufacturing.
3. Synchronization
When data frames are sent on the link, both machines must be synchronized in
order to transfer to take place.
4. Error Control
Sometimes signals may have encountered problem in transition and the bits are
flipped. These errors are detected and attempted to recover actual data bits. It also
provides error reporting mechanism to the sender.
5. Flow Control
Stations on same link may have different speed or capacity. Data-link layer ensures
flow control that enables both machine to exchange data on same speed.
6. Multi-Access
When host on the shared link tries to transfer the data, it has a high probability of
collision. Data-link layer provides mechanism such as CSMA/CD or CSMA/CO to
equip capability of accessing a shared media among multiple Systems.
Access control in the data link layer refers to the mechanisms that are used to
regulate which devices are allowed to transmit data over the physical
communication link. These mechanisms are used to ensure that only authorized
devices can access the link and that the transmission of data is orderly and efficient.
The data link layer has two sublayers: the logical link control (LLC) sublayer and
the media access control (MAC) sublayer.
The LLC sublayer in the data link layer of the OSI model manages logical links
between devices, providing synchronization, error detection, and control of data
flow. It acts as an interface between the higher layers (like the network layer) and
the lower layer (the MAC sublayer). LLC also handles multiplexing, allowing multiple
network protocols to coexist and share the same physical network medium.
The MAC sublayer is responsible for:
o Determining how devices share the network medium.
o Ensuring data packets are addressed correctly.
o Protecting data against errors during transmission.
o Providing the necessary infrastructure for the LLC sublayer to
manage the higher-level protocols.
3. Network Layer:
The main function of the network layer or layer 3 of the OSI (Open Systems
Interconnection) model is delivery of data packets from the source to the destination
across multiple hops or links. It also controls the operation of the subnet.
Functions of network layer:
• When data is to be sent, the network layer accepts data from the transport layer above,
divides and encapsulates it into packets and sends it to the data link layer. The reverse
procedure is done during receiving data.
• The network layer is responsible for routing packets from the source host to the
destination host. The routes can be based upon static tables that are rarely changed; or
they can be automatically updated depending upon network conditions.
• Many networks are partitioned into sub-networks or subnets. The network layer
controls the operations of the subnets. Network devices called routers operate in this
layer to forward packets between the subnets or the different networks.
• The lower layers assign the physical address locally. When the data packets are routed
to remote locations, a logical addressing scheme is required to differentiate3. the
source system and the destination system. This is provided by the network layer.
• This layer also provides mechanisms for congestion control, in situations when too many
packets overload the subnets.
• The network layer tackles issues like transmission delays, transmission time, avoidance
of jitters etc.
4. Transport Layer:
The transport layer (Layer 4) is responsible for delivery of an entire message from an
application program on the source device to a similar application program on the
destination device.
Functions:
It delivers a message from a specific process of one computer to a specific process in
another computer. The transport layer adds a port address to the header of the data
packet.
It divides a message into smaller segments such that each segment contains a sequence
number along with the port address. It ensures that the segments arrive correctly at the
receiver’s end and then reassembles them. (segmentation & numbering)
It provides an error-free point-to-point channel for both connectionless (UDP protocol)
and connection-oriented services (TCP/IP protocol)
It isolates the upper layers, i.e., the user support layers from any changes in hardware
technology in the lower layers, i.e., network support layers.
It identifies errors like damaged packets, lost packets, and duplication of packets, and
provides adequate error-correction techniques.
5. Session Layer:
The session layer (layer 5) is responsible for establishing, managing, synchronizing and
terminating sessions between end-user application processes..
Functions:
It works as a dialog controller. It allows the systems to communicate in either half-
duplex or full-duplex mode of communication.
It is responsible for session management. Through this, it prevents the two users to
simultaneously attempt the same critical operation.
It synchronizes communication. It adds synchronization points or checkpoints in data
streams for long communications. This ensures that data streams up to the checkpoints
are successfully received and acknowledged. In case of any failures, only the streams
after the checkpoints have to be re-transmitted.
6. Presentation Layer:
Presentation layer allows you to define the form in which the data is to exchange
between the two communicating entities. It also helps you to handles data
compression and data encryption.
