
















Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
Internet, Applications of Communication & Computer Network, Types of Network, Network Topology, Computer Network Architecture, Layered Tasks, OSI Model, Transmission Impairment, Switching, ISDN, Types of ISDN, Transmission Media, Magnetic Media, UnGuided Transmission, Channel Allocation, Carrier Sense Multiple Access (CSMA), Carrier-sense multiple access with collision detection, Collision-Free Protocols, Error detection and correction, Types of errors, Cyclic Redundancy Check (CRC) are covered.
Typology: Study notes
1 / 24
This page cannot be seen from the preview
Don't miss anything!
A network of networks is called an internetwork, or simply the internet. It is the largest network in existence on this planet.The internet hugely connects all WANs and it can have connection to LANs and Home networks. Internet uses TCP/IP protocol suite and uses IP as its addressing protocol. Present day, Internet is widely implemented using IPv4. Because of shortage of address spaces, it is gradually migrating from IPv4 to IPv6. Internet enables its users to share and access enormous amount of information worldwide. It uses WWW, FTP, email services, audio and video streaming etc. At huge level, internet works on Client-Server model. Internet uses very high speed backbone of fiber optics. To inter-connect various continents, fibers are laid under sea known to us as submarine communication cable. Applications of Communication & Computer Network Computer systems and peripherals are connected to form a network.They provide numerous advantages: Resource sharing such as printers and storage devices Exchange of information by means of e-Mails and FTP Information sharing by using Web or Internet Interaction with other users using dynamic web pages IP phones Video conferences Parallel computing Instant messaging Generally, networks are distinguished based on their geographical span. A network can be as small as distance between your mobile phone and its Bluetooth headphone and as large as the internet itself, covering the whole geographical world, Types of Network Personal Area Network A Personal Area Network (PAN) is smallest network which is very personal to a user. This may include Bluetooth enabled devices or infra-red enabled devices. PAN has connectivity range up to 10 meters. PAN may include wireless computer keyboard and mouse, Bluetooth enabled headphones, wireless printers and TV remotes. For example, Piconet is Bluetooth-enabled Personal Area Network which may contain up to 8 devices connected together in a master-slave fashion.
Local Area Network A computer network spanned inside a building and operated under single administrative system is generally termed as Local Area Network (LAN). Usually,LAN covers an organization’ offices, schools, colleges or universities. Number of systems connected in LAN may vary from as least as two to as much as 16 million. LAN provides a useful way of sharing the resources between end users.The resources such as printers, file servers, scanners, and internet are easily sharable among computers. LANs are composed of inexpensive networking and routing equipment. It may contains local servers serving file storage and other locally shared applications. It mostly operates on private IP addresses and does not involve heavy routing. LAN works under its own local domain and controlled centrally. LAN uses either Ethernet or Token-ring technology. Ethernet is most widely employed LAN technology and uses Star topology, while Token-ring is rarely seen. LAN can be wired,wireless, or in both forms at once. Metropolitan Area Network The Metropolitan Area Network (MAN) generally expands throughout a city such as cable TV network. It can be in the form of Ethernet,Token-ring, ATM, or Fiber Distributed Data Interface (FDDI). Metro Ethernet is a service which is provided by ISPs. This service enables its users to expand their Local Area Networks. For example, MAN can help an organization to connect all of its offices in a city. Backbone of MAN is high-capacity and high-speed fiber optics. MAN works in between Local Area Network and Wide Area Network. MAN provides uplink for LANs to WANs or internet.