This layer transforms data into the form which is accepted by the application. It also
formats and encrypts data which should be sent across all the networks. This layer is
also known as a syntax layer.
Functions:
Character code translation from ASCII to EBCDIC. (encoding decoding)
Data compression: Allows to reduce the number of bits that needs to be transmitted on
the network. (compression decompression)
Data encryption: Helps you to encrypt data for security purposes — for example,
password encryption. (encryption and decryption)
It provides a user interface and support for services like email and file transfer.
7. Application Layer:
Functions:
• It facilitates the user to use the services of the network.
• It is used to develop network-based applications.
• It provides user services like user login, naming network devices, formatting
messages, and e-mails, transfer of files etc.
• It is also concerned with error handling and recovery of the message as a whole.
• This layer uses a number of protocols, the main among which are as follows −
• Hyper Text Transfer Protocol, HTTP − It is the underlying protocol for World Wide Web. It
defines how hypermedia messages are formatted and transmitted.
• File Transfer Protocol, FTP − It is a client-server based protocol for transfer of files
between client and server over the network.
• Simple Mail Transfer Protocol, SMTP − It lays down the rules and semantics for sending
and receiving electronic mails (e-mails).
• Domain Name System, DNS − It is a naming system for devices in networks. It provides
services for translating domain names to IP addresses.
• TELNET − It provides bi-directional text-oriented services for remote login to the hosts
over the network.
• Simple Network Management Protocol, SNMP − It is for managing, monitoring the
network and for organizing information about the networked devices.
• This layer is the combination of data-link and physical layer, where it is responsible for
maintaining the task of sending and receiving data in raw bits, i.e., in binary format over
the physical communication modes in the network channel.
• It uses the physical address of the system for mapping the path of transmission over the
network channel.
SLIP :
SLIP, or Serial Line Internet Protocol, is a protocol that allows TCP/IP to operate over
serial connections, such as dial-up connections or dedicated serial links.
SLIP encapsulates IP packets within a frame for transmission over a serial line,
establishing a point-to-point connection.
It's commonly used for dial-up connections and dedicated serial links, particularly at
speeds between 1200bps and 19.2Kbps or higher.
While SLIP is a simple protocol, it has largely been replaced by Point-to-Point
Protocol (PPP) on personal computers due to PPP's better features and ability to
handle IP address configuration.
SLIP is still preferred in microcontrollers for encapsulating IP packets because of its
small overhead.
SLIP is defined in RFC 1055
PPP:
PPP (Point-to-Point Protocol) is a data link layer protocol (Layer 2) used to establish
and manage connections between two devices, encapsulating network layer
protocols like IP for transmission over point-to-point links, such as dial-up or DSL
connections.
PPP operates at the data link layer (Layer 2) of the OSI model, responsible for
establishing and maintaining a physical link between two devices.
PPP is designed for point-to-point connections, meaning it's used to connect two
devices directly, like a computer to an ISP's modem or router.
PPP encapsulates network layer data (like IP packets) within PPP frames for
transmission over the physical link.
PPP provides mechanisms for establishing, configuring, and testing the data link
connection.
PPP supports authentication mechanisms to ensure that only authorized devices can
connect to the network.
PPP is capable of supporting multiple network layer protocols, including IP, IPX, and
AppleTalk.
2. Internet Layer:
• The Internet layer performs the task of controlling the transmission of the data over the
network modes and enacts protocols related to the various steps related to the
transmission of data over the channel, which is in the form of packets sent by the
previous layer.
• It is responsible for specifying the path that the data packets will use for transmission.
• This layer is responsible for providing IP addresses to the system for the identification
matters over the network channel.
• Some of the protocols applied in this layer are:
IP(Internet protocol):
• IP is responsible for addressing and routing data packets across networks.
• It ensures that each device on a network has a unique identifier (an IP address).
• IP supports two versions: IPv4 and IPv6.
• Routers use IP to guide data packets through networks, selecting the most
efficient path.
ARP(Address Resolution Protocol): ARP translates IP addresses into physical MAC addresses
to send data to the correct device on a local network.
RARP(Reverse Address Protocol): ARP maps IP addresses to MAC addresses, while RARP
maps MAC addresses to IP addresses.
ICMP: The Internet Control Message Protocol (ICMP) is a network protocol used for error
reporting and diagnostic purposes, primarily by network devices like routers, to
communicate network issues and gather information about network conditions .
3. Transport Layer:
• This layer is responsible for establishing the connection between the sender and the
receiver device and also performs the task of dividing the data from the application layer
into packets, which are then used to create sequences.
• It also performs the task of maintaining the data, i.e., to be transmitted without error,
and controls the data flow rate over the communication channel for smooth
transmission of data.
The protocols used in this layer are:
• TCP: Transmission Control Protocol is responsible for the proper transmission of
segments over the communication channel. It also establishes a network connection
between the source and destination system.
• UDP: User Datagram Protocol is responsible for identifying errors, and other tasks during
the transmission of information. UDP maintains various fields for data transmission such
as: Source Port Address: This port is responsible for designing the application that
makes up the message to be transmitted. Destination Port Address: This port receives
the message sent from the sender side. Total Length: The total number of bytes of the
user datagram. Checksum: Used for error detection of the message at the destination
side.
4. Application Layer
• This is the topmost layer which indicates the applications and programs that utilize the
TCP/IP model for communicating with the user through applications and various tasks
performed by the layer, including data representation for the applications executed by
the user and forwards it to the transport layer.
• The application layer maintains a smooth connection between the application and user
for data exchange and offers various features as remote handling of the system, e-mail
services, etc.
Some of the protocols used in this layer are:
HTTP: The Hypertext Transfer Protocol (HTTP) is a foundational protocol for the World
Wide Web, enabling communication between web browsers and servers by transmitting
hypertext messages, and it operates on a client-server model.
SMTP: SMTP, or Simple Mail Transfer Protocol, is the fundamental protocol used for
sending emails over the internet, enabling email clients and servers to exchange
messages.
FTP: File Transfer Protocol (FTP) is a standard way to move files between computers
over a network. It's a set of instructions that computers use to communicate and
exchange files. .
TELNET: Telnet is a network protocol that allows users to remotely access and control
computers and devices. It uses a command line interface to communicate with a remote
server.
BOOTP: Bootstrap Protocol (BOOTP) is a network protocol that helps computers get an
IP address and other configuration information from a server. It's used when a computer
first starts up, during the bootstrap process.
DHCP: Dynamic Host Configuration Protocol (DHCP) is a network protocol that
automatically assigns IP addresses to devices on a network. DHCP also provides other
configuration information, such as subnet masks, default gateways, and DNS addresses.
4.6 IP Address-Concept
• IP addressing is the method used to identify hosts and network devices. The Number of
hosts connected to the internet continues to grow and the IP addressing scheme has been
adapted over time to cope this growth.
• The internet protocol address (IP address) is a unique number assigned to every computing
devices such as PC, tablets, smart phones use to identify itself and communicate with other
devices in the IP network.
• The numeric identifier that TCP/IP assigns to every device in the world is called as IP
address. IP address consists of two parts namely, a network ID, which specifies the network
on which a host resides, and a host ID, which identifies the host within that network.
IP Address = Network identifier + Host Identifier
e.g. 145.25.10.100
The IP address is a 32-bit number, and its primary purpose is to enable communications between
networks.
Notation:
1. Binary notation (base 2): In binary notation, the IPV4 address is displayed as 32 bits. Eachh
octet is often referred to as byte. So it is common to hear an IPV4 address referred to as a
32-bit address or a 4 byte address. An example of binary notation is
01110100.11111010.10111001.11001100
2. Hexadecimal notation (Base 16):
Each hexadecimal digit is equivalent to four bits. This means that 1 32-bit address has 8
hexadecimal digits. This notation is often used in network programming. An example
hexadecimal notation of an IPV4 is CO.A8.01.64
3. Dotted decimal notation (Base 256):
To make the IPV4 address more compact and easier to read Internet addresses are usually
written in decimal form with a decimal point(dot) separating the bytes. Dotted-decimal
notation is the format that is typically used for displaying the IP address in a human readable
format. An example of dotted-decimal notation is 192.156.1.100
Address Space:
A protocol like IPV4 that defines addresses has an address space. An address space is the total
number of addresses used by the protocol. If a protocol uses N bits to define as address, the address
space is 2N because each can have two different values( 0 or 1) and N bits can have 2N values.