Audio and Video Streaming
Point-to-Point Point-to-point networks contains exactly two hosts such as computer, switches or routers, servers connected back to back using a single piece of cable. Often, the receiving end of one host is connected to sending end of the other and vice-versa. If the hosts are connected point-to-point logically, then may have multiple intermediate devices. But the end hosts are unaware of underlying network and see each other as if they are connected directly. Bus Topology In case of Bus topology, all devices share single communication line or cable.Bus topology may have problem while multiple hosts sending data at the same time. Therefore, Bus topology either uses CSMA/CD technology or recognizes one host as Bus Master to solve the issue. It is one of the simple forms of networking where a failure of a device does not affect the other devices. But failure of the shared communication line can make all other devices stop functioning. Both ends of the shared channel have line terminator. The data is sent in only one direction and as soon as it reaches the extreme end, the terminator removes the data from the line. Star Topology All hosts in Star topology are connected to a central device, known as hub device, using a point-to-point connection. That is, there exists a point to point connection between hosts and hub. The hub device can be any of the following: Layer-1 device such as hub or repeater Layer-2 device such as switch or bridge Layer-3 device such as router or gateway
As in Bus topology, hub acts as single point of failure. If hub fails, connectivity of all hosts to all other hosts fails. Every communication between hosts, takes place through only the hub.Star topology is not expensive as to connect one more host, only one cable is required and configuration is simple. Ring Topology In ring topology, each host machine connects to exactly two other machines, creating a circular network structure. When one host tries to communicate or send message to a host which is not adjacent to it, the data travels through all intermediate hosts. To connect one more host in the existing structure, the administrator may need only one more extra cable. Failure of any host results in failure of the whole ring.Thus, every connection in the ring is a point of failure. There are methods which employ one more backup ring. Mesh Topology In this type of topology, a host is connected to one or multiple hosts.This topology has hosts in point-to-point connection with every other host or may also have hosts which are in point-to-point connection to few hosts only.
The above picture represents an arbitrarily hybrid topology. The combining topologies may contain attributes of Star, Ring, Bus, and Daisy-chain topologies. Most WANs are connected by means of Dual-Ring topology and networks connected to them are mostly Star topology networks. Internet is the best example of largest Hybrid topology
Computer Network Architecture is defined as the physical and logical design of the software, hardware, protocols, and media of the transmission of data. Simply we can say that how computers are organized and how tasks are allocated to the computer. The two types of network architectures are used: o Peer-To-Peer network o Client/Server network
o Peer-To-Peer network is a network in which all the computers are linked together with equal privilege and responsibilities for processing the data. o Peer-To-Peer network is useful for small environments, usually up to 10 computers. o Peer-To-Peer network has no dedicated server. o Special permissions are assigned to each computer for sharing the resources, but this can lead to a problem if the computer with the resource is down.
Advantages Of Peer-To-Peer Network: o It is less costly as it does not contain any dedicated server. o If one computer stops working but, other computers will not stop working. o It is easy to set up and maintain as each computer manages itself. Disadvantages Of Peer-To-Peer Network: o In the case of Peer-To-Peer network, it does not contain the centralized system. Therefore, it cannot back up the data as the data is different in different locations. o It has a security issue as the device is managed itself. Client/Server Network o Client/Server network is a network model designed for the end users called clients, to access the resources such as songs, video, etc. from a central computer known as Server. o The central controller is known as a server while all other computers in the network are called clients. o A server performs all the major operations such as security and network management. o A server is responsible for managing all the resources such as files, directories, printer, etc. o All the clients communicate with each other through a server. For example, if client1 wants to send some data to client 2, then it first sends the request to
In layered architecture of Network Model, one whole network process is divided into small tasks. Each small task is then assigned to a particular layer which works dedicatedly to process the task only. Every layer does only specific work. In layered communication system, one layer of a host deals with the task done by or to be done by its peer layer at the same level on the remote host. The task is either initiated by layer at the lowest level or at the top most level. If the task is initiated by the-top most layer, it is passed on to the layer below it for further processing. The lower layer does the same thing, it processes the task and passes on to lower layer. If the task is initiated by lower most layer, then the reverse path is taken. Every layer clubs together all procedures, protocols, and methods which it requires to execute its piece of task. All layers identify their counterparts by means of encapsulation header and tail. OSI Model Open System Interconnect is an open standard for all communication systems. OSI model is established by International Standard Organization (ISO). This model has seven layers: Application Layer : This layer is responsible for providing interface to the application user. This layer encompasses protocols which directly interact with the user. Presentation Layer : This layer defines how data in the native format of remote host should be presented in the native format of host.