IPV4 uses 32-bit addresses, which means that the address space is 232 or 4,294,967,296 ( more than
4 billion)
Theoretically, if there were no restrictions, more than 4 billion devices could be connected to the
internet.
4. Class D:
Class D addresses are reserved for IP multicast addresses.
The four high-order bits in a class D address are always set to
binary 1 1 1 0.
The remaining bits recognize hosts.
Class D IP address range includes 224.0.0.0 to 239.255.255.255
2 Class E:
Class E is an experimental address that is reserved for future
use.
The high-order bits in a class E address are set to binary 1111.
Class E IP address range includes 240.0.0.0 to 255.255.255.255
First Four Reserved for future use
Bits (1111)
4 28
In classless addressing, the whole address space is divided into variable length
blocks. Theoretically, we can have a block of 20,21,22…… 232 addresses.
We can have a block of 1 address, 2 addresses, 4 addresses, 128 addresses and
so on. An organisation can be granted one block of addresses.
In the classless addressing, the whole address space divided into non-overlapping
blocks.
In the classless world, subnet mask information must always be provided when
routers exchange information with each other.
Some routing protocols such as the Border Gateway Protocol(BGPV4) and OSPF
support classless addressing.
Classless addressing uses CIDR notation to specify the subnet mask and appends
the subnet mask to the IP address e.g. 192.0.2.10/24
Classless addressing allows for more flexible subnetting, enabling administrators
to create subnet of varying sizes.
Classless addressing reduce wastage of IP address utlisation and improved
flexibility in subnetting and addressing and enable better scalability and
adaptability in network design.
Subnet mask:
In computer networking, a subnet mask is a 32-bit number used to divide an IP address into
network and host portions, enabling network segmentation (subnetting) for more efficient
and secure routing.
A subnet mask helps determine which part of an IP address identifies the network and which
part identifies a specific device (host) on that network.
A subnet mask consists of 32 bits, represented as four octets (numbers separated by dots) in
decimal format (e.g., 255.255.255.0) or as a series of 1s and 0s in binary format.
The "1" bits in the subnet mask correspond to the network portion of the IP address, while
the "0" bits correspond to the host portion.
By using different subnet masks, you can divide a large network into smaller, logical
networks (subnets).
A subnet mask of 255.255.255.0 (or /24 in CIDR notation) indicates that the first three
octets of an IP address belong to the network, and the last octet identifies the host.
Subnetting:
Subnetting is a method for partitioning a classful IP network into smaller subnetworks
(subnets). The process of subnetting involves dividing a network up into smaller networks
called subnets.
A subnet is a logical partition of an IP network into multiple, smaller network segments.
Each of these subnets has its own specific address.
Subnetting provides the network administrator with several benefits including 1. extra
flexibility, 2. Reducing IP address wastage, 3. more efficient use of network address, 4. the
capability to contain broadcast traffic, and 5. provides security by separation of subnets.
To allow a single network address to span multiple physical networks is called subnet
addressing or subnet routing or subnetting.
To subnet a network, extend the natural mask using some of the bits from the host ID
portion of the address to create a subnetwork ID.
For example given a class C IP address of 204.15.5.0 which has a natural masks of
255.255.255.0, you can create subnets in the following manner
204.15.5.0 - 11001100.00001111.00000101.00000000
255.255.255.224 – 11111111.11111111.1111111.11100000
Network ID Host ID
By extending the mask to be 255.255.255.224, you have taken three bits from the original
host portion of the address and used them to make subnets. With these three bits, it is
possible to create eight subnets (23)
With the remaining five host ID bits, each subnet can have up to 32 host addresses, 30 of
which can actually be assigned to a device since host ids denoted by zeros and network ids
One .
So with this mid the subnets are created as
Benefits of Subnetting:
1. Improved network performance: By isolating network traffic within subnets, you can reduce
network congestion and improve overall performance.
2. Enhanced security: Subnetting allows you to create separate network segments for different
departments or security zones, improving security.