Session Layer : This layer maintains sessions between remote hosts. For example, once user/password authentication is done, the remote host maintains this session for a while and does not ask for authentication again in that time span. Transport Layer : This layer is responsible for end-to-end delivery between hosts. Network Layer : This layer is responsible for address assignment and uniquely addressing hosts in a network. Data Link Layer : This layer is responsible for reading and writing data from and onto the line. Link errors are detected at this layer. Physical Layer : This layer defines the hardware, cabling wiring, power output, pulse rate etc. Transmission Impairment When signals travel through the medium they tend to deteriorate. This may have many reasons as given: Attenuation For the receiver to interpret the data accurately, the signal must be sufficiently strong.When the signal passes through the medium, it tends to get weaker.As it covers distance, it loses strength. Dispersion As signal travels through the media, it tends to spread and overlaps. The amount of dispersion depends upon the frequency used. Delay distortion Signals are sent over media with pre-defined speed and frequency. If the signal speed and frequency do not match, there are possibilities that signal reaches destination in arbitrary fashion. In digital media, this is very critical that some bits reach earlier than the previously sent ones. Noise Random disturbance or fluctuation in analog or digital signal is said to be Noise in signal, which may distort the actual information being carried. Noise can be characterized in one of the following class: o Thermal Noise Heat agitates the electronic conductors of a medium which may introduce noise in the media. Up to a certain level, thermal noise is unavoidable. o Intermodulation When multiple frequencies share a medium, their interference can cause noise in the medium. Intermodulation noise occurs if two different frequencies are sharing a medium and one of them has excessive strength or the component itself is not functioning properly, then the resultant frequency may not be delivered as expected. o Crosstalk This sort of noise happens when a foreign signal enters into the media. This is because signal in one medium affects the signal of second medium. o Impulse This noise is introduced because of irregular disturbances such as lightening, electricity, short-circuit, or faulty components. Digital data is mostly affected by this sort of noise.
Automatic alarm services to fire stations, police, medical etc. Types of ISDN Among the types of several interfaces present, some of them contains channels such as the B-Channels or Bearer Channels that are used to transmit voice and data simultaneously; the D- Channels or Delta Channels that are used for signaling purpose to set up communication. The ISDN has several kinds of access interfaces such as − Basic Rate Interface (BRI) Primary Rate Interface (PRI) Narrowband ISDN Broadband ISDN
The Basic Rate Interface or Basic Rate Access, simply called the ISDN BRI Connection uses the existing telephone infrastructure. The BRI configuration provides two data or bearer channels at 64 Kbits/sec speed and one control or delta channel at 16 Kbits/sec. This is a standard rate. The ISDN BRI interface is commonly used by smaller organizations or home users or within a local group, limiting a smaller area.
The Primary Rate Interface or Primary Rate Access, simply called the ISDN PRI connection is used by enterprises and offices. The PRI configuration is based on T- carrier or T1 in the US, Canada and Japan countries consisting of 23 data or bearer channels and one control or delta channel, with 64kbps speed for a bandwidth of 1. M bits/sec. The PRI configuration is based on E-carrier or E1 in Europe, Australia and few Asian countries consisting of 30 data or bearer channels and two-control or delta channel with 64kbps speed for a bandwidth of 2.048 M bits/sec. The ISDN BRI interface is used by larger organizations or enterprises and for Internet Service Providers.
The Narrowband Integrated Services Digital Network is called the N-ISDN. This can be understood as a telecommunication that carries voice information in a narrow band of frequencies. This is actually an attempt to digitize the analog voice information. This uses 64kbps circuit switching. The narrowband ISDN is implemented to carry voice data, which uses lesser bandwidth, on a limited number of frequencies.
The Broadband Integrated Services Digital Network is called the B-ISDN. This integrates the digital networking services and provides digital transmission over ordinary telephone wires, as well as over other media. The CCITT defined it as,
“Qualifying a service or system requiring transmission channels capable of supporting rates greater than primary rates.” The broadband ISDN speed is around 2 MBPS to 1 GBPS and the transmission is related to ATM, i.e., Asynchronous Transfer Mode. The broadband ISDN communication is usually made using the fiber optic cables. As the speed is greater than 1.544 Mbps, the communications based on this are called Broadband Communications. The broadband services provide a continuous flow of information, which is distributed from a central source to an unlimited number of authorized receivers connected to the network. Though a user can access this flow of information, he cannot control it.
ISDN is a telephone network based infrastructure, which enables the transmission of both voice and data simultaneously. There are many advantages of ISDN such as − As the services are digital, there is less chance for errors. The connection is faster. The bandwidth is higher. Voice, data and video − all of these can be sent over a single ISDN line.
The disadvantage of ISDN is that it requires specialized digital services and is costlier. However, the advent of ISDN has brought great advancement in communications. Multiple transmissions with greater speed are being achieved with higher levels of accuracy. Transmission Media The media over which the information between two computer systems is sent, called transmission media. Transmission media comes in two forms. Guided Media All communication wires/cables are guided media, such as UTP, coaxial cables, and fiber Optics. In this media, the sender and receiver are directly connected and the information is send (guided) through it. Unguided Media Wireless or open air space is said to be unguided media, because there is no connectivity between the sender and receiver. Information is spread over the air, and anyone including the actual recipient may collect the information. Magnetic Media One of the most convenient way to transfer data from one computer to another, even before the birth of networking, was to save it on some storage media and transfer physical from one station to another. Though it may seem old-fashion way in today’s world of high speed internet, but when the size of data is huge, the magnetic media comes into play.