3. Efficient IP address usage: Subnetting helps you make better use of IP addresses by allowing
you to divide a large network into smaller, more manageable segments.
4. Easier network management: Subnetting makes it easier to manage and troubleshoot
network issues by isolating problems to specific subnets.
Disadvantages of Subnetting
1. Limited IP Address Space: Dividing networks reduces available IPs per subnet.
2. Additional Hardware: Subnetting reduces the overall number of IP addresses in the
network, yet it could necessitate purchasing extra hardware, like a router. Thus it could be
very expensive.
3. Complex Setup: Requires expertise to plan and configure subnets.
4. Compatibility Issues: Older devices or systems may struggle with subnetting configurations
Supernetting :
Supernetting also called Classless Inter-Domain Routing (CIDR) is a way to aggregate multiple
Internet addresses of the same class.
Classful means that the IP addresses and subnets are within the same network. The problem
with classful addressing is that there is a lot of unused IP address space. For example, a class
A IP network has more than 16 million possible host addresses. A Class B network has more
than 65,00 host addresses, but the fact is that only a limited number of class A and B address
space has been allocated for internet use.
However, the size of a class C block with a maximum number of 256 addresses may not
satisfy the needs of an organisation. Even a mid-size organisation may need more
addresses.
One solution is supernetting, an organisation can combine several class C blocks to create a
large range of addresses. In other words, several networks are combined to create a
supernetwork. By doing this an organisation an organisation can apply for set of Class C
blocks instead of just one.
For example, the class C size subnet mask 255.255.255.0 is listed in CIDR notation as /24.
This indicates the 24 bits are set to 1. Class B size subnet is written as /16 and a class A
subnet is written as /8. CIDR can also be used to represent subnets that identify only part of
the octet bits in an IP address.
In subnetting, we need the first address of the subnet and the subnet mask to define the
range of addresses. In supernetting, we need the first address of the supernet and the
supernet mask to define the range of addresses.
Following figure shows difference between a subnet mask and supernet mask. A subnet
mask that divides a block into eight subblocks has three more is (2 3=8) than the default mask
while a supernet mask that combines eight blocks into one superblock has three less 1s than
the default mask
1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 0 0 0 0 0
3 more 1’s
Default Mask
1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 0 0 0 0 0 0 0 0
3 less 1’s
Supernetting
1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 0 0 0 0 0 0 0 0 0 0 0
1
Combines 8 networks into 1 supernet.
Advantages:
1) Helpful to solve the problem of lacking IP address
2) It reduces the size of routing tables
3) It provides the better overview of network
4) It decreases the required time in rebuilding the routing tables
Disadvantages:
1. It cannot cover different class of network when combined.
2. All the networks should be in same class and all IP should be contiguous.
1. Peer To Peer:
Peer to peer network is a type of decentralised and distributed network architecture in
which individual nodes in the network called peers act as both the suppliers and consumers
of resources.
In this is type of network, each computer is responsible for making its own resources
available to other computers on the network.
Each computer is responsible for setting up and maintaining its own security for its
resources.
Also each computer is responsible for accessing the required network resources from peer
to peer relationships.
Peer to peer network is useful for small network containing less than 10 computers on a
single LAN. Each computer has its own accounts and their security settings.
In peer to peer network, every computer can function as both a client and server. Windows
2000 comes in both server and professional versions.
There are no servers in peer to peer network.
Peer to peer network is used when If network security is not an important issue, If the
number of users is less than 10 computers (small network), If all the users are situated in
same area, If the possibility of future expansion is less.
Advantages:
1. No extra investment in server hardware or software is required.
2. Use less expensive computer
3. Easy to administer
4. No NOS required
5. Easy setup and lower cost for small networks
6. Users can control resource sharing.
Disadvantages:
Less Security
Backup is difficult
Hard to maintain version control
Users are supposed to manage their own computers
2. Client Server:
Advantages:
It is centralised management system
The client-server networks the server provide security and administration of the entire
network.
Clients are connected to server.
In client server networks the processing tasks are divided between client and servers. Client
request services such as file storage and printing and servers deliver them.
Disadvantages :
Professional administration is required.
We have to high speed server so server Cost more
Requires special network operating system and a number of client license.
We have to use high speed server
Difference between Peer to peer computing model and client server computing model
S.No. Peer to peer computing model Client – server computing Model
1. A distributed application architecture A distributed application architecture based on
that partitions tasks or workloads in resource or service providers called server and
between peers service requested devices are called clients
2. Each node can request for services and Client requests for service and server responds
provide services with service
3. Decentralised network Centralised network
4. Reliable as there multiple services and Clients depends on the server. Failure in server
providing nodes will disrupt the functioning of all clients
5. Are generally simpler and less Are generally more complex but give the user
expensive more control and more expensive
6. Poor performance for large number of Better performance for large number of users
users
7. A peer to peer architecture can operate A client server architecture, need a special
on a basic PC operating system operating system.
8. This is suited to home or very small This is suited for larger setups, such as a full-
office set-ups. scale office or school network especially if the
networks need to grow in size
Definition:
1. Budget limitations:
If a topology is unaffordable, it’s off the table no matter how perfectly suited it might be for your
situation. There’ll almost always be a lower-priced alternative that’s nearly as effective. On
pricing matters, bus and ring topologies are quite cost-effective while star, mesh, tree and hybrid
topologies are expensive.
2. Hardware Resources
Certain network topologies work best with certain hardware. And vice-versa. So before you
make a decision on the topology to adopt, perform an inventory of your current hardware.
3. Ease of Implementation
If you’ll contract a third party to install and/or maintain your network, then the complexity of
the network topology you choose is perhaps a non-issue. A competent networking
professional will have the education and experience needed to comprehend what each topology
entails and implement it accordingly.
4. Size of Network
You can choose the topology that would best serve the purpose. The tree topology works well
with large networks. The bus topology is best suited for small organizations.
5. Need for Reliability
Choose the topology that delivers the highest reliability. Ring topology performs pretty well
under heavy loads but is prone to a single point of failure. Star topology doesn’t depend on any
node but the network will collapse if the hub fails. Mesh and hybrid topologies score highest on
the reliability front.
6. Future Expansion
If you expect your organization to grow in size in the medium to long-term, opt for a network
topology that’s readily scalable
7. Ease of troubleshooting: There should avail of trained or skilled person to trouble shoot any
type of network topology.
Types of Topology:
1. Star Topology:
Star topology is a network topology in which each individual piece of a network is connected
to a central node called as hub or switch.
In star topology all the connections are made via the central hub or switch
The data that is transmitted between the network node passes across the central hub. All
the data on the star topology passes through the central device before reaching the
intended destination.
Switch require external power supply called active switch.
Advantages:
1. Easy to install , reconfigure and wire
2. Centralised management. It helps in monitoring the network
3. Robustness. If one link fails only that link is affected.
4. Multiple devices can together data without collisions
Disadvantages:
1. If switch fails to work then the whole topology relies fails, the whole system will crash
down.
2. The cost of installation is high.
3. Performance is based on the single concentrator i.e. switch.
4. More expensive than bus topology
3. Mesh Topology:
• Mesh topology is a network topology where each computer and network device is
interconnected with another.
• Each device in mesh topology has dedicated point to point link to every other
device.
• This topology setup allows for most transmission to be distributed even if of the
connections goes down.
• It is a topology commonly used for wireless network.
• Mesh use significantly a large amount of network cabling which makes expensive
Advantages:
Manages high amounts of traffic, because multiple devices can transmit data
simultaneously.
A failure of one device does not cause a break in the network or transmission of data.
Adding additional devices does not disrupt data transmission between other devices.
Disadvantages:
The cost to implement is higher than other network topologies, making it a less desirable
option.
Building and maintaining the topology is difficult and time consuming.
The chance of redundant connections is high, which adds to the high costs and potential for
reduced efficiency.
4. Tree Topology:
A tree topology is a special type of structure where many connected devices ae arranged like
the branches of a tree.
A tree topology is a variation of star topology. In tree topology not every device plugs to the
central hub. The majority of device connect to a secondary hub that in turn is connected to
the central hub.
A tree topology can also combines characteristics of linear bus and star topologies. It
consists of star configure workstations connected to linear bus backbone cable.