Cables are connected using BNC connector and BNC-T. BNC terminator is used to terminate the wire at the far ends.
Fiber Optic works on the properties of light. When light ray hits at critical angle it tends to refracts at 90 degree. This property has been used in fiber optic. The core of fiber optic cable is made of high quality glass or plastic. From one end of it light is emitted, it travels through it and at the other end light detector detects light stream and converts it to electric data. Fiber Optic provides the highest mode of speed. It comes in two modes, one is single mode fiber and second is multimode fiber. Single mode fiber can carry a single ray of light whereas multimode is capable of carrying multiple beams of light. Fiber Optic also comes in unidirectional and bidirectional capabilities. To connect and access fiber optic special type of connectors are used. These can be Subscriber Channel (SC), Straight Tip (ST), or MT-RJ.
o An unguided transmission transmits the electromagnetic waves without using any physical medium. Therefore it is also known as wireless transmission. o In unguided media, air is the media through which the electromagnetic energy can flow easily.
Channel allocation is a process in which a single channel is divided and allotted to multiple users in order to carry user specific tasks. There are user’s quantity may vary every time the process takes place. If there are N number of users and channel is divided into N equal-sized sub channels, Each user is assigned one portion. If the number of users are small and don’t vary at times, than Frequency Division Multiplexing can be used as it is a simple and efficient channel bandwidth allocating technique. Channel allocation problem can be solved by two schemes: Static Channel Allocation in LANs and MANs, and Dynamic Channel Allocation. These are explained as following below.
1. Static Channel Allocation in LANs and MANs: It is the classical or traditional approach of allocating a single channel among multiple competing users Frequency Division Multiplexing (FDM). if there are N users, the
bandwidth is divided into N equal sized portions each user being assigned one portion. since each user has a private frequency band, there is no interface between users. It is not efficient to divide into fixed number of chunks. Dynamic Channel Allocation: Possible assumptions include:
Slotted ALOHA
Non persistent CSMA is a non aggressive transmission algorithm. When the transmitting node is ready to transmit data, it senses the transmission medium for idle or busy. If idle, then it transmits immediately. If busy, then it waits for a random period of time (during which it does not sense the transmission medium) before repeating the whole logic cycle (which started with sensing the transmission medium for idle or busy) again. This approach reduces collision, results in overall higher medium throughput but with a penalty of longer initial delay compared to 1–persistent. P-persistent This is an approach between 1-persistent and non-persistent CSMA access modes.[1]^ When the transmitting node is ready to transmit data, it senses the transmission medium for idle or busy. If idle, then it transmits immediately. If busy, then it senses the transmission medium continuously until it becomes idle, then transmits with probability p. If the node does not transmit (the probability of this event is 1-p ), it waits until the next available time slot. If the transmission medium is not busy, it transmits again with the same probability p. This probabilistic hold-off repeats until the frame is finally transmitted or when the medium is found to become busy again (i.e. some other node has already started transmitting). In the latter case the node repeats the whole logic cycle (which started with sensing the transmission medium for idle or busy) again. p-persistent CSMA is used in CSMA/CA systems including Wi-Fi and other packet radio systems.
Carrier-sense multiple access with collision detection ( CSMA/CD ) is a media access control method used most notably in early Ethernet technology for local area networking. It uses carrier-sensing to defer transmissions until no other stations are transmitting. This is used in combination with collision detection in which a transmitting station detects collisions by sensing transmissions from other stations while it is transmitting a frame. When this collision condition is detected, the station stops transmitting that frame, transmits a jam signal, and then waits for a random time interval before trying to resend the frame.[1] The following procedure is used to initiate a transmission. The procedure is complete when the frame is transmitted successfully or a collision is detected during transmission.[3]:
Almost collisions can be avoided in CSMA/CD .they can still occur during the contention period.the collision during contention period adversely affects the system performance, this happens when the cable is long and length of packet are short. This problem becomes serious as fiber optics network come into use. Here we shall discuss some protocols that resolve the collision during the contention period.