Tree topology allows for the expansion of an existing network and enable schools to
configure a network to meet their needs.
This topology is the combination of bus and star topology.
Tree topologies are frequently used to organize the computers in a corporate network, or
the information in a database
Advantages:
1. Easy to install and maintain
2. Fast as compared to other topologies
3. Multiple devices can transfer data without collisions
4. Eliminates traffic problem.
5. The other nodes in a network are not affected, if one of their nodes get damaged or
not working.
Disadvantages:
1. This network is very difficult to configure as compared to the other network
topologies.
2. Due to the presence of large number of nodes, the network performance of tree
topology becomes a bit slowly.
3. Requires large number of cables compared to star and ring topology.
4. The Backbone appears as the failure point of the entire segment of the network.
5. Difficult to trouble shoot.
5. Hybrid Topology:
A hybrid topology in networking combines two or more different network topologies (like
star, ring, bus, or mesh).
The topology that combines more than one topology is called hybrid topology.
Hybrid topology is used to connect a network that is divided into smaller sections also
known as segments.
It is widely used in WAN
Star-Ring Hybrid: Combines the ease of installation and management of a star topology with the
redundancy of a ring topology, where devices are initially connected in a star formation and then
linked in a circular manner.
Star-Bus Hybrid: Uses a central hub (star) for some devices and a shared cable (bus) for others,
offering a mix of centralized and distributed connectivity.
Advantages:
1. High reliability
2. Easy to detect fault
3. It can be expanded very easily
4. It can be used for wired and wireless networks
5. Low security risk
Disadvantages:
1. It is difficult to design and manage
2. Its design is expensive
3. It needs to use the MAU(Multi Access Unit)
1. Switch:
Network switch is small device that joins multiple computers together within one local area
network. Network switch operate at layer two data link layer of the OSI model.
A network switch can defined as the device that connects the network devices or network
segments.
Switches available with 4,8,12,24,48,64 ports.
Hub is just forwarding data but a switch doe’s filter and forwarding packets which is more
intelligent than hub.
Working of switch:
Rather than forwarding data to all the connected ports, a switch forward data only to the port on
which the destination system is connected. It looks at Media Access Control(MAC) address of the
devices connected to it to determine the correct port .
A MAC address is unique number that is stamped into every NIC
Switches support following three switching methods. 1. Store and forward 2. Cut and through 3.
Fragment Free
Different switches used are Layer-1 Switch, Layer-2 Switch,3,4,& 7
Advantages:
1. Higher throughput.
2. They increase the available bandwidth of the network
3. They increase the performance of the network
4. Switches can be connected directly to workstations.
5. They help in reducing workload on individual host PCs
Disadvantages:
1. They are more expensive than hub.
2. Network connectivity issues are difficult to be traced through the network switch
3. Broadcast traffic may be troublesome
4. While limiting broadcasts, they are not as good as routers
2. Router:
Router is a networking device which forwards the data packets between computer networks.
Routers perform the traffic performed by a router are determination of path(routing) and Packet
forwarding
Router perform the traffic directing function on the internet.
Router consists of combination of hardware and software. Hardware can be in the form of
network server
Software in a router are the operating system and routing protocol. Management software can
also be used.
Routers use logical and physical addressing to connect two or more logically separate networks.
The large network is organised into small network segments called subnets and these subnets are
interconnected via routers.
A router is a networking device that forwards data packets between computer networks.
Routers perform the traffic directing functions on the Internet.
Data sent through the internet, such as a web page or email, is in the form of data packets.
A wireless router connects directly to a modem by a cable. This allows it to receive information
from and transmit information to the internet. The router then creates and communicates with
your home Wi-Fi network using built-in antennas. As a result, all of the devices on your
home network have internet access.
A router has multiple interfaces and receives data packets through them. It evaluates the
network addresses of the incoming packets and decides which interface to forward the packet to.
It uses its local routing table for decision-making. This can be statically configured or calculated
via dynamic routing protocols such as OSPF or BGP
Types of router 1. Wired router 2. Wireless router 3. Core and edge router 4. Virtual router
5. Broad band router
Routers work at the network layer of the OSI model
Advantages:
➨ It provides connection between different network architectures such as ethernet & token ring etc.
➨It can choose best path across the internetwork using dynamic routing algorithms.
➨It can reduce network traffic by creating collision domains and also by creating broadcast domains.
➨It provides sophisticated routing, flow control and traffic isolation.
➨They are configurable which allows network manager to make policy based on routing decisions.
Disadvantages:
➨They operate based on routable network protocols.
➨They are expensive compare to other network devices.
➨They are slower as they need to analyze data from layer-1 through layer-3.
➨They are protocol dependent devices which must understand the protocol they are forwarding.
3. Repeater:
Repeaters are network devices that amplify or regenerate an incoming signal before
retransmitting it.
They are incorporated in networks to expand its coverage area. They are also known as signal
boosters.
A repeater operates at the physical layer.
A repeater receives the radio signal on one frequency and simultaneously transmits the same
signal on another frequency.
Advantages:
Repeaters are simple to install and can easily extend the length or the coverage area of
networks.
They are cost effective.
Repeaters don't require any processing overhead. ...
They can connect signals using different types of cables.
Disadvantages:
Repeaters cannot connect dissimilar networks.
They cannot differentiate between actual signal and noise.
They cannot reduce network traffic or congestion.
4. Bridge:
A bridge is a hardware device for linking two networks that work with the same protocol.
Bridge is used to connect two LANs (segment)
Bridge can regenerates the signal that it receives and it can check the physical (MAC)
address of the source and destination mentioned in the header of a frame
Types of bridges are simple bridge, multipoint bridge, transparent bridge, source routing
bridge
If the frame is to be forwarded, bridge will use a table relating to addresses and posts.
It has a single input and single output port, thus making it a 2 port device.
Bridges operates at data link layer and physical layer of the OSI model.
Advantages:
➨ It helps in extension of physical network.
➨It reduces network traffic with minor segmentation.
➨It reduces collisions and self-configuring.
➨Some bridges connect networks having different architectures and media types.
Disadvantages:
➨Bridges are expensive than repeaters.
➨Bridge cannot make decisions about routes through the network.
➨It is more expensive compare to repeaters.
5. Gateways:
A gateway is a hardware device that acts as a "gate" between two networks. It may be a router,
firewall, server, or other device that enables traffic to flow in and out of the network.
Gateway comprise of software dedicated hardware.
A gateway protects the nodes within network, it also a node itself.
In a workplace, the gateway is the machine or processor that routes out the traffic from a
particular workstation to the outside network. It works as an entrance to a network that
interlinks the other network to each other.
In enterprise network, the gateway acts as a firewall or proxy. The main purpose of gateway is to
control routing of different networks. Routing control in essence means that all the traffic that
flows through the transmission can be controlled accordingly.
A gateway is a device that can interpret and translate different protocols that are used on two
distinct networks.
A gateway operates on all the layers of the OSI model
Advantages:
It can connect the devices of two different networks having dissimilar structures or
protocols.
It is an intelligent device with filtering capabilities and handles the traffic problems
It is used to expand the network and used to connect two different types of networks.
Gateway is a server so it provides some security and uses a full-duplex mode of
communication
Disadvantages:
The major disadvantage of using a gateway is its implementation cost.
It will not be so effective to be used for small networks
6. Modem:
Modem is a communication device converts digital data from computers to analog signals and
puts it on the telephone links on the sender side.
If used on the received side, the modem will convert the analog signals received on the
telephone line to digital data.
Modem is a bidirectional device. It is a combination of two words modulator and demodulator.
Modulator circuit converts digital data signal to analog data signal at the transmitting end, the
process is known as modulation and demodulator circuit in modem converts digital signal into
analog signal.
A typical network setup connected multiple computers to the internet using a modem and router
Types of Modems are internal modem, external modem, wireless modem, cable modem, digital
modem etc.
Advantages:
More useful in connecting LAN with the internet.
A limited number of a system can be connected.
A modem is most probably widely used in data communication roadway.
Disadvantages:
Malware Attack. One major drawback of connecting a modem is that it can make your
computer vulnerable to hackers and malwares.
Traffic Maintenance, telephone service.